3623 lines
92 KiB
C++
3623 lines
92 KiB
C++
#include "precomp.h"
|
||
|
||
|
||
//
|
||
// CONTROL.CPP
|
||
// Control by us, control of us
|
||
//
|
||
// Copyright(c) Microsoft 1997-
|
||
//
|
||
|
||
#define MLZ_FILE_ZONE ZONE_CORE
|
||
|
||
|
||
|
||
|
||
//
|
||
// CA_ReceivedPacket()
|
||
//
|
||
void ASShare::CA_ReceivedPacket
|
||
(
|
||
ASPerson * pasFrom,
|
||
PS20DATAPACKET pPacket
|
||
)
|
||
{
|
||
PCAPACKET pCAPacket;
|
||
|
||
DebugEntry(ASShare::CA_ReceivedPacket);
|
||
|
||
ValidatePerson(pasFrom);
|
||
|
||
pCAPacket = (PCAPACKET)pPacket;
|
||
|
||
switch (pCAPacket->msg)
|
||
{
|
||
case CA_MSG_NOTIFY_STATE:
|
||
if (pasFrom->cpcCaps.general.version < CAPS_VERSION_30)
|
||
{
|
||
ERROR_OUT(("Ignoring CA_MSG_NOTIFY_STATE from 2.x node [%d]",
|
||
pasFrom->mcsID));
|
||
}
|
||
else
|
||
{
|
||
CAHandleNewState(pasFrom, (PCANOTPACKET)pPacket);
|
||
}
|
||
break;
|
||
|
||
case CA_OLDMSG_DETACH:
|
||
case CA_OLDMSG_COOPERATE:
|
||
// Set "cooperating", and map it to allow/disallow control
|
||
CA2xCooperateChange(pasFrom, (pCAPacket->msg == CA_OLDMSG_COOPERATE));
|
||
break;
|
||
|
||
case CA_OLDMSG_REQUEST_CONTROL:
|
||
CA2xRequestControl(pasFrom, pCAPacket);
|
||
break;
|
||
|
||
case CA_OLDMSG_GRANTED_CONTROL:
|
||
CA2xGrantedControl(pasFrom, pCAPacket);
|
||
break;
|
||
|
||
default:
|
||
// Ignore for now -- old 2.x messages
|
||
break;
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CA_ReceivedPacket);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA30_ReceivedPacket()
|
||
//
|
||
void ASShare::CA30_ReceivedPacket
|
||
(
|
||
ASPerson * pasFrom,
|
||
PS20DATAPACKET pPacket
|
||
)
|
||
{
|
||
LPBYTE pCAPacket;
|
||
|
||
DebugEntry(ASShare::CA30_ReceivedPacket);
|
||
|
||
pCAPacket = (LPBYTE)pPacket + sizeof(CA30PACKETHEADER);
|
||
|
||
if (pasFrom->cpcCaps.general.version < CAPS_VERSION_30)
|
||
{
|
||
ERROR_OUT(("Ignoring CA30 packet %d from 2.x node [%d]",
|
||
((PCA30PACKETHEADER)pPacket)->msg, pasFrom->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
switch (((PCA30PACKETHEADER)pPacket)->msg)
|
||
{
|
||
// From VIEWER (remote) to HOST (us)
|
||
case CA_REQUEST_TAKECONTROL:
|
||
{
|
||
CAHandleRequestTakeControl(pasFrom, (PCA_RTC_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
// From HOST (remote) to VIEWER (us)
|
||
case CA_REPLY_REQUEST_TAKECONTROL:
|
||
{
|
||
CAHandleReplyRequestTakeControl(pasFrom, (PCA_REPLY_RTC_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
// From HOST (remote) to VIEWER (us)
|
||
case CA_REQUEST_GIVECONTROL:
|
||
{
|
||
CAHandleRequestGiveControl(pasFrom, (PCA_RGC_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
// From VIEWER (remote) to HOST (us)
|
||
case CA_REPLY_REQUEST_GIVECONTROL:
|
||
{
|
||
CAHandleReplyRequestGiveControl(pasFrom, (PCA_REPLY_RGC_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
// From CONTROLLER (remote) to HOST (us)
|
||
case CA_PREFER_PASSCONTROL:
|
||
{
|
||
CAHandlePreferPassControl(pasFrom, (PCA_PPC_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
|
||
|
||
// From CONTROLLER (remote) to HOST (us)
|
||
case CA_INFORM_RELEASEDCONTROL:
|
||
{
|
||
CAHandleInformReleasedControl(pasFrom, (PCA_INFORM_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
// From HOST (remote) to CONTROLLER (us)
|
||
case CA_INFORM_REVOKEDCONTROL:
|
||
{
|
||
CAHandleInformRevokedControl(pasFrom, (PCA_INFORM_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
// From HOST (remote) to CONTROLLER (us)
|
||
case CA_INFORM_PAUSEDCONTROL:
|
||
{
|
||
CAHandleInformPausedControl(pasFrom, (PCA_INFORM_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
// From HOST (remote) to CONTROLLER (us)
|
||
case CA_INFORM_UNPAUSEDCONTROL:
|
||
{
|
||
CAHandleInformUnpausedControl(pasFrom, (PCA_INFORM_PACKET)pCAPacket);
|
||
break;
|
||
}
|
||
|
||
default:
|
||
{
|
||
WARNING_OUT(("CA30_ReceivedPacket: unrecognized message %d",
|
||
((PCA30PACKETHEADER)pPacket)->msg));
|
||
break;
|
||
}
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA30_ReceivedPacket);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CANewRequestID()
|
||
//
|
||
// Returns a new token. It uses the current value, fills in the new one, and
|
||
// also returns the new one. We wrap around if necessary. ZERO is never
|
||
// valid. Note that this is a unique identifier only to us.
|
||
//
|
||
// It is a stamp for the control operation. Since you can't be controlling
|
||
// and controlled at the same time, we have one stamp for all ops.
|
||
//
|
||
UINT ASShare::CANewRequestID(void)
|
||
{
|
||
DebugEntry(ASShare::CANewRequestID);
|
||
|
||
++(m_pasLocal->m_caControlID);
|
||
if (m_pasLocal->m_caControlID == 0)
|
||
{
|
||
++(m_pasLocal->m_caControlID);
|
||
}
|
||
|
||
DebugExitDWORD(ASShare::CANewRequestID, m_pasLocal->m_caControlID);
|
||
return(m_pasLocal->m_caControlID);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_ViewStarting()
|
||
// Called when a REMOTE starts hosting
|
||
//
|
||
// We only do anything if it's a 2.x node since they could be cooperating
|
||
// but not hosting.
|
||
//
|
||
BOOL ASShare::CA_ViewStarting(ASPerson * pasPerson)
|
||
{
|
||
DebugEntry(ASShare::CA_ViewStarting);
|
||
|
||
//
|
||
// If this isn't a back level system, ignore it.
|
||
//
|
||
if (pasPerson->cpcCaps.general.version >= CAPS_VERSION_30)
|
||
{
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// See if AllowControl should now be on.
|
||
//
|
||
if (pasPerson->m_ca2xCooperating)
|
||
{
|
||
//
|
||
// Yes, it should. 2.x node is cooperating, now they are hosting,
|
||
// and we can take control of them.
|
||
//
|
||
ASSERT(!pasPerson->m_caAllowControl);
|
||
pasPerson->m_caAllowControl = TRUE;
|
||
VIEW_HostStateChange(pasPerson);
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitBOOL(ASShare::CA_ViewStarting, TRUE);
|
||
return(TRUE);
|
||
}
|
||
|
||
|
||
//
|
||
// CA_ViewEnded()
|
||
// Called when a REMOTE stopped hosting
|
||
//
|
||
void ASShare::CA_ViewEnded(ASPerson * pasPerson)
|
||
{
|
||
PCAREQUEST pRequest;
|
||
PCAREQUEST pNext;
|
||
|
||
DebugEntry(ASShare::CA_ViewEnded);
|
||
|
||
//
|
||
// Clear any control stuff we are a part of where they are the host
|
||
//
|
||
CA_ClearLocalState(CACLEAR_VIEW, pasPerson, FALSE);
|
||
|
||
//
|
||
// Clear any control stuff involving remotes
|
||
//
|
||
if (pasPerson->m_caControlledBy)
|
||
{
|
||
ASSERT(pasPerson->m_caControlledBy != m_pasLocal);
|
||
|
||
CAClearHostState(pasPerson, NULL);
|
||
ASSERT(!pasPerson->m_caControlledBy);
|
||
}
|
||
|
||
pasPerson->m_caAllowControl = FALSE;
|
||
|
||
//
|
||
// Clean up outstanding control packets to this person
|
||
//
|
||
pRequest = (PCAREQUEST)COM_BasedListFirst(&m_caQueuedMsgs, FIELD_OFFSET(CAREQUEST, chain));
|
||
while (pRequest)
|
||
{
|
||
pNext = (PCAREQUEST)COM_BasedListNext(&m_caQueuedMsgs, pRequest,
|
||
FIELD_OFFSET(CAREQUEST, chain));
|
||
|
||
if (pRequest->destID == pasPerson->mcsID)
|
||
{
|
||
if (pRequest->type == REQUEST_30)
|
||
{
|
||
//
|
||
// Delete messages sent by us to this person who is hosting
|
||
//
|
||
switch (pRequest->msg)
|
||
{
|
||
case CA_REQUEST_TAKECONTROL:
|
||
case CA_PREFER_PASSCONTROL:
|
||
case CA_REPLY_REQUEST_GIVECONTROL:
|
||
WARNING_OUT(("Deleting viewer control message %d, person [%d] stopped hosting",
|
||
pRequest->msg, pasPerson->mcsID));
|
||
COM_BasedListRemove(&pRequest->chain);
|
||
delete pRequest;
|
||
break;
|
||
}
|
||
}
|
||
else
|
||
{
|
||
ASSERT(pRequest->type == REQUEST_2X);
|
||
|
||
// Change GRANTED_CONTROL packets to this host to DETACH
|
||
if (pRequest->msg == CA_OLDMSG_GRANTED_CONTROL)
|
||
{
|
||
//
|
||
// For 2.x messages, destID is only non-zero when we are
|
||
// attempting to control a particular node. It allows us
|
||
// to undo/cancel control, to map our one-to-one model
|
||
// into the global 2.x collaboration model.
|
||
//
|
||
|
||
//
|
||
// Make this a DETACH, that way we don't have to worry if
|
||
// part of the COOPERATE/GRANTED_CONTROL sequence got out
|
||
// but part was left in the queue.
|
||
//
|
||
WARNING_OUT(("Changing GRANTED_CONTROL to 2.x host [%d] into DETATCH",
|
||
pasPerson->mcsID));
|
||
|
||
pRequest->destID = 0;
|
||
pRequest->msg = CA_OLDMSG_DETACH;
|
||
pRequest->req.req2x.data1 = 0;
|
||
pRequest->req.req2x.data2 = 0;
|
||
}
|
||
}
|
||
}
|
||
|
||
pRequest = pNext;
|
||
}
|
||
|
||
DebugExitVOID(ASView::CA_ViewEnded);
|
||
}
|
||
|
||
//
|
||
// CA_PartyLeftShare()
|
||
//
|
||
void ASShare::CA_PartyLeftShare(ASPerson * pasPerson)
|
||
{
|
||
DebugEntry(ASShare::CA_PartyLeftShare);
|
||
|
||
ValidatePerson(pasPerson);
|
||
|
||
//
|
||
// Clean up 2.x control stuff
|
||
//
|
||
if (pasPerson == m_ca2xControlTokenOwner)
|
||
{
|
||
m_ca2xControlTokenOwner = NULL;
|
||
}
|
||
|
||
//
|
||
// We must have cleaned up hosting info for this person already.
|
||
// So it can't be controlled or controllable.
|
||
//
|
||
ASSERT(!pasPerson->m_caAllowControl);
|
||
ASSERT(!pasPerson->m_caControlledBy);
|
||
|
||
if (pasPerson != m_pasLocal)
|
||
{
|
||
PCAREQUEST pRequest;
|
||
PCAREQUEST pNext;
|
||
|
||
//
|
||
// Clear any control stuff we are a part of where they are the
|
||
// viewer.
|
||
//
|
||
CA_ClearLocalState(CACLEAR_HOST, pasPerson, FALSE);
|
||
|
||
//
|
||
// Clear any control stuff involving remotes
|
||
//
|
||
if (pasPerson->m_caInControlOf)
|
||
{
|
||
ASSERT(pasPerson->m_caInControlOf != m_pasLocal);
|
||
CAClearHostState(pasPerson->m_caInControlOf, NULL);
|
||
}
|
||
|
||
//
|
||
// Clean up outgoing packets meant for this person.
|
||
//
|
||
pRequest = (PCAREQUEST)COM_BasedListFirst(&m_caQueuedMsgs, FIELD_OFFSET(CAREQUEST, chain));
|
||
while (pRequest)
|
||
{
|
||
pNext = (PCAREQUEST)COM_BasedListNext(&m_caQueuedMsgs, pRequest,
|
||
FIELD_OFFSET(CAREQUEST, chain));
|
||
|
||
//
|
||
// This doesn't need to know if it's a 2.x or 3.0 request,
|
||
// simply remove queued packets intended for somebody leaving.
|
||
//
|
||
// Only GRANTED_CONTROL requests will have non-zero destIDs of
|
||
// the 2.x packets.
|
||
//
|
||
if (pRequest->destID == pasPerson->mcsID)
|
||
{
|
||
WARNING_OUT(("Freeing outgoing RESPONSE to node [%d]", pasPerson->mcsID));
|
||
|
||
COM_BasedListRemove(&(pRequest->chain));
|
||
delete pRequest;
|
||
}
|
||
|
||
pRequest = pNext;
|
||
}
|
||
|
||
ASSERT(m_caWaitingForReplyFrom != pasPerson);
|
||
}
|
||
else
|
||
{
|
||
//
|
||
// When our waiting for/controlled dude stopped sharing, we should
|
||
// have cleaned this goop up.
|
||
//
|
||
ASSERT(!pasPerson->m_caInControlOf);
|
||
ASSERT(!pasPerson->m_caControlledBy);
|
||
ASSERT(!m_caWaitingForReplyFrom);
|
||
ASSERT(!m_caWaitingForReplyMsg);
|
||
|
||
//
|
||
// There should be NO outgoing control requests
|
||
//
|
||
ASSERT(COM_BasedListIsEmpty(&(m_caQueuedMsgs)));
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CA_PartyLeftShare);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_Periodic() -> SHARE STUFF
|
||
//
|
||
void ASShare::CA_Periodic(void)
|
||
{
|
||
DebugEntry(ASShare::CA_Periodic);
|
||
|
||
//
|
||
// Flush as many queued outgoing messages as we can
|
||
//
|
||
CAFlushOutgoingPackets();
|
||
|
||
DebugExitVOID(ASShare::CA_Periodic);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_SyncAlreadyHosting()
|
||
//
|
||
void ASHost::CA_SyncAlreadyHosting(void)
|
||
{
|
||
DebugEntry(ASHost::CA_SyncAlreadyHosting);
|
||
|
||
m_caRetrySendState = TRUE;
|
||
|
||
DebugExitVOID(ASHost::CA_SyncAlreadyHosting);
|
||
}
|
||
|
||
|
||
//
|
||
// CA_Periodic() -> HOSTING STUFF
|
||
//
|
||
void ASHost::CA_Periodic(void)
|
||
{
|
||
DebugEntry(ASHost::CA_Periodic);
|
||
|
||
if (m_caRetrySendState)
|
||
{
|
||
PCANOTPACKET pPacket;
|
||
#ifdef _DEBUG
|
||
UINT sentSize;
|
||
#endif // _DEBUG
|
||
|
||
pPacket = (PCANOTPACKET)m_pShare->SC_AllocPkt(PROT_STR_MISC, g_s20BroadcastID,
|
||
sizeof(*pPacket));
|
||
if (!pPacket)
|
||
{
|
||
WARNING_OUT(("CA_Periodic: couldn't broadcast new state"));
|
||
}
|
||
else
|
||
{
|
||
pPacket->header.data.dataType = DT_CA;
|
||
pPacket->msg = CA_MSG_NOTIFY_STATE;
|
||
|
||
pPacket->state = 0;
|
||
if (m_pShare->m_pasLocal->m_caAllowControl)
|
||
pPacket->state |= CASTATE_ALLOWCONTROL;
|
||
|
||
if (m_pShare->m_pasLocal->m_caControlledBy)
|
||
pPacket->controllerID = m_pShare->m_pasLocal->m_caControlledBy->mcsID;
|
||
else
|
||
pPacket->controllerID = 0;
|
||
|
||
#ifdef _DEBUG
|
||
sentSize =
|
||
#endif // _DEBUG
|
||
m_pShare->DCS_CompressAndSendPacket(PROT_STR_MISC, g_s20BroadcastID,
|
||
&(pPacket->header), sizeof(*pPacket));
|
||
|
||
m_caRetrySendState = FALSE;
|
||
}
|
||
}
|
||
|
||
DebugExitVOID(ASHost::CA_Periodic);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAFlushOutgoingPackets()
|
||
//
|
||
// This tries to send private packets (not broadcast notifications) that
|
||
// we have accumulated. It returns TRUE if the outgoing queue is empty.
|
||
//
|
||
BOOL ASShare::CAFlushOutgoingPackets(void)
|
||
{
|
||
BOOL fEmpty = TRUE;
|
||
PCAREQUEST pRequest;
|
||
|
||
//
|
||
// If we're hosting and haven't yet flushed the HET or CA state,
|
||
// force queueing.
|
||
//
|
||
if (m_hetRetrySendState || (m_pHost && m_pHost->m_caRetrySendState))
|
||
{
|
||
TRACE_OUT(("CAFlushOutgoingPackets: force queuing, pending HET/CA state broadcast"));
|
||
fEmpty = FALSE;
|
||
DC_QUIT;
|
||
}
|
||
|
||
while (pRequest = (PCAREQUEST)COM_BasedListFirst(&m_caQueuedMsgs,
|
||
FIELD_OFFSET(CAREQUEST, chain)))
|
||
{
|
||
//
|
||
// Allocate/send packet
|
||
//
|
||
if (pRequest->type == REQUEST_30)
|
||
{
|
||
if (!CASendPacket(pRequest->destID, pRequest->msg,
|
||
&pRequest->req.req30.packet))
|
||
{
|
||
WARNING_OUT(("CAFlushOutgoingPackets: couldn't send request"));
|
||
fEmpty = FALSE;
|
||
break;
|
||
}
|
||
}
|
||
else
|
||
{
|
||
ASSERT(pRequest->type == REQUEST_2X);
|
||
|
||
if (!CA2xSendMsg(pRequest->destID, pRequest->msg,
|
||
pRequest->req.req2x.data1, pRequest->req.req2x.data2))
|
||
{
|
||
WARNING_OUT(("CAFlushOutgoingmsgs: couldn't send request"));
|
||
fEmpty = FALSE;
|
||
break;
|
||
}
|
||
}
|
||
|
||
//
|
||
// Do we do state transitions here or when things are added to queue?
|
||
// requestID, results are calculated when put on queue. Results can
|
||
// change though based on a future action.
|
||
//
|
||
|
||
COM_BasedListRemove(&(pRequest->chain));
|
||
delete pRequest;
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitBOOL(CAFlushOutgoingPackets, fEmpty);
|
||
return(fEmpty);
|
||
}
|
||
|
||
|
||
//
|
||
// CASendPacket()
|
||
// This sends a private message (request or response) to the destination.
|
||
// If there are queued private messages in front of this one, or we can't
|
||
// send it, we add it to the pending queue.
|
||
//
|
||
// This TRUE if sent.
|
||
//
|
||
// It's up to the caller to change state info appropriately.
|
||
//
|
||
BOOL ASShare::CASendPacket
|
||
(
|
||
UINT_PTR destID,
|
||
UINT msg,
|
||
PCA30P pData
|
||
)
|
||
{
|
||
BOOL fSent = FALSE;
|
||
PCA30PACKETHEADER pPacket;
|
||
#ifdef _DEBUG
|
||
UINT sentSize;
|
||
#endif // _DEBUG
|
||
|
||
DebugEntry(ASShare::CASendPacket);
|
||
|
||
//
|
||
// Note that CA30P does not include size of header.
|
||
//
|
||
pPacket = (PCA30PACKETHEADER)SC_AllocPkt(PROT_STR_INPUT, destID,
|
||
sizeof(CA30PACKETHEADER) + sizeof(*pData));
|
||
if (!pPacket)
|
||
{
|
||
WARNING_OUT(("CASendPacket: no memory to send %d packet to [%d]",
|
||
msg, destID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
pPacket->header.data.dataType = DT_CA30;
|
||
pPacket->msg = msg;
|
||
memcpy(pPacket+1, pData, sizeof(*pData));
|
||
|
||
#ifdef _DEBUG
|
||
sentSize =
|
||
#endif // _DEBUG
|
||
DCS_CompressAndSendPacket(PROT_STR_INPUT, destID,
|
||
&(pPacket->header), sizeof(*pPacket));
|
||
TRACE_OUT(("CA30 request packet size: %08d, sent %08d", sizeof(*pPacket), sentSize));
|
||
|
||
fSent = TRUE;
|
||
|
||
DC_EXIT_POINT:
|
||
|
||
DebugExitBOOL(ASShare::CASendPacket, fSent);
|
||
return(fSent);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAQueueSendPacket()
|
||
// This flushes pending queued requests if there are any, then tries to
|
||
// send this one. If it can't, we add it to the queue. If there's not any
|
||
// memory even for that, we return an error about it.
|
||
//
|
||
BOOL ASShare::CAQueueSendPacket
|
||
(
|
||
UINT_PTR destID,
|
||
UINT msg,
|
||
PCA30P pPacketSend
|
||
)
|
||
{
|
||
BOOL rc = TRUE;
|
||
PCAREQUEST pCARequest;
|
||
|
||
DebugEntry(ASShare::CAQueueSendPacket);
|
||
|
||
//
|
||
// These must go out in order. So if any queued messages are still
|
||
// present, those must be sent first.
|
||
//
|
||
if (!CAFlushOutgoingPackets() ||
|
||
!CASendPacket(destID, msg, pPacketSend))
|
||
{
|
||
//
|
||
// We must queue this.
|
||
//
|
||
TRACE_OUT(("CAQueueSendPacket: queuing request for send later"));
|
||
|
||
pCARequest = new CAREQUEST;
|
||
if (!pCARequest)
|
||
{
|
||
ERROR_OUT(("CAQueueSendPacket: can't even allocate memory to queue request; must fail"));
|
||
rc = FALSE;
|
||
}
|
||
else
|
||
{
|
||
SET_STAMP(pCARequest, CAREQUEST);
|
||
|
||
pCARequest->type = REQUEST_30;
|
||
pCARequest->destID = destID;
|
||
pCARequest->msg = msg;
|
||
pCARequest->req.req30.packet = *pPacketSend;
|
||
|
||
//
|
||
// Stick this at the end of the queue
|
||
//
|
||
COM_BasedListInsertBefore(&(m_caQueuedMsgs), &(pCARequest->chain));
|
||
}
|
||
}
|
||
|
||
DebugExitBOOL(ASShare::CAQueueSendPacket, rc);
|
||
return(rc);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CALangToggle()
|
||
//
|
||
// This temporarily turns off the keyboard language toggle key, so that a
|
||
// remote controlling us doesn't inadvertently change it. When we stop being
|
||
// controlled, we put it back.
|
||
//
|
||
void ASShare::CALangToggle(BOOL fBackOn)
|
||
{
|
||
//
|
||
// Local Variables
|
||
//
|
||
LONG rc;
|
||
HKEY hkeyToggle;
|
||
BYTE regValue[2];
|
||
DWORD cbRegValue;
|
||
DWORD dwType;
|
||
LPCSTR szValue;
|
||
|
||
DebugEntry(ASShare::CALangToggle);
|
||
|
||
szValue = (g_asWin95) ? NULL : LANGUAGE_TOGGLE_KEY_VAL;
|
||
|
||
if (fBackOn)
|
||
{
|
||
//
|
||
// We are gaining control of our local keyboard again - we restore the
|
||
// language togging functionality.
|
||
//
|
||
// We must directly access the registry to accomplish this.
|
||
//
|
||
if (m_caToggle != LANGUAGE_TOGGLE_NOT_PRESENT)
|
||
{
|
||
rc = RegOpenKey(HKEY_CURRENT_USER, LANGUAGE_TOGGLE_KEY,
|
||
&hkeyToggle);
|
||
|
||
if (rc == ERROR_SUCCESS)
|
||
{
|
||
//
|
||
// Clear the value for this key.
|
||
//
|
||
regValue[0] = m_caToggle;
|
||
regValue[1] = '\0'; // ensure NUL termination
|
||
|
||
//
|
||
// Restore the value.
|
||
//
|
||
RegSetValueEx(hkeyToggle, szValue, 0, REG_SZ,
|
||
regValue, sizeof(regValue));
|
||
|
||
//
|
||
// We need to inform the system about this change. We do not
|
||
// tell any other apps about this (ie do not set any of the
|
||
// notification flags as the last parm)
|
||
//
|
||
SystemParametersInfo(SPI_SETLANGTOGGLE, 0, 0, 0);
|
||
}
|
||
|
||
RegCloseKey(hkeyToggle);
|
||
}
|
||
}
|
||
else
|
||
{
|
||
//
|
||
// We are losing control of our keyboard - ensure that remote key
|
||
// events will not change our local keyboard settings by disabling the
|
||
// keyboard language toggle.
|
||
//
|
||
// We must directly access the registry to accomplish this.
|
||
//
|
||
rc = RegOpenKey(HKEY_CURRENT_USER, LANGUAGE_TOGGLE_KEY,
|
||
&hkeyToggle);
|
||
|
||
if (rc == ERROR_SUCCESS)
|
||
{
|
||
cbRegValue = sizeof(regValue);
|
||
|
||
rc = RegQueryValueEx(hkeyToggle, szValue, NULL,
|
||
&dwType, regValue, &cbRegValue);
|
||
|
||
if (rc == ERROR_SUCCESS)
|
||
{
|
||
m_caToggle = regValue[0];
|
||
|
||
//
|
||
// Clear the value for this key.
|
||
//
|
||
regValue[0] = '3';
|
||
regValue[1] = '\0'; // ensure NUL termination
|
||
|
||
//
|
||
// Clear the value.
|
||
//
|
||
RegSetValueEx(hkeyToggle, szValue, 0, REG_SZ,
|
||
regValue, sizeof(regValue));
|
||
|
||
//
|
||
// We need to inform the system about this change. We do not
|
||
// tell any other apps about this (ie do not set any of the
|
||
// notification flags as the last parm)
|
||
//
|
||
SystemParametersInfo(SPI_SETLANGTOGGLE, 0, 0, 0);
|
||
}
|
||
else
|
||
{
|
||
m_caToggle = LANGUAGE_TOGGLE_NOT_PRESENT;
|
||
}
|
||
|
||
RegCloseKey(hkeyToggle);
|
||
}
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CALangToggle);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAStartControlled()
|
||
//
|
||
void ASShare::CAStartControlled
|
||
(
|
||
ASPerson * pasInControl,
|
||
UINT controlID
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAStartControlled);
|
||
|
||
ValidatePerson(pasInControl);
|
||
|
||
//
|
||
// Undo last known state of remote
|
||
//
|
||
CAClearRemoteState(pasInControl);
|
||
|
||
//
|
||
// Get any VIEW frame UI out of the way
|
||
//
|
||
SendMessage(g_asSession.hwndHostUI, HOST_MSG_CONTROLLED, TRUE, 0);
|
||
VIEWStartControlled(TRUE);
|
||
|
||
ASSERT(!m_pasLocal->m_caControlledBy);
|
||
m_pasLocal->m_caControlledBy = pasInControl;
|
||
|
||
ASSERT(!pasInControl->m_caInControlOf);
|
||
pasInControl->m_caInControlOf = m_pasLocal;
|
||
|
||
ASSERT(!pasInControl->m_caControlID);
|
||
ASSERT(controlID);
|
||
pasInControl->m_caControlID = controlID;
|
||
|
||
//
|
||
// Notify IM.
|
||
//
|
||
IM_Controlled(pasInControl);
|
||
|
||
//
|
||
// Disable language toggling.
|
||
//
|
||
CALangToggle(FALSE);
|
||
|
||
ASSERT(m_pHost);
|
||
m_pHost->CM_Controlled(pasInControl);
|
||
|
||
//
|
||
// Notify the UI. Pass GCCID of controller
|
||
//
|
||
DCS_NotifyUI(SH_EVT_STARTCONTROLLED, pasInControl->cpcCaps.share.gccID, 0);
|
||
|
||
//
|
||
// Broadcast new state
|
||
//
|
||
m_pHost->m_caRetrySendState = TRUE;
|
||
m_pHost->CA_Periodic();
|
||
|
||
DebugExitVOID(ASShare::CAStartControlled);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAStopControlled()
|
||
//
|
||
void ASShare::CAStopControlled(void)
|
||
{
|
||
ASPerson * pasControlledBy;
|
||
|
||
DebugEntry(ASShare::CAStopControlled);
|
||
|
||
pasControlledBy = m_pasLocal->m_caControlledBy;
|
||
ValidatePerson(pasControlledBy);
|
||
|
||
//
|
||
// If control is paused, unpause it.
|
||
//
|
||
if (m_pasLocal->m_caControlPaused)
|
||
{
|
||
CA_PauseControl(pasControlledBy, FALSE, FALSE);
|
||
}
|
||
|
||
m_pasLocal->m_caControlledBy = NULL;
|
||
|
||
ASSERT(pasControlledBy->m_caInControlOf == m_pasLocal);
|
||
pasControlledBy->m_caInControlOf = NULL;
|
||
|
||
ASSERT(pasControlledBy->m_caControlID);
|
||
pasControlledBy->m_caControlID = 0;
|
||
|
||
//
|
||
// Notify IM.
|
||
//
|
||
IM_Controlled(NULL);
|
||
|
||
//
|
||
// Restore language toggling functionality.
|
||
//
|
||
CALangToggle(TRUE);
|
||
|
||
ASSERT(m_pHost);
|
||
m_pHost->CM_Controlled(NULL);
|
||
|
||
VIEWStartControlled(FALSE);
|
||
ASSERT(IsWindow(g_asSession.hwndHostUI));
|
||
SendMessage(g_asSession.hwndHostUI, HOST_MSG_CONTROLLED, FALSE, 0);
|
||
|
||
|
||
//
|
||
// Notify the UI
|
||
//
|
||
DCS_NotifyUI(SH_EVT_STOPCONTROLLED, pasControlledBy->cpcCaps.share.gccID, 0);
|
||
|
||
//
|
||
// Broadcast the new state
|
||
//
|
||
m_pHost->m_caRetrySendState = TRUE;
|
||
m_pHost->CA_Periodic();
|
||
|
||
DebugExitVOID(ASShare::CAStopControlled);
|
||
}
|
||
|
||
|
||
//
|
||
// CAStartInControl()
|
||
//
|
||
void ASShare::CAStartInControl
|
||
(
|
||
ASPerson * pasControlled,
|
||
UINT controlID
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAStartInControl);
|
||
|
||
ValidatePerson(pasControlled);
|
||
|
||
//
|
||
// Undo last known state of host
|
||
//
|
||
CAClearRemoteState(pasControlled);
|
||
|
||
ASSERT(!m_pasLocal->m_caInControlOf);
|
||
m_pasLocal->m_caInControlOf = pasControlled;
|
||
|
||
ASSERT(!pasControlled->m_caControlledBy);
|
||
pasControlled->m_caControlledBy = m_pasLocal;
|
||
|
||
ASSERT(!pasControlled->m_caControlID);
|
||
ASSERT(controlID);
|
||
pasControlled->m_caControlID = controlID;
|
||
|
||
ASSERT(!g_lpimSharedData->imControlled);
|
||
IM_InControl(pasControlled);
|
||
|
||
VIEW_InControl(pasControlled, TRUE);
|
||
|
||
//
|
||
// Pass GCC ID of node we're controlling
|
||
//
|
||
DCS_NotifyUI(SH_EVT_STARTINCONTROL, pasControlled->cpcCaps.share.gccID, 0);
|
||
|
||
DebugExitVOID(ASShare::CAStartInControl);
|
||
}
|
||
|
||
|
||
//
|
||
// CAStopInControl()
|
||
//
|
||
void ASShare::CAStopInControl(void)
|
||
{
|
||
ASPerson * pasInControlOf;
|
||
|
||
DebugEntry(ASShare::CAStopInControl);
|
||
|
||
pasInControlOf = m_pasLocal->m_caInControlOf;
|
||
ValidatePerson(pasInControlOf);
|
||
|
||
if (pasInControlOf->m_caControlPaused)
|
||
{
|
||
pasInControlOf->m_caControlPaused = FALSE;
|
||
}
|
||
|
||
m_pasLocal->m_caInControlOf = NULL;
|
||
|
||
ASSERT(pasInControlOf->m_caControlledBy == m_pasLocal);
|
||
pasInControlOf->m_caControlledBy = NULL;
|
||
|
||
ASSERT(pasInControlOf->m_caControlID);
|
||
pasInControlOf->m_caControlID = 0;
|
||
|
||
ASSERT(!g_lpimSharedData->imControlled);
|
||
IM_InControl(NULL);
|
||
|
||
VIEW_InControl(pasInControlOf, FALSE);
|
||
|
||
DCS_NotifyUI(SH_EVT_STOPINCONTROL, pasInControlOf->cpcCaps.share.gccID, 0);
|
||
|
||
DebugExitVOID(ASShare::CAStopInControl);
|
||
}
|
||
|
||
|
||
//
|
||
// CA_AllowControl()
|
||
// Allows/disallows remotes from controlling us.
|
||
//
|
||
void ASShare::CA_AllowControl(BOOL fAllow)
|
||
{
|
||
DebugEntry(ASShare::CA_AllowControl);
|
||
|
||
if (!m_pHost)
|
||
{
|
||
WARNING_OUT(("CA_AllowControl: ignoring, we aren't hosting"));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (fAllow != m_pasLocal->m_caAllowControl)
|
||
{
|
||
if (!fAllow)
|
||
{
|
||
// Undo pending control/control queries/being controlled stuff
|
||
CA_ClearLocalState(CACLEAR_HOST, NULL, TRUE);
|
||
}
|
||
|
||
m_pasLocal->m_caAllowControl = fAllow;
|
||
|
||
ASSERT(IsWindow(g_asSession.hwndHostUI));
|
||
SendMessage(g_asSession.hwndHostUI, HOST_MSG_ALLOWCONTROL, fAllow, 0);
|
||
|
||
DCS_NotifyUI(SH_EVT_CONTROLLABLE, fAllow, 0);
|
||
|
||
m_pHost->m_caRetrySendState = TRUE;
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_AllowControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
|
||
//
|
||
// CA_HostEnded()
|
||
//
|
||
// When we stop hosting, we do not need to flush queued control
|
||
// responses. But we need to delete them!
|
||
//
|
||
void ASHost::CA_HostEnded(void)
|
||
{
|
||
PCAREQUEST pCARequest;
|
||
PCAREQUEST pCANext;
|
||
|
||
DebugEntry(ASHost::CA_HostEnded);
|
||
|
||
m_pShare->CA_ClearLocalState(CACLEAR_HOST, NULL, FALSE);
|
||
|
||
//
|
||
// Delete now obsolete messages originating from us as host.
|
||
//
|
||
pCARequest = (PCAREQUEST)COM_BasedListFirst(&m_pShare->m_caQueuedMsgs,
|
||
FIELD_OFFSET(CAREQUEST, chain));
|
||
while (pCARequest)
|
||
{
|
||
pCANext = (PCAREQUEST)COM_BasedListNext(&m_pShare->m_caQueuedMsgs, pCARequest,
|
||
FIELD_OFFSET(CAREQUEST, chain));
|
||
|
||
if (pCARequest->type == REQUEST_30)
|
||
{
|
||
switch (pCARequest->msg)
|
||
{
|
||
//
|
||
// Delete messages sent by us when we are hosting.
|
||
//
|
||
case CA_INFORM_PAUSEDCONTROL:
|
||
case CA_INFORM_UNPAUSEDCONTROL:
|
||
case CA_REPLY_REQUEST_TAKECONTROL:
|
||
case CA_REQUEST_GIVECONTROL:
|
||
WARNING_OUT(("Deleting host control message %d, we stopped hosting",
|
||
pCARequest->msg));
|
||
COM_BasedListRemove(&pCARequest->chain);
|
||
delete pCARequest;
|
||
break;
|
||
}
|
||
}
|
||
|
||
pCARequest = pCANext;
|
||
}
|
||
|
||
if (m_pShare->m_pasLocal->m_caAllowControl)
|
||
{
|
||
m_pShare->m_pasLocal->m_caAllowControl = FALSE;
|
||
|
||
ASSERT(IsWindow(g_asSession.hwndHostUI));
|
||
SendMessage(g_asSession.hwndHostUI, HOST_MSG_ALLOWCONTROL, FALSE, 0);
|
||
|
||
DCS_NotifyUI(SH_EVT_CONTROLLABLE, FALSE, 0);
|
||
}
|
||
|
||
DebugExitVOID(ASHost::CA_HostEnded);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_TakeControl()
|
||
//
|
||
// Called by viewer to ask to take control of host. Note parallels to
|
||
// CA_GiveControl(), which is called by host to get same result.
|
||
//
|
||
void ASShare::CA_TakeControl(ASPerson * pasHost)
|
||
{
|
||
DebugEntry(ASShare::CA_TakeControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
ASSERT(pasHost != m_pasLocal);
|
||
|
||
//
|
||
// If this person isn't hosting or controllable, fail.
|
||
//
|
||
if (!pasHost->m_pView)
|
||
{
|
||
WARNING_OUT(("CA_TakeControl: failing, person [%d] not hosting",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (!pasHost->m_caAllowControl)
|
||
{
|
||
WARNING_OUT(("CA_TakeControl: failing, host [%d] not controllable",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// Undo current state.
|
||
//
|
||
CA_ClearLocalState(CACLEAR_ALL, NULL, TRUE);
|
||
|
||
//
|
||
// Now take control.
|
||
//
|
||
if (pasHost->cpcCaps.general.version >= CAPS_VERSION_30)
|
||
{
|
||
//
|
||
// 3.0 host
|
||
//
|
||
CA30P packetSend;
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.rtc.viewerControlID = CANewRequestID();
|
||
|
||
if (CAQueueSendPacket(pasHost->mcsID, CA_REQUEST_TAKECONTROL, &packetSend))
|
||
{
|
||
//
|
||
// Now we're in waiting state.
|
||
//
|
||
CAStartWaiting(pasHost, CA_REPLY_REQUEST_TAKECONTROL);
|
||
VIEW_UpdateStatus(pasHost, IDS_STATUS_WAITINGFORCONTROL);
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("CA_TakeControl of [%d]: failing, out of memory", pasHost->mcsID));
|
||
}
|
||
}
|
||
else
|
||
{
|
||
CA2xTakeControl(pasHost);
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_TakeControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_CancelTakeControl()
|
||
//
|
||
void ASShare::CA_CancelTakeControl
|
||
(
|
||
ASPerson * pasHost,
|
||
BOOL fPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CA_CancelTakeControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
ASSERT(pasHost != m_pasLocal);
|
||
|
||
if ((m_caWaitingForReplyFrom != pasHost) ||
|
||
(m_caWaitingForReplyMsg != CA_REPLY_REQUEST_TAKECONTROL))
|
||
{
|
||
// We're not waiting for control of this host.
|
||
WARNING_OUT(("CA_CancelTakeControl failing; not waiting to take control of [%d]",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ASSERT(pasHost->cpcCaps.general.version >= CAPS_VERSION_30);
|
||
ASSERT(pasHost->m_caControlID == 0);
|
||
|
||
if (fPacket)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.inform.viewerControlID = m_pasLocal->m_caControlID;
|
||
packetSend.inform.hostControlID = pasHost->m_caControlID;
|
||
|
||
if (!CAQueueSendPacket(pasHost->mcsID, CA_INFORM_RELEASEDCONTROL,
|
||
&packetSend))
|
||
{
|
||
WARNING_OUT(("Couldn't tell node [%d] we're no longer waiting for control",
|
||
pasHost->mcsID));
|
||
}
|
||
}
|
||
|
||
m_caWaitingForReplyFrom = NULL;
|
||
m_caWaitingForReplyMsg = 0;
|
||
|
||
VIEW_UpdateStatus(pasHost, IDS_STATUS_NONE);
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_CancelTakeControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_ReleaseControl()
|
||
//
|
||
void ASShare::CA_ReleaseControl
|
||
(
|
||
ASPerson * pasHost,
|
||
BOOL fPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CA_ReleaseControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
ASSERT(pasHost != m_pasLocal);
|
||
|
||
if (pasHost->m_caControlledBy != m_pasLocal)
|
||
{
|
||
// We're not in control of this dude, nothing to do.
|
||
WARNING_OUT(("CA_ReleaseControl failing; not in control of [%d]",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ASSERT(!m_caWaitingForReplyFrom);
|
||
ASSERT(!m_caWaitingForReplyMsg);
|
||
|
||
if (fPacket)
|
||
{
|
||
if (pasHost->cpcCaps.general.version >= CAPS_VERSION_30)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.inform.viewerControlID = m_pasLocal->m_caControlID;
|
||
packetSend.inform.hostControlID = pasHost->m_caControlID;
|
||
|
||
if (!CAQueueSendPacket(pasHost->mcsID, CA_INFORM_RELEASEDCONTROL,
|
||
&packetSend))
|
||
{
|
||
WARNING_OUT(("Couldn't tell node [%d] they're no longer controlled",
|
||
pasHost->mcsID));
|
||
}
|
||
}
|
||
else
|
||
{
|
||
if (!CA2xQueueSendMsg(0, CA_OLDMSG_DETACH, 0, 0))
|
||
{
|
||
WARNING_OUT(("Couldn't tell 2.x node [%d] they're no longer controlled",
|
||
pasHost->mcsID));
|
||
}
|
||
}
|
||
}
|
||
|
||
CAStopInControl();
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_ReleaseControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_PassControl()
|
||
//
|
||
void ASShare::CA_PassControl(ASPerson * pasHost, ASPerson * pasViewer)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
DebugEntry(ASShare::CA_PassControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
ValidatePerson(pasViewer);
|
||
ASSERT(pasHost != pasViewer);
|
||
ASSERT(pasHost != m_pasLocal);
|
||
ASSERT(pasViewer != m_pasLocal);
|
||
|
||
if (pasHost->m_caControlledBy != m_pasLocal)
|
||
{
|
||
WARNING_OUT(("CA_PassControl: failing, we're not in control of [%d]",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ASSERT(!m_caWaitingForReplyFrom);
|
||
ASSERT(!m_caWaitingForReplyMsg);
|
||
|
||
//
|
||
// No 2.x nodes, neither host nor controller, allowed
|
||
//
|
||
if ((pasHost->cpcCaps.general.version < CAPS_VERSION_30) ||
|
||
(pasViewer->cpcCaps.general.version < CAPS_VERSION_30))
|
||
{
|
||
WARNING_OUT(("CA_PassControl: failing, we can't pass control with 2.x nodes"));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.ppc.viewerControlID = m_pasLocal->m_caControlID;
|
||
packetSend.ppc.hostControlID = pasHost->m_caControlID;
|
||
packetSend.ppc.mcsPassTo = pasViewer->mcsID;
|
||
|
||
if (CAQueueSendPacket(pasHost->mcsID, CA_PREFER_PASSCONTROL, &packetSend))
|
||
{
|
||
CAStopInControl();
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("Couldn't tell node [%d] we want them to pass control to [%d]",
|
||
pasHost->mcsID, pasViewer->mcsID));
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_PassControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CA_GiveControl()
|
||
//
|
||
// Called by host to ask to grant control to viewer. Note parallels to
|
||
// CA_TakeControl(), which is called by viewer to get same result.
|
||
//
|
||
void ASShare::CA_GiveControl(ASPerson * pasTo)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
DebugEntry(ASShare::CA_GiveControl);
|
||
|
||
ValidatePerson(pasTo);
|
||
ASSERT(pasTo != m_pasLocal);
|
||
|
||
//
|
||
// If we aren't hosting or controllable, fail.
|
||
//
|
||
if (!m_pHost)
|
||
{
|
||
WARNING_OUT(("CA_GiveControl: failing, we're not hosting"));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (!m_pasLocal->m_caAllowControl)
|
||
{
|
||
WARNING_OUT(("CA_GiveControl: failing, we're not controllable"));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pasTo->cpcCaps.general.version < CAPS_VERSION_30)
|
||
{
|
||
//
|
||
// Can't do this with 2.x node.
|
||
//
|
||
WARNING_OUT(("CA_GiveControl: failing, can't invite 2.x node [%d]",
|
||
pasTo->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// Undo our control state.
|
||
//
|
||
CA_ClearLocalState(CACLEAR_ALL, NULL, TRUE);
|
||
|
||
//
|
||
// Now invite control.
|
||
//
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.rgc.hostControlID = CANewRequestID();
|
||
packetSend.rgc.mcsPassFrom = 0;
|
||
|
||
if (CAQueueSendPacket(pasTo->mcsID, CA_REQUEST_GIVECONTROL, &packetSend))
|
||
{
|
||
//
|
||
// Now we're in waiting state.
|
||
//
|
||
CAStartWaiting(pasTo, CA_REPLY_REQUEST_GIVECONTROL);
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("CA_GiveControl of [%d]: failing, out of memory", pasTo->mcsID));
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_GiveControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_CancelGiveControl()
|
||
// Cancels an invite TAKE or PASS request.
|
||
//
|
||
void ASShare::CA_CancelGiveControl
|
||
(
|
||
ASPerson * pasTo,
|
||
BOOL fPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CA_CancelGiveControl);
|
||
|
||
ValidatePerson(pasTo);
|
||
ASSERT(pasTo != m_pasLocal);
|
||
|
||
//
|
||
// Have we invited this person, and are we now waiting for a response?
|
||
//
|
||
if ((m_caWaitingForReplyFrom != pasTo) ||
|
||
(m_caWaitingForReplyMsg != CA_REPLY_REQUEST_GIVECONTROL))
|
||
{
|
||
// We're not waiting to be controlled by this viewer.
|
||
WARNING_OUT(("CA_CancelGiveControl failing; not waiting to give control to [%d]",
|
||
pasTo->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ASSERT(pasTo->cpcCaps.general.version >= CAPS_VERSION_30);
|
||
ASSERT(!pasTo->m_caControlID);
|
||
|
||
if (fPacket)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.inform.viewerControlID = pasTo->m_caControlID;
|
||
packetSend.inform.hostControlID = m_pasLocal->m_caControlID;
|
||
|
||
if (!CAQueueSendPacket(pasTo->mcsID, CA_INFORM_REVOKEDCONTROL,
|
||
&packetSend))
|
||
{
|
||
WARNING_OUT(("Couldn't tell node [%d] they're no longer invited to control us",
|
||
pasTo->mcsID));
|
||
}
|
||
}
|
||
|
||
m_caWaitingForReplyFrom = NULL;
|
||
m_caWaitingForReplyMsg = 0;
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_CancelGiveControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CA_RevokeControl()
|
||
// Takes control back. If we're cleaning up (we've stopped hosting or
|
||
//
|
||
//
|
||
void ASShare::CA_RevokeControl
|
||
(
|
||
ASPerson * pasInControl,
|
||
BOOL fPacket
|
||
)
|
||
{
|
||
CA30P packetSend;
|
||
PCAREQUEST pRequest;
|
||
|
||
DebugEntry(ASShare::CA_RevokeControl);
|
||
|
||
//
|
||
// If the response to pasController is still queued, simply delete it.
|
||
// There should NOT be any CARESULT_CONFIRMED responses left.
|
||
//
|
||
// Otherwise, if it wasn't found, we must send a packet.
|
||
//
|
||
ValidatePerson(pasInControl);
|
||
ASSERT(pasInControl != m_pasLocal);
|
||
|
||
if (pasInControl != m_pasLocal->m_caControlledBy)
|
||
{
|
||
WARNING_OUT(("CA_RevokeControl: node [%d] not in control of us",
|
||
pasInControl->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// Take control back if we're being controlled
|
||
//
|
||
if (fPacket)
|
||
{
|
||
//
|
||
// Regardless of whether we can queue or not, we get control back!
|
||
// Note that we use the controller's request ID, so he knows if
|
||
// this is still applicable.
|
||
//
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.inform.viewerControlID = pasInControl->m_caControlID;
|
||
packetSend.inform.hostControlID = m_pasLocal->m_caControlID;
|
||
|
||
if (!CAQueueSendPacket(pasInControl->mcsID, CA_INFORM_REVOKEDCONTROL,
|
||
&packetSend))
|
||
|
||
{
|
||
WARNING_OUT(("Couldn't tell node [%d] they're no longer in control",
|
||
pasInControl->mcsID));
|
||
}
|
||
}
|
||
|
||
CAStopControlled();
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_RevokeControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CA_PauseControl()
|
||
//
|
||
void ASShare::CA_PauseControl
|
||
(
|
||
ASPerson * pasControlledBy,
|
||
BOOL fPause,
|
||
BOOL fPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CA_PauseControl);
|
||
|
||
ValidatePerson(pasControlledBy);
|
||
ASSERT(pasControlledBy != m_pasLocal);
|
||
|
||
//
|
||
// If we aren't a controlled host, this doesn't do anything.
|
||
//
|
||
if (pasControlledBy != m_pasLocal->m_caControlledBy)
|
||
{
|
||
WARNING_OUT(("CA_PauseControl failing; not controlled by [%d]", pasControlledBy->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ASSERT(m_pHost);
|
||
ASSERT(m_pasLocal->m_caAllowControl);
|
||
|
||
if (m_pasLocal->m_caControlPaused == (fPause != FALSE))
|
||
{
|
||
WARNING_OUT(("CA_PauseControl failing; already in requested state"));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (fPacket)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.inform.viewerControlID = m_pasLocal->m_caControlledBy->m_caControlID;
|
||
packetSend.inform.hostControlID = m_pasLocal->m_caControlID;
|
||
|
||
if (!CAQueueSendPacket(m_pasLocal->m_caControlledBy->mcsID,
|
||
(fPause ? CA_INFORM_PAUSEDCONTROL : CA_INFORM_UNPAUSEDCONTROL),
|
||
&packetSend))
|
||
{
|
||
WARNING_OUT(("CA_PauseControl: out of memory, can't notify [%d]",
|
||
m_pasLocal->m_caControlledBy->mcsID));
|
||
}
|
||
}
|
||
|
||
// Do pause
|
||
m_pasLocal->m_caControlPaused = (fPause != FALSE);
|
||
g_lpimSharedData->imPaused = (fPause != FALSE);
|
||
|
||
DCS_NotifyUI((fPause ? SH_EVT_PAUSEDCONTROLLED : SH_EVT_UNPAUSEDCONTROLLED),
|
||
pasControlledBy->cpcCaps.share.gccID, 0);
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA_PauseControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAHandleRequestTakeControl()
|
||
// WE are HOST, REMOTE is VIEWER
|
||
// Handles incoming take control request. If our state is good, we accept.
|
||
//
|
||
void ASShare::CAHandleRequestTakeControl
|
||
(
|
||
ASPerson * pasViewer,
|
||
PCA_RTC_PACKET pPacketRecv
|
||
)
|
||
{
|
||
UINT result = CARESULT_CONFIRMED;
|
||
|
||
DebugEntry(ASShare::CAHandleRequestTakeControl);
|
||
|
||
ValidatePerson(pasViewer);
|
||
|
||
//
|
||
// If we aren't hosting, or haven't turned allow control on, we're
|
||
// not controllable.
|
||
//
|
||
if (!m_pHost || !m_pasLocal->m_caAllowControl)
|
||
{
|
||
result = CARESULT_DENIED_WRONGSTATE;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
//
|
||
// Are we doing something else right now? Waiting to hear back about
|
||
// something?
|
||
//
|
||
|
||
if (m_caWaitingForReplyFrom)
|
||
{
|
||
result = CARESULT_DENIED_BUSY;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
if (m_caQueryDlg)
|
||
{
|
||
result = CARESULT_DENIED_BUSY;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
//
|
||
// LAURABU TEMPORARY:
|
||
// In a bit, if we're controlled when a new control request comes in,
|
||
// pause control then allow host to handle it.
|
||
//
|
||
if (m_pasLocal->m_caControlledBy)
|
||
{
|
||
result = CARESULT_DENIED_BUSY;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
|
||
//
|
||
// Try to put up query dialog
|
||
//
|
||
if (!CAStartQuery(pasViewer, CA_REQUEST_TAKECONTROL, (PCA30P)pPacketRecv))
|
||
{
|
||
result = CARESULT_DENIED;
|
||
}
|
||
|
||
RESPOND_PACKET:
|
||
if (result != CARESULT_CONFIRMED)
|
||
{
|
||
// Instant failure.
|
||
CACompleteRequestTakeControl(pasViewer, pPacketRecv, result);
|
||
}
|
||
else
|
||
{
|
||
//
|
||
// We're in a waiting state. CACompleteRequestTakeControl() will
|
||
// complete later or the request will just go away.
|
||
//
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CAHandleRequestTakeControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CACompleteRequestTakeControl()
|
||
// WE are HOST, REMOTE is VIEWER
|
||
// Completes the take control request.
|
||
//
|
||
void ASShare::CACompleteRequestTakeControl
|
||
(
|
||
ASPerson * pasFrom,
|
||
PCA_RTC_PACKET pPacketRecv,
|
||
UINT result
|
||
)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
DebugEntry(ASShare::CACompleteRequestTakeControl);
|
||
|
||
ValidatePerson(pasFrom);
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.rrtc.viewerControlID = pPacketRecv->viewerControlID;
|
||
packetSend.rrtc.result = result;
|
||
|
||
if (result == CARESULT_CONFIRMED)
|
||
{
|
||
packetSend.rrtc.hostControlID = CANewRequestID();
|
||
}
|
||
|
||
if (CAQueueSendPacket(pasFrom->mcsID, CA_REPLY_REQUEST_TAKECONTROL, &packetSend))
|
||
{
|
||
if (result == CARESULT_CONFIRMED)
|
||
{
|
||
// Clear current state, whatever that is.
|
||
CA_ClearLocalState(CACLEAR_ALL, NULL, TRUE);
|
||
|
||
// We are now controlled by the sender.
|
||
CAStartControlled(pasFrom, pPacketRecv->viewerControlID);
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("Denying REQUEST TAKE CONTROL from [%d] with reason %d",
|
||
pasFrom->mcsID, result));
|
||
}
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("Reply to REQUEST TAKE CONTROL from [%d] failing, out of memory",
|
||
pasFrom->mcsID));
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CACompleteRequestTakeControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAHandleReplyRequestTakeControl()
|
||
// WE are VIEWER, REMOTE is HOST
|
||
// Handles reply to previous take control request.
|
||
//
|
||
void ASShare::CAHandleReplyRequestTakeControl
|
||
(
|
||
ASPerson * pasHost,
|
||
PCA_REPLY_RTC_PACKET pPacketRecv
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAHandleReplyRequestTakeControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
|
||
if (pPacketRecv->result == CARESULT_CONFIRMED)
|
||
{
|
||
// On success, should have valid op ID.
|
||
ASSERT(pPacketRecv->hostControlID);
|
||
}
|
||
else
|
||
{
|
||
// On failure, should have invalid op ID.
|
||
ASSERT(!pPacketRecv->hostControlID);
|
||
}
|
||
|
||
//
|
||
// Is this response for the current control op?
|
||
//
|
||
if ((m_caWaitingForReplyFrom != pasHost) ||
|
||
(m_caWaitingForReplyMsg != CA_REPLY_REQUEST_TAKECONTROL))
|
||
{
|
||
WARNING_OUT(("Ignoring TAKE CONTROL REPLY from [%d], not waiting for one",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pPacketRecv->viewerControlID != m_pasLocal->m_caControlID)
|
||
{
|
||
WARNING_OUT(("Ignoring TAKE CONTROL REPLY from [%d], request %d is out of date",
|
||
pasHost->mcsID, pPacketRecv->viewerControlID));
|
||
DC_QUIT;
|
||
|
||
}
|
||
|
||
ASSERT(!m_caQueryDlg);
|
||
|
||
//
|
||
// Cleanup waiting state (for both failure & success)
|
||
//
|
||
CA_CancelTakeControl(pasHost, FALSE);
|
||
ASSERT(!m_caWaitingForReplyFrom);
|
||
ASSERT(!m_caWaitingForReplyMsg);
|
||
|
||
if (pPacketRecv->result == CARESULT_CONFIRMED)
|
||
{
|
||
// Success! We're now in control of the host.
|
||
|
||
// Make sure our own state is OK
|
||
ASSERT(!m_pasLocal->m_caControlledBy);
|
||
ASSERT(!m_pasLocal->m_caInControlOf);
|
||
|
||
CAStartInControl(pasHost, pPacketRecv->hostControlID);
|
||
}
|
||
else
|
||
{
|
||
UINT ids;
|
||
|
||
WARNING_OUT(("TAKE CONTROL REPLY from host [%d] is failure %d", pasHost->mcsID,
|
||
pPacketRecv->result));
|
||
|
||
ids = IDS_ERR_TAKECONTROL_MIN + pPacketRecv->result;
|
||
if ((ids < IDS_ERR_TAKECONTROL_FIRST) || (ids > IDS_ERR_TAKECONTROL_LAST))
|
||
ids = IDS_ERR_TAKECONTROL_LAST;
|
||
|
||
VIEW_Message(pasHost, ids);
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CAHandleReplyRequestTakeControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAHandleRequestGiveControl()
|
||
// WE are VIEWER, REMOTE is HOST
|
||
// Handles incoming take control invite. If our state is good, we accept.
|
||
//
|
||
// NOTE how similar this routine is to CAHandleRequestTakeControl(). They
|
||
// are inverses of each other. With RequestTake/Reply sequence, viewer
|
||
// initiates, host finishes. With RequestGive/Reply sequence, host initiates,
|
||
// viewer finishes. Both end up with viewer in control of host when
|
||
// completed successfully.
|
||
//
|
||
void ASShare::CAHandleRequestGiveControl
|
||
(
|
||
ASPerson * pasHost,
|
||
PCA_RGC_PACKET pPacketRecv
|
||
)
|
||
{
|
||
UINT result = CARESULT_CONFIRMED;
|
||
|
||
DebugEntry(ASShare::CAHandleRequestGiveControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
|
||
//
|
||
// Is this node hosting as far as we know. If not, or has not turned
|
||
// on allow control, we can't do it.
|
||
//
|
||
if (!pasHost->m_pView)
|
||
{
|
||
WARNING_OUT(("GIVE CONTROL went ahead of HOSTING, that's bad"));
|
||
result = CARESULT_DENIED_WRONGSTATE;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
if (!pasHost->m_caAllowControl)
|
||
{
|
||
//
|
||
// We haven't got an AllowControl notification yet, this info is
|
||
// more up to-date. Make use of it.
|
||
//
|
||
WARNING_OUT(("GIVE CONTROL went ahead of ALLOW CONTROL, that's kind of bad"));
|
||
result = CARESULT_DENIED_WRONGSTATE;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
|
||
//
|
||
// Are we doing something else right now? Waiting to hear back about
|
||
// something?
|
||
//
|
||
if (m_caWaitingForReplyFrom)
|
||
{
|
||
result = CARESULT_DENIED_BUSY;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
if (m_caQueryDlg)
|
||
{
|
||
result = CARESULT_DENIED_BUSY;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
//
|
||
// LAURABU TEMPORARY:
|
||
// In a bit, if we're controlled when a new control request comes in,
|
||
// pause control then allow host to handle it.
|
||
//
|
||
if (m_pasLocal->m_caControlledBy)
|
||
{
|
||
result = CARESULT_DENIED_BUSY;
|
||
goto RESPOND_PACKET;
|
||
}
|
||
|
||
//
|
||
// Try to put up query dialog
|
||
//
|
||
if (!CAStartQuery(pasHost, CA_REQUEST_GIVECONTROL, (PCA30P)pPacketRecv))
|
||
{
|
||
result = CARESULT_DENIED;
|
||
}
|
||
|
||
RESPOND_PACKET:
|
||
if (result != CARESULT_CONFIRMED)
|
||
{
|
||
// Instant failure.
|
||
CACompleteRequestGiveControl(pasHost, pPacketRecv, result);
|
||
}
|
||
else
|
||
{
|
||
//
|
||
// We're in a waiting state. CACompleteRequestGiveControl() will
|
||
// complete later or the request will just go away.
|
||
//
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CAHandleRequestGiveControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CACompleteRequestGiveControl()
|
||
// WE are VIEWER, REMOTE is HOST
|
||
// Completes the invite control request.
|
||
//
|
||
void ASShare::CACompleteRequestGiveControl
|
||
(
|
||
ASPerson * pasFrom,
|
||
PCA_RGC_PACKET pPacketRecv,
|
||
UINT result
|
||
)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
DebugEntry(ASShare::CACompleteRequestGiveControl);
|
||
|
||
ValidatePerson(pasFrom);
|
||
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.rrgc.hostControlID = pPacketRecv->hostControlID;
|
||
packetSend.rrgc.result = result;
|
||
|
||
if (result == CARESULT_CONFIRMED)
|
||
{
|
||
packetSend.rrgc.viewerControlID = CANewRequestID();
|
||
}
|
||
|
||
if (CAQueueSendPacket(pasFrom->mcsID, CA_REPLY_REQUEST_GIVECONTROL, &packetSend))
|
||
{
|
||
//
|
||
// If this is successful, change our state. We're now in control.
|
||
//
|
||
if (result == CARESULT_CONFIRMED)
|
||
{
|
||
// Clear current state, whatever that is.
|
||
CA_ClearLocalState(CACLEAR_ALL, NULL, TRUE);
|
||
|
||
CAStartInControl(pasFrom, pPacketRecv->hostControlID);
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("Denying GIVE CONTROL from [%d] with reason %d",
|
||
pasFrom->mcsID, result));
|
||
}
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("Reply to GIVE CONTROL from [%d] failing, out of memory",
|
||
pasFrom->mcsID));
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CACompleteRequestGiveControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAHandleReplyRequestGiveControl()
|
||
// WE are HOST, REMOTE is VIEWER
|
||
// Handles reply to previous take control invite.
|
||
//
|
||
void ASShare::CAHandleReplyRequestGiveControl
|
||
(
|
||
ASPerson * pasViewer,
|
||
PCA_REPLY_RGC_PACKET pPacketRecv
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAHandleReplyRequestGiveControl);
|
||
|
||
ValidatePerson(pasViewer);
|
||
|
||
if (pPacketRecv->result == CARESULT_CONFIRMED)
|
||
{
|
||
// On success, should have valid op ID.
|
||
ASSERT(pPacketRecv->viewerControlID);
|
||
}
|
||
else
|
||
{
|
||
// On failure, should have invalid op ID.
|
||
ASSERT(!pPacketRecv->viewerControlID);
|
||
}
|
||
|
||
//
|
||
// Is this response for the latest control op?
|
||
//
|
||
if ((m_caWaitingForReplyFrom != pasViewer) ||
|
||
(m_caWaitingForReplyMsg != CA_REPLY_REQUEST_GIVECONTROL))
|
||
{
|
||
WARNING_OUT(("Ignoring GIVE CONTROL REPLY from [%d], not waiting for one",
|
||
pasViewer->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pPacketRecv->hostControlID != m_pasLocal->m_caControlID)
|
||
{
|
||
WARNING_OUT(("Ignoring GIVE CONTROL REPLY from [%d], request %d is out of date",
|
||
pasViewer->mcsID, pPacketRecv->hostControlID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ASSERT(!m_caQueryDlg);
|
||
ASSERT(m_pHost);
|
||
ASSERT(m_pasLocal->m_caAllowControl);
|
||
|
||
//
|
||
// Cleanup waiting state (for both failure & success)
|
||
//
|
||
CA_CancelGiveControl(pasViewer, FALSE);
|
||
ASSERT(!m_caWaitingForReplyFrom);
|
||
ASSERT(!m_caWaitingForReplyMsg);
|
||
|
||
if (pPacketRecv->result == CARESULT_CONFIRMED)
|
||
{
|
||
// Success! We are now controlled by the viewer
|
||
|
||
// Make sure our own state is OK
|
||
ASSERT(!m_pasLocal->m_caControlledBy);
|
||
ASSERT(!m_pasLocal->m_caInControlOf);
|
||
|
||
CAStartControlled(pasViewer, pPacketRecv->viewerControlID);
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("GIVE CONTROL to viewer [%d] was denied", pasViewer->mcsID));
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CAHandleReplyRequestGiveControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAHandlePreferPassControl()
|
||
// WE are HOST, REMOTE is CONTROLLER
|
||
// Handles incoming pass control request. If we are controlled by the
|
||
// remote, and end user is cool with it, accept.
|
||
//
|
||
void ASShare::CAHandlePreferPassControl
|
||
(
|
||
ASPerson * pasController,
|
||
PCA_PPC_PACKET pPacketRecv
|
||
)
|
||
{
|
||
ASPerson * pasNewController;
|
||
|
||
DebugEntry(ASShare::CAHandlePreferPassControl);
|
||
|
||
ValidatePerson(pasController);
|
||
|
||
//
|
||
// If we're not controlled by the requester, ignore it.
|
||
//
|
||
if (m_pasLocal->m_caControlledBy != pasController)
|
||
{
|
||
WARNING_OUT(("Ignoring PASS CONTROL from [%d], not controlled by him",
|
||
pasController->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if ((pPacketRecv->viewerControlID != pasController->m_caControlID) ||
|
||
(pPacketRecv->hostControlID != m_pasLocal->m_caControlID))
|
||
{
|
||
WARNING_OUT(("Ignoring PASS CONTROL from [%d], request %d %d out of date",
|
||
pasController->mcsID, pPacketRecv->viewerControlID, pPacketRecv->hostControlID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
ASSERT(!m_caQueryDlg);
|
||
ASSERT(!m_caWaitingForReplyFrom);
|
||
ASSERT(!m_caWaitingForReplyMsg);
|
||
|
||
//
|
||
// OK, the sender is not in control of us anymore.
|
||
//
|
||
CA_RevokeControl(pasController, FALSE);
|
||
|
||
// Is the pass to person specified valid?
|
||
pasNewController = SC_PersonFromNetID(pPacketRecv->mcsPassTo);
|
||
if (!pasNewController ||
|
||
(pasNewController == pasController) ||
|
||
(pasNewController == m_pasLocal) ||
|
||
(pasNewController->cpcCaps.general.version < CAPS_VERSION_30))
|
||
{
|
||
WARNING_OUT(("PASS CONTROL to [%d] failing, not valid person to pass to",
|
||
pPacketRecv->mcsPassTo));
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// Try to put up query dialog
|
||
//
|
||
if (!CAStartQuery(pasController, CA_PREFER_PASSCONTROL, (PCA30P)pPacketRecv))
|
||
{
|
||
// Instant failure. In this case, no packet.
|
||
WARNING_OUT(("Denying PREFER PASS CONTROL from [%d], out of memory",
|
||
pasController->mcsID));
|
||
}
|
||
else
|
||
{
|
||
//
|
||
// We're in a waiting state. CACompletePreferPassControl() will
|
||
// complete later or the request will just go away.
|
||
//
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CAHandlePreferPassControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CACompletePreferPassControl()
|
||
// WE are HOST, REMOTE is new potential CONTROLLER
|
||
// Completes the prefer pass control request.
|
||
//
|
||
void ASShare::CACompletePreferPassControl
|
||
(
|
||
ASPerson * pasTo,
|
||
UINT_PTR mcsOrg,
|
||
PCA_PPC_PACKET pPacketRecv,
|
||
UINT result
|
||
)
|
||
{
|
||
CA30P packetSend;
|
||
|
||
DebugEntry(ASShare::CACompletePreferPassControl);
|
||
|
||
ValidatePerson(pasTo);
|
||
|
||
if (result == CARESULT_CONFIRMED)
|
||
{
|
||
ZeroMemory(&packetSend, sizeof(packetSend));
|
||
packetSend.rgc.hostControlID = CANewRequestID();
|
||
packetSend.rgc.mcsPassFrom = mcsOrg;
|
||
|
||
if (CAQueueSendPacket(pasTo->mcsID, CA_REQUEST_GIVECONTROL,
|
||
&packetSend))
|
||
{
|
||
CA_ClearLocalState(CACLEAR_HOST, NULL, TRUE);
|
||
|
||
CAStartWaiting(pasTo, CA_REPLY_REQUEST_GIVECONTROL);
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("Reply to PREFER PASS CONTROL from [%d] to [%d] failing, out of memory",
|
||
mcsOrg, pasTo->mcsID));
|
||
}
|
||
}
|
||
else
|
||
{
|
||
WARNING_OUT(("Denying PREFER PASS CONTROL from [%d] to [%d] with reason %d",
|
||
mcsOrg, pasTo->mcsID, result));
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CACompletePreferPassControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAHandleInformReleasedControl()
|
||
// WE are HOST, REMOTE is CONTROLLER
|
||
//
|
||
void ASShare::CAHandleInformReleasedControl
|
||
(
|
||
ASPerson * pasController,
|
||
PCA_INFORM_PACKET pPacketRecv
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAHandleInformReleasedControl);
|
||
|
||
ValidatePerson(pasController);
|
||
|
||
//
|
||
// Do we currently have a TakeControl dialog up for this request? If so,
|
||
// take it down but don't send a packet.
|
||
//
|
||
if (m_caQueryDlg &&
|
||
(m_caQuery.pasReplyTo == pasController) &&
|
||
(m_caQuery.msg == CA_REQUEST_TAKECONTROL) &&
|
||
(m_caQuery.request.rtc.viewerControlID == pPacketRecv->viewerControlID))
|
||
{
|
||
ASSERT(!pPacketRecv->hostControlID);
|
||
CACancelQuery(pasController, FALSE);
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// If this person isn't in control of us or the control op referred to
|
||
// isn't the current one, ignore. NULL hostControlID means the person
|
||
// cancelled a request before they heard back from us.
|
||
//
|
||
|
||
if (pasController->m_caInControlOf != m_pasLocal)
|
||
{
|
||
WARNING_OUT(("Ignoring RELEASE CONTROL from [%d], we're not controlled by them",
|
||
pasController->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pPacketRecv->viewerControlID != pasController->m_caControlID)
|
||
{
|
||
WARNING_OUT(("Ignoring RELEASE CONTROL from [%d], viewer ID out of date",
|
||
pasController->mcsID, pPacketRecv->viewerControlID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pPacketRecv->hostControlID && (pPacketRecv->hostControlID != m_pasLocal->m_caControlID))
|
||
{
|
||
WARNING_OUT(("Ignoring RELEASE CONTROL from [%d], host ID out of date",
|
||
pasController->mcsID, pPacketRecv->hostControlID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
|
||
// Undo control, but no packet gets sent, we're just cleaning up.
|
||
CA_RevokeControl(pasController, FALSE);
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CAHandleInformReleasedControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAHandleInformRevokedControl()
|
||
// WE are CONTROLLER, REMOTE is HOST
|
||
//
|
||
void ASShare::CAHandleInformRevokedControl
|
||
(
|
||
ASPerson * pasHost,
|
||
PCA_INFORM_PACKET pPacketRecv
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAHandleInformRevokedControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
|
||
//
|
||
// Do we currently have a GiveControl dialog up for this request? If so,
|
||
// take it down but don't send a packet.
|
||
//
|
||
|
||
if (m_caQueryDlg &&
|
||
(m_caQuery.pasReplyTo == pasHost) &&
|
||
(m_caQuery.msg == CA_REQUEST_GIVECONTROL) &&
|
||
(m_caQuery.request.rgc.hostControlID == pPacketRecv->hostControlID))
|
||
{
|
||
ASSERT(!pPacketRecv->viewerControlID);
|
||
CACancelQuery(pasHost, FALSE);
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// If this person isn't controlled by us or the control op referred to
|
||
// isn't the current one, ignore.
|
||
//
|
||
if (pasHost->m_caControlledBy != m_pasLocal)
|
||
{
|
||
WARNING_OUT(("Ignoring REVOKE CONTROL from [%d], not in control of them",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pPacketRecv->hostControlID != pasHost->m_caControlID)
|
||
{
|
||
WARNING_OUT(("Ignoring REVOKE CONTROL from [%d], host ID out of date",
|
||
pasHost->mcsID, pPacketRecv->hostControlID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pPacketRecv->viewerControlID && (pPacketRecv->viewerControlID != m_pasLocal->m_caControlID))
|
||
{
|
||
WARNING_OUT(("Ignoring REVOKE CONTROL from [%d], viewer ID out of date",
|
||
pasHost->mcsID, pPacketRecv->viewerControlID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
|
||
// Undo control, but no packet gets sent, we're just cleaning up.
|
||
CA_ReleaseControl(pasHost, FALSE);
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CAHandleInformRevokedControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAHandleInformPausedControl()
|
||
// WE are CONTROLLER, REMOTE is HOST
|
||
//
|
||
void ASShare::CAHandleInformPausedControl
|
||
(
|
||
ASPerson * pasHost,
|
||
PCA_INFORM_PACKET pPacketRecv
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAHandleInformPausedControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
|
||
if (pasHost->m_caControlledBy != m_pasLocal)
|
||
{
|
||
WARNING_OUT(("Ignoring control paused from [%d], not controlled by us",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (pasHost->m_caControlPaused)
|
||
{
|
||
WARNING_OUT(("Ignoring control paused from [%d], already paused",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
pasHost->m_caControlPaused = TRUE;
|
||
VIEW_PausedInControl(pasHost, TRUE);
|
||
|
||
DCS_NotifyUI(SH_EVT_PAUSEDINCONTROL, pasHost->cpcCaps.share.gccID, 0);
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CAHandleInformPausedControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CAHandleInformUnpausedControl()
|
||
// WE are CONTROLLER, REMOTE is HOST
|
||
//
|
||
void ASShare::CAHandleInformUnpausedControl
|
||
(
|
||
ASPerson * pasHost,
|
||
PCA_INFORM_PACKET pPacketRecv
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAHandleInformUnpausedControl);
|
||
|
||
ValidatePerson(pasHost);
|
||
|
||
if (pasHost->m_caControlledBy != m_pasLocal)
|
||
{
|
||
WARNING_OUT(("Ignoring control unpaused from [%d], not controlled by us",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
if (!pasHost->m_caControlPaused)
|
||
{
|
||
WARNING_OUT(("Ignoring control unpaused from [%d], not paused",
|
||
pasHost->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
pasHost->m_caControlPaused = FALSE;
|
||
VIEW_PausedInControl(pasHost, FALSE);
|
||
|
||
DCS_NotifyUI(SH_EVT_UNPAUSEDINCONTROL, pasHost->cpcCaps.share.gccID, 0);
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CAHandleInformUnpausedControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
void ASShare::CAHandleNewState
|
||
(
|
||
ASPerson * pasHost,
|
||
PCANOTPACKET pPacket
|
||
)
|
||
{
|
||
BOOL caOldAllowControl;
|
||
BOOL caNewAllowControl;
|
||
ASPerson * pasController;
|
||
|
||
DebugEntry(ASShare::CAHandleNewState);
|
||
|
||
//
|
||
// If this node isn't hosting, ignore this.
|
||
//
|
||
ValidatePerson(pasHost);
|
||
ASSERT(pasHost->cpcCaps.general.version >= CAPS_VERSION_30);
|
||
ASSERT(pasHost->hetCount);
|
||
|
||
//
|
||
// Update controllable state FIRST, so view window changes will
|
||
// reflect it.
|
||
//
|
||
caOldAllowControl = pasHost->m_caAllowControl;
|
||
caNewAllowControl = ((pPacket->state & CASTATE_ALLOWCONTROL) != 0);
|
||
|
||
if (!caNewAllowControl && (pasHost->m_caControlledBy == m_pasLocal))
|
||
{
|
||
//
|
||
// Fix up bogus notification
|
||
//
|
||
ERROR_OUT(("CA_STATE notification error! We're in control of [%d] but he says he's not controllable.",
|
||
pasHost->mcsID));
|
||
CA_ReleaseControl(pasHost, FALSE);
|
||
}
|
||
|
||
pasHost->m_caAllowControl = caNewAllowControl;
|
||
|
||
|
||
// Update/clear controller
|
||
if (!pPacket->controllerID)
|
||
{
|
||
pasController = NULL;
|
||
}
|
||
else
|
||
{
|
||
pasController = SC_PersonFromNetID(pPacket->controllerID);
|
||
if (pasController == pasHost)
|
||
{
|
||
ERROR_OUT(("Bogus controller, same as host [%d]", pPacket->controllerID));
|
||
pasController = NULL;
|
||
}
|
||
}
|
||
|
||
if (!CAClearHostState(pasHost, pasController))
|
||
{
|
||
// This failed. Put back old controllable state.
|
||
pasHost->m_caAllowControl = caOldAllowControl;
|
||
}
|
||
|
||
// Force a state change if the allow state has altered
|
||
if (caOldAllowControl != pasHost->m_caAllowControl)
|
||
{
|
||
VIEW_HostStateChange(pasHost);
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CAHandleNewState);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAStartWaiting()
|
||
// Sets up vars for waiting state.
|
||
//
|
||
void ASShare::CAStartWaiting
|
||
(
|
||
ASPerson * pasWaitForReplyFrom,
|
||
UINT msgWaitForReplyFrom
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CAStartWaiting);
|
||
|
||
ValidatePerson(pasWaitForReplyFrom);
|
||
ASSERT(msgWaitForReplyFrom);
|
||
|
||
ASSERT(!m_caWaitingForReplyFrom);
|
||
ASSERT(!m_caWaitingForReplyMsg);
|
||
|
||
m_caWaitingForReplyFrom = pasWaitForReplyFrom;
|
||
m_caWaitingForReplyMsg = msgWaitForReplyFrom;
|
||
|
||
DebugExitVOID(ASShare::CAStartWaiting);
|
||
}
|
||
|
||
|
||
//
|
||
// CA_ClearLocalState()
|
||
//
|
||
// Called to reset control state for LOCAL dude.
|
||
//
|
||
void ASShare::CA_ClearLocalState
|
||
(
|
||
UINT flags,
|
||
ASPerson * pasRemote,
|
||
BOOL fPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CA_ClearLocalState);
|
||
|
||
//
|
||
// Clear HOST stuff
|
||
//
|
||
if (flags & CACLEAR_HOST)
|
||
{
|
||
if (m_caWaitingForReplyMsg == CA_REPLY_REQUEST_GIVECONTROL)
|
||
{
|
||
if (!pasRemote || (pasRemote == m_caWaitingForReplyFrom))
|
||
{
|
||
// Kill the outstanding invitation to the remote
|
||
CA_CancelGiveControl(m_caWaitingForReplyFrom, fPacket);
|
||
}
|
||
}
|
||
|
||
if (m_caQueryDlg &&
|
||
((m_caQuery.msg == CA_REQUEST_TAKECONTROL) ||
|
||
(m_caQuery.msg == CA_PREFER_PASSCONTROL)))
|
||
{
|
||
if (!pasRemote || (pasRemote == m_caQuery.pasReplyTo))
|
||
{
|
||
// Kill the user query dialog that's up
|
||
CACancelQuery(m_caQuery.pasReplyTo, fPacket);
|
||
}
|
||
}
|
||
|
||
if (m_pasLocal->m_caControlledBy)
|
||
{
|
||
if (!pasRemote || (pasRemote == m_pasLocal->m_caControlledBy))
|
||
{
|
||
CA_RevokeControl(m_pasLocal->m_caControlledBy, fPacket);
|
||
ASSERT(!m_pasLocal->m_caControlledBy);
|
||
}
|
||
}
|
||
}
|
||
|
||
//
|
||
// Clear VIEW stuff
|
||
//
|
||
if (flags & CACLEAR_VIEW)
|
||
{
|
||
if (m_caWaitingForReplyMsg == CA_REPLY_REQUEST_TAKECONTROL)
|
||
{
|
||
if (!pasRemote || (pasRemote == m_caWaitingForReplyFrom))
|
||
{
|
||
CA_CancelTakeControl(m_caWaitingForReplyFrom, fPacket);
|
||
}
|
||
}
|
||
|
||
if (m_caQueryDlg && (m_caQuery.msg == CA_REQUEST_GIVECONTROL))
|
||
{
|
||
if (!pasRemote || (pasRemote == m_caQuery.pasReplyTo))
|
||
{
|
||
// Kill the user query dialog that's up
|
||
CACancelQuery(m_caQuery.pasReplyTo, fPacket);
|
||
}
|
||
}
|
||
|
||
if (m_pasLocal->m_caInControlOf)
|
||
{
|
||
if (!pasRemote || (pasRemote == m_pasLocal->m_caInControlOf))
|
||
{
|
||
CA_ReleaseControl(m_pasLocal->m_caInControlOf, fPacket);
|
||
ASSERT(!m_pasLocal->m_caInControlOf);
|
||
}
|
||
}
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CA_ClearLocalState);
|
||
}
|
||
|
||
|
||
//
|
||
// CAClearRemoteState()
|
||
//
|
||
// Called to reset all control state for a REMOTE node
|
||
//
|
||
void ASShare::CAClearRemoteState(ASPerson * pasClear)
|
||
{
|
||
DebugEntry(ASShare::CAClearRemoteState);
|
||
|
||
if (pasClear->m_caInControlOf)
|
||
{
|
||
CAClearHostState(pasClear->m_caInControlOf, NULL);
|
||
ASSERT(!pasClear->m_caInControlOf);
|
||
ASSERT(!pasClear->m_caControlledBy);
|
||
}
|
||
else if (pasClear->m_caControlledBy)
|
||
{
|
||
CAClearHostState(pasClear, NULL);
|
||
ASSERT(!pasClear->m_caControlledBy);
|
||
ASSERT(!pasClear->m_caInControlOf);
|
||
}
|
||
|
||
DebugExitVOID(ASShare:CAClearRemoteState);
|
||
}
|
||
|
||
|
||
//
|
||
// CAClearHostState()
|
||
//
|
||
// Called to clean up the mutual pointers when undoing a node's host state.
|
||
// We need to undo the previous states:
|
||
// * Clear the previous controller of the host
|
||
// * Clear the previous controller of the controller
|
||
// * Clear the previous controllee of the controller
|
||
//
|
||
// This may be recursive.
|
||
//
|
||
// It returns TRUE if the change takes effect, FALSE if it's ignored because
|
||
// it involves us and we have more recent information.
|
||
//
|
||
BOOL ASShare::CAClearHostState
|
||
(
|
||
ASPerson * pasHost,
|
||
ASPerson * pasController
|
||
)
|
||
{
|
||
BOOL rc = FALSE;
|
||
UINT gccID;
|
||
|
||
DebugEntry(ASShare::CAClearHostState);
|
||
|
||
ValidatePerson(pasHost);
|
||
|
||
//
|
||
// If nothing is changing, do nothing
|
||
//
|
||
if (pasHost->m_caControlledBy == pasController)
|
||
{
|
||
TRACE_OUT(("Ignoring control change; nothing's changing"));
|
||
rc = TRUE;
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// If the host is us, ignore.
|
||
// Also, if the host isn't hosting yet we got an in control change,
|
||
// ignore it too.
|
||
//
|
||
if ((pasHost == m_pasLocal) ||
|
||
(pasController && !pasHost->hetCount))
|
||
{
|
||
WARNING_OUT(("Ignoring control change; host is us or not sharing"));
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// UNDO any old state of the controller
|
||
//
|
||
if (pasController)
|
||
{
|
||
if (pasController == m_pasLocal)
|
||
{
|
||
TRACE_OUT(("Ignoring control with us as controller"));
|
||
DC_QUIT;
|
||
}
|
||
else if (pasController->m_caInControlOf)
|
||
{
|
||
ASSERT(!pasController->m_caControlledBy);
|
||
ASSERT(pasController->m_caInControlOf->m_caControlledBy == pasController);
|
||
rc = CAClearHostState(pasController->m_caInControlOf, NULL);
|
||
if (!rc)
|
||
{
|
||
DC_QUIT;
|
||
}
|
||
ASSERT(!pasController->m_caInControlOf);
|
||
}
|
||
else if (pasController->m_caControlledBy)
|
||
{
|
||
ASSERT(!pasController->m_caInControlOf);
|
||
ASSERT(pasController->m_caControlledBy->m_caInControlOf == pasController);
|
||
rc = CAClearHostState(pasController, NULL);
|
||
if (!rc)
|
||
{
|
||
DC_QUIT;
|
||
}
|
||
ASSERT(!pasController->m_caControlledBy);
|
||
}
|
||
}
|
||
|
||
//
|
||
// UNDO any old IN CONTROL state of the host
|
||
//
|
||
if (pasHost->m_caInControlOf)
|
||
{
|
||
ASSERT(!pasHost->m_caControlledBy);
|
||
ASSERT(pasHost->m_caInControlOf->m_caControlledBy == pasHost);
|
||
rc = CAClearHostState(pasHost->m_caInControlOf, NULL);
|
||
if (!rc)
|
||
{
|
||
DC_QUIT;
|
||
}
|
||
ASSERT(!pasHost->m_caInControlOf);
|
||
}
|
||
|
||
//
|
||
// FINALLY! Update CONTROLLED BY state of the host
|
||
//
|
||
|
||
// Clear OLD ControlledBy
|
||
if (pasHost->m_caControlledBy)
|
||
{
|
||
ASSERT(pasHost->m_caControlledBy->m_caInControlOf == pasHost);
|
||
pasHost->m_caControlledBy->m_caInControlOf = NULL;
|
||
}
|
||
|
||
// Set NEW ControlledBy
|
||
pasHost->m_caControlledBy = pasController;
|
||
if (pasController)
|
||
{
|
||
pasController->m_caInControlOf = pasHost;
|
||
gccID = pasController->cpcCaps.share.gccID;
|
||
}
|
||
else
|
||
{
|
||
gccID = 0;
|
||
}
|
||
|
||
VIEW_HostStateChange(pasHost);
|
||
|
||
//
|
||
// The hosts' controller has changed. Repaint the shadow cursor with/wo
|
||
// the new initials.
|
||
//
|
||
CM_UpdateShadowCursor(pasHost, pasHost->cmShadowOff, pasHost->cmPos.x,
|
||
pasHost->cmPos.y, pasHost->cmHotSpot.x, pasHost->cmHotSpot.y);
|
||
|
||
rc = TRUE;
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitBOOL(ASShare::CAClearHostState, rc);
|
||
return(rc);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// 2.X COMPATIBILITY STUFF
|
||
// This is so that we can do a decent job of reflecting old 2.x control
|
||
// stuff, and allow a 3.0 node to take control of a 2.x system.
|
||
//
|
||
|
||
|
||
//
|
||
// CA2xCooperateChange()
|
||
//
|
||
// This is called when a 2.x node is cooperating or not. When a 2.x node
|
||
// is a host and cooperating, he is "controllable" by 3.0 standards. So
|
||
// when he starts/stops hosting or starts/stops cooperating we must
|
||
// recalculate "AllowControl"
|
||
//
|
||
void ASShare::CA2xCooperateChange
|
||
(
|
||
ASPerson * pasPerson,
|
||
BOOL fCooperating
|
||
)
|
||
{
|
||
BOOL fAllowControl;
|
||
|
||
DebugEntry(ASShare::CA2xCooperateChange);
|
||
|
||
ValidatePerson(pasPerson);
|
||
|
||
//
|
||
// If this isn't a back level system, ignore it.
|
||
//
|
||
if (pasPerson->cpcCaps.general.version >= CAPS_VERSION_30)
|
||
{
|
||
WARNING_OUT(("Received old CA cooperate message from 3.0 node [%d]",
|
||
pasPerson->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// Update the cooperating state.
|
||
//
|
||
pasPerson->m_ca2xCooperating = fCooperating;
|
||
|
||
//
|
||
// If cooperating & this person owns the control token, this person
|
||
// is now in control of all 2.x cooperating nodes. If we were
|
||
// controlling a 2.x host, act like we've been bounced. But we MUST
|
||
// send a packet.
|
||
//
|
||
if (fCooperating)
|
||
{
|
||
if (pasPerson == m_ca2xControlTokenOwner)
|
||
{
|
||
//
|
||
// This person is now "in control" of the 2.x cooperating nodes.
|
||
// If we were in control of a 2.x host, we've basically been
|
||
// bounced and another 2.x node is running the show. With 3.0,
|
||
// it doesn't matter and we don't need to find out what's going
|
||
// on with a 3.0 node in control of 2.x dudes.
|
||
//
|
||
if (m_pasLocal->m_caInControlOf &&
|
||
(m_pasLocal->m_caInControlOf->cpcCaps.general.version < CAPS_VERSION_30))
|
||
{
|
||
CA_ReleaseControl(pasPerson, TRUE);
|
||
}
|
||
}
|
||
}
|
||
|
||
//
|
||
// Figure out whether we need to set/clear AllowControl
|
||
//
|
||
fAllowControl = (fCooperating && pasPerson->m_pView);
|
||
|
||
if (pasPerson->m_caAllowControl != fAllowControl)
|
||
{
|
||
if (pasPerson->m_pView && !fAllowControl)
|
||
{
|
||
//
|
||
// This 2.x node is hosting, and no longer is cooperating.
|
||
// Cleanup the controller
|
||
//
|
||
if (pasPerson->m_caControlledBy == m_pasLocal)
|
||
{
|
||
CA_ReleaseControl(pasPerson, TRUE);
|
||
}
|
||
else
|
||
{
|
||
CAClearHostState(pasPerson, NULL);
|
||
}
|
||
}
|
||
|
||
pasPerson->m_caAllowControl = fAllowControl;
|
||
|
||
// This will do nothing if this person isn't hosting.
|
||
VIEW_HostStateChange(pasPerson);
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA2xCooperateChange);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA2xRequestControl()
|
||
//
|
||
// Called when a 2.x node requests control.
|
||
//
|
||
void ASShare::CA2xRequestControl
|
||
(
|
||
ASPerson * pasPerson,
|
||
PCAPACKET pCAPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CA2xRequestControl);
|
||
|
||
//
|
||
// A 2.x node has sent this. 3.0 hosts never request, they simply
|
||
// grab control.
|
||
//
|
||
ValidatePerson(pasPerson);
|
||
|
||
//
|
||
// If it's from a 3.0 node, it's an error.
|
||
//
|
||
if (pasPerson->cpcCaps.general.version >= CAPS_VERSION_30)
|
||
{
|
||
ERROR_OUT(("Received CA_OLDMSG_REQUEST_CONTROL from 3.0 node [%d]",
|
||
pasPerson->mcsID));
|
||
DC_QUIT;
|
||
}
|
||
|
||
//
|
||
// If we have the token, grant it. We must release control of a host if
|
||
// that person is 2.x.
|
||
//
|
||
if (m_ca2xControlTokenOwner == m_pasLocal)
|
||
{
|
||
//
|
||
// In this case, we do NOT want a dest ID. This isn't us trying to
|
||
// take control of a 2.x host. It is simply granting control to
|
||
// a 2.x dude.
|
||
//
|
||
if (CA2xQueueSendMsg(0, CA_OLDMSG_GRANTED_CONTROL,
|
||
pasPerson->mcsID, m_ca2xControlGeneration))
|
||
{
|
||
m_ca2xControlTokenOwner = pasPerson;
|
||
|
||
// Release control of 2.x host.
|
||
if (m_pasLocal->m_caInControlOf &&
|
||
(m_pasLocal->m_caInControlOf->cpcCaps.general.version < CAPS_VERSION_30))
|
||
{
|
||
CA_ReleaseControl(m_pasLocal->m_caInControlOf, TRUE);
|
||
}
|
||
}
|
||
else
|
||
{
|
||
ERROR_OUT(("CA2xRequestControl: Unable to respond GRANTED to node [%d]",
|
||
pasPerson->mcsID));
|
||
}
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitVOID(ASShare::CA2xRequestControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA2xGrantedControl()
|
||
//
|
||
// Called when any node (2.x or 3.0 controlling 2.x) broadcasts granted
|
||
// control. If we are controlling a 2.x host, it is now nuked.
|
||
//
|
||
void ASShare::CA2xGrantedControl
|
||
(
|
||
ASPerson * pasPerson,
|
||
PCAPACKET pCAPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CA2xGrantedControl);
|
||
|
||
ValidatePerson(pasPerson);
|
||
|
||
if ((pCAPacket->data2 >= m_ca2xControlGeneration) ||
|
||
((m_ca2xControlGeneration - pCAPacket->data2) > 0x80000000))
|
||
{
|
||
ASPerson * pas2xNewTokenOwner;
|
||
|
||
//
|
||
// This dude is now the controller of 2.x nodes. Remember it for
|
||
// later COOPERATE msgs. If nothing has changed (this is a sync
|
||
// broadcast for example, do nothing ourselvs).
|
||
//
|
||
pas2xNewTokenOwner = SC_PersonFromNetID(pCAPacket->data1);
|
||
if (pas2xNewTokenOwner != m_ca2xControlTokenOwner)
|
||
{
|
||
m_ca2xControlTokenOwner = pas2xNewTokenOwner;
|
||
m_ca2xControlGeneration = pCAPacket->data2;
|
||
|
||
//
|
||
// Are we in control of a 2.x node? If so, undo it.
|
||
//
|
||
if (m_pasLocal->m_caInControlOf &&
|
||
(m_pasLocal->m_caInControlOf->cpcCaps.general.version < CAPS_VERSION_30))
|
||
{
|
||
CA_ReleaseControl(m_pasLocal->m_caInControlOf, TRUE);
|
||
}
|
||
}
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CA2xGrantedControl);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA2xTakeControl()
|
||
//
|
||
// This fakes up packets to take control of a 2.x node. We don't broadcast,
|
||
// we send them privately just to the individual node so we don't control
|
||
// any other host but him.
|
||
//
|
||
// We do this by sending COOPERATE then GRANTED_CONTROL. If there's a
|
||
// collision, we'll see a GRANTED_CONTROL from somebody else that outdates
|
||
// ours.
|
||
//
|
||
void ASShare::CA2xTakeControl(ASPerson * pasHost)
|
||
{
|
||
UINT_PTR caNew2xControlGeneration;
|
||
|
||
DebugEntry(ASShare::CA2xTakeControl);
|
||
|
||
ValidateView(pasHost);
|
||
|
||
caNew2xControlGeneration = m_ca2xControlGeneration + m_pasLocal->mcsID;
|
||
|
||
if (CA2xQueueSendMsg(0, CA_OLDMSG_COOPERATE, 0, 0))
|
||
{
|
||
if (!CA2xQueueSendMsg(pasHost->mcsID, CA_OLDMSG_GRANTED_CONTROL,
|
||
m_pasLocal->mcsID, caNew2xControlGeneration))
|
||
{
|
||
//
|
||
// Failure. Best we can do is follow it with a DETACH
|
||
//
|
||
ERROR_OUT(("CA2xTakeControl: Can't take control of [%d]", pasHost->mcsID));
|
||
CA2xQueueSendMsg(0, CA_OLDMSG_DETACH, 0, 0);
|
||
}
|
||
else
|
||
{
|
||
m_ca2xControlGeneration = caNew2xControlGeneration;
|
||
m_ca2xControlTokenOwner = m_pasLocal;
|
||
|
||
CANewRequestID();
|
||
CAStartInControl(pasHost, 1);
|
||
}
|
||
}
|
||
else
|
||
{
|
||
ERROR_OUT(("CA2xTakeControl: Can't take control of [%d]", pasHost->mcsID));
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CA2xTakeControl);
|
||
}
|
||
|
||
|
||
|
||
|
||
//
|
||
// CA2xSendMsg()
|
||
// This sends a 2.x node CA message. It returns FALSE if it can't alloc
|
||
// a packet.
|
||
//
|
||
BOOL ASShare::CA2xSendMsg
|
||
(
|
||
UINT_PTR destID,
|
||
UINT msg,
|
||
UINT_PTR data1,
|
||
UINT_PTR data2
|
||
)
|
||
{
|
||
BOOL fSent = FALSE;
|
||
PCAPACKET pPacket;
|
||
#ifdef _DEBUG
|
||
UINT sentSize;
|
||
#endif // _DEBUG
|
||
|
||
DebugEntry(ASShare::CASendPacket);
|
||
|
||
//
|
||
// For cooperate/detach, there's no target. We broadcast them no
|
||
// matter what so everybody knows what state we're in.
|
||
//
|
||
if (msg != CA_OLDMSG_GRANTED_CONTROL)
|
||
{
|
||
ASSERT(!destID);
|
||
}
|
||
|
||
//
|
||
// WE MUST USE PROT_STR_MISC! Backlevel nodes will uncompress it
|
||
// using that prot dictionary. And note that we must broadcast 2.x
|
||
// CA packets so everybody knows what's going on.
|
||
//
|
||
pPacket = (PCAPACKET)SC_AllocPkt(PROT_STR_MISC, g_s20BroadcastID,
|
||
sizeof(*pPacket));
|
||
if (!pPacket)
|
||
{
|
||
WARNING_OUT(("CA2xSendMsg: can't get packet to send"));
|
||
WARNING_OUT((" msg 0x%08x", msg));
|
||
WARNING_OUT((" data1 0x%08x", data1));
|
||
WARNING_OUT((" data2 0x%08x", data2));
|
||
|
||
DC_QUIT;
|
||
}
|
||
|
||
pPacket->header.data.dataType = DT_CA;
|
||
pPacket->msg = (TSHR_UINT16)msg;
|
||
pPacket->data1 = (TSHR_UINT16)data1;
|
||
pPacket->data2 = data2;
|
||
|
||
#ifdef _DEBUG
|
||
sentSize =
|
||
#endif
|
||
DCS_CompressAndSendPacket(PROT_STR_MISC, g_s20BroadcastID,
|
||
&(pPacket->header), sizeof(*pPacket));
|
||
TRACE_OUT(("CA request packet size: %08d, sent %08d", sizeof(*pPacket), sentSize));
|
||
|
||
fSent = TRUE;
|
||
|
||
DC_EXIT_POINT:
|
||
|
||
DebugExitBOOL(ASShare::CA2xSendMsg, fSent);
|
||
return(fSent);
|
||
}
|
||
|
||
|
||
//
|
||
// CA2xQueueSendMsg()
|
||
// This sends (or queues if failure) a 2.x node CA message. It has different
|
||
// fields, hence a different routine.
|
||
//
|
||
BOOL ASShare::CA2xQueueSendMsg
|
||
(
|
||
UINT_PTR destID,
|
||
UINT msg,
|
||
UINT_PTR data1,
|
||
UINT_PTR data2
|
||
)
|
||
{
|
||
BOOL rc = TRUE;
|
||
PCAREQUEST pCARequest;
|
||
|
||
DebugEntry(ASShare::CA2xQueueSendMsg);
|
||
|
||
if (msg != CA_OLDMSG_GRANTED_CONTROL)
|
||
{
|
||
ASSERT(!destID);
|
||
}
|
||
|
||
//
|
||
// A DETACH message will cancel out a pending GRANTED_CONTROL message.
|
||
// So look for that first. If we find one (and there can only be at
|
||
// most one), replace it.
|
||
//
|
||
if (msg == CA_OLDMSG_DETACH)
|
||
{
|
||
pCARequest = (PCAREQUEST)COM_BasedListFirst(&m_caQueuedMsgs,
|
||
FIELD_OFFSET(CAREQUEST, chain));
|
||
while (pCARequest)
|
||
{
|
||
if ((pCARequest->type == REQUEST_2X) &&
|
||
(pCARequest->destID == destID) &&
|
||
(pCARequest->msg == CA_OLDMSG_GRANTED_CONTROL))
|
||
{
|
||
// Replace it
|
||
WARNING_OUT(("Replacing cancelled GRANTED_CONTROL msg to 2.x host"));
|
||
|
||
pCARequest->destID = 0;
|
||
pCARequest->msg = CA_OLDMSG_DETACH;
|
||
pCARequest->req.req2x.data1 = 0;
|
||
pCARequest->req.req2x.data2 = 0;
|
||
|
||
// We're done.
|
||
DC_QUIT;
|
||
}
|
||
|
||
pCARequest = (PCAREQUEST)COM_BasedListNext(&m_caQueuedMsgs, pCARequest,
|
||
FIELD_OFFSET(CAREQUEST, chain));
|
||
}
|
||
}
|
||
//
|
||
// The messages must go out in order. So we must flush pending
|
||
// queued messages first.
|
||
//
|
||
if (!CAFlushOutgoingPackets() ||
|
||
!CA2xSendMsg(destID, msg, data1, data2))
|
||
{
|
||
//
|
||
// We must queue this.
|
||
//
|
||
WARNING_OUT(("CA2xQueueSendMsg: queueing request for send later"));
|
||
|
||
pCARequest = new CAREQUEST;
|
||
if (!pCARequest)
|
||
{
|
||
ERROR_OUT(("CA2xQueueSendMsg: can't even allocate memory to queue request; must fail"));
|
||
rc = FALSE;
|
||
}
|
||
else
|
||
{
|
||
SET_STAMP(pCARequest, CAREQUEST);
|
||
|
||
pCARequest->type = REQUEST_2X;
|
||
pCARequest->destID = destID;
|
||
pCARequest->msg = msg;
|
||
pCARequest->req.req2x.data1 = data1;
|
||
pCARequest->req.req2x.data2 = data2;
|
||
|
||
//
|
||
// Stick this at the end of the queue
|
||
//
|
||
COM_BasedListInsertBefore(&(m_caQueuedMsgs),
|
||
&(pCARequest->chain));
|
||
}
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitBOOL(ASShare::CA2xQueueSendMsg, rc);
|
||
return(rc);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAStartQuery()
|
||
//
|
||
// This puts up the modeless dialog to query the user about a control
|
||
// request. It will timeout if not handled.
|
||
//
|
||
BOOL ASShare::CAStartQuery
|
||
(
|
||
ASPerson * pasFrom,
|
||
UINT msg,
|
||
PCA30P pReq
|
||
)
|
||
{
|
||
BOOL rc = FALSE;
|
||
|
||
DebugEntry(ASShare::CAStartQuery);
|
||
|
||
ValidatePerson(pasFrom);
|
||
|
||
//
|
||
// We have no stacked queries. If another comes in while the current
|
||
// one is up, it gets an immediate failure busy.
|
||
//
|
||
ASSERT(!m_caQueryDlg);
|
||
ASSERT(!m_caQuery.pasReplyTo);
|
||
ASSERT(!m_caQuery.msg);
|
||
|
||
//
|
||
// Setup for new query
|
||
//
|
||
if (msg == CA_PREFER_PASSCONTROL)
|
||
{
|
||
//
|
||
// With forwarding, the person we're going to send a packet to
|
||
// if accepted is not the person who sent us the request. It's the
|
||
// person we're forwarding to.
|
||
//
|
||
m_caQuery.pasReplyTo = SC_PersonFromNetID(pReq->ppc.mcsPassTo);
|
||
ValidatePerson(m_caQuery.pasReplyTo);
|
||
}
|
||
else
|
||
{
|
||
m_caQuery.pasReplyTo = pasFrom;
|
||
}
|
||
m_caQuery.mcsOrg = pasFrom->mcsID;
|
||
m_caQuery.msg = msg;
|
||
m_caQuery.request = *pReq;
|
||
|
||
//
|
||
// If we are unattended, or the requester is unattended, instantly
|
||
// confirm. That's why we show the window after creating the dialog.
|
||
//
|
||
if ((m_pasLocal->cpcCaps.general.typeFlags & AS_UNATTENDED) ||
|
||
(pasFrom->cpcCaps.general.typeFlags & AS_UNATTENDED))
|
||
{
|
||
CAFinishQuery(CARESULT_CONFIRMED);
|
||
rc = TRUE;
|
||
}
|
||
else
|
||
{
|
||
//
|
||
// If this is a request to us && we're hosting, check auto-accept/
|
||
// auto-reject settings.
|
||
//
|
||
if (m_pHost &&
|
||
((msg == CA_REQUEST_TAKECONTROL) || (msg == CA_PREFER_PASSCONTROL)))
|
||
{
|
||
if (m_pHost->m_caTempRejectRequests)
|
||
{
|
||
CAFinishQuery(CARESULT_DENIED_BUSY);
|
||
rc = TRUE;
|
||
DC_QUIT;
|
||
}
|
||
else if (m_pHost->m_caAutoAcceptRequests)
|
||
{
|
||
CAFinishQuery(CARESULT_CONFIRMED);
|
||
rc = TRUE;
|
||
DC_QUIT;
|
||
}
|
||
}
|
||
|
||
m_caQueryDlg = CreateDialogParam(g_asInstance,
|
||
MAKEINTRESOURCE(IDD_QUERY), NULL, CAQueryDlgProc, 0);
|
||
if (!m_caQueryDlg)
|
||
{
|
||
ERROR_OUT(("Failed to create query message box from [%d]",
|
||
pasFrom->mcsID));
|
||
|
||
m_caQuery.pasReplyTo = NULL;
|
||
m_caQuery.mcsOrg = 0;
|
||
m_caQuery.msg = 0;
|
||
}
|
||
else
|
||
{
|
||
// Success
|
||
rc = TRUE;
|
||
}
|
||
}
|
||
|
||
DC_EXIT_POINT:
|
||
DebugExitBOOL(ASShare::CAStartQuery, rc);
|
||
return(rc);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CAFinishQuery()
|
||
//
|
||
// Called to finish the query we started, either because of UI or because
|
||
// we or the remote are unattended.
|
||
//
|
||
void ASShare::CAFinishQuery(UINT result)
|
||
{
|
||
CA30PENDING request;
|
||
|
||
DebugEntry(ASShare::CAFinishQuery);
|
||
|
||
ValidatePerson(m_caQuery.pasReplyTo);
|
||
|
||
// Make a copy of our request
|
||
request = m_caQuery;
|
||
|
||
//
|
||
// If we have a dialog up, destroy it NOW. Completing the request
|
||
// may cause us to be controlled or whatever. So get the dialog
|
||
// out of the way immediately.
|
||
//
|
||
// Note that destroying ourself will clear the request vars, hence the
|
||
// copy above.
|
||
//
|
||
if (m_caQueryDlg)
|
||
{
|
||
DestroyWindow(m_caQueryDlg);
|
||
}
|
||
else
|
||
{
|
||
m_caQuery.pasReplyTo = NULL;
|
||
m_caQuery.mcsOrg = 0;
|
||
m_caQuery.msg = 0;
|
||
}
|
||
|
||
switch (request.msg)
|
||
{
|
||
case CA_REQUEST_TAKECONTROL:
|
||
{
|
||
CACompleteRequestTakeControl(request.pasReplyTo,
|
||
&request.request.rtc, result);
|
||
break;
|
||
}
|
||
|
||
case CA_REQUEST_GIVECONTROL:
|
||
{
|
||
CACompleteRequestGiveControl(request.pasReplyTo,
|
||
&request.request.rgc, result);
|
||
break;
|
||
}
|
||
|
||
case CA_PREFER_PASSCONTROL:
|
||
{
|
||
CACompletePreferPassControl(request.pasReplyTo,
|
||
request.mcsOrg, &request.request.ppc, result);
|
||
break;
|
||
}
|
||
|
||
default:
|
||
{
|
||
ERROR_OUT(("Unrecognized query msg %d", request.msg));
|
||
break;
|
||
}
|
||
}
|
||
|
||
DebugExitVOID(ASShare::CAFinishQuery);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CA_QueryDlgProc()
|
||
//
|
||
// Handles querying user dialog
|
||
//
|
||
INT_PTR CALLBACK CAQueryDlgProc
|
||
(
|
||
HWND hwnd,
|
||
UINT message,
|
||
WPARAM wParam,
|
||
LPARAM lParam
|
||
)
|
||
{
|
||
return(g_asSession.pShare->CA_QueryDlgProc(hwnd, message, wParam, lParam));
|
||
}
|
||
|
||
|
||
|
||
BOOL ASShare::CA_QueryDlgProc
|
||
(
|
||
HWND hwnd,
|
||
UINT message,
|
||
WPARAM wParam,
|
||
LPARAM lParam
|
||
)
|
||
{
|
||
BOOL rc = TRUE;
|
||
|
||
DebugEntry(CA_QueryDlgProc);
|
||
|
||
switch (message)
|
||
{
|
||
case WM_INITDIALOG:
|
||
{
|
||
char szT[256];
|
||
char szRes[512];
|
||
char szShared[64];
|
||
UINT idsTitle;
|
||
ASPerson * pasT;
|
||
HDC hdc;
|
||
HFONT hfn;
|
||
RECT rc;
|
||
RECT rcOwner;
|
||
|
||
ValidatePerson(m_caQuery.pasReplyTo);
|
||
|
||
pasT = NULL;
|
||
|
||
// Set title.
|
||
ASSERT(m_caQuery.msg);
|
||
switch (m_caQuery.msg)
|
||
{
|
||
case CA_REQUEST_TAKECONTROL:
|
||
{
|
||
idsTitle = IDS_TITLE_QUERY_TAKECONTROL;
|
||
|
||
if (m_pasLocal->hetCount == HET_DESKTOPSHARED)
|
||
LoadString(g_asInstance, IDS_DESKTOP_LOWER, szShared, sizeof(szShared));
|
||
else
|
||
LoadString(g_asInstance, IDS_PROGRAMS_LOWER, szShared, sizeof(szShared));
|
||
|
||
LoadString(g_asInstance, IDS_MSG_QUERY_TAKECONTROL, szT, sizeof(szT));
|
||
|
||
wsprintf(szRes, szT, m_caQuery.pasReplyTo->scName, szShared);
|
||
break;
|
||
}
|
||
|
||
case CA_REQUEST_GIVECONTROL:
|
||
{
|
||
if (m_caQuery.pasReplyTo->hetCount == HET_DESKTOPSHARED)
|
||
LoadString(g_asInstance, IDS_DESKTOP_LOWER, szShared, sizeof(szShared));
|
||
else
|
||
LoadString(g_asInstance, IDS_PROGRAMS_LOWER, szShared, sizeof(szShared));
|
||
|
||
if (m_caQuery.request.rgc.mcsPassFrom)
|
||
{
|
||
pasT = SC_PersonFromNetID(m_caQuery.request.rgc.mcsPassFrom);
|
||
}
|
||
|
||
if (pasT)
|
||
{
|
||
idsTitle = IDS_TITLE_QUERY_YIELDCONTROL;
|
||
|
||
LoadString(g_asInstance, IDS_MSG_QUERY_YIELDCONTROL,
|
||
szT, sizeof(szT));
|
||
|
||
wsprintf(szRes, szT, pasT->scName, m_caQuery.pasReplyTo->scName, szShared);
|
||
}
|
||
else
|
||
{
|
||
idsTitle = IDS_TITLE_QUERY_GIVECONTROL;
|
||
|
||
LoadString(g_asInstance, IDS_MSG_QUERY_GIVECONTROL,
|
||
szT, sizeof(szT));
|
||
|
||
wsprintf(szRes, szT, m_caQuery.pasReplyTo->scName, szShared);
|
||
}
|
||
|
||
break;
|
||
}
|
||
|
||
case CA_PREFER_PASSCONTROL:
|
||
{
|
||
pasT = SC_PersonFromNetID(m_caQuery.mcsOrg);
|
||
ValidatePerson(pasT);
|
||
|
||
idsTitle = IDS_TITLE_QUERY_FORWARDCONTROL;
|
||
|
||
if (m_pasLocal->hetCount == HET_DESKTOPSHARED)
|
||
LoadString(g_asInstance, IDS_DESKTOP_LOWER, szShared, sizeof(szShared));
|
||
else
|
||
LoadString(g_asInstance, IDS_PROGRAMS_LOWER, szShared, sizeof(szShared));
|
||
|
||
LoadString(g_asInstance, IDS_MSG_QUERY_FORWARDCONTROL, szT, sizeof(szT));
|
||
|
||
wsprintf(szRes, szT, pasT->scName, szShared, m_caQuery.pasReplyTo->scName);
|
||
|
||
break;
|
||
}
|
||
|
||
default:
|
||
{
|
||
ERROR_OUT(("Bogus m_caQuery.msg %d", m_caQuery.msg));
|
||
break;
|
||
}
|
||
}
|
||
|
||
LoadString(g_asInstance, idsTitle, szT, sizeof(szT));
|
||
SetWindowText(hwnd, szT);
|
||
|
||
// Set message.
|
||
SetDlgItemText(hwnd, CTRL_QUERY, szRes);
|
||
|
||
// Center the message vertically
|
||
GetWindowRect(GetDlgItem(hwnd, CTRL_QUERY), &rcOwner);
|
||
MapWindowPoints(NULL, hwnd, (LPPOINT)&rcOwner, 2);
|
||
|
||
rc = rcOwner;
|
||
|
||
hdc = GetDC(hwnd);
|
||
hfn = (HFONT)SendDlgItemMessage(hwnd, CTRL_QUERY, WM_GETFONT, 0, 0);
|
||
hfn = SelectFont(hdc, hfn);
|
||
|
||
DrawText(hdc, szRes, -1, &rc, DT_NOCLIP | DT_EXPANDTABS |
|
||
DT_NOPREFIX | DT_WORDBREAK | DT_CALCRECT);
|
||
|
||
SelectFont(hdc, hfn);
|
||
ReleaseDC(hwnd, hdc);
|
||
|
||
ASSERT((rc.bottom - rc.top) <= (rcOwner.bottom - rcOwner.top));
|
||
|
||
SetWindowPos(GetDlgItem(hwnd, CTRL_QUERY), NULL,
|
||
rcOwner.left,
|
||
((rcOwner.top + rcOwner.bottom) - (rc.bottom - rc.top)) / 2,
|
||
(rcOwner.right - rcOwner.left),
|
||
rc.bottom - rc.top,
|
||
SWP_NOACTIVATE | SWP_NOZORDER);
|
||
|
||
SetTimer(hwnd, IDT_CAQUERY, PERIOD_CAQUERY, 0);
|
||
|
||
//
|
||
// Show window, the user will handle
|
||
//
|
||
ShowWindow(hwnd, SW_SHOWNORMAL);
|
||
SetForegroundWindow(hwnd);
|
||
UpdateWindow(hwnd);
|
||
|
||
break;
|
||
}
|
||
|
||
case WM_COMMAND:
|
||
{
|
||
switch (GET_WM_COMMAND_ID(wParam, lParam))
|
||
{
|
||
case IDOK:
|
||
{
|
||
CAFinishQuery(CARESULT_CONFIRMED);
|
||
break;
|
||
}
|
||
|
||
case IDCANCEL:
|
||
{
|
||
CAFinishQuery(CARESULT_DENIED_USER);
|
||
break;
|
||
}
|
||
}
|
||
break;
|
||
}
|
||
|
||
case WM_TIMER:
|
||
{
|
||
if (wParam != IDT_CAQUERY)
|
||
{
|
||
rc = FALSE;
|
||
}
|
||
else
|
||
{
|
||
KillTimer(hwnd, IDT_CAQUERY);
|
||
|
||
// Timed out failure.
|
||
CAFinishQuery(CARESULT_DENIED_TIMEDOUT);
|
||
}
|
||
break;
|
||
}
|
||
|
||
case WM_DESTROY:
|
||
{
|
||
//
|
||
// Clear pending info
|
||
//
|
||
m_caQueryDlg = NULL;
|
||
m_caQuery.pasReplyTo = NULL;
|
||
m_caQuery.mcsOrg = 0;
|
||
m_caQuery.msg = 0;
|
||
break;
|
||
}
|
||
|
||
default:
|
||
{
|
||
rc = FALSE;
|
||
break;
|
||
}
|
||
}
|
||
|
||
DebugExitBOOL(CA_QueryDlgProc, rc);
|
||
return(rc);
|
||
}
|
||
|
||
|
||
|
||
//
|
||
// CACancelQuery()
|
||
//
|
||
// If a dialog is up for a take control request, it hasn't been handled yet,
|
||
// and we get a cancel notification from the viewer, we need to take the
|
||
// dialog down WITHOUT generating a response packet.
|
||
//
|
||
void ASShare::CACancelQuery
|
||
(
|
||
ASPerson * pasFrom,
|
||
BOOL fPacket
|
||
)
|
||
{
|
||
DebugEntry(ASShare::CACancelQuery);
|
||
|
||
ASSERT(m_caQueryDlg);
|
||
ASSERT(m_caQuery.pasReplyTo == pasFrom);
|
||
|
||
if (fPacket)
|
||
{
|
||
// This will send a packet then destroy the dialog
|
||
CAFinishQuery(CARESULT_DENIED);
|
||
}
|
||
else
|
||
{
|
||
// Destroy the dialog
|
||
DestroyWindow(m_caQueryDlg);
|
||
}
|
||
|
||
ASSERT(!m_caQueryDlg);
|
||
ASSERT(!m_caQuery.pasReplyTo);
|
||
ASSERT(!m_caQuery.msg);
|
||
|
||
DebugExitVOID(ASShare::CACancelQuery);
|
||
}
|
||
|