//+------------------------------------------------------------------------- // // Microsoft Windows // // Copyright (C) Microsoft Corporation, 1997 - 1999 // // File: initcert.h // //-------------------------------------------------------------------------- #ifndef __INITCERT_H__ #define __INITCERT_H__ typedef enum { CS_UPGRADE_UNKNOWN = 0, CS_UPGRADE_NO, // install //CS_UPGRADE_NT4SP4 =2, // upgrade from NT4 certsrv v10 or SP4 with certsrv // upg unsupported //CS_UPGRADE_NT5BETA2 =3, // upgrade from NT5 Beta 2 // upg unsupported //CS_UPGRADE_NT5BETA3 =4, // upgrade from NT5 Beta 3 // upg unsupported CS_UPGRADE_WIN2000 =5, // upgrade from Win2K CS_UPGRADE_UNSUPPORTED, // upgrade is not supported CS_UPGRADE_WHISTLER, // upgrade from build to build } CS_ENUM_UPGRADE; typedef enum { ENUM_WIZ_UNKNOWN = 0, ENUM_WIZ_OCM, ENUM_WIZ_CATYPE, ENUM_WIZ_ADVANCE, ENUM_WIZ_IDINFO, ENUM_WIZ_KEYGEN, ENUM_WIZ_STORE, ENUM_WIZ_REQUEST, } ENUM_WIZPAGE; typedef struct csp_hash_tag { ALG_ID idAlg; WCHAR *pwszName; struct csp_hash_tag *next; struct csp_hash_tag *last; } CSP_HASH; typedef struct csp_info_tag { DWORD dwProvType; WCHAR *pwszProvName; BOOL fMachineKeyset; struct csp_info_tag *next; struct csp_info_tag *last; CSP_HASH *pHashList; } CSP_INFO; typedef struct key_list_tag { WCHAR *pwszName; struct key_list_tag *next; struct key_list_tag *last; } KEY_LIST; typedef struct tagCAServerSetupInfo { // setup attributes // 0x0000 ENUM_CATYPES CAType; WCHAR *pwszCACommonName; // 0x0020 BOOL fAdvance; CSP_INFO *pCSPInfo; // currently selected CSP CSP_HASH *pHashInfo; // currently selected hash algorithm DWORD dwKeyLength; ENUM_PERIOD enumValidityPeriod; DWORD dwValidityPeriodCount; BOOL fUseDS; // 0x0040 WCHAR *pwszSharedFolder; WCHAR *pwszDBDirectory; WCHAR *pwszLogDirectory; BOOL fSaveRequestAsFile; BOOL fCAsExist; WCHAR *pwszRequestFile; WCHAR *pwszParentCAMachine; WCHAR *pwszParentCAName; // 0x0060 BOOL fPreserveDB; BOOL fInteractiveService; // allow service to interact // with the desktop // setup intermediate attributes ENUM_WIZPAGE LastWiz; WCHAR *pwszSanitizedName; CSP_INFO *pCSPInfoList; // list of all available CSPs CSP_INFO *pDefaultCSPInfo; // obj representing default CSP, // not a CSP in pCSPInfoList CSP_HASH *pDefaultHashInfo; // object representing default // hash algorithm, not a hash // algorighm in the currently // selected CSP KEY_LIST *pKeyList; // list of key containers for // 0x0080 DWORD dwKeyLenMin; // minumum key length for the // currently selected CSP DWORD dwKeyLenMax; // maximum key length for the // currently selected CSP WCHAR *pwszValidityPeriodCount; LONG lExistingValidity; WCHAR *pwszCACertFile; HCERTSTORE hMyStore; CHAR *pszAlgId; BOOL fCertSrvWasRunning; // 0x00a0 FILETIME NotBefore; FILETIME NotAfter; DWORD dwRevocationFlags; // setup intermediate attributes for unattended WCHAR *pwszCAType; WCHAR *pwszValidityPeriodString; WCHAR *pwszHashAlgorithm; // 0x00c0 WCHAR *pwszKeyLength; BOOL fValidatedHashAndKey; WCHAR *pwszUseExistingCert; WCHAR *pwszPreserveDB; WCHAR *pwszPFXFile; WCHAR *pwszPFXPassword; WCHAR *pwszInteractiveService; // upgrade attributes DWORD dwUpgradeEditFlags; // 0x00e0 DWORD dwUpgradeRevFlags; BOOL fSavedCAInDS; BOOL fCreatedShare; WCHAR *pwszCustomPolicy; WCHAR *pwszzCustomExit; // * The following 2 variables replace these 5 variables: // fCreatedKey, // pwszRevertKey, // pwszImportKey, // pwszExistingKey, // fUseExistingKey // // * Invariant: fUseExistingKey == (NULL != pwszKeyContainerName) // // * pwszKeyContainerName should always contains the name of an existing // key container, or be NULL if a new key container needs to be created. // Once the new container is created, the variable holds the name of the // container. // // * Always use SetKeyContainerName() and ClearKeyContainerName() to modify // these variables. This makes sure that pwszDesanitizedKeyContainerName // is always in sync. WCHAR *pwszKeyContainerName; // exact name of the container // used by the CSP WCHAR *pwszDesanitizedKeyContainerName; // name displayed // to the user BOOL fDeletableNewKey; // TRUE iff the // 0x0100 // KeyContainerName points to a // key container that we should // delete if we don't use. BOOL fKeyGenFailed; // TRUE if KeyGen failed // * The following 1 variable replace these 4 variables: // fUseExistingCert, // fFoundMatchedCertInStore, // fMatchedCertType, // pSCertContextFromStore // // * Invariant: fUseExistingCert==(NULL!=pccExistingCert) // // * pccExistingCert should always be a pointer to an existing cert context, // or be NULL if we are not using an existing cert // // * Always use SetExistingCertToUse() and ClearExistingCertToUse() to // modify these variables. This makes sure that pccExistingCert is // properly freed. CERT_CONTEXT const *pccExistingCert; // an open cert context CERT_CONTEXT const *pccUpgradeCert; // CA Cert context for upgrade DWORD dwCertNameId; // CA Cert NameId BOOL fUNCPathNotFound; // flag for default shared folder // 0x0114 WCHAR *pwszDNSuffix; // CN=%1, DC=x, DC=y, DC=z -- dynamically generated template WCHAR *pwszFullCADN; } CASERVERSETUPINFO; typedef struct tagCAWebClientSetupInfo { WCHAR *pwszWebCAMachine; WCHAR *pwszWebCAName; WCHAR *pwszSanitizedWebCAName; BOOL fUseDS; WCHAR *pwszSharedFolder; ENUM_CATYPES WebCAType; } CAWEBCLIENTSETUPINFO; typedef struct tagCASetupInfo { CASERVERSETUPINFO *pServer; CAWEBCLIENTSETUPINFO *pClient; } CASETUPINFO; typedef struct _PER_COMPONENT_DATA { // component generic WCHAR *pwszComponent; // Component name from OCM HINF MyInfHandle; // Open inf handle to per-component inf DWORDLONG Flags; // Operation flags from SETUP_DATA structure OCMANAGER_ROUTINES HelperRoutines; // setup related HINSTANCE hInstance; HRESULT hrContinue; // set code if fatal error WCHAR *pwszCustomMessage; int iErrMsg; // set msg id for fatal error pop up BOOL fShownErr; // set to TRUE if pop up earlier so avoid double BOOL fUnattended; BOOL fPostBase; WCHAR *pwszUnattendedFile; WCHAR *pwszServerName; WCHAR *pwszServerNameOld; WCHAR *pwszSystem32; // CA related DWORD dwInstallStatus; CASETUPINFO CA; CS_ENUM_UPGRADE UpgradeFlag; BOOL fCreatedVRoot; } PER_COMPONENT_DATA; //+-------------------------------------------------------------------------- // Prototypes: HRESULT csiGetKeyList( IN DWORD dwProvType, IN WCHAR const *pwszProvName, IN BOOL fMachineKeySet, IN BOOL fSilent, OUT KEY_LIST **ppKeyList); VOID csiFreeKeyList( IN OUT KEY_LIST *pKeyList); HRESULT csiBuildRequest( OPTIONAL IN HINF hInf, OPTIONAL IN CERT_CONTEXT const *pccPrevious, IN BYTE const *pbSubjectEncoded, IN DWORD cbSubjectEncoded, IN char const *pszAlgId, IN BOOL fNewKey, IN DWORD iCert, IN DWORD iKey, IN HCRYPTPROV hProv, IN HWND hwnd, IN HINSTANCE hInstance, IN BOOL fUnattended, OUT BYTE **ppbEncode, OUT DWORD *pcbEncode); HRESULT csiBuildFileName( IN WCHAR const *pwszDirPath, IN WCHAR const *pwszSanitizedName, IN WCHAR const *pwszExt, IN DWORD iCert, OUT WCHAR **ppszOut, HINSTANCE hInstance, BOOL fUnattended, IN HWND hwnd); HRESULT csiBuildCACertFileName( IN HINSTANCE hInstance, IN HWND hwnd, IN BOOL fUnattended, OPTIONAL IN WCHAR const *pwszSharedFolder, IN WCHAR const *pwszSanitizedName, IN WCHAR const *pwszExt, IN DWORD iCert, OUT WCHAR **ppwszCACertFile); HRESULT csiGetCARequestFileName( IN HINSTANCE hInstance, IN HWND hwnd, IN WCHAR const *pwszSanitizedCAName, IN DWORD iCertNew, IN DWORD iKey, OUT WCHAR **ppwszRequestFile); BOOL csiWriteDERToFile( IN WCHAR const *pwszFileName, IN BYTE const *pbDER, IN DWORD cbDER, IN HINSTANCE hInstance, IN BOOL fUnattended, IN HWND hwnd); HRESULT csiBuildAndWriteCert( IN HCRYPTPROV hCryptProv, IN CASERVERSETUPINFO const *pServer, OPTIONAL IN WCHAR const *pwszFile, IN WCHAR const *pwszEnrollFile, OPTIONAL IN CERT_CONTEXT const *pCertContextFromStore, OPTIONAL OUT CERT_CONTEXT const **ppCertContextOut, IN WCHAR const *pwszCAType, IN HINSTANCE hInstance, IN BOOL fUnattended, IN HWND hwnd); VOID csiFreeCertNameInfo( IN OUT CERT_NAME_INFO *pNameInfo); HRESULT csiGetCRLPublicationURLTemplates( IN BOOL fUseDS, IN WCHAR const *pwszSystem32, OUT WCHAR **ppwszz); HRESULT csiGetCACertPublicationURLTemplates( IN BOOL fUseDS, IN WCHAR const *pwszSystem32, OUT WCHAR **ppwszz); HRESULT csiSetupCAInDS( IN HWND hwnd, IN WCHAR const *pwszCAServer, IN WCHAR const *pwszSanitizedCAName, IN WCHAR const *pwszCADisplayName, IN WCHAR const *pwszCADescription, IN ENUM_CATYPES caType, IN DWORD iCert, IN DWORD iCRL, IN BOOL fRenew, IN CERT_CONTEXT const *pCert); HRESULT csiFillKeyProvInfo( IN WCHAR const *pwszContainerName, IN WCHAR const *pwszProvName, IN DWORD dwProvType, IN BOOL const fMachineKeyset, OUT CRYPT_KEY_PROV_INFO *pKeyProvInfo); VOID csiFreeKeyProvInfo( IN OUT CRYPT_KEY_PROV_INFO *pKeyProvInfo); BOOL csiIsAnyDSCAAvailable(VOID); HRESULT csiSubmitCARequest( IN HINSTANCE hInstance, IN BOOL fUnattended, IN HWND hwnd, IN BOOL fRenew, IN BOOL fRetrievePending, IN WCHAR const *pwszSanitizedCAName, IN WCHAR const *pwszParentCAMachine, IN WCHAR const *pwszParentCAName, IN BYTE const *pbRequest, IN DWORD cbRequest, OUT BSTR *pbStrChain); HRESULT csiFinishInstallationFromPKCS7( IN HINSTANCE hInstance, IN BOOL fUnattended, IN HWND hwnd, IN WCHAR const *pwszSanitizedCAName, IN WCHAR const *pwszCACommonName, IN CRYPT_KEY_PROV_INFO const *pKeyProvInfo, IN ENUM_CATYPES CAType, IN DWORD iCert, IN DWORD iCRL, IN BOOL fUseDS, IN BOOL fRenew, IN WCHAR const *pwszServerName, IN BYTE const *pbChainOrCert, IN DWORD cbChainOrCert, OPTIONAL IN WCHAR const *pwszCACertFile); HRESULT csiSaveCertAndKeys( IN CERT_CONTEXT const *pCert, IN HCERTSTORE hAdditionalStore, IN CRYPT_KEY_PROV_INFO const *pkpi, IN ENUM_CATYPES CAType); HRESULT csiInitializeCertSrvSecurity( IN WCHAR const *pwszSanitizedCAName, IN BOOL fUseEnterpriseACL, // which ACL to use IN BOOL fSetDsSecurity); // whether to set DS security HRESULT csiGenerateCAKeys( IN WCHAR const *pwszContainer, IN WCHAR const *pwszProvName, IN DWORD dwProvType, IN BOOL fMachineKeyset, IN DWORD dwKeyLength, IN HINSTANCE hInstance, IN BOOL fUnattended, IN HWND hwnd, OUT BOOL *pfKeyGenFailed); HRESULT csiGenerateKeysOnly( IN WCHAR const *pwszContainer, IN WCHAR const *pwszProvName, IN DWORD dwProvType, IN BOOL fMachineKeyset, IN DWORD dwKeyLength, IN BOOL fUnattended, OUT HCRYPTPROV *phProv, OUT int *piMsg); HRESULT csiSetKeyContainerSecurity( IN HCRYPTPROV hProv); HRESULT csiSetAdminOnlyFolderSecurity( IN LPCWSTR szFolderPath, IN BOOL fAllowEveryoneRead, IN BOOL fUseDS); VOID csiLogOpen( IN char const *pszFile); VOID csiLogClose(); VOID csiLog( IN DWORD dwFile, IN DWORD dwLine, IN HRESULT hrMsg, IN UINT idMsg, OPTIONAL IN WCHAR const *pwsz1, OPTIONAL IN WCHAR const *pwsz2, OPTIONAL IN DWORD const *pdw); VOID csiLogTime( IN DWORD dwFile, IN DWORD dwLine, IN UINT idMsg); VOID csiLogDWord( IN DWORD dwFile, IN DWORD dwLine, IN UINT idMsg, IN DWORD dwVal); HRESULT csiGetProviderTypeFromProviderName( IN WCHAR const *pwszName, OUT DWORD *pdwType); HRESULT csiUpgradeCertSrvSecurity( IN WCHAR const *pwszSanitizedCAName, BOOL fUseEnterpriseACL, // which ACL to use BOOL fSetDsSecurity, // whether to set security on DS object CS_ENUM_UPGRADE UpgradeType); HRESULT csiGetCRLPublicationParams( BOOL fBase, WCHAR** ppwszCRLPeriod, DWORD* pdwCRLCount); HRESULT AddCNAndEncode( LPCWSTR pcwszName, LPCWSTR pcwszDNSuffix, BYTE** ppbEncodedDN, DWORD *pcbEncodedDN); HRESULT AddCAMachineToCertPublishers(VOID); HRESULT RemoveCAMachineFromCertPublishers(VOID); #define CSILOG(hr, idMsg, pwsz1, pwsz2, pdw) \ csiLog(__dwFILE__, __LINE__, (hr), (idMsg), (pwsz1), (pwsz2), (pdw)) #define CSILOGTIME(idMsg) \ csiLogTime(__dwFILE__, __LINE__, (idMsg)) #define CSILOGDWORD(idMsg, dw) \ csiLogDWord(__dwFILE__, __LINE__, (idMsg), (dw)) #endif //__INITCERT_H__