/* * Copyright 1999 Ian Schmidt * Copyright 2001 Travis Michielsen * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */ /*********************************************************************** * * TODO: * - Reference counting * - Thread-safing */ #include "config.h" #include "wine/port.h" #include #include #include #include #include #ifdef HAVE_SYS_STAT_H # include #endif #include #ifdef HAVE_UNISTD_H # include #endif #include "ntstatus.h" #define WIN32_NO_STATUS #include "crypt.h" #include "winnls.h" #include "winreg.h" #include "rpc.h" #include "wine/debug.h" #include "wine/unicode.h" #include "winternl.h" WINE_DEFAULT_DEBUG_CHANNEL(crypt); typedef struct tagMD4_CTX { unsigned int buf[4]; unsigned int i[2]; unsigned char in[64]; unsigned char digest[16]; } MD4_CTX; void WINAPI MD4Init(MD4_CTX *ctx); void WINAPI MD4Update(MD4_CTX *ctx, const unsigned char *buf, unsigned int len); void WINAPI MD4Final(MD4_CTX *ctx); static HWND crypt_hWindow; #define CRYPT_Alloc(size) (LocalAlloc(LMEM_ZEROINIT, size)) #define CRYPT_Free(buffer) (LocalFree(buffer)) static inline PWSTR CRYPT_GetProvKeyName(PCWSTR pProvName) { static const WCHAR KEYSTR[] = { 'S','o','f','t','w','a','r','e','\\', 'M','i','c','r','o','s','o','f','t','\\', 'C','r','y','p','t','o','g','r','a','p','h','y','\\', 'D','e','f','a','u','l','t','s','\\', 'P','r','o','v','i','d','e','r','\\',0 }; PWSTR keyname; keyname = CRYPT_Alloc((strlenW(KEYSTR) + strlenW(pProvName) +1)*sizeof(WCHAR)); if (keyname) { strcpyW(keyname, KEYSTR); strcpyW(keyname + strlenW(KEYSTR), pProvName); } else SetLastError(ERROR_NOT_ENOUGH_MEMORY); return keyname; } static inline PWSTR CRYPT_GetTypeKeyName(DWORD dwType, BOOL user) { static const WCHAR MACHINESTR[] = { 'S','o','f','t','w','a','r','e','\\', 'M','i','c','r','o','s','o','f','t','\\', 'C','r','y','p','t','o','g','r','a','p','h','y','\\', 'D','e','f','a','u','l','t','s','\\', 'P','r','o','v','i','d','e','r',' ','T','y','p','e','s','\\', 'T','y','p','e',' ','X','X','X',0 }; static const WCHAR USERSTR[] = { 'S','o','f','t','w','a','r','e','\\', 'M','i','c','r','o','s','o','f','t','\\', 'C','r','y','p','t','o','g','r','a','p','h','y','\\', 'P','r','o','v','i','d','e','r',' ','T','y','p','e',' ','X','X','X',0 }; PWSTR keyname; PWSTR ptr; keyname = CRYPT_Alloc( ((user ? strlenW(USERSTR) : strlenW(MACHINESTR)) +1)*sizeof(WCHAR)); if (keyname) { user ? strcpyW(keyname, USERSTR) : strcpyW(keyname, MACHINESTR); ptr = keyname + strlenW(keyname); *(--ptr) = (dwType % 10) + '0'; *(--ptr) = ((dwType / 10) % 10) + '0'; *(--ptr) = (dwType / 100) + '0'; } else SetLastError(ERROR_NOT_ENOUGH_MEMORY); return keyname; } /* CRYPT_UnicodeToANSI * wstr - unicode string * str - pointer to ANSI string or pointer to null pointer if we have to do the allocation * strsize - size of buffer pointed to by str * * returns TRUE if unsuccessful, FALSE otherwise. * if wstr is NULL, returns TRUE and sets str to NULL! Value of str should be checked after call */ static inline BOOL CRYPT_UnicodeToANSI(LPCWSTR wstr, LPSTR* str, int strsize) { if (!wstr) { *str = NULL; return TRUE; } if (!*str) { strsize = WideCharToMultiByte(CP_ACP, 0, wstr, -1, NULL, 0, NULL, NULL); *str = CRYPT_Alloc(strsize * sizeof(CHAR)); } else if (strsize < 0) { strsize = INT_MAX; /* windows will pretend that the buffer is infinitely long */ } if (*str) { WideCharToMultiByte(CP_ACP, 0, wstr, -1, *str, strsize, NULL, NULL); return TRUE; } SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } /* CRYPT_ANSITOUnicode * str - ANSI string * wstr - pointer to unicode string * wstrsize - size of buffer pointed to by wstr or -1 if we have to do the allocation */ static inline BOOL CRYPT_ANSIToUnicode(LPCSTR str, LPWSTR* wstr, int wstrsize) { unsigned int wcount; if (!str) { *wstr = NULL; return TRUE; } wcount = MultiByteToWideChar(CP_ACP, 0, str, -1, NULL, 0); if (wstrsize == -1) *wstr = CRYPT_Alloc(wcount * sizeof(WCHAR)); else wcount = min( wcount, wstrsize/sizeof(WCHAR) ); if (*wstr) { MultiByteToWideChar(CP_ACP, 0, str, -1, *wstr, wcount); return TRUE; } SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } /* These next 2 functions are used by the VTableProvStruc structure */ static BOOL CALLBACK CRYPT_VerifyImage(LPCSTR lpszImage, BYTE* pData) { if (!lpszImage || !pData) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } FIXME("(%s, %p): not verifying image\n", lpszImage, pData); return TRUE; } static void CALLBACK CRYPT_ReturnhWnd(HWND *phWnd) { if (phWnd) *phWnd = crypt_hWindow; } #define CRYPT_GetProvFunc(name) \ if ( !(provider->pFuncs->p##name = (void*)GetProcAddress(provider->hModule, #name)) ) goto error #define CRYPT_GetProvFuncOpt(name) \ provider->pFuncs->p##name = (void*)GetProcAddress(provider->hModule, #name) static PCRYPTPROV CRYPT_LoadProvider(PCWSTR pImage) { PCRYPTPROV provider; DWORD errorcode = ERROR_NOT_ENOUGH_MEMORY; if ( !(provider = CRYPT_Alloc(sizeof(CRYPTPROV))) ) goto error; if ( !(provider->pFuncs = CRYPT_Alloc(sizeof(PROVFUNCS))) ) goto error; if ( !(provider->pVTable = CRYPT_Alloc(sizeof(VTableProvStruc))) ) goto error; if ( !(provider->hModule = LoadLibraryW(pImage)) ) { errorcode = (GetLastError() == ERROR_FILE_NOT_FOUND) ? NTE_PROV_DLL_NOT_FOUND : NTE_PROVIDER_DLL_FAIL; FIXME("Failed to load dll %s\n", debugstr_w(pImage)); goto error; } provider->dwMagic = MAGIC_CRYPTPROV; provider->refcount = 1; errorcode = NTE_PROVIDER_DLL_FAIL; CRYPT_GetProvFunc(CPAcquireContext); CRYPT_GetProvFunc(CPCreateHash); CRYPT_GetProvFunc(CPDecrypt); CRYPT_GetProvFunc(CPDeriveKey); CRYPT_GetProvFunc(CPDestroyHash); CRYPT_GetProvFunc(CPDestroyKey); CRYPT_GetProvFuncOpt(CPDuplicateHash); CRYPT_GetProvFuncOpt(CPDuplicateKey); CRYPT_GetProvFunc(CPEncrypt); CRYPT_GetProvFunc(CPExportKey); CRYPT_GetProvFunc(CPGenKey); CRYPT_GetProvFunc(CPGenRandom); CRYPT_GetProvFunc(CPGetHashParam); CRYPT_GetProvFunc(CPGetKeyParam); CRYPT_GetProvFunc(CPGetProvParam); CRYPT_GetProvFunc(CPGetUserKey); CRYPT_GetProvFunc(CPHashData); CRYPT_GetProvFunc(CPHashSessionKey); CRYPT_GetProvFunc(CPImportKey); CRYPT_GetProvFunc(CPReleaseContext); CRYPT_GetProvFunc(CPSetHashParam); CRYPT_GetProvFunc(CPSetKeyParam); CRYPT_GetProvFunc(CPSetProvParam); CRYPT_GetProvFunc(CPSignHash); CRYPT_GetProvFunc(CPVerifySignature); /* FIXME: Not sure what the pbContextInfo field is for. * Does it need memory allocation? */ provider->pVTable->Version = 3; provider->pVTable->FuncVerifyImage = CRYPT_VerifyImage; provider->pVTable->FuncReturnhWnd = CRYPT_ReturnhWnd; provider->pVTable->dwProvType = 0; provider->pVTable->pbContextInfo = NULL; provider->pVTable->cbContextInfo = 0; provider->pVTable->pszProvName = NULL; return provider; error: SetLastError(errorcode); if (provider) { provider->dwMagic = 0; if (provider->hModule) FreeLibrary(provider->hModule); CRYPT_Free(provider->pVTable); CRYPT_Free(provider->pFuncs); CRYPT_Free(provider); } return NULL; } #undef CRYPT_GetProvFunc #undef CRYPT_GetProvFuncOpt static void CRYPT_CreateMachineGuid(void) { static const WCHAR cryptographyW[] = { 'S','o','f','t','w','a','r','e','\\', 'M','i','c','r','o','s','o','f','t','\\', 'C','r','y','p','t','o','g','r','a','p','h','y',0 }; static const WCHAR machineGuidW[] = { 'M','a','c','h','i','n','e','G','u','i','d',0 }; LONG r; HKEY key; r = RegOpenKeyExW(HKEY_LOCAL_MACHINE, cryptographyW, 0, KEY_ALL_ACCESS | KEY_WOW64_64KEY, &key); if (!r) { DWORD size; r = RegQueryValueExW(key, machineGuidW, NULL, NULL, NULL, &size); if (r == ERROR_FILE_NOT_FOUND) { UUID uuid; WCHAR buf[37]; RPC_STATUS rs; static const WCHAR uuidFmt[] = { '%','0','8','x','-','%','0','4','x','-', '%','0','4','x','-','%','0','2','x', '%','0','2','x','-','%','0','2','x', '%','0','2','x','%','0','2','x', '%','0','2','x','%','0','2','x', '%','0','2','x',0 }; rs = UuidCreate(&uuid); if (rs == S_OK) { sprintfW(buf, uuidFmt, uuid.Data1, uuid.Data2, uuid.Data3, uuid.Data4[0], uuid.Data4[1], uuid.Data4[2], uuid.Data4[3], uuid.Data4[4], uuid.Data4[5], uuid.Data4[6], uuid.Data4[7] ); RegSetValueExW(key, machineGuidW, 0, REG_SZ, (const BYTE *)buf, (lstrlenW(buf)+1)*sizeof(WCHAR)); } } RegCloseKey(key); } } /****************************************************************************** * CloseEncryptedFileRaw (ADVAPI32.@) * * Close encrypted files * * PARAMS * context [I] pointer to the context * RETURNS * Success: ERROR_SUCCESS * Failure: NTSTATUS error code */ void WINAPI CloseEncryptedFileRaw(PVOID context) { FIXME("(%p): stub\n", context); } /****************************************************************************** * CryptAcquireContextW (ADVAPI32.@) * * Acquire a crypto provider context handle. * * PARAMS * phProv [O] Pointer to HCRYPTPROV for the output. * pszContainer [I] Key Container Name * pszProvider [I] Cryptographic Service Provider Name * dwProvType [I] Crypto provider type to get a handle. * dwFlags [I] flags for the operation * * RETURNS * TRUE on success, FALSE on failure. */ BOOL WINAPI CryptAcquireContextW (HCRYPTPROV *phProv, LPCWSTR pszContainer, LPCWSTR pszProvider, DWORD dwProvType, DWORD dwFlags) { PCRYPTPROV pProv = NULL; HKEY key; PWSTR imagepath = NULL, keyname = NULL, provname = NULL, temp = NULL; PSTR provnameA = NULL, pszContainerA = NULL; DWORD keytype, type, len; ULONG r; static const WCHAR nameW[] = {'N','a','m','e',0}; static const WCHAR typeW[] = {'T','y','p','e',0}; static const WCHAR imagepathW[] = {'I','m','a','g','e',' ','P','a','t','h',0}; TRACE("(%p, %s, %s, %d, %08x)\n", phProv, debugstr_w(pszContainer), debugstr_w(pszProvider), dwProvType, dwFlags); if (dwProvType < 1 || dwProvType > MAXPROVTYPES) { SetLastError(NTE_BAD_PROV_TYPE); return FALSE; } if (!phProv) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } /* Make sure the MachineGuid value exists */ CRYPT_CreateMachineGuid(); if (!pszProvider || !*pszProvider) { /* No CSP name specified so try the user default CSP first * then try the machine default CSP */ if ( !(keyname = CRYPT_GetTypeKeyName(dwProvType, TRUE)) ) { TRACE("No provider registered for crypto provider type %d.\n", dwProvType); SetLastError(NTE_PROV_TYPE_NOT_DEF); return FALSE; } if (RegOpenKeyW(HKEY_CURRENT_USER, keyname, &key)) { CRYPT_Free(keyname); if ( !(keyname = CRYPT_GetTypeKeyName(dwProvType, FALSE)) ) { TRACE("No type registered for crypto provider type %d.\n", dwProvType); RegCloseKey(key); SetLastError(NTE_PROV_TYPE_NOT_DEF); goto error; } if (RegOpenKeyW(HKEY_LOCAL_MACHINE, keyname, &key)) { TRACE("Did not find registry entry of crypto provider for %s.\n", debugstr_w(keyname)); CRYPT_Free(keyname); RegCloseKey(key); SetLastError(NTE_PROV_TYPE_NOT_DEF); goto error; } } CRYPT_Free(keyname); r = RegQueryValueExW(key, nameW, NULL, &keytype, NULL, &len); if( r != ERROR_SUCCESS || !len || keytype != REG_SZ) { TRACE("error %d reading size of 'Name' from registry\n", r ); RegCloseKey(key); SetLastError(NTE_PROV_TYPE_ENTRY_BAD); goto error; } if(!(provname = CRYPT_Alloc(len))) { RegCloseKey(key); SetLastError(ERROR_NOT_ENOUGH_MEMORY); goto error; } r = RegQueryValueExW(key, nameW, NULL, NULL, (LPBYTE)provname, &len); if( r != ERROR_SUCCESS ) { TRACE("error %d reading 'Name' from registry\n", r ); RegCloseKey(key); SetLastError(NTE_PROV_TYPE_ENTRY_BAD); goto error; } RegCloseKey(key); } else { if ( !(provname = CRYPT_Alloc((strlenW(pszProvider) +1)*sizeof(WCHAR))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); goto error; } strcpyW(provname, pszProvider); } keyname = CRYPT_GetProvKeyName(provname); r = RegOpenKeyW(HKEY_LOCAL_MACHINE, keyname, &key); CRYPT_Free(keyname); if (r != ERROR_SUCCESS) { SetLastError(NTE_KEYSET_NOT_DEF); goto error; } len = sizeof(DWORD); r = RegQueryValueExW(key, typeW, NULL, NULL, (BYTE*)&type, &len); if (r != ERROR_SUCCESS) { SetLastError(NTE_PROV_TYPE_ENTRY_BAD); goto error; } if (type != dwProvType) { TRACE("Crypto provider has wrong type (%d vs expected %d).\n", type, dwProvType); SetLastError(NTE_PROV_TYPE_NO_MATCH); goto error; } r = RegQueryValueExW(key, imagepathW, NULL, &keytype, NULL, &len); if ( r != ERROR_SUCCESS || keytype != REG_SZ) { TRACE("error %d reading size of 'Image Path' from registry\n", r ); RegCloseKey(key); SetLastError(NTE_PROV_TYPE_ENTRY_BAD); goto error; } if (!(temp = CRYPT_Alloc(len))) { RegCloseKey(key); SetLastError(ERROR_NOT_ENOUGH_MEMORY); goto error; } r = RegQueryValueExW(key, imagepathW, NULL, NULL, (LPBYTE)temp, &len); if( r != ERROR_SUCCESS ) { TRACE("error %d reading 'Image Path' from registry\n", r ); RegCloseKey(key); SetLastError(NTE_PROV_TYPE_ENTRY_BAD); goto error; } RegCloseKey(key); len = ExpandEnvironmentStringsW(temp, NULL, 0); if ( !(imagepath = CRYPT_Alloc(len*sizeof(WCHAR))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); goto error; } if (!ExpandEnvironmentStringsW(temp, imagepath, len)) { /* ExpandEnvironmentStrings will call SetLastError */ goto error; } pProv = CRYPT_LoadProvider(imagepath); if (!pProv) { /* CRYPT_LoadProvider calls SetLastError */ goto error; } pProv->pVTable->dwProvType = dwProvType; if(!CRYPT_UnicodeToANSI(provname, &provnameA, 0)) { /* CRYPT_UnicodeToANSI calls SetLastError */ goto error; } pProv->pVTable->pszProvName = provnameA; if(!CRYPT_UnicodeToANSI(pszContainer, &pszContainerA, 0)) { /* CRYPT_UnicodeToANSI calls SetLastError */ goto error; } if (pProv->pFuncs->pCPAcquireContext(&pProv->hPrivate, pszContainerA, dwFlags, pProv->pVTable)) { /* MSDN: When this flag is set, the value returned in phProv is undefined, * and thus, the CryptReleaseContext function need not be called afterwards. * Therefore, we must clean up everything now. */ if (dwFlags & CRYPT_DELETEKEYSET) { *phProv = 0; pProv->dwMagic = 0; FreeLibrary(pProv->hModule); CRYPT_Free(provnameA); CRYPT_Free(pProv->pVTable); CRYPT_Free(pProv->pFuncs); CRYPT_Free(pProv); } else { *phProv = (HCRYPTPROV)pProv; } CRYPT_Free(pszContainerA); CRYPT_Free(provname); CRYPT_Free(temp); CRYPT_Free(imagepath); return TRUE; } /* FALLTHROUGH TO ERROR IF FALSE - CSP internal error! */ error: if (pProv) { pProv->dwMagic = 0; if (pProv->hModule) FreeLibrary(pProv->hModule); CRYPT_Free(pProv->pVTable); CRYPT_Free(pProv->pFuncs); CRYPT_Free(pProv); } CRYPT_Free(pszContainerA); CRYPT_Free(provnameA); CRYPT_Free(provname); CRYPT_Free(temp); CRYPT_Free(imagepath); return FALSE; } /****************************************************************************** * CryptAcquireContextA (ADVAPI32.@) * * See CryptAcquireContextW. */ BOOL WINAPI CryptAcquireContextA (HCRYPTPROV *phProv, LPCSTR pszContainer, LPCSTR pszProvider, DWORD dwProvType, DWORD dwFlags) { PWSTR pProvider = NULL, pContainer = NULL; BOOL ret = FALSE; TRACE("(%p, %s, %s, %d, %08x)\n", phProv, debugstr_a(pszContainer), debugstr_a(pszProvider), dwProvType, dwFlags); if ( !CRYPT_ANSIToUnicode(pszContainer, &pContainer, -1) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } if ( !CRYPT_ANSIToUnicode(pszProvider, &pProvider, -1) ) { CRYPT_Free(pContainer); SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } ret = CryptAcquireContextW(phProv, pContainer, pProvider, dwProvType, dwFlags); CRYPT_Free(pContainer); CRYPT_Free(pProvider); return ret; } /****************************************************************************** * CryptContextAddRef (ADVAPI32.@) * * Increases reference count of a cryptographic service provider handle * by one. * * PARAMS * hProv [I] Handle to the CSP whose reference is being incremented. * pdwReserved [IN] Reserved for future use and must be NULL. * dwFlags [I] Reserved for future use and must be NULL. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptContextAddRef (HCRYPTPROV hProv, DWORD *pdwReserved, DWORD dwFlags) { PCRYPTPROV pProv = (PCRYPTPROV)hProv; TRACE("(0x%lx, %p, %08x)\n", hProv, pdwReserved, dwFlags); if (!pProv) { SetLastError(NTE_BAD_UID); return FALSE; } if (pProv->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } pProv->refcount++; return TRUE; } /****************************************************************************** * CryptReleaseContext (ADVAPI32.@) * * Releases the handle of a CSP. Reference count is decreased. * * PARAMS * hProv [I] Handle of a CSP. * dwFlags [I] Reserved for future use and must be 0. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptReleaseContext (HCRYPTPROV hProv, DWORD dwFlags) { PCRYPTPROV pProv = (PCRYPTPROV)hProv; BOOL ret = TRUE; TRACE("(0x%lx, %08x)\n", hProv, dwFlags); if (!pProv) { SetLastError(NTE_BAD_UID); return FALSE; } if (pProv->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } pProv->refcount--; if (pProv->refcount <= 0) { ret = pProv->pFuncs->pCPReleaseContext(pProv->hPrivate, dwFlags); pProv->dwMagic = 0; FreeLibrary(pProv->hModule); #if 0 CRYPT_Free(pProv->pVTable->pContextInfo); #endif CRYPT_Free(pProv->pVTable->pszProvName); CRYPT_Free(pProv->pVTable); CRYPT_Free(pProv->pFuncs); CRYPT_Free(pProv); } return ret; } /****************************************************************************** * CryptGenRandom (ADVAPI32.@) * * Fills a buffer with cryptographically random bytes. * * PARAMS * hProv [I] Handle of a CSP. * dwLen [I] Number of bytes to generate. * pbBuffer [I/O] Buffer to contain random bytes. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * pdBuffer must be at least dwLen bytes long. */ BOOL WINAPI CryptGenRandom (HCRYPTPROV hProv, DWORD dwLen, BYTE *pbBuffer) { PCRYPTPROV prov = (PCRYPTPROV)hProv; TRACE("(0x%lx, %d, %p)\n", hProv, dwLen, pbBuffer); if (!hProv) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (prov->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } return prov->pFuncs->pCPGenRandom(prov->hPrivate, dwLen, pbBuffer); } /****************************************************************************** * CryptCreateHash (ADVAPI32.@) * * Initiates the hashing of a stream of data. * * PARAMS * hProv [I] Handle of a CSP. * Algid [I] Identifies the hash algorithm to use. * hKey [I] Key for the hash (if required). * dwFlags [I] Reserved for future use and must be NULL. * phHash [O] Address of the future handle to the new hash object. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If the algorithm is a keyed hash, hKey is the key. */ BOOL WINAPI CryptCreateHash (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTKEY hKey, DWORD dwFlags, HCRYPTHASH *phHash) { PCRYPTPROV prov = (PCRYPTPROV)hProv; PCRYPTKEY key = (PCRYPTKEY)hKey; PCRYPTHASH hash; TRACE("(0x%lx, 0x%x, 0x%lx, %08x, %p)\n", hProv, Algid, hKey, dwFlags, phHash); if (!prov || !phHash || prov->dwMagic != MAGIC_CRYPTPROV || (key && key->dwMagic != MAGIC_CRYPTKEY)) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if (dwFlags) { SetLastError(NTE_BAD_FLAGS); return FALSE; } if ( !(hash = CRYPT_Alloc(sizeof(CRYPTHASH))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } hash->pProvider = prov; hash->dwMagic = MAGIC_CRYPTHASH; if (prov->pFuncs->pCPCreateHash(prov->hPrivate, Algid, key ? key->hPrivate : 0, 0, &hash->hPrivate)) { *phHash = (HCRYPTHASH)hash; return TRUE; } /* CSP error! */ hash->dwMagic = 0; CRYPT_Free(hash); *phHash = 0; return FALSE; } /****************************************************************************** * CryptDecrypt (ADVAPI32.@) * * Decrypts data encrypted by CryptEncrypt. * * PARAMS * hKey [I] Handle to the decryption key. * hHash [I] Handle to a hash object. * Final [I] TRUE if this is the last section to be decrypted. * dwFlags [I] Reserved for future use. Can be CRYPT_OAEP. * pbData [I/O] Buffer that holds the encrypted data. Holds decrypted * data on return * pdwDataLen [I/O] Length of pbData before and after the call. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptDecrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final, DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen) { PCRYPTPROV prov; PCRYPTKEY key = (PCRYPTKEY)hKey; PCRYPTHASH hash = (PCRYPTHASH)hHash; TRACE("(0x%lx, 0x%lx, %d, %08x, %p, %p)\n", hKey, hHash, Final, dwFlags, pbData, pdwDataLen); if (!key || !pbData || !pdwDataLen || !key->pProvider || key->dwMagic != MAGIC_CRYPTKEY || key->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = key->pProvider; return prov->pFuncs->pCPDecrypt(prov->hPrivate, key->hPrivate, hash ? hash->hPrivate : 0, Final, dwFlags, pbData, pdwDataLen); } /****************************************************************************** * CryptDeriveKey (ADVAPI32.@) * * Generates session keys derived from a base data value. * * PARAMS * hProv [I] Handle to a CSP. * Algid [I] Identifies the symmetric encryption algorithm to use. * hBaseData [I] Handle to a hash object. * dwFlags [I] Type of key to generate. * phKey [I/O] Address of the newly generated key. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptDeriveKey (HCRYPTPROV hProv, ALG_ID Algid, HCRYPTHASH hBaseData, DWORD dwFlags, HCRYPTKEY *phKey) { PCRYPTPROV prov = (PCRYPTPROV)hProv; PCRYPTHASH hash = (PCRYPTHASH)hBaseData; PCRYPTKEY key; TRACE("(0x%lx, 0x%08x, 0x%lx, 0x%08x, %p)\n", hProv, Algid, hBaseData, dwFlags, phKey); if (!prov || !hash) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (!phKey || prov->dwMagic != MAGIC_CRYPTPROV || hash->dwMagic != MAGIC_CRYPTHASH) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if ( !(key = CRYPT_Alloc(sizeof(CRYPTKEY))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } key->pProvider = prov; key->dwMagic = MAGIC_CRYPTKEY; if (prov->pFuncs->pCPDeriveKey(prov->hPrivate, Algid, hash->hPrivate, dwFlags, &key->hPrivate)) { *phKey = (HCRYPTKEY)key; return TRUE; } /* CSP error! */ key->dwMagic = 0; CRYPT_Free(key); *phKey = 0; return FALSE; } /****************************************************************************** * CryptDestroyHash (ADVAPI32.@) * * Destroys the hash object referenced by hHash. * * PARAMS * hHash [I] Handle of the hash object to be destroyed. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptDestroyHash (HCRYPTHASH hHash) { PCRYPTHASH hash = (PCRYPTHASH)hHash; PCRYPTPROV prov; BOOL ret; TRACE("(0x%lx)\n", hHash); if (!hash) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (!hash->pProvider || hash->dwMagic != MAGIC_CRYPTHASH || hash->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = hash->pProvider; ret = prov->pFuncs->pCPDestroyHash(prov->hPrivate, hash->hPrivate); hash->dwMagic = 0; CRYPT_Free(hash); return ret; } /****************************************************************************** * CryptDestroyKey (ADVAPI32.@) * * Releases the handle referenced by hKey. * * PARAMS * hKey [I] Handle of the key to be destroyed. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptDestroyKey (HCRYPTKEY hKey) { PCRYPTKEY key = (PCRYPTKEY)hKey; PCRYPTPROV prov; BOOL ret; TRACE("(0x%lx)\n", hKey); if (!key) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (!key->pProvider || key->dwMagic != MAGIC_CRYPTKEY || key->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = key->pProvider; ret = prov->pFuncs->pCPDestroyKey(prov->hPrivate, key->hPrivate); key->dwMagic = 0; CRYPT_Free(key); return ret; } /****************************************************************************** * CryptDuplicateHash (ADVAPI32.@) * * Duplicates a hash. * * PARAMS * hHash [I] Handle to the hash to be copied. * pdwReserved [I] Reserved for future use and must be zero. * dwFlags [I] Reserved for future use and must be zero. * phHash [O] Address of the handle to receive the copy. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptDuplicateHash (HCRYPTHASH hHash, DWORD *pdwReserved, DWORD dwFlags, HCRYPTHASH *phHash) { PCRYPTPROV prov; PCRYPTHASH orghash, newhash; TRACE("(0x%lx, %p, %08x, %p)\n", hHash, pdwReserved, dwFlags, phHash); orghash = (PCRYPTHASH)hHash; if (!orghash || pdwReserved || !phHash || !orghash->pProvider || orghash->dwMagic != MAGIC_CRYPTHASH || orghash->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = orghash->pProvider; if (!prov->pFuncs->pCPDuplicateHash) { SetLastError(ERROR_CALL_NOT_IMPLEMENTED); return FALSE; } if ( !(newhash = CRYPT_Alloc(sizeof(CRYPTHASH))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } newhash->pProvider = prov; newhash->dwMagic = MAGIC_CRYPTHASH; if (prov->pFuncs->pCPDuplicateHash(prov->hPrivate, orghash->hPrivate, pdwReserved, dwFlags, &newhash->hPrivate)) { *phHash = (HCRYPTHASH)newhash; return TRUE; } newhash->dwMagic = 0; CRYPT_Free(newhash); return FALSE; } /****************************************************************************** * CryptDuplicateKey (ADVAPI32.@) * * Duplicate a key and the key's state. * * PARAMS * hKey [I] Handle of the key to copy. * pdwReserved [I] Reserved for future use and must be NULL. * dwFlags [I] Reserved for future use and must be zero. * phKey [I] Address of the handle to the duplicated key. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptDuplicateKey (HCRYPTKEY hKey, DWORD *pdwReserved, DWORD dwFlags, HCRYPTKEY *phKey) { PCRYPTPROV prov; PCRYPTKEY orgkey, newkey; TRACE("(0x%lx, %p, %08x, %p)\n", hKey, pdwReserved, dwFlags, phKey); orgkey = (PCRYPTKEY)hKey; if (!orgkey || pdwReserved || !phKey || !orgkey->pProvider || orgkey->dwMagic != MAGIC_CRYPTKEY || orgkey->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = orgkey->pProvider; if (!prov->pFuncs->pCPDuplicateKey) { SetLastError(ERROR_CALL_NOT_IMPLEMENTED); return FALSE; } if ( !(newkey = CRYPT_Alloc(sizeof(CRYPTKEY))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } newkey->pProvider = prov; newkey->dwMagic = MAGIC_CRYPTKEY; if (prov->pFuncs->pCPDuplicateKey(prov->hPrivate, orgkey->hPrivate, pdwReserved, dwFlags, &newkey->hPrivate)) { *phKey = (HCRYPTKEY)newkey; return TRUE; } newkey->dwMagic = 0; CRYPT_Free(newkey); return FALSE; } /****************************************************************************** * CryptEncrypt (ADVAPI32.@) * * Encrypts data. * * PARAMS * hKey [I] Handle to the encryption key. * hHash [I] Handle to a hash object. * Final [I] TRUE if this is the last section to encrypt. * dwFlags [I] Can be CRYPT_OAEP. * pbData [I/O] Data to be encrypted. Contains encrypted data after call. * pdwDataLen [I/O] Length of the data to encrypt. Contains the length of the * encrypted data after call. * dwBufLen [I] Length of the input pbData buffer. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If pbData is NULL, CryptEncrypt determines stores the number of bytes * required for the returned data in pdwDataLen. */ BOOL WINAPI CryptEncrypt (HCRYPTKEY hKey, HCRYPTHASH hHash, BOOL Final, DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen, DWORD dwBufLen) { PCRYPTPROV prov; PCRYPTKEY key = (PCRYPTKEY)hKey; PCRYPTHASH hash = (PCRYPTHASH)hHash; TRACE("(0x%lx, 0x%lx, %d, %08x, %p, %p, %d)\n", hKey, hHash, Final, dwFlags, pbData, pdwDataLen, dwBufLen); if (!key || !pdwDataLen || !key->pProvider || key->dwMagic != MAGIC_CRYPTKEY || key->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = key->pProvider; return prov->pFuncs->pCPEncrypt(prov->hPrivate, key->hPrivate, hash ? hash->hPrivate : 0, Final, dwFlags, pbData, pdwDataLen, dwBufLen); } /****************************************************************************** * CryptEnumProvidersW (ADVAPI32.@) * * Returns the next available CSP. * * PARAMS * dwIndex [I] Index of the next provider to be enumerated. * pdwReserved [I] Reserved for future use and must be NULL. * dwFlags [I] Reserved for future use and must be zero. * pdwProvType [O] DWORD designating the type of the provider. * pszProvName [O] Buffer that receives data from the provider. * pcbProvName [I/O] Specifies the size of pszProvName. Contains the number * of bytes stored in the buffer on return. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If pszProvName is NULL, CryptEnumProvidersW sets the size of the name * for memory allocation purposes. */ BOOL WINAPI CryptEnumProvidersW (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszProvName, DWORD *pcbProvName) { HKEY hKey; static const WCHAR providerW[] = { 'S','o','f','t','w','a','r','e','\\', 'M','i','c','r','o','s','o','f','t','\\', 'C','r','y','p','t','o','g','r','a','p','h','y','\\', 'D','e','f','a','u','l','t','s','\\', 'P','r','o','v','i','d','e','r',0 }; static const WCHAR typeW[] = {'T','y','p','e',0}; BOOL ret; TRACE("(%d, %p, %d, %p, %p, %p)\n", dwIndex, pdwReserved, dwFlags, pdwProvType, pszProvName, pcbProvName); if (pdwReserved || !pcbProvName) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if (dwFlags) { SetLastError(NTE_BAD_FLAGS); return FALSE; } if (RegOpenKeyW(HKEY_LOCAL_MACHINE, providerW, &hKey)) { SetLastError(NTE_FAIL); return FALSE; } ret = TRUE; if (!pszProvName) { DWORD numkeys; WCHAR *provNameW; RegQueryInfoKeyW(hKey, NULL, NULL, NULL, &numkeys, pcbProvName, NULL, NULL, NULL, NULL, NULL, NULL); if (!(provNameW = CRYPT_Alloc(*pcbProvName * sizeof(WCHAR)))) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); RegCloseKey(hKey); return FALSE; } RegEnumKeyExW(hKey, dwIndex, provNameW, pcbProvName, NULL, NULL, NULL, NULL); CRYPT_Free(provNameW); (*pcbProvName)++; *pcbProvName *= sizeof(WCHAR); if (dwIndex >= numkeys) { SetLastError(ERROR_NO_MORE_ITEMS); ret = FALSE; } } else { DWORD size = sizeof(DWORD); DWORD result; HKEY subkey; result = RegEnumKeyW(hKey, dwIndex, pszProvName, *pcbProvName / sizeof(WCHAR)); if (result) { SetLastError(result); RegCloseKey(hKey); return FALSE; } if (RegOpenKeyW(hKey, pszProvName, &subkey)) { RegCloseKey(hKey); return FALSE; } if (RegQueryValueExW(subkey, typeW, NULL, NULL, (BYTE*)pdwProvType, &size)) ret = FALSE; RegCloseKey(subkey); } RegCloseKey(hKey); return ret; } /****************************************************************************** * CryptEnumProvidersA (ADVAPI32.@) * * See CryptEnumProvidersW. */ BOOL WINAPI CryptEnumProvidersA (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPSTR pszProvName, DWORD *pcbProvName) { PWSTR str = NULL; DWORD bufsize; BOOL ret; TRACE("(%d, %p, %08x, %p, %p, %p)\n", dwIndex, pdwReserved, dwFlags, pdwProvType, pszProvName, pcbProvName); if(!CryptEnumProvidersW(dwIndex, pdwReserved, dwFlags, pdwProvType, NULL, &bufsize)) return FALSE; if ( pszProvName && !(str = CRYPT_Alloc(bufsize)) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } ret = CryptEnumProvidersW(dwIndex, pdwReserved, dwFlags, pdwProvType, str, &bufsize); if (str) CRYPT_UnicodeToANSI(str, &pszProvName, *pcbProvName); *pcbProvName = bufsize / sizeof(WCHAR); /* FIXME: not correct */ if (str) { CRYPT_Free(str); if (GetLastError() == ERROR_INSUFFICIENT_BUFFER) { SetLastError(ERROR_MORE_DATA); return FALSE; } } return ret; } /****************************************************************************** * CryptEnumProviderTypesW (ADVAPI32.@) * * Retrieves the next type of CSP supported. * * PARAMS * dwIndex [I] Index of the next provider to be enumerated. * pdwReserved [I] Reserved for future use and must be NULL. * dwFlags [I] Reserved for future use and must be zero. * pdwProvType [O] DWORD designating the type of the provider. * pszTypeName [O] Buffer that receives data from the provider type. * pcbTypeName [I/O] Specifies the size of pszTypeName. Contains the number * of bytes stored in the buffer on return. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If pszTypeName is NULL, CryptEnumProviderTypesW sets the size of the name * for memory allocation purposes. */ BOOL WINAPI CryptEnumProviderTypesW (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPWSTR pszTypeName, DWORD *pcbTypeName) { HKEY hKey, hSubkey; DWORD keylen, numkeys, dwType; PWSTR keyname, ch; DWORD result; static const WCHAR KEYSTR[] = { 'S','o','f','t','w','a','r','e','\\', 'M','i','c','r','o','s','o','f','t','\\', 'C','r','y','p','t','o','g','r','a','p','h','y','\\', 'D','e','f','a','u','l','t','s','\\', 'P','r','o','v','i','d','e','r',' ','T','y','p','e','s',0 }; static const WCHAR typenameW[] = {'T','y','p','e','N','a','m','e',0}; TRACE("(%d, %p, %08x, %p, %p, %p)\n", dwIndex, pdwReserved, dwFlags, pdwProvType, pszTypeName, pcbTypeName); if (pdwReserved || !pdwProvType || !pcbTypeName) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if (dwFlags) { SetLastError(NTE_BAD_FLAGS); return FALSE; } if (RegOpenKeyW(HKEY_LOCAL_MACHINE, KEYSTR, &hKey)) return FALSE; RegQueryInfoKeyW(hKey, NULL, NULL, NULL, &numkeys, &keylen, NULL, NULL, NULL, NULL, NULL, NULL); if (dwIndex >= numkeys) { SetLastError(ERROR_NO_MORE_ITEMS); RegCloseKey(hKey); return FALSE; } keylen++; if ( !(keyname = CRYPT_Alloc(keylen*sizeof(WCHAR))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); RegCloseKey(hKey); return FALSE; } if ( RegEnumKeyW(hKey, dwIndex, keyname, keylen) ) { CRYPT_Free(keyname); RegCloseKey(hKey); return FALSE; } RegOpenKeyW(hKey, keyname, &hSubkey); RegCloseKey(hKey); ch = keyname + strlenW(keyname); /* Convert "Type 000" to 0, etc/ */ *pdwProvType = *(--ch) - '0'; *pdwProvType += (*(--ch) - '0') * 10; *pdwProvType += (*(--ch) - '0') * 100; CRYPT_Free(keyname); result = RegQueryValueExW(hSubkey, typenameW, NULL, &dwType, (LPBYTE)pszTypeName, pcbTypeName); if (result) { SetLastError(result); RegCloseKey(hSubkey); return FALSE; } RegCloseKey(hSubkey); return TRUE; } /****************************************************************************** * CryptEnumProviderTypesA (ADVAPI32.@) * * See CryptEnumProviderTypesW. */ BOOL WINAPI CryptEnumProviderTypesA (DWORD dwIndex, DWORD *pdwReserved, DWORD dwFlags, DWORD *pdwProvType, LPSTR pszTypeName, DWORD *pcbTypeName) { PWSTR str = NULL; DWORD bufsize; BOOL ret; TRACE("(%d, %p, %08x, %p, %p, %p)\n", dwIndex, pdwReserved, dwFlags, pdwProvType, pszTypeName, pcbTypeName); if(!CryptEnumProviderTypesW(dwIndex, pdwReserved, dwFlags, pdwProvType, NULL, &bufsize)) return FALSE; if ( pszTypeName && !(str = CRYPT_Alloc(bufsize)) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } ret = CryptEnumProviderTypesW(dwIndex, pdwReserved, dwFlags, pdwProvType, str, &bufsize); if (str) CRYPT_UnicodeToANSI(str, &pszTypeName, *pcbTypeName); *pcbTypeName = bufsize / sizeof(WCHAR); if (str) { CRYPT_Free(str); if (GetLastError() == ERROR_INSUFFICIENT_BUFFER) { SetLastError(ERROR_MORE_DATA); return FALSE; } } return ret; } /****************************************************************************** * CryptExportKey (ADVAPI32.@) * * Exports a cryptographic key from a CSP. * * PARAMS * hKey [I] Handle to the key to export. * hExpKey [I] Handle to a cryptographic key of the end user. * dwBlobType [I] Type of BLOB to be exported. * dwFlags [I] CRYPT_DESTROYKEY/SSL2_FALLBACK/OAEP. * pbData [O] Buffer to receive BLOB data. * pdwDataLen [I/O] Specifies the size of pbData. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * if pbData is NULL, CryptExportKey sets pdwDataLen as the size of the * buffer needed to hold the BLOB. */ BOOL WINAPI CryptExportKey (HCRYPTKEY hKey, HCRYPTKEY hExpKey, DWORD dwBlobType, DWORD dwFlags, BYTE *pbData, DWORD *pdwDataLen) { PCRYPTPROV prov; PCRYPTKEY key = (PCRYPTKEY)hKey, expkey = (PCRYPTKEY)hExpKey; TRACE("(0x%lx, 0x%lx, %d, %08x, %p, %p)\n", hKey, hExpKey, dwBlobType, dwFlags, pbData, pdwDataLen); if (!key || !pdwDataLen || !key->pProvider || key->dwMagic != MAGIC_CRYPTKEY || key->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = key->pProvider; return prov->pFuncs->pCPExportKey(prov->hPrivate, key->hPrivate, expkey ? expkey->hPrivate : 0, dwBlobType, dwFlags, pbData, pdwDataLen); } /****************************************************************************** * CryptGenKey (ADVAPI32.@) * * Generates a random cryptographic session key or a pub/priv key pair. * * PARAMS * hProv [I] Handle to a CSP. * Algid [I] Algorithm to use to make key. * dwFlags [I] Specifies type of key to make. * phKey [I] Address of the handle to which the new key is copied. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptGenKey (HCRYPTPROV hProv, ALG_ID Algid, DWORD dwFlags, HCRYPTKEY *phKey) { PCRYPTPROV prov = (PCRYPTPROV)hProv; PCRYPTKEY key; TRACE("(0x%lx, %d, %08x, %p)\n", hProv, Algid, dwFlags, phKey); if (!phKey || !prov || prov->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if ( !(key = CRYPT_Alloc(sizeof(CRYPTKEY))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } key->pProvider = prov; key->dwMagic = MAGIC_CRYPTKEY; if (prov->pFuncs->pCPGenKey(prov->hPrivate, Algid, dwFlags, &key->hPrivate)) { *phKey = (HCRYPTKEY)key; return TRUE; } /* CSP error! */ key->dwMagic = 0; CRYPT_Free(key); return FALSE; } /****************************************************************************** * CryptGetDefaultProviderW (ADVAPI32.@) * * Finds the default CSP of a certain provider type. * * PARAMS * dwProvType [I] Provider type to look for. * pdwReserved [I] Reserved for future use and must be NULL. * dwFlags [I] CRYPT_MACHINE_DEFAULT/USER_DEFAULT * pszProvName [O] Name of the default CSP. * pcbProvName [I/O] Size of pszProvName * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If pszProvName is NULL, pcbProvName will hold the size of the buffer for * memory allocation purposes on return. */ BOOL WINAPI CryptGetDefaultProviderW (DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags, LPWSTR pszProvName, DWORD *pcbProvName) { HKEY hKey; PWSTR keyname; DWORD result; static const WCHAR nameW[] = {'N','a','m','e',0}; if (pdwReserved || !pcbProvName) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if (dwFlags & ~(CRYPT_USER_DEFAULT | CRYPT_MACHINE_DEFAULT)) { SetLastError(NTE_BAD_FLAGS); return FALSE; } if (dwProvType > 999) { SetLastError(NTE_BAD_PROV_TYPE); return FALSE; } if ( !(keyname = CRYPT_GetTypeKeyName(dwProvType, dwFlags & CRYPT_USER_DEFAULT)) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } if (RegOpenKeyW((dwFlags & CRYPT_USER_DEFAULT) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE ,keyname, &hKey)) { CRYPT_Free(keyname); SetLastError(NTE_PROV_TYPE_NOT_DEF); return FALSE; } CRYPT_Free(keyname); result = RegQueryValueExW(hKey, nameW, NULL, NULL, (LPBYTE)pszProvName, pcbProvName); RegCloseKey(hKey); if (result) { if (result != ERROR_MORE_DATA) SetLastError(NTE_PROV_TYPE_ENTRY_BAD); else SetLastError(result); return FALSE; } return TRUE; } /****************************************************************************** * CryptGetDefaultProviderA (ADVAPI32.@) * * See CryptGetDefaultProviderW. */ BOOL WINAPI CryptGetDefaultProviderA (DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags, LPSTR pszProvName, DWORD *pcbProvName) { PWSTR str = NULL; DWORD bufsize; BOOL ret; TRACE("(%d, %p, %08x, %p, %p)\n", dwProvType, pdwReserved, dwFlags, pszProvName, pcbProvName); CryptGetDefaultProviderW(dwProvType, pdwReserved, dwFlags, NULL, &bufsize); if ( pszProvName && !(str = CRYPT_Alloc(bufsize)) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } ret = CryptGetDefaultProviderW(dwProvType, pdwReserved, dwFlags, str, &bufsize); if (str) CRYPT_UnicodeToANSI(str, &pszProvName, *pcbProvName); *pcbProvName = bufsize / sizeof(WCHAR); if (str) { CRYPT_Free(str); if (GetLastError() == ERROR_INSUFFICIENT_BUFFER) { SetLastError(ERROR_MORE_DATA); return FALSE; } } return ret; } /****************************************************************************** * CryptGetHashParam (ADVAPI32.@) * * Retrieves data that controls the operations of a hash object. * * PARAMS * hHash [I] Handle of the hash object to question. * dwParam [I] Query type. * pbData [O] Buffer that receives the value data. * pdwDataLen [I/O] Size of the pbData buffer. * dwFlags [I] Reserved for future use and must be zero. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If pbData is NULL, pdwDataLen will contain the length required. */ BOOL WINAPI CryptGetHashParam (HCRYPTHASH hHash, DWORD dwParam, BYTE *pbData, DWORD *pdwDataLen, DWORD dwFlags) { PCRYPTPROV prov; PCRYPTHASH hash = (PCRYPTHASH)hHash; TRACE("(0x%lx, %d, %p, %p, %08x)\n", hHash, dwParam, pbData, pdwDataLen, dwFlags); if (!hash || !pdwDataLen || !hash->pProvider || hash->dwMagic != MAGIC_CRYPTHASH || hash->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = hash->pProvider; return prov->pFuncs->pCPGetHashParam(prov->hPrivate, hash->hPrivate, dwParam, pbData, pdwDataLen, dwFlags); } /****************************************************************************** * CryptGetKeyParam (ADVAPI32.@) * * Retrieves data that controls the operations of a key. * * PARAMS * hKey [I] Handle to they key in question. * dwParam [I] Specifies query type. * pbData [O] Sequence of bytes to receive data. * pdwDataLen [I/O] Size of pbData. * dwFlags [I] Reserved for future use and must be zero. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If pbData is NULL, pdwDataLen is set to the needed length of the buffer. */ BOOL WINAPI CryptGetKeyParam (HCRYPTKEY hKey, DWORD dwParam, BYTE *pbData, DWORD *pdwDataLen, DWORD dwFlags) { PCRYPTPROV prov; PCRYPTKEY key = (PCRYPTKEY)hKey; TRACE("(0x%lx, %d, %p, %p, %08x)\n", hKey, dwParam, pbData, pdwDataLen, dwFlags); if (!key || !pdwDataLen || !key->pProvider || key->dwMagic != MAGIC_CRYPTKEY || key->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = key->pProvider; return prov->pFuncs->pCPGetKeyParam(prov->hPrivate, key->hPrivate, dwParam, pbData, pdwDataLen, dwFlags); } /****************************************************************************** * CryptGetProvParam (ADVAPI32.@) * * Retrieves parameters that control the operations of a CSP. * * PARAMS * hProv [I] Handle of the CSP in question. * dwParam [I] Specifies query type. * pbData [O] Buffer to receive the data. * pdwDataLen [I/O] Size of pbData. * dwFlags [I] see MSDN Docs. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * If pbData is NULL, pdwDataLen is set to the needed buffer length. */ BOOL WINAPI CryptGetProvParam (HCRYPTPROV hProv, DWORD dwParam, BYTE *pbData, DWORD *pdwDataLen, DWORD dwFlags) { PCRYPTPROV prov = (PCRYPTPROV)hProv; TRACE("(0x%lx, %d, %p, %p, %08x)\n", hProv, dwParam, pbData, pdwDataLen, dwFlags); if (!prov || prov->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } return prov->pFuncs->pCPGetProvParam(prov->hPrivate, dwParam, pbData, pdwDataLen, dwFlags); } /****************************************************************************** * CryptGetUserKey (ADVAPI32.@) * * Gets a handle of one of a user's two public/private key pairs. * * PARAMS * hProv [I] Handle of a CSP. * dwKeySpec [I] Private key to use. * phUserKey [O] Pointer to the handle of the retrieved keys. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptGetUserKey (HCRYPTPROV hProv, DWORD dwKeySpec, HCRYPTKEY *phUserKey) { PCRYPTPROV prov = (PCRYPTPROV)hProv; PCRYPTKEY key; TRACE("(0x%lx, %d, %p)\n", hProv, dwKeySpec, phUserKey); if (!prov) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (!phUserKey || prov->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if ( !(key = CRYPT_Alloc(sizeof(CRYPTKEY))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } key->pProvider = prov; key->dwMagic = MAGIC_CRYPTKEY; if (prov->pFuncs->pCPGetUserKey(prov->hPrivate, dwKeySpec, &key->hPrivate)) { *phUserKey = (HCRYPTKEY)key; return TRUE; } /* CSP Error */ key->dwMagic = 0; CRYPT_Free(key); *phUserKey = 0; return FALSE; } /****************************************************************************** * CryptHashData (ADVAPI32.@) * * Adds data to a hash object. * * PARAMS * hHash [I] Handle of the hash object. * pbData [I] Buffer of data to be hashed. * dwDataLen [I] Number of bytes to add. * dwFlags [I] Can be CRYPT_USERDATA * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptHashData (HCRYPTHASH hHash, const BYTE *pbData, DWORD dwDataLen, DWORD dwFlags) { PCRYPTHASH hash = (PCRYPTHASH)hHash; PCRYPTPROV prov; TRACE("(0x%lx, %p, %d, %08x)\n", hHash, pbData, dwDataLen, dwFlags); if (!hash) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (!hash->pProvider || hash->dwMagic != MAGIC_CRYPTHASH || hash->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = hash->pProvider; return prov->pFuncs->pCPHashData(prov->hPrivate, hash->hPrivate, pbData, dwDataLen, dwFlags); } /****************************************************************************** * CryptHashSessionKey (ADVAPI32.@) * * Compute the cryptographic hash of a session key object. * * PARAMS * hHash [I] Handle to the hash object. * hKey [I] Handle to the key to be hashed. * dwFlags [I] Can be CRYPT_LITTLE_ENDIAN. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptHashSessionKey (HCRYPTHASH hHash, HCRYPTKEY hKey, DWORD dwFlags) { PCRYPTHASH hash = (PCRYPTHASH)hHash; PCRYPTKEY key = (PCRYPTKEY)hKey; PCRYPTPROV prov; TRACE("(0x%lx, 0x%lx, %08x)\n", hHash, hKey, dwFlags); if (!hash || !key) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (!hash->pProvider || hash->dwMagic != MAGIC_CRYPTHASH || hash->pProvider->dwMagic != MAGIC_CRYPTPROV || key->dwMagic != MAGIC_CRYPTKEY) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = hash->pProvider; return prov->pFuncs->pCPHashSessionKey(prov->hPrivate, hash->hPrivate, key->hPrivate, dwFlags); } /****************************************************************************** * CryptImportKey (ADVAPI32.@) * * Transfer a cryptographic key from a key BLOB into a cryptographic service provider (CSP). * * PARAMS * hProv [I] Handle of a CSP. * pbData [I] Contains the key to be imported. * dwDataLen [I] Length of the key. * hPubKey [I] Cryptographic key that decrypts pdData * dwFlags [I] Used only with a public/private key pair. * phKey [O] Imported key. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptImportKey (HCRYPTPROV hProv, const BYTE *pbData, DWORD dwDataLen, HCRYPTKEY hPubKey, DWORD dwFlags, HCRYPTKEY *phKey) { PCRYPTPROV prov = (PCRYPTPROV)hProv; PCRYPTKEY pubkey = (PCRYPTKEY)hPubKey, importkey; TRACE("(0x%lx, %p, %d, 0x%lx, %08x, %p)\n", hProv, pbData, dwDataLen, hPubKey, dwFlags, phKey); if (!prov || !pbData || !dwDataLen || !phKey || prov->dwMagic != MAGIC_CRYPTPROV || (pubkey && pubkey->dwMagic != MAGIC_CRYPTKEY)) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if ( !(importkey = CRYPT_Alloc(sizeof(CRYPTKEY))) ) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } importkey->pProvider = prov; importkey->dwMagic = MAGIC_CRYPTKEY; if (prov->pFuncs->pCPImportKey(prov->hPrivate, pbData, dwDataLen, pubkey ? pubkey->hPrivate : 0, dwFlags, &importkey->hPrivate)) { *phKey = (HCRYPTKEY)importkey; return TRUE; } importkey->dwMagic = 0; CRYPT_Free(importkey); return FALSE; } /****************************************************************************** * CryptSignHashW (ADVAPI32.@) * * Signs data. * * PARAMS * hHash [I] Handle of the hash object to be signed. * dwKeySpec [I] Private key to use. * sDescription [I] Should be NULL. * dwFlags [I] CRYPT_NOHASHOID/X931_FORMAT. * pbSignature [O] Buffer of the signature data. * pdwSigLen [I/O] Size of the pbSignature buffer. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * Because of security flaws sDescription should not be used and should thus be * NULL. It is supported only for compatibility with Microsoft's Cryptographic * Providers. */ BOOL WINAPI CryptSignHashW (HCRYPTHASH hHash, DWORD dwKeySpec, LPCWSTR sDescription, DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen) { PCRYPTHASH hash = (PCRYPTHASH)hHash; PCRYPTPROV prov; TRACE("(0x%lx, %d, %s, %08x, %p, %p)\n", hHash, dwKeySpec, debugstr_w(sDescription), dwFlags, pbSignature, pdwSigLen); if (!hash) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (!pdwSigLen || !hash->pProvider || hash->dwMagic != MAGIC_CRYPTHASH || hash->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = hash->pProvider; return prov->pFuncs->pCPSignHash(prov->hPrivate, hash->hPrivate, dwKeySpec, sDescription, dwFlags, pbSignature, pdwSigLen); } /****************************************************************************** * CryptSignHashA (ADVAPI32.@) * * See CryptSignHashW. */ BOOL WINAPI CryptSignHashA (HCRYPTHASH hHash, DWORD dwKeySpec, LPCSTR sDescription, DWORD dwFlags, BYTE *pbSignature, DWORD *pdwSigLen) { LPWSTR wsDescription; BOOL result; TRACE("(0x%lx, %d, %s, %08x, %p, %p)\n", hHash, dwKeySpec, debugstr_a(sDescription), dwFlags, pbSignature, pdwSigLen); CRYPT_ANSIToUnicode(sDescription, &wsDescription, -1); result = CryptSignHashW(hHash, dwKeySpec, wsDescription, dwFlags, pbSignature, pdwSigLen); CRYPT_Free(wsDescription); return result; } /****************************************************************************** * CryptSetHashParam (ADVAPI32.@) * * Customizes the operations of a hash object. * * PARAMS * hHash [I] Handle of the hash object to set parameters. * dwParam [I] HP_HMAC_INFO/HASHVAL. * pbData [I] Value data buffer. * dwFlags [I] Reserved for future use and must be zero. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptSetHashParam (HCRYPTHASH hHash, DWORD dwParam, const BYTE *pbData, DWORD dwFlags) { PCRYPTPROV prov; PCRYPTHASH hash = (PCRYPTHASH)hHash; TRACE("(0x%lx, %d, %p, %08x)\n", hHash, dwParam, pbData, dwFlags); if (!hash || !pbData || !hash->pProvider || hash->dwMagic != MAGIC_CRYPTHASH || hash->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = hash->pProvider; return prov->pFuncs->pCPSetHashParam(prov->hPrivate, hash->hPrivate, dwParam, pbData, dwFlags); } /****************************************************************************** * CryptSetKeyParam (ADVAPI32.@) * * Customizes a session key's operations. * * PARAMS * hKey [I] Handle to the key to set values. * dwParam [I] See MSDN Doc. * pbData [I] Buffer of values to set. * dwFlags [I] Only used when dwParam == KP_ALGID. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptSetKeyParam (HCRYPTKEY hKey, DWORD dwParam, const BYTE *pbData, DWORD dwFlags) { PCRYPTPROV prov; PCRYPTKEY key = (PCRYPTKEY)hKey; TRACE("(0x%lx, %d, %p, %08x)\n", hKey, dwParam, pbData, dwFlags); if (!key || !pbData || !key->pProvider || key->dwMagic != MAGIC_CRYPTKEY || key->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = key->pProvider; return prov->pFuncs->pCPSetKeyParam(prov->hPrivate, key->hPrivate, dwParam, pbData, dwFlags); } /****************************************************************************** * CryptSetProviderA (ADVAPI32.@) * * Specifies the current user's default CSP. * * PARAMS * pszProvName [I] Name of the new default CSP. * dwProvType [I] Provider type of the CSP. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptSetProviderA (LPCSTR pszProvName, DWORD dwProvType) { TRACE("(%s, %d)\n", pszProvName, dwProvType); return CryptSetProviderExA(pszProvName, dwProvType, NULL, CRYPT_USER_DEFAULT); } /****************************************************************************** * CryptSetProviderW (ADVAPI32.@) * * See CryptSetProviderA. */ BOOL WINAPI CryptSetProviderW (LPCWSTR pszProvName, DWORD dwProvType) { TRACE("(%s, %d)\n", debugstr_w(pszProvName), dwProvType); return CryptSetProviderExW(pszProvName, dwProvType, NULL, CRYPT_USER_DEFAULT); } /****************************************************************************** * CryptSetProviderExW (ADVAPI32.@) * * Specifies the default CSP. * * PARAMS * pszProvName [I] Name of the new default CSP. * dwProvType [I] Provider type of the CSP. * pdwReserved [I] Reserved for future use and must be NULL. * dwFlags [I] See MSDN Doc. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptSetProviderExW (LPCWSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags) { HKEY hProvKey, hTypeKey; PWSTR keyname; static const WCHAR nameW[] = {'N','a','m','e',0}; TRACE("(%s, %d, %p, %08x)\n", debugstr_w(pszProvName), dwProvType, pdwReserved, dwFlags); if (!pszProvName || pdwReserved) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if (dwProvType > MAXPROVTYPES) { SetLastError(NTE_BAD_PROV_TYPE); return FALSE; } if (dwFlags & ~(CRYPT_MACHINE_DEFAULT | CRYPT_USER_DEFAULT | CRYPT_DELETE_DEFAULT) || dwFlags == CRYPT_DELETE_DEFAULT) { SetLastError(NTE_BAD_FLAGS); return FALSE; } if (!(keyname = CRYPT_GetTypeKeyName(dwProvType, dwFlags & CRYPT_USER_DEFAULT))) { SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } if (RegOpenKeyW((dwFlags & CRYPT_USER_DEFAULT) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE, keyname, &hTypeKey)) { CRYPT_Free(keyname); SetLastError(NTE_BAD_PROVIDER); return FALSE; } CRYPT_Free(keyname); if (dwFlags & CRYPT_DELETE_DEFAULT) { RegDeleteValueW(hTypeKey, nameW); } else { if (!(keyname = CRYPT_GetProvKeyName(pszProvName))) { RegCloseKey(hTypeKey); SetLastError(ERROR_NOT_ENOUGH_MEMORY); return FALSE; } if (RegOpenKeyW((dwFlags & CRYPT_USER_DEFAULT) ? HKEY_CURRENT_USER : HKEY_LOCAL_MACHINE, keyname, &hProvKey)) { CRYPT_Free(keyname); RegCloseKey(hTypeKey); SetLastError(NTE_BAD_PROVIDER); return FALSE; } CRYPT_Free(keyname); if (RegSetValueExW(hTypeKey, nameW, 0, REG_SZ, (const BYTE *)pszProvName, (strlenW(pszProvName) + 1)*sizeof(WCHAR))) { RegCloseKey(hTypeKey); RegCloseKey(hProvKey); return FALSE; } RegCloseKey(hProvKey); } RegCloseKey(hTypeKey); return TRUE; } /****************************************************************************** * CryptSetProviderExA (ADVAPI32.@) * * See CryptSetProviderExW. */ BOOL WINAPI CryptSetProviderExA (LPCSTR pszProvName, DWORD dwProvType, DWORD *pdwReserved, DWORD dwFlags) { BOOL ret = FALSE; PWSTR str = NULL; TRACE("(%s, %d, %p, %08x)\n", pszProvName, dwProvType, pdwReserved, dwFlags); if (CRYPT_ANSIToUnicode(pszProvName, &str, -1)) { ret = CryptSetProviderExW(str, dwProvType, pdwReserved, dwFlags); CRYPT_Free(str); } return ret; } /****************************************************************************** * CryptSetProvParam (ADVAPI32.@) * * Customizes the operations of a CSP. * * PARAMS * hProv [I] Handle of a CSP. * dwParam [I] See MSDN Doc. * pbData [I] Buffer that contains a value to set as a parameter. * dwFlags [I] if dwParam is PP_USE_HARDWARE_RNG, dwFlags must be zero. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOL WINAPI CryptSetProvParam (HCRYPTPROV hProv, DWORD dwParam, const BYTE *pbData, DWORD dwFlags) { PCRYPTPROV prov = (PCRYPTPROV)hProv; TRACE("(0x%lx, %d, %p, %08x)\n", hProv, dwParam, pbData, dwFlags); if (!prov) { SetLastError(ERROR_INVALID_HANDLE); return FALSE; } if (prov->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } if (dwParam == PP_USE_HARDWARE_RNG) { FIXME("PP_USE_HARDWARE_RNG: What do I do with this?\n"); FIXME("\tLetting the CSP decide.\n"); } if (dwFlags & PP_CLIENT_HWND) { /* FIXME: Should verify the parameter */ if (pbData /* && IsWindow((HWND)pbData) */) { crypt_hWindow = (HWND)(pbData); return TRUE; } else { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } } /* All other flags go to the CSP */ return prov->pFuncs->pCPSetProvParam(prov->hPrivate, dwParam, pbData, dwFlags); } /****************************************************************************** * CryptVerifySignatureW (ADVAPI32.@) * * Verifies the signature of a hash object. * * PARAMS * hHash [I] Handle of the hash object to verify. * pbSignature [I] Signature data to verify. * dwSigLen [I] Size of pbSignature. * hPubKey [I] Handle to the public key to authenticate signature. * sDescription [I] Should be NULL. * dwFlags [I] See MSDN doc. * * RETURNS * Success: TRUE * Failure: FALSE * * NOTES * Because of security flaws sDescription should not be used and should thus be * NULL. It is supported only for compatibility with Microsoft's Cryptographic * Providers. */ BOOL WINAPI CryptVerifySignatureW (HCRYPTHASH hHash, const BYTE *pbSignature, DWORD dwSigLen, HCRYPTKEY hPubKey, LPCWSTR sDescription, DWORD dwFlags) { PCRYPTHASH hash = (PCRYPTHASH)hHash; PCRYPTKEY key = (PCRYPTKEY)hPubKey; PCRYPTPROV prov; TRACE("(0x%lx, %p, %d, 0x%lx, %s, %08x)\n", hHash, pbSignature, dwSigLen, hPubKey, debugstr_w(sDescription), dwFlags); if (!hash || !key || key->dwMagic != MAGIC_CRYPTKEY || hash->dwMagic != MAGIC_CRYPTHASH || !hash->pProvider || hash->pProvider->dwMagic != MAGIC_CRYPTPROV || !key->pProvider || key->pProvider->dwMagic != MAGIC_CRYPTPROV) { SetLastError(ERROR_INVALID_PARAMETER); return FALSE; } prov = hash->pProvider; return prov->pFuncs->pCPVerifySignature(prov->hPrivate, hash->hPrivate, pbSignature, dwSigLen, key->hPrivate, sDescription, dwFlags); } /****************************************************************************** * CryptVerifySignatureA (ADVAPI32.@) * * See CryptVerifySignatureW. */ BOOL WINAPI CryptVerifySignatureA (HCRYPTHASH hHash, const BYTE *pbSignature, DWORD dwSigLen, HCRYPTKEY hPubKey, LPCSTR sDescription, DWORD dwFlags) { LPWSTR wsDescription; BOOL result; TRACE("(0x%lx, %p, %d, 0x%lx, %s, %08x)\n", hHash, pbSignature, dwSigLen, hPubKey, debugstr_a(sDescription), dwFlags); CRYPT_ANSIToUnicode(sDescription, &wsDescription, -1); result = CryptVerifySignatureW(hHash, pbSignature, dwSigLen, hPubKey, wsDescription, dwFlags); CRYPT_Free(wsDescription); return result; } /****************************************************************************** * OpenEncryptedFileRawA (ADVAPI32.@) * * See OpenEncryptedFileRawW */ DWORD WINAPI OpenEncryptedFileRawA(LPCSTR filename, ULONG flags, PVOID *context) { FIXME("(%s, %x, %p): stub\n", debugstr_a(filename), flags, context); return ERROR_CALL_NOT_IMPLEMENTED; } /****************************************************************************** * OpenEncryptedFileRawW (ADVAPI32.@) * * Opens an EFS encrypted file for backup/restore * * PARAMS * filename [I] Filename to operate on * flags [I] Operation to perform * context [I] Handle to the context (out) * RETURNS * Success: ERROR_SUCCESS * Failure: NTSTATUS error code */ DWORD WINAPI OpenEncryptedFileRawW(LPCWSTR filename, ULONG flags, PVOID *context) { FIXME("(%s, %x, %p): stub\n", debugstr_w(filename), flags, context); return ERROR_CALL_NOT_IMPLEMENTED; } /****************************************************************************** * ReadEncryptedFileRaw (ADVAPI32.@) * * Export encrypted files * * PARAMS * export [I] pointer to the export callback function * callback [I] pointer to the application defined context * context [I] pointer to the system context * RETURNS * Success: ERROR_SUCCESS * Failure: NTSTATUS error code */ DWORD WINAPI ReadEncryptedFileRaw(PFE_EXPORT_FUNC export, PVOID callback, PVOID context) { FIXME("(%p, %p, %p): stub\n", export, callback, context); return ERROR_CALL_NOT_IMPLEMENTED; } /****************************************************************************** * SystemFunction007 [ADVAPI32.@] * * MD4 hash a unicode string * * PARAMS * string [I] the string to hash * output [O] the md4 hash of the string (16 bytes) * * RETURNS * Success: STATUS_SUCCESS * Failure: STATUS_UNSUCCESSFUL * */ NTSTATUS WINAPI SystemFunction007(const UNICODE_STRING *string, LPBYTE hash) { MD4_CTX ctx; MD4Init( &ctx ); MD4Update( &ctx, (const BYTE *)string->Buffer, string->Length ); MD4Final( &ctx ); memcpy( hash, ctx.digest, 0x10 ); return STATUS_SUCCESS; } /****************************************************************************** * SystemFunction010 [ADVAPI32.@] * SystemFunction011 [ADVAPI32.@] * * MD4 hashes 16 bytes of data * * PARAMS * unknown [] seems to have no effect on the output * data [I] pointer to data to hash (16 bytes) * output [O] the md4 hash of the data (16 bytes) * * RETURNS * Success: STATUS_SUCCESS * Failure: STATUS_UNSUCCESSFUL * */ NTSTATUS WINAPI SystemFunction010(LPVOID unknown, const BYTE *data, LPBYTE hash) { MD4_CTX ctx; MD4Init( &ctx ); MD4Update( &ctx, data, 0x10 ); MD4Final( &ctx ); memcpy( hash, ctx.digest, 0x10 ); return STATUS_SUCCESS; } /****************************************************************************** * SystemFunction030 (ADVAPI32.@) * * Tests if two blocks of 16 bytes are equal * * PARAMS * b1,b2 [I] block of 16 bytes * * RETURNS * TRUE if blocks are the same * FALSE if blocks are different */ BOOL WINAPI SystemFunction030(LPCVOID b1, LPCVOID b2) { return !memcmp(b1, b2, 0x10); } /****************************************************************************** * SystemFunction035 (ADVAPI32.@) * * Described here: http://disc.server.com/discussion.cgi?disc=148775;article=942;title=Coding%2FASM%2FSystem * * NOTES * Stub, always return TRUE. */ BOOL WINAPI SystemFunction035(LPCSTR lpszDllFilePath) { FIXME("%s: stub\n", debugstr_a(lpszDllFilePath)); return TRUE; } /****************************************************************************** * SystemFunction036 (ADVAPI32.@) * * MSDN documents this function as RtlGenRandom and declares it in ntsecapi.h * * PARAMS * pbBuffer [O] Pointer to memory to receive random bytes. * dwLen [I] Number of random bytes to fetch. * * RETURNS * Success: TRUE * Failure: FALSE */ BOOLEAN WINAPI SystemFunction036(PVOID pbBuffer, ULONG dwLen) { int dev_random; dev_random = open("/dev/urandom", O_RDONLY); if (dev_random != -1) { if (read(dev_random, pbBuffer, dwLen) == (ssize_t)dwLen) { close(dev_random); return TRUE; } close(dev_random); } else FIXME("couldn't open /dev/urandom\n"); SetLastError(NTE_FAIL); return FALSE; } /* These functions have nearly identical prototypes to CryptProtectMemory and CryptUnprotectMemory, in crypt32.dll. */ /****************************************************************************** * SystemFunction040 (ADVAPI32.@) * * MSDN documents this function as RtlEncryptMemory and declares it in ntsecapi.h. * * PARAMS * memory [I/O] Pointer to memory to encrypt. * length [I] Length of region to encrypt in bytes. * flags [I] Control whether other processes are able to decrypt the memory. * RTL_ENCRYPT_OPTION_SAME_PROCESS * RTL_ENCRYPT_OPTION_CROSS_PROCESS * RTL_ENCRYPT_OPTION_SAME_LOGON * * RETURNS * Success: STATUS_SUCCESS * Failure: NTSTATUS error code * * NOTES * length must be a multiple of RTL_ENCRYPT_MEMORY_SIZE. * If flags are specified when encrypting, the same flag value must be given * when decrypting the memory. */ NTSTATUS WINAPI SystemFunction040(PVOID memory, ULONG length, ULONG flags) { FIXME("(%p, %x, %x): stub [RtlEncryptMemory]\n", memory, length, flags); return STATUS_SUCCESS; } /****************************************************************************** * SystemFunction041 (ADVAPI32.@) * * MSDN documents this function as RtlDecryptMemory and declares it in ntsecapi.h. * * PARAMS * memory [I/O] Pointer to memory to decrypt. * length [I] Length of region to decrypt in bytes. * flags [I] Control whether other processes are able to decrypt the memory. * RTL_ENCRYPT_OPTION_SAME_PROCESS * RTL_ENCRYPT_OPTION_CROSS_PROCESS * RTL_ENCRYPT_OPTION_SAME_LOGON * * RETURNS * Success: STATUS_SUCCESS * Failure: NTSTATUS error code * * NOTES * length must be a multiple of RTL_ENCRYPT_MEMORY_SIZE. * If flags are specified when encrypting, the same flag value must be given * when decrypting the memory. */ NTSTATUS WINAPI SystemFunction041(PVOID memory, ULONG length, ULONG flags) { FIXME("(%p, %x, %x): stub [RtlDecryptMemory]\n", memory, length, flags); return STATUS_SUCCESS; } /****************************************************************************** * WriteEncryptedFileRaw (ADVAPI32.@) * * Import encrypted files * * PARAMS * import [I] pointer to the import callback function * callback [I] pointer to the application defined context * context [I] pointer to the system context * RETURNS * Success: ERROR_SUCCESS * Failure: NTSTATUS error code */ DWORD WINAPI WriteEncryptedFileRaw(PFE_IMPORT_FUNC import, PVOID callback, PVOID context) { FIXME("(%p, %p, %p): stub\n", import, callback, context); return ERROR_CALL_NOT_IMPLEMENTED; }