/*===================================================================== File: SBActivation.cpp THIS CODE AND INFORMATION IS PROVIDED "AS IS" WITHOUT WARRANTY OF ANY KIND, EITHER EXPRESSED OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE IMPLIED WARRANTIES OF MERCHANTABILITY AND/OR FITNESS FOR A PARTICULAR PURPOSE. Copyright (C) Microsoft Corporation. All rights reserved. =====================================================================*/ // // This sample shows how to Activate a machine and user using a // server lockbox with the DRMSetGlobalOptions API. This sample // will not work with a V1 client. See the comments at the beginning // of wmain() for a more detailed description. // #include #include #include #include "msdrm.h" #include "msdrmdefs.h" #include "msdrmerror.h" // // Time to wait for "downloads" to complete // static const DWORD DW_WAIT_TIME_SECONDS = 60 * 1000; // // struct to hold the callback information // typedef struct Drm_Context { HANDLE hEvent; HRESULT hr; } DRM_CONTEXT, *PDRM_CONTEXT; // // Print the correct usage of this application // void PrintUsage() { wprintf( L"\nUsage:\n" ); wprintf( L"\n SBActivation -U UserID [-A ActivationSvr]\n" ); wprintf( L" -U: specifies the UserID.\n" ); wprintf( L" example: user@yourdomain.com\n" ); wprintf( L" -A: specifies the Activation Server. (optional)\n" ); wprintf( L" example: http://localhost/_wmcs/certification\n" ); } // // Parse the values passed in through the command line // HRESULT ParseCommandLine( int argc, __in_ecount( argc )WCHAR **argv, __deref_out_opt PWCHAR *pwszUserID, __deref_out PWCHAR *pwszActivationSvr ) { HRESULT hr = S_OK; size_t uiUserIDLength = 0; size_t uiUrlLength = 0; // // Initialize parameters // *pwszUserID = NULL; // // Check input parameters. // if ( ( 3 != argc ) && ( 5 != argc ) ) { return E_INVALIDARG; } for( int i = 1; SUCCEEDED( hr ) && i < argc - 1; i ++ ) { if ( ( '-' != argv[ i ][ 0 ] ) && ( '/' != argv[ i ][ 0 ] ) ) { hr = E_INVALIDARG; break; } else if ( ( '-' == argv[ i + 1 ][ 0 ] ) || ( '/' == argv[ i + 1 ][ 0 ] ) ) { hr = E_INVALIDARG; break; } switch( toupper( argv[ i ][ 1 ] ) ) { // // User ID // case 'U': if ( wcsstr( argv[ i + 1 ], ( wchar_t* )L"@\0" ) == NULL ) { // // An invalid User ID was provided // hr = E_INVALIDARG; break; } // // Retrieve the length of the user ID // hr = StringCchLengthW( argv[ i + 1 ], STRSAFE_MAX_CCH, &uiUserIDLength ); if ( FAILED( hr ) ) { wprintf( L"StringCchLengthW failed. hr = 0x%x\n", hr ); break; } // // Allocate memory for the user ID // *pwszUserID = new WCHAR[ uiUserIDLength + 1 ]; if ( NULL == *pwszUserID ) { wprintf( L"Failed to allocate memory for pwszUserID.\n" ); hr = E_OUTOFMEMORY; break; } // // Copy the URL into the pwszUserID buffer // hr = StringCchCopyW( (wchar_t*)*pwszUserID, uiUserIDLength + 1 , argv[ i + 1 ] ); if ( FAILED( hr ) ) { wprintf( L"StringCchCopyW failed. hr = 0x%x\n", hr ); break; } i++; break; case 'A': if ( ( _wcsnicmp( argv[ i + 1 ], L"http://", 7 ) != 0 ) && ( _wcsnicmp( argv[ i + 1 ], L"https://", 8 ) != 0 ) ) { wprintf( L"Invalid URL provided.\n" ); hr = E_INVALIDARG; break; } // // Retrieve the length of the activation server URL // hr = StringCchLengthW( argv[ i + 1 ], STRSAFE_MAX_CCH, &uiUrlLength ); if ( FAILED( hr ) ) { wprintf( L"StringCchLengthW failed. hr = 0x%x\n", hr ); break; } // // Allocate memory for the URL // *pwszActivationSvr = new WCHAR[ uiUrlLength + 1 ]; if( NULL == *pwszActivationSvr ) { wprintf( L"Failed to allocate memory "\ L"for pwszActivationSvr.\n" ); hr = E_OUTOFMEMORY; break; } // // Copy the URL into the pwszActivationSvr buffer // hr = StringCchCopyW( (wchar_t*)*pwszActivationSvr, uiUrlLength + 1 , argv[ i + 1 ] ); if ( FAILED( hr ) ) { wprintf( L"StringCchCopyW failed. hr = 0x%x\n", hr ); break; } i++; break; default: hr = E_INVALIDARG; break; } if ( NULL == *pwszUserID ) { wprintf( L"\nA user ID value is required.\n" ); hr = E_INVALIDARG; } } return hr; } // // Callback function for asynchronous ADRMS client functions // HRESULT __stdcall StatusCallback( DRM_STATUS_MSG msg, HRESULT hr, void *pvParam, void *pvContext ) { PDRM_CONTEXT pContext = ( PDRM_CONTEXT )pvContext; if ( pContext ) { pContext->hr = hr; } else { return E_FAIL; } pvParam = NULL; if ( FAILED( pContext->hr ) && pContext->hEvent ) { // // Signal the event // SetEvent( ( HANDLE )pContext->hEvent ); return S_OK; } // // Print the callback status message // switch( msg ) { case DRM_MSG_ACTIVATE_MACHINE: wprintf( L"\nCallback status msg = DRM_MSG_ACTIVATE_MACHINE " ); break; case DRM_MSG_ACTIVATE_GROUPIDENTITY: wprintf( L"\nCallback status msg = DRM_MSG_ACTIVATE_GROUPIDENTITY " ); break; default: wprintf( L"\nDefault callback status msg = 0x%x ", msg ); break; } // // Print the callback error code // switch( pContext->hr ) { case S_DRM_ALREADY_ACTIVATED: wprintf( L"Callback hr = S_DRM_ALREADY_ACTIVATED\n" ); break; case S_DRM_CONNECTING: wprintf( L"Callback hr = S_DRM_CONNECTING\n" ); break; case S_DRM_CONNECTED: wprintf( L"Callback hr = S_DRM_CONNECTED\n" ); break; case S_DRM_INPROGRESS: wprintf( L"Callback hr = S_DRM_INPROGRESS\n" ); break; case S_DRM_COMPLETED: wprintf( L"Callback hr = S_DRM_COMPLETED\n" ); pContext->hr = S_OK; if ( pContext->hEvent ) { SetEvent( ( HANDLE )pContext->hEvent ); } break; case E_DRM_ACTIVATIONFAILED: wprintf( L"Callback hr = E_DRM_ACTIVATIONFAILED\n" ); break; case E_DRM_HID_CORRUPTED: wprintf( L"Callback hr = E_DRM_HID_CORRUPTED\n" ); break; case E_DRM_INSTALLATION_FAILED: wprintf( L"Callback hr = E_DRM_INSTALLATION_FAILED\n" ); break; case E_DRM_ALREADY_IN_PROGRESS: wprintf( L"Callback hr = E_DRM_ALREADY_IN_PROGRESS\n" ); break; case E_DRM_NO_CONNECT: wprintf( L"Callback hr = E_DRM_NO_CONNECT\n" ); break; case E_DRM_ABORTED: wprintf( L"Callback hr = E_DRM_ABORTED\n" ); break; case E_DRM_SERVER_ERROR: wprintf( L"Callback hr = E_DRM_SERVER_ERROR\n" ); break; case E_DRM_INVALID_SERVER_RESPONSE: wprintf( L"Callback hr = E_DRM_INVALID_SERVER_RESPONSE\n" ); break; case E_DRM_SERVER_NOT_FOUND: wprintf( L"Callback hr = E_DRM_SERVER_NOT_FOUND\n" ); break; case E_DRM_AUTHENTICATION_FAILED: wprintf( L"Callback hr = E_DRM_AUTHENTICATION_FAILED\n" ); break; case E_DRM_EMAIL_NOT_VERIFIED: wprintf( L"Callback hr = E_DRM_EMAIL_NOT_VERIFIED\n" ); break; case E_DRM_AD_ENTRY_NOT_FOUND: wprintf( L"Callback hr = E_DRM_AD_ENTRY_NOT_FOUND\n" ); break; case E_DRM_NEEDS_MACHINE_ACTIVATION: wprintf( L"Callback hr = E_DRM_NEEDS_MACHINE_ACTIVATION\n" ); break; case E_DRM_REQUEST_DENIED: wprintf( L"Callback hr = E_DRM_REQUEST_DENIED\n" ); break; case E_DRM_INVALID_EMAIL: wprintf( L"Callback hr = E_DRM_INVALID_EMAIL\n" ); break; case E_DRM_SERVICE_GONE: wprintf( L"Callback hr = E_DRM_SERVICE_GONE\n" ); break; case E_DRM_SERVICE_MOVED: wprintf( L"Callback hr = E_DRM_SERVICE_MOVED\n" ); break; case E_DRM_VALIDITYTIME_VIOLATION: wprintf( L"Callback hr = E_DRM_VALIDITYTIME_VIOLATION\n" ); break; default: wprintf( L"Default callback hr = 0x%x\n", hr ); pContext->hr = S_OK; if ( pContext->hEvent ) { SetEvent( ( HANDLE )pContext->hEvent ); } break; } return S_OK; } // // This sample will perform the following actions: // 1. Call DRMSetGlobalOptions to specify the use of the server box // 2. Call DRMSetGlobalOptions to specify the use of WinHTTP // 3. Create an event for the callback function // 4. Create a client session // 5. Determine if the machine needs to be activated // 6. Call DRMActivate to activate the machine if it's not activated // 7. Wait for the callback to return // 8. Populate the wszURL member of the DRM_ACTSERV_INFO struct // with the activation server URL. This value can be from: // (a) a command line argument // (b) service discovery // 9. Activate the user // 10. Wait for the callback to return // 11. Clean up and free memory // int __cdecl wmain( int argc, __in_ecount( argc )WCHAR **argv ) { HRESULT hr = E_FAIL; DRM_ACTSERV_INFO *pdasi = NULL; DRMHSESSION hClient = NULL; HANDLE hEvent = NULL; PWCHAR wszUserId = NULL; size_t cchUserId = 0; PWCHAR wszActivationSvr = NULL; UINT uiStrLen = 0; DWORD dwWaitResult; DRM_CONTEXT context; context.hEvent = NULL; if ( FAILED ( ParseCommandLine( argc, argv, &wszUserId, &wszActivationSvr ) ) ) { PrintUsage(); goto e_Exit; } wprintf( L"\nRunning sample SBActivation...\n" ); // // 1. Call DRMSetGlobalOptions to use the server lockbox // hr = DRMSetGlobalOptions( DRMGLOBALOPTIONS_USE_SERVERSECURITYPROCESSOR, NULL, 0 ); if ( FAILED( hr ) ) { wprintf( L"\nDRMSetGlobalOptions "\ L"(DRMGLOBALOPTIONS_USE_SERVERSECURITYPROCESSOR) "\ L"failed. hr = 0x%x\n", hr ); goto e_Exit; } // // 2. Call DRMSetGlobalOptions to use WinHTTP // hr = DRMSetGlobalOptions( DRMGLOBALOPTIONS_USE_WINHTTP, NULL, 0 ); if ( FAILED( hr ) ) { wprintf( L"\nDRMSetGlobalOptions "\ L"(DRMGLOBALOPTIONS_USE_WINHTTP) "\ L"failed. hr = 0x%x\n", hr ); goto e_Exit; } // // 3. Create an event for StatusCallback() to signal it has completed. // if ( NULL == ( context.hEvent = CreateEvent( NULL, FALSE, FALSE, NULL ) ) ) { wprintf( L"\ncontext.hEvent was NULL after the CreateEvent call" ); goto e_Exit; } // // 4. Create a client session // hr = DRMCreateClientSession( &StatusCallback, 0, DRM_DEFAULTGROUPIDTYPE_WINDOWSAUTH, wszUserId, &hClient ); if ( FAILED( hr ) ) { wprintf( L"\nDRMCreateClientSession failed. hr = 0x%x\n", hr ); goto e_Exit; } // // 5. Call DRMIsActivated to determine if the machine is already activated // hr = DRMIsActivated( hClient, DRM_ACTIVATE_MACHINE, NULL ); if ( SUCCEEDED( hr ) ) { wprintf( L"\nThe machine is already activated.\n" ); } // // 6. If the machine needs to be activated, then activate it // else if ( E_DRM_NEEDS_MACHINE_ACTIVATION == hr ) { // // Activate the machine // hr = DRMActivate( hClient, DRM_ACTIVATE_MACHINE | DRM_ACTIVATE_SILENT, 0, NULL, // No DRM_ACTSERV_INFO required (SP1 or later) ( VOID* )&context, NULL ); if ( FAILED( hr ) ) { wprintf( L"\nDRMActivate (DRM_ACTIVATE_MACHINE) "\ L"failed. hr = 0x%x\n", hr ); goto e_Exit; } // // 7. Wait until HTTP with the server has completed // dwWaitResult = WaitForSingleObject( context.hEvent, DW_WAIT_TIME_SECONDS ); if ( WAIT_TIMEOUT == dwWaitResult ) { wprintf( L"\nWaitForSingleObject timed out." ); goto e_Exit; } if ( FAILED( context.hr ) ) { // // In case a failure was reported via the callback function // note it also. // wprintf( L"\nThe callback function returned a failure "\ L"code. hr = 0x%x\n", context.hr ); hr = context.hr; goto e_Exit; } wprintf( L"\nThe machine is now activated.\n" ); } // // Fail if the failure was anything but E_DRM_NEEDS_MACHINE_ACTIVATION // else { wprintf( L"\nDRMIsActivated returned an unexpected failure: 0x%x. "\ L"E_DRM_NEEDS_MACHINE_ACTIVATION was expected.\n", hr ); goto e_Exit; } // // Call DRMIsActivated to determine if the user is // already activated. Fail if the failure code was // anything but E_DRM_NEEDS_GROUPIDENTITY_ACTIVATION // hr = DRMIsActivated( hClient, DRM_ACTIVATE_GROUPIDENTITY, NULL ); if ( SUCCEEDED( hr ) ) { wprintf( L"\nThe user is already activated.\n" ); goto e_Exit; } else if ( E_DRM_NEEDS_GROUPIDENTITY_ACTIVATION != hr ) { wprintf( L"\nDRMIsActivated returned an unexpected failure: 0x%x. "\ L"E_DRM_NEEDS_GROUPIDENTITY_ACTIVATION was "\ L"expected.\n", hr ); goto e_Exit; } else { // // Allocate memory for the DRM_ACTSERV_INFO structure for // user activation // pdasi = new DRM_ACTSERV_INFO; if ( NULL == pdasi ) { wprintf( L"\nMemory allocation failed for DRM_ACTSERV_INFO.\n" ); hr = E_OUTOFMEMORY; goto e_Exit; } pdasi->wszURL = NULL; // // 8. Copy the activation server URL into the wszURL member // of the DRM_ACTSERV_INFO struct // if ( NULL != wszActivationSvr ) { // // 8(a). Use the URL provided through the command line argument // pdasi->wszURL = wszActivationSvr; wszActivationSvr = NULL; wprintf( L"\nActivation server URL:\n%s\n", pdasi->wszURL ); } else { // // 8(b). Try to find the service location where user activation // is available. // The first call is to get - // (a) whether there is a service location and // (b) if so, the size needed for a buffer to // hold the URL for the service. // hr = DRMGetServiceLocation( hClient, DRM_SERVICE_TYPE_CERTIFICATION, DRM_SERVICE_LOCATION_ENTERPRISE, NULL, &uiStrLen, NULL ); if ( SUCCEEDED( hr ) ) { // // There is a service location; reserve space // for the URL. // pdasi->wszURL = new WCHAR[ uiStrLen ]; if( NULL == pdasi->wszURL ) { wprintf( L"\nMemory allocation failed for the "\ L"activation URL string.\n" ); hr = E_OUTOFMEMORY; goto e_Exit; } // // Call a second time to get the actual service location // copied into the URL. // hr = DRMGetServiceLocation( hClient, DRM_SERVICE_TYPE_CERTIFICATION, DRM_SERVICE_LOCATION_ENTERPRISE, NULL, &uiStrLen, pdasi->wszURL ); if ( FAILED( hr ) ) { wprintf( L"\nDRMGetServiceLocation (ENTERPRISE) "\ L"failed. hr = 0x%x\n", hr ); goto e_Exit; } wprintf( L"\nDRMGetServiceLocation (ENTERPRISE) "\ L"succeeded.\n\nUser Activation server "\ L"URL:\n%s\n", pdasi->wszURL ); } else { wprintf( L"\nDRMGetServiceLocation failed. hr = 0x%x. \n"\ L"Passing NULL server info to DRMActivate.\n", hr ); } } } // // 9. Activate the user // hr = DRMActivate( hClient, DRM_ACTIVATE_GROUPIDENTITY | DRM_ACTIVATE_SILENT, 0, pdasi, ( VOID* )&context, NULL ); if ( FAILED( hr ) ) { wprintf( L"\nDRMActivate(DRM_ACTIVATE_GROUPIDENTITY) "\ L"failed. hr = 0x%x\n", hr ); goto e_Exit; } // // 10. Wait for the callback to return // dwWaitResult = WaitForSingleObject( context.hEvent, DW_WAIT_TIME_SECONDS ); if ( WAIT_TIMEOUT == dwWaitResult ) { wprintf( L"\nWaitForSingleObject timed out." ); goto e_Exit; } if ( FAILED( context.hr ) ) { // // In case a failure was reported via the callback function // note it also. // hr = context.hr; wprintf( L"\nThe callback function returned a failure "\ L"code. hr = 0x%x\n", context.hr ); goto e_Exit; } wprintf( L"\nThe user is now activated.\n" ); e_Exit: // // 11. Clean up and free memory // if ( NULL != pdasi ) { if ( NULL != pdasi->wszURL ) { delete [] pdasi->wszURL; } delete pdasi; } if ( NULL != wszActivationSvr ) { delete [] wszActivationSvr; } if ( NULL != wszUserId ) { delete [] wszUserId; } if ( NULL != hClient ) { DRMCloseSession( hClient ); } if ( NULL != context.hEvent ) { CloseHandle( context.hEvent ); } if ( FAILED( hr ) ) { wprintf( L"\nSBActivation failed. hr = 0x%x\n", hr ); } return hr; }