windows-nt/Source/XPSP1/NT/inetsrv/iis/ui/itools/keyring/creating.cpp

663 lines
19 KiB
C++
Raw Normal View History

2020-09-26 03:20:57 -05:00
// CreatingKeyDlg.cpp : implementation file
//
#include "stdafx.h"
#include "resource.h"
#include "keyobjs.h"
#include "NKChseCA.h"
#include "NKDN.h"
#include "NKDN2.h"
#include "NKKyInfo.h"
#include "NKUsrInf.h"
#include "Creating.h"
#include "certcli.h"
#include "OnlnAuth.h"
#include "intrlkey.h"
#define SECURITY_WIN32
extern "C"
{
#include <wincrypt.h>
#include <Sslsp.h>
#include <sspi.h>
#include <issperr.h>
}
#ifdef _DEBUG
#define new DEBUG_NEW
#undef THIS_FILE
static char THIS_FILE[] = __FILE__;
#endif
UINT MyThreadProc( LPVOID pParam );
/////////////////////////////////////////////////////////////////////////////
// CCreateKeyProgThread thread controller
/////////////////////////////////////////////////////////////////////////////
// CCreatingKeyDlg dialog
//----------------------------------------------------------------
CCreatingKeyDlg::CCreatingKeyDlg(CWnd* pParent /*=NULL*/)
: CDialog(CCreatingKeyDlg::IDD, pParent),
m_cbPrivateKey( 0 ),
m_pPrivateKey( NULL ),
m_cbCertificate( 0 ),
m_pCertificate( NULL ),
m_cbCertificateRequest( 0 ),
m_pCertificateRequest( NULL ),
m_pKey( NULL ),
m_pService( NULL ),
m_fResubmitKey( FALSE ),
m_fRenewExistingKey( FALSE ),
m_fGenerateKeyPair( FALSE )
{
//{{AFX_DATA_INIT(CCreatingKeyDlg)
m_sz_message = _T("");
//}}AFX_DATA_INIT
}
//----------------------------------------------------------------
CCreatingKeyDlg::~CCreatingKeyDlg()
{
// now that I'm adding a header in front of the requests, we need
// to dispose of it here.
if ( m_pCertificateRequest )
GlobalFree( m_pCertificateRequest );
m_pCertificateRequest = NULL;
}
//----------------------------------------------------------------
void CCreatingKeyDlg::DoDataExchange(CDataExchange* pDX)
{
CDialog::DoDataExchange(pDX);
//{{AFX_DATA_MAP(CCreatingKeyDlg)
DDX_Control(pDX, IDC_MESSAGE, m_cstatic_message);
DDX_Control(pDX, IDOK, m_btn_ok);
DDX_Control(pDX, IDC_GRINDER_ANIMATION, m_animation);
DDX_Text(pDX, IDC_MESSAGE, m_sz_message);
//}}AFX_DATA_MAP
}
//----------------------------------------------------------------
BEGIN_MESSAGE_MAP(CCreatingKeyDlg, CDialog)
//{{AFX_MSG_MAP(CCreatingKeyDlg)
// NOTE: the ClassWizard will add message map macros here
//}}AFX_MSG_MAP
END_MESSAGE_MAP()
/////////////////////////////////////////////////////////////////////////////
// CCreatingKeyDlg message handlers
//----------------------------------------------------------------
// override virtual oninitdialog
BOOL CCreatingKeyDlg::OnInitDialog( )
{
// tell the user that we are generating the new key request
// might as well do that here, since it is first
m_sz_message.LoadString( IDS_GRIND_GENERATING );
// call the base oninit
CDialog::OnInitDialog();
// disable the ok button
m_btn_ok.EnableWindow( FALSE );
// tell the animation control to set itself up
CString szAnimName;
szAnimName.LoadString(IDS_CREATING_ANIMATION);
m_animation.Open( IDR_AVI_CREATING_KEY );
// start up the worker thread
AfxBeginThread( (AFX_THREADPROC)MyThreadProc, this);
// return 0 to say we set the default item
// return 1 to just select the default default item
return 1;
}
//----------------------------------------------------------------
UINT MyThreadProc( LPVOID pParam )
{
CCreatingKeyDlg* pDlg = (CCreatingKeyDlg*)pParam;
BOOL fSuccess = TRUE;
// this thread needs its own coinitialize
HRESULT hRes = CoInitialize(NULL);
if ( FAILED(hRes) )
return GetLastError();
// if the flag is set, generate the key pair
if ( pDlg->m_fGenerateKeyPair )
fSuccess = pDlg->FGenerateKeyPair();
// do the work that needs to get done
if ( fSuccess )
{
// if the request was generated, go to post
pDlg->PostGenerateKeyPair();
}
else
{
// we weren't able to generate the keypair. Leave.
AfxMessageBox( IDS_GEN_KEYPAIR_ERR );
pDlg->EndDialog( IDCANCEL );
}
// return
return 0;
}
//------------------------------------------------------------------------------
void CCreatingKeyDlg::PostGenerateKeyPair()
{
BOOL fPlacedRequest = TRUE;
// first we create the new key object and fill it in as best we can
if ( !m_pKey )
{
ASSERT( !m_fRenewExistingKey );
ASSERT( !m_fResubmitKey );
try
{
CreateNewKey();
}
catch (CException e)
{
AfxMessageBox( IDS_GEN_KEYPAIR_ERR );
EndDialog( IDCANCEL );
return;
}
}
// if we are renewing an existing key, target the key appropriately
if ( m_fRenewExistingKey )
RetargetKey();
// if resubmitting the key, do so
if ( m_fResubmitKey )
{
// tell the user that we are attempting to submit the request
m_sz_message.LoadString( IDS_GRIND_RESUBMITTING );
m_cstatic_message.SetWindowText(m_sz_message);
// submit the request
SubmitRequestToAuthority();
}
else
// send the request off to the online service, if that was chosen.
if ( m_ppage_Choose_CA && m_ppage_Choose_CA->m_nkca_radio == 1 )
{
// tell the user that we are attempting to submit the request
m_sz_message.LoadString( IDS_GRIND_SUBMITTING );
m_cstatic_message.SetWindowText(m_sz_message);
// submit the request
SubmitRequestToAuthority();
}
else
// if targeted as such, write it to the file
{
// write the request out
fPlacedRequest = WriteRequestToFile();
}
// one final show string
// NOTE: cannot use UpdateData because we are in a different
// thread than the dialog. UpdateData crashes.
if ( fPlacedRequest )
m_cstatic_message.SetWindowText(m_sz_message);
else
{
m_sz_message.LoadString( IDS_IO_ERROR );
m_cstatic_message.SetWindowText(m_sz_message);
}
// activate the ok button so we can close
m_btn_ok.EnableWindow( TRUE );
// stop the avi from spinning. That would give the wrong impression
m_animation.Stop();
}
//------------------------------------------------------------------------------
BOOL CCreatingKeyDlg::RetargetKey()
{
ASSERT( m_ppage_Choose_CA );
LPREQUEST_HEADER pHeader = (LPREQUEST_HEADER)m_pKey->m_pCertificateRequest;
// if we are sending the key to an online authority, record which one
if ( m_ppage_Choose_CA->m_nkca_radio == 1 )
{
// get the path of the authority dll
CString szCA;
if ( m_ppage_Choose_CA->GetSelectedCA(szCA) == ERROR_SUCCESS )
{
// fill in the rest of the request header, indicating the online authority
pHeader->fReqSentToOnlineCA = TRUE;
strncpy( pHeader->chCA, szCA, MAX_PATH-1 );
}
}
else
{
// clear it for the file
pHeader->fReqSentToOnlineCA = FALSE;
}
return TRUE;
}
//------------------------------------------------------------------------------
void CCreatingKeyDlg::CreateNewKey()
{
// create the new key object
m_pKey = m_pService->PNewKey();
// put in the name of the key
m_pKey->SetName( m_ppage_Key_Info->m_nkki_sz_name );
// put in the password too
m_pKey->m_szPassword = m_ppage_Key_Info->m_nkki_sz_password;
// set the private data into place
ASSERT( m_cbPrivateKey );
ASSERT( m_pPrivateKey );
m_pKey->m_cbPrivateKey = m_cbPrivateKey;
m_pKey->m_pPrivateKey = m_pPrivateKey;
// set the request into place
// not quite as simple because now we have the header that goes in first.
ASSERT( m_cbCertificateRequest );
ASSERT( m_pCertificateRequest );
// allocate the the request pointer - include space for the header
DWORD cbRequestAndHeader = m_cbCertificateRequest + sizeof(KeyRequestHeader);
m_pKey->m_cbCertificateRequest = cbRequestAndHeader;
m_pKey->m_pCertificateRequest = GlobalAlloc( GPTR, cbRequestAndHeader );
ASSERT( m_pKey->m_pCertificateRequest );
if ( !m_pKey->m_pCertificateRequest ) AfxThrowMemoryException();
// fill in the basic header. Assume there is no online ca for now
ZeroMemory( m_pKey->m_pCertificateRequest, sizeof(KeyRequestHeader) );
LPREQUEST_HEADER pHeader = (LPREQUEST_HEADER)m_pKey->m_pCertificateRequest;
pHeader->Identifier = REQUEST_HEADER_IDENTIFIER; // required
pHeader->Version = REQUEST_HEADER_CURVERSION; // required
pHeader->cbSizeOfHeader = sizeof(KeyRequestHeader); // required
pHeader->cbRequestSize = m_cbCertificateRequest; // required
// copy over the request data
memcpy( (PUCHAR)m_pKey->m_pCertificateRequest + sizeof(KeyRequestHeader),
(PUCHAR)m_pCertificateRequest, m_cbCertificateRequest );
// if we are sending the key to an online authority, record which one
if ( m_ppage_Choose_CA->m_nkca_radio == 1 )
{
// get the path of the authority dll
CString szCA;
if ( m_ppage_Choose_CA->GetSelectedCA(szCA) == ERROR_SUCCESS )
{
// fill in the rest of the request header, indicating the online authority
pHeader->fReqSentToOnlineCA = TRUE;
strncpy( pHeader->chCA, szCA, MAX_PATH-1 );
}
}
}
//------------------------------------------------------------------------------
BOOL CCreatingKeyDlg::SubmitRequestToAuthority()
{
DWORD err;
BOOL fAnswer = FALSE;
HINSTANCE hLibrary = NULL;
PUCHAR pEncoded;
DWORD cbEncoded = m_pKey->m_cbCertificateRequest;
PUCHAR pResponse;
HRESULT hErr;
LPTSTR szTCert;
CString szRawCert;
BSTR bstrCert = NULL;
BSTR bstrDisposition = NULL;
LPREQUEST_HEADER pHeader = (LPREQUEST_HEADER)m_pKey->m_pCertificateRequest;
// make sure the header is a valid version (the K2 alpha/beta1 version is no
// longer valid because the interface to the CA server has totally changed.
// specifically we now track GUIDs instead of dll paths
if ( pHeader->Version < REQUEST_HEADER_K2B2VERSION )
{
m_sz_message.LoadString( IDS_CA_ERROR );
AfxMessageBox( IDS_INVALID_CA_REQUEST_OLD );
return FALSE;
}
// initialize the authority object
// prepare the authority object
COnlineAuthority authority;
if ( !authority.FInitSZ(pHeader->chCA) )
{
m_sz_message.LoadString( IDS_CA_ERROR );
AfxMessageBox( IDS_CA_NO_INTERFACE );
return FALSE;
}
// get the previously set up configuration string
BSTR bstrConfig = NULL;
if ( !authority.FGetPropertyString( &bstrConfig ) )
{
m_sz_message.LoadString( IDS_CA_ERROR );
AfxMessageBox( IDS_CA_NO_INTERFACE );
return FALSE;
}
// YES - I HAVE tried to pass this in as binary, but that doesn't seem to work right now.
// generate a base-64 encoded request
DWORD cbReq = m_pKey->m_cbCertificateRequest;
PUCHAR preq = PCreateEncodedRequest( m_pKey->m_pCertificateRequest, &cbReq, FALSE );
preq[cbReq] = 0;
// Great. Now this needs to be unicode.
OLECHAR* poch = NULL;
// get the number of characters in the encoded request, plus some
DWORD cchReq = _tcslen((PCHAR)preq) + 60;
poch = (OLECHAR*)GlobalAlloc( GPTR, cchReq * 2 );
// unicodize the name into the buffer
if ( poch )
MultiByteToWideChar( CP_ACP, MB_PRECOMPOSED, (PCHAR)preq, -1,
poch, cchReq );
// prepare the BSTR containing the request
BSTR bstrRequest = NULL;
bstrRequest = SysAllocString(poch);
// cleanup
GlobalFree( poch );
// prepare the extra attributes string
BSTR bstrAttrib = NULL;
WORD zero = 0;
bstrAttrib = SysAllocString(&zero);
LONG longDisposition;
// if this is the first time for this cert, call the submit method
if ( !pHeader->fWaitingForApproval )
{
// set the flag
pHeader->fReqSentToOnlineCA = TRUE;
// make the call
hErr = authority.pIRequest->Submit(
// CR_IN_BINARY | CR_IN_PKCS10,
CR_IN_BASE64HEADER | CR_IN_PKCS10,
bstrRequest,
bstrAttrib,
bstrConfig,
&longDisposition);
// get the full error message text
authority.pIRequest->GetDispositionMessage( &bstrDisposition );
// get the string out and put it in m_sz_message
BuildAuthErrorMessage( bstrDisposition, hErr );
// no matter what, try to get the request ID
authority.pIRequest->GetRequestId( &pHeader->longRequestID );
}
else
// if it has already been submitted, call the pending method
{
// make the call
hErr = authority.pIRequest->RetrievePending(
pHeader->longRequestID,
bstrConfig,
&longDisposition);
// get the full error message text
authority.pIRequest->GetDispositionMessage( &bstrDisposition );
// get the string out and put it in m_sz_message
BuildAuthErrorMessage( bstrDisposition, hErr );
}
// do the appropriate thing depending on the disposition of the response
switch( longDisposition )
{
case CR_DISP_INCOMPLETE:
case CR_DISP_ERROR:
case CR_DISP_DENIED:
// error message obtained via BuildAuthErrorMessage above
break;
case CR_DISP_UNDER_SUBMISSION:
// we need to try again later
m_sz_message.LoadString( IDS_GRIND_DELAYED );
// set the waiting for response flag
pHeader->fWaitingForApproval = TRUE;
break;
case CR_DISP_ISSUED_OUT_OF_BAND:
case CR_DISP_ISSUED:
// get the certificate
hErr = authority.pIRequest->GetCertificate( CR_OUT_BASE64HEADER, &bstrCert);
if ( FAILED(hErr) )
{
// get the detailed error disposition string - reuse bstrAttrib
authority.pIRequest->GetDispositionMessage( &bstrDisposition );
// get the string out and put it in m_sz_message
BuildAuthErrorMessage( bstrDisposition, hErr );
break;
}
// make sure the "waiting" flag is cleared
pHeader->fWaitingForApproval = FALSE;
// extract the certificate from the bstr
szRawCert = bstrCert;
szTCert = szRawCert.GetBuffer(szRawCert.GetLength()+1);
// great. The last thing left is to uudecode the data we got
uudecode_cert( szTCert, &m_pKey->m_cbCertificate );
//copy it into place
if ( m_pKey->m_pCertificate )
GlobalFree( m_pKey->m_pCertificate );
m_pKey->m_pCertificate = GlobalAlloc( GPTR, m_pKey->m_cbCertificate );
CopyMemory( m_pKey->m_pCertificate, szTCert, m_pKey->m_cbCertificate );
szRawCert.ReleaseBuffer(0);
// tell the key it is done
// success! Let the user know about it
m_sz_message.LoadString( IDS_GRIND_SUCCESS );
// cleanup
fAnswer = TRUE;
break;
};
// clean up all the bstrings
if ( bstrCert ) SysFreeString( bstrCert );
if ( bstrConfig ) SysFreeString( bstrConfig );
if ( bstrRequest ) SysFreeString( bstrRequest );
if ( bstrAttrib ) SysFreeString( bstrAttrib );
if ( bstrDisposition ) SysFreeString( bstrDisposition );
// return the answer
return fAnswer;
}
//------------------------------------------------------------------------------
void CCreatingKeyDlg::BuildAuthErrorMessage( BSTR bstrMesage, HRESULT hErr )
{
// set the header to the message first
m_sz_message.LoadString( IDS_GRIND_ONLINE_FAILURE );
// add the specific message from the certificate authority
if ( bstrMesage )
m_sz_message += bstrMesage;
// get the error code part going too.
CString szErr;
szErr.LoadString( IDS_ERR_GENERIC_ERRCODE );
// put it all together
m_sz_message.Format( "%s%s%x", m_sz_message, szErr, hErr );
}
//------------------------------------------------------------------------------
BOOL CCreatingKeyDlg::WriteRequestToFile()
{
// fill in a admin info structure
ADMIN_INFO info;
info.pName = &m_ppage_User_Info->m_nkui_sz_name;
info.pEmail = &m_ppage_User_Info->m_nkui_sz_email;
info.pPhone = &m_ppage_User_Info->m_nkui_sz_phone;
if ( m_ppage_DN )
{
info.pCommonName = &m_ppage_DN->m_nkdn_sz_CN;
info.pOrgUnit = &m_ppage_DN->m_nkdn_sz_OU;
info.pOrg = &m_ppage_DN->m_nkdn_sz_O;
info.pLocality = &m_ppage_DN2->m_nkdn2_sz_L;
info.pState = &m_ppage_DN2->m_nkdn2_sz_S;
info.pCountry = &m_ppage_DN2->m_nkdn2_sz_C;
}
else
{
info.pCommonName = NULL;
info.pOrgUnit = NULL;
info.pOrg = NULL;
info.pLocality = NULL;
info.pState = NULL;
info.pCountry = NULL;
}
// tell the key to write itself out to the disk
if ( !m_pKey->FOutputRequestFile( m_ppage_Choose_CA->m_nkca_sz_file, FALSE, &info ) )
return FALSE;
// tell the user its there
m_sz_message.LoadString( IDS_GRIND_FILE );
m_sz_message += m_ppage_Choose_CA->m_nkca_sz_file;
// success
return TRUE;
}
//------------------------------------------------------------------------------
BOOL CCreatingKeyDlg::FGenerateKeyPair()
{
BOOL fSuccess = FALSE;
CString szDistinguishedName;
SSL_CREDENTIAL_CERTIFICATE certs;
LPTSTR pSzDN, pSzPassword;
BOOL fAddComma = FALSE;
// generate the distinguished name string
try
{
szDistinguishedName.Empty();
// we should never put an empty parameter in the list
// start with the country code
if ( !m_ppage_DN2->m_nkdn2_sz_C.IsEmpty() )
{
szDistinguishedName = SZ_KEY_COUNTRY;
szDistinguishedName += m_ppage_DN2->m_nkdn2_sz_C;
fAddComma = TRUE;
}
// now add on the state/province
if ( !m_ppage_DN2->m_nkdn2_sz_S.IsEmpty() )
{
if ( fAddComma )
szDistinguishedName += ",";
szDistinguishedName += SZ_KEY_STATE;
szDistinguishedName += m_ppage_DN2->m_nkdn2_sz_S;
fAddComma = TRUE;
}
// now add on the locality
if ( !m_ppage_DN2->m_nkdn2_sz_L.IsEmpty() )
{
if ( fAddComma )
szDistinguishedName += ",";
szDistinguishedName += SZ_KEY_LOCALITY;
szDistinguishedName += m_ppage_DN2->m_nkdn2_sz_L;
fAddComma = TRUE;
}
// now add on the organization
if ( !m_ppage_DN->m_nkdn_sz_O.IsEmpty() )
{
if ( fAddComma )
szDistinguishedName += ",";
szDistinguishedName += SZ_KEY_ORGANIZATION;
szDistinguishedName += m_ppage_DN->m_nkdn_sz_O;
fAddComma = TRUE;
}
// now add on the organizational unit (optional)
if ( !m_ppage_DN->m_nkdn_sz_OU.IsEmpty() )
{
if ( fAddComma )
szDistinguishedName += ",";
szDistinguishedName += SZ_KEY_ORGUNIT;
szDistinguishedName += m_ppage_DN->m_nkdn_sz_OU;
fAddComma = TRUE;
}
// now add on the common name (netaddress)
if ( !m_ppage_DN->m_nkdn_sz_CN.IsEmpty() )
{
if ( fAddComma )
szDistinguishedName += ",";
szDistinguishedName += SZ_KEY_COMNAME;
szDistinguishedName += m_ppage_DN->m_nkdn_sz_CN;
fAddComma = TRUE;
}
}
catch( CException e )
{
return FALSE;
}
// prep the strings - we need a pointer to the data
pSzDN = szDistinguishedName.GetBuffer( szDistinguishedName.GetLength()+2 );
pSzPassword = m_ppage_Key_Info->m_nkki_sz_password.GetBuffer(
m_ppage_Key_Info->m_nkki_sz_password.GetLength()+2 );
// zero out the certs
ZeroMemory( &certs, sizeof(certs) );
// generate the key pair
fSuccess = SslGenerateKeyPair( &certs, pSzDN, pSzPassword, m_ppage_Key_Info->m_nBits );
// release the string buffers
m_ppage_Key_Info->m_nkki_sz_password.ReleaseBuffer( -1 );
szDistinguishedName.ReleaseBuffer( -1 );
// if generating the key pair failed, leave now
if ( !fSuccess )
{
return FALSE;
}
// store away the cert and the key
m_cbPrivateKey = certs.cbPrivateKey;
m_pPrivateKey = certs.pPrivateKey;
m_cbCertificateRequest = certs.cbCertificate;
m_pCertificateRequest = certs.pCertificate;
// return the success flag
return fSuccess;
}