source: trunk/src/crypt32/oid.c@ 22012

Last change on this file since 22012 was 21967, checked in by dmik, 14 years ago

Don't access debug fields in CRITICAL_SECTION in release builds.

This fixes occasional crashes in CRYPT32.DLL (e.g. when playing back
some Flash contents).

File size: 56.4 KB
Line 
1/*
2 * Copyright 2002 Mike McCormack for CodeWeavers
3 * Copyright 2005-2006 Juan Lang
4 *
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
9 *
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
14 *
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
18 */
19
20#include "config.h"
21#include "wine/port.h"
22
23#include <stdio.h>
24#include <stdarg.h>
25#include <string.h>
26#define NONAMELESSUNION
27#include "windef.h"
28#include "winbase.h"
29#include "wincrypt.h"
30#include "winreg.h"
31#include "winuser.h"
32#include "wine/debug.h"
33#include "wine/list.h"
34#include "crypt32_private.h"
35#include "cryptres.h"
36
37//WINE_DEFAULT_DEBUG_CHANNEL(crypt);
38
39static const WCHAR DllW[] = { 'D','l','l',0 };
40
41static void init_oid_info(void);
42static void free_function_sets(void);
43static void free_oid_info(void);
44
45void crypt_oid_init(void)
46{
47 init_oid_info();
48}
49
50void crypt_oid_free(void)
51{
52 dprintf(("oid: cp1"));
53 free_function_sets();
54 dprintf(("oid: cp2"));
55 free_oid_info();
56 dprintf(("oid: cp3"));
57}
58
59static RTL_CRITICAL_SECTION funcSetCS;
60static RTL_CRITICAL_SECTION_DEBUG funcSetCSDebug =
61{
62 0, 0, &funcSetCS,
63 { &funcSetCSDebug.ProcessLocksList, &funcSetCSDebug.ProcessLocksList },
64 0, 0, { (DWORD)(DWORD_PTR)(__FILE__ ": funcSetCS") }
65};
66static RTL_CRITICAL_SECTION funcSetCS = { &funcSetCSDebug, -1, 0, 0, 0, 0 };
67static struct list funcSets = { &funcSets, &funcSets };
68
69struct OIDFunctionSet
70{
71 LPSTR name;
72 RTL_CRITICAL_SECTION cs; /* protects functions */
73 struct list functions;
74 struct list next;
75};
76
77struct OIDFunction
78{
79 DWORD encoding;
80 CRYPT_OID_FUNC_ENTRY entry;
81 struct list next;
82};
83
84static const WCHAR ROOT[] = {'R','O','O','T',0};
85static const WCHAR MY[] = {'M','Y',0};
86static const WCHAR CA[] = {'C','A',0};
87static const WCHAR ADDRESSBOOK[] = {'A','D','D','R','E','S','S','B','O','O','K',0};
88static const LPCWSTR LocalizedKeys[] = {ROOT,MY,CA,ADDRESSBOOK};
89static WCHAR LocalizedNames[4][256];
90
91static void free_function_sets(void)
92{
93 struct OIDFunctionSet *setCursor, *setNext;
94
95 LIST_FOR_EACH_ENTRY_SAFE(setCursor, setNext, &funcSets,
96 struct OIDFunctionSet, next)
97 {
98 struct OIDFunction *functionCursor, *funcNext;
99
100 list_remove(&setCursor->next);
101 CryptMemFree(setCursor->name);
102 LIST_FOR_EACH_ENTRY_SAFE(functionCursor, funcNext,
103 &setCursor->functions, struct OIDFunction, next)
104 {
105 list_remove(&functionCursor->next);
106 CryptMemFree(functionCursor);
107 }
108#ifdef DEBUG
109 setCursor->cs.DebugInfo->Spare[0] = 0;
110#endif
111 DeleteCriticalSection((CRITICAL_SECTION*)&setCursor->cs);
112 CryptMemFree(setCursor);
113 }
114}
115
116/* There is no free function associated with this; therefore, the sets are
117 * freed when crypt32.dll is unloaded.
118 */
119HCRYPTOIDFUNCSET WINAPI CryptInitOIDFunctionSet(LPCSTR pszFuncName,
120 DWORD dwFlags)
121{
122 struct OIDFunctionSet *cursor, *ret = NULL;
123
124 TRACE("(%s, %x)\n", debugstr_a(pszFuncName), dwFlags);
125
126 EnterCriticalSection((CRITICAL_SECTION*)&funcSetCS);
127 LIST_FOR_EACH_ENTRY(cursor, &funcSets, struct OIDFunctionSet, next)
128 {
129 if (!strcasecmp(pszFuncName, cursor->name))
130 {
131 ret = (HCRYPTOIDFUNCSET)cursor;
132 break;
133 }
134 }
135 if (!ret)
136 {
137 ret = CryptMemAlloc(sizeof(struct OIDFunctionSet));
138 if (ret)
139 {
140 memset(ret, 0, sizeof(*ret));
141 ret->name = CryptMemAlloc(strlen(pszFuncName) + 1);
142 if (ret->name)
143 {
144 InitializeCriticalSection((CRITICAL_SECTION*)&ret->cs);
145#ifdef DEBUG
146 ret->cs.DebugInfo->Spare[0] = (DWORD)(DWORD_PTR)(__FILE__ ": OIDFunctionSet.cs");
147#endif
148 list_init(&ret->functions);
149 strcpy(ret->name, pszFuncName);
150 list_add_tail(&funcSets, &ret->next);
151 }
152 else
153 {
154 CryptMemFree(ret);
155 ret = NULL;
156 }
157 }
158 }
159 LeaveCriticalSection((CRITICAL_SECTION*)&funcSetCS);
160
161 return (HCRYPTOIDFUNCSET)ret;
162}
163
164static char *CRYPT_GetKeyName(DWORD dwEncodingType, LPCSTR pszFuncName,
165 LPCSTR pszOID)
166{
167 static const char szEncodingTypeFmt[] =
168 "Software\\Microsoft\\Cryptography\\OID\\EncodingType %d\\%s\\%s";
169 UINT len;
170 char numericOID[7]; /* enough for "#65535" */
171 const char *oid;
172 LPSTR szKey;
173
174 /* MSDN says the encoding type is a mask, but it isn't treated that way.
175 * (E.g., if dwEncodingType were 3, the key names "EncodingType 1" and
176 * "EncodingType 2" would be expected if it were a mask. Instead native
177 * stores values in "EncodingType 3".
178 */
179 if (!HIWORD(pszOID))
180 {
181 crypt32_snprintf(numericOID, sizeof(numericOID), "#%d", LOWORD(pszOID));
182 oid = numericOID;
183 }
184 else
185 oid = pszOID;
186
187 /* This is enough: the lengths of the two string parameters are explicitly
188 * counted, and we need up to five additional characters for the encoding
189 * type. These are covered by the "%d", "%s", and "%s" characters in the
190 * format specifier that are removed by sprintf.
191 */
192 len = sizeof(szEncodingTypeFmt) + lstrlenA(pszFuncName) + lstrlenA(oid);
193 szKey = CryptMemAlloc(len);
194 if (szKey)
195 sprintf(szKey, szEncodingTypeFmt,
196 GET_CERT_ENCODING_TYPE(dwEncodingType), pszFuncName, oid);
197 return szKey;
198}
199
200BOOL WINAPI CryptGetDefaultOIDDllList(HCRYPTOIDFUNCSET hFuncSet,
201 DWORD dwEncodingType, LPWSTR pwszDllList, DWORD *pcchDllList)
202{
203 BOOL ret = TRUE;
204 struct OIDFunctionSet *set = (struct OIDFunctionSet *)hFuncSet;
205 char *keyName;
206 HKEY key;
207 long rc;
208
209 TRACE("(%p, %d, %p, %p)\n", hFuncSet, dwEncodingType, pwszDllList,
210 pcchDllList);
211
212 keyName = CRYPT_GetKeyName(dwEncodingType, set->name, "DEFAULT");
213 rc = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0,
214 KEY_READ, NULL, &key, NULL);
215 if (!rc)
216 {
217 DWORD size = *pcchDllList * sizeof(WCHAR);
218
219 rc = RegQueryValueExW(key, DllW, NULL, NULL, (LPBYTE)pwszDllList,
220 &size);
221 if (!rc)
222 *pcchDllList = size / sizeof(WCHAR);
223 else
224 {
225 /* No value, return an empty list */
226 if (pwszDllList && *pcchDllList)
227 *pwszDllList = '\0';
228 *pcchDllList = 1;
229 }
230 RegCloseKey(key);
231 }
232 else
233 {
234 /* No value, return an empty list */
235 if (pwszDllList && *pcchDllList)
236 *pwszDllList = '\0';
237 *pcchDllList = 1;
238 }
239 CryptMemFree(keyName);
240
241 return ret;
242}
243
244BOOL WINAPI CryptInstallOIDFunctionAddress(HMODULE hModule,
245 DWORD dwEncodingType, LPCSTR pszFuncName, DWORD cFuncEntry,
246 const CRYPT_OID_FUNC_ENTRY rgFuncEntry[], DWORD dwFlags)
247{
248 BOOL ret = TRUE;
249 struct OIDFunctionSet *set;
250
251 TRACE("(%p, %d, %s, %d, %p, %08x)\n", hModule, dwEncodingType,
252 debugstr_a(pszFuncName), cFuncEntry, rgFuncEntry, dwFlags);
253
254 set = (struct OIDFunctionSet *)CryptInitOIDFunctionSet(pszFuncName, 0);
255 if (set)
256 {
257 DWORD i;
258
259 EnterCriticalSection((CRITICAL_SECTION*)&set->cs);
260 for (i = 0; ret && i < cFuncEntry; i++)
261 {
262 struct OIDFunction *func;
263
264 if (HIWORD(rgFuncEntry[i].pszOID))
265 func = CryptMemAlloc(sizeof(struct OIDFunction)
266 + strlen(rgFuncEntry[i].pszOID) + 1);
267 else
268 func = CryptMemAlloc(sizeof(struct OIDFunction));
269 if (func)
270 {
271 func->encoding = GET_CERT_ENCODING_TYPE(dwEncodingType);
272 if (HIWORD(rgFuncEntry[i].pszOID))
273 {
274 LPSTR oid;
275
276 oid = (LPSTR)((LPBYTE)func + sizeof(*func));
277 strcpy(oid, rgFuncEntry[i].pszOID);
278 func->entry.pszOID = oid;
279 }
280 else
281 func->entry.pszOID = rgFuncEntry[i].pszOID;
282 func->entry.pvFuncAddr = rgFuncEntry[i].pvFuncAddr;
283 list_add_tail(&set->functions, &func->next);
284 }
285 else
286 ret = FALSE;
287 }
288 LeaveCriticalSection((CRITICAL_SECTION*)&set->cs);
289 }
290 else
291 ret = FALSE;
292 return ret;
293}
294
295struct FuncAddr
296{
297 HMODULE lib;
298 LPWSTR dllList;
299 LPWSTR currentDll;
300};
301
302static BOOL CRYPT_GetFuncFromReg(DWORD dwEncodingType, LPCSTR pszOID,
303 LPCSTR szFuncName, LPVOID *ppvFuncAddr, HCRYPTOIDFUNCADDR *phFuncAddr)
304{
305 BOOL ret = FALSE;
306 char *keyName;
307 const char *funcName;
308 HKEY key;
309 long rc;
310
311 keyName = CRYPT_GetKeyName(dwEncodingType, szFuncName, pszOID);
312 rc = RegOpenKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, KEY_READ, &key);
313 if (!rc)
314 {
315 DWORD type, size = 0;
316
317 rc = RegQueryValueExA(key, "FuncName", NULL, &type, NULL, &size);
318 if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
319 {
320 funcName = CryptMemAlloc(size);
321 rc = RegQueryValueExA(key, "FuncName", NULL, &type,
322 (LPBYTE)funcName, &size);
323 }
324 else
325 funcName = szFuncName;
326 rc = RegQueryValueExW(key, DllW, NULL, &type, NULL, &size);
327 if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
328 {
329 LPWSTR dllName = CryptMemAlloc(size);
330
331 if (dllName)
332 {
333 rc = RegQueryValueExW(key, DllW, NULL, NULL,
334 (LPBYTE)dllName, &size);
335 if (!rc)
336 {
337 HMODULE lib;
338
339 /* This is a bit of a hack; MSDN describes a more
340 * complicated unload routine than this will allow.
341 * Still, this seems to suffice for now.
342 */
343 lib = LoadLibraryW(dllName);
344 if (lib)
345 {
346 *ppvFuncAddr = (LPVOID)GetProcAddress(lib, funcName);
347 if (*ppvFuncAddr)
348 {
349 struct FuncAddr *addr =
350 CryptMemAlloc(sizeof(struct FuncAddr));
351
352 if (addr)
353 {
354 addr->lib = lib;
355 addr->dllList = addr->currentDll = NULL;
356 *phFuncAddr = addr;
357 ret = TRUE;
358 }
359 else
360 {
361 *phFuncAddr = NULL;
362 FreeLibrary(lib);
363 }
364 }
365 else
366 {
367 /* Unload the library, the caller doesn't want
368 * to unload it when the return value is NULL.
369 */
370 FreeLibrary(lib);
371 }
372 }
373 }
374 else
375 SetLastError(rc);
376 CryptMemFree(dllName);
377 }
378 }
379 else
380 SetLastError(rc);
381 if (funcName != szFuncName)
382 CryptMemFree((char *)funcName);
383 RegCloseKey(key);
384 }
385 else
386 SetLastError(rc);
387 CryptMemFree(keyName);
388 return ret;
389}
390
391BOOL WINAPI CryptGetOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
392 DWORD dwEncodingType, LPCSTR pszOID, DWORD dwFlags, void **ppvFuncAddr,
393 HCRYPTOIDFUNCADDR *phFuncAddr)
394{
395 BOOL ret = FALSE;
396 struct OIDFunctionSet *set = (struct OIDFunctionSet *)hFuncSet;
397
398 TRACE("(%p, %d, %s, %08x, %p, %p)\n", hFuncSet, dwEncodingType,
399 debugstr_a(pszOID), dwFlags, ppvFuncAddr, phFuncAddr);
400
401 *ppvFuncAddr = NULL;
402 if (!(dwFlags & CRYPT_GET_INSTALLED_OID_FUNC_FLAG))
403 {
404 struct OIDFunction *function;
405
406 EnterCriticalSection((CRITICAL_SECTION*)&set->cs);
407 LIST_FOR_EACH_ENTRY(function, &set->functions, struct OIDFunction, next)
408 {
409 if (function->encoding == GET_CERT_ENCODING_TYPE(dwEncodingType))
410 {
411 if (HIWORD(pszOID))
412 {
413 if (HIWORD(function->entry.pszOID) &&
414 !strcasecmp(function->entry.pszOID, pszOID))
415 {
416 *ppvFuncAddr = function->entry.pvFuncAddr;
417 *phFuncAddr = NULL; /* FIXME: what should it be? */
418 ret = TRUE;
419 break;
420 }
421 }
422 else if (function->entry.pszOID == pszOID)
423 {
424 *ppvFuncAddr = function->entry.pvFuncAddr;
425 *phFuncAddr = NULL; /* FIXME: what should it be? */
426 ret = TRUE;
427 break;
428 }
429 }
430 }
431 LeaveCriticalSection((CRITICAL_SECTION*)&set->cs);
432 }
433 if (!*ppvFuncAddr)
434 ret = CRYPT_GetFuncFromReg(dwEncodingType, pszOID, set->name,
435 ppvFuncAddr, phFuncAddr);
436 TRACE("returning %d\n", ret);
437 return ret;
438}
439
440BOOL WINAPI CryptFreeOIDFunctionAddress(HCRYPTOIDFUNCADDR hFuncAddr,
441 DWORD dwFlags)
442{
443 TRACE("(%p, %08x)\n", hFuncAddr, dwFlags);
444
445 /* FIXME: as MSDN states, need to check for DllCanUnloadNow in the DLL,
446 * and only unload it if it can be unloaded. Also need to implement ref
447 * counting on the functions.
448 */
449 if (hFuncAddr)
450 {
451 struct FuncAddr *addr = (struct FuncAddr *)hFuncAddr;
452
453 CryptMemFree(addr->dllList);
454 FreeLibrary(addr->lib);
455 CryptMemFree(addr);
456 }
457 return TRUE;
458}
459
460static BOOL CRYPT_GetFuncFromDll(LPCWSTR dll, LPCSTR func, HMODULE *lib,
461 void **ppvFuncAddr)
462{
463 BOOL ret = FALSE;
464
465 *lib = LoadLibraryW(dll);
466 if (*lib)
467 {
468 *ppvFuncAddr = (LPVOID)GetProcAddress(*lib, func);
469 if (*ppvFuncAddr)
470 ret = TRUE;
471 else
472 {
473 FreeLibrary(*lib);
474 *lib = NULL;
475 }
476 }
477 return ret;
478}
479
480BOOL WINAPI CryptGetDefaultOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
481 DWORD dwEncodingType, LPCWSTR pwszDll, DWORD dwFlags, void **ppvFuncAddr,
482 HCRYPTOIDFUNCADDR *phFuncAddr)
483{
484 struct OIDFunctionSet *set = (struct OIDFunctionSet *)hFuncSet;
485 BOOL ret = FALSE;
486
487 TRACE("(%p, %d, %s, %08x, %p, %p)\n", hFuncSet, dwEncodingType,
488 debugstr_w(pwszDll), dwFlags, ppvFuncAddr, phFuncAddr);
489
490 if (pwszDll)
491 {
492 HMODULE lib;
493
494 *phFuncAddr = NULL;
495 ret = CRYPT_GetFuncFromDll(pwszDll, set->name, &lib, ppvFuncAddr);
496 if (ret)
497 {
498 struct FuncAddr *addr = CryptMemAlloc(sizeof(struct FuncAddr));
499
500 if (addr)
501 {
502 addr->lib = lib;
503 addr->dllList = addr->currentDll = NULL;
504 *phFuncAddr = addr;
505 }
506 else
507 {
508 FreeLibrary(lib);
509 *ppvFuncAddr = NULL;
510 SetLastError(ERROR_OUTOFMEMORY);
511 ret = FALSE;
512 }
513 }
514 else
515 SetLastError(ERROR_FILE_NOT_FOUND);
516 }
517 else
518 {
519 struct FuncAddr *addr = (struct FuncAddr *)*phFuncAddr;
520
521 if (!addr)
522 {
523 DWORD size;
524
525 ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType, NULL,
526 &size);
527 if (ret)
528 {
529 LPWSTR dllList = CryptMemAlloc(size * sizeof(WCHAR));
530
531 if (dllList)
532 {
533 ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType,
534 dllList, &size);
535 if (ret)
536 {
537 addr = CryptMemAlloc(sizeof(struct FuncAddr));
538 if (addr)
539 {
540 addr->dllList = dllList;
541 addr->currentDll = dllList;
542 addr->lib = NULL;
543 *phFuncAddr = addr;
544 }
545 else
546 {
547 CryptMemFree(dllList);
548 SetLastError(ERROR_OUTOFMEMORY);
549 ret = FALSE;
550 }
551 }
552 }
553 else
554 {
555 SetLastError(ERROR_OUTOFMEMORY);
556 ret = FALSE;
557 }
558 }
559 }
560 if (addr)
561 {
562 if (!*addr->currentDll)
563 {
564 CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
565 SetLastError(ERROR_FILE_NOT_FOUND);
566 *phFuncAddr = NULL;
567 ret = FALSE;
568 }
569 else
570 {
571 /* FIXME: as elsewhere, can't free until DllCanUnloadNow says
572 * it's possible, and should defer unloading for some time to
573 * avoid repeated LoadLibrary/FreeLibrary on the same dll.
574 */
575 FreeLibrary(addr->lib);
576 ret = CRYPT_GetFuncFromDll(addr->currentDll, set->name,
577 &addr->lib, ppvFuncAddr);
578 if (ret)
579 {
580 /* Move past the current DLL */
581 addr->currentDll += lstrlenW(addr->currentDll) + 1;
582 *phFuncAddr = addr;
583 }
584 else
585 {
586 CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
587 SetLastError(ERROR_FILE_NOT_FOUND);
588 *phFuncAddr = NULL;
589 }
590 }
591 }
592 }
593 return ret;
594}
595
596/***********************************************************************
597 * CryptRegisterOIDFunction (CRYPT32.@)
598 *
599 * Register the DLL and the functions it uses to cover the combination
600 * of encoding type, functionname and OID.
601 *
602 * PARAMS
603 * dwEncodingType [I] Encoding type to be used.
604 * pszFuncName [I] Name of the function to be registered.
605 * pszOID [I] OID of the function (numeric or string).
606 * pwszDll [I] The DLL that is to be registered.
607 * pszOverrideFuncName [I] Name of the function in the DLL.
608 *
609 * RETURNS
610 * Success: TRUE.
611 * Failure: FALSE. (Look at GetLastError()).
612 *
613 * NOTES
614 * Registry errors are always reported via SetLastError().
615 */
616BOOL WINAPI CryptRegisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
617 LPCSTR pszOID, LPCWSTR pwszDll, LPCSTR pszOverrideFuncName)
618{
619 LONG r;
620 HKEY hKey;
621 LPSTR szKey;
622
623 TRACE("(%x, %s, %s, %s, %s)\n", dwEncodingType, pszFuncName,
624 debugstr_a(pszOID), debugstr_w(pwszDll), pszOverrideFuncName);
625
626 /* Native does nothing pwszDll is NULL */
627 if (!pwszDll)
628 return TRUE;
629
630 /* I'm not matching MS bug for bug here, because I doubt any app depends on
631 * it: native "succeeds" if pszFuncName is NULL, but the nonsensical entry
632 * it creates would never be used.
633 */
634 if (!pszFuncName || !pszOID)
635 {
636 SetLastError(E_INVALIDARG);
637 return FALSE;
638 }
639
640 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
641 TRACE("Key name is %s\n", debugstr_a(szKey));
642
643 if (!szKey)
644 return FALSE;
645
646 r = RegCreateKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
647 CryptMemFree(szKey);
648
649 if (r != ERROR_SUCCESS) goto error_close_key;
650
651 /* write the values */
652 if (pszOverrideFuncName)
653 {
654 r = RegSetValueExA(hKey, "FuncName", 0, REG_SZ,
655 (LPBYTE)pszOverrideFuncName, lstrlenA(pszOverrideFuncName) + 1);
656 if (r != ERROR_SUCCESS) goto error_close_key;
657 }
658 r = RegSetValueExW(hKey, DllW, 0, REG_SZ, (LPBYTE) pwszDll,
659 (lstrlenW(pwszDll) + 1) * sizeof (WCHAR));
660
661error_close_key:
662
663 RegCloseKey(hKey);
664
665 if (r != ERROR_SUCCESS)
666 {
667 SetLastError(r);
668 return FALSE;
669 }
670
671 return TRUE;
672}
673
674/***********************************************************************
675 * CryptUnregisterOIDFunction (CRYPT32.@)
676 */
677BOOL WINAPI CryptUnregisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
678 LPCSTR pszOID)
679{
680 LPSTR szKey;
681 LONG rc;
682
683 TRACE("%x %s %s\n", dwEncodingType, debugstr_a(pszFuncName),
684 debugstr_a(pszOID));
685
686 if (!pszFuncName || !pszOID)
687 {
688 SetLastError(ERROR_INVALID_PARAMETER);
689 return FALSE;
690 }
691
692 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
693 rc = RegDeleteKeyA(HKEY_LOCAL_MACHINE, szKey);
694 CryptMemFree(szKey);
695 if (rc)
696 SetLastError(rc);
697 return rc ? FALSE : TRUE;
698}
699
700BOOL WINAPI CryptGetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
701 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD *pdwValueType, BYTE *pbValueData,
702 DWORD *pcbValueData)
703{
704 LPSTR szKey;
705 LONG rc;
706 HKEY hKey;
707
708 TRACE("%x %s %s %s %p %p %p\n", dwEncodingType, debugstr_a(pszFuncName),
709 debugstr_a(pszOID), debugstr_w(pwszValueName), pdwValueType, pbValueData,
710 pcbValueData);
711
712 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
713 return TRUE;
714
715 if (!pszFuncName || !pszOID || !pwszValueName)
716 {
717 SetLastError(ERROR_INVALID_PARAMETER);
718 return FALSE;
719 }
720
721 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
722 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
723 CryptMemFree(szKey);
724 if (rc)
725 SetLastError(rc);
726 else
727 {
728 rc = RegQueryValueExW(hKey, pwszValueName, NULL, pdwValueType,
729 pbValueData, pcbValueData);
730 if (rc)
731 SetLastError(rc);
732 RegCloseKey(hKey);
733 }
734 return rc ? FALSE : TRUE;
735}
736
737BOOL WINAPI CryptSetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
738 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD dwValueType,
739 const BYTE *pbValueData, DWORD cbValueData)
740{
741 LPSTR szKey;
742 LONG rc;
743 HKEY hKey;
744
745 TRACE("%x %s %s %s %d %p %d\n", dwEncodingType, debugstr_a(pszFuncName),
746 debugstr_a(pszOID), debugstr_w(pwszValueName), dwValueType, pbValueData,
747 cbValueData);
748
749 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
750 return TRUE;
751
752 if (!pszFuncName || !pszOID || !pwszValueName)
753 {
754 SetLastError(ERROR_INVALID_PARAMETER);
755 return FALSE;
756 }
757
758 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
759 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
760 CryptMemFree(szKey);
761 if (rc)
762 SetLastError(rc);
763 else
764 {
765 rc = RegSetValueExW(hKey, pwszValueName, 0, dwValueType, (LPBYTE)pbValueData,
766 cbValueData);
767 if (rc)
768 SetLastError(rc);
769 RegCloseKey(hKey);
770 }
771 return rc ? FALSE : TRUE;
772}
773
774static LPCWSTR CRYPT_FindStringInMultiString(LPCWSTR multi, LPCWSTR toFind)
775{
776 LPCWSTR ret = NULL, ptr;
777
778 for (ptr = multi; ptr && *ptr && !ret; ptr += lstrlenW(ptr) + 1)
779 {
780 if (!lstrcmpiW(ptr, toFind))
781 ret = ptr;
782 }
783 return ret;
784}
785
786static DWORD CRYPT_GetMultiStringCharacterLen(LPCWSTR multi)
787{
788 DWORD ret;
789
790 if (multi)
791 {
792 LPCWSTR ptr;
793
794 /* Count terminating empty string */
795 ret = 1;
796 for (ptr = multi; *ptr; ptr += lstrlenW(ptr) + 1)
797 ret += lstrlenW(ptr) + 1;
798 }
799 else
800 ret = 0;
801 return ret;
802}
803
804static LPWSTR CRYPT_AddStringToMultiString(LPWSTR multi, LPCWSTR toAdd,
805 DWORD index)
806{
807 LPWSTR ret;
808
809 if (!multi)
810 {
811 /* FIXME: ignoring index, is that okay? */
812 ret = CryptMemAlloc((lstrlenW(toAdd) + 2) * sizeof(WCHAR));
813 if (ret)
814 {
815 /* copy string, including NULL terminator */
816 memcpy(ret, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
817 /* add terminating empty string */
818 *(ret + lstrlenW(toAdd) + 1) = 0;
819 }
820 }
821 else
822 {
823 DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
824
825 ret = CryptMemRealloc(multi, (len + lstrlenW(toAdd) + 1) *
826 sizeof(WCHAR));
827 if (ret)
828 {
829 LPWSTR spotToAdd;
830
831 if (index == CRYPT_REGISTER_LAST_INDEX)
832 spotToAdd = ret + len - 1;
833 else
834 {
835 DWORD i;
836
837 /* FIXME: if index is too large for the string, toAdd is
838 * added to the end. Is that okay?
839 */
840 for (i = 0, spotToAdd = ret; i < index && *spotToAdd;
841 spotToAdd += lstrlenW(spotToAdd) + 1)
842 ;
843 }
844 if (spotToAdd)
845 {
846 /* Copy existing string "right" */
847 memmove(spotToAdd + lstrlenW(toAdd) + 1, spotToAdd,
848 (len - (spotToAdd - ret)) * sizeof(WCHAR));
849 /* Copy new string */
850 memcpy(spotToAdd, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
851 }
852 else
853 {
854 CryptMemFree(ret);
855 ret = NULL;
856 }
857 }
858 }
859 return ret;
860}
861
862static BOOL CRYPT_RemoveStringFromMultiString(LPWSTR multi, LPCWSTR toRemove)
863{
864 LPWSTR spotToRemove = (LPWSTR)CRYPT_FindStringInMultiString(multi,
865 toRemove);
866 BOOL ret;
867
868 if (spotToRemove)
869 {
870 DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
871
872 /* Copy remainder of string "left" */
873 memmove(spotToRemove, spotToRemove + lstrlenW(toRemove) + 1,
874 (len - (spotToRemove - multi)) * sizeof(WCHAR));
875 ret = TRUE;
876 }
877 else
878 {
879 SetLastError(ERROR_FILE_NOT_FOUND);
880 ret = FALSE;
881 }
882 return ret;
883}
884
885static BOOL CRYPT_GetDefaultOIDKey(DWORD dwEncodingType, LPCSTR pszFuncName,
886 PHKEY key)
887{
888 LPSTR keyName;
889 LONG r;
890
891 keyName = CRYPT_GetKeyName(dwEncodingType, pszFuncName, "DEFAULT");
892 TRACE("Key name is %s\n", debugstr_a(keyName));
893
894 if (!keyName)
895 return FALSE;
896
897 r = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0, KEY_ALL_ACCESS,
898 NULL, key, NULL);
899 CryptMemFree(keyName);
900 if (r != ERROR_SUCCESS)
901 {
902 SetLastError(r);
903 return FALSE;
904 }
905 return TRUE;
906}
907
908static LPWSTR CRYPT_GetDefaultOIDDlls(HKEY key)
909{
910 LONG r;
911 DWORD type, size;
912 LPWSTR dlls;
913
914 r = RegQueryValueExW(key, DllW, NULL, &type, NULL, &size);
915 if (r == ERROR_SUCCESS && type == REG_MULTI_SZ)
916 {
917 dlls = CryptMemAlloc(size);
918 r = RegQueryValueExW(key, DllW, NULL, &type, (LPBYTE)dlls, &size);
919 if (r != ERROR_SUCCESS)
920 {
921 CryptMemFree(dlls);
922 dlls = NULL;
923 }
924 }
925 else
926 dlls = NULL;
927 return dlls;
928}
929
930static inline BOOL CRYPT_SetDefaultOIDDlls(HKEY key, LPCWSTR dlls)
931{
932 DWORD len = CRYPT_GetMultiStringCharacterLen(dlls);
933 LONG r;
934
935 if ((r = RegSetValueExW(key, DllW, 0, REG_MULTI_SZ, (LPBYTE)dlls,
936 len * sizeof (WCHAR))) != 0)
937 SetLastError(r);
938 return r == ERROR_SUCCESS;
939}
940
941/***********************************************************************
942 * CryptRegisterDefaultOIDFunction (CRYPT32.@)
943 */
944BOOL WINAPI CryptRegisterDefaultOIDFunction(DWORD dwEncodingType,
945 LPCSTR pszFuncName, DWORD dwIndex, LPCWSTR pwszDll)
946{
947 HKEY key;
948 LPWSTR dlls;
949 BOOL ret = FALSE;
950
951 TRACE("(%x, %s, %d, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
952 dwIndex, debugstr_w(pwszDll));
953
954 if (!pwszDll)
955 {
956 SetLastError(E_INVALIDARG);
957 return FALSE;
958 }
959
960 if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
961 return FALSE;
962
963 dlls = CRYPT_GetDefaultOIDDlls(key);
964 if (CRYPT_FindStringInMultiString(dlls, pwszDll))
965 SetLastError(ERROR_FILE_EXISTS);
966 else
967 {
968 dlls = CRYPT_AddStringToMultiString(dlls, pwszDll, dwIndex);
969 if (dlls)
970 ret = CRYPT_SetDefaultOIDDlls(key, dlls);
971 }
972 CryptMemFree(dlls);
973 RegCloseKey(key);
974 return ret;
975}
976
977BOOL WINAPI CryptUnregisterDefaultOIDFunction(DWORD dwEncodingType,
978 LPCSTR pszFuncName, LPCWSTR pwszDll)
979{
980 HKEY key;
981 LPWSTR dlls;
982 BOOL ret;
983
984 TRACE("(%x, %s, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
985 debugstr_w(pwszDll));
986
987 if (!pwszDll)
988 {
989 SetLastError(E_INVALIDARG);
990 return FALSE;
991 }
992
993 if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
994 return FALSE;
995
996 dlls = CRYPT_GetDefaultOIDDlls(key);
997 if ((ret = CRYPT_RemoveStringFromMultiString(dlls, pwszDll)) != FALSE)
998 ret = CRYPT_SetDefaultOIDDlls(key, dlls);
999 CryptMemFree(dlls);
1000 RegCloseKey(key);
1001 return ret;
1002}
1003
1004static void oid_init_localizednames(void)
1005{
1006 unsigned int i;
1007
1008 for(i = 0; i < sizeof(LocalizedKeys)/sizeof(LPCWSTR); i++)
1009 {
1010 LoadStringW(hInstance, IDS_LOCALIZEDNAME_ROOT+i, LocalizedNames[i], 256);
1011 }
1012}
1013
1014/********************************************************************
1015 * CryptFindLocalizedName (CRYPT32.@)
1016 */
1017LPCWSTR WINAPI CryptFindLocalizedName(LPCWSTR pwszCryptName)
1018{
1019 unsigned int i;
1020
1021 for(i = 0; i < sizeof(LocalizedKeys)/sizeof(LPCWSTR); i++)
1022 {
1023 if(!lstrcmpiW(LocalizedKeys[i], pwszCryptName))
1024 {
1025 return LocalizedNames[i];
1026 }
1027 }
1028
1029 FIXME("No name for: %s - stub\n",debugstr_w(pwszCryptName));
1030 return NULL;
1031}
1032
1033static RTL_CRITICAL_SECTION oidInfoCS;
1034static RTL_CRITICAL_SECTION_DEBUG oidInfoCSDebug =
1035{
1036 0, 0, &oidInfoCS,
1037 { &oidInfoCSDebug.ProcessLocksList, &oidInfoCSDebug.ProcessLocksList },
1038 0, 0, { (DWORD)(DWORD_PTR)(__FILE__ ": oidInfoCS") }
1039};
1040static RTL_CRITICAL_SECTION oidInfoCS = { &oidInfoCSDebug, -1, 0, 0, 0, 0 };
1041static struct list oidInfo = { &oidInfo, &oidInfo };
1042
1043static const WCHAR tripledes[] = { '3','d','e','s',0 };
1044static const WCHAR cms3deswrap[] = { 'C','M','S','3','D','E','S','w','r','a',
1045 'p',0 };
1046static const WCHAR cmsrc2wrap[] = { 'C','M','S','R','C','2','w','r','a','p',0 };
1047static const WCHAR des[] = { 'd','e','s',0 };
1048static const WCHAR md2[] = { 'm','d','2',0 };
1049static const WCHAR md4[] = { 'm','d','4',0 };
1050static const WCHAR md5[] = { 'm','d','5',0 };
1051static const WCHAR rc2[] = { 'r','c','2',0 };
1052static const WCHAR rc4[] = { 'r','c','4',0 };
1053static const WCHAR sha[] = { 's','h','a',0 };
1054static const WCHAR sha1[] = { 's','h','a','1',0 };
1055static const WCHAR RSA[] = { 'R','S','A',0 };
1056static const WCHAR RSA_KEYX[] = { 'R','S','A','_','K','E','Y','X',0 };
1057static const WCHAR RSA_SIGN[] = { 'R','S','A','_','S','I','G','N',0 };
1058static const WCHAR DSA[] = { 'D','S','A',0 };
1059static const WCHAR DSA_SIGN[] = { 'D','S','A','_','S','I','G','N',0 };
1060static const WCHAR DH[] = { 'D','H',0 };
1061static const WCHAR DSS[] = { 'D','S','S',0 };
1062static const WCHAR mosaicKMandUpdSig[] =
1063 { 'm','o','s','a','i','c','K','M','a','n','d','U','p','d','S','i','g',0 };
1064static const WCHAR ESDH[] = { 'E','S','D','H',0 };
1065static const WCHAR NO_SIGN[] = { 'N','O','S','I','G','N',0 };
1066static const WCHAR dsaSHA1[] = { 'd','s','a','S','H','A','1',0 };
1067static const WCHAR md2RSA[] = { 'm','d','2','R','S','A',0 };
1068static const WCHAR md4RSA[] = { 'm','d','4','R','S','A',0 };
1069static const WCHAR md5RSA[] = { 'm','d','5','R','S','A',0 };
1070static const WCHAR shaDSA[] = { 's','h','a','D','S','A',0 };
1071static const WCHAR sha1DSA[] = { 's','h','a','1','D','S','A',0 };
1072static const WCHAR shaRSA[] = { 's','h','a','R','S','A',0 };
1073static const WCHAR sha1RSA[] = { 's','h','a','1','R','S','A',0 };
1074static const WCHAR mosaicUpdatedSig[] =
1075 { 'm','o','s','a','i','c','U','p','d','a','t','e','d','S','i','g',0 };
1076static const WCHAR CN[] = { 'C','N',0 };
1077static const WCHAR L[] = { 'L',0 };
1078static const WCHAR O[] = { 'O',0 };
1079static const WCHAR OU[] = { 'O','U',0 };
1080static const WCHAR E[] = { 'E',0 };
1081static const WCHAR C[] = { 'C',0 };
1082static const WCHAR S[] = { 'S',0 };
1083static const WCHAR ST[] = { 'S','T',0 };
1084static const WCHAR STREET[] = { 'S','T','R','E','E','T',0 };
1085static const WCHAR T[] = { 'T',0 };
1086static const WCHAR Title[] = { 'T','i','t','l','e',0 };
1087static const WCHAR G[] = { 'G',0 };
1088static const WCHAR GivenName[] = { 'G','i','v','e','n','N','a','m','e',0 };
1089static const WCHAR I[] = { 'I',0 };
1090static const WCHAR Initials[] = { 'I','n','i','t','i','a','l','s',0 };
1091static const WCHAR SN[] = { 'S','N',0 };
1092static const WCHAR DC[] = { 'D','C',0 };
1093static const WCHAR Description[] =
1094 { 'D','e','s','c','r','i','p','t','i','o','n',0 };
1095static const WCHAR PostalCode[] = { 'P','o','s','t','a','l','C','o','d','e',0 };
1096static const WCHAR POBox[] = { 'P','O','B','o','x',0 };
1097static const WCHAR Phone[] = { 'P','h','o','n','e',0 };
1098static const WCHAR X21Address[] = { 'X','2','1','A','d','d','r','e','s','s',0 };
1099static const WCHAR dnQualifier[] =
1100 { 'd','n','Q','u','a','l','i','f','i','e','r',0 };
1101static const WCHAR Email[] = { 'E','m','a','i','l',0 };
1102static const WCHAR GN[] = { 'G','N',0 };
1103
1104static const DWORD noNullFlag = CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
1105static const DWORD mosaicFlags = CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
1106 CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
1107static const CRYPT_DATA_BLOB noNullBlob = { sizeof(noNullFlag),
1108 (LPBYTE)&noNullFlag };
1109static const CRYPT_DATA_BLOB mosaicFlagsBlob = { sizeof(mosaicFlags),
1110 (LPBYTE)&mosaicFlags };
1111
1112static const DWORD rsaSign = CALG_RSA_SIGN;
1113static const DWORD dssSign[2] = { CALG_DSS_SIGN,
1114 CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
1115static const DWORD mosaicSign[2] = { CALG_DSS_SIGN,
1116 CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
1117 CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
1118static const CRYPT_DATA_BLOB rsaSignBlob = { sizeof(rsaSign),
1119 (LPBYTE)&rsaSign };
1120static const CRYPT_DATA_BLOB dssSignBlob = { sizeof(dssSign),
1121 (LPBYTE)dssSign };
1122static const CRYPT_DATA_BLOB mosaicSignBlob = { sizeof(mosaicSign),
1123 (LPBYTE)mosaicSign };
1124
1125static const DWORD ia5String[] = { CERT_RDN_IA5_STRING, 0 };
1126static const DWORD numericString[] = { CERT_RDN_NUMERIC_STRING, 0 };
1127static const DWORD printableString[] = { CERT_RDN_PRINTABLE_STRING, 0 };
1128static const DWORD domainCompTypes[] = { CERT_RDN_IA5_STRING,
1129 CERT_RDN_UTF8_STRING, 0 };
1130static const CRYPT_DATA_BLOB ia5StringBlob = { sizeof(ia5String),
1131 (LPBYTE)ia5String };
1132static const CRYPT_DATA_BLOB numericStringBlob = { sizeof(numericString),
1133 (LPBYTE)numericString };
1134static const CRYPT_DATA_BLOB printableStringBlob = { sizeof(printableString),
1135 (LPBYTE)printableString };
1136static const CRYPT_DATA_BLOB domainCompTypesBlob = { sizeof(domainCompTypes),
1137 (LPBYTE)domainCompTypes };
1138
1139static const struct OIDInfoConstructor {
1140 DWORD dwGroupId;
1141 LPCSTR pszOID;
1142 UINT Algid;
1143 LPCWSTR pwszName;
1144 const CRYPT_DATA_BLOB *blob;
1145} oidInfoConstructors[] = {
1146 { 1, szOID_OIWSEC_sha1, CALG_SHA1, sha1, NULL },
1147 { 1, szOID_OIWSEC_sha1, CALG_SHA1, sha, NULL },
1148 { 1, szOID_OIWSEC_sha, CALG_SHA, sha, NULL },
1149 { 1, szOID_RSA_MD5, CALG_MD5, md5, NULL },
1150 { 1, szOID_RSA_MD4, CALG_MD4, md4, NULL },
1151 { 1, szOID_RSA_MD2, CALG_MD2, md2, NULL },
1152
1153 { 2, szOID_OIWSEC_desCBC, CALG_DES, des, NULL },
1154 { 2, szOID_RSA_DES_EDE3_CBC, CALG_3DES, tripledes, NULL },
1155 { 2, szOID_RSA_RC2CBC, CALG_RC2, rc2, NULL },
1156 { 2, szOID_RSA_RC4, CALG_RC4, rc4, NULL },
1157 { 2, szOID_RSA_SMIMEalgCMS3DESwrap, CALG_3DES, cms3deswrap, NULL },
1158 { 2, szOID_RSA_SMIMEalgCMSRC2wrap, CALG_RC2, cmsrc2wrap, NULL },
1159
1160 { 3, szOID_RSA_RSA, CALG_RSA_KEYX, RSA, NULL },
1161 { 3, szOID_X957_DSA, CALG_DSS_SIGN, DSA, &noNullBlob },
1162 { 3, szOID_ANSI_X942_DH, CALG_DH_SF, DH, &noNullBlob },
1163 { 3, szOID_RSA_RSA, CALG_RSA_KEYX, RSA_KEYX, NULL },
1164 { 3, szOID_RSA_RSA, CALG_RSA_SIGN, RSA, NULL },
1165 { 3, szOID_RSA_RSA, CALG_RSA_SIGN, RSA_SIGN, NULL },
1166 { 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, DSA, &noNullBlob },
1167 { 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, DSS, &noNullBlob },
1168 { 3, szOID_OIWSEC_dsa, CALG_DSS_SIGN, DSA_SIGN, &noNullBlob },
1169 { 3, szOID_RSA_DH, CALG_DH_SF, DH, &noNullBlob },
1170 { 3, szOID_OIWSEC_rsaXchg, CALG_RSA_KEYX, RSA_KEYX, NULL },
1171 { 3, szOID_INFOSEC_mosaicKMandUpdSig, CALG_DSS_SIGN, mosaicKMandUpdSig,
1172 &mosaicFlagsBlob },
1173 { 3, szOID_RSA_SMIMEalgESDH, CALG_DH_EPHEM, ESDH, &noNullBlob },
1174 { 3, szOID_PKIX_NO_SIGNATURE, CALG_NO_SIGN, NO_SIGN, NULL },
1175
1176 { 4, szOID_RSA_SHA1RSA, CALG_SHA1, sha1RSA, &rsaSignBlob },
1177 { 4, szOID_RSA_MD5RSA, CALG_MD5, md5RSA, &rsaSignBlob },
1178 { 4, szOID_X957_SHA1DSA, CALG_SHA1, sha1DSA, &dssSignBlob },
1179 { 4, szOID_OIWSEC_sha1RSASign, CALG_SHA1, sha1RSA, &rsaSignBlob },
1180 { 4, szOID_OIWSEC_sha1RSASign, CALG_SHA1, shaRSA, &rsaSignBlob },
1181 { 4, szOID_OIWSEC_shaRSA, CALG_SHA1, shaRSA, &rsaSignBlob },
1182 { 4, szOID_OIWSEC_md5RSA, CALG_MD5, md5RSA, &rsaSignBlob },
1183 { 4, szOID_RSA_MD2RSA, CALG_MD2, md2RSA, &rsaSignBlob },
1184 { 4, szOID_RSA_MD4RSA, CALG_MD4, md4RSA, &rsaSignBlob },
1185 { 4, szOID_OIWSEC_md4RSA, CALG_MD4, md4RSA, &rsaSignBlob },
1186 { 4, szOID_OIWSEC_md4RSA2, CALG_MD4, md4RSA, &rsaSignBlob },
1187 { 4, szOID_OIWDIR_md2RSA, CALG_MD2, md2RSA, &rsaSignBlob },
1188 { 4, szOID_OIWSEC_shaDSA, CALG_SHA1, sha1DSA, &dssSignBlob },
1189 { 4, szOID_OIWSEC_shaDSA, CALG_SHA1, shaDSA, &dssSignBlob },
1190 { 4, szOID_OIWSEC_dsaSHA1, CALG_SHA1, dsaSHA1, &dssSignBlob },
1191 { 4, szOID_INFOSEC_mosaicUpdatedSig, CALG_SHA1, mosaicUpdatedSig,
1192 &mosaicSignBlob },
1193
1194 { 5, szOID_COMMON_NAME, 0, CN, NULL },
1195 { 5, szOID_LOCALITY_NAME, 0, L, NULL },
1196 { 5, szOID_ORGANIZATION_NAME, 0, O, NULL },
1197 { 5, szOID_ORGANIZATIONAL_UNIT_NAME, 0, OU, NULL },
1198 { 5, szOID_RSA_emailAddr, 0, E, &ia5StringBlob },
1199 { 5, szOID_RSA_emailAddr, 0, Email, &ia5StringBlob },
1200 { 5, szOID_COUNTRY_NAME, 0, C, &printableStringBlob },
1201 { 5, szOID_STATE_OR_PROVINCE_NAME, 0, S, NULL },
1202 { 5, szOID_STATE_OR_PROVINCE_NAME, 0, ST, NULL },
1203 { 5, szOID_STREET_ADDRESS, 0, STREET, NULL },
1204 { 5, szOID_TITLE, 0, T, NULL },
1205 { 5, szOID_TITLE, 0, Title, NULL },
1206 { 5, szOID_GIVEN_NAME, 0, G, NULL },
1207 { 5, szOID_GIVEN_NAME, 0, GN, NULL },
1208 { 5, szOID_GIVEN_NAME, 0, GivenName, NULL },
1209 { 5, szOID_INITIALS, 0, I, NULL },
1210 { 5, szOID_INITIALS, 0, Initials, NULL },
1211 { 5, szOID_SUR_NAME, 0, SN, NULL },
1212 { 5, szOID_DOMAIN_COMPONENT, 0, DC, &domainCompTypesBlob },
1213 { 5, szOID_DESCRIPTION, 0, Description, NULL },
1214 { 5, szOID_POSTAL_CODE, 0, PostalCode, NULL },
1215 { 5, szOID_POST_OFFICE_BOX, 0, POBox, NULL },
1216 { 5, szOID_TELEPHONE_NUMBER, 0, Phone, &printableStringBlob },
1217 { 5, szOID_X21_ADDRESS, 0, X21Address, &numericStringBlob },
1218 { 5, szOID_DN_QUALIFIER, 0, dnQualifier, NULL },
1219
1220 { 6, szOID_AUTHORITY_KEY_IDENTIFIER2, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
1221 { 6, szOID_AUTHORITY_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
1222 { 6, szOID_KEY_ATTRIBUTES, 0, (LPCWSTR)IDS_KEY_ATTRIBUTES, NULL },
1223 { 6, szOID_KEY_USAGE_RESTRICTION, 0, (LPCWSTR)IDS_KEY_USAGE_RESTRICTION, NULL },
1224 { 6, szOID_SUBJECT_ALT_NAME2, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
1225 { 6, szOID_SUBJECT_ALT_NAME, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
1226 { 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
1227 { 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
1228 { 6, szOID_BASIC_CONSTRAINTS2, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
1229 { 6, szOID_BASIC_CONSTRAINTS, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
1230 { 6, szOID_KEY_USAGE, 0, (LPCWSTR)IDS_KEY_USAGE, NULL },
1231 { 6, szOID_CERT_POLICIES, 0, (LPCWSTR)IDS_CERT_POLICIES, NULL },
1232 { 6, szOID_SUBJECT_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_SUBJECT_KEY_IDENTIFIER, NULL },
1233 { 6, szOID_CRL_REASON_CODE, 0, (LPCWSTR)IDS_CRL_REASON_CODE, NULL },
1234 { 6, szOID_CRL_DIST_POINTS, 0, (LPCWSTR)IDS_CRL_DIST_POINTS, NULL },
1235 { 6, szOID_ENHANCED_KEY_USAGE, 0, (LPCWSTR)IDS_ENHANCED_KEY_USAGE, NULL },
1236 { 6, szOID_AUTHORITY_INFO_ACCESS, 0, (LPCWSTR)IDS_AUTHORITY_INFO_ACCESS, NULL },
1237 { 6, szOID_CERT_EXTENSIONS, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
1238 { 6, szOID_RSA_certExtensions, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
1239 { 6, szOID_NEXT_UPDATE_LOCATION, 0, (LPCWSTR)IDS_NEXT_UPDATE_LOCATION, NULL },
1240 { 6, szOID_YESNO_TRUST_ATTR, 0, (LPCWSTR)IDS_YES_OR_NO_TRUST, NULL },
1241 { 6, szOID_RSA_emailAddr, 0, (LPCWSTR)IDS_EMAIL_ADDRESS, NULL },
1242 { 6, szOID_RSA_unstructName, 0, (LPCWSTR)IDS_UNSTRUCTURED_NAME, NULL },
1243 { 6, szOID_RSA_contentType, 0, (LPCWSTR)IDS_CONTENT_TYPE, NULL },
1244 { 6, szOID_RSA_messageDigest, 0, (LPCWSTR)IDS_MESSAGE_DIGEST, NULL },
1245 { 6, szOID_RSA_signingTime, 0, (LPCWSTR)IDS_SIGNING_TIME, NULL },
1246 { 6, szOID_RSA_counterSign, 0, (LPCWSTR)IDS_COUNTER_SIGN, NULL },
1247 { 6, szOID_RSA_challengePwd, 0, (LPCWSTR)IDS_CHALLENGE_PASSWORD, NULL },
1248 { 6, szOID_RSA_unstructAddr, 0, (LPCWSTR)IDS_UNSTRUCTURED_ADDRESS, NULL },
1249 { 6, szOID_RSA_SMIMECapabilities, 0, (LPCWSTR)IDS_SMIME_CAPABILITIES, NULL },
1250 { 6, szOID_RSA_preferSignedData, 0, (LPCWSTR)IDS_PREFER_SIGNED_DATA, NULL },
1251 { 6, szOID_PKIX_POLICY_QUALIFIER_CPS, 0, (LPCWSTR)IDS_CPS, NULL },
1252 { 6, szOID_PKIX_POLICY_QUALIFIER_USERNOTICE, 0, (LPCWSTR)IDS_USER_NOTICE, NULL },
1253 { 6, szOID_PKIX_OCSP, 0, (LPCWSTR)IDS_OCSP, NULL },
1254 { 6, szOID_PKIX_CA_ISSUERS, 0, (LPCWSTR)IDS_CA_ISSUER, NULL },
1255 { 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TEMPLATE_NAME, NULL },
1256 { 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TYPE, NULL },
1257 { 6, szOID_CERT_MANIFOLD, 0, (LPCWSTR)IDS_CERT_MANIFOLD, NULL },
1258 { 6, szOID_NETSCAPE_CERT_TYPE, 0, (LPCWSTR)IDS_NETSCAPE_CERT_TYPE, NULL },
1259 { 6, szOID_NETSCAPE_BASE_URL, 0, (LPCWSTR)IDS_NETSCAPE_BASE_URL, NULL },
1260 { 6, szOID_NETSCAPE_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_REVOCATION_URL, NULL },
1261 { 6, szOID_NETSCAPE_CA_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_REVOCATION_URL, NULL },
1262 { 6, szOID_NETSCAPE_CERT_RENEWAL_URL, 0, (LPCWSTR)IDS_NETSCAPE_CERT_RENEWAL_URL, NULL },
1263 { 6, szOID_NETSCAPE_CA_POLICY_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_POLICY_URL, NULL },
1264 { 6, szOID_NETSCAPE_SSL_SERVER_NAME, 0, (LPCWSTR)IDS_NETSCAPE_SSL_SERVER_NAME, NULL },
1265 { 6, szOID_NETSCAPE_COMMENT, 0, (LPCWSTR)IDS_NETSCAPE_COMMENT, NULL },
1266 { 6, "1.3.6.1.4.1.311.2.1.10", 0, (LPCWSTR)IDS_SPC_SP_AGENCY_INFO, NULL },
1267 { 6, "1.3.6.1.4.1.311.2.1.27", 0, (LPCWSTR)IDS_SPC_FINANCIAL_CRITERIA, NULL },
1268 { 6, "1.3.6.1.4.1.311.2.1.26", 0, (LPCWSTR)IDS_SPC_MINIMAL_CRITERIA, NULL },
1269 { 6, szOID_COUNTRY_NAME, 0, (LPCWSTR)IDS_COUNTRY, NULL },
1270 { 6, szOID_ORGANIZATION_NAME, 0, (LPCWSTR)IDS_ORGANIZATION, NULL },
1271 { 6, szOID_ORGANIZATIONAL_UNIT_NAME, 0, (LPCWSTR)IDS_ORGANIZATIONAL_UNIT, NULL },
1272 { 6, szOID_COMMON_NAME, 0, (LPCWSTR)IDS_COMMON_NAME, NULL },
1273 { 6, szOID_LOCALITY_NAME, 0, (LPCWSTR)IDS_LOCALITY, NULL },
1274 { 6, szOID_STATE_OR_PROVINCE_NAME, 0, (LPCWSTR)IDS_STATE_OR_PROVINCE, NULL },
1275 { 6, szOID_TITLE, 0, (LPCWSTR)IDS_TITLE, NULL },
1276 { 6, szOID_GIVEN_NAME, 0, (LPCWSTR)IDS_GIVEN_NAME, NULL },
1277 { 6, szOID_INITIALS, 0, (LPCWSTR)IDS_INITIALS, NULL },
1278 { 6, szOID_SUR_NAME, 0, (LPCWSTR)IDS_SUR_NAME, NULL },
1279 { 6, szOID_DOMAIN_COMPONENT, 0, (LPCWSTR)IDS_DOMAIN_COMPONENT, NULL },
1280 { 6, szOID_STREET_ADDRESS, 0, (LPCWSTR)IDS_STREET_ADDRESS, NULL },
1281 { 6, szOID_DEVICE_SERIAL_NUMBER, 0, (LPCWSTR)IDS_SERIAL_NUMBER, NULL },
1282 { 6, szOID_CERTSRV_CA_VERSION, 0, (LPCWSTR)IDS_CA_VERSION, NULL },
1283 { 6, szOID_CERTSRV_CROSSCA_VERSION, 0, (LPCWSTR)IDS_CROSS_CA_VERSION, NULL },
1284 { 6, szOID_SERIALIZED, 0, (LPCWSTR)IDS_SERIALIZED_SIG_SERIAL_NUMBER, NULL },
1285 { 6, szOID_NT_PRINCIPAL_NAME, 0, (LPCWSTR)IDS_PRINCIPAL_NAME, NULL },
1286 { 6, szOID_PRODUCT_UPDATE, 0, (LPCWSTR)IDS_WINDOWS_PRODUCT_UPDATE, NULL },
1287 { 6, szOID_ENROLLMENT_NAME_VALUE_PAIR, 0, (LPCWSTR)IDS_ENROLLMENT_NAME_VALUE_PAIR, NULL },
1288 { 6, szOID_OS_VERSION, 0, (LPCWSTR)IDS_OS_VERSION, NULL },
1289 { 6, szOID_ENROLLMENT_CSP_PROVIDER, 0, (LPCWSTR)IDS_ENROLLMENT_CSP, NULL },
1290 { 6, szOID_CRL_NUMBER, 0, (LPCWSTR)IDS_CRL_NUMBER, NULL },
1291 { 6, szOID_DELTA_CRL_INDICATOR, 0, (LPCWSTR)IDS_DELTA_CRL_INDICATOR, NULL },
1292 { 6, szOID_ISSUING_DIST_POINT, 0, (LPCWSTR)IDS_ISSUING_DIST_POINT, NULL },
1293 { 6, szOID_FRESHEST_CRL, 0, (LPCWSTR)IDS_FRESHEST_CRL, NULL },
1294 { 6, szOID_NAME_CONSTRAINTS, 0, (LPCWSTR)IDS_NAME_CONSTRAINTS, NULL },
1295 { 6, szOID_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
1296 { 6, szOID_LEGACY_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
1297 { 6, szOID_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_POLICY_CONSTRAINTS, NULL },
1298 { 6, szOID_CROSS_CERT_DIST_POINTS, 0, (LPCWSTR)IDS_CROSS_CERT_DIST_POINTS, NULL },
1299 { 6, szOID_APPLICATION_CERT_POLICIES, 0, (LPCWSTR)IDS_APPLICATION_POLICIES, NULL },
1300 { 6, szOID_APPLICATION_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_MAPPINGS, NULL },
1301 { 6, szOID_APPLICATION_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_CONSTRAINTS, NULL },
1302 { 6, szOID_CT_PKI_DATA, 0, (LPCWSTR)IDS_CMC_DATA, NULL },
1303 { 6, szOID_CT_PKI_RESPONSE, 0, (LPCWSTR)IDS_CMC_RESPONSE, NULL },
1304 { 6, szOID_CMC, 0, (LPCWSTR)IDS_UNSIGNED_CMC_REQUEST, NULL },
1305 { 6, szOID_CMC_STATUS_INFO, 0, (LPCWSTR)IDS_CMC_STATUS_INFO, NULL },
1306 { 6, szOID_CMC_ADD_EXTENSIONS, 0, (LPCWSTR)IDS_CMC_EXTENSIONS, NULL },
1307 { 6, szOID_CTL, 0, (LPCWSTR)IDS_CMC_ATTRIBUTES, NULL },
1308 { 6, szOID_RSA_data, 0, (LPCWSTR)IDS_PKCS_7_DATA, NULL },
1309 { 6, szOID_RSA_signedData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED, NULL },
1310 { 6, szOID_RSA_envelopedData, 0, (LPCWSTR)IDS_PKCS_7_ENVELOPED, NULL },
1311 { 6, szOID_RSA_signEnvData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED_ENVELOPED, NULL },
1312 { 6, szOID_RSA_digestedData, 0, (LPCWSTR)IDS_PKCS_7_DIGESTED, NULL },
1313 { 6, szOID_RSA_encryptedData, 0, (LPCWSTR)IDS_PKCS_7_ENCRYPTED, NULL },
1314 { 6, szOID_CERTSRV_PREVIOUS_CERT_HASH, 0, (LPCWSTR)IDS_PREVIOUS_CA_CERT_HASH, NULL },
1315 { 6, szOID_CRL_VIRTUAL_BASE, 0, (LPCWSTR)IDS_CRL_VIRTUAL_BASE, NULL },
1316 { 6, szOID_CRL_NEXT_PUBLISH, 0, (LPCWSTR)IDS_CRL_NEXT_PUBLISH, NULL },
1317 { 6, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
1318 { 6, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
1319 { 6, szOID_CERTIFICATE_TEMPLATE, 0, (LPCWSTR)IDS_CERTIFICATE_TEMPLATE, NULL },
1320 { 6, szOID_ENTERPRISE_OID_ROOT, 0, (LPCWSTR)IDS_ENTERPRISE_ROOT_OID, NULL },
1321 { 6, szOID_RDN_DUMMY_SIGNER, 0, (LPCWSTR)IDS_RDN_DUMMY_SIGNER, NULL },
1322 { 6, szOID_ARCHIVED_KEY_ATTR, 0, (LPCWSTR)IDS_ARCHIVED_KEY_ATTR, NULL },
1323 { 6, szOID_CRL_SELF_CDP, 0, (LPCWSTR)IDS_CRL_SELF_CDP, NULL },
1324 { 6, szOID_REQUIRE_CERT_CHAIN_POLICY, 0, (LPCWSTR)IDS_REQUIRE_CERT_CHAIN_POLICY, NULL },
1325 { 6, szOID_CMC_TRANSACTION_ID, 0, (LPCWSTR)IDS_TRANSACTION_ID, NULL },
1326 { 6, szOID_CMC_SENDER_NONCE, 0, (LPCWSTR)IDS_SENDER_NONCE, NULL },
1327 { 6, szOID_CMC_RECIPIENT_NONCE, 0, (LPCWSTR)IDS_RECIPIENT_NONCE, NULL },
1328 { 6, szOID_CMC_REG_INFO, 0, (LPCWSTR)IDS_REG_INFO, NULL },
1329 { 6, szOID_CMC_GET_CERT, 0, (LPCWSTR)IDS_GET_CERTIFICATE, NULL },
1330 { 6, szOID_CMC_GET_CRL, 0, (LPCWSTR)IDS_GET_CRL, NULL },
1331 { 6, szOID_CMC_REVOKE_REQUEST, 0, (LPCWSTR)IDS_REVOKE_REQUEST, NULL },
1332 { 6, szOID_CMC_QUERY_PENDING, 0, (LPCWSTR)IDS_QUERY_PENDING, NULL },
1333 { 6, szOID_SORTED_CTL, 0, (LPCWSTR)IDS_SORTED_CTL, NULL },
1334 { 6, szOID_ARCHIVED_KEY_CERT_HASH, 0, (LPCWSTR)IDS_ARCHIVED_KEY_CERT_HASH, NULL },
1335 { 6, szOID_PRIVATEKEY_USAGE_PERIOD, 0, (LPCWSTR)IDS_PRIVATE_KEY_USAGE_PERIOD, NULL },
1336 { 6, szOID_REQUEST_CLIENT_INFO, 0, (LPCWSTR)IDS_CLIENT_INFORMATION, NULL },
1337
1338 { 7, szOID_PKIX_KP_SERVER_AUTH, 0, (LPCWSTR)IDS_SERVER_AUTHENTICATION, NULL },
1339 { 7, szOID_PKIX_KP_CLIENT_AUTH, 0, (LPCWSTR)IDS_CLIENT_AUTHENTICATION, NULL },
1340 { 7, szOID_PKIX_KP_CODE_SIGNING, 0, (LPCWSTR)IDS_CODE_SIGNING, NULL },
1341 { 7, szOID_PKIX_KP_EMAIL_PROTECTION, 0, (LPCWSTR)IDS_SECURE_EMAIL, NULL },
1342 { 7, szOID_PKIX_KP_TIMESTAMP_SIGNING, 0, (LPCWSTR)IDS_TIME_STAMPING, NULL },
1343 { 7, szOID_KP_CTL_USAGE_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TRUST_LIST_SIGNING, NULL },
1344 { 7, szOID_KP_TIME_STAMP_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TIME_STAMPING, NULL },
1345 { 7, szOID_PKIX_KP_IPSEC_END_SYSTEM, 0, (LPCWSTR)IDS_IPSEC_END_SYSTEM, NULL },
1346 { 7, szOID_PKIX_KP_IPSEC_TUNNEL, 0, (LPCWSTR)IDS_IPSEC_TUNNEL, NULL },
1347 { 7, szOID_PKIX_KP_IPSEC_USER, 0, (LPCWSTR)IDS_IPSEC_USER, NULL },
1348 { 7, szOID_KP_EFS, 0, (LPCWSTR)IDS_EFS, NULL },
1349 { 7, szOID_WHQL_CRYPTO, 0, (LPCWSTR)IDS_WHQL_CRYPTO, NULL },
1350 { 7, szOID_NT5_CRYPTO, 0, (LPCWSTR)IDS_NT5_CRYPTO, NULL },
1351 { 7, szOID_OEM_WHQL_CRYPTO, 0, (LPCWSTR)IDS_OEM_WHQL_CRYPTO, NULL },
1352 { 7, szOID_EMBEDDED_NT_CRYPTO, 0, (LPCWSTR)IDS_EMBEDDED_NT_CRYPTO, NULL },
1353 { 7, szOID_LICENSES, 0, (LPCWSTR)IDS_KEY_PACK_LICENSES, NULL },
1354 { 7, szOID_LICENSE_SERVER, 0, (LPCWSTR)IDS_LICENSE_SERVER, NULL },
1355 { 7, szOID_KP_SMARTCARD_LOGON, 0, (LPCWSTR)IDS_SMART_CARD_LOGON, NULL },
1356 { 7, szOID_DRM, 0, (LPCWSTR)IDS_DIGITAL_RIGHTS, NULL },
1357 { 7, szOID_KP_QUALIFIED_SUBORDINATION, 0, (LPCWSTR)IDS_QUALIFIED_SUBORDINATION, NULL },
1358 { 7, szOID_KP_KEY_RECOVERY, 0, (LPCWSTR)IDS_KEY_RECOVERY, NULL },
1359 { 7, szOID_KP_DOCUMENT_SIGNING, 0, (LPCWSTR)IDS_DOCUMENT_SIGNING, NULL },
1360 { 7, szOID_IPSEC_KP_IKE_INTERMEDIATE, 0, (LPCWSTR)IDS_IPSEC_IKE_INTERMEDIATE, NULL },
1361 { 7, szOID_EFS_RECOVERY, 0, (LPCWSTR)IDS_FILE_RECOVERY, NULL },
1362 { 7, szOID_ROOT_LIST_SIGNER, 0, (LPCWSTR)IDS_ROOT_LIST_SIGNER, NULL },
1363 { 7, szOID_ANY_APPLICATION_POLICY, 0, (LPCWSTR)IDS_ANY_APPLICATION_POLICIES, NULL },
1364 { 7, szOID_DS_EMAIL_REPLICATION, 0, (LPCWSTR)IDS_DS_EMAIL_REPLICATION, NULL },
1365 { 7, szOID_ENROLLMENT_AGENT, 0, (LPCWSTR)IDS_ENROLLMENT_AGENT, NULL },
1366 { 7, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
1367 { 7, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
1368 { 7, szOID_KP_LIFETIME_SIGNING, 0, (LPCWSTR)IDS_LIFETIME_SIGNING, NULL },
1369
1370 { 8, szOID_ANY_CERT_POLICY, 0, (LPCWSTR)IDS_ANY_CERT_POLICY, NULL },
1371};
1372
1373struct OIDInfo {
1374 CRYPT_OID_INFO info;
1375 struct list entry;
1376};
1377
1378static void init_oid_info(void)
1379{
1380 DWORD i;
1381
1382 oid_init_localizednames();
1383 for (i = 0; i < sizeof(oidInfoConstructors) /
1384 sizeof(oidInfoConstructors[0]); i++)
1385 {
1386 if (HIWORD(oidInfoConstructors[i].pwszName))
1387 {
1388 struct OIDInfo *info = NULL;
1389
1390 /* The name is a static string, so just use the same pointer */
1391 info = CryptMemAlloc(sizeof(struct OIDInfo));
1392 if (info)
1393 {
1394#if 1
1395 memset(info, 0, sizeof(*info));
1396 info->info.cbSize = sizeof(CRYPT_OID_INFO);
1397 info->info.pszOID = oidInfoConstructors[i].pszOID;
1398 info->info.pwszName = oidInfoConstructors[i].pwszName;
1399 info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
1400 info->info.u.Algid = oidInfoConstructors[i].Algid;
1401 if (oidInfoConstructors[i].blob)
1402 {
1403 info->info.ExtraInfo.cbData =
1404 oidInfoConstructors[i].blob->cbData;
1405 info->info.ExtraInfo.pbData =
1406 oidInfoConstructors[i].blob->pbData;
1407 }
1408#endif
1409 list_add_tail(&oidInfo, &info->entry);
1410 }
1411 }
1412 else
1413 {
1414 LPCWSTR stringresource = NULL;
1415 int len = LoadStringW(hInstance,
1416 (UINT)(UINT_PTR)oidInfoConstructors[i].pwszName,
1417 (LPWSTR)&stringresource, 0);
1418
1419 if (len)
1420 {
1421 struct OIDInfo *info = CryptMemAlloc(sizeof(struct OIDInfo) +
1422 (len + 1) * sizeof(WCHAR));
1423
1424 if (info)
1425 {
1426#if 1
1427 memset(info, 0, sizeof(*info));
1428 info->info.cbSize = sizeof(CRYPT_OID_INFO);
1429 info->info.pszOID = oidInfoConstructors[i].pszOID;
1430 info->info.pwszName = (LPWSTR)(info + 1);
1431 info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
1432 info->info.u.Algid = oidInfoConstructors[i].Algid;
1433 if (stringresource && (char*)stringresource != (char*)0xAAAAAAAA)
1434 memcpy(info + 1, stringresource, len*sizeof(WCHAR));
1435 ((LPWSTR)(info + 1))[len] = 0;
1436 if (oidInfoConstructors[i].blob)
1437 {
1438 info->info.ExtraInfo.cbData =
1439 oidInfoConstructors[i].blob->cbData;
1440 info->info.ExtraInfo.pbData =
1441 oidInfoConstructors[i].blob->pbData;
1442 }
1443#endif
1444 list_add_tail(&oidInfo, &info->entry);
1445 }
1446 }
1447 }
1448 }
1449}
1450
1451static void free_oid_info(void)
1452{
1453 struct OIDInfo *info, *next;
1454
1455 LIST_FOR_EACH_ENTRY_SAFE(info, next, &oidInfo, struct OIDInfo, entry)
1456 {
1457 if (info > (struct OIDInfo*)0x10000)
1458 {
1459 if (&info->entry > (struct list*)0x10000)
1460 list_remove(&info->entry);
1461 CryptMemFree(info);
1462 }
1463 }
1464}
1465
1466/***********************************************************************
1467 * CryptEnumOIDInfo (CRYPT32.@)
1468 */
1469BOOL WINAPI CryptEnumOIDInfo(DWORD dwGroupId, DWORD dwFlags, void *pvArg,
1470 PFN_CRYPT_ENUM_OID_INFO pfnEnumOIDInfo)
1471{
1472 BOOL ret = TRUE;
1473 struct OIDInfo *info;
1474
1475 TRACE("(%d, %08x, %p, %p)\n", dwGroupId, dwFlags, pvArg,
1476 pfnEnumOIDInfo);
1477
1478 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1479 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1480 {
1481 if (!dwGroupId || dwGroupId == info->info.dwGroupId)
1482 {
1483 ret = pfnEnumOIDInfo(&info->info, pvArg);
1484 if (!ret)
1485 break;
1486 }
1487 }
1488 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1489 return ret;
1490}
1491
1492PCCRYPT_OID_INFO WINAPI CryptFindOIDInfo(DWORD dwKeyType, void *pvKey,
1493 DWORD dwGroupId)
1494{
1495 PCCRYPT_OID_INFO ret = NULL;
1496
1497 TRACE("(%d, %p, %d)\n", dwKeyType, pvKey, dwGroupId);
1498
1499 switch(dwKeyType)
1500 {
1501 case CRYPT_OID_INFO_ALGID_KEY:
1502 {
1503 struct OIDInfo *info;
1504
1505 TRACE("CRYPT_OID_INFO_ALGID_KEY: %d\n", *(DWORD *)pvKey);
1506 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1507 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1508 {
1509 if (info->info.u.Algid == *(DWORD *)pvKey &&
1510 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1511 {
1512 ret = &info->info;
1513 break;
1514 }
1515 }
1516 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1517 break;
1518 }
1519 case CRYPT_OID_INFO_NAME_KEY:
1520 {
1521 struct OIDInfo *info;
1522
1523 TRACE("CRYPT_OID_INFO_NAME_KEY: %s\n", debugstr_w((LPWSTR)pvKey));
1524 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1525 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1526 {
1527 if (!lstrcmpW(info->info.pwszName, (LPWSTR)pvKey) &&
1528 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1529 {
1530 ret = &info->info;
1531 break;
1532 }
1533 }
1534 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1535 break;
1536 }
1537 case CRYPT_OID_INFO_OID_KEY:
1538 {
1539 struct OIDInfo *info;
1540 LPSTR oid = (LPSTR)pvKey;
1541
1542 TRACE("CRYPT_OID_INFO_OID_KEY: %s\n", debugstr_a(oid));
1543 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1544 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1545 {
1546 if (!lstrcmpA(info->info.pszOID, oid) &&
1547 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1548 {
1549 ret = &info->info;
1550 break;
1551 }
1552 }
1553 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1554 break;
1555 }
1556 case CRYPT_OID_INFO_SIGN_KEY:
1557 {
1558 struct OIDInfo *info;
1559
1560 TRACE("CRYPT_OID_INFO_SIGN_KEY: %d\n", *(DWORD *)pvKey);
1561 EnterCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1562 LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1563 {
1564 if (info->info.u.Algid == *(DWORD *)pvKey &&
1565 info->info.ExtraInfo.cbData >= sizeof(DWORD) &&
1566 *(DWORD *)info->info.ExtraInfo.pbData ==
1567 *(DWORD *)((LPBYTE)pvKey + sizeof(DWORD)) &&
1568 (!dwGroupId || info->info.dwGroupId == dwGroupId))
1569 {
1570 ret = &info->info;
1571 break;
1572 }
1573 }
1574 LeaveCriticalSection((CRITICAL_SECTION*)&oidInfoCS);
1575 break;
1576 }
1577 }
1578 return ret;
1579}
1580
1581LPCSTR WINAPI CertAlgIdToOID(DWORD dwAlgId)
1582{
1583 LPCSTR ret;
1584 PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_ALGID_KEY,
1585 &dwAlgId, 0);
1586
1587 if (info)
1588 ret = info->pszOID;
1589 else
1590 ret = NULL;
1591 return ret;
1592}
1593
1594DWORD WINAPI CertOIDToAlgId(LPCSTR pszObjId)
1595{
1596 DWORD ret;
1597 PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_OID_KEY,
1598 (void *)pszObjId, 0);
1599
1600 if (info)
1601 ret = info->u.Algid;
1602 else
1603 ret = 0;
1604 return ret;
1605}
Note: See TracBrowser for help on using the repository browser.