wined3d: Prevent crash in setup_light.
[wine.git] / dlls / secur32 / dispatcher.c
blob66f9c6fb7f343106de8f7e9aba9308b156f45bdc
1 /*
2 * Copyright 2005 Kai Blin
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
18 * A dispatcher to run ntlm_auth for wine's sspi module.
21 #include "config.h"
22 #include <stdarg.h>
23 #ifdef HAVE_UNISTD_H
24 #include <unistd.h>
25 #endif
26 #include <sys/types.h>
27 #ifdef HAVE_SYS_WAIT_H
28 #include <sys/wait.h>
29 #endif
30 #include <stdlib.h>
31 #include <fcntl.h>
32 #include "windef.h"
33 #include "winbase.h"
34 #include "winerror.h"
35 #include "sspi.h"
36 #include "secur32_priv.h"
37 #include "wine/debug.h"
39 #define INITIAL_BUFFER_SIZE 200
41 WINE_DEFAULT_DEBUG_CHANNEL(secur32);
43 SECURITY_STATUS fork_helper(PNegoHelper *new_helper, const char *prog,
44 char* const argv[])
46 int pipe_in[2];
47 int pipe_out[2];
48 int i;
49 PNegoHelper helper;
51 TRACE("%s ", debugstr_a(prog));
52 for(i = 0; argv[i] != NULL; ++i)
54 TRACE("%s ", debugstr_a(argv[i]));
56 TRACE("\n");
58 if( pipe(pipe_in) < 0 )
60 return SEC_E_INTERNAL_ERROR;
62 if( pipe(pipe_out) < 0 )
64 close(pipe_in[0]);
65 close(pipe_in[1]);
66 return SEC_E_INTERNAL_ERROR;
68 if (!(helper = HeapAlloc(GetProcessHeap(),0, sizeof(NegoHelper))))
70 close(pipe_in[0]);
71 close(pipe_in[1]);
72 close(pipe_out[0]);
73 close(pipe_out[1]);
74 return SEC_E_INSUFFICIENT_MEMORY;
77 helper->helper_pid = fork();
79 if(helper->helper_pid == -1)
81 close(pipe_in[0]);
82 close(pipe_in[1]);
83 close(pipe_out[0]);
84 close(pipe_out[1]);
85 HeapFree( GetProcessHeap(), 0, helper );
86 return SEC_E_INTERNAL_ERROR;
89 if(helper->helper_pid == 0)
91 /* We're in the child now */
92 close(0);
93 close(1);
95 dup2(pipe_out[0], 0);
96 close(pipe_out[0]);
97 close(pipe_out[1]);
99 dup2(pipe_in[1], 1);
100 close(pipe_in[0]);
101 close(pipe_in[1]);
103 execvp(prog, argv);
105 /* Whoops, we shouldn't get here. Big badaboom.*/
106 write(STDOUT_FILENO, "BH\n", 3);
107 exit(1);
109 else
111 *new_helper = helper;
112 helper->version = -1;
113 helper->password = NULL;
114 helper->com_buf = NULL;
115 helper->com_buf_size = 0;
116 helper->com_buf_offset = 0;
117 helper->pipe_in = pipe_in[0];
118 close(pipe_in[1]);
119 helper->pipe_out = pipe_out[1];
120 close(pipe_out[0]);
123 return SEC_E_OK;
126 static SECURITY_STATUS read_line(PNegoHelper helper, int *offset_len)
128 char *newline;
129 int read_size;
131 if(helper->com_buf == NULL)
133 TRACE("Creating a new buffer for the helper\n");
134 if((helper->com_buf = HeapAlloc(GetProcessHeap(), 0, INITIAL_BUFFER_SIZE)) == NULL)
135 return SEC_E_INSUFFICIENT_MEMORY;
137 /* Created a new buffer, size is INITIAL_BUFFER_SIZE, offset is 0 */
138 helper->com_buf_size = INITIAL_BUFFER_SIZE;
139 helper->com_buf_offset = 0;
144 TRACE("offset = %d, size = %d\n", helper->com_buf_offset, helper->com_buf_size);
145 if(helper->com_buf_offset + INITIAL_BUFFER_SIZE > helper->com_buf_size)
147 /* increment buffer size in INITIAL_BUFFER_SIZE steps */
148 char *buf = HeapReAlloc(GetProcessHeap(), 0, helper->com_buf,
149 helper->com_buf_size + INITIAL_BUFFER_SIZE);
150 TRACE("Resizing buffer!\n");
151 if (!buf) return SEC_E_INSUFFICIENT_MEMORY;
152 helper->com_buf_size += INITIAL_BUFFER_SIZE;
153 helper->com_buf = buf;
155 if((read_size = read(helper->pipe_in, helper->com_buf + helper->com_buf_offset,
156 helper->com_buf_size - helper->com_buf_offset)) <= 0)
158 return SEC_E_INTERNAL_ERROR;
161 TRACE("read_size = %d, read: %s\n", read_size,
162 debugstr_a(helper->com_buf + helper->com_buf_offset));
163 helper->com_buf_offset += read_size;
164 newline = memchr(helper->com_buf, '\n', helper->com_buf_offset);
165 }while(newline == NULL);
167 /* Now, if there's a newline character, and we read more than that newline,
168 * we have to store the offset so we can preserve the additional data.*/
169 if( newline != helper->com_buf + helper->com_buf_offset)
171 TRACE("offset_len is calculated from %p - %p\n",
172 (helper->com_buf + helper->com_buf_offset), newline+1);
173 /* the length of the offset is the number of chars after the newline */
174 *offset_len = (helper->com_buf + helper->com_buf_offset) - (newline + 1);
176 else
178 *offset_len = 0;
181 *newline = '\0';
183 return SEC_E_OK;
186 static SECURITY_STATUS preserve_unused(PNegoHelper helper, int offset_len)
188 TRACE("offset_len = %d\n", offset_len);
190 if(offset_len > 0)
192 memmove(helper->com_buf, helper->com_buf + helper->com_buf_offset,
193 offset_len);
194 helper->com_buf_offset = offset_len;
196 else
198 helper->com_buf_offset = 0;
201 TRACE("helper->com_buf_offset was set to: %d\n", helper->com_buf_offset);
202 return SEC_E_OK;
205 SECURITY_STATUS run_helper(PNegoHelper helper, char *buffer,
206 unsigned int max_buflen, int *buflen)
208 int offset_len;
209 SECURITY_STATUS sec_status = SEC_E_OK;
211 TRACE("In helper: sending %s\n", debugstr_a(buffer));
213 /* buffer + '\n' */
214 write(helper->pipe_out, buffer, lstrlenA(buffer));
215 write(helper->pipe_out, "\n", 1);
217 if((sec_status = read_line(helper, &offset_len)) != SEC_E_OK)
219 return sec_status;
222 TRACE("In helper: received %s\n", debugstr_a(helper->com_buf));
223 *buflen = lstrlenA(helper->com_buf);
225 if( *buflen > max_buflen)
227 ERR("Buffer size too small(%d given, %d required) dropping data!\n",
228 max_buflen, *buflen);
229 return SEC_E_BUFFER_TOO_SMALL;
232 if( *buflen < 2 )
234 return SEC_E_ILLEGAL_MESSAGE;
237 if( (*buflen <= 3) && (strncmp(helper->com_buf, "BH", 2) == 0))
239 return SEC_E_INTERNAL_ERROR;
242 /* We only get ERR if the input size is too big. On a GENSEC error,
243 * ntlm_auth will return BH */
244 if(strncmp(helper->com_buf, "ERR", 3) == 0)
246 return SEC_E_INVALID_TOKEN;
249 memcpy(buffer, helper->com_buf, *buflen+1);
251 sec_status = preserve_unused(helper, offset_len);
253 return sec_status;
256 void cleanup_helper(PNegoHelper helper)
259 TRACE("Killing helper %p\n", helper);
260 if( (helper == NULL) || (helper->helper_pid == 0))
261 return;
263 HeapFree(GetProcessHeap(), 0, helper->password);
264 HeapFree(GetProcessHeap(), 0, helper->com_buf);
266 /* closing stdin will terminate ntlm_auth */
267 close(helper->pipe_out);
268 close(helper->pipe_in);
270 waitpid(helper->helper_pid, NULL, 0);
272 helper->helper_pid = 0;
273 HeapFree(GetProcessHeap(), 0, helper);
276 void check_version(PNegoHelper helper)
278 char temp[80];
279 char *newline;
281 TRACE("Checking version of helper\n");
282 if(helper != NULL)
284 int len = read(helper->pipe_in, temp, sizeof(temp)-1);
285 if (len > 8)
287 if((newline = memchr(temp, '\n', len)) != NULL)
288 *newline = '\0';
289 else
290 temp[len] = 0;
292 TRACE("Exact version is %s\n", debugstr_a(temp));
293 if(strncmp(temp+8, "3.9", 3) == 0)
295 helper->version = 4;
297 else if(strncmp(temp+8, "3.0", 3) == 0)
299 helper->version = 3;
301 else
303 TRACE("Unknown version!\n");
304 helper->version = -1;