4 * Copyright 2001 Ove Kåven, TransGaming Technologies
5 * Copyright 2003 Mike Hearn
6 * Copyright 2004 Filip Navara
7 * Copyright 2006 CodeWeavers
9 * This library is free software; you can redistribute it and/or
10 * modify it under the terms of the GNU Lesser General Public
11 * License as published by the Free Software Foundation; either
12 * version 2.1 of the License, or (at your option) any later version.
14 * This library is distributed in the hope that it will be useful,
15 * but WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
17 * Lesser General Public License for more details.
19 * You should have received a copy of the GNU Lesser General Public
20 * License along with this library; if not, write to the Free Software
21 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
34 #include "wine/unicode.h"
39 #include "wine/debug.h"
41 #include "rpc_binding.h"
42 #include "rpc_assoc.h"
44 WINE_DEFAULT_DEBUG_CHANNEL(rpc
);
46 LPSTR
RPCRT4_strndupA(LPCSTR src
, INT slen
)
50 if (!src
) return NULL
;
51 if (slen
== -1) slen
= strlen(src
);
53 s
= HeapAlloc(GetProcessHeap(), 0, len
+1);
59 LPSTR
RPCRT4_strdupWtoA(LPCWSTR src
)
63 if (!src
) return NULL
;
64 len
= WideCharToMultiByte(CP_ACP
, 0, src
, -1, NULL
, 0, NULL
, NULL
);
65 s
= HeapAlloc(GetProcessHeap(), 0, len
);
66 WideCharToMultiByte(CP_ACP
, 0, src
, -1, s
, len
, NULL
, NULL
);
70 LPWSTR
RPCRT4_strdupAtoW(LPCSTR src
)
74 if (!src
) return NULL
;
75 len
= MultiByteToWideChar(CP_ACP
, 0, src
, -1, NULL
, 0);
76 s
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
77 MultiByteToWideChar(CP_ACP
, 0, src
, -1, s
, len
);
81 static LPWSTR
RPCRT4_strndupAtoW(LPCSTR src
, INT slen
)
85 if (!src
) return NULL
;
86 len
= MultiByteToWideChar(CP_ACP
, 0, src
, slen
, NULL
, 0);
87 s
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
88 MultiByteToWideChar(CP_ACP
, 0, src
, slen
, s
, len
);
92 LPWSTR
RPCRT4_strndupW(LPCWSTR src
, INT slen
)
96 if (!src
) return NULL
;
97 if (slen
== -1) slen
= strlenW(src
);
99 s
= HeapAlloc(GetProcessHeap(), 0, (len
+1)*sizeof(WCHAR
));
100 memcpy(s
, src
, len
*sizeof(WCHAR
));
105 void RPCRT4_strfree(LPSTR src
)
107 HeapFree(GetProcessHeap(), 0, src
);
110 static RPC_STATUS
RPCRT4_AllocBinding(RpcBinding
** Binding
, BOOL server
)
112 RpcBinding
* NewBinding
;
114 NewBinding
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sizeof(RpcBinding
));
115 NewBinding
->refs
= 1;
116 NewBinding
->server
= server
;
118 *Binding
= NewBinding
;
123 static RPC_STATUS
RPCRT4_CreateBindingA(RpcBinding
** Binding
, BOOL server
, LPCSTR Protseq
)
125 RpcBinding
* NewBinding
;
127 RPCRT4_AllocBinding(&NewBinding
, server
);
128 NewBinding
->Protseq
= RPCRT4_strdupA(Protseq
);
130 TRACE("binding: %p\n", NewBinding
);
131 *Binding
= NewBinding
;
136 static RPC_STATUS
RPCRT4_CreateBindingW(RpcBinding
** Binding
, BOOL server
, LPCWSTR Protseq
)
138 RpcBinding
* NewBinding
;
140 RPCRT4_AllocBinding(&NewBinding
, server
);
141 NewBinding
->Protseq
= RPCRT4_strdupWtoA(Protseq
);
143 TRACE("binding: %p\n", NewBinding
);
144 *Binding
= NewBinding
;
149 static RPC_STATUS
RPCRT4_CompleteBindingA(RpcBinding
* Binding
, LPCSTR NetworkAddr
,
150 LPCSTR Endpoint
, LPCSTR NetworkOptions
)
154 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding
,
155 debugstr_a(NetworkAddr
), debugstr_a(Endpoint
), debugstr_a(NetworkOptions
));
157 RPCRT4_strfree(Binding
->NetworkAddr
);
158 Binding
->NetworkAddr
= RPCRT4_strdupA(NetworkAddr
);
159 RPCRT4_strfree(Binding
->Endpoint
);
160 Binding
->Endpoint
= RPCRT4_strdupA(Endpoint
);
161 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
162 Binding
->NetworkOptions
= RPCRT4_strdupAtoW(NetworkOptions
);
164 /* only attempt to get an association if the binding is complete */
165 if (Endpoint
&& Endpoint
[0] != '\0')
167 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
168 Binding
->Endpoint
, Binding
->NetworkOptions
,
170 if (status
!= RPC_S_OK
)
177 static RPC_STATUS
RPCRT4_CompleteBindingW(RpcBinding
* Binding
, LPCWSTR NetworkAddr
,
178 LPCWSTR Endpoint
, LPCWSTR NetworkOptions
)
182 TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding
,
183 debugstr_w(NetworkAddr
), debugstr_w(Endpoint
), debugstr_w(NetworkOptions
));
185 RPCRT4_strfree(Binding
->NetworkAddr
);
186 Binding
->NetworkAddr
= RPCRT4_strdupWtoA(NetworkAddr
);
187 RPCRT4_strfree(Binding
->Endpoint
);
188 Binding
->Endpoint
= RPCRT4_strdupWtoA(Endpoint
);
189 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
190 Binding
->NetworkOptions
= RPCRT4_strdupW(NetworkOptions
);
192 /* only attempt to get an association if the binding is complete */
193 if (Endpoint
&& Endpoint
[0] != '\0')
195 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
196 Binding
->Endpoint
, Binding
->NetworkOptions
,
198 if (status
!= RPC_S_OK
)
205 RPC_STATUS
RPCRT4_ResolveBinding(RpcBinding
* Binding
, LPCSTR Endpoint
)
209 TRACE("(RpcBinding == ^%p, EndPoint == \"%s\"\n", Binding
, Endpoint
);
211 RPCRT4_strfree(Binding
->Endpoint
);
212 Binding
->Endpoint
= RPCRT4_strdupA(Endpoint
);
214 if (Binding
->Assoc
) RpcAssoc_Release(Binding
->Assoc
);
215 Binding
->Assoc
= NULL
;
216 status
= RPCRT4_GetAssociation(Binding
->Protseq
, Binding
->NetworkAddr
,
217 Binding
->Endpoint
, Binding
->NetworkOptions
,
219 if (status
!= RPC_S_OK
)
225 RPC_STATUS
RPCRT4_SetBindingObject(RpcBinding
* Binding
, const UUID
* ObjectUuid
)
227 TRACE("(*RpcBinding == ^%p, UUID == %s)\n", Binding
, debugstr_guid(ObjectUuid
));
228 if (ObjectUuid
) Binding
->ObjectUuid
= *ObjectUuid
;
229 else UuidCreateNil(&Binding
->ObjectUuid
);
233 RPC_STATUS
RPCRT4_MakeBinding(RpcBinding
** Binding
, RpcConnection
* Connection
)
235 RpcBinding
* NewBinding
;
236 TRACE("(RpcBinding == ^%p, Connection == ^%p)\n", Binding
, Connection
);
238 RPCRT4_AllocBinding(&NewBinding
, Connection
->server
);
239 NewBinding
->Protseq
= RPCRT4_strdupA(rpcrt4_conn_get_name(Connection
));
240 NewBinding
->NetworkAddr
= RPCRT4_strdupA(Connection
->NetworkAddr
);
241 NewBinding
->Endpoint
= RPCRT4_strdupA(Connection
->Endpoint
);
242 NewBinding
->FromConn
= Connection
;
244 TRACE("binding: %p\n", NewBinding
);
245 *Binding
= NewBinding
;
250 void RPCRT4_AddRefBinding(RpcBinding
* Binding
)
252 InterlockedIncrement(&Binding
->refs
);
255 RPC_STATUS
RPCRT4_ReleaseBinding(RpcBinding
* Binding
)
257 if (InterlockedDecrement(&Binding
->refs
))
260 TRACE("binding: %p\n", Binding
);
261 if (Binding
->Assoc
) RpcAssoc_Release(Binding
->Assoc
);
262 RPCRT4_strfree(Binding
->Endpoint
);
263 RPCRT4_strfree(Binding
->NetworkAddr
);
264 RPCRT4_strfree(Binding
->Protseq
);
265 HeapFree(GetProcessHeap(), 0, Binding
->NetworkOptions
);
266 if (Binding
->AuthInfo
) RpcAuthInfo_Release(Binding
->AuthInfo
);
267 if (Binding
->QOS
) RpcQualityOfService_Release(Binding
->QOS
);
268 HeapFree(GetProcessHeap(), 0, Binding
);
272 RPC_STATUS
RPCRT4_OpenBinding(RpcBinding
* Binding
, RpcConnection
** Connection
,
273 const RPC_SYNTAX_IDENTIFIER
*TransferSyntax
,
274 const RPC_SYNTAX_IDENTIFIER
*InterfaceId
)
276 TRACE("(Binding == ^%p)\n", Binding
);
278 if (!Binding
->server
) {
279 return RpcAssoc_GetClientConnection(Binding
->Assoc
, InterfaceId
,
280 TransferSyntax
, Binding
->AuthInfo
, Binding
->QOS
, Connection
);
282 /* we already have a connection with acceptable binding, so use it */
283 if (Binding
->FromConn
) {
284 *Connection
= Binding
->FromConn
;
287 ERR("no connection in binding\n");
288 return RPC_S_INTERNAL_ERROR
;
293 RPC_STATUS
RPCRT4_CloseBinding(RpcBinding
* Binding
, RpcConnection
* Connection
)
295 TRACE("(Binding == ^%p)\n", Binding
);
296 if (!Connection
) return RPC_S_OK
;
297 if (Binding
->server
) {
298 /* don't destroy a connection that is cached in the binding */
299 if (Binding
->FromConn
== Connection
)
301 return RPCRT4_ReleaseConnection(Connection
);
304 RpcAssoc_ReleaseIdleConnection(Binding
->Assoc
, Connection
);
309 static LPSTR
RPCRT4_strconcatA(LPSTR dst
, LPCSTR src
)
311 DWORD len
= strlen(dst
), slen
= strlen(src
);
312 LPSTR ndst
= HeapReAlloc(GetProcessHeap(), 0, dst
, (len
+slen
+2)*sizeof(CHAR
));
315 HeapFree(GetProcessHeap(), 0, dst
);
319 memcpy(ndst
+len
+1, src
, slen
+1);
323 static LPWSTR
RPCRT4_strconcatW(LPWSTR dst
, LPCWSTR src
)
325 DWORD len
= strlenW(dst
), slen
= strlenW(src
);
326 LPWSTR ndst
= HeapReAlloc(GetProcessHeap(), 0, dst
, (len
+slen
+2)*sizeof(WCHAR
));
329 HeapFree(GetProcessHeap(), 0, dst
);
333 memcpy(ndst
+len
+1, src
, (slen
+1)*sizeof(WCHAR
));
337 /* Copies the escaped version of a component into a string binding.
338 * Note: doesn't nul-terminate the string */
339 static RPC_CSTR
escape_string_binding_component(RPC_CSTR string_binding
,
340 const unsigned char *component
)
342 for (; *component
; component
++) {
343 switch (*component
) {
349 *string_binding
++ = '\\';
350 *string_binding
++ = *component
;
353 *string_binding
++ = *component
;
357 return string_binding
;
360 static RPC_WSTR
escape_string_binding_componentW(RPC_WSTR string_binding
,
361 const WCHAR
*component
)
363 for (; *component
; component
++) {
364 switch (*component
) {
370 *string_binding
++ = '\\';
371 *string_binding
++ = *component
;
374 *string_binding
++ = *component
;
378 return string_binding
;
381 static const unsigned char *string_binding_find_delimiter(
382 const unsigned char *string_binding
, unsigned char delim
)
384 const unsigned char *next
;
385 for (next
= string_binding
; *next
; next
++) {
396 static const WCHAR
*string_binding_find_delimiterW(
397 const WCHAR
*string_binding
, WCHAR delim
)
400 for (next
= string_binding
; *next
; next
++) {
411 static RPC_CSTR
unescape_string_binding_component(
412 const unsigned char *string_binding
, int len
)
414 RPC_CSTR component
, p
;
416 if (len
== -1) len
= strlen((const char *)string_binding
);
418 component
= HeapAlloc(GetProcessHeap(), 0, (len
+ 1) * sizeof(*component
));
419 if (!component
) return NULL
;
420 for (p
= component
; len
> 0; string_binding
++, len
--) {
421 if (*string_binding
== '\\') {
424 *p
++ = *string_binding
;
426 *p
++ = *string_binding
;
433 static RPC_WSTR
unescape_string_binding_componentW(
434 const WCHAR
*string_binding
, int len
)
436 RPC_WSTR component
, p
;
438 if (len
== -1) len
= strlenW(string_binding
);
440 component
= HeapAlloc(GetProcessHeap(), 0, (len
+ 1) * sizeof(*component
));
441 if (!component
) return NULL
;
442 for (p
= component
; len
> 0; string_binding
++, len
--) {
443 if (*string_binding
== '\\') {
446 *p
++ = *string_binding
;
448 *p
++ = *string_binding
;
455 /***********************************************************************
456 * RpcStringBindingComposeA (RPCRT4.@)
458 RPC_STATUS WINAPI
RpcStringBindingComposeA(RPC_CSTR ObjUuid
, RPC_CSTR Protseq
,
459 RPC_CSTR NetworkAddr
, RPC_CSTR Endpoint
,
460 RPC_CSTR Options
, RPC_CSTR
*StringBinding
)
465 TRACE( "(%s,%s,%s,%s,%s,%p)\n",
466 debugstr_a( (char*)ObjUuid
), debugstr_a( (char*)Protseq
),
467 debugstr_a( (char*)NetworkAddr
), debugstr_a( (char*)Endpoint
),
468 debugstr_a( (char*)Options
), StringBinding
);
470 /* overestimate for each component for escaping of delimiters */
471 if (ObjUuid
&& *ObjUuid
) len
+= strlen((char*)ObjUuid
) * 2 + 1;
472 if (Protseq
&& *Protseq
) len
+= strlen((char*)Protseq
) * 2 + 1;
473 if (NetworkAddr
&& *NetworkAddr
) len
+= strlen((char*)NetworkAddr
) * 2;
474 if (Endpoint
&& *Endpoint
) len
+= strlen((char*)Endpoint
) * 2 + 2;
475 if (Options
&& *Options
) len
+= strlen((char*)Options
) * 2 + 2;
477 data
= HeapAlloc(GetProcessHeap(), 0, len
);
478 *StringBinding
= data
;
480 if (ObjUuid
&& *ObjUuid
) {
481 data
= escape_string_binding_component(data
, ObjUuid
);
484 if (Protseq
&& *Protseq
) {
485 data
= escape_string_binding_component(data
, Protseq
);
488 if (NetworkAddr
&& *NetworkAddr
)
489 data
= escape_string_binding_component(data
, NetworkAddr
);
491 if ((Endpoint
&& *Endpoint
) ||
492 (Options
&& *Options
)) {
494 if (Endpoint
&& *Endpoint
) {
495 data
= escape_string_binding_component(data
, Endpoint
);
496 if (Options
&& *Options
) *data
++ = ',';
498 if (Options
&& *Options
) {
499 data
= escape_string_binding_component(data
, Options
);
508 /***********************************************************************
509 * RpcStringBindingComposeW (RPCRT4.@)
511 RPC_STATUS WINAPI
RpcStringBindingComposeW( RPC_WSTR ObjUuid
, RPC_WSTR Protseq
,
512 RPC_WSTR NetworkAddr
, RPC_WSTR Endpoint
,
513 RPC_WSTR Options
, RPC_WSTR
* StringBinding
)
518 TRACE("(%s,%s,%s,%s,%s,%p)\n",
519 debugstr_w( ObjUuid
), debugstr_w( Protseq
),
520 debugstr_w( NetworkAddr
), debugstr_w( Endpoint
),
521 debugstr_w( Options
), StringBinding
);
523 /* overestimate for each component for escaping of delimiters */
524 if (ObjUuid
&& *ObjUuid
) len
+= strlenW(ObjUuid
) * 2 + 1;
525 if (Protseq
&& *Protseq
) len
+= strlenW(Protseq
) * 2 + 1;
526 if (NetworkAddr
&& *NetworkAddr
) len
+= strlenW(NetworkAddr
) * 2;
527 if (Endpoint
&& *Endpoint
) len
+= strlenW(Endpoint
) * 2 + 2;
528 if (Options
&& *Options
) len
+= strlenW(Options
) * 2 + 2;
530 data
= HeapAlloc(GetProcessHeap(), 0, len
*sizeof(WCHAR
));
531 *StringBinding
= data
;
533 if (ObjUuid
&& *ObjUuid
) {
534 data
= escape_string_binding_componentW(data
, ObjUuid
);
537 if (Protseq
&& *Protseq
) {
538 data
= escape_string_binding_componentW(data
, Protseq
);
541 if (NetworkAddr
&& *NetworkAddr
) {
542 data
= escape_string_binding_componentW(data
, NetworkAddr
);
544 if ((Endpoint
&& *Endpoint
) ||
545 (Options
&& *Options
)) {
547 if (Endpoint
&& *Endpoint
) {
548 data
= escape_string_binding_componentW(data
, Endpoint
);
549 if (Options
&& *Options
) *data
++ = ',';
551 if (Options
&& *Options
) {
552 data
= escape_string_binding_componentW(data
, Options
);
562 /***********************************************************************
563 * RpcStringBindingParseA (RPCRT4.@)
565 RPC_STATUS WINAPI
RpcStringBindingParseA( RPC_CSTR StringBinding
, RPC_CSTR
*ObjUuid
,
566 RPC_CSTR
*Protseq
, RPC_CSTR
*NetworkAddr
,
567 RPC_CSTR
*Endpoint
, RPC_CSTR
*Options
)
569 const unsigned char *data
, *next
;
570 static const char ep_opt
[] = "endpoint=";
571 BOOL endpoint_already_found
= FALSE
;
573 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_a((char*)StringBinding
),
574 ObjUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
);
576 if (ObjUuid
) *ObjUuid
= NULL
;
577 if (Protseq
) *Protseq
= NULL
;
578 if (NetworkAddr
) *NetworkAddr
= NULL
;
579 if (Endpoint
) *Endpoint
= NULL
;
580 if (Options
) *Options
= NULL
;
582 data
= StringBinding
;
584 next
= string_binding_find_delimiter(data
, '@');
588 RPC_CSTR str_uuid
= unescape_string_binding_component(data
, next
- data
);
589 status
= UuidFromStringA(str_uuid
, &uuid
);
590 if (status
!= RPC_S_OK
) {
591 HeapFree(GetProcessHeap(), 0, str_uuid
);
597 HeapFree(GetProcessHeap(), 0, str_uuid
);
601 next
= string_binding_find_delimiter(data
, ':');
603 if (Protseq
) *Protseq
= unescape_string_binding_component(data
, next
- data
);
607 next
= string_binding_find_delimiter(data
, '[');
609 const unsigned char *close
;
612 if (NetworkAddr
) *NetworkAddr
= unescape_string_binding_component(data
, next
- data
);
614 close
= string_binding_find_delimiter(data
, ']');
615 if (!close
) goto fail
;
617 /* tokenize options */
618 while (data
< close
) {
619 next
= string_binding_find_delimiter(data
, ',');
620 if (!next
|| next
> close
) next
= close
;
621 /* FIXME: this is kind of inefficient */
622 opt
= unescape_string_binding_component(data
, next
- data
);
626 next
= string_binding_find_delimiter(opt
, '=');
628 /* not an option, must be an endpoint */
629 if (endpoint_already_found
) goto fail
;
630 if (Endpoint
) *Endpoint
= opt
;
631 else HeapFree(GetProcessHeap(), 0, opt
);
632 endpoint_already_found
= TRUE
;
634 if (strncmp((const char *)opt
, ep_opt
, strlen(ep_opt
)) == 0) {
635 /* endpoint option */
636 if (endpoint_already_found
) goto fail
;
637 if (Endpoint
) *Endpoint
= unescape_string_binding_component(next
+1, -1);
638 HeapFree(GetProcessHeap(), 0, opt
);
639 endpoint_already_found
= TRUE
;
644 /* FIXME: this is kind of inefficient */
645 *Options
= (unsigned char*) RPCRT4_strconcatA( (char*)*Options
, (char *)opt
);
646 HeapFree(GetProcessHeap(), 0, opt
);
650 HeapFree(GetProcessHeap(), 0, opt
);
656 if (*data
) goto fail
;
658 else if (NetworkAddr
)
659 *NetworkAddr
= unescape_string_binding_component(data
, -1);
664 if (ObjUuid
) RpcStringFreeA(ObjUuid
);
665 if (Protseq
) RpcStringFreeA(Protseq
);
666 if (NetworkAddr
) RpcStringFreeA(NetworkAddr
);
667 if (Endpoint
) RpcStringFreeA(Endpoint
);
668 if (Options
) RpcStringFreeA(Options
);
669 return RPC_S_INVALID_STRING_BINDING
;
672 /***********************************************************************
673 * RpcStringBindingParseW (RPCRT4.@)
675 RPC_STATUS WINAPI
RpcStringBindingParseW( RPC_WSTR StringBinding
, RPC_WSTR
*ObjUuid
,
676 RPC_WSTR
*Protseq
, RPC_WSTR
*NetworkAddr
,
677 RPC_WSTR
*Endpoint
, RPC_WSTR
*Options
)
679 const WCHAR
*data
, *next
;
680 static const WCHAR ep_opt
[] = {'e','n','d','p','o','i','n','t','=',0};
681 BOOL endpoint_already_found
= FALSE
;
683 TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_w(StringBinding
),
684 ObjUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
);
686 if (ObjUuid
) *ObjUuid
= NULL
;
687 if (Protseq
) *Protseq
= NULL
;
688 if (NetworkAddr
) *NetworkAddr
= NULL
;
689 if (Endpoint
) *Endpoint
= NULL
;
690 if (Options
) *Options
= NULL
;
692 data
= StringBinding
;
694 next
= string_binding_find_delimiterW(data
, '@');
698 RPC_WSTR str_uuid
= unescape_string_binding_componentW(data
, next
- data
);
699 status
= UuidFromStringW(str_uuid
, &uuid
);
700 if (status
!= RPC_S_OK
) {
701 HeapFree(GetProcessHeap(), 0, str_uuid
);
707 HeapFree(GetProcessHeap(), 0, str_uuid
);
711 next
= string_binding_find_delimiterW(data
, ':');
713 if (Protseq
) *Protseq
= unescape_string_binding_componentW(data
, next
- data
);
717 next
= string_binding_find_delimiterW(data
, '[');
722 if (NetworkAddr
) *NetworkAddr
= unescape_string_binding_componentW(data
, next
- data
);
724 close
= string_binding_find_delimiterW(data
, ']');
725 if (!close
) goto fail
;
727 /* tokenize options */
728 while (data
< close
) {
729 next
= string_binding_find_delimiterW(data
, ',');
730 if (!next
|| next
> close
) next
= close
;
731 /* FIXME: this is kind of inefficient */
732 opt
= unescape_string_binding_componentW(data
, next
- data
);
736 next
= string_binding_find_delimiterW(opt
, '=');
738 /* not an option, must be an endpoint */
739 if (endpoint_already_found
) goto fail
;
740 if (Endpoint
) *Endpoint
= opt
;
741 else HeapFree(GetProcessHeap(), 0, opt
);
742 endpoint_already_found
= TRUE
;
744 if (strncmpW(opt
, ep_opt
, strlenW(ep_opt
)) == 0) {
745 /* endpoint option */
746 if (endpoint_already_found
) goto fail
;
747 if (Endpoint
) *Endpoint
= unescape_string_binding_componentW(next
+1, -1);
748 HeapFree(GetProcessHeap(), 0, opt
);
749 endpoint_already_found
= TRUE
;
754 /* FIXME: this is kind of inefficient */
755 *Options
= RPCRT4_strconcatW(*Options
, opt
);
756 HeapFree(GetProcessHeap(), 0, opt
);
760 HeapFree(GetProcessHeap(), 0, opt
);
766 if (*data
) goto fail
;
767 } else if (NetworkAddr
)
768 *NetworkAddr
= unescape_string_binding_componentW(data
, -1);
773 if (ObjUuid
) RpcStringFreeW(ObjUuid
);
774 if (Protseq
) RpcStringFreeW(Protseq
);
775 if (NetworkAddr
) RpcStringFreeW(NetworkAddr
);
776 if (Endpoint
) RpcStringFreeW(Endpoint
);
777 if (Options
) RpcStringFreeW(Options
);
778 return RPC_S_INVALID_STRING_BINDING
;
781 /***********************************************************************
782 * RpcBindingFree (RPCRT4.@)
784 RPC_STATUS WINAPI
RpcBindingFree( RPC_BINDING_HANDLE
* Binding
)
787 TRACE("(%p) = %p\n", Binding
, *Binding
);
789 status
= RPCRT4_ReleaseBinding(*Binding
);
791 status
= RPC_S_INVALID_BINDING
;
792 if (status
== RPC_S_OK
) *Binding
= NULL
;
796 /***********************************************************************
797 * RpcBindingVectorFree (RPCRT4.@)
799 RPC_STATUS WINAPI
RpcBindingVectorFree( RPC_BINDING_VECTOR
** BindingVector
)
803 TRACE("(%p)\n", BindingVector
);
804 for (c
=0; c
<(*BindingVector
)->Count
; c
++) RpcBindingFree(&(*BindingVector
)->BindingH
[c
]);
805 HeapFree(GetProcessHeap(), 0, *BindingVector
);
806 *BindingVector
= NULL
;
810 /***********************************************************************
811 * RpcBindingInqObject (RPCRT4.@)
813 RPC_STATUS WINAPI
RpcBindingInqObject( RPC_BINDING_HANDLE Binding
, UUID
* ObjectUuid
)
815 RpcBinding
* bind
= Binding
;
817 TRACE("(%p,%p) = %s\n", Binding
, ObjectUuid
, debugstr_guid(&bind
->ObjectUuid
));
818 *ObjectUuid
= bind
->ObjectUuid
;
822 /***********************************************************************
823 * RpcBindingSetObject (RPCRT4.@)
825 RPC_STATUS WINAPI
RpcBindingSetObject( RPC_BINDING_HANDLE Binding
, UUID
* ObjectUuid
)
827 RpcBinding
* bind
= Binding
;
829 TRACE("(%p,%s)\n", Binding
, debugstr_guid(ObjectUuid
));
830 if (bind
->server
) return RPC_S_WRONG_KIND_OF_BINDING
;
831 return RPCRT4_SetBindingObject(Binding
, ObjectUuid
);
834 /***********************************************************************
835 * RpcBindingFromStringBindingA (RPCRT4.@)
837 RPC_STATUS WINAPI
RpcBindingFromStringBindingA( RPC_CSTR StringBinding
, RPC_BINDING_HANDLE
* Binding
)
840 RpcBinding
* bind
= NULL
;
841 RPC_CSTR ObjectUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
;
844 TRACE("(%s,%p)\n", debugstr_a((char*)StringBinding
), Binding
);
846 ret
= RpcStringBindingParseA(StringBinding
, &ObjectUuid
, &Protseq
,
847 &NetworkAddr
, &Endpoint
, &Options
);
848 if (ret
!= RPC_S_OK
) return ret
;
850 ret
= UuidFromStringA(ObjectUuid
, &Uuid
);
853 ret
= RPCRT4_CreateBindingA(&bind
, FALSE
, (char*)Protseq
);
854 if (ret
== RPC_S_OK
) {
855 ret
= RPCRT4_SetBindingObject(bind
, &Uuid
);
857 ret
= RPCRT4_CompleteBindingA(bind
, (char*)NetworkAddr
, (char*)Endpoint
, (char*)Options
);
860 *Binding
= (RPC_BINDING_HANDLE
)bind
;
862 RPCRT4_ReleaseBinding(bind
);
865 RpcStringFreeA(&Options
);
866 RpcStringFreeA(&Endpoint
);
867 RpcStringFreeA(&NetworkAddr
);
868 RpcStringFreeA(&Protseq
);
869 RpcStringFreeA(&ObjectUuid
);
874 /***********************************************************************
875 * RpcBindingFromStringBindingW (RPCRT4.@)
877 RPC_STATUS WINAPI
RpcBindingFromStringBindingW( RPC_WSTR StringBinding
, RPC_BINDING_HANDLE
* Binding
)
880 RpcBinding
* bind
= NULL
;
881 RPC_WSTR ObjectUuid
, Protseq
, NetworkAddr
, Endpoint
, Options
;
884 TRACE("(%s,%p)\n", debugstr_w(StringBinding
), Binding
);
886 ret
= RpcStringBindingParseW(StringBinding
, &ObjectUuid
, &Protseq
,
887 &NetworkAddr
, &Endpoint
, &Options
);
888 if (ret
!= RPC_S_OK
) return ret
;
890 ret
= UuidFromStringW(ObjectUuid
, &Uuid
);
893 ret
= RPCRT4_CreateBindingW(&bind
, FALSE
, Protseq
);
894 if (ret
== RPC_S_OK
) {
895 ret
= RPCRT4_SetBindingObject(bind
, &Uuid
);
897 ret
= RPCRT4_CompleteBindingW(bind
, NetworkAddr
, Endpoint
, Options
);
900 *Binding
= (RPC_BINDING_HANDLE
)bind
;
902 RPCRT4_ReleaseBinding(bind
);
905 RpcStringFreeW(&Options
);
906 RpcStringFreeW(&Endpoint
);
907 RpcStringFreeW(&NetworkAddr
);
908 RpcStringFreeW(&Protseq
);
909 RpcStringFreeW(&ObjectUuid
);
914 /***********************************************************************
915 * RpcBindingToStringBindingA (RPCRT4.@)
917 RPC_STATUS WINAPI
RpcBindingToStringBindingA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*StringBinding
)
920 RpcBinding
* bind
= Binding
;
923 TRACE("(%p,%p)\n", Binding
, StringBinding
);
925 if (UuidIsNil(&bind
->ObjectUuid
, &ret
))
929 ret
= UuidToStringA(&bind
->ObjectUuid
, &ObjectUuid
);
930 if (ret
!= RPC_S_OK
) return ret
;
933 ret
= RpcStringBindingComposeA(ObjectUuid
, (unsigned char*)bind
->Protseq
, (unsigned char*) bind
->NetworkAddr
,
934 (unsigned char*) bind
->Endpoint
, NULL
, StringBinding
);
936 RpcStringFreeA(&ObjectUuid
);
941 /***********************************************************************
942 * RpcBindingToStringBindingW (RPCRT4.@)
944 RPC_STATUS WINAPI
RpcBindingToStringBindingW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*StringBinding
)
947 unsigned char *str
= NULL
;
948 TRACE("(%p,%p)\n", Binding
, StringBinding
);
949 ret
= RpcBindingToStringBindingA(Binding
, &str
);
950 *StringBinding
= RPCRT4_strdupAtoW((char*)str
);
951 RpcStringFreeA(&str
);
955 /***********************************************************************
956 * I_RpcBindingInqTransportType (RPCRT4.@)
958 RPC_STATUS WINAPI
I_RpcBindingInqTransportType( RPC_BINDING_HANDLE Binding
, unsigned int * Type
)
961 FIXME( "(%p,%p): stub\n", Binding
, Type
);
962 *Type
= TRANSPORT_TYPE_LPC
;
966 /***********************************************************************
967 * I_RpcBindingSetAsync (RPCRT4.@)
969 * Exists in win9x and winNT, but with different number of arguments
970 * (9x version has 3 arguments, NT has 2).
972 RPC_STATUS WINAPI
I_RpcBindingSetAsync( RPC_BINDING_HANDLE Binding
, RPC_BLOCKING_FN BlockingFn
)
974 RpcBinding
* bind
= Binding
;
976 TRACE( "(%p,%p): stub\n", Binding
, BlockingFn
);
978 bind
->BlockingFn
= BlockingFn
;
983 /***********************************************************************
984 * RpcBindingCopy (RPCRT4.@)
986 RPC_STATUS RPC_ENTRY
RpcBindingCopy(
987 RPC_BINDING_HANDLE SourceBinding
,
988 RPC_BINDING_HANDLE
* DestinationBinding
)
990 RpcBinding
*DestBinding
;
991 RpcBinding
*SrcBinding
= SourceBinding
;
994 TRACE("(%p, %p)\n", SourceBinding
, DestinationBinding
);
996 status
= RPCRT4_AllocBinding(&DestBinding
, SrcBinding
->server
);
997 if (status
!= RPC_S_OK
) return status
;
999 DestBinding
->ObjectUuid
= SrcBinding
->ObjectUuid
;
1000 DestBinding
->BlockingFn
= SrcBinding
->BlockingFn
;
1001 DestBinding
->Protseq
= RPCRT4_strndupA(SrcBinding
->Protseq
, -1);
1002 DestBinding
->NetworkAddr
= RPCRT4_strndupA(SrcBinding
->NetworkAddr
, -1);
1003 DestBinding
->Endpoint
= RPCRT4_strndupA(SrcBinding
->Endpoint
, -1);
1004 DestBinding
->NetworkOptions
= RPCRT4_strdupW(SrcBinding
->NetworkOptions
);
1005 if (SrcBinding
->Assoc
) SrcBinding
->Assoc
->refs
++;
1006 DestBinding
->Assoc
= SrcBinding
->Assoc
;
1008 if (SrcBinding
->AuthInfo
) RpcAuthInfo_AddRef(SrcBinding
->AuthInfo
);
1009 DestBinding
->AuthInfo
= SrcBinding
->AuthInfo
;
1010 if (SrcBinding
->QOS
) RpcQualityOfService_AddRef(SrcBinding
->QOS
);
1011 DestBinding
->QOS
= SrcBinding
->QOS
;
1013 *DestinationBinding
= DestBinding
;
1017 /***********************************************************************
1018 * RpcBindingReset (RPCRT4.@)
1020 RPC_STATUS RPC_ENTRY
RpcBindingReset(RPC_BINDING_HANDLE Binding
)
1022 RpcBinding
*bind
= Binding
;
1024 TRACE("(%p)\n", Binding
);
1026 RPCRT4_strfree(bind
->Endpoint
);
1027 bind
->Endpoint
= NULL
;
1028 if (bind
->Assoc
) RpcAssoc_Release(bind
->Assoc
);
1034 /***********************************************************************
1035 * RpcImpersonateClient (RPCRT4.@)
1037 * Impersonates the client connected via a binding handle so that security
1038 * checks are done in the context of the client.
1041 * BindingHandle [I] Handle to the binding to the client.
1044 * Success: RPS_S_OK.
1045 * Failure: RPC_STATUS value.
1049 * If BindingHandle is NULL then the function impersonates the client
1050 * connected to the binding handle of the current thread.
1052 RPC_STATUS WINAPI
RpcImpersonateClient(RPC_BINDING_HANDLE BindingHandle
)
1056 TRACE("(%p)\n", BindingHandle
);
1058 if (!BindingHandle
) BindingHandle
= I_RpcGetCurrentCallHandle();
1059 if (!BindingHandle
) return RPC_S_INVALID_BINDING
;
1061 bind
= BindingHandle
;
1063 return rpcrt4_conn_impersonate_client(bind
->FromConn
);
1064 return RPC_S_WRONG_KIND_OF_BINDING
;
1067 /***********************************************************************
1068 * RpcRevertToSelfEx (RPCRT4.@)
1070 * Stops impersonating the client connected to the binding handle so that security
1071 * checks are no longer done in the context of the client.
1074 * BindingHandle [I] Handle to the binding to the client.
1077 * Success: RPS_S_OK.
1078 * Failure: RPC_STATUS value.
1082 * If BindingHandle is NULL then the function stops impersonating the client
1083 * connected to the binding handle of the current thread.
1085 RPC_STATUS WINAPI
RpcRevertToSelfEx(RPC_BINDING_HANDLE BindingHandle
)
1089 TRACE("(%p)\n", BindingHandle
);
1091 if (!BindingHandle
) BindingHandle
= I_RpcGetCurrentCallHandle();
1092 if (!BindingHandle
) return RPC_S_INVALID_BINDING
;
1094 bind
= BindingHandle
;
1096 return rpcrt4_conn_revert_to_self(bind
->FromConn
);
1097 return RPC_S_WRONG_KIND_OF_BINDING
;
1100 static inline BOOL
has_nt_auth_identity(ULONG AuthnLevel
)
1104 case RPC_C_AUTHN_GSS_NEGOTIATE
:
1105 case RPC_C_AUTHN_WINNT
:
1106 case RPC_C_AUTHN_GSS_KERBEROS
:
1113 RPC_STATUS
RpcAuthInfo_Create(ULONG AuthnLevel
, ULONG AuthnSvc
,
1114 CredHandle cred
, TimeStamp exp
,
1116 RPC_AUTH_IDENTITY_HANDLE identity
,
1119 RpcAuthInfo
*AuthInfo
= HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo
));
1121 return ERROR_OUTOFMEMORY
;
1124 AuthInfo
->AuthnLevel
= AuthnLevel
;
1125 AuthInfo
->AuthnSvc
= AuthnSvc
;
1126 AuthInfo
->cred
= cred
;
1127 AuthInfo
->exp
= exp
;
1128 AuthInfo
->cbMaxToken
= cbMaxToken
;
1129 AuthInfo
->identity
= identity
;
1130 AuthInfo
->server_principal_name
= NULL
;
1132 /* duplicate the SEC_WINNT_AUTH_IDENTITY structure, if applicable, to
1133 * enable better matching in RpcAuthInfo_IsEqual */
1134 if (identity
&& has_nt_auth_identity(AuthnSvc
))
1136 const SEC_WINNT_AUTH_IDENTITY_W
*nt_identity
= identity
;
1137 AuthInfo
->nt_identity
= HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo
->nt_identity
));
1138 if (!AuthInfo
->nt_identity
)
1140 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1141 return ERROR_OUTOFMEMORY
;
1144 AuthInfo
->nt_identity
->Flags
= SEC_WINNT_AUTH_IDENTITY_UNICODE
;
1145 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
1146 AuthInfo
->nt_identity
->User
= RPCRT4_strndupW(nt_identity
->User
, nt_identity
->UserLength
);
1148 AuthInfo
->nt_identity
->User
= RPCRT4_strndupAtoW((const char *)nt_identity
->User
, nt_identity
->UserLength
);
1149 AuthInfo
->nt_identity
->UserLength
= nt_identity
->UserLength
;
1150 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
1151 AuthInfo
->nt_identity
->Domain
= RPCRT4_strndupW(nt_identity
->Domain
, nt_identity
->DomainLength
);
1153 AuthInfo
->nt_identity
->Domain
= RPCRT4_strndupAtoW((const char *)nt_identity
->Domain
, nt_identity
->DomainLength
);
1154 AuthInfo
->nt_identity
->DomainLength
= nt_identity
->DomainLength
;
1155 if (nt_identity
->Flags
& SEC_WINNT_AUTH_IDENTITY_UNICODE
)
1156 AuthInfo
->nt_identity
->Password
= RPCRT4_strndupW(nt_identity
->Password
, nt_identity
->PasswordLength
);
1158 AuthInfo
->nt_identity
->Password
= RPCRT4_strndupAtoW((const char *)nt_identity
->Password
, nt_identity
->PasswordLength
);
1159 AuthInfo
->nt_identity
->PasswordLength
= nt_identity
->PasswordLength
;
1161 if ((nt_identity
->User
&& !AuthInfo
->nt_identity
->User
) ||
1162 (nt_identity
->Domain
&& !AuthInfo
->nt_identity
->Domain
) ||
1163 (nt_identity
->Password
&& !AuthInfo
->nt_identity
->Password
))
1165 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->User
);
1166 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Domain
);
1167 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Password
);
1168 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
);
1169 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1170 return ERROR_OUTOFMEMORY
;
1174 AuthInfo
->nt_identity
= NULL
;
1179 ULONG
RpcAuthInfo_AddRef(RpcAuthInfo
*AuthInfo
)
1181 return InterlockedIncrement(&AuthInfo
->refs
);
1184 ULONG
RpcAuthInfo_Release(RpcAuthInfo
*AuthInfo
)
1186 ULONG refs
= InterlockedDecrement(&AuthInfo
->refs
);
1190 FreeCredentialsHandle(&AuthInfo
->cred
);
1191 if (AuthInfo
->nt_identity
)
1193 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->User
);
1194 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Domain
);
1195 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
->Password
);
1196 HeapFree(GetProcessHeap(), 0, AuthInfo
->nt_identity
);
1198 HeapFree(GetProcessHeap(), 0, AuthInfo
->server_principal_name
);
1199 HeapFree(GetProcessHeap(), 0, AuthInfo
);
1205 BOOL
RpcAuthInfo_IsEqual(const RpcAuthInfo
*AuthInfo1
, const RpcAuthInfo
*AuthInfo2
)
1207 if (AuthInfo1
== AuthInfo2
)
1210 if (!AuthInfo1
|| !AuthInfo2
)
1213 if ((AuthInfo1
->AuthnLevel
!= AuthInfo2
->AuthnLevel
) ||
1214 (AuthInfo1
->AuthnSvc
!= AuthInfo2
->AuthnSvc
))
1217 if (AuthInfo1
->identity
== AuthInfo2
->identity
)
1220 if (!AuthInfo1
->identity
|| !AuthInfo2
->identity
)
1223 if (has_nt_auth_identity(AuthInfo1
->AuthnSvc
))
1225 const SEC_WINNT_AUTH_IDENTITY_W
*identity1
= AuthInfo1
->nt_identity
;
1226 const SEC_WINNT_AUTH_IDENTITY_W
*identity2
= AuthInfo2
->nt_identity
;
1227 /* compare user names */
1228 if (identity1
->UserLength
!= identity2
->UserLength
||
1229 memcmp(identity1
->User
, identity2
->User
, identity1
->UserLength
))
1231 /* compare domain names */
1232 if (identity1
->DomainLength
!= identity2
->DomainLength
||
1233 memcmp(identity1
->Domain
, identity2
->Domain
, identity1
->DomainLength
))
1235 /* compare passwords */
1236 if (identity1
->PasswordLength
!= identity2
->PasswordLength
||
1237 memcmp(identity1
->Password
, identity2
->Password
, identity1
->PasswordLength
))
1246 static RPC_STATUS
RpcQualityOfService_Create(const RPC_SECURITY_QOS
*qos_src
, BOOL unicode
, RpcQualityOfService
**qos_dst
)
1248 RpcQualityOfService
*qos
= HeapAlloc(GetProcessHeap(), 0, sizeof(*qos
));
1251 return RPC_S_OUT_OF_RESOURCES
;
1254 qos
->qos
= HeapAlloc(GetProcessHeap(), 0, sizeof(*qos
->qos
));
1255 if (!qos
->qos
) goto error
;
1256 qos
->qos
->Version
= qos_src
->Version
;
1257 qos
->qos
->Capabilities
= qos_src
->Capabilities
;
1258 qos
->qos
->IdentityTracking
= qos_src
->IdentityTracking
;
1259 qos
->qos
->ImpersonationType
= qos_src
->ImpersonationType
;
1260 qos
->qos
->AdditionalSecurityInfoType
= 0;
1262 if (qos_src
->Version
>= 2)
1264 const RPC_SECURITY_QOS_V2_W
*qos_src2
= (const RPC_SECURITY_QOS_V2_W
*)qos_src
;
1265 qos
->qos
->AdditionalSecurityInfoType
= qos_src2
->AdditionalSecurityInfoType
;
1266 if (qos_src2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1268 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials_src
= qos_src2
->u
.HttpCredentials
;
1269 RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials_dst
;
1271 http_credentials_dst
= HeapAlloc(GetProcessHeap(), 0, sizeof(*http_credentials_dst
));
1272 qos
->qos
->u
.HttpCredentials
= http_credentials_dst
;
1273 if (!http_credentials_dst
) goto error
;
1274 http_credentials_dst
->TransportCredentials
= NULL
;
1275 http_credentials_dst
->Flags
= http_credentials_src
->Flags
;
1276 http_credentials_dst
->AuthenticationTarget
= http_credentials_src
->AuthenticationTarget
;
1277 http_credentials_dst
->NumberOfAuthnSchemes
= http_credentials_src
->NumberOfAuthnSchemes
;
1278 http_credentials_dst
->AuthnSchemes
= NULL
;
1279 http_credentials_dst
->ServerCertificateSubject
= NULL
;
1280 if (http_credentials_src
->TransportCredentials
)
1282 SEC_WINNT_AUTH_IDENTITY_W
*cred_dst
;
1283 cred_dst
= http_credentials_dst
->TransportCredentials
= HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY
, sizeof(*cred_dst
));
1284 if (!cred_dst
) goto error
;
1285 cred_dst
->Flags
= SEC_WINNT_AUTH_IDENTITY_UNICODE
;
1288 const SEC_WINNT_AUTH_IDENTITY_W
*cred_src
= http_credentials_src
->TransportCredentials
;
1289 cred_dst
->UserLength
= cred_src
->UserLength
;
1290 cred_dst
->PasswordLength
= cred_src
->PasswordLength
;
1291 cred_dst
->DomainLength
= cred_src
->DomainLength
;
1292 cred_dst
->User
= RPCRT4_strndupW(cred_src
->User
, cred_src
->UserLength
);
1293 cred_dst
->Password
= RPCRT4_strndupW(cred_src
->Password
, cred_src
->PasswordLength
);
1294 cred_dst
->Domain
= RPCRT4_strndupW(cred_src
->Domain
, cred_src
->DomainLength
);
1298 const SEC_WINNT_AUTH_IDENTITY_A
*cred_src
= (const SEC_WINNT_AUTH_IDENTITY_A
*)http_credentials_src
->TransportCredentials
;
1299 cred_dst
->UserLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->User
, cred_src
->UserLength
, NULL
, 0);
1300 cred_dst
->DomainLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Domain
, cred_src
->DomainLength
, NULL
, 0);
1301 cred_dst
->PasswordLength
= MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Password
, cred_src
->PasswordLength
, NULL
, 0);
1302 cred_dst
->User
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->UserLength
* sizeof(WCHAR
));
1303 cred_dst
->Password
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->PasswordLength
* sizeof(WCHAR
));
1304 cred_dst
->Domain
= HeapAlloc(GetProcessHeap(), 0, cred_dst
->DomainLength
* sizeof(WCHAR
));
1305 if (!cred_dst
->Password
|| !cred_dst
->Domain
) goto error
;
1306 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->User
, cred_src
->UserLength
, cred_dst
->User
, cred_dst
->UserLength
);
1307 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Domain
, cred_src
->DomainLength
, cred_dst
->Domain
, cred_dst
->DomainLength
);
1308 MultiByteToWideChar(CP_ACP
, 0, (char *)cred_src
->Password
, cred_src
->PasswordLength
, cred_dst
->Password
, cred_dst
->PasswordLength
);
1311 if (http_credentials_src
->NumberOfAuthnSchemes
)
1313 http_credentials_dst
->AuthnSchemes
= HeapAlloc(GetProcessHeap(), 0, http_credentials_src
->NumberOfAuthnSchemes
* sizeof(*http_credentials_dst
->AuthnSchemes
));
1314 if (!http_credentials_dst
->AuthnSchemes
) goto error
;
1315 memcpy(http_credentials_dst
->AuthnSchemes
, http_credentials_src
->AuthnSchemes
, http_credentials_src
->NumberOfAuthnSchemes
* sizeof(*http_credentials_dst
->AuthnSchemes
));
1317 if (http_credentials_src
->ServerCertificateSubject
)
1320 http_credentials_dst
->ServerCertificateSubject
=
1321 RPCRT4_strndupW(http_credentials_src
->ServerCertificateSubject
,
1322 strlenW(http_credentials_src
->ServerCertificateSubject
));
1324 http_credentials_dst
->ServerCertificateSubject
=
1325 RPCRT4_strdupAtoW((char *)http_credentials_src
->ServerCertificateSubject
);
1326 if (!http_credentials_dst
->ServerCertificateSubject
) goto error
;
1336 if (qos
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
&&
1337 qos
->qos
->u
.HttpCredentials
)
1339 if (qos
->qos
->u
.HttpCredentials
->TransportCredentials
)
1341 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->User
);
1342 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Domain
);
1343 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Password
);
1344 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
);
1346 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->AuthnSchemes
);
1347 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->ServerCertificateSubject
);
1348 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
);
1350 HeapFree(GetProcessHeap(), 0, qos
->qos
);
1352 HeapFree(GetProcessHeap(), 0, qos
);
1353 return RPC_S_OUT_OF_RESOURCES
;
1356 ULONG
RpcQualityOfService_AddRef(RpcQualityOfService
*qos
)
1358 return InterlockedIncrement(&qos
->refs
);
1361 ULONG
RpcQualityOfService_Release(RpcQualityOfService
*qos
)
1363 ULONG refs
= InterlockedDecrement(&qos
->refs
);
1367 if (qos
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1369 if (qos
->qos
->u
.HttpCredentials
->TransportCredentials
)
1371 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->User
);
1372 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Domain
);
1373 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
->Password
);
1374 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->TransportCredentials
);
1376 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->AuthnSchemes
);
1377 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
->ServerCertificateSubject
);
1378 HeapFree(GetProcessHeap(), 0, qos
->qos
->u
.HttpCredentials
);
1380 HeapFree(GetProcessHeap(), 0, qos
->qos
);
1381 HeapFree(GetProcessHeap(), 0, qos
);
1386 BOOL
RpcQualityOfService_IsEqual(const RpcQualityOfService
*qos1
, const RpcQualityOfService
*qos2
)
1394 TRACE("qos1 = { %d %d %d %d }, qos2 = { %d %d %d %d }\n",
1395 qos1
->qos
->Capabilities
, qos1
->qos
->IdentityTracking
,
1396 qos1
->qos
->ImpersonationType
, qos1
->qos
->AdditionalSecurityInfoType
,
1397 qos2
->qos
->Capabilities
, qos2
->qos
->IdentityTracking
,
1398 qos2
->qos
->ImpersonationType
, qos2
->qos
->AdditionalSecurityInfoType
);
1400 if ((qos1
->qos
->Capabilities
!= qos2
->qos
->Capabilities
) ||
1401 (qos1
->qos
->IdentityTracking
!= qos2
->qos
->IdentityTracking
) ||
1402 (qos1
->qos
->ImpersonationType
!= qos2
->qos
->ImpersonationType
) ||
1403 (qos1
->qos
->AdditionalSecurityInfoType
!= qos2
->qos
->AdditionalSecurityInfoType
))
1406 if (qos1
->qos
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1408 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials1
= qos1
->qos
->u
.HttpCredentials
;
1409 const RPC_HTTP_TRANSPORT_CREDENTIALS_W
*http_credentials2
= qos2
->qos
->u
.HttpCredentials
;
1411 if (http_credentials1
->Flags
!= http_credentials2
->Flags
)
1414 if (http_credentials1
->AuthenticationTarget
!= http_credentials2
->AuthenticationTarget
)
1417 if (http_credentials1
->NumberOfAuthnSchemes
!= http_credentials2
->NumberOfAuthnSchemes
)
1420 if ((!http_credentials1
->AuthnSchemes
&& http_credentials2
->AuthnSchemes
) ||
1421 (http_credentials1
->AuthnSchemes
&& !http_credentials2
->AuthnSchemes
))
1424 if (memcmp(http_credentials1
->AuthnSchemes
, http_credentials2
->AuthnSchemes
,
1425 http_credentials1
->NumberOfAuthnSchemes
* sizeof(http_credentials1
->AuthnSchemes
[0])))
1428 /* server certificate subject not currently used */
1430 if (http_credentials1
->TransportCredentials
!= http_credentials2
->TransportCredentials
)
1432 const SEC_WINNT_AUTH_IDENTITY_W
*identity1
= http_credentials1
->TransportCredentials
;
1433 const SEC_WINNT_AUTH_IDENTITY_W
*identity2
= http_credentials2
->TransportCredentials
;
1435 if (!identity1
|| !identity2
)
1438 /* compare user names */
1439 if (identity1
->UserLength
!= identity2
->UserLength
||
1440 memcmp(identity1
->User
, identity2
->User
, identity1
->UserLength
))
1442 /* compare domain names */
1443 if (identity1
->DomainLength
!= identity2
->DomainLength
||
1444 memcmp(identity1
->Domain
, identity2
->Domain
, identity1
->DomainLength
))
1446 /* compare passwords */
1447 if (identity1
->PasswordLength
!= identity2
->PasswordLength
||
1448 memcmp(identity1
->Password
, identity2
->Password
, identity1
->PasswordLength
))
1456 /***********************************************************************
1457 * RpcRevertToSelf (RPCRT4.@)
1459 RPC_STATUS WINAPI
RpcRevertToSelf(void)
1462 return RpcRevertToSelfEx(NULL
);
1465 /***********************************************************************
1466 * RpcMgmtSetComTimeout (RPCRT4.@)
1468 RPC_STATUS WINAPI
RpcMgmtSetComTimeout(RPC_BINDING_HANDLE BindingHandle
, unsigned int Timeout
)
1470 FIXME("(%p, %d): stub\n", BindingHandle
, Timeout
);
1474 /***********************************************************************
1475 * RpcBindingInqAuthInfoExA (RPCRT4.@)
1477 RPCRTAPI RPC_STATUS RPC_ENTRY
1478 RpcBindingInqAuthInfoExA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1479 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
,
1480 ULONG RpcQosVersion
, RPC_SECURITY_QOS
*SecurityQOS
)
1485 TRACE("%p %p %p %p %p %p %u %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1486 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1488 status
= RpcBindingInqAuthInfoExW(Binding
, ServerPrincName
? &principal
: NULL
, AuthnLevel
,
1489 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1490 if (status
== RPC_S_OK
&& ServerPrincName
)
1492 *ServerPrincName
= (RPC_CSTR
)RPCRT4_strdupWtoA(principal
);
1493 RpcStringFreeW(&principal
);
1494 if (!*ServerPrincName
) return ERROR_OUTOFMEMORY
;
1500 /***********************************************************************
1501 * RpcBindingInqAuthInfoExW (RPCRT4.@)
1503 RPCRTAPI RPC_STATUS RPC_ENTRY
1504 RpcBindingInqAuthInfoExW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1505 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
,
1506 ULONG RpcQosVersion
, RPC_SECURITY_QOS
*SecurityQOS
)
1508 RpcBinding
*bind
= Binding
;
1510 TRACE("%p %p %p %p %p %p %u %p\n", Binding
, ServerPrincName
, AuthnLevel
,
1511 AuthnSvc
, AuthIdentity
, AuthzSvc
, RpcQosVersion
, SecurityQOS
);
1513 if (!bind
->AuthInfo
) return RPC_S_BINDING_HAS_NO_AUTH
;
1517 FIXME("QOS not implemented\n");
1518 return RPC_S_INVALID_BINDING
;
1521 if (ServerPrincName
)
1523 if (bind
->AuthInfo
->server_principal_name
)
1525 *ServerPrincName
= RPCRT4_strdupW(bind
->AuthInfo
->server_principal_name
);
1526 if (!*ServerPrincName
) return ERROR_OUTOFMEMORY
;
1528 else *ServerPrincName
= NULL
;
1530 if (AuthnLevel
) *AuthnLevel
= bind
->AuthInfo
->AuthnLevel
;
1531 if (AuthnSvc
) *AuthnSvc
= bind
->AuthInfo
->AuthnSvc
;
1532 if (AuthIdentity
) *AuthIdentity
= bind
->AuthInfo
->identity
;
1535 FIXME("authorization service not implemented\n");
1536 *AuthzSvc
= RPC_C_AUTHZ_NONE
;
1542 /***********************************************************************
1543 * RpcBindingInqAuthInfoA (RPCRT4.@)
1545 RPCRTAPI RPC_STATUS RPC_ENTRY
1546 RpcBindingInqAuthInfoA( RPC_BINDING_HANDLE Binding
, RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1547 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
)
1549 return RpcBindingInqAuthInfoExA(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
,
1553 /***********************************************************************
1554 * RpcBindingInqAuthInfoW (RPCRT4.@)
1556 RPCRTAPI RPC_STATUS RPC_ENTRY
1557 RpcBindingInqAuthInfoW( RPC_BINDING_HANDLE Binding
, RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
,
1558 ULONG
*AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE
*AuthIdentity
, ULONG
*AuthzSvc
)
1560 return RpcBindingInqAuthInfoExW(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
,
1564 /***********************************************************************
1565 * RpcBindingInqAuthClientA (RPCRT4.@)
1567 RPCRTAPI RPC_STATUS RPC_ENTRY
1568 RpcBindingInqAuthClientA( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1569 RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1572 return RpcBindingInqAuthClientExA(ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1573 AuthnSvc
, AuthzSvc
, 0);
1576 /***********************************************************************
1577 * RpcBindingInqAuthClientW (RPCRT4.@)
1579 RPCRTAPI RPC_STATUS RPC_ENTRY
1580 RpcBindingInqAuthClientW( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1581 RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1584 return RpcBindingInqAuthClientExW(ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1585 AuthnSvc
, AuthzSvc
, 0);
1588 /***********************************************************************
1589 * RpcBindingInqAuthClientExA (RPCRT4.@)
1591 RPCRTAPI RPC_STATUS RPC_ENTRY
1592 RpcBindingInqAuthClientExA( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1593 RPC_CSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1594 ULONG
*AuthzSvc
, ULONG Flags
)
1599 TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1600 AuthnSvc
, AuthzSvc
, Flags
);
1602 status
= RpcBindingInqAuthClientExW(ClientBinding
, Privs
, ServerPrincName
? &principal
: NULL
,
1603 AuthnLevel
, AuthnSvc
, AuthzSvc
, Flags
);
1604 if (status
== RPC_S_OK
&& ServerPrincName
)
1606 *ServerPrincName
= (RPC_CSTR
)RPCRT4_strdupWtoA(principal
);
1607 if (!*ServerPrincName
&& principal
) status
= ERROR_OUTOFMEMORY
;
1608 RpcStringFreeW(&principal
);
1614 /***********************************************************************
1615 * RpcBindingInqAuthClientExW (RPCRT4.@)
1617 RPCRTAPI RPC_STATUS RPC_ENTRY
1618 RpcBindingInqAuthClientExW( RPC_BINDING_HANDLE ClientBinding
, RPC_AUTHZ_HANDLE
*Privs
,
1619 RPC_WSTR
*ServerPrincName
, ULONG
*AuthnLevel
, ULONG
*AuthnSvc
,
1620 ULONG
*AuthzSvc
, ULONG Flags
)
1622 RpcBinding
*bind
= ClientBinding
;
1624 TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding
, Privs
, ServerPrincName
, AuthnLevel
,
1625 AuthnSvc
, AuthzSvc
, Flags
);
1627 if (!bind
->FromConn
) return RPC_S_INVALID_BINDING
;
1629 return rpcrt4_conn_inquire_auth_client(bind
->FromConn
, Privs
,
1630 ServerPrincName
, AuthnLevel
,
1631 AuthnSvc
, AuthzSvc
, Flags
);
1634 /***********************************************************************
1635 * RpcBindingSetAuthInfoExA (RPCRT4.@)
1637 RPCRTAPI RPC_STATUS RPC_ENTRY
1638 RpcBindingSetAuthInfoExA( RPC_BINDING_HANDLE Binding
, RPC_CSTR ServerPrincName
,
1639 ULONG AuthnLevel
, ULONG AuthnSvc
,
1640 RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
,
1641 RPC_SECURITY_QOS
*SecurityQos
)
1643 RpcBinding
* bind
= Binding
;
1647 ULONG package_count
;
1649 PSecPkgInfoA packages
;
1652 TRACE("%p %s %u %u %p %u %p\n", Binding
, debugstr_a((const char*)ServerPrincName
),
1653 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, SecurityQos
);
1659 TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d",
1660 SecurityQos
->Version
, SecurityQos
->Capabilities
, SecurityQos
->IdentityTracking
, SecurityQos
->ImpersonationType
);
1661 if (SecurityQos
->Version
>= 2)
1663 const RPC_SECURITY_QOS_V2_A
*SecurityQos2
= (const RPC_SECURITY_QOS_V2_A
*)SecurityQos
;
1664 TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2
->AdditionalSecurityInfoType
);
1665 if (SecurityQos2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1666 TRACE(", { %p, 0x%x, %d, %d, %p, %s }",
1667 SecurityQos2
->u
.HttpCredentials
->TransportCredentials
,
1668 SecurityQos2
->u
.HttpCredentials
->Flags
,
1669 SecurityQos2
->u
.HttpCredentials
->AuthenticationTarget
,
1670 SecurityQos2
->u
.HttpCredentials
->NumberOfAuthnSchemes
,
1671 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
,
1672 SecurityQos2
->u
.HttpCredentials
->ServerCertificateSubject
);
1675 status
= RpcQualityOfService_Create(SecurityQos
, FALSE
, &bind
->QOS
);
1676 if (status
!= RPC_S_OK
)
1681 if (bind
->QOS
) RpcQualityOfService_Release(bind
->QOS
);
1685 if (AuthnSvc
== RPC_C_AUTHN_DEFAULT
)
1686 AuthnSvc
= RPC_C_AUTHN_WINNT
;
1688 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1689 if (AuthnLevel
== RPC_C_AUTHN_LEVEL_DEFAULT
)
1690 AuthnLevel
= RPC_C_AUTHN_LEVEL_NONE
;
1692 if ((AuthnLevel
== RPC_C_AUTHN_LEVEL_NONE
) || (AuthnSvc
== RPC_C_AUTHN_NONE
))
1694 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1695 bind
->AuthInfo
= NULL
;
1699 if (AuthnLevel
> RPC_C_AUTHN_LEVEL_PKT_PRIVACY
)
1701 FIXME("unknown AuthnLevel %u\n", AuthnLevel
);
1702 return RPC_S_UNKNOWN_AUTHN_LEVEL
;
1705 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1706 if (AuthzSvr
&& AuthnSvc
!= RPC_C_AUTHN_WINNT
)
1708 FIXME("unsupported AuthzSvr %u\n", AuthzSvr
);
1709 return RPC_S_UNKNOWN_AUTHZ_SERVICE
;
1712 r
= EnumerateSecurityPackagesA(&package_count
, &packages
);
1715 ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n", r
);
1716 return RPC_S_SEC_PKG_ERROR
;
1719 for (i
= 0; i
< package_count
; i
++)
1720 if (packages
[i
].wRPCID
== AuthnSvc
)
1723 if (i
== package_count
)
1725 FIXME("unsupported AuthnSvc %u\n", AuthnSvc
);
1726 FreeContextBuffer(packages
);
1727 return RPC_S_UNKNOWN_AUTHN_SERVICE
;
1730 TRACE("found package %s for service %u\n", packages
[i
].Name
, AuthnSvc
);
1731 r
= AcquireCredentialsHandleA(NULL
, packages
[i
].Name
, SECPKG_CRED_OUTBOUND
, NULL
,
1732 AuthIdentity
, NULL
, NULL
, &cred
, &exp
);
1733 cbMaxToken
= packages
[i
].cbMaxToken
;
1734 FreeContextBuffer(packages
);
1735 if (r
== ERROR_SUCCESS
)
1737 RpcAuthInfo
*new_auth_info
;
1738 r
= RpcAuthInfo_Create(AuthnLevel
, AuthnSvc
, cred
, exp
, cbMaxToken
,
1739 AuthIdentity
, &new_auth_info
);
1742 new_auth_info
->server_principal_name
= RPCRT4_strdupAtoW((char *)ServerPrincName
);
1743 if (!ServerPrincName
|| new_auth_info
->server_principal_name
)
1745 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1746 bind
->AuthInfo
= new_auth_info
;
1750 RpcAuthInfo_Release(new_auth_info
);
1751 r
= ERROR_OUTOFMEMORY
;
1755 FreeCredentialsHandle(&cred
);
1760 ERR("AcquireCredentialsHandleA failed with error 0x%08x\n", r
);
1761 return RPC_S_SEC_PKG_ERROR
;
1765 /***********************************************************************
1766 * RpcBindingSetAuthInfoExW (RPCRT4.@)
1768 RPCRTAPI RPC_STATUS RPC_ENTRY
1769 RpcBindingSetAuthInfoExW( RPC_BINDING_HANDLE Binding
, RPC_WSTR ServerPrincName
, ULONG AuthnLevel
,
1770 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
,
1771 RPC_SECURITY_QOS
*SecurityQos
)
1773 RpcBinding
* bind
= Binding
;
1777 ULONG package_count
;
1779 PSecPkgInfoW packages
;
1782 TRACE("%p %s %u %u %p %u %p\n", Binding
, debugstr_w(ServerPrincName
),
1783 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, SecurityQos
);
1789 TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d",
1790 SecurityQos
->Version
, SecurityQos
->Capabilities
, SecurityQos
->IdentityTracking
, SecurityQos
->ImpersonationType
);
1791 if (SecurityQos
->Version
>= 2)
1793 const RPC_SECURITY_QOS_V2_W
*SecurityQos2
= (const RPC_SECURITY_QOS_V2_W
*)SecurityQos
;
1794 TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2
->AdditionalSecurityInfoType
);
1795 if (SecurityQos2
->AdditionalSecurityInfoType
== RPC_C_AUTHN_INFO_TYPE_HTTP
)
1796 TRACE(", { %p, 0x%x, %d, %d, %p, %s }",
1797 SecurityQos2
->u
.HttpCredentials
->TransportCredentials
,
1798 SecurityQos2
->u
.HttpCredentials
->Flags
,
1799 SecurityQos2
->u
.HttpCredentials
->AuthenticationTarget
,
1800 SecurityQos2
->u
.HttpCredentials
->NumberOfAuthnSchemes
,
1801 SecurityQos2
->u
.HttpCredentials
->AuthnSchemes
,
1802 debugstr_w(SecurityQos2
->u
.HttpCredentials
->ServerCertificateSubject
));
1805 status
= RpcQualityOfService_Create(SecurityQos
, TRUE
, &bind
->QOS
);
1806 if (status
!= RPC_S_OK
)
1811 if (bind
->QOS
) RpcQualityOfService_Release(bind
->QOS
);
1815 if (AuthnSvc
== RPC_C_AUTHN_DEFAULT
)
1816 AuthnSvc
= RPC_C_AUTHN_WINNT
;
1818 /* FIXME: the mapping should probably be retrieved using SSPI somehow */
1819 if (AuthnLevel
== RPC_C_AUTHN_LEVEL_DEFAULT
)
1820 AuthnLevel
= RPC_C_AUTHN_LEVEL_NONE
;
1822 if ((AuthnLevel
== RPC_C_AUTHN_LEVEL_NONE
) || (AuthnSvc
== RPC_C_AUTHN_NONE
))
1824 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1825 bind
->AuthInfo
= NULL
;
1829 if (AuthnLevel
> RPC_C_AUTHN_LEVEL_PKT_PRIVACY
)
1831 FIXME("unknown AuthnLevel %u\n", AuthnLevel
);
1832 return RPC_S_UNKNOWN_AUTHN_LEVEL
;
1835 /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */
1836 if (AuthzSvr
&& AuthnSvc
!= RPC_C_AUTHN_WINNT
)
1838 FIXME("unsupported AuthzSvr %u\n", AuthzSvr
);
1839 return RPC_S_UNKNOWN_AUTHZ_SERVICE
;
1842 r
= EnumerateSecurityPackagesW(&package_count
, &packages
);
1845 ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n", r
);
1846 return RPC_S_SEC_PKG_ERROR
;
1849 for (i
= 0; i
< package_count
; i
++)
1850 if (packages
[i
].wRPCID
== AuthnSvc
)
1853 if (i
== package_count
)
1855 FIXME("unsupported AuthnSvc %u\n", AuthnSvc
);
1856 FreeContextBuffer(packages
);
1857 return RPC_S_UNKNOWN_AUTHN_SERVICE
;
1860 TRACE("found package %s for service %u\n", debugstr_w(packages
[i
].Name
), AuthnSvc
);
1861 r
= AcquireCredentialsHandleW(NULL
, packages
[i
].Name
, SECPKG_CRED_OUTBOUND
, NULL
,
1862 AuthIdentity
, NULL
, NULL
, &cred
, &exp
);
1863 cbMaxToken
= packages
[i
].cbMaxToken
;
1864 FreeContextBuffer(packages
);
1865 if (r
== ERROR_SUCCESS
)
1867 RpcAuthInfo
*new_auth_info
;
1868 r
= RpcAuthInfo_Create(AuthnLevel
, AuthnSvc
, cred
, exp
, cbMaxToken
,
1869 AuthIdentity
, &new_auth_info
);
1872 new_auth_info
->server_principal_name
= RPCRT4_strdupW(ServerPrincName
);
1873 if (!ServerPrincName
|| new_auth_info
->server_principal_name
)
1875 if (bind
->AuthInfo
) RpcAuthInfo_Release(bind
->AuthInfo
);
1876 bind
->AuthInfo
= new_auth_info
;
1880 RpcAuthInfo_Release(new_auth_info
);
1881 r
= ERROR_OUTOFMEMORY
;
1885 FreeCredentialsHandle(&cred
);
1890 ERR("AcquireCredentialsHandleW failed with error 0x%08x\n", r
);
1891 return RPC_S_SEC_PKG_ERROR
;
1895 /***********************************************************************
1896 * RpcBindingSetAuthInfoA (RPCRT4.@)
1898 RPCRTAPI RPC_STATUS RPC_ENTRY
1899 RpcBindingSetAuthInfoA( RPC_BINDING_HANDLE Binding
, RPC_CSTR ServerPrincName
, ULONG AuthnLevel
,
1900 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
)
1902 TRACE("%p %s %u %u %p %u\n", Binding
, debugstr_a((const char*)ServerPrincName
),
1903 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
);
1904 return RpcBindingSetAuthInfoExA(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, NULL
);
1907 /***********************************************************************
1908 * RpcBindingSetAuthInfoW (RPCRT4.@)
1910 RPCRTAPI RPC_STATUS RPC_ENTRY
1911 RpcBindingSetAuthInfoW( RPC_BINDING_HANDLE Binding
, RPC_WSTR ServerPrincName
, ULONG AuthnLevel
,
1912 ULONG AuthnSvc
, RPC_AUTH_IDENTITY_HANDLE AuthIdentity
, ULONG AuthzSvr
)
1914 TRACE("%p %s %u %u %p %u\n", Binding
, debugstr_w(ServerPrincName
),
1915 AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
);
1916 return RpcBindingSetAuthInfoExW(Binding
, ServerPrincName
, AuthnLevel
, AuthnSvc
, AuthIdentity
, AuthzSvr
, NULL
);
1919 /***********************************************************************
1920 * RpcBindingSetOption (RPCRT4.@)
1922 RPC_STATUS WINAPI
RpcBindingSetOption(RPC_BINDING_HANDLE BindingHandle
, ULONG Option
, ULONG_PTR OptionValue
)
1924 FIXME("(%p, %d, %ld): stub\n", BindingHandle
, Option
, OptionValue
);