Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

3418 lines
84 KiB

//+--------------------------------------------------------------------------
//
// Microsoft Windows
// Copyright (C) Microsoft Corporation, 1996-1998
//
// File: tlsapi.cpp
//
// Contents:
//
// History: 12-09-97 HueiWang Created
//
//---------------------------------------------------------------------------
#include <windows.h>
#include <wincrypt.h>
#include <stdio.h>
#include <stdlib.h>
#include <tchar.h>
#include <rpc.h>
#include <ntsecapi.h>
#include <lmcons.h>
#include <lmserver.h>
#include <lmerr.h>
#include <lmapibuf.h>
#include <ntdsapi.h>
#include <dsrole.h>
#include <lmjoin.h>
#include <winldap.h>
#include <winsock2.h>
#include <dsgetdc.h>
//
// Only include RNG functions from tssec
//
#define NO_INCLUDE_LICENSING 1
#include <tssec.h>
#include "lscommon.h"
#include "tlsrpc.h"
#include "tlsapi.h"
#include "tlsapip.h"
#include "secstore.h"
#include "lscsp.h"
#include "license.h"
extern "C" DWORD WINAPI
TLSConnect(
handle_t binding,
TLS_HANDLE *pphContext
);
extern "C" DWORD WINAPI
TLSDisconnect(
TLS_HANDLE* pphContext
);
extern "C" BOOL
IsSystemService();
#include <lmcons.h> // Netxxx API includes
#include <lmserver.h>
#include <lmerr.h>
#include <lmapibuf.h>
#define DISCOVERY_INTERVAL (60 * 60 * 1000)
static HANDLE g_hCachingThreadExit = NULL;
static HANDLE g_hImmediateDiscovery = NULL;
static HANDLE g_hDiscoverySoon = NULL;
static BOOL g_fOffSiteLicenseServer = FALSE;
static PSEC_WINNT_AUTH_IDENTITY g_pRpcIdentity = NULL;
#define REG_DOMAIN_SERVER_MULTI L"DomainLicenseServerMulti"
#define TERMINAL_SERVICE_PARAM_DISCOVERY "SYSTEM\\CurrentControlSet\\Services\\TermService\\Parameters\\LicenseServers"
// 2 second timeout
#define SERVER_NP_TIMEOUT (2 * 1000)
#define INSTALL_CERT_DELAY (5 * 1000)
BOOL g_fInDomain = -1;
LONG lLibUsage = 0;
typedef struct {
TLS_HANDLE *hBinding;
DWORD dwTimeout; // In milliseconds - INFINITE for none
LARGE_INTEGER timeInitial; // As returned by QueryPerformanceCounter
} LS_ENUM_PARAM, *PLS_ENUM_PARAM;
void * MIDL_user_allocate(size_t size)
{
return(HeapAlloc(GetProcessHeap(), 0, size));
}
void MIDL_user_free( void *pointer)
{
HeapFree(GetProcessHeap(), 0, pointer);
}
#ifdef PRIVATEDEBUG
//
// FUNCTIONS: StartTime()
// EndTime()
//
// USAGE:
// StartTime();
// // Do some work.
// mseconds = EndTime();
//
// RETURN VALUE:
// Milliseconds between StartTime() and EndTime() calls.
LARGE_INTEGER TimeT;
void StartTimeT(void)
{
QueryPerformanceCounter(&TimeT);
}
ULONG EndTimeT()
{
LARGE_INTEGER liDiff;
LARGE_INTEGER liFreq;
QueryPerformanceCounter(&liDiff);
liDiff.QuadPart -= TimeT.QuadPart;
liDiff.QuadPart *= 1000; // Adjust to milliseconds, shouldn't overflow...
(void)QueryPerformanceFrequency(&liFreq);
return ((ULONG)(liDiff.QuadPart / liFreq.QuadPart));
}
#endif
//+------------------------------------------------------------------------
// Function: ConnectToLsServer()
//
// Description:
//
// Binding to sepecific hydra license server
//
// Arguments:
//
// szLsServer - Hydra License Server name
//
// Return Value:
//
// RPC binding handle or NULL if error, use GetLastError() to retrieve
// error.
//-------------------------------------------------------------------------
static TLS_HANDLE WINAPI
ConnectLsServer(
LPTSTR szLsServer,
LPTSTR szProtocol,
LPTSTR szEndPoint,
DWORD dwAuthLevel )
{
LPTSTR szBindingString;
RPC_BINDING_HANDLE hBinding=NULL;
RPC_STATUS status;
TLS_HANDLE pContext=NULL;
BOOL fSuccess;
HKEY hKey = NULL;
DWORD dwType;
DWORD cbData;
DWORD dwErr;
DWORD dwNumRetries = 1; // default to one retry
LPWSTR pszServerPrincipalName = NULL;
#ifdef PRIVATEDEBUG
if (NULL != szLsServer)
wprintf(L"server=%s\n",szLsServer);
#endif
//
// If this isn't local
//
if ((NULL != szLsServer) && (NULL != szEndPoint))
{
TCHAR szPipeName[MAX_PATH+1];
if (lstrlen(szLsServer) > ((sizeof(szPipeName) / sizeof(TCHAR)) - 26))
{
#ifdef PRIVATEDEBUG
wprintf(L"Server name too long\n");
#endif
return NULL;
}
//
// First check if license server named pipe exists
//
wsprintf(szPipeName,TEXT("\\\\%s\\pipe\\%s"),szLsServer,TEXT(SZSERVICENAME));
#ifdef PRIVATEDEBUG
StartTimeT();
#endif
fSuccess = WaitNamedPipe(szPipeName,SERVER_NP_TIMEOUT);
#ifdef PRIVATEDEBUG
ULONG ulTime = EndTimeT();
wprintf(L"WaitNamedPipe time == %lu\n",ulTime);
#endif
if (!fSuccess)
{
#ifdef PRIVATEDEBUG
wprintf(L"WaitNamedPipe (%s) failed 0x%x\n",szPipeName,GetLastError());
#endif
return NULL;
}
}
#ifdef PRIVATEDEBUG
else
wprintf(L"Not trying WaitNamedPipe\n");
#endif
dwErr = RegOpenKeyEx(HKEY_LOCAL_MACHINE,
TEXT(LSERVER_DISCOVERY_PARAMETER_KEY),
0,
KEY_READ,
&hKey);
if (dwErr == ERROR_SUCCESS)
{
cbData = sizeof(dwNumRetries);
dwErr = RegQueryValueEx(hKey,
L"NumRetries",
NULL,
&dwType,
(PBYTE)&dwNumRetries,
&cbData);
RegCloseKey(hKey);
}
status = RpcStringBindingCompose(0,
szProtocol,
szLsServer,
szEndPoint,
0,
&szBindingString);
if(status!=RPC_S_OK)
{
#ifdef PRIVATEDEBUG
wprintf(L"RpcStringBindingCompose failed 0x%x\n",status);
#endif
return NULL;
}
status=RpcBindingFromStringBinding( szBindingString, &hBinding);
RpcStringFree( &szBindingString );
if(status != RPC_S_OK)
{
#ifdef PRIVATEDEBUG
wprintf(L"RpcBindingFromStringBinding failed 0x%x\n",status);
#endif
return NULL;
}
status = RpcMgmtSetComTimeout(hBinding,RPC_C_BINDING_MIN_TIMEOUT);
if (status != RPC_S_OK)
{
#ifdef PRIVATEDEBUG
wprintf(L"RpcMgmtSetComTimeout failed 0x%x\n",status);
#endif
return NULL;
}
BOOL fRetry = TRUE;
//
// Find the principle name
//
status = RpcMgmtInqServerPrincName(hBinding,
RPC_C_AUTHN_GSS_NEGOTIATE,
&pszServerPrincipalName);
if(status == RPC_S_OK)
{
status=RpcBindingSetAuthInfo(hBinding,
pszServerPrincipalName,
dwAuthLevel,
RPC_C_AUTHN_GSS_NEGOTIATE,
g_pRpcIdentity,
0);
RpcStringFree(&pszServerPrincipalName);
}
else
goto Label;
if(status == RPC_S_OK)
{
retry:
// Obtain context handle from server
status = TLSConnect( hBinding, &pContext );
if(status != ERROR_SUCCESS)
{
pContext = NULL;
if( status == RPC_S_UNKNOWN_AUTHN_SERVICE || status == ERROR_ACCESS_DENIED && fRetry)
{
Label:
fRetry = FALSE;
//Try again with no security set
status = RpcBindingSetAuthInfo(hBinding,
0,
dwAuthLevel,
RPC_C_AUTHN_WINNT,
g_pRpcIdentity,
0);
if(status == RPC_S_OK)
{
// Obtain context handle from server
status = TLSConnect( hBinding, &pContext );
}
}
if((status == RPC_S_CALL_FAILED) || (status == RPC_S_CALL_FAILED_DNE))
{
//
// Workaround for an RPC problem where the first RPC after
// the LS starts, fails
//
if (dwNumRetries > 0)
{
dwNumRetries--;
goto retry;
}
}
}
}
//
// Memory leak
//
if(hBinding != NULL)
{
RpcBindingFree(&hBinding);
}
SetLastError((status == RPC_S_OK) ? ERROR_SUCCESS : status);
return pContext;
}
//+------------------------------------------------------------------------
// Function: BindAnyServer()
//
// Description:
//
// Call back routine for TLSConnectToAnyLsServer()
//
// Arguments:
//
// See EnumerateTlsServer()
//
// Return Value:
//
// Always TRUE to terminate server enumeration
//-------------------------------------------------------------------------
static BOOL
BindAnyServer(
TLS_HANDLE hRpcBinding,
LPCTSTR pszServerName,
HANDLE dwUserData
)
/*++
++*/
{
PLS_ENUM_PARAM pParam = (PLS_ENUM_PARAM) dwUserData;
TLS_HANDLE* hBinding = pParam->hBinding;
RPC_STATUS rpcStatus;
HKEY hKey = NULL;
DWORD dwBuffer = 0;
DWORD cbBuffer = sizeof (DWORD);
DWORD dwErrCode = 0;
// Skip Windows 2000 License servers
if (hRpcBinding != NULL)
{
DWORD dwSupportFlags = 0;
dwErrCode = TLSGetSupportFlags(
hRpcBinding,
&dwSupportFlags
);
if ((dwErrCode == RPC_S_OK) && !(dwSupportFlags & SUPPORT_WHISTLER_CAL))
{
return FALSE;
}
// If the call fails => Windows 2000 LS
else if(dwErrCode != RPC_S_OK)
{
return FALSE;
}
*hBinding=hRpcBinding;
return TRUE;
}
if (pParam->dwTimeout != INFINITE)
{
LARGE_INTEGER timeDiff;
LARGE_INTEGER timeFreq;
*hBinding=hRpcBinding;
QueryPerformanceCounter(&timeDiff);
timeDiff.QuadPart -= pParam->timeInitial.QuadPart;
timeDiff.QuadPart *= 1000; // Adjust to milliseconds, shouldn't overflow
(void)QueryPerformanceFrequency(&timeFreq);
if (((ULONG)(timeDiff.QuadPart / timeFreq.QuadPart)) > pParam->dwTimeout)
{
#ifdef PRIVATEDEBUG
wprintf(L"BindAnyServer timed out\n");
#endif
return TRUE;
}
}
return FALSE;
}
void
RandomizeArray(LPWSTR *rgwszServers, DWORD cServers)
{
DWORD i;
LPWSTR wszServerTmp;
int val;
if (cServers < 2)
return;
srand(GetTickCount());
for (i = 0; i < cServers; i++)
{
val = rand() % (cServers - i);
if (val == 0)
continue;
//
// Swap # i with # (val+i)
//
wszServerTmp = rgwszServers[i];
rgwszServers[i] = rgwszServers[val+i];
rgwszServers[val+i] = wszServerTmp;
}
}
HRESULT
GetLicenseServersFromReg(LPWSTR wszRegKey, LPWSTR *ppwszServerNames,DWORD *pcServers, LPWSTR **prgwszServers)
{
HRESULT hr = S_OK;
HKEY hKey = NULL;
DWORD dwType;
DWORD cbData = 0;
LPWSTR szServers=NULL, pchServer;
DWORD dwErr;
DWORD i,val;
DWORD iLocalComputer = (DWORD)(-1);
WCHAR szLocalComputerName[MAXCOMPUTERNAMELENGTH+1] = L"";
DWORD cbLocalComputerName=MAXCOMPUTERNAMELENGTH+1;
*ppwszServerNames = NULL;
*prgwszServers = NULL;
dwErr = RegOpenKeyEx(HKEY_LOCAL_MACHINE,
TEXT(LSERVER_DISCOVERY_PARAMETER_KEY),
0,
KEY_READ,
&hKey);
if (dwErr != ERROR_SUCCESS)
{
hr = HRESULT_FROM_WIN32(dwErr);
goto CleanErr;
}
dwErr = RegQueryValueEx(hKey,
wszRegKey,
NULL,
&dwType,
NULL,
&cbData);
if (dwErr != ERROR_SUCCESS)
{
hr = HRESULT_FROM_WIN32(dwErr);
goto CleanErr;
}
if ((dwType != REG_MULTI_SZ) || (cbData < (2 * sizeof(WCHAR))))
{
hr = E_FAIL;
goto CleanErr;
}
szServers = (LPWSTR) LocalAlloc(LPTR,cbData);
if (NULL == szServers)
{
hr = E_OUTOFMEMORY;
goto CleanErr;
}
dwErr = RegQueryValueEx(hKey,
wszRegKey,
NULL,
&dwType,
(PBYTE)szServers,
&cbData);
if (dwErr != ERROR_SUCCESS)
{
hr = HRESULT_FROM_WIN32(dwErr);
goto CleanErr;
}
for (i = 0, pchServer = szServers; (pchServer != NULL) && (*pchServer != L'\0'); pchServer = wcschr(pchServer,L'\0')+1, i++)
;
if (i == 0)
{
hr = E_FAIL;
goto CleanErr;
}
*pcServers = i;
*prgwszServers = (LPWSTR *)LocalAlloc(LPTR,sizeof(LPWSTR) * (*pcServers));
if (*prgwszServers == NULL)
{
hr = E_OUTOFMEMORY;
goto CleanErr;
}
// Don't treat error from this function as fatal
GetComputerName(szLocalComputerName, &cbLocalComputerName);
for (i = 0, pchServer = szServers; (i < (*pcServers)) && (pchServer != NULL) && (*pchServer != L'\0'); pchServer = wcschr(pchServer,L'\0')+1, i++) {
(*prgwszServers)[i] = pchServer;
if ((iLocalComputer == (DWORD)(-1)) && (wcscmp(pchServer,szLocalComputerName) == 0))
{
iLocalComputer = i;
}
}
//
// Put local computer at head of list
//
if (iLocalComputer != (DWORD)(-1))
{
if (iLocalComputer != 0)
{
//
// Swap # iLocalComputer with # 0
//
pchServer = (*prgwszServers)[iLocalComputer];
(*prgwszServers)[iLocalComputer] = (*prgwszServers)[0];
(*prgwszServers)[0] = pchServer;
}
RandomizeArray((*prgwszServers)+1,(*pcServers) - 1);
}
else
{
RandomizeArray((*prgwszServers),*pcServers);
}
*ppwszServerNames = szServers;
CleanErr:
if (FAILED(hr))
{
if (NULL != szServers)
{
LocalFree(szServers);
}
if (NULL != *prgwszServers)
{
LocalFree(*prgwszServers);
}
}
if (hKey != NULL)
{
RegCloseKey(hKey);
}
return hr;
}
HRESULT
WriteLicenseServersToReg(LPWSTR wszRegKey, LPWSTR pwszServerNames,DWORD cchServers)
{
HRESULT hr = S_OK;
HKEY hKey = NULL;
DWORD dwType = REG_MULTI_SZ;
DWORD dwErr;
DWORD dwDisp;
//
// Delete the value
//
dwErr = RegOpenKeyEx(HKEY_LOCAL_MACHINE,
TEXT(LSERVER_DISCOVERY_PARAMETER_KEY),
0,
KEY_WRITE,
&hKey);
if (dwErr == ERROR_SUCCESS)
{
RegDeleteValue(hKey,wszRegKey);
}
if ((pwszServerNames == NULL) || (cchServers < 2))
{
hr = S_OK;
goto CleanErr;
}
if(hKey != NULL)
{
RegCloseKey(hKey);
hKey = NULL;
}
dwErr = RegCreateKeyEx(HKEY_LOCAL_MACHINE,
TEXT(LSERVER_DISCOVERY_PARAMETER_KEY),
0,
TEXT(""),
REG_OPTION_NON_VOLATILE,
KEY_WRITE,
NULL,
&hKey,
&dwDisp);
if (dwErr != ERROR_SUCCESS)
{
hr = HRESULT_FROM_WIN32(dwErr);
goto CleanErr;
}
dwErr = RegSetValueEx(hKey,
wszRegKey,
0,
dwType,
(CONST BYTE *)pwszServerNames,
cchServers*sizeof(WCHAR));
if (dwErr != ERROR_SUCCESS)
{
hr = HRESULT_FROM_WIN32(dwErr);
goto CleanErr;
}
CleanErr:
if (hKey != NULL)
{
RegCloseKey(hKey);
}
return hr;
}
//
// Free pszDomain using NetApiBufferFree
//
DWORD WINAPI
TLSInDomain(BOOL *pfInDomain, LPWSTR *pszDomain)
{
NET_API_STATUS dwErr;
DSROLE_PRIMARY_DOMAIN_INFO_BASIC *pDomainInfo = NULL;
PDOMAIN_CONTROLLER_INFO pdcInfo = NULL;
if (pfInDomain == NULL)
{
return ERROR_INVALID_PARAMETER;
}
*pfInDomain = FALSE;
//
// Check if we're in a workgroup
//
dwErr = DsRoleGetPrimaryDomainInformation(NULL,
DsRolePrimaryDomainInfoBasic,
(PBYTE *) &pDomainInfo);
if ((dwErr != NO_ERROR) || (pDomainInfo == NULL))
{
return dwErr;
}
switch (pDomainInfo->MachineRole)
{
case DsRole_RoleStandaloneWorkstation:
case DsRole_RoleStandaloneServer:
DsRoleFreeMemory(pDomainInfo);
if (NULL != pszDomain)
{
NETSETUP_JOIN_STATUS BufferType;
dwErr = NetGetJoinInformation(NULL,pszDomain,&BufferType);
}
return dwErr;
break; // just in case
}
DsRoleFreeMemory(pDomainInfo);
dwErr = DsGetDcName(NULL, // Computer Name
NULL, // Domain Name
NULL, // Domain GUID
NULL, // Site Name
DS_DIRECTORY_SERVICE_PREFERRED,
&pdcInfo);
if ((dwErr != NO_ERROR) || (pdcInfo == NULL))
{
if (dwErr == ERROR_NO_SUCH_DOMAIN)
{
*pfInDomain = FALSE;
return NO_ERROR;
}
else
{
if (pdcInfo == NULL)
dwErr = ERROR_INTERNAL_ERROR;
return dwErr;
}
}
if (pdcInfo->Flags & DS_DS_FLAG)
{
*pfInDomain = TRUE;
}
if (pszDomain != NULL)
{
dwErr = NetApiBufferAllocate((wcslen(pdcInfo->DomainName)+1) * sizeof(WCHAR),
(LPVOID *)pszDomain);
if ((NERR_Success == dwErr) && (NULL != *pszDomain))
{
wcscpy(*pszDomain,pdcInfo->DomainName);
}
}
if (pdcInfo != NULL)
NetApiBufferFree(pdcInfo);
return dwErr;
}
/*++
Function:
LicenseServerCachingThread
Description:
This is the thread that does the license server caching.
Arguments:
lpParam - contains the exit event handle
Returns:
Always 1
--*/
DWORD WINAPI
LicenseServerCachingThread(
LPVOID lpParam )
{
DWORD
dwWaitStatus;
HANDLE
hExit = (HANDLE)lpParam;
DWORD
dwDiscoveryInterval = DISCOVERY_INTERVAL;
HANDLE
rgWaitHandles[] = {hExit,g_hImmediateDiscovery,g_hDiscoverySoon};
BOOL
bFoundServer;
BOOL
bSkipOne = FALSE;
HANDLE
hEvent;
//
// Yield our time slice to other threads now, so that the terminal server
// service can start up quickly. Refresh the license server cache when we
// resume our time slice.
//
Sleep( 0 );
while (1)
{
if (!bSkipOne)
{
bFoundServer = TLSRefreshLicenseServerCache(INFINITE);
if ((!g_fOffSiteLicenseServer) && bFoundServer)
{
dwDiscoveryInterval = INFINITE;
}
}
else
{
bSkipOne = FALSE;
}
dwWaitStatus = WaitForMultipleObjects(
sizeof(rgWaitHandles) / sizeof(HANDLE),
rgWaitHandles,
FALSE, // wait for any one event
dwDiscoveryInterval);
if (WAIT_OBJECT_0 == dwWaitStatus)
{
// hExit was signalled
goto done;
}
if ((WAIT_OBJECT_0+1) == dwWaitStatus)
{
// g_hImmediateDiscovery was signalled
// reduce dwDiscoveryInterval
dwDiscoveryInterval = DISCOVERY_INTERVAL;
}
if ((WAIT_OBJECT_0+2) == dwWaitStatus)
{
// g_hDiscoverySoon was signalled
// reduce dwDiscoveryInterval, but wait one round
dwDiscoveryInterval = DISCOVERY_INTERVAL;
bSkipOne = TRUE;
}
// we timed out, or hImmediateDiscovery was signalled. Re-start
// discovery
}
done:
hEvent = g_hCachingThreadExit;
g_hCachingThreadExit = NULL;
CloseHandle(hEvent);
hEvent = g_hImmediateDiscovery;
g_hImmediateDiscovery = NULL;
CloseHandle(hEvent);
hEvent = g_hDiscoverySoon;
g_hDiscoverySoon = NULL;
CloseHandle(hEvent);
return 1;
}
extern "C" void
TLSShutdown()
{
if (0 < InterlockedDecrement(&lLibUsage))
{
//
// Someone else is using it
//
return;
}
TLSStopDiscovery();
if (NULL != g_pRpcIdentity)
{
PSEC_WINNT_AUTH_IDENTITY pRpcIdentity = g_pRpcIdentity;
g_pRpcIdentity = NULL;
if (NULL != pRpcIdentity->User)
{
LocalFree(pRpcIdentity->User);
}
LocalFree(pRpcIdentity);
}
//
// Cleanup random number generator
//
TSRNG_Shutdown();
LsCsp_Exit();
}
extern "C" DWORD WINAPI
TLSInit()
{
LICENSE_STATUS status;
BOOL fInDomain = FALSE;
if (0 != InterlockedExchangeAdd(&lLibUsage,1))
{
//
// Already been initialized
//
return ERROR_SUCCESS;
}
status = LsCsp_Initialize();
if (LICENSE_STATUS_OK != status)
{
InterlockedDecrement(&lLibUsage);
switch (status)
{
case LICENSE_STATUS_OUT_OF_MEMORY:
return ERROR_NOT_ENOUGH_MEMORY;
case LICENSE_STATUS_NO_CERTIFICATE:
return SCARD_E_CERTIFICATE_UNAVAILABLE;
case LICENSE_STATUS_INVALID_CERTIFICATE:
return CERT_E_MALFORMED;
default:
return E_FAIL;
}
}
if ((NO_ERROR == TLSInDomain(&fInDomain, NULL))
&& (fInDomain)
&& (IsSystemService()))
{
//
// We're running as SYSTEM
// Create an RPC identity for use as an RPC client
//
g_pRpcIdentity = (PSEC_WINNT_AUTH_IDENTITY) LocalAlloc(LPTR, sizeof(SEC_WINNT_AUTH_IDENTITY));
if (NULL != g_pRpcIdentity)
{
g_pRpcIdentity->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
g_pRpcIdentity->UserLength = MAX_COMPUTERNAME_LENGTH + 2;
g_pRpcIdentity->User = (WCHAR *) LocalAlloc(LPTR, g_pRpcIdentity->UserLength * sizeof(WCHAR));
if (NULL != g_pRpcIdentity->User)
{
if (GetComputerNameEx(ComputerNamePhysicalNetBIOS,g_pRpcIdentity->User,&(g_pRpcIdentity->UserLength)))
{
if (g_pRpcIdentity->UserLength < MAX_COMPUTERNAME_LENGTH + 1)
{
g_pRpcIdentity->User[g_pRpcIdentity->UserLength++] = L'$';
g_pRpcIdentity->User[g_pRpcIdentity->UserLength] = 0;
}
else
{
LocalFree(g_pRpcIdentity->User);
LocalFree(g_pRpcIdentity);
g_pRpcIdentity = NULL;
InterlockedDecrement(&lLibUsage);
return E_FAIL;
}
}
else
{
LocalFree(g_pRpcIdentity->User);
LocalFree(g_pRpcIdentity);
g_pRpcIdentity = NULL;
InterlockedDecrement(&lLibUsage);
return GetLastError();
}
}
else
{
LocalFree(g_pRpcIdentity);
g_pRpcIdentity = NULL;
InterlockedDecrement(&lLibUsage);
return ERROR_NOT_ENOUGH_MEMORY;
}
}
else
{
InterlockedDecrement(&lLibUsage);
return ERROR_NOT_ENOUGH_MEMORY;
}
}
//
// Init random number generator
//
TSRNG_Initialize();
return ERROR_SUCCESS;
}
extern "C" DWORD WINAPI
TLSStartDiscovery()
{
HANDLE hCachingThread = NULL;
HANDLE hEvent;
if (NULL != g_hCachingThreadExit)
{
// already started
return ERROR_SUCCESS;
}
//
// Create the event to signal thread exit
//
g_hCachingThreadExit = CreateEvent( NULL, FALSE, FALSE, NULL );
if( NULL == g_hCachingThreadExit )
{
return GetLastError();
}
g_hImmediateDiscovery = CreateEvent(NULL,FALSE,FALSE,NULL);
if (NULL == g_hImmediateDiscovery)
{
hEvent = g_hCachingThreadExit;
g_hCachingThreadExit = NULL;
CloseHandle(hEvent);
return GetLastError();
}
g_hDiscoverySoon = CreateEvent(NULL,FALSE,FALSE,NULL);
if (NULL == g_hDiscoverySoon)
{
hEvent = g_hCachingThreadExit;
g_hCachingThreadExit = NULL;
CloseHandle(hEvent);
hEvent = g_hImmediateDiscovery;
g_hImmediateDiscovery = NULL;
CloseHandle(hEvent);
return GetLastError();
}
//
// Create the caching thread
//
hCachingThread = CreateThread(
NULL,
0,
LicenseServerCachingThread,
( LPVOID )g_hCachingThreadExit,
0,
NULL );
if (hCachingThread == NULL)
{
hEvent = g_hCachingThreadExit;
g_hCachingThreadExit = NULL;
CloseHandle(hEvent);
hEvent = g_hImmediateDiscovery;
g_hImmediateDiscovery = NULL;
CloseHandle(hEvent);
hEvent = g_hDiscoverySoon;
g_hDiscoverySoon = NULL;
CloseHandle(hEvent);
return GetLastError();
}
CloseHandle(hCachingThread);
return ERROR_SUCCESS;
}
extern "C" DWORD WINAPI
TLSStopDiscovery()
{
//
// Signal the thread to exit
//
if (NULL != g_hCachingThreadExit)
{
SetEvent( g_hCachingThreadExit );
}
return ERROR_SUCCESS;
}
//
// Number of DCs to allocate space for at a time
//
#define DC_LIST_CHUNK 10
//+------------------------------------------------------------------------
// Function:
//
// EnumerateLsServer()
//
// Description:
//
// Routine to enumerate all hydra license server in network
//
// Arguments:
//
// szScope - Scope limit, NULL if doen't care.
// dwPlatformType - verify if license server have licenses for this platform,
// LSKEYPACKPLATFORMTYPE_UNKNOWN if doesn't care.
// fCallBack - call back routine when EnumerateServer() founds any server,
// dwUserData - data to be pass to call back routine
//
// Return Value:
//
// RPC_S_OK or any RPC specific error code.
//
// NOTE:
//
// Enumeration terminate when either there is no more server or call back
// routine return TRUE.
//
//-------------------------------------------------------------------------
DWORD WINAPI
EnumerateTlsServerInDomain(
IN LPCTSTR szDomain,
IN TLSENUMERATECALLBACK fCallBack,
IN HANDLE dwUserData,
IN DWORD dwTimeOut,
IN BOOL fRegOnly,
IN OUT BOOL *pfOffSite
)
/*++
++*/
{
DWORD entriesread = 0;
BOOL bCancel=FALSE;
DWORD dwErrCode;
LPWSTR pwszServerTmp = NULL;
LPWSTR pwszServer = NULL;
HRESULT hr;
LPWSTR pwszServers = NULL;
LPWSTR pwszServersTmp = NULL;
DWORD cchServers = 0;
DWORD cchServer;
LPWSTR *rgwszServers = NULL;
LPWSTR *rgwszServersTmp;
LPWSTR pwszServerNames = NULL;
DWORD dwErr = ERROR_SUCCESS, i;
HANDLE hDcOpen = NULL;
LPWSTR szSiteName = NULL;
BOOL fOffSiteIn;
BOOL fFoundOne = FALSE;
BOOL fFoundOneOffSite = FALSE;
DWORD cChunks = 0;
DWORD cServersOnSite = 0;
if (fRegOnly)
{
//
// check for a license server in the registry
//
hr = GetLicenseServersFromReg(REG_DOMAIN_SERVER_MULTI,&pwszServerNames,&entriesread,&rgwszServers);
if (FAILED(hr))
{
dwErr = hr;
goto Cleanup;
}
}
else
{
if (NULL == pfOffSite)
{
return ERROR_INVALID_PARAMETER;
}
fOffSiteIn = *pfOffSite;
*pfOffSite = FALSE;
dwErr = DsGetSiteName(NULL,&szSiteName);
if(dwErr != ERROR_SUCCESS)
{
#ifdef PRIVATEDEBUG
wprintf(L"DsGetSiteName failed %x\n",dwErr);
#endif
goto Cleanup;
}
dwErr = DsGetDcOpenW(szDomain,
fOffSiteIn ? DS_NOTIFY_AFTER_SITE_RECORDS: DS_ONLY_DO_SITE_NAME,
szSiteName,
NULL, // DomainGuid
NULL, // DnsForestName
0, // Flags
&hDcOpen
);
if(dwErr != ERROR_SUCCESS)
{
#ifdef PRIVATEDEBUG
wprintf(L"DsGetDcOpen failed %x\n",dwErr);
#endif
goto Cleanup;
}
rgwszServers = (LPWSTR *) LocalAlloc(LPTR,
DC_LIST_CHUNK * sizeof(LPWSTR));
if (NULL == rgwszServers)
{
#ifdef PRIVATEDEBUG
wprintf(L"Out of memory\n");
#endif
dwErr = E_OUTOFMEMORY;
goto Cleanup;
}
cChunks = 1;
//
// Read the whole DC list
//
do
{
if (entriesread >= (cChunks * DC_LIST_CHUNK))
{
cChunks++;
rgwszServersTmp = (LPWSTR *)
LocalReAlloc(rgwszServers,
DC_LIST_CHUNK * sizeof(LPWSTR) * cChunks,
LHND);
if (NULL == rgwszServersTmp)
{
dwErr = E_OUTOFMEMORY;
goto Cleanup;
}
else
{
rgwszServers = rgwszServersTmp;
}
}
dwErr = DsGetDcNextW(hDcOpen,
NULL,
NULL,
rgwszServers+entriesread);
if (ERROR_FILEMARK_DETECTED == dwErr)
{
// Now going off-site; use NULL ptr marker
rgwszServers[entriesread] = NULL;
cServersOnSite = entriesread;
dwErr = ERROR_SUCCESS;
fFoundOneOffSite = TRUE;
}
entriesread++;
} while (ERROR_SUCCESS == dwErr);
// don't count the final error
entriesread--;
if (!fFoundOneOffSite)
cServersOnSite = entriesread;
// Now randomize the two portions of the array
RandomizeArray(rgwszServers,cServersOnSite);
if (fFoundOneOffSite)
{
RandomizeArray(rgwszServers+cServersOnSite+1,
entriesread - cServersOnSite - 1);
}
// Now allocate memory for registry entry
pwszServers = (LPWSTR) LocalAlloc(LPTR,2*sizeof(WCHAR));
if (NULL == pwszServers)
{
#ifdef PRIVATEDEBUG
wprintf(L"Out of memory\n");
#endif
dwErr = E_OUTOFMEMORY;
goto Cleanup;
}
cchServers = 2;
pwszServers[0] = pwszServers[1] = L'\0';
}
for(i=0; bCancel == FALSE; i++)
{
PCONTEXT_HANDLE pContext=NULL;
RPC_STATUS rpcStatus;
if (!fRegOnly)
{
if (fFoundOneOffSite && i == cServersOnSite)
{
if (fFoundOne)
break;
// Now going off-site
i++;
*pfOffSite = TRUE;
}
}
if (i >= entriesread)
break;
pwszServerTmp = rgwszServers[i];
bCancel=fCallBack(pContext, pwszServerTmp, dwUserData);
if(bCancel == TRUE)
continue;
if(!(pContext = TLSConnectToLsServer(pwszServerTmp)))
{
//
// could be access denied.
//
#ifdef PRIVATEDEBUG
wprintf(L"Can't connect to %s\n",pwszServerTmp);
#endif
continue;
}
#ifdef PRIVATEDEBUG
wprintf(L"!!!Connected to %s\n",pwszServerTmp);
#endif
do {
//
// Skip enterprise server
//
DWORD dwVersion;
rpcStatus = TLSGetVersion( pContext, &dwVersion );
if(rpcStatus != RPC_S_OK)
{
break;
}
#if ENFORCE_LICENSING
//
// W2K Beta 3 to RC1 upgrade, don't connect to any non-enforce
// server 5.2 or older
//
if(IS_ENFORCE_LSSERVER(dwVersion) == FALSE)
{
if( GET_LSSERVER_MAJOR_VERSION(dwVersion) <= 5 &&
GET_LSSERVER_MINOR_VERSION(dwVersion) <= 2 )
{
continue;
}
}
//
// Prevent beta <-> RTM server talking to each other
//
//
// TLSIsBetaNTServer() returns TRUE if eval NT
// IS_LSSERVER_RTM() returns TRUE if LS is an RTM.
//
if( TLSIsBetaNTServer() == IS_LSSERVER_RTM(dwVersion) )
{
continue;
}
#endif
if(dwVersion & TLS_VERSION_ENTERPRISE_BIT)
{
continue;
}
bCancel=fCallBack(pContext, pwszServerTmp, dwUserData);
if (!fRegOnly)
{
//
// Add to list of servers
//
cchServer = wcslen(pwszServerTmp);
pwszServersTmp = (LPWSTR) LocalReAlloc(pwszServers,(cchServers+cchServer+1)*sizeof(TCHAR),LHND);
if (NULL == pwszServersTmp)
{
break;
}
pwszServers = pwszServersTmp;
if (cchServers == 2)
{
wcscpy(pwszServers,pwszServerTmp);
cchServers += cchServer;
} else
{
wcscpy(pwszServers+cchServers-1,pwszServerTmp);
cchServers += cchServer + 1;
}
pwszServers[cchServers-1] = L'\0';
}
fFoundOne = TRUE;
} while (FALSE);
if(bCancel == FALSE && pContext != NULL)
{
TLSDisconnect(&pContext);
}
} // for loop
if (!fRegOnly)
{
WriteLicenseServersToReg(REG_DOMAIN_SERVER_MULTI,pwszServers,cchServers);
}
Cleanup:
if (NULL != hDcOpen)
DsGetDcCloseW(hDcOpen);
if (NULL != rgwszServers)
{
if (!fRegOnly)
{
for (i = 0; i < entriesread; i++)
{
if (NULL != rgwszServers[i])
{
NetApiBufferFree(rgwszServers[i]);
}
}
}
LocalFree(rgwszServers);
}
if (szSiteName)
NetApiBufferFree(szSiteName);
if (pwszServerNames)
LocalFree(pwszServerNames);
if (pwszServers)
LocalFree(pwszServers);
if (pwszServer)
LocalFree(pwszServer);
return dwErr;
}
DWORD WINAPI
EnumerateTlsServerInWorkGroup(
IN TLSENUMERATECALLBACK pfCallBack,
IN HANDLE dwUserData,
IN DWORD dwTimeOut,
IN BOOL fRegOnly
)
/*++
++*/
{
DWORD dwStatus=ERROR_SUCCESS;
TCHAR szServerMailSlotName[MAX_PATH+1];
TCHAR szLocalMailSlotName[MAX_PATH+1];
HANDLE hClientSlot = INVALID_HANDLE_VALUE;
HANDLE hServerSlot = INVALID_HANDLE_VALUE;
TCHAR szDiscMsg[MAX_MAILSLOT_MSG_SIZE+1];
TCHAR szComputerName[MAXCOMPUTERNAMELENGTH+1];
TCHAR szRandomMailSlotName[MAXCOMPUTERNAMELENGTH+1];
DWORD cbComputerName=MAXCOMPUTERNAMELENGTH+1;
DWORD cbWritten=0;
DWORD cbRead=0;
BOOL bCancel = FALSE;
DWORD dwErrCode;
HRESULT hr;
LPWSTR pwszServers = NULL;
LPWSTR pwszServersTmp = NULL;
DWORD cchServers = 0;
DWORD cchServer;
LPWSTR *rgwszServers = NULL;
LPWSTR pwszServerNames = NULL;
DWORD cServers = 0;
DWORD i = 0;
LPWSTR pwszServerTmp = szComputerName;
if (!fRegOnly)
{
if(!GetComputerName(szComputerName, &cbComputerName))
{
dwStatus = GetLastError();
goto cleanup;
}
if (0 == (1 & GetSystemMetrics(SM_NETWORK)))
{
// No network; try local machine
#ifdef PRIVATEDEBUG
wprintf(L"No network, trying local computer=%s\n",szComputerName);
#endif
dwStatus = ERROR_SUCCESS;
goto TryServer;
}
wsprintf(
szRandomMailSlotName,
_TEXT("%08x"),
GetCurrentThreadId()
);
_stprintf(
szLocalMailSlotName,
_TEXT("\\\\.\\mailslot\\%s"),
szRandomMailSlotName
);
//
// Create local mail slot for server's response
//
hClientSlot=CreateMailslot(
szLocalMailSlotName,
0,
(dwTimeOut == MAILSLOT_WAIT_FOREVER) ? 5 * 1000: dwTimeOut,
NULL
);
if(hClientSlot == INVALID_HANDLE_VALUE)
{
dwStatus = GetLastError();
goto cleanup;
}
//
// Open server's mail slot
//
_stprintf(
szServerMailSlotName,
_TEXT("\\\\%s\\mailslot\\%s"),
_TEXT("*"),
_TEXT(SERVERMAILSLOTNAME)
);
hServerSlot=CreateFile(
szServerMailSlotName,
GENERIC_WRITE, // only need write
FILE_SHARE_READ,
NULL,
OPEN_EXISTING,
FILE_ATTRIBUTE_NORMAL,
NULL
);
if(hServerSlot == INVALID_HANDLE_VALUE)
{
dwStatus = GetLastError();
goto cleanup;
}
//
// Formulate discovery message
//
_stprintf(
szDiscMsg,
_TEXT("%s %c%s%c %c%s%c"),
_TEXT(LSERVER_DISCOVERY),
_TEXT(LSERVER_OPEN_BLK),
szComputerName,
_TEXT(LSERVER_CLOSE_BLK),
_TEXT(LSERVER_OPEN_BLK),
szRandomMailSlotName,
_TEXT(LSERVER_CLOSE_BLK)
);
if (!WriteFile(hServerSlot, szDiscMsg, (_tcslen(szDiscMsg) + 1) * sizeof(TCHAR), &cbWritten, NULL) ||
(cbWritten != (_tcslen(szDiscMsg) + 1 ) * sizeof(TCHAR)))
{
dwStatus = GetLastError();
if (dwStatus == ERROR_NETWORK_UNREACHABLE)
{
// No network; try local machine
#ifdef PRIVATEDEBUG
wprintf(L"No network, trying local computer=%s\n",szComputerName);
#endif
dwStatus = ERROR_SUCCESS;
goto TryServer;
}
else
{
goto cleanup;
}
}
// Allocate for registry entry
pwszServers = (LPWSTR) LocalAlloc(LPTR,2*sizeof(WCHAR));
if (NULL == pwszServers)
{
#ifdef PRIVATEDEBUG
wprintf(L"Out of memory\n");
#endif
dwStatus = E_OUTOFMEMORY;
goto cleanup;
}
cchServers = 2;
pwszServers[0] = pwszServers[1] = L'\0';
} else
{
//
// check for a license server in the registry
//
hr = GetLicenseServersFromReg(REG_DOMAIN_SERVER_MULTI,&pwszServerNames,&cServers,&rgwszServers);
if (FAILED(hr))
{
dwStatus = hr;
goto cleanup;
}
}
do {
if(fRegOnly)
{
if (i >= cServers)
{
break;
}
pwszServerTmp = rgwszServers[i++];
} else
{
memset(szComputerName, 0, sizeof(szComputerName));
if(!ReadFile(hClientSlot, szComputerName, sizeof(szComputerName) - sizeof(TCHAR), &cbRead, NULL))
{
dwStatus=GetLastError();
break;
}
#ifdef PRIVATEDEBUG
wprintf(L"Trying server=%s\n",szComputerName);
#endif
}
TryServer:
bCancel=pfCallBack(NULL, pwszServerTmp, dwUserData);
if(bCancel == TRUE)
{
continue;
}
PCONTEXT_HANDLE pContext=NULL;
RPC_STATUS rpcStatus;
if(!(pContext = TLSConnectToLsServer(pwszServerTmp)))
{
//
// could be access denied.
//
continue;
}
do {
//
// Skip enterprise server
//
DWORD dwVersion;
rpcStatus = TLSGetVersion( pContext, &dwVersion );
if(rpcStatus != RPC_S_OK)
{
continue;
}
#if ENFORCE_LICENSING
//
// W2K Beta 3 to RC1 upgrade, don't connect to any non-enforce
// server 5.2 or older
//
if(IS_ENFORCE_LSSERVER(dwVersion) == FALSE)
{
if( GET_LSSERVER_MAJOR_VERSION(dwVersion) <= 5 &&
GET_LSSERVER_MINOR_VERSION(dwVersion) <= 2 )
{
continue;
}
}
//
// No Beta <--> RTM server.
//
//
// TLSIsBetaNTServer() returns TRUE if eval NT
// IS_LSSERVER_RTM() returns TRUE if LS is an RTM.
//
if( TLSIsBetaNTServer() == IS_LSSERVER_RTM(dwVersion) )
{
continue;
}
#endif
if(dwVersion & TLS_VERSION_ENTERPRISE_BIT)
{
continue;
}
bCancel=pfCallBack(pContext, pwszServerTmp, dwUserData);
if (!fRegOnly)
{
//
// Add to list of servers
//
cchServer = wcslen(pwszServerTmp);
pwszServersTmp = (LPWSTR) LocalReAlloc(pwszServers,(cchServers+cchServer+1)*sizeof(TCHAR),LHND);
if (NULL == pwszServersTmp)
{
continue;
}
pwszServers = pwszServersTmp;
if (cchServers == 2)
{
wcscpy(pwszServers,pwszServerTmp);
cchServers += cchServer;
} else
{
wcscpy(pwszServers+cchServers-1,pwszServerTmp);
cchServers += cchServer + 1;
}
pwszServers[cchServers-1] = L'\0';
}
} while (FALSE);
if(bCancel == FALSE && pContext != NULL)
{
TLSDisconnectFromServer(pContext);
}
} while(bCancel == FALSE);
if (!fRegOnly)
{
WriteLicenseServersToReg(REG_DOMAIN_SERVER_MULTI,pwszServers,cchServers);
}
cleanup:
if(hClientSlot != INVALID_HANDLE_VALUE)
{
CloseHandle(hClientSlot);
}
if(hServerSlot != INVALID_HANDLE_VALUE)
{
CloseHandle(hServerSlot);
}
if (pwszServerNames)
LocalFree(pwszServerNames);
if (pwszServers)
LocalFree(pwszServers);
if (rgwszServers)
LocalFree(rgwszServers);
return dwStatus;
}
DWORD
GetServersFromRegistry(
LPWSTR wszRegKey,
LPWSTR **prgszServers,
DWORD *pcCount
)
{
HKEY hParamKey = NULL;
DWORD dwValueType;
DWORD cbValue = 0, dwDisp;
LONG lReturn;
DWORD cbServer;
DWORD cServers;
DWORD cchServerMax;
LPWSTR *rgszServers;
DWORD i, j;
*prgszServers = NULL;
*pcCount = 0;
lReturn = RegOpenKeyEx(HKEY_LOCAL_MACHINE,
wszRegKey,
0,
KEY_READ,
&hParamKey );
if (ERROR_SUCCESS != lReturn)
return lReturn;
lReturn = RegQueryInfoKey(hParamKey,
NULL,
NULL,
NULL,
&cServers,
&cchServerMax,
NULL,
NULL,
NULL,
NULL,
NULL,
NULL);
if (ERROR_SUCCESS != lReturn)
{
RegCloseKey( hParamKey );
return lReturn;
}
if (0 == cServers)
{
RegCloseKey( hParamKey );
return ERROR_NO_MORE_ITEMS;
}
rgszServers = (LPWSTR *) LocalAlloc(LPTR,cServers*sizeof(LPWSTR));
if (NULL == rgszServers)
{
RegCloseKey( hParamKey );
return ERROR_NOT_ENOUGH_MEMORY;
}
// Add one for null terminator
cchServerMax++;
for (i = 0; i < cServers; i++)
{
rgszServers[i] = (LPWSTR) LocalAlloc(LPTR,cchServerMax * sizeof(WCHAR));
if (NULL == rgszServers[i])
{
for (j = 0; j < i; j++)
{
LocalFree(rgszServers[j]);
}
LocalFree(rgszServers);
RegCloseKey( hParamKey );
return ERROR_NOT_ENOUGH_MEMORY;
}
cbServer = cchServerMax * sizeof(WCHAR);
lReturn = RegEnumKeyEx(hParamKey,
i,
rgszServers[i],
&cbServer,
NULL,
NULL,
NULL,
NULL);
if (ERROR_SUCCESS != lReturn)
{
for (j = 0; j <= i; j++)
{
LocalFree(rgszServers[j]);
}
LocalFree(rgszServers);
RegCloseKey( hParamKey );
return lReturn;
}
}
*prgszServers = rgszServers;
*pcCount = cServers;
return ERROR_SUCCESS;
}
DWORD WINAPI
EnumerateTlsServerInRegistry(
IN TLSENUMERATECALLBACK pfCallBack,
IN HANDLE dwUserData,
IN DWORD dwTimeOut,
LPWSTR wszRegKey
)
/*++
++*/
{
BOOL bCancel=FALSE;
DWORD dwIndex = 0;
DWORD cServers = 0;
LPWSTR *rgszServers = NULL;
DWORD lReturn;
lReturn = GetServersFromRegistry(wszRegKey,
&rgszServers,
&cServers
);
if (ERROR_SUCCESS != lReturn)
{
return lReturn;
}
RandomizeArray(rgszServers,cServers);
for (;dwIndex < cServers; dwIndex++)
{
PCONTEXT_HANDLE pContext=NULL;
RPC_STATUS rpcStatus;
bCancel=pfCallBack(pContext, rgszServers[dwIndex], dwUserData);
if(bCancel == TRUE)
continue;
if(!(pContext = TLSConnectToLsServer(rgszServers[dwIndex])))
{
//
// could be access denied, or the machine is gone
//
continue;
}
do {
//
// Skip enterprise server
//
DWORD dwVersion;
rpcStatus = TLSGetVersion( pContext, &dwVersion );
if(rpcStatus != RPC_S_OK)
{
break;
}
#if ENFORCE_LICENSING
//
// W2K Beta 3 to RC1 upgrade, don't connect to any non-enforce
// server 5.2 or older
//
if(IS_ENFORCE_LSSERVER(dwVersion) == FALSE)
{
if( GET_LSSERVER_MAJOR_VERSION(dwVersion) <= 5 &&
GET_LSSERVER_MINOR_VERSION(dwVersion) <= 2 )
{
// old License Server
continue;
}
}
//
// Prevent beta <-> RTM server talking to each other
//
//
// TLSIsBetaNTServer() returns TRUE if eval NT
// IS_LSSERVER_RTM() returns TRUE if LS is an RTM.
//
if( TLSIsBetaNTServer() == IS_LSSERVER_RTM(dwVersion) )
{
continue;
}
#endif
bCancel=pfCallBack(pContext, rgszServers[dwIndex], dwUserData);
} while (FALSE);
if(bCancel == FALSE && pContext != NULL)
{
TLSDisconnect(&pContext);
}
} // for loop
for (dwIndex = 0; dwIndex < cServers; dwIndex++)
{
LocalFree(rgszServers[dwIndex]);
}
LocalFree(rgszServers);
return ERROR_SUCCESS;
}
DWORD WINAPI
EnumerateTlsServer(
IN TLSENUMERATECALLBACK pfCallBack,
IN HANDLE dwUserData,
IN DWORD dwTimeOut,
IN BOOL fRegOnly
)
/*++
++*/
{
DWORD dwErr;
LPWSTR szDomain = NULL;
BOOL fOffSite = FALSE; // don't try to go off-site
//
// First check for a registry bypass of discovery
//
dwErr = EnumerateTlsServerInRegistry(
pfCallBack,
dwUserData,
dwTimeOut,
TEXT(TERMINAL_SERVICE_PARAM_DISCOVERY)
);
if ((!fRegOnly) || (g_fInDomain == -1))
{
//
// Check even if set (for !fRegOnly), to get domain name
//
dwErr = TLSInDomain(&g_fInDomain, fRegOnly ? NULL : &szDomain);
if (dwErr != NO_ERROR)
return dwErr;
}
//
// Reading registry failed, use full discovery
//
if(g_fInDomain)
{
dwErr = EnumerateTlsServerInDomain(
szDomain,
pfCallBack,
dwUserData,
dwTimeOut,
fRegOnly,
&fOffSite
);
if ((dwErr == NO_ERROR) && !fRegOnly)
{
g_fOffSiteLicenseServer = fOffSite;
}
}
else
{
dwErr = EnumerateTlsServerInWorkGroup(
pfCallBack,
dwUserData,
dwTimeOut,
fRegOnly
);
}
if (NULL != szDomain)
{
NetApiBufferFree(szDomain);
}
if ((NULL != g_hImmediateDiscovery)
&& (dwErr != NO_ERROR) && fRegOnly)
{
SetEvent(g_hImmediateDiscovery);
}
if ((NULL != g_hDiscoverySoon)
&& (dwErr == NO_ERROR) && fOffSite && !fRegOnly)
{
SetEvent(g_hDiscoverySoon);
}
return dwErr;
}
TLS_HANDLE
ConnectAndCheckServer(LPWSTR szServer)
{
TLS_HANDLE hBinding;
DWORD dwVersion;
RPC_STATUS rpcStatus;
hBinding = TLSConnectToLsServer(szServer);
if(hBinding == NULL)
{
goto done;
}
// Skip Windows 2000 License servers
DWORD dwSupportFlags = 0;
DWORD dwErrCode = 0;
dwErrCode = TLSGetSupportFlags(
hBinding,
&dwSupportFlags
);
if ((dwErrCode == RPC_S_OK) && !(dwSupportFlags & SUPPORT_WHISTLER_CAL))
{
TLSDisconnect(&hBinding);
goto done;
}
// If the call fails => Windows 2000 LS
else if(dwErrCode != RPC_S_OK)
{
TLSDisconnect(&hBinding);
goto done;
}
rpcStatus = TLSGetVersion(
hBinding,
&dwVersion
);
if(rpcStatus != RPC_S_OK)
{
TLSDisconnect(&hBinding);
goto done;
}
if( TLSIsBetaNTServer() == IS_LSSERVER_RTM(dwVersion) )
{
TLSDisconnect(&hBinding);
goto done;
}
done:
return hBinding;
}
//+------------------------------------------------------------------------
// Function: TLSConnectToAnyLsServer()
//
// Description:
//
// Routine to bind to any license server
//
// Arguments:
// dwTimeout - INFINITE for going off-site
//
// Return Value:
//
// RPC binding handle or NULL if error, use GetLastError() to retrieve
// detail error.
//-------------------------------------------------------------------------
TLS_HANDLE WINAPI
TLSConnectToAnyLsServer(
DWORD dwTimeout
)
/*++
++*/
{
TLS_HANDLE hBinding=NULL;
HRESULT hr = S_OK;
LPWSTR *rgszServers = NULL;
DWORD cServers = 0;
DWORD i;
DWORD dwErr;
BOOL fInDomain;
LPWSTR szDomain = NULL;
LPWSTR szServerFound = NULL;
BOOL fRegOnly = (dwTimeout != INFINITE);
LPWSTR pwszServerNames = NULL;
BOOL fFreeServerNames = TRUE;
// TODO: add error codes/handling to all of this
//
// First check for a registry bypass of discovery
//
dwErr = GetServersFromRegistry(
TEXT(TERMINAL_SERVICE_PARAM_DISCOVERY),
&rgszServers,
&cServers
);
if (ERROR_SUCCESS == dwErr)
{
RandomizeArray(rgszServers,cServers);
for (i = 0; i < cServers; i++)
{
hBinding = ConnectAndCheckServer(rgszServers[i]);
if (NULL != hBinding)
{
szServerFound = rgszServers[i];
goto found_one;
}
}
if(NULL != rgszServers)
{
for (i = 0; i < cServers; i++)
{
LocalFree(rgszServers[i]);
}
LocalFree(rgszServers);
rgszServers = NULL;
}
}
//
// Next try Site (Enterprise) license servers
//
if (!fRegOnly)
{
hr = GetAllEnterpriseServers(&rgszServers,&cServers);
if (SUCCEEDED(hr))
{
RandomizeArray(rgszServers,cServers);
}
}
else
{
// rgszServers[i] is an index into pwszServerNames; don't free
fFreeServerNames = FALSE;
hr = GetLicenseServersFromReg(ENTERPRISE_SERVER_MULTI,
&pwszServerNames,
&cServers,
&rgszServers);
}
if (SUCCEEDED(hr))
{
for (i = 0; i < cServers; i++)
{
hBinding = ConnectAndCheckServer(rgszServers[i]);
if (NULL != hBinding)
{
szServerFound = rgszServers[i];
goto found_one;
}
}
if(NULL != rgszServers)
{
if (fFreeServerNames)
{
for (i = 0; i < cServers; i++)
{
LocalFree(rgszServers[i]);
}
LocalFree(rgszServers);
}
rgszServers = NULL;
}
}
//
// No Site LS found, try Domain/Workgroup servers
//
dwErr = TLSInDomain(&fInDomain, &szDomain);
if (dwErr != NO_ERROR)
{
return NULL;
}
LS_ENUM_PARAM param;
param.hBinding = &hBinding;
param.dwTimeout = INFINITE;
QueryPerformanceCounter(&(param.timeInitial));
fFreeServerNames = TRUE;
if (fInDomain)
{
BOOL fOffSite = TRUE;
dwErr = EnumerateTlsServerInDomain(
szDomain,
BindAnyServer,
&param,
INFINITE,
fRegOnly,
&fOffSite
);
if (dwErr == NO_ERROR)
{
g_fOffSiteLicenseServer = fOffSite;
}
}
else
{
dwErr = EnumerateTlsServerInWorkGroup(
BindAnyServer,
&param,
MAILSLOT_WAIT_FOREVER,
fRegOnly
);
}
if (NULL != szDomain)
{
NetApiBufferFree(szDomain);
}
if (hBinding != NULL)
goto found_one;
if (NULL != pwszServerNames)
{
LocalFree(pwszServerNames);
}
if ((NULL != g_hImmediateDiscovery)
&& fRegOnly)
{
SetEvent(g_hImmediateDiscovery);
}
else if ((NULL != g_hDiscoverySoon)
&& !fRegOnly && g_fOffSiteLicenseServer)
{
SetEvent(g_hDiscoverySoon);
}
return NULL;
found_one:
if (NULL != pwszServerNames)
{
LocalFree(pwszServerNames);
}
if(NULL != rgszServers)
{
if (fFreeServerNames)
{
for (i = 0; i < cServers; i++)
{
LocalFree(rgszServers[i]);
}
}
LocalFree(rgszServers);
}
return hBinding;
}
BOOL
TLSRefreshLicenseServerCache(
IN DWORD dwTimeOut
)
/*++
Abstract:
Refresh license server cache in registry.
Parameter:
dwTimeOut : Reserverd, should pass in INIFINITE for now
Returns:
TRUE/FALSE
--*/
{
BOOL bFoundServer = FALSE;
TLS_HANDLE hBinding = NULL;
hBinding = TLSConnectToAnyLsServer(dwTimeOut);
if (NULL != hBinding)
{
bFoundServer = TRUE;
TLSDisconnect(&hBinding);
}
return bFoundServer;
}
LICENSE_STATUS
InstallCertificate(LPVOID lpParam)
{
Sleep(INSTALL_CERT_DELAY);
return LsCsp_InstallX509Certificate(NULL);
}
//-------------------------------------------------------------------------
TLS_HANDLE WINAPI
TLSConnectToLsServer(
LPTSTR pszLsServer
)
/*++
++*/
{
TCHAR szMachineName[MAX_COMPUTERNAME_LENGTH + 1] ;
PCONTEXT_HANDLE pContext=NULL;
DWORD cbMachineName=MAX_COMPUTERNAME_LENGTH;
HANDLE hThread = NULL;
static BOOL fLSFound = FALSE;
memset(szMachineName, 0, sizeof(szMachineName));
GetComputerName(szMachineName, &cbMachineName);
if(pszLsServer == NULL || _tcsicmp(szMachineName, pszLsServer) == 0)
{
pContext=ConnectLsServer(
szMachineName,
_TEXT(RPC_PROTOSEQLPC),
NULL,
RPC_C_AUTHN_LEVEL_DEFAULT
);
if(GetLastError() >= LSERVER_ERROR_BASE)
{
return NULL;
}
// try to connect with TCP protocol, if local procedure failed
}
if(pContext == NULL)
{
pContext=ConnectLsServer(
pszLsServer,
_TEXT(RPC_PROTOSEQNP),
_TEXT(LSNAMEPIPE),
RPC_C_AUTHN_LEVEL_PKT_PRIVACY
);
}
if (!fLSFound && (NULL != pContext))
{
fLSFound = TRUE;
// Now that someone's connected, we can install a license
hThread = CreateThread(NULL,
0,
InstallCertificate,
NULL,
0,
NULL);
if (hThread != NULL)
{
CloseHandle(hThread);
}
else
{
// Can't create the thread; try again later
fLSFound = FALSE;
}
}
return (TLS_HANDLE) pContext;
}
//-------------------------------------------------------------------------
void WINAPI
TLSDisconnectFromServer(
TLS_HANDLE pHandle
)
/*++
++*/
{
if(pHandle != NULL)
{
TLSDisconnect( &pHandle );
}
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSConnect(
handle_t binding,
TLS_HANDLE *ppHandle
)
/*++
++*/
{
return TLSRpcConnect(binding, ppHandle);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSDisconnect(
TLS_HANDLE* pphHandle
)
/*++
++*/
{
RPC_STATUS rpc_status;
rpc_status = TLSRpcDisconnect( pphHandle );
if(rpc_status != RPC_S_OK)
{
RpcSmDestroyClientContext(pphHandle);
}
*pphHandle = NULL;
return ERROR_SUCCESS;
}
//-------------------------------------------------------------------------
DWORD WINAPI
TLSGetVersion (
IN TLS_HANDLE hHandle,
OUT PDWORD pdwVersion
)
/*++
++*/
{
return TLSRpcGetVersion( hHandle, pdwVersion );
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSSendServerCertificate(
TLS_HANDLE hHandle,
DWORD cbCert,
PBYTE pbCert,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcSendServerCertificate(
hHandle,
cbCert,
pbCert,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetServerName(
TLS_HANDLE hHandle,
LPTSTR szMachineName,
PDWORD pcbSize,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcGetServerName(
hHandle,
szMachineName,
pcbSize,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetServerNameEx(
TLS_HANDLE hHandle,
LPTSTR szMachineName,
PDWORD pcbSize,
PDWORD pdwErrCode
)
/*++
++*/
{
RPC_STATUS rpc_status;
rpc_status = TLSRpcGetServerNameEx(
hHandle,
szMachineName,
pcbSize,
pdwErrCode
);
if (rpc_status == RPC_S_PROCNUM_OUT_OF_RANGE)
{
rpc_status = TLSRpcGetServerName(
hHandle,
szMachineName,
pcbSize,
pdwErrCode
);
}
return rpc_status;
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetServerNameFixed(
TLS_HANDLE hHandle,
LPTSTR *pszMachineName,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcGetServerNameFixed(
hHandle,
pszMachineName,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetServerScope(
TLS_HANDLE hHandle,
LPTSTR szScopeName,
PDWORD pcbSize,
PDWORD pdwErrCode)
/*++
++*/
{
return TLSRpcGetServerScope(
hHandle,
szScopeName,
pcbSize,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetServerScopeFixed(
TLS_HANDLE hHandle,
LPTSTR *pszScopeName,
PDWORD pdwErrCode)
/*++
++*/
{
return TLSRpcGetServerScopeFixed(
hHandle,
pszScopeName,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSIssuePlatformChallenge(
TLS_HANDLE hHandle,
DWORD dwClientInfo,
PCHALLENGE_CONTEXT pChallengeContext,
PDWORD pcbChallengeData,
PBYTE* pChallengeData,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcIssuePlatformChallenge(
hHandle,
dwClientInfo,
pChallengeContext,
pcbChallengeData,
pChallengeData,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSIssueNewLicense(
TLS_HANDLE hHandle,
CHALLENGE_CONTEXT ChallengeContext,
LICENSEREQUEST *pRequest,
LPTSTR pMachineName,
LPTSTR pUserName,
DWORD cbChallengeResponse,
PBYTE pbChallengeResponse,
BOOL bAcceptTemporaryLicense,
PDWORD pcbLicense,
PBYTE* ppbLicense,
PDWORD pdwErrCode
)
/*++
++*/
{
TLSLICENSEREQUEST rpcRequest;
RequestToTlsRequest( pRequest, &rpcRequest );
return TLSRpcRequestNewLicense(
hHandle,
ChallengeContext,
&rpcRequest,
pMachineName,
pUserName,
cbChallengeResponse,
pbChallengeResponse,
bAcceptTemporaryLicense,
pcbLicense,
ppbLicense,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSIssueNewLicenseEx(
TLS_HANDLE hHandle,
PDWORD pSupportFlags,
CHALLENGE_CONTEXT ChallengeContext,
LICENSEREQUEST *pRequest,
LPTSTR pMachineName,
LPTSTR pUserName,
DWORD cbChallengeResponse,
PBYTE pbChallengeResponse,
BOOL bAcceptTemporaryLicense,
DWORD dwQuantity,
PDWORD pcbLicense,
PBYTE* ppbLicense,
PDWORD pdwErrCode
)
/*++
++*/
{
DWORD dwStatus;
TLSLICENSEREQUEST rpcRequest;
RequestToTlsRequest( pRequest, &rpcRequest );
dwStatus = TLSRpcRequestNewLicenseEx(
hHandle,
pSupportFlags,
ChallengeContext,
&rpcRequest,
pMachineName,
pUserName,
cbChallengeResponse,
pbChallengeResponse,
bAcceptTemporaryLicense,
dwQuantity,
pcbLicense,
ppbLicense,
pdwErrCode
);
if (dwStatus == RPC_S_PROCNUM_OUT_OF_RANGE)
{
*pSupportFlags = 0;
dwStatus = TLSRpcRequestNewLicense(
hHandle,
ChallengeContext,
&rpcRequest,
pMachineName,
pUserName,
cbChallengeResponse,
pbChallengeResponse,
bAcceptTemporaryLicense,
pcbLicense,
ppbLicense,
pdwErrCode
);
}
return(dwStatus);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSIssueNewLicenseExEx(
TLS_HANDLE hHandle,
PDWORD pSupportFlags,
CHALLENGE_CONTEXT ChallengeContext,
LICENSEREQUEST *pRequest,
LPTSTR pMachineName,
LPTSTR pUserName,
DWORD cbChallengeResponse,
PBYTE pbChallengeResponse,
BOOL bAcceptTemporaryLicense,
BOOL bAcceptFewerLicenses,
DWORD *pdwQuantity,
PDWORD pcbLicense,
PBYTE* ppbLicense,
PDWORD pdwErrCode
)
/*++
++*/
{
DWORD dwStatus;
TLSLICENSEREQUEST rpcRequest;
RequestToTlsRequest( pRequest, &rpcRequest );
dwStatus = TLSRpcRequestNewLicenseExEx(
hHandle,
pSupportFlags,
ChallengeContext,
&rpcRequest,
pMachineName,
pUserName,
cbChallengeResponse,
pbChallengeResponse,
bAcceptTemporaryLicense,
bAcceptFewerLicenses,
pdwQuantity,
pcbLicense,
ppbLicense,
pdwErrCode
);
if (dwStatus == RPC_S_PROCNUM_OUT_OF_RANGE)
{
dwStatus = TLSRpcRequestNewLicenseEx(
hHandle,
pSupportFlags,
ChallengeContext,
&rpcRequest,
pMachineName,
pUserName,
cbChallengeResponse,
pbChallengeResponse,
bAcceptTemporaryLicense,
*pdwQuantity,
pcbLicense,
ppbLicense,
pdwErrCode
);
if (dwStatus == RPC_S_PROCNUM_OUT_OF_RANGE)
{
*pSupportFlags = 0;
dwStatus = TLSRpcRequestNewLicense(
hHandle,
ChallengeContext,
&rpcRequest,
pMachineName,
pUserName,
cbChallengeResponse,
pbChallengeResponse,
bAcceptTemporaryLicense,
pcbLicense,
ppbLicense,
pdwErrCode
);
}
}
return(dwStatus);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSUpgradeLicense(
TLS_HANDLE hHandle,
LICENSEREQUEST *pRequest,
CHALLENGE_CONTEXT ChallengeContext,
DWORD cbChallengeResponse,
PBYTE pbChallengeResponse,
DWORD cbOldLicense,
PBYTE pbOldLicense,
PDWORD pcbNewLicense,
PBYTE* ppbNewLicense,
PDWORD pdwErrCode
)
/*++
++*/
{
TLSLICENSEREQUEST rpcRequest;
RequestToTlsRequest( pRequest, &rpcRequest );
return TLSRpcUpgradeLicense(
hHandle,
&rpcRequest,
ChallengeContext,
cbChallengeResponse,
pbChallengeResponse,
cbOldLicense,
pbOldLicense,
pcbNewLicense,
ppbNewLicense,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSUpgradeLicenseEx(
TLS_HANDLE hHandle,
PDWORD pSupportFlags,
LICENSEREQUEST *pRequest,
CHALLENGE_CONTEXT ChallengeContext,
DWORD cbChallengeResponse,
PBYTE pbChallengeResponse,
DWORD cbOldLicense,
PBYTE pbOldLicense,
DWORD dwQuantity,
PDWORD pcbNewLicense,
PBYTE* ppbNewLicense,
PDWORD pdwErrCode
)
/*++
++*/
{
DWORD dwStatus;
TLSLICENSEREQUEST rpcRequest;
RequestToTlsRequest( pRequest, &rpcRequest );
dwStatus = TLSRpcUpgradeLicenseEx(
hHandle,
pSupportFlags,
&rpcRequest,
ChallengeContext,
cbChallengeResponse,
pbChallengeResponse,
cbOldLicense,
pbOldLicense,
dwQuantity,
pcbNewLicense,
ppbNewLicense,
pdwErrCode
);
if (dwStatus == RPC_S_PROCNUM_OUT_OF_RANGE)
{
*pSupportFlags = 0;
dwStatus = TLSRpcUpgradeLicense(
hHandle,
&rpcRequest,
ChallengeContext,
cbChallengeResponse,
pbChallengeResponse,
cbOldLicense,
pbOldLicense,
pcbNewLicense,
ppbNewLicense,
pdwErrCode
);
}
return(dwStatus);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSAllocateConcurrentLicense(
TLS_HANDLE hHandle,
LPTSTR szHydraServer,
LICENSEREQUEST *pRequest,
LONG *dwQuantity,
PDWORD pdwErrCode
)
/*++
++*/
{
TLSLICENSEREQUEST rpcRequest;
RequestToTlsRequest( pRequest, &rpcRequest );
return TLSRpcAllocateConcurrentLicense(
hHandle,
szHydraServer,
&rpcRequest,
dwQuantity,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetLastError(
TLS_HANDLE hHandle,
DWORD cbBufferSize,
LPTSTR pszBuffer,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcGetLastError(
hHandle,
&cbBufferSize,
pszBuffer,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetLastErrorFixed(
TLS_HANDLE hHandle,
LPTSTR *pszBuffer,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcGetLastErrorFixed(
hHandle,
pszBuffer,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSKeyPackEnumBegin(
TLS_HANDLE hHandle,
DWORD dwSearchParm,
BOOL bMatchAll,
LPLSKeyPackSearchParm lpSearchParm,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcKeyPackEnumBegin(
hHandle,
dwSearchParm,
bMatchAll,
lpSearchParm,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSKeyPackEnumNext(
TLS_HANDLE hHandle,
LPLSKeyPack lpKeyPack,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcKeyPackEnumNext(
hHandle,
lpKeyPack,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSKeyPackEnumEnd(
TLS_HANDLE hHandle,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcKeyPackEnumEnd(hHandle, pdwErrCode);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSLicenseEnumBegin(
TLS_HANDLE hHandle,
DWORD dwSearchParm,
BOOL bMatchAll,
LPLSLicenseSearchParm lpSearchParm,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcLicenseEnumBegin(
hHandle,
dwSearchParm,
bMatchAll,
lpSearchParm,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSLicenseEnumNext(
TLS_HANDLE hHandle,
LPLSLicense lpLicense,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcLicenseEnumNext(
hHandle,
lpLicense,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSLicenseEnumNextEx(
TLS_HANDLE hHandle,
LPLSLicenseEx lpLicenseEx,
PDWORD pdwErrCode
)
/*++
++*/
{
DWORD dwRet;
if (NULL == lpLicenseEx)
{
return ERROR_INVALID_PARAMETER;
}
dwRet = TLSRpcLicenseEnumNextEx(
hHandle,
lpLicenseEx,
pdwErrCode
);
if (RPC_S_PROCNUM_OUT_OF_RANGE == dwRet)
{
LSLicense License;
dwRet = TLSRpcLicenseEnumNext(
hHandle,
&License,
pdwErrCode
);
if ((dwRet == RPC_S_OK)
&& (NULL != pdwErrCode)
&& (*pdwErrCode == ERROR_SUCCESS))
{
// older versions only support quantity == 1
memcpy(lpLicenseEx,&License,sizeof(License));
lpLicenseEx->dwQuantity = 1;
}
}
return dwRet;
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSLicenseEnumEnd(
TLS_HANDLE hHandle,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcLicenseEnumEnd(hHandle, pdwErrCode);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetAvailableLicenses(
TLS_HANDLE hHandle,
DWORD dwSearchParm,
LPLSKeyPack lplsKeyPack,
LPDWORD lpdwAvail,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcGetAvailableLicenses(
hHandle,
dwSearchParm,
lplsKeyPack,
lpdwAvail,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetRevokeKeyPackList(
TLS_HANDLE hHandle,
PDWORD pcbNumberOfRange,
LPLSRange *ppRevokeRange,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcGetRevokeKeyPackList(
hHandle,
pcbNumberOfRange,
ppRevokeRange,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetRevokeLicenseList(
TLS_HANDLE hHandle,
PDWORD pcbNumberOfRange,
LPLSRange *ppRevokeRange,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcGetRevokeLicenseList(
hHandle,
pcbNumberOfRange,
ppRevokeRange,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSMarkLicense(
TLS_HANDLE hHandle,
UCHAR ucFlags,
DWORD cbLicense,
PBYTE pLicense,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcMarkLicense(
hHandle,
ucFlags,
cbLicense,
pLicense,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSCheckLicenseMark(
TLS_HANDLE hHandle,
DWORD cbLicense,
PBYTE pLicense,
PUCHAR pucFlags,
PDWORD pdwErrCode
)
/*++
++*/
{
return TLSRpcCheckLicenseMark(
hHandle,
cbLicense,
pLicense,
pucFlags,
pdwErrCode
);
}
//----------------------------------------------------------------------------
DWORD WINAPI
TLSGetSupportFlags(
TLS_HANDLE hHandle,
DWORD *pdwSupportFlags
)
/*++
++*/
{
return TLSRpcGetSupportFlags(
hHandle,
pdwSupportFlags
);
}