Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

274 lines
7.8 KiB

/****************************************************************************
Microsoft RPC Version 1`1
Copyright Microsoft Corp. 1992
Hello Example
FILE: kerbcli.c
USAGE: client -n network_address
-p protocol_sequence
-e endpoint
-o options
PURPOSE: Client side of RPC distributed application
FUNCTIONS: main() - binds to server and calls remote procedure
COMMENTS:
This distributed application prints a string such as "hello, world"
on the server. The client manages its connection to the server.
The client uses the binding handle hello_IfHandle defined in the
file hello.h.
****************************************************************************/
#include <stdio.h>
#include <string.h>
#include <stdlib.h>
#include <rpc.h> // RPC API functions, types
#include "kerbtest.h" // header file generated by MIDL compiler
void Usage(char * pszProgramName)
{
fprintf(stderr, "Usage: %s\n", pszProgramName);
fprintf(stderr, " -p protocol_sequence\n");
fprintf(stderr, " -n network_address\n");
fprintf(stderr, " -d delegation address\n");
fprintf(stderr, " -e endpoint\n");
fprintf(stderr, " -o options\n");
fprintf(stderr, " -a authn level\n");
fprintf(stderr, " -s authn service\n");
fprintf(stderr, " -r recursiion level\n");
fprintf(stderr, " -x shutdown server\n");
fprintf(stderr, " -# number of times to call\n");
fprintf(stderr, " -t target principal\n");
exit(1);
}
int __cdecl
main (argc, argv)
int argc;
char *argv[];
{
RPC_STATUS status; // returned by RPC API function
unsigned char * pszProtocolSequence = "ncacn_ip_tcp";
unsigned char * pszNetworkAddress = NULL;
unsigned char * pszEndpoint = "30760";
unsigned char * pszOptions = NULL;
unsigned char * pszStringBinding = NULL;
unsigned char * pszDelegationAddress = NULL;
unsigned char * pszPrincipal = NULL;
unsigned char PrincipalBuffer[100];
ULONG PrincipalLength;
ULONG AuthnLevel = RPC_C_AUTHN_LEVEL_CONNECT;
ULONG AuthnService = RPC_C_AUTHN_DCE_PRIVATE;
ULONG RecursionLevel = 0;
ULONG LoopCount = 1;
BOOLEAN ShutdownService = FALSE;
ULONG i;
handle_t BindingHandle = NULL;
// allow the user to override settings with command line switches
for (i = 1; i < (ULONG) argc; i++) {
if ((*argv[i] == '-') || (*argv[i] == '/')) {
switch (tolower(*(argv[i]+1))) {
case 'p': // protocol sequence
pszProtocolSequence = argv[++i];
break;
case 'n': // network address
pszNetworkAddress = argv[++i];
break;
case 'd': // network address
pszDelegationAddress = argv[++i];
break;
case 'e':
pszEndpoint = argv[++i];
break;
case 'o':
pszOptions = argv[++i];
break;
case 't':
pszPrincipal = argv[++i];
break;
case 'a':
sscanf(argv[++i],"%d",&AuthnLevel);
break;
case 's':
sscanf(argv[++i],"%d",&AuthnService);
break;
case 'r':
sscanf(argv[++i],"%d",&RecursionLevel);
break;
case '#':
sscanf(argv[++i],"%d",&LoopCount);
break;
case 'x':
ShutdownService = TRUE;
break;
case 'h':
case '?':
default:
Usage(argv[0]);
}
} else {
Usage(argv[0]);
}
}
//
// If the principal is NULL, get it from the environment
//
if (pszPrincipal == NULL)
{
LPSTR pszUserRealm;
LPSTR pszUserName;
PrincipalBuffer[0] = '\0';
pszUserRealm = getenv( "USERDOMAIN" );
pszUserName = getenv( "USERNAME" );
if (pszUserRealm != NULL)
{
strcpy(PrincipalBuffer, pszUserRealm);
}
if ((pszUserRealm != NULL) &&
(pszUserName != NULL))
{
strcat(PrincipalBuffer,"\\");
}
if (pszUserName != NULL)
{
strcat(PrincipalBuffer,pszUserName);
}
pszPrincipal = PrincipalBuffer;
}
// Use a convenience function to concatenate the elements of
// the string binding into the proper sequence.
status = RpcStringBindingCompose(NULL,
pszProtocolSequence,
pszNetworkAddress,
pszEndpoint,
pszOptions,
&pszStringBinding);
if (status) {
printf("RpcStringBindingCompose returned %d\n", status);
exit(2);
}
printf("pszStringBinding = %s\n", pszStringBinding);
//
// Set the binding handle that will be used to bind to the server.
//
status = RpcBindingFromStringBinding(pszStringBinding,
&BindingHandle);
if (status) {
printf("RpcBindingFromStringBinding returned %d\n", status);
exit(2);
}
status = RpcStringFree(&pszStringBinding); // remote calls done; unbind
if (status) {
printf("RpcStringFree returned %d\n", status);
exit(2);
}
//
// Tell RPC to do the security thing.
//
printf("Binding auth info set to level %d, service %d, principal %s\n",
AuthnLevel, AuthnService, pszPrincipal );
status = RpcBindingSetAuthInfo(
BindingHandle,
pszPrincipal,
AuthnLevel,
AuthnService,
NULL,
RPC_C_AUTHZ_NAME );
if ( status ) {
printf("RpcBindingSetAuthInfo returned %ld\n", status);
exit(2);
}
//
// Do the actual RPC calls to the server.
//
RpcTryExcept {
for (i = 0; i < LoopCount ; i++ )
{
status = RemoteCall(
BindingHandle,
0, // no options for now
pszDelegationAddress,
pszProtocolSequence,
pszEndpoint,
pszPrincipal,
pszNetworkAddress,
AuthnLevel,
AuthnService,
RecursionLevel
);
if (status != 0)
{
printf("RemoteCall failed: 0x%x\n",status);
break;
}
}
if (ShutdownService)
{
Shutdown( BindingHandle );
}
} RpcExcept(EXCEPTION_EXECUTE_HANDLER) {
printf("Runtime library reported an exception %d\n",
RpcExceptionCode());
} RpcEndExcept
// The calls to the remote procedures are complete.
// Free the binding handle
status = RpcBindingFree(&BindingHandle); // remote calls done; unbind
if (status) {
printf("RpcBindingFree returned %d\n", status);
exit(2);
}
return 0;
}
// ====================================================================
// MIDL allocate and free
// ====================================================================
void __RPC_FAR * __RPC_API MIDL_user_allocate(size_t len)
{
return(malloc(len));
}
void __RPC_API MIDL_user_free(void __RPC_FAR * ptr)
{
free(ptr);
}
/* end file helloc.c */