mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
469 lines
11 KiB
469 lines
11 KiB
//+--------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 1996-1998
|
|
//
|
|
// File: server.h
|
|
//
|
|
// Contents: Hydra License Server Service Control Manager Interface
|
|
//
|
|
// History: 12-09-97 HueiWang Modified from MSDN RPC Service Sample
|
|
// 07-27-98 HueiWang Port to JetBlue
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
#ifndef __SERVER_H_
|
|
#define __SERVER_H_
|
|
#include <windows.h>
|
|
#include <winsock2.h>
|
|
#include <stdio.h>
|
|
#include <stdlib.h>
|
|
#include <tchar.h>
|
|
#include <time.h>
|
|
|
|
#include "license.h"
|
|
|
|
//
|
|
// TLSDb
|
|
//
|
|
#include "JBDef.h"
|
|
#include "JetBlue.h"
|
|
#include "TLSDb.h"
|
|
|
|
#include "backup.h"
|
|
#include "KPDesc.h"
|
|
#include "Licensed.h"
|
|
#include "licpack.h"
|
|
#include "version.h"
|
|
#include "workitem.h"
|
|
|
|
//
|
|
// Current RPC interface
|
|
//
|
|
#include "tlsrpc.h"
|
|
#include "tlsdef.h"
|
|
#include "tlsapi.h"
|
|
#include "tlsapip.h"
|
|
#include "tlspol.h"
|
|
|
|
//
|
|
//
|
|
#include "messages.h"
|
|
|
|
#include "tlsassrt.h"
|
|
#include "trust.h"
|
|
#include "svcrole.h"
|
|
#include "common.h"
|
|
#include "lscommon.h"
|
|
|
|
#include "Cryptkey.h"
|
|
#include "licekpak.h"
|
|
|
|
#include "clrhouse.h"
|
|
#include "dblevel.h"
|
|
#include "SrvDef.h"
|
|
#include "policy.h"
|
|
#include "wkspace.h"
|
|
#include "tlsjob.h"
|
|
#include "srvlist.h"
|
|
#include "debug.h"
|
|
|
|
|
|
#if DBG
|
|
typedef enum {
|
|
RPC_CALL_CONNECT,
|
|
RPC_CALL_SEND_CERTIFICATE,
|
|
RPC_CALL_GET_SERVERNAME,
|
|
RPC_CALL_GET_SERVERSCOPE,
|
|
RPC_CALL_GETINFO,
|
|
RPC_CALL_GET_LASTERROR,
|
|
RPC_CALL_ISSUEPLATFORMCHLLENGE,
|
|
RPC_CALL_ALLOCATECONCURRENT,
|
|
RPC_CALL_ISSUENEWLICENSE,
|
|
RPC_CALL_UPGRADELICENSE,
|
|
RPC_CALL_KEYPACKENUMBEGIN,
|
|
RPC_CALL_KEYPACKENUMNEXT,
|
|
RPC_CALL_KEYPACKENUMEND,
|
|
RPC_CALL_KEYPACKADD,
|
|
RPC_CALL_KEYPACKSETSTATUS,
|
|
RPC_CALL_LICENSEENUMBEGIN,
|
|
RPC_CALL_LICENSEENUMNEXT,
|
|
RPC_CALL_LICENSEENUMEND,
|
|
RPC_CALL_LICENSESETSTATUS,
|
|
RPC_CALL_INSTALL_SERV_CERT,
|
|
RPC_CALL_GETSERV_CERT,
|
|
RPC_CALL_REGISTER_LICENSE_PACK,
|
|
RPC_CALL_REQUEST_TERMSRV_CERT,
|
|
RPC_CALL_RETRIEVE_TERMSRV_CERT,
|
|
RPC_CALL_GETPKCS10CERT_REQUEST,
|
|
RPC_CALL_ANNOUNCE_SERVER,
|
|
RPC_CALL_SERVERLOOKUP,
|
|
RPC_CALL_ANNOUNCELICENSEPACK,
|
|
RPC_CALL_RETURNLICENSE,
|
|
RPC_CALL_RETURNKEYPACK,
|
|
RPC_CALL_GETPRIVATEDATA,
|
|
RPC_CALL_SETPRIVATEDATA,
|
|
RPC_CALL_CHALLENGESERVER,
|
|
RPC_CALL_RESPONSESERVERCHALLENGE,
|
|
RPC_CALL_TRIGGERREGENKEY,
|
|
RPC_CALL_TELEPHONEREGISTERLKP,
|
|
RPC_CALL_ALLOCATEINTERNETLICNESEEX,
|
|
RPC_CALL_RETURNINTERNETLICENSEEX,
|
|
RPC_CALL_RETURNINTERNETLICENSE
|
|
} DBG_RPC_CALL;
|
|
#endif
|
|
|
|
//---------------------------------------------------------------------------
|
|
typedef enum {
|
|
LSCERT_RDN_STRING_TYPE,
|
|
LSCERT_RDN_NAME_INFO_TYPE,
|
|
LSCERT_RDN_NAME_BLOB_TYPE,
|
|
LSCERT_CLIENT_INFO_TYPE
|
|
} TLSCLIENTCERTRDNTYPE;
|
|
|
|
typedef struct __LSClientInfo {
|
|
LPTSTR szUserName;
|
|
LPTSTR szMachineName;
|
|
PHWID pClientID;
|
|
} TLSClientInfo, *PTLSClientInfo, *LPTLSClientInfo;
|
|
|
|
typedef struct __LSClientCertRDN {
|
|
TLSCLIENTCERTRDNTYPE type;
|
|
|
|
union {
|
|
LPTSTR szRdn;
|
|
PCERT_NAME_INFO pCertNameInfo;
|
|
TLSClientInfo ClientInfo;
|
|
PCERT_NAME_BLOB pNameBlob;
|
|
};
|
|
} TLSClientCertRDN, *PTLSClientCertRDN, *LPTLSClientCertRDN;
|
|
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
typedef struct _DbLicensedProduct {
|
|
DWORD dwQuantity;
|
|
|
|
ULARGE_INTEGER ulSerialNumber;
|
|
|
|
DWORD dwKeyPackId;
|
|
DWORD dwLicenseId;
|
|
DWORD dwKeyPackLicenseId;
|
|
DWORD dwNumLicenseLeft;
|
|
|
|
HWID ClientHwid;
|
|
|
|
FILETIME NotBefore;
|
|
FILETIME NotAfter;
|
|
|
|
BOOL bTemp; // temporary license
|
|
|
|
|
|
// licensed product version
|
|
DWORD dwProductVersion;
|
|
|
|
// manufaturer name
|
|
TCHAR szCompanyName[LSERVER_MAX_STRING_SIZE+1];
|
|
|
|
// licensed product Id
|
|
TCHAR szLicensedProductId[LSERVER_MAX_STRING_SIZE+1];
|
|
|
|
// original license request product ID
|
|
TCHAR szRequestProductId[LSERVER_MAX_STRING_SIZE+1];
|
|
|
|
TCHAR szUserName[LSERVER_MAX_STRING_SIZE+1];
|
|
TCHAR szMachineName[LSERVER_MAX_STRING_SIZE+1];
|
|
|
|
//
|
|
DWORD dwLanguageID;
|
|
DWORD dwPlatformID;
|
|
|
|
PBYTE pbPolicyData;
|
|
DWORD cbPolicyData;
|
|
|
|
PCERT_PUBLIC_KEY_INFO pSubjectPublicKeyInfo;
|
|
} TLSDBLICENSEDPRODUCT, *PTLSDBLICENSEDPRODUCT, *LPTLSDBLICENSEDPRODUCT;
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
typedef struct __TLSDbLicenseRequest {
|
|
CTLSPolicy* pPolicy;
|
|
PMHANDLE hClient;
|
|
|
|
//
|
|
// Product request
|
|
//
|
|
DWORD dwProductVersion;
|
|
|
|
LPTSTR pszCompanyName;
|
|
LPTSTR pszProductId;
|
|
|
|
DWORD dwLanguageID;
|
|
DWORD dwPlatformID;
|
|
|
|
//
|
|
// Client information
|
|
//
|
|
HWID hWid;
|
|
PBYTE pbEncryptedHwid;
|
|
DWORD cbEncryptedHwid;
|
|
|
|
TCHAR szMachineName[MAX_COMPUTERNAME_LENGTH + 2];
|
|
TCHAR szUserName[MAXUSERNAMELENGTH+1];
|
|
|
|
//
|
|
// detail of licensing chain
|
|
WORD wLicenseDetail;
|
|
|
|
|
|
//
|
|
// special things to be put into certificate
|
|
//
|
|
PCERT_PUBLIC_KEY_INFO pClientPublicKey;
|
|
TLSClientCertRDN clientCertRdn;
|
|
|
|
DWORD dwNumExtensions;
|
|
PCERT_EXTENSION pExtensions;
|
|
|
|
//
|
|
// Policy Extension Data
|
|
//
|
|
//PBYTE pbPolicyExtensionData;
|
|
//DWORD cbPolicyExtensionData;
|
|
|
|
PPMLICENSEREQUEST pClientLicenseRequest; // original client license request
|
|
PPMLICENSEREQUEST pPolicyLicenseRequest; // policy adjusted license request
|
|
|
|
//
|
|
// To do ?
|
|
// consider a callback routine but are we getting
|
|
// into issuing certificate business.
|
|
//
|
|
} TLSDBLICENSEREQUEST, *PTLSDBLICENSEREQUEST, *LPTLSDBLICENSEREQUEST;
|
|
|
|
|
|
typedef struct __ForwardNewLicenseRequest {
|
|
CHALLENGE_CONTEXT m_ChallengeContext;
|
|
TLSLICENSEREQUEST* m_pRequest;
|
|
LPTSTR m_szMachineName;
|
|
LPTSTR m_szUserName;
|
|
DWORD m_cbChallengeResponse;
|
|
PBYTE m_pbChallengeResponse;
|
|
|
|
// no forward on request.
|
|
} TLSForwardNewLicenseRequest, *PTLSForwardNewLicenseRequest, *LPTLSForwardNewLicenseRequest;
|
|
|
|
typedef struct __ForwardUpgradeRequest {
|
|
TLSLICENSEREQUEST* m_pRequest;
|
|
CHALLENGE_CONTEXT m_ChallengeContext;
|
|
DWORD m_cbChallengeResponse;
|
|
PBYTE m_pbChallengeResponse;
|
|
DWORD m_cbOldLicense;
|
|
PBYTE m_pbOldLicense;
|
|
} TLSForwardUpgradeLicenseRequest, *PTLSForwardUpgradeLicenseRequest, *LPTLSForwardUpgradeLicenseRequest;
|
|
|
|
|
|
//---------------------------------------------------------------------------
|
|
//
|
|
#define CLIENT_INFO_HYDRA_SERVER 0xFFFFFFFF
|
|
|
|
typedef enum {
|
|
CONTEXTHANDLE_EMPTY_TYPE=0,
|
|
CONTEXTHANDLE_KEYPACK_ENUM_TYPE,
|
|
CONTEXTHANDLE_LICENSE_ENUM_TYPE,
|
|
CONTEXTHANDLE_CLIENTINFO_TYPE,
|
|
CONTEXTHANDLE_CLIENTCHALLENGE_TYPE,
|
|
CONTEXTHANDLE_HYDRA_REQUESTCERT_TYPE,
|
|
CONTEXTHANDLE_CHALLENGE_SERVER_TYPE,
|
|
CONTEXTHANDLE_CHALLENGE_LRWIZ_TYPE,
|
|
CONTEXTHANDLE_CHALLENGE_TERMSRV_TYPE
|
|
} CONTEXTHANDLE_TYPE;
|
|
|
|
// No access
|
|
#define CLIENT_ACCESS_NONE 0x00000000
|
|
|
|
// only keypack/license enumeration
|
|
#define CLIENT_ACCESS_USER 0x00000001
|
|
|
|
// Administrator, can update value but can't
|
|
// request license
|
|
#define CLIENT_ACCESS_ADMIN 0x00000002
|
|
|
|
// Client can request license no update
|
|
// database value
|
|
#define CLIENT_ACCESS_REQUEST 0x00000004
|
|
|
|
// client is registration wizard
|
|
// only install certificate
|
|
#define CLIENT_ACCESS_LRWIZ 0x00000008
|
|
|
|
// client is license server, allow
|
|
// full access
|
|
#define CLIENT_ACCESS_LSERVER 0xFFFFFFFF
|
|
|
|
#define CLIENT_ACCESS_DEFAULT CLIENT_ACCESS_USER
|
|
|
|
|
|
typedef struct __ClientContext {
|
|
#if DBG
|
|
DWORD m_PreDbg[2]; // debug signature
|
|
DBG_RPC_CALL m_LastCall; // last call
|
|
#endif
|
|
|
|
LPTSTR m_Client;
|
|
long m_RefCount;
|
|
DWORD m_ClientFlags;
|
|
|
|
DWORD m_LastError;
|
|
CONTEXTHANDLE_TYPE m_ContextType;
|
|
HANDLE m_ContextHandle;
|
|
|
|
// NEEDED - A list to store all memory/handle
|
|
// allocated for the client
|
|
|
|
#if DBG
|
|
DWORD m_PostDbg[2]; // debug signature
|
|
#endif
|
|
|
|
} CLIENTCONTEXT, *LPCLIENTCONTEXT;
|
|
|
|
//---------------------------------------------------------------
|
|
|
|
typedef struct __ENUMHANDLE {
|
|
typedef enum {
|
|
FETCH_NEXT_KEYPACK=1,
|
|
FETCH_NEXT_KEYPACKDESC,
|
|
FETCH_NEW_KEYPACKDESC
|
|
} ENUM_FETCH_CODE;
|
|
|
|
PTLSDbWorkSpace pbWorkSpace;
|
|
TLSLICENSEPACK CurrentKeyPack; // current fetched keypack record
|
|
|
|
LICPACKDESC KPDescSearchValue; // licensepack search value
|
|
DWORD dwKPDescSearchParm; // licensepackdesc search parameter
|
|
BOOL bKPDescMatchAll; // match all condition for keypackdesc
|
|
CHAR chFetchState;
|
|
} ENUMHANDLE, *LPENUMHANDLE;
|
|
|
|
typedef struct __TERMSERVCERTREQHANDLE {
|
|
PTLSHYDRACERTREQUEST pCertRequest;
|
|
DWORD cbChallengeData;
|
|
PBYTE pbChallengeData;
|
|
} TERMSERVCERTREQHANDLE, *LPTERMSERVCERTREQHANDLE;
|
|
|
|
typedef struct __ClientChallengeContext {
|
|
DWORD m_ClientInfo;
|
|
HANDLE m_ChallengeContext;
|
|
} CLIENTCHALLENGECONTEXT, *LPCLIENTCHALLENGECONTEXT;
|
|
|
|
typedef enum {
|
|
ALLOCATE_EXACT_VERSION=0,
|
|
ALLOCATE_ANY_GREATER_VERSION,
|
|
ALLOCATE_LATEST_VERSION // not supported
|
|
} LICENSE_ALLOCATION_SCHEME;
|
|
|
|
typedef struct __AllocateRequest {
|
|
UCHAR ucAgreementType; // keypack type
|
|
LPTSTR szCompanyName; // company name
|
|
LPTSTR szProductId; // product
|
|
DWORD dwVersion; // version wanted
|
|
DWORD dwPlatformId; // license platform
|
|
DWORD dwLangId; // unused
|
|
|
|
DWORD dwNumLicenses; // number of license wanted/returned
|
|
|
|
LICENSE_ALLOCATION_SCHEME dwScheme;
|
|
|
|
// TODO - CallBack function to let calling
|
|
// function decide
|
|
|
|
} TLSDBAllocateRequest, *PTLSDBAllocateRequest, *LPTLSDBAllocateRequest;
|
|
|
|
typedef struct __LicenseAllocation {
|
|
// array size for dwAllocationVector
|
|
DWORD dwBufSize;
|
|
|
|
//
|
|
// Total license allocated
|
|
DWORD dwTotalAllocated;
|
|
|
|
// number of license allocate from
|
|
// each keypack
|
|
DWORD* pdwAllocationVector;
|
|
|
|
// keypack that license allocate from
|
|
PLICENSEPACK lpAllocateKeyPack;
|
|
} TLSDBLicenseAllocation, *PTLSDBLicenseAllocation, *LPTLSDBLicenseAllocation;
|
|
|
|
//---------------------------------------------------------------------
|
|
//----------------------------------------------------------------------------
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
BOOL
|
|
WaitForMyTurnOrShutdown(
|
|
HANDLE hHandle,
|
|
DWORD dwWaitTime
|
|
);
|
|
|
|
HANDLE
|
|
GetServiceShutdownHandle();
|
|
|
|
void
|
|
ServiceSignalShutdown();
|
|
|
|
void
|
|
ServiceResetShutdownEvent();
|
|
|
|
BOOL
|
|
AcquireRPCExclusiveLock(
|
|
IN DWORD dwWaitTime
|
|
);
|
|
|
|
void
|
|
ReleaseRPCExclusiveLock();
|
|
|
|
BOOL
|
|
AcquireAdministrativeLock(
|
|
IN DWORD dwWaitTime
|
|
);
|
|
|
|
void
|
|
ReleaseAdministrativeLock();
|
|
|
|
DWORD
|
|
TLSMapReturnCode(DWORD);
|
|
|
|
unsigned int WINAPI
|
|
MailSlotThread(
|
|
void* ptr
|
|
);
|
|
|
|
HANDLE
|
|
ServerInit(
|
|
BOOL bDebug
|
|
);
|
|
|
|
DWORD
|
|
InitNamedPipeThread();
|
|
|
|
DWORD
|
|
InitMailSlotThread();
|
|
|
|
DWORD
|
|
InitExpirePermanentThread();
|
|
|
|
BOOL
|
|
IsServiceShuttingdown();
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|
|
|
|
void __cdecl
|
|
trans_se_func(
|
|
unsigned int u,
|
|
_EXCEPTION_POINTERS* pExp
|
|
);
|
|
|
|
#endif
|