From 3bda284e8fa1df1912c146f1732cc052a3356aa0 Mon Sep 17 00:00:00 2001 From: gcontini <1121667+gcontini@users.noreply.github.com> Date: 周六, 31 10月 2020 10:27:59 +0800 Subject: [PATCH] disk id loop - Windows --- src/library/os/windows/signature_verifier.cpp | 41 +++++++++++++++++++++-------------------- 1 files changed, 21 insertions(+), 20 deletions(-) diff --git a/src/library/os/windows/signature_verifier.cpp b/src/library/os/windows/signature_verifier.cpp index 3c8779c..083845e 100644 --- a/src/library/os/windows/signature_verifier.cpp +++ b/src/library/os/windows/signature_verifier.cpp @@ -15,20 +15,21 @@ #include <wincrypt.h> #include <iphlpapi.h> #include <windows.h> -#pragma comment(lib, "bcrypt.lib") +//#pragma comment(lib, "bcrypt.lib") #include <public_key.h> #include "../../base/logger.h" #include "../../base/base64.h" -#include "../signature_verifier.h" +#include "../signature_verifier.hpp" #define RSA_KEY_BITLEN 1024 namespace license { +namespace os { using namespace std; #define NT_SUCCESS(Status) (((NTSTATUS)(Status)) >= 0) -static const void formatError(DWORD status, const char* description) { +static const void formatError(DWORD status, const char *description) { char msgBuffer[256]; FormatMessage(FORMAT_MESSAGE_FROM_SYSTEM, NULL, status, MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT), &msgBuffer[0], sizeof(msgBuffer) - 1, nullptr); @@ -66,7 +67,7 @@ cout << (len & 0x80) << endl; if ((len & 0x80) > 0) { size_t blen = len & 0x7F; - for (int i = 0; i < blen; i++) { + for (size_t i = 0; i < blen; i++) { result += (*(ptr++) << (i * 8)); } } else { @@ -98,7 +99,7 @@ if (expected_length < length) { return FUNC_RET_ERROR; } - for (int i = 0; i < length; i++) { + for (size_t i = 0; i < length; i++) { location[i] = *(ptr++); } return FUNC_RET_OK; @@ -123,7 +124,7 @@ sizeof(pubk), 0))) { result = FUNC_RET_OK; } else { -#ifdef _DEBUG +#ifndef NDEBUG formatError(status, "error importing public key"); #endif } @@ -135,12 +136,11 @@ DWORD status; FUNCTION_RETURN result = FUNC_RET_ERROR; PBYTE pbSignature = nullptr; - DWORD dwSigLen; - BYTE* sigBlob = nullptr; BCRYPT_ALG_HANDLE hSignAlg = nullptr; - // FIXME!! - sigBlob = unbase64(signatureBuffer.c_str(), (int)signatureBuffer.size(), (int*)&dwSigLen); + vector<uint8_t> signatureBlob = unbase64(signatureBuffer); + DWORD dwSigLen = (DWORD) signatureBlob.size(); + BYTE* sigBlob = &signatureBlob[0]; if (NT_SUCCESS(status = BCryptOpenAlgorithmProvider(&hSignAlg, BCRYPT_RSA_ALGORITHM, NULL, 0))) { if ((result = readPublicKey(hSignAlg, &phKey)) == FUNC_RET_OK) { @@ -152,16 +152,17 @@ result = FUNC_RET_OK; } else { result = FUNC_RET_ERROR; -#ifdef _DEBUG +#ifndef NDEBUG formatError(status, "error verifying signature"); #endif } } else { LOG_DEBUG("Error reading public key"); } - } else { + } + else { result = FUNC_RET_NOT_AVAIL; -#ifdef _DEBUG +#ifndef NDEBUG formatError(status, "error opening RSA provider"); #endif } @@ -172,9 +173,9 @@ if (hSignAlg != nullptr) { BCryptCloseAlgorithmProvider(hSignAlg, 0); } - if (sigBlob) { - free(sigBlob); - } + //if (sigBlob) { + // free(sigBlob); + //} return result; } @@ -206,13 +207,13 @@ result = verifyHash(pbHashData, cbHashDataLenght, signatureB64); } else { result = FUNC_RET_NOT_AVAIL; -#ifdef _DEBUG +#ifndef NDEBUG formatError(status, "error hashing data"); #endif } } else { result = FUNC_RET_NOT_AVAIL; -#ifdef _DEBUG +#ifndef NDEBUG formatError(status, "error creating hash"); #endif } @@ -222,7 +223,7 @@ } } else { result = FUNC_RET_NOT_AVAIL; -#ifdef _DEBUG +#ifndef NDEBUG formatError(status, "**** Error returned by BCryptGetProperty"); #endif } @@ -241,5 +242,5 @@ } return result; } - +} // namespace os } /* namespace license */ -- Gitblit v1.9.1