mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
7584 lines
207 KiB
7584 lines
207 KiB
//+--------------------------------------------------------------------------
|
|
//
|
|
// Microsoft Windows
|
|
// Copyright (C) Microsoft Corporation, 1996-1996
|
|
//
|
|
// File: tlsrpc.c
|
|
//
|
|
// Contents: Various RPC function to accept client request
|
|
//
|
|
// History: 12-09-98 HueiWang Created
|
|
//
|
|
//---------------------------------------------------------------------------
|
|
#include "pch.cpp"
|
|
#include "server.h"
|
|
#include "gencert.h"
|
|
#include "kp.h"
|
|
#include "keypack.h"
|
|
#include "clilic.h"
|
|
#include "postjob.h"
|
|
#include "srvlist.h"
|
|
#include "utils.h"
|
|
#include "misc.h"
|
|
#include "licreq.h"
|
|
#include "conlic.h"
|
|
#include "globals.h"
|
|
#include "db.h"
|
|
#include "tlscert.h"
|
|
#include "permlic.h"
|
|
#include "remotedb.h"
|
|
|
|
|
|
|
|
CCMutex g_AdminLock;
|
|
CCMutex g_RpcLock;
|
|
CCEvent g_ServerShutDown(TRUE, FALSE);
|
|
|
|
BOOL
|
|
VerifyLicenseRequest(
|
|
PTLSLICENSEREQUEST pLicenseRequest
|
|
)
|
|
/*++
|
|
|
|
--*/
|
|
{
|
|
BOOL bValid = FALSE;
|
|
|
|
if(pLicenseRequest == NULL)
|
|
{
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("VerifyLicenseRequest() invalid input\n")
|
|
);
|
|
|
|
goto cleanup;
|
|
}
|
|
|
|
if( pLicenseRequest->cbEncryptedHwid == 0 ||
|
|
pLicenseRequest->pbEncryptedHwid == NULL)
|
|
{
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("VerifyLicenseRequest() invalid HWID\n")
|
|
);
|
|
|
|
|
|
goto cleanup;
|
|
}
|
|
|
|
if( pLicenseRequest->ProductInfo.cbCompanyName == 0 ||
|
|
pLicenseRequest->ProductInfo.pbCompanyName == NULL )
|
|
{
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("VerifyLicenseRequest() invalid company name\n")
|
|
);
|
|
|
|
|
|
goto cleanup;
|
|
}
|
|
|
|
if( pLicenseRequest->ProductInfo.cbProductID == 0 ||
|
|
pLicenseRequest->ProductInfo.pbProductID == NULL )
|
|
{
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("VerifyLicenseRequest() invalid product id\n")
|
|
);
|
|
|
|
|
|
goto cleanup;
|
|
}
|
|
|
|
bValid = TRUE;
|
|
|
|
cleanup:
|
|
|
|
return bValid;
|
|
}
|
|
|
|
|
|
/////////////////////////////////////////////////////////////////////////////
|
|
|
|
BOOL
|
|
WaitForMyTurnOrShutdown(
|
|
HANDLE hHandle,
|
|
DWORD dwWaitTime
|
|
)
|
|
/*
|
|
|
|
|
|
*/
|
|
{
|
|
//
|
|
// Shutdown event is first one in the wait list
|
|
// reason is when service thread signal shutdow, at the same time,
|
|
// there might be a RPC call entering WaitForMultipleObjects() call and
|
|
// it will return WAIT_OBJECT_0 and continue on, this is not desirable
|
|
// since we want it to return can't get handle and exit RPC call immediately
|
|
//
|
|
HANDLE waitHandles[2]={g_ServerShutDown.hEvent, hHandle};
|
|
DWORD dwStatus;
|
|
|
|
//
|
|
// Could be return shutting down...
|
|
//
|
|
dwStatus=WaitForMultipleObjects(
|
|
sizeof(waitHandles)/sizeof(waitHandles[0]),
|
|
waitHandles,
|
|
FALSE,
|
|
dwWaitTime
|
|
);
|
|
|
|
return (dwStatus == WAIT_OBJECT_0 + 1) || (dwStatus == WAIT_ABANDONED_0 + 1);
|
|
}
|
|
|
|
//////////////////////////////////////////////////////
|
|
|
|
HANDLE
|
|
GetServiceShutdownHandle()
|
|
{
|
|
return g_ServerShutDown.hEvent;
|
|
}
|
|
|
|
void
|
|
ServiceSignalShutdown()
|
|
{
|
|
g_ServerShutDown.SetEvent();
|
|
}
|
|
|
|
void
|
|
ServiceResetShutdownEvent()
|
|
{
|
|
g_ServerShutDown.ResetEvent();
|
|
}
|
|
|
|
BOOL
|
|
IsServiceShuttingdown()
|
|
{
|
|
return (WaitForSingleObject(g_ServerShutDown.hEvent, 0) == WAIT_OBJECT_0);
|
|
}
|
|
|
|
|
|
//////////////////////////////////////////////////////
|
|
|
|
BOOL
|
|
AcquireRPCExclusiveLock(
|
|
IN DWORD dwWaitTime
|
|
)
|
|
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Acquire exclusive lock for RPC interface.
|
|
|
|
Parameter:
|
|
|
|
dwWaitTime : Wait time.
|
|
|
|
Return:
|
|
|
|
TRUE/FALSE
|
|
|
|
--*/
|
|
|
|
{
|
|
return WaitForMyTurnOrShutdown(
|
|
g_RpcLock.hMutex,
|
|
dwWaitTime
|
|
);
|
|
}
|
|
|
|
//////////////////////////////////////////////////////
|
|
|
|
void
|
|
ReleaseRPCExclusiveLock()
|
|
{
|
|
g_RpcLock.Unlock();
|
|
}
|
|
|
|
//////////////////////////////////////////////////////
|
|
|
|
BOOL
|
|
AcquireAdministrativeLock(
|
|
IN DWORD dwWaitTime
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Acquire lock for administrative action.
|
|
|
|
Parameter:
|
|
|
|
dwWaitTime : Time to wait for the lock.
|
|
|
|
Returns:
|
|
|
|
TRUE/FALSE.
|
|
|
|
--*/
|
|
|
|
{
|
|
return WaitForMyTurnOrShutdown(
|
|
g_AdminLock.hMutex,
|
|
dwWaitTime
|
|
);
|
|
}
|
|
|
|
//////////////////////////////////////////////////////
|
|
|
|
void
|
|
ReleaseAdministrativeLock()
|
|
/*++
|
|
|
|
--*/
|
|
{
|
|
g_AdminLock.Unlock();
|
|
}
|
|
|
|
|
|
//-----------------------------------------------------------------------
|
|
|
|
DWORD
|
|
TLSVerifyHydraCertificate(
|
|
PBYTE pHSCert,
|
|
DWORD cbHSCert
|
|
)
|
|
/*
|
|
|
|
*/
|
|
{
|
|
DWORD dwStatus;
|
|
|
|
dwStatus = TLSVerifyProprietyChainedCertificate(
|
|
g_hCryptProv,
|
|
pHSCert,
|
|
cbHSCert
|
|
);
|
|
|
|
if(dwStatus != ERROR_SUCCESS)
|
|
{
|
|
Hydra_Server_Cert hCert;
|
|
|
|
memset(&hCert, 0, sizeof(Hydra_Server_Cert));
|
|
|
|
dwStatus=UnpackHydraServerCertificate(pHSCert, cbHSCert, &hCert);
|
|
if(dwStatus == LICENSE_STATUS_OK)
|
|
{
|
|
dwStatus=LicenseVerifyServerCert(&hCert);
|
|
|
|
if(hCert.PublicKeyData.pBlob)
|
|
free(hCert.PublicKeyData.pBlob);
|
|
|
|
if(hCert.SignatureBlob.pBlob)
|
|
free(hCert.SignatureBlob.pBlob);
|
|
}
|
|
}
|
|
|
|
return dwStatus;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------
|
|
//
|
|
// General RPC routines
|
|
//
|
|
|
|
void * __RPC_USER
|
|
MIDL_user_allocate(size_t size)
|
|
{
|
|
void* ptr=AllocateMemory(size);
|
|
|
|
// DBGPrintf(0xFFFFFFFF, _TEXT("Allocate 0x%08x, size %d\n"), ptr, size);
|
|
return ptr;
|
|
}
|
|
|
|
void __RPC_USER
|
|
MIDL_user_free(void *pointer)
|
|
{
|
|
FreeMemory(pointer);
|
|
}
|
|
|
|
|
|
//-------------------------------------------------------------------------
|
|
|
|
BOOL
|
|
ValidContextHandle(
|
|
IN PCONTEXT_HANDLE phContext
|
|
)
|
|
/*++
|
|
Description:
|
|
|
|
Verify client context handle.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle return from TLSRpcConnect().
|
|
|
|
|
|
Return:
|
|
|
|
TRUE/FALSE
|
|
|
|
++*/
|
|
{
|
|
#if DBG
|
|
|
|
BOOL bValid;
|
|
LPCLIENTCONTEXT lpClientContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
bValid = (lpClientContext->m_PreDbg[0] == 0xcdcdcdcd && lpClientContext->m_PreDbg[1] == 0xcdcdcdcd &&
|
|
lpClientContext->m_PostDbg[0] == 0xcdcdcdcd && lpClientContext->m_PostDbg[1] == 0xcdcdcdcd);
|
|
if(!bValid)
|
|
{
|
|
DBGPrintf(
|
|
DBG_ERROR,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("ValidContextHandle : Bad client context\n")
|
|
);
|
|
|
|
TLSASSERT(FALSE);
|
|
}
|
|
|
|
return bValid;
|
|
|
|
#else
|
|
|
|
return TRUE;
|
|
|
|
#endif
|
|
}
|
|
|
|
//-------------------------------------------------------------------------
|
|
|
|
void
|
|
__RPC_USER PCONTEXT_HANDLE_rundown(
|
|
PCONTEXT_HANDLE phContext
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Client context handle cleanup, called when client disconnect normally
|
|
or abnormally, see context handle rundown routine help on RPC
|
|
|
|
Argument:
|
|
|
|
phContext - client context handle.
|
|
|
|
Returns:
|
|
|
|
None
|
|
|
|
++*/
|
|
{
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("PCONTEXT_HANDLE_rundown...\n")
|
|
);
|
|
|
|
TLSASSERT(phContext != NULL);
|
|
|
|
try {
|
|
|
|
//
|
|
// If service is shutting down, exit right away without freeing up memory,
|
|
//
|
|
// Durning shutdown, RPC wait until all call completed but it does not wait
|
|
// until all open connection has 'rundown' if client is still in enumeration,
|
|
// this will cause ReleaseWorkSpace() to assert. Instead of using one more
|
|
// HANDLE to wait until all open connection has been rundown, we return right
|
|
// away to speed up shutdown time
|
|
//
|
|
if( phContext && ValidContextHandle(phContext) )
|
|
{
|
|
LPCLIENTCONTEXT lpClientContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("Disconnect from %s\n"),
|
|
lpClientContext->m_Client
|
|
);
|
|
|
|
assert(lpClientContext->m_RefCount == 0);
|
|
|
|
if( IsServiceShuttingdown() == FALSE )
|
|
{
|
|
switch(lpClientContext->m_ContextType)
|
|
{
|
|
case CONTEXTHANDLE_LICENSE_ENUM_TYPE:
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace = (PTLSDbWorkSpace)lpClientContext->m_ContextHandle;
|
|
|
|
if( IsValidAllocatedWorkspace(pDbWkSpace) == TRUE )
|
|
{
|
|
ReleaseWorkSpace(&pDbWkSpace);
|
|
}
|
|
}
|
|
break;
|
|
|
|
case CONTEXTHANDLE_KEYPACK_ENUM_TYPE:
|
|
{
|
|
LPENUMHANDLE hEnum=(LPENUMHANDLE)lpClientContext->m_ContextHandle;
|
|
|
|
if( IsValidAllocatedWorkspace(hEnum->pbWorkSpace) == TRUE )
|
|
{
|
|
TLSDBLicenseKeyPackEnumEnd(hEnum);
|
|
}
|
|
|
|
lpClientContext->m_ContextType = CONTEXTHANDLE_EMPTY_TYPE;
|
|
lpClientContext->m_ContextHandle=NULL;
|
|
}
|
|
break;
|
|
|
|
case CONTEXTHANDLE_HYDRA_REQUESTCERT_TYPE:
|
|
{
|
|
LPTERMSERVCERTREQHANDLE lpHandle=(LPTERMSERVCERTREQHANDLE)lpClientContext->m_ContextHandle;
|
|
midl_user_free(lpHandle->pCertRequest);
|
|
midl_user_free(lpHandle->pbChallengeData);
|
|
FreeMemory(lpHandle);
|
|
}
|
|
break;
|
|
|
|
case CONTEXTHANDLE_CHALLENGE_SERVER_TYPE:
|
|
case CONTEXTHANDLE_CHALLENGE_LRWIZ_TYPE:
|
|
case CONTEXTHANDLE_CHALLENGE_TERMSRV_TYPE:
|
|
{
|
|
PTLSCHALLENGEDATA pChallengeData = (PTLSCHALLENGEDATA) lpClientContext->m_ContextHandle;
|
|
if(pChallengeData)
|
|
{
|
|
FreeMemory(pChallengeData->pbChallengeData);
|
|
FreeMemory(pChallengeData);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("PCONTEXT_HANDLE_rundown while shutting down...\n")
|
|
);
|
|
}
|
|
|
|
if( lpClientContext->m_Client )
|
|
{
|
|
FreeMemory(lpClientContext->m_Client);
|
|
}
|
|
|
|
midl_user_free(lpClientContext);
|
|
}
|
|
}
|
|
catch(...) {
|
|
SetLastError(TLS_E_INTERNAL);
|
|
}
|
|
|
|
return;
|
|
}
|
|
|
|
|
|
//----------------------------------------------------------------------------------
|
|
DWORD
|
|
GetClientPrivilege(
|
|
IN handle_t hRpcBinding
|
|
)
|
|
|
|
/*++
|
|
Description:
|
|
|
|
Return client's privilege level
|
|
|
|
Arguments:
|
|
|
|
hRpcBinding - Client's RPC binding handle.
|
|
|
|
Return:
|
|
|
|
Client's privilege level
|
|
|
|
++*/
|
|
{
|
|
DWORD dwStatus = CLIENT_ACCESS_USER;
|
|
BOOL bAdmin=FALSE;
|
|
RPC_STATUS rpc_status;
|
|
|
|
// If a value of zero is specified, the server impersonates the client that
|
|
// is being served by this server thread
|
|
rpc_status = RpcImpersonateClient(hRpcBinding);
|
|
if(rpc_status == RPC_S_OK)
|
|
{
|
|
IsAdmin(&bAdmin);
|
|
dwStatus = (bAdmin) ? CLIENT_ACCESS_ADMIN : CLIENT_ACCESS_USER;
|
|
|
|
RpcRevertToSelfEx(hRpcBinding);
|
|
}
|
|
|
|
return dwStatus;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcConnect(
|
|
/* [in] */ handle_t binding,
|
|
/* [out] */ PCONTEXT_HANDLE __RPC_FAR *pphContext
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Connect client and allocate/return client context handle.
|
|
|
|
Arguments:
|
|
|
|
hRPCBinding - RPC binding handle
|
|
pphContext - client context handle.
|
|
|
|
Returns via dwErrCode.
|
|
|
|
RPC_S_ACCESS_DENIED or LSERVER_S_SUCCESS.
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
DWORD dwPriv;
|
|
|
|
RPC_BINDING_HANDLE hClient=NULL;
|
|
WCHAR * pszRpcStrBinding=NULL;
|
|
LPTSTR pszClient=NULL;
|
|
|
|
if(RpcBindingServerFromClient(binding, &hClient) == RPC_S_OK)
|
|
{
|
|
status = RpcBindingToStringBinding( hClient, &pszRpcStrBinding );
|
|
RpcBindingFree(&hClient);
|
|
|
|
if (status != RPC_S_OK)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
//
|
|
// need to load from resource file
|
|
//
|
|
pszClient = (LPTSTR)AllocateMemory(
|
|
(_tcslen((pszRpcStrBinding) ? pszRpcStrBinding : _TEXT("Unknown")) + 1) * sizeof(TCHAR)
|
|
);
|
|
|
|
if(pszClient == NULL)
|
|
{
|
|
status = ERROR_OUTOFMEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
_tcscpy(pszClient,
|
|
(pszRpcStrBinding) ? pszRpcStrBinding : _TEXT("Unknown")
|
|
);
|
|
|
|
if(pszRpcStrBinding)
|
|
{
|
|
RpcStringFree(&pszRpcStrBinding);
|
|
}
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("Connect from client %s\n"),
|
|
pszClient
|
|
);
|
|
|
|
dwPriv=GetClientPrivilege(binding);
|
|
|
|
LPCLIENTCONTEXT lpContext;
|
|
|
|
lpContext=(LPCLIENTCONTEXT)midl_user_allocate(sizeof(CLIENTCONTEXT));
|
|
if(lpContext == NULL)
|
|
{
|
|
status = ERROR_OUTOFMEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_CONNECT;
|
|
lpContext->m_PreDbg[0] = 0xcdcdcdcd;
|
|
lpContext->m_PreDbg[1] = 0xcdcdcdcd;
|
|
lpContext->m_PostDbg[0] = 0xcdcdcdcd;
|
|
lpContext->m_PostDbg[1] = 0xcdcdcdcd;
|
|
#endif
|
|
|
|
lpContext->m_Client = pszClient;
|
|
|
|
lpContext->m_RefCount = 0;
|
|
*pphContext=lpContext;
|
|
lpContext->m_ContextType = CONTEXTHANDLE_EMPTY_TYPE;
|
|
lpContext->m_ClientFlags = dwPriv;
|
|
|
|
cleanup:
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
FreeMemory(pszClient);
|
|
}
|
|
|
|
return TLSMapReturnCode(status);
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcDisconnect(
|
|
/* [out][in] */ PPCONTEXT_HANDLE pphContext
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Disconnect client and FreeMemory all memory allocated on the behalf of client
|
|
|
|
Arguments:
|
|
|
|
pphContext - pointer to client context handle
|
|
|
|
Returns:
|
|
|
|
LSERVER_S_SUCCESS or ERROR_INVALID_HANDLE
|
|
|
|
++*/
|
|
{
|
|
DWORD Status=ERROR_SUCCESS;
|
|
|
|
try {
|
|
|
|
if(!ValidContextHandle(*pphContext) || *pphContext == NULL)
|
|
{
|
|
Status = ERROR_INVALID_HANDLE;
|
|
}
|
|
else
|
|
{
|
|
PCONTEXT_HANDLE_rundown(*pphContext);
|
|
*pphContext = NULL;
|
|
}
|
|
|
|
}
|
|
catch(...) {
|
|
Status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
return TLSMapReturnCode(Status);
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
|
|
error_status_t
|
|
TLSRpcGetVersion(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out][in] */ PDWORD pdwVersion
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetVersion\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(TLSIsBetaNTServer() == TRUE)
|
|
{
|
|
*pdwVersion = TLS_CURRENT_VERSION;
|
|
}
|
|
else
|
|
{
|
|
*pdwVersion = TLS_CURRENT_VERSION_RTM;
|
|
}
|
|
|
|
if(g_SrvRole & TLSERVER_ENTERPRISE_SERVER)
|
|
{
|
|
*pdwVersion |= TLS_VERSION_ENTERPRISE_BIT;
|
|
}
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_DETAILSIMPLE,
|
|
_TEXT("%s : TLSRpcGetVersion return 0x%08x\n"),
|
|
lpContext->m_Client,
|
|
*pdwVersion
|
|
);
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetSupportFlags(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out] */ DWORD *pdwSupportFlags
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
error_status_t status = RPC_S_OK;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetSupportFlags\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if (NULL != pdwSupportFlags)
|
|
{
|
|
*pdwSupportFlags = ALL_KNOWN_SUPPORT_FLAGS;
|
|
}
|
|
else
|
|
{
|
|
status = ERROR_INVALID_PARAMETER;
|
|
}
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
return status;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
|
|
error_status_t
|
|
TLSRpcSendServerCertificate(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD cbCert,
|
|
/* [size_is][in] */ PBYTE pbCert,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
This routine is for License Server to identify hydra server, hydra server
|
|
need to send its certificate in order to gain certificate request privilege.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle.
|
|
cbCert - size of hydra server certificate.
|
|
pbCert - hydra server's self-created certificate.
|
|
dwErrCode - return code.
|
|
|
|
Returns via dwErrCode
|
|
|
|
LSERVER_E_INVALID_DATA.
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcSendServerCertificate\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
try {
|
|
|
|
if(pbCert == NULL || cbCert == 0 ||
|
|
TLSVerifyHydraCertificate(pbCert, cbCert) != LICENSE_STATUS_OK)
|
|
{
|
|
DBGPrintf(
|
|
DBG_WARNING,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_DETAILSIMPLE,
|
|
_TEXT("TLSRpcSendServerCertificate : client %s send invalid certificate\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
status = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
lpContext->m_ClientFlags |= CLIENT_ACCESS_REQUEST;
|
|
}
|
|
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INVALID_DATA;
|
|
}
|
|
|
|
// midl_user_free(pbCert);
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_SEND_CERTIFICATE;
|
|
#endif
|
|
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetServerName(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [size_is][string][out][in] */ LPTSTR szMachineName,
|
|
/* [out][in] */ PDWORD cbSize,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Return server's machine name.
|
|
|
|
Arguments:
|
|
|
|
phContext - Client context handle
|
|
szMachineName - return server's machine name, must be at least
|
|
MAX_COMPUTERNAME_LENGTH + 1 in length
|
|
|
|
Return:
|
|
|
|
TLS_E_INVALID_DATA - buffer size too small.
|
|
|
|
++*/
|
|
{
|
|
// TODO: no need for this buffer - use caller's buffer instead
|
|
|
|
TCHAR szComputerName[MAX_COMPUTERNAME_LENGTH+2];
|
|
DWORD dwBufferSize=MAX_COMPUTERNAME_LENGTH+1;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetServerName\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_CHALLENGE_SERVER_TYPE)
|
|
{
|
|
*dwErrCode = TLSMapReturnCode(TLS_E_INVALID_DATA);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
*dwErrCode = ERROR_SUCCESS;
|
|
if(!GetComputerName(szComputerName, &dwBufferSize))
|
|
{
|
|
*dwErrCode = GetLastError();
|
|
}
|
|
|
|
//
|
|
// return buffer must be big enough for NULL,
|
|
// dwBufferSize return does not include NULL.
|
|
//
|
|
if(*cbSize <= dwBufferSize)
|
|
{
|
|
DBGPrintf(
|
|
DBG_WARNING,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_DETAILSIMPLE,
|
|
_TEXT("TLSRpcGetServerName : Client %s invalid parameter\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
*dwErrCode = TLSMapReturnCode(TLS_E_INVALID_DATA);
|
|
}
|
|
else
|
|
{
|
|
_tcsncpy(szMachineName, szComputerName, min(_tcslen(szComputerName), *cbSize));
|
|
szMachineName[min(_tcslen(szComputerName), *cbSize - 1)] = _TEXT('\0');
|
|
}
|
|
|
|
*cbSize = _tcslen(szComputerName) + 1; // include NULL terminate string
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GET_SERVERNAME;
|
|
#endif
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetServerNameEx(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [size_is][string][out][in] */ LPTSTR szMachineName,
|
|
/* [out][in] */ PDWORD cbSize,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Return server's machine name.
|
|
|
|
Arguments:
|
|
|
|
phContext - Client context handle
|
|
szMachineName - return server's machine name, must be at least
|
|
MAX_COMPUTERNAME_LENGTH + 1 in length
|
|
|
|
Return:
|
|
|
|
TLS_E_INVALID_DATA - buffer size too small.
|
|
|
|
++*/
|
|
{
|
|
// TODO: no need for this buffer - use caller's buffer instead
|
|
|
|
TCHAR szComputerName[MAX_COMPUTERNAME_LENGTH+2];
|
|
DWORD dwBufferSize=MAX_COMPUTERNAME_LENGTH+1;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetServerNameEx\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
*dwErrCode = ERROR_SUCCESS;
|
|
if(!GetComputerName(szComputerName, &dwBufferSize))
|
|
{
|
|
*dwErrCode = GetLastError();
|
|
}
|
|
|
|
//
|
|
// return buffer must be big enough for NULL,
|
|
// dwBufferSize return does not include NULL.
|
|
//
|
|
if(*cbSize <= dwBufferSize)
|
|
{
|
|
DBGPrintf(
|
|
DBG_WARNING,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_DETAILSIMPLE,
|
|
_TEXT("TLSRpcGetServerNameEx : Client %s invalid parameter\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
*dwErrCode = TLSMapReturnCode(TLS_E_INVALID_DATA);
|
|
}
|
|
else
|
|
{
|
|
_tcsncpy(szMachineName, szComputerName, min(_tcslen(szComputerName), *cbSize));
|
|
szMachineName[min(_tcslen(szComputerName), *cbSize - 1)] = _TEXT('\0');
|
|
}
|
|
|
|
*cbSize = _tcslen(szComputerName) + 1; // include NULL terminate string
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GET_SERVERNAME;
|
|
#endif
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetServerScope(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [size_is][string][out][in] */ LPTSTR szScopeName,
|
|
/* [out][in] */ PDWORD cbSize,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Return License Server's scope
|
|
|
|
Arguments:
|
|
|
|
phContext - Client context
|
|
szScopeName - return server's scope, must be at least
|
|
MAX_COMPUTERNAME_LENGTH in length
|
|
|
|
Return:
|
|
|
|
LSERVER_S_SUCCESS or error code from WideCharToMultiByte()
|
|
TLS_E_INVALID_DATA - buffer size too small.
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetServerScope\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
*dwErrCode = ERROR_SUCCESS;
|
|
if(*cbSize <= _tcslen(g_pszScope))
|
|
{
|
|
*dwErrCode = TLSMapReturnCode(TLS_E_INVALID_DATA);
|
|
}
|
|
else
|
|
{
|
|
_tcsncpy(szScopeName, g_pszScope, min(_tcslen(g_pszScope), *cbSize));
|
|
szScopeName[min(_tcslen(g_pszScope), *cbSize-1)] = _TEXT('\0');
|
|
}
|
|
|
|
*cbSize = _tcslen(g_pszScope) + 1; // include NULL terminate string
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GET_SERVERSCOPE;
|
|
#endif
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetInfo(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD cbHSCert,
|
|
/* [size_is][in] */ PBYTE pHSCert,
|
|
/* [ref][out] */ DWORD __RPC_FAR *pcbLSCert,
|
|
/* [size_is][size_is][out] */ BYTE __RPC_FAR *__RPC_FAR *pLSCert,
|
|
/* [ref][out] */ DWORD __RPC_FAR *pcbLSSecretKey,
|
|
/* [size_is][size_is][out] */ BYTE __RPC_FAR *__RPC_FAR *pLSSecretKey,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Routine to exchange Hydra server's certificate and License server's
|
|
certificate/private key for signing client machine's hardware ID.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
cbHSCert - size of Hydra Server's certificate
|
|
pHSCert - Hydra Server's certificate
|
|
pcbLSCert - return size of License Server's certificate
|
|
pLSCert - return License Server's certificate
|
|
pcbLSSecretKey - return size of License Server's private key.
|
|
pLSSecretKey - retrun License Server's private key
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS success
|
|
LSERVER_E_INVALID_DATA Invalid hydra server certificate
|
|
LSERVER_E_OUTOFMEMORY Can't allocate required memory
|
|
TLS_E_INTERNAL Internal error occurred in License Server
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetInfo\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
try {
|
|
do {
|
|
if( pHSCert == NULL || cbHSCert == 0 ||
|
|
TLSVerifyHydraCertificate(pHSCert, cbHSCert) != LICENSE_STATUS_OK)
|
|
{
|
|
status= TLS_E_INVALID_DATA;
|
|
break;
|
|
}
|
|
|
|
*pcbLSCert = g_cbSignatureEncodedCert;
|
|
*pLSCert = (PBYTE)midl_user_allocate(*pcbLSCert);
|
|
if(!*pLSCert)
|
|
{
|
|
status = ERROR_OUTOFMEMORY;
|
|
break;
|
|
}
|
|
memcpy(*pLSCert, (PBYTE)g_pbSignatureEncodedCert, *pcbLSCert);
|
|
|
|
*pcbLSSecretKey=0;
|
|
*pLSSecretKey=NULL;
|
|
} while(FALSE);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
if(*pLSCert)
|
|
midl_user_free(*pLSCert);
|
|
|
|
if(*pLSSecretKey)
|
|
midl_user_free(*pLSSecretKey);
|
|
|
|
*pcbLSCert=0;
|
|
*pcbLSSecretKey=0;
|
|
*pLSCert=NULL;
|
|
*pLSSecretKey=NULL;
|
|
}
|
|
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
// midl_user_free(pHSCert);
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GETINFO;
|
|
#endif
|
|
|
|
lpContext->m_LastError = status;
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
|
|
#define RANDOM_CHALLENGE_DATA _TEXT("TEST")
|
|
|
|
DWORD
|
|
TLSGenerateChallengeData(
|
|
IN DWORD ClientInfo,
|
|
OUT PDWORD pcbChallengeData,
|
|
IN OUT PBYTE* pChallengeData
|
|
)
|
|
{
|
|
DWORD hr=ERROR_SUCCESS;
|
|
|
|
*pcbChallengeData = (_tcslen(RANDOM_CHALLENGE_DATA) + 1) * sizeof(WCHAR);
|
|
*pChallengeData=(PBYTE)midl_user_allocate(*pcbChallengeData);
|
|
|
|
if(*pChallengeData)
|
|
{
|
|
memcpy(*pChallengeData, RANDOM_CHALLENGE_DATA, *pcbChallengeData);
|
|
}
|
|
else
|
|
{
|
|
SetLastError(hr=ERROR_OUTOFMEMORY);
|
|
}
|
|
|
|
return hr;
|
|
}
|
|
|
|
//++----------------------------------------------------------------------------
|
|
DWORD
|
|
TLSVerifyChallengeDataGetWantedLicenseLevel(
|
|
IN const CHALLENGE_CONTEXT ChallengeContext,
|
|
IN const DWORD cbChallengeData,
|
|
IN const PBYTE pbChallengeData,
|
|
OUT WORD* pwLicenseDetail
|
|
)
|
|
/*++
|
|
|
|
--*/
|
|
{
|
|
DWORD dwStatus = ERROR_SUCCESS;
|
|
|
|
DWORD dwChallengeDataSize = (_tcslen(RANDOM_CHALLENGE_DATA) + 1) * sizeof(WCHAR);
|
|
PPlatformChallengeResponseData pChallengeResponse;
|
|
|
|
if( cbChallengeData < dwChallengeDataSize || pbChallengeData == NULL )
|
|
{
|
|
//
|
|
// Assume old client, new client always send back our challenge data
|
|
//
|
|
*pwLicenseDetail = LICENSE_DETAIL_SIMPLE;
|
|
}
|
|
else if( cbChallengeData == dwChallengeDataSize &&
|
|
_tcsicmp( (LPCTSTR)pbChallengeData, RANDOM_CHALLENGE_DATA ) == 0 )
|
|
{
|
|
//
|
|
// old client, set license chain to LICENSE_DETAIL_SIMPLE
|
|
//
|
|
*pwLicenseDetail = LICENSE_DETAIL_SIMPLE;
|
|
}
|
|
else
|
|
{
|
|
BOOL bValidStruct = TRUE;
|
|
|
|
//
|
|
// we still don't have a good challenge so ignore actual verification
|
|
//
|
|
pChallengeResponse = (PPlatformChallengeResponseData) pbChallengeData;
|
|
|
|
bValidStruct = (pChallengeResponse->wVersion == CURRENT_PLATFORMCHALLENGE_VERSION);
|
|
if( bValidStruct == TRUE )
|
|
{
|
|
bValidStruct = (pChallengeResponse->cbChallenge + offsetof(PlatformChallengeResponseData, pbChallenge) == cbChallengeData);
|
|
}
|
|
|
|
if (bValidStruct == TRUE )
|
|
{
|
|
if( pChallengeResponse->wClientType == WIN32_PLATFORMCHALLENGE_TYPE ||
|
|
pChallengeResponse->wClientType == WIN16_PLATFORMCHALLENGE_TYPE ||
|
|
pChallengeResponse->wClientType == WINCE_PLATFORMCHALLENGE_TYPE ||
|
|
pChallengeResponse->wClientType == OTHER_PLATFORMCHALLENGE_TYPE )
|
|
{
|
|
bValidStruct = TRUE;
|
|
}
|
|
else
|
|
{
|
|
bValidStruct = FALSE;
|
|
}
|
|
}
|
|
|
|
if( bValidStruct == TRUE )
|
|
{
|
|
if( pChallengeResponse->wLicenseDetailLevel == LICENSE_DETAIL_SIMPLE ||
|
|
pChallengeResponse->wLicenseDetailLevel == LICENSE_DETAIL_MODERATE ||
|
|
pChallengeResponse->wLicenseDetailLevel == LICENSE_DETAIL_DETAIL )
|
|
{
|
|
bValidStruct = TRUE;
|
|
}
|
|
else
|
|
{
|
|
bValidStruct = FALSE;
|
|
}
|
|
}
|
|
|
|
//
|
|
// For now, we simply let it go thru, assert or deny request once
|
|
// we settle down of challenge
|
|
//
|
|
if( bValidStruct == FALSE )
|
|
{
|
|
// bad data, assume old client
|
|
*pwLicenseDetail = LICENSE_DETAIL_SIMPLE;
|
|
}
|
|
//else if( pChallengeResponse->wClientType == WINCE_PLATFORMCHALLENGE_TYPE )
|
|
//{
|
|
//
|
|
// UN-comment this to limit WINCE to get a self-signed certificate
|
|
//
|
|
// *pwLicenseDetail = LICENSE_DETAIL_SIMPLE;
|
|
//}
|
|
else
|
|
{
|
|
*pwLicenseDetail = pChallengeResponse->wLicenseDetailLevel;
|
|
}
|
|
}
|
|
|
|
return dwStatus;
|
|
}
|
|
|
|
|
|
//++----------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcIssuePlatformChallenge(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwClientInfo,
|
|
/* [ref][out] */ PCHALLENGE_CONTEXT pChallengeContext,
|
|
/* [out] */ PDWORD pcbChallengeData,
|
|
/* [size_is][size_is][out] */ BYTE __RPC_FAR *__RPC_FAR *pChallengeData,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Issue a platform challenge to hydra client.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
dwClientInfo - client info.
|
|
pChallengeContext - pointer to client challenge context.
|
|
pcbChallengeData - size of challenge data.
|
|
pChallengeData - random client challenge data.
|
|
|
|
Returns via dwErrCode:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_OUTOFMEMORY Out of memory
|
|
LSERVER_E_INVALID_DATA Invalid client info.
|
|
LSERVER_E_SERVER_BUSY Server is busy
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
LPCLIENTCHALLENGECONTEXT lpChallenge=NULL;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcIssuePlatformChallenge\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
try {
|
|
|
|
do {
|
|
status=TLSGenerateChallengeData(
|
|
dwClientInfo,
|
|
pcbChallengeData,
|
|
pChallengeData
|
|
);
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
break;
|
|
}
|
|
|
|
*pChallengeContext = dwClientInfo;
|
|
} while (FALSE);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
if(*pChallengeData)
|
|
{
|
|
midl_user_free(*pChallengeData);
|
|
*pChallengeData = NULL;
|
|
}
|
|
|
|
*pcbChallengeData=0;
|
|
}
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
lpContext->m_LastError=status;
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_ISSUEPLATFORMCHLLENGE;
|
|
#endif
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcRequestNewLicense(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ const CHALLENGE_CONTEXT ChallengeContext,
|
|
/* [in] */ TLSLICENSEREQUEST __RPC_FAR *pRequest,
|
|
/* [string][in] */ LPTSTR szMachineName,
|
|
/* [string][in] */ LPTSTR szUserName,
|
|
/* [in] */ const DWORD cbChallengeResponse,
|
|
/* [size_is][in] */ const PBYTE pbChallenge,
|
|
/* [in] */ BOOL bAcceptTemporaryLicense,
|
|
/* [out] */ PDWORD pcbLicense,
|
|
/* [size_is][size_is][out] */ BYTE __RPC_FAR *__RPC_FAR *ppbLicense,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Routine to issue new license to hydra client based on product requested,
|
|
it returns existing license if client already has a license and the
|
|
license is not expired/returned/revoked, if request product has not been
|
|
installed, it will issue a temporary license, if license found is temporary
|
|
or expired, it will tried to upgrade/re-issue a new license with latest
|
|
version of requested product, if the existing license is temporary and
|
|
no license can be issued, it returns LSERVER_E_LICENSE_EXPIRED
|
|
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle.
|
|
ChallengeContext - client challenge context handle, return from
|
|
call TLSRpcIssuePlatformChallenge()
|
|
pRequest - product license request.
|
|
pMachineName - client's machine name.
|
|
pUserName - client user name.
|
|
cbChallengeResponse - size of the client's response to license server's
|
|
platform challenge.
|
|
pbChallenge - client's response to license server's platform challenge
|
|
bAcceptTemporaryLicense - TRUE if client wants temp. license FALSE otherwise.
|
|
pcbLicense - size of return license.
|
|
ppLicense - return license, could be old license
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_OUTOFMEMORY
|
|
LSERVER_E_SERVER_BUSY Server is busy to process request.
|
|
LSERVER_E_INVALID_DATA Invalid platform challenge response.
|
|
LSERVER_E_NO_LICENSE No license available.
|
|
LSERVER_E_NO_PRODUCT Request product is not installed on server.
|
|
LSERVER_E_LICENSE_REJECTED License request is rejected by cert. server
|
|
LSERVER_E_LICENSE_REVOKED Old license found and has been revoked
|
|
LSERVER_E_LICENSE_EXPIRED Request product's license has expired
|
|
LSERVER_E_CORRUPT_DATABASE Corrupted database.
|
|
LSERVER_E_INTERNAL_ERROR Internal error in license server
|
|
LSERVER_I_PROXIMATE_LICENSE Closest match license returned.
|
|
LSERVER_I_TEMPORARY_LICENSE Temporary license has been issued
|
|
LSERVER_I_LICENSE_UPGRADED Old license has been upgraded.
|
|
++*/
|
|
{
|
|
DWORD dwSupportFlags = 0;
|
|
|
|
return TLSRpcRequestNewLicenseEx(
|
|
phContext,
|
|
&dwSupportFlags,
|
|
ChallengeContext,
|
|
pRequest,
|
|
szMachineName,
|
|
szUserName,
|
|
cbChallengeResponse,
|
|
pbChallenge,
|
|
bAcceptTemporaryLicense,
|
|
1, // dwQuantity
|
|
pcbLicense,
|
|
ppbLicense,
|
|
pdwErrCode
|
|
);
|
|
}
|
|
|
|
error_status_t
|
|
TLSRpcRequestNewLicenseEx(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in, out] */ DWORD *pdwSupportFlags,
|
|
/* [in] */ const CHALLENGE_CONTEXT ChallengeContext,
|
|
/* [in] */ TLSLICENSEREQUEST __RPC_FAR *pRequest,
|
|
/* [string][in] */ LPTSTR szMachineName,
|
|
/* [string][in] */ LPTSTR szUserName,
|
|
/* [in] */ const DWORD cbChallengeResponse,
|
|
/* [size_is][in] */ const PBYTE pbChallenge,
|
|
/* [in] */ BOOL bAcceptTemporaryLicense,
|
|
/* [in] */ DWORD dwQuantity,
|
|
/* [out] */ PDWORD pcbLicense,
|
|
/* [size_is][size_is][out] */ BYTE __RPC_FAR *__RPC_FAR *ppbLicense,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Routine to issue new license to hydra client based on product requested
|
|
and input support flags.
|
|
|
|
*pdwSupportFlags == 0:
|
|
it returns existing license if client already has a license and the
|
|
license is not expired/returned/revoked, if request product has not
|
|
been installed, it will issue a temporary license, if license found is
|
|
temporary or expired, it will tried to upgrade/re-issue a new license
|
|
with latest version of requested product, if the existing license is
|
|
temporary and no license can be issued, it returns
|
|
LSERVER_E_LICENSE_EXPIRED
|
|
|
|
*pdwSupportFlags & SUPPORT_PER_SEAT_POST_LOGON:
|
|
For non-per-seat licenses, it behaves as if the flag wasn't set.
|
|
For per-seat licenses, if bAcceptTemporaryLicense is TRUE, it always
|
|
returns a temporary license. If bAcceptTemporaryLicense if FALSE, it
|
|
returns LSERVER_E_NO_LICENSE.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle.
|
|
pdwSupportFlags - on input, abilities supported by TS. on output,
|
|
abilities supported by both TS and LS
|
|
ChallengeContext - client challenge context handle, return from
|
|
call TLSRpcIssuePlatformChallenge()
|
|
pRequest - product license request.
|
|
pMachineName - client's machine name.
|
|
pUserName - client user name.
|
|
cbChallengeResponse - size of the client's response to license server's
|
|
platform challenge.
|
|
pbChallenge - client's response to license server's platform challenge
|
|
bAcceptTemporaryLicense - TRUE if client wants temp. license FALSE
|
|
otherwise.
|
|
dwQuantity - number of licenses to allocate
|
|
pcbLicense - size of return license.
|
|
ppLicense - return license, could be old license
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_OUTOFMEMORY
|
|
LSERVER_E_SERVER_BUSY Server is busy to process request.
|
|
LSERVER_E_INVALID_DATA Invalid platform challenge response.
|
|
LSERVER_E_NO_LICENSE No license available.
|
|
LSERVER_E_NO_PRODUCT Request product is not installed on server.
|
|
LSERVER_E_LICENSE_REJECTED License request is rejected by cert. server
|
|
LSERVER_E_LICENSE_REVOKED Old license found and has been revoked
|
|
LSERVER_E_LICENSE_EXPIRED Request product's license has expired
|
|
LSERVER_E_CORRUPT_DATABASE Corrupted database.
|
|
LSERVER_E_INTERNAL_ERROR Internal error in license server
|
|
LSERVER_I_PROXIMATE_LICENSE Closest match license returned.
|
|
LSERVER_I_TEMPORARY_LICENSE Temporary license has been issued
|
|
LSERVER_I_LICENSE_UPGRADED Old license has been upgraded.
|
|
++*/
|
|
{
|
|
return TLSRpcRequestNewLicenseExEx(
|
|
phContext,
|
|
pdwSupportFlags,
|
|
ChallengeContext,
|
|
pRequest,
|
|
szMachineName,
|
|
szUserName,
|
|
cbChallengeResponse,
|
|
pbChallenge,
|
|
bAcceptTemporaryLicense,
|
|
FALSE, // bAcceptFewerLicense
|
|
&dwQuantity,
|
|
pcbLicense,
|
|
ppbLicense,
|
|
pdwErrCode
|
|
);
|
|
}
|
|
|
|
error_status_t
|
|
TLSRpcRequestNewLicenseExEx(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in, out] */ DWORD *pdwSupportFlags,
|
|
/* [in] */ const CHALLENGE_CONTEXT ChallengeContext,
|
|
/* [in] */ TLSLICENSEREQUEST __RPC_FAR *pRequest,
|
|
/* [string][in] */ LPTSTR szMachineName,
|
|
/* [string][in] */ LPTSTR szUserName,
|
|
/* [in] */ const DWORD cbChallengeResponse,
|
|
/* [size_is][in] */ const PBYTE pbChallenge,
|
|
/* [in] */ BOOL bAcceptTemporaryLicense,
|
|
/* [in] */ BOOL bAcceptFewerLicenses,
|
|
/* [in,out] */ DWORD *pdwQuantity,
|
|
/* [out] */ PDWORD pcbLicense,
|
|
/* [size_is][size_is][out] */ BYTE __RPC_FAR *__RPC_FAR *ppbLicense,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Routine to issue new license to hydra client based on product requested
|
|
and input support flags.
|
|
|
|
*pdwSupportFlags == 0:
|
|
it returns existing license if client already has a license and the
|
|
license is not expired/returned/revoked, if request product has not
|
|
been installed, it will issue a temporary license, if license found is
|
|
temporary or expired, it will tried to upgrade/re-issue a new license
|
|
with latest version of requested product, if the existing license is
|
|
temporary and no license can be issued, it returns
|
|
LSERVER_E_LICENSE_EXPIRED
|
|
|
|
*pdwSupportFlags & SUPPORT_PER_SEAT_POST_LOGON:
|
|
For non-per-seat licenses, it behaves as if the flag wasn't set.
|
|
For per-seat licenses, if bAcceptTemporaryLicense is TRUE, it always
|
|
returns a temporary license. If bAcceptTemporaryLicense if FALSE, it
|
|
returns LSERVER_E_NO_LICENSE.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle.
|
|
pdwSupportFlags - on input, abilities supported by TS. on output,
|
|
abilities supported by both TS and LS
|
|
ChallengeContext - client challenge context handle, return from
|
|
call TLSRpcIssuePlatformChallenge()
|
|
pRequest - product license request.
|
|
pMachineName - client's machine name.
|
|
pUserName - client user name.
|
|
cbChallengeResponse - size of the client's response to license server's
|
|
platform challenge.
|
|
pbChallenge - client's response to license server's platform challenge
|
|
bAcceptTemporaryLicense - TRUE if client wants temp. license FALSE
|
|
otherwise.
|
|
bAcceptFewerLicenses - TRUE if succeeding with fewer licenses than
|
|
requested is acceptable
|
|
pdwQuantity - on input, number of licenses to allocate. on output,
|
|
number of licenses actually allocated
|
|
pcbLicense - size of return license.
|
|
ppLicense - return license, could be old license
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_OUTOFMEMORY
|
|
LSERVER_E_SERVER_BUSY Server is busy to process request.
|
|
LSERVER_E_INVALID_DATA Invalid platform challenge response.
|
|
LSERVER_E_NO_LICENSE No license available.
|
|
LSERVER_E_NO_PRODUCT Request product is not installed on server.
|
|
LSERVER_E_LICENSE_REJECTED License request is rejected by cert. server
|
|
LSERVER_E_LICENSE_REVOKED Old license found and has been revoked
|
|
LSERVER_E_LICENSE_EXPIRED Request product's license has expired
|
|
LSERVER_E_CORRUPT_DATABASE Corrupted database.
|
|
LSERVER_E_INTERNAL_ERROR Internal error in license server
|
|
LSERVER_I_PROXIMATE_LICENSE Closest match license returned.
|
|
LSERVER_I_TEMPORARY_LICENSE Temporary license has been issued
|
|
LSERVER_I_LICENSE_UPGRADED Old license has been upgraded.
|
|
++*/
|
|
{
|
|
PMHANDLE hClient;
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
TCHAR szUnknown[LSERVER_MAX_STRING_SIZE+1];
|
|
TCHAR szClientMachineName[LSERVER_MAX_STRING_SIZE];
|
|
TCHAR szClientUserName[LSERVER_MAX_STRING_SIZE];
|
|
TCHAR szCompanyName[LSERVER_MAX_STRING_SIZE+1];
|
|
TCHAR szProductId[LSERVER_MAX_STRING_SIZE+1];
|
|
|
|
TLSForwardNewLicenseRequest Forward;
|
|
TLSDBLICENSEREQUEST LsLicenseRequest;
|
|
CTLSPolicy* pPolicy=NULL;
|
|
|
|
PMLICENSEREQUEST PMLicenseRequest;
|
|
PPMLICENSEREQUEST pAdjustedRequest;
|
|
BOOL bForwardRequest = TRUE;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
#ifdef DBG
|
|
DWORD dwStartTime=GetTickCount();
|
|
#endif
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcRequestNewLicense\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if ((NULL == pdwQuantity) || (0 == *pdwQuantity))
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(VerifyLicenseRequest(pRequest) == FALSE)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(NULL == pdwSupportFlags)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
*pdwSupportFlags &= ALL_KNOWN_SUPPORT_FLAGS;
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_REQUEST))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext->m_ClientFlags == CLIENT_ACCESS_LSERVER)
|
|
{
|
|
//
|
|
// do not forward any request or infinite loop might
|
|
// occur.
|
|
//
|
|
bForwardRequest = FALSE;
|
|
}
|
|
|
|
Forward.m_ChallengeContext = ChallengeContext;
|
|
Forward.m_pRequest = pRequest;
|
|
Forward.m_szMachineName = szMachineName;
|
|
Forward.m_szUserName = szUserName;
|
|
Forward.m_cbChallengeResponse = cbChallengeResponse;
|
|
Forward.m_pbChallengeResponse = pbChallenge;
|
|
|
|
memset(szCompanyName, 0, sizeof(szCompanyName));
|
|
memset(szProductId, 0, sizeof(szProductId));
|
|
|
|
memcpy(
|
|
szCompanyName,
|
|
pRequest->ProductInfo.pbCompanyName,
|
|
min(pRequest->ProductInfo.cbCompanyName, sizeof(szCompanyName)-sizeof(TCHAR))
|
|
);
|
|
|
|
memcpy(
|
|
szProductId,
|
|
pRequest->ProductInfo.pbProductID,
|
|
min(pRequest->ProductInfo.cbProductID, sizeof(szProductId)-sizeof(TCHAR))
|
|
);
|
|
|
|
//
|
|
// Acquire policy module, a default policy module will
|
|
// be returned.
|
|
//
|
|
pPolicy = AcquirePolicyModule(
|
|
szCompanyName, //(LPCTSTR)pRequest->ProductInfo.pbCompanyName,
|
|
szProductId, //(LPCTSTR)pRequest->ProductInfo.pbProductID
|
|
FALSE
|
|
);
|
|
|
|
if(pPolicy == NULL)
|
|
{
|
|
status = TLS_E_INTERNAL;
|
|
goto cleanup;
|
|
}
|
|
|
|
hClient = GenerateClientId();
|
|
|
|
//
|
|
// return error if string is too big.
|
|
//
|
|
LoadResourceString(
|
|
IDS_UNKNOWN_STRING,
|
|
szUnknown,
|
|
sizeof(szUnknown)/sizeof(szUnknown[0])
|
|
);
|
|
|
|
_tcsncpy(szClientMachineName,
|
|
(szMachineName) ? szMachineName : szUnknown,
|
|
LSERVER_MAX_STRING_SIZE
|
|
);
|
|
|
|
szClientMachineName[LSERVER_MAX_STRING_SIZE-1] = 0;
|
|
|
|
_tcsncpy(szClientUserName,
|
|
(szUserName) ? szUserName : szUnknown,
|
|
LSERVER_MAX_STRING_SIZE
|
|
);
|
|
|
|
szClientUserName[LSERVER_MAX_STRING_SIZE-1] = 0;
|
|
|
|
//
|
|
// Convert request to PMLICENSEREQUEST
|
|
//
|
|
TlsLicenseRequestToPMLicenseRequest(
|
|
LICENSETYPE_LICENSE,
|
|
pRequest,
|
|
szClientMachineName,
|
|
szClientUserName,
|
|
*pdwSupportFlags,
|
|
&PMLicenseRequest
|
|
);
|
|
|
|
//
|
|
// Inform Policy module start of new license request
|
|
//
|
|
status = pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_NEW,
|
|
(PVOID) &PMLicenseRequest,
|
|
(PVOID *) &pAdjustedRequest
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
if(pAdjustedRequest != NULL)
|
|
{
|
|
if(_tcsicmp(PMLicenseRequest.pszCompanyName,pAdjustedRequest->pszCompanyName) != 0)
|
|
{
|
|
// try to steal license from other company???
|
|
TLSLogEvent(
|
|
EVENTLOG_ERROR_TYPE,
|
|
TLS_E_POLICYERROR,
|
|
status = TLS_E_POLICYMODULEERROR,
|
|
pPolicy->GetCompanyName(),
|
|
pPolicy->GetProductId()
|
|
);
|
|
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pAdjustedRequest = &PMLicenseRequest;
|
|
}
|
|
|
|
//
|
|
// form DB request structure
|
|
//
|
|
status = TLSFormDBRequest(
|
|
pRequest->pbEncryptedHwid,
|
|
pRequest->cbEncryptedHwid,
|
|
pAdjustedRequest->dwProductVersion,
|
|
pAdjustedRequest->pszCompanyName,
|
|
pAdjustedRequest->pszProductId,
|
|
pAdjustedRequest->dwLanguageId,
|
|
pAdjustedRequest->dwPlatformId,
|
|
pAdjustedRequest->pszMachineName,
|
|
pAdjustedRequest->pszUserName,
|
|
&LsLicenseRequest
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
LsLicenseRequest.pPolicy = pPolicy;
|
|
LsLicenseRequest.hClient = hClient;
|
|
LsLicenseRequest.pPolicyLicenseRequest = pAdjustedRequest;
|
|
LsLicenseRequest.pClientLicenseRequest = &PMLicenseRequest;
|
|
|
|
try {
|
|
status = TLSVerifyChallengeDataGetWantedLicenseLevel(
|
|
ChallengeContext,
|
|
cbChallengeResponse,
|
|
pbChallenge,
|
|
&LsLicenseRequest.wLicenseDetail
|
|
);
|
|
|
|
if( status == ERROR_SUCCESS )
|
|
{
|
|
status = TLSNewLicenseRequest(
|
|
bForwardRequest,
|
|
pdwSupportFlags,
|
|
&Forward,
|
|
&LsLicenseRequest,
|
|
bAcceptTemporaryLicense,
|
|
pAdjustedRequest->fTemporary,
|
|
TRUE, // bFindLostLicense
|
|
bAcceptFewerLicenses,
|
|
pdwQuantity,
|
|
pcbLicense,
|
|
ppbLicense
|
|
);
|
|
}
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_ISSUENEWLICENSE;
|
|
#endif
|
|
|
|
#ifdef DBG
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_DETAILSIMPLE,
|
|
_TEXT("\t%s : TLSRpcRequestNewLicense() takes %dms\n"),
|
|
lpContext->m_Client,
|
|
GetTickCount() - dwStartTime
|
|
);
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
if(pPolicy)
|
|
{
|
|
pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_COMPLETE,
|
|
UlongToPtr(status),
|
|
NULL
|
|
);
|
|
|
|
ReleasePolicyModule(pPolicy);
|
|
}
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcUpgradeLicense(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ TLSLICENSEREQUEST __RPC_FAR *pRequest,
|
|
/* [in] */ const CHALLENGE_CONTEXT ChallengeContext,
|
|
/* [in] */ const DWORD cbChallengeResponse,
|
|
/* [size_is][in] */ const PBYTE pbChallenge,
|
|
/* [in] */ DWORD cbOldLicense,
|
|
/* [size_is][in] */ PBYTE pbOldLicense,
|
|
/* [out] */ PDWORD pcbNewLicense,
|
|
/* [size_is][size_is][out] */ PBYTE __RPC_FAR *ppbNewLicense,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Update an old license.
|
|
|
|
Arguments:
|
|
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
TLS_E_INTERNAL
|
|
LSERVER_E_INTERNAL_ERROR
|
|
LSERVER_E_INVALID_DATA old license is invalid.
|
|
LSERVER_E_NO_LICENSE no available license
|
|
LSERVER_E_NO_PRODUCT request product not install in current server.
|
|
LSERVER_E_CORRUPT_DATABASE Corrupted database.
|
|
LSERVER_E_LICENSE_REJECTED License request rejected by cert. server.
|
|
LSERVER_E_SERVER_BUSY
|
|
|
|
++*/
|
|
{
|
|
DWORD dwSupportFlags = 0;
|
|
|
|
return TLSRpcUpgradeLicenseEx(
|
|
phContext,
|
|
&dwSupportFlags,
|
|
pRequest,
|
|
ChallengeContext,
|
|
cbChallengeResponse,
|
|
pbChallenge,
|
|
cbOldLicense,
|
|
pbOldLicense,
|
|
1, // dwQuantity
|
|
pcbNewLicense,
|
|
ppbNewLicense,
|
|
dwErrCode
|
|
);
|
|
|
|
}
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcUpgradeLicenseEx(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in,out] */ DWORD *pdwSupportFlags,
|
|
/* [in] */ TLSLICENSEREQUEST __RPC_FAR *pRequest,
|
|
/* [in] */ const CHALLENGE_CONTEXT ChallengeContext,
|
|
/* [in] */ const DWORD cbChallengeResponse,
|
|
/* [size_is][in] */ const PBYTE pbChallenge,
|
|
/* [in] */ DWORD cbOldLicense,
|
|
/* [size_is][in] */ PBYTE pbOldLicense,
|
|
/* [in] */ DWORD dwQuantity,
|
|
/* [out] */ PDWORD pcbNewLicense,
|
|
/* [size_is][size_is][out] */ PBYTE __RPC_FAR *ppbNewLicense,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Update an old license. Behavior varies depending on product requested,
|
|
the old license, and input support flags.
|
|
|
|
*pdwSupportFlags == 0:
|
|
it returns existing license if client already has a current-version
|
|
license and the license is not expired/returned/revoked. if requested
|
|
product has not been installed, it will issue a temporary license (if
|
|
the client doesn't already have one). if old license is temporary
|
|
or expired, it will try to upgrade/re-issue a new license
|
|
with latest version of requested product. if the existing license is
|
|
temporary and no license can be issued, it returns
|
|
LSERVER_E_LICENSE_EXPIRED
|
|
|
|
*pdwSupportFlags & SUPPORT_PER_SEAT_POST_LOGON:
|
|
For non-per-seat licenses, it behaves as if the flag wasn't set.
|
|
For per-seat licenses, if the old license isn't current-version
|
|
temporary, it also behaves as if the flag wasn't set.
|
|
Otherwise, it checks that the temporary license was marked as having
|
|
been authenticated. If so, it tries to issue a permanent license.
|
|
If a license can't be issued, or if he temporary license wasn't marked,
|
|
it returns the old license.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle.
|
|
pdwSupportFlags - on input, abilities supported by TS. on output,
|
|
abilities supported by both TS and LS
|
|
pRequest - product license request.
|
|
ChallengeContext - client challenge context handle, return from
|
|
call TLSRpcIssuePlatformChallenge()
|
|
cbChallengeResponse - size of the client's response to license server's
|
|
platform challenge.
|
|
pbChallenge - client's response to license server's platform challenge
|
|
cbOldLicense - size of old license.
|
|
pbOldLicense - old license
|
|
dwQuantity - number of licenses to allocate
|
|
pcbNewLicense - size of return license.
|
|
ppbNewLicense - return license, could be old license
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
TLS_E_INTERNAL
|
|
LSERVER_E_INTERNAL_ERROR
|
|
LSERVER_E_INVALID_DATA old license is invalid.
|
|
LSERVER_E_NO_LICENSE no available license
|
|
LSERVER_E_NO_PRODUCT request product not install in current server.
|
|
LSERVER_E_CORRUPT_DATABASE Corrupted database.
|
|
LSERVER_E_LICENSE_REJECTED License request rejected by cert. server.
|
|
LSERVER_E_SERVER_BUSY
|
|
|
|
++*/
|
|
{
|
|
DWORD status = ERROR_SUCCESS;
|
|
BOOL bTemporaryLicense;
|
|
PMUPGRADEREQUEST pmRequestUpgrade;
|
|
PMLICENSEREQUEST pmLicenseRequest;
|
|
PPMLICENSEREQUEST pmAdjustedRequest;
|
|
PPMLICENSEDPRODUCT ppmLicensedProduct=NULL;
|
|
DWORD dwNumLicensedProduct=0;
|
|
PLICENSEDPRODUCT pLicensedProduct=NULL;
|
|
TLSDBLICENSEREQUEST LsLicenseRequest;
|
|
PMHANDLE hClient;
|
|
CTLSPolicy* pPolicy=NULL;
|
|
DWORD dwNumPermLicense;
|
|
DWORD dwNumTempLicense;
|
|
TLSForwardUpgradeLicenseRequest Forward;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
LICENSEDCLIENT license;
|
|
LICENSEPACK keypack;
|
|
DWORD index;
|
|
BOOL bForwardRequest = TRUE;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcUpgradeLicense\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if (1 != dwQuantity)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(VerifyLicenseRequest(pRequest) == FALSE)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(NULL == pdwSupportFlags)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
*pdwSupportFlags &= ALL_KNOWN_SUPPORT_FLAGS;
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_REQUEST))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext->m_ClientFlags == CLIENT_ACCESS_LSERVER)
|
|
{
|
|
//
|
|
// do not forward any request or infinite loop might
|
|
// occur.
|
|
//
|
|
bForwardRequest = FALSE;
|
|
}
|
|
|
|
//
|
|
// Convert blob to licensed product structure
|
|
//
|
|
status = LSVerifyDecodeClientLicense(
|
|
pbOldLicense,
|
|
cbOldLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
NULL
|
|
);
|
|
|
|
if(status != LICENSE_STATUS_OK || dwNumLicensedProduct == 0)
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
pLicensedProduct = (PLICENSEDPRODUCT)AllocateMemory(
|
|
dwNumLicensedProduct * sizeof(LICENSEDPRODUCT)
|
|
);
|
|
if(pLicensedProduct == NULL)
|
|
{
|
|
status = TLS_E_ALLOCATE_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
status = LSVerifyDecodeClientLicense(
|
|
pbOldLicense,
|
|
cbOldLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
pLicensedProduct
|
|
);
|
|
|
|
if(status != LICENSE_STATUS_OK)
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Verify licensed product array.
|
|
//
|
|
for(index = 1; index < dwNumLicensedProduct; index++)
|
|
{
|
|
//
|
|
// licensed product array always sorted in decending order
|
|
//
|
|
|
|
//
|
|
// Product ID in original request in licensed product must
|
|
// be the same otherwise invalid license.
|
|
//
|
|
if(pLicensedProduct->cbOrgProductID != (pLicensedProduct-1)->cbOrgProductID)
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
break;
|
|
}
|
|
|
|
if( memcmp(
|
|
pLicensedProduct->pbOrgProductID,
|
|
(pLicensedProduct-1)->pbOrgProductID,
|
|
pLicensedProduct->cbOrgProductID) != 0 )
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
if( (pLicensedProduct->pLicensedVersion->dwFlags & LICENSED_VERSION_TEMPORARY) )
|
|
{
|
|
//
|
|
// only latest licensed version can be temporary
|
|
//
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Find the policy module
|
|
//
|
|
hClient = GenerateClientId();
|
|
|
|
TCHAR szCompanyName[LSERVER_MAX_STRING_SIZE+1];
|
|
TCHAR szProductId[LSERVER_MAX_STRING_SIZE+1];
|
|
|
|
memset(szCompanyName, 0, sizeof(szCompanyName));
|
|
memset(szProductId, 0, sizeof(szProductId));
|
|
|
|
memcpy(
|
|
szCompanyName,
|
|
pRequest->ProductInfo.pbCompanyName,
|
|
min(pRequest->ProductInfo.cbCompanyName, sizeof(szCompanyName)-sizeof(TCHAR))
|
|
);
|
|
|
|
memcpy(
|
|
szProductId,
|
|
pRequest->ProductInfo.pbProductID,
|
|
min(pRequest->ProductInfo.cbProductID, sizeof(szProductId)-sizeof(TCHAR))
|
|
);
|
|
|
|
//
|
|
// Acquire policy module, a default policy module will
|
|
// be returned.
|
|
//
|
|
pPolicy = AcquirePolicyModule(
|
|
szCompanyName, // (LPCTSTR) pLicensedProduct->LicensedProduct.pProductInfo->pbCompanyName,
|
|
szProductId, // (LPCTSTR) pLicensedProduct->pbOrgProductID
|
|
FALSE
|
|
);
|
|
|
|
if(pPolicy == NULL)
|
|
{
|
|
//
|
|
// Must have a policy module, default policy module always there
|
|
//
|
|
status = TLS_E_INTERNAL;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Convert request to PMLICENSEREQUEST
|
|
//
|
|
TlsLicenseRequestToPMLicenseRequest(
|
|
LICENSETYPE_LICENSE,
|
|
pRequest,
|
|
pLicensedProduct->szLicensedClient,
|
|
pLicensedProduct->szLicensedUser,
|
|
*pdwSupportFlags,
|
|
&pmLicenseRequest
|
|
);
|
|
|
|
//
|
|
// generate PMUPGRADEREQUEST and pass it to Policy Module
|
|
//
|
|
memset(&pmRequestUpgrade, 0, sizeof(pmRequestUpgrade));
|
|
|
|
ppmLicensedProduct = (PPMLICENSEDPRODUCT)AllocateMemory(sizeof(PMLICENSEDPRODUCT)*dwNumLicensedProduct);
|
|
if(ppmLicensedProduct == NULL)
|
|
{
|
|
status = TLS_E_ALLOCATE_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
for(index=0; index < dwNumLicensedProduct; index++)
|
|
{
|
|
ppmLicensedProduct[index].pbData =
|
|
pLicensedProduct[index].pbPolicyData;
|
|
|
|
ppmLicensedProduct[index].cbData =
|
|
pLicensedProduct[index].cbPolicyData;
|
|
|
|
ppmLicensedProduct[index].bTemporary =
|
|
((pLicensedProduct[index].pLicensedVersion->dwFlags & LICENSED_VERSION_TEMPORARY) != 0);
|
|
|
|
// treat license issued from beta server as temporary
|
|
if(ppmLicensedProduct[index].bTemporary == FALSE && TLSIsBetaNTServer() == FALSE)
|
|
{
|
|
if(IS_LICENSE_ISSUER_RTM(pLicensedProduct[index].pLicensedVersion->dwFlags) == FALSE)
|
|
{
|
|
ppmLicensedProduct[index].bTemporary = TRUE;
|
|
}
|
|
}
|
|
|
|
ppmLicensedProduct[index].ucMarked = 0;
|
|
|
|
if (0 == index)
|
|
{
|
|
// for first license, check markings on license
|
|
status = TLSCheckLicenseMarkRequest(
|
|
TRUE, // forward request if necessary
|
|
pLicensedProduct,
|
|
cbOldLicense,
|
|
pbOldLicense,
|
|
&(ppmLicensedProduct[index].ucMarked)
|
|
);
|
|
}
|
|
|
|
ppmLicensedProduct[index].LicensedProduct.dwProductVersion =
|
|
pLicensedProduct[index].LicensedProduct.pProductInfo->dwVersion;
|
|
|
|
ppmLicensedProduct[index].LicensedProduct.pszProductId =
|
|
(LPTSTR)(pLicensedProduct[index].LicensedProduct.pProductInfo->pbProductID);
|
|
|
|
ppmLicensedProduct[index].LicensedProduct.pszCompanyName =
|
|
(LPTSTR)(pLicensedProduct[index].LicensedProduct.pProductInfo->pbCompanyName);
|
|
|
|
ppmLicensedProduct[index].LicensedProduct.dwLanguageId =
|
|
pLicensedProduct[index].LicensedProduct.dwLanguageID;
|
|
|
|
ppmLicensedProduct[index].LicensedProduct.dwPlatformId =
|
|
pLicensedProduct[index].LicensedProduct.dwPlatformID;
|
|
|
|
ppmLicensedProduct[index].LicensedProduct.pszMachineName =
|
|
pLicensedProduct[index].szLicensedClient;
|
|
|
|
ppmLicensedProduct[index].LicensedProduct.pszUserName =
|
|
pLicensedProduct[index].szLicensedUser;
|
|
}
|
|
|
|
pmRequestUpgrade.pbOldLicense = pbOldLicense;
|
|
pmRequestUpgrade.cbOldLicense = cbOldLicense;
|
|
pmRequestUpgrade.pUpgradeRequest = &pmLicenseRequest;
|
|
|
|
pmRequestUpgrade.dwNumProduct = dwNumLicensedProduct;
|
|
pmRequestUpgrade.pProduct = ppmLicensedProduct;
|
|
|
|
status = pPolicy->PMLicenseUpgrade(
|
|
hClient,
|
|
REQUEST_UPGRADE,
|
|
(PVOID)&pmRequestUpgrade,
|
|
(PVOID *) &pmAdjustedRequest
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
if(pmAdjustedRequest != NULL)
|
|
{
|
|
if(_tcsicmp(
|
|
pmLicenseRequest.pszCompanyName,
|
|
pmAdjustedRequest->pszCompanyName
|
|
) != 0)
|
|
{
|
|
//
|
|
// Try to steal license from other company???
|
|
//
|
|
TLSLogEvent(
|
|
EVENTLOG_ERROR_TYPE,
|
|
TLS_E_POLICYERROR,
|
|
status = TLS_E_POLICYMODULEERROR,
|
|
pPolicy->GetCompanyName(),
|
|
pPolicy->GetProductId()
|
|
);
|
|
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pmAdjustedRequest = &pmLicenseRequest;
|
|
}
|
|
|
|
for(index =0; index < dwNumLicensedProduct; index++)
|
|
{
|
|
DWORD tExpireDate;
|
|
|
|
FileTimeToLicenseDate(&(pLicensedProduct[index].NotAfter),
|
|
&tExpireDate);
|
|
|
|
if( CompareTLSVersions(pmAdjustedRequest->dwProductVersion, pLicensedProduct[index].LicensedProduct.pProductInfo->dwVersion) <= 0 &&
|
|
!(pLicensedProduct[index].pLicensedVersion->dwFlags & LICENSED_VERSION_TEMPORARY) &&
|
|
_tcscmp(pmAdjustedRequest->pszProductId, (LPTSTR)(pLicensedProduct[index].LicensedProduct.pProductInfo->pbProductID)) == 0 &&
|
|
tExpireDate-g_dwReissueLeaseLeeway >= ((DWORD)time(NULL)) )
|
|
{
|
|
if( TLSIsBetaNTServer() == TRUE ||
|
|
IS_LICENSE_ISSUER_RTM(pLicensedProduct[index].pLicensedVersion->dwFlags) == TRUE )
|
|
{
|
|
//
|
|
// Blob already contain perm. license that is >= version
|
|
// requested.
|
|
//
|
|
*ppbNewLicense = (PBYTE)midl_user_allocate(cbOldLicense);
|
|
if(*ppbNewLicense != NULL)
|
|
{
|
|
memcpy(*ppbNewLicense, pbOldLicense, cbOldLicense);
|
|
*pcbNewLicense = cbOldLicense;
|
|
status = ERROR_SUCCESS;
|
|
}
|
|
else
|
|
{
|
|
status = TLS_E_ALLOCATE_MEMORY;
|
|
}
|
|
|
|
goto cleanup;
|
|
}
|
|
}
|
|
}
|
|
|
|
memset(&LsLicenseRequest, 0, sizeof(TLSDBLICENSEREQUEST));
|
|
|
|
status = TLSFormDBRequest(
|
|
pRequest->pbEncryptedHwid,
|
|
pRequest->cbEncryptedHwid,
|
|
pmAdjustedRequest->dwProductVersion,
|
|
pmAdjustedRequest->pszCompanyName,
|
|
pmAdjustedRequest->pszProductId,
|
|
pmAdjustedRequest->dwLanguageId,
|
|
pmAdjustedRequest->dwPlatformId,
|
|
pmAdjustedRequest->pszMachineName,
|
|
pmAdjustedRequest->pszUserName,
|
|
&LsLicenseRequest
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
LsLicenseRequest.pPolicy = pPolicy;
|
|
LsLicenseRequest.hClient = hClient;
|
|
LsLicenseRequest.pPolicyLicenseRequest = pmAdjustedRequest;
|
|
LsLicenseRequest.pClientLicenseRequest = &pmLicenseRequest;
|
|
|
|
memset(&keypack, 0, sizeof(keypack));
|
|
|
|
try {
|
|
|
|
status = TLSVerifyChallengeDataGetWantedLicenseLevel(
|
|
ChallengeContext,
|
|
cbChallengeResponse,
|
|
pbChallenge,
|
|
&LsLicenseRequest.wLicenseDetail
|
|
);
|
|
|
|
if( status == ERROR_SUCCESS )
|
|
{
|
|
|
|
//
|
|
// if client challenge context handle is 0xFFFFFFFF,
|
|
// cbChallenge = 0 and pbChallenge is NULL.
|
|
// client is old version, don't verify challenge
|
|
//
|
|
Forward.m_pRequest = pRequest;
|
|
Forward.m_ChallengeContext = ChallengeContext;
|
|
Forward.m_cbChallengeResponse = cbChallengeResponse;
|
|
Forward.m_pbChallengeResponse = pbChallenge;
|
|
Forward.m_cbOldLicense = cbOldLicense;
|
|
Forward.m_pbOldLicense = pbOldLicense;
|
|
|
|
status = TLSUpgradeLicenseRequest(
|
|
bForwardRequest,
|
|
&Forward,
|
|
pdwSupportFlags,
|
|
&LsLicenseRequest,
|
|
pbOldLicense,
|
|
cbOldLicense,
|
|
dwNumLicensedProduct,
|
|
pLicensedProduct,
|
|
pmAdjustedRequest->fTemporary,
|
|
pcbNewLicense,
|
|
ppbNewLicense
|
|
);
|
|
}
|
|
|
|
} // end try
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...)
|
|
{
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
cleanup:
|
|
|
|
FreeMemory(ppmLicensedProduct);
|
|
|
|
for(index =0; index < dwNumLicensedProduct; index++)
|
|
{
|
|
LSFreeLicensedProduct(pLicensedProduct+index);
|
|
}
|
|
|
|
FreeMemory(pLicensedProduct);
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_UPGRADELICENSE;
|
|
#endif
|
|
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
if(pPolicy)
|
|
{
|
|
pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_COMPLETE,
|
|
UlongToPtr (status),
|
|
NULL
|
|
);
|
|
|
|
ReleasePolicyModule(pPolicy);
|
|
}
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcCheckLicenseMark(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ const DWORD cbLicense,
|
|
/* [in, size_is(cbLicense)] */ PBYTE pbLicense,
|
|
/* [out] */ UCHAR *pucMarkFlags,
|
|
/* [in, out, ref] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Check markings on the passed in license
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
cbLicense - size of license to be checked
|
|
pbLicense - license to be checked
|
|
pucMarkFlags - markings on license
|
|
|
|
Return via pdwErrCode:
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_INVALID_DATA Invalid parameter.
|
|
LSERVER_E_INVALID_LICENSE License passed in is bad
|
|
LSERVER_E_DATANOTFOUND license not found in database
|
|
LSERVER_E_CORRUPT_DATABASE Corrupt database
|
|
LSERVER_E_INTERNAL_ERROR Internal error in license server
|
|
|
|
Note:
|
|
This function forwards the request to the issuing license server. If
|
|
the issuer isn't available, or doesn't have the license in the database,
|
|
it searches in the local database for a license with the same HWID.
|
|
|
|
++*/
|
|
{
|
|
DWORD status = ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD dwNumLicensedProduct = 0;
|
|
PLICENSEDPRODUCT pLicensedProduct=NULL;
|
|
DWORD index;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcCheckLicenseMark\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_LSERVER))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if (NULL == pucMarkFlags)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Convert blob to licensed product structure
|
|
//
|
|
status=LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
NULL // find size to allocate
|
|
);
|
|
|
|
if(status != LICENSE_STATUS_OK || dwNumLicensedProduct == 0)
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
pLicensedProduct = (PLICENSEDPRODUCT)AllocateMemory(
|
|
dwNumLicensedProduct * sizeof(LICENSEDPRODUCT)
|
|
);
|
|
|
|
if(pLicensedProduct == NULL)
|
|
{
|
|
status = TLS_E_ALLOCATE_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
status=LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
pLicensedProduct
|
|
);
|
|
|
|
if(status != LICENSE_STATUS_OK)
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
try {
|
|
|
|
status = TLSCheckLicenseMarkRequest(
|
|
FALSE, // don't forward the request
|
|
pLicensedProduct,
|
|
cbLicense,
|
|
pbLicense,
|
|
pucMarkFlags
|
|
);
|
|
} // end try
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...)
|
|
{
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
|
|
cleanup:
|
|
|
|
for(index =0; index < dwNumLicensedProduct; index++)
|
|
{
|
|
LSFreeLicensedProduct(pLicensedProduct+index);
|
|
}
|
|
|
|
FreeMemory(pLicensedProduct);
|
|
|
|
lpContext->m_LastError=status;
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcMarkLicense(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ UCHAR ucMarkFlags,
|
|
/* [in] */ const DWORD cbLicense,
|
|
/* [in, size_is(cbLicense)] */ PBYTE pbLicense,
|
|
/* [in, out, ref] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Set markings on the passed in license
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
ucMarkFlags - markings on license
|
|
cbLicense - size of license to be checked
|
|
pbLicense - license to be checked
|
|
|
|
Return via pdwErrCode:
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_INVALID_DATA Invalid parameter.
|
|
LSERVER_E_INVALID_LICENSE License passed in is bad
|
|
LSERVER_E_DATANOTFOUND license not found in database
|
|
LSERVER_E_CORRUPT_DATABASE Corrupt database
|
|
LSERVER_E_INTERNAL_ERROR Internal error in license server
|
|
|
|
Note:
|
|
This function forwards the request to the issuing license server. The
|
|
issuer modifies the database entry of the license to set the markings.
|
|
|
|
++*/
|
|
{
|
|
DWORD status = ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
BOOL bForwardRequest = TRUE;
|
|
DWORD dwNumLicensedProduct = 0;
|
|
PLICENSEDPRODUCT pLicensedProduct=NULL;
|
|
DWORD index;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcMarkLicense\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_REQUEST))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext->m_ClientFlags == CLIENT_ACCESS_LSERVER)
|
|
{
|
|
//
|
|
// do not forward any request or infinite loop might
|
|
// occur.
|
|
//
|
|
bForwardRequest = FALSE;
|
|
}
|
|
|
|
//
|
|
// Convert blob to licensed product structure
|
|
//
|
|
status=LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
NULL // find size to allocate
|
|
);
|
|
|
|
if(status != LICENSE_STATUS_OK || dwNumLicensedProduct == 0)
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
pLicensedProduct = (PLICENSEDPRODUCT)AllocateMemory(
|
|
dwNumLicensedProduct * sizeof(LICENSEDPRODUCT)
|
|
);
|
|
|
|
if(pLicensedProduct == NULL)
|
|
{
|
|
status = TLS_E_ALLOCATE_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
status=LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
pLicensedProduct
|
|
);
|
|
|
|
if(status != LICENSE_STATUS_OK)
|
|
{
|
|
status = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
try {
|
|
|
|
status = TLSMarkLicenseRequest(
|
|
bForwardRequest,
|
|
ucMarkFlags,
|
|
pLicensedProduct,
|
|
cbLicense,
|
|
pbLicense
|
|
);
|
|
} // end try
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...)
|
|
{
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
|
|
cleanup:
|
|
|
|
for(index =0; index < dwNumLicensedProduct; index++)
|
|
{
|
|
LSFreeLicensedProduct(pLicensedProduct+index);
|
|
}
|
|
|
|
FreeMemory(pLicensedProduct);
|
|
|
|
lpContext->m_LastError=status;
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcAllocateConcurrentLicense(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [string][in] */ LPTSTR szHydraServer,
|
|
/* [in] */ TLSLICENSEREQUEST __RPC_FAR *pRequest,
|
|
/* [ref][out][in] */ LONG __RPC_FAR *pdwQuantity,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Allocate concurrent licenses base on product.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
szHydraServer - name of hydra server requesting concurrent licenses
|
|
pRequest - product to request for concurrent license.
|
|
dwQuantity - See note
|
|
|
|
Return via dwErrCode:
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_INVALID_DATA Invalid parameter.
|
|
LSERVER_E_NO_PRODUCT request product not installed
|
|
LSERVER_E_NO_LICNESE no available license for request product
|
|
LSERVER_E_LICENSE_REVOKED Request license has been revoked
|
|
LSERVER_E_LICENSE_EXPIRED Request license has expired
|
|
LSERVER_E_CORRUPT_DATABASE Corrupt database
|
|
LSERVER_E_INTERNAL_ERROR Internal error in license server
|
|
|
|
Note:
|
|
dwQuantity
|
|
Input Output
|
|
------------------------- -----------------------------------------
|
|
0 Total number of concurrent license
|
|
issued to hydra server.
|
|
> 0, number of license Actual number of license allocated
|
|
requested
|
|
< 0, number of license Actual number of license returned, always
|
|
to return positive value.
|
|
|
|
++*/
|
|
{
|
|
#if 1
|
|
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
|
|
#else
|
|
|
|
PMHANDLE hClient;
|
|
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
PTLSDbWorkSpace pDbWorkSpace;
|
|
|
|
TLSDBLICENSEREQUEST LsLicenseRequest;
|
|
TCHAR szUnknown[LSERVER_MAX_STRING_SIZE+1];
|
|
TCHAR szClientMachineName[LSERVER_MAX_STRING_SIZE];
|
|
TCHAR szClientUserName[LSERVER_MAX_STRING_SIZE];
|
|
TCHAR szCompanyName[LSERVER_MAX_STRING_SIZE+1];
|
|
TCHAR szProductId[LSERVER_MAX_STRING_SIZE+1];
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
CTLSPolicy* pPolicy = NULL;
|
|
BOOL bAllocateLicense = TRUE;
|
|
|
|
PMLICENSEREQUEST PMLicenseRequest;
|
|
PPMLICENSEREQUEST pAdjustedRequest;
|
|
|
|
#ifdef DBG
|
|
DWORD dwStartTime=GetTickCount();
|
|
#endif
|
|
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcAllocateConcurrentLicense\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(*pdwQuantity > 1)
|
|
{
|
|
TLSASSERT(*pdwQuantity > 1);
|
|
}
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_REQUEST))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
memset(szCompanyName, 0, sizeof(szCompanyName));
|
|
memset(szProductId, 0, sizeof(szProductId));
|
|
|
|
memcpy(
|
|
szCompanyName,
|
|
pRequest->ProductInfo.pbCompanyName,
|
|
min(pRequest->ProductInfo.cbCompanyName, sizeof(szCompanyName)-sizeof(TCHAR))
|
|
);
|
|
|
|
memcpy(
|
|
szProductId,
|
|
pRequest->ProductInfo.pbProductID,
|
|
min(pRequest->ProductInfo.cbProductID, sizeof(szProductId)-sizeof(TCHAR))
|
|
);
|
|
|
|
//
|
|
// Acquire policy module, a default policy module will
|
|
// be returned.
|
|
//
|
|
pPolicy = AcquirePolicyModule(
|
|
szCompanyName, //(LPCTSTR)pRequest->ProductInfo.pbCompanyName,
|
|
szProductId, //(LPCTSTR)pRequest->ProductInfo.pbProductID
|
|
TRUE
|
|
);
|
|
|
|
if(pPolicy == NULL)
|
|
{
|
|
status = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
hClient = GenerateClientId();
|
|
|
|
//
|
|
// return error if string is too big.
|
|
//
|
|
LoadResourceString(
|
|
IDS_UNKNOWN_STRING,
|
|
szUnknown,
|
|
sizeof(szUnknown)/sizeof(szUnknown[0])
|
|
);
|
|
|
|
_tcsncpy(
|
|
szClientMachineName,
|
|
(szHydraServer) ? szHydraServer : szUnknown,
|
|
LSERVER_MAX_STRING_SIZE
|
|
);
|
|
|
|
_tcsncpy(
|
|
szClientUserName,
|
|
(szHydraServer) ? szHydraServer : szUnknown,
|
|
LSERVER_MAX_STRING_SIZE
|
|
);
|
|
|
|
//
|
|
// Convert request to PMLICENSEREQUEST
|
|
//
|
|
TlsLicenseRequestToPMLicenseRequest(
|
|
LICENSETYPE_LICENSE,
|
|
pRequest,
|
|
szClientMachineName,
|
|
szClientUserName,
|
|
0,
|
|
&PMLicenseRequest
|
|
);
|
|
|
|
//
|
|
// Inform Policy module start of new license request
|
|
//
|
|
status = pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_NEW,
|
|
(PVOID) &PMLicenseRequest,
|
|
(PVOID *) &pAdjustedRequest
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
if(pAdjustedRequest != NULL)
|
|
{
|
|
if(_tcsicmp(PMLicenseRequest.pszCompanyName,pAdjustedRequest->pszCompanyName) != 0)
|
|
{
|
|
// try to steal license from other company???
|
|
TLSLogEvent(
|
|
EVENTLOG_ERROR_TYPE,
|
|
TLS_E_POLICYERROR,
|
|
status = TLS_E_POLICYMODULEERROR,
|
|
pPolicy->GetCompanyName(),
|
|
pPolicy->GetProductId()
|
|
);
|
|
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pAdjustedRequest = &PMLicenseRequest;
|
|
}
|
|
|
|
|
|
//
|
|
// form DB request structure
|
|
//
|
|
status = TLSFormDBRequest(
|
|
pRequest->pbEncryptedHwid,
|
|
pRequest->cbEncryptedHwid,
|
|
pAdjustedRequest->dwProductVersion,
|
|
pAdjustedRequest->pszCompanyName,
|
|
pAdjustedRequest->pszProductId,
|
|
pAdjustedRequest->dwLanguageId,
|
|
pAdjustedRequest->dwPlatformId,
|
|
pAdjustedRequest->pszMachineName,
|
|
pAdjustedRequest->pszUserName,
|
|
&LsLicenseRequest
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
LsLicenseRequest.pPolicy = pPolicy;
|
|
LsLicenseRequest.hClient = hClient;
|
|
LsLicenseRequest.pPolicyLicenseRequest = pAdjustedRequest;
|
|
LsLicenseRequest.pClientLicenseRequest = &PMLicenseRequest;
|
|
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
bAllocateLicense = (*pdwQuantity) > 0;
|
|
|
|
CLEANUPSTMT;
|
|
|
|
BEGIN_TRANSACTION(pDbWorkSpace);
|
|
|
|
try {
|
|
status = TLSDBAllocateConcurrentLicense(
|
|
USEHANDLE(pDbWorkSpace),
|
|
szHydraServer,
|
|
&LsLicenseRequest,
|
|
pdwQuantity
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
SetLastError(status = TLS_E_INTERNAL);
|
|
}
|
|
|
|
if(TLS_ERROR(status))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWorkSpace);
|
|
|
|
|
|
cleanup:
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_ALLOCATECONCURRENT;
|
|
#endif
|
|
|
|
#ifdef DBG
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_DETAILSIMPLE,
|
|
_TEXT("\t%s : TLSRpcRequestNewLicense() takes %dms\n"),
|
|
lpContext->m_Client,
|
|
GetTickCount() - dwStartTime
|
|
);
|
|
#endif
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
if(pPolicy)
|
|
{
|
|
pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_COMPLETE,
|
|
(PVOID) status,
|
|
NULL
|
|
);
|
|
|
|
ReleasePolicyModule(pPolicy);
|
|
}
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
return RPC_S_OK;
|
|
|
|
#endif
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetLastError(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out][in] */ PDWORD cbBufferSize,
|
|
/* [size_is][string][out][in] */ LPTSTR szBuffer,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Return error description text for client's last LSXXX call
|
|
|
|
Arguments:
|
|
|
|
IN phContext - Client context
|
|
IN cbBufferSize - max. size of szBuffer
|
|
IN OUT szBuffer - Pointer to a buffer to receive the
|
|
null-terminated character string containing
|
|
error description
|
|
|
|
Returns via dwErrCode:
|
|
LSERVER_S_SUCCESS
|
|
|
|
TLS_E_INTERNAL No error or can't find corresponding error
|
|
description.
|
|
|
|
Error code from WideCharToMultiByte().
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPTSTR lpMsgBuf=NULL;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetLastError\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
try {
|
|
DWORD dwRet;
|
|
dwRet=FormatMessage(
|
|
FORMAT_MESSAGE_FROM_HMODULE | FORMAT_MESSAGE_FROM_SYSTEM |
|
|
FORMAT_MESSAGE_IGNORE_INSERTS | FORMAT_MESSAGE_ALLOCATE_BUFFER,
|
|
NULL,
|
|
lpContext->m_LastError,
|
|
MAKELANGID(LANG_NEUTRAL, SUBLANG_DEFAULT),
|
|
(LPTSTR) &lpMsgBuf,
|
|
0,
|
|
NULL
|
|
);
|
|
if(dwRet == 0)
|
|
{
|
|
status = GetLastError();
|
|
}
|
|
else
|
|
{
|
|
_tcsncpy(
|
|
szBuffer,
|
|
(LPTSTR)lpMsgBuf,
|
|
min(_tcslen((LPTSTR)lpMsgBuf), *cbBufferSize-1)
|
|
);
|
|
szBuffer[min(_tcslen((LPTSTR)lpMsgBuf), *cbBufferSize-1)] = _TEXT('\0');
|
|
*cbBufferSize = _tcslen(szBuffer) + 1;
|
|
}
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(lpMsgBuf)
|
|
LocalFree(lpMsgBuf);
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GET_LASTERROR;
|
|
#endif
|
|
|
|
lpContext->m_LastError=status;
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcKeyPackEnumBegin(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwSearchParm,
|
|
/* [in] */ BOOL bMatchAll,
|
|
/* [ref][in] */ LPLSKeyPackSearchParm lpSearchParm,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Function to begin enumerate through all key pack installed on server
|
|
based on search criterial.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle.
|
|
dwSearchParm - search criterial.
|
|
bMatchAll - match all search criterial.
|
|
lpSearchParm - search parameter.
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_SERVER_BUSY Server is too busy to process request
|
|
LSERVER_E_OUTOFMEMORY
|
|
TLS_E_INTERNAL
|
|
LSERVER_E_INTERNAL_ERROR
|
|
LSERVER_E_INVALID_DATA Invalid data in search parameter
|
|
LSERVER_E_INVALID_SEQUENCE Invalid calling sequence, likely, previous
|
|
enumeration has not ended.
|
|
++*/
|
|
{
|
|
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcKeyPackEnumBegin\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
//
|
|
// This will use cached db connection, in-consistency may occurred,
|
|
// visibility of changes in one connection may not appear right away
|
|
// on another connection handle, this is expected behavoir for Jet and
|
|
// so are we, user can always re-fresh.
|
|
//
|
|
do {
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_EMPTY_TYPE)
|
|
{
|
|
SetLastError(status=TLS_E_INVALID_SEQUENCE);
|
|
break;
|
|
}
|
|
|
|
try {
|
|
|
|
LPENUMHANDLE hEnum;
|
|
|
|
hEnum = TLSDBLicenseKeyPackEnumBegin(
|
|
bMatchAll,
|
|
dwSearchParm,
|
|
lpSearchParm
|
|
);
|
|
if(hEnum)
|
|
{
|
|
lpContext->m_ContextType = CONTEXTHANDLE_KEYPACK_ENUM_TYPE;
|
|
lpContext->m_ContextHandle = (PVOID)hEnum;
|
|
}
|
|
else
|
|
{
|
|
status = GetLastError();
|
|
}
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
} while(FALSE);
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_KEYPACKENUMBEGIN;
|
|
#endif
|
|
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcKeyPackEnumNext(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out] */ LPLSKeyPack lpKeyPack,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Return next key pack that match search criterial
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
lpKeyPack - key pack that match search criterial
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_I_NO_MORE_DATA No more keypack match search criterial
|
|
TLS_E_INTERNAL General error in license server
|
|
LSERVER_E_INTERNAL_ERROR Internal error in license server
|
|
LSERVER_E_SERVER_BUSY License server is too busy to process request
|
|
LSERVER_E_OUTOFMEMORY Can't process request due to insufficient memory
|
|
LSERVER_E_INVALID_SEQUENCE Invalid calling sequence, must call
|
|
LSKeyPackEnumBegin().
|
|
|
|
++*/
|
|
{
|
|
DWORD status = ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
BOOL bShowAll = FALSE;
|
|
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcKeyPackEnumNext\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(lpContext->m_ClientFlags == CLIENT_ACCESS_LSERVER)
|
|
{
|
|
bShowAll = TRUE;
|
|
}
|
|
|
|
// this one might cause access violation
|
|
memset(lpKeyPack, 0, sizeof(LSKeyPack));
|
|
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_KEYPACK_ENUM_TYPE)
|
|
{
|
|
SetLastError(status=TLS_E_INVALID_SEQUENCE);
|
|
}
|
|
else
|
|
{
|
|
do {
|
|
try {
|
|
LPENUMHANDLE hEnum=(LPENUMHANDLE)lpContext->m_ContextHandle;
|
|
status=TLSDBLicenseKeyPackEnumNext(
|
|
hEnum,
|
|
lpKeyPack,
|
|
bShowAll
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
} while(status == TLS_I_MORE_DATA);
|
|
}
|
|
|
|
lpContext->m_LastError=GetLastError();
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_KEYPACKENUMNEXT;
|
|
#endif
|
|
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcKeyPackEnumEnd(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcKeyPackEnumEnd\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
try {
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_KEYPACK_ENUM_TYPE)
|
|
{
|
|
SetLastError(status=ERROR_INVALID_HANDLE);
|
|
}
|
|
else
|
|
{
|
|
LPENUMHANDLE hEnum=(LPENUMHANDLE)lpContext->m_ContextHandle;
|
|
|
|
TLSDBLicenseKeyPackEnumEnd(hEnum);
|
|
lpContext->m_ContextType = CONTEXTHANDLE_EMPTY_TYPE;
|
|
lpContext->m_ContextHandle=NULL;
|
|
}
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
lpContext->m_LastError=GetLastError();
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_KEYPACKENUMEND;
|
|
#endif
|
|
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcKeyPackAdd(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out][in] */ LPLSKeyPack lpKeypack,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Add a license key pack.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle.
|
|
lpKeyPack - key pack to be added.
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_INTERNAL_ERROR
|
|
TLS_E_INTERNAL
|
|
LSERVER_E_SERVER_BUSY
|
|
LSERVER_E_DUPLICATE Product already installed.
|
|
LSERVER_E_INVALID_DATA
|
|
LSERVER_E_CORRUPT_DATABASE
|
|
|
|
Note:
|
|
|
|
Application must call LSKeyPackSetStatus() to activate keypack
|
|
|
|
++*/
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace=NULL;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcKeyPackAdd\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
}
|
|
else
|
|
{
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
else
|
|
{
|
|
CLEANUPSTMT;
|
|
|
|
BEGIN_TRANSACTION(pDbWkSpace);
|
|
|
|
try {
|
|
if(lpKeypack->ucKeyPackStatus == LSKEYPACKSTATUS_ADD_LICENSE ||
|
|
lpKeypack->ucKeyPackStatus == LSKEYPACKSTATUS_REMOVE_LICENSE)
|
|
{
|
|
status = TLSDBLicenseKeyPackUpdateLicenses(
|
|
USEHANDLE(pDbWkSpace),
|
|
lpKeypack->ucKeyPackStatus == LSKEYPACKSTATUS_ADD_LICENSE,
|
|
lpKeypack
|
|
);
|
|
}
|
|
else
|
|
{
|
|
status = TLSDBLicenseKeyPackAdd(
|
|
USEHANDLE(pDbWkSpace),
|
|
lpKeypack
|
|
);
|
|
}
|
|
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
if( _tcsicmp( lpKeypack->szCompanyName, PRODUCT_INFO_COMPANY_NAME ) == 0 )
|
|
{
|
|
//
|
|
// check with known termsrv product ID.
|
|
//
|
|
if( _tcsnicmp( lpKeypack->szProductId,
|
|
TERMSERV_PRODUCTID_SKU,
|
|
_tcslen(TERMSERV_PRODUCTID_SKU)) == 0 )
|
|
{
|
|
TLSResetLogLowLicenseWarning(
|
|
lpKeypack->szCompanyName,
|
|
TERMSERV_PRODUCTID_SKU,
|
|
MAKELONG(lpKeypack->wMinorVersion, lpKeypack->wMajorVersion),
|
|
FALSE
|
|
);
|
|
}
|
|
else if(_tcsnicmp( lpKeypack->szProductId,
|
|
TERMSERV_PRODUCTID_INTERNET_SKU,
|
|
_tcslen(TERMSERV_PRODUCTID_INTERNET_SKU)) == 0 )
|
|
{
|
|
TLSResetLogLowLicenseWarning(
|
|
lpKeypack->szCompanyName,
|
|
TERMSERV_PRODUCTID_INTERNET_SKU,
|
|
MAKELONG(lpKeypack->wMinorVersion, lpKeypack->wMajorVersion),
|
|
FALSE
|
|
);
|
|
}
|
|
else
|
|
{
|
|
TLSResetLogLowLicenseWarning(
|
|
lpKeypack->szCompanyName,
|
|
lpKeypack->szProductId,
|
|
MAKELONG(lpKeypack->wMinorVersion, lpKeypack->wMajorVersion),
|
|
FALSE
|
|
);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
TLSResetLogLowLicenseWarning(
|
|
lpKeypack->szCompanyName,
|
|
lpKeypack->szProductId,
|
|
MAKELONG(lpKeypack->wMinorVersion, lpKeypack->wMajorVersion),
|
|
FALSE
|
|
);
|
|
}
|
|
}
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(TLS_ERROR(status))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWkSpace);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Post a sync work object
|
|
//
|
|
if( status == ERROR_SUCCESS )
|
|
{
|
|
if( lpKeypack->ucKeyPackType != LSKEYPACKTYPE_FREE )
|
|
{
|
|
if(TLSAnnounceLKPToAllRemoteServer(
|
|
lpKeypack->dwKeyPackId,
|
|
0
|
|
) != ERROR_SUCCESS)
|
|
{
|
|
TLSLogWarningEvent(TLS_W_ANNOUNCELKP_FAILED);
|
|
}
|
|
}
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_KEYPACKADD;
|
|
#endif
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcKeyPackSetStatus(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwSetParm,
|
|
/* [ref][in] */ LPLSKeyPack lpKeyPack,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Routine to activate/deactivated a key pack.
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
dwSetParam - type of key pack status to be set.
|
|
lpKeyPack - new key pack status.
|
|
|
|
Return Value:
|
|
|
|
LSERVER_S_SUCCESS
|
|
LSERVER_E_INTERNAL_ERROR
|
|
TLS_E_INTERNAL
|
|
LSERVER_E_INVALID_DATA
|
|
LSERVER_E_SERVER_BUSY
|
|
LSERVER_E_DATANOTFOUND Key pack is not in server
|
|
LSERVER_E_CORRUPT_DATABASE
|
|
|
|
++*/
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace=NULL;
|
|
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcKeyPackSetStatus\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
}
|
|
else if( (dwSetParm & ~(LSKEYPACK_SET_KEYPACKSTATUS | LSKEYPACK_SET_ACTIVATEDATE | LSKEYPACK_SET_EXPIREDATE)) &&
|
|
!(lpContext->m_ClientFlags & CLIENT_ACCESS_LRWIZ) )
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
else
|
|
{
|
|
CLEANUPSTMT;
|
|
|
|
BEGIN_TRANSACTION(pDbWkSpace);
|
|
|
|
try {
|
|
status=TLSDBLicenseKeyPackSetStatus(
|
|
USEHANDLE(pDbWkSpace),
|
|
dwSetParm,
|
|
lpKeyPack
|
|
);
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(TLS_ERROR(status))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWkSpace);
|
|
}
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_KEYPACKSETSTATUS;
|
|
#endif
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcLicenseEnumBegin(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwSearchParm,
|
|
/* [in] */ BOOL bMatchAll,
|
|
/* [ref][in] */ LPLSLicenseSearchParm lpSearchParm,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Description:
|
|
|
|
Begin enumeration of license issued based on search criterial
|
|
|
|
Arguments:
|
|
|
|
phContext - client context handle
|
|
dwSearchParm - license search criterial.
|
|
bMatchAll - match all search criterial
|
|
lpSearchParm - license(s) to be enumerated.
|
|
|
|
Return Value:
|
|
|
|
Same as LSKeyPackEnumBegin().
|
|
|
|
++*/
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace = NULL;
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcLicenseEnumBegin\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
//
|
|
// This will use cached db connection, in-consistency may occurred,
|
|
// visibility of changes in one connection may not appear right away
|
|
// on another connection handle, this is expected behavoir for Jet and
|
|
// so are we, user can always re-fresh.
|
|
//
|
|
|
|
do {
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_EMPTY_TYPE)
|
|
{
|
|
SetLastError(status=TLS_E_INVALID_SEQUENCE);
|
|
break;
|
|
}
|
|
|
|
pDbWkSpace = AllocateWorkSpace(g_EnumDbTimeout);
|
|
|
|
// allocate ODBC connections
|
|
if(pDbWkSpace == NULL)
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
break;
|
|
}
|
|
|
|
try {
|
|
LICENSEDCLIENT license;
|
|
|
|
ConvertLSLicenseToLicense(lpSearchParm, &license);
|
|
status = TLSDBLicenseEnumBegin(
|
|
pDbWkSpace,
|
|
bMatchAll,
|
|
dwSearchParm & LICENSE_TABLE_EXTERN_SEARCH_MASK,
|
|
&license
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
lpContext->m_ContextType = CONTEXTHANDLE_LICENSE_ENUM_TYPE;
|
|
lpContext->m_ContextHandle = (PVOID)pDbWkSpace;
|
|
}
|
|
} while(FALSE);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
if(pDbWkSpace)
|
|
{
|
|
ReleaseWorkSpace(&pDbWkSpace);
|
|
}
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_LICENSEENUMBEGIN;
|
|
#endif
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
lpContext->m_LastError=status;
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcLicenseEnumNext(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out] */ LPLSLicense lpLicense,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Fetch next record match enumeration criterial.
|
|
|
|
Parameters:
|
|
|
|
phContext : Client context handle.
|
|
lpLicense : return next record that match enumeration criterial.
|
|
dwErrCode : error code.
|
|
|
|
Returns:
|
|
|
|
Function returns RPC status, dwErrCode return error code.
|
|
|
|
Note:
|
|
|
|
Must have call TLSRpcLicenseEnumBegin().
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcLicenseEnumNext\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_LICENSE_ENUM_TYPE)
|
|
{
|
|
SetLastError(status=TLS_E_INVALID_SEQUENCE);
|
|
}
|
|
else
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace=(PTLSDbWorkSpace)lpContext->m_ContextHandle;
|
|
try {
|
|
LICENSEDCLIENT license;
|
|
|
|
memset(lpLicense, 0, sizeof(LSLicense));
|
|
|
|
status=TLSDBLicenseEnumNext(
|
|
pDbWkSpace,
|
|
&license
|
|
);
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
ConvertLicenseToLSLicense(&license, lpLicense);
|
|
}
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_LICENSEENUMNEXT;
|
|
#endif
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcLicenseEnumNextEx(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out] */ LPLSLicenseEx lpLicense,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Fetch next record match enumeration criterial.
|
|
|
|
Parameters:
|
|
|
|
phContext : Client context handle.
|
|
lpLicense : return next record that match enumeration criterial.
|
|
dwErrCode : error code.
|
|
|
|
Returns:
|
|
|
|
Function returns RPC status, dwErrCode return error code.
|
|
|
|
Note:
|
|
|
|
Must have call TLSRpcLicenseEnumBegin().
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcLicenseEnumNextEx\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_LICENSE_ENUM_TYPE)
|
|
{
|
|
SetLastError(status=TLS_E_INVALID_SEQUENCE);
|
|
}
|
|
else
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace=(PTLSDbWorkSpace)lpContext->m_ContextHandle;
|
|
try {
|
|
LICENSEDCLIENT license;
|
|
|
|
memset(lpLicense, 0, sizeof(LSLicenseEx));
|
|
|
|
status=TLSDBLicenseEnumNext(
|
|
pDbWkSpace,
|
|
&license
|
|
);
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
ConvertLicenseToLSLicenseEx(&license, lpLicense);
|
|
}
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_LICENSEENUMNEXT;
|
|
#endif
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcLicenseEnumEnd(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Terminate a enumeration.
|
|
|
|
Parameters:
|
|
|
|
phContext :
|
|
dwErrCode :
|
|
|
|
Returns:
|
|
|
|
|
|
Note
|
|
|
|
++*/
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcLicenseEnumEnd\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
try {
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_LICENSE_ENUM_TYPE)
|
|
{
|
|
SetLastError(status=ERROR_INVALID_HANDLE);
|
|
}
|
|
else
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace = (PTLSDbWorkSpace)lpContext->m_ContextHandle;
|
|
|
|
TLSDBLicenseEnumEnd(pDbWkSpace);
|
|
ReleaseWorkSpace(&pDbWkSpace);
|
|
lpContext->m_ContextType = CONTEXTHANDLE_EMPTY_TYPE;
|
|
}
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_LICENSEENUMEND;
|
|
#endif
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcLicenseSetStatus(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwSetParam,
|
|
/* [in] */ LPLSLicense lpLicense,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace=NULL;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcLicenseSetStatus\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
}
|
|
else if(dwSetParam != LSLICENSE_EXSEARCH_LICENSESTATUS)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
else
|
|
{
|
|
CLEANUPSTMT;
|
|
|
|
BEGIN_TRANSACTION(pDbWkSpace);
|
|
|
|
try {
|
|
LICENSEDCLIENT license;
|
|
|
|
ConvertLSLicenseToLicense(lpLicense, &license);
|
|
status=TLSDBLicenseSetValue(
|
|
USEHANDLE(pDbWkSpace),
|
|
dwSetParam,
|
|
&license,
|
|
FALSE
|
|
);
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(TLS_ERROR(status))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWkSpace);
|
|
}
|
|
}
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_LICENSESETSTATUS;
|
|
#endif
|
|
|
|
lpContext->m_LastError = status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetAvailableLicenses(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwSearchParm,
|
|
/* [ref][in] */ LPLSKeyPack lplsKeyPack,
|
|
/* [ref][out] */ LPDWORD lpdwAvail,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
PTLSDbWorkSpace pDbWkSpace=NULL;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetAvailableLicenses\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
//
|
|
// Don't use global cached DB connection handle, it is possible
|
|
// to get in-consistent value using other DB handle, however, it is
|
|
// also possible that during the time that this function return and
|
|
// the time that client actually make the call to allocate license,
|
|
// all available licenses were allocated by other client.
|
|
//
|
|
pDbWkSpace = AllocateWorkSpace(g_GeneralDbTimeout);
|
|
if(pDbWkSpace == NULL)
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
else
|
|
{
|
|
try {
|
|
LICENSEPACK keypack;
|
|
|
|
memset(&keypack, 0, sizeof(keypack));
|
|
|
|
ConvertLsKeyPackToKeyPack(
|
|
lplsKeyPack,
|
|
&keypack,
|
|
NULL
|
|
);
|
|
|
|
status = TLSDBKeyPackGetAvailableLicenses(
|
|
pDbWkSpace,
|
|
dwSearchParm,
|
|
&keypack,
|
|
lpdwAvail
|
|
);
|
|
|
|
//FreeTlsLicensePack(&keypack);
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
ReleaseWorkSpace(&pDbWkSpace);
|
|
}
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetRevokeKeyPackList(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [out][in] */ PDWORD pcbNumberOfRange,
|
|
/* [size_is][out] */ LPLSRange __RPC_FAR *ppRevokeRange,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetRevokeLicenseList(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [out][in] */ PDWORD pcbNumberOfRange,
|
|
/* [size_is][out] */ LPLSRange __RPC_FAR *ppRevokeRange,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcReturnKeyPack(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwKeyPackId,
|
|
/* [in] */ DWORD dwReturnReason,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcReturnLicense(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwKeyPackId,
|
|
/* [in] */ DWORD dwLicenseId,
|
|
/* [in] */ DWORD dwReturnReason,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcInstallCertificate(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwCertType,
|
|
/* [in] */ DWORD dwCertLevel,
|
|
/* [in] */ DWORD cbSignCert,
|
|
/* [size_is][in] */ PBYTE pbSignCert,
|
|
/* [in] */ DWORD cbExchCert,
|
|
/* [size_is][in] */ PBYTE pbExchCert,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcInstallCertificate\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DWORD cbLsSignCert=0;
|
|
PBYTE pbLsSignCert=NULL;
|
|
|
|
DWORD cbLsExchCert=0;
|
|
PBYTE pbLsExchCert=NULL;
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(pbSignCert == NULL || pbExchCert == NULL)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
|
|
}
|
|
|
|
#if DBG
|
|
//
|
|
// Verify input data
|
|
//
|
|
status = TLSVerifyCertChainInMomory(
|
|
g_hCryptProv,
|
|
pbSignCert,
|
|
cbSignCert
|
|
);
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
}
|
|
|
|
//
|
|
// Verify input data
|
|
//
|
|
status = TLSVerifyCertChainInMomory(
|
|
g_hCryptProv,
|
|
pbExchCert,
|
|
cbExchCert
|
|
);
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
}
|
|
#endif
|
|
|
|
//
|
|
// Block RPC call to serialize install certificate
|
|
//
|
|
if(AcquireRPCExclusiveLock(INFINITE) == FALSE)
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(AcquireAdministrativeLock(INFINITE) == TRUE)
|
|
{
|
|
try {
|
|
if(dwCertLevel == 0)
|
|
{
|
|
status = TLSSaveRootCertificatesToStore(
|
|
g_hCryptProv,
|
|
cbSignCert,
|
|
pbSignCert,
|
|
cbExchCert,
|
|
pbExchCert
|
|
);
|
|
}
|
|
else
|
|
{
|
|
status = TLSSaveCertificatesToStore(
|
|
g_hCryptProv,
|
|
dwCertType,
|
|
dwCertLevel,
|
|
cbSignCert,
|
|
pbSignCert,
|
|
cbExchCert,
|
|
pbExchCert
|
|
);
|
|
|
|
if(status == ERROR_SUCCESS && dwCertType == CERTIFICATE_CA_TYPE)
|
|
{
|
|
if(cbSignCert)
|
|
{
|
|
status = IsCertificateLicenseServerCertificate(
|
|
g_hCryptProv,
|
|
AT_SIGNATURE,
|
|
cbSignCert,
|
|
pbSignCert,
|
|
&cbLsSignCert,
|
|
&pbLsSignCert
|
|
);
|
|
}
|
|
|
|
if(status == ERROR_SUCCESS && cbExchCert)
|
|
{
|
|
status = IsCertificateLicenseServerCertificate(
|
|
g_hCryptProv,
|
|
AT_KEYEXCHANGE,
|
|
cbExchCert,
|
|
pbExchCert,
|
|
&cbLsExchCert,
|
|
&pbLsExchCert
|
|
);
|
|
|
|
}
|
|
|
|
//
|
|
// Install what we have here.
|
|
//
|
|
if(status == ERROR_SUCCESS && (cbLsExchCert || pbLsExchCert))
|
|
{
|
|
status = TLSInstallLsCertificate(
|
|
cbLsSignCert,
|
|
pbLsSignCert,
|
|
cbLsExchCert,
|
|
pbLsExchCert
|
|
);
|
|
}
|
|
|
|
#ifdef ENFORCE_LICENSING
|
|
|
|
// enforce version, check what's installed and restore backup if necessary
|
|
// non-enforce, just install, we won't use it anyway.
|
|
if(status == ERROR_SUCCESS && (cbLsExchCert || pbLsExchCert))
|
|
{
|
|
// reload certificate
|
|
if(TLSLoadVerifyLicenseServerCertificates() != ERROR_SUCCESS)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
|
|
// delete the primary certificate registry key
|
|
TLSRegDeleteKey(
|
|
HKEY_LOCAL_MACHINE,
|
|
LSERVER_SERVER_CERTIFICATE_REGKEY
|
|
);
|
|
|
|
//
|
|
// reload certificate, if anything goes wrong, we will goes
|
|
// back to unregister mode.
|
|
//
|
|
if(TLSLoadServerCertificate() == FALSE)
|
|
{
|
|
// critical error occurred
|
|
TLSLogErrorEvent(TLS_E_LOAD_CERTIFICATE);
|
|
|
|
// initiate self-shutdown
|
|
GenerateConsoleCtrlEvent(CTRL_C_EVENT, 0);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DWORD dwStatus;
|
|
|
|
// make sure our backup is up to date.
|
|
dwStatus = TLSRestoreLicenseServerCertificate(
|
|
LSERVER_SERVER_CERTIFICATE_REGKEY,
|
|
LSERVER_SERVER_CERTIFICATE_REGKEY_BACKUP1
|
|
);
|
|
if(dwStatus != ERROR_SUCCESS)
|
|
{
|
|
TLSLogWarningEvent(TLS_W_BACKUPCERTIFICATE);
|
|
|
|
TLSRegDeleteKey(
|
|
HKEY_LOCAL_MACHINE,
|
|
LSERVER_SERVER_CERTIFICATE_REGKEY_BACKUP1
|
|
);
|
|
}
|
|
|
|
dwStatus = TLSRestoreLicenseServerCertificate(
|
|
LSERVER_SERVER_CERTIFICATE_REGKEY,
|
|
LSERVER_SERVER_CERTIFICATE_REGKEY_BACKUP2
|
|
);
|
|
if(dwStatus != ERROR_SUCCESS)
|
|
{
|
|
TLSLogWarningEvent(TLS_W_BACKUPCERTIFICATE);
|
|
|
|
TLSRegDeleteKey(
|
|
HKEY_LOCAL_MACHINE,
|
|
LSERVER_SERVER_CERTIFICATE_REGKEY_BACKUP2
|
|
);
|
|
}
|
|
}
|
|
}
|
|
#endif
|
|
|
|
if(pbLsSignCert)
|
|
{
|
|
FreeMemory(pbLsSignCert);
|
|
}
|
|
|
|
if(pbLsExchCert)
|
|
{
|
|
FreeMemory(pbLsExchCert);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
ReleaseAdministrativeLock();
|
|
}
|
|
else
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
|
|
ReleaseRPCExclusiveLock();
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=status;
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_INSTALL_SERV_CERT;
|
|
#endif
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcGetServerCertificate(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ BOOL bSignCert,
|
|
/* [size_is][size_is][out] */ LPBYTE __RPC_FAR *ppCertBlob,
|
|
/* [ref][out] */ LPDWORD lpdwCertBlobLen,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetServerCertificate\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
}
|
|
else if(!g_pbExchangeEncodedCert || !g_cbExchangeEncodedCert ||
|
|
!g_pbSignatureEncodedCert || !g_cbSignatureEncodedCert)
|
|
{
|
|
status = TLS_E_NO_CERTIFICATE;
|
|
}
|
|
else
|
|
{
|
|
if(AcquireAdministrativeLock(INFINITE) == TRUE)
|
|
{
|
|
try{
|
|
status = TLSSaveCertAsPKCS7(
|
|
(bSignCert) ? g_pbSignatureEncodedCert : g_pbExchangeEncodedCert,
|
|
(bSignCert) ? g_cbSignatureEncodedCert : g_cbExchangeEncodedCert,
|
|
ppCertBlob,
|
|
lpdwCertBlobLen
|
|
);
|
|
|
|
// hack so that we can continue testing...
|
|
if(g_bHasHydraCert == FALSE)
|
|
{
|
|
if(g_pbServerSPK != NULL && g_cbServerSPK != 0)
|
|
{
|
|
status = TLS_W_SELFSIGN_CERTIFICATE;
|
|
}
|
|
else
|
|
{
|
|
status = TLS_W_TEMP_SELFSIGN_CERT;
|
|
}
|
|
}
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...)
|
|
{
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
ReleaseAdministrativeLock();
|
|
}
|
|
else
|
|
{
|
|
status = TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
}
|
|
|
|
lpContext->m_LastError=status;
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GETSERV_CERT;
|
|
#endif
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//-------------------------------------------------------------------------------
|
|
void
|
|
MyFreeLicenseKeyPack(
|
|
PLicense_KeyPack pLicenseKeyPack
|
|
)
|
|
/*
|
|
*/
|
|
{
|
|
DWORD i;
|
|
|
|
PKeyPack_Description pKpDesc;
|
|
|
|
if( pLicenseKeyPack->pDescription )
|
|
{
|
|
for( i = 0, pKpDesc = pLicenseKeyPack->pDescription;
|
|
i < pLicenseKeyPack->dwDescriptionCount;
|
|
i++, pKpDesc++ )
|
|
{
|
|
if(pKpDesc->pDescription)
|
|
LocalFree( pKpDesc->pDescription );
|
|
|
|
if(pKpDesc->pbProductName)
|
|
LocalFree( pKpDesc->pbProductName );
|
|
}
|
|
}
|
|
|
|
if(pLicenseKeyPack->pDescription)
|
|
LocalFree( pLicenseKeyPack->pDescription );
|
|
|
|
if(pLicenseKeyPack->pbManufacturer && pLicenseKeyPack->cbManufacturer != 0)
|
|
LocalFree( pLicenseKeyPack->pbManufacturer );
|
|
|
|
if(pLicenseKeyPack->pbManufacturerData && pLicenseKeyPack->cbManufacturerData != 0)
|
|
LocalFree( pLicenseKeyPack->pbManufacturerData );
|
|
|
|
if(pLicenseKeyPack->pbProductId && pLicenseKeyPack->cbProductId != 0)
|
|
LocalFree( pLicenseKeyPack->pbProductId );
|
|
return;
|
|
}
|
|
|
|
//---------------------------------------------------------------------
|
|
error_status_t
|
|
TLSRpcRegisterLicenseKeyPack(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [size_is][in] */ LPBYTE pbCHCertBlob,
|
|
/* [in] */ DWORD cbCHCertBlobSize,
|
|
/* [size_is][in] */ LPBYTE pbRootCertBlob,
|
|
/* [in] */ DWORD cbRootCertBlob,
|
|
/* [size_is][in] */ LPBYTE lpKeyPackBlob,
|
|
/* [in] */ DWORD dwKeyPackBlobLen,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
LSKeyPack keypack;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcRegisterLicenseKeyPack\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
PTLSDbWorkSpace pDbWkSpace;
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
else
|
|
{
|
|
License_KeyPack pLicenseKeyPack;
|
|
LicensePackDecodeParm LkpDecodeParm;
|
|
|
|
memset(
|
|
&LkpDecodeParm,
|
|
0,
|
|
sizeof(LicensePackDecodeParm)
|
|
);
|
|
|
|
LkpDecodeParm.hCryptProv = g_hCryptProv;
|
|
LkpDecodeParm.pbDecryptParm = (PBYTE)g_pszServerPid;
|
|
LkpDecodeParm.cbDecryptParm = (lstrlen(g_pszServerPid) * sizeof(TCHAR));
|
|
LkpDecodeParm.cbClearingHouseCert = cbCHCertBlobSize;
|
|
LkpDecodeParm.pbClearingHouseCert = pbCHCertBlob;
|
|
LkpDecodeParm.pbRootCertificate = pbRootCertBlob;
|
|
LkpDecodeParm.cbRootCertificate = cbRootCertBlob;
|
|
|
|
//
|
|
// make code clean, always start a transaction
|
|
//
|
|
CLEANUPSTMT;
|
|
BEGIN_TRANSACTION(pDbWkSpace);
|
|
|
|
try {
|
|
status = DecodeLicenseKeyPackEx(
|
|
&pLicenseKeyPack,
|
|
&LkpDecodeParm,
|
|
dwKeyPackBlobLen,
|
|
lpKeyPackBlob
|
|
);
|
|
|
|
if(status != LICENSE_STATUS_OK)
|
|
{
|
|
status = TLS_E_DECODE_KEYPACKBLOB;
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_DETAILSIMPLE,
|
|
_TEXT("Can't decode key pack blob - %d...\n"),
|
|
status);
|
|
}
|
|
else
|
|
{
|
|
status=TLSDBRegisterLicenseKeyPack(
|
|
USEHANDLE(pDbWkSpace),
|
|
&pLicenseKeyPack,
|
|
&keypack
|
|
);
|
|
|
|
MyFreeLicenseKeyPack(&pLicenseKeyPack);
|
|
}
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(TLS_ERROR(status))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWkSpace);
|
|
}
|
|
|
|
//
|
|
// Post a sync work object
|
|
//
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
if(TLSAnnounceLKPToAllRemoteServer(
|
|
keypack.dwKeyPackId,
|
|
0
|
|
) != ERROR_SUCCESS)
|
|
{
|
|
TLSLogWarningEvent(TLS_W_ANNOUNCELKP_FAILED);
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=status;
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_REGISTER_LICENSE_PACK;
|
|
#endif
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
error_status_t
|
|
TLSRpcRequestTermServCert(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ LPTLSHYDRACERTREQUEST pRequest,
|
|
/* [ref][out][in] */ PDWORD pcbChallengeData,
|
|
/* [size_is][out] */ PBYTE* ppbChallengeData,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Private routine to issue certificate to Terminal Server.
|
|
|
|
Parameter:
|
|
|
|
phContext : Client context handle.
|
|
pRequest : Terminal Server specific certificate request.
|
|
pcbChallengeData : size of Server randomly generated challenge data
|
|
to Terminal Server.
|
|
ppbChallengeData : Server randomly generated challenge data to Terminal
|
|
server.
|
|
|
|
pdwErrCode : Error code.
|
|
|
|
Returns:
|
|
|
|
Function always return RPC_S_OK, actual error code is returned in
|
|
pdwErrCode.
|
|
|
|
Note:
|
|
|
|
Routine does not actually issue a license to Terminal Server, Terminal
|
|
Server must call TLSRpcRetrieveTermServCert() to retrieve its own
|
|
license.
|
|
|
|
--*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPTERMSERVCERTREQHANDLE lpHandle=NULL;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcRequestTermServCert\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
*ppbChallengeData = NULL;
|
|
*pcbChallengeData = 0;
|
|
|
|
// verify client handle
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_EMPTY_TYPE)
|
|
{
|
|
SetLastError(status=TLS_E_INVALID_SEQUENCE);
|
|
goto cleanup;
|
|
}
|
|
|
|
lpHandle = (LPTERMSERVCERTREQHANDLE)AllocateMemory(
|
|
sizeof(TERMSERVCERTREQHANDLE)
|
|
);
|
|
if(lpHandle == NULL)
|
|
{
|
|
SetLastError(status = ERROR_OUTOFMEMORY);
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Generate Challenge Data
|
|
//
|
|
lpHandle->pCertRequest = pRequest;
|
|
status = TLSGenerateChallengeData(
|
|
CLIENT_INFO_HYDRA_SERVER,
|
|
&lpHandle->cbChallengeData,
|
|
&lpHandle->pbChallengeData
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
// return challenge data
|
|
*pcbChallengeData = lpHandle->cbChallengeData;
|
|
*ppbChallengeData = (PBYTE)midl_user_allocate(*pcbChallengeData);
|
|
if(*ppbChallengeData == NULL)
|
|
{
|
|
SetLastError(status = ERROR_OUTOFMEMORY);
|
|
goto cleanup;
|
|
}
|
|
|
|
memcpy( *ppbChallengeData,
|
|
lpHandle->pbChallengeData,
|
|
lpHandle->cbChallengeData);
|
|
|
|
lpContext->m_ContextHandle = (HANDLE)lpHandle;
|
|
lpContext->m_ContextType = CONTEXTHANDLE_HYDRA_REQUESTCERT_TYPE;
|
|
|
|
cleanup:
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
// frees up memory.
|
|
// Can't overwrite context type.
|
|
//lpContext->m_ContextType = CONTEXTHANDLE_EMPTY_TYPE;
|
|
|
|
if(lpHandle != NULL)
|
|
{
|
|
FreeMemory(lpHandle->pbChallengeData);
|
|
FreeMemory(lpHandle);
|
|
}
|
|
|
|
if(*ppbChallengeData != NULL)
|
|
{
|
|
midl_user_free(*ppbChallengeData);
|
|
}
|
|
|
|
if(pRequest != NULL)
|
|
{
|
|
midl_user_free(pRequest);
|
|
}
|
|
|
|
*ppbChallengeData = NULL;
|
|
*pcbChallengeData = 0;
|
|
}
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
lpContext->m_LastError=status;
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_REQUEST_TERMSRV_CERT;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
error_status_t
|
|
TLSRpcRetrieveTermServCert(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD cbResponseData,
|
|
/* [size_is][in] */ PBYTE pbResponseData,
|
|
/* [ref][out][in] */ PDWORD pcbCert,
|
|
/* [size_is][out] */ PBYTE* ppbCert,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Private routine to retrieve Terminal Server's license.
|
|
|
|
Parameters:
|
|
|
|
phContext : client context handle.
|
|
cbResponseData : size of Terminal Server responses data to
|
|
license server's challenge.
|
|
pbResponseData : Terminal Server responses data to license
|
|
server's challenge.
|
|
pcbCert : Size of Terminal Server's license in bytes.
|
|
ppbCert : Terminal Server's license.
|
|
pdwErrCode : error code if fail.
|
|
|
|
Returns:
|
|
|
|
Function returns RPC_S_OK, actual error code returns in
|
|
pdwErrCode.
|
|
|
|
Note:
|
|
|
|
Must have call TLSRpcRequestTermServCert().
|
|
|
|
|
|
--*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPTERMSERVCERTREQHANDLE lpHandle=NULL;
|
|
CTLSPolicy* pPolicy=NULL;
|
|
PMHANDLE hClient;
|
|
|
|
PBYTE pbPkcs7=NULL;
|
|
DWORD cbPkcs7=0;
|
|
TLSDBLICENSEREQUEST LicenseRequest;
|
|
DWORD dwQuantity = 1;
|
|
TLSPRODUCTINFO ProductInfo;
|
|
|
|
TCHAR szCompanyName[LSERVER_MAX_STRING_SIZE];
|
|
TCHAR szMachineName[MAXCOMPUTERNAMELENGTH];
|
|
TCHAR szUserName[MAXUSERNAMELENGTH];
|
|
|
|
PTLSDbWorkSpace pDbWkSpace;
|
|
|
|
PMLICENSEREQUEST PMLicenseRequest;
|
|
PPMLICENSEREQUEST pAdjustedRequest;
|
|
|
|
TLSDBLICENSEDPRODUCT LicensedProduct;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcRetrieveTermServCert\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
|
|
// verify client handle
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_HYDRA_REQUESTCERT_TYPE)
|
|
{
|
|
SetLastError(status = TLS_E_INVALID_SEQUENCE);
|
|
goto cleanup;
|
|
}
|
|
|
|
lpHandle = (LPTERMSERVCERTREQHANDLE)lpContext->m_ContextHandle;
|
|
if( lpHandle == NULL || lpHandle->pCertRequest == NULL ||
|
|
lpHandle->pCertRequest->pbEncryptedHwid == NULL ||
|
|
lpHandle->pCertRequest->cbEncryptedHwid == 0 )
|
|
{
|
|
SetLastError(status = TLS_E_INVALID_SEQUENCE);
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
//
|
|
// Verify challenge response data
|
|
//
|
|
|
|
|
|
//
|
|
// Request a license from specific key pack
|
|
//
|
|
|
|
memset(&LicenseRequest, 0, sizeof(TLSDBLICENSEREQUEST));
|
|
|
|
if(!LoadResourceString(
|
|
IDS_HS_COMPANYNAME,
|
|
szCompanyName,
|
|
sizeof(szCompanyName) / sizeof(szCompanyName[0])))
|
|
{
|
|
SetLastError(status = TLS_E_INTERNAL);
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext->m_Client == NULL)
|
|
{
|
|
if(!LoadResourceString(
|
|
IDS_HS_MACHINENAME,
|
|
LicenseRequest.szMachineName,
|
|
sizeof(LicenseRequest.szMachineName)/sizeof(LicenseRequest.szMachineName[0])))
|
|
{
|
|
SetLastError(status = TLS_E_INTERNAL);
|
|
goto cleanup;
|
|
}
|
|
|
|
if(!LoadResourceString(
|
|
IDS_HS_USERNAME,
|
|
LicenseRequest.szUserName,
|
|
sizeof(LicenseRequest.szUserName)/sizeof(LicenseRequest.szUserName[0])))
|
|
{
|
|
SetLastError(status = TLS_E_INTERNAL);
|
|
goto cleanup;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
SAFESTRCPY(LicenseRequest.szMachineName, lpContext->m_Client);
|
|
SAFESTRCPY(LicenseRequest.szUserName, lpContext->m_Client);
|
|
}
|
|
|
|
LicenseRequest.dwProductVersion = HYDRACERT_PRODUCT_VERSION;
|
|
LicenseRequest.pszProductId = HYDRAPRODUCT_HS_CERTIFICATE_SKU;
|
|
LicenseRequest.pszCompanyName = szCompanyName;
|
|
|
|
LicenseRequest.dwLanguageID = GetSystemDefaultLangID(); // ignore
|
|
LicenseRequest.dwPlatformID = CLIENT_PLATFORMID_WINDOWS_NT_FREE; // WINDOWS
|
|
LicenseRequest.pbEncryptedHwid = lpHandle->pCertRequest->pbEncryptedHwid;
|
|
LicenseRequest.cbEncryptedHwid = lpHandle->pCertRequest->cbEncryptedHwid;
|
|
|
|
status=LicenseDecryptHwid(
|
|
&LicenseRequest.hWid,
|
|
LicenseRequest.cbEncryptedHwid,
|
|
LicenseRequest.pbEncryptedHwid,
|
|
g_cbSecretKey,
|
|
g_pbSecretKey
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
status = ERROR_INVALID_PARAMETER;
|
|
goto cleanup;
|
|
}
|
|
|
|
LicenseRequest.pClientPublicKey = (PCERT_PUBLIC_KEY_INFO)lpHandle->pCertRequest->pSubjectPublicKeyInfo;
|
|
LicenseRequest.clientCertRdn.type = LSCERT_RDN_STRING_TYPE;
|
|
LicenseRequest.clientCertRdn.szRdn = lpHandle->pCertRequest->szSubjectRdn;
|
|
LicenseRequest.dwNumExtensions = lpHandle->pCertRequest->dwNumCertExtension;
|
|
LicenseRequest.pExtensions = (PCERT_EXTENSION)lpHandle->pCertRequest->pCertExtensions;
|
|
|
|
hClient = GenerateClientId();
|
|
pPolicy = AcquirePolicyModule(NULL, NULL, FALSE);
|
|
if(pPolicy == NULL)
|
|
{
|
|
SetLastError(status = TLS_E_INTERNAL);
|
|
goto cleanup;
|
|
}
|
|
|
|
PMLicenseRequest.dwProductVersion = LicenseRequest.dwProductVersion;
|
|
PMLicenseRequest.pszProductId = LicenseRequest.pszProductId;
|
|
PMLicenseRequest.pszCompanyName = LicenseRequest.pszCompanyName;
|
|
PMLicenseRequest.dwLanguageId = LicenseRequest.dwLanguageID;
|
|
PMLicenseRequest.dwPlatformId = LicenseRequest.dwPlatformID;
|
|
PMLicenseRequest.pszMachineName = LicenseRequest.szMachineName;
|
|
PMLicenseRequest.pszUserName = LicenseRequest.szUserName;
|
|
PMLicenseRequest.dwLicenseType = LICENSETYPE_LICENSE;
|
|
|
|
//
|
|
// Inform Policy module start of new license request
|
|
//
|
|
status = pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_NEW,
|
|
(PVOID) &PMLicenseRequest,
|
|
(PVOID *) &pAdjustedRequest
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
LicenseRequest.pPolicy = pPolicy;
|
|
LicenseRequest.hClient = hClient;
|
|
|
|
LicenseRequest.pPolicyLicenseRequest = pAdjustedRequest;
|
|
LicenseRequest.pClientLicenseRequest = &PMLicenseRequest;
|
|
|
|
|
|
// Call issue new license from sepcific keypack
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
status = TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
CLEANUPSTMT;
|
|
BEGIN_TRANSACTION(pDbWkSpace);
|
|
|
|
try {
|
|
status = TLSDBIssuePermanentLicense(
|
|
USEHANDLE(pDbWkSpace),
|
|
&LicenseRequest,
|
|
FALSE, // bLatestVersion
|
|
FALSE, // bAcceptFewerLicenses
|
|
&dwQuantity,
|
|
&LicensedProduct,
|
|
0
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(TLS_ERROR(status))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWkSpace);
|
|
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
LicensedProduct.pSubjectPublicKeyInfo = (PCERT_PUBLIC_KEY_INFO)lpHandle->pCertRequest->pSubjectPublicKeyInfo;
|
|
|
|
//
|
|
// Generate client certificate
|
|
//
|
|
status = TLSGenerateClientCertificate(
|
|
g_hCryptProv,
|
|
1,
|
|
&LicensedProduct,
|
|
LICENSE_DETAIL_DETAIL,
|
|
&pbPkcs7,
|
|
&cbPkcs7
|
|
);
|
|
|
|
if(TLS_ERROR(status) == TRUE)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
status = TLSChainProprietyCertificate(
|
|
g_hCryptProv,
|
|
(CanIssuePermLicense() == FALSE),
|
|
pbPkcs7,
|
|
cbPkcs7,
|
|
ppbCert,
|
|
pcbCert
|
|
);
|
|
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
if(CanIssuePermLicense() == FALSE)
|
|
{
|
|
status = TLS_W_SELFSIGN_CERTIFICATE;
|
|
}
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
|
|
FreeMemory(pbPkcs7);
|
|
|
|
if(pPolicy)
|
|
{
|
|
ReleasePolicyModule(pPolicy);
|
|
}
|
|
|
|
|
|
//
|
|
// Free up Hydra Certificate Request handle,
|
|
// all_nodes attribute so single free.
|
|
//
|
|
if(lpHandle)
|
|
{
|
|
if(lpHandle->pCertRequest)
|
|
{
|
|
midl_user_free(lpHandle->pCertRequest);
|
|
}
|
|
|
|
if(lpHandle->pbChallengeData)
|
|
{
|
|
midl_user_free(lpHandle->pbChallengeData);
|
|
}
|
|
|
|
FreeMemory(lpHandle);
|
|
}
|
|
|
|
if(lpContext->m_ContextType == CONTEXTHANDLE_HYDRA_REQUESTCERT_TYPE)
|
|
{
|
|
//
|
|
// force calling TLSRpcRequestTermServCert() again
|
|
//
|
|
lpContext->m_ContextType = CONTEXTHANDLE_EMPTY_TYPE;
|
|
lpContext->m_ContextHandle = NULL;
|
|
}
|
|
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
lpContext->m_LastError=status;
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_RETRIEVE_TERMSRV_CERT;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
error_status_t
|
|
TLSRpcAuditLicenseKeyPack(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwKeyPackId,
|
|
/* [in] */ FILETIME ftStartTime,
|
|
/* [in] */ FILETIME ftEndTime,
|
|
/* [in] */ BOOL bResetCounter,
|
|
/* [ref][out][in] */ LPTLSKeyPackAudit lplsAudit,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Not implemented yet!.
|
|
|
|
--*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcGetLSPKCS10CertRequest(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwCertType,
|
|
/* [ref][out][in] */ PDWORD pcbData,
|
|
/* [size_is][size_is][out] */ PBYTE __RPC_FAR *ppbData,
|
|
/* [ref][out][in] */ PDWORD dwErrCode
|
|
)
|
|
/*
|
|
|
|
Abstract:
|
|
|
|
|
|
Note:
|
|
|
|
Only return our key at this time, not a PKCS10 request
|
|
|
|
*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetLSPKCS10CertRequest\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(AcquireAdministrativeLock(INFINITE) == TRUE)
|
|
{
|
|
status = RetrieveKey(
|
|
(dwCertType == TLSCERT_TYPE_EXCHANGE) ?
|
|
LSERVER_LSA_PRIVATEKEY_EXCHANGE :
|
|
LSERVER_LSA_PRIVATEKEY_SIGNATURE,
|
|
ppbData,
|
|
pcbData
|
|
);
|
|
|
|
ReleaseAdministrativeLock();
|
|
}
|
|
else
|
|
{
|
|
status = TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
|
|
cleanup:
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GETPKCS10CERT_REQUEST;
|
|
#endif
|
|
|
|
*dwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
//////////////////////////////////////////////////////////////////////////////
|
|
//
|
|
// Replication function
|
|
//
|
|
////////////////////////////////////////////////////////////////////////////
|
|
error_status_t
|
|
TLSRpcBeginReplication(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [string][in] */ LPTSTR pszLsSetupId,
|
|
/* [string][in] */ LPTSTR pszLsServerName,
|
|
/* [in] */ DWORD cbDomainSid,
|
|
/* [size_is][in] */ PBYTE pbDomainSid,
|
|
/* [ref][out][in] */ FILETIME __RPC_FAR *pftLastBackupTime,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcEndReplication(
|
|
/* [in] */ PCONTEXT_HANDLE phContext
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcReplicateRecord(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][in] */ PTLSReplRecord pReplRecord,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcTableEnumBegin(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwSearchParam,
|
|
/* [ref][in] */ PTLSReplRecord pRecord,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcTableEnumNext(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [ref][out][in] */ PTLSReplRecord pRecord,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcTableEnumEnd(
|
|
/* [in] */ PCONTEXT_HANDLE phContext
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcInstallPolicyModule(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [string][in] */ LPTSTR pszCompanyName,
|
|
/* [string][in] */ LPTSTR pszProductId,
|
|
/* [string][in] */ LPTSTR pszPolicyDllName,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
++*/
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(TLS_E_NOTSUPPORTED);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcAnnounceServer(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwAnnounceType,
|
|
/* [in] */ FILETIME __RPC_FAR *pLastStartupTime,
|
|
/* [string][in] */ LPTSTR pszSetupId,
|
|
/* [string][in] */ LPTSTR pszDomainName,
|
|
/* [string][in] */ LPTSTR pszLserverName,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Private routine for other license server to announce presence of
|
|
itself.
|
|
|
|
Parameters:
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
|
Note:
|
|
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status = ERROR_SUCCESS;
|
|
BOOL bSuccess = TRUE;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcAnnounceServer\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
__try {
|
|
//
|
|
// Verify it is a license server
|
|
//
|
|
if(lpContext->m_ClientFlags != CLIENT_ACCESS_LSERVER)
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
}
|
|
|
|
if( status == ERROR_SUCCESS &&
|
|
(dwAnnounceType == TLSANNOUNCE_TYPE_STARTUP || dwAnnounceType == TLSANNOUNCE_TYPE_RESPONSE) )
|
|
{
|
|
status = TLSRegisterServerWithName(
|
|
pszSetupId,
|
|
pszDomainName,
|
|
pszLserverName
|
|
);
|
|
if(status == TLS_E_DUPLICATE_RECORD)
|
|
{
|
|
status = ERROR_SUCCESS;
|
|
}
|
|
}
|
|
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
if(dwAnnounceType == TLSANNOUNCE_TYPE_STARTUP)
|
|
{
|
|
//
|
|
// Prevent loop back, use job to response announce
|
|
//
|
|
status = TLSStartAnnounceResponseJob(
|
|
pszSetupId,
|
|
pszDomainName,
|
|
pszLserverName,
|
|
&g_ftLastShutdownTime
|
|
);
|
|
}
|
|
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
// Create a CSSync workobject to sync. local LKP
|
|
status = TLSPushSyncLocalLkpToServer(
|
|
pszSetupId,
|
|
pszDomainName,
|
|
pszLserverName,
|
|
pLastStartupTime
|
|
);
|
|
}
|
|
else
|
|
{
|
|
// reset error code, can't connect back to server -
|
|
// server might be available anymore.
|
|
status = ERROR_SUCCESS;
|
|
}
|
|
}
|
|
}
|
|
__except(EXCEPTION_EXECUTE_HANDLER)
|
|
{
|
|
status = GetExceptionCode();
|
|
}
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_ANNOUNCE_SERVER;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcLookupServer(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [string][in] */ LPTSTR pszLookupSetupId,
|
|
/* [size_is][string][out][in] */ LPTSTR pszLsSetupId,
|
|
/* [out][in] */ PDWORD pcbSetupId,
|
|
/* [size_is][string][out][in] */ LPTSTR pszDomainName,
|
|
/* [ref][out][in] */ PDWORD pcbDomainName,
|
|
/* [size_is][string][out][in] */ LPTSTR pszMachineName,
|
|
/* [ref][out][in] */ PDWORD pcbMachineName,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Look up a license server via a license server's setupId.
|
|
|
|
|
|
Parameters:
|
|
|
|
|
|
Returns:
|
|
|
|
|
|
Note:
|
|
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcLookupServer\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
TLServerInfo ServerInfo;
|
|
DWORD dwStatus = ERROR_SUCCESS;
|
|
|
|
__try {
|
|
|
|
if(_tcsicmp(pszLookupSetupId, g_pszServerPid) == 0)
|
|
{
|
|
_tcsncpy(
|
|
pszLsSetupId,
|
|
g_pszServerPid,
|
|
min(_tcslen(g_pszServerPid), *pcbSetupId)
|
|
);
|
|
|
|
if(*pcbSetupId <= _tcslen(g_pszServerPid))
|
|
{
|
|
dwStatus = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
pszLsSetupId[min(_tcslen(g_pszServerPid), *pcbSetupId - 1)] = _TEXT('\0');
|
|
}
|
|
*pcbSetupId = _tcslen(g_pszServerPid) + 1;
|
|
|
|
//--------------------------------------------------------------
|
|
_tcsncpy(
|
|
pszDomainName,
|
|
g_szScope,
|
|
min(_tcslen(g_szScope), *pcbDomainName)
|
|
);
|
|
|
|
if(*pcbDomainName <= _tcslen(g_szScope))
|
|
{
|
|
dwStatus = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
pszDomainName[min(_tcslen(g_szScope), *pcbDomainName - 1)] = _TEXT('\0');
|
|
}
|
|
*pcbDomainName = _tcslen(g_szScope) + 1;
|
|
|
|
//--------------------------------------------------------------
|
|
_tcsncpy(
|
|
pszMachineName,
|
|
g_szComputerName,
|
|
min(_tcslen(g_szComputerName), *pcbMachineName)
|
|
);
|
|
|
|
if(*pcbMachineName <= _tcslen(g_szComputerName))
|
|
{
|
|
dwStatus = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
pszMachineName[min(_tcslen(g_szComputerName), *pcbMachineName - 1)] = _TEXT('\0');
|
|
}
|
|
*pcbMachineName = _tcslen(g_szComputerName) + 1;
|
|
|
|
}
|
|
else
|
|
{
|
|
dwStatus = TLSLookupRegisteredServer(
|
|
pszLookupSetupId,
|
|
NULL,
|
|
pszMachineName,
|
|
&ServerInfo
|
|
);
|
|
if(dwStatus == ERROR_SUCCESS)
|
|
{
|
|
_tcsncpy(
|
|
pszLsSetupId,
|
|
ServerInfo.GetServerId(),
|
|
min(_tcslen(ServerInfo.GetServerId()), *pcbSetupId)
|
|
);
|
|
|
|
if(*pcbSetupId <= _tcslen(ServerInfo.GetServerId()))
|
|
{
|
|
dwStatus = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
pszLsSetupId[min(_tcslen(ServerInfo.GetServerId()), *pcbSetupId - 1)] = _TEXT('\0');
|
|
}
|
|
|
|
*pcbSetupId = _tcslen(ServerInfo.GetServerId()) + 1;
|
|
|
|
//--------------------------------------------------------------
|
|
_tcsncpy(
|
|
pszDomainName,
|
|
ServerInfo.GetServerDomain(),
|
|
min(_tcslen(ServerInfo.GetServerDomain()), *pcbDomainName)
|
|
);
|
|
if(*pcbDomainName <= _tcslen(ServerInfo.GetServerDomain()))
|
|
{
|
|
dwStatus = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
pszDomainName[min(_tcslen(ServerInfo.GetServerDomain()), *pcbDomainName - 1)] = _TEXT('\0');
|
|
}
|
|
*pcbDomainName = _tcslen(ServerInfo.GetServerDomain()) + 1;
|
|
|
|
//--------------------------------------------------------------
|
|
_tcsncpy(
|
|
pszMachineName,
|
|
ServerInfo.GetServerName(),
|
|
min(_tcslen(ServerInfo.GetServerName()), *pcbMachineName)
|
|
);
|
|
|
|
if(*pcbMachineName <= _tcslen(ServerInfo.GetServerName()))
|
|
{
|
|
dwStatus = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
pszMachineName[min(_tcslen(ServerInfo.GetServerName()), *pcbMachineName - 1)] = _TEXT('\0');
|
|
}
|
|
*pcbMachineName = _tcslen(ServerInfo.GetServerName()) + 1;
|
|
}
|
|
}
|
|
}
|
|
__except(EXCEPTION_EXECUTE_HANDLER)
|
|
{
|
|
dwStatus = GetExceptionCode();
|
|
}
|
|
|
|
lpContext->m_LastError=dwStatus;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_SERVERLOOKUP;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(dwStatus);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcAnnounceLicensePack(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ PTLSReplRecord pReplRecord,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Private routine for one license server to announce it has particular
|
|
License Pack.
|
|
|
|
Parameters:
|
|
|
|
|
|
|
|
Returns:
|
|
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD dwStatus=ERROR_SUCCESS;
|
|
PTLSDbWorkSpace pDbWkSpace=NULL;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcAnnounceLicensePack\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(lpContext->m_ClientFlags != CLIENT_ACCESS_LSERVER)
|
|
{
|
|
dwStatus = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(pReplRecord->dwUnionType != UNION_TYPE_LICENSEPACK)
|
|
{
|
|
dwStatus = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
dwStatus = TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
CLEANUPSTMT;
|
|
BEGIN_TRANSACTION(pDbWkSpace);
|
|
|
|
try {
|
|
TLSLICENSEPACK LicPack;
|
|
LicPack = pReplRecord->w.ReplLicPack;
|
|
//
|
|
// TODO - verify input parameters
|
|
//
|
|
dwStatus = TLSDBRemoteKeyPackAdd(
|
|
USEHANDLE(pDbWkSpace),
|
|
&LicPack
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
dwStatus = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
dwStatus = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(TLS_ERROR(dwStatus) && dwStatus != TLS_E_DUPLICATE_RECORD)
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWkSpace);
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=dwStatus;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_ANNOUNCELICENSEPACK;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(dwStatus);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcReturnLicensedProduct(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ PTLSLicenseToBeReturn pClientLicense,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
|
|
++*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD dwStatus=ERROR_SUCCESS;
|
|
CTLSPolicy* pPolicy=NULL;
|
|
PTLSDbWorkSpace pDbWorkSpace;
|
|
PMHANDLE hClient;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcReturnLicensedProduct\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(lpContext->m_ClientFlags != CLIENT_ACCESS_LSERVER)
|
|
{
|
|
dwStatus = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
pPolicy = AcquirePolicyModule(
|
|
pClientLicense->pszCompanyName,
|
|
pClientLicense->pszOrgProductId,
|
|
FALSE
|
|
);
|
|
|
|
if(pPolicy == NULL)
|
|
{
|
|
dwStatus = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
hClient = GenerateClientId();
|
|
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
dwStatus=TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
CLEANUPSTMT;
|
|
BEGIN_TRANSACTION(pDbWorkSpace);
|
|
|
|
try {
|
|
dwStatus = TLSReturnClientLicensedProduct(
|
|
USEHANDLE(pDbWkSpace),
|
|
hClient,
|
|
pPolicy,
|
|
pClientLicense
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
dwStatus = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
SetLastError(dwStatus = TLS_E_INTERNAL);
|
|
}
|
|
|
|
if(TLS_ERROR(dwStatus))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWorkSpace);
|
|
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=dwStatus;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_RETURNLICENSE;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(dwStatus);
|
|
|
|
if(pPolicy)
|
|
{
|
|
pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_COMPLETE,
|
|
UlongToPtr (dwStatus),
|
|
NULL
|
|
);
|
|
|
|
ReleasePolicyModule(pPolicy);
|
|
}
|
|
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcChallengeServer(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwClientType,
|
|
/* [in] */ PTLSCHALLENGEDATA pClientChallenge,
|
|
/* [out][in] */ PTLSCHALLENGERESPONSEDATA* pServerResponse,
|
|
/* [out][in] */ PTLSCHALLENGEDATA* pServerChallenge,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Private routine for client to challenge server in order for client
|
|
confirm server's identity. License Server, in addition to response to
|
|
client's challenge, also generate random challenge data based on
|
|
client's self-declare type back to client.
|
|
|
|
Parameter:
|
|
|
|
phContext : Client's context handle.
|
|
dwClientType : Client self-pronounce type, valid values are ...
|
|
pClientChallenge : Client challenge data.
|
|
pServerResponse : Server's responses to client's challenge.
|
|
pServerChallenge : Server's challenge to client.
|
|
pdwErrCode : Error code if failed.
|
|
|
|
Returns:
|
|
|
|
|
|
Notes:
|
|
|
|
Private routine for LrWiz and License Server to identify itself.
|
|
|
|
--*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
PTLSCHALLENGEDATA pChallenge=NULL;
|
|
PTLSCHALLENGERESPONSEDATA pResponse = NULL;
|
|
HCRYPTPROV hProv = NULL;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcChallengeServer\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
//if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
//{
|
|
// status = TLS_E_ACCESS_DENIED;
|
|
// goto cleanup;
|
|
//}
|
|
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_EMPTY_TYPE)
|
|
{
|
|
status = TLS_E_INVALID_SEQUENCE;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Input parameters...
|
|
//
|
|
if( pClientChallenge == NULL ||
|
|
pServerResponse == NULL ||
|
|
pServerChallenge == NULL )
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Verify Data send by client
|
|
//
|
|
if( pClientChallenge->dwVersion != TLS_CURRENT_CHALLENGE_VERSION ||
|
|
pClientChallenge->cbChallengeData == 0 ||
|
|
pClientChallenge->pbChallengeData == NULL )
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
pResponse = (PTLSCHALLENGERESPONSEDATA)midl_user_allocate(sizeof(TLSCHALLENGERESPONSEDATA));
|
|
if(pResponse == NULL)
|
|
{
|
|
status = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
pChallenge = (PTLSCHALLENGEDATA)AllocateMemory(sizeof(TLSCHALLENGEDATA));
|
|
if(pChallenge == NULL)
|
|
{
|
|
status = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
*pServerChallenge = (PTLSCHALLENGEDATA)midl_user_allocate(sizeof(TLSCHALLENGEDATA));
|
|
if(*pServerChallenge == NULL)
|
|
{
|
|
status = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Generate Challenge response data
|
|
//
|
|
status = TLSGenerateChallengeResponseData(
|
|
g_hCryptProv,
|
|
dwClientType,
|
|
pClientChallenge,
|
|
&(pResponse->pbResponseData),
|
|
&(pResponse->cbResponseData)
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Generate Server side challenge data
|
|
//
|
|
pChallenge->dwVersion = TLS_CURRENT_CHALLENGE_VERSION;
|
|
|
|
if (CryptAcquireContext(&hProv,NULL,NULL,PROV_RSA_FULL,CRYPT_VERIFYCONTEXT)) {
|
|
if (!CryptGenRandom(hProv,sizeof(pChallenge->dwRandom), (BYTE *) &pChallenge->dwRandom)) {
|
|
status = TLS_E_INTERNAL;
|
|
goto cleanup;
|
|
}
|
|
} else {
|
|
status = TLS_E_INTERNAL;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// This must range from 1 to 128, as it's used as an offset into the
|
|
// challenge data buffer
|
|
//
|
|
|
|
pChallenge->dwRandom %= RANDOM_CHALLENGE_DATASIZE;
|
|
pChallenge->dwRandom++;
|
|
|
|
status = TLSGenerateRandomChallengeData(
|
|
g_hCryptProv,
|
|
&(pChallenge->pbChallengeData),
|
|
&(pChallenge->cbChallengeData)
|
|
);
|
|
|
|
// base on type, mark this handle...
|
|
if(dwClientType == CLIENT_TYPE_LRWIZ)
|
|
{
|
|
lpContext->m_ContextType = CONTEXTHANDLE_CHALLENGE_LRWIZ_TYPE;
|
|
}
|
|
else
|
|
{
|
|
lpContext->m_ContextType = CONTEXTHANDLE_CHALLENGE_SERVER_TYPE;
|
|
}
|
|
|
|
(*pServerChallenge)->pbChallengeData = (PBYTE)midl_user_allocate(pChallenge->cbChallengeData);
|
|
if((*pServerChallenge)->pbChallengeData == NULL)
|
|
{
|
|
status = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
(*pServerChallenge)->dwVersion = TLS_CURRENT_CHALLENGE_VERSION;
|
|
(*pServerChallenge)->dwRandom = pChallenge->dwRandom;
|
|
(*pServerChallenge)->cbChallengeData = pChallenge->cbChallengeData;
|
|
memcpy(
|
|
(*pServerChallenge)->pbChallengeData,
|
|
pChallenge->pbChallengeData,
|
|
pChallenge->cbChallengeData
|
|
);
|
|
|
|
lpContext->m_ContextHandle = (HANDLE)(pChallenge);
|
|
*pServerResponse = pResponse;
|
|
|
|
cleanup:
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
if(pChallenge)
|
|
{
|
|
if(pChallenge->pbChallengeData)
|
|
{
|
|
FreeMemory(pChallenge->pbChallengeData);
|
|
}
|
|
|
|
if(pChallenge->pbReservedData)
|
|
{
|
|
FreeMemory(pChallenge->pbReservedData);
|
|
}
|
|
|
|
FreeMemory(pChallenge);
|
|
}
|
|
|
|
if(pResponse)
|
|
{
|
|
if(pResponse->pbResponseData)
|
|
{
|
|
FreeMemory(pResponse->pbResponseData);
|
|
}
|
|
|
|
if(pResponse->pbReservedData)
|
|
{
|
|
FreeMemory(pResponse->pbReservedData);
|
|
}
|
|
|
|
midl_user_free(pResponse);
|
|
}
|
|
}
|
|
|
|
if (hProv)
|
|
CryptReleaseContext(hProv,0);
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_CHALLENGESERVER;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcResponseServerChallenge(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ PTLSCHALLENGERESPONSEDATA pClientResponse,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Client's responses to Server challenge returned TLSRpcChallengeServer(),
|
|
must have call TLSRpcChallengeServer().
|
|
|
|
Parameter:
|
|
|
|
phContext:
|
|
pClientResponses: Client's response to server's challenge.
|
|
pdwErrCode : Return error code.
|
|
|
|
|
|
Returns:
|
|
|
|
|
|
Note:
|
|
|
|
--*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
DWORD dwClientType;
|
|
PTLSCHALLENGEDATA pServerToClientChallenge;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcResponseServerChallenge\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
//if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_ADMIN))
|
|
//{
|
|
// status = TLS_E_ACCESS_DENIED;
|
|
// goto cleanup;
|
|
//}
|
|
|
|
if( pClientResponse == NULL ||
|
|
pClientResponse->pbResponseData == NULL ||
|
|
pClientResponse->cbResponseData == 0 )
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext->m_ContextType != CONTEXTHANDLE_CHALLENGE_SERVER_TYPE &&
|
|
lpContext->m_ContextType != CONTEXTHANDLE_CHALLENGE_LRWIZ_TYPE)
|
|
{
|
|
status = TLS_E_INVALID_SEQUENCE;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext->m_ContextHandle == NULL)
|
|
{
|
|
status = TLS_E_INTERNAL;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext->m_ContextType == CONTEXTHANDLE_CHALLENGE_LRWIZ_TYPE)
|
|
{
|
|
dwClientType = CLIENT_TYPE_LRWIZ;
|
|
}
|
|
else
|
|
{
|
|
dwClientType = CLIENT_TYPE_TLSERVER;
|
|
}
|
|
|
|
pServerToClientChallenge = (PTLSCHALLENGEDATA)lpContext->m_ContextHandle;
|
|
|
|
//
|
|
// base on client type, verify challenge response data
|
|
//
|
|
status = TLSVerifyChallengeResponse(
|
|
g_hCryptProv,
|
|
dwClientType,
|
|
pServerToClientChallenge,
|
|
pClientResponse
|
|
);
|
|
|
|
if(status != ERROR_SUCCESS)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
}
|
|
else
|
|
{
|
|
if(dwClientType == CLIENT_TYPE_LRWIZ)
|
|
{
|
|
lpContext->m_ClientFlags |= CLIENT_ACCESS_LRWIZ;
|
|
}
|
|
else
|
|
{
|
|
lpContext->m_ClientFlags |= CLIENT_ACCESS_LSERVER;
|
|
}
|
|
}
|
|
|
|
if(pServerToClientChallenge != NULL)
|
|
{
|
|
FreeMemory(pServerToClientChallenge->pbChallengeData);
|
|
FreeMemory(pServerToClientChallenge);
|
|
}
|
|
|
|
lpContext->m_ContextHandle = NULL;
|
|
lpContext->m_ContextType = CONTEXTHANDLE_EMPTY_TYPE;
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_RESPONSESERVERCHALLENGE;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcGetTlsPrivateData(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwPrivateDataType,
|
|
/* [switch_is][in] */ PTLSPrivateDataUnion pSearchData,
|
|
/* [ref][out][in] */ PDWORD pdwRetDataType,
|
|
/* [switch_is][out] */ PTLSPrivateDataUnion __RPC_FAR *ppPrivateData,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Retrieve license server's private data, this include Server's
|
|
unique ID, PID, and registered SPK if any.
|
|
|
|
Parameters:
|
|
|
|
phContext : Client's context handle.
|
|
dwPrivateDataType : Type of private data interested.
|
|
pSearchData : Type of data to search, currently ignore.
|
|
pdwRetDataType : Return data type.
|
|
ppPrivateData : License Server's private data.
|
|
pdwErrCode : Error Code.
|
|
|
|
Returns:
|
|
|
|
|
|
Note:
|
|
|
|
Only LrWiz and License Server can invoke this RPC call.
|
|
|
|
--*/
|
|
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
DWORD cbSource=0;
|
|
PBYTE pbSource=NULL;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcGetTlsPrivateData\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
//
|
|
// relax restriction on who can get private data
|
|
//
|
|
if( dwPrivateDataType != TLS_PRIVATEDATA_PID &&
|
|
dwPrivateDataType != TLS_PRIVATEDATA_UNIQUEID )
|
|
{
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_LRWIZ))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
}
|
|
|
|
if( dwPrivateDataType < TLS_PRIVATEDATA_MIN ||
|
|
dwPrivateDataType > TLS_PRIVATEDATA_MAX )
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Not supported yet...
|
|
//
|
|
if(dwPrivateDataType == TLS_PRIVATEDATA_INSTALLED_CERT)
|
|
{
|
|
status = TLS_E_NOTSUPPORTED;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Don't really need this but we might need to support
|
|
// re-generate of License Server ID
|
|
//
|
|
if(!AcquireAdministrativeLock(INFINITE))
|
|
{
|
|
status = TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
switch(dwPrivateDataType)
|
|
{
|
|
case TLS_PRIVATEDATA_UNIQUEID:
|
|
pbSource = (PBYTE)g_pszServerUniqueId;
|
|
cbSource = g_cbServerUniqueId;
|
|
break;
|
|
|
|
case TLS_PRIVATEDATA_PID:
|
|
pbSource = (PBYTE)g_pszServerPid;
|
|
cbSource = g_cbServerPid;
|
|
break;
|
|
|
|
case TLS_PRIVATEDATA_SPK:
|
|
pbSource = g_pbServerSPK;
|
|
cbSource = g_cbServerSPK;
|
|
}
|
|
|
|
//
|
|
// Currently, what you ask is what you get.
|
|
//
|
|
*pdwRetDataType = dwPrivateDataType;
|
|
|
|
if( (dwPrivateDataType != TLS_PRIVATEDATA_SYSTEMLANGID) &&
|
|
(pbSource == NULL || cbSource == 0) )
|
|
{
|
|
status = TLS_E_RECORD_NOTFOUND;
|
|
}
|
|
else
|
|
{
|
|
*ppPrivateData = (PTLSPrivateDataUnion)midl_user_allocate(sizeof(TLSPrivateDataUnion));
|
|
if(*ppPrivateData != NULL)
|
|
{
|
|
memset(
|
|
*ppPrivateData,
|
|
0,
|
|
sizeof(TLSPrivateDataUnion)
|
|
);
|
|
|
|
if(*pdwRetDataType == TLS_PRIVATEDATA_SYSTEMLANGID)
|
|
{
|
|
(*ppPrivateData)->systemLangId = GetSystemDefaultLangID();
|
|
}
|
|
else if(*pdwRetDataType == TLS_PRIVATEDATA_SPK)
|
|
{
|
|
(*ppPrivateData)->SPK.cbSPK = cbSource;
|
|
(*ppPrivateData)->SPK.pbSPK = pbSource;
|
|
(*ppPrivateData)->SPK.pCertExtensions = g_pCertExtensions;
|
|
|
|
//(*ppPrivateData)->SPK.pCertExtensions = (PTLSCERT_EXTENSIONS)midl_user_allocate(g_cbCertExtensions);
|
|
//memcpy(
|
|
// (*ppPrivateData)->SPK.pCertExtensions,
|
|
// g_pCertExtensions,
|
|
// g_cbCertExtensions
|
|
// );
|
|
}
|
|
else
|
|
{
|
|
(*ppPrivateData)->BinaryData.cbData = cbSource;
|
|
(*ppPrivateData)->BinaryData.pbData = pbSource;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
status = ERROR_OUTOFMEMORY;
|
|
}
|
|
}
|
|
|
|
ReleaseAdministrativeLock();
|
|
|
|
cleanup:
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_GETPRIVATEDATA;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcSetTlsPrivateData(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD dwPrivateDataType,
|
|
/* [switch_is][in] */ PTLSPrivateDataUnion pPrivateData,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Private routine for LrWiz to set license server's private data.
|
|
|
|
Parameter:
|
|
|
|
phContext: Client context handle.
|
|
dwPrivateDataType : Type of private data to set.
|
|
pPrivateData : Private data to set/install.
|
|
pdwErrCode : Server return code.
|
|
|
|
Returns:
|
|
|
|
|
|
Note:
|
|
|
|
Only support installing of SPK/Extension at this time.
|
|
|
|
--*/
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
DWORD dwSpkVerifyResult;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcDepositeSPK\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_LRWIZ))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Only support SPK at this time
|
|
//
|
|
if(dwPrivateDataType != TLS_PRIVATEDATA_SPK)
|
|
{
|
|
status = TLS_E_INVALID_DATA;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Lock all RPC calls related to issuing certificate
|
|
//
|
|
if(!AcquireRPCExclusiveLock(INFINITE))
|
|
{
|
|
status = TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
do {
|
|
//if(g_pbServerSPK != NULL && g_cbServerSPK != 0)
|
|
//{
|
|
// status = TLS_E_SPKALREADYEXIST;
|
|
// break;
|
|
//}
|
|
|
|
if(AcquireAdministrativeLock(INFINITE))
|
|
{
|
|
try {
|
|
status = TLSReGenSelfSignCert(
|
|
g_hCryptProv,
|
|
pPrivateData->SPK.pbSPK,
|
|
pPrivateData->SPK.cbSPK,
|
|
pPrivateData->SPK.pCertExtensions->cExtension,
|
|
pPrivateData->SPK.pCertExtensions->rgExtension
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
ReleaseAdministrativeLock();
|
|
}
|
|
else
|
|
{
|
|
status = TLS_E_ALLOCATE_HANDLE;
|
|
}
|
|
} while(FALSE);
|
|
|
|
ReleaseRPCExclusiveLock();
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_SETPRIVATEDATA;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcTriggerReGenKey(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ BOOL bRegenKey,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
|
|
/*++
|
|
|
|
Abstract:
|
|
|
|
Private routine to force license server to re-generate its
|
|
public/private key pair, all installed certificates/SPK are
|
|
deleted, User are required to re-register license server.
|
|
|
|
Parameters:
|
|
|
|
phContext : Client context handle.
|
|
bKeepSPKAndExtension : For future use only.
|
|
pdwErrCode : Return error code.
|
|
|
|
Returns:
|
|
|
|
|
|
++*/
|
|
|
|
{
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
DWORD status=ERROR_SUCCESS;
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcTriggerReGenKey\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_LRWIZ))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
LPCTSTR pString[1];
|
|
|
|
pString[0] = lpContext->m_Client;
|
|
|
|
TLSLogEventString(
|
|
EVENTLOG_INFORMATION_TYPE,
|
|
TLS_I_TRIGGER_REGENKEY,
|
|
1,
|
|
pString
|
|
);
|
|
|
|
//
|
|
// Block ALL RPC calls
|
|
//
|
|
if(!AcquireRPCExclusiveLock(INFINITE))
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
do {
|
|
if(!AcquireAdministrativeLock(INFINITE))
|
|
{
|
|
status = TLS_E_ALLOCATE_HANDLE;
|
|
break;
|
|
}
|
|
|
|
try {
|
|
status = TLSReGenKeysAndReloadServerCert(
|
|
bRegenKey
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
ReleaseAdministrativeLock();
|
|
|
|
} while(FALSE);
|
|
|
|
ReleaseRPCExclusiveLock();
|
|
|
|
cleanup:
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_TRIGGERREGENKEY;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcTelephoneRegisterLKP(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD cbData,
|
|
/* [size_is][in] */ PBYTE pbData,
|
|
/* [ref][out] */ PDWORD pdwErrCode
|
|
)
|
|
|
|
/*++
|
|
|
|
--*/
|
|
|
|
{
|
|
DWORD status=ERROR_SUCCESS;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
PTLSDbWorkSpace pDbWkSpace;
|
|
LSKeyPack keypack;
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcTelephoneRegisterLKP\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_LRWIZ))
|
|
{
|
|
status = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
status=TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
CLEANUPSTMT;
|
|
BEGIN_TRANSACTION(pDbWkSpace);
|
|
|
|
try {
|
|
status = TLSDBTelephoneRegisterLicenseKeyPack(
|
|
USEHANDLE(pDbWkSpace),
|
|
g_pszServerPid,
|
|
pbData,
|
|
cbData,
|
|
&keypack
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
status = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
status = TLS_E_INTERNAL;
|
|
}
|
|
|
|
if(TLS_ERROR(status))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWkSpace);
|
|
|
|
//
|
|
// Post a sync work object
|
|
//
|
|
if(status == ERROR_SUCCESS)
|
|
{
|
|
if(TLSAnnounceLKPToAllRemoteServer(
|
|
keypack.dwKeyPackId,
|
|
0
|
|
) != ERROR_SUCCESS)
|
|
{
|
|
TLSLogWarningEvent(TLS_W_ANNOUNCELKP_FAILED);
|
|
}
|
|
}
|
|
|
|
cleanup:
|
|
|
|
|
|
lpContext->m_LastError=status;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_TELEPHONEREGISTERLKP;
|
|
#endif
|
|
|
|
|
|
*pdwErrCode = TLSMapReturnCode(status);
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcAllocateInternetLicense(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ const CHALLENGE_CONTEXT ChallengeContext,
|
|
/* [in] */ const PTLSLICENSEREQUEST pRequest,
|
|
/* [string][in] */ LPTSTR pMachineName,
|
|
/* [string][in] */ LPTSTR pUserName,
|
|
/* [in] */ const DWORD cbChallengeResponse,
|
|
/* [size_is][in] */ const PBYTE pbChallengeResponse,
|
|
/* [out] */ PDWORD pcbLicense,
|
|
/* [size_is][size_is][out] */ BYTE __RPC_FAR *__RPC_FAR *pbLicense,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
|
|
|
|
--*/
|
|
{
|
|
return TLSRpcRequestNewLicense(
|
|
phContext,
|
|
ChallengeContext,
|
|
pRequest,
|
|
pMachineName,
|
|
pUserName,
|
|
cbChallengeResponse,
|
|
pbChallengeResponse,
|
|
FALSE,
|
|
pcbLicense,
|
|
pbLicense,
|
|
pdwErrCode
|
|
);
|
|
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcAllocateInternetLicenseEx(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ const CHALLENGE_CONTEXT ChallengeContext,
|
|
/* [in] */ const PTLSLICENSEREQUEST pRequest,
|
|
/* [string][in] */ LPTSTR pMachineName,
|
|
/* [string][in] */ LPTSTR pUserName,
|
|
/* [in] */ const DWORD cbChallengeResponse,
|
|
/* [size_is][in] */ const PBYTE pbChallengeResponse,
|
|
/* [ref][out] */ PTLSInternetLicense pInternetLicense,
|
|
/* [ref][out] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
--*/
|
|
{
|
|
PBYTE pbLicense = NULL;
|
|
DWORD cbLicense = 0;
|
|
DWORD dwStatus = ERROR_SUCCESS;
|
|
DWORD index = 0;
|
|
PLICENSEDPRODUCT pLicensedProduct = NULL;
|
|
DWORD dwNumLicensedProduct = 0;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
|
|
if(lpContext == NULL)
|
|
{
|
|
SetLastError(ERROR_INVALID_PARAMETER);
|
|
goto cleanup;
|
|
}
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcAllocateInternetLicenseEx\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
//
|
|
// Internally forward the request.
|
|
//
|
|
dwStatus = TLSRpcAllocateInternetLicense(
|
|
phContext,
|
|
ChallengeContext,
|
|
pRequest,
|
|
pMachineName,
|
|
pUserName,
|
|
cbChallengeResponse,
|
|
pbChallengeResponse,
|
|
&cbLicense,
|
|
&pbLicense,
|
|
pdwErrCode
|
|
);
|
|
|
|
if(*pdwErrCode >= LSERVER_ERROR_BASE)
|
|
{
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// decode the license.
|
|
//
|
|
dwStatus = LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
pLicensedProduct
|
|
);
|
|
|
|
//
|
|
// Internet license can only have one licensed product
|
|
//
|
|
if(dwStatus != LICENSE_STATUS_OK || dwNumLicensedProduct == 0 || dwNumLicensedProduct > 1)
|
|
{
|
|
dwStatus = TLS_E_INTERNAL;
|
|
goto cleanup;
|
|
}
|
|
|
|
pLicensedProduct = (PLICENSEDPRODUCT)AllocateMemory(
|
|
dwNumLicensedProduct * sizeof(LICENSEDPRODUCT)
|
|
);
|
|
if(pLicensedProduct == NULL)
|
|
{
|
|
dwStatus = TLS_E_ALLOCATE_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
dwStatus = LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
pLicensedProduct
|
|
);
|
|
|
|
if(dwStatus != LICENSE_STATUS_OK)
|
|
{
|
|
dwStatus = TLS_E_INTERNAL;
|
|
goto cleanup;
|
|
}
|
|
|
|
//
|
|
// Sets up returns.
|
|
//
|
|
SAFESTRCPY(pInternetLicense->szServerId, pLicensedProduct->szIssuerId);
|
|
SAFESTRCPY(pInternetLicense->szServerName, pLicensedProduct->szIssuer);
|
|
pInternetLicense->ulSerialNumber = pLicensedProduct->ulSerialNumber;
|
|
pInternetLicense->dwQuantity = pLicensedProduct->dwQuantity;
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=dwStatus;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_ALLOCATEINTERNETLICNESEEX;
|
|
#endif
|
|
|
|
if(*pdwErrCode == ERROR_SUCCESS)
|
|
{
|
|
*pdwErrCode = TLSMapReturnCode(dwStatus);
|
|
}
|
|
|
|
if(pLicensedProduct != NULL)
|
|
{
|
|
for(index =0; index < dwNumLicensedProduct; index++)
|
|
{
|
|
LSFreeLicensedProduct(pLicensedProduct+index);
|
|
}
|
|
|
|
FreeMemory(pLicensedProduct);
|
|
}
|
|
|
|
if(pbLicense != NULL)
|
|
{
|
|
midl_user_free(pbLicense);
|
|
}
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcReturnInternetLicenseEx(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ const PTLSLICENSEREQUEST pRequest,
|
|
/* [in] */ const ULARGE_INTEGER __RPC_FAR *pulSerialNumber,
|
|
/* [in] */ DWORD dwQuantity,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
--*/
|
|
{
|
|
DWORD dwStatus = ERROR_SUCCESS;
|
|
TLSLicenseToBeReturn TobeReturn;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
PTLSDbWorkSpace pDbWorkSpace = NULL;
|
|
CTLSPolicy* pPolicy = NULL;
|
|
PMHANDLE hClient;
|
|
|
|
PMLICENSEREQUEST PMLicenseRequest;
|
|
PPMLICENSEREQUEST pAdjustedRequest;
|
|
|
|
TCHAR szCompanyName[LSERVER_MAX_STRING_SIZE+2];
|
|
TCHAR szProductId[LSERVER_MAX_STRING_SIZE+2];
|
|
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
|
|
if(VerifyLicenseRequest(pRequest) == FALSE)
|
|
{
|
|
SetLastError(dwStatus = TLS_E_INVALID_DATA);
|
|
goto cleanup;
|
|
}
|
|
|
|
if(lpContext == NULL)
|
|
{
|
|
SetLastError(dwStatus = ERROR_INVALID_PARAMETER);
|
|
goto cleanup;
|
|
}
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcReturnInternetLicenseEx\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_REQUEST))
|
|
{
|
|
dwStatus = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
memset(szCompanyName, 0, sizeof(szCompanyName));
|
|
memset(szProductId, 0, sizeof(szProductId));
|
|
|
|
memcpy(
|
|
szCompanyName,
|
|
pRequest->ProductInfo.pbCompanyName,
|
|
min(pRequest->ProductInfo.cbCompanyName, sizeof(szCompanyName)-sizeof(TCHAR))
|
|
);
|
|
|
|
memcpy(
|
|
szProductId,
|
|
pRequest->ProductInfo.pbProductID,
|
|
min(pRequest->ProductInfo.cbProductID, sizeof(szProductId)-sizeof(TCHAR))
|
|
);
|
|
|
|
//
|
|
// Allocate policy module, must have the right policy module to
|
|
// return license.
|
|
//
|
|
pPolicy = AcquirePolicyModule(
|
|
szCompanyName,
|
|
szProductId,
|
|
TRUE
|
|
);
|
|
|
|
if(pPolicy == NULL)
|
|
{
|
|
dwStatus = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
hClient = GenerateClientId();
|
|
|
|
|
|
//
|
|
// Convert request to PMLICENSEREQUEST
|
|
//
|
|
TlsLicenseRequestToPMLicenseRequest(
|
|
LICENSETYPE_LICENSE,
|
|
pRequest,
|
|
_TEXT(""),
|
|
_TEXT(""),
|
|
0,
|
|
&PMLicenseRequest
|
|
);
|
|
|
|
//
|
|
// Ask policy module the actual product ID
|
|
//
|
|
dwStatus = pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_NEW,
|
|
(PVOID) &PMLicenseRequest,
|
|
(PVOID *) &pAdjustedRequest
|
|
);
|
|
|
|
memset(&TobeReturn, 0, sizeof(TobeReturn));
|
|
|
|
TobeReturn.dwQuantity = dwQuantity;
|
|
TobeReturn.dwKeyPackId = pulSerialNumber->HighPart;
|
|
TobeReturn.dwLicenseId = pulSerialNumber->LowPart;
|
|
TobeReturn.dwPlatformID = pAdjustedRequest->dwPlatformId;
|
|
TobeReturn.cbEncryptedHwid = pRequest->cbEncryptedHwid;
|
|
TobeReturn.pbEncryptedHwid = pRequest->pbEncryptedHwid;
|
|
TobeReturn.dwProductVersion = pAdjustedRequest->dwProductVersion;
|
|
TobeReturn.pszOrgProductId = szProductId;
|
|
TobeReturn.pszCompanyName = szCompanyName;
|
|
TobeReturn.pszProductId = pAdjustedRequest->pszProductId;
|
|
|
|
//
|
|
// Allocate DB handle
|
|
//
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
dwStatus = TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
CLEANUPSTMT;
|
|
BEGIN_TRANSACTION(pDbWorkSpace);
|
|
|
|
try {
|
|
dwStatus = TLSReturnClientLicensedProduct(
|
|
USEHANDLE(pDbWkSpace),
|
|
hClient,
|
|
pPolicy,
|
|
&TobeReturn
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
dwStatus = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
SetLastError(dwStatus = TLS_E_INTERNAL);
|
|
}
|
|
|
|
if(TLS_ERROR(dwStatus))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWorkSpace);
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=dwStatus;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_RETURNINTERNETLICENSEEX;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(dwStatus);
|
|
|
|
if(pPolicy)
|
|
{
|
|
pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_COMPLETE,
|
|
UlongToPtr (dwStatus),
|
|
NULL
|
|
);
|
|
|
|
ReleasePolicyModule(pPolicy);
|
|
}
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
////////////////////////////////////////////////////////////////////////////
|
|
|
|
error_status_t
|
|
TLSRpcReturnInternetLicense(
|
|
/* [in] */ PCONTEXT_HANDLE phContext,
|
|
/* [in] */ DWORD cbLicense,
|
|
/* [size_is][in] */ PBYTE pbLicense,
|
|
/* [ref][out][in] */ PDWORD pdwErrCode
|
|
)
|
|
/*++
|
|
|
|
--*/
|
|
{
|
|
DWORD dwStatus = ERROR_SUCCESS;
|
|
DWORD index = 0;
|
|
PLICENSEDPRODUCT pLicensedProduct = NULL;
|
|
DWORD dwNumLicensedProduct = 0;
|
|
TLSLicenseToBeReturn TobeReturn;
|
|
LPCLIENTCONTEXT lpContext = (LPCLIENTCONTEXT)phContext;
|
|
PTLSDbWorkSpace pDbWorkSpace = NULL;
|
|
CTLSPolicy* pPolicy = NULL;
|
|
PMHANDLE hClient;
|
|
|
|
|
|
_se_translator_function old_trans_se_func = NULL;
|
|
old_trans_se_func = _set_se_translator( trans_se_func );
|
|
|
|
|
|
|
|
if(lpContext == NULL)
|
|
{
|
|
SetLastError(dwStatus = ERROR_INVALID_PARAMETER);
|
|
goto cleanup;
|
|
}
|
|
|
|
DBGPrintf(
|
|
DBG_INFORMATION,
|
|
DBG_FACILITY_RPC,
|
|
DBGLEVEL_FUNCTION_TRACE,
|
|
_TEXT("%s : TLSRpcReturnInternetLicense\n"),
|
|
lpContext->m_Client
|
|
);
|
|
|
|
InterlockedIncrement( &lpContext->m_RefCount );
|
|
if(!(lpContext->m_ClientFlags & CLIENT_ACCESS_REQUEST))
|
|
{
|
|
dwStatus = TLS_E_ACCESS_DENIED;
|
|
goto cleanup;
|
|
}
|
|
|
|
// -------------------------------------------------------
|
|
// decode the license.
|
|
// -------------------------------------------------------
|
|
dwStatus = LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
pLicensedProduct
|
|
);
|
|
|
|
// -------------------------------------------------------
|
|
// Internet license can only have one licensed product
|
|
// -------------------------------------------------------
|
|
if(dwStatus != LICENSE_STATUS_OK || dwNumLicensedProduct == 0 || dwNumLicensedProduct > 1)
|
|
{
|
|
dwStatus = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
pLicensedProduct = (PLICENSEDPRODUCT)AllocateMemory(
|
|
dwNumLicensedProduct * sizeof(LICENSEDPRODUCT)
|
|
);
|
|
if(pLicensedProduct == NULL)
|
|
{
|
|
dwStatus = TLS_E_ALLOCATE_MEMORY;
|
|
goto cleanup;
|
|
}
|
|
|
|
dwStatus = LSVerifyDecodeClientLicense(
|
|
pbLicense,
|
|
cbLicense,
|
|
g_pbSecretKey,
|
|
g_cbSecretKey,
|
|
&dwNumLicensedProduct,
|
|
pLicensedProduct
|
|
);
|
|
|
|
if(dwStatus != LICENSE_STATUS_OK)
|
|
{
|
|
dwStatus = TLS_E_INVALID_LICENSE;
|
|
goto cleanup;
|
|
}
|
|
|
|
|
|
TobeReturn.dwQuantity = pLicensedProduct->dwQuantity;
|
|
TobeReturn.dwKeyPackId = pLicensedProduct->ulSerialNumber.HighPart;
|
|
TobeReturn.dwLicenseId = pLicensedProduct->ulSerialNumber.LowPart;
|
|
TobeReturn.dwPlatformID = pLicensedProduct->LicensedProduct.dwPlatformID;
|
|
TobeReturn.cbEncryptedHwid = pLicensedProduct->LicensedProduct.cbEncryptedHwid;
|
|
TobeReturn.pbEncryptedHwid = pLicensedProduct->LicensedProduct.pbEncryptedHwid;
|
|
TobeReturn.dwProductVersion = MAKELONG(
|
|
pLicensedProduct->pLicensedVersion->wMinorVersion,
|
|
pLicensedProduct->pLicensedVersion->wMajorVersion
|
|
);
|
|
|
|
TobeReturn.pszOrgProductId = (LPTSTR) pLicensedProduct->pbOrgProductID;
|
|
TobeReturn.pszCompanyName = (LPTSTR) pLicensedProduct->LicensedProduct.pProductInfo->pbCompanyName;
|
|
TobeReturn.pszProductId = (LPTSTR) pLicensedProduct->LicensedProduct.pProductInfo->pbProductID;
|
|
TobeReturn.pszUserName = (LPTSTR) pLicensedProduct->szLicensedUser;
|
|
TobeReturn.pszMachineName = pLicensedProduct->szLicensedClient;
|
|
|
|
|
|
//
|
|
// Allocate policy module, must have the right policy module to
|
|
// return license.
|
|
//
|
|
pPolicy = AcquirePolicyModule(
|
|
TobeReturn.pszCompanyName,
|
|
TobeReturn.pszOrgProductId,
|
|
TRUE
|
|
);
|
|
|
|
if(pPolicy == NULL)
|
|
{
|
|
dwStatus = GetLastError();
|
|
goto cleanup;
|
|
}
|
|
|
|
hClient = GenerateClientId();
|
|
|
|
//
|
|
// Allocate DB handle
|
|
//
|
|
if(!ALLOCATEDBHANDLE(pDbWkSpace, g_GeneralDbTimeout))
|
|
{
|
|
dwStatus = TLS_E_ALLOCATE_HANDLE;
|
|
goto cleanup;
|
|
}
|
|
|
|
CLEANUPSTMT;
|
|
BEGIN_TRANSACTION(pDbWorkSpace);
|
|
|
|
try {
|
|
dwStatus = TLSReturnClientLicensedProduct(
|
|
USEHANDLE(pDbWkSpace),
|
|
hClient,
|
|
pPolicy,
|
|
&TobeReturn
|
|
);
|
|
}
|
|
catch( SE_Exception e ) {
|
|
dwStatus = e.getSeNumber();
|
|
}
|
|
catch(...) {
|
|
SetLastError(dwStatus = TLS_E_INTERNAL);
|
|
}
|
|
|
|
if(TLS_ERROR(dwStatus))
|
|
{
|
|
ROLLBACK_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
else
|
|
{
|
|
COMMIT_TRANSACTION(pDbWorkSpace);
|
|
}
|
|
|
|
FREEDBHANDLE(pDbWorkSpace);
|
|
|
|
cleanup:
|
|
|
|
lpContext->m_LastError=dwStatus;
|
|
InterlockedDecrement( &lpContext->m_RefCount );
|
|
|
|
#if DBG
|
|
lpContext->m_LastCall = RPC_CALL_RETURNINTERNETLICENSE;
|
|
#endif
|
|
|
|
*pdwErrCode = TLSMapReturnCode(dwStatus);
|
|
|
|
if(pLicensedProduct != NULL)
|
|
{
|
|
for(index =0; index < dwNumLicensedProduct; index++)
|
|
{
|
|
LSFreeLicensedProduct(pLicensedProduct+index);
|
|
}
|
|
|
|
FreeMemory(pLicensedProduct);
|
|
}
|
|
|
|
if(pPolicy)
|
|
{
|
|
pPolicy->PMLicenseRequest(
|
|
hClient,
|
|
REQUEST_COMPLETE,
|
|
UlongToPtr (dwStatus),
|
|
NULL
|
|
);
|
|
|
|
ReleasePolicyModule(pPolicy);
|
|
}
|
|
|
|
//
|
|
// Reset SE translator
|
|
//
|
|
_set_se_translator(old_trans_se_func);
|
|
return RPC_S_OK;
|
|
}
|