Leaked source code of windows server 2003
You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
 
 
 
 
 
 

2195 lines
58 KiB

//+-------------------------------------------------------------------------
//
// Microsoft Windows
//
// Copyright (C) Microsoft Corporation, 1994 - 1999
//
// File: dgpkt.cxx
//
//--------------------------------------------------------------------------
/*++
Module Name:
dgpkt.cxx
Abstract:
Author:
Jeff Roberts (jroberts) 22-May-1995
Revision History:
22-May-1995 jroberts
Created this module.
09-Jul-1997 edwardr
Added support for large packets (>65535) for Falcon/RPC.
--*/
#include <precomp.hxx>
#include <dgpkt.hxx>
unsigned long ProcessStartTime;
unsigned RandomCounter = 0x6789abce;
const unsigned
RpcToPacketFlagsArray[8] =
{
0,
DG_PF_IDEMPOTENT,
DG_PF_BROADCAST,
DG_PF_IDEMPOTENT | DG_PF_BROADCAST,
DG_PF_MAYBE,
DG_PF_IDEMPOTENT | DG_PF_MAYBE,
DG_PF_BROADCAST | DG_PF_MAYBE,
DG_PF_IDEMPOTENT | DG_PF_BROADCAST | DG_PF_MAYBE,
};
const unsigned
PacketToRpcFlagsArray[8] =
{
0 | 0 | 0 ,
RPC_NCA_FLAGS_MAYBE | 0 | 0 ,
0 | RPC_NCA_FLAGS_IDEMPOTENT | 0 ,
RPC_NCA_FLAGS_MAYBE | RPC_NCA_FLAGS_IDEMPOTENT | 0 ,
0 | 0 | RPC_NCA_FLAGS_BROADCAST,
RPC_NCA_FLAGS_MAYBE | 0 | RPC_NCA_FLAGS_BROADCAST,
0 | RPC_NCA_FLAGS_IDEMPOTENT | RPC_NCA_FLAGS_BROADCAST,
RPC_NCA_FLAGS_MAYBE | RPC_NCA_FLAGS_IDEMPOTENT | RPC_NCA_FLAGS_BROADCAST,
};
DG_PACKET_ENGINE::DG_PACKET_ENGINE(
unsigned char a_PacketType,
DG_PACKET * a_Packet,
RPC_STATUS * pStatus
) :
pSavedPacket (a_Packet),
PacketType (a_PacketType),
ReferenceCount (0),
BaseConnection (0),
SourceEndpoint (0),
RemoteAddress (0),
Buffer (0),
BufferLength (0),
QueuedBufferHead (0),
QueuedBufferTail (0),
pReceivedPackets (0),
pLastConsecutivePacket(0),
ConsecutiveDataBytes (0),
ReceiveFragmentBase (0),
CachedPacket (0),
LastReceiveBuffer (0),
LastReceiveBufferLength(0),
Cancelled (FALSE)
{
if (!a_Packet)
{
*pStatus = RPC_S_OUT_OF_MEMORY;
}
if (*pStatus)
{
return;
}
pSavedPacket->Header.RpcVersion = DG_RPC_PROTOCOL_VERSION;
pSavedPacket->Header.PacketFlags = 0;
SetMyDataRep(&pSavedPacket->Header);
#ifdef DEBUGRPC
BasePacketFlags = ~0;
#endif
}
void
DG_PACKET_ENGINE::ReadConnectionInfo(
DG_COMMON_CONNECTION * a_Connection,
DG_TRANSPORT_ADDRESS a_RemoteAddress
)
{
BaseConnection = a_Connection;
RemoteAddress = a_RemoteAddress;
CurrentPduSize = 0;
SetFragmentLengths();
pSavedPacket->Header.InterfaceHint = 0xffff;
RpcpMemoryCopy( &pSavedPacket->Header.ActivityId,
&a_Connection->ActivityNode.Uuid,
sizeof(UUID)
);
}
DG_PACKET_ENGINE::~DG_PACKET_ENGINE(
)
{
ASSERT( !LastReceiveBuffer );
ASSERT( !pReceivedPackets );
ASSERT( !QueuedBufferHead );
ASSERT( !Buffer );
if (pSavedPacket)
{
FreePacket(pSavedPacket);
}
if (CachedPacket)
{
FreePacket(CachedPacket);
}
CleanupReceiveWindow();
}
void
DG_PACKET_ENGINE::NewCall()
/*++
Routine Description:
A new call dawns.
Arguments:
Return Value:
none
--*/
{
ASSERT( !pLastConsecutivePacket );
ASSERT( !ConsecutiveDataBytes );
ASSERT( !LastReceiveBuffer );
SetFragmentLengths();
Buffer = 0;
fReceivedAllFragments = FALSE;
fRetransmitted = FALSE;
TimeoutCount = 0;
RepeatedFack = 0;
FackSerialNumber = 0;
SendSerialNumber = 0;
ReceiveSerialNumber = 0;
SendWindowBase = 0;
FirstUnsentFragment = 0;
SendBurstLength = SendWindowSize;
ReceiveFragmentBase = 0;
RingBufferBase = 0;
#ifdef DEBUGRPC
for (unsigned i=0; i < MAX_WINDOW_SIZE; i++)
{
FragmentRingBuffer[i].SerialNumber = 0xeeee0000;
FragmentRingBuffer[i].Length = 0xdd000000;
FragmentRingBuffer[i].Offset = 0xb000b000;
}
#endif
BasePacketFlags2 = 0;
}
RPC_STATUS
DG_PACKET_ENGINE::PushBuffer(
PRPC_MESSAGE Message
)
/*++
Function Description:
Submits a buffer to be sent over the network.
If a buffer is in progress, the new buffer is added to the
"pending" list. IF not, the buffer is placed in the "active" slot.
The only time a buffer will not go in the active slot is during an
async pipe call when the app is not waiting for send-complete
notifications before submitting new buffers.
Notes:
The buffer sent will be truncated to the nearest packet if
RPC_BUFFER_PARTIAL is set, and Message.BufferLength is set to
the amount actually sent.
--*/
{
// ASSERT( Buffer == 0 || IsBufferAcknowledged() );
RPC_STATUS Status = 0;
RPC_STATUS FixupStatus = 0;
unsigned FractionalPart = Message->BufferLength % MaxFragmentSize;
unsigned SendLength = Message->BufferLength;
if (Message->RpcFlags & RPC_BUFFER_PARTIAL)
{
SendLength -= FractionalPart;
}
if (!Buffer || IsBufferAcknowledged())
{
SetCurrentBuffer(Message->Buffer,
SendLength,
Message->RpcFlags
);
Status = SendSomeFragments();
}
else
{
QUEUED_BUFFER * Node = new QUEUED_BUFFER;
if (!Node)
{
return RPC_S_OUT_OF_MEMORY;
}
Node->Buffer = Message->Buffer;
Node->BufferLength = SendLength;
Node->BufferFlags = Message->RpcFlags;
Node->Next = 0;
if (QueuedBufferTail)
{
QueuedBufferTail->Next = Node;
}
else
{
ASSERT( !QueuedBufferHead );
QueuedBufferHead = Node;
}
QueuedBufferTail = Node;
Status = 0;
}
FixupStatus = FixupPartialSend(Message);
if (!Status)
{
Status = FixupStatus;
}
return Status;
}
RPC_STATUS
DG_PACKET_ENGINE::PopBuffer(
BOOL fSend
)
/*++
Function Description:
Move the next pending send buffer into the active send buffer slot.
This is a no-op except unless this is an async pipe call and the app
is not waiting for send-complete notifications.
Notes:
The buffer sent will be truncated to the nearest packet if
RPC_BUFFER_PARTIAL is set, and Message.BufferLength is set to
the amount actually sent.
--*/
{
RPC_STATUS Status = 0;
RPC_MESSAGE Message;
Message.Buffer = Buffer;
Message.BufferLength = BufferLength;
QUEUED_BUFFER * Node = QueuedBufferHead;
if (Node)
{
QueuedBufferHead = Node->Next;
if (!QueuedBufferHead)
{
QueuedBufferTail = 0;
}
SetCurrentBuffer(Node->Buffer, Node->BufferLength, Node->BufferFlags);
if (fSend)
{
Status = SendSomeFragments();
}
delete Node;
}
else
{
Buffer = 0;
BufferLength = 0;
BufferFlags = 0;
}
if (Message.Buffer)
{
CommonFreeBuffer(&Message);
}
return Status;
}
RPC_STATUS
DG_PACKET_ENGINE::FixupPartialSend(
RPC_MESSAGE * Message
)
/*++
Function Description:
This fn "does the right thing" with the unsent bit at the end of
a pipe send. For sync sends, this means moving the unsent bit
to the front of the existing buffer. For async sends, this means
allocating a new buffer and copying the unsent bit into it.
--*/
{
if (!(Message->RpcFlags & RPC_BUFFER_PARTIAL))
{
// We need this so Receive will be passed a null buffer
// unless the stub sticks one in the message.
Message->Buffer = 0;
Message->BufferLength = 0;
return RPC_S_OK;
}
unsigned FractionalPart;
// if (Message->RpcFlags & RPC_BUFFER_ASYNC)
// {
RPC_MESSAGE NewMessage;
FractionalPart = Message->BufferLength % MaxFragmentSize;
if (!FractionalPart)
{
Message->Buffer = 0;
Message->BufferLength = 0;
return RPC_S_OK;
}
DG_PACKET * Packet = DG_PACKET::AllocatePacket(CurrentPduSize);
if (!Packet)
{
return RPC_S_OUT_OF_MEMORY;
}
RpcpMemoryCopy(Packet->Header.Data,
((char *) Message->Buffer) + (Message->BufferLength - FractionalPart),
FractionalPart
);
Message->Buffer = Packet->Header.Data;
Message->BufferLength = FractionalPart;
// }
// else
// {
// char * Temp = (char *) Message->Buffer;
//
// FractionalPart = Message->BufferLength - FirstUnsentOffset;
// if (!FractionalPart)
// {
// return RPC_S_OK;
// }
//
// RpcpMemoryMove(Message->Buffer, Temp + FirstUnsentOffset, FractionalPart);
// Message->BufferLength = FractionalPart;
// }
return RPC_S_OK;
}
void
DG_PACKET_ENGINE::SetCurrentBuffer(
void * a_Buffer,
unsigned a_BufferLength,
unsigned long a_BufferFlags
)
{
Buffer = a_Buffer;
BufferLength = a_BufferLength;
BufferFlags = a_BufferFlags;
TimeoutCount = 0;
SendWindowBits = 0;
FirstUnsentOffset = 0;
if (BufferLength == 0)
{
FinalSendFrag = SendWindowBase;
}
else
{
FinalSendFrag = SendWindowBase + (BufferLength-1) / MaxFragmentSize;
}
}
RPC_STATUS
DG_PACKET_ENGINE::CommonGetBuffer(
RPC_MESSAGE * Message
)
{
unsigned char SubjectType;
void * Subject;
unsigned Length;
PDG_PACKET pPacket;
Length = sizeof(NCA_PACKET_HEADER)
+ Align8(Message->BufferLength)
+ SecurityTrailerSize;
unsigned BaseLength = BaseConnection->TransportInterface->BasePduSize;
// if (Length <= BaseLength)
// {
// pPacket = DG_PACKET::AllocatePacket(BaseLength);
// }
// else if (Length <= CurrentPduSize)
// {
// pPacket = AllocatePacket();
// }
// else
{
pPacket = DG_PACKET::AllocatePacket(Length);
}
if (0 == pPacket)
{
return RPC_S_OUT_OF_MEMORY;
}
//
// Point the buffer at the appropriate place in the packet.
//
Message->Buffer = pPacket->Header.Data;
// if (pPacket->MaxDataLength < 256)
// {
// AddActivePacket(pPacket);
// }
return RPC_S_OK;
}
void
DG_PACKET_ENGINE::CommonFreeBuffer(
RPC_MESSAGE * Message
)
{
if (!Message->Buffer)
{
return;
}
PDG_PACKET Packet = DG_PACKET::FromStubData(Message->Buffer);
LogEvent(SU_ENGINE, EV_PROC, this, Message->Buffer, 'F' + (('B' + (('u' + ('f' << 8)) << 8)) << 8));
ASSERT( Packet->MaxDataLength < 0x7fffffffUL );
// if (Packet && Packet->MaxDataLength < 256)
// {
// RemoveActivePacket(Packet);
// }
FreePacket(Packet);
if (Message->Buffer == LastReceiveBuffer)
{
LastReceiveBuffer = 0;
LastReceiveBufferLength = 0;
}
Message->Buffer = 0;
}
RPC_STATUS
DG_PACKET_ENGINE::CommonReallocBuffer(
IN RPC_MESSAGE * Message,
IN unsigned int NewSize
)
{
if (Message->Buffer == LastReceiveBuffer &&
NewSize <= LastReceiveBufferLength)
{
Message->BufferLength = NewSize;
return RPC_S_OK;
}
RPC_STATUS Status;
RPC_MESSAGE NewMessage;
NewMessage.BufferLength = NewSize;
Status = CommonGetBuffer(&NewMessage);
if (RPC_S_OK != Status)
{
return Status;
}
LastReceiveBuffer = NewMessage.Buffer;
LastReceiveBufferLength = NewMessage.BufferLength;
if (NewSize >= Message->BufferLength)
{
RpcpMemoryCopy(NewMessage.Buffer,
Message->Buffer,
Message->BufferLength
);
}
CommonFreeBuffer(Message);
Message->Buffer = NewMessage.Buffer;
Message->BufferLength = NewMessage.BufferLength;
return RPC_S_OK;
}
void
DG_PACKET_ENGINE::CleanupSendWindow()
{
while (Buffer)
{
PopBuffer(FALSE);
}
}
void
DG_PACKET_ENGINE::CleanupReceiveWindow()
{
//
// Free any response packets.
//
while (pReceivedPackets)
{
PDG_PACKET Next = pReceivedPackets->pNext;
FreePacket(pReceivedPackets);
pReceivedPackets = Next;
}
pLastConsecutivePacket = 0;
ConsecutiveDataBytes = 0;
}
RPC_STATUS
DG_PACKET_ENGINE::SendSomeFragments()
/*++
Routine Description:
Sends some fragments of the user buffer.
Arguments:
Return Value:
result of the send operation
--*/
{
RPC_STATUS Status = RPC_S_OK;
unsigned short i = 0;
unsigned short AckFragment;
unsigned short Frag;
unsigned short Remainder;
unsigned Offset;
unsigned FragmentsSent = 0;
#ifdef DEBUGRPC
if (!Buffer &&
(BufferFlags & RPC_BUFFER_PARTIAL))
{
// return RPC_S_SEND_INCOMPLETE;
RpcpBreakPoint();
}
#endif
if (SendBurstLength > SendWindowSize)
{
SendBurstLength = SendWindowSize;
}
//
// If we can extend the window, do so; otherwise, resend old packets.
//
if (FirstUnsentFragment <= FinalSendFrag &&
FirstUnsentFragment < SendWindowBase + SendWindowSize)
{
unsigned short ThisBurstLength;
Frag = FirstUnsentFragment;
ThisBurstLength = SendBurstLength;
if (ThisBurstLength > FinalSendFrag + 1 - Frag)
{
ThisBurstLength = FinalSendFrag + 1 - Frag;
}
if (Frag + ThisBurstLength > SendWindowBase + SendWindowSize)
{
ThisBurstLength = (SendWindowBase + SendWindowSize) - Frag;
}
while (++FragmentsSent <= ThisBurstLength && Status == RPC_S_OK)
{
if (FragmentsSent == ThisBurstLength &&
(Frag != FinalSendFrag || (BufferFlags & RPC_BUFFER_PARTIAL) || (BasePacketFlags2 & DG_PF2_UNRELATED)))
{
Status = SendFragment(Frag, PacketType, TRUE);
}
else
{
Status = SendFragment(Frag, PacketType, FALSE);
}
++Frag;
}
//
// Cut down the burst length if our window is maxed out.
//
if (Frag - SendWindowBase >= SendWindowSize)
{
SendBurstLength = (1+SendBurstLength)/2;
}
}
if (0 == FragmentsSent && !IsBufferAcknowledged())
{
// We can get here if all the unacknowledged fragments have serial
// numbers greater than the one the client last acknowledged, and
// the window is also maxed out.
//
// This could mean the network is very slow, or the unack'ed packets
// have been lost.
//
Status = SendFragment(SendWindowBase, PacketType, TRUE);
}
return Status;
}
RPC_STATUS
DG_PACKET_ENGINE::SendFragment(
unsigned FragNum,
unsigned char PacketType,
BOOL fFack
)
{
NCA_PACKET_HEADER PriorData;
UNALIGNED NCA_PACKET_HEADER __RPC_FAR * pHeader;
//
// Figure out where the packet starts and how long it is.
//
unsigned Offset;
unsigned Length;
unsigned Index = (FragNum - SendWindowBase + RingBufferBase) % MAX_WINDOW_SIZE;
unsigned DistanceToEnd;
if (FragNum < FirstUnsentFragment)
{
Offset = FragmentRingBuffer[Index].Offset;
Length = FragmentRingBuffer[Index].Length;
DistanceToEnd = BufferLength - Offset;
#ifdef DEBUGRPC
if (Offset >= 0xb000b000 || Length >= 0xdd000000)
{
RpcpBreakPoint();
}
#endif
fRetransmitted = TRUE;
}
else
{
ASSERT(FragNum == FirstUnsentFragment);
Offset = FirstUnsentOffset;
Length = MaxFragmentSize;
DistanceToEnd = BufferLength - Offset;
if (DistanceToEnd < Length)
{
Length = DistanceToEnd;
}
FirstUnsentOffset += Length;
FirstUnsentFragment = 1 + FragNum;
}
if (BufferLength)
{
// this is harmless and can sometimes be triggered on the first call of an activity
// ASSERT(Length);
// ASSERT(Offset < BufferLength);
}
else
{
ASSERT(!Length);
ASSERT(!Offset);
}
//
// Time to start assembling the buffer.
//
pHeader = (PNCA_PACKET_HEADER) (PCHAR(Buffer) - sizeof(NCA_PACKET_HEADER));
*pHeader = pSavedPacket->Header;
pHeader->PacketType = PacketType;
pHeader->PacketFlags = BasePacketFlags;
pHeader->PacketFlags2 = BasePacketFlags2;
if (FinalSendFrag != 0 ||
(BufferFlags & RPC_BUFFER_PARTIAL))
{
pHeader->PacketFlags |= DG_PF_FRAG;
if (FragNum == FinalSendFrag &&
0 == (BufferFlags & RPC_BUFFER_PARTIAL))
{
pHeader->PacketFlags |= DG_PF_LAST_FRAG;
}
}
pHeader->SetPacketBodyLen (Length);
pHeader->SetFragmentNumber((unsigned short) FragNum);
if (FALSE == fFack)
{
pHeader->PacketFlags |= DG_PF_NO_FACK;
}
AddSerialNumber(pHeader);
RPC_STATUS Status;
//
// Stub data is encrypted in-place; we need not to encrypt the original data
// so we can retransmit it if necessary.
//
unsigned Frag = (pHeader->PacketType << 16) | pHeader->GetFragmentNumber();
LogEvent(SU_ENGINE, EV_PKT_OUT, this, 0, Frag);
if (BaseConnection->ActiveSecurityContext &&
BaseConnection->ActiveSecurityContext->AuthenticationLevel == RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
{
RpcpMemoryCopy(&pSavedPacket->Header, pHeader, sizeof(NCA_PACKET_HEADER));
RpcpMemoryCopy(pSavedPacket->Header.Data, pHeader->Data + Offset, pHeader->GetPacketBodyLen());
Status = BaseConnection->SealAndSendPacket(SourceEndpoint, RemoteAddress, &pSavedPacket->Header, 0);
}
else
{
Status = BaseConnection->SealAndSendPacket(SourceEndpoint, RemoteAddress, pHeader, Offset);
}
FragmentRingBuffer[Index].SerialNumber = SendSerialNumber;
FragmentRingBuffer[Index].Length = Length;
FragmentRingBuffer[Index].Offset = Offset;
++SendSerialNumber;
if (Status)
{
LogError(SU_ENGINE, EV_STATUS, this, 0, Status);
}
return Status;
}
RPC_STATUS
DG_PACKET_ENGINE::UpdateSendWindow(
PDG_PACKET pPacket,
BOOL * pfUpdated
)
/*++
Routine Description:
Update the send window based upon a received FACK or NOCALL.
The caller should filter out other packet types.
Arguments:
pPacket - the packet received
Return Value:
return code:
TRUE if PDU size or window size changed
FALSE if not
--*/
{
RPC_STATUS Status = 0;
FACK_BODY_VER_0 PAPI * pBody = (FACK_BODY_VER_0 PAPI *) pPacket->Header.Data;
*pfUpdated = FALSE;
unsigned short Diff;
unsigned short RemoteBase = 1+pPacket->GetFragmentNumber();
ASSERT(pPacket->TimeReceived == 0x31415926);
//
// Check that we can understand this packet.
//
if (0 != pPacket->GetPacketBodyLen())
{
//
// Version 0 and version 1 are identical.
//
if (0 != pBody->Version &&
1 != pBody->Version)
{
#ifdef DEBUGRPC
PrintToDebugger("RPC DG: warning - FACK body version %u\n", pBody->Version);
#endif
pPacket->SetPacketBodyLen(0);
}
else if (pPacket->GetPacketBodyLen() < sizeof(FACK_BODY_VER_0))
{
#ifdef DEBUGRPC
PrintToDebugger("RPC DG: warning - FACK body truncated\n");
#endif
pPacket->SetPacketBodyLen(0);
}
else if (pPacket->GetPacketBodyLen() < sizeof(FACK_BODY_VER_0) + pBody->AckWordCount * sizeof(unsigned long))
{
#ifdef DEBUGRPC
PrintToDebugger("RPC DG: warning - FACK body length inconsistent\n");
#endif
pPacket->SetPacketBodyLen(0);
}
else
{
if (NeedsByteSwap(&pPacket->Header))
{
ByteSwapFackBody0(pBody);
}
//
// NT 1057 used 0xffff to signal no packets have been received.
// This doesn't match OSF.
//
if (0xffff == pBody->SerialNumber)
{
pBody->SerialNumber = 0;
}
//
// If the other guy is resending the same FACK, we should resend.
// If it's different, then we are likely OK.
//
if (pBody->SerialNumber == FackSerialNumber)
{
goto send;
}
if (pBody->SerialNumber < FackSerialNumber)
{
FackSerialNumber = pBody->SerialNumber;
goto dont_send;
}
FackSerialNumber = pBody->SerialNumber;
}
}
//
// Update send window.
//
if (RemoteBase < SendWindowBase)
{
//
// Fragments previously acknowledged are now missing. Either this
// packet was delivered out of order, or the server crashed and
// restarted. Ignore the packet.
//
goto dont_send;
}
if (RemoteBase > FirstUnsentFragment)
{
#ifdef DEBUGRPC
PrintToDebugger("RPC DG: bogus FACK packet received\n");
#endif
goto dont_send;
}
//
// We are moving the window base forward. We need to advance the
// ring buffer base by the same amount, and clear the entries
// corresponding to unsent packets.
//
Diff = RemoteBase - SendWindowBase;
ASSERT(Diff <= MAX_WINDOW_SIZE);
#ifdef DEBUGRPC
while (Diff)
{
FragmentRingBuffer[RingBufferBase].SerialNumber |= 0xeeee0000;
FragmentRingBuffer[RingBufferBase].Length |= 0xdd000000;
FragmentRingBuffer[RingBufferBase].Offset |= 0xb0000000;
++RingBufferBase;
RingBufferBase %= MAX_WINDOW_SIZE;
--Diff;
}
#else
RingBufferBase += Diff;
RingBufferBase %= MAX_WINDOW_SIZE;
#endif
SendWindowBase = RemoteBase;
SendWindowBits = 0;
ASSERT( SendWindowBase <= FirstUnsentFragment );
if (IsBufferAcknowledged())
{
PopBuffer(FALSE);
}
if (0 != pPacket->GetPacketBodyLen())
{
LogEvent(SU_ENGINE, EV_WINDOW, this, (void *) pBody->WindowSize, pBody->Acks[0]);
if (pBody->AckWordCount)
{
//
// Save missing-packet bitmask.
//
SendWindowBits = pBody->Acks[0];
}
//
// Adjust window size.
//
if (pBody->WindowSize > MAX_WINDOW_SIZE)
{
pBody->WindowSize = MAX_WINDOW_SIZE;
}
SendWindowSize = pBody->WindowSize;
if (SendBurstLength > SendWindowSize)
{
SendBurstLength = SendWindowSize;
}
//
// Adjust maximum PDU length.
//
unsigned NewPduSize;
NewPduSize = pBody->MaxDatagramSize;
if (NewPduSize > SourceEndpoint->Stats.PreferredPduSize)
{
NewPduSize = SourceEndpoint->Stats.PreferredPduSize;
}
BaseConnection->CurrentPduSize = (unsigned short) NewPduSize;
BaseConnection->RemoteWindowSize = pBody->WindowSize;
//
// If no packets are getting through, we probably are sending
// packets that are too large.
//
if (0 == RemoteBase &&
0 == SendWindowBits &&
NewPduSize < CurrentPduSize)
{
CurrentPduSize = (unsigned short) NewPduSize;
SetFragmentLengths();
FirstUnsentFragment = 0;
FirstUnsentOffset = 0;
FinalSendFrag = SendWindowBase + (BufferLength-1) / MaxFragmentSize;
}
*pfUpdated = TRUE;
}
send:
Status = SendSomeFragments();
dont_send:
return Status;
}
BOOL
DG_PACKET_ENGINE::UpdateReceiveWindow(
PDG_PACKET pPacket
)
/*++
Routine Description:
Adds a fragment to the receive list, and sends a FACK.
Arguments:
Return Value:
--*/
{
ASSERT(pPacket->TimeReceived == 0x31415926);
//
// Don't retain data from previous pipe buffers.
//
if (pPacket->GetFragmentNumber() < ReceiveFragmentBase)
{
if (0 == (pPacket->Header.PacketFlags & DG_PF_NO_FACK))
{
SendFackOrNocall(pPacket, DG_FACK);
}
return FALSE;
}
//
// Attempt to guess the client's max PDU size. Round down to a multiple
// of eight, for NDR.
//
if (pPacket->DataLength + sizeof(NCA_PACKET_HEADER) > BaseConnection->CurrentPduSize)
{
unsigned RemoteTransportBuffer = BaseConnection->CurrentPduSize * BaseConnection->RemoteWindowSize;
BaseConnection->CurrentPduSize = ((pPacket->DataLength + sizeof(NCA_PACKET_HEADER)) & ~7);
BaseConnection->RemoteWindowSize = RemoteTransportBuffer / BaseConnection->CurrentPduSize;
if (0 == BaseConnection->RemoteWindowSize)
{
BaseConnection->RemoteWindowSize = 1;
}
}
PNCA_PACKET_HEADER pHeader = &pPacket->Header;
unsigned short Serial = ReadSerialNumber(pHeader);
if (Serial > ReceiveSerialNumber)
{
ReceiveSerialNumber = Serial;
}
//
// Authentication levels above AUTHN_LEVEL_PKT will checksum the packet,
// so we must remove these bits from the header.
//
pPacket->Header.PacketFlags &= ~(DG_PF_FORWARDED);
pPacket->Header.PacketFlags2 &= ~(DG_PF2_FORWARDED_2);
//
// Check the easy case: is this a single packet call?
//
if ((pHeader->PacketFlags & DG_PF_FRAG) == 0 &&
(pHeader->PacketFlags & DG_PF_LAST_FRAG) == 0)
{
if (pReceivedPackets)
{
CORRUPTION_ASSERT( pReceivedPackets->Header.SequenceNumber == pPacket->Header.SequenceNumber );
return FALSE;
}
pReceivedPackets = pPacket;
pLastConsecutivePacket = pPacket;
pPacket->pNext = pPacket->pPrevious = 0;
ConsecutiveDataBytes += pHeader->GetPacketBodyLen();
fReceivedAllFragments = TRUE;
return TRUE;
}
//
// This is a multi-packet call. Insert the packet in pReceivedPackets
// and send a FACK.
//
PDG_PACKET pScan;
PDG_PACKET pTrail;
BOOL PacketAddedToList = TRUE;
if (pReceivedPackets == 0)
{
pReceivedPackets = pPacket;
if (ReceiveFragmentBase == pHeader->GetFragmentNumber())
{
pLastConsecutivePacket = pPacket;
ConsecutiveDataBytes += pHeader->GetPacketBodyLen();
}
pPacket->pNext = pPacket->pPrevious = 0;
}
else
{
//
// Not the first packet to be received. So scan for its place in the
// list.
//
unsigned short FragNum = pHeader->GetFragmentNumber();
if (pLastConsecutivePacket)
{
pScan = pLastConsecutivePacket;
}
else
{
pScan = pReceivedPackets;
}
pTrail = 0;
while (pScan && pScan->GetFragmentNumber() < FragNum)
{
ASSERT(pScan->TimeReceived == 0x31415926);
ASSERT(pScan->Header.SequenceNumber == SequenceNumber);
pTrail = pScan;
pScan = pScan->pNext;
}
if (pScan != 0)
{
if (pScan->GetFragmentNumber() > FragNum)
{
if (pScan->pPrevious &&
pScan->pPrevious->GetFragmentNumber() >= FragNum)
{
//
// The new packet is a duplicate of a preexisting one
// upstream from pLastConsecutivePacket.
//
PacketAddedToList = FALSE;
}
else
{
//
// Our fragment fills a gap in the series.
//
pPacket->pPrevious = pScan->pPrevious;
pPacket->pNext = pScan;
if (pScan->pPrevious == 0)
{
pReceivedPackets = pPacket;
}
else
{
pScan->pPrevious->pNext = pPacket;
}
pScan->pPrevious = pPacket;
}
}
else
{
//
// The new packet is a duplicate of a preexisting one
// downstream from pLastConsecutivePacket.
//
PacketAddedToList = FALSE;
}
}
else
{
//
// The fragnum is larger than everything seen so far.
//
pTrail->pNext = pPacket;
pPacket->pPrevious = pTrail;
pPacket->pNext = 0;
}
}
if (TRUE == PacketAddedToList)
{
//
// Scan the list for the first missing fragment.
//
unsigned short ScanNum;
if (pLastConsecutivePacket)
{
pScan = pLastConsecutivePacket->pNext;
ScanNum = pLastConsecutivePacket->GetFragmentNumber() + 1;
}
else
{
pScan = pReceivedPackets;
ScanNum = ReceiveFragmentBase;
}
while (pScan)
{
if (ScanNum == pScan->GetFragmentNumber())
{
ConsecutiveDataBytes += pScan->GetPacketBodyLen();
pLastConsecutivePacket = pScan;
}
pScan = pScan->pNext;
++ScanNum;
}
//
// We have updated pLastConsecutivePacket; is the whole buffer here?
//
if (pLastConsecutivePacket &&
pLastConsecutivePacket->Header.PacketFlags & DG_PF_LAST_FRAG)
{
fReceivedAllFragments = TRUE;
}
}
ASSERT(pReceivedPackets);
//
// Fack the fragment if necessary.
//
if (0 == (pHeader->PacketFlags & DG_PF_NO_FACK))
{
SendFackOrNocall(pPacket, DG_FACK);
}
return PacketAddedToList;
}
RPC_STATUS
DG_PACKET_ENGINE::SendFackOrNocall(
PDG_PACKET pPacket,
unsigned char PacketType
)
{
unsigned ReceiveWindowSize;
ReceiveWindowSize = SourceEndpoint->Stats.ReceiveBufferSize
/ ((1+SourceEndpoint->NumberOfCalls) * CurrentPduSize);
if (0 == ReceiveWindowSize)
{
ReceiveWindowSize = 1;
}
else if (ReceiveWindowSize > MAX_WINDOW_SIZE)
{
ReceiveWindowSize = MAX_WINDOW_SIZE;
}
pSavedPacket->Header.PacketType = PacketType;
pSavedPacket->Header.SequenceNumber = SequenceNumber;
pSavedPacket->Header.PacketFlags2 = 0;
FACK_BODY_VER_0 PAPI * pBody = (FACK_BODY_VER_0 PAPI *) pSavedPacket->Header.Data;
pBody->Version = 1;
pBody->Pad1 = 0;
pBody->MaxDatagramSize = SourceEndpoint->Stats.PreferredPduSize;
pBody->MaxPacketSize = SourceEndpoint->Stats.MaxPacketSize;
pBody->AckWordCount = 1;
pBody->WindowSize = (unsigned short) ReceiveWindowSize;
if (pPacket)
{
pBody->SerialNumber = ReadSerialNumber(&pPacket->Header);
}
else
{
pBody->SerialNumber = ReceiveSerialNumber;
}
unsigned short FragNum = ReceiveFragmentBase-1;
PDG_PACKET pScan = 0;
if (pLastConsecutivePacket)
{
FragNum = pLastConsecutivePacket->GetFragmentNumber();
pScan = pLastConsecutivePacket->pNext;
}
else if (pReceivedPackets)
{
pScan = pReceivedPackets->pNext;
}
unsigned Bit;
pBody->Acks[0] = 0;
while ( pScan )
{
Bit = pScan->GetFragmentNumber() - FragNum - 1;
pBody->Acks[0] |= (1 << Bit);
pScan = pScan->pNext;
}
if (pBody->Acks[0] == 0)
{
pBody->AckWordCount = 0;
}
pSavedPacket->SetPacketBodyLen( sizeof(FACK_BODY_VER_0) + sizeof(unsigned long) );
pSavedPacket->SetFragmentNumber(FragNum);
AddSerialNumber(&pSavedPacket->Header);
unsigned Frag = (pSavedPacket->Header.PacketType << 16) | pSavedPacket->GetFragmentNumber();
LogEvent(SU_ENGINE, EV_PKT_OUT, this, 0, Frag);
RPC_STATUS Status;
Status = BaseConnection->SealAndSendPacket(SourceEndpoint, RemoteAddress, &pSavedPacket->Header, 0);
if (Status)
{
LogError(SU_ENGINE, EV_STATUS, this, 0, Status);
}
return Status;
}
RPC_STATUS
DG_PACKET_ENGINE::AssembleBufferFromPackets(
RPC_MESSAGE * Message,
CALL * Call
)
/*++
Routine Description:
This function coalesces the list of consecutive packets into a monolithic
buffer.
Arguments:
Message - if .Buffer != 0 , use it. Otherwise allocate one.
Call - in case we need to call GetBuffer
Return Value:
RPC_S_OK - success
RPC_S_OUT_OF_MEMORY - we couldn't allocate or reallocate Message.Buffer
--*/
{
ASSERT( pLastConsecutivePacket );
//
// If only one packet is available, use the packet buffer itself.
//
if (0 == Message->Buffer && 0 == pReceivedPackets->pNext)
{
ASSERT(ConsecutiveDataBytes == pReceivedPackets->GetPacketBodyLen());
Message->Buffer = pReceivedPackets->Header.Data;
Message->BufferLength = ConsecutiveDataBytes;
Message->DataRepresentation = 0x00ffffff & (*(unsigned long PAPI *) &pReceivedPackets->Header.DataRep);
if (0 == (pReceivedPackets->Header.PacketFlags & DG_PF_FRAG))
{
Message->RpcFlags |= RPC_BUFFER_COMPLETE;
}
if (pReceivedPackets->Header.PacketFlags & DG_PF_LAST_FRAG)
{
Message->RpcFlags |= RPC_BUFFER_COMPLETE;
}
pReceivedPackets = 0;
pLastConsecutivePacket = 0;
ConsecutiveDataBytes = 0;
++ReceiveFragmentBase;
LastReceiveBuffer = Message->Buffer;
LastReceiveBufferLength = Message->BufferLength;
return RPC_S_OK;
}
//
// Get a buffer if we need it.
//
RPC_STATUS Status;
if (0 == Message->Buffer)
{
ASSERT(0 == (Message->RpcFlags & RPC_BUFFER_EXTRA));
Message->BufferLength = ConsecutiveDataBytes;
Status = Call->GetBuffer(Message, 0);
if (RPC_S_OK != Status)
{
return Status;
}
LastReceiveBuffer = Message->Buffer;
LastReceiveBufferLength = Message->BufferLength;
}
//
// Reallocate the buffer if it is too small.
//
char __RPC_FAR * CopyBuffer = (char __RPC_FAR *) Message->Buffer;
if (Message->RpcFlags & (RPC_BUFFER_EXTRA | RPC_BUFFER_PARTIAL))
{
ASSERT( !LastReceiveBufferLength ||
(CopyBuffer >= LastReceiveBuffer &&
CopyBuffer <= ((char __RPC_FAR *) LastReceiveBuffer) + LastReceiveBufferLength) );
if (0 == (Message->RpcFlags & RPC_BUFFER_EXTRA))
{
Message->BufferLength = 0;
}
unsigned Offset = Message->BufferLength;
CopyBuffer += Offset;
if (CopyBuffer + ConsecutiveDataBytes > ((char __RPC_FAR *) LastReceiveBuffer) + LastReceiveBufferLength)
{
Status = I_RpcReallocPipeBuffer(Message, Offset + ConsecutiveDataBytes);
if (RPC_S_OK != Status)
{
return Status;
}
CopyBuffer = (char __RPC_FAR *) Message->Buffer + Offset;
}
else
{
Message->BufferLength += ConsecutiveDataBytes;
}
}
else
{
Message->BufferLength = ConsecutiveDataBytes;
}
Message->DataRepresentation = 0x00ffffff & (*(unsigned long PAPI *) &pReceivedPackets->Header.DataRep);
{
PDG_PACKET pkt = DG_PACKET::FromStubData(Message->Buffer);
ASSERT( pkt->MaxDataLength >= Message->BufferLength );
}
//
// Copy the stub data into the buffer.
//
#ifdef DEBUGRPC
unsigned long Count = 0;
#endif
PDG_PACKET Packet;
BOOL fLastPacket = FALSE;
do
{
ASSERT(pReceivedPackets->TimeReceived == 0x31415926);
if (ReceiveFragmentBase != pReceivedPackets->GetFragmentNumber())
{
CORRUPTION_ASSERT(ReceiveFragmentBase == pReceivedPackets->GetFragmentNumber());
return RPC_S_PROTOCOL_ERROR;
}
if (pReceivedPackets == pLastConsecutivePacket)
{
fLastPacket = TRUE;
if (0 == (pReceivedPackets->Header.PacketFlags & DG_PF_FRAG))
{
Message->RpcFlags |= RPC_BUFFER_COMPLETE;
}
if (pReceivedPackets->Header.PacketFlags & DG_PF_LAST_FRAG)
{
Message->RpcFlags |= RPC_BUFFER_COMPLETE;
}
}
unsigned Length = pReceivedPackets->GetPacketBodyLen();
RpcpMemoryCopy(CopyBuffer, pReceivedPackets->Header.Data, Length);
#ifdef DEBUGRPC
Count += Length;
#endif
CopyBuffer += Length;
Packet = pReceivedPackets;
pReceivedPackets = pReceivedPackets->pNext;
ASSERT(!pReceivedPackets || pReceivedPackets->pPrevious == Packet);
FreePacket(Packet);
++ReceiveFragmentBase;
}
while (!fLastPacket);
ASSERT(Count == ConsecutiveDataBytes);
ASSERT(fLastPacket || 0 == Count % 8);
pLastConsecutivePacket = 0;
ConsecutiveDataBytes = 0;
if (pReceivedPackets)
{
pReceivedPackets->pPrevious = 0;
}
return RPC_S_OK;
}
void
DG_PACKET_ENGINE::SetFragmentLengths()
{
PSECURITY_CONTEXT pSecurityContext = BaseConnection->ActiveSecurityContext;
if (0 == pSecurityContext)
{
SecurityTrailerSize = 0;
}
else switch (pSecurityContext->AuthenticationLevel)
{
case RPC_C_AUTHN_LEVEL_NONE:
{
SecurityTrailerSize = 0;
break;
}
case RPC_C_AUTHN_LEVEL_PKT:
case RPC_C_AUTHN_LEVEL_PKT_INTEGRITY:
{
SecurityTrailerSize = (unsigned short) pSecurityContext->MaximumSignatureLength();
SecurityTrailerSize += (unsigned short) Align4(sizeof(DG_SECURITY_TRAILER));
break;
}
case RPC_C_AUTHN_LEVEL_PKT_PRIVACY:
{
SecurityTrailerSize = (unsigned short) pSecurityContext->MaximumHeaderLength();
SecurityTrailerSize += (unsigned short) Align(sizeof(DG_SECURITY_TRAILER), Align4(pSecurityContext->BlockSize()));
break;
}
default:
{
ASSERT(0 && "RPC: unknown protect level");
break;
}
}
if (CurrentPduSize != BaseConnection->CurrentPduSize)
{
CurrentPduSize = (unsigned short) BaseConnection->CurrentPduSize;
SendWindowSize = (unsigned short) BaseConnection->RemoteWindowSize;
}
MaxFragmentSize = CurrentPduSize - sizeof(NCA_PACKET_HEADER);
if (SecurityTrailerSize)
{
MaxFragmentSize -= SecurityTrailerSize;
MaxFragmentSize -= MaxFragmentSize % SECURITY_HEADER_ALIGNMENT;
}
}
void
ByteSwapPacketHeader(
PDG_PACKET pPacket
)
/*++
Routine Description:
Byte swaps the packet header of the specified packet.
Arguments:
pPacket - Pointer to the packet whose header needs byte swapping.
Return Value:
<none>
--*/
{
unsigned long __RPC_FAR * VerNum = (unsigned long __RPC_FAR *) &(pPacket->Header.InterfaceVersion);
ByteSwapUuid(&(pPacket->Header.ObjectId));
ByteSwapUuid(&(pPacket->Header.InterfaceId));
ByteSwapUuid(&(pPacket->Header.ActivityId));
pPacket->Header.ServerBootTime = RpcpByteSwapLong(pPacket->Header.ServerBootTime);
*VerNum = RpcpByteSwapLong(*VerNum);
pPacket->Header.SequenceNumber = RpcpByteSwapLong(pPacket->Header.SequenceNumber);
pPacket->Header.OperationNumber = RpcpByteSwapShort(pPacket->Header.OperationNumber);
pPacket->Header.InterfaceHint = RpcpByteSwapShort(pPacket->Header.InterfaceHint);
pPacket->Header.ActivityHint = RpcpByteSwapShort(pPacket->Header.ActivityHint);
pPacket->Header.PacketBodyLen = RpcpByteSwapShort(pPacket->Header.PacketBodyLen);
pPacket->Header.FragmentNumber = RpcpByteSwapShort(pPacket->Header.FragmentNumber);
}
void
ByteSwapFackBody0(
FACK_BODY_VER_0 __RPC_FAR * pBody
)
{
pBody->WindowSize = RpcpByteSwapShort(pBody->WindowSize);
pBody->MaxDatagramSize = RpcpByteSwapLong (pBody->MaxDatagramSize);
pBody->MaxPacketSize = RpcpByteSwapLong (pBody->MaxPacketSize);
pBody->SerialNumber = RpcpByteSwapShort(pBody->SerialNumber);
pBody->AckWordCount = RpcpByteSwapShort(pBody->AckWordCount);
unsigned u;
for (u=0; u < pBody->AckWordCount; ++u)
{
pBody->Acks[u] = RpcpByteSwapLong (pBody->Acks[u]);
}
}
RPCRTAPI RPC_STATUS RPC_ENTRY
I_RpcTransDatagramAllocate(
IN DG_TRANSPORT_ENDPOINT TransportEndpoint,
OUT BUFFER *pBuffer,
OUT PUINT pBufferLength,
OUT DatagramTransportPair **pAddressPair
)
{
DG_ENDPOINT * Endpoint = DG_ENDPOINT::FromEndpoint(TransportEndpoint);
RPC_DATAGRAM_TRANSPORT * Transport = Endpoint->TransportInterface;
if ( !Endpoint->Stats.PreferredPduSize )
{
RpcpBreakPoint();
}
DG_PACKET * Packet = DG_PACKET::AllocatePacket(Endpoint->Stats.PreferredPduSize
+ Transport->AddressSize
+ sizeof(DatagramTransportPair));
if (!Packet)
{
return RPC_S_OUT_OF_MEMORY;
}
DG_TRANSPORT_ADDRESS Address = DG_TRANSPORT_ADDRESS(Packet->Header.Data - sizeof(NCA_PACKET_HEADER) + Endpoint->Stats.PreferredPduSize);
*pBuffer = &Packet->Header;
*pBufferLength = Endpoint->Stats.PreferredPduSize;
*pAddressPair = (DatagramTransportPair *)((char *)Address + Transport->AddressSize);
(*pAddressPair)->RemoteAddress = Address;
return RPC_S_OK;
}
RPCRTAPI RPC_STATUS RPC_ENTRY
I_RpcTransDatagramAllocate2(
IN DG_TRANSPORT_ENDPOINT TransportEndpoint,
OUT BUFFER *pBuffer,
IN OUT PUINT pBufferLength,
OUT DG_TRANSPORT_ADDRESS *pAddress
)
{
DG_ENDPOINT *pEndpoint = DG_ENDPOINT::FromEndpoint(TransportEndpoint);
RPC_DATAGRAM_TRANSPORT *pTransport = pEndpoint->TransportInterface;
DWORD dwSize = *pBufferLength;
if (dwSize < pEndpoint->Stats.PreferredPduSize)
{
dwSize = pEndpoint->Stats.PreferredPduSize;
}
DG_PACKET * Packet = DG_PACKET::AllocatePacket( dwSize + pTransport->AddressSize);
if (!Packet)
{
return RPC_S_OUT_OF_MEMORY;
}
DG_TRANSPORT_ADDRESS Address = DG_TRANSPORT_ADDRESS(Packet->Header.Data - sizeof(NCA_PACKET_HEADER) + dwSize);
*pBuffer = &Packet->Header;
*pBufferLength = dwSize;
*pAddress = Address;
return RPC_S_OK;
}
RPCRTAPI RPC_STATUS RPC_ENTRY
I_RpcTransDatagramFree(
IN RPC_TRANSPORT_ADDRESS ThisAddress,
IN BUFFER Buffer
)
{
DG_PACKET * Packet = DG_PACKET::FromPacketHeader( Buffer );
Packet->Free();
return RPC_S_OK;
}
RPC_STATUS
DG_PACKET::Initialize(
)
{
return RPC_S_OK;
}
BOOL
DG_PACKET::DeleteIdlePackets(
long CurrentTime
)
/*++
Routine Description:
This fn scans the free packet list for very old packets and deletes them.
Arguments:
none
Return Value:
none
--*/
{
return FALSE;
}
DG_COMMON_CONNECTION::DG_COMMON_CONNECTION(
RPC_DATAGRAM_TRANSPORT *a_TransportInterface,
RPC_STATUS * pStatus
) :
Mutex (pStatus),
TimeStamp (0),
TransportInterface (a_TransportInterface),
ReferenceCount (0),
CurrentPduSize (a_TransportInterface->BasePduSize),
RemoteWindowSize (1),
RemoteDataUpdated (FALSE),
LowestActiveSequence(0),
LowestUnusedSequence(0),
ActiveSecurityContext(0)
{
}
DG_COMMON_CONNECTION::~DG_COMMON_CONNECTION()
{
delete ActiveSecurityContext;
}
RPC_STATUS
SendSecurePacket(
IN DG_ENDPOINT * SourceEndpoint,
IN DG_TRANSPORT_ADDRESS RemoteAddress,
IN UNALIGNED NCA_PACKET_HEADER *pHeader,
IN unsigned long DataOffset,
IN SECURITY_CONTEXT * SecurityContext
)
{
RPC_STATUS Status = RPC_S_OK;
unsigned TrailerLength = 0;
unsigned MaxTrailerSize = 0;
PDG_SECURITY_TRAILER pTrailer = 0;
if (SecurityContext && SecurityContext->AuthenticationLevel > RPC_C_AUTHN_LEVEL_NONE)
{
// Pad the stub data length to a multiple of 8, so the security
// trailer is properly aligned. OSF requires that the pad bytes
// be included in PacketBodyLen.
//
pHeader->SetPacketBodyLen(Align8(pHeader->GetPacketBodyLen()));
pHeader->AuthProto = (unsigned char) SecurityContext->AuthenticationService;
SECURITY_BUFFER_DESCRIPTOR BufferDescriptor;
SECURITY_BUFFER SecurityBuffers[5];
DCE_MSG_SECURITY_INFO MsgSecurityInfo;
BufferDescriptor.ulVersion = 0;
BufferDescriptor.cBuffers = 5;
BufferDescriptor.pBuffers = SecurityBuffers;
SecurityBuffers[0].BufferType = SECBUFFER_DATA | SECBUFFER_READONLY;
SecurityBuffers[0].pvBuffer = pHeader;
SecurityBuffers[0].cbBuffer = sizeof(NCA_PACKET_HEADER);
SecurityBuffers[1].BufferType = SECBUFFER_DATA;
SecurityBuffers[1].pvBuffer = pHeader->Data + DataOffset;
SecurityBuffers[1].cbBuffer = pHeader->GetPacketBodyLen();
if (SecurityContext->AuthenticationLevel == RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
{
SecurityBuffers[2].cbBuffer = (ULONG) Align(sizeof(DG_SECURITY_TRAILER), Align4(SecurityContext->BlockSize()));
SecurityBuffers[3].cbBuffer = SecurityContext->MaximumHeaderLength();
}
else
{
SecurityBuffers[2].cbBuffer = (ULONG) Align4(sizeof(DG_SECURITY_TRAILER));
SecurityBuffers[3].cbBuffer = SecurityContext->MaximumSignatureLength();
}
pTrailer = (PDG_SECURITY_TRAILER) _alloca(SecurityBuffers[2].cbBuffer + SecurityBuffers[3].cbBuffer);
SecurityBuffers[2].BufferType = SECBUFFER_DATA | SECBUFFER_READONLY;
SecurityBuffers[2].pvBuffer = pTrailer;
SecurityBuffers[3].BufferType = SECBUFFER_TOKEN;
SecurityBuffers[3].pvBuffer = (unsigned char *) pTrailer
+ SecurityBuffers[2].cbBuffer;
SecurityBuffers[4].BufferType = SECBUFFER_PKG_PARAMS | SECBUFFER_READONLY;
SecurityBuffers[4].pvBuffer = &MsgSecurityInfo;
SecurityBuffers[4].cbBuffer = sizeof(DCE_MSG_SECURITY_INFO);
MsgSecurityInfo.SendSequenceNumber = pHeader->GetFragmentNumber();
MsgSecurityInfo.ReceiveSequenceNumber = SecurityContext->AuthContextId;
MsgSecurityInfo.PacketType = ~0;
TrailerLength = SecurityBuffers[2].cbBuffer;
pTrailer->protection_level = (unsigned char) SecurityContext->AuthenticationLevel;
pTrailer->key_vers_num = (unsigned char) SecurityContext->AuthContextId;
Status = SecurityContext->SignOrSeal (
pHeader->SequenceNumber,
SecurityContext->AuthenticationLevel != RPC_C_AUTHN_LEVEL_PKT_PRIVACY,
&BufferDescriptor );
ASSERT( SecurityBuffers[3].cbBuffer > 0 );
TrailerLength += SecurityBuffers[3].cbBuffer;
}
else
{
//
// Unsecure packet.
//
pHeader->AuthProto = 0;
}
if (RPC_S_OK == Status)
{
Status = SourceEndpoint->TransportInterface->Send(
&SourceEndpoint->TransportEndpoint,
RemoteAddress,
pHeader,
sizeof(NCA_PACKET_HEADER),
pHeader->Data + DataOffset,
pHeader->GetPacketBodyLen(),
pTrailer,
TrailerLength
);
}
return Status;
}
RPC_STATUS
VerifySecurePacket(
PDG_PACKET pPacket,
SECURITY_CONTEXT * pSecurityContext
)
{
RPC_STATUS Status = RPC_S_OK;
PDG_SECURITY_TRAILER pVerifier = (PDG_SECURITY_TRAILER)
(pPacket->Header.Data + pPacket->GetPacketBodyLen());
if (pSecurityContext->AuthenticationLevel < RPC_C_AUTHN_LEVEL_PKT)
{
return RPC_S_OK;
}
ASSERT(pVerifier->protection_level >= RPC_C_AUTHN_LEVEL_PKT);
ASSERT(pVerifier->protection_level <= RPC_C_AUTHN_LEVEL_PKT_PRIVACY);
SECURITY_BUFFER_DESCRIPTOR BufferDescriptor;
SECURITY_BUFFER SecurityBuffers[5];
DCE_MSG_SECURITY_INFO MsgSecurityInfo;
BufferDescriptor.ulVersion = 0;
BufferDescriptor.cBuffers = 5;
BufferDescriptor.pBuffers = SecurityBuffers;
SecurityBuffers[0].BufferType = SECBUFFER_DATA | SECBUFFER_READONLY;
SecurityBuffers[0].pvBuffer = &pPacket->Header;
SecurityBuffers[0].cbBuffer = sizeof(NCA_PACKET_HEADER);
SecurityBuffers[1].BufferType = SECBUFFER_DATA;
SecurityBuffers[1].pvBuffer = pPacket->Header.Data;
SecurityBuffers[1].cbBuffer = pPacket->GetPacketBodyLen();
SecurityBuffers[2].BufferType = SECBUFFER_DATA | SECBUFFER_READONLY;
SecurityBuffers[2].pvBuffer = pVerifier;
if (pVerifier->protection_level == RPC_C_AUTHN_LEVEL_PKT_PRIVACY)
{
unsigned Alignment = Align4(pSecurityContext->BlockSize());
SecurityBuffers[2].cbBuffer = (ULONG) Align(sizeof(DG_SECURITY_TRAILER), Alignment);
SecurityBuffers[3].pvBuffer = AlignPtr(pVerifier + 1, Alignment);
}
else
{
SecurityBuffers[2].cbBuffer = (ULONG) Align4(sizeof(DG_SECURITY_TRAILER));
SecurityBuffers[3].pvBuffer = AlignPtr4(pVerifier + 1);
}
SecurityBuffers[3].BufferType = SECBUFFER_TOKEN;
SecurityBuffers[3].cbBuffer = pPacket->DataLength
- SecurityBuffers[1].cbBuffer
- SecurityBuffers[2].cbBuffer;
SecurityBuffers[4].BufferType = SECBUFFER_PKG_PARAMS | SECBUFFER_READONLY;
SecurityBuffers[4].pvBuffer = &MsgSecurityInfo;
SecurityBuffers[4].cbBuffer = sizeof(DCE_MSG_SECURITY_INFO);
MsgSecurityInfo.SendSequenceNumber = pPacket->GetFragmentNumber();
MsgSecurityInfo.ReceiveSequenceNumber = pSecurityContext->AuthContextId;
MsgSecurityInfo.PacketType = ~0;
//
// If the packet came from a big-endian machine, we must restore
// the header to its original condition or the checksum will fail.
//
ByteSwapPacketHeaderIfNecessary(pPacket);
Status = pSecurityContext->VerifyOrUnseal(
pPacket->Header.SequenceNumber,
pVerifier->protection_level != RPC_C_AUTHN_LEVEL_PKT_PRIVACY,
&BufferDescriptor
);
//
// Gotta re-swap the header so we can still look at its fields.
//
ByteSwapPacketHeaderIfNecessary(pPacket);
if (RPC_S_OK != Status)
{
#ifdef DEBUGRPC
DbgPrint("dg rpc: %lx: pkt %lx type %lx has bad security info (error 0x%lx)\n",
GetCurrentProcessId(), pPacket, pPacket->Header.PacketType, Status);
#endif
ASSERT(Status == RPC_S_ACCESS_DENIED ||
Status == ERROR_PASSWORD_MUST_CHANGE ||
Status == ERROR_PASSWORD_EXPIRED ||
Status == ERROR_ACCOUNT_DISABLED ||
Status == ERROR_INVALID_LOGON_HOURS ||
Status == RPC_S_OUT_OF_MEMORY);
}
return(Status);
}
BOOL
DG_PickleEEInfoIntoPacket (
IN DG_PACKET * Packet,
IN size_t PickleStartOffset
)
/*++
Function Name: PickeEEInfoIntoPacket
Parameters:
PickleStartOffset - the offset in bytes where the pickling starts
pHeader - pointer to the packet to fill
Description:
Checks for EEInfo on the thread, trims the EEInfo to Packet->MaxDataLength,
and pickles the EEInfo starting from PickleStartOffset.
Returns:
TRUE if EEInfo was pickled. FALSE if not.
--*/
{
BOOL fEEInfoPresent = FALSE;
ExtendedErrorInfo *EEInfo;
RPC_STATUS RpcStatus;
size_t CurrentPacketSize;
EEInfo = RpcpGetEEInfo();
if (EEInfo)
{
AddComputerNameToChain(EEInfo);
TrimEEInfoToLength (Packet->MaxDataLength-PickleStartOffset, &CurrentPacketSize);
if (CurrentPacketSize != 0)
{
CurrentPacketSize += PickleStartOffset;
ASSERT(IsBufferAligned(Packet->Header.Data + PickleStartOffset));
RpcpMemorySet(Packet->Header.Data, 0, CurrentPacketSize);
RpcStatus = PickleEEInfo( EEInfo,
Packet->Header.Data + PickleStartOffset,
CurrentPacketSize - PickleStartOffset
);
if (RpcStatus == RPC_S_OK)
{
fEEInfoPresent = TRUE;
Packet->SetPacketBodyLen( CurrentPacketSize );
}
}
}
return fEEInfoPresent;
}
void
InitErrorPacket(
DG_PACKET * pPacket,
unsigned char PacketType,
RPC_STATUS RpcStatus
)
/*++
Routine Description:
Maps <ProcessStatus> to an NCA error code and sends
a FAULT or REJECT packet to the client, as appropriate.
Arguments:
pSendPacket - a packet to use, or zero if this fn should allocate one
ProcessStatus - NT RPC error code
Return Value:
none
--*/
{
NCA_PACKET_HEADER * pHeader = &pPacket->Header;
CleanupPacket(pHeader);
pHeader->PacketType = PacketType;
size_t FaultSize;
BOOL fEEInfoPresent = FALSE;
//
// This mapping distinguishes client-side shutdown from server-side shutdown.
//
if (RpcStatus == ERROR_SHUTDOWN_IN_PROGRESS)
{
if (PacketType == DG_REJECT)
{
RpcStatus = RPC_S_SERVER_UNAVAILABLE;
}
else
{
RpcStatus = ERROR_SERVER_SHUTDOWN_IN_PROGRESS;
}
}
else if (RpcStatus == RPC_P_CLIENT_SHUTDOWN_IN_PROGRESS)
{
RpcStatus = ERROR_SHUTDOWN_IN_PROGRESS;
}
if (g_fSendEEInfo)
{
fEEInfoPresent = DG_PickleEEInfoIntoPacket( pPacket, FIELD_OFFSET( EXTENDED_FAULT_BODY, EeInfo) );
}
if (fEEInfoPresent)
{
//
// Packet body length already set.
//
EXTENDED_FAULT_BODY * body = (EXTENDED_FAULT_BODY *) pHeader->Data;
body->NcaStatus = MapToNcaStatusCode(RpcStatus);
body->Magic = DG_EE_MAGIC_VALUE;
body->reserved1 = 0;
body->reserved2 = 0;
}
else
{
size_t XopenFaultSize = sizeof(unsigned long);
*(unsigned long *)(pHeader->Data) = MapToNcaStatusCode(RpcStatus);
pHeader->SetPacketBodyLen(XopenFaultSize);
}
}