Fixed header dependencies to be fully compatible with the Windows
[wine/multimedia.git] / dlls / rpcrt4 / rpc_server.c
blob2ab7f5fd3ff468fcf85a95a7bae04a33409cfe1d
1 /*
2 * RPC server API
4 * Copyright 2001 Ove Kåven, TransGaming Technologies
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
20 * TODO:
21 * - a whole lot
24 #include <stdarg.h>
25 #include <stdio.h>
26 #include <string.h>
27 #include <assert.h>
29 #include "windef.h"
30 #include "winbase.h"
31 #include "winerror.h"
32 #include "winreg.h"
33 #include "ntstatus.h"
35 #include "rpc.h"
36 #include "excpt.h"
38 #include "wine/debug.h"
39 #include "wine/exception.h"
41 #include "rpc_server.h"
42 #include "rpc_misc.h"
43 #include "rpc_defs.h"
45 #define MAX_THREADS 128
47 WINE_DEFAULT_DEBUG_CHANNEL(ole);
49 typedef struct _RpcPacket
51 struct _RpcPacket* next;
52 struct _RpcConnection* conn;
53 RpcPktHdr hdr;
54 void* buf;
55 } RpcPacket;
57 static RpcServerProtseq* protseqs;
58 static RpcServerInterface* ifs;
60 static CRITICAL_SECTION server_cs;
61 static CRITICAL_SECTION_DEBUG server_cs_debug =
63 0, 0, &server_cs,
64 { &server_cs_debug.ProcessLocksList, &server_cs_debug.ProcessLocksList },
65 0, 0, { 0, (DWORD)(__FILE__ ": server_cs") }
67 static CRITICAL_SECTION server_cs = { &server_cs_debug, -1, 0, 0, 0, 0 };
69 static CRITICAL_SECTION listen_cs;
70 static CRITICAL_SECTION_DEBUG listen_cs_debug =
72 0, 0, &listen_cs,
73 { &listen_cs_debug.ProcessLocksList, &listen_cs_debug.ProcessLocksList },
74 0, 0, { 0, (DWORD)(__FILE__ ": listen_cs") }
76 static CRITICAL_SECTION listen_cs = { &listen_cs_debug, -1, 0, 0, 0, 0 };
78 static BOOL std_listen;
79 static LONG listen_count = -1;
80 static HANDLE mgr_event, server_thread;
82 static CRITICAL_SECTION spacket_cs;
83 static CRITICAL_SECTION_DEBUG spacket_cs_debug =
85 0, 0, &spacket_cs,
86 { &spacket_cs_debug.ProcessLocksList, &spacket_cs_debug.ProcessLocksList },
87 0, 0, { 0, (DWORD)(__FILE__ ": spacket_cs") }
89 static CRITICAL_SECTION spacket_cs = { &spacket_cs_debug, -1, 0, 0, 0, 0 };
91 static RpcPacket* spacket_head;
92 static RpcPacket* spacket_tail;
93 static HANDLE server_sem;
95 static DWORD worker_count, worker_free, worker_tls;
97 static RpcServerInterface* RPCRT4_find_interface(UUID* object, UUID* if_id)
99 UUID* MgrType = NULL;
100 RpcServerInterface* cif = NULL;
101 RPC_STATUS status;
103 /* FIXME: object -> MgrType */
104 EnterCriticalSection(&server_cs);
105 cif = ifs;
106 while (cif) {
107 if (UuidEqual(if_id, &cif->If->InterfaceId.SyntaxGUID, &status) &&
108 UuidEqual(MgrType, &cif->MgrTypeUuid, &status) &&
109 (std_listen || (cif->Flags & RPC_IF_AUTOLISTEN))) break;
110 cif = cif->Next;
112 LeaveCriticalSection(&server_cs);
113 return cif;
116 static void RPCRT4_push_packet(RpcPacket* packet)
118 packet->next = NULL;
119 EnterCriticalSection(&spacket_cs);
120 if (spacket_tail) spacket_tail->next = packet;
121 else {
122 spacket_head = packet;
123 spacket_tail = packet;
125 LeaveCriticalSection(&spacket_cs);
128 static RpcPacket* RPCRT4_pop_packet(void)
130 RpcPacket* packet;
131 EnterCriticalSection(&spacket_cs);
132 packet = spacket_head;
133 if (packet) {
134 spacket_head = packet->next;
135 if (!spacket_head) spacket_tail = NULL;
137 LeaveCriticalSection(&spacket_cs);
138 if (packet) packet->next = NULL;
139 return packet;
142 static WINE_EXCEPTION_FILTER(rpc_filter)
144 PRPC_MESSAGE msg;
145 msg = TlsGetValue(worker_tls);
146 I_RpcFreeBuffer(msg);
147 msg->RpcFlags |= WINE_RPCFLAG_EXCEPTION;
148 msg->BufferLength = sizeof(DWORD);
149 I_RpcGetBuffer(msg);
150 *(DWORD*)msg->Buffer = GetExceptionCode();
151 return EXCEPTION_EXECUTE_HANDLER;
154 static void RPCRT4_process_packet(RpcConnection* conn, RpcPktHdr* hdr, void* buf)
156 RpcBinding* pbind;
157 RPC_MESSAGE msg;
158 RpcServerInterface* sif;
159 RPC_DISPATCH_FUNCTION func;
161 TlsSetValue(worker_tls, &msg);
162 memset(&msg, 0, sizeof(msg));
163 msg.BufferLength = hdr->len;
164 msg.Buffer = buf;
165 sif = RPCRT4_find_interface(&hdr->object, &hdr->if_id);
166 if (sif) {
167 TRACE("packet received for interface %s\n", debugstr_guid(&hdr->if_id));
168 msg.RpcInterfaceInformation = sif->If;
169 /* create temporary binding for dispatch */
170 RPCRT4_MakeBinding(&pbind, conn);
171 RPCRT4_SetBindingObject(pbind, &hdr->object);
172 msg.Handle = (RPC_BINDING_HANDLE)pbind;
173 /* process packet */
174 switch (hdr->ptype) {
175 case PKT_REQUEST:
176 /* find dispatch function */
177 msg.ProcNum = hdr->opnum;
178 if (sif->Flags & RPC_IF_OLE) {
179 /* native ole32 always gives us a dispatch table with a single entry
180 * (I assume that's a wrapper for IRpcStubBuffer::Invoke) */
181 func = *sif->If->DispatchTable->DispatchTable;
182 } else {
183 if (msg.ProcNum >= sif->If->DispatchTable->DispatchTableCount) {
184 ERR("invalid procnum\n");
185 func = NULL;
187 func = sif->If->DispatchTable->DispatchTable[msg.ProcNum];
190 /* put in the drep. FIXME: is this more universally applicable?
191 perhaps we should move this outward... */
192 msg.DataRepresentation =
193 MAKELONG( MAKEWORD(hdr->drep[0], hdr->drep[1]),
194 MAKEWORD(hdr->drep[2], 0));
196 /* dispatch */
197 __TRY {
198 if (func) func(&msg);
199 } __EXCEPT(rpc_filter) {
200 /* failure packet was created in rpc_filter */
201 TRACE("exception caught, returning failure packet\n");
202 } __ENDTRY
204 /* send response packet */
205 I_RpcSend(&msg);
206 break;
207 default:
208 ERR("unknown packet type\n");
209 break;
212 RPCRT4_DestroyBinding(pbind);
213 msg.Handle = 0;
214 msg.RpcInterfaceInformation = NULL;
216 else {
217 ERR("got RPC packet to unregistered interface %s\n", debugstr_guid(&hdr->if_id));
220 /* clean up */
221 if (msg.Buffer == buf) msg.Buffer = NULL;
222 TRACE("freeing Buffer=%p\n", buf);
223 HeapFree(GetProcessHeap(), 0, buf);
224 I_RpcFreeBuffer(&msg);
225 msg.Buffer = NULL;
226 TlsSetValue(worker_tls, NULL);
229 static DWORD CALLBACK RPCRT4_worker_thread(LPVOID the_arg)
231 DWORD obj;
232 RpcPacket* pkt;
234 for (;;) {
235 /* idle timeout after 5s */
236 obj = WaitForSingleObject(server_sem, 5000);
237 if (obj == WAIT_TIMEOUT) {
238 /* if another idle thread exist, self-destruct */
239 if (worker_free > 1) break;
240 continue;
242 pkt = RPCRT4_pop_packet();
243 if (!pkt) continue;
244 InterlockedDecrement(&worker_free);
245 for (;;) {
246 RPCRT4_process_packet(pkt->conn, &pkt->hdr, pkt->buf);
247 HeapFree(GetProcessHeap(), 0, pkt);
248 /* try to grab another packet here without waiting
249 * on the semaphore, in case it hits max */
250 pkt = RPCRT4_pop_packet();
251 if (!pkt) break;
252 /* decrement semaphore */
253 WaitForSingleObject(server_sem, 0);
255 InterlockedIncrement(&worker_free);
257 InterlockedDecrement(&worker_free);
258 InterlockedDecrement(&worker_count);
259 return 0;
262 static void RPCRT4_create_worker_if_needed(void)
264 if (!worker_free && worker_count < MAX_THREADS) {
265 HANDLE thread;
266 InterlockedIncrement(&worker_count);
267 InterlockedIncrement(&worker_free);
268 thread = CreateThread(NULL, 0, RPCRT4_worker_thread, NULL, 0, NULL);
269 if (thread) CloseHandle(thread);
270 else {
271 InterlockedDecrement(&worker_free);
272 InterlockedDecrement(&worker_count);
277 static DWORD CALLBACK RPCRT4_io_thread(LPVOID the_arg)
279 RpcConnection* conn = (RpcConnection*)the_arg;
280 RpcPktHdr hdr;
281 DWORD dwRead;
282 void* buf = NULL;
283 RpcPacket* packet;
285 TRACE("(%p)\n", conn);
287 for (;;) {
288 /* read packet header */
289 #ifdef OVERLAPPED_WORKS
290 if (!ReadFile(conn->conn, &hdr, sizeof(hdr), &dwRead, &conn->ovl)) {
291 DWORD err = GetLastError();
292 if (err != ERROR_IO_PENDING) {
293 TRACE("connection lost, error=%08lx\n", err);
294 break;
296 if (!GetOverlappedResult(conn->conn, &conn->ovl, &dwRead, TRUE)) break;
298 #else
299 if (!ReadFile(conn->conn, &hdr, sizeof(hdr), &dwRead, NULL)) {
300 TRACE("connection lost, error=%08lx\n", GetLastError());
301 break;
303 #endif
304 if (dwRead != sizeof(hdr)) {
305 if (dwRead) TRACE("protocol error: <hdrsz == %d, dwRead == %lu>\n", sizeof(hdr), dwRead);
306 break;
309 /* read packet body */
310 buf = HeapAlloc(GetProcessHeap(), 0, hdr.len);
311 TRACE("receiving payload=%d\n", hdr.len);
312 if (!hdr.len) dwRead = 0; else
313 #ifdef OVERLAPPED_WORKS
314 if (!ReadFile(conn->conn, buf, hdr.len, &dwRead, &conn->ovl)) {
315 DWORD err = GetLastError();
316 if (err != ERROR_IO_PENDING) {
317 TRACE("connection lost, error=%08lx\n", err);
318 break;
320 if (!GetOverlappedResult(conn->conn, &conn->ovl, &dwRead, TRUE)) break;
322 #else
323 if (!ReadFile(conn->conn, buf, hdr.len, &dwRead, NULL)) {
324 TRACE("connection lost, error=%08lx\n", GetLastError());
325 break;
327 #endif
328 if (dwRead != hdr.len) {
329 TRACE("protocol error: <bodylen == %d, dwRead == %lu>\n", hdr.len, dwRead);
330 break;
333 #if 0
334 RPCRT4_process_packet(conn, &hdr, buf);
335 #else
336 packet = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcPacket));
337 packet->conn = conn;
338 packet->hdr = hdr;
339 packet->buf = buf;
340 RPCRT4_create_worker_if_needed();
341 RPCRT4_push_packet(packet);
342 ReleaseSemaphore(server_sem, 1, NULL);
343 #endif
344 buf = NULL;
346 if (buf) HeapFree(GetProcessHeap(), 0, buf);
347 RPCRT4_DestroyConnection(conn);
348 return 0;
351 static void RPCRT4_new_client(RpcConnection* conn)
353 HANDLE thread = CreateThread(NULL, 0, RPCRT4_io_thread, conn, 0, NULL);
354 if (!thread) {
355 DWORD err = GetLastError();
356 ERR("failed to create thread, error=%08lx\n", err);
357 RPCRT4_DestroyConnection(conn);
359 /* we could set conn->thread, but then we'd have to make the io_thread wait
360 * for that, otherwise the thread might finish, destroy the connection, and
361 * free the memory we'd write to before we did, causing crashes and stuff -
362 * so let's implement that later, when we really need conn->thread */
364 CloseHandle( thread );
367 static DWORD CALLBACK RPCRT4_server_thread(LPVOID the_arg)
369 HANDLE m_event = mgr_event, b_handle;
370 HANDLE *objs = NULL;
371 DWORD count, res;
372 RpcServerProtseq* cps;
373 RpcConnection* conn;
374 RpcConnection* cconn;
376 for (;;) {
377 EnterCriticalSection(&server_cs);
378 /* open and count connections */
379 count = 1;
380 cps = protseqs;
381 while (cps) {
382 conn = cps->conn;
383 while (conn) {
384 RPCRT4_OpenConnection(conn);
385 if (conn->ovl.hEvent) count++;
386 conn = conn->Next;
388 cps = cps->Next;
390 /* make array of connections */
391 objs = HeapReAlloc(GetProcessHeap(), 0, objs, count*sizeof(HANDLE));
392 objs[0] = m_event;
393 count = 1;
394 cps = protseqs;
395 while (cps) {
396 conn = cps->conn;
397 while (conn) {
398 if (conn->ovl.hEvent) objs[count++] = conn->ovl.hEvent;
399 conn = conn->Next;
401 cps = cps->Next;
403 LeaveCriticalSection(&server_cs);
405 /* start waiting */
406 res = WaitForMultipleObjects(count, objs, FALSE, INFINITE);
407 if (res == WAIT_OBJECT_0) {
408 ResetEvent(m_event);
409 if (!std_listen) break;
411 else if (res == WAIT_FAILED) {
412 ERR("wait failed\n");
414 else {
415 b_handle = objs[res - WAIT_OBJECT_0];
416 /* find which connection got a RPC */
417 EnterCriticalSection(&server_cs);
418 conn = NULL;
419 cps = protseqs;
420 while (cps) {
421 conn = cps->conn;
422 while (conn) {
423 if (conn->ovl.hEvent == b_handle) break;
424 conn = conn->Next;
426 if (conn) break;
427 cps = cps->Next;
429 cconn = NULL;
430 if (conn) RPCRT4_SpawnConnection(&cconn, conn);
431 LeaveCriticalSection(&server_cs);
432 if (!conn) {
433 ERR("failed to locate connection for handle %p\n", b_handle);
435 if (cconn) RPCRT4_new_client(cconn);
438 HeapFree(GetProcessHeap(), 0, objs);
439 EnterCriticalSection(&server_cs);
440 /* close connections */
441 cps = protseqs;
442 while (cps) {
443 conn = cps->conn;
444 while (conn) {
445 RPCRT4_CloseConnection(conn);
446 conn = conn->Next;
448 cps = cps->Next;
450 LeaveCriticalSection(&server_cs);
451 return 0;
454 static void RPCRT4_start_listen(void)
456 TRACE("\n");
458 EnterCriticalSection(&listen_cs);
459 if (! ++listen_count) {
460 if (!mgr_event) mgr_event = CreateEventA(NULL, TRUE, FALSE, NULL);
461 if (!server_sem) server_sem = CreateSemaphoreA(NULL, 0, MAX_THREADS, NULL);
462 if (!worker_tls) worker_tls = TlsAlloc();
463 std_listen = TRUE;
464 server_thread = CreateThread(NULL, 0, RPCRT4_server_thread, NULL, 0, NULL);
465 LeaveCriticalSection(&listen_cs);
466 } else {
467 LeaveCriticalSection(&listen_cs);
468 SetEvent(mgr_event);
472 static void RPCRT4_stop_listen(void)
474 EnterCriticalSection(&listen_cs);
475 if (listen_count == -1)
476 LeaveCriticalSection(&listen_cs);
477 else if (--listen_count == -1) {
478 std_listen = FALSE;
479 LeaveCriticalSection(&listen_cs);
480 SetEvent(mgr_event);
481 } else
482 LeaveCriticalSection(&listen_cs);
483 assert(listen_count > -2);
486 static RPC_STATUS RPCRT4_use_protseq(RpcServerProtseq* ps)
488 RPCRT4_CreateConnection(&ps->conn, TRUE, ps->Protseq, NULL, ps->Endpoint, NULL, NULL);
490 EnterCriticalSection(&server_cs);
491 ps->Next = protseqs;
492 protseqs = ps;
493 LeaveCriticalSection(&server_cs);
495 if (std_listen) SetEvent(mgr_event);
497 return RPC_S_OK;
500 /***********************************************************************
501 * RpcServerInqBindings (RPCRT4.@)
503 RPC_STATUS WINAPI RpcServerInqBindings( RPC_BINDING_VECTOR** BindingVector )
505 RPC_STATUS status;
506 DWORD count;
507 RpcServerProtseq* ps;
508 RpcConnection* conn;
510 if (BindingVector)
511 TRACE("(*BindingVector == ^%p)\n", *BindingVector);
512 else
513 ERR("(BindingVector == ^null!!?)\n");
515 EnterCriticalSection(&server_cs);
516 /* count connections */
517 count = 0;
518 ps = protseqs;
519 while (ps) {
520 conn = ps->conn;
521 while (conn) {
522 count++;
523 conn = conn->Next;
525 ps = ps->Next;
527 if (count) {
528 /* export bindings */
529 *BindingVector = HeapAlloc(GetProcessHeap(), 0,
530 sizeof(RPC_BINDING_VECTOR) +
531 sizeof(RPC_BINDING_HANDLE)*(count-1));
532 (*BindingVector)->Count = count;
533 count = 0;
534 ps = protseqs;
535 while (ps) {
536 conn = ps->conn;
537 while (conn) {
538 RPCRT4_MakeBinding((RpcBinding**)&(*BindingVector)->BindingH[count],
539 conn);
540 count++;
541 conn = conn->Next;
543 ps = ps->Next;
545 status = RPC_S_OK;
546 } else {
547 *BindingVector = NULL;
548 status = RPC_S_NO_BINDINGS;
550 LeaveCriticalSection(&server_cs);
551 return status;
554 /***********************************************************************
555 * RpcServerUseProtseqEpA (RPCRT4.@)
557 RPC_STATUS WINAPI RpcServerUseProtseqEpA( LPSTR Protseq, UINT MaxCalls, LPSTR Endpoint, LPVOID SecurityDescriptor )
559 RPC_POLICY policy;
561 TRACE( "(%s,%u,%s,%p)\n", Protseq, MaxCalls, Endpoint, SecurityDescriptor );
563 /* This should provide the default behaviour */
564 policy.Length = sizeof( policy );
565 policy.EndpointFlags = 0;
566 policy.NICFlags = 0;
568 return RpcServerUseProtseqEpExA( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
571 /***********************************************************************
572 * RpcServerUseProtseqEpW (RPCRT4.@)
574 RPC_STATUS WINAPI RpcServerUseProtseqEpW( LPWSTR Protseq, UINT MaxCalls, LPWSTR Endpoint, LPVOID SecurityDescriptor )
576 RPC_POLICY policy;
578 TRACE( "(%s,%u,%s,%p)\n", debugstr_w( Protseq ), MaxCalls, debugstr_w( Endpoint ), SecurityDescriptor );
580 /* This should provide the default behaviour */
581 policy.Length = sizeof( policy );
582 policy.EndpointFlags = 0;
583 policy.NICFlags = 0;
585 return RpcServerUseProtseqEpExW( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy );
588 /***********************************************************************
589 * RpcServerUseProtseqEpExA (RPCRT4.@)
591 RPC_STATUS WINAPI RpcServerUseProtseqEpExA( LPSTR Protseq, UINT MaxCalls, LPSTR Endpoint, LPVOID SecurityDescriptor,
592 PRPC_POLICY lpPolicy )
594 RpcServerProtseq* ps;
596 TRACE("(%s,%u,%s,%p,{%u,%lu,%lu})\n", debugstr_a( Protseq ), MaxCalls,
597 debugstr_a( Endpoint ), SecurityDescriptor,
598 lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
600 ps = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcServerProtseq));
601 ps->MaxCalls = MaxCalls;
602 ps->Protseq = RPCRT4_strdupA(Protseq);
603 ps->Endpoint = RPCRT4_strdupA(Endpoint);
605 return RPCRT4_use_protseq(ps);
608 /***********************************************************************
609 * RpcServerUseProtseqEpExW (RPCRT4.@)
611 RPC_STATUS WINAPI RpcServerUseProtseqEpExW( LPWSTR Protseq, UINT MaxCalls, LPWSTR Endpoint, LPVOID SecurityDescriptor,
612 PRPC_POLICY lpPolicy )
614 RpcServerProtseq* ps;
616 TRACE("(%s,%u,%s,%p,{%u,%lu,%lu})\n", debugstr_w( Protseq ), MaxCalls,
617 debugstr_w( Endpoint ), SecurityDescriptor,
618 lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags );
620 ps = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcServerProtseq));
621 ps->MaxCalls = MaxCalls;
622 /* FIXME: Did Ove have these next two as RPCRT4_strdupW for a reason? */
623 ps->Protseq = RPCRT4_strdupWtoA(Protseq);
624 ps->Endpoint = RPCRT4_strdupWtoA(Endpoint);
626 return RPCRT4_use_protseq(ps);
629 /***********************************************************************
630 * RpcServerUseProtseqA (RPCRT4.@)
632 RPC_STATUS WINAPI RpcServerUseProtseqA(LPSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
634 TRACE("(Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)", debugstr_a(Protseq), MaxCalls, SecurityDescriptor);
635 return RpcServerUseProtseqEpA(Protseq, MaxCalls, NULL, SecurityDescriptor);
638 /***********************************************************************
639 * RpcServerUseProtseqW (RPCRT4.@)
641 RPC_STATUS WINAPI RpcServerUseProtseqW(LPWSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor)
643 TRACE("Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)", debugstr_w(Protseq), MaxCalls, SecurityDescriptor);
644 return RpcServerUseProtseqEpW(Protseq, MaxCalls, NULL, SecurityDescriptor);
647 /***********************************************************************
648 * RpcServerRegisterIf (RPCRT4.@)
650 RPC_STATUS WINAPI RpcServerRegisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv )
652 TRACE("(%p,%s,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv);
653 return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, 0, RPC_C_LISTEN_MAX_CALLS_DEFAULT, (UINT)-1, NULL );
656 /***********************************************************************
657 * RpcServerRegisterIfEx (RPCRT4.@)
659 RPC_STATUS WINAPI RpcServerRegisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
660 UINT Flags, UINT MaxCalls, RPC_IF_CALLBACK_FN* IfCallbackFn )
662 TRACE("(%p,%s,%p,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls, IfCallbackFn);
663 return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, Flags, MaxCalls, (UINT)-1, IfCallbackFn );
666 /***********************************************************************
667 * RpcServerRegisterIf2 (RPCRT4.@)
669 RPC_STATUS WINAPI RpcServerRegisterIf2( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv,
670 UINT Flags, UINT MaxCalls, UINT MaxRpcSize, RPC_IF_CALLBACK_FN* IfCallbackFn )
672 PRPC_SERVER_INTERFACE If = (PRPC_SERVER_INTERFACE)IfSpec;
673 RpcServerInterface* sif;
674 int i;
676 TRACE("(%p,%s,%p,%u,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls,
677 MaxRpcSize, IfCallbackFn);
678 TRACE(" interface id: %s %d.%d\n", debugstr_guid(&If->InterfaceId.SyntaxGUID),
679 If->InterfaceId.SyntaxVersion.MajorVersion,
680 If->InterfaceId.SyntaxVersion.MinorVersion);
681 TRACE(" transfer syntax: %s %d.%d\n", debugstr_guid(&If->TransferSyntax.SyntaxGUID),
682 If->TransferSyntax.SyntaxVersion.MajorVersion,
683 If->TransferSyntax.SyntaxVersion.MinorVersion);
684 TRACE(" dispatch table: %p\n", If->DispatchTable);
685 if (If->DispatchTable) {
686 TRACE(" dispatch table count: %d\n", If->DispatchTable->DispatchTableCount);
687 for (i=0; i<If->DispatchTable->DispatchTableCount; i++) {
688 TRACE(" entry %d: %p\n", i, If->DispatchTable->DispatchTable[i]);
690 TRACE(" reserved: %ld\n", If->DispatchTable->Reserved);
692 TRACE(" protseq endpoint count: %d\n", If->RpcProtseqEndpointCount);
693 TRACE(" default manager epv: %p\n", If->DefaultManagerEpv);
694 TRACE(" interpreter info: %p\n", If->InterpreterInfo);
695 TRACE(" flags: %08x\n", If->Flags);
697 sif = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcServerInterface));
698 sif->If = If;
699 if (MgrTypeUuid)
700 memcpy(&sif->MgrTypeUuid, MgrTypeUuid, sizeof(UUID));
701 else
702 memset(&sif->MgrTypeUuid, 0, sizeof(UUID));
703 sif->MgrEpv = MgrEpv;
704 sif->Flags = Flags;
705 sif->MaxCalls = MaxCalls;
706 sif->MaxRpcSize = MaxRpcSize;
707 sif->IfCallbackFn = IfCallbackFn;
709 EnterCriticalSection(&server_cs);
710 sif->Next = ifs;
711 ifs = sif;
712 LeaveCriticalSection(&server_cs);
714 if (sif->Flags & RPC_IF_AUTOLISTEN) {
715 /* well, start listening, I think... */
716 RPCRT4_start_listen();
719 return RPC_S_OK;
722 /***********************************************************************
723 * RpcServerUnregisterIf (RPCRT4.@)
725 RPC_STATUS WINAPI RpcServerUnregisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, UINT WaitForCallsToComplete )
727 FIXME("(IfSpec == (RPC_IF_HANDLE)^%p, MgrTypeUuid == %s, WaitForCallsToComplete == %u): stub\n",
728 IfSpec, debugstr_guid(MgrTypeUuid), WaitForCallsToComplete);
730 return RPC_S_OK;
733 /***********************************************************************
734 * RpcServerUnregisterIfEx (RPCRT4.@)
736 RPC_STATUS WINAPI RpcServerUnregisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, int RundownContextHandles )
738 FIXME("(IfSpec == (RPC_IF_HANDLE)^%p, MgrTypeUuid == %s, RundownContextHandles == %d): stub\n",
739 IfSpec, debugstr_guid(MgrTypeUuid), RundownContextHandles);
741 return RPC_S_OK;
744 /***********************************************************************
745 * RpcServerRegisterAuthInfoA (RPCRT4.@)
747 RPC_STATUS WINAPI RpcServerRegisterAuthInfoA( LPSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
748 LPVOID Arg )
750 FIXME( "(%s,%lu,%p,%p): stub\n", ServerPrincName, AuthnSvc, GetKeyFn, Arg );
752 return RPC_S_UNKNOWN_AUTHN_SERVICE; /* We don't know any authentication services */
755 /***********************************************************************
756 * RpcServerRegisterAuthInfoW (RPCRT4.@)
758 RPC_STATUS WINAPI RpcServerRegisterAuthInfoW( LPWSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn,
759 LPVOID Arg )
761 FIXME( "(%s,%lu,%p,%p): stub\n", debugstr_w( ServerPrincName ), AuthnSvc, GetKeyFn, Arg );
763 return RPC_S_UNKNOWN_AUTHN_SERVICE; /* We don't know any authentication services */
766 /***********************************************************************
767 * RpcServerListen (RPCRT4.@)
769 RPC_STATUS WINAPI RpcServerListen( UINT MinimumCallThreads, UINT MaxCalls, UINT DontWait )
771 TRACE("(%u,%u,%u)\n", MinimumCallThreads, MaxCalls, DontWait);
773 if (!protseqs)
774 return RPC_S_NO_PROTSEQS_REGISTERED;
776 EnterCriticalSection(&listen_cs);
778 if (std_listen) {
779 LeaveCriticalSection(&listen_cs);
780 return RPC_S_ALREADY_LISTENING;
783 RPCRT4_start_listen();
785 LeaveCriticalSection(&listen_cs);
787 if (DontWait) return RPC_S_OK;
789 return RpcMgmtWaitServerListen();
792 /***********************************************************************
793 * RpcMgmtServerWaitListen (RPCRT4.@)
795 RPC_STATUS WINAPI RpcMgmtWaitServerListen( void )
797 RPC_STATUS rslt = RPC_S_OK;
799 TRACE("\n");
801 EnterCriticalSection(&listen_cs);
803 if (!std_listen)
804 if ( (rslt = RpcServerListen(1, 0, TRUE)) != RPC_S_OK ) {
805 LeaveCriticalSection(&listen_cs);
806 return rslt;
809 LeaveCriticalSection(&listen_cs);
811 while (std_listen) {
812 WaitForSingleObject(mgr_event, INFINITE);
813 if (!std_listen) {
814 Sleep(100); /* don't spin violently */
815 TRACE("spinning.\n");
819 return rslt;
822 /***********************************************************************
823 * RpcMgmtStopServerListening (RPCRT4.@)
825 RPC_STATUS WINAPI RpcMgmtStopServerListening ( RPC_BINDING_HANDLE Binding )
827 TRACE("(Binding == (RPC_BINDING_HANDLE)^%p)\n", Binding);
829 if (Binding) {
830 FIXME("client-side invocation not implemented.\n");
831 return RPC_S_WRONG_KIND_OF_BINDING;
834 /* hmm... */
835 EnterCriticalSection(&listen_cs);
836 while (std_listen)
837 RPCRT4_stop_listen();
838 LeaveCriticalSection(&listen_cs);
840 return RPC_S_OK;
843 /***********************************************************************
844 * I_RpcServerStartListening (RPCRT4.@)
846 RPC_STATUS WINAPI I_RpcServerStartListening( void* hWnd )
848 FIXME( "(%p): stub\n", hWnd );
850 return RPC_S_OK;
853 /***********************************************************************
854 * I_RpcServerStopListening (RPCRT4.@)
856 RPC_STATUS WINAPI I_RpcServerStopListening( void )
858 FIXME( "(): stub\n" );
860 return RPC_S_OK;
863 /***********************************************************************
864 * I_RpcWindowProc (RPCRT4.@)
866 UINT WINAPI I_RpcWindowProc( void *hWnd, UINT Message, UINT wParam, ULONG lParam )
868 FIXME( "(%p,%08x,%08x,%08lx): stub\n", hWnd, Message, wParam, lParam );
870 return 0;