2 * Copyright 2006 Juan Lang for CodeWeavers
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
20 #define NONAMELESSUNION
27 #include "wine/debug.h"
28 #include "crypt32_private.h"
30 WINE_DEFAULT_DEBUG_CHANNEL(crypt
);
32 DWORD WINAPI
CertRDNValueToStrA(DWORD dwValueType
, PCERT_RDN_VALUE_BLOB pValue
,
37 TRACE("(%d, %p, %p, %d)\n", dwValueType
, pValue
, psz
, csz
);
41 case CERT_RDN_ANY_TYPE
:
43 case CERT_RDN_NUMERIC_STRING
:
44 case CERT_RDN_PRINTABLE_STRING
:
45 case CERT_RDN_TELETEX_STRING
:
46 case CERT_RDN_VIDEOTEX_STRING
:
47 case CERT_RDN_IA5_STRING
:
48 case CERT_RDN_GRAPHIC_STRING
:
49 case CERT_RDN_VISIBLE_STRING
:
50 case CERT_RDN_GENERAL_STRING
:
56 DWORD chars
= min(len
, csz
- 1);
60 memcpy(psz
, pValue
->pbData
, chars
);
66 case CERT_RDN_BMP_STRING
:
67 case CERT_RDN_UTF8_STRING
:
68 len
= WideCharToMultiByte(CP_ACP
, 0, (LPCWSTR
)pValue
->pbData
,
69 pValue
->cbData
/ sizeof(WCHAR
), NULL
, 0, NULL
, NULL
);
74 DWORD chars
= min(pValue
->cbData
/ sizeof(WCHAR
), csz
- 1);
78 ret
= WideCharToMultiByte(CP_ACP
, 0, (LPCWSTR
)pValue
->pbData
,
79 chars
, psz
, csz
- 1, NULL
, NULL
);
85 FIXME("string type %d unimplemented\n", dwValueType
);
95 TRACE("returning %d (%s)\n", ret
, debugstr_a(psz
));
99 DWORD WINAPI
CertRDNValueToStrW(DWORD dwValueType
, PCERT_RDN_VALUE_BLOB pValue
,
100 LPWSTR psz
, DWORD csz
)
102 DWORD ret
= 0, len
, i
, strLen
;
104 TRACE("(%d, %p, %p, %d)\n", dwValueType
, pValue
, psz
, csz
);
108 case CERT_RDN_ANY_TYPE
:
110 case CERT_RDN_NUMERIC_STRING
:
111 case CERT_RDN_PRINTABLE_STRING
:
112 case CERT_RDN_TELETEX_STRING
:
113 case CERT_RDN_VIDEOTEX_STRING
:
114 case CERT_RDN_IA5_STRING
:
115 case CERT_RDN_GRAPHIC_STRING
:
116 case CERT_RDN_VISIBLE_STRING
:
117 case CERT_RDN_GENERAL_STRING
:
118 len
= pValue
->cbData
;
125 for (i
= 0; i
< pValue
->cbData
&& ptr
- psz
< csz
; ptr
++, i
++)
126 *ptr
= pValue
->pbData
[i
];
130 case CERT_RDN_BMP_STRING
:
131 case CERT_RDN_UTF8_STRING
:
132 strLen
= len
= pValue
->cbData
/ sizeof(WCHAR
);
139 for (i
= 0; i
< strLen
&& ptr
- psz
< csz
; ptr
++, i
++)
140 *ptr
= ((LPCWSTR
)pValue
->pbData
)[i
];
145 FIXME("string type %d unimplemented\n", dwValueType
);
155 TRACE("returning %d (%s)\n", ret
, debugstr_w(psz
));
159 static inline BOOL
is_quotable_char(char c
)
178 static DWORD
quote_rdn_value_to_str_a(DWORD dwValueType
,
179 PCERT_RDN_VALUE_BLOB pValue
, LPSTR psz
, DWORD csz
)
181 DWORD ret
= 0, len
, i
;
182 BOOL needsQuotes
= FALSE
;
184 TRACE("(%d, %p, %p, %d)\n", dwValueType
, pValue
, psz
, csz
);
188 case CERT_RDN_ANY_TYPE
:
190 case CERT_RDN_NUMERIC_STRING
:
191 case CERT_RDN_PRINTABLE_STRING
:
192 case CERT_RDN_TELETEX_STRING
:
193 case CERT_RDN_VIDEOTEX_STRING
:
194 case CERT_RDN_IA5_STRING
:
195 case CERT_RDN_GRAPHIC_STRING
:
196 case CERT_RDN_VISIBLE_STRING
:
197 case CERT_RDN_GENERAL_STRING
:
198 len
= pValue
->cbData
;
199 if (pValue
->cbData
&& isspace(pValue
->pbData
[0]))
201 if (pValue
->cbData
&& isspace(pValue
->pbData
[pValue
->cbData
- 1]))
203 for (i
= 0; i
< pValue
->cbData
; i
++)
205 if (is_quotable_char(pValue
->pbData
[i
]))
207 if (pValue
->pbData
[i
] == '"')
220 for (i
= 0; i
< pValue
->cbData
&& ptr
- psz
< csz
; ptr
++, i
++)
222 *ptr
= pValue
->pbData
[i
];
223 if (pValue
->pbData
[i
] == '"' && ptr
- psz
< csz
- 1)
226 if (needsQuotes
&& ptr
- psz
< csz
)
231 case CERT_RDN_BMP_STRING
:
232 case CERT_RDN_UTF8_STRING
:
233 len
= WideCharToMultiByte(CP_ACP
, 0, (LPCWSTR
)pValue
->pbData
,
234 pValue
->cbData
/ sizeof(WCHAR
), NULL
, 0, NULL
, NULL
);
235 if (pValue
->cbData
&& iswspace(((LPCWSTR
)pValue
->pbData
)[0]))
237 if (pValue
->cbData
&&
238 iswspace(((LPCWSTR
)pValue
->pbData
)[pValue
->cbData
/ sizeof(WCHAR
)-1]))
240 for (i
= 0; i
< pValue
->cbData
/ sizeof(WCHAR
); i
++)
242 if (is_quotable_char(((LPCWSTR
)pValue
->pbData
)[i
]))
244 if (((LPCWSTR
)pValue
->pbData
)[i
] == '"')
257 for (i
= 0; i
< pValue
->cbData
/ sizeof(WCHAR
) &&
258 dst
- psz
< csz
; dst
++, i
++)
260 LPCWSTR src
= (LPCWSTR
)pValue
->pbData
+ i
;
262 WideCharToMultiByte(CP_ACP
, 0, src
, 1, dst
,
263 csz
- (dst
- psz
) - 1, NULL
, NULL
);
264 if (*src
== '"' && dst
- psz
< csz
- 1)
267 if (needsQuotes
&& dst
- psz
< csz
)
273 FIXME("string type %d unimplemented\n", dwValueType
);
283 TRACE("returning %d (%s)\n", ret
, debugstr_a(psz
));
287 static DWORD
quote_rdn_value_to_str_w(DWORD dwValueType
,
288 PCERT_RDN_VALUE_BLOB pValue
, LPWSTR psz
, DWORD csz
)
290 DWORD ret
= 0, len
, i
, strLen
;
291 BOOL needsQuotes
= FALSE
;
293 TRACE("(%d, %p, %p, %d)\n", dwValueType
, pValue
, psz
, csz
);
297 case CERT_RDN_ANY_TYPE
:
299 case CERT_RDN_NUMERIC_STRING
:
300 case CERT_RDN_PRINTABLE_STRING
:
301 case CERT_RDN_TELETEX_STRING
:
302 case CERT_RDN_VIDEOTEX_STRING
:
303 case CERT_RDN_IA5_STRING
:
304 case CERT_RDN_GRAPHIC_STRING
:
305 case CERT_RDN_VISIBLE_STRING
:
306 case CERT_RDN_GENERAL_STRING
:
307 len
= pValue
->cbData
;
308 if (pValue
->cbData
&& isspace(pValue
->pbData
[0]))
310 if (pValue
->cbData
&& isspace(pValue
->pbData
[pValue
->cbData
- 1]))
312 for (i
= 0; i
< pValue
->cbData
; i
++)
314 if (is_quotable_char(pValue
->pbData
[i
]))
316 if (pValue
->pbData
[i
] == '"')
329 for (i
= 0; i
< pValue
->cbData
&& ptr
- psz
< csz
; ptr
++, i
++)
331 *ptr
= pValue
->pbData
[i
];
332 if (pValue
->pbData
[i
] == '"' && ptr
- psz
< csz
- 1)
335 if (needsQuotes
&& ptr
- psz
< csz
)
340 case CERT_RDN_BMP_STRING
:
341 case CERT_RDN_UTF8_STRING
:
342 strLen
= len
= pValue
->cbData
/ sizeof(WCHAR
);
343 if (pValue
->cbData
&& isspace(pValue
->pbData
[0]))
345 if (pValue
->cbData
&& isspace(pValue
->pbData
[strLen
- 1]))
347 for (i
= 0; i
< strLen
; i
++)
349 if (is_quotable_char(((LPCWSTR
)pValue
->pbData
)[i
]))
351 if (((LPCWSTR
)pValue
->pbData
)[i
] == '"')
364 for (i
= 0; i
< strLen
&& ptr
- psz
< csz
; ptr
++, i
++)
366 *ptr
= ((LPCWSTR
)pValue
->pbData
)[i
];
367 if (((LPCWSTR
)pValue
->pbData
)[i
] == '"' && ptr
- psz
< csz
- 1)
370 if (needsQuotes
&& ptr
- psz
< csz
)
376 FIXME("string type %d unimplemented\n", dwValueType
);
386 TRACE("returning %d (%s)\n", ret
, debugstr_w(psz
));
390 /* Adds the prefix prefix to the string pointed to by psz, followed by the
391 * character '='. Copies no more than csz characters. Returns the number of
392 * characters copied. If psz is NULL, returns the number of characters that
395 static DWORD
CRYPT_AddPrefixA(LPCSTR prefix
, LPSTR psz
, DWORD csz
)
399 TRACE("(%s, %p, %d)\n", debugstr_a(prefix
), psz
, csz
);
403 chars
= min(strlen(prefix
), csz
);
404 memcpy(psz
, prefix
, chars
);
405 *(psz
+ chars
) = '=';
409 chars
= lstrlenA(prefix
) + 1;
413 DWORD WINAPI
CertNameToStrA(DWORD dwCertEncodingType
, PCERT_NAME_BLOB pName
,
414 DWORD dwStrType
, LPSTR psz
, DWORD csz
)
416 static const DWORD unsupportedFlags
= CERT_NAME_STR_NO_QUOTING_FLAG
|
417 CERT_NAME_STR_ENABLE_T61_UNICODE_FLAG
;
418 static const char commaSep
[] = ", ";
419 static const char semiSep
[] = "; ";
420 static const char crlfSep
[] = "\r\n";
421 static const char plusSep
[] = " + ";
422 static const char spaceSep
[] = " ";
423 DWORD ret
= 0, bytes
= 0;
425 CERT_NAME_INFO
*info
;
427 TRACE("(%d, %p, %08x, %p, %d)\n", dwCertEncodingType
, pName
, dwStrType
,
429 if (dwStrType
& unsupportedFlags
)
430 FIXME("unsupported flags: %08x\n", dwStrType
& unsupportedFlags
);
432 bRet
= CryptDecodeObjectEx(dwCertEncodingType
, X509_NAME
, pName
->pbData
,
433 pName
->cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
, &info
, &bytes
);
436 DWORD i
, j
, sepLen
, rdnSepLen
;
438 BOOL reverse
= dwStrType
& CERT_NAME_STR_REVERSE_FLAG
;
439 const CERT_RDN
*rdn
= info
->rgRDN
;
441 if(reverse
&& info
->cRDN
> 1) rdn
+= (info
->cRDN
- 1);
443 if (dwStrType
& CERT_NAME_STR_SEMICOLON_FLAG
)
445 else if (dwStrType
& CERT_NAME_STR_CRLF_FLAG
)
449 sepLen
= strlen(sep
);
450 if (dwStrType
& CERT_NAME_STR_NO_PLUS_FLAG
)
454 rdnSepLen
= strlen(rdnSep
);
455 for (i
= 0; (!psz
|| ret
< csz
) && i
< info
->cRDN
; i
++)
457 for (j
= 0; (!psz
|| ret
< csz
) && j
< rdn
->cRDNAttr
; j
++)
460 char prefixBuf
[13]; /* big enough for SERIALNUMBER */
461 LPCSTR prefix
= NULL
;
463 if ((dwStrType
& 0x000000ff) == CERT_OID_NAME_STR
)
464 prefix
= rdn
->rgRDNAttr
[j
].pszObjId
;
465 else if ((dwStrType
& 0x000000ff) == CERT_X500_NAME_STR
)
467 PCCRYPT_OID_INFO oidInfo
= CryptFindOIDInfo(
468 CRYPT_OID_INFO_OID_KEY
,
469 rdn
->rgRDNAttr
[j
].pszObjId
,
470 CRYPT_RDN_ATTR_OID_GROUP_ID
);
474 WideCharToMultiByte(CP_ACP
, 0, oidInfo
->pwszName
, -1,
475 prefixBuf
, sizeof(prefixBuf
), NULL
, NULL
);
479 prefix
= rdn
->rgRDNAttr
[j
].pszObjId
;
483 /* - 1 is needed to account for the NULL terminator. */
484 chars
= CRYPT_AddPrefixA(prefix
,
485 psz
? psz
+ ret
: NULL
, psz
? csz
- ret
- 1 : 0);
488 chars
= quote_rdn_value_to_str_a(
489 rdn
->rgRDNAttr
[j
].dwValueType
,
490 &rdn
->rgRDNAttr
[j
].Value
, psz
? psz
+ ret
: NULL
,
491 psz
? csz
- ret
: 0);
494 if (j
< rdn
->cRDNAttr
- 1)
496 if (psz
&& ret
< csz
- rdnSepLen
- 1)
497 memcpy(psz
+ ret
, rdnSep
, rdnSepLen
);
501 if (i
< info
->cRDN
- 1)
503 if (psz
&& ret
< csz
- sepLen
- 1)
504 memcpy(psz
+ ret
, sep
, sepLen
);
519 TRACE("Returning %s\n", debugstr_a(psz
));
523 /* Adds the prefix prefix to the wide-character string pointed to by psz,
524 * followed by the character '='. Copies no more than csz characters. Returns
525 * the number of characters copied. If psz is NULL, returns the number of
526 * characters that would be copied.
527 * Assumes the characters in prefix are ASCII (not multibyte characters.)
529 static DWORD
CRYPT_AddPrefixAToW(LPCSTR prefix
, LPWSTR psz
, DWORD csz
)
533 TRACE("(%s, %p, %d)\n", debugstr_a(prefix
), psz
, csz
);
539 chars
= min(strlen(prefix
), csz
);
540 for (i
= 0; i
< chars
; i
++)
541 *(psz
+ i
) = prefix
[i
];
542 *(psz
+ chars
) = '=';
546 chars
= lstrlenA(prefix
) + 1;
550 /* Adds the prefix prefix to the string pointed to by psz, followed by the
551 * character '='. Copies no more than csz characters. Returns the number of
552 * characters copied. If psz is NULL, returns the number of characters that
555 static DWORD
CRYPT_AddPrefixW(LPCWSTR prefix
, LPWSTR psz
, DWORD csz
)
559 TRACE("(%s, %p, %d)\n", debugstr_w(prefix
), psz
, csz
);
563 chars
= min(lstrlenW(prefix
), csz
);
564 memcpy(psz
, prefix
, chars
* sizeof(WCHAR
));
565 *(psz
+ chars
) = '=';
569 chars
= lstrlenW(prefix
) + 1;
573 static const WCHAR indent
[] = L
" ";
575 DWORD
cert_name_to_str_with_indent(DWORD dwCertEncodingType
, DWORD indentLevel
,
576 const CERT_NAME_BLOB
*pName
, DWORD dwStrType
, LPWSTR psz
, DWORD csz
)
578 static const DWORD unsupportedFlags
= CERT_NAME_STR_NO_QUOTING_FLAG
|
579 CERT_NAME_STR_ENABLE_T61_UNICODE_FLAG
;
580 DWORD ret
= 0, bytes
= 0;
582 CERT_NAME_INFO
*info
;
584 if (dwStrType
& unsupportedFlags
)
585 FIXME("unsupported flags: %08x\n", dwStrType
& unsupportedFlags
);
587 bRet
= CryptDecodeObjectEx(dwCertEncodingType
, X509_NAME
, pName
->pbData
,
588 pName
->cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
, &info
, &bytes
);
591 DWORD i
, j
, sepLen
, rdnSepLen
;
593 BOOL reverse
= dwStrType
& CERT_NAME_STR_REVERSE_FLAG
;
594 const CERT_RDN
*rdn
= info
->rgRDN
;
596 if(reverse
&& info
->cRDN
> 1) rdn
+= (info
->cRDN
- 1);
598 if (dwStrType
& CERT_NAME_STR_SEMICOLON_FLAG
)
600 else if (dwStrType
& CERT_NAME_STR_CRLF_FLAG
)
604 sepLen
= lstrlenW(sep
);
605 if (dwStrType
& CERT_NAME_STR_NO_PLUS_FLAG
)
609 rdnSepLen
= lstrlenW(rdnSep
);
610 for (i
= 0; (!psz
|| ret
< csz
) && i
< info
->cRDN
; i
++)
612 for (j
= 0; (!psz
|| ret
< csz
) && j
< rdn
->cRDNAttr
; j
++)
615 LPCSTR prefixA
= NULL
;
616 LPCWSTR prefixW
= NULL
;
618 if ((dwStrType
& 0x000000ff) == CERT_OID_NAME_STR
)
619 prefixA
= rdn
->rgRDNAttr
[j
].pszObjId
;
620 else if ((dwStrType
& 0x000000ff) == CERT_X500_NAME_STR
)
622 PCCRYPT_OID_INFO oidInfo
= CryptFindOIDInfo(
623 CRYPT_OID_INFO_OID_KEY
,
624 rdn
->rgRDNAttr
[j
].pszObjId
,
625 CRYPT_RDN_ATTR_OID_GROUP_ID
);
628 prefixW
= oidInfo
->pwszName
;
630 prefixA
= rdn
->rgRDNAttr
[j
].pszObjId
;
632 if (dwStrType
& CERT_NAME_STR_CRLF_FLAG
)
636 for (k
= 0; k
< indentLevel
; k
++)
640 chars
= min(lstrlenW(indent
), csz
- ret
- 1);
641 memcpy(psz
+ ret
, indent
, chars
* sizeof(WCHAR
));
644 chars
= lstrlenW(indent
);
650 /* - 1 is needed to account for the NULL terminator. */
651 chars
= CRYPT_AddPrefixW(prefixW
,
652 psz
? psz
+ ret
: NULL
, psz
? csz
- ret
- 1 : 0);
657 /* - 1 is needed to account for the NULL terminator. */
658 chars
= CRYPT_AddPrefixAToW(prefixA
,
659 psz
? psz
+ ret
: NULL
, psz
? csz
- ret
- 1 : 0);
662 chars
= quote_rdn_value_to_str_w(
663 rdn
->rgRDNAttr
[j
].dwValueType
,
664 &rdn
->rgRDNAttr
[j
].Value
, psz
? psz
+ ret
: NULL
,
665 psz
? csz
- ret
: 0);
668 if (j
< rdn
->cRDNAttr
- 1)
670 if (psz
&& ret
< csz
- rdnSepLen
- 1)
671 memcpy(psz
+ ret
, rdnSep
, rdnSepLen
* sizeof(WCHAR
));
675 if (i
< info
->cRDN
- 1)
677 if (psz
&& ret
< csz
- sepLen
- 1)
678 memcpy(psz
+ ret
, sep
, sepLen
* sizeof(WCHAR
));
696 DWORD WINAPI
CertNameToStrW(DWORD dwCertEncodingType
, PCERT_NAME_BLOB pName
,
697 DWORD dwStrType
, LPWSTR psz
, DWORD csz
)
701 TRACE("(%d, %p, %08x, %p, %d)\n", dwCertEncodingType
, pName
, dwStrType
,
704 ret
= cert_name_to_str_with_indent(dwCertEncodingType
, 0, pName
, dwStrType
,
706 TRACE("Returning %s\n", debugstr_w(psz
));
710 BOOL WINAPI
CertStrToNameA(DWORD dwCertEncodingType
, LPCSTR pszX500
,
711 DWORD dwStrType
, void *pvReserved
, BYTE
*pbEncoded
, DWORD
*pcbEncoded
,
717 TRACE("(%08x, %s, %08x, %p, %p, %p, %p)\n", dwCertEncodingType
,
718 debugstr_a(pszX500
), dwStrType
, pvReserved
, pbEncoded
, pcbEncoded
,
721 len
= MultiByteToWideChar(CP_ACP
, 0, pszX500
, -1, NULL
, 0);
724 LPWSTR x500
, errorStr
;
726 if ((x500
= CryptMemAlloc(len
* sizeof(WCHAR
))))
728 MultiByteToWideChar(CP_ACP
, 0, pszX500
, -1, x500
, len
);
729 ret
= CertStrToNameW(dwCertEncodingType
, x500
, dwStrType
,
730 pvReserved
, pbEncoded
, pcbEncoded
,
731 ppszError
? (LPCWSTR
*)&errorStr
: NULL
);
738 *ppszError
= pszX500
;
739 for (i
= 0; i
< errorStr
- x500
; i
++)
740 *ppszError
= CharNextA(*ppszError
);
749 SetLastError(ERROR_OUTOFMEMORY
);
755 SetLastError(CRYPT_E_INVALID_X500_STRING
);
757 *ppszError
= pszX500
;
765 WCHAR buf
[10]; /* big enough for L"GivenName" */
766 LPWSTR keyName
; /* usually = buf, but may be allocated */
767 DWORD keyLen
; /* full available buffer size in WCHARs */
770 static void CRYPT_InitializeKeynameKeeper(struct KeynameKeeper
*keeper
)
772 keeper
->keyName
= keeper
->buf
;
773 keeper
->keyLen
= ARRAY_SIZE(keeper
->buf
);
776 static void CRYPT_FreeKeynameKeeper(struct KeynameKeeper
*keeper
)
778 if (keeper
->keyName
!= keeper
->buf
)
779 CryptMemFree(keeper
->keyName
);
788 static void CRYPT_KeynameKeeperFromTokenW(struct KeynameKeeper
*keeper
,
789 const struct X500TokenW
*key
)
791 DWORD len
= key
->end
- key
->start
;
793 if (len
>= keeper
->keyLen
)
795 CRYPT_FreeKeynameKeeper( keeper
);
796 keeper
->keyLen
= len
+ 1;
797 keeper
->keyName
= CryptMemAlloc(keeper
->keyLen
* sizeof(WCHAR
));
799 memcpy(keeper
->keyName
, key
->start
, len
* sizeof(WCHAR
));
800 keeper
->keyName
[len
] = '\0';
801 TRACE("Keyname is %s\n", debugstr_w(keeper
->keyName
));
804 static BOOL
CRYPT_GetNextKeyW(LPCWSTR str
, struct X500TokenW
*token
,
809 while (*str
&& iswspace(*str
))
814 while (*str
&& *str
!= '=' && !iswspace(*str
))
816 if (*str
&& (*str
== '=' || iswspace(*str
)))
820 TRACE("missing equals char at %s\n", debugstr_w(token
->start
));
822 *ppszError
= token
->start
;
823 SetLastError(CRYPT_E_INVALID_X500_STRING
);
832 /* Assumes separators are characters in the 0-255 range */
833 static BOOL
CRYPT_GetNextValueW(LPCWSTR str
, DWORD dwFlags
, LPCWSTR separators
,
834 WCHAR
*separator_used
, struct X500TokenW
*token
, LPCWSTR
*ppszError
)
838 TRACE("(%s, %s, %p, %p)\n", debugstr_w(str
), debugstr_w(separators
), token
,
842 while (*str
&& iswspace(*str
))
847 if (!(dwFlags
& CERT_NAME_STR_NO_QUOTING_FLAG
) && *str
== '"')
851 while (!token
->end
&& ret
)
853 while (*str
&& *str
!= '"')
857 if (*(str
+ 1) != '"')
858 token
->end
= str
+ 1;
864 TRACE("unterminated quote at %s\n", debugstr_w(str
));
867 SetLastError(CRYPT_E_INVALID_X500_STRING
);
874 WCHAR map
[256] = { 0 };
877 map
[*separators
++] = 1;
878 while (*str
&& (*str
>= 0xff || !map
[*str
]))
881 if (map
[*str
]) *separator_used
= *str
;
886 TRACE("missing value at %s\n", debugstr_w(str
));
889 SetLastError(CRYPT_E_INVALID_X500_STRING
);
895 /* Encodes the string represented by value as the string type type into the
896 * CERT_NAME_BLOB output. If there is an error and ppszError is not NULL,
897 * *ppszError is set to the first failing character. If there is no error,
898 * output's pbData must be freed with LocalFree.
900 static BOOL
CRYPT_EncodeValueWithType(DWORD dwCertEncodingType
,
901 const struct X500TokenW
*value
, PCERT_NAME_BLOB output
, DWORD type
,
904 CERT_NAME_VALUE nameValue
= { type
, { 0, NULL
} };
907 if (value
->end
> value
->start
)
912 nameValue
.Value
.pbData
= CryptMemAlloc((value
->end
- value
->start
+ 1) *
914 if (!nameValue
.Value
.pbData
)
916 SetLastError(ERROR_OUTOFMEMORY
);
919 ptr
= (LPWSTR
)nameValue
.Value
.pbData
;
920 for (i
= 0; i
< value
->end
- value
->start
; i
++)
922 *ptr
++ = value
->start
[i
];
923 if (value
->start
[i
] == '"')
926 /* The string is NULL terminated because of a quirk in encoding
927 * unicode names values: if the length is given as 0, the value is
928 * assumed to be a NULL-terminated string.
931 nameValue
.Value
.cbData
= (LPBYTE
)ptr
- nameValue
.Value
.pbData
;
933 ret
= CryptEncodeObjectEx(dwCertEncodingType
, X509_UNICODE_NAME_VALUE
,
934 &nameValue
, CRYPT_ENCODE_ALLOC_FLAG
, NULL
, &output
->pbData
,
936 if (!ret
&& ppszError
)
938 if (type
== CERT_RDN_NUMERIC_STRING
&&
939 GetLastError() == CRYPT_E_INVALID_NUMERIC_STRING
)
940 *ppszError
= value
->start
+ output
->cbData
;
941 else if (type
== CERT_RDN_PRINTABLE_STRING
&&
942 GetLastError() == CRYPT_E_INVALID_PRINTABLE_STRING
)
943 *ppszError
= value
->start
+ output
->cbData
;
944 else if (type
== CERT_RDN_IA5_STRING
&&
945 GetLastError() == CRYPT_E_INVALID_IA5_STRING
)
946 *ppszError
= value
->start
+ output
->cbData
;
948 CryptMemFree(nameValue
.Value
.pbData
);
952 static BOOL
CRYPT_EncodeValue(DWORD dwCertEncodingType
,
953 const struct X500TokenW
*value
, PCERT_NAME_BLOB output
, const DWORD
*types
,
960 for (i
= 0; !ret
&& types
[i
]; i
++)
961 ret
= CRYPT_EncodeValueWithType(dwCertEncodingType
, value
, output
,
962 types
[i
], ppszError
);
966 static BOOL
CRYPT_ValueToRDN(DWORD dwCertEncodingType
, PCERT_NAME_INFO info
,
967 PCCRYPT_OID_INFO keyOID
, struct X500TokenW
*value
, DWORD dwStrType
, LPCWSTR
*ppszError
)
971 TRACE("OID %s, value %s\n", debugstr_a(keyOID
->pszOID
),
972 debugstr_wn(value
->start
, value
->end
- value
->start
));
975 info
->rgRDN
= CryptMemAlloc(sizeof(CERT_RDN
));
977 info
->rgRDN
= CryptMemRealloc(info
->rgRDN
,
978 (info
->cRDN
+ 1) * sizeof(CERT_RDN
));
981 /* FIXME: support multiple RDN attrs */
982 info
->rgRDN
[info
->cRDN
].rgRDNAttr
=
983 CryptMemAlloc(sizeof(CERT_RDN_ATTR
));
984 if (info
->rgRDN
[info
->cRDN
].rgRDNAttr
)
986 static const DWORD defaultTypes
[] = { CERT_RDN_PRINTABLE_STRING
,
987 CERT_RDN_BMP_STRING
, 0 };
990 info
->rgRDN
[info
->cRDN
].cRDNAttr
= 1;
991 info
->rgRDN
[info
->cRDN
].rgRDNAttr
[0].pszObjId
=
992 (LPSTR
)keyOID
->pszOID
;
993 info
->rgRDN
[info
->cRDN
].rgRDNAttr
[0].dwValueType
=
994 CERT_RDN_ENCODED_BLOB
;
995 if (keyOID
->ExtraInfo
.cbData
)
996 types
= (const DWORD
*)keyOID
->ExtraInfo
.pbData
;
998 types
= defaultTypes
;
1000 /* Remove surrounding quotes */
1001 if (value
->start
[0] == '"' && !(dwStrType
& CERT_NAME_STR_NO_QUOTING_FLAG
))
1006 ret
= CRYPT_EncodeValue(dwCertEncodingType
, value
,
1007 &info
->rgRDN
[info
->cRDN
].rgRDNAttr
[0].Value
, types
, ppszError
);
1010 SetLastError(ERROR_OUTOFMEMORY
);
1014 SetLastError(ERROR_OUTOFMEMORY
);
1018 BOOL WINAPI
CertStrToNameW(DWORD dwCertEncodingType
, LPCWSTR pszX500
,
1019 DWORD dwStrType
, void *pvReserved
, BYTE
*pbEncoded
, DWORD
*pcbEncoded
,
1022 CERT_NAME_INFO info
= { 0, NULL
};
1024 struct KeynameKeeper keeper
;
1028 TRACE("(%08x, %s, %08x, %p, %p, %p, %p)\n", dwCertEncodingType
,
1029 debugstr_w(pszX500
), dwStrType
, pvReserved
, pbEncoded
, pcbEncoded
,
1032 CRYPT_InitializeKeynameKeeper(&keeper
);
1034 while (str
&& *str
&& ret
)
1036 struct X500TokenW token
;
1038 ret
= CRYPT_GetNextKeyW(str
, &token
, ppszError
);
1039 if (ret
&& token
.start
)
1041 PCCRYPT_OID_INFO keyOID
;
1043 CRYPT_KeynameKeeperFromTokenW(&keeper
, &token
);
1044 keyOID
= CryptFindOIDInfo(CRYPT_OID_INFO_NAME_KEY
, keeper
.keyName
,
1045 CRYPT_RDN_ATTR_OID_GROUP_ID
);
1049 *ppszError
= token
.start
;
1050 SetLastError(CRYPT_E_INVALID_X500_STRING
);
1056 while (iswspace(*str
))
1062 SetLastError(CRYPT_E_INVALID_X500_STRING
);
1071 if (dwStrType
& CERT_NAME_STR_COMMA_FLAG
)
1073 else if (dwStrType
& CERT_NAME_STR_SEMICOLON_FLAG
)
1075 else if (dwStrType
& CERT_NAME_STR_CRLF_FLAG
)
1077 else if (dwStrType
& CERT_NAME_STR_NO_PLUS_FLAG
)
1081 ret
= CRYPT_GetNextValueW(str
, dwStrType
, sep
, &sep_used
, &token
,
1086 /* if token.end points to the separator, skip it */
1087 if (str
&& sep_used
&& *str
== sep_used
) str
++;
1089 ret
= CRYPT_ValueToRDN(dwCertEncodingType
, &info
,
1090 keyOID
, &token
, dwStrType
, ppszError
);
1096 CRYPT_FreeKeynameKeeper(&keeper
);
1101 ret
= CryptEncodeObjectEx(dwCertEncodingType
, X509_NAME
, &info
,
1102 0, NULL
, pbEncoded
, pcbEncoded
);
1104 for (i
= 0; i
< info
.cRDN
; i
++)
1108 for (j
= 0; j
< info
.rgRDN
[i
].cRDNAttr
; j
++)
1109 LocalFree(info
.rgRDN
[i
].rgRDNAttr
[j
].Value
.pbData
);
1110 CryptMemFree(info
.rgRDN
[i
].rgRDNAttr
);
1112 CryptMemFree(info
.rgRDN
);
1116 DWORD WINAPI
CertGetNameStringA(PCCERT_CONTEXT pCertContext
, DWORD dwType
,
1117 DWORD dwFlags
, void *pvTypePara
, LPSTR pszNameString
, DWORD cchNameString
)
1121 TRACE("(%p, %d, %08x, %p, %p, %d)\n", pCertContext
, dwType
, dwFlags
,
1122 pvTypePara
, pszNameString
, cchNameString
);
1129 nameLen
= CertGetNameStringW(pCertContext
, dwType
, dwFlags
, pvTypePara
,
1131 wideName
= CryptMemAlloc(nameLen
* sizeof(WCHAR
));
1134 CertGetNameStringW(pCertContext
, dwType
, dwFlags
, pvTypePara
,
1136 nameLen
= WideCharToMultiByte(CP_ACP
, 0, wideName
, nameLen
,
1137 pszNameString
, cchNameString
, NULL
, NULL
);
1138 if (nameLen
<= cchNameString
)
1142 pszNameString
[cchNameString
- 1] = '\0';
1143 ret
= cchNameString
;
1145 CryptMemFree(wideName
);
1149 *pszNameString
= '\0';
1154 ret
= CertGetNameStringW(pCertContext
, dwType
, dwFlags
, pvTypePara
,
1159 /* Searches cert's extensions for the alternate name extension with OID
1160 * altNameOID, and if found, searches it for the alternate name type entryType.
1161 * If found, returns a pointer to the entry, otherwise returns NULL.
1162 * Regardless of whether an entry of the desired type is found, if the
1163 * alternate name extension is present, sets *info to the decoded alternate
1164 * name extension, which you must free using LocalFree.
1165 * The return value is a pointer within *info, so don't free *info before
1166 * you're done with the return value.
1168 static PCERT_ALT_NAME_ENTRY
cert_find_alt_name_entry(PCCERT_CONTEXT cert
,
1169 LPCSTR altNameOID
, DWORD entryType
, PCERT_ALT_NAME_INFO
*info
)
1171 PCERT_ALT_NAME_ENTRY entry
= NULL
;
1172 PCERT_EXTENSION ext
= CertFindExtension(altNameOID
,
1173 cert
->pCertInfo
->cExtension
, cert
->pCertInfo
->rgExtension
);
1179 if (CryptDecodeObjectEx(cert
->dwCertEncodingType
, X509_ALTERNATE_NAME
,
1180 ext
->Value
.pbData
, ext
->Value
.cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
,
1185 for (i
= 0; !entry
&& i
< (*info
)->cAltEntry
; i
++)
1186 if ((*info
)->rgAltEntry
[i
].dwAltNameChoice
== entryType
)
1187 entry
= &(*info
)->rgAltEntry
[i
];
1195 static DWORD
cert_get_name_from_rdn_attr(DWORD encodingType
,
1196 const CERT_NAME_BLOB
*name
, LPCSTR oid
, LPWSTR pszNameString
, DWORD cchNameString
)
1198 CERT_NAME_INFO
*nameInfo
;
1199 DWORD bytes
= 0, ret
= 0;
1201 if (CryptDecodeObjectEx(encodingType
, X509_NAME
, name
->pbData
,
1202 name
->cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
, &nameInfo
, &bytes
))
1204 PCERT_RDN_ATTR nameAttr
;
1207 oid
= szOID_RSA_emailAddr
;
1208 nameAttr
= CertFindRDNAttr(oid
, nameInfo
);
1210 ret
= CertRDNValueToStrW(nameAttr
->dwValueType
, &nameAttr
->Value
,
1211 pszNameString
, cchNameString
);
1212 LocalFree(nameInfo
);
1217 DWORD WINAPI
CertGetNameStringW(PCCERT_CONTEXT pCertContext
, DWORD dwType
,
1218 DWORD dwFlags
, void *pvTypePara
, LPWSTR pszNameString
, DWORD cchNameString
)
1221 PCERT_NAME_BLOB name
;
1224 TRACE("(%p, %d, %08x, %p, %p, %d)\n", pCertContext
, dwType
,
1225 dwFlags
, pvTypePara
, pszNameString
, cchNameString
);
1230 if (dwFlags
& CERT_NAME_ISSUER_FLAG
)
1232 name
= &pCertContext
->pCertInfo
->Issuer
;
1233 altNameOID
= szOID_ISSUER_ALT_NAME
;
1237 name
= &pCertContext
->pCertInfo
->Subject
;
1238 altNameOID
= szOID_SUBJECT_ALT_NAME
;
1243 case CERT_NAME_EMAIL_TYPE
:
1245 CERT_ALT_NAME_INFO
*info
;
1246 PCERT_ALT_NAME_ENTRY entry
= cert_find_alt_name_entry(pCertContext
,
1247 altNameOID
, CERT_ALT_NAME_RFC822_NAME
, &info
);
1252 ret
= lstrlenW(entry
->u
.pwszRfc822Name
) + 1;
1253 else if (cchNameString
)
1255 ret
= min(lstrlenW(entry
->u
.pwszRfc822Name
), cchNameString
- 1);
1256 memcpy(pszNameString
, entry
->u
.pwszRfc822Name
,
1257 ret
* sizeof(WCHAR
));
1258 pszNameString
[ret
++] = 0;
1264 ret
= cert_get_name_from_rdn_attr(pCertContext
->dwCertEncodingType
,
1265 name
, szOID_RSA_emailAddr
, pszNameString
, cchNameString
);
1268 case CERT_NAME_RDN_TYPE
:
1270 DWORD type
= pvTypePara
? *(DWORD
*)pvTypePara
: 0;
1273 ret
= CertNameToStrW(pCertContext
->dwCertEncodingType
, name
,
1274 type
, pszNameString
, cchNameString
);
1277 CERT_ALT_NAME_INFO
*info
;
1278 PCERT_ALT_NAME_ENTRY entry
= cert_find_alt_name_entry(pCertContext
,
1279 altNameOID
, CERT_ALT_NAME_DIRECTORY_NAME
, &info
);
1282 ret
= CertNameToStrW(pCertContext
->dwCertEncodingType
,
1283 &entry
->u
.DirectoryName
, type
, pszNameString
, cchNameString
);
1289 case CERT_NAME_ATTR_TYPE
:
1290 ret
= cert_get_name_from_rdn_attr(pCertContext
->dwCertEncodingType
,
1291 name
, pvTypePara
, pszNameString
, cchNameString
);
1294 CERT_ALT_NAME_INFO
*altInfo
;
1295 PCERT_ALT_NAME_ENTRY entry
= cert_find_alt_name_entry(pCertContext
,
1296 altNameOID
, CERT_ALT_NAME_DIRECTORY_NAME
, &altInfo
);
1299 ret
= cert_name_to_str_with_indent(X509_ASN_ENCODING
, 0,
1300 &entry
->u
.DirectoryName
, 0, pszNameString
, cchNameString
);
1305 case CERT_NAME_SIMPLE_DISPLAY_TYPE
:
1307 static const LPCSTR simpleAttributeOIDs
[] = { szOID_COMMON_NAME
,
1308 szOID_ORGANIZATIONAL_UNIT_NAME
, szOID_ORGANIZATION_NAME
,
1309 szOID_RSA_emailAddr
};
1310 CERT_NAME_INFO
*nameInfo
= NULL
;
1313 if (CryptDecodeObjectEx(pCertContext
->dwCertEncodingType
, X509_NAME
,
1314 name
->pbData
, name
->cbData
, CRYPT_DECODE_ALLOC_FLAG
, NULL
, &nameInfo
,
1317 PCERT_RDN_ATTR nameAttr
= NULL
;
1319 for (i
= 0; !nameAttr
&& i
< ARRAY_SIZE(simpleAttributeOIDs
); i
++)
1320 nameAttr
= CertFindRDNAttr(simpleAttributeOIDs
[i
], nameInfo
);
1322 ret
= CertRDNValueToStrW(nameAttr
->dwValueType
,
1323 &nameAttr
->Value
, pszNameString
, cchNameString
);
1324 LocalFree(nameInfo
);
1328 CERT_ALT_NAME_INFO
*altInfo
;
1329 PCERT_ALT_NAME_ENTRY entry
= cert_find_alt_name_entry(pCertContext
,
1330 altNameOID
, CERT_ALT_NAME_RFC822_NAME
, &altInfo
);
1334 if (!entry
&& altInfo
->cAltEntry
)
1335 entry
= &altInfo
->rgAltEntry
[0];
1339 ret
= lstrlenW(entry
->u
.pwszRfc822Name
) + 1;
1340 else if (cchNameString
)
1342 ret
= min(lstrlenW(entry
->u
.pwszRfc822Name
),
1344 memcpy(pszNameString
, entry
->u
.pwszRfc822Name
,
1345 ret
* sizeof(WCHAR
));
1346 pszNameString
[ret
++] = 0;
1354 case CERT_NAME_FRIENDLY_DISPLAY_TYPE
:
1356 DWORD cch
= cchNameString
;
1358 if (CertGetCertificateContextProperty(pCertContext
,
1359 CERT_FRIENDLY_NAME_PROP_ID
, pszNameString
, &cch
))
1362 ret
= CertGetNameStringW(pCertContext
,
1363 CERT_NAME_SIMPLE_DISPLAY_TYPE
, dwFlags
, pvTypePara
, pszNameString
,
1367 case CERT_NAME_DNS_TYPE
:
1369 CERT_ALT_NAME_INFO
*info
;
1370 PCERT_ALT_NAME_ENTRY entry
= cert_find_alt_name_entry(pCertContext
,
1371 altNameOID
, CERT_ALT_NAME_DNS_NAME
, &info
);
1376 ret
= lstrlenW(entry
->u
.pwszDNSName
) + 1;
1377 else if (cchNameString
)
1379 ret
= min(lstrlenW(entry
->u
.pwszDNSName
), cchNameString
- 1);
1380 memcpy(pszNameString
, entry
->u
.pwszDNSName
, ret
* sizeof(WCHAR
));
1381 pszNameString
[ret
++] = 0;
1387 ret
= cert_get_name_from_rdn_attr(pCertContext
->dwCertEncodingType
,
1388 name
, szOID_COMMON_NAME
, pszNameString
, cchNameString
);
1391 case CERT_NAME_URL_TYPE
:
1393 CERT_ALT_NAME_INFO
*info
;
1394 PCERT_ALT_NAME_ENTRY entry
= cert_find_alt_name_entry(pCertContext
,
1395 altNameOID
, CERT_ALT_NAME_URL
, &info
);
1400 ret
= lstrlenW(entry
->u
.pwszURL
) + 1;
1401 else if (cchNameString
)
1403 ret
= min(lstrlenW(entry
->u
.pwszURL
), cchNameString
- 1);
1404 memcpy(pszNameString
, entry
->u
.pwszURL
, ret
* sizeof(WCHAR
));
1405 pszNameString
[ret
++] = 0;
1413 FIXME("unimplemented for type %d\n", dwType
);
1421 else if (cchNameString
)
1423 pszNameString
[0] = 0;