windows-nt/Source/XPSP1/NT/net/winnet/credman.cxx
2020-09-26 16:20:57 +08:00

1315 lines
41 KiB
C++
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/*++
Copyright (c) 1992 Microsoft Corporation
Module Name:
credman.cxx
Abstract:
WNet Credential Management API functions
Author:
Dan Lafferty (danl) 07-Dec-1992
Environment:
User Mode - Win32
Revision History:
05-May-1999 jschwart
Make provider addition/removal dynamic
19-Apr-1994 danl
Fix timeout logic where we would ignore the
provider-supplied timeout if the timeout was smaller than the default.
Now, if all the providers know their timeouts, the larger of those
timeouts is used. Even if smaller than the default.
09-Jun-1993 danl
Fixed MaxWait in MprCheckTimeout() so that now it is passed in.
Until now, it was left uninitialized.
07-Apr-1993 danl
Initialize the pointer to the logon script to NULL prior to passing
it to the provider to fill in. We are expecting it to be NULL if
they don't have a logon script.
18-Jan-1993 danl
WNetLogonNotify: If the provider returns an error that mpr
doesn't understand, it should discontinue calling that provider.
This is accomplished by setting the ContinueFlag for that provider
to FALSE.
07-Dec-1992 danl
Created
--*/
//
// INCLUDES
//
#include "precomp.hxx"
#include <tstr.h> // WCSSIZE
//
// DEFINES
//
typedef struct _RETRY_INFO {
DWORD ProviderIndex;
DWORD Status;
DWORD ProviderWait;
BOOL ContinueFlag;
LPWSTR LogonScript;
} RETRY_INFO, *LPRETRY_INFO;
//
// LOCAL FUNCTIONS
//
DWORD
MprMakeRetryArray(
LPCWSTR lpPrimaryAuthenticator,
LPDWORD lpNumProviders,
LPRETRY_INFO *lpRetryArray,
LPDWORD lpRegMaxWait
);
VOID
MprUpdateTimeout(
LPRETRY_INFO RetryArray,
LPPROVIDER Provider,
DWORD RegMaxWait,
LPDWORD pMaxWait,
DWORD StartTime,
DWORD CallStatus
);
VOID
MprCheckTimeout(
BOOL *ContinueFlag,
DWORD StartTime,
DWORD MaxWait,
LPDWORD lpStatus
);
DWORD APIENTRY
WNetLogonNotify(
LPCWSTR lpPrimaryAuthenticator,
PLUID lpLogonId,
LPCWSTR lpAuthentInfoType,
LPVOID lpAuthentInfo,
LPCWSTR lpPreviousAuthentInfoType, // may be NULL
LPVOID lpPreviousAuthentInfo, // may be NULL
LPWSTR lpStationName,
LPVOID StationHandle,
LPWSTR *lpLogonScripts
)
/*++
Description:
This function provides notification to provider dll's that must handle
log-on events.
Each Credential Manager Provider is allowed to return
a single command line string which will execute a logon script.
WNetLogonNotify gathers these strings into a MULTI_SZ string buffer.
(Meaning each string is NULL terminated, and the set of strings is
NULL terminated - thus making the last string doubly NULL terminated).
!! IMPORTANT !!
The caller of this function is responsible for freeing the
buffer pointed to by *lpLogonScripts. The windows API function
LocalFree() should be used to do this.
Arguments:
lpPrimaryAuthenticator - This is a pointer to a string that identifies
the primary authenticator. The router uses this information to
skip the credential manager identified by this string. Since it
is the primary, it has already handled the logon. This string is
obtained from the "\HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\
Services\*(keyname)\NetworkProvider\Name" registry value.
lpLogonId - The logon ID of the session currently being logged on.
lpAuthentInfoType - This points to a string that identifies the
AuthentInfo structure type.
When Microsoft is the primary authenticator, the values that may
be expected here are the ones described for the lpAuthentInfoType
parameter to NPLogonNotify().
lpAuthentInfo - This points to a structure that contains the
credentials used to successfully log the user on via the
primary authenticator. The structures that may be specified when
using Micosoft's primary authenticator are:
When Microsoft is the primary authenticator, the structures that
may be expected here are the ones described for the lpAuthentInfo
parameter to NPLogonNotify().
lpPreviousAuthentInfoType - This is pointer to a string that identifies
the PreviousAuthentInfo structure. If this pointer is NULL, then
no PreviousAuthentInfo is available.
The values that may be expected here are the same as the values that
may be expected for the lpAuthentInfoType parameter.
lpPreviousAuthentInfo - If the user was forced to change the password
prioir to logging on, this points to a AuthentInfo structure that
will contain the credential information used prior to the password
change. If the user was not forced to change the password prior
to logging on, then this pointer is NULL.
The structures that may be expected here are the same as the
structures that may be expected for the lpAuthentInfo parameter.
lpStationName - This parameter contains the name of the station the
user has logged onto. This may be used to determine whether or
not interaction with the user to obtain additional (provider-specific)
credentials is possible. This information will also have a bearing
on the meaning and use of the StationHandle parameter.
When Microsoft is the primary authenticator, the values that
may be expected here are the ones described for the lpStationName
parameter to NPLogonNotify().
StationHandle - Is a 32-bit value whose meaning is dependent upon the
name (and consequently, the type) of station being logged onto.
When Microsoft is the primary authenticator, the values that
may be expected here are the ones described for the lpStationHandle
parameter to NPLogonNotify().
lpLogonScripts - This is a pointer to a location where a pointer to
a MULTI_SZ string may be returned. Each null terminated
string in the MULTI_SZ string is assumed to contain the name
of a program to execute and parameters to pass to the program.
The memory allocated to hold the returned string must be
deallocatable by the calling routine. The caller of this
routine is responsible for freeing the memory used to house
this string when it is no longer needed.
Return Value:
--*/
{
DWORD status = WN_SUCCESS;
DWORD numProviders;
LPPROVIDER provider;
BOOL fcnSupported = FALSE; // Is fcn supported by a provider?
DWORD i;
BOOL ContinueFlag;
LPRETRY_INFO RetryArray;
DWORD RegMaxWait=0;
DWORD MaxWait=0;
DWORD StartTime;
DWORD scriptSize=0;
LPWSTR pScript;
MprCheckProviders();
CProviderSharedLock PLock;
INIT_IF_NECESSARY(CREDENTIAL_LEVEL,status);
MPR_LOG0(TRACE,"Entered WNetLogonNotify\n");
//
// Now create an array of information about the providers so that we
// can retry until timeout, or all providers are functional.
// Note: The Status field in each retry array element is initialized
// WN_NO_NETWORK.
//
__try {
*lpLogonScripts = NULL;
status = MprMakeRetryArray(
lpPrimaryAuthenticator,
&numProviders,
&RetryArray,
&RegMaxWait);
}
__except(EXCEPTION_EXECUTE_HANDLER) {
status = GetExceptionCode();
if (status != EXCEPTION_ACCESS_VIOLATION) {
MPR_LOG(ERROR,"WNetLogonNotify:Unexpected Exception 0x%lx\n",status);
}
status = WN_BAD_POINTER;
}
if ((status != WN_SUCCESS) || (numProviders == 0)) {
MPR_LOG2(TRACE,"WNetLogonNotify: Error - status=%d, numProviders=%d\n",
status,numProviders);
return(status);
}
//
// Initialize the timer.
//
if (RegMaxWait != 0) {
MaxWait = RegMaxWait;
}
StartTime = GetTickCount();
//
// Loop through the list of providers notifying each one in turn.
// If the underlying service or driver is not available for the
// provider such that it cannot complete this call, then we will
// wait for it to become available.
//
do {
ContinueFlag = FALSE;
for (i=0; i<numProviders; i++) {
//
// Call the appropriate provider's API entry point
//
provider = GlobalProviderInfo + RetryArray[i].ProviderIndex;
if ((RetryArray[i].ContinueFlag) &&
(provider->LogonNotify != NULL)) {
fcnSupported = TRUE;
RetryArray[i].LogonScript = NULL;
__try {
MPR_LOG(TRACE,"Calling (%ws) LogonNotify function\n",
provider->Resource.lpProvider);
status = provider->LogonNotify(
lpLogonId,
lpAuthentInfoType,
lpAuthentInfo,
lpPreviousAuthentInfoType,
lpPreviousAuthentInfo,
lpStationName,
StationHandle,
(LPWSTR *)&(RetryArray[i].LogonScript));
}
__except(EXCEPTION_EXECUTE_HANDLER) {
status = GetExceptionCode();
if (status != EXCEPTION_ACCESS_VIOLATION) {
MPR_LOG(ERROR,"WNetLogonNotify:Unexpected Exception "
"0x%lx\n",status);
}
status = WN_BAD_POINTER;
}
switch (status) {
case WN_SUCCESS:
//
// Because this provider may have put up dialogs, and
// taken a long time to complete, we want to skip the
// timeout check and try all the providers once more.
// We force the index to 0 in order to assure that all
// providers will be tried again prior to checking for
// a timeout.
//
RetryArray[i].Status = WN_SUCCESS;
RetryArray[i].ContinueFlag = FALSE;
if (RetryArray[i].LogonScript != NULL) {
scriptSize += WCSSIZE(RetryArray[i].LogonScript);
}
ContinueFlag = FALSE;
i=0;
break;
case WN_NO_NETWORK:
case WN_FUNCTION_BUSY:
//
// The provider is not ready to be notified (its underlying
// driver or service is not running yet). Attempt to
// find out how long to wait, or if it will ever start.
// This function will update MaxWait if the provider can
// give us a wait hint.
//
MprUpdateTimeout(
&(RetryArray[i]),
provider,
RegMaxWait,
&MaxWait,
StartTime,
status);
break;
default:
RetryArray[i].Status = status;
RetryArray[i].ContinueFlag = FALSE;
break;
} // End Switch (Get providers timeouts).
ContinueFlag |= RetryArray[i].ContinueFlag;
} // end check to see if function is supported.
} // end for i<numProviders.
//
// Check to see if the timeout has expired.
//
MprCheckTimeout(&ContinueFlag, StartTime, MaxWait, &status);
} while (ContinueFlag);
if (fcnSupported == FALSE) {
//
// No providers in the list support the API function. Therefore,
// we assume that no networks are installed.
//
MPR_LOG0(TRACE,"WNetLogonNotify: Function Not Supported\n");
status = WN_NOT_SUPPORTED;
}
//
// Handle normal errors passed back from the provider
//
if (status == WN_SUCCESS){
if (scriptSize != 0) {
//
// There must be some logon scripts. Allocate memory for them.
//
*lpLogonScripts = (LPWSTR)LocalAlloc(
LMEM_FIXED,
scriptSize+sizeof(WCHAR));
if (*lpLogonScripts != NULL) {
//
// Copy the logon scripts into the new buffer.
//
pScript = *lpLogonScripts;
for (i=0;i<numProviders ;i++) {
if ((RetryArray[i].Status == WN_SUCCESS) &&
(RetryArray[i].LogonScript != NULL)) {
wcscpy(pScript, RetryArray[i].LogonScript);
//
// Update the pointer to point beyond the last null
// terminator.
//
pScript += (wcslen(pScript) + 1);
}
}
//
// Add the double NULL terminator.
//
*pScript = L'\0';
}
else {
//
// The allocation failed. (ERROR LOG?)
//
MPR_LOG0(ERROR,"Logon scripts will be lost - could not "
"allocate memory\n");
}
}
}
else {
SetLastError(status);
}
if (RetryArray != NULL) {
LocalFree(RetryArray);
}
MPR_LOG1(TRACE,"Leaving WNetLogonNotify status = %d\n",status);
return(status);
}
DWORD APIENTRY
WNetPasswordChangeNotify(
LPCWSTR lpPrimaryAuthenticator,
LPCWSTR lpAuthentInfoType,
LPVOID lpAuthentInfo,
LPCWSTR lpPreviousAuthentInfoType,
LPVOID lpPreviousAuthentInfo,
LPWSTR lpStationName,
LPVOID StationHandle,
DWORD dwChangeInfo
)
/*++
Description:
This function is used to notify credential managers of a password
change for an account.
Arguments:
lpPrimaryAuthenticator - This is a pointer to a string that identifies
the primary authenticator. Credential Manager does not need the
password notification since it already handled the change.
This string is obtained from the "\HKEY_LOCAL_MACHINE\SYSTEM\
CurrentControlSet\Services\*(keyname)\NetworkProvider\Name" registry
value.
lpAuthentInfoType - This points to a string that identifies the
AuthentInfo structure type.
When Microsoft is the primary authenticator, the values that
may be expected here are the ones described for the
lpAuthentInfoType parameter to NPLogonNotify().
lpAuthentInfo - This points to a structure that contains the
new credentials.
When Microsoft is the primary authenticator, the structures that
may be expected here are the ones described for the lpAuthentInfo
parameter to NPLogonNotify().
lpPreviousAuthentInfoType - This points to the string that identifies
the PreviousAuthentInfo structure type.
The values that may be expected here are the same as the values that
may be expected for the lpAuthentInfoType parameter.
lpPreviousAuthentInfo - This points to an AuthentInfo structure that
contains the previous credential information. (old password and such).
The structures that may be expected here are the same as the
structures that may be expected for the lpAuthentInfo parameter.
lpStationName - This parameter contains the name of the station the
user performed the authentication information change from.
This may be used to determine whether or not interaction with the
user to obtain additional (provider-specific) information is possible.
This information will also have a bearing on the meaning and use of
the StationHandle parameter.
When Microsoft is the primary authenticator, the values that
may be expected here are the ones described for the lpStationName
parameter to NPLogonNotify().
StationHandle - Is a 32-bit value whose meaning is dependent upon the
name (and consequently, the type) of station being logged onto.
When Microsoft is the primary authenticator, the values that
may be expected here are the ones described for the lpStationHandle
parameter to NPLogonNotify().
dwChangeInfo - This is a set of flags that provide information about the
change. Currently the following possible values are defined:
WN_VALID_LOGON_ACCOUNT - If this flag is set, then the
password (or, more accurately, the authentication
information) that was changed will affect future
logons. Some authentication information changes
will only affect connections made in untrusted
domains. These are accounts that the user cannot
use to logon to this machine anyway. In these
cases, this flag will not be set.
Return Value:
Note:
--*/
{
DWORD status = WN_SUCCESS;
LPDWORD indexArray;
DWORD localArray[DEFAULT_MAX_PROVIDERS];
DWORD numProviders;
LPPROVIDER provider;
BOOL fcnSupported = FALSE; // Is fcn supported by a provider?
DWORD i,j;
DWORD primaryIndex;
BOOL oneSuccess=FALSE;
MprCheckProviders();
CProviderSharedLock PLock;
INIT_IF_NECESSARY(CREDENTIAL_LEVEL,status);
//
// Find the list of providers to call for this request.
//
indexArray = localArray;
//
// If there are no active providers, MprFindCallOrder returns
// WN_NO_NETWORK.
//
status = MprFindCallOrder(
NULL,
&indexArray,
&numProviders,
CREDENTIAL_TYPE);
if (status != WN_SUCCESS) {
return(status);
}
__try {
//
// Remove the primary authenticator from the list.
//
if (MprGetProviderIndex((LPTSTR)lpPrimaryAuthenticator,&primaryIndex)) {
for (i=0; i<numProviders ;i++ ) {
if (indexArray[i] == primaryIndex) {
numProviders--;
j=i;
i++;
for (; j<numProviders; i++,j++) {
indexArray[j] = indexArray[i];
}
break;
}
}
}
}
__except(EXCEPTION_EXECUTE_HANDLER) {
status = GetExceptionCode();
if (status != EXCEPTION_ACCESS_VIOLATION) {
MPR_LOG(ERROR,"WNetChangePassword:Unexpected Exception 0x%lx\n",status);
}
status = WN_BAD_POINTER;
}
//
// If there are no credential managers aside from the primary, the
// return with success.
//
if (numProviders == 0) {
if (indexArray != localArray) {
LocalFree(indexArray);
}
return(WN_SUCCESS);
}
//
// Loop through the list of providers notifying each one.
//
for (i=0; i<numProviders; i++) {
//
// Call the appropriate provider's API entry point
//
provider = GlobalProviderInfo + indexArray[i];
if (provider->PasswordChangeNotify != NULL) {
fcnSupported = TRUE;
__try {
MPR_LOG(TRACE,"Calling (%ws) ChangePasswordNotify function\n",
provider->Resource.lpProvider);
status = provider->PasswordChangeNotify(
lpAuthentInfoType,
lpAuthentInfo,
lpPreviousAuthentInfoType,
lpPreviousAuthentInfo,
lpStationName,
StationHandle,
dwChangeInfo);
}
__except(EXCEPTION_EXECUTE_HANDLER) {
status = GetExceptionCode();
if (status != EXCEPTION_ACCESS_VIOLATION) {
MPR_LOG(ERROR,"WNetChangePassword:Unexpected Exception 0x%lx\n",status);
}
status = WN_BAD_POINTER;
}
if (status == WN_SUCCESS) {
//
// If the call was successful, then we indicate that at least
// one of the calls was successful.
//
oneSuccess = TRUE;
}
}
}
if (fcnSupported == FALSE) {
//
// No providers in the list support the API function. Therefore,
// we assume that no networks are installed.
//
status = WN_NOT_SUPPORTED;
}
//
// If memory was allocated by MprFindCallOrder, free it.
//
if (indexArray != localArray) {
LocalFree(indexArray);
}
//
// Handle normal errors passed back from the provider
//
if (oneSuccess == TRUE) {
status = WN_SUCCESS;
}
else {
SetLastError(status);
}
return(status);
}
#ifdef REMOVE
DWORD APIENTRY
WNetLogoffNotify(
HWND hwndOwner,
LPCWSTR lpPrimaryAuthenticator,
PLUID lpLogonId,
WN_OPERATION_TYPE OperationType
)
/*++
Description:
This function provides log-off notification to credential managers.
Arguments:
hwndOwner - Identifies the owner window.
lpPrimaryAuthenticator - This is a pointer to a string that identifies
the primary authenticator. Credential Manager does not need the
password notification since it already handled the change.
lpLogonId - The logon ID of the session currently being logged on.
OperationType - The type of operation. This indicates whether the
function call is from an interactive program (winlogon), or a
background program (service controller). User dialogs should not
be displayed if the call was from a background process.
Return Value:
WN_SUCCESS - This is returned if we are able to successfully notify at
least one of the providers which has registered an entry point for
the Logoff event.
WN_NO_NETWORK - This is returned if there are no providers, or if
there is only one provider, but its supporting service/driver is
not available.
WN_BAD_POINTER - This is returned if one of the pointer parameters
is bad and causes an exception.
WN_NOT_SUPPORTED - This is returned if none of the active providers
support this function.
system errors such as ERROR_OUT_OF_MEMORY are also reported.
Note:
--*/
{
DWORD status = WN_SUCCESS;
LPDWORD indexArray;
DWORD localArray[DEFAULT_MAX_PROVIDERS];
DWORD numProviders;
LPPROVIDER provider;
BOOL fcnSupported = FALSE; // Is fcn supported by a provider?
DWORD i,j;
DWORD primaryIndex;
BOOL oneSuccess=FALSE;
MprCheckProviders();
CProviderSharedLock PLock;
INIT_IF_NECESSARY(CREDENTIAL_LEVEL,status);
//
// Find the list of providers to call for this request.
//
indexArray = localArray;
//
// If there are no active providers, MprFindCallOrder returns
// WN_NO_NETWORK.
//
status = MprFindCallOrder(
NULL,
&indexArray,
&numProviders,
CREDENTIAL_TYPE);
if (status != WN_SUCCESS) {
return(status);
}
try {
//
// Remove the primary authenticator from the list.
//
if (MprGetProviderIndex((LPTSTR)lpPrimaryAuthenticator,&primaryIndex)) {
for (i=0; i<numProviders ;i++ ) {
if (indexArray[i] == primaryIndex) {
numProviders--;
j=i;
i++;
for (; j<numProviders; i++,j++) {
indexArray[j] = indexArray[i];
}
break;
}
}
}
}
except(EXCEPTION_EXECUTE_HANDLER) {
status = GetExceptionCode();
if (status != EXCEPTION_ACCESS_VIOLATION) {
MPR_LOG(ERROR,"WNetChangePassword:Unexpected Exception 0x%lx\n",status);
}
status = WN_BAD_POINTER;
}
//
// If there are no credential managers aside from the primary, the
// return with success.
//
if (numProviders == 0) {
if (indexArray != localArray) {
LocalFree(indexArray);
}
return(WN_SUCCESS);
}
//
// Loop through the list of providers notifying each one.
//
for (i=0; i<numProviders; i++) {
//
// Call the appropriate provider's API entry point
//
provider = GlobalProviderInfo + indexArray[i];
if ((provider->InitClass & CREDENTIAL_TYPE) &&
(provider->LogoffNotify != NULL)) {
fcnSupported = TRUE;
try {
status = provider->LogoffNotify(
hwndOwner,
lpLogonId,
OperationType);
}
except(EXCEPTION_EXECUTE_HANDLER) {
status = GetExceptionCode();
if (status != EXCEPTION_ACCESS_VIOLATION) {
MPR_LOG(ERROR,"WNetLogoffNotify:Unexpected Exception 0x%lx\n",status);
}
status = WN_BAD_POINTER;
}
if (status == WN_SUCCESS) {
//
// If the call was successful, then we indicate that at least
// one of the calls was successful.
//
oneSuccess = TRUE;
}
}
}
if (fcnSupported == FALSE) {
//
// No providers in the list support the API function. Therefore,
// we assume that no networks are installed.
//
status = WN_NOT_SUPPORTED;
}
//
// If memory was allocated by MprFindCallOrder, free it.
//
if (indexArray != localArray) {
LocalFree(indexArray);
}
//
// Handle normal errors passed back from the provider
//
if (oneSuccess == TRUE) {
status = WN_SUCCESS;
}
else {
SetLastError(status);
}
return(status);
}
#endif // REMOVE
DWORD
MprMakeRetryArray(
LPCWSTR lpPrimaryAuthenticator,
LPDWORD lpNumProviders,
LPRETRY_INFO *lpRetryArray,
LPDWORD lpRegMaxWait
)
/*++
Routine Description:
This function returns with an array of RETRY_INFO structures. There is
one array element for each credential manager provider that is NOT
the current primary authenticator. The structures contain such information
as the provider index in the global array of provider information, a
location for the provider's timeout value, status and continue flag.
This function will also attempt to obtain the WaitTimeout from the
registry if it exists.
IMPORTANT!
This function allocates memory for lpRetryArray. The caller is
expected to free this memory with LocalFree(). If an error is
returned, or if the data at lpNumProviders is 0, then memory is
not allocated.
Arguments:
lpPrimaryAuthenticator - This is a pointer to a string that identifies
the primary authenticator. The router uses this information to
skip the credential manager identified by this string. Since it
is the primary, it has already handled the logon.
lpNumProviders - This is a pointer to a location where the number of
providers in the lpRetryArray are stored.
lpRetryArray - This is an array of RETRY_INFO structures. There is one
element in the array for each Credential Manager provider that is
not the current PrimaryAuthenticator. The status in the array is
initialized to WN_NO_NETWORK.
lpRegMaxWait - This is a pointer to the location to where the Maximum
Wait Timeout from the registry is to be placed. If there is no
MaxWait value in the registry, zero is returned.
Return Value:
WN_SUCCESS is returned if we successfully created an array of
RetryInfo structures, or if there are no credential manager providers.
If we are unable to allocate memory for the RetryInfo structures,
then the failure from LocalAlloc is returned.
--*/
{
DWORD status;
DWORD i,j;
HKEY providerKeyHandle;
DWORD primaryIndex;
DWORD ValueType;
DWORD Temp;
DWORD numProviders;
LPDWORD indexArray;
DWORD localArray[DEFAULT_MAX_PROVIDERS];
ASSERT(MPRProviderLock.Have());
//
// Find the list of providers to call for this request.
//
indexArray = localArray;
//
// If there are no active providers, or none of the active providers are
// in this InitClass MprFindCallOrder returns WN_NO_NETWORK.
//
status = MprFindCallOrder(
NULL,
&indexArray,
&numProviders,
CREDENTIAL_TYPE);
if ((status != WN_SUCCESS) || (numProviders == 0)) {
//
// If there aren't any credential managers, then just return.
//
MPR_LOG0(TRACE,"MprMakeRetryArray: There aren't any Credential Managers\n");
*lpNumProviders = 0;
return(WN_SUCCESS);
}
*lpNumProviders = numProviders;
//
// Remove the primary authenticator from the list.
//
if (MprGetProviderIndex((LPTSTR)lpPrimaryAuthenticator,&primaryIndex)) {
for (i=0; i<numProviders ;i++ ) {
if (indexArray[i] == primaryIndex) {
numProviders--;
j=i;
i++;
for (; j<numProviders; i++,j++) {
indexArray[j] = indexArray[i];
}
break;
}
}
//
// If there are no credential managers aside from the primary, the
// return with success.
//
*lpNumProviders = numProviders;
if (numProviders == 0) {
if (indexArray != localArray) {
LocalFree(indexArray);
}
MPR_LOG0(TRACE,"MprMakeRetryArray: There aren't any "
"Credential Managers aside from the Primary\n");
return(WN_SUCCESS);
}
}
//
// At this point the indexArray only contains indices for Credential
// Manager providers that are not the primary authenticator.
//
//
// Now create an array of information about the providers so that we
// can retry until timeout, or all providers are functional. This
// memory is expected to be initialized to zero when allocated.
//
*lpRetryArray = (LPRETRY_INFO)LocalAlloc(LPTR, sizeof(RETRY_INFO) * numProviders);
if (*lpRetryArray == NULL) {
return(GetLastError());
}
for (i=0; i<numProviders; i++) {
(*lpRetryArray)[i].Status = WN_NO_NETWORK;
(*lpRetryArray)[i].ProviderIndex = indexArray[i];
(*lpRetryArray)[i].ContinueFlag = TRUE;
}
if (indexArray != localArray) {
LocalFree(indexArray);
}
//
// Read the MaxWait value that is stored in the registry.
// If it is not there or if the value is less than our default
// maximum value, then use the default instead.
//
if(!MprOpenKey(
HKEY_LOCAL_MACHINE, // hKey
NET_PROVIDER_KEY, // lpSubKey
&providerKeyHandle, // Newly Opened Key Handle
DA_READ)) { // Desired Access
MPR_LOG(ERROR,"MprCreateConnectionArray: MprOpenKey (%ws) Error\n",
NET_PROVIDER_KEY);
*lpRegMaxWait = 0;
return(WN_SUCCESS);
}
MPR_LOG(TRACE,"OpenKey %ws\n",NET_PROVIDER_KEY);
Temp = sizeof(*lpRegMaxWait);
status = RegQueryValueEx(
providerKeyHandle,
RESTORE_WAIT_VALUE,
NULL,
&ValueType,
(LPBYTE)lpRegMaxWait,
&Temp);
if (status != NO_ERROR) {
*lpRegMaxWait = 0;
}
RegCloseKey(providerKeyHandle);
return(WN_SUCCESS);
}
VOID
MprUpdateTimeout(
LPRETRY_INFO RetryInfo,
LPPROVIDER Provider,
DWORD RegMaxWait,
LPDWORD pMaxWait,
DWORD StartTime,
DWORD CallStatus
)
/*++
Routine Description:
This function attempts to get timeout information from the provider.
If the provider will never start, the ContinueFlag in the RetryInfo is
set to FALSE. If the provider tells us how long we should wait, then
MaxWait is updated if that time is longer than the current MaxWait.
Arguments:
RetryInfo - This is a pointer to a structure that contains retry
information for a particular provider.
Provider - This is a pointer to a structure that contains dll
entry points for a particular provider.
RegMaxWait - This is the default timeout. It is either the hard-coded
timeout, or the timeout in the registry.
pMaxWait - This is a pointer to a value that is the maximum amount of
time that the router will wait for the provider to be ready to receive
the function call.
StartTime - This is the clock tick time that we started the operation with.
CallStatus - This is the status from the most recent function call to the
provider.
Return Value:
none
--*/
{
DWORD ElapsedTime;
DWORD CurrentTime;
DWORD providerStatus;
PF_NPGetCaps pGetCaps;
MPR_LOG0(TRACE,"Entering MprUpdateTimeout\n");
ASSERT(MPRProviderLock.Have());
//
// First try the credential manager's GetCaps function.
// if it doesn't exist, then use the network provider's
// function.
//
pGetCaps = Provider->GetAuthentCaps;
if (pGetCaps == NULL) {
pGetCaps = Provider->GetCaps;
}
//
// If this is the first pass through, we don't have the
// wait times figured out for each provider. Do that
// now.
//
if (RetryInfo->ProviderWait == 0) {
MPR_LOG1(TRACE,"Call GetCaps to get (%ws)provider start timeout\n",
Provider->Resource.lpProvider);
if (pGetCaps != NULL) {
providerStatus = pGetCaps(WNNC_START);
switch (providerStatus) {
case PROVIDER_WILL_NOT_START:
MPR_LOG0(TRACE,"Provider will not start\n");
RetryInfo->ContinueFlag = FALSE;
RetryInfo->Status = CallStatus;
break;
case NO_TIME_ESTIMATE:
MPR_LOG0(TRACE,"No Time estimate for Provider start\n");
if (RegMaxWait != 0) {
RetryInfo->ProviderWait = RegMaxWait;
}
else {
RetryInfo->ProviderWait = DEFAULT_WAIT_TIME;
}
if (*pMaxWait < RetryInfo->ProviderWait) {
*pMaxWait = RetryInfo->ProviderWait;
}
break;
default:
MPR_LOG1(TRACE,"Time estimate for Provider start = %d\n",
providerStatus);
//
// In this case, the providerStatus is actually
// the amount of time we should wait for this
// provider. We set MaxWait to the longest of
// the times specified by the providers.
//
if ((providerStatus <= MAX_ALLOWED_WAIT_TIME) &&
(providerStatus > *pMaxWait)) {
*pMaxWait = providerStatus;
}
RetryInfo->ProviderWait = *pMaxWait;
break;
}
}
else {
MPR_LOG0(TRACE,"There is no GetCaps function. So we cannot "
"obtain the provider start timeout\n");
RetryInfo->ContinueFlag = FALSE;
RetryInfo->Status = CallStatus;
}
}
//
// If the status for this provider has just changed to
// WN_FUNCTION_BUSY from some other status, then calculate
// a timeout time by getting the provider's new timeout
// and adding that to the elapsed time since start. This
// gives a total elapsed time until timeout - which can
// be compared with the current MaxWait.
//
if ((CallStatus == WN_FUNCTION_BUSY) &&
(RetryInfo->Status == WN_NO_NETWORK)) {
MPR_LOG1(TRACE,"Provider status just changed to FUNCTION_BUSY "
"from some other status - Call GetCaps to get (%ws)provider "
" start timeout\n",
Provider->Resource.lpProvider);
if (pGetCaps != NULL) {
providerStatus = pGetCaps(WNNC_START);
switch (providerStatus) {
case PROVIDER_WILL_NOT_START:
MPR_LOG0(TRACE,"Provider will not start - bizzare case\n");
//
// This is bizzare to find the status = BUSY,
// and then have the Provider not starting.
//
RetryInfo->ContinueFlag = FALSE;
break;
case NO_TIME_ESTIMATE:
MPR_LOG0(TRACE,"No Time estimate for Provider start\n");
//
// No need to alter the timeout for this one.
//
break;
default:
MPR_LOG1(TRACE,"Time estimate for Provider start = %d\n",
providerStatus);
//
// Make sure this new timeout information will take
// less than the maximum allowed time for
// providers.
//
if (providerStatus <= MAX_ALLOWED_WAIT_TIME) {
CurrentTime = GetTickCount();
//
// Determine how much time has elapsed since
// we started.
//
ElapsedTime = CurrentTime - StartTime;
//
// Add the Elapsed time to the new timeout
// we just received from the provider to come
// up with a timeout value that can be
// compared with MaxWait.
//
providerStatus += ElapsedTime;
//
// If the new timeout is larger than MaxWait,
// then use the new timeout.
//
if (providerStatus > *pMaxWait) {
*pMaxWait = providerStatus;
}
} // EndIf (Make sure time out is < max allowed).
break;
} // End Switch (changed status).
}
} // End If (change state from NO_NET to BUSY)
//
// Store the status (either NO_NET or BUSY) with the
// retry info.
//
RetryInfo->Status = CallStatus;
MPR_LOG0(TRACE,"Leaving MprUpdateTimeout\n");
return;
}
VOID
MprCheckTimeout(
BOOL *ContinueFlag,
DWORD StartTime,
DWORD MaxWait,
LPDWORD lpStatus
)
/*++
Routine Description:
This function checks to see if a timeout occured.
Arguments:
ContinueFlag - This is a pointer to the location of the continue flag.
This is set to FALSE if a timeout occured.
StartTime - This is the tick count at the beginning of the operation.
lpStatus - This is a pointer to the current status for the operation.
This is updated only if a timeout occurs.
Return Value:
none
--*/
{
DWORD CurrentTime;
DWORD ElapsedTime;
MPR_LOG0(TRACE,"Entering MprCheckTimeout\n");
if (*ContinueFlag) {
//
// Determine what the elapsed time from the start is.
//
CurrentTime = GetTickCount();
ElapsedTime = CurrentTime - StartTime;
//
// If a timeout occured, then don't continue. Otherwise, sleep
// for a bit and loop again through all providers.
//
if (ElapsedTime > MaxWait) {
MPR_LOG0(TRACE,"WNetLogonNotify:Timed out while waiting "
"for Credential Managers\n");
*ContinueFlag = FALSE;
*lpStatus = ERROR_SERVICE_REQUEST_TIMEOUT;
}
else {
Sleep(2000);
}
}
MPR_LOG0(TRACE,"Leaving MprCheckTimeout\n");
}