kernel32: Free profile before reloading.
[wine] / dlls / crypt32 / decode.c
1 /*
2  * Copyright 2005-2008 Juan Lang
3  *
4  * This library is free software; you can redistribute it and/or
5  * modify it under the terms of the GNU Lesser General Public
6  * License as published by the Free Software Foundation; either
7  * version 2.1 of the License, or (at your option) any later version.
8  *
9  * This library is distributed in the hope that it will be useful,
10  * but WITHOUT ANY WARRANTY; without even the implied warranty of
11  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
12  * Lesser General Public License for more details.
13  *
14  * You should have received a copy of the GNU Lesser General Public
15  * License along with this library; if not, write to the Free Software
16  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
17  *
18  * This file implements ASN.1 DER decoding of a limited set of types.
19  * It isn't a full ASN.1 implementation.  Microsoft implements BER
20  * encoding of many of the basic types in msasn1.dll, but that interface isn't
21  * implemented, so I implement them here.
22  *
23  * References:
24  * "A Layman's Guide to a Subset of ASN.1, BER, and DER", by Burton Kaliski
25  * (available online, look for a PDF copy as the HTML versions tend to have
26  * translation errors.)
27  *
28  * RFC3280, http://www.faqs.org/rfcs/rfc3280.html
29  *
30  * MSDN, especially "Constants for CryptEncodeObject and CryptDecodeObject"
31  */
32
33 #include "config.h"
34 #include "wine/port.h"
35
36 #include <assert.h>
37 #include <stdarg.h>
38 #include <stdio.h>
39 #include <stdlib.h>
40
41 #define NONAMELESSUNION
42
43 #include "windef.h"
44 #include "winbase.h"
45 #include "wincrypt.h"
46 #include "winnls.h"
47 #include "snmp.h"
48 #include "wine/debug.h"
49 #include "wine/exception.h"
50 #include "crypt32_private.h"
51
52 /* This is a bit arbitrary, but to set some limit: */
53 #define MAX_ENCODED_LEN 0x02000000
54
55 #define ASN_FLAGS_MASK 0xe0
56 #define ASN_TYPE_MASK  0x1f
57
58 WINE_DEFAULT_DEBUG_CHANNEL(cryptasn);
59 WINE_DECLARE_DEBUG_CHANNEL(crypt);
60
61 struct GenericArray
62 {
63     DWORD cItems;
64     BYTE *rgItems;
65 };
66
67 typedef BOOL (WINAPI *CryptDecodeObjectFunc)(DWORD, LPCSTR, const BYTE *,
68  DWORD, DWORD, void *, DWORD *);
69 typedef BOOL (WINAPI *CryptDecodeObjectExFunc)(DWORD, LPCSTR, const BYTE *,
70  DWORD, DWORD, PCRYPT_DECODE_PARA, void *, DWORD *);
71
72 /* Internal decoders don't do memory allocation or exception handling, and
73  * they report how many bytes they decoded.
74  */
75 typedef BOOL (*InternalDecodeFunc)(const BYTE *pbEncoded, DWORD cbEncoded,
76  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded);
77
78 static BOOL CRYPT_AsnDecodeChoiceOfTimeInternal(const BYTE *pbEncoded,
79  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
80  DWORD *pcbDecoded);
81 static BOOL CRYPT_AsnDecodePubKeyInfoInternal(const BYTE *pbEncoded,
82  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
83  DWORD *pcbDecoded);
84 /* Like CRYPT_AsnDecodeExtensions, except assumes rgExtension is set ahead of
85  * time, doesn't do memory allocation, and doesn't do exception handling.
86  */
87 static BOOL CRYPT_AsnDecodeExtensionsInternal(const BYTE *pbEncoded,
88  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
89  DWORD *pcbDecoded);
90 /* Assumes algo->Parameters.pbData is set ahead of time. */
91 static BOOL CRYPT_AsnDecodeAlgorithmId(const BYTE *pbEncoded, DWORD cbEncoded,
92  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded);
93 static BOOL CRYPT_AsnDecodeBool(const BYTE *pbEncoded, DWORD cbEncoded,
94  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded);
95 /* Assumes the CRYPT_DATA_BLOB's pbData member has been initialized */
96 static BOOL CRYPT_AsnDecodeOctetsInternal(const BYTE *pbEncoded,
97  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
98  DWORD *pcbDecoded);
99 /* Doesn't check the tag, assumes the caller does so */
100 static BOOL CRYPT_AsnDecodeBitsInternal(const BYTE *pbEncoded, DWORD cbEncoded,
101  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded);
102 static BOOL CRYPT_AsnDecodeIntInternal(const BYTE *pbEncoded, DWORD cbEncoded,
103  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded);
104 /* Like CRYPT_AsnDecodeInteger, but assumes the CRYPT_INTEGER_BLOB's pbData
105  * member has been initialized, doesn't do exception handling, and doesn't do
106  * memory allocation.  Also doesn't check tag, assumes the caller has checked
107  * it.
108  */
109 static BOOL CRYPT_AsnDecodeIntegerInternal(const BYTE *pbEncoded,
110  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
111  DWORD *pcbDecoded);
112 /* Like CRYPT_AsnDecodeInteger, but unsigned.  */
113 static BOOL CRYPT_AsnDecodeUnsignedIntegerInternal(const BYTE *pbEncoded,
114  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
115  DWORD *pcbDecoded);
116 static BOOL CRYPT_AsnDecodePKCSAttributesInternal(const BYTE *pbEncoded,
117  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
118  DWORD *pcbDecoded);
119
120 /* Gets the number of length bytes from the given (leading) length byte */
121 #define GET_LEN_BYTES(b) ((b) <= 0x80 ? 1 : 1 + ((b) & 0x7f))
122
123 /* Helper function to get the encoded length of the data starting at pbEncoded,
124  * where pbEncoded[0] is the tag.  If the data are too short to contain a
125  * length or if the length is too large for cbEncoded, sets an appropriate
126  * error code and returns FALSE.  If the encoded length is unknown due to
127  * indefinite length encoding, *len is set to CMSG_INDEFINITE_LENGTH.
128  */
129 static BOOL CRYPT_GetLengthIndefinite(const BYTE *pbEncoded, DWORD cbEncoded,
130  DWORD *len)
131 {
132     BOOL ret;
133
134     if (cbEncoded <= 1)
135     {
136         SetLastError(CRYPT_E_ASN1_CORRUPT);
137         ret = FALSE;
138     }
139     else if (pbEncoded[1] <= 0x7f)
140     {
141         if (pbEncoded[1] + 1 > cbEncoded)
142         {
143             SetLastError(CRYPT_E_ASN1_EOD);
144             ret = FALSE;
145         }
146         else
147         {
148             *len = pbEncoded[1];
149             ret = TRUE;
150         }
151     }
152     else if (pbEncoded[1] == 0x80)
153     {
154         *len = CMSG_INDEFINITE_LENGTH;
155         ret = TRUE;
156     }
157     else
158     {
159         BYTE lenLen = GET_LEN_BYTES(pbEncoded[1]);
160
161         if (lenLen > sizeof(DWORD) + 1)
162         {
163             SetLastError(CRYPT_E_ASN1_LARGE);
164             ret = FALSE;
165         }
166         else if (lenLen + 2 > cbEncoded)
167         {
168             SetLastError(CRYPT_E_ASN1_CORRUPT);
169             ret = FALSE;
170         }
171         else
172         {
173             DWORD out = 0;
174
175             pbEncoded += 2;
176             while (--lenLen)
177             {
178                 out <<= 8;
179                 out |= *pbEncoded++;
180             }
181             if (out + lenLen + 1 > cbEncoded)
182             {
183                 SetLastError(CRYPT_E_ASN1_EOD);
184                 ret = FALSE;
185             }
186             else
187             {
188                 *len = out;
189                 ret = TRUE;
190             }
191         }
192     }
193     return ret;
194 }
195
196 /* Like CRYPT_GetLengthIndefinite, but disallows indefinite-length encoding. */
197 static BOOL CRYPT_GetLen(const BYTE *pbEncoded, DWORD cbEncoded, DWORD *len)
198 {
199     BOOL ret;
200
201     if ((ret = CRYPT_GetLengthIndefinite(pbEncoded, cbEncoded, len)) &&
202      *len == CMSG_INDEFINITE_LENGTH)
203     {
204         SetLastError(CRYPT_E_ASN1_CORRUPT);
205         ret = FALSE;
206     }
207     return ret;
208 }
209
210 /* Helper function to check *pcbStructInfo, set it to the required size, and
211  * optionally to allocate memory.  Assumes pvStructInfo is not NULL.
212  * If CRYPT_DECODE_ALLOC_FLAG is set in dwFlags, *pvStructInfo will be set to a
213  * pointer to the newly allocated memory.
214  */
215 static BOOL CRYPT_DecodeEnsureSpace(DWORD dwFlags,
216  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo,
217  DWORD bytesNeeded)
218 {
219     BOOL ret = TRUE;
220
221     if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
222     {
223         if (pDecodePara && pDecodePara->pfnAlloc)
224             *(BYTE **)pvStructInfo = pDecodePara->pfnAlloc(bytesNeeded);
225         else
226             *(BYTE **)pvStructInfo = LocalAlloc(0, bytesNeeded);
227         if (!*(BYTE **)pvStructInfo)
228             ret = FALSE;
229         else
230             *pcbStructInfo = bytesNeeded;
231     }
232     else if (*pcbStructInfo < bytesNeeded)
233     {
234         *pcbStructInfo = bytesNeeded;
235         SetLastError(ERROR_MORE_DATA);
236         ret = FALSE;
237     }
238     else
239         *pcbStructInfo = bytesNeeded;
240     return ret;
241 }
242
243 static void CRYPT_FreeSpace(PCRYPT_DECODE_PARA pDecodePara, LPVOID pv)
244 {
245     if (pDecodePara && pDecodePara->pfnFree)
246         pDecodePara->pfnFree(pv);
247     else
248         LocalFree(pv);
249 }
250
251 /* Helper function to check *pcbStructInfo and set it to the required size.
252  * Assumes pvStructInfo is not NULL.
253  */
254 static BOOL CRYPT_DecodeCheckSpace(DWORD *pcbStructInfo, DWORD bytesNeeded)
255 {
256     BOOL ret;
257
258     if (*pcbStructInfo < bytesNeeded)
259     {
260         *pcbStructInfo = bytesNeeded;
261         SetLastError(ERROR_MORE_DATA);
262         ret = FALSE;
263     }
264     else
265     {
266         *pcbStructInfo = bytesNeeded;
267         ret = TRUE;
268     }
269     return ret;
270 }
271
272 /* tag:
273  *     The expected tag of the item.  If tag is 0, decodeFunc is called
274  *     regardless of the tag value seen.
275  * offset:
276  *     A sequence is decoded into a struct.  The offset member is the
277  *     offset of this item within that struct.
278  * decodeFunc:
279  *     The decoder function to use.  If this is NULL, then the member isn't
280  *     decoded, but minSize space is reserved for it.
281  * minSize:
282  *     The minimum amount of space occupied after decoding.  You must set this.
283  * optional:
284  *     If true, and the tag doesn't match the expected tag for this item,
285  *     or the decodeFunc fails with CRYPT_E_ASN1_BADTAG, then minSize space is
286  *     filled with 0 for this member.
287  * hasPointer, pointerOffset:
288  *     If the item has dynamic data, set hasPointer to TRUE, pointerOffset to
289  *     the offset within the struct of the data pointer (or to the
290  *     first data pointer, if more than one exist).
291  * size:
292  *     Used by CRYPT_AsnDecodeSequence, not for your use.
293  */
294 struct AsnDecodeSequenceItem
295 {
296     BYTE               tag;
297     DWORD              offset;
298     InternalDecodeFunc decodeFunc;
299     DWORD              minSize;
300     BOOL               optional;
301     BOOL               hasPointer;
302     DWORD              pointerOffset;
303     DWORD              size;
304 };
305
306 /* Decodes the items in a sequence, where the items are described in items,
307  * the encoded data are in pbEncoded with length cbEncoded.  Decodes into
308  * pvStructInfo.  nextData is a pointer to the memory location at which the
309  * first decoded item with a dynamic pointer should point.
310  * Upon decoding, *cbDecoded is the total number of bytes decoded.
311  * Each item decoder is never called with CRYPT_DECODE_ALLOC_FLAG set.
312  */
313 static BOOL CRYPT_AsnDecodeSequenceItems(struct AsnDecodeSequenceItem items[],
314  DWORD cItem, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
315  void *pvStructInfo, BYTE *nextData, DWORD *cbDecoded)
316 {
317     BOOL ret;
318     DWORD i, decoded = 0;
319     const BYTE *ptr = pbEncoded;
320
321     TRACE("%p, %d, %p, %d, %08x, %p, %p, %p\n", items, cItem, pbEncoded,
322      cbEncoded, dwFlags, pvStructInfo, nextData, cbDecoded);
323
324     for (i = 0, ret = TRUE; ret && i < cItem; i++)
325     {
326         if (cbEncoded - (ptr - pbEncoded) != 0)
327         {
328             DWORD itemLen;
329
330             if ((ret = CRYPT_GetLengthIndefinite(ptr,
331              cbEncoded - (ptr - pbEncoded), &itemLen)))
332             {
333                 BYTE itemLenBytes = GET_LEN_BYTES(ptr[1]);
334
335                 if (ptr[0] == items[i].tag || !items[i].tag)
336                 {
337                     DWORD itemEncodedLen;
338
339                     if (itemLen == CMSG_INDEFINITE_LENGTH)
340                         itemEncodedLen = cbEncoded - (ptr - pbEncoded);
341                     else
342                         itemEncodedLen = 1 + itemLenBytes + itemLen;
343                     if (nextData && pvStructInfo && items[i].hasPointer)
344                     {
345                         TRACE("Setting next pointer to %p\n",
346                          nextData);
347                         *(BYTE **)((BYTE *)pvStructInfo +
348                          items[i].pointerOffset) = nextData;
349                     }
350                     if (items[i].decodeFunc)
351                     {
352                         DWORD itemDecoded;
353
354                         if (pvStructInfo)
355                             TRACE("decoding item %d\n", i);
356                         else
357                             TRACE("sizing item %d\n", i);
358                         ret = items[i].decodeFunc(ptr, itemEncodedLen,
359                          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG,
360                          pvStructInfo ?  (BYTE *)pvStructInfo + items[i].offset
361                          : NULL, &items[i].size, &itemDecoded);
362                         if (ret)
363                         {
364                             /* Account for alignment padding */
365                             items[i].size = ALIGN_DWORD_PTR(items[i].size);
366                             TRACE("item %d size: %d\n", i, items[i].size);
367                             if (nextData && items[i].hasPointer &&
368                              items[i].size > items[i].minSize)
369                                 nextData += items[i].size - items[i].minSize;
370                             if (itemDecoded > itemEncodedLen)
371                             {
372                                 WARN("decoded length %d exceeds encoded %d\n",
373                                  itemDecoded, itemEncodedLen);
374                                 SetLastError(CRYPT_E_ASN1_CORRUPT);
375                                 ret = FALSE;
376                             }
377                             else
378                             {
379                                 ptr += itemDecoded;
380                                 decoded += itemDecoded;
381                                 TRACE("item %d: decoded %d bytes\n", i,
382                                  itemDecoded);
383                             }
384                         }
385                         else if (items[i].optional &&
386                          GetLastError() == CRYPT_E_ASN1_BADTAG)
387                         {
388                             TRACE("skipping optional item %d\n", i);
389                             items[i].size = items[i].minSize;
390                             SetLastError(NOERROR);
391                             ret = TRUE;
392                         }
393                         else
394                             TRACE("item %d failed: %08x\n", i,
395                              GetLastError());
396                     }
397                     else if (itemLen == CMSG_INDEFINITE_LENGTH)
398                     {
399                         ERR("can't use indefinite length encoding without a decoder\n");
400                         SetLastError(CRYPT_E_ASN1_CORRUPT);
401                         ret = FALSE;
402                     }
403                     else
404                     {
405                         TRACE("item %d: decoded %d bytes\n", i, itemEncodedLen);
406                         ptr += itemEncodedLen;
407                         decoded += itemEncodedLen;
408                         items[i].size = items[i].minSize;
409                     }
410                 }
411                 else if (items[i].optional)
412                 {
413                     TRACE("skipping optional item %d\n", i);
414                     items[i].size = items[i].minSize;
415                 }
416                 else
417                 {
418                     TRACE("item %d: tag %02x doesn't match expected %02x\n",
419                      i, ptr[0], items[i].tag);
420                     SetLastError(CRYPT_E_ASN1_BADTAG);
421                     ret = FALSE;
422                 }
423             }
424         }
425         else if (items[i].optional)
426         {
427             TRACE("missing optional item %d, skipping\n", i);
428             items[i].size = items[i].minSize;
429         }
430         else
431         {
432             TRACE("not enough bytes for item %d, failing\n", i);
433             SetLastError(CRYPT_E_ASN1_CORRUPT);
434             ret = FALSE;
435         }
436     }
437     if (cbDecoded)
438         *cbDecoded = decoded;
439     TRACE("returning %d\n", ret);
440     return ret;
441 }
442
443 /* This decodes an arbitrary sequence into a contiguous block of memory
444  * (basically, a struct.)  Each element being decoded is described by a struct
445  * AsnDecodeSequenceItem, see above.
446  * startingPointer is an optional pointer to the first place where dynamic
447  * data will be stored.  If you know the starting offset, you may pass it
448  * here.  Otherwise, pass NULL, and one will be inferred from the items.
449  */
450 static BOOL CRYPT_AsnDecodeSequence(struct AsnDecodeSequenceItem items[],
451  DWORD cItem, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
452  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo,
453  DWORD *pcbDecoded, void *startingPointer)
454 {
455     BOOL ret;
456
457     TRACE("%p, %d, %p, %d, %08x, %p, %p, %d, %p\n", items, cItem, pbEncoded,
458      cbEncoded, dwFlags, pDecodePara, pvStructInfo, *pcbStructInfo,
459      startingPointer);
460
461     if (!cbEncoded)
462     {
463         SetLastError(CRYPT_E_ASN1_EOD);
464         return FALSE;
465     }
466     if (pbEncoded[0] == ASN_SEQUENCE)
467     {
468         DWORD dataLen;
469
470         if ((ret = CRYPT_GetLengthIndefinite(pbEncoded, cbEncoded, &dataLen)))
471         {
472             DWORD lenBytes = GET_LEN_BYTES(pbEncoded[1]), cbDecoded;
473             const BYTE *ptr = pbEncoded + 1 + lenBytes;
474             BOOL indefinite = FALSE;
475
476             cbEncoded -= 1 + lenBytes;
477             if (dataLen == CMSG_INDEFINITE_LENGTH)
478             {
479                 dataLen = cbEncoded;
480                 indefinite = TRUE;
481             }
482             else if (cbEncoded < dataLen)
483             {
484                 TRACE("dataLen %d exceeds cbEncoded %d, failing\n", dataLen,
485                  cbEncoded);
486                 SetLastError(CRYPT_E_ASN1_CORRUPT);
487                 ret = FALSE;
488             }
489             if (ret)
490             {
491                 ret = CRYPT_AsnDecodeSequenceItems(items, cItem,
492                  ptr, dataLen, dwFlags, NULL, NULL, &cbDecoded);
493                 if (ret && dataLen == CMSG_INDEFINITE_LENGTH)
494                 {
495                     if (cbDecoded > cbEncoded - 2)
496                     {
497                         /* Not enough space for 0 TLV */
498                         SetLastError(CRYPT_E_ASN1_CORRUPT);
499                         ret = FALSE;
500                     }
501                     else if (*(ptr + cbDecoded) != 0 ||
502                      *(ptr + cbDecoded + 1) != 0)
503                     {
504                         TRACE("expected 0 TLV\n");
505                         SetLastError(CRYPT_E_ASN1_CORRUPT);
506                         ret = FALSE;
507                     }
508                     else
509                         cbDecoded += 2;
510                 }
511             }
512             if (ret && !indefinite && cbDecoded != dataLen)
513             {
514                 TRACE("expected %d decoded, got %d, failing\n", dataLen,
515                  cbDecoded);
516                 SetLastError(CRYPT_E_ASN1_CORRUPT);
517                 ret = FALSE;
518             }
519             if (ret)
520             {
521                 DWORD i, bytesNeeded = 0, structSize = 0;
522
523                 for (i = 0; i < cItem; i++)
524                 {
525                     bytesNeeded += items[i].size;
526                     structSize += items[i].minSize;
527                 }
528                 if (pcbDecoded)
529                     *pcbDecoded = 1 + lenBytes + cbDecoded;
530                 if (!pvStructInfo)
531                     *pcbStructInfo = bytesNeeded;
532                 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
533                  pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
534                 {
535                     BYTE *nextData;
536
537                     if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
538                         pvStructInfo = *(BYTE **)pvStructInfo;
539                     if (startingPointer)
540                         nextData = startingPointer;
541                     else
542                         nextData = (BYTE *)pvStructInfo + structSize;
543                     memset(pvStructInfo, 0, structSize);
544                     ret = CRYPT_AsnDecodeSequenceItems(items, cItem,
545                      ptr, dataLen, dwFlags, pvStructInfo, nextData,
546                      &cbDecoded);
547                     if (!ret && (dwFlags & CRYPT_DECODE_ALLOC_FLAG))
548                         CRYPT_FreeSpace(pDecodePara, pvStructInfo);
549                 }
550             }
551         }
552     }
553     else
554     {
555         SetLastError(CRYPT_E_ASN1_BADTAG);
556         ret = FALSE;
557     }
558     TRACE("returning %d (%08x)\n", ret, GetLastError());
559     return ret;
560 }
561
562 /* tag:
563  *     The expected tag of the entire encoded array (usually a variant
564  *     of ASN_SETOF or ASN_SEQUENCEOF.)  If tag is 0, decodeFunc is called
565  *     regardless of the tag seen.
566  * decodeFunc:
567  *     used to decode each item in the array
568  * itemSize:
569  *      is the minimum size of each decoded item
570  * hasPointer:
571  *      indicates whether each item has a dynamic pointer
572  * pointerOffset:
573  *     indicates the offset within itemSize at which the pointer exists
574  */
575 struct AsnArrayDescriptor
576 {
577     BYTE               tag;
578     InternalDecodeFunc decodeFunc;
579     DWORD              itemSize;
580     BOOL               hasPointer;
581     DWORD              pointerOffset;
582 };
583
584 struct AsnArrayItemSize
585 {
586     DWORD encodedLen;
587     DWORD size;
588 };
589
590 /* Decodes an array of like types into a struct GenericArray.
591  * The layout and decoding of the array are described by a struct
592  * AsnArrayDescriptor.
593  */
594 static BOOL CRYPT_AsnDecodeArray(const struct AsnArrayDescriptor *arrayDesc,
595  const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
596  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo,
597  DWORD *pcbDecoded, void *startingPointer)
598 {
599     BOOL ret = TRUE;
600
601     TRACE("%p, %p, %d, %08x, %p, %p, %d, %p\n", arrayDesc, pbEncoded,
602      cbEncoded, dwFlags, pDecodePara, pvStructInfo, *pcbStructInfo,
603      startingPointer);
604
605     if (!arrayDesc->tag || pbEncoded[0] == arrayDesc->tag)
606     {
607         DWORD dataLen;
608
609         if ((ret = CRYPT_GetLengthIndefinite(pbEncoded, cbEncoded, &dataLen)))
610         {
611             DWORD bytesNeeded, cItems = 0, decoded;
612             BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
613             /* There can be arbitrarily many items, but there is often only one.
614              */
615             struct AsnArrayItemSize itemSize = { 0 }, *itemSizes = &itemSize;
616
617             decoded = 1 + lenBytes;
618             bytesNeeded = sizeof(struct GenericArray);
619             if (dataLen)
620             {
621                 const BYTE *ptr;
622                 BOOL doneDecoding = FALSE;
623
624                 for (ptr = pbEncoded + 1 + lenBytes; ret && !doneDecoding; )
625                 {
626                     if (dataLen == CMSG_INDEFINITE_LENGTH)
627                     {
628                         if (ptr[0] == 0)
629                         {
630                             doneDecoding = TRUE;
631                             if (ptr[1] != 0)
632                             {
633                                 SetLastError(CRYPT_E_ASN1_CORRUPT);
634                                 ret = FALSE;
635                             }
636                             else
637                                 decoded += 2;
638                         }
639                     }
640                     else if (ptr - pbEncoded - 1 - lenBytes >= dataLen)
641                         doneDecoding = TRUE;
642                     if (!doneDecoding)
643                     {
644                         DWORD itemEncoded, itemDataLen, itemDecoded, size = 0;
645
646                         /* Each item decoded may not tolerate extraneous bytes,
647                          * so get the length of the next element if known.
648                          */
649                         if ((ret = CRYPT_GetLengthIndefinite(ptr,
650                          cbEncoded - (ptr - pbEncoded), &itemDataLen)))
651                         {
652                             if (itemDataLen == CMSG_INDEFINITE_LENGTH)
653                                 itemEncoded = cbEncoded - (ptr - pbEncoded);
654                             else
655                                 itemEncoded = 1 + GET_LEN_BYTES(ptr[1]) +
656                                  itemDataLen;
657                         }
658                         if (ret)
659                             ret = arrayDesc->decodeFunc(ptr, itemEncoded,
660                              dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &size,
661                              &itemDecoded);
662                         if (ret)
663                         {
664                             cItems++;
665                             if (itemSizes != &itemSize)
666                                 itemSizes = CryptMemRealloc(itemSizes,
667                                  cItems * sizeof(struct AsnArrayItemSize));
668                             else if (cItems > 1)
669                             {
670                                 itemSizes =
671                                  CryptMemAlloc(
672                                  cItems * sizeof(struct AsnArrayItemSize));
673                                 if (itemSizes)
674                                     memcpy(itemSizes, &itemSize,
675                                      sizeof(itemSize));
676                             }
677                             if (itemSizes)
678                             {
679                                 decoded += itemDecoded;
680                                 itemSizes[cItems - 1].encodedLen = itemEncoded;
681                                 itemSizes[cItems - 1].size = size;
682                                 bytesNeeded += size;
683                                 ptr += itemEncoded;
684                             }
685                             else
686                                 ret = FALSE;
687                         }
688                     }
689                 }
690             }
691             if (ret)
692             {
693                 if (pcbDecoded)
694                     *pcbDecoded = decoded;
695                 if (!pvStructInfo)
696                     *pcbStructInfo = bytesNeeded;
697                 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
698                  pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
699                 {
700                     DWORD i;
701                     BYTE *nextData;
702                     const BYTE *ptr;
703                     struct GenericArray *array;
704
705                     if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
706                         pvStructInfo = *(BYTE **)pvStructInfo;
707                     array = pvStructInfo;
708                     array->cItems = cItems;
709                     if (startingPointer)
710                         array->rgItems = startingPointer;
711                     else
712                         array->rgItems = (BYTE *)array +
713                          sizeof(struct GenericArray);
714                     nextData = array->rgItems +
715                      array->cItems * arrayDesc->itemSize;
716                     for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
717                      i < cItems && ptr - pbEncoded - 1 - lenBytes <
718                      dataLen; i++)
719                     {
720                         DWORD itemDecoded;
721
722                         if (arrayDesc->hasPointer)
723                             *(BYTE **)(array->rgItems + i * arrayDesc->itemSize
724                              + arrayDesc->pointerOffset) = nextData;
725                         ret = arrayDesc->decodeFunc(ptr,
726                          itemSizes[i].encodedLen,
727                          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG,
728                          array->rgItems + i * arrayDesc->itemSize,
729                          &itemSizes[i].size, &itemDecoded);
730                         if (ret)
731                         {
732                             nextData += itemSizes[i].size - arrayDesc->itemSize;
733                             ptr += itemDecoded;
734                         }
735                     }
736                     if (!ret && (dwFlags & CRYPT_DECODE_ALLOC_FLAG))
737                         CRYPT_FreeSpace(pDecodePara, pvStructInfo);
738                 }
739             }
740             if (itemSizes != &itemSize)
741                 CryptMemFree(itemSizes);
742         }
743     }
744     else
745     {
746         SetLastError(CRYPT_E_ASN1_BADTAG);
747         ret = FALSE;
748     }
749     return ret;
750 }
751
752 /* Decodes a DER-encoded BLOB into a CRYPT_DER_BLOB struct pointed to by
753  * pvStructInfo.  The BLOB must be non-empty, otherwise the last error is set
754  * to CRYPT_E_ASN1_CORRUPT.
755  * Warning: assumes the CRYPT_DER_BLOB pointed to by pvStructInfo has pbData
756  * set!
757  */
758 static BOOL CRYPT_AsnDecodeDerBlob(const BYTE *pbEncoded, DWORD cbEncoded,
759  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
760 {
761     BOOL ret;
762     DWORD dataLen;
763
764     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
765     {
766         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
767         DWORD bytesNeeded = sizeof(CRYPT_DER_BLOB);
768        
769         if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
770             bytesNeeded += 1 + lenBytes + dataLen;
771
772         if (pcbDecoded)
773             *pcbDecoded = 1 + lenBytes + dataLen;
774         if (!pvStructInfo)
775             *pcbStructInfo = bytesNeeded;
776         else if ((ret = CRYPT_DecodeCheckSpace(pcbStructInfo, bytesNeeded)))
777         {
778             CRYPT_DER_BLOB *blob;
779
780             if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
781                 pvStructInfo = *(BYTE **)pvStructInfo;
782             blob = pvStructInfo;
783             blob->cbData = 1 + lenBytes + dataLen;
784             if (blob->cbData)
785             {
786                 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
787                     blob->pbData = (BYTE *)pbEncoded;
788                 else
789                 {
790                     assert(blob->pbData);
791                     memcpy(blob->pbData, pbEncoded, blob->cbData);
792                 }
793             }
794             else
795             {
796                 SetLastError(CRYPT_E_ASN1_CORRUPT);
797                 ret = FALSE;
798             }
799         }
800     }
801     return ret;
802 }
803
804 /* Like CRYPT_AsnDecodeBitsInternal, but swaps the bytes */
805 static BOOL CRYPT_AsnDecodeBitsSwapBytes(const BYTE *pbEncoded,
806  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
807  DWORD *pcbDecoded)
808 {
809     BOOL ret;
810
811     TRACE("(%p, %d, 0x%08x, %p, %d, %p)\n", pbEncoded, cbEncoded, dwFlags,
812      pvStructInfo, *pcbStructInfo, pcbDecoded);
813
814     /* Can't use the CRYPT_DECODE_NOCOPY_FLAG, because we modify the bytes in-
815      * place.
816      */
817     ret = CRYPT_AsnDecodeBitsInternal(pbEncoded, cbEncoded,
818      dwFlags & ~CRYPT_DECODE_NOCOPY_FLAG, pvStructInfo, pcbStructInfo,
819      pcbDecoded);
820     if (ret && pvStructInfo)
821     {
822         CRYPT_BIT_BLOB *blob = pvStructInfo;
823
824         if (blob->cbData)
825         {
826             DWORD i;
827             BYTE temp;
828
829             for (i = 0; i < blob->cbData / 2; i++)
830             {
831                 temp = blob->pbData[i];
832                 blob->pbData[i] = blob->pbData[blob->cbData - i - 1];
833                 blob->pbData[blob->cbData - i - 1] = temp;
834             }
835         }
836     }
837     TRACE("returning %d (%08x)\n", ret, GetLastError());
838     return ret;
839 }
840
841 static BOOL WINAPI CRYPT_AsnDecodeCertSignedContent(DWORD dwCertEncodingType,
842  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
843  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
844 {
845     BOOL ret = TRUE;
846
847     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
848      pDecodePara, pvStructInfo, *pcbStructInfo);
849
850     __TRY
851     {
852         struct AsnDecodeSequenceItem items[] = {
853          { 0, offsetof(CERT_SIGNED_CONTENT_INFO, ToBeSigned),
854            CRYPT_AsnDecodeDerBlob, sizeof(CRYPT_DER_BLOB), FALSE, TRUE,
855            offsetof(CERT_SIGNED_CONTENT_INFO, ToBeSigned.pbData), 0 },
856          { ASN_SEQUENCEOF, offsetof(CERT_SIGNED_CONTENT_INFO,
857            SignatureAlgorithm), CRYPT_AsnDecodeAlgorithmId,
858            sizeof(CRYPT_ALGORITHM_IDENTIFIER), FALSE, TRUE,
859            offsetof(CERT_SIGNED_CONTENT_INFO, SignatureAlgorithm.pszObjId), 0 },
860          { ASN_BITSTRING, offsetof(CERT_SIGNED_CONTENT_INFO, Signature),
861            CRYPT_AsnDecodeBitsSwapBytes, sizeof(CRYPT_BIT_BLOB), FALSE, TRUE,
862            offsetof(CERT_SIGNED_CONTENT_INFO, Signature.pbData), 0 },
863         };
864
865         if (dwFlags & CRYPT_DECODE_NO_SIGNATURE_BYTE_REVERSAL_FLAG)
866             items[2].decodeFunc = CRYPT_AsnDecodeBitsInternal;
867         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
868          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
869          pcbStructInfo, NULL, NULL);
870     }
871     __EXCEPT_PAGE_FAULT
872     {
873         SetLastError(STATUS_ACCESS_VIOLATION);
874         ret = FALSE;
875     }
876     __ENDTRY
877
878     TRACE("Returning %d (%08x)\n", ret, GetLastError());
879     return ret;
880 }
881
882 static BOOL CRYPT_AsnDecodeCertVersion(const BYTE *pbEncoded, DWORD cbEncoded,
883  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
884 {
885     BOOL ret;
886     DWORD dataLen;
887
888     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
889     {
890         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
891
892         ret = CRYPT_AsnDecodeIntInternal(pbEncoded + 1 + lenBytes, dataLen,
893          dwFlags, pvStructInfo, pcbStructInfo, NULL);
894         if (pcbDecoded)
895             *pcbDecoded = 1 + lenBytes + dataLen;
896     }
897     return ret;
898 }
899
900 static BOOL CRYPT_AsnDecodeValidity(const BYTE *pbEncoded, DWORD cbEncoded,
901  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
902 {
903     BOOL ret;
904
905     struct AsnDecodeSequenceItem items[] = {
906      { 0, offsetof(CERT_PRIVATE_KEY_VALIDITY, NotBefore),
907        CRYPT_AsnDecodeChoiceOfTimeInternal, sizeof(FILETIME), FALSE, FALSE, 0 },
908      { 0, offsetof(CERT_PRIVATE_KEY_VALIDITY, NotAfter),
909        CRYPT_AsnDecodeChoiceOfTimeInternal, sizeof(FILETIME), FALSE, FALSE, 0 },
910     };
911
912     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
913      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
914      pcbDecoded, NULL);
915     return ret;
916 }
917
918 static BOOL CRYPT_AsnDecodeCertExtensions(const BYTE *pbEncoded,
919  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
920  DWORD *pcbDecoded)
921 {
922     BOOL ret;
923     DWORD dataLen;
924
925     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
926     {
927         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
928
929         ret = CRYPT_AsnDecodeExtensionsInternal(pbEncoded + 1 + lenBytes,
930          dataLen, dwFlags, pvStructInfo, pcbStructInfo, NULL);
931         if (ret && pcbDecoded)
932             *pcbDecoded = 1 + lenBytes + dataLen;
933     }
934     return ret;
935 }
936
937 static BOOL CRYPT_AsnDecodeCertInfo(DWORD dwCertEncodingType,
938  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
939  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
940 {
941     BOOL ret = TRUE;
942     struct AsnDecodeSequenceItem items[] = {
943      { ASN_CONTEXT | ASN_CONSTRUCTOR, offsetof(CERT_INFO, dwVersion),
944        CRYPT_AsnDecodeCertVersion, sizeof(DWORD), TRUE, FALSE, 0, 0 },
945      { ASN_INTEGER, offsetof(CERT_INFO, SerialNumber),
946        CRYPT_AsnDecodeIntegerInternal, sizeof(CRYPT_INTEGER_BLOB), FALSE,
947        TRUE, offsetof(CERT_INFO, SerialNumber.pbData), 0 },
948      { ASN_SEQUENCEOF, offsetof(CERT_INFO, SignatureAlgorithm),
949        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
950        FALSE, TRUE, offsetof(CERT_INFO, SignatureAlgorithm.pszObjId), 0 },
951      { 0, offsetof(CERT_INFO, Issuer), CRYPT_AsnDecodeDerBlob,
952        sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
953        Issuer.pbData) },
954      { ASN_SEQUENCEOF, offsetof(CERT_INFO, NotBefore),
955        CRYPT_AsnDecodeValidity, sizeof(CERT_PRIVATE_KEY_VALIDITY), FALSE,
956        FALSE, 0 },
957      { 0, offsetof(CERT_INFO, Subject), CRYPT_AsnDecodeDerBlob,
958        sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
959        Subject.pbData) },
960      { ASN_SEQUENCEOF, offsetof(CERT_INFO, SubjectPublicKeyInfo),
961        CRYPT_AsnDecodePubKeyInfoInternal, sizeof(CERT_PUBLIC_KEY_INFO),
962        FALSE, TRUE, offsetof(CERT_INFO,
963        SubjectPublicKeyInfo.Algorithm.Parameters.pbData), 0 },
964      { ASN_BITSTRING, offsetof(CERT_INFO, IssuerUniqueId),
965        CRYPT_AsnDecodeBitsInternal, sizeof(CRYPT_BIT_BLOB), TRUE, TRUE,
966        offsetof(CERT_INFO, IssuerUniqueId.pbData), 0 },
967      { ASN_BITSTRING, offsetof(CERT_INFO, SubjectUniqueId),
968        CRYPT_AsnDecodeBitsInternal, sizeof(CRYPT_BIT_BLOB), TRUE, TRUE,
969        offsetof(CERT_INFO, SubjectUniqueId.pbData), 0 },
970      { ASN_CONTEXT | ASN_CONSTRUCTOR | 3, offsetof(CERT_INFO, cExtension),
971        CRYPT_AsnDecodeCertExtensions, sizeof(CERT_EXTENSIONS), TRUE, TRUE,
972        offsetof(CERT_INFO, rgExtension), 0 },
973     };
974
975     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
976      pDecodePara, pvStructInfo, *pcbStructInfo);
977
978     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
979      pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo,
980      NULL, NULL);
981     if (ret && pvStructInfo)
982     {
983         CERT_INFO *info;
984
985         if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
986             info = *(CERT_INFO **)pvStructInfo;
987         else
988             info = pvStructInfo;
989         if (!info->SerialNumber.cbData || !info->Issuer.cbData ||
990          !info->Subject.cbData)
991         {
992             SetLastError(CRYPT_E_ASN1_CORRUPT);
993             /* Don't need to deallocate, because it should have failed on the
994              * first pass (and no memory was allocated.)
995              */
996             ret = FALSE;
997         }
998     }
999
1000     TRACE("Returning %d (%08x)\n", ret, GetLastError());
1001     return ret;
1002 }
1003
1004 static BOOL WINAPI CRYPT_AsnDecodeCert(DWORD dwCertEncodingType,
1005  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1006  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1007 {
1008     BOOL ret = FALSE;
1009
1010     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1011      pDecodePara, pvStructInfo, *pcbStructInfo);
1012
1013     __TRY
1014     {
1015         DWORD size = 0;
1016
1017         /* Unless told not to, first try to decode it as a signed cert. */
1018         if (!(dwFlags & CRYPT_DECODE_TO_BE_SIGNED_FLAG))
1019         {
1020             PCERT_SIGNED_CONTENT_INFO signedCert = NULL;
1021
1022             ret = CRYPT_AsnDecodeCertSignedContent(dwCertEncodingType,
1023              X509_CERT, pbEncoded, cbEncoded, CRYPT_DECODE_ALLOC_FLAG, NULL,
1024              &signedCert, &size);
1025             if (ret)
1026             {
1027                 size = 0;
1028                 ret = CRYPT_AsnDecodeCertInfo(dwCertEncodingType,
1029                  X509_CERT_TO_BE_SIGNED, signedCert->ToBeSigned.pbData,
1030                  signedCert->ToBeSigned.cbData, dwFlags, pDecodePara,
1031                  pvStructInfo, pcbStructInfo);
1032                 LocalFree(signedCert);
1033             }
1034         }
1035         /* Failing that, try it as an unsigned cert */
1036         if (!ret)
1037         {
1038             size = 0;
1039             ret = CRYPT_AsnDecodeCertInfo(dwCertEncodingType,
1040              X509_CERT_TO_BE_SIGNED, pbEncoded, cbEncoded, dwFlags,
1041              pDecodePara, pvStructInfo, pcbStructInfo);
1042         }
1043     }
1044     __EXCEPT_PAGE_FAULT
1045     {
1046         SetLastError(STATUS_ACCESS_VIOLATION);
1047     }
1048     __ENDTRY
1049
1050     TRACE("Returning %d (%08x)\n", ret, GetLastError());
1051     return ret;
1052 }
1053
1054 static BOOL CRYPT_AsnDecodeCRLEntry(const BYTE *pbEncoded, DWORD cbEncoded,
1055  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1056 {
1057     BOOL ret;
1058     struct AsnDecodeSequenceItem items[] = {
1059      { ASN_INTEGER, offsetof(CRL_ENTRY, SerialNumber),
1060        CRYPT_AsnDecodeIntegerInternal, sizeof(CRYPT_INTEGER_BLOB), FALSE, TRUE,
1061        offsetof(CRL_ENTRY, SerialNumber.pbData), 0 },
1062      { 0, offsetof(CRL_ENTRY, RevocationDate),
1063        CRYPT_AsnDecodeChoiceOfTimeInternal, sizeof(FILETIME), FALSE, FALSE, 0 },
1064      { ASN_SEQUENCEOF, offsetof(CRL_ENTRY, cExtension),
1065        CRYPT_AsnDecodeExtensionsInternal, sizeof(CERT_EXTENSIONS), TRUE, TRUE,
1066        offsetof(CRL_ENTRY, rgExtension), 0 },
1067     };
1068     PCRL_ENTRY entry = pvStructInfo;
1069
1070     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags, entry,
1071      *pcbStructInfo);
1072
1073     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
1074      pbEncoded, cbEncoded, dwFlags, NULL, entry, pcbStructInfo, pcbDecoded,
1075      entry ? entry->SerialNumber.pbData : NULL);
1076     if (ret && entry && !entry->SerialNumber.cbData)
1077     {
1078         WARN("empty CRL entry serial number\n");
1079         SetLastError(CRYPT_E_ASN1_CORRUPT);
1080         ret = FALSE;
1081     }
1082     return ret;
1083 }
1084
1085 /* Warning: assumes pvStructInfo is a struct GenericArray whose rgItems has
1086  * been set prior to calling.
1087  */
1088 static BOOL CRYPT_AsnDecodeCRLEntries(const BYTE *pbEncoded, DWORD cbEncoded,
1089  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1090 {
1091     BOOL ret;
1092     struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
1093      CRYPT_AsnDecodeCRLEntry, sizeof(CRL_ENTRY), TRUE,
1094      offsetof(CRL_ENTRY, SerialNumber.pbData) };
1095     struct GenericArray *entries = pvStructInfo;
1096
1097     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
1098      pvStructInfo, *pcbStructInfo, pcbDecoded);
1099
1100     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
1101      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
1102      entries ? entries->rgItems : NULL);
1103     TRACE("Returning %d (%08x)\n", ret, GetLastError());
1104     return ret;
1105 }
1106
1107 static BOOL CRYPT_AsnDecodeCRLInfo(DWORD dwCertEncodingType,
1108  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1109  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1110 {
1111     struct AsnDecodeSequenceItem items[] = {
1112      { ASN_INTEGER, offsetof(CRL_INFO, dwVersion),
1113        CRYPT_AsnDecodeIntInternal, sizeof(DWORD), TRUE, FALSE, 0, 0 },
1114      { ASN_SEQUENCEOF, offsetof(CRL_INFO, SignatureAlgorithm),
1115        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
1116        FALSE, TRUE, offsetof(CRL_INFO, SignatureAlgorithm.pszObjId), 0 },
1117      { 0, offsetof(CRL_INFO, Issuer), CRYPT_AsnDecodeDerBlob,
1118        sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CRL_INFO,
1119        Issuer.pbData) },
1120      { 0, offsetof(CRL_INFO, ThisUpdate), CRYPT_AsnDecodeChoiceOfTimeInternal,
1121        sizeof(FILETIME), FALSE, FALSE, 0 },
1122      { 0, offsetof(CRL_INFO, NextUpdate), CRYPT_AsnDecodeChoiceOfTimeInternal,
1123        sizeof(FILETIME), TRUE, FALSE, 0 },
1124      { ASN_SEQUENCEOF, offsetof(CRL_INFO, cCRLEntry),
1125        CRYPT_AsnDecodeCRLEntries, sizeof(struct GenericArray), TRUE, TRUE,
1126        offsetof(CRL_INFO, rgCRLEntry), 0 },
1127      { ASN_CONTEXT | ASN_CONSTRUCTOR | 0, offsetof(CRL_INFO, cExtension),
1128        CRYPT_AsnDecodeCertExtensions, sizeof(CERT_EXTENSIONS), TRUE, TRUE,
1129        offsetof(CRL_INFO, rgExtension), 0 },
1130     };
1131     BOOL ret = TRUE;
1132
1133     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1134      pDecodePara, pvStructInfo, *pcbStructInfo);
1135
1136     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
1137      pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo,
1138      NULL, NULL);
1139
1140     TRACE("Returning %d (%08x)\n", ret, GetLastError());
1141     return ret;
1142 }
1143
1144 static BOOL WINAPI CRYPT_AsnDecodeCRL(DWORD dwCertEncodingType,
1145  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1146  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1147 {
1148     BOOL ret = FALSE;
1149
1150     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1151      pDecodePara, pvStructInfo, *pcbStructInfo);
1152
1153     __TRY
1154     {
1155         DWORD size = 0;
1156
1157         /* Unless told not to, first try to decode it as a signed crl. */
1158         if (!(dwFlags & CRYPT_DECODE_TO_BE_SIGNED_FLAG))
1159         {
1160             PCERT_SIGNED_CONTENT_INFO signedCrl = NULL;
1161
1162             ret = CRYPT_AsnDecodeCertSignedContent(dwCertEncodingType,
1163              X509_CERT, pbEncoded, cbEncoded, CRYPT_DECODE_ALLOC_FLAG, NULL,
1164              &signedCrl, &size);
1165             if (ret)
1166             {
1167                 size = 0;
1168                 ret = CRYPT_AsnDecodeCRLInfo(dwCertEncodingType,
1169                  X509_CERT_CRL_TO_BE_SIGNED, signedCrl->ToBeSigned.pbData,
1170                  signedCrl->ToBeSigned.cbData, dwFlags, pDecodePara,
1171                  pvStructInfo, pcbStructInfo);
1172                 LocalFree(signedCrl);
1173             }
1174         }
1175         /* Failing that, try it as an unsigned crl */
1176         if (!ret)
1177         {
1178             size = 0;
1179             ret = CRYPT_AsnDecodeCRLInfo(dwCertEncodingType,
1180              X509_CERT_CRL_TO_BE_SIGNED, pbEncoded, cbEncoded,
1181              dwFlags, pDecodePara, pvStructInfo, pcbStructInfo);
1182         }
1183     }
1184     __EXCEPT_PAGE_FAULT
1185     {
1186         SetLastError(STATUS_ACCESS_VIOLATION);
1187     }
1188     __ENDTRY
1189
1190     TRACE("Returning %d (%08x)\n", ret, GetLastError());
1191     return ret;
1192 }
1193
1194 static BOOL CRYPT_AsnDecodeOidIgnoreTag(const BYTE *pbEncoded, DWORD cbEncoded,
1195  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1196 {
1197     BOOL ret = TRUE;
1198     DWORD dataLen;
1199
1200     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1201      pvStructInfo, *pcbStructInfo);
1202
1203     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
1204     {
1205         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
1206         DWORD bytesNeeded = sizeof(LPSTR);
1207
1208         if (dataLen)
1209         {
1210             /* The largest possible string for the first two components
1211              * is 2.175 (= 2 * 40 + 175 = 255), so this is big enough.
1212              */
1213             char firstTwo[6];
1214             const BYTE *ptr;
1215
1216             snprintf(firstTwo, sizeof(firstTwo), "%d.%d",
1217              pbEncoded[1 + lenBytes] / 40,
1218              pbEncoded[1 + lenBytes] - (pbEncoded[1 + lenBytes] / 40)
1219              * 40);
1220             bytesNeeded += strlen(firstTwo) + 1;
1221             for (ptr = pbEncoded + 2 + lenBytes; ret &&
1222              ptr - pbEncoded - 1 - lenBytes < dataLen; )
1223             {
1224                 /* large enough for ".4000000" */
1225                 char str[9];
1226                 int val = 0;
1227
1228                 while (ptr - pbEncoded - 1 - lenBytes < dataLen &&
1229                  (*ptr & 0x80))
1230                 {
1231                     val <<= 7;
1232                     val |= *ptr & 0x7f;
1233                     ptr++;
1234                 }
1235                 if (ptr - pbEncoded - 1 - lenBytes >= dataLen ||
1236                  (*ptr & 0x80))
1237                 {
1238                     SetLastError(CRYPT_E_ASN1_CORRUPT);
1239                     ret = FALSE;
1240                 }
1241                 else
1242                 {
1243                     val <<= 7;
1244                     val |= *ptr++;
1245                     snprintf(str, sizeof(str), ".%d", val);
1246                     bytesNeeded += strlen(str);
1247                 }
1248             }
1249         }
1250         if (pcbDecoded)
1251             *pcbDecoded = 1 + lenBytes + dataLen;
1252         if (!pvStructInfo)
1253             *pcbStructInfo = bytesNeeded;
1254         else if (*pcbStructInfo < bytesNeeded)
1255         {
1256             *pcbStructInfo = bytesNeeded;
1257             SetLastError(ERROR_MORE_DATA);
1258             ret = FALSE;
1259         }
1260         else
1261         {
1262             if (dataLen)
1263             {
1264                 const BYTE *ptr;
1265                 LPSTR pszObjId = *(LPSTR *)pvStructInfo;
1266
1267                 *pszObjId = 0;
1268                 sprintf(pszObjId, "%d.%d", pbEncoded[1 + lenBytes] / 40,
1269                  pbEncoded[1 + lenBytes] - (pbEncoded[1 + lenBytes] /
1270                  40) * 40);
1271                 pszObjId += strlen(pszObjId);
1272                 for (ptr = pbEncoded + 2 + lenBytes; ret &&
1273                  ptr - pbEncoded - 1 - lenBytes < dataLen; )
1274                 {
1275                     int val = 0;
1276
1277                     while (ptr - pbEncoded - 1 - lenBytes < dataLen &&
1278                      (*ptr & 0x80))
1279                     {
1280                         val <<= 7;
1281                         val |= *ptr & 0x7f;
1282                         ptr++;
1283                     }
1284                     val <<= 7;
1285                     val |= *ptr++;
1286                     sprintf(pszObjId, ".%d", val);
1287                     pszObjId += strlen(pszObjId);
1288                 }
1289             }
1290             else
1291                 *(LPSTR *)pvStructInfo = NULL;
1292             *pcbStructInfo = bytesNeeded;
1293         }
1294     }
1295     return ret;
1296 }
1297
1298 static BOOL CRYPT_AsnDecodeOidInternal(const BYTE *pbEncoded, DWORD cbEncoded,
1299  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1300 {
1301     BOOL ret;
1302
1303     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1304      pvStructInfo, *pcbStructInfo);
1305
1306     if (pbEncoded[0] == ASN_OBJECTIDENTIFIER)
1307         ret = CRYPT_AsnDecodeOidIgnoreTag(pbEncoded, cbEncoded, dwFlags,
1308          pvStructInfo, pcbStructInfo, pcbDecoded);
1309     else
1310     {
1311         SetLastError(CRYPT_E_ASN1_BADTAG);
1312         ret = FALSE;
1313     }
1314     return ret;
1315 }
1316
1317 /* Warning:  assumes pvStructInfo is a CERT_EXTENSION whose pszObjId is set
1318  * ahead of time!
1319  */
1320 static BOOL CRYPT_AsnDecodeExtension(const BYTE *pbEncoded, DWORD cbEncoded,
1321  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1322 {
1323     struct AsnDecodeSequenceItem items[] = {
1324      { ASN_OBJECTIDENTIFIER, offsetof(CERT_EXTENSION, pszObjId),
1325        CRYPT_AsnDecodeOidIgnoreTag, sizeof(LPSTR), FALSE, TRUE,
1326        offsetof(CERT_EXTENSION, pszObjId), 0 },
1327      { ASN_BOOL, offsetof(CERT_EXTENSION, fCritical), CRYPT_AsnDecodeBool,
1328        sizeof(BOOL), TRUE, FALSE, 0, 0 },
1329      { ASN_OCTETSTRING, offsetof(CERT_EXTENSION, Value),
1330        CRYPT_AsnDecodeOctetsInternal, sizeof(CRYPT_OBJID_BLOB), FALSE, TRUE,
1331        offsetof(CERT_EXTENSION, Value.pbData) },
1332     };
1333     BOOL ret = TRUE;
1334     PCERT_EXTENSION ext = pvStructInfo;
1335
1336     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags, ext,
1337      *pcbStructInfo);
1338
1339     if (ext)
1340         TRACE("ext->pszObjId is %p\n", ext->pszObjId);
1341     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
1342      pbEncoded, cbEncoded, dwFlags, NULL, ext, pcbStructInfo,
1343      pcbDecoded, ext ? ext->pszObjId : NULL);
1344     if (ext)
1345         TRACE("ext->pszObjId is %p (%s)\n", ext->pszObjId,
1346          debugstr_a(ext->pszObjId));
1347     TRACE("returning %d (%08x)\n", ret, GetLastError());
1348     return ret;
1349 }
1350
1351 static BOOL CRYPT_AsnDecodeExtensionsInternal(const BYTE *pbEncoded,
1352  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
1353  DWORD *pcbDecoded)
1354 {
1355     BOOL ret = TRUE;
1356     struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
1357      CRYPT_AsnDecodeExtension, sizeof(CERT_EXTENSION), TRUE,
1358      offsetof(CERT_EXTENSION, pszObjId) };
1359     PCERT_EXTENSIONS exts = pvStructInfo;
1360
1361     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
1362      pvStructInfo, *pcbStructInfo, pcbDecoded);
1363
1364     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
1365      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
1366      exts ? exts->rgExtension : NULL);
1367     return ret;
1368 }
1369
1370 static BOOL WINAPI CRYPT_AsnDecodeExtensions(DWORD dwCertEncodingType,
1371  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1372  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1373 {
1374     BOOL ret = TRUE;
1375
1376     __TRY
1377     {
1378         ret = CRYPT_AsnDecodeExtensionsInternal(pbEncoded, cbEncoded,
1379          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pcbStructInfo, NULL);
1380         if (ret && pvStructInfo)
1381         {
1382             ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
1383              pcbStructInfo, *pcbStructInfo);
1384             if (ret)
1385             {
1386                 CERT_EXTENSIONS *exts;
1387
1388                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
1389                     pvStructInfo = *(BYTE **)pvStructInfo;
1390                 exts = pvStructInfo;
1391                 exts->rgExtension = (CERT_EXTENSION *)((BYTE *)exts +
1392                  sizeof(CERT_EXTENSIONS));
1393                 ret = CRYPT_AsnDecodeExtensionsInternal(pbEncoded, cbEncoded,
1394                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
1395                  pcbStructInfo, NULL);
1396             }
1397         }
1398     }
1399     __EXCEPT_PAGE_FAULT
1400     {
1401         SetLastError(STATUS_ACCESS_VIOLATION);
1402         ret = FALSE;
1403     }
1404     __ENDTRY
1405     return ret;
1406 }
1407
1408 /* Warning: this assumes the address of value->Value.pbData is already set, in
1409  * order to avoid overwriting memory.  (In some cases, it may change it, if it
1410  * doesn't copy anything to memory.)  Be sure to set it correctly!
1411  */
1412 static BOOL CRYPT_AsnDecodeNameValueInternal(const BYTE *pbEncoded,
1413  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
1414  DWORD *pcbDecoded)
1415 {
1416     BOOL ret = TRUE;
1417     DWORD dataLen;
1418     CERT_NAME_VALUE *value = pvStructInfo;
1419
1420     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
1421     {
1422         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
1423         DWORD bytesNeeded = sizeof(CERT_NAME_VALUE), valueType;
1424
1425         switch (pbEncoded[0])
1426         {
1427         case ASN_OCTETSTRING:
1428             valueType = CERT_RDN_OCTET_STRING;
1429             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1430                 bytesNeeded += dataLen;
1431             break;
1432         case ASN_NUMERICSTRING:
1433             valueType = CERT_RDN_NUMERIC_STRING;
1434             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1435                 bytesNeeded += dataLen;
1436             break;
1437         case ASN_PRINTABLESTRING:
1438             valueType = CERT_RDN_PRINTABLE_STRING;
1439             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1440                 bytesNeeded += dataLen;
1441             break;
1442         case ASN_IA5STRING:
1443             valueType = CERT_RDN_IA5_STRING;
1444             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1445                 bytesNeeded += dataLen;
1446             break;
1447         case ASN_T61STRING:
1448             valueType = CERT_RDN_T61_STRING;
1449             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1450                 bytesNeeded += dataLen;
1451             break;
1452         case ASN_VIDEOTEXSTRING:
1453             valueType = CERT_RDN_VIDEOTEX_STRING;
1454             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1455                 bytesNeeded += dataLen;
1456             break;
1457         case ASN_GRAPHICSTRING:
1458             valueType = CERT_RDN_GRAPHIC_STRING;
1459             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1460                 bytesNeeded += dataLen;
1461             break;
1462         case ASN_VISIBLESTRING:
1463             valueType = CERT_RDN_VISIBLE_STRING;
1464             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1465                 bytesNeeded += dataLen;
1466             break;
1467         case ASN_GENERALSTRING:
1468             valueType = CERT_RDN_GENERAL_STRING;
1469             if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1470                 bytesNeeded += dataLen;
1471             break;
1472         case ASN_UNIVERSALSTRING:
1473             FIXME("ASN_UNIVERSALSTRING: unimplemented\n");
1474             SetLastError(CRYPT_E_ASN1_BADTAG);
1475             return FALSE;
1476         case ASN_BMPSTRING:
1477             valueType = CERT_RDN_BMP_STRING;
1478             bytesNeeded += dataLen;
1479             break;
1480         case ASN_UTF8STRING:
1481             valueType = CERT_RDN_UTF8_STRING;
1482             bytesNeeded += MultiByteToWideChar(CP_UTF8, 0,
1483              (LPCSTR)pbEncoded + 1 + lenBytes, dataLen, NULL, 0) * 2;
1484             break;
1485         default:
1486             SetLastError(CRYPT_E_ASN1_BADTAG);
1487             return FALSE;
1488         }
1489
1490         if (pcbDecoded)
1491             *pcbDecoded = 1 + lenBytes + dataLen;
1492         if (!value)
1493             *pcbStructInfo = bytesNeeded;
1494         else if (*pcbStructInfo < bytesNeeded)
1495         {
1496             *pcbStructInfo = bytesNeeded;
1497             SetLastError(ERROR_MORE_DATA);
1498             ret = FALSE;
1499         }
1500         else
1501         {
1502             *pcbStructInfo = bytesNeeded;
1503             value->dwValueType = valueType;
1504             if (dataLen)
1505             {
1506                 DWORD i;
1507
1508                 assert(value->Value.pbData);
1509                 switch (pbEncoded[0])
1510                 {
1511                 case ASN_OCTETSTRING:
1512                 case ASN_NUMERICSTRING:
1513                 case ASN_PRINTABLESTRING:
1514                 case ASN_IA5STRING:
1515                 case ASN_T61STRING:
1516                 case ASN_VIDEOTEXSTRING:
1517                 case ASN_GRAPHICSTRING:
1518                 case ASN_VISIBLESTRING:
1519                 case ASN_GENERALSTRING:
1520                     value->Value.cbData = dataLen;
1521                     if (dataLen)
1522                     {
1523                         if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1524                             memcpy(value->Value.pbData,
1525                              pbEncoded + 1 + lenBytes, dataLen);
1526                         else
1527                             value->Value.pbData = (LPBYTE)pbEncoded + 1 +
1528                              lenBytes;
1529                     }
1530                     break;
1531                 case ASN_BMPSTRING:
1532                 {
1533                     LPWSTR str = (LPWSTR)value->Value.pbData;
1534
1535                     value->Value.cbData = dataLen;
1536                     for (i = 0; i < dataLen / 2; i++)
1537                         str[i] = (pbEncoded[1 + lenBytes + 2 * i] << 8) |
1538                          pbEncoded[1 + lenBytes + 2 * i + 1];
1539                     break;
1540                 }
1541                 case ASN_UTF8STRING:
1542                 {
1543                     LPWSTR str = (LPWSTR)value->Value.pbData;
1544
1545                     value->Value.cbData = MultiByteToWideChar(CP_UTF8, 0,
1546                      (LPCSTR)pbEncoded + 1 + lenBytes, dataLen, 
1547                      str, bytesNeeded - sizeof(CERT_NAME_VALUE)) * 2;
1548                     break;
1549                 }
1550                 }
1551             }
1552             else
1553             {
1554                 value->Value.cbData = 0;
1555                 value->Value.pbData = NULL;
1556             }
1557         }
1558     }
1559     return ret;
1560 }
1561
1562 static BOOL WINAPI CRYPT_AsnDecodeNameValue(DWORD dwCertEncodingType,
1563  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1564  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1565 {
1566     BOOL ret = TRUE;
1567
1568     __TRY
1569     {
1570         ret = CRYPT_AsnDecodeNameValueInternal(pbEncoded, cbEncoded,
1571          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pcbStructInfo, NULL);
1572         if (ret && pvStructInfo)
1573         {
1574             ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
1575              pcbStructInfo, *pcbStructInfo);
1576             if (ret)
1577             {
1578                 CERT_NAME_VALUE *value;
1579
1580                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
1581                     pvStructInfo = *(BYTE **)pvStructInfo;
1582                 value = pvStructInfo;
1583                 value->Value.pbData = ((BYTE *)value + sizeof(CERT_NAME_VALUE));
1584                 ret = CRYPT_AsnDecodeNameValueInternal( pbEncoded, cbEncoded,
1585                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
1586                  pcbStructInfo, NULL);
1587             }
1588         }
1589     }
1590     __EXCEPT_PAGE_FAULT
1591     {
1592         SetLastError(STATUS_ACCESS_VIOLATION);
1593         ret = FALSE;
1594     }
1595     __ENDTRY
1596     return ret;
1597 }
1598
1599 static BOOL CRYPT_AsnDecodeUnicodeNameValueInternal(const BYTE *pbEncoded,
1600  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
1601  DWORD *pcbDecoded)
1602 {
1603     BOOL ret = TRUE;
1604     DWORD dataLen;
1605     CERT_NAME_VALUE *value = pvStructInfo;
1606
1607     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
1608     {
1609         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
1610         DWORD bytesNeeded = sizeof(CERT_NAME_VALUE), valueType;
1611
1612         switch (pbEncoded[0])
1613         {
1614         case ASN_NUMERICSTRING:
1615             valueType = CERT_RDN_NUMERIC_STRING;
1616             if (dataLen)
1617                 bytesNeeded += (dataLen + 1) * 2;
1618             break;
1619         case ASN_PRINTABLESTRING:
1620             valueType = CERT_RDN_PRINTABLE_STRING;
1621             if (dataLen)
1622                 bytesNeeded += (dataLen + 1) * 2;
1623             break;
1624         case ASN_IA5STRING:
1625             valueType = CERT_RDN_IA5_STRING;
1626             if (dataLen)
1627                 bytesNeeded += (dataLen + 1) * 2;
1628             break;
1629         case ASN_T61STRING:
1630             valueType = CERT_RDN_T61_STRING;
1631             if (dataLen)
1632                 bytesNeeded += (dataLen + 1) * 2;
1633             break;
1634         case ASN_VIDEOTEXSTRING:
1635             valueType = CERT_RDN_VIDEOTEX_STRING;
1636             if (dataLen)
1637                 bytesNeeded += (dataLen + 1) * 2;
1638             break;
1639         case ASN_GRAPHICSTRING:
1640             valueType = CERT_RDN_GRAPHIC_STRING;
1641             if (dataLen)
1642                 bytesNeeded += (dataLen + 1) * 2;
1643             break;
1644         case ASN_VISIBLESTRING:
1645             valueType = CERT_RDN_VISIBLE_STRING;
1646             if (dataLen)
1647                 bytesNeeded += (dataLen + 1) * 2;
1648             break;
1649         case ASN_GENERALSTRING:
1650             valueType = CERT_RDN_GENERAL_STRING;
1651             if (dataLen)
1652                 bytesNeeded += (dataLen + 1) * 2;
1653             break;
1654         case ASN_UNIVERSALSTRING:
1655             valueType = CERT_RDN_UNIVERSAL_STRING;
1656             if (dataLen)
1657                 bytesNeeded += dataLen / 2 + sizeof(WCHAR);
1658             break;
1659         case ASN_BMPSTRING:
1660             valueType = CERT_RDN_BMP_STRING;
1661             if (dataLen)
1662                 bytesNeeded += dataLen + sizeof(WCHAR);
1663             break;
1664         case ASN_UTF8STRING:
1665             valueType = CERT_RDN_UTF8_STRING;
1666             if (dataLen)
1667                 bytesNeeded += (MultiByteToWideChar(CP_UTF8, 0,
1668                  (LPCSTR)pbEncoded + 1 + lenBytes, dataLen, NULL, 0) + 1) * 2;
1669             break;
1670         default:
1671             SetLastError(CRYPT_E_ASN1_BADTAG);
1672             return FALSE;
1673         }
1674
1675         if (pcbDecoded)
1676             *pcbDecoded = 1 + lenBytes + dataLen;
1677         if (!value)
1678             *pcbStructInfo = bytesNeeded;
1679         else if (*pcbStructInfo < bytesNeeded)
1680         {
1681             *pcbStructInfo = bytesNeeded;
1682             SetLastError(ERROR_MORE_DATA);
1683             ret = FALSE;
1684         }
1685         else
1686         {
1687             *pcbStructInfo = bytesNeeded;
1688             value->dwValueType = valueType;
1689             if (dataLen)
1690             {
1691                 DWORD i;
1692                 LPWSTR str = (LPWSTR)value->Value.pbData;
1693
1694                 assert(value->Value.pbData);
1695                 switch (pbEncoded[0])
1696                 {
1697                 case ASN_NUMERICSTRING:
1698                 case ASN_PRINTABLESTRING:
1699                 case ASN_IA5STRING:
1700                 case ASN_T61STRING:
1701                 case ASN_VIDEOTEXSTRING:
1702                 case ASN_GRAPHICSTRING:
1703                 case ASN_VISIBLESTRING:
1704                 case ASN_GENERALSTRING:
1705                     value->Value.cbData = dataLen * 2;
1706                     for (i = 0; i < dataLen; i++)
1707                         str[i] = pbEncoded[1 + lenBytes + i];
1708                     str[i] = 0;
1709                     break;
1710                 case ASN_UNIVERSALSTRING:
1711                     value->Value.cbData = dataLen / 2;
1712                     for (i = 0; i < dataLen / 4; i++)
1713                         str[i] = (pbEncoded[1 + lenBytes + 2 * i + 2] << 8)
1714                          | pbEncoded[1 + lenBytes + 2 * i + 3];
1715                     str[i] = 0;
1716                     break;
1717                 case ASN_BMPSTRING:
1718                     value->Value.cbData = dataLen;
1719                     for (i = 0; i < dataLen / 2; i++)
1720                         str[i] = (pbEncoded[1 + lenBytes + 2 * i] << 8) |
1721                          pbEncoded[1 + lenBytes + 2 * i + 1];
1722                     str[i] = 0;
1723                     break;
1724                 case ASN_UTF8STRING:
1725                     value->Value.cbData = MultiByteToWideChar(CP_UTF8, 0,
1726                      (LPCSTR)pbEncoded + 1 + lenBytes, dataLen,
1727                      str, bytesNeeded - sizeof(CERT_NAME_VALUE)) * 2;
1728                     value->Value.pbData[value->Value.cbData / sizeof(WCHAR)]
1729                      = 0;
1730                     value->Value.cbData += sizeof(WCHAR);
1731                     break;
1732                 }
1733             }
1734             else
1735             {
1736                 value->Value.cbData = 0;
1737                 value->Value.pbData = NULL;
1738             }
1739         }
1740     }
1741     return ret;
1742 }
1743
1744 static BOOL WINAPI CRYPT_AsnDecodeUnicodeNameValue(DWORD dwCertEncodingType,
1745  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1746  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1747 {
1748     BOOL ret = TRUE;
1749
1750     __TRY
1751     {
1752         ret = CRYPT_AsnDecodeUnicodeNameValueInternal(pbEncoded, cbEncoded,
1753          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pcbStructInfo, NULL);
1754         if (ret && pvStructInfo)
1755         {
1756             ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
1757              pcbStructInfo, *pcbStructInfo);
1758             if (ret)
1759             {
1760                 CERT_NAME_VALUE *value;
1761
1762                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
1763                     pvStructInfo = *(BYTE **)pvStructInfo;
1764                 value = pvStructInfo;
1765                 value->Value.pbData = ((BYTE *)value + sizeof(CERT_NAME_VALUE));
1766                 ret = CRYPT_AsnDecodeUnicodeNameValueInternal(pbEncoded,
1767                  cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
1768                  pcbStructInfo, NULL);
1769             }
1770         }
1771     }
1772     __EXCEPT_PAGE_FAULT
1773     {
1774         SetLastError(STATUS_ACCESS_VIOLATION);
1775         ret = FALSE;
1776     }
1777     __ENDTRY
1778     return ret;
1779 }
1780
1781 static BOOL CRYPT_AsnDecodeRdnAttr(const BYTE *pbEncoded, DWORD cbEncoded,
1782  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1783 {
1784     BOOL ret;
1785     struct AsnDecodeSequenceItem items[] = {
1786      { ASN_OBJECTIDENTIFIER, offsetof(CERT_RDN_ATTR, pszObjId),
1787        CRYPT_AsnDecodeOidIgnoreTag, sizeof(LPSTR), FALSE, TRUE,
1788        offsetof(CERT_RDN_ATTR, pszObjId), 0 },
1789      { 0, offsetof(CERT_RDN_ATTR, dwValueType),
1790        CRYPT_AsnDecodeNameValueInternal, sizeof(CERT_NAME_VALUE),
1791        FALSE, TRUE, offsetof(CERT_RDN_ATTR, Value.pbData), 0 },
1792     };
1793     CERT_RDN_ATTR *attr = pvStructInfo;
1794
1795     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1796      pvStructInfo, *pcbStructInfo);
1797
1798     if (attr)
1799         TRACE("attr->pszObjId is %p\n", attr->pszObjId);
1800     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
1801      pbEncoded, cbEncoded, dwFlags, NULL, attr, pcbStructInfo, pcbDecoded,
1802      attr ? attr->pszObjId : NULL);
1803     if (attr)
1804     {
1805         TRACE("attr->pszObjId is %p (%s)\n", attr->pszObjId,
1806          debugstr_a(attr->pszObjId));
1807         TRACE("attr->dwValueType is %d\n", attr->dwValueType);
1808     }
1809     TRACE("returning %d (%08x)\n", ret, GetLastError());
1810     return ret;
1811 }
1812
1813 static BOOL CRYPT_AsnDecodeRdn(const BYTE *pbEncoded, DWORD cbEncoded,
1814  DWORD dwFlags,  void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1815 {
1816     BOOL ret = TRUE;
1817     struct AsnArrayDescriptor arrayDesc = { ASN_CONSTRUCTOR | ASN_SETOF,
1818      CRYPT_AsnDecodeRdnAttr, sizeof(CERT_RDN_ATTR), TRUE,
1819      offsetof(CERT_RDN_ATTR, pszObjId) };
1820     PCERT_RDN rdn = pvStructInfo;
1821
1822     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
1823      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
1824      rdn ? rdn->rgRDNAttr : NULL);
1825     return ret;
1826 }
1827
1828 static BOOL WINAPI CRYPT_AsnDecodeName(DWORD dwCertEncodingType,
1829  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1830  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1831 {
1832     BOOL ret = TRUE;
1833
1834     __TRY
1835     {
1836         struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
1837          CRYPT_AsnDecodeRdn, sizeof(CERT_RDN), TRUE,
1838          offsetof(CERT_RDN, rgRDNAttr) };
1839
1840         ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
1841          pDecodePara, pvStructInfo, pcbStructInfo, NULL, NULL);
1842     }
1843     __EXCEPT_PAGE_FAULT
1844     {
1845         SetLastError(STATUS_ACCESS_VIOLATION);
1846         ret = FALSE;
1847     }
1848     __ENDTRY
1849     return ret;
1850 }
1851
1852 static BOOL CRYPT_AsnDecodeUnicodeRdnAttr(const BYTE *pbEncoded,
1853  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
1854  DWORD *pcbDecoded)
1855 {
1856     BOOL ret;
1857     struct AsnDecodeSequenceItem items[] = {
1858      { ASN_OBJECTIDENTIFIER, offsetof(CERT_RDN_ATTR, pszObjId),
1859        CRYPT_AsnDecodeOidIgnoreTag, sizeof(LPSTR), FALSE, TRUE,
1860        offsetof(CERT_RDN_ATTR, pszObjId), 0 },
1861      { 0, offsetof(CERT_RDN_ATTR, dwValueType),
1862        CRYPT_AsnDecodeUnicodeNameValueInternal, sizeof(CERT_NAME_VALUE),
1863        FALSE, TRUE, offsetof(CERT_RDN_ATTR, Value.pbData), 0 },
1864     };
1865     CERT_RDN_ATTR *attr = pvStructInfo;
1866
1867     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1868      pvStructInfo, *pcbStructInfo);
1869
1870     if (attr)
1871         TRACE("attr->pszObjId is %p\n", attr->pszObjId);
1872     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
1873      pbEncoded, cbEncoded, dwFlags, NULL, attr, pcbStructInfo, pcbDecoded,
1874      attr ? attr->pszObjId : NULL);
1875     if (attr)
1876     {
1877         TRACE("attr->pszObjId is %p (%s)\n", attr->pszObjId,
1878          debugstr_a(attr->pszObjId));
1879         TRACE("attr->dwValueType is %d\n", attr->dwValueType);
1880     }
1881     TRACE("returning %d (%08x)\n", ret, GetLastError());
1882     return ret;
1883 }
1884
1885 static BOOL CRYPT_AsnDecodeUnicodeRdn(const BYTE *pbEncoded, DWORD cbEncoded,
1886  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
1887 {
1888     BOOL ret = TRUE;
1889     struct AsnArrayDescriptor arrayDesc = { ASN_CONSTRUCTOR | ASN_SETOF,
1890      CRYPT_AsnDecodeUnicodeRdnAttr, sizeof(CERT_RDN_ATTR), TRUE,
1891      offsetof(CERT_RDN_ATTR, pszObjId) };
1892     PCERT_RDN rdn = pvStructInfo;
1893
1894     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
1895      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
1896      rdn ? rdn->rgRDNAttr : NULL);
1897     return ret;
1898 }
1899
1900 static BOOL WINAPI CRYPT_AsnDecodeUnicodeName(DWORD dwCertEncodingType,
1901  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
1902  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
1903 {
1904     BOOL ret = TRUE;
1905
1906     __TRY
1907     {
1908         struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
1909          CRYPT_AsnDecodeUnicodeRdn, sizeof(CERT_RDN), TRUE,
1910          offsetof(CERT_RDN, rgRDNAttr) };
1911
1912         ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
1913          pDecodePara, pvStructInfo, pcbStructInfo, NULL, NULL);
1914     }
1915     __EXCEPT_PAGE_FAULT
1916     {
1917         SetLastError(STATUS_ACCESS_VIOLATION);
1918         ret = FALSE;
1919     }
1920     __ENDTRY
1921     return ret;
1922 }
1923
1924 static BOOL CRYPT_FindEncodedLen(const BYTE *pbEncoded, DWORD cbEncoded,
1925  DWORD *pcbDecoded)
1926 {
1927     BOOL ret = TRUE, done = FALSE;
1928     DWORD indefiniteNestingLevels = 0, decoded = 0;
1929
1930     TRACE("(%p, %d)\n", pbEncoded, cbEncoded);
1931
1932     do {
1933         DWORD dataLen;
1934
1935         if (!cbEncoded)
1936             done = TRUE;
1937         else if ((ret = CRYPT_GetLengthIndefinite(pbEncoded, cbEncoded,
1938          &dataLen)))
1939         {
1940             BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
1941
1942             if (dataLen == CMSG_INDEFINITE_LENGTH)
1943             {
1944                 indefiniteNestingLevels++;
1945                 pbEncoded += 1 + lenBytes;
1946                 cbEncoded -= 1 + lenBytes;
1947                 decoded += 1 + lenBytes;
1948                 TRACE("indefiniteNestingLevels = %d\n",
1949                  indefiniteNestingLevels);
1950             }
1951             else
1952             {
1953                 if (pbEncoded[0] == 0 && pbEncoded[1] == 0 &&
1954                  indefiniteNestingLevels)
1955                 {
1956                     indefiniteNestingLevels--;
1957                     TRACE("indefiniteNestingLevels = %d\n",
1958                      indefiniteNestingLevels);
1959                 }
1960                 pbEncoded += 1 + lenBytes + dataLen;
1961                 cbEncoded -= 1 + lenBytes + dataLen;
1962                 decoded += 1 + lenBytes + dataLen;
1963                 if (!indefiniteNestingLevels)
1964                     done = TRUE;
1965             }
1966         }
1967     } while (ret && !done);
1968     /* If we haven't found all 0 TLVs, we haven't found the end */
1969     if (ret && indefiniteNestingLevels)
1970     {
1971         SetLastError(CRYPT_E_ASN1_EOD);
1972         ret = FALSE;
1973     }
1974     if (ret)
1975         *pcbDecoded = decoded;
1976     TRACE("returning %d (%d)\n", ret, ret ? *pcbDecoded : 0);
1977     return ret;
1978 }
1979
1980 static BOOL CRYPT_AsnDecodeCopyBytes(const BYTE *pbEncoded,
1981  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
1982  DWORD *pcbDecoded)
1983 {
1984     BOOL ret = TRUE;
1985     DWORD bytesNeeded = sizeof(CRYPT_OBJID_BLOB), encodedLen = 0;
1986
1987     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
1988      pvStructInfo, *pcbStructInfo);
1989
1990     if ((ret = CRYPT_FindEncodedLen(pbEncoded, cbEncoded, &encodedLen)))
1991     {
1992         if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
1993             bytesNeeded += encodedLen;
1994         if (!pvStructInfo)
1995             *pcbStructInfo = bytesNeeded;
1996         else if (*pcbStructInfo < bytesNeeded)
1997         {
1998             SetLastError(ERROR_MORE_DATA);
1999             *pcbStructInfo = bytesNeeded;
2000             ret = FALSE;
2001         }
2002         else
2003         {
2004             PCRYPT_OBJID_BLOB blob = pvStructInfo;
2005
2006             *pcbStructInfo = bytesNeeded;
2007             blob->cbData = encodedLen;
2008             if (encodedLen)
2009             {
2010                 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
2011                     blob->pbData = (LPBYTE)pbEncoded;
2012                 else
2013                 {
2014                     assert(blob->pbData);
2015                     memcpy(blob->pbData, pbEncoded, blob->cbData);
2016                 }
2017             }
2018             else
2019                 blob->pbData = NULL;
2020         }
2021         if (pcbDecoded)
2022             *pcbDecoded = encodedLen;
2023     }
2024     return ret;
2025 }
2026
2027 static BOOL CRYPT_DecodeDERArray(const BYTE *pbEncoded, DWORD cbEncoded,
2028  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
2029 {
2030     BOOL ret;
2031     struct AsnArrayDescriptor arrayDesc = { 0, CRYPT_AsnDecodeCopyBytes,
2032      sizeof(CRYPT_DER_BLOB), TRUE, offsetof(CRYPT_DER_BLOB, pbData) };
2033     struct GenericArray *array = pvStructInfo;
2034
2035     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
2036      pvStructInfo, *pcbStructInfo, pcbDecoded);
2037
2038     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
2039      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
2040      array ? array->rgItems : NULL);
2041     return ret;
2042 }
2043
2044 static BOOL CRYPT_AsnDecodeCTLUsage(const BYTE *pbEncoded, DWORD cbEncoded,
2045  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
2046 {
2047     BOOL ret;
2048     struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
2049      CRYPT_AsnDecodeOidInternal, sizeof(LPSTR), TRUE, 0 };
2050     CTL_USAGE *usage = pvStructInfo;
2051
2052     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
2053      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
2054      usage ? usage->rgpszUsageIdentifier : NULL);
2055     return ret;
2056 }
2057
2058 static BOOL CRYPT_AsnDecodeCTLEntry(const BYTE *pbEncoded, DWORD cbEncoded,
2059  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
2060 {
2061     struct AsnDecodeSequenceItem items[] = {
2062      { ASN_OCTETSTRING, offsetof(CTL_ENTRY, SubjectIdentifier),
2063        CRYPT_AsnDecodeOctetsInternal, sizeof(CRYPT_DATA_BLOB), FALSE, TRUE,
2064        offsetof(CTL_ENTRY, SubjectIdentifier.pbData), 0 },
2065      { ASN_CONSTRUCTOR | ASN_SETOF, offsetof(CTL_ENTRY, cAttribute),
2066        CRYPT_AsnDecodePKCSAttributesInternal, sizeof(CRYPT_ATTRIBUTES), FALSE,
2067        TRUE, offsetof(CTL_ENTRY, rgAttribute), 0 },
2068     };
2069     BOOL ret = TRUE;
2070     CTL_ENTRY *entry = pvStructInfo;
2071
2072     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags, entry,
2073      *pcbStructInfo);
2074
2075     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2076      pbEncoded, cbEncoded, dwFlags, NULL, entry, pcbStructInfo,
2077      pcbDecoded, entry ? entry->SubjectIdentifier.pbData : NULL);
2078     return ret;
2079 }
2080
2081 static BOOL CRYPT_AsnDecodeCTLEntries(const BYTE *pbEncoded, DWORD cbEncoded,
2082  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
2083 {
2084     BOOL ret;
2085     struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
2086      CRYPT_AsnDecodeCTLEntry, sizeof(CTL_ENTRY), TRUE,
2087      offsetof(CTL_ENTRY, SubjectIdentifier.pbData) };
2088     struct GenericArray *entries = pvStructInfo;
2089
2090     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
2091      pvStructInfo, *pcbStructInfo, pcbDecoded);
2092
2093     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
2094      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
2095      entries ? entries->rgItems : NULL);
2096     return ret;
2097 }
2098
2099 static BOOL WINAPI CRYPT_AsnDecodeCTL(DWORD dwCertEncodingType,
2100  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2101  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2102 {
2103     BOOL ret = FALSE;
2104
2105     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2106      pDecodePara, pvStructInfo, *pcbStructInfo);
2107
2108     __TRY
2109     {
2110         struct AsnDecodeSequenceItem items[] = {
2111          { ASN_INTEGER, offsetof(CTL_INFO, dwVersion),
2112            CRYPT_AsnDecodeIntInternal, sizeof(DWORD), TRUE, FALSE, 0, 0 },
2113          { ASN_SEQUENCEOF, offsetof(CTL_INFO, SubjectUsage),
2114            CRYPT_AsnDecodeCTLUsage, sizeof(CTL_USAGE), FALSE, TRUE,
2115            offsetof(CTL_INFO, SubjectUsage.rgpszUsageIdentifier), 0 },
2116          { ASN_OCTETSTRING, offsetof(CTL_INFO, ListIdentifier),
2117            CRYPT_AsnDecodeOctetsInternal, sizeof(CRYPT_DATA_BLOB), TRUE,
2118            TRUE, offsetof(CTL_INFO, ListIdentifier.pbData), 0 },
2119          { ASN_INTEGER, offsetof(CTL_INFO, SequenceNumber),
2120            CRYPT_AsnDecodeIntegerInternal, sizeof(CRYPT_INTEGER_BLOB),
2121            TRUE, TRUE, offsetof(CTL_INFO, SequenceNumber.pbData), 0 },
2122          { 0, offsetof(CTL_INFO, ThisUpdate),
2123            CRYPT_AsnDecodeChoiceOfTimeInternal, sizeof(FILETIME), FALSE, FALSE,
2124            0 },
2125          { 0, offsetof(CTL_INFO, NextUpdate),
2126            CRYPT_AsnDecodeChoiceOfTimeInternal, sizeof(FILETIME), TRUE, FALSE,
2127            0 },
2128          { ASN_SEQUENCEOF, offsetof(CTL_INFO, SubjectAlgorithm),
2129            CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
2130            FALSE, TRUE, offsetof(CTL_INFO, SubjectAlgorithm.pszObjId), 0 },
2131          { ASN_SEQUENCEOF, offsetof(CTL_INFO, cCTLEntry),
2132            CRYPT_AsnDecodeCTLEntries, sizeof(struct GenericArray),
2133            TRUE, TRUE, offsetof(CTL_INFO, rgCTLEntry), 0 },
2134          { ASN_CONTEXT | ASN_CONSTRUCTOR | 0, offsetof(CTL_INFO, cExtension),
2135            CRYPT_AsnDecodeCertExtensions, sizeof(CERT_EXTENSIONS), TRUE, TRUE,
2136            offsetof(CTL_INFO, rgExtension), 0 },
2137         };
2138
2139         TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2140          pDecodePara, pvStructInfo, *pcbStructInfo);
2141
2142         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2143          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
2144          pcbStructInfo, NULL, NULL);
2145     }
2146     __EXCEPT_PAGE_FAULT
2147     {
2148         SetLastError(STATUS_ACCESS_VIOLATION);
2149     }
2150     __ENDTRY
2151     return ret;
2152 }
2153
2154 static BOOL CRYPT_AsnDecodeSMIMECapability(const BYTE *pbEncoded,
2155  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2156  DWORD *pcbDecoded)
2157 {
2158     BOOL ret;
2159     struct AsnDecodeSequenceItem items[] = {
2160      { ASN_OBJECTIDENTIFIER, offsetof(CRYPT_SMIME_CAPABILITY, pszObjId),
2161        CRYPT_AsnDecodeOidIgnoreTag, sizeof(LPSTR), FALSE, TRUE,
2162        offsetof(CRYPT_SMIME_CAPABILITY, pszObjId), 0 },
2163      { 0, offsetof(CRYPT_SMIME_CAPABILITY, Parameters),
2164        CRYPT_AsnDecodeCopyBytes, sizeof(CRYPT_OBJID_BLOB), TRUE, TRUE,
2165        offsetof(CRYPT_SMIME_CAPABILITY, Parameters.pbData), 0 },
2166     };
2167     PCRYPT_SMIME_CAPABILITY capability = pvStructInfo;
2168
2169     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2170      pvStructInfo, *pcbStructInfo);
2171
2172     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2173      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
2174      pcbDecoded, capability ? capability->pszObjId : NULL);
2175     TRACE("returning %d\n", ret);
2176     return ret;
2177 }
2178
2179 static BOOL CRYPT_AsnDecodeSMIMECapabilitiesInternal(const BYTE *pbEncoded,
2180  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2181  DWORD *pcbDecoded)
2182 {
2183     struct AsnArrayDescriptor arrayDesc = { 0,
2184      CRYPT_AsnDecodeSMIMECapability, sizeof(CRYPT_SMIME_CAPABILITY), TRUE,
2185      offsetof(CRYPT_SMIME_CAPABILITY, pszObjId) };
2186     PCRYPT_SMIME_CAPABILITIES capabilities = pvStructInfo;
2187     BOOL ret;
2188
2189     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
2190      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
2191      capabilities ? capabilities->rgCapability : NULL);
2192     return ret;
2193 }
2194
2195 static BOOL WINAPI CRYPT_AsnDecodeSMIMECapabilities(DWORD dwCertEncodingType,
2196  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2197  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2198 {
2199     BOOL ret = FALSE;
2200
2201     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2202      pDecodePara, pvStructInfo, *pcbStructInfo);
2203
2204     __TRY
2205     {
2206         DWORD bytesNeeded;
2207
2208         if (!cbEncoded)
2209             SetLastError(CRYPT_E_ASN1_EOD);
2210         else if (pbEncoded[0] != ASN_SEQUENCEOF)
2211             SetLastError(CRYPT_E_ASN1_CORRUPT);
2212         else if ((ret = CRYPT_AsnDecodeSMIMECapabilitiesInternal(pbEncoded,
2213          cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded,
2214          NULL)))
2215         {
2216             if (!pvStructInfo)
2217                 *pcbStructInfo = bytesNeeded;
2218             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
2219              pvStructInfo, pcbStructInfo, bytesNeeded)))
2220             {
2221                 PCRYPT_SMIME_CAPABILITIES capabilities;
2222
2223                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2224                     pvStructInfo = *(BYTE **)pvStructInfo;
2225                 capabilities = pvStructInfo;
2226                 capabilities->rgCapability =
2227                  (PCRYPT_SMIME_CAPABILITY)((BYTE *)pvStructInfo +
2228                  sizeof(CRYPT_SMIME_CAPABILITIES));
2229                 ret = CRYPT_AsnDecodeSMIMECapabilitiesInternal(pbEncoded,
2230                  cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
2231                  &bytesNeeded, NULL);
2232             }
2233         }
2234     }
2235     __EXCEPT_PAGE_FAULT
2236     {
2237         SetLastError(STATUS_ACCESS_VIOLATION);
2238     }
2239     __ENDTRY
2240     TRACE("returning %d\n", ret);
2241     return ret;
2242 }
2243
2244 static BOOL CRYPT_AsnDecodeIA5String(const BYTE *pbEncoded,
2245  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2246  DWORD *pcbDecoded)
2247 {
2248     BOOL ret = TRUE;
2249     DWORD dataLen;
2250     LPSTR *pStr = pvStructInfo;
2251
2252     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2253     {
2254         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2255         DWORD bytesNeeded = sizeof(LPSTR) + sizeof(char);
2256
2257         if (pbEncoded[0] != ASN_IA5STRING)
2258         {
2259             SetLastError(CRYPT_E_ASN1_CORRUPT);
2260             ret = FALSE;
2261         }
2262         else
2263         {
2264             bytesNeeded += dataLen;
2265             if (pcbDecoded)
2266                 *pcbDecoded = 1 + lenBytes + dataLen;
2267             if (!pvStructInfo)
2268                 *pcbStructInfo = bytesNeeded;
2269             else if (*pcbStructInfo < bytesNeeded)
2270             {
2271                 *pcbStructInfo = bytesNeeded;
2272                 SetLastError(ERROR_MORE_DATA);
2273                 ret = FALSE;
2274             }
2275             else
2276             {
2277                 *pcbStructInfo = bytesNeeded;
2278                 if (dataLen)
2279                 {
2280                     LPSTR str = *pStr;
2281
2282                     assert(str);
2283                     memcpy(str, pbEncoded + 1 + lenBytes, dataLen);
2284                     str[dataLen] = 0;
2285                 }
2286                 else
2287                     *pStr = NULL;
2288             }
2289         }
2290     }
2291     return ret;
2292 }
2293
2294 static BOOL CRYPT_AsnDecodeIntArray(const BYTE *pbEncoded,
2295  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2296  DWORD *pcbDecoded)
2297 {
2298     struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
2299      CRYPT_AsnDecodeIntInternal, sizeof(int), FALSE, 0 };
2300     struct GenericArray *array = pvStructInfo;
2301     BOOL ret;
2302
2303     TRACE("(%p, %d, %08x, %p, %d)\n", pbEncoded, cbEncoded, dwFlags,
2304      pvStructInfo, pvStructInfo ? *pcbDecoded : 0);
2305
2306     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
2307      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
2308      array ? array->rgItems : NULL);
2309     TRACE("returning %d\n", ret);
2310     return ret;
2311 }
2312
2313 static BOOL CRYPT_AsnDecodeNoticeReference(const BYTE *pbEncoded,
2314  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2315  DWORD *pcbDecoded)
2316 {
2317     BOOL ret;
2318     struct AsnDecodeSequenceItem items[] = {
2319      { ASN_IA5STRING, offsetof(CERT_POLICY_QUALIFIER_NOTICE_REFERENCE,
2320        pszOrganization), CRYPT_AsnDecodeIA5String, sizeof(LPSTR), FALSE, TRUE,
2321        offsetof(CERT_POLICY_QUALIFIER_NOTICE_REFERENCE, pszOrganization), 0 },
2322      { ASN_SEQUENCEOF, offsetof(CERT_POLICY_QUALIFIER_NOTICE_REFERENCE,
2323        cNoticeNumbers), CRYPT_AsnDecodeIntArray, sizeof(struct GenericArray),
2324        FALSE, TRUE, offsetof(CERT_POLICY_QUALIFIER_NOTICE_REFERENCE,
2325        rgNoticeNumbers), 0 },
2326     };
2327     DWORD bytesNeeded;
2328
2329     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2330      pvStructInfo, pvStructInfo ? *pcbStructInfo : 0);
2331
2332     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2333      pbEncoded, cbEncoded, dwFlags, NULL, NULL, &bytesNeeded, pcbDecoded,
2334      NULL);
2335     if (ret)
2336     {
2337         /* The caller is expecting a pointer to a
2338          * CERT_POLICY_QUALIFIER_NOTICE_REFERENCE to be decoded, whereas
2339          * CRYPT_AsnDecodeSequence is decoding a
2340          * CERT_POLICY_QUALIFIER_NOTICE_REFERENCE.  Increment the bytes
2341          * needed, and decode again if the requisite space is available.
2342          */
2343         bytesNeeded += sizeof(PCERT_POLICY_QUALIFIER_NOTICE_REFERENCE);
2344         if (!pvStructInfo)
2345             *pcbStructInfo = bytesNeeded;
2346         else if (*pcbStructInfo < bytesNeeded)
2347         {
2348             *pcbStructInfo = bytesNeeded;
2349             SetLastError(ERROR_MORE_DATA);
2350             ret = FALSE;
2351         }
2352         else
2353         {
2354             PCERT_POLICY_QUALIFIER_NOTICE_REFERENCE noticeRef;
2355
2356             *pcbStructInfo = bytesNeeded;
2357             /* The pointer (pvStructInfo) passed in points to the first dynamic
2358              * pointer, so use it as the pointer to the
2359              * CERT_POLICY_QUALIFIER_NOTICE_REFERENCE, and create the
2360              * appropriate offset for the first dynamic pointer within the
2361              * notice reference by pointing to the first memory location past
2362              * the CERT_POLICY_QUALIFIER_NOTICE_REFERENCE.
2363              */
2364             noticeRef =
2365              *(PCERT_POLICY_QUALIFIER_NOTICE_REFERENCE *)pvStructInfo;
2366             noticeRef->pszOrganization = (LPSTR)((LPBYTE)noticeRef +
2367              sizeof(CERT_POLICY_QUALIFIER_NOTICE_REFERENCE));
2368             ret = CRYPT_AsnDecodeSequence(items,
2369              sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
2370              NULL, noticeRef, &bytesNeeded, pcbDecoded,
2371              noticeRef->pszOrganization);
2372         }
2373     }
2374     TRACE("returning %d\n", ret);
2375     return ret;
2376 }
2377
2378 static BOOL CRYPT_AsnDecodeUnicodeString(const BYTE *pbEncoded,
2379  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2380  DWORD *pcbDecoded)
2381 {
2382     BOOL ret = TRUE;
2383     DWORD dataLen;
2384
2385     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2386     {
2387         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2388         DWORD bytesNeeded = sizeof(LPWSTR);
2389
2390         switch (pbEncoded[0])
2391         {
2392         case ASN_NUMERICSTRING:
2393             if (dataLen)
2394                 bytesNeeded += (dataLen + 1) * 2;
2395             break;
2396         case ASN_PRINTABLESTRING:
2397             if (dataLen)
2398                 bytesNeeded += (dataLen + 1) * 2;
2399             break;
2400         case ASN_IA5STRING:
2401             if (dataLen)
2402                 bytesNeeded += (dataLen + 1) * 2;
2403             break;
2404         case ASN_T61STRING:
2405             if (dataLen)
2406                 bytesNeeded += (dataLen + 1) * 2;
2407             break;
2408         case ASN_VIDEOTEXSTRING:
2409             if (dataLen)
2410                 bytesNeeded += (dataLen + 1) * 2;
2411             break;
2412         case ASN_GRAPHICSTRING:
2413             if (dataLen)
2414                 bytesNeeded += (dataLen + 1) * 2;
2415             break;
2416         case ASN_VISIBLESTRING:
2417             if (dataLen)
2418                 bytesNeeded += (dataLen + 1) * 2;
2419             break;
2420         case ASN_GENERALSTRING:
2421             if (dataLen)
2422                 bytesNeeded += (dataLen + 1) * 2;
2423             break;
2424         case ASN_UNIVERSALSTRING:
2425             if (dataLen)
2426                 bytesNeeded += dataLen / 2 + sizeof(WCHAR);
2427             break;
2428         case ASN_BMPSTRING:
2429             if (dataLen)
2430                 bytesNeeded += dataLen + sizeof(WCHAR);
2431             break;
2432         case ASN_UTF8STRING:
2433             if (dataLen)
2434                 bytesNeeded += (MultiByteToWideChar(CP_UTF8, 0,
2435                  (LPCSTR)pbEncoded + 1 + lenBytes, dataLen, NULL, 0) + 1) * 2;
2436             break;
2437         default:
2438             SetLastError(CRYPT_E_ASN1_BADTAG);
2439             return FALSE;
2440         }
2441
2442         if (pcbDecoded)
2443             *pcbDecoded = 1 + lenBytes + dataLen;
2444         if (!pvStructInfo)
2445             *pcbStructInfo = bytesNeeded;
2446         else if (*pcbStructInfo < bytesNeeded)
2447         {
2448             *pcbStructInfo = bytesNeeded;
2449             SetLastError(ERROR_MORE_DATA);
2450             ret = FALSE;
2451         }
2452         else
2453         {
2454             LPWSTR *pStr = pvStructInfo;
2455
2456             *pcbStructInfo = bytesNeeded;
2457             if (dataLen)
2458             {
2459                 DWORD i;
2460                 LPWSTR str = *(LPWSTR *)pStr;
2461
2462                 assert(str);
2463                 switch (pbEncoded[0])
2464                 {
2465                 case ASN_NUMERICSTRING:
2466                 case ASN_PRINTABLESTRING:
2467                 case ASN_IA5STRING:
2468                 case ASN_T61STRING:
2469                 case ASN_VIDEOTEXSTRING:
2470                 case ASN_GRAPHICSTRING:
2471                 case ASN_VISIBLESTRING:
2472                 case ASN_GENERALSTRING:
2473                     for (i = 0; i < dataLen; i++)
2474                         str[i] = pbEncoded[1 + lenBytes + i];
2475                     str[i] = 0;
2476                     break;
2477                 case ASN_UNIVERSALSTRING:
2478                     for (i = 0; i < dataLen / 4; i++)
2479                         str[i] = (pbEncoded[1 + lenBytes + 2 * i + 2] << 8)
2480                          | pbEncoded[1 + lenBytes + 2 * i + 3];
2481                     str[i] = 0;
2482                     break;
2483                 case ASN_BMPSTRING:
2484                     for (i = 0; i < dataLen / 2; i++)
2485                         str[i] = (pbEncoded[1 + lenBytes + 2 * i] << 8) |
2486                          pbEncoded[1 + lenBytes + 2 * i + 1];
2487                     str[i] = 0;
2488                     break;
2489                 case ASN_UTF8STRING:
2490                 {
2491                     int len = MultiByteToWideChar(CP_UTF8, 0,
2492                      (LPCSTR)pbEncoded + 1 + lenBytes, dataLen,
2493                      str, bytesNeeded - sizeof(CERT_NAME_VALUE)) * 2;
2494                     str[len] = 0;
2495                     break;
2496                 }
2497                 }
2498             }
2499             else
2500                 *pStr = NULL;
2501         }
2502     }
2503     return ret;
2504 }
2505
2506 static BOOL CRYPT_AsnDecodePolicyQualifierUserNoticeInternal(
2507  const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo,
2508  DWORD *pcbStructInfo, DWORD *pcbDecoded)
2509 {
2510     BOOL ret;
2511     struct AsnDecodeSequenceItem items[] = {
2512      { ASN_SEQUENCE, offsetof(CERT_POLICY_QUALIFIER_USER_NOTICE,
2513        pNoticeReference), CRYPT_AsnDecodeNoticeReference,
2514        sizeof(PCERT_POLICY_QUALIFIER_NOTICE_REFERENCE), TRUE, TRUE,
2515        offsetof(CERT_POLICY_QUALIFIER_USER_NOTICE, pNoticeReference), 0 },
2516      { 0, offsetof(CERT_POLICY_QUALIFIER_USER_NOTICE, pszDisplayText),
2517        CRYPT_AsnDecodeUnicodeString, sizeof(LPWSTR), TRUE, TRUE,
2518        offsetof(CERT_POLICY_QUALIFIER_USER_NOTICE, pszDisplayText), 0 },
2519     };
2520     PCERT_POLICY_QUALIFIER_USER_NOTICE notice = pvStructInfo;
2521
2522     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2523      pvStructInfo, *pcbStructInfo);
2524
2525     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2526      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
2527      pcbDecoded, notice ? notice->pNoticeReference : NULL);
2528     TRACE("returning %d\n", ret);
2529     return ret;
2530 }
2531
2532 static BOOL WINAPI CRYPT_AsnDecodePolicyQualifierUserNotice(
2533  DWORD dwCertEncodingType, LPCSTR lpszStructType, const BYTE *pbEncoded,
2534  DWORD cbEncoded, DWORD dwFlags, PCRYPT_DECODE_PARA pDecodePara,
2535  void *pvStructInfo, DWORD *pcbStructInfo)
2536 {
2537     BOOL ret = FALSE;
2538
2539     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2540      pDecodePara, pvStructInfo, *pcbStructInfo);
2541
2542     __TRY
2543     {
2544         DWORD bytesNeeded;
2545
2546         ret = CRYPT_AsnDecodePolicyQualifierUserNoticeInternal(pbEncoded,
2547          cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded,
2548          NULL);
2549         if (ret)
2550         {
2551             if (!pvStructInfo)
2552                 *pcbStructInfo = bytesNeeded;
2553             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
2554              pvStructInfo, pcbStructInfo, bytesNeeded)))
2555             {
2556                 PCERT_POLICY_QUALIFIER_USER_NOTICE notice;
2557
2558                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2559                     pvStructInfo = *(BYTE **)pvStructInfo;
2560                 notice = pvStructInfo;
2561                 notice->pNoticeReference =
2562                  (PCERT_POLICY_QUALIFIER_NOTICE_REFERENCE)
2563                  ((BYTE *)pvStructInfo +
2564                  sizeof(CERT_POLICY_QUALIFIER_USER_NOTICE));
2565                 ret = CRYPT_AsnDecodePolicyQualifierUserNoticeInternal(
2566                  pbEncoded, cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG,
2567                  pvStructInfo, &bytesNeeded, NULL);
2568             }
2569         }
2570     }
2571     __EXCEPT_PAGE_FAULT
2572     {
2573         SetLastError(STATUS_ACCESS_VIOLATION);
2574     }
2575     __ENDTRY
2576     TRACE("returning %d\n", ret);
2577     return ret;
2578 }
2579
2580 static BOOL CRYPT_AsnDecodePKCSAttributeInternal(const BYTE *pbEncoded,
2581  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2582  DWORD *pcbDecoded)
2583 {
2584     BOOL ret;
2585     struct AsnDecodeSequenceItem items[] = {
2586      { ASN_OBJECTIDENTIFIER, offsetof(CRYPT_ATTRIBUTE, pszObjId),
2587        CRYPT_AsnDecodeOidIgnoreTag, sizeof(LPSTR), FALSE, TRUE,
2588        offsetof(CRYPT_ATTRIBUTE, pszObjId), 0 },
2589      { ASN_CONSTRUCTOR | ASN_SETOF, offsetof(CRYPT_ATTRIBUTE, cValue),
2590        CRYPT_DecodeDERArray, sizeof(struct GenericArray), FALSE, TRUE,
2591        offsetof(CRYPT_ATTRIBUTE, rgValue), 0 },
2592     };
2593     PCRYPT_ATTRIBUTE attr = pvStructInfo;
2594
2595     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2596      pvStructInfo, *pcbStructInfo);
2597
2598     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2599      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
2600      pcbDecoded, attr ? attr->pszObjId : NULL);
2601     TRACE("returning %d\n", ret);
2602     return ret;
2603 }
2604
2605 static BOOL WINAPI CRYPT_AsnDecodePKCSAttribute(DWORD dwCertEncodingType,
2606  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2607  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2608 {
2609     BOOL ret = FALSE;
2610
2611     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2612      pDecodePara, pvStructInfo, *pcbStructInfo);
2613
2614     __TRY
2615     {
2616         DWORD bytesNeeded;
2617
2618         ret = CRYPT_AsnDecodePKCSAttributeInternal(pbEncoded, cbEncoded,
2619          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL);
2620         if (ret)
2621         {
2622             if (!pvStructInfo)
2623                 *pcbStructInfo = bytesNeeded;
2624             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
2625              pvStructInfo, pcbStructInfo, bytesNeeded)))
2626             {
2627                 PCRYPT_ATTRIBUTE attr;
2628
2629                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2630                     pvStructInfo = *(BYTE **)pvStructInfo;
2631                 attr = pvStructInfo;
2632                 attr->pszObjId = (LPSTR)((BYTE *)pvStructInfo +
2633                  sizeof(CRYPT_ATTRIBUTE));
2634                 ret = CRYPT_AsnDecodePKCSAttributeInternal(pbEncoded, cbEncoded,
2635                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo, &bytesNeeded,
2636                  NULL);
2637             }
2638         }
2639     }
2640     __EXCEPT_PAGE_FAULT
2641     {
2642         SetLastError(STATUS_ACCESS_VIOLATION);
2643     }
2644     __ENDTRY
2645     TRACE("returning %d\n", ret);
2646     return ret;
2647 }
2648
2649 static BOOL CRYPT_AsnDecodePKCSAttributesInternal(const BYTE *pbEncoded,
2650  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2651  DWORD *pcbDecoded)
2652 {
2653     struct AsnArrayDescriptor arrayDesc = { 0,
2654      CRYPT_AsnDecodePKCSAttributeInternal, sizeof(CRYPT_ATTRIBUTE), TRUE,
2655      offsetof(CRYPT_ATTRIBUTE, pszObjId) };
2656     PCRYPT_ATTRIBUTES attrs = pvStructInfo;
2657     BOOL ret;
2658
2659     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
2660      NULL, pvStructInfo, pcbStructInfo, pcbDecoded, attrs ? attrs->rgAttr :
2661      NULL);
2662     return ret;
2663 }
2664
2665 static BOOL WINAPI CRYPT_AsnDecodePKCSAttributes(DWORD dwCertEncodingType,
2666  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2667  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2668 {
2669     BOOL ret = FALSE;
2670
2671     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2672      pDecodePara, pvStructInfo, *pcbStructInfo);
2673
2674     __TRY
2675     {
2676         DWORD bytesNeeded;
2677
2678         if (!cbEncoded)
2679             SetLastError(CRYPT_E_ASN1_EOD);
2680         else if (pbEncoded[0] != (ASN_CONSTRUCTOR | ASN_SETOF))
2681             SetLastError(CRYPT_E_ASN1_CORRUPT);
2682         else if ((ret = CRYPT_AsnDecodePKCSAttributesInternal(pbEncoded,
2683          cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded,
2684          NULL)))
2685         {
2686             if (!pvStructInfo)
2687                 *pcbStructInfo = bytesNeeded;
2688             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
2689              pvStructInfo, pcbStructInfo, bytesNeeded)))
2690             {
2691                 PCRYPT_ATTRIBUTES attrs;
2692
2693                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2694                     pvStructInfo = *(BYTE **)pvStructInfo;
2695                 attrs = pvStructInfo;
2696                 attrs->rgAttr = (PCRYPT_ATTRIBUTE)((BYTE *)pvStructInfo +
2697                  sizeof(CRYPT_ATTRIBUTES));
2698                 ret = CRYPT_AsnDecodePKCSAttributesInternal(pbEncoded,
2699                  cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
2700                  &bytesNeeded, NULL);
2701             }
2702         }
2703     }
2704     __EXCEPT_PAGE_FAULT
2705     {
2706         SetLastError(STATUS_ACCESS_VIOLATION);
2707     }
2708     __ENDTRY
2709     TRACE("returning %d\n", ret);
2710     return ret;
2711 }
2712
2713 static BOOL CRYPT_AsnDecodeAlgorithmId(const BYTE *pbEncoded, DWORD cbEncoded,
2714  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
2715 {
2716     CRYPT_ALGORITHM_IDENTIFIER *algo = pvStructInfo;
2717     BOOL ret = TRUE;
2718     struct AsnDecodeSequenceItem items[] = {
2719      { ASN_OBJECTIDENTIFIER, offsetof(CRYPT_ALGORITHM_IDENTIFIER, pszObjId),
2720        CRYPT_AsnDecodeOidIgnoreTag, sizeof(LPSTR), FALSE, TRUE,
2721        offsetof(CRYPT_ALGORITHM_IDENTIFIER, pszObjId), 0 },
2722      { 0, offsetof(CRYPT_ALGORITHM_IDENTIFIER, Parameters),
2723        CRYPT_AsnDecodeCopyBytes, sizeof(CRYPT_OBJID_BLOB), TRUE, TRUE, 
2724        offsetof(CRYPT_ALGORITHM_IDENTIFIER, Parameters.pbData), 0 },
2725     };
2726
2727     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
2728      pvStructInfo, *pcbStructInfo, pcbDecoded);
2729
2730     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2731      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
2732      pcbDecoded, algo ? algo->pszObjId : NULL);
2733     if (ret && pvStructInfo)
2734     {
2735         TRACE("pszObjId is %p (%s)\n", algo->pszObjId,
2736          debugstr_a(algo->pszObjId));
2737     }
2738     return ret;
2739 }
2740
2741 static BOOL CRYPT_AsnDecodePubKeyInfoInternal(const BYTE *pbEncoded,
2742  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2743  DWORD *pcbDecoded)
2744 {
2745     BOOL ret = TRUE;
2746     struct AsnDecodeSequenceItem items[] = {
2747      { ASN_SEQUENCEOF, offsetof(CERT_PUBLIC_KEY_INFO, Algorithm),
2748        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
2749        FALSE, TRUE, offsetof(CERT_PUBLIC_KEY_INFO,
2750        Algorithm.pszObjId) },
2751      { ASN_BITSTRING, offsetof(CERT_PUBLIC_KEY_INFO, PublicKey),
2752        CRYPT_AsnDecodeBitsInternal, sizeof(CRYPT_BIT_BLOB), FALSE, TRUE,
2753        offsetof(CERT_PUBLIC_KEY_INFO, PublicKey.pbData) },
2754     };
2755     PCERT_PUBLIC_KEY_INFO info = pvStructInfo;
2756
2757     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
2758      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
2759      pcbDecoded, info ? info->Algorithm.Parameters.pbData : NULL);
2760     return ret;
2761 }
2762
2763 static BOOL WINAPI CRYPT_AsnDecodePubKeyInfo(DWORD dwCertEncodingType,
2764  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2765  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2766 {
2767     BOOL ret = TRUE;
2768
2769     __TRY
2770     {
2771         DWORD bytesNeeded;
2772
2773         if ((ret = CRYPT_AsnDecodePubKeyInfoInternal(pbEncoded, cbEncoded,
2774          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL)))
2775         {
2776             if (!pvStructInfo)
2777                 *pcbStructInfo = bytesNeeded;
2778             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
2779              pvStructInfo, pcbStructInfo, bytesNeeded)))
2780             {
2781                 PCERT_PUBLIC_KEY_INFO info;
2782
2783                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2784                     pvStructInfo = *(BYTE **)pvStructInfo;
2785                 info = pvStructInfo;
2786                 info->Algorithm.Parameters.pbData = (BYTE *)pvStructInfo +
2787                  sizeof(CERT_PUBLIC_KEY_INFO);
2788                 ret = CRYPT_AsnDecodePubKeyInfoInternal(pbEncoded, cbEncoded,
2789                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
2790                  &bytesNeeded, NULL);
2791             }
2792         }
2793     }
2794     __EXCEPT_PAGE_FAULT
2795     {
2796         SetLastError(STATUS_ACCESS_VIOLATION);
2797         ret = FALSE;
2798     }
2799     __ENDTRY
2800     return ret;
2801 }
2802
2803 static BOOL CRYPT_AsnDecodeBool(const BYTE *pbEncoded, DWORD cbEncoded,
2804  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
2805 {
2806     BOOL ret;
2807
2808     if (cbEncoded < 3)
2809     {
2810         SetLastError(CRYPT_E_ASN1_CORRUPT);
2811         return FALSE;
2812     }
2813     if (GET_LEN_BYTES(pbEncoded[1]) > 1)
2814     {
2815         SetLastError(CRYPT_E_ASN1_CORRUPT);
2816         return FALSE;
2817     }
2818     if (pbEncoded[1] > 1)
2819     {
2820         SetLastError(CRYPT_E_ASN1_CORRUPT);
2821         return FALSE;
2822     }
2823     if (pcbDecoded)
2824         *pcbDecoded = 3;
2825     if (!pvStructInfo)
2826     {
2827         *pcbStructInfo = sizeof(BOOL);
2828         ret = TRUE;
2829     }
2830     else if (*pcbStructInfo < sizeof(BOOL))
2831     {
2832         *pcbStructInfo = sizeof(BOOL);
2833         SetLastError(ERROR_MORE_DATA);
2834         ret = FALSE;
2835     }
2836     else
2837     {
2838         *pcbStructInfo = sizeof(BOOL);
2839         *(BOOL *)pvStructInfo = pbEncoded[2] ? TRUE : FALSE;
2840         ret = TRUE;
2841     }
2842     TRACE("returning %d (%08x)\n", ret, GetLastError());
2843     return ret;
2844 }
2845
2846 static BOOL CRYPT_AsnDecodeAltNameEntry(const BYTE *pbEncoded, DWORD cbEncoded,
2847  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
2848 {
2849     PCERT_ALT_NAME_ENTRY entry = pvStructInfo;
2850     DWORD dataLen, lenBytes, bytesNeeded = sizeof(CERT_ALT_NAME_ENTRY);
2851     BOOL ret;
2852
2853     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
2854      pvStructInfo, *pcbStructInfo);
2855
2856     if (cbEncoded < 2)
2857     {
2858         SetLastError(CRYPT_E_ASN1_CORRUPT);
2859         return FALSE;
2860     }
2861     lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2862     if (1 + lenBytes > cbEncoded)
2863     {
2864         SetLastError(CRYPT_E_ASN1_CORRUPT);
2865         return FALSE;
2866     }
2867     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2868     {
2869         switch (pbEncoded[0] & ASN_TYPE_MASK)
2870         {
2871         case 1: /* rfc822Name */
2872         case 2: /* dNSName */
2873         case 6: /* uniformResourceIdentifier */
2874             bytesNeeded += (dataLen + 1) * sizeof(WCHAR);
2875             break;
2876         case 4: /* directoryName */
2877         case 7: /* iPAddress */
2878             bytesNeeded += dataLen;
2879             break;
2880         case 8: /* registeredID */
2881             ret = CRYPT_AsnDecodeOidIgnoreTag(pbEncoded, cbEncoded, 0, NULL,
2882              &dataLen, NULL);
2883             if (ret)
2884             {
2885                 /* FIXME: ugly, shouldn't need to know internals of OID decode
2886                  * function to use it.
2887                  */
2888                 bytesNeeded += dataLen - sizeof(LPSTR);
2889             }
2890             break;
2891         case 0: /* otherName */
2892             FIXME("%d: stub\n", pbEncoded[0] & ASN_TYPE_MASK);
2893             SetLastError(CRYPT_E_ASN1_BADTAG);
2894             ret = FALSE;
2895             break;
2896         case 3: /* x400Address, unimplemented */
2897         case 5: /* ediPartyName, unimplemented */
2898             TRACE("type %d unimplemented\n", pbEncoded[0] & ASN_TYPE_MASK);
2899             SetLastError(CRYPT_E_ASN1_BADTAG);
2900             ret = FALSE;
2901             break;
2902         default:
2903             TRACE("type %d bad\n", pbEncoded[0] & ASN_TYPE_MASK);
2904             SetLastError(CRYPT_E_ASN1_CORRUPT);
2905             ret = FALSE;
2906         }
2907         if (ret)
2908         {
2909             if (pcbDecoded)
2910                 *pcbDecoded = 1 + lenBytes + dataLen;
2911             if (!entry)
2912                 *pcbStructInfo = bytesNeeded;
2913             else if (*pcbStructInfo < bytesNeeded)
2914             {
2915                 *pcbStructInfo = bytesNeeded;
2916                 SetLastError(ERROR_MORE_DATA);
2917                 ret = FALSE;
2918             }
2919             else
2920             {
2921                 *pcbStructInfo = bytesNeeded;
2922                 /* MS used values one greater than the asn1 ones.. sigh */
2923                 entry->dwAltNameChoice = (pbEncoded[0] & ASN_TYPE_MASK) + 1;
2924                 switch (pbEncoded[0] & ASN_TYPE_MASK)
2925                 {
2926                 case 1: /* rfc822Name */
2927                 case 2: /* dNSName */
2928                 case 6: /* uniformResourceIdentifier */
2929                 {
2930                     DWORD i;
2931
2932                     for (i = 0; i < dataLen; i++)
2933                         entry->u.pwszURL[i] =
2934                          (WCHAR)pbEncoded[1 + lenBytes + i];
2935                     entry->u.pwszURL[i] = 0;
2936                     TRACE("URL is %p (%s)\n", entry->u.pwszURL,
2937                      debugstr_w(entry->u.pwszURL));
2938                     break;
2939                 }
2940                 case 4: /* directoryName */
2941                     /* The data are memory-equivalent with the IPAddress case,
2942                      * fall-through
2943                      */
2944                 case 7: /* iPAddress */
2945                     /* The next data pointer is in the pwszURL spot, that is,
2946                      * the first 4 bytes.  Need to move it to the next spot.
2947                      */
2948                     entry->u.IPAddress.pbData = (LPBYTE)entry->u.pwszURL;
2949                     entry->u.IPAddress.cbData = dataLen;
2950                     memcpy(entry->u.IPAddress.pbData, pbEncoded + 1 + lenBytes,
2951                      dataLen);
2952                     break;
2953                 case 8: /* registeredID */
2954                     ret = CRYPT_AsnDecodeOidIgnoreTag(pbEncoded, cbEncoded, 0,
2955                      &entry->u.pszRegisteredID, &dataLen, NULL);
2956                     break;
2957                 }
2958             }
2959         }
2960     }
2961     return ret;
2962 }
2963
2964 static BOOL CRYPT_AsnDecodeAltNameInternal(const BYTE *pbEncoded,
2965  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2966  DWORD *pcbDecoded)
2967 {
2968     BOOL ret = TRUE;
2969     struct AsnArrayDescriptor arrayDesc = { 0,
2970      CRYPT_AsnDecodeAltNameEntry, sizeof(CERT_ALT_NAME_ENTRY), TRUE,
2971      offsetof(CERT_ALT_NAME_ENTRY, u.pwszURL) };
2972     PCERT_ALT_NAME_INFO info = pvStructInfo;
2973
2974     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
2975      pvStructInfo, *pcbStructInfo, pcbDecoded);
2976
2977     if (info)
2978         TRACE("info->rgAltEntry is %p\n", info->rgAltEntry);
2979     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
2980      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
2981      info ? info->rgAltEntry : NULL);
2982     return ret;
2983 }
2984
2985 /* Like CRYPT_AsnDecodeIntegerInternal, but swaps the bytes */
2986 static BOOL CRYPT_AsnDecodeIntegerSwapBytes(const BYTE *pbEncoded,
2987  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
2988  DWORD *pcbDecoded)
2989 {
2990     BOOL ret;
2991
2992     TRACE("(%p, %d, 0x%08x, %p, %d, %p)\n", pbEncoded, cbEncoded, dwFlags,
2993      pvStructInfo, *pcbStructInfo, pcbDecoded);
2994
2995     /* Can't use the CRYPT_DECODE_NOCOPY_FLAG, because we modify the bytes in-
2996      * place.
2997      */
2998     ret = CRYPT_AsnDecodeIntegerInternal(pbEncoded, cbEncoded,
2999      dwFlags & ~CRYPT_DECODE_NOCOPY_FLAG, pvStructInfo, pcbStructInfo,
3000      pcbDecoded);
3001     if (ret && pvStructInfo)
3002     {
3003         CRYPT_DATA_BLOB *blob = pvStructInfo;
3004
3005         if (blob->cbData)
3006         {
3007             DWORD i;
3008             BYTE temp;
3009
3010             for (i = 0; i < blob->cbData / 2; i++)
3011             {
3012                 temp = blob->pbData[i];
3013                 blob->pbData[i] = blob->pbData[blob->cbData - i - 1];
3014                 blob->pbData[blob->cbData - i - 1] = temp;
3015             }
3016         }
3017     }
3018     TRACE("returning %d (%08x)\n", ret, GetLastError());
3019     return ret;
3020 }
3021
3022 static BOOL WINAPI CRYPT_AsnDecodeAuthorityKeyId(DWORD dwCertEncodingType,
3023  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3024  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3025 {
3026     BOOL ret;
3027
3028     __TRY
3029     {
3030         struct AsnDecodeSequenceItem items[] = {
3031          { ASN_CONTEXT | 0, offsetof(CERT_AUTHORITY_KEY_ID_INFO, KeyId),
3032            CRYPT_AsnDecodeIntegerSwapBytes, sizeof(CRYPT_DATA_BLOB),
3033            TRUE, TRUE, offsetof(CERT_AUTHORITY_KEY_ID_INFO, KeyId.pbData), 0 },
3034          { ASN_CONTEXT | ASN_CONSTRUCTOR| 1,
3035            offsetof(CERT_AUTHORITY_KEY_ID_INFO, CertIssuer),
3036            CRYPT_AsnDecodeOctetsInternal, sizeof(CERT_NAME_BLOB), TRUE, TRUE,
3037            offsetof(CERT_AUTHORITY_KEY_ID_INFO, CertIssuer.pbData), 0 },
3038          { ASN_CONTEXT | 2, offsetof(CERT_AUTHORITY_KEY_ID_INFO,
3039            CertSerialNumber), CRYPT_AsnDecodeIntegerInternal,
3040            sizeof(CRYPT_INTEGER_BLOB), TRUE, TRUE,
3041            offsetof(CERT_AUTHORITY_KEY_ID_INFO, CertSerialNumber.pbData), 0 },
3042         };
3043
3044         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3045          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
3046          pcbStructInfo, NULL, NULL);
3047     }
3048     __EXCEPT_PAGE_FAULT
3049     {
3050         SetLastError(STATUS_ACCESS_VIOLATION);
3051         ret = FALSE;
3052     }
3053     __ENDTRY
3054     return ret;
3055 }
3056
3057 static BOOL WINAPI CRYPT_AsnDecodeAuthorityKeyId2(DWORD dwCertEncodingType,
3058  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3059  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3060 {
3061     BOOL ret;
3062
3063     __TRY
3064     {
3065         struct AsnDecodeSequenceItem items[] = {
3066          { ASN_CONTEXT | 0, offsetof(CERT_AUTHORITY_KEY_ID2_INFO, KeyId),
3067            CRYPT_AsnDecodeIntegerSwapBytes, sizeof(CRYPT_DATA_BLOB),
3068            TRUE, TRUE, offsetof(CERT_AUTHORITY_KEY_ID2_INFO, KeyId.pbData), 0 },
3069          { ASN_CONTEXT | ASN_CONSTRUCTOR| 1,
3070            offsetof(CERT_AUTHORITY_KEY_ID2_INFO, AuthorityCertIssuer),
3071            CRYPT_AsnDecodeAltNameInternal, sizeof(CERT_ALT_NAME_INFO), TRUE,
3072            TRUE, offsetof(CERT_AUTHORITY_KEY_ID2_INFO,
3073            AuthorityCertIssuer.rgAltEntry), 0 },
3074          { ASN_CONTEXT | 2, offsetof(CERT_AUTHORITY_KEY_ID2_INFO,
3075            AuthorityCertSerialNumber), CRYPT_AsnDecodeIntegerInternal,
3076            sizeof(CRYPT_INTEGER_BLOB), TRUE, TRUE,
3077            offsetof(CERT_AUTHORITY_KEY_ID2_INFO,
3078            AuthorityCertSerialNumber.pbData), 0 },
3079         };
3080
3081         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3082          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
3083          pcbStructInfo, NULL, NULL);
3084     }
3085     __EXCEPT_PAGE_FAULT
3086     {
3087         SetLastError(STATUS_ACCESS_VIOLATION);
3088         ret = FALSE;
3089     }
3090     __ENDTRY
3091     return ret;
3092 }
3093
3094 static BOOL CRYPT_AsnDecodeAccessDescription(const BYTE *pbEncoded,
3095  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3096  DWORD *pcbDecoded)
3097 {
3098     struct AsnDecodeSequenceItem items[] = {
3099      { 0, offsetof(CERT_ACCESS_DESCRIPTION, pszAccessMethod),
3100        CRYPT_AsnDecodeOidInternal, sizeof(LPSTR), FALSE, TRUE,
3101        offsetof(CERT_ACCESS_DESCRIPTION, pszAccessMethod), 0 },
3102      { 0, offsetof(CERT_ACCESS_DESCRIPTION, AccessLocation),
3103        CRYPT_AsnDecodeAltNameEntry, sizeof(CERT_ALT_NAME_ENTRY), FALSE,
3104        TRUE, offsetof(CERT_ACCESS_DESCRIPTION, AccessLocation.u.pwszURL), 0 },
3105     };
3106     CERT_ACCESS_DESCRIPTION *descr = pvStructInfo;
3107
3108     return CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3109      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
3110      pcbDecoded, descr ? descr->pszAccessMethod : NULL);
3111 }
3112
3113 static BOOL WINAPI CRYPT_AsnDecodeAuthorityInfoAccess(DWORD dwCertEncodingType,
3114  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3115  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3116 {
3117     BOOL ret;
3118
3119     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3120      pDecodePara, pvStructInfo, *pcbStructInfo);
3121
3122     __TRY
3123     {
3124         struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
3125          CRYPT_AsnDecodeAccessDescription, sizeof(CERT_ACCESS_DESCRIPTION),
3126          TRUE, offsetof(CERT_ACCESS_DESCRIPTION, pszAccessMethod) };
3127
3128         ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
3129          pDecodePara, pvStructInfo, pcbStructInfo, NULL, NULL);
3130     }
3131     __EXCEPT_PAGE_FAULT
3132     {
3133         SetLastError(STATUS_ACCESS_VIOLATION);
3134         ret = FALSE;
3135     }
3136     __ENDTRY
3137     return ret;
3138 }
3139
3140 static BOOL CRYPT_AsnDecodePKCSContent(const BYTE *pbEncoded, DWORD cbEncoded,
3141  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
3142 {
3143     BOOL ret;
3144     DWORD dataLen;
3145
3146     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
3147      pvStructInfo, *pcbStructInfo, pcbDecoded);
3148
3149     /* The caller has already checked the tag, no need to check it again.
3150      * Check the outer length is valid:
3151      */
3152     if ((ret = CRYPT_GetLengthIndefinite(pbEncoded, cbEncoded, &dataLen)))
3153     {
3154         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3155         DWORD innerLen;
3156
3157         pbEncoded += 1 + lenBytes;
3158         cbEncoded -= 1 + lenBytes;
3159         if (dataLen == CMSG_INDEFINITE_LENGTH)
3160             cbEncoded -= 2; /* space for 0 TLV */
3161         /* Check the inner length is valid: */
3162         if ((ret = CRYPT_GetLengthIndefinite(pbEncoded, cbEncoded, &innerLen)))
3163         {
3164             DWORD decodedLen;
3165
3166             ret = CRYPT_AsnDecodeCopyBytes(pbEncoded, cbEncoded, dwFlags,
3167              pvStructInfo, pcbStructInfo, &decodedLen);
3168             if (dataLen == CMSG_INDEFINITE_LENGTH)
3169             {
3170                 if (*(pbEncoded + decodedLen) != 0 ||
3171                  *(pbEncoded + decodedLen + 1) != 0)
3172                 {
3173                     TRACE("expected 0 TLV, got {%02x,%02x}\n",
3174                      *(pbEncoded + decodedLen),
3175                      *(pbEncoded + decodedLen + 1));
3176                     SetLastError(CRYPT_E_ASN1_CORRUPT);
3177                     ret = FALSE;
3178                 }
3179                 else
3180                     decodedLen += 2;
3181             }
3182             if (ret && pcbDecoded)
3183             {
3184                 *pcbDecoded = 1 + lenBytes + decodedLen;
3185                 TRACE("decoded %d bytes\n", *pcbDecoded);
3186             }
3187         }
3188     }
3189     return ret;
3190 }
3191
3192 static BOOL CRYPT_AsnDecodePKCSContentInfoInternal(const BYTE *pbEncoded,
3193  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3194  DWORD *pcbDecoded)
3195 {
3196     CRYPT_CONTENT_INFO *info = pvStructInfo;
3197     struct AsnDecodeSequenceItem items[] = {
3198      { ASN_OBJECTIDENTIFIER, offsetof(CRYPT_CONTENT_INFO, pszObjId),
3199        CRYPT_AsnDecodeOidIgnoreTag, sizeof(LPSTR), FALSE, TRUE,
3200        offsetof(CRYPT_CONTENT_INFO, pszObjId), 0 },
3201      { ASN_CONTEXT | ASN_CONSTRUCTOR | 0,
3202        offsetof(CRYPT_CONTENT_INFO, Content), CRYPT_AsnDecodePKCSContent,
3203        sizeof(CRYPT_DER_BLOB), TRUE, TRUE,
3204        offsetof(CRYPT_CONTENT_INFO, Content.pbData), 0 },
3205     };
3206     BOOL ret;
3207
3208     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
3209      pvStructInfo, *pcbStructInfo, pcbDecoded);
3210
3211     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3212      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
3213      pcbDecoded, info ? info->pszObjId : NULL);
3214     return ret;
3215 }
3216
3217 static BOOL WINAPI CRYPT_AsnDecodePKCSContentInfo(DWORD dwCertEncodingType,
3218  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3219  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3220 {
3221     BOOL ret = FALSE;
3222
3223     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3224      pDecodePara, pvStructInfo, *pcbStructInfo);
3225
3226     __TRY
3227     {
3228         ret = CRYPT_AsnDecodePKCSContentInfoInternal(pbEncoded, cbEncoded,
3229          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pcbStructInfo, NULL);
3230         if (ret && pvStructInfo)
3231         {
3232             ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
3233              pcbStructInfo, *pcbStructInfo);
3234             if (ret)
3235             {
3236                 CRYPT_CONTENT_INFO *info;
3237
3238                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3239                     pvStructInfo = *(BYTE **)pvStructInfo;
3240                 info = pvStructInfo;
3241                 info->pszObjId = (LPSTR)((BYTE *)info +
3242                  sizeof(CRYPT_CONTENT_INFO));
3243                 ret = CRYPT_AsnDecodePKCSContentInfoInternal(pbEncoded,
3244                  cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
3245                  pcbStructInfo, NULL);
3246             }
3247         }
3248     }
3249     __EXCEPT_PAGE_FAULT
3250     {
3251         SetLastError(STATUS_ACCESS_VIOLATION);
3252     }
3253     __ENDTRY
3254     return ret;
3255 }
3256
3257 BOOL CRYPT_AsnDecodePKCSDigestedData(const BYTE *pbEncoded, DWORD cbEncoded,
3258  DWORD dwFlags, PCRYPT_DECODE_PARA pDecodePara,
3259  CRYPT_DIGESTED_DATA *digestedData, DWORD *pcbDigestedData)
3260 {
3261     BOOL ret;
3262     struct AsnDecodeSequenceItem items[] = {
3263      { ASN_INTEGER, offsetof(CRYPT_DIGESTED_DATA, version),
3264        CRYPT_AsnDecodeIntInternal, sizeof(DWORD), FALSE, FALSE, 0, 0 },
3265      { ASN_SEQUENCEOF, offsetof(CRYPT_DIGESTED_DATA, DigestAlgorithm),
3266        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
3267        FALSE, TRUE, offsetof(CRYPT_DIGESTED_DATA, DigestAlgorithm.pszObjId),
3268        0 },
3269      { ASN_SEQUENCEOF, offsetof(CRYPT_DIGESTED_DATA, ContentInfo),
3270        CRYPT_AsnDecodePKCSContentInfoInternal,
3271        sizeof(CRYPT_CONTENT_INFO), FALSE, TRUE, offsetof(CRYPT_DIGESTED_DATA,
3272        ContentInfo.pszObjId), 0 },
3273      { ASN_OCTETSTRING, offsetof(CRYPT_DIGESTED_DATA, hash),
3274        CRYPT_AsnDecodeOctetsInternal, sizeof(CRYPT_HASH_BLOB), FALSE, TRUE,
3275        offsetof(CRYPT_DIGESTED_DATA, hash.pbData), 0 },
3276     };
3277
3278     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3279      pbEncoded, cbEncoded, dwFlags, pDecodePara, digestedData, pcbDigestedData,
3280      NULL, NULL);
3281     return ret;
3282 }
3283
3284 static BOOL WINAPI CRYPT_AsnDecodeAltName(DWORD dwCertEncodingType,
3285  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3286  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3287 {
3288     BOOL ret = TRUE;
3289
3290     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3291      pDecodePara, pvStructInfo, *pcbStructInfo);
3292
3293     __TRY
3294     {
3295         DWORD bytesNeeded;
3296
3297         if ((ret = CRYPT_AsnDecodeAltNameInternal(pbEncoded, cbEncoded,
3298          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL)))
3299         {
3300             if (!pvStructInfo)
3301                 *pcbStructInfo = bytesNeeded;
3302             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
3303              pvStructInfo, pcbStructInfo, bytesNeeded)))
3304             {
3305                 CERT_ALT_NAME_INFO *name;
3306
3307                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3308                     pvStructInfo = *(BYTE **)pvStructInfo;
3309                 name = pvStructInfo;
3310                 name->rgAltEntry = (PCERT_ALT_NAME_ENTRY)
3311                  ((BYTE *)pvStructInfo + sizeof(CERT_ALT_NAME_INFO));
3312                 ret = CRYPT_AsnDecodeAltNameInternal(pbEncoded, cbEncoded,
3313                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
3314                  &bytesNeeded, NULL);
3315             }
3316         }
3317     }
3318     __EXCEPT_PAGE_FAULT
3319     {
3320         SetLastError(STATUS_ACCESS_VIOLATION);
3321         ret = FALSE;
3322     }
3323     __ENDTRY
3324     return ret;
3325 }
3326
3327 struct PATH_LEN_CONSTRAINT
3328 {
3329     BOOL  fPathLenConstraint;
3330     DWORD dwPathLenConstraint;
3331 };
3332
3333 static BOOL CRYPT_AsnDecodePathLenConstraint(const BYTE *pbEncoded,
3334  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3335  DWORD *pcbDecoded)
3336 {
3337     BOOL ret = TRUE;
3338     DWORD bytesNeeded = sizeof(struct PATH_LEN_CONSTRAINT), size;
3339
3340     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
3341      pvStructInfo, *pcbStructInfo, pcbDecoded);
3342
3343     if (!pvStructInfo)
3344     {
3345         ret = CRYPT_AsnDecodeIntInternal(pbEncoded, cbEncoded, dwFlags, NULL,
3346          &size, pcbDecoded);
3347         *pcbStructInfo = bytesNeeded;
3348     }
3349     else if (*pcbStructInfo < bytesNeeded)
3350     {
3351         SetLastError(ERROR_MORE_DATA);
3352         *pcbStructInfo = bytesNeeded;
3353         ret = FALSE;
3354     }
3355     else
3356     {
3357         struct PATH_LEN_CONSTRAINT *constraint = pvStructInfo;
3358
3359         *pcbStructInfo = bytesNeeded;
3360         size = sizeof(constraint->dwPathLenConstraint);
3361         ret = CRYPT_AsnDecodeIntInternal(pbEncoded, cbEncoded, dwFlags,
3362          &constraint->dwPathLenConstraint, &size, pcbDecoded);
3363         if (ret)
3364             constraint->fPathLenConstraint = TRUE;
3365         TRACE("got an int, dwPathLenConstraint is %d\n",
3366          constraint->dwPathLenConstraint);
3367     }
3368     TRACE("returning %d (%08x)\n", ret, GetLastError());
3369     return ret;
3370 }
3371
3372 static BOOL CRYPT_AsnDecodeSubtreeConstraints(const BYTE *pbEncoded,
3373  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3374  DWORD *pcbDecoded)
3375 {
3376     BOOL ret;
3377     struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
3378      CRYPT_AsnDecodeCopyBytes, sizeof(CERT_NAME_BLOB), TRUE,
3379      offsetof(CERT_NAME_BLOB, pbData) };
3380     struct GenericArray *entries = pvStructInfo;
3381
3382     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
3383      pvStructInfo, *pcbStructInfo, pcbDecoded);
3384
3385     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
3386      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
3387      entries ? entries->rgItems : NULL);
3388     TRACE("Returning %d (%08x)\n", ret, GetLastError());
3389     return ret;
3390 }
3391
3392 static BOOL WINAPI CRYPT_AsnDecodeBasicConstraints(DWORD dwCertEncodingType,
3393  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3394  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3395 {
3396     BOOL ret;
3397
3398     __TRY
3399     {
3400         struct AsnDecodeSequenceItem items[] = {
3401          { ASN_BITSTRING, offsetof(CERT_BASIC_CONSTRAINTS_INFO, SubjectType),
3402            CRYPT_AsnDecodeBitsInternal, sizeof(CRYPT_BIT_BLOB), FALSE, TRUE, 
3403            offsetof(CERT_BASIC_CONSTRAINTS_INFO, SubjectType.pbData), 0 },
3404          { ASN_INTEGER, offsetof(CERT_BASIC_CONSTRAINTS_INFO,
3405            fPathLenConstraint), CRYPT_AsnDecodePathLenConstraint,
3406            sizeof(struct PATH_LEN_CONSTRAINT), TRUE, FALSE, 0, 0 },
3407          { ASN_SEQUENCEOF, offsetof(CERT_BASIC_CONSTRAINTS_INFO,
3408            cSubtreesConstraint), CRYPT_AsnDecodeSubtreeConstraints,
3409            sizeof(struct GenericArray), TRUE, TRUE,
3410            offsetof(CERT_BASIC_CONSTRAINTS_INFO, rgSubtreesConstraint), 0 },
3411         };
3412
3413         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3414          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
3415          pcbStructInfo, NULL, NULL);
3416     }
3417     __EXCEPT_PAGE_FAULT
3418     {
3419         SetLastError(STATUS_ACCESS_VIOLATION);
3420         ret = FALSE;
3421     }
3422     __ENDTRY
3423     return ret;
3424 }
3425
3426 static BOOL WINAPI CRYPT_AsnDecodeBasicConstraints2(DWORD dwCertEncodingType,
3427  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3428  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3429 {
3430     BOOL ret;
3431
3432     __TRY
3433     {
3434         struct AsnDecodeSequenceItem items[] = {
3435          { ASN_BOOL, offsetof(CERT_BASIC_CONSTRAINTS2_INFO, fCA),
3436            CRYPT_AsnDecodeBool, sizeof(BOOL), TRUE, FALSE, 0, 0 },
3437          { ASN_INTEGER, offsetof(CERT_BASIC_CONSTRAINTS2_INFO,
3438            fPathLenConstraint), CRYPT_AsnDecodePathLenConstraint,
3439            sizeof(struct PATH_LEN_CONSTRAINT), TRUE, FALSE, 0, 0 },
3440         };
3441
3442         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3443          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
3444          pcbStructInfo, NULL, NULL);
3445     }
3446     __EXCEPT_PAGE_FAULT
3447     {
3448         SetLastError(STATUS_ACCESS_VIOLATION);
3449         ret = FALSE;
3450     }
3451     __ENDTRY
3452     return ret;
3453 }
3454
3455 static BOOL CRYPT_AsnDecodePolicyQualifier(const BYTE *pbEncoded,
3456  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3457  DWORD *pcbDecoded)
3458 {
3459     struct AsnDecodeSequenceItem items[] = {
3460      { ASN_OBJECTIDENTIFIER, offsetof(CERT_POLICY_QUALIFIER_INFO,
3461        pszPolicyQualifierId), CRYPT_AsnDecodeOidInternal, sizeof(LPSTR),
3462        FALSE, TRUE, offsetof(CERT_POLICY_QUALIFIER_INFO, pszPolicyQualifierId),
3463        0 },
3464      { 0, offsetof(CERT_POLICY_QUALIFIER_INFO, Qualifier),
3465        CRYPT_AsnDecodeDerBlob, sizeof(CRYPT_OBJID_BLOB), TRUE, TRUE,
3466        offsetof(CERT_POLICY_QUALIFIER_INFO, Qualifier.pbData), 0 },
3467     };
3468     BOOL ret;
3469     CERT_POLICY_QUALIFIER_INFO *qualifier = pvStructInfo;
3470
3471     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3472      pvStructInfo, pvStructInfo ? *pcbStructInfo : 0);
3473
3474     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3475      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
3476      pcbDecoded, qualifier ? qualifier->pszPolicyQualifierId : NULL);
3477     return ret;
3478 }
3479
3480 static BOOL CRYPT_AsnDecodePolicyQualifiers(const BYTE *pbEncoded,
3481  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3482  DWORD *pcbDecoded)
3483 {
3484     BOOL ret;
3485     struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
3486      CRYPT_AsnDecodePolicyQualifier, sizeof(CERT_POLICY_QUALIFIER_INFO), TRUE,
3487      offsetof(CERT_POLICY_QUALIFIER_INFO, pszPolicyQualifierId) };
3488     struct GenericArray *entries = pvStructInfo;
3489
3490     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3491      pvStructInfo, pvStructInfo ? *pcbStructInfo : 0);
3492
3493     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
3494      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
3495      entries ? entries->rgItems : NULL);
3496     TRACE("Returning %d (%08x)\n", ret, GetLastError());
3497     return ret;
3498 }
3499
3500 static BOOL CRYPT_AsnDecodeCertPolicy(const BYTE *pbEncoded, DWORD cbEncoded,
3501  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
3502 {
3503     struct AsnDecodeSequenceItem items[] = {
3504      { ASN_OBJECTIDENTIFIER, offsetof(CERT_POLICY_INFO, pszPolicyIdentifier),
3505        CRYPT_AsnDecodeOidInternal, sizeof(LPSTR), FALSE, TRUE,
3506        offsetof(CERT_POLICY_INFO, pszPolicyIdentifier), 0 },
3507      { ASN_SEQUENCEOF, offsetof(CERT_POLICY_INFO, cPolicyQualifier),
3508        CRYPT_AsnDecodePolicyQualifiers, sizeof(struct GenericArray), TRUE,
3509        TRUE, offsetof(CERT_POLICY_INFO, rgPolicyQualifier), 0 },
3510     };
3511     CERT_POLICY_INFO *info = pvStructInfo;
3512     BOOL ret;
3513
3514     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3515      pvStructInfo, pvStructInfo ? *pcbStructInfo : 0);
3516
3517     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3518      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
3519      pcbDecoded, info ? info->pszPolicyIdentifier : NULL);
3520     return ret;
3521 }
3522
3523 static BOOL WINAPI CRYPT_AsnDecodeCertPolicies(DWORD dwCertEncodingType,
3524  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3525  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3526 {
3527     BOOL ret = FALSE;
3528
3529     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3530      pDecodePara, pvStructInfo, pvStructInfo ? *pcbStructInfo : 0);
3531
3532     __TRY
3533     {
3534         struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
3535          CRYPT_AsnDecodeCertPolicy, sizeof(CERT_POLICY_INFO), TRUE,
3536          offsetof(CERT_POLICY_INFO, pszPolicyIdentifier) };
3537
3538         ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
3539          pDecodePara, pvStructInfo, pcbStructInfo, NULL, NULL);
3540     }
3541     __EXCEPT_PAGE_FAULT
3542     {
3543         SetLastError(STATUS_ACCESS_VIOLATION);
3544     }
3545     __ENDTRY
3546     return ret;
3547 }
3548
3549 #define RSA1_MAGIC 0x31415352
3550
3551 struct DECODED_RSA_PUB_KEY
3552 {
3553     DWORD              pubexp;
3554     CRYPT_INTEGER_BLOB modulus;
3555 };
3556
3557 static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey(DWORD dwCertEncodingType,
3558  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3559  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3560 {
3561     BOOL ret;
3562
3563     __TRY
3564     {
3565         struct AsnDecodeSequenceItem items[] = {
3566          { ASN_INTEGER, offsetof(struct DECODED_RSA_PUB_KEY, modulus),
3567            CRYPT_AsnDecodeUnsignedIntegerInternal, sizeof(CRYPT_INTEGER_BLOB),
3568            FALSE, TRUE, offsetof(struct DECODED_RSA_PUB_KEY, modulus.pbData),
3569            0 },
3570          { ASN_INTEGER, offsetof(struct DECODED_RSA_PUB_KEY, pubexp),
3571            CRYPT_AsnDecodeIntInternal, sizeof(DWORD), FALSE, FALSE, 0, 0 },
3572         };
3573         struct DECODED_RSA_PUB_KEY *decodedKey = NULL;
3574         DWORD size = 0;
3575
3576         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
3577          pbEncoded, cbEncoded, CRYPT_DECODE_ALLOC_FLAG, NULL, &decodedKey,
3578          &size, NULL, NULL);
3579         if (ret)
3580         {
3581             DWORD bytesNeeded = sizeof(BLOBHEADER) + sizeof(RSAPUBKEY) +
3582              decodedKey->modulus.cbData;
3583
3584             if (!pvStructInfo)
3585             {
3586                 *pcbStructInfo = bytesNeeded;
3587                 ret = TRUE;
3588             }
3589             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
3590              pvStructInfo, pcbStructInfo, bytesNeeded)))
3591             {
3592                 BLOBHEADER *hdr;
3593                 RSAPUBKEY *rsaPubKey;
3594
3595                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3596                     pvStructInfo = *(BYTE **)pvStructInfo;
3597                 hdr = pvStructInfo;
3598                 hdr->bType = PUBLICKEYBLOB;
3599                 hdr->bVersion = CUR_BLOB_VERSION;
3600                 hdr->reserved = 0;
3601                 hdr->aiKeyAlg = CALG_RSA_KEYX;
3602                 rsaPubKey = (RSAPUBKEY *)((BYTE *)pvStructInfo +
3603                  sizeof(BLOBHEADER));
3604                 rsaPubKey->magic = RSA1_MAGIC;
3605                 rsaPubKey->pubexp = decodedKey->pubexp;
3606                 rsaPubKey->bitlen = decodedKey->modulus.cbData * 8;
3607                 memcpy((BYTE *)pvStructInfo + sizeof(BLOBHEADER) +
3608                  sizeof(RSAPUBKEY), decodedKey->modulus.pbData,
3609                  decodedKey->modulus.cbData);
3610             }
3611             LocalFree(decodedKey);
3612         }
3613     }
3614     __EXCEPT_PAGE_FAULT
3615     {
3616         SetLastError(STATUS_ACCESS_VIOLATION);
3617         ret = FALSE;
3618     }
3619     __ENDTRY
3620     return ret;
3621 }
3622
3623 static BOOL CRYPT_AsnDecodeOctetsInternal(const BYTE *pbEncoded,
3624  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3625  DWORD *pcbDecoded)
3626 {
3627     BOOL ret;
3628     DWORD bytesNeeded, dataLen;
3629
3630     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
3631      pvStructInfo, *pcbStructInfo, pcbDecoded);
3632
3633     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3634     {
3635         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3636
3637         if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3638             bytesNeeded = sizeof(CRYPT_DATA_BLOB);
3639         else
3640             bytesNeeded = dataLen + sizeof(CRYPT_DATA_BLOB);
3641         if (pcbDecoded)
3642             *pcbDecoded = 1 + lenBytes + dataLen;
3643         if (!pvStructInfo)
3644             *pcbStructInfo = bytesNeeded;
3645         else if (*pcbStructInfo < bytesNeeded)
3646         {
3647             SetLastError(ERROR_MORE_DATA);
3648             *pcbStructInfo = bytesNeeded;
3649             ret = FALSE;
3650         }
3651         else
3652         {
3653             CRYPT_DATA_BLOB *blob;
3654
3655             *pcbStructInfo = bytesNeeded;
3656             blob = pvStructInfo;
3657             blob->cbData = dataLen;
3658             if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3659                 blob->pbData = (BYTE *)pbEncoded + 1 + lenBytes;
3660             else
3661             {
3662                 assert(blob->pbData);
3663                 if (blob->cbData)
3664                     memcpy(blob->pbData, pbEncoded + 1 + lenBytes,
3665                      blob->cbData);
3666             }
3667         }
3668     }
3669     return ret;
3670 }
3671
3672 static BOOL WINAPI CRYPT_AsnDecodeOctets(DWORD dwCertEncodingType,
3673  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3674  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3675 {
3676     BOOL ret;
3677
3678     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
3679      pDecodePara, pvStructInfo, *pcbStructInfo);
3680
3681     __TRY
3682     {
3683         DWORD bytesNeeded;
3684
3685         if (!cbEncoded)
3686         {
3687             SetLastError(CRYPT_E_ASN1_CORRUPT);
3688             ret = FALSE;
3689         }
3690         else if (pbEncoded[0] != ASN_OCTETSTRING)
3691         {
3692             SetLastError(CRYPT_E_ASN1_BADTAG);
3693             ret = FALSE;
3694         }
3695         else if ((ret = CRYPT_AsnDecodeOctetsInternal(pbEncoded, cbEncoded,
3696          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL)))
3697         {
3698             if (!pvStructInfo)
3699                 *pcbStructInfo = bytesNeeded;
3700             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
3701              pvStructInfo, pcbStructInfo, bytesNeeded)))
3702             {
3703                 CRYPT_DATA_BLOB *blob;
3704
3705                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3706                     pvStructInfo = *(BYTE **)pvStructInfo;
3707                 blob = pvStructInfo;
3708                 blob->pbData = (BYTE *)pvStructInfo + sizeof(CRYPT_DATA_BLOB);
3709                 ret = CRYPT_AsnDecodeOctetsInternal(pbEncoded, cbEncoded,
3710                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
3711                  &bytesNeeded, NULL);
3712             }
3713         }
3714     }
3715     __EXCEPT_PAGE_FAULT
3716     {
3717         SetLastError(STATUS_ACCESS_VIOLATION);
3718         ret = FALSE;
3719     }
3720     __ENDTRY
3721     return ret;
3722 }
3723
3724 static BOOL CRYPT_AsnDecodeBitsInternal(const BYTE *pbEncoded, DWORD cbEncoded,
3725  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
3726 {
3727     BOOL ret;
3728     DWORD bytesNeeded, dataLen;
3729     BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3730
3731     TRACE("(%p, %d, 0x%08x, %p, %d, %p)\n", pbEncoded, cbEncoded, dwFlags,
3732      pvStructInfo, *pcbStructInfo, pcbDecoded);
3733
3734     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3735     {
3736         if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3737             bytesNeeded = sizeof(CRYPT_BIT_BLOB);
3738         else
3739             bytesNeeded = dataLen - 1 + sizeof(CRYPT_BIT_BLOB);
3740         if (pcbDecoded)
3741             *pcbDecoded = 1 + lenBytes + dataLen;
3742         if (!pvStructInfo)
3743             *pcbStructInfo = bytesNeeded;
3744         else if (*pcbStructInfo < bytesNeeded)
3745         {
3746             *pcbStructInfo = bytesNeeded;
3747             SetLastError(ERROR_MORE_DATA);
3748             ret = FALSE;
3749         }
3750         else
3751         {
3752             CRYPT_BIT_BLOB *blob;
3753
3754             *pcbStructInfo = bytesNeeded;
3755             blob = pvStructInfo;
3756             blob->cbData = dataLen - 1;
3757             blob->cUnusedBits = *(pbEncoded + 1 + lenBytes);
3758             if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3759             {
3760                 blob->pbData = (BYTE *)pbEncoded + 2 + lenBytes;
3761             }
3762             else
3763             {
3764                 assert(blob->pbData);
3765                 if (blob->cbData)
3766                 {
3767                     BYTE mask = 0xff << blob->cUnusedBits;
3768
3769                     memcpy(blob->pbData, pbEncoded + 2 + lenBytes,
3770                      blob->cbData);
3771                     blob->pbData[blob->cbData - 1] &= mask;
3772                 }
3773             }
3774         }
3775     }
3776     return ret;
3777 }
3778
3779 static BOOL WINAPI CRYPT_AsnDecodeBits(DWORD dwCertEncodingType,
3780  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3781  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3782 {
3783     BOOL ret;
3784
3785     TRACE("(%p, %d, 0x%08x, %p, %p, %p)\n", pbEncoded, cbEncoded, dwFlags,
3786      pDecodePara, pvStructInfo, pcbStructInfo);
3787
3788     __TRY
3789     {
3790         DWORD bytesNeeded;
3791
3792         if (!cbEncoded)
3793         {
3794             SetLastError(CRYPT_E_ASN1_CORRUPT);
3795             ret = FALSE;
3796         }
3797         else if (pbEncoded[0] != ASN_BITSTRING)
3798         {
3799             SetLastError(CRYPT_E_ASN1_BADTAG);
3800             ret = FALSE;
3801         }
3802         else if ((ret = CRYPT_AsnDecodeBitsInternal(pbEncoded, cbEncoded,
3803          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL)))
3804         {
3805             if (!pvStructInfo)
3806                 *pcbStructInfo = bytesNeeded;
3807             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
3808              pvStructInfo, pcbStructInfo, bytesNeeded)))
3809             {
3810                 CRYPT_BIT_BLOB *blob;
3811
3812                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3813                     pvStructInfo = *(BYTE **)pvStructInfo;
3814                 blob = pvStructInfo;
3815                 blob->pbData = (BYTE *)pvStructInfo + sizeof(CRYPT_BIT_BLOB);
3816                 ret = CRYPT_AsnDecodeBitsInternal(pbEncoded, cbEncoded,
3817                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
3818                  &bytesNeeded, NULL);
3819             }
3820         }
3821     }
3822     __EXCEPT_PAGE_FAULT
3823     {
3824         SetLastError(STATUS_ACCESS_VIOLATION);
3825         ret = FALSE;
3826     }
3827     __ENDTRY
3828     TRACE("returning %d (%08x)\n", ret, GetLastError());
3829     return ret;
3830 }
3831
3832 /* Ignores tag.  Only allows integers 4 bytes or smaller in size. */
3833 static BOOL CRYPT_AsnDecodeIntInternal(const BYTE *pbEncoded, DWORD cbEncoded,
3834  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
3835 {
3836     BOOL ret;
3837     BYTE buf[sizeof(CRYPT_INTEGER_BLOB) + sizeof(int)];
3838     CRYPT_INTEGER_BLOB *blob = (CRYPT_INTEGER_BLOB *)buf;
3839     DWORD size = sizeof(buf);
3840
3841     blob->pbData = buf + sizeof(CRYPT_INTEGER_BLOB);
3842     ret = CRYPT_AsnDecodeIntegerInternal(pbEncoded, cbEncoded, 0, buf,
3843      &size, pcbDecoded);
3844     if (ret)
3845     {
3846         if (!pvStructInfo)
3847             *pcbStructInfo = sizeof(int);
3848         else if ((ret = CRYPT_DecodeCheckSpace(pcbStructInfo, sizeof(int))))
3849         {
3850             int val, i;
3851
3852             if (blob->pbData[blob->cbData - 1] & 0x80)
3853             {
3854                 /* initialize to a negative value to sign-extend */
3855                 val = -1;
3856             }
3857             else
3858                 val = 0;
3859             for (i = 0; i < blob->cbData; i++)
3860             {
3861                 val <<= 8;
3862                 val |= blob->pbData[blob->cbData - i - 1];
3863             }
3864             memcpy(pvStructInfo, &val, sizeof(int));
3865         }
3866     }
3867     else if (GetLastError() == ERROR_MORE_DATA)
3868         SetLastError(CRYPT_E_ASN1_LARGE);
3869     return ret;
3870 }
3871
3872 static BOOL WINAPI CRYPT_AsnDecodeInt(DWORD dwCertEncodingType,
3873  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3874  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3875 {
3876     BOOL ret;
3877
3878     __TRY
3879     {
3880         DWORD bytesNeeded;
3881
3882         if (!cbEncoded)
3883         {
3884             SetLastError(CRYPT_E_ASN1_EOD);
3885             ret = FALSE;
3886         }
3887         else if (pbEncoded[0] != ASN_INTEGER)
3888         {
3889             SetLastError(CRYPT_E_ASN1_BADTAG);
3890             ret = FALSE;
3891         }
3892         else
3893             ret = CRYPT_AsnDecodeIntInternal(pbEncoded, cbEncoded,
3894              dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL);
3895         if (ret)
3896         {
3897             if (!pvStructInfo)
3898                 *pcbStructInfo = bytesNeeded;
3899             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
3900              pvStructInfo, pcbStructInfo, bytesNeeded)))
3901             {
3902                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3903                     pvStructInfo = *(BYTE **)pvStructInfo;
3904                 ret = CRYPT_AsnDecodeIntInternal(pbEncoded, cbEncoded,
3905                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
3906                  &bytesNeeded, NULL);
3907             }
3908         }
3909     }
3910     __EXCEPT_PAGE_FAULT
3911     {
3912         SetLastError(STATUS_ACCESS_VIOLATION);
3913         ret = FALSE;
3914     }
3915     __ENDTRY
3916     return ret;
3917 }
3918
3919 static BOOL CRYPT_AsnDecodeIntegerInternal(const BYTE *pbEncoded,
3920  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
3921  DWORD *pcbDecoded)
3922 {
3923     BOOL ret;
3924     DWORD bytesNeeded, dataLen;
3925
3926     if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3927     {
3928         BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3929
3930         bytesNeeded = dataLen + sizeof(CRYPT_INTEGER_BLOB);
3931         if (pcbDecoded)
3932             *pcbDecoded = 1 + lenBytes + dataLen;
3933         if (!pvStructInfo)
3934             *pcbStructInfo = bytesNeeded;
3935         else if (*pcbStructInfo < bytesNeeded)
3936         {
3937             *pcbStructInfo = bytesNeeded;
3938             SetLastError(ERROR_MORE_DATA);
3939             ret = FALSE;
3940         }
3941         else
3942         {
3943             CRYPT_INTEGER_BLOB *blob = pvStructInfo;
3944
3945             *pcbStructInfo = bytesNeeded;
3946             blob->cbData = dataLen;
3947             assert(blob->pbData);
3948             if (blob->cbData)
3949             {
3950                 DWORD i;
3951
3952                 for (i = 0; i < blob->cbData; i++)
3953                 {
3954                     blob->pbData[i] = *(pbEncoded + 1 + lenBytes +
3955                      dataLen - i - 1);
3956                 }
3957             }
3958         }
3959     }
3960     return ret;
3961 }
3962
3963 static BOOL WINAPI CRYPT_AsnDecodeInteger(DWORD dwCertEncodingType,
3964  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3965  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3966 {
3967     BOOL ret;
3968
3969     __TRY
3970     {
3971         DWORD bytesNeeded;
3972
3973         if (pbEncoded[0] != ASN_INTEGER)
3974         {
3975             SetLastError(CRYPT_E_ASN1_BADTAG);
3976             ret = FALSE;
3977         }
3978         else
3979             ret = CRYPT_AsnDecodeIntegerInternal(pbEncoded, cbEncoded,
3980              dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL);
3981         if (ret)
3982         {
3983             if (!pvStructInfo)
3984                 *pcbStructInfo = bytesNeeded;
3985             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
3986              pvStructInfo, pcbStructInfo, bytesNeeded)))
3987             {
3988                 CRYPT_INTEGER_BLOB *blob;
3989
3990                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3991                     pvStructInfo = *(BYTE **)pvStructInfo;
3992                 blob = pvStructInfo;
3993                 blob->pbData = (BYTE *)pvStructInfo +
3994                  sizeof(CRYPT_INTEGER_BLOB);
3995                 ret = CRYPT_AsnDecodeIntegerInternal(pbEncoded, cbEncoded,
3996                  dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, pvStructInfo,
3997                  &bytesNeeded, NULL);
3998             }
3999         }
4000     }
4001     __EXCEPT_PAGE_FAULT
4002     {
4003         SetLastError(STATUS_ACCESS_VIOLATION);
4004         ret = FALSE;
4005     }
4006     __ENDTRY
4007     return ret;
4008 }
4009
4010 static BOOL CRYPT_AsnDecodeUnsignedIntegerInternal(const BYTE *pbEncoded,
4011  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4012  DWORD *pcbDecoded)
4013 {
4014     BOOL ret;
4015
4016     if (pbEncoded[0] == ASN_INTEGER)
4017     {
4018         DWORD bytesNeeded, dataLen;
4019
4020         if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4021         {
4022             BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4023
4024             if (pcbDecoded)
4025                 *pcbDecoded = 1 + lenBytes + dataLen;
4026             bytesNeeded = dataLen + sizeof(CRYPT_INTEGER_BLOB);
4027             if (!pvStructInfo)
4028                 *pcbStructInfo = bytesNeeded;
4029             else if (*pcbStructInfo < bytesNeeded)
4030             {
4031                 *pcbStructInfo = bytesNeeded;
4032                 SetLastError(ERROR_MORE_DATA);
4033                 ret = FALSE;
4034             }
4035             else
4036             {
4037                 CRYPT_INTEGER_BLOB *blob = pvStructInfo;
4038
4039                 *pcbStructInfo = bytesNeeded;
4040                 blob->cbData = dataLen;
4041                 assert(blob->pbData);
4042                 /* remove leading zero byte if it exists */
4043                 if (blob->cbData && *(pbEncoded + 1 + lenBytes) == 0)
4044                 {
4045                     blob->cbData--;
4046                     blob->pbData++;
4047                 }
4048                 if (blob->cbData)
4049                 {
4050                     DWORD i;
4051
4052                     for (i = 0; i < blob->cbData; i++)
4053                     {
4054                         blob->pbData[i] = *(pbEncoded + 1 + lenBytes +
4055                          dataLen - i - 1);
4056                     }
4057                 }
4058             }
4059         }
4060     }
4061     else
4062     {
4063         SetLastError(CRYPT_E_ASN1_BADTAG);
4064         ret = FALSE;
4065     }
4066     return ret;
4067 }
4068
4069 static BOOL WINAPI CRYPT_AsnDecodeUnsignedInteger(DWORD dwCertEncodingType,
4070  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4071  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4072 {
4073     BOOL ret;
4074
4075     __TRY
4076     {
4077         DWORD bytesNeeded;
4078
4079         if ((ret = CRYPT_AsnDecodeUnsignedIntegerInternal(pbEncoded, cbEncoded,
4080          dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL)))
4081         {
4082             if (!pvStructInfo)
4083                 *pcbStructInfo = bytesNeeded;
4084             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4085              pvStructInfo, pcbStructInfo, bytesNeeded)))
4086             {
4087                 CRYPT_INTEGER_BLOB *blob;
4088
4089                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4090                     pvStructInfo = *(BYTE **)pvStructInfo;
4091                 blob = pvStructInfo;
4092                 blob->pbData = (BYTE *)pvStructInfo +
4093                  sizeof(CRYPT_INTEGER_BLOB);
4094                 ret = CRYPT_AsnDecodeUnsignedIntegerInternal(pbEncoded,
4095                  cbEncoded, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, pvStructInfo,
4096                  &bytesNeeded, NULL);
4097             }
4098         }
4099     }
4100     __EXCEPT_PAGE_FAULT
4101     {
4102         SetLastError(STATUS_ACCESS_VIOLATION);
4103         ret = FALSE;
4104     }
4105     __ENDTRY
4106     return ret;
4107 }
4108
4109 static BOOL WINAPI CRYPT_AsnDecodeEnumerated(DWORD dwCertEncodingType,
4110  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4111  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4112 {
4113     BOOL ret;
4114
4115     if (!pvStructInfo)
4116     {
4117         *pcbStructInfo = sizeof(int);
4118         return TRUE;
4119     }
4120     __TRY
4121     {
4122         if (pbEncoded[0] == ASN_ENUMERATED)
4123         {
4124             unsigned int val = 0, i;
4125
4126             if (cbEncoded <= 1)
4127             {
4128                 SetLastError(CRYPT_E_ASN1_EOD);
4129                 ret = FALSE;
4130             }
4131             else if (pbEncoded[1] == 0)
4132             {
4133                 SetLastError(CRYPT_E_ASN1_CORRUPT);
4134                 ret = FALSE;
4135             }
4136             else
4137             {
4138                 /* A little strange looking, but we have to accept a sign byte:
4139                  * 0xffffffff gets encoded as 0a 05 00 ff ff ff ff.  Also,
4140                  * assuming a small length is okay here, it has to be in short
4141                  * form.
4142                  */
4143                 if (pbEncoded[1] > sizeof(unsigned int) + 1)
4144                 {
4145                     SetLastError(CRYPT_E_ASN1_LARGE);
4146                     return FALSE;
4147                 }
4148                 for (i = 0; i < pbEncoded[1]; i++)
4149                 {
4150                     val <<= 8;
4151                     val |= pbEncoded[2 + i];
4152                 }
4153                 if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4154                  pvStructInfo, pcbStructInfo, sizeof(unsigned int))))
4155                 {
4156                     if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4157                         pvStructInfo = *(BYTE **)pvStructInfo;
4158                     memcpy(pvStructInfo, &val, sizeof(unsigned int));
4159                 }
4160             }
4161         }
4162         else
4163         {
4164             SetLastError(CRYPT_E_ASN1_BADTAG);
4165             ret = FALSE;
4166         }
4167     }
4168     __EXCEPT_PAGE_FAULT
4169     {
4170         SetLastError(STATUS_ACCESS_VIOLATION);
4171         ret = FALSE;
4172     }
4173     __ENDTRY
4174     return ret;
4175 }
4176
4177 /* Modifies word, pbEncoded, and len, and magically sets a value ret to FALSE
4178  * if it fails.
4179  */
4180 #define CRYPT_TIME_GET_DIGITS(pbEncoded, len, numDigits, word) \
4181  do { \
4182     BYTE i; \
4183  \
4184     (word) = 0; \
4185     for (i = 0; (len) > 0 && i < (numDigits); i++, (len)--) \
4186     { \
4187         if (!isdigit(*(pbEncoded))) \
4188         { \
4189             SetLastError(CRYPT_E_ASN1_CORRUPT); \
4190             ret = FALSE; \
4191         } \
4192         else \
4193         { \
4194             (word) *= 10; \
4195             (word) += *(pbEncoded)++ - '0'; \
4196         } \
4197     } \
4198  } while (0)
4199
4200 static BOOL CRYPT_AsnDecodeTimeZone(const BYTE *pbEncoded, DWORD len,
4201  SYSTEMTIME *sysTime)
4202 {
4203     BOOL ret = TRUE;
4204
4205     if (len >= 3 && (*pbEncoded == '+' || *pbEncoded == '-'))
4206     {
4207         WORD hours, minutes = 0;
4208         BYTE sign = *pbEncoded++;
4209
4210         len--;
4211         CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, hours);
4212         if (ret && hours >= 24)
4213         {
4214             SetLastError(CRYPT_E_ASN1_CORRUPT);
4215             ret = FALSE;
4216         }
4217         else if (len >= 2)
4218         {
4219             CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, minutes);
4220             if (ret && minutes >= 60)
4221             {
4222                 SetLastError(CRYPT_E_ASN1_CORRUPT);
4223                 ret = FALSE;
4224             }
4225         }
4226         if (ret)
4227         {
4228             if (sign == '+')
4229             {
4230                 sysTime->wHour += hours;
4231                 sysTime->wMinute += minutes;
4232             }
4233             else
4234             {
4235                 if (hours > sysTime->wHour)
4236                 {
4237                     sysTime->wDay--;
4238                     sysTime->wHour = 24 - (hours - sysTime->wHour);
4239                 }
4240                 else
4241                     sysTime->wHour -= hours;
4242                 if (minutes > sysTime->wMinute)
4243                 {
4244                     sysTime->wHour--;
4245                     sysTime->wMinute = 60 - (minutes - sysTime->wMinute);
4246                 }
4247                 else
4248                     sysTime->wMinute -= minutes;
4249             }
4250         }
4251     }
4252     return ret;
4253 }
4254
4255 #define MIN_ENCODED_TIME_LENGTH 10
4256
4257 static BOOL CRYPT_AsnDecodeUtcTimeInternal(const BYTE *pbEncoded,
4258  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4259  DWORD *pcbDecoded)
4260 {
4261     BOOL ret = FALSE;
4262
4263     if (pbEncoded[0] == ASN_UTCTIME)
4264     {
4265         if (cbEncoded <= 1)
4266             SetLastError(CRYPT_E_ASN1_EOD);
4267         else if (pbEncoded[1] > 0x7f)
4268         {
4269             /* long-form date strings really can't be valid */
4270             SetLastError(CRYPT_E_ASN1_CORRUPT);
4271         }
4272         else
4273         {
4274             SYSTEMTIME sysTime = { 0 };
4275             BYTE len = pbEncoded[1];
4276
4277             if (len < MIN_ENCODED_TIME_LENGTH)
4278                 SetLastError(CRYPT_E_ASN1_CORRUPT);
4279             else
4280             {
4281                 ret = TRUE;
4282                 if (pcbDecoded)
4283                     *pcbDecoded = 2 + len;
4284                 pbEncoded += 2;
4285                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wYear);
4286                 if (sysTime.wYear >= 50)
4287                     sysTime.wYear += 1900;
4288                 else
4289                     sysTime.wYear += 2000;
4290                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMonth);
4291                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wDay);
4292                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wHour);
4293                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMinute);
4294                 if (ret && len > 0)
4295                 {
4296                     if (len >= 2 && isdigit(*pbEncoded) &&
4297                      isdigit(*(pbEncoded + 1)))
4298                         CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
4299                          sysTime.wSecond);
4300                     else if (isdigit(*pbEncoded))
4301                         CRYPT_TIME_GET_DIGITS(pbEncoded, len, 1,
4302                          sysTime.wSecond);
4303                     if (ret)
4304                         ret = CRYPT_AsnDecodeTimeZone(pbEncoded, len,
4305                          &sysTime);
4306                 }
4307                 if (ret)
4308                 {
4309                     if (!pvStructInfo)
4310                         *pcbStructInfo = sizeof(FILETIME);
4311                     else if ((ret = CRYPT_DecodeCheckSpace(pcbStructInfo,
4312                      sizeof(FILETIME))))
4313                         ret = SystemTimeToFileTime(&sysTime, pvStructInfo);
4314                 }
4315             }
4316         }
4317     }
4318     else
4319         SetLastError(CRYPT_E_ASN1_BADTAG);
4320     return ret;
4321 }
4322
4323 static BOOL WINAPI CRYPT_AsnDecodeUtcTime(DWORD dwCertEncodingType,
4324  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4325  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4326 {
4327     BOOL ret = FALSE;
4328
4329     __TRY
4330     {
4331         DWORD bytesNeeded;
4332
4333         ret = CRYPT_AsnDecodeUtcTimeInternal(pbEncoded, cbEncoded,
4334          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL);
4335         if (ret)
4336         {
4337             if (!pvStructInfo)
4338                 *pcbStructInfo = bytesNeeded;
4339             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
4340              pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
4341             {
4342                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4343                     pvStructInfo = *(BYTE **)pvStructInfo;
4344                 ret = CRYPT_AsnDecodeUtcTimeInternal(pbEncoded, cbEncoded,
4345                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
4346                  &bytesNeeded, NULL);
4347             }
4348         }
4349     }
4350     __EXCEPT_PAGE_FAULT
4351     {
4352         SetLastError(STATUS_ACCESS_VIOLATION);
4353     }
4354     __ENDTRY
4355     return ret;
4356 }
4357
4358 static BOOL CRYPT_AsnDecodeGeneralizedTime(const BYTE *pbEncoded,
4359  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4360  DWORD *pcbDecoded)
4361 {
4362     BOOL ret = FALSE;
4363
4364     if (pbEncoded[0] == ASN_GENERALTIME)
4365     {
4366         if (cbEncoded <= 1)
4367             SetLastError(CRYPT_E_ASN1_EOD);
4368         else if (pbEncoded[1] > 0x7f)
4369         {
4370             /* long-form date strings really can't be valid */
4371             SetLastError(CRYPT_E_ASN1_CORRUPT);
4372         }
4373         else
4374         {
4375             BYTE len = pbEncoded[1];
4376
4377             if (len < MIN_ENCODED_TIME_LENGTH)
4378                 SetLastError(CRYPT_E_ASN1_CORRUPT);
4379             else
4380             {
4381                 SYSTEMTIME sysTime = { 0 };
4382
4383                 ret = TRUE;
4384                 if (pcbDecoded)
4385                     *pcbDecoded = 2 + len;
4386                 pbEncoded += 2;
4387                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 4, sysTime.wYear);
4388                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMonth);
4389                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wDay);
4390                 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wHour);
4391                 if (ret && len > 0)
4392                 {
4393                     CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
4394                      sysTime.wMinute);
4395                     if (ret && len > 0)
4396                         CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
4397                          sysTime.wSecond);
4398                     if (ret && len > 0 && (*pbEncoded == '.' ||
4399                      *pbEncoded == ','))
4400                     {
4401                         BYTE digits;
4402
4403                         pbEncoded++;
4404                         len--;
4405                         /* workaround macro weirdness */
4406                         digits = min(len, 3);
4407                         CRYPT_TIME_GET_DIGITS(pbEncoded, len, digits,
4408                          sysTime.wMilliseconds);
4409                     }
4410                     if (ret)
4411                         ret = CRYPT_AsnDecodeTimeZone(pbEncoded, len,
4412                          &sysTime);
4413                 }
4414                 if (ret)
4415                 {
4416                     if (!pvStructInfo)
4417                         *pcbStructInfo = sizeof(FILETIME);
4418                     else if ((ret = CRYPT_DecodeCheckSpace(pcbStructInfo,
4419                      sizeof(FILETIME))))
4420                         ret = SystemTimeToFileTime(&sysTime, pvStructInfo);
4421                 }
4422             }
4423         }
4424     }
4425     else
4426         SetLastError(CRYPT_E_ASN1_BADTAG);
4427     return ret;
4428 }
4429
4430 static BOOL CRYPT_AsnDecodeChoiceOfTimeInternal(const BYTE *pbEncoded,
4431  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4432  DWORD *pcbDecoded)
4433 {
4434     BOOL ret;
4435     InternalDecodeFunc decode = NULL;
4436
4437     if (pbEncoded[0] == ASN_UTCTIME)
4438         decode = CRYPT_AsnDecodeUtcTimeInternal;
4439     else if (pbEncoded[0] == ASN_GENERALTIME)
4440         decode = CRYPT_AsnDecodeGeneralizedTime;
4441     if (decode)
4442         ret = decode(pbEncoded, cbEncoded, dwFlags, pvStructInfo,
4443          pcbStructInfo, pcbDecoded);
4444     else
4445     {
4446         SetLastError(CRYPT_E_ASN1_BADTAG);
4447         ret = FALSE;
4448     }
4449     return ret;
4450 }
4451
4452 static BOOL WINAPI CRYPT_AsnDecodeChoiceOfTime(DWORD dwCertEncodingType,
4453  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4454  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4455 {
4456     BOOL ret;
4457
4458     __TRY
4459     {
4460         DWORD bytesNeeded;
4461
4462         ret = CRYPT_AsnDecodeChoiceOfTimeInternal(pbEncoded, cbEncoded,
4463          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, &bytesNeeded, NULL);
4464         if (ret)
4465         {
4466             if (!pvStructInfo)
4467                 *pcbStructInfo = bytesNeeded;
4468             else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4469              pvStructInfo, pcbStructInfo, bytesNeeded)))
4470             {
4471                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4472                     pvStructInfo = *(BYTE **)pvStructInfo;
4473                 ret = CRYPT_AsnDecodeChoiceOfTimeInternal(pbEncoded, cbEncoded,
4474                  dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
4475                  &bytesNeeded, NULL);
4476             }
4477         }
4478     }
4479     __EXCEPT_PAGE_FAULT
4480     {
4481         SetLastError(STATUS_ACCESS_VIOLATION);
4482         ret = FALSE;
4483     }
4484     __ENDTRY
4485     return ret;
4486 }
4487
4488 static BOOL WINAPI CRYPT_AsnDecodeSequenceOfAny(DWORD dwCertEncodingType,
4489  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4490  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4491 {
4492     BOOL ret = TRUE;
4493
4494     __TRY
4495     {
4496         if (pbEncoded[0] == ASN_SEQUENCEOF)
4497         {
4498             DWORD bytesNeeded, dataLen, remainingLen, cValue;
4499
4500             if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4501             {
4502                 BYTE lenBytes;
4503                 const BYTE *ptr;
4504
4505                 lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4506                 bytesNeeded = sizeof(CRYPT_SEQUENCE_OF_ANY);
4507                 cValue = 0;
4508                 ptr = pbEncoded + 1 + lenBytes;
4509                 remainingLen = dataLen;
4510                 while (ret && remainingLen)
4511                 {
4512                     DWORD nextLen;
4513
4514                     ret = CRYPT_GetLen(ptr, remainingLen, &nextLen);
4515                     if (ret)
4516                     {
4517                         DWORD nextLenBytes = GET_LEN_BYTES(ptr[1]);
4518
4519                         remainingLen -= 1 + nextLenBytes + nextLen;
4520                         ptr += 1 + nextLenBytes + nextLen;
4521                         bytesNeeded += sizeof(CRYPT_DER_BLOB);
4522                         if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
4523                             bytesNeeded += 1 + nextLenBytes + nextLen;
4524                         cValue++;
4525                     }
4526                 }
4527                 if (ret)
4528                 {
4529                     CRYPT_SEQUENCE_OF_ANY *seq;
4530                     BYTE *nextPtr;
4531                     DWORD i;
4532
4533                     if (!pvStructInfo)
4534                         *pcbStructInfo = bytesNeeded;
4535                     else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4536                      pvStructInfo, pcbStructInfo, bytesNeeded)))
4537                     {
4538                         if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4539                             pvStructInfo = *(BYTE **)pvStructInfo;
4540                         seq = pvStructInfo;
4541                         seq->cValue = cValue;
4542                         seq->rgValue = (CRYPT_DER_BLOB *)((BYTE *)seq +
4543                          sizeof(*seq));
4544                         nextPtr = (BYTE *)seq->rgValue +
4545                          cValue * sizeof(CRYPT_DER_BLOB);
4546                         ptr = pbEncoded + 1 + lenBytes;
4547                         remainingLen = dataLen;
4548                         i = 0;
4549                         while (ret && remainingLen)
4550                         {
4551                             DWORD nextLen;
4552
4553                             ret = CRYPT_GetLen(ptr, remainingLen, &nextLen);
4554                             if (ret)
4555                             {
4556                                 DWORD nextLenBytes = GET_LEN_BYTES(ptr[1]);
4557
4558                                 seq->rgValue[i].cbData = 1 + nextLenBytes +
4559                                  nextLen;
4560                                 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4561                                     seq->rgValue[i].pbData = (BYTE *)ptr;
4562                                 else
4563                                 {
4564                                     seq->rgValue[i].pbData = nextPtr;
4565                                     memcpy(nextPtr, ptr, 1 + nextLenBytes +
4566                                      nextLen);
4567                                     nextPtr += 1 + nextLenBytes + nextLen;
4568                                 }
4569                                 remainingLen -= 1 + nextLenBytes + nextLen;
4570                                 ptr += 1 + nextLenBytes + nextLen;
4571                                 i++;
4572                             }
4573                         }
4574                     }
4575                 }
4576             }
4577         }
4578         else
4579         {
4580             SetLastError(CRYPT_E_ASN1_BADTAG);
4581             ret = FALSE;
4582         }
4583     }
4584     __EXCEPT_PAGE_FAULT
4585     {
4586         SetLastError(STATUS_ACCESS_VIOLATION);
4587         ret = FALSE;
4588     }
4589     __ENDTRY
4590     return ret;
4591 }
4592
4593 static BOOL CRYPT_AsnDecodeDistPointName(const BYTE *pbEncoded,
4594  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4595  DWORD *pcbDecoded)
4596 {
4597     BOOL ret;
4598
4599     if (pbEncoded[0] == (ASN_CONTEXT | ASN_CONSTRUCTOR | 0))
4600     {
4601         DWORD bytesNeeded, dataLen;
4602
4603         if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4604         {
4605             struct AsnArrayDescriptor arrayDesc = {
4606              ASN_CONTEXT | ASN_CONSTRUCTOR | 0, CRYPT_AsnDecodeAltNameEntry,
4607              sizeof(CERT_ALT_NAME_ENTRY), TRUE,
4608              offsetof(CERT_ALT_NAME_ENTRY, u.pwszURL) };
4609             BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4610             DWORD nameLen;
4611
4612             if (dataLen)
4613             {
4614                 ret = CRYPT_AsnDecodeArray(&arrayDesc,
4615                  pbEncoded + 1 + lenBytes, cbEncoded - 1 - lenBytes,
4616                  0, NULL, NULL, &nameLen, NULL, NULL);
4617                 /* The CERT_ALT_NAME_INFO's size is included by CRYPT_AsnDecodeArray
4618                  * as the sizeof(struct GenericArray), so don't include it in the
4619                  * total bytes needed.
4620                  */
4621                 bytesNeeded = sizeof(CRL_DIST_POINT_NAME) + nameLen -
4622                  sizeof(CERT_ALT_NAME_INFO);
4623             }
4624             else
4625                 bytesNeeded = sizeof(CRL_DIST_POINT_NAME);
4626             if (pcbDecoded)
4627                 *pcbDecoded = 1 + lenBytes + dataLen;
4628             if (!pvStructInfo)
4629                 *pcbStructInfo = bytesNeeded;
4630             else if (*pcbStructInfo < bytesNeeded)
4631             {
4632                 *pcbStructInfo = bytesNeeded;
4633                 SetLastError(ERROR_MORE_DATA);
4634                 ret = FALSE;
4635             }
4636             else
4637             {
4638                 CRL_DIST_POINT_NAME *name = pvStructInfo;
4639
4640                 *pcbStructInfo = bytesNeeded;
4641                 if (dataLen)
4642                 {
4643                     name->dwDistPointNameChoice = CRL_DIST_POINT_FULL_NAME;
4644                     ret = CRYPT_AsnDecodeArray(&arrayDesc,
4645                      pbEncoded + 1 + lenBytes, cbEncoded - 1 - lenBytes,
4646                      0, NULL, &name->u.FullName, &nameLen, NULL,
4647                      name->u.FullName.rgAltEntry);
4648                 }
4649                 else
4650                     name->dwDistPointNameChoice = CRL_DIST_POINT_NO_NAME;
4651             }
4652         }
4653     }
4654     else
4655     {
4656         SetLastError(CRYPT_E_ASN1_BADTAG);
4657         ret = FALSE;
4658     }
4659     return ret;
4660 }
4661
4662 static BOOL CRYPT_AsnDecodeDistPoint(const BYTE *pbEncoded, DWORD cbEncoded,
4663  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
4664 {
4665     struct AsnDecodeSequenceItem items[] = {
4666      { ASN_CONTEXT | ASN_CONSTRUCTOR | 0, offsetof(CRL_DIST_POINT,
4667        DistPointName), CRYPT_AsnDecodeDistPointName,
4668        sizeof(CRL_DIST_POINT_NAME), TRUE, TRUE, offsetof(CRL_DIST_POINT,
4669        DistPointName.u.FullName.rgAltEntry), 0 },
4670      { ASN_CONTEXT | 1, offsetof(CRL_DIST_POINT, ReasonFlags),
4671        CRYPT_AsnDecodeBitsInternal, sizeof(CRYPT_BIT_BLOB), TRUE, TRUE,
4672        offsetof(CRL_DIST_POINT, ReasonFlags.pbData), 0 },
4673      { ASN_CONTEXT | ASN_CONSTRUCTOR | 2, offsetof(CRL_DIST_POINT, CRLIssuer),
4674        CRYPT_AsnDecodeAltNameInternal, sizeof(CERT_ALT_NAME_INFO), TRUE, TRUE,
4675        offsetof(CRL_DIST_POINT, CRLIssuer.rgAltEntry), 0 },
4676     };
4677     CRL_DIST_POINT *point = pvStructInfo;
4678     BOOL ret;
4679
4680     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
4681      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
4682      pcbDecoded, point ? point->DistPointName.u.FullName.rgAltEntry : NULL);
4683     return ret;
4684 }
4685
4686 static BOOL WINAPI CRYPT_AsnDecodeCRLDistPoints(DWORD dwCertEncodingType,
4687  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4688  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4689 {
4690     BOOL ret;
4691
4692     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
4693      pDecodePara, pvStructInfo, *pcbStructInfo);
4694
4695     __TRY
4696     {
4697         struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
4698          CRYPT_AsnDecodeDistPoint, sizeof(CRL_DIST_POINT), TRUE,
4699          offsetof(CRL_DIST_POINT, DistPointName.u.FullName.rgAltEntry) };
4700
4701         ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
4702          pDecodePara, pvStructInfo, pcbStructInfo, NULL, NULL);
4703     }
4704     __EXCEPT_PAGE_FAULT
4705     {
4706         SetLastError(STATUS_ACCESS_VIOLATION);
4707         ret = FALSE;
4708     }
4709     __ENDTRY
4710     return ret;
4711 }
4712
4713 static BOOL WINAPI CRYPT_AsnDecodeEnhancedKeyUsage(DWORD dwCertEncodingType,
4714  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4715  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4716 {
4717     BOOL ret;
4718
4719     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
4720      pDecodePara, pvStructInfo, *pcbStructInfo);
4721
4722     __TRY
4723     {
4724         struct AsnArrayDescriptor arrayDesc = { ASN_SEQUENCEOF,
4725          CRYPT_AsnDecodeOidInternal, sizeof(LPSTR), TRUE, 0 };
4726
4727         ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
4728          pDecodePara, pvStructInfo, pcbStructInfo, NULL, NULL);
4729     }
4730     __EXCEPT_PAGE_FAULT
4731     {
4732         SetLastError(STATUS_ACCESS_VIOLATION);
4733         ret = FALSE;
4734     }
4735     __ENDTRY
4736     return ret;
4737 }
4738
4739 static BOOL WINAPI CRYPT_AsnDecodeIssuingDistPoint(DWORD dwCertEncodingType,
4740  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4741  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4742 {
4743     BOOL ret;
4744
4745     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
4746      pDecodePara, pvStructInfo, *pcbStructInfo);
4747
4748     __TRY
4749     {
4750         struct AsnDecodeSequenceItem items[] = {
4751          { ASN_CONTEXT | ASN_CONSTRUCTOR | 0, offsetof(CRL_ISSUING_DIST_POINT,
4752            DistPointName), CRYPT_AsnDecodeDistPointName,
4753            sizeof(CRL_DIST_POINT_NAME), TRUE, TRUE,
4754            offsetof(CRL_ISSUING_DIST_POINT,
4755            DistPointName.u.FullName.rgAltEntry), 0 },
4756          { ASN_CONTEXT | 1, offsetof(CRL_ISSUING_DIST_POINT,
4757            fOnlyContainsUserCerts), CRYPT_AsnDecodeBool, sizeof(BOOL), TRUE,
4758            FALSE, 0 },
4759          { ASN_CONTEXT | 2, offsetof(CRL_ISSUING_DIST_POINT,
4760            fOnlyContainsCACerts), CRYPT_AsnDecodeBool, sizeof(BOOL), TRUE,
4761            FALSE, 0 },
4762          { ASN_CONTEXT | 3, offsetof(CRL_ISSUING_DIST_POINT,
4763            OnlySomeReasonFlags), CRYPT_AsnDecodeBitsInternal,
4764            sizeof(CRYPT_BIT_BLOB), TRUE, TRUE, offsetof(CRL_ISSUING_DIST_POINT,
4765            OnlySomeReasonFlags.pbData), 0 },
4766          { ASN_CONTEXT | 4, offsetof(CRL_ISSUING_DIST_POINT,
4767            fIndirectCRL), CRYPT_AsnDecodeBool, sizeof(BOOL), TRUE, FALSE, 0 },
4768         };
4769
4770         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
4771          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
4772          pcbStructInfo, NULL, NULL);
4773     }
4774     __EXCEPT_PAGE_FAULT
4775     {
4776         SetLastError(STATUS_ACCESS_VIOLATION);
4777         ret = FALSE;
4778     }
4779     __ENDTRY
4780     return ret;
4781 }
4782
4783 static BOOL CRYPT_AsnDecodeMaximum(const BYTE *pbEncoded,
4784  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4785  DWORD *pcbDecoded)
4786 {
4787     BOOL ret = FALSE;
4788
4789     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
4790      pvStructInfo, *pcbStructInfo, pcbDecoded);
4791
4792     if (!cbEncoded)
4793     {
4794         SetLastError(CRYPT_E_ASN1_EOD);
4795         return FALSE;
4796     }
4797     if (pbEncoded[0] != (ASN_CONTEXT | 1))
4798     {
4799         SetLastError(CRYPT_E_ASN1_BADTAG);
4800         return FALSE;
4801     }
4802     /* The BOOL is implicit:  if the integer is present, then it's TRUE */
4803     ret = CRYPT_AsnDecodeIntInternal(pbEncoded, cbEncoded, dwFlags,
4804      pvStructInfo ? (BYTE *)pvStructInfo + sizeof(BOOL) : NULL, pcbStructInfo,
4805      pcbDecoded);
4806     if (ret && pvStructInfo)
4807         *(BOOL *)pvStructInfo = TRUE;
4808     TRACE("returning %d\n", ret);
4809     return ret;
4810 }
4811
4812 static BOOL CRYPT_AsnDecodeSubtree(const BYTE *pbEncoded,
4813  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4814  DWORD *pcbDecoded)
4815 {
4816     BOOL ret;
4817     struct AsnDecodeSequenceItem items[] = {
4818      { 0, offsetof(CERT_GENERAL_SUBTREE, Base),
4819        CRYPT_AsnDecodeAltNameEntry, sizeof(CERT_ALT_NAME_ENTRY), TRUE, TRUE,
4820        offsetof(CERT_ALT_NAME_ENTRY, u.pwszURL), 0 },
4821      { ASN_CONTEXT | 0, offsetof(CERT_GENERAL_SUBTREE, dwMinimum),
4822        CRYPT_AsnDecodeIntInternal, sizeof(DWORD), TRUE, FALSE, 0, 0 },
4823      { ASN_CONTEXT | 1, offsetof(CERT_GENERAL_SUBTREE, fMaximum),
4824        CRYPT_AsnDecodeMaximum, sizeof(BOOL) + sizeof(DWORD), TRUE, FALSE, 0,
4825        0 },
4826     };
4827     CERT_GENERAL_SUBTREE *subtree = pvStructInfo;
4828
4829     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
4830      pvStructInfo, *pcbStructInfo, pcbDecoded);
4831
4832     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
4833      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
4834      pcbDecoded, subtree ? subtree->Base.u.pwszURL : NULL);
4835     if (pcbDecoded)
4836     {
4837         TRACE("%d\n", *pcbDecoded);
4838         if (*pcbDecoded < cbEncoded)
4839             TRACE("%02x %02x\n", *(pbEncoded + *pcbDecoded),
4840              *(pbEncoded + *pcbDecoded + 1));
4841     }
4842     TRACE("returning %d\n", ret);
4843     return ret;
4844 }
4845
4846 static BOOL CRYPT_AsnDecodeSubtreeArray(const BYTE *pbEncoded,
4847  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4848  DWORD *pcbDecoded)
4849 {
4850     BOOL ret = TRUE;
4851     struct AsnArrayDescriptor arrayDesc = { 0,
4852      CRYPT_AsnDecodeSubtree, sizeof(CERT_GENERAL_SUBTREE), TRUE,
4853      offsetof(CERT_GENERAL_SUBTREE, Base.u.pwszURL) };
4854     struct GenericArray *array = pvStructInfo;
4855
4856     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
4857      pvStructInfo, *pcbStructInfo, pcbDecoded);
4858
4859     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
4860      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
4861      array ? array->rgItems : NULL);
4862     return ret;
4863 }
4864
4865
4866 static BOOL WINAPI CRYPT_AsnDecodeNameConstraints(DWORD dwCertEncodingType,
4867  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4868  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4869 {
4870     BOOL ret = FALSE;
4871
4872     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
4873      pDecodePara, pvStructInfo, *pcbStructInfo);
4874
4875     __TRY
4876     {
4877         struct AsnDecodeSequenceItem items[] = {
4878          { ASN_CONTEXT | ASN_CONSTRUCTOR | 0,
4879            offsetof(CERT_NAME_CONSTRAINTS_INFO, cPermittedSubtree),
4880            CRYPT_AsnDecodeSubtreeArray, sizeof(struct GenericArray), TRUE, TRUE,
4881            offsetof(CERT_NAME_CONSTRAINTS_INFO, rgPermittedSubtree), 0 },
4882          { ASN_CONTEXT | ASN_CONSTRUCTOR | 1,
4883            offsetof(CERT_NAME_CONSTRAINTS_INFO, cExcludedSubtree),
4884            CRYPT_AsnDecodeSubtreeArray, sizeof(struct GenericArray), TRUE, TRUE,
4885            offsetof(CERT_NAME_CONSTRAINTS_INFO, rgExcludedSubtree), 0 },
4886         };
4887
4888         ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
4889          pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
4890          pcbStructInfo, NULL, NULL);
4891     }
4892     __EXCEPT_PAGE_FAULT
4893     {
4894         SetLastError(STATUS_ACCESS_VIOLATION);
4895     }
4896     __ENDTRY
4897     return ret;
4898 }
4899
4900 static BOOL CRYPT_AsnDecodeIssuerSerialNumber(const BYTE *pbEncoded,
4901  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4902  DWORD *pcbDecoded)
4903 {
4904     BOOL ret;
4905     struct AsnDecodeSequenceItem items[] = {
4906      { 0, offsetof(CERT_ISSUER_SERIAL_NUMBER, Issuer), CRYPT_AsnDecodeDerBlob,
4907        sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CERT_ISSUER_SERIAL_NUMBER,
4908        Issuer.pbData) },
4909      { ASN_INTEGER, offsetof(CERT_ISSUER_SERIAL_NUMBER, SerialNumber),
4910        CRYPT_AsnDecodeIntegerInternal, sizeof(CRYPT_INTEGER_BLOB), FALSE,
4911        TRUE, offsetof(CERT_ISSUER_SERIAL_NUMBER, SerialNumber.pbData), 0 },
4912     };
4913     CERT_ISSUER_SERIAL_NUMBER *issuerSerial = pvStructInfo;
4914
4915     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
4916      pvStructInfo, *pcbStructInfo, pcbDecoded);
4917
4918     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
4919      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
4920      pcbDecoded, issuerSerial ? issuerSerial->Issuer.pbData : NULL);
4921     if (ret && issuerSerial && !issuerSerial->SerialNumber.cbData)
4922     {
4923         SetLastError(CRYPT_E_ASN1_CORRUPT);
4924         ret = FALSE;
4925     }
4926     TRACE("returning %d\n", ret);
4927     return ret;
4928 }
4929
4930 static BOOL CRYPT_AsnDecodePKCSSignerInfoInternal(const BYTE *pbEncoded,
4931  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
4932  DWORD *pcbDecoded)
4933 {
4934     CMSG_SIGNER_INFO *info = pvStructInfo;
4935     struct AsnDecodeSequenceItem items[] = {
4936      { ASN_INTEGER, offsetof(CMSG_SIGNER_INFO, dwVersion),
4937        CRYPT_AsnDecodeIntInternal, sizeof(DWORD), FALSE, FALSE, 0, 0 },
4938      { ASN_SEQUENCEOF, offsetof(CMSG_SIGNER_INFO, Issuer),
4939        CRYPT_AsnDecodeIssuerSerialNumber, sizeof(CERT_ISSUER_SERIAL_NUMBER),
4940        FALSE, TRUE, offsetof(CMSG_SIGNER_INFO, Issuer.pbData), 0 },
4941      { ASN_SEQUENCEOF, offsetof(CMSG_SIGNER_INFO, HashAlgorithm),
4942        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
4943        FALSE, TRUE, offsetof(CMSG_SIGNER_INFO, HashAlgorithm.pszObjId), 0 },
4944      { ASN_CONSTRUCTOR | ASN_CONTEXT | 0,
4945        offsetof(CMSG_SIGNER_INFO, AuthAttrs),
4946        CRYPT_AsnDecodePKCSAttributesInternal, sizeof(CRYPT_ATTRIBUTES),
4947        TRUE, TRUE, offsetof(CMSG_SIGNER_INFO, AuthAttrs.rgAttr), 0 },
4948      { ASN_SEQUENCEOF, offsetof(CMSG_SIGNER_INFO, HashEncryptionAlgorithm),
4949        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
4950        FALSE, TRUE, offsetof(CMSG_SIGNER_INFO,
4951        HashEncryptionAlgorithm.pszObjId), 0 },
4952      { ASN_OCTETSTRING, offsetof(CMSG_SIGNER_INFO, EncryptedHash),
4953        CRYPT_AsnDecodeOctetsInternal, sizeof(CRYPT_DER_BLOB),
4954        FALSE, TRUE, offsetof(CMSG_SIGNER_INFO, EncryptedHash.pbData), 0 },
4955      { ASN_CONSTRUCTOR | ASN_CONTEXT | 1,
4956        offsetof(CMSG_SIGNER_INFO, UnauthAttrs),
4957        CRYPT_AsnDecodePKCSAttributesInternal, sizeof(CRYPT_ATTRIBUTES),
4958        TRUE, TRUE, offsetof(CMSG_SIGNER_INFO, UnauthAttrs.rgAttr), 0 },
4959     };
4960     BOOL ret;
4961
4962     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
4963      pvStructInfo, *pcbStructInfo);
4964
4965     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
4966      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
4967      pcbDecoded, info ? info->Issuer.pbData : NULL);
4968     return ret;
4969 }
4970
4971 static BOOL WINAPI CRYPT_AsnDecodePKCSSignerInfo(DWORD dwCertEncodingType,
4972  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4973  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4974 {
4975     BOOL ret = FALSE;
4976
4977     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
4978      pDecodePara, pvStructInfo, *pcbStructInfo);
4979
4980     __TRY
4981     {
4982         ret = CRYPT_AsnDecodePKCSSignerInfoInternal(pbEncoded, cbEncoded,
4983          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pcbStructInfo, NULL);
4984         if (ret && pvStructInfo)
4985         {
4986             ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
4987              pcbStructInfo, *pcbStructInfo);
4988             if (ret)
4989             {
4990                 CMSG_SIGNER_INFO *info;
4991
4992                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4993                     pvStructInfo = *(BYTE **)pvStructInfo;
4994                 info = pvStructInfo;
4995                 info->Issuer.pbData = ((BYTE *)info +
4996                  sizeof(CMSG_SIGNER_INFO));
4997                 ret = CRYPT_AsnDecodePKCSSignerInfoInternal(pbEncoded,
4998                  cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
4999                  pcbStructInfo, NULL);
5000             }
5001         }
5002     }
5003     __EXCEPT_PAGE_FAULT
5004     {
5005         SetLastError(STATUS_ACCESS_VIOLATION);
5006     }
5007     __ENDTRY
5008     TRACE("returning %d\n", ret);
5009     return ret;
5010 }
5011
5012 static BOOL CRYPT_AsnDecodeCMSSignerId(const BYTE *pbEncoded,
5013  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
5014  DWORD *pcbDecoded)
5015 {
5016     CERT_ID *id = pvStructInfo;
5017     BOOL ret = FALSE;
5018
5019     if (*pbEncoded == ASN_SEQUENCEOF)
5020     {
5021         ret = CRYPT_AsnDecodeIssuerSerialNumber(pbEncoded, cbEncoded, dwFlags,
5022          id ? &id->u.IssuerSerialNumber : NULL, pcbStructInfo, pcbDecoded);
5023         if (ret)
5024         {
5025             if (id)
5026                 id->dwIdChoice = CERT_ID_ISSUER_SERIAL_NUMBER;
5027             if (*pcbStructInfo > sizeof(CERT_ISSUER_SERIAL_NUMBER))
5028                 *pcbStructInfo = sizeof(CERT_ID) + *pcbStructInfo -
5029                  sizeof(CERT_ISSUER_SERIAL_NUMBER);
5030             else
5031                 *pcbStructInfo = sizeof(CERT_ID);
5032         }
5033     }
5034     else if (*pbEncoded == (ASN_CONTEXT | 0))
5035     {
5036         ret = CRYPT_AsnDecodeOctetsInternal(pbEncoded, cbEncoded, dwFlags,
5037          id ? &id->u.KeyId : NULL, pcbStructInfo, pcbDecoded);
5038         if (ret)
5039         {
5040             if (id)
5041                 id->dwIdChoice = CERT_ID_KEY_IDENTIFIER;
5042             if (*pcbStructInfo > sizeof(CRYPT_DATA_BLOB))
5043                 *pcbStructInfo = sizeof(CERT_ID) + *pcbStructInfo -
5044                  sizeof(CRYPT_DATA_BLOB);
5045             else
5046                 *pcbStructInfo = sizeof(CERT_ID);
5047         }
5048     }
5049     else
5050         SetLastError(CRYPT_E_ASN1_BADTAG);
5051     return ret;
5052 }
5053
5054 static BOOL CRYPT_AsnDecodeCMSSignerInfoInternal(const BYTE *pbEncoded,
5055  DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo,
5056  DWORD *pcbDecoded)
5057 {
5058     CMSG_CMS_SIGNER_INFO *info = pvStructInfo;
5059     struct AsnDecodeSequenceItem items[] = {
5060      { ASN_INTEGER, offsetof(CMSG_CMS_SIGNER_INFO, dwVersion),
5061        CRYPT_AsnDecodeIntInternal, sizeof(DWORD), FALSE, FALSE, 0, 0 },
5062      { 0, offsetof(CMSG_CMS_SIGNER_INFO, SignerId),
5063        CRYPT_AsnDecodeCMSSignerId, sizeof(CERT_ID), FALSE, TRUE,
5064        offsetof(CMSG_CMS_SIGNER_INFO, SignerId.u.KeyId.pbData), 0 },
5065      { ASN_SEQUENCEOF, offsetof(CMSG_CMS_SIGNER_INFO, HashAlgorithm),
5066        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
5067        FALSE, TRUE, offsetof(CMSG_CMS_SIGNER_INFO, HashAlgorithm.pszObjId), 0 },
5068      { ASN_CONSTRUCTOR | ASN_CONTEXT | 0,
5069        offsetof(CMSG_CMS_SIGNER_INFO, AuthAttrs),
5070        CRYPT_AsnDecodePKCSAttributesInternal, sizeof(CRYPT_ATTRIBUTES),
5071        TRUE, TRUE, offsetof(CMSG_CMS_SIGNER_INFO, AuthAttrs.rgAttr), 0 },
5072      { ASN_SEQUENCEOF, offsetof(CMSG_CMS_SIGNER_INFO, HashEncryptionAlgorithm),
5073        CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
5074        FALSE, TRUE, offsetof(CMSG_CMS_SIGNER_INFO,
5075        HashEncryptionAlgorithm.pszObjId), 0 },
5076      { ASN_OCTETSTRING, offsetof(CMSG_CMS_SIGNER_INFO, EncryptedHash),
5077        CRYPT_AsnDecodeOctetsInternal, sizeof(CRYPT_DER_BLOB),
5078        FALSE, TRUE, offsetof(CMSG_CMS_SIGNER_INFO, EncryptedHash.pbData), 0 },
5079      { ASN_CONSTRUCTOR | ASN_CONTEXT | 1,
5080        offsetof(CMSG_CMS_SIGNER_INFO, UnauthAttrs),
5081        CRYPT_AsnDecodePKCSAttributesInternal, sizeof(CRYPT_ATTRIBUTES),
5082        TRUE, TRUE, offsetof(CMSG_CMS_SIGNER_INFO, UnauthAttrs.rgAttr), 0 },
5083     };
5084     BOOL ret;
5085
5086     TRACE("%p, %d, %08x, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
5087      pvStructInfo, *pcbStructInfo);
5088
5089     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
5090      pbEncoded, cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo,
5091      pcbDecoded, info ? info->SignerId.u.KeyId.pbData : NULL);
5092     return ret;
5093 }
5094
5095 static BOOL WINAPI CRYPT_AsnDecodeCMSSignerInfo(DWORD dwCertEncodingType,
5096  LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5097  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5098 {
5099     BOOL ret = FALSE;
5100
5101     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
5102      pDecodePara, pvStructInfo, *pcbStructInfo);
5103
5104     __TRY
5105     {
5106         ret = CRYPT_AsnDecodeCMSSignerInfoInternal(pbEncoded, cbEncoded,
5107          dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pcbStructInfo, NULL);
5108         if (ret && pvStructInfo)
5109         {
5110             ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
5111              pcbStructInfo, *pcbStructInfo);
5112             if (ret)
5113             {
5114                 CMSG_CMS_SIGNER_INFO *info;
5115
5116                 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5117                     pvStructInfo = *(BYTE **)pvStructInfo;
5118                 info = pvStructInfo;
5119                 info->SignerId.u.KeyId.pbData = ((BYTE *)info +
5120                  sizeof(CMSG_CMS_SIGNER_INFO));
5121                 ret = CRYPT_AsnDecodeCMSSignerInfoInternal(pbEncoded,
5122                  cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, pvStructInfo,
5123                  pcbStructInfo, NULL);
5124             }
5125         }
5126     }
5127     __EXCEPT_PAGE_FAULT
5128     {
5129         SetLastError(STATUS_ACCESS_VIOLATION);
5130     }
5131     __ENDTRY
5132     TRACE("returning %d\n", ret);
5133     return ret;
5134 }
5135
5136 static BOOL CRYPT_DecodeSignerArray(const BYTE *pbEncoded, DWORD cbEncoded,
5137  DWORD dwFlags, void *pvStructInfo, DWORD *pcbStructInfo, DWORD *pcbDecoded)
5138 {
5139     BOOL ret;
5140     struct AsnArrayDescriptor arrayDesc = { ASN_CONSTRUCTOR | ASN_SETOF,
5141      CRYPT_AsnDecodeCMSSignerInfoInternal, sizeof(CMSG_CMS_SIGNER_INFO), TRUE,
5142      offsetof(CMSG_CMS_SIGNER_INFO, SignerId.u.KeyId.pbData) };
5143     struct GenericArray *array = pvStructInfo;
5144
5145     TRACE("%p, %d, %08x, %p, %d, %p\n", pbEncoded, cbEncoded, dwFlags,
5146      pvStructInfo, *pcbStructInfo, pcbDecoded);
5147
5148     ret = CRYPT_AsnDecodeArray(&arrayDesc, pbEncoded, cbEncoded, dwFlags,
5149      NULL, pvStructInfo, pcbStructInfo, pcbDecoded,
5150      array ? array->rgItems : NULL);
5151     return ret;
5152 }
5153
5154 BOOL CRYPT_AsnDecodeCMSSignedInfo(const BYTE *pbEncoded, DWORD cbEncoded,
5155  DWORD dwFlags, PCRYPT_DECODE_PARA pDecodePara,
5156  CRYPT_SIGNED_INFO *signedInfo, DWORD *pcbSignedInfo)
5157 {
5158     BOOL ret = FALSE;
5159     struct AsnDecodeSequenceItem items[] = {
5160      { ASN_INTEGER, offsetof(CRYPT_SIGNED_INFO, version),
5161        CRYPT_AsnDecodeIntInternal, sizeof(DWORD), FALSE, FALSE, 0, 0 },
5162      /* Placeholder for the hash algorithms - redundant with those in the
5163       * signers, so just ignore them.
5164       */
5165      { ASN_CONSTRUCTOR | ASN_SETOF, 0, NULL, 0, TRUE, FALSE, 0, 0 },
5166      { ASN_SEQUENCE, offsetof(CRYPT_SIGNED_INFO, content),
5167        CRYPT_AsnDecodePKCSContentInfoInternal, sizeof(CRYPT_CONTENT_INFO),
5168        FALSE, TRUE, offsetof(CRYPT_SIGNED_INFO, content.pszObjId), 0 },
5169      { ASN_CONSTRUCTOR | ASN_CONTEXT | 0,
5170        offsetof(CRYPT_SIGNED_INFO, cCertEncoded),
5171        CRYPT_DecodeDERArray, sizeof(struct GenericArray), TRUE, TRUE,
5172        offsetof(CRYPT_SIGNED_INFO, rgCertEncoded), 0 },
5173      { ASN_CONSTRUCTOR | ASN_CONTEXT | 1,
5174        offsetof(CRYPT_SIGNED_INFO, cCrlEncoded), CRYPT_DecodeDERArray,
5175        sizeof(struct GenericArray), TRUE, TRUE,
5176        offsetof(CRYPT_SIGNED_INFO, rgCrlEncoded), 0 },
5177      { ASN_CONSTRUCTOR | ASN_SETOF, offsetof(CRYPT_SIGNED_INFO, cSignerInfo),
5178        CRYPT_DecodeSignerArray, sizeof(struct GenericArray), TRUE, TRUE,
5179        offsetof(CRYPT_SIGNED_INFO, rgSignerInfo), 0 },
5180     };
5181
5182     TRACE("%p, %d, %08x, %p, %p, %d\n", pbEncoded, cbEncoded, dwFlags,
5183      pDecodePara, signedInfo, *pcbSignedInfo);
5184
5185     ret = CRYPT_AsnDecodeSequence(items, sizeof(items) / sizeof(items[0]),
5186      pbEncoded, cbEncoded, dwFlags, pDecodePara, signedInfo, pcbSignedInfo,
5187      NULL, NULL);
5188     TRACE("returning %d\n", ret);
5189     return ret;
5190 }
5191
5192 static CryptDecodeObjectExFunc CRYPT_GetBuiltinDecoder(DWORD dwCertEncodingType,
5193  LPCSTR lpszStructType)
5194 {
5195     CryptDecodeObjectExFunc decodeFunc = NULL;
5196
5197     if ((dwCertEncodingType & CERT_ENCODING_TYPE_MASK) != X509_ASN_ENCODING
5198      && (dwCertEncodingType & CMSG_ENCODING_TYPE_MASK) != PKCS_7_ASN_ENCODING)
5199     {
5200         SetLastError(ERROR_FILE_NOT_FOUND);
5201         return NULL;
5202     }
5203     if (!HIWORD(lpszStructType))
5204     {
5205         switch (LOWORD(lpszStructType))
5206         {
5207         case LOWORD(X509_CERT):
5208             decodeFunc = CRYPT_AsnDecodeCertSignedContent;
5209             break;
5210         case LOWORD(X509_CERT_TO_BE_SIGNED):
5211             decodeFunc = CRYPT_AsnDecodeCert;
5212             break;
5213         case LOWORD(X509_CERT_CRL_TO_BE_SIGNED):
5214             decodeFunc = CRYPT_AsnDecodeCRL;
5215             break;
5216         case LOWORD(X509_EXTENSIONS):
5217             decodeFunc = CRYPT_AsnDecodeExtensions;
5218             break;
5219         case LOWORD(X509_NAME_VALUE):
5220             decodeFunc = CRYPT_AsnDecodeNameValue;
5221             break;
5222         case LOWORD(X509_NAME):
5223             decodeFunc = CRYPT_AsnDecodeName;
5224             break;
5225         case LOWORD(X509_PUBLIC_KEY_INFO):
5226             decodeFunc = CRYPT_AsnDecodePubKeyInfo;
5227             break;
5228         case LOWORD(X509_AUTHORITY_KEY_ID):
5229             decodeFunc = CRYPT_AsnDecodeAuthorityKeyId;
5230             break;
5231         case LOWORD(X509_ALTERNATE_NAME):
5232             decodeFunc = CRYPT_AsnDecodeAltName;
5233             break;
5234         case LOWORD(X509_BASIC_CONSTRAINTS):
5235             decodeFunc = CRYPT_AsnDecodeBasicConstraints;
5236             break;
5237         case LOWORD(X509_BASIC_CONSTRAINTS2):
5238             decodeFunc = CRYPT_AsnDecodeBasicConstraints2;
5239             break;
5240         case LOWORD(X509_CERT_POLICIES):
5241             decodeFunc = CRYPT_AsnDecodeCertPolicies;
5242             break;
5243         case LOWORD(RSA_CSP_PUBLICKEYBLOB):
5244             decodeFunc = CRYPT_AsnDecodeRsaPubKey;
5245             break;
5246         case LOWORD(X509_UNICODE_NAME):
5247             decodeFunc = CRYPT_AsnDecodeUnicodeName;
5248             break;
5249         case LOWORD(PKCS_ATTRIBUTE):
5250             decodeFunc = CRYPT_AsnDecodePKCSAttribute;
5251             break;
5252         case LOWORD(X509_UNICODE_NAME_VALUE):
5253             decodeFunc = CRYPT_AsnDecodeUnicodeNameValue;
5254             break;
5255         case LOWORD(X509_OCTET_STRING):
5256             decodeFunc = CRYPT_AsnDecodeOctets;
5257             break;
5258         case LOWORD(X509_BITS):
5259         case LOWORD(X509_KEY_USAGE):
5260             decodeFunc = CRYPT_AsnDecodeBits;
5261             break;
5262         case LOWORD(X509_INTEGER):
5263             decodeFunc = CRYPT_AsnDecodeInt;
5264             break;
5265         case LOWORD(X509_MULTI_BYTE_INTEGER):
5266             decodeFunc = CRYPT_AsnDecodeInteger;
5267             break;
5268         case LOWORD(X509_MULTI_BYTE_UINT):
5269             decodeFunc = CRYPT_AsnDecodeUnsignedInteger;
5270             break;
5271         case LOWORD(X509_ENUMERATED):
5272             decodeFunc = CRYPT_AsnDecodeEnumerated;
5273             break;
5274         case LOWORD(X509_CHOICE_OF_TIME):
5275             decodeFunc = CRYPT_AsnDecodeChoiceOfTime;
5276             break;
5277         case LOWORD(X509_AUTHORITY_KEY_ID2):
5278             decodeFunc = CRYPT_AsnDecodeAuthorityKeyId2;
5279             break;
5280         case LOWORD(X509_AUTHORITY_INFO_ACCESS):
5281             decodeFunc = CRYPT_AsnDecodeAuthorityInfoAccess;
5282             break;
5283         case LOWORD(PKCS_CONTENT_INFO):
5284             decodeFunc = CRYPT_AsnDecodePKCSContentInfo;
5285             break;
5286         case LOWORD(X509_SEQUENCE_OF_ANY):
5287             decodeFunc = CRYPT_AsnDecodeSequenceOfAny;
5288             break;
5289         case LOWORD(PKCS_UTC_TIME):
5290             decodeFunc = CRYPT_AsnDecodeUtcTime;
5291             break;
5292         case LOWORD(X509_CRL_DIST_POINTS):
5293             decodeFunc = CRYPT_AsnDecodeCRLDistPoints;
5294             break;
5295         case LOWORD(X509_ENHANCED_KEY_USAGE):
5296             decodeFunc = CRYPT_AsnDecodeEnhancedKeyUsage;
5297             break;
5298         case LOWORD(PKCS_CTL):
5299             decodeFunc = CRYPT_AsnDecodeCTL;
5300             break;
5301         case LOWORD(PKCS_SMIME_CAPABILITIES):
5302             decodeFunc = CRYPT_AsnDecodeSMIMECapabilities;
5303             break;
5304         case LOWORD(X509_PKIX_POLICY_QUALIFIER_USERNOTICE):
5305             decodeFunc = CRYPT_AsnDecodePolicyQualifierUserNotice;
5306             break;
5307         case LOWORD(PKCS_ATTRIBUTES):
5308             decodeFunc = CRYPT_AsnDecodePKCSAttributes;
5309             break;
5310         case LOWORD(X509_ISSUING_DIST_POINT):
5311             decodeFunc = CRYPT_AsnDecodeIssuingDistPoint;
5312             break;
5313         case LOWORD(X509_NAME_CONSTRAINTS):
5314             decodeFunc = CRYPT_AsnDecodeNameConstraints;
5315             break;
5316         case LOWORD(PKCS7_SIGNER_INFO):
5317             decodeFunc = CRYPT_AsnDecodePKCSSignerInfo;
5318             break;
5319         case LOWORD(CMS_SIGNER_INFO):
5320             decodeFunc = CRYPT_AsnDecodeCMSSignerInfo;
5321             break;
5322         }
5323     }
5324     else if (!strcmp(lpszStructType, szOID_CERT_EXTENSIONS))
5325         decodeFunc = CRYPT_AsnDecodeExtensions;
5326     else if (!strcmp(lpszStructType, szOID_RSA_signingTime))
5327         decodeFunc = CRYPT_AsnDecodeUtcTime;
5328     else if (!strcmp(lpszStructType, szOID_RSA_SMIMECapabilities))
5329         decodeFunc = CRYPT_AsnDecodeSMIMECapabilities;
5330     else if (!strcmp(lpszStructType, szOID_AUTHORITY_KEY_IDENTIFIER))
5331         decodeFunc = CRYPT_AsnDecodeAuthorityKeyId;
5332     else if (!strcmp(lpszStructType, szOID_AUTHORITY_KEY_IDENTIFIER2))
5333         decodeFunc = CRYPT_AsnDecodeAuthorityKeyId2;
5334     else if (!strcmp(lpszStructType, szOID_CRL_REASON_CODE))
5335         decodeFunc = CRYPT_AsnDecodeEnumerated;
5336     else if (!strcmp(lpszStructType, szOID_KEY_USAGE))
5337         decodeFunc = CRYPT_AsnDecodeBits;
5338     else if (!strcmp(lpszStructType, szOID_SUBJECT_KEY_IDENTIFIER))
5339         decodeFunc = CRYPT_AsnDecodeOctets;
5340     else if (!strcmp(lpszStructType, szOID_BASIC_CONSTRAINTS))
5341         decodeFunc = CRYPT_AsnDecodeBasicConstraints;
5342     else if (!strcmp(lpszStructType, szOID_BASIC_CONSTRAINTS2))
5343         decodeFunc = CRYPT_AsnDecodeBasicConstraints2;
5344     else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME))
5345         decodeFunc = CRYPT_AsnDecodeAltName;
5346     else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME2))
5347         decodeFunc = CRYPT_AsnDecodeAltName;
5348     else if (!strcmp(lpszStructType, szOID_NEXT_UPDATE_LOCATION))
5349         decodeFunc = CRYPT_AsnDecodeAltName;
5350     else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME))
5351         decodeFunc = CRYPT_AsnDecodeAltName;
5352     else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME2))
5353         decodeFunc = CRYPT_AsnDecodeAltName;
5354     else if (!strcmp(lpszStructType, szOID_CRL_DIST_POINTS))
5355         decodeFunc = CRYPT_AsnDecodeCRLDistPoints;
5356     else if (!strcmp(lpszStructType, szOID_CERT_POLICIES))
5357         decodeFunc = CRYPT_AsnDecodeCertPolicies;
5358     else if (!strcmp(lpszStructType, szOID_ENHANCED_KEY_USAGE))
5359         decodeFunc = CRYPT_AsnDecodeEnhancedKeyUsage;
5360     else if (!strcmp(lpszStructType, szOID_ISSUING_DIST_POINT))
5361         decodeFunc = CRYPT_AsnDecodeIssuingDistPoint;
5362     else if (!strcmp(lpszStructType, szOID_NAME_CONSTRAINTS))
5363         decodeFunc = CRYPT_AsnDecodeNameConstraints;
5364     else if (!strcmp(lpszStructType, szOID_AUTHORITY_INFO_ACCESS))
5365         decodeFunc = CRYPT_AsnDecodeAuthorityInfoAccess;
5366     else if (!strcmp(lpszStructType, szOID_PKIX_POLICY_QUALIFIER_USERNOTICE))
5367         decodeFunc = CRYPT_AsnDecodePolicyQualifierUserNotice;
5368     else if (!strcmp(lpszStructType, szOID_CTL))
5369         decodeFunc = CRYPT_AsnDecodeCTL;
5370     return decodeFunc;
5371 }
5372
5373 static CryptDecodeObjectFunc CRYPT_LoadDecoderFunc(DWORD dwCertEncodingType,
5374  LPCSTR lpszStructType, HCRYPTOIDFUNCADDR *hFunc)
5375 {
5376     static HCRYPTOIDFUNCSET set = NULL;
5377     CryptDecodeObjectFunc decodeFunc = NULL;
5378
5379     if (!set)
5380         set = CryptInitOIDFunctionSet(CRYPT_OID_DECODE_OBJECT_FUNC, 0);
5381     CryptGetOIDFunctionAddress(set, dwCertEncodingType, lpszStructType, 0,
5382      (void **)&decodeFunc, hFunc);
5383     return decodeFunc;
5384 }
5385
5386 static CryptDecodeObjectExFunc CRYPT_LoadDecoderExFunc(DWORD dwCertEncodingType,
5387  LPCSTR lpszStructType, HCRYPTOIDFUNCADDR *hFunc)
5388 {
5389     static HCRYPTOIDFUNCSET set = NULL;
5390     CryptDecodeObjectExFunc decodeFunc = NULL;
5391
5392     if (!set)
5393         set = CryptInitOIDFunctionSet(CRYPT_OID_DECODE_OBJECT_EX_FUNC, 0);
5394     CryptGetOIDFunctionAddress(set, dwCertEncodingType, lpszStructType, 0,
5395      (void **)&decodeFunc, hFunc);
5396     return decodeFunc;
5397 }
5398
5399 BOOL WINAPI CryptDecodeObject(DWORD dwCertEncodingType, LPCSTR lpszStructType,
5400  const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo,
5401  DWORD *pcbStructInfo)
5402 {
5403     BOOL ret = FALSE;
5404     CryptDecodeObjectFunc pCryptDecodeObject = NULL;
5405     CryptDecodeObjectExFunc pCryptDecodeObjectEx = NULL;
5406     HCRYPTOIDFUNCADDR hFunc = NULL;
5407
5408     TRACE_(crypt)("(0x%08x, %s, %p, %d, 0x%08x, %p, %p)\n", dwCertEncodingType,
5409      debugstr_a(lpszStructType), pbEncoded, cbEncoded, dwFlags,
5410      pvStructInfo, pcbStructInfo);
5411
5412     if (!pvStructInfo && !pcbStructInfo)
5413     {
5414         SetLastError(ERROR_INVALID_PARAMETER);
5415         return FALSE;
5416     }
5417     if (cbEncoded > MAX_ENCODED_LEN)
5418     {
5419         SetLastError(CRYPT_E_ASN1_LARGE);
5420         return FALSE;
5421     }
5422
5423     if (!(pCryptDecodeObjectEx = CRYPT_GetBuiltinDecoder(dwCertEncodingType,
5424      lpszStructType)))
5425     {
5426         TRACE_(crypt)("OID %s not found or unimplemented, looking for DLL\n",
5427          debugstr_a(lpszStructType));
5428         pCryptDecodeObject = CRYPT_LoadDecoderFunc(dwCertEncodingType,
5429          lpszStructType, &hFunc);
5430         if (!pCryptDecodeObject)
5431             pCryptDecodeObjectEx = CRYPT_LoadDecoderExFunc(dwCertEncodingType,
5432              lpszStructType, &hFunc);
5433     }
5434     if (pCryptDecodeObject)
5435         ret = pCryptDecodeObject(dwCertEncodingType, lpszStructType,
5436          pbEncoded, cbEncoded, dwFlags, pvStructInfo, pcbStructInfo);
5437     else if (pCryptDecodeObjectEx)
5438         ret = pCryptDecodeObjectEx(dwCertEncodingType, lpszStructType,
5439          pbEncoded, cbEncoded, dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL,
5440          pvStructInfo, pcbStructInfo);
5441     if (hFunc)
5442         CryptFreeOIDFunctionAddress(hFunc, 0);
5443     TRACE_(crypt)("returning %d\n", ret);
5444     return ret;
5445 }
5446
5447 BOOL WINAPI CryptDecodeObjectEx(DWORD dwCertEncodingType, LPCSTR lpszStructType,
5448  const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5449  PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5450 {
5451     BOOL ret = FALSE;
5452     CryptDecodeObjectExFunc decodeFunc;
5453     HCRYPTOIDFUNCADDR hFunc = NULL;
5454
5455     TRACE_(crypt)("(0x%08x, %s, %p, %d, 0x%08x, %p, %p, %p)\n",
5456      dwCertEncodingType, debugstr_a(lpszStructType), pbEncoded,
5457      cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo);
5458
5459     if (!pvStructInfo && !pcbStructInfo)
5460     {
5461         SetLastError(ERROR_INVALID_PARAMETER);
5462         return FALSE;
5463     }
5464     if (cbEncoded > MAX_ENCODED_LEN)
5465     {
5466         SetLastError(CRYPT_E_ASN1_LARGE);
5467         return FALSE;
5468     }
5469
5470     SetLastError(NOERROR);
5471     if (dwFlags & CRYPT_DECODE_ALLOC_FLAG && pvStructInfo)
5472         *(BYTE **)pvStructInfo = NULL;
5473     decodeFunc = CRYPT_GetBuiltinDecoder(dwCertEncodingType, lpszStructType);
5474     if (!decodeFunc)
5475     {
5476         TRACE_(crypt)("OID %s not found or unimplemented, looking for DLL\n",
5477          debugstr_a(lpszStructType));
5478         decodeFunc = CRYPT_LoadDecoderExFunc(dwCertEncodingType, lpszStructType,
5479          &hFunc);
5480     }
5481     if (decodeFunc)
5482         ret = decodeFunc(dwCertEncodingType, lpszStructType, pbEncoded,
5483          cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo);
5484     else
5485     {
5486         CryptDecodeObjectFunc pCryptDecodeObject =
5487          CRYPT_LoadDecoderFunc(dwCertEncodingType, lpszStructType, &hFunc);
5488
5489         /* Try CryptDecodeObject function.  Don't call CryptDecodeObject
5490          * directly, as that could cause an infinite loop.
5491          */
5492         if (pCryptDecodeObject)
5493         {
5494             if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5495             {
5496                 ret = pCryptDecodeObject(dwCertEncodingType, lpszStructType,
5497                  pbEncoded, cbEncoded, dwFlags, NULL, pcbStructInfo);
5498                 if (ret && (ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
5499                  pvStructInfo, pcbStructInfo, *pcbStructInfo)))
5500                     ret = pCryptDecodeObject(dwCertEncodingType,
5501                      lpszStructType, pbEncoded, cbEncoded, dwFlags,
5502                      *(BYTE **)pvStructInfo, pcbStructInfo);
5503             }
5504             else
5505                 ret = pCryptDecodeObject(dwCertEncodingType, lpszStructType,
5506                  pbEncoded, cbEncoded, dwFlags, pvStructInfo, pcbStructInfo);
5507         }
5508     }
5509     if (hFunc)
5510         CryptFreeOIDFunctionAddress(hFunc, 0);
5511     TRACE_(crypt)("returning %d\n", ret);
5512     return ret;
5513 }
5514
5515 BOOL WINAPI PFXIsPFXBlob(CRYPT_DATA_BLOB *pPFX)
5516 {
5517     BOOL ret;
5518
5519     TRACE_(crypt)("(%p)\n", pPFX);
5520
5521     /* A PFX blob is an asn.1-encoded sequence, consisting of at least a
5522      * version integer of length 1 (3 encoded byes) and at least one other
5523      * datum (two encoded bytes), plus at least two bytes for the outer
5524      * sequence.  Thus, even an empty PFX blob is at least 7 bytes in length.
5525      */
5526     if (pPFX->cbData < 7)
5527         ret = FALSE;
5528     else if (pPFX->pbData[0] == ASN_SEQUENCE)
5529     {
5530         DWORD len;
5531
5532         if ((ret = CRYPT_GetLengthIndefinite(pPFX->pbData, pPFX->cbData, &len)))
5533         {
5534             BYTE lenLen = GET_LEN_BYTES(pPFX->pbData[1]);
5535
5536             /* Need at least three bytes for the integer version */
5537             if (pPFX->cbData < 1 + lenLen + 3)
5538                 ret = FALSE;
5539             else if (pPFX->pbData[1 + lenLen] != ASN_INTEGER || /* Tag */
5540              pPFX->pbData[1 + lenLen + 1] != 1 ||          /* Definite length */
5541              pPFX->pbData[1 + lenLen + 2] != 3)            /* PFX version */
5542                 ret = FALSE;
5543         }
5544     }
5545     else
5546         ret = FALSE;
5547     return ret;
5548 }
5549
5550 HCERTSTORE WINAPI PFXImportCertStore(CRYPT_DATA_BLOB *pPFX, LPCWSTR szPassword,
5551  DWORD dwFlags)
5552 {
5553     FIXME_(crypt)("(%p, %p, %08x): stub\n", pPFX, szPassword, dwFlags);
5554     return NULL;
5555 }