//+-------------------------------------------------------------------------- // // Microsoft Windows // Copyright (C) Microsoft Corporation, 1996-1998 // // File: templic.cpp // // Contents: // all routine deal with temporary license // // History: // Feb 4, 98 HueiWang Created //--------------------------------------------------------------------------- #include "pch.cpp" #include "globals.h" #include "templic.h" #include "misc.h" #include "db.h" #include "clilic.h" #include "keypack.h" #include "kp.h" #include "lkpdesc.h" #define USSTRING_TEMPORARY _TEXT("Temporary Licenses for") DWORD TLSDBGetTemporaryLicense( IN PTLSDbWorkSpace pDbWkSpace, IN PTLSDBLICENSEREQUEST pRequest, IN OUT PTLSLICENSEPACK pLicensePack ); //+------------------------------------------------------------- DWORD TLSDBIssueTemporaryLicense( IN PTLSDbWorkSpace pDbWkSpace, IN PTLSDBLICENSEREQUEST pRequest, IN FILETIME* pNotBefore, IN FILETIME* pNotAfter, IN OUT PTLSDBLICENSEDPRODUCT pLicensedProduct ) /*++ Abstract: Issue a temporary license, insert a temporary license pack if necessary Parameters: pDbWkSpace - workspace handle. pRequest - license request. Returns: Note: Seperate routine for issuing perm license just in case we decide to use our own format for temp. license ++*/ { DWORD dwStatus=ERROR_SUCCESS; ULARGE_INTEGER ulSerialNumber; DWORD dwLicenseId; LPTSTR lpRequest=NULL; LICENSEDCLIENT issuedLicense; TLSLICENSEPACK LicensePack; PMGENERATELICENSE PolModGenLicense; PPMCERTEXTENSION pPolModCertExtension=NULL; FILETIME notBefore, notAfter; // ---------------------------------------------------------- // Issue license memset(&ulSerialNumber, 0, sizeof(ulSerialNumber)); //----------------------------------------------------------------------------- // this step require reduce available license by 1 // long numLicense=1; dwStatus=TLSDBGetTemporaryLicense( pDbWkSpace, pRequest, &LicensePack ); if(dwStatus != ERROR_SUCCESS) { goto cleanup; } if((LicensePack.ucAgreementType & ~LSKEYPACK_RESERVED_TYPE) != LSKEYPACKTYPE_TEMPORARY && (LicensePack.ucKeyPackStatus & ~LSKEYPACKSTATUS_RESERVED) != LSKEYPACKSTATUS_TEMPORARY ) { SetLastError(dwStatus = TLS_E_INTERNAL); TLSASSERT(FALSE); goto cleanup; } // reset status dwStatus = ERROR_SUCCESS; dwLicenseId=TLSDBGetNextLicenseId(); ulSerialNumber.LowPart = dwLicenseId; ulSerialNumber.HighPart = LicensePack.dwKeyPackId; // // Update License Table Here // memset(&issuedLicense, 0, sizeof(LICENSEDCLIENT)); issuedLicense.dwLicenseId = dwLicenseId; issuedLicense.dwKeyPackId = LicensePack.dwKeyPackId; issuedLicense.dwKeyPackLicenseId = LicensePack.dwNextSerialNumber; issuedLicense.dwNumLicenses = 1; if(pNotBefore == NULL || pNotAfter == NULL) { issuedLicense.ftIssueDate = time(NULL); issuedLicense.ftExpireDate = issuedLicense.ftIssueDate + g_GracePeriod * 24 * 60 * 60; } else { FileTimeToLicenseDate(pNotBefore, &(issuedLicense.ftIssueDate)); FileTimeToLicenseDate(pNotAfter, &(issuedLicense.ftExpireDate)); } issuedLicense.ucLicenseStatus = LSLICENSE_STATUS_TEMPORARY; _tcscpy(issuedLicense.szMachineName, pRequest->szMachineName); _tcscpy(issuedLicense.szUserName, pRequest->szUserName); issuedLicense.dwSystemBiosChkSum = pRequest->hWid.dwPlatformID; issuedLicense.dwVideoBiosChkSum = pRequest->hWid.Data1; issuedLicense.dwFloppyBiosChkSum = pRequest->hWid.Data2; issuedLicense.dwHardDiskSize = pRequest->hWid.Data3; issuedLicense.dwRamSize = pRequest->hWid.Data4; UnixTimeToFileTime(issuedLicense.ftIssueDate, ¬Before); UnixTimeToFileTime(issuedLicense.ftExpireDate, ¬After); // // Inform Policy Module of license generation. // PolModGenLicense.pLicenseRequest = pRequest->pPolicyLicenseRequest; PolModGenLicense.dwKeyPackType = LSKEYPACKTYPE_TEMPORARY; PolModGenLicense.dwKeyPackId = LicensePack.dwKeyPackId; PolModGenLicense.dwKeyPackLicenseId = LicensePack.dwNextSerialNumber; PolModGenLicense.ClientLicenseSerialNumber = ulSerialNumber; PolModGenLicense.ftNotBefore = notBefore; PolModGenLicense.ftNotAfter = notAfter; dwStatus = pRequest->pPolicy->PMLicenseRequest( pRequest->hClient, REQUEST_GENLICENSE, (PVOID)&PolModGenLicense, (PVOID *)&pPolModCertExtension ); if(dwStatus != ERROR_SUCCESS) { // // Error in policy module // goto cleanup; } // // Check error return from policy module // if(pPolModCertExtension != NULL) { if(pPolModCertExtension->pbData != NULL && pPolModCertExtension->cbData == 0 || pPolModCertExtension->pbData == NULL && pPolModCertExtension->cbData != 0 ) { // assuming no extension data pPolModCertExtension->cbData = 0; pPolModCertExtension->pbData = NULL; } if(CompareFileTime(&(pPolModCertExtension->ftNotBefore), &(pPolModCertExtension->ftNotAfter)) > 0) { // // invalid data return from policy module // TLSLogEvent( EVENTLOG_ERROR_TYPE, TLS_E_GENERATECLIENTELICENSE, dwStatus = TLS_E_POLICYMODULEERROR, pRequest->pPolicy->GetCompanyName(), pRequest->pPolicy->GetProductId() ); goto cleanup; } // // do not accept changes to license expiration date // if(pNotBefore != NULL && pNotAfter != NULL) { if( FileTimeToLicenseDate(&(pPolModCertExtension->ftNotBefore), &issuedLicense.ftIssueDate) == FALSE || FileTimeToLicenseDate(&(pPolModCertExtension->ftNotAfter), &issuedLicense.ftExpireDate) == FALSE ) { // // Invalid data return from policy module // TLSLogEvent( EVENTLOG_ERROR_TYPE, TLS_E_GENERATECLIENTELICENSE, dwStatus = TLS_E_POLICYMODULEERROR, pRequest->pPolicy->GetCompanyName(), pRequest->pPolicy->GetProductId() ); goto cleanup; } } notBefore = pPolModCertExtension->ftNotBefore; notAfter = pPolModCertExtension->ftNotAfter; } // // Add license into license table // dwStatus = TLSDBLicenseAdd( pDbWkSpace, &issuedLicense, 0, NULL ); // // Return licensed product // pLicensedProduct->pSubjectPublicKeyInfo = NULL; pLicensedProduct->dwQuantity = 1; pLicensedProduct->ulSerialNumber = ulSerialNumber; pLicensedProduct->dwKeyPackId = LicensePack.dwKeyPackId; pLicensedProduct->dwLicenseId = dwLicenseId; pLicensedProduct->dwKeyPackLicenseId = LicensePack.dwNextSerialNumber; pLicensedProduct->ClientHwid = pRequest->hWid; pLicensedProduct->bTemp = TRUE; pLicensedProduct->NotBefore = notBefore; pLicensedProduct->NotAfter = notAfter; pLicensedProduct->dwProductVersion = MAKELONG(LicensePack.wMinorVersion, LicensePack.wMajorVersion); _tcscpy(pLicensedProduct->szCompanyName, LicensePack.szCompanyName); _tcscpy(pLicensedProduct->szLicensedProductId, LicensePack.szProductId); _tcscpy(pLicensedProduct->szRequestProductId, pRequest->pClientLicenseRequest->pszProductId); _tcscpy(pLicensedProduct->szUserName, pRequest->szUserName); _tcscpy(pLicensedProduct->szMachineName, pRequest->szMachineName); pLicensedProduct->dwLanguageID = pRequest->dwLanguageID; pLicensedProduct->dwPlatformID = pRequest->dwPlatformID; pLicensedProduct->pbPolicyData = (pPolModCertExtension) ? pPolModCertExtension->pbData : NULL; pLicensedProduct->cbPolicyData = (pPolModCertExtension) ? pPolModCertExtension->cbData : 0; cleanup: return dwStatus; } //----------------------------------------------------------------- DWORD TLSDBAddTemporaryKeyPack( IN PTLSDbWorkSpace pDbWkSpace, IN PTLSDBLICENSEREQUEST pRequest, IN OUT LPTLSLICENSEPACK lpTmpKeyPackAdd ) /*++ Abstract: Add a temporary keypack into database. Parameter: pDbWkSpace : workspace handle. szCompanyName : szProductId : dwVersion : dwPlatformId : dwLangId : lpTmpKeyPackAdd : added keypack. Returns: ++*/ { DWORD dwStatus; TLSLICENSEPACK LicPack; TLSLICENSEPACK existingLicPack; LICPACKDESC LicPackDesc; LICPACKDESC existingLicPackDesc; BOOL bAddDefDescription=FALSE; TCHAR szDefProductDesc[LSERVER_MAX_STRING_SIZE]; int count=0; memset(&LicPack, 0, sizeof(TLSLICENSEPACK)); memset(&existingLicPack, 0, sizeof(TLSLICENSEPACK)); memset(&LicPackDesc, 0, sizeof(LICPACKDESC)); memset(szDefProductDesc, 0, sizeof(szDefProductDesc)); memset(&existingLicPackDesc, 0, sizeof(LICPACKDESC)); // // Load product description prefix // LoadResourceString( IDS_TEMPORARY_PRODUCTDESC, szDefProductDesc, sizeof(szDefProductDesc) / sizeof(szDefProductDesc[0]) ); LicPack.ucAgreementType = LSKEYPACKTYPE_TEMPORARY; _tcsncpy( LicPack.szCompanyName, pRequest->pszCompanyName, min(_tcslen(pRequest->pszCompanyName), LSERVER_MAX_STRING_SIZE) ); _tcsncpy( LicPack.szProductId, pRequest->pszProductId, min(_tcslen(pRequest->pszProductId), LSERVER_MAX_STRING_SIZE) ); _tcsncpy( LicPack.szInstallId, (LPTSTR)g_pszServerPid, min(_tcslen((LPTSTR)g_pszServerPid), LSERVER_MAX_STRING_SIZE) ); _tcsncpy( LicPack.szTlsServerName, g_szComputerName, min(_tcslen(g_szComputerName), LSERVER_MAX_STRING_SIZE) ); LicPack.wMajorVersion = HIWORD(pRequest->dwProductVersion); LicPack.wMinorVersion = LOWORD(pRequest->dwProductVersion); LicPack.dwPlatformType = pRequest->dwPlatformID; LicPack.ucChannelOfPurchase = LSKEYPACKCHANNELOFPURCHASE_UNKNOWN; LicPack.dwTotalLicenseInKeyPack = INT_MAX; LoadResourceString( IDS_TEMPORARY_KEYPACKID, LicPack.szKeyPackId, sizeof(LicPack.szKeyPackId)/sizeof(LicPack.szKeyPackId[0]) ); LoadResourceString( IDS_TEMPORARY_BSERIALNUMBER, LicPack.szBeginSerialNumber, sizeof(LicPack.szBeginSerialNumber)/sizeof(LicPack.szBeginSerialNumber[0]) ); do { // // Add entry into keypack table. // dwStatus = TLSDBKeyPackAdd( pDbWkSpace, &LicPack ); *lpTmpKeyPackAdd = LicPack; LicPack.pbDomainSid = NULL; LicPack.cbDomainSid = 0; if(dwStatus == TLS_E_DUPLICATE_RECORD) { // // temporary keypack already exist // dwStatus = ERROR_SUCCESS; break; } else if(dwStatus != ERROR_SUCCESS) { // // some other error occurred // break; } // // Activate KeyPack // LicPack.ucKeyPackStatus = LSKEYPACKSTATUS_TEMPORARY; LicPack.dwActivateDate = (DWORD) time(NULL); LicPack.dwExpirationDate = INT_MAX; LicPack.dwNumberOfLicenses = 0; dwStatus=TLSDBKeyPackSetValues( pDbWkSpace, FALSE, LSKEYPACK_SET_ACTIVATEDATE | LSKEYPACK_SET_KEYPACKSTATUS | LSKEYPACK_SET_EXPIREDATE | LSKEYPACK_EXSEARCH_AVAILABLE, &LicPack ); bAddDefDescription = TRUE; // // Find existing keypack description // dwStatus = TLSDBKeyPackEnumBegin( pDbWkSpace, TRUE, LSKEYPACK_SEARCH_PRODUCTID | LSKEYPACK_SEARCH_COMPANYNAME | LSKEYPACK_SEARCH_PLATFORMTYPE, &LicPack ); if(dwStatus != ERROR_SUCCESS) break; do { dwStatus = TLSDBKeyPackEnumNext( pDbWkSpace, &existingLicPack ); if(existingLicPack.dwKeyPackId != LicPack.dwKeyPackId) { break; } } while(dwStatus == ERROR_SUCCESS); TLSDBKeyPackEnumEnd(pDbWkSpace); if(dwStatus != ERROR_SUCCESS || existingLicPack.dwKeyPackId != LicPack.dwKeyPackId) { break; } // // Copy existing keypack description into keypack description table // existingLicPackDesc.dwKeyPackId = existingLicPack.dwKeyPackId; dwStatus = TLSDBKeyPackDescEnumBegin( pDbWkSpace, TRUE, LICPACKDESCRECORD_TABLE_SEARCH_KEYPACKID, &existingLicPackDesc ); while(dwStatus == ERROR_SUCCESS) { dwStatus = TLSDBKeyPackDescEnumNext( pDbWkSpace, &existingLicPackDesc ); if(dwStatus != ERROR_SUCCESS) break; LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId; LicPackDesc.dwLanguageId = existingLicPackDesc.dwLanguageId; _tcscpy(LicPackDesc.szCompanyName, existingLicPackDesc.szCompanyName); _tcscpy(LicPackDesc.szProductName, existingLicPackDesc.szProductName); // // pretty format the description // _sntprintf( LicPackDesc.szProductDesc, sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1, _TEXT("%s %s"), (existingLicPackDesc.dwLanguageId != GetSystemDefaultLangID()) ? USSTRING_TEMPORARY : szDefProductDesc, existingLicPackDesc.szProductDesc ); // quick and dirty fix, // // TODO - need to do a duplicate table then use the duplicate handle to // insert the record, SetValue uses enumeration to verify if record exist // which fail because we are already in enumeration // if(pDbWkSpace->m_LicPackDescTable.InsertRecord(LicPackDesc) != TRUE) { SetLastError(dwStatus = SET_JB_ERROR(pDbWkSpace->m_LicPackDescTable.GetLastJetError())); break; } //dwStatus = TLSDBKeyPackDescSetValue( // pDbWkSpace, // KEYPACKDESC_SET_ADD_ENTRY, // &keyPackDesc // ); count++; } if(count != 0) { bAddDefDescription = FALSE; } if(dwStatus == TLS_I_NO_MORE_DATA) { dwStatus = ERROR_SUCCESS; } } while(FALSE); if(bAddDefDescription) { // // ask policy module if they have description // PMKEYPACKDESCREQ kpDescReq; PPMKEYPACKDESC pKpDesc; // // Ask for English description // kpDescReq.pszProductId = pRequest->pszProductId; kpDescReq.dwLangId = MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US); kpDescReq.dwVersion = pRequest->dwProductVersion; pKpDesc = NULL; dwStatus = pRequest->pPolicy->PMLicenseRequest( pRequest->hClient, REQUEST_KEYPACKDESC, (PVOID)&kpDescReq, (PVOID *)&pKpDesc ); if(dwStatus == ERROR_SUCCESS && pKpDesc != NULL) { LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId; LicPackDesc.dwLanguageId = MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US); _tcscpy(LicPackDesc.szCompanyName, pKpDesc->szCompanyName); _tcscpy(LicPackDesc.szProductName, pKpDesc->szProductName); // // pretty format the description // _sntprintf( LicPackDesc.szProductDesc, sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1, _TEXT("%s %s"), USSTRING_TEMPORARY, // US langid, don't use localized one pKpDesc->szProductDesc ); // // Ignore error // dwStatus = TLSDBKeyPackDescAddEntry( pDbWkSpace, &LicPackDesc ); if(dwStatus == ERROR_SUCCESS) { bAddDefDescription = FALSE; } } if(GetSystemDefaultLangID() != kpDescReq.dwLangId) { // // Get System default language id // kpDescReq.pszProductId = pRequest->pszProductId; kpDescReq.dwLangId = GetSystemDefaultLangID(); kpDescReq.dwVersion = pRequest->dwProductVersion; pKpDesc = NULL; dwStatus = pRequest->pPolicy->PMLicenseRequest( pRequest->hClient, REQUEST_KEYPACKDESC, (PVOID)&kpDescReq, (PVOID *)&pKpDesc ); if(dwStatus == ERROR_SUCCESS && pKpDesc != NULL) { LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId; LicPackDesc.dwLanguageId = GetSystemDefaultLangID(); _tcscpy(LicPackDesc.szCompanyName, pKpDesc->szCompanyName); _tcscpy(LicPackDesc.szProductName, pKpDesc->szProductName); // // pretty format the description // _sntprintf( LicPackDesc.szProductDesc, sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1, _TEXT("%s %s"), szDefProductDesc, pKpDesc->szProductDesc ); // // Ignore error // dwStatus = TLSDBKeyPackDescAddEntry( pDbWkSpace, &LicPackDesc ); if(dwStatus == ERROR_SUCCESS) { bAddDefDescription = FALSE; } } } } if(bAddDefDescription) { // // No existing keypack description, add predefined product description // "temporary license for " // LicPackDesc.dwKeyPackId = LicPack.dwKeyPackId; _tcscpy(LicPackDesc.szCompanyName, LicPack.szCompanyName); _tcscpy(LicPackDesc.szProductName, LicPackDesc.szProductDesc); LicPackDesc.dwLanguageId = MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US); _sntprintf(LicPackDesc.szProductDesc, sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1, _TEXT("%s %s"), USSTRING_TEMPORARY, pRequest->pszProductId); dwStatus = TLSDBKeyPackDescAddEntry( pDbWkSpace, &LicPackDesc ); if(GetSystemDefaultLangID() != MAKELANGID(LANG_ENGLISH, SUBLANG_ENGLISH_US)) { LicPackDesc.dwLanguageId = GetSystemDefaultLangID(); _sntprintf(LicPackDesc.szProductDesc, sizeof(LicPackDesc.szProductDesc)/sizeof(LicPackDesc.szProductDesc[0])-1, _TEXT("%s %s"), szDefProductDesc, pRequest->pszProductId); dwStatus = TLSDBKeyPackDescAddEntry( pDbWkSpace, &LicPackDesc ); } } return dwStatus; } //++---------------------------------------------------------- DWORD TLSDBGetTemporaryLicense( IN PTLSDbWorkSpace pDbWkSpace, IN PTLSDBLICENSEREQUEST pRequest, IN OUT PTLSLICENSEPACK pLicensePack ) /*++ Abstract: Allocate a temporary license from temporary license pack. Parameter: pDbWkSpace : workspace handle. pRequest : Product to request license from. lpdwKeyPackId : return keypack ID that license is allocated from. lpdwKeyPackLicenseId : license ID for the keypack. lpdwExpirationDate : expiration date of license pack. lpucKeyPackStatus : status of keypack. lpucKeyPackType : type of keypack, always temporary. Returns: ++*/ { DWORD dwStatus=ERROR_SUCCESS; DWORD dump; TLSLICENSEPACK LicenseKeyPack; TLSDBLicenseAllocation allocated; TLSDBAllocateRequest AllocateRequest; BOOL bAcceptTemp=TRUE; LicenseKeyPack.pbDomainSid = NULL; // // Tell policy module we are about to allocate a license from temporary // license pack // dwStatus = pRequest->pPolicy->PMLicenseRequest( pRequest->hClient, REQUEST_TEMPORARY, NULL, (PVOID *)&bAcceptTemp ); // // Policy Module error // if(dwStatus != ERROR_SUCCESS) { return dwStatus; } // // Policy module does not accept temporary license // if(bAcceptTemp == FALSE) { return dwStatus = TLS_I_POLICYMODULETEMPORARYLICENSE; } AllocateRequest.ucAgreementType = LSKEYPACKTYPE_TEMPORARY; AllocateRequest.szCompanyName = (LPTSTR)pRequest->pszCompanyName; AllocateRequest.szProductId = (LPTSTR)pRequest->pszProductId; AllocateRequest.dwVersion = pRequest->dwProductVersion; AllocateRequest.dwPlatformId = pRequest->dwPlatformID; AllocateRequest.dwLangId = pRequest->dwLanguageID; AllocateRequest.dwNumLicenses = 1; AllocateRequest.dwScheme = ALLOCATE_ANY_GREATER_VERSION; memset(&allocated, 0, sizeof(allocated)); allocated.dwBufSize = 1; allocated.pdwAllocationVector = &dump; allocated.lpAllocateKeyPack = &LicenseKeyPack; dwStatus = TLSDBAddTemporaryKeyPack( pDbWkSpace, pRequest, &LicenseKeyPack ); if(dwStatus == ERROR_SUCCESS) { allocated.dwBufSize = 1; dwStatus = AllocateLicensesFromDB( pDbWkSpace, &AllocateRequest, TRUE, // fCheckAgreementType &allocated ); } if(dwStatus == ERROR_SUCCESS) { *pLicensePack = LicenseKeyPack; } else if(dwStatus == TLS_I_NO_MORE_DATA) { SetLastError(dwStatus = TLS_E_INTERNAL); } return dwStatus; }