windows-nt/Source/XPSP1/NT/ds/netapi/svcdlls/lls/server/registry.c
2020-09-26 16:20:57 +08:00

1755 lines
43 KiB
C

/*++
Copyright (c) 1994 Microsoft Corporation
Module Name:
registry.c
Abstract:
Registry reading routines for License Server. Can Scan the registry
for all License Service entries, or for a specific service.
Author:
Arthur Hanson (arth) 07-Dec-1994
Revision History:
Jeff Parham (jeffparh) 05-Dec-1995
o Removed unnecessary RegConnect() to local server.
o Added secure service list. This list tracks the products that
require "secure" license certificates for all licenses; i.e., the
products that do not accept the 3.51 Honesty method of "enter the
number of license you purchased."
o Added routine to update the concurrent limit value in the registry
to accurately reflect the connection limit of secure products.
--*/
#include <stdlib.h>
#include <nt.h>
#include <ntrtl.h>
#include <nturtl.h>
#include <windows.h>
#include <rpc.h>
#include <rpcndr.h>
#include <dsgetdc.h>
#include "llsapi.h"
#include "debug.h"
#include "llssrv.h"
#include "registry.h"
#include "ntlsapi.h"
#include "mapping.h"
#include "msvctbl.h"
#include "svctbl.h"
#include "purchase.h"
#include "perseat.h"
#include "server.h"
#include "llsutil.h"
// #define API_TRACE 1
#define NUM_MAPPING_ENTRIES 2
const LPTSTR NameMappingTable2[] = {
TEXT("Microsoft SQL Server"),
TEXT("Microsoft SNA Server")
}; // NameMappingTable2
ULONG NumFilePrintEntries = 0;
LPTSTR *FilePrintTable = NULL;
#define KEY_NAME_SIZE 512
HANDLE LLSRegistryEvent;
ULONG LocalServiceListSize = 0;
PLOCAL_SERVICE_RECORD *LocalServiceList = NULL;
RTL_RESOURCE LocalServiceListLock;
static ULONG SecureServiceListSize = 0;
static LPTSTR * SecureServiceList = NULL;
static ULONG SecureServiceBufferSize = 0; // in bytes!
static TCHAR * SecureServiceBuffer = NULL;
/////////////////////////////////////////////////////////////////////////
VOID
ConfigInfoRegistryInit(
DWORD * pReplicationType,
DWORD * pReplicationTime,
DWORD * pLogLevel,
BOOL * pPerServerCapacityWarning
)
{
HKEY hKey2 = NULL;
DWORD dwType, dwSize;
static BOOL ReportedError = FALSE;
static const TCHAR RegKeyText[] = TEXT("System\\CurrentControlSet\\Services\\LicenseService\\Parameters");
LONG Status;
BOOL ret = FALSE;
DWORD ReplicationType, ReplicationTime;
DWORD LogLevel;
DWORD DisableCapacityWarning;
ReplicationType = ReplicationTime = LogLevel = 0;
//
// Create registry key-name we are looking for
//
if ((Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_READ, &hKey2)) == ERROR_SUCCESS)
{
dwSize = sizeof(ReplicationType);
Status = RegQueryValueEx(hKey2, TEXT("ReplicationType"), NULL, &dwType, (LPBYTE) &ReplicationType, &dwSize);
if (Status == ERROR_SUCCESS)
{
dwSize = sizeof(ReplicationTime);
Status = RegQueryValueEx(hKey2, TEXT("ReplicationTime"), NULL, &dwType, (LPBYTE) &ReplicationTime, &dwSize);
if (Status == ERROR_SUCCESS)
{
*pReplicationType = ReplicationType;
*pReplicationTime = ReplicationTime;
}
else
{
if (!ReportedError)
{
ReportedError = TRUE;
#ifdef DEBUG
dprintf(TEXT("LLS: (WARNING) No registry parm for ReplicationTime\n"));
#endif
}
}
}
else
{
if (!ReportedError)
{
ReportedError = TRUE;
#ifdef DEBUG
dprintf(TEXT("LLS: (WARNING) No registry parm for ReplicationType\n"));
#endif
}
}
// LogLevel (REG_DWORD): determines how much info is dumped to the EventLog.
// Higher values imply more logging. Default: 0.
dwSize = sizeof( LogLevel );
Status = RegQueryValueEx( hKey2, TEXT("LogLevel"), NULL, &dwType, (LPBYTE) &LogLevel, &dwSize);
if ( ERROR_SUCCESS == Status )
*pLogLevel = LogLevel;
else
*pLogLevel = 0;
//
// Read the per server capacity warning value. A warning when the per
// server license usage nears 90-95% of the total number of licenses.
// A non-zero registry value disables the per server capacity warning
// mechanism.
//
// It is not likely this value wll be present. Default to warn.
//
dwSize = sizeof( DisableCapacityWarning );
Status = RegQueryValueEx( hKey2,
TEXT("DisableCapacityWarning"),
NULL,
&dwType,
(LPBYTE)&DisableCapacityWarning,
&dwSize);
if ( ERROR_SUCCESS == Status && DisableCapacityWarning ) {
*pPerServerCapacityWarning = FALSE;
}
else {
*pPerServerCapacityWarning = TRUE;
}
// ProductData (REG_BINARY): an encrypted buffer of concatenated service names
// that determine which services need to have secure certificates
// for license entry
Status = RegQueryValueEx( hKey2, TEXT("ProductData"), NULL, &dwType, NULL, &dwSize );
if ( ERROR_SUCCESS == Status )
{
TCHAR * NewSecureServiceBuffer = NULL;
LPTSTR * NewSecureServiceList = NULL;
ULONG NewSecureServiceListSize = 0;
ULONG NewSecureServiceBufferSize;
NewSecureServiceBufferSize = dwSize;
NewSecureServiceBuffer = LocalAlloc( LMEM_FIXED, NewSecureServiceBufferSize );
if ( NULL != NewSecureServiceBuffer )
{
Status = RegQueryValueEx( hKey2, TEXT("ProductData"), NULL, &dwType, (LPBYTE) NewSecureServiceBuffer, &dwSize);
if ( ERROR_SUCCESS == Status )
{
Status = DeBlock( NewSecureServiceBuffer, dwSize );
if ( ( STATUS_SUCCESS == Status )
&& ( ( NULL == SecureServiceBuffer )
|| ( memcmp( NewSecureServiceBuffer, SecureServiceBuffer, dwSize ) ) ) )
{
// process changes in secure product list
DWORD i;
DWORD ProductNdx;
NewSecureServiceListSize = 0;
// count number of product names contained in the buffer
for ( i=0; ( i < dwSize ) && ( NewSecureServiceBuffer[i] != TEXT( '\0' ) ); i++ )
{
// skip to beginning of next product name
for ( ; ( i < dwSize ) && ( NewSecureServiceBuffer[i] != TEXT( '\0' ) ); i++ );
i++;
if ( i * sizeof( TCHAR) < dwSize )
{
// properly null-terminated product name
NewSecureServiceListSize++;
}
}
if ( 0 != NewSecureServiceListSize )
{
NewSecureServiceList = LocalAlloc( LMEM_FIXED, sizeof( LPTSTR ) * NewSecureServiceListSize );
if ( NULL != NewSecureServiceList )
{
for ( i = ProductNdx = 0; ProductNdx < NewSecureServiceListSize; ProductNdx++ )
{
NewSecureServiceList[ ProductNdx ] = &NewSecureServiceBuffer[i];
// skip to beginning of next product name
for ( ; NewSecureServiceBuffer[i] != TEXT( '\0' ); i++ );
i++;
}
// new secure product list read successfully; use it
if ( NULL != SecureServiceBuffer )
{
LocalFree( SecureServiceBuffer );
}
if ( NULL != SecureServiceList )
{
LocalFree( SecureServiceList );
}
SecureServiceBuffer = NewSecureServiceBuffer;
SecureServiceList = NewSecureServiceList;
SecureServiceListSize = NewSecureServiceListSize;
SecureServiceBufferSize = NewSecureServiceBufferSize;
}
}
}
}
}
// free buffers if we aren't using them anymore
if ( ( NULL != NewSecureServiceList )
&& ( SecureServiceList != NewSecureServiceList ) )
{
LocalFree( NewSecureServiceList );
}
if ( ( NULL != NewSecureServiceBuffer )
&& ( SecureServiceBuffer != NewSecureServiceBuffer ) )
{
LocalFree( NewSecureServiceBuffer );
}
}
RegCloseKey(hKey2);
}
} // ConfigInfoRegistryInit
/////////////////////////////////////////////////////////////////////////
NTSTATUS
FilePrintTableInit(
)
/*++
Routine Description:
Builds up the FilePrint mapping table by enumerating the keys in the
registry init'd by the various install programs.
Arguments:
Return Value:
None.
--*/
{
HKEY hKey2;
static const TCHAR RegKeyText[] = TEXT("System\\CurrentControlSet\\Services\\LicenseService\\FilePrint");
static TCHAR KeyText[KEY_NAME_SIZE], ClassText[KEY_NAME_SIZE];
NTSTATUS Status;
DWORD index = 0;
DWORD KeySize, ClassSize, NumKeys, NumValue, MaxKey, MaxClass, MaxValue, MaxValueData, MaxSD;
FILETIME LastWrite;
LPTSTR *pFilePrintTableTmp;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: FilePrintTableInit\n"));
#endif
//
// Create registry key-name we are looking for
//
if ((Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_READ, &hKey2)) == ERROR_SUCCESS) {
//
// Find out how many sub-keys there are to intialize our table size.
// The table can still grow dynamically, this just makes having to
// realloc it a rare occurance.
//
ClassSize = KEY_NAME_SIZE;
Status = RegQueryInfoKey(hKey2, ClassText, &ClassSize, NULL,
&NumKeys, &MaxKey, &MaxClass, &NumValue,
&MaxValue, &MaxValueData, &MaxSD, &LastWrite);
if (Status == ERROR_SUCCESS) {
FilePrintTable = (LPTSTR *) LocalAlloc(LPTR, sizeof(LPTSTR) * NumKeys);
while ((Status == ERROR_SUCCESS) && (FilePrintTable != NULL)) {
//
// Double check in-case we need to expand the table.
//
if (index > NumKeys) {
pFilePrintTableTmp = (LPTSTR *) LocalReAlloc(FilePrintTable, sizeof(LPTSTR) * (NumKeys+1), LHND);
if (pFilePrintTableTmp == NULL)
{
Status = ERROR_NOT_ENOUGH_MEMORY;
break;
} else
{
NumKeys++;
FilePrintTable = pFilePrintTableTmp;
}
}
//
// Now read in the key name and add it to the table
//
KeySize = KEY_NAME_SIZE;
Status = RegEnumKeyEx(hKey2, index, KeyText, &KeySize, NULL, NULL, NULL, &LastWrite);
if (Status == ERROR_SUCCESS) {
//
// Allocate space in our table and copy the key
//
FilePrintTable[index] = (LPTSTR) LocalAlloc(LPTR, (KeySize + 1) * sizeof(TCHAR));
if (FilePrintTable[index] != NULL) {
lstrcpy(FilePrintTable[index], KeyText);
index++;
} else
Status = ERROR_NOT_ENOUGH_MEMORY;
}
}
}
#ifdef DEBUG
else {
dprintf(TEXT("LLS FilePrintTable Error: 0x%lx\n"), Status);
}
#endif
RegCloseKey( hKey2 );
}
if (FilePrintTable != NULL)
NumFilePrintEntries = index;
else
NumFilePrintEntries = 0;
return Status;
} // FilePrintTableInit
/////////////////////////////////////////////////////////////////////////
NTSTATUS
RegistryMonitor (
IN PVOID ThreadParameter
)
/*++
Routine Description:
Watches for any changes in the Licensing Keys, and if any updates our
internal information.
Arguments:
ThreadParameter - Indicates how many active threads there currently
are.
Return Value:
None.
--*/
{
LONG Status = 0;
HKEY hKey1 = NULL;
HKEY hKey2 = NULL;
NTSTATUS NtStatus = STATUS_SUCCESS;
static const TCHAR RegKeyText1[] = TEXT("System\\CurrentControlSet\\Services\\LicenseService");
static const TCHAR RegKeyText2[] = TEXT("System\\CurrentControlSet\\Services\\LicenseInfo");
HANDLE Events[2];
DWORD dwWhichEvent = 0; // Keeps track of which event was last triggered
//
// Open registry key-name we are looking for
//
if ((Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText1, 0, KEY_ALL_ACCESS, &hKey1)) != ERROR_SUCCESS) {
#if DBG
dprintf(TEXT("LLS RegistryMonitor - RegOpenKeyEx failed: 0x%lX\n"), Status);
#endif
return (NTSTATUS) Status;
}
if ((Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText2, 0, KEY_ALL_ACCESS, &hKey2)) != ERROR_SUCCESS) {
#if DBG
dprintf(TEXT("LLS RegistryMonitor - RegOpenKeyEx 2 failed: 0x%lX\n"), Status);
#endif
RegCloseKey(hKey1);
return (NTSTATUS) Status;
}
if ((Status = NtCreateEvent(Events,EVENT_QUERY_STATE | EVENT_MODIFY_STATE | SYNCHRONIZE,NULL,SynchronizationEvent,FALSE)) != ERROR_SUCCESS)
{
#if DBG
dprintf(TEXT("LLS RegistryMonitor - RegOpenKeyEx 2 failed: 0x%lX\n"), Status);
#endif
RegCloseKey(hKey1);
RegCloseKey(hKey2);
return (NTSTATUS) Status;
}
Events[1] = LLSRegistryEvent;
//
// Loop forever
//
for ( ; ; ) {
if ((dwWhichEvent == 0) || (dwWhichEvent == 2))
{
Status = RegNotifyChangeKeyValue(hKey1, TRUE, REG_NOTIFY_CHANGE_LAST_SET, LLSRegistryEvent, TRUE);
if (Status != ERROR_SUCCESS) {
#if DBG
dprintf(TEXT("LLS RegNotifyChangeKeyValue Failed: %lu\n"), Status);
#endif
}
}
if ((dwWhichEvent == 0) || (dwWhichEvent == 1))
{
Status = RegNotifyChangeKeyValue(hKey2, TRUE, REG_NOTIFY_CHANGE_LAST_SET, Events[0], TRUE);
if (Status != ERROR_SUCCESS) {
#if DBG
dprintf(TEXT("LLS RegNotifyChangeKeyValue 2 Failed: %lu\n"), Status);
#endif
}
}
NtStatus = NtWaitForMultipleObjects( 2, Events, WaitAny, TRUE, NULL );
switch (NtStatus)
{
case 0:
dwWhichEvent = 1;
break;
case 1:
dwWhichEvent = 2;
break;
default:
dwWhichEvent = 0;
break;
}
#if DELAY_INITIALIZATION
EnsureInitialized();
#endif
//
// Re-synch the lists
//
LocalServiceListUpdate();
LocalServerServiceListUpdate();
ServiceListResynch();
ConfigInfoRegistryUpdate();
LocalServiceListConcurrentLimitSet();
if (dwWhichEvent == 0)
{
#if DBG
dprintf(TEXT("LLS Registry Event Notification Failed: %lu\n"), NtStatus);
#endif
//
// If we failed - sleep for 2 minutes before looping
//
Sleep(120000L);
}
}
return NtStatus;
} // RegistryMonitor
/////////////////////////////////////////////////////////////////////////
VOID
RegistryInit( )
/*++
Routine Description:
Looks in registry for given service and sets values accordingly.
Arguments:
Return Value:
None.
--*/
{
NTSTATUS Status;
BOOL ret = FALSE;
DWORD Mode, ConcurrentLimit;
Mode = 0;
ConcurrentLimit = 0;
//
// Create a key to tell us about any changes in the registry
//
Status = NtCreateEvent(
&LLSRegistryEvent,
EVENT_QUERY_STATE | EVENT_MODIFY_STATE | SYNCHRONIZE,
NULL,
SynchronizationEvent,
FALSE
);
ASSERT(NT_SUCCESS(Status));
} // RegistryInit
/////////////////////////////////////////////////////////////////////////
VOID
RegistryStartMonitor( )
/*++
Routine Description:
Looks in registry for given service and sets values accordingly.
Arguments:
Return Value:
None.
--*/
{
HANDLE Thread;
DWORD Ignore;
//
// Now dispatch a thread to watch for any registry changes
//
Thread = CreateThread(
NULL,
0L,
(LPTHREAD_START_ROUTINE) RegistryMonitor,
0L,
0L,
&Ignore
);
if (Thread != NULL)
CloseHandle(Thread);
} // RegistryStartMonitor
/////////////////////////////////////////////////////////////////////////
VOID
RegistryInitValues(
LPTSTR ServiceName,
BOOL *PerSeatLicensing,
ULONG *SessionLimit
)
/*++
Routine Description:
Looks in registry for given service and sets values accordingly.
Arguments:
Service Name -
PerSeatLicensing -
SessionLimit -
Return Value:
None.
--*/
{
HKEY hKey2 = NULL;
DWORD dwType, dwSize;
static TCHAR RegKeyText[512];
LONG Status;
DWORD Mode, ConcurrentLimit;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: RegistryInitValues\n"));
#endif
#ifdef SPECIAL_USER_LIMIT
*PerSeatLicensing = FALSE;
*SessionLimit = SPECIAL_USER_LIMIT;
#else // #ifdef SPECIAL_USER_LIMIT
Mode = 0;
ConcurrentLimit = 0;
//
// Create registry key-name we are looking for
//
lstrcpy(RegKeyText, TEXT("System\\CurrentControlSet\\Services\\LicenseInfo\\"));
lstrcat(RegKeyText, ServiceName);
if ((Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_READ, &hKey2)) == ERROR_SUCCESS) {
//
// First Get Mode
//
dwSize = sizeof(Mode);
Status = RegQueryValueEx(hKey2, TEXT("Mode"), NULL, &dwType, (LPBYTE) &Mode, &dwSize);
#if DBG
if ((TraceFlags & TRACE_REGISTRY) && (Status == ERROR_SUCCESS))
dprintf(TEXT("Found Reg-Key for [%s] Mode: %ld\n"), ServiceName, Mode);
#endif
//
// Now Concurrent Limit
//
dwSize = sizeof(ConcurrentLimit);
Status = RegQueryValueEx(hKey2, TEXT("ConcurrentLimit"), NULL, &dwType, (LPBYTE) &ConcurrentLimit, &dwSize);
#if DBG
if ((TraceFlags & TRACE_REGISTRY) && (Status == ERROR_SUCCESS))
dprintf(TEXT("Found Reg-Key for [%s] ConcurrentLimit: %ld\n"), ServiceName, ConcurrentLimit);
#endif
RegCloseKey(hKey2);
}
if (Mode == 0) {
*PerSeatLicensing = TRUE;
*SessionLimit = 0;
} else {
*PerSeatLicensing = FALSE;
*SessionLimit = ConcurrentLimit;
}
#endif // #else // #ifdef SPECIAL_USER_LIMIT
} // RegistryInitValues
/////////////////////////////////////////////////////////////////////////
VOID
RegistryDisplayNameGet(
LPTSTR ServiceName,
LPTSTR DefaultName,
LPTSTR *pDisplayName
)
/*++
Routine Description:
Arguments:
Service Name -
Return Value:
None.
--*/
{
HKEY hKey2 = NULL;
DWORD dwType, dwSize;
static TCHAR RegKeyText[512];
static TCHAR DisplayName[512];
LONG Status;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: RegistryDisplayNameGet\n"));
#endif
lstrcpy(DisplayName, DefaultName);
//
// Create registry key-name we are looking for
//
lstrcpy(RegKeyText, TEXT("System\\CurrentControlSet\\Services\\LicenseInfo\\"));
lstrcat(RegKeyText, ServiceName);
if ((Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_READ, &hKey2)) == ERROR_SUCCESS) {
dwSize = sizeof(DisplayName);
Status = RegQueryValueEx(hKey2, TEXT("DisplayName"), NULL, &dwType, (LPBYTE) DisplayName, &dwSize);
# if DBG
if ((TraceFlags & TRACE_REGISTRY) && (Status == ERROR_SUCCESS))
dprintf(TEXT("Found Reg-Key for [%s] DisplayName: %s\n"), ServiceName, DisplayName);
# endif
RegCloseKey(hKey2);
}
*pDisplayName = LocalAlloc(LPTR, (lstrlen(DisplayName) + 1) * sizeof(TCHAR));
if (*pDisplayName != NULL)
lstrcpy(*pDisplayName, DisplayName);
} // RegistryDisplayNameGet
/////////////////////////////////////////////////////////////////////////
VOID
RegistryFamilyDisplayNameGet(
LPTSTR ServiceName,
LPTSTR DefaultName,
LPTSTR *pDisplayName
)
/*++
Routine Description:
Arguments:
Service Name -
Return Value:
None.
--*/
{
HKEY hKey2 = NULL;
DWORD dwType, dwSize;
static TCHAR RegKeyText[512];
static TCHAR DisplayName[MAX_PATH + 1];
LONG Status;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: RegistryFamilyDisplayNameGet\n"));
#endif
lstrcpy(DisplayName, DefaultName);
//
// Create registry key-name we are looking for
//
lstrcpy(RegKeyText, TEXT("System\\CurrentControlSet\\Services\\LicenseInfo\\"));
lstrcat(RegKeyText, ServiceName);
if ((Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_READ, &hKey2)) == ERROR_SUCCESS) {
dwSize = sizeof(DisplayName);
Status = RegQueryValueEx(hKey2, TEXT("FamilyDisplayName"), NULL, &dwType, (LPBYTE) DisplayName, &dwSize);
# if DBG
if ((TraceFlags & TRACE_REGISTRY) && (Status == ERROR_SUCCESS))
dprintf(TEXT("Found Reg-Key for [%s] FamilyDisplayName: %s\n"), ServiceName, DisplayName);
# endif
RegCloseKey(hKey2);
}
*pDisplayName = LocalAlloc(LPTR, (lstrlen(DisplayName) + 1) * sizeof(TCHAR));
if (*pDisplayName != NULL)
lstrcpy(*pDisplayName, DisplayName);
} // RegistryFamilyDisplayNameGet
/////////////////////////////////////////////////////////////////////////
LPTSTR
ServiceFindInTable(
LPTSTR ServiceName,
const LPTSTR Table[],
ULONG TableSize,
ULONG *TableIndex
)
/*++
Routine Description:
Does search of table to find matching service name.
Arguments:
Service Name -
Table -
TableSize -
TableIndex -
Return Value:
Pointer to found service or NULL if not found.
--*/
{
ULONG i = 0;
BOOL Found = FALSE;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: ServiceFindInTable\n"));
#endif
while ((i < TableSize) && (!Found)) {
Found = !lstrcmpi(ServiceName, Table[i]);
i++;
}
if (Found) {
i--;
*TableIndex = i;
return Table[i];
} else
return NULL;
} // ServiceFindInTable
/////////////////////////////////////////////////////////////////////////
VOID
RegistryInitService(
LPTSTR ServiceName,
BOOL *PerSeatLicensing,
ULONG *SessionLimit
)
/*++
Routine Description:
Gets init values for a given service from the registry. If not found
then just returns default values.
Arguments:
ServiceName -
PerSeatLicensing -
SessionLimit -
Return Value:
--*/
{
//
// These are the default values
//
ULONG TableEntry;
LPTSTR SvcName = NULL;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: RegistryInitService\n"));
#endif
*PerSeatLicensing = FALSE;
*SessionLimit = 0;
//
// Check if it is a file/print service - if so don't worry about rest
// of registry entries.
//
if (ServiceFindInTable(ServiceName, FilePrintTable, NumFilePrintEntries, &TableEntry)) {
return;
}
//
// Not FilePrint - see if we need to map the name.
//
SvcName = ServiceFindInTable(ServiceName, NameMappingTable2, NUM_MAPPING_ENTRIES, &TableEntry);
// if it wasn't found, use original ServiceName
if (SvcName == NULL)
SvcName = ServiceName;
RegistryInitValues(SvcName, PerSeatLicensing, SessionLimit);
#if DBG
if (TraceFlags & TRACE_REGISTRY)
if (*PerSeatLicensing)
dprintf(TEXT("LLS - Registry Init: PerSeat: Y Svc: %s\n"), SvcName);
else
dprintf(TEXT("LLS - Registry Init: PerSeat: N Svc: %s\n"), SvcName);
#endif
} // RegistryInitService
/////////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////////
/////////////////////////////////////////////////////////////////////////
NTSTATUS
LocalServiceListInit()
/*++
Routine Description:
Arguments:
None.
Return Value:
None.
--*/
{
NTSTATUS status = STATUS_SUCCESS;
try
{
RtlInitializeResource(&LocalServiceListLock);
} except(EXCEPTION_EXECUTE_HANDLER ) {
status = GetExceptionCode();
}
if (!NT_SUCCESS(status))
return status;
//
// Now scan the registry and add all the services
//
LocalServiceListUpdate();
return STATUS_SUCCESS;
} // LocalServiceListInit
/////////////////////////////////////////////////////////////////////////
int __cdecl LocalServiceListCompare(const void *arg1, const void *arg2) {
PLOCAL_SERVICE_RECORD Svc1, Svc2;
Svc1 = (PLOCAL_SERVICE_RECORD) *((PLOCAL_SERVICE_RECORD *) arg1);
Svc2 = (PLOCAL_SERVICE_RECORD) *((PLOCAL_SERVICE_RECORD *) arg2);
return lstrcmpi( Svc1->Name, Svc2->Name );
} // LocalServiceListCompare
/////////////////////////////////////////////////////////////////////////
PLOCAL_SERVICE_RECORD
LocalServiceListFind(
LPTSTR Name
)
/*++
Routine Description:
Internal routine to actually do binary search on LocalServiceList, this
does not do any locking as we expect the wrapper routine to do this.
The search is a simple binary search.
Arguments:
ServiceName -
Return Value:
Pointer to found server table entry or NULL if not found.
--*/
{
LONG begin = 0;
LONG end = (LONG) LocalServiceListSize - 1;
LONG cur;
int match;
PLOCAL_SERVICE_RECORD Service;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: LocalServiceListFind\n"));
#endif
if ((LocalServiceListSize == 0) || (Name == NULL))
return NULL;
while (end >= begin) {
// go halfway in-between
cur = (begin + end) / 2;
Service = LocalServiceList[cur];
// compare the two result into match
match = lstrcmpi(Name, Service->Name);
if (match < 0)
// move new begin
end = cur - 1;
else
begin = cur + 1;
if (match == 0)
return Service;
}
return NULL;
} // LocalServiceListFind
/////////////////////////////////////////////////////////////////////////
PLOCAL_SERVICE_RECORD
LocalServiceListAdd(
LPTSTR Name,
LPTSTR DisplayName,
LPTSTR FamilyDisplayName,
DWORD ConcurrentLimit,
DWORD FlipAllow,
DWORD Mode,
DWORD HighMark
)
/*++
Routine Description:
Arguments:
ServiceName -
Return Value:
Pointer to added service table entry, or NULL if failed.
--*/
{
LPTSTR NewName;
PLOCAL_SERVICE_RECORD Service;
PLOCAL_SERVICE_RECORD *pLocalServiceListTmp;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: LocalServiceListAdd\n"));
#endif
if ((Name == NULL) || (*Name == TEXT('\0'))) {
#if DBG
dprintf(TEXT("Error LLS: LocalServiceListAdd Bad Parms\n"));
#endif
ASSERT(FALSE);
return NULL;
}
//
// Try to find the name
//
Service = LocalServiceListFind(Name);
if (Service != NULL) {
Service->ConcurrentLimit = ConcurrentLimit;
Service->FlipAllow = FlipAllow;
Service->Mode = Mode;
return Service;
}
//
// No record - so create a new one
//
if (LocalServiceList == NULL) {
pLocalServiceListTmp = (PLOCAL_SERVICE_RECORD *) LocalAlloc(LPTR, sizeof(PLOCAL_SERVICE_RECORD));
} else {
pLocalServiceListTmp = (PLOCAL_SERVICE_RECORD *) LocalReAlloc(LocalServiceList, sizeof(PLOCAL_SERVICE_RECORD) * (LocalServiceListSize + 1), LHND);
}
//
// Make sure we could allocate server table
//
if (pLocalServiceListTmp == NULL) {
return NULL;
} else {
LocalServiceList = pLocalServiceListTmp;
}
//
// Allocate space for Record.
//
Service = (PLOCAL_SERVICE_RECORD) LocalAlloc(LPTR, sizeof(LOCAL_SERVICE_RECORD));
if (Service == NULL) {
ASSERT(FALSE);
return NULL;
}
LocalServiceList[LocalServiceListSize] = Service;
//
// Name
//
NewName = (LPTSTR) LocalAlloc(LPTR, (lstrlen(Name) + 1) * sizeof(TCHAR));
if (NewName == NULL) {
ASSERT(FALSE);
LocalFree(Service);
return NULL;
}
// now copy it over...
Service->Name = NewName;
lstrcpy(NewName, Name);
//
// DisplayName
//
NewName = (LPTSTR) LocalAlloc(LPTR, (lstrlen(DisplayName) + 1) * sizeof(TCHAR));
if (NewName == NULL) {
ASSERT(FALSE);
LocalFree(Service->Name);
LocalFree(Service);
return NULL;
}
// now copy it over...
Service->DisplayName = NewName;
lstrcpy(NewName, DisplayName);
//
// FamilyDisplayName
//
NewName = (LPTSTR) LocalAlloc(LPTR, (lstrlen(FamilyDisplayName) + 1) * sizeof(TCHAR));
if (NewName == NULL) {
ASSERT(FALSE);
LocalFree(Service->Name);
LocalFree(Service->DisplayName);
LocalFree(Service);
return NULL;
}
// now copy it over...
Service->FamilyDisplayName = NewName;
lstrcpy(NewName, FamilyDisplayName);
//
// Initialize other stuff
//
Service->ConcurrentLimit = ConcurrentLimit;
Service->FlipAllow = FlipAllow;
Service->Mode = Mode;
Service->HighMark = HighMark;
LocalServiceListSize++;
// Have added the entry - now need to sort it in order of the service names
qsort((void *) LocalServiceList, (size_t) LocalServiceListSize, sizeof(PLOCAL_SERVICE_RECORD), LocalServiceListCompare);
return Service;
} // LocalServiceListAdd
/////////////////////////////////////////////////////////////////////////
VOID
LocalServiceListUpdate( )
/*++
Routine Description:
Looks in registry for given service and sets values accordingly.
Arguments:
Return Value:
None.
--*/
{
HKEY hKey2 = NULL;
HKEY hKey3 = NULL;
static TCHAR KeyName[MAX_PATH + 1];
static TCHAR DisplayName[MAX_PATH + 1];
static TCHAR FamilyDisplayName[MAX_PATH + 1];
LONG EnumStatus;
NTSTATUS Status;
DWORD iSubKey = 0;
DWORD dwType, dwSize;
DWORD ConcurrentLimit, FlipAllow, Mode, HighMark;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: LocalServiceListUpdate\n"));
#endif
RtlAcquireResourceExclusive(&LocalServiceListLock, TRUE);
EnumStatus = RegOpenKeyEx(HKEY_LOCAL_MACHINE, TEXT("System\\CurrentControlSet\\Services\\LicenseInfo"), 0, KEY_READ, &hKey2);
while (EnumStatus == ERROR_SUCCESS) {
EnumStatus = RegEnumKey(hKey2, iSubKey, KeyName, MAX_PATH + 1);
iSubKey++;
if (EnumStatus == ERROR_SUCCESS) {
if ((Status = RegOpenKeyEx(hKey2, KeyName, 0, KEY_READ, &hKey3)) == ERROR_SUCCESS) {
dwSize = sizeof(DisplayName);
Status = RegQueryValueEx(hKey3, TEXT("DisplayName"), NULL, &dwType, (LPBYTE) DisplayName, &dwSize);
dwSize = sizeof(FamilyDisplayName);
if (Status == ERROR_SUCCESS) {
Status = RegQueryValueEx(hKey3, TEXT("FamilyDisplayName"), NULL, &dwType, (LPBYTE) FamilyDisplayName, &dwSize);
if (Status != ERROR_SUCCESS) {
lstrcpy(FamilyDisplayName, DisplayName);
Status = ERROR_SUCCESS;
}
}
dwSize = sizeof(Mode);
if (Status == ERROR_SUCCESS)
Status = RegQueryValueEx(hKey3, TEXT("Mode"), NULL, &dwType, (LPBYTE) &Mode, &dwSize);
dwSize = sizeof(FlipAllow);
if (Status == ERROR_SUCCESS)
Status = RegQueryValueEx(hKey3, TEXT("FlipAllow"), NULL, &dwType, (LPBYTE) &FlipAllow, &dwSize);
dwSize = sizeof(ConcurrentLimit);
if (Status == ERROR_SUCCESS)
if (Mode == 0)
ConcurrentLimit = 0;
else
Status = RegQueryValueEx(hKey3, TEXT("ConcurrentLimit"), NULL, &dwType, (LPBYTE) &ConcurrentLimit, &dwSize);
dwSize = sizeof(HighMark);
if (Status == ERROR_SUCCESS) {
Status = RegQueryValueEx(hKey3, TEXT("LocalKey"), NULL, &dwType, (LPBYTE) &HighMark, &dwSize);
if (Status != ERROR_SUCCESS) {
Status = ERROR_SUCCESS;
HighMark = 0;
}
}
//
// If we read in everything then add to our table
//
if (Status == ERROR_SUCCESS)
LocalServiceListAdd(KeyName, DisplayName, FamilyDisplayName, ConcurrentLimit, FlipAllow, Mode, HighMark);
RegCloseKey(hKey3);
}
}
}
RegCloseKey(hKey2);
RtlReleaseResource(&LocalServiceListLock);
} // LocalServiceListUpdate
/////////////////////////////////////////////////////////////////////////
VOID
LocalServiceListHighMarkSet( )
/*++
Routine Description:
Arguments:
Return Value:
None.
--*/
{
HKEY hKey2 = NULL;
static TCHAR RegKeyText[512];
LONG Status;
ULONG i, j;
PSERVICE_RECORD Service;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: LocalServiceListHighMarkSet\n"));
#endif
RtlAcquireResourceExclusive(&LocalServiceListLock, TRUE);
for (i = 0; i < LocalServiceListSize; i++) {
RtlAcquireResourceShared(&ServiceListLock, TRUE);
j = 0;
Service = NULL;
while ( (j < ServiceListSize) && (Service == NULL) ) {
if (!lstrcmpi(LocalServiceList[i]->DisplayName, ServiceList[j]->DisplayName) )
Service = ServiceList[j];
j++;
}
RtlReleaseResource(&ServiceListLock);
if (Service != NULL) {
//
// Create registry key-name we are looking for
//
lstrcpy(RegKeyText, TEXT("System\\CurrentControlSet\\Services\\LicenseInfo\\"));
lstrcat(RegKeyText, LocalServiceList[i]->Name);
Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_WRITE, &hKey2);
if (Status == ERROR_SUCCESS)
{
Status = RegSetValueEx(hKey2, TEXT("LocalKey"), 0, REG_DWORD, (LPBYTE) &Service->HighMark, sizeof(Service->HighMark));
RegCloseKey( hKey2 );
}
}
}
RtlReleaseResource(&LocalServiceListLock);
} // LocalServiceListHighMarkSet
///////////////////////////////////////////////////////////////////////////////
VOID
LocalServiceListConcurrentLimitSet( )
/*++
Routine Description:
Write concurrent limit to the registry for all secure services.
Modified from LocalServiceListHighMarkSet() implementation.
Arguments:
None.
Return Value:
None.
--*/
{
HKEY hKey2 = NULL;
TCHAR RegKeyText[512];
LONG Status;
ULONG i, j;
#if DBG
if (TraceFlags & TRACE_FUNCTION_TRACE)
dprintf(TEXT("LLS TRACE: LocalServiceListConcurrentLimitSet\n"));
#endif
RtlAcquireResourceExclusive(&LocalServiceListLock, TRUE);
for (i = 0; i < LocalServiceListSize; i++)
{
//
// Create registry key-name we are looking for
//
lstrcpy(RegKeyText, TEXT("System\\CurrentControlSet\\Services\\LicenseInfo\\"));
lstrcat(RegKeyText, LocalServiceList[i]->Name);
Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_READ, &hKey2);
if (Status == ERROR_SUCCESS)
{
DWORD dwConcurrentLimit;
DWORD cbConcurrentLimit = sizeof( dwConcurrentLimit );
DWORD dwType;
// don't write unless we have to (to avoid triggering the registry monitor thread)
Status = RegQueryValueEx(hKey2, TEXT("ConcurrentLimit"), NULL, &dwType, (LPBYTE) &dwConcurrentLimit, &cbConcurrentLimit );
if ( ServiceIsSecure( LocalServiceList[i]->DisplayName ) )
{
LocalServiceList[i]->ConcurrentLimit = LocalServiceList[i]->Mode ? ProductLicensesGet( LocalServiceList[i]->DisplayName, TRUE ) : 0;
// secure product
if ( ( ERROR_SUCCESS != Status )
|| ( REG_DWORD != dwType )
|| ( dwConcurrentLimit != LocalServiceList[i]->ConcurrentLimit ) )
{
RegCloseKey( hKey2 );
Status = RegOpenKeyEx(HKEY_LOCAL_MACHINE, RegKeyText, 0, KEY_WRITE, &hKey2);
ASSERT( ERROR_SUCCESS == Status );
if ( ERROR_SUCCESS == Status )
{
Status = RegSetValueEx(hKey2, TEXT("ConcurrentLimit"), 0, REG_DWORD, (LPBYTE) &LocalServiceList[i]->ConcurrentLimit, sizeof( LocalServiceList[i]->ConcurrentLimit ) );
}
}
}
RegCloseKey( hKey2 );
}
}
RtlReleaseResource(&LocalServiceListLock);
} // LocalServiceListConcurrentLimitSet
///////////////////////////////////////////////////////////////////////////////
BOOL ServiceIsSecure( LPTSTR ServiceName )
/*++
Routine Description:
Determine whether a given service disallows 3.51 Honesty-style
license purchases.
Arguments:
ServiceName (LPTSTR)
Service to check.
Return Value:
TRUE if service requires secure certificate,
FALSE if it accepts 3.51 Honesty-style license purchases.
--*/
{
BOOL IsSecure = FALSE;
if ( NULL != SecureServiceList )
{
DWORD i;
RtlEnterCriticalSection( &ConfigInfoLock );
for ( i=0; i < SecureServiceListSize; i++ )
{
if ( !lstrcmpi( SecureServiceList[i], ServiceName ) )
{
IsSecure = TRUE;
break;
}
}
RtlLeaveCriticalSection( &ConfigInfoLock );
}
return IsSecure;
}
///////////////////////////////////////////////////////////////////////////////
NTSTATUS ServiceSecuritySet( LPTSTR ServiceName )
/*++
Routine Description:
Add a given service to the secure service list.
Arguments:
ServiceName (LPTSTR)
Service to add.
Return Value:
STATUS_SUCCESS or Win error or NTSTATUS error code.
--*/
{
NTSTATUS nt;
DWORD i;
BOOL bChangedValue = FALSE;
RtlEnterCriticalSection( &ConfigInfoLock );
for ( i=0; i < SecureServiceListSize; i++ )
{
if ( !lstrcmpi( SecureServiceList[i], ServiceName ) )
{
// product already registered as secure
break;
}
}
if ( i < SecureServiceListSize )
{
// product already registered as secure
nt = STATUS_SUCCESS;
}
else
{
TCHAR * NewSecureServiceBuffer;
ULONG NewSecureServiceBufferSize;
NewSecureServiceBufferSize = ( SecureServiceBufferSize ? SecureServiceBufferSize : sizeof( TCHAR ) ) + sizeof( TCHAR ) * ( 1 + lstrlen( ServiceName ) );
NewSecureServiceBuffer = LocalAlloc( LPTR, NewSecureServiceBufferSize );
if ( NULL == NewSecureServiceBuffer )
{
nt = STATUS_NO_MEMORY;
ASSERT( FALSE );
}
else
{
if ( NULL != SecureServiceBuffer )
{
// copy over current secure service strings
memcpy( NewSecureServiceBuffer, SecureServiceBuffer, SecureServiceBufferSize - sizeof( TCHAR ) );
// add new secure service (don't forget last string is followed by 2 nulls)
memcpy( (LPBYTE) NewSecureServiceBuffer + SecureServiceBufferSize - sizeof( TCHAR ), ServiceName, NewSecureServiceBufferSize - SecureServiceBufferSize - sizeof( TCHAR ) );
}
else
{
// add new secure service (don't forget last string is followed by 2 nulls)
memcpy( NewSecureServiceBuffer, ServiceName, NewSecureServiceBufferSize - sizeof( TCHAR ) );
}
ASSERT( 0 == *( (LPBYTE) NewSecureServiceBuffer + NewSecureServiceBufferSize - 2 * sizeof( TCHAR ) ) );
ASSERT( 0 == *( (LPBYTE) NewSecureServiceBuffer + NewSecureServiceBufferSize - sizeof( TCHAR ) ) );
// encrypt buffer
nt = EBlock( NewSecureServiceBuffer, NewSecureServiceBufferSize );
ASSERT( STATUS_SUCCESS == nt );
if ( STATUS_SUCCESS == nt )
{
HKEY hKeyParameters;
// save new list to registry
nt = RegOpenKeyEx( HKEY_LOCAL_MACHINE, TEXT("System\\CurrentControlSet\\Services\\LicenseService\\Parameters"), 0, KEY_WRITE, &hKeyParameters );
ASSERT( STATUS_SUCCESS == nt );
if ( STATUS_SUCCESS == nt )
{
nt = RegSetValueEx( hKeyParameters, TEXT( "ProductData" ), 0, REG_BINARY, (LPBYTE) NewSecureServiceBuffer, NewSecureServiceBufferSize );
ASSERT( STATUS_SUCCESS == nt );
if ( STATUS_SUCCESS == nt )
{
bChangedValue = TRUE;
}
}
RegCloseKey( hKeyParameters );
}
LocalFree( NewSecureServiceBuffer );
}
}
RtlLeaveCriticalSection( &ConfigInfoLock );
if ( ( STATUS_SUCCESS == nt ) && bChangedValue )
{
// key updated, now update internal copy
ConfigInfoRegistryUpdate();
}
return nt;
}
///////////////////////////////////////////////////////////////////////////////
NTSTATUS ProductSecurityPack( LPDWORD pcchProductSecurityStrings, WCHAR ** ppchProductSecurityStrings )
/*++
Routine Description:
Pack the secure service list into a contiguous buffer for transmission.
NOTE: If the routine succeeds, the caller must later MIDL_user_free() the
buffer at *ppchProductSecurityStrings.
Arguments:
pcchProductSecurityStrings (LPDWORD)
On return, holds the size (in characters) of the buffer pointed to
by *ppchProductSecurityStrings.
ppchProductSecurityStrings (WCHAR **)
On return, holds the address of the buffer allocated to hold the names
of the secure products.
Return Value:
STATUS_SUCCESS or STATUS_NO_MEMORY.
--*/
{
NTSTATUS nt;
RtlEnterCriticalSection( &ConfigInfoLock );
*ppchProductSecurityStrings = MIDL_user_allocate( SecureServiceBufferSize );
if ( NULL == *ppchProductSecurityStrings )
{
nt = STATUS_NO_MEMORY;
ASSERT( FALSE );
}
else
{
memcpy( *ppchProductSecurityStrings, SecureServiceBuffer, SecureServiceBufferSize );
*pcchProductSecurityStrings = SecureServiceBufferSize / sizeof( TCHAR );
nt = STATUS_SUCCESS;
}
RtlLeaveCriticalSection( &ConfigInfoLock );
return nt;
}
///////////////////////////////////////////////////////////////////////////////
NTSTATUS ProductSecurityUnpack( DWORD cchProductSecurityStrings, WCHAR * pchProductSecurityStrings )
/*++
Routine Description:
Unpack a secure service list packed by ProductSecurityPack(). The products
contained in the pack are added to the current secure product list.
Arguments:
cchProductSecurityStrings (DWORD)
The size (in characters) of the buffer pointed to by pchProductSecurityStrings.
pchProductSecurityStrings (WCHAR *)
The address of the buffer allocated to hold the names of the secure products.
Return Value:
STATUS_SUCCESS.
--*/
{
DWORD i;
for ( i=0;
( i < cchProductSecurityStrings )
&& ( TEXT('\0') != pchProductSecurityStrings[i] );
i += 1 + lstrlen( &pchProductSecurityStrings[i] ) )
{
ServiceSecuritySet( &pchProductSecurityStrings[i] );
}
return STATUS_SUCCESS;
}
#if DBG
///////////////////////////////////////////////////////////////////////////////
void ProductSecurityListDebugDump()
/*++
Routine Description:
Dump contents of product security list to debug console.
Arguments:
None.
Return Value:
None.
--*/
{
if ( NULL == SecureServiceList )
{
dprintf( TEXT( "No secure products.\n" ) );
}
else
{
DWORD i;
RtlEnterCriticalSection( &ConfigInfoLock );
for ( i=0; i < SecureServiceListSize; i++ )
{
dprintf( TEXT( "(%3ld) %s\n" ), (long)i, SecureServiceList[i] );
}
RtlLeaveCriticalSection( &ConfigInfoLock );
}
}
#endif