mirror of https://github.com/tongzx/nt5src
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
860 lines
26 KiB
860 lines
26 KiB
/*
|
|
|
|
* remote checksum server
|
|
*
|
|
* sumserve.c main module
|
|
*
|
|
* program to supply lists of files and checksums from a remote server.
|
|
* This program runs remotely, and is queried over a named pipe: a client
|
|
* connects to us, and gives us a pathname. We then send him one at a time,
|
|
* the names of all the files in the file tree starting at that path, together
|
|
* with a checksum for the files.
|
|
* Useful for comparing file trees that are separated by a slow link.
|
|
*
|
|
* outline:
|
|
* this module: named pipe creation and connects - main loop
|
|
*
|
|
* service.c service control manager interface (start/stop)
|
|
*
|
|
* scan.c: service code that scans and checksums
|
|
*
|
|
*
|
|
* Geraint Davies, july 92
|
|
*/
|
|
|
|
#include <windows.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include "sumserve.h"
|
|
#include "errlog.h"
|
|
#include "server.h"
|
|
|
|
#include "list.h"
|
|
|
|
|
|
BOOL bNoCompression = FALSE;
|
|
BOOL bTracing = FALSE;
|
|
|
|
|
|
/*
|
|
* error and activity log
|
|
*/
|
|
HLOG hlogErrors;
|
|
HLOG hlogEvents;
|
|
|
|
|
|
/*
|
|
* we keep one of these on the listConnections for each current
|
|
* connection. It is created by a call to ss_logon, and should be
|
|
* removed by a call to ss_logoff when the connection terminates.
|
|
*/
|
|
typedef struct _connect {
|
|
FILETIME ftLogon;
|
|
char Username[256];
|
|
} CONNECT, * PCONNECT;
|
|
|
|
/*
|
|
* list of current connections - protect by critsecConnects;
|
|
*/
|
|
CRITICAL_SECTION critsecConnects;
|
|
LIST listConnects;
|
|
|
|
PCONNECT ss_logon(HANDLE hpipe);
|
|
VOID ss_logoff(PCONNECT);
|
|
VOID ss_sendconnects(HANDLE hpipe);
|
|
|
|
|
|
|
|
/* forward declarations of procedures ----------------------------- */
|
|
BOOL ss_handleclient(LPVOID arg);
|
|
BOOL ss_readmessage(HANDLE hpipe, LPSTR buffer, int size);
|
|
void ParseArgs(DWORD dwArgc, LPTSTR *lpszArgv);
|
|
|
|
/* functions ------------------------------------------------------- */
|
|
|
|
#define trace
|
|
#ifdef trace
|
|
|
|
static HANDLE hTraceFile = INVALID_HANDLE_VALUE;
|
|
|
|
void Trace_File(LPSTR msg)
|
|
{
|
|
DWORD nw; /* number of bytes writtten */
|
|
|
|
if (!bTracing) return;
|
|
|
|
if (hTraceFile==INVALID_HANDLE_VALUE)
|
|
hTraceFile = CreateFile( "sumserve.trc"
|
|
, GENERIC_WRITE
|
|
, FILE_SHARE_WRITE
|
|
, NULL
|
|
, CREATE_ALWAYS
|
|
, 0
|
|
, NULL
|
|
);
|
|
|
|
WriteFile(hTraceFile, msg, lstrlen(msg)+1, &nw, NULL);
|
|
FlushFileBuffers(hTraceFile);
|
|
|
|
} /* Trace_File */
|
|
|
|
void Trace_Close(void)
|
|
{
|
|
if (hTraceFile!=INVALID_HANDLE_VALUE)
|
|
CloseHandle(hTraceFile);
|
|
hTraceFile = INVALID_HANDLE_VALUE;
|
|
|
|
} /* Trace_Close */
|
|
|
|
typedef struct {
|
|
DWORD dw[5];
|
|
} BLOCK;
|
|
|
|
#endif //trace
|
|
|
|
static void Error(PSTR Title)
|
|
{
|
|
Log_Write(hlogErrors, "Error %d from %s when creating main pipe", GetLastError(), Title);
|
|
}
|
|
|
|
|
|
HANDLE
|
|
SS_CreateServerPipe(PSTR pname)
|
|
{
|
|
|
|
|
|
/****************************************
|
|
We need security attributes for the pipe to let anyone other than the
|
|
current user log on to it.
|
|
***************************************/
|
|
|
|
/* Allocate DWORDs for the ACL to get them aligned. Round up to next DWORD above */
|
|
DWORD Acl[(sizeof(ACL)+sizeof(ACCESS_ALLOWED_ACE)+3)/4+4]; // +4 by experiment!!
|
|
SECURITY_DESCRIPTOR sd;
|
|
PSECURITY_DESCRIPTOR psd = &sd;
|
|
PSID psid;
|
|
SID_IDENTIFIER_AUTHORITY SidWorld = SECURITY_WORLD_SID_AUTHORITY;
|
|
PACL pacl = (PACL)(&(Acl[0]));
|
|
SECURITY_ATTRIBUTES sa;
|
|
HANDLE hpipe;
|
|
|
|
if (!AllocateAndInitializeSid( &SidWorld, 1, SECURITY_WORLD_RID
|
|
, 1, 2, 3, 4, 5, 6, 7
|
|
, &psid
|
|
)
|
|
) {
|
|
Error("AllocateAndInitializeSid");
|
|
return(INVALID_HANDLE_VALUE);
|
|
}
|
|
|
|
if (!InitializeAcl(pacl, sizeof(Acl), ACL_REVISION)){
|
|
Error("InitializeAcl");
|
|
return(INVALID_HANDLE_VALUE);
|
|
}
|
|
if (!AddAccessAllowedAce(pacl, ACL_REVISION, GENERIC_WRITE|GENERIC_READ, psid)){
|
|
Error("AddAccessAllowedAce");
|
|
return(INVALID_HANDLE_VALUE);
|
|
}
|
|
if (!InitializeSecurityDescriptor(psd, SECURITY_DESCRIPTOR_REVISION)){
|
|
Error("InitializeSecurityDescriptor");
|
|
return(INVALID_HANDLE_VALUE);
|
|
}
|
|
if (!SetSecurityDescriptorDacl(psd, TRUE, pacl, FALSE)){
|
|
Error("SetSecurityDescriptorDacl");
|
|
return(INVALID_HANDLE_VALUE);
|
|
}
|
|
sa.nLength = sizeof(sa);
|
|
sa.lpSecurityDescriptor = psd;
|
|
sa.bInheritHandle = TRUE;
|
|
|
|
/* We now have a good security descriptor! */
|
|
|
|
dprintf1(("creating new pipe instance\n"));
|
|
|
|
hpipe = CreateNamedPipe(pname, /* pipe name */
|
|
PIPE_ACCESS_DUPLEX, /* both read and write */
|
|
PIPE_WAIT|PIPE_TYPE_MESSAGE|PIPE_READMODE_MESSAGE,
|
|
PIPE_UNLIMITED_INSTANCES,
|
|
0, 0, /* dynamic buffer allocation*/
|
|
5000, /* def. timeout 5 seconds */
|
|
&sa /* security descriptor */
|
|
);
|
|
FreeSid(psid);
|
|
|
|
if (hpipe == INVALID_HANDLE_VALUE) {
|
|
Error("CreateNamedPipe");
|
|
return(INVALID_HANDLE_VALUE);
|
|
}
|
|
|
|
return(hpipe);
|
|
}
|
|
|
|
/* program main loop
|
|
*
|
|
* creates the named pipe, and loops waiting for client connections and
|
|
* calling ss_handleclient for each connection. only exits when told
|
|
* to by a client.
|
|
*
|
|
* currently permits only one client connection at once.
|
|
*/
|
|
VOID
|
|
MainLoop(DWORD dwArgc, LPTSTR *lpszArgv)
|
|
{
|
|
char msg[400];
|
|
HANDLE hpipe;
|
|
DWORD threadid;
|
|
|
|
|
|
ParseArgs(dwArgc, lpszArgv);
|
|
|
|
|
|
/*
|
|
* initialise error and activity logs
|
|
*/
|
|
hlogErrors = Log_Create();
|
|
hlogEvents = Log_Create();
|
|
Log_Write(hlogEvents, "Checksum service started");
|
|
|
|
/* initialise connection list and protective critsec */
|
|
InitializeCriticalSection(&critsecConnects);
|
|
List_Init();
|
|
listConnects = List_Create();
|
|
|
|
|
|
if (bTracing){
|
|
SYSTEMTIME st;
|
|
char msg[120];
|
|
GetSystemTime(&st);
|
|
wsprintf(msg, "Sumserve trace, started %hd:%hd on %hd/%hd/%hd (British notation)\n"
|
|
, st.wHour, st.wMinute, st.wDay, st.wMonth, st.wYear);
|
|
}
|
|
|
|
|
|
/* create the named pipe at the known name NPNAME on this server */
|
|
|
|
/* build the correct syntax for a named pipe on the local machine,
|
|
* with the pipe name being NPNAME - thus the full name should be
|
|
* \\.\pipe\NPNAME
|
|
*/
|
|
sprintf(msg, "\\\\.\\pipe\\%s", NPNAME);
|
|
|
|
/*
|
|
* loop creating instances of the named pipe and connecting to
|
|
* clients.
|
|
*
|
|
* When a client connects, we spawn a thread to handle him, and
|
|
* we create another instance of the named pipe to service
|
|
* further clients.
|
|
*
|
|
* if we receive a quit message (TRUE return from handleclient)
|
|
* we exit here so that no new clients will be connected.
|
|
* the process will exit when all the client requests are
|
|
* finished.
|
|
*/
|
|
for (;;) {
|
|
|
|
hpipe = SS_CreateServerPipe(msg);
|
|
if (hpipe == INVALID_HANDLE_VALUE) {
|
|
return;
|
|
}
|
|
|
|
dprintf1(("Waiting for client to connect to main pipe %x\n", hpipe));
|
|
|
|
if (ConnectNamedPipe(hpipe, NULL)) {
|
|
|
|
|
|
/* we have a client connection */
|
|
dprintf1(("Client has connected\n"));
|
|
|
|
|
|
/*
|
|
* create a thread to service all requests
|
|
*/
|
|
CreateThread(NULL, 0,
|
|
(LPTHREAD_START_ROUTINE) ss_handleclient,
|
|
(LPVOID) hpipe, 0, &threadid);
|
|
|
|
dprintf1(("created thread %ld for pipe %x\n", threadid, hpipe));
|
|
|
|
}
|
|
}
|
|
#ifdef trace
|
|
Trace_Close();
|
|
#endif
|
|
|
|
|
|
/* free up logs */
|
|
Log_Delete(hlogErrors);
|
|
Log_Delete(hlogEvents);
|
|
|
|
List_Destroy(&listConnects);
|
|
DeleteCriticalSection(&critsecConnects);
|
|
|
|
|
|
return;
|
|
}
|
|
|
|
/* collect arguments: -n means bNoCompression = TRUE, -t means bTracing = TRUE */
|
|
void
|
|
ParseArgs(DWORD dwArgc, LPTSTR *lpszArgv)
|
|
{
|
|
DWORD i;
|
|
PSTR ps;
|
|
|
|
for (i = 1; i < dwArgc; i++) {
|
|
|
|
ps = lpszArgv[i];
|
|
|
|
|
|
/* is this an option ? */
|
|
if ((ps[0] == '-') || (ps[0] == '/')) {
|
|
switch(ps[1]) {
|
|
|
|
case 'n':
|
|
case 'N':
|
|
bNoCompression = TRUE;
|
|
break;
|
|
#ifdef trace
|
|
case 't':
|
|
case 'T':
|
|
bTracing = TRUE;
|
|
break;
|
|
#endif //trace
|
|
default:
|
|
Log_Write(hlogErrors, "Bad option(s) ignored");
|
|
return;
|
|
}
|
|
}
|
|
else {
|
|
Log_Write(hlogErrors, "Bad argument(s) ignored");
|
|
return;
|
|
}
|
|
}
|
|
} /* ParseArgs */
|
|
|
|
/*
|
|
* handle a client connection. This routine is called in a separate thread
|
|
* to service a given client.
|
|
*
|
|
* loop reading messages until the client sends a session exit or
|
|
* program exit code, or until the pipe connection goes away.
|
|
*
|
|
* return TRUE if the server is to exit (indicated by a program exit
|
|
* command SSREQ_EXIT from the client)
|
|
*/
|
|
|
|
BOOL
|
|
ss_handleclient(LPVOID arg)
|
|
{
|
|
HANDLE hpipe = (HANDLE) arg;
|
|
|
|
SSREQUEST req;
|
|
SSNEWREQ newreq;
|
|
LPSTR p1, p2;
|
|
PFNAMELIST connects = NULL;
|
|
BOOL bExitServer = FALSE;
|
|
LONG lVersion = 0;
|
|
BOOL bDirty = TRUE; /* cleared on clean exit */
|
|
PCONNECT pLogon;
|
|
|
|
|
|
try {
|
|
|
|
/* make a logon entry in the connections table*/
|
|
pLogon = ss_logon(hpipe);
|
|
|
|
|
|
|
|
|
|
// dprintf1(("Client handler for pipe %x\n", hpipe));
|
|
/* loop indefinitely - exit only from within the loop if
|
|
* the connection goes away or we receive an exit command
|
|
*/
|
|
for (; ; ) {
|
|
|
|
/* read a message from the pipe - if false,
|
|
* connection is dropped.
|
|
*/
|
|
if (!ss_readmessage(hpipe, (LPSTR) &newreq, sizeof(newreq))) {
|
|
|
|
break;
|
|
}
|
|
if (newreq.lCode<0) {
|
|
lVersion = newreq.lVersion;
|
|
dprintf1(("Client for pipe %x is at Version %d\n", hpipe, lVersion));
|
|
newreq.lCode = -newreq.lCode;
|
|
}
|
|
else { /* juggle the fields to get them right */
|
|
memcpy(&req, &newreq, sizeof(req));
|
|
/* lCode is already in the right place */
|
|
dprintf1(("Version 0 (i.e. down level client) for pipe %x\n", hpipe));
|
|
newreq.lVersion = 0;
|
|
memcpy(&newreq.szPath, &req.szPath, MAX_PATH*sizeof(char));
|
|
}
|
|
|
|
if (newreq.lVersion>SS_VERSION) /* WE are down level! */
|
|
{
|
|
ss_sendnewresp( hpipe, SS_VERSION, SSRESP_BADVERS
|
|
, 0,0, 0,0, NULL);
|
|
/* Sorry - can't help - clean exit */
|
|
Log_Write(hlogErrors,
|
|
"server is down level! Please upgrade! Client wants %d"
|
|
, newreq.lVersion);
|
|
|
|
FlushFileBuffers(hpipe);
|
|
break;
|
|
|
|
}
|
|
|
|
if (newreq.lCode == SSREQ_EXIT) {
|
|
/* exit the program */
|
|
Log_Write(hlogErrors, "Server exit request from %s - Ignored",
|
|
pLogon->Username);
|
|
|
|
/* clean exit */
|
|
FlushFileBuffers(hpipe);
|
|
|
|
|
|
/*
|
|
* now exit the server -
|
|
* returning bExitServer from this function will
|
|
* cause MainLoop to exit. This will result in
|
|
* the service being stopped, and the process exiting.
|
|
*/
|
|
bExitServer = TRUE;
|
|
#ifdef trace
|
|
Trace_Close();
|
|
#endif
|
|
break;
|
|
|
|
|
|
|
|
|
|
} else if (newreq.lCode == SSREQ_END) {
|
|
|
|
/* clean exit */
|
|
dprintf1(("Server end session request for pipe %x\n", hpipe));
|
|
FlushFileBuffers(hpipe);
|
|
break;
|
|
|
|
} else if (newreq.lCode == SSREQ_SCAN
|
|
|| newreq.lCode == SSREQ_QUICKSCAN) {
|
|
|
|
/* please scan the following file or dir,
|
|
* and return the list of files and
|
|
* checksums.
|
|
*/
|
|
Log_Write(hlogEvents, "%s scan for %s",
|
|
pLogon->Username, newreq.szPath);
|
|
|
|
|
|
#ifdef SECURE
|
|
/* lower security to the client's level */
|
|
if (!ImpersonateNamedPipeClient(hpipe)) {
|
|
dprintf1(("Client impersonate failed %d\n",
|
|
GetLastError() ));
|
|
}
|
|
#endif
|
|
if (!ss_scan( hpipe, newreq.szPath, lVersion
|
|
, (newreq.lCode == SSREQ_SCAN)
|
|
, 0!=(newreq.lFlags&INCLUDESUBS)
|
|
)
|
|
) {
|
|
/* return to our own security token */
|
|
|
|
RevertToSelf();
|
|
|
|
dprintf1(("connection lost during scan for pipe %x\n", hpipe));
|
|
break;
|
|
}
|
|
/* return to our own security token */
|
|
RevertToSelf();
|
|
|
|
} else if (newreq.lCode == SSREQ_UNC) {
|
|
|
|
dprintf1(("connect request for pipe %x\n", hpipe));
|
|
/* this packet has two strings in the buffer, first
|
|
* is the password, second is the server
|
|
*/
|
|
p1 = newreq.szPath;
|
|
p2 = &p1[strlen(p1) + 1];
|
|
|
|
/* remember to add the connect name to our list
|
|
* of servers to disconnect from at end of client
|
|
* session
|
|
*/
|
|
connects = ss_handleUNC (hpipe, lVersion, p1, p2
|
|
, connects);
|
|
|
|
} else if (newreq.lCode == SSREQ_FILE) {
|
|
|
|
Log_Write(hlogEvents, "%s copy file %s",
|
|
pLogon->Username, newreq.szPath);
|
|
|
|
ss_sendfile(hpipe, newreq.szPath, lVersion);
|
|
|
|
} else if (newreq.lCode == SSREQ_FILES) {
|
|
|
|
Log_Write(hlogEvents, "%s bulk copy request",
|
|
pLogon->Username);
|
|
|
|
if (!ss_sendfiles(hpipe, lVersion)) {
|
|
RevertToSelf();
|
|
dprintf1(("Sendfiles completed with error on pipe %x\n", hpipe));
|
|
break;
|
|
}
|
|
|
|
} else if (newreq.lCode == SSREQ_NEXTFILE) {
|
|
|
|
Log_Write(hlogErrors,
|
|
"file list from %s (pipe %x) request out of sequence! (ignored)",
|
|
pLogon->Username, hpipe);
|
|
|
|
} else if (newreq.lCode == SSREQ_ERRORLOG) {
|
|
Log_Send(hpipe, hlogErrors);
|
|
|
|
} else if (newreq.lCode == SSREQ_EVENTLOG) {
|
|
Log_Send(hpipe, hlogEvents);
|
|
|
|
} else if (newreq.lCode == SSREQ_CONNECTS) {
|
|
ss_sendconnects(hpipe);
|
|
|
|
} else {
|
|
/* packet error ? - carry on anyway */
|
|
Log_Write(hlogErrors,
|
|
"error in message from %s code: %d",
|
|
pLogon->Username, newreq.lCode);
|
|
}
|
|
}
|
|
/* we break out of the loop at end of client session */
|
|
|
|
/* close this pipe instance */
|
|
DisconnectNamedPipe(hpipe);
|
|
CloseHandle(hpipe);
|
|
|
|
/* clean all connections made for this client */
|
|
ss_cleanconnections(connects);
|
|
|
|
/* exit this server thread */
|
|
dprintf1(("thread %ld exiting on behalf of pipe %x\n", GetCurrentThreadId(), hpipe));
|
|
bDirty = FALSE;
|
|
|
|
}
|
|
except (EXCEPTION_EXECUTE_HANDLER) {
|
|
if (bDirty) {
|
|
Log_Write(hlogErrors,
|
|
"!!Exception on thread %ld. Exiting on behalf of %s"
|
|
, GetCurrentThreadId(), pLogon->Username);
|
|
try {
|
|
DisconnectNamedPipe(hpipe);
|
|
CloseHandle(hpipe);
|
|
|
|
}
|
|
except (EXCEPTION_EXECUTE_HANDLER) {
|
|
/* Oh dear - let's just go home! */
|
|
}
|
|
|
|
}
|
|
else
|
|
dprintf1(( "Thread %ld exiting on behalf of pipe %x\n"
|
|
, GetCurrentThreadId(), hpipe));
|
|
}
|
|
|
|
|
|
/* note that we have logged off */
|
|
ss_logoff(pLogon);
|
|
|
|
return(bExitServer);
|
|
|
|
|
|
} /* ss_handle_client */
|
|
|
|
|
|
/* build and send a response packet to the client. Check for network
|
|
* errors, and retry (unless the pipe is broken) up to 10 times.
|
|
*
|
|
* if write succeeds - return TRUE.
|
|
* if failure - return FALSE to indicate connection is dropped.
|
|
*/
|
|
BOOL
|
|
ss_sendnewresp( HANDLE hpipe
|
|
, long lVersion
|
|
, long lCode
|
|
, ULONG ulSize /* used for Win32 error code for SSRESP_ERRROR */
|
|
, ULONG ulSum
|
|
, DWORD dwLowTime
|
|
, DWORD dwHighTime
|
|
, PSTR szFile
|
|
)
|
|
{
|
|
SSNEWRESP resp;
|
|
|
|
if (lVersion==0) {
|
|
return ss_sendresponse(hpipe, lCode, ulSize, ulSum, szFile);
|
|
}
|
|
resp.lVersion = lVersion;
|
|
resp.lResponse = LRESPONSE;
|
|
resp.lCode = lCode;
|
|
resp.ulSize = ulSize;
|
|
resp.ulSum = ulSum;
|
|
resp.ft_lastwrite.dwLowDateTime = dwLowTime;
|
|
resp.ft_lastwrite.dwHighDateTime = dwHighTime;
|
|
if (szFile != NULL) {
|
|
lstrcpy(resp.szFile, szFile);
|
|
}
|
|
return(ss_sendblock(hpipe, (PSTR) &resp, sizeof(resp)));
|
|
} /* ss_sendnewresp */
|
|
|
|
|
|
/* build and send a response packet to the client. Check for network
|
|
* errors, and retry (unless the pipe is broken) up to 10 times.
|
|
*
|
|
* if write succeeds - return TRUE.
|
|
* if failure - return FALSE to indicate connection is dropped.
|
|
*/
|
|
BOOL
|
|
ss_sendresponse(HANDLE hpipe, long lCode, ULONG ulSize, ULONG ulSum, PSTR szFile)
|
|
{
|
|
SSRESPONSE resp;
|
|
|
|
resp.lCode = lCode;
|
|
resp.ulSize = ulSize;
|
|
resp.ulSum = ulSum;
|
|
if (szFile != NULL) {
|
|
lstrcpy(resp.szFile, szFile);
|
|
}
|
|
|
|
return(ss_sendblock(hpipe, (PSTR) &resp, sizeof(resp)));
|
|
}
|
|
|
|
|
|
/*
|
|
* send a block of data or response packet to the named pipe.
|
|
*
|
|
* return TRUE if ok, or false if connection dropped
|
|
*/
|
|
BOOL
|
|
ss_sendblock(HANDLE hpipe, PSTR buffer, int length)
|
|
{
|
|
int size, count, errorcode;
|
|
|
|
/* loop retrying the send until it goes ok */
|
|
for (count = 0; count < 10; count++) {
|
|
|
|
#ifdef trace
|
|
{ char msg[80];
|
|
BLOCK * pb;
|
|
pb = (BLOCK *) buffer;
|
|
wsprintf( msg, "sendblock on %x: %x %x %x %x %x\n"
|
|
, hpipe, pb->dw[0], pb->dw[1], pb->dw[2], pb->dw[3], pb->dw[4]);
|
|
Trace_File(msg);
|
|
}
|
|
#endif
|
|
if (WriteFile(hpipe, buffer, length, (LPDWORD)(&size), NULL)) {
|
|
|
|
/* no error reported - was everything written?*/
|
|
if (size != length) {
|
|
#ifdef trace
|
|
{ char msg[80];
|
|
wsprintf(msg, " !!Bad length send for %x \n", hpipe);
|
|
Trace_File(msg);
|
|
}
|
|
#endif
|
|
|
|
/* write was NOT ok - report and retry */
|
|
printf("pipe write size differs for pipe %x\n", hpipe);
|
|
continue; // ??? will this confuse client
|
|
} else {
|
|
#ifdef trace
|
|
{ char msg[80];
|
|
wsprintf(msg, " good send for %x \n", hpipe);
|
|
Trace_File(msg);
|
|
}
|
|
#endif
|
|
/* all ok */
|
|
return(TRUE);
|
|
}
|
|
}
|
|
#ifdef trace
|
|
{ char msg[80];
|
|
wsprintf(msg, " !!Bad send for %x \n", hpipe);
|
|
Trace_File(msg);
|
|
}
|
|
#endif
|
|
|
|
/* an error occurred */
|
|
switch( (errorcode = (int)GetLastError())) {
|
|
|
|
case ERROR_NO_DATA:
|
|
case ERROR_BROKEN_PIPE:
|
|
/* pipe connection lost - forget it */
|
|
dprintf1(("pipe %x broken on write\n", hpipe));
|
|
return(FALSE);
|
|
|
|
default:
|
|
Log_Write(hlogErrors, "write error %d on pipe %x",
|
|
errorcode, hpipe);
|
|
break;
|
|
}
|
|
}
|
|
|
|
/* retry count reached - abandon this attempt */
|
|
Log_Write(hlogErrors,
|
|
"retry count reached on pipe %s - write error", hpipe);
|
|
return(FALSE);
|
|
}
|
|
|
|
|
|
/* read a message from a pipe, allowing for network errors
|
|
*
|
|
* if error occurs, retry up to 10 times unless error code
|
|
* indicates that pipe is broken - in which case, give up.
|
|
*
|
|
* return TRUE if all ok, or FALSE to mean the connection is broken,
|
|
* abort this client.
|
|
*/
|
|
BOOL
|
|
ss_readmessage(HANDLE hpipe, LPSTR buffer, int size)
|
|
{
|
|
int count;
|
|
int actualsize;
|
|
int errorcode;
|
|
|
|
/* retry up to 10 times */
|
|
for (count = 0; count < 10; count++ ) {
|
|
|
|
// dprintf1(("waiting for read of pipe %x ...\n", hpipe));
|
|
#ifdef trace
|
|
{ char msg[80];
|
|
wsprintf(msg, "ReadFile for pipe %x ...", hpipe );
|
|
Trace_File(msg);
|
|
}
|
|
#endif
|
|
if (ReadFile(hpipe, buffer, size, (LPDWORD)(&actualsize), NULL)) {
|
|
#ifdef trace
|
|
{ char msg[80];
|
|
BLOCK * pb;
|
|
pb = (BLOCK *) buffer;
|
|
wsprintf(msg, " Good ReadFile for %x: %x %x %x %x %x\n"
|
|
, hpipe, pb->dw[0], pb->dw[1], pb->dw[2], pb->dw[3], pb->dw[4]);
|
|
Trace_File(msg);
|
|
}
|
|
#endif
|
|
/* everything ok */
|
|
// dprintf1((" pipe %x read OK\n", hpipe));
|
|
return(TRUE);
|
|
}
|
|
#ifdef trace
|
|
{ char msg[80];
|
|
wsprintf(msg, "!!Bad ReadFile for %x\n", hpipe );
|
|
Trace_File(msg);
|
|
}
|
|
#endif
|
|
|
|
/* error occurred - check code */
|
|
switch((errorcode = (int)GetLastError())) {
|
|
|
|
case ERROR_BROKEN_PIPE:
|
|
/* connection broken. no point in retrying */
|
|
dprintf1(("pipe %x broken on read\n", hpipe));
|
|
return(FALSE);
|
|
|
|
case ERROR_MORE_DATA:
|
|
/* the message sent is larger than our buffer.
|
|
* this is an internal error - report it and carryon
|
|
*/
|
|
Log_Write(hlogErrors,
|
|
"error from pipe %x - message too large", hpipe);
|
|
return(TRUE);
|
|
|
|
default:
|
|
Log_Write(hlogErrors,
|
|
"pipe %x read error %d", hpipe, errorcode);
|
|
break;
|
|
}
|
|
}
|
|
Log_Write(hlogErrors, "retry count reached on pipe %x read error", hpipe);
|
|
return(FALSE);
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
* note a logon, and return a logon entry that should be removed at
|
|
* logoff time
|
|
*/
|
|
PCONNECT ss_logon(HANDLE hpipe)
|
|
{
|
|
PCONNECT pLogon;
|
|
SYSTEMTIME systime;
|
|
char msg[256];
|
|
|
|
|
|
EnterCriticalSection(&critsecConnects);
|
|
pLogon = List_NewLast(listConnects, sizeof(CONNECT));
|
|
LeaveCriticalSection(&critsecConnects);
|
|
|
|
|
|
GetSystemTime(&systime);
|
|
SystemTimeToFileTime(&systime, &pLogon->ftLogon);
|
|
GetNamedPipeHandleState(
|
|
hpipe,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
NULL,
|
|
pLogon->Username,
|
|
sizeof(pLogon->Username));
|
|
|
|
/* log the connect event in the main log*/
|
|
wsprintf(msg, "%s connected", pLogon->Username);
|
|
Log_WriteData(hlogEvents, &pLogon->ftLogon, msg);
|
|
|
|
return(pLogon);
|
|
}
|
|
|
|
|
|
/*
|
|
* remove a current connection from the connections list
|
|
*/
|
|
VOID ss_logoff(PCONNECT pLogon)
|
|
{
|
|
/* note the logoff event in the main log */
|
|
Log_Write(hlogEvents, "%s connection terminated", pLogon->Username);
|
|
|
|
/* remove the entry from the list */
|
|
EnterCriticalSection(&critsecConnects);
|
|
List_Delete(pLogon);
|
|
LeaveCriticalSection(&critsecConnects);
|
|
|
|
}
|
|
|
|
/*
|
|
* send the current-connections log
|
|
*
|
|
* Current connections are held on a list - we need to build a standard
|
|
* log from the current list and then send that.
|
|
*/
|
|
VOID ss_sendconnects(HANDLE hpipe)
|
|
{
|
|
HLOG hlog;
|
|
PCONNECT pconn;
|
|
|
|
hlog = Log_Create();
|
|
|
|
EnterCriticalSection(&critsecConnects);
|
|
|
|
List_TRAVERSE(listConnects, pconn) {
|
|
|
|
Log_WriteData(hlog, &pconn->ftLogon, pconn->Username);
|
|
}
|
|
|
|
LeaveCriticalSection(&critsecConnects);
|
|
|
|
Log_Send(hpipe, hlog);
|
|
|
|
Log_Delete(hlog);
|
|
}
|
|
|
|
|