4 * Copyright 2001 Ove Kåven, TransGaming Technologies
5 * Copyright 2003 Mike Hearn
6 * Copyright 2004 Filip Navara
7 * Copyright 2006 CodeWeavers
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
34 #include "wine/unicode.h"
39 #include "wine/debug.h"
41 #include "rpc_binding.h"
42 #include "rpc_assoc.h"
44 WINE_DEFAULT_DEBUG_CHANNEL(rpc
);
46 LPSTR
RPCRT4_strndupA(LPCSTR src
, INT slen
)
50 if (!src
) return NULL
;
51 if (slen
== -1) slen
= strlen(src
);
53 s
= HeapAlloc(GetProcessHeap(), 0, len
+1);
59 LPSTR
RPCRT4_strdupWtoA(LPCWSTR src
)
63 if (!src
) return NULL
;
64 len
= WideCharToMultiByte(CP_ACP
, 0, src
, -1, NULL
, 0, NULL
, NULL
);
65 s
= HeapAlloc(GetProcessHeap(), 0, len
);
66 WideCharToMultiByte(CP_ACP
, 0, src
, -1, s
, len
, NULL
, NULL
);
70 LPWSTR
RPCRT4_strdupAtoW(LPCSTR src
)
74 if (!src
) return NULL
;
75 len
= MultiByteToWideChar(CP_ACP
, 0, src
, -1, NULL
, 0);
76 s
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
77 MultiByteToWideChar(CP_ACP
, 0, src
, -1, s
, len
);
81 static LPWSTR
RPCRT4_strndupAtoW(LPCSTR src
, INT slen
)
85 if (!src
) return NULL
;
86 len
= MultiByteToWideChar(CP_ACP
, 0, src
, slen
, NULL
, 0);
87 s
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
88 MultiByteToWideChar(CP_ACP
, 0, src
, slen
, s
, len
);
92 LPWSTR
RPCRT4_strndupW(LPCWSTR src
, INT slen
)
96 if (!src
) return NULL
;
97 if (slen
== -1) slen
= strlenW(src
);
99 s
= HeapAlloc(GetProcessHeap(), 0, (len
+1)*sizeof(WCHAR
));
100 memcpy(s
, src
, len
*sizeof(WCHAR
));
105 void RPCRT4_strfree(LPSTR src
)
107 HeapFree(GetProcessHeap(), 0, src
);
110 static RPC_STATUS
RPCRT4_AllocBinding(RpcBinding
** Binding
, BOOL server
)
112 RpcBinding
* NewBinding
;
114 NewBinding
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sizeof(RpcBinding
));
115 NewBinding
->refs
= 1;
116 NewBinding
->server
= server
;
118 *Binding
= NewBinding
;
123 static RPC_STATUS
RPCRT4_CreateBindingA(RpcBinding
** Binding
, BOOL server
, LPCSTR Protseq
)
125 RpcBinding
* NewBinding
;
127 RPCRT4_AllocBinding(&NewBinding
, server
);
128 NewBinding
->Protseq
= RPCRT4_strdupA(Protseq
);
130 TRACE("binding: %p\n", NewBinding
);
131 *Binding
= NewBinding
;
136 static RPC_STATUS
RPCRT4_CreateBindingW(RpcBinding
** Binding
, BOOL server
, LPCWSTR Protseq
)
138 RpcBinding
* NewBinding
;
140 RPCRT4_AllocBinding(&NewBinding
, server
);
141 NewBinding
->Protseq
= RPCRT4_strdupWtoA(Protseq
);
143 TRACE("binding: %p\n", NewBinding
);
144 *Binding
= NewBinding
;
149 static RPC_STATUS
RPCRT4_CompleteBindingA(RpcBinding
* Binding
, LPCSTR NetworkAddr
,
150 LPCSTR Endpoint
, LPCSTR NetworkOptions
)
154 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding
,
155 debugstr_a(NetworkAddr
), debugstr_a(Endpoint
), debugstr_a(NetworkOptions
));
157 RPCRT4_strfree(Binding
->NetworkAddr
);
158 Binding
->NetworkAddr
= RPCRT4_strdupA(NetworkAddr
);
159 RPCRT4_strfree(Binding
->Endpoint
);
161 Binding
->Endpoint
= RPCRT4_strdupA(Endpoint
);
163 Binding
->Endpoint
= RPCRT4_strdupA("");
165 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
166 Binding
->NetworkOptions
= RPCRT4_strdupAtoW(NetworkOptions
);
167 if (!Binding
->Endpoint
) ERR("out of memory?\n");
169 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
170 Binding
->Endpoint
, Binding
->NetworkOptions
,
172 if (status
!= RPC_S_OK
)
178 static RPC_STATUS
RPCRT4_CompleteBindingW(RpcBinding
* Binding
, LPCWSTR NetworkAddr
,
179 LPCWSTR Endpoint
, LPCWSTR NetworkOptions
)
183 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding
,
184 debugstr_w(NetworkAddr
), debugstr_w(Endpoint
), debugstr_w(NetworkOptions
));
186 RPCRT4_strfree(Binding
->NetworkAddr
);
187 Binding
->NetworkAddr
= RPCRT4_strdupWtoA(NetworkAddr
);
188 RPCRT4_strfree(Binding
->Endpoint
);
190 Binding
->Endpoint
= RPCRT4_strdupWtoA(Endpoint
);
192 Binding
->Endpoint
= RPCRT4_strdupA("");
194 if (!Binding
->Endpoint
) ERR("out of memory?\n");
195 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
196 Binding
->NetworkOptions
= RPCRT4_strdupW(NetworkOptions
);
198 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
199 Binding
->Endpoint
, Binding
->NetworkOptions
,
201 if (status
!= RPC_S_OK
)
207 RPC_STATUS
RPCRT4_ResolveBinding(RpcBinding
* Binding
, LPCSTR Endpoint
)
211 TRACE("(RpcBinding == ^%p, EndPoint == \"%s\"\n", Binding
, Endpoint
);
213 RPCRT4_strfree(Binding
->Endpoint
);
214 Binding
->Endpoint
= RPCRT4_strdupA(Endpoint
);
216 RpcAssoc_Release(Binding
->Assoc
);
217 Binding
->Assoc
= NULL
;
218 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
219 Binding
->Endpoint
, Binding
->NetworkOptions
,
221 if (status
!= RPC_S_OK
)
227 RPC_STATUS
RPCRT4_SetBindingObject(RpcBinding
* Binding
, const UUID
* ObjectUuid
)
229 TRACE("(*RpcBinding == ^%p, UUID == %s)\n", Binding
, debugstr_guid(ObjectUuid
));
230 if (ObjectUuid
) Binding
->ObjectUuid
= *ObjectUuid
;
231 else UuidCreateNil(&Binding
->ObjectUuid
);
235 RPC_STATUS
RPCRT4_MakeBinding(RpcBinding
** Binding
, RpcConnection
* Connection
)
237 RpcBinding
* NewBinding
;
238 TRACE("(RpcBinding == ^%p, Connection == ^%p)\n", Binding
, Connection
);
240 RPCRT4_AllocBinding(&NewBinding
, Connection
->server
);
241 NewBinding
->Protseq
= RPCRT4_strdupA(rpcrt4_conn_get_name(Connection
));
242 NewBinding
->NetworkAddr
= RPCRT4_strdupA(Connection
->NetworkAddr
);
243 NewBinding
->Endpoint
= RPCRT4_strdupA(Connection
->Endpoint
);
244 NewBinding
->FromConn
= Connection
;
246 TRACE("binding: %p\n", NewBinding
);
247 *Binding
= NewBinding
;
252 void RPCRT4_AddRefBinding(RpcBinding
* Binding
)
254 InterlockedIncrement(&Binding
->refs
);
257 RPC_STATUS
RPCRT4_ReleaseBinding(RpcBinding
* Binding
)
259 if (InterlockedDecrement(&Binding
->refs
))
262 TRACE("binding: %p\n", Binding
);
263 if (Binding
->Assoc
) RpcAssoc_Release(Binding
->Assoc
);
264 RPCRT4_strfree(Binding
->Endpoint
);
265 RPCRT4_strfree(Binding
->NetworkAddr
);
266 RPCRT4_strfree(Binding
->Protseq
);
267 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
268 if (Binding
->AuthInfo
) RpcAuthInfo_Release(Binding
->AuthInfo
);
269 if (Binding
->QOS
) RpcQualityOfService_Release(Binding
->QOS
);
270 HeapFree(GetProcessHeap(), 0, Binding
);
274 RPC_STATUS
RPCRT4_OpenBinding(RpcBinding
* Binding
, RpcConnection
** Connection
,
275 const RPC_SYNTAX_IDENTIFIER
*TransferSyntax
,
276 const RPC_SYNTAX_IDENTIFIER
*InterfaceId
)
278 TRACE("(Binding == ^%p)\n", Binding
);
280 if (!Binding
->server
) {
281 return RpcAssoc_GetClientConnection(Binding
->Assoc
, InterfaceId
,
282 TransferSyntax
, Binding
->AuthInfo
, Binding
->QOS
, Connection
);
284 /* we already have a connection with acceptable binding, so use it */
285 if (Binding
->FromConn
) {
286 *Connection
= Binding
->FromConn
;
289 ERR("no connection in binding\n");
290 return RPC_S_INTERNAL_ERROR
;
295 RPC_STATUS
RPCRT4_CloseBinding(RpcBinding
* Binding
, RpcConnection
* Connection
)
297 TRACE("(Binding == ^%p)\n", Binding
);
298 if (!Connection
) return RPC_S_OK
;
299 if (Binding
->server
) {
300 /* don't destroy a connection that is cached in the binding */
301 if (Binding
->FromConn
== Connection
)
303 return RPCRT4_DestroyConnection(Connection
);
306 RpcAssoc_ReleaseIdleConnection(Binding
->Assoc
, Connection
);
311 /* utility functions for string composing and parsing */
312 static unsigned RPCRT4_strcopyA(LPSTR data
, LPCSTR src
)
314 unsigned len
= strlen(src
);
315 memcpy(data
, src
, len
*sizeof(CHAR
));
319 static unsigned RPCRT4_strcopyW(LPWSTR data
, LPCWSTR src
)
321 unsigned len
= strlenW(src
);
322 memcpy(data
, src
, len
*sizeof(WCHAR
));
326 static LPSTR
RPCRT4_strconcatA(LPSTR dst
, LPCSTR src
)
328 DWORD len
= strlen(dst
), slen
= strlen(src
);
329 LPSTR ndst
= HeapReAlloc(GetProcessHeap(), 0, dst
, (len
+slen
+2)*sizeof(CHAR
));
332 HeapFree(GetProcessHeap(), 0, dst
);
336 memcpy(ndst
+len
+1, src
, slen
+1);
340 static LPWSTR
RPCRT4_strconcatW(LPWSTR dst
, LPCWSTR src
)
342 DWORD len
= strlenW(dst
), slen
= strlenW(src
);
343 LPWSTR ndst
= HeapReAlloc(GetProcessHeap(), 0, dst
, (len
+slen
+2)*sizeof(WCHAR
));
346 HeapFree(GetProcessHeap(), 0, dst
);
350 memcpy(ndst
+len
+1, src
, (slen
+1)*sizeof(WCHAR
));
355 /***********************************************************************
356 * RpcStringBindingComposeA (RPCRT4.@)
358 RPC_STATUS WINAPI
RpcStringBindingComposeA(RPC_CSTR ObjUuid
, RPC_CSTR Protseq
,
359 RPC_CSTR NetworkAddr
, RPC_CSTR Endpoint
,
360 RPC_CSTR Options
, RPC_CSTR
*StringBinding
)
365 TRACE( "(%s,%s,%s,%s,%s,%p)\n",
366 debugstr_a( (char*)ObjUuid
), debugstr_a( (char*)Protseq
),
367 debugstr_a( (char*)NetworkAddr
), debugstr_a( (char*)Endpoint
),
368 debugstr_a( (char*)Options
), StringBinding
);
370 if (ObjUuid
&& *ObjUuid
) len
+= strlen((char*)ObjUuid
) + 1;
371 if (Protseq
&& *Protseq
) len
+= strlen((char*)Protseq
) + 1;
372 if (NetworkAddr
&& *NetworkAddr
) len
+= strlen((char*)NetworkAddr
);
373 if (Endpoint
&& *Endpoint
) len
+= strlen((char*)Endpoint
) + 2;
374 if (Options
&& *Options
) len
+= strlen((char*)Options
) + 2;
376 data
= HeapAlloc(GetProcessHeap(), 0, len
);
377 *StringBinding
= (unsigned char*)data
;
379 if (ObjUuid
&& *ObjUuid
) {
380 data
+= RPCRT4_strcopyA(data
, (char*)ObjUuid
);
383 if (Protseq
&& *Protseq
) {
384 data
+= RPCRT4_strcopyA(data
, (char*)Protseq
);
387 if (NetworkAddr
&& *NetworkAddr
)
388 data
+= RPCRT4_strcopyA(data
, (char*)NetworkAddr
);
390 if ((Endpoint
&& *Endpoint
) ||
391 (Options
&& *Options
)) {
393 if (Endpoint
&& *Endpoint
) {
394 data
+= RPCRT4_strcopyA(data
, (char*)Endpoint
);
395 if (Options
&& *Options
) *data
++ = ',';
397 if (Options
&& *Options
) {
398 data
+= RPCRT4_strcopyA(data
, (char*)Options
);
407 /***********************************************************************
408 * RpcStringBindingComposeW (RPCRT4.@)
410 RPC_STATUS WINAPI
RpcStringBindingComposeW( RPC_WSTR ObjUuid
, RPC_WSTR Protseq
,
411 RPC_WSTR NetworkAddr
, RPC_WSTR Endpoint
,
412 RPC_WSTR Options
, RPC_WSTR
* StringBinding
)
417 TRACE("(%s,%s,%s,%s,%s,%p)\n",
418 debugstr_w( ObjUuid
), debugstr_w( Protseq
),
419 debugstr_w( NetworkAddr
), debugstr_w( Endpoint
),
420 debugstr_w( Options
), StringBinding
);
422 if (ObjUuid
&& *ObjUuid
) len
+= strlenW(ObjUuid
) + 1;
423 if (Protseq
&& *Protseq
) len
+= strlenW(Protseq
) + 1;
424 if (NetworkAddr
&& *NetworkAddr
) len
+= strlenW(NetworkAddr
);
425 if (Endpoint
&& *Endpoint
) len
+= strlenW(Endpoint
) + 2;
426 if (Options
&& *Options
) len
+= strlenW(Options
) + 2;
428 data
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
429 *StringBinding
= data
;
431 if (ObjUuid
&& *ObjUuid
) {
432 data
+= RPCRT4_strcopyW(data
, ObjUuid
);
435 if (Protseq
&& *Protseq
) {
436 data
+= RPCRT4_strcopyW(data
, Protseq
);
439 if (NetworkAddr
&& *NetworkAddr
) {
440 data
+= RPCRT4_strcopyW(data
, NetworkAddr
);
442 if ((Endpoint
&& *Endpoint
) ||
443 (Options
&& *Options
)) {
445 if (Endpoint
&& *Endpoint
) {
446 data
+= RPCRT4_strcopyW(data
, Endpoint
);
447 if (Options
&& *Options
) *data
++ = ',';
449 if (Options
&& *Options
) {
450 data
+= RPCRT4_strcopyW(data
, Options
);
460 /***********************************************************************
461 * RpcStringBindingParseA (RPCRT4.@)
463 RPC_STATUS WINAPI
RpcStringBindingParseA( RPC_CSTR StringBinding
, RPC_CSTR
*ObjUuid
,
464 RPC_CSTR
*Protseq
, RPC_CSTR
*NetworkAddr
,
465 RPC_CSTR
*Endpoint
, RPC_CSTR
*Options
)
468 static const char ep_opt
[] = "endpoint=";
469 BOOL endpoint_already_found
= FALSE
;
471 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_a((char*)StringBinding
),
472 ObjUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
);
474 if (ObjUuid
) *ObjUuid
= NULL
;
475 if (Protseq
) *Protseq
= NULL
;
476 if (NetworkAddr
) *NetworkAddr
= NULL
;
477 if (Endpoint
) *Endpoint
= NULL
;
478 if (Options
) *Options
= NULL
;
480 data
= (char*) StringBinding
;
482 next
= strchr(data
, '@');
484 if (ObjUuid
) *ObjUuid
= (unsigned char*)RPCRT4_strndupA(data
, next
- data
);
488 next
= strchr(data
, ':');
490 if (Protseq
) *Protseq
= (unsigned char*)RPCRT4_strndupA(data
, next
- data
);
494 next
= strchr(data
, '[');
498 if (NetworkAddr
) *NetworkAddr
= (unsigned char*)RPCRT4_strndupA(data
, next
- data
);
500 close
= strchr(data
, ']');
501 if (!close
) goto fail
;
503 /* tokenize options */
504 while (data
< close
) {
505 next
= strchr(data
, ',');
506 if (!next
|| next
> close
) next
= close
;
507 /* FIXME: this is kind of inefficient */
508 opt
= RPCRT4_strndupA(data
, next
- data
);
512 next
= strchr(opt
, '=');
514 /* not an option, must be an endpoint */
515 if (endpoint_already_found
) goto fail
;
516 if (Endpoint
) *Endpoint
= (unsigned char*) opt
;
517 else HeapFree(GetProcessHeap(), 0, opt
);
518 endpoint_already_found
= TRUE
;
520 if (strncmp(opt
, ep_opt
, strlen(ep_opt
)) == 0) {
521 /* endpoint option */
522 if (endpoint_already_found
) goto fail
;
523 if (Endpoint
) *Endpoint
= (unsigned char*) RPCRT4_strdupA(next
+1);
524 HeapFree(GetProcessHeap(), 0, opt
);
525 endpoint_already_found
= TRUE
;
530 /* FIXME: this is kind of inefficient */
531 *Options
= (unsigned char*) RPCRT4_strconcatA( (char*)*Options
, opt
);
532 HeapFree(GetProcessHeap(), 0, opt
);
534 *Options
= (unsigned char*) opt
;
536 HeapFree(GetProcessHeap(), 0, opt
);
542 if (*data
) goto fail
;
544 else if (NetworkAddr
)
545 *NetworkAddr
= (unsigned char*)RPCRT4_strdupA(data
);
550 if (ObjUuid
) RpcStringFreeA((unsigned char**)ObjUuid
);
551 if (Protseq
) RpcStringFreeA((unsigned char**)Protseq
);
552 if (NetworkAddr
) RpcStringFreeA((unsigned char**)NetworkAddr
);
553 if (Endpoint
) RpcStringFreeA((unsigned char**)Endpoint
);
554 if (Options
) RpcStringFreeA((unsigned char**)Options
);
555 return RPC_S_INVALID_STRING_BINDING
;
558 /***********************************************************************
559 * RpcStringBindingParseW (RPCRT4.@)
561 RPC_STATUS WINAPI
RpcStringBindingParseW( RPC_WSTR StringBinding
, RPC_WSTR
*ObjUuid
,
562 RPC_WSTR
*Protseq
, RPC_WSTR
*NetworkAddr
,
563 RPC_WSTR
*Endpoint
, RPC_WSTR
*Options
)
566 static const WCHAR ep_opt
[] = {'e','n','d','p','o','i','n','t','=',0};
567 BOOL endpoint_already_found
= FALSE
;
569 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_w(StringBinding
),
570 ObjUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
);
572 if (ObjUuid
) *ObjUuid
= NULL
;
573 if (Protseq
) *Protseq
= NULL
;
574 if (NetworkAddr
) *NetworkAddr
= NULL
;
575 if (Endpoint
) *Endpoint
= NULL
;
576 if (Options
) *Options
= NULL
;
578 data
= StringBinding
;
580 next
= strchrW(data
, '@');
582 if (ObjUuid
) *ObjUuid
= RPCRT4_strndupW(data
, next
- data
);
586 next
= strchrW(data
, ':');
588 if (Protseq
) *Protseq
= RPCRT4_strndupW(data
, next
- data
);
592 next
= strchrW(data
, '[');
596 if (NetworkAddr
) *NetworkAddr
= RPCRT4_strndupW(data
, next
- data
);
598 close
= strchrW(data
, ']');
599 if (!close
) goto fail
;
601 /* tokenize options */
602 while (data
< close
) {
603 next
= strchrW(data
, ',');
604 if (!next
|| next
> close
) next
= close
;
605 /* FIXME: this is kind of inefficient */
606 opt
= RPCRT4_strndupW(data
, next
- data
);
610 next
= strchrW(opt
, '=');
612 /* not an option, must be an endpoint */
613 if (endpoint_already_found
) goto fail
;
614 if (Endpoint
) *Endpoint
= opt
;
615 else HeapFree(GetProcessHeap(), 0, opt
);
616 endpoint_already_found
= TRUE
;
618 if (strncmpW(opt
, ep_opt
, strlenW(ep_opt
)) == 0) {
619 /* endpoint option */
620 if (endpoint_already_found
) goto fail
;
621 if (Endpoint
) *Endpoint
= RPCRT4_strdupW(next
+1);
622 HeapFree(GetProcessHeap(), 0, opt
);
623 endpoint_already_found
= TRUE
;
628 /* FIXME: this is kind of inefficient */
629 *Options
= RPCRT4_strconcatW(*Options
, opt
);
630 HeapFree(GetProcessHeap(), 0, opt
);
634 HeapFree(GetProcessHeap(), 0, opt
);
640 if (*data
) goto fail
;
641 } else if (NetworkAddr
)
642 *NetworkAddr
= RPCRT4_strdupW(data
);
647 if (ObjUuid
) RpcStringFreeW(ObjUuid
);
648 if (Protseq
) RpcStringFreeW(Protseq
);
649 if (NetworkAddr
) RpcStringFreeW(NetworkAddr
);
650 if (Endpoint
) RpcStringFreeW(Endpoint
);
651 if (Options
) RpcStringFreeW(Options
);
652 return RPC_S_INVALID_STRING_BINDING
;
655 /***********************************************************************
656 * RpcBindingFree (RPCRT4.@)
658 RPC_STATUS WINAPI
RpcBindingFree( RPC_BINDING_HANDLE
* Binding
)
661 TRACE("(%p) = %p\n", Binding
, *Binding
);
662 status
= RPCRT4_ReleaseBinding(*Binding
);
663 if (status
== RPC_S_OK
) *Binding
= 0;
667 /***********************************************************************
668 * RpcBindingVectorFree (RPCRT4.@)
670 RPC_STATUS WINAPI
RpcBindingVectorFree( RPC_BINDING_VECTOR
** BindingVector
)
675 TRACE("(%p)\n", BindingVector
);
676 for (c
=0; c
<(*BindingVector
)->Count
; c
++) {
677 status
= RpcBindingFree(&(*BindingVector
)->BindingH
[c
]);
679 HeapFree(GetProcessHeap(), 0, *BindingVector
);
680 *BindingVector
= NULL
;
684 /***********************************************************************
685 * RpcBindingInqObject (RPCRT4.@)
687 RPC_STATUS WINAPI
RpcBindingInqObject( RPC_BINDING_HANDLE Binding
, UUID
* ObjectUuid
)
689 RpcBinding
* bind
= (RpcBinding
*)Binding
;
691 TRACE("(%p,%p) = %s\n", Binding
, ObjectUuid
, debugstr_guid(&bind
->ObjectUuid
));
692 *ObjectUuid
= bind
->ObjectUuid
;
696 /***********************************************************************
697 * RpcBindingSetObject (RPCRT4.@)
699 RPC_STATUS WINAPI
RpcBindingSetObject( RPC_BINDING_HANDLE Binding
, UUID
* ObjectUuid
)
701 RpcBinding
* bind
= (RpcBinding
*)Binding
;
703 TRACE("(%p,%s)\n", Binding
, debugstr_guid(ObjectUuid
));
704 if (bind
->server
) return RPC_S_WRONG_KIND_OF_BINDING
;
705 return RPCRT4_SetBindingObject(Binding
, ObjectUuid
);
708 /***********************************************************************
709 * RpcBindingFromStringBindingA (RPCRT4.@)
711 RPC_STATUS WINAPI
RpcBindingFromStringBindingA( RPC_CSTR StringBinding
, RPC_BINDING_HANDLE
* Binding
)
714 RpcBinding
* bind
= NULL
;
715 RPC_CSTR ObjectUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
;
718 TRACE("(%s,%p)\n", debugstr_a((char*)StringBinding
), Binding
);
720 ret
= RpcStringBindingParseA(StringBinding
, &ObjectUuid
, &Protseq
,
721 &NetworkAddr
, &Endpoint
, &Options
);
722 if (ret
!= RPC_S_OK
) return ret
;
724 ret
= UuidFromStringA(ObjectUuid
, &Uuid
);
727 ret
= RPCRT4_CreateBindingA(&bind
, FALSE
, (char*)Protseq
);
728 if (ret
!= RPC_S_OK
) return ret
;
729 ret
= RPCRT4_SetBindingObject(bind
, &Uuid
);
731 ret
= RPCRT4_CompleteBindingA(bind
, (char*)NetworkAddr
, (char*)Endpoint
, (char*)Options
);
733 RpcStringFreeA((unsigned char**)&Options
);
734 RpcStringFreeA((unsigned char**)&Endpoint
);
735 RpcStringFreeA((unsigned char**)&NetworkAddr
);
736 RpcStringFreeA((unsigned char**)&Protseq
);
737 RpcStringFreeA((unsigned char**)&ObjectUuid
);
740 *Binding
= (RPC_BINDING_HANDLE
)bind
;
742 RPCRT4_ReleaseBinding(bind
);
747 /***********************************************************************
748 * RpcBindingFromStringBindingW (RPCRT4.@)
750 RPC_STATUS WINAPI
RpcBindingFromStringBindingW( RPC_WSTR StringBinding
, RPC_BINDING_HANDLE
* Binding
)
753 RpcBinding
* bind
= NULL
;
754 RPC_WSTR ObjectUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
;
757 TRACE("(%s,%p)\n", debugstr_w(StringBinding
), Binding
);
759 ret
= RpcStringBindingParseW(StringBinding
, &ObjectUuid
, &Protseq
,
760 &NetworkAddr
, &Endpoint
, &Options
);
761 if (ret
!= RPC_S_OK
) return ret
;
763 ret
= UuidFromStringW(ObjectUuid
, &Uuid
);
766 ret
= RPCRT4_CreateBindingW(&bind
, FALSE
, Protseq
);
767 if (ret
!= RPC_S_OK
) return ret
;
768 ret
= RPCRT4_SetBindingObject(bind
, &Uuid
);
770 ret
= RPCRT4_CompleteBindingW(bind
, NetworkAddr
, Endpoint
, Options
);
772 RpcStringFreeW(&Options
);
773 RpcStringFreeW(&Endpoint
);
774 RpcStringFreeW(&NetworkAddr
);
775 RpcStringFreeW(&Protseq
);
776 RpcStringFreeW(&ObjectUuid
);
779 *Binding
= (RPC_BINDING_HANDLE
)bind
;
781 RPCRT4_ReleaseBinding(bind
);
786 /***********************************************************************
787 * RpcBindingToStringBindingA (RPCRT4.@)
789 RPC_STATUS WINAPI
RpcBindingToStringBindingA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*StringBinding
)
792 RpcBinding
* bind
= (RpcBinding
*)Binding
;
795 TRACE("(%p,%p)\n", Binding
, StringBinding
);
797 ret
= UuidToStringA(&bind
->ObjectUuid
, &ObjectUuid
);
798 if (ret
!= RPC_S_OK
) return ret
;
800 ret
= RpcStringBindingComposeA(ObjectUuid
, (unsigned char*)bind
->Protseq
, (unsigned char*) bind
->NetworkAddr
,
801 (unsigned char*) bind
->Endpoint
, NULL
, StringBinding
);
803 RpcStringFreeA(&ObjectUuid
);
808 /***********************************************************************
809 * RpcBindingToStringBindingW (RPCRT4.@)
811 RPC_STATUS WINAPI
RpcBindingToStringBindingW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*StringBinding
)
814 unsigned char *str
= NULL
;
815 TRACE("(%p,%p)\n", Binding
, StringBinding
);
816 ret
= RpcBindingToStringBindingA(Binding
, &str
);
817 *StringBinding
= RPCRT4_strdupAtoW((char*)str
);
818 RpcStringFreeA((unsigned char**)&str
);
822 /***********************************************************************
823 * I_RpcBindingInqTransportType (RPCRT4.@)
825 RPC_STATUS WINAPI
I_RpcBindingInqTransportType( RPC_BINDING_HANDLE Binding
, unsigned int * Type
)
828 FIXME( "(%p,%p): stub\n", Binding
, Type
);
829 *Type
= TRANSPORT_TYPE_LPC
;
833 /***********************************************************************
834 * I_RpcBindingSetAsync (RPCRT4.@)
836 * Exists in win9x and winNT, but with different number of arguments
837 * (9x version has 3 arguments, NT has 2).
839 RPC_STATUS WINAPI
I_RpcBindingSetAsync( RPC_BINDING_HANDLE Binding
, RPC_BLOCKING_FN BlockingFn
)
841 RpcBinding
* bind
= (RpcBinding
*)Binding
;
843 TRACE( "(%p,%p): stub\n", Binding
, BlockingFn
);
845 bind
->BlockingFn
= BlockingFn
;
850 /***********************************************************************
851 * RpcBindingCopy (RPCRT4.@)
853 RPC_STATUS RPC_ENTRY
RpcBindingCopy(
854 RPC_BINDING_HANDLE SourceBinding
,
855 RPC_BINDING_HANDLE
* DestinationBinding
)
857 RpcBinding
*DestBinding
;
858 RpcBinding
*SrcBinding
= (RpcBinding
*)SourceBinding
;
861 TRACE("(%p, %p)\n", SourceBinding
, DestinationBinding
);
863 status
= RPCRT4_AllocBinding(&DestBinding
, SrcBinding
->server
);
864 if (status
!= RPC_S_OK
) return status
;
866 DestBinding
->ObjectUuid
= SrcBinding
->ObjectUuid
;
867 DestBinding
->BlockingFn
= SrcBinding
->BlockingFn
;
868 DestBinding
->Protseq
= RPCRT4_strndupA(SrcBinding
->Protseq
, -1);
869 DestBinding
->NetworkAddr
= RPCRT4_strndupA(SrcBinding
->NetworkAddr
, -1);
870 DestBinding
->Endpoint
= RPCRT4_strndupA(SrcBinding
->Endpoint
, -1);
871 DestBinding
->NetworkOptions
= RPCRT4_strdupW(SrcBinding
->NetworkOptions
);
872 if (SrcBinding
->Assoc
) SrcBinding
->Assoc
->refs
++;
873 DestBinding
->Assoc
= SrcBinding
->Assoc
;
875 if (SrcBinding
->AuthInfo
) RpcAuthInfo_AddRef(SrcBinding
->AuthInfo
);
876 DestBinding
->AuthInfo
= SrcBinding
->AuthInfo
;
877 if (SrcBinding
->QOS
) RpcQualityOfService_AddRef(SrcBinding
->QOS
);
878 DestBinding
->QOS
= SrcBinding
->QOS
;
880 *DestinationBinding
= DestBinding
;
884 /***********************************************************************
885 * RpcImpersonateClient (RPCRT4.@)
887 * Impersonates the client connected via a binding handle so that security
888 * checks are done in the context of the client.
891 * BindingHandle [I] Handle to the binding to the client.
895 * Failure: RPC_STATUS value.
899 * If BindingHandle is NULL then the function impersonates the client
900 * connected to the binding handle of the current thread.
902 RPC_STATUS WINAPI
RpcImpersonateClient(RPC_BINDING_HANDLE BindingHandle
)
904 FIXME("(%p): stub\n", BindingHandle
);
905 ImpersonateSelf(SecurityImpersonation
);
909 /***********************************************************************
910 * RpcRevertToSelfEx (RPCRT4.@)
912 * Stops impersonating the client connected to the binding handle so that security
913 * checks are no longer done in the context of the client.
916 * BindingHandle [I] Handle to the binding to the client.
920 * Failure: RPC_STATUS value.
924 * If BindingHandle is NULL then the function stops impersonating the client
925 * connected to the binding handle of the current thread.
927 RPC_STATUS WINAPI
RpcRevertToSelfEx(RPC_BINDING_HANDLE BindingHandle
)
929 FIXME("(%p): stub\n", BindingHandle
);
933 static inline BOOL
has_nt_auth_identity(ULONG AuthnLevel
)
937 case RPC_C_AUTHN_GSS_NEGOTIATE
:
938 case RPC_C_AUTHN_WINNT
:
939 case RPC_C_AUTHN_GSS_KERBEROS
:
946 static RPC_STATUS
RpcAuthInfo_Create(ULONG AuthnLevel
, ULONG AuthnSvc
,
947 CredHandle cred
, TimeStamp exp
,
949 RPC_AUTH_IDENTITY_HANDLE identity
,
952 RpcAuthInfo
*AuthInfo
= HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo
));
954 return ERROR_OUTOFMEMORY
;
957 AuthInfo
->AuthnLevel
= AuthnLevel
;
958 AuthInfo
->AuthnSvc
= AuthnSvc
;
959 AuthInfo
->cred
= cred
;
961 AuthInfo
->cbMaxToken
= cbMaxToken
;
962 AuthInfo
->identity
= identity
;
963 AuthInfo
->server_principal_name
= NULL
;
965 /* duplicate the SEC_WINNT_AUTH_IDENTITY structure, if applicable, to
966 * enable better matching in RpcAuthInfo_IsEqual */
967 if (identity
&& has_nt_auth_identity(AuthnSvc
))
969 const SEC_WINNT_AUTH_IDENTITY_W
*nt_identity
= identity
;
970 AuthInfo
->nt_identity
= HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo
->nt_identity
));
971 if (!AuthInfo
->nt_identity
)
973 HeapFree(GetProcessHeap(), 0, AuthInfo
);
974 return ERROR_OUTOFMEMORY
;
977 AuthInfo
->nt_identity
->Flags
= SEC_WINNT_AUTH_IDENTITY_UNICODE
;
978 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
979 AuthInfo
->nt_identity
->User
= RPCRT4_strndupW(nt_identity
->User
, nt_identity
->UserLength
);
981 AuthInfo
->nt_identity
->User
= RPCRT4_strndupAtoW((const char *)nt_identity
->User
, nt_identity
->UserLength
);
982 AuthInfo
->nt_identity
->UserLength
= nt_identity
->UserLength
;
983 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
984 AuthInfo
->nt_identity
->Domain
= RPCRT4_strndupW(nt_identity
->Domain
, nt_identity
->DomainLength
);
986 AuthInfo
->nt_identity
->Domain
= RPCRT4_strndupAtoW((const char *)nt_identity
->Domain
, nt_identity
->DomainLength
);
987 AuthInfo
->nt_identity
->DomainLength
= nt_identity
->DomainLength
;
988 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
989 AuthInfo
->nt_identity
->Password
= RPCRT4_strndupW(nt_identity
->Password
, nt_identity
->PasswordLength
);
991 AuthInfo
->nt_identity
->Password
= RPCRT4_strndupAtoW((const char *)nt_identity
->Password
, nt_identity
->PasswordLength
);
992 AuthInfo
->nt_identity
->PasswordLength
= nt_identity
->PasswordLength
;
994 if ((nt_identity
->User
&& !AuthInfo
->nt_identity
->User
) ||
995 (nt_identity
->Domain
&& !AuthInfo
->nt_identity
->Domain
) ||
996 (nt_identity
->Password
&& !AuthInfo
->nt_identity
->Password
))
998 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->User
);
999 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Domain
);
1000 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Password
);
1001 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
);
1002 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1003 return ERROR_OUTOFMEMORY
;
1007 AuthInfo
->nt_identity
= NULL
;
1012 ULONG
RpcAuthInfo_AddRef(RpcAuthInfo
*AuthInfo
)
1014 return InterlockedIncrement(&AuthInfo
->refs
);
1017 ULONG
RpcAuthInfo_Release(RpcAuthInfo
*AuthInfo
)
1019 ULONG refs
= InterlockedDecrement(&AuthInfo
->refs
);
1023 FreeCredentialsHandle(&AuthInfo
->cred
);
1024 if (AuthInfo
->nt_identity
)
1026 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->User
);
1027 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Domain
);
1028 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Password
);
1029 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
);
1031 HeapFree(GetProcessHeap(), 0, AuthInfo
->server_principal_name
);
1032 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1038 BOOL
RpcAuthInfo_IsEqual(const RpcAuthInfo
*AuthInfo1
, const RpcAuthInfo
*AuthInfo2
)
1040 if (AuthInfo1
== AuthInfo2
)
1043 if (!AuthInfo1
|| !AuthInfo2
)
1046 if ((AuthInfo1
->AuthnLevel
!= AuthInfo2
->AuthnLevel
) ||
1047 (AuthInfo1
->AuthnSvc
!= AuthInfo2
->AuthnSvc
))
1050 if (AuthInfo1
->identity
== AuthInfo2
->identity
)
1053 if (!AuthInfo1
->identity
|| !AuthInfo2
->identity
)
1056 if (has_nt_auth_identity(AuthInfo1
->AuthnSvc
))
1058 const SEC_WINNT_AUTH_IDENTITY_W
*identity1
= AuthInfo1
->nt_identity
;
1059 const SEC_WINNT_AUTH_IDENTITY_W
*identity2
= AuthInfo2
->nt_identity
;
1060 /* compare user names */
1061 if (identity1
->UserLength
!= identity2
->UserLength
||
1062 memcmp(identity1
->User
, identity2
->User
, identity1
->UserLength
))
1064 /* compare domain names */
1065 if (identity1
->DomainLength
!= identity2
->DomainLength
||
1066 memcmp(identity1
->Domain
, identity2
->Domain
, identity1
->DomainLength
))
1068 /* compare passwords */
1069 if (identity1
->PasswordLength
!= identity2
->PasswordLength
||
1070 memcmp(identity1
->Password
, identity2
->Password
, identity1
->PasswordLength
))
1079 static RPC_STATUS
RpcQualityOfService_Create(const RPC_SECURITY_QOS
*qos_src
, BOOL unicode
, RpcQualityOfService
**qos_dst
)
1081 RpcQualityOfService
*qos
= HeapAlloc(GetProcessHeap(), 0, sizeof(*qos
));
1084 return RPC_S_OUT_OF_RESOURCES
;
1087 qos
->qos
= HeapAlloc(GetProcessHeap(), 0, sizeof(*qos
->qos
));
1088 if (!qos
->qos
) goto error
;
1089 qos
->qos
->Version
= qos_src
->Version
;
1090 qos
->qos
->Capabilities
= qos_src
->Capabilities
;
1091 qos
->qos
->IdentityTracking
= qos_src
->IdentityTracking
;
1092 qos
->qos
->ImpersonationType
= qos_src
->ImpersonationType
;
1093 qos
->qos
->AdditionalSecurityInfoType
= 0;
1095 if (qos_src
->Version
>= 2)
1097 const RPC_SECURITY_QOS_V2_W
*qos_src2
= (const RPC_SECURITY_QOS_V2_W
*)qos_src
;
1098 qos
->qos
->AdditionalSecurityInfoType
= qos_src2
->AdditionalSecurityInfoType
;
1099 if (qos_src2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1101 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials_src
= qos_src2
->u
.HttpCredentials
;
1102 RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials_dst
;
1104 http_credentials_dst
= HeapAlloc(GetProcessHeap(), 0, sizeof(*http_credentials_dst
));
1105 qos
->qos
->u
.HttpCredentials
= http_credentials_dst
;
1106 if (!http_credentials_dst
) goto error
;
1107 http_credentials_dst
->TransportCredentials
= NULL
;
1108 http_credentials_dst
->Flags
= http_credentials_src
->Flags
;
1109 http_credentials_dst
->AuthenticationTarget
= http_credentials_src
->AuthenticationTarget
;
1110 http_credentials_dst
->NumberOfAuthnSchemes
= http_credentials_src
->NumberOfAuthnSchemes
;
1111 http_credentials_dst
->AuthnSchemes
= NULL
;
1112 http_credentials_dst
->ServerCertificateSubject
= NULL
;
1113 if (http_credentials_src
->TransportCredentials
)
1115 SEC_WINNT_AUTH_IDENTITY_W
*cred_dst
;
1116 cred_dst
= http_credentials_dst
->TransportCredentials
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sizeof(*cred_dst
));
1117 if (!cred_dst
) goto error
;
1118 cred_dst
->Flags
= SEC_WINNT_AUTH_IDENTITY_UNICODE
;
1121 const SEC_WINNT_AUTH_IDENTITY_W
*cred_src
= http_credentials_src
->TransportCredentials
;
1122 cred_dst
->UserLength
= cred_src
->UserLength
;
1123 cred_dst
->PasswordLength
= cred_src
->PasswordLength
;
1124 cred_dst
->DomainLength
= cred_src
->DomainLength
;
1125 cred_dst
->User
= RPCRT4_strndupW(cred_src
->User
, cred_src
->UserLength
);
1126 cred_dst
->Password
= RPCRT4_strndupW(cred_src
->Password
, cred_src
->PasswordLength
);
1127 cred_dst
->Domain
= RPCRT4_strndupW(cred_src
->Domain
, cred_src
->DomainLength
);
1131 const SEC_WINNT_AUTH_IDENTITY_A
*cred_src
= (const SEC_WINNT_AUTH_IDENTITY_A
*)http_credentials_src
->TransportCredentials
;
1132 cred_dst
->UserLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->User
, cred_src
->UserLength
, NULL
, 0);
1133 cred_dst
->DomainLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Domain
, cred_src
->DomainLength
, NULL
, 0);
1134 cred_dst
->PasswordLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Password
, cred_src
->PasswordLength
, NULL
, 0);
1135 cred_dst
->User
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->UserLength
* sizeof(WCHAR
));
1136 cred_dst
->Password
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->PasswordLength
* sizeof(WCHAR
));
1137 cred_dst
->Domain
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->DomainLength
* sizeof(WCHAR
));
1138 if (!cred_dst
|| !cred_dst
->Password
|| !cred_dst
->Domain
) goto error
;
1139 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->User
, cred_src
->UserLength
, cred_dst
->User
, cred_dst
->UserLength
);
1140 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Domain
, cred_src
->DomainLength
, cred_dst
->Domain
, cred_dst
->DomainLength
);
1141 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Password
, cred_src
->PasswordLength
, cred_dst
->Password
, cred_dst
->PasswordLength
);
1144 if (http_credentials_src
->NumberOfAuthnSchemes
)
1146 http_credentials_dst
->AuthnSchemes
= HeapAlloc(GetProcessHeap(), 0, http_credentials_src
->NumberOfAuthnSchemes
* sizeof(*http_credentials_dst
->AuthnSchemes
));
1147 if (!http_credentials_dst
->AuthnSchemes
) goto error
;
1148 memcpy(http_credentials_dst
->AuthnSchemes
, http_credentials_src
->AuthnSchemes
, http_credentials_src
->NumberOfAuthnSchemes
* sizeof(*http_credentials_dst
->AuthnSchemes
));
1150 if (http_credentials_src
->ServerCertificateSubject
)
1153 http_credentials_dst
->ServerCertificateSubject
=
1154 RPCRT4_strndupW(http_credentials_src
->ServerCertificateSubject
,
1155 strlenW(http_credentials_src
->ServerCertificateSubject
));
1157 http_credentials_dst
->ServerCertificateSubject
=
1158 RPCRT4_strdupAtoW((char *)http_credentials_src
->ServerCertificateSubject
);
1159 if (!http_credentials_dst
->ServerCertificateSubject
) goto error
;
1169 if (qos
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
&&
1170 qos
->qos
->u
.HttpCredentials
)
1172 if (qos
->qos
->u
.HttpCredentials
->TransportCredentials
)
1174 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->User
);
1175 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Domain
);
1176 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Password
);
1177 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
);
1179 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->AuthnSchemes
);
1180 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->ServerCertificateSubject
);
1181 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
);
1183 HeapFree(GetProcessHeap(), 0, qos
->qos
);
1185 HeapFree(GetProcessHeap(), 0, qos
);
1186 return RPC_S_OUT_OF_RESOURCES
;
1189 ULONG
RpcQualityOfService_AddRef(RpcQualityOfService
*qos
)
1191 return InterlockedIncrement(&qos
->refs
);
1194 ULONG
RpcQualityOfService_Release(RpcQualityOfService
*qos
)
1196 ULONG refs
= InterlockedDecrement(&qos
->refs
);
1200 if (qos
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1202 if (qos
->qos
->u
.HttpCredentials
->TransportCredentials
)
1204 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->User
);
1205 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Domain
);
1206 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Password
);
1207 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
);
1209 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->AuthnSchemes
);
1210 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->ServerCertificateSubject
);
1211 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
);
1213 HeapFree(GetProcessHeap(), 0, qos
->qos
);
1214 HeapFree(GetProcessHeap(), 0, qos
);
1219 BOOL
RpcQualityOfService_IsEqual(const RpcQualityOfService
*qos1
, const RpcQualityOfService
*qos2
)
1227 TRACE("qos1 = { %ld %ld %ld %ld }, qos2 = { %ld %ld %ld %ld }\n",
1228 qos1
->qos
->Capabilities
, qos1
->qos
->IdentityTracking
,
1229 qos1
->qos
->ImpersonationType
, qos1
->qos
->AdditionalSecurityInfoType
,
1230 qos2
->qos
->Capabilities
, qos2
->qos
->IdentityTracking
,
1231 qos2
->qos
->ImpersonationType
, qos2
->qos
->AdditionalSecurityInfoType
);
1233 if ((qos1
->qos
->Capabilities
!= qos2
->qos
->Capabilities
) ||
1234 (qos1
->qos
->IdentityTracking
!= qos2
->qos
->IdentityTracking
) ||
1235 (qos1
->qos
->ImpersonationType
!= qos2
->qos
->ImpersonationType
) ||
1236 (qos1
->qos
->AdditionalSecurityInfoType
!= qos2
->qos
->AdditionalSecurityInfoType
))
1239 if (qos1
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1241 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials1
= qos1
->qos
->u
.HttpCredentials
;
1242 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials2
= qos2
->qos
->u
.HttpCredentials
;
1244 if (http_credentials1
->Flags
!= http_credentials2
->Flags
)
1247 if (http_credentials1
->AuthenticationTarget
!= http_credentials2
->AuthenticationTarget
)
1250 /* authentication schemes and server certificate subject not currently used */
1252 if (http_credentials1
->TransportCredentials
!= http_credentials2
->TransportCredentials
)
1254 const SEC_WINNT_AUTH_IDENTITY_W
*identity1
= http_credentials1
->TransportCredentials
;
1255 const SEC_WINNT_AUTH_IDENTITY_W
*identity2
= http_credentials2
->TransportCredentials
;
1257 if (!identity1
|| !identity2
)
1260 /* compare user names */
1261 if (identity1
->UserLength
!= identity2
->UserLength
||
1262 memcmp(identity1
->User
, identity2
->User
, identity1
->UserLength
))
1264 /* compare domain names */
1265 if (identity1
->DomainLength
!= identity2
->DomainLength
||
1266 memcmp(identity1
->Domain
, identity2
->Domain
, identity1
->DomainLength
))
1268 /* compare passwords */
1269 if (identity1
->PasswordLength
!= identity2
->PasswordLength
||
1270 memcmp(identity1
->Password
, identity2
->Password
, identity1
->PasswordLength
))
1278 /***********************************************************************
1279 * RpcRevertToSelf (RPCRT4.@)
1281 RPC_STATUS WINAPI
RpcRevertToSelf(void)
1288 /***********************************************************************
1289 * RpcMgmtSetComTimeout (RPCRT4.@)
1291 RPC_STATUS WINAPI
RpcMgmtSetComTimeout(RPC_BINDING_HANDLE BindingHandle
, unsigned int Timeout
)
1293 FIXME("(%p, %d): stub\n", BindingHandle
, Timeout
);
1297 /***********************************************************************
1298 * RpcBindingInqAuthInfoExA (RPCRT4.@)
1300 RPCRTAPI RPC_STATUS RPC_ENTRY
1301 RpcBindingInqAuthInfoExA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1302 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
,
1303 ULONG RpcQosVersion
, RPC_SECURITY_QOS
*SecurityQOS
)
1305 FIXME("%p %p %p %p %p %p %u %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1306 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1307 return RPC_S_INVALID_BINDING
;
1310 /***********************************************************************
1311 * RpcBindingInqAuthInfoExW (RPCRT4.@)
1313 RPCRTAPI RPC_STATUS RPC_ENTRY
1314 RpcBindingInqAuthInfoExW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1315 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
,
1316 ULONG RpcQosVersion
, RPC_SECURITY_QOS
*SecurityQOS
)
1318 FIXME("%p %p %p %p %p %p %u %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1319 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1320 return RPC_S_INVALID_BINDING
;
1323 /***********************************************************************
1324 * RpcBindingInqAuthInfoA (RPCRT4.@)
1326 RPCRTAPI RPC_STATUS RPC_ENTRY
1327 RpcBindingInqAuthInfoA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1328 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
)
1330 FIXME("%p %p %p %p %p %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1331 AuthnSvc
, AuthIdentity
, AuthzSvc
);
1332 return RPC_S_INVALID_BINDING
;
1335 /***********************************************************************
1336 * RpcBindingInqAuthInfoW (RPCRT4.@)
1338 RPCRTAPI RPC_STATUS RPC_ENTRY
1339 RpcBindingInqAuthInfoW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1340 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
)
1342 FIXME("%p %p %p %p %p %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1343 AuthnSvc
, AuthIdentity
, AuthzSvc
);
1344 return RPC_S_INVALID_BINDING
;
1347 /***********************************************************************
1348 * RpcBindingSetAuthInfoExA (RPCRT4.@)
1350 RPCRTAPI RPC_STATUS RPC_ENTRY
1351 RpcBindingSetAuthInfoExA( RPC_BINDING_HANDLE Binding
, RPC_CSTR ServerPrincName
,
1352 ULONG AuthnLevel
, ULONG AuthnSvc
,
1353 RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
,
1354 RPC_SECURITY_QOS
*SecurityQos
)
1356 RpcBinding
* bind
= (RpcBinding
*)Binding
;
1360 ULONG package_count
;
1362 PSecPkgInfoA packages
;
1365 TRACE("%p %s %u %u %p %u %p\n", Binding
, debugstr_a((const char*)ServerPrincName
),
1366 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, SecurityQos
);
1372 TRACE("SecurityQos { Version=%ld, Capabilties=0x%lx, IdentityTracking=%ld, ImpersonationLevel=%ld",
1373 SecurityQos
->Version
, SecurityQos
->Capabilities
, SecurityQos
->IdentityTracking
, SecurityQos
->ImpersonationType
);
1374 if (SecurityQos
->Version
>= 2)
1376 const RPC_SECURITY_QOS_V2_A
*SecurityQos2
= (const RPC_SECURITY_QOS_V2_A
*)SecurityQos
;
1377 TRACE(", AdditionalSecurityInfoType=%ld", SecurityQos2
->AdditionalSecurityInfoType
);
1378 if (SecurityQos2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1379 TRACE(", { %p, 0x%lx, %ld, %ld, %p, %s }",
1380 SecurityQos2
->u
.HttpCredentials
->TransportCredentials
,
1381 SecurityQos2
->u
.HttpCredentials
->Flags
,
1382 SecurityQos2
->u
.HttpCredentials
->AuthenticationTarget
,
1383 SecurityQos2
->u
.HttpCredentials
->NumberOfAuthnSchemes
,
1384 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
,
1385 SecurityQos2
->u
.HttpCredentials
->ServerCertificateSubject
);
1388 status
= RpcQualityOfService_Create(SecurityQos
, FALSE
, &bind
->QOS
);
1389 if (status
!= RPC_S_OK
)
1394 if (bind
->QOS
) RpcQualityOfService_Release(bind
->QOS
);
1398 if (AuthnSvc
== RPC_C_AUTHN_DEFAULT
)
1399 AuthnSvc
= RPC_C_AUTHN_WINNT
;
1401 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1402 if (AuthnLevel
== RPC_C_AUTHN_LEVEL_DEFAULT
)
1403 AuthnLevel
= RPC_C_AUTHN_LEVEL_NONE
;
1405 if ((AuthnLevel
== RPC_C_AUTHN_LEVEL_NONE
) || (AuthnSvc
== RPC_C_AUTHN_NONE
))
1407 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1408 bind
->AuthInfo
= NULL
;
1412 if (AuthnLevel
> RPC_C_AUTHN_LEVEL_PKT_PRIVACY
)
1414 FIXME("unknown AuthnLevel %u\n", AuthnLevel
);
1415 return RPC_S_UNKNOWN_AUTHN_LEVEL
;
1418 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1419 if (AuthzSvr
&& AuthnSvc
!= RPC_C_AUTHN_WINNT
)
1421 FIXME("unsupported AuthzSvr %u\n", AuthzSvr
);
1422 return RPC_S_UNKNOWN_AUTHZ_SERVICE
;
1425 r
= EnumerateSecurityPackagesA(&package_count
, &packages
);
1428 ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n", r
);
1429 return RPC_S_SEC_PKG_ERROR
;
1432 for (i
= 0; i
< package_count
; i
++)
1433 if (packages
[i
].wRPCID
== AuthnSvc
)
1436 if (i
== package_count
)
1438 FIXME("unsupported AuthnSvc %u\n", AuthnSvc
);
1439 FreeContextBuffer(packages
);
1440 return RPC_S_UNKNOWN_AUTHN_SERVICE
;
1443 TRACE("found package %s for service %u\n", packages
[i
].Name
, AuthnSvc
);
1444 r
= AcquireCredentialsHandleA(NULL
, packages
[i
].Name
, SECPKG_CRED_OUTBOUND
, NULL
,
1445 AuthIdentity
, NULL
, NULL
, &cred
, &exp
);
1446 cbMaxToken
= packages
[i
].cbMaxToken
;
1447 FreeContextBuffer(packages
);
1448 if (r
== ERROR_SUCCESS
)
1450 RpcAuthInfo
*new_auth_info
;
1451 r
= RpcAuthInfo_Create(AuthnLevel
, AuthnSvc
, cred
, exp
, cbMaxToken
,
1452 AuthIdentity
, &new_auth_info
);
1455 new_auth_info
->server_principal_name
= RPCRT4_strdupAtoW((char *)ServerPrincName
);
1456 if (new_auth_info
->server_principal_name
)
1458 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1459 bind
->AuthInfo
= new_auth_info
;
1463 RpcAuthInfo_Release(new_auth_info
);
1464 r
= ERROR_OUTOFMEMORY
;
1468 FreeCredentialsHandle(&cred
);
1473 ERR("AcquireCredentialsHandleA failed with error 0x%08x\n", r
);
1474 return RPC_S_SEC_PKG_ERROR
;
1478 /***********************************************************************
1479 * RpcBindingSetAuthInfoExW (RPCRT4.@)
1481 RPCRTAPI RPC_STATUS RPC_ENTRY
1482 RpcBindingSetAuthInfoExW( RPC_BINDING_HANDLE Binding
, RPC_WSTR ServerPrincName
, ULONG AuthnLevel
,
1483 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
,
1484 RPC_SECURITY_QOS
*SecurityQos
)
1486 RpcBinding
* bind
= (RpcBinding
*)Binding
;
1490 ULONG package_count
;
1492 PSecPkgInfoW packages
;
1495 TRACE("%p %s %u %u %p %u %p\n", Binding
, debugstr_w((const WCHAR
*)ServerPrincName
),
1496 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, SecurityQos
);
1502 TRACE("SecurityQos { Version=%ld, Capabilties=0x%lx, IdentityTracking=%ld, ImpersonationLevel=%ld",
1503 SecurityQos
->Version
, SecurityQos
->Capabilities
, SecurityQos
->IdentityTracking
, SecurityQos
->ImpersonationType
);
1504 if (SecurityQos
->Version
>= 2)
1506 const RPC_SECURITY_QOS_V2_W
*SecurityQos2
= (const RPC_SECURITY_QOS_V2_W
*)SecurityQos
;
1507 TRACE(", AdditionalSecurityInfoType=%ld", SecurityQos2
->AdditionalSecurityInfoType
);
1508 if (SecurityQos2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1509 TRACE(", { %p, 0x%lx, %ld, %ld, %p, %s }",
1510 SecurityQos2
->u
.HttpCredentials
->TransportCredentials
,
1511 SecurityQos2
->u
.HttpCredentials
->Flags
,
1512 SecurityQos2
->u
.HttpCredentials
->AuthenticationTarget
,
1513 SecurityQos2
->u
.HttpCredentials
->NumberOfAuthnSchemes
,
1514 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
,
1515 debugstr_w(SecurityQos2
->u
.HttpCredentials
->ServerCertificateSubject
));
1518 status
= RpcQualityOfService_Create(SecurityQos
, TRUE
, &bind
->QOS
);
1519 if (status
!= RPC_S_OK
)
1524 if (bind
->QOS
) RpcQualityOfService_Release(bind
->QOS
);
1528 if (AuthnSvc
== RPC_C_AUTHN_DEFAULT
)
1529 AuthnSvc
= RPC_C_AUTHN_WINNT
;
1531 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1532 if (AuthnLevel
== RPC_C_AUTHN_LEVEL_DEFAULT
)
1533 AuthnLevel
= RPC_C_AUTHN_LEVEL_NONE
;
1535 if ((AuthnLevel
== RPC_C_AUTHN_LEVEL_NONE
) || (AuthnSvc
== RPC_C_AUTHN_NONE
))
1537 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1538 bind
->AuthInfo
= NULL
;
1542 if (AuthnLevel
> RPC_C_AUTHN_LEVEL_PKT_PRIVACY
)
1544 FIXME("unknown AuthnLevel %u\n", AuthnLevel
);
1545 return RPC_S_UNKNOWN_AUTHN_LEVEL
;
1548 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1549 if (AuthzSvr
&& AuthnSvc
!= RPC_C_AUTHN_WINNT
)
1551 FIXME("unsupported AuthzSvr %u\n", AuthzSvr
);
1552 return RPC_S_UNKNOWN_AUTHZ_SERVICE
;
1555 r
= EnumerateSecurityPackagesW(&package_count
, &packages
);
1558 ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n", r
);
1559 return RPC_S_SEC_PKG_ERROR
;
1562 for (i
= 0; i
< package_count
; i
++)
1563 if (packages
[i
].wRPCID
== AuthnSvc
)
1566 if (i
== package_count
)
1568 FIXME("unsupported AuthnSvc %u\n", AuthnSvc
);
1569 FreeContextBuffer(packages
);
1570 return RPC_S_UNKNOWN_AUTHN_SERVICE
;
1573 TRACE("found package %s for service %u\n", debugstr_w(packages
[i
].Name
), AuthnSvc
);
1574 r
= AcquireCredentialsHandleW(NULL
, packages
[i
].Name
, SECPKG_CRED_OUTBOUND
, NULL
,
1575 AuthIdentity
, NULL
, NULL
, &cred
, &exp
);
1576 cbMaxToken
= packages
[i
].cbMaxToken
;
1577 FreeContextBuffer(packages
);
1578 if (r
== ERROR_SUCCESS
)
1580 RpcAuthInfo
*new_auth_info
;
1581 r
= RpcAuthInfo_Create(AuthnLevel
, AuthnSvc
, cred
, exp
, cbMaxToken
,
1582 AuthIdentity
, &new_auth_info
);
1585 new_auth_info
->server_principal_name
= RPCRT4_strdupW(ServerPrincName
);
1586 if (!ServerPrincName
|| new_auth_info
->server_principal_name
)
1588 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1589 bind
->AuthInfo
= new_auth_info
;
1593 RpcAuthInfo_Release(new_auth_info
);
1594 r
= ERROR_OUTOFMEMORY
;
1598 FreeCredentialsHandle(&cred
);
1603 ERR("AcquireCredentialsHandleW failed with error 0x%08x\n", r
);
1604 return RPC_S_SEC_PKG_ERROR
;
1608 /***********************************************************************
1609 * RpcBindingSetAuthInfoA (RPCRT4.@)
1611 RPCRTAPI RPC_STATUS RPC_ENTRY
1612 RpcBindingSetAuthInfoA( RPC_BINDING_HANDLE Binding
, RPC_CSTR ServerPrincName
, ULONG AuthnLevel
,
1613 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
)
1615 TRACE("%p %s %u %u %p %u\n", Binding
, debugstr_a((const char*)ServerPrincName
),
1616 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
);
1617 return RpcBindingSetAuthInfoExA(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, NULL
);
1620 /***********************************************************************
1621 * RpcBindingSetAuthInfoW (RPCRT4.@)
1623 RPCRTAPI RPC_STATUS RPC_ENTRY
1624 RpcBindingSetAuthInfoW( RPC_BINDING_HANDLE Binding
, RPC_WSTR ServerPrincName
, ULONG AuthnLevel
,
1625 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
)
1627 TRACE("%p %s %u %u %p %u\n", Binding
, debugstr_w((const WCHAR
*)ServerPrincName
),
1628 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
);
1629 return RpcBindingSetAuthInfoExW(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, NULL
);
1632 /***********************************************************************
1633 * RpcBindingSetOption (RPCRT4.@)
1635 RPC_STATUS WINAPI
RpcBindingSetOption(RPC_BINDING_HANDLE BindingHandle
, ULONG Option
, ULONG_PTR OptionValue
)
1637 FIXME("(%p, %d, %ld): stub\n", BindingHandle
, Option
, OptionValue
);