push 5b66f3b36e7323272378316c923222b908f6e2d3
[wine/hacks.git] / dlls / rpcrt4 / rpc_binding.c
bloba439bc371deed650cd541c091e39eb270a1e2786
1 /*
2 * RPC binding API
4 * Copyright 2001 Ove Kåven, TransGaming Technologies
5 * Copyright 2003 Mike Hearn
6 * Copyright 2004 Filip Navara
7 * Copyright 2006 CodeWeavers
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
24 #include <stdarg.h>
25 #include <stdio.h>
26 #include <string.h>
27 #include <assert.h>
29 #include "windef.h"
30 #include "winbase.h"
31 #include "winnls.h"
32 #include "winerror.h"
33 #include "winternl.h"
34 #include "wine/unicode.h"
36 #include "rpc.h"
37 #include "rpcndr.h"
39 #include "wine/debug.h"
41 #include "rpc_binding.h"
42 #include "rpc_assoc.h"
44 WINE_DEFAULT_DEBUG_CHANNEL(rpc);
46 LPSTR RPCRT4_strndupA(LPCSTR src, INT slen)
48 DWORD len;
49 LPSTR s;
50 if (!src) return NULL;
51 if (slen == -1) slen = strlen(src);
52 len = slen;
53 s = HeapAlloc(GetProcessHeap(), 0, len+1);
54 memcpy(s, src, len);
55 s[len] = 0;
56 return s;
59 LPSTR RPCRT4_strdupWtoA(LPCWSTR src)
61 DWORD len;
62 LPSTR s;
63 if (!src) return NULL;
64 len = WideCharToMultiByte(CP_ACP, 0, src, -1, NULL, 0, NULL, NULL);
65 s = HeapAlloc(GetProcessHeap(), 0, len);
66 WideCharToMultiByte(CP_ACP, 0, src, -1, s, len, NULL, NULL);
67 return s;
70 LPWSTR RPCRT4_strdupAtoW(LPCSTR src)
72 DWORD len;
73 LPWSTR s;
74 if (!src) return NULL;
75 len = MultiByteToWideChar(CP_ACP, 0, src, -1, NULL, 0);
76 s = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR));
77 MultiByteToWideChar(CP_ACP, 0, src, -1, s, len);
78 return s;
81 static LPWSTR RPCRT4_strndupAtoW(LPCSTR src, INT slen)
83 DWORD len;
84 LPWSTR s;
85 if (!src) return NULL;
86 len = MultiByteToWideChar(CP_ACP, 0, src, slen, NULL, 0);
87 s = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR));
88 MultiByteToWideChar(CP_ACP, 0, src, slen, s, len);
89 return s;
92 LPWSTR RPCRT4_strndupW(LPCWSTR src, INT slen)
94 DWORD len;
95 LPWSTR s;
96 if (!src) return NULL;
97 if (slen == -1) slen = strlenW(src);
98 len = slen;
99 s = HeapAlloc(GetProcessHeap(), 0, (len+1)*sizeof(WCHAR));
100 memcpy(s, src, len*sizeof(WCHAR));
101 s[len] = 0;
102 return s;
105 void RPCRT4_strfree(LPSTR src)
107 HeapFree(GetProcessHeap(), 0, src);
110 static RPC_STATUS RPCRT4_AllocBinding(RpcBinding** Binding, BOOL server)
112 RpcBinding* NewBinding;
114 NewBinding = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcBinding));
115 NewBinding->refs = 1;
116 NewBinding->server = server;
118 *Binding = NewBinding;
120 return RPC_S_OK;
123 static RPC_STATUS RPCRT4_CreateBindingA(RpcBinding** Binding, BOOL server, LPCSTR Protseq)
125 RpcBinding* NewBinding;
127 RPCRT4_AllocBinding(&NewBinding, server);
128 NewBinding->Protseq = RPCRT4_strdupA(Protseq);
130 TRACE("binding: %p\n", NewBinding);
131 *Binding = NewBinding;
133 return RPC_S_OK;
136 static RPC_STATUS RPCRT4_CreateBindingW(RpcBinding** Binding, BOOL server, LPCWSTR Protseq)
138 RpcBinding* NewBinding;
140 RPCRT4_AllocBinding(&NewBinding, server);
141 NewBinding->Protseq = RPCRT4_strdupWtoA(Protseq);
143 TRACE("binding: %p\n", NewBinding);
144 *Binding = NewBinding;
146 return RPC_S_OK;
149 static RPC_STATUS RPCRT4_CompleteBindingA(RpcBinding* Binding, LPCSTR NetworkAddr,
150 LPCSTR Endpoint, LPCSTR NetworkOptions)
152 RPC_STATUS status;
154 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding,
155 debugstr_a(NetworkAddr), debugstr_a(Endpoint), debugstr_a(NetworkOptions));
157 RPCRT4_strfree(Binding->NetworkAddr);
158 Binding->NetworkAddr = RPCRT4_strdupA(NetworkAddr);
159 RPCRT4_strfree(Binding->Endpoint);
160 if (Endpoint) {
161 Binding->Endpoint = RPCRT4_strdupA(Endpoint);
162 } else {
163 Binding->Endpoint = RPCRT4_strdupA("");
165 HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions);
166 Binding->NetworkOptions = RPCRT4_strdupAtoW(NetworkOptions);
167 if (!Binding->Endpoint) ERR("out of memory?\n");
169 status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr,
170 Binding->Endpoint, Binding->NetworkOptions,
171 &Binding->Assoc);
172 if (status != RPC_S_OK)
173 return status;
175 return RPC_S_OK;
178 static RPC_STATUS RPCRT4_CompleteBindingW(RpcBinding* Binding, LPCWSTR NetworkAddr,
179 LPCWSTR Endpoint, LPCWSTR NetworkOptions)
181 RPC_STATUS status;
183 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding,
184 debugstr_w(NetworkAddr), debugstr_w(Endpoint), debugstr_w(NetworkOptions));
186 RPCRT4_strfree(Binding->NetworkAddr);
187 Binding->NetworkAddr = RPCRT4_strdupWtoA(NetworkAddr);
188 RPCRT4_strfree(Binding->Endpoint);
189 if (Endpoint) {
190 Binding->Endpoint = RPCRT4_strdupWtoA(Endpoint);
191 } else {
192 Binding->Endpoint = RPCRT4_strdupA("");
194 if (!Binding->Endpoint) ERR("out of memory?\n");
195 HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions);
196 Binding->NetworkOptions = RPCRT4_strdupW(NetworkOptions);
198 status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr,
199 Binding->Endpoint, Binding->NetworkOptions,
200 &Binding->Assoc);
201 if (status != RPC_S_OK)
202 return status;
204 return RPC_S_OK;
207 RPC_STATUS RPCRT4_ResolveBinding(RpcBinding* Binding, LPCSTR Endpoint)
209 RPC_STATUS status;
211 TRACE("(RpcBinding == ^%p, EndPoint == \"%s\"\n", Binding, Endpoint);
213 RPCRT4_strfree(Binding->Endpoint);
214 Binding->Endpoint = RPCRT4_strdupA(Endpoint);
216 RpcAssoc_Release(Binding->Assoc);
217 Binding->Assoc = NULL;
218 status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr,
219 Binding->Endpoint, Binding->NetworkOptions,
220 &Binding->Assoc);
221 if (status != RPC_S_OK)
222 return status;
224 return RPC_S_OK;
227 RPC_STATUS RPCRT4_SetBindingObject(RpcBinding* Binding, const UUID* ObjectUuid)
229 TRACE("(*RpcBinding == ^%p, UUID == %s)\n", Binding, debugstr_guid(ObjectUuid));
230 if (ObjectUuid) Binding->ObjectUuid = *ObjectUuid;
231 else UuidCreateNil(&Binding->ObjectUuid);
232 return RPC_S_OK;
235 RPC_STATUS RPCRT4_MakeBinding(RpcBinding** Binding, RpcConnection* Connection)
237 RpcBinding* NewBinding;
238 TRACE("(RpcBinding == ^%p, Connection == ^%p)\n", Binding, Connection);
240 RPCRT4_AllocBinding(&NewBinding, Connection->server);
241 NewBinding->Protseq = RPCRT4_strdupA(rpcrt4_conn_get_name(Connection));
242 NewBinding->NetworkAddr = RPCRT4_strdupA(Connection->NetworkAddr);
243 NewBinding->Endpoint = RPCRT4_strdupA(Connection->Endpoint);
244 NewBinding->FromConn = Connection;
246 TRACE("binding: %p\n", NewBinding);
247 *Binding = NewBinding;
249 return RPC_S_OK;
252 void RPCRT4_AddRefBinding(RpcBinding* Binding)
254 InterlockedIncrement(&Binding->refs);
257 RPC_STATUS RPCRT4_ReleaseBinding(RpcBinding* Binding)
259 if (InterlockedDecrement(&Binding->refs))
260 return RPC_S_OK;
262 TRACE("binding: %p\n", Binding);
263 if (Binding->Assoc) RpcAssoc_Release(Binding->Assoc);
264 RPCRT4_strfree(Binding->Endpoint);
265 RPCRT4_strfree(Binding->NetworkAddr);
266 RPCRT4_strfree(Binding->Protseq);
267 HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions);
268 if (Binding->AuthInfo) RpcAuthInfo_Release(Binding->AuthInfo);
269 if (Binding->QOS) RpcQualityOfService_Release(Binding->QOS);
270 HeapFree(GetProcessHeap(), 0, Binding);
271 return RPC_S_OK;
274 RPC_STATUS RPCRT4_OpenBinding(RpcBinding* Binding, RpcConnection** Connection,
275 const RPC_SYNTAX_IDENTIFIER *TransferSyntax,
276 const RPC_SYNTAX_IDENTIFIER *InterfaceId)
278 TRACE("(Binding == ^%p)\n", Binding);
280 if (!Binding->server) {
281 return RpcAssoc_GetClientConnection(Binding->Assoc, InterfaceId,
282 TransferSyntax, Binding->AuthInfo, Binding->QOS, Connection);
283 } else {
284 /* we already have a connection with acceptable binding, so use it */
285 if (Binding->FromConn) {
286 *Connection = Binding->FromConn;
287 return RPC_S_OK;
288 } else {
289 ERR("no connection in binding\n");
290 return RPC_S_INTERNAL_ERROR;
295 RPC_STATUS RPCRT4_CloseBinding(RpcBinding* Binding, RpcConnection* Connection)
297 TRACE("(Binding == ^%p)\n", Binding);
298 if (!Connection) return RPC_S_OK;
299 if (Binding->server) {
300 /* don't destroy a connection that is cached in the binding */
301 if (Binding->FromConn == Connection)
302 return RPC_S_OK;
303 return RPCRT4_DestroyConnection(Connection);
305 else {
306 RpcAssoc_ReleaseIdleConnection(Binding->Assoc, Connection);
307 return RPC_S_OK;
311 /* utility functions for string composing and parsing */
312 static unsigned RPCRT4_strcopyA(LPSTR data, LPCSTR src)
314 unsigned len = strlen(src);
315 memcpy(data, src, len*sizeof(CHAR));
316 return len;
319 static unsigned RPCRT4_strcopyW(LPWSTR data, LPCWSTR src)
321 unsigned len = strlenW(src);
322 memcpy(data, src, len*sizeof(WCHAR));
323 return len;
326 static LPSTR RPCRT4_strconcatA(LPSTR dst, LPCSTR src)
328 DWORD len = strlen(dst), slen = strlen(src);
329 LPSTR ndst = HeapReAlloc(GetProcessHeap(), 0, dst, (len+slen+2)*sizeof(CHAR));
330 if (!ndst)
332 HeapFree(GetProcessHeap(), 0, dst);
333 return NULL;
335 ndst[len] = ',';
336 memcpy(ndst+len+1, src, slen+1);
337 return ndst;
340 static LPWSTR RPCRT4_strconcatW(LPWSTR dst, LPCWSTR src)
342 DWORD len = strlenW(dst), slen = strlenW(src);
343 LPWSTR ndst = HeapReAlloc(GetProcessHeap(), 0, dst, (len+slen+2)*sizeof(WCHAR));
344 if (!ndst)
346 HeapFree(GetProcessHeap(), 0, dst);
347 return NULL;
349 ndst[len] = ',';
350 memcpy(ndst+len+1, src, (slen+1)*sizeof(WCHAR));
351 return ndst;
355 /***********************************************************************
356 * RpcStringBindingComposeA (RPCRT4.@)
358 RPC_STATUS WINAPI RpcStringBindingComposeA(RPC_CSTR ObjUuid, RPC_CSTR Protseq,
359 RPC_CSTR NetworkAddr, RPC_CSTR Endpoint,
360 RPC_CSTR Options, RPC_CSTR *StringBinding )
362 DWORD len = 1;
363 LPSTR data;
365 TRACE( "(%s,%s,%s,%s,%s,%p)\n",
366 debugstr_a( (char*)ObjUuid ), debugstr_a( (char*)Protseq ),
367 debugstr_a( (char*)NetworkAddr ), debugstr_a( (char*)Endpoint ),
368 debugstr_a( (char*)Options ), StringBinding );
370 if (ObjUuid && *ObjUuid) len += strlen((char*)ObjUuid) + 1;
371 if (Protseq && *Protseq) len += strlen((char*)Protseq) + 1;
372 if (NetworkAddr && *NetworkAddr) len += strlen((char*)NetworkAddr);
373 if (Endpoint && *Endpoint) len += strlen((char*)Endpoint) + 2;
374 if (Options && *Options) len += strlen((char*)Options) + 2;
376 data = HeapAlloc(GetProcessHeap(), 0, len);
377 *StringBinding = (unsigned char*)data;
379 if (ObjUuid && *ObjUuid) {
380 data += RPCRT4_strcopyA(data, (char*)ObjUuid);
381 *data++ = '@';
383 if (Protseq && *Protseq) {
384 data += RPCRT4_strcopyA(data, (char*)Protseq);
385 *data++ = ':';
387 if (NetworkAddr && *NetworkAddr)
388 data += RPCRT4_strcopyA(data, (char*)NetworkAddr);
390 if ((Endpoint && *Endpoint) ||
391 (Options && *Options)) {
392 *data++ = '[';
393 if (Endpoint && *Endpoint) {
394 data += RPCRT4_strcopyA(data, (char*)Endpoint);
395 if (Options && *Options) *data++ = ',';
397 if (Options && *Options) {
398 data += RPCRT4_strcopyA(data, (char*)Options);
400 *data++ = ']';
402 *data = 0;
404 return RPC_S_OK;
407 /***********************************************************************
408 * RpcStringBindingComposeW (RPCRT4.@)
410 RPC_STATUS WINAPI RpcStringBindingComposeW( RPC_WSTR ObjUuid, RPC_WSTR Protseq,
411 RPC_WSTR NetworkAddr, RPC_WSTR Endpoint,
412 RPC_WSTR Options, RPC_WSTR* StringBinding )
414 DWORD len = 1;
415 RPC_WSTR data;
417 TRACE("(%s,%s,%s,%s,%s,%p)\n",
418 debugstr_w( ObjUuid ), debugstr_w( Protseq ),
419 debugstr_w( NetworkAddr ), debugstr_w( Endpoint ),
420 debugstr_w( Options ), StringBinding);
422 if (ObjUuid && *ObjUuid) len += strlenW(ObjUuid) + 1;
423 if (Protseq && *Protseq) len += strlenW(Protseq) + 1;
424 if (NetworkAddr && *NetworkAddr) len += strlenW(NetworkAddr);
425 if (Endpoint && *Endpoint) len += strlenW(Endpoint) + 2;
426 if (Options && *Options) len += strlenW(Options) + 2;
428 data = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR));
429 *StringBinding = data;
431 if (ObjUuid && *ObjUuid) {
432 data += RPCRT4_strcopyW(data, ObjUuid);
433 *data++ = '@';
435 if (Protseq && *Protseq) {
436 data += RPCRT4_strcopyW(data, Protseq);
437 *data++ = ':';
439 if (NetworkAddr && *NetworkAddr) {
440 data += RPCRT4_strcopyW(data, NetworkAddr);
442 if ((Endpoint && *Endpoint) ||
443 (Options && *Options)) {
444 *data++ = '[';
445 if (Endpoint && *Endpoint) {
446 data += RPCRT4_strcopyW(data, Endpoint);
447 if (Options && *Options) *data++ = ',';
449 if (Options && *Options) {
450 data += RPCRT4_strcopyW(data, Options);
452 *data++ = ']';
454 *data = 0;
456 return RPC_S_OK;
460 /***********************************************************************
461 * RpcStringBindingParseA (RPCRT4.@)
463 RPC_STATUS WINAPI RpcStringBindingParseA( RPC_CSTR StringBinding, RPC_CSTR *ObjUuid,
464 RPC_CSTR *Protseq, RPC_CSTR *NetworkAddr,
465 RPC_CSTR *Endpoint, RPC_CSTR *Options)
467 CHAR *data, *next;
468 static const char ep_opt[] = "endpoint=";
469 BOOL endpoint_already_found = FALSE;
471 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_a((char*)StringBinding),
472 ObjUuid, Protseq, NetworkAddr, Endpoint, Options);
474 if (ObjUuid) *ObjUuid = NULL;
475 if (Protseq) *Protseq = NULL;
476 if (NetworkAddr) *NetworkAddr = NULL;
477 if (Endpoint) *Endpoint = NULL;
478 if (Options) *Options = NULL;
480 data = (char*) StringBinding;
482 next = strchr(data, '@');
483 if (next) {
484 UUID uuid;
485 RPC_STATUS status;
486 RPC_CSTR str_uuid = (unsigned char*)RPCRT4_strndupA(data, next - data);
487 status = UuidFromStringA(str_uuid, &uuid);
488 if (status != RPC_S_OK) {
489 HeapFree(GetProcessHeap(), 0, str_uuid);
490 return status;
492 if (ObjUuid)
493 *ObjUuid = str_uuid;
494 else
495 HeapFree(GetProcessHeap(), 0, str_uuid);
496 data = next+1;
499 next = strchr(data, ':');
500 if (next) {
501 if (Protseq) *Protseq = (unsigned char*)RPCRT4_strndupA(data, next - data);
502 data = next+1;
505 next = strchr(data, '[');
506 if (next) {
507 CHAR *close, *opt;
509 if (NetworkAddr) *NetworkAddr = (unsigned char*)RPCRT4_strndupA(data, next - data);
510 data = next+1;
511 close = strchr(data, ']');
512 if (!close) goto fail;
514 /* tokenize options */
515 while (data < close) {
516 next = strchr(data, ',');
517 if (!next || next > close) next = close;
518 /* FIXME: this is kind of inefficient */
519 opt = RPCRT4_strndupA(data, next - data);
520 data = next+1;
522 /* parse option */
523 next = strchr(opt, '=');
524 if (!next) {
525 /* not an option, must be an endpoint */
526 if (endpoint_already_found) goto fail;
527 if (Endpoint) *Endpoint = (unsigned char*) opt;
528 else HeapFree(GetProcessHeap(), 0, opt);
529 endpoint_already_found = TRUE;
530 } else {
531 if (strncmp(opt, ep_opt, strlen(ep_opt)) == 0) {
532 /* endpoint option */
533 if (endpoint_already_found) goto fail;
534 if (Endpoint) *Endpoint = (unsigned char*) RPCRT4_strdupA(next+1);
535 HeapFree(GetProcessHeap(), 0, opt);
536 endpoint_already_found = TRUE;
537 } else {
538 /* network option */
539 if (Options) {
540 if (*Options) {
541 /* FIXME: this is kind of inefficient */
542 *Options = (unsigned char*) RPCRT4_strconcatA( (char*)*Options, opt);
543 HeapFree(GetProcessHeap(), 0, opt);
544 } else
545 *Options = (unsigned char*) opt;
546 } else
547 HeapFree(GetProcessHeap(), 0, opt);
552 data = close+1;
553 if (*data) goto fail;
555 else if (NetworkAddr)
556 *NetworkAddr = (unsigned char*)RPCRT4_strdupA(data);
558 return RPC_S_OK;
560 fail:
561 if (ObjUuid) RpcStringFreeA((unsigned char**)ObjUuid);
562 if (Protseq) RpcStringFreeA((unsigned char**)Protseq);
563 if (NetworkAddr) RpcStringFreeA((unsigned char**)NetworkAddr);
564 if (Endpoint) RpcStringFreeA((unsigned char**)Endpoint);
565 if (Options) RpcStringFreeA((unsigned char**)Options);
566 return RPC_S_INVALID_STRING_BINDING;
569 /***********************************************************************
570 * RpcStringBindingParseW (RPCRT4.@)
572 RPC_STATUS WINAPI RpcStringBindingParseW( RPC_WSTR StringBinding, RPC_WSTR *ObjUuid,
573 RPC_WSTR *Protseq, RPC_WSTR *NetworkAddr,
574 RPC_WSTR *Endpoint, RPC_WSTR *Options)
576 WCHAR *data, *next;
577 static const WCHAR ep_opt[] = {'e','n','d','p','o','i','n','t','=',0};
578 BOOL endpoint_already_found = FALSE;
580 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_w(StringBinding),
581 ObjUuid, Protseq, NetworkAddr, Endpoint, Options);
583 if (ObjUuid) *ObjUuid = NULL;
584 if (Protseq) *Protseq = NULL;
585 if (NetworkAddr) *NetworkAddr = NULL;
586 if (Endpoint) *Endpoint = NULL;
587 if (Options) *Options = NULL;
589 data = StringBinding;
591 next = strchrW(data, '@');
592 if (next) {
593 UUID uuid;
594 RPC_STATUS status;
595 RPC_WSTR str_uuid = RPCRT4_strndupW(data, next - data);
596 status = UuidFromStringW(str_uuid, &uuid);
597 if (status != RPC_S_OK) {
598 HeapFree(GetProcessHeap(), 0, str_uuid);
599 return status;
601 if (ObjUuid)
602 *ObjUuid = str_uuid;
603 else
604 HeapFree(GetProcessHeap(), 0, str_uuid);
605 data = next+1;
608 next = strchrW(data, ':');
609 if (next) {
610 if (Protseq) *Protseq = RPCRT4_strndupW(data, next - data);
611 data = next+1;
614 next = strchrW(data, '[');
615 if (next) {
616 WCHAR *close, *opt;
618 if (NetworkAddr) *NetworkAddr = RPCRT4_strndupW(data, next - data);
619 data = next+1;
620 close = strchrW(data, ']');
621 if (!close) goto fail;
623 /* tokenize options */
624 while (data < close) {
625 next = strchrW(data, ',');
626 if (!next || next > close) next = close;
627 /* FIXME: this is kind of inefficient */
628 opt = RPCRT4_strndupW(data, next - data);
629 data = next+1;
631 /* parse option */
632 next = strchrW(opt, '=');
633 if (!next) {
634 /* not an option, must be an endpoint */
635 if (endpoint_already_found) goto fail;
636 if (Endpoint) *Endpoint = opt;
637 else HeapFree(GetProcessHeap(), 0, opt);
638 endpoint_already_found = TRUE;
639 } else {
640 if (strncmpW(opt, ep_opt, strlenW(ep_opt)) == 0) {
641 /* endpoint option */
642 if (endpoint_already_found) goto fail;
643 if (Endpoint) *Endpoint = RPCRT4_strdupW(next+1);
644 HeapFree(GetProcessHeap(), 0, opt);
645 endpoint_already_found = TRUE;
646 } else {
647 /* network option */
648 if (Options) {
649 if (*Options) {
650 /* FIXME: this is kind of inefficient */
651 *Options = RPCRT4_strconcatW(*Options, opt);
652 HeapFree(GetProcessHeap(), 0, opt);
653 } else
654 *Options = opt;
655 } else
656 HeapFree(GetProcessHeap(), 0, opt);
661 data = close+1;
662 if (*data) goto fail;
663 } else if (NetworkAddr)
664 *NetworkAddr = RPCRT4_strdupW(data);
666 return RPC_S_OK;
668 fail:
669 if (ObjUuid) RpcStringFreeW(ObjUuid);
670 if (Protseq) RpcStringFreeW(Protseq);
671 if (NetworkAddr) RpcStringFreeW(NetworkAddr);
672 if (Endpoint) RpcStringFreeW(Endpoint);
673 if (Options) RpcStringFreeW(Options);
674 return RPC_S_INVALID_STRING_BINDING;
677 /***********************************************************************
678 * RpcBindingFree (RPCRT4.@)
680 RPC_STATUS WINAPI RpcBindingFree( RPC_BINDING_HANDLE* Binding )
682 RPC_STATUS status;
683 TRACE("(%p) = %p\n", Binding, *Binding);
684 status = RPCRT4_ReleaseBinding(*Binding);
685 if (status == RPC_S_OK) *Binding = 0;
686 return status;
689 /***********************************************************************
690 * RpcBindingVectorFree (RPCRT4.@)
692 RPC_STATUS WINAPI RpcBindingVectorFree( RPC_BINDING_VECTOR** BindingVector )
694 RPC_STATUS status;
695 unsigned long c;
697 TRACE("(%p)\n", BindingVector);
698 for (c=0; c<(*BindingVector)->Count; c++) {
699 status = RpcBindingFree(&(*BindingVector)->BindingH[c]);
701 HeapFree(GetProcessHeap(), 0, *BindingVector);
702 *BindingVector = NULL;
703 return RPC_S_OK;
706 /***********************************************************************
707 * RpcBindingInqObject (RPCRT4.@)
709 RPC_STATUS WINAPI RpcBindingInqObject( RPC_BINDING_HANDLE Binding, UUID* ObjectUuid )
711 RpcBinding* bind = (RpcBinding*)Binding;
713 TRACE("(%p,%p) = %s\n", Binding, ObjectUuid, debugstr_guid(&bind->ObjectUuid));
714 *ObjectUuid = bind->ObjectUuid;
715 return RPC_S_OK;
718 /***********************************************************************
719 * RpcBindingSetObject (RPCRT4.@)
721 RPC_STATUS WINAPI RpcBindingSetObject( RPC_BINDING_HANDLE Binding, UUID* ObjectUuid )
723 RpcBinding* bind = (RpcBinding*)Binding;
725 TRACE("(%p,%s)\n", Binding, debugstr_guid(ObjectUuid));
726 if (bind->server) return RPC_S_WRONG_KIND_OF_BINDING;
727 return RPCRT4_SetBindingObject(Binding, ObjectUuid);
730 /***********************************************************************
731 * RpcBindingFromStringBindingA (RPCRT4.@)
733 RPC_STATUS WINAPI RpcBindingFromStringBindingA( RPC_CSTR StringBinding, RPC_BINDING_HANDLE* Binding )
735 RPC_STATUS ret;
736 RpcBinding* bind = NULL;
737 RPC_CSTR ObjectUuid, Protseq, NetworkAddr, Endpoint, Options;
738 UUID Uuid;
740 TRACE("(%s,%p)\n", debugstr_a((char*)StringBinding), Binding);
742 ret = RpcStringBindingParseA(StringBinding, &ObjectUuid, &Protseq,
743 &NetworkAddr, &Endpoint, &Options);
744 if (ret != RPC_S_OK) return ret;
746 ret = UuidFromStringA(ObjectUuid, &Uuid);
748 if (ret == RPC_S_OK)
749 ret = RPCRT4_CreateBindingA(&bind, FALSE, (char*)Protseq);
750 if (ret != RPC_S_OK) return ret;
751 ret = RPCRT4_SetBindingObject(bind, &Uuid);
752 if (ret == RPC_S_OK)
753 ret = RPCRT4_CompleteBindingA(bind, (char*)NetworkAddr, (char*)Endpoint, (char*)Options);
755 RpcStringFreeA((unsigned char**)&Options);
756 RpcStringFreeA((unsigned char**)&Endpoint);
757 RpcStringFreeA((unsigned char**)&NetworkAddr);
758 RpcStringFreeA((unsigned char**)&Protseq);
759 RpcStringFreeA((unsigned char**)&ObjectUuid);
761 if (ret == RPC_S_OK)
762 *Binding = (RPC_BINDING_HANDLE)bind;
763 else
764 RPCRT4_ReleaseBinding(bind);
766 return ret;
769 /***********************************************************************
770 * RpcBindingFromStringBindingW (RPCRT4.@)
772 RPC_STATUS WINAPI RpcBindingFromStringBindingW( RPC_WSTR StringBinding, RPC_BINDING_HANDLE* Binding )
774 RPC_STATUS ret;
775 RpcBinding* bind = NULL;
776 RPC_WSTR ObjectUuid, Protseq, NetworkAddr, Endpoint, Options;
777 UUID Uuid;
779 TRACE("(%s,%p)\n", debugstr_w(StringBinding), Binding);
781 ret = RpcStringBindingParseW(StringBinding, &ObjectUuid, &Protseq,
782 &NetworkAddr, &Endpoint, &Options);
783 if (ret != RPC_S_OK) return ret;
785 ret = UuidFromStringW(ObjectUuid, &Uuid);
787 if (ret == RPC_S_OK)
788 ret = RPCRT4_CreateBindingW(&bind, FALSE, Protseq);
789 if (ret != RPC_S_OK) return ret;
790 ret = RPCRT4_SetBindingObject(bind, &Uuid);
791 if (ret == RPC_S_OK)
792 ret = RPCRT4_CompleteBindingW(bind, NetworkAddr, Endpoint, Options);
794 RpcStringFreeW(&Options);
795 RpcStringFreeW(&Endpoint);
796 RpcStringFreeW(&NetworkAddr);
797 RpcStringFreeW(&Protseq);
798 RpcStringFreeW(&ObjectUuid);
800 if (ret == RPC_S_OK)
801 *Binding = (RPC_BINDING_HANDLE)bind;
802 else
803 RPCRT4_ReleaseBinding(bind);
805 return ret;
808 /***********************************************************************
809 * RpcBindingToStringBindingA (RPCRT4.@)
811 RPC_STATUS WINAPI RpcBindingToStringBindingA( RPC_BINDING_HANDLE Binding, RPC_CSTR *StringBinding )
813 RPC_STATUS ret;
814 RpcBinding* bind = (RpcBinding*)Binding;
815 RPC_CSTR ObjectUuid;
817 TRACE("(%p,%p)\n", Binding, StringBinding);
819 ret = UuidToStringA(&bind->ObjectUuid, &ObjectUuid);
820 if (ret != RPC_S_OK) return ret;
822 ret = RpcStringBindingComposeA(ObjectUuid, (unsigned char*)bind->Protseq, (unsigned char*) bind->NetworkAddr,
823 (unsigned char*) bind->Endpoint, NULL, StringBinding);
825 RpcStringFreeA(&ObjectUuid);
827 return ret;
830 /***********************************************************************
831 * RpcBindingToStringBindingW (RPCRT4.@)
833 RPC_STATUS WINAPI RpcBindingToStringBindingW( RPC_BINDING_HANDLE Binding, RPC_WSTR *StringBinding )
835 RPC_STATUS ret;
836 unsigned char *str = NULL;
837 TRACE("(%p,%p)\n", Binding, StringBinding);
838 ret = RpcBindingToStringBindingA(Binding, &str);
839 *StringBinding = RPCRT4_strdupAtoW((char*)str);
840 RpcStringFreeA((unsigned char**)&str);
841 return ret;
844 /***********************************************************************
845 * I_RpcBindingInqTransportType (RPCRT4.@)
847 RPC_STATUS WINAPI I_RpcBindingInqTransportType( RPC_BINDING_HANDLE Binding, unsigned int * Type )
850 FIXME( "(%p,%p): stub\n", Binding, Type);
851 *Type = TRANSPORT_TYPE_LPC;
852 return RPC_S_OK;
855 /***********************************************************************
856 * I_RpcBindingSetAsync (RPCRT4.@)
857 * NOTES
858 * Exists in win9x and winNT, but with different number of arguments
859 * (9x version has 3 arguments, NT has 2).
861 RPC_STATUS WINAPI I_RpcBindingSetAsync( RPC_BINDING_HANDLE Binding, RPC_BLOCKING_FN BlockingFn)
863 RpcBinding* bind = (RpcBinding*)Binding;
865 TRACE( "(%p,%p): stub\n", Binding, BlockingFn );
867 bind->BlockingFn = BlockingFn;
869 return RPC_S_OK;
872 /***********************************************************************
873 * RpcBindingCopy (RPCRT4.@)
875 RPC_STATUS RPC_ENTRY RpcBindingCopy(
876 RPC_BINDING_HANDLE SourceBinding,
877 RPC_BINDING_HANDLE* DestinationBinding)
879 RpcBinding *DestBinding;
880 RpcBinding *SrcBinding = (RpcBinding*)SourceBinding;
881 RPC_STATUS status;
883 TRACE("(%p, %p)\n", SourceBinding, DestinationBinding);
885 status = RPCRT4_AllocBinding(&DestBinding, SrcBinding->server);
886 if (status != RPC_S_OK) return status;
888 DestBinding->ObjectUuid = SrcBinding->ObjectUuid;
889 DestBinding->BlockingFn = SrcBinding->BlockingFn;
890 DestBinding->Protseq = RPCRT4_strndupA(SrcBinding->Protseq, -1);
891 DestBinding->NetworkAddr = RPCRT4_strndupA(SrcBinding->NetworkAddr, -1);
892 DestBinding->Endpoint = RPCRT4_strndupA(SrcBinding->Endpoint, -1);
893 DestBinding->NetworkOptions = RPCRT4_strdupW(SrcBinding->NetworkOptions);
894 if (SrcBinding->Assoc) SrcBinding->Assoc->refs++;
895 DestBinding->Assoc = SrcBinding->Assoc;
897 if (SrcBinding->AuthInfo) RpcAuthInfo_AddRef(SrcBinding->AuthInfo);
898 DestBinding->AuthInfo = SrcBinding->AuthInfo;
899 if (SrcBinding->QOS) RpcQualityOfService_AddRef(SrcBinding->QOS);
900 DestBinding->QOS = SrcBinding->QOS;
902 *DestinationBinding = DestBinding;
903 return RPC_S_OK;
906 /***********************************************************************
907 * RpcImpersonateClient (RPCRT4.@)
909 * Impersonates the client connected via a binding handle so that security
910 * checks are done in the context of the client.
912 * PARAMS
913 * BindingHandle [I] Handle to the binding to the client.
915 * RETURNS
916 * Success: RPS_S_OK.
917 * Failure: RPC_STATUS value.
919 * NOTES
921 * If BindingHandle is NULL then the function impersonates the client
922 * connected to the binding handle of the current thread.
924 RPC_STATUS WINAPI RpcImpersonateClient(RPC_BINDING_HANDLE BindingHandle)
926 FIXME("(%p): stub\n", BindingHandle);
927 ImpersonateSelf(SecurityImpersonation);
928 return RPC_S_OK;
931 /***********************************************************************
932 * RpcRevertToSelfEx (RPCRT4.@)
934 * Stops impersonating the client connected to the binding handle so that security
935 * checks are no longer done in the context of the client.
937 * PARAMS
938 * BindingHandle [I] Handle to the binding to the client.
940 * RETURNS
941 * Success: RPS_S_OK.
942 * Failure: RPC_STATUS value.
944 * NOTES
946 * If BindingHandle is NULL then the function stops impersonating the client
947 * connected to the binding handle of the current thread.
949 RPC_STATUS WINAPI RpcRevertToSelfEx(RPC_BINDING_HANDLE BindingHandle)
951 FIXME("(%p): stub\n", BindingHandle);
952 return RPC_S_OK;
955 static inline BOOL has_nt_auth_identity(ULONG AuthnLevel)
957 switch (AuthnLevel)
959 case RPC_C_AUTHN_GSS_NEGOTIATE:
960 case RPC_C_AUTHN_WINNT:
961 case RPC_C_AUTHN_GSS_KERBEROS:
962 return TRUE;
963 default:
964 return FALSE;
968 static RPC_STATUS RpcAuthInfo_Create(ULONG AuthnLevel, ULONG AuthnSvc,
969 CredHandle cred, TimeStamp exp,
970 ULONG cbMaxToken,
971 RPC_AUTH_IDENTITY_HANDLE identity,
972 RpcAuthInfo **ret)
974 RpcAuthInfo *AuthInfo = HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo));
975 if (!AuthInfo)
976 return ERROR_OUTOFMEMORY;
978 AuthInfo->refs = 1;
979 AuthInfo->AuthnLevel = AuthnLevel;
980 AuthInfo->AuthnSvc = AuthnSvc;
981 AuthInfo->cred = cred;
982 AuthInfo->exp = exp;
983 AuthInfo->cbMaxToken = cbMaxToken;
984 AuthInfo->identity = identity;
985 AuthInfo->server_principal_name = NULL;
987 /* duplicate the SEC_WINNT_AUTH_IDENTITY structure, if applicable, to
988 * enable better matching in RpcAuthInfo_IsEqual */
989 if (identity && has_nt_auth_identity(AuthnSvc))
991 const SEC_WINNT_AUTH_IDENTITY_W *nt_identity = identity;
992 AuthInfo->nt_identity = HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo->nt_identity));
993 if (!AuthInfo->nt_identity)
995 HeapFree(GetProcessHeap(), 0, AuthInfo);
996 return ERROR_OUTOFMEMORY;
999 AuthInfo->nt_identity->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
1000 if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE)
1001 AuthInfo->nt_identity->User = RPCRT4_strndupW(nt_identity->User, nt_identity->UserLength);
1002 else
1003 AuthInfo->nt_identity->User = RPCRT4_strndupAtoW((const char *)nt_identity->User, nt_identity->UserLength);
1004 AuthInfo->nt_identity->UserLength = nt_identity->UserLength;
1005 if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE)
1006 AuthInfo->nt_identity->Domain = RPCRT4_strndupW(nt_identity->Domain, nt_identity->DomainLength);
1007 else
1008 AuthInfo->nt_identity->Domain = RPCRT4_strndupAtoW((const char *)nt_identity->Domain, nt_identity->DomainLength);
1009 AuthInfo->nt_identity->DomainLength = nt_identity->DomainLength;
1010 if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE)
1011 AuthInfo->nt_identity->Password = RPCRT4_strndupW(nt_identity->Password, nt_identity->PasswordLength);
1012 else
1013 AuthInfo->nt_identity->Password = RPCRT4_strndupAtoW((const char *)nt_identity->Password, nt_identity->PasswordLength);
1014 AuthInfo->nt_identity->PasswordLength = nt_identity->PasswordLength;
1016 if ((nt_identity->User && !AuthInfo->nt_identity->User) ||
1017 (nt_identity->Domain && !AuthInfo->nt_identity->Domain) ||
1018 (nt_identity->Password && !AuthInfo->nt_identity->Password))
1020 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->User);
1021 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Domain);
1022 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Password);
1023 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity);
1024 HeapFree(GetProcessHeap(), 0, AuthInfo);
1025 return ERROR_OUTOFMEMORY;
1028 else
1029 AuthInfo->nt_identity = NULL;
1030 *ret = AuthInfo;
1031 return RPC_S_OK;
1034 ULONG RpcAuthInfo_AddRef(RpcAuthInfo *AuthInfo)
1036 return InterlockedIncrement(&AuthInfo->refs);
1039 ULONG RpcAuthInfo_Release(RpcAuthInfo *AuthInfo)
1041 ULONG refs = InterlockedDecrement(&AuthInfo->refs);
1043 if (!refs)
1045 FreeCredentialsHandle(&AuthInfo->cred);
1046 if (AuthInfo->nt_identity)
1048 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->User);
1049 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Domain);
1050 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Password);
1051 HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity);
1053 HeapFree(GetProcessHeap(), 0, AuthInfo->server_principal_name);
1054 HeapFree(GetProcessHeap(), 0, AuthInfo);
1057 return refs;
1060 BOOL RpcAuthInfo_IsEqual(const RpcAuthInfo *AuthInfo1, const RpcAuthInfo *AuthInfo2)
1062 if (AuthInfo1 == AuthInfo2)
1063 return TRUE;
1065 if (!AuthInfo1 || !AuthInfo2)
1066 return FALSE;
1068 if ((AuthInfo1->AuthnLevel != AuthInfo2->AuthnLevel) ||
1069 (AuthInfo1->AuthnSvc != AuthInfo2->AuthnSvc))
1070 return FALSE;
1072 if (AuthInfo1->identity == AuthInfo2->identity)
1073 return TRUE;
1075 if (!AuthInfo1->identity || !AuthInfo2->identity)
1076 return FALSE;
1078 if (has_nt_auth_identity(AuthInfo1->AuthnSvc))
1080 const SEC_WINNT_AUTH_IDENTITY_W *identity1 = AuthInfo1->nt_identity;
1081 const SEC_WINNT_AUTH_IDENTITY_W *identity2 = AuthInfo2->nt_identity;
1082 /* compare user names */
1083 if (identity1->UserLength != identity2->UserLength ||
1084 memcmp(identity1->User, identity2->User, identity1->UserLength))
1085 return FALSE;
1086 /* compare domain names */
1087 if (identity1->DomainLength != identity2->DomainLength ||
1088 memcmp(identity1->Domain, identity2->Domain, identity1->DomainLength))
1089 return FALSE;
1090 /* compare passwords */
1091 if (identity1->PasswordLength != identity2->PasswordLength ||
1092 memcmp(identity1->Password, identity2->Password, identity1->PasswordLength))
1093 return FALSE;
1095 else
1096 return FALSE;
1098 return TRUE;
1101 static RPC_STATUS RpcQualityOfService_Create(const RPC_SECURITY_QOS *qos_src, BOOL unicode, RpcQualityOfService **qos_dst)
1103 RpcQualityOfService *qos = HeapAlloc(GetProcessHeap(), 0, sizeof(*qos));
1105 if (!qos)
1106 return RPC_S_OUT_OF_RESOURCES;
1108 qos->refs = 1;
1109 qos->qos = HeapAlloc(GetProcessHeap(), 0, sizeof(*qos->qos));
1110 if (!qos->qos) goto error;
1111 qos->qos->Version = qos_src->Version;
1112 qos->qos->Capabilities = qos_src->Capabilities;
1113 qos->qos->IdentityTracking = qos_src->IdentityTracking;
1114 qos->qos->ImpersonationType = qos_src->ImpersonationType;
1115 qos->qos->AdditionalSecurityInfoType = 0;
1117 if (qos_src->Version >= 2)
1119 const RPC_SECURITY_QOS_V2_W *qos_src2 = (const RPC_SECURITY_QOS_V2_W *)qos_src;
1120 qos->qos->AdditionalSecurityInfoType = qos_src2->AdditionalSecurityInfoType;
1121 if (qos_src2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP)
1123 const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials_src = qos_src2->u.HttpCredentials;
1124 RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials_dst;
1126 http_credentials_dst = HeapAlloc(GetProcessHeap(), 0, sizeof(*http_credentials_dst));
1127 qos->qos->u.HttpCredentials = http_credentials_dst;
1128 if (!http_credentials_dst) goto error;
1129 http_credentials_dst->TransportCredentials = NULL;
1130 http_credentials_dst->Flags = http_credentials_src->Flags;
1131 http_credentials_dst->AuthenticationTarget = http_credentials_src->AuthenticationTarget;
1132 http_credentials_dst->NumberOfAuthnSchemes = http_credentials_src->NumberOfAuthnSchemes;
1133 http_credentials_dst->AuthnSchemes = NULL;
1134 http_credentials_dst->ServerCertificateSubject = NULL;
1135 if (http_credentials_src->TransportCredentials)
1137 SEC_WINNT_AUTH_IDENTITY_W *cred_dst;
1138 cred_dst = http_credentials_dst->TransportCredentials = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*cred_dst));
1139 if (!cred_dst) goto error;
1140 cred_dst->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE;
1141 if (unicode)
1143 const SEC_WINNT_AUTH_IDENTITY_W *cred_src = http_credentials_src->TransportCredentials;
1144 cred_dst->UserLength = cred_src->UserLength;
1145 cred_dst->PasswordLength = cred_src->PasswordLength;
1146 cred_dst->DomainLength = cred_src->DomainLength;
1147 cred_dst->User = RPCRT4_strndupW(cred_src->User, cred_src->UserLength);
1148 cred_dst->Password = RPCRT4_strndupW(cred_src->Password, cred_src->PasswordLength);
1149 cred_dst->Domain = RPCRT4_strndupW(cred_src->Domain, cred_src->DomainLength);
1151 else
1153 const SEC_WINNT_AUTH_IDENTITY_A *cred_src = (const SEC_WINNT_AUTH_IDENTITY_A *)http_credentials_src->TransportCredentials;
1154 cred_dst->UserLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->User, cred_src->UserLength, NULL, 0);
1155 cred_dst->DomainLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Domain, cred_src->DomainLength, NULL, 0);
1156 cred_dst->PasswordLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Password, cred_src->PasswordLength, NULL, 0);
1157 cred_dst->User = HeapAlloc(GetProcessHeap(), 0, cred_dst->UserLength * sizeof(WCHAR));
1158 cred_dst->Password = HeapAlloc(GetProcessHeap(), 0, cred_dst->PasswordLength * sizeof(WCHAR));
1159 cred_dst->Domain = HeapAlloc(GetProcessHeap(), 0, cred_dst->DomainLength * sizeof(WCHAR));
1160 if (!cred_dst || !cred_dst->Password || !cred_dst->Domain) goto error;
1161 MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->User, cred_src->UserLength, cred_dst->User, cred_dst->UserLength);
1162 MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Domain, cred_src->DomainLength, cred_dst->Domain, cred_dst->DomainLength);
1163 MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Password, cred_src->PasswordLength, cred_dst->Password, cred_dst->PasswordLength);
1166 if (http_credentials_src->NumberOfAuthnSchemes)
1168 http_credentials_dst->AuthnSchemes = HeapAlloc(GetProcessHeap(), 0, http_credentials_src->NumberOfAuthnSchemes * sizeof(*http_credentials_dst->AuthnSchemes));
1169 if (!http_credentials_dst->AuthnSchemes) goto error;
1170 memcpy(http_credentials_dst->AuthnSchemes, http_credentials_src->AuthnSchemes, http_credentials_src->NumberOfAuthnSchemes * sizeof(*http_credentials_dst->AuthnSchemes));
1172 if (http_credentials_src->ServerCertificateSubject)
1174 if (unicode)
1175 http_credentials_dst->ServerCertificateSubject =
1176 RPCRT4_strndupW(http_credentials_src->ServerCertificateSubject,
1177 strlenW(http_credentials_src->ServerCertificateSubject));
1178 else
1179 http_credentials_dst->ServerCertificateSubject =
1180 RPCRT4_strdupAtoW((char *)http_credentials_src->ServerCertificateSubject);
1181 if (!http_credentials_dst->ServerCertificateSubject) goto error;
1185 *qos_dst = qos;
1186 return RPC_S_OK;
1188 error:
1189 if (qos->qos)
1191 if (qos->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP &&
1192 qos->qos->u.HttpCredentials)
1194 if (qos->qos->u.HttpCredentials->TransportCredentials)
1196 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->User);
1197 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Domain);
1198 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Password);
1199 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials);
1201 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->AuthnSchemes);
1202 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->ServerCertificateSubject);
1203 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials);
1205 HeapFree(GetProcessHeap(), 0, qos->qos);
1207 HeapFree(GetProcessHeap(), 0, qos);
1208 return RPC_S_OUT_OF_RESOURCES;
1211 ULONG RpcQualityOfService_AddRef(RpcQualityOfService *qos)
1213 return InterlockedIncrement(&qos->refs);
1216 ULONG RpcQualityOfService_Release(RpcQualityOfService *qos)
1218 ULONG refs = InterlockedDecrement(&qos->refs);
1220 if (!refs)
1222 if (qos->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP)
1224 if (qos->qos->u.HttpCredentials->TransportCredentials)
1226 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->User);
1227 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Domain);
1228 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Password);
1229 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials);
1231 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->AuthnSchemes);
1232 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->ServerCertificateSubject);
1233 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials);
1235 HeapFree(GetProcessHeap(), 0, qos->qos);
1236 HeapFree(GetProcessHeap(), 0, qos);
1238 return refs;
1241 BOOL RpcQualityOfService_IsEqual(const RpcQualityOfService *qos1, const RpcQualityOfService *qos2)
1243 if (qos1 == qos2)
1244 return TRUE;
1246 if (!qos1 || !qos2)
1247 return FALSE;
1249 TRACE("qos1 = { %ld %ld %ld %ld }, qos2 = { %ld %ld %ld %ld }\n",
1250 qos1->qos->Capabilities, qos1->qos->IdentityTracking,
1251 qos1->qos->ImpersonationType, qos1->qos->AdditionalSecurityInfoType,
1252 qos2->qos->Capabilities, qos2->qos->IdentityTracking,
1253 qos2->qos->ImpersonationType, qos2->qos->AdditionalSecurityInfoType);
1255 if ((qos1->qos->Capabilities != qos2->qos->Capabilities) ||
1256 (qos1->qos->IdentityTracking != qos2->qos->IdentityTracking) ||
1257 (qos1->qos->ImpersonationType != qos2->qos->ImpersonationType) ||
1258 (qos1->qos->AdditionalSecurityInfoType != qos2->qos->AdditionalSecurityInfoType))
1259 return FALSE;
1261 if (qos1->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP)
1263 const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials1 = qos1->qos->u.HttpCredentials;
1264 const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials2 = qos2->qos->u.HttpCredentials;
1266 if (http_credentials1->Flags != http_credentials2->Flags)
1267 return FALSE;
1269 if (http_credentials1->AuthenticationTarget != http_credentials2->AuthenticationTarget)
1270 return FALSE;
1272 /* authentication schemes and server certificate subject not currently used */
1274 if (http_credentials1->TransportCredentials != http_credentials2->TransportCredentials)
1276 const SEC_WINNT_AUTH_IDENTITY_W *identity1 = http_credentials1->TransportCredentials;
1277 const SEC_WINNT_AUTH_IDENTITY_W *identity2 = http_credentials2->TransportCredentials;
1279 if (!identity1 || !identity2)
1280 return FALSE;
1282 /* compare user names */
1283 if (identity1->UserLength != identity2->UserLength ||
1284 memcmp(identity1->User, identity2->User, identity1->UserLength))
1285 return FALSE;
1286 /* compare domain names */
1287 if (identity1->DomainLength != identity2->DomainLength ||
1288 memcmp(identity1->Domain, identity2->Domain, identity1->DomainLength))
1289 return FALSE;
1290 /* compare passwords */
1291 if (identity1->PasswordLength != identity2->PasswordLength ||
1292 memcmp(identity1->Password, identity2->Password, identity1->PasswordLength))
1293 return FALSE;
1297 return TRUE;
1300 /***********************************************************************
1301 * RpcRevertToSelf (RPCRT4.@)
1303 RPC_STATUS WINAPI RpcRevertToSelf(void)
1305 FIXME("stub\n");
1306 RevertToSelf();
1307 return RPC_S_OK;
1310 /***********************************************************************
1311 * RpcMgmtSetComTimeout (RPCRT4.@)
1313 RPC_STATUS WINAPI RpcMgmtSetComTimeout(RPC_BINDING_HANDLE BindingHandle, unsigned int Timeout)
1315 FIXME("(%p, %d): stub\n", BindingHandle, Timeout);
1316 return RPC_S_OK;
1319 /***********************************************************************
1320 * RpcBindingInqAuthInfoExA (RPCRT4.@)
1322 RPCRTAPI RPC_STATUS RPC_ENTRY
1323 RpcBindingInqAuthInfoExA( RPC_BINDING_HANDLE Binding, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel,
1324 ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc,
1325 ULONG RpcQosVersion, RPC_SECURITY_QOS *SecurityQOS )
1327 FIXME("%p %p %p %p %p %p %u %p\n", Binding, ServerPrincName, AuthnLevel,
1328 AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS);
1329 return RPC_S_INVALID_BINDING;
1332 /***********************************************************************
1333 * RpcBindingInqAuthInfoExW (RPCRT4.@)
1335 RPCRTAPI RPC_STATUS RPC_ENTRY
1336 RpcBindingInqAuthInfoExW( RPC_BINDING_HANDLE Binding, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel,
1337 ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc,
1338 ULONG RpcQosVersion, RPC_SECURITY_QOS *SecurityQOS )
1340 FIXME("%p %p %p %p %p %p %u %p\n", Binding, ServerPrincName, AuthnLevel,
1341 AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS);
1342 return RPC_S_INVALID_BINDING;
1345 /***********************************************************************
1346 * RpcBindingInqAuthInfoA (RPCRT4.@)
1348 RPCRTAPI RPC_STATUS RPC_ENTRY
1349 RpcBindingInqAuthInfoA( RPC_BINDING_HANDLE Binding, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel,
1350 ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc )
1352 FIXME("%p %p %p %p %p %p\n", Binding, ServerPrincName, AuthnLevel,
1353 AuthnSvc, AuthIdentity, AuthzSvc);
1354 return RPC_S_INVALID_BINDING;
1357 /***********************************************************************
1358 * RpcBindingInqAuthInfoW (RPCRT4.@)
1360 RPCRTAPI RPC_STATUS RPC_ENTRY
1361 RpcBindingInqAuthInfoW( RPC_BINDING_HANDLE Binding, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel,
1362 ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc )
1364 FIXME("%p %p %p %p %p %p\n", Binding, ServerPrincName, AuthnLevel,
1365 AuthnSvc, AuthIdentity, AuthzSvc);
1366 return RPC_S_INVALID_BINDING;
1369 /***********************************************************************
1370 * RpcBindingSetAuthInfoExA (RPCRT4.@)
1372 RPCRTAPI RPC_STATUS RPC_ENTRY
1373 RpcBindingSetAuthInfoExA( RPC_BINDING_HANDLE Binding, RPC_CSTR ServerPrincName,
1374 ULONG AuthnLevel, ULONG AuthnSvc,
1375 RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr,
1376 RPC_SECURITY_QOS *SecurityQos )
1378 RpcBinding* bind = (RpcBinding*)Binding;
1379 SECURITY_STATUS r;
1380 CredHandle cred;
1381 TimeStamp exp;
1382 ULONG package_count;
1383 ULONG i;
1384 PSecPkgInfoA packages;
1385 ULONG cbMaxToken;
1387 TRACE("%p %s %u %u %p %u %p\n", Binding, debugstr_a((const char*)ServerPrincName),
1388 AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, SecurityQos);
1390 if (SecurityQos)
1392 RPC_STATUS status;
1394 TRACE("SecurityQos { Version=%ld, Capabilties=0x%lx, IdentityTracking=%ld, ImpersonationLevel=%ld",
1395 SecurityQos->Version, SecurityQos->Capabilities, SecurityQos->IdentityTracking, SecurityQos->ImpersonationType);
1396 if (SecurityQos->Version >= 2)
1398 const RPC_SECURITY_QOS_V2_A *SecurityQos2 = (const RPC_SECURITY_QOS_V2_A *)SecurityQos;
1399 TRACE(", AdditionalSecurityInfoType=%ld", SecurityQos2->AdditionalSecurityInfoType);
1400 if (SecurityQos2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP)
1401 TRACE(", { %p, 0x%lx, %ld, %ld, %p, %s }",
1402 SecurityQos2->u.HttpCredentials->TransportCredentials,
1403 SecurityQos2->u.HttpCredentials->Flags,
1404 SecurityQos2->u.HttpCredentials->AuthenticationTarget,
1405 SecurityQos2->u.HttpCredentials->NumberOfAuthnSchemes,
1406 SecurityQos2->u.HttpCredentials->AuthnSchemes,
1407 SecurityQos2->u.HttpCredentials->ServerCertificateSubject);
1409 TRACE("}\n");
1410 status = RpcQualityOfService_Create(SecurityQos, FALSE, &bind->QOS);
1411 if (status != RPC_S_OK)
1412 return status;
1414 else
1416 if (bind->QOS) RpcQualityOfService_Release(bind->QOS);
1417 bind->QOS = NULL;
1420 if (AuthnSvc == RPC_C_AUTHN_DEFAULT)
1421 AuthnSvc = RPC_C_AUTHN_WINNT;
1423 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1424 if (AuthnLevel == RPC_C_AUTHN_LEVEL_DEFAULT)
1425 AuthnLevel = RPC_C_AUTHN_LEVEL_NONE;
1427 if ((AuthnLevel == RPC_C_AUTHN_LEVEL_NONE) || (AuthnSvc == RPC_C_AUTHN_NONE))
1429 if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo);
1430 bind->AuthInfo = NULL;
1431 return RPC_S_OK;
1434 if (AuthnLevel > RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
1436 FIXME("unknown AuthnLevel %u\n", AuthnLevel);
1437 return RPC_S_UNKNOWN_AUTHN_LEVEL;
1440 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1441 if (AuthzSvr && AuthnSvc != RPC_C_AUTHN_WINNT)
1443 FIXME("unsupported AuthzSvr %u\n", AuthzSvr);
1444 return RPC_S_UNKNOWN_AUTHZ_SERVICE;
1447 r = EnumerateSecurityPackagesA(&package_count, &packages);
1448 if (r != SEC_E_OK)
1450 ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n", r);
1451 return RPC_S_SEC_PKG_ERROR;
1454 for (i = 0; i < package_count; i++)
1455 if (packages[i].wRPCID == AuthnSvc)
1456 break;
1458 if (i == package_count)
1460 FIXME("unsupported AuthnSvc %u\n", AuthnSvc);
1461 FreeContextBuffer(packages);
1462 return RPC_S_UNKNOWN_AUTHN_SERVICE;
1465 TRACE("found package %s for service %u\n", packages[i].Name, AuthnSvc);
1466 r = AcquireCredentialsHandleA(NULL, packages[i].Name, SECPKG_CRED_OUTBOUND, NULL,
1467 AuthIdentity, NULL, NULL, &cred, &exp);
1468 cbMaxToken = packages[i].cbMaxToken;
1469 FreeContextBuffer(packages);
1470 if (r == ERROR_SUCCESS)
1472 RpcAuthInfo *new_auth_info;
1473 r = RpcAuthInfo_Create(AuthnLevel, AuthnSvc, cred, exp, cbMaxToken,
1474 AuthIdentity, &new_auth_info);
1475 if (r == RPC_S_OK)
1477 new_auth_info->server_principal_name = RPCRT4_strdupAtoW((char *)ServerPrincName);
1478 if (new_auth_info->server_principal_name)
1480 if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo);
1481 bind->AuthInfo = new_auth_info;
1483 else
1485 RpcAuthInfo_Release(new_auth_info);
1486 r = ERROR_OUTOFMEMORY;
1489 else
1490 FreeCredentialsHandle(&cred);
1491 return r;
1493 else
1495 ERR("AcquireCredentialsHandleA failed with error 0x%08x\n", r);
1496 return RPC_S_SEC_PKG_ERROR;
1500 /***********************************************************************
1501 * RpcBindingSetAuthInfoExW (RPCRT4.@)
1503 RPCRTAPI RPC_STATUS RPC_ENTRY
1504 RpcBindingSetAuthInfoExW( RPC_BINDING_HANDLE Binding, RPC_WSTR ServerPrincName, ULONG AuthnLevel,
1505 ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr,
1506 RPC_SECURITY_QOS *SecurityQos )
1508 RpcBinding* bind = (RpcBinding*)Binding;
1509 SECURITY_STATUS r;
1510 CredHandle cred;
1511 TimeStamp exp;
1512 ULONG package_count;
1513 ULONG i;
1514 PSecPkgInfoW packages;
1515 ULONG cbMaxToken;
1517 TRACE("%p %s %u %u %p %u %p\n", Binding, debugstr_w((const WCHAR*)ServerPrincName),
1518 AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, SecurityQos);
1520 if (SecurityQos)
1522 RPC_STATUS status;
1524 TRACE("SecurityQos { Version=%ld, Capabilties=0x%lx, IdentityTracking=%ld, ImpersonationLevel=%ld",
1525 SecurityQos->Version, SecurityQos->Capabilities, SecurityQos->IdentityTracking, SecurityQos->ImpersonationType);
1526 if (SecurityQos->Version >= 2)
1528 const RPC_SECURITY_QOS_V2_W *SecurityQos2 = (const RPC_SECURITY_QOS_V2_W *)SecurityQos;
1529 TRACE(", AdditionalSecurityInfoType=%ld", SecurityQos2->AdditionalSecurityInfoType);
1530 if (SecurityQos2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP)
1531 TRACE(", { %p, 0x%lx, %ld, %ld, %p, %s }",
1532 SecurityQos2->u.HttpCredentials->TransportCredentials,
1533 SecurityQos2->u.HttpCredentials->Flags,
1534 SecurityQos2->u.HttpCredentials->AuthenticationTarget,
1535 SecurityQos2->u.HttpCredentials->NumberOfAuthnSchemes,
1536 SecurityQos2->u.HttpCredentials->AuthnSchemes,
1537 debugstr_w(SecurityQos2->u.HttpCredentials->ServerCertificateSubject));
1539 TRACE("}\n");
1540 status = RpcQualityOfService_Create(SecurityQos, TRUE, &bind->QOS);
1541 if (status != RPC_S_OK)
1542 return status;
1544 else
1546 if (bind->QOS) RpcQualityOfService_Release(bind->QOS);
1547 bind->QOS = NULL;
1550 if (AuthnSvc == RPC_C_AUTHN_DEFAULT)
1551 AuthnSvc = RPC_C_AUTHN_WINNT;
1553 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1554 if (AuthnLevel == RPC_C_AUTHN_LEVEL_DEFAULT)
1555 AuthnLevel = RPC_C_AUTHN_LEVEL_NONE;
1557 if ((AuthnLevel == RPC_C_AUTHN_LEVEL_NONE) || (AuthnSvc == RPC_C_AUTHN_NONE))
1559 if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo);
1560 bind->AuthInfo = NULL;
1561 return RPC_S_OK;
1564 if (AuthnLevel > RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
1566 FIXME("unknown AuthnLevel %u\n", AuthnLevel);
1567 return RPC_S_UNKNOWN_AUTHN_LEVEL;
1570 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1571 if (AuthzSvr && AuthnSvc != RPC_C_AUTHN_WINNT)
1573 FIXME("unsupported AuthzSvr %u\n", AuthzSvr);
1574 return RPC_S_UNKNOWN_AUTHZ_SERVICE;
1577 r = EnumerateSecurityPackagesW(&package_count, &packages);
1578 if (r != SEC_E_OK)
1580 ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n", r);
1581 return RPC_S_SEC_PKG_ERROR;
1584 for (i = 0; i < package_count; i++)
1585 if (packages[i].wRPCID == AuthnSvc)
1586 break;
1588 if (i == package_count)
1590 FIXME("unsupported AuthnSvc %u\n", AuthnSvc);
1591 FreeContextBuffer(packages);
1592 return RPC_S_UNKNOWN_AUTHN_SERVICE;
1595 TRACE("found package %s for service %u\n", debugstr_w(packages[i].Name), AuthnSvc);
1596 r = AcquireCredentialsHandleW(NULL, packages[i].Name, SECPKG_CRED_OUTBOUND, NULL,
1597 AuthIdentity, NULL, NULL, &cred, &exp);
1598 cbMaxToken = packages[i].cbMaxToken;
1599 FreeContextBuffer(packages);
1600 if (r == ERROR_SUCCESS)
1602 RpcAuthInfo *new_auth_info;
1603 r = RpcAuthInfo_Create(AuthnLevel, AuthnSvc, cred, exp, cbMaxToken,
1604 AuthIdentity, &new_auth_info);
1605 if (r == RPC_S_OK)
1607 new_auth_info->server_principal_name = RPCRT4_strdupW(ServerPrincName);
1608 if (!ServerPrincName || new_auth_info->server_principal_name)
1610 if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo);
1611 bind->AuthInfo = new_auth_info;
1613 else
1615 RpcAuthInfo_Release(new_auth_info);
1616 r = ERROR_OUTOFMEMORY;
1619 else
1620 FreeCredentialsHandle(&cred);
1621 return r;
1623 else
1625 ERR("AcquireCredentialsHandleW failed with error 0x%08x\n", r);
1626 return RPC_S_SEC_PKG_ERROR;
1630 /***********************************************************************
1631 * RpcBindingSetAuthInfoA (RPCRT4.@)
1633 RPCRTAPI RPC_STATUS RPC_ENTRY
1634 RpcBindingSetAuthInfoA( RPC_BINDING_HANDLE Binding, RPC_CSTR ServerPrincName, ULONG AuthnLevel,
1635 ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr )
1637 TRACE("%p %s %u %u %p %u\n", Binding, debugstr_a((const char*)ServerPrincName),
1638 AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr);
1639 return RpcBindingSetAuthInfoExA(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, NULL);
1642 /***********************************************************************
1643 * RpcBindingSetAuthInfoW (RPCRT4.@)
1645 RPCRTAPI RPC_STATUS RPC_ENTRY
1646 RpcBindingSetAuthInfoW( RPC_BINDING_HANDLE Binding, RPC_WSTR ServerPrincName, ULONG AuthnLevel,
1647 ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr )
1649 TRACE("%p %s %u %u %p %u\n", Binding, debugstr_w((const WCHAR*)ServerPrincName),
1650 AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr);
1651 return RpcBindingSetAuthInfoExW(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, NULL);
1654 /***********************************************************************
1655 * RpcBindingSetOption (RPCRT4.@)
1657 RPC_STATUS WINAPI RpcBindingSetOption(RPC_BINDING_HANDLE BindingHandle, ULONG Option, ULONG_PTR OptionValue)
1659 FIXME("(%p, %d, %ld): stub\n", BindingHandle, Option, OptionValue);
1660 return RPC_S_OK;