4 * Copyright 2001 Ove Kåven, TransGaming Technologies
5 * Copyright 2003 Mike Hearn
6 * Copyright 2004 Filip Navara
7 * Copyright 2006 CodeWeavers
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
34 #include "wine/unicode.h"
39 #include "wine/debug.h"
41 #include "rpc_binding.h"
42 #include "rpc_assoc.h"
44 WINE_DEFAULT_DEBUG_CHANNEL(rpc
);
46 LPSTR
RPCRT4_strndupA(LPCSTR src
, INT slen
)
50 if (!src
) return NULL
;
51 if (slen
== -1) slen
= strlen(src
);
53 s
= HeapAlloc(GetProcessHeap(), 0, len
+1);
59 LPSTR
RPCRT4_strdupWtoA(LPCWSTR src
)
63 if (!src
) return NULL
;
64 len
= WideCharToMultiByte(CP_ACP
, 0, src
, -1, NULL
, 0, NULL
, NULL
);
65 s
= HeapAlloc(GetProcessHeap(), 0, len
);
66 WideCharToMultiByte(CP_ACP
, 0, src
, -1, s
, len
, NULL
, NULL
);
70 LPWSTR
RPCRT4_strdupAtoW(LPCSTR src
)
74 if (!src
) return NULL
;
75 len
= MultiByteToWideChar(CP_ACP
, 0, src
, -1, NULL
, 0);
76 s
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
77 MultiByteToWideChar(CP_ACP
, 0, src
, -1, s
, len
);
81 static LPWSTR
RPCRT4_strndupAtoW(LPCSTR src
, INT slen
)
85 if (!src
) return NULL
;
86 len
= MultiByteToWideChar(CP_ACP
, 0, src
, slen
, NULL
, 0);
87 s
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
88 MultiByteToWideChar(CP_ACP
, 0, src
, slen
, s
, len
);
92 LPWSTR
RPCRT4_strndupW(LPCWSTR src
, INT slen
)
96 if (!src
) return NULL
;
97 if (slen
== -1) slen
= strlenW(src
);
99 s
= HeapAlloc(GetProcessHeap(), 0, (len
+1)*sizeof(WCHAR
));
100 memcpy(s
, src
, len
*sizeof(WCHAR
));
105 void RPCRT4_strfree(LPSTR src
)
107 HeapFree(GetProcessHeap(), 0, src
);
110 static RPC_STATUS
RPCRT4_AllocBinding(RpcBinding
** Binding
, BOOL server
)
112 RpcBinding
* NewBinding
;
114 NewBinding
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sizeof(RpcBinding
));
115 NewBinding
->refs
= 1;
116 NewBinding
->server
= server
;
118 *Binding
= NewBinding
;
123 static RPC_STATUS
RPCRT4_CreateBindingA(RpcBinding
** Binding
, BOOL server
, LPCSTR Protseq
)
125 RpcBinding
* NewBinding
;
127 RPCRT4_AllocBinding(&NewBinding
, server
);
128 NewBinding
->Protseq
= RPCRT4_strdupA(Protseq
);
130 TRACE("binding: %p\n", NewBinding
);
131 *Binding
= NewBinding
;
136 static RPC_STATUS
RPCRT4_CreateBindingW(RpcBinding
** Binding
, BOOL server
, LPCWSTR Protseq
)
138 RpcBinding
* NewBinding
;
140 RPCRT4_AllocBinding(&NewBinding
, server
);
141 NewBinding
->Protseq
= RPCRT4_strdupWtoA(Protseq
);
143 TRACE("binding: %p\n", NewBinding
);
144 *Binding
= NewBinding
;
149 static RPC_STATUS
RPCRT4_CompleteBindingA(RpcBinding
* Binding
, LPCSTR NetworkAddr
,
150 LPCSTR Endpoint
, LPCSTR NetworkOptions
)
154 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding
,
155 debugstr_a(NetworkAddr
), debugstr_a(Endpoint
), debugstr_a(NetworkOptions
));
157 RPCRT4_strfree(Binding
->NetworkAddr
);
158 Binding
->NetworkAddr
= RPCRT4_strdupA(NetworkAddr
);
159 RPCRT4_strfree(Binding
->Endpoint
);
160 Binding
->Endpoint
= RPCRT4_strdupA(Endpoint
);
161 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
162 Binding
->NetworkOptions
= RPCRT4_strdupAtoW(NetworkOptions
);
164 /* only attempt to get an association if the binding is complete */
165 if (Endpoint
&& Endpoint
[0] != '\0')
167 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
168 Binding
->Endpoint
, Binding
->NetworkOptions
,
170 if (status
!= RPC_S_OK
)
177 static RPC_STATUS
RPCRT4_CompleteBindingW(RpcBinding
* Binding
, LPCWSTR NetworkAddr
,
178 LPCWSTR Endpoint
, LPCWSTR NetworkOptions
)
182 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding
,
183 debugstr_w(NetworkAddr
), debugstr_w(Endpoint
), debugstr_w(NetworkOptions
));
185 RPCRT4_strfree(Binding
->NetworkAddr
);
186 Binding
->NetworkAddr
= RPCRT4_strdupWtoA(NetworkAddr
);
187 RPCRT4_strfree(Binding
->Endpoint
);
188 Binding
->Endpoint
= RPCRT4_strdupWtoA(Endpoint
);
189 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
190 Binding
->NetworkOptions
= RPCRT4_strdupW(NetworkOptions
);
192 /* only attempt to get an association if the binding is complete */
193 if (Endpoint
&& Endpoint
[0] != '\0')
195 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
196 Binding
->Endpoint
, Binding
->NetworkOptions
,
198 if (status
!= RPC_S_OK
)
205 RPC_STATUS
RPCRT4_ResolveBinding(RpcBinding
* Binding
, LPCSTR Endpoint
)
209 TRACE("(RpcBinding == ^%p, EndPoint == \"%s\"\n", Binding
, Endpoint
);
211 RPCRT4_strfree(Binding
->Endpoint
);
212 Binding
->Endpoint
= RPCRT4_strdupA(Endpoint
);
214 if (Binding
->Assoc
) RpcAssoc_Release(Binding
->Assoc
);
215 Binding
->Assoc
= NULL
;
216 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
217 Binding
->Endpoint
, Binding
->NetworkOptions
,
219 if (status
!= RPC_S_OK
)
225 RPC_STATUS
RPCRT4_SetBindingObject(RpcBinding
* Binding
, const UUID
* ObjectUuid
)
227 TRACE("(*RpcBinding == ^%p, UUID == %s)\n", Binding
, debugstr_guid(ObjectUuid
));
228 if (ObjectUuid
) Binding
->ObjectUuid
= *ObjectUuid
;
229 else UuidCreateNil(&Binding
->ObjectUuid
);
233 RPC_STATUS
RPCRT4_MakeBinding(RpcBinding
** Binding
, RpcConnection
* Connection
)
235 RpcBinding
* NewBinding
;
236 TRACE("(RpcBinding == ^%p, Connection == ^%p)\n", Binding
, Connection
);
238 RPCRT4_AllocBinding(&NewBinding
, Connection
->server
);
239 NewBinding
->Protseq
= RPCRT4_strdupA(rpcrt4_conn_get_name(Connection
));
240 NewBinding
->NetworkAddr
= RPCRT4_strdupA(Connection
->NetworkAddr
);
241 NewBinding
->Endpoint
= RPCRT4_strdupA(Connection
->Endpoint
);
242 NewBinding
->FromConn
= Connection
;
244 TRACE("binding: %p\n", NewBinding
);
245 *Binding
= NewBinding
;
250 void RPCRT4_AddRefBinding(RpcBinding
* Binding
)
252 InterlockedIncrement(&Binding
->refs
);
255 RPC_STATUS
RPCRT4_ReleaseBinding(RpcBinding
* Binding
)
257 if (InterlockedDecrement(&Binding
->refs
))
260 TRACE("binding: %p\n", Binding
);
261 if (Binding
->Assoc
) RpcAssoc_Release(Binding
->Assoc
);
262 RPCRT4_strfree(Binding
->Endpoint
);
263 RPCRT4_strfree(Binding
->NetworkAddr
);
264 RPCRT4_strfree(Binding
->Protseq
);
265 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
266 HeapFree(GetProcessHeap(), 0, Binding
->CookieAuth
);
267 if (Binding
->AuthInfo
) RpcAuthInfo_Release(Binding
->AuthInfo
);
268 if (Binding
->QOS
) RpcQualityOfService_Release(Binding
->QOS
);
269 HeapFree(GetProcessHeap(), 0, Binding
);
273 RPC_STATUS
RPCRT4_OpenBinding(RpcBinding
* Binding
, RpcConnection
** Connection
,
274 const RPC_SYNTAX_IDENTIFIER
*TransferSyntax
,
275 const RPC_SYNTAX_IDENTIFIER
*InterfaceId
)
277 TRACE("(Binding == ^%p)\n", Binding
);
279 if (!Binding
->server
) {
280 return RpcAssoc_GetClientConnection(Binding
->Assoc
, InterfaceId
,
281 TransferSyntax
, Binding
->AuthInfo
, Binding
->QOS
, Binding
->CookieAuth
, Connection
);
283 /* we already have a connection with acceptable binding, so use it */
284 if (Binding
->FromConn
) {
285 *Connection
= Binding
->FromConn
;
288 ERR("no connection in binding\n");
289 return RPC_S_INTERNAL_ERROR
;
294 RPC_STATUS
RPCRT4_CloseBinding(RpcBinding
* Binding
, RpcConnection
* Connection
)
296 TRACE("(Binding == ^%p)\n", Binding
);
297 if (!Connection
) return RPC_S_OK
;
298 if (Binding
->server
) {
299 /* don't destroy a connection that is cached in the binding */
300 if (Binding
->FromConn
!= Connection
)
301 RPCRT4_ReleaseConnection(Connection
);
304 RpcAssoc_ReleaseIdleConnection(Binding
->Assoc
, Connection
);
309 static LPSTR
RPCRT4_strconcatA(LPSTR dst
, LPCSTR src
)
311 DWORD len
= strlen(dst
), slen
= strlen(src
);
312 LPSTR ndst
= HeapReAlloc(GetProcessHeap(), 0, dst
, (len
+slen
+2)*sizeof(CHAR
));
315 HeapFree(GetProcessHeap(), 0, dst
);
319 memcpy(ndst
+len
+1, src
, slen
+1);
323 static LPWSTR
RPCRT4_strconcatW(LPWSTR dst
, LPCWSTR src
)
325 DWORD len
= strlenW(dst
), slen
= strlenW(src
);
326 LPWSTR ndst
= HeapReAlloc(GetProcessHeap(), 0, dst
, (len
+slen
+2)*sizeof(WCHAR
));
329 HeapFree(GetProcessHeap(), 0, dst
);
333 memcpy(ndst
+len
+1, src
, (slen
+1)*sizeof(WCHAR
));
337 /* Copies the escaped version of a component into a string binding.
338 * Note: doesn't nul-terminate the string */
339 static RPC_CSTR
escape_string_binding_component(RPC_CSTR string_binding
,
340 const unsigned char *component
)
342 for (; *component
; component
++) {
343 switch (*component
) {
349 *string_binding
++ = '\\';
350 *string_binding
++ = *component
;
353 *string_binding
++ = *component
;
357 return string_binding
;
360 static RPC_WSTR
escape_string_binding_componentW(RPC_WSTR string_binding
,
361 const WCHAR
*component
)
363 for (; *component
; component
++) {
364 switch (*component
) {
370 *string_binding
++ = '\\';
371 *string_binding
++ = *component
;
374 *string_binding
++ = *component
;
378 return string_binding
;
381 static const unsigned char *string_binding_find_delimiter(
382 const unsigned char *string_binding
, unsigned char delim
)
384 const unsigned char *next
;
385 for (next
= string_binding
; *next
; next
++) {
396 static const WCHAR
*string_binding_find_delimiterW(
397 const WCHAR
*string_binding
, WCHAR delim
)
400 for (next
= string_binding
; *next
; next
++) {
411 static RPC_CSTR
unescape_string_binding_component(
412 const unsigned char *string_binding
, int len
)
414 RPC_CSTR component
, p
;
416 if (len
== -1) len
= strlen((const char *)string_binding
);
418 component
= HeapAlloc(GetProcessHeap(), 0, (len
+ 1) * sizeof(*component
));
419 if (!component
) return NULL
;
420 for (p
= component
; len
> 0; string_binding
++, len
--) {
421 if (*string_binding
== '\\') {
424 *p
++ = *string_binding
;
426 *p
++ = *string_binding
;
433 static RPC_WSTR
unescape_string_binding_componentW(
434 const WCHAR
*string_binding
, int len
)
436 RPC_WSTR component
, p
;
438 if (len
== -1) len
= strlenW(string_binding
);
440 component
= HeapAlloc(GetProcessHeap(), 0, (len
+ 1) * sizeof(*component
));
441 if (!component
) return NULL
;
442 for (p
= component
; len
> 0; string_binding
++, len
--) {
443 if (*string_binding
== '\\') {
446 *p
++ = *string_binding
;
448 *p
++ = *string_binding
;
455 /***********************************************************************
456 * RpcStringBindingComposeA (RPCRT4.@)
458 RPC_STATUS WINAPI
RpcStringBindingComposeA(RPC_CSTR ObjUuid
, RPC_CSTR Protseq
,
459 RPC_CSTR NetworkAddr
, RPC_CSTR Endpoint
,
460 RPC_CSTR Options
, RPC_CSTR
*StringBinding
)
465 TRACE( "(%s,%s,%s,%s,%s,%p)\n",
466 debugstr_a( (char*)ObjUuid
), debugstr_a( (char*)Protseq
),
467 debugstr_a( (char*)NetworkAddr
), debugstr_a( (char*)Endpoint
),
468 debugstr_a( (char*)Options
), StringBinding
);
470 /* overestimate for each component for escaping of delimiters */
471 if (ObjUuid
&& *ObjUuid
) len
+= strlen((char*)ObjUuid
) * 2 + 1;
472 if (Protseq
&& *Protseq
) len
+= strlen((char*)Protseq
) * 2 + 1;
473 if (NetworkAddr
&& *NetworkAddr
) len
+= strlen((char*)NetworkAddr
) * 2;
474 if (Endpoint
&& *Endpoint
) len
+= strlen((char*)Endpoint
) * 2 + 2;
475 if (Options
&& *Options
) len
+= strlen((char*)Options
) * 2 + 2;
477 data
= HeapAlloc(GetProcessHeap(), 0, len
);
478 *StringBinding
= data
;
480 if (ObjUuid
&& *ObjUuid
) {
481 data
= escape_string_binding_component(data
, ObjUuid
);
484 if (Protseq
&& *Protseq
) {
485 data
= escape_string_binding_component(data
, Protseq
);
488 if (NetworkAddr
&& *NetworkAddr
)
489 data
= escape_string_binding_component(data
, NetworkAddr
);
491 if ((Endpoint
&& *Endpoint
) ||
492 (Options
&& *Options
)) {
494 if (Endpoint
&& *Endpoint
) {
495 data
= escape_string_binding_component(data
, Endpoint
);
496 if (Options
&& *Options
) *data
++ = ',';
498 if (Options
&& *Options
) {
499 data
= escape_string_binding_component(data
, Options
);
508 /***********************************************************************
509 * RpcStringBindingComposeW (RPCRT4.@)
511 RPC_STATUS WINAPI
RpcStringBindingComposeW( RPC_WSTR ObjUuid
, RPC_WSTR Protseq
,
512 RPC_WSTR NetworkAddr
, RPC_WSTR Endpoint
,
513 RPC_WSTR Options
, RPC_WSTR
* StringBinding
)
518 TRACE("(%s,%s,%s,%s,%s,%p)\n",
519 debugstr_w( ObjUuid
), debugstr_w( Protseq
),
520 debugstr_w( NetworkAddr
), debugstr_w( Endpoint
),
521 debugstr_w( Options
), StringBinding
);
523 /* overestimate for each component for escaping of delimiters */
524 if (ObjUuid
&& *ObjUuid
) len
+= strlenW(ObjUuid
) * 2 + 1;
525 if (Protseq
&& *Protseq
) len
+= strlenW(Protseq
) * 2 + 1;
526 if (NetworkAddr
&& *NetworkAddr
) len
+= strlenW(NetworkAddr
) * 2;
527 if (Endpoint
&& *Endpoint
) len
+= strlenW(Endpoint
) * 2 + 2;
528 if (Options
&& *Options
) len
+= strlenW(Options
) * 2 + 2;
530 data
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
531 *StringBinding
= data
;
533 if (ObjUuid
&& *ObjUuid
) {
534 data
= escape_string_binding_componentW(data
, ObjUuid
);
537 if (Protseq
&& *Protseq
) {
538 data
= escape_string_binding_componentW(data
, Protseq
);
541 if (NetworkAddr
&& *NetworkAddr
) {
542 data
= escape_string_binding_componentW(data
, NetworkAddr
);
544 if ((Endpoint
&& *Endpoint
) ||
545 (Options
&& *Options
)) {
547 if (Endpoint
&& *Endpoint
) {
548 data
= escape_string_binding_componentW(data
, Endpoint
);
549 if (Options
&& *Options
) *data
++ = ',';
551 if (Options
&& *Options
) {
552 data
= escape_string_binding_componentW(data
, Options
);
562 /***********************************************************************
563 * RpcStringBindingParseA (RPCRT4.@)
565 RPC_STATUS WINAPI
RpcStringBindingParseA( RPC_CSTR StringBinding
, RPC_CSTR
*ObjUuid
,
566 RPC_CSTR
*Protseq
, RPC_CSTR
*NetworkAddr
,
567 RPC_CSTR
*Endpoint
, RPC_CSTR
*Options
)
569 const unsigned char *data
, *next
;
570 static const char ep_opt
[] = "endpoint=";
571 BOOL endpoint_already_found
= FALSE
;
573 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_a((char*)StringBinding
),
574 ObjUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
);
576 if (ObjUuid
) *ObjUuid
= NULL
;
577 if (Protseq
) *Protseq
= NULL
;
578 if (NetworkAddr
) *NetworkAddr
= NULL
;
579 if (Endpoint
) *Endpoint
= NULL
;
580 if (Options
) *Options
= NULL
;
582 data
= StringBinding
;
584 next
= string_binding_find_delimiter(data
, '@');
588 RPC_CSTR str_uuid
= unescape_string_binding_component(data
, next
- data
);
589 status
= UuidFromStringA(str_uuid
, &uuid
);
590 if (status
!= RPC_S_OK
) {
591 HeapFree(GetProcessHeap(), 0, str_uuid
);
597 HeapFree(GetProcessHeap(), 0, str_uuid
);
601 next
= string_binding_find_delimiter(data
, ':');
603 if (Protseq
) *Protseq
= unescape_string_binding_component(data
, next
- data
);
607 next
= string_binding_find_delimiter(data
, '[');
609 const unsigned char *close
;
612 if (NetworkAddr
) *NetworkAddr
= unescape_string_binding_component(data
, next
- data
);
614 close
= string_binding_find_delimiter(data
, ']');
615 if (!close
) goto fail
;
617 /* tokenize options */
618 while (data
< close
) {
619 next
= string_binding_find_delimiter(data
, ',');
620 if (!next
|| next
> close
) next
= close
;
621 /* FIXME: this is kind of inefficient */
622 opt
= unescape_string_binding_component(data
, next
- data
);
626 next
= string_binding_find_delimiter(opt
, '=');
628 /* not an option, must be an endpoint */
629 if (endpoint_already_found
) goto fail
;
630 if (Endpoint
) *Endpoint
= opt
;
631 else HeapFree(GetProcessHeap(), 0, opt
);
632 endpoint_already_found
= TRUE
;
634 if (strncmp((const char *)opt
, ep_opt
, strlen(ep_opt
)) == 0) {
635 /* endpoint option */
636 if (endpoint_already_found
) goto fail
;
637 if (Endpoint
) *Endpoint
= unescape_string_binding_component(next
+1, -1);
638 HeapFree(GetProcessHeap(), 0, opt
);
639 endpoint_already_found
= TRUE
;
644 /* FIXME: this is kind of inefficient */
645 *Options
= (unsigned char*) RPCRT4_strconcatA( (char*)*Options
, (char *)opt
);
646 HeapFree(GetProcessHeap(), 0, opt
);
650 HeapFree(GetProcessHeap(), 0, opt
);
656 if (*data
) goto fail
;
658 else if (NetworkAddr
)
659 *NetworkAddr
= unescape_string_binding_component(data
, -1);
664 if (ObjUuid
) RpcStringFreeA(ObjUuid
);
665 if (Protseq
) RpcStringFreeA(Protseq
);
666 if (NetworkAddr
) RpcStringFreeA(NetworkAddr
);
667 if (Endpoint
) RpcStringFreeA(Endpoint
);
668 if (Options
) RpcStringFreeA(Options
);
669 return RPC_S_INVALID_STRING_BINDING
;
672 /***********************************************************************
673 * RpcStringBindingParseW (RPCRT4.@)
675 RPC_STATUS WINAPI
RpcStringBindingParseW( RPC_WSTR StringBinding
, RPC_WSTR
*ObjUuid
,
676 RPC_WSTR
*Protseq
, RPC_WSTR
*NetworkAddr
,
677 RPC_WSTR
*Endpoint
, RPC_WSTR
*Options
)
679 const WCHAR
*data
, *next
;
680 static const WCHAR ep_opt
[] = {'e','n','d','p','o','i','n','t','=',0};
681 BOOL endpoint_already_found
= FALSE
;
683 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_w(StringBinding
),
684 ObjUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
);
686 if (ObjUuid
) *ObjUuid
= NULL
;
687 if (Protseq
) *Protseq
= NULL
;
688 if (NetworkAddr
) *NetworkAddr
= NULL
;
689 if (Endpoint
) *Endpoint
= NULL
;
690 if (Options
) *Options
= NULL
;
692 data
= StringBinding
;
694 next
= string_binding_find_delimiterW(data
, '@');
698 RPC_WSTR str_uuid
= unescape_string_binding_componentW(data
, next
- data
);
699 status
= UuidFromStringW(str_uuid
, &uuid
);
700 if (status
!= RPC_S_OK
) {
701 HeapFree(GetProcessHeap(), 0, str_uuid
);
707 HeapFree(GetProcessHeap(), 0, str_uuid
);
711 next
= string_binding_find_delimiterW(data
, ':');
713 if (Protseq
) *Protseq
= unescape_string_binding_componentW(data
, next
- data
);
717 next
= string_binding_find_delimiterW(data
, '[');
722 if (NetworkAddr
) *NetworkAddr
= unescape_string_binding_componentW(data
, next
- data
);
724 close
= string_binding_find_delimiterW(data
, ']');
725 if (!close
) goto fail
;
727 /* tokenize options */
728 while (data
< close
) {
729 next
= string_binding_find_delimiterW(data
, ',');
730 if (!next
|| next
> close
) next
= close
;
731 /* FIXME: this is kind of inefficient */
732 opt
= unescape_string_binding_componentW(data
, next
- data
);
736 next
= string_binding_find_delimiterW(opt
, '=');
738 /* not an option, must be an endpoint */
739 if (endpoint_already_found
) goto fail
;
740 if (Endpoint
) *Endpoint
= opt
;
741 else HeapFree(GetProcessHeap(), 0, opt
);
742 endpoint_already_found
= TRUE
;
744 if (strncmpW(opt
, ep_opt
, strlenW(ep_opt
)) == 0) {
745 /* endpoint option */
746 if (endpoint_already_found
) goto fail
;
747 if (Endpoint
) *Endpoint
= unescape_string_binding_componentW(next
+1, -1);
748 HeapFree(GetProcessHeap(), 0, opt
);
749 endpoint_already_found
= TRUE
;
754 /* FIXME: this is kind of inefficient */
755 *Options
= RPCRT4_strconcatW(*Options
, opt
);
756 HeapFree(GetProcessHeap(), 0, opt
);
760 HeapFree(GetProcessHeap(), 0, opt
);
766 if (*data
) goto fail
;
767 } else if (NetworkAddr
)
768 *NetworkAddr
= unescape_string_binding_componentW(data
, -1);
773 if (ObjUuid
) RpcStringFreeW(ObjUuid
);
774 if (Protseq
) RpcStringFreeW(Protseq
);
775 if (NetworkAddr
) RpcStringFreeW(NetworkAddr
);
776 if (Endpoint
) RpcStringFreeW(Endpoint
);
777 if (Options
) RpcStringFreeW(Options
);
778 return RPC_S_INVALID_STRING_BINDING
;
781 /***********************************************************************
782 * RpcBindingFree (RPCRT4.@)
784 RPC_STATUS WINAPI
RpcBindingFree( RPC_BINDING_HANDLE
* Binding
)
787 TRACE("(%p) = %p\n", Binding
, *Binding
);
789 status
= RPCRT4_ReleaseBinding(*Binding
);
791 status
= RPC_S_INVALID_BINDING
;
792 if (status
== RPC_S_OK
) *Binding
= NULL
;
796 /***********************************************************************
797 * RpcBindingVectorFree (RPCRT4.@)
799 RPC_STATUS WINAPI
RpcBindingVectorFree( RPC_BINDING_VECTOR
** BindingVector
)
803 TRACE("(%p)\n", BindingVector
);
804 for (c
=0; c
<(*BindingVector
)->Count
; c
++) RpcBindingFree(&(*BindingVector
)->BindingH
[c
]);
805 HeapFree(GetProcessHeap(), 0, *BindingVector
);
806 *BindingVector
= NULL
;
810 /***********************************************************************
811 * RpcBindingInqObject (RPCRT4.@)
813 RPC_STATUS WINAPI
RpcBindingInqObject( RPC_BINDING_HANDLE Binding
, UUID
* ObjectUuid
)
815 RpcBinding
* bind
= Binding
;
817 TRACE("(%p,%p) = %s\n", Binding
, ObjectUuid
, debugstr_guid(&bind
->ObjectUuid
));
818 *ObjectUuid
= bind
->ObjectUuid
;
822 /***********************************************************************
823 * RpcBindingSetObject (RPCRT4.@)
825 RPC_STATUS WINAPI
RpcBindingSetObject( RPC_BINDING_HANDLE Binding
, UUID
* ObjectUuid
)
827 RpcBinding
* bind
= Binding
;
829 TRACE("(%p,%s)\n", Binding
, debugstr_guid(ObjectUuid
));
830 if (bind
->server
) return RPC_S_WRONG_KIND_OF_BINDING
;
831 return RPCRT4_SetBindingObject(Binding
, ObjectUuid
);
834 /***********************************************************************
835 * RpcBindingFromStringBindingA (RPCRT4.@)
837 RPC_STATUS WINAPI
RpcBindingFromStringBindingA( RPC_CSTR StringBinding
, RPC_BINDING_HANDLE
* Binding
)
840 RpcBinding
* bind
= NULL
;
841 RPC_CSTR ObjectUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
;
844 TRACE("(%s,%p)\n", debugstr_a((char*)StringBinding
), Binding
);
846 ret
= RpcStringBindingParseA(StringBinding
, &ObjectUuid
, &Protseq
,
847 &NetworkAddr
, &Endpoint
, &Options
);
848 if (ret
!= RPC_S_OK
) return ret
;
850 ret
= UuidFromStringA(ObjectUuid
, &Uuid
);
853 ret
= RPCRT4_CreateBindingA(&bind
, FALSE
, (char*)Protseq
);
854 if (ret
== RPC_S_OK
) {
855 ret
= RPCRT4_SetBindingObject(bind
, &Uuid
);
857 ret
= RPCRT4_CompleteBindingA(bind
, (char*)NetworkAddr
, (char*)Endpoint
, (char*)Options
);
860 *Binding
= (RPC_BINDING_HANDLE
)bind
;
862 RPCRT4_ReleaseBinding(bind
);
865 RpcStringFreeA(&Options
);
866 RpcStringFreeA(&Endpoint
);
867 RpcStringFreeA(&NetworkAddr
);
868 RpcStringFreeA(&Protseq
);
869 RpcStringFreeA(&ObjectUuid
);
874 /***********************************************************************
875 * RpcBindingFromStringBindingW (RPCRT4.@)
877 RPC_STATUS WINAPI
RpcBindingFromStringBindingW( RPC_WSTR StringBinding
, RPC_BINDING_HANDLE
* Binding
)
880 RpcBinding
* bind
= NULL
;
881 RPC_WSTR ObjectUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
;
884 TRACE("(%s,%p)\n", debugstr_w(StringBinding
), Binding
);
886 ret
= RpcStringBindingParseW(StringBinding
, &ObjectUuid
, &Protseq
,
887 &NetworkAddr
, &Endpoint
, &Options
);
888 if (ret
!= RPC_S_OK
) return ret
;
890 ret
= UuidFromStringW(ObjectUuid
, &Uuid
);
893 ret
= RPCRT4_CreateBindingW(&bind
, FALSE
, Protseq
);
894 if (ret
== RPC_S_OK
) {
895 ret
= RPCRT4_SetBindingObject(bind
, &Uuid
);
897 ret
= RPCRT4_CompleteBindingW(bind
, NetworkAddr
, Endpoint
, Options
);
900 *Binding
= (RPC_BINDING_HANDLE
)bind
;
902 RPCRT4_ReleaseBinding(bind
);
905 RpcStringFreeW(&Options
);
906 RpcStringFreeW(&Endpoint
);
907 RpcStringFreeW(&NetworkAddr
);
908 RpcStringFreeW(&Protseq
);
909 RpcStringFreeW(&ObjectUuid
);
914 /***********************************************************************
915 * RpcBindingToStringBindingA (RPCRT4.@)
917 RPC_STATUS WINAPI
RpcBindingToStringBindingA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*StringBinding
)
920 RpcBinding
* bind
= Binding
;
923 TRACE("(%p,%p)\n", Binding
, StringBinding
);
925 if (UuidIsNil(&bind
->ObjectUuid
, &ret
))
929 ret
= UuidToStringA(&bind
->ObjectUuid
, &ObjectUuid
);
930 if (ret
!= RPC_S_OK
) return ret
;
933 ret
= RpcStringBindingComposeA(ObjectUuid
, (unsigned char*)bind
->Protseq
, (unsigned char*) bind
->NetworkAddr
,
934 (unsigned char*) bind
->Endpoint
, NULL
, StringBinding
);
936 RpcStringFreeA(&ObjectUuid
);
941 /***********************************************************************
942 * RpcBindingToStringBindingW (RPCRT4.@)
944 RPC_STATUS WINAPI
RpcBindingToStringBindingW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*StringBinding
)
947 unsigned char *str
= NULL
;
948 TRACE("(%p,%p)\n", Binding
, StringBinding
);
949 ret
= RpcBindingToStringBindingA(Binding
, &str
);
950 *StringBinding
= RPCRT4_strdupAtoW((char*)str
);
951 RpcStringFreeA(&str
);
955 /***********************************************************************
956 * I_RpcBindingInqTransportType (RPCRT4.@)
958 RPC_STATUS WINAPI
I_RpcBindingInqTransportType( RPC_BINDING_HANDLE Binding
, unsigned int * Type
)
961 FIXME( "(%p,%p): stub\n", Binding
, Type
);
962 *Type
= TRANSPORT_TYPE_LPC
;
966 /***********************************************************************
967 * I_RpcBindingSetAsync (RPCRT4.@)
969 * Exists in win9x and winNT, but with different number of arguments
970 * (9x version has 3 arguments, NT has 2).
972 RPC_STATUS WINAPI
I_RpcBindingSetAsync( RPC_BINDING_HANDLE Binding
, RPC_BLOCKING_FN BlockingFn
)
974 RpcBinding
* bind
= Binding
;
976 TRACE( "(%p,%p): stub\n", Binding
, BlockingFn
);
978 bind
->BlockingFn
= BlockingFn
;
983 /***********************************************************************
984 * RpcBindingCopy (RPCRT4.@)
986 RPC_STATUS RPC_ENTRY
RpcBindingCopy(
987 RPC_BINDING_HANDLE SourceBinding
,
988 RPC_BINDING_HANDLE
* DestinationBinding
)
990 RpcBinding
*DestBinding
;
991 RpcBinding
*SrcBinding
= SourceBinding
;
994 TRACE("(%p, %p)\n", SourceBinding
, DestinationBinding
);
996 status
= RPCRT4_AllocBinding(&DestBinding
, SrcBinding
->server
);
997 if (status
!= RPC_S_OK
) return status
;
999 DestBinding
->ObjectUuid
= SrcBinding
->ObjectUuid
;
1000 DestBinding
->BlockingFn
= SrcBinding
->BlockingFn
;
1001 DestBinding
->Protseq
= RPCRT4_strndupA(SrcBinding
->Protseq
, -1);
1002 DestBinding
->NetworkAddr
= RPCRT4_strndupA(SrcBinding
->NetworkAddr
, -1);
1003 DestBinding
->Endpoint
= RPCRT4_strndupA(SrcBinding
->Endpoint
, -1);
1004 DestBinding
->NetworkOptions
= RPCRT4_strdupW(SrcBinding
->NetworkOptions
);
1005 DestBinding
->CookieAuth
= RPCRT4_strdupW(SrcBinding
->CookieAuth
);
1006 if (SrcBinding
->Assoc
) SrcBinding
->Assoc
->refs
++;
1007 DestBinding
->Assoc
= SrcBinding
->Assoc
;
1009 if (SrcBinding
->AuthInfo
) RpcAuthInfo_AddRef(SrcBinding
->AuthInfo
);
1010 DestBinding
->AuthInfo
= SrcBinding
->AuthInfo
;
1011 if (SrcBinding
->QOS
) RpcQualityOfService_AddRef(SrcBinding
->QOS
);
1012 DestBinding
->QOS
= SrcBinding
->QOS
;
1014 *DestinationBinding
= DestBinding
;
1018 /***********************************************************************
1019 * RpcBindingReset (RPCRT4.@)
1021 RPC_STATUS RPC_ENTRY
RpcBindingReset(RPC_BINDING_HANDLE Binding
)
1023 RpcBinding
*bind
= Binding
;
1025 TRACE("(%p)\n", Binding
);
1027 RPCRT4_strfree(bind
->Endpoint
);
1028 bind
->Endpoint
= NULL
;
1029 if (bind
->Assoc
) RpcAssoc_Release(bind
->Assoc
);
1035 /***********************************************************************
1036 * RpcImpersonateClient (RPCRT4.@)
1038 * Impersonates the client connected via a binding handle so that security
1039 * checks are done in the context of the client.
1042 * BindingHandle [I] Handle to the binding to the client.
1045 * Success: RPS_S_OK.
1046 * Failure: RPC_STATUS value.
1050 * If BindingHandle is NULL then the function impersonates the client
1051 * connected to the binding handle of the current thread.
1053 RPC_STATUS WINAPI
RpcImpersonateClient(RPC_BINDING_HANDLE BindingHandle
)
1057 TRACE("(%p)\n", BindingHandle
);
1059 if (!BindingHandle
) BindingHandle
= I_RpcGetCurrentCallHandle();
1060 if (!BindingHandle
) return RPC_S_INVALID_BINDING
;
1062 bind
= BindingHandle
;
1064 return rpcrt4_conn_impersonate_client(bind
->FromConn
);
1065 return RPC_S_WRONG_KIND_OF_BINDING
;
1068 /***********************************************************************
1069 * RpcRevertToSelfEx (RPCRT4.@)
1071 * Stops impersonating the client connected to the binding handle so that security
1072 * checks are no longer done in the context of the client.
1075 * BindingHandle [I] Handle to the binding to the client.
1078 * Success: RPS_S_OK.
1079 * Failure: RPC_STATUS value.
1083 * If BindingHandle is NULL then the function stops impersonating the client
1084 * connected to the binding handle of the current thread.
1086 RPC_STATUS WINAPI
RpcRevertToSelfEx(RPC_BINDING_HANDLE BindingHandle
)
1090 TRACE("(%p)\n", BindingHandle
);
1092 if (!BindingHandle
) BindingHandle
= I_RpcGetCurrentCallHandle();
1093 if (!BindingHandle
) return RPC_S_INVALID_BINDING
;
1095 bind
= BindingHandle
;
1097 return rpcrt4_conn_revert_to_self(bind
->FromConn
);
1098 return RPC_S_WRONG_KIND_OF_BINDING
;
1101 static inline BOOL
has_nt_auth_identity(ULONG AuthnLevel
)
1105 case RPC_C_AUTHN_GSS_NEGOTIATE
:
1106 case RPC_C_AUTHN_WINNT
:
1107 case RPC_C_AUTHN_GSS_KERBEROS
:
1114 RPC_STATUS
RpcAuthInfo_Create(ULONG AuthnLevel
, ULONG AuthnSvc
,
1115 CredHandle cred
, TimeStamp exp
,
1117 RPC_AUTH_IDENTITY_HANDLE identity
,
1120 RpcAuthInfo
*AuthInfo
= HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo
));
1122 return RPC_S_OUT_OF_MEMORY
;
1125 AuthInfo
->AuthnLevel
= AuthnLevel
;
1126 AuthInfo
->AuthnSvc
= AuthnSvc
;
1127 AuthInfo
->cred
= cred
;
1128 AuthInfo
->exp
= exp
;
1129 AuthInfo
->cbMaxToken
= cbMaxToken
;
1130 AuthInfo
->identity
= identity
;
1131 AuthInfo
->server_principal_name
= NULL
;
1133 /* duplicate the SEC_WINNT_AUTH_IDENTITY structure, if applicable, to
1134 * enable better matching in RpcAuthInfo_IsEqual */
1135 if (identity
&& has_nt_auth_identity(AuthnSvc
))
1137 const SEC_WINNT_AUTH_IDENTITY_W
*nt_identity
= identity
;
1138 AuthInfo
->nt_identity
= HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo
->nt_identity
));
1139 if (!AuthInfo
->nt_identity
)
1141 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1142 return RPC_S_OUT_OF_MEMORY
;
1145 AuthInfo
->nt_identity
->Flags
= SEC_WINNT_AUTH_IDENTITY_UNICODE
;
1146 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
1147 AuthInfo
->nt_identity
->User
= RPCRT4_strndupW(nt_identity
->User
, nt_identity
->UserLength
);
1149 AuthInfo
->nt_identity
->User
= RPCRT4_strndupAtoW((const char *)nt_identity
->User
, nt_identity
->UserLength
);
1150 AuthInfo
->nt_identity
->UserLength
= nt_identity
->UserLength
;
1151 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
1152 AuthInfo
->nt_identity
->Domain
= RPCRT4_strndupW(nt_identity
->Domain
, nt_identity
->DomainLength
);
1154 AuthInfo
->nt_identity
->Domain
= RPCRT4_strndupAtoW((const char *)nt_identity
->Domain
, nt_identity
->DomainLength
);
1155 AuthInfo
->nt_identity
->DomainLength
= nt_identity
->DomainLength
;
1156 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
1157 AuthInfo
->nt_identity
->Password
= RPCRT4_strndupW(nt_identity
->Password
, nt_identity
->PasswordLength
);
1159 AuthInfo
->nt_identity
->Password
= RPCRT4_strndupAtoW((const char *)nt_identity
->Password
, nt_identity
->PasswordLength
);
1160 AuthInfo
->nt_identity
->PasswordLength
= nt_identity
->PasswordLength
;
1162 if ((nt_identity
->User
&& !AuthInfo
->nt_identity
->User
) ||
1163 (nt_identity
->Domain
&& !AuthInfo
->nt_identity
->Domain
) ||
1164 (nt_identity
->Password
&& !AuthInfo
->nt_identity
->Password
))
1166 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->User
);
1167 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Domain
);
1168 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Password
);
1169 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
);
1170 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1171 return RPC_S_OUT_OF_MEMORY
;
1175 AuthInfo
->nt_identity
= NULL
;
1180 ULONG
RpcAuthInfo_AddRef(RpcAuthInfo
*AuthInfo
)
1182 return InterlockedIncrement(&AuthInfo
->refs
);
1185 ULONG
RpcAuthInfo_Release(RpcAuthInfo
*AuthInfo
)
1187 ULONG refs
= InterlockedDecrement(&AuthInfo
->refs
);
1191 FreeCredentialsHandle(&AuthInfo
->cred
);
1192 if (AuthInfo
->nt_identity
)
1194 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->User
);
1195 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Domain
);
1196 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Password
);
1197 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
);
1199 HeapFree(GetProcessHeap(), 0, AuthInfo
->server_principal_name
);
1200 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1206 BOOL
RpcAuthInfo_IsEqual(const RpcAuthInfo
*AuthInfo1
, const RpcAuthInfo
*AuthInfo2
)
1208 if (AuthInfo1
== AuthInfo2
)
1211 if (!AuthInfo1
|| !AuthInfo2
)
1214 if ((AuthInfo1
->AuthnLevel
!= AuthInfo2
->AuthnLevel
) ||
1215 (AuthInfo1
->AuthnSvc
!= AuthInfo2
->AuthnSvc
))
1218 if (AuthInfo1
->identity
== AuthInfo2
->identity
)
1221 if (!AuthInfo1
->identity
|| !AuthInfo2
->identity
)
1224 if (has_nt_auth_identity(AuthInfo1
->AuthnSvc
))
1226 const SEC_WINNT_AUTH_IDENTITY_W
*identity1
= AuthInfo1
->nt_identity
;
1227 const SEC_WINNT_AUTH_IDENTITY_W
*identity2
= AuthInfo2
->nt_identity
;
1228 /* compare user names */
1229 if (identity1
->UserLength
!= identity2
->UserLength
||
1230 memcmp(identity1
->User
, identity2
->User
, identity1
->UserLength
))
1232 /* compare domain names */
1233 if (identity1
->DomainLength
!= identity2
->DomainLength
||
1234 memcmp(identity1
->Domain
, identity2
->Domain
, identity1
->DomainLength
))
1236 /* compare passwords */
1237 if (identity1
->PasswordLength
!= identity2
->PasswordLength
||
1238 memcmp(identity1
->Password
, identity2
->Password
, identity1
->PasswordLength
))
1247 static RPC_STATUS
RpcQualityOfService_Create(const RPC_SECURITY_QOS
*qos_src
, BOOL unicode
, RpcQualityOfService
**qos_dst
)
1249 RpcQualityOfService
*qos
= HeapAlloc(GetProcessHeap(), 0, sizeof(*qos
));
1252 return RPC_S_OUT_OF_RESOURCES
;
1255 qos
->qos
= HeapAlloc(GetProcessHeap(), 0, sizeof(*qos
->qos
));
1256 if (!qos
->qos
) goto error
;
1257 qos
->qos
->Version
= qos_src
->Version
;
1258 qos
->qos
->Capabilities
= qos_src
->Capabilities
;
1259 qos
->qos
->IdentityTracking
= qos_src
->IdentityTracking
;
1260 qos
->qos
->ImpersonationType
= qos_src
->ImpersonationType
;
1261 qos
->qos
->AdditionalSecurityInfoType
= 0;
1263 if (qos_src
->Version
>= 2)
1265 const RPC_SECURITY_QOS_V2_W
*qos_src2
= (const RPC_SECURITY_QOS_V2_W
*)qos_src
;
1266 qos
->qos
->AdditionalSecurityInfoType
= qos_src2
->AdditionalSecurityInfoType
;
1267 if (qos_src2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1269 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials_src
= qos_src2
->u
.HttpCredentials
;
1270 RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials_dst
;
1272 http_credentials_dst
= HeapAlloc(GetProcessHeap(), 0, sizeof(*http_credentials_dst
));
1273 qos
->qos
->u
.HttpCredentials
= http_credentials_dst
;
1274 if (!http_credentials_dst
) goto error
;
1275 http_credentials_dst
->TransportCredentials
= NULL
;
1276 http_credentials_dst
->Flags
= http_credentials_src
->Flags
;
1277 http_credentials_dst
->AuthenticationTarget
= http_credentials_src
->AuthenticationTarget
;
1278 http_credentials_dst
->NumberOfAuthnSchemes
= http_credentials_src
->NumberOfAuthnSchemes
;
1279 http_credentials_dst
->AuthnSchemes
= NULL
;
1280 http_credentials_dst
->ServerCertificateSubject
= NULL
;
1281 if (http_credentials_src
->TransportCredentials
)
1283 SEC_WINNT_AUTH_IDENTITY_W
*cred_dst
;
1284 cred_dst
= http_credentials_dst
->TransportCredentials
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sizeof(*cred_dst
));
1285 if (!cred_dst
) goto error
;
1286 cred_dst
->Flags
= SEC_WINNT_AUTH_IDENTITY_UNICODE
;
1289 const SEC_WINNT_AUTH_IDENTITY_W
*cred_src
= http_credentials_src
->TransportCredentials
;
1290 cred_dst
->UserLength
= cred_src
->UserLength
;
1291 cred_dst
->PasswordLength
= cred_src
->PasswordLength
;
1292 cred_dst
->DomainLength
= cred_src
->DomainLength
;
1293 cred_dst
->User
= RPCRT4_strndupW(cred_src
->User
, cred_src
->UserLength
);
1294 cred_dst
->Password
= RPCRT4_strndupW(cred_src
->Password
, cred_src
->PasswordLength
);
1295 cred_dst
->Domain
= RPCRT4_strndupW(cred_src
->Domain
, cred_src
->DomainLength
);
1299 const SEC_WINNT_AUTH_IDENTITY_A
*cred_src
= (const SEC_WINNT_AUTH_IDENTITY_A
*)http_credentials_src
->TransportCredentials
;
1300 cred_dst
->UserLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->User
, cred_src
->UserLength
, NULL
, 0);
1301 cred_dst
->DomainLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Domain
, cred_src
->DomainLength
, NULL
, 0);
1302 cred_dst
->PasswordLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Password
, cred_src
->PasswordLength
, NULL
, 0);
1303 cred_dst
->User
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->UserLength
* sizeof(WCHAR
));
1304 cred_dst
->Password
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->PasswordLength
* sizeof(WCHAR
));
1305 cred_dst
->Domain
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->DomainLength
* sizeof(WCHAR
));
1306 if (!cred_dst
->Password
|| !cred_dst
->Domain
) goto error
;
1307 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->User
, cred_src
->UserLength
, cred_dst
->User
, cred_dst
->UserLength
);
1308 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Domain
, cred_src
->DomainLength
, cred_dst
->Domain
, cred_dst
->DomainLength
);
1309 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Password
, cred_src
->PasswordLength
, cred_dst
->Password
, cred_dst
->PasswordLength
);
1312 if (http_credentials_src
->NumberOfAuthnSchemes
)
1314 http_credentials_dst
->AuthnSchemes
= HeapAlloc(GetProcessHeap(), 0, http_credentials_src
->NumberOfAuthnSchemes
* sizeof(*http_credentials_dst
->AuthnSchemes
));
1315 if (!http_credentials_dst
->AuthnSchemes
) goto error
;
1316 memcpy(http_credentials_dst
->AuthnSchemes
, http_credentials_src
->AuthnSchemes
, http_credentials_src
->NumberOfAuthnSchemes
* sizeof(*http_credentials_dst
->AuthnSchemes
));
1318 if (http_credentials_src
->ServerCertificateSubject
)
1321 http_credentials_dst
->ServerCertificateSubject
=
1322 RPCRT4_strndupW(http_credentials_src
->ServerCertificateSubject
,
1323 strlenW(http_credentials_src
->ServerCertificateSubject
));
1325 http_credentials_dst
->ServerCertificateSubject
=
1326 RPCRT4_strdupAtoW((char *)http_credentials_src
->ServerCertificateSubject
);
1327 if (!http_credentials_dst
->ServerCertificateSubject
) goto error
;
1337 if (qos
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
&&
1338 qos
->qos
->u
.HttpCredentials
)
1340 if (qos
->qos
->u
.HttpCredentials
->TransportCredentials
)
1342 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->User
);
1343 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Domain
);
1344 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Password
);
1345 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
);
1347 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->AuthnSchemes
);
1348 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->ServerCertificateSubject
);
1349 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
);
1351 HeapFree(GetProcessHeap(), 0, qos
->qos
);
1353 HeapFree(GetProcessHeap(), 0, qos
);
1354 return RPC_S_OUT_OF_RESOURCES
;
1357 ULONG
RpcQualityOfService_AddRef(RpcQualityOfService
*qos
)
1359 return InterlockedIncrement(&qos
->refs
);
1362 ULONG
RpcQualityOfService_Release(RpcQualityOfService
*qos
)
1364 ULONG refs
= InterlockedDecrement(&qos
->refs
);
1368 if (qos
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1370 if (qos
->qos
->u
.HttpCredentials
->TransportCredentials
)
1372 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->User
);
1373 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Domain
);
1374 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Password
);
1375 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
);
1377 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->AuthnSchemes
);
1378 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->ServerCertificateSubject
);
1379 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
);
1381 HeapFree(GetProcessHeap(), 0, qos
->qos
);
1382 HeapFree(GetProcessHeap(), 0, qos
);
1387 BOOL
RpcQualityOfService_IsEqual(const RpcQualityOfService
*qos1
, const RpcQualityOfService
*qos2
)
1395 TRACE("qos1 = { %d %d %d %d }, qos2 = { %d %d %d %d }\n",
1396 qos1
->qos
->Capabilities
, qos1
->qos
->IdentityTracking
,
1397 qos1
->qos
->ImpersonationType
, qos1
->qos
->AdditionalSecurityInfoType
,
1398 qos2
->qos
->Capabilities
, qos2
->qos
->IdentityTracking
,
1399 qos2
->qos
->ImpersonationType
, qos2
->qos
->AdditionalSecurityInfoType
);
1401 if ((qos1
->qos
->Capabilities
!= qos2
->qos
->Capabilities
) ||
1402 (qos1
->qos
->IdentityTracking
!= qos2
->qos
->IdentityTracking
) ||
1403 (qos1
->qos
->ImpersonationType
!= qos2
->qos
->ImpersonationType
) ||
1404 (qos1
->qos
->AdditionalSecurityInfoType
!= qos2
->qos
->AdditionalSecurityInfoType
))
1407 if (qos1
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1409 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials1
= qos1
->qos
->u
.HttpCredentials
;
1410 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials2
= qos2
->qos
->u
.HttpCredentials
;
1412 if (http_credentials1
->Flags
!= http_credentials2
->Flags
)
1415 if (http_credentials1
->AuthenticationTarget
!= http_credentials2
->AuthenticationTarget
)
1418 if (http_credentials1
->NumberOfAuthnSchemes
!= http_credentials2
->NumberOfAuthnSchemes
)
1421 if ((!http_credentials1
->AuthnSchemes
&& http_credentials2
->AuthnSchemes
) ||
1422 (http_credentials1
->AuthnSchemes
&& !http_credentials2
->AuthnSchemes
))
1425 if (memcmp(http_credentials1
->AuthnSchemes
, http_credentials2
->AuthnSchemes
,
1426 http_credentials1
->NumberOfAuthnSchemes
* sizeof(http_credentials1
->AuthnSchemes
[0])))
1429 /* server certificate subject not currently used */
1431 if (http_credentials1
->TransportCredentials
!= http_credentials2
->TransportCredentials
)
1433 const SEC_WINNT_AUTH_IDENTITY_W
*identity1
= http_credentials1
->TransportCredentials
;
1434 const SEC_WINNT_AUTH_IDENTITY_W
*identity2
= http_credentials2
->TransportCredentials
;
1436 if (!identity1
|| !identity2
)
1439 /* compare user names */
1440 if (identity1
->UserLength
!= identity2
->UserLength
||
1441 memcmp(identity1
->User
, identity2
->User
, identity1
->UserLength
))
1443 /* compare domain names */
1444 if (identity1
->DomainLength
!= identity2
->DomainLength
||
1445 memcmp(identity1
->Domain
, identity2
->Domain
, identity1
->DomainLength
))
1447 /* compare passwords */
1448 if (identity1
->PasswordLength
!= identity2
->PasswordLength
||
1449 memcmp(identity1
->Password
, identity2
->Password
, identity1
->PasswordLength
))
1457 /***********************************************************************
1458 * RpcRevertToSelf (RPCRT4.@)
1460 RPC_STATUS WINAPI
RpcRevertToSelf(void)
1463 return RpcRevertToSelfEx(NULL
);
1466 /***********************************************************************
1467 * RpcMgmtSetComTimeout (RPCRT4.@)
1469 RPC_STATUS WINAPI
RpcMgmtSetComTimeout(RPC_BINDING_HANDLE BindingHandle
, unsigned int Timeout
)
1471 FIXME("(%p, %d): stub\n", BindingHandle
, Timeout
);
1475 /***********************************************************************
1476 * RpcBindingInqAuthInfoExA (RPCRT4.@)
1478 RPCRTAPI RPC_STATUS RPC_ENTRY
1479 RpcBindingInqAuthInfoExA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1480 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
,
1481 ULONG RpcQosVersion
, RPC_SECURITY_QOS
*SecurityQOS
)
1486 TRACE("%p %p %p %p %p %p %u %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1487 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1489 status
= RpcBindingInqAuthInfoExW(Binding
, ServerPrincName
? &principal
: NULL
, AuthnLevel
,
1490 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1491 if (status
== RPC_S_OK
&& ServerPrincName
)
1493 *ServerPrincName
= (RPC_CSTR
)RPCRT4_strdupWtoA(principal
);
1494 RpcStringFreeW(&principal
);
1495 if (!*ServerPrincName
) return RPC_S_OUT_OF_MEMORY
;
1501 /***********************************************************************
1502 * RpcBindingInqAuthInfoExW (RPCRT4.@)
1504 RPCRTAPI RPC_STATUS RPC_ENTRY
1505 RpcBindingInqAuthInfoExW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1506 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
,
1507 ULONG RpcQosVersion
, RPC_SECURITY_QOS
*SecurityQOS
)
1509 RpcBinding
*bind
= Binding
;
1511 TRACE("%p %p %p %p %p %p %u %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1512 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1514 if (!bind
->AuthInfo
) return RPC_S_BINDING_HAS_NO_AUTH
;
1518 FIXME("QOS not implemented\n");
1519 return RPC_S_INVALID_BINDING
;
1522 if (ServerPrincName
)
1524 if (bind
->AuthInfo
->server_principal_name
)
1526 *ServerPrincName
= RPCRT4_strdupW(bind
->AuthInfo
->server_principal_name
);
1527 if (!*ServerPrincName
) return RPC_S_OUT_OF_MEMORY
;
1529 else *ServerPrincName
= NULL
;
1531 if (AuthnLevel
) *AuthnLevel
= bind
->AuthInfo
->AuthnLevel
;
1532 if (AuthnSvc
) *AuthnSvc
= bind
->AuthInfo
->AuthnSvc
;
1533 if (AuthIdentity
) *AuthIdentity
= bind
->AuthInfo
->identity
;
1536 FIXME("authorization service not implemented\n");
1537 *AuthzSvc
= RPC_C_AUTHZ_NONE
;
1543 /***********************************************************************
1544 * RpcBindingInqAuthInfoA (RPCRT4.@)
1546 RPCRTAPI RPC_STATUS RPC_ENTRY
1547 RpcBindingInqAuthInfoA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1548 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
)
1550 return RpcBindingInqAuthInfoExA(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
,
1554 /***********************************************************************
1555 * RpcBindingInqAuthInfoW (RPCRT4.@)
1557 RPCRTAPI RPC_STATUS RPC_ENTRY
1558 RpcBindingInqAuthInfoW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1559 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
)
1561 return RpcBindingInqAuthInfoExW(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
,
1565 /***********************************************************************
1566 * RpcBindingInqAuthClientA (RPCRT4.@)
1568 RPCRTAPI RPC_STATUS RPC_ENTRY
1569 RpcBindingInqAuthClientA( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1570 RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1573 return RpcBindingInqAuthClientExA(ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1574 AuthnSvc
, AuthzSvc
, 0);
1577 /***********************************************************************
1578 * RpcBindingInqAuthClientW (RPCRT4.@)
1580 RPCRTAPI RPC_STATUS RPC_ENTRY
1581 RpcBindingInqAuthClientW( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1582 RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1585 return RpcBindingInqAuthClientExW(ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1586 AuthnSvc
, AuthzSvc
, 0);
1589 /***********************************************************************
1590 * RpcBindingInqAuthClientExA (RPCRT4.@)
1592 RPCRTAPI RPC_STATUS RPC_ENTRY
1593 RpcBindingInqAuthClientExA( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1594 RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1595 ULONG
*AuthzSvc
, ULONG Flags
)
1600 TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1601 AuthnSvc
, AuthzSvc
, Flags
);
1603 status
= RpcBindingInqAuthClientExW(ClientBinding
, Privs
, ServerPrincName
? &principal
: NULL
,
1604 AuthnLevel
, AuthnSvc
, AuthzSvc
, Flags
);
1605 if (status
== RPC_S_OK
&& ServerPrincName
)
1607 *ServerPrincName
= (RPC_CSTR
)RPCRT4_strdupWtoA(principal
);
1608 if (!*ServerPrincName
&& principal
) status
= RPC_S_OUT_OF_MEMORY
;
1609 RpcStringFreeW(&principal
);
1615 /***********************************************************************
1616 * RpcBindingInqAuthClientExW (RPCRT4.@)
1618 RPCRTAPI RPC_STATUS RPC_ENTRY
1619 RpcBindingInqAuthClientExW( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1620 RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1621 ULONG
*AuthzSvc
, ULONG Flags
)
1625 TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1626 AuthnSvc
, AuthzSvc
, Flags
);
1628 if (!ClientBinding
) ClientBinding
= I_RpcGetCurrentCallHandle();
1629 if (!ClientBinding
) return RPC_S_INVALID_BINDING
;
1631 bind
= ClientBinding
;
1632 if (!bind
->FromConn
) return RPC_S_INVALID_BINDING
;
1634 return rpcrt4_conn_inquire_auth_client(bind
->FromConn
, Privs
,
1635 ServerPrincName
, AuthnLevel
,
1636 AuthnSvc
, AuthzSvc
, Flags
);
1639 /***********************************************************************
1640 * RpcBindingServerFromClient (RPCRT4.@)
1642 RPCRTAPI RPC_STATUS RPC_ENTRY
1643 RpcBindingServerFromClient(RPC_BINDING_HANDLE ClientBinding
, RPC_BINDING_HANDLE
* ServerBinding
)
1645 RpcBinding
* bind
= ClientBinding
;
1646 RpcBinding
* NewBinding
;
1649 bind
= I_RpcGetCurrentCallHandle();
1652 return RPC_S_INVALID_BINDING
;
1654 RPCRT4_AllocBinding(&NewBinding
, TRUE
);
1655 NewBinding
->Protseq
= RPCRT4_strdupA(bind
->Protseq
);
1656 NewBinding
->NetworkAddr
= RPCRT4_strdupA(bind
->NetworkAddr
);
1658 *ServerBinding
= NewBinding
;
1663 /***********************************************************************
1664 * RpcBindingSetAuthInfoExA (RPCRT4.@)
1666 RPCRTAPI RPC_STATUS RPC_ENTRY
1667 RpcBindingSetAuthInfoExA( RPC_BINDING_HANDLE Binding
, RPC_CSTR ServerPrincName
,
1668 ULONG AuthnLevel
, ULONG AuthnSvc
,
1669 RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
,
1670 RPC_SECURITY_QOS
*SecurityQos
)
1672 RpcBinding
* bind
= Binding
;
1676 ULONG package_count
;
1678 PSecPkgInfoA packages
;
1681 TRACE("%p %s %u %u %p %u %p\n", Binding
, debugstr_a((const char*)ServerPrincName
),
1682 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, SecurityQos
);
1688 TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d",
1689 SecurityQos
->Version
, SecurityQos
->Capabilities
, SecurityQos
->IdentityTracking
, SecurityQos
->ImpersonationType
);
1690 if (SecurityQos
->Version
>= 2)
1692 const RPC_SECURITY_QOS_V2_A
*SecurityQos2
= (const RPC_SECURITY_QOS_V2_A
*)SecurityQos
;
1693 TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2
->AdditionalSecurityInfoType
);
1694 if (SecurityQos2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1695 TRACE(", { %p, 0x%x, %d, %d, %p(%u), %s }",
1696 SecurityQos2
->u
.HttpCredentials
->TransportCredentials
,
1697 SecurityQos2
->u
.HttpCredentials
->Flags
,
1698 SecurityQos2
->u
.HttpCredentials
->AuthenticationTarget
,
1699 SecurityQos2
->u
.HttpCredentials
->NumberOfAuthnSchemes
,
1700 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
,
1701 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
? *SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
: 0,
1702 SecurityQos2
->u
.HttpCredentials
->ServerCertificateSubject
);
1705 status
= RpcQualityOfService_Create(SecurityQos
, FALSE
, &bind
->QOS
);
1706 if (status
!= RPC_S_OK
)
1711 if (bind
->QOS
) RpcQualityOfService_Release(bind
->QOS
);
1715 if (AuthnSvc
== RPC_C_AUTHN_DEFAULT
)
1716 AuthnSvc
= RPC_C_AUTHN_WINNT
;
1718 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1719 if (AuthnLevel
== RPC_C_AUTHN_LEVEL_DEFAULT
)
1720 AuthnLevel
= RPC_C_AUTHN_LEVEL_NONE
;
1722 if ((AuthnLevel
== RPC_C_AUTHN_LEVEL_NONE
) || (AuthnSvc
== RPC_C_AUTHN_NONE
))
1724 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1725 bind
->AuthInfo
= NULL
;
1729 if (AuthnLevel
> RPC_C_AUTHN_LEVEL_PKT_PRIVACY
)
1731 FIXME("unknown AuthnLevel %u\n", AuthnLevel
);
1732 return RPC_S_UNKNOWN_AUTHN_LEVEL
;
1735 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1736 if (AuthzSvr
&& AuthnSvc
!= RPC_C_AUTHN_WINNT
)
1738 FIXME("unsupported AuthzSvr %u\n", AuthzSvr
);
1739 return RPC_S_UNKNOWN_AUTHZ_SERVICE
;
1742 r
= EnumerateSecurityPackagesA(&package_count
, &packages
);
1745 ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n", r
);
1746 return RPC_S_SEC_PKG_ERROR
;
1749 for (i
= 0; i
< package_count
; i
++)
1750 if (packages
[i
].wRPCID
== AuthnSvc
)
1753 if (i
== package_count
)
1755 FIXME("unsupported AuthnSvc %u\n", AuthnSvc
);
1756 FreeContextBuffer(packages
);
1757 return RPC_S_UNKNOWN_AUTHN_SERVICE
;
1760 TRACE("found package %s for service %u\n", packages
[i
].Name
, AuthnSvc
);
1761 r
= AcquireCredentialsHandleA(NULL
, packages
[i
].Name
, SECPKG_CRED_OUTBOUND
, NULL
,
1762 AuthIdentity
, NULL
, NULL
, &cred
, &exp
);
1763 cbMaxToken
= packages
[i
].cbMaxToken
;
1764 FreeContextBuffer(packages
);
1765 if (r
== ERROR_SUCCESS
)
1767 RpcAuthInfo
*new_auth_info
;
1768 r
= RpcAuthInfo_Create(AuthnLevel
, AuthnSvc
, cred
, exp
, cbMaxToken
,
1769 AuthIdentity
, &new_auth_info
);
1772 new_auth_info
->server_principal_name
= RPCRT4_strdupAtoW((char *)ServerPrincName
);
1773 if (!ServerPrincName
|| new_auth_info
->server_principal_name
)
1775 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1776 bind
->AuthInfo
= new_auth_info
;
1780 RpcAuthInfo_Release(new_auth_info
);
1781 r
= RPC_S_OUT_OF_MEMORY
;
1785 FreeCredentialsHandle(&cred
);
1790 ERR("AcquireCredentialsHandleA failed with error 0x%08x\n", r
);
1791 return RPC_S_SEC_PKG_ERROR
;
1795 /***********************************************************************
1796 * RpcBindingSetAuthInfoExW (RPCRT4.@)
1798 RPCRTAPI RPC_STATUS RPC_ENTRY
1799 RpcBindingSetAuthInfoExW( RPC_BINDING_HANDLE Binding
, RPC_WSTR ServerPrincName
, ULONG AuthnLevel
,
1800 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
,
1801 RPC_SECURITY_QOS
*SecurityQos
)
1803 RpcBinding
* bind
= Binding
;
1807 ULONG package_count
;
1809 PSecPkgInfoW packages
;
1812 TRACE("%p %s %u %u %p %u %p\n", Binding
, debugstr_w(ServerPrincName
),
1813 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, SecurityQos
);
1819 TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d",
1820 SecurityQos
->Version
, SecurityQos
->Capabilities
, SecurityQos
->IdentityTracking
, SecurityQos
->ImpersonationType
);
1821 if (SecurityQos
->Version
>= 2)
1823 const RPC_SECURITY_QOS_V2_W
*SecurityQos2
= (const RPC_SECURITY_QOS_V2_W
*)SecurityQos
;
1824 TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2
->AdditionalSecurityInfoType
);
1825 if (SecurityQos2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1826 TRACE(", { %p, 0x%x, %d, %d, %p(%u), %s }",
1827 SecurityQos2
->u
.HttpCredentials
->TransportCredentials
,
1828 SecurityQos2
->u
.HttpCredentials
->Flags
,
1829 SecurityQos2
->u
.HttpCredentials
->AuthenticationTarget
,
1830 SecurityQos2
->u
.HttpCredentials
->NumberOfAuthnSchemes
,
1831 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
,
1832 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
? *SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
: 0,
1833 debugstr_w(SecurityQos2
->u
.HttpCredentials
->ServerCertificateSubject
));
1836 status
= RpcQualityOfService_Create(SecurityQos
, TRUE
, &bind
->QOS
);
1837 if (status
!= RPC_S_OK
)
1842 if (bind
->QOS
) RpcQualityOfService_Release(bind
->QOS
);
1846 if (AuthnSvc
== RPC_C_AUTHN_DEFAULT
)
1847 AuthnSvc
= RPC_C_AUTHN_WINNT
;
1849 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1850 if (AuthnLevel
== RPC_C_AUTHN_LEVEL_DEFAULT
)
1851 AuthnLevel
= RPC_C_AUTHN_LEVEL_NONE
;
1853 if ((AuthnLevel
== RPC_C_AUTHN_LEVEL_NONE
) || (AuthnSvc
== RPC_C_AUTHN_NONE
))
1855 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1856 bind
->AuthInfo
= NULL
;
1860 if (AuthnLevel
> RPC_C_AUTHN_LEVEL_PKT_PRIVACY
)
1862 FIXME("unknown AuthnLevel %u\n", AuthnLevel
);
1863 return RPC_S_UNKNOWN_AUTHN_LEVEL
;
1866 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1867 if (AuthzSvr
&& AuthnSvc
!= RPC_C_AUTHN_WINNT
)
1869 FIXME("unsupported AuthzSvr %u\n", AuthzSvr
);
1870 return RPC_S_UNKNOWN_AUTHZ_SERVICE
;
1873 r
= EnumerateSecurityPackagesW(&package_count
, &packages
);
1876 ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n", r
);
1877 return RPC_S_SEC_PKG_ERROR
;
1880 for (i
= 0; i
< package_count
; i
++)
1881 if (packages
[i
].wRPCID
== AuthnSvc
)
1884 if (i
== package_count
)
1886 FIXME("unsupported AuthnSvc %u\n", AuthnSvc
);
1887 FreeContextBuffer(packages
);
1888 return RPC_S_UNKNOWN_AUTHN_SERVICE
;
1891 TRACE("found package %s for service %u\n", debugstr_w(packages
[i
].Name
), AuthnSvc
);
1892 r
= AcquireCredentialsHandleW(NULL
, packages
[i
].Name
, SECPKG_CRED_OUTBOUND
, NULL
,
1893 AuthIdentity
, NULL
, NULL
, &cred
, &exp
);
1894 cbMaxToken
= packages
[i
].cbMaxToken
;
1895 FreeContextBuffer(packages
);
1896 if (r
== ERROR_SUCCESS
)
1898 RpcAuthInfo
*new_auth_info
;
1899 r
= RpcAuthInfo_Create(AuthnLevel
, AuthnSvc
, cred
, exp
, cbMaxToken
,
1900 AuthIdentity
, &new_auth_info
);
1903 new_auth_info
->server_principal_name
= RPCRT4_strdupW(ServerPrincName
);
1904 if (!ServerPrincName
|| new_auth_info
->server_principal_name
)
1906 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1907 bind
->AuthInfo
= new_auth_info
;
1911 RpcAuthInfo_Release(new_auth_info
);
1912 r
= RPC_S_OUT_OF_MEMORY
;
1916 FreeCredentialsHandle(&cred
);
1921 ERR("AcquireCredentialsHandleW failed with error 0x%08x\n", r
);
1922 return RPC_S_SEC_PKG_ERROR
;
1926 /***********************************************************************
1927 * RpcBindingSetAuthInfoA (RPCRT4.@)
1929 RPCRTAPI RPC_STATUS RPC_ENTRY
1930 RpcBindingSetAuthInfoA( RPC_BINDING_HANDLE Binding
, RPC_CSTR ServerPrincName
, ULONG AuthnLevel
,
1931 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
)
1933 TRACE("%p %s %u %u %p %u\n", Binding
, debugstr_a((const char*)ServerPrincName
),
1934 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
);
1935 return RpcBindingSetAuthInfoExA(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, NULL
);
1938 /***********************************************************************
1939 * RpcBindingSetAuthInfoW (RPCRT4.@)
1941 RPCRTAPI RPC_STATUS RPC_ENTRY
1942 RpcBindingSetAuthInfoW( RPC_BINDING_HANDLE Binding
, RPC_WSTR ServerPrincName
, ULONG AuthnLevel
,
1943 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
)
1945 TRACE("%p %s %u %u %p %u\n", Binding
, debugstr_w(ServerPrincName
),
1946 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
);
1947 return RpcBindingSetAuthInfoExW(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, NULL
);
1950 /***********************************************************************
1951 * RpcBindingSetOption (RPCRT4.@)
1953 RPC_STATUS WINAPI
RpcBindingSetOption(RPC_BINDING_HANDLE BindingHandle
, ULONG Option
, ULONG_PTR OptionValue
)
1955 TRACE("(%p, %d, %ld)\n", BindingHandle
, Option
, OptionValue
);
1959 case RPC_C_OPT_COOKIE_AUTH
:
1961 RPC_C_OPT_COOKIE_AUTH_DESCRIPTOR
*cookie
= (RPC_C_OPT_COOKIE_AUTH_DESCRIPTOR
*)OptionValue
;
1962 RpcBinding
*binding
= BindingHandle
;
1963 int len
= MultiByteToWideChar(CP_ACP
, 0, cookie
->Buffer
, cookie
->BufferSize
, NULL
, 0);
1966 if (!(str
= HeapAlloc(GetProcessHeap(), 0, (len
+ 1) * sizeof(WCHAR
)))) return RPC_S_OUT_OF_MEMORY
;
1967 MultiByteToWideChar(CP_ACP
, 0, cookie
->Buffer
, cookie
->BufferSize
, str
, len
);
1969 HeapFree(GetProcessHeap(), 0, binding
->CookieAuth
);
1970 binding
->CookieAuth
= str
;
1974 FIXME("option %u not supported\n", Option
);
1980 /***********************************************************************
1981 * I_RpcBindingInqLocalClientPID (RPCRT4.@)
1984 RPC_STATUS WINAPI
I_RpcBindingInqLocalClientPID(RPC_BINDING_HANDLE ClientBinding
, ULONG
*ClientPID
)
1986 FIXME("%p %p: stub\n", ClientBinding
, ClientPID
);
1987 return RPC_S_INVALID_BINDING
;