|  | /* | 
|  | * RPC server API | 
|  | * | 
|  | * Copyright 2001 Ove Kåven, TransGaming Technologies | 
|  | * Copyright 2004 Filip Navara | 
|  | * Copyright 2006-2008 Robert Shearman (for CodeWeavers) | 
|  | * | 
|  | * This library is free software; you can redistribute it and/or | 
|  | * modify it under the terms of the GNU Lesser General Public | 
|  | * License as published by the Free Software Foundation; either | 
|  | * version 2.1 of the License, or (at your option) any later version. | 
|  | * | 
|  | * This library is distributed in the hope that it will be useful, | 
|  | * but WITHOUT ANY WARRANTY; without even the implied warranty of | 
|  | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU | 
|  | * Lesser General Public License for more details. | 
|  | * | 
|  | * You should have received a copy of the GNU Lesser General Public | 
|  | * License along with this library; if not, write to the Free Software | 
|  | * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA | 
|  | */ | 
|  |  | 
|  | #include "config.h" | 
|  | #include "wine/port.h" | 
|  |  | 
|  | #include <stdarg.h> | 
|  | #include <stdio.h> | 
|  | #include <string.h> | 
|  | #include <assert.h> | 
|  |  | 
|  | #include "windef.h" | 
|  | #include "winbase.h" | 
|  | #include "winerror.h" | 
|  |  | 
|  | #include "rpc.h" | 
|  | #include "rpcndr.h" | 
|  | #include "excpt.h" | 
|  |  | 
|  | #include "wine/debug.h" | 
|  | #include "wine/exception.h" | 
|  |  | 
|  | #include "rpc_server.h" | 
|  | #include "rpc_assoc.h" | 
|  | #include "rpc_message.h" | 
|  | #include "rpc_defs.h" | 
|  | #include "ncastatus.h" | 
|  |  | 
|  | WINE_DEFAULT_DEBUG_CHANNEL(rpc); | 
|  |  | 
|  | typedef struct _RpcPacket | 
|  | { | 
|  | struct _RpcConnection* conn; | 
|  | RpcPktHdr* hdr; | 
|  | RPC_MESSAGE* msg; | 
|  | unsigned char *auth_data; | 
|  | ULONG auth_length; | 
|  | } RpcPacket; | 
|  |  | 
|  | typedef struct _RpcObjTypeMap | 
|  | { | 
|  | /* FIXME: a hash table would be better. */ | 
|  | struct _RpcObjTypeMap *next; | 
|  | UUID Object; | 
|  | UUID Type; | 
|  | } RpcObjTypeMap; | 
|  |  | 
|  | static RpcObjTypeMap *RpcObjTypeMaps; | 
|  |  | 
|  | /* list of type RpcServerProtseq */ | 
|  | static struct list protseqs = LIST_INIT(protseqs); | 
|  | static struct list server_interfaces = LIST_INIT(server_interfaces); | 
|  | static struct list server_registered_auth_info = LIST_INIT(server_registered_auth_info); | 
|  |  | 
|  | static CRITICAL_SECTION server_cs; | 
|  | static CRITICAL_SECTION_DEBUG server_cs_debug = | 
|  | { | 
|  | 0, 0, &server_cs, | 
|  | { &server_cs_debug.ProcessLocksList, &server_cs_debug.ProcessLocksList }, | 
|  | 0, 0, { (DWORD_PTR)(__FILE__ ": server_cs") } | 
|  | }; | 
|  | static CRITICAL_SECTION server_cs = { &server_cs_debug, -1, 0, 0, 0, 0 }; | 
|  |  | 
|  | static CRITICAL_SECTION listen_cs; | 
|  | static CRITICAL_SECTION_DEBUG listen_cs_debug = | 
|  | { | 
|  | 0, 0, &listen_cs, | 
|  | { &listen_cs_debug.ProcessLocksList, &listen_cs_debug.ProcessLocksList }, | 
|  | 0, 0, { (DWORD_PTR)(__FILE__ ": listen_cs") } | 
|  | }; | 
|  | static CRITICAL_SECTION listen_cs = { &listen_cs_debug, -1, 0, 0, 0, 0 }; | 
|  |  | 
|  | static CRITICAL_SECTION server_auth_info_cs; | 
|  | static CRITICAL_SECTION_DEBUG server_auth_info_cs_debug = | 
|  | { | 
|  | 0, 0, &server_auth_info_cs, | 
|  | { &server_auth_info_cs_debug.ProcessLocksList, &server_auth_info_cs_debug.ProcessLocksList }, | 
|  | 0, 0, { (DWORD_PTR)(__FILE__ ": server_auth_info_cs") } | 
|  | }; | 
|  | static CRITICAL_SECTION server_auth_info_cs = { &server_auth_info_cs_debug, -1, 0, 0, 0, 0 }; | 
|  |  | 
|  | /* whether the server is currently listening */ | 
|  | static BOOL std_listen; | 
|  | /* number of manual listeners (calls to RpcServerListen) */ | 
|  | static LONG manual_listen_count; | 
|  | /* total listeners including auto listeners */ | 
|  | static LONG listen_count; | 
|  |  | 
|  | static UUID uuid_nil; | 
|  |  | 
|  | static inline RpcObjTypeMap *LookupObjTypeMap(UUID *ObjUuid) | 
|  | { | 
|  | RpcObjTypeMap *rslt = RpcObjTypeMaps; | 
|  | RPC_STATUS dummy; | 
|  |  | 
|  | while (rslt) { | 
|  | if (! UuidCompare(ObjUuid, &rslt->Object, &dummy)) break; | 
|  | rslt = rslt->next; | 
|  | } | 
|  |  | 
|  | return rslt; | 
|  | } | 
|  |  | 
|  | static inline UUID *LookupObjType(UUID *ObjUuid) | 
|  | { | 
|  | RpcObjTypeMap *map = LookupObjTypeMap(ObjUuid); | 
|  | if (map) | 
|  | return &map->Type; | 
|  | else | 
|  | return &uuid_nil; | 
|  | } | 
|  |  | 
|  | static RpcServerInterface* RPCRT4_find_interface(UUID* object, | 
|  | const RPC_SYNTAX_IDENTIFIER *if_id, | 
|  | const RPC_SYNTAX_IDENTIFIER *transfer_syntax, | 
|  | BOOL check_object) | 
|  | { | 
|  | UUID* MgrType = NULL; | 
|  | RpcServerInterface* cif; | 
|  | RPC_STATUS status; | 
|  |  | 
|  | if (check_object) | 
|  | MgrType = LookupObjType(object); | 
|  | EnterCriticalSection(&server_cs); | 
|  | LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) { | 
|  | if (!memcmp(if_id, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER)) && | 
|  | (!transfer_syntax || !memcmp(transfer_syntax, &cif->If->TransferSyntax, sizeof(RPC_SYNTAX_IDENTIFIER))) && | 
|  | (check_object == FALSE || UuidEqual(MgrType, &cif->MgrTypeUuid, &status)) && | 
|  | std_listen) { | 
|  | InterlockedIncrement(&cif->CurrentCalls); | 
|  | break; | 
|  | } | 
|  | } | 
|  | LeaveCriticalSection(&server_cs); | 
|  | if (&cif->entry == &server_interfaces) cif = NULL; | 
|  | TRACE("returning %p for object %s, if_id { %d.%d %s }\n", cif, | 
|  | debugstr_guid(object), if_id->SyntaxVersion.MajorVersion, | 
|  | if_id->SyntaxVersion.MinorVersion, debugstr_guid(&if_id->SyntaxGUID)); | 
|  | return cif; | 
|  | } | 
|  |  | 
|  | static void RPCRT4_release_server_interface(RpcServerInterface *sif) | 
|  | { | 
|  | if (!InterlockedDecrement(&sif->CurrentCalls) && | 
|  | sif->Delete) { | 
|  | /* sif must have been removed from server_interfaces before | 
|  | * CallsCompletedEvent is set */ | 
|  | if (sif->CallsCompletedEvent) | 
|  | SetEvent(sif->CallsCompletedEvent); | 
|  | HeapFree(GetProcessHeap(), 0, sif); | 
|  | } | 
|  | } | 
|  |  | 
|  | static RpcPktHdr *handle_bind_error(RpcConnection *conn, RPC_STATUS error) | 
|  | { | 
|  | unsigned int reject_reason; | 
|  | switch (error) | 
|  | { | 
|  | case RPC_S_SERVER_TOO_BUSY: | 
|  | reject_reason = REJECT_TEMPORARY_CONGESTION; | 
|  | break; | 
|  | case ERROR_OUTOFMEMORY: | 
|  | case RPC_S_OUT_OF_RESOURCES: | 
|  | reject_reason = REJECT_LOCAL_LIMIT_EXCEEDED; | 
|  | break; | 
|  | case RPC_S_PROTOCOL_ERROR: | 
|  | reject_reason = REJECT_PROTOCOL_VERSION_NOT_SUPPORTED; | 
|  | break; | 
|  | case RPC_S_UNKNOWN_AUTHN_SERVICE: | 
|  | reject_reason = REJECT_UNKNOWN_AUTHN_SERVICE; | 
|  | break; | 
|  | case ERROR_ACCESS_DENIED: | 
|  | reject_reason = REJECT_INVALID_CHECKSUM; | 
|  | break; | 
|  | default: | 
|  | FIXME("unexpected status value %d\n", error); | 
|  | /* fall through */ | 
|  | case RPC_S_INVALID_BOUND: | 
|  | reject_reason = REJECT_REASON_NOT_SPECIFIED; | 
|  | break; | 
|  | } | 
|  | return RPCRT4_BuildBindNackHeader(NDR_LOCAL_DATA_REPRESENTATION, | 
|  | RPC_VER_MAJOR, RPC_VER_MINOR, | 
|  | reject_reason); | 
|  | } | 
|  |  | 
|  | static RPC_STATUS process_bind_packet_no_send( | 
|  | RpcConnection *conn, RpcPktBindHdr *hdr, RPC_MESSAGE *msg, | 
|  | unsigned char *auth_data, ULONG auth_length, RpcPktHdr **ack_response, | 
|  | unsigned char **auth_data_out, ULONG *auth_length_out) | 
|  | { | 
|  | RPC_STATUS status; | 
|  | RpcContextElement *ctxt_elem; | 
|  | unsigned int i; | 
|  | RpcResult *results; | 
|  |  | 
|  | /* validate data */ | 
|  | for (i = 0, ctxt_elem = msg->Buffer; | 
|  | i < hdr->num_elements; | 
|  | i++, ctxt_elem = (RpcContextElement *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes]) | 
|  | { | 
|  | if (((char *)ctxt_elem - (char *)msg->Buffer) > msg->BufferLength || | 
|  | ((char *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes] - (char *)msg->Buffer) > msg->BufferLength) | 
|  | { | 
|  | ERR("inconsistent data in packet - packet length %d, num elements %d\n", | 
|  | msg->BufferLength, hdr->num_elements); | 
|  | return RPC_S_INVALID_BOUND; | 
|  | } | 
|  | } | 
|  |  | 
|  | if (hdr->max_tsize < RPC_MIN_PACKET_SIZE || | 
|  | !UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status) || | 
|  | conn->server_binding) | 
|  | { | 
|  | TRACE("packet size less than min size, or active interface syntax guid non-null\n"); | 
|  |  | 
|  | return RPC_S_INVALID_BOUND; | 
|  | } | 
|  |  | 
|  | results = HeapAlloc(GetProcessHeap(), 0, | 
|  | hdr->num_elements * sizeof(*results)); | 
|  | if (!results) | 
|  | return RPC_S_OUT_OF_RESOURCES; | 
|  |  | 
|  | for (i = 0, ctxt_elem = (RpcContextElement *)msg->Buffer; | 
|  | i < hdr->num_elements; | 
|  | i++, ctxt_elem = (RpcContextElement *)&ctxt_elem->transfer_syntaxes[ctxt_elem->num_syntaxes]) | 
|  | { | 
|  | RpcServerInterface* sif = NULL; | 
|  | unsigned int j; | 
|  |  | 
|  | for (j = 0; !sif && j < ctxt_elem->num_syntaxes; j++) | 
|  | { | 
|  | sif = RPCRT4_find_interface(NULL, &ctxt_elem->abstract_syntax, | 
|  | &ctxt_elem->transfer_syntaxes[j], FALSE); | 
|  | if (sif) | 
|  | break; | 
|  | } | 
|  | if (sif) | 
|  | { | 
|  | RPCRT4_release_server_interface(sif); | 
|  | TRACE("accepting bind request on connection %p for %s\n", conn, | 
|  | debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID)); | 
|  | results[i].result = RESULT_ACCEPT; | 
|  | results[i].reason = REASON_NONE; | 
|  | results[i].transfer_syntax = ctxt_elem->transfer_syntaxes[j]; | 
|  |  | 
|  | /* save the interface for later use */ | 
|  | /* FIXME: save linked list */ | 
|  | conn->ActiveInterface = ctxt_elem->abstract_syntax; | 
|  | } | 
|  | else if ((sif = RPCRT4_find_interface(NULL, &ctxt_elem->abstract_syntax, | 
|  | NULL, FALSE)) != NULL) | 
|  | { | 
|  | RPCRT4_release_server_interface(sif); | 
|  | TRACE("not accepting bind request on connection %p for %s - no transfer syntaxes supported\n", | 
|  | conn, debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID)); | 
|  | results[i].result = RESULT_PROVIDER_REJECTION; | 
|  | results[i].reason = REASON_TRANSFER_SYNTAXES_NOT_SUPPORTED; | 
|  | memset(&results[i].transfer_syntax, 0, sizeof(results[i].transfer_syntax)); | 
|  | } | 
|  | else | 
|  | { | 
|  | TRACE("not accepting bind request on connection %p for %s - abstract syntax not supported\n", | 
|  | conn, debugstr_guid(&ctxt_elem->abstract_syntax.SyntaxGUID)); | 
|  | results[i].result = RESULT_PROVIDER_REJECTION; | 
|  | results[i].reason = REASON_ABSTRACT_SYNTAX_NOT_SUPPORTED; | 
|  | memset(&results[i].transfer_syntax, 0, sizeof(results[i].transfer_syntax)); | 
|  | } | 
|  | } | 
|  |  | 
|  | /* create temporary binding */ | 
|  | status = RPCRT4_MakeBinding(&conn->server_binding, conn); | 
|  | if (status != RPC_S_OK) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, results); | 
|  | return status; | 
|  | } | 
|  |  | 
|  | status = RpcServerAssoc_GetAssociation(rpcrt4_conn_get_name(conn), | 
|  | conn->NetworkAddr, conn->Endpoint, | 
|  | conn->NetworkOptions, | 
|  | hdr->assoc_gid, | 
|  | &conn->server_binding->Assoc); | 
|  | if (status != RPC_S_OK) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, results); | 
|  | return status; | 
|  | } | 
|  |  | 
|  | if (auth_length) | 
|  | { | 
|  | status = RPCRT4_ServerConnectionAuth(conn, TRUE, | 
|  | (RpcAuthVerifier *)auth_data, | 
|  | auth_length, auth_data_out, | 
|  | auth_length_out); | 
|  | if (status != RPC_S_OK) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, results); | 
|  | return status; | 
|  | } | 
|  | } | 
|  |  | 
|  | *ack_response = RPCRT4_BuildBindAckHeader(NDR_LOCAL_DATA_REPRESENTATION, | 
|  | RPC_MAX_PACKET_SIZE, | 
|  | RPC_MAX_PACKET_SIZE, | 
|  | conn->server_binding->Assoc->assoc_group_id, | 
|  | conn->Endpoint, hdr->num_elements, | 
|  | results); | 
|  | HeapFree(GetProcessHeap(), 0, results); | 
|  |  | 
|  | if (*ack_response) | 
|  | conn->MaxTransmissionSize = hdr->max_tsize; | 
|  | else | 
|  | status = RPC_S_OUT_OF_RESOURCES; | 
|  |  | 
|  | return status; | 
|  | } | 
|  |  | 
|  | static RPC_STATUS process_bind_packet(RpcConnection *conn, RpcPktBindHdr *hdr, | 
|  | RPC_MESSAGE *msg, | 
|  | unsigned char *auth_data, | 
|  | ULONG auth_length) | 
|  | { | 
|  | RPC_STATUS status; | 
|  | RpcPktHdr *response = NULL; | 
|  | unsigned char *auth_data_out = NULL; | 
|  | ULONG auth_length_out = 0; | 
|  |  | 
|  | status = process_bind_packet_no_send(conn, hdr, msg, auth_data, auth_length, | 
|  | &response, &auth_data_out, | 
|  | &auth_length_out); | 
|  | if (status != RPC_S_OK) | 
|  | response = handle_bind_error(conn, status); | 
|  | if (response) | 
|  | status = RPCRT4_SendWithAuth(conn, response, NULL, 0, auth_data_out, auth_length_out); | 
|  | else | 
|  | status = ERROR_OUTOFMEMORY; | 
|  | RPCRT4_FreeHeader(response); | 
|  |  | 
|  | return status; | 
|  | } | 
|  |  | 
|  |  | 
|  | static RPC_STATUS process_request_packet(RpcConnection *conn, RpcPktRequestHdr *hdr, RPC_MESSAGE *msg) | 
|  | { | 
|  | RPC_STATUS status; | 
|  | RpcPktHdr *response = NULL; | 
|  | RpcServerInterface* sif; | 
|  | RPC_DISPATCH_FUNCTION func; | 
|  | BOOL exception; | 
|  | UUID *object_uuid; | 
|  | NDR_SCONTEXT context_handle; | 
|  | void *buf = msg->Buffer; | 
|  |  | 
|  | /* fail if the connection isn't bound with an interface */ | 
|  | if (UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status)) { | 
|  | /* FIXME: should send BindNack instead */ | 
|  | response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION, | 
|  | status); | 
|  |  | 
|  | RPCRT4_Send(conn, response, NULL, 0); | 
|  | RPCRT4_FreeHeader(response); | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | if (hdr->common.flags & RPC_FLG_OBJECT_UUID) { | 
|  | object_uuid = (UUID*)(hdr + 1); | 
|  | } else { | 
|  | object_uuid = NULL; | 
|  | } | 
|  |  | 
|  | sif = RPCRT4_find_interface(object_uuid, &conn->ActiveInterface, NULL, TRUE); | 
|  | if (!sif) { | 
|  | WARN("interface %s no longer registered, returning fault packet\n", debugstr_guid(&conn->ActiveInterface.SyntaxGUID)); | 
|  | response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION, | 
|  | NCA_S_UNK_IF); | 
|  |  | 
|  | RPCRT4_Send(conn, response, NULL, 0); | 
|  | RPCRT4_FreeHeader(response); | 
|  | return RPC_S_OK; | 
|  | } | 
|  | msg->RpcInterfaceInformation = sif->If; | 
|  | /* copy the endpoint vector from sif to msg so that midl-generated code will use it */ | 
|  | msg->ManagerEpv = sif->MgrEpv; | 
|  | if (object_uuid != NULL) { | 
|  | RPCRT4_SetBindingObject(msg->Handle, object_uuid); | 
|  | } | 
|  |  | 
|  | /* find dispatch function */ | 
|  | msg->ProcNum = hdr->opnum; | 
|  | if (sif->Flags & RPC_IF_OLE) { | 
|  | /* native ole32 always gives us a dispatch table with a single entry | 
|  | * (I assume that's a wrapper for IRpcStubBuffer::Invoke) */ | 
|  | func = *sif->If->DispatchTable->DispatchTable; | 
|  | } else { | 
|  | if (msg->ProcNum >= sif->If->DispatchTable->DispatchTableCount) { | 
|  | WARN("invalid procnum (%d/%d)\n", msg->ProcNum, sif->If->DispatchTable->DispatchTableCount); | 
|  | response = RPCRT4_BuildFaultHeader(NDR_LOCAL_DATA_REPRESENTATION, | 
|  | NCA_S_OP_RNG_ERROR); | 
|  |  | 
|  | RPCRT4_Send(conn, response, NULL, 0); | 
|  | RPCRT4_FreeHeader(response); | 
|  | } | 
|  | func = sif->If->DispatchTable->DispatchTable[msg->ProcNum]; | 
|  | } | 
|  |  | 
|  | /* put in the drep. FIXME: is this more universally applicable? | 
|  | perhaps we should move this outward... */ | 
|  | msg->DataRepresentation = | 
|  | MAKELONG( MAKEWORD(hdr->common.drep[0], hdr->common.drep[1]), | 
|  | MAKEWORD(hdr->common.drep[2], hdr->common.drep[3])); | 
|  |  | 
|  | exception = FALSE; | 
|  |  | 
|  | /* dispatch */ | 
|  | RPCRT4_SetThreadCurrentCallHandle(msg->Handle); | 
|  | __TRY { | 
|  | if (func) func(msg); | 
|  | } __EXCEPT_ALL { | 
|  | WARN("exception caught with code 0x%08x = %d\n", GetExceptionCode(), GetExceptionCode()); | 
|  | exception = TRUE; | 
|  | if (GetExceptionCode() == STATUS_ACCESS_VIOLATION) | 
|  | status = ERROR_NOACCESS; | 
|  | else | 
|  | status = GetExceptionCode(); | 
|  | response = RPCRT4_BuildFaultHeader(msg->DataRepresentation, | 
|  | RPC2NCA_STATUS(status)); | 
|  | } __ENDTRY | 
|  | RPCRT4_SetThreadCurrentCallHandle(NULL); | 
|  |  | 
|  | /* release any unmarshalled context handles */ | 
|  | while ((context_handle = RPCRT4_PopThreadContextHandle()) != NULL) | 
|  | RpcServerAssoc_ReleaseContextHandle(conn->server_binding->Assoc, context_handle, TRUE); | 
|  |  | 
|  | if (!exception) | 
|  | response = RPCRT4_BuildResponseHeader(msg->DataRepresentation, | 
|  | msg->BufferLength); | 
|  |  | 
|  | /* send response packet */ | 
|  | if (response) { | 
|  | status = RPCRT4_Send(conn, response, exception ? NULL : msg->Buffer, | 
|  | exception ? 0 : msg->BufferLength); | 
|  | RPCRT4_FreeHeader(response); | 
|  | } else | 
|  | ERR("out of memory\n"); | 
|  |  | 
|  | msg->RpcInterfaceInformation = NULL; | 
|  | RPCRT4_release_server_interface(sif); | 
|  |  | 
|  | if (msg->Buffer == buf) buf = NULL; | 
|  | TRACE("freeing Buffer=%p\n", buf); | 
|  | I_RpcFree(buf); | 
|  |  | 
|  | return status; | 
|  | } | 
|  |  | 
|  | static RPC_STATUS process_auth3_packet(RpcConnection *conn, | 
|  | RpcPktCommonHdr *hdr, | 
|  | RPC_MESSAGE *msg, | 
|  | unsigned char *auth_data, | 
|  | ULONG auth_length) | 
|  | { | 
|  | RPC_STATUS status; | 
|  |  | 
|  | if (UuidIsNil(&conn->ActiveInterface.SyntaxGUID, &status) || | 
|  | !auth_length || msg->BufferLength != 0) | 
|  | status = RPC_S_PROTOCOL_ERROR; | 
|  | else | 
|  | { | 
|  | status = RPCRT4_ServerConnectionAuth(conn, FALSE, | 
|  | (RpcAuthVerifier *)auth_data, | 
|  | auth_length, NULL, NULL); | 
|  | } | 
|  |  | 
|  | /* FIXME: client doesn't expect a response to this message so must store | 
|  | * status in connection so that fault packet can be returned when next | 
|  | * packet is received */ | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | static void RPCRT4_process_packet(RpcConnection* conn, RpcPktHdr* hdr, | 
|  | RPC_MESSAGE* msg, unsigned char *auth_data, | 
|  | ULONG auth_length) | 
|  | { | 
|  | RPC_STATUS status; | 
|  |  | 
|  | msg->Handle = (RPC_BINDING_HANDLE)conn->server_binding; | 
|  |  | 
|  | switch (hdr->common.ptype) { | 
|  | case PKT_BIND: | 
|  | TRACE("got bind packet\n"); | 
|  |  | 
|  | status = process_bind_packet(conn, &hdr->bind, msg, auth_data, | 
|  | auth_length); | 
|  | break; | 
|  |  | 
|  | case PKT_REQUEST: | 
|  | TRACE("got request packet\n"); | 
|  |  | 
|  | status = process_request_packet(conn, &hdr->request, msg); | 
|  | break; | 
|  |  | 
|  | case PKT_AUTH3: | 
|  | TRACE("got auth3 packet\n"); | 
|  |  | 
|  | status = process_auth3_packet(conn, &hdr->common, msg, auth_data, | 
|  | auth_length); | 
|  | break; | 
|  | default: | 
|  | FIXME("unhandled packet type %u\n", hdr->common.ptype); | 
|  | break; | 
|  | } | 
|  |  | 
|  | /* clean up */ | 
|  | I_RpcFree(msg->Buffer); | 
|  | RPCRT4_FreeHeader(hdr); | 
|  | HeapFree(GetProcessHeap(), 0, msg); | 
|  | HeapFree(GetProcessHeap(), 0, auth_data); | 
|  | } | 
|  |  | 
|  | static DWORD CALLBACK RPCRT4_worker_thread(LPVOID the_arg) | 
|  | { | 
|  | RpcPacket *pkt = the_arg; | 
|  | RPCRT4_process_packet(pkt->conn, pkt->hdr, pkt->msg, pkt->auth_data, | 
|  | pkt->auth_length); | 
|  | HeapFree(GetProcessHeap(), 0, pkt); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | static DWORD CALLBACK RPCRT4_io_thread(LPVOID the_arg) | 
|  | { | 
|  | RpcConnection* conn = the_arg; | 
|  | RpcPktHdr *hdr; | 
|  | RPC_MESSAGE *msg; | 
|  | RPC_STATUS status; | 
|  | RpcPacket *packet; | 
|  | unsigned char *auth_data; | 
|  | ULONG auth_length; | 
|  |  | 
|  | TRACE("(%p)\n", conn); | 
|  |  | 
|  | for (;;) { | 
|  | msg = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RPC_MESSAGE)); | 
|  | if (!msg) break; | 
|  |  | 
|  | status = RPCRT4_ReceiveWithAuth(conn, &hdr, msg, &auth_data, &auth_length); | 
|  | if (status != RPC_S_OK) { | 
|  | WARN("receive failed with error %x\n", status); | 
|  | HeapFree(GetProcessHeap(), 0, msg); | 
|  | break; | 
|  | } | 
|  |  | 
|  | switch (hdr->common.ptype) { | 
|  | case PKT_BIND: | 
|  | TRACE("got bind packet\n"); | 
|  |  | 
|  | status = process_bind_packet(conn, &hdr->bind, msg, auth_data, | 
|  | auth_length); | 
|  | break; | 
|  |  | 
|  | case PKT_REQUEST: | 
|  | TRACE("got request packet\n"); | 
|  |  | 
|  | packet = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcPacket)); | 
|  | if (!packet) { | 
|  | I_RpcFree(msg->Buffer); | 
|  | RPCRT4_FreeHeader(hdr); | 
|  | HeapFree(GetProcessHeap(), 0, msg); | 
|  | HeapFree(GetProcessHeap(), 0, auth_data); | 
|  | goto exit; | 
|  | } | 
|  | packet->conn = conn; | 
|  | packet->hdr = hdr; | 
|  | packet->msg = msg; | 
|  | packet->auth_data = auth_data; | 
|  | packet->auth_length = auth_length; | 
|  | if (!QueueUserWorkItem(RPCRT4_worker_thread, packet, WT_EXECUTELONGFUNCTION)) { | 
|  | ERR("couldn't queue work item for worker thread, error was %d\n", GetLastError()); | 
|  | HeapFree(GetProcessHeap(), 0, packet); | 
|  | status = RPC_S_OUT_OF_RESOURCES; | 
|  | } else { | 
|  | continue; | 
|  | } | 
|  | break; | 
|  |  | 
|  | case PKT_AUTH3: | 
|  | TRACE("got auth3 packet\n"); | 
|  |  | 
|  | status = process_auth3_packet(conn, &hdr->common, msg, auth_data, | 
|  | auth_length); | 
|  | break; | 
|  | default: | 
|  | FIXME("unhandled packet type %u\n", hdr->common.ptype); | 
|  | break; | 
|  | } | 
|  |  | 
|  | I_RpcFree(msg->Buffer); | 
|  | RPCRT4_FreeHeader(hdr); | 
|  | HeapFree(GetProcessHeap(), 0, msg); | 
|  | HeapFree(GetProcessHeap(), 0, auth_data); | 
|  |  | 
|  | if (status != RPC_S_OK) { | 
|  | WARN("processing packet failed with error %u\n", status); | 
|  | break; | 
|  | } | 
|  | } | 
|  | exit: | 
|  | RPCRT4_DestroyConnection(conn); | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | void RPCRT4_new_client(RpcConnection* conn) | 
|  | { | 
|  | HANDLE thread = CreateThread(NULL, 0, RPCRT4_io_thread, conn, 0, NULL); | 
|  | if (!thread) { | 
|  | DWORD err = GetLastError(); | 
|  | ERR("failed to create thread, error=%08x\n", err); | 
|  | RPCRT4_DestroyConnection(conn); | 
|  | } | 
|  | /* we could set conn->thread, but then we'd have to make the io_thread wait | 
|  | * for that, otherwise the thread might finish, destroy the connection, and | 
|  | * free the memory we'd write to before we did, causing crashes and stuff - | 
|  | * so let's implement that later, when we really need conn->thread */ | 
|  |  | 
|  | CloseHandle( thread ); | 
|  | } | 
|  |  | 
|  | static DWORD CALLBACK RPCRT4_server_thread(LPVOID the_arg) | 
|  | { | 
|  | int res; | 
|  | unsigned int count; | 
|  | void *objs = NULL; | 
|  | RpcServerProtseq* cps = the_arg; | 
|  | RpcConnection* conn; | 
|  | BOOL set_ready_event = FALSE; | 
|  |  | 
|  | TRACE("(the_arg == ^%p)\n", the_arg); | 
|  |  | 
|  | for (;;) { | 
|  | objs = cps->ops->get_wait_array(cps, objs, &count); | 
|  |  | 
|  | if (set_ready_event) | 
|  | { | 
|  | /* signal to function that changed state that we are now sync'ed */ | 
|  | SetEvent(cps->server_ready_event); | 
|  | set_ready_event = FALSE; | 
|  | } | 
|  |  | 
|  | /* start waiting */ | 
|  | res = cps->ops->wait_for_new_connection(cps, count, objs); | 
|  |  | 
|  | if (res == -1 || (res == 0 && !std_listen)) | 
|  | { | 
|  | /* cleanup */ | 
|  | cps->ops->free_wait_array(cps, objs); | 
|  | EnterCriticalSection(&cps->cs); | 
|  | for (conn = cps->conn; conn; conn = conn->Next) | 
|  | RPCRT4_CloseConnection(conn); | 
|  | LeaveCriticalSection(&cps->cs); | 
|  |  | 
|  | if (res == 0 && !std_listen) | 
|  | SetEvent(cps->server_ready_event); | 
|  | break; | 
|  | } | 
|  | else if (res == 0) | 
|  | set_ready_event = TRUE; | 
|  | } | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /* tells the server thread that the state has changed and waits for it to | 
|  | * make the changes */ | 
|  | static void RPCRT4_sync_with_server_thread(RpcServerProtseq *ps) | 
|  | { | 
|  | /* make sure we are the only thread sync'ing the server state, otherwise | 
|  | * there is a race with the server thread setting an older state and setting | 
|  | * the server_ready_event when the new state hasn't yet been applied */ | 
|  | WaitForSingleObject(ps->mgr_mutex, INFINITE); | 
|  |  | 
|  | ps->ops->signal_state_changed(ps); | 
|  |  | 
|  | /* wait for server thread to make the requested changes before returning */ | 
|  | WaitForSingleObject(ps->server_ready_event, INFINITE); | 
|  |  | 
|  | ReleaseMutex(ps->mgr_mutex); | 
|  | } | 
|  |  | 
|  | static RPC_STATUS RPCRT4_start_listen_protseq(RpcServerProtseq *ps, BOOL auto_listen) | 
|  | { | 
|  | RPC_STATUS status = RPC_S_OK; | 
|  | HANDLE server_thread; | 
|  |  | 
|  | EnterCriticalSection(&listen_cs); | 
|  | if (ps->is_listening) goto done; | 
|  |  | 
|  | if (!ps->mgr_mutex) ps->mgr_mutex = CreateMutexW(NULL, FALSE, NULL); | 
|  | if (!ps->server_ready_event) ps->server_ready_event = CreateEventW(NULL, FALSE, FALSE, NULL); | 
|  | server_thread = CreateThread(NULL, 0, RPCRT4_server_thread, ps, 0, NULL); | 
|  | if (!server_thread) | 
|  | { | 
|  | status = RPC_S_OUT_OF_RESOURCES; | 
|  | goto done; | 
|  | } | 
|  | ps->is_listening = TRUE; | 
|  | CloseHandle(server_thread); | 
|  |  | 
|  | done: | 
|  | LeaveCriticalSection(&listen_cs); | 
|  | return status; | 
|  | } | 
|  |  | 
|  | static RPC_STATUS RPCRT4_start_listen(BOOL auto_listen) | 
|  | { | 
|  | RPC_STATUS status = RPC_S_ALREADY_LISTENING; | 
|  | RpcServerProtseq *cps; | 
|  |  | 
|  | TRACE("\n"); | 
|  |  | 
|  | EnterCriticalSection(&listen_cs); | 
|  | if (auto_listen || (manual_listen_count++ == 0)) | 
|  | { | 
|  | status = RPC_S_OK; | 
|  | if (++listen_count == 1) | 
|  | std_listen = TRUE; | 
|  | } | 
|  | LeaveCriticalSection(&listen_cs); | 
|  |  | 
|  | if (std_listen) | 
|  | { | 
|  | EnterCriticalSection(&server_cs); | 
|  | LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry) | 
|  | { | 
|  | status = RPCRT4_start_listen_protseq(cps, TRUE); | 
|  | if (status != RPC_S_OK) | 
|  | break; | 
|  |  | 
|  | /* make sure server is actually listening on the interface before | 
|  | * returning */ | 
|  | RPCRT4_sync_with_server_thread(cps); | 
|  | } | 
|  | LeaveCriticalSection(&server_cs); | 
|  | } | 
|  |  | 
|  | return status; | 
|  | } | 
|  |  | 
|  | static void RPCRT4_stop_listen(BOOL auto_listen) | 
|  | { | 
|  | EnterCriticalSection(&listen_cs); | 
|  | if (auto_listen || (--manual_listen_count == 0)) | 
|  | { | 
|  | if (listen_count != 0 && --listen_count == 0) { | 
|  | RpcServerProtseq *cps; | 
|  |  | 
|  | std_listen = FALSE; | 
|  | LeaveCriticalSection(&listen_cs); | 
|  |  | 
|  | LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry) | 
|  | RPCRT4_sync_with_server_thread(cps); | 
|  |  | 
|  | return; | 
|  | } | 
|  | assert(listen_count >= 0); | 
|  | } | 
|  | LeaveCriticalSection(&listen_cs); | 
|  | } | 
|  |  | 
|  | static BOOL RPCRT4_protseq_is_endpoint_registered(RpcServerProtseq *protseq, const char *endpoint) | 
|  | { | 
|  | RpcConnection *conn; | 
|  | EnterCriticalSection(&protseq->cs); | 
|  | for (conn = protseq->conn; conn; conn = conn->Next) | 
|  | { | 
|  | if (!endpoint || !strcmp(endpoint, conn->Endpoint)) | 
|  | break; | 
|  | } | 
|  | LeaveCriticalSection(&protseq->cs); | 
|  | return (conn != NULL); | 
|  | } | 
|  |  | 
|  | static RPC_STATUS RPCRT4_use_protseq(RpcServerProtseq* ps, const char *endpoint) | 
|  | { | 
|  | RPC_STATUS status; | 
|  |  | 
|  | EnterCriticalSection(&ps->cs); | 
|  |  | 
|  | if (RPCRT4_protseq_is_endpoint_registered(ps, endpoint)) | 
|  | status = RPC_S_OK; | 
|  | else | 
|  | status = ps->ops->open_endpoint(ps, endpoint); | 
|  |  | 
|  | LeaveCriticalSection(&ps->cs); | 
|  |  | 
|  | if (status != RPC_S_OK) | 
|  | return status; | 
|  |  | 
|  | if (std_listen) | 
|  | { | 
|  | status = RPCRT4_start_listen_protseq(ps, FALSE); | 
|  | if (status == RPC_S_OK) | 
|  | RPCRT4_sync_with_server_thread(ps); | 
|  | } | 
|  |  | 
|  | return status; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerInqBindings (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerInqBindings( RPC_BINDING_VECTOR** BindingVector ) | 
|  | { | 
|  | RPC_STATUS status; | 
|  | DWORD count; | 
|  | RpcServerProtseq* ps; | 
|  | RpcConnection* conn; | 
|  |  | 
|  | if (BindingVector) | 
|  | TRACE("(*BindingVector == ^%p)\n", *BindingVector); | 
|  | else | 
|  | ERR("(BindingVector == NULL!!?)\n"); | 
|  |  | 
|  | EnterCriticalSection(&server_cs); | 
|  | /* count connections */ | 
|  | count = 0; | 
|  | LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) { | 
|  | EnterCriticalSection(&ps->cs); | 
|  | for (conn = ps->conn; conn; conn = conn->Next) | 
|  | count++; | 
|  | LeaveCriticalSection(&ps->cs); | 
|  | } | 
|  | if (count) { | 
|  | /* export bindings */ | 
|  | *BindingVector = HeapAlloc(GetProcessHeap(), 0, | 
|  | sizeof(RPC_BINDING_VECTOR) + | 
|  | sizeof(RPC_BINDING_HANDLE)*(count-1)); | 
|  | (*BindingVector)->Count = count; | 
|  | count = 0; | 
|  | LIST_FOR_EACH_ENTRY(ps, &protseqs, RpcServerProtseq, entry) { | 
|  | EnterCriticalSection(&ps->cs); | 
|  | for (conn = ps->conn; conn; conn = conn->Next) { | 
|  | RPCRT4_MakeBinding((RpcBinding**)&(*BindingVector)->BindingH[count], | 
|  | conn); | 
|  | count++; | 
|  | } | 
|  | LeaveCriticalSection(&ps->cs); | 
|  | } | 
|  | status = RPC_S_OK; | 
|  | } else { | 
|  | *BindingVector = NULL; | 
|  | status = RPC_S_NO_BINDINGS; | 
|  | } | 
|  | LeaveCriticalSection(&server_cs); | 
|  | return status; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUseProtseqEpA (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUseProtseqEpA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor ) | 
|  | { | 
|  | RPC_POLICY policy; | 
|  |  | 
|  | TRACE( "(%s,%u,%s,%p)\n", Protseq, MaxCalls, Endpoint, SecurityDescriptor ); | 
|  |  | 
|  | /* This should provide the default behaviour */ | 
|  | policy.Length        = sizeof( policy ); | 
|  | policy.EndpointFlags = 0; | 
|  | policy.NICFlags      = 0; | 
|  |  | 
|  | return RpcServerUseProtseqEpExA( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy ); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUseProtseqEpW (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUseProtseqEpW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor ) | 
|  | { | 
|  | RPC_POLICY policy; | 
|  |  | 
|  | TRACE( "(%s,%u,%s,%p)\n", debugstr_w( Protseq ), MaxCalls, debugstr_w( Endpoint ), SecurityDescriptor ); | 
|  |  | 
|  | /* This should provide the default behaviour */ | 
|  | policy.Length        = sizeof( policy ); | 
|  | policy.EndpointFlags = 0; | 
|  | policy.NICFlags      = 0; | 
|  |  | 
|  | return RpcServerUseProtseqEpExW( Protseq, MaxCalls, Endpoint, SecurityDescriptor, &policy ); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             alloc_serverprotoseq (internal) | 
|  | * | 
|  | * Must be called with server_cs held. | 
|  | */ | 
|  | static RPC_STATUS alloc_serverprotoseq(UINT MaxCalls, const char *Protseq, RpcServerProtseq **ps) | 
|  | { | 
|  | const struct protseq_ops *ops = rpcrt4_get_protseq_ops(Protseq); | 
|  |  | 
|  | if (!ops) | 
|  | { | 
|  | FIXME("protseq %s not supported\n", debugstr_a(Protseq)); | 
|  | return RPC_S_PROTSEQ_NOT_SUPPORTED; | 
|  | } | 
|  |  | 
|  | *ps = ops->alloc(); | 
|  | if (!*ps) | 
|  | return RPC_S_OUT_OF_RESOURCES; | 
|  | (*ps)->MaxCalls = MaxCalls; | 
|  | (*ps)->Protseq = RPCRT4_strdupA(Protseq); | 
|  | (*ps)->ops = ops; | 
|  | (*ps)->MaxCalls = 0; | 
|  | (*ps)->conn = NULL; | 
|  | InitializeCriticalSection(&(*ps)->cs); | 
|  | (*ps)->is_listening = FALSE; | 
|  | (*ps)->mgr_mutex = NULL; | 
|  | (*ps)->server_ready_event = NULL; | 
|  |  | 
|  | list_add_head(&protseqs, &(*ps)->entry); | 
|  |  | 
|  | TRACE("new protseq %p created for %s\n", *ps, Protseq); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /* must be called with server_cs held */ | 
|  | static void destroy_serverprotoseq(RpcServerProtseq *ps) | 
|  | { | 
|  | RPCRT4_strfree(ps->Protseq); | 
|  | DeleteCriticalSection(&ps->cs); | 
|  | CloseHandle(ps->mgr_mutex); | 
|  | CloseHandle(ps->server_ready_event); | 
|  | list_remove(&ps->entry); | 
|  | HeapFree(GetProcessHeap(), 0, ps); | 
|  | } | 
|  |  | 
|  | /* Finds a given protseq or creates a new one if one doesn't already exist */ | 
|  | static RPC_STATUS RPCRT4_get_or_create_serverprotseq(UINT MaxCalls, const char *Protseq, RpcServerProtseq **ps) | 
|  | { | 
|  | RPC_STATUS status; | 
|  | RpcServerProtseq *cps; | 
|  |  | 
|  | EnterCriticalSection(&server_cs); | 
|  |  | 
|  | LIST_FOR_EACH_ENTRY(cps, &protseqs, RpcServerProtseq, entry) | 
|  | if (!strcmp(cps->Protseq, Protseq)) | 
|  | { | 
|  | TRACE("found existing protseq object for %s\n", Protseq); | 
|  | *ps = cps; | 
|  | LeaveCriticalSection(&server_cs); | 
|  | return S_OK; | 
|  | } | 
|  |  | 
|  | status = alloc_serverprotoseq(MaxCalls, Protseq, ps); | 
|  |  | 
|  | LeaveCriticalSection(&server_cs); | 
|  |  | 
|  | return status; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUseProtseqEpExA (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUseProtseqEpExA( RPC_CSTR Protseq, UINT MaxCalls, RPC_CSTR Endpoint, LPVOID SecurityDescriptor, | 
|  | PRPC_POLICY lpPolicy ) | 
|  | { | 
|  | RpcServerProtseq* ps; | 
|  | RPC_STATUS status; | 
|  |  | 
|  | TRACE("(%s,%u,%s,%p,{%u,%u,%u})\n", debugstr_a((const char *)Protseq), | 
|  | MaxCalls, debugstr_a((const char *)Endpoint), SecurityDescriptor, | 
|  | lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags ); | 
|  |  | 
|  | status = RPCRT4_get_or_create_serverprotseq(MaxCalls, (const char *)Protseq, &ps); | 
|  | if (status != RPC_S_OK) | 
|  | return status; | 
|  |  | 
|  | return RPCRT4_use_protseq(ps, (const char *)Endpoint); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUseProtseqEpExW (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUseProtseqEpExW( RPC_WSTR Protseq, UINT MaxCalls, RPC_WSTR Endpoint, LPVOID SecurityDescriptor, | 
|  | PRPC_POLICY lpPolicy ) | 
|  | { | 
|  | RpcServerProtseq* ps; | 
|  | RPC_STATUS status; | 
|  | LPSTR ProtseqA; | 
|  | LPSTR EndpointA; | 
|  |  | 
|  | TRACE("(%s,%u,%s,%p,{%u,%u,%u})\n", debugstr_w( Protseq ), MaxCalls, | 
|  | debugstr_w( Endpoint ), SecurityDescriptor, | 
|  | lpPolicy->Length, lpPolicy->EndpointFlags, lpPolicy->NICFlags ); | 
|  |  | 
|  | ProtseqA = RPCRT4_strdupWtoA(Protseq); | 
|  | status = RPCRT4_get_or_create_serverprotseq(MaxCalls, ProtseqA, &ps); | 
|  | RPCRT4_strfree(ProtseqA); | 
|  | if (status != RPC_S_OK) | 
|  | return status; | 
|  |  | 
|  | EndpointA = RPCRT4_strdupWtoA(Endpoint); | 
|  | status = RPCRT4_use_protseq(ps, EndpointA); | 
|  | RPCRT4_strfree(EndpointA); | 
|  | return status; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUseProtseqA (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUseProtseqA(RPC_CSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor) | 
|  | { | 
|  | RPC_STATUS status; | 
|  | RpcServerProtseq* ps; | 
|  |  | 
|  | TRACE("(Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_a((char*)Protseq), MaxCalls, SecurityDescriptor); | 
|  |  | 
|  | status = RPCRT4_get_or_create_serverprotseq(MaxCalls, (const char *)Protseq, &ps); | 
|  | if (status != RPC_S_OK) | 
|  | return status; | 
|  |  | 
|  | return RPCRT4_use_protseq(ps, NULL); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUseProtseqW (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUseProtseqW(RPC_WSTR Protseq, unsigned int MaxCalls, void *SecurityDescriptor) | 
|  | { | 
|  | RPC_STATUS status; | 
|  | RpcServerProtseq* ps; | 
|  | LPSTR ProtseqA; | 
|  |  | 
|  | TRACE("Protseq == %s, MaxCalls == %d, SecurityDescriptor == ^%p)\n", debugstr_w(Protseq), MaxCalls, SecurityDescriptor); | 
|  |  | 
|  | ProtseqA = RPCRT4_strdupWtoA(Protseq); | 
|  | status = RPCRT4_get_or_create_serverprotseq(MaxCalls, ProtseqA, &ps); | 
|  | RPCRT4_strfree(ProtseqA); | 
|  | if (status != RPC_S_OK) | 
|  | return status; | 
|  |  | 
|  | return RPCRT4_use_protseq(ps, NULL); | 
|  | } | 
|  |  | 
|  | void RPCRT4_destroy_all_protseqs(void) | 
|  | { | 
|  | RpcServerProtseq *cps, *cursor2; | 
|  |  | 
|  | if (listen_count != 0) | 
|  | std_listen = FALSE; | 
|  |  | 
|  | EnterCriticalSection(&server_cs); | 
|  | LIST_FOR_EACH_ENTRY_SAFE(cps, cursor2, &protseqs, RpcServerProtseq, entry) | 
|  | { | 
|  | if (listen_count != 0) | 
|  | RPCRT4_sync_with_server_thread(cps); | 
|  | destroy_serverprotoseq(cps); | 
|  | } | 
|  | LeaveCriticalSection(&server_cs); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerRegisterIf (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerRegisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv ) | 
|  | { | 
|  | TRACE("(%p,%s,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv); | 
|  | return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, 0, RPC_C_LISTEN_MAX_CALLS_DEFAULT, (UINT)-1, NULL ); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerRegisterIfEx (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerRegisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv, | 
|  | UINT Flags, UINT MaxCalls, RPC_IF_CALLBACK_FN* IfCallbackFn ) | 
|  | { | 
|  | TRACE("(%p,%s,%p,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls, IfCallbackFn); | 
|  | return RpcServerRegisterIf2( IfSpec, MgrTypeUuid, MgrEpv, Flags, MaxCalls, (UINT)-1, IfCallbackFn ); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerRegisterIf2 (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerRegisterIf2( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, RPC_MGR_EPV* MgrEpv, | 
|  | UINT Flags, UINT MaxCalls, UINT MaxRpcSize, RPC_IF_CALLBACK_FN* IfCallbackFn ) | 
|  | { | 
|  | PRPC_SERVER_INTERFACE If = IfSpec; | 
|  | RpcServerInterface* sif; | 
|  | unsigned int i; | 
|  |  | 
|  | TRACE("(%p,%s,%p,%u,%u,%u,%p)\n", IfSpec, debugstr_guid(MgrTypeUuid), MgrEpv, Flags, MaxCalls, | 
|  | MaxRpcSize, IfCallbackFn); | 
|  | TRACE(" interface id: %s %d.%d\n", debugstr_guid(&If->InterfaceId.SyntaxGUID), | 
|  | If->InterfaceId.SyntaxVersion.MajorVersion, | 
|  | If->InterfaceId.SyntaxVersion.MinorVersion); | 
|  | TRACE(" transfer syntax: %s %d.%d\n", debugstr_guid(&If->TransferSyntax.SyntaxGUID), | 
|  | If->TransferSyntax.SyntaxVersion.MajorVersion, | 
|  | If->TransferSyntax.SyntaxVersion.MinorVersion); | 
|  | TRACE(" dispatch table: %p\n", If->DispatchTable); | 
|  | if (If->DispatchTable) { | 
|  | TRACE("  dispatch table count: %d\n", If->DispatchTable->DispatchTableCount); | 
|  | for (i=0; i<If->DispatchTable->DispatchTableCount; i++) { | 
|  | TRACE("   entry %d: %p\n", i, If->DispatchTable->DispatchTable[i]); | 
|  | } | 
|  | TRACE("  reserved: %ld\n", If->DispatchTable->Reserved); | 
|  | } | 
|  | TRACE(" protseq endpoint count: %d\n", If->RpcProtseqEndpointCount); | 
|  | TRACE(" default manager epv: %p\n", If->DefaultManagerEpv); | 
|  | TRACE(" interpreter info: %p\n", If->InterpreterInfo); | 
|  |  | 
|  | sif = HeapAlloc(GetProcessHeap(), HEAP_ZERO_MEMORY, sizeof(RpcServerInterface)); | 
|  | sif->If           = If; | 
|  | if (MgrTypeUuid) { | 
|  | sif->MgrTypeUuid = *MgrTypeUuid; | 
|  | sif->MgrEpv       = MgrEpv; | 
|  | } else { | 
|  | memset(&sif->MgrTypeUuid, 0, sizeof(UUID)); | 
|  | sif->MgrEpv       = If->DefaultManagerEpv; | 
|  | } | 
|  | sif->Flags        = Flags; | 
|  | sif->MaxCalls     = MaxCalls; | 
|  | sif->MaxRpcSize   = MaxRpcSize; | 
|  | sif->IfCallbackFn = IfCallbackFn; | 
|  |  | 
|  | EnterCriticalSection(&server_cs); | 
|  | list_add_head(&server_interfaces, &sif->entry); | 
|  | LeaveCriticalSection(&server_cs); | 
|  |  | 
|  | if (sif->Flags & RPC_IF_AUTOLISTEN) | 
|  | RPCRT4_start_listen(TRUE); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUnregisterIf (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUnregisterIf( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, UINT WaitForCallsToComplete ) | 
|  | { | 
|  | PRPC_SERVER_INTERFACE If = IfSpec; | 
|  | HANDLE event = NULL; | 
|  | BOOL found = FALSE; | 
|  | BOOL completed = TRUE; | 
|  | RpcServerInterface *cif; | 
|  | RPC_STATUS status; | 
|  |  | 
|  | TRACE("(IfSpec == (RPC_IF_HANDLE)^%p (%s), MgrTypeUuid == %s, WaitForCallsToComplete == %u)\n", | 
|  | IfSpec, debugstr_guid(&If->InterfaceId.SyntaxGUID), debugstr_guid(MgrTypeUuid), WaitForCallsToComplete); | 
|  |  | 
|  | EnterCriticalSection(&server_cs); | 
|  | LIST_FOR_EACH_ENTRY(cif, &server_interfaces, RpcServerInterface, entry) { | 
|  | if ((!IfSpec || !memcmp(&If->InterfaceId, &cif->If->InterfaceId, sizeof(RPC_SYNTAX_IDENTIFIER))) && | 
|  | UuidEqual(MgrTypeUuid, &cif->MgrTypeUuid, &status)) { | 
|  | list_remove(&cif->entry); | 
|  | TRACE("unregistering cif %p\n", cif); | 
|  | if (cif->CurrentCalls) { | 
|  | completed = FALSE; | 
|  | cif->Delete = TRUE; | 
|  | if (WaitForCallsToComplete) | 
|  | cif->CallsCompletedEvent = event = CreateEventW(NULL, FALSE, FALSE, NULL); | 
|  | } | 
|  | found = TRUE; | 
|  | break; | 
|  | } | 
|  | } | 
|  | LeaveCriticalSection(&server_cs); | 
|  |  | 
|  | if (!found) { | 
|  | ERR("not found for object %s\n", debugstr_guid(MgrTypeUuid)); | 
|  | return RPC_S_UNKNOWN_IF; | 
|  | } | 
|  |  | 
|  | if (completed) | 
|  | HeapFree(GetProcessHeap(), 0, cif); | 
|  | else if (event) { | 
|  | /* sif will be freed when the last call is completed, so be careful not to | 
|  | * touch that memory here as that could happen before we get here */ | 
|  | WaitForSingleObject(event, INFINITE); | 
|  | CloseHandle(event); | 
|  | } | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerUnregisterIfEx (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerUnregisterIfEx( RPC_IF_HANDLE IfSpec, UUID* MgrTypeUuid, int RundownContextHandles ) | 
|  | { | 
|  | FIXME("(IfSpec == (RPC_IF_HANDLE)^%p, MgrTypeUuid == %s, RundownContextHandles == %d): stub\n", | 
|  | IfSpec, debugstr_guid(MgrTypeUuid), RundownContextHandles); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcObjectSetType (RPCRT4.@) | 
|  | * | 
|  | * PARAMS | 
|  | *   ObjUuid  [I] "Object" UUID | 
|  | *   TypeUuid [I] "Type" UUID | 
|  | * | 
|  | * RETURNS | 
|  | *   RPC_S_OK                 The call succeeded | 
|  | *   RPC_S_INVALID_OBJECT     The provided object (nil) is not valid | 
|  | *   RPC_S_ALREADY_REGISTERED The provided object is already registered | 
|  | * | 
|  | * Maps "Object" UUIDs to "Type" UUID's.  Passing the nil UUID as the type | 
|  | * resets the mapping for the specified object UUID to nil (the default). | 
|  | * The nil object is always associated with the nil type and cannot be | 
|  | * reassigned.  Servers can support multiple implementations on the same | 
|  | * interface by registering different end-point vectors for the different | 
|  | * types.  There's no need to call this if a server only supports the nil | 
|  | * type, as is typical. | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcObjectSetType( UUID* ObjUuid, UUID* TypeUuid ) | 
|  | { | 
|  | RpcObjTypeMap *map = RpcObjTypeMaps, *prev = NULL; | 
|  | RPC_STATUS dummy; | 
|  |  | 
|  | TRACE("(ObjUUID == %s, TypeUuid == %s).\n", debugstr_guid(ObjUuid), debugstr_guid(TypeUuid)); | 
|  | if ((! ObjUuid) || UuidIsNil(ObjUuid, &dummy)) { | 
|  | /* nil uuid cannot be remapped */ | 
|  | return RPC_S_INVALID_OBJECT; | 
|  | } | 
|  |  | 
|  | /* find the mapping for this object if there is one ... */ | 
|  | while (map) { | 
|  | if (! UuidCompare(ObjUuid, &map->Object, &dummy)) break; | 
|  | prev = map; | 
|  | map = map->next; | 
|  | } | 
|  | if ((! TypeUuid) || UuidIsNil(TypeUuid, &dummy)) { | 
|  | /* ... and drop it from the list */ | 
|  | if (map) { | 
|  | if (prev) | 
|  | prev->next = map->next; | 
|  | else | 
|  | RpcObjTypeMaps = map->next; | 
|  | HeapFree(GetProcessHeap(), 0, map); | 
|  | } | 
|  | } else { | 
|  | /* ... , fail if we found it ... */ | 
|  | if (map) | 
|  | return RPC_S_ALREADY_REGISTERED; | 
|  | /* ... otherwise create a new one and add it in. */ | 
|  | map = HeapAlloc(GetProcessHeap(), 0, sizeof(RpcObjTypeMap)); | 
|  | map->Object = *ObjUuid; | 
|  | map->Type = *TypeUuid; | 
|  | map->next = NULL; | 
|  | if (prev) | 
|  | prev->next = map; /* prev is the last map in the linklist */ | 
|  | else | 
|  | RpcObjTypeMaps = map; | 
|  | } | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | struct rpc_server_registered_auth_info | 
|  | { | 
|  | struct list entry; | 
|  | TimeStamp exp; | 
|  | CredHandle cred; | 
|  | ULONG max_token; | 
|  | USHORT auth_type; | 
|  | }; | 
|  |  | 
|  | RPC_STATUS RPCRT4_ServerGetRegisteredAuthInfo( | 
|  | USHORT auth_type, CredHandle *cred, TimeStamp *exp, ULONG *max_token) | 
|  | { | 
|  | RPC_STATUS status = RPC_S_UNKNOWN_AUTHN_SERVICE; | 
|  | struct rpc_server_registered_auth_info *auth_info; | 
|  |  | 
|  | EnterCriticalSection(&server_auth_info_cs); | 
|  | LIST_FOR_EACH_ENTRY(auth_info, &server_registered_auth_info, struct rpc_server_registered_auth_info, entry) | 
|  | { | 
|  | if (auth_info->auth_type == auth_type) | 
|  | { | 
|  | *cred = auth_info->cred; | 
|  | *exp = auth_info->exp; | 
|  | *max_token = auth_info->max_token; | 
|  | status = RPC_S_OK; | 
|  | break; | 
|  | } | 
|  | } | 
|  | LeaveCriticalSection(&server_auth_info_cs); | 
|  |  | 
|  | return status; | 
|  | } | 
|  |  | 
|  | void RPCRT4_ServerFreeAllRegisteredAuthInfo(void) | 
|  | { | 
|  | struct rpc_server_registered_auth_info *auth_info, *cursor2; | 
|  |  | 
|  | EnterCriticalSection(&server_auth_info_cs); | 
|  | LIST_FOR_EACH_ENTRY_SAFE(auth_info, cursor2, &server_registered_auth_info, struct rpc_server_registered_auth_info, entry) | 
|  | { | 
|  | FreeCredentialsHandle(&auth_info->cred); | 
|  | HeapFree(GetProcessHeap(), 0, auth_info); | 
|  | } | 
|  | LeaveCriticalSection(&server_auth_info_cs); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerRegisterAuthInfoA (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerRegisterAuthInfoA( RPC_CSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn, | 
|  | LPVOID Arg ) | 
|  | { | 
|  | SECURITY_STATUS sec_status; | 
|  | CredHandle cred; | 
|  | TimeStamp exp; | 
|  | ULONG package_count; | 
|  | ULONG i; | 
|  | PSecPkgInfoA packages; | 
|  | ULONG max_token; | 
|  | struct rpc_server_registered_auth_info *auth_info; | 
|  |  | 
|  | TRACE("(%s,%u,%p,%p)\n", ServerPrincName, AuthnSvc, GetKeyFn, Arg); | 
|  |  | 
|  | sec_status = EnumerateSecurityPackagesA(&package_count, &packages); | 
|  | if (sec_status != SEC_E_OK) | 
|  | { | 
|  | ERR("EnumerateSecurityPackagesA failed with error 0x%08x\n", | 
|  | sec_status); | 
|  | return RPC_S_SEC_PKG_ERROR; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < package_count; i++) | 
|  | if (packages[i].wRPCID == AuthnSvc) | 
|  | break; | 
|  |  | 
|  | if (i == package_count) | 
|  | { | 
|  | WARN("unsupported AuthnSvc %u\n", AuthnSvc); | 
|  | FreeContextBuffer(packages); | 
|  | return RPC_S_UNKNOWN_AUTHN_SERVICE; | 
|  | } | 
|  | TRACE("found package %s for service %u\n", packages[i].Name, | 
|  | AuthnSvc); | 
|  | sec_status = AcquireCredentialsHandleA((SEC_CHAR *)ServerPrincName, | 
|  | packages[i].Name, | 
|  | SECPKG_CRED_INBOUND, NULL, NULL, | 
|  | NULL, NULL, &cred, &exp); | 
|  | max_token = packages[i].cbMaxToken; | 
|  | FreeContextBuffer(packages); | 
|  | if (sec_status != SEC_E_OK) | 
|  | return RPC_S_SEC_PKG_ERROR; | 
|  |  | 
|  | auth_info = HeapAlloc(GetProcessHeap(), 0, sizeof(*auth_info)); | 
|  | if (!auth_info) | 
|  | { | 
|  | FreeCredentialsHandle(&cred); | 
|  | return RPC_S_OUT_OF_RESOURCES; | 
|  | } | 
|  |  | 
|  | auth_info->exp = exp; | 
|  | auth_info->cred = cred; | 
|  | auth_info->max_token = max_token; | 
|  | auth_info->auth_type = AuthnSvc; | 
|  |  | 
|  | EnterCriticalSection(&server_auth_info_cs); | 
|  | list_add_tail(&server_registered_auth_info, &auth_info->entry); | 
|  | LeaveCriticalSection(&server_auth_info_cs); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerRegisterAuthInfoW (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerRegisterAuthInfoW( RPC_WSTR ServerPrincName, ULONG AuthnSvc, RPC_AUTH_KEY_RETRIEVAL_FN GetKeyFn, | 
|  | LPVOID Arg ) | 
|  | { | 
|  | SECURITY_STATUS sec_status; | 
|  | CredHandle cred; | 
|  | TimeStamp exp; | 
|  | ULONG package_count; | 
|  | ULONG i; | 
|  | PSecPkgInfoW packages; | 
|  | ULONG max_token; | 
|  | struct rpc_server_registered_auth_info *auth_info; | 
|  |  | 
|  | TRACE("(%s,%u,%p,%p)\n", debugstr_w(ServerPrincName), AuthnSvc, GetKeyFn, Arg); | 
|  |  | 
|  | sec_status = EnumerateSecurityPackagesW(&package_count, &packages); | 
|  | if (sec_status != SEC_E_OK) | 
|  | { | 
|  | ERR("EnumerateSecurityPackagesW failed with error 0x%08x\n", | 
|  | sec_status); | 
|  | return RPC_S_SEC_PKG_ERROR; | 
|  | } | 
|  |  | 
|  | for (i = 0; i < package_count; i++) | 
|  | if (packages[i].wRPCID == AuthnSvc) | 
|  | break; | 
|  |  | 
|  | if (i == package_count) | 
|  | { | 
|  | WARN("unsupported AuthnSvc %u\n", AuthnSvc); | 
|  | FreeContextBuffer(packages); | 
|  | return RPC_S_UNKNOWN_AUTHN_SERVICE; | 
|  | } | 
|  | TRACE("found package %s for service %u\n", debugstr_w(packages[i].Name), | 
|  | AuthnSvc); | 
|  | sec_status = AcquireCredentialsHandleW((SEC_WCHAR *)ServerPrincName, | 
|  | packages[i].Name, | 
|  | SECPKG_CRED_INBOUND, NULL, NULL, | 
|  | NULL, NULL, &cred, &exp); | 
|  | max_token = packages[i].cbMaxToken; | 
|  | FreeContextBuffer(packages); | 
|  | if (sec_status != SEC_E_OK) | 
|  | return RPC_S_SEC_PKG_ERROR; | 
|  |  | 
|  | auth_info = HeapAlloc(GetProcessHeap(), 0, sizeof(*auth_info)); | 
|  | if (!auth_info) | 
|  | { | 
|  | FreeCredentialsHandle(&cred); | 
|  | return RPC_S_OUT_OF_RESOURCES; | 
|  | } | 
|  |  | 
|  | auth_info->exp = exp; | 
|  | auth_info->cred = cred; | 
|  | auth_info->max_token = max_token; | 
|  | auth_info->auth_type = AuthnSvc; | 
|  |  | 
|  | EnterCriticalSection(&server_auth_info_cs); | 
|  | list_add_tail(&server_registered_auth_info, &auth_info->entry); | 
|  | LeaveCriticalSection(&server_auth_info_cs); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcServerListen (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcServerListen( UINT MinimumCallThreads, UINT MaxCalls, UINT DontWait ) | 
|  | { | 
|  | RPC_STATUS status = RPC_S_OK; | 
|  |  | 
|  | TRACE("(%u,%u,%u)\n", MinimumCallThreads, MaxCalls, DontWait); | 
|  |  | 
|  | if (list_empty(&protseqs)) | 
|  | return RPC_S_NO_PROTSEQS_REGISTERED; | 
|  |  | 
|  | status = RPCRT4_start_listen(FALSE); | 
|  |  | 
|  | if (DontWait || (status != RPC_S_OK)) return status; | 
|  |  | 
|  | return RpcMgmtWaitServerListen(); | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtServerWaitListen (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtWaitServerListen( void ) | 
|  | { | 
|  | TRACE("()\n"); | 
|  |  | 
|  | EnterCriticalSection(&listen_cs); | 
|  |  | 
|  | if (!std_listen) { | 
|  | LeaveCriticalSection(&listen_cs); | 
|  | return RPC_S_NOT_LISTENING; | 
|  | } | 
|  |  | 
|  | LeaveCriticalSection(&listen_cs); | 
|  |  | 
|  | FIXME("not waiting for server calls to finish\n"); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtStopServerListening (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtStopServerListening ( RPC_BINDING_HANDLE Binding ) | 
|  | { | 
|  | TRACE("(Binding == (RPC_BINDING_HANDLE)^%p)\n", Binding); | 
|  |  | 
|  | if (Binding) { | 
|  | FIXME("client-side invocation not implemented.\n"); | 
|  | return RPC_S_WRONG_KIND_OF_BINDING; | 
|  | } | 
|  |  | 
|  | RPCRT4_stop_listen(FALSE); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtEnableIdleCleanup (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtEnableIdleCleanup(void) | 
|  | { | 
|  | FIXME("(): stub\n"); | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             I_RpcServerStartListening (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI I_RpcServerStartListening( HWND hWnd ) | 
|  | { | 
|  | FIXME( "(%p): stub\n", hWnd ); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             I_RpcServerStopListening (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI I_RpcServerStopListening( void ) | 
|  | { | 
|  | FIXME( "(): stub\n" ); | 
|  |  | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             I_RpcWindowProc (RPCRT4.@) | 
|  | */ | 
|  | UINT WINAPI I_RpcWindowProc( void *hWnd, UINT Message, UINT wParam, ULONG lParam ) | 
|  | { | 
|  | FIXME( "(%p,%08x,%08x,%08x): stub\n", hWnd, Message, wParam, lParam ); | 
|  |  | 
|  | return 0; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtInqIfIds (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtInqIfIds(RPC_BINDING_HANDLE Binding, RPC_IF_ID_VECTOR **IfIdVector) | 
|  | { | 
|  | FIXME("(%p,%p): stub\n", Binding, IfIdVector); | 
|  | return RPC_S_INVALID_BINDING; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtInqStats (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtInqStats(RPC_BINDING_HANDLE Binding, RPC_STATS_VECTOR **Statistics) | 
|  | { | 
|  | RPC_STATS_VECTOR *stats; | 
|  |  | 
|  | FIXME("(%p,%p)\n", Binding, Statistics); | 
|  |  | 
|  | if ((stats = HeapAlloc(GetProcessHeap(), 0, sizeof(RPC_STATS_VECTOR)))) | 
|  | { | 
|  | stats->Count = 1; | 
|  | stats->Stats[0] = 0; | 
|  | *Statistics = stats; | 
|  | return RPC_S_OK; | 
|  | } | 
|  | return RPC_S_OUT_OF_RESOURCES; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtStatsVectorFree (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtStatsVectorFree(RPC_STATS_VECTOR **StatsVector) | 
|  | { | 
|  | FIXME("(%p)\n", StatsVector); | 
|  |  | 
|  | if (StatsVector) | 
|  | { | 
|  | HeapFree(GetProcessHeap(), 0, *StatsVector); | 
|  | *StatsVector = NULL; | 
|  | } | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtEpEltInqBegin (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtEpEltInqBegin(RPC_BINDING_HANDLE Binding, ULONG InquiryType, | 
|  | RPC_IF_ID *IfId, ULONG VersOption, UUID *ObjectUuid, RPC_EP_INQ_HANDLE* InquiryContext) | 
|  | { | 
|  | FIXME("(%p,%u,%p,%u,%p,%p): stub\n", | 
|  | Binding, InquiryType, IfId, VersOption, ObjectUuid, InquiryContext); | 
|  | return RPC_S_INVALID_BINDING; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtIsServerListening (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtIsServerListening(RPC_BINDING_HANDLE Binding) | 
|  | { | 
|  | FIXME("(%p): stub\n", Binding); | 
|  | return RPC_S_INVALID_BINDING; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             RpcMgmtSetServerStackSize (RPCRT4.@) | 
|  | */ | 
|  | RPC_STATUS WINAPI RpcMgmtSetServerStackSize(ULONG ThreadStackSize) | 
|  | { | 
|  | FIXME("(0x%x): stub\n", ThreadStackSize); | 
|  | return RPC_S_OK; | 
|  | } | 
|  |  | 
|  | /*********************************************************************** | 
|  | *             I_RpcGetCurrentCallHandle (RPCRT4.@) | 
|  | */ | 
|  | RPC_BINDING_HANDLE WINAPI I_RpcGetCurrentCallHandle(void) | 
|  | { | 
|  | TRACE("\n"); | 
|  | return RPCRT4_GetThreadCurrentCallHandle(); | 
|  | } |