widl: Set the default calling convention at header generation time, not at parsing...
[wine/hramrach.git] / dlls / crypt32 / message.c
blobf06af0e7cb26ee177233972eae950628ac8788ad
1 /*
2 * Copyright 2007 Juan Lang
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19 #include <stdarg.h>
20 #include "windef.h"
21 #include "winbase.h"
22 #include "wincrypt.h"
24 #include "wine/debug.h"
26 WINE_DEFAULT_DEBUG_CHANNEL(crypt);
28 HCERTSTORE WINAPI CryptGetMessageCertificates(DWORD dwMsgAndCertEncodingType,
29 HCRYPTPROV_LEGACY hCryptProv, DWORD dwFlags, const BYTE* pbSignedBlob,
30 DWORD cbSignedBlob)
32 CRYPT_DATA_BLOB blob = { cbSignedBlob, (LPBYTE)pbSignedBlob };
34 TRACE("(%08x, %ld, %d08x %p, %d)\n", dwMsgAndCertEncodingType, hCryptProv,
35 dwFlags, pbSignedBlob, cbSignedBlob);
37 return CertOpenStore(CERT_STORE_PROV_PKCS7, dwMsgAndCertEncodingType,
38 hCryptProv, dwFlags, &blob);
41 LONG WINAPI CryptGetMessageSignerCount(DWORD dwMsgEncodingType,
42 const BYTE *pbSignedBlob, DWORD cbSignedBlob)
44 HCRYPTMSG msg;
45 LONG count = -1;
47 TRACE("(%08x, %p, %d)\n", dwMsgEncodingType, pbSignedBlob, cbSignedBlob);
49 msg = CryptMsgOpenToDecode(dwMsgEncodingType, 0, 0, 0, NULL, NULL);
50 if (msg)
52 if (CryptMsgUpdate(msg, pbSignedBlob, cbSignedBlob, TRUE))
54 DWORD size = sizeof(count);
56 CryptMsgGetParam(msg, CMSG_SIGNER_COUNT_PARAM, 0, &count, &size);
58 CryptMsgClose(msg);
60 return count;
63 static CERT_INFO *CRYPT_GetSignerCertInfoFromMsg(HCRYPTMSG msg,
64 DWORD dwSignerIndex)
66 CERT_INFO *certInfo = NULL;
67 DWORD size;
69 if (CryptMsgGetParam(msg, CMSG_SIGNER_CERT_INFO_PARAM, dwSignerIndex, NULL,
70 &size))
72 certInfo = CryptMemAlloc(size);
73 if (certInfo)
75 if (!CryptMsgGetParam(msg, CMSG_SIGNER_CERT_INFO_PARAM,
76 dwSignerIndex, certInfo, &size))
78 CryptMemFree(certInfo);
79 certInfo = NULL;
83 else
84 SetLastError(CRYPT_E_UNEXPECTED_MSG_TYPE);
85 return certInfo;
88 static PCCERT_CONTEXT WINAPI CRYPT_DefaultGetSignerCertificate(void *pvGetArg,
89 DWORD dwCertEncodingType, PCERT_INFO pSignerId, HCERTSTORE hMsgCertStore)
91 return CertFindCertificateInStore(hMsgCertStore, dwCertEncodingType, 0,
92 CERT_FIND_SUBJECT_CERT, pSignerId, NULL);
95 static inline PCCERT_CONTEXT CRYPT_GetSignerCertificate(HCRYPTMSG msg,
96 PCRYPT_VERIFY_MESSAGE_PARA pVerifyPara, PCERT_INFO certInfo, HCERTSTORE store)
98 PFN_CRYPT_GET_SIGNER_CERTIFICATE getCert;
100 if (pVerifyPara->pfnGetSignerCertificate)
101 getCert = pVerifyPara->pfnGetSignerCertificate;
102 else
103 getCert = CRYPT_DefaultGetSignerCertificate;
104 return getCert(pVerifyPara->pvGetArg,
105 pVerifyPara->dwMsgAndCertEncodingType, certInfo, store);
108 BOOL WINAPI CryptVerifyDetachedMessageSignature(
109 PCRYPT_VERIFY_MESSAGE_PARA pVerifyPara, DWORD dwSignerIndex,
110 const BYTE *pbDetachedSignBlob, DWORD cbDetachedSignBlob, DWORD cToBeSigned,
111 const BYTE *rgpbToBeSigned[], DWORD rgcbToBeSigned[],
112 PCCERT_CONTEXT *ppSignerCert)
114 BOOL ret = FALSE;
115 HCRYPTMSG msg;
117 TRACE("(%p, %d, %p, %d, %d, %p, %p, %p)\n", pVerifyPara, dwSignerIndex,
118 pbDetachedSignBlob, cbDetachedSignBlob, cToBeSigned, rgpbToBeSigned,
119 rgcbToBeSigned, ppSignerCert);
121 if (ppSignerCert)
122 *ppSignerCert = NULL;
123 if (!pVerifyPara ||
124 pVerifyPara->cbSize != sizeof(CRYPT_VERIFY_MESSAGE_PARA) ||
125 GET_CMSG_ENCODING_TYPE(pVerifyPara->dwMsgAndCertEncodingType) !=
126 PKCS_7_ASN_ENCODING)
128 SetLastError(E_INVALIDARG);
129 return FALSE;
132 msg = CryptMsgOpenToDecode(pVerifyPara->dwMsgAndCertEncodingType,
133 CMSG_DETACHED_FLAG, 0, pVerifyPara->hCryptProv, NULL, NULL);
134 if (msg)
136 ret = CryptMsgUpdate(msg, pbDetachedSignBlob, cbDetachedSignBlob, TRUE);
137 if (ret)
139 DWORD i;
141 for (i = 0; ret && i < cToBeSigned; i++)
142 ret = CryptMsgUpdate(msg, rgpbToBeSigned[i], rgcbToBeSigned[i],
143 i == cToBeSigned - 1 ? TRUE : FALSE);
145 if (ret)
147 CERT_INFO *certInfo = CRYPT_GetSignerCertInfoFromMsg(msg,
148 dwSignerIndex);
150 ret = FALSE;
151 if (certInfo)
153 HCERTSTORE store = CertOpenStore(CERT_STORE_PROV_MSG,
154 pVerifyPara->dwMsgAndCertEncodingType,
155 pVerifyPara->hCryptProv, 0, msg);
157 if (store)
159 PCCERT_CONTEXT cert = CRYPT_GetSignerCertificate(
160 msg, pVerifyPara, certInfo, store);
162 if (cert)
164 ret = CryptMsgControl(msg, 0,
165 CMSG_CTRL_VERIFY_SIGNATURE, cert->pCertInfo);
166 if (ret && ppSignerCert)
167 *ppSignerCert = cert;
168 else
169 CertFreeCertificateContext(cert);
171 else
172 SetLastError(CRYPT_E_NOT_FOUND);
173 CertCloseStore(store, 0);
175 CryptMemFree(certInfo);
178 CryptMsgClose(msg);
180 TRACE("returning %d\n", ret);
181 return ret;
184 BOOL WINAPI CryptVerifyMessageSignature(PCRYPT_VERIFY_MESSAGE_PARA pVerifyPara,
185 DWORD dwSignerIndex, const BYTE* pbSignedBlob, DWORD cbSignedBlob,
186 BYTE* pbDecoded, DWORD* pcbDecoded, PCCERT_CONTEXT* ppSignerCert)
188 BOOL ret = FALSE;
189 HCRYPTMSG msg;
191 TRACE("(%p, %d, %p, %d, %p, %p, %p)\n",
192 pVerifyPara, dwSignerIndex, pbSignedBlob, cbSignedBlob,
193 pbDecoded, pcbDecoded, ppSignerCert);
195 if (ppSignerCert)
196 *ppSignerCert = NULL;
197 if (!pVerifyPara ||
198 pVerifyPara->cbSize != sizeof(CRYPT_VERIFY_MESSAGE_PARA) ||
199 GET_CMSG_ENCODING_TYPE(pVerifyPara->dwMsgAndCertEncodingType) !=
200 PKCS_7_ASN_ENCODING)
202 if(pcbDecoded)
203 *pcbDecoded = 0;
204 SetLastError(E_INVALIDARG);
205 return FALSE;
208 msg = CryptMsgOpenToDecode(pVerifyPara->dwMsgAndCertEncodingType, 0, 0,
209 pVerifyPara->hCryptProv, NULL, NULL);
210 if (msg)
212 ret = CryptMsgUpdate(msg, pbSignedBlob, cbSignedBlob, TRUE);
213 if (ret)
215 CERT_INFO *certInfo = CRYPT_GetSignerCertInfoFromMsg(msg,
216 dwSignerIndex);
218 ret = FALSE;
219 if (certInfo)
221 HCERTSTORE store = CertOpenStore(CERT_STORE_PROV_MSG,
222 pVerifyPara->dwMsgAndCertEncodingType,
223 pVerifyPara->hCryptProv, 0, msg);
225 if (store)
227 PCCERT_CONTEXT cert = CRYPT_GetSignerCertificate(
228 msg, pVerifyPara, certInfo, store);
230 if (cert)
232 ret = CryptMsgControl(msg, 0,
233 CMSG_CTRL_VERIFY_SIGNATURE, cert->pCertInfo);
234 if (ret && ppSignerCert)
235 *ppSignerCert = cert;
236 else
237 CertFreeCertificateContext(cert);
239 CertCloseStore(store, 0);
242 CryptMemFree(certInfo);
244 if (ret)
246 /* The caller is expected to pass a valid pointer to pcbDecoded
247 * when the message verifies successfully.
249 if (pcbDecoded)
250 ret = CryptMsgGetParam(msg, CMSG_CONTENT_PARAM, 0, pbDecoded,
251 pcbDecoded);
252 else
254 SetLastError(CRYPT_E_NOT_FOUND);
255 ret = FALSE;
258 CryptMsgClose(msg);
260 if(!ret && pcbDecoded)
261 *pcbDecoded = 0;
262 TRACE("returning %d\n", ret);
263 return ret;
266 BOOL WINAPI CryptHashMessage(PCRYPT_HASH_MESSAGE_PARA pHashPara,
267 BOOL fDetachedHash, DWORD cToBeHashed, const BYTE *rgpbToBeHashed[],
268 DWORD rgcbToBeHashed[], BYTE *pbHashedBlob, DWORD *pcbHashedBlob,
269 BYTE *pbComputedHash, DWORD *pcbComputedHash)
271 DWORD i, flags;
272 BOOL ret = FALSE;
273 HCRYPTMSG msg;
274 CMSG_HASHED_ENCODE_INFO info;
276 TRACE("(%p, %d, %d, %p, %p, %p, %p, %p, %p)\n", pHashPara, fDetachedHash,
277 cToBeHashed, rgpbToBeHashed, rgcbToBeHashed, pbHashedBlob, pcbHashedBlob,
278 pbComputedHash, pcbComputedHash);
280 if (pHashPara->cbSize != sizeof(CRYPT_HASH_MESSAGE_PARA))
282 SetLastError(E_INVALIDARG);
283 return FALSE;
285 /* Native seems to ignore any encoding type other than the expected
286 * PKCS_7_ASN_ENCODING
288 if (GET_CMSG_ENCODING_TYPE(pHashPara->dwMsgEncodingType) !=
289 PKCS_7_ASN_ENCODING)
290 return TRUE;
291 /* Native also seems to do nothing if the output parameter isn't given */
292 if (!pcbHashedBlob)
293 return TRUE;
295 flags = fDetachedHash ? CMSG_DETACHED_FLAG : 0;
296 memset(&info, 0, sizeof(info));
297 info.cbSize = sizeof(info);
298 info.hCryptProv = pHashPara->hCryptProv;
299 memcpy(&info.HashAlgorithm, &pHashPara->HashAlgorithm,
300 sizeof(info.HashAlgorithm));
301 info.pvHashAuxInfo = pHashPara->pvHashAuxInfo;
302 msg = CryptMsgOpenToEncode(pHashPara->dwMsgEncodingType, flags, CMSG_HASHED,
303 &info, NULL, NULL);
304 if (msg)
306 for (i = 0, ret = TRUE; ret && i < cToBeHashed; i++)
307 ret = CryptMsgUpdate(msg, rgpbToBeHashed[i], rgcbToBeHashed[i],
308 i == cToBeHashed - 1 ? TRUE : FALSE);
309 if (ret)
311 ret = CryptMsgGetParam(msg, CMSG_CONTENT_PARAM, 0, pbHashedBlob,
312 pcbHashedBlob);
313 if (ret && pcbComputedHash)
314 ret = CryptMsgGetParam(msg, CMSG_COMPUTED_HASH_PARAM, 0,
315 pbComputedHash, pcbComputedHash);
317 CryptMsgClose(msg);
319 return ret;
322 BOOL WINAPI CryptVerifyDetachedMessageHash(PCRYPT_HASH_MESSAGE_PARA pHashPara,
323 BYTE *pbDetachedHashBlob, DWORD cbDetachedHashBlob, DWORD cToBeHashed,
324 const BYTE *rgpbToBeHashed[], DWORD rgcbToBeHashed[], BYTE *pbComputedHash,
325 DWORD *pcbComputedHash)
327 HCRYPTMSG msg;
328 BOOL ret = FALSE;
330 TRACE("(%p, %p, %d, %d, %p, %p, %p, %p)\n", pHashPara, pbDetachedHashBlob,
331 cbDetachedHashBlob, cToBeHashed, rgpbToBeHashed, rgcbToBeHashed,
332 pbComputedHash, pcbComputedHash);
334 if (pHashPara->cbSize != sizeof(CRYPT_HASH_MESSAGE_PARA))
336 SetLastError(E_INVALIDARG);
337 return FALSE;
339 if (GET_CMSG_ENCODING_TYPE(pHashPara->dwMsgEncodingType) !=
340 PKCS_7_ASN_ENCODING)
342 SetLastError(E_INVALIDARG);
343 return FALSE;
345 msg = CryptMsgOpenToDecode(pHashPara->dwMsgEncodingType, CMSG_DETACHED_FLAG,
346 0, pHashPara->hCryptProv, NULL, NULL);
347 if (msg)
349 DWORD i;
351 ret = CryptMsgUpdate(msg, pbDetachedHashBlob, cbDetachedHashBlob, TRUE);
352 if (ret)
354 if (cToBeHashed)
356 for (i = 0; ret && i < cToBeHashed; i++)
358 ret = CryptMsgUpdate(msg, rgpbToBeHashed[i],
359 rgcbToBeHashed[i], i == cToBeHashed - 1 ? TRUE : FALSE);
362 else
363 ret = CryptMsgUpdate(msg, NULL, 0, TRUE);
365 if (ret)
367 ret = CryptMsgControl(msg, 0, CMSG_CTRL_VERIFY_HASH, NULL);
368 if (ret && pcbComputedHash)
369 ret = CryptMsgGetParam(msg, CMSG_COMPUTED_HASH_PARAM, 0,
370 pbComputedHash, pcbComputedHash);
372 CryptMsgClose(msg);
374 return ret;
377 BOOL WINAPI CryptVerifyMessageHash(PCRYPT_HASH_MESSAGE_PARA pHashPara,
378 BYTE *pbHashedBlob, DWORD cbHashedBlob, BYTE *pbToBeHashed,
379 DWORD *pcbToBeHashed, BYTE *pbComputedHash, DWORD *pcbComputedHash)
381 HCRYPTMSG msg;
382 BOOL ret = FALSE;
384 TRACE("(%p, %p, %d, %p, %p, %p, %p)\n", pHashPara, pbHashedBlob,
385 cbHashedBlob, pbToBeHashed, pcbToBeHashed, pbComputedHash,
386 pcbComputedHash);
388 if (pHashPara->cbSize != sizeof(CRYPT_HASH_MESSAGE_PARA))
390 SetLastError(E_INVALIDARG);
391 return FALSE;
393 if (GET_CMSG_ENCODING_TYPE(pHashPara->dwMsgEncodingType) !=
394 PKCS_7_ASN_ENCODING)
396 SetLastError(E_INVALIDARG);
397 return FALSE;
399 msg = CryptMsgOpenToDecode(pHashPara->dwMsgEncodingType, 0, 0,
400 pHashPara->hCryptProv, NULL, NULL);
401 if (msg)
403 ret = CryptMsgUpdate(msg, pbHashedBlob, cbHashedBlob, TRUE);
404 if (ret)
406 ret = CryptMsgControl(msg, 0, CMSG_CTRL_VERIFY_HASH, NULL);
407 if (ret && pcbToBeHashed)
408 ret = CryptMsgGetParam(msg, CMSG_CONTENT_PARAM, 0,
409 pbToBeHashed, pcbToBeHashed);
410 if (ret && pcbComputedHash)
411 ret = CryptMsgGetParam(msg, CMSG_COMPUTED_HASH_PARAM, 0,
412 pbComputedHash, pcbComputedHash);
414 CryptMsgClose(msg);
416 return ret;