Skip to content
Projects
Groups
Snippets
Help
This project
Loading...
Sign in / Register
Toggle navigation
W
wine-winehq
Project
Project
Details
Activity
Cycle Analytics
Repository
Repository
Files
Commits
Branches
Tags
Contributors
Graph
Compare
Charts
Issues
0
Issues
0
List
Board
Labels
Milestones
Merge Requests
0
Merge Requests
0
CI / CD
CI / CD
Pipelines
Jobs
Schedules
Charts
Registry
Registry
Wiki
Wiki
Snippets
Snippets
Members
Members
Collapse sidebar
Close sidebar
Activity
Graph
Charts
Create a new issue
Jobs
Commits
Issue Boards
Open sidebar
wine
wine-winehq
Commits
28d3bd3e
Commit
28d3bd3e
authored
Oct 26, 2006
by
Rob Shearman
Committed by
Alexandre Julliard
Oct 27, 2006
Browse files
Options
Browse Files
Download
Email Patches
Plain Diff
rpcrt4: Fix RPCRT4_Receive to accept authentication verifier data on any…
rpcrt4: Fix RPCRT4_Receive to accept authentication verifier data on any packets, not just bind packets.
parent
b1bfad06
Hide whitespace changes
Inline
Side-by-side
Showing
2 changed files
with
54 additions
and
8 deletions
+54
-8
rpc_defs.h
dlls/rpcrt4/rpc_defs.h
+3
-0
rpc_message.c
dlls/rpcrt4/rpc_message.c
+51
-8
No files found.
dlls/rpcrt4/rpc_defs.h
View file @
28d3bd3e
...
@@ -143,6 +143,9 @@ typedef struct
...
@@ -143,6 +143,9 @@ typedef struct
unsigned
long
auth_context_id
;
/* unique value for the authenticated connection */
unsigned
long
auth_context_id
;
/* unique value for the authenticated connection */
}
RpcAuthVerifier
;
}
RpcAuthVerifier
;
#define RPC_AUTH_VERIFIER_LEN(common_hdr) \
((common_hdr)->auth_len ? (common_hdr)->auth_len + sizeof(RpcAuthVerifier) : 0)
#define RPC_VER_MAJOR 5
#define RPC_VER_MAJOR 5
#define RPC_VER_MINOR 0
#define RPC_VER_MINOR 0
...
...
dlls/rpcrt4/rpc_message.c
View file @
28d3bd3e
...
@@ -475,7 +475,9 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
...
@@ -475,7 +475,9 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
unsigned
short
first_flag
;
unsigned
short
first_flag
;
unsigned
long
data_length
;
unsigned
long
data_length
;
unsigned
long
buffer_length
;
unsigned
long
buffer_length
;
unsigned
long
auth_length
;
unsigned
char
*
buffer_ptr
;
unsigned
char
*
buffer_ptr
;
unsigned
char
*
auth_data
=
NULL
;
RpcPktCommonHdr
common_hdr
;
RpcPktCommonHdr
common_hdr
;
*
Header
=
NULL
;
*
Header
=
NULL
;
...
@@ -525,7 +527,7 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
...
@@ -525,7 +527,7 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
pMsg
->
BufferLength
=
(
*
Header
)
->
request
.
alloc_hint
;
pMsg
->
BufferLength
=
(
*
Header
)
->
request
.
alloc_hint
;
break
;
break
;
default:
default:
pMsg
->
BufferLength
=
common_hdr
.
frag_len
-
hdr_length
;
pMsg
->
BufferLength
=
common_hdr
.
frag_len
-
hdr_length
-
RPC_AUTH_VERIFIER_LEN
(
&
common_hdr
)
;
}
}
TRACE
(
"buffer length = %u
\n
"
,
pMsg
->
BufferLength
);
TRACE
(
"buffer length = %u
\n
"
,
pMsg
->
BufferLength
);
...
@@ -534,11 +536,38 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
...
@@ -534,11 +536,38 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
if
(
status
!=
RPC_S_OK
)
goto
fail
;
if
(
status
!=
RPC_S_OK
)
goto
fail
;
first_flag
=
RPC_FLG_FIRST
;
first_flag
=
RPC_FLG_FIRST
;
auth_length
=
common_hdr
.
auth_len
;
if
(
auth_length
)
{
auth_data
=
HeapAlloc
(
GetProcessHeap
(),
0
,
RPC_AUTH_VERIFIER_LEN
(
&
common_hdr
));
if
(
!
auth_data
)
{
status
=
RPC_S_PROTOCOL_ERROR
;
goto
fail
;
}
}
buffer_length
=
0
;
buffer_length
=
0
;
buffer_ptr
=
pMsg
->
Buffer
;
buffer_ptr
=
pMsg
->
Buffer
;
while
(
buffer_length
<
pMsg
->
BufferLength
)
while
(
buffer_length
<
pMsg
->
BufferLength
)
{
{
data_length
=
(
*
Header
)
->
common
.
frag_len
-
hdr_length
;
unsigned
int
header_auth_len
=
RPC_AUTH_VERIFIER_LEN
(
&
(
*
Header
)
->
common
);
/* verify header fields */
if
(((
*
Header
)
->
common
.
frag_len
<
hdr_length
)
||
((
*
Header
)
->
common
.
frag_len
-
hdr_length
<
header_auth_len
))
{
WARN
(
"frag_len %d too small for hdr_length %ld and auth_len %d
\n
"
,
common_hdr
.
frag_len
,
hdr_length
,
common_hdr
.
auth_len
);
status
=
RPC_S_PROTOCOL_ERROR
;
goto
fail
;
}
if
((
*
Header
)
->
common
.
auth_len
!=
auth_length
)
{
WARN
(
"auth_len header field changed from %ld to %d
\n
"
,
auth_length
,
(
*
Header
)
->
common
.
auth_len
);
status
=
RPC_S_PROTOCOL_ERROR
;
goto
fail
;
}
data_length
=
(
*
Header
)
->
common
.
frag_len
-
hdr_length
-
header_auth_len
;
if
(((
*
Header
)
->
common
.
flags
&
RPC_FLG_FIRST
)
!=
first_flag
||
if
(((
*
Header
)
->
common
.
flags
&
RPC_FLG_FIRST
)
!=
first_flag
||
data_length
+
buffer_length
>
pMsg
->
BufferLength
)
{
data_length
+
buffer_length
>
pMsg
->
BufferLength
)
{
TRACE
(
"invalid packet flags or buffer length
\n
"
);
TRACE
(
"invalid packet flags or buffer length
\n
"
);
...
@@ -554,6 +583,21 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
...
@@ -554,6 +583,21 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
goto
fail
;
goto
fail
;
}
}
if
(
header_auth_len
)
{
/* FIXME: we should accumulate authentication data for the bind,
* bind_ack, alter_context and alter_context_response if necessary.
* however, the details of how this is done is very sketchy in the
* DCE/RPC spec. for all other packet types that have authentication
* verifier data then it is just duplicated in all the fragments */
dwRead
=
rpcrt4_conn_read
(
Connection
,
auth_data
,
header_auth_len
);
if
(
dwRead
!=
header_auth_len
)
{
WARN
(
"bad authentication data length, %ld/%d
\n
"
,
dwRead
,
header_auth_len
);
status
=
RPC_S_PROTOCOL_ERROR
;
goto
fail
;
}
}
/* when there is no more data left, it should be the last packet */
/* when there is no more data left, it should be the last packet */
if
(
buffer_length
==
pMsg
->
BufferLength
&&
if
(
buffer_length
==
pMsg
->
BufferLength
&&
((
*
Header
)
->
common
.
flags
&
RPC_FLG_LAST
)
==
0
)
{
((
*
Header
)
->
common
.
flags
&
RPC_FLG_LAST
)
==
0
)
{
...
@@ -580,13 +624,11 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
...
@@ -580,13 +624,11 @@ RPC_STATUS RPCRT4_Receive(RpcConnection *Connection, RpcPktHdr **Header,
}
}
/* respond to authorization request */
/* respond to authorization request */
if
(
common_hdr
.
ptype
==
PKT_BIND_ACK
&&
common_hdr
.
auth_len
>
8
)
if
(
common_hdr
.
ptype
==
PKT_BIND_ACK
&&
auth_length
>
sizeof
(
RpcAuthVerifier
)
)
{
{
unsigned
int
offset
;
status
=
RPCRT_AuthorizeConnection
(
Connection
,
auth_data
+
sizeof
(
RpcAuthVerifier
),
offset
=
common_hdr
.
frag_len
-
hdr_length
-
common_hdr
.
auth_len
;
auth_length
);
status
=
RPCRT_AuthorizeConnection
(
Connection
,
(
LPBYTE
)
pMsg
->
Buffer
+
offset
,
common_hdr
.
auth_len
);
if
(
status
)
if
(
status
)
goto
fail
;
goto
fail
;
}
}
...
@@ -599,6 +641,7 @@ fail:
...
@@ -599,6 +641,7 @@ fail:
RPCRT4_FreeHeader
(
*
Header
);
RPCRT4_FreeHeader
(
*
Header
);
*
Header
=
NULL
;
*
Header
=
NULL
;
}
}
HeapFree
(
GetProcessHeap
(),
0
,
auth_data
);
return
status
;
return
status
;
}
}
...
...
Write
Preview
Markdown
is supported
0%
Try again
or
attach a new file
Attach a file
Cancel
You are about to add
0
people
to the discussion. Proceed with caution.
Finish editing this message first!
Cancel
Please
register
or
sign in
to comment