| /* | 
 |  * RPC binding API | 
 |  * | 
 |  * Copyright 2001 Ove Kåven, TransGaming Technologies | 
 |  * Copyright 2003 Mike Hearn | 
 |  * Copyright 2004 Filip Navara | 
 |  * Copyright 2006 CodeWeavers | 
 |  * | 
 |  * This library is free software; you can redistribute it and/or | 
 |  * modify it under the terms of the GNU Lesser General Public | 
 |  * License as published by the Free Software Foundation; either | 
 |  * version 2.1 of the License, or (at your option) any later version. | 
 |  * | 
 |  * This library is distributed in the hope that it will be useful, | 
 |  * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
 |  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
 |  * Lesser General Public License for more details. | 
 |  * | 
 |  * You should have received a copy of the GNU Lesser General Public | 
 |  * License along with this library; if not, write to the Free Software | 
 |  * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA | 
 |  */ | 
 |  | 
 | #include <stdarg.h> | 
 | #include <stdio.h> | 
 | #include <string.h> | 
 | #include <assert.h> | 
 |  | 
 | #include "windef.h" | 
 | #include "winbase.h" | 
 | #include "winnls.h" | 
 | #include "winerror.h" | 
 | #include "winternl.h" | 
 | #include "wine/unicode.h" | 
 |  | 
 | #include "rpc.h" | 
 | #include "rpcndr.h" | 
 |  | 
 | #include "wine/debug.h" | 
 |  | 
 | #include "rpc_binding.h" | 
 | #include "rpc_assoc.h" | 
 |  | 
 | WINE_DEFAULT_DEBUG_CHANNEL(rpc); | 
 |  | 
 | LPSTR RPCRT4_strndupA(LPCSTR src, INT slen) | 
 | { | 
 |   DWORD len; | 
 |   LPSTR s; | 
 |   if (!src) return NULL; | 
 |   if (slen == -1) slen = strlen(src); | 
 |   len = slen; | 
 |   s = HeapAlloc(GetProcessHeap(), 0, len+1); | 
 |   memcpy(s, src, len); | 
 |   s[len] = 0; | 
 |   return s; | 
 | } | 
 |  | 
 | LPSTR RPCRT4_strdupWtoA(LPCWSTR src) | 
 | { | 
 |   DWORD len; | 
 |   LPSTR s; | 
 |   if (!src) return NULL; | 
 |   len = WideCharToMultiByte(CP_ACP, 0, src, -1, NULL, 0, NULL, NULL); | 
 |   s = HeapAlloc(GetProcessHeap(), 0, len); | 
 |   WideCharToMultiByte(CP_ACP, 0, src, -1, s, len, NULL, NULL); | 
 |   return s; | 
 | } | 
 |  | 
 | LPWSTR RPCRT4_strdupAtoW(LPCSTR src) | 
 | { | 
 |   DWORD len; | 
 |   LPWSTR s; | 
 |   if (!src) return NULL; | 
 |   len = MultiByteToWideChar(CP_ACP, 0, src, -1, NULL, 0); | 
 |   s = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
 |   MultiByteToWideChar(CP_ACP, 0, src, -1, s, len); | 
 |   return s; | 
 | } | 
 |  | 
 | static LPWSTR RPCRT4_strndupAtoW(LPCSTR src, INT slen) | 
 | { | 
 |   DWORD len; | 
 |   LPWSTR s; | 
 |   if (!src) return NULL; | 
 |   len = MultiByteToWideChar(CP_ACP, 0, src, slen, NULL, 0); | 
 |   s = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
 |   MultiByteToWideChar(CP_ACP, 0, src, slen, s, len); | 
 |   return s; | 
 | } | 
 |  | 
 | LPWSTR RPCRT4_strndupW(LPCWSTR src, INT slen) | 
 | { | 
 |   DWORD len; | 
 |   LPWSTR s; | 
 |   if (!src) return NULL; | 
 |   if (slen == -1) slen = strlenW(src); | 
 |   len = slen; | 
 |   s = HeapAlloc(GetProcessHeap(), 0, (len+1)*sizeof(WCHAR)); | 
 |   memcpy(s, src, len*sizeof(WCHAR)); | 
 |   s[len] = 0; | 
 |   return s; | 
 | } | 
 |  | 
 | void RPCRT4_strfree(LPSTR src) | 
 | { | 
 |   HeapFree(GetProcessHeap(), 0, src); | 
 | } | 
 |  | 
 | static RPC_STATUS RPCRT4_AllocBinding(RpcBinding** Binding, BOOL server) | 
 | { | 
 |   RpcBinding* NewBinding; | 
 |  | 
 |   NewBinding = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcBinding)); | 
 |   NewBinding->refs = 1; | 
 |   NewBinding->server = server; | 
 |  | 
 |   *Binding = NewBinding; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | static RPC_STATUS RPCRT4_CreateBindingA(RpcBinding** Binding, BOOL server, LPCSTR Protseq) | 
 | { | 
 |   RpcBinding* NewBinding; | 
 |  | 
 |   RPCRT4_AllocBinding(&NewBinding, server); | 
 |   NewBinding->Protseq = RPCRT4_strdupA(Protseq); | 
 |  | 
 |   TRACE("binding: %p\n", NewBinding); | 
 |   *Binding = NewBinding; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | static RPC_STATUS RPCRT4_CreateBindingW(RpcBinding** Binding, BOOL server, LPCWSTR Protseq) | 
 | { | 
 |   RpcBinding* NewBinding; | 
 |  | 
 |   RPCRT4_AllocBinding(&NewBinding, server); | 
 |   NewBinding->Protseq = RPCRT4_strdupWtoA(Protseq); | 
 |  | 
 |   TRACE("binding: %p\n", NewBinding); | 
 |   *Binding = NewBinding; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | static RPC_STATUS RPCRT4_CompleteBindingA(RpcBinding* Binding, LPCSTR NetworkAddr, | 
 |                                           LPCSTR Endpoint, LPCSTR NetworkOptions) | 
 | { | 
 |   RPC_STATUS status; | 
 |  | 
 |   TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding, | 
 |    debugstr_a(NetworkAddr), debugstr_a(Endpoint), debugstr_a(NetworkOptions)); | 
 |  | 
 |   RPCRT4_strfree(Binding->NetworkAddr); | 
 |   Binding->NetworkAddr = RPCRT4_strdupA(NetworkAddr); | 
 |   RPCRT4_strfree(Binding->Endpoint); | 
 |   Binding->Endpoint = RPCRT4_strdupA(Endpoint); | 
 |   HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions); | 
 |   Binding->NetworkOptions = RPCRT4_strdupAtoW(NetworkOptions); | 
 |  | 
 |   /* only attempt to get an association if the binding is complete */ | 
 |   if (Endpoint && Endpoint[0] != '\0') | 
 |   { | 
 |     status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr, | 
 |                                    Binding->Endpoint, Binding->NetworkOptions, | 
 |                                    &Binding->Assoc); | 
 |     if (status != RPC_S_OK) | 
 |         return status; | 
 |   } | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | static RPC_STATUS RPCRT4_CompleteBindingW(RpcBinding* Binding, LPCWSTR NetworkAddr, | 
 |                                           LPCWSTR Endpoint, LPCWSTR NetworkOptions) | 
 | { | 
 |   RPC_STATUS status; | 
 |  | 
 |   TRACE("(RpcBinding == ^%p, NetworkAddr == %s, EndPoint == %s, NetworkOptions == %s)\n", Binding,  | 
 |    debugstr_w(NetworkAddr), debugstr_w(Endpoint), debugstr_w(NetworkOptions)); | 
 |  | 
 |   RPCRT4_strfree(Binding->NetworkAddr); | 
 |   Binding->NetworkAddr = RPCRT4_strdupWtoA(NetworkAddr); | 
 |   RPCRT4_strfree(Binding->Endpoint); | 
 |   Binding->Endpoint = RPCRT4_strdupWtoA(Endpoint); | 
 |   HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions); | 
 |   Binding->NetworkOptions = RPCRT4_strdupW(NetworkOptions); | 
 |  | 
 |   /* only attempt to get an association if the binding is complete */ | 
 |   if (Endpoint && Endpoint[0] != '\0') | 
 |   { | 
 |     status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr, | 
 |                                    Binding->Endpoint, Binding->NetworkOptions, | 
 |                                    &Binding->Assoc); | 
 |     if (status != RPC_S_OK) | 
 |         return status; | 
 |   } | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | RPC_STATUS RPCRT4_ResolveBinding(RpcBinding* Binding, LPCSTR Endpoint) | 
 | { | 
 |   RPC_STATUS status; | 
 |  | 
 |   TRACE("(RpcBinding == ^%p, EndPoint == \"%s\"\n", Binding, Endpoint); | 
 |  | 
 |   RPCRT4_strfree(Binding->Endpoint); | 
 |   Binding->Endpoint = RPCRT4_strdupA(Endpoint); | 
 |  | 
 |   if (Binding->Assoc) RpcAssoc_Release(Binding->Assoc); | 
 |   Binding->Assoc = NULL; | 
 |   status = RPCRT4_GetAssociation(Binding->Protseq, Binding->NetworkAddr, | 
 |                                  Binding->Endpoint, Binding->NetworkOptions, | 
 |                                  &Binding->Assoc); | 
 |   if (status != RPC_S_OK) | 
 |       return status; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | RPC_STATUS RPCRT4_SetBindingObject(RpcBinding* Binding, const UUID* ObjectUuid) | 
 | { | 
 |   TRACE("(*RpcBinding == ^%p, UUID == %s)\n", Binding, debugstr_guid(ObjectUuid));  | 
 |   if (ObjectUuid) Binding->ObjectUuid = *ObjectUuid; | 
 |   else UuidCreateNil(&Binding->ObjectUuid); | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | RPC_STATUS RPCRT4_MakeBinding(RpcBinding** Binding, RpcConnection* Connection) | 
 | { | 
 |   RpcBinding* NewBinding; | 
 |   TRACE("(RpcBinding == ^%p, Connection == ^%p)\n", Binding, Connection); | 
 |  | 
 |   RPCRT4_AllocBinding(&NewBinding, Connection->server); | 
 |   NewBinding->Protseq = RPCRT4_strdupA(rpcrt4_conn_get_name(Connection)); | 
 |   NewBinding->NetworkAddr = RPCRT4_strdupA(Connection->NetworkAddr); | 
 |   NewBinding->Endpoint = RPCRT4_strdupA(Connection->Endpoint); | 
 |   NewBinding->FromConn = Connection; | 
 |  | 
 |   TRACE("binding: %p\n", NewBinding); | 
 |   *Binding = NewBinding; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | void RPCRT4_AddRefBinding(RpcBinding* Binding) | 
 | { | 
 |   InterlockedIncrement(&Binding->refs); | 
 | } | 
 |  | 
 | RPC_STATUS RPCRT4_ReleaseBinding(RpcBinding* Binding) | 
 | { | 
 |   if (InterlockedDecrement(&Binding->refs)) | 
 |     return RPC_S_OK; | 
 |  | 
 |   TRACE("binding: %p\n", Binding); | 
 |   if (Binding->Assoc) RpcAssoc_Release(Binding->Assoc); | 
 |   RPCRT4_strfree(Binding->Endpoint); | 
 |   RPCRT4_strfree(Binding->NetworkAddr); | 
 |   RPCRT4_strfree(Binding->Protseq); | 
 |   HeapFree(GetProcessHeap(), 0, Binding->NetworkOptions); | 
 |   if (Binding->AuthInfo) RpcAuthInfo_Release(Binding->AuthInfo); | 
 |   if (Binding->QOS) RpcQualityOfService_Release(Binding->QOS); | 
 |   HeapFree(GetProcessHeap(), 0, Binding); | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | RPC_STATUS RPCRT4_OpenBinding(RpcBinding* Binding, RpcConnection** Connection, | 
 |                               const RPC_SYNTAX_IDENTIFIER *TransferSyntax, | 
 |                               const RPC_SYNTAX_IDENTIFIER *InterfaceId) | 
 | { | 
 |   TRACE("(Binding == ^%p)\n", Binding); | 
 |  | 
 |   if (!Binding->server) { | 
 |      return RpcAssoc_GetClientConnection(Binding->Assoc, InterfaceId, | 
 |          TransferSyntax, Binding->AuthInfo, Binding->QOS, Connection); | 
 |   } else { | 
 |     /* we already have a connection with acceptable binding, so use it */ | 
 |     if (Binding->FromConn) { | 
 |       *Connection = Binding->FromConn; | 
 |       return RPC_S_OK; | 
 |     } else { | 
 |        ERR("no connection in binding\n"); | 
 |        return RPC_S_INTERNAL_ERROR; | 
 |     } | 
 |   } | 
 | } | 
 |  | 
 | RPC_STATUS RPCRT4_CloseBinding(RpcBinding* Binding, RpcConnection* Connection) | 
 | { | 
 |   TRACE("(Binding == ^%p)\n", Binding); | 
 |   if (!Connection) return RPC_S_OK; | 
 |   if (Binding->server) { | 
 |     /* don't destroy a connection that is cached in the binding */ | 
 |     if (Binding->FromConn == Connection) | 
 |       return RPC_S_OK; | 
 |     return RPCRT4_DestroyConnection(Connection); | 
 |   } | 
 |   else { | 
 |     RpcAssoc_ReleaseIdleConnection(Binding->Assoc, Connection); | 
 |     return RPC_S_OK; | 
 |   } | 
 | } | 
 |  | 
 | static LPSTR RPCRT4_strconcatA(LPSTR dst, LPCSTR src) | 
 | { | 
 |   DWORD len = strlen(dst), slen = strlen(src); | 
 |   LPSTR ndst = HeapReAlloc(GetProcessHeap(), 0, dst, (len+slen+2)*sizeof(CHAR)); | 
 |   if (!ndst) | 
 |   { | 
 |     HeapFree(GetProcessHeap(), 0, dst); | 
 |     return NULL; | 
 |   } | 
 |   ndst[len] = ','; | 
 |   memcpy(ndst+len+1, src, slen+1); | 
 |   return ndst; | 
 | } | 
 |  | 
 | static LPWSTR RPCRT4_strconcatW(LPWSTR dst, LPCWSTR src) | 
 | { | 
 |   DWORD len = strlenW(dst), slen = strlenW(src); | 
 |   LPWSTR ndst = HeapReAlloc(GetProcessHeap(), 0, dst, (len+slen+2)*sizeof(WCHAR)); | 
 |   if (!ndst)  | 
 |   { | 
 |     HeapFree(GetProcessHeap(), 0, dst); | 
 |     return NULL; | 
 |   } | 
 |   ndst[len] = ','; | 
 |   memcpy(ndst+len+1, src, (slen+1)*sizeof(WCHAR)); | 
 |   return ndst; | 
 | } | 
 |  | 
 | /* Copies the escaped version of a component into a string binding. | 
 |  * Note: doesn't nul-terminate the string */ | 
 | static RPC_CSTR escape_string_binding_component(RPC_CSTR string_binding, | 
 |                                                 const unsigned char *component) | 
 | { | 
 |   for (; *component; component++) { | 
 |     switch (*component) { | 
 |       case '@': | 
 |       case ':': | 
 |       case '[': | 
 |       case ']': | 
 |       case '\\': | 
 |         *string_binding++ = '\\'; | 
 |         *string_binding++ = *component; | 
 |         break; | 
 |       default: | 
 |         *string_binding++ = *component; | 
 |         break; | 
 |     } | 
 |   } | 
 |   return string_binding; | 
 | } | 
 |  | 
 | static RPC_WSTR escape_string_binding_componentW(RPC_WSTR string_binding, | 
 |                                                  const WCHAR *component) | 
 | { | 
 |   for (; *component; component++) { | 
 |     switch (*component) { | 
 |       case '@': | 
 |       case ':': | 
 |       case '[': | 
 |       case ']': | 
 |       case '\\': | 
 |         *string_binding++ = '\\'; | 
 |         *string_binding++ = *component; | 
 |         break; | 
 |       default: | 
 |         *string_binding++ = *component; | 
 |         break; | 
 |     } | 
 |   } | 
 |   return string_binding; | 
 | } | 
 |  | 
 | static const unsigned char *string_binding_find_delimiter( | 
 |     const unsigned char *string_binding, unsigned char delim) | 
 | { | 
 |   const unsigned char *next; | 
 |   for (next = string_binding; *next; next++) { | 
 |     if (*next == '\\') { | 
 |       next++; | 
 |       continue; | 
 |     } | 
 |     if (*next == delim) | 
 |       return next; | 
 |   } | 
 |   return NULL; | 
 | } | 
 |  | 
 | static const WCHAR *string_binding_find_delimiterW( | 
 |     const WCHAR *string_binding, WCHAR delim) | 
 | { | 
 |   const WCHAR *next; | 
 |   for (next = string_binding; *next; next++) { | 
 |     if (*next == '\\') { | 
 |       next++; | 
 |       continue; | 
 |     } | 
 |     if (*next == delim) | 
 |       return next; | 
 |   } | 
 |   return NULL; | 
 | } | 
 |  | 
 | static RPC_CSTR unescape_string_binding_component( | 
 |     const unsigned char *string_binding, int len) | 
 | { | 
 |   RPC_CSTR component, p; | 
 |  | 
 |   if (len == -1) len = strlen((const char *)string_binding); | 
 |  | 
 |   component = HeapAlloc(GetProcessHeap(), 0, (len + 1) * sizeof(*component)); | 
 |   if (!component) return NULL; | 
 |   for (p = component; len > 0; string_binding++, len--) { | 
 |     if (*string_binding == '\\') { | 
 |       string_binding++; | 
 |       len--; | 
 |       *p++ = *string_binding; | 
 |     } else { | 
 |       *p++ = *string_binding; | 
 |     } | 
 |   } | 
 |   *p = '\0'; | 
 |   return component; | 
 | } | 
 |  | 
 | static RPC_WSTR unescape_string_binding_componentW( | 
 |     const WCHAR *string_binding, int len) | 
 | { | 
 |   RPC_WSTR component, p; | 
 |  | 
 |   if (len == -1) len = strlenW(string_binding); | 
 |  | 
 |   component = HeapAlloc(GetProcessHeap(), 0, (len + 1) * sizeof(*component)); | 
 |   if (!component) return NULL; | 
 |   for (p = component; len > 0; string_binding++, len--) { | 
 |     if (*string_binding == '\\') { | 
 |       string_binding++; | 
 |       len--; | 
 |       *p++ = *string_binding; | 
 |     } else { | 
 |       *p++ = *string_binding; | 
 |     } | 
 |   } | 
 |   *p = '\0'; | 
 |   return component; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcStringBindingComposeA (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcStringBindingComposeA(RPC_CSTR ObjUuid, RPC_CSTR Protseq, | 
 |                                            RPC_CSTR NetworkAddr, RPC_CSTR Endpoint, | 
 |                                            RPC_CSTR Options, RPC_CSTR *StringBinding ) | 
 | { | 
 |   DWORD len = 1; | 
 |   RPC_CSTR data; | 
 |  | 
 |   TRACE( "(%s,%s,%s,%s,%s,%p)\n", | 
 |         debugstr_a( (char*)ObjUuid ), debugstr_a( (char*)Protseq ), | 
 |         debugstr_a( (char*)NetworkAddr ), debugstr_a( (char*)Endpoint ), | 
 |         debugstr_a( (char*)Options ), StringBinding ); | 
 |  | 
 |   /* overestimate for each component for escaping of delimiters */ | 
 |   if (ObjUuid && *ObjUuid) len += strlen((char*)ObjUuid) * 2 + 1; | 
 |   if (Protseq && *Protseq) len += strlen((char*)Protseq) * 2 + 1; | 
 |   if (NetworkAddr && *NetworkAddr) len += strlen((char*)NetworkAddr) * 2; | 
 |   if (Endpoint && *Endpoint) len += strlen((char*)Endpoint) * 2 + 2; | 
 |   if (Options && *Options) len += strlen((char*)Options) * 2 + 2; | 
 |  | 
 |   data = HeapAlloc(GetProcessHeap(), 0, len); | 
 |   *StringBinding = data; | 
 |  | 
 |   if (ObjUuid && *ObjUuid) { | 
 |     data = escape_string_binding_component(data, ObjUuid); | 
 |     *data++ = '@'; | 
 |   } | 
 |   if (Protseq && *Protseq) { | 
 |     data = escape_string_binding_component(data, Protseq); | 
 |     *data++ = ':'; | 
 |   } | 
 |   if (NetworkAddr && *NetworkAddr) | 
 |     data = escape_string_binding_component(data, NetworkAddr); | 
 |  | 
 |   if ((Endpoint && *Endpoint) || | 
 |       (Options && *Options)) { | 
 |     *data++ = '['; | 
 |     if (Endpoint && *Endpoint) { | 
 |       data = escape_string_binding_component(data, Endpoint); | 
 |       if (Options && *Options) *data++ = ','; | 
 |     } | 
 |     if (Options && *Options) { | 
 |       data = escape_string_binding_component(data, Options); | 
 |     } | 
 |     *data++ = ']'; | 
 |   } | 
 |   *data = 0; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcStringBindingComposeW (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcStringBindingComposeW( RPC_WSTR ObjUuid, RPC_WSTR Protseq, | 
 |                                             RPC_WSTR NetworkAddr, RPC_WSTR Endpoint, | 
 |                                             RPC_WSTR Options, RPC_WSTR* StringBinding ) | 
 | { | 
 |   DWORD len = 1; | 
 |   RPC_WSTR data; | 
 |  | 
 |   TRACE("(%s,%s,%s,%s,%s,%p)\n", | 
 |        debugstr_w( ObjUuid ), debugstr_w( Protseq ), | 
 |        debugstr_w( NetworkAddr ), debugstr_w( Endpoint ), | 
 |        debugstr_w( Options ), StringBinding); | 
 |  | 
 |   /* overestimate for each component for escaping of delimiters */ | 
 |   if (ObjUuid && *ObjUuid) len += strlenW(ObjUuid) * 2 + 1; | 
 |   if (Protseq && *Protseq) len += strlenW(Protseq) * 2 + 1; | 
 |   if (NetworkAddr && *NetworkAddr) len += strlenW(NetworkAddr) * 2; | 
 |   if (Endpoint && *Endpoint) len += strlenW(Endpoint) * 2 + 2; | 
 |   if (Options && *Options) len += strlenW(Options) * 2 + 2; | 
 |  | 
 |   data = HeapAlloc(GetProcessHeap(), 0, len*sizeof(WCHAR)); | 
 |   *StringBinding = data; | 
 |  | 
 |   if (ObjUuid && *ObjUuid) { | 
 |     data = escape_string_binding_componentW(data, ObjUuid); | 
 |     *data++ = '@'; | 
 |   } | 
 |   if (Protseq && *Protseq) { | 
 |     data = escape_string_binding_componentW(data, Protseq); | 
 |     *data++ = ':'; | 
 |   } | 
 |   if (NetworkAddr && *NetworkAddr) { | 
 |     data = escape_string_binding_componentW(data, NetworkAddr); | 
 |   } | 
 |   if ((Endpoint && *Endpoint) || | 
 |       (Options && *Options)) { | 
 |     *data++ = '['; | 
 |     if (Endpoint && *Endpoint) { | 
 |       data = escape_string_binding_componentW(data, Endpoint); | 
 |       if (Options && *Options) *data++ = ','; | 
 |     } | 
 |     if (Options && *Options) { | 
 |       data = escape_string_binding_componentW(data, Options); | 
 |     } | 
 |     *data++ = ']'; | 
 |   } | 
 |   *data = 0; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcStringBindingParseA (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcStringBindingParseA( RPC_CSTR StringBinding, RPC_CSTR *ObjUuid, | 
 |                                           RPC_CSTR *Protseq, RPC_CSTR *NetworkAddr, | 
 |                                           RPC_CSTR *Endpoint, RPC_CSTR *Options) | 
 | { | 
 |   const unsigned char *data, *next; | 
 |   static const char ep_opt[] = "endpoint="; | 
 |   BOOL endpoint_already_found = FALSE; | 
 |  | 
 |   TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_a((char*)StringBinding), | 
 |        ObjUuid, Protseq, NetworkAddr, Endpoint, Options); | 
 |  | 
 |   if (ObjUuid) *ObjUuid = NULL; | 
 |   if (Protseq) *Protseq = NULL; | 
 |   if (NetworkAddr) *NetworkAddr = NULL; | 
 |   if (Endpoint) *Endpoint = NULL; | 
 |   if (Options) *Options = NULL; | 
 |  | 
 |   data = StringBinding; | 
 |  | 
 |   next = string_binding_find_delimiter(data, '@'); | 
 |   if (next) { | 
 |     UUID uuid; | 
 |     RPC_STATUS status; | 
 |     RPC_CSTR str_uuid = unescape_string_binding_component(data, next - data); | 
 |     status = UuidFromStringA(str_uuid, &uuid); | 
 |     if (status != RPC_S_OK) { | 
 |       HeapFree(GetProcessHeap(), 0, str_uuid); | 
 |       return status; | 
 |     } | 
 |     if (ObjUuid) | 
 |       *ObjUuid = str_uuid; | 
 |     else | 
 |       HeapFree(GetProcessHeap(), 0, str_uuid); | 
 |     data = next+1; | 
 |   } | 
 |  | 
 |   next = string_binding_find_delimiter(data, ':'); | 
 |   if (next) { | 
 |     if (Protseq) *Protseq = unescape_string_binding_component(data, next - data); | 
 |     data = next+1; | 
 |   } | 
 |  | 
 |   next = string_binding_find_delimiter(data, '['); | 
 |   if (next) { | 
 |     const unsigned char *close; | 
 |     RPC_CSTR opt; | 
 |  | 
 |     if (NetworkAddr) *NetworkAddr = unescape_string_binding_component(data, next - data); | 
 |     data = next+1; | 
 |     close = string_binding_find_delimiter(data, ']'); | 
 |     if (!close) goto fail; | 
 |  | 
 |     /* tokenize options */ | 
 |     while (data < close) { | 
 |       next = string_binding_find_delimiter(data, ','); | 
 |       if (!next || next > close) next = close; | 
 |       /* FIXME: this is kind of inefficient */ | 
 |       opt = unescape_string_binding_component(data, next - data); | 
 |       data = next+1; | 
 |  | 
 |       /* parse option */ | 
 |       next = string_binding_find_delimiter(opt, '='); | 
 |       if (!next) { | 
 |         /* not an option, must be an endpoint */ | 
 |         if (endpoint_already_found) goto fail; | 
 |         if (Endpoint) *Endpoint = opt; | 
 |         else HeapFree(GetProcessHeap(), 0, opt); | 
 |         endpoint_already_found = TRUE; | 
 |       } else { | 
 |         if (strncmp((const char *)opt, ep_opt, strlen(ep_opt)) == 0) { | 
 |           /* endpoint option */ | 
 |           if (endpoint_already_found) goto fail; | 
 |           if (Endpoint) *Endpoint = unescape_string_binding_component(next+1, -1); | 
 |           HeapFree(GetProcessHeap(), 0, opt); | 
 |           endpoint_already_found = TRUE; | 
 |         } else { | 
 |           /* network option */ | 
 |           if (Options) { | 
 |             if (*Options) { | 
 |               /* FIXME: this is kind of inefficient */ | 
 |               *Options = (unsigned char*) RPCRT4_strconcatA( (char*)*Options, (char *)opt); | 
 |               HeapFree(GetProcessHeap(), 0, opt); | 
 |             } else | 
 |               *Options = opt; | 
 |           } else | 
 |             HeapFree(GetProcessHeap(), 0, opt); | 
 |         } | 
 |       } | 
 |     } | 
 |  | 
 |     data = close+1; | 
 |     if (*data) goto fail; | 
 |   } | 
 |   else if (NetworkAddr)  | 
 |     *NetworkAddr = unescape_string_binding_component(data, -1); | 
 |  | 
 |   return RPC_S_OK; | 
 |  | 
 | fail: | 
 |   if (ObjUuid) RpcStringFreeA(ObjUuid); | 
 |   if (Protseq) RpcStringFreeA(Protseq); | 
 |   if (NetworkAddr) RpcStringFreeA(NetworkAddr); | 
 |   if (Endpoint) RpcStringFreeA(Endpoint); | 
 |   if (Options) RpcStringFreeA(Options); | 
 |   return RPC_S_INVALID_STRING_BINDING; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcStringBindingParseW (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcStringBindingParseW( RPC_WSTR StringBinding, RPC_WSTR *ObjUuid, | 
 |                                           RPC_WSTR *Protseq, RPC_WSTR *NetworkAddr, | 
 |                                           RPC_WSTR *Endpoint, RPC_WSTR *Options) | 
 | { | 
 |   const WCHAR *data, *next; | 
 |   static const WCHAR ep_opt[] = {'e','n','d','p','o','i','n','t','=',0}; | 
 |   BOOL endpoint_already_found = FALSE; | 
 |  | 
 |   TRACE("(%s,%p,%p,%p,%p,%p)\n", debugstr_w(StringBinding), | 
 |        ObjUuid, Protseq, NetworkAddr, Endpoint, Options); | 
 |  | 
 |   if (ObjUuid) *ObjUuid = NULL; | 
 |   if (Protseq) *Protseq = NULL; | 
 |   if (NetworkAddr) *NetworkAddr = NULL; | 
 |   if (Endpoint) *Endpoint = NULL; | 
 |   if (Options) *Options = NULL; | 
 |  | 
 |   data = StringBinding; | 
 |  | 
 |   next = string_binding_find_delimiterW(data, '@'); | 
 |   if (next) { | 
 |     UUID uuid; | 
 |     RPC_STATUS status; | 
 |     RPC_WSTR str_uuid = unescape_string_binding_componentW(data, next - data); | 
 |     status = UuidFromStringW(str_uuid, &uuid); | 
 |     if (status != RPC_S_OK) { | 
 |       HeapFree(GetProcessHeap(), 0, str_uuid); | 
 |       return status; | 
 |     } | 
 |     if (ObjUuid) | 
 |       *ObjUuid = str_uuid; | 
 |     else | 
 |       HeapFree(GetProcessHeap(), 0, str_uuid); | 
 |     data = next+1; | 
 |   } | 
 |  | 
 |   next = string_binding_find_delimiterW(data, ':'); | 
 |   if (next) { | 
 |     if (Protseq) *Protseq = unescape_string_binding_componentW(data, next - data); | 
 |     data = next+1; | 
 |   } | 
 |  | 
 |   next = string_binding_find_delimiterW(data, '['); | 
 |   if (next) { | 
 |     const WCHAR *close; | 
 |     RPC_WSTR opt; | 
 |  | 
 |     if (NetworkAddr) *NetworkAddr = unescape_string_binding_componentW(data, next - data); | 
 |     data = next+1; | 
 |     close = string_binding_find_delimiterW(data, ']'); | 
 |     if (!close) goto fail; | 
 |  | 
 |     /* tokenize options */ | 
 |     while (data < close) { | 
 |       next = string_binding_find_delimiterW(data, ','); | 
 |       if (!next || next > close) next = close; | 
 |       /* FIXME: this is kind of inefficient */ | 
 |       opt = unescape_string_binding_componentW(data, next - data); | 
 |       data = next+1; | 
 |  | 
 |       /* parse option */ | 
 |       next = string_binding_find_delimiterW(opt, '='); | 
 |       if (!next) { | 
 |         /* not an option, must be an endpoint */ | 
 |         if (endpoint_already_found) goto fail; | 
 |         if (Endpoint) *Endpoint = opt; | 
 |         else HeapFree(GetProcessHeap(), 0, opt); | 
 |         endpoint_already_found = TRUE; | 
 |       } else { | 
 |         if (strncmpW(opt, ep_opt, strlenW(ep_opt)) == 0) { | 
 |           /* endpoint option */ | 
 |           if (endpoint_already_found) goto fail; | 
 |           if (Endpoint) *Endpoint = unescape_string_binding_componentW(next+1, -1); | 
 |           HeapFree(GetProcessHeap(), 0, opt); | 
 |           endpoint_already_found = TRUE; | 
 |         } else { | 
 |           /* network option */ | 
 |           if (Options) { | 
 |             if (*Options) { | 
 |               /* FIXME: this is kind of inefficient */ | 
 |               *Options = RPCRT4_strconcatW(*Options, opt); | 
 |               HeapFree(GetProcessHeap(), 0, opt); | 
 |             } else | 
 |               *Options = opt; | 
 |           } else | 
 |             HeapFree(GetProcessHeap(), 0, opt); | 
 |         } | 
 |       } | 
 |     } | 
 |  | 
 |     data = close+1; | 
 |     if (*data) goto fail; | 
 |   } else if (NetworkAddr)  | 
 |     *NetworkAddr = unescape_string_binding_componentW(data, -1); | 
 |  | 
 |   return RPC_S_OK; | 
 |  | 
 | fail: | 
 |   if (ObjUuid) RpcStringFreeW(ObjUuid); | 
 |   if (Protseq) RpcStringFreeW(Protseq); | 
 |   if (NetworkAddr) RpcStringFreeW(NetworkAddr); | 
 |   if (Endpoint) RpcStringFreeW(Endpoint); | 
 |   if (Options) RpcStringFreeW(Options); | 
 |   return RPC_S_INVALID_STRING_BINDING; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingFree (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingFree( RPC_BINDING_HANDLE* Binding ) | 
 | { | 
 |   RPC_STATUS status; | 
 |   TRACE("(%p) = %p\n", Binding, *Binding); | 
 |   if (*Binding) | 
 |     status = RPCRT4_ReleaseBinding(*Binding); | 
 |   else | 
 |     status = RPC_S_INVALID_BINDING; | 
 |   if (status == RPC_S_OK) *Binding = NULL; | 
 |   return status; | 
 | } | 
 |    | 
 | /*********************************************************************** | 
 |  *             RpcBindingVectorFree (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingVectorFree( RPC_BINDING_VECTOR** BindingVector ) | 
 | { | 
 |   ULONG c; | 
 |  | 
 |   TRACE("(%p)\n", BindingVector); | 
 |   for (c=0; c<(*BindingVector)->Count; c++) RpcBindingFree(&(*BindingVector)->BindingH[c]); | 
 |   HeapFree(GetProcessHeap(), 0, *BindingVector); | 
 |   *BindingVector = NULL; | 
 |   return RPC_S_OK; | 
 | } | 
 |    | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqObject (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingInqObject( RPC_BINDING_HANDLE Binding, UUID* ObjectUuid ) | 
 | { | 
 |   RpcBinding* bind = Binding; | 
 |  | 
 |   TRACE("(%p,%p) = %s\n", Binding, ObjectUuid, debugstr_guid(&bind->ObjectUuid)); | 
 |   *ObjectUuid = bind->ObjectUuid; | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingSetObject (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingSetObject( RPC_BINDING_HANDLE Binding, UUID* ObjectUuid ) | 
 | { | 
 |   RpcBinding* bind = Binding; | 
 |  | 
 |   TRACE("(%p,%s)\n", Binding, debugstr_guid(ObjectUuid)); | 
 |   if (bind->server) return RPC_S_WRONG_KIND_OF_BINDING; | 
 |   return RPCRT4_SetBindingObject(Binding, ObjectUuid); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingFromStringBindingA (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingFromStringBindingA( RPC_CSTR StringBinding, RPC_BINDING_HANDLE* Binding ) | 
 | { | 
 |   RPC_STATUS ret; | 
 |   RpcBinding* bind = NULL; | 
 |   RPC_CSTR ObjectUuid, Protseq, NetworkAddr, Endpoint, Options; | 
 |   UUID Uuid; | 
 |  | 
 |   TRACE("(%s,%p)\n", debugstr_a((char*)StringBinding), Binding); | 
 |  | 
 |   ret = RpcStringBindingParseA(StringBinding, &ObjectUuid, &Protseq, | 
 |                               &NetworkAddr, &Endpoint, &Options); | 
 |   if (ret != RPC_S_OK) return ret; | 
 |  | 
 |   ret = UuidFromStringA(ObjectUuid, &Uuid); | 
 |  | 
 |   if (ret == RPC_S_OK) | 
 |     ret = RPCRT4_CreateBindingA(&bind, FALSE, (char*)Protseq); | 
 |   if (ret != RPC_S_OK) return ret; | 
 |   ret = RPCRT4_SetBindingObject(bind, &Uuid); | 
 |   if (ret == RPC_S_OK) | 
 |     ret = RPCRT4_CompleteBindingA(bind, (char*)NetworkAddr, (char*)Endpoint, (char*)Options); | 
 |  | 
 |   RpcStringFreeA(&Options); | 
 |   RpcStringFreeA(&Endpoint); | 
 |   RpcStringFreeA(&NetworkAddr); | 
 |   RpcStringFreeA(&Protseq); | 
 |   RpcStringFreeA(&ObjectUuid); | 
 |  | 
 |   if (ret == RPC_S_OK)  | 
 |     *Binding = (RPC_BINDING_HANDLE)bind; | 
 |   else  | 
 |     RPCRT4_ReleaseBinding(bind); | 
 |  | 
 |   return ret; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingFromStringBindingW (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingFromStringBindingW( RPC_WSTR StringBinding, RPC_BINDING_HANDLE* Binding ) | 
 | { | 
 |   RPC_STATUS ret; | 
 |   RpcBinding* bind = NULL; | 
 |   RPC_WSTR ObjectUuid, Protseq, NetworkAddr, Endpoint, Options; | 
 |   UUID Uuid; | 
 |  | 
 |   TRACE("(%s,%p)\n", debugstr_w(StringBinding), Binding); | 
 |  | 
 |   ret = RpcStringBindingParseW(StringBinding, &ObjectUuid, &Protseq, | 
 |                               &NetworkAddr, &Endpoint, &Options); | 
 |   if (ret != RPC_S_OK) return ret; | 
 |  | 
 |   ret = UuidFromStringW(ObjectUuid, &Uuid); | 
 |  | 
 |   if (ret == RPC_S_OK) | 
 |     ret = RPCRT4_CreateBindingW(&bind, FALSE, Protseq); | 
 |   if (ret != RPC_S_OK) return ret; | 
 |   ret = RPCRT4_SetBindingObject(bind, &Uuid); | 
 |   if (ret == RPC_S_OK) | 
 |     ret = RPCRT4_CompleteBindingW(bind, NetworkAddr, Endpoint, Options); | 
 |  | 
 |   RpcStringFreeW(&Options); | 
 |   RpcStringFreeW(&Endpoint); | 
 |   RpcStringFreeW(&NetworkAddr); | 
 |   RpcStringFreeW(&Protseq); | 
 |   RpcStringFreeW(&ObjectUuid); | 
 |  | 
 |   if (ret == RPC_S_OK) | 
 |     *Binding = (RPC_BINDING_HANDLE)bind; | 
 |   else | 
 |     RPCRT4_ReleaseBinding(bind); | 
 |  | 
 |   return ret; | 
 | } | 
 |    | 
 | /*********************************************************************** | 
 |  *             RpcBindingToStringBindingA (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingToStringBindingA( RPC_BINDING_HANDLE Binding, RPC_CSTR *StringBinding ) | 
 | { | 
 |   RPC_STATUS ret; | 
 |   RpcBinding* bind = Binding; | 
 |   RPC_CSTR ObjectUuid; | 
 |  | 
 |   TRACE("(%p,%p)\n", Binding, StringBinding); | 
 |  | 
 |   if (UuidIsNil(&bind->ObjectUuid, &ret)) | 
 |     ObjectUuid = NULL; | 
 |   else | 
 |   { | 
 |     ret = UuidToStringA(&bind->ObjectUuid, &ObjectUuid); | 
 |     if (ret != RPC_S_OK) return ret; | 
 |   } | 
 |  | 
 |   ret = RpcStringBindingComposeA(ObjectUuid, (unsigned char*)bind->Protseq, (unsigned char*) bind->NetworkAddr, | 
 |                                  (unsigned char*) bind->Endpoint, NULL, StringBinding); | 
 |  | 
 |   RpcStringFreeA(&ObjectUuid); | 
 |  | 
 |   return ret; | 
 | } | 
 |    | 
 | /*********************************************************************** | 
 |  *             RpcBindingToStringBindingW (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingToStringBindingW( RPC_BINDING_HANDLE Binding, RPC_WSTR *StringBinding ) | 
 | { | 
 |   RPC_STATUS ret; | 
 |   unsigned char *str = NULL; | 
 |   TRACE("(%p,%p)\n", Binding, StringBinding); | 
 |   ret = RpcBindingToStringBindingA(Binding, &str); | 
 |   *StringBinding = RPCRT4_strdupAtoW((char*)str); | 
 |   RpcStringFreeA(&str); | 
 |   return ret; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             I_RpcBindingInqTransportType (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI I_RpcBindingInqTransportType( RPC_BINDING_HANDLE Binding, unsigned int * Type ) | 
 | { | 
 |  | 
 |   FIXME( "(%p,%p): stub\n", Binding, Type); | 
 |   *Type = TRANSPORT_TYPE_LPC; | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             I_RpcBindingSetAsync (RPCRT4.@) | 
 |  * NOTES | 
 |  *  Exists in win9x and winNT, but with different number of arguments | 
 |  *  (9x version has 3 arguments, NT has 2). | 
 |  */ | 
 | RPC_STATUS WINAPI I_RpcBindingSetAsync( RPC_BINDING_HANDLE Binding, RPC_BLOCKING_FN BlockingFn) | 
 | { | 
 |   RpcBinding* bind = Binding; | 
 |  | 
 |   TRACE( "(%p,%p): stub\n", Binding, BlockingFn ); | 
 |  | 
 |   bind->BlockingFn = BlockingFn; | 
 |  | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingCopy (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS RPC_ENTRY RpcBindingCopy( | 
 |   RPC_BINDING_HANDLE SourceBinding, | 
 |   RPC_BINDING_HANDLE* DestinationBinding) | 
 | { | 
 |   RpcBinding *DestBinding; | 
 |   RpcBinding *SrcBinding = SourceBinding; | 
 |   RPC_STATUS status; | 
 |  | 
 |   TRACE("(%p, %p)\n", SourceBinding, DestinationBinding); | 
 |  | 
 |   status = RPCRT4_AllocBinding(&DestBinding, SrcBinding->server); | 
 |   if (status != RPC_S_OK) return status; | 
 |  | 
 |   DestBinding->ObjectUuid = SrcBinding->ObjectUuid; | 
 |   DestBinding->BlockingFn = SrcBinding->BlockingFn; | 
 |   DestBinding->Protseq = RPCRT4_strndupA(SrcBinding->Protseq, -1); | 
 |   DestBinding->NetworkAddr = RPCRT4_strndupA(SrcBinding->NetworkAddr, -1); | 
 |   DestBinding->Endpoint = RPCRT4_strndupA(SrcBinding->Endpoint, -1); | 
 |   DestBinding->NetworkOptions = RPCRT4_strdupW(SrcBinding->NetworkOptions); | 
 |   if (SrcBinding->Assoc) SrcBinding->Assoc->refs++; | 
 |   DestBinding->Assoc = SrcBinding->Assoc; | 
 |  | 
 |   if (SrcBinding->AuthInfo) RpcAuthInfo_AddRef(SrcBinding->AuthInfo); | 
 |   DestBinding->AuthInfo = SrcBinding->AuthInfo; | 
 |   if (SrcBinding->QOS) RpcQualityOfService_AddRef(SrcBinding->QOS); | 
 |   DestBinding->QOS = SrcBinding->QOS; | 
 |  | 
 |   *DestinationBinding = DestBinding; | 
 |   return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingReset (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS RPC_ENTRY RpcBindingReset(RPC_BINDING_HANDLE Binding) | 
 | { | 
 |     RpcBinding *bind = Binding; | 
 |  | 
 |     TRACE("(%p)\n", Binding); | 
 |  | 
 |     RPCRT4_strfree(bind->Endpoint); | 
 |     bind->Endpoint = NULL; | 
 |     if (bind->Assoc) RpcAssoc_Release(bind->Assoc); | 
 |     bind->Assoc = NULL; | 
 |  | 
 |     return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcImpersonateClient (RPCRT4.@) | 
 |  * | 
 |  * Impersonates the client connected via a binding handle so that security | 
 |  * checks are done in the context of the client. | 
 |  * | 
 |  * PARAMS | 
 |  *  BindingHandle [I] Handle to the binding to the client. | 
 |  * | 
 |  * RETURNS | 
 |  *  Success: RPS_S_OK. | 
 |  *  Failure: RPC_STATUS value. | 
 |  * | 
 |  * NOTES | 
 |  * | 
 |  * If BindingHandle is NULL then the function impersonates the client | 
 |  * connected to the binding handle of the current thread. | 
 |  */ | 
 | RPC_STATUS WINAPI RpcImpersonateClient(RPC_BINDING_HANDLE BindingHandle) | 
 | { | 
 |     RpcBinding *bind; | 
 |  | 
 |     TRACE("(%p)\n", BindingHandle); | 
 |  | 
 |     if (!BindingHandle) BindingHandle = I_RpcGetCurrentCallHandle(); | 
 |     if (!BindingHandle) return RPC_S_INVALID_BINDING; | 
 |  | 
 |     bind = BindingHandle; | 
 |     if (bind->FromConn) | 
 |         return rpcrt4_conn_impersonate_client(bind->FromConn); | 
 |     return RPC_S_WRONG_KIND_OF_BINDING; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcRevertToSelfEx (RPCRT4.@) | 
 |  * | 
 |  * Stops impersonating the client connected to the binding handle so that security | 
 |  * checks are no longer done in the context of the client. | 
 |  * | 
 |  * PARAMS | 
 |  *  BindingHandle [I] Handle to the binding to the client. | 
 |  * | 
 |  * RETURNS | 
 |  *  Success: RPS_S_OK. | 
 |  *  Failure: RPC_STATUS value. | 
 |  * | 
 |  * NOTES | 
 |  * | 
 |  * If BindingHandle is NULL then the function stops impersonating the client | 
 |  * connected to the binding handle of the current thread. | 
 |  */ | 
 | RPC_STATUS WINAPI RpcRevertToSelfEx(RPC_BINDING_HANDLE BindingHandle) | 
 | { | 
 |     RpcBinding *bind; | 
 |  | 
 |     TRACE("(%p)\n", BindingHandle); | 
 |  | 
 |     if (!BindingHandle) BindingHandle = I_RpcGetCurrentCallHandle(); | 
 |     if (!BindingHandle) return RPC_S_INVALID_BINDING; | 
 |  | 
 |     bind = BindingHandle; | 
 |     if (bind->FromConn) | 
 |         return rpcrt4_conn_revert_to_self(bind->FromConn); | 
 |     return RPC_S_WRONG_KIND_OF_BINDING; | 
 | } | 
 |  | 
 | static inline BOOL has_nt_auth_identity(ULONG AuthnLevel) | 
 | { | 
 |     switch (AuthnLevel) | 
 |     { | 
 |     case RPC_C_AUTHN_GSS_NEGOTIATE: | 
 |     case RPC_C_AUTHN_WINNT: | 
 |     case RPC_C_AUTHN_GSS_KERBEROS: | 
 |         return TRUE; | 
 |     default: | 
 |         return FALSE; | 
 |     } | 
 | } | 
 |  | 
 | RPC_STATUS RpcAuthInfo_Create(ULONG AuthnLevel, ULONG AuthnSvc, | 
 |                               CredHandle cred, TimeStamp exp, | 
 |                               ULONG cbMaxToken, | 
 |                               RPC_AUTH_IDENTITY_HANDLE identity, | 
 |                               RpcAuthInfo **ret) | 
 | { | 
 |     RpcAuthInfo *AuthInfo = HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo)); | 
 |     if (!AuthInfo) | 
 |         return ERROR_OUTOFMEMORY; | 
 |  | 
 |     AuthInfo->refs = 1; | 
 |     AuthInfo->AuthnLevel = AuthnLevel; | 
 |     AuthInfo->AuthnSvc = AuthnSvc; | 
 |     AuthInfo->cred = cred; | 
 |     AuthInfo->exp = exp; | 
 |     AuthInfo->cbMaxToken = cbMaxToken; | 
 |     AuthInfo->identity = identity; | 
 |     AuthInfo->server_principal_name = NULL; | 
 |  | 
 |     /* duplicate the SEC_WINNT_AUTH_IDENTITY structure, if applicable, to | 
 |      * enable better matching in RpcAuthInfo_IsEqual */ | 
 |     if (identity && has_nt_auth_identity(AuthnSvc)) | 
 |     { | 
 |         const SEC_WINNT_AUTH_IDENTITY_W *nt_identity = identity; | 
 |         AuthInfo->nt_identity = HeapAlloc(GetProcessHeap(), 0, sizeof(*AuthInfo->nt_identity)); | 
 |         if (!AuthInfo->nt_identity) | 
 |         { | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo); | 
 |             return ERROR_OUTOFMEMORY; | 
 |         } | 
 |  | 
 |         AuthInfo->nt_identity->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE; | 
 |         if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE) | 
 |             AuthInfo->nt_identity->User = RPCRT4_strndupW(nt_identity->User, nt_identity->UserLength); | 
 |         else | 
 |             AuthInfo->nt_identity->User = RPCRT4_strndupAtoW((const char *)nt_identity->User, nt_identity->UserLength); | 
 |         AuthInfo->nt_identity->UserLength = nt_identity->UserLength; | 
 |         if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE) | 
 |             AuthInfo->nt_identity->Domain = RPCRT4_strndupW(nt_identity->Domain, nt_identity->DomainLength); | 
 |         else | 
 |             AuthInfo->nt_identity->Domain = RPCRT4_strndupAtoW((const char *)nt_identity->Domain, nt_identity->DomainLength); | 
 |         AuthInfo->nt_identity->DomainLength = nt_identity->DomainLength; | 
 |         if (nt_identity->Flags & SEC_WINNT_AUTH_IDENTITY_UNICODE) | 
 |             AuthInfo->nt_identity->Password = RPCRT4_strndupW(nt_identity->Password, nt_identity->PasswordLength); | 
 |         else | 
 |             AuthInfo->nt_identity->Password = RPCRT4_strndupAtoW((const char *)nt_identity->Password, nt_identity->PasswordLength); | 
 |         AuthInfo->nt_identity->PasswordLength = nt_identity->PasswordLength; | 
 |  | 
 |         if ((nt_identity->User && !AuthInfo->nt_identity->User) || | 
 |             (nt_identity->Domain && !AuthInfo->nt_identity->Domain) || | 
 |             (nt_identity->Password && !AuthInfo->nt_identity->Password)) | 
 |         { | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->User); | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Domain); | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Password); | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity); | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo); | 
 |             return ERROR_OUTOFMEMORY; | 
 |         } | 
 |     } | 
 |     else | 
 |         AuthInfo->nt_identity = NULL; | 
 |     *ret = AuthInfo; | 
 |     return RPC_S_OK; | 
 | } | 
 |  | 
 | ULONG RpcAuthInfo_AddRef(RpcAuthInfo *AuthInfo) | 
 | { | 
 |     return InterlockedIncrement(&AuthInfo->refs); | 
 | } | 
 |  | 
 | ULONG RpcAuthInfo_Release(RpcAuthInfo *AuthInfo) | 
 | { | 
 |     ULONG refs = InterlockedDecrement(&AuthInfo->refs); | 
 |  | 
 |     if (!refs) | 
 |     { | 
 |         FreeCredentialsHandle(&AuthInfo->cred); | 
 |         if (AuthInfo->nt_identity) | 
 |         { | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->User); | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Domain); | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity->Password); | 
 |             HeapFree(GetProcessHeap(), 0, AuthInfo->nt_identity); | 
 |         } | 
 |         HeapFree(GetProcessHeap(), 0, AuthInfo->server_principal_name); | 
 |         HeapFree(GetProcessHeap(), 0, AuthInfo); | 
 |     } | 
 |  | 
 |     return refs; | 
 | } | 
 |  | 
 | BOOL RpcAuthInfo_IsEqual(const RpcAuthInfo *AuthInfo1, const RpcAuthInfo *AuthInfo2) | 
 | { | 
 |     if (AuthInfo1 == AuthInfo2) | 
 |         return TRUE; | 
 |  | 
 |     if (!AuthInfo1 || !AuthInfo2) | 
 |         return FALSE; | 
 |  | 
 |     if ((AuthInfo1->AuthnLevel != AuthInfo2->AuthnLevel) || | 
 |         (AuthInfo1->AuthnSvc != AuthInfo2->AuthnSvc)) | 
 |         return FALSE; | 
 |  | 
 |     if (AuthInfo1->identity == AuthInfo2->identity) | 
 |         return TRUE; | 
 |  | 
 |     if (!AuthInfo1->identity || !AuthInfo2->identity) | 
 |         return FALSE; | 
 |  | 
 |     if (has_nt_auth_identity(AuthInfo1->AuthnSvc)) | 
 |     { | 
 |         const SEC_WINNT_AUTH_IDENTITY_W *identity1 = AuthInfo1->nt_identity; | 
 |         const SEC_WINNT_AUTH_IDENTITY_W *identity2 = AuthInfo2->nt_identity; | 
 |         /* compare user names */ | 
 |         if (identity1->UserLength != identity2->UserLength || | 
 |             memcmp(identity1->User, identity2->User, identity1->UserLength)) | 
 |             return FALSE; | 
 |         /* compare domain names */ | 
 |         if (identity1->DomainLength != identity2->DomainLength || | 
 |             memcmp(identity1->Domain, identity2->Domain, identity1->DomainLength)) | 
 |             return FALSE; | 
 |         /* compare passwords */ | 
 |         if (identity1->PasswordLength != identity2->PasswordLength || | 
 |             memcmp(identity1->Password, identity2->Password, identity1->PasswordLength)) | 
 |             return FALSE; | 
 |     } | 
 |     else | 
 |         return FALSE; | 
 |  | 
 |     return TRUE; | 
 | } | 
 |  | 
 | static RPC_STATUS RpcQualityOfService_Create(const RPC_SECURITY_QOS *qos_src, BOOL unicode, RpcQualityOfService **qos_dst) | 
 | { | 
 |     RpcQualityOfService *qos = HeapAlloc(GetProcessHeap(), 0, sizeof(*qos)); | 
 |  | 
 |     if (!qos) | 
 |         return RPC_S_OUT_OF_RESOURCES; | 
 |  | 
 |     qos->refs = 1; | 
 |     qos->qos = HeapAlloc(GetProcessHeap(), 0, sizeof(*qos->qos)); | 
 |     if (!qos->qos) goto error; | 
 |     qos->qos->Version = qos_src->Version; | 
 |     qos->qos->Capabilities = qos_src->Capabilities; | 
 |     qos->qos->IdentityTracking = qos_src->IdentityTracking; | 
 |     qos->qos->ImpersonationType = qos_src->ImpersonationType; | 
 |     qos->qos->AdditionalSecurityInfoType = 0; | 
 |  | 
 |     if (qos_src->Version >= 2) | 
 |     { | 
 |         const RPC_SECURITY_QOS_V2_W *qos_src2 = (const RPC_SECURITY_QOS_V2_W *)qos_src; | 
 |         qos->qos->AdditionalSecurityInfoType = qos_src2->AdditionalSecurityInfoType; | 
 |         if (qos_src2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) | 
 |         { | 
 |             const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials_src = qos_src2->u.HttpCredentials; | 
 |             RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials_dst; | 
 |  | 
 |             http_credentials_dst = HeapAlloc(GetProcessHeap(), 0, sizeof(*http_credentials_dst)); | 
 |             qos->qos->u.HttpCredentials = http_credentials_dst; | 
 |             if (!http_credentials_dst) goto error; | 
 |             http_credentials_dst->TransportCredentials = NULL; | 
 |             http_credentials_dst->Flags = http_credentials_src->Flags; | 
 |             http_credentials_dst->AuthenticationTarget = http_credentials_src->AuthenticationTarget; | 
 |             http_credentials_dst->NumberOfAuthnSchemes = http_credentials_src->NumberOfAuthnSchemes; | 
 |             http_credentials_dst->AuthnSchemes = NULL; | 
 |             http_credentials_dst->ServerCertificateSubject = NULL; | 
 |             if (http_credentials_src->TransportCredentials) | 
 |             { | 
 |                 SEC_WINNT_AUTH_IDENTITY_W *cred_dst; | 
 |                 cred_dst = http_credentials_dst->TransportCredentials = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(*cred_dst)); | 
 |                 if (!cred_dst) goto error; | 
 |                 cred_dst->Flags = SEC_WINNT_AUTH_IDENTITY_UNICODE; | 
 |                 if (unicode) | 
 |                 { | 
 |                     const SEC_WINNT_AUTH_IDENTITY_W *cred_src = http_credentials_src->TransportCredentials; | 
 |                     cred_dst->UserLength = cred_src->UserLength; | 
 |                     cred_dst->PasswordLength = cred_src->PasswordLength; | 
 |                     cred_dst->DomainLength = cred_src->DomainLength; | 
 |                     cred_dst->User = RPCRT4_strndupW(cred_src->User, cred_src->UserLength); | 
 |                     cred_dst->Password = RPCRT4_strndupW(cred_src->Password, cred_src->PasswordLength); | 
 |                     cred_dst->Domain = RPCRT4_strndupW(cred_src->Domain, cred_src->DomainLength); | 
 |                 } | 
 |                 else | 
 |                 { | 
 |                     const SEC_WINNT_AUTH_IDENTITY_A *cred_src = (const SEC_WINNT_AUTH_IDENTITY_A *)http_credentials_src->TransportCredentials; | 
 |                     cred_dst->UserLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->User, cred_src->UserLength, NULL, 0); | 
 |                     cred_dst->DomainLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Domain, cred_src->DomainLength, NULL, 0); | 
 |                     cred_dst->PasswordLength = MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Password, cred_src->PasswordLength, NULL, 0); | 
 |                     cred_dst->User = HeapAlloc(GetProcessHeap(), 0, cred_dst->UserLength * sizeof(WCHAR)); | 
 |                     cred_dst->Password = HeapAlloc(GetProcessHeap(), 0, cred_dst->PasswordLength * sizeof(WCHAR)); | 
 |                     cred_dst->Domain = HeapAlloc(GetProcessHeap(), 0, cred_dst->DomainLength * sizeof(WCHAR)); | 
 |                     if (!cred_dst->Password || !cred_dst->Domain) goto error; | 
 |                     MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->User, cred_src->UserLength, cred_dst->User, cred_dst->UserLength); | 
 |                     MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Domain, cred_src->DomainLength, cred_dst->Domain, cred_dst->DomainLength); | 
 |                     MultiByteToWideChar(CP_ACP, 0, (char *)cred_src->Password, cred_src->PasswordLength, cred_dst->Password, cred_dst->PasswordLength); | 
 |                 } | 
 |             } | 
 |             if (http_credentials_src->NumberOfAuthnSchemes) | 
 |             { | 
 |                 http_credentials_dst->AuthnSchemes = HeapAlloc(GetProcessHeap(), 0, http_credentials_src->NumberOfAuthnSchemes * sizeof(*http_credentials_dst->AuthnSchemes)); | 
 |                 if (!http_credentials_dst->AuthnSchemes) goto error; | 
 |                 memcpy(http_credentials_dst->AuthnSchemes, http_credentials_src->AuthnSchemes, http_credentials_src->NumberOfAuthnSchemes * sizeof(*http_credentials_dst->AuthnSchemes)); | 
 |             } | 
 |             if (http_credentials_src->ServerCertificateSubject) | 
 |             { | 
 |                 if (unicode) | 
 |                     http_credentials_dst->ServerCertificateSubject = | 
 |                         RPCRT4_strndupW(http_credentials_src->ServerCertificateSubject, | 
 |                                         strlenW(http_credentials_src->ServerCertificateSubject)); | 
 |                 else | 
 |                     http_credentials_dst->ServerCertificateSubject = | 
 |                         RPCRT4_strdupAtoW((char *)http_credentials_src->ServerCertificateSubject); | 
 |                 if (!http_credentials_dst->ServerCertificateSubject) goto error; | 
 |             } | 
 |         } | 
 |     } | 
 |     *qos_dst = qos; | 
 |     return RPC_S_OK; | 
 |  | 
 | error: | 
 |     if (qos->qos) | 
 |     { | 
 |         if (qos->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP && | 
 |             qos->qos->u.HttpCredentials) | 
 |         { | 
 |             if (qos->qos->u.HttpCredentials->TransportCredentials) | 
 |             { | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->User); | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Domain); | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Password); | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials); | 
 |             } | 
 |             HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->AuthnSchemes); | 
 |             HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->ServerCertificateSubject); | 
 |             HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials); | 
 |         } | 
 |         HeapFree(GetProcessHeap(), 0, qos->qos); | 
 |     } | 
 |     HeapFree(GetProcessHeap(), 0, qos); | 
 |     return RPC_S_OUT_OF_RESOURCES; | 
 | } | 
 |  | 
 | ULONG RpcQualityOfService_AddRef(RpcQualityOfService *qos) | 
 | { | 
 |     return InterlockedIncrement(&qos->refs); | 
 | } | 
 |  | 
 | ULONG RpcQualityOfService_Release(RpcQualityOfService *qos) | 
 | { | 
 |     ULONG refs = InterlockedDecrement(&qos->refs); | 
 |  | 
 |     if (!refs) | 
 |     { | 
 |         if (qos->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) | 
 |         { | 
 |             if (qos->qos->u.HttpCredentials->TransportCredentials) | 
 |             { | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->User); | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Domain); | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials->Password); | 
 |                 HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->TransportCredentials); | 
 |             } | 
 |             HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->AuthnSchemes); | 
 |             HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials->ServerCertificateSubject); | 
 |             HeapFree(GetProcessHeap(), 0, qos->qos->u.HttpCredentials); | 
 |         } | 
 |         HeapFree(GetProcessHeap(), 0, qos->qos); | 
 |         HeapFree(GetProcessHeap(), 0, qos); | 
 |     } | 
 |     return refs; | 
 | } | 
 |  | 
 | BOOL RpcQualityOfService_IsEqual(const RpcQualityOfService *qos1, const RpcQualityOfService *qos2) | 
 | { | 
 |     if (qos1 == qos2) | 
 |         return TRUE; | 
 |  | 
 |     if (!qos1 || !qos2) | 
 |         return FALSE; | 
 |  | 
 |     TRACE("qos1 = { %d %d %d %d }, qos2 = { %d %d %d %d }\n", | 
 |         qos1->qos->Capabilities, qos1->qos->IdentityTracking, | 
 |         qos1->qos->ImpersonationType, qos1->qos->AdditionalSecurityInfoType, | 
 |         qos2->qos->Capabilities, qos2->qos->IdentityTracking, | 
 |         qos2->qos->ImpersonationType, qos2->qos->AdditionalSecurityInfoType); | 
 |  | 
 |     if ((qos1->qos->Capabilities != qos2->qos->Capabilities) || | 
 |         (qos1->qos->IdentityTracking != qos2->qos->IdentityTracking) || | 
 |         (qos1->qos->ImpersonationType != qos2->qos->ImpersonationType) || | 
 |         (qos1->qos->AdditionalSecurityInfoType != qos2->qos->AdditionalSecurityInfoType)) | 
 |         return FALSE; | 
 |  | 
 |     if (qos1->qos->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) | 
 |     { | 
 |         const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials1 = qos1->qos->u.HttpCredentials; | 
 |         const RPC_HTTP_TRANSPORT_CREDENTIALS_W *http_credentials2 = qos2->qos->u.HttpCredentials; | 
 |  | 
 |         if (http_credentials1->Flags != http_credentials2->Flags) | 
 |             return FALSE; | 
 |  | 
 |         if (http_credentials1->AuthenticationTarget != http_credentials2->AuthenticationTarget) | 
 |             return FALSE; | 
 |  | 
 |         /* authentication schemes and server certificate subject not currently used */ | 
 |  | 
 |         if (http_credentials1->TransportCredentials != http_credentials2->TransportCredentials) | 
 |         { | 
 |             const SEC_WINNT_AUTH_IDENTITY_W *identity1 = http_credentials1->TransportCredentials; | 
 |             const SEC_WINNT_AUTH_IDENTITY_W *identity2 = http_credentials2->TransportCredentials; | 
 |  | 
 |             if (!identity1 || !identity2) | 
 |                 return FALSE; | 
 |  | 
 |             /* compare user names */ | 
 |             if (identity1->UserLength != identity2->UserLength || | 
 |                 memcmp(identity1->User, identity2->User, identity1->UserLength)) | 
 |                 return FALSE; | 
 |             /* compare domain names */ | 
 |             if (identity1->DomainLength != identity2->DomainLength || | 
 |                 memcmp(identity1->Domain, identity2->Domain, identity1->DomainLength)) | 
 |                 return FALSE; | 
 |             /* compare passwords */ | 
 |             if (identity1->PasswordLength != identity2->PasswordLength || | 
 |                 memcmp(identity1->Password, identity2->Password, identity1->PasswordLength)) | 
 |                 return FALSE; | 
 |         } | 
 |     } | 
 |  | 
 |     return TRUE; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcRevertToSelf (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcRevertToSelf(void) | 
 | { | 
 |     TRACE("\n"); | 
 |     return RpcRevertToSelfEx(NULL); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcMgmtSetComTimeout (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcMgmtSetComTimeout(RPC_BINDING_HANDLE BindingHandle, unsigned int Timeout) | 
 | { | 
 |     FIXME("(%p, %d): stub\n", BindingHandle, Timeout); | 
 |     return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthInfoExA (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthInfoExA( RPC_BINDING_HANDLE Binding, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, | 
 |                           ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc, | 
 |                           ULONG RpcQosVersion, RPC_SECURITY_QOS *SecurityQOS ) | 
 | { | 
 |     RPC_STATUS status; | 
 |     RPC_WSTR principal; | 
 |  | 
 |     TRACE("%p %p %p %p %p %p %u %p\n", Binding, ServerPrincName, AuthnLevel, | 
 |           AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS); | 
 |  | 
 |     status = RpcBindingInqAuthInfoExW(Binding, ServerPrincName ? &principal : NULL, AuthnLevel, | 
 |                                       AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS); | 
 |     if (status == RPC_S_OK && ServerPrincName) | 
 |     { | 
 |         *ServerPrincName = (RPC_CSTR)RPCRT4_strdupWtoA(principal); | 
 |         RpcStringFreeW(&principal); | 
 |         if (!*ServerPrincName) return ERROR_OUTOFMEMORY; | 
 |     } | 
 |  | 
 |     return status; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthInfoExW (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthInfoExW( RPC_BINDING_HANDLE Binding, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, | 
 |                           ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc, | 
 |                           ULONG RpcQosVersion, RPC_SECURITY_QOS *SecurityQOS ) | 
 | { | 
 |     RpcBinding *bind = Binding; | 
 |  | 
 |     TRACE("%p %p %p %p %p %p %u %p\n", Binding, ServerPrincName, AuthnLevel, | 
 |           AuthnSvc, AuthIdentity, AuthzSvc, RpcQosVersion, SecurityQOS); | 
 |  | 
 |     if (!bind->AuthInfo) return RPC_S_BINDING_HAS_NO_AUTH; | 
 |  | 
 |     if (SecurityQOS) | 
 |     { | 
 |         FIXME("QOS not implemented\n"); | 
 |         return RPC_S_INVALID_BINDING; | 
 |     } | 
 |  | 
 |     if (ServerPrincName) | 
 |     { | 
 |         if (bind->AuthInfo->server_principal_name) | 
 |         { | 
 |             *ServerPrincName = RPCRT4_strdupW(bind->AuthInfo->server_principal_name); | 
 |             if (!*ServerPrincName) return ERROR_OUTOFMEMORY; | 
 |         } | 
 |         else *ServerPrincName = NULL; | 
 |     } | 
 |     if (AuthnLevel) *AuthnLevel = bind->AuthInfo->AuthnLevel; | 
 |     if (AuthnSvc) *AuthnSvc = bind->AuthInfo->AuthnSvc; | 
 |     if (AuthIdentity) *AuthIdentity = bind->AuthInfo->identity; | 
 |     if (AuthzSvc) | 
 |     { | 
 |         FIXME("authorization service not implemented\n"); | 
 |         *AuthzSvc = RPC_C_AUTHZ_NONE; | 
 |     } | 
 |  | 
 |     return RPC_S_OK; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthInfoA (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthInfoA( RPC_BINDING_HANDLE Binding, RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, | 
 |                         ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc ) | 
 | { | 
 |     return RpcBindingInqAuthInfoExA(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, | 
 |                                     AuthzSvc, 0, NULL); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthInfoW (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthInfoW( RPC_BINDING_HANDLE Binding, RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, | 
 |                         ULONG *AuthnSvc, RPC_AUTH_IDENTITY_HANDLE *AuthIdentity, ULONG *AuthzSvc ) | 
 | { | 
 |     return RpcBindingInqAuthInfoExW(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, | 
 |                                     AuthzSvc, 0, NULL); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthClientA (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthClientA( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, | 
 |                           RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, | 
 |                           ULONG *AuthzSvc ) | 
 | { | 
 |     return RpcBindingInqAuthClientExA(ClientBinding, Privs, ServerPrincName, AuthnLevel, | 
 |                                       AuthnSvc, AuthzSvc, 0); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthClientW (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthClientW( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, | 
 |                           RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, | 
 |                           ULONG *AuthzSvc ) | 
 | { | 
 |     return RpcBindingInqAuthClientExW(ClientBinding, Privs, ServerPrincName, AuthnLevel, | 
 |                                       AuthnSvc, AuthzSvc, 0); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthClientExA (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthClientExA( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, | 
 |                             RPC_CSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, | 
 |                             ULONG *AuthzSvc, ULONG Flags ) | 
 | { | 
 |     RPC_STATUS status; | 
 |     RPC_WSTR principal; | 
 |  | 
 |     TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding, Privs, ServerPrincName, AuthnLevel, | 
 |           AuthnSvc, AuthzSvc, Flags); | 
 |  | 
 |     status = RpcBindingInqAuthClientExW(ClientBinding, Privs, ServerPrincName ? &principal : NULL, | 
 |                                         AuthnLevel, AuthnSvc, AuthzSvc, Flags); | 
 |     if (status == RPC_S_OK && ServerPrincName) | 
 |     { | 
 |         *ServerPrincName = (RPC_CSTR)RPCRT4_strdupWtoA(principal); | 
 |         if (!*ServerPrincName && principal) status = ERROR_OUTOFMEMORY; | 
 |         RpcStringFreeW(&principal); | 
 |     } | 
 |  | 
 |     return status; | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingInqAuthClientExW (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingInqAuthClientExW( RPC_BINDING_HANDLE ClientBinding, RPC_AUTHZ_HANDLE *Privs, | 
 |                             RPC_WSTR *ServerPrincName, ULONG *AuthnLevel, ULONG *AuthnSvc, | 
 |                             ULONG *AuthzSvc, ULONG Flags ) | 
 | { | 
 |     RpcBinding *bind = ClientBinding; | 
 |  | 
 |     TRACE("%p %p %p %p %p %p 0x%x\n", ClientBinding, Privs, ServerPrincName, AuthnLevel, | 
 |           AuthnSvc, AuthzSvc, Flags); | 
 |  | 
 |     if (!bind->FromConn) return RPC_S_INVALID_BINDING; | 
 |  | 
 |     return rpcrt4_conn_inquire_auth_client(bind->FromConn, Privs, | 
 |                                            ServerPrincName, AuthnLevel, | 
 |                                            AuthnSvc, AuthzSvc, Flags); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingSetAuthInfoExA (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingSetAuthInfoExA( RPC_BINDING_HANDLE Binding, RPC_CSTR ServerPrincName, | 
 |                           ULONG AuthnLevel, ULONG AuthnSvc, | 
 |                           RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr, | 
 |                           RPC_SECURITY_QOS *SecurityQos ) | 
 | { | 
 |   RpcBinding* bind = Binding; | 
 |   SECURITY_STATUS r; | 
 |   CredHandle cred; | 
 |   TimeStamp exp; | 
 |   ULONG package_count; | 
 |   ULONG i; | 
 |   PSecPkgInfoA packages; | 
 |   ULONG cbMaxToken; | 
 |  | 
 |   TRACE("%p %s %u %u %p %u %p\n", Binding, debugstr_a((const char*)ServerPrincName), | 
 |         AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, SecurityQos); | 
 |  | 
 |   if (SecurityQos) | 
 |   { | 
 |       RPC_STATUS status; | 
 |  | 
 |       TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d", | 
 |             SecurityQos->Version, SecurityQos->Capabilities, SecurityQos->IdentityTracking, SecurityQos->ImpersonationType); | 
 |       if (SecurityQos->Version >= 2) | 
 |       { | 
 |           const RPC_SECURITY_QOS_V2_A *SecurityQos2 = (const RPC_SECURITY_QOS_V2_A *)SecurityQos; | 
 |           TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2->AdditionalSecurityInfoType); | 
 |           if (SecurityQos2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) | 
 |               TRACE(", { %p, 0x%x, %d, %d, %p, %s }", | 
 |                     SecurityQos2->u.HttpCredentials->TransportCredentials, | 
 |                     SecurityQos2->u.HttpCredentials->Flags, | 
 |                     SecurityQos2->u.HttpCredentials->AuthenticationTarget, | 
 |                     SecurityQos2->u.HttpCredentials->NumberOfAuthnSchemes, | 
 |                     SecurityQos2->u.HttpCredentials->AuthnSchemes, | 
 |                     SecurityQos2->u.HttpCredentials->ServerCertificateSubject); | 
 |       } | 
 |       TRACE("}\n"); | 
 |       status = RpcQualityOfService_Create(SecurityQos, FALSE, &bind->QOS); | 
 |       if (status != RPC_S_OK) | 
 |           return status; | 
 |   } | 
 |   else | 
 |   { | 
 |       if (bind->QOS) RpcQualityOfService_Release(bind->QOS); | 
 |       bind->QOS = NULL; | 
 |   } | 
 |  | 
 |   if (AuthnSvc == RPC_C_AUTHN_DEFAULT) | 
 |     AuthnSvc = RPC_C_AUTHN_WINNT; | 
 |  | 
 |   /* FIXME: the mapping should probably be retrieved using SSPI somehow */ | 
 |   if (AuthnLevel == RPC_C_AUTHN_LEVEL_DEFAULT) | 
 |     AuthnLevel = RPC_C_AUTHN_LEVEL_NONE; | 
 |  | 
 |   if ((AuthnLevel == RPC_C_AUTHN_LEVEL_NONE) || (AuthnSvc == RPC_C_AUTHN_NONE)) | 
 |   { | 
 |     if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); | 
 |     bind->AuthInfo = NULL; | 
 |     return RPC_S_OK; | 
 |   } | 
 |  | 
 |   if (AuthnLevel > RPC_C_AUTHN_LEVEL_PKT_PRIVACY) | 
 |   { | 
 |     FIXME("unknown AuthnLevel %u\n", AuthnLevel); | 
 |     return RPC_S_UNKNOWN_AUTHN_LEVEL; | 
 |   } | 
 |  | 
 |   /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */ | 
 |   if (AuthzSvr && AuthnSvc != RPC_C_AUTHN_WINNT) | 
 |   { | 
 |     FIXME("unsupported AuthzSvr %u\n", AuthzSvr); | 
 |     return RPC_S_UNKNOWN_AUTHZ_SERVICE; | 
 |   } | 
 |  | 
 |   r = EnumerateSecurityPackagesA(&package_count, &packages); | 
 |   if (r != SEC_E_OK) | 
 |   { | 
 |     ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n", r); | 
 |     return RPC_S_SEC_PKG_ERROR; | 
 |   } | 
 |  | 
 |   for (i = 0; i < package_count; i++) | 
 |     if (packages[i].wRPCID == AuthnSvc) | 
 |         break; | 
 |  | 
 |   if (i == package_count) | 
 |   { | 
 |     FIXME("unsupported AuthnSvc %u\n", AuthnSvc); | 
 |     FreeContextBuffer(packages); | 
 |     return RPC_S_UNKNOWN_AUTHN_SERVICE; | 
 |   } | 
 |  | 
 |   TRACE("found package %s for service %u\n", packages[i].Name, AuthnSvc); | 
 |   r = AcquireCredentialsHandleA(NULL, packages[i].Name, SECPKG_CRED_OUTBOUND, NULL, | 
 |                                 AuthIdentity, NULL, NULL, &cred, &exp); | 
 |   cbMaxToken = packages[i].cbMaxToken; | 
 |   FreeContextBuffer(packages); | 
 |   if (r == ERROR_SUCCESS) | 
 |   { | 
 |     RpcAuthInfo *new_auth_info; | 
 |     r = RpcAuthInfo_Create(AuthnLevel, AuthnSvc, cred, exp, cbMaxToken, | 
 |                            AuthIdentity, &new_auth_info); | 
 |     if (r == RPC_S_OK) | 
 |     { | 
 |       new_auth_info->server_principal_name = RPCRT4_strdupAtoW((char *)ServerPrincName); | 
 |       if (new_auth_info->server_principal_name) | 
 |       { | 
 |         if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); | 
 |         bind->AuthInfo = new_auth_info; | 
 |       } | 
 |       else | 
 |       { | 
 |         RpcAuthInfo_Release(new_auth_info); | 
 |         r = ERROR_OUTOFMEMORY; | 
 |       } | 
 |     } | 
 |     else | 
 |       FreeCredentialsHandle(&cred); | 
 |     return r; | 
 |   } | 
 |   else | 
 |   { | 
 |     ERR("AcquireCredentialsHandleA failed with error 0x%08x\n", r); | 
 |     return RPC_S_SEC_PKG_ERROR; | 
 |   } | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingSetAuthInfoExW (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingSetAuthInfoExW( RPC_BINDING_HANDLE Binding, RPC_WSTR ServerPrincName, ULONG AuthnLevel, | 
 |                           ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr, | 
 |                           RPC_SECURITY_QOS *SecurityQos ) | 
 | { | 
 |   RpcBinding* bind = Binding; | 
 |   SECURITY_STATUS r; | 
 |   CredHandle cred; | 
 |   TimeStamp exp; | 
 |   ULONG package_count; | 
 |   ULONG i; | 
 |   PSecPkgInfoW packages; | 
 |   ULONG cbMaxToken; | 
 |  | 
 |   TRACE("%p %s %u %u %p %u %p\n", Binding, debugstr_w(ServerPrincName), | 
 |         AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, SecurityQos); | 
 |  | 
 |   if (SecurityQos) | 
 |   { | 
 |       RPC_STATUS status; | 
 |  | 
 |       TRACE("SecurityQos { Version=%d, Capabilities=0x%x, IdentityTracking=%d, ImpersonationLevel=%d", | 
 |             SecurityQos->Version, SecurityQos->Capabilities, SecurityQos->IdentityTracking, SecurityQos->ImpersonationType); | 
 |       if (SecurityQos->Version >= 2) | 
 |       { | 
 |           const RPC_SECURITY_QOS_V2_W *SecurityQos2 = (const RPC_SECURITY_QOS_V2_W *)SecurityQos; | 
 |           TRACE(", AdditionalSecurityInfoType=%d", SecurityQos2->AdditionalSecurityInfoType); | 
 |           if (SecurityQos2->AdditionalSecurityInfoType == RPC_C_AUTHN_INFO_TYPE_HTTP) | 
 |               TRACE(", { %p, 0x%x, %d, %d, %p, %s }", | 
 |                     SecurityQos2->u.HttpCredentials->TransportCredentials, | 
 |                     SecurityQos2->u.HttpCredentials->Flags, | 
 |                     SecurityQos2->u.HttpCredentials->AuthenticationTarget, | 
 |                     SecurityQos2->u.HttpCredentials->NumberOfAuthnSchemes, | 
 |                     SecurityQos2->u.HttpCredentials->AuthnSchemes, | 
 |                     debugstr_w(SecurityQos2->u.HttpCredentials->ServerCertificateSubject)); | 
 |       } | 
 |       TRACE("}\n"); | 
 |       status = RpcQualityOfService_Create(SecurityQos, TRUE, &bind->QOS); | 
 |       if (status != RPC_S_OK) | 
 |           return status; | 
 |   } | 
 |   else | 
 |   { | 
 |       if (bind->QOS) RpcQualityOfService_Release(bind->QOS); | 
 |       bind->QOS = NULL; | 
 |   } | 
 |  | 
 |   if (AuthnSvc == RPC_C_AUTHN_DEFAULT) | 
 |     AuthnSvc = RPC_C_AUTHN_WINNT; | 
 |  | 
 |   /* FIXME: the mapping should probably be retrieved using SSPI somehow */ | 
 |   if (AuthnLevel == RPC_C_AUTHN_LEVEL_DEFAULT) | 
 |     AuthnLevel = RPC_C_AUTHN_LEVEL_NONE; | 
 |  | 
 |   if ((AuthnLevel == RPC_C_AUTHN_LEVEL_NONE) || (AuthnSvc == RPC_C_AUTHN_NONE)) | 
 |   { | 
 |     if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); | 
 |     bind->AuthInfo = NULL; | 
 |     return RPC_S_OK; | 
 |   } | 
 |  | 
 |   if (AuthnLevel > RPC_C_AUTHN_LEVEL_PKT_PRIVACY) | 
 |   { | 
 |     FIXME("unknown AuthnLevel %u\n", AuthnLevel); | 
 |     return RPC_S_UNKNOWN_AUTHN_LEVEL; | 
 |   } | 
 |  | 
 |   /* RPC_C_AUTHN_WINNT ignores the AuthzSvr parameter */ | 
 |   if (AuthzSvr && AuthnSvc != RPC_C_AUTHN_WINNT) | 
 |   { | 
 |     FIXME("unsupported AuthzSvr %u\n", AuthzSvr); | 
 |     return RPC_S_UNKNOWN_AUTHZ_SERVICE; | 
 |   } | 
 |  | 
 |   r = EnumerateSecurityPackagesW(&package_count, &packages); | 
 |   if (r != SEC_E_OK) | 
 |   { | 
 |     ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n", r); | 
 |     return RPC_S_SEC_PKG_ERROR; | 
 |   } | 
 |  | 
 |   for (i = 0; i < package_count; i++) | 
 |     if (packages[i].wRPCID == AuthnSvc) | 
 |         break; | 
 |  | 
 |   if (i == package_count) | 
 |   { | 
 |     FIXME("unsupported AuthnSvc %u\n", AuthnSvc); | 
 |     FreeContextBuffer(packages); | 
 |     return RPC_S_UNKNOWN_AUTHN_SERVICE; | 
 |   } | 
 |  | 
 |   TRACE("found package %s for service %u\n", debugstr_w(packages[i].Name), AuthnSvc); | 
 |   r = AcquireCredentialsHandleW(NULL, packages[i].Name, SECPKG_CRED_OUTBOUND, NULL, | 
 |                                 AuthIdentity, NULL, NULL, &cred, &exp); | 
 |   cbMaxToken = packages[i].cbMaxToken; | 
 |   FreeContextBuffer(packages); | 
 |   if (r == ERROR_SUCCESS) | 
 |   { | 
 |     RpcAuthInfo *new_auth_info; | 
 |     r = RpcAuthInfo_Create(AuthnLevel, AuthnSvc, cred, exp, cbMaxToken, | 
 |                            AuthIdentity, &new_auth_info); | 
 |     if (r == RPC_S_OK) | 
 |     { | 
 |       new_auth_info->server_principal_name = RPCRT4_strdupW(ServerPrincName); | 
 |       if (!ServerPrincName || new_auth_info->server_principal_name) | 
 |       { | 
 |         if (bind->AuthInfo) RpcAuthInfo_Release(bind->AuthInfo); | 
 |         bind->AuthInfo = new_auth_info; | 
 |       } | 
 |       else | 
 |       { | 
 |         RpcAuthInfo_Release(new_auth_info); | 
 |         r = ERROR_OUTOFMEMORY; | 
 |       } | 
 |     } | 
 |     else | 
 |       FreeCredentialsHandle(&cred); | 
 |     return r; | 
 |   } | 
 |   else | 
 |   { | 
 |     ERR("AcquireCredentialsHandleW failed with error 0x%08x\n", r); | 
 |     return RPC_S_SEC_PKG_ERROR; | 
 |   } | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingSetAuthInfoA (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingSetAuthInfoA( RPC_BINDING_HANDLE Binding, RPC_CSTR ServerPrincName, ULONG AuthnLevel, | 
 |                         ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr ) | 
 | { | 
 |     TRACE("%p %s %u %u %p %u\n", Binding, debugstr_a((const char*)ServerPrincName), | 
 |           AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr); | 
 |     return RpcBindingSetAuthInfoExA(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, NULL); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingSetAuthInfoW (RPCRT4.@) | 
 |  */ | 
 | RPCRTAPI RPC_STATUS RPC_ENTRY | 
 | RpcBindingSetAuthInfoW( RPC_BINDING_HANDLE Binding, RPC_WSTR ServerPrincName, ULONG AuthnLevel, | 
 |                         ULONG AuthnSvc, RPC_AUTH_IDENTITY_HANDLE AuthIdentity, ULONG AuthzSvr ) | 
 | { | 
 |     TRACE("%p %s %u %u %p %u\n", Binding, debugstr_w(ServerPrincName), | 
 |           AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr); | 
 |     return RpcBindingSetAuthInfoExW(Binding, ServerPrincName, AuthnLevel, AuthnSvc, AuthIdentity, AuthzSvr, NULL); | 
 | } | 
 |  | 
 | /*********************************************************************** | 
 |  *             RpcBindingSetOption (RPCRT4.@) | 
 |  */ | 
 | RPC_STATUS WINAPI RpcBindingSetOption(RPC_BINDING_HANDLE BindingHandle, ULONG Option, ULONG_PTR OptionValue) | 
 | { | 
 |     FIXME("(%p, %d, %ld): stub\n", BindingHandle, Option, OptionValue); | 
 |     return RPC_S_OK; | 
 | } |