2 * Register related wintrust functions
4 * Copyright 2006 Paul Vriens
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
35 #include "wintrust_priv.h"
36 #include "wine/debug.h"
38 WINE_DEFAULT_DEBUG_CHANNEL(wintrust);
40 static CRYPT_TRUST_REG_ENTRY SoftpubInitialization;
41 static CRYPT_TRUST_REG_ENTRY SoftpubMessage;
42 static CRYPT_TRUST_REG_ENTRY SoftpubSignature;
43 static CRYPT_TRUST_REG_ENTRY SoftpubCertficate;
44 static CRYPT_TRUST_REG_ENTRY SoftpubCertCheck;
45 static CRYPT_TRUST_REG_ENTRY SoftpubFinalPolicy;
46 static CRYPT_TRUST_REG_ENTRY SoftpubCleanup;
48 static CRYPT_TRUST_REG_ENTRY SoftpubDefCertInit;
50 static CRYPT_TRUST_REG_ENTRY SoftpubDumpStructure;
52 static CRYPT_TRUST_REG_ENTRY HTTPSCertificateTrust;
53 static CRYPT_TRUST_REG_ENTRY HTTPSFinalProv;
55 static CRYPT_TRUST_REG_ENTRY OfficeInitializePolicy;
56 static CRYPT_TRUST_REG_ENTRY OfficeCleanupPolicy;
58 static CRYPT_TRUST_REG_ENTRY DriverInitializePolicy;
59 static CRYPT_TRUST_REG_ENTRY DriverFinalPolicy;
60 static CRYPT_TRUST_REG_ENTRY DriverCleanupPolicy;
62 static CRYPT_TRUST_REG_ENTRY GenericChainCertificateTrust;
63 static CRYPT_TRUST_REG_ENTRY GenericChainFinalProv;
65 static const WCHAR Trust[] = {'S','o','f','t','w','a','r','e','\\',
66 'M','i','c','r','o','s','o','f','t','\\',
67 'C','r','y','p','t','o','g','r','a','p','h','y','\\',
68 'P','r','o','v','i','d','e','r','s','\\',
69 'T','r','u','s','t','\\', 0 };
71 static const WCHAR Initialization[] = {'I','n','i','t','i','a','l','i','z','a','t','i','o','n','\\', 0};
72 static const WCHAR Message[] = {'M','e','s','s','a','g','e','\\', 0};
73 static const WCHAR Signature[] = {'S','i','g','n','a','t','u','r','e','\\', 0};
74 static const WCHAR Certificate[] = {'C','e','r','t','i','f','i','c','a','t','e','\\', 0};
75 static const WCHAR CertCheck[] = {'C','e','r','t','C','h','e','c','k','\\', 0};
76 static const WCHAR FinalPolicy[] = {'F','i','n','a','l','P','o','l','i','c','y','\\', 0};
77 static const WCHAR DiagnosticPolicy[] = {'D','i','a','g','n','o','s','t','i','c','P','o','l','i','c','y','\\', 0};
78 static const WCHAR Cleanup[] = {'C','l','e','a','n','u','p','\\', 0};
80 static const WCHAR DefaultId[] = {'D','e','f','a','u','l','t','I','d', 0};
81 static const WCHAR Dll[] = {'$','D','L','L', 0};
83 /***********************************************************************
84 * WINTRUST_InitRegStructs
86 * Helper function to allocate and initialize the members of the
87 * CRYPT_TRUST_REG_ENTRY structs.
89 static void WINTRUST_InitRegStructs(void)
91 #define WINTRUST_INITREGENTRY( action, dllname, functionname ) \
92 action.cbStruct = sizeof(CRYPT_TRUST_REG_ENTRY); \
93 action.pwszDLLName = WINTRUST_Alloc(sizeof(dllname)); \
94 lstrcpyW(action.pwszDLLName, dllname); \
95 action.pwszFunctionName = WINTRUST_Alloc(sizeof(functionname)); \
96 lstrcpyW(action.pwszFunctionName, functionname);
98 WINTRUST_INITREGENTRY(SoftpubInitialization, SP_POLICY_PROVIDER_DLL_NAME, SP_INIT_FUNCTION)
99 WINTRUST_INITREGENTRY(SoftpubMessage, SP_POLICY_PROVIDER_DLL_NAME, SP_OBJTRUST_FUNCTION)
100 WINTRUST_INITREGENTRY(SoftpubSignature, SP_POLICY_PROVIDER_DLL_NAME, SP_SIGTRUST_FUNCTION)
101 WINTRUST_INITREGENTRY(SoftpubCertficate, SP_POLICY_PROVIDER_DLL_NAME, WT_PROVIDER_CERTTRUST_FUNCTION)
102 WINTRUST_INITREGENTRY(SoftpubCertCheck, SP_POLICY_PROVIDER_DLL_NAME, SP_CHKCERT_FUNCTION)
103 WINTRUST_INITREGENTRY(SoftpubFinalPolicy, SP_POLICY_PROVIDER_DLL_NAME, SP_FINALPOLICY_FUNCTION)
104 WINTRUST_INITREGENTRY(SoftpubCleanup, SP_POLICY_PROVIDER_DLL_NAME, SP_CLEANUPPOLICY_FUNCTION)
105 WINTRUST_INITREGENTRY(SoftpubDefCertInit, SP_POLICY_PROVIDER_DLL_NAME, SP_GENERIC_CERT_INIT_FUNCTION)
106 WINTRUST_INITREGENTRY(SoftpubDumpStructure, SP_POLICY_PROVIDER_DLL_NAME, SP_TESTDUMPPOLICY_FUNCTION_TEST)
107 WINTRUST_INITREGENTRY(HTTPSCertificateTrust, SP_POLICY_PROVIDER_DLL_NAME, HTTPS_CERTTRUST_FUNCTION)
108 WINTRUST_INITREGENTRY(HTTPSFinalProv, SP_POLICY_PROVIDER_DLL_NAME, HTTPS_FINALPOLICY_FUNCTION)
109 WINTRUST_INITREGENTRY(OfficeInitializePolicy, OFFICE_POLICY_PROVIDER_DLL_NAME, OFFICE_INITPROV_FUNCTION)
110 WINTRUST_INITREGENTRY(OfficeCleanupPolicy, OFFICE_POLICY_PROVIDER_DLL_NAME, OFFICE_CLEANUPPOLICY_FUNCTION)
111 WINTRUST_INITREGENTRY(DriverInitializePolicy, SP_POLICY_PROVIDER_DLL_NAME, DRIVER_INITPROV_FUNCTION)
112 WINTRUST_INITREGENTRY(DriverFinalPolicy, SP_POLICY_PROVIDER_DLL_NAME, DRIVER_FINALPOLPROV_FUNCTION)
113 WINTRUST_INITREGENTRY(DriverCleanupPolicy, SP_POLICY_PROVIDER_DLL_NAME, DRIVER_CLEANUPPOLICY_FUNCTION)
114 WINTRUST_INITREGENTRY(GenericChainCertificateTrust, SP_POLICY_PROVIDER_DLL_NAME, GENERIC_CHAIN_CERTTRUST_FUNCTION)
115 WINTRUST_INITREGENTRY(GenericChainFinalProv, SP_POLICY_PROVIDER_DLL_NAME, GENERIC_CHAIN_FINALPOLICY_FUNCTION)
117 #undef WINTRUST_INITREGENTRY
120 /***********************************************************************
121 * WINTRUST_FreeRegStructs
123 * Helper function to free 2 members of the CRYPT_TRUST_REG_ENTRY
126 static void WINTRUST_FreeRegStructs(void)
128 #define WINTRUST_FREEREGENTRY( action ) \
129 WINTRUST_Free(action.pwszDLLName); \
130 WINTRUST_Free(action.pwszFunctionName);
132 WINTRUST_FREEREGENTRY(SoftpubInitialization);
133 WINTRUST_FREEREGENTRY(SoftpubMessage);
134 WINTRUST_FREEREGENTRY(SoftpubSignature);
135 WINTRUST_FREEREGENTRY(SoftpubCertficate);
136 WINTRUST_FREEREGENTRY(SoftpubCertCheck);
137 WINTRUST_FREEREGENTRY(SoftpubFinalPolicy);
138 WINTRUST_FREEREGENTRY(SoftpubCleanup);
139 WINTRUST_FREEREGENTRY(SoftpubDefCertInit);
140 WINTRUST_FREEREGENTRY(SoftpubDumpStructure);
141 WINTRUST_FREEREGENTRY(HTTPSCertificateTrust);
142 WINTRUST_FREEREGENTRY(HTTPSFinalProv);
143 WINTRUST_FREEREGENTRY(OfficeInitializePolicy);
144 WINTRUST_FREEREGENTRY(OfficeCleanupPolicy);
145 WINTRUST_FREEREGENTRY(DriverInitializePolicy);
146 WINTRUST_FREEREGENTRY(DriverFinalPolicy);
147 WINTRUST_FREEREGENTRY(DriverCleanupPolicy);
148 WINTRUST_FREEREGENTRY(GenericChainCertificateTrust);
149 WINTRUST_FREEREGENTRY(GenericChainFinalProv);
151 #undef WINTRUST_FREEREGENTRY
154 /***********************************************************************
157 * Create a wide-string from a GUID
160 static void WINTRUST_Guid2Wstr(const GUID* pgActionID, WCHAR* GuidString)
162 static const WCHAR wszFormat[] = {'{','%','0','8','l','X','-','%','0','4','X','-','%','0','4','X','-',
163 '%','0','2','X','%','0','2','X','-','%','0','2','X','%','0','2','X','%','0','2','X','%','0','2',
164 'X','%','0','2','X','%','0','2','X','}', 0};
166 wsprintfW(GuidString, wszFormat, pgActionID->Data1, pgActionID->Data2, pgActionID->Data3,
167 pgActionID->Data4[0], pgActionID->Data4[1], pgActionID->Data4[2], pgActionID->Data4[3],
168 pgActionID->Data4[4], pgActionID->Data4[5], pgActionID->Data4[6], pgActionID->Data4[7]);
171 /***********************************************************************
172 * WINTRUST_WriteProviderToReg
174 * Helper function for WintrustAddActionID
177 static LONG WINTRUST_WriteProviderToReg(WCHAR* GuidString,
178 const WCHAR* FunctionType,
179 CRYPT_TRUST_REG_ENTRY RegEntry)
181 static const WCHAR Function[] = {'$','F','u','n','c','t','i','o','n', 0};
182 WCHAR ProvKey[MAX_PATH];
184 LONG Res = ERROR_SUCCESS;
186 /* Create the needed key string */
188 lstrcatW(ProvKey, Trust);
189 lstrcatW(ProvKey, FunctionType);
190 lstrcatW(ProvKey, GuidString);
192 if (!RegEntry.pwszDLLName || !RegEntry.pwszFunctionName)
193 return ERROR_INVALID_PARAMETER;
195 Res = RegCreateKeyExW(HKEY_LOCAL_MACHINE, ProvKey, 0, NULL, 0, KEY_WRITE, NULL, &Key, NULL);
196 if (Res != ERROR_SUCCESS) goto error_close_key;
198 /* Create the $DLL entry */
199 Res = RegSetValueExW(Key, Dll, 0, REG_SZ, (BYTE*)RegEntry.pwszDLLName,
200 (lstrlenW(RegEntry.pwszDLLName) + 1)*sizeof(WCHAR));
201 if (Res != ERROR_SUCCESS) goto error_close_key;
203 /* Create the $Function entry */
204 Res = RegSetValueExW(Key, Function, 0, REG_SZ, (BYTE*)RegEntry.pwszFunctionName,
205 (lstrlenW(RegEntry.pwszFunctionName) + 1)*sizeof(WCHAR));
213 /***********************************************************************
214 * WintrustAddActionID (WINTRUST.@)
216 * Add the definitions of the actions a Trust provider can perform to
220 * pgActionID [I] Pointer to a GUID for the Trust provider.
221 * fdwFlags [I] Flag to indicate whether registry errors are passed on.
222 * psProvInfo [I] Pointer to a structure with information about DLL
223 * name and functions.
227 * Failure: FALSE. (Use GetLastError() for more information)
230 * Adding definitions is basically only adding relevant information
231 * to the registry. No verification takes place whether a DLL or it's
233 * Information in the registry will always be overwritten.
236 BOOL WINAPI WintrustAddActionID( GUID* pgActionID, DWORD fdwFlags,
237 CRYPT_REGISTER_ACTIONID* psProvInfo)
239 WCHAR GuidString[39];
241 LONG WriteActionError = ERROR_SUCCESS;
243 TRACE("%s %x %p\n", debugstr_guid(pgActionID), fdwFlags, psProvInfo);
245 /* Some sanity checks.
246 * We use the W2K3 last error as it makes more sense (W2K leaves the last error
251 (psProvInfo->cbStruct != sizeof(CRYPT_REGISTER_ACTIONID)))
253 SetLastError(ERROR_INVALID_PARAMETER);
257 /* Create this string only once, instead of in the helper function */
258 WINTRUST_Guid2Wstr( pgActionID, GuidString);
260 /* Write the information to the registry */
261 Res = WINTRUST_WriteProviderToReg(GuidString, Initialization , psProvInfo->sInitProvider);
262 if (Res != ERROR_SUCCESS) WriteActionError = Res;
263 Res = WINTRUST_WriteProviderToReg(GuidString, Message , psProvInfo->sObjectProvider);
264 if (Res != ERROR_SUCCESS) WriteActionError = Res;
265 Res = WINTRUST_WriteProviderToReg(GuidString, Signature , psProvInfo->sSignatureProvider);
266 if (Res != ERROR_SUCCESS) WriteActionError = Res;
267 Res = WINTRUST_WriteProviderToReg(GuidString, Certificate , psProvInfo->sCertificateProvider);
268 if (Res != ERROR_SUCCESS) WriteActionError = Res;
269 Res = WINTRUST_WriteProviderToReg(GuidString, CertCheck , psProvInfo->sCertificatePolicyProvider);
270 if (Res != ERROR_SUCCESS) WriteActionError = Res;
271 Res = WINTRUST_WriteProviderToReg(GuidString, FinalPolicy , psProvInfo->sFinalPolicyProvider);
272 if (Res != ERROR_SUCCESS) WriteActionError = Res;
273 Res = WINTRUST_WriteProviderToReg(GuidString, DiagnosticPolicy, psProvInfo->sTestPolicyProvider);
274 if (Res != ERROR_SUCCESS) WriteActionError = Res;
275 Res = WINTRUST_WriteProviderToReg(GuidString, Cleanup , psProvInfo->sCleanupProvider);
276 if (Res != ERROR_SUCCESS) WriteActionError = Res;
278 /* Testing (by restricting access to the registry for some keys) shows that the last failing function
279 * will be used for last error.
280 * If the flag WT_ADD_ACTION_ID_RET_RESULT_FLAG is set and there are errors when adding the action
281 * we have to return FALSE. Errors includes both invalid entries as well as registry errors.
282 * Testing also showed that one error doesn't stop the registry writes. Every action will be dealt with.
285 if (WriteActionError != ERROR_SUCCESS)
287 SetLastError(WriteActionError);
289 if (fdwFlags == WT_ADD_ACTION_ID_RET_RESULT_FLAG)
296 /***********************************************************************
297 * WINTRUST_RemoveProviderFromReg
299 * Helper function for WintrustRemoveActionID
302 static void WINTRUST_RemoveProviderFromReg(WCHAR* GuidString,
303 const WCHAR* FunctionType)
305 WCHAR ProvKey[MAX_PATH];
307 /* Create the needed key string */
309 lstrcatW(ProvKey, Trust);
310 lstrcatW(ProvKey, FunctionType);
311 lstrcatW(ProvKey, GuidString);
313 /* We don't care about success or failure */
314 RegDeleteKeyW(HKEY_LOCAL_MACHINE, ProvKey);
317 /***********************************************************************
318 * WintrustRemoveActionID (WINTRUST.@)
320 * Remove the definitions of the actions a Trust provider can perform
324 * pgActionID [I] Pointer to a GUID for the Trust provider.
327 * Success: TRUE. (Use GetLastError() for more information)
328 * Failure: FALSE. (Use GetLastError() for more information)
331 * Testing shows that WintrustRemoveActionID always returns TRUE and
332 * that a possible error should be retrieved via GetLastError().
333 * There are no checks if the definitions are in the registry.
335 BOOL WINAPI WintrustRemoveActionID( GUID* pgActionID )
337 WCHAR GuidString[39];
339 TRACE("(%s)\n", debugstr_guid(pgActionID));
343 SetLastError(ERROR_INVALID_PARAMETER);
347 /* Create this string only once, instead of in the helper function */
348 WINTRUST_Guid2Wstr( pgActionID, GuidString);
350 /* We don't care about success or failure */
351 WINTRUST_RemoveProviderFromReg(GuidString, Initialization);
352 WINTRUST_RemoveProviderFromReg(GuidString, Message);
353 WINTRUST_RemoveProviderFromReg(GuidString, Signature);
354 WINTRUST_RemoveProviderFromReg(GuidString, Certificate);
355 WINTRUST_RemoveProviderFromReg(GuidString, CertCheck);
356 WINTRUST_RemoveProviderFromReg(GuidString, FinalPolicy);
357 WINTRUST_RemoveProviderFromReg(GuidString, DiagnosticPolicy);
358 WINTRUST_RemoveProviderFromReg(GuidString, Cleanup);
363 /***********************************************************************
364 * WINTRUST_WriteSingleUsageEntry
366 * Helper for WintrustAddDefaultForUsage, writes a single value and its
369 * HKLM\Software\Microsoft\Cryptography\Trust\Usages\<OID>
371 static LONG WINTRUST_WriteSingleUsageEntry(LPCSTR OID,
375 static const WCHAR Usages[] = {'U','s','a','g','e','s','\\', 0};
378 LONG Res = ERROR_SUCCESS;
382 /* Turn OID into a wide-character string */
383 Len = MultiByteToWideChar( CP_ACP, 0, OID, -1, NULL, 0 );
384 OIDW = WINTRUST_Alloc( Len * sizeof(WCHAR) );
385 MultiByteToWideChar( CP_ACP, 0, OID, -1, OIDW, Len );
387 /* Allocate the needed space for UsageKey */
388 UsageKey = WINTRUST_Alloc((lstrlenW(Trust) + lstrlenW(Usages) + Len) * sizeof(WCHAR));
389 /* Create the key string */
390 lstrcpyW(UsageKey, Trust);
391 lstrcatW(UsageKey, Usages);
392 lstrcatW(UsageKey, OIDW);
394 Res = RegCreateKeyExW(HKEY_LOCAL_MACHINE, UsageKey, 0, NULL, 0, KEY_WRITE, NULL, &Key, NULL);
395 if (Res == ERROR_SUCCESS)
397 /* Create the Value entry */
398 Res = RegSetValueExW(Key, Value, 0, REG_SZ, (BYTE*)Data,
399 (lstrlenW(Data) + 1)*sizeof(WCHAR));
404 WINTRUST_Free(UsageKey);
409 /***************************************************************************
410 * WINTRUST_RegisterGenVerifyV2
412 * Register WINTRUST_ACTION_GENERIC_VERIFY_V2 actions and usages.
415 * WINTRUST_ACTION_GENERIC_VERIFY_V2 ({00AAC56B-CD44-11D0-8CC2-00C04FC295EE}
416 * is defined in softpub.h
418 static BOOL WINTRUST_RegisterGenVerifyV2(void)
420 BOOL RegisteredOK = TRUE;
421 static GUID ProvGUID = WINTRUST_ACTION_GENERIC_VERIFY_V2;
422 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
423 SoftpubInitialization,
429 { 0, NULL, NULL }, /* No diagnostic policy */
431 CRYPT_PROVIDER_REGDEFUSAGE DefUsage = { sizeof(CRYPT_PROVIDER_REGDEFUSAGE),
433 NULL, /* No Dll provided */
434 NULL, /* No load callback function */
435 NULL }; /* No free callback function */
437 if (!WintrustAddDefaultForUsage(szOID_PKIX_KP_CODE_SIGNING, &DefUsage))
438 RegisteredOK = FALSE;
440 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
441 RegisteredOK = FALSE;
446 /***************************************************************************
447 * WINTRUST_RegisterPublishedSoftware
449 * Register WIN_SPUB_ACTION_PUBLISHED_SOFTWARE actions and usages.
452 * WIN_SPUB_ACTION_PUBLISHED_SOFTWARE ({64B9D180-8DA2-11CF-8736-00AA00A485EB})
453 * is defined in wintrust.h
455 static BOOL WINTRUST_RegisterPublishedSoftware(void)
457 static GUID ProvGUID = WIN_SPUB_ACTION_PUBLISHED_SOFTWARE;
458 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
459 SoftpubInitialization,
465 { 0, NULL, NULL }, /* No diagnostic policy */
468 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
474 #define WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI { 0xc6b2e8d0, 0xe005, 0x11cf, { 0xa1,0x34,0x00,0xc0,0x4f,0xd7,0xbf,0x43 }}
476 /***************************************************************************
477 * WINTRUST_RegisterPublishedSoftwareNoBadUi
479 * Register WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI actions and usages.
482 * WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI ({C6B2E8D0-E005-11CF-A134-00C04FD7BF43})
483 * is not defined in any include file. (FIXME: Find out if the name is correct).
485 static BOOL WINTRUST_RegisterPublishedSoftwareNoBadUi(void)
487 static GUID ProvGUID = WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI;
488 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
489 SoftpubInitialization,
495 { 0, NULL, NULL }, /* No diagnostic policy */
498 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
504 /***************************************************************************
505 * WINTRUST_RegisterGenCertVerify
507 * Register WINTRUST_ACTION_GENERIC_CERT_VERIFY actions and usages.
510 * WINTRUST_ACTION_GENERIC_CERT_VERIFY ({189A3842-3041-11D1-85E1-00C04FC295EE})
511 * is defined in softpub.h
513 static BOOL WINTRUST_RegisterGenCertVerify(void)
515 static GUID ProvGUID = WINTRUST_ACTION_GENERIC_CERT_VERIFY;
516 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
523 { 0, NULL, NULL }, /* No diagnostic policy */
526 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
532 /***************************************************************************
533 * WINTRUST_RegisterTrustProviderTest
535 * Register WINTRUST_ACTION_TRUSTPROVIDER_TEST actions and usages.
538 * WINTRUST_ACTION_TRUSTPROVIDER_TEST ({573E31F8-DDBA-11D0-8CCB-00C04FC295EE})
539 * is defined in softpub.h
541 static BOOL WINTRUST_RegisterTrustProviderTest(void)
543 static GUID ProvGUID = WINTRUST_ACTION_TRUSTPROVIDER_TEST;
544 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
545 SoftpubInitialization,
551 SoftpubDumpStructure,
554 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
560 /***************************************************************************
561 * WINTRUST_RegisterHttpsProv
563 * Register HTTPSPROV_ACTION actions and usages.
566 * HTTPSPROV_ACTION ({573E31F8-AABA-11D0-8CCB-00C04FC295EE})
567 * is defined in softpub.h
569 static BOOL WINTRUST_RegisterHttpsProv(void)
571 BOOL RegisteredOK = TRUE;
572 static CHAR SoftpubLoadUsage[] = "SoftpubLoadDefUsageCallData";
573 static CHAR SoftpubFreeUsage[] = "SoftpubFreeDefUsageCallData";
574 static GUID ProvGUID = HTTPSPROV_ACTION;
575 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
576 SoftpubInitialization,
579 HTTPSCertificateTrust,
582 { 0, NULL, NULL }, /* No diagnostic policy */
584 CRYPT_PROVIDER_REGDEFUSAGE DefUsage = { sizeof(CRYPT_PROVIDER_REGDEFUSAGE),
586 NULL, /* Will be filled later */
590 DefUsage.pwszDllName = WINTRUST_Alloc(sizeof(SP_POLICY_PROVIDER_DLL_NAME));
591 lstrcpyW(DefUsage.pwszDllName, SP_POLICY_PROVIDER_DLL_NAME);
593 if (!WintrustAddDefaultForUsage(szOID_PKIX_KP_SERVER_AUTH, &DefUsage))
594 RegisteredOK = FALSE;
595 if (!WintrustAddDefaultForUsage(szOID_PKIX_KP_CLIENT_AUTH, &DefUsage))
596 RegisteredOK = FALSE;
597 if (!WintrustAddDefaultForUsage(szOID_SERVER_GATED_CRYPTO, &DefUsage))
598 RegisteredOK = FALSE;
599 if (!WintrustAddDefaultForUsage(szOID_SGC_NETSCAPE, &DefUsage))
600 RegisteredOK = FALSE;
602 WINTRUST_Free(DefUsage.pwszDllName);
604 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
605 RegisteredOK = FALSE;
610 /***************************************************************************
611 * WINTRUST_RegisterOfficeSignVerify
613 * Register OFFICESIGN_ACTION_VERIFY actions and usages.
616 * OFFICESIGN_ACTION_VERIFY ({5555C2CD-17FB-11D1-85C4-00C04FC295EE})
617 * is defined in softpub.h
619 static BOOL WINTRUST_RegisterOfficeSignVerify(void)
621 static GUID ProvGUID = OFFICESIGN_ACTION_VERIFY;
622 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
623 OfficeInitializePolicy,
629 { 0, NULL, NULL }, /* No diagnostic policy */
630 OfficeCleanupPolicy };
632 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
638 /***************************************************************************
639 * WINTRUST_RegisterDriverVerify
641 * Register DRIVER_ACTION_VERIFY actions and usages.
644 * DRIVER_ACTION_VERIFY ({F750E6C3-38EE-11D1-85E5-00C04FC295EE})
645 * is defined in softpub.h
647 static BOOL WINTRUST_RegisterDriverVerify(void)
649 static GUID ProvGUID = DRIVER_ACTION_VERIFY;
650 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
651 DriverInitializePolicy,
657 { 0, NULL, NULL }, /* No diagnostic policy */
658 DriverCleanupPolicy };
660 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
666 /***************************************************************************
667 * WINTRUST_RegisterGenChainVerify
669 * Register WINTRUST_ACTION_GENERIC_CHAIN_VERIFY actions and usages.
672 * WINTRUST_ACTION_GENERIC_CHAIN_VERIFY ({FC451C16-AC75-11D1-B4B8-00C04FB66EA0})
673 * is defined in softpub.h
675 static BOOL WINTRUST_RegisterGenChainVerify(void)
677 static GUID ProvGUID = WINTRUST_ACTION_GENERIC_CHAIN_VERIFY;
678 CRYPT_REGISTER_ACTIONID ProvInfo = { sizeof(CRYPT_REGISTER_ACTIONID),
679 SoftpubInitialization,
682 GenericChainCertificateTrust,
684 GenericChainFinalProv,
685 { 0, NULL, NULL }, /* No diagnostic policy */
688 if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
694 /***********************************************************************
695 * WintrustAddDefaultForUsage (WINTRUST.@)
697 * Write OID and callback functions to the registry.
700 * pszUsageOID [I] Pointer to a GUID.
701 * psDefUsage [I] Pointer to a structure that specifies the callback functions.
708 * WintrustAddDefaultForUsage will only return TRUE or FALSE, no last
709 * error is set, not even when the registry cannot be written to.
711 BOOL WINAPI WintrustAddDefaultForUsage(const char *pszUsageOID,
712 CRYPT_PROVIDER_REGDEFUSAGE *psDefUsage)
714 static const WCHAR CBAlloc[] = {'C','a','l','l','b','a','c','k','A','l','l','o','c','F','u','n','c','t','i','o','n', 0};
715 static const WCHAR CBFree[] = {'C','a','l','l','b','a','c','k','F','r','e','e','F','u','n','c','t','i','o','n', 0};
716 LONG Res = ERROR_SUCCESS;
717 LONG WriteUsageError = ERROR_SUCCESS;
719 WCHAR GuidString[39];
721 TRACE("(%s %p)\n", debugstr_a(pszUsageOID), psDefUsage);
723 /* Some sanity checks. */
726 !psDefUsage->pgActionID ||
727 (psDefUsage->cbStruct != sizeof(CRYPT_PROVIDER_REGDEFUSAGE)))
729 SetLastError(ERROR_INVALID_PARAMETER);
733 if (psDefUsage->pwszDllName)
735 Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, Dll, psDefUsage->pwszDllName);
736 if (Res != ERROR_SUCCESS) WriteUsageError = Res;
738 if (psDefUsage->pwszLoadCallbackDataFunctionName)
742 Len = MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszLoadCallbackDataFunctionName, -1, NULL, 0 );
743 CallbackW = WINTRUST_Alloc( Len * sizeof(WCHAR) );
744 MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszLoadCallbackDataFunctionName, -1, CallbackW, Len );
746 Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, CBAlloc, CallbackW);
747 if (Res != ERROR_SUCCESS) WriteUsageError = Res;
749 WINTRUST_Free(CallbackW);
751 if (psDefUsage->pwszFreeCallbackDataFunctionName)
755 Len = MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszFreeCallbackDataFunctionName, -1, NULL, 0 );
756 CallbackW = WINTRUST_Alloc( Len * sizeof(WCHAR) );
757 MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszFreeCallbackDataFunctionName, -1, CallbackW, Len );
759 Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, CBFree, CallbackW);
760 if (Res != ERROR_SUCCESS) WriteUsageError = Res;
762 WINTRUST_Free(CallbackW);
765 WINTRUST_Guid2Wstr(psDefUsage->pgActionID, GuidString);
766 Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, DefaultId, GuidString);
767 if (Res != ERROR_SUCCESS) WriteUsageError = Res;
769 if (WriteUsageError != ERROR_SUCCESS)
775 static FARPROC WINTRUST_ReadProviderFromReg(WCHAR *GuidString, const WCHAR *FunctionType)
777 WCHAR ProvKey[MAX_PATH], DllName[MAX_PATH];
778 char FunctionName[MAX_PATH];
780 LONG Res = ERROR_SUCCESS;
785 /* Create the needed key string */
787 lstrcatW(ProvKey, Trust);
788 lstrcatW(ProvKey, FunctionType);
789 lstrcatW(ProvKey, GuidString);
791 Res = RegOpenKeyExW(HKEY_LOCAL_MACHINE, ProvKey, 0, KEY_READ, &Key);
792 if (Res != ERROR_SUCCESS) goto error_close_key;
794 /* Read the $DLL entry */
795 Size = sizeof(DllName);
796 Res = RegQueryValueExW(Key, Dll, NULL, NULL, (LPBYTE)DllName, &Size);
797 if (Res != ERROR_SUCCESS) goto error_close_key;
799 /* Read the $Function entry */
800 Size = sizeof(FunctionName);
801 Res = RegQueryValueExA(Key, "$Function", NULL, NULL, (LPBYTE)FunctionName, &Size);
802 if (Res != ERROR_SUCCESS) goto error_close_key;
804 /* Load the library - there appears to be no way to close a provider, so
805 * just leak the module handle.
807 Lib = LoadLibraryW(DllName);
808 Func = GetProcAddress(Lib, FunctionName);
816 /***********************************************************************
817 * WintrustLoadFunctionPointers (WINTRUST.@)
819 BOOL WINAPI WintrustLoadFunctionPointers( GUID* pgActionID,
820 CRYPT_PROVIDER_FUNCTIONS* pPfns )
822 WCHAR GuidString[39];
824 TRACE("(%s %p)\n", debugstr_guid(pgActionID), pPfns);
826 if (!pPfns) return FALSE;
829 SetLastError(ERROR_INVALID_PARAMETER);
832 if (pPfns->cbStruct != sizeof(CRYPT_PROVIDER_FUNCTIONS)) return FALSE;
834 /* Create this string only once, instead of in the helper function */
835 WINTRUST_Guid2Wstr( pgActionID, GuidString);
837 /* Get the function pointers from the registry, where applicable */
838 pPfns->pfnAlloc = WINTRUST_Alloc;
839 pPfns->pfnFree = WINTRUST_Free;
840 pPfns->pfnAddStore2Chain = WINTRUST_AddStore;
841 pPfns->pfnAddSgnr2Chain = WINTRUST_AddSgnr;
842 pPfns->pfnAddCert2Chain = WINTRUST_AddCert;
843 pPfns->pfnAddPrivData2Chain = NULL;
844 pPfns->psUIpfns = NULL;
845 pPfns->pfnInitialize = (PFN_PROVIDER_INIT_CALL)WINTRUST_ReadProviderFromReg(GuidString, Initialization);
846 pPfns->pfnObjectTrust = (PFN_PROVIDER_OBJTRUST_CALL)WINTRUST_ReadProviderFromReg(GuidString, Message);
847 pPfns->pfnSignatureTrust = (PFN_PROVIDER_SIGTRUST_CALL)WINTRUST_ReadProviderFromReg(GuidString, Signature);
848 pPfns->pfnCertificateTrust = (PFN_PROVIDER_CERTTRUST_CALL)WINTRUST_ReadProviderFromReg(GuidString, Certificate);
849 pPfns->pfnCertCheckPolicy = (PFN_PROVIDER_CERTCHKPOLICY_CALL)WINTRUST_ReadProviderFromReg(GuidString, CertCheck);
850 pPfns->pfnFinalPolicy = (PFN_PROVIDER_FINALPOLICY_CALL)WINTRUST_ReadProviderFromReg(GuidString, FinalPolicy);
851 pPfns->pfnTestFinalPolicy = (PFN_PROVIDER_TESTFINALPOLICY_CALL)WINTRUST_ReadProviderFromReg(GuidString, DiagnosticPolicy);
852 pPfns->pfnCleanupPolicy = (PFN_PROVIDER_CLEANUP_CALL)WINTRUST_ReadProviderFromReg(GuidString, Cleanup);
857 /***********************************************************************
858 * WINTRUST_SIPPAddProvider
860 * Helper for DllRegisterServer.
862 static BOOL WINTRUST_SIPPAddProvider(GUID* Subject, WCHAR* MagicNumber)
864 static WCHAR CryptSIPGetSignedDataMsg[] =
865 {'C','r','y','p','t','S','I','P','G','e','t','S','i','g','n','e','d','D','a','t','a','M','s','g', 0};
866 static WCHAR CryptSIPPutSignedDataMsg[] =
867 {'C','r','y','p','t','S','I','P','P','u','t','S','i','g','n','e','d','D','a','t','a','M','s','g', 0};
868 static WCHAR CryptSIPCreateIndirectData[] =
869 {'C','r','y','p','t','S','I','P','C','r','e','a','t','e','I','n','d','i','r','e','c','t','D','a','t','a', 0};
870 static WCHAR CryptSIPVerifyIndirectData[] =
871 {'C','r','y','p','t','S','I','P','V','e','r','i','f','y','I','n','d','i','r','e','c','t','D','a','t','a', 0};
872 static WCHAR CryptSIPRemoveSignedDataMsg[] =
873 {'C','r','y','p','t','S','I','P','R','e','m','o','v','e','S','i','g','n','e','d','D','a','t','a','M','s','g', 0};
874 SIP_ADD_NEWPROVIDER NewProv;
877 /* Clear and initialize the structure */
878 memset(&NewProv, 0, sizeof(SIP_ADD_NEWPROVIDER));
879 NewProv.cbStruct = sizeof(SIP_ADD_NEWPROVIDER);
880 NewProv.pwszDLLFileName = WINTRUST_Alloc(sizeof(SP_POLICY_PROVIDER_DLL_NAME));
881 /* Fill the structure */
882 NewProv.pgSubject = Subject;
883 lstrcpyW(NewProv.pwszDLLFileName, SP_POLICY_PROVIDER_DLL_NAME);
884 NewProv.pwszMagicNumber = MagicNumber;
885 NewProv.pwszIsFunctionName = NULL;
886 NewProv.pwszGetFuncName = CryptSIPGetSignedDataMsg;
887 NewProv.pwszPutFuncName = CryptSIPPutSignedDataMsg;
888 NewProv.pwszCreateFuncName = CryptSIPCreateIndirectData;
889 NewProv.pwszVerifyFuncName = CryptSIPVerifyIndirectData;
890 NewProv.pwszRemoveFuncName = CryptSIPRemoveSignedDataMsg;
891 NewProv.pwszIsFunctionNameFmt2 = NULL;
893 Ret = CryptSIPAddProvider(&NewProv);
895 WINTRUST_Free(NewProv.pwszDLLFileName);
900 /***********************************************************************
901 * DllRegisterServer (WINTRUST.@)
903 HRESULT WINAPI DllRegisterServer(void)
905 static const CHAR SpcPeImageDataEncode[] = "WVTAsn1SpcPeImageDataEncode";
906 static const CHAR SpcPeImageDataDecode[] = "WVTAsn1SpcPeImageDataDecode";
907 static const CHAR SpcLinkEncode[] = "WVTAsn1SpcLinkEncode";
908 static const CHAR SpcLinkDecode[] = "WVTAsn1SpcLinkDecode";
909 static const CHAR SpcSigInfoEncode[] = "WVTAsn1SpcSigInfoEncode";
910 static const CHAR SpcSigInfoDecode[] = "WVTAsn1SpcSigInfoDecode";
911 static const CHAR SpcIndirectDataContentEncode[] = "WVTAsn1SpcIndirectDataContentEncode";
912 static const CHAR SpcIndirectDataContentDecode[] = "WVTAsn1SpcIndirectDataContentDecode";
913 static const CHAR SpcSpAgencyInfoEncode[] = "WVTAsn1SpcSpAgencyInfoEncode";
914 static const CHAR SpcSpAgencyInfoDecode[] = "WVTAsn1SpcSpAgencyInfoDecode";
915 static const CHAR SpcMinimalCriteriaInfoEncode[] = "WVTAsn1SpcMinimalCriteriaInfoEncode";
916 static const CHAR SpcMinimalCriteriaInfoDecode[] = "WVTAsn1SpcMinimalCriteriaInfoDecode";
917 static const CHAR SpcFinancialCriteriaInfoEncode[] = "WVTAsn1SpcFinancialCriteriaInfoEncode";
918 static const CHAR SpcFinancialCriteriaInfoDecode[] = "WVTAsn1SpcFinancialCriteriaInfoDecode";
919 static const CHAR SpcStatementTypeEncode[] = "WVTAsn1SpcStatementTypeEncode";
920 static const CHAR SpcStatementTypeDecode[] = "WVTAsn1SpcStatementTypeDecode";
921 static const CHAR CatNameValueEncode[] = "WVTAsn1CatNameValueEncode";
922 static const CHAR CatNameValueDecode[] = "WVTAsn1CatNameValueDecode";
923 static const CHAR CatMemberInfoEncode[] = "WVTAsn1CatMemberInfoEncode";
924 static const CHAR CatMemberInfoDecode[] = "WVTAsn1CatMemberInfoDecode";
925 static const CHAR SpcSpOpusInfoEncode[] = "WVTAsn1SpcSpOpusInfoEncode";
926 static const CHAR SpcSpOpusInfoDecode[] = "WVTAsn1SpcSpOpusInfoDecode";
927 static GUID Unknown1 = { 0xDE351A42, 0x8E59, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
928 static GUID Unknown2 = { 0xC689AABA, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
929 static GUID Unknown3 = { 0xC689AAB8, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
930 static GUID Unknown4 = { 0xC689AAB9, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
931 static GUID Unknown5 = { 0xDE351A43, 0x8E59, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
932 static GUID Unknown6 = { 0x9BA61D3F, 0xE73A, 0x11D0, { 0x8C,0xD2,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
933 static WCHAR MagicNumber2[] = {'M','S','C','F', 0};
934 static WCHAR MagicNumber3[] = {'0','x','0','0','0','0','4','5','5','0', 0};
935 static WCHAR CafeBabe[] = {'0','x','c','a','f','e','b','a','b','e', 0};
937 HRESULT CryptRegisterRes = S_OK;
938 HRESULT TrustProviderRes = S_OK;
939 HRESULT SIPAddProviderRes = S_OK;
943 /* Testing on native shows that when an error is encountered in one of the CryptRegisterOIDFunction calls
944 * the rest of these calls is skipped. Registering is however continued for the trust providers.
946 * We are not totally in line with native as there all decoding functions are registered after all encoding
949 #define WINTRUST_REGISTEROID( oid, encode_funcname, decode_funcname ) \
951 if (!CryptRegisterOIDFunction(X509_ASN_ENCODING, CRYPT_OID_ENCODE_OBJECT_FUNC, oid, SP_POLICY_PROVIDER_DLL_NAME, encode_funcname)) \
953 CryptRegisterRes = HRESULT_FROM_WIN32(GetLastError()); \
954 goto add_trust_providers; \
956 if (!CryptRegisterOIDFunction(X509_ASN_ENCODING, CRYPT_OID_DECODE_OBJECT_FUNC, oid, SP_POLICY_PROVIDER_DLL_NAME, decode_funcname)) \
958 CryptRegisterRes = HRESULT_FROM_WIN32(GetLastError()); \
959 goto add_trust_providers; \
963 WINTRUST_REGISTEROID(SPC_PE_IMAGE_DATA_OBJID, SpcPeImageDataEncode, SpcPeImageDataDecode);
964 WINTRUST_REGISTEROID(SPC_PE_IMAGE_DATA_STRUCT, SpcPeImageDataEncode, SpcPeImageDataDecode);
965 WINTRUST_REGISTEROID(SPC_CAB_DATA_OBJID, SpcLinkEncode, SpcLinkDecode);
966 WINTRUST_REGISTEROID(SPC_CAB_DATA_STRUCT, SpcLinkEncode, SpcLinkDecode);
967 WINTRUST_REGISTEROID(SPC_JAVA_CLASS_DATA_OBJID, SpcLinkEncode, SpcLinkDecode);
968 WINTRUST_REGISTEROID(SPC_JAVA_CLASS_DATA_STRUCT, SpcLinkEncode, SpcLinkDecode);
969 WINTRUST_REGISTEROID(SPC_LINK_OBJID, SpcLinkEncode, SpcLinkDecode);
970 WINTRUST_REGISTEROID(SPC_LINK_STRUCT, SpcLinkEncode, SpcLinkDecode);
971 WINTRUST_REGISTEROID(SPC_SIGINFO_OBJID, SpcSigInfoEncode, SpcSigInfoDecode);
972 WINTRUST_REGISTEROID(SPC_SIGINFO_STRUCT, SpcSigInfoEncode, SpcSigInfoDecode);
973 WINTRUST_REGISTEROID(SPC_INDIRECT_DATA_OBJID, SpcIndirectDataContentEncode, SpcIndirectDataContentDecode);
974 WINTRUST_REGISTEROID(SPC_INDIRECT_DATA_CONTENT_STRUCT, SpcIndirectDataContentEncode, SpcIndirectDataContentDecode);
975 WINTRUST_REGISTEROID(SPC_SP_AGENCY_INFO_OBJID, SpcSpAgencyInfoEncode, SpcSpAgencyInfoDecode);
976 WINTRUST_REGISTEROID(SPC_SP_AGENCY_INFO_STRUCT, SpcSpAgencyInfoEncode, SpcSpAgencyInfoDecode);
977 WINTRUST_REGISTEROID(SPC_MINIMAL_CRITERIA_OBJID, SpcMinimalCriteriaInfoEncode, SpcMinimalCriteriaInfoDecode);
978 WINTRUST_REGISTEROID(SPC_MINIMAL_CRITERIA_STRUCT, SpcMinimalCriteriaInfoEncode, SpcMinimalCriteriaInfoDecode);
979 WINTRUST_REGISTEROID(SPC_FINANCIAL_CRITERIA_OBJID, SpcFinancialCriteriaInfoEncode, SpcFinancialCriteriaInfoDecode);
980 WINTRUST_REGISTEROID(SPC_FINANCIAL_CRITERIA_STRUCT, SpcFinancialCriteriaInfoEncode, SpcFinancialCriteriaInfoDecode);
981 WINTRUST_REGISTEROID(SPC_STATEMENT_TYPE_OBJID, SpcStatementTypeEncode, SpcStatementTypeDecode);
982 WINTRUST_REGISTEROID(SPC_STATEMENT_TYPE_STRUCT, SpcStatementTypeEncode, SpcStatementTypeDecode);
983 WINTRUST_REGISTEROID(CAT_NAMEVALUE_OBJID, CatNameValueEncode, CatNameValueDecode);
984 WINTRUST_REGISTEROID(CAT_NAMEVALUE_STRUCT, CatNameValueEncode, CatNameValueDecode);
985 WINTRUST_REGISTEROID(CAT_MEMBERINFO_OBJID, CatMemberInfoEncode, CatMemberInfoDecode);
986 WINTRUST_REGISTEROID(CAT_MEMBERINFO_STRUCT, CatMemberInfoEncode, CatMemberInfoDecode);
987 WINTRUST_REGISTEROID(SPC_SP_OPUS_INFO_OBJID, SpcSpOpusInfoEncode, SpcSpOpusInfoDecode);
988 WINTRUST_REGISTEROID(SPC_SP_OPUS_INFO_STRUCT, SpcSpOpusInfoEncode, SpcSpOpusInfoDecode);
990 #undef WINTRUST_REGISTEROID
994 /* Testing on W2K3 shows:
995 * All registry writes are tried. If one fails this part will return S_FALSE.
997 * Last error is set to the last error encountered, regardless if the first
998 * part failed or not.
1001 /* Create the necessary action registry structures */
1002 WINTRUST_InitRegStructs();
1004 /* Register several Trust Provider actions */
1005 if (!WINTRUST_RegisterGenVerifyV2())
1006 TrustProviderRes = S_FALSE;
1007 if (!WINTRUST_RegisterPublishedSoftware())
1008 TrustProviderRes = S_FALSE;
1009 if (!WINTRUST_RegisterPublishedSoftwareNoBadUi())
1010 TrustProviderRes = S_FALSE;
1011 if (!WINTRUST_RegisterGenCertVerify())
1012 TrustProviderRes = S_FALSE;
1013 if (!WINTRUST_RegisterTrustProviderTest())
1014 TrustProviderRes = S_FALSE;
1015 if (!WINTRUST_RegisterHttpsProv())
1016 TrustProviderRes = S_FALSE;
1017 if (!WINTRUST_RegisterOfficeSignVerify())
1018 TrustProviderRes = S_FALSE;
1019 if (!WINTRUST_RegisterDriverVerify())
1020 TrustProviderRes = S_FALSE;
1021 if (!WINTRUST_RegisterGenChainVerify())
1022 TrustProviderRes = S_FALSE;
1024 /* Free the registry structures */
1025 WINTRUST_FreeRegStructs();
1027 /* Testing on W2K3 shows:
1028 * All registry writes are tried. If one fails this part will return S_FALSE.
1030 * Last error is set to the last error encountered, regardless if the previous
1031 * parts failed or not.
1034 if (!WINTRUST_SIPPAddProvider(&Unknown1, NULL))
1035 SIPAddProviderRes = S_FALSE;
1036 if (!WINTRUST_SIPPAddProvider(&Unknown2, MagicNumber2))
1037 SIPAddProviderRes = S_FALSE;
1038 if (!WINTRUST_SIPPAddProvider(&Unknown3, MagicNumber3))
1039 SIPAddProviderRes = S_FALSE;
1040 if (!WINTRUST_SIPPAddProvider(&Unknown4, CafeBabe))
1041 SIPAddProviderRes = S_FALSE;
1042 if (!WINTRUST_SIPPAddProvider(&Unknown5, CafeBabe))
1043 SIPAddProviderRes = S_FALSE;
1044 if (!WINTRUST_SIPPAddProvider(&Unknown6, CafeBabe))
1045 SIPAddProviderRes = S_FALSE;
1047 /* Native does a CryptSIPRemoveProvider here for {941C2937-1292-11D1-85BE-00C04FC295EE}.
1048 * This SIP Provider is however not found on up-to-date window install and native will
1049 * set the last error to ERROR_FILE_NOT_FOUND.
1050 * Wine has the last error set to ERROR_INVALID_PARAMETER. There shouldn't be an app
1051 * depending on this last error though so there is no need to imitate native to the full extent.
1053 * (The ERROR_INVALID_PARAMETER for Wine it totally valid as we (and native) do register
1054 * a trust provider without a diagnostic policy).
1057 /* If CryptRegisterRes is not S_OK it will always overrule the return value. */
1058 if (CryptRegisterRes != S_OK)
1059 return CryptRegisterRes;
1060 else if (SIPAddProviderRes == S_OK)
1061 return TrustProviderRes;
1063 return SIPAddProviderRes;
1066 /***********************************************************************
1067 * DllUnregisterServer (WINTRUST.@)
1069 HRESULT WINAPI DllUnregisterServer(void)
1075 /***********************************************************************
1076 * SoftpubDllRegisterServer (WINTRUST.@)
1078 * Registers softpub.dll
1084 * Failure: S_FALSE. (See also GetLastError()).
1087 * DllRegisterServer in softpub.dll will call this function.
1088 * See comments in DllRegisterServer.
1090 HRESULT WINAPI SoftpubDllRegisterServer(void)
1092 HRESULT TrustProviderRes = S_OK;
1096 /* Create the necessary action registry structures */
1097 WINTRUST_InitRegStructs();
1099 /* Register several Trust Provider actions */
1100 if (!WINTRUST_RegisterGenVerifyV2())
1101 TrustProviderRes = S_FALSE;
1102 if (!WINTRUST_RegisterPublishedSoftware())
1103 TrustProviderRes = S_FALSE;
1104 if (!WINTRUST_RegisterPublishedSoftwareNoBadUi())
1105 TrustProviderRes = S_FALSE;
1106 if (!WINTRUST_RegisterGenCertVerify())
1107 TrustProviderRes = S_FALSE;
1108 if (!WINTRUST_RegisterTrustProviderTest())
1109 TrustProviderRes = S_FALSE;
1110 if (!WINTRUST_RegisterHttpsProv())
1111 TrustProviderRes = S_FALSE;
1112 if (!WINTRUST_RegisterOfficeSignVerify())
1113 TrustProviderRes = S_FALSE;
1114 if (!WINTRUST_RegisterDriverVerify())
1115 TrustProviderRes = S_FALSE;
1116 if (!WINTRUST_RegisterGenChainVerify())
1117 TrustProviderRes = S_FALSE;
1119 /* Free the registry structures */
1120 WINTRUST_FreeRegStructs();
1122 return TrustProviderRes;
1125 /***********************************************************************
1126 * SoftpubDllUnregisterServer (WINTRUST.@)
1128 HRESULT WINAPI SoftpubDllUnregisterServer(void)
1134 /***********************************************************************
1135 * mscat32DllRegisterServer (WINTRUST.@)
1137 HRESULT WINAPI mscat32DllRegisterServer(void)
1143 /***********************************************************************
1144 * mscat32DllUnregisterServer (WINTRUST.@)
1146 HRESULT WINAPI mscat32DllUnregisterServer(void)
1152 /***********************************************************************
1153 * mssip32DllRegisterServer (WINTRUST.@)
1155 HRESULT WINAPI mssip32DllRegisterServer(void)
1161 /***********************************************************************
1162 * mssip32DllUnregisterServer (WINTRUST.@)
1164 HRESULT WINAPI mssip32DllUnregisterServer(void)