/*++ Copyright (C) Microsoft Corporation, 1996 - 1999 Module Name: dgtrans.cxx Abstract: Common code for winsock-based datagram transports. Author: Dave Steckler (davidst) 15-Mar-1993 Jeff Roberts (jroberts) 02-Dec-1994 Mario Goertzel (mariogo) 10-Apr-1996 Michael Burton (t-mburt) 05-Sep-1997 Charlie Wickham (charlwi) 01-Oct-1997 Revision History: Dave wrote a version. Connie changed it but forgot to add her name. Jeff made it work. Mario rewrote most of it for NT and io completion ports. MarioGo 12/10/1996 Changes for async support, added client t-mburt 09/05/1997 Added prelim support for clusters charlwi 10/01/1997 Finished cluster work --*/ #include #include #include #include #ifdef NCADG_MQ_ON #include "mqtrans.hxx" #endif // // If a datagram send doesn't complete within 5 seconds, abort it. // #define DG_SEND_TIMEOUT (5000) // Cluster SOCKADDR_CLUSTER initialization routine inline void CDP_InitLocalAddress( SOCKADDR_CLUSTER *Address, unsigned short Endpoint ) { Address->sac_family = AF_CLUSTER; Address->sac_node = CLUSADDR_ANY; Address->sac_port = Endpoint; Address->sac_zero = 0; } extern RPC_STATUS CDP_InitializeSockAddr(char *Endpoint, WS_SOCKADDR *, DG_TRANSPORT_ENDPOINT ThisEndpoint = NULL); extern RPC_STATUS UDP_InitializeSockAddr(char *Endpoint, WS_SOCKADDR *, DG_TRANSPORT_ENDPOINT ThisEndpoint = NULL); #ifdef IPX_ON extern RPC_STATUS IPX_InitializeSockAddr(char *Endpoint, WS_SOCKADDR *); #endif const DG_TRANS_INFO DgTransportTable[] = { // UDP { AF_INET, SOCK_DGRAM, IPPROTO_UDP, 0x40000, 0x10000, UDP_InitializeSockAddr }, #ifdef IPX_ON // IPX { AF_IPX, SOCK_DGRAM, NSPROTO_IPX, 0x40000, 0x10000, IPX_InitializeSockAddr }, #else // IPX { 0, 0, 0, 0, 0, 0 }, #endif // CDP { AF_CLUSTER, SOCK_DGRAM, CLUSPROTO_CDP, 0x40000, 0x10000, CDP_InitializeSockAddr } }; inline const DG_TRANS_INFO *GetDgTransportInfo(PROTOCOL_ID id) { #ifdef IPX_ON ASSERT(id == UDP || id == IPX || id == CDP); #else ASSERT(id == UDP || id == CDP); #endif return &DgTransportTable[id - UDP]; } typedef const DG_TRANS_INFO *PDG_TRANS_INFO; // may be TRUE only for rpcss. For all others it's FALSE BOOL fWSARecvMsgFnPtrInitialized = FALSE; const UUID WSARecvMsgFnPtrUuid = WSAID_WSARECVMSG; //////////////////////////////////////////////////////////////////////// // // Generic datagram (winsock and NT based) routines. // RPC_STATUS DG_SubmitReceive(IN PWS_DATAGRAM_ENDPOINT pEndpoint, IN PWS_DATAGRAM pDatagram) /*++ Arguments: pEndpoint - The endpoint on which the receive should be posted. pDatagram - The datagram object to manage the receive. Return Value: RPC_P_IO_PENDING - OK RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES --*/ { RPC_STATUS status; NTSTATUS NtStatus; DWORD bytes, flags; int err; if (pDatagram->Packet.buf == 0) { status = I_RpcTransDatagramAllocate(pEndpoint, (BUFFER *)&pDatagram->Packet.buf, (PUINT) &pDatagram->Packet.len, &pDatagram->AddressPair); if (status != RPC_S_OK) { return(RPC_S_OUT_OF_MEMORY); } pDatagram->AddressPair->LocalAddress = WSA_CMSG_DATA(&pDatagram->MessageAncillaryData) + FIELD_OFFSET(in_pktinfo, ipi_addr); ASSERT( pDatagram->Packet.buf ); } ASSERT(*(PDWORD)pDatagram->Packet.buf = 0xDEADF00D); bytes = flags = 0; if (!fWSARecvMsgFnPtrInitialized) { pDatagram->cRecvAddr = sizeof(WS_SOCKADDR); err = WSARecvFrom(((WS_DATAGRAM_ENDPOINT*)(pDatagram->pEndpoint))->Socket, &pDatagram->Packet, 1, &bytes, &flags, &((WS_SOCKADDR *)pDatagram->AddressPair->RemoteAddress)->generic, &pDatagram->cRecvAddr, &pDatagram->Read.ol, 0); } else { pDatagram->Msg.lpBuffers = &pDatagram->Packet; pDatagram->Msg.name = &((WS_SOCKADDR *)pDatagram->AddressPair->RemoteAddress)->generic; pDatagram->Msg.namelen = sizeof(WS_SOCKADDR); pDatagram->Msg.dwBufferCount = 1; pDatagram->Msg.Control.buf = (char *)pDatagram->MessageAncillaryData; pDatagram->Msg.Control.len = sizeof(pDatagram->MessageAncillaryData); pDatagram->Msg.dwFlags = 0; err = WSARecvMsg(((WS_DATAGRAM_ENDPOINT*)(pDatagram->pEndpoint))->Socket, &pDatagram->Msg, &bytes, &pDatagram->Read.ol, 0); } #if 0 TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "ERROR: RecvFrom: %p buf %p (%d bytes) status %d\n", pDatagram, pDatagram->Packet.buf, pDatagram->Packet.len, err == 0 ? 0 : GetLastError())); #endif if (err == NO_ERROR) { return(RPC_P_IO_PENDING); } status = GetLastError(); if ( status == ERROR_IO_PENDING || status == WSAEMSGSIZE ) { // WSAEMSGSIZE will be handled in complete.cxx. This is like "NO_ERROR" return(RPC_P_IO_PENDING); } RpcpErrorAddRecord( EEInfoGCWinsock, status, EEInfoDLWinsockDatagramSubmitReceive10, ((WS_DATAGRAM_ENDPOINT*)(pDatagram->pEndpoint))->Socket ); if (WSAECONNRESET == status) { return RPC_P_PORT_DOWN; } TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "WSARecvFrom failed %p\n", GetLastError())); return(RPC_S_OUT_OF_RESOURCES); } void DG_SubmitReceives( BASE_ADDRESS *ThisEndpoint ) /*++ Routine Description: Helper function called when the pending IO count on an address is too low. Arguments: ThisEndpoint - The address to submit IOs on. Return Value: None --*/ { PWS_DATAGRAM pDg; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; if (pEndpoint->Socket == 0) { // // The address is currently deactivated, don't submit more I/O // return; } do { BOOL fIoSubmitted; fIoSubmitted = FALSE; // Only one thread should be trying to submit IOs at a time. // This saves locking each DATAGRAM object. // Simple lock - but requires a loop. See the comment at the end // of the loop. if (pEndpoint->fSubmittingIos != 0) break; if (InterlockedIncrement(&pEndpoint->fSubmittingIos) != 1) break; // Submit new IOs on all the idle datagram objects for (int i = 0; i < pEndpoint->cMaximumIos; i++) { pDg = &pEndpoint->aDatagrams[i]; if (pDg->Busy) { continue; } // Must be all set for the IO to complete before trying // to submit the IO. InterlockedIncrement(&pEndpoint->cPendingIos); pDg->Busy = TRUE; if (DG_SubmitReceive(pEndpoint, pDg) == RPC_P_IO_PENDING) { fIoSubmitted = TRUE; } else { pDg->Busy = FALSE; InterlockedDecrement(&pEndpoint->cPendingIos); break; } } // Release the "lock" on the endpoint object. // // Xeon processors have eratta G40: // Potential Loss of Data Coherency Duaring MP Data Ownership Transfer. // To work around it, it is necessary to use InterlockedExchange rather then an assignment // to force cache coherency. InterlockedExchange(&pEndpoint->fSubmittingIos, 0); if (!fIoSubmitted && pEndpoint->cPendingIos == 0) { // It appears that no IO is pending on the endpoint. COMMON_AddressManager(pEndpoint); return; } // Even if we submitted new IOs, they may all have completed // already. Which means we may need to loop and submit more // IOs. This is needed since the thread which completed the // last IO may have run into our lock and returned. } while (pEndpoint->cPendingIos == 0); return; } NETWORK_ADDRESS_VECTOR * DG_GetNetworkAddressVector( IN RPC_TRANSPORT_ADDRESS pAddress ) { PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT) pAddress; ASSERT(pEndpoint->pAddressVector); return pEndpoint->pAddressVector; } RPC_STATUS RPC_ENTRY DG_SendPacket( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, IN DG_TRANSPORT_ADDRESS pAddress, IN BUFFER pHeader, IN unsigned cHeader, IN BUFFER pBody, IN unsigned cBody, IN BUFFER pTrailer, IN unsigned cTrailer ) /*++ Routine Description: Sends a packet to an address. The routine will send a packet built out of the three buffers supplied. All the buffers are optional, the actual packet sent will be built from all the buffers actually supplied. In each call at least buffer should NOT be null. Arguments: ThisEndpoint - Endpoint to send from. pAddress - Address to send to. pHeader - First data buffer cHeader - Size of the first data buffer or 0. pBody - Second data buffer cBody - Size of the second data buffer or 0. pTrailer - Third data buffer. cTrailer - Size of the first data buffer or 0. Return Value: RPC_S_OK RPC_S_OUT_OF_RESOURCES RPC_P_SEND_FAILED --*/ { PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; WS_SOCKADDR* pSockAddr = (WS_SOCKADDR *)pAddress; WSABUF buffers[3]; int cBuffers; HANDLE hIoEvent; DWORD Status = 0; if (pHeader) { CallTestHook( TH_X_DG_SEND, pHeader, &Status ); } else { CallTestHook( TH_X_DG_SEND, pBody, &Status ); } if (Status) { return Status; } hIoEvent = I_RpcTransGetThreadEvent(); cBuffers = 0; if (cHeader) { buffers[cBuffers].len = cHeader; buffers[cBuffers].buf = (PCHAR) pHeader; cBuffers++; } if (cBody) { buffers[cBuffers].len = cBody; buffers[cBuffers].buf = (PCHAR) pBody; cBuffers++; } if (cTrailer) { buffers[cBuffers].len = cTrailer; buffers[cBuffers].buf = (PCHAR) pTrailer; cBuffers++; } ASSERT(cBuffers); // All RPC packets have version 4. // ASSERT( buffers[0].buf[0] == 4 ); OVERLAPPED ol; ol.hEvent = (HANDLE)(ULONG_PTR(hIoEvent) | 1); DWORD bytes; if ( WSASendTo(pEndpoint->Socket, buffers, cBuffers, &bytes, 0, &pSockAddr->generic, WsTransportTable[pEndpoint->id].SockAddrSize, &ol, 0) != 0) { DWORD Status = GetLastError(); RpcpErrorAddRecord( EEInfoGCWinsock, Status, EEInfoDLWinsockDatagramSend10, PULONG(&pSockAddr->generic)[0], PULONG(&pSockAddr->generic)[1] ); if (WSAENETUNREACH == Status) { TransDbgDetail((DPFLTR_RPCPROXY_ID, DPFLTR_INFO_LEVEL, RPCTRANS "WSASendTo failed with net unreachable\n", GetLastError())); return RPC_P_PORT_DOWN; } if (WSAEHOSTDOWN == Status) { TransDbgDetail((DPFLTR_RPCPROXY_ID, DPFLTR_INFO_LEVEL, RPCTRANS "WSASendTo failed with host down\n", GetLastError())); return RPC_P_HOST_DOWN; } if (Status != WSA_IO_PENDING) { TransDbgDetail((DPFLTR_RPCPROXY_ID, DPFLTR_INFO_LEVEL, RPCTRANS "WSASendTo failed %d\n", GetLastError())); return(RPC_P_SEND_FAILED); } if (WAIT_OBJECT_0 != WaitForSingleObject( hIoEvent, DG_SEND_TIMEOUT )) { TransDbgDetail((DPFLTR_RPCPROXY_ID, DPFLTR_INFO_LEVEL, RPCTRANS "Dg Send timed out\n")); // // Cancel the send and wait for it to complete. // CancelIo( (HANDLE)pEndpoint->Socket ); GetOverlappedResult((HANDLE)pEndpoint->Socket, &ol, &bytes, TRUE); return(RPC_P_SEND_FAILED); } BOOL b = GetOverlappedResult((HANDLE)pEndpoint->Socket, &ol, &bytes, TRUE); if (!b) { TransDbgDetail((DPFLTR_RPCPROXY_ID, DPFLTR_INFO_LEVEL, RPCTRANS "Dg Send wait failed %d\n", GetLastError())); return(RPC_P_SEND_FAILED); } } ASSERT(bytes == cHeader + cBody + cTrailer); if (pEndpoint->cMinimumIos && pEndpoint->cPendingIos <= pEndpoint->cMinimumIos) { // It's ok if this fails, this is just a performance optimization. // Right after a send there often "idle" time waiting for the response // so this is a good time to submit receives. DG_SubmitReceives(pEndpoint); } return(RPC_S_OK); } RPC_STATUS RPC_ENTRY DG_ForwardPacket( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, IN BUFFER pHeader, IN unsigned cHeader, IN BUFFER pBody, IN unsigned cBody, IN BUFFER pTrailer, IN unsigned cTrailer, IN CHAR * pszPort ) /*++ Routine Description: Sends a packet to the server it was originally destined for (that is, the client had a dynamic endpoint it wished the enpoint mapper to resolve and forward the packet to). Arguments: ThisEndpoint - The endpoint to forward the packet from. // Buffer like DG_SendPacket pszPort - Pointer to the server port num to forward to. This is in an Ansi string. Return Value: RPC_S_CANT_CREATE_ENDPOINT - pEndpoint invalid. results of SendPacket(). --*/ { PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; WS_SOCKADDR SockAddr; PDG_TRANS_INFO pInfo = GetDgTransportInfo(pEndpoint->id); DG_TRANSPORT_ENDPOINT EndpointWithAddressToForwardTo; ASSERT(pEndpoint->type | SERVER); // If selective bindings are enabled, forward the packet to the // interface that the current endpoint is listening on // rather then to the loopback address. Otherwise, forward to // the loopback address by default. if (pFirewallTable != NULL) EndpointWithAddressToForwardTo = ThisEndpoint; else EndpointWithAddressToForwardTo = NULL; if (pInfo->EndpointToAddr(pszPort, &SockAddr, EndpointWithAddressToForwardTo) != RPC_S_OK) { return RPC_S_CANT_CREATE_ENDPOINT; } return ( DG_SendPacket(ThisEndpoint, (PVOID)&SockAddr, pHeader, cHeader, pBody, cBody, pTrailer, cTrailer) ); } RPC_STATUS RPC_ENTRY DG_ReceivePacket( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, OUT DG_TRANSPORT_ADDRESS *pReplyAddress, OUT PUINT pBufferLength, OUT BUFFER *pBuffer, IN LONG Timeout ) /*++ Routine Description: Used to wait for a datagram from a server. Returns the data returned and the address of the machine which replied. This is a blocking API. It should only be called during sync client RPC threads. Arguments: Endpoint - The endpoint to receive from. ReplyAddress - Contain the source address of the datagram if successful. BufferLength - The size of Buffer on input, the size of the datagram received on output. Timeout - Milliseconds to wait for a datagram. Return Value: RPC_S_OK RPC_P_OVERSIZE_PACKET - Datagram > BufferLength arrived, first BufferLength bytes of Buffer contain the partial datagram. RPC_P_RECEIVE_FAILED RPC_P_TIMEOUT --*/ { RPC_STATUS status; BOOL b; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; PWS_DATAGRAM pDatagram = &pEndpoint->aDatagrams[0]; DWORD bytes; DWORD flags; int err; ASSERT((pEndpoint->type & TYPE_MASK) == CLIENT); ASSERT(pEndpoint->aDatagrams[0].Read.ol.hEvent); DWORD Status = 0; CallTestHook( TH_X_DG_SYNC_RECV, ThisEndpoint, &Status ); if (Status) { return Status; } if (pDatagram->Busy == 0) { if (pEndpoint->aDatagrams[0].Packet.buf == 0) { status = I_RpcTransDatagramAllocate(pEndpoint, (BUFFER *)&pDatagram->Packet.buf, (PUINT) &pDatagram->Packet.len, &pDatagram->AddressPair); if (status != RPC_S_OK) { return(RPC_S_OUT_OF_MEMORY); } pDatagram->cRecvAddr = sizeof(WS_SOCKADDR); pDatagram->AddressPair->LocalAddress = WSA_CMSG_DATA(&pDatagram->MessageAncillaryData) + FIELD_OFFSET(in_pktinfo, ipi_addr); ASSERT( pDatagram->Packet.buf ); } bytes = flags = 0; if (!fWSARecvMsgFnPtrInitialized) { err = WSARecvFrom(pEndpoint->Socket, &pDatagram->Packet, 1, &bytes, &flags, &((WS_SOCKADDR *)pDatagram->AddressPair->RemoteAddress)->generic, &pDatagram->cRecvAddr, &pDatagram->Read.ol, 0); } else { pDatagram->Msg.lpBuffers = &pDatagram->Packet; pDatagram->Msg.name = &((WS_SOCKADDR *)pDatagram->AddressPair->RemoteAddress)->generic; pDatagram->Msg.namelen = sizeof(WS_SOCKADDR); pDatagram->Msg.dwBufferCount = 1; pDatagram->Msg.Control.buf = (char *)&pDatagram->MessageAncillaryData; pDatagram->Msg.Control.len = sizeof(pDatagram->MessageAncillaryData); pDatagram->Msg.dwFlags = 0; err = WSARecvMsg(((WS_DATAGRAM_ENDPOINT*)(pDatagram->pEndpoint))->Socket, &pDatagram->Msg, &bytes, &pDatagram->Read.ol, 0); } if ( err != 0) { status = GetLastError(); if (status != WSA_IO_PENDING) { RpcpErrorAddRecord( EEInfoGCWinsock, status, EEInfoDLWinsockDatagramReceive10, pEndpoint->Socket ); if (status == WSAEMSGSIZE) { status = RPC_P_OVERSIZE_PACKET; } else if (status == WSAECONNRESET) { return RPC_P_PORT_DOWN; } else { // No need to free the packet now. TransDbgDetail((DPFLTR_RPCPROXY_ID, DPFLTR_INFO_LEVEL, RPCTRANS "WSARecvFrom failed %d\n", status)); ASSERT(pDatagram->Busy == 0); return(RPC_P_RECEIVE_FAILED); } } else { status = RPC_P_IO_PENDING; } } else { status = RPC_S_OK; } pDatagram->Busy = TRUE; } else { ASSERT(pDatagram->Busy); ASSERT(pDatagram->Packet.buf); status = RPC_P_IO_PENDING; } // Wait for IO to complete or timeout if (status == RPC_P_IO_PENDING) { status = WaitForSingleObjectEx(pDatagram->Read.ol.hEvent, Timeout, TRUE); if (status != STATUS_WAIT_0) { // In the timeout case we just want to return and // leave. We'll finish the receive on the next call. if (status == WAIT_IO_COMPLETION) { TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "DG received cancelled (%p)\n", pDatagram)); } else { ASSERT(status == STATUS_TIMEOUT); } ASSERT(pDatagram->Busy); return(RPC_P_TIMEOUT); } BOOL b = GetOverlappedResult((HANDLE)pEndpoint->Socket, &pDatagram->Read.ol, &bytes, FALSE); if (!b) { RpcpErrorAddRecord( EEInfoGCWinsock, GetLastError(), EEInfoDLWinsockDatagramSend20, pEndpoint->Socket ); switch (GetLastError()) { case WSAEMSGSIZE: case ERROR_MORE_DATA: ASSERT(bytes == pDatagram->Packet.len); status = RPC_P_OVERSIZE_PACKET; break; case ERROR_PORT_UNREACHABLE: pDatagram->Busy = 0; return RPC_P_PORT_DOWN; break; case STATUS_TIMEOUT: ASSERT(0); case ERROR_OPERATION_ABORTED: // ERROR_OPERATION_ABORTED can occur if one thread // tried to make a call and failed, leaving a pending // receive. That thread dies. Then the endpoint is // reused by a different thread and the IO is aborted. // Returning receive failed will cause the runtime to // retransmit which will do the right thing. default: TransDbgDetail((DPFLTR_RPCPROXY_ID, DPFLTR_INFO_LEVEL, RPCTRANS "DG sync recv failed %d\n", GetLastError())); pDatagram->Busy = 0; return(RPC_P_RECEIVE_FAILED); break; } } else { status = RPC_S_OK; } } ASSERT( status == RPC_S_OK || status == RPC_P_OVERSIZE_PACKET); ASSERT(pDatagram->Busy); ASSERT(pDatagram->Packet.buf); ASSERT(bytes <= pDatagram->Packet.len); *pBuffer = (BUFFER)pDatagram->Packet.buf; *pBufferLength = bytes; *pReplyAddress = pDatagram->AddressPair->RemoteAddress; pDatagram->Packet.buf = 0; pDatagram->Busy = 0; return(status); } RPC_STATUS RPC_ENTRY DG_ReceivePacket_Avrf( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, OUT DG_TRANSPORT_ADDRESS *pReplyAddress, OUT PUINT pBufferLength, OUT BUFFER *pBuffer, IN LONG Timeout ) /*++ Routine Description: Wrapper for DG_ReceivePacket implementing corruption injection under the RPC verifier. SyncRecv member of the transport interface may only be called by the cliet, hence we inject the corruption for a client receive. Arguments: Return Value: --*/ { RPC_STATUS Status; Status = DG_ReceivePacket( ThisEndpoint, pReplyAddress, pBufferLength, pBuffer, Timeout ); if (!Status) { if (gfRPCVerifierEnabled) { CorruptionInject(ClientReceive, pBufferLength, (void **)pBuffer); } } return Status; } RPC_STATUS DG_CreateEndpoint( OUT WS_DATAGRAM_ENDPOINT *pEndpoint ) /*++ Routine Description: Creates a new endpoint. Arguments: pEndpoint - The runtime allocated endpoint structure to filled in. pSockAddr - An initialized sockaddr with the correct (or no) endpoint. id - The id of the protocol to use in creating the address. fClient - If TRUE this is a client endpoint fAsync - If TRUE this endpoint is "async" which means that a) It should be added to the IO completion port and b) that the transport should pend a number of receives on the endpoint automatically. EndpointFlags - used in allocation IP ports. Return Value: RPC_S_OK RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES RPC_S_CANT_CREATE_ENDPOINT RPC_S_DUPLICATE_ENDPOINT --*/ { PWS_DATAGRAM pDatagram; int i, err; int length; RPC_STATUS status = RPC_S_OK; SOCKET sock = 0; PDG_TRANS_INFO pInfo = GetDgTransportInfo(pEndpoint->id); BOOL fClient = pEndpoint->fClient; BOOL fAsync = pEndpoint->fAsync; LPFN_WSARECVMSG WSARecvMsgFnPtr; DWORD dwBytesReturned; // Common stuff pEndpoint->type = DATAGRAM | ADDRESS; pEndpoint->Socket = 0; pEndpoint->Endpoint = 0; pEndpoint->pAddressVector = 0; pEndpoint->SubmitListen = DG_SubmitReceives; pEndpoint->InAddressList = NotInList; pEndpoint->pNext = 0; pEndpoint->fSubmittingIos = 0; pEndpoint->cPendingIos = 0; pEndpoint->cMinimumIos = 0; pEndpoint->cMaximumIos = 0; pEndpoint->aDatagrams = 0; pEndpoint->pFirstAddress = pEndpoint; pEndpoint->pNextAddress = 0; pEndpoint->fAborted = 0; if (fClient) { pEndpoint->type |= CLIENT; } else { pEndpoint->type |= SERVER; } // // Check if we can use a wrapper around the AFD send/recv // IOCTLs instead WSASendTo. // TryUsingAfd(); // // Create the socket. // sock = WSASocketT(pInfo->AddressFamily, pInfo->SocketType, pInfo->Protocol, 0, 0, WSA_FLAG_OVERLAPPED); if (sock == INVALID_SOCKET) { RpcpErrorAddRecord( EEInfoGCWinsock, GetLastError(), EEInfoDLWinsockDatagramCreate10, (ULONG) pInfo->AddressFamily, (ULONG) pInfo->Protocol ); switch(GetLastError()) { case WSAEAFNOSUPPORT: case WSAEPROTONOSUPPORT: case WSAENETDOWN: case WSAEINVAL: case WSAEPROTOTYPE: case WSAENOPROTOOPT: case WSAESOCKTNOSUPPORT: case WSAEPFNOSUPPORT: case WSAEADDRNOTAVAIL: status = RPC_S_PROTSEQ_NOT_SUPPORTED; break; case WSAENOBUFS: case WSAEMFILE: case WSA_NOT_ENOUGH_MEMORY: // This failure is possible in low memory conditions // or due to fault injection during registry read or // notification creation. case WSASYSCALLFAILURE: status = RPC_S_OUT_OF_MEMORY; break; default: TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "DG socket() returned 0x%lx\n", GetLastError())); ASSERT(0); // no break case WSAEPROVIDERFAILEDINIT: status = RPC_S_OUT_OF_RESOURCES; break; } return(status); } if (fWSARecvMsgFnPtrInitialized == FALSE) { // if the AddressChangeFn is non-default (i.e. we are in RPCSS), // use WSARecvMsg so that we can retrieve the local address as // well if (AddressChangeFn && (AddressChangeFn != NullAddressChangeFn)) { // retrieve the WSARecvMsg function pointer err = WSAIoctl(sock, SIO_GET_EXTENSION_FUNCTION_POINTER, (void *) &WSARecvMsgFnPtrUuid, sizeof(UUID), (void *) &WSARecvMsgFnPtr, sizeof(void *), &dwBytesReturned, NULL, NULL); if (err == SOCKET_ERROR) { closesocket(sock); return RPC_S_PROTSEQ_NOT_SUPPORTED; } WFT.pWSARecvMsg = WSARecvMsgFnPtr; fWSARecvMsgFnPtrInitialized = TRUE; } } // // Make the handle non-inheritable so it goes away when we close it. // if (FALSE == SetHandleInformation( (HANDLE) sock, HANDLE_FLAG_INHERIT, 0)) { closesocket(sock); return RPC_S_OUT_OF_RESOURCES; } // // Protect the socket to prevent another server from using our port. // WS_ProtectListeningSocket(sock, TRUE); // // Bind the socket to the endpoint (or to a dynamic endpoint) // status = WS_Bind(sock, &pEndpoint->ListenAddr, (pEndpoint->id == UDP), pEndpoint->EndpointFlags); if (status != RPC_S_OK) { closesocket(sock); return(status); } pEndpoint->Socket = sock; // // Turn on ring buffering for server- and client-side async endpoints. // Any error is ignored. // if (fAsync || !fClient) { DWORD BytesReturned; if (0 != WSAIoctl( sock, SIO_ENABLE_CIRCULAR_QUEUEING, 0, 0, 0, 0, &BytesReturned, 0, 0 )) { TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "DG couldn't enable circular queueing 0x%lx\n", GetLastError())); } } if (!fClient) { // // Set server socket recv buffer size.. // int size; int PacketInfoOn = TRUE; if (gfServerPlatform == TRUE && gPhysicalMemorySize >= 40) { size = pInfo->ServerBufferSize; } else { size = pInfo->WorkstationBufferSize; } if (fWSARecvMsgFnPtrInitialized) { err = setsockopt(sock, IPPROTO_IP, IP_PKTINFO, (char *)&PacketInfoOn, sizeof(PacketInfoOn) ); if (err != 0) { TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "DG couldn't set packet info %d\n", GetLastError())); closesocket(sock); return(RPC_S_OUT_OF_MEMORY); } } err = setsockopt(sock, SOL_SOCKET, SO_RCVBUF, (char *) &size, sizeof(size) ); #if DBG if (err != 0) TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "DG couldn't set buffer size %d\n", GetLastError())); #endif } else { // Enable broadcast send on the client DWORD option = TRUE; err = setsockopt(sock, SOL_SOCKET, SO_BROADCAST, (PCHAR)&option, sizeof(option)); ASSERT(err == 0); } // // If the endpoint is going to async initialize async part // and add the socket to the IO completion port. // if (status == RPC_S_OK) { int cMaxIos; int cMinIos; ASSERT(fAsync || fClient); // Step one, figure out the high and low mark for ios. if (fAsync) { cMinIos = 1; cMaxIos = 2; if (gPhysicalMemorySize >= 40) // megabytes { cMaxIos = 2 + (gfServerPlatform == TRUE) * 2 + (fClient == FALSE) * gNumberOfProcessors; // This should be larger than zero so that we'll generally submit new // recvs during idle time rather then just after receiving a datagram. cMinIos = 1 + (fClient == FALSE ) * (gNumberOfProcessors/2); } } else { // For sync endpoints we need to allocate a single datagram // object for the receive. cMinIos = 0; cMaxIos = 1; } ASSERT(cMinIos < cMaxIos); pEndpoint->cMinimumIos = cMinIos; pEndpoint->cMaximumIos = cMaxIos; // Allocate a chunk on memory to hold the array of datagrams // PERF: For clients, allocate larger array but don't submit all // the IOs unless we determine that the port is "really" active. pEndpoint->aDatagrams = new WS_DATAGRAM[cMaxIos]; if (pEndpoint->aDatagrams) { UINT type; type = DATAGRAM | RECEIVE; type |= (fClient) ? CLIENT : SERVER; for (i = 0; i < cMaxIos; i++) { pDatagram = &pEndpoint->aDatagrams[i]; pDatagram->id = pEndpoint->id; pDatagram->type = type; pDatagram->pEndpoint = pEndpoint; pDatagram->Busy = 0; pDatagram->Packet.buf = 0; memset(&pDatagram->Read, 0, sizeof(pDatagram->Read)); pDatagram->Read.pAsyncObject = pDatagram; } if (fAsync) { status = COMMON_PrepareNewHandle((HANDLE)sock); } else { // The receive operation on sync endpoints will may span // several receives. This means it can't use the thread // event, so allocate an event for the receive. HANDLE hEvent = CreateEventW(0, TRUE, FALSE, 0); if (!hEvent) { status = RPC_S_OUT_OF_RESOURCES; } else { ASSERT(pDatagram == &pEndpoint->aDatagrams[0]); pDatagram->Read.ol.hEvent = hEvent; } } } else { status = RPC_S_OUT_OF_MEMORY; } } // If adding a new failure case here, add code to close the sync receive event. if (status != RPC_S_OK) { closesocket(sock); delete pEndpoint->aDatagrams; return(status); } TransportProtocol::AddObjectToProtocolList((BASE_ASYNC_OBJECT *) pEndpoint); if (!fClient) { TransportProtocol::FunctionalProtocolDetected(pEndpoint->id); } return(RPC_S_OK); } VOID DG_DeactivateAddress ( IN WS_DATAGRAM_ENDPOINT *pEndpoint ) /*++ Function Name:DG_DeactivateAddress Parameters: Description: Returns: --*/ { if (InterlockedIncrement(&pEndpoint->fAborted) != 1) { return; } if (pEndpoint->Socket) { closesocket(pEndpoint->Socket); pEndpoint->Socket = 0; } } RPC_STATUS DG_ReactivateAddress ( IN WS_DATAGRAM_ENDPOINT *pEndpoint ) /*++ Function Name:DG_DeactivateAddress Parameters: Description: Returns: --*/ { RPC_STATUS Status; WS_SOCKADDR *addr = &pEndpoint->ListenAddr; // // If the endpoint is dynamic, clear out the endpoint // if (pEndpoint->fDynamicEndpoint) { // // Clear out the listenaddr // switch (pEndpoint->id) { #ifdef IPX_ON case IPX: addr->ipxaddr.sa_socket = 0; break; #endif case CDP: CDP_InitLocalAddress(&addr->clusaddr, 0); break; case UDP: addr->inetaddr.sin_port = 0; break; default: ASSERT(0); } } Status = DG_CreateEndpoint(pEndpoint); if (Status == RPC_S_OK) { pEndpoint->fAborted = 0; DG_SubmitReceives(pEndpoint); } return Status; } void RPC_ENTRY DG_ServerAbortListen( IN DG_TRANSPORT_ENDPOINT ThisEndpoint ) /*++ Routine Description: Callback after DG_CreateEndpoint has completed successfully but the runtime for some reason is not going to be able to listen on the endpoint. --*/ { PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; ASSERT(pEndpoint->cPendingIos == 0); ASSERT(pEndpoint->Socket); ASSERT(pEndpoint->pNext == 0); ASSERT(pEndpoint->type & SERVER); delete pEndpoint->pAddressVector; delete pEndpoint->aDatagrams; closesocket(pEndpoint->Socket); return; } RPC_STATUS RPC_ENTRY DG_ClientCloseEndpoint( IN DG_TRANSPORT_ENDPOINT ThisEndpoint ) /*++ Routine Description: Called on sync client endpoints when they are no longer needed. Arguments: ThisEndpoint Return Value: RPC_S_OK --*/ { BOOL b; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; PWS_DATAGRAM pDatagram = &pEndpoint->aDatagrams[0]; ASSERT((pEndpoint->type & TYPE_MASK) == CLIENT); ASSERT(pEndpoint->Socket); // Open must have worked ASSERT(pEndpoint->cMinimumIos == 0); ASSERT(pEndpoint->cMaximumIos == 1); // Must not be async! ASSERT(pEndpoint->aDatagrams); ASSERT(pEndpoint->aDatagrams[0].Read.ol.hEvent); ASSERT(pEndpoint->Endpoint == 0); ASSERT(pEndpoint->pAddressVector == 0); ASSERT(pEndpoint->pNext == 0); // If there is a pending receive, closing the socket will cancel the IO. closesocket(pEndpoint->Socket); // Wait for the pending receive to actually complete. if (pDatagram->Busy) { DWORD bytes; ASSERT(pDatagram->Busy); ASSERT(pDatagram->Packet.buf); GetOverlappedResult((HANDLE)pEndpoint->Socket, &pDatagram->Read.ol, &bytes, TRUE); if (GetLastError() != ERROR_OPERATION_ABORTED) { // Overactive output, the receive may have completed normally.. TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "DG receive completed %d on %p after closed\n", GetLastError(), pDatagram)); } } b = CloseHandle(pEndpoint->aDatagrams[0].Read.ol.hEvent); ASSERT(b); TransportProtocol::RemoveObjectFromProtocolList(pEndpoint); // Free the receive buffer if allocated if (pDatagram->Packet.buf) { I_RpcTransDatagramFree(pEndpoint, (BUFFER)pDatagram->Packet.buf ); } delete pDatagram; return(RPC_S_OK); } RPC_STATUS RPC_ENTRY DG_GetEndpointStats( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, OUT DG_ENDPOINT_STATS * pStats ) { DWORD Status; DWORD Data; int Length; BOOL Ok; PWS_DATAGRAM_ENDPOINT Endpoint = (PWS_DATAGRAM_ENDPOINT) ThisEndpoint; Length = sizeof(DWORD); Status = getsockopt(Endpoint->Socket, SOL_SOCKET, SO_MAX_MSG_SIZE, (char *) &Data, &Length); if (Status) { return GetLastError(); } // // jroberts, 10-Jan-2001 : I believe that getsockopt is returning 0xffffffff occasionally. // This is an attempt to catch it. // if (Endpoint->id == UDP) { ASSERT( Data < 0x10000 ); } Data &= ~7UL; pStats->MaxPduSize = Data; Length = sizeof(DWORD); Status = getsockopt(Endpoint->Socket, SOL_SOCKET, SO_RCVBUF, (char *) &Data, &Length); if (Status) { return GetLastError(); } Data &= ~7UL; pStats->ReceiveBufferSize = Data; return RPC_S_OK; } //////////////////////////////////////////////////////////////////////// // // CDP/IP specific functions. // RPC_STATUS RPC_ENTRY CDP_ServerListen( IN OUT DG_TRANSPORT_ENDPOINT ThisEndpoint, IN RPC_CHAR *NetworkAddress, IN OUT RPC_CHAR **pPort, IN void *pSecurityDescriptor, IN ULONG EndpointFlags, IN ULONG NICFlags ) /*++ Routine Description: Creates a server endpoint object to receive packets. New packets won't actually arrive until CompleteListen is called. Arguments: ThisEndpoint - Storage for the server endpoint object. pPort - The endpoint to listen on or a pointer to 0 if the transport should choose the address. Contains the endpoint listened to on output. The caller should free this. pSecurityDiscriptor - Security to attach to this endpoint (not used by this transport). EndpointFlags - Application flags passed into RPC via RpcServerUseProtseq*Ex. NICFlags - Application flags passed into RPC via RpcServerUseProtseq*Ex. pNetworkAddresses - A vector of the network addresses listened on by this call. This vector does not need to be freed. Return Value: RPC_S_OK RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES RPC_S_CANT_CREATE_ENDPOINT RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_DUPLICATE_ENDPOINT --*/ { RPC_STATUS status; NTSTATUS NtStatus; USHORT port; UNICODE_STRING UnicodeString; ANSI_STRING AsciiString; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; WS_SOCKADDR *addr = &pEndpoint->ListenAddr; NETWORK_ADDRESS_VECTOR * ServerAddress; // Figure out the port to listen on. if (*pPort) { status = EndpointToPortNumber(*pPort, port); if (status != RPC_S_OK) { return(status); } pEndpoint->fDynamicEndpoint = 0; CDP_InitLocalAddress( &addr->clusaddr, port ); } else { return RPC_S_INVALID_ENDPOINT_FORMAT; } pEndpoint->id = CDP; pEndpoint->fClient = FALSE; pEndpoint->fAsync = TRUE; pEndpoint->EndpointFlags = 0; // // Actually create the endpoint // status = DG_CreateEndpoint(pEndpoint); if (status != RPC_S_OK) { return(status); } // Figure out the network addresses. // The only way we can determine our cluster // address is to read it out of the registry status = CDP_BuildAddressVector(&pEndpoint->pAddressVector); if (status != RPC_S_OK) { DG_ServerAbortListen(ThisEndpoint); return(status); } return RPC_S_OK; } RPC_STATUS CDP_QueryEndpoint ( IN void * pOriginalEndpoint, OUT RPC_CHAR * pClientEndpoint ) { WS_SOCKADDR * pSockAddr = (WS_SOCKADDR *)pOriginalEndpoint; unsigned NativeSocket = pSockAddr->clusaddr.sac_port; char AnsiBuffer[CDP_MAXIMUM_ENDPOINT]; char * pAnsi = AnsiBuffer; RPC_CHAR * pUni = pClientEndpoint; // // Convert endpoint to an ASCII string, and thence to Unicode. // _ultoa(NativeSocket, AnsiBuffer, 10); while ( *pUni++ = *pAnsi++ ); return RPC_S_OK; } RPC_STATUS CDP_QueryAddress ( IN void * pOriginalEndpoint, OUT RPC_CHAR * pClientAddress ) { PSOCKADDR_CLUSTER pSockAddr = (PSOCKADDR_CLUSTER) pOriginalEndpoint; _ultow(pSockAddr->sac_node, pClientAddress, 10); return(RPC_S_OK); } RPC_STATUS RPC_ENTRY CDP_ClientInitializeAddress ( OUT DG_TRANSPORT_ADDRESS Address, IN RPC_CHAR *NetworkAddress, IN RPC_CHAR *pPort, IN BOOL fUseCache, IN BOOL fBroadcast ) /*++ Routine Description: Initializes a address object for sending to a server. Arguments: Address - Storage for the address NetworkAddress - The address of the server or 0 if local Endpoint - The endpoint of the server fUseCache - If TRUE then the transport may use a cached value from a previous call on the same NetworkAddress. fBroadcast - If TRUE, NetworkAddress is ignored and a broadcast address is used. Return Value: RPC_S_OK - Success, name resolved and, optionally, added to cache. RPC_P_FOUND_IN_CACHE - Success, returned only if fUseCache is TRUE and the was name found in local cache. RPC_P_MATCHED_CACHE - Partial success, fUseCache is FALSE and the result of the lookup was the same as the value previously in the cache. RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_SERVER_UNAVAILABLE --*/ { WS_SOCKADDR *pAddr = (WS_SOCKADDR *)Address; ULONG HostAddr; ULONG Endpoint; int i; USHORT port; RPC_STATUS status; // Figure out the destination port status = EndpointToPortNumber(pPort, port); if (RPC_S_OK != status) { ASSERT( 0 ); return(status); } CDP_InitLocalAddress( &pAddr->clusaddr, port ); // Resolve the network address - CDP addresses are // numbers representing a member ID in the cluster. pAddr->clusaddr.sac_node = _wtol( NetworkAddress ); return(status); } RPC_STATUS RPC_ENTRY CDP_ClientOpenEndpoint( OUT DG_TRANSPORT_ENDPOINT ThisEndpoint, IN BOOL fAsync, DWORD Flags, IN DG_TRANSPORT_ENDPOINT ServerEndpoint OPTIONAL ) { RPC_STATUS Status; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; // We don't care what port we bind to, we also don't care what // port we bind to. // I think he's trying to say that we don't care what port // we bind to. CDP_InitLocalAddress(&pEndpoint->ListenAddr.clusaddr, 0); pEndpoint->id = CDP; pEndpoint->fClient = TRUE; pEndpoint->fAsync = fAsync; pEndpoint->EndpointFlags = 0; pEndpoint->fDynamicEndpoint = 1; Status = DG_CreateEndpoint(pEndpoint); return Status; } RPC_STATUS CDP_InitializeSockAddr( IN char *Endpoint, OUT WS_SOCKADDR *pSockAddr, DG_TRANSPORT_ENDPOINT ThisEndpoint ) /*++ Routine Description: Initialized the sockaddr to be a loopback address to the endpoint specified. Used to forward packets locally. Arguments: Endpoint - The string value of the servers endpoint. pSockAddr - The sockaddr to fill in. Return Value: RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_OK --*/ { long port; port = atol(Endpoint); if (port <= 0 || port > 0xFFFF) { ASSERT( 0 ); return(RPC_S_INVALID_ENDPOINT_FORMAT); } CDP_InitLocalAddress(&pSockAddr->clusaddr, (unsigned short) port); return(RPC_S_OK); } RPC_STATUS RPC_ENTRY CDP_GetEndpointStats( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, OUT DG_ENDPOINT_STATS * pStats ) { RPC_STATUS Status; Status = DG_GetEndpointStats(ThisEndpoint, pStats); if (Status) { pStats->MaxPduSize = 1452; pStats->MaxPacketSize = 1452; pStats->PreferredPduSize = 1452; pStats->ReceiveBufferSize= 8192; return Status; } // // ethernet frame (1500) - UDP/IP headers (28) - CNP/CDP headers (20) // pStats->MaxPacketSize = 1452; pStats->PreferredPduSize = 4096; if (pStats->PreferredPduSize > pStats->MaxPduSize) { pStats->PreferredPduSize = pStats->MaxPduSize; } return RPC_S_OK; } //////////////////////////////////////////////////////////////////////// // // UDP/IP specific functions. // RPC_STATUS RPC_ENTRY UDP_ServerListen( IN OUT DG_TRANSPORT_ENDPOINT ThisEndpoint, IN RPC_CHAR *NetworkAddress, IN OUT RPC_CHAR **pPort, IN void *pSecurityDescriptor, IN ULONG EndpointFlags, IN ULONG NICFlags ) /*++ Routine Description: Creates a server endpoint object to receive packets. New packets won't actually arrive until CompleteListen is called. Arguments: ThisEndpoint - Storage for the server endpoint object. pPort - The endpoint to listen on or a pointer to 0 if the transport should choose the address. Contains the endpoint listened to on output. The caller should free this. pSecurityDiscriptor - Security to attach to this endpoint (not used by UDP). EndpointFlags - Application flags passed into RPC via RpcServerUseProtseq*Ex. NICFlags - Application flags passed into RPC via RpcServerUseProtseq*Ex. pNetworkAddresses - A vector of the network addresses listened on by this call. This vector does not need to be freed. Return Value: RPC_S_OK RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES RPC_S_CANT_CREATE_ENDPOINT RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_DUPLICATE_ENDPOINT --*/ { RPC_STATUS status; NTSTATUS NtStatus; USHORT port; UNICODE_STRING UnicodeString; ANSI_STRING AsciiString; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; WS_SOCKADDR *addr = &pEndpoint->ListenAddr; addr->inetaddr.sin_family = AF_INET; if (NetworkAddress) { IP_ADDRESS_RESOLVER resolver(NetworkAddress, cosServer, ipvtuIPv4 // IP version to use ); // Loop until success, fatal failure or we run out of addresses. status = resolver.NextAddress(&addr->inetaddr); if (status != RPC_S_OK) { return RPC_S_INVALID_NET_ADDR; } } else { addr->inetaddr.sin_addr.s_addr = INADDR_ANY; } // Figure out the port to listen on. if (*pPort) { status = EndpointToPortNumber(*pPort, port); if (status != RPC_S_OK) { return(status); } pEndpoint->fDynamicEndpoint = 0; addr->inetaddr.sin_port = htons(port); } else { addr->inetaddr.sin_port = 0; pEndpoint->fDynamicEndpoint = 1; } pEndpoint->id = UDP; pEndpoint->fClient = FALSE; pEndpoint->fAsync = TRUE; pEndpoint->EndpointFlags = EndpointFlags; // // Actually create the endpoint // status = DG_CreateEndpoint(pEndpoint); if (status != RPC_S_OK) { return(status); } // If needed, return the endpoint. if (!*pPort) { *pPort = new RPC_CHAR[IP_MAXIMUM_ENDPOINT]; if (!*pPort) { DG_ServerAbortListen(ThisEndpoint); return(RPC_S_OUT_OF_MEMORY); } port = ntohs(addr->inetaddr.sin_port); PortNumberToEndpoint(port, *pPort); } // Figure out the network addresses ASSERT(pEndpoint->pAddressVector == NULL); status = IP_BuildAddressVector(&pEndpoint->pAddressVector, NICFlags, NetworkAddress, NULL); if (status != RPC_S_OK) { DG_ServerAbortListen(ThisEndpoint); return(status); } return RPC_S_OK; } RPC_STATUS UDP_QueryEndpoint ( IN void * pOriginalEndpoint, OUT RPC_CHAR * pClientEndpoint ) { WS_SOCKADDR * pSockAddr = (WS_SOCKADDR *)pOriginalEndpoint; unsigned NativeSocket = ntohs(pSockAddr->inetaddr.sin_port); char AnsiBuffer[IP_MAXIMUM_ENDPOINT]; char * pAnsi = AnsiBuffer; RPC_CHAR * pUni = pClientEndpoint; // // Convert endpoint to an ASCII string, and thence to Unicode. // _ultoa(NativeSocket, AnsiBuffer, 10); while ( *pUni++ = *pAnsi++ ); return RPC_S_OK; } RPC_STATUS UDP_QueryAddress ( IN void * pOriginalEndpoint, OUT RPC_CHAR * pClientAddress ) { UNICODE_STRING UnicodeString; ANSI_STRING AsciiString; WS_SOCKADDR *pSockAddr = (WS_SOCKADDR *)pOriginalEndpoint; NTSTATUS NtStatus; UnicodeString.Buffer = pClientAddress; UnicodeString.Length = 0; UnicodeString.MaximumLength = IP_MAXIMUM_RAW_NAME * sizeof(RPC_CHAR); char *t = inet_ntoa(pSockAddr->inetaddr.sin_addr); ASSERT(t); RtlInitAnsiString(&AsciiString, t); ASSERT(AsciiString.Length < IP_MAXIMUM_RAW_NAME); NtStatus = RtlAnsiStringToUnicodeString(&UnicodeString, &AsciiString, FALSE); if (!NT_SUCCESS(NtStatus)) { ASSERT(0); return(RPC_S_OUT_OF_RESOURCES); } return(RPC_S_OK); } RPC_STATUS RPC_ENTRY UDP_ClientInitializeAddress ( OUT DG_TRANSPORT_ADDRESS Address, IN RPC_CHAR *NetworkAddress, IN RPC_CHAR *pPort, IN BOOL fUseCache, IN BOOL fBroadcast ) /*++ Routine Description: Initializes a address object for sending to a server. Arguments: Address - Storage for the address NetworkAddress - The address of the server or 0 if local Endpoint - The endpoint of the server fUseCache - If TRUE then the transport may use a cached value from a previous call on the same NetworkAddress. fBroadcast - If TRUE, NetworkAddress is ignored and a broadcast address is used. Return Value: RPC_S_OK - Success, name resolved and, optionally, added to cache. RPC_P_FOUND_IN_CACHE - Success, returned only if fUseCache is TRUE and the was name found in local cache. RPC_P_MATCHED_CACHE - Partial success, fUseCache is FALSE and the result of the lookup was the same as the value previously in the cache. RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_SERVER_UNAVAILABLE --*/ { WS_SOCKADDR *pAddr = (WS_SOCKADDR *)Address; ULONG HostAddr; ULONG Endpoint; int i; USHORT port; RPC_STATUS status; // Contant part of address memset(pAddr->inetaddr.sin_zero, 0, 8); pAddr->inetaddr.sin_family = AF_INET; // Figure out the destination port status = EndpointToPortNumber(pPort, port); if (RPC_S_OK != status) { return(status); } pAddr->inetaddr.sin_port = htons(port); // Resolve the network address if (fBroadcast) { pAddr->inetaddr.sin_addr.s_addr = INADDR_BROADCAST; return(RPC_S_OK); } // Multiple server address support for UDP/IP is not available. IP_ADDRESS_RESOLVER resolver(NetworkAddress, cosClient, ipvtuIPv4 // IP version to use ); status = resolver.NextAddress(&pAddr->inetaddr); if (status) { RpcpErrorAddRecord( EEInfoGCWinsock, status, EEInfoDLWinsockDatagramResolve10, NetworkAddress ); } return(status); } RPC_STATUS RPC_ENTRY UDP_ClientOpenEndpoint( OUT DG_TRANSPORT_ENDPOINT ThisEndpoint, IN BOOL fAsync, DWORD EndpointFlags, IN DG_TRANSPORT_ENDPOINT ServerEndpoint OPTIONAL ) { PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; WS_SOCKADDR *addr = &pEndpoint->ListenAddr; // // We don't care what port we bind to. // Ordinarily, we don't care what interface we bind to. When using selective // bindings and making a callback, we should bind to the same IP address that // was the original target of the call. This will come from the server endpoint. // memset(addr, 0, sizeof(*addr)); // ServerEndpoint is provided only when processing a callback with selective bindings. if (ServerEndpoint != NULL) { memcpy(&(addr->inetaddr.sin_addr), &(((PWS_DATAGRAM_ENDPOINT)ServerEndpoint)->ListenAddr.inetaddr.sin_addr), sizeof(addr->inetaddr.sin_addr)); } addr->inetaddr.sin_family = AF_INET; pEndpoint->id = UDP; pEndpoint->fClient = TRUE; pEndpoint->fAsync = fAsync; pEndpoint->EndpointFlags = EndpointFlags; pEndpoint->fDynamicEndpoint = 1; return(DG_CreateEndpoint(pEndpoint)); } RPC_STATUS UDP_InitializeSockAddr( IN char *Endpoint, OUT WS_SOCKADDR *pSockAddr, DG_TRANSPORT_ENDPOINT ThisEndpoint ) /*++ Routine Description: Initialized the sockaddr to be a loopback address to the endpoint specified or the address from ThisEndpoint to the endpoint specified. Used to forward packets locally. ThisEndpoint will be provided when running with selective bindings to make sure that the packet is forwarded to the same interface on which the endpoint mapper received it, to ensure that the reply can reach the client. Arguments: Endpoint - The string value of the servers endpoint. pSockAddr - The sockaddr to fill in. Return Value: RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_OK --*/ { int len; long port; pSockAddr->generic.sa_family = AF_INET; if (ThisEndpoint == NULL) { pSockAddr->inetaddr.sin_addr.s_addr = 0x0100007F; // byte swapped, 127.0.0.1 } else { memcpy(&(pSockAddr->inetaddr.sin_addr.s_addr), &(((WS_DATAGRAM_ENDPOINT *)ThisEndpoint)->ListenAddr.inetaddr.sin_addr), sizeof(in_addr)); } port = atol(Endpoint); if (port <= 0 || port > 0xFFFF) { return(RPC_S_INVALID_ENDPOINT_FORMAT); } pSockAddr->inetaddr.sin_port = htons((USHORT) port); return(RPC_S_OK); } RPC_STATUS RPC_ENTRY UDP_GetEndpointStats( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, OUT DG_ENDPOINT_STATS * pStats ) { RPC_STATUS Status; Status = DG_GetEndpointStats(ThisEndpoint, pStats); if (Status) { pStats->MaxPduSize = 1472; pStats->MaxPacketSize = 1472; pStats->PreferredPduSize = 1472; pStats->ReceiveBufferSize= 8192; return Status; } pStats->MaxPacketSize = 1472; pStats->PreferredPduSize = 4096; if (pStats->PreferredPduSize > pStats->MaxPduSize) { pStats->PreferredPduSize = pStats->MaxPduSize; } return RPC_S_OK; } #ifdef IPX_ON //////////////////////////////////////////////////////////////////////// // // IPX specific functions. // RPC_STATUS RPC_ENTRY IPX_ServerListen( IN OUT DG_TRANSPORT_ENDPOINT ThisEndpoint, IN RPC_CHAR *NetworkAddress, IN OUT RPC_CHAR **pPort, IN void *pSecurityDescriptor, IN ULONG EndpointFlags, IN ULONG NICFlags ) /*++ Routine Description: Creates a server endpoint object to receive packets. New packets won't actually arrive until CompleteListen is called. Arguments: ThisEndpoint - Storage for the server endpoint object. pPort - The endpoint to listen on or a pointer to 0 if the transport should choose the address. Contains the endpoint listened to on output. The caller should free this. pSecurityDiscriptor - Security to attach to this endpoint (not used by the IPX transport). EndpointFlags - Application flags passed into RPC via RpcServerUseProtseq*Ex. NICFlags - Application flags passed into RPC via RpcServerUseProtseq*Ex. pNetworkAddresses - A vector of the network addresses listened on by this call. This vector does not need to be freed. Return Value: RPC_S_OK RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES RPC_S_CANT_CREATE_ENDPOINT RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_DUPLICATE_ENDPOINT --*/ { RPC_STATUS status; NTSTATUS NtStatus; USHORT port; UNICODE_STRING UnicodeString; ANSI_STRING AsciiString; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; WS_SOCKADDR *addr = &pEndpoint->ListenAddr; // // Figure out what port to listen on. // if (*pPort) { status = EndpointToPortNumber(*pPort, port); if (status != RPC_S_OK) { return(status); } pEndpoint->fDynamicEndpoint = 0; } else { port = 0; pEndpoint->fDynamicEndpoint = 1; } addr->generic.sa_family = AF_IPX; addr->ipxaddr.sa_socket = htons(port); pEndpoint->id = IPX; pEndpoint->fClient = FALSE; pEndpoint->fAsync = TRUE; pEndpoint->EndpointFlags = 0; // // Actually create the endpoint // status = DG_CreateEndpoint(pEndpoint); if (status != RPC_S_OK) { return(status); } // If needed, figure out the dynamically allocated endpoint. if (!*pPort) { *pPort = new RPC_CHAR[IP_MAXIMUM_ENDPOINT]; if (!*pPort) { DG_ServerAbortListen(ThisEndpoint); return(RPC_S_OUT_OF_MEMORY); } port = ntohs(addr->ipxaddr.sa_socket); PortNumberToEndpoint(port, *pPort); } // Update the local address cache // // Since there is only one addess no lock is required. // memcpy(IpxAddr.sa_netnum, addr->ipxaddr.sa_netnum, sizeof(IpxAddr.sa_netnum)); memcpy(IpxAddr.sa_nodenum, addr->ipxaddr.sa_nodenum, sizeof(IpxAddr.sa_nodenum)); fIpxAddrValid = TRUE; // // Figure out our server's raw IPX address. // status = IPX_BuildAddressVector(&(pEndpoint->pAddressVector)); if (status != RPC_S_OK) { DG_ServerAbortListen(ThisEndpoint); delete *pPort; return(status); } return RPC_S_OK; } RPC_STATUS IPX_QueryEndpoint ( IN void * pOriginalEndpoint, OUT RPC_CHAR * pClientEndpoint ) { WS_SOCKADDR * pSockAddr = (WS_SOCKADDR *)pOriginalEndpoint; unsigned NativeSocket = ntohs(pSockAddr->ipxaddr.sa_socket); char AnsiBuffer[IPX_MAXIMUM_ENDPOINT]; char * pAnsi = AnsiBuffer; RPC_CHAR * pUni = pClientEndpoint; // // Convert endpoint to an ASCII string, and thence to Unicode. // _ultoa(NativeSocket, AnsiBuffer, 10); while ( *pUni++ = *pAnsi++ ); return RPC_S_OK; } RPC_STATUS IPX_QueryAddress ( IN void * pOriginalEndpoint, OUT RPC_CHAR * pString ) { WS_SOCKADDR *pSockAddr = (WS_SOCKADDR *) pOriginalEndpoint; IPX_AddressToName(&pSockAddr->ipxaddr, pString); return RPC_S_OK; } RPC_STATUS RPC_ENTRY IPX_ClientInitializeAddress ( OUT DG_TRANSPORT_ADDRESS Address, IN RPC_CHAR *NetworkAddress, IN RPC_CHAR *pPort, IN BOOL fUseCache, IN BOOL fBroadcast ) /*++ Routine Description: Initializes a address object for sending to a server. Arguments: Address - Storage for the address NetworkAddress - The address of the server or 0 if local pPort - The endpoint of the server fUseCache - If TRUE then the transport may use a cached value from a previous call on the same NetworkAddress. fBroadcast - If TRUE, NetworkAddress is ignored and a broadcast address is used. Return Value: RPC_S_OK - Success, name resolved and, optionally, added to cache. RPC_P_FOUND_IN_CACHE - Success, returned only if fUseCache is TRUE and the was name found in local cache. RPC_P_MATCHED_CACHE - Partial success, fUseCache is FALSE and the result of the lookup was the same as the value previously in the cache. RPC_S_OUT_OF_MEMORY RPC_S_OUT_OF_RESOURCES RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_SERVER_UNAVAILABLE --*/ { WS_SOCKADDR *pAddr = (WS_SOCKADDR *)Address; RPC_STATUS status = RPC_S_OK; USHORT port = 0; pAddr->ipxaddr.sa_family = AF_IPX; pAddr->ipxaddr.sa_socket = 0; // Convert unicode endpoint to port number status = EndpointToPortNumber(pPort, port); if (status != RPC_S_OK) { return(status); } // // Convert unicode network address to ipx address // if (FALSE == fBroadcast) { status = IPX_NameToAddress(NetworkAddress, fUseCache, &pAddr->ipxaddr ); } else { memset(pAddr->ipxaddr.sa_netnum, 0, sizeof(pAddr->ipxaddr.sa_netnum)); memset(pAddr->ipxaddr.sa_nodenum, 0xFF, sizeof(pAddr->ipxaddr.sa_nodenum)); } pAddr->ipxaddr.sa_socket = htons(port); return(status); } RPC_STATUS RPC_ENTRY IPX_ClientOpenEndpoint( OUT DG_TRANSPORT_ENDPOINT ThisEndpoint, IN BOOL fAsync, DWORD Flags ) { RPC_STATUS status; PWS_DATAGRAM_ENDPOINT pEndpoint = (PWS_DATAGRAM_ENDPOINT)ThisEndpoint; WS_SOCKADDR *addr = &pEndpoint->ListenAddr; // We don't care what port we bind to, we also don't care what // port we bind to. memset(addr, 0, sizeof(*addr)); addr->ipxaddr.sa_family = AF_IPX; pEndpoint->id = IPX; pEndpoint->fClient = TRUE ; pEndpoint->fAsync = fAsync; pEndpoint->EndpointFlags = 0; pEndpoint->fDynamicEndpoint = 1; status = DG_CreateEndpoint(pEndpoint); if (status == RPC_S_OK) { // Update cache memcpy(IpxAddr.sa_netnum, addr->ipxaddr.sa_netnum, sizeof(IpxAddr.sa_netnum)); memcpy(IpxAddr.sa_nodenum, addr->ipxaddr.sa_nodenum, sizeof(IpxAddr.sa_nodenum)); fIpxAddrValid = TRUE; } return(status); } RPC_STATUS IPX_InitializeSockAddr( IN char *Endpoint, OUT WS_SOCKADDR *pSockAddr ) /*++ Routine Description: Initialized the sockaddr to be a loopback address to the endpoint specified. Used to forward packets locally. Arguments: Endpoint - The string value of the servers endpoint. pSockAddr - The sockaddr to fill in. Return Value: RPC_S_INVALID_ENDPOINT_FORMAT RPC_S_OK --*/ { int len; long port; pSockAddr->generic.sa_family = AF_IPX; port = atol(Endpoint); if (port <= 0 || port > 0xFFFF) { return(RPC_S_INVALID_ENDPOINT_FORMAT); } pSockAddr->ipxaddr.sa_socket = htons((USHORT)port); // // In order to get this far this server must have // alrady listened to IPX. // ASSERT(fIpxAddrValid); memcpy(pSockAddr->ipxaddr.sa_netnum, IpxAddr.sa_netnum, sizeof(pSockAddr->ipxaddr.sa_netnum)); memcpy(pSockAddr->ipxaddr.sa_nodenum, IpxAddr.sa_nodenum, sizeof(pSockAddr->ipxaddr.sa_nodenum)); return(RPC_S_OK); } RPC_STATUS RPC_ENTRY IPX_GetEndpointStats( IN DG_TRANSPORT_ENDPOINT ThisEndpoint, OUT DG_ENDPOINT_STATS * pStats ) { RPC_STATUS Status; Status = DG_GetEndpointStats(ThisEndpoint, pStats); if (Status) { pStats->MaxPduSize = 1478; pStats->MaxPacketSize = 1478; pStats->PreferredPduSize = 1478; pStats->ReceiveBufferSize= 8192; return Status; } pStats->MaxPacketSize = 1478; pStats->PreferredPduSize = pStats->MaxPduSize; pStats->MaxPacketSize = pStats->MaxPduSize; return RPC_S_OK; } #endif //////////////////////////////////////////////////////////////////////// // // Transport interface structures and loader // const RPC_DATAGRAM_TRANSPORT UDP_TransportInterface = { RPC_TRANSPORT_INTERFACE_VERSION, UDP_TOWER_ID, IP_ADDRESS_ID, RPC_STRING_LITERAL("ncadg_ip_udp"), "135", COMMON_ProcessCalls, COMMON_StartPnpNotifications, COMMON_ListenForPNPNotifications, COMMON_TowerConstruct, COMMON_TowerExplode, COMMON_PostRuntimeEvent, TRUE, DG_GetNetworkAddressVector, sizeof(WS_DATAGRAM_ENDPOINT), sizeof(WS_DATAGRAM_ENDPOINT), sizeof(WS_SOCKADDR), IP_MAXIMUM_ENDPOINT, IP_MAXIMUM_PRETTY_NAME, 1024, 1472, DG_SendPacket, UDP_ClientOpenEndpoint, UDP_ClientInitializeAddress, DG_ClientCloseEndpoint, DG_ReceivePacket, UDP_ServerListen, DG_ServerAbortListen, COMMON_ServerCompleteListen, DG_ForwardPacket, UDP_QueryAddress, UDP_QueryEndpoint, UDP_GetEndpointStats, FALSE, // fIsMessageTransport (TRUE/FALSE). 0, // OptionSize 0, // InitOptions() 0, // SetOption() 0, // InqOption() 0, // ImplementOptions() 0, // AllowReceives() 0 // InquireAuthClient() }; // When the RPC verifier is enabled and we are corrupting client receives, // we will use a modified transport interface given below. It will have the sync // receive members overwritten. RPC_DATAGRAM_TRANSPORT *pUDP_TransportInterface_Avrf = NULL; const RPC_DATAGRAM_TRANSPORT CDP_TransportInterface = { RPC_TRANSPORT_INTERFACE_VERSION, CDP_TOWER_ID, IP_ADDRESS_ID, RPC_STRING_LITERAL("ncadg_cluster"), NULL, COMMON_ProcessCalls, COMMON_StartPnpNotifications, COMMON_ListenForPNPNotifications, COMMON_TowerConstruct, COMMON_TowerExplode, COMMON_PostRuntimeEvent, TRUE, DG_GetNetworkAddressVector, sizeof(WS_DATAGRAM_ENDPOINT), sizeof(WS_DATAGRAM_ENDPOINT), sizeof(WS_SOCKADDR), IP_MAXIMUM_ENDPOINT, IP_MAXIMUM_PRETTY_NAME, 1024, 1452, DG_SendPacket, CDP_ClientOpenEndpoint, CDP_ClientInitializeAddress, DG_ClientCloseEndpoint, DG_ReceivePacket, CDP_ServerListen, DG_ServerAbortListen, COMMON_ServerCompleteListen, DG_ForwardPacket, CDP_QueryAddress, CDP_QueryEndpoint, CDP_GetEndpointStats, FALSE, // fIsMessageTransport (TRUE/FALSE). 0, // OptionSize 0, // InitOptions() 0, // SetOption() 0, // InqOption() 0, // ImplementOptions() 0, // AllowReceives() 0 // InquireAuthClient() }; RPC_DATAGRAM_TRANSPORT *pCDP_TransportInterface_Avrf = NULL; #ifdef IPX_ON const RPC_DATAGRAM_TRANSPORT IPX_TransportInterface = { RPC_TRANSPORT_INTERFACE_VERSION, IPX_TOWER_ID, IPX_ADDRESS_ID, RPC_STRING_LITERAL("ncadg_ipx"), "34280", COMMON_ProcessCalls, COMMON_StartPnpNotifications, COMMON_ListenForPNPNotifications, COMMON_TowerConstruct, COMMON_TowerExplode, COMMON_PostRuntimeEvent, TRUE, DG_GetNetworkAddressVector, sizeof(WS_DATAGRAM_ENDPOINT), sizeof(WS_DATAGRAM_ENDPOINT), sizeof(WS_SOCKADDR), IPX_MAXIMUM_ENDPOINT, IPX_MAXIMUM_PRETTY_NAME, 1024, 1464, DG_SendPacket, IPX_ClientOpenEndpoint, IPX_ClientInitializeAddress, DG_ClientCloseEndpoint, DG_ReceivePacket, IPX_ServerListen, DG_ServerAbortListen, COMMON_ServerCompleteListen, DG_ForwardPacket, IPX_QueryAddress, IPX_QueryEndpoint, IPX_GetEndpointStats, FALSE, // fIsMessageTransport (TRUE/FALSE). 0, // OptionSize 0, // InitOptions() 0, // SetOption() 0, // InqOption() 0, // ImplementOptions() 0, // AllowReceives() 0 // InquireAuthClient() }; #endif #ifdef NCADG_MQ_ON const RPC_DATAGRAM_TRANSPORT MQ_TransportInterface = { RPC_TRANSPORT_INTERFACE_VERSION, MQ_TOWER_ID, MQ_ADDRESS_ID, RPC_STRING_LITERAL("ncadg_mq"), "EpMapper", COMMON_ProcessCalls, COMMON_StartPnpNotifications, COMMON_ListenForPNPNotifications, COMMON_TowerConstruct, COMMON_TowerExplode, COMMON_PostRuntimeEvent, TRUE, MQ_GetNetworkAddressVector, // Since MQ is being depricated, this is not defined. sizeof(MQ_DATAGRAM_ENDPOINT), sizeof(MQ_DATAGRAM_ENDPOINT), sizeof(MQ_ADDRESS), MQ_MAXIMUM_ENDPOINT, MQ_MAXIMUM_PRETTY_NAME, MQ_MAX_PDU_SIZE, MQ_PREFERRED_PDU_SIZE, MQ_SendPacket, MQ_ClientOpenEndpoint, MQ_ClientInitializeAddress, MQ_ClientCloseEndpoint, MQ_ReceivePacket, MQ_ServerListen, MQ_ServerAbortListen, COMMON_ServerCompleteListen, MQ_ForwardPacket, MQ_QueryAddress, MQ_QueryEndpoint, MQ_GetEndpointStats, TRUE, // fIsMessageTransport (TRUE/FALSE). sizeof(MQ_OPTIONS), // OptionSize MQ_InitOptions, // InitOptions() MQ_SetOption, // SetOption() MQ_InqOption, // InqOption() MQ_ImplementOptions, // ImplementOptions() MQ_AllowReceives, // AllowReceives() MQ_InquireAuthClient }; #endif // NCADG_MQ_ON const RPC_DATAGRAM_TRANSPORT * DG_TransportLoad ( IN PROTOCOL_ID index ) /*++ Routine Description: Loads a datagram protocol and returns the transport interface information for the protocol. Arguments: index - the PROTOCOL_ID value of the protocol to load. Return Value: 0 - failure !0 - success --*/ { const RPC_DATAGRAM_TRANSPORT *pInfo; if (fWinsockLoaded == FALSE) { if (RPC_WSAStartup() == FALSE) { return(0); } fWinsockLoaded = TRUE; } switch(index) { case UDP: if (DoFirewallInit()) { // Overwrite the SyncReceive member of the transport interface if the // RPC verifier is enabled. if (gfRpcVerifierCorruptionInjectClientReceives) { // Check if we have previously initialized the Avrf transport interface. if (pUDP_TransportInterface_Avrf == NULL) { // Allocate a transport interface structure to override the default. pUDP_TransportInterface_Avrf = new (RPC_DATAGRAM_TRANSPORT); if (pUDP_TransportInterface_Avrf == NULL) { return NULL; } // Initialize the Avrf transport interface with the default values. RpcpMemoryCopy(pUDP_TransportInterface_Avrf, &UDP_TransportInterface, sizeof(RPC_DATAGRAM_TRANSPORT)); // Override the interface function for sync receive. ASSERT(pUDP_TransportInterface_Avrf->SyncReceive == DG_ReceivePacket); pUDP_TransportInterface_Avrf->SyncReceive = DG_ReceivePacket_Avrf; } pInfo = pUDP_TransportInterface_Avrf; } else { pInfo = &UDP_TransportInterface; } break; } #ifdef IPX_ON case IPX: if (InitializeIpxNameCache() != RPC_S_OK) { pInfo = 0; } else { pInfo = &IPX_TransportInterface; } break; #endif #ifdef NCADG_MQ_ON case MSMQ: if (!MQ_Initialize()) { return(0); } else { pInfo = &MQ_TransportInterface; } break; #endif // NCADG_MQ_ON case CDP: // Overwrite the SyncReceive member of the transport interface if the // RPC verifier is enabled. if (gfRpcVerifierCorruptionInjectClientReceives) { // Check if we have previously initialized the Avrf transport interface. if (pCDP_TransportInterface_Avrf == NULL) { // Allocate a transport interface structure to override the default. pCDP_TransportInterface_Avrf = new (RPC_DATAGRAM_TRANSPORT); if (pCDP_TransportInterface_Avrf == NULL) { return NULL; } // Initialize the Avrf transport interface with the default values. RpcpMemoryCopy(pCDP_TransportInterface_Avrf, &CDP_TransportInterface, sizeof(RPC_DATAGRAM_TRANSPORT)); // Override the interface function for sync receive. ASSERT(pCDP_TransportInterface_Avrf->SyncReceive == DG_ReceivePacket); pCDP_TransportInterface_Avrf->SyncReceive = DG_ReceivePacket_Avrf; } pInfo = pCDP_TransportInterface_Avrf; } else { pInfo = &CDP_TransportInterface; } break; default: TransDbgPrint((DPFLTR_RPCPROXY_ID, DPFLTR_WARNING_LEVEL, RPCTRANS "DG_TransportLoad called with index: %d\n", index)); ASSERT(0); pInfo = 0; break; } // PERFBUG: Add code to lookup real PDU sizes return(pInfo); }