wined3d: Pass a wined3d_device_context to wined3d_cs_emit_blt_sub_resource().
[wine/zf.git] / dlls / secur32 / dispatcher.c
blob0871576848e7df44e5c2e2a1af2a59cba59f3db6
1 /*
2 * Copyright 2005, 2006 Kai Blin
4 * This library is free software; you can redistribute it and/or
5 * modify it under the terms of the GNU Lesser General Public
6 * License as published by the Free Software Foundation; either
7 * version 2.1 of the License, or (at your option) any later version.
9 * This library is distributed in the hope that it will be useful,
10 * but WITHOUT ANY WARRANTY; without even the implied warranty of
11 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
12 * Lesser General Public License for more details.
14 * You should have received a copy of the GNU Lesser General Public
15 * License along with this library; if not, write to the Free Software
16 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
18 * A dispatcher to run ntlm_auth for wine's sspi module.
21 #include "config.h"
22 #include "wine/port.h"
23 #include <stdarg.h>
24 #include <stdio.h>
25 #ifdef HAVE_UNISTD_H
26 #include <unistd.h>
27 #endif
28 #include <sys/types.h>
29 #ifdef HAVE_SYS_WAIT_H
30 #include <sys/wait.h>
31 #endif
32 #include <errno.h>
33 #include <stdlib.h>
34 #include <fcntl.h>
35 #include "windef.h"
36 #include "winbase.h"
37 #include "winerror.h"
38 #include "sspi.h"
39 #include "secur32_priv.h"
40 #include "wine/debug.h"
42 #define INITIAL_BUFFER_SIZE 200
44 WINE_DEFAULT_DEBUG_CHANNEL(ntlm);
46 SECURITY_STATUS fork_helper(PNegoHelper *new_helper, const char *prog,
47 char* const argv[])
49 #ifdef HAVE_FORK
50 int pipe_in[2];
51 int pipe_out[2];
52 int i;
53 PNegoHelper helper;
55 TRACE("%s ", debugstr_a(prog));
56 for(i = 0; argv[i] != NULL; ++i)
58 TRACE("%s ", debugstr_a(argv[i]));
60 TRACE("\n");
62 #ifdef HAVE_PIPE2
63 if (pipe2( pipe_in, O_CLOEXEC ) < 0 )
64 #endif
66 if( pipe(pipe_in) < 0 ) return SEC_E_INTERNAL_ERROR;
67 fcntl( pipe_in[0], F_SETFD, FD_CLOEXEC );
68 fcntl( pipe_in[1], F_SETFD, FD_CLOEXEC );
70 #ifdef HAVE_PIPE2
71 if (pipe2( pipe_out, O_CLOEXEC ) < 0 )
72 #endif
74 if( pipe(pipe_out) < 0 )
76 close(pipe_in[0]);
77 close(pipe_in[1]);
78 return SEC_E_INTERNAL_ERROR;
80 fcntl( pipe_out[0], F_SETFD, FD_CLOEXEC );
81 fcntl( pipe_out[1], F_SETFD, FD_CLOEXEC );
84 if (!(helper = heap_alloc( sizeof(NegoHelper) )))
86 close(pipe_in[0]);
87 close(pipe_in[1]);
88 close(pipe_out[0]);
89 close(pipe_out[1]);
90 return SEC_E_INSUFFICIENT_MEMORY;
93 helper->helper_pid = fork();
95 if(helper->helper_pid == -1)
97 close(pipe_in[0]);
98 close(pipe_in[1]);
99 close(pipe_out[0]);
100 close(pipe_out[1]);
101 heap_free( helper );
102 return SEC_E_INTERNAL_ERROR;
105 if(helper->helper_pid == 0)
107 /* We're in the child now */
108 dup2(pipe_out[0], 0);
109 close(pipe_out[0]);
110 close(pipe_out[1]);
112 dup2(pipe_in[1], 1);
113 close(pipe_in[0]);
114 close(pipe_in[1]);
116 execvp(prog, argv);
118 /* Whoops, we shouldn't get here. Big badaboom.*/
119 write(STDOUT_FILENO, "BH\n", 3);
120 _exit(1);
122 else
124 *new_helper = helper;
125 helper->major = helper->minor = helper->micro = -1;
126 helper->com_buf = NULL;
127 helper->com_buf_size = 0;
128 helper->com_buf_offset = 0;
129 helper->session_key = NULL;
130 helper->neg_flags = 0;
131 helper->crypt.ntlm.a4i = NULL;
132 helper->crypt.ntlm2.send_a4i = NULL;
133 helper->crypt.ntlm2.recv_a4i = NULL;
134 helper->crypt.ntlm2.send_sign_key = NULL;
135 helper->crypt.ntlm2.send_seal_key = NULL;
136 helper->crypt.ntlm2.recv_sign_key = NULL;
137 helper->crypt.ntlm2.recv_seal_key = NULL;
138 helper->pipe_in = pipe_in[0];
139 close(pipe_in[1]);
140 helper->pipe_out = pipe_out[1];
141 close(pipe_out[0]);
144 return SEC_E_OK;
145 #else
146 ERR( "no fork support on this platform\n" );
147 return SEC_E_INTERNAL_ERROR;
148 #endif
151 static SECURITY_STATUS read_line(PNegoHelper helper, int *offset_len)
153 char *newline;
154 int read_size;
156 if(helper->com_buf == NULL)
158 TRACE("Creating a new buffer for the helper\n");
159 if (!(helper->com_buf = heap_alloc(INITIAL_BUFFER_SIZE)))
160 return SEC_E_INSUFFICIENT_MEMORY;
162 /* Created a new buffer, size is INITIAL_BUFFER_SIZE, offset is 0 */
163 helper->com_buf_size = INITIAL_BUFFER_SIZE;
164 helper->com_buf_offset = 0;
169 TRACE("offset = %d, size = %d\n", helper->com_buf_offset, helper->com_buf_size);
170 if(helper->com_buf_offset + INITIAL_BUFFER_SIZE > helper->com_buf_size)
172 /* increment buffer size in INITIAL_BUFFER_SIZE steps */
173 char *buf = heap_realloc(helper->com_buf, helper->com_buf_size + INITIAL_BUFFER_SIZE);
174 TRACE("Resizing buffer!\n");
175 if (!buf) return SEC_E_INSUFFICIENT_MEMORY;
176 helper->com_buf_size += INITIAL_BUFFER_SIZE;
177 helper->com_buf = buf;
179 if((read_size = read(helper->pipe_in, helper->com_buf + helper->com_buf_offset,
180 helper->com_buf_size - helper->com_buf_offset)) <= 0)
182 return SEC_E_INTERNAL_ERROR;
185 TRACE("read_size = %d, read: %s\n", read_size,
186 debugstr_a(helper->com_buf + helper->com_buf_offset));
187 helper->com_buf_offset += read_size;
188 newline = memchr(helper->com_buf, '\n', helper->com_buf_offset);
189 }while(newline == NULL);
191 /* Now, if there's a newline character, and we read more than that newline,
192 * we have to store the offset so we can preserve the additional data.*/
193 if( newline != helper->com_buf + helper->com_buf_offset)
195 TRACE("offset_len is calculated from %p - %p\n",
196 (helper->com_buf + helper->com_buf_offset), newline+1);
197 /* the length of the offset is the number of chars after the newline */
198 *offset_len = (helper->com_buf + helper->com_buf_offset) - (newline + 1);
200 else
202 *offset_len = 0;
205 *newline = '\0';
207 return SEC_E_OK;
210 static SECURITY_STATUS preserve_unused(PNegoHelper helper, int offset_len)
212 TRACE("offset_len = %d\n", offset_len);
214 if(offset_len > 0)
216 memmove(helper->com_buf, helper->com_buf + helper->com_buf_offset,
217 offset_len);
218 helper->com_buf_offset = offset_len;
220 else
222 helper->com_buf_offset = 0;
225 TRACE("helper->com_buf_offset was set to: %d\n", helper->com_buf_offset);
226 return SEC_E_OK;
229 SECURITY_STATUS run_helper(PNegoHelper helper, char *buffer,
230 unsigned int max_buflen, int *buflen)
232 int offset_len;
233 SECURITY_STATUS sec_status = SEC_E_OK;
235 TRACE("In helper: sending %s\n", debugstr_a(buffer));
237 /* buffer + '\n' */
238 write(helper->pipe_out, buffer, lstrlenA(buffer));
239 write(helper->pipe_out, "\n", 1);
241 if((sec_status = read_line(helper, &offset_len)) != SEC_E_OK)
243 return sec_status;
246 TRACE("In helper: received %s\n", debugstr_a(helper->com_buf));
247 *buflen = lstrlenA(helper->com_buf);
249 if( *buflen > max_buflen)
251 ERR("Buffer size too small(%d given, %d required) dropping data!\n",
252 max_buflen, *buflen);
253 return SEC_E_BUFFER_TOO_SMALL;
256 if( *buflen < 2 )
258 return SEC_E_ILLEGAL_MESSAGE;
261 /* We only get ERR if the input size is too big. On a GENSEC error,
262 * ntlm_auth will return BH */
263 if(strncmp(helper->com_buf, "ERR", 3) == 0)
265 return SEC_E_INVALID_TOKEN;
268 memcpy(buffer, helper->com_buf, *buflen+1);
270 sec_status = preserve_unused(helper, offset_len);
272 return sec_status;
275 void cleanup_helper(PNegoHelper helper)
278 TRACE("Killing helper %p\n", helper);
279 if(helper == NULL)
280 return;
282 heap_free(helper->com_buf);
283 heap_free(helper->session_key);
285 /* closing stdin will terminate ntlm_auth */
286 close(helper->pipe_out);
287 close(helper->pipe_in);
289 #ifdef HAVE_FORK
290 if (helper->helper_pid > 0) /* reap child */
292 pid_t wret;
293 do {
294 wret = waitpid(helper->helper_pid, NULL, 0);
295 } while (wret < 0 && errno == EINTR);
297 #endif
299 heap_free(helper);
302 void check_version(PNegoHelper helper)
304 char temp[80];
305 char *newline;
306 int major = 0, minor = 0, micro = 0, ret;
308 TRACE("Checking version of helper\n");
309 if(helper != NULL)
311 int len = read(helper->pipe_in, temp, sizeof(temp)-1);
312 if (len > 8)
314 if((newline = memchr(temp, '\n', len)) != NULL)
315 *newline = '\0';
316 else
317 temp[len] = 0;
319 TRACE("Exact version is %s\n", debugstr_a(temp));
320 ret = sscanf(temp, "Version %d.%d.%d", &major, &minor, &micro);
321 if(ret != 3)
323 ERR("Failed to get the helper version.\n");
324 helper->major = helper->minor = helper->micro = -1;
326 else
328 TRACE("Version recognized: %d.%d.%d\n", major, minor, micro);
329 helper->major = major;
330 helper->minor = minor;
331 helper->micro = micro;