Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

1538 lines
36 KiB

/*++
Copyright (c) 1999 Microsoft Corporation
Module Name:
isrpc.cxx
Abstract:
Contains ISRPC class implementation.
Author:
Murali R. Krishnan 11-Dec-1995
Environment:
User Mode - Win32
Revision History:
--*/
/************************************************************
* Include Headers
************************************************************/
#include <tcpdllp.hxx>
#include "dbgutil.h"
#include "isrpc.hxx"
extern PFN_INETINFO_START_RPC_SERVER pfnInetinfoStartRpcServer;
extern PFN_INETINFO_STOP_RPC_SERVER pfnInetinfoStopRpcServer;
/************************************************************
* Functions
************************************************************/
ISRPC::ISRPC(IN LPCTSTR pszServiceName)
/*++
This function constructs a new ISRPC object, initializing the
members to proper state.
Always the ISRPC members will use RPC_C_AUTHN_WINNT.
Arguments:
pszServiceName - pointer to string containing the name of the service
dwServiceAuthId - DWORD containing the service Authentication Identifier.
Returns:
A valid initialized ISRPC object on success.
--*/
: m_dwProtocols ( 0),
m_fInterfaceAdded ( FALSE),
m_fEpRegistered ( FALSE),
m_fServerStarted ( FALSE),
m_hRpcInterface ( NULL),
m_pszServiceName ( pszServiceName),
m_pBindingVector ( NULL)
{
DBG_REQUIRE( SetSecurityDescriptor() == NO_ERROR);
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
" Created new ISRPC object for %s at %08p\n",
m_pszServiceName, this));
}
} // ISRPC::ISRPC()
ISRPC::~ISRPC(VOID)
/*++
This function cleans up the ISRPC object and releases any dynamic memory or
state associated with this object.
--*/
{
if( m_hRpcInterface != NULL ) {
// CleanupData() should not be called twice
CleanupData();
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
" Destroyed ISRPC object for %s at %p\n",
m_pszServiceName, this));
}
} // ISRPC::~ISRPC()
DWORD
ISRPC::CleanupData(VOID)
/*++
Routine Description:
This member function cleans up the ISRPC object.
Arguments:
None.
Return Value:
None.
--*/
{
DWORD rpcStatus = RPC_S_OK;
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
" ISRPC(%p)::Cleaning up for %s\n",
this, m_pszServiceName));
}
if ( m_fServerStarted) {
rpcStatus = StopServer( );
}
DBG_ASSERT( rpcStatus == RPC_S_OK);
rpcStatus = UnRegisterInterface();
m_dwProtocols = 0;
m_hRpcInterface = NULL;
return (rpcStatus);
} // ISRPC::CleanupData()
DWORD
ISRPC::RegisterInterface( IN RPC_IF_HANDLE hRpcInterface)
/*++
This function registers the RPC inteface in the object.
If there is already a valid instance present in the object,
this function fails and returns error.
If this is the new interface specified, the function registers the
interface both for dynamic and static bindings.
Should be called after calling AddProtocol() and before StartServer()
Arguments:
hRpcInteface - RPC inteface handle.
Returns:
Win32 Error Code - NO_ERROR on success.
--*/
{
DWORD dwError = NO_ERROR;
if ( m_dwProtocols == 0) {
// No protocol added. Return failure.
return ( ERROR_INVALID_PARAMETER);
}
if ( m_hRpcInterface != NULL) {
dwError = ( RPC_S_DUPLICATE_ENDPOINT);
} else {
//
// since there is no duplicate, just set the new value and return.
//
if ( hRpcInterface == NULL) {
dwError = ERROR_INVALID_PARAMETER;
} else {
m_hRpcInterface = hRpcInterface;
}
}
if ( dwError == RPC_S_OK) {
dwError = RpcServerRegisterIf(m_hRpcInterface,
0, // MgrUuid
0 // MgrEpv (Entry Point Vector)
);
if ( dwError == RPC_S_OK ) {
m_fInterfaceAdded = TRUE;
//
// Establish the dynamic bindings if any.
//
if ( (m_dwProtocols & (ISRPC_OVER_TCPIP | ISRPC_OVER_SPX)) != 0) {
dwError = RpcServerInqBindings( &m_pBindingVector);
if ( dwError == RPC_S_OK) {
DBG_ASSERT( m_pBindingVector != NULL);
dwError = RpcEpRegister(m_hRpcInterface,
m_pBindingVector,
NULL,
(unsigned char *) "" );
if ( dwError == RPC_S_OK) {
m_fEpRegistered = TRUE;
}
} // Ep registering
} // dynamic bindings
} // registration successful
}
IF_DEBUG(DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "ISRPC(%p)::RegisterInterface(%08x)"
" returns %ld\n",
this, hRpcInterface, dwError));
}
return ( dwError);
} // ISRPC::RegisterInterface()
DWORD
ISRPC::UnRegisterInterface( VOID)
/*++
This function unregisters the RPC inteface in the object.
Should be called after after StopServer() and before cleanup.
Arguments:
None
Returns:
Win32 Error Code - NO_ERROR on success.
--*/
{
DWORD rpcStatus = RPC_S_OK;
if ( m_fEpRegistered) {
DBG_ASSERT( m_hRpcInterface != NULL && m_pBindingVector != NULL);
rpcStatus = RpcEpUnregister(m_hRpcInterface,
m_pBindingVector,
NULL // pUuidVector
);
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
"%p::RpcEpUnregister(%s) returns %d\n",
this, m_pszServiceName, rpcStatus));
}
if( rpcStatus == EPT_S_CANT_PERFORM_OP )
{
// This error can be returned in cases such as system
// shutdown that are not severe errors. So we don't
// want to assert.
DBGWARN(( DBG_CONTEXT,
"%p::RpcEpUnregister(%s) failed with EPT_S_CANT_PERFORM_OP\n",
this, m_pszServiceName
));
}
else
{
DBG_ASSERT( rpcStatus == RPC_S_OK );
m_fEpRegistered = FALSE;
}
}
if ( m_pBindingVector != NULL) {
rpcStatus = RpcBindingVectorFree( &m_pBindingVector);
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
"%p::RpcBindingVectorFree(%s, %p) returns %d\n",
this, m_pszServiceName,
m_pBindingVector, rpcStatus));
}
DBG_ASSERT( rpcStatus == RPC_S_OK);
m_pBindingVector = NULL;
}
if ( m_fInterfaceAdded != NULL) {
rpcStatus = RpcServerUnregisterIf(m_hRpcInterface,
NULL, // MgrUuid
TRUE // wait for calls to complete
);
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
"%p::RpcServerUnregisterIf(%s, %08x) returns %d\n",
this, m_pszServiceName, m_hRpcInterface, rpcStatus));
}
}
IF_DEBUG(DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "ISRPC(%p)::UnRegisterInterface(%08x)"
" returns %ld\n",
this, m_hRpcInterface, rpcStatus));
}
return ( rpcStatus);
} // ISRPC::UnRegisterInterface()
DWORD
ISRPC::AddProtocol( IN DWORD Protocol)
/*++
Routine Description:
This member function adds another protocol to the binding list.
Arguments:
protocol - protocol binding opcode.
Return Value:
RPC error code.
--*/
{
DWORD rpcStatus = RPC_S_OK;
if ( Protocol & ISRPC_OVER_LPC ) {
// Currently we only support static binding
rpcStatus = BindOverLpc( FALSE);
}
//
// Enable all remote bindings
//
if ( rpcStatus == RPC_S_OK && Protocol & ISRPC_OVER_TCPIP ) {
// Currently we only support dynamic binding
rpcStatus = BindOverTcp( TRUE);
}
if ( rpcStatus == RPC_S_OK && Protocol & ISRPC_OVER_NP ) {
// Currently we only support static binding
rpcStatus = BindOverNamedPipe( FALSE);
}
if ( rpcStatus == RPC_S_OK && Protocol & ISRPC_OVER_SPX ) {
// Currently we only support dynamic binding
rpcStatus = BindOverSpx( TRUE);
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
"ISRPC(%p)::AddProtocol(%08x) returns %ld.\n",
this, Protocol, rpcStatus ));
}
return( rpcStatus );
} // ISRPC::AddProtocol()
DWORD
ISRPC::RemoveProtocol(IN DWORD Protocol)
/*++
Routine Description:
This member function removes a protocol from the binding list.
Arguments:
protocol - protocol binding opcode.
Return Value:
RPC error code.
Note:
As a side effect, this function removes the dynamic endpoing on
TCPIP when SPX binding is removed and vice-versa.
--*/
{
DBGPRINTF(( DBG_CONTEXT,
" ISRPC(%p)::RemoveProtocol(%s) is not implemented\n",
this, m_pszServiceName));
DBG_ASSERT( FALSE);
return ( ERROR_CALL_NOT_IMPLEMENTED);
} // ISRPC::RemoveProtocol()
DWORD
ISRPC::StartServer(
VOID
)
/*++
Routine Description:
This member function start RPC server.
Arguments:
None.
Return Value:
RPC error code.
--*/
{
DWORD rpcStatus;
//
// add the interface.
//
if ( m_hRpcInterface == NULL) {
return (ERROR_INVALID_PARAMETER);
}
//
// start rpc server.
//
#ifndef SERVICE_AS_EXE
rpcStatus = pfnInetinfoStartRpcServer();
#else
rpcStatus = RpcServerListen(
1, // minimum num threads.
1, // max concurrent calls.
TRUE ); // don't wait
#endif // SERVICE_AS_EXE
if ( rpcStatus == RPC_S_OK ) {
m_fServerStarted = TRUE;
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "ISRPC(%p)::StartServer(%s) returns %ld\n",
this, m_pszServiceName, rpcStatus));
}
return( rpcStatus );
} // ISRPC::StartServer()
DWORD
ISRPC::StopServer(
VOID
)
{
DWORD rpcStatus = RPC_S_OK;
if( m_fServerStarted ) {
#ifndef SERVICE_AS_EXE
rpcStatus = pfnInetinfoStopRpcServer();
#else
//
// stop server listen.
//
rpcStatus = RpcMgmtStopServerListening(0);
//
// wait for all RPC threads to go away.
//
if( rpcStatus == RPC_S_OK) {
rpcStatus = RpcMgmtWaitServerListen();
}
#endif // SERVICE_AS_EXE
m_fServerStarted = FALSE;
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
"ISRPC(%p)::StopServer( %s) returns %d\n",
this, m_pszServiceName, rpcStatus));
}
return ( rpcStatus);
} // ISRPC::StopServer()
DWORD
ISRPC::EnumBindingStrings(
IN OUT LPINET_BINDINGS pBindings
)
/*++
Routine Description:
This member function enumurates the binding strings of the protocols
bound to the server.
Arguments:
pBindings : pointer to a binding strings structure. The caller
should call FreeBindingStrings member function to free the string
after use.
Return Value:
Windows Error Code;
--*/
{
DWORD dwError;
RPC_BINDING_VECTOR * pBindingVector = NULL;
LPINET_BIND_INFO pBindingsInfo;
DWORD dwCount = 0;
DWORD i;
//
// query RPC for RPC_BINDING_VECTORS.
//
dwError = RpcServerInqBindings( &pBindingVector );
if( dwError != NO_ERROR ) {
goto Cleanup;
}
DBG_ASSERT( pBindingVector->Count > 0 );
//
// alloc memory for INET_RPC_BINDING_STRINGS.
//
pBindingsInfo = (LPINET_BIND_INFO)
LocalAlloc( GPTR, sizeof(INET_BIND_INFO) * pBindingVector->Count );
if( pBindingsInfo == NULL ) {
dwError = ERROR_NOT_ENOUGH_MEMORY;
goto Cleanup;
}
//
// convert binding handle to binding vectors.
//
pBindings->NumBindings = 0;
pBindings->BindingsInfo = pBindingsInfo;
for( i = 0; i < pBindingVector->Count; i++ ) {
LPSTR BindingString;
BindingString = NULL;
dwError = RpcBindingToStringBindingA(pBindingVector->BindingH[i],
(LPBYTE *)&BindingString );
if( dwError != NO_ERROR ) {
goto Cleanup;
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "Binding Handle[%d] = %08x. String = %s\n",
i, pBindingVector->BindingH[i], BindingString));
}
//
// check to we get only our named-pipe endpoint.
//
if ( ( strstr( BindingString, "ncacn_np" ) == NULL ) ||
( strstr(BindingString, m_pszServiceName ) == NULL ) ) {
RpcStringFreeA( (LPBYTE *)&BindingString );
} else {
//
// found a named-pipe binding string with service name.
//
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "Binding String Chosen = %s\n",
BindingString));
}
pBindings->BindingsInfo[dwCount].Length =
(strlen(BindingString) + 1) * sizeof(CHAR);
pBindings->BindingsInfo[dwCount].BindData = BindingString;
dwCount++;
}
} // for
dwError = NO_ERROR;
pBindings->NumBindings = dwCount;
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "Binding Vectors chosen"
" Service = %s, NumBindings = %d of Total = %d\n",
m_pszServiceName, dwCount, pBindingVector->Count));
}
Cleanup:
if( pBindingVector != NULL ) {
DWORD LocalError;
LocalError = RpcBindingVectorFree( &pBindingVector );
DBG_ASSERT( LocalError == NO_ERROR );
}
if( dwError != NO_ERROR ) {
FreeBindingStrings( pBindings );
pBindings->NumBindings = 0;
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
"ISRPC(%p)::EnumBindingStrings(%s) failed, %ld.",
this, m_pszServiceName, dwError ));
}
}
return( dwError );
} // ISRPC::EnumBindingStrings()
VOID
ISRPC::FreeBindingStrings(
IN OUT LPINET_BINDINGS pInetBindings
)
/*++
Routine Description:
This member function deletes a binding vector that was returned by the
EnumBindingStrings member function.
Arguments:
pBindings : pointer to a binding vector.
Return Value:
Windows Error Code;
--*/
{
DWORD dwError;
DWORD i;
//
// free binding strings.
//
for( i = 0; i < pInetBindings->NumBindings; i++) {
dwError = RpcStringFreeA( ((LPBYTE *)&pInetBindings
->BindingsInfo[i].BindData ));
DBG_ASSERT( dwError == NO_ERROR );
}
pInetBindings->NumBindings = 0;
//
// free bindings info array.
//
if( pInetBindings->BindingsInfo != NULL ) {
LocalFree( (LPWSTR)pInetBindings->BindingsInfo );
pInetBindings->BindingsInfo = NULL;
}
return;
} // ISRPC::FreeBindingStrings()
DWORD
ISRPC::BindOverTcp(IN BOOL fDynamic)
{
DWORD rpcStatus = RPC_S_OK;
DBG_ASSERT( (m_dwProtocols & ISRPC_OVER_TCPIP) == 0);
if ( !fDynamic) {
rpcStatus = ( ERROR_CALL_NOT_IMPLEMENTED);
} else {
rpcStatus = ( ISRPC::DynamicBindOverTcp());
}
if ( rpcStatus == RPC_S_OK) {
m_dwProtocols |= ISRPC_OVER_TCPIP;
}
if (rpcStatus == RPC_S_PROTSEQ_NOT_SUPPORTED) {
//
// This error gets written to the event log by the service controller,
// so give it something the user is more likely to understand.
//
rpcStatus = DNS_ERROR_NO_TCPIP;
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT,
"(%p)::BindOverTcp(%s) mapping error %d to error %d\n",
this,
m_pszServiceName,
RPC_S_PROTSEQ_NOT_SUPPORTED,
DNS_ERROR_NO_TCPIP));
}
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "(%p)::BindOverTcp(%s) returns %d\n",
this, m_pszServiceName, rpcStatus));
}
return ( rpcStatus);
} // ISRPC::BindOverTcpIp()
DWORD
ISRPC::BindOverNamedPipe(IN BOOL fDynamic)
{
DWORD rpcStatus = RPC_S_OK;
DBG_ASSERT( (m_dwProtocols & ISRPC_OVER_NP) == 0);
//
// On Named Pipe, we support only static bindings. No dynamic Binding.
//
if ( fDynamic) {
return ( ERROR_CALL_NOT_IMPLEMENTED);
}
if( (m_dwProtocols & ISRPC_OVER_NP) == 0 ) {
WCHAR rgchNp[1024];
wsprintfW( rgchNp,
#ifdef UNICODE
L"%ws%s"
#else
L"%ws%S"
#endif // UNICODE
,
ISRPC_NAMED_PIPE_PREFIX_W,
m_pszServiceName);
//
// Establish a static Named pipe binding.
//
rpcStatus =
RpcServerUseProtseqEpW(
L"ncacn_np", // protocol string.
ISRPC_PROTSEQ_MAX_REQS, //max concurrent calls
rgchNp, // end point!
&sm_sid[ACL_INDEX_ALLOW_ADMIN] ); // security
IF_DEBUG( DLL_RPC) {
CHAR pszBuff[100];
wsprintfA( pszBuff, "%S", rgchNp);
DBGPRINTF(( DBG_CONTEXT,
" RpcServerUseProtseqEpW( %s, %d, %s, %p) returns"
" %d\n",
"ncacn_np", ISRPC_PROTSEQ_MAX_REQS,
pszBuff, &sm_sid[ACL_INDEX_ALLOW_ADMIN], rpcStatus));
}
switch (rpcStatus) {
case RPC_S_OK:
//
// set the protocol bit.
//
m_dwProtocols |= ISRPC_OVER_NP;
break;
case RPC_S_DUPLICATE_ENDPOINT:
//
// Ignore the duplicate end point error
//
DBGPRINTF(( DBG_CONTEXT,
"(%p) ncacn_np is already added for %s\n",
this,
m_pszServiceName));
m_dwProtocols |= ISRPC_OVER_NP;
rpcStatus = RPC_S_OK;
break;
case RPC_S_PROTSEQ_NOT_SUPPORTED:
case RPC_S_CANT_CREATE_ENDPOINT:
DBGPRINTF(( DBG_CONTEXT,
"(%p) ncacn_np is not supported for %s (%ld).\n",
this, m_pszServiceName, rpcStatus ));
rpcStatus = RPC_S_OK;
break;
default:
break;
} // switch()
}
return ( rpcStatus);
} // ISRPC::BindOverNamedPipe()
DWORD
ISRPC::BindOverLpc(IN BOOL fDynamic)
{
DWORD rpcStatus = RPC_S_OK;
DBG_ASSERT( (m_dwProtocols & ISRPC_OVER_LPC) == 0);
//
// On LPC, we support only static bindings. No dynamic Binding.
//
if ( fDynamic) {
return ( ERROR_CALL_NOT_IMPLEMENTED);
}
if( (m_dwProtocols & ISRPC_OVER_LPC) == 0 ) {
WCHAR rgchLpc[1024];
// LPC Endpoint string is: <InterfaceName>_LPC
wsprintfW( rgchLpc,
#ifdef UNICODE
L"%s_%ws"
#else
L"%S_%ws"
#endif // UNICODE
,
m_pszServiceName,
ISRPC_LPC_NAME_SUFFIX_W);
//
// Establish a static Lpc binding.
//
rpcStatus =
RpcServerUseProtseqEpW(
L"ncalrpc", // protocol string.
ISRPC_PROTSEQ_MAX_REQS, //max concurrent calls
rgchLpc, // end point!
&sm_sid[ACL_INDEX_ALLOW_ALL] ); // security
IF_DEBUG( DLL_RPC) {
CHAR pszBuff[100];
wsprintfA( pszBuff, "%S", rgchLpc);
DBGPRINTF(( DBG_CONTEXT,
" RpcServerUseProtseqEpW( %s, %d, %s, %p) returns"
" %d\n",
"ncalrpc", ISRPC_PROTSEQ_MAX_REQS,
pszBuff, &sm_sid[ACL_INDEX_ALLOW_ALL], rpcStatus));
}
switch (rpcStatus) {
case RPC_S_OK:
//
// set the protocol bit.
//
m_dwProtocols |= ISRPC_OVER_LPC;
break;
case RPC_S_DUPLICATE_ENDPOINT:
//
// Ignore the duplicate end point error
//
DBGPRINTF(( DBG_CONTEXT,
"(%p) ncalrpc is already added for %s\n",
this,
m_pszServiceName));
m_dwProtocols |= ISRPC_OVER_LPC;
rpcStatus = RPC_S_OK;
break;
case RPC_S_PROTSEQ_NOT_SUPPORTED:
case RPC_S_CANT_CREATE_ENDPOINT:
DBGPRINTF(( DBG_CONTEXT,
"(%p) ncalrpc is not supported for %s (%ld).\n",
this, m_pszServiceName, rpcStatus ));
rpcStatus = RPC_S_OK;
break;
default:
break;
} // switch()
}
return ( rpcStatus);
} // ISRPC::BindOverLpc()
DWORD
ISRPC::BindOverSpx(IN BOOL fDynamic)
{
DWORD rpcStatus = RPC_S_OK;
DBG_ASSERT( (m_dwProtocols & ISRPC_OVER_SPX) == 0);
if ( !fDynamic) {
rpcStatus = ( ERROR_CALL_NOT_IMPLEMENTED);
} else {
rpcStatus = ISRPC::DynamicBindOverSpx();
}
if ( rpcStatus == RPC_S_OK) {
m_dwProtocols |= ISRPC_OVER_SPX;
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "(%p)::BindOverSpx(%s) returns %d\n",
this, m_pszServiceName, rpcStatus));
}
return ( rpcStatus);
} // ISRPC::BindOverSpx()
# if DBG
VOID
ISRPC::Print(VOID) const
{
DBGPRINTF(( DBG_CONTEXT,
" ISRPC(%p). SvcName=%s\n"
" Protocols = %d.\n"
" RPC Interface = %08x. Binding Vector = %p\n"
" InterfaceAdded = %d.\n"
" EpRegistered = %d. ServerStarted = %d.\n"
,
this, m_pszServiceName,
m_dwProtocols,
m_hRpcInterface, m_pBindingVector,
m_fInterfaceAdded,
m_fEpRegistered, m_fServerStarted
));
} // ISRPC::Print()
# endif // DBG
/******************************
* STATIC Member Definitions
******************************/
DWORD ISRPC::sm_dwProtocols = 0;
SECURITY_DESCRIPTOR ISRPC::sm_sid[2];
PACL ISRPC::sm_pACL[2] = {NULL, NULL};
BOOL ISRPC::sm_fSecurityEnabled = FALSE;
DWORD
ISRPC::Initialize(VOID)
{
sm_dwProtocols = 0;
return SetSecurityDescriptor();
} // ISRPC::Initialize()
DWORD
ISRPC::Cleanup(VOID)
{
//
// Free up the memory holding the ACL for the security descriptor
//
if (sm_pACL[0]) {
delete [] ((BYTE *) sm_pACL[0]);
sm_pACL[0] = NULL;
}
if (sm_pACL[1]) {
delete [] ((BYTE *) sm_pACL[1]);
sm_pACL[1] = NULL;
}
//
// Free up the security descriptor
//
ZeroMemory( (PVOID) &sm_sid, sizeof(sm_sid));
//
// For now nothing to do. Just a place holder.
//
return ( NO_ERROR);
} // ISRPC::Cleanup()
DWORD
ISRPC::DynamicBindOverTcp(VOID)
/*++
This static function (ISRPC member) establishes a dynamic endpoing
RPC binding over TCP/IP, using a run-time library call to RPC.
RPC run-time library allows one to create as many dynamic end points
as one wishes. So we maintain external state and control the number
of end points created to 1.
Arguments:
None
Returns:
RPC status - RPC_S_OK for success.
--*/
{
DWORD rpcStatus = RPC_S_OK;
if( (sm_dwProtocols & ISRPC_OVER_TCPIP) == 0 ) {
//
// Not already present. Add dynamic endpoint over TCP/IP
//
rpcStatus =
RpcServerUseProtseqW(
L"ncacn_ip_tcp", // protocol string.
ISRPC_PROTSEQ_MAX_REQS, //max concurrent calls
&sm_sid[ACL_INDEX_ALLOW_ADMIN] ); // security
switch (rpcStatus) {
case RPC_S_OK:
//
// set the protocol bit.
//
sm_dwProtocols |= ISRPC_OVER_TCPIP;
break;
case RPC_S_DUPLICATE_ENDPOINT:
DBGPRINTF(( DBG_CONTEXT,
"ncacn_ip_tcp is already added.\n"));
sm_dwProtocols |= ISRPC_OVER_TCPIP;
rpcStatus = RPC_S_OK;
break;
case RPC_S_PROTSEQ_NOT_SUPPORTED:
case RPC_S_CANT_CREATE_ENDPOINT:
DBGPRINTF(( DBG_CONTEXT,
"ncacn_ip_tcp is not supported. Error = %ld\n",
rpcStatus));
break;
default:
break;
} // switch()
//
// if the security support provider is not enabled, do so.
//
if( rpcStatus == RPC_S_OK && !IsSecurityEnabled() ) {
rpcStatus = AddSecurity();
}
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "DynamicBindOverTcp() returns %d\n",
rpcStatus));
}
return ( rpcStatus);
} // ISRPC::DynamicBindOverTcp()
DWORD
ISRPC::DynamicBindOverSpx(VOID)
/*++
This static function (ISRPC member) establishes a dynamic endpoing
RPC binding over SPX, using a run-time library call to RPC.
RPC run-time library allows one to create as many dynamic end points
as one wishes. So we maintain external state and control the number
of end points created to 1.
Arguments:
None
Returns:
RPC status - RPC_S_OK for success.
--*/
{
DWORD rpcStatus = RPC_S_OK;
if( (sm_dwProtocols & ISRPC_OVER_SPX) == 0 ) {
// Use dynamic end point for the server.
rpcStatus =
RpcServerUseProtseqW(
L"ncacn_spx", // protocol string.
ISRPC_PROTSEQ_MAX_REQS, //max concurrent calls
&sm_sid[ACL_INDEX_ALLOW_ADMIN] ); // security
switch (rpcStatus) {
case RPC_S_OK:
//
// set the protocol bit.
//
sm_dwProtocols |= ISRPC_OVER_SPX;
break;
case RPC_S_DUPLICATE_ENDPOINT:
DBGPRINTF(( DBG_CONTEXT,
"ncacn_spx is already added.\n"
));
sm_dwProtocols |= ISRPC_OVER_SPX;
rpcStatus = RPC_S_OK;
break;
case RPC_S_PROTSEQ_NOT_SUPPORTED:
case RPC_S_CANT_CREATE_ENDPOINT:
DBGPRINTF(( DBG_CONTEXT,
"ncacn_spx is not supported. Error (%ld).\n",
rpcStatus ));
break;
default:
break;
} // switch()
//
// if the security support provider is not enabled, do so.
//
if( rpcStatus == RPC_S_OK && !IsSecurityEnabled()) {
rpcStatus = AddSecurity();
}
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "DynamicBindOverSpx() returns %d\n",
rpcStatus));
}
return ( rpcStatus);
} // ISRPC::DynamicBindOverSpx()
DWORD
ISRPC::SetSecurityDescriptor( VOID)
/*++
Routine Description:
This member function builds the security descriptor used by RPC module.
The security descriptor denies everybody the ability to change/see anything
connected to the DACL and allows everybody to read from/write to the pipe.
Create a pair of security descriptors. One allow everyone access,
which is intended for LPC binding. One allow only administrator
access, which is intended for remote transports.
Arguments:
None.
Return Value:
Windows error code.
--*/
{
DWORD dwError = NO_ERROR;
BOOL fSuccess = FALSE;
SID_IDENTIFIER_AUTHORITY siaWorld = SECURITY_WORLD_SID_AUTHORITY;
SID_IDENTIFIER_AUTHORITY siaNt = SECURITY_NT_AUTHORITY;
PSID psidWorld = NULL;
PSID psidAdmins = NULL;
int sdCount;
//
// Create the "WORLD" sid and "LOCAL Administrators" sid
//
if ( !AllocateAndInitializeSid( &siaWorld,
1,
SECURITY_WORLD_RID,
0,0,0,0,0,0,0,
&psidWorld )
|| !AllocateAndInitializeSid( &siaNt,
2,
SECURITY_BUILTIN_DOMAIN_RID,
DOMAIN_ALIAS_RID_ADMINS,
0,0,0,0,0,0,
&psidAdmins ) )
{
DBGPRINTF((DBG_CONTEXT,
"AllocateAndInitializeSid failed : 0x%x\n",
GetLastError()));
goto cleanup;
}
for (sdCount=0; sdCount<2; sdCount++)
{
BYTE *pbBuffer = NULL;
DWORD cbAcl = 0;
PSID pSid2Allow = (sdCount==ACL_INDEX_ALLOW_ALL)? psidWorld: psidAdmins;
InitializeSecurityDescriptor(&sm_sid[sdCount],
SECURITY_DESCRIPTOR_REVISION );
//
// Calculate the size of the ACL that will hold the the ACESS_DENIED and ACCESS_ALLOW ace
// [ripped off from MSDN docs]
//
cbAcl = sizeof(ACL) +
sizeof( ACCESS_ALLOWED_ACE ) +
sizeof( ACCESS_DENIED_ACE ) +
2*GetLengthSid(pSid2Allow) -
2*sizeof(DWORD) ;
if ( ! ( pbBuffer = new BYTE[cbAcl] ) )
{
goto cleanup;
}
sm_pACL[sdCount] = (PACL) pbBuffer;
//
// Initialize the ACL
//
if ( !InitializeAcl( sm_pACL[sdCount],
cbAcl,
ACL_REVISION ) )
{
DBGPRINTF((DBG_CONTEXT,
"InitializeAcl failed : 0x%x\n",
GetLastError()));
goto cleanup;
}
//
// Add the Access Denied ACE; this has to be first in the list to make sure
// that any attempt to muck with the DACL will be disallowed
//
if ( !AddAccessDeniedAce( sm_pACL[sdCount],
ACL_REVISION,
WRITE_DAC | DELETE | WRITE_OWNER,
psidWorld ) )
{
DBGPRINTF((DBG_CONTEXT,
"AddAccessDeniedAce failed : 0x%x\n",
GetLastError()));
goto cleanup;
}
//
// Add the Access Allowed ACE
//
if ( !AddAccessAllowedAce( sm_pACL[sdCount],
ACL_REVISION,
FILE_ALL_ACCESS,
pSid2Allow ) )
{
DBGPRINTF((DBG_CONTEXT,
"AddAccessAllowedAce failed : 0x%x\n",
GetLastError()));
goto cleanup;
}
//
// Set (no) group & owner for the security descriptor
//
if ( !SetSecurityDescriptorOwner( &sm_sid[sdCount],
NULL,
FALSE ) )
{
DBGPRINTF((DBG_CONTEXT,
"SetsecurityDescriptorOwner failed : 0x%x\n",
GetLastError()));
goto cleanup;
}
if ( !SetSecurityDescriptorGroup( &sm_sid[sdCount],
NULL,
FALSE ) )
{
DBGPRINTF((DBG_CONTEXT,
"SetsecurityDescriptorGroup failed : 0x%x\n",
GetLastError()));
goto cleanup;
}
if ( !SetSecurityDescriptorDacl ( &sm_sid[sdCount],
TRUE, // Dacl present
sm_pACL[sdCount],
FALSE ) ) // Not defaulted
{
DBGPRINTF((DBG_CONTEXT,
"SetSecurityDescriptorDacl failed : 0x%x\n",
GetLastError()));
goto cleanup;
}
}
fSuccess = TRUE;
cleanup:
if ( psidWorld )
{
FreeSid( psidWorld );
}
if ( psidAdmins )
{
FreeSid( psidAdmins );
}
if (!fSuccess)
{
dwError = GetLastError();
if ( sm_pACL[0] )
{
delete (BYTE*) sm_pACL[0];
sm_pACL[0] = NULL;
}
if ( sm_pACL[1] )
{
delete (BYTE*) sm_pACL[1];
sm_pACL[1] = NULL;
}
//
// free up security discriptor memory and set it to NULL.
//
memset( (PVOID ) &sm_sid, 0, sizeof(sm_sid));
}
return( dwError );
} // ISRPC::SetSecurityDescriptor()
DWORD
ISRPC::AddSecurity(
VOID
)
/*++
Routine Description:
This member function adds security support provider over RPC.
Arguments:
None.
Return Value:
Windows error code.
--*/
{
DWORD rpcStatus;
//
// Register for authentication using WinNT.
//
rpcStatus = RpcServerRegisterAuthInfo(
(unsigned char * ) NULL, // app name to security provider
RPC_C_AUTHN_WINNT, // Auth package ID.
NULL, // RPC_C_AUTHN_WINNT ==> NULL
NULL // args ptr for authn function.
);
if ( rpcStatus == RPC_S_OK) {
sm_fSecurityEnabled = TRUE;
}
IF_DEBUG( DLL_RPC) {
DBGPRINTF(( DBG_CONTEXT, "AddSecurity() returns Error %u\n",
rpcStatus));
}
//
// Hide the failure that occurs when the server is locked
// down and does not have the network client installed. This will
// cause performance counters to fail.
//
if( rpcStatus == RPC_S_UNKNOWN_AUTHN_SERVICE )
{
DBGWARN(( DBG_CONTEXT,
"RpcServerRegisterAuthInfo failed with "
"RPC_S_UNKNOWN_AUTHN_SERVICE. Some features, such as "
"performance counters, may not function.\n"
));
rpcStatus = RPC_S_OK;
}
return (rpcStatus);
} // ISRPC::AddSecurity()