windows-nt/Source/XPSP1/NT/com/rpc/runtime/epmap/epmap.c

179 lines
3.9 KiB
C
Raw Permalink Normal View History

2020-09-26 03:20:57 -05:00
/*++
Copyright (C) Microsoft Corporation, 1991 - 1999
Module Name:
epmap.c
Abstract:
This file contains the EP Mapper startup code and process wide globals.
Author:
Bharat Shah (barats) 17-2-92
Revision History:
06-16-95 MarioGo Much of the code replaced by ..\wrapper\start.c
Renamed from server.c
Jan 2000 KamenM Add debugging support
--*/
#include <sysinc.h>
#include <wincrypt.h>
#include <rpc.h>
#include <winsvc.h>
#include "epmp.h"
#include "eptypes.h"
#include "local.h"
#include <DbgComn.h>
#include <DbgIdl.h>
#include <DbgSvr.hxx>
#if DBG && !defined(DEBUGRPC)
#define DEBUGRPC
#endif
/*// Endpoint related functions
RPC_STATUS InitializeEndpointManager(VOID);
DWORD StartEndpointMapper(VOID);
USHORT GetProtseqIdAnsi(PSTR Protseq);
USHORT GetProtseqId(PWSTR Protseq);
PWSTR GetProtseq(USHORT ProtseqId);
PWSTR GetEndpoint(USHORT ProtseqId);
RPC_STATUS UseProtseqIfNecessary(USHORT id);
RPC_STATUS DelayedUseProtseq(USHORT id);
VOID CompleteDelayedUseProtseqs();
BOOL IsLocal(USHORT ProtseqId);
*/
extern RPC_STATUS InitializeIpPortManager();
//
// Endpoint Mapper Globals
//
HANDLE hEpMapperHeap;
CRITICAL_SECTION EpCritSec;
PIFOBJNode IFObjList = NULL;
PSAVEDCONTEXT GlobalContextList = NULL;
unsigned long cTotalEpEntries = 0L;
unsigned long GlobalIFOBJid = 0xFFL;
unsigned long GlobalEPid = 0x00FFFFFFL;
UUID NilUuid = { 0L, 0, 0, {0, 0, 0, 0, 0, 0, 0, 0} };
DWORD
StartEndpointMapper(
void
)
/*++
Routine Description:
Called during dcomss startup. Should call Updatestatus()
if something will take very long.
Arguments:
None
Return Value:
0 - success
non-0 - will cause the service to fail.
--*/
{
extern void RPC_ENTRY UpdateAddresses( PVOID arg );
RPC_STATUS status = RPC_S_OK;
BOOL fAuthInfoNotRegistered = FALSE;
InitializeCriticalSectionAndSpinCount(&EpCritSec, PREALLOCATE_EVENT_MASK);
hEpMapperHeap = GetProcessHeap();
if (hEpMapperHeap == 0)
{
ASSERT(GetLastError() != 0);
return(GetLastError());
}
// register snego & kerberos. During clean install, this code can
// legally fail, as Rpcss is started before there are any
// security providers. Therefore, we cannot fail Rpcss init if this
// fails - we just don't register the debug interface, who is the
// only user of this
status = RpcServerRegisterAuthInfo(NULL, RPC_C_AUTHN_GSS_NEGOTIATE, NULL, NULL);
if (status != RPC_S_OK)
{
fAuthInfoNotRegistered = TRUE;
}
status = RpcServerRegisterAuthInfo(NULL, RPC_C_AUTHN_GSS_KERBEROS, NULL, NULL);
if (status != RPC_S_OK)
{
fAuthInfoNotRegistered = TRUE;
}
status = RpcServerRegisterIf(epmp_ServerIfHandle,
0,
0);
if (status != RPC_S_OK)
{
return(status);
}
status = RpcServerRegisterIf(localepmp_ServerIfHandle,
0,
0);
if (status != RPC_S_OK)
{
return(status);
}
if (fAuthInfoNotRegistered == FALSE)
{
status = RpcServerRegisterIfEx(DbgIdl_ServerIfHandle,
0,
0,
0,
RPC_C_PROTSEQ_MAX_REQS_DEFAULT,
DebugServerSecurityCallback);
if (status != RPC_S_OK)
{
return(status);
}
}
status = I_RpcServerRegisterForwardFunction( GetForwardEp );
#ifndef DOSWIN32RPC
if (status == RPC_S_OK)
{
status = InitializeIpPortManager();
ASSERT(status == RPC_S_OK);
}
#endif
status = I_RpcServerSetAddressChangeFn( UpdateAddresses );
ASSERT( 0 == status );
return(status);
}