⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 dongle.c

📁 支持SSL v2/v3, TLS, PKCS #5, PKCS #7, PKCS #11, PKCS #12, S/MIME, X.509v3证书等安全协议或标准的开发库编译用到NSPR
💻 C
字号:
/* * The contents of this file are subject to the Mozilla Public * License Version 1.1 (the "License"); you may not use this file * except in compliance with the License. You may obtain a copy of * the License at http://www.mozilla.org/MPL/ *  * Software distributed under the License is distributed on an "AS * IS" basis, WITHOUT WARRANTY OF ANY KIND, either express or * implied. See the License for the specific language governing * rights and limitations under the License. *  * The Original Code is the Netscape security libraries. *  * The Initial Developer of the Original Code is Netscape * Communications Corporation.  Portions created by Netscape are  * Copyright (C) 1994-2000 Netscape Communications Corporation.  All * Rights Reserved. *  * Contributor(s): *  * Alternatively, the contents of this file may be used under the * terms of the GNU General Public License Version 2 or later (the * "GPL"), in which case the provisions of the GPL are applicable  * instead of those above.  If you wish to allow use of your  * version of this file only under the terms of the GPL and not to * allow others to use your version of this file under the MPL, * indicate your decision by deleting the provisions above and * replace them with the notice and other provisions required by * the GPL.  If you do not delete the provisions above, a recipient * may use your version of this file under either the MPL or the * GPL. */#include "secutil.h"#include "sechash.h"#ifdef XP_UNIX#include <unistd.h>#include <netdb.h>#include <sys/types.h>#include <netinet/in.h>#endif#ifdef XP_WIN#include <windows.h>#include <winsock.h>#include <sys/types.h>#include <sys/stat.h>#endif#ifdef XP_MAC#include <unistd.h>#endif#ifdef XP_UNIX#include "prnetdb.h"#else#define PRHostEnt struct hostent#define PR_NETDB_BUF_SIZE 5#endifstatic RC4Context *sec_MakeDongleKey(void){    RC4Context *rc4;    char hostname[64];    PRHostEnt hpbuf, *hent;    char dbbuf[PR_NETDB_BUF_SIZE];    int ipaddr;    struct stat s;    int found = 1; /* Whether /vmunix, etc. found */    unsigned char *buf, *totalbuf;    MD5Context *md5 = 0;    unsigned char digest[16];    unsigned int digestLen;    /* NOTE: Fix MAC and WIN to stat something comparable to kernel on UNIX */#ifdef XP_MAC    return NULL;#elif defined(XP_WIN)    return NULL;#endif    /* gather system data */    if( gethostname( hostname, 64 ) < 0 ) {	return(NULL);    }#ifdef XP_UNIX#ifndef NSPR20    hent = PR_gethostbyname(hostname, &hpbuf, dbbuf, sizeof(dbbuf), 0);#else    if (PR_GetHostByName(hostname, dbbuf, sizeof(dbbuf), &hpbuf) == PR_SUCCESS)	hent = &hpbuf;    else	hent = NULL;#endif#else    hent = gethostbyname(hostname);#endif    if (hent == NULL) {	return(NULL);    }    ipaddr = htonl(((struct in_addr *)hent->h_addr)->s_addr);    /*    ** /unix         IRIX & AIX & SCO    ** /vmunix       SunOS & OSF    ** /kernel/unix  Solaris    ** /vmlinuz      Linux    ** /hp-ux        HP-UX    ** /bsd          BSD    */    if ( (stat("/unix", &s) == -1 ) && (stat("/vmunix", &s) == -1) &&	 (stat("/bsd", &s) == -1) && (stat("kernel/unix", &s)== -1) &&	 (stat("/hp-ux", &s) == -1) && (stat("/vmlinuz", &s) == -1) ) {	found = 0;    }								          buf = totalbuf = (unsigned char *)	XP_CALLOC(1, 1000 + sizeof(ipaddr) + sizeof(s) + PORT_Strlen(hostname));        if ( buf == 0 ) {	return(NULL);    }    PORT_Memcpy(buf, hostname, PORT_Strlen(hostname));    buf += PORT_Strlen(hostname);        PORT_Memcpy(buf, &ipaddr, sizeof(ipaddr));    buf += sizeof(ipaddr);       if (found) {	PORT_Memcpy(buf, &s.st_mode, sizeof(s.st_mode));	buf += sizeof(s.st_mode);    	PORT_Memcpy(buf, &s.st_ino, sizeof(s.st_ino));	buf += sizeof(s.st_ino);		PORT_Memcpy(buf, &s.st_dev, sizeof(s.st_dev));	buf += sizeof(s.st_dev);		PORT_Memcpy(buf, &s.st_mtime, sizeof(s.st_mtime));	buf += sizeof(s.st_mtime);    }    /* Digest the system info using MD5 */    md5 = MD5_NewContext();    if (md5 == NULL) {	return (NULL);    }    MD5_Begin(md5);    MD5_Update(md5, totalbuf, PORT_Strlen((char *)totalbuf));    MD5_End(md5, digest, &digestLen, MD5_LENGTH);    /* Make an RC4 key using the digest */    rc4 = RC4_CreateContext(digest, digestLen);    /* Zero out information */    MD5_DestroyContext(md5, PR_TRUE);    PORT_Memset(digest, 0 , sizeof(digest));       return(rc4);}extern unsigned char *SEC_ReadDongleFile(int fd){    RC4Context *rc4;    struct stat s;    unsigned char *inbuf, *pw;    int nb;    unsigned int pwlen, inlen;    SECStatus rv;        rc4 = sec_MakeDongleKey();    if (rc4 == NULL) {	return(0);    }    /* get size of file */    if ( fstat(fd, &s) < 0 ) {	return(0);    }    inlen = s.st_size;        inbuf = (unsigned char *) PORT_Alloc(inlen);    if (!inbuf) {	return(0);    }    nb = read(fd, (char *)inbuf, inlen);    if (nb != inlen) {	return(0);    }    pw = (unsigned char *) PORT_Alloc(inlen);    if (pw == 0) {	return(0);    }    rv = RC4_Decrypt(rc4, pw, &pwlen, inlen, inbuf, inlen);    if (rv) {	return(0);    }    PORT_Free(inbuf);    return(pw);}extern SECStatusSEC_WriteDongleFile(int fd, unsigned char *pw){    RC4Context *rc4;    unsigned char *outbuf;    unsigned int outlen;    SECStatus rv;    int nb;        rc4 = sec_MakeDongleKey();    if (rc4 == NULL) {	return(SECFailure);    }    outbuf = (unsigned char *) PORT_Alloc(PORT_Strlen((char *)pw) + 1);    if (!outbuf) {	return(SECFailure);    }    rv = RC4_Encrypt(rc4, outbuf, &outlen, PORT_Strlen((char *)pw), pw,		     PORT_Strlen((char *)pw));    if (rv) {	return(SECFailure);    }    RC4_DestroyContext(rc4, PR_TRUE);    nb = write(fd, (char *)outbuf, outlen);    if (nb != outlen) {	return(SECFailure);    }    PORT_Free(outbuf);    return(SECSuccess);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -