#include <Windows.h>
|
#include <iphlpapi.h>
|
//definition of size_t
|
#include <stdlib.h>
|
//#include "../../base/base64.h"
|
#include "../../base/logger.h"
|
#include"../os.h"
|
#include "public-key.h"
|
|
#pragma comment(lib, "IPHLPAPI.lib")
|
unsigned char* unbase64(const char* ascii, int len, int *flen);
|
|
FUNCTION_RETURN getOsSpecificIdentifier(unsigned char identifier[6]){
|
return FUNC_RET_NOT_AVAIL;
|
}
|
|
FUNCTION_RETURN getMachineName(unsigned char identifier[6]) {
|
FUNCTION_RETURN result = FUNC_RET_ERROR;
|
char buffer[MAX_COMPUTERNAME_LENGTH + 1];
|
int bufsize = MAX_COMPUTERNAME_LENGTH + 1;
|
BOOL cmpName = GetComputerName(
|
buffer, &bufsize);
|
if (cmpName){
|
strncpy(identifier, buffer, 6);
|
result = FUNC_RET_OK;
|
}
|
return result;
|
}
|
|
FUNCTION_RETURN getCpuId(unsigned char identifier[6]) {
|
return FUNC_RET_NOT_AVAIL;
|
}
|
|
void os_initialize() {
|
}
|
|
//http://www.ok-soft-gmbh.com/ForStackOverflow/EnumMassStorage.c
|
//http://stackoverflow.com/questions/3098696/same-code-returns-diffrent-result-on-windows7-32-bit-system
|
#define MAX_UNITS 30
|
FUNCTION_RETURN getDiskInfos(DiskInfo * diskInfos, size_t * disk_info_size) {
|
DWORD FileMaxLen;
|
int ndrives = 0;
|
DWORD FileFlags;
|
char volName[_MAX_FNAME], FileSysName[_MAX_FNAME];
|
char* szSingleDrive;
|
DWORD volSerial = 0;
|
BOOL success;
|
UINT driveType;
|
DWORD dwSize = MAX_PATH;
|
char szLogicalDrives[MAX_PATH] = { 0 };
|
|
FUNCTION_RETURN return_value;
|
DWORD dwResult = GetLogicalDriveStrings(dwSize, szLogicalDrives);
|
|
if (dwResult > 0 && dwResult <= MAX_PATH)
|
{
|
return_value = FUNC_RET_OK;
|
szSingleDrive = szLogicalDrives;
|
while (*szSingleDrive && ndrives < MAX_UNITS)
|
{
|
|
// get the next drive
|
driveType = GetDriveType(szSingleDrive);
|
if (driveType == DRIVE_FIXED){
|
success = GetVolumeInformation(szSingleDrive, volName, MAX_PATH, &volSerial,
|
&FileMaxLen, &FileFlags, FileSysName, MAX_PATH);
|
if (success) {
|
LOG_INFO("drive : %s\n", szSingleDrive);
|
LOG_INFO("Volume Name : %s\n", volName);
|
LOG_INFO("Volume Serial : 0x%x\n", volSerial);
|
LOG_DEBUG("Max file length : %d\n", FileMaxLen);
|
LOG_DEBUG("Filesystem : %s\n", FileSysName);
|
if (diskInfos != NULL && * disk_info_size < ndrives){
|
strncpy(diskInfos[ndrives].device, volName, MAX_PATH);
|
strncpy(diskInfos[ndrives].label, FileSysName, MAX_PATH);
|
diskInfos[ndrives].id = ndrives;
|
diskInfos[ndrives].preferred = (strncmp(szSingleDrive, "C", 1) != 0);
|
|
}
|
ndrives++;
|
}
|
else {
|
LOG_WARN("Unable to retrieve information of '%s'\n", szSingleDrive);
|
}
|
}
|
LOG_INFO("This volume is not fixed : %s, type: %d\n", szSingleDrive);
|
szSingleDrive += strlen(szSingleDrive) + 1;
|
}
|
}
|
|
if (*disk_info_size >= ndrives){
|
return_value = FUNC_RET_BUFFER_TOO_SMALL;
|
}
|
return return_value;
|
}
|
|
static int translate(char ipStringIn[16], unsigned char ipv4[4]) {
|
char *str2;
|
|
size_t index = 0;
|
|
str2 = ipStringIn; /* save the pointer */
|
while (*str2) {
|
if (isdigit((unsigned char)*str2)) {
|
ipv4[index] *= 10;
|
ipv4[index] += *str2 - '0';
|
}
|
else {
|
index++;
|
}
|
str2++;
|
}
|
return 0;
|
}
|
|
//http://stackoverflow.com/questions/18046063/mac-address-using-c
|
//TODO: count only interfaces with type (MIB_IF_TYPE_ETHERNET IF_TYPE_IEEE80211)
|
FUNCTION_RETURN getAdapterInfos(OsAdapterInfo * adapterInfos, size_t * adapter_info_size) {
|
DWORD dwStatus;
|
unsigned int i = 0;
|
FUNCTION_RETURN result;
|
PIP_ADAPTER_INFO pAdapterInfo, pAdapter = NULL;
|
//IP_ADAPTER_INFO AdapterInfo[20]; // Allocate information for up to 16 NICs
|
DWORD dwBufLen = 20; //sizeof(AdapterInfo); // Save the memory size of buffer
|
|
i = 3;
|
do{
|
pAdapterInfo = (PIP_ADAPTER_INFO)malloc(sizeof(IP_ADAPTER_INFO)*dwBufLen);
|
dwStatus = GetAdaptersInfo( // Call GetAdapterInfo
|
pAdapterInfo, // [out] buffer to receive data
|
&dwBufLen // [in] size of receive data buffer
|
);
|
dwBufLen = dwBufLen / sizeof(IP_ADAPTER_INFO);
|
if (dwStatus != NO_ERROR){
|
free(pAdapterInfo);
|
}
|
} while (dwStatus == ERROR_BUFFER_OVERFLOW && i-- > 0);
|
|
if (dwStatus != ERROR_BUFFER_OVERFLOW){
|
return FUNC_RET_ERROR;
|
}
|
if (adapterInfos == NULL || *adapter_info_size == 0){
|
*adapter_info_size = dwBufLen;
|
free(pAdapterInfo);
|
return FUNC_RET_BUFFER_TOO_SMALL;
|
}
|
|
memset(adapterInfos, 0, *adapter_info_size);
|
pAdapter = pAdapterInfo;
|
i = 0;
|
result = FUNC_RET_OK;
|
while (pAdapter) {
|
strncpy(adapterInfos[i].description, pAdapter->Description, min(sizeof(adapterInfos->description), MAX_ADAPTER_DESCRIPTION_LENGTH));
|
memcpy(adapterInfos[i].mac_address, pAdapter->Address, 8);
|
translate(pAdapter->IpAddressList.IpAddress.String, adapterInfos[i].ipv4_address);
|
adapterInfos[i].type = IFACE_TYPE_ETHERNET;
|
i++;
|
pAdapter = pAdapter->Next;
|
if (i == *adapter_info_size){
|
result = FUNC_RET_BUFFER_TOO_SMALL;
|
break;
|
}
|
}
|
free(pAdapterInfo);
|
*adapter_info_size = i;
|
return result;
|
}
|
FUNCTION_RETURN getModuleName(char buffer[MAX_PATH]) {
|
FUNCTION_RETURN result=FUNC_RET_OK;
|
DWORD wres = GetModuleFileName(NULL, buffer, MAX_PATH);
|
if (wres == 0){
|
result = FUNC_RET_ERROR;
|
}
|
return result;
|
}
|
|
static void printHash(HCRYPTHASH* hHash){
|
BYTE *pbHash;
|
DWORD dwHashLen;
|
DWORD dwHashLenSize = sizeof(DWORD);
|
char* hashStr;
|
int i;
|
|
if (CryptGetHashParam(*hHash,HP_HASHSIZE,(BYTE *)&dwHashLen, &dwHashLenSize, 0))
|
{
|
pbHash = (BYTE*)malloc(dwHashLen);
|
hashStr = (char*)malloc(dwHashLen*2 +1);
|
if (CryptGetHashParam(*hHash,HP_HASHVAL,pbHash, &dwHashLen, 0)) {
|
for (i = 0; i < dwHashLen; i++) {
|
sprintf(&hashStr[i * 2], "%02x", pbHash[i]);
|
}
|
LOG_DEBUG("Hash to verify: %s", hashStr);
|
}
|
free(pbHash);
|
free(hashStr);
|
}
|
}
|
|
FUNCTION_RETURN verifySignature(const char* stringToVerify, const char* signatureB64) {
|
//--------------------------------------------------------------------
|
// Declare variables.
|
//
|
// hProv: Cryptographic service provider (CSP). This example
|
// uses the Microsoft Enhanced Cryptographic
|
// Provider.
|
// hKey: Key to be used. In this example, you import the
|
// key as a PLAINTEXTKEYBLOB.
|
// dwBlobLen: Length of the plaintext key.
|
// pbKeyBlob: Pointer to the exported key.
|
BYTE pubKey[] = PUBLIC_KEY;
|
|
HCRYPTPROV hProv = 0;
|
HCRYPTKEY hKey = 0;
|
HCRYPTHASH hHash = 0;
|
DWORD dwSigLen;
|
BYTE* sigBlob;
|
|
//--------------------------------------------------------------------
|
// Acquire a handle to the CSP.
|
|
if (!CryptAcquireContext(
|
&hProv,
|
NULL,
|
MS_ENHANCED_PROV,
|
PROV_RSA_FULL,
|
CRYPT_VERIFYCONTEXT))
|
{
|
// If the key container cannot be opened, try creating a new
|
// container by specifying a container name and setting the
|
// CRYPT_NEWKEYSET flag.
|
LOG_INFO("Error in AcquireContext 0x%08x \n", GetLastError());
|
if (NTE_BAD_KEYSET == GetLastError())
|
{
|
if (!CryptAcquireContext(
|
&hProv,
|
"license++verify",
|
MS_ENHANCED_PROV,
|
PROV_RSA_FULL,
|
CRYPT_NEWKEYSET | CRYPT_VERIFYCONTEXT))
|
{
|
LOG_ERROR("Error in AcquireContext 0x%08x \n",
|
GetLastError());
|
return FUNC_RET_ERROR;
|
}
|
}
|
else
|
{
|
LOG_ERROR(" Error in AcquireContext 0x%08x \n", GetLastError());
|
return FUNC_RET_ERROR;
|
}
|
}
|
|
// Use the CryptImportKey function to import the PLAINTEXTKEYBLOB
|
// BYTE array into the key container. The function returns a
|
// pointer to an HCRYPTKEY variable that contains the handle of
|
// the imported key.
|
if (!CryptImportKey(hProv, &pubKey[0], sizeof(pubKey), 0, 0, &hKey))
|
{
|
LOG_ERROR("Error 0x%08x in importing the PublicKey \n",
|
GetLastError());
|
return FUNC_RET_ERROR;
|
}
|
|
if (CryptCreateHash(hProv, CALG_SHA1, 0, 0, &hHash))
|
{
|
LOG_DEBUG("Hash object created.");
|
}
|
else
|
{
|
LOG_ERROR("Error in hash creation 0x%08x ", GetLastError());
|
CryptReleaseContext(hProv,0);
|
return FUNC_RET_ERROR;
|
}
|
|
if (!CryptHashData(hHash, stringToVerify, strlen(stringToVerify), 0)){
|
LOG_ERROR("Error in hashing data 0x%08x ", GetLastError());
|
CryptDestroyHash(hHash);
|
CryptReleaseContext(hProv, 0);
|
return FUNC_RET_ERROR;
|
}
|
#ifdef _DEBUG
|
LOG_DEBUG("Lenght %d, hashed Data: [%s]", strlen(stringToVerify), stringToVerify);
|
printHash(&hHash);
|
#endif
|
sigBlob = unbase64(signatureB64, strlen(signatureB64), &dwSigLen);
|
LOG_DEBUG("raw signature lenght %d", dwSigLen);
|
if (!CryptVerifySignature(hHash, sigBlob, dwSigLen, hKey, NULL, 0))
|
{
|
LOG_ERROR("Signature not validated! 0x%08x ", GetLastError());
|
free(sigBlob);
|
CryptDestroyHash(hHash);
|
CryptReleaseContext(hProv, 0);
|
return FUNC_RET_ERROR;
|
}
|
CryptDestroyHash(hHash);
|
free(sigBlob);
|
CryptReleaseContext(hProv, 0);
|
return FUNC_RET_OK;
|
}
|
|