windows-nt/Source/XPSP1/NT/termsrv/license/tlserver/server/templic.cpp

776 lines
24 KiB
C++
Raw Permalink Normal View History

2020-09-26 03:20:57 -05:00
//+--------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1996-1998
//
// File: templic.cpp
//
// Contents:
// all routine deal with temporary license
//
// History:
// Feb 4, 98 HueiWang Created
//---------------------------------------------------------------------------
#include "pch.cpp"
#include "globals.h"
#include "templic.h"
#include "misc.h"
#include "db.h"
#include "clilic.h"
#include "keypack.h"
#include "kp.h"
#include "lkpdesc.h"
#define USSTRING_TEMPORARY _TEXT("Temporary Licenses for")
DWORD
TLSDBGetTemporaryLicense(
IN PTLSDbWorkSpace pDbWkSpace,
IN PTLSDBLICENSEREQUEST pRequest,
IN OUT PTLSLICENSEPACK pLicensePack
);
//+-------------------------------------------------------------
DWORD
TLSDBIssueTemporaryLicense(
IN PTLSDbWorkSpace pDbWkSpace,
IN PTLSDBLICENSEREQUEST pRequest,
IN FILETIME* pNotBefore,
IN FILETIME* pNotAfter,
IN OUT PTLSDBLICENSEDPRODUCT pLicensedProduct
)
/*++
Abstract:
Issue a temporary license, insert a temporary license
pack if necessary
Parameters:
pDbWkSpace - workspace handle.
pRequest - license request.
Returns:
Note:
Seperate routine for issuing perm license just in case
we decide to use our own format for temp. license
++*/
{
DWORD dwStatus=ERROR_SUCCESS;
ULARGE_INTEGER ulSerialNumber;
DWORD dwLicenseId;
LPTSTR lpRequest=NULL;
LICENSEDCLIENT issuedLicense;
TLSLICENSEPACK LicensePack;
PMGENERATELICENSE PolModGenLicense;
PPMCERTEXTENSION pPolModCertExtension=NULL;
FILETIME notBefore, notAfter;
// ----------------------------------------------------------
// Issue license
memset(&ulSerialNumber, 0, sizeof(ulSerialNumber));
//-----------------------------------------------------------------------------
// this step require reduce available license by 1
//
long numLicense=1;
dwStatus=TLSDBGetTemporaryLicense(
pDbWkSpace,
pRequest,
&LicensePack
);
if(dwStatus != ERROR_SUCCESS)
{
goto cleanup;
}
if((LicensePack.ucAgreementType & ~LSKEYPACK_RESERVED_TYPE) != LSKEYPACKTYPE_TEMPORARY &&
(LicensePack.ucKeyPackStatus & ~LSKEYPACKSTATUS_RESERVED) != LSKEYPACKSTATUS_TEMPORARY )
{
SetLastError(dwStatus = TLS_E_INTERNAL);
TLSASSERT(FALSE);
goto cleanup;
}
// reset status
dwStatus = ERROR_SUCCESS;
dwLicenseId=TLSDBGetNextLicenseId();
ulSerialNumber.LowPart = dwLicenseId;
ulSerialNumber.HighPart = LicensePack.dwKeyPackId;
//
// Update License Table Here
//
memset(&issuedLicense, 0, sizeof(LICENSEDCLIENT));
issuedLicense.dwLicenseId = dwLicenseId;
issuedLicense.dwKeyPackId = LicensePack.dwKeyPackId;
issuedLicense.dwKeyPackLicenseId = LicensePack.dwNextSerialNumber;
issuedLicense.dwNumLicenses = 1;
if(pNotBefore == NULL || pNotAfter == NULL)
{
issuedLicense.ftIssueDate = time(NULL);
issuedLicense.ftExpireDate = issuedLicense.ftIssueDate + g_GracePeriod * 24 * 60 * 60;
}
else
{
FileTimeToLicenseDate(pNotBefore, &(issuedLicense.ftIssueDate));
FileTimeToLicenseDate(pNotAfter, &(issuedLicense.ftExpireDate));
}
issuedLicense.ucLicenseStatus = LSLICENSE_STATUS_TEMPORARY;
_tcscpy(issuedLicense.szMachineName, pRequest->szMachineName);
_tcscpy(issuedLicense.szUserName, pRequest->szUserName);
issuedLicense.dwSystemBiosChkSum = pRequest->hWid.dwPlatformID;
issuedLicense.dwVideoBiosChkSum = pRequest->hWid.Data1;
issuedLicense.dwFloppyBiosChkSum = pRequest->hWid.Data2;
issuedLicense.dwHardDiskSize = pRequest->hWid.Data3;
issuedLicense.dwRamSize = pRequest->hWid.Data4;
UnixTimeToFileTime(issuedLicense.ftIssueDate, &notBefore);
UnixTimeToFileTime(issuedLicense.ftExpireDate, &notAfter);
//
// Inform Policy Module of license generation.
//
PolModGenLicense.pLicenseRequest = pRequest->pPolicyLicenseRequest;
PolModGenLicense.dwKeyPackType = LSKEYPACKTYPE_TEMPORARY;
PolModGenLicense.dwKeyPackId = LicensePack.dwKeyPackId;
PolModGenLicense.dwKeyPackLicenseId = LicensePack.dwNextSerialNumber;
PolModGenLicense.ClientLicenseSerialNumber = ulSerialNumber;
PolModGenLicense.ftNotBefore = notBefore;
PolModGenLicense.ftNotAfter = notAfter;
dwStatus = pRequest->pPolicy->PMLicenseRequest(
pRequest->hClient,
REQUEST_GENLICENSE,
(PVOID)&PolModGenLicense,
(PVOID *)&pPolModCertExtension
);
if(dwStatus != ERROR_SUCCESS)
{
//
// Error in policy module
//
goto cleanup;
}
//
// Check error return from policy module
//
if(pPolModCertExtension != NULL)
{
if(pPolModCertExtension->pbData != NULL && pPolModCertExtension->cbData == 0 ||
pPolModCertExtension->pbData == NULL && pPolModCertExtension->cbData != 0 )
{
// assuming no extension data
pPolModCertExtension->cbData = 0;
pPolModCertExtension->pbData = NULL;
}
if(CompareFileTime(&(pPolModCertExtension->ftNotBefore), &(pPolModCertExtension->ftNotAfter)) > 0)
{
//
// invalid data return from policy module
//
TLSLogEvent(
EVENTLOG_ERROR_TYPE,
TLS_E_GENERATECLIENTELICENSE,
dwStatus = TLS_E_POLICYMODULEERROR,
pRequest->pPolicy->GetCompanyName(),
pRequest->pPolicy->GetProductId()
);
goto cleanup;
}
//
// do not accept changes to license expiration date
//
if(pNotBefore != NULL && pNotAfter != NULL)
{
if( FileTimeToLicenseDate(&(pPolModCertExtension->ftNotBefore), &issuedLicense.ftIssueDate) == FALSE ||
FileTimeToLicenseDate(&(pPolModCertExtension->ftNotAfter), &issuedLicense.ftExpireDate) == FALSE )
{
//
// Invalid data return from policy module
//
TLSLogEvent(
EVENTLOG_ERROR_TYPE,
TLS_E_GENERATECLIENTELICENSE,
dwStatus = TLS_E_POLICYMODULEERROR,
pRequest->pPolicy->GetCompanyName(),
pRequest->pPolicy->GetProductId()
);
goto cleanup;
}
}
notBefore = pPolModCertExtension->ftNotBefore;
notAfter = pPolModCertExtension->ftNotAfter;
}
//
// Add license into license table
//
dwStatus = TLSDBLicenseAdd(
pDbWkSpace,
&issuedLicense,
0,
NULL
);
//
// Return licensed product
//
pLicensedProduct->pSubjectPublicKeyInfo = NULL;
pLicensedProduct->dwQuantity = 1;
pLicensedProduct->ulSerialNumber = ulSerialNumber;
pLicensedProduct->dwKeyPackId = LicensePack.dwKeyPackId;
pLicensedProduct->dwLicenseId = dwLicenseId;
pLicensedProduct->dwKeyPackLicenseId = LicensePack.dwNextSerialNumber;
pLicensedProduct->ClientHwid = pRequest->hWid;
pLicensedProduct->bTemp = TRUE;
pLicensedProduct->NotBefore = notBefore;
pLicensedProduct->NotAfter = notAfter;
pLicensedProduct->dwProductVersion = MAKELONG(LicensePack.wMinorVersion, LicensePack.wMajorVersion);
_tcscpy(pLicensedProduct->szCompanyName, LicensePack.szCompanyName);
_tcscpy(pLicensedProduct->szLicensedProductId, LicensePack.szProductId);
_tcscpy(pLicensedProduct->szRequestProductId, pRequest->pClientLicenseRequest->pszProductId);
_tcscpy(pLicensedProduct->szUserName, pRequest->szUserName);
_tcscpy(pLicensedProduct->szMachineName, pRequest->szMachineName);
pLicensedProduct->dwLanguageID = pRequest->dwLanguageID;
pLicensedProduct->dwPlatformID = pRequest->dwPlatformID;
pLicensedProduct->pbPolicyData = (pPolModCertExtension) ? pPolModCertExtension->pbData : NULL;
pLicensedProduct->cbPolicyData = (pPolModCertExtension) ? pPolModCertExtension->cbData : 0;
cleanup:
return dwStatus;
}
//-----------------------------------------------------------------
DWORD
TLSDBAddTemporaryKeyPack(
IN PTLSDbWorkSpace pDbWkSpace,
IN PTLSDBLICENSEREQUEST pRequest,
IN OUT LPTLSLICENSEPACK lpTmpKeyPackAdd
)
/*++
Abstract:
Add a temporary keypack into database.
Parameter:
pDbWkSpace : workspace handle.
szCompanyName :
szProductId :
dwVersion :
dwPlatformId :
dwLangId :
lpTmpKeyPackAdd : added keypack.
Returns:
++*/
{
DWORD dwStatus;
TLSLICENSEPACK LicPack;
TLSLICENSEPACK existingLicPack;
LICPACKDESC LicPackDesc;
LICPACKDESC existingLicPackDesc;
BOOL bAddDefDescription=FALSE;
TCHAR szDefProductDesc[LSERVER_MAX_STRING_SIZE];
int count=0;
memset(&LicPack, 0, sizeof(TLSLICENSEPACK));
memset(&existingLicPack, 0, sizeof(TLSLICENSEPACK));
memset(&LicPackDesc, 0, sizeof(LICPACKDESC));
memset(szDefProductDesc, 0, sizeof(szDefProductDesc));
memset(&existingLicPackDesc, 0, sizeof(LICPACKDESC));
//
// Load product description prefix
//
LoadResourceString(
IDS_TEMPORARY_PRODUCTDESC,
szDefProductDesc,
sizeof(szDefProductDesc) / sizeof(szDefProductDesc[0])
);
LicPack.ucAgreementType = LSKEYPACKTYPE_TEMPORARY;
_tcsncpy(
LicPack.szCompanyName,
pRequest->pszCompanyName,
min(_tcslen(pRequest->pszCompanyName), LSERVER_MAX_STRING_SIZE)
);
_tcsncpy(
LicPack.szProductId,
pRequest->pszProductId,
min(_tcslen(pRequest->pszProductId), LSERVER_MAX_STRING_SIZE)
);
_tcsncpy(
LicPack.szInstallId,
(LPTSTR)g_pszServerPid,
min(_tcslen((LPTSTR)g_pszServerPid), LSERVER_MAX_STRING_SIZE)
);
_tcsncpy(
LicPack.szTlsServerName,
g_szComputerName,
min(_tcslen(g_szComputerName), LSERVER_MAX_STRING_SIZE)
);
LicPack.wMajorVersion = HIWORD(pRequest->dwProductVersion);
LicPack.wMinorVersion = LOWORD(pRequest->dwProductVersion);
LicPack.dwPlatformType = pRequest->dwPlatformID;
LicPack.ucChannelOfPurchase = LSKEYPACKCHANNELOFPURCHASE_UNKNOWN;
LicPack.dwTotalLicenseInKeyPack = INT_MAX;
LoadResourceString(
IDS_TEMPORARY_KEYPACKID,
LicPack.szKeyPackId,
sizeof(LicPack.szKeyPackId)/sizeof(LicPack.szKeyPackId[0])
);
LoadResourceString(
IDS_TEMPORARY_BSERIALNUMBER,
LicPack.szBeginSerialNumber,
sizeof(LicPack.szBeginSerialNumber)/sizeof(LicPack.szBeginSerialNumber[0])
);
do {
//
// Add entry into keypack table.
//
dwStatus = TLSDBKeyPackAdd(
pDbWkSpace,
&LicPack
);
*lpTmpKeyPackAdd = LicPack;
LicPack.pbDomainSid = NULL;
LicPack.cbDomainSid = 0;
if(dwStatus == TLS_E_DUPLICATE_RECORD)
{
//
// temporary keypack already exist
//
dwStatus = ERROR_SUCCESS;
break;
}
else if(dwStatus != ERROR_SUCCESS)
{
//
// some other error occurred
//
break;
}
//
// Activate KeyPack
//
LicPack.ucKeyPackStatus = LSKEYPACKSTATUS_TEMPORARY;
LicPack.dwActivateDate = (DWORD) time(NULL);
LicPack.dwExpirationDate = INT_MAX;
LicPack.dwNumberOfLicenses = 0;
dwStatus=TLSDBKeyPackSetValues(
pDbWkSpace,
FALSE,
LSKEYPACK_SET_ACTIVATEDATE | LSKEYPACK_SET_KEYPACKSTATUS |
LSKEYPACK_SET_EXPIREDATE | LSKEYPACK_EXSEARCH_AVAILABLE,
&LicPack
);
bAddDefDescription = TRUE;
//
// Find existing keypack description
//
dwStatus = TLSDBKeyPackEnumBegin(
pDbWkSpace,
TRUE,
LSKEYPACK_SEARCH_PRODUCTID | LSKEYPACK_SEARCH_COMPANYNAME | LSKEYPACK_SEARCH_PLATFORMTYPE,
&LicPack
);
if(dwStatus != ERROR_SUCCESS)
break;
do {
dwStatus = TLSDBKeyPackEnumNext(
pDbWkSpace,
&existingLicPack
);
if(existingLicPack.dwKeyPackId != LicPack.dwKeyPackId)
{
break;
}
} while(dwStatus == ERROR_SUCCESS);
TLSDBKeyPackEnumEnd(pDbWkSpace);
if(dwStatus != ERROR_SUCCESS || existingLicPack.dwKeyPackId != LicPack.dwKeyPackId)
{
break;
}
//
// Copy existing keypack description into keypack description table
//
existingLicPackDesc.dwKeyPackId = existingLicPack.dwKeyPackId;
dwStatus = TLSDBKeyPackDescEnumBegin(
pDbWkSpace,
TRUE,
LICPACKDESCRECORD_TABLE_SEARCH_KEYPACKID,
&existingLicPackDesc
);
while(dwStatus == ERROR_SUCCESS)
{
dwStatus = TLSDBKeyPackDescEnumNext(
pDbWkSpace,
&existingLicPackDesc
);
if(dwStatus != ERROR_SUCCESS)
break;
LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId;
LicPackDesc.dwLanguageId = existingLicPackDesc.dwLanguageId;
_tcscpy(LicPackDesc.szCompanyName, existingLicPackDesc.szCompanyName);
_tcscpy(LicPackDesc.szProductName, existingLicPackDesc.szProductName);
//
// pretty format the description
//
_sntprintf(
LicPackDesc.szProductDesc,
sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1,
_TEXT("%s %s"),
(existingLicPackDesc.dwLanguageId != GetSystemDefaultLangID()) ? USSTRING_TEMPORARY : szDefProductDesc,
existingLicPackDesc.szProductDesc
);
// quick and dirty fix,
//
// TODO - need to do a duplicate table then use the duplicate handle to
// insert the record, SetValue uses enumeration to verify if record exist
// which fail because we are already in enumeration
//
if(pDbWkSpace->m_LicPackDescTable.InsertRecord(LicPackDesc) != TRUE)
{
SetLastError(dwStatus = SET_JB_ERROR(pDbWkSpace->m_LicPackDescTable.GetLastJetError()));
break;
}
//dwStatus = TLSDBKeyPackDescSetValue(
// pDbWkSpace,
// KEYPACKDESC_SET_ADD_ENTRY,
// &keyPackDesc
// );
count++;
}
if(count != 0)
{
bAddDefDescription = FALSE;
}
if(dwStatus == TLS_I_NO_MORE_DATA)
{
dwStatus = ERROR_SUCCESS;
}
} while(FALSE);
if(bAddDefDescription)
{
//
// ask policy module if they have description
//
PMKEYPACKDESCREQ kpDescReq;
PPMKEYPACKDESC pKpDesc;
//
// Ask for English description
//
kpDescReq.pszProductId = pRequest->pszProductId;
kpDescReq.dwLangId = MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US);
kpDescReq.dwVersion = pRequest->dwProductVersion;
pKpDesc = NULL;
dwStatus = pRequest->pPolicy->PMLicenseRequest(
pRequest->hClient,
REQUEST_KEYPACKDESC,
(PVOID)&kpDescReq,
(PVOID *)&pKpDesc
);
if(dwStatus == ERROR_SUCCESS && pKpDesc != NULL)
{
LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId;
LicPackDesc.dwLanguageId = MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US);
_tcscpy(LicPackDesc.szCompanyName, pKpDesc->szCompanyName);
_tcscpy(LicPackDesc.szProductName, pKpDesc->szProductName);
//
// pretty format the description
//
_sntprintf(
LicPackDesc.szProductDesc,
sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1,
_TEXT("%s %s"),
USSTRING_TEMPORARY, // US langid, don't use localized one
pKpDesc->szProductDesc
);
//
// Ignore error
//
dwStatus = TLSDBKeyPackDescAddEntry(
pDbWkSpace,
&LicPackDesc
);
if(dwStatus == ERROR_SUCCESS)
{
bAddDefDescription = FALSE;
}
}
if(GetSystemDefaultLangID() != kpDescReq.dwLangId)
{
//
// Get System default language id
//
kpDescReq.pszProductId = pRequest->pszProductId;
kpDescReq.dwLangId = GetSystemDefaultLangID();
kpDescReq.dwVersion = pRequest->dwProductVersion;
pKpDesc = NULL;
dwStatus = pRequest->pPolicy->PMLicenseRequest(
pRequest->hClient,
REQUEST_KEYPACKDESC,
(PVOID)&kpDescReq,
(PVOID *)&pKpDesc
);
if(dwStatus == ERROR_SUCCESS && pKpDesc != NULL)
{
LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId;
LicPackDesc.dwLanguageId = GetSystemDefaultLangID();
_tcscpy(LicPackDesc.szCompanyName, pKpDesc->szCompanyName);
_tcscpy(LicPackDesc.szProductName, pKpDesc->szProductName);
//
// pretty format the description
//
_sntprintf(
LicPackDesc.szProductDesc,
sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1,
_TEXT("%s %s"),
szDefProductDesc,
pKpDesc->szProductDesc
);
//
// Ignore error
//
dwStatus = TLSDBKeyPackDescAddEntry(
pDbWkSpace,
&LicPackDesc
);
if(dwStatus == ERROR_SUCCESS)
{
bAddDefDescription = FALSE;
}
}
}
}
if(bAddDefDescription)
{
//
// No existing keypack description, add predefined product description
// "temporary license for <product ID>"
//
LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId;
_tcscpy(LicPackDesc.szCompanyName, LicPack.szCompanyName);
_tcscpy(LicPackDesc.szProductName, LicPackDesc.szProductDesc);
LicPackDesc.dwLanguageId = MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US);
_sntprintf(LicPackDesc.szProductDesc,
sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1,
_TEXT("%s %s"),
USSTRING_TEMPORARY,
pRequest->pszProductId);
dwStatus = TLSDBKeyPackDescAddEntry(
pDbWkSpace,
&LicPackDesc
);
if(GetSystemDefaultLangID() != MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US))
{
LicPackDesc.dwLanguageId = GetSystemDefaultLangID();
_sntprintf(LicPackDesc.szProductDesc,
sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1,
_TEXT("%s %s"),
szDefProductDesc,
pRequest->pszProductId);
dwStatus = TLSDBKeyPackDescAddEntry(
pDbWkSpace,
&LicPackDesc
);
}
}
return dwStatus;
}
//++----------------------------------------------------------
DWORD
TLSDBGetTemporaryLicense(
IN PTLSDbWorkSpace pDbWkSpace,
IN PTLSDBLICENSEREQUEST pRequest,
IN OUT PTLSLICENSEPACK pLicensePack
)
/*++
Abstract:
Allocate a temporary license from temporary license pack.
Parameter:
pDbWkSpace : workspace handle.
pRequest : Product to request license from.
lpdwKeyPackId : return keypack ID that license is allocated from.
lpdwKeyPackLicenseId : license ID for the keypack.
lpdwExpirationDate : expiration date of license pack.
lpucKeyPackStatus : status of keypack.
lpucKeyPackType : type of keypack, always temporary.
Returns:
++*/
{
DWORD dwStatus=ERROR_SUCCESS;
DWORD dump;
TLSLICENSEPACK LicenseKeyPack;
TLSDBLicenseAllocation allocated;
TLSDBAllocateRequest AllocateRequest;
BOOL bAcceptTemp=TRUE;
LicenseKeyPack.pbDomainSid = NULL;
//
// Tell policy module we are about to allocate a license from temporary
// license pack
//
dwStatus = pRequest->pPolicy->PMLicenseRequest(
pRequest->hClient,
REQUEST_TEMPORARY,
NULL,
(PVOID *)&bAcceptTemp
);
//
// Policy Module error
//
if(dwStatus != ERROR_SUCCESS)
{
return dwStatus;
}
//
// Policy module does not accept temporary license
//
if(bAcceptTemp == FALSE)
{
return dwStatus = TLS_I_POLICYMODULETEMPORARYLICENSE;
}
AllocateRequest.ucAgreementType = LSKEYPACKTYPE_TEMPORARY;
AllocateRequest.szCompanyName = (LPTSTR)pRequest->pszCompanyName;
AllocateRequest.szProductId = (LPTSTR)pRequest->pszProductId;
AllocateRequest.dwVersion = pRequest->dwProductVersion;
AllocateRequest.dwPlatformId = pRequest->dwPlatformID;
AllocateRequest.dwLangId = pRequest->dwLanguageID;
AllocateRequest.dwNumLicenses = 1;
AllocateRequest.dwScheme = ALLOCATE_ANY_GREATER_VERSION;
memset(&allocated, 0, sizeof(allocated));
allocated.dwBufSize = 1;
allocated.pdwAllocationVector = &dump;
allocated.lpAllocateKeyPack = &LicenseKeyPack;
dwStatus = TLSDBAddTemporaryKeyPack(
pDbWkSpace,
pRequest,
&LicenseKeyPack
);
if(dwStatus == ERROR_SUCCESS)
{
allocated.dwBufSize = 1;
dwStatus = AllocateLicensesFromDB(
pDbWkSpace,
&AllocateRequest,
TRUE, // fCheckAgreementType
&allocated
);
}
if(dwStatus == ERROR_SUCCESS)
{
*pLicensePack = LicenseKeyPack;
}
else if(dwStatus == TLS_I_NO_MORE_DATA)
{
SetLastError(dwStatus = TLS_E_INTERNAL);
}
return dwStatus;
}