mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1148 lines
28 KiB
1148 lines
28 KiB
//+--------------------------------------------------------------------------
|
|
//
|
|
// Copyright (c) 1997-2000 Microsoft Corporation
|
|
//
|
|
// File:
|
|
//
|
|
// Contents:
|
|
//
|
|
// History:
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
|
|
#ifndef _WIN32_WINNT
|
|
#define _WIN32_WINNT 0x0400
|
|
#endif
|
|
#include <windows.h>
|
|
#include <wincrypt.h>
|
|
#include <stdio.h>
|
|
#include <tchar.h>
|
|
#include "Shortsig.h"
|
|
#include "base24.h"
|
|
#include "lkplite.h"
|
|
#include "rc4.h"
|
|
#include "md5.h"
|
|
|
|
//internal functions
|
|
#define LKPLITE_PID_LEN _tcslen(_TEXT("12345-123-1234567-12345"))
|
|
|
|
#define SIGNATURE_LEN 104
|
|
|
|
#define LKPLITE_PID_FIRSTCOPYOFFSET 10
|
|
#define LKPLITE_PID_SECONDCOPYOFFSET 18
|
|
#define LKPLITE_SPK_BITSTUFF 0x00000000000000FF
|
|
|
|
#define LKPLITE_RAWDATALEN 20
|
|
|
|
DWORD ValidatePID ( LPTSTR lpszPID );
|
|
__int64 GetSPKIDFromPID ( LPTSTR lpszPID );
|
|
|
|
|
|
#ifndef SIG_VERIFY_ONLY
|
|
BYTE abLKPPrivateKey0[] =
|
|
{
|
|
0x64, 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0xff, 0xab,
|
|
0xa9, 0xba, 0xae, 0xdf, 0x30, 0x01, 0xb7, 0x1e, 0x79, 0x64,
|
|
0x46, 0x00, 0x00, 0x00, 0x50, 0x6d, 0x54, 0x36, 0x05, 0x00,
|
|
0x00, 0x00, 0x64, 0x00, 0x00, 0x00, 0x3d, 0xcb, 0x68, 0x79,
|
|
0x23, 0x52, 0x2c, 0x98, 0x24, 0x00, 0x00, 0x00, 0x83, 0x1c,
|
|
0x65, 0x18, 0x2b, 0xd6, 0x7b, 0x6f, 0x05, 0x00, 0x00, 0x00,
|
|
0x29, 0xe8, 0xe0, 0x1e, 0x71, 0xa0, 0x80, 0x40, 0x36, 0x26,
|
|
0x23, 0xe3, 0xab, 0x55, 0xa2, 0x7b, 0xac, 0xda, 0xf3, 0x29,
|
|
0x4d, 0xe1, 0x1a, 0xfa, 0x54, 0x41, 0xb7, 0xd3, 0x28, 0x27,
|
|
0x02, 0x7e, 0x9b, 0x2b, 0xc6, 0xf7, 0x6e, 0x82, 0x2c, 0xe4
|
|
};
|
|
|
|
|
|
BYTE abLSIDPrivateKey0[] =
|
|
{
|
|
0x64, 0x00, 0x00, 0x00, 0x09, 0x00, 0x00, 0x00, 0x79, 0x6d,
|
|
0x1a, 0x6c, 0xae, 0xdf, 0x30, 0x01, 0x83, 0xa1, 0xc9, 0xb1,
|
|
0x46, 0x00, 0x00, 0x00, 0x1d, 0x6e, 0x56, 0x37, 0x05, 0x00,
|
|
0x00, 0x00, 0x64, 0x00, 0x00, 0x00, 0x49, 0x17, 0x6c, 0x21,
|
|
0x8e, 0x1d, 0x01, 0x1a, 0x22, 0x00, 0x00, 0x00, 0xa8, 0x60,
|
|
0x22, 0xb7, 0x36, 0xe3, 0x43, 0x57, 0x08, 0x00, 0x00, 0x00,
|
|
0x4b, 0x18, 0x12, 0x54, 0x39, 0x8f, 0x7c, 0x85, 0x88, 0xc4,
|
|
0x61, 0x16, 0x39, 0x17, 0x29, 0x67, 0xe2, 0xe0, 0x20, 0x2c,
|
|
0xcb, 0xeb, 0x5b, 0xd7, 0x75, 0xf0, 0xb8, 0xf3, 0x87, 0x48,
|
|
0x6d, 0x49, 0xce, 0x9a, 0xb3, 0x12, 0x82, 0x05, 0x51, 0xb5
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
BYTE abLKPPublicKey0[] =
|
|
{
|
|
0x6c, 0x01, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, 0xb7, 0x1e,
|
|
0x79, 0x64, 0xae, 0xdf, 0x30, 0x01, 0x0c, 0x00, 0x00, 0x00,
|
|
0x23, 0x00, 0x00, 0x00, 0x45, 0x00, 0x00, 0x00, 0xf1, 0x89,
|
|
0x3e, 0xb9, 0x7f, 0x5e, 0xc9, 0x40, 0x4f, 0x0d, 0x64, 0x2c,
|
|
0x9e, 0x1c, 0x5b, 0xd7, 0x43, 0xb3, 0x51, 0x59, 0x27, 0x81,
|
|
0xfb, 0x16, 0x86, 0xa7, 0xb5, 0x9d, 0x89, 0xdb, 0x52, 0xf6,
|
|
0x3e, 0x95, 0xc9, 0x4c, 0x7b, 0x34, 0x54, 0x01, 0xab, 0x3c,
|
|
0x10, 0xb9, 0x35, 0x40, 0x64, 0xba, 0x01, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x39, 0x4d, 0x13, 0xde, 0xe2, 0xc9, 0x68, 0xb5,
|
|
0xef, 0x45, 0x67, 0x94, 0xde, 0x01, 0xdd, 0x35, 0x56, 0x30,
|
|
0x7b, 0xcd, 0xbc, 0xd5, 0x88, 0x77, 0xee, 0xf9, 0x5d, 0xa1,
|
|
0xaf, 0xab, 0xc2, 0xdf, 0xf8, 0x6c, 0x8c, 0x3d, 0xce, 0x4d,
|
|
0xab, 0x27, 0x6b, 0xcc, 0x64, 0x77, 0x8b, 0xbd, 0x71, 0x7b,
|
|
0xdd, 0x93, 0x05, 0xe5, 0xeb, 0xf1, 0xe0, 0x7c, 0xe8, 0x35,
|
|
0x0d, 0x4e, 0x31, 0x22, 0x23, 0x42, 0xaf, 0x33, 0x9f, 0x72,
|
|
0xda, 0xc9, 0x77, 0xa6, 0xe9, 0xcf, 0xac, 0x26, 0xe0, 0xb7,
|
|
0x6e, 0x50, 0xbb, 0x32, 0x71, 0x35, 0x32, 0xc2, 0x41, 0xdf,
|
|
0x76, 0x24, 0xbe, 0xdf, 0x4a, 0x90, 0xff, 0x2e, 0xdc, 0x16,
|
|
0x02, 0x6c, 0xd0, 0x85, 0xf5, 0xdd, 0xf0, 0x0d, 0xe6, 0x01,
|
|
0x75, 0x05, 0x75, 0x87, 0x3b, 0xb6, 0xc8, 0x51, 0x7f, 0x66,
|
|
0xcd, 0x2b, 0x52, 0x0b, 0x09, 0xec, 0xa5, 0x4a, 0xdf, 0x2b,
|
|
0xf0, 0xbd, 0x0e, 0x83, 0x2f, 0xa9, 0xbb, 0xde, 0x43, 0x6e,
|
|
0x4f, 0x38, 0x13, 0xa3, 0x70, 0x2e, 0x5e, 0x7f, 0xf2, 0x84,
|
|
0xaa, 0xfe, 0x12, 0x7d, 0x4e, 0x17, 0xad, 0x7a, 0x3c, 0x05,
|
|
0x40, 0x92, 0xf8, 0x34, 0x97, 0x43, 0x88, 0x93, 0xf1, 0x78,
|
|
0xe4, 0xe9, 0xe6, 0x4c, 0x2d, 0xf9, 0xcf, 0xf8, 0xb5, 0x34,
|
|
0x8c, 0x98, 0x56, 0x8d, 0x89, 0x9d, 0x34, 0xf5, 0xfa, 0xb6,
|
|
0x78, 0xfa, 0x5a, 0x85
|
|
};
|
|
|
|
|
|
|
|
BYTE abLSIDPublicKey0[] =
|
|
{
|
|
0x6c, 0x01, 0x00, 0x00, 0x07, 0x00, 0x00, 0x00, 0x83, 0xa1,
|
|
0xc9, 0xb1, 0xae, 0xdf, 0x30, 0x01, 0x0c, 0x00, 0x00, 0x00,
|
|
0x23, 0x00, 0x00, 0x00, 0x45, 0x00, 0x00, 0x00, 0x31, 0x07,
|
|
0xcb, 0x01, 0x1e, 0x92, 0x74, 0x0b, 0x1e, 0x2b, 0x2d, 0x07,
|
|
0x68, 0xc5, 0xff, 0x21, 0xc5, 0x5c, 0x32, 0xb6, 0x44, 0xdb,
|
|
0x02, 0x09, 0xde, 0x2e, 0xc6, 0x6d, 0xb5, 0xc4, 0xd4, 0x44,
|
|
0x6f, 0xc7, 0x0d, 0xba, 0x4e, 0xe5, 0x0b, 0x0f, 0x92, 0xb1,
|
|
0x22, 0x25, 0xab, 0xdd, 0x86, 0x8d, 0x01, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
|
|
0x00, 0x00, 0xdb, 0x86, 0x67, 0xfb, 0x5c, 0x8c, 0x53, 0x72,
|
|
0x0e, 0x49, 0x94, 0x97, 0x94, 0x15, 0xfc, 0x25, 0x0d, 0xdd,
|
|
0xa1, 0xe4, 0xa0, 0xf0, 0xc3, 0x17, 0xf6, 0x98, 0xce, 0x9c,
|
|
0x07, 0x31, 0x10, 0xb7, 0x73, 0x16, 0x4f, 0x91, 0xbb, 0xfa,
|
|
0x01, 0xde, 0x9e, 0x79, 0xf2, 0x66, 0x58, 0xf5, 0x77, 0x45,
|
|
0x55, 0xf0, 0xa8, 0xb8, 0x0c, 0x2c, 0x0f, 0x15, 0xc7, 0x28,
|
|
0xce, 0x81, 0x69, 0x4e, 0x55, 0xd5, 0xf3, 0x89, 0xdc, 0x11,
|
|
0x34, 0x09, 0x40, 0x94, 0x5c, 0xaa, 0xd0, 0x6a, 0x5a, 0x06,
|
|
0x8e, 0x62, 0x6e, 0x5f, 0x7e, 0x35, 0x44, 0x5f, 0x06, 0xb2,
|
|
0xa5, 0xe8, 0x3c, 0x1b, 0x4d, 0xb8, 0xc6, 0x5e, 0xe0, 0xe4,
|
|
0xa6, 0xac, 0x80, 0xef, 0x8c, 0x99, 0x23, 0x06, 0x70, 0xd6,
|
|
0x6c, 0x62, 0x01, 0xb6, 0xde, 0x3b, 0x0c, 0x5e, 0x2a, 0x96,
|
|
0x9e, 0x63, 0x58, 0x9f, 0xdf, 0xf1, 0xaf, 0x5d, 0x02, 0xb6,
|
|
0x84, 0xc1, 0x52, 0x1f, 0xbc, 0xb8, 0x0c, 0x72, 0x3c, 0x1b,
|
|
0xb4, 0x58, 0x51, 0xab, 0x73, 0x19, 0x65, 0xbb, 0xc6, 0xb4,
|
|
0xb2, 0x53, 0xeb, 0x17, 0x4c, 0x42, 0xc9, 0xc2, 0xcd, 0x7f,
|
|
0x88, 0x0f, 0xb8, 0xaa, 0xc4, 0xca, 0xaa, 0xe0, 0xa0, 0xe1,
|
|
0x5f, 0xdb, 0x6e, 0xb8, 0x26, 0xf9, 0x8d, 0x4a, 0xe7, 0xdb,
|
|
0x1e, 0xdc, 0xc7, 0xdf, 0xf0, 0x35, 0x88, 0xec, 0x1d, 0xbe,
|
|
0xab, 0xa4, 0x8d, 0x39
|
|
};
|
|
|
|
|
|
//SPK functions
|
|
//SPK Format
|
|
//Total length = 160 bits
|
|
//SPK = 58 bits
|
|
//Signature = 120 bits
|
|
//SPK break down :
|
|
// Bits 1 ..18 - Unique Id max value = 262144
|
|
// Bit 19 - SPK Type = 0 = BASIC 1 = SELECT
|
|
// Bits 20..56 = SPK Id extracted from PID.
|
|
// PID is in this format 12345-123-1234567-12345
|
|
// we are using chars 11-16 and 19 thru' end of PID and converting it to a
|
|
// number.
|
|
// Bits 57 .. end = signature for the first 56 bits
|
|
//
|
|
#ifndef SIG_VERIFY_ONLY
|
|
DWORD LKPLiteGenSPK (
|
|
LPTSTR pszPID, //PID for the product. Should include the installation number
|
|
DWORD dwUniqueId, //unique Id to be put in the SPK
|
|
short nSPKType, //Can be 1 for select or 0 for BASIC
|
|
LPTSTR * ppszSPK
|
|
)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
BYTE bSPK[LKPLITE_SPK_LEN] = {0xFF};
|
|
__int64 n64SPK = 0;
|
|
__int64 n64UniqueId = dwUniqueId;
|
|
__int64 n64PID =0;
|
|
|
|
|
|
//validate incomming parametetrs
|
|
if ( NULL == pszPID || NULL == pszPID ||
|
|
(LKPLITE_SPK_SELECT != nSPKType && LKPLITE_SPK_BASIC != nSPKType ) ||
|
|
0 ==dwUniqueId )
|
|
{
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
goto done;
|
|
}
|
|
//validate syntax of PID
|
|
if ( ( dwRetCode = ValidatePID ( pszPID ) ) != ERROR_SUCCESS )
|
|
{
|
|
goto done;
|
|
}
|
|
//ALL OK so generate the SPK now
|
|
n64SPK = dwUniqueId;
|
|
n64SPK <<= 46; //left shift this by 46 bits
|
|
//Or the bit mask for select/basic cert types.
|
|
if ( nSPKType == LKPLITE_SPK_SELECT )
|
|
{
|
|
n64SPK |= LKPLITE_SPK_SELECT_MASK;
|
|
}
|
|
else if ( nSPKType == LKPLITE_SPK_BASIC )
|
|
{
|
|
n64SPK |= LKPLITE_SPK_BASIC_MASK;
|
|
}
|
|
|
|
//extract the PID stuff and move it into the stuff
|
|
n64PID = GetSPKIDFromPID ( pszPID );
|
|
//move the pid left by 8 bits and or it with the main stuff
|
|
n64PID <<= 8;
|
|
//set the last 8 bits of this PID to 1's
|
|
n64PID |= LKPLITE_SPK_BITSTUFF;
|
|
//or the PID with SPK
|
|
n64SPK |= n64PID;
|
|
|
|
memcpy ( bSPK, ((BYTE *) (&n64SPK)) + 1, sizeof(n64SPK)-1);
|
|
//get the signature and then
|
|
//assign the pointer
|
|
/*
|
|
dwRetCode = CryptSignBatch(0, NULL, 7, bSPK, sizeof(abPrivateKey0),abPrivateKey0,
|
|
sizeof(abPublicKey0), abPublicKey0, SIGNATURE_LEN,
|
|
bSPK+7,1);
|
|
*/
|
|
|
|
dwRetCode = CryptSign(0, NULL, 7, bSPK, sizeof(abLSIDPrivateKey0), abLSIDPrivateKey0,
|
|
sizeof(abLSIDPublicKey0), abLSIDPublicKey0, SIGNATURE_LEN,
|
|
bSPK+7);
|
|
|
|
if (dwRetCode != SS_OK)
|
|
{
|
|
goto done;
|
|
}
|
|
//encrypt it with the pid passed in
|
|
dwRetCode = LKPLiteEncryptUsingPID(pszPID,
|
|
bSPK,
|
|
LKPLITE_RAWDATALEN);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
dwRetCode = B24EncodeMSID((PBYTE)bSPK, ppszSPK);
|
|
|
|
done:
|
|
return dwRetCode;
|
|
}
|
|
#endif
|
|
|
|
|
|
|
|
DWORD LKPLiteVerifySPK (
|
|
LPTSTR pszPID, //PID to validate against
|
|
LPTSTR pszSPK,
|
|
DWORD * pdwVerifyResult
|
|
)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
PBYTE pbDecodedSPK = NULL;
|
|
__int64 n64SPK = 0;
|
|
__int64 n64SPKPID =0;
|
|
__int64 n64SPKVerifyPID =0;
|
|
|
|
//common validations
|
|
if ( NULL == pszPID || NULL == pszSPK ||
|
|
NULL == pdwVerifyResult )
|
|
{
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
goto done;
|
|
}
|
|
|
|
if ((dwRetCode = ValidatePID ( pszPID ))!= ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
//now decode the stuff comming in
|
|
//base24 expects a string so we need to do this conversion
|
|
|
|
|
|
dwRetCode = B24DecodeMSID(pszSPK , &pbDecodedSPK);
|
|
if ( ERROR_SUCCESS != dwRetCode )
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
|
|
dwRetCode = LKPLiteDecryptUsingPID(pszPID,
|
|
pbDecodedSPK,
|
|
LKPLITE_RAWDATALEN);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
//Call function to verify signature on SPK
|
|
dwRetCode = CryptVerifySig(7, pbDecodedSPK, sizeof(abLSIDPublicKey0),
|
|
abLSIDPublicKey0, SIGNATURE_LEN, pbDecodedSPK+7);
|
|
if (dwRetCode != SS_OK)
|
|
{
|
|
*pdwVerifyResult = LKPLITE_SPK_INVALID;
|
|
goto done;
|
|
}
|
|
|
|
|
|
memcpy ( ((BYTE *) &n64SPK) + 1, pbDecodedSPK, sizeof(n64SPK) -1 );
|
|
|
|
//now get the contents of SPK and then see if it matches with
|
|
//the PID passed in
|
|
//extract bits 20 - 56 and then move them right 8 bits
|
|
n64SPKPID = n64SPK & LKPLITE_SPK_PID_MASK;
|
|
n64SPKPID >>= 8;
|
|
n64SPKVerifyPID = GetSPKIDFromPID ( pszPID );
|
|
if ( n64SPKVerifyPID != n64SPKPID )
|
|
{
|
|
*pdwVerifyResult = LKPLITE_SPK_INVALID;
|
|
}
|
|
else
|
|
{
|
|
*pdwVerifyResult = LKPLITE_SPK_VALID;
|
|
}
|
|
|
|
done:
|
|
if ( pbDecodedSPK )
|
|
HeapFree (GetProcessHeap(),0,pbDecodedSPK );
|
|
return dwRetCode;
|
|
}
|
|
|
|
|
|
DWORD LKPLiteCrackSPK (
|
|
LPTSTR pszPID,
|
|
LPTSTR pszSPK, //Pointer to SPK
|
|
LPTSTR pszPIDPart, //PID Part of SPK
|
|
DWORD * pdwUniqueId, //uniqueId part of SPK
|
|
short * pnSPKType //Type of SPK - Select/Basic
|
|
)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
PBYTE pbDecodedSPK = NULL;
|
|
__int64 n64SPK =0;
|
|
__int64 n64PIDPart =0;
|
|
__int64 n64UniqueId =0;
|
|
|
|
LPTSTR lpszEncodedSPK = NULL;
|
|
|
|
//Validate the parameters
|
|
if ( NULL == pszSPK || NULL == pszPIDPart ||
|
|
NULL == pdwUniqueId || NULL == pnSPKType
|
|
)
|
|
{
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
goto done;
|
|
}
|
|
//decode the SPK here
|
|
dwRetCode = B24DecodeMSID(pszSPK, &pbDecodedSPK);
|
|
if ( ERROR_SUCCESS != dwRetCode )
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
dwRetCode = LKPLiteDecryptUsingPID(pszPID,
|
|
pbDecodedSPK,
|
|
LKPLITE_RAWDATALEN);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
//get the SPK portion of it
|
|
memcpy ( ((BYTE *) &n64SPK) + 1, pbDecodedSPK, sizeof(n64SPK) - 1);
|
|
|
|
//get the first 20 bits into
|
|
n64UniqueId = n64SPK & LKPLITE_SPK_UNIQUEID_MASK;
|
|
n64UniqueId >>= 46;
|
|
*pdwUniqueId = (DWORD)n64UniqueId;
|
|
//check to see select / basic mask
|
|
if ( n64SPK & LKPLITE_SPK_SELECT_MASK )
|
|
{
|
|
*pnSPKType = LKPLITE_SPK_SELECT;
|
|
}
|
|
else
|
|
{
|
|
*pnSPKType = LKPLITE_SPK_BASIC;
|
|
}
|
|
|
|
//get the PID part
|
|
n64PIDPart = n64SPK & LKPLITE_SPK_PID_MASK;
|
|
n64PIDPart >>= 6;
|
|
pszPIDPart = _i64tot (n64PIDPart, pszPIDPart, 10);
|
|
done:
|
|
if ( pbDecodedSPK )
|
|
HeapFree (GetProcessHeap(), 0, pbDecodedSPK );
|
|
return dwRetCode;
|
|
}
|
|
|
|
//LKP functions
|
|
//LKP Format
|
|
// Bits 1..10 - Product Code It is 256 for not which is NT 5.0 product code
|
|
// Bits 11..24 - Quantity Max 9999
|
|
// Bits 25..36 - Serial num Max 4K
|
|
// Bits 37..38 - Program Type 0-SELECT,1-MOLP, 2-RETAIL
|
|
// Bits 39..46 - Dt Of expiration in months from today
|
|
// Bits 47..53 - Version 1-99
|
|
// Bits 54..56 - Upgrade / Full flag
|
|
// Bits 57 .. end - Signature
|
|
//
|
|
#ifndef SIG_VERIFY_ONLY
|
|
DWORD LKPLiteGenLKP (
|
|
LPTSTR lpszPID, //used for encrypting the LKPLite structure
|
|
LPTSTR lpszProductCode, //Product Code
|
|
DWORD dwQuantity, //quantity
|
|
DWORD dwSerialNum, //serail number of SPK
|
|
DWORD dwExpirationMos, //expiration in number of months from today
|
|
DWORD dwVersion, //version number can be upto 99
|
|
DWORD dwUpgrade, //upgrade or full license
|
|
DWORD dwProgramType, //SELECT,MOLP or RETAIL
|
|
LPTSTR * ppszLKPLite
|
|
)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
__int64 n64LKPLite = _ttoi(lpszProductCode);
|
|
__int64 n64Qty = dwQuantity;
|
|
__int64 n64SerialNo = dwSerialNum;
|
|
__int64 n64dtOfExp = dwExpirationMos;
|
|
__int64 n64Version = dwVersion;
|
|
__int64 n64Upgrade = dwUpgrade;
|
|
__int64 n64Program = dwProgramType;
|
|
|
|
BYTE bLKP[LKPLITE_LKP_LEN] = {0};
|
|
|
|
//validate params
|
|
if ( NULL == lpszPID || NULL == lpszProductCode ||
|
|
( dwQuantity <= 0 || dwQuantity > 9999) ||
|
|
( dwSerialNum <= 0 || dwSerialNum >= 0xFFF ) ||
|
|
( dwExpirationMos <= 0 || dwExpirationMos >= 255) ||
|
|
( dwVersion <= 0 || dwVersion >= 99) ||
|
|
( dwUpgrade != 1 && dwUpgrade != 0 ) ||
|
|
( dwProgramType != LKPLITE_PROGRAM_SELECT && dwProgramType != LKPLITE_PROGRAM_MOLP &&
|
|
dwProgramType != LKPLITE_PROGRAM_RETAIL)
|
|
)
|
|
{
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
goto done;
|
|
}
|
|
|
|
//move the product code to extreme left
|
|
n64LKPLite <<= 54;
|
|
|
|
//move the quantity to position
|
|
n64Qty <<= 40;
|
|
n64LKPLite |= n64Qty;
|
|
|
|
//move Serial number into position
|
|
n64SerialNo <<= 28;
|
|
n64LKPLite |= n64SerialNo;
|
|
|
|
//move Program Type into position
|
|
n64Program <<= 26;
|
|
n64LKPLite |= n64Program;
|
|
|
|
//move dt of expitration into position
|
|
n64dtOfExp <<= 18;
|
|
n64LKPLite |= n64dtOfExp;
|
|
|
|
//move Version into place
|
|
n64Version <<= 11;
|
|
n64LKPLite |= n64Version;
|
|
//move upgrade in place
|
|
n64Upgrade <<= 8;
|
|
n64LKPLite |= n64Upgrade;
|
|
//set the last 8 bits of this PID to 1's
|
|
n64LKPLite |= LKPLITE_SPK_BITSTUFF;
|
|
|
|
memcpy ( bLKP, ((BYTE *) &n64LKPLite) + 1, sizeof(n64LKPLite ) - 1);
|
|
/*
|
|
dwRetCode = CryptSignBatch(0, NULL, 7, bLKP, sizeof(abPrivateKey0),abPrivateKey0,
|
|
sizeof(abPublicKey0), abPublicKey0, SIGNATURE_LEN,
|
|
bLKP+7,1);
|
|
*/
|
|
//sign the lkp here
|
|
dwRetCode = CryptSign(0, NULL, 7, bLKP, sizeof(abLKPPrivateKey0), abLKPPrivateKey0,
|
|
sizeof(abLKPPublicKey0), abLKPPublicKey0, SIGNATURE_LEN,
|
|
bLKP+7);
|
|
|
|
if (dwRetCode != SS_OK)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
//encrypt it with the pid passed in
|
|
dwRetCode = LKPLiteEncryptUsingPID(lpszPID,
|
|
bLKP,
|
|
LKPLITE_RAWDATALEN);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
// memset ( bLKP, 0xFF, sizeof(bLKP));
|
|
|
|
//now encode the spk
|
|
dwRetCode = B24EncodeMSID((PBYTE)bLKP, ppszLKPLite);
|
|
done:
|
|
|
|
return dwRetCode;
|
|
}
|
|
#endif
|
|
|
|
|
|
|
|
//This function has to verify the LKP by decrypting it
|
|
//and matching the signature
|
|
DWORD LKPLiteVerifyLKP (
|
|
LPTSTR lpszPID, //PID for verifying the LKP lite blob
|
|
LPTSTR pszLKPLite, //B24 encoded LKP
|
|
DWORD * pdwVerifyResult
|
|
)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
PBYTE pbDecodedLKP = NULL;
|
|
*pdwVerifyResult = LKPLITE_LKP_VALID;
|
|
|
|
//decode the SPK here
|
|
dwRetCode = B24DecodeMSID(pszLKPLite, &pbDecodedLKP);
|
|
if ( ERROR_SUCCESS != dwRetCode )
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
dwRetCode = LKPLiteDecryptUsingPID(lpszPID,
|
|
pbDecodedLKP,
|
|
LKPLITE_RAWDATALEN);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
//Call function to verify signature on SPK
|
|
dwRetCode = CryptVerifySig(7, pbDecodedLKP, sizeof(abLKPPublicKey0),
|
|
abLKPPublicKey0, SIGNATURE_LEN, pbDecodedLKP+7);
|
|
if (dwRetCode != SS_OK)
|
|
{
|
|
*pdwVerifyResult = LKPLITE_SPK_INVALID;
|
|
}
|
|
|
|
done:
|
|
if (pbDecodedLKP != NULL)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, pbDecodedLKP);
|
|
}
|
|
|
|
return dwRetCode;
|
|
}
|
|
|
|
|
|
DWORD LKPLiteCrackLKP (
|
|
LPTSTR lpszPID,
|
|
LPTSTR pszLKPLite,
|
|
LPTSTR lpszProductCode,
|
|
DWORD * pdwQuantity,
|
|
DWORD * pdwSerialNum,
|
|
DWORD * pdwExpirationMos,
|
|
DWORD * pdwVersion,
|
|
DWORD * pdwUpgrade,
|
|
DWORD * pdwProgramType
|
|
)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
PBYTE pbDecodedLKP = NULL;
|
|
__int64 n64LKPLite = 0;
|
|
__int64 n64ProductCode = 0;
|
|
__int64 n64Qty = 0;
|
|
__int64 n64SerialNo = 0;
|
|
__int64 n64dtOfExp = 0;
|
|
__int64 n64Version = 0;
|
|
__int64 n64Upgrade = 0;
|
|
__int64 n64Program = 0;
|
|
|
|
if ( NULL == lpszPID || NULL == pszLKPLite ||
|
|
NULL == lpszProductCode || NULL == pdwQuantity ||
|
|
NULL == pdwSerialNum || NULL == pdwExpirationMos ||
|
|
NULL == pdwVersion || NULL == pdwUpgrade ||
|
|
NULL == pdwProgramType || NULL == pdwProgramType
|
|
)
|
|
{
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
goto done;
|
|
}
|
|
|
|
//decode and decrypt the lkp here
|
|
|
|
dwRetCode = B24DecodeMSID(pszLKPLite, &pbDecodedLKP);
|
|
if ( ERROR_SUCCESS != dwRetCode )
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
dwRetCode = LKPLiteDecryptUsingPID(lpszPID,
|
|
pbDecodedLKP,
|
|
LKPLITE_RAWDATALEN);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
//copy all the stuff into int64 type
|
|
|
|
memcpy ( ((BYTE *) &n64LKPLite) + 1, pbDecodedLKP, sizeof(n64LKPLite ) - 1 );
|
|
|
|
// Decrypt it using the PID
|
|
n64ProductCode = n64LKPLite & LKPLITE_LKP_PRODUCT_MASK;
|
|
n64ProductCode >>= 54;
|
|
|
|
//move the quantity to position
|
|
n64Qty = n64LKPLite & LKPLITE_LKP_QUANTITY_MASK;
|
|
n64Qty >>= 40;
|
|
|
|
//move Serial number into position
|
|
n64SerialNo = n64LKPLite & LKPLITE_LKP_SERAIL_NO_MASK;
|
|
n64SerialNo >>= 28;
|
|
|
|
//move Program Type into position
|
|
n64Program = n64LKPLite & LKPLITE_LKP_PROGRAM_MASK;
|
|
n64Program >>= 26;
|
|
|
|
//move dt of expitration into position
|
|
n64dtOfExp = n64LKPLite & LKPLITE_LKP_EXP_DATE_MASK;
|
|
n64dtOfExp >>= 18;
|
|
|
|
//move Version into place
|
|
n64Version = n64LKPLite & LKPLITE_LKP_VERSION_MASK;
|
|
n64Version >>= 11;
|
|
|
|
//move upgrade in place
|
|
n64Upgrade = n64LKPLite & LKPLITE_LKP_UPG_FULL_MASK;
|
|
n64Upgrade >>= 8;
|
|
|
|
done:
|
|
|
|
if ( ERROR_SUCCESS == dwRetCode )
|
|
{
|
|
_stprintf(lpszProductCode, _T("%03d"), n64ProductCode);
|
|
// _i64tot ( n64ProductCode, lpszProductCode, 10 );
|
|
*pdwQuantity = (DWORD)n64Qty;
|
|
*pdwSerialNum = (DWORD)n64SerialNo;
|
|
*pdwExpirationMos = (DWORD)n64dtOfExp;
|
|
*pdwVersion = (DWORD)n64Version;
|
|
*pdwUpgrade = (DWORD)n64Upgrade;
|
|
*pdwProgramType = (DWORD)n64Program;
|
|
}
|
|
if ( pbDecodedLKP )
|
|
HeapFree ( GetProcessHeap(),0, pbDecodedLKP );
|
|
|
|
return dwRetCode;
|
|
}
|
|
|
|
|
|
|
|
//internal functions
|
|
DWORD ValidatePID ( LPTSTR lpszPID )
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
DWORD dwPIDLen = _tcslen( lpszPID );
|
|
DWORD dwCounter =0;
|
|
|
|
if ( dwPIDLen != LKPLITE_PID_LEN )
|
|
{
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
}
|
|
else
|
|
{
|
|
//check for syntax
|
|
for ( dwCounter = 0; dwCounter < dwPIDLen; dwCounter ++ )
|
|
{
|
|
if ( !_istdigit ( *(lpszPID + dwCounter ) ) )
|
|
{
|
|
switch(dwCounter)
|
|
{
|
|
case 5:
|
|
if (*(lpszPID + dwCounter ) != _T('-') )
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
break;
|
|
case 6:
|
|
if (*(lpszPID + dwCounter ) != _T('O') && *(lpszPID + dwCounter ) != _T('o') )
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
break;
|
|
case 7:
|
|
if (*(lpszPID + dwCounter ) != _T('E') && *(lpszPID + dwCounter ) != _T('e') )
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
break;
|
|
case 8:
|
|
if (*(lpszPID + dwCounter ) != _T('M') && *(lpszPID + dwCounter ) != _T('m') )
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
break;
|
|
case 9:
|
|
if (*(lpszPID + dwCounter ) != _T('-') )
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
break;
|
|
case 17:
|
|
if (*(lpszPID + dwCounter ) != _T('-') )
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
break;
|
|
default:
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
switch(dwCounter)
|
|
{
|
|
case 5:
|
|
case 9:
|
|
case 17:
|
|
dwRetCode = ERROR_INVALID_PARAMETER;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
//can check here for mod 7 thing too but for now assume its OK.
|
|
return dwRetCode;
|
|
}
|
|
|
|
//Assume that the PID comming in has aleady been validated
|
|
__int64 GetSPKIDFromPID ( LPTSTR lpszPID )
|
|
{
|
|
__int64 n64PID;
|
|
TCHAR szPID[12] = {0};
|
|
|
|
memcpy ( szPID, lpszPID + 10, 6 * sizeof(TCHAR));
|
|
memcpy ( szPID + 6, lpszPID+ 18, 5 * sizeof(TCHAR));
|
|
n64PID = _ttoi64(szPID);
|
|
return n64PID;
|
|
}
|
|
|
|
|
|
|
|
DWORD LKPLiteGenConfNumber(LPTSTR lpszLSID,
|
|
LPTSTR lpszPID,
|
|
LPTSTR *lpszConfirmation)
|
|
{
|
|
BYTE * pbDecodedData = NULL;
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
DWORD dwConfirmation;
|
|
|
|
// lpszLSID is base 24 encoded, so decode it first
|
|
dwRetCode = B24DecodeMSID(lpszLSID, &pbDecodedData);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
// Decoded Data is available. Copy the leading 4 bytes for generating the confirmation
|
|
// Number
|
|
memcpy(&dwConfirmation, pbDecodedData, sizeof(DWORD));
|
|
|
|
// Encrypt this number using the PID
|
|
dwRetCode = LKPLiteEncryptUsingPID(lpszPID, (BYTE *) &dwConfirmation, sizeof(DWORD));
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
// Now Encode the Encrypted stream
|
|
dwRetCode = B24EncodeCNumber((BYTE *) &dwConfirmation, lpszConfirmation);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
done:
|
|
if (pbDecodedData)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, pbDecodedData);
|
|
}
|
|
|
|
return dwRetCode;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
DWORD LKPLiteValConfNumber(LPTSTR lpszLSID,
|
|
LPTSTR lpszPID,
|
|
LPTSTR lpszConfirmation)
|
|
{
|
|
BYTE * pbDecodedLSID = NULL;
|
|
BYTE * pbDecodedConf = NULL;
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
|
|
// lpszLSID is base 24 encoded, so decode it first
|
|
dwRetCode = B24DecodeMSID(lpszLSID, &pbDecodedLSID);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
// Decode Confirmation Number
|
|
dwRetCode = B24DecodeCNumber(lpszConfirmation, &pbDecodedConf);
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
// Decrypt the leading 4 bytes
|
|
dwRetCode = LKPLiteDecryptUsingPID(lpszPID, pbDecodedConf, sizeof(DWORD));
|
|
if (dwRetCode != ERROR_SUCCESS)
|
|
{
|
|
goto done;
|
|
}
|
|
|
|
|
|
if (memcmp(pbDecodedLSID, pbDecodedConf, sizeof(DWORD)) != 0)
|
|
{
|
|
// does not match
|
|
dwRetCode = LKPLITE_INVALID_CONFNUM;
|
|
}
|
|
|
|
done:
|
|
if (pbDecodedLSID)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, pbDecodedLSID);
|
|
}
|
|
|
|
if (pbDecodedConf)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, pbDecodedConf);
|
|
}
|
|
|
|
return dwRetCode;
|
|
}
|
|
|
|
|
|
/////////////////////////////////////////////////////////
|
|
|
|
DWORD WINAPI
|
|
EncryptDecryptData(
|
|
IN PBYTE pbParm,
|
|
IN DWORD cbParm,
|
|
IN OUT PBYTE pbData,
|
|
IN DWORD cbData
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Internal routine to encrypt/decrypt a blob of data
|
|
|
|
Parameter:
|
|
|
|
pbParm : binary blob to generate encrypt/decrypt key.
|
|
cbParm : size of binary blob.
|
|
pbData : data to be encrypt/decrypt.
|
|
cbData : size of data to be encrypt/decrypt.
|
|
|
|
Returns:
|
|
|
|
ERROR_SUCCESS or error code.
|
|
|
|
Remark:
|
|
|
|
|
|
--*/
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
MD5_CTX md5Ctx;
|
|
RC4_KEYSTRUCT rc4KS;
|
|
BYTE key[16];
|
|
int i;
|
|
|
|
if(NULL == pbParm || 0 == cbParm)
|
|
{
|
|
SetLastError(dwRetCode = ERROR_INVALID_PARAMETER);
|
|
return dwRetCode;
|
|
}
|
|
|
|
MD5Init(&md5Ctx);
|
|
MD5Update(
|
|
&md5Ctx,
|
|
pbParm,
|
|
cbParm
|
|
);
|
|
|
|
MD5Final(&md5Ctx);
|
|
|
|
memset(key, 0, sizeof(key));
|
|
|
|
for(i=0; i < 5; i++)
|
|
{
|
|
key[i] = md5Ctx.digest[i];
|
|
}
|
|
|
|
//
|
|
// Call RC4 to encrypt/decrypt data
|
|
//
|
|
rc4_key(
|
|
&rc4KS,
|
|
sizeof(key),
|
|
key
|
|
);
|
|
|
|
rc4(&rc4KS, cbData, pbData);
|
|
|
|
return dwRetCode;
|
|
}
|
|
|
|
DWORD LKPLiteEncryptUsingPID(LPTSTR lpszPID,
|
|
BYTE * pbBufferToEncrypt,
|
|
DWORD dwLength)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
|
|
#if 1
|
|
|
|
dwRetCode = EncryptDecryptData(
|
|
(PBYTE) lpszPID,
|
|
lstrlen(lpszPID)*sizeof(TCHAR),
|
|
pbBufferToEncrypt,
|
|
dwLength
|
|
);
|
|
|
|
|
|
#else
|
|
|
|
BOOL bRet;
|
|
HCRYPTPROV hProv = NULL;
|
|
HCRYPTKEY hCKey = NULL;
|
|
HCRYPTHASH hHash = NULL;
|
|
|
|
bRet = CryptAcquireContext(&hProv,
|
|
NULL,
|
|
NULL,
|
|
PROV_RSA_FULL,
|
|
CRYPT_VERIFYCONTEXT);
|
|
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
|
|
bRet = CryptCreateHash(hProv,
|
|
CALG_MD5,
|
|
0,
|
|
0,
|
|
&hHash);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
bRet = CryptHashData(hHash,
|
|
(BYTE *) lpszPID,
|
|
lstrlen(lpszPID)*sizeof(TCHAR),
|
|
0);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
bRet = CryptDeriveKey(hProv,
|
|
CALG_RC4,
|
|
hHash,
|
|
0,
|
|
&hCKey);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
bRet = CryptEncrypt(hCKey,
|
|
0,
|
|
TRUE,
|
|
0,
|
|
pbBufferToEncrypt,
|
|
&dwLength,
|
|
dwLength);
|
|
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
done:
|
|
if (hCKey != NULL)
|
|
{
|
|
bRet = CryptDestroyKey(hCKey);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
}
|
|
}
|
|
|
|
if (hHash != NULL)
|
|
{
|
|
bRet = CryptDestroyHash(hHash);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
}
|
|
}
|
|
|
|
if (hProv != NULL)
|
|
{
|
|
bRet = CryptReleaseContext( hProv, 0 );
|
|
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
}
|
|
}
|
|
|
|
#endif
|
|
|
|
return dwRetCode;
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
DWORD LKPLiteDecryptUsingPID(LPTSTR lpszPID,
|
|
BYTE * pbBufferToDecrypt,
|
|
DWORD dwLength)
|
|
{
|
|
DWORD dwRetCode = ERROR_SUCCESS;
|
|
|
|
#if 1
|
|
|
|
dwRetCode = EncryptDecryptData(
|
|
(PBYTE) lpszPID,
|
|
lstrlen(lpszPID)*sizeof(TCHAR),
|
|
pbBufferToDecrypt,
|
|
dwLength
|
|
);
|
|
#else
|
|
|
|
BOOL bRet;
|
|
HCRYPTPROV hProv = NULL;
|
|
HCRYPTKEY hCKey = NULL;
|
|
HCRYPTHASH hHash = NULL;
|
|
|
|
bRet = CryptAcquireContext(&hProv,
|
|
NULL,
|
|
NULL,
|
|
PROV_RSA_FULL,
|
|
CRYPT_VERIFYCONTEXT);
|
|
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
|
|
bRet = CryptCreateHash(hProv,
|
|
CALG_MD5,
|
|
0,
|
|
0,
|
|
&hHash);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
bRet = CryptHashData(hHash,
|
|
(BYTE *) lpszPID,
|
|
lstrlen(lpszPID)*sizeof(TCHAR),
|
|
0);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
bRet = CryptDeriveKey(hProv,
|
|
CALG_RC4,
|
|
hHash,
|
|
0,
|
|
&hCKey);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
bRet = CryptDecrypt(hCKey,
|
|
0,
|
|
TRUE,
|
|
0,
|
|
(BYTE *) pbBufferToDecrypt,
|
|
&dwLength);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
goto done;
|
|
}
|
|
|
|
done:
|
|
if (hCKey != NULL)
|
|
{
|
|
bRet = CryptDestroyKey(hCKey);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
}
|
|
}
|
|
|
|
if (hHash != NULL)
|
|
{
|
|
bRet = CryptDestroyHash(hHash);
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
}
|
|
}
|
|
|
|
if (hProv != NULL)
|
|
{
|
|
bRet = CryptReleaseContext( hProv, 0 );
|
|
|
|
if (!bRet)
|
|
{
|
|
dwRetCode = GetLastError();
|
|
}
|
|
}
|
|
|
|
#endif
|
|
|
|
return dwRetCode;
|
|
}
|
|
|
|
|
|
|
|
|