wintrust: Correct alignment for 64-bit.
[wine] / dlls / wintrust / register.c
1 /*
2  * Register related wintrust functions
3  *
4  * Copyright 2006 Paul Vriens
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  */
20
21 #include <stdarg.h>
22
23 #include "windef.h"
24 #include "winbase.h"
25 #include "winerror.h"
26 #include "winuser.h"
27 #include "winreg.h"
28 #include "winnls.h"
29 #include "objbase.h"
30
31 #include "guiddef.h"
32 #include "wintrust.h"
33 #include "softpub.h"
34 #include "mssip.h"
35 #include "wintrust_priv.h"
36 #include "wine/debug.h"
37
38 WINE_DEFAULT_DEBUG_CHANNEL(wintrust);
39
40 static CRYPT_TRUST_REG_ENTRY SoftpubInitialization;
41 static CRYPT_TRUST_REG_ENTRY SoftpubMessage;
42 static CRYPT_TRUST_REG_ENTRY SoftpubSignature;
43 static CRYPT_TRUST_REG_ENTRY SoftpubCertficate;
44 static CRYPT_TRUST_REG_ENTRY SoftpubCertCheck;
45 static CRYPT_TRUST_REG_ENTRY SoftpubFinalPolicy;
46 static CRYPT_TRUST_REG_ENTRY SoftpubCleanup;
47
48 static CRYPT_TRUST_REG_ENTRY SoftpubDefCertInit;
49
50 static CRYPT_TRUST_REG_ENTRY SoftpubDumpStructure;
51
52 static CRYPT_TRUST_REG_ENTRY HTTPSCertificateTrust;
53 static CRYPT_TRUST_REG_ENTRY HTTPSFinalProv;
54
55 static CRYPT_TRUST_REG_ENTRY OfficeInitializePolicy;
56 static CRYPT_TRUST_REG_ENTRY OfficeCleanupPolicy;
57
58 static CRYPT_TRUST_REG_ENTRY DriverInitializePolicy;
59 static CRYPT_TRUST_REG_ENTRY DriverFinalPolicy;
60 static CRYPT_TRUST_REG_ENTRY DriverCleanupPolicy;
61
62 static CRYPT_TRUST_REG_ENTRY GenericChainCertificateTrust;
63 static CRYPT_TRUST_REG_ENTRY GenericChainFinalProv;
64
65 static const CRYPT_TRUST_REG_ENTRY NullCTRE = { 0, NULL, NULL };
66
67 static const WCHAR Trust[]            = {'S','o','f','t','w','a','r','e','\\',
68                                          'M','i','c','r','o','s','o','f','t','\\',
69                                          'C','r','y','p','t','o','g','r','a','p','h','y','\\',
70                                          'P','r','o','v','i','d','e','r','s','\\',
71                                          'T','r','u','s','t','\\', 0 };
72
73 static const WCHAR Initialization[]   = {'I','n','i','t','i','a','l','i','z','a','t','i','o','n','\\', 0};
74 static const WCHAR Message[]          = {'M','e','s','s','a','g','e','\\', 0};
75 static const WCHAR Signature[]        = {'S','i','g','n','a','t','u','r','e','\\', 0};
76 static const WCHAR Certificate[]      = {'C','e','r','t','i','f','i','c','a','t','e','\\', 0};
77 static const WCHAR CertCheck[]        = {'C','e','r','t','C','h','e','c','k','\\', 0};
78 static const WCHAR FinalPolicy[]      = {'F','i','n','a','l','P','o','l','i','c','y','\\', 0};
79 static const WCHAR DiagnosticPolicy[] = {'D','i','a','g','n','o','s','t','i','c','P','o','l','i','c','y','\\', 0};
80 static const WCHAR Cleanup[]          = {'C','l','e','a','n','u','p','\\', 0};
81
82 static const WCHAR DefaultId[]        = {'D','e','f','a','u','l','t','I','d', 0};
83 static const WCHAR Dll[]              = {'$','D','L','L', 0};
84
85 /***********************************************************************
86  *              WINTRUST_InitRegStructs
87  *
88  * Helper function to allocate and initialize the members of the
89  * CRYPT_TRUST_REG_ENTRY structs.
90  */
91 static void WINTRUST_InitRegStructs(void)
92 {
93 #define WINTRUST_INITREGENTRY( action, dllname, functionname ) \
94     action.cbStruct = sizeof(CRYPT_TRUST_REG_ENTRY); \
95     action.pwszDLLName = WINTRUST_Alloc(sizeof(dllname)); \
96     lstrcpyW(action.pwszDLLName, dllname); \
97     action.pwszFunctionName = WINTRUST_Alloc(sizeof(functionname)); \
98     lstrcpyW(action.pwszFunctionName, functionname);
99
100     WINTRUST_INITREGENTRY(SoftpubInitialization, SP_POLICY_PROVIDER_DLL_NAME, SP_INIT_FUNCTION)
101     WINTRUST_INITREGENTRY(SoftpubMessage, SP_POLICY_PROVIDER_DLL_NAME, SP_OBJTRUST_FUNCTION)
102     WINTRUST_INITREGENTRY(SoftpubSignature, SP_POLICY_PROVIDER_DLL_NAME, SP_SIGTRUST_FUNCTION)
103     WINTRUST_INITREGENTRY(SoftpubCertficate, SP_POLICY_PROVIDER_DLL_NAME, WT_PROVIDER_CERTTRUST_FUNCTION)
104     WINTRUST_INITREGENTRY(SoftpubCertCheck, SP_POLICY_PROVIDER_DLL_NAME, SP_CHKCERT_FUNCTION)
105     WINTRUST_INITREGENTRY(SoftpubFinalPolicy, SP_POLICY_PROVIDER_DLL_NAME, SP_FINALPOLICY_FUNCTION)
106     WINTRUST_INITREGENTRY(SoftpubCleanup, SP_POLICY_PROVIDER_DLL_NAME, SP_CLEANUPPOLICY_FUNCTION)
107     WINTRUST_INITREGENTRY(SoftpubDefCertInit, SP_POLICY_PROVIDER_DLL_NAME, SP_GENERIC_CERT_INIT_FUNCTION)
108     WINTRUST_INITREGENTRY(SoftpubDumpStructure, SP_POLICY_PROVIDER_DLL_NAME, SP_TESTDUMPPOLICY_FUNCTION_TEST)
109     WINTRUST_INITREGENTRY(HTTPSCertificateTrust, SP_POLICY_PROVIDER_DLL_NAME, HTTPS_CERTTRUST_FUNCTION)
110     WINTRUST_INITREGENTRY(HTTPSFinalProv, SP_POLICY_PROVIDER_DLL_NAME, HTTPS_FINALPOLICY_FUNCTION)
111     WINTRUST_INITREGENTRY(OfficeInitializePolicy, OFFICE_POLICY_PROVIDER_DLL_NAME, OFFICE_INITPROV_FUNCTION)
112     WINTRUST_INITREGENTRY(OfficeCleanupPolicy, OFFICE_POLICY_PROVIDER_DLL_NAME, OFFICE_CLEANUPPOLICY_FUNCTION)
113     WINTRUST_INITREGENTRY(DriverInitializePolicy, SP_POLICY_PROVIDER_DLL_NAME, DRIVER_INITPROV_FUNCTION)
114     WINTRUST_INITREGENTRY(DriverFinalPolicy, SP_POLICY_PROVIDER_DLL_NAME, DRIVER_FINALPOLPROV_FUNCTION)
115     WINTRUST_INITREGENTRY(DriverCleanupPolicy, SP_POLICY_PROVIDER_DLL_NAME, DRIVER_CLEANUPPOLICY_FUNCTION)
116     WINTRUST_INITREGENTRY(GenericChainCertificateTrust, SP_POLICY_PROVIDER_DLL_NAME, GENERIC_CHAIN_CERTTRUST_FUNCTION)
117     WINTRUST_INITREGENTRY(GenericChainFinalProv, SP_POLICY_PROVIDER_DLL_NAME, GENERIC_CHAIN_FINALPOLICY_FUNCTION)
118
119 #undef WINTRUST_INITREGENTRY
120 }
121
122 /***********************************************************************
123  *              WINTRUST_FreeRegStructs
124  *
125  * Helper function to free 2 members of the CRYPT_TRUST_REG_ENTRY
126  * structs.
127  */
128 static void WINTRUST_FreeRegStructs(void)
129 {
130 #define WINTRUST_FREEREGENTRY( action ) \
131     WINTRUST_Free(action.pwszDLLName); \
132     WINTRUST_Free(action.pwszFunctionName);
133
134     WINTRUST_FREEREGENTRY(SoftpubInitialization);
135     WINTRUST_FREEREGENTRY(SoftpubMessage);
136     WINTRUST_FREEREGENTRY(SoftpubSignature);
137     WINTRUST_FREEREGENTRY(SoftpubCertficate);
138     WINTRUST_FREEREGENTRY(SoftpubCertCheck);
139     WINTRUST_FREEREGENTRY(SoftpubFinalPolicy);
140     WINTRUST_FREEREGENTRY(SoftpubCleanup);
141     WINTRUST_FREEREGENTRY(SoftpubDefCertInit);
142     WINTRUST_FREEREGENTRY(SoftpubDumpStructure);
143     WINTRUST_FREEREGENTRY(HTTPSCertificateTrust);
144     WINTRUST_FREEREGENTRY(HTTPSFinalProv);
145     WINTRUST_FREEREGENTRY(OfficeInitializePolicy);
146     WINTRUST_FREEREGENTRY(OfficeCleanupPolicy);
147     WINTRUST_FREEREGENTRY(DriverInitializePolicy);
148     WINTRUST_FREEREGENTRY(DriverFinalPolicy);
149     WINTRUST_FREEREGENTRY(DriverCleanupPolicy);
150     WINTRUST_FREEREGENTRY(GenericChainCertificateTrust);
151     WINTRUST_FREEREGENTRY(GenericChainFinalProv);
152
153 #undef WINTRUST_FREEREGENTRY
154 }
155
156 /***********************************************************************
157  *              WINTRUST_guid2wstr
158  *
159  * Create a wide-string from a GUID
160  *
161  */
162 static void WINTRUST_Guid2Wstr(const GUID* pgActionID, WCHAR* GuidString)
163
164     static const WCHAR wszFormat[] = {'{','%','0','8','l','X','-','%','0','4','X','-','%','0','4','X','-',
165                                       '%','0','2','X','%','0','2','X','-','%','0','2','X','%','0','2','X','%','0','2','X','%','0','2',
166                                       'X','%','0','2','X','%','0','2','X','}', 0};
167
168     wsprintfW(GuidString, wszFormat, pgActionID->Data1, pgActionID->Data2, pgActionID->Data3,
169         pgActionID->Data4[0], pgActionID->Data4[1], pgActionID->Data4[2], pgActionID->Data4[3],
170         pgActionID->Data4[4], pgActionID->Data4[5], pgActionID->Data4[6], pgActionID->Data4[7]);
171 }
172
173 /***********************************************************************
174  *              WINTRUST_WriteProviderToReg
175  *
176  * Helper function for WintrustAddActionID
177  *
178  */
179 static LONG WINTRUST_WriteProviderToReg(WCHAR* GuidString,
180                                         const WCHAR* FunctionType,
181                                         CRYPT_TRUST_REG_ENTRY RegEntry)
182 {
183     static const WCHAR Function[] = {'$','F','u','n','c','t','i','o','n', 0};
184     WCHAR ProvKey[MAX_PATH];
185     HKEY Key;
186     LONG Res = ERROR_SUCCESS;
187
188     /* Create the needed key string */
189     ProvKey[0]='\0';
190     lstrcatW(ProvKey, Trust);
191     lstrcatW(ProvKey, FunctionType);
192     lstrcatW(ProvKey, GuidString);
193
194     if (!RegEntry.pwszDLLName || !RegEntry.pwszFunctionName)
195         return ERROR_INVALID_PARAMETER;
196
197     Res = RegCreateKeyExW(HKEY_LOCAL_MACHINE, ProvKey, 0, NULL, 0, KEY_WRITE, NULL, &Key, NULL);
198     if (Res != ERROR_SUCCESS) goto error_close_key;
199
200     /* Create the $DLL entry */
201     Res = RegSetValueExW(Key, Dll, 0, REG_SZ, (BYTE*)RegEntry.pwszDLLName,
202         (lstrlenW(RegEntry.pwszDLLName) + 1)*sizeof(WCHAR));
203     if (Res != ERROR_SUCCESS) goto error_close_key;
204
205     /* Create the $Function entry */
206     Res = RegSetValueExW(Key, Function, 0, REG_SZ, (BYTE*)RegEntry.pwszFunctionName,
207         (lstrlenW(RegEntry.pwszFunctionName) + 1)*sizeof(WCHAR));
208
209 error_close_key:
210     RegCloseKey(Key);
211
212     return Res;
213 }
214
215 /***********************************************************************
216  *              WintrustAddActionID (WINTRUST.@)
217  *
218  * Add the definitions of the actions a Trust provider can perform to
219  * the registry.
220  *
221  * PARAMS
222  *   pgActionID [I] Pointer to a GUID for the Trust provider.
223  *   fdwFlags   [I] Flag to indicate whether registry errors are passed on.
224  *   psProvInfo [I] Pointer to a structure with information about DLL
225  *                  name and functions.
226  *
227  * RETURNS
228  *   Success: TRUE.
229  *   Failure: FALSE. (Use GetLastError() for more information)
230  *
231  * NOTES
232  *   Adding definitions is basically only adding relevant information
233  *   to the registry. No verification takes place whether a DLL or it's
234  *   entrypoints exist.
235  *   Information in the registry will always be overwritten.
236  *
237  */
238 BOOL WINAPI WintrustAddActionID( GUID* pgActionID, DWORD fdwFlags,
239                                  CRYPT_REGISTER_ACTIONID* psProvInfo)
240 {
241     WCHAR GuidString[39];
242     LONG Res;
243     LONG WriteActionError = ERROR_SUCCESS;
244
245     TRACE("%s %x %p\n", debugstr_guid(pgActionID), fdwFlags, psProvInfo);
246
247     /* Some sanity checks.
248      * We use the W2K3 last error as it makes more sense (W2K leaves the last error
249      * as is).
250      */
251     if (!pgActionID ||
252         !psProvInfo ||
253         (psProvInfo->cbStruct != sizeof(CRYPT_REGISTER_ACTIONID)))
254     {
255         SetLastError(ERROR_INVALID_PARAMETER);
256         return FALSE;
257     }
258
259     /* Create this string only once, instead of in the helper function */
260     WINTRUST_Guid2Wstr( pgActionID, GuidString);
261
262     /* Write the information to the registry */
263     Res = WINTRUST_WriteProviderToReg(GuidString, Initialization  , psProvInfo->sInitProvider);
264     if (Res != ERROR_SUCCESS) WriteActionError = Res;
265     Res = WINTRUST_WriteProviderToReg(GuidString, Message         , psProvInfo->sObjectProvider);
266     if (Res != ERROR_SUCCESS) WriteActionError = Res;
267     Res = WINTRUST_WriteProviderToReg(GuidString, Signature       , psProvInfo->sSignatureProvider);
268     if (Res != ERROR_SUCCESS) WriteActionError = Res;
269     Res = WINTRUST_WriteProviderToReg(GuidString, Certificate     , psProvInfo->sCertificateProvider);
270     if (Res != ERROR_SUCCESS) WriteActionError = Res;
271     Res = WINTRUST_WriteProviderToReg(GuidString, CertCheck       , psProvInfo->sCertificatePolicyProvider);
272     if (Res != ERROR_SUCCESS) WriteActionError = Res;
273     Res = WINTRUST_WriteProviderToReg(GuidString, FinalPolicy     , psProvInfo->sFinalPolicyProvider);
274     if (Res != ERROR_SUCCESS) WriteActionError = Res;
275     Res = WINTRUST_WriteProviderToReg(GuidString, DiagnosticPolicy, psProvInfo->sTestPolicyProvider);
276     if (Res != ERROR_SUCCESS) WriteActionError = Res;
277     Res = WINTRUST_WriteProviderToReg(GuidString, Cleanup         , psProvInfo->sCleanupProvider);
278     if (Res != ERROR_SUCCESS) WriteActionError = Res;
279
280     /* Testing (by restricting access to the registry for some keys) shows that the last failing function
281      * will be used for last error.
282      * If the flag WT_ADD_ACTION_ID_RET_RESULT_FLAG is set and there are errors when adding the action
283      * we have to return FALSE. Errors includes both invalid entries as well as registry errors.
284      * Testing also showed that one error doesn't stop the registry writes. Every action will be dealt with.
285      */
286
287     if (WriteActionError != ERROR_SUCCESS)
288     {
289         SetLastError(WriteActionError);
290
291         if (fdwFlags == WT_ADD_ACTION_ID_RET_RESULT_FLAG)
292             return FALSE;
293     }
294
295     return TRUE;
296 }
297
298 /***********************************************************************
299  *              WINTRUST_RemoveProviderFromReg
300  *
301  * Helper function for WintrustRemoveActionID
302  *
303  */
304 static void WINTRUST_RemoveProviderFromReg(WCHAR* GuidString,
305                                            const WCHAR* FunctionType)
306 {
307     WCHAR ProvKey[MAX_PATH];
308
309     /* Create the needed key string */
310     ProvKey[0]='\0';
311     lstrcatW(ProvKey, Trust);
312     lstrcatW(ProvKey, FunctionType);
313     lstrcatW(ProvKey, GuidString);
314
315     /* We don't care about success or failure */
316     RegDeleteKeyW(HKEY_LOCAL_MACHINE, ProvKey);
317 }
318
319 /***********************************************************************
320  *              WintrustRemoveActionID (WINTRUST.@)
321  *
322  * Remove the definitions of the actions a Trust provider can perform
323  * from the registry.
324  *
325  * PARAMS
326  *   pgActionID [I] Pointer to a GUID for the Trust provider.
327  *
328  * RETURNS
329  *   Success: TRUE. (Use GetLastError() for more information)
330  *   Failure: FALSE. (Use GetLastError() for more information)
331  *
332  * NOTES
333  *   Testing shows that WintrustRemoveActionID always returns TRUE and
334  *   that a possible error should be retrieved via GetLastError().
335  *   There are no checks if the definitions are in the registry.
336  */
337 BOOL WINAPI WintrustRemoveActionID( GUID* pgActionID )
338 {
339     WCHAR GuidString[39];
340
341     TRACE("(%s)\n", debugstr_guid(pgActionID));
342  
343     if (!pgActionID)
344     {
345         SetLastError(ERROR_INVALID_PARAMETER);
346         return TRUE;
347     }
348
349     /* Create this string only once, instead of in the helper function */
350     WINTRUST_Guid2Wstr( pgActionID, GuidString);
351
352     /* We don't care about success or failure */
353     WINTRUST_RemoveProviderFromReg(GuidString, Initialization);
354     WINTRUST_RemoveProviderFromReg(GuidString, Message);
355     WINTRUST_RemoveProviderFromReg(GuidString, Signature);
356     WINTRUST_RemoveProviderFromReg(GuidString, Certificate);
357     WINTRUST_RemoveProviderFromReg(GuidString, CertCheck);
358     WINTRUST_RemoveProviderFromReg(GuidString, FinalPolicy);
359     WINTRUST_RemoveProviderFromReg(GuidString, DiagnosticPolicy);
360     WINTRUST_RemoveProviderFromReg(GuidString, Cleanup);
361
362     return TRUE;
363 }
364
365 /***********************************************************************
366  *              WINTRUST_WriteSingleUsageEntry
367  *
368  * Helper for WintrustAddDefaultForUsage, writes a single value and its
369  * data to:
370  *
371  * HKLM\Software\Microsoft\Cryptography\Trust\Usages\<OID>
372  */
373 static LONG WINTRUST_WriteSingleUsageEntry(LPCSTR OID,
374                                            const WCHAR* Value,
375                                            WCHAR* Data)
376 {
377     static const WCHAR Usages[] = {'U','s','a','g','e','s','\\', 0};
378     WCHAR* UsageKey;
379     HKEY Key;
380     LONG Res = ERROR_SUCCESS;
381     WCHAR* OIDW;
382     DWORD Len;
383
384     /* Turn OID into a wide-character string */
385     Len = MultiByteToWideChar( CP_ACP, 0, OID, -1, NULL, 0 );
386     OIDW = WINTRUST_Alloc( Len * sizeof(WCHAR) );
387     MultiByteToWideChar( CP_ACP, 0, OID, -1, OIDW, Len );
388
389     /* Allocate the needed space for UsageKey */
390     UsageKey = WINTRUST_Alloc((lstrlenW(Trust) + lstrlenW(Usages) + Len) * sizeof(WCHAR));
391     /* Create the key string */
392     lstrcpyW(UsageKey, Trust);
393     lstrcatW(UsageKey, Usages);
394     lstrcatW(UsageKey, OIDW);
395
396     Res = RegCreateKeyExW(HKEY_LOCAL_MACHINE, UsageKey, 0, NULL, 0, KEY_WRITE, NULL, &Key, NULL);
397     if (Res == ERROR_SUCCESS)
398     {
399         /* Create the Value entry */
400         Res = RegSetValueExW(Key, Value, 0, REG_SZ, (BYTE*)Data,
401                              (lstrlenW(Data) + 1)*sizeof(WCHAR));
402     }
403     RegCloseKey(Key);
404
405     WINTRUST_Free(OIDW);
406     WINTRUST_Free(UsageKey);
407
408     return Res;
409 }
410
411 /***************************************************************************
412  *              WINTRUST_RegisterGenVerifyV2
413  *
414  * Register WINTRUST_ACTION_GENERIC_VERIFY_V2 actions and usages.
415  *
416  * NOTES
417  *   WINTRUST_ACTION_GENERIC_VERIFY_V2 ({00AAC56B-CD44-11D0-8CC2-00C04FC295EE}
418  *   is defined in softpub.h
419  */
420 static BOOL WINTRUST_RegisterGenVerifyV2(void)
421 {
422     BOOL RegisteredOK = TRUE;
423     static GUID ProvGUID = WINTRUST_ACTION_GENERIC_VERIFY_V2;
424     CRYPT_REGISTER_ACTIONID ProvInfo;
425     CRYPT_PROVIDER_REGDEFUSAGE DefUsage = { sizeof(CRYPT_PROVIDER_REGDEFUSAGE),
426                                             &ProvGUID,
427                                             NULL,   /* No Dll provided */
428                                             NULL,   /* No load callback function */
429                                             NULL }; /* No free callback function */
430
431     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
432     ProvInfo.sInitProvider              = SoftpubInitialization;
433     ProvInfo.sObjectProvider            = SoftpubMessage;
434     ProvInfo.sSignatureProvider         = SoftpubSignature;
435     ProvInfo.sCertificateProvider       = SoftpubCertficate;
436     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
437     ProvInfo.sFinalPolicyProvider       = SoftpubFinalPolicy;
438     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
439     ProvInfo.sCleanupProvider           = SoftpubCleanup;
440
441     if (!WintrustAddDefaultForUsage(szOID_PKIX_KP_CODE_SIGNING, &DefUsage))
442         RegisteredOK = FALSE;
443
444     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
445         RegisteredOK = FALSE;
446
447     return RegisteredOK;
448 }
449
450 /***************************************************************************
451  *              WINTRUST_RegisterPublishedSoftware
452  *
453  * Register WIN_SPUB_ACTION_PUBLISHED_SOFTWARE actions and usages.
454  *
455  * NOTES
456  *   WIN_SPUB_ACTION_PUBLISHED_SOFTWARE ({64B9D180-8DA2-11CF-8736-00AA00A485EB})
457  *   is defined in wintrust.h
458  */
459 static BOOL WINTRUST_RegisterPublishedSoftware(void)
460 {
461     static GUID ProvGUID = WIN_SPUB_ACTION_PUBLISHED_SOFTWARE;
462     CRYPT_REGISTER_ACTIONID ProvInfo;
463
464     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
465     ProvInfo.sInitProvider              = SoftpubInitialization;
466     ProvInfo.sObjectProvider            = SoftpubMessage;
467     ProvInfo.sSignatureProvider         = SoftpubSignature;
468     ProvInfo.sCertificateProvider       = SoftpubCertficate;
469     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
470     ProvInfo.sFinalPolicyProvider       = SoftpubFinalPolicy;
471     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
472     ProvInfo.sCleanupProvider           = SoftpubCleanup;
473
474     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
475         return FALSE;
476
477     return TRUE;
478 }
479
480 #define WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI { 0xc6b2e8d0, 0xe005, 0x11cf, { 0xa1,0x34,0x00,0xc0,0x4f,0xd7,0xbf,0x43 }}
481
482 /***************************************************************************
483  *              WINTRUST_RegisterPublishedSoftwareNoBadUi
484  *
485  * Register WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI actions and usages.
486  *
487  * NOTES
488  *   WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI ({C6B2E8D0-E005-11CF-A134-00C04FD7BF43})
489  *   is not defined in any include file. (FIXME: Find out if the name is correct).
490  */
491 static BOOL WINTRUST_RegisterPublishedSoftwareNoBadUi(void)
492 {
493     static GUID ProvGUID = WIN_SPUB_ACTION_PUBLISHED_SOFTWARE_NOBADUI;
494     CRYPT_REGISTER_ACTIONID ProvInfo;
495
496     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
497     ProvInfo.sInitProvider              = SoftpubInitialization;
498     ProvInfo.sObjectProvider            = SoftpubMessage;
499     ProvInfo.sSignatureProvider         = SoftpubSignature;
500     ProvInfo.sCertificateProvider       = SoftpubCertficate;
501     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
502     ProvInfo.sFinalPolicyProvider       = SoftpubFinalPolicy;
503     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
504     ProvInfo.sCleanupProvider           = SoftpubCleanup;
505
506     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
507         return FALSE;
508
509     return TRUE;
510 }
511
512 /***************************************************************************
513  *              WINTRUST_RegisterGenCertVerify
514  *
515  * Register WINTRUST_ACTION_GENERIC_CERT_VERIFY actions and usages.
516  *
517  * NOTES
518  *   WINTRUST_ACTION_GENERIC_CERT_VERIFY ({189A3842-3041-11D1-85E1-00C04FC295EE})
519  *   is defined in softpub.h
520  */
521 static BOOL WINTRUST_RegisterGenCertVerify(void)
522 {
523     static GUID ProvGUID = WINTRUST_ACTION_GENERIC_CERT_VERIFY;
524     CRYPT_REGISTER_ACTIONID ProvInfo;
525
526     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
527     ProvInfo.sInitProvider              = SoftpubDefCertInit;
528     ProvInfo.sObjectProvider            = SoftpubMessage;
529     ProvInfo.sSignatureProvider         = SoftpubSignature;
530     ProvInfo.sCertificateProvider       = SoftpubCertficate;
531     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
532     ProvInfo.sFinalPolicyProvider       = SoftpubFinalPolicy;
533     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
534     ProvInfo.sCleanupProvider           = SoftpubCleanup;
535
536     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
537         return FALSE;
538
539     return TRUE;
540 }
541
542 /***************************************************************************
543  *              WINTRUST_RegisterTrustProviderTest
544  *
545  * Register WINTRUST_ACTION_TRUSTPROVIDER_TEST actions and usages.
546  *
547  * NOTES
548  *   WINTRUST_ACTION_TRUSTPROVIDER_TEST ({573E31F8-DDBA-11D0-8CCB-00C04FC295EE})
549  *   is defined in softpub.h
550  */
551 static BOOL WINTRUST_RegisterTrustProviderTest(void)
552 {
553     static GUID ProvGUID = WINTRUST_ACTION_TRUSTPROVIDER_TEST;
554     CRYPT_REGISTER_ACTIONID ProvInfo;
555
556     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
557     ProvInfo.sInitProvider              = SoftpubInitialization;
558     ProvInfo.sObjectProvider            = SoftpubMessage;
559     ProvInfo.sSignatureProvider         = SoftpubSignature;
560     ProvInfo.sCertificateProvider       = SoftpubCertficate;
561     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
562     ProvInfo.sFinalPolicyProvider       = SoftpubFinalPolicy;
563     ProvInfo.sTestPolicyProvider        = SoftpubDumpStructure;
564     ProvInfo.sCleanupProvider           = SoftpubCleanup;
565
566     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
567         return FALSE;
568
569     return TRUE;
570 }
571
572 /***************************************************************************
573  *              WINTRUST_RegisterHttpsProv
574  *
575  * Register HTTPSPROV_ACTION actions and usages.
576  *
577  * NOTES
578  *   HTTPSPROV_ACTION ({573E31F8-AABA-11D0-8CCB-00C04FC295EE})
579  *   is defined in softpub.h
580  */
581 static BOOL WINTRUST_RegisterHttpsProv(void)
582 {
583     BOOL RegisteredOK = TRUE;
584     static CHAR SoftpubLoadUsage[] = "SoftpubLoadDefUsageCallData";
585     static CHAR SoftpubFreeUsage[] = "SoftpubFreeDefUsageCallData";
586     static GUID ProvGUID = HTTPSPROV_ACTION;
587     CRYPT_REGISTER_ACTIONID ProvInfo;
588     CRYPT_PROVIDER_REGDEFUSAGE DefUsage = { sizeof(CRYPT_PROVIDER_REGDEFUSAGE),
589                                             &ProvGUID,
590                                             NULL, /* Will be filled later */
591                                             SoftpubLoadUsage,
592                                             SoftpubFreeUsage };
593
594     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
595     ProvInfo.sInitProvider              = SoftpubInitialization;
596     ProvInfo.sObjectProvider            = SoftpubMessage;
597     ProvInfo.sSignatureProvider         = SoftpubSignature;
598     ProvInfo.sCertificateProvider       = HTTPSCertificateTrust;
599     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
600     ProvInfo.sFinalPolicyProvider       = HTTPSFinalProv;
601     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
602     ProvInfo.sCleanupProvider           = SoftpubCleanup;
603
604     DefUsage.pwszDllName = WINTRUST_Alloc(sizeof(SP_POLICY_PROVIDER_DLL_NAME));
605     lstrcpyW(DefUsage.pwszDllName, SP_POLICY_PROVIDER_DLL_NAME);
606
607     if (!WintrustAddDefaultForUsage(szOID_PKIX_KP_SERVER_AUTH, &DefUsage))
608         RegisteredOK = FALSE;
609     if (!WintrustAddDefaultForUsage(szOID_PKIX_KP_CLIENT_AUTH, &DefUsage))
610         RegisteredOK = FALSE;
611     if (!WintrustAddDefaultForUsage(szOID_SERVER_GATED_CRYPTO, &DefUsage))
612         RegisteredOK = FALSE;
613     if (!WintrustAddDefaultForUsage(szOID_SGC_NETSCAPE, &DefUsage))
614         RegisteredOK = FALSE;
615
616     WINTRUST_Free(DefUsage.pwszDllName);
617
618     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
619         RegisteredOK = FALSE;
620
621     return RegisteredOK;
622 }
623
624 /***************************************************************************
625  *              WINTRUST_RegisterOfficeSignVerify
626  *
627  * Register OFFICESIGN_ACTION_VERIFY actions and usages.
628  *
629  * NOTES
630  *   OFFICESIGN_ACTION_VERIFY ({5555C2CD-17FB-11D1-85C4-00C04FC295EE})
631  *   is defined in softpub.h
632  */
633 static BOOL WINTRUST_RegisterOfficeSignVerify(void)
634 {
635     static GUID ProvGUID = OFFICESIGN_ACTION_VERIFY;
636     CRYPT_REGISTER_ACTIONID ProvInfo;
637
638     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
639     ProvInfo.sInitProvider              = OfficeInitializePolicy;
640     ProvInfo.sObjectProvider            = SoftpubMessage;
641     ProvInfo.sSignatureProvider         = SoftpubSignature;
642     ProvInfo.sCertificateProvider       = SoftpubCertficate;
643     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
644     ProvInfo.sFinalPolicyProvider       = SoftpubFinalPolicy;
645     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
646     ProvInfo.sCleanupProvider           = OfficeCleanupPolicy;
647
648
649     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
650         return FALSE;
651
652     return TRUE;
653 }
654
655 /***************************************************************************
656  *              WINTRUST_RegisterDriverVerify
657  *
658  * Register DRIVER_ACTION_VERIFY actions and usages.
659  *
660  * NOTES
661  *   DRIVER_ACTION_VERIFY ({F750E6C3-38EE-11D1-85E5-00C04FC295EE})
662  *   is defined in softpub.h
663  */
664 static BOOL WINTRUST_RegisterDriverVerify(void)
665 {
666     static GUID ProvGUID = DRIVER_ACTION_VERIFY;
667     CRYPT_REGISTER_ACTIONID ProvInfo;
668
669     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
670     ProvInfo.sInitProvider              = DriverInitializePolicy;
671     ProvInfo.sObjectProvider            = SoftpubMessage;
672     ProvInfo.sSignatureProvider         = SoftpubSignature;
673     ProvInfo.sCertificateProvider       = SoftpubCertficate;
674     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
675     ProvInfo.sFinalPolicyProvider       = DriverFinalPolicy;
676     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
677     ProvInfo.sCleanupProvider           = DriverCleanupPolicy;
678
679
680     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
681         return FALSE;
682
683     return TRUE;
684 }
685
686 /***************************************************************************
687  *              WINTRUST_RegisterGenChainVerify
688  *
689  * Register WINTRUST_ACTION_GENERIC_CHAIN_VERIFY actions and usages.
690  *
691  * NOTES
692  *   WINTRUST_ACTION_GENERIC_CHAIN_VERIFY ({FC451C16-AC75-11D1-B4B8-00C04FB66EA0})
693  *   is defined in softpub.h
694  */
695 static BOOL WINTRUST_RegisterGenChainVerify(void)
696 {
697     static GUID ProvGUID = WINTRUST_ACTION_GENERIC_CHAIN_VERIFY;
698     CRYPT_REGISTER_ACTIONID ProvInfo;
699
700     ProvInfo.cbStruct                   = sizeof(CRYPT_REGISTER_ACTIONID);
701     ProvInfo.sInitProvider              = SoftpubInitialization;
702     ProvInfo.sObjectProvider            = SoftpubMessage;
703     ProvInfo.sSignatureProvider         = SoftpubSignature;
704     ProvInfo.sCertificateProvider       = GenericChainCertificateTrust;
705     ProvInfo.sCertificatePolicyProvider = SoftpubCertCheck;
706     ProvInfo.sFinalPolicyProvider       = GenericChainFinalProv;
707     ProvInfo.sTestPolicyProvider        = NullCTRE; /* No diagnostic policy */
708     ProvInfo.sCleanupProvider           = SoftpubCleanup;
709
710     if (!WintrustAddActionID(&ProvGUID, 0, &ProvInfo))
711         return FALSE;
712
713     return TRUE;
714 }
715
716 /***********************************************************************
717  *              WintrustAddDefaultForUsage (WINTRUST.@)
718  *
719  * Write OID and callback functions to the registry.
720  *
721  * PARAMS
722  *   pszUsageOID [I] Pointer to a GUID.
723  *   psDefUsage  [I] Pointer to a structure that specifies the callback functions.
724  *
725  * RETURNS
726  *   Success: TRUE.
727  *   Failure: FALSE.
728  *
729  * NOTES
730  *   WintrustAddDefaultForUsage will only return TRUE or FALSE, no last 
731  *   error is set, not even when the registry cannot be written to.
732  */
733 BOOL WINAPI WintrustAddDefaultForUsage(const char *pszUsageOID,
734                                        CRYPT_PROVIDER_REGDEFUSAGE *psDefUsage)
735 {
736     static const WCHAR CBAlloc[]    = {'C','a','l','l','b','a','c','k','A','l','l','o','c','F','u','n','c','t','i','o','n', 0};
737     static const WCHAR CBFree[]     = {'C','a','l','l','b','a','c','k','F','r','e','e','F','u','n','c','t','i','o','n', 0};
738     LONG Res = ERROR_SUCCESS;
739     LONG WriteUsageError = ERROR_SUCCESS;
740     DWORD Len;
741     WCHAR GuidString[39];
742
743     TRACE("(%s %p)\n", debugstr_a(pszUsageOID), psDefUsage);
744
745     /* Some sanity checks. */
746     if (!pszUsageOID ||
747         !psDefUsage ||
748         !psDefUsage->pgActionID ||
749         (psDefUsage->cbStruct != sizeof(CRYPT_PROVIDER_REGDEFUSAGE)))
750     {
751         SetLastError(ERROR_INVALID_PARAMETER);
752         return FALSE;
753     }
754
755     if (psDefUsage->pwszDllName)
756     {
757         Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, Dll, psDefUsage->pwszDllName);
758         if (Res != ERROR_SUCCESS) WriteUsageError = Res;
759     }
760     if (psDefUsage->pwszLoadCallbackDataFunctionName)
761     {
762         WCHAR* CallbackW;
763
764         Len = MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszLoadCallbackDataFunctionName, -1, NULL, 0 );
765         CallbackW = WINTRUST_Alloc( Len * sizeof(WCHAR) );
766         MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszLoadCallbackDataFunctionName, -1, CallbackW, Len );
767
768         Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, CBAlloc, CallbackW);
769         if (Res != ERROR_SUCCESS) WriteUsageError = Res;
770
771         WINTRUST_Free(CallbackW);
772     }
773     if (psDefUsage->pwszFreeCallbackDataFunctionName)
774     {
775         WCHAR* CallbackW;
776
777         Len = MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszFreeCallbackDataFunctionName, -1, NULL, 0 );
778         CallbackW = WINTRUST_Alloc( Len * sizeof(WCHAR) );
779         MultiByteToWideChar( CP_ACP, 0, psDefUsage->pwszFreeCallbackDataFunctionName, -1, CallbackW, Len );
780
781         Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, CBFree, CallbackW);
782         if (Res != ERROR_SUCCESS) WriteUsageError = Res;
783
784         WINTRUST_Free(CallbackW);
785     }
786
787     WINTRUST_Guid2Wstr(psDefUsage->pgActionID, GuidString);
788     Res = WINTRUST_WriteSingleUsageEntry(pszUsageOID, DefaultId, GuidString);
789     if (Res != ERROR_SUCCESS) WriteUsageError = Res;
790
791     if (WriteUsageError != ERROR_SUCCESS)
792         return FALSE;
793
794     return TRUE;
795 }
796
797 static FARPROC WINTRUST_ReadProviderFromReg(WCHAR *GuidString, const WCHAR *FunctionType)
798 {
799     WCHAR ProvKey[MAX_PATH], DllName[MAX_PATH];
800     char FunctionName[MAX_PATH];
801     HKEY Key;
802     LONG Res = ERROR_SUCCESS;
803     DWORD Size;
804     HMODULE Lib;
805     FARPROC Func = NULL;
806
807     /* Create the needed key string */
808     ProvKey[0]='\0';
809     lstrcatW(ProvKey, Trust);
810     lstrcatW(ProvKey, FunctionType);
811     lstrcatW(ProvKey, GuidString);
812
813     Res = RegOpenKeyExW(HKEY_LOCAL_MACHINE, ProvKey, 0, KEY_READ, &Key);
814     if (Res != ERROR_SUCCESS) goto error_close_key;
815
816     /* Read the $DLL entry */
817     Size = sizeof(DllName);
818     Res = RegQueryValueExW(Key, Dll, NULL, NULL, (LPBYTE)DllName, &Size);
819     if (Res != ERROR_SUCCESS) goto error_close_key;
820
821     /* Read the $Function entry */
822     Size = sizeof(FunctionName);
823     Res = RegQueryValueExA(Key, "$Function", NULL, NULL, (LPBYTE)FunctionName, &Size);
824     if (Res != ERROR_SUCCESS) goto error_close_key;
825
826     /* Load the library - there appears to be no way to close a provider, so
827      * just leak the module handle.
828      */
829     Lib = LoadLibraryW(DllName);
830     Func = GetProcAddress(Lib, FunctionName);
831
832 error_close_key:
833     RegCloseKey(Key);
834
835     return Func;
836 }
837
838 /***********************************************************************
839  *              WintrustLoadFunctionPointers (WINTRUST.@)
840  */
841 BOOL WINAPI WintrustLoadFunctionPointers( GUID* pgActionID,
842                                           CRYPT_PROVIDER_FUNCTIONS* pPfns )
843 {
844     WCHAR GuidString[39];
845
846     TRACE("(%s %p)\n", debugstr_guid(pgActionID), pPfns);
847
848     if (!pPfns) return FALSE;
849     if (!pgActionID)
850     {
851         SetLastError(ERROR_INVALID_PARAMETER);
852         return FALSE;
853     }
854     if (pPfns->cbStruct != sizeof(CRYPT_PROVIDER_FUNCTIONS)) return FALSE;
855
856     /* Create this string only once, instead of in the helper function */
857     WINTRUST_Guid2Wstr( pgActionID, GuidString);
858
859     /* Get the function pointers from the registry, where applicable */
860     pPfns->pfnAlloc = WINTRUST_Alloc;
861     pPfns->pfnFree = WINTRUST_Free;
862     pPfns->pfnAddStore2Chain = WINTRUST_AddStore;
863     pPfns->pfnAddSgnr2Chain = WINTRUST_AddSgnr;
864     pPfns->pfnAddCert2Chain = WINTRUST_AddCert;
865     pPfns->pfnAddPrivData2Chain = WINTRUST_AddPrivData;
866     pPfns->psUIpfns = NULL;
867     pPfns->pfnInitialize = (PFN_PROVIDER_INIT_CALL)WINTRUST_ReadProviderFromReg(GuidString, Initialization);
868     pPfns->pfnObjectTrust = (PFN_PROVIDER_OBJTRUST_CALL)WINTRUST_ReadProviderFromReg(GuidString, Message);
869     pPfns->pfnSignatureTrust = (PFN_PROVIDER_SIGTRUST_CALL)WINTRUST_ReadProviderFromReg(GuidString, Signature);
870     pPfns->pfnCertificateTrust = (PFN_PROVIDER_CERTTRUST_CALL)WINTRUST_ReadProviderFromReg(GuidString, Certificate);
871     pPfns->pfnCertCheckPolicy = (PFN_PROVIDER_CERTCHKPOLICY_CALL)WINTRUST_ReadProviderFromReg(GuidString, CertCheck);
872     pPfns->pfnFinalPolicy = (PFN_PROVIDER_FINALPOLICY_CALL)WINTRUST_ReadProviderFromReg(GuidString, FinalPolicy);
873     pPfns->pfnTestFinalPolicy = (PFN_PROVIDER_TESTFINALPOLICY_CALL)WINTRUST_ReadProviderFromReg(GuidString, DiagnosticPolicy);
874     pPfns->pfnCleanupPolicy = (PFN_PROVIDER_CLEANUP_CALL)WINTRUST_ReadProviderFromReg(GuidString, Cleanup);
875
876     return TRUE;
877 }
878
879 /***********************************************************************
880  *              WINTRUST_SIPPAddProvider
881  *
882  * Helper for DllRegisterServer.
883  */
884 static BOOL WINTRUST_SIPPAddProvider(GUID* Subject, WCHAR* MagicNumber)
885 {
886     static WCHAR CryptSIPGetSignedDataMsg[] =
887         {'C','r','y','p','t','S','I','P','G','e','t','S','i','g','n','e','d','D','a','t','a','M','s','g', 0};
888     static WCHAR CryptSIPPutSignedDataMsg[] =
889         {'C','r','y','p','t','S','I','P','P','u','t','S','i','g','n','e','d','D','a','t','a','M','s','g', 0};
890     static WCHAR CryptSIPCreateIndirectData[] =
891         {'C','r','y','p','t','S','I','P','C','r','e','a','t','e','I','n','d','i','r','e','c','t','D','a','t','a', 0};
892     static WCHAR CryptSIPVerifyIndirectData[] =
893         {'C','r','y','p','t','S','I','P','V','e','r','i','f','y','I','n','d','i','r','e','c','t','D','a','t','a', 0};
894     static WCHAR CryptSIPRemoveSignedDataMsg[] =
895         {'C','r','y','p','t','S','I','P','R','e','m','o','v','e','S','i','g','n','e','d','D','a','t','a','M','s','g', 0};
896     SIP_ADD_NEWPROVIDER NewProv;
897     BOOL Ret;
898
899     /* Clear and initialize the structure */
900     memset(&NewProv, 0, sizeof(SIP_ADD_NEWPROVIDER));
901     NewProv.cbStruct = sizeof(SIP_ADD_NEWPROVIDER);
902     NewProv.pwszDLLFileName = WINTRUST_Alloc(sizeof(SP_POLICY_PROVIDER_DLL_NAME));
903     /* Fill the structure */
904     NewProv.pgSubject              = Subject;
905     lstrcpyW(NewProv.pwszDLLFileName, SP_POLICY_PROVIDER_DLL_NAME);
906     NewProv.pwszMagicNumber        = MagicNumber;
907     NewProv.pwszIsFunctionName     = NULL;
908     NewProv.pwszGetFuncName        = CryptSIPGetSignedDataMsg;
909     NewProv.pwszPutFuncName        = CryptSIPPutSignedDataMsg;
910     NewProv.pwszCreateFuncName     = CryptSIPCreateIndirectData;
911     NewProv.pwszVerifyFuncName     = CryptSIPVerifyIndirectData;
912     NewProv.pwszRemoveFuncName     = CryptSIPRemoveSignedDataMsg;
913     NewProv.pwszIsFunctionNameFmt2 = NULL;
914
915     Ret = CryptSIPAddProvider(&NewProv);
916
917     WINTRUST_Free(NewProv.pwszDLLFileName);
918  
919     return Ret;
920 }
921
922 /***********************************************************************
923  *              DllRegisterServer (WINTRUST.@)
924  */
925 HRESULT WINAPI DllRegisterServer(void)
926 {
927     static const CHAR SpcPeImageDataEncode[]           = "WVTAsn1SpcPeImageDataEncode";
928     static const CHAR SpcPeImageDataDecode[]           = "WVTAsn1SpcPeImageDataDecode";
929     static const CHAR SpcLinkEncode[]                  = "WVTAsn1SpcLinkEncode";
930     static const CHAR SpcLinkDecode[]                  = "WVTAsn1SpcLinkDecode";
931     static const CHAR SpcSigInfoEncode[]               = "WVTAsn1SpcSigInfoEncode";
932     static const CHAR SpcSigInfoDecode[]               = "WVTAsn1SpcSigInfoDecode";
933     static const CHAR SpcIndirectDataContentEncode[]   = "WVTAsn1SpcIndirectDataContentEncode";
934     static const CHAR SpcIndirectDataContentDecode[]   = "WVTAsn1SpcIndirectDataContentDecode";
935     static const CHAR SpcSpAgencyInfoEncode[]          = "WVTAsn1SpcSpAgencyInfoEncode";
936     static const CHAR SpcSpAgencyInfoDecode[]          = "WVTAsn1SpcSpAgencyInfoDecode";
937     static const CHAR SpcMinimalCriteriaInfoEncode[]   = "WVTAsn1SpcMinimalCriteriaInfoEncode";
938     static const CHAR SpcMinimalCriteriaInfoDecode[]   = "WVTAsn1SpcMinimalCriteriaInfoDecode";
939     static const CHAR SpcFinancialCriteriaInfoEncode[] = "WVTAsn1SpcFinancialCriteriaInfoEncode";
940     static const CHAR SpcFinancialCriteriaInfoDecode[] = "WVTAsn1SpcFinancialCriteriaInfoDecode";
941     static const CHAR SpcStatementTypeEncode[]         = "WVTAsn1SpcStatementTypeEncode";
942     static const CHAR SpcStatementTypeDecode[]         = "WVTAsn1SpcStatementTypeDecode";
943     static const CHAR CatNameValueEncode[]             = "WVTAsn1CatNameValueEncode";
944     static const CHAR CatNameValueDecode[]             = "WVTAsn1CatNameValueDecode";
945     static const CHAR CatMemberInfoEncode[]            = "WVTAsn1CatMemberInfoEncode";
946     static const CHAR CatMemberInfoDecode[]            = "WVTAsn1CatMemberInfoDecode";
947     static const CHAR SpcSpOpusInfoEncode[]            = "WVTAsn1SpcSpOpusInfoEncode";
948     static const CHAR SpcSpOpusInfoDecode[]            = "WVTAsn1SpcSpOpusInfoDecode";
949     static GUID Unknown1 = { 0xDE351A42, 0x8E59, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
950     static GUID Unknown2 = { 0xC689AABA, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
951     static GUID Unknown3 = { 0xC689AAB8, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
952     static GUID Unknown4 = { 0xC689AAB9, 0x8E78, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
953     static GUID Unknown5 = { 0xDE351A43, 0x8E59, 0x11D0, { 0x8C,0x47,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
954     static GUID Unknown6 = { 0x9BA61D3F, 0xE73A, 0x11D0, { 0x8C,0xD2,0x00,0xC0,0x4F,0xC2,0x95,0xEE }};
955     static WCHAR MagicNumber2[] = {'M','S','C','F', 0};
956     static WCHAR MagicNumber3[] = {'0','x','0','0','0','0','4','5','5','0', 0};
957     static WCHAR CafeBabe[] = {'0','x','c','a','f','e','b','a','b','e', 0};
958
959     HRESULT CryptRegisterRes = S_OK;
960     HRESULT TrustProviderRes = S_OK;
961     HRESULT SIPAddProviderRes = S_OK;
962
963     TRACE("\n");
964
965     /* Testing on native shows that when an error is encountered in one of the CryptRegisterOIDFunction calls
966      * the rest of these calls is skipped. Registering is however continued for the trust providers.
967      *
968      * We are not totally in line with native as there all decoding functions are registered after all encoding
969      * functions.
970      */
971 #define WINTRUST_REGISTEROID( oid, encode_funcname, decode_funcname ) \
972     do { \
973         if (!CryptRegisterOIDFunction(X509_ASN_ENCODING, CRYPT_OID_ENCODE_OBJECT_FUNC, oid, SP_POLICY_PROVIDER_DLL_NAME, encode_funcname)) \
974         {                                                               \
975             CryptRegisterRes = HRESULT_FROM_WIN32(GetLastError());      \
976             goto add_trust_providers;                                   \
977         }                                                               \
978         if (!CryptRegisterOIDFunction(X509_ASN_ENCODING, CRYPT_OID_DECODE_OBJECT_FUNC, oid, SP_POLICY_PROVIDER_DLL_NAME, decode_funcname)) \
979         {                                                               \
980             CryptRegisterRes = HRESULT_FROM_WIN32(GetLastError());      \
981             goto add_trust_providers;                                   \
982         }                                                               \
983     } while (0)
984
985     WINTRUST_REGISTEROID(SPC_PE_IMAGE_DATA_OBJID, SpcPeImageDataEncode, SpcPeImageDataDecode);
986     WINTRUST_REGISTEROID(SPC_PE_IMAGE_DATA_STRUCT, SpcPeImageDataEncode, SpcPeImageDataDecode);
987     WINTRUST_REGISTEROID(SPC_CAB_DATA_OBJID, SpcLinkEncode, SpcLinkDecode);
988     WINTRUST_REGISTEROID(SPC_CAB_DATA_STRUCT, SpcLinkEncode, SpcLinkDecode);
989     WINTRUST_REGISTEROID(SPC_JAVA_CLASS_DATA_OBJID, SpcLinkEncode, SpcLinkDecode);
990     WINTRUST_REGISTEROID(SPC_JAVA_CLASS_DATA_STRUCT, SpcLinkEncode, SpcLinkDecode);
991     WINTRUST_REGISTEROID(SPC_LINK_OBJID, SpcLinkEncode, SpcLinkDecode);
992     WINTRUST_REGISTEROID(SPC_LINK_STRUCT, SpcLinkEncode, SpcLinkDecode);
993     WINTRUST_REGISTEROID(SPC_SIGINFO_OBJID, SpcSigInfoEncode, SpcSigInfoDecode);
994     WINTRUST_REGISTEROID(SPC_SIGINFO_STRUCT, SpcSigInfoEncode, SpcSigInfoDecode);
995     WINTRUST_REGISTEROID(SPC_INDIRECT_DATA_OBJID, SpcIndirectDataContentEncode, SpcIndirectDataContentDecode);
996     WINTRUST_REGISTEROID(SPC_INDIRECT_DATA_CONTENT_STRUCT, SpcIndirectDataContentEncode, SpcIndirectDataContentDecode);
997     WINTRUST_REGISTEROID(SPC_SP_AGENCY_INFO_OBJID, SpcSpAgencyInfoEncode, SpcSpAgencyInfoDecode);
998     WINTRUST_REGISTEROID(SPC_SP_AGENCY_INFO_STRUCT, SpcSpAgencyInfoEncode, SpcSpAgencyInfoDecode);
999     WINTRUST_REGISTEROID(SPC_MINIMAL_CRITERIA_OBJID, SpcMinimalCriteriaInfoEncode, SpcMinimalCriteriaInfoDecode);
1000     WINTRUST_REGISTEROID(SPC_MINIMAL_CRITERIA_STRUCT, SpcMinimalCriteriaInfoEncode, SpcMinimalCriteriaInfoDecode);
1001     WINTRUST_REGISTEROID(SPC_FINANCIAL_CRITERIA_OBJID, SpcFinancialCriteriaInfoEncode, SpcFinancialCriteriaInfoDecode);
1002     WINTRUST_REGISTEROID(SPC_FINANCIAL_CRITERIA_STRUCT, SpcFinancialCriteriaInfoEncode, SpcFinancialCriteriaInfoDecode);
1003     WINTRUST_REGISTEROID(SPC_STATEMENT_TYPE_OBJID, SpcStatementTypeEncode, SpcStatementTypeDecode);
1004     WINTRUST_REGISTEROID(SPC_STATEMENT_TYPE_STRUCT, SpcStatementTypeEncode, SpcStatementTypeDecode);
1005     WINTRUST_REGISTEROID(CAT_NAMEVALUE_OBJID, CatNameValueEncode, CatNameValueDecode);
1006     WINTRUST_REGISTEROID(CAT_NAMEVALUE_STRUCT, CatNameValueEncode, CatNameValueDecode);
1007     WINTRUST_REGISTEROID(CAT_MEMBERINFO_OBJID, CatMemberInfoEncode, CatMemberInfoDecode);
1008     WINTRUST_REGISTEROID(CAT_MEMBERINFO_STRUCT, CatMemberInfoEncode, CatMemberInfoDecode);
1009     WINTRUST_REGISTEROID(SPC_SP_OPUS_INFO_OBJID, SpcSpOpusInfoEncode, SpcSpOpusInfoDecode);
1010     WINTRUST_REGISTEROID(SPC_SP_OPUS_INFO_STRUCT, SpcSpOpusInfoEncode,  SpcSpOpusInfoDecode);
1011
1012 #undef WINTRUST_REGISTEROID
1013
1014 add_trust_providers:
1015
1016     /* Testing on W2K3 shows:
1017      * All registry writes are tried. If one fails this part will return S_FALSE.
1018      *
1019      * Last error is set to the last error encountered, regardless if the first
1020      * part failed or not.
1021      */
1022
1023     /* Create the necessary action registry structures */
1024     WINTRUST_InitRegStructs();
1025
1026     /* Register several Trust Provider actions */
1027     if (!WINTRUST_RegisterGenVerifyV2())
1028         TrustProviderRes = S_FALSE;
1029     if (!WINTRUST_RegisterPublishedSoftware())
1030         TrustProviderRes = S_FALSE;
1031     if (!WINTRUST_RegisterPublishedSoftwareNoBadUi())
1032         TrustProviderRes = S_FALSE;
1033     if (!WINTRUST_RegisterGenCertVerify())
1034         TrustProviderRes = S_FALSE;
1035     if (!WINTRUST_RegisterTrustProviderTest())
1036         TrustProviderRes = S_FALSE;
1037     if (!WINTRUST_RegisterHttpsProv())
1038         TrustProviderRes = S_FALSE;
1039     if (!WINTRUST_RegisterOfficeSignVerify())
1040         TrustProviderRes = S_FALSE;
1041     if (!WINTRUST_RegisterDriverVerify())
1042         TrustProviderRes = S_FALSE;
1043     if (!WINTRUST_RegisterGenChainVerify())
1044         TrustProviderRes = S_FALSE;
1045
1046     /* Free the registry structures */
1047     WINTRUST_FreeRegStructs();
1048
1049     /* Testing on W2K3 shows:
1050      * All registry writes are tried. If one fails this part will return S_FALSE.
1051      *
1052      * Last error is set to the last error encountered, regardless if the previous
1053      * parts failed or not.
1054      */
1055
1056     if (!WINTRUST_SIPPAddProvider(&Unknown1, NULL))
1057         SIPAddProviderRes = S_FALSE;
1058     if (!WINTRUST_SIPPAddProvider(&Unknown2, MagicNumber2))
1059         SIPAddProviderRes = S_FALSE;
1060     if (!WINTRUST_SIPPAddProvider(&Unknown3, MagicNumber3))
1061         SIPAddProviderRes = S_FALSE;
1062     if (!WINTRUST_SIPPAddProvider(&Unknown4, CafeBabe))
1063         SIPAddProviderRes = S_FALSE;
1064     if (!WINTRUST_SIPPAddProvider(&Unknown5, CafeBabe))
1065         SIPAddProviderRes = S_FALSE;
1066     if (!WINTRUST_SIPPAddProvider(&Unknown6, CafeBabe))
1067         SIPAddProviderRes = S_FALSE;
1068
1069     /* Native does a CryptSIPRemoveProvider here for {941C2937-1292-11D1-85BE-00C04FC295EE}.
1070      * This SIP Provider is however not found on up-to-date window install and native will
1071      * set the last error to ERROR_FILE_NOT_FOUND.
1072      * Wine has the last error set to ERROR_INVALID_PARAMETER. There shouldn't be an app
1073      * depending on this last error though so there is no need to imitate native to the full extent.
1074      *
1075      * (The ERROR_INVALID_PARAMETER for Wine it totally valid as we (and native) do register
1076      * a trust provider without a diagnostic policy).
1077      */
1078
1079     /* If CryptRegisterRes is not S_OK it will always overrule the return value. */
1080     if (CryptRegisterRes != S_OK)
1081         return CryptRegisterRes;
1082     else if (SIPAddProviderRes == S_OK)
1083         return TrustProviderRes;
1084     else 
1085         return SIPAddProviderRes;
1086 }
1087
1088 /***********************************************************************
1089  *              DllUnregisterServer (WINTRUST.@)
1090  */
1091 HRESULT WINAPI DllUnregisterServer(void)
1092 {
1093      FIXME("stub\n");
1094      return S_OK;
1095 }
1096
1097 /***********************************************************************
1098  *              SoftpubDllRegisterServer (WINTRUST.@)
1099  *
1100  * Registers softpub.dll
1101  *
1102  * PARAMS
1103  *
1104  * RETURNS
1105  *  Success: S_OK.
1106  *  Failure: S_FALSE. (See also GetLastError()).
1107  *
1108  * NOTES
1109  *  DllRegisterServer in softpub.dll will call this function.
1110  *  See comments in DllRegisterServer.
1111  */
1112 HRESULT WINAPI SoftpubDllRegisterServer(void)
1113 {
1114     HRESULT TrustProviderRes = S_OK;
1115
1116     TRACE("\n");
1117
1118     /* Create the necessary action registry structures */
1119     WINTRUST_InitRegStructs();
1120
1121     /* Register several Trust Provider actions */
1122     if (!WINTRUST_RegisterGenVerifyV2())
1123         TrustProviderRes = S_FALSE;
1124     if (!WINTRUST_RegisterPublishedSoftware())
1125         TrustProviderRes = S_FALSE;
1126     if (!WINTRUST_RegisterPublishedSoftwareNoBadUi())
1127         TrustProviderRes = S_FALSE;
1128     if (!WINTRUST_RegisterGenCertVerify())
1129         TrustProviderRes = S_FALSE;
1130     if (!WINTRUST_RegisterTrustProviderTest())
1131         TrustProviderRes = S_FALSE;
1132     if (!WINTRUST_RegisterHttpsProv())
1133         TrustProviderRes = S_FALSE;
1134     if (!WINTRUST_RegisterOfficeSignVerify())
1135         TrustProviderRes = S_FALSE;
1136     if (!WINTRUST_RegisterDriverVerify())
1137         TrustProviderRes = S_FALSE;
1138     if (!WINTRUST_RegisterGenChainVerify())
1139         TrustProviderRes = S_FALSE;
1140
1141     /* Free the registry structures */
1142     WINTRUST_FreeRegStructs();
1143
1144     return TrustProviderRes;
1145 }
1146
1147 /***********************************************************************
1148  *              SoftpubDllUnregisterServer (WINTRUST.@)
1149  */
1150 HRESULT WINAPI SoftpubDllUnregisterServer(void)
1151 {
1152      FIXME("stub\n");
1153      return S_OK;
1154 }
1155
1156 /***********************************************************************
1157  *              mscat32DllRegisterServer (WINTRUST.@)
1158  */
1159 HRESULT WINAPI mscat32DllRegisterServer(void)
1160 {
1161      FIXME("stub\n");
1162      return S_OK;
1163 }
1164
1165 /***********************************************************************
1166  *              mscat32DllUnregisterServer (WINTRUST.@)
1167  */
1168 HRESULT WINAPI mscat32DllUnregisterServer(void)
1169 {
1170      FIXME("stub\n");
1171      return S_OK;
1172 }
1173
1174 /***********************************************************************
1175  *              mssip32DllRegisterServer (WINTRUST.@)
1176  */
1177 HRESULT WINAPI mssip32DllRegisterServer(void)
1178 {
1179      FIXME("stub\n");
1180      return S_OK;
1181 }
1182
1183 /***********************************************************************
1184  *              mssip32DllUnregisterServer (WINTRUST.@)
1185  */
1186 HRESULT WINAPI mssip32DllUnregisterServer(void)
1187 {
1188      FIXME("stub\n");
1189      return S_OK;
1190 }