1 // SoftEther VPN Source Code - Stable Edition Repository
2 // Cedar Communication Module
3 //
4 // SoftEther VPN Server, Client and Bridge are free software under the Apache License, Version 2.0.
5 //
6 // Copyright (c) Daiyuu Nobori.
7 // Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
8 // Copyright (c) SoftEther Corporation.
9 // Copyright (c) all contributors on SoftEther VPN project in GitHub.
10 //
11 // All Rights Reserved.
12 //
13 // http://www.softether.org/
14 //
15 // This stable branch is officially managed by Daiyuu Nobori, the owner of SoftEther VPN Project.
16 // Pull requests should be sent to the Developer Edition Master Repository on https://github.com/SoftEtherVPN/SoftEtherVPN
17 //
18 // License: The Apache License, Version 2.0
19 // https://www.apache.org/licenses/LICENSE-2.0
20 //
21 // DISCLAIMER
22 // ==========
23 //
24 // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
25 // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
26 // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
27 // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
28 // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
29 // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
30 // SOFTWARE.
31 //
32 // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN, UNDER
33 // JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY, MERGE, PUBLISH,
34 // DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS SOFTWARE, THAT ANY
35 // JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS SOFTWARE OR ITS CONTENTS,
36 // AGAINST US (SOFTETHER PROJECT, SOFTETHER CORPORATION, DAIYUU NOBORI OR OTHER
37 // SUPPLIERS), OR ANY JURIDICAL DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND
38 // OF USING, COPYING, MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING,
39 // AND/OR SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
40 // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO EXCLUSIVE
41 // JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO, JAPAN. YOU MUST WAIVE
42 // ALL DEFENSES OF LACK OF PERSONAL JURISDICTION AND FORUM NON CONVENIENS.
43 // PROCESS MAY BE SERVED ON EITHER PARTY IN THE MANNER AUTHORIZED BY APPLICABLE
44 // LAW OR COURT RULE.
45 //
46 // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS YOU HAVE
47 // A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY CRIMINAL LAWS OR CIVIL
48 // RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS SOFTWARE IN OTHER COUNTRIES IS
49 // COMPLETELY AT YOUR OWN RISK. THE SOFTETHER VPN PROJECT HAS DEVELOPED AND
50 // DISTRIBUTED THIS SOFTWARE TO COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING
51 // CIVIL RIGHTS INCLUDING PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER
52 // COUNTRIES' LAWS OR CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES.
53 // WE HAVE NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
54 // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ COUNTRIES
55 // AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE WORLD, WITH
56 // DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY COUNTRIES' LAWS, REGULATIONS
57 // AND CIVIL RIGHTS TO MAKE THE SOFTWARE COMPLY WITH ALL COUNTRIES' LAWS BY THE
58 // PROJECT. EVEN IF YOU WILL BE SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A
59 // PUBLIC SERVANT IN YOUR COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE
60 // LIABLE TO RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
61 // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT JUST A
62 // STATEMENT FOR WARNING AND DISCLAIMER.
63 //
64 // READ AND UNDERSTAND THE 'WARNING.TXT' FILE BEFORE USING THIS SOFTWARE.
65 // SOME SOFTWARE PROGRAMS FROM THIRD PARTIES ARE INCLUDED ON THIS SOFTWARE WITH
66 // LICENSE CONDITIONS WHICH ARE DESCRIBED ON THE 'THIRD_PARTY.TXT' FILE.
67 //
68 //
69 // SOURCE CODE CONTRIBUTION
70 // ------------------------
71 //
72 // Your contribution to SoftEther VPN Project is much appreciated.
73 // Please send patches to us through GitHub.
74 // Read the SoftEther VPN Patch Acceptance Policy in advance:
75 // http://www.softether.org/5-download/src/9.patch
76 //
77 //
78 // DEAR SECURITY EXPERTS
79 // ---------------------
80 //
81 // If you find a bug or a security vulnerability please kindly inform us
82 // about the problem immediately so that we can fix the security problem
83 // to protect a lot of users around the world as soon as possible.
84 //
85 // Our e-mail address for security reports is:
86 // softether-vpn-security [at] softether.org
87 //
88 // Please note that the above e-mail address is not a technical support
89 // inquiry address. If you need technical assistance, please visit
90 // http://www.softether.org/ and ask your question on the users forum.
91 //
92 // Thank you for your cooperation.
93 //
94 //
95 // NO MEMORY OR RESOURCE LEAKS
96 // ---------------------------
97 //
98 // The memory-leaks and resource-leaks verification under the stress
99 // test has been passed before release this source code.
100
101
102 // Database.c
103 // License database
104
105 #include "CedarPch.h"
106
107 // Get the License status string
LiGetLicenseStatusStr(UINT i)108 wchar_t *LiGetLicenseStatusStr(UINT i)
109 {
110 wchar_t *ret = _UU("LICENSE_STATUS_OTHERERROR");
111
112 switch (i)
113 {
114 case LICENSE_STATUS_OK:
115 ret = _UU("LICENSE_STATUS_OK");
116 break;
117
118 case LICENSE_STATUS_EXPIRED:
119 ret = _UU("LICENSE_STATUS_EXPIRED");
120 break;
121
122 case LICENSE_STATUS_ID_DIFF:
123 ret = _UU("LICENSE_STATUS_ID_DIFF");
124 break;
125
126 case LICENSE_STATUS_DUP:
127 ret = _UU("LICENSE_STATUS_DUP");
128 break;
129
130 case LICENSE_STATUS_INSUFFICIENT:
131 ret = _UU("LICENSE_STATUS_INSUFFICIENT");
132 break;
133
134 case LICENSE_STATUS_COMPETITION:
135 ret = _UU("LICENSE_STATUS_COMPETITION");
136 break;
137
138 case LICENSE_STATUS_NONSENSE:
139 ret = _UU("LICENSE_STATUS_NONSENSE");
140 break;
141
142 case LICENSE_STATUS_CPU:
143 ret = _UU("LICENSE_STATUS_CPU");
144 break;
145 }
146
147 return ret;
148 }
149
150 static char *li_keybit_chars = "ABCDEFGHJKLMNPQRSTUVWXYZ12345678";
151
152 // Convert the string to a key bit
LiStrToKeyBit(UCHAR * keybit,char * keystr)153 bool LiStrToKeyBit(UCHAR *keybit, char *keystr)
154 {
155 UINT x[36];
156 UINT i, wp;
157 char *str;
158 // Validate arguments
159 if (keybit == NULL || keystr == NULL)
160 {
161 return false;
162 }
163
164 str = CopyStr(keystr);
165 Trim(str);
166
167 wp = 0;
168 if (StrLen(str) != 41)
169 {
170 Free(str);
171 return false;
172 }
173
174 for (i = 0;i < 36;i++)
175 {
176 char c = str[wp++];
177 UINT j;
178
179 if (((i % 6) == 5) && (i != 35))
180 {
181 if (str[wp++] != '-')
182 {
183 Free(str);
184 return false;
185 }
186 }
187
188 x[i] = INFINITE;
189 for (j = 0;j < 32;j++)
190 {
191 if (ToUpper(c) == li_keybit_chars[j])
192 {
193 x[i] = j;
194 }
195 }
196
197 if (x[i] == INFINITE)
198 {
199 Free(str);
200 return false;
201 }
202 }
203
204 Zero(keybit, 23);
205
206 keybit[0] = x[0] << 1 | x[1] >> 4;
207 keybit[1] = x[1] << 4 | x[2] >> 1;
208 keybit[2] = x[2] << 7 | x[3] << 2 | x[4] >> 3;
209 keybit[3] = x[4] << 5 | x[5];
210
211 keybit[4] = x[6] << 3 | x[7] >> 2;
212 keybit[5] = x[7] << 6 | x[8] << 1 | x[9] >> 4;
213 keybit[6] = x[9] << 4 | x[10] >> 1;
214 keybit[7] = x[10] << 7 | x[11] << 2 | x[12] >> 3;
215 keybit[8] = x[12] << 5 | x[13];
216
217 keybit[9] = x[14] << 3 | x[15] >> 2;
218 keybit[10] = x[15] << 6 | x[16] << 1 | x[17] >> 4;
219 keybit[11] = x[17] << 4 | x[18] >> 1;
220 keybit[12] = x[18] << 7 | x[19] << 2 | x[20] >> 3;
221 keybit[13] = x[20] << 5 | x[21];
222
223 keybit[14] = x[22] << 3 | x[23] >> 2;
224 keybit[15] = x[23] << 6 | x[24] << 1 | x[25] >> 4;
225 keybit[16] = x[25] << 4 | x[26] >> 1;
226 keybit[17] = x[26] << 7 | x[27] << 2 | x[28] >> 3;
227 keybit[18] = x[28] << 5 | x[29];
228
229 keybit[19] = x[30] << 3 | x[31] >> 2;
230 keybit[20] = x[31] << 6 | x[32] << 1 | x[33] >> 4;
231 keybit[21] = x[33] << 4 | x[34] >> 1;
232 keybit[22] = x[34] << 7 | x[35] << 2;
233
234 Free(str);
235
236 return true;
237 }
238
239 // Determine whether the string is a license key
LiIsLicenseKey(char * str)240 bool LiIsLicenseKey(char *str)
241 {
242 UCHAR keybit[23];
243 // Validate arguments
244 if (str == NULL)
245 {
246 return false;
247 }
248
249 if (LiStrToKeyBit(keybit, str) == false)
250 {
251 return false;
252 }
253
254 return true;
255 }
256
257