Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1191 lines
32 KiB

//+-----------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (c) Microsoft Corporation 1992 - 1996
//
// File: rpcutil.cxx
//
// Contents: Utilities for RPC for Kerberos package
//
//
// History: 19-April-1996 Created MikeSw
//
//------------------------------------------------------------------------
#include <kerb.hxx>
#include <kerbp.h>
#ifdef RETAIL_LOG_SUPPORT
static TCHAR THIS_FILE[]=TEXT(__FILE__);
#endif
extern "C"
{
#include <lmaccess.h>
#include <lmapibuf.h>
#include <lmerr.h>
#ifndef WIN32_CHICAGO
#include <netlibnt.h>
#endif // WIN32_CHICAGO
}
SOCKET KerbPNPSocket;
HANDLE KerbPNPSocketEvent = NULL;
HANDLE KerbPNPSocketWaitHandle = NULL;
#ifndef WIN32_CHICAGO
// The problem here is that we need to read the domain info once after
// joining domain. (for rebootless join) and once after the reboot
// (if there was one). We can only delete the data after a reboot.
// This one controls whether I read the domain info that JoinDomain dumps
// in the registry.
BOOLEAN fNewDataAboutDomain = TRUE;
// This one controls when I should delete the domain info that JoinDomain
// dumps in the registry
BOOLEAN fRebootedSinceJoin = TRUE;
SAFE_CRITICAL_SECTION KerbCallKdcDataLock;
BOOLEAN KerbCallKdcDataInitialized = FALSE;
#define KerbLockKdcData() (SafeEnterCriticalSection(&KerbCallKdcDataLock))
#define KerbUnlockKdcData() (SafeLeaveCriticalSection(&KerbCallKdcDataLock))
#endif // WIN32_CHICAGO
#ifndef WIN32_CHICAGO
NTSTATUS
KerbInitKdcData()
{
NTSTATUS Status = STATUS_SUCCESS;
if (!KerbCallKdcDataInitialized)
{
Status = SafeInitializeCriticalSection(&KerbCallKdcDataLock, KDC_DATA_LOCK_ENUM);
if (!NT_SUCCESS(Status))
{
goto Cleanup;
}
KerbCallKdcDataInitialized = TRUE;
}
Cleanup:
return Status;
}
VOID
KerbFreeKdcData()
{
if (KerbCallKdcDataInitialized)
{
SafeDeleteCriticalSection(&KerbCallKdcDataLock);
KerbCallKdcDataInitialized = FALSE;
}
}
VOID
KerbSetKdcData(BOOLEAN fNewDomain, BOOLEAN fRebooted)
{
KerbLockKdcData();
fNewDataAboutDomain = fNewDomain;
fRebootedSinceJoin = fRebooted;
KerbUnlockKdcData();
}
#endif // WIN32_CHICAGO
//+-------------------------------------------------------------------------
//
// Function: MIDL_user_allocate
//
// Synopsis: Allocation routine for use by RPC client stubs
//
// Effects: allocates memory with LsaFunctions.AllocateLsaHeap
//
// Arguments: BufferSize - size of buffer, in bytes, to allocate
//
// Requires:
//
// Returns: Buffer pointer or NULL on allocation failure
//
// Notes:
//
//
//--------------------------------------------------------------------------
PVOID
MIDL_user_allocate(
IN size_t BufferSize
)
{
return (KerbAllocate( ROUND_UP_COUNT((ULONG) BufferSize, 8) ) );
}
//+-------------------------------------------------------------------------
//
// Function: MIDL_user_free
//
// Synopsis: Memory free routine for RPC client stubs
//
// Effects: frees the buffer with LsaFunctions.FreeLsaHeap
//
// Arguments: Buffer - Buffer to free
//
// Requires:
//
// Returns: none
//
// Notes:
//
//
//--------------------------------------------------------------------------
VOID
MIDL_user_free(
IN PVOID Buffer
)
{
KerbFree( Buffer );
}
#ifndef WIN32_CHICAGO
#define NETSETUPP_NETLOGON_PARAMETERS \
L"SYSTEM\\CurrentControlSet\\Services\\Netlogon\\Parameters"
#define NETSETUPP_NETLOGON_KERB_JD\
L"KerbIsDoneWithJoinDomainEntry"
#define NETSETUPP_NETLOGON_JD \
L"SYSTEM\\CurrentControlSet\\Services\\Netlogon\\JoinDomain"
#define NETSETUPP_NETLOGON_JD_DCA L"DomainControllerAddress"
#define NETSETUPP_NETLOGON_JD_DCAT L"DomainControllerAddressType"
#define NETSETUPP_NETLOGON_JD_F L"Flags"
BOOLEAN
ReadInitialDcRecord(PUNICODE_STRING uString,
PULONG RegAddressType,
PULONG RegFlags)
{
ULONG WinError = ERROR_SUCCESS;
HKEY hJoinKey = NULL, hParametersKey = NULL;
ULONG Flags = 0, AddressType = 0, KdcNameSize = 0, dwTRUE = 1, Type =0;
LPWSTR KdcName = NULL;
BOOLEAN fReadCache = FALSE;
ULONG dwsize = sizeof(ULONG);
USHORT TempLen = 0;
RtlInitUnicodeString(
uString,
NULL
);
*RegAddressType = 0;
*RegFlags = 0;
WinError = RegOpenKey( HKEY_LOCAL_MACHINE,
NETSETUPP_NETLOGON_JD,
&hJoinKey);
if ( WinError != ERROR_SUCCESS) {
goto Cleanup;
}
WinError = RegQueryValueEx( hJoinKey,
NETSETUPP_NETLOGON_JD_DCA,
0,
&Type,
NULL,
&KdcNameSize);
if ( WinError != ERROR_SUCCESS) {
goto Cleanup;
}
SafeAllocaAllocate(KdcName, KdcNameSize);
if (KdcName == NULL)
{
goto Cleanup;
}
WinError = RegQueryValueEx( hJoinKey,
NETSETUPP_NETLOGON_JD_DCA,
0,
&Type,
(PUCHAR) KdcName,
&KdcNameSize);
if ( WinError != ERROR_SUCCESS) {
goto Cleanup;
}
WinError = RegQueryValueEx( hJoinKey,
NETSETUPP_NETLOGON_JD_DCAT,
0,
&Type,
(PUCHAR)&AddressType,
&dwsize );
if ( WinError != ERROR_SUCCESS) {
goto Cleanup;
}
WinError = RegQueryValueEx( hJoinKey,
NETSETUPP_NETLOGON_JD_F,
0,
&Type,
(PUCHAR)&Flags,
&dwsize);
if ( WinError != ERROR_SUCCESS) {
goto Cleanup;
}
TempLen = (USHORT)wcslen(KdcName+2);
uString->Buffer = (PWSTR) KerbAllocate ((TempLen + 1) *sizeof(WCHAR));
if (uString->Buffer == NULL)
{
goto Cleanup;
}
wcscpy(uString->Buffer,
KdcName+2);
uString->Length = TempLen * sizeof(WCHAR);
uString->MaximumLength = uString->Length + sizeof(WCHAR);
uString->Buffer[TempLen] = L'\0';
*RegAddressType = AddressType;
*RegFlags = Flags;
// Now set the reg entry so that netlogon knows that we've read it.
if (fRebootedSinceJoin)
{
WinError = RegOpenKey( HKEY_LOCAL_MACHINE,
NETSETUPP_NETLOGON_PARAMETERS,
&hParametersKey);
if ( WinError != ERROR_SUCCESS) {
goto Cleanup;
}
WinError = RegSetValueEx( hParametersKey,
NETSETUPP_NETLOGON_KERB_JD,
0,
REG_DWORD,
(PUCHAR)&dwTRUE,
sizeof(DWORD));
if ( WinError != ERROR_SUCCESS) {
goto Cleanup;
}
DebugLog((DEB_ERROR, "Setting DoneWJoin key!\n"));
}
fReadCache = TRUE;
Cleanup:
KerbSetKdcData(FALSE, fRebootedSinceJoin);
if (hJoinKey)
{
RegCloseKey( hJoinKey );
}
if (hParametersKey)
{
RegCloseKey( hParametersKey );
}
SafeAllocaFree(KdcName);
return (fReadCache);
}
#endif // WIN32_CHICAGO
//+-------------------------------------------------------------------------
//
// Function: KerbSocketChangeHandler
//
// Synopsis: Simply setups up a WSA Pnp event, so that we catch network
// changes.
//
// Effects:
//
// Arguments:
//
// Requires:
//
// Returns:
//
// Notes:
//
//
//--------------------------------------------------------------------------
VOID
KerbSocketChangeHandler(
VOID* Context,
BOOLEAN WaitStatus
)
{
WSAPROTOCOL_INFO *lpProtocolBuf = NULL;
DWORD dwBufLen = 0;
INT protocols[2];
int nRet = 0;
NTSTATUS Status;
NET_API_STATUS NetStatus;
D_DebugLog((DEB_TRACE, "API: KerbSocketChangeHandler()\n"));
//
// Determine if TCP is installed.
//
protocols[0] = IPPROTO_TCP;
protocols[1] = NULL;
nRet = WSAEnumProtocols(protocols, lpProtocolBuf, &dwBufLen);
KerbGlobalWriteLock();
if (nRet == 0)
{
D_DebugLog((DEB_TRACE_SOCK, "Turning OFF! TCP %x\n", nRet));
KerbGlobalNoTcpUdp = TRUE;
}
else
{
KerbGlobalNoTcpUdp = FALSE;
if (nRet == SOCKET_ERROR)
{
nRet = WSAGetLastError();
D_DebugLog((DEB_TRACE_SOCK, "TCP problem? %x\n", nRet));
}
D_DebugLog((DEB_TRACE_SOCK, "Turning on TCP %x\n", nRet));
}
KerbGlobalReleaseLock();
//
// Re-Register the wait - but make sure the values are init'd / correct.
//
KerbLockKdcData();
if ( KerbPNPSocketWaitHandle && KerbPNPSocketEvent )
{
NetStatus = WSAEventSelect(
KerbPNPSocket,
KerbPNPSocketEvent,
FD_ADDRESS_LIST_CHANGE
);
if ( NetStatus != 0 )
{
NetStatus = WSAGetLastError();
DebugLog(( DEB_ERROR, "Can't WSAEventSelect %ld\n", NetStatus ));
}
Status = RtlRegisterWait(
&KerbPNPSocketWaitHandle,
KerbPNPSocketEvent,
KerbSocketChangeHandler,
NULL,
INFINITE,
WT_EXECUTEDEFAULT | WT_EXECUTEONLYONCE
);
if (!NT_SUCCESS( Status ))
{
DebugLog((DEB_ERROR, "RtlRegisterWait failed %x\n", Status));
}
//
// Issue the IOCTL, so we'll get notified.
//
NetStatus = WSAIoctl(
KerbPNPSocket,
SIO_ADDRESS_LIST_CHANGE,
NULL, // No input buffer
0, // No input buffer
NULL, // No output buffer
0, // No output buffer
&dwBufLen,
NULL, // No overlapped,
NULL // Not async
);
if ( NetStatus != 0 )
{
NetStatus = WSAGetLastError();
if ( NetStatus != WSAEWOULDBLOCK)
{
DebugLog((DEB_ERROR, "WSAIOCTL failed %x\n", NetStatus));
Status = STATUS_INTERNAL_ERROR;
}
}
}
KerbUnlockKdcData();
KerbCleanupBindingCache(FALSE);
}
//+-------------------------------------------------------------------------
//
// Function: KerbInitNetworkChangeEvent
//
// Synopsis: Simply setups up a WSA Pnp event, so that we catch network
// changes.
//
// Effects:
//
// Arguments:
//
// Requires:
//
// Returns:
//
// Notes:
//
//
//--------------------------------------------------------------------------
NTSTATUS
KerbInitNetworkChangeEvent()
{
NET_API_STATUS NetStatus;
NTSTATUS Status = STATUS_INTERNAL_ERROR;
DWORD BytesReturned;
KerbLockKdcData();
if ( KerbPNPSocket != NULL )
{
D_DebugLog((DEB_ERROR, "second init of network change event\n"));
goto Cleanup;
}
//
// Open a socket to get winsock PNP notifications on.
//
KerbPNPSocket = WSASocket(
AF_INET,
SOCK_DGRAM,
0, // PF_INET,
NULL,
0,
0
);
if ( KerbPNPSocket == INVALID_SOCKET )
{
NetStatus = WSAGetLastError();
if ( NetStatus == WSAEAFNOSUPPORT )
{
Status = STATUS_SUCCESS;
goto Cleanup;
}
goto Cleanup;
}
//
// Open an event to wait on.
//
KerbPNPSocketEvent = CreateEvent(
NULL, // No security ettibutes
FALSE, // Auto reset
FALSE, // Initially not signaled
NULL
);
if ( KerbPNPSocketEvent == NULL )
{
DebugLog(( DEB_ERROR,"Cannot create Winsock PNP event %ld\n", GetLastError() ));
Status = STATUS_INTERNAL_ERROR;
goto Cleanup;
}
NetStatus = WSAEventSelect(
KerbPNPSocket,
KerbPNPSocketEvent,
FD_ADDRESS_LIST_CHANGE
);
if ( NetStatus != 0 )
{
NetStatus = WSAGetLastError();
DebugLog(( DEB_ERROR, "Can't WSAEventSelect %ld\n", NetStatus ));
goto Cleanup;
}
//
// Register a wait.
//
Status = RtlRegisterWait(
&KerbPNPSocketWaitHandle,
KerbPNPSocketEvent,
KerbSocketChangeHandler,
NULL,
INFINITE,
WT_EXECUTEDEFAULT | WT_EXECUTEONLYONCE
);
if (!NT_SUCCESS( Status ))
{
DebugLog((DEB_ERROR, "RtlRegisterWait failed %x\n", Status));
goto Cleanup;
}
//
// Issue the IOCTL, so we'll get notified.
//
NetStatus = WSAIoctl(
KerbPNPSocket,
SIO_ADDRESS_LIST_CHANGE,
NULL, // No input buffer
0, // No input buffer
NULL, // No output buffer
0, // No output buffer
&BytesReturned,
NULL, // No overlapped,
NULL // Not async
);
if ( NetStatus != 0 )
{
NetStatus = WSAGetLastError();
if ( NetStatus != WSAEWOULDBLOCK) {
DebugLog((DEB_ERROR, "WSAIOCTL failed %x\n", NetStatus));
Status = STATUS_INTERNAL_ERROR;
}
}
Cleanup:
if (!NT_SUCCESS( Status ))
{
if ( KerbPNPSocketWaitHandle )
{
RtlDeregisterWait(KerbPNPSocketWaitHandle);
KerbPNPSocketWaitHandle = NULL;
}
if ( KerbPNPSocketEvent )
{
CloseHandle( KerbPNPSocketEvent );
KerbPNPSocketEvent = NULL;
}
if ( KerbPNPSocket )
{
closesocket( KerbPNPSocket );
KerbPNPSocket = NULL;
}
}
KerbUnlockKdcData();
return Status;
}
//
// This address type is used for talking to MIT KDCs
//
#define DS_UNKNOWN_ADDRESS_TYPE 0
//+-------------------------------------------------------------------------
//
// Function: KerbGetKdcBinding
//
// Synopsis: Gets a binding to the KDC in the specified domain
//
// Effects:
//
// Arguments: Realm - Domain in which to find KDC
// PrincipalName - name of a principal that must be on the KDC
// DesiredFlags - Flags to pass to the locator.
// FindKpasswd - if domain is an MIT realm, then returns Kpasswd
// addresses instead of KDC addresses KDC
// BindingCacheEntry - receives binding handle cache entry for
// TCP to the KDC
//
// Requires:
//
// Returns: RPC errors, NET API errors
//
// Notes:
//
//
//--------------------------------------------------------------------------
NTSTATUS
KerbGetKdcBinding(
IN PUNICODE_STRING RealmName,
IN OPTIONAL PUNICODE_STRING PrincipalName,
IN ULONG DesiredFlags,
IN BOOLEAN FindKpasswd,
IN BOOLEAN UseTcp,
OUT PKERB_BINDING_CACHE_ENTRY * BindingCacheEntry
)
{
NTSTATUS Status = STATUS_NETLOGON_NOT_STARTED;
NTSTATUS TempStatus = STATUS_SUCCESS;
LPWSTR DomainName = NULL;
LPWSTR AccountName = NULL;
ULONG NetStatus = 0;
ULONG AddressType = DS_INET_ADDRESS;
UNICODE_STRING KdcNameString = {0};
PDOMAIN_CONTROLLER_INFOW DcInfo = NULL;
PKERB_MIT_REALM MitRealm = NULL;
BOOLEAN CacheDc = FALSE;
BOOLEAN CalledNetlogonDirectly = FALSE;
KERBEROS_MACHINE_ROLE Role;
ULONG ActualFlags = 0;
ULONG CacheFlags = 0, DcFlags = 0;
#ifndef WIN32_CHICAGO
ULONG CachedAddressType = DS_INET_ADDRESS;
ULONG CachedFlags = 0;
UNICODE_STRING CachedKdcNameString = {0};
UNICODE_STRING LocalMachineName;
#endif // WIN32_CHICAGO
Role = KerbGetGlobalRole();
#ifndef WIN32_CHICAGO
LocalMachineName.Buffer = NULL;
KerbGlobalReadLock();
//
// use TempStatus to retain initial Status value.
//
TempStatus = KerbDuplicateString( &LocalMachineName, &KerbGlobalMachineName );
KerbGlobalReleaseLock();
if(!NT_SUCCESS(TempStatus))
{
DebugLog((DEB_ERROR, "Failed to duplicate KerbGlobalMachineName\n"));
Status = TempStatus;
goto Cleanup;
}
if ((Role != KerbRoleDomainController) &&
(RtlEqualDomainName(
RealmName,
&LocalMachineName
)))
{
//
// This is an attempt at a local logon on a workstation. We don't do that.
//
DebugLog((DEB_WARN, "Attempting to locate a KDC for the workstation - failing\n"));
Status = STATUS_NO_LOGON_SERVERS;
goto Cleanup;
}
//
// If we are logging on for the first time after join domain, the
// following registry entry should exist.
// Cache that entry, we should try to get to that dc.
// Don't cache the entry if we are a dc
// Don't cache the entry if this is not for our domain
//
if ( fNewDataAboutDomain &&
KerbGlobalRole != KerbRoleDomainController)
{
if (ReadInitialDcRecord(&CachedKdcNameString, &CachedAddressType, &CachedFlags))
{
KerbFreeString(&KerbGlobalInitialDcRecord);
RtlInitUnicodeString(
&KerbGlobalInitialDcRecord,
CachedKdcNameString.Buffer
);
KerbGlobalInitialDcAddressType = CachedAddressType;
KerbGlobalInitialDcFlags = CachedFlags;
CacheDc = TRUE;
}
else if (KerbGlobalInitialDcRecord.Buffer != NULL)
{
CacheDc = TRUE;
}
if (CacheDc && KerbIsThisOurDomain( RealmName))
{
PKERB_BINDING_CACHE_ENTRY TempBindingCacheEntry = NULL;
TempStatus = KerbCacheBinding(
RealmName,
&KerbGlobalInitialDcRecord,
KerbGlobalInitialDcAddressType,
DesiredFlags,
KerbGlobalInitialDcFlags,
0,
&TempBindingCacheEntry
);
if ( TempBindingCacheEntry ) {
KerbDereferenceBindingCacheEntry( TempBindingCacheEntry );
}
KerbFreeString(&KerbGlobalInitialDcRecord);
}
}
#endif // WIN32_CHICAGO
//
// Check the cache if we don't want to force rediscovery
//
if ((DesiredFlags & DS_FORCE_REDISCOVERY) == 0)
{
*BindingCacheEntry = KerbLocateBindingCacheEntry(
RealmName,
DesiredFlags,
FALSE
);
if (NULL != *BindingCacheEntry)
{
//
// For realmless workstations, we add negative cache entries.
// This is because the netlogon service doesn't run on non-joined
// machines, so we don't have the benefit of its negative caching.
// The end result is that we need to do that ourselves.
//
if (( Role == KerbRoleRealmlessWksta ) &&
(( (*BindingCacheEntry)->CacheFlags & KERB_BINDING_NEGATIVE_ENTRY ) != 0))
{
DebugLog((DEB_TRACE_BND_CACHE, "Found negative entry for %wZ\n", RealmName));
Status = STATUS_NO_LOGON_SERVERS;
}
else
{
Status = STATUS_SUCCESS;
}
goto Cleanup;
}
}
//
// If we are a domain controller, then we can simply use our global
// computer name.
//
#ifndef WIN32_CHICAGO
if ((Role == KerbRoleDomainController) &&
((DesiredFlags & DS_PDC_REQUIRED) == 0) &&
KerbIsThisOurDomain(
RealmName
))
{
DsysAssert(LocalMachineName.Buffer[LocalMachineName.Length/sizeof(WCHAR)] == L'\0');
if (!KerbKdcStarted)
{
Status = KerbWaitForKdc( KerbGlobalKdcWaitTime ); // wait for KerbGlobalKdcWaitTime seconds
if (NT_SUCCESS(Status))
{
KerbKdcStarted = TRUE;
}
else
{
DebugLog((DEB_WARN, "Failed to wait for KDC to start: 0x%x\n",Status));
}
}
if (KerbKdcStarted)
{
Status = STATUS_SUCCESS;
KdcNameString = LocalMachineName;
AddressType = DS_NETBIOS_ADDRESS;
CacheFlags |= KERB_BINDING_LOCAL;
DcFlags |= DS_CLOSEST_FLAG;
}
}
#endif // WIN32_CHICAGO
//
// Check to see if this is an MIT realm
//
if (!NT_SUCCESS(Status) &&
KerbLookupMitRealmWithSrvLookup(
RealmName,
&MitRealm,
FindKpasswd,
UseTcp
))
{
LONG ServerIndex;
PKERB_MIT_SERVER_LIST ServerList;
if ((MitRealm->Flags & KERB_MIT_REALM_TCP_SUPPORTED) == 0)
{
CacheFlags |= KERB_BINDING_NO_TCP;
}
//
// Pick which of the servers we want to use.
//
if (FindKpasswd)
{
ServerList = &MitRealm->KpasswdNames;
}
else
{
ServerList = &MitRealm->KdcNames;
}
//
// If we aren't forcing rediscovery, use the last known KDC
//
if (ServerList->ServerCount <= 0)
{
Status = STATUS_NO_LOGON_SERVERS;
goto Cleanup;
}
if ((DesiredFlags & DS_FORCE_REDISCOVERY) == 0)
{
ServerIndex = ServerList->LastServerUsed;
}
else
{
//
// If we are forcing rediscovery, try the next realm in the list
//
#ifndef WIN32_CHICAGO // Implement using a global & cs
ServerIndex = InterlockedExchangeAdd(&ServerList->LastServerUsed, 1) + 1;
#else // WIN32_CHICAGO
ServerIndex = ServerList->LastServerUsed + 1;
(ServerList->LastServerUsed) ++;
#endif // WIN32_CHICAGO // Implement using a global & cs
if (ServerIndex >= ServerList->ServerCount)
{
InterlockedExchange(&ServerList->LastServerUsed, 0);
}
}
ServerIndex = ServerIndex % ServerList->ServerCount;
KdcNameString = ServerList->ServerNames[ServerIndex];
AddressType = DS_UNKNOWN_ADDRESS_TYPE;
Status = STATUS_SUCCESS;
}
//
// If we haven't yet found a KDC try DsGetDcName
//
if (!NT_SUCCESS(Status))
{
//
// We are dependent on AFD, so wait for it to start
//
#ifndef WIN32_CHICAGO
if (!KerbAfdStarted)
{
Status = KerbWaitForService(L"LanmanWorkstation", NULL, KerbGlobalKdcWaitTime);
if (!NT_SUCCESS(Status))
{
DebugLog((DEB_WARN, "Failed to wait forAFD: 0x%x\n",Status));
goto Cleanup;
}
KerbAfdStarted = TRUE;
//
// Setup for network change initialization.
//
KerbInitNetworkChangeEvent();
}
#endif // WIN32_CHICAGO
//
// Build the null-terminated domain name.
//
SafeAllocaAllocate(DomainName, RealmName->Length + sizeof(WCHAR));
if (DomainName == NULL)
{
Status = STATUS_INSUFFICIENT_RESOURCES;
goto Cleanup;
}
RtlCopyMemory(
DomainName,
RealmName->Buffer,
RealmName->Length
);
DomainName[RealmName->Length/sizeof(WCHAR)] = L'\0';
//
// If a principal name was provided, pass it to Netlogon
//
if ((PrincipalName != NULL) && (PrincipalName->Length != 0))
{
SafeAllocaAllocate(AccountName, PrincipalName->Length + sizeof(WCHAR));
if (AccountName == NULL)
{
Status = STATUS_INSUFFICIENT_RESOURCES;
goto Cleanup;
}
RtlCopyMemory(
AccountName,
PrincipalName->Buffer,
PrincipalName->Length
);
AccountName[PrincipalName->Length/sizeof(WCHAR)] = L'\0';
}
//
// Actual flags that will be used.
//
if (DesiredFlags & DS_PDC_REQUIRED)
{
ActualFlags = (DesiredFlags | KERB_LOCATOR_FLAGS) & ~DS_KDC_REQUIRED;
}
else
{
ActualFlags = DesiredFlags | KERB_LOCATOR_FLAGS;
}
//
// Find the name of a DC in this domain:
//
#ifndef WIN32_CHICAGO
//
// Make sure that changes to the enumeration are
// taken into account here.
//
if ( !KerbNetlogonStarted &&
( Role > KerbRoleStandalone ) &&
( fRebootedSinceJoin ))
{
Status = KerbWaitForService(
SERVICE_NETLOGON,
NETLOGON_STARTED_EVENT,
KerbGlobalKdcWaitTime
);
if (NT_SUCCESS(Status))
{
KerbNetlogonStarted = TRUE;
}
else
{
Status = STATUS_SUCCESS;
}
}
if (KerbNetlogonStarted)
{
CalledNetlogonDirectly = TRUE;
NetStatus = DsrGetDcNameEx2(
NULL,
AccountName, // no account name
UF_ACCOUNT_TYPE_MASK, // any account type
DomainName,
NULL, // no domain GUID
NULL, // no site GUID,
ActualFlags,
&DcInfo
);
}
else
#endif // WIN32_CHICAGO
{
TryNetapi:
NetStatus = DsGetDcNameW(
NULL,
DomainName,
NULL, // no domain GUID
NULL, // no site GUID,
ActualFlags,
&DcInfo
);
}
if (NetStatus != NO_ERROR)
{
if (NetStatus == STATUS_NETLOGON_NOT_STARTED ||
NetStatus == ERROR_NETLOGON_NOT_STARTED )
{
KerbNetlogonStarted = FALSE;
if (CalledNetlogonDirectly)
{
CalledNetlogonDirectly = FALSE;
goto TryNetapi;
}
}
DebugLog((
DEB_WARN,
"No MS DC for domain %ws, account name %ws, locator flags 0x%x: %d. %ws, line %d\n",
DomainName,
(AccountName ? AccountName : L"NULL"),
ActualFlags,
NetStatus,
THIS_FILE,
__LINE__
));
if (NetStatus == ERROR_NETWORK_UNREACHABLE)
{
Status = STATUS_NETWORK_UNREACHABLE;
}
else
{
if ( Role == KerbRoleRealmlessWksta )
{
DebugLog((DEB_TRACE_BND_CACHE, "NEG Caching realm %wZ\n", RealmName));
KerbCacheBinding(
RealmName,
&KdcNameString,
AddressType,
DesiredFlags,
DcFlags,
( CacheFlags | KERB_BINDING_NEGATIVE_ENTRY ),
BindingCacheEntry
);
}
Status = STATUS_NO_LOGON_SERVERS;
}
KerbResetTransportCounter();
}
else // no error
{
RtlInitUnicodeString(
&KdcNameString,
DcInfo->DomainControllerAddress+2
);
AddressType = DcInfo->DomainControllerAddressType;
DcFlags |= DcInfo->Flags;
Status = STATUS_SUCCESS;
}
}
if (!NT_SUCCESS(Status))
{
DebugLog((
DEB_TRACE,
"No DC for domain %ws, account name %ws, locator flags 0x%x: %d. %ws, line %d\n",
DomainName,
(AccountName ? AccountName : L"NULL"),
ActualFlags,
NetStatus,
THIS_FILE,
__LINE__
));
goto Cleanup;
}
//
// Make a binding
//
//
// If this is a local call so don't bother with the socket
//
Status = KerbCacheBinding(
RealmName,
&KdcNameString,
AddressType,
DesiredFlags, // Flags that we would like to have
DcFlags, // This is what the dc has
CacheFlags, // Special kerberos flags so we don't use
// locator's bit space
BindingCacheEntry
);
if (!NT_SUCCESS(Status))
{
goto Cleanup;
}
Cleanup:
SafeAllocaFree(DomainName);
SafeAllocaFree(AccountName);
#ifndef WIN32_CHICAGO
if (DcInfo != NULL)
{
if (CalledNetlogonDirectly)
{
I_NetLogonFree(DcInfo);
}
else
{
NetApiBufferFree(DcInfo);
}
}
KerbFreeString( &LocalMachineName );
#endif // WIN32_CHICAGO
return(Status);
}