xref: /reactos/dll/win32/crypt32/oid.c (revision 8a978a17)
1 /*
2  * Copyright 2002 Mike McCormack for CodeWeavers
3  * Copyright 2005-2006 Juan Lang
4  * Copyright 2018 Dmitry Timoshkov
5  *
6  * This library is free software; you can redistribute it and/or
7  * modify it under the terms of the GNU Lesser General Public
8  * License as published by the Free Software Foundation; either
9  * version 2.1 of the License, or (at your option) any later version.
10  *
11  * This library is distributed in the hope that it will be useful,
12  * but WITHOUT ANY WARRANTY; without even the implied warranty of
13  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
14  * Lesser General Public License for more details.
15  *
16  * You should have received a copy of the GNU Lesser General Public
17  * License along with this library; if not, write to the Free Software
18  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
19  */
20 
21 #include "config.h"
22 #include "wine/port.h"
23 
24 #include <stdio.h>
25 #include <stdarg.h>
26 #ifdef __REACTOS__
27 #include <stdlib.h>
28 #endif
29 #define NONAMELESSUNION
30 #include "windef.h"
31 #include "winbase.h"
32 #define CRYPT_OID_INFO_HAS_EXTRA_FIELDS
33 #include "wincrypt.h"
34 #include "winreg.h"
35 #include "winuser.h"
36 #include "wine/debug.h"
37 #include "wine/list.h"
38 #include "crypt32_private.h"
39 #include "cryptres.h"
40 
41 WINE_DEFAULT_DEBUG_CHANNEL(crypt);
42 
43 static const WCHAR DllW[] = { 'D','l','l',0 };
44 
45 static CRITICAL_SECTION funcSetCS;
46 static CRITICAL_SECTION_DEBUG funcSetCSDebug =
47 {
48     0, 0, &funcSetCS,
49     { &funcSetCSDebug.ProcessLocksList, &funcSetCSDebug.ProcessLocksList },
50     0, 0, { (DWORD_PTR)(__FILE__ ": funcSetCS") }
51 };
52 static CRITICAL_SECTION funcSetCS = { &funcSetCSDebug, -1, 0, 0, 0, 0 };
53 static struct list funcSets = { &funcSets, &funcSets };
54 
55 struct OIDFunctionSet
56 {
57     LPSTR name;
58     CRITICAL_SECTION cs; /* protects functions */
59     struct list functions;
60     struct list next;
61 };
62 
63 struct OIDFunction
64 {
65     HMODULE hModule;
66     DWORD encoding;
67     CRYPT_OID_FUNC_ENTRY entry;
68     struct list next;
69 };
70 
71 static const WCHAR ROOT[] = {'R','O','O','T',0};
72 static const WCHAR MY[] = {'M','Y',0};
73 static const WCHAR CA[] = {'C','A',0};
74 static const WCHAR ADDRESSBOOK[] = {'A','D','D','R','E','S','S','B','O','O','K',0};
75 static const WCHAR TRUSTEDPUBLISHER[] = {'T','r','u','s','t','e','d','P','u','b','l','i','s','h','e','r',0};
76 static const WCHAR DISALLOWED[] = {'D','i','s','a','l','l','o','w','e','d',0};
77 static const LPCWSTR LocalizedKeys[] = {ROOT,MY,CA,ADDRESSBOOK,TRUSTEDPUBLISHER,DISALLOWED};
78 static WCHAR LocalizedNames[ARRAY_SIZE(LocalizedKeys)][256];
79 
80 static const WCHAR nameW[] = { 'N','a','m','e',0 };
81 static const WCHAR algidW[] = { 'A','l','g','i','d',0 };
82 static const WCHAR extraW[] = { 'E','x','t','r','a','I','n','f','o',0 };
83 static const WCHAR cngalgidW[] = { 'C','N','G','A','l','g','i','d',0 };
84 static const WCHAR cngextraalgidW[] = { 'C','N','G','E','x','t','r','a','A','l','g','i','d',0 };
85 static const WCHAR flagsW[] = { 'F','l','a','g','s',0 };
86 
87 static void free_function_sets(void)
88 {
89     struct OIDFunctionSet *setCursor, *setNext;
90 
91     LIST_FOR_EACH_ENTRY_SAFE(setCursor, setNext, &funcSets,
92      struct OIDFunctionSet, next)
93     {
94         struct OIDFunction *functionCursor, *funcNext;
95 
96         list_remove(&setCursor->next);
97         CryptMemFree(setCursor->name);
98         LIST_FOR_EACH_ENTRY_SAFE(functionCursor, funcNext,
99          &setCursor->functions, struct OIDFunction, next)
100         {
101             list_remove(&functionCursor->next);
102             CryptMemFree(functionCursor);
103         }
104         setCursor->cs.DebugInfo->Spare[0] = 0;
105         DeleteCriticalSection(&setCursor->cs);
106         CryptMemFree(setCursor);
107     }
108     DeleteCriticalSection(&funcSetCS);
109 }
110 
111 /* There is no free function associated with this; therefore, the sets are
112  * freed when crypt32.dll is unloaded.
113  */
114 HCRYPTOIDFUNCSET WINAPI CryptInitOIDFunctionSet(LPCSTR pszFuncName,
115  DWORD dwFlags)
116 {
117     struct OIDFunctionSet *cursor, *ret = NULL;
118 
119     TRACE("(%s, %x)\n", debugstr_a(pszFuncName), dwFlags);
120 
121     EnterCriticalSection(&funcSetCS);
122     LIST_FOR_EACH_ENTRY(cursor, &funcSets, struct OIDFunctionSet, next)
123     {
124         if (!strcasecmp(pszFuncName, cursor->name))
125         {
126             ret = cursor;
127             break;
128         }
129     }
130     if (!ret)
131     {
132         ret = CryptMemAlloc(sizeof(struct OIDFunctionSet));
133         if (ret)
134         {
135             memset(ret, 0, sizeof(*ret));
136             ret->name = CryptMemAlloc(strlen(pszFuncName) + 1);
137             if (ret->name)
138             {
139                 InitializeCriticalSection(&ret->cs);
140                 ret->cs.DebugInfo->Spare[0] = (DWORD_PTR)(__FILE__ ": OIDFunctionSet.cs");
141                 list_init(&ret->functions);
142                 strcpy(ret->name, pszFuncName);
143                 list_add_tail(&funcSets, &ret->next);
144             }
145             else
146             {
147                 CryptMemFree(ret);
148                 ret = NULL;
149             }
150         }
151     }
152     LeaveCriticalSection(&funcSetCS);
153 
154     return ret;
155 }
156 
157 static char *CRYPT_GetKeyName(DWORD dwEncodingType, LPCSTR pszFuncName,
158  LPCSTR pszOID)
159 {
160     static const char szEncodingTypeFmt[] =
161      "Software\\Microsoft\\Cryptography\\OID\\EncodingType %d\\%s\\%s";
162     UINT len;
163     char numericOID[7]; /* enough for "#65535" */
164     const char *oid;
165     LPSTR szKey;
166 
167     /* MSDN says the encoding type is a mask, but it isn't treated that way.
168      * (E.g., if dwEncodingType were 3, the key names "EncodingType 1" and
169      * "EncodingType 2" would be expected if it were a mask.  Instead native
170      * stores values in "EncodingType 3".
171      */
172     if (IS_INTOID(pszOID))
173     {
174         snprintf(numericOID, sizeof(numericOID), "#%d", LOWORD(pszOID));
175         oid = numericOID;
176     }
177     else
178         oid = pszOID;
179 
180     /* This is enough: the lengths of the two string parameters are explicitly
181      * counted, and we need up to five additional characters for the encoding
182      * type.  These are covered by the "%d", "%s", and "%s" characters in the
183      * format specifier that are removed by sprintf.
184      */
185     len = sizeof(szEncodingTypeFmt) + lstrlenA(pszFuncName) + lstrlenA(oid);
186     szKey = CryptMemAlloc(len);
187     if (szKey)
188         sprintf(szKey, szEncodingTypeFmt,
189          GET_CERT_ENCODING_TYPE(dwEncodingType), pszFuncName, oid);
190     return szKey;
191 }
192 
193 BOOL WINAPI CryptGetDefaultOIDDllList(HCRYPTOIDFUNCSET hFuncSet,
194  DWORD dwEncodingType, LPWSTR pwszDllList, DWORD *pcchDllList)
195 {
196     BOOL ret = TRUE;
197     struct OIDFunctionSet *set = hFuncSet;
198     char *keyName;
199     HKEY key;
200     LSTATUS rc;
201 
202     TRACE("(%p, %d, %p, %p)\n", hFuncSet, dwEncodingType, pwszDllList,
203      pcchDllList);
204 
205     keyName = CRYPT_GetKeyName(dwEncodingType, set->name, "DEFAULT");
206     rc = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0,
207      KEY_READ, NULL, &key, NULL);
208     if (!rc)
209     {
210         DWORD size = *pcchDllList * sizeof(WCHAR);
211 
212         rc = RegQueryValueExW(key, DllW, NULL, NULL, (LPBYTE)pwszDllList,
213          &size);
214         if (!rc)
215             *pcchDllList = size / sizeof(WCHAR);
216         else
217         {
218             /* No value, return an empty list */
219             if (pwszDllList && *pcchDllList)
220                 *pwszDllList = '\0';
221             *pcchDllList = 1;
222         }
223         RegCloseKey(key);
224     }
225     else
226     {
227         /* No value, return an empty list */
228         if (pwszDllList && *pcchDllList)
229             *pwszDllList = '\0';
230         *pcchDllList = 1;
231     }
232     CryptMemFree(keyName);
233 
234     return ret;
235 }
236 
237 BOOL WINAPI CryptInstallOIDFunctionAddress(HMODULE hModule,
238  DWORD dwEncodingType, LPCSTR pszFuncName, DWORD cFuncEntry,
239  const CRYPT_OID_FUNC_ENTRY rgFuncEntry[], DWORD dwFlags)
240 {
241     BOOL ret = TRUE;
242     struct OIDFunctionSet *set;
243 
244     TRACE("(%p, %d, %s, %d, %p, %08x)\n", hModule, dwEncodingType,
245      debugstr_a(pszFuncName), cFuncEntry, rgFuncEntry, dwFlags);
246 
247     set = CryptInitOIDFunctionSet(pszFuncName, 0);
248     if (set)
249     {
250         DWORD i;
251 
252         EnterCriticalSection(&set->cs);
253         for (i = 0; ret && i < cFuncEntry; i++)
254         {
255             struct OIDFunction *func;
256 
257             TRACE("OID %s, func %p\n", debugstr_a(rgFuncEntry[i].pszOID), rgFuncEntry[i].pvFuncAddr);
258 
259             if (!IS_INTOID(rgFuncEntry[i].pszOID))
260                 func = CryptMemAlloc(sizeof(struct OIDFunction)
261                  + strlen(rgFuncEntry[i].pszOID) + 1);
262             else
263                 func = CryptMemAlloc(sizeof(struct OIDFunction));
264             if (func)
265             {
266                 func->encoding = GET_CERT_ENCODING_TYPE(dwEncodingType);
267                 if (!IS_INTOID(rgFuncEntry[i].pszOID))
268                 {
269                     LPSTR oid;
270 
271                     oid = (LPSTR)((LPBYTE)func + sizeof(*func));
272                     strcpy(oid, rgFuncEntry[i].pszOID);
273                     func->entry.pszOID = oid;
274                 }
275                 else
276                     func->entry.pszOID = rgFuncEntry[i].pszOID;
277                 func->entry.pvFuncAddr = rgFuncEntry[i].pvFuncAddr;
278                 func->hModule = hModule;
279                 list_add_tail(&set->functions, &func->next);
280             }
281             else
282                 ret = FALSE;
283         }
284         LeaveCriticalSection(&set->cs);
285     }
286     else
287         ret = FALSE;
288     return ret;
289 }
290 
291 struct FuncAddr
292 {
293     HMODULE lib;
294     LPWSTR  dllList;
295     LPWSTR  currentDll;
296 };
297 
298 static BOOL CRYPT_GetFuncFromReg(DWORD dwEncodingType, LPCSTR pszOID,
299  LPCSTR szFuncName, LPVOID *ppvFuncAddr, HCRYPTOIDFUNCADDR *phFuncAddr)
300 {
301     BOOL ret = FALSE;
302     char *keyName;
303     const char *funcName;
304     HKEY key;
305     LSTATUS rc;
306 
307     keyName = CRYPT_GetKeyName(dwEncodingType, szFuncName, pszOID);
308     rc = RegOpenKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, KEY_READ, &key);
309     if (!rc)
310     {
311         DWORD type, size = 0;
312 
313         rc = RegQueryValueExA(key, "FuncName", NULL, &type, NULL, &size);
314         if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
315         {
316             funcName = CryptMemAlloc(size);
317             rc = RegQueryValueExA(key, "FuncName", NULL, &type,
318              (LPBYTE)funcName, &size);
319         }
320         else
321             funcName = szFuncName;
322         rc = RegQueryValueExW(key, DllW, NULL, &type, NULL, &size);
323         if ((!rc || rc == ERROR_MORE_DATA) && type == REG_SZ)
324         {
325             LPWSTR dllName = CryptMemAlloc(size);
326 
327             if (dllName)
328             {
329                 rc = RegQueryValueExW(key, DllW, NULL, NULL,
330                  (LPBYTE)dllName, &size);
331                 if (!rc)
332                 {
333                     HMODULE lib;
334 
335                     /* This is a bit of a hack; MSDN describes a more
336                      * complicated unload routine than this will allow.
337                      * Still, this seems to suffice for now.
338                      */
339                     lib = LoadLibraryW(dllName);
340                     if (lib)
341                     {
342                         *ppvFuncAddr = GetProcAddress(lib, funcName);
343                         if (*ppvFuncAddr)
344                         {
345                             struct FuncAddr *addr =
346                              CryptMemAlloc(sizeof(struct FuncAddr));
347 
348                             if (addr)
349                             {
350                                 addr->lib = lib;
351                                 addr->dllList = addr->currentDll = NULL;
352                                 *phFuncAddr = addr;
353                                 ret = TRUE;
354                             }
355                             else
356                             {
357                                 *phFuncAddr = NULL;
358                                 FreeLibrary(lib);
359                             }
360                         }
361                         else
362                         {
363                             /* Unload the library, the caller doesn't want
364                              * to unload it when the return value is NULL.
365                              */
366                             FreeLibrary(lib);
367                         }
368                     }
369                 }
370                 else
371                     SetLastError(rc);
372                 CryptMemFree(dllName);
373             }
374         }
375         else
376             SetLastError(rc);
377         if (funcName != szFuncName)
378             CryptMemFree((char *)funcName);
379         RegCloseKey(key);
380     }
381     else
382         SetLastError(rc);
383     CryptMemFree(keyName);
384     return ret;
385 }
386 
387 BOOL WINAPI CryptGetOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
388  DWORD dwEncodingType, LPCSTR pszOID, DWORD dwFlags, void **ppvFuncAddr,
389  HCRYPTOIDFUNCADDR *phFuncAddr)
390 {
391     BOOL ret = FALSE;
392     struct OIDFunctionSet *set = hFuncSet;
393 
394     TRACE("(%p, %d, %s, %08x, %p, %p)\n", hFuncSet, dwEncodingType,
395      debugstr_a(pszOID), dwFlags, ppvFuncAddr, phFuncAddr);
396 
397     *ppvFuncAddr = NULL;
398     if (!(dwFlags & CRYPT_GET_INSTALLED_OID_FUNC_FLAG))
399     {
400         struct OIDFunction *function;
401 
402         EnterCriticalSection(&set->cs);
403         LIST_FOR_EACH_ENTRY(function, &set->functions, struct OIDFunction, next)
404         {
405             if (function->encoding == GET_CERT_ENCODING_TYPE(dwEncodingType))
406             {
407                 if (!IS_INTOID(pszOID))
408                 {
409                     if (!IS_INTOID(function->entry.pszOID) &&
410                      !strcasecmp(function->entry.pszOID, pszOID))
411                     {
412                         *ppvFuncAddr = function->entry.pvFuncAddr;
413                         *phFuncAddr = NULL; /* FIXME: what should it be? */
414                         ret = TRUE;
415                         break;
416                     }
417                 }
418                 else if (function->entry.pszOID == pszOID)
419                 {
420                     *ppvFuncAddr = function->entry.pvFuncAddr;
421                     *phFuncAddr = NULL; /* FIXME: what should it be? */
422                     ret = TRUE;
423                     break;
424                 }
425             }
426         }
427         LeaveCriticalSection(&set->cs);
428     }
429     if (!*ppvFuncAddr)
430         ret = CRYPT_GetFuncFromReg(dwEncodingType, pszOID, set->name,
431          ppvFuncAddr, phFuncAddr);
432     TRACE("returning %d\n", ret);
433     return ret;
434 }
435 
436 static BOOL is_module_registered(HMODULE hModule)
437 {
438     struct OIDFunctionSet *set;
439     BOOL ret = FALSE;
440 
441     EnterCriticalSection(&funcSetCS);
442 
443     LIST_FOR_EACH_ENTRY(set, &funcSets, struct OIDFunctionSet, next)
444     {
445         struct OIDFunction *function;
446 
447         EnterCriticalSection(&set->cs);
448 
449         LIST_FOR_EACH_ENTRY(function, &set->functions, struct OIDFunction, next)
450         {
451             if (function->hModule == hModule)
452             {
453                 ret = TRUE;
454                 break;
455             }
456         }
457 
458         LeaveCriticalSection(&set->cs);
459 
460         if (ret) break;
461     }
462 
463     LeaveCriticalSection(&funcSetCS);
464 
465     return ret;
466 }
467 
468 BOOL WINAPI CryptFreeOIDFunctionAddress(HCRYPTOIDFUNCADDR hFuncAddr,
469  DWORD dwFlags)
470 {
471     TRACE("(%p, %08x)\n", hFuncAddr, dwFlags);
472 
473     /* FIXME: as MSDN states, need to check for DllCanUnloadNow in the DLL,
474      * and only unload it if it can be unloaded.  Also need to implement ref
475      * counting on the functions.
476      */
477     if (hFuncAddr)
478     {
479         struct FuncAddr *addr = hFuncAddr;
480 
481         if (!is_module_registered(addr->lib))
482         {
483             CryptMemFree(addr->dllList);
484             FreeLibrary(addr->lib);
485             CryptMemFree(addr);
486         }
487     }
488     return TRUE;
489 }
490 
491 static BOOL CRYPT_GetFuncFromDll(LPCWSTR dll, LPCSTR func, HMODULE *lib,
492  void **ppvFuncAddr)
493 {
494     BOOL ret = FALSE;
495 
496     *lib = LoadLibraryW(dll);
497     if (*lib)
498     {
499         *ppvFuncAddr = GetProcAddress(*lib, func);
500         if (*ppvFuncAddr)
501             ret = TRUE;
502         else
503         {
504             FreeLibrary(*lib);
505             *lib = NULL;
506         }
507     }
508     return ret;
509 }
510 
511 BOOL WINAPI CryptGetDefaultOIDFunctionAddress(HCRYPTOIDFUNCSET hFuncSet,
512  DWORD dwEncodingType, LPCWSTR pwszDll, DWORD dwFlags, void **ppvFuncAddr,
513  HCRYPTOIDFUNCADDR *phFuncAddr)
514 {
515     struct OIDFunctionSet *set = hFuncSet;
516     BOOL ret = FALSE;
517 
518     TRACE("(%p, %d, %s, %08x, %p, %p)\n", hFuncSet, dwEncodingType,
519      debugstr_w(pwszDll), dwFlags, ppvFuncAddr, phFuncAddr);
520 
521     if (pwszDll)
522     {
523         HMODULE lib;
524 
525         *phFuncAddr = NULL;
526         ret = CRYPT_GetFuncFromDll(pwszDll, set->name, &lib, ppvFuncAddr);
527         if (ret)
528         {
529             struct FuncAddr *addr = CryptMemAlloc(sizeof(struct FuncAddr));
530 
531             if (addr)
532             {
533                 addr->lib = lib;
534                 addr->dllList = addr->currentDll = NULL;
535                 *phFuncAddr = addr;
536             }
537             else
538             {
539                 FreeLibrary(lib);
540                 *ppvFuncAddr = NULL;
541                 SetLastError(ERROR_OUTOFMEMORY);
542                 ret = FALSE;
543             }
544         }
545         else
546             SetLastError(ERROR_FILE_NOT_FOUND);
547     }
548     else
549     {
550         struct FuncAddr *addr = *phFuncAddr;
551 
552         if (!addr)
553         {
554             DWORD size;
555 
556             ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType, NULL,
557              &size);
558             if (ret)
559             {
560                 LPWSTR dllList = CryptMemAlloc(size * sizeof(WCHAR));
561 
562                 if (dllList)
563                 {
564                     ret = CryptGetDefaultOIDDllList(hFuncSet, dwEncodingType,
565                      dllList, &size);
566                     if (ret)
567                     {
568                         addr = CryptMemAlloc(sizeof(struct FuncAddr));
569                         if (addr)
570                         {
571                             addr->dllList = dllList;
572                             addr->currentDll = dllList;
573                             addr->lib = NULL;
574                             *phFuncAddr = addr;
575                         }
576                         else
577                         {
578                             CryptMemFree(dllList);
579                             SetLastError(ERROR_OUTOFMEMORY);
580                             ret = FALSE;
581                         }
582                     }
583                 }
584                 else
585                 {
586                     SetLastError(ERROR_OUTOFMEMORY);
587                     ret = FALSE;
588                 }
589             }
590         }
591         if (addr)
592         {
593             if (!*addr->currentDll)
594             {
595                 CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
596                 SetLastError(ERROR_FILE_NOT_FOUND);
597                 *phFuncAddr = NULL;
598                 ret = FALSE;
599             }
600             else
601             {
602                 /* FIXME: as elsewhere, can't free until DllCanUnloadNow says
603                  * it's possible, and should defer unloading for some time to
604                  * avoid repeated LoadLibrary/FreeLibrary on the same dll.
605                  */
606                 FreeLibrary(addr->lib);
607                 ret = CRYPT_GetFuncFromDll(addr->currentDll, set->name,
608                  &addr->lib, ppvFuncAddr);
609                 if (ret)
610                 {
611                     /* Move past the current DLL */
612                     addr->currentDll += lstrlenW(addr->currentDll) + 1;
613                     *phFuncAddr = addr;
614                 }
615                 else
616                 {
617                     CryptFreeOIDFunctionAddress(*phFuncAddr, 0);
618                     SetLastError(ERROR_FILE_NOT_FOUND);
619                     *phFuncAddr = NULL;
620                 }
621             }
622         }
623     }
624     return ret;
625 }
626 
627 /***********************************************************************
628  *             CryptRegisterOIDFunction (CRYPT32.@)
629  *
630  * Register the DLL and the functions it uses to cover the combination
631  * of encoding type, function name and OID.
632  *
633  * PARAMS
634  *  dwEncodingType       [I] Encoding type to be used.
635  *  pszFuncName          [I] Name of the function to be registered.
636  *  pszOID               [I] OID of the function (numeric or string).
637  *  pwszDll              [I] The DLL that is to be registered.
638  *  pszOverrideFuncName  [I] Name of the function in the DLL.
639  *
640  * RETURNS
641  *  Success: TRUE.
642  *  Failure: FALSE. (Look at GetLastError()).
643  *
644  * NOTES
645  *  Registry errors are always reported via SetLastError().
646  */
647 BOOL WINAPI CryptRegisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
648                   LPCSTR pszOID, LPCWSTR pwszDll, LPCSTR pszOverrideFuncName)
649 {
650     LONG r;
651     HKEY hKey;
652     LPSTR szKey;
653 
654     TRACE("(%x, %s, %s, %s, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
655           debugstr_a(pszOID), debugstr_w(pwszDll), debugstr_a(pszOverrideFuncName));
656 
657     /* Native does nothing pwszDll is NULL */
658     if (!pwszDll)
659         return TRUE;
660 
661     /* I'm not matching MS bug for bug here, because I doubt any app depends on
662      * it:  native "succeeds" if pszFuncName is NULL, but the nonsensical entry
663      * it creates would never be used.
664      */
665     if (!pszFuncName || !pszOID)
666     {
667         SetLastError(E_INVALIDARG);
668         return FALSE;
669     }
670 
671     szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
672     TRACE("Key name is %s\n", debugstr_a(szKey));
673 
674     if (!szKey)
675         return FALSE;
676 
677     r = RegCreateKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
678     CryptMemFree(szKey);
679 
680     if (r != ERROR_SUCCESS) goto error_close_key;
681 
682     /* write the values */
683     if (pszOverrideFuncName)
684     {
685         r = RegSetValueExA(hKey, "FuncName", 0, REG_SZ,
686              (const BYTE*)pszOverrideFuncName, lstrlenA(pszOverrideFuncName) + 1);
687         if (r != ERROR_SUCCESS) goto error_close_key;
688     }
689     r = RegSetValueExW(hKey, DllW, 0, REG_SZ, (const BYTE*) pwszDll,
690          (lstrlenW(pwszDll) + 1) * sizeof (WCHAR));
691 
692 error_close_key:
693 
694     RegCloseKey(hKey);
695 
696     if (r != ERROR_SUCCESS)
697     {
698         SetLastError(r);
699         return FALSE;
700     }
701 
702     return TRUE;
703 }
704 
705 /***********************************************************************
706  *             CryptUnregisterOIDInfo (CRYPT32.@)
707  */
708 BOOL WINAPI CryptUnregisterOIDInfo(PCCRYPT_OID_INFO info)
709 {
710     char *key_name;
711     HKEY root;
712     DWORD err;
713 
714     TRACE("(%p)\n", info);
715 
716     if (!info || info->cbSize != sizeof(*info) || !info->pszOID)
717     {
718         SetLastError(E_INVALIDARG);
719         return FALSE;
720     }
721 
722     err = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptDllFindOIDInfo", 0, KEY_ALL_ACCESS, &root);
723     if (err != ERROR_SUCCESS)
724     {
725         SetLastError(err);
726         return FALSE;
727     }
728 
729     key_name = CryptMemAlloc(strlen(info->pszOID) + 16);
730     if (key_name)
731     {
732         sprintf(key_name, "%s!%u", info->pszOID, info->dwGroupId);
733         err = RegDeleteKeyA(root, key_name);
734     }
735     else
736         err = ERROR_OUTOFMEMORY;
737 
738     CryptMemFree(key_name);
739     RegCloseKey(root);
740 
741     if (err)
742         SetLastError(err);
743 
744     return !err;
745 }
746 
747 /***********************************************************************
748  *             CryptRegisterOIDInfo (CRYPT32.@)
749  */
750 BOOL WINAPI CryptRegisterOIDInfo(PCCRYPT_OID_INFO info, DWORD flags)
751 {
752     char *key_name;
753     HKEY root = 0, key = 0;
754     DWORD err;
755 
756     TRACE("(%p, %x)\n", info, flags );
757 
758     if (!info || info->cbSize != sizeof(*info) || !info->pszOID)
759     {
760         SetLastError(E_INVALIDARG);
761         return FALSE;
762     }
763 
764     if (!info->dwGroupId) return TRUE;
765 
766     key_name = CryptMemAlloc(strlen(info->pszOID) + 16);
767     if (!key_name)
768     {
769         err = ERROR_OUTOFMEMORY;
770         goto done;
771     }
772 
773     err = RegCreateKeyExA(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptDllFindOIDInfo",
774                           0, NULL, 0, KEY_ALL_ACCESS, NULL, &root, NULL);
775     if (err != ERROR_SUCCESS) goto done;
776 
777     sprintf(key_name, "%s!%u", info->pszOID, info->dwGroupId);
778     err = RegCreateKeyA(root, key_name, &key);
779     if (err != ERROR_SUCCESS) goto done;
780 
781     if (flags)
782     {
783         err = RegSetValueExW(key, flagsW, 0, REG_DWORD, (const BYTE *)&flags, sizeof(flags));
784         if (err != ERROR_SUCCESS) goto done;
785     }
786 
787     if (info->pwszName)
788     {
789         err = RegSetValueExW(key, nameW, 0, REG_SZ, (const BYTE *)info->pwszName, (lstrlenW(info->pwszName) + 1) * sizeof(WCHAR));
790         if (err != ERROR_SUCCESS) goto done;
791     }
792 
793     if (info->u.Algid)
794     {
795         err = RegSetValueExW(key, algidW, 0, REG_DWORD, (const BYTE *)&info->u.Algid, sizeof(info->u.Algid));
796         if (err != ERROR_SUCCESS) goto done;
797     }
798 
799     if (info->ExtraInfo.cbData && info->ExtraInfo.pbData)
800     {
801         err = RegSetValueExW(key, extraW, 0, REG_BINARY, info->ExtraInfo.pbData, info->ExtraInfo.cbData);
802         if (err != ERROR_SUCCESS) goto done;
803     }
804 
805     if (info->pwszCNGAlgid)
806     {
807         err = RegSetValueExW(key, cngalgidW, 0, REG_SZ, (const BYTE *)info->pwszCNGAlgid, (lstrlenW(info->pwszCNGAlgid) + 1) * sizeof(WCHAR));
808         if (err != ERROR_SUCCESS) goto done;
809     }
810 
811     if (info->pwszCNGExtraAlgid)
812     {
813         err = RegSetValueExW(key, cngextraalgidW, 0, REG_SZ, (const BYTE *)info->pwszCNGExtraAlgid, (lstrlenW(info->pwszCNGExtraAlgid) + 1) * sizeof(WCHAR));
814         if (err != ERROR_SUCCESS) goto done;
815     }
816 
817 done:
818     CryptMemFree(key_name);
819     if (key) RegCloseKey(key);
820     if (root) RegCloseKey(root);
821 
822     if (err)
823         SetLastError(err);
824 
825     return !err;
826 }
827 
828 /***********************************************************************
829  *             CryptUnregisterOIDFunction (CRYPT32.@)
830  */
831 BOOL WINAPI CryptUnregisterOIDFunction(DWORD dwEncodingType, LPCSTR pszFuncName,
832  LPCSTR pszOID)
833 {
834     LPSTR szKey;
835     LONG rc;
836 
837     TRACE("%x %s %s\n", dwEncodingType, debugstr_a(pszFuncName),
838      debugstr_a(pszOID));
839 
840     if (!pszFuncName || !pszOID)
841     {
842         SetLastError(ERROR_INVALID_PARAMETER);
843         return FALSE;
844     }
845 
846     szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
847     rc = RegDeleteKeyA(HKEY_LOCAL_MACHINE, szKey);
848     CryptMemFree(szKey);
849     if (rc)
850         SetLastError(rc);
851     return !rc;
852 }
853 
854 BOOL WINAPI CryptGetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
855  LPCSTR pszOID, LPCWSTR pwszValueName, DWORD *pdwValueType, BYTE *pbValueData,
856  DWORD *pcbValueData)
857 {
858     LPSTR szKey;
859     LONG rc;
860     HKEY hKey;
861 
862     TRACE("%x %s %s %s %p %p %p\n", dwEncodingType, debugstr_a(pszFuncName),
863      debugstr_a(pszOID), debugstr_w(pwszValueName), pdwValueType, pbValueData,
864      pcbValueData);
865 
866     if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
867         return TRUE;
868 
869     if (!pszFuncName || !pszOID || !pwszValueName)
870     {
871         SetLastError(ERROR_INVALID_PARAMETER);
872         return FALSE;
873     }
874 
875     szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
876     rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
877     CryptMemFree(szKey);
878     if (rc)
879         SetLastError(rc);
880     else
881     {
882         rc = RegQueryValueExW(hKey, pwszValueName, NULL, pdwValueType,
883          pbValueData, pcbValueData);
884         if (rc)
885             SetLastError(rc);
886         RegCloseKey(hKey);
887     }
888     return !rc;
889 }
890 
891 BOOL WINAPI CryptSetOIDFunctionValue(DWORD dwEncodingType, LPCSTR pszFuncName,
892  LPCSTR pszOID, LPCWSTR pwszValueName, DWORD dwValueType,
893  const BYTE *pbValueData, DWORD cbValueData)
894 {
895     LPSTR szKey;
896     LONG rc;
897     HKEY hKey;
898 
899     TRACE("%x %s %s %s %d %p %d\n", dwEncodingType, debugstr_a(pszFuncName),
900      debugstr_a(pszOID), debugstr_w(pwszValueName), dwValueType, pbValueData,
901      cbValueData);
902 
903     if (!GET_CERT_ENCODING_TYPE(dwEncodingType))
904         return TRUE;
905 
906     if (!pszFuncName || !pszOID || !pwszValueName)
907     {
908         SetLastError(ERROR_INVALID_PARAMETER);
909         return FALSE;
910     }
911 
912     szKey = CRYPT_GetKeyName(dwEncodingType, pszFuncName, pszOID);
913     rc = RegOpenKeyA(HKEY_LOCAL_MACHINE, szKey, &hKey);
914     CryptMemFree(szKey);
915     if (rc)
916         SetLastError(rc);
917     else
918     {
919         rc = RegSetValueExW(hKey, pwszValueName, 0, dwValueType, pbValueData,
920          cbValueData);
921         if (rc)
922             SetLastError(rc);
923         RegCloseKey(hKey);
924     }
925     return !rc;
926 }
927 
928 static LPCWSTR CRYPT_FindStringInMultiString(LPCWSTR multi, LPCWSTR toFind)
929 {
930     LPCWSTR ret = NULL, ptr;
931 
932     for (ptr = multi; ptr && *ptr && !ret; ptr += lstrlenW(ptr) + 1)
933     {
934         if (!lstrcmpiW(ptr, toFind))
935             ret = ptr;
936     }
937     return ret;
938 }
939 
940 static DWORD CRYPT_GetMultiStringCharacterLen(LPCWSTR multi)
941 {
942     DWORD ret;
943 
944     if (multi)
945     {
946         LPCWSTR ptr;
947 
948         /* Count terminating empty string */
949         ret = 1;
950         for (ptr = multi; *ptr; ptr += lstrlenW(ptr) + 1)
951             ret += lstrlenW(ptr) + 1;
952     }
953     else
954         ret = 0;
955     return ret;
956 }
957 
958 static LPWSTR CRYPT_AddStringToMultiString(LPWSTR multi, LPCWSTR toAdd,
959  DWORD index)
960 {
961     LPWSTR ret;
962 
963     if (!multi)
964     {
965         /* FIXME: ignoring index, is that okay? */
966         ret = CryptMemAlloc((lstrlenW(toAdd) + 2) * sizeof(WCHAR));
967         if (ret)
968         {
969             /* copy string, including NULL terminator */
970             memcpy(ret, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
971             /* add terminating empty string */
972             *(ret + lstrlenW(toAdd) + 1) = 0;
973         }
974     }
975     else
976     {
977         DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
978 
979         ret = CryptMemRealloc(multi, (len + lstrlenW(toAdd) + 1) *
980          sizeof(WCHAR));
981         if (ret)
982         {
983             LPWSTR spotToAdd;
984 
985             if (index == CRYPT_REGISTER_LAST_INDEX)
986                 spotToAdd = ret + len - 1;
987             else
988             {
989                 DWORD i;
990 
991                 /* FIXME: if index is too large for the string, toAdd is
992                  * added to the end.  Is that okay?
993                  */
994                 for (i = 0, spotToAdd = ret; i < index && *spotToAdd;
995                  spotToAdd += lstrlenW(spotToAdd) + 1)
996                     ;
997             }
998             if (spotToAdd)
999             {
1000                 /* Copy existing string "right" */
1001                 memmove(spotToAdd + lstrlenW(toAdd) + 1, spotToAdd,
1002                  (len - (spotToAdd - ret)) * sizeof(WCHAR));
1003                 /* Copy new string */
1004                 memcpy(spotToAdd, toAdd, (lstrlenW(toAdd) + 1) * sizeof(WCHAR));
1005             }
1006             else
1007             {
1008                 CryptMemFree(ret);
1009                 ret = NULL;
1010             }
1011         }
1012     }
1013     return ret;
1014 }
1015 
1016 static BOOL CRYPT_RemoveStringFromMultiString(LPWSTR multi, LPCWSTR toRemove)
1017 {
1018     LPWSTR spotToRemove = (LPWSTR)CRYPT_FindStringInMultiString(multi,
1019      toRemove);
1020     BOOL ret;
1021 
1022     if (spotToRemove)
1023     {
1024         DWORD len = CRYPT_GetMultiStringCharacterLen(multi);
1025 
1026         if (spotToRemove + lstrlenW(toRemove) + 2 >= multi + len)
1027         {
1028             /* Removing last string in list, terminate multi string directly */
1029             *spotToRemove = 0;
1030             *(spotToRemove + 1) = 0;
1031         }
1032         else
1033         {
1034             LPCWSTR nextStr = spotToRemove + lstrlenW(toRemove) + 1;
1035 
1036             /* Copy remainder of string "left" */
1037             memmove(spotToRemove, nextStr,
1038              (len - (nextStr - multi)) * sizeof(WCHAR));
1039         }
1040         ret = TRUE;
1041     }
1042     else
1043     {
1044         SetLastError(ERROR_FILE_NOT_FOUND);
1045         ret = FALSE;
1046     }
1047     return ret;
1048 }
1049 
1050 static BOOL CRYPT_GetDefaultOIDKey(DWORD dwEncodingType, LPCSTR pszFuncName,
1051  PHKEY key)
1052 {
1053     LPSTR keyName;
1054     LONG r;
1055 
1056     keyName = CRYPT_GetKeyName(dwEncodingType, pszFuncName, "DEFAULT");
1057     TRACE("Key name is %s\n", debugstr_a(keyName));
1058 
1059     if (!keyName)
1060         return FALSE;
1061 
1062     r = RegCreateKeyExA(HKEY_LOCAL_MACHINE, keyName, 0, NULL, 0, KEY_ALL_ACCESS,
1063      NULL, key, NULL);
1064     CryptMemFree(keyName);
1065     if (r != ERROR_SUCCESS)
1066     {
1067         SetLastError(r);
1068         return FALSE;
1069     }
1070     return TRUE;
1071 }
1072 
1073 static LPWSTR CRYPT_GetDefaultOIDDlls(HKEY key)
1074 {
1075     LONG r;
1076     DWORD type, size;
1077     LPWSTR dlls;
1078 
1079     r = RegQueryValueExW(key, DllW, NULL, &type, NULL, &size);
1080     if (r == ERROR_SUCCESS && type == REG_MULTI_SZ)
1081     {
1082         dlls = CryptMemAlloc(size);
1083         r = RegQueryValueExW(key, DllW, NULL, &type, (LPBYTE)dlls, &size);
1084         if (r != ERROR_SUCCESS)
1085         {
1086             CryptMemFree(dlls);
1087             dlls = NULL;
1088         }
1089     }
1090     else
1091         dlls = NULL;
1092     return dlls;
1093 }
1094 
1095 static inline BOOL CRYPT_SetDefaultOIDDlls(HKEY key, LPCWSTR dlls)
1096 {
1097     DWORD len = CRYPT_GetMultiStringCharacterLen(dlls);
1098     LONG r;
1099 
1100     if ((r = RegSetValueExW(key, DllW, 0, REG_MULTI_SZ, (const BYTE *)dlls,
1101      len * sizeof (WCHAR))))
1102         SetLastError(r);
1103     return r == ERROR_SUCCESS;
1104 }
1105 
1106 /***********************************************************************
1107  *             CryptRegisterDefaultOIDFunction (CRYPT32.@)
1108  */
1109 BOOL WINAPI CryptRegisterDefaultOIDFunction(DWORD dwEncodingType,
1110  LPCSTR pszFuncName, DWORD dwIndex, LPCWSTR pwszDll)
1111 {
1112     HKEY key;
1113     LPWSTR dlls;
1114     BOOL ret = FALSE;
1115 
1116     TRACE("(%x, %s, %d, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
1117      dwIndex, debugstr_w(pwszDll));
1118 
1119     if (!pwszDll)
1120     {
1121         SetLastError(E_INVALIDARG);
1122         return FALSE;
1123     }
1124 
1125     if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
1126         return FALSE;
1127 
1128     dlls = CRYPT_GetDefaultOIDDlls(key);
1129     if (CRYPT_FindStringInMultiString(dlls, pwszDll))
1130         SetLastError(ERROR_FILE_EXISTS);
1131     else
1132     {
1133         dlls = CRYPT_AddStringToMultiString(dlls, pwszDll, dwIndex);
1134         if (dlls)
1135             ret = CRYPT_SetDefaultOIDDlls(key, dlls);
1136     }
1137     CryptMemFree(dlls);
1138     RegCloseKey(key);
1139     return ret;
1140 }
1141 
1142 BOOL WINAPI CryptUnregisterDefaultOIDFunction(DWORD dwEncodingType,
1143  LPCSTR pszFuncName, LPCWSTR pwszDll)
1144 {
1145     HKEY key;
1146     LPWSTR dlls;
1147     BOOL ret;
1148 
1149     TRACE("(%x, %s, %s)\n", dwEncodingType, debugstr_a(pszFuncName),
1150      debugstr_w(pwszDll));
1151 
1152     if (!pwszDll)
1153     {
1154         SetLastError(E_INVALIDARG);
1155         return FALSE;
1156     }
1157 
1158     if (!CRYPT_GetDefaultOIDKey(dwEncodingType, pszFuncName, &key))
1159         return FALSE;
1160 
1161     dlls = CRYPT_GetDefaultOIDDlls(key);
1162     if ((ret = CRYPT_RemoveStringFromMultiString(dlls, pwszDll)))
1163         ret = CRYPT_SetDefaultOIDDlls(key, dlls);
1164     CryptMemFree(dlls);
1165     RegCloseKey(key);
1166     return ret;
1167 }
1168 
1169 static void oid_init_localizednames(void)
1170 {
1171     unsigned int i;
1172 
1173     for(i = 0; i < ARRAY_SIZE(LocalizedKeys); i++)
1174     {
1175         LoadStringW(hInstance, IDS_LOCALIZEDNAME_ROOT+i, LocalizedNames[i], 256);
1176     }
1177 }
1178 
1179 /********************************************************************
1180  *              CryptFindLocalizedName (CRYPT32.@)
1181  */
1182 LPCWSTR WINAPI CryptFindLocalizedName(LPCWSTR pwszCryptName)
1183 {
1184     unsigned int i;
1185 
1186     for(i = 0; i < ARRAY_SIZE(LocalizedKeys); i++)
1187     {
1188         if(!lstrcmpiW(LocalizedKeys[i], pwszCryptName))
1189         {
1190             return LocalizedNames[i];
1191         }
1192     }
1193 
1194     FIXME("No name for: %s - stub\n",debugstr_w(pwszCryptName));
1195     return NULL;
1196 }
1197 
1198 static CRITICAL_SECTION oidInfoCS;
1199 static CRITICAL_SECTION_DEBUG oidInfoCSDebug =
1200 {
1201     0, 0, &oidInfoCS,
1202     { &oidInfoCSDebug.ProcessLocksList, &oidInfoCSDebug.ProcessLocksList },
1203     0, 0, { (DWORD_PTR)(__FILE__ ": oidInfoCS") }
1204 };
1205 static CRITICAL_SECTION oidInfoCS = { &oidInfoCSDebug, -1, 0, 0, 0, 0 };
1206 static struct list oidInfo = { &oidInfo, &oidInfo };
1207 
1208 static const WCHAR tripledes[] = { '3','d','e','s',0 };
1209 static const WCHAR cms3deswrap[] = { 'C','M','S','3','D','E','S','w','r','a',
1210  'p',0 };
1211 static const WCHAR cmsrc2wrap[] = { 'C','M','S','R','C','2','w','r','a','p',0 };
1212 static const WCHAR des[] = { 'd','e','s',0 };
1213 static const WCHAR md2[] = { 'm','d','2',0 };
1214 static const WCHAR md4[] = { 'm','d','4',0 };
1215 static const WCHAR md5[] = { 'm','d','5',0 };
1216 static const WCHAR rc2[] = { 'r','c','2',0 };
1217 static const WCHAR rc4[] = { 'r','c','4',0 };
1218 static const WCHAR sha[] = { 's','h','a',0 };
1219 static const WCHAR sha1[] = { 's','h','a','1',0 };
1220 static const WCHAR sha256[] = { 's','h','a','2','5','6',0 };
1221 static const WCHAR sha384[] = { 's','h','a','3','8','4',0 };
1222 static const WCHAR sha512[] = { 's','h','a','5','1','2',0 };
1223 static const WCHAR RSA[] = { 'R','S','A',0 };
1224 static const WCHAR RSA_KEYX[] = { 'R','S','A','_','K','E','Y','X',0 };
1225 static const WCHAR RSA_SIGN[] = { 'R','S','A','_','S','I','G','N',0 };
1226 static const WCHAR DSA[] = { 'D','S','A',0 };
1227 static const WCHAR DSA_SIGN[] = { 'D','S','A','_','S','I','G','N',0 };
1228 static const WCHAR DH[] = { 'D','H',0 };
1229 static const WCHAR DSS[] = { 'D','S','S',0 };
1230 static const WCHAR mosaicKMandUpdSig[] =
1231  { 'm','o','s','a','i','c','K','M','a','n','d','U','p','d','S','i','g',0 };
1232 static const WCHAR ESDH[] = { 'E','S','D','H',0 };
1233 static const WCHAR NO_SIGN[] = { 'N','O','S','I','G','N',0 };
1234 static const WCHAR dsaSHA1[] = { 'd','s','a','S','H','A','1',0 };
1235 static const WCHAR md2RSA[] = { 'm','d','2','R','S','A',0 };
1236 static const WCHAR md4RSA[] = { 'm','d','4','R','S','A',0 };
1237 static const WCHAR md5RSA[] = { 'm','d','5','R','S','A',0 };
1238 static const WCHAR shaDSA[] = { 's','h','a','D','S','A',0 };
1239 static const WCHAR sha1DSA[] = { 's','h','a','1','D','S','A',0 };
1240 static const WCHAR shaRSA[] = { 's','h','a','R','S','A',0 };
1241 static const WCHAR sha1RSA[] = { 's','h','a','1','R','S','A',0 };
1242 static const WCHAR sha256RSA[] = { 's','h','a','2','5','6','R','S','A',0 };
1243 static const WCHAR sha384RSA[] = { 's','h','a','3','8','4','R','S','A',0 };
1244 static const WCHAR sha512RSA[] = { 's','h','a','5','1','2','R','S','A',0 };
1245 static const WCHAR mosaicUpdatedSig[] =
1246  { 'm','o','s','a','i','c','U','p','d','a','t','e','d','S','i','g',0 };
1247 static const WCHAR sha256ECDSA[] = { 's','h','a','2','5','6','E','C','D','S','A',0 };
1248 static const WCHAR sha384ECDSA[] = { 's','h','a','3','8','4','E','C','D','S','A',0 };
1249 static const WCHAR CN[] = { 'C','N',0 };
1250 static const WCHAR L[] = { 'L',0 };
1251 static const WCHAR O[] = { 'O',0 };
1252 static const WCHAR OU[] = { 'O','U',0 };
1253 static const WCHAR E[] = { 'E',0 };
1254 static const WCHAR C[] = { 'C',0 };
1255 static const WCHAR S[] = { 'S',0 };
1256 static const WCHAR ST[] = { 'S','T',0 };
1257 static const WCHAR STREET[] = { 'S','T','R','E','E','T',0 };
1258 static const WCHAR T[] = { 'T',0 };
1259 static const WCHAR Title[] = { 'T','i','t','l','e',0 };
1260 static const WCHAR G[] = { 'G',0 };
1261 static const WCHAR GivenName[] = { 'G','i','v','e','n','N','a','m','e',0 };
1262 static const WCHAR I[] = { 'I',0 };
1263 static const WCHAR Initials[] = { 'I','n','i','t','i','a','l','s',0 };
1264 static const WCHAR SN[] = { 'S','N',0 };
1265 static const WCHAR DC[] = { 'D','C',0 };
1266 static const WCHAR Description[] =
1267  { 'D','e','s','c','r','i','p','t','i','o','n',0 };
1268 static const WCHAR PostalCode[] = { 'P','o','s','t','a','l','C','o','d','e',0 };
1269 static const WCHAR POBox[] = { 'P','O','B','o','x',0 };
1270 static const WCHAR Phone[] = { 'P','h','o','n','e',0 };
1271 static const WCHAR X21Address[] = { 'X','2','1','A','d','d','r','e','s','s',0 };
1272 static const WCHAR dnQualifier[] =
1273  { 'd','n','Q','u','a','l','i','f','i','e','r',0 };
1274 static const WCHAR SpcSpAgencyInfo[] = { 'S','p','c','S','p','A','g','e','n','c','y','I','n','f','o',0 };
1275 static const WCHAR SpcFinancialCriteria[] = { 'S','p','c','F','i','n','a','n','c','i','a','l','C','r','i','t','e','r','i','a',0 };
1276 static const WCHAR SpcMinimalCriteria[] = { 'S','p','c','M','i','n','i','m','a','l','C','r','i','t','e','r','i','a',0 };
1277 static const WCHAR Email[] = { 'E','m','a','i','l',0 };
1278 static const WCHAR GN[] = { 'G','N',0 };
1279 static const WCHAR SERIALNUMBER[] = { 'S','E','R','I','A','L','N','U','M','B','E','R',0 };
1280 
1281 static const DWORD noNullFlag = CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
1282 static const DWORD mosaicFlags = CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
1283  CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG;
1284 static const CRYPT_DATA_BLOB noNullBlob = { sizeof(noNullFlag),
1285  (LPBYTE)&noNullFlag };
1286 static const CRYPT_DATA_BLOB mosaicFlagsBlob = { sizeof(mosaicFlags),
1287  (LPBYTE)&mosaicFlags };
1288 
1289 static const DWORD rsaSign = CALG_RSA_SIGN;
1290 static const DWORD dssSign[2] = { CALG_DSS_SIGN,
1291  CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
1292 static const DWORD mosaicSign[2] = { CALG_DSS_SIGN,
1293  CRYPT_OID_INHIBIT_SIGNATURE_FORMAT_FLAG |
1294  CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
1295 static const DWORD ecdsaSign[2] = { CALG_OID_INFO_PARAMETERS, CRYPT_OID_NO_NULL_ALGORITHM_PARA_FLAG };
1296 static const CRYPT_DATA_BLOB rsaSignBlob = { sizeof(rsaSign),
1297  (LPBYTE)&rsaSign };
1298 static const CRYPT_DATA_BLOB dssSignBlob = { sizeof(dssSign),
1299  (LPBYTE)dssSign };
1300 static const CRYPT_DATA_BLOB mosaicSignBlob = { sizeof(mosaicSign),
1301  (LPBYTE)mosaicSign };
1302 static const CRYPT_DATA_BLOB ecdsaSignBlob = { sizeof(ecdsaSign), (BYTE *)ecdsaSign };
1303 
1304 static const DWORD ia5String[] = { CERT_RDN_IA5_STRING, 0 };
1305 static const DWORD numericString[] = { CERT_RDN_NUMERIC_STRING, 0 };
1306 static const DWORD printableString[] = { CERT_RDN_PRINTABLE_STRING, 0 };
1307 static const DWORD domainCompTypes[] = { CERT_RDN_IA5_STRING,
1308  CERT_RDN_UTF8_STRING, 0 };
1309 static const CRYPT_DATA_BLOB ia5StringBlob = { sizeof(ia5String),
1310  (LPBYTE)ia5String };
1311 static const CRYPT_DATA_BLOB numericStringBlob = { sizeof(numericString),
1312  (LPBYTE)numericString };
1313 static const CRYPT_DATA_BLOB printableStringBlob = { sizeof(printableString),
1314  (LPBYTE)printableString };
1315 static const CRYPT_DATA_BLOB domainCompTypesBlob = { sizeof(domainCompTypes),
1316  (LPBYTE)domainCompTypes };
1317 
1318 static const struct OIDInfoConstructor {
1319     DWORD   dwGroupId;
1320     LPCSTR  pszOID;
1321     UINT    Algid;
1322     LPCWSTR pwszName;
1323     const CRYPT_DATA_BLOB *blob;
1324     const WCHAR *pwszCNGAlgid;
1325     const WCHAR *pwszCNGExtraAlgid;
1326 } oidInfoConstructors[] = {
1327  { 1, szOID_OIWSEC_sha1,               CALG_SHA1,     sha1, NULL },
1328  { 1, szOID_OIWSEC_sha1,               CALG_SHA1,     sha, NULL },
1329  { 1, szOID_OIWSEC_sha,                CALG_SHA,      sha, NULL },
1330  { 1, szOID_RSA_MD5,                   CALG_MD5,      md5, NULL },
1331  { 1, szOID_RSA_MD4,                   CALG_MD4,      md4, NULL },
1332  { 1, szOID_RSA_MD2,                   CALG_MD2,      md2, NULL },
1333  /* NOTE: Windows Vista+ uses -1 instead of CALG_SHA_* following SHA entries. */
1334  { 1, szOID_NIST_sha256,               CALG_SHA_256,  sha256, NULL },
1335  { 1, szOID_NIST_sha384,               CALG_SHA_384,  sha384, NULL },
1336  { 1, szOID_NIST_sha512,               CALG_SHA_512,  sha512, NULL },
1337 
1338  { 2, szOID_OIWSEC_desCBC,             CALG_DES,      des, NULL },
1339  { 2, szOID_RSA_DES_EDE3_CBC,          CALG_3DES,     tripledes, NULL },
1340  { 2, szOID_RSA_RC2CBC,                CALG_RC2,      rc2, NULL },
1341  { 2, szOID_RSA_RC4,                   CALG_RC4,      rc4, NULL },
1342  { 2, szOID_RSA_SMIMEalgCMS3DESwrap,   CALG_3DES,     cms3deswrap, NULL },
1343  { 2, szOID_RSA_SMIMEalgCMSRC2wrap,    CALG_RC2,      cmsrc2wrap, NULL },
1344 
1345  { 3, szOID_RSA_RSA,                   CALG_RSA_KEYX, RSA, NULL },
1346  { 3, szOID_X957_DSA,                  CALG_DSS_SIGN, DSA, &noNullBlob },
1347  { 3, szOID_ANSI_X942_DH,              CALG_DH_SF,    DH, &noNullBlob },
1348  { 3, szOID_RSA_RSA,                   CALG_RSA_KEYX, RSA_KEYX, NULL },
1349  { 3, szOID_RSA_RSA,                   CALG_RSA_SIGN, RSA, NULL },
1350  { 3, szOID_RSA_RSA,                   CALG_RSA_SIGN, RSA_SIGN, NULL },
1351  { 3, szOID_OIWSEC_dsa,                CALG_DSS_SIGN, DSA, &noNullBlob },
1352  { 3, szOID_OIWSEC_dsa,                CALG_DSS_SIGN, DSS, &noNullBlob },
1353  { 3, szOID_OIWSEC_dsa,                CALG_DSS_SIGN, DSA_SIGN, &noNullBlob },
1354  { 3, szOID_RSA_DH,                    CALG_DH_SF,    DH, &noNullBlob },
1355  { 3, szOID_OIWSEC_rsaXchg,            CALG_RSA_KEYX, RSA_KEYX, NULL },
1356  { 3, szOID_INFOSEC_mosaicKMandUpdSig, CALG_DSS_SIGN, mosaicKMandUpdSig,
1357    &mosaicFlagsBlob },
1358  { 3, szOID_RSA_SMIMEalgESDH,          CALG_DH_EPHEM, ESDH, &noNullBlob },
1359  { 3, szOID_PKIX_NO_SIGNATURE,         CALG_NO_SIGN,  NO_SIGN, NULL },
1360 
1361  { 4, szOID_RSA_SHA1RSA,               CALG_SHA1,     sha1RSA, &rsaSignBlob },
1362  { 4, szOID_RSA_SHA256RSA,             CALG_SHA_256,  sha256RSA, &rsaSignBlob },
1363  { 4, szOID_RSA_SHA384RSA,             CALG_SHA_384,  sha384RSA, &rsaSignBlob },
1364  { 4, szOID_RSA_SHA512RSA,             CALG_SHA_512,  sha512RSA, &rsaSignBlob },
1365  { 4, szOID_RSA_MD5RSA,                CALG_MD5,      md5RSA, &rsaSignBlob },
1366  { 4, szOID_X957_SHA1DSA,              CALG_SHA1,     sha1DSA, &dssSignBlob },
1367  { 4, szOID_OIWSEC_sha1RSASign,        CALG_SHA1,     sha1RSA, &rsaSignBlob },
1368  { 4, szOID_OIWSEC_sha1RSASign,        CALG_SHA1,     shaRSA, &rsaSignBlob },
1369  { 4, szOID_OIWSEC_shaRSA,             CALG_SHA1,     shaRSA, &rsaSignBlob },
1370  { 4, szOID_OIWSEC_md5RSA,             CALG_MD5,      md5RSA, &rsaSignBlob },
1371  { 4, szOID_RSA_MD2RSA,                CALG_MD2,      md2RSA, &rsaSignBlob },
1372  { 4, szOID_RSA_MD4RSA,                CALG_MD4,      md4RSA, &rsaSignBlob },
1373  { 4, szOID_OIWSEC_md4RSA,             CALG_MD4,      md4RSA, &rsaSignBlob },
1374  { 4, szOID_OIWSEC_md4RSA2,            CALG_MD4,      md4RSA, &rsaSignBlob },
1375  { 4, szOID_OIWDIR_md2RSA,             CALG_MD2,      md2RSA, &rsaSignBlob },
1376  { 4, szOID_OIWSEC_shaDSA,             CALG_SHA1,     sha1DSA, &dssSignBlob },
1377  { 4, szOID_OIWSEC_shaDSA,             CALG_SHA1,     shaDSA, &dssSignBlob },
1378  { 4, szOID_OIWSEC_dsaSHA1,            CALG_SHA1,     dsaSHA1, &dssSignBlob },
1379  { 4, szOID_INFOSEC_mosaicUpdatedSig,  CALG_SHA1,     mosaicUpdatedSig,
1380    &mosaicSignBlob },
1381  { 4, szOID_ECDSA_SHA256,              CALG_OID_INFO_CNG_ONLY, sha256ECDSA, &ecdsaSignBlob,
1382    BCRYPT_SHA256_ALGORITHM, CRYPT_OID_INFO_ECC_PARAMETERS_ALGORITHM },
1383  { 4, szOID_ECDSA_SHA384,              CALG_OID_INFO_CNG_ONLY, sha384ECDSA, &ecdsaSignBlob,
1384    BCRYPT_SHA384_ALGORITHM, CRYPT_OID_INFO_ECC_PARAMETERS_ALGORITHM },
1385 
1386  { 5, szOID_COMMON_NAME,              0, CN, NULL },
1387  { 5, szOID_LOCALITY_NAME,            0, L, NULL },
1388  { 5, szOID_ORGANIZATION_NAME,        0, O, NULL },
1389  { 5, szOID_ORGANIZATIONAL_UNIT_NAME, 0, OU, NULL },
1390  { 5, szOID_RSA_emailAddr,            0, E, &ia5StringBlob },
1391  { 5, szOID_RSA_emailAddr,            0, Email, &ia5StringBlob },
1392  { 5, szOID_COUNTRY_NAME,             0, C, &printableStringBlob },
1393  { 5, szOID_STATE_OR_PROVINCE_NAME,   0, S, NULL },
1394  { 5, szOID_STATE_OR_PROVINCE_NAME,   0, ST, NULL },
1395  { 5, szOID_STREET_ADDRESS,           0, STREET, NULL },
1396  { 5, szOID_TITLE,                    0, T, NULL },
1397  { 5, szOID_TITLE,                    0, Title, NULL },
1398  { 5, szOID_GIVEN_NAME,               0, G, NULL },
1399  { 5, szOID_GIVEN_NAME,               0, GN, NULL },
1400  { 5, szOID_GIVEN_NAME,               0, GivenName, NULL },
1401  { 5, szOID_INITIALS,                 0, I, NULL },
1402  { 5, szOID_INITIALS,                 0, Initials, NULL },
1403  { 5, szOID_SUR_NAME,                 0, SN, NULL },
1404  { 5, szOID_DOMAIN_COMPONENT,         0, DC, &domainCompTypesBlob },
1405  { 5, szOID_DESCRIPTION,              0, Description, NULL },
1406  { 5, szOID_POSTAL_CODE,              0, PostalCode, NULL },
1407  { 5, szOID_POST_OFFICE_BOX,          0, POBox, NULL },
1408  { 5, szOID_TELEPHONE_NUMBER,         0, Phone, &printableStringBlob },
1409  { 5, szOID_X21_ADDRESS,              0, X21Address, &numericStringBlob },
1410  { 5, szOID_DN_QUALIFIER,             0, dnQualifier, NULL },
1411  { 5, szOID_DEVICE_SERIAL_NUMBER,     0, SERIALNUMBER, NULL },
1412 
1413  { 6, szOID_AUTHORITY_KEY_IDENTIFIER2, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
1414  { 6, szOID_AUTHORITY_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_AUTHORITY_KEY_ID, NULL },
1415  { 6, szOID_KEY_ATTRIBUTES, 0, (LPCWSTR)IDS_KEY_ATTRIBUTES, NULL },
1416  { 6, szOID_KEY_USAGE_RESTRICTION, 0, (LPCWSTR)IDS_KEY_USAGE_RESTRICTION, NULL },
1417  { 6, szOID_SUBJECT_ALT_NAME2, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
1418  { 6, szOID_SUBJECT_ALT_NAME, 0, (LPCWSTR)IDS_SUBJECT_ALT_NAME, NULL },
1419  { 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
1420  { 6, szOID_ISSUER_ALT_NAME2, 0, (LPCWSTR)IDS_ISSUER_ALT_NAME, NULL },
1421  { 6, szOID_BASIC_CONSTRAINTS2, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
1422  { 6, szOID_BASIC_CONSTRAINTS, 0, (LPCWSTR)IDS_BASIC_CONSTRAINTS, NULL },
1423  { 6, szOID_KEY_USAGE, 0, (LPCWSTR)IDS_KEY_USAGE, NULL },
1424  { 6, szOID_CERT_POLICIES, 0, (LPCWSTR)IDS_CERT_POLICIES, NULL },
1425  { 6, szOID_SUBJECT_KEY_IDENTIFIER, 0, (LPCWSTR)IDS_SUBJECT_KEY_IDENTIFIER, NULL },
1426  { 6, szOID_CRL_REASON_CODE, 0, (LPCWSTR)IDS_CRL_REASON_CODE, NULL },
1427  { 6, szOID_CRL_DIST_POINTS, 0, (LPCWSTR)IDS_CRL_DIST_POINTS, NULL },
1428  { 6, szOID_ENHANCED_KEY_USAGE, 0, (LPCWSTR)IDS_ENHANCED_KEY_USAGE, NULL },
1429  { 6, szOID_AUTHORITY_INFO_ACCESS, 0, (LPCWSTR)IDS_AUTHORITY_INFO_ACCESS, NULL },
1430  { 6, szOID_CERT_EXTENSIONS, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
1431  { 6, szOID_RSA_certExtensions, 0, (LPCWSTR)IDS_CERT_EXTENSIONS, NULL },
1432  { 6, szOID_NEXT_UPDATE_LOCATION, 0, (LPCWSTR)IDS_NEXT_UPDATE_LOCATION, NULL },
1433  { 6, szOID_YESNO_TRUST_ATTR, 0, (LPCWSTR)IDS_YES_OR_NO_TRUST, NULL },
1434  { 6, szOID_RSA_emailAddr, 0, (LPCWSTR)IDS_EMAIL_ADDRESS, NULL },
1435  { 6, szOID_RSA_unstructName, 0, (LPCWSTR)IDS_UNSTRUCTURED_NAME, NULL },
1436  { 6, szOID_RSA_contentType, 0, (LPCWSTR)IDS_CONTENT_TYPE, NULL },
1437  { 6, szOID_RSA_messageDigest, 0, (LPCWSTR)IDS_MESSAGE_DIGEST, NULL },
1438  { 6, szOID_RSA_signingTime, 0, (LPCWSTR)IDS_SIGNING_TIME, NULL },
1439  { 6, szOID_RSA_counterSign, 0, (LPCWSTR)IDS_COUNTER_SIGN, NULL },
1440  { 6, szOID_RSA_challengePwd, 0, (LPCWSTR)IDS_CHALLENGE_PASSWORD, NULL },
1441  { 6, szOID_RSA_unstructAddr, 0, (LPCWSTR)IDS_UNSTRUCTURED_ADDRESS, NULL },
1442  { 6, szOID_RSA_SMIMECapabilities, 0, (LPCWSTR)IDS_SMIME_CAPABILITIES, NULL },
1443  { 6, szOID_RSA_preferSignedData, 0, (LPCWSTR)IDS_PREFER_SIGNED_DATA, NULL },
1444  { 6, szOID_PKIX_POLICY_QUALIFIER_CPS, 0, (LPCWSTR)IDS_CPS, NULL },
1445  { 6, szOID_PKIX_POLICY_QUALIFIER_USERNOTICE, 0, (LPCWSTR)IDS_USER_NOTICE, NULL },
1446  { 6, szOID_PKIX_OCSP, 0, (LPCWSTR)IDS_OCSP, NULL },
1447  { 6, szOID_PKIX_CA_ISSUERS, 0, (LPCWSTR)IDS_CA_ISSUER, NULL },
1448  { 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TEMPLATE_NAME, NULL },
1449  { 6, szOID_ENROLL_CERTTYPE_EXTENSION, 0, (LPCWSTR)IDS_CERT_TYPE, NULL },
1450  { 6, szOID_CERT_MANIFOLD, 0, (LPCWSTR)IDS_CERT_MANIFOLD, NULL },
1451  { 6, szOID_NETSCAPE_CERT_TYPE, 0, (LPCWSTR)IDS_NETSCAPE_CERT_TYPE, NULL },
1452  { 6, szOID_NETSCAPE_BASE_URL, 0, (LPCWSTR)IDS_NETSCAPE_BASE_URL, NULL },
1453  { 6, szOID_NETSCAPE_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_REVOCATION_URL, NULL },
1454  { 6, szOID_NETSCAPE_CA_REVOCATION_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_REVOCATION_URL, NULL },
1455  { 6, szOID_NETSCAPE_CERT_RENEWAL_URL, 0, (LPCWSTR)IDS_NETSCAPE_CERT_RENEWAL_URL, NULL },
1456  { 6, szOID_NETSCAPE_CA_POLICY_URL, 0, (LPCWSTR)IDS_NETSCAPE_CA_POLICY_URL, NULL },
1457  { 6, szOID_NETSCAPE_SSL_SERVER_NAME, 0, (LPCWSTR)IDS_NETSCAPE_SSL_SERVER_NAME, NULL },
1458  { 6, szOID_NETSCAPE_COMMENT, 0, (LPCWSTR)IDS_NETSCAPE_COMMENT, NULL },
1459  { 6, "1.3.6.1.4.1.311.2.1.10", 0, SpcSpAgencyInfo, NULL },
1460  { 6, "1.3.6.1.4.1.311.2.1.27", 0, SpcFinancialCriteria, NULL },
1461  { 6, "1.3.6.1.4.1.311.2.1.26", 0, SpcMinimalCriteria, NULL },
1462  { 6, szOID_COUNTRY_NAME, 0, (LPCWSTR)IDS_COUNTRY, NULL },
1463  { 6, szOID_ORGANIZATION_NAME, 0, (LPCWSTR)IDS_ORGANIZATION, NULL },
1464  { 6, szOID_ORGANIZATIONAL_UNIT_NAME, 0, (LPCWSTR)IDS_ORGANIZATIONAL_UNIT, NULL },
1465  { 6, szOID_COMMON_NAME, 0, (LPCWSTR)IDS_COMMON_NAME, NULL },
1466  { 6, szOID_LOCALITY_NAME, 0, (LPCWSTR)IDS_LOCALITY, NULL },
1467  { 6, szOID_STATE_OR_PROVINCE_NAME, 0, (LPCWSTR)IDS_STATE_OR_PROVINCE, NULL },
1468  { 6, szOID_TITLE, 0, (LPCWSTR)IDS_TITLE, NULL },
1469  { 6, szOID_GIVEN_NAME, 0, (LPCWSTR)IDS_GIVEN_NAME, NULL },
1470  { 6, szOID_INITIALS, 0, (LPCWSTR)IDS_INITIALS, NULL },
1471  { 6, szOID_SUR_NAME, 0, (LPCWSTR)IDS_SUR_NAME, NULL },
1472  { 6, szOID_DOMAIN_COMPONENT, 0, (LPCWSTR)IDS_DOMAIN_COMPONENT, NULL },
1473  { 6, szOID_STREET_ADDRESS, 0, (LPCWSTR)IDS_STREET_ADDRESS, NULL },
1474  { 6, szOID_DEVICE_SERIAL_NUMBER, 0, (LPCWSTR)IDS_SERIAL_NUMBER, NULL },
1475  { 6, szOID_CERTSRV_CA_VERSION, 0, (LPCWSTR)IDS_CA_VERSION, NULL },
1476  { 6, szOID_CERTSRV_CROSSCA_VERSION, 0, (LPCWSTR)IDS_CROSS_CA_VERSION, NULL },
1477  { 6, szOID_SERIALIZED, 0, (LPCWSTR)IDS_SERIALIZED_SIG_SERIAL_NUMBER, NULL },
1478  { 6, szOID_NT_PRINCIPAL_NAME, 0, (LPCWSTR)IDS_PRINCIPAL_NAME, NULL },
1479  { 6, szOID_PRODUCT_UPDATE, 0, (LPCWSTR)IDS_WINDOWS_PRODUCT_UPDATE, NULL },
1480  { 6, szOID_ENROLLMENT_NAME_VALUE_PAIR, 0, (LPCWSTR)IDS_ENROLLMENT_NAME_VALUE_PAIR, NULL },
1481  { 6, szOID_OS_VERSION, 0, (LPCWSTR)IDS_OS_VERSION, NULL },
1482  { 6, szOID_ENROLLMENT_CSP_PROVIDER, 0, (LPCWSTR)IDS_ENROLLMENT_CSP, NULL },
1483  { 6, szOID_CRL_NUMBER, 0, (LPCWSTR)IDS_CRL_NUMBER, NULL },
1484  { 6, szOID_DELTA_CRL_INDICATOR, 0, (LPCWSTR)IDS_DELTA_CRL_INDICATOR, NULL },
1485  { 6, szOID_ISSUING_DIST_POINT, 0, (LPCWSTR)IDS_ISSUING_DIST_POINT, NULL },
1486  { 6, szOID_FRESHEST_CRL, 0, (LPCWSTR)IDS_FRESHEST_CRL, NULL },
1487  { 6, szOID_NAME_CONSTRAINTS, 0, (LPCWSTR)IDS_NAME_CONSTRAINTS, NULL },
1488  { 6, szOID_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
1489  { 6, szOID_LEGACY_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_POLICY_MAPPINGS, NULL },
1490  { 6, szOID_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_POLICY_CONSTRAINTS, NULL },
1491  { 6, szOID_CROSS_CERT_DIST_POINTS, 0, (LPCWSTR)IDS_CROSS_CERT_DIST_POINTS, NULL },
1492  { 6, szOID_APPLICATION_CERT_POLICIES, 0, (LPCWSTR)IDS_APPLICATION_POLICIES, NULL },
1493  { 6, szOID_APPLICATION_POLICY_MAPPINGS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_MAPPINGS, NULL },
1494  { 6, szOID_APPLICATION_POLICY_CONSTRAINTS, 0, (LPCWSTR)IDS_APPLICATION_POLICY_CONSTRAINTS, NULL },
1495  { 6, szOID_CT_PKI_DATA, 0, (LPCWSTR)IDS_CMC_DATA, NULL },
1496  { 6, szOID_CT_PKI_RESPONSE, 0, (LPCWSTR)IDS_CMC_RESPONSE, NULL },
1497  { 6, szOID_CMC, 0, (LPCWSTR)IDS_UNSIGNED_CMC_REQUEST, NULL },
1498  { 6, szOID_CMC_STATUS_INFO, 0, (LPCWSTR)IDS_CMC_STATUS_INFO, NULL },
1499  { 6, szOID_CMC_ADD_EXTENSIONS, 0, (LPCWSTR)IDS_CMC_EXTENSIONS, NULL },
1500  { 6, szOID_CTL, 0, (LPCWSTR)IDS_CMC_ATTRIBUTES, NULL },
1501  { 6, szOID_RSA_data, 0, (LPCWSTR)IDS_PKCS_7_DATA, NULL },
1502  { 6, szOID_RSA_signedData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED, NULL },
1503  { 6, szOID_RSA_envelopedData, 0, (LPCWSTR)IDS_PKCS_7_ENVELOPED, NULL },
1504  { 6, szOID_RSA_signEnvData, 0, (LPCWSTR)IDS_PKCS_7_SIGNED_ENVELOPED, NULL },
1505  { 6, szOID_RSA_digestedData, 0, (LPCWSTR)IDS_PKCS_7_DIGESTED, NULL },
1506  { 6, szOID_RSA_encryptedData, 0, (LPCWSTR)IDS_PKCS_7_ENCRYPTED, NULL },
1507  { 6, szOID_CERTSRV_PREVIOUS_CERT_HASH, 0, (LPCWSTR)IDS_PREVIOUS_CA_CERT_HASH, NULL },
1508  { 6, szOID_CRL_VIRTUAL_BASE, 0, (LPCWSTR)IDS_CRL_VIRTUAL_BASE, NULL },
1509  { 6, szOID_CRL_NEXT_PUBLISH, 0, (LPCWSTR)IDS_CRL_NEXT_PUBLISH, NULL },
1510  { 6, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
1511  { 6, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
1512  { 6, szOID_CERTIFICATE_TEMPLATE, 0, (LPCWSTR)IDS_CERTIFICATE_TEMPLATE, NULL },
1513  { 6, szOID_ENTERPRISE_OID_ROOT, 0, (LPCWSTR)IDS_ENTERPRISE_ROOT_OID, NULL },
1514  { 6, szOID_RDN_DUMMY_SIGNER, 0, (LPCWSTR)IDS_RDN_DUMMY_SIGNER, NULL },
1515  { 6, szOID_ARCHIVED_KEY_ATTR, 0, (LPCWSTR)IDS_ARCHIVED_KEY_ATTR, NULL },
1516  { 6, szOID_CRL_SELF_CDP, 0, (LPCWSTR)IDS_CRL_SELF_CDP, NULL },
1517  { 6, szOID_REQUIRE_CERT_CHAIN_POLICY, 0, (LPCWSTR)IDS_REQUIRE_CERT_CHAIN_POLICY, NULL },
1518  { 6, szOID_CMC_TRANSACTION_ID, 0, (LPCWSTR)IDS_TRANSACTION_ID, NULL },
1519  { 6, szOID_CMC_SENDER_NONCE, 0, (LPCWSTR)IDS_SENDER_NONCE, NULL },
1520  { 6, szOID_CMC_RECIPIENT_NONCE, 0, (LPCWSTR)IDS_RECIPIENT_NONCE, NULL },
1521  { 6, szOID_CMC_REG_INFO, 0, (LPCWSTR)IDS_REG_INFO, NULL },
1522  { 6, szOID_CMC_GET_CERT, 0, (LPCWSTR)IDS_GET_CERTIFICATE, NULL },
1523  { 6, szOID_CMC_GET_CRL, 0, (LPCWSTR)IDS_GET_CRL, NULL },
1524  { 6, szOID_CMC_REVOKE_REQUEST, 0, (LPCWSTR)IDS_REVOKE_REQUEST, NULL },
1525  { 6, szOID_CMC_QUERY_PENDING, 0, (LPCWSTR)IDS_QUERY_PENDING, NULL },
1526  { 6, szOID_SORTED_CTL, 0, (LPCWSTR)IDS_SORTED_CTL, NULL },
1527  { 6, szOID_ARCHIVED_KEY_CERT_HASH, 0, (LPCWSTR)IDS_ARCHIVED_KEY_CERT_HASH, NULL },
1528  { 6, szOID_PRIVATEKEY_USAGE_PERIOD, 0, (LPCWSTR)IDS_PRIVATE_KEY_USAGE_PERIOD, NULL },
1529  { 6, szOID_REQUEST_CLIENT_INFO, 0, (LPCWSTR)IDS_CLIENT_INFORMATION, NULL },
1530 
1531  { 7, szOID_PKIX_KP_SERVER_AUTH, 0, (LPCWSTR)IDS_SERVER_AUTHENTICATION, NULL },
1532  { 7, szOID_PKIX_KP_CLIENT_AUTH, 0, (LPCWSTR)IDS_CLIENT_AUTHENTICATION, NULL },
1533  { 7, szOID_PKIX_KP_CODE_SIGNING, 0, (LPCWSTR)IDS_CODE_SIGNING, NULL },
1534  { 7, szOID_PKIX_KP_EMAIL_PROTECTION, 0, (LPCWSTR)IDS_SECURE_EMAIL, NULL },
1535  { 7, szOID_PKIX_KP_TIMESTAMP_SIGNING, 0, (LPCWSTR)IDS_TIME_STAMPING, NULL },
1536  { 7, szOID_KP_CTL_USAGE_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TRUST_LIST_SIGNING, NULL },
1537  { 7, szOID_KP_TIME_STAMP_SIGNING, 0, (LPCWSTR)IDS_MICROSOFT_TIME_STAMPING, NULL },
1538  { 7, szOID_PKIX_KP_IPSEC_END_SYSTEM, 0, (LPCWSTR)IDS_IPSEC_END_SYSTEM, NULL },
1539  { 7, szOID_PKIX_KP_IPSEC_TUNNEL, 0, (LPCWSTR)IDS_IPSEC_TUNNEL, NULL },
1540  { 7, szOID_PKIX_KP_IPSEC_USER, 0, (LPCWSTR)IDS_IPSEC_USER, NULL },
1541  { 7, szOID_KP_EFS, 0, (LPCWSTR)IDS_EFS, NULL },
1542  { 7, szOID_WHQL_CRYPTO, 0, (LPCWSTR)IDS_WHQL_CRYPTO, NULL },
1543  { 7, szOID_NT5_CRYPTO, 0, (LPCWSTR)IDS_NT5_CRYPTO, NULL },
1544  { 7, szOID_OEM_WHQL_CRYPTO, 0, (LPCWSTR)IDS_OEM_WHQL_CRYPTO, NULL },
1545  { 7, szOID_EMBEDDED_NT_CRYPTO, 0, (LPCWSTR)IDS_EMBEDDED_NT_CRYPTO, NULL },
1546  { 7, szOID_LICENSES, 0, (LPCWSTR)IDS_KEY_PACK_LICENSES, NULL },
1547  { 7, szOID_LICENSE_SERVER, 0, (LPCWSTR)IDS_LICENSE_SERVER, NULL },
1548  { 7, szOID_KP_SMARTCARD_LOGON, 0, (LPCWSTR)IDS_SMART_CARD_LOGON, NULL },
1549  { 7, szOID_DRM, 0, (LPCWSTR)IDS_DIGITAL_RIGHTS, NULL },
1550  { 7, szOID_KP_QUALIFIED_SUBORDINATION, 0, (LPCWSTR)IDS_QUALIFIED_SUBORDINATION, NULL },
1551  { 7, szOID_KP_KEY_RECOVERY, 0, (LPCWSTR)IDS_KEY_RECOVERY, NULL },
1552  { 7, szOID_KP_DOCUMENT_SIGNING, 0, (LPCWSTR)IDS_DOCUMENT_SIGNING, NULL },
1553  { 7, szOID_IPSEC_KP_IKE_INTERMEDIATE, 0, (LPCWSTR)IDS_IPSEC_IKE_INTERMEDIATE, NULL },
1554  { 7, szOID_EFS_RECOVERY, 0, (LPCWSTR)IDS_FILE_RECOVERY, NULL },
1555  { 7, szOID_ROOT_LIST_SIGNER, 0, (LPCWSTR)IDS_ROOT_LIST_SIGNER, NULL },
1556  { 7, szOID_ANY_APPLICATION_POLICY, 0, (LPCWSTR)IDS_ANY_APPLICATION_POLICIES, NULL },
1557  { 7, szOID_DS_EMAIL_REPLICATION, 0, (LPCWSTR)IDS_DS_EMAIL_REPLICATION, NULL },
1558  { 7, szOID_ENROLLMENT_AGENT, 0, (LPCWSTR)IDS_ENROLLMENT_AGENT, NULL },
1559  { 7, szOID_KP_KEY_RECOVERY_AGENT, 0, (LPCWSTR)IDS_KEY_RECOVERY_AGENT, NULL },
1560  { 7, szOID_KP_CA_EXCHANGE, 0, (LPCWSTR)IDS_CA_EXCHANGE, NULL },
1561  { 7, szOID_KP_LIFETIME_SIGNING, 0, (LPCWSTR)IDS_LIFETIME_SIGNING, NULL },
1562 
1563  { 8, szOID_ANY_CERT_POLICY, 0, (LPCWSTR)IDS_ANY_CERT_POLICY, NULL },
1564 };
1565 
1566 struct OIDInfo {
1567     CRYPT_OID_INFO info;
1568     struct list entry;
1569 };
1570 
1571 static struct OIDInfo *read_oid_info(HKEY root, char *key_name, DWORD *flags)
1572 {
1573     HKEY key;
1574     DWORD len, oid_len, name_len = 0, extra_len = 0, cngalgid_len = 0, cngextra_len = 0, group_id = 0;
1575     struct OIDInfo *info;
1576     char *p;
1577 
1578     if (RegOpenKeyExA(root, key_name, 0, KEY_READ, &key))
1579         return NULL;
1580 
1581     p = strchr(key_name, '!');
1582     if (p)
1583     {
1584         group_id = strtol(p + 1, NULL, 10);
1585         *p = 0;
1586     }
1587 
1588     oid_len = strlen(key_name) + 1;
1589 
1590     RegQueryValueExW(key, nameW, NULL, NULL, NULL, &name_len);
1591     RegQueryValueExW(key, extraW, NULL, NULL, NULL, &extra_len);
1592     RegQueryValueExW(key, cngalgidW, NULL, NULL, NULL, &cngalgid_len);
1593     RegQueryValueExW(key, cngextraalgidW, NULL, NULL, NULL, &cngextra_len);
1594 
1595     info = CryptMemAlloc(sizeof(*info) + oid_len + name_len + extra_len + cngalgid_len + cngextra_len);
1596     if (info)
1597     {
1598         *flags = 0;
1599         len = sizeof(*flags);
1600         RegQueryValueExW(key, flagsW, NULL, NULL, (BYTE *)flags, &len);
1601 
1602         memset(info, 0, sizeof(*info));
1603         info->info.cbSize = sizeof(info->info);
1604 
1605         p = (char *)(info + 1);
1606 
1607         info->info.pszOID = p;
1608         strcpy((char *)info->info.pszOID, key_name);
1609         p += oid_len;
1610 
1611         if (name_len)
1612         {
1613             info->info.pwszName = (WCHAR *)p;
1614             RegQueryValueExW(key, nameW, NULL, NULL, (BYTE *)info->info.pwszName, &name_len);
1615             p += name_len;
1616         }
1617 
1618         info->info.dwGroupId = group_id;
1619 
1620         len = sizeof(info->info.u.Algid);
1621         RegQueryValueExW(key, algidW, NULL, NULL, (BYTE *)&info->info.u.Algid, &len);
1622 
1623         if (extra_len)
1624         {
1625             info->info.ExtraInfo.cbData = extra_len;
1626             info->info.ExtraInfo.pbData = (BYTE *)p;
1627             RegQueryValueExW(key, extraW, NULL, NULL, info->info.ExtraInfo.pbData, &extra_len);
1628             p += extra_len;
1629         }
1630 
1631         if (cngalgid_len)
1632         {
1633             info->info.pwszCNGAlgid = (WCHAR *)p;
1634             RegQueryValueExW(key, cngalgidW, NULL, NULL, (BYTE *)info->info.pwszCNGAlgid, &cngalgid_len);
1635             p += cngalgid_len;
1636         }
1637 
1638         if (cngextra_len)
1639         {
1640             info->info.pwszCNGExtraAlgid = (WCHAR *)p;
1641             RegQueryValueExW(key, cngextraalgidW, NULL, NULL, (BYTE *)info->info.pwszCNGExtraAlgid, &cngalgid_len);
1642         }
1643     }
1644 
1645     RegCloseKey(key);
1646 
1647     return info;
1648 }
1649 
1650 static void init_registered_oid_info(void)
1651 {
1652     DWORD err, idx;
1653     HKEY root;
1654 
1655     err = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "Software\\Microsoft\\Cryptography\\OID\\EncodingType 0\\CryptDllFindOIDInfo",
1656                         0, KEY_ALL_ACCESS, &root);
1657     if (err != ERROR_SUCCESS) return;
1658 
1659     idx = 0;
1660     for (;;)
1661     {
1662         char key_name[MAX_PATH];
1663         struct OIDInfo *info;
1664         DWORD flags;
1665 
1666         err = RegEnumKeyA(root, idx++, key_name, MAX_PATH);
1667         if (err == ERROR_NO_MORE_ITEMS)
1668             break;
1669 
1670         if (err == ERROR_SUCCESS)
1671         {
1672             if ((info = read_oid_info(root, key_name, &flags)))
1673             {
1674                 TRACE("adding oid %s, name %s, groupid %u, algid %u, extra %u, CNG algid %s, CNG extra %s\n",
1675                       debugstr_a(info->info.pszOID), debugstr_w(info->info.pwszName),
1676                       info->info.dwGroupId, info->info.u.Algid, info->info.ExtraInfo.cbData,
1677                       debugstr_w(info->info.pwszCNGAlgid), debugstr_w(info->info.pwszCNGExtraAlgid));
1678 
1679                 if (flags & CRYPT_INSTALL_OID_INFO_BEFORE_FLAG)
1680                     list_add_head(&oidInfo, &info->entry);
1681                 else
1682                     list_add_tail(&oidInfo, &info->entry);
1683             }
1684         }
1685     }
1686 
1687     RegCloseKey(root);
1688 }
1689 
1690 static void init_oid_info(void)
1691 {
1692     DWORD i;
1693 
1694     oid_init_localizednames();
1695     for (i = 0; i < ARRAY_SIZE(oidInfoConstructors); i++)
1696     {
1697         if (!IS_INTRESOURCE(oidInfoConstructors[i].pwszName))
1698         {
1699             struct OIDInfo *info;
1700 
1701             /* The name is a static string, so just use the same pointer */
1702             info = CryptMemAlloc(sizeof(struct OIDInfo));
1703             if (info)
1704             {
1705                 memset(info, 0, sizeof(*info));
1706                 info->info.cbSize = sizeof(CRYPT_OID_INFO);
1707                 info->info.pszOID = oidInfoConstructors[i].pszOID;
1708                 info->info.pwszName = oidInfoConstructors[i].pwszName;
1709                 info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
1710                 info->info.u.Algid = oidInfoConstructors[i].Algid;
1711                 if (oidInfoConstructors[i].blob)
1712                 {
1713                     info->info.ExtraInfo.cbData =
1714                      oidInfoConstructors[i].blob->cbData;
1715                     info->info.ExtraInfo.pbData =
1716                      oidInfoConstructors[i].blob->pbData;
1717                 }
1718                 info->info.pwszCNGAlgid = oidInfoConstructors[i].pwszCNGAlgid;
1719                 info->info.pwszCNGExtraAlgid = oidInfoConstructors[i].pwszCNGExtraAlgid;
1720                 list_add_tail(&oidInfo, &info->entry);
1721             }
1722         }
1723         else
1724         {
1725             LPCWSTR stringresource;
1726             int len = LoadStringW(hInstance,
1727              (UINT_PTR)oidInfoConstructors[i].pwszName,
1728              (LPWSTR)&stringresource, 0);
1729 
1730             if (len)
1731             {
1732                 struct OIDInfo *info = CryptMemAlloc(sizeof(struct OIDInfo) +
1733                  (len + 1) * sizeof(WCHAR));
1734 
1735                 if (info)
1736                 {
1737                     memset(info, 0, sizeof(*info));
1738                     info->info.cbSize = sizeof(CRYPT_OID_INFO);
1739                     info->info.pszOID = oidInfoConstructors[i].pszOID;
1740                     info->info.pwszName = (LPWSTR)(info + 1);
1741                     info->info.dwGroupId = oidInfoConstructors[i].dwGroupId;
1742                     info->info.u.Algid = oidInfoConstructors[i].Algid;
1743                     memcpy(info + 1, stringresource, len*sizeof(WCHAR));
1744                     ((LPWSTR)(info + 1))[len] = 0;
1745                     if (oidInfoConstructors[i].blob)
1746                     {
1747                         info->info.ExtraInfo.cbData =
1748                          oidInfoConstructors[i].blob->cbData;
1749                         info->info.ExtraInfo.pbData =
1750                          oidInfoConstructors[i].blob->pbData;
1751                     }
1752                     info->info.pwszCNGAlgid = oidInfoConstructors[i].pwszCNGAlgid;
1753                     info->info.pwszCNGExtraAlgid = oidInfoConstructors[i].pwszCNGExtraAlgid;
1754                     list_add_tail(&oidInfo, &info->entry);
1755                 }
1756             }
1757         }
1758     }
1759 }
1760 
1761 static void free_oid_info(void)
1762 {
1763     struct OIDInfo *info, *next;
1764 
1765     LIST_FOR_EACH_ENTRY_SAFE(info, next, &oidInfo, struct OIDInfo, entry)
1766     {
1767         list_remove(&info->entry);
1768         CryptMemFree(info);
1769     }
1770     DeleteCriticalSection(&oidInfoCS);
1771 }
1772 
1773 /***********************************************************************
1774  *             CryptEnumOIDInfo (CRYPT32.@)
1775  */
1776 BOOL WINAPI CryptEnumOIDInfo(DWORD dwGroupId, DWORD dwFlags, void *pvArg,
1777  PFN_CRYPT_ENUM_OID_INFO pfnEnumOIDInfo)
1778 {
1779     BOOL ret = TRUE;
1780     struct OIDInfo *info;
1781 
1782     TRACE("(%d, %08x, %p, %p)\n", dwGroupId, dwFlags, pvArg,
1783      pfnEnumOIDInfo);
1784 
1785     EnterCriticalSection(&oidInfoCS);
1786     LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1787     {
1788         if (!dwGroupId || dwGroupId == info->info.dwGroupId)
1789         {
1790             ret = pfnEnumOIDInfo(&info->info, pvArg);
1791             if (!ret)
1792                 break;
1793         }
1794     }
1795     LeaveCriticalSection(&oidInfoCS);
1796     return ret;
1797 }
1798 
1799 PCCRYPT_OID_INFO WINAPI CryptFindOIDInfo(DWORD dwKeyType, void *pvKey,
1800  DWORD dwGroupId)
1801 {
1802     PCCRYPT_OID_INFO ret = NULL;
1803 
1804     TRACE("(%d, %p, %d)\n", dwKeyType, pvKey, dwGroupId);
1805 
1806     switch(dwKeyType)
1807     {
1808     case CRYPT_OID_INFO_ALGID_KEY:
1809     {
1810         struct OIDInfo *info;
1811 
1812         TRACE("CRYPT_OID_INFO_ALGID_KEY: %d\n", *(DWORD *)pvKey);
1813         EnterCriticalSection(&oidInfoCS);
1814         LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1815         {
1816             if (info->info.u.Algid == *(DWORD *)pvKey &&
1817              (!dwGroupId || info->info.dwGroupId == dwGroupId))
1818             {
1819                 ret = &info->info;
1820                 break;
1821             }
1822         }
1823         LeaveCriticalSection(&oidInfoCS);
1824         break;
1825     }
1826     case CRYPT_OID_INFO_NAME_KEY:
1827     {
1828         struct OIDInfo *info;
1829 
1830         TRACE("CRYPT_OID_INFO_NAME_KEY: %s\n", debugstr_w(pvKey));
1831         EnterCriticalSection(&oidInfoCS);
1832         LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1833         {
1834             if (!lstrcmpW(info->info.pwszName, pvKey) &&
1835              (!dwGroupId || info->info.dwGroupId == dwGroupId))
1836             {
1837                 ret = &info->info;
1838                 break;
1839             }
1840         }
1841         LeaveCriticalSection(&oidInfoCS);
1842         break;
1843     }
1844     case CRYPT_OID_INFO_OID_KEY:
1845     {
1846         struct OIDInfo *info;
1847         LPSTR oid = pvKey;
1848 
1849         TRACE("CRYPT_OID_INFO_OID_KEY: %s\n", debugstr_a(oid));
1850         EnterCriticalSection(&oidInfoCS);
1851         LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1852         {
1853             if (!lstrcmpA(info->info.pszOID, oid) &&
1854              (!dwGroupId || info->info.dwGroupId == dwGroupId))
1855             {
1856                 ret = &info->info;
1857                 break;
1858             }
1859         }
1860         LeaveCriticalSection(&oidInfoCS);
1861         break;
1862     }
1863     case CRYPT_OID_INFO_SIGN_KEY:
1864     {
1865         struct OIDInfo *info;
1866 
1867         TRACE("CRYPT_OID_INFO_SIGN_KEY: %d\n", *(DWORD *)pvKey);
1868         EnterCriticalSection(&oidInfoCS);
1869         LIST_FOR_EACH_ENTRY(info, &oidInfo, struct OIDInfo, entry)
1870         {
1871             if (info->info.u.Algid == *(DWORD *)pvKey &&
1872              info->info.ExtraInfo.cbData >= sizeof(DWORD) &&
1873              *(DWORD *)info->info.ExtraInfo.pbData ==
1874              *(DWORD *)((LPBYTE)pvKey + sizeof(DWORD)) &&
1875              (!dwGroupId || info->info.dwGroupId == dwGroupId))
1876             {
1877                 ret = &info->info;
1878                 break;
1879             }
1880         }
1881         LeaveCriticalSection(&oidInfoCS);
1882         break;
1883     }
1884     }
1885     return ret;
1886 }
1887 
1888 LPCSTR WINAPI CertAlgIdToOID(DWORD dwAlgId)
1889 {
1890     LPCSTR ret;
1891     PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_ALGID_KEY,
1892      &dwAlgId, 0);
1893 
1894     if (info)
1895         ret = info->pszOID;
1896     else
1897         ret = NULL;
1898     return ret;
1899 }
1900 
1901 DWORD WINAPI CertOIDToAlgId(LPCSTR pszObjId)
1902 {
1903     DWORD ret;
1904     PCCRYPT_OID_INFO info = CryptFindOIDInfo(CRYPT_OID_INFO_OID_KEY,
1905      (void *)pszObjId, 0);
1906 
1907     if (info)
1908         ret = info->u.Algid;
1909     else
1910         ret = 0;
1911     return ret;
1912 }
1913 
1914 void crypt_oid_init(void)
1915 {
1916     init_oid_info();
1917     init_registered_oid_info();
1918 }
1919 
1920 void crypt_oid_free(void)
1921 {
1922     free_function_sets();
1923     free_oid_info();
1924 }
1925