Synchronize up to trunk's revision r57784.
[reactos.git] / dll / win32 / rpcrt4 / rpc_server.c
1 /*
2 * RPC server API
3 *
4 * Copyright 2001 Ove Kåven, TransGaming Technologies
5 * Copyright 2004 Filip Navara
6 * Copyright 2006-2008 Robert Shearman (for CodeWeavers)
7 *
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
12 *
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
17 *
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
21 */
22
23 #include "config.h"
24 #include "wine/port.h"
25
26 #include <stdarg.h>
27 #include <stdio.h>
28 #include <string.h>
29 #include <assert.h>
30
31 #include "windef.h"
32 #include "winbase.h"
33 #include "winerror.h"
34
35 #include "rpc.h"
36 #include "rpcndr.h"
37 #include "excpt.h"
38
39 #include "wine/debug.h"
40 #include "wine/exception.h"
41
42 #include "rpc_server.h"
43 #include "rpc_assoc.h"
44 #include "rpc_message.h"
45 #include "rpc_defs.h"
46 #include "ncastatus.h"
47
48 WINE_DEFAULT_DEBUG_CHANNEL(rpc);
49
50 typedef struct _RpcPacket
51 {
52 struct _RpcConnection* conn;
53 RpcPktHdr* hdr;
54 RPC_MESSAGE* msg;
55 unsigned char *auth_data;
56 ULONG auth_length;
57 } RpcPacket;
58
59 typedef struct _RpcObjTypeMap
60 {
61 /* FIXME: a hash table would be better. */
62 struct _RpcObjTypeMap *next;
63 UUID Object;
64 UUID Type;
65 } RpcObjTypeMap;
66
67 static RpcObjTypeMap *RpcObjTypeMaps;
68
69 /* list of type RpcServerProtseq */
70 static struct list protseqs = LIST_INIT(protseqs);
71 static struct list server_interfaces = LIST_INIT(server_interfaces);
72 static struct list server_registered_auth_info = LIST_INIT(server_registered_auth_info);
73
74 static CRITICAL_SECTION server_cs;
75 static CRITICAL_SECTION_DEBUG server_cs_debug =
76 {
77 0, 0, &server_cs,
78 { &server_cs_debug.ProcessLocksList, &server_cs_debug.ProcessLocksList },
79 0, 0, { (DWORD_PTR)(__FILE__ ": server_cs") }
80 };
81 static CRITICAL_SECTION server_cs = { &server_cs_debug, -1, 0, 0, 0, 0 };
82
83 static CRITICAL_SECTION listen_cs;
84 static CRITICAL_SECTION_DEBUG listen_cs_debug =
85 {
86 0, 0, &listen_cs,
87 { &listen_cs_debug.ProcessLocksList, &listen_cs_debug.ProcessLocksList },
88 0, 0, { (DWORD_PTR)(__FILE__ ": listen_cs") }
89 };
90 static CRITICAL_SECTION listen_cs = { &listen_cs_debug, -1, 0, 0, 0, 0 };
91
92 static CRITICAL_SECTION server_auth_info_cs;
93 static CRITICAL_SECTION_DEBUG server_auth_info_cs_debug =
94 {
95 0, 0, &server_auth_info_cs,
96 { &server_auth_info_cs_debug.ProcessLocksList, &server_auth_info_cs_debug.ProcessLocksList },
97 0, 0, { (DWORD_PTR)(__FILE__ ": server_auth_info_cs") }
98 };
99 static CRITICAL_SECTION server_auth_info_cs = { &server_auth_info_cs_debug, -1, 0, 0, 0, 0 };
100
101 /* whether the server is currently listening */
102 static BOOL std_listen;
103 /* number of manual listeners (calls to RpcServerListen) */
104 static LONG manual_listen_count;
105 /* total listeners including auto listeners */
106 static LONG listen_count;
107 /* event set once all listening is finished */
108 static HANDLE listen_done_event;
109
110 static UUID uuid_nil;
111
112 static inline RpcObjTypeMap *LookupObjTypeMap(UUID *ObjUuid)
113 {
114 RpcObjTypeMap *rslt = RpcObjTypeMaps;
115 RPC_STATUS dummy;
116
117 while (rslt) {
118 if (! UuidCompare(ObjUuid, &rslt->Object, &dummy)) break;
119 rslt = rslt->next;
120 }
121
122 return rslt;
123 }
124
125 static inline UUID *LookupObjType(UUID *ObjUuid)
126 {
127 RpcObjTypeMap *map = LookupObjTypeMap(ObjUuid);
128 if (map)
129 return &map->Type;
130 else
131 return &uuid_nil;
132 }
133
134 static RpcServerInterface* RPCRT4_find_interface(UUID* object,
135 const RPC_SYNTAX_IDENTIFIER *if_id,
136 const RPC_SYNTAX_IDENTIFIER *transfer_syntax,
137 BOOL check_object)
138 {
139 UUID* MgrType = NULL;
140 RpcServerInterface* cif;
141 RPC_STATUS status;
142
143 if (check_object)
144 MgrType = LookupObjType(object);
145 EnterCriticalSection(&server_cs);
146 LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) {
147 if (!memcmp(if_id, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER)) &&
148 (!transfer_syntax || !memcmp(transfer_syntax, &cif->If->TransferSyntax, sizeof(RPC_SYNTAX_IDENTIFIER))) &&
149 (check_object == FALSE || UuidEqual(MgrType, &cif->MgrTypeUuid, &status)) &&
150 std_listen) {
151 InterlockedIncrement(&cif->CurrentCalls);
152 break;
153 }
154 }
155 LeaveCriticalSection(&server_cs);
156 if (&cif->entry == &server_interfaces) cif = NULL;
157 TRACE("returning %p for object %s, if_id { %d.%d %s }\n", cif,
158 debugstr_guid(object), if_id->SyntaxVersion.MajorVersion,
159 if_id->SyntaxVersion.MinorVersion, debugstr_guid(&if_id->SyntaxGUID));
160 return cif;
161 }
162
163 static void RPCRT4_release_server_interface(RpcServerInterface *sif)
164 {
165 if (!InterlockedDecrement(&sif->CurrentCalls) &&
166 sif->Delete) {
167 /* sif must have been removed from server_interfaces before
168 * CallsCompletedEvent is set */
169 if (sif->CallsCompletedEvent)
170 SetEvent(sif->CallsCompletedEvent);
171 HeapFree(GetProcessHeap(), 0, sif);
172 }
173 }
174
175 static RpcPktHdr *handle_bind_error(RpcConnection *conn, RPC_STATUS error)
176 {
177 unsigned int reject_reason;
178 switch (error)
179 {
180 case RPC_S_SERVER_TOO_BUSY:
181 reject_reason = REJECT_TEMPORARY_CONGESTION;
182 break;
183 case ERROR_OUTOFMEMORY:
184 case RPC_S_OUT_OF_RESOURCES:
185 reject_reason = REJECT_LOCAL_LIMIT_EXCEEDED;
186 break;
187 case RPC_S_PROTOCOL_ERROR:
188 reject_reason = REJECT_PROTOCOL_VERSION_NOT_SUPPORTED;
189 break;
190 case RPC_S_UNKNOWN_AUTHN_SERVICE:
191 reject_reason = REJECT_UNKNOWN_AUTHN_SERVICE;
192 break;
193 case ERROR_ACCESS_DENIED:
194 reject_reason = REJECT_INVALID_CHECKSUM;
195 break;
196 default:
197 FIXME("unexpected status value %d\n", error);
198 /* fall through */
199 case RPC_S_INVALID_BOUND:
200 reject_reason = REJECT_REASON_NOT_SPECIFIED;
201 break;
202 }
203 return RPCRT4_BuildBindNackHeader(NDR_LOCAL_DATA_REPRESENTATION,
204 RPC_VER_MAJOR, RPC_VER_MINOR,
205 reject_reason);
206 }
207
208 static RPC_STATUS process_bind_packet_no_send(
209 RpcConnection *conn, RpcPktBindHdr *hdr, RPC_MESSAGE *msg,
210 unsigned char *auth_data, ULONG auth_length, RpcPktHdr **ack_response,
211 unsigned char **auth_data_out, ULONG *auth_length_out)
212 {
213 RPC_STATUS status;
214 RpcContextElement *ctxt_elem;
215 unsigned int i;
216 RpcResult *results;
217
218 /* validate data */
219 for (i = 0, ctxt_elem = msg->Buffer;
220 i < hdr->num_elements;
221 i++, ctxt_elem = (RpcContextElement *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes])
222 {
223 if (((char *)ctxt_elem - (char *)msg->Buffer) > msg->BufferLength ||
224 ((char *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes] - (char *)msg->Buffer) > msg->BufferLength)
225 {
226 ERR("inconsistent data in packet - packet length %d, num elements %d\n",
227 msg->BufferLength, hdr->num_elements);
228 return RPC_S_INVALID_BOUND;
229 }
230 }
231
232 if (hdr->max_tsize < RPC_MIN_PACKET_SIZE ||
233 !UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status) ||
234 conn->server_binding)
235 {
236 TRACE("packet size less than min size, or active interface syntax guid non-null\n");
237
238 return RPC_S_INVALID_BOUND;
239 }
240
241 results = HeapAlloc(GetProcessHeap(), 0,
242 hdr->num_elements * sizeof(*results));
243 if (!results)
244 return RPC_S_OUT_OF_RESOURCES;
245
246 for (i = 0, ctxt_elem = (RpcContextElement *)msg->Buffer;
247 i < hdr->num_elements;
248 i++, ctxt_elem = (RpcContextElement *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes])
249 {
250 RpcServerInterface* sif = NULL;
251 unsigned int j;
252
253 for (j = 0; !sif && j < ctxt_elem->num_syntaxes; j++)
254 {
255 sif = RPCRT4_find_interface(NULL, &ctxt_elem->abstract_syntax,
256 &ctxt_elem->transfer_syntaxes[j], FALSE);
257 if (sif)
258 break;
259 }
260 if (sif)
261 {
262 RPCRT4_release_server_interface(sif);
263 TRACE("accepting bind request on connection %p for %s\n", conn,
264 debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID));
265 results[i].result = RESULT_ACCEPT;
266 results[i].reason = REASON_NONE;
267 results[i].transfer_syntax = ctxt_elem->transfer_syntaxes[j];
268
269 /* save the interface for later use */
270 /* FIXME: save linked list */
271 conn->ActiveInterface = ctxt_elem->abstract_syntax;
272 }
273 else if ((sif = RPCRT4_find_interface(NULL, &ctxt_elem->abstract_syntax,
274 NULL, FALSE)) != NULL)
275 {
276 RPCRT4_release_server_interface(sif);
277 TRACE("not accepting bind request on connection %p for %s - no transfer syntaxes supported\n",
278 conn, debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID));
279 results[i].result = RESULT_PROVIDER_REJECTION;
280 results[i].reason = REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED;
281 memset(&results[i].transfer_syntax, 0, sizeof(results[i].transfer_syntax));
282 }
283 else
284 {
285 TRACE("not accepting bind request on connection %p for %s - abstract syntax not supported\n",
286 conn, debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID));
287 results[i].result = RESULT_PROVIDER_REJECTION;
288 results[i].reason = REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED;
289 memset(&results[i].transfer_syntax, 0, sizeof(results[i].transfer_syntax));
290 }
291 }
292
293 /* create temporary binding */
294 status = RPCRT4_MakeBinding(&conn->server_binding, conn);
295 if (status != RPC_S_OK)
296 {
297 HeapFree(GetProcessHeap(), 0, results);
298 return status;
299 }
300
301 status = RpcServerAssoc_GetAssociation(rpcrt4_conn_get_name(conn),
302 conn->NetworkAddr, conn->Endpoint,
303 conn->NetworkOptions,
304 hdr->assoc_gid,
305 &conn->server_binding->Assoc);
306 if (status != RPC_S_OK)
307 {
308 HeapFree(GetProcessHeap(), 0, results);
309 return status;
310 }
311
312 if (auth_length)
313 {
314 status = RPCRT4_ServerConnectionAuth(conn, TRUE,
315 (RpcAuthVerifier *)auth_data,
316 auth_length, auth_data_out,
317 auth_length_out);
318 if (status != RPC_S_OK)
319 {
320 HeapFree(GetProcessHeap(), 0, results);
321 return status;
322 }
323 }
324
325 *ack_response = RPCRT4_BuildBindAckHeader(NDR_LOCAL_DATA_REPRESENTATION,
326 RPC_MAX_PACKET_SIZE,
327 RPC_MAX_PACKET_SIZE,
328 conn->server_binding->Assoc->assoc_group_id,
329 conn->Endpoint, hdr->num_elements,
330 results);
331 HeapFree(GetProcessHeap(), 0, results);
332
333 if (*ack_response)
334 conn->MaxTransmissionSize = hdr->max_tsize;
335 else
336 status = RPC_S_OUT_OF_RESOURCES;
337
338 return status;
339 }
340
341 static RPC_STATUS process_bind_packet(RpcConnection *conn, RpcPktBindHdr *hdr,
342 RPC_MESSAGE *msg,
343 unsigned char *auth_data,
344 ULONG auth_length)
345 {
346 RPC_STATUS status;
347 RpcPktHdr *response = NULL;
348 unsigned char *auth_data_out = NULL;
349 ULONG auth_length_out = 0;
350
351 status = process_bind_packet_no_send(conn, hdr, msg, auth_data, auth_length,
352 &response, &auth_data_out,
353 &auth_length_out);
354 if (status != RPC_S_OK)
355 response = handle_bind_error(conn, status);
356 if (response)
357 status = RPCRT4_SendWithAuth(conn, response, NULL, 0, auth_data_out, auth_length_out);
358 else
359 status = ERROR_OUTOFMEMORY;
360 RPCRT4_FreeHeader(response);
361
362 return status;
363 }
364
365
366 static RPC_STATUS process_request_packet(RpcConnection *conn, RpcPktRequestHdr *hdr, RPC_MESSAGE *msg)
367 {
368 RPC_STATUS status;
369 RpcPktHdr *response = NULL;
370 RpcServerInterface* sif;
371 RPC_DISPATCH_FUNCTION func;
372 BOOL exception;
373 UUID *object_uuid;
374 NDR_SCONTEXT context_handle;
375 void *buf = msg->Buffer;
376
377 /* fail if the connection isn't bound with an interface */
378 if (UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status)) {
379 /* FIXME: should send BindNack instead */
380 response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
381 status);
382
383 RPCRT4_Send(conn, response, NULL, 0);
384 RPCRT4_FreeHeader(response);
385 return RPC_S_OK;
386 }
387
388 if (hdr->common.flags & RPC_FLG_OBJECT_UUID) {
389 object_uuid = (UUID*)(hdr + 1);
390 } else {
391 object_uuid = NULL;
392 }
393
394 sif = RPCRT4_find_interface(object_uuid, &conn->ActiveInterface, NULL, TRUE);
395 if (!sif) {
396 WARN("interface %s no longer registered, returning fault packet\n", debugstr_guid(&conn->ActiveInterface.SyntaxGUID));
397 response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
398 NCA_S_UNK_IF);
399
400 RPCRT4_Send(conn, response, NULL, 0);
401 RPCRT4_FreeHeader(response);
402 return RPC_S_OK;
403 }
404 msg->RpcInterfaceInformation = sif->If;
405 /* copy the endpoint vector from sif to msg so that midl-generated code will use it */
406 msg->ManagerEpv = sif->MgrEpv;
407 if (object_uuid != NULL) {
408 RPCRT4_SetBindingObject(msg->Handle, object_uuid);
409 }
410
411 /* find dispatch function */
412 msg->ProcNum = hdr->opnum;
413 if (sif->Flags & RPC_IF_OLE) {
414 /* native ole32 always gives us a dispatch table with a single entry
415 * (I assume that's a wrapper for IRpcStubBuffer::Invoke) */
416 func = *sif->If->DispatchTable->DispatchTable;
417 } else {
418 if (msg->ProcNum >= sif->If->DispatchTable->DispatchTableCount) {
419 WARN("invalid procnum (%d/%d)\n", msg->ProcNum, sif->If->DispatchTable->DispatchTableCount);
420 response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
421 NCA_S_OP_RNG_ERROR);
422
423 RPCRT4_Send(conn, response, NULL, 0);
424 RPCRT4_FreeHeader(response);
425 }
426 func = sif->If->DispatchTable->DispatchTable[msg->ProcNum];
427 }
428
429 /* put in the drep. FIXME: is this more universally applicable?
430 perhaps we should move this outward... */
431 msg->DataRepresentation =
432 MAKELONG( MAKEWORD(hdr->common.drep[0], hdr->common.drep[1]),
433 MAKEWORD(hdr->common.drep[2], hdr->common.drep[3]));
434
435 exception = FALSE;
436
437 /* dispatch */
438 RPCRT4_SetThreadCurrentCallHandle(msg->Handle);
439 __TRY {
440 if (func) func(msg);
441 } __EXCEPT_ALL {
442 WARN("exception caught with code 0x%08x = %d\n", GetExceptionCode(), GetExceptionCode());
443 exception = TRUE;
444 if (GetExceptionCode() == STATUS_ACCESS_VIOLATION)
445 status = ERROR_NOACCESS;
446 else
447 status = GetExceptionCode();
448 response = RPCRT4_BuildFaultHeader(msg->DataRepresentation,
449 RPC2NCA_STATUS(status));
450 } __ENDTRY
451 RPCRT4_SetThreadCurrentCallHandle(NULL);
452
453 /* release any unmarshalled context handles */
454 while ((context_handle = RPCRT4_PopThreadContextHandle()) != NULL)
455 RpcServerAssoc_ReleaseContextHandle(conn->server_binding->Assoc, context_handle, TRUE);
456
457 if (!exception)
458 response = RPCRT4_BuildResponseHeader(msg->DataRepresentation,
459 msg->BufferLength);
460
461 /* send response packet */
462 if (response) {
463 status = RPCRT4_Send(conn, response, exception ? NULL : msg->Buffer,
464 exception ? 0 : msg->BufferLength);
465 RPCRT4_FreeHeader(response);
466 } else
467 ERR("out of memory\n");
468
469 msg->RpcInterfaceInformation = NULL;
470 RPCRT4_release_server_interface(sif);
471
472 if (msg->Buffer == buf) buf = NULL;
473 TRACE("freeing Buffer=%p\n", buf);
474 I_RpcFree(buf);
475
476 return status;
477 }
478
479 static RPC_STATUS process_auth3_packet(RpcConnection *conn,
480 RpcPktCommonHdr *hdr,
481 RPC_MESSAGE *msg,
482 unsigned char *auth_data,
483 ULONG auth_length)
484 {
485 RPC_STATUS status;
486
487 if (UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status) ||
488 !auth_length || msg->BufferLength != 0)
489 status = RPC_S_PROTOCOL_ERROR;
490 else
491 {
492 status = RPCRT4_ServerConnectionAuth(conn, FALSE,
493 (RpcAuthVerifier *)auth_data,
494 auth_length, NULL, NULL);
495 }
496
497 /* FIXME: client doesn't expect a response to this message so must store
498 * status in connection so that fault packet can be returned when next
499 * packet is received */
500
501 return RPC_S_OK;
502 }
503
504 static void RPCRT4_process_packet(RpcConnection* conn, RpcPktHdr* hdr,
505 RPC_MESSAGE* msg, unsigned char *auth_data,
506 ULONG auth_length)
507 {
508 msg->Handle = (RPC_BINDING_HANDLE)conn->server_binding;
509
510 switch (hdr->common.ptype) {
511 case PKT_BIND:
512 TRACE("got bind packet\n");
513 process_bind_packet(conn, &hdr->bind, msg, auth_data, auth_length);
514 break;
515
516 case PKT_REQUEST:
517 TRACE("got request packet\n");
518 process_request_packet(conn, &hdr->request, msg);
519 break;
520
521 case PKT_AUTH3:
522 TRACE("got auth3 packet\n");
523 process_auth3_packet(conn, &hdr->common, msg, auth_data, auth_length);
524 break;
525 default:
526 FIXME("unhandled packet type %u\n", hdr->common.ptype);
527 break;
528 }
529
530 /* clean up */
531 I_RpcFree(msg->Buffer);
532 RPCRT4_FreeHeader(hdr);
533 HeapFree(GetProcessHeap(), 0, msg);
534 HeapFree(GetProcessHeap(), 0, auth_data);
535 }
536
537 static DWORD CALLBACK RPCRT4_worker_thread(LPVOID the_arg)
538 {
539 RpcPacket *pkt = the_arg;
540 RPCRT4_process_packet(pkt->conn, pkt->hdr, pkt->msg, pkt->auth_data,
541 pkt->auth_length);
542 HeapFree(GetProcessHeap(), 0, pkt);
543 return 0;
544 }
545
546 static DWORD CALLBACK RPCRT4_io_thread(LPVOID the_arg)
547 {
548 RpcConnection* conn = the_arg;
549 RpcPktHdr *hdr;
550 RPC_MESSAGE *msg;
551 RPC_STATUS status;
552 RpcPacket *packet;
553 unsigned char *auth_data;
554 ULONG auth_length;
555
556 TRACE("(%p)\n", conn);
557
558 for (;;) {
559 msg = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RPC_MESSAGE));
560 if (!msg) break;
561
562 status = RPCRT4_ReceiveWithAuth(conn, &hdr, msg, &auth_data, &auth_length);
563 if (status != RPC_S_OK) {
564 WARN("receive failed with error %x\n", status);
565 HeapFree(GetProcessHeap(), 0, msg);
566 break;
567 }
568
569 switch (hdr->common.ptype) {
570 case PKT_BIND:
571 TRACE("got bind packet\n");
572
573 status = process_bind_packet(conn, &hdr->bind, msg, auth_data,
574 auth_length);
575 break;
576
577 case PKT_REQUEST:
578 TRACE("got request packet\n");
579
580 packet = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcPacket));
581 if (!packet) {
582 I_RpcFree(msg->Buffer);
583 RPCRT4_FreeHeader(hdr);
584 HeapFree(GetProcessHeap(), 0, msg);
585 HeapFree(GetProcessHeap(), 0, auth_data);
586 goto exit;
587 }
588 packet->conn = conn;
589 packet->hdr = hdr;
590 packet->msg = msg;
591 packet->auth_data = auth_data;
592 packet->auth_length = auth_length;
593 if (!QueueUserWorkItem(RPCRT4_worker_thread, packet, WT_EXECUTELONGFUNCTION)) {
594 ERR("couldn't queue work item for worker thread, error was %d\n", GetLastError());
595 HeapFree(GetProcessHeap(), 0, packet);
596 status = RPC_S_OUT_OF_RESOURCES;
597 } else {
598 continue;
599 }
600 break;
601
602 case PKT_AUTH3:
603 TRACE("got auth3 packet\n");
604
605 status = process_auth3_packet(conn, &hdr->common, msg, auth_data,
606 auth_length);
607 break;
608 default:
609 FIXME("unhandled packet type %u\n", hdr->common.ptype);
610 break;
611 }
612
613 I_RpcFree(msg->Buffer);
614 RPCRT4_FreeHeader(hdr);
615 HeapFree(GetProcessHeap(), 0, msg);
616 HeapFree(GetProcessHeap(), 0, auth_data);
617
618 if (status != RPC_S_OK) {
619 WARN("processing packet failed with error %u\n", status);
620 break;
621 }
622 }
623 exit:
624 RPCRT4_DestroyConnection(conn);
625 return 0;
626 }
627
628 void RPCRT4_new_client(RpcConnection* conn)
629 {
630 HANDLE thread = CreateThread(NULL, 0, RPCRT4_io_thread, conn, 0, NULL);
631 if (!thread) {
632 DWORD err = GetLastError();
633 ERR("failed to create thread, error=%08x\n", err);
634 RPCRT4_DestroyConnection(conn);
635 }
636 /* we could set conn->thread, but then we'd have to make the io_thread wait
637 * for that, otherwise the thread might finish, destroy the connection, and
638 * free the memory we'd write to before we did, causing crashes and stuff -
639 * so let's implement that later, when we really need conn->thread */
640
641 CloseHandle( thread );
642 }
643
644 static DWORD CALLBACK RPCRT4_server_thread(LPVOID the_arg)
645 {
646 int res;
647 unsigned int count;
648 void *objs = NULL;
649 RpcServerProtseq* cps = the_arg;
650 RpcConnection* conn;
651 BOOL set_ready_event = FALSE;
652
653 TRACE("(the_arg == ^%p)\n", the_arg);
654
655 for (;;) {
656 objs = cps->ops->get_wait_array(cps, objs, &count);
657
658 if (set_ready_event)
659 {
660 /* signal to function that changed state that we are now sync'ed */
661 SetEvent(cps->server_ready_event);
662 set_ready_event = FALSE;
663 }
664
665 /* start waiting */
666 res = cps->ops->wait_for_new_connection(cps, count, objs);
667
668 if (res == -1 || (res == 0 && !std_listen))
669 {
670 /* cleanup */
671 cps->ops->free_wait_array(cps, objs);
672 EnterCriticalSection(&cps->cs);
673 for (conn = cps->conn; conn; conn = conn->Next)
674 RPCRT4_CloseConnection(conn);
675 LeaveCriticalSection(&cps->cs);
676
677 if (res == 0 && !std_listen)
678 SetEvent(cps->server_ready_event);
679 break;
680 }
681 else if (res == 0)
682 set_ready_event = TRUE;
683 }
684 return 0;
685 }
686
687 /* tells the server thread that the state has changed and waits for it to
688 * make the changes */
689 static void RPCRT4_sync_with_server_thread(RpcServerProtseq *ps)
690 {
691 /* make sure we are the only thread sync'ing the server state, otherwise
692 * there is a race with the server thread setting an older state and setting
693 * the server_ready_event when the new state hasn't yet been applied */
694 WaitForSingleObject(ps->mgr_mutex, INFINITE);
695
696 ps->ops->signal_state_changed(ps);
697
698 /* wait for server thread to make the requested changes before returning */
699 WaitForSingleObject(ps->server_ready_event, INFINITE);
700
701 ReleaseMutex(ps->mgr_mutex);
702 }
703
704 static RPC_STATUS RPCRT4_start_listen_protseq(RpcServerProtseq *ps, BOOL auto_listen)
705 {
706 RPC_STATUS status = RPC_S_OK;
707 HANDLE server_thread;
708
709 EnterCriticalSection(&listen_cs);
710 if (ps->is_listening) goto done;
711
712 if (!ps->mgr_mutex) ps->mgr_mutex = CreateMutexW(NULL, FALSE, NULL);
713 if (!ps->server_ready_event) ps->server_ready_event = CreateEventW(NULL, FALSE, FALSE, NULL);
714 server_thread = CreateThread(NULL, 0, RPCRT4_server_thread, ps, 0, NULL);
715 if (!server_thread)
716 {
717 status = RPC_S_OUT_OF_RESOURCES;
718 goto done;
719 }
720 ps->is_listening = TRUE;
721 CloseHandle(server_thread);
722
723 done:
724 LeaveCriticalSection(&listen_cs);
725 return status;
726 }
727
728 static RPC_STATUS RPCRT4_start_listen(BOOL auto_listen)
729 {
730 RPC_STATUS status = RPC_S_ALREADY_LISTENING;
731 RpcServerProtseq *cps;
732
733 TRACE("\n");
734
735 EnterCriticalSection(&listen_cs);
736 if (auto_listen || (manual_listen_count++ == 0))
737 {
738 status = RPC_S_OK;
739 if (++listen_count == 1)
740 std_listen = TRUE;
741 }
742 LeaveCriticalSection(&listen_cs);
743
744 if (std_listen)
745 {
746 EnterCriticalSection(&server_cs);
747 LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
748 {
749 status = RPCRT4_start_listen_protseq(cps, TRUE);
750 if (status != RPC_S_OK)
751 break;
752
753 /* make sure server is actually listening on the interface before
754 * returning */
755 RPCRT4_sync_with_server_thread(cps);
756 }
757 LeaveCriticalSection(&server_cs);
758 }
759
760 return status;
761 }
762
763 static void RPCRT4_stop_listen(BOOL auto_listen)
764 {
765 EnterCriticalSection(&listen_cs);
766 if (auto_listen || (--manual_listen_count == 0))
767 {
768 if (listen_count != 0 && --listen_count == 0) {
769 RpcServerProtseq *cps;
770
771 std_listen = FALSE;
772 LeaveCriticalSection(&listen_cs);
773
774 LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
775 RPCRT4_sync_with_server_thread(cps);
776
777 EnterCriticalSection(&listen_cs);
778 if (listen_done_event) SetEvent( listen_done_event );
779 listen_done_event = 0;
780 LeaveCriticalSection(&listen_cs);
781 return;
782 }
783 assert(listen_count >= 0);
784 }
785 LeaveCriticalSection(&listen_cs);
786 }
787
788 static BOOL RPCRT4_protseq_is_endpoint_registered(RpcServerProtseq *protseq, const char *endpoint)
789 {
790 RpcConnection *conn;
791 EnterCriticalSection(&protseq->cs);
792 for (conn = protseq->conn; conn; conn = conn->Next)
793 {
794 if (!endpoint || !strcmp(endpoint, conn->Endpoint))
795 break;
796 }
797 LeaveCriticalSection(&protseq->cs);
798 return (conn != NULL);
799 }
800
801 static RPC_STATUS RPCRT4_use_protseq(RpcServerProtseq* ps, const char *endpoint)
802 {
803 RPC_STATUS status;
804
805 EnterCriticalSection(&ps->cs);
806
807 if (RPCRT4_protseq_is_endpoint_registered(ps, endpoint))
808 status = RPC_S_OK;
809 else
810 status = ps->ops->open_endpoint(ps, endpoint);
811
812 LeaveCriticalSection(&ps->cs);
813
814 if (status != RPC_S_OK)
815 return status;
816
817 if (std_listen)
818 {
819 status = RPCRT4_start_listen_protseq(ps, FALSE);
820 if (status == RPC_S_OK)
821 RPCRT4_sync_with_server_thread(ps);
822 }
823
824 return status;
825 }
826
827 /***********************************************************************
828 * RpcServerInqBindings (RPCRT4.@)
829 */
830 RPC_STATUS WINAPI RpcServerInqBindings( RPC_BINDING_VECTOR** BindingVector )
831 {
832 RPC_STATUS status;
833 DWORD count;
834 RpcServerProtseq* ps;
835 RpcConnection* conn;
836
837 if (BindingVector)
838 TRACE("(*BindingVector == ^%p)\n", *BindingVector);
839 else
840 ERR("(BindingVector == NULL!!?)\n");
841
842 EnterCriticalSection(&server_cs);
843 /* count connections */
844 count = 0;
845 LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) {
846 EnterCriticalSection(&ps->cs);
847 for (conn = ps->conn; conn; conn = conn->Next)
848 count++;
849 LeaveCriticalSection(&ps->cs);
850 }
851 if (count) {
852 /* export bindings */
853 *BindingVector = HeapAlloc(GetProcessHeap(), 0,
854 sizeof(RPC_BINDING_VECTOR) +
855 sizeof(RPC_BINDING_HANDLE)*(count-1));
856 (*BindingVector)->Count = count;
857 count = 0;
858 LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) {
859 EnterCriticalSection(&ps->cs);
860 for (conn = ps->conn; conn; conn = conn->Next) {
861 RPCRT4_MakeBinding((RpcBinding**)&(*BindingVector)->BindingH[count],
862 conn);
863 count++;
864 }
865 LeaveCriticalSection(&ps->cs);
866 }
867 status = RPC_S_OK;
868 } else {
869 *BindingVector = NULL;
870 status = RPC_S_NO_BINDINGS;
871 }
872 LeaveCriticalSection(&server_cs);
873 return status;
874 }
875
876 /***********************************************************************
877 * RpcServerUseProtseqEpA (RPCRT4.@)
878 */
879 RPC_STATUS WINAPI RpcServerUseProtseqEpA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor )
880 {
881 RPC_POLICY policy;
882
883 TRACE( "(%s,%u,%s,%p)\n", Protseq, MaxCalls, Endpoint, SecurityDescriptor );
884
885 /* This should provide the default behaviour */
886 policy.Length = sizeof( policy );
887 policy.EndpointFlags = 0;
888 policy.NICFlags = 0;
889
890 return RpcServerUseProtseqEpExA( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
891 }
892
893 /***********************************************************************
894 * RpcServerUseProtseqEpW (RPCRT4.@)
895 */
896 RPC_STATUS WINAPI RpcServerUseProtseqEpW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor )
897 {
898 RPC_POLICY policy;
899
900 TRACE( "(%s,%u,%s,%p)\n", debugstr_w( Protseq ), MaxCalls, debugstr_w( Endpoint ), SecurityDescriptor );
901
902 /* This should provide the default behaviour */
903 policy.Length = sizeof( policy );
904 policy.EndpointFlags = 0;
905 policy.NICFlags = 0;
906
907 return RpcServerUseProtseqEpExW( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
908 }
909
910 /***********************************************************************
911 * alloc_serverprotoseq (internal)
912 *
913 * Must be called with server_cs held.
914 */
915 static RPC_STATUS alloc_serverprotoseq(UINT MaxCalls, const char *Protseq, RpcServerProtseq **ps)
916 {
917 const struct protseq_ops *ops = rpcrt4_get_protseq_ops(Protseq);
918
919 if (!ops)
920 {
921 FIXME("protseq %s not supported\n", debugstr_a(Protseq));
922 return RPC_S_PROTSEQ_NOT_SUPPORTED;
923 }
924
925 *ps = ops->alloc();
926 if (!*ps)
927 return RPC_S_OUT_OF_RESOURCES;
928 (*ps)->MaxCalls = MaxCalls;
929 (*ps)->Protseq = RPCRT4_strdupA(Protseq);
930 (*ps)->ops = ops;
931 (*ps)->MaxCalls = 0;
932 (*ps)->conn = NULL;
933 InitializeCriticalSection(&(*ps)->cs);
934 (*ps)->is_listening = FALSE;
935 (*ps)->mgr_mutex = NULL;
936 (*ps)->server_ready_event = NULL;
937
938 list_add_head(&protseqs, &(*ps)->entry);
939
940 TRACE("new protseq %p created for %s\n", *ps, Protseq);
941
942 return RPC_S_OK;
943 }
944
945 /* must be called with server_cs held */
946 static void destroy_serverprotoseq(RpcServerProtseq *ps)
947 {
948 RPCRT4_strfree(ps->Protseq);
949 DeleteCriticalSection(&ps->cs);
950 CloseHandle(ps->mgr_mutex);
951 CloseHandle(ps->server_ready_event);
952 list_remove(&ps->entry);
953 HeapFree(GetProcessHeap(), 0, ps);
954 }
955
956 /* Finds a given protseq or creates a new one if one doesn't already exist */
957 static RPC_STATUS RPCRT4_get_or_create_serverprotseq(UINT MaxCalls, const char *Protseq, RpcServerProtseq **ps)
958 {
959 RPC_STATUS status;
960 RpcServerProtseq *cps;
961
962 EnterCriticalSection(&server_cs);
963
964 LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
965 if (!strcmp(cps->Protseq, Protseq))
966 {
967 TRACE("found existing protseq object for %s\n", Protseq);
968 *ps = cps;
969 LeaveCriticalSection(&server_cs);
970 return S_OK;
971 }
972
973 status = alloc_serverprotoseq(MaxCalls, Protseq, ps);
974
975 LeaveCriticalSection(&server_cs);
976
977 return status;
978 }
979
980 /***********************************************************************
981 * RpcServerUseProtseqEpExA (RPCRT4.@)
982 */
983 RPC_STATUS WINAPI RpcServerUseProtseqEpExA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor,
984 PRPC_POLICY lpPolicy )
985 {
986 RpcServerProtseq* ps;
987 RPC_STATUS status;
988
989 TRACE("(%s,%u,%s,%p,{%u,%u,%u})\n", debugstr_a((const char *)Protseq),
990 MaxCalls, debugstr_a((const char *)Endpoint), SecurityDescriptor,
991 lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
992
993 status = RPCRT4_get_or_create_serverprotseq(MaxCalls, (const char *)Protseq, &ps);
994 if (status != RPC_S_OK)
995 return status;
996
997 return RPCRT4_use_protseq(ps, (const char *)Endpoint);
998 }
999
1000 /***********************************************************************
1001 * RpcServerUseProtseqEpExW (RPCRT4.@)
1002 */
1003 RPC_STATUS WINAPI RpcServerUseProtseqEpExW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor,
1004 PRPC_POLICY lpPolicy )
1005 {
1006 RpcServerProtseq* ps;
1007 RPC_STATUS status;
1008 LPSTR ProtseqA;
1009 LPSTR EndpointA;
1010
1011 TRACE("(%s,%u,%s,%p,{%u,%u,%u})\n", debugstr_w( Protseq ), MaxCalls,
1012 debugstr_w( Endpoint ), SecurityDescriptor,
1013 lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
1014
1015 ProtseqA = RPCRT4_strdupWtoA(Protseq);
1016 status = RPCRT4_get_or_create_serverprotseq(MaxCalls, ProtseqA, &ps);
1017 RPCRT4_strfree(ProtseqA);
1018 if (status != RPC_S_OK)
1019 return status;
1020
1021 EndpointA = RPCRT4_strdupWtoA(Endpoint);
1022 status = RPCRT4_use_protseq(ps, EndpointA);
1023 RPCRT4_strfree(EndpointA);
1024 return status;
1025 }
1026
1027 /***********************************************************************
1028 * RpcServerUseProtseqA (RPCRT4.@)
1029 */
1030 RPC_STATUS WINAPI RpcServerUseProtseqA(RPC_CSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
1031 {
1032 RPC_STATUS status;
1033 RpcServerProtseq* ps;
1034
1035 TRACE("(Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_a((char*)Protseq), MaxCalls, SecurityDescriptor);
1036
1037 status = RPCRT4_get_or_create_serverprotseq(MaxCalls, (const char *)Protseq, &ps);
1038 if (status != RPC_S_OK)
1039 return status;
1040
1041 return RPCRT4_use_protseq(ps, NULL);
1042 }
1043
1044 /***********************************************************************
1045 * RpcServerUseProtseqW (RPCRT4.@)
1046 */
1047 RPC_STATUS WINAPI RpcServerUseProtseqW(RPC_WSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
1048 {
1049 RPC_STATUS status;
1050 RpcServerProtseq* ps;
1051 LPSTR ProtseqA;
1052
1053 TRACE("Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_w(Protseq), MaxCalls, SecurityDescriptor);
1054
1055 ProtseqA = RPCRT4_strdupWtoA(Protseq);
1056 status = RPCRT4_get_or_create_serverprotseq(MaxCalls, ProtseqA, &ps);
1057 RPCRT4_strfree(ProtseqA);
1058 if (status != RPC_S_OK)
1059 return status;
1060
1061 return RPCRT4_use_protseq(ps, NULL);
1062 }
1063
1064 void RPCRT4_destroy_all_protseqs(void)
1065 {
1066 RpcServerProtseq *cps, *cursor2;
1067
1068 if (listen_count != 0)
1069 std_listen = FALSE;
1070
1071 EnterCriticalSection(&server_cs);
1072 LIST_FOR_EACH_ENTRY_SAFE(cps, cursor2, &protseqs, RpcServerProtseq, entry)
1073 {
1074 destroy_serverprotoseq(cps);
1075 }
1076 LeaveCriticalSection(&server_cs);
1077 }
1078
1079 /***********************************************************************
1080 * RpcServerRegisterIf (RPCRT4.@)
1081 */
1082 RPC_STATUS WINAPI RpcServerRegisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv )
1083 {
1084 TRACE("(%p,%s,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv);
1085 return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, 0, RPC_C_LISTEN_MAX_CALLS_DEFAULT, (UINT)-1, NULL );
1086 }
1087
1088 /***********************************************************************
1089 * RpcServerRegisterIfEx (RPCRT4.@)
1090 */
1091 RPC_STATUS WINAPI RpcServerRegisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
1092 UINT Flags, UINT MaxCalls, RPC_IF_CALLBACK_FN* IfCallbackFn )
1093 {
1094 TRACE("(%p,%s,%p,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls, IfCallbackFn);
1095 return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, Flags, MaxCalls, (UINT)-1, IfCallbackFn );
1096 }
1097
1098 /***********************************************************************
1099 * RpcServerRegisterIf2 (RPCRT4.@)
1100 */
1101 RPC_STATUS WINAPI RpcServerRegisterIf2( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
1102 UINT Flags, UINT MaxCalls, UINT MaxRpcSize, RPC_IF_CALLBACK_FN* IfCallbackFn )
1103 {
1104 PRPC_SERVER_INTERFACE If = IfSpec;
1105 RpcServerInterface* sif;
1106 unsigned int i;
1107
1108 TRACE("(%p,%s,%p,%u,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls,
1109 MaxRpcSize, IfCallbackFn);
1110 TRACE(" interface id: %s %d.%d\n", debugstr_guid(&If->InterfaceId.SyntaxGUID),
1111 If->InterfaceId.SyntaxVersion.MajorVersion,
1112 If->InterfaceId.SyntaxVersion.MinorVersion);
1113 TRACE(" transfer syntax: %s %d.%d\n", debugstr_guid(&If->TransferSyntax.SyntaxGUID),
1114 If->TransferSyntax.SyntaxVersion.MajorVersion,
1115 If->TransferSyntax.SyntaxVersion.MinorVersion);
1116 TRACE(" dispatch table: %p\n", If->DispatchTable);
1117 if (If->DispatchTable) {
1118 TRACE(" dispatch table count: %d\n", If->DispatchTable->DispatchTableCount);
1119 for (i=0; i<If->DispatchTable->DispatchTableCount; i++) {
1120 TRACE(" entry %d: %p\n", i, If->DispatchTable->DispatchTable[i]);
1121 }
1122 TRACE(" reserved: %ld\n", If->DispatchTable->Reserved);
1123 }
1124 TRACE(" protseq endpoint count: %d\n", If->RpcProtseqEndpointCount);
1125 TRACE(" default manager epv: %p\n", If->DefaultManagerEpv);
1126 TRACE(" interpreter info: %p\n", If->InterpreterInfo);
1127
1128 sif = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcServerInterface));
1129 sif->If = If;
1130 if (MgrTypeUuid) {
1131 sif->MgrTypeUuid = *MgrTypeUuid;
1132 sif->MgrEpv = MgrEpv;
1133 } else {
1134 memset(&sif->MgrTypeUuid, 0, sizeof(UUID));
1135 sif->MgrEpv = If->DefaultManagerEpv;
1136 }
1137 sif->Flags = Flags;
1138 sif->MaxCalls = MaxCalls;
1139 sif->MaxRpcSize = MaxRpcSize;
1140 sif->IfCallbackFn = IfCallbackFn;
1141
1142 EnterCriticalSection(&server_cs);
1143 list_add_head(&server_interfaces, &sif->entry);
1144 LeaveCriticalSection(&server_cs);
1145
1146 if (sif->Flags & RPC_IF_AUTOLISTEN)
1147 RPCRT4_start_listen(TRUE);
1148
1149 return RPC_S_OK;
1150 }
1151
1152 /***********************************************************************
1153 * RpcServerUnregisterIf (RPCRT4.@)
1154 */
1155 RPC_STATUS WINAPI RpcServerUnregisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, UINT WaitForCallsToComplete )
1156 {
1157 PRPC_SERVER_INTERFACE If = IfSpec;
1158 HANDLE event = NULL;
1159 BOOL found = FALSE;
1160 BOOL completed = TRUE;
1161 RpcServerInterface *cif;
1162 RPC_STATUS status;
1163
1164 TRACE("(IfSpec == (RPC_IF_HANDLE)^%p (%s), MgrTypeUuid == %s, WaitForCallsToComplete == %u)\n",
1165 IfSpec, debugstr_guid(&If->InterfaceId.SyntaxGUID), debugstr_guid(MgrTypeUuid), WaitForCallsToComplete);
1166
1167 EnterCriticalSection(&server_cs);
1168 LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) {
1169 if ((!IfSpec || !memcmp(&If->InterfaceId, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER))) &&
1170 UuidEqual(MgrTypeUuid, &cif->MgrTypeUuid, &status)) {
1171 list_remove(&cif->entry);
1172 TRACE("unregistering cif %p\n", cif);
1173 if (cif->CurrentCalls) {
1174 completed = FALSE;
1175 cif->Delete = TRUE;
1176 if (WaitForCallsToComplete)
1177 cif->CallsCompletedEvent = event = CreateEventW(NULL, FALSE, FALSE, NULL);
1178 }
1179 found = TRUE;
1180 break;
1181 }
1182 }
1183 LeaveCriticalSection(&server_cs);
1184
1185 if (!found) {
1186 ERR("not found for object %s\n", debugstr_guid(MgrTypeUuid));
1187 return RPC_S_UNKNOWN_IF;
1188 }
1189
1190 if (completed)
1191 HeapFree(GetProcessHeap(), 0, cif);
1192 else if (event) {
1193 /* sif will be freed when the last call is completed, so be careful not to
1194 * touch that memory here as that could happen before we get here */
1195 WaitForSingleObject(event, INFINITE);
1196 CloseHandle(event);
1197 }
1198
1199 return RPC_S_OK;
1200 }
1201
1202 /***********************************************************************
1203 * RpcServerUnregisterIfEx (RPCRT4.@)
1204 */
1205 RPC_STATUS WINAPI RpcServerUnregisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, int RundownContextHandles )
1206 {
1207 FIXME("(IfSpec == (RPC_IF_HANDLE)^%p, MgrTypeUuid == %s, RundownContextHandles == %d): stub\n",
1208 IfSpec, debugstr_guid(MgrTypeUuid), RundownContextHandles);
1209
1210 return RPC_S_OK;
1211 }
1212
1213 /***********************************************************************
1214 * RpcObjectSetType (RPCRT4.@)
1215 *
1216 * PARAMS
1217 * ObjUuid [I] "Object" UUID
1218 * TypeUuid [I] "Type" UUID
1219 *
1220 * RETURNS
1221 * RPC_S_OK The call succeeded
1222 * RPC_S_INVALID_OBJECT The provided object (nil) is not valid
1223 * RPC_S_ALREADY_REGISTERED The provided object is already registered
1224 *
1225 * Maps "Object" UUIDs to "Type" UUIDs. Passing the nil UUID as the type
1226 * resets the mapping for the specified object UUID to nil (the default).
1227 * The nil object is always associated with the nil type and cannot be
1228 * reassigned. Servers can support multiple implementations on the same
1229 * interface by registering different end-point vectors for the different
1230 * types. There's no need to call this if a server only supports the nil
1231 * type, as is typical.
1232 */
1233 RPC_STATUS WINAPI RpcObjectSetType( UUID* ObjUuid, UUID* TypeUuid )
1234 {
1235 RpcObjTypeMap *map = RpcObjTypeMaps, *prev = NULL;
1236 RPC_STATUS dummy;
1237
1238 TRACE("(ObjUUID == %s, TypeUuid == %s).\n", debugstr_guid(ObjUuid), debugstr_guid(TypeUuid));
1239 if ((! ObjUuid) || UuidIsNil(ObjUuid, &dummy)) {
1240 /* nil uuid cannot be remapped */
1241 return RPC_S_INVALID_OBJECT;
1242 }
1243
1244 /* find the mapping for this object if there is one ... */
1245 while (map) {
1246 if (! UuidCompare(ObjUuid, &map->Object, &dummy)) break;
1247 prev = map;
1248 map = map->next;
1249 }
1250 if ((! TypeUuid) || UuidIsNil(TypeUuid, &dummy)) {
1251 /* ... and drop it from the list */
1252 if (map) {
1253 if (prev)
1254 prev->next = map->next;
1255 else
1256 RpcObjTypeMaps = map->next;
1257 HeapFree(GetProcessHeap(), 0, map);
1258 }
1259 } else {
1260 /* ... , fail if we found it ... */
1261 if (map)
1262 return RPC_S_ALREADY_REGISTERED;
1263 /* ... otherwise create a new one and add it in. */
1264 map = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcObjTypeMap));
1265 map->Object = *ObjUuid;
1266 map->Type = *TypeUuid;
1267 map->next = NULL;
1268 if (prev)
1269 prev->next = map; /* prev is the last map in the linklist */
1270 else
1271 RpcObjTypeMaps = map;
1272 }
1273
1274 return RPC_S_OK;
1275 }
1276
1277 struct rpc_server_registered_auth_info
1278 {
1279 struct list entry;
1280 TimeStamp exp;
1281 CredHandle cred;
1282 ULONG max_token;
1283 USHORT auth_type;
1284 };
1285
1286 RPC_STATUS RPCRT4_ServerGetRegisteredAuthInfo(
1287 USHORT auth_type, CredHandle *cred, TimeStamp *exp, ULONG *max_token)
1288 {
1289 RPC_STATUS status = RPC_S_UNKNOWN_AUTHN_SERVICE;
1290 struct rpc_server_registered_auth_info *auth_info;
1291
1292 EnterCriticalSection(&server_auth_info_cs);
1293 LIST_FOR_EACH_ENTRY(auth_info, &server_registered_auth_info, struct rpc_server_registered_auth_info, entry)
1294 {
1295 if (auth_info->auth_type == auth_type)
1296 {
1297 *cred = auth_info->cred;
1298 *exp = auth_info->exp;
1299 *max_token = auth_info->max_token;
1300 status = RPC_S_OK;
1301 break;
1302 }
1303 }
1304 LeaveCriticalSection(&server_auth_info_cs);
1305
1306 return status;
1307 }
1308
1309 void RPCRT4_ServerFreeAllRegisteredAuthInfo(void)
1310 {
1311 struct rpc_server_registered_auth_info *auth_info, *cursor2;
1312
1313 EnterCriticalSection(&server_auth_info_cs);
1314 LIST_FOR_EACH_ENTRY_SAFE(auth_info, cursor2, &server_registered_auth_info, struct rpc_server_registered_auth_info, entry)
1315 {
1316 FreeCredentialsHandle(&auth_info->cred);
1317 HeapFree(GetProcessHeap(), 0, auth_info);
1318 }
1319 LeaveCriticalSection(&server_auth_info_cs);
1320 }
1321
1322 /***********************************************************************
1323 * RpcServerRegisterAuthInfoA (RPCRT4.@)
1324 */
1325 RPC_STATUS WINAPI RpcServerRegisterAuthInfoA( RPC_CSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
1326 LPVOID Arg )
1327 {
1328 SECURITY_STATUS sec_status;
1329 CredHandle cred;
1330 TimeStamp exp;
1331 ULONG package_count;
1332 ULONG i;
1333 PSecPkgInfoA packages;
1334 ULONG max_token;
1335 struct rpc_server_registered_auth_info *auth_info;
1336
1337 TRACE("(%s,%u,%p,%p)\n", ServerPrincName, AuthnSvc, GetKeyFn, Arg);
1338
1339 sec_status = EnumerateSecurityPackagesA(&package_count, &packages);
1340 if (sec_status != SEC_E_OK)
1341 {
1342 ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n",
1343 sec_status);
1344 return RPC_S_SEC_PKG_ERROR;
1345 }
1346
1347 for (i = 0; i < package_count; i++)
1348 if (packages[i].wRPCID == AuthnSvc)
1349 break;
1350
1351 if (i == package_count)
1352 {
1353 WARN("unsupported AuthnSvc %u\n", AuthnSvc);
1354 FreeContextBuffer(packages);
1355 return RPC_S_UNKNOWN_AUTHN_SERVICE;
1356 }
1357 TRACE("found package %s for service %u\n", packages[i].Name,
1358 AuthnSvc);
1359 sec_status = AcquireCredentialsHandleA((SEC_CHAR *)ServerPrincName,
1360 packages[i].Name,
1361 SECPKG_CRED_INBOUND, NULL, NULL,
1362 NULL, NULL, &cred, &exp);
1363 max_token = packages[i].cbMaxToken;
1364 FreeContextBuffer(packages);
1365 if (sec_status != SEC_E_OK)
1366 return RPC_S_SEC_PKG_ERROR;
1367
1368 auth_info = HeapAlloc(GetProcessHeap(), 0, sizeof(*auth_info));
1369 if (!auth_info)
1370 {
1371 FreeCredentialsHandle(&cred);
1372 return RPC_S_OUT_OF_RESOURCES;
1373 }
1374
1375 auth_info->exp = exp;
1376 auth_info->cred = cred;
1377 auth_info->max_token = max_token;
1378 auth_info->auth_type = AuthnSvc;
1379
1380 EnterCriticalSection(&server_auth_info_cs);
1381 list_add_tail(&server_registered_auth_info, &auth_info->entry);
1382 LeaveCriticalSection(&server_auth_info_cs);
1383
1384 return RPC_S_OK;
1385 }
1386
1387 /***********************************************************************
1388 * RpcServerRegisterAuthInfoW (RPCRT4.@)
1389 */
1390 RPC_STATUS WINAPI RpcServerRegisterAuthInfoW( RPC_WSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
1391 LPVOID Arg )
1392 {
1393 SECURITY_STATUS sec_status;
1394 CredHandle cred;
1395 TimeStamp exp;
1396 ULONG package_count;
1397 ULONG i;
1398 PSecPkgInfoW packages;
1399 ULONG max_token;
1400 struct rpc_server_registered_auth_info *auth_info;
1401
1402 TRACE("(%s,%u,%p,%p)\n", debugstr_w(ServerPrincName), AuthnSvc, GetKeyFn, Arg);
1403
1404 sec_status = EnumerateSecurityPackagesW(&package_count, &packages);
1405 if (sec_status != SEC_E_OK)
1406 {
1407 ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n",
1408 sec_status);
1409 return RPC_S_SEC_PKG_ERROR;
1410 }
1411
1412 for (i = 0; i < package_count; i++)
1413 if (packages[i].wRPCID == AuthnSvc)
1414 break;
1415
1416 if (i == package_count)
1417 {
1418 WARN("unsupported AuthnSvc %u\n", AuthnSvc);
1419 FreeContextBuffer(packages);
1420 return RPC_S_UNKNOWN_AUTHN_SERVICE;
1421 }
1422 TRACE("found package %s for service %u\n", debugstr_w(packages[i].Name),
1423 AuthnSvc);
1424 sec_status = AcquireCredentialsHandleW((SEC_WCHAR *)ServerPrincName,
1425 packages[i].Name,
1426 SECPKG_CRED_INBOUND, NULL, NULL,
1427 NULL, NULL, &cred, &exp);
1428 max_token = packages[i].cbMaxToken;
1429 FreeContextBuffer(packages);
1430 if (sec_status != SEC_E_OK)
1431 return RPC_S_SEC_PKG_ERROR;
1432
1433 auth_info = HeapAlloc(GetProcessHeap(), 0, sizeof(*auth_info));
1434 if (!auth_info)
1435 {
1436 FreeCredentialsHandle(&cred);
1437 return RPC_S_OUT_OF_RESOURCES;
1438 }
1439
1440 auth_info->exp = exp;
1441 auth_info->cred = cred;
1442 auth_info->max_token = max_token;
1443 auth_info->auth_type = AuthnSvc;
1444
1445 EnterCriticalSection(&server_auth_info_cs);
1446 list_add_tail(&server_registered_auth_info, &auth_info->entry);
1447 LeaveCriticalSection(&server_auth_info_cs);
1448
1449 return RPC_S_OK;
1450 }
1451
1452 /***********************************************************************
1453 * RpcServerListen (RPCRT4.@)
1454 */
1455 RPC_STATUS WINAPI RpcServerListen( UINT MinimumCallThreads, UINT MaxCalls, UINT DontWait )
1456 {
1457 RPC_STATUS status = RPC_S_OK;
1458
1459 TRACE("(%u,%u,%u)\n", MinimumCallThreads, MaxCalls, DontWait);
1460
1461 if (list_empty(&protseqs))
1462 return RPC_S_NO_PROTSEQS_REGISTERED;
1463
1464 status = RPCRT4_start_listen(FALSE);
1465
1466 if (DontWait || (status != RPC_S_OK)) return status;
1467
1468 return RpcMgmtWaitServerListen();
1469 }
1470
1471 /***********************************************************************
1472 * RpcMgmtServerWaitListen (RPCRT4.@)
1473 */
1474 RPC_STATUS WINAPI RpcMgmtWaitServerListen( void )
1475 {
1476 HANDLE event;
1477
1478 TRACE("()\n");
1479
1480 EnterCriticalSection(&listen_cs);
1481
1482 if (!std_listen) {
1483 LeaveCriticalSection(&listen_cs);
1484 return RPC_S_NOT_LISTENING;
1485 }
1486 if (listen_done_event) {
1487 LeaveCriticalSection(&listen_cs);
1488 return RPC_S_ALREADY_LISTENING;
1489 }
1490 event = CreateEventW( NULL, TRUE, FALSE, NULL );
1491 listen_done_event = event;
1492
1493 LeaveCriticalSection(&listen_cs);
1494
1495 TRACE( "waiting for server calls to finish\n" );
1496 WaitForSingleObject( event, INFINITE );
1497 TRACE( "done waiting\n" );
1498
1499 CloseHandle( event );
1500 return RPC_S_OK;
1501 }
1502
1503 /***********************************************************************
1504 * RpcMgmtStopServerListening (RPCRT4.@)
1505 */
1506 RPC_STATUS WINAPI RpcMgmtStopServerListening ( RPC_BINDING_HANDLE Binding )
1507 {
1508 TRACE("(Binding == (RPC_BINDING_HANDLE)^%p)\n", Binding);
1509
1510 if (Binding) {
1511 FIXME("client-side invocation not implemented.\n");
1512 return RPC_S_WRONG_KIND_OF_BINDING;
1513 }
1514
1515 RPCRT4_stop_listen(FALSE);
1516
1517 return RPC_S_OK;
1518 }
1519
1520 /***********************************************************************
1521 * RpcMgmtEnableIdleCleanup (RPCRT4.@)
1522 */
1523 RPC_STATUS WINAPI RpcMgmtEnableIdleCleanup(void)
1524 {
1525 FIXME("(): stub\n");
1526 return RPC_S_OK;
1527 }
1528
1529 /***********************************************************************
1530 * I_RpcServerStartListening (RPCRT4.@)
1531 */
1532 RPC_STATUS WINAPI I_RpcServerStartListening( HWND hWnd )
1533 {
1534 FIXME( "(%p): stub\n", hWnd );
1535
1536 return RPC_S_OK;
1537 }
1538
1539 /***********************************************************************
1540 * I_RpcServerStopListening (RPCRT4.@)
1541 */
1542 RPC_STATUS WINAPI I_RpcServerStopListening( void )
1543 {
1544 FIXME( "(): stub\n" );
1545
1546 return RPC_S_OK;
1547 }
1548
1549 /***********************************************************************
1550 * I_RpcWindowProc (RPCRT4.@)
1551 */
1552 UINT WINAPI I_RpcWindowProc( void *hWnd, UINT Message, UINT wParam, ULONG lParam )
1553 {
1554 FIXME( "(%p,%08x,%08x,%08x): stub\n", hWnd, Message, wParam, lParam );
1555
1556 return 0;
1557 }
1558
1559 /***********************************************************************
1560 * RpcMgmtInqIfIds (RPCRT4.@)
1561 */
1562 RPC_STATUS WINAPI RpcMgmtInqIfIds(RPC_BINDING_HANDLE Binding, RPC_IF_ID_VECTOR **IfIdVector)
1563 {
1564 FIXME("(%p,%p): stub\n", Binding, IfIdVector);
1565 return RPC_S_INVALID_BINDING;
1566 }
1567
1568 /***********************************************************************
1569 * RpcMgmtInqStats (RPCRT4.@)
1570 */
1571 RPC_STATUS WINAPI RpcMgmtInqStats(RPC_BINDING_HANDLE Binding, RPC_STATS_VECTOR **Statistics)
1572 {
1573 RPC_STATS_VECTOR *stats;
1574
1575 FIXME("(%p,%p)\n", Binding, Statistics);
1576
1577 if ((stats = HeapAlloc(GetProcessHeap(), 0, sizeof(RPC_STATS_VECTOR))))
1578 {
1579 stats->Count = 1;
1580 stats->Stats[0] = 0;
1581 *Statistics = stats;
1582 return RPC_S_OK;
1583 }
1584 return RPC_S_OUT_OF_RESOURCES;
1585 }
1586
1587 /***********************************************************************
1588 * RpcMgmtStatsVectorFree (RPCRT4.@)
1589 */
1590 RPC_STATUS WINAPI RpcMgmtStatsVectorFree(RPC_STATS_VECTOR **StatsVector)
1591 {
1592 FIXME("(%p)\n", StatsVector);
1593
1594 if (StatsVector)
1595 {
1596 HeapFree(GetProcessHeap(), 0, *StatsVector);
1597 *StatsVector = NULL;
1598 }
1599 return RPC_S_OK;
1600 }
1601
1602 /***********************************************************************
1603 * RpcMgmtEpEltInqBegin (RPCRT4.@)
1604 */
1605 RPC_STATUS WINAPI RpcMgmtEpEltInqBegin(RPC_BINDING_HANDLE Binding, ULONG InquiryType,
1606 RPC_IF_ID *IfId, ULONG VersOption, UUID *ObjectUuid, RPC_EP_INQ_HANDLE* InquiryContext)
1607 {
1608 FIXME("(%p,%u,%p,%u,%p,%p): stub\n",
1609 Binding, InquiryType, IfId, VersOption, ObjectUuid, InquiryContext);
1610 return RPC_S_INVALID_BINDING;
1611 }
1612
1613 /***********************************************************************
1614 * RpcMgmtIsServerListening (RPCRT4.@)
1615 */
1616 RPC_STATUS WINAPI RpcMgmtIsServerListening(RPC_BINDING_HANDLE Binding)
1617 {
1618 FIXME("(%p): stub\n", Binding);
1619 return RPC_S_INVALID_BINDING;
1620 }
1621
1622 /***********************************************************************
1623 * RpcMgmtSetAuthorizationFn (RPCRT4.@)
1624 */
1625 RPC_STATUS WINAPI RpcMgmtSetAuthorizationFn(RPC_MGMT_AUTHORIZATION_FN fn)
1626 {
1627 FIXME("(%p): stub\n", fn);
1628 return RPC_S_OK;
1629 }
1630
1631 /***********************************************************************
1632 * RpcMgmtSetServerStackSize (RPCRT4.@)
1633 */
1634 RPC_STATUS WINAPI RpcMgmtSetServerStackSize(ULONG ThreadStackSize)
1635 {
1636 FIXME("(0x%x): stub\n", ThreadStackSize);
1637 return RPC_S_OK;
1638 }
1639
1640 /***********************************************************************
1641 * I_RpcGetCurrentCallHandle (RPCRT4.@)
1642 */
1643 RPC_BINDING_HANDLE WINAPI I_RpcGetCurrentCallHandle(void)
1644 {
1645 TRACE("\n");
1646 return RPCRT4_GetThreadCurrentCallHandle();
1647 }