mirror of
https://github.com/reactos/wine.git
synced 2024-12-12 05:45:56 +00:00
a65f7b637a
The client has nothing to wait for after sending the AUTH3 packet before sending the first request packet. Therefore, we must ensure that the AUTH3 packet has finished being processed before we start processing any request packets.
1631 lines
50 KiB
C
1631 lines
50 KiB
C
/*
|
|
* RPC server API
|
|
*
|
|
* Copyright 2001 Ove Kåven, TransGaming Technologies
|
|
* Copyright 2004 Filip Navara
|
|
* Copyright 2006-2008 Robert Shearman (for CodeWeavers)
|
|
*
|
|
* This library is free software; you can redistribute it and/or
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
* License as published by the Free Software Foundation; either
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
*
|
|
* This library is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* Lesser General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
* License along with this library; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
|
|
*/
|
|
|
|
#include "config.h"
|
|
#include "wine/port.h"
|
|
|
|
#include <stdarg.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <assert.h>
|
|
|
|
#include "windef.h"
|
|
#include "winbase.h"
|
|
#include "winerror.h"
|
|
|
|
#include "rpc.h"
|
|
#include "rpcndr.h"
|
|
#include "excpt.h"
|
|
|
|
#include "wine/debug.h"
|
|
#include "wine/exception.h"
|
|
|
|
#include "rpc_server.h"
|
|
#include "rpc_assoc.h"
|
|
#include "rpc_message.h"
|
|
#include "rpc_defs.h"
|
|
#include "ncastatus.h"
|
|
|
|
WINE_DEFAULT_DEBUG_CHANNEL(rpc);
|
|
|
|
typedef struct _RpcPacket
|
|
{
|
|
struct _RpcConnection* conn;
|
|
RpcPktHdr* hdr;
|
|
RPC_MESSAGE* msg;
|
|
unsigned char *auth_data;
|
|
ULONG auth_length;
|
|
} RpcPacket;
|
|
|
|
typedef struct _RpcObjTypeMap
|
|
{
|
|
/* FIXME: a hash table would be better. */
|
|
struct _RpcObjTypeMap *next;
|
|
UUID Object;
|
|
UUID Type;
|
|
} RpcObjTypeMap;
|
|
|
|
static RpcObjTypeMap *RpcObjTypeMaps;
|
|
|
|
/* list of type RpcServerProtseq */
|
|
static struct list protseqs = LIST_INIT(protseqs);
|
|
static struct list server_interfaces = LIST_INIT(server_interfaces);
|
|
static struct list server_registered_auth_info = LIST_INIT(server_registered_auth_info);
|
|
|
|
static CRITICAL_SECTION server_cs;
|
|
static CRITICAL_SECTION_DEBUG server_cs_debug =
|
|
{
|
|
0, 0, &server_cs,
|
|
{ &server_cs_debug.ProcessLocksList, &server_cs_debug.ProcessLocksList },
|
|
0, 0, { (DWORD_PTR)(__FILE__ ": server_cs") }
|
|
};
|
|
static CRITICAL_SECTION server_cs = { &server_cs_debug, -1, 0, 0, 0, 0 };
|
|
|
|
static CRITICAL_SECTION listen_cs;
|
|
static CRITICAL_SECTION_DEBUG listen_cs_debug =
|
|
{
|
|
0, 0, &listen_cs,
|
|
{ &listen_cs_debug.ProcessLocksList, &listen_cs_debug.ProcessLocksList },
|
|
0, 0, { (DWORD_PTR)(__FILE__ ": listen_cs") }
|
|
};
|
|
static CRITICAL_SECTION listen_cs = { &listen_cs_debug, -1, 0, 0, 0, 0 };
|
|
|
|
static CRITICAL_SECTION server_auth_info_cs;
|
|
static CRITICAL_SECTION_DEBUG server_auth_info_cs_debug =
|
|
{
|
|
0, 0, &server_auth_info_cs,
|
|
{ &server_auth_info_cs_debug.ProcessLocksList, &server_auth_info_cs_debug.ProcessLocksList },
|
|
0, 0, { (DWORD_PTR)(__FILE__ ": server_auth_info_cs") }
|
|
};
|
|
static CRITICAL_SECTION server_auth_info_cs = { &server_auth_info_cs_debug, -1, 0, 0, 0, 0 };
|
|
|
|
/* whether the server is currently listening */
|
|
static BOOL std_listen;
|
|
/* number of manual listeners (calls to RpcServerListen) */
|
|
static LONG manual_listen_count;
|
|
/* total listeners including auto listeners */
|
|
static LONG listen_count;
|
|
|
|
static UUID uuid_nil;
|
|
|
|
static inline RpcObjTypeMap *LookupObjTypeMap(UUID *ObjUuid)
|
|
{
|
|
RpcObjTypeMap *rslt = RpcObjTypeMaps;
|
|
RPC_STATUS dummy;
|
|
|
|
while (rslt) {
|
|
if (! UuidCompare(ObjUuid, &rslt->Object, &dummy)) break;
|
|
rslt = rslt->next;
|
|
}
|
|
|
|
return rslt;
|
|
}
|
|
|
|
static inline UUID *LookupObjType(UUID *ObjUuid)
|
|
{
|
|
RpcObjTypeMap *map = LookupObjTypeMap(ObjUuid);
|
|
if (map)
|
|
return &map->Type;
|
|
else
|
|
return &uuid_nil;
|
|
}
|
|
|
|
static RpcServerInterface* RPCRT4_find_interface(UUID* object,
|
|
const RPC_SYNTAX_IDENTIFIER *if_id,
|
|
const RPC_SYNTAX_IDENTIFIER *transfer_syntax,
|
|
BOOL check_object)
|
|
{
|
|
UUID* MgrType = NULL;
|
|
RpcServerInterface* cif;
|
|
RPC_STATUS status;
|
|
|
|
if (check_object)
|
|
MgrType = LookupObjType(object);
|
|
EnterCriticalSection(&server_cs);
|
|
LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) {
|
|
if (!memcmp(if_id, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER)) &&
|
|
(!transfer_syntax || !memcmp(transfer_syntax, &cif->If->TransferSyntax, sizeof(RPC_SYNTAX_IDENTIFIER))) &&
|
|
(check_object == FALSE || UuidEqual(MgrType, &cif->MgrTypeUuid, &status)) &&
|
|
std_listen) {
|
|
InterlockedIncrement(&cif->CurrentCalls);
|
|
break;
|
|
}
|
|
}
|
|
LeaveCriticalSection(&server_cs);
|
|
if (&cif->entry == &server_interfaces) cif = NULL;
|
|
TRACE("returning %p for object %s, if_id { %d.%d %s }\n", cif,
|
|
debugstr_guid(object), if_id->SyntaxVersion.MajorVersion,
|
|
if_id->SyntaxVersion.MinorVersion, debugstr_guid(&if_id->SyntaxGUID));
|
|
return cif;
|
|
}
|
|
|
|
static void RPCRT4_release_server_interface(RpcServerInterface *sif)
|
|
{
|
|
if (!InterlockedDecrement(&sif->CurrentCalls) &&
|
|
sif->Delete) {
|
|
/* sif must have been removed from server_interfaces before
|
|
* CallsCompletedEvent is set */
|
|
if (sif->CallsCompletedEvent)
|
|
SetEvent(sif->CallsCompletedEvent);
|
|
HeapFree(GetProcessHeap(), 0, sif);
|
|
}
|
|
}
|
|
|
|
static RpcPktHdr *handle_bind_error(RpcConnection *conn, RPC_STATUS error)
|
|
{
|
|
unsigned int reject_reason;
|
|
switch (error)
|
|
{
|
|
case RPC_S_SERVER_TOO_BUSY:
|
|
reject_reason = REJECT_TEMPORARY_CONGESTION;
|
|
break;
|
|
case ERROR_OUTOFMEMORY:
|
|
case RPC_S_OUT_OF_RESOURCES:
|
|
reject_reason = REJECT_LOCAL_LIMIT_EXCEEDED;
|
|
break;
|
|
case RPC_S_PROTOCOL_ERROR:
|
|
reject_reason = REJECT_PROTOCOL_VERSION_NOT_SUPPORTED;
|
|
break;
|
|
case RPC_S_UNKNOWN_AUTHN_SERVICE:
|
|
reject_reason = REJECT_UNKNOWN_AUTHN_SERVICE;
|
|
break;
|
|
case ERROR_ACCESS_DENIED:
|
|
reject_reason = REJECT_INVALID_CHECKSUM;
|
|
break;
|
|
default:
|
|
FIXME("unexpected status value %d\n", error);
|
|
/* fall through */
|
|
case RPC_S_INVALID_BOUND:
|
|
reject_reason = REJECT_REASON_NOT_SPECIFIED;
|
|
break;
|
|
}
|
|
return RPCRT4_BuildBindNackHeader(NDR_LOCAL_DATA_REPRESENTATION,
|
|
RPC_VER_MAJOR, RPC_VER_MINOR,
|
|
reject_reason);
|
|
}
|
|
|
|
static RPC_STATUS process_bind_packet_no_send(
|
|
RpcConnection *conn, RpcPktBindHdr *hdr, RPC_MESSAGE *msg,
|
|
unsigned char *auth_data, ULONG auth_length, RpcPktHdr **ack_response,
|
|
unsigned char **auth_data_out, ULONG *auth_length_out)
|
|
{
|
|
RPC_STATUS status;
|
|
RpcContextElement *ctxt_elem;
|
|
unsigned int i;
|
|
RpcResult *results;
|
|
|
|
/* validate data */
|
|
for (i = 0, ctxt_elem = msg->Buffer;
|
|
i < hdr->num_elements;
|
|
i++, ctxt_elem = (RpcContextElement *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes])
|
|
{
|
|
if (((char *)ctxt_elem - (char *)msg->Buffer) > msg->BufferLength ||
|
|
((char *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes] - (char *)msg->Buffer) > msg->BufferLength)
|
|
{
|
|
ERR("inconsistent data in packet - packet length %d, num elements %d\n",
|
|
msg->BufferLength, hdr->num_elements);
|
|
return RPC_S_INVALID_BOUND;
|
|
}
|
|
}
|
|
|
|
if (hdr->max_tsize < RPC_MIN_PACKET_SIZE ||
|
|
!UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status) ||
|
|
conn->server_binding)
|
|
{
|
|
TRACE("packet size less than min size, or active interface syntax guid non-null\n");
|
|
|
|
return RPC_S_INVALID_BOUND;
|
|
}
|
|
|
|
results = HeapAlloc(GetProcessHeap(), 0,
|
|
hdr->num_elements * sizeof(*results));
|
|
if (!results)
|
|
return RPC_S_OUT_OF_RESOURCES;
|
|
|
|
for (i = 0, ctxt_elem = (RpcContextElement *)msg->Buffer;
|
|
i < hdr->num_elements;
|
|
i++, ctxt_elem = (RpcContextElement *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes])
|
|
{
|
|
RpcServerInterface* sif = NULL;
|
|
unsigned int j;
|
|
|
|
for (j = 0; !sif && j < ctxt_elem->num_syntaxes; j++)
|
|
{
|
|
sif = RPCRT4_find_interface(NULL, &ctxt_elem->abstract_syntax,
|
|
&ctxt_elem->transfer_syntaxes[j], FALSE);
|
|
if (sif)
|
|
break;
|
|
}
|
|
if (sif)
|
|
{
|
|
RPCRT4_release_server_interface(sif);
|
|
TRACE("accepting bind request on connection %p for %s\n", conn,
|
|
debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID));
|
|
results[i].result = RESULT_ACCEPT;
|
|
results[i].reason = REASON_NONE;
|
|
results[i].transfer_syntax = ctxt_elem->transfer_syntaxes[j];
|
|
|
|
/* save the interface for later use */
|
|
/* FIXME: save linked list */
|
|
conn->ActiveInterface = ctxt_elem->abstract_syntax;
|
|
}
|
|
else if ((sif = RPCRT4_find_interface(NULL, &ctxt_elem->abstract_syntax,
|
|
NULL, FALSE)) != NULL)
|
|
{
|
|
RPCRT4_release_server_interface(sif);
|
|
TRACE("not accepting bind request on connection %p for %s - no transfer syntaxes supported\n",
|
|
conn, debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID));
|
|
results[i].result = RESULT_PROVIDER_REJECTION;
|
|
results[i].reason = REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED;
|
|
memset(&results[i].transfer_syntax, 0, sizeof(results[i].transfer_syntax));
|
|
}
|
|
else
|
|
{
|
|
TRACE("not accepting bind request on connection %p for %s - abstract syntax not supported\n",
|
|
conn, debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID));
|
|
results[i].result = RESULT_PROVIDER_REJECTION;
|
|
results[i].reason = REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED;
|
|
memset(&results[i].transfer_syntax, 0, sizeof(results[i].transfer_syntax));
|
|
}
|
|
}
|
|
|
|
/* create temporary binding */
|
|
status = RPCRT4_MakeBinding(&conn->server_binding, conn);
|
|
if (status != RPC_S_OK)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, results);
|
|
return status;
|
|
}
|
|
|
|
status = RpcServerAssoc_GetAssociation(rpcrt4_conn_get_name(conn),
|
|
conn->NetworkAddr, conn->Endpoint,
|
|
conn->NetworkOptions,
|
|
hdr->assoc_gid,
|
|
&conn->server_binding->Assoc);
|
|
if (status != RPC_S_OK)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, results);
|
|
return status;
|
|
}
|
|
|
|
if (auth_length)
|
|
{
|
|
status = RPCRT4_ServerConnectionAuth(conn, TRUE,
|
|
(RpcAuthVerifier *)auth_data,
|
|
auth_length, auth_data_out,
|
|
auth_length_out);
|
|
if (status != RPC_S_OK)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, results);
|
|
return status;
|
|
}
|
|
}
|
|
|
|
*ack_response = RPCRT4_BuildBindAckHeader(NDR_LOCAL_DATA_REPRESENTATION,
|
|
RPC_MAX_PACKET_SIZE,
|
|
RPC_MAX_PACKET_SIZE,
|
|
conn->server_binding->Assoc->assoc_group_id,
|
|
conn->Endpoint, hdr->num_elements,
|
|
results);
|
|
HeapFree(GetProcessHeap(), 0, results);
|
|
|
|
if (*ack_response)
|
|
conn->MaxTransmissionSize = hdr->max_tsize;
|
|
else
|
|
status = RPC_S_OUT_OF_RESOURCES;
|
|
|
|
return status;
|
|
}
|
|
|
|
static RPC_STATUS process_bind_packet(RpcConnection *conn, RpcPktBindHdr *hdr,
|
|
RPC_MESSAGE *msg,
|
|
unsigned char *auth_data,
|
|
ULONG auth_length)
|
|
{
|
|
RPC_STATUS status;
|
|
RpcPktHdr *response = NULL;
|
|
unsigned char *auth_data_out = NULL;
|
|
ULONG auth_length_out = 0;
|
|
|
|
status = process_bind_packet_no_send(conn, hdr, msg, auth_data, auth_length,
|
|
&response, &auth_data_out,
|
|
&auth_length_out);
|
|
if (status != RPC_S_OK)
|
|
response = handle_bind_error(conn, status);
|
|
if (response)
|
|
status = RPCRT4_SendWithAuth(conn, response, NULL, 0, auth_data_out, auth_length_out);
|
|
else
|
|
status = ERROR_OUTOFMEMORY;
|
|
RPCRT4_FreeHeader(response);
|
|
|
|
return status;
|
|
}
|
|
|
|
|
|
static RPC_STATUS process_request_packet(RpcConnection *conn, RpcPktRequestHdr *hdr, RPC_MESSAGE *msg)
|
|
{
|
|
RPC_STATUS status;
|
|
RpcPktHdr *response = NULL;
|
|
RpcServerInterface* sif;
|
|
RPC_DISPATCH_FUNCTION func;
|
|
BOOL exception;
|
|
UUID *object_uuid;
|
|
NDR_SCONTEXT context_handle;
|
|
void *buf = msg->Buffer;
|
|
|
|
/* fail if the connection isn't bound with an interface */
|
|
if (UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status)) {
|
|
/* FIXME: should send BindNack instead */
|
|
response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
|
|
status);
|
|
|
|
RPCRT4_Send(conn, response, NULL, 0);
|
|
RPCRT4_FreeHeader(response);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
if (hdr->common.flags & RPC_FLG_OBJECT_UUID) {
|
|
object_uuid = (UUID*)(hdr + 1);
|
|
} else {
|
|
object_uuid = NULL;
|
|
}
|
|
|
|
sif = RPCRT4_find_interface(object_uuid, &conn->ActiveInterface, NULL, TRUE);
|
|
if (!sif) {
|
|
WARN("interface %s no longer registered, returning fault packet\n", debugstr_guid(&conn->ActiveInterface.SyntaxGUID));
|
|
response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
|
|
NCA_S_UNK_IF);
|
|
|
|
RPCRT4_Send(conn, response, NULL, 0);
|
|
RPCRT4_FreeHeader(response);
|
|
return RPC_S_OK;
|
|
}
|
|
msg->RpcInterfaceInformation = sif->If;
|
|
/* copy the endpoint vector from sif to msg so that midl-generated code will use it */
|
|
msg->ManagerEpv = sif->MgrEpv;
|
|
if (object_uuid != NULL) {
|
|
RPCRT4_SetBindingObject(msg->Handle, object_uuid);
|
|
}
|
|
|
|
/* find dispatch function */
|
|
msg->ProcNum = hdr->opnum;
|
|
if (sif->Flags & RPC_IF_OLE) {
|
|
/* native ole32 always gives us a dispatch table with a single entry
|
|
* (I assume that's a wrapper for IRpcStubBuffer::Invoke) */
|
|
func = *sif->If->DispatchTable->DispatchTable;
|
|
} else {
|
|
if (msg->ProcNum >= sif->If->DispatchTable->DispatchTableCount) {
|
|
WARN("invalid procnum (%d/%d)\n", msg->ProcNum, sif->If->DispatchTable->DispatchTableCount);
|
|
response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
|
|
NCA_S_OP_RNG_ERROR);
|
|
|
|
RPCRT4_Send(conn, response, NULL, 0);
|
|
RPCRT4_FreeHeader(response);
|
|
}
|
|
func = sif->If->DispatchTable->DispatchTable[msg->ProcNum];
|
|
}
|
|
|
|
/* put in the drep. FIXME: is this more universally applicable?
|
|
perhaps we should move this outward... */
|
|
msg->DataRepresentation =
|
|
MAKELONG( MAKEWORD(hdr->common.drep[0], hdr->common.drep[1]),
|
|
MAKEWORD(hdr->common.drep[2], hdr->common.drep[3]));
|
|
|
|
exception = FALSE;
|
|
|
|
/* dispatch */
|
|
RPCRT4_SetThreadCurrentCallHandle(msg->Handle);
|
|
__TRY {
|
|
if (func) func(msg);
|
|
} __EXCEPT_ALL {
|
|
WARN("exception caught with code 0x%08x = %d\n", GetExceptionCode(), GetExceptionCode());
|
|
exception = TRUE;
|
|
if (GetExceptionCode() == STATUS_ACCESS_VIOLATION)
|
|
status = ERROR_NOACCESS;
|
|
else
|
|
status = GetExceptionCode();
|
|
response = RPCRT4_BuildFaultHeader(msg->DataRepresentation,
|
|
RPC2NCA_STATUS(status));
|
|
} __ENDTRY
|
|
RPCRT4_SetThreadCurrentCallHandle(NULL);
|
|
|
|
/* release any unmarshalled context handles */
|
|
while ((context_handle = RPCRT4_PopThreadContextHandle()) != NULL)
|
|
RpcServerAssoc_ReleaseContextHandle(conn->server_binding->Assoc, context_handle, TRUE);
|
|
|
|
if (!exception)
|
|
response = RPCRT4_BuildResponseHeader(msg->DataRepresentation,
|
|
msg->BufferLength);
|
|
|
|
/* send response packet */
|
|
if (response) {
|
|
status = RPCRT4_Send(conn, response, exception ? NULL : msg->Buffer,
|
|
exception ? 0 : msg->BufferLength);
|
|
RPCRT4_FreeHeader(response);
|
|
} else
|
|
ERR("out of memory\n");
|
|
|
|
msg->RpcInterfaceInformation = NULL;
|
|
RPCRT4_release_server_interface(sif);
|
|
|
|
if (msg->Buffer == buf) buf = NULL;
|
|
TRACE("freeing Buffer=%p\n", buf);
|
|
I_RpcFree(buf);
|
|
|
|
return status;
|
|
}
|
|
|
|
static RPC_STATUS process_auth3_packet(RpcConnection *conn,
|
|
RpcPktCommonHdr *hdr,
|
|
RPC_MESSAGE *msg,
|
|
unsigned char *auth_data,
|
|
ULONG auth_length)
|
|
{
|
|
RPC_STATUS status;
|
|
|
|
if (UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status) ||
|
|
!auth_length || msg->BufferLength != 0)
|
|
status = RPC_S_PROTOCOL_ERROR;
|
|
else
|
|
{
|
|
status = RPCRT4_ServerConnectionAuth(conn, FALSE,
|
|
(RpcAuthVerifier *)auth_data,
|
|
auth_length, NULL, NULL);
|
|
}
|
|
|
|
/* FIXME: client doesn't expect a response to this message so must store
|
|
* status in connection so that fault packet can be returned when next
|
|
* packet is received */
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
static void RPCRT4_process_packet(RpcConnection* conn, RpcPktHdr* hdr,
|
|
RPC_MESSAGE* msg, unsigned char *auth_data,
|
|
ULONG auth_length)
|
|
{
|
|
RPC_STATUS status;
|
|
|
|
msg->Handle = (RPC_BINDING_HANDLE)conn->server_binding;
|
|
|
|
switch (hdr->common.ptype) {
|
|
case PKT_BIND:
|
|
TRACE("got bind packet\n");
|
|
|
|
status = process_bind_packet(conn, &hdr->bind, msg, auth_data,
|
|
auth_length);
|
|
break;
|
|
|
|
case PKT_REQUEST:
|
|
TRACE("got request packet\n");
|
|
|
|
status = process_request_packet(conn, &hdr->request, msg);
|
|
break;
|
|
|
|
case PKT_AUTH3:
|
|
TRACE("got auth3 packet\n");
|
|
|
|
status = process_auth3_packet(conn, &hdr->common, msg, auth_data,
|
|
auth_length);
|
|
break;
|
|
default:
|
|
FIXME("unhandled packet type %u\n", hdr->common.ptype);
|
|
break;
|
|
}
|
|
|
|
/* clean up */
|
|
I_RpcFree(msg->Buffer);
|
|
RPCRT4_FreeHeader(hdr);
|
|
HeapFree(GetProcessHeap(), 0, msg);
|
|
HeapFree(GetProcessHeap(), 0, auth_data);
|
|
}
|
|
|
|
static DWORD CALLBACK RPCRT4_worker_thread(LPVOID the_arg)
|
|
{
|
|
RpcPacket *pkt = the_arg;
|
|
RPCRT4_process_packet(pkt->conn, pkt->hdr, pkt->msg, pkt->auth_data,
|
|
pkt->auth_length);
|
|
HeapFree(GetProcessHeap(), 0, pkt);
|
|
return 0;
|
|
}
|
|
|
|
static DWORD CALLBACK RPCRT4_io_thread(LPVOID the_arg)
|
|
{
|
|
RpcConnection* conn = the_arg;
|
|
RpcPktHdr *hdr;
|
|
RPC_MESSAGE *msg;
|
|
RPC_STATUS status;
|
|
RpcPacket *packet;
|
|
unsigned char *auth_data;
|
|
ULONG auth_length;
|
|
|
|
TRACE("(%p)\n", conn);
|
|
|
|
for (;;) {
|
|
msg = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RPC_MESSAGE));
|
|
if (!msg) break;
|
|
|
|
status = RPCRT4_ReceiveWithAuth(conn, &hdr, msg, &auth_data, &auth_length);
|
|
if (status != RPC_S_OK) {
|
|
WARN("receive failed with error %x\n", status);
|
|
HeapFree(GetProcessHeap(), 0, msg);
|
|
break;
|
|
}
|
|
|
|
switch (hdr->common.ptype) {
|
|
case PKT_BIND:
|
|
TRACE("got bind packet\n");
|
|
|
|
status = process_bind_packet(conn, &hdr->bind, msg, auth_data,
|
|
auth_length);
|
|
break;
|
|
|
|
case PKT_REQUEST:
|
|
TRACE("got request packet\n");
|
|
|
|
packet = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcPacket));
|
|
if (!packet) {
|
|
I_RpcFree(msg->Buffer);
|
|
RPCRT4_FreeHeader(hdr);
|
|
HeapFree(GetProcessHeap(), 0, msg);
|
|
HeapFree(GetProcessHeap(), 0, auth_data);
|
|
goto exit;
|
|
}
|
|
packet->conn = conn;
|
|
packet->hdr = hdr;
|
|
packet->msg = msg;
|
|
packet->auth_data = auth_data;
|
|
packet->auth_length = auth_length;
|
|
if (!QueueUserWorkItem(RPCRT4_worker_thread, packet, WT_EXECUTELONGFUNCTION)) {
|
|
ERR("couldn't queue work item for worker thread, error was %d\n", GetLastError());
|
|
HeapFree(GetProcessHeap(), 0, packet);
|
|
status = RPC_S_OUT_OF_RESOURCES;
|
|
} else {
|
|
continue;
|
|
}
|
|
break;
|
|
|
|
case PKT_AUTH3:
|
|
TRACE("got auth3 packet\n");
|
|
|
|
status = process_auth3_packet(conn, &hdr->common, msg, auth_data,
|
|
auth_length);
|
|
break;
|
|
default:
|
|
FIXME("unhandled packet type %u\n", hdr->common.ptype);
|
|
break;
|
|
}
|
|
|
|
I_RpcFree(msg->Buffer);
|
|
RPCRT4_FreeHeader(hdr);
|
|
HeapFree(GetProcessHeap(), 0, msg);
|
|
HeapFree(GetProcessHeap(), 0, auth_data);
|
|
|
|
if (status != RPC_S_OK) {
|
|
WARN("processing packet failed with error %u\n", status);
|
|
break;
|
|
}
|
|
}
|
|
exit:
|
|
RPCRT4_DestroyConnection(conn);
|
|
return 0;
|
|
}
|
|
|
|
void RPCRT4_new_client(RpcConnection* conn)
|
|
{
|
|
HANDLE thread = CreateThread(NULL, 0, RPCRT4_io_thread, conn, 0, NULL);
|
|
if (!thread) {
|
|
DWORD err = GetLastError();
|
|
ERR("failed to create thread, error=%08x\n", err);
|
|
RPCRT4_DestroyConnection(conn);
|
|
}
|
|
/* we could set conn->thread, but then we'd have to make the io_thread wait
|
|
* for that, otherwise the thread might finish, destroy the connection, and
|
|
* free the memory we'd write to before we did, causing crashes and stuff -
|
|
* so let's implement that later, when we really need conn->thread */
|
|
|
|
CloseHandle( thread );
|
|
}
|
|
|
|
static DWORD CALLBACK RPCRT4_server_thread(LPVOID the_arg)
|
|
{
|
|
int res;
|
|
unsigned int count;
|
|
void *objs = NULL;
|
|
RpcServerProtseq* cps = the_arg;
|
|
RpcConnection* conn;
|
|
BOOL set_ready_event = FALSE;
|
|
|
|
TRACE("(the_arg == ^%p)\n", the_arg);
|
|
|
|
for (;;) {
|
|
objs = cps->ops->get_wait_array(cps, objs, &count);
|
|
|
|
if (set_ready_event)
|
|
{
|
|
/* signal to function that changed state that we are now sync'ed */
|
|
SetEvent(cps->server_ready_event);
|
|
set_ready_event = FALSE;
|
|
}
|
|
|
|
/* start waiting */
|
|
res = cps->ops->wait_for_new_connection(cps, count, objs);
|
|
|
|
if (res == -1 || (res == 0 && !std_listen))
|
|
{
|
|
/* cleanup */
|
|
cps->ops->free_wait_array(cps, objs);
|
|
EnterCriticalSection(&cps->cs);
|
|
for (conn = cps->conn; conn; conn = conn->Next)
|
|
RPCRT4_CloseConnection(conn);
|
|
LeaveCriticalSection(&cps->cs);
|
|
|
|
if (res == 0 && !std_listen)
|
|
SetEvent(cps->server_ready_event);
|
|
break;
|
|
}
|
|
else if (res == 0)
|
|
set_ready_event = TRUE;
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
/* tells the server thread that the state has changed and waits for it to
|
|
* make the changes */
|
|
static void RPCRT4_sync_with_server_thread(RpcServerProtseq *ps)
|
|
{
|
|
/* make sure we are the only thread sync'ing the server state, otherwise
|
|
* there is a race with the server thread setting an older state and setting
|
|
* the server_ready_event when the new state hasn't yet been applied */
|
|
WaitForSingleObject(ps->mgr_mutex, INFINITE);
|
|
|
|
ps->ops->signal_state_changed(ps);
|
|
|
|
/* wait for server thread to make the requested changes before returning */
|
|
WaitForSingleObject(ps->server_ready_event, INFINITE);
|
|
|
|
ReleaseMutex(ps->mgr_mutex);
|
|
}
|
|
|
|
static RPC_STATUS RPCRT4_start_listen_protseq(RpcServerProtseq *ps, BOOL auto_listen)
|
|
{
|
|
RPC_STATUS status = RPC_S_OK;
|
|
HANDLE server_thread;
|
|
|
|
EnterCriticalSection(&listen_cs);
|
|
if (ps->is_listening) goto done;
|
|
|
|
if (!ps->mgr_mutex) ps->mgr_mutex = CreateMutexW(NULL, FALSE, NULL);
|
|
if (!ps->server_ready_event) ps->server_ready_event = CreateEventW(NULL, FALSE, FALSE, NULL);
|
|
server_thread = CreateThread(NULL, 0, RPCRT4_server_thread, ps, 0, NULL);
|
|
if (!server_thread)
|
|
{
|
|
status = RPC_S_OUT_OF_RESOURCES;
|
|
goto done;
|
|
}
|
|
ps->is_listening = TRUE;
|
|
CloseHandle(server_thread);
|
|
|
|
done:
|
|
LeaveCriticalSection(&listen_cs);
|
|
return status;
|
|
}
|
|
|
|
static RPC_STATUS RPCRT4_start_listen(BOOL auto_listen)
|
|
{
|
|
RPC_STATUS status = RPC_S_ALREADY_LISTENING;
|
|
RpcServerProtseq *cps;
|
|
|
|
TRACE("\n");
|
|
|
|
EnterCriticalSection(&listen_cs);
|
|
if (auto_listen || (manual_listen_count++ == 0))
|
|
{
|
|
status = RPC_S_OK;
|
|
if (++listen_count == 1)
|
|
std_listen = TRUE;
|
|
}
|
|
LeaveCriticalSection(&listen_cs);
|
|
|
|
if (std_listen)
|
|
{
|
|
EnterCriticalSection(&server_cs);
|
|
LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
|
|
{
|
|
status = RPCRT4_start_listen_protseq(cps, TRUE);
|
|
if (status != RPC_S_OK)
|
|
break;
|
|
|
|
/* make sure server is actually listening on the interface before
|
|
* returning */
|
|
RPCRT4_sync_with_server_thread(cps);
|
|
}
|
|
LeaveCriticalSection(&server_cs);
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
static void RPCRT4_stop_listen(BOOL auto_listen)
|
|
{
|
|
EnterCriticalSection(&listen_cs);
|
|
if (auto_listen || (--manual_listen_count == 0))
|
|
{
|
|
if (listen_count != 0 && --listen_count == 0) {
|
|
RpcServerProtseq *cps;
|
|
|
|
std_listen = FALSE;
|
|
LeaveCriticalSection(&listen_cs);
|
|
|
|
LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
|
|
RPCRT4_sync_with_server_thread(cps);
|
|
|
|
return;
|
|
}
|
|
assert(listen_count >= 0);
|
|
}
|
|
LeaveCriticalSection(&listen_cs);
|
|
}
|
|
|
|
static BOOL RPCRT4_protseq_is_endpoint_registered(RpcServerProtseq *protseq, const char *endpoint)
|
|
{
|
|
RpcConnection *conn;
|
|
EnterCriticalSection(&protseq->cs);
|
|
for (conn = protseq->conn; conn; conn = conn->Next)
|
|
{
|
|
if (!endpoint || !strcmp(endpoint, conn->Endpoint))
|
|
break;
|
|
}
|
|
LeaveCriticalSection(&protseq->cs);
|
|
return (conn != NULL);
|
|
}
|
|
|
|
static RPC_STATUS RPCRT4_use_protseq(RpcServerProtseq* ps, const char *endpoint)
|
|
{
|
|
RPC_STATUS status;
|
|
|
|
EnterCriticalSection(&ps->cs);
|
|
|
|
if (RPCRT4_protseq_is_endpoint_registered(ps, endpoint))
|
|
status = RPC_S_OK;
|
|
else
|
|
status = ps->ops->open_endpoint(ps, endpoint);
|
|
|
|
LeaveCriticalSection(&ps->cs);
|
|
|
|
if (status != RPC_S_OK)
|
|
return status;
|
|
|
|
if (std_listen)
|
|
{
|
|
status = RPCRT4_start_listen_protseq(ps, FALSE);
|
|
if (status == RPC_S_OK)
|
|
RPCRT4_sync_with_server_thread(ps);
|
|
}
|
|
|
|
return status;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerInqBindings (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerInqBindings( RPC_BINDING_VECTOR** BindingVector )
|
|
{
|
|
RPC_STATUS status;
|
|
DWORD count;
|
|
RpcServerProtseq* ps;
|
|
RpcConnection* conn;
|
|
|
|
if (BindingVector)
|
|
TRACE("(*BindingVector == ^%p)\n", *BindingVector);
|
|
else
|
|
ERR("(BindingVector == NULL!!?)\n");
|
|
|
|
EnterCriticalSection(&server_cs);
|
|
/* count connections */
|
|
count = 0;
|
|
LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) {
|
|
EnterCriticalSection(&ps->cs);
|
|
for (conn = ps->conn; conn; conn = conn->Next)
|
|
count++;
|
|
LeaveCriticalSection(&ps->cs);
|
|
}
|
|
if (count) {
|
|
/* export bindings */
|
|
*BindingVector = HeapAlloc(GetProcessHeap(), 0,
|
|
sizeof(RPC_BINDING_VECTOR) +
|
|
sizeof(RPC_BINDING_HANDLE)*(count-1));
|
|
(*BindingVector)->Count = count;
|
|
count = 0;
|
|
LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) {
|
|
EnterCriticalSection(&ps->cs);
|
|
for (conn = ps->conn; conn; conn = conn->Next) {
|
|
RPCRT4_MakeBinding((RpcBinding**)&(*BindingVector)->BindingH[count],
|
|
conn);
|
|
count++;
|
|
}
|
|
LeaveCriticalSection(&ps->cs);
|
|
}
|
|
status = RPC_S_OK;
|
|
} else {
|
|
*BindingVector = NULL;
|
|
status = RPC_S_NO_BINDINGS;
|
|
}
|
|
LeaveCriticalSection(&server_cs);
|
|
return status;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUseProtseqEpA (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUseProtseqEpA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor )
|
|
{
|
|
RPC_POLICY policy;
|
|
|
|
TRACE( "(%s,%u,%s,%p)\n", Protseq, MaxCalls, Endpoint, SecurityDescriptor );
|
|
|
|
/* This should provide the default behaviour */
|
|
policy.Length = sizeof( policy );
|
|
policy.EndpointFlags = 0;
|
|
policy.NICFlags = 0;
|
|
|
|
return RpcServerUseProtseqEpExA( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUseProtseqEpW (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUseProtseqEpW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor )
|
|
{
|
|
RPC_POLICY policy;
|
|
|
|
TRACE( "(%s,%u,%s,%p)\n", debugstr_w( Protseq ), MaxCalls, debugstr_w( Endpoint ), SecurityDescriptor );
|
|
|
|
/* This should provide the default behaviour */
|
|
policy.Length = sizeof( policy );
|
|
policy.EndpointFlags = 0;
|
|
policy.NICFlags = 0;
|
|
|
|
return RpcServerUseProtseqEpExW( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
|
|
}
|
|
|
|
/***********************************************************************
|
|
* alloc_serverprotoseq (internal)
|
|
*
|
|
* Must be called with server_cs held.
|
|
*/
|
|
static RPC_STATUS alloc_serverprotoseq(UINT MaxCalls, const char *Protseq, RpcServerProtseq **ps)
|
|
{
|
|
const struct protseq_ops *ops = rpcrt4_get_protseq_ops(Protseq);
|
|
|
|
if (!ops)
|
|
{
|
|
FIXME("protseq %s not supported\n", debugstr_a(Protseq));
|
|
return RPC_S_PROTSEQ_NOT_SUPPORTED;
|
|
}
|
|
|
|
*ps = ops->alloc();
|
|
if (!*ps)
|
|
return RPC_S_OUT_OF_RESOURCES;
|
|
(*ps)->MaxCalls = MaxCalls;
|
|
(*ps)->Protseq = RPCRT4_strdupA(Protseq);
|
|
(*ps)->ops = ops;
|
|
(*ps)->MaxCalls = 0;
|
|
(*ps)->conn = NULL;
|
|
InitializeCriticalSection(&(*ps)->cs);
|
|
(*ps)->is_listening = FALSE;
|
|
(*ps)->mgr_mutex = NULL;
|
|
(*ps)->server_ready_event = NULL;
|
|
|
|
list_add_head(&protseqs, &(*ps)->entry);
|
|
|
|
TRACE("new protseq %p created for %s\n", *ps, Protseq);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/* must be called with server_cs held */
|
|
static void destroy_serverprotoseq(RpcServerProtseq *ps)
|
|
{
|
|
RPCRT4_strfree(ps->Protseq);
|
|
DeleteCriticalSection(&ps->cs);
|
|
CloseHandle(ps->mgr_mutex);
|
|
CloseHandle(ps->server_ready_event);
|
|
list_remove(&ps->entry);
|
|
HeapFree(GetProcessHeap(), 0, ps);
|
|
}
|
|
|
|
/* Finds a given protseq or creates a new one if one doesn't already exist */
|
|
static RPC_STATUS RPCRT4_get_or_create_serverprotseq(UINT MaxCalls, const char *Protseq, RpcServerProtseq **ps)
|
|
{
|
|
RPC_STATUS status;
|
|
RpcServerProtseq *cps;
|
|
|
|
EnterCriticalSection(&server_cs);
|
|
|
|
LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
|
|
if (!strcmp(cps->Protseq, Protseq))
|
|
{
|
|
TRACE("found existing protseq object for %s\n", Protseq);
|
|
*ps = cps;
|
|
LeaveCriticalSection(&server_cs);
|
|
return S_OK;
|
|
}
|
|
|
|
status = alloc_serverprotoseq(MaxCalls, Protseq, ps);
|
|
|
|
LeaveCriticalSection(&server_cs);
|
|
|
|
return status;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUseProtseqEpExA (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUseProtseqEpExA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor,
|
|
PRPC_POLICY lpPolicy )
|
|
{
|
|
RpcServerProtseq* ps;
|
|
RPC_STATUS status;
|
|
|
|
TRACE("(%s,%u,%s,%p,{%u,%u,%u})\n", debugstr_a((const char *)Protseq),
|
|
MaxCalls, debugstr_a((const char *)Endpoint), SecurityDescriptor,
|
|
lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
|
|
|
|
status = RPCRT4_get_or_create_serverprotseq(MaxCalls, (const char *)Protseq, &ps);
|
|
if (status != RPC_S_OK)
|
|
return status;
|
|
|
|
return RPCRT4_use_protseq(ps, (const char *)Endpoint);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUseProtseqEpExW (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUseProtseqEpExW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor,
|
|
PRPC_POLICY lpPolicy )
|
|
{
|
|
RpcServerProtseq* ps;
|
|
RPC_STATUS status;
|
|
LPSTR ProtseqA;
|
|
LPSTR EndpointA;
|
|
|
|
TRACE("(%s,%u,%s,%p,{%u,%u,%u})\n", debugstr_w( Protseq ), MaxCalls,
|
|
debugstr_w( Endpoint ), SecurityDescriptor,
|
|
lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
|
|
|
|
ProtseqA = RPCRT4_strdupWtoA(Protseq);
|
|
status = RPCRT4_get_or_create_serverprotseq(MaxCalls, ProtseqA, &ps);
|
|
RPCRT4_strfree(ProtseqA);
|
|
if (status != RPC_S_OK)
|
|
return status;
|
|
|
|
EndpointA = RPCRT4_strdupWtoA(Endpoint);
|
|
status = RPCRT4_use_protseq(ps, EndpointA);
|
|
RPCRT4_strfree(EndpointA);
|
|
return status;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUseProtseqA (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUseProtseqA(RPC_CSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
|
|
{
|
|
RPC_STATUS status;
|
|
RpcServerProtseq* ps;
|
|
|
|
TRACE("(Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_a((char*)Protseq), MaxCalls, SecurityDescriptor);
|
|
|
|
status = RPCRT4_get_or_create_serverprotseq(MaxCalls, (const char *)Protseq, &ps);
|
|
if (status != RPC_S_OK)
|
|
return status;
|
|
|
|
return RPCRT4_use_protseq(ps, NULL);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUseProtseqW (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUseProtseqW(RPC_WSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
|
|
{
|
|
RPC_STATUS status;
|
|
RpcServerProtseq* ps;
|
|
LPSTR ProtseqA;
|
|
|
|
TRACE("Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_w(Protseq), MaxCalls, SecurityDescriptor);
|
|
|
|
ProtseqA = RPCRT4_strdupWtoA(Protseq);
|
|
status = RPCRT4_get_or_create_serverprotseq(MaxCalls, ProtseqA, &ps);
|
|
RPCRT4_strfree(ProtseqA);
|
|
if (status != RPC_S_OK)
|
|
return status;
|
|
|
|
return RPCRT4_use_protseq(ps, NULL);
|
|
}
|
|
|
|
void RPCRT4_destroy_all_protseqs(void)
|
|
{
|
|
RpcServerProtseq *cps, *cursor2;
|
|
|
|
if (listen_count != 0)
|
|
std_listen = FALSE;
|
|
|
|
EnterCriticalSection(&server_cs);
|
|
LIST_FOR_EACH_ENTRY_SAFE(cps, cursor2, &protseqs, RpcServerProtseq, entry)
|
|
{
|
|
if (listen_count != 0)
|
|
RPCRT4_sync_with_server_thread(cps);
|
|
destroy_serverprotoseq(cps);
|
|
}
|
|
LeaveCriticalSection(&server_cs);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerRegisterIf (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerRegisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv )
|
|
{
|
|
TRACE("(%p,%s,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv);
|
|
return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, 0, RPC_C_LISTEN_MAX_CALLS_DEFAULT, (UINT)-1, NULL );
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerRegisterIfEx (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerRegisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
|
|
UINT Flags, UINT MaxCalls, RPC_IF_CALLBACK_FN* IfCallbackFn )
|
|
{
|
|
TRACE("(%p,%s,%p,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls, IfCallbackFn);
|
|
return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, Flags, MaxCalls, (UINT)-1, IfCallbackFn );
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerRegisterIf2 (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerRegisterIf2( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
|
|
UINT Flags, UINT MaxCalls, UINT MaxRpcSize, RPC_IF_CALLBACK_FN* IfCallbackFn )
|
|
{
|
|
PRPC_SERVER_INTERFACE If = IfSpec;
|
|
RpcServerInterface* sif;
|
|
unsigned int i;
|
|
|
|
TRACE("(%p,%s,%p,%u,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls,
|
|
MaxRpcSize, IfCallbackFn);
|
|
TRACE(" interface id: %s %d.%d\n", debugstr_guid(&If->InterfaceId.SyntaxGUID),
|
|
If->InterfaceId.SyntaxVersion.MajorVersion,
|
|
If->InterfaceId.SyntaxVersion.MinorVersion);
|
|
TRACE(" transfer syntax: %s %d.%d\n", debugstr_guid(&If->TransferSyntax.SyntaxGUID),
|
|
If->TransferSyntax.SyntaxVersion.MajorVersion,
|
|
If->TransferSyntax.SyntaxVersion.MinorVersion);
|
|
TRACE(" dispatch table: %p\n", If->DispatchTable);
|
|
if (If->DispatchTable) {
|
|
TRACE(" dispatch table count: %d\n", If->DispatchTable->DispatchTableCount);
|
|
for (i=0; i<If->DispatchTable->DispatchTableCount; i++) {
|
|
TRACE(" entry %d: %p\n", i, If->DispatchTable->DispatchTable[i]);
|
|
}
|
|
TRACE(" reserved: %ld\n", If->DispatchTable->Reserved);
|
|
}
|
|
TRACE(" protseq endpoint count: %d\n", If->RpcProtseqEndpointCount);
|
|
TRACE(" default manager epv: %p\n", If->DefaultManagerEpv);
|
|
TRACE(" interpreter info: %p\n", If->InterpreterInfo);
|
|
|
|
sif = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcServerInterface));
|
|
sif->If = If;
|
|
if (MgrTypeUuid) {
|
|
sif->MgrTypeUuid = *MgrTypeUuid;
|
|
sif->MgrEpv = MgrEpv;
|
|
} else {
|
|
memset(&sif->MgrTypeUuid, 0, sizeof(UUID));
|
|
sif->MgrEpv = If->DefaultManagerEpv;
|
|
}
|
|
sif->Flags = Flags;
|
|
sif->MaxCalls = MaxCalls;
|
|
sif->MaxRpcSize = MaxRpcSize;
|
|
sif->IfCallbackFn = IfCallbackFn;
|
|
|
|
EnterCriticalSection(&server_cs);
|
|
list_add_head(&server_interfaces, &sif->entry);
|
|
LeaveCriticalSection(&server_cs);
|
|
|
|
if (sif->Flags & RPC_IF_AUTOLISTEN)
|
|
RPCRT4_start_listen(TRUE);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUnregisterIf (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUnregisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, UINT WaitForCallsToComplete )
|
|
{
|
|
PRPC_SERVER_INTERFACE If = IfSpec;
|
|
HANDLE event = NULL;
|
|
BOOL found = FALSE;
|
|
BOOL completed = TRUE;
|
|
RpcServerInterface *cif;
|
|
RPC_STATUS status;
|
|
|
|
TRACE("(IfSpec == (RPC_IF_HANDLE)^%p (%s), MgrTypeUuid == %s, WaitForCallsToComplete == %u)\n",
|
|
IfSpec, debugstr_guid(&If->InterfaceId.SyntaxGUID), debugstr_guid(MgrTypeUuid), WaitForCallsToComplete);
|
|
|
|
EnterCriticalSection(&server_cs);
|
|
LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) {
|
|
if ((!IfSpec || !memcmp(&If->InterfaceId, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER))) &&
|
|
UuidEqual(MgrTypeUuid, &cif->MgrTypeUuid, &status)) {
|
|
list_remove(&cif->entry);
|
|
TRACE("unregistering cif %p\n", cif);
|
|
if (cif->CurrentCalls) {
|
|
completed = FALSE;
|
|
cif->Delete = TRUE;
|
|
if (WaitForCallsToComplete)
|
|
cif->CallsCompletedEvent = event = CreateEventW(NULL, FALSE, FALSE, NULL);
|
|
}
|
|
found = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
LeaveCriticalSection(&server_cs);
|
|
|
|
if (!found) {
|
|
ERR("not found for object %s\n", debugstr_guid(MgrTypeUuid));
|
|
return RPC_S_UNKNOWN_IF;
|
|
}
|
|
|
|
if (completed)
|
|
HeapFree(GetProcessHeap(), 0, cif);
|
|
else if (event) {
|
|
/* sif will be freed when the last call is completed, so be careful not to
|
|
* touch that memory here as that could happen before we get here */
|
|
WaitForSingleObject(event, INFINITE);
|
|
CloseHandle(event);
|
|
}
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerUnregisterIfEx (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerUnregisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, int RundownContextHandles )
|
|
{
|
|
FIXME("(IfSpec == (RPC_IF_HANDLE)^%p, MgrTypeUuid == %s, RundownContextHandles == %d): stub\n",
|
|
IfSpec, debugstr_guid(MgrTypeUuid), RundownContextHandles);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcObjectSetType (RPCRT4.@)
|
|
*
|
|
* PARAMS
|
|
* ObjUuid [I] "Object" UUID
|
|
* TypeUuid [I] "Type" UUID
|
|
*
|
|
* RETURNS
|
|
* RPC_S_OK The call succeeded
|
|
* RPC_S_INVALID_OBJECT The provided object (nil) is not valid
|
|
* RPC_S_ALREADY_REGISTERED The provided object is already registered
|
|
*
|
|
* Maps "Object" UUIDs to "Type" UUID's. Passing the nil UUID as the type
|
|
* resets the mapping for the specified object UUID to nil (the default).
|
|
* The nil object is always associated with the nil type and cannot be
|
|
* reassigned. Servers can support multiple implementations on the same
|
|
* interface by registering different end-point vectors for the different
|
|
* types. There's no need to call this if a server only supports the nil
|
|
* type, as is typical.
|
|
*/
|
|
RPC_STATUS WINAPI RpcObjectSetType( UUID* ObjUuid, UUID* TypeUuid )
|
|
{
|
|
RpcObjTypeMap *map = RpcObjTypeMaps, *prev = NULL;
|
|
RPC_STATUS dummy;
|
|
|
|
TRACE("(ObjUUID == %s, TypeUuid == %s).\n", debugstr_guid(ObjUuid), debugstr_guid(TypeUuid));
|
|
if ((! ObjUuid) || UuidIsNil(ObjUuid, &dummy)) {
|
|
/* nil uuid cannot be remapped */
|
|
return RPC_S_INVALID_OBJECT;
|
|
}
|
|
|
|
/* find the mapping for this object if there is one ... */
|
|
while (map) {
|
|
if (! UuidCompare(ObjUuid, &map->Object, &dummy)) break;
|
|
prev = map;
|
|
map = map->next;
|
|
}
|
|
if ((! TypeUuid) || UuidIsNil(TypeUuid, &dummy)) {
|
|
/* ... and drop it from the list */
|
|
if (map) {
|
|
if (prev)
|
|
prev->next = map->next;
|
|
else
|
|
RpcObjTypeMaps = map->next;
|
|
HeapFree(GetProcessHeap(), 0, map);
|
|
}
|
|
} else {
|
|
/* ... , fail if we found it ... */
|
|
if (map)
|
|
return RPC_S_ALREADY_REGISTERED;
|
|
/* ... otherwise create a new one and add it in. */
|
|
map = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcObjTypeMap));
|
|
map->Object = *ObjUuid;
|
|
map->Type = *TypeUuid;
|
|
map->next = NULL;
|
|
if (prev)
|
|
prev->next = map; /* prev is the last map in the linklist */
|
|
else
|
|
RpcObjTypeMaps = map;
|
|
}
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
struct rpc_server_registered_auth_info
|
|
{
|
|
struct list entry;
|
|
TimeStamp exp;
|
|
CredHandle cred;
|
|
ULONG max_token;
|
|
USHORT auth_type;
|
|
};
|
|
|
|
RPC_STATUS RPCRT4_ServerGetRegisteredAuthInfo(
|
|
USHORT auth_type, CredHandle *cred, TimeStamp *exp, ULONG *max_token)
|
|
{
|
|
RPC_STATUS status = RPC_S_UNKNOWN_AUTHN_SERVICE;
|
|
struct rpc_server_registered_auth_info *auth_info;
|
|
|
|
EnterCriticalSection(&server_auth_info_cs);
|
|
LIST_FOR_EACH_ENTRY(auth_info, &server_registered_auth_info, struct rpc_server_registered_auth_info, entry)
|
|
{
|
|
if (auth_info->auth_type == auth_type)
|
|
{
|
|
*cred = auth_info->cred;
|
|
*exp = auth_info->exp;
|
|
*max_token = auth_info->max_token;
|
|
status = RPC_S_OK;
|
|
break;
|
|
}
|
|
}
|
|
LeaveCriticalSection(&server_auth_info_cs);
|
|
|
|
return status;
|
|
}
|
|
|
|
void RPCRT4_ServerFreeAllRegisteredAuthInfo(void)
|
|
{
|
|
struct rpc_server_registered_auth_info *auth_info, *cursor2;
|
|
|
|
EnterCriticalSection(&server_auth_info_cs);
|
|
LIST_FOR_EACH_ENTRY_SAFE(auth_info, cursor2, &server_registered_auth_info, struct rpc_server_registered_auth_info, entry)
|
|
{
|
|
FreeCredentialsHandle(&auth_info->cred);
|
|
HeapFree(GetProcessHeap(), 0, auth_info);
|
|
}
|
|
LeaveCriticalSection(&server_auth_info_cs);
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerRegisterAuthInfoA (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerRegisterAuthInfoA( RPC_CSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
|
|
LPVOID Arg )
|
|
{
|
|
SECURITY_STATUS sec_status;
|
|
CredHandle cred;
|
|
TimeStamp exp;
|
|
ULONG package_count;
|
|
ULONG i;
|
|
PSecPkgInfoA packages;
|
|
ULONG max_token;
|
|
struct rpc_server_registered_auth_info *auth_info;
|
|
|
|
TRACE("(%s,%u,%p,%p)\n", ServerPrincName, AuthnSvc, GetKeyFn, Arg);
|
|
|
|
sec_status = EnumerateSecurityPackagesA(&package_count, &packages);
|
|
if (sec_status != SEC_E_OK)
|
|
{
|
|
ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n",
|
|
sec_status);
|
|
return RPC_S_SEC_PKG_ERROR;
|
|
}
|
|
|
|
for (i = 0; i < package_count; i++)
|
|
if (packages[i].wRPCID == AuthnSvc)
|
|
break;
|
|
|
|
if (i == package_count)
|
|
{
|
|
WARN("unsupported AuthnSvc %u\n", AuthnSvc);
|
|
FreeContextBuffer(packages);
|
|
return RPC_S_UNKNOWN_AUTHN_SERVICE;
|
|
}
|
|
TRACE("found package %s for service %u\n", packages[i].Name,
|
|
AuthnSvc);
|
|
sec_status = AcquireCredentialsHandleA((SEC_CHAR *)ServerPrincName,
|
|
packages[i].Name,
|
|
SECPKG_CRED_INBOUND, NULL, NULL,
|
|
NULL, NULL, &cred, &exp);
|
|
max_token = packages[i].cbMaxToken;
|
|
FreeContextBuffer(packages);
|
|
if (sec_status != SEC_E_OK)
|
|
return RPC_S_SEC_PKG_ERROR;
|
|
|
|
auth_info = HeapAlloc(GetProcessHeap(), 0, sizeof(*auth_info));
|
|
if (!auth_info)
|
|
{
|
|
FreeCredentialsHandle(&cred);
|
|
return RPC_S_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
auth_info->exp = exp;
|
|
auth_info->cred = cred;
|
|
auth_info->max_token = max_token;
|
|
auth_info->auth_type = AuthnSvc;
|
|
|
|
EnterCriticalSection(&server_auth_info_cs);
|
|
list_add_tail(&server_registered_auth_info, &auth_info->entry);
|
|
LeaveCriticalSection(&server_auth_info_cs);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerRegisterAuthInfoW (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerRegisterAuthInfoW( RPC_WSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
|
|
LPVOID Arg )
|
|
{
|
|
SECURITY_STATUS sec_status;
|
|
CredHandle cred;
|
|
TimeStamp exp;
|
|
ULONG package_count;
|
|
ULONG i;
|
|
PSecPkgInfoW packages;
|
|
ULONG max_token;
|
|
struct rpc_server_registered_auth_info *auth_info;
|
|
|
|
TRACE("(%s,%u,%p,%p)\n", debugstr_w(ServerPrincName), AuthnSvc, GetKeyFn, Arg);
|
|
|
|
sec_status = EnumerateSecurityPackagesW(&package_count, &packages);
|
|
if (sec_status != SEC_E_OK)
|
|
{
|
|
ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n",
|
|
sec_status);
|
|
return RPC_S_SEC_PKG_ERROR;
|
|
}
|
|
|
|
for (i = 0; i < package_count; i++)
|
|
if (packages[i].wRPCID == AuthnSvc)
|
|
break;
|
|
|
|
if (i == package_count)
|
|
{
|
|
WARN("unsupported AuthnSvc %u\n", AuthnSvc);
|
|
FreeContextBuffer(packages);
|
|
return RPC_S_UNKNOWN_AUTHN_SERVICE;
|
|
}
|
|
TRACE("found package %s for service %u\n", debugstr_w(packages[i].Name),
|
|
AuthnSvc);
|
|
sec_status = AcquireCredentialsHandleW((SEC_WCHAR *)ServerPrincName,
|
|
packages[i].Name,
|
|
SECPKG_CRED_INBOUND, NULL, NULL,
|
|
NULL, NULL, &cred, &exp);
|
|
max_token = packages[i].cbMaxToken;
|
|
FreeContextBuffer(packages);
|
|
if (sec_status != SEC_E_OK)
|
|
return RPC_S_SEC_PKG_ERROR;
|
|
|
|
auth_info = HeapAlloc(GetProcessHeap(), 0, sizeof(*auth_info));
|
|
if (!auth_info)
|
|
{
|
|
FreeCredentialsHandle(&cred);
|
|
return RPC_S_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
auth_info->exp = exp;
|
|
auth_info->cred = cred;
|
|
auth_info->max_token = max_token;
|
|
auth_info->auth_type = AuthnSvc;
|
|
|
|
EnterCriticalSection(&server_auth_info_cs);
|
|
list_add_tail(&server_registered_auth_info, &auth_info->entry);
|
|
LeaveCriticalSection(&server_auth_info_cs);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcServerListen (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcServerListen( UINT MinimumCallThreads, UINT MaxCalls, UINT DontWait )
|
|
{
|
|
RPC_STATUS status = RPC_S_OK;
|
|
|
|
TRACE("(%u,%u,%u)\n", MinimumCallThreads, MaxCalls, DontWait);
|
|
|
|
if (list_empty(&protseqs))
|
|
return RPC_S_NO_PROTSEQS_REGISTERED;
|
|
|
|
status = RPCRT4_start_listen(FALSE);
|
|
|
|
if (DontWait || (status != RPC_S_OK)) return status;
|
|
|
|
return RpcMgmtWaitServerListen();
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtServerWaitListen (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtWaitServerListen( void )
|
|
{
|
|
TRACE("()\n");
|
|
|
|
EnterCriticalSection(&listen_cs);
|
|
|
|
if (!std_listen) {
|
|
LeaveCriticalSection(&listen_cs);
|
|
return RPC_S_NOT_LISTENING;
|
|
}
|
|
|
|
LeaveCriticalSection(&listen_cs);
|
|
|
|
FIXME("not waiting for server calls to finish\n");
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtStopServerListening (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtStopServerListening ( RPC_BINDING_HANDLE Binding )
|
|
{
|
|
TRACE("(Binding == (RPC_BINDING_HANDLE)^%p)\n", Binding);
|
|
|
|
if (Binding) {
|
|
FIXME("client-side invocation not implemented.\n");
|
|
return RPC_S_WRONG_KIND_OF_BINDING;
|
|
}
|
|
|
|
RPCRT4_stop_listen(FALSE);
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtEnableIdleCleanup (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtEnableIdleCleanup(void)
|
|
{
|
|
FIXME("(): stub\n");
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* I_RpcServerStartListening (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI I_RpcServerStartListening( HWND hWnd )
|
|
{
|
|
FIXME( "(%p): stub\n", hWnd );
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* I_RpcServerStopListening (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI I_RpcServerStopListening( void )
|
|
{
|
|
FIXME( "(): stub\n" );
|
|
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* I_RpcWindowProc (RPCRT4.@)
|
|
*/
|
|
UINT WINAPI I_RpcWindowProc( void *hWnd, UINT Message, UINT wParam, ULONG lParam )
|
|
{
|
|
FIXME( "(%p,%08x,%08x,%08x): stub\n", hWnd, Message, wParam, lParam );
|
|
|
|
return 0;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtInqIfIds (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtInqIfIds(RPC_BINDING_HANDLE Binding, RPC_IF_ID_VECTOR **IfIdVector)
|
|
{
|
|
FIXME("(%p,%p): stub\n", Binding, IfIdVector);
|
|
return RPC_S_INVALID_BINDING;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtInqStats (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtInqStats(RPC_BINDING_HANDLE Binding, RPC_STATS_VECTOR **Statistics)
|
|
{
|
|
RPC_STATS_VECTOR *stats;
|
|
|
|
FIXME("(%p,%p)\n", Binding, Statistics);
|
|
|
|
if ((stats = HeapAlloc(GetProcessHeap(), 0, sizeof(RPC_STATS_VECTOR))))
|
|
{
|
|
stats->Count = 1;
|
|
stats->Stats[0] = 0;
|
|
*Statistics = stats;
|
|
return RPC_S_OK;
|
|
}
|
|
return RPC_S_OUT_OF_RESOURCES;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtStatsVectorFree (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtStatsVectorFree(RPC_STATS_VECTOR **StatsVector)
|
|
{
|
|
FIXME("(%p)\n", StatsVector);
|
|
|
|
if (StatsVector)
|
|
{
|
|
HeapFree(GetProcessHeap(), 0, *StatsVector);
|
|
*StatsVector = NULL;
|
|
}
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtEpEltInqBegin (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtEpEltInqBegin(RPC_BINDING_HANDLE Binding, ULONG InquiryType,
|
|
RPC_IF_ID *IfId, ULONG VersOption, UUID *ObjectUuid, RPC_EP_INQ_HANDLE* InquiryContext)
|
|
{
|
|
FIXME("(%p,%u,%p,%u,%p,%p): stub\n",
|
|
Binding, InquiryType, IfId, VersOption, ObjectUuid, InquiryContext);
|
|
return RPC_S_INVALID_BINDING;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtIsServerListening (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtIsServerListening(RPC_BINDING_HANDLE Binding)
|
|
{
|
|
FIXME("(%p): stub\n", Binding);
|
|
return RPC_S_INVALID_BINDING;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* RpcMgmtSetServerStackSize (RPCRT4.@)
|
|
*/
|
|
RPC_STATUS WINAPI RpcMgmtSetServerStackSize(ULONG ThreadStackSize)
|
|
{
|
|
FIXME("(0x%x): stub\n", ThreadStackSize);
|
|
return RPC_S_OK;
|
|
}
|
|
|
|
/***********************************************************************
|
|
* I_RpcGetCurrentCallHandle (RPCRT4.@)
|
|
*/
|
|
RPC_BINDING_HANDLE WINAPI I_RpcGetCurrentCallHandle(void)
|
|
{
|
|
TRACE("\n");
|
|
return RPCRT4_GetThreadCurrentCallHandle();
|
|
}
|