From 62258ba3b4737432a95c3af8d0e03ed3fb7953e7 Mon Sep 17 00:00:00 2001 From: open-license-manager <rillf@maildrop.cc> Date: 周一, 13 10月 2014 05:05:37 +0800 Subject: [PATCH] windows ok --- src/library/os/win/os-win.c | 183 ++++++++++++++++++++++++++++++++++++++++----- 1 files changed, 163 insertions(+), 20 deletions(-) diff --git a/src/library/os/win/os-win.c b/src/library/os/win/os-win.c index a4d738a..169821b 100644 --- a/src/library/os/win/os-win.c +++ b/src/library/os/win/os-win.c @@ -1,21 +1,34 @@ #include <Windows.h> #include <iphlpapi.h> +//definition of size_t +#include <stdlib.h> +//#include "../../base/base64.h" +#include "../../base/logger.h" #include"../os.h" +#include "public-key.h" + #pragma comment(lib, "IPHLPAPI.lib") +unsigned char* unbase64(const char* ascii, int len, int *flen); FUNCTION_RETURN getOsSpecificIdentifier(unsigned char identifier[6]){ - + return FUNC_RET_NOT_AVAIL; } FUNCTION_RETURN getMachineName(unsigned char identifier[6]) { + FUNCTION_RETURN result = FUNC_RET_ERROR; char buffer[MAX_COMPUTERNAME_LENGTH + 1]; int bufsize = MAX_COMPUTERNAME_LENGTH + 1; BOOL cmpName = GetComputerName( buffer, &bufsize); - strncpy(identifier, buffer, 6); + if (cmpName){ + strncpy(identifier, buffer, 6); + result = FUNC_RET_OK; + } + return result; } FUNCTION_RETURN getCpuId(unsigned char identifier[6]) { + return FUNC_RET_NOT_AVAIL; } void os_initialize() { @@ -29,6 +42,7 @@ int ndrives = 0; DWORD FileFlags; char volName[_MAX_FNAME], FileSysName[_MAX_FNAME]; + char* szSingleDrive; DWORD volSerial = 0; BOOL success; UINT driveType; @@ -41,7 +55,7 @@ if (dwResult > 0 && dwResult <= MAX_PATH) { return_value = FUNC_RET_OK; - char* szSingleDrive = szLogicalDrives; + szSingleDrive = szLogicalDrives; while (*szSingleDrive && ndrives < MAX_UNITS) { @@ -51,29 +65,25 @@ success = GetVolumeInformation(szSingleDrive, volName, MAX_PATH, &volSerial, &FileMaxLen, &FileFlags, FileSysName, MAX_PATH); if (success) { -#ifdef _DEBUG - printf("drive : %s\n", szSingleDrive); - printf("Volume Name : %s\n", volName); - printf("Volume Serial : 0x%x\n", volSerial); - printf("Max file length : %d\n", FileMaxLen); - printf("Filesystem : %s\n", FileSysName); -#endif - if (diskInfos != NULL && * disk_info_size<ndrives){ - strncpy(diskInfos[ndrives].device,volName,MAX_PATH); - strncpy(diskInfos[ndrives].label, FileSysName , MAX_PATH); - diskInfos[ndrives].id=ndrives; - diskInfos[ndrives].preferred = (strncmp(szSingleDrive,"C",1)!=0); + LOG_INFO("drive : %s\n", szSingleDrive); + LOG_INFO("Volume Name : %s\n", volName); + LOG_INFO("Volume Serial : 0x%x\n", volSerial); + LOG_DEBUG("Max file length : %d\n", FileMaxLen); + LOG_DEBUG("Filesystem : %s\n", FileSysName); + if (diskInfos != NULL && * disk_info_size < ndrives){ + strncpy(diskInfos[ndrives].device, volName, MAX_PATH); + strncpy(diskInfos[ndrives].label, FileSysName, MAX_PATH); + diskInfos[ndrives].id = ndrives; + diskInfos[ndrives].preferred = (strncmp(szSingleDrive, "C", 1) != 0); } ndrives++; } else { - printf("Unable to retreive information of '%s'\n", szSingleDrive); + LOG_WARN("Unable to retrieve information of '%s'\n", szSingleDrive); } } -#ifdef _DEBUG - printf("This volume is not a fixed disk : %s\n", szSingleDrive); -#endif + LOG_INFO("This volume is not fixed : %s, type: %d\n", szSingleDrive); szSingleDrive += strlen(szSingleDrive) + 1; } } @@ -135,7 +145,7 @@ return FUNC_RET_BUFFER_TOO_SMALL; } - memset(adapterInfos, 0,*adapter_info_size); + memset(adapterInfos, 0, *adapter_info_size); pAdapter = pAdapterInfo; i = 0; result = FUNC_RET_OK; @@ -143,6 +153,7 @@ strncpy(adapterInfos[i].description, pAdapter->Description, min(sizeof(adapterInfos->description), MAX_ADAPTER_DESCRIPTION_LENGTH)); memcpy(adapterInfos[i].mac_address, pAdapter->Address, 8); translate(pAdapter->IpAddressList.IpAddress.String, adapterInfos[i].ipv4_address); + adapterInfos[i].type = IFACE_TYPE_ETHERNET; i++; pAdapter = pAdapter->Next; if (i == *adapter_info_size){ @@ -154,4 +165,136 @@ *adapter_info_size = i; return result; } +FUNCTION_RETURN getModuleName(char buffer[MAX_PATH]) { + FUNCTION_RETURN result=FUNC_RET_OK; + DWORD wres = GetModuleFileName(NULL, buffer, MAX_PATH); + if (wres == 0){ + result = FUNC_RET_ERROR; + } + return result; +} + +static void printHash(HCRYPTHASH* hHash){ + BYTE *pbHash; + DWORD dwHashLen; + DWORD dwHashLenSize = sizeof(DWORD); + char* hashStr; + int i; + + if (CryptGetHashParam(*hHash,HP_HASHSIZE,(BYTE *)&dwHashLen, &dwHashLenSize, 0)) + { + pbHash = (BYTE*)malloc(dwHashLen); + hashStr = (char*)malloc(dwHashLen*2 +1); + if (CryptGetHashParam(*hHash,HP_HASHVAL,pbHash, &dwHashLen, 0)) { + for (i = 0; i < dwHashLen; i++) { + sprintf(&hashStr[i * 2], "%02x", pbHash[i]); + } + LOG_DEBUG("Hash to verify: %s", hashStr); + } + free(pbHash); + free(hashStr); + } +} + +FUNCTION_RETURN verifySignature(const char* stringToVerify, const char* signatureB64) { + //-------------------------------------------------------------------- + // Declare variables. + // + // hProv: Cryptographic service provider (CSP). This example + // uses the Microsoft Enhanced Cryptographic + // Provider. + // hKey: Key to be used. In this example, you import the + // key as a PLAINTEXTKEYBLOB. + // dwBlobLen: Length of the plaintext key. + // pbKeyBlob: Pointer to the exported key. + BYTE pubKey[] = PUBLIC_KEY; + + HCRYPTPROV hProv = 0; + HCRYPTKEY hKey = 0; + HCRYPTHASH hHash = 0; + DWORD dwSigLen; + BYTE* sigBlob; + + //-------------------------------------------------------------------- + // Acquire a handle to the CSP. + + if (!CryptAcquireContext( + &hProv, + NULL, + MS_ENHANCED_PROV, + PROV_RSA_FULL, + CRYPT_VERIFYCONTEXT)) + { + // If the key container cannot be opened, try creating a new + // container by specifying a container name and setting the + // CRYPT_NEWKEYSET flag. + LOG_INFO("Error in AcquireContext 0x%08x \n", GetLastError()); + if (NTE_BAD_KEYSET == GetLastError()) + { + if (!CryptAcquireContext( + &hProv, + "license++verify", + MS_ENHANCED_PROV, + PROV_RSA_FULL, + CRYPT_NEWKEYSET | CRYPT_VERIFYCONTEXT)) + { + LOG_ERROR("Error in AcquireContext 0x%08x \n", + GetLastError()); + return FUNC_RET_ERROR; + } + } + else + { + LOG_ERROR(" Error in AcquireContext 0x%08x \n", GetLastError()); + return FUNC_RET_ERROR; + } + } + + // Use the CryptImportKey function to import the PLAINTEXTKEYBLOB + // BYTE array into the key container. The function returns a + // pointer to an HCRYPTKEY variable that contains the handle of + // the imported key. + if (!CryptImportKey(hProv, &pubKey[0], sizeof(pubKey), 0, 0, &hKey)) + { + LOG_ERROR("Error 0x%08x in importing the PublicKey \n", + GetLastError()); + return FUNC_RET_ERROR; + } + + if (CryptCreateHash(hProv, CALG_SHA1, 0, 0, &hHash)) + { + LOG_DEBUG("Hash object created."); + } + else + { + LOG_ERROR("Error in hash creation 0x%08x ", GetLastError()); + CryptReleaseContext(hProv,0); + return FUNC_RET_ERROR; + } + + if (!CryptHashData(hHash, stringToVerify, strlen(stringToVerify), 0)){ + LOG_ERROR("Error in hashing data 0x%08x ", GetLastError()); + CryptDestroyHash(hHash); + CryptReleaseContext(hProv, 0); + return FUNC_RET_ERROR; + } +#ifdef _DEBUG + LOG_DEBUG("Lenght %d, hashed Data: [%s]", strlen(stringToVerify), stringToVerify); + printHash(&hHash); +#endif + sigBlob = unbase64(signatureB64, strlen(signatureB64), &dwSigLen); + LOG_DEBUG("raw signature lenght %d", dwSigLen); + if (!CryptVerifySignature(hHash, sigBlob, dwSigLen, hKey, NULL, 0)) + { + LOG_ERROR("Signature not validated! 0x%08x ", GetLastError()); + free(sigBlob); + CryptDestroyHash(hHash); + CryptReleaseContext(hProv, 0); + return FUNC_RET_ERROR; + } + CryptDestroyHash(hHash); + free(sigBlob); + CryptReleaseContext(hProv, 0); + return FUNC_RET_OK; +} -- Gitblit v1.9.1