windows-nt/Source/XPSP1/NT/ds/security/services/ca/ocmsetup/wizpage.cpp

7146 lines
194 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
//+-------------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (C) Microsoft Corporation, 1997 - 1999
//
// File: wizpage.cpp
//
// Contents: Wizard page construction and presentation functions to be used
// by the OCM driver code.
//
// History: 04/16/97 JerryK Fixed/Changed/Unmangled
// 0/8/97 XTan major structure change
//
//----------------------------------------------------------------------------
#include "pch.cpp"
#pragma hdrstop
// ** System Includes **
#include <prsht.h>
#include <commdlg.h>
#include <sddl.h>
// ** Application Includes **
#include "cryptui.h"
#include "csdisp.h"
#include "csprop.h"
#include "cspenum.h"
#include "usecert.h"
#include "wizpage.h"
#include "cscsp.h"
#include "clibres.h"
#include "certmsg.h"
#include "websetup.h"
#include "dssetup.h"
#include "setupids.h"
#include "tfc.h"
//defines
#define __dwFILE__ __dwFILE_OCMSETUP_WIZPAGE_CPP__
#define dwWIZDISABLE -2
#define dwWIZBACK -1
#define dwWIZACTIVE 0
#define dwWIZNEXT 1
#define C_CSPHASNOKEYMINMAX -1
#define MAX_KEYLENGTHEDIT 128
#define MAX_KEYLENGTHDIGIT 5
#define wszOLDCASTOREPREFIX L"CA_"
#define _ReturnIfWizError(hr) \
{ \
if (S_OK != (hr)) \
{ \
CSILOG((hr), IDS_LOG_WIZ_PAGE_ERROR, NULL, NULL, NULL); \
_PrintError(hr, "CertSrv Wizard error"); \
return TRUE; \
} \
}
#define _GetCompDataOrReturnIfError(pComp, hDlg) \
(PER_COMPONENT_DATA*)GetWindowLongPtr((hDlg), DWLP_USER); \
if (NULL == (pComp) || S_OK != (pComp)->hrContinue) \
{ \
return TRUE; \
}
#define _GetCompDataOrReturn(pComp, hDlg) \
(PER_COMPONENT_DATA*)GetWindowLongPtr((hDlg), DWLP_USER); \
if (NULL == (pComp)) \
{ \
return TRUE; \
}
#define _DisableWizDisplayIfError(pComp, hDlg) \
if (S_OK != (pComp)->hrContinue) \
{ \
CSILOG((pComp)->hrContinue, IDS_LOG_DISABLE_WIZ_PAGE, NULL, NULL, NULL); \
SetWindowLongPtr((hDlg), DWLP_MSGRESULT, -1); \
}
//--------------------------------------------------------------------
struct FAKEPROGRESSINFO {
HANDLE hStopEvent;
CRITICAL_SECTION csTimeSync;
BOOL fCSInit;
DWORD dwSecsRemaining;
HWND hwndProgBar;
};
struct KEYGENPROGRESSINFO {
HWND hDlg; // wizard page window
PER_COMPONENT_DATA * pComp; // setup data
};
KEYGENPROGRESSINFO g_KeyGenInfo = {
NULL, //hDlg
NULL, //pComp
};
BOOL g_fAllowUnicodeStrEncoding = FALSE;
// ** Prototypes/Forward Declarations **
LRESULT CALLBACK
IdInfoNameEditFilterHook(HWND, UINT, WPARAM, LPARAM);
__inline VOID
SetEditFocusAndSelect(
IN HWND hwnd,
IN DWORD indexStart,
IN DWORD indexEnd)
{
SetFocus(hwnd);
SendMessage(hwnd, EM_SETSEL, indexStart, indexEnd);
}
// fix for 160324 - NT4->Whistler upgrade:
// cannot reinstall CA w/ same cert as instructions tell us to do
//
// Upgrade NT4->Whistler is not supported but old CA key and cert can be reused
// But NT4 used to install CA certs in a separate store (CA_MACHINENAME) so we
// need to move the cert to root store so it can be validated.
HRESULT CopyNT4CACertToRootStore(CASERVERSETUPINFO *pServer)
{
HRESULT hr;
WCHAR wszOldCAStore[MAX_PATH];
HCERTSTORE hOldStore = NULL;
HCERTSTORE hRootStore = NULL;
CERT_RDN_ATTR rdnAttr = { szOID_COMMON_NAME, CERT_RDN_ANY_TYPE,};
CERT_RDN rdn = { 1, &rdnAttr };
DWORD cCA = 0;
CERT_CONTEXT const *pCACert;
CERT_CONTEXT const *pCACertKeep = NULL; // needn't free
DWORD dwFlags;
ENUM_CATYPES CATypeDummy;
CERT_CONTEXT const **ppCACertKeep = NULL;
CRYPT_KEY_PROV_INFO keyProvInfo;
DWORD IndexCA;
DWORD *pIndex = NULL;
DWORD i = 0;
ZeroMemory(&keyProvInfo, sizeof(keyProvInfo));
// form old ca store name
// !!! NT4 uses different sanitize, how do we build it correctly?
wcscpy(wszOldCAStore, wszOLDCASTOREPREFIX);
wcscat(wszOldCAStore, pServer->pwszSanitizedName);
// open old CA store
hOldStore = CertOpenStore(
CERT_STORE_PROV_SYSTEM_W,
X509_ASN_ENCODING,
NULL, // hProv
CERT_STORE_OPEN_EXISTING_FLAG |
CERT_STORE_READONLY_FLAG |
CERT_SYSTEM_STORE_LOCAL_MACHINE,
wszOldCAStore);
if (NULL == hOldStore)
{
hr = myHLastError();
_JumpError(hr, error, "CertOpenStore");
}
// find CA cert, old ca common name always same as ca name
rdnAttr.Value.pbData = (BYTE *) pServer->pwszCACommonName;
rdnAttr.Value.cbData = 0;
pCACert = NULL;
do
{
pCACert = CertFindCertificateInStore(
hOldStore,
X509_ASN_ENCODING,
CERT_UNICODE_IS_RDN_ATTRS_FLAG |
CERT_CASE_INSENSITIVE_IS_RDN_ATTRS_FLAG,
CERT_FIND_SUBJECT_ATTR,
&rdn,
pCACert);
if (NULL != pCACert)
{
// find one
if (NULL == ppCACertKeep)
{
ppCACertKeep = (CERT_CONTEXT const **)LocalAlloc(LMEM_FIXED,
(cCA + 1) * sizeof(CERT_CONTEXT const *));
_JumpIfOutOfMemory(hr, error, ppCACertKeep);
}
else
{
CERT_CONTEXT const ** ppTemp;
ppTemp = (CERT_CONTEXT const **)LocalReAlloc(
ppCACertKeep,
(cCA + 1) * sizeof(CERT_CONTEXT const *),
LMEM_MOVEABLE);
_JumpIfOutOfMemory(hr, error, ppTemp);
ppCACertKeep = ppTemp;
}
// keep current
ppCACertKeep[cCA] = CertDuplicateCertificateContext(pCACert);
if (NULL == ppCACertKeep[cCA])
{
hr = myHLastError();
_JumpError(hr, error, "CertDuplicateCertificate");
}
++cCA;
}
} while (NULL != pCACert);
if (1 > cCA)
{
// no ca cert
hr = E_INVALIDARG;
_JumpError(hr, error, "no ca cert");
}
// assume 1st one
pCACertKeep = ppCACertKeep[0];
if (1 < cCA)
{
DWORD cCA2 = cCA;
BOOL fMatch;
// have multi ca certs with the same cn
// because sp4 doesn't reg ca serial # so need to decide which one
// once the correct one is found, reg its serial #
// build an index
pIndex = (DWORD*)LocalAlloc(LMEM_FIXED, cCA * sizeof(DWORD));
_JumpIfOutOfMemory(hr, error, pIndex);
i = 0;
for (pIndex[i] = i; i < cCA; ++i);
// try to compare with public key
// in case ca cert doesn't have kpi which is the case for v10
// so try base rsa
hr = csiFillKeyProvInfo(
pServer->pwszSanitizedName,
pServer->pCSPInfo->pwszProvName,
pServer->pCSPInfo->dwProvType,
TRUE, // always machine keyset
&keyProvInfo);
if (S_OK == hr)
{
cCA2 = 0;
for (i = 0; i < cCA; ++i)
{
hr = myVerifyPublicKey(
ppCACertKeep[i],
FALSE,
&keyProvInfo,
NULL,
&fMatch);
if (S_OK != hr)
{
continue;
}
if (fMatch)
{
// found one match with current public key from container
pIndex[cCA2] = i;
++cCA2;
}
}
}
// compare all ca certs and pick one has most recent NotAfter
pCACertKeep = ppCACertKeep[pIndex[0]];
for (i = 1; i < cCA2; ++i)
{
if (0 < CompareFileTime(
&ppCACertKeep[pIndex[i]]->pCertInfo->NotAfter,
&pCACertKeep->pCertInfo->NotAfter))
{
// update
pCACertKeep = ppCACertKeep[pIndex[i]];
}
}
}
// if get here, must find ca cert
CSASSERT(NULL != pCACertKeep);
// add cert to root store
hRootStore = CertOpenStore(
CERT_STORE_PROV_SYSTEM_W,
X509_ASN_ENCODING,
NULL, // hProv
CERT_SYSTEM_STORE_LOCAL_MACHINE,
wszROOT_CERTSTORE);
if (NULL == hRootStore)
{
hr = myHLastError();
_JumpError(hr, error, "CertOpenStore");
}
if(!CertAddCertificateContextToStore(
hRootStore,
pCACertKeep,
CERT_STORE_ADD_NEW,
NULL))
{
hr = myHLastError();
_JumpError(hr, error, "CertAddCertificateContextToStore");
}
error:
csiFreeKeyProvInfo(&keyProvInfo);
for (i = 0; i < cCA; ++i)
{
CertFreeCertificateContext(ppCACertKeep[i]);
}
if (NULL != hOldStore)
{
CertCloseStore(hOldStore, CERT_CLOSE_STORE_CHECK_FLAG);
}
if (NULL != hRootStore)
{
CertCloseStore(hRootStore, CERT_CLOSE_STORE_CHECK_FLAG);
}
return hr;
}
//--------------------------------------------------------------------
// Clear the key container name to indicate that we must generate a new key.
void
ClearKeyContainerName(CASERVERSETUPINFO *pServer)
{
if (NULL!=pServer->pwszKeyContainerName) {
// Delete the key container if this is a new one
if (pServer->fDeletableNewKey) {
// Delete the key container. Ignore any errors.
HCRYPTPROV hProv=NULL;
myCertSrvCryptAcquireContext(
&hProv,
pServer->pwszKeyContainerName,
pServer->pCSPInfo->pwszProvName,
pServer->pCSPInfo->dwProvType,
CRYPT_DELETEKEYSET,
pServer->pCSPInfo->fMachineKeyset);
if (NULL!=hProv) {
CryptReleaseContext(hProv, 0);
}
pServer->fDeletableNewKey=FALSE;
}
// Clear the key container name, to indicate that we must generate a new key.
LocalFree(pServer->pwszKeyContainerName);
LocalFree(pServer->pwszDesanitizedKeyContainerName);
pServer->pwszKeyContainerName=NULL;
pServer->pwszDesanitizedKeyContainerName=NULL;
// if we were using an existing cert, we are not anymore
ClearExistingCertToUse(pServer);
} else {
// if there was no key, there couldn't be a existing cert.
CSASSERT(NULL==pServer->pccExistingCert);
// key container name is already clear
}
}
//--------------------------------------------------------------------
// Set both the real key container name and the display key container name
HRESULT
SetKeyContainerName(
CASERVERSETUPINFO *pServer,
const WCHAR * pwszKeyContainerName)
{
HRESULT hr;
// get rid of any previous names
ClearKeyContainerName(pServer);
// set the real key container name
pServer->pwszKeyContainerName = (WCHAR *) LocalAlloc(
LMEM_FIXED,
sizeof(WCHAR) * (wcslen(pwszKeyContainerName) + 1));
_JumpIfOutOfMemory(hr, error, pServer->pwszKeyContainerName);
wcscpy(pServer->pwszKeyContainerName, pwszKeyContainerName);
// set the display key container name
hr = myRevertSanitizeName(
pServer->pwszKeyContainerName,
&pServer->pwszDesanitizedKeyContainerName);
_JumpIfError(hr, error, "myRevertSanitizeName");
// Must validate the key again when the selected key changes
pServer->fValidatedHashAndKey = FALSE;
CSILOG(
hr,
IDS_ILOG_KEYCONTAINERNAME,
pServer->pwszKeyContainerName,
pServer->pwszDesanitizedKeyContainerName,
NULL);
error:
return hr;
}
HRESULT
UpdateDomainAndUserName(
IN HWND hwnd,
IN OUT PER_COMPONENT_DATA *pComp);
BOOL
CertConfirmCancel(
HWND hwnd,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CSASSERT(NULL != pComp);
if (!(*pComp->HelperRoutines.ConfirmCancelRoutine)(hwnd))
{
SetWindowLongPtr(hwnd, DWLP_MSGRESULT, TRUE);
return TRUE;
}
hr = CancelCertsrvInstallation(hwnd, pComp);
_PrintIfError(hr, "CancelCertsrvInstallation");
return FALSE;
}
HRESULT
StartWizardPageEditControls(
IN HWND hDlg,
IN OUT PAGESTRINGS *pPageStrings)
{
HRESULT hr;
for ( ; NULL != pPageStrings->ppwszString; pPageStrings++)
{
SendMessage(
GetDlgItem(hDlg, pPageStrings->idControl),
WM_SETTEXT,
0,
(LPARAM) *pPageStrings->ppwszString);
}
hr = S_OK;
//error:
return hr;
}
HRESULT
FinishWizardPageEditControls(
IN HWND hDlg,
IN OUT PAGESTRINGS *pPageStrings)
{
HRESULT hr;
for ( ; NULL != pPageStrings->ppwszString; pPageStrings++)
{
WCHAR *pwszString = NULL;
hr = myUIGetWindowText(
GetDlgItem(hDlg, pPageStrings->idControl),
&pwszString);
_JumpIfError(hr, error, "myUIGetWindowText");
if (NULL != *pPageStrings->ppwszString)
{
// free old one
LocalFree(*pPageStrings->ppwszString);
*pPageStrings->ppwszString = NULL;
}
*pPageStrings->ppwszString = pwszString;
CSILOG(S_OK, pPageStrings->idLog, pwszString, NULL, NULL);
}
hr = S_OK;
error:
return hr;
}
//+------------------------------------------------------------------------
// Function: WizPageSetTextLimits
//
// Synopsis: Sets text input limits for the text controls of a dlg page.
//-------------------------------------------------------------------------
HRESULT
WizPageSetTextLimits(
HWND hDlg,
IN OUT PAGESTRINGS *pPageStrings)
{
HRESULT hr;
for ( ; NULL != pPageStrings->ppwszString; pPageStrings++)
{
SendDlgItemMessage(
hDlg,
pPageStrings->idControl,
EM_SETLIMITTEXT,
(WPARAM) pPageStrings->cchMax,
(LPARAM) 0);
}
hr = S_OK;
//error:
return hr;
}
// check optional or mac length in edit field
// if any invalid, focus on the edit field, select all
HRESULT
ValidateTextField(
HINSTANCE hInstance,
BOOL fUnattended,
HWND hDlg,
LPTSTR pszTestString,
DWORD nUBValue,
int nMsgBoxNullStringErrID,
int nMsgBoxLenStringErrID,
int nControlID)
{
HRESULT hr = E_INVALIDARG;
HWND hwndCtrl = NULL;
BOOL fIsEmpty;
fIsEmpty = (NULL == pszTestString) || (L'\0' == pszTestString[0]);
if (fIsEmpty)
{
if (0 != nMsgBoxNullStringErrID) // non optional
{
// edit field can't be empty
CertWarningMessageBox(
hInstance,
fUnattended,
hDlg,
nMsgBoxNullStringErrID,
0,
NULL);
if (!fUnattended)
{
hwndCtrl = GetDlgItem(hDlg, nControlID); // Get offending ctrl
}
goto error;
}
goto done;
}
// the following may not be necessary because edit field set to max limit
if (wcslen(pszTestString) > nUBValue) // Make sure it's not too long
{
CertWarningMessageBox(
hInstance,
fUnattended,
hDlg,
nMsgBoxLenStringErrID,
0,
NULL);
if (!fUnattended)
{
hwndCtrl = GetDlgItem(hDlg, nControlID);
}
goto error;
}
done:
hr = S_OK;
error:
if (!fUnattended && NULL != hwndCtrl)
{
SetEditFocusAndSelect(hwndCtrl, 0, -1);
}
return hr;
}
HRESULT
WizardPageValidation(
IN HINSTANCE hInstance,
IN BOOL fUnattended,
IN HWND hDlg,
IN PAGESTRINGS *pPageStrings)
{
HRESULT hr;
for ( ; NULL != pPageStrings->ppwszString; pPageStrings++)
{
hr = ValidateTextField(
hInstance,
fUnattended,
hDlg,
*pPageStrings->ppwszString,
pPageStrings->cchMax,
pPageStrings->idMsgBoxNullString,
pPageStrings->idMsgBoxLenString,
pPageStrings->idControl);
_JumpIfError(hr, error, "invalid edit field");
}
hr = S_OK;
error:
return hr;
}
#define KEYGEN_GENERATE_KEY 60 // estimated seconds to gen key
#define KEYGEN_PROTECT_KEY 60 // estimated seconds to acl key
#define KEYGEN_TEST_HASH 2 // estimated seconds to acl key
//--------------------------------------------------------------------
// Fake progress by incrementing a progress bar every second
DWORD WINAPI
KeyGenFakeProgressThread(
LPVOID lpParameter)
{
FAKEPROGRESSINFO * pFakeProgressInfo=(FAKEPROGRESSINFO *)lpParameter;
// Wait for the stop signal for 1 second.
while (WAIT_TIMEOUT==WaitForSingleObject(pFakeProgressInfo->hStopEvent, 1000)) {
// See if we can send another tick to the progress bar
if(pFakeProgressInfo->fCSInit)
{
EnterCriticalSection(&pFakeProgressInfo->csTimeSync);
if (pFakeProgressInfo->dwSecsRemaining>0) {
// move one step (one second)
SendMessage(pFakeProgressInfo->hwndProgBar, PBM_DELTAPOS, 1, 0);
pFakeProgressInfo->dwSecsRemaining--;
}
LeaveCriticalSection(&pFakeProgressInfo->csTimeSync);
}
}
// We were signaled, so stop.
return 0; // return value ignored
}
//--------------------------------------------------------------------
// Generate a new key and test the hash algorithm
DWORD WINAPI
GenerateKeyThread(
LPVOID lpParameter)
{
HRESULT hr = S_OK;
WCHAR * pwszMsg;
FAKEPROGRESSINFO fpi;
KEYGENPROGRESSINFO * pKeyGenInfo=(KEYGENPROGRESSINFO *)lpParameter;
PER_COMPONENT_DATA * pComp=pKeyGenInfo->pComp;
CASERVERSETUPINFO * pServer=pComp->CA.pServer;
HWND hwndProgBar=GetDlgItem(pKeyGenInfo->hDlg, IDC_KEYGEN_PROGRESS);
HWND hwndText=GetDlgItem(pKeyGenInfo->hDlg, IDC_KEYGEN_PROGRESS_TEXT);
int iErrMsg=0; // error msg id
const WCHAR * pwszErrMsgData = L"";
// variables that must be cleaned up
fpi.hStopEvent=NULL;
HANDLE hFakeProgressThread=NULL;
HCRYPTPROV hProv=NULL;
fpi.fCSInit = FALSE;
__try
{
InitializeCriticalSection(&fpi.csTimeSync);
fpi.fCSInit = TRUE;
}
__except(hr = myHEXCEPTIONCODE(), EXCEPTION_EXECUTE_HANDLER)
{
}
_JumpIfError(hr, error, "InitializeCriticalSection");
// STEP 0:
// initialize the fake-progress thread
// set up the structure for the fake-progress thread
fpi.hStopEvent=CreateEvent(
NULL, // security
FALSE, // manual reset?
FALSE, // signaled?
NULL); // name
if (NULL==fpi.hStopEvent) {
hr = myHLastError();
_JumpError(hr, error, "CreateEvent");
}
fpi.hwndProgBar=hwndProgBar;
fpi.dwSecsRemaining=0; // Initially, the thread has no work to do.
// start the fake-progress thread
DWORD dwThreadID; // ignored
hFakeProgressThread=CreateThread(
NULL, // security
0, // stack
KeyGenFakeProgressThread,
(void *)&fpi,
0, // flags
&dwThreadID);
if (NULL==hFakeProgressThread) {
hr = myHLastError();
_JumpError(hr, error, "CreateThread");
}
if (NULL==pServer->pwszKeyContainerName) {
// STEP 1:
// Generate a key
// set the status
hr = myLoadRCString(pComp->hInstance, IDS_KEYGEN_GENERATING, &pwszMsg);
_JumpIfError(hr, error, "myLoadRCString");
SetWindowText(hwndText, pwszMsg);
LocalFree(pwszMsg);
SendMessage(hwndProgBar, PBM_SETPOS, (WPARAM)0, 0);
if(fpi.fCSInit)
{
EnterCriticalSection(&fpi.csTimeSync);
fpi.dwSecsRemaining = KEYGEN_GENERATE_KEY;
LeaveCriticalSection(&fpi.csTimeSync);
}
// generate key
hr = csiGenerateKeysOnly(
pServer->pwszSanitizedName,
pServer->pCSPInfo->pwszProvName,
pServer->pCSPInfo->dwProvType,
pServer->pCSPInfo->fMachineKeyset,
pServer->dwKeyLength,
pComp->fUnattended,
&hProv,
&iErrMsg);
if (S_OK != hr)
{
pwszErrMsgData=pServer->pwszSanitizedName;
pServer->fKeyGenFailed = TRUE;
_JumpError(hr, error, "csiGenerateKeysOnly");
}
pServer->fKeyGenFailed = FALSE;
// now set this as the existing key
SetKeyContainerName(pServer, pServer->pwszSanitizedName);
pServer->fDeletableNewKey=TRUE;
// STEP 2:
// Set the ACLs
// set the status
hr = myLoadRCString(pComp->hInstance, IDS_KEYGEN_PROTECTING, &pwszMsg);
_JumpIfError(hr, error, "myLoadRCString");
SetWindowText(hwndText, pwszMsg);
LocalFree(pwszMsg);
if(fpi.fCSInit)
{
EnterCriticalSection(&fpi.csTimeSync);
SendMessage(hwndProgBar, PBM_SETPOS, (WPARAM)KEYGEN_GENERATE_KEY, 0);
fpi.dwSecsRemaining=KEYGEN_PROTECT_KEY;
LeaveCriticalSection(&fpi.csTimeSync);
}
// set the ACLs
hr = csiSetKeyContainerSecurity(hProv);
if (S_OK!=hr) {
iErrMsg=IDS_ERR_KEYSECURITY;
pwszErrMsgData=pServer->pwszKeyContainerName;
_JumpError(hr, error, "csiSetKeyContainerSecurity");
}
} // <- end if (NULL==pServer->pwszKeyContainerName)
if (FALSE==pServer->fValidatedHashAndKey) {
// STEP 3:
// Test the hash algorithm and key set
// set the status
hr = myLoadRCString(pComp->hInstance, IDS_KEYGEN_TESTINGHASHANDKEY, &pwszMsg);
_JumpIfError(hr, error, "myLoadRCString");
SetWindowText(hwndText, pwszMsg);
LocalFree(pwszMsg);
if(fpi.fCSInit)
{
EnterCriticalSection(&fpi.csTimeSync);
SendMessage(hwndProgBar, PBM_SETPOS, (WPARAM)KEYGEN_GENERATE_KEY+KEYGEN_PROTECT_KEY, 0);
fpi.dwSecsRemaining=KEYGEN_TEST_HASH;
LeaveCriticalSection(&fpi.csTimeSync);
}
// test the hash and keyset
hr = myValidateHashForSigning(
pServer->pwszKeyContainerName,
pServer->pCSPInfo->pwszProvName,
pServer->pCSPInfo->dwProvType,
pServer->pCSPInfo->fMachineKeyset,
NULL,
pServer->pHashInfo->idAlg);
if (S_OK!=hr) {
if (NTE_BAD_KEY_STATE==hr || //all the errors with KEY in them
NTE_NO_KEY==hr ||
NTE_BAD_PUBLIC_KEY==hr ||
NTE_BAD_KEYSET==hr ||
NTE_KEYSET_NOT_DEF==hr ||
NTE_KEYSET_ENTRY_BAD==hr ||
NTE_BAD_KEYSET_PARAM==hr) {
// Bad keyset (eg, not AT_SIGNATURE) - force user to pick another
iErrMsg=IDS_KEY_INVALID;
pwszErrMsgData=pServer->pwszKeyContainerName;
} else {
// Bad hash algorithm - force user to pick another
iErrMsg=IDS_ERR_INVALIDHASH;
pwszErrMsgData=pServer->pHashInfo->pwszName;
}
_JumpError(hr, error, "myValidateHashForSigning");
}
// mark this hash as validated
pServer->fValidatedHashAndKey=TRUE;
}
// STEP 3:
// Go to the next page
// set the status, so the user sees the bar go all the way.
if(fpi.fCSInit)
{
EnterCriticalSection(&fpi.csTimeSync);
SendMessage(hwndProgBar, PBM_SETPOS, (WPARAM)KEYGEN_GENERATE_KEY+KEYGEN_PROTECT_KEY+KEYGEN_TEST_HASH, 0);
fpi.dwSecsRemaining=0;
LeaveCriticalSection(&fpi.csTimeSync);
}
error:
// clean up after the false-progress thread
if (NULL!=hFakeProgressThread) {
CSASSERT(NULL!=fpi.hStopEvent);
// tell the progress thread to stop
if (FALSE==SetEvent(fpi.hStopEvent)) {
_PrintError(myHLastError(), "SetEvent");
} else {
// wait for it to stop
WaitForSingleObject(hFakeProgressThread, INFINITE);
}
CloseHandle(hFakeProgressThread);
}
if(fpi.fCSInit)
{
DeleteCriticalSection(&fpi.csTimeSync);
}
if (NULL!=fpi.hStopEvent) {
CloseHandle(fpi.hStopEvent);
}
if (NULL!=hProv) {
CryptReleaseContext(hProv, 0);
}
// show an error message if we need to
if (0!=iErrMsg) {
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
pKeyGenInfo->hDlg,
iErrMsg,
hr,
pwszErrMsgData);
}
pServer->LastWiz=ENUM_WIZ_KEYGEN;
if (S_OK==hr) {
// go to next page
PropSheet_PressButton(GetParent(pKeyGenInfo->hDlg), PSBTN_NEXT);
} else {
// go back
PropSheet_PressButton(GetParent(pKeyGenInfo->hDlg), PSBTN_BACK);
}
return 0; // return value ignored
}
//--------------------------------------------------------------------
// Start the KeyGen wizard page
HRESULT
HandleKeyGenWizActive(
HWND hDlg,
PER_COMPONENT_DATA *pComp,
KEYGENPROGRESSINFO *pKeyGenInfo)
{
HRESULT hr = S_OK;
// Suppress this wizard page if
// we are going backwards, or
// we've already seen an error, or
// we are not installing the server,
// or the key exists and the hash has been checked.
if (ENUM_WIZ_STORE == pComp->CA.pServer->LastWiz ||
!(IS_SERVER_INSTALL & pComp->dwInstallStatus) ||
(NULL != pComp->CA.pServer->pwszKeyContainerName &&
pComp->CA.pServer->fValidatedHashAndKey)) {
// skip/disable page
CSILOGDWORD(IDS_KEYGEN_TITLE, dwWIZDISABLE);
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, -1);
}
else
{
// set progress bar parameters: range, step, and position
// set them now so the user will never see a full bar if this is the second visit.
HWND hwndProgBar=GetDlgItem(hDlg, IDC_KEYGEN_PROGRESS);
SendMessage(hwndProgBar, PBM_SETRANGE, 0,
MAKELPARAM(0, KEYGEN_GENERATE_KEY+KEYGEN_PROTECT_KEY+KEYGEN_TEST_HASH));
SendMessage(hwndProgBar, PBM_SETSTEP, (WPARAM)1, 0);
SendMessage(hwndProgBar, PBM_SETPOS, (WPARAM)0, 0);
// init info for keygen thread
pKeyGenInfo->hDlg=hDlg;
pKeyGenInfo->pComp=pComp;
// start the key gen thread
DWORD dwThreadID; // ignored
HANDLE hKeyGenThread=CreateThread(
NULL, // security
0, // stack
GenerateKeyThread,
(void *)pKeyGenInfo,
0, // flags
&dwThreadID);
if (NULL==hKeyGenThread) {
hr = myHLastError();
_JumpError(hr, error, "CreateThread");
}
CloseHandle(hKeyGenThread);
}
error:
return hr;
}
//+------------------------------------------------------------------------
// Function: WizKeyGenPageDlgProc(. . . .)
//
// Synopsis: Dialog procedure for keygen wiz-page
//-------------------------------------------------------------------------
INT_PTR
WizKeyGenPageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
HWND hwndCtrl;
PER_COMPONENT_DATA *pComp = NULL;
switch(iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam;
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_COMMAND:
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_KILLACTIVE:
break;
case PSN_RESET:
break;
case PSN_QUERYCANCEL:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
return CertConfirmCancel(hDlg, pComp);
break;
case PSN_SETACTIVE:
CSILOGDWORD(IDS_KEYGEN_TITLE, dwWIZACTIVE);
PropSheet_SetWizButtons(GetParent(hDlg), 0);
pComp = _GetCompDataOrReturn(pComp, hDlg);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue=HandleKeyGenWizActive(hDlg, pComp, &g_KeyGenInfo);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZBACK:
CSILOGDWORD(IDS_KEYGEN_TITLE, dwWIZBACK);
break;
case PSN_WIZNEXT:
CSILOGDWORD(IDS_KEYGEN_TITLE, dwWIZNEXT);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
HRESULT
ValidateESERestrictions(
IN WCHAR const *pwszDirectory)
{
HRESULT hr;
HANDLE hFile = INVALID_HANDLE_VALUE;
HANDLE hFileA = INVALID_HANDLE_VALUE;
WCHAR *pwszPath = NULL;
char *pszPath = NULL;
WCHAR *pwsz;
char *psz;
DWORD cwcbs;
DWORD cchbs;
hr = myBuildPathAndExt(pwszDirectory, L"certocm.tmp", NULL, &pwszPath);
_JumpIfError(hr, error, "myBuildPathAndExt");
if (!ConvertWszToSz(&pszPath, pwszPath, -1))
{
hr = E_OUTOFMEMORY;
_JumpError(hr, error, "ConvertWszToSz")
}
pwsz = pwszPath;
cwcbs = 0;
while (TRUE)
{
pwsz = wcschr(pwsz, L'\\');
if (NULL == pwsz)
{
break;
}
pwsz++;
cwcbs++;
}
psz = pszPath;
cchbs = 0;
while (TRUE)
{
psz = strchr(psz, '\\');
if (NULL == psz)
{
break;
}
psz++;
cchbs++;
}
if (cchbs != cwcbs)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "backslash count")
}
hFile = CreateFile(
pwszPath,
GENERIC_WRITE,
FILE_SHARE_DELETE | FILE_SHARE_READ | FILE_SHARE_WRITE,
NULL, // security
OPEN_ALWAYS,
FILE_ATTRIBUTE_NORMAL,
NULL); // template
if (INVALID_HANDLE_VALUE == hFile)
{
hr = myHLastError();
_JumpErrorStr(hr, error, "CreateFile", pwszPath);
}
hFileA = CreateFileA(
pszPath,
GENERIC_READ,
FILE_SHARE_DELETE | FILE_SHARE_READ | FILE_SHARE_WRITE,
NULL, // security
OPEN_EXISTING,
FILE_ATTRIBUTE_NORMAL,
NULL); // template
if (INVALID_HANDLE_VALUE == hFileA)
{
hr = myHLastError();
_JumpErrorStr(hr, error, pszPath, L"CreateFileA");
}
CSASSERT(S_OK == hr);
error:
if (INVALID_HANDLE_VALUE != hFileA)
{
CloseHandle(hFileA); // close before below delete
}
if (NULL != pszPath)
{
LocalFree(pszPath);
}
if (NULL != pwszPath)
{
if (INVALID_HANDLE_VALUE != hFile)
{
CloseHandle(hFile); // close before delete
DeleteFile(pwszPath);
}
LocalFree(pwszPath);
}
return(hr);
}
//+-------------------------------------------------------------------------
// Function: check if a database edit field
//--------------------------------------------------------------------------
BOOL
ValidateAndCreateDirField(
HINSTANCE hInstance,
BOOL fUnattended,
HWND hDlg,
WCHAR *pwszDirectory,
BOOL fDefaultDir,
int iMsgNotFullPath,
BOOL *pfExist,
BOOL *pfIsUNC)
{
BOOL fRet = FALSE;
DWORD dwPathFlag = 0;
HRESULT hr;
*pfExist = TRUE;
// check edit field
if (!myIsFullPath(pwszDirectory, &dwPathFlag))
{
CertWarningMessageBox(
hInstance,
fUnattended,
hDlg,
iMsgNotFullPath,
0,
pwszDirectory);
goto error;
}
// set the UNC check
*pfIsUNC = (dwPathFlag == UNC_PATH);
if (MAX_PATH - 1 < wcslen(pwszDirectory))
{
WCHAR wszMsg[256 + MAX_PATH];
WCHAR *pwszFormat = NULL;
hr = myLoadRCString(hInstance,
IDS_STORELOC_PATHTOOLONG,
&pwszFormat);
_JumpIfError(hr, error, "myLoadRCString");
swprintf(wszMsg, pwszFormat, pwszDirectory, MAX_PATH-1);
CertWarningMessageBox(
hInstance,
fUnattended,
hDlg,
0,
0,
wszMsg);
LocalFree(pwszFormat);
goto error;
}
if (DE_DIREXISTS != DirExists(pwszDirectory))
{
if (*pfIsUNC)
{
CertWarningMessageBox(
hInstance,
fUnattended,
hDlg,
IDS_STORELOC_UNCMUSTEXIST,
0,
pwszDirectory);
goto error;
}
else
{
if (!fDefaultDir)
{
// confirm and create outside
*pfExist = FALSE;
goto done;
}
// try to create default dir
hr = myCreateNestedDirectories(pwszDirectory);
_JumpIfError(hr, error, "myCreateNestedDirectories");
}
}
done:
fRet = TRUE;
error:
return fRet;
}
//+---------------------------------------------------------------------------
// Description: set MS Base CSP as default csp otherwise 1st one
//----------------------------------------------------------------------------
HRESULT
DetermineDefaultCSP(CASERVERSETUPINFO *pServer)
{
HRESULT hr;
CSP_INFO *pCSPInfo = NULL;
// select 1st if no MSBase
pServer->pCSPInfo = pServer->pCSPInfoList;
if (NULL == pServer->pDefaultCSPInfo)
{
goto done;
}
// check all csps
pCSPInfo = pServer->pCSPInfoList;
while (NULL != pCSPInfo)
{
if (NULL != pCSPInfo->pwszProvName)
{
if (0 == wcscmp(pCSPInfo->pwszProvName,
pServer->pDefaultCSPInfo->pwszProvName) &&
pCSPInfo->dwProvType == pServer->pDefaultCSPInfo->dwProvType)
{
// change to default
pServer->pCSPInfo = pCSPInfo;
break;
}
}
pCSPInfo = pCSPInfo->next;
}
done:
hr = S_OK;
//error:
return hr;
}
//+---------------------------------------------------------------------------
// Description: set SHA as default hash alg. otherwise 1st one
//----------------------------------------------------------------------------
HRESULT
DetermineDefaultHash(CASERVERSETUPINFO *pServer)
{
CSP_HASH *pHashInfo = NULL;
HRESULT hr;
if ((NULL == pServer) || (NULL == pServer->pCSPInfo))
return E_POINTER;
// select 1st if no default match
pServer->pHashInfo = pServer->pCSPInfo->pHashList;
// search list
pHashInfo = pServer->pCSPInfo->pHashList;
while (NULL != pHashInfo)
{
if (pHashInfo->idAlg == pServer->pDefaultHashInfo->idAlg)
{
//change to default
pServer->pHashInfo = pHashInfo;
break;
}
pHashInfo = pHashInfo->next;
}
// Must validate the hash again when the selected hash changes
pServer->fValidatedHashAndKey = FALSE;
hr = S_OK;
//error:
return hr;
}
HRESULT
UpdateCADescription(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
int ids;
WCHAR *pwszDesc = NULL;
HRESULT hr;
switch (pComp->CA.pServer->CAType)
{
case ENUM_STANDALONE_ROOTCA:
ids = IDS_CATYPE_DES_STANDALONE_ROOTCA;
break;
case ENUM_STANDALONE_SUBCA:
ids = IDS_CATYPE_DES_STANDALONE_SUBCA;
break;
case ENUM_ENTERPRISE_ROOTCA:
ids = IDS_CATYPE_DES_ENTERPRISE_ROOTCA;
break;
case ENUM_ENTERPRISE_SUBCA:
ids = IDS_CATYPE_DES_ENTERPRISE_SUBCA;
break;
}
// load description from resource
hr = myLoadRCString(pComp->hInstance, ids, &pwszDesc);
_JumpIfError(hr, error, "myLoadRCString");
// change text
SetWindowText(GetDlgItem(hDlg, IDC_CATYPE_CA_DESCRIPTION), pwszDesc);
hr = S_OK;
error:
if (NULL != pwszDesc)
{
LocalFree(pwszDesc);
}
return hr;
}
HRESULT
InitCATypeWizControls(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
int idc;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
EnableWindow(GetDlgItem(hDlg, IDC_CATYPE_ENT_ROOT_CA), pServer->fUseDS);
EnableWindow(GetDlgItem(hDlg, IDC_CATYPE_ENT_SUB_CA), pServer->fUseDS);
ShowWindow(GetDlgItem(hDlg, IDC_CATYPE_DESCRIPTION_ENTERPRISE),
!pServer->fUseDS);
EnableWindow(GetDlgItem(hDlg, IDC_CATYPE_STAND_ROOT_CA), TRUE);
EnableWindow(GetDlgItem(hDlg, IDC_CATYPE_STAND_SUB_CA), TRUE);
if (pServer->fUseDS)
{
if (ENUM_ENTERPRISE_SUBCA == pServer->CAType)
{
idc = IDC_CATYPE_ENT_SUB_CA;
}
else
{
idc = IDC_CATYPE_ENT_ROOT_CA;
}
}
else
{
idc = IDC_CATYPE_STAND_ROOT_CA;
}
SendMessage(GetDlgItem(hDlg, idc), BM_CLICK, (WPARAM)0, (LPARAM)0);
hr= UpdateCADescription(hDlg, pComp);
_JumpIfError(hr, error, "UpdateCADescription");
hr = S_OK;
error:
return hr;
}
BOOL
IsRadioControlChecked(HWND hwnd)
{
BOOL checked = FALSE;
if (BST_CHECKED == SendMessage(hwnd, BM_GETCHECK, (WPARAM)0, (LPARAM)0))
{
checked = TRUE;
}
return checked;
}
HRESULT
HandleAdvanceChange(HWND hDlg, CASERVERSETUPINFO *pServer)
{
HRESULT hr;
if (!pServer->fAdvance)
{
// if not advance, clear all advance flags
pServer->fPreserveDB = FALSE;
ClearExistingCertToUse(pServer);
}
hr = S_OK;
//error:
return hr;
}
HRESULT
HandleCATypeChange(
IN HWND hDlg,
IN PER_COMPONENT_DATA *pComp,
IN ENUM_CATYPES eNewType)
{
HRESULT hr;
BOOL bCertOK;
CASERVERSETUPINFO * pServer=pComp->CA.pServer;
pServer->CAType = eNewType;
pServer->dwKeyLength = IsRootCA(pServer->CAType)?
CA_DEFAULT_KEY_LENGTH_ROOT:
CA_DEFAULT_KEY_LENGTH_SUB;
hr=UpdateCADescription(hDlg, pComp);
_JumpIfError(hr, error, "UpdateCADescription");
// make sure that if we are using an existing cert, we didn't make it invalid.
if (NULL!=pServer->pccExistingCert) {
hr=IsCertSelfSignedForCAType(pServer, pServer->pccExistingCert, &bCertOK);
_JumpIfError(hr, error, "UpdateCADescription");
if (FALSE==bCertOK) {
// can't use this cert with this CA type.
ClearExistingCertToUse(pServer);
}
}
hr = S_OK;
error:
return hr;
}
HRESULT
HandleCATypeWizActive(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
// first of all, get install status
hr = UpdateSubComponentInstallStatus(wszCERTSRVSECTION, wszSERVERSECTION, pComp);
_JumpIfError(hr, error, "UpdateSubComponentInstallStatus");
hr = UpdateSubComponentInstallStatus(wszCERTSRVSECTION, wszCLIENTSECTION, pComp);
_JumpIfError(hr, error, "UpdateSubComponentInstallStatus");
// Suppress this wizard page if
// we've already seen an error, or
// we are not installing the server.
if (!(IS_SERVER_INSTALL & pComp->dwInstallStatus) )
{
// disable page
CSILOGDWORD(IDS_CATYPE_TITLE, dwWIZDISABLE);
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, -1);
goto done;
}
done:
hr = S_OK;
error:
return hr;
}
//+------------------------------------------------------------------------
// Function: WizCATypePageDlgProc(. . . .)
//
// Synopsis: Dialog procedure for CA Type wiz-page
//-------------------------------------------------------------------------
INT_PTR
WizCATypePageDlgProc(
HWND hDlg,
UINT iMsg,
WPARAM wParam,
LPARAM lParam)
{
PER_COMPONENT_DATA *pComp = NULL;
switch (iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam;
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = InitCATypeWizControls(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_COMMAND:
switch (LOWORD(wParam))
{
case IDC_CATYPE_STAND_ROOT_CA:
if (IsRadioControlChecked((HWND)lParam))
{
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleCATypeChange(hDlg,
pComp, ENUM_STANDALONE_ROOTCA);
_ReturnIfWizError(pComp->hrContinue);
}
break;
case IDC_CATYPE_STAND_SUB_CA:
if (IsRadioControlChecked((HWND)lParam))
{
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleCATypeChange(hDlg,
pComp, ENUM_STANDALONE_SUBCA);
_ReturnIfWizError(pComp->hrContinue);
}
break;
case IDC_CATYPE_ENT_ROOT_CA:
if (IsRadioControlChecked((HWND)lParam))
{
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleCATypeChange(hDlg,
pComp, ENUM_ENTERPRISE_ROOTCA);
_ReturnIfWizError(pComp->hrContinue);
}
break;
case IDC_CATYPE_ENT_SUB_CA:
if (IsRadioControlChecked((HWND)lParam))
{
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleCATypeChange(hDlg,
pComp, ENUM_ENTERPRISE_SUBCA);
_ReturnIfWizError(pComp->hrContinue);
}
break;
case IDC_CATYPE_CHECK_ADVANCE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->CA.pServer->fAdvance = !pComp->CA.pServer->fAdvance;
pComp->hrContinue = HandleAdvanceChange(hDlg, pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
}
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_KILLACTIVE:
break;
case PSN_RESET:
break;
case PSN_QUERYCANCEL:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
return CertConfirmCancel(hDlg, pComp);
break;
case PSN_SETACTIVE:
CSILOGDWORD(IDS_CATYPE_TITLE, dwWIZACTIVE);
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_BACK|PSWIZB_NEXT);
pComp = _GetCompDataOrReturn(pComp, hDlg);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = HandleCATypeWizActive(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZBACK:
CSILOGDWORD(IDS_CATYPE_TITLE, dwWIZBACK);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->CA.pServer->LastWiz = ENUM_WIZ_CATYPE;
break;
case PSN_WIZNEXT:
CSILOGDWORD(IDS_CATYPE_TITLE, dwWIZNEXT);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->CA.pServer->LastWiz = ENUM_WIZ_CATYPE;
CSILOGDWORD(IDS_LOG_CATYPE, pComp->CA.pServer->CAType);
pComp->hrContinue = InitNameFields(pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
//+---------------------------------------------------------------------------
// Description: display existing keys from list
//----------------------------------------------------------------------------
HRESULT
ShowExistingKey(
IN HWND hDlg,
KEY_LIST *pKeyList)
{
HRESULT hr;
KEY_LIST *pKey = pKeyList;
HWND hKeyList = GetDlgItem(hDlg, IDC_ADVANCE_KEYLIST);
LRESULT nItem;
LRESULT lr;
WCHAR *pwszDeSanitize = NULL;
while (NULL != pKey)
{
if (NULL != pKey->pwszName)
{
if (NULL != pwszDeSanitize)
{
LocalFree(pwszDeSanitize);
pwszDeSanitize = NULL;
}
hr = myRevertSanitizeName(pKey->pwszName, &pwszDeSanitize);
_JumpIfError(hr, error, "myRevertSanitizeName");
nItem = (INT)SendMessage(
hKeyList,
LB_ADDSTRING,
(WPARAM) 0,
(LPARAM) pwszDeSanitize);
if (LB_ERR == nItem)
{
hr = myHLastError();
_JumpError(hr, error, "SendMessage");
}
lr = (INT)SendMessage(
hKeyList,
LB_SETITEMDATA,
(WPARAM) nItem,
(LPARAM) pKey->pwszName);
if (LB_ERR == lr)
{
hr = myHLastError();
_JumpError(hr, error, "SendMessage");
}
}
pKey = pKey->next;
}
if (NULL != pKeyList)
{
// choose the 1st one as default
lr = (INT)SendMessage(hKeyList, LB_SETCURSEL, (WPARAM) 0, (LPARAM) 0);
if (LB_ERR == lr)
{
hr = myHLastError();
_JumpError(hr, error, "SendMessage");
}
}
hr = S_OK;
error:
if (NULL != pwszDeSanitize)
{
LocalFree(pwszDeSanitize);
}
return hr;
}
//+---------------------------------------------------------------------------
// Description: hilight an item by matched data
//----------------------------------------------------------------------------
HRESULT
HilightItemInList(HWND hDlg, int id, VOID const *pData, BOOL fString)
{
HWND hListCtrl = GetDlgItem(hDlg, id);
LRESULT iItem;
LRESULT count;
VOID *pItemData;
HRESULT hr = NTE_NOT_FOUND;
// find item
if (fString)
{
iItem = (INT)SendMessage(
hListCtrl,
LB_FINDSTRING,
(WPARAM) 0,
(LPARAM) pData);
if (LB_ERR == iItem)
{
_JumpError(hr, error, "SendMessage");
}
hr = S_OK;
}
else
{
count = (INT)SendMessage(hListCtrl, LB_GETCOUNT, (WPARAM)0, (LPARAM)0);
for (iItem = 0; iItem < count; ++iItem)
{
pItemData = (VOID*)SendMessage(hListCtrl, LB_GETITEMDATA,
(WPARAM)iItem, (LPARAM)0);
if (pItemData == pData)
{
hr = S_OK;
break;
}
}
}
if (S_OK != hr)
{
_JumpError(hr, error, "not found");
}
// hilight it
SendMessage(hListCtrl, LB_SETCURSEL, (WPARAM)iItem, (LPARAM)0);
hr = S_OK;
error:
return hr;
}
HRESULT
ShowAllCSP(
HWND hDlg,
CSP_INFO *pCSPInfo)
{
HWND hCSPList = GetDlgItem(hDlg, IDC_ADVANCE_CSPLIST);
LRESULT nItem;
// list all of csps
while (pCSPInfo)
{
if (pCSPInfo->pwszProvName)
{
nItem = (INT)SendMessage(hCSPList, LB_ADDSTRING,
(WPARAM)0, (LPARAM)pCSPInfo->pwszProvName);
SendMessage(hCSPList, LB_SETITEMDATA,
(WPARAM)nItem, (LPARAM)pCSPInfo);
}
pCSPInfo = pCSPInfo->next;
}
return S_OK;
}
HRESULT
ShowAllHash(
HWND hDlg,
CSP_HASH *pHashInfo)
{
HWND hHashList = GetDlgItem(hDlg, IDC_ADVANCE_HASHLIST);
LRESULT nItem;
// remove hash of previous csp from list
while (SendMessage(hHashList, LB_GETCOUNT,
(WPARAM)0, (LPARAM)0))
{
SendMessage(hHashList, LB_DELETESTRING,
(WPARAM)0, (LPARAM)0);
}
// list all hash
while (NULL != pHashInfo)
{
if (NULL != pHashInfo->pwszName)
{
nItem = (INT)SendMessage(hHashList, LB_ADDSTRING,
(WPARAM)0, (LPARAM)pHashInfo->pwszName);
SendMessage(hHashList, LB_SETITEMDATA,
(WPARAM)nItem, (LPARAM)pHashInfo);
}
pHashInfo = pHashInfo->next;
}
return S_OK;
}
//--------------------------------------------------------------------
HRESULT
UpdateUseCertCheckbox(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
BOOL bUsingExistingCert;
if (NULL==pServer->pccExistingCert) {
bUsingExistingCert=FALSE;
} else {
bUsingExistingCert=TRUE;
}
// check "use cert" control
SendMessage(GetDlgItem(hDlg, IDC_ADVANCE_USECERTCHECK),
BM_SETCHECK,
(WPARAM)(bUsingExistingCert?BST_CHECKED:BST_UNCHECKED),
(LPARAM)0);
// enable the "View Cert" button if necessary
EnableWindow(GetDlgItem(hDlg, IDC_ADVANCE_VIEWCERT), bUsingExistingCert);
// we will match the hash alg used by the cert, if possible
hr=HilightItemInList(hDlg, IDC_ADVANCE_HASHLIST,
pServer->pHashInfo, FALSE);
_JumpIfError(hr, error, "HilightItemInList");
hr=S_OK;
error:
return hr;
}
HRESULT
FindCertificateByKeyWithWaitCursor(
IN CASERVERSETUPINFO *pServer,
OUT CERT_CONTEXT const **ppccCert)
{
HRESULT hr;
HCURSOR hPrevCur = SetCursor(LoadCursor(NULL, IDC_WAIT));
hr = FindCertificateByKey(pServer, ppccCert);
SetCursor(hPrevCur);
_JumpIfError(hr, error, "FindCertificateByKey");
error:
return(hr);
}
//--------------------------------------------------------------------
// handle the "Use existing Cert" checkbox
HRESULT
HandleUseCertCheckboxChange(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
CERT_CONTEXT const * pccCert;
if(pServer->pwszFullCADN)
{
LocalFree(pServer->pwszFullCADN);
pServer->pwszFullCADN = NULL;
}
// is the checkbox checked or unchecked?
if (BST_CHECKED==IsDlgButtonChecked(hDlg, IDC_ADVANCE_USECERTCHECK)) {
// checkbox was just checked, so we previously were not using an existing cert
CSASSERT(NULL==pServer->pccExistingCert);
// Find the existing cert for this key
hr = FindCertificateByKeyWithWaitCursor(pServer, &pccCert);
_JumpIfError(hr, error, "FindCertificateByKeyWithWaitCursor");
// use it
hr=SetExistingCertToUse(pServer, pccCert);
_JumpIfError(hr, error, "SetExistingCertToUse");
} else {
// checkbox was just unchecked, so we previously were using an existing cert.
CSASSERT(NULL!=pServer->pccExistingCert);
// stop using the cert
ClearExistingCertToUse(pServer);
}
hr = UpdateUseCertCheckbox(hDlg, pServer);
_JumpIfError(hr, error, "UpdateUseCertCheckbox");
error:
return hr;
}
//----------------------------------------------------------------------------
// Hilight the current key - don't use HilightItemInList because we
// must use string-compare on the data portion, and HilightItemInList does not
// support this.
HRESULT
HilightKeyInList(HWND hDlg, CASERVERSETUPINFO * pServer)
{
HWND hListCtrl=GetDlgItem(hDlg, IDC_ADVANCE_KEYLIST);
LRESULT nIndex;
LRESULT nTotNames;
WCHAR * pwszKeyContainerName;
HRESULT hr = NTE_NOT_FOUND;
nTotNames=(INT)SendMessage(hListCtrl, LB_GETCOUNT, (WPARAM)0, (LPARAM)0);
for (nIndex=0; nIndex<nTotNames; nIndex++) {
pwszKeyContainerName=(WCHAR *)SendMessage(hListCtrl, LB_GETITEMDATA, (WPARAM)nIndex, (LPARAM)0);
if (0==wcscmp(pwszKeyContainerName, pServer->pwszKeyContainerName)) {
SendMessage(hListCtrl, LB_SETCURSEL, (WPARAM)nIndex, (LPARAM)0);
hr = S_OK;
break;
}
}
if (S_OK != hr)
{
// can lead to dead wiz pages
CSILOG(
hr,
IDS_LOG_KEY_NOT_FOUND_IN_LIST,
pServer->pwszKeyContainerName,
NULL,
NULL);
_PrintErrorStr(hr, "not found", pServer->pwszKeyContainerName);
}
hr = S_OK;
//error:
return hr;
}
//--------------------------------------------------------------------
HRESULT
UpdateKeySelection(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
BOOL bAvailableExistingCert = FALSE;
CERT_CONTEXT const * pccCert;
// if we have an existing key, make sure it is the one hilighted
// in the list and check for coresponding certs.
if (NULL!=pServer->pwszKeyContainerName) {
// hilight key
hr = HilightKeyInList(hDlg, pServer);
_JumpIfError(hr, error, "HilightKeyInList");
if (NULL!=pServer->pccExistingCert) {
// we are using an existing cert, so it better exist!
bAvailableExistingCert = TRUE;
} else {
// see if there is an existing cert for this key
hr = FindCertificateByKeyWithWaitCursor(pServer, &pccCert);
if (S_OK==hr) {
CertFreeCertificateContext(pccCert);
bAvailableExistingCert = TRUE;
} else {
// only other return is 'not found'
CSASSERT(CRYPT_E_NOT_FOUND==hr);
}
}
} else {
// no key selected, can't have an existing cert
}
// enable/disable reuse cert...
EnableWindow(GetDlgItem(hDlg, IDC_ADVANCE_USECERTCHECK), bAvailableExistingCert);
hr = UpdateUseCertCheckbox(hDlg, pServer);
_JumpIfError(hr, error, "UpdateUseCertCheckbox");
error:
return hr;
}
//--------------------------------------------------------------------
HRESULT
UpdateUseKeyCheckbox(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
BOOL bReuseKey;
if (NULL==pServer->pwszKeyContainerName) {
// we are creating a new key
bReuseKey=FALSE;
} else {
// we are using an existing key
bReuseKey=TRUE;
}
// check/uncheck the checkbox depending upon whether we are reusing a key
SendDlgItemMessage(hDlg,
IDC_ADVANCE_USEKEYCHECK,
BM_SETCHECK,
(WPARAM)(bReuseKey?BST_CHECKED:BST_UNCHECKED),
(LPARAM)0);
// enable the key list if we are reusing a key
EnableWindow(GetDlgItem(hDlg, IDC_ADVANCE_KEYLIST), bReuseKey);
// disable the key length box if we are reusing a key
EnableWindow(GetDlgItem(hDlg, IDC_ADVANCE_KEY_LENGTH), !bReuseKey);
hr = UpdateKeySelection(hDlg, pServer);
_JumpIfError(hr, error, "UpdateKeySelection");
error:
return hr;
}
//+---------------------------------------------------------------------------
// Description: update hash alg. list if csp selection changes
//----------------------------------------------------------------------------
HRESULT
UpdateHashList(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
// load new hash list
hr = ShowAllHash(hDlg, pServer->pCSPInfo->pHashList);
_JumpIfError(hr, error, "ShowAllHash");
hr = HilightItemInList(hDlg, IDC_ADVANCE_HASHLIST,
pServer->pHashInfo, FALSE);
_JumpIfError(hr, error, "HilightItemInList");
hr = S_OK;
error:
return hr;
}
//+---------------------------------------------------------------------------
// Description: update key list if csp selection changes
//----------------------------------------------------------------------------
HRESULT
UpdateKeyList(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
HWND hKeyList;
CSP_HASH *pHashInfo = NULL;
int nItem;
HCURSOR hPrevCur;
// remove keys of previous csp from list
hKeyList = GetDlgItem(hDlg, IDC_ADVANCE_KEYLIST);
while (SendMessage(hKeyList, LB_GETCOUNT, (WPARAM) 0, (LPARAM) 0))
{
SendMessage(hKeyList, LB_DELETESTRING, (WPARAM) 0, (LPARAM) 0);
}
// update key list with new CSP
if (NULL != pServer->pKeyList)
{
csiFreeKeyList(pServer->pKeyList);
}
hPrevCur = SetCursor(LoadCursor(NULL, IDC_WAIT));
hr = csiGetKeyList(
pServer->pCSPInfo->dwProvType,
pServer->pCSPInfo->pwszProvName,
pServer->pCSPInfo->fMachineKeyset,
FALSE, // fSilent
&pServer->pKeyList);
SetCursor(hPrevCur);
if (S_OK != hr)
{
_PrintError(hr, "csiGetKeyList");
// don't fail setup if only no key update
//goto done;
}
// show keys
if (NULL != pServer->pKeyList)
{
hr = ShowExistingKey(hDlg, pServer->pKeyList);
_JumpIfError(hr, error, "ShowExistingKey");
}
if (NULL == pServer->pKeyList) {
// no existing key for the csp, so disable "use existing key" checkbox
EnableWindow(GetDlgItem(hDlg, IDC_ADVANCE_USEKEYCHECK), FALSE);
CSASSERT(NULL==pServer->pwszKeyContainerName);
} else {
EnableWindow(GetDlgItem(hDlg, IDC_ADVANCE_USEKEYCHECK), TRUE);
}
hr = UpdateUseKeyCheckbox(hDlg, pServer);
_JumpIfError(hr, error, "UpdateUseKeyCheckbox");
//done:
hr = S_OK;
error:
return(hr);
}
DWORD g_adwKeyLengths[] =
{
512,
1024,
2048,
4096,
};
DWORD g_adwKeyLengthsSmall[] =
{
128,
256,
512,
1024,
};
HRESULT
AddPredefinedKeyLength
(
HWND hwnd,
DWORD dwKeyLength)
{
HRESULT hr;
WCHAR wszKeyLength[MAX_KEYLENGTHDIGIT + 1];
WCHAR const *pwszKeyLength;
LRESULT nIndex;
CSASSERT(0 != dwKeyLength);
wsprintf(wszKeyLength, L"%u", dwKeyLength);
pwszKeyLength = wszKeyLength;
nIndex = (INT)SendMessage(hwnd, CB_ADDSTRING, (WPARAM)0, (LPARAM)pwszKeyLength);
if (CB_ERR == nIndex)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "SendMessage(CB_ADDSTRING)");
}
SendMessage(hwnd, CB_SETITEMDATA, (WPARAM)nIndex, (LPARAM)dwKeyLength);
hr = S_OK;
error:
return hr;
}
HRESULT
ShowAllKeyLength(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
HWND hwndCtrl = GetDlgItem(hDlg, IDC_ADVANCE_KEY_LENGTH);
WCHAR wszKeyLength[MAX_KEYLENGTHDIGIT + 1];
DWORD *pdw;
DWORD *pdwEnd;
// remove existing key length list
while (SendMessage(hwndCtrl, CB_GETCOUNT, (WPARAM) 0, (LPARAM) 0))
{
SendMessage(hwndCtrl, CB_DELETESTRING, (WPARAM) 0, (LPARAM) 0);
}
CSASSERT(0 != pServer->dwKeyLength);
if(pServer->dwKeyLength > pServer->dwKeyLenMax)
{
pServer->dwKeyLength=pServer->dwKeyLenMax;
}
wsprintf(wszKeyLength, L"%u", pServer->dwKeyLength);
SetWindowText(hwndCtrl, wszKeyLength);
pdw = g_adwKeyLengths;
pdwEnd = &g_adwKeyLengths[ARRAYSIZE(g_adwKeyLengths)];
if (C_CSPHASNOKEYMINMAX != pServer->dwKeyLenMin &&
C_CSPHASNOKEYMINMAX != pServer->dwKeyLenMax &&
g_adwKeyLengthsSmall[ARRAYSIZE(g_adwKeyLengthsSmall) - 1] >=
pServer->dwKeyLenMax)
{
pdw = g_adwKeyLengthsSmall;
pdwEnd = &g_adwKeyLengthsSmall[ARRAYSIZE(g_adwKeyLengthsSmall)];
}
// show new key length list
for ( ; pdw < pdwEnd; pdw++)
{
if (0 == *pdw ||
((C_CSPHASNOKEYMINMAX != pServer->dwKeyLenMin &&
*pdw >= pServer->dwKeyLenMin) &&
(C_CSPHASNOKEYMINMAX != pServer->dwKeyLenMax &&
*pdw <= pServer->dwKeyLenMax)) )
{
hr = AddPredefinedKeyLength(hwndCtrl, *pdw);
_JumpIfError(hr, error, "AddPredefinedKeyLength");
}
}
hr = S_OK;
error:
return hr;
}
HRESULT
UpdateKeyLengthMinMax(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
HCRYPTPROV hProv = NULL;
CSP_INFO *pCSPInfo = pServer->pCSPInfo;
PROV_ENUMALGS_EX paramData;
DWORD cbData;
DWORD dwFlags;
// default that csp doesn't support PP_ENUMALGS_EX
pServer->dwKeyLenMin = C_CSPHASNOKEYMINMAX;
pServer->dwKeyLenMax = C_CSPHASNOKEYMINMAX;
// determine the min and max key length for selected csp
if (!myCertSrvCryptAcquireContext(
&hProv,
NULL,
pCSPInfo->pwszProvName,
pCSPInfo->dwProvType,
CRYPT_VERIFYCONTEXT,
FALSE))
{
hr = myHLastError();
if (NULL != hProv)
{
hProv = NULL;
_PrintError(hr, "CSP returns a non-null handle");
}
_JumpErrorStr(hr, error, "myCertSrvCryptAcquireContext", pCSPInfo->pwszProvName);
}
dwFlags = CRYPT_FIRST;
while (TRUE)
{
cbData = sizeof(paramData);
if (!CryptGetProvParam(
hProv,
PP_ENUMALGS_EX,
(BYTE *) &paramData,
&cbData,
dwFlags))
{
hr = myHLastError();
if (HRESULT_FROM_WIN32(ERROR_NO_MORE_ITEMS) == hr)
{
// out of for loop
break;
}
_JumpError(hr, error, "CryptGetProvParam");
}
if (ALG_CLASS_SIGNATURE == GET_ALG_CLASS(paramData.aiAlgid))
{
pServer->dwKeyLenMin = paramData.dwMinLen;
pServer->dwKeyLenMax = paramData.dwMaxLen;
break;
}
dwFlags = 0;
}
error:
hr = ShowAllKeyLength(hDlg, pServer);
_PrintIfError(hr, "ShowAllKeyLength");
if (NULL != hProv)
{
CryptReleaseContext(hProv, 0);
}
return(S_OK);
}
HRESULT
InitializeKeyLengthControl(HWND hDlg)
{
HWND hwndCtrl = GetDlgItem(hDlg, IDC_ADVANCE_KEY_LENGTH);
// set digit length
SendMessage(
hwndCtrl,
CB_LIMITTEXT,
(WPARAM) MAX_KEYLENGTHDIGIT,
(LPARAM) 0);
return S_OK;
}
//--------------------------------------------------------------------
HRESULT
HandleKeySelectionChange(
HWND hDlg,
CASERVERSETUPINFO *pServer,
BOOL fUpdate)
{
HRESULT hr;
HWND hKeyList = GetDlgItem(hDlg, IDC_ADVANCE_KEYLIST);
WCHAR * pwszKeyContainerName;
CERT_CONTEXT const * pccCert;
LRESULT nItem = (INT)SendMessage(
hKeyList,
LB_GETCURSEL,
(WPARAM) 0,
(LPARAM) 0);
CSASSERT(LB_ERR!=nItem);
pwszKeyContainerName = (WCHAR *) SendMessage(
hKeyList,
LB_GETITEMDATA,
(WPARAM) nItem,
(LPARAM) 0);
CSASSERT(NULL!=pwszKeyContainerName);
// Only change is this is a different selection
if (NULL==pServer->pwszKeyContainerName ||
0!=wcscmp(pwszKeyContainerName, pServer->pwszKeyContainerName)) {
// Set the container name to match what the user picked.
BOOL fKeyListChange=pServer->fDeletableNewKey;
hr = SetKeyContainerName(pServer, pwszKeyContainerName);
_JumpIfError(hr, error, "SetKeyContainerName");
// see if there is an existing cert for this key
hr = FindCertificateByKeyWithWaitCursor(pServer, &pccCert);
if (S_OK==hr) {
// Yes there is. By default, use it.
hr=SetExistingCertToUse(pServer, pccCert);
_JumpIfError(hr, error, "SetExistingCertToUse");
} else {
// only other return is 'not found'
CSASSERT(CRYPT_E_NOT_FOUND==hr);
}
// check to see if our caller wants us to update.
// our caller may want to do the update himself.
if (fUpdate) {
// perform the minimum necessary update
if (fKeyListChange) {
hr = UpdateKeyList(hDlg, pServer);
_JumpIfError(hr, error, "UpdateKeyList");
} else {
hr = UpdateKeySelection(hDlg, pServer);
_JumpIfError(hr, error, "UpdateKeySelection");
}
}
}
hr=S_OK;
error:
return hr;
}
//--------------------------------------------------------------------
// handle the "Use existing Key" checkbox
HRESULT
HandleUseKeyCheckboxChange(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
static bool fNT4CertCopiedAlready = false;
if(pServer->pwszFullCADN)
{
LocalFree(pServer->pwszFullCADN);
pServer->pwszFullCADN = NULL;
}
if(pServer->pwszCACommonName)
{
LocalFree(pServer->pwszCACommonName);
pServer->pwszCACommonName = NULL;
}
if(pServer->pwszDNSuffix)
{
LocalFree(pServer->pwszDNSuffix);
pServer->pwszDNSuffix = NULL;
}
// is the checkbox checked or unchecked?
if (BST_CHECKED==IsDlgButtonChecked(hDlg, IDC_ADVANCE_USEKEYCHECK)) {
// checkbox was just checked, so we previously did not have a chosen key.
CSASSERT(NULL==pServer->pwszKeyContainerName);
hr = HandleKeySelectionChange(hDlg, pServer, FALSE); // don't update, because we need to update too.
_JumpIfError(hr, error, "HandleKeySelectionChange");
hr = UpdateUseKeyCheckbox(hDlg, pServer);
_JumpIfError(hr, error, "UpdateUseKeyCheckbox");
} else {
// checkbox was just unchecked, so we previously had a chosen key..
CSASSERT(NULL!=pServer->pwszKeyContainerName);
BOOL fKeyListChange=pServer->fDeletableNewKey;
ClearKeyContainerName(pServer);
// perform the minimum necessary update
if (fKeyListChange) {
hr = UpdateKeyList(hDlg, pServer);
_JumpIfError(hr, error, "UpdateKeyList");
} else {
hr = UpdateUseKeyCheckbox(hDlg, pServer);
_JumpIfError(hr, error, "UpdateUseKeyCheckbox");
}
hr = InitNameFields(pServer);
_JumpIfError(hr, error, "InitNameFields");
}
error:
return hr;
}
//--------------------------------------------------------------------
HRESULT
UpdateCSPSelection(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
bool fInteractiveOff;
if (NULL == pServer->pCSPInfo)
{
hr = E_POINTER;
_JumpError(hr, error, "NULL pCSPInfo");
}
// hilight current CSP
hr = HilightItemInList(hDlg,
IDC_ADVANCE_CSPLIST,
pServer->pCSPInfo->pwszProvName,
TRUE);
_JumpIfError(hr, error, "HilightItemInList");
hr = UpdateHashList(hDlg, pServer);
_JumpIfError(hr, error, "UpdateHashList");
hr = UpdateKeyLengthMinMax(hDlg, pServer);
_JumpIfError(hr, error, "UpdateKeyLengthMinMax");
hr = UpdateKeyList(hDlg, pServer);
_JumpIfError(hr, error, "UpdateKeyList");
// Update "interact with desktop" flag. For default CSP
// we turn it off, otherwise turn it on.
CSASSERT(pServer->pCSPInfo &&
pServer->pDefaultCSPInfo&&
pServer->pCSPInfo->pwszProvName &&
pServer->pDefaultCSPInfo->pwszProvName);
fInteractiveOff =
(0 == wcscmp(pServer->pCSPInfo->pwszProvName,
pServer->pDefaultCSPInfo->pwszProvName) &&
(pServer->pCSPInfo->dwProvType == pServer->pDefaultCSPInfo->dwProvType));
SendMessage(
GetDlgItem(hDlg, IDC_ADVANCE_INTERACTIVECHECK),
BM_SETCHECK,
(WPARAM)(fInteractiveOff?BST_UNCHECKED:BST_CHECKED),
(LPARAM)0);
hr = S_OK;
error:
return hr;
}
//--------------------------------------------------------------------
HRESULT
HandleCSPSelectionChange(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr = S_OK;
HWND hCSPList;
LRESULT nItem;
CSP_INFO * pCSPInfo;
// get current csp
hCSPList = GetDlgItem(hDlg, IDC_ADVANCE_CSPLIST);
nItem = (INT)SendMessage(hCSPList, LB_GETCURSEL,
(WPARAM)0, (LPARAM)0);
pCSPInfo = (CSP_INFO *)SendMessage(hCSPList,
LB_GETITEMDATA, (WPARAM)nItem, (LPARAM)0);
// only change if this is a different selection
if (pCSPInfo->dwProvType!=pServer->pCSPInfo->dwProvType ||
0!=wcscmp(pCSPInfo->pwszProvName, pServer->pCSPInfo->pwszProvName)) {
// Must create a new key if the CSP changes
ClearKeyContainerName(pServer);
pServer->pCSPInfo=pCSPInfo;
hr = DetermineDefaultHash(pServer);
_JumpIfError(hr, error, "DetermineDefaultHash");
hr = UpdateCSPSelection(hDlg, pServer);
_JumpIfError(hr, error, "UpdateCSPSelection");
}
error:
return hr;
}
// Update cascade:
//
// UpdateCSPSelection
// |-UpdateHashList
// |-UpdateKeyLengthMinMax
// \-UpdateKeyList
// \-UpdateUseKeyCheckbox
// \-UpdateKeySelection
// \-UpdateUseCertCheckbox
HRESULT
InitAdvanceWizPageControls(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
EnableWindow(GetDlgItem(hDlg, IDC_ADVANCE_INTERACTIVECHECK), TRUE);
hr = S_OK;
//error:
return hr;
}
HRESULT
HandleHashSelectionChange(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
HWND hHashList = GetDlgItem(hDlg, IDC_ADVANCE_HASHLIST);
LRESULT nItem = (INT)SendMessage(
hHashList,
LB_GETCURSEL,
(WPARAM) 0,
(LPARAM) 0);
pServer->pHashInfo = (CSP_HASH*)SendMessage(
hHashList,
LB_GETITEMDATA,
(WPARAM) nItem,
(LPARAM) 0);
// Must validate the hash again when the selected hash changes
pServer->fValidatedHashAndKey = FALSE;
hr = S_OK;
//error:
return hr;
}
HRESULT
HandleKeyLengthSelectionChange(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
HWND hwndCtrl = GetDlgItem(hDlg, IDC_ADVANCE_KEY_LENGTH);
LRESULT nItem = (INT)SendMessage(hwndCtrl, CB_GETCURSEL,
(WPARAM)0, (LPARAM)0);
pServer->dwKeyLength = (DWORD)SendMessage(hwndCtrl,
CB_GETITEMDATA,
(WPARAM)nItem, (LPARAM)0);
// If key length chenges, we must not have created a key yet.
CSASSERT(NULL==pServer->pwszKeyContainerName);
hr = S_OK;
//error:
return hr;
}
// remove any non-numeric chars except default string
HRESULT
HandleKeyLengthEditChange(
HWND hwndComboBox)
{
HRESULT hr;
WCHAR wszKeyLength[MAX_KEYLENGTHEDIT];
int index = 0; // index for new #
int posi = 0; // current position
wszKeyLength[0] = L'\0'; // PREFIX says initialize
GetWindowText(hwndComboBox, wszKeyLength, ARRAYSIZE(wszKeyLength));
// remove non-numeric chars
while (L'\0' != wszKeyLength[posi])
{
if (iswdigit(wszKeyLength[posi]))
{
// take digit
wszKeyLength[index] = wszKeyLength[posi];
++index;
}
++posi;
}
if (index != posi)
{
// null terminator
wszKeyLength[index] = L'\0';
// update
SetWindowText(hwndComboBox, wszKeyLength);
// point to end
SendMessage(hwndComboBox, CB_SETEDITSEL, (WPARAM)0,
MAKELPARAM((index), (index)) );
}
hr = S_OK;
//error:
return hr;
}
HRESULT
HandleImportPFXButton(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
hr = ImportPFXAndUpdateCSPInfo(hDlg, pComp);
_PrintIfError(hr, "ImportPFXAndUpdateCSPInfo");
// ignore error and force update anyway.
hr = UpdateCSPSelection(hDlg, pServer);
_JumpIfError(hr, error, "UpdateCSPSelection");
hr = S_OK;
error:
return hr;
}
HRESULT
HandleAdvanceWizNext(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
WCHAR wszKeyLength[MAX_KEYLENGTHEDIT];
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
HWND hwndCtrl = GetDlgItem(hDlg, IDC_ADVANCE_KEY_LENGTH);
BOOL fDontNext = FALSE;
WCHAR wszKeyRange[2*MAX_KEYLENGTHDIGIT + 4]; //"(xxxx,xxxx)" format
WCHAR *pwszKeyRange = NULL; //don't free just a pointer
int dwKeyLength;
int idMsg;
BOOL fValidDigitString;
if (NULL == pServer->pwszKeyContainerName)
{
GetWindowText(hwndCtrl, wszKeyLength, ARRAYSIZE(wszKeyLength));
dwKeyLength = myWtoI(wszKeyLength, &fValidDigitString);
if (0 > dwKeyLength)
{
idMsg = IDS_ADVANCE_NEGATIVEKEYLENGTH;
fDontNext = TRUE;
}
else if (!fValidDigitString)
{
idMsg = IDS_ADVANCE_INVALIDKEYLENGTH;
fDontNext = TRUE;
}
else if ( (C_CSPHASNOKEYMINMAX != pServer->dwKeyLenMin &&
(DWORD)dwKeyLength < pServer->dwKeyLenMin) ||
(C_CSPHASNOKEYMINMAX != pServer->dwKeyLenMax &&
(DWORD)dwKeyLength > pServer->dwKeyLenMax) )
{
swprintf(wszKeyRange, L"(%ld, %ld)",
pServer->dwKeyLenMin, pServer->dwKeyLenMax);
pwszKeyRange = wszKeyRange;
idMsg = IDS_ADVANCE_KEYLENGTHOUTOFRANGE;
fDontNext = TRUE;
}
if (fDontNext)
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
idMsg,
0,
pwszKeyRange);
SetEditFocusAndSelect(hwndCtrl, 0, -1);
goto done;
}
// take the length
pServer->dwKeyLength = dwKeyLength;
}
else
{
// use existing key
if (NULL==pServer->pccExistingCert)
{
// If reusing a key but not a cert, make the common name match the key name
if (NULL != pServer->pwszCACommonName)
{
// free old
LocalFree(pServer->pwszCACommonName);
pServer->pwszCACommonName = NULL;
}
pServer->pwszCACommonName = (WCHAR*) LocalAlloc(LPTR,
(wcslen(pServer->pwszDesanitizedKeyContainerName) + 1) * sizeof(WCHAR));
_JumpIfOutOfMemory(hr, error, pServer->pwszCACommonName);
wcscpy(pServer->pwszCACommonName, pServer->pwszDesanitizedKeyContainerName);
hr = InitNameFields(pServer);
_JumpIfError(hr, error, "InitNameFields");
} else {
// If reusing a cert, make all the ID fields match the cert
// use idinfo from signing cert
hr = DetermineExistingCAIdInfo(pServer, NULL);
if (S_OK != hr)
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_ERR_ANALYSIS_CA,
hr,
NULL);
_PrintError(hr, "DetermineExistingCAIdInfo");
fDontNext = TRUE;
goto done;
}
}
}
// get "interactive service" check box state
pServer->fInteractiveService =
(BST_CHECKED ==
SendMessage(GetDlgItem(hDlg, IDC_ADVANCE_INTERACTIVECHECK),
BM_GETCHECK, (WPARAM)0, (LPARAM)0))?
TRUE:FALSE;
// update hash oid
if (NULL != pServer->pszAlgId)
{
// free old
LocalFree(pServer->pszAlgId);
}
hr = myGetSigningOID(
NULL, // hProv
pServer->pCSPInfo->pwszProvName,
pServer->pCSPInfo->dwProvType,
pServer->pHashInfo->idAlg,
&(pServer->pszAlgId));
if (S_OK != hr)
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_ERR_UNSUPPORTEDHASH,
hr,
NULL);
fDontNext = TRUE;
goto done;
}
done:
if (fDontNext)
{
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, TRUE); // forbid
}
else
{
pServer->LastWiz = ENUM_WIZ_ADVANCE;
}
hr = S_OK;
error:
return hr;
}
HRESULT
HandleAdvanceWizActive(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
// Suppress this wizard page if
// we've already seen an error, or
// the advanced option was not selected, or
// we are not installing the server.
if (!pServer->fAdvance ||
!(IS_SERVER_INSTALL & pComp->dwInstallStatus) )
{
// disable page
CSILOGDWORD(IDS_ADVANCE_TITLE, dwWIZDISABLE);
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, -1);
goto done;
}
if (NULL == pServer->pCSPInfoList)
{
// construct CSP info list
HCURSOR hPrevCur = SetCursor(LoadCursor(NULL, IDC_WAIT));
hr = GetCSPInfoList(&pServer->pCSPInfoList);
SetCursor(hPrevCur);
_JumpIfError(hr, error, "GetCSPInfoList");
// show all csps
hr = ShowAllCSP(hDlg, pServer->pCSPInfoList);
_JumpIfError(hr, error, "ShowAllCSP");
// determine default csp
hr = DetermineDefaultCSP(pServer);
_JumpIfError(hr, error, "DetermineDefaultCSP");
hr = DetermineDefaultHash(pServer);
_JumpIfError(hr, error, "DetermineDefaultHash");
hr = InitializeKeyLengthControl(hDlg);
_JumpIfError(hr, error, "InitializeKeyLengthControl");
}
hr = UpdateCSPSelection(hDlg, pServer);
_JumpIfError(hr, error, "UpdateCSPSelection");
done:
hr = S_OK;
error:
return hr;
}
HRESULT
HandleViewCertButton(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CRYPTUI_VIEWCERTIFICATE_STRUCTW viewCert;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
CSASSERT(NULL!=pServer->pwszKeyContainerName &&
NULL!=pServer->pccExistingCert);
ZeroMemory(&viewCert, sizeof(CRYPTUI_VIEWCERTIFICATE_STRUCTW));
viewCert.hwndParent = hDlg;
viewCert.dwSize = sizeof(viewCert);
viewCert.pCertContext = CertDuplicateCertificateContext(pServer->pccExistingCert);
if (NULL == viewCert.pCertContext)
{
hr = myHLastError();
_JumpError(hr, error, "CertDuplicateCertificateContext");
}
// viewCert.rghStores = &pServer->hMyStore;
// viewCert.cStores = 1;
viewCert.dwFlags = CRYPTUI_DONT_OPEN_STORES;
if (!CryptUIDlgViewCertificateW(&viewCert, NULL))
{
hr = myHLastError();
_PrintError(hr, "CryptUIDlgViewCertificate");
}
hr = S_OK;
error:
if (NULL != viewCert.pCertContext)
{
CertFreeCertificateContext(viewCert.pCertContext);
}
return hr;
}
//+------------------------------------------------------------------------
//
// Function: WizAdvancedPageDlgProc(. . . .)
//
// Synopsis: Dialog procedure for advanced configuration OCM wizard.
//
// Arguments: [hDlg]
// [iMsg]
// [wParam]
// [lParam] ... the usual.
//
// Returns: BOOL dlg proc result.
//
//-------------------------------------------------------------------------
INT_PTR
WizAdvancedPageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
PER_COMPONENT_DATA *pComp = NULL;
switch (iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(LONG)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)((PROPSHEETPAGE*)lParam)->lParam;
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = InitAdvanceWizPageControls(hDlg, pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_COMMAND:
switch (LOWORD(wParam))
{
case IDC_ADVANCE_CSPLIST:
switch (HIWORD(wParam))
{
case LBN_SELCHANGE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleCSPSelectionChange(hDlg,
pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
break;
}
break;
case IDC_ADVANCE_HASHLIST:
switch (HIWORD(wParam))
{
case LBN_SELCHANGE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleHashSelectionChange(hDlg,
pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
}
break;
case IDC_ADVANCE_KEYLIST:
switch (HIWORD(wParam))
{
case LBN_SELCHANGE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleKeySelectionChange(hDlg,
pComp->CA.pServer, TRUE);
_ReturnIfWizError(pComp->hrContinue);
break;
}
break;
case IDC_ADVANCE_USEKEYCHECK:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleUseKeyCheckboxChange(hDlg,
pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_ADVANCE_USECERTCHECK:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleUseCertCheckboxChange(hDlg,
pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_ADVANCE_KEY_LENGTH:
switch (HIWORD(wParam))
{
case CBN_SELCHANGE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleKeyLengthSelectionChange(hDlg,
pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
case CBN_EDITCHANGE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleKeyLengthEditChange(
(HWND)lParam);
_ReturnIfWizError(pComp->hrContinue);
break;
}
break;
case IDC_ADVANCE_IMPORT:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleImportPFXButton(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_ADVANCE_VIEWCERT:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleViewCertButton(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
case WM_NOTIFY:
switch (((NMHDR FAR*) lParam)->code)
{
case PSN_KILLACTIVE:
break;
case PSN_RESET:
break;
case PSN_QUERYCANCEL:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
return CertConfirmCancel(hDlg, pComp);
break;
case PSN_SETACTIVE:
CSILOGDWORD(IDS_ADVANCE_TITLE, dwWIZACTIVE);
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_BACK|PSWIZB_NEXT);
pComp = _GetCompDataOrReturn(pComp, hDlg);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = HandleAdvanceWizActive(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZBACK:
CSILOGDWORD(IDS_ADVANCE_TITLE, dwWIZBACK);
break;
case PSN_WIZNEXT:
DWORD fReuseCert;
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
fReuseCert = NULL != pComp->CA.pServer->pccExistingCert;
CSILOG(
S_OK,
IDS_LOG_KEYNAME,
pComp->CA.pServer->pwszKeyContainerName,
pComp->CA.pServer->pwszDesanitizedKeyContainerName,
&fReuseCert);
CSILOGDWORD(IDS_ADVANCE_TITLE, dwWIZNEXT);
pComp->hrContinue = HandleAdvanceWizNext(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
HRESULT
EnableSharedFolderControls(HWND hDlg, BOOL fUseSharedFolder)
{
EnableWindow(GetDlgItem(hDlg, IDC_STORE_EDIT_SHAREDFOLDER), fUseSharedFolder);
EnableWindow(GetDlgItem(hDlg, IDC_STORE_SHAREDBROWSE), fUseSharedFolder);
if (fUseSharedFolder)
{
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_STORE_EDIT_SHAREDFOLDER), 0, -1);
}
return S_OK;
}
HRESULT
StorePageValidation(
HWND hDlg,
PER_COMPONENT_DATA *pComp,
BOOL *pfDontNext)
{
HRESULT hr;
UINT uiFocus = 0;
WCHAR *pwszDefaultDBDir = NULL;
WCHAR *pwszDefaultSF = NULL;
LPWSTR pwszPrompt = NULL;
LPWSTR pwszComputerName = NULL;
BOOL fExistSF = TRUE;
BOOL fExistDB = TRUE;
BOOL fExistLog = TRUE;
BOOL fDefaultDir;
BOOL fIsUNC, fIsSharedFolderUNC;
WCHAR wszNotExistingDir[3 * MAX_PATH];
BOOL fUseSharedFolder;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
*pfDontNext = FALSE;
// get shared folder check state
if (pComp->fUnattended)
{
CSASSERT(NULL != pServer->pwszSharedFolder);
fUseSharedFolder = TRUE; // unattended always use shared folder
}
else
{
fUseSharedFolder = (BST_CHECKED == SendMessage(
GetDlgItem(hDlg, IDC_STORE_USE_SHAREDFOLDER),
BM_GETCHECK, 0, 0));
}
if (NULL != pServer->pwszSharedFolder)
{
fDefaultDir = TRUE;
hr = GetDefaultSharedFolder(&pwszDefaultSF);
_JumpIfError(hr, error, "GetDefaultSharedFolder");
// make sure case insensitive
if (0 != lstrcmpiW(pwszDefaultSF, pServer->pwszSharedFolder))
{
fDefaultDir = FALSE;
}
if (!ValidateAndCreateDirField(
pComp->hInstance,
pComp->fUnattended,
hDlg,
pServer->pwszSharedFolder,
fDefaultDir,
IDS_WRN_STORELOC_SHAREDFOLDER_FULLPATH,
&fExistSF,
&fIsSharedFolderUNC))
{
uiFocus = IDC_STORE_EDIT_SHAREDFOLDER;
*pfDontNext = TRUE;
goto done;
}
}
else if (fUseSharedFolder)
{
// the case to enforce shared folder but edit field is empty
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_STORELOC_SHAREDFOLDER_FULLPATH,
0,
L"");
uiFocus = IDC_STORE_EDIT_SHAREDFOLDER;
*pfDontNext = TRUE;
goto done;
}
fDefaultDir = TRUE;
hr = GetDefaultDBDirectory(pComp, &pwszDefaultDBDir);
_JumpIfError(hr, error, "GetDefaultDBDirectory");
// make sure case insensitive
if (0 != lstrcmpiW(pwszDefaultDBDir, pServer->pwszDBDirectory))
{
fDefaultDir = FALSE;
}
if (!ValidateAndCreateDirField(
pComp->hInstance,
pComp->fUnattended,
hDlg,
pServer->pwszDBDirectory,
fDefaultDir,
IDS_WRN_STORELOC_DB_FULLPATH,
&fExistDB,
&fIsUNC))
{
uiFocus = IDC_STORE_EDIT_DB;
*pfDontNext = TRUE;
goto done;
}
fDefaultDir = TRUE;
// remember default log dir is the same as db
if (0 != lstrcmpiW(pwszDefaultDBDir, pServer->pwszLogDirectory))
{
fDefaultDir = FALSE;
}
if (!ValidateAndCreateDirField(
pComp->hInstance,
pComp->fUnattended,
hDlg,
pServer->pwszLogDirectory,
fDefaultDir,
IDS_WRN_STORELOC_LOG_FULLPATH,
&fExistLog,
&fIsUNC))
{
uiFocus = IDC_STORE_EDIT_LOG;
*pfDontNext = TRUE;
goto done;
}
wszNotExistingDir[0] = '\0'; // empty string
if (!fExistSF)
{
wcscat(wszNotExistingDir, pServer->pwszSharedFolder);
}
if (!fExistDB)
{
if ('\0' != wszNotExistingDir[0])
{
wcscat(wszNotExistingDir, L"\n");
}
wcscat(wszNotExistingDir, pServer->pwszDBDirectory);
}
if (!fExistLog)
{
if ('\0' != wszNotExistingDir[0])
{
wcscat(wszNotExistingDir, L"\n");
}
wcscat(wszNotExistingDir, pServer->pwszLogDirectory);
}
if ('\0' != wszNotExistingDir[0])
{
// skip confirm in unattended mode
if (!pComp->fUnattended)
{
// confirm all here
if (IDYES != CertMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_ASK_CREATE_DIRECTORY,
0,
MB_YESNO |
MB_ICONWARNING |
CMB_NOERRFROMSYS,
wszNotExistingDir) )
{
if (!fExistSF)
{
uiFocus = IDC_STORE_EDIT_SHAREDFOLDER;
}
else if (!fExistDB)
{
uiFocus = IDC_STORE_EDIT_DB;
}
else if (!fExistLog)
{
uiFocus = IDC_STORE_EDIT_LOG;
}
*pfDontNext = TRUE;
goto done;
}
}
if (!fExistSF)
{
hr = myCreateNestedDirectories(pServer->pwszSharedFolder);
if (S_OK != hr)
{
CertWarningMessageBox(pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_ERR_CREATE_DIR,
hr,
pServer->pwszSharedFolder);
uiFocus = IDC_STORE_EDIT_SHAREDFOLDER;
*pfDontNext = TRUE;
goto done;
}
}
if (!fExistDB)
{
hr = myCreateNestedDirectories(pServer->pwszDBDirectory);
if (S_OK != hr)
{
CertWarningMessageBox(pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_ERR_CREATE_DIR,
hr,
pServer->pwszDBDirectory);
uiFocus = IDC_STORE_EDIT_DB;
*pfDontNext = TRUE;
goto done;
}
}
if (!fExistLog)
{
hr = myCreateNestedDirectories(pServer->pwszLogDirectory);
if (S_OK != hr)
{
CertWarningMessageBox(pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_ERR_CREATE_DIR,
hr,
pServer->pwszLogDirectory);
uiFocus = IDC_STORE_EDIT_LOG;
*pfDontNext = TRUE;
goto done;
}
}
}
hr = ValidateESERestrictions(pServer->pwszDBDirectory);
if (S_OK != hr)
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_DBSPECIALCHARACTERS,
hr,
pServer->pwszDBDirectory);
uiFocus = IDC_STORE_EDIT_DB;
*pfDontNext = TRUE;
goto done;
}
hr = ValidateESERestrictions(pServer->pwszLogDirectory);
if (S_OK != hr)
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_DBSPECIALCHARACTERS,
hr,
pServer->pwszLogDirectory);
uiFocus = IDC_STORE_EDIT_LOG;
*pfDontNext = TRUE;
goto done;
}
CSASSERT(!*pfDontNext);
// directory creation done; now analyze for UNC, sharepath
if (NULL != pServer->pwszSharedFolder)
{
// if not UNC, prompt to change to UNC
if (!fIsSharedFolderUNC)
{
#define UNCPATH_TEMPLATE L"\\\\%ws\\" wszCERTCONFIGSHARENAME
hr = myAddShare(
wszCERTCONFIGSHARENAME,
myLoadResourceString(IDS_CERTCONFIG_FOLDERDESCR),
pServer->pwszSharedFolder,
TRUE, // overwrite
NULL);
_JumpIfError(hr, done, "myAddShare");
// get the local machine name
WCHAR wszUNCPath[MAX_PATH + ARRAYSIZE(UNCPATH_TEMPLATE)]; // "machine" + UNCPATH_TEMPLATE
hr = myGetMachineDnsName(&pwszComputerName);
_JumpIfError(hr, done, "myGetMachineDnsName");
// create UNC path
swprintf(wszUNCPath, UNCPATH_TEMPLATE, pwszComputerName);
// only convert to UNC if this thing is shared
LocalFree(pServer->pwszSharedFolder);
pServer->pwszSharedFolder = (LPWSTR)LocalAlloc(LMEM_FIXED,
WSZ_BYTECOUNT(wszUNCPath));
_JumpIfOutOfMemory(hr, error, pServer->pwszSharedFolder);
wcscpy(pServer->pwszSharedFolder, wszUNCPath);
} // else, user typed in an already-shared UNC path
}
done:
hr = S_OK;
error:
if (NULL != pwszDefaultDBDir)
LocalFree(pwszDefaultDBDir);
if (NULL != pwszDefaultSF)
LocalFree(pwszDefaultSF);
if (NULL != pwszPrompt)
LocalFree(pwszPrompt);
if (NULL != pwszComputerName)
LocalFree(pwszComputerName);
if (!pComp->fUnattended && uiFocus != 0 && *pfDontNext)
{
SetEditFocusAndSelect(GetDlgItem(hDlg, uiFocus), 0, -1);
}
return hr;
}
HRESULT
StoreDBShareValidation(
IN HWND hDlg,
IN PER_COMPONENT_DATA *pComp,
IN WCHAR const *pwszDir,
IN BOOL fDB, //db dir vs. log dir
OUT BOOL *pfDontNext)
{
HRESULT hr;
WCHAR *pwszDefaultLogDir = NULL;
BOOL fDefaultLogPath;
WCHAR *pwszFileInUse = NULL;
BOOL fFilesExist;
static BOOL s_fOverwriteDB = FALSE;
static BOOL s_fOverwriteLog = FALSE;
BOOL *pfOverwrite = fDB ? &s_fOverwriteDB : &s_fOverwriteLog;
// init
*pfDontNext = FALSE;
// get default log path which is the same as db
hr = GetDefaultDBDirectory(pComp, &pwszDefaultLogDir);
_JumpIfError(hr, error, "GetDefaultDBDirectory");
fDefaultLogPath = (0 == lstrcmpi(pwszDir, pwszDefaultLogDir));
hr = myDoDBFilesExistInDir(pwszDir, &fFilesExist, &pwszFileInUse);
_JumpIfError(hr, error, "myDoDBFilesExistInDir");
if (NULL != pwszFileInUse)
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_DBFILEINUSE,
0,
pwszFileInUse);
*pfDontNext = TRUE;
goto done;
}
if (!pComp->CA.pServer->fPreserveDB &&
fFilesExist &&
!*pfOverwrite &&
!fDefaultLogPath)
{
// log file exists in non-default dir
if (IDYES != CertMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_STORELOC_EXISTINGDB,
0,
MB_YESNO |
MB_DEFBUTTON2 |
MB_ICONWARNING |
CMB_NOERRFROMSYS,
pwszDir))
{
*pfDontNext = TRUE;
goto done;
}
// warn only once
*pfOverwrite = TRUE;
}
done:
if (*pfDontNext)
{
// set focus
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_STORE_EDIT_LOG), 0, -1);
}
hr = S_OK;
error:
if (NULL != pwszFileInUse)
{
LocalFree(pwszFileInUse);
}
if (NULL != pwszDefaultLogDir)
{
LocalFree(pwszDefaultLogDir);
}
return hr;
}
HRESULT
FinishDirectoryBrowse(
HWND hDlg,
int idEdit)
{
HRESULT hr = S_FALSE;
WCHAR dirInitName[MAX_PATH];
WCHAR dirName[MAX_PATH];
GetWindowText(GetDlgItem(hDlg, idEdit), dirInitName, MAX_PATH);
if (BrowseForDirectory(
GetParent(hDlg),
dirInitName,
dirName,
MAX_PATH,
NULL,
TRUE))
{
SetDlgItemText(hDlg, idEdit, dirName);
hr = S_OK;
}
return hr;
}
HRESULT
HookStorePageStrings(
HWND hDlg,
PAGESTRINGS *pPageString,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
for ( ; 0 != pPageString->idControl; pPageString++)
{
switch (pPageString->idControl)
{
case IDC_STORE_EDIT_SHAREDFOLDER:
pPageString->ppwszString = &(pServer->pwszSharedFolder);
break;
case IDC_STORE_EDIT_DB:
pPageString->ppwszString = &(pServer->pwszDBDirectory);
break;
case IDC_STORE_EDIT_LOG:
pPageString->ppwszString = &(pServer->pwszLogDirectory);
break;
default:
hr = E_INVALIDARG;
_JumpError(hr, error, "Internal error");
break;
}
}
hr = S_OK;
error:
return hr;
}
HRESULT
InitStoreWizControls(
HWND hDlg,
PAGESTRINGS *pPageString,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
// now make page strings complete
hr = HookStorePageStrings(hDlg, pPageString, pServer);
_JumpIfError(hr, error, "HookStorePageStrings");
SendDlgItemMessage(hDlg,
IDC_STORE_USE_SHAREDFOLDER,
BM_SETCHECK,
(WPARAM)((NULL != pServer->pwszSharedFolder) ?
BST_CHECKED : BST_UNCHECKED),
(LPARAM)0);
if (!pServer->fUseDS && (NULL != pServer->pwszSharedFolder))
{
// no DS, disable shared folder check to force it
EnableWindow(GetDlgItem(hDlg, IDC_STORE_USE_SHAREDFOLDER), FALSE);
}
hr = StartWizardPageEditControls(hDlg, pPageString);
_JumpIfError(hr, error, "StartWizardPageEditControls");
hr = S_OK;
error:
return hr;
}
HRESULT
HandlePreservingDB(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
HWND hwndSF = GetDlgItem(hDlg, IDC_STORE_EDIT_SHAREDFOLDER);
HWND hwndDB = GetDlgItem(hDlg, IDC_STORE_EDIT_DB);
HWND hwndLog = GetDlgItem(hDlg, IDC_STORE_EDIT_LOG);
BOOL fEnable = TRUE;
BOOL fEnableSharedFolder = TRUE;
WCHAR *pwszExistingSharedFolder = NULL;
WCHAR *pwszExistingDBDirectory = NULL;
WCHAR *pwszExistingLogDirectory = NULL;
if (pServer->fPreserveDB)
{
if (!pServer->fUNCPathNotFound)
{
// get shared folder path
hr = myGetCertRegStrValue(NULL, NULL, NULL,
wszREGDIRECTORY, &pwszExistingSharedFolder);
if (hr == HRESULT_FROM_WIN32(ERROR_FILE_NOT_FOUND))
{
// optional value
hr = S_OK;
pwszExistingSharedFolder = NULL;
}
_JumpIfError(hr, error, "myGetCertRegStrValue");
fEnableSharedFolder = FALSE;
}
else
{
pwszExistingSharedFolder = pServer->pwszSharedFolder;
}
// get existing db path
hr = myGetCertRegStrValue(NULL, NULL, NULL,
wszREGDBDIRECTORY, &pwszExistingDBDirectory);
_JumpIfError(hr, error, "myGetCertRegStrValue");
hr = myGetCertRegStrValue(NULL, NULL, NULL,
wszREGDBLOGDIRECTORY, &pwszExistingLogDirectory);
_JumpIfError(hr, error, "myGetCertRegStrValue");
// fill edit fields
SetWindowText(hwndSF, pwszExistingSharedFolder);
SetWindowText(hwndDB, pwszExistingDBDirectory);
SetWindowText(hwndLog, pwszExistingLogDirectory);
// disable them
fEnable = FALSE;
}
EnableWindow(hwndSF, fEnableSharedFolder);
EnableWindow(hwndDB, fEnable);
EnableWindow(hwndLog, fEnable);
hr = S_OK;
error:
if (NULL != pwszExistingSharedFolder &&
pwszExistingSharedFolder != pServer->pwszSharedFolder)
{
LocalFree(pwszExistingSharedFolder);
}
if (NULL != pwszExistingDBDirectory)
{
LocalFree(pwszExistingDBDirectory);
}
if (NULL != pwszExistingLogDirectory)
{
LocalFree(pwszExistingLogDirectory);
}
return hr;
}
HRESULT
HandleStoreWizActive(
HWND hDlg,
PER_COMPONENT_DATA *pComp,
PAGESTRINGS *pPageString)
{
HRESULT hr;
HWND hwndDB;
BOOL fEnableKeepDB = FALSE;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
// Suppress this wizard page if
// we've already seen an error, or
// we are not installing the server.
if (!(IS_SERVER_INSTALL & pComp->dwInstallStatus) )
{
// disable page
CSILOGDWORD(IDS_STORE_TITLE, dwWIZDISABLE);
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, -1);
goto done;
}
CSASSERT(NULL != pServer->pwszKeyContainerName);
hwndDB = GetDlgItem(hDlg, IDC_STORE_KEEPDB);
if (NULL != pServer->pccExistingCert)
{
// determine existing db status
hr = myDoDBFilesExist(
pServer->pwszSanitizedName,
&fEnableKeepDB,
NULL);
_JumpIfError(hr, error, "myDoDBFilesExist");
}
else
{
// can't use db
pServer->fPreserveDB = FALSE;
SendMessage(hwndDB, BM_SETCHECK, (WPARAM)BST_UNCHECKED, (LPARAM)0);
HandlePreservingDB(hDlg, pComp);
}
// enable/disable the control
EnableSharedFolderControls(hDlg, NULL != pServer->pwszSharedFolder);
EnableWindow(hwndDB, fEnableKeepDB);
done:
hr = S_OK;
error:
return hr;
}
HRESULT
HandleStoreWizNextOrBack(
HWND hDlg,
PAGESTRINGS *pPageString,
PER_COMPONENT_DATA *pComp,
int iWizBN)
{
HRESULT hr;
HWND hwndCtrl = NULL;
WCHAR *pwszFile = NULL;
WCHAR const *pwszCertName;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
BOOL fDontNext = FALSE;
BOOL fGoBack = FALSE;
BOOL fUseSharedFolder;
HCURSOR hPrevCur;
hr = FinishWizardPageEditControls(hDlg, pPageString);
_JumpIfError(hr, error, "FinishWizardPageEditControls");
if (PSN_WIZBACK == iWizBN)
{
goto done;
}
// make sure at least one way to publish ca
CSASSERT(NULL != pServer->pwszSharedFolder || pComp->CA.pServer->fUseDS);
// get shared folder check state
fUseSharedFolder = (BST_CHECKED == SendMessage(
GetDlgItem(hDlg, IDC_STORE_USE_SHAREDFOLDER),
BM_GETCHECK, 0, 0));
if (!fUseSharedFolder && NULL != pServer->pwszSharedFolder)
{
//don't collect shared folder from edit control
LocalFree(pServer->pwszSharedFolder);
pServer->pwszSharedFolder = NULL;
}
hPrevCur = SetCursor(LoadCursor(NULL, IDC_WAIT));
hr = StorePageValidation(hDlg, pComp, &fDontNext);
SetCursor(hPrevCur);
_JumpIfError(hr, error, "StorePageValidation");
if (fDontNext)
{
goto done;
}
// validate existing db sharing here
hr = StoreDBShareValidation(
hDlg,
pComp,
pComp->CA.pServer->pwszDBDirectory,
TRUE, //db dir
&fDontNext);
_JumpIfError(hr, error, "StoreDBShareValidation");
if (fDontNext)
{
goto done;
}
if (0 != lstrcmpi(
pComp->CA.pServer->pwszDBDirectory,
pComp->CA.pServer->pwszLogDirectory))
{
hr = StoreDBShareValidation(
hDlg,
pComp,
pComp->CA.pServer->pwszLogDirectory,
FALSE, //log dir
&fDontNext);
_JumpIfError(hr, error, "StoreDBShareValidation");
if (fDontNext)
{
goto done;
}
}
hr = myBuildPathAndExt(
pComp->CA.pServer->pwszDBDirectory,
pServer->pwszSanitizedName,
wszDBFILENAMEEXT,
&pwszFile);
_JumpIfError(hr, error, "myBuildPathAndExt");
// make sure path fits
if (MAX_PATH <= wcslen(pwszFile))
{
// pop up warning
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_PATH_TOO_LONG_CANAME,
S_OK,
pwszFile);
// make it go back
fGoBack = TRUE;
fDontNext = TRUE;
goto done;
}
LocalFree(pwszFile);
pwszFile = NULL;
hr = myBuildPathAndExt(
pComp->CA.pServer->pwszLogDirectory,
TEXT(szDBBASENAMEPARM) L"00000",
wszLOGFILENAMEEXT,
&pwszFile);
_JumpIfError(hr, error, "myBuildPathAndExt");
// make sure path fits
if (MAX_PATH <= wcslen(pwszFile))
{
// pop up warning
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_PATH_TOO_LONG_DIRECTORY,
S_OK,
pwszFile);
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_STORE_EDIT_LOG), 0, -1);
fDontNext = TRUE;
goto done;
}
LocalFree(pwszFile);
pwszFile = NULL;
hr = csiBuildCACertFileName(
pComp->hInstance,
hDlg,
pComp->fUnattended,
pServer->pwszSharedFolder,
pServer->pwszSanitizedName,
L".crt",
0, // CANAMEIDTOICERT(pServer->dwCertNameId),
&pwszFile);
_JumpIfError(hr, error, "csiBuildCACertFileName");
// make sure path fit
if (MAX_PATH <= wcslen(pwszFile) + cwcSUFFIXMAX)
{
// pop up warning
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_PATH_TOO_LONG_CANAME,
S_OK,
pwszFile);
// make it go back
fGoBack = TRUE;
fDontNext = TRUE;
goto done;
}
if (NULL != pServer->pwszCACertFile)
{
// free old one
LocalFree(pServer->pwszCACertFile);
}
pServer->pwszCACertFile = pwszFile;
pwszFile = NULL;
if (IsRootCA(pServer->CAType))
{
hPrevCur = SetCursor(LoadCursor(NULL, IDC_WAIT));
hr = StartAndStopService(pComp->hInstance,
pComp->fUnattended,
hDlg,
wszW3SVCNAME,
TRUE,
TRUE, // confirmation
IDS_STOP_W3SVC,
&g_fW3SvcRunning);
SetCursor(hPrevCur);
if (S_OK != hr)
{
if (E_ABORT == hr)
{
fDontNext = TRUE;
goto done;
}
_JumpError(hr, error, "StartAndStopService");
}
}
done:
if (fDontNext)
{
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, TRUE); // forbid
if (fGoBack)
{
PropSheet_PressButton(GetParent(hDlg), PSBTN_BACK);
pServer->LastWiz = ENUM_WIZ_STORE;
}
}
else
{
// continue to next
pServer->LastWiz = ENUM_WIZ_STORE;
}
hr = S_OK;
error:
if (NULL != pwszFile)
{
LocalFree(pwszFile);
}
return hr;
}
HRESULT
HandleUseSharedFolder(
IN HWND hDlg,
IN OUT PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
// get shared folder check state
BOOL fUseSharedFolder = (BST_CHECKED == SendMessage(
GetDlgItem(hDlg, IDC_STORE_USE_SHAREDFOLDER),
BM_GETCHECK, 0, 0));
if (!fUseSharedFolder && !pComp->CA.pServer->fUseDS)
{
// must check at least one, force unchange
fUseSharedFolder = TRUE;
SendDlgItemMessage(hDlg, IDC_STORE_USE_SHAREDFOLDER,
BM_SETCHECK, (WPARAM)BST_CHECKED, (LPARAM)0);
}
hr = EnableSharedFolderControls(hDlg, fUseSharedFolder);
// _JumpIfError(hr, error, "EnableSharedFolderControls");
_PrintIfError(hr, "EnableSharedFolderControls");
// hr = S_OK;
//error:
return hr;
}
//+------------------------------------------------------------------------
// Function: WizStorePageDlgProc(. . . .)
//
// Synopsis: Dialog procedure for storage location
//-------------------------------------------------------------------------
INT_PTR
WizStorePageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
PER_COMPONENT_DATA *pComp = NULL;
// keep scope of following array inside
static PAGESTRINGS saStoreString[] =
{
{
IDC_STORE_EDIT_SHAREDFOLDER,
IDS_LOG_SHAREDFOLDER,
0,
0,
MAX_PATH,
NULL,
},
{
IDC_STORE_EDIT_DB,
IDS_LOG_DBDIR,
0,
0,
MAX_PATH,
NULL,
},
{
IDC_STORE_EDIT_LOG,
IDS_LOG_DBLOGDIR,
0,
0,
MAX_PATH,
NULL,
},
// you need to add code in HookStoreStrings if adding more...
{
0,
0,
0,
0,
0,
NULL,
}
};
switch(iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(LONG)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)((PROPSHEETPAGE*)lParam)->lParam;
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = InitStoreWizControls(hDlg, saStoreString, pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_COMMAND:
switch (LOWORD(wParam))
{
case IDC_STORE_USE_SHAREDFOLDER:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleUseSharedFolder(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_STORE_KEEPDB:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->CA.pServer->fPreserveDB = !pComp->CA.pServer->fPreserveDB;
pComp->hrContinue = HandlePreservingDB(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_STORE_SHAREDBROWSE:
FinishDirectoryBrowse(hDlg, IDC_STORE_EDIT_SHAREDFOLDER);
break;
case IDC_STORE_DBBROWSE:
FinishDirectoryBrowse(hDlg, IDC_STORE_EDIT_DB);
break;
case IDC_STORE_LOGBROWSE:
FinishDirectoryBrowse(hDlg, IDC_STORE_EDIT_LOG);
break;
}
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_KILLACTIVE:
break;
case PSN_RESET:
break;
case PSN_QUERYCANCEL:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
return CertConfirmCancel(hDlg, pComp);
break;
case PSN_SETACTIVE:
CSILOGDWORD(IDS_STORE_TITLE, dwWIZACTIVE);
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_BACK|PSWIZB_NEXT);
pComp = _GetCompDataOrReturn(pComp, hDlg);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = HandleStoreWizActive(hDlg, pComp,
saStoreString);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZBACK:
CSILOGDWORD(IDS_STORE_TITLE, dwWIZBACK);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleStoreWizNextOrBack(hDlg,
saStoreString, pComp, PSN_WIZBACK);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZNEXT:
CSILOGDWORD(IDS_STORE_TITLE, dwWIZNEXT);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleStoreWizNextOrBack(hDlg,
saStoreString, pComp, PSN_WIZNEXT);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
HRESULT
EnableCARequestControls(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
// Online req
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_CANAME),
!pServer->fSaveRequestAsFile);
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_COMPUTERNAME),
!pServer->fSaveRequestAsFile);
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_CA_BROWSE),
!pServer->fSaveRequestAsFile && pServer->fCAsExist);
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_CNLABEL),
!pServer->fSaveRequestAsFile);
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_PCALABEL),
!pServer->fSaveRequestAsFile);
// File req
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_FILE),
pServer->fSaveRequestAsFile);
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_FILE_BROWSE),
pServer->fSaveRequestAsFile);
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_FILELABEL),
pServer->fSaveRequestAsFile);
if (pServer->fSaveRequestAsFile)
{
SetFocus(GetDlgItem(hDlg, IDC_CAREQUEST_FILE));
}
else
{
SetFocus(GetDlgItem(hDlg, IDC_CAREQUEST_CANAME));
}
hr = S_OK;
//error:
return hr;
}
HRESULT
BuildRequestFileName(
IN WCHAR const *pwszCACertFile,
OUT WCHAR **ppwszRequestFile)
{
#define wszREQEXT L".req"
HRESULT hr;
WCHAR const *pwszStart;
WCHAR const *pwszEnd;
WCHAR *pwszRequestFile = NULL;
CSASSERT(NULL != pwszCACertFile);
// derive request file name
pwszStart = pwszCACertFile;
pwszEnd = wcsrchr(pwszStart, L'.');
if (pwszEnd == NULL)
{
// set to end of entire string -- no '.' found
pwszEnd = &pwszStart[wcslen(pwszStart)];
}
pwszRequestFile = (WCHAR*)LocalAlloc(LMEM_FIXED,
(SAFE_SUBTRACT_POINTERS(pwszEnd, pwszStart) +
wcslen(wszREQEXT) + 1) * sizeof(WCHAR));
_JumpIfOutOfMemory(hr, error, pwszRequestFile);
CopyMemory(pwszRequestFile, pwszStart,
SAFE_SUBTRACT_POINTERS(pwszEnd, pwszStart) * sizeof(WCHAR));
wcscpy(pwszRequestFile + SAFE_SUBTRACT_POINTERS(pwszEnd, pwszStart), wszREQEXT);
// return
*ppwszRequestFile = pwszRequestFile;
pwszRequestFile = NULL;
hr = S_OK;
error:
if (NULL != pwszRequestFile)
{
LocalFree(pwszRequestFile);
}
return hr;
}
HRESULT
StartCARequestPage(
HWND hDlg,
PAGESTRINGS *pPageString,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
if (NULL == pServer->pwszRequestFile)
{
hr = BuildRequestFileName(
pServer->pwszCACertFile,
&pServer->pwszRequestFile);
_JumpIfError(hr, error, "BuildRequestFileName");
}
hr = StartWizardPageEditControls(hDlg, pPageString);
_JumpIfError(hr, error, "StartWizardPageEditControls");
hr = S_OK;
error:
return hr;
}
HRESULT
GetRequestFileName(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
WCHAR *pwszFileIn = NULL;
WCHAR *pwszFileOut = NULL;
HWND hCtrl = GetDlgItem(hDlg, IDC_CAREQUEST_FILE);
hr = myUIGetWindowText(hCtrl, &pwszFileIn);
_JumpIfError(hr, error, "myUIGetWindowText");
hr = myGetSaveFileName(
hDlg,
pComp->hInstance,
IDS_REQUEST_SAVE_TITLE,
IDS_REQUEST_FILE_FILTER,
IDS_REQUEST_FILE_DEFEXT,
OFN_PATHMUSTEXIST | OFN_OVERWRITEPROMPT,
pwszFileIn,
&pwszFileOut);
_JumpIfError(hr, error, "myGetSaveFileName");
if (NULL != pwszFileOut)
{
SetWindowText(hCtrl, pwszFileOut);
}
hr = S_OK;
error:
if (NULL != pwszFileOut)
{
LocalFree(pwszFileOut);
}
if (NULL != pwszFileIn)
{
LocalFree(pwszFileIn);
}
return hr;
}
HRESULT
HookCARequestPageStrings(
HWND hDlg,
PAGESTRINGS *pPageString,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
for ( ; 0 != pPageString->idControl; pPageString++)
{
switch (pPageString->idControl)
{
case IDC_CAREQUEST_CANAME:
pPageString->ppwszString = &(pServer->pwszParentCAName);
break;
case IDC_CAREQUEST_COMPUTERNAME:
pPageString->ppwszString = &(pServer->pwszParentCAMachine);
break;
case IDC_CAREQUEST_FILE:
pPageString->ppwszString = &(pServer->pwszRequestFile);
break;
default:
hr = E_INVALIDARG;
_JumpError(hr, error, "Internal error");
break;
}
}
hr = S_OK;
error:
return hr;
}
CERTSRVUICASELECTION g_CARequestUICASelection =
{NULL, NULL, NULL, NULL, NULL, ENUM_UNKNOWN_CA, false};
HRESULT
InitCARequestWizControls(
HWND hDlg,
PAGESTRINGS *pSubmitPageString,
PAGESTRINGS *pFilePageString,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
HWND hwndCtrl;
// now make page strings complete
hr = HookCARequestPageStrings(hDlg, pSubmitPageString, pServer);
_JumpIfError(hr, error, "HookCARequestPageStrings");
hr = HookCARequestPageStrings(hDlg, pFilePageString, pServer);
_JumpIfError(hr, error, "HookCARequestPageStrings");
if (!(SETUPOP_STANDALONE & pComp->Flags))
{
// nt base setup
// disable online submit
EnableWindow(GetDlgItem(hDlg, IDC_CAREQUEST_SUBMITTOCA), FALSE);
SendMessage(GetDlgItem(hDlg, IDC_CAREQUEST_SUBMITTOCA),
BM_SETCHECK,
(WPARAM) BST_UNCHECKED,
(LPARAM) 0);
// only save as file
pServer->fSaveRequestAsFile = TRUE;
SendMessage(GetDlgItem(hDlg, IDC_CAREQUEST_SAVETOFILE),
BM_SETCHECK,
(WPARAM) BST_CHECKED,
(LPARAM) 0);
}
else
{
// set online submit as default
pServer->fSaveRequestAsFile = FALSE;
SendMessage(GetDlgItem(hDlg, IDC_CAREQUEST_SUBMITTOCA),
BM_CLICK,
(WPARAM) 0,
(LPARAM) 0);
hr = myInitUICASelectionControls(
&g_CARequestUICASelection,
pComp->hInstance,
hDlg,
GetDlgItem(hDlg, IDC_CAREQUEST_CA_BROWSE),
GetDlgItem(hDlg, IDC_CAREQUEST_COMPUTERNAME),
GetDlgItem(hDlg, IDC_CAREQUEST_CANAME),
csiIsAnyDSCAAvailable(),
&pServer->fCAsExist);
_JumpIfError(hr, error, "myInitUICASelectionControls");
}
hr = S_OK;
error:
return hr;
}
HRESULT
HandleCARequestWizActive(
HWND hDlg,
PAGESTRINGS *pPageString,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
DWORD dwCACount;
CRYPTUI_CA_CONTEXT const *pCAContext = NULL;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
BOOL fMatchAll = IsEverythingMatched(pServer);
// Suppress this wizard page if
// we've already seen an error, or
// we are not installing the server, or
// we are not installing a subordinate, or
// the advanced page already selected a matching key and cert
if (!(IS_SERVER_INSTALL & pComp->dwInstallStatus) ||
IsRootCA(pServer->CAType) ||
fMatchAll)
{
// disable page
CSILOGDWORD(IDS_CAREQUEST_TITLE, dwWIZDISABLE);
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, -1);
goto done;
}
EnableCARequestControls(hDlg, pComp);
hr = StartCARequestPage(hDlg, pPageString, pServer);
_JumpIfError(hr, error, "StartCARequestPage");
done:
hr = S_OK;
error:
if (NULL != pCAContext)
{
CryptUIDlgFreeCAContext(pCAContext);
}
return hr;
}
HRESULT
ConvertEditControlFullFilePath(
HWND hEdtCtrl)
{
HRESULT hr;
WCHAR *pwszPath = NULL;
WCHAR wszFullPath[MAX_PATH];
WCHAR *pwszNotUsed;
DWORD dwSize = 0;
hr = myUIGetWindowText(hEdtCtrl, &pwszPath);
_JumpIfError(hr, error, "myUIGetWindowText");
if (NULL == pwszPath)
{
// empty path, done
goto done;
}
dwSize = GetFullPathName(pwszPath,
ARRAYSIZE(wszFullPath),
wszFullPath,
&pwszNotUsed);
CSASSERT(ARRAYSIZE(wszFullPath) > dwSize);
if (0 == dwSize)
{
hr = myHLastError();
_JumpError(hr, error, "GetFullPathName");
}
// get full path, set it back to edit control
SetWindowText(hEdtCtrl, wszFullPath);
done:
hr = S_OK;
error:
if (NULL != pwszPath)
{
LocalFree(pwszPath);
}
return hr;
}
HRESULT
HandleCARequestWizNextOrBack(
HWND hDlg,
PAGESTRINGS *pPageString,
PER_COMPONENT_DATA *pComp,
int iWizBN)
{
HRESULT hr;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
BOOL fDontNext = FALSE;
BOOL fValid;
if (pServer->fSaveRequestAsFile)
{
// convert request file to full path
hr = ConvertEditControlFullFilePath(
GetDlgItem(hDlg, IDC_CAREQUEST_FILE));
_JumpIfError(hr, error, "ConvertEditControlFullFilePath");
CSASSERT(pServer->pwszSanitizedName);
CSASSERT(pServer->pwszKeyContainerName);
hr = mySetCertRegStrValue(
pServer->pwszSanitizedName,
NULL,
NULL,
wszREGREQUESTKEYCONTAINER,
pServer->pwszKeyContainerName);
_JumpIfErrorStr(hr, error, "mySetCertRegStrValue", wszREGREQUESTKEYCONTAINER);
}
hr = FinishWizardPageEditControls(hDlg, pPageString);
_JumpIfError(hr, error, "FinishWizardPageEditControls");
if (PSN_WIZBACK == iWizBN)
{
goto done;
}
if (!pServer->fSaveRequestAsFile && NULL==pServer->pccExistingCert)
{
// online case
hr = myUICASelectionValidation(&g_CARequestUICASelection, &fValid);
_JumpIfError(hr, error, "myUICASelectionValidation");
if (!fValid)
{
fDontNext = TRUE;
goto done;
}
}
hr = WizardPageValidation(pComp->hInstance, pComp->fUnattended,
hDlg, pPageString);
if (S_OK != hr)
{
fDontNext = TRUE;
goto done;
}
if (pServer->fSaveRequestAsFile)
{
// validate dir path existance of the request file
WCHAR *pwszLastSlash = wcsrchr(pServer->pwszRequestFile, L'\\');
CSASSERT(NULL != pwszLastSlash);
if (NULL != pwszLastSlash)
{
// make request file path into a dir path
pwszLastSlash[0] = L'\0';
if (DE_DIREXISTS != DirExists(pServer->pwszRequestFile) ||
L'\0' == pwszLastSlash[1])
{
// bring request file path back
pwszLastSlash[0] = L'\\';
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_CAREQUEST_REQUESTFILEPATH_MUSTEXIST,
0,
pServer->pwszRequestFile);
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_CAREQUEST_FILE), 0, -1);
fDontNext = TRUE;
goto done;
}
// bring request file path back
pwszLastSlash[0] = L'\\';
}
// Fail if a directory with the same name already exists
if(DE_DIREXISTS == DirExists(pServer->pwszRequestFile))
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_CAREQUEST_REQUESTFILEPATH_DIREXISTS,
0,
pServer->pwszRequestFile);
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_CAREQUEST_FILE), 0, -1);
fDontNext = TRUE;
goto done;
}
}
hr = StartAndStopService(pComp->hInstance,
pComp->fUnattended,
hDlg,
wszW3SVCNAME,
TRUE,
TRUE,
IDS_STOP_W3SVC,
&g_fW3SvcRunning);
if (S_OK != hr)
{
if (E_ABORT == hr)
{
fDontNext = TRUE;
goto done;
}
_JumpError(hr, error, "StartAndStopService");
}
done:
if (fDontNext)
{
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, TRUE); // forbid
}
else
{
pServer->LastWiz = ENUM_WIZ_REQUEST;
}
hr = S_OK;
error:
return hr;
}
//+------------------------------------------------------------------------
// Function: WizCARequestPageDlgProc(. . . .)
//
// Synopsis: Dialog procedure for CA Request wiz-page
//-------------------------------------------------------------------------
INT_PTR
WizCARequestPageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
PAGESTRINGS *pPageString;
PER_COMPONENT_DATA *pComp = NULL;
static BOOL s_fComputerChange = FALSE;
// keep the following in local scope
static PAGESTRINGS saCARequestSubmit[] =
{
{
IDC_CAREQUEST_COMPUTERNAME,
IDS_LOG_COMPUTER,
IDS_COMPUTERNULLSTRERR,
IDS_COMPUTERLENSTRERR,
MAX_PATH,
NULL,
},
{
IDC_CAREQUEST_CANAME,
IDS_LOG_CANAME,
IDS_CANULLSTRERR,
IDS_CALENSTRERR,
cchCOMMONNAMEMAX,
NULL,
},
// add more code in HookCARequestPageStrings if you add
{
0,
0,
0,
0,
0,
NULL
}
};
static PAGESTRINGS saCARequestFile[] =
{
{
IDC_CAREQUEST_FILE,
IDS_LOG_REQUESTFILE,
IDS_REQUESTFILENULLSTRERR,
IDS_REQUESTFILELENSTRERR,
MAX_PATH,
NULL,
},
// add more code in HookCARequestPageStrings if you add
{
0,
0,
0,
0,
0,
NULL,
}
};
switch(iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam;
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = InitCARequestWizControls(hDlg,
saCARequestSubmit,
saCARequestFile,
pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_COMMAND:
switch (LOWORD(wParam))
{
case IDC_CAREQUEST_SAVETOFILE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->CA.pServer->fSaveRequestAsFile = TRUE;
pComp->hrContinue = EnableCARequestControls(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_CAREQUEST_SUBMITTOCA:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->CA.pServer->fSaveRequestAsFile = FALSE;
pComp->hrContinue = EnableCARequestControls(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_CAREQUEST_CA_BROWSE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = myUICAHandleCABrowseButton(
&g_CARequestUICASelection,
csiIsAnyDSCAAvailable(),
IDS_CA_PICKER_TITLE,
IDS_CA_PICKER_PROMPT,
NULL);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_CAREQUEST_FILE_BROWSE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = GetRequestFileName(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_CAREQUEST_CANAME:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = myUICAHandleCAListDropdown(
(int)HIWORD(wParam), // notification
&g_CARequestUICASelection,
&s_fComputerChange);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_CAREQUEST_COMPUTERNAME:
switch ((int)HIWORD(wParam))
{
case EN_CHANGE: // edit changed
s_fComputerChange = TRUE;
break;
}
break;
}
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_KILLACTIVE:
break;
case PSN_RESET:
break;
case PSN_QUERYCANCEL:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
return CertConfirmCancel(hDlg, pComp);
break;
case PSN_SETACTIVE:
CSILOGDWORD(IDS_CAREQUEST_TITLE, dwWIZACTIVE);
pComp = _GetCompDataOrReturn(pComp, hDlg);
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_BACK|PSWIZB_NEXT);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = HandleCARequestWizActive(hDlg,
saCARequestFile, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZBACK:
CSILOGDWORD(IDS_CAREQUEST_TITLE, dwWIZBACK);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pPageString = saCARequestSubmit;
if (pComp->CA.pServer->fSaveRequestAsFile)
{
pPageString = saCARequestFile;
}
pComp->hrContinue = HandleCARequestWizNextOrBack(hDlg,
pPageString, pComp, PSN_WIZBACK);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZNEXT:
CSILOGDWORD(IDS_CAREQUEST_TITLE, dwWIZNEXT);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pPageString = saCARequestSubmit;
if (pComp->CA.pServer->fSaveRequestAsFile)
{
pPageString = saCARequestFile;
}
pComp->hrContinue = HandleCARequestWizNextOrBack(hDlg,
pPageString, pComp, PSN_WIZNEXT);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
HRESULT
HookClientPageStrings(
HWND hDlg,
PAGESTRINGS *pPageString,
CAWEBCLIENTSETUPINFO *pClient)
{
HRESULT hr;
for ( ; 0 != pPageString->idControl; pPageString++)
{
switch (pPageString->idControl)
{
case IDC_CLIENT_COMPUTERNAME:
pPageString->ppwszString = &(pClient->pwszWebCAMachine);
break;
default:
hr = E_INVALIDARG;
_JumpError(hr, error, "Internal error");
break;
}
}
hr = S_OK;
error:
return hr;
}
CERTSRVUICASELECTION g_WebClientUICASelection =
{NULL, NULL, NULL, NULL, NULL, ENUM_UNKNOWN_CA, true};
HRESULT
InitClientWizControls(
HWND hDlg,
PAGESTRINGS *pPageString,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
BOOL fCAsExist;
CAWEBCLIENTSETUPINFO *pClient = pComp->CA.pClient;
hr = HookClientPageStrings(hDlg, pPageString, pClient);
_JumpIfError(hr, error, "HookClientPageStrings");
hr = WizPageSetTextLimits(hDlg, pPageString);
_JumpIfError(hr, error, "WizPageSetTextLimits");
pClient->fUseDS = FALSE;
if (IsDSAvailable())
{
pClient->fUseDS = csiIsAnyDSCAAvailable();
}
hr = myInitUICASelectionControls(
&g_WebClientUICASelection,
pComp->hInstance,
hDlg,
GetDlgItem(hDlg, IDC_CLIENT_BROWSECNFG),
GetDlgItem(hDlg, IDC_CLIENT_COMPUTERNAME),
GetDlgItem(hDlg, IDC_CLIENT_CANAME),
pClient->fUseDS,
&fCAsExist);
_JumpIfError(hr, error, "myInitUICASelectionControls");
hr = S_OK;
error:
return hr;
}
HRESULT
GetCAConfigInfo(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr = S_OK;
CAWEBCLIENTSETUPINFO *pClient = pComp->CA.pClient;
// free old shared folder always
if (NULL != pClient->pwszSharedFolder)
{
// free old
LocalFree(pClient->pwszSharedFolder);
pClient->pwszSharedFolder = NULL;
}
hr = myUICAHandleCABrowseButton(
&g_WebClientUICASelection,
pClient->fUseDS,
IDS_CONFIG_PICKER_TITLE,
IDS_CONFIG_PICKER_PROMPT,
&pClient->pwszSharedFolder);
_JumpIfError(hr, error, "myUICAHandleCABrowseButton");
error:
return hr;
}
HRESULT
HandleClientWizNextOrBack(
HWND hDlg,
PAGESTRINGS *pPageString,
PER_COMPONENT_DATA *pComp,
int iWizBN)
{
HWND hwndCtrl;
HRESULT hr;
CAWEBCLIENTSETUPINFO *pClient = pComp->CA.pClient;
BOOL fDontNext = FALSE;
WCHAR *pwszCAName = NULL;
WCHAR *pwszSanitizedCAName;
int nItem;
int len;
BOOL fValid;
BOOL fCoInit = FALSE;
// CAINFO *pCAInfo = NULL;
HCURSOR hPrevCur;
hr = FinishWizardPageEditControls(hDlg, pPageString);
_JumpIfError(hr, error, "FinishWizardPageEditControls");
if (PSN_WIZBACK == iWizBN)
{
goto done;
}
hr = myUICASelectionValidation(&g_WebClientUICASelection, &fValid);
_JumpIfError(hr, error, "myUICASelectionValidation");
if (!fValid)
{
fDontNext = TRUE;
goto done;
}
// at this point, g_WebClientUICASelection.CAType is guaranteed to be filled in
hr = WizardPageValidation(pComp->hInstance, pComp->fUnattended,
hDlg, pPageString);
if (S_OK != hr)
{
fDontNext = TRUE;
goto done;
}
hr = myUIGetWindowText(GetDlgItem(hDlg, IDC_CLIENT_CANAME), &pwszCAName);
_JumpIfError(hr, error, "myUIGetWindowText");
CSASSERT(NULL != pwszCAName);
if (NULL != pClient->pwszWebCAName)
{
// free old one
LocalFree(pClient->pwszWebCAName);
}
pClient->pwszWebCAName = pwszCAName;
pwszCAName = NULL;
hr = mySanitizeName(pClient->pwszWebCAName, &pwszSanitizedCAName);
_JumpIfError(hr, error, "mySanitizeName");
if (NULL != pClient->pwszSanitizedWebCAName)
{
// free old one
LocalFree(pClient->pwszSanitizedWebCAName);
}
pClient->pwszSanitizedWebCAName = pwszSanitizedCAName;
// pClient->WebCAType = pCAInfo->CAType;
pClient->WebCAType = g_WebClientUICASelection.CAType;
hr = StartAndStopService(pComp->hInstance,
pComp->fUnattended,
hDlg,
wszW3SVCNAME,
TRUE,
TRUE,
IDS_STOP_W3SVC,
&g_fW3SvcRunning);
if (S_OK != hr)
{
if (E_ABORT == hr)
{
fDontNext = TRUE;
goto done;
}
_JumpError(hr, error, "StartAndStopService");
}
done:
hr = S_OK;
error:
if (fCoInit)
{
CoUninitialize();
}
if (fDontNext)
{
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, TRUE); // forbid
}
if (NULL != pwszCAName)
{
LocalFree(pwszCAName);
}
// if (NULL != pCAInfo)
{
// LocalFree(pCAInfo);
}
return hr;
}
HRESULT
HandleClientWizActive(
HWND hDlg,
PER_COMPONENT_DATA *pComp,
PAGESTRINGS *pPageString)
{
HRESULT hr;
// Suppress this wizard page if
// we've already seen an error, or
// the server is or will be installed, or
// the client isn't or won't be installed, or
// ther will be no change in client and server install states.
if ((IS_SERVER_ENABLED & pComp->dwInstallStatus) ||
!(IS_CLIENT_ENABLED & pComp->dwInstallStatus) ||
!((IS_CLIENT_CHANGE | IS_SERVER_CHANGE) & pComp->dwInstallStatus))
{
// disable page
CSILOGDWORD(IDS_CLIENT_TITLE, dwWIZDISABLE);
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, -1);
goto done;
}
// load id info
hr = StartWizardPageEditControls(hDlg, pPageString);
_JumpIfError(hr, error, "StartWizardPageEditControls");
done:
hr = S_OK;
error:
return hr;
}
//+------------------------------------------------------------------------
// Function: WizClientPageDlgProc(. . . .)
//
// Synopsis: Dialog procedure for CA Client wiz-page
//-------------------------------------------------------------------------
INT_PTR
WizClientPageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
PER_COMPONENT_DATA *pComp = NULL;
static BOOL s_fComputerChange = FALSE;
static PAGESTRINGS saClientPageString[] =
{
{
IDC_CLIENT_COMPUTERNAME,
IDS_LOG_COMPUTER,
IDS_CLIENT_NOCOMPUTER,
IDS_COMPUTERLENSTRERR,
MAX_PATH,
NULL,
},
// you need to add code in HookClientPageStrings if adding more...
{
0,
0,
0,
0,
0,
NULL
}
};
switch(iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(LONG)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)((PROPSHEETPAGE*)lParam)->lParam;
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = InitClientWizControls(hDlg,
saClientPageString, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_COMMAND:
switch (LOWORD(wParam))
{
case IDC_CLIENT_BROWSECNFG:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = GetCAConfigInfo(hDlg, pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_CLIENT_CANAME:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = myUICAHandleCAListDropdown(
(int)HIWORD(wParam),
&g_WebClientUICASelection,
&s_fComputerChange);
_ReturnIfWizError(pComp->hrContinue);
break;
case IDC_CLIENT_COMPUTERNAME:
switch ((int)HIWORD(wParam))
{
case EN_CHANGE: // edit change
s_fComputerChange = TRUE;
break;
}
break;
}
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_KILLACTIVE:
break;
case PSN_RESET:
break;
case PSN_QUERYCANCEL:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
return CertConfirmCancel(hDlg, pComp);
break;
case PSN_SETACTIVE:
CSILOGDWORD(IDS_CLIENT_TITLE, dwWIZACTIVE);
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_BACK|PSWIZB_NEXT);
pComp = _GetCompDataOrReturn(pComp, hDlg);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = HandleClientWizActive(hDlg, pComp, saClientPageString);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZBACK:
CSILOGDWORD(IDS_CLIENT_TITLE, dwWIZBACK);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
// enable back
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, 0);
pComp->hrContinue = HandleClientWizNextOrBack(hDlg,
saClientPageString, pComp, PSN_WIZBACK);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZNEXT:
CSILOGDWORD(IDS_CLIENT_TITLE, dwWIZNEXT);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleClientWizNextOrBack(hDlg,
saClientPageString, pComp, PSN_WIZNEXT);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
static CFont s_cBigBoldFont;
static BOOL s_fBigBoldFont;
BOOL ocmWiz97SetupFonts(HWND hwnd)
{
BOOL bReturn = FALSE;
//
// Create the fonts we need based on the dialog font
//
NONCLIENTMETRICS ncm = {0};
ncm.cbSize = sizeof (ncm);
SystemParametersInfo (SPI_GETNONCLIENTMETRICS, 0, &ncm, 0);
LOGFONT BigBoldLogFont = ncm.lfMessageFont;
//
// Create Big Bold Font and Bold Font
//
BigBoldLogFont.lfWeight = FW_BOLD;
WCHAR largeFontSizeString[24];
INT largeFontSize;
//
// Load size and name from resources, since these may change
// from locale to locale based on the size of the system font, etc.
//
if ( !::LoadString (g_hInstance, IDS_LARGEFONTNAME,
BigBoldLogFont.lfFaceName, LF_FACESIZE) )
{
CSASSERT (0);
lstrcpy (BigBoldLogFont.lfFaceName, L"MS Shell Dlg");
}
if ( ::LoadStringW (g_hInstance, IDS_LARGEFONTSIZE,
largeFontSizeString, ARRAYSIZE(largeFontSizeString)) )
{
largeFontSize = wcstoul (largeFontSizeString, NULL, 10);
}
else
{
CSASSERT (0);
largeFontSize = 12;
}
HDC hdc = GetDC(hwnd);
if (hdc)
{
BigBoldLogFont.lfHeight = 0 - (GetDeviceCaps(hdc, LOGPIXELSY) * largeFontSize / 72);
BOOL bBigBold = s_cBigBoldFont.CreateFontIndirect (&BigBoldLogFont);
ReleaseDC(hwnd, hdc);
if ( bBigBold )
bReturn = TRUE;
}
return bReturn;
}
HFONT ocmWiz97GetBigBoldFont(HWND hwnd)
{
if (FALSE == s_fBigBoldFont)
{
if (!ocmWiz97SetupFonts(hwnd))
return NULL;
s_fBigBoldFont = TRUE;
}
return s_cBigBoldFont;
}
//+------------------------------------------------------------------------
// Function: WizWelcomePageDlgProc(. . . .)
//
// Synopsis: Dialog procedure welcome wiz-page
//-------------------------------------------------------------------------
INT_PTR
WizWelcomePageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
PER_COMPONENT_DATA *pComp = NULL;
HFONT hf;
switch(iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(LONG)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)((PROPSHEETPAGE*)lParam)->lParam;
// set wizard 97 fonts
hf = ocmWiz97GetBigBoldFont(hDlg);
if (NULL != hf)
SendMessage(GetDlgItem(hDlg, IDC_TEXT_BIGBOLD), WM_SETFONT, (WPARAM)hf, MAKELPARAM(TRUE, 0));
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_SETACTIVE:
// disable back button
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_NEXT);
pComp = _GetCompDataOrReturn(pComp, hDlg);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
//+------------------------------------------------------------------------
// Function: WizFinalPageDlgProc(. . . .)
//
// Synopsis: Dialog procedure final wiz-page
//-------------------------------------------------------------------------
INT_PTR
WizFinalPageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
PER_COMPONENT_DATA *pComp = NULL;
HFONT hf;
switch(iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(LONG)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)((PROPSHEETPAGE*)lParam)->lParam;
hf = ocmWiz97GetBigBoldFont(hDlg);
if (NULL != hf)
SendMessage(GetDlgItem(hDlg,IDC_TEXT_BIGBOLD), WM_SETFONT, (WPARAM)hf, MAKELPARAM(TRUE, 0));
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_SETACTIVE:
// enable finish button
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_FINISH);
pComp = _GetCompDataOrReturn(pComp, hDlg);
// always display final wiz page
if (S_OK != pComp->hrContinue)
{
WCHAR *pwszFail = NULL;
HRESULT hr2 = myLoadRCString(
pComp->hInstance,
IDS_FINAL_ERROR_TEXT,
&pwszFail);
if (S_OK == hr2)
{
SetWindowText(GetDlgItem(hDlg, IDC_FINAL_STATUS),
pwszFail);
LocalFree(pwszFail);
}
else
{
// well, use hard code string
SetWindowText(GetDlgItem(hDlg, IDC_FINAL_STATUS),
L"Certificate Services Installation failed");
_PrintError(hr2, "myLoadRCString");
}
}
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}
// Map table for dialog template resource IDs and dialog proc pointers
WIZPAGERESENTRY aWizPageResources[] =
{
IDD_WIZCATYPEPAGE, WizCATypePageDlgProc,
IDS_CATYPE_TITLE, IDS_CATYPE_SUBTITLE,
IDD_WIZADVANCEDPAGE, WizAdvancedPageDlgProc,
IDS_ADVANCE_TITLE, IDS_ADVANCE_SUBTITLE,
IDD_WIZIDINFOPAGE, WizIdInfoPageDlgProc,
IDS_IDINFO_TITLE, IDS_IDINFO_SUBTITLE,
IDD_WIZKEYGENPAGE, WizKeyGenPageDlgProc,
IDS_KEYGEN_TITLE, IDS_KEYGEN_SUBTITLE,
IDD_WIZSTOREPAGE, WizStorePageDlgProc,
IDS_STORE_TITLE, IDS_STORE_SUBTITLE,
IDD_WIZCAREQUESTPAGE, WizCARequestPageDlgProc,
IDS_CAREQUEST_TITLE, IDS_CAREQUEST_SUBTITLE,
IDD_WIZCLIENTPAGE, WizClientPageDlgProc,
IDS_CLIENT_TITLE, IDS_CLIENT_SUBTITLE,
};
#define NUM_SERVERWIZPAGES sizeof(aWizPageResources)/sizeof(WIZPAGERESENTRY)
HRESULT
CreateCertsrvWizPage(
IN PER_COMPONENT_DATA *pComp,
IN int idTitle,
IN int idSubTitle,
IN int idDlgResource,
IN DLGPROC fnDlgProc,
IN BOOL fWelcomeFinal,
OUT HPROPSHEETPAGE *phPage)
{
HRESULT hr;
PROPSHEETPAGE Page;
WCHAR *pwszTitle = NULL;
WCHAR *pwszSubTitle = NULL;
// init
ZeroMemory(&Page, sizeof(PROPSHEETPAGE));
// construct page info
// Set titles
Page.dwFlags = PSP_DEFAULT;
if (fWelcomeFinal)
Page.dwFlags |= PSP_HIDEHEADER;
if (-1 != idTitle)
{
hr = myLoadRCString(pComp->hInstance,
idTitle,
&pwszTitle);
_JumpIfError(hr, error, "Internal Error");
Page.pszHeaderTitle = pwszTitle;
Page.dwFlags |= PSP_USEHEADERTITLE;
}
if (-1 != idSubTitle)
{
hr = myLoadRCString(pComp->hInstance,
idSubTitle,
&pwszSubTitle);
_JumpIfError(hr, error, "Internal Error");
Page.pszHeaderSubTitle = pwszSubTitle;
Page.dwFlags |= PSP_USEHEADERSUBTITLE;
}
// Set the basic property sheet data
Page.dwSize = sizeof(PROPSHEETPAGE); // + sizeof(MYWIZPAGE);
// Set up module and resource dependent data
Page.hInstance = pComp->hInstance;
Page.pszTemplate = MAKEINTRESOURCE(idDlgResource);
Page.pfnDlgProc = fnDlgProc;
Page.pfnCallback = NULL;
Page.pcRefParent = NULL;
Page.pszIcon = NULL;
Page.pszTitle = NULL;
Page.lParam = (LPARAM)pComp; // pass this to wizpage handlers
// Create the page
*phPage = CreatePropertySheetPage(&Page);
_JumpIfOutOfMemory(hr, error, *phPage);
hr = S_OK;
error:
if (NULL != pwszTitle)
{
LocalFree(pwszTitle);
}
if (NULL != pwszSubTitle)
{
LocalFree(pwszSubTitle);
}
return hr;
}
//+------------------------------------------------------------------------
//
// Function: DoPageRequest(. . . .)
//
// Synopsis: Handler for the OC_REQUEST_PAGES notification.
//
// Effects: Ponies up the pages for the OCM driven wizard to display.
//
// Arguments: [ComponentId] ID String for the component.
// [WhichOnes] Type specifier for requested pages.
// [SetupPages] Structure to receive page handles.
//
// Returns: DWORD count of pages returned or -1 (MAXDWORD) in case of
// failure; in this case SetLastError() will provide extended
// error information.
//
// History: 04/16/97 JerryK Unmangled
// 08/97 XTan major structure change
//
//-------------------------------------------------------------------------
DWORD
DoPageRequest(
IN PER_COMPONENT_DATA *pComp,
IN WIZPAGERESENTRY *pWizPageResources,
IN DWORD dwWizPageNum,
IN WizardPagesType WhichOnes,
IN OUT PSETUP_REQUEST_PAGES SetupPages)
{
DWORD dwPageNum = MAXDWORD;
HRESULT hr;
DWORD i;
if (pComp->fUnattended)
{
// don't create wiz page if unattended
return 0;
}
// handle welcome page
if (pComp->fPostBase && WizPagesWelcome == WhichOnes)
{
if (1 > SetupPages->MaxPages)
{
// ask ocm allocate enough pages
return 1; // only welcome, 1 page
}
hr = CreateCertsrvWizPage(
pComp,
IDS_WELCOME_TITLE, // title,
-1, // no sub-title
IDD_WIZWELCOMEPAGE,
WizWelcomePageDlgProc,
TRUE,
&SetupPages->Pages[0]);
_JumpIfError(hr, error, "CreateCertsrvWizPage");
return 1; // create 1 page
}
// handle final page
if (pComp->fPostBase && WizPagesFinal == WhichOnes)
{
if (1 > SetupPages->MaxPages)
{
// ask ocm allocate enough pages
return 1; // only final, 1 page
}
hr = CreateCertsrvWizPage(
pComp,
IDS_FINAL_TITLE, // title,
-1, // no sub-title
IDD_WIZFINALPAGE,
WizFinalPageDlgProc,
TRUE,
&SetupPages->Pages[0]);
_JumpIfError(hr, error, "CreateCertsrvWizPage");
return 1; // create 1 page
}
// from now on, we should only handle post net wiz pages
if (WizPagesPostnet != WhichOnes)
{
// ignore all others except postnet pages
return 0;
}
if (dwWizPageNum > SetupPages->MaxPages)
{
// OCM didn't allocate enough for pages, return # and ask more
return dwWizPageNum;
}
// Create the property sheet pages for the wizard
for (i = 0; i < dwWizPageNum; i++)
{
hr = CreateCertsrvWizPage(
pComp,
pWizPageResources[i].idTitle, // title,
pWizPageResources[i].idSubTitle, // sub-title
pWizPageResources[i].idResource,
pWizPageResources[i].fnDlgProc,
FALSE,
&SetupPages->Pages[i]);
_JumpIfError(hr, error, "CreateCertsrvWizPage");
}
dwPageNum = dwWizPageNum;
error:
return dwPageNum;
}
DWORD
myDoPageRequest(
IN PER_COMPONENT_DATA *pComp,
IN WizardPagesType WhichOnes,
IN OUT PSETUP_REQUEST_PAGES SetupPages)
{
pComp->CA.pServer->LastWiz = ENUM_WIZ_UNKNOWN;
return DoPageRequest(pComp,
aWizPageResources,
NUM_SERVERWIZPAGES,
WhichOnes,
SetupPages);
}
//+-------------------------------------------------------------------------
//
// Function: DirExists()
//
// Synopsis: Determines whether or not a directory already exists.
//
// Arguments: [pszTestFileName] -- Name of directory to test for.
//
// Returns: FALSE -- Directory doesn't exist
// DE_DIREXISTS -- Directory exists
// DE_NAMEINUSE -- Name in use by non-directory entity
//
// History: 10/23/96 JerryK Created
//
//--------------------------------------------------------------------------
int
DirExists(LPTSTR pszTestFileName)
{
DWORD dwFileAttrs;
int nRetVal;
// Get file attributes
dwFileAttrs = GetFileAttributes(pszTestFileName);
if (0xFFFFFFFF == dwFileAttrs) // Error code from GetFileAttributes
{
nRetVal = FALSE; // Couldn't open file
}
else if (dwFileAttrs & FILE_ATTRIBUTE_DIRECTORY)
{
nRetVal = DE_DIREXISTS; // Directory already exists
}
else
{
nRetVal = DE_NAMEINUSE; // Name in use by non-directory entity
}
return nRetVal;
}
BOOL
IsEverythingMatched(CASERVERSETUPINFO *pServer)
{
return pServer->fAdvance &&
(NULL!=pServer->pwszKeyContainerName) &&
NULL!=pServer->pccExistingCert;
}
//====================================================================
//
// CA info code
//
//
//====================================================================
WNDPROC g_pfnValidityWndProcs;
WNDPROC g_pfnIdInfoWndProcs;
HRESULT
GetValidityEditCount(
HWND hDlg,
DWORD *pdwPeriodCount)
{
HRESULT hr;
WCHAR *pwszPeriodCount = NULL;
BOOL fValidDigitString;
// init to 0
*pdwPeriodCount = 0;
hr = myUIGetWindowText(GetDlgItem(hDlg, IDC_IDINFO_EDIT_VALIDITYCOUNT),
&pwszPeriodCount);
_JumpIfError(hr, error, "myUIGetWindowText");
if (NULL != pwszPeriodCount)
{
*pdwPeriodCount = myWtoI(pwszPeriodCount, &fValidDigitString);
}
hr = S_OK;
error:
if (NULL != pwszPeriodCount)
{
LocalFree(pwszPeriodCount);
}
return hr;
}
HRESULT
UpdateExpirationDate(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
WCHAR *pwszExpiration = NULL;
hr = GetValidityEditCount(hDlg, &pServer->dwValidityPeriodCount);
_JumpIfError(hr, error, "GetValidityEditCount");
if (0 < pServer->dwValidityPeriodCount)
{
if(!pServer->pccExistingCert)
{
GetSystemTimeAsFileTime(&pServer->NotBefore);
pServer->NotAfter = pServer->NotBefore;
myMakeExprDateTime(
&pServer->NotAfter,
pServer->dwValidityPeriodCount,
pServer->enumValidityPeriod);
}
hr = myGMTFileTimeToWszLocalTime(
&pServer->NotAfter,
FALSE,
&pwszExpiration);
_JumpIfError(hr, error, "myGMTFileTimeToWszLocalTime");
if (!SetWindowText(GetDlgItem(hDlg, IDC_IDINFO_EXPIRATION),
pwszExpiration))
{
hr = myHLastError();
_JumpError(hr, error, "SetWindowText");
}
}
hr = S_OK;
error:
if (NULL != pwszExpiration)
{
LocalFree(pwszExpiration);
}
return hr;
}
HRESULT
AddValidityString(
IN HINSTANCE hInstance,
const HWND hList,
const int ids,
ENUM_PERIOD enumValidityPeriod)
{
HRESULT hr;
WCHAR *pwsz = NULL;
LRESULT nIndex;
hr = myLoadRCString(hInstance, ids, &pwsz);
_JumpIfError(hr, error, "myLoadRCString");
// add string
nIndex = (INT)SendMessage(hList, CB_ADDSTRING, (WPARAM)0, (LPARAM)pwsz);
if (CB_ERR == nIndex)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "SendMessage(CB_ADDSTRING)");
}
// set data
nIndex = (INT)SendMessage(hList, CB_SETITEMDATA, (WPARAM)nIndex, (LPARAM)enumValidityPeriod);
if (CB_ERR == nIndex)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "SendMessage(CB_ADDSTRING)");
}
hr = S_OK;
error:
if (NULL != pwsz)
{
LocalFree(pwsz);
}
return hr;
}
HRESULT
SelectValidityString(
PER_COMPONENT_DATA *pComp,
HWND hList,
ENUM_PERIOD enumValidityPeriod)
{
HRESULT hr;
WCHAR *pwsz = NULL;
LRESULT nIndex;
LRESULT lr;
int id;
switch (enumValidityPeriod)
{
case ENUM_PERIOD_YEARS:
id = IDS_VALIDITY_YEAR;
break;
case ENUM_PERIOD_MONTHS:
id = IDS_VALIDITY_MONTH;
break;
case ENUM_PERIOD_WEEKS:
id = IDS_VALIDITY_WEEK;
break;
case ENUM_PERIOD_DAYS:
id = IDS_VALIDITY_DAY;
break;
default:
hr = E_INVALIDARG;
_JumpError(hr, error, "Invalid validity period enum");
break;
}
hr = myLoadRCString(pComp->hInstance, id, &pwsz);
_JumpIfError(hr, error, "myLoadRCString");
nIndex = (INT)SendMessage(hList, CB_FINDSTRING, (WPARAM)0, (LPARAM)pwsz);
if (CB_ERR == nIndex)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "SendMessage(CB_FINDSTRING)");
}
lr = (INT)SendMessage(hList, CB_SETCURSEL, (WPARAM)nIndex, (LPARAM)0);
if (CB_ERR == lr)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "SendMessage(CB_FINDSTRING)");
}
lr = (INT)SendMessage(hList, CB_GETITEMDATA, (WPARAM)nIndex, (LPARAM)0);
if (CB_ERR == lr)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "SendMessage(CB_FINDSTRING)");
}
pComp->CA.pServer->enumValidityPeriod = (ENUM_PERIOD)lr;
hr = S_OK;
error:
if (pwsz)
LocalFree(pwsz);
return hr;
}
HRESULT
DetermineKeyExistence(
CSP_INFO *pCSPInfo,
WCHAR *pwszKeyName)
{
HRESULT hr;
HCRYPTPROV hProv = NULL;
if (!myCertSrvCryptAcquireContext(
&hProv,
pwszKeyName,
pCSPInfo->pwszProvName,
pCSPInfo->dwProvType,
CRYPT_SILENT,
TRUE))
{
hr = myHLastError();
goto error;
}
hr = S_OK;
error:
if (NULL != hProv)
{
CryptReleaseContext(hProv, 0);
}
return hr;
}
LRESULT CALLBACK
ValidityEditFilterHook(
HWND hwnd,
UINT iMsg,
WPARAM wParam,
LPARAM lParam)
{
int ret;
BOOL fUpdate = FALSE;
LRESULT lr;
CASERVERSETUPINFO *pServer = (CASERVERSETUPINFO*)GetWindowLongPtr(hwnd, GWLP_USERDATA);
switch(iMsg)
{
case WM_CHAR:
fUpdate = TRUE;
if (!iswdigit((TCHAR) wParam))
{
if (VK_BACK != (int)wParam)
{
// ignore the key
MessageBeep(0xFFFFFFFF);
return 0;
}
}
break;
case WM_KEYDOWN:
if (VK_DELETE == (int)wParam)
{
// validity is changed
fUpdate = TRUE;
}
break;
}
lr = CallWindowProc(
g_pfnValidityWndProcs,
hwnd,
iMsg,
wParam,
lParam);
if (fUpdate)
{
UpdateExpirationDate(GetParent(hwnd), pServer);
}
return lr;
}
HRESULT MakeNullStringEmpty(LPWSTR *ppwszStr)
{
if(!*ppwszStr)
return myDupString(L"", ppwszStr);
return S_OK;
}
HRESULT
HideAndShowMachineDNControls(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
LPCWSTR pcwszDNSuffix;
hr = MakeNullStringEmpty(&pServer->pwszFullCADN);
_JumpIfError(hr, error, "MakeNullStringEmpty");
hr = MakeNullStringEmpty(&pServer->pwszCACommonName);
_JumpIfError(hr, error, "MakeNullStringEmpty");
hr = MakeNullStringEmpty(&pServer->pwszDNSuffix);
_JumpIfError(hr, error, "MakeNullStringEmpty");
SetDlgItemText(hDlg, IDC_IDINFO_NAMEEDIT, pServer->pwszCACommonName);
SetDlgItemText(hDlg, IDC_IDINFO_DNSUFFIXEDIT, pServer->pwszDNSuffix);
SetDlgItemText(hDlg, IDC_IDINFO_NAMEPREVIEW, pServer->pwszFullCADN);
// name preview is never editable
// EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_NAMEPREVIEW), FALSE);
SendDlgItemMessage(hDlg, IDC_IDINFO_NAMEPREVIEW, EM_SETREADONLY, TRUE, 0);
// if we're in reuse cert mode, we can't edit the DNs
if (NULL != pServer->pccExistingCert)
{
// EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT), FALSE);
// EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_DNSUFFIXEDIT), FALSE);
SendDlgItemMessage(hDlg, IDC_IDINFO_NAMEEDIT, EM_SETREADONLY, TRUE, 0);
SendDlgItemMessage(hDlg, IDC_IDINFO_DNSUFFIXEDIT, EM_SETREADONLY, TRUE, 0);
}
else
{
// set the defaults again
// and re-enable everything else
// EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT), TRUE);
// EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_DNSUFFIXEDIT), TRUE);
SendDlgItemMessage(hDlg, IDC_IDINFO_NAMEEDIT, EM_SETREADONLY, FALSE, 0);
SendDlgItemMessage(hDlg, IDC_IDINFO_DNSUFFIXEDIT, EM_SETREADONLY, FALSE, 0);
// SendDlgItemMessage(hDlg, IDC_IDINFO_NAMEPREVIEW, EM_SETREADONLY, FALSE, 0);
}
hr = S_OK;
error:
return hr;
}
HRESULT InitNameFields(CASERVERSETUPINFO *pServer)
{
HRESULT hr;
CAutoLPWSTR pwsz;
const WCHAR *pwszFirstDCComponent = L"";
if(pServer->pccExistingCert)
{
}
else
{
if(!pServer->pwszCACommonName)
{
// avoid null name
hr = myDupString(L"", &pServer->pwszCACommonName);
_JumpIfError(hr, error, "myDupString");
}
hr = myGetComputerObjectName(NameFullyQualifiedDN, &pwsz);
_PrintIfError(hr, "myGetComputerObjectName");
if (S_OK == hr && pwsz != NULL)
{
pwszFirstDCComponent = wcsstr(pwsz, L"DC=");
}
if(pServer->pwszDNSuffix)
{
LocalFree(pServer->pwszDNSuffix);
pServer->pwszDNSuffix = NULL;
}
if(!pwszFirstDCComponent)
{
pwszFirstDCComponent = L"";
}
hr = myDupString(pwszFirstDCComponent, &pServer->pwszDNSuffix);
_JumpIfError(hr, error, "myDupString");
if(pServer->pwszFullCADN)
{
LocalFree(pServer->pwszFullCADN);
pServer->pwszFullCADN = NULL;
}
hr = BuildFullDN(
pServer->pwszCACommonName,
pwszFirstDCComponent,
&pServer->pwszFullCADN);
_JumpIfError(hr, error, "BuildFullDN");
}
error:
return hr;
}
// Builds full DN "CN=CAName,DistinguishedName" where CAName and DistinguishedName
// could be empty or NULL;
HRESULT BuildFullDN(
OPTIONAL LPCWSTR pcwszCAName,
OPTIONAL LPCWSTR pcwszDNSuffix,
LPWSTR* ppwszFullDN)
{
HRESULT hr = S_OK;
DWORD cBytes = 4; // 4 chars for leading "CN=" plus null terminator
CSASSERT(ppwszFullDN);
if(!EmptyString(pcwszCAName))
cBytes += wcslen(pcwszCAName);
if(!EmptyString(pcwszDNSuffix))
cBytes += wcslen(pcwszDNSuffix)+1; // comma
cBytes *= sizeof(WCHAR);
*ppwszFullDN = (LPWSTR) LocalAlloc(LMEM_FIXED, cBytes);
_JumpIfAllocFailed(*ppwszFullDN, error);
wcscpy(*ppwszFullDN, L"CN=");
if(!EmptyString(pcwszCAName))
{
wcscat(*ppwszFullDN, pcwszCAName);
}
if(!EmptyString(pcwszDNSuffix))
{
wcscat(*ppwszFullDN, L",");
wcscat(*ppwszFullDN, pcwszDNSuffix);
}
error:
return hr;
}
HRESULT
EnableValidityControls(HWND hDlg, BOOL fEnabled)
{
EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_COMBO_VALIDITYSTRING), fEnabled);
EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_EDIT_VALIDITYCOUNT), fEnabled);
return S_OK;
}
HRESULT
HideAndShowValidityControls(
HWND hDlg,
ENUM_CATYPES CAType)
{
// default to root ca
int showValidity = SW_SHOW;
int showHelp = SW_HIDE;
BOOL fEnableLabel = TRUE;
if (IsSubordinateCA(CAType))
{
showValidity = SW_HIDE;
showHelp = SW_SHOW;
fEnableLabel = FALSE;
}
ShowWindow(GetDlgItem(hDlg, IDC_IDINFO_DETERMINEDBYPCA), showHelp);
ShowWindow(GetDlgItem(hDlg, IDC_IDINFO_EDIT_VALIDITYCOUNT), showValidity);
ShowWindow(GetDlgItem(hDlg, IDC_IDINFO_COMBO_VALIDITYSTRING), showValidity);
ShowWindow(GetDlgItem(hDlg, IDC_IDINFO_EXPIRATION_LABEL), showValidity);
ShowWindow(GetDlgItem(hDlg, IDC_IDINFO_EXPIRATION), showValidity);
EnableWindow(GetDlgItem(hDlg, IDC_IDINFO_VPLABEL), fEnableLabel);
return S_OK;
}
HRESULT
InitValidityControls(
HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
HWND hwndCtrl = GetDlgItem(hDlg, IDC_IDINFO_COMBO_VALIDITYSTRING);
ENUM_PERIOD enumValidityPeriod = ENUM_PERIOD_YEARS;
WCHAR *pwsz = NULL;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
// load validity help text
hr = myLoadRCString(pComp->hInstance, IDS_IDINFO_DETERMINEDBYPCA, &pwsz);
_JumpIfError(hr, error, "LoadString");
if (!SetWindowText(GetDlgItem(hDlg, IDC_IDINFO_DETERMINEDBYPCA), pwsz))
{
hr = myHLastError();
_JumpError(hr, error, "SetWindowText");
}
// load validity period strings
hr = AddValidityString(pComp->hInstance, hwndCtrl, IDS_VALIDITY_YEAR,
ENUM_PERIOD_YEARS);
_JumpIfError(hr, error, "AddValidityString");
hr = AddValidityString(pComp->hInstance, hwndCtrl, IDS_VALIDITY_MONTH,
ENUM_PERIOD_MONTHS);
_JumpIfError(hr, error, "AddValidityString");
hr = AddValidityString(pComp->hInstance, hwndCtrl, IDS_VALIDITY_WEEK,
ENUM_PERIOD_WEEKS);
_JumpIfError(hr, error, "AddValidityString");
hr = AddValidityString(pComp->hInstance, hwndCtrl, IDS_VALIDITY_DAY,
ENUM_PERIOD_DAYS);
_JumpIfError(hr, error, "AddValidityString");
hr = S_OK;
error:
if (NULL != pwsz)
{
LocalFree(pwsz);
}
return hr;
}
HRESULT
EnableMatchedCertIdInfoEditFields(HWND hDlg, BOOL fEnable)
{
HRESULT hr;
EnableValidityControls(hDlg, fEnable);
hr = S_OK;
//error:
return hr;
}
HRESULT
WizIdInfoPageSetHooks(HWND hDlg, PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
CSASSERT (NULL != pComp);
// CA Name filter proc
g_pfnIdInfoWndProcs =
(WNDPROC) SetWindowLongPtr(
GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT),
GWLP_WNDPROC,
(LPARAM)IdInfoNameEditFilterHook);
if (0 == g_pfnIdInfoWndProcs)
{
hr = myHLastError();
_JumpError(hr, error, "SetWindowLongPtr");
}
SetLastError(0);
if (0 == SetWindowLongPtr(
GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT),
GWLP_USERDATA,
(LPARAM)pComp->CA.pServer))
{
hr = myHLastError(); // might return S_OK
_JumpIfError(hr, error, "SetWindowLongPtr USERDATA");
}
hr = S_OK;
error:
return hr;
}
HRESULT
HandleValidityStringChange(
HWND hDlg,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
LRESULT nItem;
LRESULT lr;
HWND hwndCtrl = GetDlgItem(hDlg, IDC_IDINFO_COMBO_VALIDITYSTRING);
if (NULL == hwndCtrl)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "Internal Error");
}
nItem = (INT)SendMessage(hwndCtrl, CB_GETCURSEL, (WPARAM)0, (LPARAM)0);
if (CB_ERR == nItem)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "Internal Error");
}
lr = (INT)SendMessage(hwndCtrl, CB_GETITEMDATA, (WPARAM)nItem, (LPARAM)0);
if (CB_ERR == nItem)
{
hr = E_INVALIDARG;
_JumpError(hr, error, "Internal Error");
}
pServer->enumValidityPeriod = (ENUM_PERIOD)lr;
hr = UpdateExpirationDate(hDlg, pServer);
_JumpIfError(hr, error, "UpdateExpirationDate");
hr = S_OK;
error:
return hr;
}
HRESULT
HookIdInfoPageStrings(
HWND hDlg,
PAGESTRINGS *pPageString,
CASERVERSETUPINFO *pServer)
{
HRESULT hr;
for ( ; 0 != pPageString->idControl; pPageString++)
{
switch (pPageString->idControl)
{
case IDC_IDINFO_NAMEEDIT:
pPageString->ppwszString = &(pServer->pwszCACommonName);
break;
case IDC_IDINFO_EDIT_VALIDITYCOUNT:
pPageString->ppwszString = &(pServer->pwszValidityPeriodCount);
break;
default:
hr = E_INVALIDARG;
_JumpError(hr, error, "Internal error");
break;
}
}
hr = S_OK;
error:
return hr;
}
HRESULT
InitIdInfoWizControls(
HWND hDlg,
PAGESTRINGS *pIdPageString,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr;
HWND hwndCtrl;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
// now make page strings complete
hr = HookIdInfoPageStrings(hDlg, pIdPageString, pServer);
_JumpIfError(hr, error, "HookIdInfoPageStrings");
hr = WizPageSetTextLimits(hDlg, pIdPageString);
_JumpIfError(hr, error, "WizPageSetTextLimits");
hr = WizIdInfoPageSetHooks(hDlg, pComp);
_JumpIfError(hr, error, "WizIdInfoPageSetHooks");
hr = InitValidityControls(hDlg, pComp);
_JumpIfError(hr, error, "InitValidityControls");
if (!IsSubordinateCA(pServer->CAType))
{
hwndCtrl = GetDlgItem(hDlg, IDC_IDINFO_EDIT_VALIDITYCOUNT);
g_pfnValidityWndProcs = (WNDPROC)SetWindowLongPtr(hwndCtrl,
GWLP_WNDPROC, (LPARAM)ValidityEditFilterHook);
if (NULL == g_pfnValidityWndProcs)
{
hr = myHLastError();
_JumpError(hr, error, "SetWindowLongPtr");
}
// pass data
SetWindowLongPtr(hwndCtrl, GWLP_USERDATA, (ULONG_PTR)pServer);
}
hr = S_OK;
error:
return hr;
}
HRESULT
UpdateValidityMaxDigits(
BOOL fMatchAll,
PAGESTRINGS *pIdPageString)
{
HRESULT hr;
for (; 0 != pIdPageString; pIdPageString++)
{
if (IDC_IDINFO_EDIT_VALIDITYCOUNT == pIdPageString->idControl)
{
pIdPageString->cchMax = fMatchAll? UB_VALIDITY_ANY : UB_VALIDITY;
break;
}
}
hr = S_OK;
//error:
return hr;
}
HRESULT
HandleIdInfoWizActive(
HWND hDlg,
PER_COMPONENT_DATA *pComp,
PAGESTRINGS *pIdPageString)
{
HRESULT hr;
WCHAR wszValidity[20];
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
ENUM_PERIOD enumValidityPeriod = pServer->enumValidityPeriod;
BOOL fMatchAll;
// Suppress this wizard page if
// we've already seen an error, or
// we are not installing the server.
if (!(IS_SERVER_INSTALL & pComp->dwInstallStatus) )
{
// disable page
CSILOGDWORD(IDS_IDINFO_TITLE, dwWIZDISABLE);
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, -1);
goto done;
}
if (ENUM_WIZ_STORE == pServer->LastWiz)
{
// if back from ca request, reset
g_fAllowUnicodeStrEncoding = FALSE;
}
if (pServer->fAdvance &&
ENUM_WIZ_KEYGEN == pServer->LastWiz &&
(pServer->fKeyGenFailed || pServer->fValidatedHashAndKey) )
{
// key gen failed and go back
PropSheet_PressButton(GetParent(hDlg), PSBTN_BACK);
}
if (!pServer->fAdvance && ENUM_WIZ_CATYPE == pServer->LastWiz)
{
hr = LoadDefaultAdvanceAttributes(pServer);
_JumpIfError(hr, error, "LoadDefaultAdvanceAttributes");
}
hr = HideAndShowValidityControls(hDlg, pServer->CAType);
_JumpIfError(hr, error, "HideAndShowValidityControls");
hr = HideAndShowMachineDNControls(hDlg, pServer);
_JumpIfError(hr, error, "HideAndShowMachineDNControls");
// load id info
hr = StartWizardPageEditControls(hDlg, pIdPageString);
_JumpIfError(hr, error, "StartWizardPageEditControls");
hr = EnableMatchedCertIdInfoEditFields(hDlg, TRUE);
_JumpIfError(hr, error, "EnableMatchedCertIdInfoEditFields");
// default
wsprintf(wszValidity, L"%u", pServer->dwValidityPeriodCount);
fMatchAll = IsEverythingMatched(pServer);
if (fMatchAll)
{
enumValidityPeriod = ENUM_PERIOD_DAYS;
wsprintf(wszValidity, L"%u", pServer->lExistingValidity);
hr = EnableMatchedCertIdInfoEditFields(hDlg, FALSE);
_JumpIfError(hr, error, "EnableMatchedCertIdInfoEditFields");
}
// update validity period string
hr = SelectValidityString(
pComp,
GetDlgItem(hDlg, IDC_IDINFO_COMBO_VALIDITYSTRING),
enumValidityPeriod);
_JumpIfError(hr, error, "SelectValidityString");
// update validity
SetWindowText(GetDlgItem(hDlg, IDC_IDINFO_EDIT_VALIDITYCOUNT), wszValidity);
hr = UpdateExpirationDate(hDlg, pServer);
_JumpIfError(hr, error, "UpdateExpirationDate");
// update validity digits max for validation
hr = UpdateValidityMaxDigits(fMatchAll, pIdPageString);
_JumpIfError(hr, error, "UpdateValidityMaxDigits");
EnableValidityControls(hDlg, !IsSubordinateCA(pServer->CAType) && !fMatchAll);
done:
hr = S_OK;
error:
return hr;
}
// check server RDN info, warning any invalid or
// or confirm from users once if any unicode string encoding
BOOL
IsAnyInvalidRDN(
OPTIONAL HWND hDlg,
PER_COMPONENT_DATA *pComp)
{
HRESULT hr = S_OK;
BOOL fInvalidRDN = TRUE;
BYTE *pbEncodedName = NULL;
DWORD cbEncodedName;
CERT_NAME_INFO *pbDecodedNameInfo = NULL;
DWORD cbDecodedNameInfo;
CERT_NAME_INFO *pNameInfo = NULL;
DWORD *pIndexRDN = NULL;
DWORD *pIndexAttr = NULL;
DWORD dwUnicodeCount;
WCHAR *pwszAllStrings = NULL;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
DWORD indexRDN;
DWORD indexAttr;
DWORD indexValue;
int idControl;
LPCWSTR pszErrorPtr = NULL;
// don't bother calling with CERT_NAME_STR_REVERSE_FLAG, we're just throwing this encoding away
hr = myCertStrToName(
X509_ASN_ENCODING | PKCS_7_ASN_ENCODING,
pServer->pwszDNSuffix,
CERT_X500_NAME_STR | CERT_NAME_STR_COMMA_FLAG,
NULL,
&pbEncodedName,
&cbEncodedName,
&pszErrorPtr);
if(S_OK != hr)
{
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_IDINFO_INVALIDDN,
0,
NULL);
int nStartIndex = 0;
int nEndIndex = wcslen(pServer->pwszDNSuffix);
if(pszErrorPtr)
{
nStartIndex = SAFE_SUBTRACT_POINTERS(pszErrorPtr,pServer->pwszDNSuffix);
const WCHAR *pwszNextComma = wcsstr(pszErrorPtr, L",");
if(pwszNextComma)
{
nEndIndex = SAFE_SUBTRACT_POINTERS(pwszNextComma,pServer->pwszDNSuffix+1);
}
}
SetEditFocusAndSelect(
GetDlgItem(hDlg, IDC_IDINFO_DNSUFFIXEDIT),
nStartIndex,
nEndIndex);
}
_JumpIfError(hr, error, "myCertStrToName");
// call CryptDecodeObject to get pbDecodedNameInfo
// if hit here, check if any unicode string encoding
if (!g_fAllowUnicodeStrEncoding && !pComp->fUnattended)
{
// decode to nameinfo
if (!myDecodeName(
X509_ASN_ENCODING,
X509_UNICODE_NAME,
pbEncodedName,
cbEncodedName,
CERTLIB_USE_LOCALALLOC,
&pbDecodedNameInfo,
&cbDecodedNameInfo))
{
hr = myHLastError();
_JumpError(hr, error, "myDecodeName");
}
// calculate attributes total in RDN
dwUnicodeCount = 0;
for (indexRDN = 0; indexRDN < pbDecodedNameInfo->cRDN; ++indexRDN)
{
dwUnicodeCount += pbDecodedNameInfo->rgRDN[indexRDN].cRDNAttr;
}
// allocate & init index
// sure allocate max for possible all unicode strings
pIndexRDN = (DWORD*)LocalAlloc(LMEM_FIXED | LMEM_ZEROINIT,
dwUnicodeCount * sizeof(DWORD));
_JumpIfOutOfMemory(hr, error, pIndexRDN);
pIndexAttr = (DWORD*)LocalAlloc(LMEM_FIXED | LMEM_ZEROINIT,
dwUnicodeCount * sizeof(DWORD));
_JumpIfOutOfMemory(hr, error, pIndexAttr);
dwUnicodeCount = 0; // reset count
for (indexRDN = 0; indexRDN < pbDecodedNameInfo->cRDN; ++indexRDN)
{
DWORD cRDNAttr = pbDecodedNameInfo->rgRDN[indexRDN].cRDNAttr;
CERT_RDN_ATTR *rgRDNAttr = pbDecodedNameInfo->rgRDN[indexRDN].rgRDNAttr;
// for each RDN
for (indexAttr = 0; indexAttr < cRDNAttr; indexAttr++)
{
// for each attr, check unicode string
switch (rgRDNAttr[indexAttr].dwValueType)
{
case CERT_RDN_UTF8_STRING:
case CERT_RDN_UNICODE_STRING:
// there is a unicode or UTF8 string, save index
pIndexRDN[dwUnicodeCount] = indexRDN;
pIndexAttr[dwUnicodeCount] = indexAttr;
// set count
++dwUnicodeCount;
break;
}
}
}
if (0 == dwUnicodeCount)
{
// no unicode string encoding
goto done;
}
// calculate size of all unicode strings for display
DWORD dwLen = 0;
for (indexAttr = 0; indexAttr < dwUnicodeCount; ++indexAttr)
{
dwLen += (wcslen((WCHAR*)pbDecodedNameInfo->rgRDN[pIndexRDN[indexAttr]].rgRDNAttr[pIndexAttr[indexAttr]].Value.pbData) + 3 ) * sizeof(WCHAR);
}
pwszAllStrings = (WCHAR*)LocalAlloc(LMEM_FIXED, dwLen);
_JumpIfOutOfMemory(hr, error, pwszAllStrings);
// form all strings for display
for (indexAttr = 0; indexAttr < dwUnicodeCount; ++indexAttr)
{
if (0 == indexAttr)
{
wcscpy(pwszAllStrings, (WCHAR*)
pbDecodedNameInfo->rgRDN[pIndexRDN[indexAttr]].rgRDNAttr[pIndexAttr[indexAttr]].Value.pbData);
}
else
{
wcscat(pwszAllStrings, (WCHAR*)
pbDecodedNameInfo->rgRDN[pIndexRDN[indexAttr]].rgRDNAttr[pIndexAttr[indexAttr]].Value.pbData);
}
if (dwUnicodeCount - 1 > indexAttr)
{
// add comma + new line
wcscat(pwszAllStrings, L",\n");
}
}
// ok, ready to put out a warning
if (IDYES == CertMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_UNICODESTRINGENCODING,
0,
MB_YESNO |
MB_ICONWARNING |
CMB_NOERRFROMSYS,
NULL)) //pwszAllStrings))
{
// warning only once
g_fAllowUnicodeStrEncoding = TRUE;
goto done;
}
goto error;
}
done:
fInvalidRDN = FALSE;
error:
if (NULL != pIndexRDN)
{
LocalFree(pIndexRDN);
}
if (NULL != pIndexAttr)
{
LocalFree(pIndexAttr);
}
if (NULL != pwszAllStrings)
{
LocalFree(pwszAllStrings);
}
if (NULL != pbEncodedName)
{
LocalFree(pbEncodedName);
}
if (NULL != pbDecodedNameInfo)
{
LocalFree(pbDecodedNameInfo);
}
if (NULL != pNameInfo)
{
csiFreeCertNameInfo(pNameInfo);
}
return fInvalidRDN;
}
/*HRESULT ExtractCommonName(LPCWSTR pcwszDN, LPWSTR* ppwszCN)
{
HRESULT hr = S_OK;
WCHAR* pszComma;
LPWSTR pwszDNUpperCase = NULL;
const WCHAR* pszCN = pcwszDN;
if(0!=_wcsnicmp(pcwszDN, L"CN=", wcslen(L"CN=")))
{
hr = E_INVALIDARG;
_JumpError(hr, error,
"distinguished name doesn't start with the common name");
}
pszCN += wcslen(L"CN=");
while(iswspace(*pszCN))
pszCN++;
pszComma = wcsstr(pszCN, L",");
DWORD iChars;
if (pszComma == NULL)
{
// ONLY CN= string, no additional names
iChars = wcslen(pszCN);
}
else
{
iChars = SAFE_SUBTRACT_POINTERS(pszComma, pszCN);
}
if(0==iChars)
{
hr = E_INVALIDARG;
_JumpError(hr, error,
"invalid syntax, common name should follow CN=");
}
*ppwszCN = (LPWSTR)LocalAlloc(LMEM_FIXED, (iChars+1)*sizeof(WCHAR));
_JumpIfAllocFailed(*ppwszCN, error);
CopyMemory(*ppwszCN, pszCN, iChars*sizeof(WCHAR));
(*ppwszCN)[iChars] = L'\0';
error:
LOCAL_FREE(pwszDNUpperCase);
return hr;
}*/
HRESULT
HandleIdInfoWizNextOrBack(
HWND hDlg,
PER_COMPONENT_DATA *pComp,
PAGESTRINGS *pIdPageString,
int iWizBN)
{
HRESULT hr;
WCHAR *pwszSanitizedName = NULL;
CASERVERSETUPINFO *pServer = pComp->CA.pServer;
BOOL fDontNext = FALSE;
WCHAR wszCountryCode[cchCOUNTRYNAMEMAX+1];
HWND hwnd;
DWORD size;
DWORD i;
BOOL fValidDigitString;
WCHAR * pwszFullPath = NULL;
WCHAR * pwszDir = NULL;
DWORD cDirLen;
hr = FinishWizardPageEditControls(hDlg, pIdPageString);
_JumpIfError(hr, error, "FinishWizardPageEditControls");
if (PSN_WIZBACK == iWizBN)
{
goto done;
}
hr = WizardPageValidation(pComp->hInstance, pComp->fUnattended,
hDlg, pIdPageString);
if (S_OK != hr)
{
_PrintError(hr, "WizardPageValidation");
fDontNext = TRUE;
goto done;
}
// snag the full DN specified
if (NULL != pServer->pwszCACommonName)
{
LocalFree(pServer->pwszCACommonName);
pServer->pwszCACommonName = NULL;
}
if (NULL != pServer->pwszFullCADN)
{
LocalFree(pServer->pwszFullCADN);
pServer->pwszFullCADN = NULL;
}
if (NULL != pServer->pwszDNSuffix)
{
LocalFree(pServer->pwszDNSuffix);
pServer->pwszDNSuffix = NULL;
}
myUIGetWindowText(GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT), &pServer->pwszCACommonName);
myUIGetWindowText(GetDlgItem(hDlg, IDC_IDINFO_NAMEPREVIEW), &pServer->pwszFullCADN);
myUIGetWindowText(GetDlgItem(hDlg, IDC_IDINFO_DNSUFFIXEDIT), &pServer->pwszDNSuffix);
// if generate a new cert
if (NULL == pServer->pccExistingCert &&
IsAnyInvalidRDN(hDlg, pComp))
{
fDontNext = TRUE;
goto done;
}
// if we are not using an existing cert, verify the chosen validity
// period of the new cert.
if (NULL==pServer->pccExistingCert)
{
// convert validity count string to a number
pServer->dwValidityPeriodCount = myWtoI(
pServer->pwszValidityPeriodCount,
&fValidDigitString);
if (!fValidDigitString ||
!IsValidPeriod(pServer))
{
// validity out of range, put out a warning dlg
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_IDINFO_INVALID_VALIDITY,
0,
NULL);
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_IDINFO_EDIT_VALIDITYCOUNT), 0, -1);
_PrintError(E_INVALIDARG, "invalid validity");
fDontNext = TRUE;
goto done;
}
}
// get sanitized name
hr = mySanitizeName(pServer->pwszCACommonName, &pwszSanitizedName);
_JumpIfError(hr, error, "mySanitizeName");
CSILOG(
hr,
IDS_ILOG_SANITIZEDNAME,
pwszSanitizedName,
NULL,
NULL);
if (MAX_PATH <= wcslen(pwszSanitizedName) + cwcSUFFIXMAX)
{
CertMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_KEYNAMETOOLONG,
S_OK,
MB_ICONWARNING | CMB_NOERRFROMSYS,
pwszSanitizedName);
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT), 0, -1);
fDontNext = TRUE;
goto done;
}
// if we are making a new key, see if a key by that name already exists.
// if it does, see if the user wants to overwrite it.
if (NULL == pServer->pwszKeyContainerName)
{
if (S_OK == DetermineKeyExistence(pServer->pCSPInfo, pwszSanitizedName))
{
// warn user if key exist
if (IDYES != CertMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_WRN_OVERWRITEEXISTINGKEY,
S_OK,
MB_YESNO |
MB_ICONWARNING |
MB_DEFBUTTON2 |
CMB_NOERRFROMSYS,
pServer->pwszCACommonName))
{
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT), 0, -1);
fDontNext = TRUE;
goto done;
}
}
}
if (NULL != pServer->pwszSanitizedName)
{
// free old
LocalFree(pServer->pwszSanitizedName);
}
pServer->pwszSanitizedName = pwszSanitizedName;
pwszSanitizedName = NULL;
if (pServer->fUseDS)
{
if (IsCAExistInDS(pServer->pwszSanitizedName))
{
int ret = CertMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_IDINFO_CAEXISTINDS,
0,
MB_YESNO |
MB_ICONWARNING |
CMB_NOERRFROMSYS,
NULL);
if (IDYES != ret)
{
// not overwrite
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT), 0, -1);
fDontNext = TRUE;
goto done;
}
else
{
hr = RemoveCAInDS(pServer->pwszSanitizedName);
if(hr != S_OK)
{
_PrintError(hr, "RemoveCAInDS");
SetEditFocusAndSelect(GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT), 0, -1);
fDontNext = TRUE;
goto done;
}
}
}
}
hr = UpdateDomainAndUserName(hDlg, pComp);
_JumpIfError(hr, error, "UpdateDomainAndUserName");
if(pServer->fUseDS)
{
pServer->dwRevocationFlags = REVEXT_DEFAULT_DS;
}
else
{
pServer->dwRevocationFlags = REVEXT_DEFAULT_NODS;
}
// validate cert file path lenght
cDirLen = wcslen(pComp->pwszSystem32)+
wcslen(wszCERTENROLLSHAREPATH) + 1;
pwszDir = (WCHAR *) LocalAlloc(LMEM_FIXED, cDirLen * sizeof(WCHAR));
if (NULL == pwszDir)
{
hr = E_OUTOFMEMORY;
_JumpError(hr, error, "LocalAlloc");
}
wcscpy(pwszDir, pComp->pwszSystem32); // has trailing "\\"
wcscat(pwszDir, wszCERTENROLLSHAREPATH);
hr = csiBuildFileName(
pwszDir,
pServer->pwszSanitizedName,
L".crt",
0,
&pwszFullPath,
pComp->hInstance,
pComp->fUnattended,
hDlg);
_JumpIfError(hr, error, "csiBuildFileName");
if (MAX_PATH <= wcslen(pwszFullPath) + cwcSUFFIXMAX)
{
// pop up warning
CertWarningMessageBox(
pComp->hInstance,
pComp->fUnattended,
hDlg,
IDS_PATH_TOO_LONG_CANAME,
S_OK,
pwszFullPath);
fDontNext = TRUE;
goto done;
}
done:
if (fDontNext)
{
SetWindowLongPtr(hDlg, DWLP_MSGRESULT, TRUE); // forbid
}
else
{
pServer->LastWiz = ENUM_WIZ_IDINFO;
}
hr = S_OK;
error:
if (NULL != pwszSanitizedName)
{
LocalFree(pwszSanitizedName);
}
if(NULL != pwszFullPath)
{
LocalFree(pwszFullPath);
}
if(NULL != pwszDir)
{
LocalFree(pwszDir);
}
return hr;
}
PAGESTRINGS g_aIdPageString[] =
{
{
IDC_IDINFO_NAMEEDIT,
IDS_LOG_CANAME,
IDS_IDINFO_NAMENULLSTRERR,
IDS_IDINFO_NAMELENSTRERR,
cchCOMMONNAMEMAX,
NULL,
},
{
IDC_IDINFO_EDIT_VALIDITYCOUNT,
IDS_LOG_VALIDITY,
IDS_IDINFO_VALIDITYNULLSTRERR,
IDS_IDINFO_VALIDITYLENSTRERR,
UB_VALIDITY,
NULL,
},
// you need to add code in HookIdInfoPageStrings if adding more...
{
0,
0,
0,
0,
0,
NULL,
}
};
LRESULT CALLBACK
IdInfoNameEditFilterHook(
HWND hwnd,
UINT iMsg,
WPARAM wParam,
LPARAM lParam)
{
WCHAR rgchUpper[] = {'\0', '\0'};
switch(iMsg)
{
case WM_CHAR:
if ((WCHAR)wParam == L',')
{
MessageBeep(0xFFFFFFFF);
return 0;
break;
}
break;
default:
break;
}
return CallWindowProc(g_pfnIdInfoWndProcs,
hwnd,
iMsg,
wParam,
lParam);
return 0;
}
//-------------------------------------------------------------------------
// WizIdInfoPageDlgProc
//-------------------------------------------------------------------------
INT_PTR
WizIdInfoPageDlgProc(HWND hDlg, UINT iMsg, WPARAM wParam, LPARAM lParam)
{
PER_COMPONENT_DATA *pComp = NULL;
switch(iMsg)
{
case WM_INITDIALOG:
// point to component data
SetWindowLongPtr(hDlg, DWLP_USER,
(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam);
pComp = (PER_COMPONENT_DATA*)(ULONG_PTR)((PROPSHEETPAGE*)lParam)->lParam;
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = InitIdInfoWizControls(hDlg,
g_aIdPageString,
pComp);
_ReturnIfWizError(pComp->hrContinue);
break;
case WM_COMMAND:
switch (LOWORD(wParam))
{
case IDC_IDINFO_NAMEEDIT:
case IDC_IDINFO_DNSUFFIXEDIT:
if (HIWORD(wParam) == EN_CHANGE)
{
CAutoLPWSTR pwszCAName, pwszDNSuffix, pwszFullDN;
CASERVERSETUPINFO* pServer;
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pServer = pComp->CA.pServer;
// if using existing certs ignore the notification
// to avoid building the full DN
if(pServer->pccExistingCert)
{
break;
}
pComp->hrContinue = myUIGetWindowText(
GetDlgItem(hDlg, IDC_IDINFO_NAMEEDIT),
&pwszCAName);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = myUIGetWindowText(
GetDlgItem(hDlg, IDC_IDINFO_DNSUFFIXEDIT),
&pwszDNSuffix);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = BuildFullDN(
pwszCAName,
pwszDNSuffix,
&pwszFullDN);
_ReturnIfWizError(pComp->hrContinue);
SetDlgItemText(
hDlg,
IDC_IDINFO_NAMEPREVIEW,
pwszFullDN);
}
break;
case IDC_IDINFO_EDIT_VALIDITYCOUNT:
break;
case IDC_IDINFO_COMBO_VALIDITYSTRING:
switch (HIWORD(wParam))
{
case CBN_SELCHANGE:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleValidityStringChange(
hDlg,
pComp->CA.pServer);
_ReturnIfWizError(pComp->hrContinue);
break;
}
break;
}
break;
case WM_NOTIFY:
switch (((NMHDR FAR *) lParam)->code)
{
case PSN_KILLACTIVE:
break;
case PSN_RESET:
break;
case PSN_QUERYCANCEL:
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
return CertConfirmCancel(hDlg, pComp);
break;
case PSN_SETACTIVE:
CSILOGDWORD(IDS_IDINFO_TITLE, dwWIZACTIVE);
PropSheet_SetWizButtons(GetParent(hDlg), PSWIZB_BACK|PSWIZB_NEXT);
pComp = _GetCompDataOrReturn(pComp, hDlg);
_DisableWizDisplayIfError(pComp, hDlg);
_ReturnIfWizError(pComp->hrContinue);
pComp->hrContinue = HandleIdInfoWizActive(hDlg,
pComp,
g_aIdPageString);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZBACK:
CSILOGDWORD(IDS_IDINFO_TITLE, dwWIZBACK);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleIdInfoWizNextOrBack(
hDlg, pComp, g_aIdPageString, PSN_WIZBACK);
_ReturnIfWizError(pComp->hrContinue);
break;
case PSN_WIZNEXT:
CSILOGDWORD(IDS_IDINFO_TITLE, dwWIZNEXT);
pComp = _GetCompDataOrReturnIfError(pComp, hDlg);
pComp->hrContinue = HandleIdInfoWizNextOrBack(
hDlg, pComp, g_aIdPageString, PSN_WIZNEXT);
_ReturnIfWizError(pComp->hrContinue);
break;
default:
return FALSE;
}
break;
default:
return FALSE;
}
return TRUE;
}