push a6a7df41ae272b3b1bf5fcfb544267c1e96afa99
[wine/hacks.git] / dlls / rpcrt4 / rpc_server.c
blob5fa963217921d398ac0eee124eefcfadab9785c3
1 /*
2 * RPC server API
4 * Copyright 2001 Ove Kåven, TransGaming Technologies
5 * Copyright 2004 Filip Navara
6 * Copyright 2006-2008 Robert Shearman (for CodeWeavers)
8 * This library is free software; you can redistribute it and/or
9 * modify it under the terms of the GNU Lesser General Public
10 * License as published by the Free Software Foundation; either
11 * version 2.1 of the License, or (at your option) any later version.
13 * This library is distributed in the hope that it will be useful,
14 * but WITHOUT ANY WARRANTY; without even the implied warranty of
15 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 * Lesser General Public License for more details.
18 * You should have received a copy of the GNU Lesser General Public
19 * License along with this library; if not, write to the Free Software
20 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
23 #include "config.h"
24 #include "wine/port.h"
26 #include <stdarg.h>
27 #include <stdio.h>
28 #include <string.h>
29 #include <assert.h>
31 #include "windef.h"
32 #include "winbase.h"
33 #include "winerror.h"
35 #include "rpc.h"
36 #include "rpcndr.h"
37 #include "excpt.h"
39 #include "wine/debug.h"
40 #include "wine/exception.h"
42 #include "rpc_server.h"
43 #include "rpc_assoc.h"
44 #include "rpc_message.h"
45 #include "rpc_defs.h"
46 #include "ncastatus.h"
48 WINE_DEFAULT_DEBUG_CHANNEL(rpc);
50 typedef struct _RpcPacket
52 struct _RpcConnection* conn;
53 RpcPktHdr* hdr;
54 RPC_MESSAGE* msg;
55 } RpcPacket;
57 typedef struct _RpcObjTypeMap
59 /* FIXME: a hash table would be better. */
60 struct _RpcObjTypeMap *next;
61 UUID Object;
62 UUID Type;
63 } RpcObjTypeMap;
65 static RpcObjTypeMap *RpcObjTypeMaps;
67 /* list of type RpcServerProtseq */
68 static struct list protseqs = LIST_INIT(protseqs);
69 static struct list server_interfaces = LIST_INIT(server_interfaces);
71 static CRITICAL_SECTION server_cs;
72 static CRITICAL_SECTION_DEBUG server_cs_debug =
74 0, 0, &server_cs,
75 { &server_cs_debug.ProcessLocksList, &server_cs_debug.ProcessLocksList },
76 0, 0, { (DWORD_PTR)(__FILE__ ": server_cs") }
78 static CRITICAL_SECTION server_cs = { &server_cs_debug, -1, 0, 0, 0, 0 };
80 static CRITICAL_SECTION listen_cs;
81 static CRITICAL_SECTION_DEBUG listen_cs_debug =
83 0, 0, &listen_cs,
84 { &listen_cs_debug.ProcessLocksList, &listen_cs_debug.ProcessLocksList },
85 0, 0, { (DWORD_PTR)(__FILE__ ": listen_cs") }
87 static CRITICAL_SECTION listen_cs = { &listen_cs_debug, -1, 0, 0, 0, 0 };
89 /* whether the server is currently listening */
90 static BOOL std_listen;
91 /* number of manual listeners (calls to RpcServerListen) */
92 static LONG manual_listen_count;
93 /* total listeners including auto listeners */
94 static LONG listen_count;
96 static UUID uuid_nil;
98 static inline RpcObjTypeMap *LookupObjTypeMap(UUID *ObjUuid)
100 RpcObjTypeMap *rslt = RpcObjTypeMaps;
101 RPC_STATUS dummy;
103 while (rslt) {
104 if (! UuidCompare(ObjUuid, &rslt->Object, &dummy)) break;
105 rslt = rslt->next;
108 return rslt;
111 static inline UUID *LookupObjType(UUID *ObjUuid)
113 RpcObjTypeMap *map = LookupObjTypeMap(ObjUuid);
114 if (map)
115 return &map->Type;
116 else
117 return &uuid_nil;
120 static RpcServerInterface* RPCRT4_find_interface(UUID* object,
121 const RPC_SYNTAX_IDENTIFIER* if_id,
122 BOOL check_object)
124 UUID* MgrType = NULL;
125 RpcServerInterface* cif;
126 RPC_STATUS status;
128 if (check_object)
129 MgrType = LookupObjType(object);
130 EnterCriticalSection(&server_cs);
131 LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) {
132 if (!memcmp(if_id, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER)) &&
133 (check_object == FALSE || UuidEqual(MgrType, &cif->MgrTypeUuid, &status)) &&
134 std_listen) {
135 InterlockedIncrement(&cif->CurrentCalls);
136 break;
139 LeaveCriticalSection(&server_cs);
140 if (&cif->entry == &server_interfaces) cif = NULL;
141 TRACE("returning %p for object %s, if_id { %d.%d %s }\n", cif,
142 debugstr_guid(object), if_id->SyntaxVersion.MajorVersion,
143 if_id->SyntaxVersion.MinorVersion, debugstr_guid(&if_id->SyntaxGUID));
144 return cif;
147 static void RPCRT4_release_server_interface(RpcServerInterface *sif)
149 if (!InterlockedDecrement(&sif->CurrentCalls) &&
150 sif->Delete) {
151 /* sif must have been removed from server_interfaces before
152 * CallsCompletedEvent is set */
153 if (sif->CallsCompletedEvent)
154 SetEvent(sif->CallsCompletedEvent);
155 HeapFree(GetProcessHeap(), 0, sif);
159 static RPC_STATUS process_bind_packet(RpcConnection *conn, RpcPktBindHdr *hdr, RPC_MESSAGE *msg)
161 RPC_STATUS status;
162 RpcServerInterface* sif;
163 RpcPktHdr *response = NULL;
165 /* FIXME: do more checks! */
166 if (hdr->max_tsize < RPC_MIN_PACKET_SIZE ||
167 !UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status) ||
168 conn->server_binding) {
169 TRACE("packet size less than min size, or active interface syntax guid non-null\n");
170 sif = NULL;
171 } else {
172 /* create temporary binding */
173 if (RPCRT4_MakeBinding(&conn->server_binding, conn) == RPC_S_OK &&
174 RpcServerAssoc_GetAssociation(rpcrt4_conn_get_name(conn),
175 conn->NetworkAddr, conn->Endpoint,
176 conn->NetworkOptions,
177 hdr->assoc_gid,
178 &conn->server_binding->Assoc) == RPC_S_OK)
179 sif = RPCRT4_find_interface(NULL, &hdr->abstract, FALSE);
180 else
181 sif = NULL;
183 if (sif == NULL) {
184 TRACE("rejecting bind request on connection %p\n", conn);
185 /* Report failure to client. */
186 response = RPCRT4_BuildBindNackHeader(NDR_LOCAL_DATA_REPRESENTATION,
187 RPC_VER_MAJOR, RPC_VER_MINOR);
188 } else {
189 TRACE("accepting bind request on connection %p for %s\n", conn,
190 debugstr_guid(&hdr->abstract.SyntaxGUID));
192 /* accept. */
193 response = RPCRT4_BuildBindAckHeader(NDR_LOCAL_DATA_REPRESENTATION,
194 RPC_MAX_PACKET_SIZE,
195 RPC_MAX_PACKET_SIZE,
196 conn->server_binding->Assoc->assoc_group_id,
197 conn->Endpoint,
198 RESULT_ACCEPT, REASON_NONE,
199 &sif->If->TransferSyntax);
201 /* save the interface for later use */
202 conn->ActiveInterface = hdr->abstract;
203 conn->MaxTransmissionSize = hdr->max_tsize;
205 RPCRT4_release_server_interface(sif);
208 if (response)
209 status = RPCRT4_Send(conn, response, NULL, 0);
210 else
211 status = ERROR_OUTOFMEMORY;
212 RPCRT4_FreeHeader(response);
214 return status;
217 static RPC_STATUS process_request_packet(RpcConnection *conn, RpcPktRequestHdr *hdr, RPC_MESSAGE *msg)
219 RPC_STATUS status;
220 RpcPktHdr *response = NULL;
221 RpcServerInterface* sif;
222 RPC_DISPATCH_FUNCTION func;
223 BOOL exception;
224 UUID *object_uuid;
225 NDR_SCONTEXT context_handle;
226 void *buf = msg->Buffer;
228 /* fail if the connection isn't bound with an interface */
229 if (UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status)) {
230 /* FIXME: should send BindNack instead */
231 response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
232 status);
234 RPCRT4_Send(conn, response, NULL, 0);
235 RPCRT4_FreeHeader(response);
236 return RPC_S_OK;
239 if (hdr->common.flags & RPC_FLG_OBJECT_UUID) {
240 object_uuid = (UUID*)(hdr + 1);
241 } else {
242 object_uuid = NULL;
245 sif = RPCRT4_find_interface(object_uuid, &conn->ActiveInterface, TRUE);
246 if (!sif) {
247 WARN("interface %s no longer registered, returning fault packet\n", debugstr_guid(&conn->ActiveInterface.SyntaxGUID));
248 response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
249 NCA_S_UNK_IF);
251 RPCRT4_Send(conn, response, NULL, 0);
252 RPCRT4_FreeHeader(response);
253 return RPC_S_OK;
255 msg->RpcInterfaceInformation = sif->If;
256 /* copy the endpoint vector from sif to msg so that midl-generated code will use it */
257 msg->ManagerEpv = sif->MgrEpv;
258 if (object_uuid != NULL) {
259 RPCRT4_SetBindingObject(msg->Handle, object_uuid);
262 /* find dispatch function */
263 msg->ProcNum = hdr->opnum;
264 if (sif->Flags & RPC_IF_OLE) {
265 /* native ole32 always gives us a dispatch table with a single entry
266 * (I assume that's a wrapper for IRpcStubBuffer::Invoke) */
267 func = *sif->If->DispatchTable->DispatchTable;
268 } else {
269 if (msg->ProcNum >= sif->If->DispatchTable->DispatchTableCount) {
270 WARN("invalid procnum (%d/%d)\n", msg->ProcNum, sif->If->DispatchTable->DispatchTableCount);
271 response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION,
272 NCA_S_OP_RNG_ERROR);
274 RPCRT4_Send(conn, response, NULL, 0);
275 RPCRT4_FreeHeader(response);
277 func = sif->If->DispatchTable->DispatchTable[msg->ProcNum];
280 /* put in the drep. FIXME: is this more universally applicable?
281 perhaps we should move this outward... */
282 msg->DataRepresentation =
283 MAKELONG( MAKEWORD(hdr->common.drep[0], hdr->common.drep[1]),
284 MAKEWORD(hdr->common.drep[2], hdr->common.drep[3]));
286 exception = FALSE;
288 /* dispatch */
289 RPCRT4_SetThreadCurrentCallHandle(msg->Handle);
290 __TRY {
291 if (func) func(msg);
292 } __EXCEPT_ALL {
293 WARN("exception caught with code 0x%08x = %d\n", GetExceptionCode(), GetExceptionCode());
294 exception = TRUE;
295 if (GetExceptionCode() == STATUS_ACCESS_VIOLATION)
296 status = ERROR_NOACCESS;
297 else
298 status = GetExceptionCode();
299 response = RPCRT4_BuildFaultHeader(msg->DataRepresentation,
300 RPC2NCA_STATUS(status));
301 } __ENDTRY
302 RPCRT4_SetThreadCurrentCallHandle(NULL);
304 /* release any unmarshalled context handles */
305 while ((context_handle = RPCRT4_PopThreadContextHandle()) != NULL)
306 RpcServerAssoc_ReleaseContextHandle(conn->server_binding->Assoc, context_handle, TRUE);
308 if (!exception)
309 response = RPCRT4_BuildResponseHeader(msg->DataRepresentation,
310 msg->BufferLength);
312 /* send response packet */
313 if (response) {
314 status = RPCRT4_Send(conn, response, exception ? NULL : msg->Buffer,
315 exception ? 0 : msg->BufferLength);
316 RPCRT4_FreeHeader(response);
317 } else
318 ERR("out of memory\n");
320 msg->RpcInterfaceInformation = NULL;
321 RPCRT4_release_server_interface(sif);
323 if (msg->Buffer == buf) buf = NULL;
324 TRACE("freeing Buffer=%p\n", buf);
325 I_RpcFree(buf);
327 return status;
330 static void RPCRT4_process_packet(RpcConnection* conn, RpcPktHdr* hdr, RPC_MESSAGE* msg)
332 RPC_STATUS status;
334 msg->Handle = (RPC_BINDING_HANDLE)conn->server_binding;
336 switch (hdr->common.ptype) {
337 case PKT_BIND:
338 TRACE("got bind packet\n");
340 status = process_bind_packet(conn, &hdr->bind, msg);
341 break;
343 case PKT_REQUEST:
344 TRACE("got request packet\n");
346 status = process_request_packet(conn, &hdr->request, msg);
347 break;
349 default:
350 FIXME("unhandled packet type %u\n", hdr->common.ptype);
351 break;
354 /* clean up */
355 I_RpcFree(msg->Buffer);
356 RPCRT4_FreeHeader(hdr);
357 HeapFree(GetProcessHeap(), 0, msg);
360 static DWORD CALLBACK RPCRT4_worker_thread(LPVOID the_arg)
362 RpcPacket *pkt = the_arg;
363 RPCRT4_process_packet(pkt->conn, pkt->hdr, pkt->msg);
364 HeapFree(GetProcessHeap(), 0, pkt);
365 return 0;
368 static DWORD CALLBACK RPCRT4_io_thread(LPVOID the_arg)
370 RpcConnection* conn = (RpcConnection*)the_arg;
371 RpcPktHdr *hdr;
372 RPC_MESSAGE *msg;
373 RPC_STATUS status;
374 RpcPacket *packet;
376 TRACE("(%p)\n", conn);
378 for (;;) {
379 msg = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RPC_MESSAGE));
381 status = RPCRT4_Receive(conn, &hdr, msg);
382 if (status != RPC_S_OK) {
383 WARN("receive failed with error %lx\n", status);
384 HeapFree(GetProcessHeap(), 0, msg);
385 break;
388 packet = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcPacket));
389 if (!packet) {
390 I_RpcFree(msg->Buffer);
391 RPCRT4_FreeHeader(hdr);
392 HeapFree(GetProcessHeap(), 0, msg);
393 break;
395 packet->conn = conn;
396 packet->hdr = hdr;
397 packet->msg = msg;
398 if (!QueueUserWorkItem(RPCRT4_worker_thread, packet, WT_EXECUTELONGFUNCTION)) {
399 ERR("couldn't queue work item for worker thread, error was %d\n", GetLastError());
400 I_RpcFree(msg->Buffer);
401 RPCRT4_FreeHeader(hdr);
402 HeapFree(GetProcessHeap(), 0, msg);
403 HeapFree(GetProcessHeap(), 0, packet);
404 break;
407 msg = NULL;
409 RPCRT4_DestroyConnection(conn);
410 return 0;
413 void RPCRT4_new_client(RpcConnection* conn)
415 HANDLE thread = CreateThread(NULL, 0, RPCRT4_io_thread, conn, 0, NULL);
416 if (!thread) {
417 DWORD err = GetLastError();
418 ERR("failed to create thread, error=%08x\n", err);
419 RPCRT4_DestroyConnection(conn);
421 /* we could set conn->thread, but then we'd have to make the io_thread wait
422 * for that, otherwise the thread might finish, destroy the connection, and
423 * free the memory we'd write to before we did, causing crashes and stuff -
424 * so let's implement that later, when we really need conn->thread */
426 CloseHandle( thread );
429 static DWORD CALLBACK RPCRT4_server_thread(LPVOID the_arg)
431 int res;
432 unsigned int count;
433 void *objs = NULL;
434 RpcServerProtseq* cps = the_arg;
435 RpcConnection* conn;
436 BOOL set_ready_event = FALSE;
438 TRACE("(the_arg == ^%p)\n", the_arg);
440 for (;;) {
441 objs = cps->ops->get_wait_array(cps, objs, &count);
443 if (set_ready_event)
445 /* signal to function that changed state that we are now sync'ed */
446 SetEvent(cps->server_ready_event);
447 set_ready_event = FALSE;
450 /* start waiting */
451 res = cps->ops->wait_for_new_connection(cps, count, objs);
452 if (res == -1)
453 break;
454 else if (res == 0)
456 if (!std_listen)
458 SetEvent(cps->server_ready_event);
459 break;
461 set_ready_event = TRUE;
464 cps->ops->free_wait_array(cps, objs);
465 EnterCriticalSection(&cps->cs);
466 /* close connections */
467 conn = cps->conn;
468 while (conn) {
469 RPCRT4_CloseConnection(conn);
470 conn = conn->Next;
472 LeaveCriticalSection(&cps->cs);
473 return 0;
476 /* tells the server thread that the state has changed and waits for it to
477 * make the changes */
478 static void RPCRT4_sync_with_server_thread(RpcServerProtseq *ps)
480 /* make sure we are the only thread sync'ing the server state, otherwise
481 * there is a race with the server thread setting an older state and setting
482 * the server_ready_event when the new state hasn't yet been applied */
483 WaitForSingleObject(ps->mgr_mutex, INFINITE);
485 ps->ops->signal_state_changed(ps);
487 /* wait for server thread to make the requested changes before returning */
488 WaitForSingleObject(ps->server_ready_event, INFINITE);
490 ReleaseMutex(ps->mgr_mutex);
493 static RPC_STATUS RPCRT4_start_listen_protseq(RpcServerProtseq *ps, BOOL auto_listen)
495 RPC_STATUS status = RPC_S_OK;
496 HANDLE server_thread;
498 EnterCriticalSection(&listen_cs);
499 if (ps->is_listening) goto done;
501 if (!ps->mgr_mutex) ps->mgr_mutex = CreateMutexW(NULL, FALSE, NULL);
502 if (!ps->server_ready_event) ps->server_ready_event = CreateEventW(NULL, FALSE, FALSE, NULL);
503 server_thread = CreateThread(NULL, 0, RPCRT4_server_thread, ps, 0, NULL);
504 if (!server_thread)
506 status = RPC_S_OUT_OF_RESOURCES;
507 goto done;
509 ps->is_listening = TRUE;
510 CloseHandle(server_thread);
512 done:
513 LeaveCriticalSection(&listen_cs);
514 return status;
517 static RPC_STATUS RPCRT4_start_listen(BOOL auto_listen)
519 RPC_STATUS status = RPC_S_ALREADY_LISTENING;
520 RpcServerProtseq *cps;
522 TRACE("\n");
524 EnterCriticalSection(&listen_cs);
525 if (auto_listen || (manual_listen_count++ == 0))
527 status = RPC_S_OK;
528 if (++listen_count == 1)
529 std_listen = TRUE;
531 LeaveCriticalSection(&listen_cs);
533 if (std_listen)
535 EnterCriticalSection(&server_cs);
536 LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
538 status = RPCRT4_start_listen_protseq(cps, TRUE);
539 if (status != RPC_S_OK)
540 break;
542 /* make sure server is actually listening on the interface before
543 * returning */
544 RPCRT4_sync_with_server_thread(cps);
546 LeaveCriticalSection(&server_cs);
549 return status;
552 static void RPCRT4_stop_listen(BOOL auto_listen)
554 EnterCriticalSection(&listen_cs);
555 if (auto_listen || (--manual_listen_count == 0))
557 if (listen_count != 0 && --listen_count == 0) {
558 RpcServerProtseq *cps;
560 std_listen = FALSE;
561 LeaveCriticalSection(&listen_cs);
563 LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
564 RPCRT4_sync_with_server_thread(cps);
566 return;
568 assert(listen_count >= 0);
570 LeaveCriticalSection(&listen_cs);
573 static RPC_STATUS RPCRT4_use_protseq(RpcServerProtseq* ps, LPSTR endpoint)
575 RPC_STATUS status;
577 status = ps->ops->open_endpoint(ps, endpoint);
578 if (status != RPC_S_OK)
579 return status;
581 if (std_listen)
583 status = RPCRT4_start_listen_protseq(ps, FALSE);
584 if (status == RPC_S_OK)
585 RPCRT4_sync_with_server_thread(ps);
588 return status;
591 /***********************************************************************
592 * RpcServerInqBindings (RPCRT4.@)
594 RPC_STATUS WINAPI RpcServerInqBindings( RPC_BINDING_VECTOR** BindingVector )
596 RPC_STATUS status;
597 DWORD count;
598 RpcServerProtseq* ps;
599 RpcConnection* conn;
601 if (BindingVector)
602 TRACE("(*BindingVector == ^%p)\n", *BindingVector);
603 else
604 ERR("(BindingVector == NULL!!?)\n");
606 EnterCriticalSection(&server_cs);
607 /* count connections */
608 count = 0;
609 LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) {
610 EnterCriticalSection(&ps->cs);
611 conn = ps->conn;
612 while (conn) {
613 count++;
614 conn = conn->Next;
616 LeaveCriticalSection(&ps->cs);
618 if (count) {
619 /* export bindings */
620 *BindingVector = HeapAlloc(GetProcessHeap(), 0,
621 sizeof(RPC_BINDING_VECTOR) +
622 sizeof(RPC_BINDING_HANDLE)*(count-1));
623 (*BindingVector)->Count = count;
624 count = 0;
625 LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) {
626 EnterCriticalSection(&ps->cs);
627 conn = ps->conn;
628 while (conn) {
629 RPCRT4_MakeBinding((RpcBinding**)&(*BindingVector)->BindingH[count],
630 conn);
631 count++;
632 conn = conn->Next;
634 LeaveCriticalSection(&ps->cs);
636 status = RPC_S_OK;
637 } else {
638 *BindingVector = NULL;
639 status = RPC_S_NO_BINDINGS;
641 LeaveCriticalSection(&server_cs);
642 return status;
645 /***********************************************************************
646 * RpcServerUseProtseqEpA (RPCRT4.@)
648 RPC_STATUS WINAPI RpcServerUseProtseqEpA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor )
650 RPC_POLICY policy;
652 TRACE( "(%s,%u,%s,%p)\n", Protseq, MaxCalls, Endpoint, SecurityDescriptor );
654 /* This should provide the default behaviour */
655 policy.Length = sizeof( policy );
656 policy.EndpointFlags = 0;
657 policy.NICFlags = 0;
659 return RpcServerUseProtseqEpExA( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
662 /***********************************************************************
663 * RpcServerUseProtseqEpW (RPCRT4.@)
665 RPC_STATUS WINAPI RpcServerUseProtseqEpW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor )
667 RPC_POLICY policy;
669 TRACE( "(%s,%u,%s,%p)\n", debugstr_w( Protseq ), MaxCalls, debugstr_w( Endpoint ), SecurityDescriptor );
671 /* This should provide the default behaviour */
672 policy.Length = sizeof( policy );
673 policy.EndpointFlags = 0;
674 policy.NICFlags = 0;
676 return RpcServerUseProtseqEpExW( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
679 /***********************************************************************
680 * alloc_serverprotoseq (internal)
682 * Must be called with server_cs held.
684 static RPC_STATUS alloc_serverprotoseq(UINT MaxCalls, char *Protseq, RpcServerProtseq **ps)
686 const struct protseq_ops *ops = rpcrt4_get_protseq_ops(Protseq);
688 if (!ops)
690 FIXME("protseq %s not supported\n", debugstr_a(Protseq));
691 return RPC_S_PROTSEQ_NOT_SUPPORTED;
694 *ps = ops->alloc();
695 if (!*ps)
696 return RPC_S_OUT_OF_RESOURCES;
697 (*ps)->MaxCalls = MaxCalls;
698 (*ps)->Protseq = Protseq;
699 (*ps)->ops = ops;
700 (*ps)->MaxCalls = 0;
701 (*ps)->conn = NULL;
702 InitializeCriticalSection(&(*ps)->cs);
703 (*ps)->is_listening = FALSE;
704 (*ps)->mgr_mutex = NULL;
705 (*ps)->server_ready_event = NULL;
707 list_add_head(&protseqs, &(*ps)->entry);
709 TRACE("new protseq %p created for %s\n", *ps, Protseq);
711 return RPC_S_OK;
714 /* Finds a given protseq or creates a new one if one doesn't already exist */
715 static RPC_STATUS RPCRT4_get_or_create_serverprotseq(UINT MaxCalls, char *Protseq, RpcServerProtseq **ps)
717 RPC_STATUS status;
718 RpcServerProtseq *cps;
720 EnterCriticalSection(&server_cs);
722 LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry)
723 if (!strcmp(cps->Protseq, Protseq))
725 TRACE("found existing protseq object for %s\n", Protseq);
726 *ps = cps;
727 LeaveCriticalSection(&server_cs);
728 return S_OK;
731 status = alloc_serverprotoseq(MaxCalls, Protseq, ps);
733 LeaveCriticalSection(&server_cs);
735 return status;
738 /***********************************************************************
739 * RpcServerUseProtseqEpExA (RPCRT4.@)
741 RPC_STATUS WINAPI RpcServerUseProtseqEpExA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor,
742 PRPC_POLICY lpPolicy )
744 char *szps = (char*)Protseq, *szep = (char*)Endpoint;
745 RpcServerProtseq* ps;
746 RPC_STATUS status;
748 TRACE("(%s,%u,%s,%p,{%u,%lu,%lu})\n", debugstr_a(szps), MaxCalls,
749 debugstr_a(szep), SecurityDescriptor,
750 lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
752 status = RPCRT4_get_or_create_serverprotseq(MaxCalls, RPCRT4_strdupA(szps), &ps);
753 if (status != RPC_S_OK)
754 return status;
756 return RPCRT4_use_protseq(ps, szep);
759 /***********************************************************************
760 * RpcServerUseProtseqEpExW (RPCRT4.@)
762 RPC_STATUS WINAPI RpcServerUseProtseqEpExW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor,
763 PRPC_POLICY lpPolicy )
765 RpcServerProtseq* ps;
766 RPC_STATUS status;
767 LPSTR EndpointA;
769 TRACE("(%s,%u,%s,%p,{%u,%lu,%lu})\n", debugstr_w( Protseq ), MaxCalls,
770 debugstr_w( Endpoint ), SecurityDescriptor,
771 lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
773 status = RPCRT4_get_or_create_serverprotseq(MaxCalls, RPCRT4_strdupWtoA(Protseq), &ps);
774 if (status != RPC_S_OK)
775 return status;
777 EndpointA = RPCRT4_strdupWtoA(Endpoint);
778 status = RPCRT4_use_protseq(ps, EndpointA);
779 RPCRT4_strfree(EndpointA);
780 return status;
783 /***********************************************************************
784 * RpcServerUseProtseqA (RPCRT4.@)
786 RPC_STATUS WINAPI RpcServerUseProtseqA(RPC_CSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
788 TRACE("(Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_a((char*)Protseq), MaxCalls, SecurityDescriptor);
789 return RpcServerUseProtseqEpA(Protseq, MaxCalls, NULL, SecurityDescriptor);
792 /***********************************************************************
793 * RpcServerUseProtseqW (RPCRT4.@)
795 RPC_STATUS WINAPI RpcServerUseProtseqW(RPC_WSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
797 TRACE("Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_w(Protseq), MaxCalls, SecurityDescriptor);
798 return RpcServerUseProtseqEpW(Protseq, MaxCalls, NULL, SecurityDescriptor);
801 /***********************************************************************
802 * RpcServerRegisterIf (RPCRT4.@)
804 RPC_STATUS WINAPI RpcServerRegisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv )
806 TRACE("(%p,%s,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv);
807 return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, 0, RPC_C_LISTEN_MAX_CALLS_DEFAULT, (UINT)-1, NULL );
810 /***********************************************************************
811 * RpcServerRegisterIfEx (RPCRT4.@)
813 RPC_STATUS WINAPI RpcServerRegisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
814 UINT Flags, UINT MaxCalls, RPC_IF_CALLBACK_FN* IfCallbackFn )
816 TRACE("(%p,%s,%p,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls, IfCallbackFn);
817 return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, Flags, MaxCalls, (UINT)-1, IfCallbackFn );
820 /***********************************************************************
821 * RpcServerRegisterIf2 (RPCRT4.@)
823 RPC_STATUS WINAPI RpcServerRegisterIf2( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
824 UINT Flags, UINT MaxCalls, UINT MaxRpcSize, RPC_IF_CALLBACK_FN* IfCallbackFn )
826 PRPC_SERVER_INTERFACE If = (PRPC_SERVER_INTERFACE)IfSpec;
827 RpcServerInterface* sif;
828 unsigned int i;
830 TRACE("(%p,%s,%p,%u,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls,
831 MaxRpcSize, IfCallbackFn);
832 TRACE(" interface id: %s %d.%d\n", debugstr_guid(&If->InterfaceId.SyntaxGUID),
833 If->InterfaceId.SyntaxVersion.MajorVersion,
834 If->InterfaceId.SyntaxVersion.MinorVersion);
835 TRACE(" transfer syntax: %s %d.%d\n", debugstr_guid(&If->TransferSyntax.SyntaxGUID),
836 If->TransferSyntax.SyntaxVersion.MajorVersion,
837 If->TransferSyntax.SyntaxVersion.MinorVersion);
838 TRACE(" dispatch table: %p\n", If->DispatchTable);
839 if (If->DispatchTable) {
840 TRACE(" dispatch table count: %d\n", If->DispatchTable->DispatchTableCount);
841 for (i=0; i<If->DispatchTable->DispatchTableCount; i++) {
842 TRACE(" entry %d: %p\n", i, If->DispatchTable->DispatchTable[i]);
844 TRACE(" reserved: %ld\n", If->DispatchTable->Reserved);
846 TRACE(" protseq endpoint count: %d\n", If->RpcProtseqEndpointCount);
847 TRACE(" default manager epv: %p\n", If->DefaultManagerEpv);
848 TRACE(" interpreter info: %p\n", If->InterpreterInfo);
850 sif = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcServerInterface));
851 sif->If = If;
852 if (MgrTypeUuid) {
853 sif->MgrTypeUuid = *MgrTypeUuid;
854 sif->MgrEpv = MgrEpv;
855 } else {
856 memset(&sif->MgrTypeUuid, 0, sizeof(UUID));
857 sif->MgrEpv = If->DefaultManagerEpv;
859 sif->Flags = Flags;
860 sif->MaxCalls = MaxCalls;
861 sif->MaxRpcSize = MaxRpcSize;
862 sif->IfCallbackFn = IfCallbackFn;
864 EnterCriticalSection(&server_cs);
865 list_add_head(&server_interfaces, &sif->entry);
866 LeaveCriticalSection(&server_cs);
868 if (sif->Flags & RPC_IF_AUTOLISTEN)
869 RPCRT4_start_listen(TRUE);
871 return RPC_S_OK;
874 /***********************************************************************
875 * RpcServerUnregisterIf (RPCRT4.@)
877 RPC_STATUS WINAPI RpcServerUnregisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, UINT WaitForCallsToComplete )
879 PRPC_SERVER_INTERFACE If = (PRPC_SERVER_INTERFACE)IfSpec;
880 HANDLE event = NULL;
881 BOOL found = FALSE;
882 BOOL completed = TRUE;
883 RpcServerInterface *cif;
884 RPC_STATUS status;
886 TRACE("(IfSpec == (RPC_IF_HANDLE)^%p (%s), MgrTypeUuid == %s, WaitForCallsToComplete == %u)\n",
887 IfSpec, debugstr_guid(&If->InterfaceId.SyntaxGUID), debugstr_guid(MgrTypeUuid), WaitForCallsToComplete);
889 EnterCriticalSection(&server_cs);
890 LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) {
891 if ((!IfSpec || !memcmp(&If->InterfaceId, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER))) &&
892 UuidEqual(MgrTypeUuid, &cif->MgrTypeUuid, &status)) {
893 list_remove(&cif->entry);
894 TRACE("unregistering cif %p\n", cif);
895 if (cif->CurrentCalls) {
896 completed = FALSE;
897 cif->Delete = TRUE;
898 if (WaitForCallsToComplete)
899 cif->CallsCompletedEvent = event = CreateEventW(NULL, FALSE, FALSE, NULL);
901 found = TRUE;
902 break;
905 LeaveCriticalSection(&server_cs);
907 if (!found) {
908 ERR("not found for object %s\n", debugstr_guid(MgrTypeUuid));
909 return RPC_S_UNKNOWN_IF;
912 if (completed)
913 HeapFree(GetProcessHeap(), 0, cif);
914 else if (event) {
915 /* sif will be freed when the last call is completed, so be careful not to
916 * touch that memory here as that could happen before we get here */
917 WaitForSingleObject(event, INFINITE);
918 CloseHandle(event);
921 return RPC_S_OK;
924 /***********************************************************************
925 * RpcServerUnregisterIfEx (RPCRT4.@)
927 RPC_STATUS WINAPI RpcServerUnregisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, int RundownContextHandles )
929 FIXME("(IfSpec == (RPC_IF_HANDLE)^%p, MgrTypeUuid == %s, RundownContextHandles == %d): stub\n",
930 IfSpec, debugstr_guid(MgrTypeUuid), RundownContextHandles);
932 return RPC_S_OK;
935 /***********************************************************************
936 * RpcObjectSetType (RPCRT4.@)
938 * PARAMS
939 * ObjUuid [I] "Object" UUID
940 * TypeUuid [I] "Type" UUID
942 * RETURNS
943 * RPC_S_OK The call succeeded
944 * RPC_S_INVALID_OBJECT The provided object (nil) is not valid
945 * RPC_S_ALREADY_REGISTERED The provided object is already registered
947 * Maps "Object" UUIDs to "Type" UUID's. Passing the nil UUID as the type
948 * resets the mapping for the specified object UUID to nil (the default).
949 * The nil object is always associated with the nil type and cannot be
950 * reassigned. Servers can support multiple implementations on the same
951 * interface by registering different end-point vectors for the different
952 * types. There's no need to call this if a server only supports the nil
953 * type, as is typical.
955 RPC_STATUS WINAPI RpcObjectSetType( UUID* ObjUuid, UUID* TypeUuid )
957 RpcObjTypeMap *map = RpcObjTypeMaps, *prev = NULL;
958 RPC_STATUS dummy;
960 TRACE("(ObjUUID == %s, TypeUuid == %s).\n", debugstr_guid(ObjUuid), debugstr_guid(TypeUuid));
961 if ((! ObjUuid) || UuidIsNil(ObjUuid, &dummy)) {
962 /* nil uuid cannot be remapped */
963 return RPC_S_INVALID_OBJECT;
966 /* find the mapping for this object if there is one ... */
967 while (map) {
968 if (! UuidCompare(ObjUuid, &map->Object, &dummy)) break;
969 prev = map;
970 map = map->next;
972 if ((! TypeUuid) || UuidIsNil(TypeUuid, &dummy)) {
973 /* ... and drop it from the list */
974 if (map) {
975 if (prev)
976 prev->next = map->next;
977 else
978 RpcObjTypeMaps = map->next;
979 HeapFree(GetProcessHeap(), 0, map);
981 } else {
982 /* ... , fail if we found it ... */
983 if (map)
984 return RPC_S_ALREADY_REGISTERED;
985 /* ... otherwise create a new one and add it in. */
986 map = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcObjTypeMap));
987 map->Object = *ObjUuid;
988 map->Type = *TypeUuid;
989 map->next = NULL;
990 if (prev)
991 prev->next = map; /* prev is the last map in the linklist */
992 else
993 RpcObjTypeMaps = map;
996 return RPC_S_OK;
999 /***********************************************************************
1000 * RpcServerRegisterAuthInfoA (RPCRT4.@)
1002 RPC_STATUS WINAPI RpcServerRegisterAuthInfoA( RPC_CSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
1003 LPVOID Arg )
1005 FIXME( "(%s,%u,%p,%p): stub\n", ServerPrincName, AuthnSvc, GetKeyFn, Arg );
1007 return RPC_S_UNKNOWN_AUTHN_SERVICE; /* We don't know any authentication services */
1010 /***********************************************************************
1011 * RpcServerRegisterAuthInfoW (RPCRT4.@)
1013 RPC_STATUS WINAPI RpcServerRegisterAuthInfoW( RPC_WSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
1014 LPVOID Arg )
1016 FIXME( "(%s,%u,%p,%p): stub\n", debugstr_w( ServerPrincName ), AuthnSvc, GetKeyFn, Arg );
1018 return RPC_S_UNKNOWN_AUTHN_SERVICE; /* We don't know any authentication services */
1021 /***********************************************************************
1022 * RpcServerListen (RPCRT4.@)
1024 RPC_STATUS WINAPI RpcServerListen( UINT MinimumCallThreads, UINT MaxCalls, UINT DontWait )
1026 RPC_STATUS status = RPC_S_OK;
1028 TRACE("(%u,%u,%u)\n", MinimumCallThreads, MaxCalls, DontWait);
1030 if (list_empty(&protseqs))
1031 return RPC_S_NO_PROTSEQS_REGISTERED;
1033 status = RPCRT4_start_listen(FALSE);
1035 if (DontWait || (status != RPC_S_OK)) return status;
1037 return RpcMgmtWaitServerListen();
1040 /***********************************************************************
1041 * RpcMgmtServerWaitListen (RPCRT4.@)
1043 RPC_STATUS WINAPI RpcMgmtWaitServerListen( void )
1045 TRACE("()\n");
1047 EnterCriticalSection(&listen_cs);
1049 if (!std_listen) {
1050 LeaveCriticalSection(&listen_cs);
1051 return RPC_S_NOT_LISTENING;
1054 LeaveCriticalSection(&listen_cs);
1056 FIXME("not waiting for server calls to finish\n");
1058 return RPC_S_OK;
1061 /***********************************************************************
1062 * RpcMgmtStopServerListening (RPCRT4.@)
1064 RPC_STATUS WINAPI RpcMgmtStopServerListening ( RPC_BINDING_HANDLE Binding )
1066 TRACE("(Binding == (RPC_BINDING_HANDLE)^%p)\n", Binding);
1068 if (Binding) {
1069 FIXME("client-side invocation not implemented.\n");
1070 return RPC_S_WRONG_KIND_OF_BINDING;
1073 RPCRT4_stop_listen(FALSE);
1075 return RPC_S_OK;
1078 /***********************************************************************
1079 * RpcMgmtEnableIdleCleanup (RPCRT4.@)
1081 RPC_STATUS WINAPI RpcMgmtEnableIdleCleanup(void)
1083 FIXME("(): stub\n");
1084 return RPC_S_OK;
1087 /***********************************************************************
1088 * I_RpcServerStartListening (RPCRT4.@)
1090 RPC_STATUS WINAPI I_RpcServerStartListening( HWND hWnd )
1092 FIXME( "(%p): stub\n", hWnd );
1094 return RPC_S_OK;
1097 /***********************************************************************
1098 * I_RpcServerStopListening (RPCRT4.@)
1100 RPC_STATUS WINAPI I_RpcServerStopListening( void )
1102 FIXME( "(): stub\n" );
1104 return RPC_S_OK;
1107 /***********************************************************************
1108 * I_RpcWindowProc (RPCRT4.@)
1110 UINT WINAPI I_RpcWindowProc( void *hWnd, UINT Message, UINT wParam, ULONG lParam )
1112 FIXME( "(%p,%08x,%08x,%08x): stub\n", hWnd, Message, wParam, lParam );
1114 return 0;
1117 /***********************************************************************
1118 * RpcMgmtInqIfIds (RPCRT4.@)
1120 RPC_STATUS WINAPI RpcMgmtInqIfIds(RPC_BINDING_HANDLE Binding, RPC_IF_ID_VECTOR **IfIdVector)
1122 FIXME("(%p,%p): stub\n", Binding, IfIdVector);
1123 return RPC_S_INVALID_BINDING;
1126 /***********************************************************************
1127 * RpcMgmtInqStats (RPCRT4.@)
1129 RPC_STATUS WINAPI RpcMgmtInqStats(RPC_BINDING_HANDLE Binding, RPC_STATS_VECTOR **Statistics)
1131 RPC_STATS_VECTOR *stats;
1133 FIXME("(%p,%p)\n", Binding, Statistics);
1135 if ((stats = HeapAlloc(GetProcessHeap(), 0, sizeof(RPC_STATS_VECTOR))))
1137 stats->Count = 1;
1138 stats->Stats[0] = 0;
1139 *Statistics = stats;
1140 return RPC_S_OK;
1142 return RPC_S_OUT_OF_RESOURCES;
1145 /***********************************************************************
1146 * RpcMgmtStatsVectorFree (RPCRT4.@)
1148 RPC_STATUS WINAPI RpcMgmtStatsVectorFree(RPC_STATS_VECTOR **StatsVector)
1150 FIXME("(%p)\n", StatsVector);
1152 if (StatsVector)
1154 HeapFree(GetProcessHeap(), 0, *StatsVector);
1155 *StatsVector = NULL;
1157 return RPC_S_OK;
1160 /***********************************************************************
1161 * RpcMgmtEpEltInqBegin (RPCRT4.@)
1163 RPC_STATUS WINAPI RpcMgmtEpEltInqBegin(RPC_BINDING_HANDLE Binding, ULONG InquiryType,
1164 RPC_IF_ID *IfId, ULONG VersOption, UUID *ObjectUuid, RPC_EP_INQ_HANDLE* InquiryContext)
1166 FIXME("(%p,%u,%p,%u,%p,%p): stub\n",
1167 Binding, InquiryType, IfId, VersOption, ObjectUuid, InquiryContext);
1168 return RPC_S_INVALID_BINDING;
1171 /***********************************************************************
1172 * RpcMgmtIsServerListening (RPCRT4.@)
1174 RPC_STATUS WINAPI RpcMgmtIsServerListening(RPC_BINDING_HANDLE Binding)
1176 FIXME("(%p): stub\n", Binding);
1177 return RPC_S_INVALID_BINDING;
1180 /***********************************************************************
1181 * RpcMgmtSetServerStackSize (RPCRT4.@)
1183 RPC_STATUS WINAPI RpcMgmtSetServerStackSize(ULONG ThreadStackSize)
1185 FIXME("(0x%x): stub\n", ThreadStackSize);
1186 return RPC_S_OK;
1189 /***********************************************************************
1190 * I_RpcGetCurrentCallHandle (RPCRT4.@)
1192 RPC_BINDING_HANDLE WINAPI I_RpcGetCurrentCallHandle(void)
1194 TRACE("\n");
1195 return RPCRT4_GetThreadCurrentCallHandle();