|
|
/*++
Copyright (c) 2000 Microsoft Corporation
Module Name:
passport.h
Abstract:
WinInet/WinHttp- Passport Auenthtication Package Interface.
Author:
Biao Wang (biaow) 01-Oct-2000
--*/
#ifndef PASSPORT_H
#define PASSPORT_H
extern BOOL g_fIgnoreCachedCredsForPassport; extern BOOL g_fCurrentProcessLoggedOn; extern WCHAR g_szUserNameLoggedOn[128]; // 128 = INTERNET_MAX_USER_NAME_LENGTH, defined in wininet.h
typedef void* PP_CONTEXT; typedef void* PP_LOGON_CONTEXT;
//
// Passport related error codes
//
// generic internal error
#define PP_GENERIC_ERROR -1 // biaow-todo: GetLastError() to return more specific error codes
// generic async error
#define PP_REQUEST_PENDING -9
//
// return codes from PP_Logon
//
#define PP_LOGON_SUCCESS 0
#define PP_LOGON_FAILED 1
#define PP_LOGON_REQUIRED 2
//
// return codes from PP_GetReturnVerbAndUrl
//
#define PP_RETURN_KEEP_VERB 1
#define PP_RETURN_USE_GET 0
#define PFN_LOGON_CALLBACK PVOID // biaow-todo: define the async callback prototype
struct PRIVACY_EVENT { LIST_ENTRY List; DWORD dwStatus; PVOID lpvInfo; DWORD dwInfoLength; };
//
// Passport Context routines
//
PP_CONTEXT PP_InitContext( IN PCWSTR pwszHttpStack, // "WinInet.dll" or "WinHttp5.dll"
IN HINTERNET hSession // An existing session (i.e. hInternet) returned by InternetOpen()
// or WinHttpOpen(); hSession must compatible with pwszHttpStack.
// (e.g.WinInet.Dll<->InternetOpen() or WinHttp5.Dll<->WinHttpOpen() )
);
VOID PP_FreeContext( IN PP_CONTEXT hPP );
BOOL PP_GetRealm( IN PP_CONTEXT hPP, IN PWSTR pwszDARealm, // user supplied buffer ...
IN OUT PDWORD pdwDARealmLen // ... and length (will be updated to actual length
// on successful return)
);
//
// Passport Logon Context routines
//
PP_LOGON_CONTEXT PP_InitLogonContext( IN PP_CONTEXT hPP, IN PCWSTR pwszPartnerInfo, // i.e. "WWW-Authenticate: Passport1.4 ..." from partner
// site's 302 re-direct
IN DWORD dwParentFlags );
DWORD PP_Logon( IN PP_LOGON_CONTEXT hPPLogon, IN BOOL fAnonymous, IN HANDLE hEvent, // biaow-todo: async
IN PFN_LOGON_CALLBACK pfnLogonCallback,// biaow-todo: async
IN DWORD dwContext // biaow-todo: async
);
PLIST_ENTRY PP_GetPrivacyEvents( IN PP_LOGON_CONTEXT hPPLogon );
// -- This method should be called when PP_Logon() returns PP_LOGON_REQUIRED
// -- (i.e. 401 from a Passport DA)
BOOL PP_GetChallengeInfo( IN PP_LOGON_CONTEXT hPPLogon, OUT HBITMAP* phBitmap, // can be NULL; if not NULL, ownership of the bitmap
// is not transferred to the user
OUT PBOOL pfPrompt, IN PWSTR pwszCbText, IN OUT PDWORD pdwTextLen, IN PWSTR pwszRealm, IN DWORD dwMaxRealmLen, PWSTR pwszReqUserName, PDWORD pdwReqUserNameLen );
BOOL PP_GetChallengeContent( IN PP_LOGON_CONTEXT hPPLogon, IN PBYTE pContent, IN OUT PDWORD pdwContentLen );
// -- if the credentials are NULL/NULL, the means the default creds will be used
// -- if default creds can not be retrieved, this method will return FALSE
BOOL PP_SetCredentials( IN PP_LOGON_CONTEXT hPPLogon, IN PCWSTR pwszRealm, IN PCWSTR pwszTarget, // optional if user/pass are known (not null)
IN PCWSTR pwszSignIn, // can be NULL
IN PCWSTR pwszPassword, // can be NULL
IN PSYSTEMTIME pTimeCredsEntered // ignore if both SignIn and Pass are NULL (should be set to NULL in that case)
);
BOOL PP_GetLogonHost( IN PP_LOGON_CONTEXT hPPLogon, IN PWSTR pwszHostName, // user supplied buffer ...
IN OUT PDWORD pdwHostNameLen // ... and length (will be updated to actual length
);
BOOL PP_GetAuthorizationInfo( IN PP_LOGON_CONTEXT hPPLogon, IN PWSTR pwszTicket, // e.g. "from-PP = ..."
IN OUT PDWORD pdwTicketLen, OUT PBOOL pfKeepVerb, // if TRUE, no data will be copied into pwszUrl
IN PWSTR pwszUrl, // user supplied buffer ...
IN OUT PDWORD pdwUrlLen // ... and length (will be updated to actual length
// on successful return)
);
// -- biaow-todo: async
VOID PP_AbortLogon( IN PP_LOGON_CONTEXT hPPLogon, IN DWORD dwFlags );
// -- biaow-todo:
VOID PP_Logout( IN PP_LOGON_CONTEXT hPPLogon, IN DWORD dwFlags );
VOID PP_FreeLogonContext( IN PP_LOGON_CONTEXT hPPLogon );
BOOL PP_ForceNexusLookup( IN PP_LOGON_CONTEXT hPPLogon, IN BOOL fForce, IN PWSTR pwszRegUrl, // user supplied buffer ...
IN OUT PDWORD pdwRegUrlLen, // ... and length (will be updated to actual length
// on successful return)
IN PWSTR pwszDARealm, // user supplied buffer ...
IN OUT PDWORD pdwDARealmLen // ... and length (will be updated to actual length
// on successful return)
);
// if either pwszUsername or pwszPassword is not NULL, it must represent a string at least
// INTERNET_MAX_USER_NAME_LENGTH or INTERNET_MAX_PASSWORD_LENGTH chars long, respectively
BOOL PP_GetCachedCredential( PP_LOGON_CONTEXT hPP, IN PWSTR pwszRealm, IN PWSTR pwszTarget, OUT PWSTR pwszUsername, OUT PWSTR pwszPassword );
#ifdef PP_DEMO
BOOL PP_ContactPartner( IN PP_CONTEXT hPP, IN PCWSTR pwszPartnerUrl, IN PCWSTR pwszVerb, IN PCWSTR pwszHeaders, IN PWSTR pwszData, IN OUT PDWORD pdwDataLength );
#endif // PP_DEMO
#endif // PASSPORT_H
|