2 * Copyright 2002 Mike McCormack for CodeWeavers
3 * Copyright 2005 Juan Lang
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19 * This file implements ASN.1 DER encoding and decoding of a limited set of
20 * types. It isn't a full ASN.1 implementation. Microsoft implements BER
21 * encoding of many of the basic types in msasn1.dll, but that interface is
22 * undocumented, so I implement them here.
25 * "A Layman's Guide to a Subset of ASN.1, BER, and DER", by Burton Kaliski
26 * (available online, look for a PDF copy as the HTML versions tend to have
27 * translation errors.)
29 * RFC3280, http://www.faqs.org/rfcs/rfc3280.html
32 * http://msdn.microsoft.com/library/en-us/seccrypto/security/constants_for_cryptencodeobject_and_cryptdecodeobject.asp
39 #define NONAMELESSUNION
47 #include "wine/debug.h"
48 #include "wine/exception.h"
50 /* This is a bit arbitrary, but to set some limit: */
51 #define MAX_ENCODED_LEN 0x02000000
53 /* a few asn.1 tags we need */
54 #define ASN_BOOL (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x01)
55 #define ASN_BITSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x03)
56 #define ASN_OCTETSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x04)
57 #define ASN_ENUMERATED (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x0a)
58 #define ASN_SETOF (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x11)
59 #define ASN_NUMERICSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x12)
60 #define ASN_PRINTABLESTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x13)
61 #define ASN_IA5STRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x16)
62 #define ASN_UTCTIME (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x17)
63 #define ASN_GENERALTIME (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x18)
65 #define ASN_FLAGS_MASK 0xf0
66 #define ASN_TYPE_MASK 0x0f
68 WINE_DEFAULT_DEBUG_CHANNEL(crypt);
70 static const WCHAR szDllName[] = { 'D','l','l',0 };
72 typedef BOOL (WINAPI *CryptEncodeObjectFunc)(DWORD, LPCSTR, const void *,
74 typedef BOOL (WINAPI *CryptEncodeObjectExFunc)(DWORD, LPCSTR, const void *,
75 DWORD, PCRYPT_ENCODE_PARA, BYTE *, DWORD *);
76 typedef BOOL (WINAPI *CryptDecodeObjectFunc)(DWORD, LPCSTR, const BYTE *,
77 DWORD, DWORD, void *, DWORD *);
78 typedef BOOL (WINAPI *CryptDecodeObjectExFunc)(DWORD, LPCSTR, const BYTE *,
79 DWORD, DWORD, PCRYPT_DECODE_PARA, void *, DWORD *);
81 /* Prototypes for built-in encoders/decoders. They follow the Ex style
82 * prototypes. The dwCertEncodingType and lpszStructType are ignored by the
83 * built-in functions, but the parameters are retained to simplify
84 * CryptEncodeObjectEx/CryptDecodeObjectEx, since they must call functions in
85 * external DLLs that follow these signatures.
86 * FIXME: some built-in functions are suitable to be called directly by
87 * CryptEncodeObjectEx/CryptDecodeObjectEx (they implement exception handling
88 * and memory allocation if requested), others are only suitable to be called
89 * internally. Comment which are which.
91 static BOOL WINAPI CRYPT_AsnEncodeOid(DWORD dwCertEncodingType,
92 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
93 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
94 static BOOL WINAPI CRYPT_AsnEncodeExtensions(DWORD dwCertEncodingType,
95 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
96 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
97 static BOOL WINAPI CRYPT_AsnEncodeBool(DWORD dwCertEncodingType,
98 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
99 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
100 static BOOL WINAPI CRYPT_AsnEncodePubKeyInfo(DWORD dwCertEncodingType,
101 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
102 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
103 static BOOL WINAPI CRYPT_AsnEncodeOctets(DWORD dwCertEncodingType,
104 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
105 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
106 static BOOL WINAPI CRYPT_AsnEncodeBits(DWORD dwCertEncodingType,
107 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
108 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
109 static BOOL WINAPI CRYPT_AsnEncodeBitsSwapBytes(DWORD dwCertEncodingType,
110 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
111 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
112 static BOOL WINAPI CRYPT_AsnEncodeInt(DWORD dwCertEncodingType,
113 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
114 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
115 static BOOL WINAPI CRYPT_AsnEncodeInteger(DWORD dwCertEncodingType,
116 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
117 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
118 static BOOL WINAPI CRYPT_AsnEncodeChoiceOfTime(DWORD dwCertEncodingType,
119 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
120 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
122 static BOOL WINAPI CRYPT_AsnDecodeChoiceOfTime(DWORD dwCertEncodingType,
123 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
124 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
125 static BOOL WINAPI CRYPT_AsnDecodePubKeyInfo(DWORD dwCertEncodingType,
126 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
127 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
128 /* Like CRYPT_AsnDecodeExtensions, except assumes rgExtension is set ahead of
129 * time, doesn't do memory allocation, and doesn't do exception handling.
130 * (This isn't intended to be the externally-called one.)
132 static BOOL WINAPI CRYPT_AsnDecodeExtensionsInternal(DWORD dwCertEncodingType,
133 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
134 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
135 static BOOL WINAPI CRYPT_AsnDecodeOid(const BYTE *pbEncoded, DWORD cbEncoded,
136 DWORD dwFlags, LPSTR pszObjId, DWORD *pcbObjId);
137 /* Assumes algo->Parameters.pbData is set ahead of time */
138 static BOOL WINAPI CRYPT_AsnDecodeAlgorithmId(DWORD dwCertEncodingType,
139 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
140 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
141 static BOOL WINAPI CRYPT_AsnDecodeBool(DWORD dwCertEncodingType,
142 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
143 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
144 /* Assumes the CRYPT_DATA_BLOB's pbData member has been initialized */
145 static BOOL WINAPI CRYPT_AsnDecodeOctetsInternal(DWORD dwCertEncodingType,
146 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
147 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
148 /* Like CRYPT_AsnDecodeBits, but assumes the CRYPT_INTEGER_BLOB's pbData
149 * member has been initialized, doesn't do exception handling, and doesn't do
152 static BOOL WINAPI CRYPT_AsnDecodeBitsInternal(DWORD dwCertEncodingType,
153 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
154 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
155 static BOOL WINAPI CRYPT_AsnDecodeBits(DWORD dwCertEncodingType,
156 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
157 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
158 static BOOL WINAPI CRYPT_AsnDecodeInt(DWORD dwCertEncodingType,
159 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
160 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
161 /* Like CRYPT_AsnDecodeInteger, but assumes the CRYPT_INTEGER_BLOB's pbData
162 * member has been initialized, doesn't do exception handling, and doesn't do
165 static BOOL WINAPI CRYPT_AsnDecodeIntegerInternal(DWORD dwCertEncodingType,
166 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
167 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
169 /* filter for page-fault exceptions */
170 static WINE_EXCEPTION_FILTER(page_fault)
172 if (GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION)
173 return EXCEPTION_EXECUTE_HANDLER;
174 return EXCEPTION_CONTINUE_SEARCH;
177 static char *CRYPT_GetKeyName(DWORD dwEncodingType, LPCSTR pszFuncName,
180 static const char szEncodingTypeFmt[] =
181 "Software\\Microsoft\\Cryptography\\OID\\EncodingType %ld\\%s\\%s";
183 char numericOID[7]; /* enough for "#65535" */
187 /* MSDN says the encoding type is a mask, but it isn't treated that way.
188 * (E.g., if dwEncodingType were 3, the key names "EncodingType 1" and
189 * "EncodingType 2" would be expected if it were a mask. Instead native
190 * stores values in "EncodingType 3".
194 snprintf(numericOID, sizeof(numericOID), "#%d", LOWORD(pszOID));
200 /* This is enough: the lengths of the two string parameters are explicitly
201 * counted, and we need up to five additional characters for the encoding
202 * type. These are covered by the "%d", "%s", and "%s" characters in the
203 * format specifier that are removed by sprintf.
205 len = sizeof(szEncodingTypeFmt) + lstrlenA(pszFuncName) + lstrlenA(oid);
206 szKey = HeapAlloc(GetProcessHeap(), 0, len);
208 sprintf(szKey, szEncodingTypeFmt, dwEncodingType, pszFuncName, oid);
212 BOOL WINAPI CryptRegisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
213 LPCSTR pszOID, LPCWSTR pwszDll, LPCSTR pszOverrideFuncName)
219 TRACE("%lx %s %s %s %s\n", dwEncodingType, pszFuncName, pszOID,
220 debugstr_w(pwszDll), pszOverrideFuncName);
222 /* This only registers functions for encoding certs, not messages */
223 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
226 /* Native does nothing pwszDll is NULL */
230 /* I'm not matching MS bug for bug here, because I doubt any app depends on
232 * - native "succeeds" if pszFuncName is NULL, but the nonsensical entry
233 * it creates would never be used
234 * - native returns an HRESULT rather than a Win32 error if pszOID is NULL.
235 * Instead I disallow both of these with ERROR_INVALID_PARAMETER.
237 if (!pszFuncName || !pszOID)
239 SetLastError(ERROR_INVALID_PARAMETER);
243 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
244 TRACE("Key name is %s\n", debugstr_a(szKey));
249 r = RegCreateKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
250 HeapFree(GetProcessHeap(), 0, szKey);
251 if(r != ERROR_SUCCESS)
254 /* write the values */
255 if (pszOverrideFuncName)
256 RegSetValueExA(hKey, "FuncName", 0, REG_SZ, (const BYTE*)pszOverrideFuncName,
257 lstrlenA(pszOverrideFuncName) + 1);
258 RegSetValueExW(hKey, szDllName, 0, REG_SZ, (const BYTE*) pwszDll,
259 (lstrlenW(pwszDll) + 1) * sizeof (WCHAR));
265 BOOL WINAPI CryptUnregisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
271 TRACE("%lx %s %s\n", dwEncodingType, pszFuncName, pszOID);
273 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
276 if (!pszFuncName || !pszOID)
278 SetLastError(ERROR_INVALID_PARAMETER);
282 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
283 rc = RegDeleteKeyA(HKEY_LOCAL_MACHINE, szKey);
284 HeapFree(GetProcessHeap(), 0, szKey);
287 return rc ? FALSE : TRUE;
290 BOOL WINAPI CryptGetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
291 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD *pdwValueType, BYTE *pbValueData,
298 TRACE("%lx %s %s %s %p %p %p\n", dwEncodingType, debugstr_a(pszFuncName),
299 debugstr_a(pszOID), debugstr_w(pwszValueName), pdwValueType, pbValueData,
302 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
305 if (!pszFuncName || !pszOID || !pwszValueName)
307 SetLastError(ERROR_INVALID_PARAMETER);
311 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
312 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
313 HeapFree(GetProcessHeap(), 0, szKey);
318 rc = RegQueryValueExW(hKey, pwszValueName, NULL, pdwValueType,
319 pbValueData, pcbValueData);
324 return rc ? FALSE : TRUE;
327 BOOL WINAPI CryptSetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
328 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD dwValueType,
329 const BYTE *pbValueData, DWORD cbValueData)
335 TRACE("%lx %s %s %s %ld %p %ld\n", dwEncodingType, debugstr_a(pszFuncName),
336 debugstr_a(pszOID), debugstr_w(pwszValueName), dwValueType, pbValueData,
339 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
342 if (!pszFuncName || !pszOID || !pwszValueName)
344 SetLastError(ERROR_INVALID_PARAMETER);
348 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
349 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
350 HeapFree(GetProcessHeap(), 0, szKey);
355 rc = RegSetValueExW(hKey, pwszValueName, 0, dwValueType, pbValueData,
361 return rc ? FALSE : TRUE;
364 /* Gets the registered function named szFuncName for dwCertEncodingType and
365 * lpszStructType, or NULL if one could not be found. *lib will be set to the
366 * handle of the module it's in, or NULL if no module was loaded. If the
367 * return value is NULL, *lib will also be NULL, to simplify error handling.
369 static void *CRYPT_GetFunc(DWORD dwCertEncodingType, LPCSTR lpszStructType,
370 LPCSTR szFuncName, HMODULE *lib)
373 char *szKey = CRYPT_GetKeyName(dwCertEncodingType, szFuncName,
375 const char *funcName;
378 DWORD type, size = 0;
380 TRACE("(%08lx %s %s %p)\n", dwCertEncodingType, debugstr_a(lpszStructType),
381 debugstr_a(szFuncName), lib);
384 r = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
385 HeapFree(GetProcessHeap(), 0, szKey);
386 if(r != ERROR_SUCCESS)
389 RegQueryValueExA(hKey, "FuncName", NULL, &type, NULL, &size);
390 if (GetLastError() == ERROR_MORE_DATA && type == REG_SZ)
392 funcName = HeapAlloc(GetProcessHeap(), 0, size);
393 RegQueryValueExA(hKey, "FuncName", NULL, &type, (LPBYTE)funcName,
397 funcName = szFuncName;
398 RegQueryValueExW(hKey, szDllName, NULL, &type, NULL, &size);
399 if (GetLastError() == ERROR_MORE_DATA && type == REG_SZ)
401 LPWSTR dllName = HeapAlloc(GetProcessHeap(), 0, size);
403 RegQueryValueExW(hKey, szDllName, NULL, &type, (LPBYTE)dllName,
405 *lib = LoadLibraryW(dllName);
408 ret = GetProcAddress(*lib, funcName);
411 /* Unload the library, the caller doesn't want to unload it
412 * when the return value is NULL.
418 HeapFree(GetProcessHeap(), 0, dllName);
420 if (funcName != szFuncName)
421 HeapFree(GetProcessHeap(), 0, (char *)funcName);
422 TRACE("returning %p\n", ret);
426 BOOL WINAPI CryptEncodeObject(DWORD dwCertEncodingType, LPCSTR lpszStructType,
427 const void *pvStructInfo, BYTE *pbEncoded, DWORD *pcbEncoded)
431 CryptEncodeObjectFunc pCryptEncodeObject;
433 TRACE("(0x%08lx, %s, %p, %p, %p)\n", dwCertEncodingType,
434 debugstr_a(lpszStructType), pvStructInfo, pbEncoded,
437 if (!pbEncoded && !pcbEncoded)
439 SetLastError(ERROR_INVALID_PARAMETER);
443 /* Try registered DLL first.. */
445 (CryptEncodeObjectFunc)CRYPT_GetFunc(dwCertEncodingType,
446 lpszStructType, "CryptEncodeObject", &lib);
447 if (pCryptEncodeObject)
449 ret = pCryptEncodeObject(dwCertEncodingType, lpszStructType,
450 pvStructInfo, pbEncoded, pcbEncoded);
455 /* If not, use CryptEncodeObjectEx */
456 ret = CryptEncodeObjectEx(dwCertEncodingType, lpszStructType,
457 pvStructInfo, 0, NULL, pbEncoded, pcbEncoded);
462 /* Helper function to check *pcbEncoded, set it to the required size, and
463 * optionally to allocate memory. Assumes pbEncoded is not NULL.
464 * If CRYPT_ENCODE_ALLOC_FLAG is set in dwFlags, *pbEncoded will be set to a
465 * pointer to the newly allocated memory.
467 static BOOL CRYPT_EncodeEnsureSpace(DWORD dwFlags,
468 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded,
473 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
475 if (pEncodePara && pEncodePara->pfnAlloc)
476 *(BYTE **)pbEncoded = pEncodePara->pfnAlloc(bytesNeeded);
478 *(BYTE **)pbEncoded = LocalAlloc(0, bytesNeeded);
479 if (!*(BYTE **)pbEncoded)
482 *pcbEncoded = bytesNeeded;
484 else if (bytesNeeded > *pcbEncoded)
486 *pcbEncoded = bytesNeeded;
487 SetLastError(ERROR_MORE_DATA);
493 static BOOL CRYPT_EncodeLen(DWORD len, BYTE *pbEncoded, DWORD *pcbEncoded)
495 DWORD bytesNeeded, significantBytes = 0;
503 for (temp = len, significantBytes = sizeof(temp); !(temp & 0xff000000);
504 temp <<= 8, significantBytes--)
506 bytesNeeded = significantBytes + 1;
510 *pcbEncoded = bytesNeeded;
513 if (*pcbEncoded < bytesNeeded)
515 SetLastError(ERROR_MORE_DATA);
519 *pbEncoded = (BYTE)len;
524 *pbEncoded++ = significantBytes | 0x80;
525 for (i = 0; i < significantBytes; i++)
527 *(pbEncoded + significantBytes - i - 1) = (BYTE)(len & 0xff);
531 *pcbEncoded = bytesNeeded;
535 struct AsnEncodeSequenceItem
537 const void *pvStructInfo;
538 CryptEncodeObjectExFunc encodeFunc;
539 DWORD size; /* used during encoding, not for your use */
542 static BOOL WINAPI CRYPT_AsnEncodeSequence(DWORD dwCertEncodingType,
543 struct AsnEncodeSequenceItem items[], DWORD cItem, DWORD dwFlags,
544 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
547 DWORD i, dataLen = 0;
549 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", items, cItem, dwFlags, pEncodePara,
550 pbEncoded, *pcbEncoded);
551 for (i = 0, ret = TRUE; ret && i < cItem; i++)
553 ret = items[i].encodeFunc(dwCertEncodingType, NULL,
554 items[i].pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL,
555 NULL, &items[i].size);
556 dataLen += items[i].size;
560 DWORD lenBytes, bytesNeeded;
562 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
563 bytesNeeded = 1 + lenBytes + dataLen;
565 *pcbEncoded = bytesNeeded;
568 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
569 pcbEncoded, bytesNeeded)))
571 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
572 pbEncoded = *(BYTE **)pbEncoded;
573 *pbEncoded++ = ASN_SEQUENCE;
574 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
575 pbEncoded += lenBytes;
576 for (i = 0; ret && i < cItem; i++)
578 ret = items[i].encodeFunc(dwCertEncodingType, NULL,
579 items[i].pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG,
580 NULL, pbEncoded, &items[i].size);
581 pbEncoded += items[i].size;
586 TRACE("returning %d (%08lx)\n", ret, GetLastError());
590 struct AsnConstructedItem
593 const void *pvStructInfo;
594 CryptEncodeObjectExFunc encodeFunc;
597 static BOOL WINAPI CRYPT_AsnEncodeConstructed(DWORD dwCertEncodingType,
598 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
599 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
602 const struct AsnConstructedItem *item =
603 (const struct AsnConstructedItem *)pvStructInfo;
606 if ((ret = item->encodeFunc(dwCertEncodingType, lpszStructType,
607 item->pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, NULL, &len)))
609 DWORD dataLen, bytesNeeded;
611 CRYPT_EncodeLen(len, NULL, &dataLen);
612 bytesNeeded = 1 + dataLen + len;
614 *pcbEncoded = bytesNeeded;
615 else if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
616 pbEncoded, pcbEncoded, bytesNeeded)))
618 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
619 pbEncoded = *(BYTE **)pbEncoded;
620 *pbEncoded++ = ASN_CONTEXT | ASN_CONSTRUCTOR | item->tag;
621 CRYPT_EncodeLen(len, pbEncoded, &dataLen);
622 pbEncoded += dataLen;
623 ret = item->encodeFunc(dwCertEncodingType, lpszStructType,
624 item->pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL,
631 static BOOL WINAPI CRYPT_AsnEncodeCertVersion(DWORD dwCertEncodingType,
632 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
633 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
635 const DWORD *ver = (const DWORD *)pvStructInfo;
638 /* CERT_V1 is not encoded */
646 struct AsnConstructedItem item = { 0, ver, CRYPT_AsnEncodeInt };
648 ret = CRYPT_AsnEncodeConstructed(dwCertEncodingType, X509_INTEGER,
649 &item, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
654 static BOOL WINAPI CRYPT_CopyEncodedBlob(DWORD dwCertEncodingType,
655 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
656 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
658 const CRYPT_DER_BLOB *blob = (const CRYPT_DER_BLOB *)pvStructInfo;
663 *pcbEncoded = blob->cbData;
666 else if (*pcbEncoded < blob->cbData)
668 *pcbEncoded = blob->cbData;
669 SetLastError(ERROR_MORE_DATA);
675 memcpy(pbEncoded, blob->pbData, blob->cbData);
676 *pcbEncoded = blob->cbData;
682 static BOOL WINAPI CRYPT_AsnEncodeValidity(DWORD dwCertEncodingType,
683 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
684 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
687 /* This has two filetimes in a row, a NotBefore and a NotAfter */
688 const FILETIME *timePtr = (const FILETIME *)pvStructInfo;
689 struct AsnEncodeSequenceItem items[] = {
690 { timePtr++, CRYPT_AsnEncodeChoiceOfTime, 0 },
691 { timePtr, CRYPT_AsnEncodeChoiceOfTime, 0 },
694 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
695 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
700 static BOOL WINAPI CRYPT_AsnEncodeAlgorithmId(
701 DWORD dwCertEncodingType, LPCSTR lpszStructType, const void *pvStructInfo,
702 DWORD dwFlags, PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded,
705 const CRYPT_ALGORITHM_IDENTIFIER *algo =
706 (const CRYPT_ALGORITHM_IDENTIFIER *)pvStructInfo;
708 struct AsnEncodeSequenceItem items[] = {
709 { algo->pszObjId, CRYPT_AsnEncodeOid, 0 },
710 { &algo->Parameters, CRYPT_CopyEncodedBlob, 0 },
713 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
714 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
719 static BOOL WINAPI CRYPT_AsnEncodePubKeyInfo(DWORD dwCertEncodingType,
720 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
721 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
727 const CERT_PUBLIC_KEY_INFO *info =
728 (const CERT_PUBLIC_KEY_INFO *)pvStructInfo;
729 struct AsnEncodeSequenceItem items[] = {
730 { &info->Algorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
731 { &info->PublicKey, CRYPT_AsnEncodeBits, 0 },
734 TRACE("Encoding public key with OID %s\n",
735 debugstr_a(info->Algorithm.pszObjId));
736 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
737 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
742 SetLastError(STATUS_ACCESS_VIOLATION);
749 static BOOL WINAPI CRYPT_AsnEncodeCert(DWORD dwCertEncodingType,
750 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
751 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
757 const CERT_SIGNED_CONTENT_INFO *info =
758 (const CERT_SIGNED_CONTENT_INFO *)pvStructInfo;
759 struct AsnEncodeSequenceItem items[] = {
760 { &info->ToBeSigned, CRYPT_CopyEncodedBlob, 0 },
761 { &info->SignatureAlgorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
762 { &info->Signature, CRYPT_AsnEncodeBitsSwapBytes, 0 },
765 if (dwFlags & CRYPT_ENCODE_NO_SIGNATURE_BYTE_REVERSAL_FLAG)
766 items[2].encodeFunc = CRYPT_AsnEncodeBits;
767 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
768 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
773 SetLastError(STATUS_ACCESS_VIOLATION);
780 /* Like in Windows, this blithely ignores the validity of the passed-in
781 * CERT_INFO, and just encodes it as-is. The resulting encoded data may not
782 * decode properly, see CRYPT_AsnDecodeCertInfo.
784 static BOOL WINAPI CRYPT_AsnEncodeCertInfo(DWORD dwCertEncodingType,
785 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
786 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
792 const CERT_INFO *info = (const CERT_INFO *)pvStructInfo;
793 struct AsnEncodeSequenceItem items[10] = {
794 { &info->dwVersion, CRYPT_AsnEncodeCertVersion, 0 },
795 { &info->SerialNumber, CRYPT_AsnEncodeInteger, 0 },
796 { &info->SignatureAlgorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
797 { &info->Issuer, CRYPT_CopyEncodedBlob, 0 },
798 { &info->NotBefore, CRYPT_AsnEncodeValidity, 0 },
799 { &info->Subject, CRYPT_CopyEncodedBlob, 0 },
800 { &info->SubjectPublicKeyInfo, CRYPT_AsnEncodePubKeyInfo, 0 },
803 struct AsnConstructedItem constructed[3] = { { 0 } };
804 DWORD cItem = 7, cConstructed = 0;
806 if (info->IssuerUniqueId.cbData)
808 constructed[cConstructed].tag = 1;
809 constructed[cConstructed].pvStructInfo = &info->IssuerUniqueId;
810 constructed[cConstructed].encodeFunc = CRYPT_AsnEncodeBits;
811 items[cItem].pvStructInfo = &constructed[cConstructed];
812 items[cItem].encodeFunc = CRYPT_AsnEncodeConstructed;
816 if (info->SubjectUniqueId.cbData)
818 constructed[cConstructed].tag = 2;
819 constructed[cConstructed].pvStructInfo = &info->SubjectUniqueId;
820 constructed[cConstructed].encodeFunc = CRYPT_AsnEncodeBits;
821 items[cItem].pvStructInfo = &constructed[cConstructed];
822 items[cItem].encodeFunc = CRYPT_AsnEncodeConstructed;
826 if (info->cExtension)
828 constructed[cConstructed].tag = 3;
829 constructed[cConstructed].pvStructInfo = &info->cExtension;
830 constructed[cConstructed].encodeFunc = CRYPT_AsnEncodeExtensions;
831 items[cItem].pvStructInfo = &constructed[cConstructed];
832 items[cItem].encodeFunc = CRYPT_AsnEncodeConstructed;
837 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items, cItem,
838 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
842 SetLastError(STATUS_ACCESS_VIOLATION);
849 static BOOL WINAPI CRYPT_AsnEncodeCRLEntry(const CRL_ENTRY *entry,
850 BYTE *pbEncoded, DWORD *pcbEncoded)
852 struct AsnEncodeSequenceItem items[3] = {
853 { &entry->SerialNumber, CRYPT_AsnEncodeInteger, 0 },
854 { &entry->RevocationDate, CRYPT_AsnEncodeChoiceOfTime, 0 },
860 TRACE("%p, %p, %p\n", entry, pbEncoded, pcbEncoded);
862 if (entry->cExtension)
864 items[cItem].pvStructInfo = &entry->cExtension;
865 items[cItem].encodeFunc = CRYPT_AsnEncodeExtensions;
869 ret = CRYPT_AsnEncodeSequence(X509_ASN_ENCODING, items, cItem, 0, NULL,
870 pbEncoded, pcbEncoded);
872 TRACE("returning %d (%08lx)\n", ret, GetLastError());
876 static BOOL WINAPI CRYPT_AsnEncodeCRLEntries(DWORD dwCertEncodingType,
877 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
878 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
880 DWORD cCRLEntry = *(const DWORD *)pvStructInfo;
881 DWORD bytesNeeded, dataLen, lenBytes, i;
882 const CRL_ENTRY *rgCRLEntry = *(const CRL_ENTRY **)
883 ((const BYTE *)pvStructInfo + sizeof(DWORD));
886 for (i = 0, dataLen = 0; ret && i < cCRLEntry; i++)
890 ret = CRYPT_AsnEncodeCRLEntry(&rgCRLEntry[i], NULL, &size);
894 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
895 bytesNeeded = 1 + lenBytes + dataLen;
897 *pcbEncoded = bytesNeeded;
900 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
901 pcbEncoded, bytesNeeded)))
903 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
904 pbEncoded = *(BYTE **)pbEncoded;
905 *pbEncoded++ = ASN_SEQUENCEOF;
906 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
907 pbEncoded += lenBytes;
908 for (i = 0; i < cCRLEntry; i++)
910 DWORD size = dataLen;
912 ret = CRYPT_AsnEncodeCRLEntry(&rgCRLEntry[i], pbEncoded, &size);
921 static BOOL WINAPI CRYPT_AsnEncodeCRLVersion(DWORD dwCertEncodingType,
922 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
923 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
925 const DWORD *ver = (const DWORD *)pvStructInfo;
928 /* CRL_V1 is not encoded */
935 ret = CRYPT_AsnEncodeInt(dwCertEncodingType, X509_INTEGER, ver,
936 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
940 /* Like in Windows, this blithely ignores the validity of the passed-in
941 * CRL_INFO, and just encodes it as-is. The resulting encoded data may not
942 * decode properly, see CRYPT_AsnDecodeCRLInfo.
944 static BOOL WINAPI CRYPT_AsnEncodeCRLInfo(DWORD dwCertEncodingType,
945 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
946 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
952 const CRL_INFO *info = (const CRL_INFO *)pvStructInfo;
953 struct AsnEncodeSequenceItem items[7] = {
954 { &info->dwVersion, CRYPT_AsnEncodeCRLVersion, 0 },
955 { &info->SignatureAlgorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
956 { &info->Issuer, CRYPT_CopyEncodedBlob, 0 },
957 { &info->ThisUpdate, CRYPT_AsnEncodeChoiceOfTime, 0 },
962 if (info->NextUpdate.dwLowDateTime || info->NextUpdate.dwHighDateTime)
964 items[cItem].pvStructInfo = &info->NextUpdate;
965 items[cItem].encodeFunc = CRYPT_AsnEncodeChoiceOfTime;
970 items[cItem].pvStructInfo = &info->cCRLEntry;
971 items[cItem].encodeFunc = CRYPT_AsnEncodeCRLEntries;
974 if (info->cExtension)
976 items[cItem].pvStructInfo = &info->cExtension;
977 items[cItem].encodeFunc = CRYPT_AsnEncodeExtensions;
981 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items, cItem,
982 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
986 SetLastError(STATUS_ACCESS_VIOLATION);
993 static BOOL CRYPT_AsnEncodeExtension(CERT_EXTENSION *ext, BYTE *pbEncoded,
997 struct AsnEncodeSequenceItem items[3] = {
998 { ext->pszObjId, CRYPT_AsnEncodeOid, 0 },
1004 TRACE("%p, %p, %ld\n", ext, pbEncoded, *pcbEncoded);
1008 items[cItem].pvStructInfo = &ext->fCritical;
1009 items[cItem].encodeFunc = CRYPT_AsnEncodeBool;
1012 items[cItem].pvStructInfo = &ext->Value;
1013 items[cItem].encodeFunc = CRYPT_AsnEncodeOctets;
1016 ret = CRYPT_AsnEncodeSequence(X509_ASN_ENCODING, items, cItem, 0, NULL,
1017 pbEncoded, pcbEncoded);
1018 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1022 static BOOL WINAPI CRYPT_AsnEncodeExtensions(DWORD dwCertEncodingType,
1023 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1024 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1030 DWORD bytesNeeded, dataLen, lenBytes, i;
1031 const CERT_EXTENSIONS *exts = (const CERT_EXTENSIONS *)pvStructInfo;
1034 for (i = 0, dataLen = 0; ret && i < exts->cExtension; i++)
1038 ret = CRYPT_AsnEncodeExtension(&exts->rgExtension[i], NULL, &size);
1042 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
1043 bytesNeeded = 1 + lenBytes + dataLen;
1045 *pcbEncoded = bytesNeeded;
1048 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1049 pcbEncoded, bytesNeeded)))
1051 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1052 pbEncoded = *(BYTE **)pbEncoded;
1053 *pbEncoded++ = ASN_SEQUENCEOF;
1054 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
1055 pbEncoded += lenBytes;
1056 for (i = 0; i < exts->cExtension; i++)
1058 DWORD size = dataLen;
1060 ret = CRYPT_AsnEncodeExtension(&exts->rgExtension[i],
1068 __EXCEPT(page_fault)
1070 SetLastError(STATUS_ACCESS_VIOLATION);
1077 static BOOL WINAPI CRYPT_AsnEncodeOid(DWORD dwCertEncodingType,
1078 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1079 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1081 LPCSTR pszObjId = (LPCSTR)pvStructInfo;
1082 DWORD bytesNeeded = 0, lenBytes;
1087 TRACE("%s\n", debugstr_a(pszObjId));
1094 if (sscanf(pszObjId, "%d.%d.%n", &val1, &val2, &firstPos) != 2)
1096 SetLastError(CRYPT_E_ASN1_ERROR);
1100 firstByte = val1 * 40 + val2;
1101 ptr = pszObjId + firstPos;
1106 /* note I assume each component is at most 32-bits long in base 2 */
1107 if (sscanf(ptr, "%d%n", &val1, &pos) == 1)
1109 if (val1 >= 0x10000000)
1111 else if (val1 >= 0x200000)
1113 else if (val1 >= 0x4000)
1115 else if (val1 >= 0x80)
1125 SetLastError(CRYPT_E_ASN1_ERROR);
1129 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1133 bytesNeeded += 1 + lenBytes;
1136 if (*pcbEncoded < bytesNeeded)
1138 SetLastError(ERROR_MORE_DATA);
1143 *pbEncoded++ = ASN_OBJECTIDENTIFIER;
1144 CRYPT_EncodeLen(bytesNeeded - 1 - lenBytes, pbEncoded, &lenBytes);
1145 pbEncoded += lenBytes;
1151 *pbEncoded++ = firstByte;
1152 ptr = pszObjId + firstPos;
1155 sscanf(ptr, "%d%n", &val, &pos);
1157 unsigned char outBytes[5];
1160 if (val >= 0x10000000)
1162 else if (val >= 0x200000)
1164 else if (val >= 0x4000)
1166 else if (val >= 0x80)
1170 for (i = numBytes; i > 0; i--)
1172 outBytes[i - 1] = val & 0x7f;
1175 for (i = 0; i < numBytes - 1; i++)
1176 *pbEncoded++ = outBytes[i] | 0x80;
1177 *pbEncoded++ = outBytes[i];
1186 *pcbEncoded = bytesNeeded;
1190 static BOOL WINAPI CRYPT_AsnEncodeNameValue(DWORD dwCertEncodingType,
1191 CERT_NAME_VALUE *value, BYTE *pbEncoded, DWORD *pcbEncoded)
1194 DWORD bytesNeeded, lenBytes, encodedLen;
1197 switch (value->dwValueType)
1199 case CERT_RDN_NUMERIC_STRING:
1200 tag = ASN_NUMERICSTRING;
1201 encodedLen = value->Value.cbData;
1203 case CERT_RDN_PRINTABLE_STRING:
1204 tag = ASN_PRINTABLESTRING;
1205 encodedLen = value->Value.cbData;
1207 case CERT_RDN_IA5_STRING:
1208 tag = ASN_IA5STRING;
1209 encodedLen = value->Value.cbData;
1211 case CERT_RDN_ANY_TYPE:
1212 /* explicitly disallowed */
1213 SetLastError(HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER));
1216 FIXME("String type %ld unimplemented\n", value->dwValueType);
1219 CRYPT_EncodeLen(encodedLen, NULL, &lenBytes);
1220 bytesNeeded = 1 + lenBytes + encodedLen;
1223 if (*pcbEncoded < bytesNeeded)
1225 SetLastError(ERROR_MORE_DATA);
1231 CRYPT_EncodeLen(encodedLen, pbEncoded, &lenBytes);
1232 pbEncoded += lenBytes;
1233 switch (value->dwValueType)
1235 case CERT_RDN_NUMERIC_STRING:
1236 case CERT_RDN_PRINTABLE_STRING:
1237 case CERT_RDN_IA5_STRING:
1238 memcpy(pbEncoded, value->Value.pbData, value->Value.cbData);
1242 *pcbEncoded = bytesNeeded;
1246 static BOOL WINAPI CRYPT_AsnEncodeRdnAttr(DWORD dwCertEncodingType,
1247 CERT_RDN_ATTR *attr, BYTE *pbEncoded, DWORD *pcbEncoded)
1249 DWORD bytesNeeded = 0, lenBytes, size;
1252 ret = CRYPT_AsnEncodeOid(dwCertEncodingType, NULL, attr->pszObjId,
1253 0, NULL, NULL, &size);
1256 bytesNeeded += size;
1257 /* hack: a CERT_RDN_ATTR is identical to a CERT_NAME_VALUE beginning
1258 * with dwValueType, so "cast" it to get its encoded size
1260 ret = CRYPT_AsnEncodeNameValue(dwCertEncodingType,
1261 (CERT_NAME_VALUE *)&attr->dwValueType, NULL, &size);
1264 bytesNeeded += size;
1265 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1266 bytesNeeded += 1 + lenBytes;
1269 if (*pcbEncoded < bytesNeeded)
1271 SetLastError(ERROR_MORE_DATA);
1276 *pbEncoded++ = ASN_CONSTRUCTOR | ASN_SEQUENCE;
1277 CRYPT_EncodeLen(bytesNeeded - lenBytes - 1, pbEncoded,
1279 pbEncoded += lenBytes;
1280 size = bytesNeeded - 1 - lenBytes;
1281 ret = CRYPT_AsnEncodeOid(dwCertEncodingType, NULL,
1282 attr->pszObjId, 0, NULL, pbEncoded, &size);
1286 size = bytesNeeded - 1 - lenBytes - size;
1287 ret = CRYPT_AsnEncodeNameValue(dwCertEncodingType,
1288 (CERT_NAME_VALUE *)&attr->dwValueType, pbEncoded,
1293 *pcbEncoded = bytesNeeded;
1299 static int BLOBComp(const void *l, const void *r)
1301 CRYPT_DER_BLOB *a = (CRYPT_DER_BLOB *)l, *b = (CRYPT_DER_BLOB *)r;
1304 if (!(ret = memcmp(a->pbData, b->pbData, min(a->cbData, b->cbData))))
1305 ret = a->cbData - b->cbData;
1309 /* This encodes as a SET OF, which in DER must be lexicographically sorted.
1311 static BOOL WINAPI CRYPT_AsnEncodeRdn(DWORD dwCertEncodingType, CERT_RDN *rdn,
1312 BYTE *pbEncoded, DWORD *pcbEncoded)
1315 CRYPT_DER_BLOB *blobs = NULL;
1319 DWORD bytesNeeded = 0, lenBytes, i;
1325 blobs = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY,
1326 rdn->cRDNAttr * sizeof(CRYPT_DER_BLOB));
1330 for (i = 0; ret && i < rdn->cRDNAttr; i++)
1332 ret = CRYPT_AsnEncodeRdnAttr(dwCertEncodingType, &rdn->rgRDNAttr[i],
1333 NULL, &blobs[i].cbData);
1335 bytesNeeded += blobs[i].cbData;
1339 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1340 bytesNeeded += 1 + lenBytes;
1343 if (*pcbEncoded < bytesNeeded)
1345 SetLastError(ERROR_MORE_DATA);
1350 for (i = 0; ret && i < rdn->cRDNAttr; i++)
1352 blobs[i].pbData = HeapAlloc(GetProcessHeap(), 0,
1354 if (!blobs[i].pbData)
1357 ret = CRYPT_AsnEncodeRdnAttr(dwCertEncodingType,
1358 &rdn->rgRDNAttr[i], blobs[i].pbData,
1363 qsort(blobs, rdn->cRDNAttr, sizeof(CRYPT_DER_BLOB),
1365 *pbEncoded++ = ASN_CONSTRUCTOR | ASN_SETOF;
1366 CRYPT_EncodeLen(bytesNeeded - lenBytes - 1, pbEncoded,
1368 pbEncoded += lenBytes;
1369 for (i = 0; ret && i < rdn->cRDNAttr; i++)
1371 memcpy(pbEncoded, blobs[i].pbData, blobs[i].cbData);
1372 pbEncoded += blobs[i].cbData;
1377 *pcbEncoded = bytesNeeded;
1381 for (i = 0; i < rdn->cRDNAttr; i++)
1382 HeapFree(GetProcessHeap(), 0, blobs[i].pbData);
1385 __EXCEPT(page_fault)
1387 SetLastError(STATUS_ACCESS_VIOLATION);
1391 HeapFree(GetProcessHeap(), 0, blobs);
1395 static BOOL WINAPI CRYPT_AsnEncodeName(DWORD dwCertEncodingType,
1396 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1397 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1403 const CERT_NAME_INFO *info = (const CERT_NAME_INFO *)pvStructInfo;
1404 DWORD bytesNeeded = 0, lenBytes, size, i;
1406 TRACE("encoding name with %ld RDNs\n", info->cRDN);
1408 for (i = 0; ret && i < info->cRDN; i++)
1410 ret = CRYPT_AsnEncodeRdn(dwCertEncodingType, &info->rgRDN[i], NULL,
1413 bytesNeeded += size;
1415 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1416 bytesNeeded += 1 + lenBytes;
1420 *pcbEncoded = bytesNeeded;
1423 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
1424 pbEncoded, pcbEncoded, bytesNeeded)))
1426 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1427 pbEncoded = *(BYTE **)pbEncoded;
1428 *pbEncoded++ = ASN_SEQUENCEOF;
1429 CRYPT_EncodeLen(bytesNeeded - lenBytes - 1, pbEncoded,
1431 pbEncoded += lenBytes;
1432 for (i = 0; ret && i < info->cRDN; i++)
1435 ret = CRYPT_AsnEncodeRdn(dwCertEncodingType,
1436 &info->rgRDN[i], pbEncoded, &size);
1440 bytesNeeded -= size;
1447 __EXCEPT(page_fault)
1449 SetLastError(STATUS_ACCESS_VIOLATION);
1456 static BOOL WINAPI CRYPT_AsnEncodeBool(DWORD dwCertEncodingType,
1457 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1458 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1460 BOOL val = *(const BOOL *)pvStructInfo, ret;
1469 else if (*pcbEncoded < 3)
1472 SetLastError(ERROR_MORE_DATA);
1478 *pbEncoded++ = ASN_BOOL;
1480 *pbEncoded++ = val ? 0xff : 0;
1483 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1487 static BOOL CRYPT_AsnEncodeAltNameEntry(const CERT_ALT_NAME_ENTRY *entry,
1488 BYTE *pbEncoded, DWORD *pcbEncoded)
1494 switch (entry->dwAltNameChoice)
1496 case CERT_ALT_NAME_RFC822_NAME:
1497 case CERT_ALT_NAME_DNS_NAME:
1498 case CERT_ALT_NAME_URL:
1499 if (entry->u.pwszURL)
1503 /* Not + 1: don't encode the NULL-terminator */
1504 dataLen = lstrlenW(entry->u.pwszURL);
1505 for (i = 0; ret && i < dataLen; i++)
1507 if (entry->u.pwszURL[i] > 0x7f)
1509 SetLastError(CRYPT_E_INVALID_IA5_STRING);
1518 case CERT_ALT_NAME_IP_ADDRESS:
1519 dataLen = entry->u.IPAddress.cbData;
1521 case CERT_ALT_NAME_REGISTERED_ID:
1522 /* FIXME: encode OID */
1523 case CERT_ALT_NAME_OTHER_NAME:
1524 case CERT_ALT_NAME_DIRECTORY_NAME:
1525 FIXME("name type %ld unimplemented\n", entry->dwAltNameChoice);
1528 SetLastError(HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER));
1533 DWORD bytesNeeded, lenBytes;
1535 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
1536 bytesNeeded = 1 + dataLen + lenBytes;
1538 *pcbEncoded = bytesNeeded;
1539 else if (*pcbEncoded < bytesNeeded)
1541 SetLastError(ERROR_MORE_DATA);
1542 *pcbEncoded = bytesNeeded;
1547 *pbEncoded++ = ASN_CONTEXT | (entry->dwAltNameChoice - 1);
1548 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
1549 pbEncoded += lenBytes;
1550 switch (entry->dwAltNameChoice)
1552 case CERT_ALT_NAME_RFC822_NAME:
1553 case CERT_ALT_NAME_DNS_NAME:
1554 case CERT_ALT_NAME_URL:
1558 for (i = 0; i < dataLen; i++)
1559 *pbEncoded++ = (BYTE)entry->u.pwszURL[i];
1562 case CERT_ALT_NAME_IP_ADDRESS:
1563 memcpy(pbEncoded, entry->u.IPAddress.pbData, dataLen);
1567 *pcbEncoded = bytesNeeded;
1570 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1574 static BOOL WINAPI CRYPT_AsnEncodeAltName(DWORD dwCertEncodingType,
1575 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1576 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1582 const CERT_ALT_NAME_INFO *info =
1583 (const CERT_ALT_NAME_INFO *)pvStructInfo;
1585 DWORD bytesNeeded, dataLen, lenBytes, i;
1588 /* FIXME: should check that cAltEntry is not bigger than 0xff, since we
1589 * can't encode an erroneous entry index if it's bigger than this.
1591 for (i = 0, dataLen = 0; ret && i < info->cAltEntry; i++)
1595 ret = CRYPT_AsnEncodeAltNameEntry(&info->rgAltEntry[i], NULL,
1599 else if (GetLastError() == CRYPT_E_INVALID_IA5_STRING)
1601 /* CRYPT_AsnEncodeAltNameEntry encoded the index of
1602 * the bad character, now set the index of the bad
1605 *pcbEncoded = (BYTE)i <<
1606 CERT_ALT_NAME_ENTRY_ERR_INDEX_SHIFT | len;
1611 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
1612 bytesNeeded = 1 + lenBytes + dataLen;
1615 *pcbEncoded = bytesNeeded;
1620 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
1621 pbEncoded, pcbEncoded, bytesNeeded)))
1623 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1624 pbEncoded = *(BYTE **)pbEncoded;
1625 *pbEncoded++ = ASN_SEQUENCEOF;
1626 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
1627 pbEncoded += lenBytes;
1628 for (i = 0; ret && i < info->cAltEntry; i++)
1630 DWORD len = dataLen;
1632 ret = CRYPT_AsnEncodeAltNameEntry(&info->rgAltEntry[i],
1644 __EXCEPT(page_fault)
1646 SetLastError(STATUS_ACCESS_VIOLATION);
1653 static BOOL WINAPI CRYPT_AsnEncodeBasicConstraints2(DWORD dwCertEncodingType,
1654 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1655 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1661 const CERT_BASIC_CONSTRAINTS2_INFO *info =
1662 (const CERT_BASIC_CONSTRAINTS2_INFO *)pvStructInfo;
1663 struct AsnEncodeSequenceItem items[2] = { { 0 } };
1668 items[cItem].pvStructInfo = &info->fCA;
1669 items[cItem].encodeFunc = CRYPT_AsnEncodeBool;
1672 if (info->fPathLenConstraint)
1674 items[cItem].pvStructInfo = &info->dwPathLenConstraint;
1675 items[cItem].encodeFunc = CRYPT_AsnEncodeInt;
1678 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items, cItem,
1679 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
1681 __EXCEPT(page_fault)
1683 SetLastError(STATUS_ACCESS_VIOLATION);
1690 static BOOL WINAPI CRYPT_AsnEncodeRsaPubKey(DWORD dwCertEncodingType,
1691 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1692 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1698 const BLOBHEADER *hdr =
1699 (const BLOBHEADER *)pvStructInfo;
1701 if (hdr->bType != PUBLICKEYBLOB)
1703 SetLastError(HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER));
1708 const RSAPUBKEY *rsaPubKey = (const RSAPUBKEY *)
1709 ((const BYTE *)pvStructInfo + sizeof(BLOBHEADER));
1710 CRYPT_INTEGER_BLOB blob = { rsaPubKey->bitlen / 8,
1711 (BYTE *)pvStructInfo + sizeof(BLOBHEADER) + sizeof(RSAPUBKEY) };
1712 struct AsnEncodeSequenceItem items[] = {
1713 { &blob, CRYPT_AsnEncodeInteger, 0 },
1714 { &rsaPubKey->pubexp, CRYPT_AsnEncodeInt, 0 },
1717 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
1718 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
1722 __EXCEPT(page_fault)
1724 SetLastError(STATUS_ACCESS_VIOLATION);
1731 static BOOL WINAPI CRYPT_AsnEncodeOctets(DWORD dwCertEncodingType,
1732 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1733 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1739 const CRYPT_DATA_BLOB *blob = (const CRYPT_DATA_BLOB *)pvStructInfo;
1740 DWORD bytesNeeded, lenBytes;
1742 TRACE("(%ld, %p), %08lx, %p, %p, %ld\n", blob->cbData, blob->pbData,
1743 dwFlags, pEncodePara, pbEncoded, *pcbEncoded);
1745 CRYPT_EncodeLen(blob->cbData, NULL, &lenBytes);
1746 bytesNeeded = 1 + lenBytes + blob->cbData;
1749 *pcbEncoded = bytesNeeded;
1754 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1755 pcbEncoded, bytesNeeded)))
1757 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1758 pbEncoded = *(BYTE **)pbEncoded;
1759 *pbEncoded++ = ASN_OCTETSTRING;
1760 CRYPT_EncodeLen(blob->cbData, pbEncoded, &lenBytes);
1761 pbEncoded += lenBytes;
1763 memcpy(pbEncoded, blob->pbData, blob->cbData);
1767 __EXCEPT(page_fault)
1769 SetLastError(STATUS_ACCESS_VIOLATION);
1773 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1777 static BOOL WINAPI CRYPT_AsnEncodeBits(DWORD dwCertEncodingType,
1778 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1779 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1785 const CRYPT_BIT_BLOB *blob = (const CRYPT_BIT_BLOB *)pvStructInfo;
1786 DWORD bytesNeeded, lenBytes, dataBytes;
1789 /* yep, MS allows cUnusedBits to be >= 8 */
1790 if (!blob->cUnusedBits)
1792 dataBytes = blob->cbData;
1795 else if (blob->cbData * 8 > blob->cUnusedBits)
1797 dataBytes = (blob->cbData * 8 - blob->cUnusedBits) / 8 + 1;
1798 unusedBits = blob->cUnusedBits >= 8 ? blob->cUnusedBits / 8 :
1806 CRYPT_EncodeLen(dataBytes + 1, NULL, &lenBytes);
1807 bytesNeeded = 1 + lenBytes + dataBytes + 1;
1810 *pcbEncoded = bytesNeeded;
1815 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1816 pcbEncoded, bytesNeeded)))
1818 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1819 pbEncoded = *(BYTE **)pbEncoded;
1820 *pbEncoded++ = ASN_BITSTRING;
1821 CRYPT_EncodeLen(dataBytes + 1, pbEncoded, &lenBytes);
1822 pbEncoded += lenBytes;
1823 *pbEncoded++ = unusedBits;
1826 BYTE mask = 0xff << unusedBits;
1830 memcpy(pbEncoded, blob->pbData, dataBytes - 1);
1831 pbEncoded += dataBytes - 1;
1833 *pbEncoded = *(blob->pbData + dataBytes - 1) & mask;
1838 __EXCEPT(page_fault)
1840 SetLastError(STATUS_ACCESS_VIOLATION);
1847 static BOOL WINAPI CRYPT_AsnEncodeBitsSwapBytes(DWORD dwCertEncodingType,
1848 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1849 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1855 const CRYPT_BIT_BLOB *blob = (const CRYPT_BIT_BLOB *)pvStructInfo;
1856 CRYPT_BIT_BLOB newBlob = { blob->cbData, NULL, blob->cUnusedBits };
1861 newBlob.pbData = HeapAlloc(GetProcessHeap(), 0, newBlob.cbData);
1866 for (i = 0; i < newBlob.cbData; i++)
1867 newBlob.pbData[newBlob.cbData - i - 1] = blob->pbData[i];
1873 ret = CRYPT_AsnEncodeBits(dwCertEncodingType, lpszStructType,
1874 &newBlob, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
1875 HeapFree(GetProcessHeap(), 0, newBlob.pbData);
1877 __EXCEPT(page_fault)
1879 SetLastError(STATUS_ACCESS_VIOLATION);
1886 static BOOL WINAPI CRYPT_AsnEncodeInt(DWORD dwCertEncodingType,
1887 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1888 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1890 CRYPT_INTEGER_BLOB blob = { sizeof(INT), (BYTE *)pvStructInfo };
1892 return CRYPT_AsnEncodeInteger(dwCertEncodingType, X509_MULTI_BYTE_INTEGER,
1893 &blob, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
1896 static BOOL WINAPI CRYPT_AsnEncodeInteger(DWORD dwCertEncodingType,
1897 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1898 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1904 DWORD significantBytes, lenBytes;
1905 BYTE padByte = 0, bytesNeeded;
1907 const CRYPT_INTEGER_BLOB *blob =
1908 (const CRYPT_INTEGER_BLOB *)pvStructInfo;
1910 significantBytes = blob->cbData;
1911 if (significantBytes)
1913 if (blob->pbData[significantBytes - 1] & 0x80)
1915 /* negative, lop off leading (little-endian) 0xffs */
1916 for (; significantBytes > 0 &&
1917 blob->pbData[significantBytes - 1] == 0xff; significantBytes--)
1919 if (blob->pbData[significantBytes - 1] < 0x80)
1927 /* positive, lop off leading (little-endian) zeroes */
1928 for (; significantBytes > 0 &&
1929 !blob->pbData[significantBytes - 1]; significantBytes--)
1931 if (significantBytes == 0)
1932 significantBytes = 1;
1933 if (blob->pbData[significantBytes - 1] > 0x7f)
1941 CRYPT_EncodeLen(significantBytes + 1, NULL, &lenBytes);
1943 CRYPT_EncodeLen(significantBytes, NULL, &lenBytes);
1944 bytesNeeded = 1 + lenBytes + significantBytes;
1949 *pcbEncoded = bytesNeeded;
1954 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1955 pcbEncoded, bytesNeeded)))
1957 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1958 pbEncoded = *(BYTE **)pbEncoded;
1959 *pbEncoded++ = ASN_INTEGER;
1962 CRYPT_EncodeLen(significantBytes + 1, pbEncoded, &lenBytes);
1963 pbEncoded += lenBytes;
1964 *pbEncoded++ = padByte;
1968 CRYPT_EncodeLen(significantBytes, pbEncoded, &lenBytes);
1969 pbEncoded += lenBytes;
1971 for (; significantBytes > 0; significantBytes--)
1972 *(pbEncoded++) = blob->pbData[significantBytes - 1];
1976 __EXCEPT(page_fault)
1978 SetLastError(STATUS_ACCESS_VIOLATION);
1985 static BOOL WINAPI CRYPT_AsnEncodeUnsignedInteger(DWORD dwCertEncodingType,
1986 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1987 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1993 DWORD significantBytes, lenBytes;
1996 const CRYPT_INTEGER_BLOB *blob =
1997 (const CRYPT_INTEGER_BLOB *)pvStructInfo;
1999 significantBytes = blob->cbData;
2000 if (significantBytes)
2002 /* positive, lop off leading (little-endian) zeroes */
2003 for (; significantBytes > 0 && !blob->pbData[significantBytes - 1];
2006 if (significantBytes == 0)
2007 significantBytes = 1;
2008 if (blob->pbData[significantBytes - 1] > 0x7f)
2012 CRYPT_EncodeLen(significantBytes + 1, NULL, &lenBytes);
2014 CRYPT_EncodeLen(significantBytes, NULL, &lenBytes);
2015 bytesNeeded = 1 + lenBytes + significantBytes;
2020 *pcbEncoded = bytesNeeded;
2025 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
2026 pcbEncoded, bytesNeeded)))
2028 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2029 pbEncoded = *(BYTE **)pbEncoded;
2030 *pbEncoded++ = ASN_INTEGER;
2033 CRYPT_EncodeLen(significantBytes + 1, pbEncoded, &lenBytes);
2034 pbEncoded += lenBytes;
2039 CRYPT_EncodeLen(significantBytes, pbEncoded, &lenBytes);
2040 pbEncoded += lenBytes;
2042 for (; significantBytes > 0; significantBytes--)
2043 *(pbEncoded++) = blob->pbData[significantBytes - 1];
2047 __EXCEPT(page_fault)
2049 SetLastError(STATUS_ACCESS_VIOLATION);
2056 static BOOL WINAPI CRYPT_AsnEncodeEnumerated(DWORD dwCertEncodingType,
2057 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2058 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2060 CRYPT_INTEGER_BLOB blob;
2063 /* Encode as an unsigned integer, then change the tag to enumerated */
2064 blob.cbData = sizeof(DWORD);
2065 blob.pbData = (BYTE *)pvStructInfo;
2066 ret = CRYPT_AsnEncodeUnsignedInteger(dwCertEncodingType,
2067 X509_MULTI_BYTE_UINT, &blob, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
2068 if (ret && pbEncoded)
2070 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2071 pbEncoded = *(BYTE **)pbEncoded;
2072 pbEncoded[0] = ASN_ENUMERATED;
2077 static BOOL WINAPI CRYPT_AsnEncodeUtcTime(DWORD dwCertEncodingType,
2078 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2079 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2086 /* sorry, magic number: enough for tag, len, YYMMDDHHMMSSZ\0. I use a
2087 * temporary buffer because the output buffer is not NULL-terminated.
2090 static const DWORD bytesNeeded = sizeof(buf) - 1;
2094 *pcbEncoded = bytesNeeded;
2099 /* Sanity check the year, this is a two-digit year format */
2100 ret = FileTimeToSystemTime((const FILETIME *)pvStructInfo,
2102 if (ret && (sysTime.wYear < 1950 || sysTime.wYear > 2050))
2104 SetLastError(CRYPT_E_BAD_ENCODE);
2109 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
2110 pbEncoded, pcbEncoded, bytesNeeded)))
2112 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2113 pbEncoded = *(BYTE **)pbEncoded;
2114 buf[0] = ASN_UTCTIME;
2115 buf[1] = bytesNeeded - 2;
2116 snprintf(buf + 2, sizeof(buf) - 2,
2117 "%02d%02d%02d%02d%02d%02dZ", sysTime.wYear >= 2000 ?
2118 sysTime.wYear - 2000 : sysTime.wYear - 1900,
2119 sysTime.wDay, sysTime.wMonth, sysTime.wHour,
2120 sysTime.wMinute, sysTime.wSecond);
2121 memcpy(pbEncoded, buf, bytesNeeded);
2126 __EXCEPT(page_fault)
2128 SetLastError(STATUS_ACCESS_VIOLATION);
2135 static BOOL WINAPI CRYPT_AsnEncodeGeneralizedTime(DWORD dwCertEncodingType,
2136 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2137 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2144 /* sorry, magic number: enough for tag, len, YYYYMMDDHHMMSSZ\0. I use a
2145 * temporary buffer because the output buffer is not NULL-terminated.
2148 static const DWORD bytesNeeded = sizeof(buf) - 1;
2152 *pcbEncoded = bytesNeeded;
2157 ret = FileTimeToSystemTime((const FILETIME *)pvStructInfo,
2160 ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
2161 pcbEncoded, bytesNeeded);
2164 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2165 pbEncoded = *(BYTE **)pbEncoded;
2166 buf[0] = ASN_GENERALTIME;
2167 buf[1] = bytesNeeded - 2;
2168 snprintf(buf + 2, sizeof(buf) - 2, "%04d%02d%02d%02d%02d%02dZ",
2169 sysTime.wYear, sysTime.wDay, sysTime.wMonth, sysTime.wHour,
2170 sysTime.wMinute, sysTime.wSecond);
2171 memcpy(pbEncoded, buf, bytesNeeded);
2175 __EXCEPT(page_fault)
2177 SetLastError(STATUS_ACCESS_VIOLATION);
2184 static BOOL WINAPI CRYPT_AsnEncodeChoiceOfTime(DWORD dwCertEncodingType,
2185 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2186 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2194 /* Check the year, if it's in the UTCTime range call that encode func */
2195 if (!FileTimeToSystemTime((const FILETIME *)pvStructInfo, &sysTime))
2197 if (sysTime.wYear >= 1950 && sysTime.wYear <= 2050)
2198 ret = CRYPT_AsnEncodeUtcTime(dwCertEncodingType, lpszStructType,
2199 pvStructInfo, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
2201 ret = CRYPT_AsnEncodeGeneralizedTime(dwCertEncodingType,
2202 lpszStructType, pvStructInfo, dwFlags, pEncodePara, pbEncoded,
2205 __EXCEPT(page_fault)
2207 SetLastError(STATUS_ACCESS_VIOLATION);
2214 static BOOL WINAPI CRYPT_AsnEncodeSequenceOfAny(DWORD dwCertEncodingType,
2215 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2216 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2222 DWORD bytesNeeded, dataLen, lenBytes, i;
2223 const CRYPT_SEQUENCE_OF_ANY *seq =
2224 (const CRYPT_SEQUENCE_OF_ANY *)pvStructInfo;
2226 for (i = 0, dataLen = 0; i < seq->cValue; i++)
2227 dataLen += seq->rgValue[i].cbData;
2228 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
2229 bytesNeeded = 1 + lenBytes + dataLen;
2232 *pcbEncoded = bytesNeeded;
2237 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
2238 pcbEncoded, bytesNeeded)))
2240 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2241 pbEncoded = *(BYTE **)pbEncoded;
2242 *pbEncoded++ = ASN_SEQUENCEOF;
2243 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
2244 pbEncoded += lenBytes;
2245 for (i = 0; i < seq->cValue; i++)
2247 memcpy(pbEncoded, seq->rgValue[i].pbData,
2248 seq->rgValue[i].cbData);
2249 pbEncoded += seq->rgValue[i].cbData;
2254 __EXCEPT(page_fault)
2256 SetLastError(STATUS_ACCESS_VIOLATION);
2263 BOOL WINAPI CryptEncodeObjectEx(DWORD dwCertEncodingType, LPCSTR lpszStructType,
2264 const void *pvStructInfo, DWORD dwFlags, PCRYPT_ENCODE_PARA pEncodePara,
2265 void *pvEncoded, DWORD *pcbEncoded)
2269 CryptEncodeObjectExFunc encodeFunc = NULL;
2271 TRACE("(0x%08lx, %s, %p, 0x%08lx, %p, %p, %p)\n", dwCertEncodingType,
2272 debugstr_a(lpszStructType), pvStructInfo, dwFlags, pEncodePara,
2273 pvEncoded, pcbEncoded);
2275 if (!pvEncoded && !pcbEncoded)
2277 SetLastError(ERROR_INVALID_PARAMETER);
2280 if ((dwCertEncodingType & CERT_ENCODING_TYPE_MASK) != X509_ASN_ENCODING
2281 && (dwCertEncodingType & CMSG_ENCODING_TYPE_MASK) != PKCS_7_ASN_ENCODING)
2283 SetLastError(ERROR_FILE_NOT_FOUND);
2287 SetLastError(NOERROR);
2288 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG && pvEncoded)
2289 *(BYTE **)pvEncoded = NULL;
2290 if (!HIWORD(lpszStructType))
2292 switch (LOWORD(lpszStructType))
2294 case (WORD)X509_CERT:
2295 encodeFunc = CRYPT_AsnEncodeCert;
2297 case (WORD)X509_CERT_TO_BE_SIGNED:
2298 encodeFunc = CRYPT_AsnEncodeCertInfo;
2300 case (WORD)X509_CERT_CRL_TO_BE_SIGNED:
2301 encodeFunc = CRYPT_AsnEncodeCRLInfo;
2303 case (WORD)X509_EXTENSIONS:
2304 encodeFunc = CRYPT_AsnEncodeExtensions;
2306 case (WORD)X509_NAME:
2307 encodeFunc = CRYPT_AsnEncodeName;
2309 case (WORD)X509_PUBLIC_KEY_INFO:
2310 encodeFunc = CRYPT_AsnEncodePubKeyInfo;
2312 case (WORD)X509_ALTERNATE_NAME:
2313 encodeFunc = CRYPT_AsnEncodeAltName;
2315 case (WORD)X509_BASIC_CONSTRAINTS2:
2316 encodeFunc = CRYPT_AsnEncodeBasicConstraints2;
2318 case (WORD)RSA_CSP_PUBLICKEYBLOB:
2319 encodeFunc = CRYPT_AsnEncodeRsaPubKey;
2321 case (WORD)X509_OCTET_STRING:
2322 encodeFunc = CRYPT_AsnEncodeOctets;
2324 case (WORD)X509_BITS:
2325 case (WORD)X509_KEY_USAGE:
2326 encodeFunc = CRYPT_AsnEncodeBits;
2328 case (WORD)X509_INTEGER:
2329 encodeFunc = CRYPT_AsnEncodeInt;
2331 case (WORD)X509_MULTI_BYTE_INTEGER:
2332 encodeFunc = CRYPT_AsnEncodeInteger;
2334 case (WORD)X509_MULTI_BYTE_UINT:
2335 encodeFunc = CRYPT_AsnEncodeUnsignedInteger;
2337 case (WORD)X509_ENUMERATED:
2338 encodeFunc = CRYPT_AsnEncodeEnumerated;
2340 case (WORD)X509_CHOICE_OF_TIME:
2341 encodeFunc = CRYPT_AsnEncodeChoiceOfTime;
2343 case (WORD)X509_SEQUENCE_OF_ANY:
2344 encodeFunc = CRYPT_AsnEncodeSequenceOfAny;
2346 case (WORD)PKCS_UTC_TIME:
2347 encodeFunc = CRYPT_AsnEncodeUtcTime;
2350 FIXME("%d: unimplemented\n", LOWORD(lpszStructType));
2353 else if (!strcmp(lpszStructType, szOID_CERT_EXTENSIONS))
2354 encodeFunc = CRYPT_AsnEncodeExtensions;
2355 else if (!strcmp(lpszStructType, szOID_RSA_RSA))
2356 encodeFunc = CRYPT_AsnEncodeRsaPubKey;
2357 else if (!strcmp(lpszStructType, szOID_RSA_signingTime))
2358 encodeFunc = CRYPT_AsnEncodeUtcTime;
2359 else if (!strcmp(lpszStructType, szOID_CRL_REASON_CODE))
2360 encodeFunc = CRYPT_AsnEncodeEnumerated;
2361 else if (!strcmp(lpszStructType, szOID_KEY_USAGE))
2362 encodeFunc = CRYPT_AsnEncodeBits;
2363 else if (!strcmp(lpszStructType, szOID_SUBJECT_KEY_IDENTIFIER))
2364 encodeFunc = CRYPT_AsnEncodeOctets;
2365 else if (!strcmp(lpszStructType, szOID_BASIC_CONSTRAINTS2))
2366 encodeFunc = CRYPT_AsnEncodeBasicConstraints2;
2367 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME))
2368 encodeFunc = CRYPT_AsnEncodeAltName;
2369 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME2))
2370 encodeFunc = CRYPT_AsnEncodeAltName;
2371 else if (!strcmp(lpszStructType, szOID_NEXT_UPDATE_LOCATION))
2372 encodeFunc = CRYPT_AsnEncodeAltName;
2373 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME))
2374 encodeFunc = CRYPT_AsnEncodeAltName;
2375 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME2))
2376 encodeFunc = CRYPT_AsnEncodeAltName;
2378 TRACE("OID %s not found or unimplemented, looking for DLL\n",
2379 debugstr_a(lpszStructType));
2381 encodeFunc = (CryptEncodeObjectExFunc)CRYPT_GetFunc(dwCertEncodingType,
2382 lpszStructType, "CryptEncodeObjectEx", &lib);
2384 ret = encodeFunc(dwCertEncodingType, lpszStructType, pvStructInfo,
2385 dwFlags, pEncodePara, pvEncoded, pcbEncoded);
2387 SetLastError(ERROR_FILE_NOT_FOUND);
2393 BOOL WINAPI CryptDecodeObject(DWORD dwCertEncodingType, LPCSTR lpszStructType,
2394 const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo,
2395 DWORD *pcbStructInfo)
2399 CryptDecodeObjectFunc pCryptDecodeObject;
2401 TRACE("(0x%08lx, %s, %p, %ld, 0x%08lx, %p, %p)\n", dwCertEncodingType,
2402 debugstr_a(lpszStructType), pbEncoded, cbEncoded, dwFlags,
2403 pvStructInfo, pcbStructInfo);
2405 if (!pvStructInfo && !pcbStructInfo)
2407 SetLastError(ERROR_INVALID_PARAMETER);
2411 /* Try registered DLL first.. */
2412 pCryptDecodeObject =
2413 (CryptDecodeObjectFunc)CRYPT_GetFunc(dwCertEncodingType,
2414 lpszStructType, "CryptDecodeObject", &lib);
2415 if (pCryptDecodeObject)
2417 ret = pCryptDecodeObject(dwCertEncodingType, lpszStructType,
2418 pbEncoded, cbEncoded, dwFlags, pvStructInfo, pcbStructInfo);
2423 /* If not, use CryptDecodeObjectEx */
2424 ret = CryptDecodeObjectEx(dwCertEncodingType, lpszStructType, pbEncoded,
2425 cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo);
2430 /* Gets the number of length bytes from the given (leading) length byte */
2431 #define GET_LEN_BYTES(b) ((b) <= 0x7f ? 1 : 1 + ((b) & 0x7f))
2433 /* Helper function to get the encoded length of the data starting at pbEncoded,
2434 * where pbEncoded[0] is the tag. If the data are too short to contain a
2435 * length or if the length is too large for cbEncoded, sets an appropriate
2436 * error code and returns FALSE.
2438 static BOOL WINAPI CRYPT_GetLen(const BYTE *pbEncoded, DWORD cbEncoded,
2445 SetLastError(CRYPT_E_ASN1_CORRUPT);
2448 else if (pbEncoded[1] <= 0x7f)
2450 if (pbEncoded[1] + 1 > cbEncoded)
2452 SetLastError(CRYPT_E_ASN1_EOD);
2457 *len = pbEncoded[1];
2463 BYTE lenLen = GET_LEN_BYTES(pbEncoded[1]);
2465 if (lenLen > sizeof(DWORD) + 1)
2467 SetLastError(CRYPT_E_ASN1_LARGE);
2470 else if (lenLen + 2 > cbEncoded)
2472 SetLastError(CRYPT_E_ASN1_CORRUPT);
2483 out |= *pbEncoded++;
2485 if (out + lenLen + 1 > cbEncoded)
2487 SetLastError(CRYPT_E_ASN1_EOD);
2500 /* Helper function to check *pcbStructInfo, set it to the required size, and
2501 * optionally to allocate memory. Assumes pvStructInfo is not NULL.
2502 * If CRYPT_DECODE_ALLOC_FLAG is set in dwFlags, *pvStructInfo will be set to a
2503 * pointer to the newly allocated memory.
2505 static BOOL CRYPT_DecodeEnsureSpace(DWORD dwFlags,
2506 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo,
2511 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2513 if (pDecodePara && pDecodePara->pfnAlloc)
2514 *(BYTE **)pvStructInfo = pDecodePara->pfnAlloc(bytesNeeded);
2516 *(BYTE **)pvStructInfo = LocalAlloc(0, bytesNeeded);
2517 if (!*(BYTE **)pvStructInfo)
2520 *pcbStructInfo = bytesNeeded;
2522 else if (*pcbStructInfo < bytesNeeded)
2524 *pcbStructInfo = bytesNeeded;
2525 SetLastError(ERROR_MORE_DATA);
2531 /* A few of the members need explanation:
2533 * A sequence is decoded into a struct. The offset member is the
2534 * offset of this item within that struct.
2536 * The decoder function to use. If this is NULL, then the member isn't
2537 * decoded, but minSize space is reserved for it.
2539 * The minimum amount of space occupied after decoding. You must set this.
2541 * If true, and a decoding function fails with CRYPT_E_ASN1_BADTAG, then
2542 * minSize space is filled with 0 for this member. (Any other failure
2543 * results in CRYPT_AsnDecodeSequence failing.)
2544 * hasPointer, pointerOffset, minSize:
2545 * If the item has dynamic data, set hasPointer to TRUE, pointerOffset to
2546 * the offset within the (outer) struct of the data pointer (or to the
2547 * first data pointer, if more than one exist).
2549 * Used by CRYPT_AsnDecodeSequence, not for your use.
2551 struct AsnDecodeSequenceItem
2554 CryptDecodeObjectExFunc decodeFunc;
2558 DWORD pointerOffset;
2562 /* This decodes an arbitrary sequence into a contiguous block of memory
2563 * (basically, a struct.) Each element being decoded is described by a struct
2564 * AsnDecodeSequenceItem, see above.
2565 * startingPointer is an optional pointer to the first place where dynamic
2566 * data will be stored. If you know the starting offset, you may pass it
2567 * here. Otherwise, pass NULL, and one will be inferred from the items.
2568 * Each item decoder is never called with CRYPT_DECODE_ALLOC_FLAG set.
2569 * If any undecoded data are left over, fails with CRYPT_E_ASN1_CORRUPT.
2571 static BOOL CRYPT_AsnDecodeSequence(DWORD dwCertEncodingType,
2572 struct AsnDecodeSequenceItem items[], DWORD cItem, const BYTE *pbEncoded,
2573 DWORD cbEncoded, DWORD dwFlags, PCRYPT_DECODE_PARA pDecodePara,
2574 void *pvStructInfo, DWORD *pcbStructInfo, void *startingPointer)
2578 TRACE("%p, %ld, %p, %ld, %08lx, %p, %p, %ld, %p\n", items, cItem, pbEncoded,
2579 cbEncoded, dwFlags, pDecodePara, pvStructInfo, *pcbStructInfo,
2582 if (pbEncoded[0] == ASN_SEQUENCE)
2586 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2588 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2589 DWORD i, bytesNeeded = 0, minSize = 0;
2592 ptr = pbEncoded + 1 + lenBytes;
2593 for (i = 0; ret && i < cItem; i++)
2597 minSize += items[i].minSize;
2598 if (cbEncoded - (ptr - pbEncoded) != 0)
2600 if ((ret = CRYPT_GetLen(ptr, cbEncoded - (ptr - pbEncoded),
2603 BYTE nextItemLenBytes = GET_LEN_BYTES(ptr[1]);
2605 if (items[i].decodeFunc)
2607 TRACE("sizing item %ld\n", i);
2608 ret = items[i].decodeFunc(dwCertEncodingType, NULL,
2609 ptr, 1 + nextItemLenBytes + nextItemLen,
2610 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL,
2614 /* Account for alignment padding */
2615 bytesNeeded += items[i].size;
2616 if (items[i].size % sizeof(DWORD))
2617 bytesNeeded += sizeof(DWORD) -
2618 items[i].size % sizeof(DWORD);
2619 ptr += 1 + nextItemLenBytes + nextItemLen;
2621 else if (items[i].optional &&
2622 GetLastError() == CRYPT_E_ASN1_BADTAG)
2624 TRACE("skipping optional item %ld\n", i);
2625 bytesNeeded += items[i].minSize;
2626 SetLastError(NOERROR);
2630 TRACE("item %ld failed: %08lx\n", i,
2634 bytesNeeded += items[i].minSize;
2637 else if (items[i].optional)
2638 bytesNeeded += items[i].minSize;
2641 SetLastError(CRYPT_E_ASN1_CORRUPT);
2645 if (cbEncoded - (ptr - pbEncoded) != 0)
2647 TRACE("%ld remaining bytes, failing\n", cbEncoded -
2649 SetLastError(CRYPT_E_ASN1_CORRUPT);
2655 *pcbStructInfo = bytesNeeded;
2656 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
2657 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
2661 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2662 pvStructInfo = *(BYTE **)pvStructInfo;
2663 if (startingPointer)
2664 nextData = (BYTE *)startingPointer;
2666 nextData = (BYTE *)pvStructInfo + minSize;
2667 memset(pvStructInfo, 0, minSize);
2668 ptr = pbEncoded + 1 + lenBytes;
2669 for (i = 0; ret && i < cItem; i++)
2671 if (cbEncoded - (ptr - pbEncoded) != 0)
2674 BYTE nextItemLenBytes = GET_LEN_BYTES(ptr[1]);
2676 CRYPT_GetLen(ptr, cbEncoded - (ptr - pbEncoded),
2678 if (items[i].hasPointer)
2680 *(BYTE **)((BYTE *)pvStructInfo +
2681 items[i].pointerOffset) = nextData;
2683 if (items[i].decodeFunc)
2685 TRACE("decoding item %ld\n", i);
2686 ret = items[i].decodeFunc(dwCertEncodingType,
2687 NULL, ptr, 1 + nextItemLenBytes + nextItemLen,
2688 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL,
2689 (BYTE *)pvStructInfo + items[i].offset,
2692 TRACE("item %ld failed: %08lx\n", i,
2696 items[i].size = items[i].minSize;
2699 if (items[i].hasPointer &&
2700 items[i].size > items[i].minSize)
2702 nextData += items[i].size -
2704 /* align nextData to DWORD boundaries */
2705 if (items[i].size % sizeof(DWORD))
2707 nextData += sizeof(DWORD) -
2708 items[i].size % sizeof(DWORD);
2711 ptr += 1 + nextItemLenBytes + nextItemLen;
2713 else if (items[i].optional &&
2714 GetLastError() == CRYPT_E_ASN1_BADTAG)
2716 SetLastError(NOERROR);
2720 else if (!items[i].optional)
2722 SetLastError(CRYPT_E_ASN1_CORRUPT);
2732 SetLastError(CRYPT_E_ASN1_BADTAG);
2735 TRACE("returning %d (%08lx)\n", ret, GetLastError());
2739 /* Decodes a DER-encoded BLOB into a CRYPT_DER_BLOB struct pointed to by
2740 * pvStructInfo. The BLOB must be non-empty, otherwise the last error is set
2741 * to CRYPT_E_ASN1_CORRUPT.
2742 * Warning: assumes the CRYPT_DER_BLOB pointed to by pvStructInfo has pbData
2745 static BOOL WINAPI CRYPT_AsnDecodeDerBlob(DWORD dwCertEncodingType,
2746 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2747 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2752 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2754 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2755 DWORD bytesNeeded = sizeof(CRYPT_DER_BLOB);
2757 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
2758 bytesNeeded += 1 + lenBytes + dataLen;
2761 *pcbStructInfo = bytesNeeded;
2762 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
2763 pvStructInfo, pcbStructInfo, bytesNeeded)))
2765 CRYPT_DER_BLOB *blob = (CRYPT_DER_BLOB *)pvStructInfo;
2767 blob->cbData = 1 + lenBytes + dataLen;
2770 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
2771 blob->pbData = (BYTE *)pbEncoded;
2774 assert(blob->pbData);
2775 memcpy(blob->pbData, pbEncoded, blob->cbData);
2780 SetLastError(CRYPT_E_ASN1_CORRUPT);
2788 /* Like CRYPT_AsnDecodeBitsInternal, but swaps the bytes */
2789 static BOOL WINAPI CRYPT_AsnDecodeBitsSwapBytes(DWORD dwCertEncodingType,
2790 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2791 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2795 TRACE("(%p, %ld, 0x%08lx, %p, %p, %ld)\n", pbEncoded, cbEncoded, dwFlags,
2796 pDecodePara, pvStructInfo, *pcbStructInfo);
2798 /* Can't use the CRYPT_DECODE_NOCOPY_FLAG, because we modify the bytes in-
2801 ret = CRYPT_AsnDecodeBitsInternal(dwCertEncodingType, lpszStructType,
2802 pbEncoded, cbEncoded, dwFlags & ~CRYPT_DECODE_NOCOPY_FLAG, pDecodePara,
2803 pvStructInfo, pcbStructInfo);
2804 if (ret && pvStructInfo)
2806 CRYPT_BIT_BLOB *blob = (CRYPT_BIT_BLOB *)pvStructInfo;
2813 for (i = 0; i < blob->cbData / 2; i++)
2815 temp = blob->pbData[i];
2816 blob->pbData[i] = blob->pbData[blob->cbData - i - 1];
2817 blob->pbData[blob->cbData - i - 1] = temp;
2821 TRACE("returning %d (%08lx)\n", ret, GetLastError());
2825 static BOOL WINAPI CRYPT_AsnDecodeCert(DWORD dwCertEncodingType,
2826 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2827 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2831 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
2832 pDecodePara, pvStructInfo, *pcbStructInfo);
2836 struct AsnDecodeSequenceItem items[] = {
2837 { offsetof(CERT_SIGNED_CONTENT_INFO, ToBeSigned),
2838 CRYPT_AsnDecodeDerBlob, sizeof(CRYPT_DER_BLOB), FALSE, TRUE,
2839 offsetof(CERT_SIGNED_CONTENT_INFO, ToBeSigned.pbData), 0 },
2840 { offsetof(CERT_SIGNED_CONTENT_INFO, SignatureAlgorithm),
2841 CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
2842 FALSE, TRUE, offsetof(CERT_SIGNED_CONTENT_INFO,
2843 SignatureAlgorithm.pszObjId), 0 },
2844 { offsetof(CERT_SIGNED_CONTENT_INFO, Signature),
2845 CRYPT_AsnDecodeBitsSwapBytes, sizeof(CRYPT_BIT_BLOB), FALSE, TRUE,
2846 offsetof(CERT_SIGNED_CONTENT_INFO, Signature.pbData), 0 },
2849 if (dwFlags & CRYPT_DECODE_NO_SIGNATURE_BYTE_REVERSAL_FLAG)
2850 items[2].decodeFunc = CRYPT_AsnDecodeBitsInternal;
2851 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
2852 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
2853 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
2855 __EXCEPT(page_fault)
2857 SetLastError(STATUS_ACCESS_VIOLATION);
2864 static BOOL WINAPI CRYPT_AsnDecodeCertVersion(DWORD dwCertEncodingType,
2865 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2866 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2870 if (pbEncoded[0] == (ASN_CONTEXT | ASN_CONSTRUCTOR))
2874 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2876 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2878 ret = CRYPT_AsnDecodeInt(dwCertEncodingType, X509_INTEGER,
2879 pbEncoded + 1 + lenBytes, dataLen, dwFlags, pDecodePara,
2880 pvStructInfo, pcbStructInfo);
2885 SetLastError(CRYPT_E_ASN1_BADTAG);
2891 static BOOL WINAPI CRYPT_AsnDecodeValidity(DWORD dwCertEncodingType,
2892 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2893 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2897 struct AsnDecodeSequenceItem items[] = {
2898 { offsetof(CERT_PRIVATE_KEY_VALIDITY, NotBefore),
2899 CRYPT_AsnDecodeChoiceOfTime, sizeof(FILETIME), FALSE, FALSE, 0 },
2900 { offsetof(CERT_PRIVATE_KEY_VALIDITY, NotAfter),
2901 CRYPT_AsnDecodeChoiceOfTime, sizeof(FILETIME), FALSE, FALSE, 0 },
2904 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
2905 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
2906 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
2910 static BOOL WINAPI CRYPT_AsnDecodeCertExtensions(DWORD dwCertEncodingType,
2911 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2912 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2916 if (pbEncoded[0] == (ASN_CONTEXT | ASN_CONSTRUCTOR | 3))
2920 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2922 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2924 ret = CRYPT_AsnDecodeExtensionsInternal(dwCertEncodingType,
2925 X509_EXTENSIONS, pbEncoded + 1 + lenBytes, dataLen, dwFlags,
2926 pDecodePara, pvStructInfo, pcbStructInfo);
2931 SetLastError(CRYPT_E_ASN1_BADTAG);
2937 static BOOL WINAPI CRYPT_AsnDecodeCertInfo(DWORD dwCertEncodingType,
2938 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2939 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2943 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
2944 pDecodePara, pvStructInfo, *pcbStructInfo);
2948 struct AsnDecodeSequenceItem items[] = {
2949 { offsetof(CERT_INFO, dwVersion), CRYPT_AsnDecodeCertVersion,
2950 sizeof(DWORD), TRUE, FALSE, 0, 0 },
2951 { offsetof(CERT_INFO, SerialNumber), CRYPT_AsnDecodeIntegerInternal,
2952 sizeof(CRYPT_INTEGER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
2953 SerialNumber.pbData), 0 },
2954 { offsetof(CERT_INFO, SignatureAlgorithm), CRYPT_AsnDecodeAlgorithmId,
2955 sizeof(CRYPT_ALGORITHM_IDENTIFIER), FALSE, TRUE, offsetof(CERT_INFO,
2956 SignatureAlgorithm.pszObjId), 0 },
2957 { offsetof(CERT_INFO, Issuer), CRYPT_AsnDecodeDerBlob,
2958 sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
2960 { offsetof(CERT_INFO, NotBefore), CRYPT_AsnDecodeValidity,
2961 sizeof(CERT_PRIVATE_KEY_VALIDITY), FALSE, FALSE, 0 },
2962 { offsetof(CERT_INFO, Subject), CRYPT_AsnDecodeDerBlob,
2963 sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
2965 { offsetof(CERT_INFO, SubjectPublicKeyInfo), CRYPT_AsnDecodePubKeyInfo,
2966 sizeof(CERT_PUBLIC_KEY_INFO), FALSE, TRUE, offsetof(CERT_INFO,
2967 SubjectPublicKeyInfo.Algorithm.Parameters.pbData), 0 },
2968 { offsetof(CERT_INFO, IssuerUniqueId), CRYPT_AsnDecodeBitsInternal,
2969 sizeof(CRYPT_BIT_BLOB), TRUE, TRUE, offsetof(CERT_INFO,
2970 IssuerUniqueId.pbData), 0 },
2971 { offsetof(CERT_INFO, SubjectUniqueId), CRYPT_AsnDecodeBitsInternal,
2972 sizeof(CRYPT_BIT_BLOB), TRUE, TRUE, offsetof(CERT_INFO,
2973 SubjectUniqueId.pbData), 0 },
2974 { offsetof(CERT_INFO, cExtension), CRYPT_AsnDecodeCertExtensions,
2975 sizeof(CERT_EXTENSIONS), TRUE, TRUE, offsetof(CERT_INFO,
2979 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
2980 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
2981 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
2983 __EXCEPT(page_fault)
2985 SetLastError(STATUS_ACCESS_VIOLATION);
2992 static BOOL CRYPT_AsnDecodeCRLEntry(const BYTE *pbEncoded, DWORD cbEncoded,
2993 DWORD dwFlags, PCRL_ENTRY entry, DWORD *pcbEntry)
2996 struct AsnDecodeSequenceItem items[] = {
2997 { offsetof(CRL_ENTRY, SerialNumber), CRYPT_AsnDecodeIntegerInternal,
2998 sizeof(CRYPT_INTEGER_BLOB), FALSE, TRUE, offsetof(CRL_ENTRY,
2999 SerialNumber.pbData), 0 },
3000 { offsetof(CRL_ENTRY, RevocationDate), CRYPT_AsnDecodeChoiceOfTime,
3001 sizeof(FILETIME), FALSE, FALSE, 0 },
3002 { offsetof(CRL_ENTRY, cExtension), CRYPT_AsnDecodeExtensionsInternal,
3003 sizeof(CERT_EXTENSIONS), TRUE, TRUE, offsetof(CRL_ENTRY,
3007 TRACE("%p, %ld, %08lx, %p, %ld\n", pbEncoded, cbEncoded, dwFlags, entry,
3010 ret = CRYPT_AsnDecodeSequence(X509_ASN_ENCODING, items,
3011 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
3012 NULL, entry, pcbEntry, entry ? entry->SerialNumber.pbData : NULL);
3013 TRACE("Returning %d (%08lx)\n", ret, GetLastError());
3017 typedef struct _WINE_CRL_ENTRIES {
3019 PCRL_ENTRY rgCRLEntry;
3020 } WINE_CRL_ENTRIES, *PWINE_CRL_ENTRIES;
3022 /* Warning: assumes pvStructInfo is a WINE_CRL_ENTRIES whose rgCRLEntry has
3023 * been set prior to calling.
3025 static BOOL WINAPI CRYPT_AsnDecodeCRLEntries(DWORD dwCertEncodingType,
3026 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3027 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3031 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3032 pDecodePara, pvStructInfo, *pcbStructInfo);
3034 if (pbEncoded[0] == ASN_SEQUENCEOF)
3036 DWORD dataLen, bytesNeeded;
3038 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3040 DWORD cCRLEntry = 0;
3041 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3043 bytesNeeded = sizeof(WINE_CRL_ENTRIES);
3049 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3050 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3053 ret = CRYPT_AsnDecodeCRLEntry(ptr,
3054 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3060 bytesNeeded += size;
3061 ret = CRYPT_GetLen(ptr,
3062 cbEncoded - (ptr - pbEncoded), &nextLen);
3064 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3071 *pcbStructInfo = bytesNeeded;
3072 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
3073 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
3078 PWINE_CRL_ENTRIES entries;
3080 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3081 pvStructInfo = *(BYTE **)pvStructInfo;
3082 *pcbStructInfo = bytesNeeded;
3083 entries = (PWINE_CRL_ENTRIES)pvStructInfo;
3084 entries->cCRLEntry = cCRLEntry;
3085 assert(entries->rgCRLEntry);
3086 nextData = (BYTE *)entries->rgCRLEntry +
3087 entries->cCRLEntry * sizeof(CRL_ENTRY);
3088 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3089 i < cCRLEntry && ptr - pbEncoded - 1 - lenBytes <
3092 entries->rgCRLEntry[i].SerialNumber.pbData = nextData;
3094 ret = CRYPT_AsnDecodeCRLEntry(ptr,
3095 cbEncoded - (ptr - pbEncoded), dwFlags,
3096 &entries->rgCRLEntry[i], &size);
3101 bytesNeeded -= size;
3102 /* Increment nextData by the difference of the
3103 * minimum size and the actual size.
3105 if (size > sizeof(CRL_ENTRY))
3106 nextData += size - sizeof(CRL_ENTRY);
3107 ret = CRYPT_GetLen(ptr,
3108 cbEncoded - (ptr - pbEncoded), &nextLen);
3110 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3119 SetLastError(CRYPT_E_ASN1_BADTAG);
3122 TRACE("Returning %d (%08lx)\n", ret, GetLastError());
3126 static BOOL WINAPI CRYPT_AsnDecodeCRLInfo(DWORD dwCertEncodingType,
3127 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3128 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3132 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3133 pDecodePara, pvStructInfo, *pcbStructInfo);
3137 struct AsnDecodeSequenceItem items[] = {
3138 { offsetof(CRL_INFO, dwVersion), CRYPT_AsnDecodeCertVersion,
3139 sizeof(DWORD), TRUE, FALSE, 0, 0 },
3140 { offsetof(CRL_INFO, SignatureAlgorithm), CRYPT_AsnDecodeAlgorithmId,
3141 sizeof(CRYPT_ALGORITHM_IDENTIFIER), FALSE, TRUE, offsetof(CRL_INFO,
3142 SignatureAlgorithm.pszObjId), 0 },
3143 { offsetof(CRL_INFO, Issuer), CRYPT_AsnDecodeDerBlob,
3144 sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CRL_INFO,
3146 { offsetof(CRL_INFO, ThisUpdate), CRYPT_AsnDecodeChoiceOfTime,
3147 sizeof(FILETIME), FALSE, FALSE, 0 },
3148 { offsetof(CRL_INFO, NextUpdate), CRYPT_AsnDecodeChoiceOfTime,
3149 sizeof(FILETIME), TRUE, FALSE, 0 },
3150 { offsetof(CRL_INFO, cCRLEntry), CRYPT_AsnDecodeCRLEntries,
3151 sizeof(WINE_CRL_ENTRIES), TRUE, TRUE, offsetof(CRL_INFO,
3153 /* Note that the extensions are ignored by MS, so I'll ignore them too
3155 { offsetof(CRL_INFO, cExtension), NULL,
3156 sizeof(CERT_EXTENSIONS), TRUE, FALSE, 0 },
3159 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
3160 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
3161 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
3163 __EXCEPT(page_fault)
3165 SetLastError(STATUS_ACCESS_VIOLATION);
3170 TRACE("Returning %d (%08lx)\n", ret, GetLastError());
3174 /* Differences between this and CRYPT_AsnDecodeOid:
3175 * - pvStructInfo is a LPSTR *, not an LPSTR
3176 * - CRYPT_AsnDecodeOid doesn't account for the size of an LPSTR in its byte
3177 * count, whereas our callers (typically CRYPT_AsnDecodeSequence) expect this
3180 static BOOL WINAPI CRYPT_AsnDecodeOidWrapper(DWORD dwCertEncodingType,
3181 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3182 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3186 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3187 pDecodePara, pvStructInfo, *pcbStructInfo);
3189 ret = CRYPT_AsnDecodeOid(pbEncoded, cbEncoded, dwFlags,
3190 pvStructInfo ? *(LPSTR *)pvStructInfo : NULL, pcbStructInfo);
3191 if (ret || GetLastError() == ERROR_MORE_DATA)
3192 *pcbStructInfo += sizeof(LPSTR);
3193 if (ret && pvStructInfo)
3194 TRACE("returning %s\n", debugstr_a(*(LPSTR *)pvStructInfo));
3198 /* Warning: assumes ext->pszObjId is set ahead of time! */
3199 static BOOL CRYPT_AsnDecodeExtension(const BYTE *pbEncoded, DWORD cbEncoded,
3200 DWORD dwFlags, CERT_EXTENSION *ext, DWORD *pcbExt)
3202 struct AsnDecodeSequenceItem items[] = {
3203 { offsetof(CERT_EXTENSION, pszObjId), CRYPT_AsnDecodeOidWrapper,
3204 sizeof(LPSTR), FALSE, TRUE, offsetof(CERT_EXTENSION, pszObjId), 0 },
3205 { offsetof(CERT_EXTENSION, fCritical), CRYPT_AsnDecodeBool,
3206 sizeof(BOOL), TRUE, FALSE, 0, 0 },
3207 { offsetof(CERT_EXTENSION, Value), CRYPT_AsnDecodeOctetsInternal,
3208 sizeof(CRYPT_OBJID_BLOB), FALSE, TRUE, offsetof(CERT_EXTENSION,
3213 TRACE("%p, %ld, %08lx, %p, %ld\n", pbEncoded, cbEncoded, dwFlags, ext,
3217 TRACE("ext->pszObjId is %p\n", ext->pszObjId);
3218 ret = CRYPT_AsnDecodeSequence(X509_ASN_ENCODING, items,
3219 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags, NULL,
3220 ext, pcbExt, ext ? ext->pszObjId : NULL);
3222 TRACE("ext->pszObjId is %p (%s)\n", ext->pszObjId,
3223 debugstr_a(ext->pszObjId));
3224 TRACE("returning %d (%08lx)\n", ret, GetLastError());
3228 static BOOL WINAPI CRYPT_AsnDecodeExtensionsInternal(DWORD dwCertEncodingType,
3229 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3230 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3234 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3235 pDecodePara, pvStructInfo, *pcbStructInfo);
3237 if (pbEncoded[0] == ASN_SEQUENCEOF)
3239 DWORD dataLen, bytesNeeded;
3241 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3243 DWORD cExtension = 0;
3244 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3246 bytesNeeded = sizeof(CERT_EXTENSIONS);
3252 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3253 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3256 ret = CRYPT_AsnDecodeExtension(ptr,
3257 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3263 bytesNeeded += size;
3264 ret = CRYPT_GetLen(ptr,
3265 cbEncoded - (ptr - pbEncoded), &nextLen);
3267 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3274 *pcbStructInfo = bytesNeeded;
3275 else if (*pcbStructInfo < bytesNeeded)
3277 SetLastError(ERROR_MORE_DATA);
3278 *pcbStructInfo = bytesNeeded;
3286 CERT_EXTENSIONS *exts;
3288 *pcbStructInfo = bytesNeeded;
3289 exts = (CERT_EXTENSIONS *)pvStructInfo;
3290 exts->cExtension = cExtension;
3291 assert(exts->rgExtension);
3292 nextData = (BYTE *)exts->rgExtension +
3293 exts->cExtension * sizeof(CERT_EXTENSION);
3294 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3295 i < cExtension && ptr - pbEncoded - 1 - lenBytes <
3298 exts->rgExtension[i].pszObjId = (LPSTR)nextData;
3300 ret = CRYPT_AsnDecodeExtension(ptr,
3301 cbEncoded - (ptr - pbEncoded), dwFlags,
3302 &exts->rgExtension[i], &size);
3307 bytesNeeded -= size;
3308 if (size > sizeof(CERT_EXTENSION))
3309 nextData += size - sizeof(CERT_EXTENSION);
3310 ret = CRYPT_GetLen(ptr,
3311 cbEncoded - (ptr - pbEncoded), &nextLen);
3313 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3322 SetLastError(CRYPT_E_ASN1_BADTAG);
3328 static BOOL WINAPI CRYPT_AsnDecodeExtensions(DWORD dwCertEncodingType,
3329 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3330 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3336 ret = CRYPT_AsnDecodeExtensionsInternal(dwCertEncodingType,
3337 lpszStructType, pbEncoded, cbEncoded,
3338 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL, pcbStructInfo);
3339 if (ret && pvStructInfo)
3341 ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
3342 pcbStructInfo, *pcbStructInfo);
3345 CERT_EXTENSIONS *exts;
3347 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3348 pvStructInfo = *(BYTE **)pvStructInfo;
3349 exts = (CERT_EXTENSIONS *)pvStructInfo;
3350 exts->rgExtension = (CERT_EXTENSION *)((BYTE *)exts +
3351 sizeof(CERT_EXTENSIONS));
3352 ret = CRYPT_AsnDecodeExtensionsInternal(dwCertEncodingType,
3353 lpszStructType, pbEncoded, cbEncoded,
3354 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pvStructInfo,
3359 __EXCEPT(page_fault)
3361 SetLastError(STATUS_ACCESS_VIOLATION);
3368 /* FIXME: honor the CRYPT_DECODE_SHARE_OID_STRING_FLAG. */
3369 static BOOL WINAPI CRYPT_AsnDecodeOid(const BYTE *pbEncoded, DWORD cbEncoded,
3370 DWORD dwFlags, LPSTR pszObjId, DWORD *pcbObjId)
3374 TRACE("%p, %ld, %08lx, %p, %ld\n", pbEncoded, cbEncoded, dwFlags, pszObjId,
3379 if (pbEncoded[0] == ASN_OBJECTIDENTIFIER)
3383 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3385 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3390 /* The largest possible string for the first two components
3391 * is 2.175 (= 2 * 40 + 175 = 255), so this is big enough.
3396 snprintf(firstTwo, sizeof(firstTwo), "%d.%d",
3397 pbEncoded[1 + lenBytes] / 40,
3398 pbEncoded[1 + lenBytes] - (pbEncoded[1 + lenBytes] / 40)
3400 bytesNeeded = strlen(firstTwo) + 1;
3401 for (ptr = pbEncoded + 2 + lenBytes; ret &&
3402 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3404 /* large enough for ".4000000" */
3408 while (ptr - pbEncoded - 1 - lenBytes < dataLen &&
3415 if (ptr - pbEncoded - 1 - lenBytes >= dataLen ||
3418 SetLastError(CRYPT_E_ASN1_CORRUPT);
3425 snprintf(str, sizeof(str), ".%d", val);
3426 bytesNeeded += strlen(str);
3430 *pcbObjId = bytesNeeded;
3431 else if (*pcbObjId < bytesNeeded)
3433 *pcbObjId = bytesNeeded;
3434 SetLastError(ERROR_MORE_DATA);
3440 sprintf(pszObjId, "%d.%d", pbEncoded[1 + lenBytes] / 40,
3441 pbEncoded[1 + lenBytes] - (pbEncoded[1 + lenBytes] /
3443 pszObjId += strlen(pszObjId);
3444 for (ptr = pbEncoded + 2 + lenBytes; ret &&
3445 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3449 while (ptr - pbEncoded - 1 - lenBytes < dataLen &&
3458 sprintf(pszObjId, ".%d", val);
3459 pszObjId += strlen(pszObjId);
3465 *pcbObjId = bytesNeeded;
3470 SetLastError(CRYPT_E_ASN1_BADTAG);
3474 __EXCEPT(page_fault)
3476 SetLastError(STATUS_ACCESS_VIOLATION);
3483 /* Warning: this assumes the address of value->Value.pbData is already set, in
3484 * order to avoid overwriting memory. (In some cases, it may change it, if it
3485 * doesn't copy anything to memory.) Be sure to set it correctly!
3487 static BOOL WINAPI CRYPT_AsnDecodeNameValue(const BYTE *pbEncoded,
3488 DWORD cbEncoded, DWORD dwFlags, CERT_NAME_VALUE *value, DWORD *pcbValue)
3496 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3498 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3500 switch (pbEncoded[0])
3502 case ASN_NUMERICSTRING:
3503 case ASN_PRINTABLESTRING:
3507 FIXME("Unimplemented string type %02x\n", pbEncoded[0]);
3508 SetLastError(OSS_UNIMPLEMENTED);
3513 DWORD bytesNeeded = sizeof(CERT_NAME_VALUE);
3515 switch (pbEncoded[0])
3517 case ASN_NUMERICSTRING:
3518 case ASN_PRINTABLESTRING:
3520 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
3521 bytesNeeded += dataLen;
3525 *pcbValue = bytesNeeded;
3526 else if (*pcbValue < bytesNeeded)
3528 *pcbValue = bytesNeeded;
3529 SetLastError(ERROR_MORE_DATA);
3534 *pcbValue = bytesNeeded;
3535 switch (pbEncoded[0])
3537 case ASN_NUMERICSTRING:
3538 value->dwValueType = CERT_RDN_NUMERIC_STRING;
3540 case ASN_PRINTABLESTRING:
3541 value->dwValueType = CERT_RDN_PRINTABLE_STRING;
3544 value->dwValueType = CERT_RDN_IA5_STRING;
3549 switch (pbEncoded[0])
3551 case ASN_NUMERICSTRING:
3552 case ASN_PRINTABLESTRING:
3554 value->Value.cbData = dataLen;
3555 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3556 value->Value.pbData = (BYTE *)pbEncoded + 1 +
3560 assert(value->Value.pbData);
3561 memcpy(value->Value.pbData,
3562 pbEncoded + 1 + lenBytes, dataLen);
3569 value->Value.cbData = 0;
3570 value->Value.pbData = NULL;
3576 __EXCEPT(page_fault)
3578 SetLastError(STATUS_ACCESS_VIOLATION);
3585 /* FIXME: this should use CRYPT_AsnDecodeSequence (though that won't accept it
3586 * at the moment because of the ASN_CONSTRUCTOR tag.)
3588 static BOOL WINAPI CRYPT_AsnDecodeRdnAttr(const BYTE *pbEncoded,
3589 DWORD cbEncoded, DWORD dwFlags, CERT_RDN_ATTR *attr, DWORD *pcbAttr)
3595 if (pbEncoded[0] == (ASN_CONSTRUCTOR | ASN_SEQUENCE))
3597 DWORD bytesNeeded, dataLen, size;
3600 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3602 /* The data length must be at least 4, two for the tag and
3603 * length for the OID, and two for the string (assuming both
3604 * have short-form lengths.)
3608 SetLastError(CRYPT_E_ASN1_EOD);
3613 bytesNeeded = sizeof(CERT_RDN_ATTR);
3614 lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3615 ret = CRYPT_AsnDecodeOid(pbEncoded + 1 + lenBytes,
3616 cbEncoded - 1 - lenBytes, dwFlags, NULL, &size);
3619 /* ugly: need to know the size of the next element of
3620 * the sequence, so get it directly
3622 DWORD objIdOfset = 1 + lenBytes, objIdLen,
3623 nameValueOffset = 0;
3625 ret = CRYPT_GetLen(pbEncoded + objIdOfset,
3626 cbEncoded - objIdOfset, &objIdLen);
3627 bytesNeeded += size;
3628 /* hack: like encoding, this takes advantage of the
3629 * fact that the rest of the structure is identical to
3630 * a CERT_NAME_VALUE.
3634 nameValueOffset = objIdOfset + objIdLen + 1 +
3635 GET_LEN_BYTES(pbEncoded[objIdOfset]);
3636 ret = CRYPT_AsnDecodeNameValue(
3637 pbEncoded + nameValueOffset,
3638 cbEncoded - nameValueOffset, dwFlags, NULL, &size);
3642 bytesNeeded += size;
3644 *pcbAttr = bytesNeeded;
3645 else if (*pcbAttr < bytesNeeded)
3647 *pcbAttr = bytesNeeded;
3648 SetLastError(ERROR_MORE_DATA);
3653 BYTE *originalData = attr->Value.pbData;
3655 *pcbAttr = bytesNeeded;
3656 /* strange: decode the value first, because it
3657 * has a counted size, and we can store the OID
3658 * after it. Keep track of the original data
3659 * pointer, we'll need to know whether it was
3663 ret = CRYPT_AsnDecodeNameValue(
3664 pbEncoded + nameValueOffset,
3665 cbEncoded - nameValueOffset, dwFlags,
3666 (CERT_NAME_VALUE *)&attr->dwValueType, &size);
3671 /* if the data were copied to the
3672 * original location, the OID goes
3673 * after. Otherwise it goes in the
3674 * spot originally reserved for the
3677 if (attr->Value.pbData == originalData)
3679 (LPSTR)(attr->Value.pbData +
3680 attr->Value.cbData);
3683 (LPSTR)originalData;
3684 size = bytesNeeded - size;
3685 ret = CRYPT_AsnDecodeOid(
3686 pbEncoded + objIdOfset,
3687 cbEncoded - objIdOfset,
3688 dwFlags, attr->pszObjId, &size);
3691 attr->pszObjId = NULL;
3701 SetLastError(CRYPT_E_ASN1_BADTAG);
3705 __EXCEPT(page_fault)
3707 SetLastError(STATUS_ACCESS_VIOLATION);
3714 static BOOL WINAPI CRYPT_AsnDecodeRdn(const BYTE *pbEncoded, DWORD cbEncoded,
3715 DWORD dwFlags, CERT_RDN *rdn, DWORD *pcbRdn)
3721 if (pbEncoded[0] == (ASN_CONSTRUCTOR | ASN_SETOF))
3725 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3727 DWORD bytesNeeded, cRDNAttr = 0;
3728 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3730 bytesNeeded = sizeof(CERT_RDN);
3736 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3737 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3739 ret = CRYPT_AsnDecodeRdnAttr(ptr,
3740 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3746 bytesNeeded += size;
3747 ret = CRYPT_GetLen(ptr,
3748 cbEncoded - (ptr - pbEncoded), &nextLen);
3750 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3757 *pcbRdn = bytesNeeded;
3758 else if (*pcbRdn < bytesNeeded)
3760 *pcbRdn = bytesNeeded;
3761 SetLastError(ERROR_MORE_DATA);
3770 *pcbRdn = bytesNeeded;
3771 rdn->cRDNAttr = cRDNAttr;
3772 rdn->rgRDNAttr = (CERT_RDN_ATTR *)((BYTE *)rdn +
3774 nextData = (BYTE *)rdn->rgRDNAttr +
3775 rdn->cRDNAttr * sizeof(CERT_RDN_ATTR);
3776 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3777 i < cRDNAttr && ptr - pbEncoded - 1 - lenBytes <
3780 rdn->rgRDNAttr[i].Value.pbData = nextData;
3782 ret = CRYPT_AsnDecodeRdnAttr(ptr,
3783 cbEncoded - (ptr - pbEncoded), dwFlags,
3784 &rdn->rgRDNAttr[i], &size);
3789 bytesNeeded -= size;
3790 /* If dwFlags & CRYPT_DECODE_NOCOPY_FLAG, the
3791 * data may not have been copied.
3793 if (rdn->rgRDNAttr[i].Value.pbData == nextData)
3795 rdn->rgRDNAttr[i].Value.cbData;
3796 /* Ugly: the OID, if copied, is stored in
3797 * memory after the value, so increment by its
3798 * string length if it's set and points here.
3800 if ((const BYTE *)rdn->rgRDNAttr[i].pszObjId
3803 rdn->rgRDNAttr[i].pszObjId) + 1;
3804 ret = CRYPT_GetLen(ptr,
3805 cbEncoded - (ptr - pbEncoded), &nextLen);
3807 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3816 SetLastError(CRYPT_E_ASN1_BADTAG);
3820 __EXCEPT(page_fault)
3822 SetLastError(STATUS_ACCESS_VIOLATION);
3829 static BOOL WINAPI CRYPT_AsnDecodeName(DWORD dwCertEncodingType,
3830 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3831 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3837 if (pbEncoded[0] == (ASN_CONSTRUCTOR | ASN_SEQUENCEOF))
3841 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3843 DWORD bytesNeeded, cRDN = 0;
3844 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3846 bytesNeeded = sizeof(CERT_NAME_INFO);
3851 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3852 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3856 ret = CRYPT_AsnDecodeRdn(ptr,
3857 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3863 bytesNeeded += size;
3864 ret = CRYPT_GetLen(ptr,
3865 cbEncoded - (ptr - pbEncoded), &nextLen);
3867 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3874 *pcbStructInfo = bytesNeeded;
3875 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
3876 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
3878 CERT_NAME_INFO *info;
3880 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3881 pvStructInfo = *(BYTE **)pvStructInfo;
3882 info = (CERT_NAME_INFO *)pvStructInfo;
3884 if (info->cRDN == 0)
3892 info->rgRDN = (CERT_RDN *)((BYTE *)pvStructInfo +
3893 sizeof(CERT_NAME_INFO));
3894 nextData = (BYTE *)info->rgRDN +
3895 info->cRDN * sizeof(CERT_RDN);
3896 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3897 i < cRDN && ptr - pbEncoded - 1 - lenBytes <
3900 info->rgRDN[i].rgRDNAttr =
3901 (CERT_RDN_ATTR *)nextData;
3903 ret = CRYPT_AsnDecodeRdn(ptr,
3904 cbEncoded - (ptr - pbEncoded), dwFlags,
3905 &info->rgRDN[i], &size);
3911 bytesNeeded -= size;
3912 ret = CRYPT_GetLen(ptr,
3913 cbEncoded - (ptr - pbEncoded), &nextLen);
3915 ptr += nextLen + 1 +
3916 GET_LEN_BYTES(ptr[1]);
3926 SetLastError(CRYPT_E_ASN1_BADTAG);
3930 __EXCEPT(page_fault)
3932 SetLastError(STATUS_ACCESS_VIOLATION);
3939 static BOOL WINAPI CRYPT_AsnDecodeCopyBytes(DWORD dwCertEncodingType,
3940 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3941 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3944 DWORD bytesNeeded = sizeof(CRYPT_OBJID_BLOB);
3946 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3947 pDecodePara, pvStructInfo, *pcbStructInfo);
3949 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
3950 bytesNeeded += cbEncoded;
3952 *pcbStructInfo = bytesNeeded;
3953 else if (*pcbStructInfo < bytesNeeded)
3955 SetLastError(ERROR_MORE_DATA);
3956 *pcbStructInfo = bytesNeeded;
3961 PCRYPT_OBJID_BLOB blob = (PCRYPT_OBJID_BLOB)pvStructInfo;
3963 *pcbStructInfo = bytesNeeded;
3964 blob->cbData = cbEncoded;
3965 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3966 blob->pbData = (LPBYTE)pbEncoded;
3969 assert(blob->pbData);
3970 memcpy(blob->pbData, pbEncoded, blob->cbData);
3976 static BOOL WINAPI CRYPT_AsnDecodeAlgorithmId(DWORD dwCertEncodingType,
3977 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3978 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3980 CRYPT_ALGORITHM_IDENTIFIER *algo =
3981 (CRYPT_ALGORITHM_IDENTIFIER *)pvStructInfo;
3983 struct AsnDecodeSequenceItem items[] = {
3984 { offsetof(CRYPT_ALGORITHM_IDENTIFIER, pszObjId),
3985 CRYPT_AsnDecodeOidWrapper, sizeof(LPSTR), FALSE, TRUE,
3986 offsetof(CRYPT_ALGORITHM_IDENTIFIER, pszObjId), 0 },
3987 { offsetof(CRYPT_ALGORITHM_IDENTIFIER, Parameters),
3988 CRYPT_AsnDecodeCopyBytes, sizeof(CRYPT_OBJID_BLOB), TRUE, TRUE,
3989 offsetof(CRYPT_ALGORITHM_IDENTIFIER, Parameters.pbData), 0 },
3992 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3993 pDecodePara, pvStructInfo, *pcbStructInfo);
3995 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
3996 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
3997 pDecodePara, pvStructInfo, pcbStructInfo, algo ? algo->pszObjId : NULL);
3998 if (ret && pvStructInfo)
4000 TRACE("pszObjId is %p (%s)\n", algo->pszObjId,
4001 debugstr_a(algo->pszObjId));
4006 static BOOL WINAPI CRYPT_AsnDecodePubKeyInfo(DWORD dwCertEncodingType,
4007 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4008 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4014 struct AsnDecodeSequenceItem items[] = {
4015 { offsetof(CERT_PUBLIC_KEY_INFO, Algorithm),
4016 CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
4017 FALSE, TRUE, offsetof(CERT_PUBLIC_KEY_INFO,
4018 Algorithm.pszObjId) },
4019 { offsetof(CERT_PUBLIC_KEY_INFO, PublicKey),
4020 CRYPT_AsnDecodeBitsInternal, sizeof(CRYPT_BIT_BLOB), FALSE, TRUE,
4021 offsetof(CERT_PUBLIC_KEY_INFO, PublicKey.pbData) },
4024 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
4025 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
4026 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
4028 __EXCEPT(page_fault)
4030 SetLastError(STATUS_ACCESS_VIOLATION);
4037 static BOOL WINAPI CRYPT_AsnDecodeBool(DWORD dwCertEncodingType,
4038 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4039 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4045 SetLastError(CRYPT_E_ASN1_CORRUPT);
4048 if (pbEncoded[0] != ASN_BOOL)
4050 SetLastError(CRYPT_E_ASN1_BADTAG);
4053 if (GET_LEN_BYTES(pbEncoded[1]) > 1)
4055 SetLastError(CRYPT_E_ASN1_CORRUPT);
4058 if (pbEncoded[1] > 1)
4060 SetLastError(CRYPT_E_ASN1_CORRUPT);
4065 *pcbStructInfo = sizeof(BOOL);
4068 else if (*pcbStructInfo < sizeof(BOOL))
4070 *pcbStructInfo = sizeof(BOOL);
4071 SetLastError(ERROR_MORE_DATA);
4076 *(BOOL *)pvStructInfo = pbEncoded[2] ? TRUE : FALSE;
4079 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4083 static BOOL CRYPT_AsnDecodeAltNameEntry(const BYTE *pbEncoded, DWORD cbEncoded,
4084 DWORD dwFlags, CERT_ALT_NAME_ENTRY *entry, DWORD *pcbEntry)
4086 DWORD dataLen, lenBytes, bytesNeeded = sizeof(CERT_ALT_NAME_ENTRY);
4091 SetLastError(CRYPT_E_ASN1_CORRUPT);
4094 if ((pbEncoded[0] & ASN_FLAGS_MASK) != ASN_CONTEXT)
4096 SetLastError(CRYPT_E_ASN1_BADTAG);
4099 lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4100 if (1 + lenBytes > cbEncoded)
4102 SetLastError(CRYPT_E_ASN1_CORRUPT);
4105 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4107 switch (pbEncoded[0] & ASN_TYPE_MASK)
4109 case 1: /* rfc822Name */
4110 case 2: /* dNSName */
4111 case 6: /* uniformResourceIdentifier */
4112 bytesNeeded += (dataLen + 1) * sizeof(WCHAR);
4114 case 7: /* iPAddress */
4115 bytesNeeded += dataLen;
4117 case 8: /* registeredID */
4118 /* FIXME: decode as OID */
4119 case 0: /* otherName */
4120 case 4: /* directoryName */
4122 SetLastError(CRYPT_E_ASN1_BADTAG);
4125 case 3: /* x400Address, unimplemented */
4126 case 5: /* ediPartyName, unimplemented */
4127 SetLastError(CRYPT_E_ASN1_BADTAG);
4131 SetLastError(CRYPT_E_ASN1_CORRUPT);
4137 *pcbEntry = bytesNeeded;
4138 else if (*pcbEntry < bytesNeeded)
4140 SetLastError(ERROR_MORE_DATA);
4145 /* MS used values one greater than the asn1 ones.. sigh */
4146 entry->dwAltNameChoice = (pbEncoded[0] & 0x7f) + 1;
4147 switch (pbEncoded[0] & ASN_TYPE_MASK)
4149 case 1: /* rfc822Name */
4150 case 2: /* dNSName */
4151 case 6: /* uniformResourceIdentifier */
4155 for (i = 0; i < dataLen; i++)
4156 entry->u.pwszURL[i] =
4157 (WCHAR)pbEncoded[1 + lenBytes + i];
4158 entry->u.pwszURL[i] = 0;
4161 case 7: /* iPAddress */
4162 /* The next data pointer is in the pwszURL spot, that is,
4163 * the first 4 bytes. Need to move it to the next spot.
4165 entry->u.IPAddress.pbData = (LPBYTE)entry->u.pwszURL;
4166 entry->u.IPAddress.cbData = dataLen;
4167 memcpy(entry->u.IPAddress.pbData, pbEncoded + 1 + lenBytes,
4177 static BOOL WINAPI CRYPT_AsnDecodeAltName(DWORD dwCertEncodingType,
4178 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4179 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4185 if (pbEncoded[0] == ASN_SEQUENCEOF)
4189 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4191 DWORD bytesNeeded, cEntry = 0;
4192 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4194 bytesNeeded = sizeof(CERT_ALT_NAME_INFO);
4199 for (ptr = pbEncoded + 1 + lenBytes; ret &&
4200 ptr - pbEncoded - 1 - lenBytes < dataLen; )
4204 ret = CRYPT_AsnDecodeAltNameEntry(ptr,
4205 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
4211 bytesNeeded += size;
4212 ret = CRYPT_GetLen(ptr,
4213 cbEncoded - (ptr - pbEncoded), &nextLen);
4215 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
4222 *pcbStructInfo = bytesNeeded;
4223 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
4224 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
4226 CERT_ALT_NAME_INFO *info;
4228 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4229 pvStructInfo = *(BYTE **)pvStructInfo;
4230 info = (CERT_ALT_NAME_INFO *)pvStructInfo;
4231 info->cAltEntry = 0;
4233 info->rgAltEntry = NULL;
4241 (CERT_ALT_NAME_ENTRY *)((BYTE *)pvStructInfo +
4242 sizeof(CERT_ALT_NAME_INFO));
4243 nextData = (BYTE *)info->rgAltEntry +
4244 cEntry * sizeof(CERT_ALT_NAME_ENTRY);
4245 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
4246 i < cEntry && ptr - pbEncoded - 1 - lenBytes <
4249 info->rgAltEntry[i].u.pwszURL =
4252 ret = CRYPT_AsnDecodeAltNameEntry(ptr,
4253 cbEncoded - (ptr - pbEncoded), dwFlags,
4254 &info->rgAltEntry[i], &size);
4261 sizeof(CERT_ALT_NAME_ENTRY);
4262 bytesNeeded -= size;
4263 ret = CRYPT_GetLen(ptr,
4264 cbEncoded - (ptr - pbEncoded), &nextLen);
4266 ptr += nextLen + 1 +
4267 GET_LEN_BYTES(ptr[1]);
4277 SetLastError(CRYPT_E_ASN1_BADTAG);
4281 __EXCEPT(page_fault)
4283 SetLastError(STATUS_ACCESS_VIOLATION);
4290 struct PATH_LEN_CONSTRAINT
4292 BOOL fPathLenConstraint;
4293 DWORD dwPathLenConstraint;
4296 static BOOL WINAPI CRYPT_AsnDecodePathLenConstraint(DWORD dwCertEncodingType,
4297 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4298 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4304 if (pbEncoded[0] == ASN_INTEGER)
4306 DWORD bytesNeeded = sizeof(struct PATH_LEN_CONSTRAINT);
4309 *pcbStructInfo = bytesNeeded;
4310 else if (*pcbStructInfo < bytesNeeded)
4312 SetLastError(ERROR_MORE_DATA);
4313 *pcbStructInfo = bytesNeeded;
4318 struct PATH_LEN_CONSTRAINT *constraint =
4319 (struct PATH_LEN_CONSTRAINT *)pvStructInfo;
4320 DWORD size = sizeof(constraint->dwPathLenConstraint);
4322 ret = CRYPT_AsnDecodeInt(dwCertEncodingType, X509_INTEGER,
4323 pbEncoded, cbEncoded, 0, NULL,
4324 &constraint->dwPathLenConstraint, &size);
4326 constraint->fPathLenConstraint = TRUE;
4327 TRACE("got an int, dwPathLenConstraint is %ld\n",
4328 constraint->dwPathLenConstraint);
4333 SetLastError(CRYPT_E_ASN1_CORRUPT);
4337 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4341 static BOOL WINAPI CRYPT_AsnDecodeBasicConstraints2(DWORD dwCertEncodingType,
4342 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4343 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4349 struct AsnDecodeSequenceItem items[] = {
4350 { offsetof(CERT_BASIC_CONSTRAINTS2_INFO, fCA), CRYPT_AsnDecodeBool,
4351 sizeof(BOOL), TRUE, FALSE, 0, 0 },
4352 { offsetof(CERT_BASIC_CONSTRAINTS2_INFO, fPathLenConstraint),
4353 CRYPT_AsnDecodePathLenConstraint, sizeof(struct PATH_LEN_CONSTRAINT),
4354 TRUE, FALSE, 0, 0 },
4357 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
4358 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
4359 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
4361 __EXCEPT(page_fault)
4363 SetLastError(STATUS_ACCESS_VIOLATION);
4370 #define RSA1_MAGIC 0x31415352
4372 struct DECODED_RSA_PUB_KEY
4375 CRYPT_INTEGER_BLOB modulus;
4378 static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey(DWORD dwCertEncodingType,
4379 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4380 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4386 struct AsnDecodeSequenceItem items[] = {
4387 { offsetof(struct DECODED_RSA_PUB_KEY, modulus),
4388 CRYPT_AsnDecodeIntegerInternal, sizeof(CRYPT_INTEGER_BLOB),
4389 FALSE, TRUE, offsetof(struct DECODED_RSA_PUB_KEY, modulus.pbData),
4391 { offsetof(struct DECODED_RSA_PUB_KEY, pubexp),
4392 CRYPT_AsnDecodeInt, sizeof(DWORD), FALSE, FALSE, 0, 0 },
4394 struct DECODED_RSA_PUB_KEY *decodedKey = NULL;
4397 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
4398 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded,
4399 CRYPT_DECODE_ALLOC_FLAG, NULL, &decodedKey, &size, NULL);
4402 DWORD bytesNeeded = sizeof(BLOBHEADER) + sizeof(RSAPUBKEY) +
4403 decodedKey->modulus.cbData;
4407 *pcbStructInfo = bytesNeeded;
4410 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4411 pvStructInfo, pcbStructInfo, bytesNeeded)))
4414 RSAPUBKEY *rsaPubKey;
4416 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4417 pvStructInfo = *(BYTE **)pvStructInfo;
4418 hdr = (BLOBHEADER *)pvStructInfo;
4419 hdr->bType = PUBLICKEYBLOB;
4420 hdr->bVersion = CUR_BLOB_VERSION;
4422 hdr->aiKeyAlg = CALG_RSA_KEYX;
4423 rsaPubKey = (RSAPUBKEY *)((BYTE *)pvStructInfo +
4424 sizeof(BLOBHEADER));
4425 rsaPubKey->magic = RSA1_MAGIC;
4426 rsaPubKey->pubexp = decodedKey->pubexp;
4427 rsaPubKey->bitlen = decodedKey->modulus.cbData * 8;
4428 memcpy((BYTE *)pvStructInfo + sizeof(BLOBHEADER) +
4429 sizeof(RSAPUBKEY), decodedKey->modulus.pbData,
4430 decodedKey->modulus.cbData);
4432 LocalFree(decodedKey);
4435 __EXCEPT(page_fault)
4437 SetLastError(STATUS_ACCESS_VIOLATION);
4444 static BOOL WINAPI CRYPT_AsnDecodeOctetsInternal(DWORD dwCertEncodingType,
4445 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4446 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4450 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
4451 pDecodePara, pvStructInfo, *pcbStructInfo);
4453 if (pbEncoded[0] == ASN_OCTETSTRING)
4455 DWORD bytesNeeded, dataLen;
4457 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4459 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4460 bytesNeeded = sizeof(CRYPT_DATA_BLOB);
4462 bytesNeeded = dataLen + sizeof(CRYPT_DATA_BLOB);
4464 *pcbStructInfo = bytesNeeded;
4465 else if (*pcbStructInfo < bytesNeeded)
4467 SetLastError(ERROR_MORE_DATA);
4468 *pcbStructInfo = bytesNeeded;
4473 CRYPT_DATA_BLOB *blob;
4474 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4476 blob = (CRYPT_DATA_BLOB *)pvStructInfo;
4477 blob->cbData = dataLen;
4478 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4479 blob->pbData = (BYTE *)pbEncoded + 1 + lenBytes;
4482 assert(blob->pbData);
4484 memcpy(blob->pbData, pbEncoded + 1 + lenBytes,
4492 SetLastError(CRYPT_E_ASN1_BADTAG);
4498 static BOOL WINAPI CRYPT_AsnDecodeOctets(DWORD dwCertEncodingType,
4499 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4500 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4504 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
4505 pDecodePara, pvStructInfo, *pcbStructInfo);
4511 if ((ret = CRYPT_AsnDecodeOctetsInternal(dwCertEncodingType,
4512 lpszStructType, pbEncoded, cbEncoded,
4513 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL, &bytesNeeded)))
4516 *pcbStructInfo = bytesNeeded;
4517 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4518 pvStructInfo, pcbStructInfo, bytesNeeded)))
4520 CRYPT_DATA_BLOB *blob;
4522 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4523 pvStructInfo = *(BYTE **)pvStructInfo;
4524 blob = (CRYPT_DATA_BLOB *)pvStructInfo;
4525 blob->pbData = (BYTE *)pvStructInfo + sizeof(CRYPT_DATA_BLOB);
4526 ret = CRYPT_AsnDecodeOctetsInternal(dwCertEncodingType,
4527 lpszStructType, pbEncoded, cbEncoded,
4528 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pvStructInfo,
4534 SetLastError(CRYPT_E_ASN1_BADTAG);
4538 __EXCEPT(page_fault)
4540 SetLastError(STATUS_ACCESS_VIOLATION);
4547 static BOOL WINAPI CRYPT_AsnDecodeBitsInternal(DWORD dwCertEncodingType,
4548 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4549 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4553 TRACE("(%p, %ld, 0x%08lx, %p, %p, %ld)\n", pbEncoded, cbEncoded, dwFlags,
4554 pDecodePara, pvStructInfo, *pcbStructInfo);
4556 if (pbEncoded[0] == ASN_BITSTRING)
4558 DWORD bytesNeeded, dataLen;
4560 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4562 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4563 bytesNeeded = sizeof(CRYPT_BIT_BLOB);
4565 bytesNeeded = dataLen - 1 + sizeof(CRYPT_BIT_BLOB);
4567 *pcbStructInfo = bytesNeeded;
4568 else if (*pcbStructInfo < bytesNeeded)
4570 *pcbStructInfo = bytesNeeded;
4571 SetLastError(ERROR_MORE_DATA);
4576 CRYPT_BIT_BLOB *blob;
4578 blob = (CRYPT_BIT_BLOB *)pvStructInfo;
4579 blob->cbData = dataLen - 1;
4580 blob->cUnusedBits = *(pbEncoded + 1 +
4581 GET_LEN_BYTES(pbEncoded[1]));
4582 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4584 blob->pbData = (BYTE *)pbEncoded + 2 +
4585 GET_LEN_BYTES(pbEncoded[1]);
4589 assert(blob->pbData);
4592 BYTE mask = 0xff << blob->cUnusedBits;
4594 memcpy(blob->pbData, pbEncoded + 2 +
4595 GET_LEN_BYTES(pbEncoded[1]), blob->cbData);
4596 blob->pbData[blob->cbData - 1] &= mask;
4604 SetLastError(CRYPT_E_ASN1_BADTAG);
4607 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4611 static BOOL WINAPI CRYPT_AsnDecodeBits(DWORD dwCertEncodingType,
4612 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4613 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4617 TRACE("(%p, %ld, 0x%08lx, %p, %p, %p)\n", pbEncoded, cbEncoded, dwFlags,
4618 pDecodePara, pvStructInfo, pcbStructInfo);
4624 if ((ret = CRYPT_AsnDecodeBitsInternal(dwCertEncodingType,
4625 lpszStructType, pbEncoded, cbEncoded,
4626 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL, &bytesNeeded)))
4629 *pcbStructInfo = bytesNeeded;
4630 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4631 pvStructInfo, pcbStructInfo, bytesNeeded)))
4633 CRYPT_BIT_BLOB *blob;
4635 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4636 pvStructInfo = *(BYTE **)pvStructInfo;
4637 blob = (CRYPT_BIT_BLOB *)pvStructInfo;
4638 blob->pbData = (BYTE *)pvStructInfo + sizeof(CRYPT_BIT_BLOB);
4639 ret = CRYPT_AsnDecodeBitsInternal(dwCertEncodingType,
4640 lpszStructType, pbEncoded, cbEncoded,
4641 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pvStructInfo,
4646 __EXCEPT(page_fault)
4648 SetLastError(STATUS_ACCESS_VIOLATION);
4652 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4656 static BOOL WINAPI CRYPT_AsnDecodeInt(DWORD dwCertEncodingType,
4657 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4658 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4664 *pcbStructInfo = sizeof(int);
4669 BYTE buf[sizeof(CRYPT_INTEGER_BLOB) + sizeof(int)];
4670 CRYPT_INTEGER_BLOB *blob = (CRYPT_INTEGER_BLOB *)buf;
4671 DWORD size = sizeof(buf);
4673 blob->pbData = buf + sizeof(CRYPT_INTEGER_BLOB);
4674 ret = CRYPT_AsnDecodeIntegerInternal(dwCertEncodingType,
4675 X509_MULTI_BYTE_INTEGER, pbEncoded, cbEncoded, 0, NULL, &buf, &size);
4678 if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4679 pvStructInfo, pcbStructInfo, sizeof(int))))
4683 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4684 pvStructInfo = *(BYTE **)pvStructInfo;
4685 if (blob->pbData[blob->cbData - 1] & 0x80)
4687 /* initialize to a negative value to sign-extend */
4692 for (i = 0; i < blob->cbData; i++)
4695 val |= blob->pbData[blob->cbData - i - 1];
4697 memcpy(pvStructInfo, &val, sizeof(int));
4700 else if (GetLastError() == ERROR_MORE_DATA)
4701 SetLastError(CRYPT_E_ASN1_LARGE);
4703 __EXCEPT(page_fault)
4705 SetLastError(STATUS_ACCESS_VIOLATION);
4712 static BOOL WINAPI CRYPT_AsnDecodeIntegerInternal(DWORD dwCertEncodingType,
4713 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4714 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4718 if (pbEncoded[0] == ASN_INTEGER)
4720 DWORD bytesNeeded, dataLen;
4722 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4724 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4726 bytesNeeded = dataLen + sizeof(CRYPT_INTEGER_BLOB);
4728 *pcbStructInfo = bytesNeeded;
4729 else if (*pcbStructInfo < bytesNeeded)
4731 *pcbStructInfo = bytesNeeded;
4732 SetLastError(ERROR_MORE_DATA);
4737 CRYPT_INTEGER_BLOB *blob = (CRYPT_INTEGER_BLOB *)pvStructInfo;
4739 blob->cbData = dataLen;
4740 assert(blob->pbData);
4745 for (i = 0; i < blob->cbData; i++)
4747 blob->pbData[i] = *(pbEncoded + 1 + lenBytes +
4756 SetLastError(CRYPT_E_ASN1_BADTAG);
4762 static BOOL WINAPI CRYPT_AsnDecodeInteger(DWORD dwCertEncodingType,
4763 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4764 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4772 if ((ret = CRYPT_AsnDecodeIntegerInternal(dwCertEncodingType,
4773 lpszStructType, pbEncoded, cbEncoded,
4774 dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, NULL, &bytesNeeded)))
4777 *pcbStructInfo = bytesNeeded;
4778 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4779 pvStructInfo, pcbStructInfo, bytesNeeded)))
4781 CRYPT_INTEGER_BLOB *blob;
4783 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4784 pvStructInfo = *(BYTE **)pvStructInfo;
4785 blob = (CRYPT_INTEGER_BLOB *)pvStructInfo;
4786 blob->pbData = (BYTE *)pvStructInfo +
4787 sizeof(CRYPT_INTEGER_BLOB);
4788 ret = CRYPT_AsnDecodeIntegerInternal(dwCertEncodingType,
4789 lpszStructType, pbEncoded, cbEncoded,
4790 dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, pvStructInfo,
4795 __EXCEPT(page_fault)
4797 SetLastError(STATUS_ACCESS_VIOLATION);
4804 static BOOL WINAPI CRYPT_AsnDecodeUnsignedInteger(DWORD dwCertEncodingType,
4805 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4806 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4812 if (pbEncoded[0] == ASN_INTEGER)
4814 DWORD bytesNeeded, dataLen;
4815 CRYPT_INTEGER_BLOB *blob;
4817 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4819 bytesNeeded = dataLen + sizeof(CRYPT_INTEGER_BLOB);
4821 *pcbStructInfo = bytesNeeded;
4822 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4823 pvStructInfo, pcbStructInfo, bytesNeeded)))
4825 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4827 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4828 pvStructInfo = *(BYTE **)pvStructInfo;
4829 blob = (CRYPT_INTEGER_BLOB *)pvStructInfo;
4830 blob->cbData = dataLen;
4831 blob->pbData = (BYTE *)pvStructInfo +
4832 sizeof(CRYPT_INTEGER_BLOB);
4833 /* remove leading zero byte if it exists */
4834 if (blob->cbData && *(pbEncoded + 1 + lenBytes) == 0)
4843 for (i = 0; i < blob->cbData; i++)
4844 blob->pbData[i] = *(pbEncoded + 1 + lenBytes +
4845 pbEncoded[1] - i - 1);
4852 SetLastError(CRYPT_E_ASN1_BADTAG);
4856 __EXCEPT(page_fault)
4858 SetLastError(STATUS_ACCESS_VIOLATION);
4865 static BOOL WINAPI CRYPT_AsnDecodeEnumerated(DWORD dwCertEncodingType,
4866 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4867 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4873 *pcbStructInfo = sizeof(int);
4878 if (pbEncoded[0] == ASN_ENUMERATED)
4880 unsigned int val = 0, i;
4884 SetLastError(CRYPT_E_ASN1_EOD);
4887 else if (pbEncoded[1] == 0)
4889 SetLastError(CRYPT_E_ASN1_CORRUPT);
4894 /* A little strange looking, but we have to accept a sign byte:
4895 * 0xffffffff gets encoded as 0a 05 00 ff ff ff ff. Also,
4896 * assuming a small length is okay here, it has to be in short
4899 if (pbEncoded[1] > sizeof(unsigned int) + 1)
4901 SetLastError(CRYPT_E_ASN1_LARGE);
4904 for (i = 0; i < pbEncoded[1]; i++)
4907 val |= pbEncoded[2 + i];
4909 if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4910 pvStructInfo, pcbStructInfo, sizeof(unsigned int))))
4912 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4913 pvStructInfo = *(BYTE **)pvStructInfo;
4914 memcpy(pvStructInfo, &val, sizeof(unsigned int));
4920 SetLastError(CRYPT_E_ASN1_BADTAG);
4924 __EXCEPT(page_fault)
4926 SetLastError(STATUS_ACCESS_VIOLATION);
4933 /* Modifies word, pbEncoded, and len, and magically sets a value ret to FALSE
4936 #define CRYPT_TIME_GET_DIGITS(pbEncoded, len, numDigits, word) \
4941 for (i = 0; (len) > 0 && i < (numDigits); i++, (len)--) \
4943 if (!isdigit(*(pbEncoded))) \
4945 SetLastError(CRYPT_E_ASN1_CORRUPT); \
4951 (word) += *(pbEncoded)++ - '0'; \
4956 static BOOL CRYPT_AsnDecodeTimeZone(const BYTE *pbEncoded, DWORD len,
4957 SYSTEMTIME *sysTime)
4964 if (len >= 3 && (*pbEncoded == '+' || *pbEncoded == '-'))
4966 WORD hours, minutes = 0;
4967 BYTE sign = *pbEncoded++;
4970 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, hours);
4971 if (ret && hours >= 24)
4973 SetLastError(CRYPT_E_ASN1_CORRUPT);
4978 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, minutes);
4979 if (ret && minutes >= 60)
4981 SetLastError(CRYPT_E_ASN1_CORRUPT);
4989 sysTime->wHour += hours;
4990 sysTime->wMinute += minutes;
4994 if (hours > sysTime->wHour)
4997 sysTime->wHour = 24 - (hours - sysTime->wHour);
5000 sysTime->wHour -= hours;
5001 if (minutes > sysTime->wMinute)
5004 sysTime->wMinute = 60 - (minutes - sysTime->wMinute);
5007 sysTime->wMinute -= minutes;
5012 __EXCEPT(page_fault)
5014 SetLastError(STATUS_ACCESS_VIOLATION);
5021 #define MIN_ENCODED_TIME_LENGTH 10
5023 static BOOL WINAPI CRYPT_AsnDecodeUtcTime(DWORD dwCertEncodingType,
5024 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5025 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5031 *pcbStructInfo = sizeof(FILETIME);
5037 if (pbEncoded[0] == ASN_UTCTIME)
5041 SetLastError(CRYPT_E_ASN1_EOD);
5044 else if (pbEncoded[1] > 0x7f)
5046 /* long-form date strings really can't be valid */
5047 SetLastError(CRYPT_E_ASN1_CORRUPT);
5052 SYSTEMTIME sysTime = { 0 };
5053 BYTE len = pbEncoded[1];
5055 if (len < MIN_ENCODED_TIME_LENGTH)
5057 SetLastError(CRYPT_E_ASN1_CORRUPT);
5063 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wYear);
5064 if (sysTime.wYear >= 50)
5065 sysTime.wYear += 1900;
5067 sysTime.wYear += 2000;
5068 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMonth);
5069 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wDay);
5070 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wHour);
5071 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMinute);
5074 if (len >= 2 && isdigit(*pbEncoded) &&
5075 isdigit(*(pbEncoded + 1)))
5076 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
5078 else if (isdigit(*pbEncoded))
5079 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 1,
5082 ret = CRYPT_AsnDecodeTimeZone(pbEncoded, len,
5085 if (ret && (ret = CRYPT_DecodeEnsureSpace(dwFlags,
5086 pDecodePara, pvStructInfo, pcbStructInfo,
5089 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5090 pvStructInfo = *(BYTE **)pvStructInfo;
5091 ret = SystemTimeToFileTime(&sysTime,
5092 (FILETIME *)pvStructInfo);
5099 SetLastError(CRYPT_E_ASN1_BADTAG);
5103 __EXCEPT(page_fault)
5105 SetLastError(STATUS_ACCESS_VIOLATION);
5112 static BOOL WINAPI CRYPT_AsnDecodeGeneralizedTime(DWORD dwCertEncodingType,
5113 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5114 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5120 *pcbStructInfo = sizeof(FILETIME);
5126 if (pbEncoded[0] == ASN_GENERALTIME)
5130 SetLastError(CRYPT_E_ASN1_EOD);
5133 else if (pbEncoded[1] > 0x7f)
5135 /* long-form date strings really can't be valid */
5136 SetLastError(CRYPT_E_ASN1_CORRUPT);
5141 BYTE len = pbEncoded[1];
5143 if (len < MIN_ENCODED_TIME_LENGTH)
5145 SetLastError(CRYPT_E_ASN1_CORRUPT);
5150 SYSTEMTIME sysTime = { 0 };
5153 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 4, sysTime.wYear);
5154 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMonth);
5155 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wDay);
5156 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wHour);
5159 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
5162 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
5164 if (ret && len > 0 && (*pbEncoded == '.' ||
5171 /* workaround macro weirdness */
5172 digits = min(len, 3);
5173 CRYPT_TIME_GET_DIGITS(pbEncoded, len, digits,
5174 sysTime.wMilliseconds);
5177 ret = CRYPT_AsnDecodeTimeZone(pbEncoded, len,
5180 if (ret && (ret = CRYPT_DecodeEnsureSpace(dwFlags,
5181 pDecodePara, pvStructInfo, pcbStructInfo,
5184 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5185 pvStructInfo = *(BYTE **)pvStructInfo;
5186 ret = SystemTimeToFileTime(&sysTime,
5187 (FILETIME *)pvStructInfo);
5194 SetLastError(CRYPT_E_ASN1_BADTAG);
5198 __EXCEPT(page_fault)
5200 SetLastError(STATUS_ACCESS_VIOLATION);
5207 static BOOL WINAPI CRYPT_AsnDecodeChoiceOfTime(DWORD dwCertEncodingType,
5208 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5209 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5215 if (pbEncoded[0] == ASN_UTCTIME)
5216 ret = CRYPT_AsnDecodeUtcTime(dwCertEncodingType, lpszStructType,
5217 pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
5219 else if (pbEncoded[0] == ASN_GENERALTIME)
5220 ret = CRYPT_AsnDecodeGeneralizedTime(dwCertEncodingType,
5221 lpszStructType, pbEncoded, cbEncoded, dwFlags, pDecodePara,
5222 pvStructInfo, pcbStructInfo);
5225 SetLastError(CRYPT_E_ASN1_BADTAG);
5229 __EXCEPT(page_fault)
5231 SetLastError(STATUS_ACCESS_VIOLATION);
5238 static BOOL WINAPI CRYPT_AsnDecodeSequenceOfAny(DWORD dwCertEncodingType,
5239 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5240 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5246 if (pbEncoded[0] == ASN_SEQUENCEOF)
5248 DWORD bytesNeeded, dataLen, remainingLen, cValue;
5250 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
5255 lenBytes = GET_LEN_BYTES(pbEncoded[1]);
5256 bytesNeeded = sizeof(CRYPT_SEQUENCE_OF_ANY);
5258 ptr = pbEncoded + 1 + lenBytes;
5259 remainingLen = dataLen;
5260 while (ret && remainingLen)
5264 ret = CRYPT_GetLen(ptr, remainingLen, &nextLen);
5267 DWORD nextLenBytes = GET_LEN_BYTES(ptr[1]);
5269 remainingLen -= 1 + nextLenBytes + nextLen;
5270 ptr += 1 + nextLenBytes + nextLen;
5271 bytesNeeded += sizeof(CRYPT_DER_BLOB);
5272 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
5273 bytesNeeded += 1 + nextLenBytes + nextLen;
5279 CRYPT_SEQUENCE_OF_ANY *seq;
5283 if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
5284 pvStructInfo, pcbStructInfo, bytesNeeded)))
5286 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5287 pvStructInfo = *(BYTE **)pvStructInfo;
5288 seq = (CRYPT_SEQUENCE_OF_ANY *)pvStructInfo;
5289 seq->cValue = cValue;
5290 seq->rgValue = (CRYPT_DER_BLOB *)((BYTE *)seq +
5292 nextPtr = (BYTE *)seq->rgValue +
5293 cValue * sizeof(CRYPT_DER_BLOB);
5294 ptr = pbEncoded + 1 + lenBytes;
5295 remainingLen = dataLen;
5297 while (ret && remainingLen)
5301 ret = CRYPT_GetLen(ptr, remainingLen, &nextLen);
5304 DWORD nextLenBytes = GET_LEN_BYTES(ptr[1]);
5306 seq->rgValue[i].cbData = 1 + nextLenBytes +
5308 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
5309 seq->rgValue[i].pbData = (BYTE *)ptr;
5312 seq->rgValue[i].pbData = nextPtr;
5313 memcpy(nextPtr, ptr, 1 + nextLenBytes +
5315 nextPtr += 1 + nextLenBytes + nextLen;
5317 remainingLen -= 1 + nextLenBytes + nextLen;
5318 ptr += 1 + nextLenBytes + nextLen;
5328 SetLastError(CRYPT_E_ASN1_BADTAG);
5332 __EXCEPT(page_fault)
5334 SetLastError(STATUS_ACCESS_VIOLATION);
5341 BOOL WINAPI CryptDecodeObjectEx(DWORD dwCertEncodingType, LPCSTR lpszStructType,
5342 const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5343 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5347 CryptDecodeObjectExFunc decodeFunc = NULL;
5349 TRACE("(0x%08lx, %s, %p, %ld, 0x%08lx, %p, %p, %p)\n",
5350 dwCertEncodingType, debugstr_a(lpszStructType), pbEncoded,
5351 cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo);
5353 if (!pvStructInfo && !pcbStructInfo)
5355 SetLastError(ERROR_INVALID_PARAMETER);
5358 if ((dwCertEncodingType & CERT_ENCODING_TYPE_MASK) != X509_ASN_ENCODING
5359 && (dwCertEncodingType & CMSG_ENCODING_TYPE_MASK) != PKCS_7_ASN_ENCODING)
5361 SetLastError(ERROR_FILE_NOT_FOUND);
5366 SetLastError(CRYPT_E_ASN1_EOD);
5369 if (cbEncoded > MAX_ENCODED_LEN)
5371 SetLastError(CRYPT_E_ASN1_LARGE);
5375 SetLastError(NOERROR);
5376 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG && pvStructInfo)
5377 *(BYTE **)pvStructInfo = NULL;
5378 if (!HIWORD(lpszStructType))
5380 switch (LOWORD(lpszStructType))
5382 case (WORD)X509_CERT:
5383 decodeFunc = CRYPT_AsnDecodeCert;
5385 case (WORD)X509_CERT_TO_BE_SIGNED:
5386 decodeFunc = CRYPT_AsnDecodeCertInfo;
5388 case (WORD)X509_CERT_CRL_TO_BE_SIGNED:
5389 decodeFunc = CRYPT_AsnDecodeCRLInfo;
5391 case (WORD)X509_EXTENSIONS:
5392 decodeFunc = CRYPT_AsnDecodeExtensions;
5394 case (WORD)X509_NAME:
5395 decodeFunc = CRYPT_AsnDecodeName;
5397 case (WORD)X509_PUBLIC_KEY_INFO:
5398 decodeFunc = CRYPT_AsnDecodePubKeyInfo;
5400 case (WORD)X509_ALTERNATE_NAME:
5401 decodeFunc = CRYPT_AsnDecodeAltName;
5403 case (WORD)X509_BASIC_CONSTRAINTS2:
5404 decodeFunc = CRYPT_AsnDecodeBasicConstraints2;
5406 case (WORD)RSA_CSP_PUBLICKEYBLOB:
5407 decodeFunc = CRYPT_AsnDecodeRsaPubKey;
5409 case (WORD)X509_OCTET_STRING:
5410 decodeFunc = CRYPT_AsnDecodeOctets;
5412 case (WORD)X509_BITS:
5413 case (WORD)X509_KEY_USAGE:
5414 decodeFunc = CRYPT_AsnDecodeBits;
5416 case (WORD)X509_INTEGER:
5417 decodeFunc = CRYPT_AsnDecodeInt;
5419 case (WORD)X509_MULTI_BYTE_INTEGER:
5420 decodeFunc = CRYPT_AsnDecodeInteger;
5422 case (WORD)X509_MULTI_BYTE_UINT:
5423 decodeFunc = CRYPT_AsnDecodeUnsignedInteger;
5425 case (WORD)X509_ENUMERATED:
5426 decodeFunc = CRYPT_AsnDecodeEnumerated;
5428 case (WORD)X509_CHOICE_OF_TIME:
5429 decodeFunc = CRYPT_AsnDecodeChoiceOfTime;
5431 case (WORD)X509_SEQUENCE_OF_ANY:
5432 decodeFunc = CRYPT_AsnDecodeSequenceOfAny;
5434 case (WORD)PKCS_UTC_TIME:
5435 decodeFunc = CRYPT_AsnDecodeUtcTime;
5438 FIXME("%d: unimplemented\n", LOWORD(lpszStructType));
5441 else if (!strcmp(lpszStructType, szOID_CERT_EXTENSIONS))
5442 decodeFunc = CRYPT_AsnDecodeExtensions;
5443 else if (!strcmp(lpszStructType, szOID_RSA_RSA))
5444 decodeFunc = CRYPT_AsnDecodeRsaPubKey;
5445 else if (!strcmp(lpszStructType, szOID_RSA_signingTime))
5446 decodeFunc = CRYPT_AsnDecodeUtcTime;
5447 else if (!strcmp(lpszStructType, szOID_CRL_REASON_CODE))
5448 decodeFunc = CRYPT_AsnDecodeEnumerated;
5449 else if (!strcmp(lpszStructType, szOID_KEY_USAGE))
5450 decodeFunc = CRYPT_AsnDecodeBits;
5451 else if (!strcmp(lpszStructType, szOID_SUBJECT_KEY_IDENTIFIER))
5452 decodeFunc = CRYPT_AsnDecodeOctets;
5453 else if (!strcmp(lpszStructType, szOID_BASIC_CONSTRAINTS2))
5454 decodeFunc = CRYPT_AsnDecodeBasicConstraints2;
5455 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME))
5456 decodeFunc = CRYPT_AsnDecodeAltName;
5457 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME2))
5458 decodeFunc = CRYPT_AsnDecodeAltName;
5459 else if (!strcmp(lpszStructType, szOID_NEXT_UPDATE_LOCATION))
5460 decodeFunc = CRYPT_AsnDecodeAltName;
5461 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME))
5462 decodeFunc = CRYPT_AsnDecodeAltName;
5463 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME2))
5464 decodeFunc = CRYPT_AsnDecodeAltName;
5466 TRACE("OID %s not found or unimplemented, looking for DLL\n",
5467 debugstr_a(lpszStructType));
5469 decodeFunc = (CryptDecodeObjectExFunc)CRYPT_GetFunc(dwCertEncodingType,
5470 lpszStructType, "CryptDecodeObjectEx", &lib);
5472 ret = decodeFunc(dwCertEncodingType, lpszStructType, pbEncoded,
5473 cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo);
5475 SetLastError(ERROR_FILE_NOT_FOUND);
5481 BOOL WINAPI CryptExportPublicKeyInfo(HCRYPTPROV hCryptProv, DWORD dwKeySpec,
5482 DWORD dwCertEncodingType, PCERT_PUBLIC_KEY_INFO pInfo, DWORD *pcbInfo)
5484 return CryptExportPublicKeyInfoEx(hCryptProv, dwKeySpec, dwCertEncodingType,
5485 NULL, 0, NULL, pInfo, pcbInfo);
5488 BOOL WINAPI CryptExportPublicKeyInfoEx(HCRYPTPROV hCryptProv, DWORD dwKeySpec,
5489 DWORD dwCertEncodingType, LPSTR pszPublicKeyObjId, DWORD dwFlags,
5490 void *pvAuxInfo, PCERT_PUBLIC_KEY_INFO pInfo, DWORD *pcbInfo)
5495 TRACE("(%ld, %ld, %08lx, %s, %08lx, %p, %p, %p)\n", hCryptProv, dwKeySpec,
5496 dwCertEncodingType, debugstr_a(pszPublicKeyObjId), dwFlags, pvAuxInfo,
5501 SetLastError(ERROR_INVALID_PARAMETER);
5505 if (!pszPublicKeyObjId)
5506 pszPublicKeyObjId = szOID_RSA_RSA;
5507 if ((ret = CryptGetUserKey(hCryptProv, dwKeySpec, &key)))
5511 ret = CryptExportKey(key, 0, PUBLICKEYBLOB, 0, NULL, &keySize);
5514 LPBYTE pubKey = HeapAlloc(GetProcessHeap(), 0, keySize);
5518 ret = CryptExportKey(key, 0, PUBLICKEYBLOB, 0, pubKey,
5522 DWORD encodedLen = 0;
5524 ret = CryptEncodeObject(dwCertEncodingType,
5525 pszPublicKeyObjId, pubKey, NULL, &encodedLen);
5528 DWORD sizeNeeded = sizeof(CERT_PUBLIC_KEY_INFO) +
5529 strlen(pszPublicKeyObjId) + 1 + encodedLen;
5532 *pcbInfo = sizeNeeded;
5533 else if (*pcbInfo < sizeNeeded)
5535 SetLastError(ERROR_MORE_DATA);
5536 *pcbInfo = sizeNeeded;
5541 pInfo->Algorithm.pszObjId = (char *)pInfo +
5542 sizeof(CERT_PUBLIC_KEY_INFO);
5543 lstrcpyA(pInfo->Algorithm.pszObjId,
5545 pInfo->Algorithm.Parameters.cbData = 0;
5546 pInfo->Algorithm.Parameters.pbData = NULL;
5547 pInfo->PublicKey.pbData = (BYTE *)pInfo->Algorithm.pszObjId
5548 + lstrlenA(pInfo->Algorithm.pszObjId) + 1;
5549 pInfo->PublicKey.cbData = encodedLen;
5550 pInfo->PublicKey.cUnusedBits = 0;
5551 ret = CryptEncodeObject(dwCertEncodingType,
5552 pszPublicKeyObjId, pubKey, pInfo->PublicKey.pbData,
5553 &pInfo->PublicKey.cbData);
5557 HeapFree(GetProcessHeap(), 0, pubKey);
5562 CryptDestroyKey(key);
5567 BOOL WINAPI CryptImportPublicKeyInfo(HCRYPTPROV hCryptProv,
5568 DWORD dwCertEncodingType, PCERT_PUBLIC_KEY_INFO pInfo, HCRYPTKEY *phKey)
5570 return CryptImportPublicKeyInfoEx(hCryptProv, dwCertEncodingType, pInfo,
5574 BOOL WINAPI CryptImportPublicKeyInfoEx(HCRYPTPROV hCryptProv,
5575 DWORD dwCertEncodingType, PCERT_PUBLIC_KEY_INFO pInfo, ALG_ID aiKeyAlg,
5576 DWORD dwFlags, void *pvAuxInfo, HCRYPTKEY *phKey)
5579 DWORD pubKeySize = 0;
5581 TRACE("(%ld, %ld, %p, %d, %08lx, %p, %p)\n", hCryptProv,
5582 dwCertEncodingType, pInfo, aiKeyAlg, dwFlags, pvAuxInfo, phKey);
5584 ret = CryptDecodeObject(dwCertEncodingType, pInfo->Algorithm.pszObjId,
5585 pInfo->PublicKey.pbData, pInfo->PublicKey.cbData, 0, NULL, &pubKeySize);
5588 LPBYTE pubKey = HeapAlloc(GetProcessHeap(), 0, pubKeySize);
5592 ret = CryptDecodeObject(dwCertEncodingType,
5593 pInfo->Algorithm.pszObjId, pInfo->PublicKey.pbData,
5594 pInfo->PublicKey.cbData, 0, pubKey, &pubKeySize);
5596 ret = CryptImportKey(hCryptProv, pubKey, pubKeySize, 0, 0,
5598 HeapFree(GetProcessHeap(), 0, pubKey);