2 * Copyright 2002 Mike McCormack for CodeWeavers
3 * Copyright 2005 Juan Lang
5 * This library is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU Lesser General Public
7 * License as published by the Free Software Foundation; either
8 * version 2.1 of the License, or (at your option) any later version.
10 * This library is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
13 * Lesser General Public License for more details.
15 * You should have received a copy of the GNU Lesser General Public
16 * License along with this library; if not, write to the Free Software
17 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19 * This file implements ASN.1 DER encoding and decoding of a limited set of
20 * types. It isn't a full ASN.1 implementation. Microsoft implements BER
21 * encoding of many of the basic types in msasn1.dll, but that interface is
22 * undocumented, so I implement them here.
25 * "A Layman's Guide to a Subset of ASN.1, BER, and DER", by Burton Kaliski
26 * (available online, look for a PDF copy as the HTML versions tend to have
27 * translation errors.)
29 * RFC3280, http://www.faqs.org/rfcs/rfc3280.html
32 * http://msdn.microsoft.com/library/en-us/seccrypto/security/constants_for_cryptencodeobject_and_cryptdecodeobject.asp
39 #define NONAMELESSUNION
47 #include "wine/debug.h"
48 #include "wine/exception.h"
50 /* This is a bit arbitrary, but to set some limit: */
51 #define MAX_ENCODED_LEN 0x02000000
53 /* a few asn.1 tags we need */
54 #define ASN_BOOL (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x01)
55 #define ASN_BITSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x03)
56 #define ASN_OCTETSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x04)
57 #define ASN_ENUMERATED (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x0a)
58 #define ASN_SETOF (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x11)
59 #define ASN_NUMERICSTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x12)
60 #define ASN_PRINTABLESTRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x13)
61 #define ASN_IA5STRING (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x16)
62 #define ASN_UTCTIME (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x17)
63 #define ASN_GENERALTIME (ASN_UNIVERSAL | ASN_PRIMITIVE | 0x18)
65 #define ASN_FLAGS_MASK 0xf0
66 #define ASN_TYPE_MASK 0x0f
68 WINE_DEFAULT_DEBUG_CHANNEL(crypt);
70 static const WCHAR szDllName[] = { 'D','l','l',0 };
72 typedef BOOL (WINAPI *CryptEncodeObjectFunc)(DWORD, LPCSTR, const void *,
74 typedef BOOL (WINAPI *CryptEncodeObjectExFunc)(DWORD, LPCSTR, const void *,
75 DWORD, PCRYPT_ENCODE_PARA, BYTE *, DWORD *);
76 typedef BOOL (WINAPI *CryptDecodeObjectFunc)(DWORD, LPCSTR, const BYTE *,
77 DWORD, DWORD, void *, DWORD *);
78 typedef BOOL (WINAPI *CryptDecodeObjectExFunc)(DWORD, LPCSTR, const BYTE *,
79 DWORD, DWORD, PCRYPT_DECODE_PARA, void *, DWORD *);
81 /* Prototypes for built-in encoders/decoders. They follow the Ex style
82 * prototypes. The dwCertEncodingType and lpszStructType are ignored by the
83 * built-in functions, but the parameters are retained to simplify
84 * CryptEncodeObjectEx/CryptDecodeObjectEx, since they must call functions in
85 * external DLLs that follow these signatures.
86 * FIXME: some built-in functions are suitable to be called directly by
87 * CryptEncodeObjectEx/CryptDecodeObjectEx (they implement exception handling
88 * and memory allocation if requested), others are only suitable to be called
89 * internally. Comment which are which.
91 static BOOL WINAPI CRYPT_AsnEncodeOid(DWORD dwCertEncodingType,
92 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
93 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
94 static BOOL WINAPI CRYPT_AsnEncodeExtensions(DWORD dwCertEncodingType,
95 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
96 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
97 static BOOL WINAPI CRYPT_AsnEncodeBool(DWORD dwCertEncodingType,
98 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
99 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
100 static BOOL WINAPI CRYPT_AsnEncodePubKeyInfo(DWORD dwCertEncodingType,
101 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
102 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
103 static BOOL WINAPI CRYPT_AsnEncodeOctets(DWORD dwCertEncodingType,
104 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
105 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
106 static BOOL WINAPI CRYPT_AsnEncodeBits(DWORD dwCertEncodingType,
107 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
108 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
109 static BOOL WINAPI CRYPT_AsnEncodeBitsSwapBytes(DWORD dwCertEncodingType,
110 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
111 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
112 static BOOL WINAPI CRYPT_AsnEncodeInt(DWORD dwCertEncodingType,
113 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
114 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
115 static BOOL WINAPI CRYPT_AsnEncodeInteger(DWORD dwCertEncodingType,
116 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
117 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
118 static BOOL WINAPI CRYPT_AsnEncodeChoiceOfTime(DWORD dwCertEncodingType,
119 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
120 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded);
122 static BOOL WINAPI CRYPT_AsnDecodeChoiceOfTime(DWORD dwCertEncodingType,
123 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
124 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
125 static BOOL WINAPI CRYPT_AsnDecodePubKeyInfo(DWORD dwCertEncodingType,
126 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
127 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
128 /* Like CRYPT_AsnDecodeExtensions, except assumes rgExtension is set ahead of
129 * time, doesn't do memory allocation, and doesn't do exception handling.
130 * (This isn't intended to be the externally-called one.)
132 static BOOL WINAPI CRYPT_AsnDecodeExtensionsInternal(DWORD dwCertEncodingType,
133 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
134 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
135 static BOOL WINAPI CRYPT_AsnDecodeOid(const BYTE *pbEncoded, DWORD cbEncoded,
136 DWORD dwFlags, LPSTR pszObjId, DWORD *pcbObjId);
137 /* Assumes algo->Parameters.pbData is set ahead of time */
138 static BOOL WINAPI CRYPT_AsnDecodeAlgorithmId(DWORD dwCertEncodingType,
139 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
140 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
141 static BOOL WINAPI CRYPT_AsnDecodeBool(DWORD dwCertEncodingType,
142 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
143 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
144 /* Assumes the CRYPT_DATA_BLOB's pbData member has been initialized */
145 static BOOL WINAPI CRYPT_AsnDecodeOctetsInternal(DWORD dwCertEncodingType,
146 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
147 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
148 /* Like CRYPT_AsnDecodeBits, but assumes the CRYPT_INTEGER_BLOB's pbData
149 * member has been initialized, doesn't do exception handling, and doesn't do
152 static BOOL WINAPI CRYPT_AsnDecodeBitsInternal(DWORD dwCertEncodingType,
153 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
154 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
155 static BOOL WINAPI CRYPT_AsnDecodeBits(DWORD dwCertEncodingType,
156 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
157 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
158 static BOOL WINAPI CRYPT_AsnDecodeInt(DWORD dwCertEncodingType,
159 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
160 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
161 /* Like CRYPT_AsnDecodeInteger, but assumes the CRYPT_INTEGER_BLOB's pbData
162 * member has been initialized, doesn't do exception handling, and doesn't do
165 static BOOL WINAPI CRYPT_AsnDecodeIntegerInternal(DWORD dwCertEncodingType,
166 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
167 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo);
169 /* filter for page-fault exceptions */
170 static WINE_EXCEPTION_FILTER(page_fault)
172 if (GetExceptionCode() == EXCEPTION_ACCESS_VIOLATION)
173 return EXCEPTION_EXECUTE_HANDLER;
174 return EXCEPTION_CONTINUE_SEARCH;
177 static char *CRYPT_GetKeyName(DWORD dwEncodingType, LPCSTR pszFuncName,
180 static const char szEncodingTypeFmt[] =
181 "Software\\Microsoft\\Cryptography\\OID\\EncodingType %ld\\%s\\%s";
183 char numericOID[7]; /* enough for "#65535" */
187 /* MSDN says the encoding type is a mask, but it isn't treated that way.
188 * (E.g., if dwEncodingType were 3, the key names "EncodingType 1" and
189 * "EncodingType 2" would be expected if it were a mask. Instead native
190 * stores values in "EncodingType 3".
194 snprintf(numericOID, sizeof(numericOID), "#%d", LOWORD(pszOID));
200 /* This is enough: the lengths of the two string parameters are explicitly
201 * counted, and we need up to five additional characters for the encoding
202 * type. These are covered by the "%d", "%s", and "%s" characters in the
203 * format specifier that are removed by sprintf.
205 len = sizeof(szEncodingTypeFmt) + lstrlenA(pszFuncName) + lstrlenA(oid);
206 szKey = HeapAlloc(GetProcessHeap(), 0, len);
208 sprintf(szKey, szEncodingTypeFmt, dwEncodingType, pszFuncName, oid);
212 BOOL WINAPI CryptRegisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
213 LPCSTR pszOID, LPCWSTR pwszDll, LPCSTR pszOverrideFuncName)
219 TRACE("%lx %s %s %s %s\n", dwEncodingType, pszFuncName, pszOID,
220 debugstr_w(pwszDll), pszOverrideFuncName);
222 /* This only registers functions for encoding certs, not messages */
223 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
226 /* Native does nothing pwszDll is NULL */
230 /* I'm not matching MS bug for bug here, because I doubt any app depends on
232 * - native "succeeds" if pszFuncName is NULL, but the nonsensical entry
233 * it creates would never be used
234 * - native returns an HRESULT rather than a Win32 error if pszOID is NULL.
235 * Instead I disallow both of these with ERROR_INVALID_PARAMETER.
237 if (!pszFuncName || !pszOID)
239 SetLastError(ERROR_INVALID_PARAMETER);
243 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
244 TRACE("Key name is %s\n", debugstr_a(szKey));
249 r = RegCreateKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
250 HeapFree(GetProcessHeap(), 0, szKey);
251 if(r != ERROR_SUCCESS)
254 /* write the values */
255 if (pszOverrideFuncName)
256 RegSetValueExA(hKey, "FuncName", 0, REG_SZ, (const BYTE*)pszOverrideFuncName,
257 lstrlenA(pszOverrideFuncName) + 1);
258 RegSetValueExW(hKey, szDllName, 0, REG_SZ, (const BYTE*) pwszDll,
259 (lstrlenW(pwszDll) + 1) * sizeof (WCHAR));
265 BOOL WINAPI CryptUnregisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
271 TRACE("%lx %s %s\n", dwEncodingType, pszFuncName, pszOID);
273 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
276 if (!pszFuncName || !pszOID)
278 SetLastError(ERROR_INVALID_PARAMETER);
282 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
283 rc = RegDeleteKeyA(HKEY_LOCAL_MACHINE, szKey);
284 HeapFree(GetProcessHeap(), 0, szKey);
287 return rc ? FALSE : TRUE;
290 BOOL WINAPI CryptGetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
291 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD *pdwValueType, BYTE *pbValueData,
298 TRACE("%lx %s %s %s %p %p %p\n", dwEncodingType, debugstr_a(pszFuncName),
299 debugstr_a(pszOID), debugstr_w(pwszValueName), pdwValueType, pbValueData,
302 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
305 if (!pszFuncName || !pszOID || !pwszValueName)
307 SetLastError(ERROR_INVALID_PARAMETER);
311 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
312 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
313 HeapFree(GetProcessHeap(), 0, szKey);
318 rc = RegQueryValueExW(hKey, pwszValueName, NULL, pdwValueType,
319 pbValueData, pcbValueData);
324 return rc ? FALSE : TRUE;
327 BOOL WINAPI CryptSetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
328 LPCSTR pszOID, LPCWSTR pwszValueName, DWORD dwValueType,
329 const BYTE *pbValueData, DWORD cbValueData)
335 TRACE("%lx %s %s %s %ld %p %ld\n", dwEncodingType, debugstr_a(pszFuncName),
336 debugstr_a(pszOID), debugstr_w(pwszValueName), dwValueType, pbValueData,
339 if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
342 if (!pszFuncName || !pszOID || !pwszValueName)
344 SetLastError(ERROR_INVALID_PARAMETER);
348 szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
349 rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
350 HeapFree(GetProcessHeap(), 0, szKey);
355 rc = RegSetValueExW(hKey, pwszValueName, 0, dwValueType, pbValueData,
361 return rc ? FALSE : TRUE;
364 /* Gets the registered function named szFuncName for dwCertEncodingType and
365 * lpszStructType, or NULL if one could not be found. *lib will be set to the
366 * handle of the module it's in, or NULL if no module was loaded. If the
367 * return value is NULL, *lib will also be NULL, to simplify error handling.
369 static void *CRYPT_GetFunc(DWORD dwCertEncodingType, LPCSTR lpszStructType,
370 LPCSTR szFuncName, HMODULE *lib)
373 char *szKey = CRYPT_GetKeyName(dwCertEncodingType, szFuncName,
375 const char *funcName;
378 DWORD type, size = 0;
380 TRACE("(%08lx %s %s %p)\n", dwCertEncodingType, debugstr_a(lpszStructType),
381 debugstr_a(szFuncName), lib);
384 r = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
385 HeapFree(GetProcessHeap(), 0, szKey);
386 if(r != ERROR_SUCCESS)
389 RegQueryValueExA(hKey, "FuncName", NULL, &type, NULL, &size);
390 if (GetLastError() == ERROR_MORE_DATA && type == REG_SZ)
392 funcName = HeapAlloc(GetProcessHeap(), 0, size);
393 RegQueryValueExA(hKey, "FuncName", NULL, &type, (LPBYTE)funcName,
397 funcName = szFuncName;
398 RegQueryValueExW(hKey, szDllName, NULL, &type, NULL, &size);
399 if (GetLastError() == ERROR_MORE_DATA && type == REG_SZ)
401 LPWSTR dllName = HeapAlloc(GetProcessHeap(), 0, size);
403 RegQueryValueExW(hKey, szDllName, NULL, &type, (LPBYTE)dllName,
405 *lib = LoadLibraryW(dllName);
408 ret = GetProcAddress(*lib, funcName);
411 /* Unload the library, the caller doesn't want to unload it
412 * when the return value is NULL.
418 HeapFree(GetProcessHeap(), 0, dllName);
420 if (funcName != szFuncName)
421 HeapFree(GetProcessHeap(), 0, (char *)funcName);
422 TRACE("returning %p\n", ret);
426 BOOL WINAPI CryptEncodeObject(DWORD dwCertEncodingType, LPCSTR lpszStructType,
427 const void *pvStructInfo, BYTE *pbEncoded, DWORD *pcbEncoded)
431 CryptEncodeObjectFunc pCryptEncodeObject;
433 TRACE("(0x%08lx, %s, %p, %p, %p)\n", dwCertEncodingType,
434 debugstr_a(lpszStructType), pvStructInfo, pbEncoded,
437 if (!pbEncoded && !pcbEncoded)
439 SetLastError(ERROR_INVALID_PARAMETER);
443 /* Try registered DLL first.. */
445 (CryptEncodeObjectFunc)CRYPT_GetFunc(dwCertEncodingType,
446 lpszStructType, "CryptEncodeObject", &lib);
447 if (pCryptEncodeObject)
449 ret = pCryptEncodeObject(dwCertEncodingType, lpszStructType,
450 pvStructInfo, pbEncoded, pcbEncoded);
455 /* If not, use CryptEncodeObjectEx */
456 ret = CryptEncodeObjectEx(dwCertEncodingType, lpszStructType,
457 pvStructInfo, 0, NULL, pbEncoded, pcbEncoded);
462 /* Helper function to check *pcbEncoded, set it to the required size, and
463 * optionally to allocate memory. Assumes pbEncoded is not NULL.
464 * If CRYPT_ENCODE_ALLOC_FLAG is set in dwFlags, *pbEncoded will be set to a
465 * pointer to the newly allocated memory.
467 static BOOL CRYPT_EncodeEnsureSpace(DWORD dwFlags,
468 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded,
473 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
475 if (pEncodePara && pEncodePara->pfnAlloc)
476 *(BYTE **)pbEncoded = pEncodePara->pfnAlloc(bytesNeeded);
478 *(BYTE **)pbEncoded = LocalAlloc(0, bytesNeeded);
479 if (!*(BYTE **)pbEncoded)
482 *pcbEncoded = bytesNeeded;
484 else if (bytesNeeded > *pcbEncoded)
486 *pcbEncoded = bytesNeeded;
487 SetLastError(ERROR_MORE_DATA);
493 static BOOL CRYPT_EncodeLen(DWORD len, BYTE *pbEncoded, DWORD *pcbEncoded)
495 DWORD bytesNeeded, significantBytes = 0;
503 for (temp = len, significantBytes = sizeof(temp); !(temp & 0xff000000);
504 temp <<= 8, significantBytes--)
506 bytesNeeded = significantBytes + 1;
510 *pcbEncoded = bytesNeeded;
513 if (*pcbEncoded < bytesNeeded)
515 SetLastError(ERROR_MORE_DATA);
519 *pbEncoded = (BYTE)len;
524 *pbEncoded++ = significantBytes | 0x80;
525 for (i = 0; i < significantBytes; i++)
527 *(pbEncoded + significantBytes - i - 1) = (BYTE)(len & 0xff);
531 *pcbEncoded = bytesNeeded;
535 struct AsnEncodeSequenceItem
537 const void *pvStructInfo;
538 CryptEncodeObjectExFunc encodeFunc;
539 DWORD size; /* used during encoding, not for your use */
542 static BOOL WINAPI CRYPT_AsnEncodeSequence(DWORD dwCertEncodingType,
543 struct AsnEncodeSequenceItem items[], DWORD cItem, DWORD dwFlags,
544 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
547 DWORD i, dataLen = 0;
549 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", items, cItem, dwFlags, pEncodePara,
550 pbEncoded, *pcbEncoded);
551 for (i = 0, ret = TRUE; ret && i < cItem; i++)
553 ret = items[i].encodeFunc(dwCertEncodingType, NULL,
554 items[i].pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL,
555 NULL, &items[i].size);
556 dataLen += items[i].size;
560 DWORD lenBytes, bytesNeeded;
562 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
563 bytesNeeded = 1 + lenBytes + dataLen;
565 *pcbEncoded = bytesNeeded;
568 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
569 pcbEncoded, bytesNeeded)))
571 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
572 pbEncoded = *(BYTE **)pbEncoded;
573 *pbEncoded++ = ASN_SEQUENCE;
574 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
575 pbEncoded += lenBytes;
576 for (i = 0; ret && i < cItem; i++)
578 ret = items[i].encodeFunc(dwCertEncodingType, NULL,
579 items[i].pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG,
580 NULL, pbEncoded, &items[i].size);
581 pbEncoded += items[i].size;
586 TRACE("returning %d (%08lx)\n", ret, GetLastError());
590 struct AsnConstructedItem
593 const void *pvStructInfo;
594 CryptEncodeObjectExFunc encodeFunc;
597 static BOOL WINAPI CRYPT_AsnEncodeConstructed(DWORD dwCertEncodingType,
598 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
599 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
602 const struct AsnConstructedItem *item =
603 (const struct AsnConstructedItem *)pvStructInfo;
606 if ((ret = item->encodeFunc(dwCertEncodingType, lpszStructType,
607 item->pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, NULL, &len)))
609 DWORD dataLen, bytesNeeded;
611 CRYPT_EncodeLen(len, NULL, &dataLen);
612 bytesNeeded = 1 + dataLen + len;
614 *pcbEncoded = bytesNeeded;
615 else if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
616 pbEncoded, pcbEncoded, bytesNeeded)))
618 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
619 pbEncoded = *(BYTE **)pbEncoded;
620 *pbEncoded++ = ASN_CONTEXT | ASN_CONSTRUCTOR | item->tag;
621 CRYPT_EncodeLen(len, pbEncoded, &dataLen);
622 pbEncoded += dataLen;
623 ret = item->encodeFunc(dwCertEncodingType, lpszStructType,
624 item->pvStructInfo, dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL,
631 static BOOL WINAPI CRYPT_AsnEncodeCertVersion(DWORD dwCertEncodingType,
632 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
633 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
635 const DWORD *ver = (const DWORD *)pvStructInfo;
638 /* CERT_V1 is not encoded */
646 struct AsnConstructedItem item = { 0, ver, CRYPT_AsnEncodeInt };
648 ret = CRYPT_AsnEncodeConstructed(dwCertEncodingType, X509_INTEGER,
649 &item, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
654 static BOOL WINAPI CRYPT_CopyEncodedBlob(DWORD dwCertEncodingType,
655 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
656 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
658 const CRYPT_DER_BLOB *blob = (const CRYPT_DER_BLOB *)pvStructInfo;
663 *pcbEncoded = blob->cbData;
666 else if (*pcbEncoded < blob->cbData)
668 *pcbEncoded = blob->cbData;
669 SetLastError(ERROR_MORE_DATA);
675 memcpy(pbEncoded, blob->pbData, blob->cbData);
676 *pcbEncoded = blob->cbData;
682 static BOOL WINAPI CRYPT_AsnEncodeValidity(DWORD dwCertEncodingType,
683 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
684 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
687 /* This has two filetimes in a row, a NotBefore and a NotAfter */
688 const FILETIME *timePtr = (const FILETIME *)pvStructInfo;
689 struct AsnEncodeSequenceItem items[] = {
690 { timePtr++, CRYPT_AsnEncodeChoiceOfTime, 0 },
691 { timePtr, CRYPT_AsnEncodeChoiceOfTime, 0 },
694 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
695 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
700 static BOOL WINAPI CRYPT_AsnEncodeAlgorithmId(
701 DWORD dwCertEncodingType, LPCSTR lpszStructType, const void *pvStructInfo,
702 DWORD dwFlags, PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded,
705 const CRYPT_ALGORITHM_IDENTIFIER *algo =
706 (const CRYPT_ALGORITHM_IDENTIFIER *)pvStructInfo;
708 struct AsnEncodeSequenceItem items[] = {
709 { algo->pszObjId, CRYPT_AsnEncodeOid, 0 },
710 { &algo->Parameters, CRYPT_CopyEncodedBlob, 0 },
713 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
714 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
719 static BOOL WINAPI CRYPT_AsnEncodePubKeyInfo(DWORD dwCertEncodingType,
720 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
721 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
727 const CERT_PUBLIC_KEY_INFO *info =
728 (const CERT_PUBLIC_KEY_INFO *)pvStructInfo;
729 struct AsnEncodeSequenceItem items[] = {
730 { &info->Algorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
731 { &info->PublicKey, CRYPT_AsnEncodeBits, 0 },
734 TRACE("Encoding public key with OID %s\n",
735 debugstr_a(info->Algorithm.pszObjId));
736 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
737 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
742 SetLastError(STATUS_ACCESS_VIOLATION);
749 static BOOL WINAPI CRYPT_AsnEncodeCert(DWORD dwCertEncodingType,
750 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
751 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
757 const CERT_SIGNED_CONTENT_INFO *info =
758 (const CERT_SIGNED_CONTENT_INFO *)pvStructInfo;
759 struct AsnEncodeSequenceItem items[] = {
760 { &info->ToBeSigned, CRYPT_CopyEncodedBlob, 0 },
761 { &info->SignatureAlgorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
762 { &info->Signature, CRYPT_AsnEncodeBitsSwapBytes, 0 },
765 if (dwFlags & CRYPT_ENCODE_NO_SIGNATURE_BYTE_REVERSAL_FLAG)
766 items[2].encodeFunc = CRYPT_AsnEncodeBits;
767 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
768 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
773 SetLastError(STATUS_ACCESS_VIOLATION);
780 /* Like in Windows, this blithely ignores the validity of the passed-in
781 * CERT_INFO, and just encodes it as-is. The resulting encoded data may not
782 * decode properly, see CRYPT_AsnDecodeCertInfo.
784 static BOOL WINAPI CRYPT_AsnEncodeCertInfo(DWORD dwCertEncodingType,
785 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
786 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
792 const CERT_INFO *info = (const CERT_INFO *)pvStructInfo;
793 struct AsnEncodeSequenceItem items[10] = {
794 { &info->dwVersion, CRYPT_AsnEncodeCertVersion, 0 },
795 { &info->SerialNumber, CRYPT_AsnEncodeInteger, 0 },
796 { &info->SignatureAlgorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
797 { &info->Issuer, CRYPT_CopyEncodedBlob, 0 },
798 { &info->NotBefore, CRYPT_AsnEncodeValidity, 0 },
799 { &info->Subject, CRYPT_CopyEncodedBlob, 0 },
800 { &info->SubjectPublicKeyInfo, CRYPT_AsnEncodePubKeyInfo, 0 },
803 struct AsnConstructedItem constructed[3] = { { 0 } };
804 DWORD cItem = 7, cConstructed = 0;
806 if (info->IssuerUniqueId.cbData)
808 constructed[cConstructed].tag = 1;
809 constructed[cConstructed].pvStructInfo = &info->IssuerUniqueId;
810 constructed[cConstructed].encodeFunc = CRYPT_AsnEncodeBits;
811 items[cItem].pvStructInfo = &constructed[cConstructed];
812 items[cItem].encodeFunc = CRYPT_AsnEncodeConstructed;
816 if (info->SubjectUniqueId.cbData)
818 constructed[cConstructed].tag = 2;
819 constructed[cConstructed].pvStructInfo = &info->SubjectUniqueId;
820 constructed[cConstructed].encodeFunc = CRYPT_AsnEncodeBits;
821 items[cItem].pvStructInfo = &constructed[cConstructed];
822 items[cItem].encodeFunc = CRYPT_AsnEncodeConstructed;
826 if (info->cExtension)
828 constructed[cConstructed].tag = 3;
829 constructed[cConstructed].pvStructInfo = &info->cExtension;
830 constructed[cConstructed].encodeFunc = CRYPT_AsnEncodeExtensions;
831 items[cItem].pvStructInfo = &constructed[cConstructed];
832 items[cItem].encodeFunc = CRYPT_AsnEncodeConstructed;
837 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items, cItem,
838 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
842 SetLastError(STATUS_ACCESS_VIOLATION);
849 static BOOL WINAPI CRYPT_AsnEncodeCRLEntry(const CRL_ENTRY *entry,
850 BYTE *pbEncoded, DWORD *pcbEncoded)
852 struct AsnEncodeSequenceItem items[3] = {
853 { &entry->SerialNumber, CRYPT_AsnEncodeInteger, 0 },
854 { &entry->RevocationDate, CRYPT_AsnEncodeChoiceOfTime, 0 },
860 TRACE("%p, %p, %p\n", entry, pbEncoded, pcbEncoded);
862 if (entry->cExtension)
864 items[cItem].pvStructInfo = &entry->cExtension;
865 items[cItem].encodeFunc = CRYPT_AsnEncodeExtensions;
869 ret = CRYPT_AsnEncodeSequence(X509_ASN_ENCODING, items, cItem, 0, NULL,
870 pbEncoded, pcbEncoded);
872 TRACE("returning %d (%08lx)\n", ret, GetLastError());
876 static BOOL WINAPI CRYPT_AsnEncodeCRLEntries(DWORD dwCertEncodingType,
877 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
878 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
880 DWORD cCRLEntry = *(const DWORD *)pvStructInfo;
881 DWORD bytesNeeded, dataLen, lenBytes, i;
882 const CRL_ENTRY *rgCRLEntry = *(const CRL_ENTRY **)
883 ((const BYTE *)pvStructInfo + sizeof(DWORD));
886 for (i = 0, dataLen = 0; ret && i < cCRLEntry; i++)
890 ret = CRYPT_AsnEncodeCRLEntry(&rgCRLEntry[i], NULL, &size);
894 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
895 bytesNeeded = 1 + lenBytes + dataLen;
897 *pcbEncoded = bytesNeeded;
900 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
901 pcbEncoded, bytesNeeded)))
903 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
904 pbEncoded = *(BYTE **)pbEncoded;
905 *pbEncoded++ = ASN_SEQUENCEOF;
906 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
907 pbEncoded += lenBytes;
908 for (i = 0; i < cCRLEntry; i++)
910 DWORD size = dataLen;
912 ret = CRYPT_AsnEncodeCRLEntry(&rgCRLEntry[i], pbEncoded, &size);
921 static BOOL WINAPI CRYPT_AsnEncodeCRLVersion(DWORD dwCertEncodingType,
922 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
923 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
925 const DWORD *ver = (const DWORD *)pvStructInfo;
928 /* CRL_V1 is not encoded */
935 ret = CRYPT_AsnEncodeInt(dwCertEncodingType, X509_INTEGER, ver,
936 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
940 /* Like in Windows, this blithely ignores the validity of the passed-in
941 * CRL_INFO, and just encodes it as-is. The resulting encoded data may not
942 * decode properly, see CRYPT_AsnDecodeCRLInfo.
944 static BOOL WINAPI CRYPT_AsnEncodeCRLInfo(DWORD dwCertEncodingType,
945 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
946 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
952 const CRL_INFO *info = (const CRL_INFO *)pvStructInfo;
953 struct AsnEncodeSequenceItem items[7] = {
954 { &info->dwVersion, CRYPT_AsnEncodeCRLVersion, 0 },
955 { &info->SignatureAlgorithm, CRYPT_AsnEncodeAlgorithmId, 0 },
956 { &info->Issuer, CRYPT_CopyEncodedBlob, 0 },
957 { &info->ThisUpdate, CRYPT_AsnEncodeChoiceOfTime, 0 },
962 if (info->NextUpdate.dwLowDateTime || info->NextUpdate.dwHighDateTime)
964 items[cItem].pvStructInfo = &info->NextUpdate;
965 items[cItem].encodeFunc = CRYPT_AsnEncodeChoiceOfTime;
970 items[cItem].pvStructInfo = &info->cCRLEntry;
971 items[cItem].encodeFunc = CRYPT_AsnEncodeCRLEntries;
974 if (info->cExtension)
976 items[cItem].pvStructInfo = &info->cExtension;
977 items[cItem].encodeFunc = CRYPT_AsnEncodeExtensions;
981 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items, cItem,
982 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
986 SetLastError(STATUS_ACCESS_VIOLATION);
993 static BOOL CRYPT_AsnEncodeExtension(CERT_EXTENSION *ext, BYTE *pbEncoded,
997 struct AsnEncodeSequenceItem items[3] = {
998 { ext->pszObjId, CRYPT_AsnEncodeOid, 0 },
1004 TRACE("%p, %p, %ld\n", ext, pbEncoded, *pcbEncoded);
1008 items[cItem].pvStructInfo = &ext->fCritical;
1009 items[cItem].encodeFunc = CRYPT_AsnEncodeBool;
1012 items[cItem].pvStructInfo = &ext->Value;
1013 items[cItem].encodeFunc = CRYPT_AsnEncodeOctets;
1016 ret = CRYPT_AsnEncodeSequence(X509_ASN_ENCODING, items, cItem, 0, NULL,
1017 pbEncoded, pcbEncoded);
1018 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1022 static BOOL WINAPI CRYPT_AsnEncodeExtensions(DWORD dwCertEncodingType,
1023 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1024 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1030 DWORD bytesNeeded, dataLen, lenBytes, i;
1031 const CERT_EXTENSIONS *exts = (const CERT_EXTENSIONS *)pvStructInfo;
1034 for (i = 0, dataLen = 0; ret && i < exts->cExtension; i++)
1038 ret = CRYPT_AsnEncodeExtension(&exts->rgExtension[i], NULL, &size);
1042 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
1043 bytesNeeded = 1 + lenBytes + dataLen;
1045 *pcbEncoded = bytesNeeded;
1048 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1049 pcbEncoded, bytesNeeded)))
1051 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1052 pbEncoded = *(BYTE **)pbEncoded;
1053 *pbEncoded++ = ASN_SEQUENCEOF;
1054 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
1055 pbEncoded += lenBytes;
1056 for (i = 0; i < exts->cExtension; i++)
1058 DWORD size = dataLen;
1060 ret = CRYPT_AsnEncodeExtension(&exts->rgExtension[i],
1068 __EXCEPT(page_fault)
1070 SetLastError(STATUS_ACCESS_VIOLATION);
1077 static BOOL WINAPI CRYPT_AsnEncodeOid(DWORD dwCertEncodingType,
1078 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1079 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1081 LPCSTR pszObjId = (LPCSTR)pvStructInfo;
1082 DWORD bytesNeeded = 0, lenBytes;
1087 TRACE("%s\n", debugstr_a(pszObjId));
1094 if (sscanf(pszObjId, "%d.%d.%n", &val1, &val2, &firstPos) != 2)
1096 SetLastError(CRYPT_E_ASN1_ERROR);
1100 firstByte = val1 * 40 + val2;
1101 ptr = pszObjId + firstPos;
1106 /* note I assume each component is at most 32-bits long in base 2 */
1107 if (sscanf(ptr, "%d%n", &val1, &pos) == 1)
1109 if (val1 >= 0x10000000)
1111 else if (val1 >= 0x200000)
1113 else if (val1 >= 0x4000)
1115 else if (val1 >= 0x80)
1125 SetLastError(CRYPT_E_ASN1_ERROR);
1129 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1133 bytesNeeded += 1 + lenBytes;
1136 if (*pcbEncoded < bytesNeeded)
1138 SetLastError(ERROR_MORE_DATA);
1143 *pbEncoded++ = ASN_OBJECTIDENTIFIER;
1144 CRYPT_EncodeLen(bytesNeeded - 1 - lenBytes, pbEncoded, &lenBytes);
1145 pbEncoded += lenBytes;
1151 *pbEncoded++ = firstByte;
1152 ptr = pszObjId + firstPos;
1155 sscanf(ptr, "%d%n", &val, &pos);
1157 unsigned char outBytes[5];
1160 if (val >= 0x10000000)
1162 else if (val >= 0x200000)
1164 else if (val >= 0x4000)
1166 else if (val >= 0x80)
1170 for (i = numBytes; i > 0; i--)
1172 outBytes[i - 1] = val & 0x7f;
1175 for (i = 0; i < numBytes - 1; i++)
1176 *pbEncoded++ = outBytes[i] | 0x80;
1177 *pbEncoded++ = outBytes[i];
1186 *pcbEncoded = bytesNeeded;
1190 static BOOL WINAPI CRYPT_AsnEncodeNameValue(DWORD dwCertEncodingType,
1191 CERT_NAME_VALUE *value, BYTE *pbEncoded, DWORD *pcbEncoded)
1194 DWORD bytesNeeded, lenBytes, encodedLen;
1197 switch (value->dwValueType)
1199 case CERT_RDN_NUMERIC_STRING:
1200 tag = ASN_NUMERICSTRING;
1201 encodedLen = value->Value.cbData;
1203 case CERT_RDN_PRINTABLE_STRING:
1204 tag = ASN_PRINTABLESTRING;
1205 encodedLen = value->Value.cbData;
1207 case CERT_RDN_IA5_STRING:
1208 tag = ASN_IA5STRING;
1209 encodedLen = value->Value.cbData;
1211 case CERT_RDN_ANY_TYPE:
1212 /* explicitly disallowed */
1213 SetLastError(HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER));
1216 FIXME("String type %ld unimplemented\n", value->dwValueType);
1219 CRYPT_EncodeLen(encodedLen, NULL, &lenBytes);
1220 bytesNeeded = 1 + lenBytes + encodedLen;
1223 if (*pcbEncoded < bytesNeeded)
1225 SetLastError(ERROR_MORE_DATA);
1231 CRYPT_EncodeLen(encodedLen, pbEncoded, &lenBytes);
1232 pbEncoded += lenBytes;
1233 switch (value->dwValueType)
1235 case CERT_RDN_NUMERIC_STRING:
1236 case CERT_RDN_PRINTABLE_STRING:
1237 case CERT_RDN_IA5_STRING:
1238 memcpy(pbEncoded, value->Value.pbData, value->Value.cbData);
1242 *pcbEncoded = bytesNeeded;
1246 static BOOL WINAPI CRYPT_AsnEncodeRdnAttr(DWORD dwCertEncodingType,
1247 CERT_RDN_ATTR *attr, BYTE *pbEncoded, DWORD *pcbEncoded)
1249 DWORD bytesNeeded = 0, lenBytes, size;
1252 ret = CRYPT_AsnEncodeOid(dwCertEncodingType, NULL, attr->pszObjId,
1253 0, NULL, NULL, &size);
1256 bytesNeeded += size;
1257 /* hack: a CERT_RDN_ATTR is identical to a CERT_NAME_VALUE beginning
1258 * with dwValueType, so "cast" it to get its encoded size
1260 ret = CRYPT_AsnEncodeNameValue(dwCertEncodingType,
1261 (CERT_NAME_VALUE *)&attr->dwValueType, NULL, &size);
1264 bytesNeeded += size;
1265 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1266 bytesNeeded += 1 + lenBytes;
1269 if (*pcbEncoded < bytesNeeded)
1271 SetLastError(ERROR_MORE_DATA);
1276 *pbEncoded++ = ASN_CONSTRUCTOR | ASN_SEQUENCE;
1277 CRYPT_EncodeLen(bytesNeeded - lenBytes - 1, pbEncoded,
1279 pbEncoded += lenBytes;
1280 size = bytesNeeded - 1 - lenBytes;
1281 ret = CRYPT_AsnEncodeOid(dwCertEncodingType, NULL,
1282 attr->pszObjId, 0, NULL, pbEncoded, &size);
1286 size = bytesNeeded - 1 - lenBytes - size;
1287 ret = CRYPT_AsnEncodeNameValue(dwCertEncodingType,
1288 (CERT_NAME_VALUE *)&attr->dwValueType, pbEncoded,
1293 *pcbEncoded = bytesNeeded;
1299 static int BLOBComp(const void *l, const void *r)
1301 CRYPT_DER_BLOB *a = (CRYPT_DER_BLOB *)l, *b = (CRYPT_DER_BLOB *)r;
1304 if (!(ret = memcmp(a->pbData, b->pbData, min(a->cbData, b->cbData))))
1305 ret = a->cbData - b->cbData;
1309 /* This encodes as a SET OF, which in DER must be lexicographically sorted.
1311 static BOOL WINAPI CRYPT_AsnEncodeRdn(DWORD dwCertEncodingType, CERT_RDN *rdn,
1312 BYTE *pbEncoded, DWORD *pcbEncoded)
1315 CRYPT_DER_BLOB *blobs = NULL;
1319 DWORD bytesNeeded = 0, lenBytes, i;
1324 blobs = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY,
1325 rdn->cRDNAttr * sizeof(CRYPT_DER_BLOB));
1329 for (i = 0; ret && i < rdn->cRDNAttr; i++)
1331 ret = CRYPT_AsnEncodeRdnAttr(dwCertEncodingType, &rdn->rgRDNAttr[i],
1332 NULL, &blobs[i].cbData);
1334 bytesNeeded += blobs[i].cbData;
1338 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1339 bytesNeeded += 1 + lenBytes;
1342 if (*pcbEncoded < bytesNeeded)
1344 SetLastError(ERROR_MORE_DATA);
1349 for (i = 0; ret && i < rdn->cRDNAttr; i++)
1351 blobs[i].pbData = HeapAlloc(GetProcessHeap(), 0,
1353 if (!blobs[i].pbData)
1356 ret = CRYPT_AsnEncodeRdnAttr(dwCertEncodingType,
1357 &rdn->rgRDNAttr[i], blobs[i].pbData,
1362 qsort(blobs, rdn->cRDNAttr, sizeof(CRYPT_DER_BLOB),
1364 *pbEncoded++ = ASN_CONSTRUCTOR | ASN_SETOF;
1365 CRYPT_EncodeLen(bytesNeeded - lenBytes - 1, pbEncoded,
1367 pbEncoded += lenBytes;
1368 for (i = 0; ret && i < rdn->cRDNAttr; i++)
1370 memcpy(pbEncoded, blobs[i].pbData, blobs[i].cbData);
1371 pbEncoded += blobs[i].cbData;
1376 *pcbEncoded = bytesNeeded;
1380 for (i = 0; i < rdn->cRDNAttr; i++)
1381 HeapFree(GetProcessHeap(), 0, blobs[i].pbData);
1384 __EXCEPT(page_fault)
1386 SetLastError(STATUS_ACCESS_VIOLATION);
1390 HeapFree(GetProcessHeap(), 0, blobs);
1394 static BOOL WINAPI CRYPT_AsnEncodeName(DWORD dwCertEncodingType,
1395 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1396 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1402 const CERT_NAME_INFO *info = (const CERT_NAME_INFO *)pvStructInfo;
1403 DWORD bytesNeeded = 0, lenBytes, size, i;
1405 TRACE("encoding name with %ld RDNs\n", info->cRDN);
1407 for (i = 0; ret && i < info->cRDN; i++)
1409 ret = CRYPT_AsnEncodeRdn(dwCertEncodingType, &info->rgRDN[i], NULL,
1412 bytesNeeded += size;
1414 CRYPT_EncodeLen(bytesNeeded, NULL, &lenBytes);
1415 bytesNeeded += 1 + lenBytes;
1419 *pcbEncoded = bytesNeeded;
1422 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
1423 pbEncoded, pcbEncoded, bytesNeeded)))
1425 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1426 pbEncoded = *(BYTE **)pbEncoded;
1427 *pbEncoded++ = ASN_SEQUENCEOF;
1428 CRYPT_EncodeLen(bytesNeeded - lenBytes - 1, pbEncoded,
1430 pbEncoded += lenBytes;
1431 for (i = 0; ret && i < info->cRDN; i++)
1434 ret = CRYPT_AsnEncodeRdn(dwCertEncodingType,
1435 &info->rgRDN[i], pbEncoded, &size);
1439 bytesNeeded -= size;
1446 __EXCEPT(page_fault)
1448 SetLastError(STATUS_ACCESS_VIOLATION);
1455 static BOOL WINAPI CRYPT_AsnEncodeBool(DWORD dwCertEncodingType,
1456 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1457 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1459 BOOL val = *(const BOOL *)pvStructInfo, ret;
1468 else if (*pcbEncoded < 3)
1471 SetLastError(ERROR_MORE_DATA);
1477 *pbEncoded++ = ASN_BOOL;
1479 *pbEncoded++ = val ? 0xff : 0;
1482 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1486 static BOOL CRYPT_AsnEncodeAltNameEntry(const CERT_ALT_NAME_ENTRY *entry,
1487 BYTE *pbEncoded, DWORD *pcbEncoded)
1493 switch (entry->dwAltNameChoice)
1495 case CERT_ALT_NAME_RFC822_NAME:
1496 case CERT_ALT_NAME_DNS_NAME:
1497 case CERT_ALT_NAME_URL:
1498 if (entry->u.pwszURL)
1502 /* Not + 1: don't encode the NULL-terminator */
1503 dataLen = lstrlenW(entry->u.pwszURL);
1504 for (i = 0; ret && i < dataLen; i++)
1506 if (entry->u.pwszURL[i] > 0x7f)
1508 SetLastError(CRYPT_E_INVALID_IA5_STRING);
1517 case CERT_ALT_NAME_IP_ADDRESS:
1518 dataLen = entry->u.IPAddress.cbData;
1520 case CERT_ALT_NAME_REGISTERED_ID:
1521 /* FIXME: encode OID */
1522 case CERT_ALT_NAME_OTHER_NAME:
1523 case CERT_ALT_NAME_DIRECTORY_NAME:
1524 FIXME("name type %ld unimplemented\n", entry->dwAltNameChoice);
1527 SetLastError(HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER));
1532 DWORD bytesNeeded, lenBytes;
1534 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
1535 bytesNeeded = 1 + dataLen + lenBytes;
1537 *pcbEncoded = bytesNeeded;
1538 else if (*pcbEncoded < bytesNeeded)
1540 SetLastError(ERROR_MORE_DATA);
1541 *pcbEncoded = bytesNeeded;
1546 *pbEncoded++ = ASN_CONTEXT | (entry->dwAltNameChoice - 1);
1547 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
1548 pbEncoded += lenBytes;
1549 switch (entry->dwAltNameChoice)
1551 case CERT_ALT_NAME_RFC822_NAME:
1552 case CERT_ALT_NAME_DNS_NAME:
1553 case CERT_ALT_NAME_URL:
1557 for (i = 0; i < dataLen; i++)
1558 *pbEncoded++ = (BYTE)entry->u.pwszURL[i];
1561 case CERT_ALT_NAME_IP_ADDRESS:
1562 memcpy(pbEncoded, entry->u.IPAddress.pbData, dataLen);
1566 *pcbEncoded = bytesNeeded;
1569 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1573 static BOOL WINAPI CRYPT_AsnEncodeAltName(DWORD dwCertEncodingType,
1574 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1575 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1581 const CERT_ALT_NAME_INFO *info =
1582 (const CERT_ALT_NAME_INFO *)pvStructInfo;
1584 DWORD bytesNeeded, dataLen, lenBytes, i;
1587 /* FIXME: should check that cAltEntry is not bigger than 0xff, since we
1588 * can't encode an erroneous entry index if it's bigger than this.
1590 for (i = 0, dataLen = 0; ret && i < info->cAltEntry; i++)
1594 ret = CRYPT_AsnEncodeAltNameEntry(&info->rgAltEntry[i], NULL,
1598 else if (GetLastError() == CRYPT_E_INVALID_IA5_STRING)
1600 /* CRYPT_AsnEncodeAltNameEntry encoded the index of
1601 * the bad character, now set the index of the bad
1604 *pcbEncoded = (BYTE)i <<
1605 CERT_ALT_NAME_ENTRY_ERR_INDEX_SHIFT | len;
1610 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
1611 bytesNeeded = 1 + lenBytes + dataLen;
1614 *pcbEncoded = bytesNeeded;
1619 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
1620 pbEncoded, pcbEncoded, bytesNeeded)))
1622 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1623 pbEncoded = *(BYTE **)pbEncoded;
1624 *pbEncoded++ = ASN_SEQUENCEOF;
1625 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
1626 pbEncoded += lenBytes;
1627 for (i = 0; ret && i < info->cAltEntry; i++)
1629 DWORD len = dataLen;
1631 ret = CRYPT_AsnEncodeAltNameEntry(&info->rgAltEntry[i],
1643 __EXCEPT(page_fault)
1645 SetLastError(STATUS_ACCESS_VIOLATION);
1652 static BOOL WINAPI CRYPT_AsnEncodeBasicConstraints2(DWORD dwCertEncodingType,
1653 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1654 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1660 const CERT_BASIC_CONSTRAINTS2_INFO *info =
1661 (const CERT_BASIC_CONSTRAINTS2_INFO *)pvStructInfo;
1662 struct AsnEncodeSequenceItem items[2] = { { 0 } };
1667 items[cItem].pvStructInfo = &info->fCA;
1668 items[cItem].encodeFunc = CRYPT_AsnEncodeBool;
1671 if (info->fPathLenConstraint)
1673 items[cItem].pvStructInfo = &info->dwPathLenConstraint;
1674 items[cItem].encodeFunc = CRYPT_AsnEncodeInt;
1677 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items, cItem,
1678 dwFlags, pEncodePara, pbEncoded, pcbEncoded);
1680 __EXCEPT(page_fault)
1682 SetLastError(STATUS_ACCESS_VIOLATION);
1689 static BOOL WINAPI CRYPT_AsnEncodeRsaPubKey(DWORD dwCertEncodingType,
1690 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1691 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1697 const BLOBHEADER *hdr =
1698 (const BLOBHEADER *)pvStructInfo;
1700 if (hdr->bType != PUBLICKEYBLOB)
1702 SetLastError(HRESULT_FROM_WIN32(ERROR_INVALID_PARAMETER));
1707 const RSAPUBKEY *rsaPubKey = (const RSAPUBKEY *)
1708 ((const BYTE *)pvStructInfo + sizeof(BLOBHEADER));
1709 CRYPT_INTEGER_BLOB blob = { rsaPubKey->bitlen / 8,
1710 (BYTE *)pvStructInfo + sizeof(BLOBHEADER) + sizeof(RSAPUBKEY) };
1711 struct AsnEncodeSequenceItem items[] = {
1712 { &blob, CRYPT_AsnEncodeInteger, 0 },
1713 { &rsaPubKey->pubexp, CRYPT_AsnEncodeInt, 0 },
1716 ret = CRYPT_AsnEncodeSequence(dwCertEncodingType, items,
1717 sizeof(items) / sizeof(items[0]), dwFlags, pEncodePara, pbEncoded,
1721 __EXCEPT(page_fault)
1723 SetLastError(STATUS_ACCESS_VIOLATION);
1730 static BOOL WINAPI CRYPT_AsnEncodeOctets(DWORD dwCertEncodingType,
1731 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1732 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1738 const CRYPT_DATA_BLOB *blob = (const CRYPT_DATA_BLOB *)pvStructInfo;
1739 DWORD bytesNeeded, lenBytes;
1741 TRACE("(%ld, %p), %08lx, %p, %p, %ld\n", blob->cbData, blob->pbData,
1742 dwFlags, pEncodePara, pbEncoded, *pcbEncoded);
1744 CRYPT_EncodeLen(blob->cbData, NULL, &lenBytes);
1745 bytesNeeded = 1 + lenBytes + blob->cbData;
1748 *pcbEncoded = bytesNeeded;
1753 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1754 pcbEncoded, bytesNeeded)))
1756 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1757 pbEncoded = *(BYTE **)pbEncoded;
1758 *pbEncoded++ = ASN_OCTETSTRING;
1759 CRYPT_EncodeLen(blob->cbData, pbEncoded, &lenBytes);
1760 pbEncoded += lenBytes;
1762 memcpy(pbEncoded, blob->pbData, blob->cbData);
1766 __EXCEPT(page_fault)
1768 SetLastError(STATUS_ACCESS_VIOLATION);
1772 TRACE("returning %d (%08lx)\n", ret, GetLastError());
1776 static BOOL WINAPI CRYPT_AsnEncodeBits(DWORD dwCertEncodingType,
1777 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1778 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1784 const CRYPT_BIT_BLOB *blob = (const CRYPT_BIT_BLOB *)pvStructInfo;
1785 DWORD bytesNeeded, lenBytes, dataBytes;
1788 /* yep, MS allows cUnusedBits to be >= 8 */
1789 if (!blob->cUnusedBits)
1791 dataBytes = blob->cbData;
1794 else if (blob->cbData * 8 > blob->cUnusedBits)
1796 dataBytes = (blob->cbData * 8 - blob->cUnusedBits) / 8 + 1;
1797 unusedBits = blob->cUnusedBits >= 8 ? blob->cUnusedBits / 8 :
1805 CRYPT_EncodeLen(dataBytes + 1, NULL, &lenBytes);
1806 bytesNeeded = 1 + lenBytes + dataBytes + 1;
1809 *pcbEncoded = bytesNeeded;
1814 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1815 pcbEncoded, bytesNeeded)))
1817 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1818 pbEncoded = *(BYTE **)pbEncoded;
1819 *pbEncoded++ = ASN_BITSTRING;
1820 CRYPT_EncodeLen(dataBytes + 1, pbEncoded, &lenBytes);
1821 pbEncoded += lenBytes;
1822 *pbEncoded++ = unusedBits;
1825 BYTE mask = 0xff << unusedBits;
1829 memcpy(pbEncoded, blob->pbData, dataBytes - 1);
1830 pbEncoded += dataBytes - 1;
1832 *pbEncoded = *(blob->pbData + dataBytes - 1) & mask;
1837 __EXCEPT(page_fault)
1839 SetLastError(STATUS_ACCESS_VIOLATION);
1846 static BOOL WINAPI CRYPT_AsnEncodeBitsSwapBytes(DWORD dwCertEncodingType,
1847 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1848 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1854 const CRYPT_BIT_BLOB *blob = (const CRYPT_BIT_BLOB *)pvStructInfo;
1855 CRYPT_BIT_BLOB newBlob = { blob->cbData, NULL, blob->cUnusedBits };
1860 newBlob.pbData = HeapAlloc(GetProcessHeap(), 0, newBlob.cbData);
1865 for (i = 0; i < newBlob.cbData; i++)
1866 newBlob.pbData[newBlob.cbData - i - 1] = blob->pbData[i];
1872 ret = CRYPT_AsnEncodeBits(dwCertEncodingType, lpszStructType,
1873 &newBlob, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
1874 HeapFree(GetProcessHeap(), 0, newBlob.pbData);
1876 __EXCEPT(page_fault)
1878 SetLastError(STATUS_ACCESS_VIOLATION);
1885 static BOOL WINAPI CRYPT_AsnEncodeInt(DWORD dwCertEncodingType,
1886 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1887 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1889 CRYPT_INTEGER_BLOB blob = { sizeof(INT), (BYTE *)pvStructInfo };
1891 return CRYPT_AsnEncodeInteger(dwCertEncodingType, X509_MULTI_BYTE_INTEGER,
1892 &blob, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
1895 static BOOL WINAPI CRYPT_AsnEncodeInteger(DWORD dwCertEncodingType,
1896 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1897 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1903 DWORD significantBytes, lenBytes;
1904 BYTE padByte = 0, bytesNeeded;
1906 const CRYPT_INTEGER_BLOB *blob =
1907 (const CRYPT_INTEGER_BLOB *)pvStructInfo;
1909 significantBytes = blob->cbData;
1910 if (significantBytes)
1912 if (blob->pbData[significantBytes - 1] & 0x80)
1914 /* negative, lop off leading (little-endian) 0xffs */
1915 for (; significantBytes > 0 &&
1916 blob->pbData[significantBytes - 1] == 0xff; significantBytes--)
1918 if (blob->pbData[significantBytes - 1] < 0x80)
1926 /* positive, lop off leading (little-endian) zeroes */
1927 for (; significantBytes > 0 &&
1928 !blob->pbData[significantBytes - 1]; significantBytes--)
1930 if (significantBytes == 0)
1931 significantBytes = 1;
1932 if (blob->pbData[significantBytes - 1] > 0x7f)
1940 CRYPT_EncodeLen(significantBytes + 1, NULL, &lenBytes);
1942 CRYPT_EncodeLen(significantBytes, NULL, &lenBytes);
1943 bytesNeeded = 1 + lenBytes + significantBytes;
1948 *pcbEncoded = bytesNeeded;
1953 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
1954 pcbEncoded, bytesNeeded)))
1956 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
1957 pbEncoded = *(BYTE **)pbEncoded;
1958 *pbEncoded++ = ASN_INTEGER;
1961 CRYPT_EncodeLen(significantBytes + 1, pbEncoded, &lenBytes);
1962 pbEncoded += lenBytes;
1963 *pbEncoded++ = padByte;
1967 CRYPT_EncodeLen(significantBytes, pbEncoded, &lenBytes);
1968 pbEncoded += lenBytes;
1970 for (; significantBytes > 0; significantBytes--)
1971 *(pbEncoded++) = blob->pbData[significantBytes - 1];
1975 __EXCEPT(page_fault)
1977 SetLastError(STATUS_ACCESS_VIOLATION);
1984 static BOOL WINAPI CRYPT_AsnEncodeUnsignedInteger(DWORD dwCertEncodingType,
1985 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
1986 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
1992 DWORD significantBytes, lenBytes;
1995 const CRYPT_INTEGER_BLOB *blob =
1996 (const CRYPT_INTEGER_BLOB *)pvStructInfo;
1998 significantBytes = blob->cbData;
1999 if (significantBytes)
2001 /* positive, lop off leading (little-endian) zeroes */
2002 for (; significantBytes > 0 && !blob->pbData[significantBytes - 1];
2005 if (significantBytes == 0)
2006 significantBytes = 1;
2007 if (blob->pbData[significantBytes - 1] > 0x7f)
2011 CRYPT_EncodeLen(significantBytes + 1, NULL, &lenBytes);
2013 CRYPT_EncodeLen(significantBytes, NULL, &lenBytes);
2014 bytesNeeded = 1 + lenBytes + significantBytes;
2019 *pcbEncoded = bytesNeeded;
2024 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
2025 pcbEncoded, bytesNeeded)))
2027 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2028 pbEncoded = *(BYTE **)pbEncoded;
2029 *pbEncoded++ = ASN_INTEGER;
2032 CRYPT_EncodeLen(significantBytes + 1, pbEncoded, &lenBytes);
2033 pbEncoded += lenBytes;
2038 CRYPT_EncodeLen(significantBytes, pbEncoded, &lenBytes);
2039 pbEncoded += lenBytes;
2041 for (; significantBytes > 0; significantBytes--)
2042 *(pbEncoded++) = blob->pbData[significantBytes - 1];
2046 __EXCEPT(page_fault)
2048 SetLastError(STATUS_ACCESS_VIOLATION);
2055 static BOOL WINAPI CRYPT_AsnEncodeEnumerated(DWORD dwCertEncodingType,
2056 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2057 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2059 CRYPT_INTEGER_BLOB blob;
2062 /* Encode as an unsigned integer, then change the tag to enumerated */
2063 blob.cbData = sizeof(DWORD);
2064 blob.pbData = (BYTE *)pvStructInfo;
2065 ret = CRYPT_AsnEncodeUnsignedInteger(dwCertEncodingType,
2066 X509_MULTI_BYTE_UINT, &blob, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
2067 if (ret && pbEncoded)
2069 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2070 pbEncoded = *(BYTE **)pbEncoded;
2071 pbEncoded[0] = ASN_ENUMERATED;
2076 static BOOL WINAPI CRYPT_AsnEncodeUtcTime(DWORD dwCertEncodingType,
2077 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2078 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2085 /* sorry, magic number: enough for tag, len, YYMMDDHHMMSSZ\0. I use a
2086 * temporary buffer because the output buffer is not NULL-terminated.
2089 static const DWORD bytesNeeded = sizeof(buf) - 1;
2093 *pcbEncoded = bytesNeeded;
2098 /* Sanity check the year, this is a two-digit year format */
2099 ret = FileTimeToSystemTime((const FILETIME *)pvStructInfo,
2101 if (ret && (sysTime.wYear < 1950 || sysTime.wYear > 2050))
2103 SetLastError(CRYPT_E_BAD_ENCODE);
2108 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara,
2109 pbEncoded, pcbEncoded, bytesNeeded)))
2111 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2112 pbEncoded = *(BYTE **)pbEncoded;
2113 buf[0] = ASN_UTCTIME;
2114 buf[1] = bytesNeeded - 2;
2115 snprintf(buf + 2, sizeof(buf) - 2,
2116 "%02d%02d%02d%02d%02d%02dZ", sysTime.wYear >= 2000 ?
2117 sysTime.wYear - 2000 : sysTime.wYear - 1900,
2118 sysTime.wDay, sysTime.wMonth, sysTime.wHour,
2119 sysTime.wMinute, sysTime.wSecond);
2120 memcpy(pbEncoded, buf, bytesNeeded);
2125 __EXCEPT(page_fault)
2127 SetLastError(STATUS_ACCESS_VIOLATION);
2134 static BOOL WINAPI CRYPT_AsnEncodeGeneralizedTime(DWORD dwCertEncodingType,
2135 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2136 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2143 /* sorry, magic number: enough for tag, len, YYYYMMDDHHMMSSZ\0. I use a
2144 * temporary buffer because the output buffer is not NULL-terminated.
2147 static const DWORD bytesNeeded = sizeof(buf) - 1;
2151 *pcbEncoded = bytesNeeded;
2156 ret = FileTimeToSystemTime((const FILETIME *)pvStructInfo,
2159 ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
2160 pcbEncoded, bytesNeeded);
2163 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2164 pbEncoded = *(BYTE **)pbEncoded;
2165 buf[0] = ASN_GENERALTIME;
2166 buf[1] = bytesNeeded - 2;
2167 snprintf(buf + 2, sizeof(buf) - 2, "%04d%02d%02d%02d%02d%02dZ",
2168 sysTime.wYear, sysTime.wDay, sysTime.wMonth, sysTime.wHour,
2169 sysTime.wMinute, sysTime.wSecond);
2170 memcpy(pbEncoded, buf, bytesNeeded);
2174 __EXCEPT(page_fault)
2176 SetLastError(STATUS_ACCESS_VIOLATION);
2183 static BOOL WINAPI CRYPT_AsnEncodeChoiceOfTime(DWORD dwCertEncodingType,
2184 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2185 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2193 /* Check the year, if it's in the UTCTime range call that encode func */
2194 if (!FileTimeToSystemTime((const FILETIME *)pvStructInfo, &sysTime))
2196 if (sysTime.wYear >= 1950 && sysTime.wYear <= 2050)
2197 ret = CRYPT_AsnEncodeUtcTime(dwCertEncodingType, lpszStructType,
2198 pvStructInfo, dwFlags, pEncodePara, pbEncoded, pcbEncoded);
2200 ret = CRYPT_AsnEncodeGeneralizedTime(dwCertEncodingType,
2201 lpszStructType, pvStructInfo, dwFlags, pEncodePara, pbEncoded,
2204 __EXCEPT(page_fault)
2206 SetLastError(STATUS_ACCESS_VIOLATION);
2213 static BOOL WINAPI CRYPT_AsnEncodeSequenceOfAny(DWORD dwCertEncodingType,
2214 LPCSTR lpszStructType, const void *pvStructInfo, DWORD dwFlags,
2215 PCRYPT_ENCODE_PARA pEncodePara, BYTE *pbEncoded, DWORD *pcbEncoded)
2221 DWORD bytesNeeded, dataLen, lenBytes, i;
2222 const CRYPT_SEQUENCE_OF_ANY *seq =
2223 (const CRYPT_SEQUENCE_OF_ANY *)pvStructInfo;
2225 for (i = 0, dataLen = 0; i < seq->cValue; i++)
2226 dataLen += seq->rgValue[i].cbData;
2227 CRYPT_EncodeLen(dataLen, NULL, &lenBytes);
2228 bytesNeeded = 1 + lenBytes + dataLen;
2231 *pcbEncoded = bytesNeeded;
2236 if ((ret = CRYPT_EncodeEnsureSpace(dwFlags, pEncodePara, pbEncoded,
2237 pcbEncoded, bytesNeeded)))
2239 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG)
2240 pbEncoded = *(BYTE **)pbEncoded;
2241 *pbEncoded++ = ASN_SEQUENCEOF;
2242 CRYPT_EncodeLen(dataLen, pbEncoded, &lenBytes);
2243 pbEncoded += lenBytes;
2244 for (i = 0; i < seq->cValue; i++)
2246 memcpy(pbEncoded, seq->rgValue[i].pbData,
2247 seq->rgValue[i].cbData);
2248 pbEncoded += seq->rgValue[i].cbData;
2253 __EXCEPT(page_fault)
2255 SetLastError(STATUS_ACCESS_VIOLATION);
2262 BOOL WINAPI CryptEncodeObjectEx(DWORD dwCertEncodingType, LPCSTR lpszStructType,
2263 const void *pvStructInfo, DWORD dwFlags, PCRYPT_ENCODE_PARA pEncodePara,
2264 void *pvEncoded, DWORD *pcbEncoded)
2268 CryptEncodeObjectExFunc encodeFunc = NULL;
2270 TRACE("(0x%08lx, %s, %p, 0x%08lx, %p, %p, %p)\n", dwCertEncodingType,
2271 debugstr_a(lpszStructType), pvStructInfo, dwFlags, pEncodePara,
2272 pvEncoded, pcbEncoded);
2274 if (!pvEncoded && !pcbEncoded)
2276 SetLastError(ERROR_INVALID_PARAMETER);
2279 if ((dwCertEncodingType & CERT_ENCODING_TYPE_MASK) != X509_ASN_ENCODING
2280 && (dwCertEncodingType & CMSG_ENCODING_TYPE_MASK) != PKCS_7_ASN_ENCODING)
2282 SetLastError(ERROR_FILE_NOT_FOUND);
2286 SetLastError(NOERROR);
2287 if (dwFlags & CRYPT_ENCODE_ALLOC_FLAG && pvEncoded)
2288 *(BYTE **)pvEncoded = NULL;
2289 if (!HIWORD(lpszStructType))
2291 switch (LOWORD(lpszStructType))
2293 case (WORD)X509_CERT:
2294 encodeFunc = CRYPT_AsnEncodeCert;
2296 case (WORD)X509_CERT_TO_BE_SIGNED:
2297 encodeFunc = CRYPT_AsnEncodeCertInfo;
2299 case (WORD)X509_CERT_CRL_TO_BE_SIGNED:
2300 encodeFunc = CRYPT_AsnEncodeCRLInfo;
2302 case (WORD)X509_EXTENSIONS:
2303 encodeFunc = CRYPT_AsnEncodeExtensions;
2305 case (WORD)X509_NAME:
2306 encodeFunc = CRYPT_AsnEncodeName;
2308 case (WORD)X509_PUBLIC_KEY_INFO:
2309 encodeFunc = CRYPT_AsnEncodePubKeyInfo;
2311 case (WORD)X509_ALTERNATE_NAME:
2312 encodeFunc = CRYPT_AsnEncodeAltName;
2314 case (WORD)X509_BASIC_CONSTRAINTS2:
2315 encodeFunc = CRYPT_AsnEncodeBasicConstraints2;
2317 case (WORD)RSA_CSP_PUBLICKEYBLOB:
2318 encodeFunc = CRYPT_AsnEncodeRsaPubKey;
2320 case (WORD)X509_OCTET_STRING:
2321 encodeFunc = CRYPT_AsnEncodeOctets;
2323 case (WORD)X509_BITS:
2324 case (WORD)X509_KEY_USAGE:
2325 encodeFunc = CRYPT_AsnEncodeBits;
2327 case (WORD)X509_INTEGER:
2328 encodeFunc = CRYPT_AsnEncodeInt;
2330 case (WORD)X509_MULTI_BYTE_INTEGER:
2331 encodeFunc = CRYPT_AsnEncodeInteger;
2333 case (WORD)X509_MULTI_BYTE_UINT:
2334 encodeFunc = CRYPT_AsnEncodeUnsignedInteger;
2336 case (WORD)X509_ENUMERATED:
2337 encodeFunc = CRYPT_AsnEncodeEnumerated;
2339 case (WORD)X509_CHOICE_OF_TIME:
2340 encodeFunc = CRYPT_AsnEncodeChoiceOfTime;
2342 case (WORD)X509_SEQUENCE_OF_ANY:
2343 encodeFunc = CRYPT_AsnEncodeSequenceOfAny;
2345 case (WORD)PKCS_UTC_TIME:
2346 encodeFunc = CRYPT_AsnEncodeUtcTime;
2349 FIXME("%d: unimplemented\n", LOWORD(lpszStructType));
2352 else if (!strcmp(lpszStructType, szOID_CERT_EXTENSIONS))
2353 encodeFunc = CRYPT_AsnEncodeExtensions;
2354 else if (!strcmp(lpszStructType, szOID_RSA_signingTime))
2355 encodeFunc = CRYPT_AsnEncodeUtcTime;
2356 else if (!strcmp(lpszStructType, szOID_CRL_REASON_CODE))
2357 encodeFunc = CRYPT_AsnEncodeEnumerated;
2358 else if (!strcmp(lpszStructType, szOID_KEY_USAGE))
2359 encodeFunc = CRYPT_AsnEncodeBits;
2360 else if (!strcmp(lpszStructType, szOID_SUBJECT_KEY_IDENTIFIER))
2361 encodeFunc = CRYPT_AsnEncodeOctets;
2362 else if (!strcmp(lpszStructType, szOID_BASIC_CONSTRAINTS2))
2363 encodeFunc = CRYPT_AsnEncodeBasicConstraints2;
2364 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME))
2365 encodeFunc = CRYPT_AsnEncodeAltName;
2366 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME2))
2367 encodeFunc = CRYPT_AsnEncodeAltName;
2368 else if (!strcmp(lpszStructType, szOID_NEXT_UPDATE_LOCATION))
2369 encodeFunc = CRYPT_AsnEncodeAltName;
2370 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME))
2371 encodeFunc = CRYPT_AsnEncodeAltName;
2372 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME2))
2373 encodeFunc = CRYPT_AsnEncodeAltName;
2375 TRACE("OID %s not found or unimplemented, looking for DLL\n",
2376 debugstr_a(lpszStructType));
2378 encodeFunc = (CryptEncodeObjectExFunc)CRYPT_GetFunc(dwCertEncodingType,
2379 lpszStructType, "CryptEncodeObjectEx", &lib);
2381 ret = encodeFunc(dwCertEncodingType, lpszStructType, pvStructInfo,
2382 dwFlags, pEncodePara, pvEncoded, pcbEncoded);
2384 SetLastError(ERROR_FILE_NOT_FOUND);
2390 BOOL WINAPI CryptDecodeObject(DWORD dwCertEncodingType, LPCSTR lpszStructType,
2391 const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags, void *pvStructInfo,
2392 DWORD *pcbStructInfo)
2396 CryptDecodeObjectFunc pCryptDecodeObject;
2398 TRACE("(0x%08lx, %s, %p, %ld, 0x%08lx, %p, %p)\n", dwCertEncodingType,
2399 debugstr_a(lpszStructType), pbEncoded, cbEncoded, dwFlags,
2400 pvStructInfo, pcbStructInfo);
2402 if (!pvStructInfo && !pcbStructInfo)
2404 SetLastError(ERROR_INVALID_PARAMETER);
2408 /* Try registered DLL first.. */
2409 pCryptDecodeObject =
2410 (CryptDecodeObjectFunc)CRYPT_GetFunc(dwCertEncodingType,
2411 lpszStructType, "CryptDecodeObject", &lib);
2412 if (pCryptDecodeObject)
2414 ret = pCryptDecodeObject(dwCertEncodingType, lpszStructType,
2415 pbEncoded, cbEncoded, dwFlags, pvStructInfo, pcbStructInfo);
2420 /* If not, use CryptDecodeObjectEx */
2421 ret = CryptDecodeObjectEx(dwCertEncodingType, lpszStructType, pbEncoded,
2422 cbEncoded, dwFlags, NULL, pvStructInfo, pcbStructInfo);
2427 /* Gets the number of length bytes from the given (leading) length byte */
2428 #define GET_LEN_BYTES(b) ((b) <= 0x7f ? 1 : 1 + ((b) & 0x7f))
2430 /* Helper function to get the encoded length of the data starting at pbEncoded,
2431 * where pbEncoded[0] is the tag. If the data are too short to contain a
2432 * length or if the length is too large for cbEncoded, sets an appropriate
2433 * error code and returns FALSE.
2435 static BOOL WINAPI CRYPT_GetLen(const BYTE *pbEncoded, DWORD cbEncoded,
2442 SetLastError(CRYPT_E_ASN1_CORRUPT);
2445 else if (pbEncoded[1] <= 0x7f)
2447 if (pbEncoded[1] + 1 > cbEncoded)
2449 SetLastError(CRYPT_E_ASN1_EOD);
2454 *len = pbEncoded[1];
2460 BYTE lenLen = GET_LEN_BYTES(pbEncoded[1]);
2462 if (lenLen > sizeof(DWORD) + 1)
2464 SetLastError(CRYPT_E_ASN1_LARGE);
2467 else if (lenLen + 2 > cbEncoded)
2469 SetLastError(CRYPT_E_ASN1_CORRUPT);
2480 out |= *pbEncoded++;
2482 if (out + lenLen + 1 > cbEncoded)
2484 SetLastError(CRYPT_E_ASN1_EOD);
2497 /* Helper function to check *pcbStructInfo, set it to the required size, and
2498 * optionally to allocate memory. Assumes pvStructInfo is not NULL.
2499 * If CRYPT_DECODE_ALLOC_FLAG is set in dwFlags, *pvStructInfo will be set to a
2500 * pointer to the newly allocated memory.
2502 static BOOL CRYPT_DecodeEnsureSpace(DWORD dwFlags,
2503 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo,
2508 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2510 if (pDecodePara && pDecodePara->pfnAlloc)
2511 *(BYTE **)pvStructInfo = pDecodePara->pfnAlloc(bytesNeeded);
2513 *(BYTE **)pvStructInfo = LocalAlloc(0, bytesNeeded);
2514 if (!*(BYTE **)pvStructInfo)
2517 *pcbStructInfo = bytesNeeded;
2519 else if (*pcbStructInfo < bytesNeeded)
2521 *pcbStructInfo = bytesNeeded;
2522 SetLastError(ERROR_MORE_DATA);
2528 /* A few of the members need explanation:
2530 * A sequence is decoded into a struct. The offset member is the
2531 * offset of this item within that struct.
2533 * The decoder function to use. If this is NULL, then the member isn't
2534 * decoded, but minSize space is reserved for it.
2536 * The minimum amount of space occupied after decoding. You must set this.
2538 * If true, and a decoding function fails with CRYPT_E_ASN1_BADTAG, then
2539 * minSize space is filled with 0 for this member. (Any other failure
2540 * results in CRYPT_AsnDecodeSequence failing.)
2541 * hasPointer, pointerOffset, minSize:
2542 * If the item has dynamic data, set hasPointer to TRUE, pointerOffset to
2543 * the offset within the (outer) struct of the data pointer (or to the
2544 * first data pointer, if more than one exist).
2546 * Used by CRYPT_AsnDecodeSequence, not for your use.
2548 struct AsnDecodeSequenceItem
2551 CryptDecodeObjectExFunc decodeFunc;
2555 DWORD pointerOffset;
2559 /* This decodes an arbitrary sequence into a contiguous block of memory
2560 * (basically, a struct.) Each element being decoded is described by a struct
2561 * AsnDecodeSequenceItem, see above.
2562 * startingPointer is an optional pointer to the first place where dynamic
2563 * data will be stored. If you know the starting offset, you may pass it
2564 * here. Otherwise, pass NULL, and one will be inferred from the items.
2565 * Each item decoder is never called with CRYPT_DECODE_ALLOC_FLAG set.
2566 * If any undecoded data are left over, fails with CRYPT_E_ASN1_CORRUPT.
2568 static BOOL CRYPT_AsnDecodeSequence(DWORD dwCertEncodingType,
2569 struct AsnDecodeSequenceItem items[], DWORD cItem, const BYTE *pbEncoded,
2570 DWORD cbEncoded, DWORD dwFlags, PCRYPT_DECODE_PARA pDecodePara,
2571 void *pvStructInfo, DWORD *pcbStructInfo, void *startingPointer)
2575 TRACE("%p, %ld, %p, %ld, %08lx, %p, %p, %ld, %p\n", items, cItem, pbEncoded,
2576 cbEncoded, dwFlags, pDecodePara, pvStructInfo, *pcbStructInfo,
2579 if (pbEncoded[0] == ASN_SEQUENCE)
2583 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2585 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2586 DWORD i, bytesNeeded = 0, minSize = 0;
2589 ptr = pbEncoded + 1 + lenBytes;
2590 for (i = 0; ret && i < cItem; i++)
2594 minSize += items[i].minSize;
2595 if (cbEncoded - (ptr - pbEncoded) != 0)
2597 if ((ret = CRYPT_GetLen(ptr, cbEncoded - (ptr - pbEncoded),
2600 BYTE nextItemLenBytes = GET_LEN_BYTES(ptr[1]);
2602 if (items[i].decodeFunc)
2604 TRACE("sizing item %ld\n", i);
2605 ret = items[i].decodeFunc(dwCertEncodingType, NULL,
2606 ptr, 1 + nextItemLenBytes + nextItemLen,
2607 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL,
2611 /* Account for alignment padding */
2612 bytesNeeded += items[i].size;
2613 if (items[i].size % sizeof(DWORD))
2614 bytesNeeded += sizeof(DWORD) -
2615 items[i].size % sizeof(DWORD);
2616 ptr += 1 + nextItemLenBytes + nextItemLen;
2618 else if (items[i].optional &&
2619 GetLastError() == CRYPT_E_ASN1_BADTAG)
2621 TRACE("skipping optional item %ld\n", i);
2622 bytesNeeded += items[i].minSize;
2623 SetLastError(NOERROR);
2627 TRACE("item %ld failed: %08lx\n", i,
2631 bytesNeeded += items[i].minSize;
2634 else if (items[i].optional)
2635 bytesNeeded += items[i].minSize;
2638 SetLastError(CRYPT_E_ASN1_CORRUPT);
2642 if (cbEncoded - (ptr - pbEncoded) != 0)
2644 TRACE("%ld remaining bytes, failing\n", cbEncoded -
2646 SetLastError(CRYPT_E_ASN1_CORRUPT);
2652 *pcbStructInfo = bytesNeeded;
2653 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
2654 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
2658 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
2659 pvStructInfo = *(BYTE **)pvStructInfo;
2660 if (startingPointer)
2661 nextData = (BYTE *)startingPointer;
2663 nextData = (BYTE *)pvStructInfo + minSize;
2664 memset(pvStructInfo, 0, minSize);
2665 ptr = pbEncoded + 1 + lenBytes;
2666 for (i = 0; ret && i < cItem; i++)
2668 if (cbEncoded - (ptr - pbEncoded) != 0)
2671 BYTE nextItemLenBytes = GET_LEN_BYTES(ptr[1]);
2673 CRYPT_GetLen(ptr, cbEncoded - (ptr - pbEncoded),
2675 if (items[i].hasPointer)
2677 *(BYTE **)((BYTE *)pvStructInfo +
2678 items[i].pointerOffset) = nextData;
2680 if (items[i].decodeFunc)
2682 TRACE("decoding item %ld\n", i);
2683 ret = items[i].decodeFunc(dwCertEncodingType,
2684 NULL, ptr, 1 + nextItemLenBytes + nextItemLen,
2685 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL,
2686 (BYTE *)pvStructInfo + items[i].offset,
2689 TRACE("item %ld failed: %08lx\n", i,
2693 items[i].size = items[i].minSize;
2696 if (items[i].hasPointer &&
2697 items[i].size > items[i].minSize)
2699 nextData += items[i].size -
2701 /* align nextData to DWORD boundaries */
2702 if (items[i].size % sizeof(DWORD))
2704 nextData += sizeof(DWORD) -
2705 items[i].size % sizeof(DWORD);
2708 ptr += 1 + nextItemLenBytes + nextItemLen;
2710 else if (items[i].optional &&
2711 GetLastError() == CRYPT_E_ASN1_BADTAG)
2713 SetLastError(NOERROR);
2717 else if (!items[i].optional)
2719 SetLastError(CRYPT_E_ASN1_CORRUPT);
2729 SetLastError(CRYPT_E_ASN1_BADTAG);
2732 TRACE("returning %d (%08lx)\n", ret, GetLastError());
2736 /* Decodes a DER-encoded BLOB into a CRYPT_DER_BLOB struct pointed to by
2737 * pvStructInfo. The BLOB must be non-empty, otherwise the last error is set
2738 * to CRYPT_E_ASN1_CORRUPT.
2739 * Warning: assumes the CRYPT_DER_BLOB pointed to by pvStructInfo has pbData
2742 static BOOL WINAPI CRYPT_AsnDecodeDerBlob(DWORD dwCertEncodingType,
2743 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2744 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2749 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2751 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2752 DWORD bytesNeeded = sizeof(CRYPT_DER_BLOB);
2754 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
2755 bytesNeeded += 1 + lenBytes + dataLen;
2758 *pcbStructInfo = bytesNeeded;
2759 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
2760 pvStructInfo, pcbStructInfo, bytesNeeded)))
2762 CRYPT_DER_BLOB *blob = (CRYPT_DER_BLOB *)pvStructInfo;
2764 blob->cbData = 1 + lenBytes + dataLen;
2767 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
2768 blob->pbData = (BYTE *)pbEncoded;
2771 assert(blob->pbData);
2772 memcpy(blob->pbData, pbEncoded, blob->cbData);
2777 SetLastError(CRYPT_E_ASN1_CORRUPT);
2785 /* Like CRYPT_AsnDecodeBitsInternal, but swaps the bytes */
2786 static BOOL WINAPI CRYPT_AsnDecodeBitsSwapBytes(DWORD dwCertEncodingType,
2787 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2788 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2792 TRACE("(%p, %ld, 0x%08lx, %p, %p, %ld)\n", pbEncoded, cbEncoded, dwFlags,
2793 pDecodePara, pvStructInfo, *pcbStructInfo);
2795 /* Can't use the CRYPT_DECODE_NOCOPY_FLAG, because we modify the bytes in-
2798 ret = CRYPT_AsnDecodeBitsInternal(dwCertEncodingType, lpszStructType,
2799 pbEncoded, cbEncoded, dwFlags & ~CRYPT_DECODE_NOCOPY_FLAG, pDecodePara,
2800 pvStructInfo, pcbStructInfo);
2801 if (ret && pvStructInfo)
2803 CRYPT_BIT_BLOB *blob = (CRYPT_BIT_BLOB *)pvStructInfo;
2810 for (i = 0; i < blob->cbData / 2; i++)
2812 temp = blob->pbData[i];
2813 blob->pbData[i] = blob->pbData[blob->cbData - i - 1];
2814 blob->pbData[blob->cbData - i - 1] = temp;
2818 TRACE("returning %d (%08lx)\n", ret, GetLastError());
2822 static BOOL WINAPI CRYPT_AsnDecodeCert(DWORD dwCertEncodingType,
2823 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2824 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2828 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
2829 pDecodePara, pvStructInfo, *pcbStructInfo);
2833 struct AsnDecodeSequenceItem items[] = {
2834 { offsetof(CERT_SIGNED_CONTENT_INFO, ToBeSigned),
2835 CRYPT_AsnDecodeDerBlob, sizeof(CRYPT_DER_BLOB), FALSE, TRUE,
2836 offsetof(CERT_SIGNED_CONTENT_INFO, ToBeSigned.pbData), 0 },
2837 { offsetof(CERT_SIGNED_CONTENT_INFO, SignatureAlgorithm),
2838 CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
2839 FALSE, TRUE, offsetof(CERT_SIGNED_CONTENT_INFO,
2840 SignatureAlgorithm.pszObjId), 0 },
2841 { offsetof(CERT_SIGNED_CONTENT_INFO, Signature),
2842 CRYPT_AsnDecodeBitsSwapBytes, sizeof(CRYPT_BIT_BLOB), FALSE, TRUE,
2843 offsetof(CERT_SIGNED_CONTENT_INFO, Signature.pbData), 0 },
2846 if (dwFlags & CRYPT_DECODE_NO_SIGNATURE_BYTE_REVERSAL_FLAG)
2847 items[2].decodeFunc = CRYPT_AsnDecodeBitsInternal;
2848 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
2849 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
2850 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
2852 __EXCEPT(page_fault)
2854 SetLastError(STATUS_ACCESS_VIOLATION);
2861 static BOOL WINAPI CRYPT_AsnDecodeCertVersion(DWORD dwCertEncodingType,
2862 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2863 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2867 if (pbEncoded[0] == (ASN_CONTEXT | ASN_CONSTRUCTOR))
2871 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2873 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2875 ret = CRYPT_AsnDecodeInt(dwCertEncodingType, X509_INTEGER,
2876 pbEncoded + 1 + lenBytes, dataLen, dwFlags, pDecodePara,
2877 pvStructInfo, pcbStructInfo);
2882 SetLastError(CRYPT_E_ASN1_BADTAG);
2888 static BOOL WINAPI CRYPT_AsnDecodeValidity(DWORD dwCertEncodingType,
2889 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2890 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2894 struct AsnDecodeSequenceItem items[] = {
2895 { offsetof(CERT_PRIVATE_KEY_VALIDITY, NotBefore),
2896 CRYPT_AsnDecodeChoiceOfTime, sizeof(FILETIME), FALSE, FALSE, 0 },
2897 { offsetof(CERT_PRIVATE_KEY_VALIDITY, NotAfter),
2898 CRYPT_AsnDecodeChoiceOfTime, sizeof(FILETIME), FALSE, FALSE, 0 },
2901 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
2902 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
2903 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
2907 static BOOL WINAPI CRYPT_AsnDecodeCertExtensions(DWORD dwCertEncodingType,
2908 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2909 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2913 if (pbEncoded[0] == (ASN_CONTEXT | ASN_CONSTRUCTOR | 3))
2917 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
2919 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
2921 ret = CRYPT_AsnDecodeExtensionsInternal(dwCertEncodingType,
2922 X509_EXTENSIONS, pbEncoded + 1 + lenBytes, dataLen, dwFlags,
2923 pDecodePara, pvStructInfo, pcbStructInfo);
2928 SetLastError(CRYPT_E_ASN1_BADTAG);
2934 static BOOL WINAPI CRYPT_AsnDecodeCertInfo(DWORD dwCertEncodingType,
2935 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
2936 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
2940 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
2941 pDecodePara, pvStructInfo, *pcbStructInfo);
2945 struct AsnDecodeSequenceItem items[] = {
2946 { offsetof(CERT_INFO, dwVersion), CRYPT_AsnDecodeCertVersion,
2947 sizeof(DWORD), TRUE, FALSE, 0, 0 },
2948 { offsetof(CERT_INFO, SerialNumber), CRYPT_AsnDecodeIntegerInternal,
2949 sizeof(CRYPT_INTEGER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
2950 SerialNumber.pbData), 0 },
2951 { offsetof(CERT_INFO, SignatureAlgorithm), CRYPT_AsnDecodeAlgorithmId,
2952 sizeof(CRYPT_ALGORITHM_IDENTIFIER), FALSE, TRUE, offsetof(CERT_INFO,
2953 SignatureAlgorithm.pszObjId), 0 },
2954 { offsetof(CERT_INFO, Issuer), CRYPT_AsnDecodeDerBlob,
2955 sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
2957 { offsetof(CERT_INFO, NotBefore), CRYPT_AsnDecodeValidity,
2958 sizeof(CERT_PRIVATE_KEY_VALIDITY), FALSE, FALSE, 0 },
2959 { offsetof(CERT_INFO, Subject), CRYPT_AsnDecodeDerBlob,
2960 sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CERT_INFO,
2962 { offsetof(CERT_INFO, SubjectPublicKeyInfo), CRYPT_AsnDecodePubKeyInfo,
2963 sizeof(CERT_PUBLIC_KEY_INFO), FALSE, TRUE, offsetof(CERT_INFO,
2964 SubjectPublicKeyInfo.Algorithm.Parameters.pbData), 0 },
2965 { offsetof(CERT_INFO, IssuerUniqueId), CRYPT_AsnDecodeBitsInternal,
2966 sizeof(CRYPT_BIT_BLOB), TRUE, TRUE, offsetof(CERT_INFO,
2967 IssuerUniqueId.pbData), 0 },
2968 { offsetof(CERT_INFO, SubjectUniqueId), CRYPT_AsnDecodeBitsInternal,
2969 sizeof(CRYPT_BIT_BLOB), TRUE, TRUE, offsetof(CERT_INFO,
2970 SubjectUniqueId.pbData), 0 },
2971 { offsetof(CERT_INFO, cExtension), CRYPT_AsnDecodeCertExtensions,
2972 sizeof(CERT_EXTENSIONS), TRUE, TRUE, offsetof(CERT_INFO,
2976 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
2977 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
2978 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
2980 __EXCEPT(page_fault)
2982 SetLastError(STATUS_ACCESS_VIOLATION);
2989 static BOOL CRYPT_AsnDecodeCRLEntry(const BYTE *pbEncoded, DWORD cbEncoded,
2990 DWORD dwFlags, PCRL_ENTRY entry, DWORD *pcbEntry)
2993 struct AsnDecodeSequenceItem items[] = {
2994 { offsetof(CRL_ENTRY, SerialNumber), CRYPT_AsnDecodeIntegerInternal,
2995 sizeof(CRYPT_INTEGER_BLOB), FALSE, TRUE, offsetof(CRL_ENTRY,
2996 SerialNumber.pbData), 0 },
2997 { offsetof(CRL_ENTRY, RevocationDate), CRYPT_AsnDecodeChoiceOfTime,
2998 sizeof(FILETIME), FALSE, FALSE, 0 },
2999 { offsetof(CRL_ENTRY, cExtension), CRYPT_AsnDecodeExtensionsInternal,
3000 sizeof(CERT_EXTENSIONS), TRUE, TRUE, offsetof(CRL_ENTRY,
3004 TRACE("%p, %ld, %08lx, %p, %ld\n", pbEncoded, cbEncoded, dwFlags, entry,
3007 ret = CRYPT_AsnDecodeSequence(X509_ASN_ENCODING, items,
3008 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
3009 NULL, entry, pcbEntry, entry ? entry->SerialNumber.pbData : NULL);
3010 TRACE("Returning %d (%08lx)\n", ret, GetLastError());
3014 typedef struct _WINE_CRL_ENTRIES {
3016 PCRL_ENTRY rgCRLEntry;
3017 } WINE_CRL_ENTRIES, *PWINE_CRL_ENTRIES;
3019 /* Warning: assumes pvStructInfo is a WINE_CRL_ENTRIES whose rgCRLEntry has
3020 * been set prior to calling.
3022 static BOOL WINAPI CRYPT_AsnDecodeCRLEntries(DWORD dwCertEncodingType,
3023 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3024 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3028 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3029 pDecodePara, pvStructInfo, *pcbStructInfo);
3031 if (pbEncoded[0] == ASN_SEQUENCEOF)
3033 DWORD dataLen, bytesNeeded;
3035 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3037 DWORD cCRLEntry = 0;
3038 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3040 bytesNeeded = sizeof(WINE_CRL_ENTRIES);
3046 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3047 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3050 ret = CRYPT_AsnDecodeCRLEntry(ptr,
3051 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3057 bytesNeeded += size;
3058 ret = CRYPT_GetLen(ptr,
3059 cbEncoded - (ptr - pbEncoded), &nextLen);
3061 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3068 *pcbStructInfo = bytesNeeded;
3069 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
3070 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
3075 PWINE_CRL_ENTRIES entries;
3077 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3078 pvStructInfo = *(BYTE **)pvStructInfo;
3079 *pcbStructInfo = bytesNeeded;
3080 entries = (PWINE_CRL_ENTRIES)pvStructInfo;
3081 entries->cCRLEntry = cCRLEntry;
3082 assert(entries->rgCRLEntry);
3083 nextData = (BYTE *)entries->rgCRLEntry +
3084 entries->cCRLEntry * sizeof(CRL_ENTRY);
3085 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3086 i < cCRLEntry && ptr - pbEncoded - 1 - lenBytes <
3089 entries->rgCRLEntry[i].SerialNumber.pbData = nextData;
3091 ret = CRYPT_AsnDecodeCRLEntry(ptr,
3092 cbEncoded - (ptr - pbEncoded), dwFlags,
3093 &entries->rgCRLEntry[i], &size);
3098 bytesNeeded -= size;
3099 /* Increment nextData by the difference of the
3100 * minimum size and the actual size.
3102 if (size > sizeof(CRL_ENTRY))
3103 nextData += size - sizeof(CRL_ENTRY);
3104 ret = CRYPT_GetLen(ptr,
3105 cbEncoded - (ptr - pbEncoded), &nextLen);
3107 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3116 SetLastError(CRYPT_E_ASN1_BADTAG);
3119 TRACE("Returning %d (%08lx)\n", ret, GetLastError());
3123 static BOOL WINAPI CRYPT_AsnDecodeCRLInfo(DWORD dwCertEncodingType,
3124 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3125 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3129 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3130 pDecodePara, pvStructInfo, *pcbStructInfo);
3134 struct AsnDecodeSequenceItem items[] = {
3135 { offsetof(CRL_INFO, dwVersion), CRYPT_AsnDecodeCertVersion,
3136 sizeof(DWORD), TRUE, FALSE, 0, 0 },
3137 { offsetof(CRL_INFO, SignatureAlgorithm), CRYPT_AsnDecodeAlgorithmId,
3138 sizeof(CRYPT_ALGORITHM_IDENTIFIER), FALSE, TRUE, offsetof(CRL_INFO,
3139 SignatureAlgorithm.pszObjId), 0 },
3140 { offsetof(CRL_INFO, Issuer), CRYPT_AsnDecodeDerBlob,
3141 sizeof(CRYPT_DER_BLOB), FALSE, TRUE, offsetof(CRL_INFO,
3143 { offsetof(CRL_INFO, ThisUpdate), CRYPT_AsnDecodeChoiceOfTime,
3144 sizeof(FILETIME), FALSE, FALSE, 0 },
3145 { offsetof(CRL_INFO, NextUpdate), CRYPT_AsnDecodeChoiceOfTime,
3146 sizeof(FILETIME), TRUE, FALSE, 0 },
3147 { offsetof(CRL_INFO, cCRLEntry), CRYPT_AsnDecodeCRLEntries,
3148 sizeof(WINE_CRL_ENTRIES), TRUE, TRUE, offsetof(CRL_INFO,
3150 /* Note that the extensions are ignored by MS, so I'll ignore them too
3152 { offsetof(CRL_INFO, cExtension), NULL,
3153 sizeof(CERT_EXTENSIONS), TRUE, FALSE, 0 },
3156 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
3157 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
3158 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
3160 __EXCEPT(page_fault)
3162 SetLastError(STATUS_ACCESS_VIOLATION);
3167 TRACE("Returning %d (%08lx)\n", ret, GetLastError());
3171 /* Differences between this and CRYPT_AsnDecodeOid:
3172 * - pvStructInfo is a LPSTR *, not an LPSTR
3173 * - CRYPT_AsnDecodeOid doesn't account for the size of an LPSTR in its byte
3174 * count, whereas our callers (typically CRYPT_AsnDecodeSequence) expect this
3177 static BOOL WINAPI CRYPT_AsnDecodeOidWrapper(DWORD dwCertEncodingType,
3178 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3179 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3183 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3184 pDecodePara, pvStructInfo, *pcbStructInfo);
3186 ret = CRYPT_AsnDecodeOid(pbEncoded, cbEncoded, dwFlags,
3187 pvStructInfo ? *(LPSTR *)pvStructInfo : NULL, pcbStructInfo);
3188 if (ret || GetLastError() == ERROR_MORE_DATA)
3189 *pcbStructInfo += sizeof(LPSTR);
3190 if (ret && pvStructInfo)
3191 TRACE("returning %s\n", debugstr_a(*(LPSTR *)pvStructInfo));
3195 /* Warning: assumes ext->pszObjId is set ahead of time! */
3196 static BOOL CRYPT_AsnDecodeExtension(const BYTE *pbEncoded, DWORD cbEncoded,
3197 DWORD dwFlags, CERT_EXTENSION *ext, DWORD *pcbExt)
3199 struct AsnDecodeSequenceItem items[] = {
3200 { offsetof(CERT_EXTENSION, pszObjId), CRYPT_AsnDecodeOidWrapper,
3201 sizeof(LPSTR), FALSE, TRUE, offsetof(CERT_EXTENSION, pszObjId), 0 },
3202 { offsetof(CERT_EXTENSION, fCritical), CRYPT_AsnDecodeBool,
3203 sizeof(BOOL), TRUE, FALSE, 0, 0 },
3204 { offsetof(CERT_EXTENSION, Value), CRYPT_AsnDecodeOctetsInternal,
3205 sizeof(CRYPT_OBJID_BLOB), FALSE, TRUE, offsetof(CERT_EXTENSION,
3210 TRACE("%p, %ld, %08lx, %p, %ld\n", pbEncoded, cbEncoded, dwFlags, ext,
3214 TRACE("ext->pszObjId is %p\n", ext->pszObjId);
3215 ret = CRYPT_AsnDecodeSequence(X509_ASN_ENCODING, items,
3216 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags, NULL,
3217 ext, pcbExt, ext ? ext->pszObjId : NULL);
3219 TRACE("ext->pszObjId is %p (%s)\n", ext->pszObjId,
3220 debugstr_a(ext->pszObjId));
3221 TRACE("returning %d (%08lx)\n", ret, GetLastError());
3225 static BOOL WINAPI CRYPT_AsnDecodeExtensionsInternal(DWORD dwCertEncodingType,
3226 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3227 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3231 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3232 pDecodePara, pvStructInfo, *pcbStructInfo);
3234 if (pbEncoded[0] == ASN_SEQUENCEOF)
3236 DWORD dataLen, bytesNeeded;
3238 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3240 DWORD cExtension = 0;
3241 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3243 bytesNeeded = sizeof(CERT_EXTENSIONS);
3249 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3250 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3253 ret = CRYPT_AsnDecodeExtension(ptr,
3254 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3260 bytesNeeded += size;
3261 ret = CRYPT_GetLen(ptr,
3262 cbEncoded - (ptr - pbEncoded), &nextLen);
3264 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3271 *pcbStructInfo = bytesNeeded;
3272 else if (*pcbStructInfo < bytesNeeded)
3274 SetLastError(ERROR_MORE_DATA);
3275 *pcbStructInfo = bytesNeeded;
3283 CERT_EXTENSIONS *exts;
3285 *pcbStructInfo = bytesNeeded;
3286 exts = (CERT_EXTENSIONS *)pvStructInfo;
3287 exts->cExtension = cExtension;
3288 assert(exts->rgExtension);
3289 nextData = (BYTE *)exts->rgExtension +
3290 exts->cExtension * sizeof(CERT_EXTENSION);
3291 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3292 i < cExtension && ptr - pbEncoded - 1 - lenBytes <
3295 exts->rgExtension[i].pszObjId = (LPSTR)nextData;
3297 ret = CRYPT_AsnDecodeExtension(ptr,
3298 cbEncoded - (ptr - pbEncoded), dwFlags,
3299 &exts->rgExtension[i], &size);
3304 bytesNeeded -= size;
3305 if (size > sizeof(CERT_EXTENSION))
3306 nextData += size - sizeof(CERT_EXTENSION);
3307 ret = CRYPT_GetLen(ptr,
3308 cbEncoded - (ptr - pbEncoded), &nextLen);
3310 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3319 SetLastError(CRYPT_E_ASN1_BADTAG);
3325 static BOOL WINAPI CRYPT_AsnDecodeExtensions(DWORD dwCertEncodingType,
3326 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3327 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3333 ret = CRYPT_AsnDecodeExtensionsInternal(dwCertEncodingType,
3334 lpszStructType, pbEncoded, cbEncoded,
3335 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL, pcbStructInfo);
3336 if (ret && pvStructInfo)
3338 ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara, pvStructInfo,
3339 pcbStructInfo, *pcbStructInfo);
3342 CERT_EXTENSIONS *exts;
3344 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3345 pvStructInfo = *(BYTE **)pvStructInfo;
3346 exts = (CERT_EXTENSIONS *)pvStructInfo;
3347 exts->rgExtension = (CERT_EXTENSION *)((BYTE *)exts +
3348 sizeof(CERT_EXTENSIONS));
3349 ret = CRYPT_AsnDecodeExtensionsInternal(dwCertEncodingType,
3350 lpszStructType, pbEncoded, cbEncoded,
3351 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pvStructInfo,
3356 __EXCEPT(page_fault)
3358 SetLastError(STATUS_ACCESS_VIOLATION);
3365 /* FIXME: honor the CRYPT_DECODE_SHARE_OID_STRING_FLAG. */
3366 static BOOL WINAPI CRYPT_AsnDecodeOid(const BYTE *pbEncoded, DWORD cbEncoded,
3367 DWORD dwFlags, LPSTR pszObjId, DWORD *pcbObjId)
3371 TRACE("%p, %ld, %08lx, %p, %ld\n", pbEncoded, cbEncoded, dwFlags, pszObjId,
3376 if (pbEncoded[0] == ASN_OBJECTIDENTIFIER)
3380 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3382 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3387 /* The largest possible string for the first two components
3388 * is 2.175 (= 2 * 40 + 175 = 255), so this is big enough.
3393 snprintf(firstTwo, sizeof(firstTwo), "%d.%d",
3394 pbEncoded[1 + lenBytes] / 40,
3395 pbEncoded[1 + lenBytes] - (pbEncoded[1 + lenBytes] / 40)
3397 bytesNeeded = strlen(firstTwo) + 1;
3398 for (ptr = pbEncoded + 2 + lenBytes; ret &&
3399 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3401 /* large enough for ".4000000" */
3405 while (ptr - pbEncoded - 1 - lenBytes < dataLen &&
3412 if (ptr - pbEncoded - 1 - lenBytes >= dataLen ||
3415 SetLastError(CRYPT_E_ASN1_CORRUPT);
3422 snprintf(str, sizeof(str), ".%d", val);
3423 bytesNeeded += strlen(str);
3427 *pcbObjId = bytesNeeded;
3428 else if (*pcbObjId < bytesNeeded)
3430 *pcbObjId = bytesNeeded;
3431 SetLastError(ERROR_MORE_DATA);
3437 sprintf(pszObjId, "%d.%d", pbEncoded[1 + lenBytes] / 40,
3438 pbEncoded[1 + lenBytes] - (pbEncoded[1 + lenBytes] /
3440 pszObjId += strlen(pszObjId);
3441 for (ptr = pbEncoded + 2 + lenBytes; ret &&
3442 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3446 while (ptr - pbEncoded - 1 - lenBytes < dataLen &&
3455 sprintf(pszObjId, ".%d", val);
3456 pszObjId += strlen(pszObjId);
3462 *pcbObjId = bytesNeeded;
3467 SetLastError(CRYPT_E_ASN1_BADTAG);
3471 __EXCEPT(page_fault)
3473 SetLastError(STATUS_ACCESS_VIOLATION);
3480 /* Warning: this assumes the address of value->Value.pbData is already set, in
3481 * order to avoid overwriting memory. (In some cases, it may change it, if it
3482 * doesn't copy anything to memory.) Be sure to set it correctly!
3484 static BOOL WINAPI CRYPT_AsnDecodeNameValue(const BYTE *pbEncoded,
3485 DWORD cbEncoded, DWORD dwFlags, CERT_NAME_VALUE *value, DWORD *pcbValue)
3493 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3495 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3497 switch (pbEncoded[0])
3499 case ASN_NUMERICSTRING:
3500 case ASN_PRINTABLESTRING:
3504 FIXME("Unimplemented string type %02x\n", pbEncoded[0]);
3505 SetLastError(OSS_UNIMPLEMENTED);
3510 DWORD bytesNeeded = sizeof(CERT_NAME_VALUE);
3512 switch (pbEncoded[0])
3514 case ASN_NUMERICSTRING:
3515 case ASN_PRINTABLESTRING:
3517 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
3518 bytesNeeded += dataLen;
3522 *pcbValue = bytesNeeded;
3523 else if (*pcbValue < bytesNeeded)
3525 *pcbValue = bytesNeeded;
3526 SetLastError(ERROR_MORE_DATA);
3531 *pcbValue = bytesNeeded;
3532 switch (pbEncoded[0])
3534 case ASN_NUMERICSTRING:
3535 value->dwValueType = CERT_RDN_NUMERIC_STRING;
3537 case ASN_PRINTABLESTRING:
3538 value->dwValueType = CERT_RDN_PRINTABLE_STRING;
3541 value->dwValueType = CERT_RDN_IA5_STRING;
3546 switch (pbEncoded[0])
3548 case ASN_NUMERICSTRING:
3549 case ASN_PRINTABLESTRING:
3551 value->Value.cbData = dataLen;
3552 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3553 value->Value.pbData = (BYTE *)pbEncoded + 1 +
3557 assert(value->Value.pbData);
3558 memcpy(value->Value.pbData,
3559 pbEncoded + 1 + lenBytes, dataLen);
3566 value->Value.cbData = 0;
3567 value->Value.pbData = NULL;
3573 __EXCEPT(page_fault)
3575 SetLastError(STATUS_ACCESS_VIOLATION);
3582 /* FIXME: this should use CRYPT_AsnDecodeSequence (though that won't accept it
3583 * at the moment because of the ASN_CONSTRUCTOR tag.)
3585 static BOOL WINAPI CRYPT_AsnDecodeRdnAttr(const BYTE *pbEncoded,
3586 DWORD cbEncoded, DWORD dwFlags, CERT_RDN_ATTR *attr, DWORD *pcbAttr)
3592 if (pbEncoded[0] == (ASN_CONSTRUCTOR | ASN_SEQUENCE))
3594 DWORD bytesNeeded, dataLen, size;
3597 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3599 /* The data length must be at least 4, two for the tag and
3600 * length for the OID, and two for the string (assuming both
3601 * have short-form lengths.)
3605 SetLastError(CRYPT_E_ASN1_EOD);
3610 bytesNeeded = sizeof(CERT_RDN_ATTR);
3611 lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3612 ret = CRYPT_AsnDecodeOid(pbEncoded + 1 + lenBytes,
3613 cbEncoded - 1 - lenBytes, dwFlags, NULL, &size);
3616 /* ugly: need to know the size of the next element of
3617 * the sequence, so get it directly
3619 DWORD objIdOfset = 1 + lenBytes, objIdLen,
3620 nameValueOffset = 0;
3622 ret = CRYPT_GetLen(pbEncoded + objIdOfset,
3623 cbEncoded - objIdOfset, &objIdLen);
3624 bytesNeeded += size;
3625 /* hack: like encoding, this takes advantage of the
3626 * fact that the rest of the structure is identical to
3627 * a CERT_NAME_VALUE.
3631 nameValueOffset = objIdOfset + objIdLen + 1 +
3632 GET_LEN_BYTES(pbEncoded[objIdOfset]);
3633 ret = CRYPT_AsnDecodeNameValue(
3634 pbEncoded + nameValueOffset,
3635 cbEncoded - nameValueOffset, dwFlags, NULL, &size);
3639 bytesNeeded += size;
3641 *pcbAttr = bytesNeeded;
3642 else if (*pcbAttr < bytesNeeded)
3644 *pcbAttr = bytesNeeded;
3645 SetLastError(ERROR_MORE_DATA);
3650 BYTE *originalData = attr->Value.pbData;
3652 *pcbAttr = bytesNeeded;
3653 /* strange: decode the value first, because it
3654 * has a counted size, and we can store the OID
3655 * after it. Keep track of the original data
3656 * pointer, we'll need to know whether it was
3660 ret = CRYPT_AsnDecodeNameValue(
3661 pbEncoded + nameValueOffset,
3662 cbEncoded - nameValueOffset, dwFlags,
3663 (CERT_NAME_VALUE *)&attr->dwValueType, &size);
3668 /* if the data were copied to the
3669 * original location, the OID goes
3670 * after. Otherwise it goes in the
3671 * spot originally reserved for the
3674 if (attr->Value.pbData == originalData)
3676 (LPSTR)(attr->Value.pbData +
3677 attr->Value.cbData);
3680 (LPSTR)originalData;
3681 size = bytesNeeded - size;
3682 ret = CRYPT_AsnDecodeOid(
3683 pbEncoded + objIdOfset,
3684 cbEncoded - objIdOfset,
3685 dwFlags, attr->pszObjId, &size);
3688 attr->pszObjId = NULL;
3698 SetLastError(CRYPT_E_ASN1_BADTAG);
3702 __EXCEPT(page_fault)
3704 SetLastError(STATUS_ACCESS_VIOLATION);
3711 static BOOL WINAPI CRYPT_AsnDecodeRdn(const BYTE *pbEncoded, DWORD cbEncoded,
3712 DWORD dwFlags, CERT_RDN *rdn, DWORD *pcbRdn)
3718 if (pbEncoded[0] == (ASN_CONSTRUCTOR | ASN_SETOF))
3722 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3724 DWORD bytesNeeded, cRDNAttr = 0;
3725 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3727 bytesNeeded = sizeof(CERT_RDN);
3733 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3734 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3736 ret = CRYPT_AsnDecodeRdnAttr(ptr,
3737 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3743 bytesNeeded += size;
3744 ret = CRYPT_GetLen(ptr,
3745 cbEncoded - (ptr - pbEncoded), &nextLen);
3747 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3754 *pcbRdn = bytesNeeded;
3755 else if (*pcbRdn < bytesNeeded)
3757 *pcbRdn = bytesNeeded;
3758 SetLastError(ERROR_MORE_DATA);
3767 *pcbRdn = bytesNeeded;
3768 rdn->cRDNAttr = cRDNAttr;
3769 rdn->rgRDNAttr = (CERT_RDN_ATTR *)((BYTE *)rdn +
3771 nextData = (BYTE *)rdn->rgRDNAttr +
3772 rdn->cRDNAttr * sizeof(CERT_RDN_ATTR);
3773 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3774 i < cRDNAttr && ptr - pbEncoded - 1 - lenBytes <
3777 rdn->rgRDNAttr[i].Value.pbData = nextData;
3779 ret = CRYPT_AsnDecodeRdnAttr(ptr,
3780 cbEncoded - (ptr - pbEncoded), dwFlags,
3781 &rdn->rgRDNAttr[i], &size);
3786 bytesNeeded -= size;
3787 /* If dwFlags & CRYPT_DECODE_NOCOPY_FLAG, the
3788 * data may not have been copied.
3790 if (rdn->rgRDNAttr[i].Value.pbData == nextData)
3792 rdn->rgRDNAttr[i].Value.cbData;
3793 /* Ugly: the OID, if copied, is stored in
3794 * memory after the value, so increment by its
3795 * string length if it's set and points here.
3797 if ((const BYTE *)rdn->rgRDNAttr[i].pszObjId
3800 rdn->rgRDNAttr[i].pszObjId) + 1;
3801 ret = CRYPT_GetLen(ptr,
3802 cbEncoded - (ptr - pbEncoded), &nextLen);
3804 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3813 SetLastError(CRYPT_E_ASN1_BADTAG);
3817 __EXCEPT(page_fault)
3819 SetLastError(STATUS_ACCESS_VIOLATION);
3826 static BOOL WINAPI CRYPT_AsnDecodeName(DWORD dwCertEncodingType,
3827 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3828 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3834 if (pbEncoded[0] == (ASN_CONSTRUCTOR | ASN_SEQUENCEOF))
3838 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
3840 DWORD bytesNeeded, cRDN = 0;
3841 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
3843 bytesNeeded = sizeof(CERT_NAME_INFO);
3848 for (ptr = pbEncoded + 1 + lenBytes; ret &&
3849 ptr - pbEncoded - 1 - lenBytes < dataLen; )
3853 ret = CRYPT_AsnDecodeRdn(ptr,
3854 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
3860 bytesNeeded += size;
3861 ret = CRYPT_GetLen(ptr,
3862 cbEncoded - (ptr - pbEncoded), &nextLen);
3864 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
3871 *pcbStructInfo = bytesNeeded;
3872 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
3873 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
3875 CERT_NAME_INFO *info;
3877 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
3878 pvStructInfo = *(BYTE **)pvStructInfo;
3879 info = (CERT_NAME_INFO *)pvStructInfo;
3881 if (info->cRDN == 0)
3889 info->rgRDN = (CERT_RDN *)((BYTE *)pvStructInfo +
3890 sizeof(CERT_NAME_INFO));
3891 nextData = (BYTE *)info->rgRDN +
3892 info->cRDN * sizeof(CERT_RDN);
3893 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
3894 i < cRDN && ptr - pbEncoded - 1 - lenBytes <
3897 info->rgRDN[i].rgRDNAttr =
3898 (CERT_RDN_ATTR *)nextData;
3900 ret = CRYPT_AsnDecodeRdn(ptr,
3901 cbEncoded - (ptr - pbEncoded), dwFlags,
3902 &info->rgRDN[i], &size);
3908 bytesNeeded -= size;
3909 ret = CRYPT_GetLen(ptr,
3910 cbEncoded - (ptr - pbEncoded), &nextLen);
3912 ptr += nextLen + 1 +
3913 GET_LEN_BYTES(ptr[1]);
3923 SetLastError(CRYPT_E_ASN1_BADTAG);
3927 __EXCEPT(page_fault)
3929 SetLastError(STATUS_ACCESS_VIOLATION);
3936 static BOOL WINAPI CRYPT_AsnDecodeCopyBytes(DWORD dwCertEncodingType,
3937 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3938 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3941 DWORD bytesNeeded = sizeof(CRYPT_OBJID_BLOB);
3943 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3944 pDecodePara, pvStructInfo, *pcbStructInfo);
3946 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
3947 bytesNeeded += cbEncoded;
3949 *pcbStructInfo = bytesNeeded;
3950 else if (*pcbStructInfo < bytesNeeded)
3952 SetLastError(ERROR_MORE_DATA);
3953 *pcbStructInfo = bytesNeeded;
3958 PCRYPT_OBJID_BLOB blob = (PCRYPT_OBJID_BLOB)pvStructInfo;
3960 *pcbStructInfo = bytesNeeded;
3961 blob->cbData = cbEncoded;
3962 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
3963 blob->pbData = (LPBYTE)pbEncoded;
3966 assert(blob->pbData);
3967 memcpy(blob->pbData, pbEncoded, blob->cbData);
3973 static BOOL WINAPI CRYPT_AsnDecodeAlgorithmId(DWORD dwCertEncodingType,
3974 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
3975 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
3977 CRYPT_ALGORITHM_IDENTIFIER *algo =
3978 (CRYPT_ALGORITHM_IDENTIFIER *)pvStructInfo;
3980 struct AsnDecodeSequenceItem items[] = {
3981 { offsetof(CRYPT_ALGORITHM_IDENTIFIER, pszObjId),
3982 CRYPT_AsnDecodeOidWrapper, sizeof(LPSTR), FALSE, TRUE,
3983 offsetof(CRYPT_ALGORITHM_IDENTIFIER, pszObjId), 0 },
3984 { offsetof(CRYPT_ALGORITHM_IDENTIFIER, Parameters),
3985 CRYPT_AsnDecodeCopyBytes, sizeof(CRYPT_OBJID_BLOB), TRUE, TRUE,
3986 offsetof(CRYPT_ALGORITHM_IDENTIFIER, Parameters.pbData), 0 },
3989 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
3990 pDecodePara, pvStructInfo, *pcbStructInfo);
3992 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
3993 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
3994 pDecodePara, pvStructInfo, pcbStructInfo, algo ? algo->pszObjId : NULL);
3995 if (ret && pvStructInfo)
3997 TRACE("pszObjId is %p (%s)\n", algo->pszObjId,
3998 debugstr_a(algo->pszObjId));
4003 static BOOL WINAPI CRYPT_AsnDecodePubKeyInfo(DWORD dwCertEncodingType,
4004 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4005 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4011 struct AsnDecodeSequenceItem items[] = {
4012 { offsetof(CERT_PUBLIC_KEY_INFO, Algorithm),
4013 CRYPT_AsnDecodeAlgorithmId, sizeof(CRYPT_ALGORITHM_IDENTIFIER),
4014 FALSE, TRUE, offsetof(CERT_PUBLIC_KEY_INFO,
4015 Algorithm.pszObjId) },
4016 { offsetof(CERT_PUBLIC_KEY_INFO, PublicKey),
4017 CRYPT_AsnDecodeBitsInternal, sizeof(CRYPT_BIT_BLOB), FALSE, TRUE,
4018 offsetof(CERT_PUBLIC_KEY_INFO, PublicKey.pbData) },
4021 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
4022 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
4023 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
4025 __EXCEPT(page_fault)
4027 SetLastError(STATUS_ACCESS_VIOLATION);
4034 static BOOL WINAPI CRYPT_AsnDecodeBool(DWORD dwCertEncodingType,
4035 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4036 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4042 SetLastError(CRYPT_E_ASN1_CORRUPT);
4045 if (pbEncoded[0] != ASN_BOOL)
4047 SetLastError(CRYPT_E_ASN1_BADTAG);
4050 if (GET_LEN_BYTES(pbEncoded[1]) > 1)
4052 SetLastError(CRYPT_E_ASN1_CORRUPT);
4055 if (pbEncoded[1] > 1)
4057 SetLastError(CRYPT_E_ASN1_CORRUPT);
4062 *pcbStructInfo = sizeof(BOOL);
4065 else if (*pcbStructInfo < sizeof(BOOL))
4067 *pcbStructInfo = sizeof(BOOL);
4068 SetLastError(ERROR_MORE_DATA);
4073 *(BOOL *)pvStructInfo = pbEncoded[2] ? TRUE : FALSE;
4076 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4080 static BOOL CRYPT_AsnDecodeAltNameEntry(const BYTE *pbEncoded, DWORD cbEncoded,
4081 DWORD dwFlags, CERT_ALT_NAME_ENTRY *entry, DWORD *pcbEntry)
4083 DWORD dataLen, lenBytes, bytesNeeded = sizeof(CERT_ALT_NAME_ENTRY);
4088 SetLastError(CRYPT_E_ASN1_CORRUPT);
4091 if ((pbEncoded[0] & ASN_FLAGS_MASK) != ASN_CONTEXT)
4093 SetLastError(CRYPT_E_ASN1_BADTAG);
4096 lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4097 if (1 + lenBytes > cbEncoded)
4099 SetLastError(CRYPT_E_ASN1_CORRUPT);
4102 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4104 switch (pbEncoded[0] & ASN_TYPE_MASK)
4106 case 1: /* rfc822Name */
4107 case 2: /* dNSName */
4108 case 6: /* uniformResourceIdentifier */
4109 bytesNeeded += (dataLen + 1) * sizeof(WCHAR);
4111 case 7: /* iPAddress */
4112 bytesNeeded += dataLen;
4114 case 8: /* registeredID */
4115 /* FIXME: decode as OID */
4116 case 0: /* otherName */
4117 case 4: /* directoryName */
4119 SetLastError(CRYPT_E_ASN1_BADTAG);
4122 case 3: /* x400Address, unimplemented */
4123 case 5: /* ediPartyName, unimplemented */
4124 SetLastError(CRYPT_E_ASN1_BADTAG);
4128 SetLastError(CRYPT_E_ASN1_CORRUPT);
4134 *pcbEntry = bytesNeeded;
4135 else if (*pcbEntry < bytesNeeded)
4137 SetLastError(ERROR_MORE_DATA);
4142 /* MS used values one greater than the asn1 ones.. sigh */
4143 entry->dwAltNameChoice = (pbEncoded[0] & 0x7f) + 1;
4144 switch (pbEncoded[0] & ASN_TYPE_MASK)
4146 case 1: /* rfc822Name */
4147 case 2: /* dNSName */
4148 case 6: /* uniformResourceIdentifier */
4152 for (i = 0; i < dataLen; i++)
4153 entry->u.pwszURL[i] =
4154 (WCHAR)pbEncoded[1 + lenBytes + i];
4155 entry->u.pwszURL[i] = 0;
4158 case 7: /* iPAddress */
4159 /* The next data pointer is in the pwszURL spot, that is,
4160 * the first 4 bytes. Need to move it to the next spot.
4162 entry->u.IPAddress.pbData = (LPBYTE)entry->u.pwszURL;
4163 entry->u.IPAddress.cbData = dataLen;
4164 memcpy(entry->u.IPAddress.pbData, pbEncoded + 1 + lenBytes,
4174 static BOOL WINAPI CRYPT_AsnDecodeAltName(DWORD dwCertEncodingType,
4175 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4176 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4182 if (pbEncoded[0] == ASN_SEQUENCEOF)
4186 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4188 DWORD bytesNeeded, cEntry = 0;
4189 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4191 bytesNeeded = sizeof(CERT_ALT_NAME_INFO);
4196 for (ptr = pbEncoded + 1 + lenBytes; ret &&
4197 ptr - pbEncoded - 1 - lenBytes < dataLen; )
4201 ret = CRYPT_AsnDecodeAltNameEntry(ptr,
4202 cbEncoded - (ptr - pbEncoded), dwFlags, NULL, &size);
4208 bytesNeeded += size;
4209 ret = CRYPT_GetLen(ptr,
4210 cbEncoded - (ptr - pbEncoded), &nextLen);
4212 ptr += nextLen + 1 + GET_LEN_BYTES(ptr[1]);
4219 *pcbStructInfo = bytesNeeded;
4220 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags,
4221 pDecodePara, pvStructInfo, pcbStructInfo, bytesNeeded)))
4223 CERT_ALT_NAME_INFO *info;
4225 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4226 pvStructInfo = *(BYTE **)pvStructInfo;
4227 info = (CERT_ALT_NAME_INFO *)pvStructInfo;
4228 info->cAltEntry = 0;
4230 info->rgAltEntry = NULL;
4238 (CERT_ALT_NAME_ENTRY *)((BYTE *)pvStructInfo +
4239 sizeof(CERT_ALT_NAME_INFO));
4240 nextData = (BYTE *)info->rgAltEntry +
4241 cEntry * sizeof(CERT_ALT_NAME_ENTRY);
4242 for (i = 0, ptr = pbEncoded + 1 + lenBytes; ret &&
4243 i < cEntry && ptr - pbEncoded - 1 - lenBytes <
4246 info->rgAltEntry[i].u.pwszURL =
4249 ret = CRYPT_AsnDecodeAltNameEntry(ptr,
4250 cbEncoded - (ptr - pbEncoded), dwFlags,
4251 &info->rgAltEntry[i], &size);
4258 sizeof(CERT_ALT_NAME_ENTRY);
4259 bytesNeeded -= size;
4260 ret = CRYPT_GetLen(ptr,
4261 cbEncoded - (ptr - pbEncoded), &nextLen);
4263 ptr += nextLen + 1 +
4264 GET_LEN_BYTES(ptr[1]);
4274 SetLastError(CRYPT_E_ASN1_BADTAG);
4278 __EXCEPT(page_fault)
4280 SetLastError(STATUS_ACCESS_VIOLATION);
4287 struct PATH_LEN_CONSTRAINT
4289 BOOL fPathLenConstraint;
4290 DWORD dwPathLenConstraint;
4293 static BOOL WINAPI CRYPT_AsnDecodePathLenConstraint(DWORD dwCertEncodingType,
4294 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4295 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4301 if (pbEncoded[0] == ASN_INTEGER)
4303 DWORD bytesNeeded = sizeof(struct PATH_LEN_CONSTRAINT);
4306 *pcbStructInfo = bytesNeeded;
4307 else if (*pcbStructInfo < bytesNeeded)
4309 SetLastError(ERROR_MORE_DATA);
4310 *pcbStructInfo = bytesNeeded;
4315 struct PATH_LEN_CONSTRAINT *constraint =
4316 (struct PATH_LEN_CONSTRAINT *)pvStructInfo;
4317 DWORD size = sizeof(constraint->dwPathLenConstraint);
4319 ret = CRYPT_AsnDecodeInt(dwCertEncodingType, X509_INTEGER,
4320 pbEncoded, cbEncoded, 0, NULL,
4321 &constraint->dwPathLenConstraint, &size);
4323 constraint->fPathLenConstraint = TRUE;
4324 TRACE("got an int, dwPathLenConstraint is %ld\n",
4325 constraint->dwPathLenConstraint);
4330 SetLastError(CRYPT_E_ASN1_CORRUPT);
4334 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4338 static BOOL WINAPI CRYPT_AsnDecodeBasicConstraints2(DWORD dwCertEncodingType,
4339 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4340 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4346 struct AsnDecodeSequenceItem items[] = {
4347 { offsetof(CERT_BASIC_CONSTRAINTS2_INFO, fCA), CRYPT_AsnDecodeBool,
4348 sizeof(BOOL), TRUE, FALSE, 0, 0 },
4349 { offsetof(CERT_BASIC_CONSTRAINTS2_INFO, fPathLenConstraint),
4350 CRYPT_AsnDecodePathLenConstraint, sizeof(struct PATH_LEN_CONSTRAINT),
4351 TRUE, FALSE, 0, 0 },
4354 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
4355 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded, dwFlags,
4356 pDecodePara, pvStructInfo, pcbStructInfo, NULL);
4358 __EXCEPT(page_fault)
4360 SetLastError(STATUS_ACCESS_VIOLATION);
4367 #define RSA1_MAGIC 0x31415352
4369 struct DECODED_RSA_PUB_KEY
4372 CRYPT_INTEGER_BLOB modulus;
4375 static BOOL WINAPI CRYPT_AsnDecodeRsaPubKey(DWORD dwCertEncodingType,
4376 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4377 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4383 struct AsnDecodeSequenceItem items[] = {
4384 { offsetof(struct DECODED_RSA_PUB_KEY, modulus),
4385 CRYPT_AsnDecodeIntegerInternal, sizeof(CRYPT_INTEGER_BLOB),
4386 FALSE, TRUE, offsetof(struct DECODED_RSA_PUB_KEY, modulus.pbData),
4388 { offsetof(struct DECODED_RSA_PUB_KEY, pubexp),
4389 CRYPT_AsnDecodeInt, sizeof(DWORD), FALSE, FALSE, 0, 0 },
4391 struct DECODED_RSA_PUB_KEY *decodedKey = NULL;
4394 ret = CRYPT_AsnDecodeSequence(dwCertEncodingType, items,
4395 sizeof(items) / sizeof(items[0]), pbEncoded, cbEncoded,
4396 CRYPT_DECODE_ALLOC_FLAG, NULL, &decodedKey, &size, NULL);
4399 DWORD bytesNeeded = sizeof(BLOBHEADER) + sizeof(RSAPUBKEY) +
4400 decodedKey->modulus.cbData;
4404 *pcbStructInfo = bytesNeeded;
4407 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4408 pvStructInfo, pcbStructInfo, bytesNeeded)))
4411 RSAPUBKEY *rsaPubKey;
4413 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4414 pvStructInfo = *(BYTE **)pvStructInfo;
4415 hdr = (BLOBHEADER *)pvStructInfo;
4416 hdr->bType = PUBLICKEYBLOB;
4417 hdr->bVersion = CUR_BLOB_VERSION;
4419 hdr->aiKeyAlg = CALG_RSA_KEYX;
4420 rsaPubKey = (RSAPUBKEY *)((BYTE *)pvStructInfo +
4421 sizeof(BLOBHEADER));
4422 rsaPubKey->magic = RSA1_MAGIC;
4423 rsaPubKey->pubexp = decodedKey->pubexp;
4424 rsaPubKey->bitlen = decodedKey->modulus.cbData * 8;
4425 memcpy((BYTE *)pvStructInfo + sizeof(BLOBHEADER) +
4426 sizeof(RSAPUBKEY), decodedKey->modulus.pbData,
4427 decodedKey->modulus.cbData);
4429 LocalFree(decodedKey);
4432 __EXCEPT(page_fault)
4434 SetLastError(STATUS_ACCESS_VIOLATION);
4441 static BOOL WINAPI CRYPT_AsnDecodeOctetsInternal(DWORD dwCertEncodingType,
4442 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4443 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4447 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
4448 pDecodePara, pvStructInfo, *pcbStructInfo);
4450 if (pbEncoded[0] == ASN_OCTETSTRING)
4452 DWORD bytesNeeded, dataLen;
4454 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4456 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4457 bytesNeeded = sizeof(CRYPT_DATA_BLOB);
4459 bytesNeeded = dataLen + sizeof(CRYPT_DATA_BLOB);
4461 *pcbStructInfo = bytesNeeded;
4462 else if (*pcbStructInfo < bytesNeeded)
4464 SetLastError(ERROR_MORE_DATA);
4465 *pcbStructInfo = bytesNeeded;
4470 CRYPT_DATA_BLOB *blob;
4471 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4473 blob = (CRYPT_DATA_BLOB *)pvStructInfo;
4474 blob->cbData = dataLen;
4475 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4476 blob->pbData = (BYTE *)pbEncoded + 1 + lenBytes;
4479 assert(blob->pbData);
4481 memcpy(blob->pbData, pbEncoded + 1 + lenBytes,
4489 SetLastError(CRYPT_E_ASN1_BADTAG);
4495 static BOOL WINAPI CRYPT_AsnDecodeOctets(DWORD dwCertEncodingType,
4496 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4497 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4501 TRACE("%p, %ld, %08lx, %p, %p, %ld\n", pbEncoded, cbEncoded, dwFlags,
4502 pDecodePara, pvStructInfo, *pcbStructInfo);
4508 if ((ret = CRYPT_AsnDecodeOctetsInternal(dwCertEncodingType,
4509 lpszStructType, pbEncoded, cbEncoded,
4510 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL, &bytesNeeded)))
4513 *pcbStructInfo = bytesNeeded;
4514 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4515 pvStructInfo, pcbStructInfo, bytesNeeded)))
4517 CRYPT_DATA_BLOB *blob;
4519 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4520 pvStructInfo = *(BYTE **)pvStructInfo;
4521 blob = (CRYPT_DATA_BLOB *)pvStructInfo;
4522 blob->pbData = (BYTE *)pvStructInfo + sizeof(CRYPT_DATA_BLOB);
4523 ret = CRYPT_AsnDecodeOctetsInternal(dwCertEncodingType,
4524 lpszStructType, pbEncoded, cbEncoded,
4525 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pvStructInfo,
4531 SetLastError(CRYPT_E_ASN1_BADTAG);
4535 __EXCEPT(page_fault)
4537 SetLastError(STATUS_ACCESS_VIOLATION);
4544 static BOOL WINAPI CRYPT_AsnDecodeBitsInternal(DWORD dwCertEncodingType,
4545 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4546 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4550 TRACE("(%p, %ld, 0x%08lx, %p, %p, %ld)\n", pbEncoded, cbEncoded, dwFlags,
4551 pDecodePara, pvStructInfo, *pcbStructInfo);
4553 if (pbEncoded[0] == ASN_BITSTRING)
4555 DWORD bytesNeeded, dataLen;
4557 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4559 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4560 bytesNeeded = sizeof(CRYPT_BIT_BLOB);
4562 bytesNeeded = dataLen - 1 + sizeof(CRYPT_BIT_BLOB);
4564 *pcbStructInfo = bytesNeeded;
4565 else if (*pcbStructInfo < bytesNeeded)
4567 *pcbStructInfo = bytesNeeded;
4568 SetLastError(ERROR_MORE_DATA);
4573 CRYPT_BIT_BLOB *blob;
4575 blob = (CRYPT_BIT_BLOB *)pvStructInfo;
4576 blob->cbData = dataLen - 1;
4577 blob->cUnusedBits = *(pbEncoded + 1 +
4578 GET_LEN_BYTES(pbEncoded[1]));
4579 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
4581 blob->pbData = (BYTE *)pbEncoded + 2 +
4582 GET_LEN_BYTES(pbEncoded[1]);
4586 assert(blob->pbData);
4589 BYTE mask = 0xff << blob->cUnusedBits;
4591 memcpy(blob->pbData, pbEncoded + 2 +
4592 GET_LEN_BYTES(pbEncoded[1]), blob->cbData);
4593 blob->pbData[blob->cbData - 1] &= mask;
4601 SetLastError(CRYPT_E_ASN1_BADTAG);
4604 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4608 static BOOL WINAPI CRYPT_AsnDecodeBits(DWORD dwCertEncodingType,
4609 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4610 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4614 TRACE("(%p, %ld, 0x%08lx, %p, %p, %p)\n", pbEncoded, cbEncoded, dwFlags,
4615 pDecodePara, pvStructInfo, pcbStructInfo);
4621 if ((ret = CRYPT_AsnDecodeBitsInternal(dwCertEncodingType,
4622 lpszStructType, pbEncoded, cbEncoded,
4623 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, NULL, &bytesNeeded)))
4626 *pcbStructInfo = bytesNeeded;
4627 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4628 pvStructInfo, pcbStructInfo, bytesNeeded)))
4630 CRYPT_BIT_BLOB *blob;
4632 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4633 pvStructInfo = *(BYTE **)pvStructInfo;
4634 blob = (CRYPT_BIT_BLOB *)pvStructInfo;
4635 blob->pbData = (BYTE *)pvStructInfo + sizeof(CRYPT_BIT_BLOB);
4636 ret = CRYPT_AsnDecodeBitsInternal(dwCertEncodingType,
4637 lpszStructType, pbEncoded, cbEncoded,
4638 dwFlags & ~CRYPT_DECODE_ALLOC_FLAG, NULL, pvStructInfo,
4643 __EXCEPT(page_fault)
4645 SetLastError(STATUS_ACCESS_VIOLATION);
4649 TRACE("returning %d (%08lx)\n", ret, GetLastError());
4653 static BOOL WINAPI CRYPT_AsnDecodeInt(DWORD dwCertEncodingType,
4654 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4655 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4661 *pcbStructInfo = sizeof(int);
4666 BYTE buf[sizeof(CRYPT_INTEGER_BLOB) + sizeof(int)];
4667 CRYPT_INTEGER_BLOB *blob = (CRYPT_INTEGER_BLOB *)buf;
4668 DWORD size = sizeof(buf);
4670 blob->pbData = buf + sizeof(CRYPT_INTEGER_BLOB);
4671 ret = CRYPT_AsnDecodeIntegerInternal(dwCertEncodingType,
4672 X509_MULTI_BYTE_INTEGER, pbEncoded, cbEncoded, 0, NULL, &buf, &size);
4675 if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4676 pvStructInfo, pcbStructInfo, sizeof(int))))
4680 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4681 pvStructInfo = *(BYTE **)pvStructInfo;
4682 if (blob->pbData[blob->cbData - 1] & 0x80)
4684 /* initialize to a negative value to sign-extend */
4689 for (i = 0; i < blob->cbData; i++)
4692 val |= blob->pbData[blob->cbData - i - 1];
4694 memcpy(pvStructInfo, &val, sizeof(int));
4697 else if (GetLastError() == ERROR_MORE_DATA)
4698 SetLastError(CRYPT_E_ASN1_LARGE);
4700 __EXCEPT(page_fault)
4702 SetLastError(STATUS_ACCESS_VIOLATION);
4709 static BOOL WINAPI CRYPT_AsnDecodeIntegerInternal(DWORD dwCertEncodingType,
4710 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4711 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4715 if (pbEncoded[0] == ASN_INTEGER)
4717 DWORD bytesNeeded, dataLen;
4719 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4721 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4723 bytesNeeded = dataLen + sizeof(CRYPT_INTEGER_BLOB);
4725 *pcbStructInfo = bytesNeeded;
4726 else if (*pcbStructInfo < bytesNeeded)
4728 *pcbStructInfo = bytesNeeded;
4729 SetLastError(ERROR_MORE_DATA);
4734 CRYPT_INTEGER_BLOB *blob = (CRYPT_INTEGER_BLOB *)pvStructInfo;
4736 blob->cbData = dataLen;
4737 assert(blob->pbData);
4742 for (i = 0; i < blob->cbData; i++)
4744 blob->pbData[i] = *(pbEncoded + 1 + lenBytes +
4753 SetLastError(CRYPT_E_ASN1_BADTAG);
4759 static BOOL WINAPI CRYPT_AsnDecodeInteger(DWORD dwCertEncodingType,
4760 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4761 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4769 if ((ret = CRYPT_AsnDecodeIntegerInternal(dwCertEncodingType,
4770 lpszStructType, pbEncoded, cbEncoded,
4771 dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, NULL, &bytesNeeded)))
4774 *pcbStructInfo = bytesNeeded;
4775 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4776 pvStructInfo, pcbStructInfo, bytesNeeded)))
4778 CRYPT_INTEGER_BLOB *blob;
4780 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4781 pvStructInfo = *(BYTE **)pvStructInfo;
4782 blob = (CRYPT_INTEGER_BLOB *)pvStructInfo;
4783 blob->pbData = (BYTE *)pvStructInfo +
4784 sizeof(CRYPT_INTEGER_BLOB);
4785 ret = CRYPT_AsnDecodeIntegerInternal(dwCertEncodingType,
4786 lpszStructType, pbEncoded, cbEncoded,
4787 dwFlags & ~CRYPT_ENCODE_ALLOC_FLAG, NULL, pvStructInfo,
4792 __EXCEPT(page_fault)
4794 SetLastError(STATUS_ACCESS_VIOLATION);
4801 static BOOL WINAPI CRYPT_AsnDecodeUnsignedInteger(DWORD dwCertEncodingType,
4802 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4803 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4809 if (pbEncoded[0] == ASN_INTEGER)
4811 DWORD bytesNeeded, dataLen;
4812 CRYPT_INTEGER_BLOB *blob;
4814 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
4816 bytesNeeded = dataLen + sizeof(CRYPT_INTEGER_BLOB);
4818 *pcbStructInfo = bytesNeeded;
4819 else if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4820 pvStructInfo, pcbStructInfo, bytesNeeded)))
4822 BYTE lenBytes = GET_LEN_BYTES(pbEncoded[1]);
4824 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4825 pvStructInfo = *(BYTE **)pvStructInfo;
4826 blob = (CRYPT_INTEGER_BLOB *)pvStructInfo;
4827 blob->cbData = dataLen;
4828 blob->pbData = (BYTE *)pvStructInfo +
4829 sizeof(CRYPT_INTEGER_BLOB);
4830 /* remove leading zero byte if it exists */
4831 if (blob->cbData && *(pbEncoded + 1 + lenBytes) == 0)
4840 for (i = 0; i < blob->cbData; i++)
4841 blob->pbData[i] = *(pbEncoded + 1 + lenBytes +
4842 pbEncoded[1] - i - 1);
4849 SetLastError(CRYPT_E_ASN1_BADTAG);
4853 __EXCEPT(page_fault)
4855 SetLastError(STATUS_ACCESS_VIOLATION);
4862 static BOOL WINAPI CRYPT_AsnDecodeEnumerated(DWORD dwCertEncodingType,
4863 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
4864 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
4870 *pcbStructInfo = sizeof(int);
4875 if (pbEncoded[0] == ASN_ENUMERATED)
4877 unsigned int val = 0, i;
4881 SetLastError(CRYPT_E_ASN1_EOD);
4884 else if (pbEncoded[1] == 0)
4886 SetLastError(CRYPT_E_ASN1_CORRUPT);
4891 /* A little strange looking, but we have to accept a sign byte:
4892 * 0xffffffff gets encoded as 0a 05 00 ff ff ff ff. Also,
4893 * assuming a small length is okay here, it has to be in short
4896 if (pbEncoded[1] > sizeof(unsigned int) + 1)
4898 SetLastError(CRYPT_E_ASN1_LARGE);
4901 for (i = 0; i < pbEncoded[1]; i++)
4904 val |= pbEncoded[2 + i];
4906 if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
4907 pvStructInfo, pcbStructInfo, sizeof(unsigned int))))
4909 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
4910 pvStructInfo = *(BYTE **)pvStructInfo;
4911 memcpy(pvStructInfo, &val, sizeof(unsigned int));
4917 SetLastError(CRYPT_E_ASN1_BADTAG);
4921 __EXCEPT(page_fault)
4923 SetLastError(STATUS_ACCESS_VIOLATION);
4930 /* Modifies word, pbEncoded, and len, and magically sets a value ret to FALSE
4933 #define CRYPT_TIME_GET_DIGITS(pbEncoded, len, numDigits, word) \
4938 for (i = 0; (len) > 0 && i < (numDigits); i++, (len)--) \
4940 if (!isdigit(*(pbEncoded))) \
4942 SetLastError(CRYPT_E_ASN1_CORRUPT); \
4948 (word) += *(pbEncoded)++ - '0'; \
4953 static BOOL CRYPT_AsnDecodeTimeZone(const BYTE *pbEncoded, DWORD len,
4954 SYSTEMTIME *sysTime)
4960 if (len >= 3 && (*pbEncoded == '+' || *pbEncoded == '-'))
4962 WORD hours, minutes = 0;
4963 BYTE sign = *pbEncoded++;
4966 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, hours);
4967 if (ret && hours >= 24)
4969 SetLastError(CRYPT_E_ASN1_CORRUPT);
4974 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, minutes);
4975 if (ret && minutes >= 60)
4977 SetLastError(CRYPT_E_ASN1_CORRUPT);
4985 sysTime->wHour += hours;
4986 sysTime->wMinute += minutes;
4990 if (hours > sysTime->wHour)
4993 sysTime->wHour = 24 - (hours - sysTime->wHour);
4996 sysTime->wHour -= hours;
4997 if (minutes > sysTime->wMinute)
5000 sysTime->wMinute = 60 - (minutes - sysTime->wMinute);
5003 sysTime->wMinute -= minutes;
5008 __EXCEPT(page_fault)
5010 SetLastError(STATUS_ACCESS_VIOLATION);
5017 #define MIN_ENCODED_TIME_LENGTH 10
5019 static BOOL WINAPI CRYPT_AsnDecodeUtcTime(DWORD dwCertEncodingType,
5020 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5021 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5027 *pcbStructInfo = sizeof(FILETIME);
5032 if (pbEncoded[0] == ASN_UTCTIME)
5036 SetLastError(CRYPT_E_ASN1_EOD);
5039 else if (pbEncoded[1] > 0x7f)
5041 /* long-form date strings really can't be valid */
5042 SetLastError(CRYPT_E_ASN1_CORRUPT);
5047 SYSTEMTIME sysTime = { 0 };
5048 BYTE len = pbEncoded[1];
5050 if (len < MIN_ENCODED_TIME_LENGTH)
5052 SetLastError(CRYPT_E_ASN1_CORRUPT);
5058 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wYear);
5059 if (sysTime.wYear >= 50)
5060 sysTime.wYear += 1900;
5062 sysTime.wYear += 2000;
5063 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMonth);
5064 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wDay);
5065 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wHour);
5066 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMinute);
5069 if (len >= 2 && isdigit(*pbEncoded) &&
5070 isdigit(*(pbEncoded + 1)))
5071 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
5073 else if (isdigit(*pbEncoded))
5074 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 1,
5077 ret = CRYPT_AsnDecodeTimeZone(pbEncoded, len,
5080 if (ret && (ret = CRYPT_DecodeEnsureSpace(dwFlags,
5081 pDecodePara, pvStructInfo, pcbStructInfo,
5084 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5085 pvStructInfo = *(BYTE **)pvStructInfo;
5086 ret = SystemTimeToFileTime(&sysTime,
5087 (FILETIME *)pvStructInfo);
5094 SetLastError(CRYPT_E_ASN1_BADTAG);
5098 __EXCEPT(page_fault)
5100 SetLastError(STATUS_ACCESS_VIOLATION);
5107 static BOOL WINAPI CRYPT_AsnDecodeGeneralizedTime(DWORD dwCertEncodingType,
5108 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5109 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5115 *pcbStructInfo = sizeof(FILETIME);
5120 if (pbEncoded[0] == ASN_GENERALTIME)
5124 SetLastError(CRYPT_E_ASN1_EOD);
5127 else if (pbEncoded[1] > 0x7f)
5129 /* long-form date strings really can't be valid */
5130 SetLastError(CRYPT_E_ASN1_CORRUPT);
5135 BYTE len = pbEncoded[1];
5137 if (len < MIN_ENCODED_TIME_LENGTH)
5139 SetLastError(CRYPT_E_ASN1_CORRUPT);
5144 SYSTEMTIME sysTime = { 0 };
5147 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 4, sysTime.wYear);
5148 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wMonth);
5149 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wDay);
5150 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2, sysTime.wHour);
5153 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
5156 CRYPT_TIME_GET_DIGITS(pbEncoded, len, 2,
5158 if (ret && len > 0 && (*pbEncoded == '.' ||
5165 /* workaround macro weirdness */
5166 digits = min(len, 3);
5167 CRYPT_TIME_GET_DIGITS(pbEncoded, len, digits,
5168 sysTime.wMilliseconds);
5171 ret = CRYPT_AsnDecodeTimeZone(pbEncoded, len,
5174 if (ret && (ret = CRYPT_DecodeEnsureSpace(dwFlags,
5175 pDecodePara, pvStructInfo, pcbStructInfo,
5178 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5179 pvStructInfo = *(BYTE **)pvStructInfo;
5180 ret = SystemTimeToFileTime(&sysTime,
5181 (FILETIME *)pvStructInfo);
5188 SetLastError(CRYPT_E_ASN1_BADTAG);
5192 __EXCEPT(page_fault)
5194 SetLastError(STATUS_ACCESS_VIOLATION);
5201 static BOOL WINAPI CRYPT_AsnDecodeChoiceOfTime(DWORD dwCertEncodingType,
5202 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5203 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5209 if (pbEncoded[0] == ASN_UTCTIME)
5210 ret = CRYPT_AsnDecodeUtcTime(dwCertEncodingType, lpszStructType,
5211 pbEncoded, cbEncoded, dwFlags, pDecodePara, pvStructInfo,
5213 else if (pbEncoded[0] == ASN_GENERALTIME)
5214 ret = CRYPT_AsnDecodeGeneralizedTime(dwCertEncodingType,
5215 lpszStructType, pbEncoded, cbEncoded, dwFlags, pDecodePara,
5216 pvStructInfo, pcbStructInfo);
5219 SetLastError(CRYPT_E_ASN1_BADTAG);
5223 __EXCEPT(page_fault)
5225 SetLastError(STATUS_ACCESS_VIOLATION);
5232 static BOOL WINAPI CRYPT_AsnDecodeSequenceOfAny(DWORD dwCertEncodingType,
5233 LPCSTR lpszStructType, const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5234 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5240 if (pbEncoded[0] == ASN_SEQUENCEOF)
5242 DWORD bytesNeeded, dataLen, remainingLen, cValue;
5244 if ((ret = CRYPT_GetLen(pbEncoded, cbEncoded, &dataLen)))
5249 lenBytes = GET_LEN_BYTES(pbEncoded[1]);
5250 bytesNeeded = sizeof(CRYPT_SEQUENCE_OF_ANY);
5252 ptr = pbEncoded + 1 + lenBytes;
5253 remainingLen = dataLen;
5254 while (ret && remainingLen)
5258 ret = CRYPT_GetLen(ptr, remainingLen, &nextLen);
5261 DWORD nextLenBytes = GET_LEN_BYTES(ptr[1]);
5263 remainingLen -= 1 + nextLenBytes + nextLen;
5264 ptr += 1 + nextLenBytes + nextLen;
5265 bytesNeeded += sizeof(CRYPT_DER_BLOB);
5266 if (!(dwFlags & CRYPT_DECODE_NOCOPY_FLAG))
5267 bytesNeeded += 1 + nextLenBytes + nextLen;
5273 CRYPT_SEQUENCE_OF_ANY *seq;
5277 if ((ret = CRYPT_DecodeEnsureSpace(dwFlags, pDecodePara,
5278 pvStructInfo, pcbStructInfo, bytesNeeded)))
5280 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG)
5281 pvStructInfo = *(BYTE **)pvStructInfo;
5282 seq = (CRYPT_SEQUENCE_OF_ANY *)pvStructInfo;
5283 seq->cValue = cValue;
5284 seq->rgValue = (CRYPT_DER_BLOB *)((BYTE *)seq +
5286 nextPtr = (BYTE *)seq->rgValue +
5287 cValue * sizeof(CRYPT_DER_BLOB);
5288 ptr = pbEncoded + 1 + lenBytes;
5289 remainingLen = dataLen;
5291 while (ret && remainingLen)
5295 ret = CRYPT_GetLen(ptr, remainingLen, &nextLen);
5298 DWORD nextLenBytes = GET_LEN_BYTES(ptr[1]);
5300 seq->rgValue[i].cbData = 1 + nextLenBytes +
5302 if (dwFlags & CRYPT_DECODE_NOCOPY_FLAG)
5303 seq->rgValue[i].pbData = (BYTE *)ptr;
5306 seq->rgValue[i].pbData = nextPtr;
5307 memcpy(nextPtr, ptr, 1 + nextLenBytes +
5309 nextPtr += 1 + nextLenBytes + nextLen;
5311 remainingLen -= 1 + nextLenBytes + nextLen;
5312 ptr += 1 + nextLenBytes + nextLen;
5322 SetLastError(CRYPT_E_ASN1_BADTAG);
5326 __EXCEPT(page_fault)
5328 SetLastError(STATUS_ACCESS_VIOLATION);
5335 BOOL WINAPI CryptDecodeObjectEx(DWORD dwCertEncodingType, LPCSTR lpszStructType,
5336 const BYTE *pbEncoded, DWORD cbEncoded, DWORD dwFlags,
5337 PCRYPT_DECODE_PARA pDecodePara, void *pvStructInfo, DWORD *pcbStructInfo)
5341 CryptDecodeObjectExFunc decodeFunc = NULL;
5343 TRACE("(0x%08lx, %s, %p, %ld, 0x%08lx, %p, %p, %p)\n",
5344 dwCertEncodingType, debugstr_a(lpszStructType), pbEncoded,
5345 cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo);
5347 if (!pvStructInfo && !pcbStructInfo)
5349 SetLastError(ERROR_INVALID_PARAMETER);
5352 if ((dwCertEncodingType & CERT_ENCODING_TYPE_MASK) != X509_ASN_ENCODING
5353 && (dwCertEncodingType & CMSG_ENCODING_TYPE_MASK) != PKCS_7_ASN_ENCODING)
5355 SetLastError(ERROR_FILE_NOT_FOUND);
5360 SetLastError(CRYPT_E_ASN1_EOD);
5363 if (cbEncoded > MAX_ENCODED_LEN)
5365 SetLastError(CRYPT_E_ASN1_LARGE);
5369 SetLastError(NOERROR);
5370 if (dwFlags & CRYPT_DECODE_ALLOC_FLAG && pvStructInfo)
5371 *(BYTE **)pvStructInfo = NULL;
5372 if (!HIWORD(lpszStructType))
5374 switch (LOWORD(lpszStructType))
5376 case (WORD)X509_CERT:
5377 decodeFunc = CRYPT_AsnDecodeCert;
5379 case (WORD)X509_CERT_TO_BE_SIGNED:
5380 decodeFunc = CRYPT_AsnDecodeCertInfo;
5382 case (WORD)X509_CERT_CRL_TO_BE_SIGNED:
5383 decodeFunc = CRYPT_AsnDecodeCRLInfo;
5385 case (WORD)X509_EXTENSIONS:
5386 decodeFunc = CRYPT_AsnDecodeExtensions;
5388 case (WORD)X509_NAME:
5389 decodeFunc = CRYPT_AsnDecodeName;
5391 case (WORD)X509_PUBLIC_KEY_INFO:
5392 decodeFunc = CRYPT_AsnDecodePubKeyInfo;
5394 case (WORD)X509_ALTERNATE_NAME:
5395 decodeFunc = CRYPT_AsnDecodeAltName;
5397 case (WORD)X509_BASIC_CONSTRAINTS2:
5398 decodeFunc = CRYPT_AsnDecodeBasicConstraints2;
5400 case (WORD)RSA_CSP_PUBLICKEYBLOB:
5401 decodeFunc = CRYPT_AsnDecodeRsaPubKey;
5403 case (WORD)X509_OCTET_STRING:
5404 decodeFunc = CRYPT_AsnDecodeOctets;
5406 case (WORD)X509_BITS:
5407 case (WORD)X509_KEY_USAGE:
5408 decodeFunc = CRYPT_AsnDecodeBits;
5410 case (WORD)X509_INTEGER:
5411 decodeFunc = CRYPT_AsnDecodeInt;
5413 case (WORD)X509_MULTI_BYTE_INTEGER:
5414 decodeFunc = CRYPT_AsnDecodeInteger;
5416 case (WORD)X509_MULTI_BYTE_UINT:
5417 decodeFunc = CRYPT_AsnDecodeUnsignedInteger;
5419 case (WORD)X509_ENUMERATED:
5420 decodeFunc = CRYPT_AsnDecodeEnumerated;
5422 case (WORD)X509_CHOICE_OF_TIME:
5423 decodeFunc = CRYPT_AsnDecodeChoiceOfTime;
5425 case (WORD)X509_SEQUENCE_OF_ANY:
5426 decodeFunc = CRYPT_AsnDecodeSequenceOfAny;
5428 case (WORD)PKCS_UTC_TIME:
5429 decodeFunc = CRYPT_AsnDecodeUtcTime;
5432 FIXME("%d: unimplemented\n", LOWORD(lpszStructType));
5435 else if (!strcmp(lpszStructType, szOID_CERT_EXTENSIONS))
5436 decodeFunc = CRYPT_AsnDecodeExtensions;
5437 else if (!strcmp(lpszStructType, szOID_RSA_signingTime))
5438 decodeFunc = CRYPT_AsnDecodeUtcTime;
5439 else if (!strcmp(lpszStructType, szOID_CRL_REASON_CODE))
5440 decodeFunc = CRYPT_AsnDecodeEnumerated;
5441 else if (!strcmp(lpszStructType, szOID_KEY_USAGE))
5442 decodeFunc = CRYPT_AsnDecodeBits;
5443 else if (!strcmp(lpszStructType, szOID_SUBJECT_KEY_IDENTIFIER))
5444 decodeFunc = CRYPT_AsnDecodeOctets;
5445 else if (!strcmp(lpszStructType, szOID_BASIC_CONSTRAINTS2))
5446 decodeFunc = CRYPT_AsnDecodeBasicConstraints2;
5447 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME))
5448 decodeFunc = CRYPT_AsnDecodeAltName;
5449 else if (!strcmp(lpszStructType, szOID_ISSUER_ALT_NAME2))
5450 decodeFunc = CRYPT_AsnDecodeAltName;
5451 else if (!strcmp(lpszStructType, szOID_NEXT_UPDATE_LOCATION))
5452 decodeFunc = CRYPT_AsnDecodeAltName;
5453 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME))
5454 decodeFunc = CRYPT_AsnDecodeAltName;
5455 else if (!strcmp(lpszStructType, szOID_SUBJECT_ALT_NAME2))
5456 decodeFunc = CRYPT_AsnDecodeAltName;
5458 TRACE("OID %s not found or unimplemented, looking for DLL\n",
5459 debugstr_a(lpszStructType));
5461 decodeFunc = (CryptDecodeObjectExFunc)CRYPT_GetFunc(dwCertEncodingType,
5462 lpszStructType, "CryptDecodeObjectEx", &lib);
5464 ret = decodeFunc(dwCertEncodingType, lpszStructType, pbEncoded,
5465 cbEncoded, dwFlags, pDecodePara, pvStructInfo, pcbStructInfo);
5467 SetLastError(ERROR_FILE_NOT_FOUND);