*
*/
-#include "config.h"
-
-#include <stdarg.h>
-#include <stdio.h>
-#include <string.h>
-#include <assert.h>
-#include <stdlib.h>
-#include <sys/types.h>
+#include "precomp.h"
#if defined(__MINGW32__) || defined (_MSC_VER)
# include <ws2tcpip.h>
# define ioctlsocket ioctl
#endif /* defined(__MINGW32__) || defined (_MSC_VER) */
-#include "windef.h"
-#include "winbase.h"
-#include "winnls.h"
-#include "winerror.h"
-#include "wininet.h"
-#include "winternl.h"
-#include "wine/unicode.h"
-
-#include "rpc.h"
-#include "rpcndr.h"
-
-#include "wine/debug.h"
+#include <wininet.h>
-#include "rpc_binding.h"
-#include "rpc_assoc.h"
-#include "rpc_message.h"
-#include "rpc_server.h"
#include "epm_towers.h"
#ifndef SOL_TCP
#define DEFAULT_NCACN_HTTP_TIMEOUT (60 * 1000)
+#define ARRAYSIZE(a) (sizeof((a)) / sizeof((a)[0]))
+
WINE_DEFAULT_DEBUG_CHANNEL(rpc);
static RPC_STATUS RPCRT4_SpawnConnection(RpcConnection** Connection, RpcConnection* OldConnection);
static RpcConnection *rpcrt4_conn_np_alloc(void)
{
- RpcConnection_np *npc = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcConnection_np));
+ RpcConnection_np *npc = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcConnection_np));
if (npc)
{
npc->pipe = NULL;
}
}
+#ifndef __REACTOS__
+static RPC_STATUS rpcrt4_conn_listen_pipe(RpcConnection_np *npc)
+{
+ if (npc->listening)
+ return RPC_S_OK;
+
+ npc->listening = TRUE;
+ npc->listen_thread = CreateThread(NULL, 0, listen_thread, npc, 0, NULL);
+ if (!npc->listen_thread)
+ {
+ npc->listening = FALSE;
+ ERR("Couldn't create listen thread (error was %d)\n", GetLastError());
+ return RPC_S_OUT_OF_RESOURCES;
+ }
+ return RPC_S_OK;
+}
+#endif
+
static RPC_STATUS rpcrt4_conn_create_pipe(RpcConnection *Connection, LPCSTR pname)
{
RpcConnection_np *npc = (RpcConnection_np *) Connection;
}
r = RPCRT4_CreateConnection(&Connection, TRUE, protseq->Protseq, NULL,
- endpoint, NULL, NULL, NULL);
+ endpoint, NULL, NULL, NULL, NULL);
if (r != RPC_S_OK)
return r;
}
r = RPCRT4_CreateConnection(&Connection, TRUE, protseq->Protseq, NULL,
- endpoint, NULL, NULL, NULL);
+ endpoint, NULL, NULL, NULL, NULL);
if (r != RPC_S_OK)
return r;
BOOL ret = TRUE;
unsigned int bytes_left = count;
OVERLAPPED ovl;
-
+
ZeroMemory(&ovl, sizeof(ovl));
ovl.hEvent = CreateEventW(NULL, TRUE, FALSE, NULL);
{
DWORD bytes_read;
ret = ReadFile(npc->pipe, buf, bytes_left, &bytes_read, &ovl);
- if ((!ret || !bytes_read) && (GetLastError() != ERROR_IO_PENDING))
- break;
- ret = GetOverlappedResult(npc->pipe, &ovl, &bytes_read, TRUE);
- if (!ret && (GetLastError() != ERROR_MORE_DATA))
+ if (!ret && GetLastError() == ERROR_IO_PENDING)
+ ret = GetOverlappedResult(npc->pipe, &ovl, &bytes_read, TRUE);
+ if (!ret && GetLastError() == ERROR_MORE_DATA)
+ ret = TRUE;
+ if (!ret || !bytes_read)
break;
bytes_left -= bytes_read;
buf += bytes_read;
BOOL ret = TRUE;
unsigned int bytes_left = count;
OVERLAPPED ovl;
-
+
ZeroMemory(&ovl, sizeof(ovl));
ovl.hEvent = CreateEventW(NULL, TRUE, FALSE, NULL);
{
DWORD bytes_written;
ret = WriteFile(npc->pipe, buf, bytes_left, &bytes_written, &ovl);
- if ((!ret || !bytes_written) && (GetLastError() != ERROR_IO_PENDING))
- break;
-
- ret = GetOverlappedResult(npc->pipe, &ovl, &bytes_written, TRUE);
- if (!ret && (GetLastError() != ERROR_MORE_DATA))
+ if (!ret && GetLastError() == ERROR_IO_PENDING)
+ ret = GetOverlappedResult(npc->pipe, &ovl, &bytes_written, TRUE);
+ if (!ret || !bytes_written)
break;
bytes_left -= bytes_written;
buf += bytes_written;
if (getsockname(sock, (struct sockaddr *)&sa, &sa_len))
{
WARN("getsockname() failed: %s\n", strerror(errno));
+ closesocket(sock);
status = RPC_S_CANT_CREATE_ENDPOINT;
continue;
}
if (ret)
{
WARN("getnameinfo failed: %s\n", gai_strerror(ret));
+ closesocket(sock);
status = RPC_S_CANT_CREATE_ENDPOINT;
continue;
}
create_status = RPCRT4_CreateConnection((RpcConnection **)&tcpc, TRUE,
protseq->Protseq, NULL,
- service, NULL, NULL, NULL);
+ service, NULL, NULL, NULL, NULL);
if (create_status != RPC_S_OK)
{
closesocket(sock);
if (ret < 0)
{
WARN("listen failed: %s\n", strerror(errno));
- RPCRT4_DestroyConnection(&tcpc->common);
+ RPCRT4_ReleaseConnection(&tcpc->common);
status = RPC_S_OUT_OF_RESOURCES;
continue;
}
if (ret < 0)
{
WARN("couldn't make socket non-blocking, error %d\n", ret);
- RPCRT4_DestroyConnection(&tcpc->common);
+ RPCRT4_ReleaseConnection(&tcpc->common);
status = RPC_S_OUT_OF_RESOURCES;
continue;
}
{
LONG refs;
HANDLE completion_event;
+ WORD async_result;
INTERNET_BUFFERSA inet_buffers;
- void *destination_buffer; /* the address that inet_buffers.lpvBuffer will be
- * copied into when the call completes */
CRITICAL_SECTION cs;
} RpcHttpAsyncData;
TRACE("destroying async data %p\n", data);
CloseHandle(data->completion_event);
HeapFree(GetProcessHeap(), 0, data->inet_buffers.lpvBuffer);
+ data->cs.DebugInfo->Spare[0] = 0;
DeleteCriticalSection(&data->cs);
HeapFree(GetProcessHeap(), 0, data);
}
return refs;
}
+static void prepare_async_request(RpcHttpAsyncData *async_data)
+{
+ ResetEvent(async_data->completion_event);
+ RpcHttpAsyncData_AddRef(async_data);
+}
+
+static RPC_STATUS wait_async_request(RpcHttpAsyncData *async_data, BOOL call_ret, HANDLE cancel_event)
+{
+ HANDLE handles[2] = { async_data->completion_event, cancel_event };
+ DWORD res;
+
+ if(call_ret) {
+ RpcHttpAsyncData_Release(async_data);
+ return RPC_S_OK;
+ }
+
+ if(GetLastError() != ERROR_IO_PENDING) {
+ RpcHttpAsyncData_Release(async_data);
+ ERR("Request failed with error %d\n", GetLastError());
+ return RPC_S_SERVER_UNAVAILABLE;
+ }
+
+ res = WaitForMultipleObjects(2, handles, FALSE, DEFAULT_NCACN_HTTP_TIMEOUT);
+ if(res != WAIT_OBJECT_0) {
+ TRACE("Cancelled\n");
+ return RPC_S_CALL_CANCELLED;
+ }
+
+ if(async_data->async_result) {
+ ERR("Async request failed with error %d\n", async_data->async_result);
+ return RPC_S_SERVER_UNAVAILABLE;
+ }
+
+ return RPC_S_OK;
+}
+
+struct authinfo
+{
+ DWORD scheme;
+ CredHandle cred;
+ CtxtHandle ctx;
+ TimeStamp exp;
+ ULONG attr;
+ ULONG max_token;
+ char *data;
+ unsigned int data_len;
+ BOOL finished; /* finished authenticating */
+};
+
typedef struct _RpcConnection_http
{
RpcConnection common;
HINTERNET session;
HINTERNET in_request;
HINTERNET out_request;
+ WCHAR *servername;
HANDLE timer_cancelled;
HANDLE cancel_event;
DWORD last_sent_time;
httpc->async_data->refs = 1;
httpc->async_data->inet_buffers.dwStructSize = sizeof(INTERNET_BUFFERSA);
httpc->async_data->inet_buffers.lpvBuffer = NULL;
- httpc->async_data->destination_buffer = NULL;
InitializeCriticalSection(&httpc->async_data->cs);
+ httpc->async_data->cs.DebugInfo->Spare[0] = (DWORD_PTR)(__FILE__ ": RpcHttpAsyncData.cs");
return &httpc->common;
}
timeout = rpcrt4_http_timer_calc_timeout(data.last_sent_time))
{
/* are we too soon after last send? */
- if (GetTickCount() - HTTP_IDLE_TIME < *data.last_sent_time)
+ if (GetTickCount() - *data.last_sent_time < HTTP_IDLE_TIME)
continue;
rpcrt4_http_keep_connection_active_timer_proc(data.timer_param, TRUE);
}
TRACE("INTERNET_STATUS_REQUEST_COMPLETED\n");
if (async_data)
{
- if (async_data->inet_buffers.lpvBuffer)
- {
- EnterCriticalSection(&async_data->cs);
- if (async_data->destination_buffer)
- {
- memcpy(async_data->destination_buffer,
- async_data->inet_buffers.lpvBuffer,
- async_data->inet_buffers.dwBufferLength);
- async_data->destination_buffer = NULL;
- }
- LeaveCriticalSection(&async_data->cs);
- }
- HeapFree(GetProcessHeap(), 0, async_data->inet_buffers.lpvBuffer);
- async_data->inet_buffers.lpvBuffer = NULL;
+ INTERNET_ASYNC_RESULT *async_result = lpvStatusInformation;
+
+ async_data->async_result = async_result->dwResult ? ERROR_SUCCESS : async_result->dwError;
SetEvent(async_data->completion_event);
RpcHttpAsyncData_Release(async_data);
}
ret = HttpQueryInfoW(hor, HTTP_QUERY_STATUS_CODE|HTTP_QUERY_FLAG_NUMBER, &status_code, &size, &index);
if (!ret)
return GetLastError();
- if (status_code < 400)
+ if (status_code == HTTP_STATUS_OK)
return RPC_S_OK;
index = 0;
size = sizeof(buf);
LPWSTR password = NULL;
LPWSTR servername = NULL;
const WCHAR *option;
- INTERNET_PORT port = INTERNET_INVALID_PORT_NUMBER; /* use default port */
+ INTERNET_PORT port;
if (httpc->common.QOS &&
(httpc->common.QOS->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP))
{
HeapFree(GetProcessHeap(), 0, password);
HeapFree(GetProcessHeap(), 0, user);
+ HeapFree(GetProcessHeap(), 0, proxy);
+ HeapFree(GetProcessHeap(), 0, servername);
ERR("InternetOpenW failed with error %d\n", GetLastError());
return RPC_S_SERVER_UNAVAILABLE;
}
{
HeapFree(GetProcessHeap(), 0, password);
HeapFree(GetProcessHeap(), 0, user);
+ HeapFree(GetProcessHeap(), 0, proxy);
return RPC_S_OUT_OF_RESOURCES;
}
MultiByteToWideChar(CP_ACP, 0, httpc->common.NetworkAddr, -1, servername, strlen(httpc->common.NetworkAddr) + 1);
}
+ port = (httpc->common.QOS &&
+ (httpc->common.QOS->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) &&
+ (httpc->common.QOS->qos->u.HttpCredentials->Flags & RPC_C_HTTP_FLAG_USE_SSL)) ?
+ INTERNET_DEFAULT_HTTPS_PORT : INTERNET_DEFAULT_HTTP_PORT;
+
httpc->session = InternetConnectW(httpc->app_info, servername, port, user, password,
INTERNET_SERVICE_HTTP, 0, 0);
HeapFree(GetProcessHeap(), 0, password);
HeapFree(GetProcessHeap(), 0, user);
- HeapFree(GetProcessHeap(), 0, servername);
+ HeapFree(GetProcessHeap(), 0, proxy);
if (!httpc->session)
{
ERR("InternetConnectW failed with error %d\n", GetLastError());
+ HeapFree(GetProcessHeap(), 0, servername);
return RPC_S_SERVER_UNAVAILABLE;
}
+ httpc->servername = servername;
+ return RPC_S_OK;
+}
+
+static RPC_STATUS send_echo_request(HINTERNET req, RpcHttpAsyncData *async_data, HANDLE cancel_event)
+{
+ DWORD bytes_read;
+ BYTE buf[20];
+ BOOL ret;
+ RPC_STATUS status;
+
+ TRACE("sending echo request to server\n");
+
+ prepare_async_request(async_data);
+ ret = HttpSendRequestW(req, NULL, 0, NULL, 0);
+ status = wait_async_request(async_data, ret, cancel_event);
+ if (status != RPC_S_OK) return status;
+
+ status = rpcrt4_http_check_response(req);
+ if (status != RPC_S_OK) return status;
+
+ InternetReadFile(req, buf, sizeof(buf), &bytes_read);
+ /* FIXME: do something with retrieved data */
return RPC_S_OK;
}
/* prepare the in pipe for use by RPC packets */
-static RPC_STATUS rpcrt4_http_prepare_in_pipe(HINTERNET in_request, RpcHttpAsyncData *async_data,
- const UUID *connection_uuid,
- const UUID *in_pipe_uuid,
- const UUID *association_uuid)
+static RPC_STATUS rpcrt4_http_prepare_in_pipe(HINTERNET in_request, RpcHttpAsyncData *async_data, HANDLE cancel_event,
+ const UUID *connection_uuid, const UUID *in_pipe_uuid,
+ const UUID *association_uuid, BOOL authorized)
{
- BYTE packet[44];
BOOL ret;
RPC_STATUS status;
RpcPktHdr *hdr;
INTERNET_BUFFERSW buffers_in;
- DWORD bytes_read, bytes_written;
+ DWORD bytes_written;
- /* prepare in pipe */
- ResetEvent(async_data->completion_event);
- RpcHttpAsyncData_AddRef(async_data);
- ret = HttpSendRequestW(in_request, NULL, 0, NULL, 0);
- if (!ret)
+ if (!authorized)
{
- if (GetLastError() == ERROR_IO_PENDING)
- WaitForSingleObject(async_data->completion_event, INFINITE);
- else
- {
- RpcHttpAsyncData_Release(async_data);
- ERR("HttpSendRequestW failed with error %d\n", GetLastError());
- return RPC_S_SERVER_UNAVAILABLE;
- }
+ /* ask wininet to authorize, if necessary */
+ status = send_echo_request(in_request, async_data, cancel_event);
+ if (status != RPC_S_OK) return status;
}
- status = rpcrt4_http_check_response(in_request);
- if (status != RPC_S_OK) return status;
-
- InternetReadFile(in_request, packet, 20, &bytes_read);
- /* FIXME: do something with retrieved data */
-
memset(&buffers_in, 0, sizeof(buffers_in));
buffers_in.dwStructSize = sizeof(buffers_in);
/* FIXME: get this from the registry */
buffers_in.dwBufferTotal = 1024 * 1024 * 1024; /* 1Gb */
- ResetEvent(async_data->completion_event);
- RpcHttpAsyncData_AddRef(async_data);
+ prepare_async_request(async_data);
ret = HttpSendRequestExW(in_request, &buffers_in, NULL, 0, 0);
- if (!ret)
- {
- if (GetLastError() == ERROR_IO_PENDING)
- WaitForSingleObject(async_data->completion_event, INFINITE);
- else
- {
- RpcHttpAsyncData_Release(async_data);
- ERR("HttpSendRequestExW failed with error %d\n", GetLastError());
- return RPC_S_SERVER_UNAVAILABLE;
- }
- }
+ status = wait_async_request(async_data, ret, cancel_event);
+ if (status != RPC_S_OK) return status;
TRACE("sending HTTP connect header to server\n");
- hdr = RPCRT4_BuildHttpConnectHeader(0, FALSE, connection_uuid, in_pipe_uuid, association_uuid);
+ hdr = RPCRT4_BuildHttpConnectHeader(FALSE, connection_uuid, in_pipe_uuid, association_uuid);
if (!hdr) return RPC_S_OUT_OF_RESOURCES;
ret = InternetWriteFile(in_request, hdr, hdr->common.frag_len, &bytes_written);
RPCRT4_FreeHeader(hdr);
}
/* prepare the out pipe for use by RPC packets */
-static RPC_STATUS rpcrt4_http_prepare_out_pipe(HINTERNET out_request,
- RpcHttpAsyncData *async_data,
- const UUID *connection_uuid,
- const UUID *out_pipe_uuid,
- ULONG *flow_control_increment)
+static RPC_STATUS rpcrt4_http_prepare_out_pipe(HINTERNET out_request, RpcHttpAsyncData *async_data,
+ HANDLE cancel_event, const UUID *connection_uuid,
+ const UUID *out_pipe_uuid, ULONG *flow_control_increment,
+ BOOL authorized)
{
- BYTE packet[20];
BOOL ret;
RPC_STATUS status;
RpcPktHdr *hdr;
- DWORD bytes_read;
BYTE *data_from_server;
RpcPktHdr pkt_from_server;
ULONG field1, field3;
+ DWORD bytes_read;
+ BYTE buf[20];
- ResetEvent(async_data->completion_event);
- RpcHttpAsyncData_AddRef(async_data);
- ret = HttpSendRequestW(out_request, NULL, 0, NULL, 0);
- if (!ret)
+ if (!authorized)
{
- if (GetLastError() == ERROR_IO_PENDING)
- WaitForSingleObject(async_data->completion_event, INFINITE);
- else
- {
- RpcHttpAsyncData_Release(async_data);
- ERR("HttpSendRequestW failed with error %d\n", GetLastError());
- return RPC_S_SERVER_UNAVAILABLE;
- }
+ /* ask wininet to authorize, if necessary */
+ status = send_echo_request(out_request, async_data, cancel_event);
+ if (status != RPC_S_OK) return status;
}
- status = rpcrt4_http_check_response(out_request);
- if (status != RPC_S_OK) return status;
-
- InternetReadFile(out_request, packet, 20, &bytes_read);
- /* FIXME: do something with retrieved data */
+ else
+ InternetReadFile(out_request, buf, sizeof(buf), &bytes_read);
- hdr = RPCRT4_BuildHttpConnectHeader(0, TRUE, connection_uuid, out_pipe_uuid, NULL);
+ hdr = RPCRT4_BuildHttpConnectHeader(TRUE, connection_uuid, out_pipe_uuid, NULL);
if (!hdr) return RPC_S_OUT_OF_RESOURCES;
- ResetEvent(async_data->completion_event);
- RpcHttpAsyncData_AddRef(async_data);
+
+ TRACE("sending HTTP connect header to server\n");
+ prepare_async_request(async_data);
ret = HttpSendRequestW(out_request, NULL, 0, hdr, hdr->common.frag_len);
- if (!ret)
- {
- if (GetLastError() == ERROR_IO_PENDING)
- WaitForSingleObject(async_data->completion_event, INFINITE);
- else
- {
- RpcHttpAsyncData_Release(async_data);
- ERR("HttpSendRequestW failed with error %d\n", GetLastError());
- RPCRT4_FreeHeader(hdr);
- return RPC_S_SERVER_UNAVAILABLE;
- }
- }
+ status = wait_async_request(async_data, ret, cancel_event);
RPCRT4_FreeHeader(hdr);
+ if (status != RPC_S_OK) return status;
+
status = rpcrt4_http_check_response(out_request);
if (status != RPC_S_OK) return status;
if (status != RPC_S_OK) return status;
TRACE("received (%d) from first prepare header\n", field1);
- status = rpcrt4_http_read_http_packet(out_request, &pkt_from_server,
- &data_from_server);
- if (status != RPC_S_OK) return status;
+ for (;;)
+ {
+ status = rpcrt4_http_read_http_packet(out_request, &pkt_from_server,
+ &data_from_server);
+ if (status != RPC_S_OK) return status;
+ if (pkt_from_server.http.flags != 0x0001) break;
+
+ TRACE("http idle packet, waiting for real packet\n");
+ HeapFree(GetProcessHeap(), 0, data_from_server);
+ if (pkt_from_server.http.num_data_items != 0)
+ {
+ ERR("HTTP idle packet should have no data items instead of %d\n",
+ pkt_from_server.http.num_data_items);
+ return RPC_S_PROTOCOL_ERROR;
+ }
+ }
status = RPCRT4_ParseHttpPrepareHeader2(&pkt_from_server, data_from_server,
&field1, flow_control_increment,
&field3);
return RPC_S_OK;
}
+static UINT encode_base64(const char *bin, unsigned int len, WCHAR *base64)
+{
+ static const char enc[] = "ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789+/";
+ UINT i = 0, x;
+
+ while (len > 0)
+ {
+ /* first 6 bits, all from bin[0] */
+ base64[i++] = enc[(bin[0] & 0xfc) >> 2];
+ x = (bin[0] & 3) << 4;
+
+ /* next 6 bits, 2 from bin[0] and 4 from bin[1] */
+ if (len == 1)
+ {
+ base64[i++] = enc[x];
+ base64[i++] = '=';
+ base64[i++] = '=';
+ break;
+ }
+ base64[i++] = enc[x | ((bin[1] & 0xf0) >> 4)];
+ x = (bin[1] & 0x0f) << 2;
+
+ /* next 6 bits 4 from bin[1] and 2 from bin[2] */
+ if (len == 2)
+ {
+ base64[i++] = enc[x];
+ base64[i++] = '=';
+ break;
+ }
+ base64[i++] = enc[x | ((bin[2] & 0xc0) >> 6)];
+
+ /* last 6 bits, all from bin [2] */
+ base64[i++] = enc[bin[2] & 0x3f];
+ bin += 3;
+ len -= 3;
+ }
+ base64[i] = 0;
+ return i;
+}
+
+static inline char decode_char( WCHAR c )
+{
+ if (c >= 'A' && c <= 'Z') return c - 'A';
+ if (c >= 'a' && c <= 'z') return c - 'a' + 26;
+ if (c >= '0' && c <= '9') return c - '0' + 52;
+ if (c == '+') return 62;
+ if (c == '/') return 63;
+ return 64;
+}
+
+static unsigned int decode_base64( const WCHAR *base64, unsigned int len, char *buf )
+{
+ unsigned int i = 0;
+ char c0, c1, c2, c3;
+ const WCHAR *p = base64;
+
+ while (len > 4)
+ {
+ if ((c0 = decode_char( p[0] )) > 63) return 0;
+ if ((c1 = decode_char( p[1] )) > 63) return 0;
+ if ((c2 = decode_char( p[2] )) > 63) return 0;
+ if ((c3 = decode_char( p[3] )) > 63) return 0;
+
+ if (buf)
+ {
+ buf[i + 0] = (c0 << 2) | (c1 >> 4);
+ buf[i + 1] = (c1 << 4) | (c2 >> 2);
+ buf[i + 2] = (c2 << 6) | c3;
+ }
+ len -= 4;
+ i += 3;
+ p += 4;
+ }
+ if (p[2] == '=')
+ {
+ if ((c0 = decode_char( p[0] )) > 63) return 0;
+ if ((c1 = decode_char( p[1] )) > 63) return 0;
+
+ if (buf) buf[i] = (c0 << 2) | (c1 >> 4);
+ i++;
+ }
+ else if (p[3] == '=')
+ {
+ if ((c0 = decode_char( p[0] )) > 63) return 0;
+ if ((c1 = decode_char( p[1] )) > 63) return 0;
+ if ((c2 = decode_char( p[2] )) > 63) return 0;
+
+ if (buf)
+ {
+ buf[i + 0] = (c0 << 2) | (c1 >> 4);
+ buf[i + 1] = (c1 << 4) | (c2 >> 2);
+ }
+ i += 2;
+ }
+ else
+ {
+ if ((c0 = decode_char( p[0] )) > 63) return 0;
+ if ((c1 = decode_char( p[1] )) > 63) return 0;
+ if ((c2 = decode_char( p[2] )) > 63) return 0;
+ if ((c3 = decode_char( p[3] )) > 63) return 0;
+
+ if (buf)
+ {
+ buf[i + 0] = (c0 << 2) | (c1 >> 4);
+ buf[i + 1] = (c1 << 4) | (c2 >> 2);
+ buf[i + 2] = (c2 << 6) | c3;
+ }
+ i += 3;
+ }
+ return i;
+}
+
+static struct authinfo *alloc_authinfo(void)
+{
+ struct authinfo *ret;
+
+ if (!(ret = HeapAlloc(GetProcessHeap(), 0, sizeof(*ret) ))) return NULL;
+
+ SecInvalidateHandle(&ret->cred);
+ SecInvalidateHandle(&ret->ctx);
+ memset(&ret->exp, 0, sizeof(ret->exp));
+ ret->scheme = 0;
+ ret->attr = 0;
+ ret->max_token = 0;
+ ret->data = NULL;
+ ret->data_len = 0;
+ ret->finished = FALSE;
+ return ret;
+}
+
+static void destroy_authinfo(struct authinfo *info)
+{
+ if (!info) return;
+
+ if (SecIsValidHandle(&info->ctx))
+ DeleteSecurityContext(&info->ctx);
+ if (SecIsValidHandle(&info->cred))
+ FreeCredentialsHandle(&info->cred);
+
+ HeapFree(GetProcessHeap(), 0, info->data);
+ HeapFree(GetProcessHeap(), 0, info);
+}
+
+static const WCHAR basicW[] = {'B','a','s','i','c',0};
+static const WCHAR ntlmW[] = {'N','T','L','M',0};
+static const WCHAR passportW[] = {'P','a','s','s','p','o','r','t',0};
+static const WCHAR digestW[] = {'D','i','g','e','s','t',0};
+static const WCHAR negotiateW[] = {'N','e','g','o','t','i','a','t','e',0};
+
+static const struct
+{
+ const WCHAR *str;
+ unsigned int len;
+ DWORD scheme;
+}
+auth_schemes[] =
+{
+ { basicW, ARRAYSIZE(basicW) - 1, RPC_C_HTTP_AUTHN_SCHEME_BASIC },
+ { ntlmW, ARRAYSIZE(ntlmW) - 1, RPC_C_HTTP_AUTHN_SCHEME_NTLM },
+ { passportW, ARRAYSIZE(passportW) - 1, RPC_C_HTTP_AUTHN_SCHEME_PASSPORT },
+ { digestW, ARRAYSIZE(digestW) - 1, RPC_C_HTTP_AUTHN_SCHEME_DIGEST },
+ { negotiateW, ARRAYSIZE(negotiateW) - 1, RPC_C_HTTP_AUTHN_SCHEME_NEGOTIATE }
+};
+static const unsigned int num_auth_schemes = sizeof(auth_schemes)/sizeof(auth_schemes[0]);
+
+static DWORD auth_scheme_from_header( const WCHAR *header )
+{
+ unsigned int i;
+ for (i = 0; i < num_auth_schemes; i++)
+ {
+ if (!strncmpiW( header, auth_schemes[i].str, auth_schemes[i].len ) &&
+ (header[auth_schemes[i].len] == ' ' || !header[auth_schemes[i].len])) return auth_schemes[i].scheme;
+ }
+ return 0;
+}
+
+static BOOL get_authvalue(HINTERNET request, DWORD scheme, WCHAR *buffer, DWORD buflen)
+{
+ DWORD len, index = 0;
+ for (;;)
+ {
+ len = buflen;
+ if (!HttpQueryInfoW(request, HTTP_QUERY_WWW_AUTHENTICATE, buffer, &len, &index)) return FALSE;
+ if (auth_scheme_from_header(buffer) == scheme) break;
+ }
+ return TRUE;
+}
+
+static RPC_STATUS do_authorization(HINTERNET request, SEC_WCHAR *servername,
+ const RPC_HTTP_TRANSPORT_CREDENTIALS_W *creds, struct authinfo **auth_ptr)
+{
+ struct authinfo *info = *auth_ptr;
+ SEC_WINNT_AUTH_IDENTITY_W *id = creds->TransportCredentials;
+ RPC_STATUS status = RPC_S_SERVER_UNAVAILABLE;
+
+ if ((!info && !(info = alloc_authinfo()))) return RPC_S_SERVER_UNAVAILABLE;
+
+ switch (creds->AuthnSchemes[0])
+ {
+ case RPC_C_HTTP_AUTHN_SCHEME_BASIC:
+ {
+ int userlen = WideCharToMultiByte(CP_UTF8, 0, id->User, id->UserLength, NULL, 0, NULL, NULL);
+ int passlen = WideCharToMultiByte(CP_UTF8, 0, id->Password, id->PasswordLength, NULL, 0, NULL, NULL);
+
+ info->data_len = userlen + passlen + 1;
+ if (!(info->data = HeapAlloc(GetProcessHeap(), 0, info->data_len)))
+ {
+ status = RPC_S_OUT_OF_MEMORY;
+ break;
+ }
+ WideCharToMultiByte(CP_UTF8, 0, id->User, id->UserLength, info->data, userlen, NULL, NULL);
+ info->data[userlen] = ':';
+ WideCharToMultiByte(CP_UTF8, 0, id->Password, id->PasswordLength, info->data + userlen + 1, passlen, NULL, NULL);
+
+ info->scheme = RPC_C_HTTP_AUTHN_SCHEME_BASIC;
+ info->finished = TRUE;
+ status = RPC_S_OK;
+ break;
+ }
+ case RPC_C_HTTP_AUTHN_SCHEME_NTLM:
+ case RPC_C_HTTP_AUTHN_SCHEME_NEGOTIATE:
+ {
+
+ static SEC_WCHAR ntlmW[] = {'N','T','L','M',0}, negotiateW[] = {'N','e','g','o','t','i','a','t','e',0};
+ SECURITY_STATUS ret;
+ SecBufferDesc out_desc, in_desc;
+ SecBuffer out, in;
+ ULONG flags = ISC_REQ_CONNECTION|ISC_REQ_USE_DCE_STYLE|ISC_REQ_MUTUAL_AUTH|ISC_REQ_DELEGATE;
+ SEC_WCHAR *scheme;
+ int scheme_len;
+ const WCHAR *p;
+ WCHAR auth_value[2048];
+ DWORD size = sizeof(auth_value);
+ BOOL first = FALSE;
+
+ if (creds->AuthnSchemes[0] == RPC_C_HTTP_AUTHN_SCHEME_NTLM) scheme = ntlmW;
+ else scheme = negotiateW;
+ scheme_len = strlenW( scheme );
+
+ if (!*auth_ptr)
+ {
+ TimeStamp exp;
+ SecPkgInfoW *pkg_info;
+
+ ret = AcquireCredentialsHandleW(NULL, scheme, SECPKG_CRED_OUTBOUND, NULL, id, NULL, NULL, &info->cred, &exp);
+ if (ret != SEC_E_OK) break;
+
+ ret = QuerySecurityPackageInfoW(scheme, &pkg_info);
+ if (ret != SEC_E_OK) break;
+
+ info->max_token = pkg_info->cbMaxToken;
+ FreeContextBuffer(pkg_info);
+ first = TRUE;
+ }
+ else
+ {
+ if (info->finished || !get_authvalue(request, creds->AuthnSchemes[0], auth_value, size)) break;
+ if (auth_scheme_from_header(auth_value) != info->scheme)
+ {
+ ERR("authentication scheme changed\n");
+ break;
+ }
+ }
+ in.BufferType = SECBUFFER_TOKEN;
+ in.cbBuffer = 0;
+ in.pvBuffer = NULL;
+
+ in_desc.ulVersion = 0;
+ in_desc.cBuffers = 1;
+ in_desc.pBuffers = ∈
+
+ p = auth_value + scheme_len;
+ if (!first && *p == ' ')
+ {
+ int len = strlenW(++p);
+ in.cbBuffer = decode_base64(p, len, NULL);
+ if (!(in.pvBuffer = HeapAlloc(GetProcessHeap(), 0, in.cbBuffer))) break;
+ decode_base64(p, len, in.pvBuffer);
+ }
+ out.BufferType = SECBUFFER_TOKEN;
+ out.cbBuffer = info->max_token;
+ if (!(out.pvBuffer = HeapAlloc(GetProcessHeap(), 0, out.cbBuffer)))
+ {
+ HeapFree(GetProcessHeap(), 0, in.pvBuffer);
+ break;
+ }
+ out_desc.ulVersion = 0;
+ out_desc.cBuffers = 1;
+ out_desc.pBuffers = &out;
+
+ ret = InitializeSecurityContextW(first ? &info->cred : NULL, first ? NULL : &info->ctx,
+ first ? servername : NULL, flags, 0, SECURITY_NETWORK_DREP,
+ in.pvBuffer ? &in_desc : NULL, 0, &info->ctx, &out_desc,
+ &info->attr, &info->exp);
+ HeapFree(GetProcessHeap(), 0, in.pvBuffer);
+ if (ret == SEC_E_OK)
+ {
+ HeapFree(GetProcessHeap(), 0, info->data);
+ info->data = out.pvBuffer;
+ info->data_len = out.cbBuffer;
+ info->finished = TRUE;
+ TRACE("sending last auth packet\n");
+ status = RPC_S_OK;
+ }
+ else if (ret == SEC_I_CONTINUE_NEEDED)
+ {
+ HeapFree(GetProcessHeap(), 0, info->data);
+ info->data = out.pvBuffer;
+ info->data_len = out.cbBuffer;
+ TRACE("sending next auth packet\n");
+ status = RPC_S_OK;
+ }
+ else
+ {
+ ERR("InitializeSecurityContextW failed with error 0x%08x\n", ret);
+ HeapFree(GetProcessHeap(), 0, out.pvBuffer);
+ break;
+ }
+ info->scheme = creds->AuthnSchemes[0];
+ break;
+ }
+ default:
+ FIXME("scheme %u not supported\n", creds->AuthnSchemes[0]);
+ break;
+ }
+
+ if (status != RPC_S_OK)
+ {
+ destroy_authinfo(info);
+ *auth_ptr = NULL;
+ return status;
+ }
+ *auth_ptr = info;
+ return RPC_S_OK;
+}
+
+static RPC_STATUS insert_authorization_header(HINTERNET request, ULONG scheme, char *data, int data_len)
+{
+ static const WCHAR authW[] = {'A','u','t','h','o','r','i','z','a','t','i','o','n',':',' '};
+ static const WCHAR basicW[] = {'B','a','s','i','c',' '};
+ static const WCHAR negotiateW[] = {'N','e','g','o','t','i','a','t','e',' '};
+ static const WCHAR ntlmW[] = {'N','T','L','M',' '};
+ int scheme_len, auth_len = sizeof(authW) / sizeof(authW[0]), len = ((data_len + 2) * 4) / 3;
+ const WCHAR *scheme_str;
+ WCHAR *header, *ptr;
+ RPC_STATUS status = RPC_S_SERVER_UNAVAILABLE;
+
+ switch (scheme)
+ {
+ case RPC_C_HTTP_AUTHN_SCHEME_BASIC:
+ scheme_str = basicW;
+ scheme_len = sizeof(basicW) / sizeof(basicW[0]);
+ break;
+ case RPC_C_HTTP_AUTHN_SCHEME_NEGOTIATE:
+ scheme_str = negotiateW;
+ scheme_len = sizeof(negotiateW) / sizeof(negotiateW[0]);
+ break;
+ case RPC_C_HTTP_AUTHN_SCHEME_NTLM:
+ scheme_str = ntlmW;
+ scheme_len = sizeof(ntlmW) / sizeof(ntlmW[0]);
+ break;
+ default:
+ ERR("unknown scheme %u\n", scheme);
+ return RPC_S_SERVER_UNAVAILABLE;
+ }
+ if ((header = HeapAlloc(GetProcessHeap(), 0, (auth_len + scheme_len + len + 2) * sizeof(WCHAR))))
+ {
+ memcpy(header, authW, auth_len * sizeof(WCHAR));
+ ptr = header + auth_len;
+ memcpy(ptr, scheme_str, scheme_len * sizeof(WCHAR));
+ ptr += scheme_len;
+ len = encode_base64(data, data_len, ptr);
+ ptr[len++] = '\r';
+ ptr[len++] = '\n';
+ ptr[len] = 0;
+ if (HttpAddRequestHeadersW(request, header, -1, HTTP_ADDREQ_FLAG_ADD|HTTP_ADDREQ_FLAG_REPLACE))
+ status = RPC_S_OK;
+ HeapFree(GetProcessHeap(), 0, header);
+ }
+ return status;
+}
+
+static void drain_content(HINTERNET request)
+{
+ DWORD count, len = 0, size = sizeof(len);
+ char buf[2048];
+
+ HttpQueryInfoW(request, HTTP_QUERY_FLAG_NUMBER|HTTP_QUERY_CONTENT_LENGTH, &len, &size, NULL);
+ if (!len) return;
+ for (;;)
+ {
+ count = min(sizeof(buf), len);
+ if (!InternetReadFile(request, buf, count, &count) || !count) return;
+ len -= count;
+ }
+}
+
+static RPC_STATUS authorize_request(RpcConnection_http *httpc, HINTERNET request)
+{
+ static const WCHAR authW[] = {'A','u','t','h','o','r','i','z','a','t','i','o','n',':','\r','\n',0};
+ struct authinfo *info = NULL;
+ RPC_STATUS status;
+ BOOL ret;
+
+ for (;;)
+ {
+ status = do_authorization(request, httpc->servername, httpc->common.QOS->qos->u.HttpCredentials, &info);
+ if (status != RPC_S_OK) break;
+
+ status = insert_authorization_header(request, info->scheme, info->data, info->data_len);
+ if (status != RPC_S_OK) break;
+
+ prepare_async_request(httpc->async_data);
+ ret = HttpSendRequestW(request, NULL, 0, NULL, 0);
+ status = wait_async_request(httpc->async_data, ret, httpc->cancel_event);
+ if (status != RPC_S_OK || info->finished) break;
+
+ status = rpcrt4_http_check_response(request);
+ if (status != RPC_S_OK && status != ERROR_ACCESS_DENIED) break;
+ drain_content(request);
+ }
+
+ if (info->scheme != RPC_C_HTTP_AUTHN_SCHEME_BASIC)
+ HttpAddRequestHeadersW(request, authW, -1, HTTP_ADDREQ_FLAG_REPLACE);
+
+ destroy_authinfo(info);
+ return status;
+}
+
+static RPC_STATUS insert_cookie_header(HINTERNET request, const WCHAR *value)
+{
+ static const WCHAR cookieW[] = {'C','o','o','k','i','e',':',' '};
+ WCHAR *header, *ptr;
+ int len;
+ RPC_STATUS status = RPC_S_SERVER_UNAVAILABLE;
+
+ if (!value) return RPC_S_OK;
+
+ len = strlenW(value);
+ if ((header = HeapAlloc(GetProcessHeap(), 0, sizeof(cookieW) + (len + 3) * sizeof(WCHAR))))
+ {
+ memcpy(header, cookieW, sizeof(cookieW));
+ ptr = header + sizeof(cookieW) / sizeof(cookieW[0]);
+ memcpy(ptr, value, len * sizeof(WCHAR));
+ ptr[len++] = '\r';
+ ptr[len++] = '\n';
+ ptr[len] = 0;
+ if ((HttpAddRequestHeadersW(request, header, -1, HTTP_ADDREQ_FLAG_ADD_IF_NEW))) status = RPC_S_OK;
+ HeapFree(GetProcessHeap(), 0, header);
+ }
+ return status;
+}
+
+static BOOL has_credentials(RpcConnection_http *httpc)
+{
+ RPC_HTTP_TRANSPORT_CREDENTIALS_W *creds;
+ SEC_WINNT_AUTH_IDENTITY_W *id;
+
+ if (!httpc->common.QOS || httpc->common.QOS->qos->AdditionalSecurityInfoType != RPC_C_AUTHN_INFO_TYPE_HTTP)
+ return FALSE;
+
+ creds = httpc->common.QOS->qos->u.HttpCredentials;
+ if (creds->AuthenticationTarget != RPC_C_HTTP_AUTHN_TARGET_SERVER || !creds->NumberOfAuthnSchemes)
+ return FALSE;
+
+ id = creds->TransportCredentials;
+ if (!id || !id->User || !id->Password) return FALSE;
+
+ return TRUE;
+}
+
+static BOOL is_secure(RpcConnection_http *httpc)
+{
+ return httpc->common.QOS &&
+ (httpc->common.QOS->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) &&
+ (httpc->common.QOS->qos->u.HttpCredentials->Flags & RPC_C_HTTP_FLAG_USE_SSL);
+}
+
static RPC_STATUS rpcrt4_ncacn_http_open(RpcConnection* Connection)
{
RpcConnection_http *httpc = (RpcConnection_http *)Connection;
static const WCHAR wszColon[] = {':',0};
static const WCHAR wszAcceptType[] = {'a','p','p','l','i','c','a','t','i','o','n','/','r','p','c',0};
LPCWSTR wszAcceptTypes[] = { wszAcceptType, NULL };
+ DWORD flags;
WCHAR *url;
RPC_STATUS status;
- BOOL secure;
+ BOOL secure, credentials;
HttpTimerThreadData *timer_data;
HANDLE thread;
strcatW(url, wszColon);
MultiByteToWideChar(CP_ACP, 0, Connection->Endpoint, -1, url+strlenW(url), strlen(Connection->Endpoint)+1);
- secure = httpc->common.QOS &&
- (httpc->common.QOS->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) &&
- (httpc->common.QOS->qos->u.HttpCredentials->Flags & RPC_C_HTTP_FLAG_USE_SSL);
+ secure = is_secure(httpc);
+ credentials = has_credentials(httpc);
+
+ flags = INTERNET_FLAG_KEEP_CONNECTION | INTERNET_FLAG_PRAGMA_NOCACHE | INTERNET_FLAG_NO_CACHE_WRITE |
+ INTERNET_FLAG_NO_AUTO_REDIRECT;
+ if (secure) flags |= INTERNET_FLAG_SECURE;
+ if (credentials) flags |= INTERNET_FLAG_NO_AUTH;
- httpc->in_request = HttpOpenRequestW(httpc->session, wszVerbIn, url, NULL, NULL,
- wszAcceptTypes,
- (secure ? INTERNET_FLAG_SECURE : 0)|INTERNET_FLAG_KEEP_CONNECTION|INTERNET_FLAG_PRAGMA_NOCACHE,
- (DWORD_PTR)httpc->async_data);
+ httpc->in_request = HttpOpenRequestW(httpc->session, wszVerbIn, url, NULL, NULL, wszAcceptTypes,
+ flags, (DWORD_PTR)httpc->async_data);
if (!httpc->in_request)
{
ERR("HttpOpenRequestW failed with error %d\n", GetLastError());
+ HeapFree(GetProcessHeap(), 0, url);
return RPC_S_SERVER_UNAVAILABLE;
}
- httpc->out_request = HttpOpenRequestW(httpc->session, wszVerbOut, url, NULL, NULL,
- wszAcceptTypes,
- (secure ? INTERNET_FLAG_SECURE : 0)|INTERNET_FLAG_KEEP_CONNECTION|INTERNET_FLAG_PRAGMA_NOCACHE,
- (DWORD_PTR)httpc->async_data);
+ status = insert_cookie_header(httpc->in_request, Connection->CookieAuth);
+ if (status != RPC_S_OK)
+ {
+ HeapFree(GetProcessHeap(), 0, url);
+ return status;
+ }
+ if (credentials)
+ {
+ status = authorize_request(httpc, httpc->in_request);
+ if (status != RPC_S_OK)
+ {
+ HeapFree(GetProcessHeap(), 0, url);
+ return status;
+ }
+ status = rpcrt4_http_check_response(httpc->in_request);
+ if (status != RPC_S_OK)
+ {
+ HeapFree(GetProcessHeap(), 0, url);
+ return status;
+ }
+ drain_content(httpc->in_request);
+ }
+
+ httpc->out_request = HttpOpenRequestW(httpc->session, wszVerbOut, url, NULL, NULL, wszAcceptTypes,
+ flags, (DWORD_PTR)httpc->async_data);
+ HeapFree(GetProcessHeap(), 0, url);
if (!httpc->out_request)
{
ERR("HttpOpenRequestW failed with error %d\n", GetLastError());
return RPC_S_SERVER_UNAVAILABLE;
}
+ status = insert_cookie_header(httpc->out_request, Connection->CookieAuth);
+ if (status != RPC_S_OK)
+ return status;
- status = rpcrt4_http_prepare_in_pipe(httpc->in_request,
- httpc->async_data,
- &httpc->connection_uuid,
- &httpc->in_pipe_uuid,
- &Connection->assoc->http_uuid);
+ if (credentials)
+ {
+ status = authorize_request(httpc, httpc->out_request);
+ if (status != RPC_S_OK)
+ return status;
+ }
+
+ status = rpcrt4_http_prepare_in_pipe(httpc->in_request, httpc->async_data, httpc->cancel_event,
+ &httpc->connection_uuid, &httpc->in_pipe_uuid,
+ &Connection->assoc->http_uuid, credentials);
if (status != RPC_S_OK)
return status;
- status = rpcrt4_http_prepare_out_pipe(httpc->out_request,
- httpc->async_data,
- &httpc->connection_uuid,
- &httpc->out_pipe_uuid,
- &httpc->flow_control_increment);
+ status = rpcrt4_http_prepare_out_pipe(httpc->out_request, httpc->async_data, httpc->cancel_event,
+ &httpc->connection_uuid, &httpc->out_pipe_uuid,
+ &httpc->flow_control_increment, credentials);
if (status != RPC_S_OK)
return status;
{
RpcConnection_http *httpc = (RpcConnection_http *) Connection;
char *buf = buffer;
- BOOL ret = TRUE;
+ BOOL ret;
unsigned int bytes_left = count;
+ RPC_STATUS status = RPC_S_OK;
+
+ httpc->async_data->inet_buffers.lpvBuffer = HeapAlloc(GetProcessHeap(), 0, count);
- ResetEvent(httpc->async_data->completion_event);
while (bytes_left)
{
- RpcHttpAsyncData_AddRef(httpc->async_data);
httpc->async_data->inet_buffers.dwBufferLength = bytes_left;
- httpc->async_data->inet_buffers.lpvBuffer = HeapAlloc(GetProcessHeap(), 0, bytes_left);
- httpc->async_data->destination_buffer = buf;
+ prepare_async_request(httpc->async_data);
ret = InternetReadFileExA(httpc->out_request, &httpc->async_data->inet_buffers, IRF_ASYNC, 0);
- if (ret)
- {
- /* INTERNET_STATUS_REQUEST_COMPLETED won't be sent, so release our
- * async ref now */
- RpcHttpAsyncData_Release(httpc->async_data);
- memcpy(buf, httpc->async_data->inet_buffers.lpvBuffer,
- httpc->async_data->inet_buffers.dwBufferLength);
- HeapFree(GetProcessHeap(), 0, httpc->async_data->inet_buffers.lpvBuffer);
- httpc->async_data->inet_buffers.lpvBuffer = NULL;
- httpc->async_data->destination_buffer = NULL;
- }
- else
- {
- if (GetLastError() == ERROR_IO_PENDING)
- {
- HANDLE handles[2] = { httpc->async_data->completion_event, httpc->cancel_event };
- DWORD result = WaitForMultipleObjects(2, handles, FALSE, DEFAULT_NCACN_HTTP_TIMEOUT);
- if (result == WAIT_OBJECT_0)
- ret = TRUE;
- else
- {
- TRACE("call cancelled\n");
- EnterCriticalSection(&httpc->async_data->cs);
- httpc->async_data->destination_buffer = NULL;
- LeaveCriticalSection(&httpc->async_data->cs);
- break;
- }
- }
- else
- {
- HeapFree(GetProcessHeap(), 0, httpc->async_data->inet_buffers.lpvBuffer);
- httpc->async_data->inet_buffers.lpvBuffer = NULL;
- httpc->async_data->destination_buffer = NULL;
- RpcHttpAsyncData_Release(httpc->async_data);
- break;
- }
+ status = wait_async_request(httpc->async_data, ret, httpc->cancel_event);
+ if(status != RPC_S_OK) {
+ if(status == RPC_S_CALL_CANCELLED)
+ TRACE("call cancelled\n");
+ break;
}
- if (!httpc->async_data->inet_buffers.dwBufferLength)
+
+ if(!httpc->async_data->inet_buffers.dwBufferLength)
break;
+ memcpy(buf, httpc->async_data->inet_buffers.lpvBuffer,
+ httpc->async_data->inet_buffers.dwBufferLength);
+
bytes_left -= httpc->async_data->inet_buffers.dwBufferLength;
buf += httpc->async_data->inet_buffers.dwBufferLength;
}
- TRACE("%p %p %u -> %s\n", httpc->out_request, buffer, count, ret ? "TRUE" : "FALSE");
- return ret ? count : -1;
+
+ HeapFree(GetProcessHeap(), 0, httpc->async_data->inet_buffers.lpvBuffer);
+ httpc->async_data->inet_buffers.lpvBuffer = NULL;
+
+ TRACE("%p %p %u -> %u\n", httpc->out_request, buffer, count, status);
+ return status == RPC_S_OK ? count : -1;
}
static RPC_STATUS rpcrt4_ncacn_http_receive_fragment(RpcConnection *Connection, RpcPktHdr **Header, void **Payload)
RpcHttpAsyncData_Release(httpc->async_data);
if (httpc->cancel_event)
CloseHandle(httpc->cancel_event);
+ HeapFree(GetProcessHeap(), 0, httpc->servername);
+ httpc->servername = NULL;
return 0;
}
static int rpcrt4_ncacn_http_wait_for_incoming_data(RpcConnection *Connection)
{
- BOOL ret;
RpcConnection_http *httpc = (RpcConnection_http *) Connection;
+ BOOL ret;
+ RPC_STATUS status;
- RpcHttpAsyncData_AddRef(httpc->async_data);
+ prepare_async_request(httpc->async_data);
ret = InternetQueryDataAvailable(httpc->out_request,
&httpc->async_data->inet_buffers.dwBufferLength, IRF_ASYNC, 0);
- if (ret)
- {
- /* INTERNET_STATUS_REQUEST_COMPLETED won't be sent, so release our
- * async ref now */
- RpcHttpAsyncData_Release(httpc->async_data);
- }
- else
- {
- if (GetLastError() == ERROR_IO_PENDING)
- {
- HANDLE handles[2] = { httpc->async_data->completion_event, httpc->cancel_event };
- DWORD result = WaitForMultipleObjects(2, handles, FALSE, DEFAULT_NCACN_HTTP_TIMEOUT);
- if (result != WAIT_OBJECT_0)
- {
- TRACE("call cancelled\n");
- return -1;
- }
- }
- else
- {
- RpcHttpAsyncData_Release(httpc->async_data);
- return -1;
- }
- }
-
- /* success */
- return 0;
+ status = wait_async_request(httpc->async_data, ret, httpc->cancel_event);
+ return status == RPC_S_OK ? 0 : -1;
}
static size_t rpcrt4_ncacn_http_get_top_of_tower(unsigned char *tower_data,
},
};
-#define ARRAYSIZE(a) (sizeof((a)) / sizeof((a)[0]))
-
const struct protseq_ops *rpcrt4_get_protseq_ops(const char *protseq)
{
unsigned int i;
RPC_STATUS RPCRT4_CreateConnection(RpcConnection** Connection, BOOL server,
LPCSTR Protseq, LPCSTR NetworkAddr, LPCSTR Endpoint,
- LPCWSTR NetworkOptions, RpcAuthInfo* AuthInfo, RpcQualityOfService *QOS)
+ LPCWSTR NetworkOptions, RpcAuthInfo* AuthInfo, RpcQualityOfService *QOS, LPCWSTR CookieAuth)
{
static LONG next_id;
const struct connection_ops *ops;
}
NewConnection = ops->alloc();
+ NewConnection->ref = 1;
NewConnection->Next = NULL;
NewConnection->server_binding = NULL;
NewConnection->server = server;
NewConnection->NetworkAddr = RPCRT4_strdupA(NetworkAddr);
NewConnection->Endpoint = RPCRT4_strdupA(Endpoint);
NewConnection->NetworkOptions = RPCRT4_strdupW(NetworkOptions);
+ NewConnection->CookieAuth = RPCRT4_strdupW(CookieAuth);
NewConnection->MaxTransmissionSize = RPC_MAX_PACKET_SIZE;
memset(&NewConnection->ActiveInterface, 0, sizeof(NewConnection->ActiveInterface));
NewConnection->NextCallId = 1;
{
RPC_STATUS err;
- err = RPCRT4_CreateConnection(Connection, OldConnection->server,
- rpcrt4_conn_get_name(OldConnection),
- OldConnection->NetworkAddr,
- OldConnection->Endpoint, NULL,
- OldConnection->AuthInfo, OldConnection->QOS);
+ err = RPCRT4_CreateConnection(Connection, OldConnection->server, rpcrt4_conn_get_name(OldConnection),
+ OldConnection->NetworkAddr, OldConnection->Endpoint, NULL,
+ OldConnection->AuthInfo, OldConnection->QOS, OldConnection->CookieAuth);
if (err == RPC_S_OK)
rpcrt4_conn_handoff(OldConnection, *Connection);
return err;
}
-RPC_STATUS RPCRT4_DestroyConnection(RpcConnection* Connection)
+RpcConnection *RPCRT4_GrabConnection( RpcConnection *conn )
+{
+ InterlockedIncrement( &conn->ref );
+ return conn;
+}
+
+RPC_STATUS RPCRT4_ReleaseConnection(RpcConnection* Connection)
{
- TRACE("connection: %p\n", Connection);
+ if (InterlockedDecrement( &Connection->ref ) > 0) return RPC_S_OK;
+
+ TRACE("destroying connection %p\n", Connection);
RPCRT4_CloseConnection(Connection);
RPCRT4_strfree(Connection->Endpoint);
RPCRT4_strfree(Connection->NetworkAddr);
HeapFree(GetProcessHeap(), 0, Connection->NetworkOptions);
+ HeapFree(GetProcessHeap(), 0, Connection->CookieAuth);
if (Connection->AuthInfo) RpcAuthInfo_Release(Connection->AuthInfo);
if (Connection->QOS) RpcQualityOfService_Release(Connection->QOS);
if (*protseqs)
{
- int i;
+ unsigned int i;
for (i = 0; i < (*protseqs)->Count; i++)
HeapFree(GetProcessHeap(), 0, (*protseqs)->Protseq[i]);
HeapFree(GetProcessHeap(), 0, *protseqs);
if (*protseqs)
{
- int i;
+ unsigned int i;
for (i = 0; i < (*protseqs)->Count; i++)
HeapFree(GetProcessHeap(), 0, (*protseqs)->Protseq[i]);
HeapFree(GetProcessHeap(), 0, *protseqs);
RPC_STATUS WINAPI RpcNetworkInqProtseqsW( RPC_PROTSEQ_VECTORW** protseqs )
{
RPC_PROTSEQ_VECTORW *pvector;
- int i = 0;
+ unsigned int i;
RPC_STATUS status = RPC_S_OUT_OF_MEMORY;
TRACE("(%p)\n", protseqs);
RPC_STATUS WINAPI RpcNetworkInqProtseqsA(RPC_PROTSEQ_VECTORA** protseqs)
{
RPC_PROTSEQ_VECTORA *pvector;
- int i = 0;
+ unsigned int i;
RPC_STATUS status = RPC_S_OUT_OF_MEMORY;
TRACE("(%p)\n", protseqs);