/* * RPC binding API * * Copyright 2001 Ove Kåven, TransGaming Technologies * Copyright 2003 Mike Hearn * Copyright 2004 Filip Navara * Copyright 2006 CodeWeavers * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */ #include #include #include #include #include "windef.h" #include "winbase.h" #include "winnls.h" #include "winerror.h" #include "winternl.h" #include "wine/unicode.h" #include "rpc.h" #include "rpcndr.h" #include "wine/debug.h" #include "rpc_binding.h" #include "rpc_assoc.h" WINE_DEFAULT_DEBUG_CHANNEL(rpc); LPSTR RPCRT4_strndupA(LPCSTR src, INT slen) { DWORD len; LPSTR s; if (!src) return NULL; if (slen == -1) slen = strlen(src); len = slen; s = HeapAlloc(GetProcessHeap(), 0, len+1); memcpy(s, src, len); s[len] = 0; return s; } LPSTR RPCRT4_strdupWtoA(LPCWSTR src) { DWORD len; LPSTR s; if (!src) return NULL; len = WideCharToMultiByte(CP_ACP, 0, src, -1, NULL, 0, NULL, NULL); s = HeapAlloc(GetProcessHeap(), 0, len); WideCharToMultiByte(CP_ACP, 0, src, -1, s, len, NULL, NULL); return s; } LPWSTR RPCRT4_strdupAtoW(LPCSTR src) { DWORD len; LPWSTR s; if (!src) return NULL; len = MultiByteToWideChar(CP_ACP, 0, src, -1, NULL, 0); s = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); MultiByteToWideChar(CP_ACP, 0, src, -1, s, len); return s; } static LPWSTR RPCRT4_strndupAtoW(LPCSTR src, INT slen) { DWORD len; LPWSTR s; if (!src) return NULL; len = MultiByteToWideChar(CP_ACP, 0, src, slen, NULL, 0); s = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); MultiByteToWideChar(CP_ACP, 0, src, slen, s, len); return s; } LPWSTR RPCRT4_strndupW(LPCWSTR src, INT slen) { DWORD len; LPWSTR s; if (!src) return NULL; if (slen == -1) slen = strlenW(src); len = slen; s = HeapAlloc(GetProcessHeap(), 0, (len+1)*sizeof(WCHAR)); memcpy(s, src, len*sizeof(WCHAR)); s[len] = 0; return s; } void RPCRT4_strfree(LPSTR src) { HeapFree(GetProcessHeap(), 0, src); } static RPC_STATUS RPCRT4_AllocBinding(RpcBinding** Binding, BOOL server) { RpcBinding* NewBinding; NewBinding = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcBinding)); NewBinding->refs = 1; NewBinding->server = server; *Binding = NewBinding; return RPC_S_OK; } static RPC_STATUS RPCRT4_CreateBindingA(RpcBinding** Binding, BOOL server, LPCSTR Protseq) { RpcBinding* NewBinding; RPCRT4_AllocBinding(&NewBinding, server); NewBinding->Protseq = RPCRT4_strdupA(Protseq); TRACE("binding: %p\n", NewBinding); *Binding = NewBinding; return RPC_S_OK; } static RPC_STATUS RPCRT4_CreateBindingW(RpcBinding** Binding, BOOL server, LPCWSTR Protseq) { RpcBinding* NewBinding; RPCRT4_AllocBinding(&NewBinding, server); NewBinding->Protseq = RPCRT4_strdupWtoA(Protseq); TRACE("binding: %p\n", NewBinding); *Binding = NewBinding; return RPC_S_OK; } static RPC_STATUS RPCRT4_CompleteBindingA(RpcBinding* Binding, LPCSTR NetworkAddr, LPCSTR Endpoint, LPCSTR NetworkOptions) { RPC_STATUS status; TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding, debugstr_a(NetworkAddr), debugstr_a(Endpoint), debugstr_a(NetworkOptions)); RPCRT4_strfree(Binding->NetworkAddr); Binding->NetworkAddr = RPCRT4_strdupA(NetworkAddr); RPCRT4_strfree(Binding->Endpoint); Binding->Endpoint = RPCRT4_strdupA(Endpoint); HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions); Binding->NetworkOptions = RPCRT4_strdupAtoW(NetworkOptions); /* only attempt to get an association if the binding is complete */ if (Endpoint && Endpoint[0] != '\0') { status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr, Binding->Endpoint, Binding->NetworkOptions, &Binding->Assoc); if (status != RPC_S_OK) return status; } return RPC_S_OK; } static RPC_STATUS RPCRT4_CompleteBindingW(RpcBinding* Binding, LPCWSTR NetworkAddr, LPCWSTR Endpoint, LPCWSTR NetworkOptions) { RPC_STATUS status; TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding, debugstr_w(NetworkAddr), debugstr_w(Endpoint), debugstr_w(NetworkOptions)); RPCRT4_strfree(Binding->NetworkAddr); Binding->NetworkAddr = RPCRT4_strdupWtoA(NetworkAddr); RPCRT4_strfree(Binding->Endpoint); Binding->Endpoint = RPCRT4_strdupWtoA(Endpoint); HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions); Binding->NetworkOptions = RPCRT4_strdupW(NetworkOptions); /* only attempt to get an association if the binding is complete */ if (Endpoint && Endpoint[0] != '\0') { status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr, Binding->Endpoint, Binding->NetworkOptions, &Binding->Assoc); if (status != RPC_S_OK) return status; } return RPC_S_OK; } RPC_STATUS RPCRT4_ResolveBinding(RpcBinding* Binding, LPCSTR Endpoint) { RPC_STATUS status; TRACE("(RpcBinding == ^%p, EndPoint == \"%s\"\n", Binding, Endpoint); RPCRT4_strfree(Binding->Endpoint); Binding->Endpoint = RPCRT4_strdupA(Endpoint); if (Binding->Assoc) RpcAssoc_Release(Binding->Assoc); Binding->Assoc = NULL; status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr, Binding->Endpoint, Binding->NetworkOptions, &Binding->Assoc); if (status != RPC_S_OK) return status; return RPC_S_OK; } RPC_STATUS RPCRT4_SetBindingObject(RpcBinding* Binding, const UUID* ObjectUuid) { TRACE("(*RpcBinding == ^%p, UUID == %s)\n", Binding, debugstr_guid(ObjectUuid)); if (ObjectUuid) Binding->ObjectUuid = *ObjectUuid; else UuidCreateNil(&Binding->ObjectUuid); return RPC_S_OK; } RPC_STATUS RPCRT4_MakeBinding(RpcBinding** Binding, RpcConnection* Connection) { RpcBinding* NewBinding; TRACE("(RpcBinding == ^%p, Connection == ^%p)\n", Binding, Connection); RPCRT4_AllocBinding(&NewBinding, Connection->server); NewBinding->Protseq = RPCRT4_strdupA(rpcrt4_conn_get_name(Connection)); NewBinding->NetworkAddr = RPCRT4_strdupA(Connection->NetworkAddr); NewBinding->Endpoint = RPCRT4_strdupA(Connection->Endpoint); NewBinding->FromConn = Connection; TRACE("binding: %p\n", NewBinding); *Binding = NewBinding; return RPC_S_OK; } void RPCRT4_AddRefBinding(RpcBinding* Binding) { InterlockedIncrement(&Binding->refs); } RPC_STATUS RPCRT4_ReleaseBinding(RpcBinding* Binding) { if (InterlockedDecrement(&Binding->refs)) return RPC_S_OK; TRACE("binding: %p\n", Binding); if (Binding->Assoc) RpcAssoc_Release(Binding->Assoc); RPCRT4_strfree(Binding->Endpoint); RPCRT4_strfree(Binding->NetworkAddr); RPCRT4_strfree(Binding->Protseq); HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions); HeapFree(GetProcessHeap(), 0, Binding->CookieAuth); if (Binding->AuthInfo) RpcAuthInfo_Release(Binding->AuthInfo); if (Binding->QOS) RpcQualityOfService_Release(Binding->QOS); HeapFree(GetProcessHeap(), 0, Binding); return RPC_S_OK; } RPC_STATUS RPCRT4_OpenBinding(RpcBinding* Binding, RpcConnection** Connection, const RPC_SYNTAX_IDENTIFIER *TransferSyntax, const RPC_SYNTAX_IDENTIFIER *InterfaceId) { TRACE("(Binding == ^%p)\n", Binding); if (!Binding->server) { return RpcAssoc_GetClientConnection(Binding->Assoc, InterfaceId, TransferSyntax, Binding->AuthInfo, Binding->QOS, Binding->CookieAuth, Connection); } else { /* we already have a connection with acceptable binding, so use it */ if (Binding->FromConn) { *Connection = Binding->FromConn; return RPC_S_OK; } else { ERR("no connection in binding\n"); return RPC_S_INTERNAL_ERROR; } } } RPC_STATUS RPCRT4_CloseBinding(RpcBinding* Binding, RpcConnection* Connection) { TRACE("(Binding == ^%p)\n", Binding); if (!Connection) return RPC_S_OK; if (Binding->server) { /* don't destroy a connection that is cached in the binding */ if (Binding->FromConn == Connection) return RPC_S_OK; return RPCRT4_ReleaseConnection(Connection); } else { RpcAssoc_ReleaseIdleConnection(Binding->Assoc, Connection); return RPC_S_OK; } } static LPSTR RPCRT4_strconcatA(LPSTR dst, LPCSTR src) { DWORD len = strlen(dst), slen = strlen(src); LPSTR ndst = HeapReAlloc(GetProcessHeap(), 0, dst, (len+slen+2)*sizeof(CHAR)); if (!ndst) { HeapFree(GetProcessHeap(), 0, dst); return NULL; } ndst[len] = ','; memcpy(ndst+len+1, src, slen+1); return ndst; } static LPWSTR RPCRT4_strconcatW(LPWSTR dst, LPCWSTR src) { DWORD len = strlenW(dst), slen = strlenW(src); LPWSTR ndst = HeapReAlloc(GetProcessHeap(), 0, dst, (len+slen+2)*sizeof(WCHAR)); if (!ndst) { HeapFree(GetProcessHeap(), 0, dst); return NULL; } ndst[len] = ','; memcpy(ndst+len+1, src, (slen+1)*sizeof(WCHAR)); return ndst; } /* Copies the escaped version of a component into a string binding. * Note: doesn't nul-terminate the string */ static RPC_CSTR escape_string_binding_component(RPC_CSTR string_binding, const unsigned char *component) { for (; *component; component++) { switch (*component) { case '@': case ':': case '[': case ']': case '\\': *string_binding++ = '\\'; *string_binding++ = *component; break; default: *string_binding++ = *component; break; } } return string_binding; } static RPC_WSTR escape_string_binding_componentW(RPC_WSTR string_binding, const WCHAR *component) { for (; *component; component++) { switch (*component) { case '@': case ':': case '[': case ']': case '\\': *string_binding++ = '\\'; *string_binding++ = *component; break; default: *string_binding++ = *component; break; } } return string_binding; } static const unsigned char *string_binding_find_delimiter( const unsigned char *string_binding, unsigned char delim) { const unsigned char *next; for (next = string_binding; *next; next++) { if (*next == '\\') { next++; continue; } if (*next == delim) return next; } return NULL; } static const WCHAR *string_binding_find_delimiterW( const WCHAR *string_binding, WCHAR delim) { const WCHAR *next; for (next = string_binding; *next; next++) { if (*next == '\\') { next++; continue; } if (*next == delim) return next; } return NULL; } static RPC_CSTR unescape_string_binding_component( const unsigned char *string_binding, int len) { RPC_CSTR component, p; if (len == -1) len = strlen((const char *)string_binding); component = HeapAlloc(GetProcessHeap(), 0, (len + 1) * sizeof(*component)); if (!component) return NULL; for (p = component; len > 0; string_binding++, len--) { if (*string_binding == '\\') { string_binding++; len--; *p++ = *string_binding; } else { *p++ = *string_binding; } } *p = '\0'; return component; } static RPC_WSTR unescape_string_binding_componentW( const WCHAR *string_binding, int len) { RPC_WSTR component, p; if (len == -1) len = strlenW(string_binding); component = HeapAlloc(GetProcessHeap(), 0, (len + 1) * sizeof(*component)); if (!component) return NULL; for (p = component; len > 0; string_binding++, len--) { if (*string_binding == '\\') { string_binding++; len--; *p++ = *string_binding; } else { *p++ = *string_binding; } } *p = '\0'; return component; } /*********************************************************************** * RpcStringBindingComposeA (RPCRT4.@) */ RPC_STATUS WINAPI RpcStringBindingComposeA(RPC_CSTR ObjUuid, RPC_CSTR Protseq, RPC_CSTR NetworkAddr, RPC_CSTR Endpoint, RPC_CSTR Options, RPC_CSTR *StringBinding ) { DWORD len = 1; RPC_CSTR data; TRACE( "(%s,%s,%s,%s,%s,%p)\n", debugstr_a( (char*)ObjUuid ), debugstr_a( (char*)Protseq ), debugstr_a( (char*)NetworkAddr ), debugstr_a( (char*)Endpoint ), debugstr_a( (char*)Options ), StringBinding ); /* overestimate for each component for escaping of delimiters */ if (ObjUuid && *ObjUuid) len += strlen((char*)ObjUuid) * 2 + 1; if (Protseq && *Protseq) len += strlen((char*)Protseq) * 2 + 1; if (NetworkAddr && *NetworkAddr) len += strlen((char*)NetworkAddr) * 2; if (Endpoint && *Endpoint) len += strlen((char*)Endpoint) * 2 + 2; if (Options && *Options) len += strlen((char*)Options) * 2 + 2; data = HeapAlloc(GetProcessHeap(), 0, len); *StringBinding = data; if (ObjUuid && *ObjUuid) { data = escape_string_binding_component(data, ObjUuid); *data++ = '@'; } if (Protseq && *Protseq) { data = escape_string_binding_component(data, Protseq); *data++ = ':'; } if (NetworkAddr && *NetworkAddr) data = escape_string_binding_component(data, NetworkAddr); if ((Endpoint && *Endpoint) || (Options && *Options)) { *data++ = '['; if (Endpoint && *Endpoint) { data = escape_string_binding_component(data, Endpoint); if (Options && *Options) *data++ = ','; } if (Options && *Options) { data = escape_string_binding_component(data, Options); } *data++ = ']'; } *data = 0; return RPC_S_OK; } /*********************************************************************** * RpcStringBindingComposeW (RPCRT4.@) */ RPC_STATUS WINAPI RpcStringBindingComposeW( RPC_WSTR ObjUuid, RPC_WSTR Protseq, RPC_WSTR NetworkAddr, RPC_WSTR Endpoint, RPC_WSTR Options, RPC_WSTR* StringBinding ) { DWORD len = 1; RPC_WSTR data; TRACE("(%s,%s,%s,%s,%s,%p)\n", debugstr_w( ObjUuid ), debugstr_w( Protseq ), debugstr_w( NetworkAddr ), debugstr_w( Endpoint ), debugstr_w( Options ), StringBinding); /* overestimate for each component for escaping of delimiters */ if (ObjUuid && *ObjUuid) len += strlenW(ObjUuid) * 2 + 1; if (Protseq && *Protseq) len += strlenW(Protseq) * 2 + 1; if (NetworkAddr && *NetworkAddr) len += strlenW(NetworkAddr) * 2; if (Endpoint && *Endpoint) len += strlenW(Endpoint) * 2 + 2; if (Options && *Options) len += strlenW(Options) * 2 + 2; data = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); *StringBinding = data; if (ObjUuid && *ObjUuid) { data = escape_string_binding_componentW(data, ObjUuid); *data++ = '@'; } if (Protseq && *Protseq) { data = escape_string_binding_componentW(data, Protseq); *data++ = ':'; } if (NetworkAddr && *NetworkAddr) { data = escape_string_binding_componentW(data, NetworkAddr); } if ((Endpoint && *Endpoint) || (Options && *Options)) { *data++ = '['; if (Endpoint && *Endpoint) { data = escape_string_binding_componentW(data, Endpoint); if (Options && *Options) *data++ = ','; } if (Options && *Options) { data = escape_string_binding_componentW(data, Options); } *data++ = ']'; } *data = 0; return RPC_S_OK; } /*********************************************************************** * RpcStringBindingParseA (RPCRT4.@) */ RPC_STATUS WINAPI RpcStringBindingParseA( RPC_CSTR StringBinding, RPC_CSTR *ObjUuid, RPC_CSTR *Protseq, RPC_CSTR *NetworkAddr, RPC_CSTR *Endpoint, RPC_CSTR *Options) { const unsigned char *data, *next; static const char ep_opt[] = "endpoint="; BOOL endpoint_already_found = FALSE; TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_a((char*)StringBinding), ObjUuid, Protseq, NetworkAddr, Endpoint, Options); if (ObjUuid) *ObjUuid = NULL; if (Protseq) *Protseq = NULL; if (NetworkAddr) *NetworkAddr = NULL; if (Endpoint) *Endpoint = NULL; if (Options) *Options = NULL; data = StringBinding; next = string_binding_find_delimiter(data, '@'); if (next) { UUID uuid; RPC_STATUS status; RPC_CSTR str_uuid = unescape_string_binding_component(data, next - data); status = UuidFromStringA(str_uuid, &uuid); if (status != RPC_S_OK) { HeapFree(GetProcessHeap(), 0, str_uuid); return status; } if (ObjUuid) *ObjUuid = str_uuid; else HeapFree(GetProcessHeap(), 0, str_uuid); data = next+1; } next = string_binding_find_delimiter(data, ':'); if (next) { if (Protseq) *Protseq = unescape_string_binding_component(data, next - data); data = next+1; } next = string_binding_find_delimiter(data, '['); if (next) { const unsigned char *close; RPC_CSTR opt; if (NetworkAddr) *NetworkAddr = unescape_string_binding_component(data, next - data); data = next+1; close = string_binding_find_delimiter(data, ']'); if (!close) goto fail; /* tokenize options */ while (data < close) { next = string_binding_find_delimiter(data, ','); if (!next || next > close) next = close; /* FIXME: this is kind of inefficient */ opt = unescape_string_binding_component(data, next - data); data = next+1; /* parse option */ next = string_binding_find_delimiter(opt, '='); if (!next) { /* not an option, must be an endpoint */ if (endpoint_already_found) goto fail; if (Endpoint) *Endpoint = opt; else HeapFree(GetProcessHeap(), 0, opt); endpoint_already_found = TRUE; } else { if (strncmp((const char *)opt, ep_opt, strlen(ep_opt)) == 0) { /* endpoint option */ if (endpoint_already_found) goto fail; if (Endpoint) *Endpoint = unescape_string_binding_component(next+1, -1); HeapFree(GetProcessHeap(), 0, opt); endpoint_already_found = TRUE; } else { /* network option */ if (Options) { if (*Options) { /* FIXME: this is kind of inefficient */ *Options = (unsigned char*) RPCRT4_strconcatA( (char*)*Options, (char *)opt); HeapFree(GetProcessHeap(), 0, opt); } else *Options = opt; } else HeapFree(GetProcessHeap(), 0, opt); } } } data = close+1; if (*data) goto fail; } else if (NetworkAddr) *NetworkAddr = unescape_string_binding_component(data, -1); return RPC_S_OK; fail: if (ObjUuid) RpcStringFreeA(ObjUuid); if (Protseq) RpcStringFreeA(Protseq); if (NetworkAddr) RpcStringFreeA(NetworkAddr); if (Endpoint) RpcStringFreeA(Endpoint); if (Options) RpcStringFreeA(Options); return RPC_S_INVALID_STRING_BINDING; } /*********************************************************************** * RpcStringBindingParseW (RPCRT4.@) */ RPC_STATUS WINAPI RpcStringBindingParseW( RPC_WSTR StringBinding, RPC_WSTR *ObjUuid, RPC_WSTR *Protseq, RPC_WSTR *NetworkAddr, RPC_WSTR *Endpoint, RPC_WSTR *Options) { const WCHAR *data, *next; static const WCHAR ep_opt[] = {'e','n','d','p','o','i','n','t','=',0}; BOOL endpoint_already_found = FALSE; TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_w(StringBinding), ObjUuid, Protseq, NetworkAddr, Endpoint, Options); if (ObjUuid) *ObjUuid = NULL; if (Protseq) *Protseq = NULL; if (NetworkAddr) *NetworkAddr = NULL; if (Endpoint) *Endpoint = NULL; if (Options) *Options = NULL; data = StringBinding; next = string_binding_find_delimiterW(data, '@'); if (next) { UUID uuid; RPC_STATUS status; RPC_WSTR str_uuid = unescape_string_binding_componentW(data, next - data); status = UuidFromStringW(str_uuid, &uuid); if (status != RPC_S_OK) { HeapFree(GetProcessHeap(), 0, str_uuid); return status; } if (ObjUuid) *ObjUuid = str_uuid; else HeapFree(GetProcessHeap(), 0, str_uuid); data = next+1; } next = string_binding_find_delimiterW(data, ':'); if (next) { if (Protseq) *Protseq = unescape_string_binding_componentW(data, next - data); data = next+1; } next = string_binding_find_delimiterW(data, '['); if (next) { const WCHAR *close; RPC_WSTR opt; if (NetworkAddr) *NetworkAddr = unescape_string_binding_componentW(data, next - data); data = next+1; close = string_binding_find_delimiterW(data, ']'); if (!close) goto fail; /* tokenize options */ while (data < close) { next = string_binding_find_delimiterW(data, ','); if (!next || next > close) next = close; /* FIXME: this is kind of inefficient */ opt = unescape_string_binding_componentW(data, next - data); data = next+1; /* parse option */ next = string_binding_find_delimiterW(opt, '='); if (!next) { /* not an option, must be an endpoint */ if (endpoint_already_found) goto fail; if (Endpoint) *Endpoint = opt; else HeapFree(GetProcessHeap(), 0, opt); endpoint_already_found = TRUE; } else { if (strncmpW(opt, ep_opt, strlenW(ep_opt)) == 0) { /* endpoint option */ if (endpoint_already_found) goto fail; if (Endpoint) *Endpoint = unescape_string_binding_componentW(next+1, -1); HeapFree(GetProcessHeap(), 0, opt); endpoint_already_found = TRUE; } else { /* network option */ if (Options) { if (*Options) { /* FIXME: this is kind of inefficient */ *Options = RPCRT4_strconcatW(*Options, opt); HeapFree(GetProcessHeap(), 0, opt); } else *Options = opt; } else HeapFree(GetProcessHeap(), 0, opt); } } } data = close+1; if (*data) goto fail; } else if (NetworkAddr) *NetworkAddr = unescape_string_binding_componentW(data, -1); return RPC_S_OK; fail: if (ObjUuid) RpcStringFreeW(ObjUuid); if (Protseq) RpcStringFreeW(Protseq); if (NetworkAddr) RpcStringFreeW(NetworkAddr); if (Endpoint) RpcStringFreeW(Endpoint); if (Options) RpcStringFreeW(Options); return RPC_S_INVALID_STRING_BINDING; } /*********************************************************************** * RpcBindingFree (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingFree( RPC_BINDING_HANDLE* Binding ) { RPC_STATUS status; TRACE("(%p) = %p\n", Binding, *Binding); if (*Binding) status = RPCRT4_ReleaseBinding(*Binding); else status = RPC_S_INVALID_BINDING; if (status == RPC_S_OK) *Binding = NULL; return status; } /*********************************************************************** * RpcBindingVectorFree (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingVectorFree( RPC_BINDING_VECTOR** BindingVector ) { ULONG c; TRACE("(%p)\n", BindingVector); for (c=0; c<(*BindingVector)->Count; c++) RpcBindingFree(&(*BindingVector)->BindingH[c]); HeapFree(GetProcessHeap(), 0, *BindingVector); *BindingVector = NULL; return RPC_S_OK; } /*********************************************************************** * RpcBindingInqObject (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingInqObject( RPC_BINDING_HANDLE Binding, UUID* ObjectUuid ) { RpcBinding* bind = Binding; TRACE("(%p,%p) = %s\n", Binding, ObjectUuid, debugstr_guid(&bind->ObjectUuid)); *ObjectUuid = bind->ObjectUuid; return RPC_S_OK; } /*********************************************************************** * RpcBindingSetObject (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingSetObject( RPC_BINDING_HANDLE Binding, UUID* ObjectUuid ) { RpcBinding* bind = Binding; TRACE("(%p,%s)\n", Binding, debugstr_guid(ObjectUuid)); if (bind->server) return RPC_S_WRONG_KIND_OF_BINDING; return RPCRT4_SetBindingObject(Binding, ObjectUuid); } /*********************************************************************** * RpcBindingFromStringBindingA (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingFromStringBindingA( RPC_CSTR StringBinding, RPC_BINDING_HANDLE* Binding ) { RPC_STATUS ret; RpcBinding* bind = NULL; RPC_CSTR ObjectUuid, Protseq, NetworkAddr, Endpoint, Options; UUID Uuid; TRACE("(%s,%p)\n", debugstr_a((char*)StringBinding), Binding); ret = RpcStringBindingParseA(StringBinding, &ObjectUuid, &Protseq, &NetworkAddr, &Endpoint, &Options); if (ret != RPC_S_OK) return ret; ret = UuidFromStringA(ObjectUuid, &Uuid); if (ret == RPC_S_OK) ret = RPCRT4_CreateBindingA(&bind, FALSE, (char*)Protseq); if (ret == RPC_S_OK) { ret = RPCRT4_SetBindingObject(bind, &Uuid); if (ret == RPC_S_OK) ret = RPCRT4_CompleteBindingA(bind, (char*)NetworkAddr, (char*)Endpoint, (char*)Options); if (ret == RPC_S_OK) *Binding = (RPC_BINDING_HANDLE)bind; else RPCRT4_ReleaseBinding(bind); } RpcStringFreeA(&Options); RpcStringFreeA(&Endpoint); RpcStringFreeA(&NetworkAddr); RpcStringFreeA(&Protseq); RpcStringFreeA(&ObjectUuid); return ret; } /*********************************************************************** * RpcBindingFromStringBindingW (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingFromStringBindingW( RPC_WSTR StringBinding, RPC_BINDING_HANDLE* Binding ) { RPC_STATUS ret; RpcBinding* bind = NULL; RPC_WSTR ObjectUuid, Protseq, NetworkAddr, Endpoint, Options; UUID Uuid; TRACE("(%s,%p)\n", debugstr_w(StringBinding), Binding); ret = RpcStringBindingParseW(StringBinding, &ObjectUuid, &Protseq, &NetworkAddr, &Endpoint, &Options); if (ret != RPC_S_OK) return ret; ret = UuidFromStringW(ObjectUuid, &Uuid); if (ret == RPC_S_OK) ret = RPCRT4_CreateBindingW(&bind, FALSE, Protseq); if (ret == RPC_S_OK) { ret = RPCRT4_SetBindingObject(bind, &Uuid); if (ret == RPC_S_OK) ret = RPCRT4_CompleteBindingW(bind, NetworkAddr, Endpoint, Options); if (ret == RPC_S_OK) *Binding = (RPC_BINDING_HANDLE)bind; else RPCRT4_ReleaseBinding(bind); } RpcStringFreeW(&Options); RpcStringFreeW(&Endpoint); RpcStringFreeW(&NetworkAddr); RpcStringFreeW(&Protseq); RpcStringFreeW(&ObjectUuid); return ret; } /*********************************************************************** * RpcBindingToStringBindingA (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingToStringBindingA( RPC_BINDING_HANDLE Binding, RPC_CSTR *StringBinding ) { RPC_STATUS ret; RpcBinding* bind = Binding; RPC_CSTR ObjectUuid; TRACE("(%p,%p)\n", Binding, StringBinding); if (UuidIsNil(&bind->ObjectUuid, &ret)) ObjectUuid = NULL; else { ret = UuidToStringA(&bind->ObjectUuid, &ObjectUuid); if (ret != RPC_S_OK) return ret; } ret = RpcStringBindingComposeA(ObjectUuid, (unsigned char*)bind->Protseq, (unsigned char*) bind->NetworkAddr, (unsigned char*) bind->Endpoint, NULL, StringBinding); RpcStringFreeA(&ObjectUuid); return ret; } /*********************************************************************** * RpcBindingToStringBindingW (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingToStringBindingW( RPC_BINDING_HANDLE Binding, RPC_WSTR *StringBinding ) { RPC_STATUS ret; unsigned char *str = NULL; TRACE("(%p,%p)\n", Binding, StringBinding); ret = RpcBindingToStringBindingA(Binding, &str); *StringBinding = RPCRT4_strdupAtoW((char*)str); RpcStringFreeA(&str); return ret; } /*********************************************************************** * I_RpcBindingInqTransportType (RPCRT4.@) */ RPC_STATUS WINAPI I_RpcBindingInqTransportType( RPC_BINDING_HANDLE Binding, unsigned int * Type ) { FIXME( "(%p,%p): stub\n", Binding, Type); *Type = TRANSPORT_TYPE_LPC; return RPC_S_OK; } /*********************************************************************** * I_RpcBindingSetAsync (RPCRT4.@) * NOTES * Exists in win9x and winNT, but with different number of arguments * (9x version has 3 arguments, NT has 2). */ RPC_STATUS WINAPI I_RpcBindingSetAsync( RPC_BINDING_HANDLE Binding, RPC_BLOCKING_FN BlockingFn) { RpcBinding* bind = Binding; TRACE( "(%p,%p): stub\n", Binding, BlockingFn ); bind->BlockingFn = BlockingFn; return RPC_S_OK; } /*********************************************************************** * RpcBindingCopy (RPCRT4.@) */ RPC_STATUS RPC_ENTRY RpcBindingCopy( RPC_BINDING_HANDLE SourceBinding, RPC_BINDING_HANDLE* DestinationBinding) { RpcBinding *DestBinding; RpcBinding *SrcBinding = SourceBinding; RPC_STATUS status; TRACE("(%p, %p)\n", SourceBinding, DestinationBinding); status = RPCRT4_AllocBinding(&DestBinding, SrcBinding->server); if (status != RPC_S_OK) return status; DestBinding->ObjectUuid = SrcBinding->ObjectUuid; DestBinding->BlockingFn = SrcBinding->BlockingFn; DestBinding->Protseq = RPCRT4_strndupA(SrcBinding->Protseq, -1); DestBinding->NetworkAddr = RPCRT4_strndupA(SrcBinding->NetworkAddr, -1); DestBinding->Endpoint = RPCRT4_strndupA(SrcBinding->Endpoint, -1); DestBinding->NetworkOptions = RPCRT4_strdupW(SrcBinding->NetworkOptions); DestBinding->CookieAuth = RPCRT4_strdupW(SrcBinding->CookieAuth); if (SrcBinding->Assoc) SrcBinding->Assoc->refs++; DestBinding->Assoc = SrcBinding->Assoc; if (SrcBinding->AuthInfo) RpcAuthInfo_AddRef(SrcBinding->AuthInfo); DestBinding->AuthInfo = SrcBinding->AuthInfo; if (SrcBinding->QOS) RpcQualityOfService_AddRef(SrcBinding->QOS); DestBinding->QOS = SrcBinding->QOS; *DestinationBinding = DestBinding; return RPC_S_OK; } /*********************************************************************** * RpcBindingReset (RPCRT4.@) */ RPC_STATUS RPC_ENTRY RpcBindingReset(RPC_BINDING_HANDLE Binding) { RpcBinding *bind = Binding; TRACE("(%p)\n", Binding); RPCRT4_strfree(bind->Endpoint); bind->Endpoint = NULL; if (bind->Assoc) RpcAssoc_Release(bind->Assoc); bind->Assoc = NULL; return RPC_S_OK; } /*********************************************************************** * RpcImpersonateClient (RPCRT4.@) * * Impersonates the client connected via a binding handle so that security * checks are done in the context of the client. * * PARAMS * BindingHandle [I] Handle to the binding to the client. * * RETURNS * Success: RPS_S_OK. * Failure: RPC_STATUS value. * * NOTES * * If BindingHandle is NULL then the function impersonates the client * connected to the binding handle of the current thread. */ RPC_STATUS WINAPI RpcImpersonateClient(RPC_BINDING_HANDLE BindingHandle) { RpcBinding *bind; TRACE("(%p)\n", BindingHandle); if (!BindingHandle) BindingHandle = I_RpcGetCurrentCallHandle(); if (!BindingHandle) return RPC_S_INVALID_BINDING; bind = BindingHandle; if (bind->FromConn) return rpcrt4_conn_impersonate_client(bind->FromConn); return RPC_S_WRONG_KIND_OF_BINDING; } /*********************************************************************** * RpcRevertToSelfEx (RPCRT4.@) * * Stops impersonating the client connected to the binding handle so that security * checks are no longer done in the context of the client. * * PARAMS * BindingHandle [I] Handle to the binding to the client. * * RETURNS * Success: RPS_S_OK. * Failure: RPC_STATUS value. * * NOTES * * If BindingHandle is NULL then the function stops impersonating the client * connected to the binding handle of the current thread. */ RPC_STATUS WINAPI RpcRevertToSelfEx(RPC_BINDING_HANDLE BindingHandle) { RpcBinding *bind; TRACE("(%p)\n", BindingHandle); if (!BindingHandle) BindingHandle = I_RpcGetCurrentCallHandle(); if (!BindingHandle) return RPC_S_INVALID_BINDING; bind = BindingHandle; if (bind->FromConn) return rpcrt4_conn_revert_to_self(bind->FromConn); return RPC_S_WRONG_KIND_OF_BINDING; } static inline BOOL has_nt_auth_identity(ULONG AuthnLevel) { switch (AuthnLevel) { case RPC_C_AUTHN_GSS_NEGOTIATE: case RPC_C_AUTHN_WINNT: case RPC_C_AUTHN_GSS_KERBEROS: return TRUE; default: return FALSE; } } RPC_STATUS RpcAuthInfo_Create(ULONG AuthnLevel, ULONG AuthnSvc, CredHandle cred, TimeStamp exp, ULONG cbMaxToken, RPC_AUTH_IDENTITY_HANDLE identity, RpcAuthInfo **ret) { RpcAuthInfo *AuthInfo = HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo)); if (!AuthInfo) return RPC_S_OUT_OF_MEMORY; AuthInfo->refs = 1; AuthInfo->AuthnLevel = AuthnLevel; AuthInfo->AuthnSvc = AuthnSvc; AuthInfo->cred = cred; AuthInfo->exp = exp; AuthInfo->cbMaxToken = cbMaxToken; AuthInfo->identity = identity; AuthInfo->server_principal_name = NULL; /* duplicate the SEC_WINNT_AUTH_IDENTITY structure, if applicable, to * enable better matching in RpcAuthInfo_IsEqual */ if (identity && has_nt_auth_identity(AuthnSvc)) { const SEC_WINNT_AUTH_IDENTITY_W *nt_identity = identity; AuthInfo->nt_identity = HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo->nt_identity)); if (!AuthInfo->nt_identity) { HeapFree(GetProcessHeap(), 0, AuthInfo); return RPC_S_OUT_OF_MEMORY; } AuthInfo->nt_identity->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE; if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE) AuthInfo->nt_identity->User = RPCRT4_strndupW(nt_identity->User, nt_identity->UserLength); else AuthInfo->nt_identity->User = RPCRT4_strndupAtoW((const char *)nt_identity->User, nt_identity->UserLength); AuthInfo->nt_identity->UserLength = nt_identity->UserLength; if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE) AuthInfo->nt_identity->Domain = RPCRT4_strndupW(nt_identity->Domain, nt_identity->DomainLength); else AuthInfo->nt_identity->Domain = RPCRT4_strndupAtoW((const char *)nt_identity->Domain, nt_identity->DomainLength); AuthInfo->nt_identity->DomainLength = nt_identity->DomainLength; if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE) AuthInfo->nt_identity->Password = RPCRT4_strndupW(nt_identity->Password, nt_identity->PasswordLength); else AuthInfo->nt_identity->Password = RPCRT4_strndupAtoW((const char *)nt_identity->Password, nt_identity->PasswordLength); AuthInfo->nt_identity->PasswordLength = nt_identity->PasswordLength; if ((nt_identity->User && !AuthInfo->nt_identity->User) || (nt_identity->Domain && !AuthInfo->nt_identity->Domain) || (nt_identity->Password && !AuthInfo->nt_identity->Password)) { HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->User); HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Domain); HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Password); HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity); HeapFree(GetProcessHeap(), 0, AuthInfo); return RPC_S_OUT_OF_MEMORY; } } else AuthInfo->nt_identity = NULL; *ret = AuthInfo; return RPC_S_OK; } ULONG RpcAuthInfo_AddRef(RpcAuthInfo *AuthInfo) { return InterlockedIncrement(&AuthInfo->refs); } ULONG RpcAuthInfo_Release(RpcAuthInfo *AuthInfo) { ULONG refs = InterlockedDecrement(&AuthInfo->refs); if (!refs) { FreeCredentialsHandle(&AuthInfo->cred); if (AuthInfo->nt_identity) { HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->User); HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Domain); HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Password); HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity); } HeapFree(GetProcessHeap(), 0, AuthInfo->server_principal_name); HeapFree(GetProcessHeap(), 0, AuthInfo); } return refs; } BOOL RpcAuthInfo_IsEqual(const RpcAuthInfo *AuthInfo1, const RpcAuthInfo *AuthInfo2) { if (AuthInfo1 == AuthInfo2) return TRUE; if (!AuthInfo1 || !AuthInfo2) return FALSE; if ((AuthInfo1->AuthnLevel != AuthInfo2->AuthnLevel) || (AuthInfo1->AuthnSvc != AuthInfo2->AuthnSvc)) return FALSE; if (AuthInfo1->identity == AuthInfo2->identity) return TRUE; if (!AuthInfo1->identity || !AuthInfo2->identity) return FALSE; if (has_nt_auth_identity(AuthInfo1->AuthnSvc)) { const SEC_WINNT_AUTH_IDENTITY_W *identity1 = AuthInfo1->nt_identity; const SEC_WINNT_AUTH_IDENTITY_W *identity2 = AuthInfo2->nt_identity; /* compare user names */ if (identity1->UserLength != identity2->UserLength || memcmp(identity1->User, identity2->User, identity1->UserLength)) return FALSE; /* compare domain names */ if (identity1->DomainLength != identity2->DomainLength || memcmp(identity1->Domain, identity2->Domain, identity1->DomainLength)) return FALSE; /* compare passwords */ if (identity1->PasswordLength != identity2->PasswordLength || memcmp(identity1->Password, identity2->Password, identity1->PasswordLength)) return FALSE; } else return FALSE; return TRUE; } static RPC_STATUS RpcQualityOfService_Create(const RPC_SECURITY_QOS *qos_src, BOOL unicode, RpcQualityOfService **qos_dst) { RpcQualityOfService *qos = HeapAlloc(GetProcessHeap(), 0, sizeof(*qos)); if (!qos) return RPC_S_OUT_OF_RESOURCES; qos->refs = 1; qos->qos = HeapAlloc(GetProcessHeap(), 0, sizeof(*qos->qos)); if (!qos->qos) goto error; qos->qos->Version = qos_src->Version; qos->qos->Capabilities = qos_src->Capabilities; qos->qos->IdentityTracking = qos_src->IdentityTracking; qos->qos->ImpersonationType = qos_src->ImpersonationType; qos->qos->AdditionalSecurityInfoType = 0; if (qos_src->Version >= 2) { const RPC_SECURITY_QOS_V2_W *qos_src2 = (const RPC_SECURITY_QOS_V2_W *)qos_src; qos->qos->AdditionalSecurityInfoType = qos_src2->AdditionalSecurityInfoType; if (qos_src2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) { const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials_src = qos_src2->u.HttpCredentials; RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials_dst; http_credentials_dst = HeapAlloc(GetProcessHeap(), 0, sizeof(*http_credentials_dst)); qos->qos->u.HttpCredentials = http_credentials_dst; if (!http_credentials_dst) goto error; http_credentials_dst->TransportCredentials = NULL; http_credentials_dst->Flags = http_credentials_src->Flags; http_credentials_dst->AuthenticationTarget = http_credentials_src->AuthenticationTarget; http_credentials_dst->NumberOfAuthnSchemes = http_credentials_src->NumberOfAuthnSchemes; http_credentials_dst->AuthnSchemes = NULL; http_credentials_dst->ServerCertificateSubject = NULL; if (http_credentials_src->TransportCredentials) { SEC_WINNT_AUTH_IDENTITY_W *cred_dst; cred_dst = http_credentials_dst->TransportCredentials = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*cred_dst)); if (!cred_dst) goto error; cred_dst->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE; if (unicode) { const SEC_WINNT_AUTH_IDENTITY_W *cred_src = http_credentials_src->TransportCredentials; cred_dst->UserLength = cred_src->UserLength; cred_dst->PasswordLength = cred_src->PasswordLength; cred_dst->DomainLength = cred_src->DomainLength; cred_dst->User = RPCRT4_strndupW(cred_src->User, cred_src->UserLength); cred_dst->Password = RPCRT4_strndupW(cred_src->Password, cred_src->PasswordLength); cred_dst->Domain = RPCRT4_strndupW(cred_src->Domain, cred_src->DomainLength); } else { const SEC_WINNT_AUTH_IDENTITY_A *cred_src = (const SEC_WINNT_AUTH_IDENTITY_A *)http_credentials_src->TransportCredentials; cred_dst->UserLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->User, cred_src->UserLength, NULL, 0); cred_dst->DomainLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Domain, cred_src->DomainLength, NULL, 0); cred_dst->PasswordLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Password, cred_src->PasswordLength, NULL, 0); cred_dst->User = HeapAlloc(GetProcessHeap(), 0, cred_dst->UserLength * sizeof(WCHAR)); cred_dst->Password = HeapAlloc(GetProcessHeap(), 0, cred_dst->PasswordLength * sizeof(WCHAR)); cred_dst->Domain = HeapAlloc(GetProcessHeap(), 0, cred_dst->DomainLength * sizeof(WCHAR)); if (!cred_dst->Password || !cred_dst->Domain) goto error; MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->User, cred_src->UserLength, cred_dst->User, cred_dst->UserLength); MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Domain, cred_src->DomainLength, cred_dst->Domain, cred_dst->DomainLength); MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Password, cred_src->PasswordLength, cred_dst->Password, cred_dst->PasswordLength); } } if (http_credentials_src->NumberOfAuthnSchemes) { http_credentials_dst->AuthnSchemes = HeapAlloc(GetProcessHeap(), 0, http_credentials_src->NumberOfAuthnSchemes * sizeof(*http_credentials_dst->AuthnSchemes)); if (!http_credentials_dst->AuthnSchemes) goto error; memcpy(http_credentials_dst->AuthnSchemes, http_credentials_src->AuthnSchemes, http_credentials_src->NumberOfAuthnSchemes * sizeof(*http_credentials_dst->AuthnSchemes)); } if (http_credentials_src->ServerCertificateSubject) { if (unicode) http_credentials_dst->ServerCertificateSubject = RPCRT4_strndupW(http_credentials_src->ServerCertificateSubject, strlenW(http_credentials_src->ServerCertificateSubject)); else http_credentials_dst->ServerCertificateSubject = RPCRT4_strdupAtoW((char *)http_credentials_src->ServerCertificateSubject); if (!http_credentials_dst->ServerCertificateSubject) goto error; } } } *qos_dst = qos; return RPC_S_OK; error: if (qos->qos) { if (qos->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP && qos->qos->u.HttpCredentials) { if (qos->qos->u.HttpCredentials->TransportCredentials) { HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->User); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Domain); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Password); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials); } HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->AuthnSchemes); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->ServerCertificateSubject); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials); } HeapFree(GetProcessHeap(), 0, qos->qos); } HeapFree(GetProcessHeap(), 0, qos); return RPC_S_OUT_OF_RESOURCES; } ULONG RpcQualityOfService_AddRef(RpcQualityOfService *qos) { return InterlockedIncrement(&qos->refs); } ULONG RpcQualityOfService_Release(RpcQualityOfService *qos) { ULONG refs = InterlockedDecrement(&qos->refs); if (!refs) { if (qos->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) { if (qos->qos->u.HttpCredentials->TransportCredentials) { HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->User); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Domain); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Password); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials); } HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->AuthnSchemes); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->ServerCertificateSubject); HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials); } HeapFree(GetProcessHeap(), 0, qos->qos); HeapFree(GetProcessHeap(), 0, qos); } return refs; } BOOL RpcQualityOfService_IsEqual(const RpcQualityOfService *qos1, const RpcQualityOfService *qos2) { if (qos1 == qos2) return TRUE; if (!qos1 || !qos2) return FALSE; TRACE("qos1 = { %d %d %d %d }, qos2 = { %d %d %d %d }\n", qos1->qos->Capabilities, qos1->qos->IdentityTracking, qos1->qos->ImpersonationType, qos1->qos->AdditionalSecurityInfoType, qos2->qos->Capabilities, qos2->qos->IdentityTracking, qos2->qos->ImpersonationType, qos2->qos->AdditionalSecurityInfoType); if ((qos1->qos->Capabilities != qos2->qos->Capabilities) || (qos1->qos->IdentityTracking != qos2->qos->IdentityTracking) || (qos1->qos->ImpersonationType != qos2->qos->ImpersonationType) || (qos1->qos->AdditionalSecurityInfoType != qos2->qos->AdditionalSecurityInfoType)) return FALSE; if (qos1->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) { const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials1 = qos1->qos->u.HttpCredentials; const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials2 = qos2->qos->u.HttpCredentials; if (http_credentials1->Flags != http_credentials2->Flags) return FALSE; if (http_credentials1->AuthenticationTarget != http_credentials2->AuthenticationTarget) return FALSE; if (http_credentials1->NumberOfAuthnSchemes != http_credentials2->NumberOfAuthnSchemes) return FALSE; if ((!http_credentials1->AuthnSchemes && http_credentials2->AuthnSchemes) || (http_credentials1->AuthnSchemes && !http_credentials2->AuthnSchemes)) return FALSE; if (memcmp(http_credentials1->AuthnSchemes, http_credentials2->AuthnSchemes, http_credentials1->NumberOfAuthnSchemes * sizeof(http_credentials1->AuthnSchemes[0]))) return FALSE; /* server certificate subject not currently used */ if (http_credentials1->TransportCredentials != http_credentials2->TransportCredentials) { const SEC_WINNT_AUTH_IDENTITY_W *identity1 = http_credentials1->TransportCredentials; const SEC_WINNT_AUTH_IDENTITY_W *identity2 = http_credentials2->TransportCredentials; if (!identity1 || !identity2) return FALSE; /* compare user names */ if (identity1->UserLength != identity2->UserLength || memcmp(identity1->User, identity2->User, identity1->UserLength)) return FALSE; /* compare domain names */ if (identity1->DomainLength != identity2->DomainLength || memcmp(identity1->Domain, identity2->Domain, identity1->DomainLength)) return FALSE; /* compare passwords */ if (identity1->PasswordLength != identity2->PasswordLength || memcmp(identity1->Password, identity2->Password, identity1->PasswordLength)) return FALSE; } } return TRUE; } /*********************************************************************** * RpcRevertToSelf (RPCRT4.@) */ RPC_STATUS WINAPI RpcRevertToSelf(void) { TRACE("\n"); return RpcRevertToSelfEx(NULL); } /*********************************************************************** * RpcMgmtSetComTimeout (RPCRT4.@) */ RPC_STATUS WINAPI RpcMgmtSetComTimeout(RPC_BINDING_HANDLE BindingHandle, unsigned int Timeout) { FIXME("(%p, %d): stub\n", BindingHandle, Timeout); return RPC_S_OK; } /*********************************************************************** * RpcBindingInqAuthInfoExA (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthInfoExA( RPC_BINDING_HANDLE Binding, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc, ULONG RpcQosVersion, RPC_SECURITY_QOS *SecurityQOS ) { RPC_STATUS status; RPC_WSTR principal; TRACE("%p %p %p %p %p %p %u %p\n", Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS); status = RpcBindingInqAuthInfoExW(Binding, ServerPrincName ? &principal : NULL, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS); if (status == RPC_S_OK && ServerPrincName) { *ServerPrincName = (RPC_CSTR)RPCRT4_strdupWtoA(principal); RpcStringFreeW(&principal); if (!*ServerPrincName) return RPC_S_OUT_OF_MEMORY; } return status; } /*********************************************************************** * RpcBindingInqAuthInfoExW (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthInfoExW( RPC_BINDING_HANDLE Binding, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc, ULONG RpcQosVersion, RPC_SECURITY_QOS *SecurityQOS ) { RpcBinding *bind = Binding; TRACE("%p %p %p %p %p %p %u %p\n", Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS); if (!bind->AuthInfo) return RPC_S_BINDING_HAS_NO_AUTH; if (SecurityQOS) { FIXME("QOS not implemented\n"); return RPC_S_INVALID_BINDING; } if (ServerPrincName) { if (bind->AuthInfo->server_principal_name) { *ServerPrincName = RPCRT4_strdupW(bind->AuthInfo->server_principal_name); if (!*ServerPrincName) return RPC_S_OUT_OF_MEMORY; } else *ServerPrincName = NULL; } if (AuthnLevel) *AuthnLevel = bind->AuthInfo->AuthnLevel; if (AuthnSvc) *AuthnSvc = bind->AuthInfo->AuthnSvc; if (AuthIdentity) *AuthIdentity = bind->AuthInfo->identity; if (AuthzSvc) { FIXME("authorization service not implemented\n"); *AuthzSvc = RPC_C_AUTHZ_NONE; } return RPC_S_OK; } /*********************************************************************** * RpcBindingInqAuthInfoA (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthInfoA( RPC_BINDING_HANDLE Binding, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc ) { return RpcBindingInqAuthInfoExA(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvc, 0, NULL); } /*********************************************************************** * RpcBindingInqAuthInfoW (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthInfoW( RPC_BINDING_HANDLE Binding, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc ) { return RpcBindingInqAuthInfoExW(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvc, 0, NULL); } /*********************************************************************** * RpcBindingInqAuthClientA (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthClientA( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, ULONG *AuthzSvc ) { return RpcBindingInqAuthClientExA(ClientBinding, Privs, ServerPrincName, AuthnLevel, AuthnSvc, AuthzSvc, 0); } /*********************************************************************** * RpcBindingInqAuthClientW (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthClientW( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, ULONG *AuthzSvc ) { return RpcBindingInqAuthClientExW(ClientBinding, Privs, ServerPrincName, AuthnLevel, AuthnSvc, AuthzSvc, 0); } /*********************************************************************** * RpcBindingInqAuthClientExA (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthClientExA( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, ULONG *AuthzSvc, ULONG Flags ) { RPC_STATUS status; RPC_WSTR principal; TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding, Privs, ServerPrincName, AuthnLevel, AuthnSvc, AuthzSvc, Flags); status = RpcBindingInqAuthClientExW(ClientBinding, Privs, ServerPrincName ? &principal : NULL, AuthnLevel, AuthnSvc, AuthzSvc, Flags); if (status == RPC_S_OK && ServerPrincName) { *ServerPrincName = (RPC_CSTR)RPCRT4_strdupWtoA(principal); if (!*ServerPrincName && principal) status = RPC_S_OUT_OF_MEMORY; RpcStringFreeW(&principal); } return status; } /*********************************************************************** * RpcBindingInqAuthClientExW (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingInqAuthClientExW( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, ULONG *AuthzSvc, ULONG Flags ) { RpcBinding *bind = ClientBinding; TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding, Privs, ServerPrincName, AuthnLevel, AuthnSvc, AuthzSvc, Flags); if (!bind->FromConn) return RPC_S_INVALID_BINDING; return rpcrt4_conn_inquire_auth_client(bind->FromConn, Privs, ServerPrincName, AuthnLevel, AuthnSvc, AuthzSvc, Flags); } /*********************************************************************** * RpcBindingServerFromClient (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingServerFromClient(RPC_BINDING_HANDLE ClientBinding, RPC_BINDING_HANDLE* ServerBinding) { RpcBinding* bind = ClientBinding; RpcBinding* NewBinding; if (!bind) bind = I_RpcGetCurrentCallHandle(); if (!bind->server) return RPC_S_INVALID_BINDING; RPCRT4_AllocBinding(&NewBinding, TRUE); NewBinding->Protseq = RPCRT4_strdupA(bind->Protseq); NewBinding->NetworkAddr = RPCRT4_strdupA(bind->NetworkAddr); *ServerBinding = NewBinding; return RPC_S_OK; } /*********************************************************************** * RpcBindingSetAuthInfoExA (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingSetAuthInfoExA( RPC_BINDING_HANDLE Binding, RPC_CSTR ServerPrincName, ULONG AuthnLevel, ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr, RPC_SECURITY_QOS *SecurityQos ) { RpcBinding* bind = Binding; SECURITY_STATUS r; CredHandle cred; TimeStamp exp; ULONG package_count; ULONG i; PSecPkgInfoA packages; ULONG cbMaxToken; TRACE("%p %s %u %u %p %u %p\n", Binding, debugstr_a((const char*)ServerPrincName), AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, SecurityQos); if (SecurityQos) { RPC_STATUS status; TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d", SecurityQos->Version, SecurityQos->Capabilities, SecurityQos->IdentityTracking, SecurityQos->ImpersonationType); if (SecurityQos->Version >= 2) { const RPC_SECURITY_QOS_V2_A *SecurityQos2 = (const RPC_SECURITY_QOS_V2_A *)SecurityQos; TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2->AdditionalSecurityInfoType); if (SecurityQos2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) TRACE(", { %p, 0x%x, %d, %d, %p(%u), %s }", SecurityQos2->u.HttpCredentials->TransportCredentials, SecurityQos2->u.HttpCredentials->Flags, SecurityQos2->u.HttpCredentials->AuthenticationTarget, SecurityQos2->u.HttpCredentials->NumberOfAuthnSchemes, SecurityQos2->u.HttpCredentials->AuthnSchemes, SecurityQos2->u.HttpCredentials->AuthnSchemes ? *SecurityQos2->u.HttpCredentials->AuthnSchemes : 0, SecurityQos2->u.HttpCredentials->ServerCertificateSubject); } TRACE("}\n"); status = RpcQualityOfService_Create(SecurityQos, FALSE, &bind->QOS); if (status != RPC_S_OK) return status; } else { if (bind->QOS) RpcQualityOfService_Release(bind->QOS); bind->QOS = NULL; } if (AuthnSvc == RPC_C_AUTHN_DEFAULT) AuthnSvc = RPC_C_AUTHN_WINNT; /* FIXME: the mapping should probably be retrieved using SSPI somehow */ if (AuthnLevel == RPC_C_AUTHN_LEVEL_DEFAULT) AuthnLevel = RPC_C_AUTHN_LEVEL_NONE; if ((AuthnLevel == RPC_C_AUTHN_LEVEL_NONE) || (AuthnSvc == RPC_C_AUTHN_NONE)) { if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); bind->AuthInfo = NULL; return RPC_S_OK; } if (AuthnLevel > RPC_C_AUTHN_LEVEL_PKT_PRIVACY) { FIXME("unknown AuthnLevel %u\n", AuthnLevel); return RPC_S_UNKNOWN_AUTHN_LEVEL; } /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */ if (AuthzSvr && AuthnSvc != RPC_C_AUTHN_WINNT) { FIXME("unsupported AuthzSvr %u\n", AuthzSvr); return RPC_S_UNKNOWN_AUTHZ_SERVICE; } r = EnumerateSecurityPackagesA(&package_count, &packages); if (r != SEC_E_OK) { ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n", r); return RPC_S_SEC_PKG_ERROR; } for (i = 0; i < package_count; i++) if (packages[i].wRPCID == AuthnSvc) break; if (i == package_count) { FIXME("unsupported AuthnSvc %u\n", AuthnSvc); FreeContextBuffer(packages); return RPC_S_UNKNOWN_AUTHN_SERVICE; } TRACE("found package %s for service %u\n", packages[i].Name, AuthnSvc); r = AcquireCredentialsHandleA(NULL, packages[i].Name, SECPKG_CRED_OUTBOUND, NULL, AuthIdentity, NULL, NULL, &cred, &exp); cbMaxToken = packages[i].cbMaxToken; FreeContextBuffer(packages); if (r == ERROR_SUCCESS) { RpcAuthInfo *new_auth_info; r = RpcAuthInfo_Create(AuthnLevel, AuthnSvc, cred, exp, cbMaxToken, AuthIdentity, &new_auth_info); if (r == RPC_S_OK) { new_auth_info->server_principal_name = RPCRT4_strdupAtoW((char *)ServerPrincName); if (!ServerPrincName || new_auth_info->server_principal_name) { if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); bind->AuthInfo = new_auth_info; } else { RpcAuthInfo_Release(new_auth_info); r = RPC_S_OUT_OF_MEMORY; } } else FreeCredentialsHandle(&cred); return r; } else { ERR("AcquireCredentialsHandleA failed with error 0x%08x\n", r); return RPC_S_SEC_PKG_ERROR; } } /*********************************************************************** * RpcBindingSetAuthInfoExW (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingSetAuthInfoExW( RPC_BINDING_HANDLE Binding, RPC_WSTR ServerPrincName, ULONG AuthnLevel, ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr, RPC_SECURITY_QOS *SecurityQos ) { RpcBinding* bind = Binding; SECURITY_STATUS r; CredHandle cred; TimeStamp exp; ULONG package_count; ULONG i; PSecPkgInfoW packages; ULONG cbMaxToken; TRACE("%p %s %u %u %p %u %p\n", Binding, debugstr_w(ServerPrincName), AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, SecurityQos); if (SecurityQos) { RPC_STATUS status; TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d", SecurityQos->Version, SecurityQos->Capabilities, SecurityQos->IdentityTracking, SecurityQos->ImpersonationType); if (SecurityQos->Version >= 2) { const RPC_SECURITY_QOS_V2_W *SecurityQos2 = (const RPC_SECURITY_QOS_V2_W *)SecurityQos; TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2->AdditionalSecurityInfoType); if (SecurityQos2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) TRACE(", { %p, 0x%x, %d, %d, %p(%u), %s }", SecurityQos2->u.HttpCredentials->TransportCredentials, SecurityQos2->u.HttpCredentials->Flags, SecurityQos2->u.HttpCredentials->AuthenticationTarget, SecurityQos2->u.HttpCredentials->NumberOfAuthnSchemes, SecurityQos2->u.HttpCredentials->AuthnSchemes, SecurityQos2->u.HttpCredentials->AuthnSchemes ? *SecurityQos2->u.HttpCredentials->AuthnSchemes : 0, debugstr_w(SecurityQos2->u.HttpCredentials->ServerCertificateSubject)); } TRACE("}\n"); status = RpcQualityOfService_Create(SecurityQos, TRUE, &bind->QOS); if (status != RPC_S_OK) return status; } else { if (bind->QOS) RpcQualityOfService_Release(bind->QOS); bind->QOS = NULL; } if (AuthnSvc == RPC_C_AUTHN_DEFAULT) AuthnSvc = RPC_C_AUTHN_WINNT; /* FIXME: the mapping should probably be retrieved using SSPI somehow */ if (AuthnLevel == RPC_C_AUTHN_LEVEL_DEFAULT) AuthnLevel = RPC_C_AUTHN_LEVEL_NONE; if ((AuthnLevel == RPC_C_AUTHN_LEVEL_NONE) || (AuthnSvc == RPC_C_AUTHN_NONE)) { if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); bind->AuthInfo = NULL; return RPC_S_OK; } if (AuthnLevel > RPC_C_AUTHN_LEVEL_PKT_PRIVACY) { FIXME("unknown AuthnLevel %u\n", AuthnLevel); return RPC_S_UNKNOWN_AUTHN_LEVEL; } /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */ if (AuthzSvr && AuthnSvc != RPC_C_AUTHN_WINNT) { FIXME("unsupported AuthzSvr %u\n", AuthzSvr); return RPC_S_UNKNOWN_AUTHZ_SERVICE; } r = EnumerateSecurityPackagesW(&package_count, &packages); if (r != SEC_E_OK) { ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n", r); return RPC_S_SEC_PKG_ERROR; } for (i = 0; i < package_count; i++) if (packages[i].wRPCID == AuthnSvc) break; if (i == package_count) { FIXME("unsupported AuthnSvc %u\n", AuthnSvc); FreeContextBuffer(packages); return RPC_S_UNKNOWN_AUTHN_SERVICE; } TRACE("found package %s for service %u\n", debugstr_w(packages[i].Name), AuthnSvc); r = AcquireCredentialsHandleW(NULL, packages[i].Name, SECPKG_CRED_OUTBOUND, NULL, AuthIdentity, NULL, NULL, &cred, &exp); cbMaxToken = packages[i].cbMaxToken; FreeContextBuffer(packages); if (r == ERROR_SUCCESS) { RpcAuthInfo *new_auth_info; r = RpcAuthInfo_Create(AuthnLevel, AuthnSvc, cred, exp, cbMaxToken, AuthIdentity, &new_auth_info); if (r == RPC_S_OK) { new_auth_info->server_principal_name = RPCRT4_strdupW(ServerPrincName); if (!ServerPrincName || new_auth_info->server_principal_name) { if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); bind->AuthInfo = new_auth_info; } else { RpcAuthInfo_Release(new_auth_info); r = RPC_S_OUT_OF_MEMORY; } } else FreeCredentialsHandle(&cred); return r; } else { ERR("AcquireCredentialsHandleW failed with error 0x%08x\n", r); return RPC_S_SEC_PKG_ERROR; } } /*********************************************************************** * RpcBindingSetAuthInfoA (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingSetAuthInfoA( RPC_BINDING_HANDLE Binding, RPC_CSTR ServerPrincName, ULONG AuthnLevel, ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr ) { TRACE("%p %s %u %u %p %u\n", Binding, debugstr_a((const char*)ServerPrincName), AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr); return RpcBindingSetAuthInfoExA(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, NULL); } /*********************************************************************** * RpcBindingSetAuthInfoW (RPCRT4.@) */ RPCRTAPI RPC_STATUS RPC_ENTRY RpcBindingSetAuthInfoW( RPC_BINDING_HANDLE Binding, RPC_WSTR ServerPrincName, ULONG AuthnLevel, ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr ) { TRACE("%p %s %u %u %p %u\n", Binding, debugstr_w(ServerPrincName), AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr); return RpcBindingSetAuthInfoExW(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, NULL); } /*********************************************************************** * RpcBindingSetOption (RPCRT4.@) */ RPC_STATUS WINAPI RpcBindingSetOption(RPC_BINDING_HANDLE BindingHandle, ULONG Option, ULONG_PTR OptionValue) { TRACE("(%p, %d, %ld)\n", BindingHandle, Option, OptionValue); switch (Option) { case RPC_C_OPT_COOKIE_AUTH: { RPC_C_OPT_COOKIE_AUTH_DESCRIPTOR *cookie = (RPC_C_OPT_COOKIE_AUTH_DESCRIPTOR *)OptionValue; RpcBinding *binding = BindingHandle; int len = MultiByteToWideChar(CP_ACP, 0, cookie->Buffer, cookie->BufferSize, NULL, 0); WCHAR *str; if (!(str = HeapAlloc(GetProcessHeap(), 0, (len + 1) * sizeof(WCHAR)))) return RPC_S_OUT_OF_MEMORY; MultiByteToWideChar(CP_ACP, 0, cookie->Buffer, cookie->BufferSize, str, len); str[len] = 0; HeapFree(GetProcessHeap(), 0, binding->CookieAuth); binding->CookieAuth = str; break; } default: FIXME("option %u not supported\n", Option); break; } return RPC_S_OK; } /*********************************************************************** * I_RpcBindingInqLocalClientPID (RPCRT4.@) */ RPC_STATUS WINAPI I_RpcBindingInqLocalClientPID(RPC_BINDING_HANDLE ClientBinding, ULONG *ClientPID) { FIXME("%p %p: stub\n", ClientBinding, ClientPID); return RPC_S_INVALID_BINDING; }