Network.c 448 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120111211112211123111241112511126111271112811129111301113111132111331113411135111361113711138111391114011141111421114311144111451114611147111481114911150111511115211153111541115511156111571115811159111601116111162111631116411165111661116711168111691117011171111721117311174111751117611177111781117911180111811118211183111841118511186111871118811189111901119111192111931119411195111961119711198111991120011201112021120311204112051120611207112081120911210112111121211213112141121511216112171121811219112201122111222112231122411225112261122711228112291123011231112321123311234112351123611237112381123911240112411124211243112441124511246112471124811249112501125111252112531125411255112561125711258112591126011261112621126311264112651126611267112681126911270112711127211273112741127511276112771127811279112801128111282112831128411285112861128711288112891129011291112921129311294112951129611297112981129911300113011130211303113041130511306113071130811309113101131111312113131131411315113161131711318113191132011321113221132311324113251132611327113281132911330113311133211333113341133511336113371133811339113401134111342113431134411345113461134711348113491135011351113521135311354113551135611357113581135911360113611136211363113641136511366113671136811369113701137111372113731137411375113761137711378113791138011381113821138311384113851138611387113881138911390113911139211393113941139511396113971139811399114001140111402114031140411405114061140711408114091141011411114121141311414114151141611417114181141911420114211142211423114241142511426114271142811429114301143111432114331143411435114361143711438114391144011441114421144311444114451144611447114481144911450114511145211453114541145511456114571145811459114601146111462114631146411465114661146711468114691147011471114721147311474114751147611477114781147911480114811148211483114841148511486114871148811489114901149111492114931149411495114961149711498114991150011501115021150311504115051150611507115081150911510115111151211513115141151511516115171151811519115201152111522115231152411525115261152711528115291153011531115321153311534115351153611537115381153911540115411154211543115441154511546115471154811549115501155111552115531155411555115561155711558115591156011561115621156311564115651156611567115681156911570115711157211573115741157511576115771157811579115801158111582115831158411585115861158711588115891159011591115921159311594115951159611597115981159911600116011160211603116041160511606116071160811609116101161111612116131161411615116161161711618116191162011621116221162311624116251162611627116281162911630116311163211633116341163511636116371163811639116401164111642116431164411645116461164711648116491165011651116521165311654116551165611657116581165911660116611166211663116641166511666116671166811669116701167111672116731167411675116761167711678116791168011681116821168311684116851168611687116881168911690116911169211693116941169511696116971169811699117001170111702117031170411705117061170711708117091171011711117121171311714117151171611717117181171911720117211172211723117241172511726117271172811729117301173111732117331173411735117361173711738117391174011741117421174311744117451174611747117481174911750117511175211753117541175511756117571175811759117601176111762117631176411765117661176711768117691177011771117721177311774117751177611777117781177911780117811178211783117841178511786117871178811789117901179111792117931179411795117961179711798117991180011801118021180311804118051180611807118081180911810118111181211813118141181511816118171181811819118201182111822118231182411825118261182711828118291183011831118321183311834118351183611837118381183911840118411184211843118441184511846118471184811849118501185111852118531185411855118561185711858118591186011861118621186311864118651186611867118681186911870118711187211873118741187511876118771187811879118801188111882118831188411885118861188711888118891189011891118921189311894118951189611897118981189911900119011190211903119041190511906119071190811909119101191111912119131191411915119161191711918119191192011921119221192311924119251192611927119281192911930119311193211933119341193511936119371193811939119401194111942119431194411945119461194711948119491195011951119521195311954119551195611957119581195911960119611196211963119641196511966119671196811969119701197111972119731197411975119761197711978119791198011981119821198311984119851198611987119881198911990119911199211993119941199511996119971199811999120001200112002120031200412005120061200712008120091201012011120121201312014120151201612017120181201912020120211202212023120241202512026120271202812029120301203112032120331203412035120361203712038120391204012041120421204312044120451204612047120481204912050120511205212053120541205512056120571205812059120601206112062120631206412065120661206712068120691207012071120721207312074120751207612077120781207912080120811208212083120841208512086120871208812089120901209112092120931209412095120961209712098120991210012101121021210312104121051210612107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122521225312254122551225612257122581225912260122611226212263122641226512266122671226812269122701227112272122731227412275122761227712278122791228012281122821228312284122851228612287122881228912290122911229212293122941229512296122971229812299123001230112302123031230412305123061230712308123091231012311123121231312314123151231612317123181231912320123211232212323123241232512326123271232812329123301233112332123331233412335123361233712338123391234012341123421234312344123451234612347123481234912350123511235212353123541235512356123571235812359123601236112362123631236412365123661236712368123691237012371123721237312374123751237612377123781237912380123811238212383123841238512386123871238812389123901239112392123931239412395123961239712398123991240012401124021240312404124051240612407124081240912410124111241212413124141241512416124171241812419124201242112422124231242412425124261242712428124291243012431124321243312434124351243612437124381243912440124411244212443124441244512446124471244812449124501245112452124531245412455124561245712458124591246012461124621246312464124651246612467124681246912470124711247212473124741247512476124771247812479124801248112482124831248412485124861248712488124891249012491124921249312494124951249612497124981249912500125011250212503125041250512506125071250812509125101251112512125131251412515125161251712518125191252012521125221252312524125251252612527125281252912530125311253212533125341253512536125371253812539125401254112542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590125911259212593125941259512596125971259812599126001260112602126031260412605126061260712608126091261012611126121261312614126151261612617126181261912620126211262212623126241262512626126271262812629126301263112632126331263412635126361263712638126391264012641126421264312644126451264612647126481264912650126511265212653126541265512656126571265812659126601266112662126631266412665126661266712668126691267012671126721267312674126751267612677126781267912680126811268212683126841268512686126871268812689126901269112692126931269412695126961269712698126991270012701127021270312704127051270612707127081270912710127111271212713127141271512716127171271812719127201272112722127231272412725127261272712728127291273012731127321273312734127351273612737127381273912740127411274212743127441274512746127471274812749127501275112752127531275412755127561275712758127591276012761127621276312764127651276612767127681276912770127711277212773127741277512776127771277812779127801278112782127831278412785127861278712788127891279012791127921279312794127951279612797127981279912800128011280212803128041280512806128071280812809128101281112812128131281412815128161281712818128191282012821128221282312824128251282612827128281282912830128311283212833128341283512836128371283812839128401284112842128431284412845128461284712848128491285012851128521285312854128551285612857128581285912860128611286212863128641286512866128671286812869128701287112872128731287412875128761287712878128791288012881128821288312884128851288612887128881288912890128911289212893128941289512896128971289812899129001290112902129031290412905129061290712908129091291012911129121291312914129151291612917129181291912920129211292212923129241292512926129271292812929129301293112932129331293412935129361293712938129391294012941129421294312944129451294612947129481294912950129511295212953129541295512956129571295812959129601296112962129631296412965129661296712968129691297012971129721297312974129751297612977129781297912980129811298212983129841298512986129871298812989129901299112992129931299412995129961299712998129991300013001130021300313004130051300613007130081300913010130111301213013130141301513016130171301813019130201302113022130231302413025130261302713028130291303013031130321303313034130351303613037130381303913040130411304213043130441304513046130471304813049130501305113052130531305413055130561305713058130591306013061130621306313064130651306613067130681306913070130711307213073130741307513076130771307813079130801308113082130831308413085130861308713088130891309013091130921309313094130951309613097130981309913100131011310213103131041310513106131071310813109131101311113112131131311413115131161311713118131191312013121131221312313124131251312613127131281312913130131311313213133131341313513136131371313813139131401314113142131431314413145131461314713148131491315013151131521315313154131551315613157131581315913160131611316213163131641316513166131671316813169131701317113172131731317413175131761317713178131791318013181131821318313184131851318613187131881318913190131911319213193131941319513196131971319813199132001320113202132031320413205132061320713208132091321013211132121321313214132151321613217132181321913220132211322213223132241322513226132271322813229132301323113232132331323413235132361323713238132391324013241132421324313244132451324613247132481324913250132511325213253132541325513256132571325813259132601326113262132631326413265132661326713268132691327013271132721327313274132751327613277132781327913280132811328213283132841328513286132871328813289132901329113292132931329413295132961329713298132991330013301133021330313304133051330613307133081330913310133111331213313133141331513316133171331813319133201332113322133231332413325133261332713328133291333013331133321333313334133351333613337133381333913340133411334213343133441334513346133471334813349133501335113352133531335413355133561335713358133591336013361133621336313364133651336613367133681336913370133711337213373133741337513376133771337813379133801338113382133831338413385133861338713388133891339013391133921339313394133951339613397133981339913400134011340213403134041340513406134071340813409134101341113412134131341413415134161341713418134191342013421134221342313424134251342613427134281342913430134311343213433134341343513436134371343813439134401344113442134431344413445134461344713448134491345013451134521345313454134551345613457134581345913460134611346213463134641346513466134671346813469134701347113472134731347413475134761347713478134791348013481134821348313484134851348613487134881348913490134911349213493134941349513496134971349813499135001350113502135031350413505135061350713508135091351013511135121351313514135151351613517135181351913520135211352213523135241352513526135271352813529135301353113532135331353413535135361353713538135391354013541135421354313544135451354613547135481354913550135511355213553135541355513556135571355813559135601356113562135631356413565135661356713568135691357013571135721357313574135751357613577135781357913580135811358213583135841358513586135871358813589135901359113592135931359413595135961359713598135991360013601136021360313604136051360613607136081360913610136111361213613136141361513616136171361813619136201362113622136231362413625136261362713628136291363013631136321363313634136351363613637136381363913640136411364213643136441364513646136471364813649136501365113652136531365413655136561365713658136591366013661136621366313664136651366613667136681366913670136711367213673136741367513676136771367813679136801368113682136831368413685136861368713688136891369013691136921369313694136951369613697136981369913700137011370213703137041370513706137071370813709137101371113712137131371413715137161371713718137191372013721137221372313724137251372613727137281372913730137311373213733137341373513736137371373813739137401374113742137431374413745137461374713748137491375013751137521375313754137551375613757137581375913760137611376213763137641376513766137671376813769137701377113772137731377413775137761377713778137791378013781137821378313784137851378613787137881378913790137911379213793137941379513796137971379813799138001380113802138031380413805138061380713808138091381013811138121381313814138151381613817138181381913820138211382213823138241382513826138271382813829138301383113832138331383413835138361383713838138391384013841138421384313844138451384613847138481384913850138511385213853138541385513856138571385813859138601386113862138631386413865138661386713868138691387013871138721387313874138751387613877138781387913880138811388213883138841388513886138871388813889138901389113892138931389413895138961389713898138991390013901139021390313904139051390613907139081390913910139111391213913139141391513916139171391813919139201392113922139231392413925139261392713928139291393013931139321393313934139351393613937139381393913940139411394213943139441394513946139471394813949139501395113952139531395413955139561395713958139591396013961139621396313964139651396613967139681396913970139711397213973139741397513976139771397813979139801398113982139831398413985139861398713988139891399013991139921399313994139951399613997139981399914000140011400214003140041400514006140071400814009140101401114012140131401414015140161401714018140191402014021140221402314024140251402614027140281402914030140311403214033140341403514036140371403814039140401404114042140431404414045140461404714048140491405014051140521405314054140551405614057140581405914060140611406214063140641406514066140671406814069140701407114072140731407414075140761407714078140791408014081140821408314084140851408614087140881408914090140911409214093140941409514096140971409814099141001410114102141031410414105141061410714108141091411014111141121411314114141151411614117141181411914120141211412214123141241412514126141271412814129141301413114132141331413414135141361413714138141391414014141141421414314144141451414614147141481414914150141511415214153141541415514156141571415814159141601416114162141631416414165141661416714168141691417014171141721417314174141751417614177141781417914180141811418214183141841418514186141871418814189141901419114192141931419414195141961419714198141991420014201142021420314204142051420614207142081420914210142111421214213142141421514216142171421814219142201422114222142231422414225142261422714228142291423014231142321423314234142351423614237142381423914240142411424214243142441424514246142471424814249142501425114252142531425414255142561425714258142591426014261142621426314264142651426614267142681426914270142711427214273142741427514276142771427814279142801428114282142831428414285142861428714288142891429014291142921429314294142951429614297142981429914300143011430214303143041430514306143071430814309143101431114312143131431414315143161431714318143191432014321143221432314324143251432614327143281432914330143311433214333143341433514336143371433814339143401434114342143431434414345143461434714348143491435014351143521435314354143551435614357143581435914360143611436214363143641436514366143671436814369143701437114372143731437414375143761437714378143791438014381143821438314384143851438614387143881438914390143911439214393143941439514396143971439814399144001440114402144031440414405144061440714408144091441014411144121441314414144151441614417144181441914420144211442214423144241442514426144271442814429144301443114432144331443414435144361443714438144391444014441144421444314444144451444614447144481444914450144511445214453144541445514456144571445814459144601446114462144631446414465144661446714468144691447014471144721447314474144751447614477144781447914480144811448214483144841448514486144871448814489144901449114492144931449414495144961449714498144991450014501145021450314504145051450614507145081450914510145111451214513145141451514516145171451814519145201452114522145231452414525145261452714528145291453014531145321453314534145351453614537145381453914540145411454214543145441454514546145471454814549145501455114552145531455414555145561455714558145591456014561145621456314564145651456614567145681456914570145711457214573145741457514576145771457814579145801458114582145831458414585145861458714588145891459014591145921459314594145951459614597145981459914600146011460214603146041460514606146071460814609146101461114612146131461414615146161461714618146191462014621146221462314624146251462614627146281462914630146311463214633146341463514636146371463814639146401464114642146431464414645146461464714648146491465014651146521465314654146551465614657146581465914660146611466214663146641466514666146671466814669146701467114672146731467414675146761467714678146791468014681146821468314684146851468614687146881468914690146911469214693146941469514696146971469814699147001470114702147031470414705147061470714708147091471014711147121471314714147151471614717147181471914720147211472214723147241472514726147271472814729147301473114732147331473414735147361473714738147391474014741147421474314744147451474614747147481474914750147511475214753147541475514756147571475814759147601476114762147631476414765147661476714768147691477014771147721477314774147751477614777147781477914780147811478214783147841478514786147871478814789147901479114792147931479414795147961479714798147991480014801148021480314804148051480614807148081480914810148111481214813148141481514816148171481814819148201482114822148231482414825148261482714828148291483014831148321483314834148351483614837148381483914840148411484214843148441484514846148471484814849148501485114852148531485414855148561485714858148591486014861148621486314864148651486614867148681486914870148711487214873148741487514876148771487814879148801488114882148831488414885148861488714888148891489014891148921489314894148951489614897148981489914900149011490214903149041490514906149071490814909149101491114912149131491414915149161491714918149191492014921149221492314924149251492614927149281492914930149311493214933149341493514936149371493814939149401494114942149431494414945149461494714948149491495014951149521495314954149551495614957149581495914960149611496214963149641496514966149671496814969149701497114972149731497414975149761497714978149791498014981149821498314984149851498614987149881498914990149911499214993149941499514996149971499814999150001500115002150031500415005150061500715008150091501015011150121501315014150151501615017150181501915020150211502215023150241502515026150271502815029150301503115032150331503415035150361503715038150391504015041150421504315044150451504615047150481504915050150511505215053150541505515056150571505815059150601506115062150631506415065150661506715068150691507015071150721507315074150751507615077150781507915080150811508215083150841508515086150871508815089150901509115092150931509415095150961509715098150991510015101151021510315104151051510615107151081510915110151111511215113151141511515116151171511815119151201512115122151231512415125151261512715128151291513015131151321513315134151351513615137151381513915140151411514215143151441514515146151471514815149151501515115152151531515415155151561515715158151591516015161151621516315164151651516615167151681516915170151711517215173151741517515176151771517815179151801518115182151831518415185151861518715188151891519015191151921519315194151951519615197151981519915200152011520215203152041520515206152071520815209152101521115212152131521415215152161521715218152191522015221152221522315224152251522615227152281522915230152311523215233152341523515236152371523815239152401524115242152431524415245152461524715248152491525015251152521525315254152551525615257152581525915260152611526215263152641526515266152671526815269152701527115272152731527415275152761527715278152791528015281152821528315284152851528615287152881528915290152911529215293152941529515296152971529815299153001530115302153031530415305153061530715308153091531015311153121531315314153151531615317153181531915320153211532215323153241532515326153271532815329153301533115332153331533415335153361533715338153391534015341153421534315344153451534615347153481534915350153511535215353153541535515356153571535815359153601536115362153631536415365153661536715368153691537015371153721537315374153751537615377153781537915380153811538215383153841538515386153871538815389153901539115392153931539415395153961539715398153991540015401154021540315404154051540615407154081540915410154111541215413154141541515416154171541815419154201542115422154231542415425154261542715428154291543015431154321543315434154351543615437154381543915440154411544215443154441544515446154471544815449154501545115452154531545415455154561545715458154591546015461154621546315464154651546615467154681546915470154711547215473154741547515476154771547815479154801548115482154831548415485154861548715488154891549015491154921549315494154951549615497154981549915500155011550215503155041550515506155071550815509155101551115512155131551415515155161551715518155191552015521155221552315524155251552615527155281552915530155311553215533155341553515536155371553815539155401554115542155431554415545155461554715548155491555015551155521555315554155551555615557155581555915560155611556215563155641556515566155671556815569155701557115572155731557415575155761557715578155791558015581155821558315584155851558615587155881558915590155911559215593155941559515596155971559815599156001560115602156031560415605156061560715608156091561015611156121561315614156151561615617156181561915620156211562215623156241562515626156271562815629156301563115632156331563415635156361563715638156391564015641156421564315644156451564615647156481564915650156511565215653156541565515656156571565815659156601566115662156631566415665156661566715668156691567015671156721567315674156751567615677156781567915680156811568215683156841568515686156871568815689156901569115692156931569415695156961569715698156991570015701157021570315704157051570615707157081570915710157111571215713157141571515716157171571815719157201572115722157231572415725157261572715728157291573015731157321573315734157351573615737157381573915740157411574215743157441574515746157471574815749157501575115752157531575415755157561575715758157591576015761157621576315764157651576615767157681576915770157711577215773157741577515776157771577815779157801578115782157831578415785157861578715788157891579015791157921579315794157951579615797157981579915800158011580215803158041580515806158071580815809158101581115812158131581415815158161581715818158191582015821158221582315824158251582615827158281582915830158311583215833158341583515836158371583815839158401584115842158431584415845158461584715848158491585015851158521585315854158551585615857158581585915860158611586215863158641586515866158671586815869158701587115872158731587415875158761587715878158791588015881158821588315884158851588615887158881588915890158911589215893158941589515896158971589815899159001590115902159031590415905159061590715908159091591015911159121591315914159151591615917159181591915920159211592215923159241592515926159271592815929159301593115932159331593415935159361593715938159391594015941159421594315944159451594615947159481594915950159511595215953159541595515956159571595815959159601596115962159631596415965159661596715968159691597015971159721597315974159751597615977159781597915980159811598215983159841598515986159871598815989159901599115992159931599415995159961599715998159991600016001160021600316004160051600616007160081600916010160111601216013160141601516016160171601816019160201602116022160231602416025160261602716028160291603016031160321603316034160351603616037160381603916040160411604216043160441604516046160471604816049160501605116052160531605416055160561605716058160591606016061160621606316064160651606616067160681606916070160711607216073160741607516076160771607816079160801608116082160831608416085160861608716088160891609016091160921609316094160951609616097160981609916100161011610216103161041610516106161071610816109161101611116112161131611416115161161611716118161191612016121161221612316124161251612616127161281612916130161311613216133161341613516136161371613816139161401614116142161431614416145161461614716148161491615016151161521615316154161551615616157161581615916160161611616216163161641616516166161671616816169161701617116172161731617416175161761617716178161791618016181161821618316184161851618616187161881618916190161911619216193161941619516196161971619816199162001620116202162031620416205162061620716208162091621016211162121621316214162151621616217162181621916220162211622216223162241622516226162271622816229162301623116232162331623416235162361623716238162391624016241162421624316244162451624616247162481624916250162511625216253162541625516256162571625816259162601626116262162631626416265162661626716268162691627016271162721627316274162751627616277162781627916280162811628216283162841628516286162871628816289162901629116292162931629416295162961629716298162991630016301163021630316304163051630616307163081630916310163111631216313163141631516316163171631816319163201632116322163231632416325163261632716328163291633016331163321633316334163351633616337163381633916340163411634216343163441634516346163471634816349163501635116352163531635416355163561635716358163591636016361163621636316364163651636616367163681636916370163711637216373163741637516376163771637816379163801638116382163831638416385163861638716388163891639016391163921639316394163951639616397163981639916400164011640216403164041640516406164071640816409164101641116412164131641416415164161641716418164191642016421164221642316424164251642616427164281642916430164311643216433164341643516436164371643816439164401644116442164431644416445164461644716448164491645016451164521645316454164551645616457164581645916460164611646216463164641646516466164671646816469164701647116472164731647416475164761647716478164791648016481164821648316484164851648616487164881648916490164911649216493164941649516496164971649816499165001650116502165031650416505165061650716508165091651016511165121651316514165151651616517165181651916520165211652216523165241652516526165271652816529165301653116532165331653416535165361653716538165391654016541165421654316544165451654616547165481654916550165511655216553165541655516556165571655816559165601656116562165631656416565165661656716568165691657016571165721657316574165751657616577165781657916580165811658216583165841658516586165871658816589165901659116592165931659416595165961659716598165991660016601166021660316604166051660616607166081660916610166111661216613166141661516616166171661816619166201662116622166231662416625166261662716628166291663016631166321663316634166351663616637166381663916640166411664216643166441664516646166471664816649166501665116652166531665416655166561665716658166591666016661166621666316664166651666616667166681666916670166711667216673166741667516676166771667816679166801668116682166831668416685166861668716688166891669016691166921669316694166951669616697166981669916700167011670216703167041670516706167071670816709167101671116712167131671416715167161671716718167191672016721167221672316724167251672616727167281672916730167311673216733167341673516736167371673816739167401674116742167431674416745167461674716748167491675016751167521675316754167551675616757167581675916760167611676216763167641676516766167671676816769167701677116772167731677416775167761677716778167791678016781167821678316784167851678616787167881678916790167911679216793167941679516796167971679816799168001680116802168031680416805168061680716808168091681016811168121681316814168151681616817168181681916820168211682216823168241682516826168271682816829168301683116832168331683416835168361683716838168391684016841168421684316844168451684616847168481684916850168511685216853168541685516856168571685816859168601686116862168631686416865168661686716868168691687016871168721687316874168751687616877168781687916880168811688216883168841688516886168871688816889168901689116892168931689416895168961689716898168991690016901169021690316904169051690616907169081690916910169111691216913169141691516916169171691816919169201692116922169231692416925169261692716928169291693016931169321693316934169351693616937169381693916940169411694216943169441694516946169471694816949169501695116952169531695416955169561695716958169591696016961169621696316964169651696616967169681696916970169711697216973169741697516976169771697816979169801698116982169831698416985169861698716988169891699016991169921699316994169951699616997169981699917000170011700217003170041700517006170071700817009170101701117012170131701417015170161701717018170191702017021170221702317024170251702617027170281702917030170311703217033170341703517036170371703817039170401704117042170431704417045170461704717048170491705017051170521705317054170551705617057170581705917060170611706217063170641706517066170671706817069170701707117072170731707417075170761707717078170791708017081170821708317084170851708617087170881708917090170911709217093170941709517096170971709817099171001710117102171031710417105171061710717108171091711017111171121711317114171151711617117171181711917120171211712217123171241712517126171271712817129171301713117132171331713417135171361713717138171391714017141171421714317144171451714617147171481714917150171511715217153171541715517156171571715817159171601716117162171631716417165171661716717168171691717017171171721717317174171751717617177171781717917180171811718217183171841718517186171871718817189171901719117192171931719417195171961719717198171991720017201172021720317204172051720617207172081720917210172111721217213172141721517216172171721817219172201722117222172231722417225172261722717228172291723017231172321723317234172351723617237172381723917240172411724217243172441724517246172471724817249172501725117252172531725417255172561725717258172591726017261172621726317264172651726617267172681726917270172711727217273172741727517276172771727817279172801728117282172831728417285172861728717288172891729017291172921729317294172951729617297172981729917300173011730217303173041730517306173071730817309173101731117312173131731417315173161731717318173191732017321173221732317324173251732617327173281732917330173311733217333173341733517336173371733817339173401734117342173431734417345173461734717348173491735017351173521735317354173551735617357173581735917360173611736217363173641736517366173671736817369173701737117372173731737417375173761737717378173791738017381173821738317384173851738617387173881738917390173911739217393173941739517396173971739817399174001740117402174031740417405174061740717408174091741017411174121741317414174151741617417174181741917420174211742217423174241742517426174271742817429174301743117432174331743417435174361743717438174391744017441174421744317444174451744617447174481744917450174511745217453174541745517456174571745817459174601746117462174631746417465174661746717468174691747017471174721747317474174751747617477174781747917480174811748217483174841748517486174871748817489174901749117492174931749417495174961749717498174991750017501175021750317504175051750617507175081750917510175111751217513175141751517516175171751817519175201752117522175231752417525175261752717528175291753017531175321753317534175351753617537175381753917540175411754217543175441754517546175471754817549175501755117552175531755417555175561755717558175591756017561175621756317564175651756617567175681756917570175711757217573175741757517576175771757817579175801758117582175831758417585175861758717588175891759017591175921759317594175951759617597175981759917600176011760217603176041760517606176071760817609176101761117612176131761417615176161761717618176191762017621176221762317624176251762617627176281762917630176311763217633176341763517636176371763817639176401764117642176431764417645176461764717648176491765017651176521765317654176551765617657176581765917660176611766217663176641766517666176671766817669176701767117672176731767417675176761767717678176791768017681176821768317684176851768617687176881768917690176911769217693176941769517696176971769817699177001770117702177031770417705177061770717708177091771017711177121771317714177151771617717177181771917720177211772217723177241772517726177271772817729177301773117732177331773417735177361773717738177391774017741177421774317744177451774617747177481774917750177511775217753177541775517756177571775817759177601776117762177631776417765177661776717768177691777017771177721777317774177751777617777177781777917780177811778217783177841778517786177871778817789177901779117792177931779417795177961779717798177991780017801178021780317804178051780617807178081780917810178111781217813178141781517816178171781817819178201782117822178231782417825178261782717828178291783017831178321783317834178351783617837178381783917840178411784217843178441784517846178471784817849178501785117852178531785417855178561785717858178591786017861178621786317864178651786617867178681786917870178711787217873178741787517876178771787817879178801788117882178831788417885178861788717888178891789017891178921789317894178951789617897178981789917900179011790217903179041790517906179071790817909179101791117912179131791417915179161791717918179191792017921179221792317924179251792617927179281792917930179311793217933179341793517936179371793817939179401794117942179431794417945179461794717948179491795017951179521795317954179551795617957179581795917960179611796217963179641796517966179671796817969179701797117972179731797417975179761797717978179791798017981179821798317984179851798617987179881798917990179911799217993179941799517996179971799817999180001800118002180031800418005180061800718008180091801018011180121801318014180151801618017180181801918020180211802218023180241802518026180271802818029180301803118032180331803418035180361803718038180391804018041180421804318044180451804618047180481804918050180511805218053180541805518056180571805818059180601806118062180631806418065180661806718068180691807018071180721807318074180751807618077180781807918080180811808218083180841808518086180871808818089180901809118092180931809418095180961809718098180991810018101181021810318104181051810618107181081810918110181111811218113181141811518116181171811818119181201812118122181231812418125181261812718128181291813018131181321813318134181351813618137181381813918140181411814218143181441814518146181471814818149181501815118152181531815418155181561815718158181591816018161181621816318164181651816618167181681816918170181711817218173181741817518176181771817818179181801818118182181831818418185181861818718188181891819018191181921819318194181951819618197181981819918200182011820218203182041820518206182071820818209182101821118212182131821418215182161821718218182191822018221182221822318224182251822618227182281822918230182311823218233182341823518236182371823818239182401824118242182431824418245182461824718248182491825018251182521825318254182551825618257182581825918260182611826218263182641826518266182671826818269182701827118272182731827418275182761827718278182791828018281182821828318284182851828618287182881828918290182911829218293182941829518296182971829818299183001830118302183031830418305183061830718308183091831018311183121831318314183151831618317183181831918320183211832218323183241832518326183271832818329183301833118332183331833418335183361833718338183391834018341183421834318344183451834618347183481834918350183511835218353183541835518356183571835818359183601836118362183631836418365183661836718368183691837018371183721837318374183751837618377183781837918380183811838218383183841838518386183871838818389183901839118392183931839418395183961839718398183991840018401184021840318404184051840618407184081840918410184111841218413184141841518416184171841818419184201842118422184231842418425184261842718428184291843018431184321843318434184351843618437184381843918440184411844218443184441844518446184471844818449184501845118452184531845418455184561845718458184591846018461184621846318464184651846618467184681846918470184711847218473184741847518476184771847818479184801848118482184831848418485184861848718488184891849018491184921849318494184951849618497184981849918500185011850218503185041850518506185071850818509185101851118512185131851418515185161851718518185191852018521185221852318524185251852618527185281852918530185311853218533185341853518536185371853818539185401854118542185431854418545185461854718548185491855018551185521855318554185551855618557185581855918560185611856218563185641856518566185671856818569185701857118572185731857418575185761857718578185791858018581185821858318584185851858618587185881858918590185911859218593185941859518596185971859818599186001860118602186031860418605186061860718608186091861018611186121861318614186151861618617186181861918620186211862218623186241862518626186271862818629186301863118632186331863418635186361863718638186391864018641186421864318644186451864618647186481864918650186511865218653186541865518656186571865818659186601866118662186631866418665186661866718668186691867018671186721867318674186751867618677186781867918680186811868218683186841868518686186871868818689186901869118692186931869418695186961869718698186991870018701187021870318704187051870618707187081870918710187111871218713187141871518716187171871818719187201872118722187231872418725187261872718728187291873018731187321873318734187351873618737187381873918740187411874218743187441874518746187471874818749187501875118752187531875418755187561875718758187591876018761187621876318764187651876618767187681876918770187711877218773187741877518776187771877818779187801878118782187831878418785187861878718788187891879018791187921879318794187951879618797187981879918800188011880218803188041880518806188071880818809188101881118812188131881418815188161881718818188191882018821188221882318824188251882618827188281882918830188311883218833188341883518836188371883818839188401884118842188431884418845188461884718848188491885018851188521885318854188551885618857188581885918860188611886218863188641886518866188671886818869188701887118872188731887418875188761887718878188791888018881188821888318884188851888618887188881888918890188911889218893188941889518896188971889818899189001890118902189031890418905189061890718908189091891018911189121891318914189151891618917189181891918920189211892218923189241892518926189271892818929189301893118932189331893418935189361893718938189391894018941189421894318944189451894618947189481894918950189511895218953189541895518956189571895818959189601896118962189631896418965189661896718968189691897018971189721897318974189751897618977189781897918980189811898218983189841898518986189871898818989189901899118992189931899418995189961899718998189991900019001190021900319004190051900619007190081900919010190111901219013190141901519016190171901819019190201902119022190231902419025190261902719028190291903019031190321903319034190351903619037190381903919040190411904219043190441904519046190471904819049190501905119052190531905419055190561905719058190591906019061190621906319064190651906619067190681906919070190711907219073190741907519076190771907819079190801908119082190831908419085190861908719088190891909019091190921909319094190951909619097190981909919100191011910219103191041910519106191071910819109191101911119112191131911419115191161911719118191191912019121191221912319124191251912619127191281912919130191311913219133191341913519136191371913819139191401914119142191431914419145191461914719148191491915019151191521915319154191551915619157191581915919160191611916219163191641916519166191671916819169191701917119172191731917419175191761917719178191791918019181191821918319184191851918619187191881918919190191911919219193191941919519196191971919819199192001920119202192031920419205192061920719208192091921019211192121921319214192151921619217192181921919220192211922219223192241922519226192271922819229192301923119232192331923419235192361923719238192391924019241192421924319244192451924619247192481924919250192511925219253192541925519256192571925819259192601926119262192631926419265192661926719268192691927019271192721927319274192751927619277192781927919280192811928219283192841928519286192871928819289192901929119292192931929419295192961929719298192991930019301193021930319304193051930619307193081930919310193111931219313193141931519316193171931819319193201932119322193231932419325193261932719328193291933019331193321933319334193351933619337193381933919340193411934219343193441934519346193471934819349193501935119352193531935419355193561935719358193591936019361193621936319364193651936619367193681936919370193711937219373193741937519376193771937819379193801938119382193831938419385193861938719388193891939019391193921939319394193951939619397193981939919400194011940219403194041940519406194071940819409194101941119412194131941419415194161941719418194191942019421194221942319424194251942619427194281942919430194311943219433194341943519436194371943819439194401944119442194431944419445194461944719448194491945019451194521945319454194551945619457194581945919460194611946219463194641946519466194671946819469194701947119472194731947419475194761947719478194791948019481194821948319484194851948619487194881948919490194911949219493194941949519496194971949819499195001950119502195031950419505195061950719508195091951019511195121951319514195151951619517195181951919520195211952219523195241952519526195271952819529195301953119532195331953419535195361953719538195391954019541195421954319544195451954619547195481954919550195511955219553195541955519556195571955819559195601956119562195631956419565195661956719568195691957019571195721957319574195751957619577195781957919580195811958219583195841958519586195871958819589195901959119592195931959419595195961959719598195991960019601196021960319604196051960619607196081960919610196111961219613196141961519616196171961819619196201962119622196231962419625196261962719628196291963019631196321963319634196351963619637196381963919640196411964219643196441964519646196471964819649196501965119652196531965419655196561965719658196591966019661196621966319664196651966619667196681966919670196711967219673196741967519676196771967819679196801968119682196831968419685196861968719688196891969019691196921969319694196951969619697196981969919700197011970219703197041970519706197071970819709197101971119712197131971419715197161971719718197191972019721197221972319724197251972619727197281972919730197311973219733197341973519736197371973819739197401974119742197431974419745197461974719748197491975019751197521975319754197551975619757197581975919760197611976219763197641976519766197671976819769197701977119772197731977419775197761977719778197791978019781197821978319784197851978619787197881978919790197911979219793197941979519796197971979819799198001980119802198031980419805198061980719808198091981019811198121981319814198151981619817198181981919820198211982219823198241982519826198271982819829198301983119832198331983419835198361983719838198391984019841198421984319844198451984619847198481984919850198511985219853198541985519856198571985819859198601986119862198631986419865198661986719868198691987019871198721987319874198751987619877198781987919880198811988219883198841988519886198871988819889198901989119892198931989419895198961989719898198991990019901199021990319904199051990619907199081990919910199111991219913199141991519916199171991819919199201992119922199231992419925199261992719928199291993019931199321993319934199351993619937199381993919940199411994219943199441994519946199471994819949199501995119952199531995419955199561995719958199591996019961199621996319964199651996619967199681996919970199711997219973199741997519976199771997819979199801998119982199831998419985199861998719988199891999019991199921999319994199951999619997199981999920000200012000220003200042000520006200072000820009200102001120012200132001420015200162001720018200192002020021200222002320024200252002620027200282002920030200312003220033200342003520036200372003820039200402004120042200432004420045200462004720048200492005020051200522005320054200552005620057200582005920060200612006220063200642006520066200672006820069200702007120072200732007420075200762007720078200792008020081200822008320084200852008620087200882008920090200912009220093200942009520096200972009820099201002010120102201032010420105201062010720108201092011020111201122011320114201152011620117201182011920120201212012220123201242012520126201272012820129201302013120132201332013420135201362013720138201392014020141201422014320144201452014620147201482014920150201512015220153201542015520156201572015820159201602016120162201632016420165201662016720168201692017020171201722017320174201752017620177201782017920180201812018220183201842018520186201872018820189201902019120192201932019420195201962019720198201992020020201202022020320204202052020620207202082020920210202112021220213202142021520216202172021820219202202022120222202232022420225202262022720228202292023020231202322023320234202352023620237202382023920240202412024220243202442024520246202472024820249202502025120252202532025420255202562025720258202592026020261202622026320264202652026620267202682026920270202712027220273202742027520276202772027820279202802028120282202832028420285202862028720288202892029020291202922029320294202952029620297202982029920300203012030220303203042030520306203072030820309203102031120312203132031420315203162031720318203192032020321203222032320324203252032620327203282032920330203312033220333203342033520336203372033820339203402034120342203432034420345203462034720348203492035020351203522035320354203552035620357203582035920360203612036220363203642036520366203672036820369203702037120372203732037420375203762037720378203792038020381203822038320384203852038620387203882038920390203912039220393203942039520396203972039820399204002040120402204032040420405204062040720408204092041020411204122041320414204152041620417204182041920420204212042220423204242042520426204272042820429204302043120432204332043420435204362043720438204392044020441204422044320444204452044620447204482044920450204512045220453204542045520456204572045820459204602046120462204632046420465204662046720468204692047020471204722047320474204752047620477204782047920480204812048220483204842048520486204872048820489204902049120492204932049420495204962049720498204992050020501205022050320504205052050620507205082050920510205112051220513205142051520516205172051820519205202052120522205232052420525205262052720528205292053020531205322053320534205352053620537205382053920540205412054220543205442054520546205472054820549205502055120552205532055420555205562055720558205592056020561205622056320564205652056620567205682056920570205712057220573205742057520576205772057820579205802058120582205832058420585205862058720588205892059020591205922059320594205952059620597205982059920600206012060220603206042060520606206072060820609206102061120612206132061420615206162061720618206192062020621206222062320624206252062620627206282062920630206312063220633206342063520636206372063820639206402064120642206432064420645206462064720648206492065020651206522065320654206552065620657206582065920660206612066220663206642066520666206672066820669206702067120672206732067420675206762067720678206792068020681206822068320684206852068620687206882068920690206912069220693206942069520696206972069820699207002070120702207032070420705207062070720708207092071020711207122071320714207152071620717207182071920720207212072220723207242072520726207272072820729207302073120732207332073420735207362073720738207392074020741207422074320744207452074620747207482074920750207512075220753207542075520756207572075820759207602076120762207632076420765207662076720768207692077020771207722077320774207752077620777207782077920780207812078220783207842078520786207872078820789207902079120792207932079420795207962079720798207992080020801208022080320804208052080620807208082080920810208112081220813208142081520816208172081820819208202082120822208232082420825208262082720828208292083020831208322083320834208352083620837208382083920840208412084220843208442084520846208472084820849208502085120852208532085420855208562085720858208592086020861208622086320864208652086620867208682086920870208712087220873208742087520876208772087820879208802088120882208832088420885208862088720888208892089020891208922089320894208952089620897208982089920900209012090220903209042090520906209072090820909209102091120912209132091420915209162091720918209192092020921209222092320924209252092620927209282092920930209312093220933209342093520936209372093820939209402094120942209432094420945209462094720948209492095020951209522095320954209552095620957209582095920960209612096220963209642096520966209672096820969209702097120972209732097420975209762097720978209792098020981209822098320984209852098620987209882098920990209912099220993209942099520996209972099820999210002100121002210032100421005210062100721008210092101021011210122101321014210152101621017210182101921020210212102221023210242102521026210272102821029210302103121032210332103421035210362103721038210392104021041210422104321044210452104621047210482104921050210512105221053210542105521056210572105821059210602106121062210632106421065210662106721068210692107021071210722107321074210752107621077210782107921080210812108221083210842108521086210872108821089210902109121092210932109421095210962109721098210992110021101211022110321104211052110621107211082110921110211112111221113211142111521116211172111821119211202112121122211232112421125211262112721128211292113021131211322113321134211352113621137211382113921140211412114221143211442114521146211472114821149211502115121152211532115421155211562115721158211592116021161211622116321164211652116621167211682116921170211712117221173211742117521176211772117821179211802118121182211832118421185211862118721188211892119021191211922119321194211952119621197211982119921200212012120221203212042120521206212072120821209212102121121212212132121421215212162121721218212192122021221212222122321224212252122621227212282122921230212312123221233212342123521236212372123821239212402124121242212432124421245212462124721248212492125021251212522125321254212552125621257212582125921260212612126221263212642126521266212672126821269212702127121272212732127421275212762127721278212792128021281212822128321284212852128621287212882128921290212912129221293212942129521296212972129821299213002130121302213032130421305213062130721308213092131021311213122131321314213152131621317213182131921320213212132221323213242132521326213272132821329213302133121332213332133421335213362133721338213392134021341213422134321344213452134621347213482134921350213512135221353213542135521356213572135821359213602136121362213632136421365213662136721368213692137021371213722137321374213752137621377213782137921380213812138221383213842138521386213872138821389213902139121392213932139421395213962139721398213992140021401214022140321404214052140621407214082140921410214112141221413214142141521416214172141821419214202142121422214232142421425214262142721428214292143021431214322143321434214352143621437214382143921440214412144221443214442144521446214472144821449214502145121452214532145421455214562145721458214592146021461214622146321464214652146621467214682146921470214712147221473214742147521476214772147821479214802148121482214832148421485214862148721488214892149021491214922149321494214952149621497214982149921500215012150221503215042150521506215072150821509215102151121512215132151421515215162151721518215192152021521215222152321524215252152621527215282152921530215312153221533215342153521536215372153821539215402154121542215432154421545215462154721548215492155021551215522155321554215552155621557215582155921560215612156221563215642156521566215672156821569215702157121572215732157421575215762157721578215792158021581215822158321584215852158621587215882158921590215912159221593215942159521596215972159821599216002160121602216032160421605216062160721608216092161021611216122161321614216152161621617216182161921620216212162221623216242162521626216272162821629216302163121632216332163421635216362163721638216392164021641216422164321644216452164621647216482164921650216512165221653216542165521656216572165821659216602166121662216632166421665216662166721668216692167021671216722167321674216752167621677216782167921680216812168221683216842168521686216872168821689216902169121692216932169421695216962169721698216992170021701217022170321704217052170621707217082170921710217112171221713217142171521716217172171821719217202172121722217232172421725217262172721728217292173021731217322173321734217352173621737217382173921740217412174221743217442174521746217472174821749217502175121752217532175421755217562175721758217592176021761217622176321764217652176621767217682176921770217712177221773217742177521776217772177821779217802178121782217832178421785217862178721788217892179021791217922179321794217952179621797217982179921800218012180221803218042180521806218072180821809218102181121812218132181421815218162181721818218192182021821218222182321824218252182621827218282182921830218312183221833218342183521836218372183821839218402184121842218432184421845218462184721848218492185021851218522185321854218552185621857218582185921860218612186221863218642186521866218672186821869218702187121872218732187421875218762187721878218792188021881218822188321884218852188621887218882188921890218912189221893218942189521896218972189821899219002190121902219032190421905219062190721908219092191021911219122191321914219152191621917219182191921920219212192221923219242192521926219272192821929219302193121932219332193421935219362193721938219392194021941219422194321944219452194621947219482194921950219512195221953219542195521956219572195821959219602196121962219632196421965219662196721968219692197021971219722197321974219752197621977219782197921980219812198221983219842198521986219872198821989219902199121992219932199421995219962199721998219992200022001220022200322004220052200622007220082200922010220112201222013220142201522016220172201822019220202202122022220232202422025220262202722028220292203022031220322203322034220352203622037220382203922040220412204222043220442204522046220472204822049220502205122052220532205422055220562205722058220592206022061220622206322064220652206622067220682206922070220712207222073220742207522076220772207822079220802208122082220832208422085220862208722088220892209022091220922209322094220952209622097220982209922100221012210222103221042210522106221072210822109221102211122112221132211422115221162211722118221192212022121221222212322124221252212622127221282212922130221312213222133221342213522136221372213822139221402214122142221432214422145221462214722148221492215022151221522215322154221552215622157221582215922160221612216222163221642216522166221672216822169221702217122172221732217422175221762217722178221792218022181221822218322184221852218622187221882218922190221912219222193221942219522196221972219822199222002220122202222032220422205222062220722208222092221022211222122221322214222152221622217222182221922220222212222222223222242222522226222272222822229222302223122232222332223422235222362223722238222392224022241222422224322244222452224622247222482224922250222512225222253222542225522256222572225822259222602226122262222632226422265222662226722268222692227022271222722227322274222752227622277222782227922280222812228222283222842228522286222872228822289222902229122292222932229422295222962229722298222992230022301223022230322304223052230622307223082230922310223112231222313223142231522316223172231822319223202232122322223232232422325223262232722328223292233022331223322233322334223352233622337223382233922340223412234222343223442234522346223472234822349223502235122352223532235422355223562235722358223592236022361223622236322364223652236622367223682236922370223712237222373223742237522376223772237822379223802238122382223832238422385223862238722388223892239022391223922239322394223952239622397223982239922400224012240222403224042240522406224072240822409224102241122412224132241422415224162241722418224192242022421224222242322424224252242622427224282242922430224312243222433224342243522436224372243822439224402244122442224432244422445224462244722448224492245022451224522245322454224552245622457224582245922460224612246222463224642246522466224672246822469224702247122472224732247422475224762247722478224792248022481224822248322484224852248622487224882248922490224912249222493224942249522496224972249822499225002250122502225032250422505225062250722508225092251022511225122251322514225152251622517225182251922520225212252222523225242252522526225272252822529225302253122532225332253422535225362253722538225392254022541225422254322544225452254622547225482254922550225512255222553225542255522556225572255822559225602256122562225632256422565225662256722568225692257022571225722257322574225752257622577225782257922580225812258222583225842258522586225872258822589225902259122592225932259422595225962259722598225992260022601226022260322604226052260622607226082260922610226112261222613226142261522616226172261822619226202262122622226232262422625226262262722628226292263022631226322263322634226352263622637226382263922640226412264222643226442264522646226472264822649226502265122652226532265422655226562265722658226592266022661226622266322664226652266622667226682266922670226712267222673226742267522676226772267822679226802268122682226832268422685226862268722688226892269022691226922269322694226952269622697226982269922700227012270222703227042270522706227072270822709227102271122712227132271422715227162271722718227192272022721227222272322724227252272622727227282272922730227312273222733227342273522736227372273822739227402274122742227432274422745227462274722748227492275022751227522275322754227552275622757227582275922760227612276222763227642276522766227672276822769227702277122772227732277422775227762277722778227792278022781227822278322784227852278622787227882278922790227912279222793227942279522796227972279822799228002280122802228032280422805228062280722808228092281022811228122281322814228152281622817228182281922820228212282222823228242282522826228272282822829228302283122832228332283422835228362283722838228392284022841228422284322844228452284622847228482284922850228512285222853228542285522856228572285822859228602286122862228632286422865228662286722868228692287022871228722287322874228752287622877228782287922880228812288222883228842288522886228872288822889228902289122892228932289422895228962289722898228992290022901229022290322904229052290622907229082290922910229112291222913229142291522916229172291822919229202292122922229232292422925229262292722928229292293022931229322293322934229352293622937229382293922940229412294222943229442294522946229472294822949229502295122952229532295422955229562295722958229592296022961229622296322964229652296622967229682296922970229712297222973229742297522976229772297822979229802298122982229832298422985229862298722988229892299022991229922299322994229952299622997229982299923000230012300223003230042300523006230072300823009230102301123012230132301423015230162301723018230192302023021230222302323024230252302623027230282302923030230312303223033230342303523036230372303823039230402304123042230432304423045230462304723048230492305023051230522305323054230552305623057230582305923060230612306223063230642306523066230672306823069230702307123072230732307423075230762307723078230792308023081230822308323084230852308623087230882308923090230912309223093230942309523096230972309823099231002310123102231032310423105231062310723108231092311023111231122311323114231152311623117231182311923120231212312223123231242312523126231272312823129231302313123132231332313423135231362313723138231392314023141231422314323144231452314623147231482314923150231512315223153231542315523156231572315823159231602316123162231632316423165231662316723168231692317023171231722317323174231752317623177231782317923180231812318223183231842318523186231872318823189231902319123192231932319423195231962319723198231992320023201232022320323204232052320623207232082320923210232112321223213232142321523216232172321823219232202322123222232232322423225232262322723228232292323023231232322323323234232352323623237232382323923240232412324223243232442324523246232472324823249232502325123252232532325423255232562325723258232592326023261232622326323264232652326623267232682326923270232712327223273232742327523276232772327823279
  1. // SoftEther VPN Source Code - Stable Edition Repository
  2. // Mayaqua Kernel
  3. //
  4. // SoftEther VPN Server, Client and Bridge are free software under the Apache License, Version 2.0.
  5. //
  6. // Copyright (c) Daiyuu Nobori.
  7. // Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
  8. // Copyright (c) SoftEther Corporation.
  9. // Copyright (c) all contributors on SoftEther VPN project in GitHub.
  10. //
  11. // All Rights Reserved.
  12. //
  13. // http://www.softether.org/
  14. //
  15. // This stable branch is officially managed by Daiyuu Nobori, the owner of SoftEther VPN Project.
  16. // Pull requests should be sent to the Developer Edition Master Repository on https://github.com/SoftEtherVPN/SoftEtherVPN
  17. // Contributors:
  18. // - nattoheaven (https://github.com/nattoheaven)
  19. //
  20. // License: The Apache License, Version 2.0
  21. // https://www.apache.org/licenses/LICENSE-2.0
  22. //
  23. // DISCLAIMER
  24. // ==========
  25. //
  26. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  27. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  28. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  29. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  30. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  31. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  32. // SOFTWARE.
  33. //
  34. // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN, UNDER
  35. // JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY, MERGE, PUBLISH,
  36. // DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS SOFTWARE, THAT ANY
  37. // JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS SOFTWARE OR ITS CONTENTS,
  38. // AGAINST US (SOFTETHER PROJECT, SOFTETHER CORPORATION, DAIYUU NOBORI OR OTHER
  39. // SUPPLIERS), OR ANY JURIDICAL DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND
  40. // OF USING, COPYING, MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING,
  41. // AND/OR SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
  42. // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO EXCLUSIVE
  43. // JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO, JAPAN. YOU MUST WAIVE
  44. // ALL DEFENSES OF LACK OF PERSONAL JURISDICTION AND FORUM NON CONVENIENS.
  45. // PROCESS MAY BE SERVED ON EITHER PARTY IN THE MANNER AUTHORIZED BY APPLICABLE
  46. // LAW OR COURT RULE.
  47. //
  48. // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS YOU HAVE
  49. // A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY CRIMINAL LAWS OR CIVIL
  50. // RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS SOFTWARE IN OTHER COUNTRIES IS
  51. // COMPLETELY AT YOUR OWN RISK. THE SOFTETHER VPN PROJECT HAS DEVELOPED AND
  52. // DISTRIBUTED THIS SOFTWARE TO COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING
  53. // CIVIL RIGHTS INCLUDING PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER
  54. // COUNTRIES' LAWS OR CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES.
  55. // WE HAVE NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
  56. // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ COUNTRIES
  57. // AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE WORLD, WITH
  58. // DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY COUNTRIES' LAWS, REGULATIONS
  59. // AND CIVIL RIGHTS TO MAKE THE SOFTWARE COMPLY WITH ALL COUNTRIES' LAWS BY THE
  60. // PROJECT. EVEN IF YOU WILL BE SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A
  61. // PUBLIC SERVANT IN YOUR COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE
  62. // LIABLE TO RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
  63. // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT JUST A
  64. // STATEMENT FOR WARNING AND DISCLAIMER.
  65. //
  66. // READ AND UNDERSTAND THE 'WARNING.TXT' FILE BEFORE USING THIS SOFTWARE.
  67. // SOME SOFTWARE PROGRAMS FROM THIRD PARTIES ARE INCLUDED ON THIS SOFTWARE WITH
  68. // LICENSE CONDITIONS WHICH ARE DESCRIBED ON THE 'THIRD_PARTY.TXT' FILE.
  69. //
  70. //
  71. // SOURCE CODE CONTRIBUTION
  72. // ------------------------
  73. //
  74. // Your contribution to SoftEther VPN Project is much appreciated.
  75. // Please send patches to us through GitHub.
  76. // Read the SoftEther VPN Patch Acceptance Policy in advance:
  77. // http://www.softether.org/5-download/src/9.patch
  78. //
  79. //
  80. // DEAR SECURITY EXPERTS
  81. // ---------------------
  82. //
  83. // If you find a bug or a security vulnerability please kindly inform us
  84. // about the problem immediately so that we can fix the security problem
  85. // to protect a lot of users around the world as soon as possible.
  86. //
  87. // Our e-mail address for security reports is:
  88. // softether-vpn-security [at] softether.org
  89. //
  90. // Please note that the above e-mail address is not a technical support
  91. // inquiry address. If you need technical assistance, please visit
  92. // http://www.softether.org/ and ask your question on the users forum.
  93. //
  94. // Thank you for your cooperation.
  95. //
  96. //
  97. // NO MEMORY OR RESOURCE LEAKS
  98. // ---------------------------
  99. //
  100. // The memory-leaks and resource-leaks verification under the stress
  101. // test has been passed before release this source code.
  102. // Network.c
  103. // Network communication module
  104. #include <GlobalConst.h>
  105. #define ENCRYPT_C
  106. #define NETWORK_C
  107. #define __WINCRYPT_H__
  108. #ifdef WIN32
  109. // Include windows.h for Socket API
  110. #define _WIN32_WINNT 0x0502
  111. #define WINVER 0x0502
  112. #include <Ws2tcpip.h>
  113. #include <Wspiapi.h>
  114. #include <winsock2.h>
  115. #include <windows.h>
  116. #include <Iphlpapi.h>
  117. #include <ws2ipdef.h>
  118. #include <netioapi.h>
  119. #include <Icmpapi.h>
  120. #endif // WIN32
  121. #include <stdio.h>
  122. #include <stdlib.h>
  123. #include <string.h>
  124. #include <wchar.h>
  125. #include <stdarg.h>
  126. #include <time.h>
  127. #include <openssl/ssl.h>
  128. #include <openssl/err.h>
  129. #include <openssl/rand.h>
  130. #include <openssl/engine.h>
  131. #include <openssl/bio.h>
  132. #include <openssl/x509.h>
  133. #include <openssl/pkcs7.h>
  134. #include <openssl/pkcs12.h>
  135. #include <openssl/rc4.h>
  136. #include <openssl/md5.h>
  137. #include <openssl/sha.h>
  138. #include <Mayaqua/Mayaqua.h>
  139. #ifdef UNIX_MACOS
  140. #include <sys/event.h>
  141. #endif // UNIX_MACOS
  142. #ifdef OS_WIN32
  143. NETWORK_WIN32_FUNCTIONS *w32net;
  144. struct ROUTE_CHANGE_DATA
  145. {
  146. OVERLAPPED Overlapped;
  147. HANDLE Handle;
  148. UINT NumCalled;
  149. };
  150. #endif // OS_WIN32
  151. // Whether the blocking occurs in SSL
  152. #if defined(UNIX_BSD) || defined(UNIX_MACOS)
  153. #define FIX_SSL_BLOCKING
  154. #endif
  155. // IPV6_V6ONLY constant
  156. #ifdef UNIX_LINUX
  157. #ifndef IPV6_V6ONLY
  158. #define IPV6_V6ONLY 26
  159. #endif // IPV6_V6ONLY
  160. #endif // UNIX_LINUX
  161. #ifdef UNIX_SOLARIS
  162. #ifndef IPV6_V6ONLY
  163. #define IPV6_V6ONLY 0x27
  164. #endif // IPV6_V6ONLY
  165. #endif // UNIX_SOLARIS
  166. // HTTP constant
  167. static char http_404_str[] = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<HTML><HEAD>\r\n<TITLE>404 Not Found</TITLE>\r\n</HEAD><BODY>\r\n<H1>Not Found</H1>\r\nThe requested URL $TARGET$ was not found on this server.<P>\r\n<HR>\r\n<ADDRESS>HTTP Server at $HOST$ Port $PORT$</ADDRESS>\r\n</BODY></HTML>\r\n";
  168. static char http_403_str[] = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<HTML><HEAD>\r\n<TITLE>403 Forbidden</TITLE>\r\n</HEAD><BODY>\r\n<H1>Forbidden</H1>\r\nYou don't have permission to access $TARGET$\r\non this server.<P>\r\n<HR>\r\n<ADDRESS>HTTP Server at $HOST$ Port $PORT$</ADDRESS>\r\n</BODY></HTML>\r\n";
  169. static char http_500_str[] = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<HTML><HEAD>\r\n<TITLE>500 Server Error</TITLE>\r\n</HEAD><BODY>\r\n<H1>Server Error</H1>\r\nServer Error<P>\r\n<HR>\r\n<ADDRESS>HTTP Server at $HOST$ Port $PORT$</ADDRESS>\r\n</BODY></HTML>\r\n";
  170. static char http_501_str[] = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<HTML><HEAD>\r\n<TITLE>501 Method Not Implemented</TITLE>\r\n</HEAD><BODY>\r\n<H1>Method Not Implemented</H1>\r\n$METHOD$ to $TARGET$ not supported.<P>\r\nInvalid method in request $METHOD$ $TARGET$ $VERSION$<P>\r\n<HR>\r\n<ADDRESS>HTTP Server at $HOST$ Port $PORT$</ADDRESS>\r\n</BODY></HTML>\r\n";
  171. static char http_detect_server_startwith[] = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<HTML><HEAD>\r\n<TITLE>403 Forbidden</TITLE>\r\n</HEAD><BODY>\r\n<H1>Forbidden</H1>\r\nYou don't have permission to access ";
  172. static char http_detect_server_tag_future[] = "9C37197CA7C2428388C2E6E59B829B30";
  173. // DNS cache list
  174. static LIST *DnsCache;
  175. // Lock related
  176. static LOCK *machine_name_lock = NULL;
  177. static LOCK *disconnect_function_lock = NULL;
  178. static LOCK *aho = NULL;
  179. static LOCK *socket_library_lock = NULL;
  180. extern LOCK *openssl_lock;
  181. static LOCK *ssl_accept_lock = NULL;
  182. static LOCK *ssl_connect_lock = NULL;
  183. static TOKEN_LIST *cipher_list_token = NULL;
  184. static COUNTER *num_tcp_connections = NULL;
  185. static LOCK *dns_lock = NULL;
  186. static LOCK *unix_dns_server_addr_lock = NULL;
  187. static IP unix_dns_server;
  188. static LIST *HostCacheList = NULL;
  189. static LIST *WaitThreadList = NULL;
  190. static bool disable_cache = false;
  191. static bool NetworkReleaseMode = false; // Network release mode
  192. static UCHAR machine_ip_process_hash[SHA1_SIZE];
  193. static LOCK *machine_ip_process_hash_lock = NULL;
  194. static LOCK *current_global_ip_lock = NULL;
  195. static LOCK *current_fqdn_lock = NULL;
  196. static bool current_global_ip_set = false;
  197. static IP current_glocal_ipv4 = {0};
  198. static IP current_glocal_ipv6 = {0};
  199. static char current_fqdn[MAX_SIZE];
  200. static bool g_no_rudp_server = false;
  201. static bool g_no_rudp_register = false;
  202. static bool g_natt_low_priority = false;
  203. static LOCK *host_ip_address_list_cache_lock = NULL;
  204. static UINT64 host_ip_address_list_cache_last = 0;
  205. static LIST *host_ip_address_cache = NULL;
  206. static bool disable_gethostname_by_accept = false;
  207. static COUNTER *getip_thread_counter = NULL;
  208. static UINT max_getip_thread = 0;
  209. static char *cipher_list = "RC4-MD5 RC4-SHA AES128-SHA AES256-SHA DES-CBC-SHA DES-CBC3-SHA DHE-RSA-AES128-SHA DHE-RSA-AES256-SHA AES128-GCM-SHA256 AES128-SHA256 AES256-GCM-SHA384 AES256-SHA256 DHE-RSA-AES128-GCM-SHA256 DHE-RSA-AES128-SHA256 DHE-RSA-AES256-GCM-SHA384 DHE-RSA-AES256-SHA256 ECDHE-RSA-AES128-GCM-SHA256 ECDHE-RSA-AES128-SHA256 ECDHE-RSA-AES256-GCM-SHA384 ECDHE-RSA-AES256-SHA384"
  210. #if OPENSSL_VERSION_NUMBER >= 0x10100000L
  211. " DHE-RSA-CHACHA20-POLY1305 ECDHE-RSA-CHACHA20-POLY1305";
  212. #endif
  213. ;
  214. static LIST *ip_clients = NULL;
  215. static LIST *local_mac_list = NULL;
  216. static LOCK *local_mac_list_lock = NULL;
  217. static UINT rand_port_numbers[256] = {0};
  218. static bool g_use_privateip_file = false;
  219. static bool g_source_ip_validation_force_disable = false;
  220. static DH_CTX *dh_2048 = NULL;
  221. typedef struct PRIVATE_IP_SUBNET
  222. {
  223. UINT Ip, Mask, Ip2;
  224. } PRIVATE_IP_SUBNET;
  225. static LIST *g_private_ip_list = NULL;
  226. static LIST *g_dyn_value_list = NULL;
  227. //#define RUDP_DETAIL_LOG
  228. // Get a value from a dynamic value list (Returns a default value if the value is not found)
  229. UINT64 GetDynValueOrDefault(char *name, UINT64 default_value, UINT64 min_value, UINT64 max_value)
  230. {
  231. UINT64 ret = GetDynValue(name);
  232. if (ret == 0)
  233. {
  234. return default_value;
  235. }
  236. if (ret < min_value)
  237. {
  238. ret = min_value;
  239. }
  240. if (ret > max_value)
  241. {
  242. ret = max_value;
  243. }
  244. return ret;
  245. }
  246. // Get a value from a dynamic value list (Returns a default value if the value is not found)
  247. // The value is limited to 1/5 to 50 times of the default value for safety
  248. UINT64 GetDynValueOrDefaultSafe(char *name, UINT64 default_value)
  249. {
  250. return GetDynValueOrDefault(name, default_value, default_value / (UINT64)5, default_value * (UINT64)50);
  251. }
  252. // Get a value from a dynamic value list
  253. UINT64 GetDynValue(char *name)
  254. {
  255. UINT64 ret = 0;
  256. // Validate arguments
  257. if (name == NULL)
  258. {
  259. return 0;
  260. }
  261. if (g_dyn_value_list == NULL)
  262. {
  263. return 0;
  264. }
  265. LockList(g_dyn_value_list);
  266. {
  267. UINT i;
  268. for (i = 0; i < LIST_NUM(g_dyn_value_list);i++)
  269. {
  270. DYN_VALUE *vv = LIST_DATA(g_dyn_value_list, i);
  271. if (StrCmpi(vv->Name, name) == 0)
  272. {
  273. ret = vv->Value;
  274. break;
  275. }
  276. }
  277. }
  278. UnlockList(g_dyn_value_list);
  279. return ret;
  280. }
  281. // Set the value to the dynamic value list
  282. void SetDynListValue(char *name, UINT64 value)
  283. {
  284. // Validate arguments
  285. if (name == NULL)
  286. {
  287. return;
  288. }
  289. if (g_dyn_value_list == NULL)
  290. {
  291. return;
  292. }
  293. LockList(g_dyn_value_list);
  294. {
  295. UINT i;
  296. DYN_VALUE *v = NULL;
  297. for (i = 0; i < LIST_NUM(g_dyn_value_list);i++)
  298. {
  299. DYN_VALUE *vv = LIST_DATA(g_dyn_value_list, i);
  300. if (StrCmpi(vv->Name, name) == 0)
  301. {
  302. v = vv;
  303. break;
  304. }
  305. }
  306. if (v == NULL)
  307. {
  308. v = ZeroMalloc(sizeof(DYN_VALUE));
  309. StrCpy(v->Name, sizeof(v->Name), name);
  310. Add(g_dyn_value_list, v);
  311. }
  312. v->Value = value;
  313. }
  314. UnlockList(g_dyn_value_list);
  315. }
  316. // Apply by extracting dynamic value list from the specified PACK
  317. void ExtractAndApplyDynList(PACK *p)
  318. {
  319. BUF *b;
  320. // Validate arguments
  321. if (p == NULL)
  322. {
  323. return;
  324. }
  325. b = PackGetBuf(p, "DynList");
  326. if (b == NULL)
  327. {
  328. return;
  329. }
  330. AddDynList(b);
  331. FreeBuf(b);
  332. }
  333. // Insert the data to the dynamic value list
  334. void AddDynList(BUF *b)
  335. {
  336. PACK *p;
  337. TOKEN_LIST *t;
  338. // Validate arguments
  339. if (b == NULL)
  340. {
  341. return;
  342. }
  343. SeekBufToBegin(b);
  344. p = BufToPack(b);
  345. if (p == NULL)
  346. {
  347. return;
  348. }
  349. t = GetPackElementNames(p);
  350. if (t != NULL)
  351. {
  352. UINT i;
  353. for (i = 0;i < t->NumTokens;i++)
  354. {
  355. char *name = t->Token[i];
  356. UINT64 v = PackGetInt64(p, name);
  357. SetDynListValue(name, v);
  358. }
  359. FreeToken(t);
  360. }
  361. FreePack(p);
  362. }
  363. // Initialization of the dynamic value list
  364. void InitDynList()
  365. {
  366. g_dyn_value_list = NewList(NULL);
  367. }
  368. // Solution of dynamic value list
  369. void FreeDynList()
  370. {
  371. UINT i;
  372. if (g_dyn_value_list == NULL)
  373. {
  374. return;
  375. }
  376. for (i = 0;i < LIST_NUM(g_dyn_value_list);i++)
  377. {
  378. DYN_VALUE *d = LIST_DATA(g_dyn_value_list, i);
  379. Free(d);
  380. }
  381. ReleaseList(g_dyn_value_list);
  382. g_dyn_value_list = NULL;
  383. }
  384. // Check whether the string in the string list appears in the specified string
  385. bool IsInStrByStrList(char *str, char *str_list)
  386. {
  387. TOKEN_LIST *t;
  388. bool ret = false;
  389. // Validate arguments
  390. if (str == NULL || str_list == NULL)
  391. {
  392. return false;
  393. }
  394. t = ParseTokenWithoutNullStr(str_list, ", \t\r\n");
  395. if (t != NULL)
  396. {
  397. UINT i;
  398. for (i = 0;i < t->NumTokens;i++)
  399. {
  400. char *s = t->Token[i];
  401. if (StrLen(s) >= 1)
  402. {
  403. if (InStrEx(str, s, true))
  404. {
  405. ret = true;
  406. break;
  407. }
  408. }
  409. }
  410. }
  411. FreeToken(t);
  412. return ret;
  413. }
  414. // Search whether the IP address exists on the IP address list string
  415. bool IsIpInStrList(IP *ip, char *ip_list)
  416. {
  417. char ip_str[128];
  418. TOKEN_LIST *t;
  419. bool ret = false;
  420. // Validate arguments
  421. if (ip == NULL || ip_list == NULL)
  422. {
  423. return false;
  424. }
  425. Zero(ip_str, sizeof(ip_str));
  426. IPToStr(ip_str, sizeof(ip_str), ip);
  427. t = ParseTokenWithoutNullStr(ip_list, ", \t\r\n");
  428. if (t != NULL)
  429. {
  430. UINT i;
  431. for (i = 0;i < t->NumTokens;i++)
  432. {
  433. char *s = t->Token[i];
  434. if (StrCmpi(s, ip_str) == 0)
  435. {
  436. ret = true;
  437. break;
  438. }
  439. }
  440. }
  441. FreeToken(t);
  442. return ret;
  443. }
  444. // Disable NAT-T function globally
  445. void DisableRDUPServerGlobally()
  446. {
  447. g_no_rudp_server = true;
  448. }
  449. // Disable NAT-T registration globally
  450. void DisableRUDPRegisterGlobally()
  451. {
  452. g_no_rudp_register = true;
  453. }
  454. // Lower the priority of the host at NAT-T
  455. void SetNatTLowPriority()
  456. {
  457. g_natt_low_priority = true;
  458. }
  459. // Extract only the host name part from FQDN
  460. void GetSimpleHostname(char *hostname, UINT hostname_size, char *fqdn)
  461. {
  462. UINT i;
  463. ClearStr(hostname, hostname_size);
  464. // Validate arguments
  465. if (hostname == NULL || fqdn == NULL)
  466. {
  467. return;
  468. }
  469. StrCpy(hostname, hostname_size, fqdn);
  470. Trim(hostname);
  471. i = SearchStrEx(hostname, ".", 0, true);
  472. if (i != INFINITE)
  473. {
  474. hostname[i] = 0;
  475. }
  476. }
  477. // Get the current time zone
  478. int GetCurrentTimezone()
  479. {
  480. int ret = 0;
  481. #ifdef OS_WIN32
  482. ret = GetCurrentTimezoneWin32();
  483. #else // OS_WIN32
  484. {
  485. #if defined(UNIX_MACOS) || defined(UNIX_BSD)
  486. struct timeval tv;
  487. struct timezone tz;
  488. Zero(&tv, sizeof(tv));
  489. Zero(&tz, sizeof(tz));
  490. gettimeofday(&tv, &tz);
  491. ret = tz.tz_minuteswest;
  492. #else // defined(UNIX_MACOS) || defined(UNIX_BSD)
  493. tzset();
  494. ret = timezone / 60;
  495. #endif // defined(UNIX_MACOS) || defined(UNIX_BSD)
  496. }
  497. #endif // OS_WIN32
  498. return ret;
  499. }
  500. // Flag of whether to use the DNS proxy
  501. bool IsUseDnsProxy()
  502. {
  503. return false;
  504. }
  505. // Flag of whether to use an alternate host name
  506. bool IsUseAlternativeHostname()
  507. {
  508. return false;
  509. }
  510. #ifdef OS_WIN32
  511. // Get the current time zone (Win32)
  512. int GetCurrentTimezoneWin32()
  513. {
  514. TIME_ZONE_INFORMATION info;
  515. Zero(&info, sizeof(info));
  516. if (GetTimeZoneInformation(&info) == TIME_ZONE_ID_INVALID)
  517. {
  518. return 0;
  519. }
  520. return info.Bias;
  521. }
  522. #endif // OS_WIN32
  523. // Set the current FQDN of the DDNS
  524. void SetCurrentDDnsFqdn(char *name)
  525. {
  526. // Validate arguments
  527. if (name == NULL)
  528. {
  529. return;
  530. }
  531. Lock(current_fqdn_lock);
  532. {
  533. StrCpy(current_fqdn, sizeof(current_fqdn), name);
  534. }
  535. Unlock(current_fqdn_lock);
  536. }
  537. // Get the current DDNS FQDN hash
  538. UINT GetCurrentDDnsFqdnHash()
  539. {
  540. UINT ret;
  541. UCHAR hash[SHA1_SIZE];
  542. char name[MAX_SIZE];
  543. ClearStr(name, sizeof(name));
  544. GetCurrentDDnsFqdn(name, sizeof(name));
  545. Trim(name);
  546. StrUpper(name);
  547. HashSha1(hash, name, StrLen(name));
  548. Copy(&ret, hash, sizeof(UINT));
  549. return ret;
  550. }
  551. // Get the current DDNS FQDN
  552. void GetCurrentDDnsFqdn(char *name, UINT size)
  553. {
  554. ClearStr(name, size);
  555. // Validate arguments
  556. if (name == NULL || size == 0)
  557. {
  558. return;
  559. }
  560. Lock(current_fqdn_lock);
  561. {
  562. StrCpy(name, size, current_fqdn);
  563. }
  564. Unlock(current_fqdn_lock);
  565. Trim(name);
  566. }
  567. // Check whether the specified MAC address exists on the local host (high speed)
  568. bool IsMacAddressLocalFast(void *addr)
  569. {
  570. bool ret = false;
  571. // Validate arguments
  572. if (addr == NULL)
  573. {
  574. return false;
  575. }
  576. Lock(local_mac_list_lock);
  577. {
  578. if (local_mac_list == NULL)
  579. {
  580. // First enumeration
  581. RefreshLocalMacAddressList();
  582. }
  583. ret = IsMacAddressLocalInner(local_mac_list, addr);
  584. }
  585. Unlock(local_mac_list_lock);
  586. return ret;
  587. }
  588. // Update the local MAC address list
  589. void RefreshLocalMacAddressList()
  590. {
  591. Lock(local_mac_list_lock);
  592. {
  593. if (local_mac_list != NULL)
  594. {
  595. FreeNicList(local_mac_list);
  596. }
  597. local_mac_list = GetNicList();
  598. }
  599. Unlock(local_mac_list_lock);
  600. }
  601. // Check whether the specified MAC address exists on the local host
  602. bool IsMacAddressLocal(void *addr)
  603. {
  604. LIST *o;
  605. bool ret;
  606. // Validate arguments
  607. if (addr == NULL)
  608. {
  609. return false;
  610. }
  611. o = GetNicList();
  612. ret = IsMacAddressLocalInner(o, addr);
  613. FreeNicList(o);
  614. return ret;
  615. }
  616. bool IsMacAddressLocalInner(LIST *o, void *addr)
  617. {
  618. bool ret = false;
  619. UINT i;
  620. // Validate arguments
  621. if (o == NULL || addr == NULL)
  622. {
  623. return false;
  624. }
  625. for (i = 0;i < LIST_NUM(o);i++)
  626. {
  627. NIC_ENTRY *e = LIST_DATA(o, i);
  628. if (Cmp(e->MacAddress, addr, 6) == 0)
  629. {
  630. ret = true;
  631. break;
  632. }
  633. }
  634. return ret;
  635. }
  636. // Get a list of the NICs on the computer
  637. LIST *GetNicList()
  638. {
  639. LIST *o = NULL;
  640. #ifdef OS_WIN32
  641. o = Win32GetNicList();
  642. #endif // OS_WIN32
  643. #ifdef UNIX_LINUX
  644. #endif // UNIX_LINUX
  645. if (o == NULL)
  646. {
  647. return NewListFast(NULL);
  648. }
  649. return o;
  650. }
  651. #ifdef OS_WIN32
  652. LIST *Win32GetNicList()
  653. {
  654. UINT i;
  655. LIST *o = NewListFast(NULL);
  656. MS_ADAPTER_LIST *al = MsCreateAdapterList();
  657. if (al == NULL)
  658. {
  659. return NULL;
  660. }
  661. for (i = 0;i < al->Num;i++)
  662. {
  663. MS_ADAPTER *a = al->Adapters[i];
  664. if (a->Type == 6 && a->AddressSize == 6)
  665. {
  666. NIC_ENTRY *e = ZeroMalloc(sizeof(NIC_ENTRY));
  667. StrCpy(e->IfName, sizeof(e->IfName), a->Title);
  668. Copy(e->MacAddress, a->Address, 6);
  669. Add(o, e);
  670. }
  671. }
  672. MsFreeAdapterList(al);
  673. return o;
  674. }
  675. #endif // OS_WIN32
  676. // Release the NIC list
  677. void FreeNicList(LIST *o)
  678. {
  679. UINT i;
  680. // Validate arguments
  681. if (o == NULL)
  682. {
  683. return;
  684. }
  685. for (i = 0;i < LIST_NUM(o);i++)
  686. {
  687. NIC_ENTRY *e = LIST_DATA(o, i);
  688. Free(e);
  689. }
  690. ReleaseList(o);
  691. }
  692. // If the computer is connected to the FLET'S line currently, detect the type of the line (obsolete)
  693. UINT DetectFletsType()
  694. {
  695. UINT ret = 0;
  696. //LIST *o = GetHostIPAddressList();
  697. // UINT i;
  698. /*
  699. for (i = 0;i < LIST_NUM(o);i++)
  700. {
  701. IP *ip = LIST_DATA(o, i);
  702. if (IsIP6(ip))
  703. {
  704. char ip_str[MAX_SIZE];
  705. IPToStr(ip_str, sizeof(ip_str), ip);
  706. if (IsInSameNetwork6ByStr(ip_str, "2001:c90::", "/32"))
  707. {
  708. // NTT East B-FLETs
  709. ret |= FLETS_DETECT_TYPE_EAST_BFLETS_PRIVATE;
  710. }
  711. if (IsInSameNetwork6ByStr(ip_str, "2408:200::", "/23"))
  712. {
  713. // Wrapping in network of NTT East NGN
  714. ret |= FLETS_DETECT_TYPE_EAST_NGN_PRIVATE;
  715. }
  716. if (IsInSameNetwork6ByStr(ip_str, "2001:a200::", "/23"))
  717. {
  718. // Wrapping in network of NTT West NGN
  719. ret |= FLETS_DETECT_TYPE_WEST_NGN_PRIVATE;
  720. }
  721. }
  722. }
  723. FreeHostIPAddressList(o);
  724. */
  725. return ret;
  726. }
  727. // Query for the IP address using the DNS proxy for the B FLETs
  728. bool GetIPViaDnsProxyForJapanFlets(IP *ip_ret, char *hostname, bool ipv6, UINT timeout, bool *cancel, char *dns_proxy_hostname)
  729. {
  730. SOCK *s;
  731. char connect_hostname[MAX_SIZE];
  732. char connect_hostname2[MAX_SIZE];
  733. IP dns_proxy_ip;
  734. bool ret = false;
  735. bool dummy_flag = false;
  736. char request_str[512];
  737. // Validate arguments
  738. if (ip_ret == NULL || hostname == NULL)
  739. {
  740. return false;
  741. }
  742. if (timeout == 0)
  743. {
  744. timeout = BFLETS_DNS_PROXY_TIMEOUT_FOR_QUERY;
  745. }
  746. if (cancel == NULL)
  747. {
  748. cancel = &dummy_flag;
  749. }
  750. // Get the IP address of the DNS proxy server
  751. if (IsEmptyStr(dns_proxy_hostname))
  752. {
  753. // B FLETs
  754. if (GetDnsProxyIPAddressForJapanBFlets(&dns_proxy_ip, BFLETS_DNS_PROXY_TIMEOUT_FOR_GET_F, cancel) == false)
  755. {
  756. return false;
  757. }
  758. }
  759. else
  760. {
  761. // FLET'S NEXT
  762. if (GetIP4Ex6Ex2(&dns_proxy_ip, dns_proxy_hostname, FLETS_NGN_DNS_QUERY_TIMEOUT, true, cancel, true) == false)
  763. {
  764. return false;
  765. }
  766. }
  767. if (*cancel)
  768. {
  769. return false;
  770. }
  771. IPToStr(connect_hostname, sizeof(connect_hostname), &dns_proxy_ip);
  772. /*{
  773. StrCpy(connect_hostname, sizeof(connect_hostname), "2409:250:62c0:100:6a05:caff:fe09:5158");
  774. }*/
  775. StrCpy(connect_hostname2, sizeof(connect_hostname2), connect_hostname);
  776. if (IsIP6(&dns_proxy_ip))
  777. {
  778. Format(connect_hostname2, sizeof(connect_hostname2), "[%s]", connect_hostname);
  779. }
  780. s = ConnectEx3(connect_hostname, BFLETS_DNS_PROXY_PORT, timeout, cancel, NULL, NULL, false, false, false);
  781. if (s == NULL)
  782. {
  783. return false;
  784. }
  785. if (*cancel)
  786. {
  787. Disconnect(s);
  788. ReleaseSock(s);
  789. return false;
  790. }
  791. SetTimeout(s, timeout);
  792. // Start the SSL
  793. if (StartSSLEx(s, NULL, NULL, true, 0, NULL) && (*cancel == false))
  794. {
  795. UCHAR hash[SHA1_SIZE];
  796. BUF *hash2 = StrToBin(BFLETS_DNS_PROXY_CERT_HASH);
  797. Zero(hash, sizeof(hash));
  798. GetXDigest(s->RemoteX, hash, true);
  799. if (Cmp(hash, hash2->Buf, SHA1_SIZE) == 0)
  800. {
  801. // Send the HTTP Request
  802. Format(request_str, sizeof(request_str),
  803. "GET " BFLETS_DNS_PROXY_PATH "?q=%s&ipv6=%u\r\n"
  804. "\r\n",
  805. hostname, ipv6, connect_hostname2);
  806. if (SendAll(s, request_str, StrLen(request_str), true))
  807. {
  808. if (*cancel == false)
  809. {
  810. BUF *recv_buf = NewBuf();
  811. UINT port_ret;
  812. while (true)
  813. {
  814. UCHAR tmp[MAX_SIZE];
  815. UINT r;
  816. r = Recv(s, tmp, sizeof(tmp), true);
  817. if (r == 0 || (recv_buf->Size > 65536))
  818. {
  819. break;
  820. }
  821. else
  822. {
  823. WriteBuf(recv_buf, tmp, r);
  824. }
  825. }
  826. ret = RUDPParseIPAndPortStr(recv_buf->Buf, recv_buf->Size, ip_ret, &port_ret);
  827. FreeBuf(recv_buf);
  828. }
  829. }
  830. }
  831. FreeBuf(hash2);
  832. }
  833. Disconnect(s);
  834. ReleaseSock(s);
  835. if (ret)
  836. {
  837. NewDnsCache(hostname, ip_ret);
  838. }
  839. return ret;
  840. }
  841. // Get the IP address of the available DNS proxy in B-FLET'S service that is provided by NTT East of Japan
  842. bool GetDnsProxyIPAddressForJapanBFlets(IP *ip_ret, UINT timeout, bool *cancel)
  843. {
  844. BUF *b;
  845. LIST *o;
  846. bool ret = false;
  847. // Validate arguments
  848. if (ip_ret == NULL)
  849. {
  850. return false;
  851. }
  852. if (timeout == 0)
  853. {
  854. timeout = BFLETS_DNS_PROXY_TIMEOUT_FOR_GET_F;
  855. }
  856. b = QueryFileByUdpForJapanBFlets(timeout, cancel);
  857. if (b == NULL)
  858. {
  859. return false;
  860. }
  861. o = ReadIni(b);
  862. if (o != NULL)
  863. {
  864. INI_ENTRY *e = GetIniEntry(o, "DDnsServerForBFlets");
  865. if (e != NULL)
  866. {
  867. char *s = e->Value;
  868. if (IsEmptyStr(s) == false)
  869. {
  870. IP ip;
  871. if (StrToIP(&ip, s))
  872. {
  873. if (IsZeroIp(&ip) == false)
  874. {
  875. Copy(ip_ret, &ip, sizeof(IP));
  876. ret = true;
  877. }
  878. }
  879. }
  880. }
  881. }
  882. FreeIni(o);
  883. FreeBuf(b);
  884. return ret;
  885. }
  886. // Get a valid F.txt file in B-FLET'S service that is provided by NTT East of Japan
  887. BUF *QueryFileByUdpForJapanBFlets(UINT timeout, bool *cancel)
  888. {
  889. bool dummy_flag = false;
  890. BUF *txt_buf = NULL;
  891. BUF *ret = NULL;
  892. LIST *ip_list = NULL;
  893. UINT i;
  894. // Validate arguments
  895. if (cancel == NULL)
  896. {
  897. cancel = &dummy_flag;
  898. }
  899. if (timeout == 0)
  900. {
  901. timeout = BFLETS_DNS_PROXY_TIMEOUT_FOR_GET_F;
  902. }
  903. txt_buf = ReadDump(UDP_FILE_QUERY_BFLETS_TXT_FILENAME);
  904. if (txt_buf == NULL)
  905. {
  906. return NULL;
  907. }
  908. ip_list = NewListFast(NULL);
  909. while (true)
  910. {
  911. char *line = CfgReadNextLine(txt_buf);
  912. if (line == NULL)
  913. {
  914. break;
  915. }
  916. Trim(line);
  917. if (IsEmptyStr(line) == false && StartWith(line, "#") == false)
  918. {
  919. IP ip;
  920. if (StrToIP6(&ip, line))
  921. {
  922. if (IsZeroIp(&ip) == false)
  923. {
  924. if (IsIPv6LocalNetworkAddress(&ip) == false)
  925. {
  926. Add(ip_list, Clone(&ip, sizeof(IP)));
  927. }
  928. }
  929. }
  930. }
  931. Free(line);
  932. }
  933. FreeBuf(txt_buf);
  934. ret = QueryFileByIPv6Udp(ip_list, timeout, cancel);
  935. for (i = 0;i < LIST_NUM(ip_list);i++)
  936. {
  937. IP *ip = LIST_DATA(ip_list, i);
  938. Free(ip);
  939. }
  940. ReleaseList(ip_list);
  941. return ret;
  942. }
  943. // Request a file by UDP (send the requests to the multiple IP addresses at the same time)
  944. BUF *QueryFileByIPv6Udp(LIST *ip_list, UINT timeout, bool *cancel)
  945. {
  946. bool dummy_flag = false;
  947. UINT64 start_tick, giveup_tick;
  948. UINT64 next_send_tick;
  949. SOCK *s;
  950. INTERRUPT_MANAGER *interrupt;
  951. BUF *buf = NULL;
  952. SOCK_EVENT *se;
  953. UCHAR *tmp_buf;
  954. UINT tmp_buf_size = 65535;
  955. // Validate arguments
  956. if (cancel == NULL)
  957. {
  958. cancel = &dummy_flag;
  959. }
  960. if (ip_list == NULL)
  961. {
  962. return NULL;
  963. }
  964. s = NewUDP6(0, NULL);
  965. if (s == NULL)
  966. {
  967. return NULL;
  968. }
  969. tmp_buf = Malloc(tmp_buf_size);
  970. start_tick = Tick64();
  971. giveup_tick = start_tick + (UINT64)timeout;
  972. next_send_tick = 0;
  973. interrupt = NewInterruptManager();
  974. AddInterrupt(interrupt, giveup_tick);
  975. se = NewSockEvent();
  976. JoinSockToSockEvent(s, se);
  977. while (true)
  978. {
  979. UINT64 now = Tick64();
  980. if (now >= giveup_tick)
  981. {
  982. // Time-out
  983. break;
  984. }
  985. if (*cancel)
  986. {
  987. // User canceled
  988. break;
  989. }
  990. // Receive
  991. while (true)
  992. {
  993. IP src_ip;
  994. UINT src_port;
  995. UINT r;
  996. r = RecvFrom(s, &src_ip, &src_port, tmp_buf, tmp_buf_size);
  997. if (r == SOCK_LATER || r == 0)
  998. {
  999. break;
  1000. }
  1001. if (src_port == UDP_FILE_QUERY_DST_PORT)
  1002. {
  1003. if (r >= 40)
  1004. {
  1005. if (Cmp(tmp_buf, UDP_FILE_QUERY_MAGIC_NUMBER, StrLen(UDP_FILE_QUERY_MAGIC_NUMBER)) == 0)
  1006. {
  1007. // Successful reception
  1008. buf = NewBuf();
  1009. WriteBuf(buf, tmp_buf, r);
  1010. SeekBuf(buf, 0, 0);
  1011. break;
  1012. }
  1013. }
  1014. }
  1015. }
  1016. if (buf != NULL)
  1017. {
  1018. // Successful reception
  1019. break;
  1020. }
  1021. if (next_send_tick == 0 || (now >= next_send_tick))
  1022. {
  1023. // Transmission
  1024. UINT i;
  1025. for (i = 0;i < LIST_NUM(ip_list);i++)
  1026. {
  1027. IP *ip = LIST_DATA(ip_list, i);
  1028. UCHAR c = 'F';
  1029. SendTo(s, ip, UDP_FILE_QUERY_DST_PORT, &c, 1);
  1030. }
  1031. next_send_tick = now + (UINT64)UDP_FILE_QUERY_RETRY_INTERVAL;
  1032. AddInterrupt(interrupt, next_send_tick);
  1033. }
  1034. WaitSockEvent(se, GetNextIntervalForInterrupt(interrupt));
  1035. }
  1036. FreeInterruptManager(interrupt);
  1037. Disconnect(s);
  1038. ReleaseSock(s);
  1039. ReleaseSockEvent(se);
  1040. Free(tmp_buf);
  1041. return buf;
  1042. }
  1043. // Parse the user name of the NT
  1044. void ParseNtUsername(char *src_username, char *dst_username, UINT dst_username_size, char *dst_domain, UINT dst_domain_size, bool do_not_parse_atmark)
  1045. {
  1046. char tmp_username[MAX_SIZE];
  1047. char tmp_domain[MAX_SIZE];
  1048. TOKEN_LIST *t;
  1049. if (src_username != dst_username)
  1050. {
  1051. ClearStr(dst_username, dst_username_size);
  1052. }
  1053. ClearStr(dst_domain, dst_domain_size);
  1054. // Validate arguments
  1055. if (src_username == NULL || dst_username == NULL || dst_domain == NULL)
  1056. {
  1057. return;
  1058. }
  1059. StrCpy(tmp_username, sizeof(tmp_username), src_username);
  1060. ClearStr(tmp_domain, sizeof(tmp_domain));
  1061. // Analysis of [email protected] format
  1062. if (do_not_parse_atmark == false)
  1063. {
  1064. t = ParseTokenWithNullStr(tmp_username, "@");
  1065. if (t->NumTokens >= 1)
  1066. {
  1067. StrCpy(tmp_username, sizeof(tmp_username), t->Token[0]);
  1068. }
  1069. if (t->NumTokens >= 2)
  1070. {
  1071. StrCpy(tmp_domain, sizeof(tmp_domain), t->Token[1]);
  1072. }
  1073. FreeToken(t);
  1074. }
  1075. // If the username part is in "domain\username" format, split it
  1076. t = ParseTokenWithNullStr(tmp_username, "\\");
  1077. if (t->NumTokens >= 2)
  1078. {
  1079. if (IsEmptyStr(tmp_domain))
  1080. {
  1081. StrCpy(tmp_domain, sizeof(tmp_domain), t->Token[0]);
  1082. }
  1083. StrCpy(tmp_username, sizeof(tmp_username), t->Token[1]);
  1084. }
  1085. FreeToken(t);
  1086. StrCpy(dst_username, dst_username_size, tmp_username);
  1087. StrCpy(dst_domain, dst_domain_size, tmp_domain);
  1088. }
  1089. // The calculation of the optimum MSS value for use in TCP/IP packet in the payload of bulk transfer in R-UDP session
  1090. UINT RUDPCalcBestMssForBulk(RUDP_STACK *r, RUDP_SESSION *se)
  1091. {
  1092. UINT ret;
  1093. // Validate arguments
  1094. if (r == NULL || se == NULL)
  1095. {
  1096. return 0;
  1097. }
  1098. ret = MTU_FOR_PPPOE;
  1099. // IPv4
  1100. if (IsIP6(&se->YourIp) == false)
  1101. {
  1102. ret -= 20;
  1103. }
  1104. else
  1105. {
  1106. ret -= 40;
  1107. }
  1108. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  1109. {
  1110. // ICMP
  1111. ret -= 8;
  1112. ret -= SHA1_SIZE;
  1113. }
  1114. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  1115. {
  1116. // UDP
  1117. ret -= 8;
  1118. // DNS
  1119. ret -= 42;
  1120. }
  1121. // IV
  1122. ret -= SHA1_SIZE;
  1123. // Sign
  1124. ret -= SHA1_SIZE;
  1125. // SEQ_NO
  1126. ret -= sizeof(UINT64);
  1127. // Padding Max
  1128. ret -= 31;
  1129. // Ethernet header (target packets of communication)
  1130. ret -= 14;
  1131. // IPv4 Header (target packet of communication)
  1132. ret -= 20;
  1133. // TCP header (target packet of communication)
  1134. ret -= 20;
  1135. // I don't know well, but subtract 24 bytes
  1136. ret -= 24;
  1137. return ret;
  1138. }
  1139. // Processing of the reply packet from the NAT-T server
  1140. void RUDPProcess_NatT_Recv(RUDP_STACK *r, UDPPACKET *udp)
  1141. {
  1142. BUF *b;
  1143. PACK *p;
  1144. // Validate arguments
  1145. if (r == NULL || udp == NULL)
  1146. {
  1147. return;
  1148. }
  1149. if (udp->Size >= 8)
  1150. {
  1151. char tmp[128];
  1152. Zero(tmp, sizeof(tmp));
  1153. Copy(tmp, udp->Data, MIN(udp->Size, sizeof(tmp) - 1));
  1154. if (StartWith(tmp, "IP="))
  1155. {
  1156. IP my_ip;
  1157. UINT my_port;
  1158. // There was a response to the packet to determine the NAT state
  1159. if (IsEmptyStr(r->NatT_Registered_IPAndPort) == false)
  1160. {
  1161. if (StrCmpi(r->NatT_Registered_IPAndPort, tmp) != 0)
  1162. {
  1163. // Redo getting the token and registration because the NAT state is changed
  1164. ClearStr(r->NatT_Registered_IPAndPort, sizeof(r->NatT_Registered_IPAndPort));
  1165. r->NatT_GetTokenNextTick = 0;
  1166. r->NatT_GetTokenFailNum = 0;
  1167. r->NatT_Token_Ok = false;
  1168. Zero(r->NatT_Token, sizeof(r->NatT_Token));
  1169. r->NatT_RegisterNextTick = 0;
  1170. r->NatT_RegisterFailNum = 0;
  1171. r->NatT_Register_Ok = false;
  1172. }
  1173. }
  1174. if (RUDPParseIPAndPortStr(udp->Data, udp->Size, &my_ip, &my_port))
  1175. {
  1176. if (r->NatTGlobalUdpPort != NULL)
  1177. {
  1178. *r->NatTGlobalUdpPort = my_port;
  1179. }
  1180. }
  1181. return;
  1182. }
  1183. }
  1184. // Interpret the UDP packet
  1185. b = NewBuf();
  1186. WriteBuf(b, udp->Data, udp->Size);
  1187. SeekBuf(b, 0, 0);
  1188. p = BufToPack(b);
  1189. if (p != NULL)
  1190. {
  1191. bool is_ok = PackGetBool(p, "ok");
  1192. UINT64 tran_id = PackGetInt64(p, "tran_id");
  1193. ExtractAndApplyDynList(p);
  1194. if (r->ServerMode)
  1195. {
  1196. if (PackCmpStr(p, "opcode", "get_token"))
  1197. {
  1198. // Get the Token
  1199. if (is_ok && (tran_id == r->NatT_TranId))
  1200. {
  1201. char tmp[MAX_SIZE];
  1202. if (PackGetStr(p, "token", tmp, sizeof(tmp)) && IsEmptyStr(tmp) == false)
  1203. {
  1204. char myip[MAX_SIZE];
  1205. // Acquisition success
  1206. StrCpy(r->NatT_Token, sizeof(r->NatT_Token), tmp);
  1207. r->NatT_Token_Ok = true;
  1208. r->NatT_GetTokenNextTick = r->Now + (UINT64)GenRandInterval(UDP_NAT_T_GET_TOKEN_INTERVAL_2_MIN, UDP_NAT_T_GET_TOKEN_INTERVAL_2_MAX);
  1209. r->NatT_GetTokenFailNum = 0;
  1210. // Since success to obtain the self global IPv4 address,
  1211. // re-obtain the destination NAT-T host from this IPv4 address
  1212. if (PackGetStr(p, "your_ip", myip, sizeof(myip)))
  1213. {
  1214. IP ip;
  1215. char new_hostname[MAX_SIZE];
  1216. StrToIP(&ip, myip);
  1217. SetCurrentGlobalIP(&ip, false);
  1218. RUDPGetRegisterHostNameByIP(new_hostname,
  1219. sizeof(new_hostname), &ip);
  1220. Lock(r->Lock);
  1221. {
  1222. if (StrCmpi(r->CurrentRegisterHostname, new_hostname) != 0)
  1223. {
  1224. r->NumChangedHostname++;
  1225. if (r->NumChangedHostname <= RUDP_NATT_MAX_CONT_CHANGE_HOSTNAME)
  1226. {
  1227. if (r->NumChangedHostnameValueResetTick == 0)
  1228. {
  1229. r->NumChangedHostnameValueResetTick = r->Now + (UINT64)RUDP_NATT_CONT_CHANGE_HOSTNAME_RESET_INTERVAL;
  1230. }
  1231. // Change the host name
  1232. Debug("CurrentRegisterHostname Changed: New=%s\n", new_hostname);
  1233. StrCpy(r->CurrentRegisterHostname, sizeof(r->CurrentRegisterHostname), new_hostname);
  1234. Zero(&r->NatT_IP, sizeof(r->NatT_IP));
  1235. //Zero(&r->NatT_IP_Safe, sizeof(r->NatT_IP_Safe));
  1236. Set(r->HaltEvent);
  1237. }
  1238. else
  1239. {
  1240. if (r->NumChangedHostnameValueResetTick == 0)
  1241. {
  1242. r->NumChangedHostnameValueResetTick = r->Now + (UINT64)RUDP_NATT_CONT_CHANGE_HOSTNAME_RESET_INTERVAL;
  1243. }
  1244. if (r->Now >= r->NumChangedHostnameValueResetTick)
  1245. {
  1246. r->NumChangedHostname = 0;
  1247. r->NumChangedHostnameValueResetTick = 0;
  1248. }
  1249. }
  1250. }
  1251. else
  1252. {
  1253. r->NumChangedHostname = 0;
  1254. r->NumChangedHostnameValueResetTick = 0;
  1255. }
  1256. }
  1257. Unlock(r->Lock);
  1258. }
  1259. AddInterrupt(r->Interrupt, r->NatT_GetTokenNextTick);
  1260. }
  1261. }
  1262. }
  1263. else if (PackCmpStr(p, "opcode", "nat_t_register"))
  1264. {
  1265. // NAT-T server registration result
  1266. if (is_ok && (tran_id == r->NatT_TranId))
  1267. {
  1268. UINT my_global_port;
  1269. // Successful registration
  1270. r->NatT_Register_Ok = true;
  1271. r->NatT_RegisterNextTick = r->Now + (UINT64)GenRandInterval(UDP_NAT_T_REGISTER_INTERVAL_MIN, UDP_NAT_T_REGISTER_INTERVAL_MAX);
  1272. r->NatT_RegisterFailNum = 0;
  1273. Debug("NAT-T Registered.\n");
  1274. // Save the IP address and port number at the time of registration
  1275. PackGetStr(p, "your_ip_and_port", r->NatT_Registered_IPAndPort, sizeof(r->NatT_Registered_IPAndPort));
  1276. if (g_source_ip_validation_force_disable == false)
  1277. {
  1278. // Enable the source IP address validation mechanism
  1279. r->NatT_EnableSourceIpValidation = PackGetBool(p, "enable_source_ip_validation");
  1280. }
  1281. else
  1282. {
  1283. // Force disable the source IP address validation mechanism
  1284. r->NatT_EnableSourceIpValidation = false;
  1285. }
  1286. // Global port of itself
  1287. my_global_port = PackGetInt(p, "your_port");
  1288. if (my_global_port != 0)
  1289. {
  1290. if (r->NatTGlobalUdpPort != NULL)
  1291. {
  1292. *r->NatTGlobalUdpPort = my_global_port;
  1293. }
  1294. }
  1295. AddInterrupt(r->Interrupt, r->NatT_RegisterNextTick);
  1296. }
  1297. }
  1298. else if (PackCmpStr(p, "opcode", "nat_t_connect_relay"))
  1299. {
  1300. // Connection request from the client via the NAT-T server
  1301. if (is_ok && (PackGetInt64(p, "session_key") == r->NatT_SessionKey))
  1302. {
  1303. char client_ip_str[MAX_SIZE];
  1304. UINT client_port;
  1305. IP client_ip;
  1306. PackGetStr(p, "client_ip", client_ip_str, sizeof(client_ip_str));
  1307. client_port = PackGetInt(p, "client_port");
  1308. StrToIP(&client_ip, client_ip_str);
  1309. if (IsZeroIp(&client_ip) == false && client_port != 0)
  1310. {
  1311. UCHAR *rand_data;
  1312. UINT rand_size;
  1313. if (r->NatT_EnableSourceIpValidation)
  1314. {
  1315. RUDPAddIpToValidateList(r, &client_ip);
  1316. }
  1317. rand_size = Rand32() % 19;
  1318. rand_data = Malloc(rand_size);
  1319. Rand(rand_data, rand_size);
  1320. RUDPSendPacket(r, &client_ip, client_port, rand_data, rand_size, 0);
  1321. Free(rand_data);
  1322. }
  1323. }
  1324. }
  1325. }
  1326. FreePack(p);
  1327. }
  1328. FreeBuf(b);
  1329. }
  1330. // Set the flag of the source IP address validation function
  1331. void RUDPSetSourceIpValidationForceDisable(bool b)
  1332. {
  1333. g_source_ip_validation_force_disable = b;
  1334. }
  1335. // Process such as packet transmission for NAT-T server
  1336. void RUDPDo_NatT_Interrupt(RUDP_STACK *r)
  1337. {
  1338. // Validate arguments
  1339. if (r == NULL)
  1340. {
  1341. return;
  1342. }
  1343. if (r->ServerMode)
  1344. {
  1345. if (g_no_rudp_register == false && IsZeroIp(&r->NatT_IP_Safe) == false)
  1346. {
  1347. if (r->NatT_GetTokenNextTick == 0 || r->Now >= r->NatT_GetTokenNextTick)
  1348. {
  1349. // Try to get a token from the NAT-T server periodically
  1350. PACK *p = NewPack();
  1351. BUF *b;
  1352. PackAddStr(p, "opcode", "get_token");
  1353. PackAddInt64(p, "tran_id", r->NatT_TranId);
  1354. PackAddInt(p, "nat_traversal_version", UDP_NAT_TRAVERSAL_VERSION);
  1355. b = PackToBuf(p);
  1356. FreePack(p);
  1357. RUDPSendPacket(r, &r->NatT_IP_Safe, UDP_NAT_T_PORT, b->Buf, b->Size, 0);
  1358. FreeBuf(b);
  1359. // Determine the next acquisition time
  1360. r->NatT_GetTokenFailNum++;
  1361. r->NatT_GetTokenNextTick = r->Now + (UINT64)(UDP_NAT_T_GET_TOKEN_INTERVAL_1 * (UINT64)MIN(r->NatT_GetTokenFailNum, UDP_NAT_T_GET_TOKEN_INTERVAL_FAIL_MAX));
  1362. AddInterrupt(r->Interrupt, r->NatT_GetTokenNextTick);
  1363. r->NatT_Token_Ok = false;
  1364. }
  1365. }
  1366. {
  1367. if (IsZeroIp(&r->NatT_IP_Safe) == false)
  1368. {
  1369. // Normal servers: Send request packets to the NAT-T server
  1370. if (r->NatT_NextNatStatusCheckTick == 0 || r->Now >= r->NatT_NextNatStatusCheckTick)
  1371. {
  1372. UCHAR a = 'A';
  1373. UINT ddns_hash;
  1374. // Check of the NAT state
  1375. RUDPSendPacket(r, &r->NatT_IP_Safe, UDP_NAT_T_PORT, &a, 1, 0);
  1376. // Execution time of the next
  1377. r->NatT_NextNatStatusCheckTick = r->Now + (UINT64)GenRandInterval(UDP_NAT_T_NAT_STATUS_CHECK_INTERVAL_MIN, UDP_NAT_T_NAT_STATUS_CHECK_INTERVAL_MAX);
  1378. AddInterrupt(r->Interrupt, r->NatT_NextNatStatusCheckTick);
  1379. // Check whether the DDNS host name changing have not occurred
  1380. ddns_hash = GetCurrentDDnsFqdnHash();
  1381. if (r->LastDDnsFqdnHash != ddns_hash)
  1382. {
  1383. r->LastDDnsFqdnHash = ddns_hash;
  1384. // Do the Register immediately if there is a change in the DDNS host name
  1385. r->NatT_RegisterNextTick = 0;
  1386. }
  1387. }
  1388. }
  1389. }
  1390. if (r->NatT_Token_Ok && g_no_rudp_register == false && IsZeroIp(&r->NatT_IP_Safe) == false)
  1391. {
  1392. if (r->NatT_RegisterNextTick == 0 || r->Now >= r->NatT_RegisterNextTick)
  1393. {
  1394. // Try to register itself periodically for NAT-T server
  1395. PACK *p = NewPack();
  1396. BUF *b;
  1397. char private_ip_str[MAX_SIZE];
  1398. char machine_key[MAX_SIZE];
  1399. char machine_name[MAX_SIZE];
  1400. UCHAR hash[SHA1_SIZE];
  1401. char ddns_fqdn[MAX_SIZE];
  1402. Debug("NAT-T Registering...\n");
  1403. GetCurrentDDnsFqdn(ddns_fqdn, sizeof(ddns_fqdn));
  1404. PackAddStr(p, "opcode", "nat_t_register");
  1405. PackAddInt64(p, "tran_id", r->NatT_TranId);
  1406. PackAddStr(p, "token", r->NatT_Token);
  1407. PackAddStr(p, "svc_name", r->SvcName);
  1408. PackAddStr(p, "product_str", CEDAR_PRODUCT_STR);
  1409. PackAddInt64(p, "session_key", r->NatT_SessionKey);
  1410. PackAddInt(p, "nat_traversal_version", UDP_NAT_TRAVERSAL_VERSION);
  1411. if (g_natt_low_priority)
  1412. {
  1413. PackAddBool(p, "low_priority", g_natt_low_priority);
  1414. }
  1415. Zero(private_ip_str, sizeof(private_ip_str));
  1416. if (IsZeroIp(&r->My_Private_IP_Safe) == false)
  1417. {
  1418. IPToStr(private_ip_str, sizeof(private_ip_str), &r->My_Private_IP_Safe);
  1419. PackAddStr(p, "private_ip", private_ip_str);
  1420. }
  1421. PackAddInt(p, "private_port", r->UdpSock->LocalPort);
  1422. Zero(hash, sizeof(hash));
  1423. GetCurrentMachineIpProcessHash(hash);
  1424. BinToStr(machine_key, sizeof(machine_key), hash, sizeof(hash));
  1425. PackAddStr(p, "machine_key", machine_key);
  1426. Zero(machine_name, sizeof(machine_name));
  1427. GetMachineName(machine_name, sizeof(machine_name));
  1428. PackAddStr(p, "host_name", machine_name);
  1429. PackAddStr(p, "ddns_fqdn", ddns_fqdn);
  1430. b = PackToBuf(p);
  1431. FreePack(p);
  1432. RUDPSendPacket(r, &r->NatT_IP_Safe, UDP_NAT_T_PORT, b->Buf, b->Size, 0);
  1433. //RUDPSendPacket(r, &r->NatT_IP_Safe, UDP_NAT_T_PORT, "a", 1);
  1434. FreeBuf(b);
  1435. // Determine the next acquisition time
  1436. r->NatT_RegisterFailNum++;
  1437. r->NatT_RegisterNextTick = r->Now + (UINT64)UDP_NAT_T_REGISTER_INTERVAL_INITIAL * (UINT64)MIN(r->NatT_RegisterFailNum, UDP_NAT_T_REGISTER_INTERVAL_FAIL_MAX);
  1438. AddInterrupt(r->Interrupt, r->NatT_RegisterNextTick);
  1439. r->NatT_Register_Ok = false;
  1440. }
  1441. }
  1442. }
  1443. }
  1444. // R-UDP packet reception procedure
  1445. void RUDPRecvProc(RUDP_STACK *r, UDPPACKET *p)
  1446. {
  1447. RUDP_SESSION *se = NULL;
  1448. // Validate arguments
  1449. if (r == NULL || p == NULL)
  1450. {
  1451. return;
  1452. }
  1453. if (r->ServerMode)
  1454. {
  1455. if (g_no_rudp_server)
  1456. {
  1457. return;
  1458. }
  1459. }
  1460. if (r->ServerMode && r->NoNatTRegister == false)
  1461. {
  1462. if (p->SrcPort == UDP_NAT_T_PORT && CmpIpAddr(&p->SrcIP, &r->NatT_IP_Safe) == 0)
  1463. {
  1464. // There was a response from the NAT-T server
  1465. RUDPProcess_NatT_Recv(r, p);
  1466. return;
  1467. }
  1468. }
  1469. if (r->ServerMode)
  1470. {
  1471. if (r->ProcRpcRecv != NULL)
  1472. {
  1473. if (r->ProcRpcRecv(r, p))
  1474. {
  1475. return;
  1476. }
  1477. }
  1478. }
  1479. if (r->ServerMode)
  1480. {
  1481. // Search the session by the end-point information if in the server mode
  1482. se = RUDPSearchSession(r, &p->DstIP, p->DestPort, &p->SrcIP, p->SrcPort);
  1483. }
  1484. else
  1485. {
  1486. // Session should exist only one in the case of client mode
  1487. if (LIST_NUM(r->SessionList) >= 1)
  1488. {
  1489. se = LIST_DATA(r->SessionList, 0);
  1490. }
  1491. else
  1492. {
  1493. se = NULL;
  1494. }
  1495. }
  1496. if (p->Size < 20)
  1497. {
  1498. // The received packet is too small
  1499. if (r->ServerMode == false)
  1500. {
  1501. if (se != NULL && se->Status == RUDP_SESSION_STATUS_CONNECT_SENT)
  1502. {
  1503. if (CmpIpAddr(&se->YourIp, &p->SrcIP) == 0)
  1504. {
  1505. // If the connection initialization packet which is shorter than 20 bytes
  1506. // has been received from the server side, overwrite the source port number
  1507. // of the packet to the client-side session information (for some NAT)
  1508. se->YourPort = p->SrcPort;
  1509. }
  1510. }
  1511. }
  1512. return;
  1513. }
  1514. if (se == NULL && r->ServerMode && p->Size >= 40)
  1515. {
  1516. // Corresponding to a sudden change of port number on the client side.
  1517. // The target session is a session which matches the client side IP address
  1518. // and the key and the signature is verified
  1519. UINT i;
  1520. for (i = 0; i < LIST_NUM(r->SessionList);i++)
  1521. {
  1522. RUDP_SESSION *s = LIST_DATA(r->SessionList, i);
  1523. if (CmpIpAddr(&s->YourIp, &p->SrcIP) == 0)
  1524. {
  1525. if (RUDPCheckSignOfRecvPacket(r, s, p->Data, p->Size))
  1526. {
  1527. // Signature matched
  1528. se = s;
  1529. break;
  1530. }
  1531. }
  1532. }
  1533. }
  1534. if (se == NULL)
  1535. {
  1536. // There is no session
  1537. if (r->ServerMode)
  1538. {
  1539. if (p->Size < 40)
  1540. {
  1541. bool ok = true;
  1542. UCHAR ctoken_hash[SHA1_SIZE];
  1543. Zero(ctoken_hash, sizeof(ctoken_hash));
  1544. // Examine the quota of new session creation
  1545. if (LIST_NUM(r->SessionList) >= RUDP_QUOTA_MAX_NUM_SESSIONS)
  1546. {
  1547. // Entire number of sessions exceeds the limit
  1548. ok = false;
  1549. }
  1550. else if (r->NatT_EnableSourceIpValidation && RUDPIsIpInValidateList(r, &p->SrcIP) == false)
  1551. {
  1552. // Invalid source IP address, which is not registered on the validated source IP address list
  1553. ok = false;
  1554. }
  1555. else
  1556. {
  1557. UINT i;
  1558. // Check the number of sessions per IP address
  1559. UINT num = 0;
  1560. for (i = 0;i < LIST_NUM(r->SessionList);i++)
  1561. {
  1562. RUDP_SESSION *se = LIST_DATA(r->SessionList, i);
  1563. if (CmpIpAddr(&se->YourIp, &p->SrcIP) == 0)
  1564. {
  1565. num++;
  1566. }
  1567. }
  1568. if (num >= RUDP_QUOTA_MAX_NUM_SESSIONS_PER_IP)
  1569. {
  1570. // Limit exceeded the number of sessions per IP address
  1571. ok = false;
  1572. }
  1573. }
  1574. if (ok)
  1575. {
  1576. char ip_str[64];
  1577. // Create a session since a new session creation request packet was received
  1578. se = RUDPNewSession(true, &p->DstIP, p->DestPort, &p->SrcIP, p->SrcPort, p->Data);
  1579. se->Status = RUDP_SESSION_STATUS_ESTABLISHED;
  1580. Insert(r->SessionList, se);
  1581. IPToStr(ip_str, sizeof(ip_str), &p->SrcIP);
  1582. Debug("RUDPNewSession %X %s:%u\n", se, ip_str, p->SrcPort);
  1583. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  1584. {
  1585. // In case of ICMP, save the ICMP TYPE number to use
  1586. se->Icmp_Type = (p->Type == ICMP_TYPE_INFORMATION_REQUEST ? ICMP_TYPE_INFORMATION_REPLY : p->Type);
  1587. }
  1588. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  1589. {
  1590. // Save the Tran ID to be used if it's a DNS
  1591. se->Dns_TranId = (USHORT)p->Type;
  1592. }
  1593. }
  1594. }
  1595. }
  1596. }
  1597. else
  1598. {
  1599. if (p->Size < 40)
  1600. {
  1601. if (r->ServerMode)
  1602. {
  1603. if (Cmp(se->Key_Init, p->Data, SHA1_SIZE) == 0)
  1604. {
  1605. // New session creation request packet have received more than once. reply an ACK immediately for second and subsequent
  1606. se->LastSentTick = 0;
  1607. // Update the endpoint information
  1608. Copy(&se->YourIp, &p->SrcIP, sizeof(IP));
  1609. se->YourPort = p->SrcPort;
  1610. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  1611. {
  1612. // In case of ICMP, save the ICMP TYPE number to use
  1613. se->Icmp_Type = (p->Type == ICMP_TYPE_INFORMATION_REQUEST ? ICMP_TYPE_INFORMATION_REPLY : p->Type);
  1614. }
  1615. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  1616. {
  1617. // Save the Tran ID to be used if it's a DNS
  1618. se->Dns_TranId = (USHORT)p->Type;
  1619. }
  1620. }
  1621. else
  1622. {
  1623. // Since the different session creation request packet have been received from the same end point, ignore it
  1624. }
  1625. }
  1626. }
  1627. else
  1628. {
  1629. // Process the received packet
  1630. if (RUDPProcessRecvPacket(r, se, p->Data, p->Size) || RUDPProcessBulkRecvPacket(r, se, p->Data, p->Size))
  1631. {
  1632. // Update endpoint information (only the port number)
  1633. //Copy(&se->YourIp, &p->SrcIP, sizeof(IP));
  1634. se->YourPort = p->SrcPort;
  1635. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  1636. {
  1637. // In case of ICMP, save the ICMP TYPE number to use
  1638. if (r->ServerMode)
  1639. {
  1640. se->Icmp_Type = (p->Type == ICMP_TYPE_INFORMATION_REQUEST ? ICMP_TYPE_INFORMATION_REPLY : p->Type);
  1641. }
  1642. else
  1643. {
  1644. se->Icmp_Type = (p->Type == ICMP_TYPE_INFORMATION_REPLY ? ICMP_TYPE_INFORMATION_REQUEST : p->Type);
  1645. }
  1646. }
  1647. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  1648. {
  1649. if (r->ServerMode)
  1650. {
  1651. // Save the Tran ID to be used if it's a DNS
  1652. se->Dns_TranId = (USHORT)p->Type;
  1653. }
  1654. }
  1655. }
  1656. }
  1657. }
  1658. }
  1659. // Check whether the specificed IP address is in the validated source IP address list
  1660. bool RUDPIsIpInValidateList(RUDP_STACK *r, IP *ip)
  1661. {
  1662. UINT i;
  1663. UINT64 now = Tick64();
  1664. LIST *o = NULL;
  1665. bool ret = false;
  1666. // Validate arguments
  1667. if (r == NULL || ip == NULL)
  1668. {
  1669. return false;
  1670. }
  1671. // Always allow private IP addresses
  1672. if (IsIPPrivate(ip))
  1673. {
  1674. return true;
  1675. }
  1676. if (IsIPAddressInSameLocalNetwork(ip))
  1677. {
  1678. return true;
  1679. }
  1680. for (i = 0;i < LIST_NUM(r->NatT_SourceIpList);i++)
  1681. {
  1682. RUDP_SOURCE_IP *s = (RUDP_SOURCE_IP *)LIST_DATA(r->NatT_SourceIpList, i);
  1683. if (s->ExpiresTick <= now)
  1684. {
  1685. if (o == NULL)
  1686. {
  1687. o = NewListFast(NULL);
  1688. }
  1689. Add(o, s);
  1690. }
  1691. }
  1692. if (o != NULL)
  1693. {
  1694. for (i = 0;i < LIST_NUM(o);i++)
  1695. {
  1696. RUDP_SOURCE_IP *s = (RUDP_SOURCE_IP *)LIST_DATA(o, i);
  1697. Delete(r->NatT_SourceIpList, s);
  1698. Free(s);
  1699. }
  1700. ReleaseList(o);
  1701. }
  1702. for (i = 0;i < LIST_NUM(r->NatT_SourceIpList);i++)
  1703. {
  1704. RUDP_SOURCE_IP *s = (RUDP_SOURCE_IP *)LIST_DATA(r->NatT_SourceIpList, i);
  1705. if (CmpIpAddr(&s->ClientIP, ip) == 0)
  1706. {
  1707. ret = true;
  1708. break;
  1709. }
  1710. }
  1711. Debug("RUDP: NAT-T: Validate IP: %r, ret=%u (current list len = %u)\n", ip, ret, LIST_NUM(r->NatT_SourceIpList));
  1712. return ret;
  1713. }
  1714. // Add an IP address to the validated source IP address list
  1715. void RUDPAddIpToValidateList(RUDP_STACK *r, IP *ip)
  1716. {
  1717. UINT i;
  1718. RUDP_SOURCE_IP *sip;
  1719. UINT64 now = Tick64();
  1720. LIST *o = NULL;
  1721. // Validate arguments
  1722. if (r == NULL || ip == NULL)
  1723. {
  1724. return;
  1725. }
  1726. if (LIST_NUM(r->NatT_SourceIpList) >= RUDP_MAX_VALIDATED_SOURCE_IP_ADDRESSES)
  1727. {
  1728. return;
  1729. }
  1730. for (i = 0;i < LIST_NUM(r->NatT_SourceIpList);i++)
  1731. {
  1732. RUDP_SOURCE_IP *s = (RUDP_SOURCE_IP *)LIST_DATA(r->NatT_SourceIpList, i);
  1733. if (s->ExpiresTick <= now)
  1734. {
  1735. if (o == NULL)
  1736. {
  1737. o = NewListFast(NULL);
  1738. }
  1739. Add(o, s);
  1740. }
  1741. }
  1742. if (o != NULL)
  1743. {
  1744. for (i = 0;i < LIST_NUM(o);i++)
  1745. {
  1746. RUDP_SOURCE_IP *s = (RUDP_SOURCE_IP *)LIST_DATA(o, i);
  1747. Delete(r->NatT_SourceIpList, s);
  1748. Free(s);
  1749. }
  1750. ReleaseList(o);
  1751. }
  1752. sip = NULL;
  1753. for (i = 0;i < LIST_NUM(r->NatT_SourceIpList);i++)
  1754. {
  1755. RUDP_SOURCE_IP *s = (RUDP_SOURCE_IP *)LIST_DATA(r->NatT_SourceIpList, i);
  1756. if (CmpIpAddr(&s->ClientIP, ip) == 0)
  1757. {
  1758. sip = s;
  1759. break;
  1760. }
  1761. }
  1762. if (sip == NULL)
  1763. {
  1764. sip = ZeroMalloc(sizeof(RUDP_SOURCE_IP));
  1765. Copy(&sip->ClientIP, ip, sizeof(IP));
  1766. Add(r->NatT_SourceIpList, sip);
  1767. }
  1768. sip->ExpiresTick = now + (UINT64)RUDP_VALIDATED_SOURCE_IP_ADDRESS_EXPIRES;
  1769. Debug("RUDP: NAT-T: Src IP added: %r (current list len = %u)\n", ip, LIST_NUM(r->NatT_SourceIpList));
  1770. }
  1771. // R-UDP interrupt processing procedure
  1772. void RUDPInterruptProc(RUDP_STACK *r)
  1773. {
  1774. UINT i;
  1775. LIST *o;
  1776. // Validate arguments
  1777. if (r == NULL)
  1778. {
  1779. return;
  1780. }
  1781. // Packet transmission and other process for NAT-T server
  1782. if (r->NoNatTRegister == false)
  1783. {
  1784. RUDPDo_NatT_Interrupt(r);
  1785. }
  1786. if (r->ServerMode == false)
  1787. {
  1788. if (r->ClientInitiated == false)
  1789. {
  1790. bool client_target_inited = false;
  1791. Lock(r->Lock);
  1792. {
  1793. client_target_inited = r->TargetIpAndPortInited;
  1794. }
  1795. Unlock(r->Lock);
  1796. if (client_target_inited)
  1797. {
  1798. // Start a connection when there is the end point information of the destination server to connect as a client
  1799. RUDP_SESSION *se;
  1800. UCHAR init_key[SHA1_SIZE];
  1801. char ip_str[128];
  1802. UINT64 ui;
  1803. Rand(init_key, SHA1_SIZE);
  1804. se = RUDPNewSession(false, &r->UdpSock->LocalIP, r->UdpSock->LocalPort,
  1805. &r->TargetIp, r->TargetPort, init_key);
  1806. IPToStr(ip_str, sizeof(ip_str), &r->TargetIp);
  1807. Debug("RUDPNewSession %X %s:%u\n", se, ip_str, r->TargetPort);
  1808. Insert(r->SessionList, se);
  1809. ui = Endian64(se->Magic_Disconnect);
  1810. WriteFifo(se->SendFifo, &ui, sizeof(UINT64));
  1811. r->ClientInitiated = true;
  1812. }
  1813. }
  1814. }
  1815. // Process for all the sessions
  1816. for (i = 0;i < LIST_NUM(r->SessionList);i++)
  1817. {
  1818. RUDP_SESSION *se = LIST_DATA(r->SessionList, i);
  1819. if (r->Halt)
  1820. {
  1821. // Disconnect all the sessions if the R-UDP stack stopped
  1822. RUDPDisconnectSession(r, se, false);
  1823. }
  1824. if (se->FlushBulkSendTube)
  1825. {
  1826. if (se->TcpSock != NULL && se->TcpSock->BulkSendTube != NULL)
  1827. {
  1828. TubeFlush(se->TcpSock->BulkSendTube);
  1829. }
  1830. se->FlushBulkSendTube = false;
  1831. }
  1832. if (se->Status == RUDP_SESSION_STATUS_ESTABLISHED)
  1833. {
  1834. // Process for all of the sessions which is established a connection
  1835. UINT j;
  1836. if (r->Now >= (se->LatestRecvMyTick + (UINT64)RUDP_TIMEOUT))
  1837. {
  1838. // Disconnect the session because the fully communication failure is detected for a while
  1839. Debug("R-UDP Session %X Timed Out.\n", se);
  1840. RUDPDisconnectSession(r, se, false);
  1841. }
  1842. // If there are received segments, read to the part that has arrived in succession
  1843. if (FifoSize(se->RecvFifo) <= RUDP_MAX_FIFO_SIZE)
  1844. {
  1845. LIST *o;
  1846. UINT64 current_seq_no;
  1847. o = NULL;
  1848. current_seq_no = se->LastRecvCompleteSeqNo;
  1849. for (j = 0;j < LIST_NUM(se->RecvSegmentList);j++)
  1850. {
  1851. RUDP_SEGMENT *s;
  1852. current_seq_no++;
  1853. s = LIST_DATA(se->RecvSegmentList, j);
  1854. if (s->SeqNo == current_seq_no)
  1855. {
  1856. #ifdef RUDP_DETAIL_LOG
  1857. Debug("%X s->SeqNo = %I64u, current_seq_no = %I64u\n", se, s->SeqNo, current_seq_no);
  1858. #endif // RUDP_DETAIL_LOG
  1859. if (s->Size == sizeof(se->Magic_KeepAliveRequest) && Cmp(s->Data, se->Magic_KeepAliveRequest, sizeof(se->Magic_KeepAliveRequest)) == 0)
  1860. {
  1861. // Receive the KeepAlive Request
  1862. #ifdef RUDP_DETAIL_LOG
  1863. Debug("Recv KeepAlive Request\n");
  1864. #endif // RUDP_DETAIL_LOG
  1865. // Send a KeepAlive Response if the transmisson queue is empty
  1866. if (LIST_NUM(se->SendSegmentList) == 0)
  1867. {
  1868. #ifdef RUDP_DETAIL_LOG
  1869. Debug("Send KeepAlive Response\n");
  1870. #endif // RUDP_DETAIL_LOG
  1871. RUDPSendSegment(r, se, se->Magic_KeepAliveResponse, sizeof(se->Magic_KeepAliveResponse));
  1872. }
  1873. }
  1874. else if (s->Size == sizeof(se->Magic_KeepAliveResponse) && Cmp(s->Data, se->Magic_KeepAliveResponse, sizeof(se->Magic_KeepAliveResponse)) == 0)
  1875. {
  1876. // Receive the KeepAlive Response
  1877. #ifdef RUDP_DETAIL_LOG
  1878. Debug("Recv KeepAlive Response\n");
  1879. #endif // RUDP_DETAIL_LOG
  1880. }
  1881. else
  1882. {
  1883. // Write to the receive FIFO
  1884. WriteFifo(se->RecvFifo, s->Data, s->Size);
  1885. }
  1886. r->TotalLogicalReceived += s->Size;
  1887. // Advance the SEQ NO which has been received completely
  1888. se->LastRecvCompleteSeqNo = s->SeqNo;
  1889. // Add to the Delete list
  1890. if (o == NULL)
  1891. {
  1892. o = NewListFast(NULL);
  1893. }
  1894. Add(o, s);
  1895. }
  1896. else
  1897. {
  1898. // Continuous reading is interrupted
  1899. #ifdef RUDP_DETAIL_LOG
  1900. Debug("%X s->SeqNo = %I64u, current_seq_no = %I64u\n", se, s->SeqNo, current_seq_no);
  1901. WHERE;
  1902. #endif // RUDP_DETAIL_LOG
  1903. break;
  1904. }
  1905. }
  1906. // Delete the segment which has been received completely
  1907. if (o != NULL)
  1908. {
  1909. for (j = 0;j < LIST_NUM(o);j++)
  1910. {
  1911. RUDP_SEGMENT *s = LIST_DATA(o, j);
  1912. Delete(se->RecvSegmentList, s);
  1913. Free(s);
  1914. }
  1915. ReleaseList(o);
  1916. }
  1917. }
  1918. if (r->ServerMode && se->Magic_Disconnect == 0)
  1919. {
  1920. if (FifoSize(se->RecvFifo) >= sizeof(UINT64))
  1921. {
  1922. UINT64 ui;
  1923. if (ReadFifo(se->RecvFifo, &ui, sizeof(UINT64)) == sizeof(UINT64))
  1924. {
  1925. ui = Endian64(ui);
  1926. if ((ui & 0xffffffff00000000ULL) != 0ULL)
  1927. {
  1928. se->Magic_Disconnect = ui;
  1929. }
  1930. }
  1931. }
  1932. }
  1933. // If the data remains in FIFO, write it to the TCP socket as possible
  1934. if (r->ServerMode == false || se->Magic_Disconnect != 0)
  1935. {
  1936. while (FifoSize(se->RecvFifo) >= 1)
  1937. {
  1938. UINT ret;
  1939. RUDPInitSock(r, se);
  1940. ret = Send(se->TcpSock, FifoPtr(se->RecvFifo), FifoSize(se->RecvFifo), false);
  1941. if (ret == SOCK_LATER)
  1942. {
  1943. // Can not write any more
  1944. break;
  1945. }
  1946. else if (ret == 0)
  1947. {
  1948. // Disconnected
  1949. Disconnect(se->TcpSock);
  1950. RUDPDisconnectSession(r, se, false);
  1951. break;
  1952. }
  1953. else
  1954. {
  1955. // Writing success
  1956. ReadFifo(se->RecvFifo, NULL, ret);
  1957. }
  1958. }
  1959. }
  1960. // Read the data as much as possible from the TCP socket and store it to FIFO
  1961. if (se->TcpSock != NULL)
  1962. {
  1963. SetNoNeedToRead(se->TcpSock);
  1964. while (FifoSize(se->SendFifo) <= RUDP_MAX_FIFO_SIZE)
  1965. {
  1966. UINT ret = Recv(se->TcpSock, r->TmpBuf, sizeof(r->TmpBuf), false);
  1967. if (ret == SOCK_LATER)
  1968. {
  1969. // Can not read any more
  1970. break;
  1971. }
  1972. else if (ret == 0)
  1973. {
  1974. // Disconnected
  1975. Disconnect(se->TcpSock);
  1976. RUDPDisconnectSession(r, se, false);
  1977. break;
  1978. }
  1979. else
  1980. {
  1981. // Reading success
  1982. WriteFifo(se->SendFifo, r->TmpBuf, ret);
  1983. }
  1984. }
  1985. }
  1986. // Attempt to send a divided segment
  1987. while (true)
  1988. {
  1989. UINT64 seq_no_min, seq_no_max;
  1990. seq_no_min = RUDPGetCurrentSendingMinSeqNo(se);
  1991. seq_no_max = RUDPGetCurrentSendingMaxSeqNo(se);
  1992. #ifdef RUDP_DETAIL_LOG
  1993. Debug("min=%I64u max=%I64u\n", seq_no_min, seq_no_max);
  1994. #endif // RUDP_DETAIL_LOG
  1995. if (seq_no_min == 0 || ((seq_no_min + RUDP_MAX_NUM_ACK - 1) >= se->NextSendSeqNo))
  1996. {
  1997. // Because there is a room to send a new segment, send a segment
  1998. UINT size = MIN(FifoSize(se->SendFifo), RUDP_MAX_SEGMENT_SIZE);
  1999. if (size == 0)
  2000. {
  2001. // There is no more data to send in FIFO
  2002. break;
  2003. }
  2004. // Transmission
  2005. RUDPSendSegment(r, se, FifoPtr(se->SendFifo), size);
  2006. r->TotalLogicalSent += size;
  2007. // Advance the FIFO
  2008. ReadFifo(se->SendFifo, NULL, size);
  2009. }
  2010. else
  2011. {
  2012. // There is no room to send a new segment further
  2013. break;
  2014. }
  2015. }
  2016. if (se->DisconnectFlag == false)
  2017. {
  2018. UINT64 seq_no_min;
  2019. if (se->LastSentTick == 0 || (r->Now >= (se->LastSentTick + (UINT64)se->NextKeepAliveInterval)))
  2020. {
  2021. if (LIST_NUM(se->SendSegmentList) == 0)
  2022. {
  2023. // Send a Keep-Alive if no data was sent for a while and the transmission queue is empty
  2024. RUDPSendSegment(r, se, se->Magic_KeepAliveRequest, sizeof(se->Magic_KeepAliveRequest));
  2025. #ifdef RUDP_DETAIL_LOG
  2026. Debug("Sent KeepAlive Request\n");
  2027. #endif // RUDP_DETAIL_LOG
  2028. }
  2029. se->NextKeepAliveInterval = RUDP_KEEPALIVE_INTERVAL_MIN + (Rand32() % (RUDP_KEEPALIVE_INTERVAL_MAX - RUDP_KEEPALIVE_INTERVAL_MIN));
  2030. AddInterrupt(r->Interrupt, r->Now + se->NextKeepAliveInterval);
  2031. }
  2032. seq_no_min = RUDPGetCurrentSendingMinSeqNo(se);
  2033. for (j = 0;j < LIST_NUM(se->SendSegmentList);j++)
  2034. {
  2035. RUDP_SEGMENT *s = LIST_DATA(se->SendSegmentList, j);
  2036. if (s->SeqNo <= (seq_no_min + RUDP_MAX_NUM_ACK - 1))
  2037. {
  2038. if (s->NextSendTick == 0 || r->Now >= s->NextSendTick)
  2039. {
  2040. UINT next_interval;
  2041. // Transmits a segment which has not been sent even once yet, or whose retransmission time has arrived
  2042. RUDPSendSegmentNow(r, se, s->SeqNo, s->Data, s->Size);
  2043. if (se->CurrentRtt != 0)
  2044. {
  2045. next_interval = (se->CurrentRtt * 120 / 100) * Power(2, MIN(s->NumSent, 10));
  2046. }
  2047. else
  2048. {
  2049. next_interval = RUDP_RESEND_TIMER * Power(2, MIN(s->NumSent, 10));
  2050. }
  2051. next_interval = MIN(next_interval, RUDP_RESEND_TIMER_MAX);
  2052. s->NumSent++;
  2053. s->NextSendTick = r->Now + next_interval;
  2054. AddInterrupt(r->Interrupt, s->NextSendTick);
  2055. }
  2056. }
  2057. }
  2058. while (LIST_NUM(se->ReplyAckList) >= 1)
  2059. {
  2060. // If there are ACKs which is not responded yet in the list, send all of them
  2061. RUDPSendSegmentNow(r, se, se->NextSendSeqNo, NULL, 0);
  2062. }
  2063. // Send all if there are bulk transfer data
  2064. if (se->TcpSock != NULL)
  2065. {
  2066. SOCK *s = se->TcpSock;
  2067. if (s->BulkRecvTube != NULL)
  2068. {
  2069. TUBE *t = s->BulkRecvTube;
  2070. while (true)
  2071. {
  2072. TUBEDATA *d = TubeRecvAsync(t);
  2073. if (d == NULL)
  2074. {
  2075. break;
  2076. }
  2077. if (d->Header != NULL && d->HeaderSize == sizeof(TCP_PAIR_HEADER))
  2078. {
  2079. TCP_PAIR_HEADER *h = d->Header;
  2080. if (h->EnableHMac)
  2081. {
  2082. se->UseHMac = true;
  2083. }
  2084. }
  2085. RUDPBulkSend(r, se, d->Data, d->DataSize);
  2086. FreeTubeData(d);
  2087. }
  2088. }
  2089. }
  2090. }
  2091. }
  2092. if (r->ServerMode == false)
  2093. {
  2094. if (se->Status == RUDP_SESSION_STATUS_CONNECT_SENT)
  2095. {
  2096. // Send a connection request periodically from the client side
  2097. if (se->LastSentTick == 0 || ((se->LastSentTick + (UINT64)RUDP_RESEND_TIMER) <= r->Now))
  2098. {
  2099. UCHAR tmp[40];
  2100. UINT size_of_padding = 19;
  2101. UINT size = size_of_padding + SHA1_SIZE;
  2102. se->LastSentTick = r->Now;
  2103. Copy(tmp, se->Key_Init, SHA1_SIZE);
  2104. Rand(tmp + SHA1_SIZE, size_of_padding);
  2105. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  2106. {
  2107. // ICMP packet
  2108. UCHAR *rand_data;
  2109. UINT rand_size;
  2110. rand_size = Rand32() % 64 + 64;
  2111. rand_data = Malloc(rand_size);
  2112. Rand(rand_data, rand_size);
  2113. RUDPSendPacket(r, &se->YourIp, se->YourPort, rand_data, rand_size, ICMP_TYPE_ECHO_REQUEST);
  2114. Free(rand_data);
  2115. se->Client_Icmp_NextSendEchoRequest = r->Now + GenRandInterval(RUDP_CLIENT_ECHO_REQUEST_SEND_INTERVAL_MIN, RUDP_CLIENT_ECHO_REQUEST_SEND_INTERVAL_MAX);
  2116. AddInterrupt(r->Interrupt, se->Client_Icmp_NextSendEchoRequest);
  2117. // Try in both INFORMATION_REQUEST and ECHO_RESPONSE from the client side first
  2118. RUDPSendPacket(r, &se->YourIp, se->YourPort, tmp, size, ICMP_TYPE_ECHO_RESPONSE);
  2119. RUDPSendPacket(r, &se->YourIp, se->YourPort, tmp, size, ICMP_TYPE_INFORMATION_REQUEST);
  2120. }
  2121. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  2122. {
  2123. // DNS
  2124. RUDPSendPacket(r, &se->YourIp, se->YourPort, tmp, size, se->Dns_TranId);
  2125. }
  2126. else
  2127. {
  2128. // Normal UDP
  2129. RUDPSendPacket(r, &se->YourIp, se->YourPort, tmp, size, 0);
  2130. }
  2131. AddInterrupt(r->Interrupt, r->Now + (UINT64)RUDP_RESEND_TIMER);
  2132. }
  2133. }
  2134. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  2135. {
  2136. if (se->Client_Icmp_NextSendEchoRequest == 0 || (r->Now >= se->Client_Icmp_NextSendEchoRequest))
  2137. {
  2138. // Periodic ICMP Echo transmission from the client side when R-UDP used in ICMP mode
  2139. // (To maintain the mapping table of the NAT)
  2140. UCHAR *rand_data;
  2141. UINT rand_size;
  2142. rand_size = Rand32() % 64 + 64;
  2143. rand_data = Malloc(rand_size);
  2144. Rand(rand_data, rand_size);
  2145. RUDPSendPacket(r, &se->YourIp, se->YourPort, rand_data, rand_size, ICMP_TYPE_ECHO_REQUEST);
  2146. Free(rand_data);
  2147. se->Client_Icmp_NextSendEchoRequest = r->Now + GenRandInterval(RUDP_CLIENT_ECHO_REQUEST_SEND_INTERVAL_MIN, RUDP_CLIENT_ECHO_REQUEST_SEND_INTERVAL_MAX);
  2148. AddInterrupt(r->Interrupt, se->Client_Icmp_NextSendEchoRequest);
  2149. }
  2150. }
  2151. }
  2152. }
  2153. // Release the disconnected sessions
  2154. o = NULL;
  2155. for (i = 0;i < LIST_NUM(r->SessionList);i++)
  2156. {
  2157. RUDP_SESSION *se = LIST_DATA(r->SessionList, i);
  2158. if (se->DisconnectFlag)
  2159. {
  2160. if (o == NULL)
  2161. {
  2162. o = NewListFast(NULL);
  2163. }
  2164. Add(o, se);
  2165. }
  2166. }
  2167. if (o != NULL)
  2168. {
  2169. for (i = 0;i < LIST_NUM(o);i++)
  2170. {
  2171. RUDP_SESSION *se = LIST_DATA(o, i);
  2172. Delete(r->SessionList, se);
  2173. RUDPFreeSession(se);
  2174. }
  2175. ReleaseList(o);
  2176. }
  2177. }
  2178. // Do the bulk send
  2179. void RUDPBulkSend(RUDP_STACK *r, RUDP_SESSION *se, void *data, UINT data_size)
  2180. {
  2181. UCHAR *buf;
  2182. UINT buf_size;
  2183. UINT padding_size;
  2184. UINT i;
  2185. CRYPT *c;
  2186. UCHAR crypt_key_src[SHA1_SIZE * 2];
  2187. UCHAR crypt_key[SHA1_SIZE];
  2188. UINT icmp_type;
  2189. // Validate arguments
  2190. if (r == NULL || se == NULL || (data == NULL && data_size != 0))
  2191. {
  2192. return;
  2193. }
  2194. if (se->BulkSendKey->Size == RUDP_BULK_KEY_SIZE_V2)
  2195. {
  2196. // Ver 2
  2197. UCHAR iv[RUDP_BULK_IV_SIZE_V2];
  2198. padding_size = Rand32() % 31 + 1;
  2199. // Packet: IV + Encrypted(SEQ_NO + Data + padding) + MAC
  2200. buf_size = RUDP_BULK_IV_SIZE_V2 + sizeof(UINT64) + data_size + padding_size + RUDP_BULK_MAC_SIZE_V2;
  2201. buf = Malloc(buf_size);
  2202. // IV
  2203. Copy(iv, se->BulkNextIv_V2, RUDP_BULK_IV_SIZE_V2);
  2204. Copy(buf, iv, RUDP_BULK_IV_SIZE_V2);
  2205. // SEQ NO
  2206. WRITE_UINT64(buf + RUDP_BULK_IV_SIZE_V2, se->BulkNextSeqNo);
  2207. se->BulkNextSeqNo++;
  2208. // Data
  2209. Copy(buf + RUDP_BULK_IV_SIZE_V2 + sizeof(UINT64), data, data_size);
  2210. // Padding
  2211. for (i = 0;i < padding_size;i++)
  2212. {
  2213. buf[RUDP_BULK_IV_SIZE_V2 + sizeof(UINT64) + data_size + i] = (UCHAR)padding_size;
  2214. }
  2215. // Encryption
  2216. Aead_ChaCha20Poly1305_Ietf_Encrypt(buf + RUDP_BULK_IV_SIZE_V2,
  2217. buf + RUDP_BULK_IV_SIZE_V2,
  2218. sizeof(UINT64) + data_size + padding_size,
  2219. se->BulkSendKey->Data,
  2220. iv,
  2221. NULL,
  2222. 0);
  2223. // Next IV
  2224. Copy(se->BulkNextIv_V2, buf + RUDP_BULK_IV_SIZE_V2 + sizeof(UINT64) + data_size + padding_size - RUDP_BULK_IV_SIZE_V2,
  2225. RUDP_BULK_IV_SIZE_V2);
  2226. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  2227. {
  2228. icmp_type = se->Icmp_Type;
  2229. }
  2230. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  2231. {
  2232. icmp_type = se->Dns_TranId;
  2233. }
  2234. RUDPSendPacket(r, &se->YourIp, se->YourPort, buf, buf_size, icmp_type);
  2235. Free(buf);
  2236. }
  2237. else
  2238. {
  2239. UCHAR sign[SHA1_SIZE];
  2240. UCHAR iv[SHA1_SIZE];
  2241. // Ver 1
  2242. padding_size = Rand32() % 31 + 1;
  2243. buf_size = SHA1_SIZE + SHA1_SIZE + sizeof(UINT64) + data_size + padding_size;
  2244. buf = Malloc(buf_size);
  2245. // SEQ NO
  2246. WRITE_UINT64(buf + SHA1_SIZE + SHA1_SIZE, se->BulkNextSeqNo);
  2247. se->BulkNextSeqNo++;
  2248. // Data
  2249. Copy(buf + SHA1_SIZE + SHA1_SIZE + sizeof(UINT64), data, data_size);
  2250. // Padding
  2251. for (i = 0;i < padding_size;i++)
  2252. {
  2253. buf[SHA1_SIZE + SHA1_SIZE + sizeof(UINT64) + data_size + i] = (UCHAR)padding_size;
  2254. }
  2255. // Encryption
  2256. Copy(iv, se->BulkNextIv, SHA1_SIZE);
  2257. Copy(crypt_key_src + 0, se->BulkSendKey->Data, SHA1_SIZE);
  2258. Copy(crypt_key_src + SHA1_SIZE, iv, SHA1_SIZE);
  2259. HashSha1(crypt_key, crypt_key_src, SHA1_SIZE * 2);
  2260. c = NewCrypt(crypt_key, sizeof(crypt_key));
  2261. Encrypt(c, buf + SHA1_SIZE + SHA1_SIZE, buf + SHA1_SIZE + SHA1_SIZE, sizeof(UINT64) + data_size + padding_size);
  2262. FreeCrypt(c);
  2263. // IV
  2264. Copy(buf + SHA1_SIZE, iv, SHA1_SIZE);
  2265. // Sign
  2266. if (se->UseHMac == false)
  2267. {
  2268. Copy(buf + 0, se->BulkSendKey->Data, SHA1_SIZE);
  2269. HashSha1(sign, buf, SHA1_SIZE + SHA1_SIZE + sizeof(UINT64) + data_size + padding_size);
  2270. Copy(buf + 0, sign, SHA1_SIZE);
  2271. }
  2272. else
  2273. {
  2274. HMacSha1(buf + 0, se->BulkSendKey->Data, SHA1_SIZE, buf + SHA1_SIZE, SHA1_SIZE + sizeof(UINT64) + data_size + padding_size);
  2275. }
  2276. // Next IV
  2277. Copy(se->BulkNextIv, buf + buf_size - SHA1_SIZE, SHA1_SIZE);
  2278. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  2279. {
  2280. icmp_type = se->Icmp_Type;
  2281. }
  2282. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  2283. {
  2284. icmp_type = se->Dns_TranId;
  2285. }
  2286. RUDPSendPacket(r, &se->YourIp, se->YourPort, buf, buf_size, icmp_type);
  2287. Free(buf);
  2288. }
  2289. }
  2290. // Start a socket for R-UDP Listening
  2291. SOCK *ListenRUDP(char *svc_name, RUDP_STACK_INTERRUPTS_PROC *proc_interrupts, RUDP_STACK_RPC_RECV_PROC *proc_rpc_recv, void *param, UINT port, bool no_natt_register, bool over_dns_mode)
  2292. {
  2293. return ListenRUDPEx(svc_name, proc_interrupts, proc_rpc_recv, param, port, no_natt_register, over_dns_mode, NULL, 0);
  2294. }
  2295. SOCK *ListenRUDPEx(char *svc_name, RUDP_STACK_INTERRUPTS_PROC *proc_interrupts, RUDP_STACK_RPC_RECV_PROC *proc_rpc_recv, void *param, UINT port, bool no_natt_register, bool over_dns_mode,
  2296. volatile UINT *natt_global_udp_port, UCHAR rand_port_id)
  2297. {
  2298. SOCK *s;
  2299. RUDP_STACK *r;
  2300. // Creating a R-UDP stack
  2301. r = NewRUDPServer(svc_name, proc_interrupts, proc_rpc_recv, param, port, no_natt_register, over_dns_mode, natt_global_udp_port, rand_port_id);
  2302. if (r == NULL)
  2303. {
  2304. return NULL;
  2305. }
  2306. s = NewSock();
  2307. s->Type = SOCK_RUDP_LISTEN;
  2308. s->ListenMode = true;
  2309. s->Connected = true;
  2310. s->LocalPort = r->UdpSock->LocalPort;
  2311. s->R_UDP_Stack = r;
  2312. return s;
  2313. }
  2314. // Accept on the R-UDP socket
  2315. SOCK *AcceptRUDP(SOCK *s)
  2316. {
  2317. // Validate arguments
  2318. if (s == NULL || s->Type != SOCK_RUDP_LISTEN || s->ListenMode == false)
  2319. {
  2320. return NULL;
  2321. }
  2322. while (true)
  2323. {
  2324. RUDP_STACK *r = s->R_UDP_Stack;
  2325. SOCK *ret;
  2326. if (s->Disconnecting || s->CancelAccept)
  2327. {
  2328. return NULL;
  2329. }
  2330. ret = GetNextWithLock(r->NewSockQueue);
  2331. if (ret != NULL)
  2332. {
  2333. switch (r->Protocol)
  2334. {
  2335. case RUDP_PROTOCOL_UDP:
  2336. StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_NAT_T);
  2337. AddProtocolDetailsStr(ret->ProtocolDetails, sizeof(ret->ProtocolDetails),
  2338. "RUDP/UDP");
  2339. break;
  2340. case RUDP_PROTOCOL_DNS:
  2341. StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_DNS);
  2342. AddProtocolDetailsStr(ret->ProtocolDetails, sizeof(ret->ProtocolDetails),
  2343. "RUDP/DNS");
  2344. break;
  2345. case RUDP_PROTOCOL_ICMP:
  2346. StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_ICMP);
  2347. AddProtocolDetailsStr(ret->ProtocolDetails, sizeof(ret->ProtocolDetails),
  2348. "RUDP/ICMP");
  2349. break;
  2350. }
  2351. return ret;
  2352. }
  2353. Wait(r->NewSockConnectEvent, INFINITE);
  2354. }
  2355. }
  2356. // Verify the signature of the received packet
  2357. bool RUDPCheckSignOfRecvPacket(RUDP_STACK *r, RUDP_SESSION *se, void *recv_data, UINT recv_size)
  2358. {
  2359. UCHAR sign[SHA1_SIZE];
  2360. UCHAR sign2[SHA1_SIZE];
  2361. UCHAR *p;
  2362. UINT size;
  2363. // Validate arguments
  2364. if (r == NULL || se == NULL || recv_data == NULL || recv_size == 0)
  2365. {
  2366. return false;
  2367. }
  2368. p = (UCHAR *)recv_data;
  2369. size = recv_size;
  2370. if (size < SHA1_SIZE)
  2371. {
  2372. return false;
  2373. }
  2374. // Verification the signature (segment packet)
  2375. Copy(sign, p, SHA1_SIZE);
  2376. Copy(p, se->Key_Recv, SHA1_SIZE);
  2377. HashSha1(sign2, p, recv_size);
  2378. if (r->Protocol == RUDP_PROTOCOL_DNS || r->Protocol == RUDP_PROTOCOL_ICMP)
  2379. {
  2380. XorData(sign2, sign2, r->SvcNameHash, SHA1_SIZE);
  2381. }
  2382. Copy(p, sign, SHA1_SIZE);
  2383. if (Cmp(sign, sign2, SHA1_SIZE) == 0)
  2384. {
  2385. return true;
  2386. }
  2387. if (se->BulkRecvKey == NULL)
  2388. {
  2389. return false;
  2390. }
  2391. // Verification signature (bulk packet)
  2392. if (se->BulkRecvKey->Size == RUDP_BULK_KEY_SIZE_V2)
  2393. {
  2394. // Ver 2
  2395. UCHAR *iv = p;
  2396. // Packet: IV + Encrypted(SEQ_NO + Data + padding) + MAC
  2397. // IV
  2398. if (size < RUDP_BULK_IV_SIZE_V2)
  2399. {
  2400. return false;
  2401. }
  2402. iv = p;
  2403. p += RUDP_BULK_IV_SIZE_V2;
  2404. size -= RUDP_BULK_IV_SIZE_V2;
  2405. // Decrypt
  2406. if (size < (RUDP_BULK_MAC_SIZE_V2 + 1))
  2407. {
  2408. return false;
  2409. }
  2410. if (Aead_ChaCha20Poly1305_Ietf_Decrypt(r->TmpBuf, p, size, se->BulkRecvKey->Data, iv, NULL, 0) == false)
  2411. {
  2412. return false;
  2413. }
  2414. return true;
  2415. }
  2416. else
  2417. {
  2418. // Ver 1
  2419. if (se->UseHMac == false)
  2420. {
  2421. Copy(sign, p, SHA1_SIZE);
  2422. Copy(p, se->BulkRecvKey->Data, SHA1_SIZE);
  2423. HashSha1(sign2, p, recv_size);
  2424. Copy(p, sign, SHA1_SIZE);
  2425. if (Cmp(sign, sign2, SHA1_SIZE) == 0)
  2426. {
  2427. return true;
  2428. }
  2429. }
  2430. HMacSha1(sign2, se->BulkRecvKey->Data, SHA1_SIZE, p + SHA1_SIZE, size - SHA1_SIZE);
  2431. if (Cmp(p, sign2, SHA1_SIZE) == 0)
  2432. {
  2433. se->UseHMac = true;
  2434. return true;
  2435. }
  2436. }
  2437. return false;
  2438. }
  2439. // Process the received packet (bulk)
  2440. bool RUDPProcessBulkRecvPacket(RUDP_STACK *r, RUDP_SESSION *se, void *recv_data, UINT recv_size)
  2441. {
  2442. UCHAR sign[SHA1_SIZE];
  2443. UCHAR sign2[SHA1_SIZE];
  2444. UCHAR *p;
  2445. UCHAR *iv;
  2446. UINT size;
  2447. UCHAR keygen[SHA1_SIZE * 2];
  2448. UCHAR key[SHA1_SIZE];
  2449. CRYPT *c;
  2450. UCHAR padlen;
  2451. UINT64 seq_no;
  2452. UCHAR *payload;
  2453. UINT payload_size;
  2454. // Validate arguments
  2455. if (r == NULL || se == NULL || recv_data == NULL || recv_size == 0 || se->BulkRecvKey == NULL)
  2456. {
  2457. return false;
  2458. }
  2459. p = (UCHAR *)recv_data;
  2460. size = recv_size;
  2461. if (size < SHA1_SIZE)
  2462. {
  2463. return false;
  2464. }
  2465. if (se->BulkRecvKey->Size == RUDP_BULK_KEY_SIZE_V2)
  2466. {
  2467. // Ver 2
  2468. // Packet: IV + Encrypted(SEQ_NO + Data + padding) + MAC
  2469. // IV
  2470. if (size < RUDP_BULK_IV_SIZE_V2)
  2471. {
  2472. WHERE;
  2473. return false;
  2474. }
  2475. iv = p;
  2476. p += RUDP_BULK_IV_SIZE_V2;
  2477. size -= RUDP_BULK_IV_SIZE_V2;
  2478. // Decrypt
  2479. if (size < (RUDP_BULK_MAC_SIZE_V2 + 1))
  2480. {
  2481. WHERE;
  2482. return false;
  2483. }
  2484. if (Aead_ChaCha20Poly1305_Ietf_Decrypt(p, p, size, se->BulkRecvKey->Data, iv, NULL, 0) == false)
  2485. {
  2486. WHERE;
  2487. return false;
  2488. }
  2489. size -= RUDP_BULK_MAC_SIZE_V2;
  2490. // padlen
  2491. padlen = p[size - 1];
  2492. if (padlen == 0)
  2493. {
  2494. WHERE;
  2495. return false;
  2496. }
  2497. if (size < padlen)
  2498. {
  2499. WHERE;
  2500. return false;
  2501. }
  2502. size -= padlen;
  2503. }
  2504. else
  2505. {
  2506. // Validate the signature
  2507. if (se->UseHMac == false)
  2508. {
  2509. Copy(sign, p, SHA1_SIZE);
  2510. Copy(p, se->BulkRecvKey->Data, SHA1_SIZE);
  2511. HashSha1(sign2, p, recv_size);
  2512. Copy(p, sign, SHA1_SIZE);
  2513. if (Cmp(sign, sign2, SHA1_SIZE) != 0)
  2514. {
  2515. HMacSha1(sign2, se->BulkRecvKey->Data, SHA1_SIZE, p + SHA1_SIZE, recv_size - SHA1_SIZE);
  2516. if (Cmp(p, sign2, SHA1_SIZE) != 0)
  2517. {
  2518. return false;
  2519. }
  2520. else
  2521. {
  2522. se->UseHMac = true;
  2523. }
  2524. }
  2525. else
  2526. {
  2527. }
  2528. }
  2529. else
  2530. {
  2531. HMacSha1(sign2, se->BulkRecvKey->Data, SHA1_SIZE, p + SHA1_SIZE, recv_size - SHA1_SIZE);
  2532. if (Cmp(p, sign2, SHA1_SIZE) != 0)
  2533. {
  2534. return false;
  2535. }
  2536. }
  2537. p += SHA1_SIZE;
  2538. size -= SHA1_SIZE;
  2539. // IV
  2540. if (size < SHA1_SIZE)
  2541. {
  2542. return false;
  2543. }
  2544. iv = p;
  2545. p += SHA1_SIZE;
  2546. size -= SHA1_SIZE;
  2547. // Decrypt
  2548. if (size < 1)
  2549. {
  2550. return false;
  2551. }
  2552. Copy(keygen + 0, se->BulkRecvKey->Data, SHA1_SIZE);
  2553. Copy(keygen + SHA1_SIZE, iv, SHA1_SIZE);
  2554. HashSha1(key, keygen, sizeof(keygen));
  2555. c = NewCrypt(key, sizeof(key));
  2556. Encrypt(c, p, p, size);
  2557. FreeCrypt(c);
  2558. // padlen
  2559. padlen = p[size - 1];
  2560. if (padlen == 0)
  2561. {
  2562. return false;
  2563. }
  2564. if (size < padlen)
  2565. {
  2566. return false;
  2567. }
  2568. size -= padlen;
  2569. }
  2570. // SEQ NO
  2571. seq_no = READ_UINT64(p);
  2572. p += sizeof(UINT64);
  2573. size -= sizeof(UINT64);
  2574. if (seq_no == 0 || seq_no >= (0xF000000000000000ULL))
  2575. {
  2576. // Sequence number is invalid
  2577. return false;
  2578. }
  2579. if ((seq_no + RUDP_BULK_SEQ_NO_RANGE) < se->BulkRecvSeqNoMax)
  2580. {
  2581. // Sequence number is too small
  2582. return false;
  2583. }
  2584. se->LastRecvTick = r->Now;
  2585. payload = p;
  2586. payload_size = size;
  2587. se->BulkRecvSeqNoMax = MAX(seq_no, se->BulkRecvSeqNoMax);
  2588. // Send the received bulk packet to the Tube of the socket
  2589. RUDPInitSock(r, se);
  2590. if (se->TcpSock != NULL)
  2591. {
  2592. SOCK *s = se->TcpSock;
  2593. TUBE *t = s->BulkSendTube;
  2594. if (t != NULL)
  2595. {
  2596. TubeSendEx2(t, payload, payload_size, NULL, true, RUDP_BULK_MAX_RECV_PKTS_IN_QUEUE);
  2597. se->FlushBulkSendTube = true;
  2598. }
  2599. }
  2600. return true;
  2601. }
  2602. // Process the received packet (segment)
  2603. bool RUDPProcessRecvPacket(RUDP_STACK *r, RUDP_SESSION *se, void *recv_data, UINT recv_size)
  2604. {
  2605. UCHAR sign[SHA1_SIZE];
  2606. UCHAR sign2[SHA1_SIZE];
  2607. UCHAR *p;
  2608. UCHAR *iv;
  2609. UINT size;
  2610. UCHAR keygen[SHA1_SIZE * 2];
  2611. UCHAR key[SHA1_SIZE];
  2612. CRYPT *c;
  2613. UCHAR padlen;
  2614. UINT num_ack;
  2615. UINT i;
  2616. UINT64 seq_no;
  2617. UCHAR *payload;
  2618. UINT payload_size;
  2619. UINT64 max_ack;
  2620. UINT64 my_tick, your_tick;
  2621. // Validate arguments
  2622. if (r == NULL || se == NULL || recv_data == NULL || recv_size == 0)
  2623. {
  2624. return false;
  2625. }
  2626. p = (UCHAR *)recv_data;
  2627. size = recv_size;
  2628. if (size < SHA1_SIZE)
  2629. {
  2630. return false;
  2631. }
  2632. // Validate the signature
  2633. Copy(sign, p, SHA1_SIZE);
  2634. Copy(p, se->Key_Recv, SHA1_SIZE);
  2635. HashSha1(sign2, p, recv_size);
  2636. Copy(p, sign, SHA1_SIZE);
  2637. if (r->Protocol == RUDP_PROTOCOL_DNS || r->Protocol == RUDP_PROTOCOL_ICMP)
  2638. {
  2639. XorData(sign2, sign2, r->SvcNameHash, SHA1_SIZE);
  2640. }
  2641. if (Cmp(sign, sign2, SHA1_SIZE) != 0)
  2642. {
  2643. //WHERE;
  2644. return false;
  2645. }
  2646. p += SHA1_SIZE;
  2647. size -= SHA1_SIZE;
  2648. // IV
  2649. if (size < SHA1_SIZE)
  2650. {
  2651. return false;
  2652. }
  2653. iv = p;
  2654. p += SHA1_SIZE;
  2655. size -= SHA1_SIZE;
  2656. // Decrypt
  2657. if (size < 1)
  2658. {
  2659. return false;
  2660. }
  2661. Copy(keygen + 0, iv, SHA1_SIZE);
  2662. Copy(keygen + SHA1_SIZE, se->Key_Recv, SHA1_SIZE);
  2663. HashSha1(key, keygen, sizeof(keygen));
  2664. c = NewCrypt(key, sizeof(key));
  2665. Encrypt(c, p, p, size);
  2666. FreeCrypt(c);
  2667. // padlen
  2668. padlen = p[size - 1];
  2669. if (padlen == 0)
  2670. {
  2671. return false;
  2672. }
  2673. if (size < padlen)
  2674. {
  2675. return false;
  2676. }
  2677. size -= padlen;
  2678. // MyTick
  2679. if (size < sizeof(UINT64))
  2680. {
  2681. return false;
  2682. }
  2683. my_tick = READ_UINT64(p);
  2684. p += sizeof(UINT64);
  2685. size -= sizeof(UINT64);
  2686. // YourTick
  2687. if (size < sizeof(UINT64))
  2688. {
  2689. return false;
  2690. }
  2691. your_tick = READ_UINT64(p);
  2692. p += sizeof(UINT64);
  2693. size -= sizeof(UINT64);
  2694. if (your_tick > r->Now)
  2695. {
  2696. return false;
  2697. }
  2698. // MAX_ACK
  2699. if (size < sizeof(UINT64))
  2700. {
  2701. return false;
  2702. }
  2703. max_ack = READ_UINT64(p);
  2704. p += sizeof(UINT64);
  2705. size -= sizeof(UINT64);
  2706. // num_ack
  2707. if (size < sizeof(UINT))
  2708. {
  2709. return false;
  2710. }
  2711. num_ack = READ_UINT(p);
  2712. if (num_ack > RUDP_MAX_NUM_ACK)
  2713. {
  2714. return false;
  2715. }
  2716. p += sizeof(UINT);
  2717. size -= sizeof(UINT);
  2718. // ACKs
  2719. if (size < (sizeof(UINT64) * num_ack + sizeof(UINT64)))
  2720. {
  2721. return false;
  2722. }
  2723. if (max_ack >= 1)
  2724. {
  2725. RUDPProcessAck2(r, se, max_ack);
  2726. }
  2727. for (i = 0;i < num_ack;i++)
  2728. {
  2729. UINT64 seq = READ_UINT64(p);
  2730. RUDPProcessAck(r, se, seq);
  2731. p += sizeof(UINT64);
  2732. size -= sizeof(UINT64);
  2733. }
  2734. // Processing of the Tick (Calculation of RTT)
  2735. if (my_tick >= 2)
  2736. {
  2737. my_tick--;
  2738. }
  2739. se->YourTick = MAX(se->YourTick, my_tick);
  2740. se->LatestRecvMyTick = MAX(se->LatestRecvMyTick, your_tick);
  2741. if (se->LatestRecvMyTick2 != se->LatestRecvMyTick)
  2742. {
  2743. se->LatestRecvMyTick2 = se->LatestRecvMyTick;
  2744. se->CurrentRtt = (UINT)(r->Now - se->LatestRecvMyTick);
  2745. #ifdef RUDP_DETAIL_LOG
  2746. Debug("CurrentRTT = %u\n", se->CurrentRtt);
  2747. #endif // RUDP_DETAIL_LOG
  2748. }
  2749. // SEQ NO
  2750. seq_no = READ_UINT64(p);
  2751. p += sizeof(UINT64);
  2752. size -= sizeof(UINT64);
  2753. if (seq_no == 0)
  2754. {
  2755. // Sequence number of 0 is a invalid packet
  2756. return true;
  2757. }
  2758. if (seq_no == se->Magic_Disconnect)
  2759. {
  2760. // Disconnected from opponent
  2761. RUDPDisconnectSession(r, se, true);
  2762. return true;
  2763. }
  2764. // Update the last reception date and time
  2765. se->LastRecvTick = r->Now;
  2766. payload = p;
  2767. payload_size = size;
  2768. #ifdef RUDP_DETAIL_LOG
  2769. Debug("RUDP %X Segment Recv: %I64u (num_ack=%u, size=%u)\n", se, seq_no, num_ack, size);
  2770. #endif // RUDP_DETAIL_LOG
  2771. if (payload_size >= 1 && payload_size <= RUDP_MAX_SEGMENT_SIZE)
  2772. {
  2773. // Received one or more bytes of data
  2774. #ifdef RUDP_DETAIL_LOG
  2775. Debug("Recv Size: %X %I64u %u %u\n", se, seq_no, payload_size, recv_size);
  2776. #endif // RUDP_DETAIL_LOG
  2777. RUDPProcessRecvPayload(r, se, seq_no, payload, payload_size);
  2778. }
  2779. if (r->ServerMode == false)
  2780. {
  2781. if (se->Status == RUDP_SESSION_STATUS_CONNECT_SENT)
  2782. {
  2783. // Shift to the established state if the connection is not yet in established state
  2784. se->Status = RUDP_SESSION_STATUS_ESTABLISHED;
  2785. RUDPInitSock(r, se);
  2786. }
  2787. }
  2788. return true;
  2789. }
  2790. // Disconnect the session
  2791. void RUDPDisconnectSession(RUDP_STACK *r, RUDP_SESSION *se, bool disconnected_by_you)
  2792. {
  2793. // Validate arguments
  2794. if (r == NULL || se == NULL)
  2795. {
  2796. return;
  2797. }
  2798. if (se->DisconnectFlag == false)
  2799. {
  2800. UINT i;
  2801. se->DisconnectFlag = true;
  2802. se->DisconnectedByYou = disconnected_by_you;
  2803. Debug("R-UDP Session %X Disconnected. by you flag: %u\n", se, disconnected_by_you);
  2804. if (se->TcpSock != NULL)
  2805. {
  2806. // Disconnect a TCP socket
  2807. Disconnect(se->TcpSock);
  2808. ReleaseSock(se->TcpSock);
  2809. se->TcpSock = NULL;
  2810. }
  2811. // Send 5 disconnect signals serially if to disconnect from here
  2812. if (disconnected_by_you == false)
  2813. {
  2814. for (i = 0;i < 5;i++)
  2815. {
  2816. RUDPSendSegmentNow(r, se, se->Magic_Disconnect, NULL, 0);
  2817. }
  2818. }
  2819. }
  2820. }
  2821. // Initialize the TCP socket for the session
  2822. void RUDPInitSock(RUDP_STACK *r, RUDP_SESSION *se)
  2823. {
  2824. SOCK *s1, *s2;
  2825. UINT mss;
  2826. // Validate arguments
  2827. if (r == NULL || se == NULL || se->DisconnectFlag)
  2828. {
  2829. return;
  2830. }
  2831. if (se->TcpSock != NULL)
  2832. {
  2833. // It has already been created
  2834. return;
  2835. }
  2836. // Creating a TCP socket pair
  2837. if (NewTcpPair(&s1, &s2) == false)
  2838. {
  2839. // Failed to create. Disconnect the session
  2840. RUDPDisconnectSession(r, se, false);
  2841. return;
  2842. }
  2843. // Calculate the optimal MSS
  2844. mss = RUDPCalcBestMssForBulk(r, se);
  2845. if (r->ServerMode)
  2846. {
  2847. // Server mode
  2848. se->TcpSock = s2;
  2849. JoinSockToSockEvent(s2, r->SockEvent);
  2850. // Update the end point information of the socket s1
  2851. ZeroIP4(&s1->LocalIP);
  2852. s1->LocalPort = se->MyPort;
  2853. Copy(&s1->RemoteIP, &se->YourIp, sizeof(IP));
  2854. s1->RemotePort = se->YourPort;
  2855. if (IsLocalHostIP(&s1->RemoteIP) == false)
  2856. {
  2857. AddIpClient(&s1->RemoteIP);
  2858. s1->IpClientAdded = true;
  2859. }
  2860. s1->IsRUDPSocket = true;
  2861. s1->BulkSendKey = se->BulkSendKey;
  2862. s1->BulkRecvKey = se->BulkRecvKey;
  2863. AddRef(s1->BulkSendKey->Ref);
  2864. AddRef(s1->BulkRecvKey->Ref);
  2865. s1->RUDP_OptimizedMss = mss;
  2866. // Enqueue the newly created socket, and set the event
  2867. InsertQueueWithLock(r->NewSockQueue, s1);
  2868. Set(r->NewSockConnectEvent);
  2869. }
  2870. else
  2871. {
  2872. // Client mode
  2873. Lock(r->Lock);
  2874. {
  2875. if (r->TargetConnectedSock == NULL && r->DoNotSetTargetConnectedSock == false)
  2876. {
  2877. // Update the end point information of the socket s2
  2878. Copy(&s2->LocalIP, &r->UdpSock->LocalIP, sizeof(IP));
  2879. s2->LocalPort = se->MyPort;
  2880. Copy(&s2->RemoteIP, &se->YourIp, sizeof(IP));
  2881. s2->RemotePort = se->YourPort;
  2882. if (IsLocalHostIP(&s2->RemoteIP) == false)
  2883. {
  2884. AddIpClient(&s2->RemoteIP);
  2885. s2->IpClientAdded = true;
  2886. }
  2887. s2->IsRUDPSocket = true;
  2888. s2->BulkSendKey = se->BulkSendKey;
  2889. s2->BulkRecvKey = se->BulkRecvKey;
  2890. AddRef(s2->BulkSendKey->Ref);
  2891. AddRef(s2->BulkRecvKey->Ref);
  2892. s2->RUDP_OptimizedMss = mss;
  2893. // Register the socket to the RUDP stack
  2894. r->TargetConnectedSock = s2;
  2895. s2->R_UDP_Stack = r;
  2896. se->TcpSock = s1;
  2897. JoinSockToSockEvent(s1, r->SockEvent);
  2898. // Set the event to be set when the connection is successful
  2899. Set(r->TargetConnectedEvent);
  2900. }
  2901. else
  2902. {
  2903. Disconnect(s1);
  2904. Disconnect(s2);
  2905. ReleaseSock(s1);
  2906. ReleaseSock(s2);
  2907. }
  2908. }
  2909. Unlock(r->Lock);
  2910. }
  2911. }
  2912. // Process the received payload
  2913. void RUDPProcessRecvPayload(RUDP_STACK *r, RUDP_SESSION *se, UINT64 seq, void *payload_data, UINT payload_size)
  2914. {
  2915. RUDP_SEGMENT t;
  2916. RUDP_SEGMENT *s;
  2917. // Validate arguments
  2918. if (r == NULL || se == NULL || seq == 0 || payload_data == NULL || payload_size == 0 || payload_size > RUDP_MAX_SEGMENT_SIZE)
  2919. {
  2920. return;
  2921. }
  2922. if (seq > (se->LastRecvCompleteSeqNo + RUDP_MAX_NUM_ACK))
  2923. {
  2924. // Ignore the segment which have sequence number beyond the window size, and also not to reply an ACK
  2925. return;
  2926. }
  2927. if (seq <= se->LastRecvCompleteSeqNo)
  2928. {
  2929. // Do not receive the segment which have the sequence number that has been already received. However, reply an ACK for it
  2930. AddInt64Distinct(se->ReplyAckList, seq);
  2931. return;
  2932. }
  2933. Zero(&t, sizeof(t));
  2934. t.SeqNo = seq;
  2935. s = Search(se->RecvSegmentList, &t);
  2936. if (s != NULL)
  2937. {
  2938. // Do not receive the segment which have the sequence number that has been already received. However, reply an ACK for it
  2939. AddInt64Distinct(se->ReplyAckList, seq);
  2940. return;
  2941. }
  2942. // Received a segment of the new sequence number
  2943. s = ZeroMalloc(sizeof(RUDP_SEGMENT));
  2944. s->SeqNo = seq;
  2945. Copy(s->Data, payload_data, payload_size);
  2946. s->Size = payload_size;
  2947. Insert(se->RecvSegmentList, s);
  2948. // Reply an ACK
  2949. AddInt64Distinct(se->ReplyAckList, seq);
  2950. // Create a socket for session if it have not been created yet
  2951. //RUDPInitSock(r, se);
  2952. }
  2953. // Process the incoming ACK
  2954. void RUDPProcessAck(RUDP_STACK *r, RUDP_SESSION *se, UINT64 seq)
  2955. {
  2956. RUDP_SEGMENT t;
  2957. RUDP_SEGMENT *s;
  2958. // Validate arguments
  2959. if (r == NULL || se == NULL || seq == 0)
  2960. {
  2961. return;
  2962. }
  2963. Zero(&t, sizeof(t));
  2964. t.SeqNo = seq;
  2965. s = Search(se->SendSegmentList, &t);
  2966. if (s == NULL)
  2967. {
  2968. return;
  2969. }
  2970. Delete(se->SendSegmentList, s);
  2971. Free(s);
  2972. }
  2973. // Remove all segments which are preceding max_seq as already delivered
  2974. void RUDPProcessAck2(RUDP_STACK *r, RUDP_SESSION *se, UINT64 max_seq)
  2975. {
  2976. LIST *o;
  2977. UINT i;
  2978. // Validate arguments
  2979. if (r == NULL || se == NULL || max_seq == 0)
  2980. {
  2981. return;
  2982. }
  2983. o = NULL;
  2984. for (i = 0;i < LIST_NUM(se->SendSegmentList);i++)
  2985. {
  2986. RUDP_SEGMENT *s = LIST_DATA(se->SendSegmentList, i);
  2987. if (s->SeqNo <= max_seq)
  2988. {
  2989. if (o == NULL)
  2990. {
  2991. o = NewListFast(NULL);
  2992. }
  2993. Add(o, s);
  2994. }
  2995. }
  2996. if (o != NULL)
  2997. {
  2998. for (i = 0;i < LIST_NUM(o);i++)
  2999. {
  3000. RUDP_SEGMENT *s = LIST_DATA(o, i);
  3001. Delete(se->SendSegmentList, s);
  3002. Free(s);
  3003. }
  3004. ReleaseList(o);
  3005. }
  3006. }
  3007. // Get the minimum sequence number which is trying to send
  3008. UINT64 RUDPGetCurrentSendingMinSeqNo(RUDP_SESSION *se)
  3009. {
  3010. RUDP_SEGMENT *s;
  3011. // Validate arguments
  3012. if (se == NULL)
  3013. {
  3014. return 0;
  3015. }
  3016. if (LIST_NUM(se->SendSegmentList) == 0)
  3017. {
  3018. return 0;
  3019. }
  3020. s = LIST_DATA(se->SendSegmentList, 0);
  3021. return s->SeqNo;
  3022. }
  3023. // Get the maximum sequence number which is trying to send
  3024. UINT64 RUDPGetCurrentSendingMaxSeqNo(RUDP_SESSION *se)
  3025. {
  3026. RUDP_SEGMENT *s;
  3027. // Validate arguments
  3028. if (se == NULL)
  3029. {
  3030. return 0;
  3031. }
  3032. if (LIST_NUM(se->SendSegmentList) == 0)
  3033. {
  3034. return 0;
  3035. }
  3036. s = LIST_DATA(se->SendSegmentList, (LIST_NUM(se->SendSegmentList) - 1));
  3037. return s->SeqNo;
  3038. }
  3039. // R-UDP segment transmission
  3040. void RUDPSendSegmentNow(RUDP_STACK *r, RUDP_SESSION *se, UINT64 seq_no, void *data, UINT size)
  3041. {
  3042. UCHAR dst[RUDP_MAX_PACKET_SIZE];
  3043. UCHAR *p;
  3044. UCHAR *iv;
  3045. LIST *o = NULL;
  3046. UINT i;
  3047. UCHAR padlen;
  3048. UINT current_size;
  3049. UCHAR sign[SHA1_SIZE];
  3050. UCHAR key[SHA1_SIZE];
  3051. UCHAR keygen[SHA1_SIZE * 2];
  3052. CRYPT *c;
  3053. UINT next_iv_pos;
  3054. UINT num_ack;
  3055. UINT icmp_type = 0;
  3056. // Validate arguments
  3057. if (r == NULL || se == NULL || (size != 0 && data == NULL) || (size > RUDP_MAX_SEGMENT_SIZE))
  3058. {
  3059. return;
  3060. }
  3061. Zero(dst, sizeof(dst));
  3062. p = dst;
  3063. // SIGN
  3064. Copy(p, se->Key_Send, SHA1_SIZE);
  3065. p += SHA1_SIZE;
  3066. // IV
  3067. iv = p;
  3068. Copy(iv, se->NextIv, SHA1_SIZE);
  3069. p += SHA1_SIZE;
  3070. for (i = 0;i < MIN(LIST_NUM(se->ReplyAckList), RUDP_MAX_NUM_ACK);i++)
  3071. {
  3072. UINT64 *seq = LIST_DATA(se->ReplyAckList, i);
  3073. if (o == NULL)
  3074. {
  3075. o = NewListFast(NULL);
  3076. }
  3077. Add(o, seq);
  3078. }
  3079. // MyTick
  3080. WRITE_UINT64(p, r->Now);
  3081. p += sizeof(UINT64);
  3082. // YourTick
  3083. WRITE_UINT64(p, se->YourTick);
  3084. p += sizeof(UINT64);
  3085. // MAX_ACK
  3086. WRITE_UINT64(p, se->LastRecvCompleteSeqNo);
  3087. p += sizeof(UINT64);
  3088. // NUM_ACK
  3089. num_ack = LIST_NUM(o);
  3090. WRITE_UINT(p, num_ack);
  3091. p += sizeof(UINT);
  3092. if (o != NULL)
  3093. {
  3094. // ACK body
  3095. for (i = 0;i < LIST_NUM(o);i++)
  3096. {
  3097. UINT64 *seq = LIST_DATA(o, i);
  3098. WRITE_UINT64(p, *seq);
  3099. p += sizeof(UINT64);
  3100. Delete(se->ReplyAckList, seq);
  3101. Free(seq);
  3102. }
  3103. ReleaseList(o);
  3104. }
  3105. // SEQ
  3106. WRITE_UINT64(p, seq_no);
  3107. p += sizeof(UINT64);
  3108. // data
  3109. Copy(p, data, size);
  3110. p += size;
  3111. // padding
  3112. padlen = Rand8();
  3113. padlen = MAX(padlen, 1);
  3114. for (i = 0;i < padlen;i++)
  3115. {
  3116. *p = padlen;
  3117. p++;
  3118. }
  3119. current_size = (UINT)(p - dst);
  3120. // Encrypt
  3121. Copy(keygen + 0, iv, SHA1_SIZE);
  3122. Copy(keygen + SHA1_SIZE, se->Key_Send, SHA1_SIZE);
  3123. HashSha1(key, keygen, sizeof(keygen));
  3124. c = NewCrypt(key, sizeof(key));
  3125. Encrypt(c, dst + SHA1_SIZE * 2, dst + SHA1_SIZE * 2, current_size - (SHA1_SIZE * 2));
  3126. FreeCrypt(c);
  3127. // Sign
  3128. HashSha1(sign, dst, current_size);
  3129. if (r->Protocol == RUDP_PROTOCOL_DNS || r->Protocol == RUDP_PROTOCOL_ICMP)
  3130. {
  3131. XorData(sign, sign, r->SvcNameHash, SHA1_SIZE);
  3132. }
  3133. Copy(dst, sign, SHA1_SIZE);
  3134. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  3135. {
  3136. icmp_type = se->Icmp_Type;
  3137. }
  3138. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  3139. {
  3140. icmp_type = se->Dns_TranId;
  3141. }
  3142. RUDPSendPacket(r, &se->YourIp, se->YourPort, dst, current_size, icmp_type);
  3143. if (size >= 1)
  3144. {
  3145. se->LastSentTick = r->Now;
  3146. }
  3147. // Next IV
  3148. next_iv_pos = Rand32() % (current_size - SHA1_SIZE);
  3149. Copy(se->NextIv, dst + next_iv_pos, SHA1_SIZE);
  3150. #ifdef RUDP_DETAIL_LOG
  3151. Debug("RUDP %X Segment Sent: %I64u (num_ack=%u, size=%u)\n", se, seq_no, num_ack, size);
  3152. #endif // RUDP_DETAIL_LOG
  3153. if (size >= 1)
  3154. {
  3155. #ifdef RUDP_DETAIL_LOG
  3156. Debug("Send Size: %X %I64u %u %u\n", se, seq_no, size, current_size);
  3157. #endif // RUDP_DETAIL_LOG
  3158. }
  3159. }
  3160. // R-UDP segment transmission (only put into the queue)
  3161. void RUDPSendSegment(RUDP_STACK *r, RUDP_SESSION *se, void *data, UINT size)
  3162. {
  3163. RUDP_SEGMENT *s;
  3164. // Validate arguments
  3165. if (r == NULL || se == NULL || (size != 0 && data == NULL) || (size > RUDP_MAX_SEGMENT_SIZE))
  3166. {
  3167. return;
  3168. }
  3169. s = ZeroMalloc(sizeof(RUDP_SEGMENT));
  3170. Copy(s->Data, data, size);
  3171. s->Size = size;
  3172. s->SeqNo = se->NextSendSeqNo++;
  3173. Insert(se->SendSegmentList, s);
  3174. }
  3175. // Search for a session
  3176. RUDP_SESSION *RUDPSearchSession(RUDP_STACK *r, IP *my_ip, UINT my_port, IP *your_ip, UINT your_port)
  3177. {
  3178. RUDP_SESSION t;
  3179. RUDP_SESSION *se;
  3180. // Validate arguments
  3181. if (r == NULL || my_ip == NULL || your_ip == NULL)
  3182. {
  3183. return NULL;
  3184. }
  3185. Copy(&t.MyIp, my_ip, sizeof(IP));
  3186. t.MyPort = my_port;
  3187. Copy(&t.YourIp, your_ip, sizeof(IP));
  3188. t.YourPort = your_port;
  3189. se = Search(r->SessionList, &t);
  3190. return se;
  3191. }
  3192. // Release of the session
  3193. void RUDPFreeSession(RUDP_SESSION *se)
  3194. {
  3195. UINT i;
  3196. // Validate arguments
  3197. if (se == NULL)
  3198. {
  3199. return;
  3200. }
  3201. Debug("RUDPFreeSession %X\n", se);
  3202. for (i = 0;i < LIST_NUM(se->SendSegmentList);i++)
  3203. {
  3204. RUDP_SEGMENT *s = LIST_DATA(se->SendSegmentList, i);
  3205. Free(s);
  3206. }
  3207. ReleaseList(se->SendSegmentList);
  3208. for (i = 0;i < LIST_NUM(se->RecvSegmentList);i++)
  3209. {
  3210. RUDP_SEGMENT *s = LIST_DATA(se->RecvSegmentList, i);
  3211. Free(s);
  3212. }
  3213. ReleaseList(se->RecvSegmentList);
  3214. if (se->TcpSock != NULL)
  3215. {
  3216. Disconnect(se->TcpSock);
  3217. ReleaseSock(se->TcpSock);
  3218. }
  3219. ReleaseInt64List(se->ReplyAckList);
  3220. ReleaseFifo(se->RecvFifo);
  3221. ReleaseFifo(se->SendFifo);
  3222. ReleaseSharedBuffer(se->BulkSendKey);
  3223. ReleaseSharedBuffer(se->BulkRecvKey);
  3224. Free(se);
  3225. }
  3226. // Create a new session
  3227. RUDP_SESSION *RUDPNewSession(bool server_mode, IP *my_ip, UINT my_port, IP *your_ip, UINT your_port, UCHAR *init_key)
  3228. {
  3229. RUDP_SESSION *se;
  3230. UCHAR key1[SHA1_SIZE];
  3231. UCHAR key2[SHA1_SIZE];
  3232. UCHAR bulk_send_key[RUDP_BULK_KEY_SIZE_MAX];
  3233. UCHAR bulk_recv_key[RUDP_BULK_KEY_SIZE_MAX];
  3234. BUF *b;
  3235. se = ZeroMalloc(sizeof(RUDP_SESSION));
  3236. Copy(&se->MyIp, my_ip, sizeof(IP));
  3237. se->MyPort = my_port;
  3238. Copy(&se->YourIp, your_ip, sizeof(IP));
  3239. se->YourPort = your_port;
  3240. Copy(se->Key_Init, init_key, SHA1_SIZE);
  3241. se->LastSentTick = 0;
  3242. se->LastRecvTick = Tick64();
  3243. se->LatestRecvMyTick = Tick64();
  3244. se->NextSendSeqNo = 1;
  3245. se->ServerMode = server_mode;
  3246. se->SendSegmentList = NewList(RUDPCompareSegmentList);
  3247. se->RecvSegmentList = NewList(RUDPCompareSegmentList);
  3248. // Generate the two keys
  3249. b = NewBuf();
  3250. WriteBuf(b, init_key, SHA1_SIZE);
  3251. WriteBufStr(b, "zurukko");
  3252. HashSha1(key1, b->Buf, b->Size);
  3253. FreeBuf(b);
  3254. b = NewBuf();
  3255. WriteBuf(b, init_key, SHA1_SIZE);
  3256. WriteBuf(b, key1, SHA1_SIZE);
  3257. WriteBufStr(b, "yasushineko");
  3258. HashSha1(key2, b->Buf, b->Size);
  3259. FreeBuf(b);
  3260. // Generate the magic number for the KeepAlive
  3261. b = NewBuf();
  3262. WriteBuf(b, init_key, SHA1_SIZE);
  3263. WriteBufStr(b, "Magic_KeepAliveRequest");
  3264. HashSha1(se->Magic_KeepAliveRequest, b->Buf, b->Size);
  3265. FreeBuf(b);
  3266. b = NewBuf();
  3267. WriteBuf(b, init_key, SHA1_SIZE);
  3268. WriteBufStr(b, "Magic_KeepAliveResponse");
  3269. HashSha1(se->Magic_KeepAliveResponse, b->Buf, b->Size);
  3270. FreeBuf(b);
  3271. if (server_mode == false)
  3272. {
  3273. se->Magic_Disconnect = 0xffffffff00000000ULL | (UINT64)(Rand32());
  3274. }
  3275. Copy(se->Key_Init, init_key, SHA1_SIZE);
  3276. if (se->ServerMode)
  3277. {
  3278. Copy(se->Key_Send, key1, SHA1_SIZE);
  3279. Copy(se->Key_Recv, key2, SHA1_SIZE);
  3280. }
  3281. else
  3282. {
  3283. Copy(se->Key_Send, key2, SHA1_SIZE);
  3284. Copy(se->Key_Recv, key1, SHA1_SIZE);
  3285. }
  3286. Rand(se->NextIv, sizeof(se->NextIv));
  3287. se->ReplyAckList = NewInt64List(true);
  3288. se->NextKeepAliveInterval = RUDP_KEEPALIVE_INTERVAL_MIN + (Rand32() % (RUDP_KEEPALIVE_INTERVAL_MAX - RUDP_KEEPALIVE_INTERVAL_MIN));
  3289. se->RecvFifo = NewFifo();
  3290. se->SendFifo = NewFifo();
  3291. se->Dns_TranId = Rand16() % 65535 + 1;
  3292. // Generate the bulk transfer key
  3293. Rand(bulk_send_key, sizeof(bulk_send_key));
  3294. Rand(bulk_recv_key, sizeof(bulk_recv_key));
  3295. se->BulkSendKey = NewSharedBuffer(bulk_send_key, sizeof(bulk_send_key));
  3296. se->BulkRecvKey = NewSharedBuffer(bulk_recv_key, sizeof(bulk_recv_key));
  3297. Rand(se->BulkNextIv, sizeof(se->BulkNextIv));
  3298. Rand(se->BulkNextIv_V2, sizeof(se->BulkNextIv_V2));
  3299. se->BulkNextSeqNo = 1;
  3300. return se;
  3301. }
  3302. // Comparison function of the segment list items
  3303. int RUDPCompareSegmentList(void *p1, void *p2)
  3304. {
  3305. RUDP_SEGMENT *s1, *s2;
  3306. UINT r;
  3307. // Validate arguments
  3308. if (p1 == NULL || p2 == NULL)
  3309. {
  3310. return 0;
  3311. }
  3312. s1 = *((RUDP_SEGMENT **)p1);
  3313. s2 = *((RUDP_SEGMENT **)p2);
  3314. if (s1 == NULL || s2 == NULL)
  3315. {
  3316. return 0;
  3317. }
  3318. r = COMPARE_RET(s1->SeqNo, s2->SeqNo);
  3319. return r;
  3320. }
  3321. // Send a UDP packet
  3322. void RUDPSendPacket(RUDP_STACK *r, IP *dest_ip, UINT dest_port, void *data, UINT size, UINT icmp_type)
  3323. {
  3324. UDPPACKET *p;
  3325. // Validate arguments
  3326. if (r == NULL || dest_ip == NULL || dest_port == 0 || data == NULL || size == 0)
  3327. {
  3328. return;
  3329. }
  3330. p = NewUdpPacket(&r->UdpSock->LocalIP, r->UdpSock->LocalPort,
  3331. dest_ip, dest_port,
  3332. Clone(data, size), size);
  3333. if (r->Protocol == RUDP_PROTOCOL_ICMP || r->Protocol == RUDP_PROTOCOL_DNS)
  3334. {
  3335. // ICMP Type / DNS Tran ID
  3336. p->Type = icmp_type;
  3337. }
  3338. Add(r->SendPacketList, p);
  3339. }
  3340. // R-UDP main thread
  3341. void RUDPMainThread(THREAD *thread, void *param)
  3342. {
  3343. RUDP_STACK *r;
  3344. bool halt_flag = false;
  3345. // Validate arguments
  3346. if (thread == NULL || param == NULL)
  3347. {
  3348. return;
  3349. }
  3350. r = (RUDP_STACK *)param;
  3351. AddWaitThread(thread);
  3352. NoticeThreadInit(thread);
  3353. while (true)
  3354. {
  3355. UINT wait_interval;
  3356. UINT i;
  3357. UINT min_wait_interval;
  3358. UINT num_ignore_errors = 0;
  3359. r->Now = Tick64();
  3360. Lock(r->Lock);
  3361. {
  3362. Copy(&r->NatT_IP_Safe, &r->NatT_IP, sizeof(IP));
  3363. Copy(&r->My_Private_IP_Safe, &r->My_Private_IP, sizeof(IP));
  3364. }
  3365. Unlock(r->Lock);
  3366. // Receive the data from the UDP socket
  3367. while (true)
  3368. {
  3369. UINT ret;
  3370. IP ip_src;
  3371. UINT port_src;
  3372. ret = RecvFrom(r->UdpSock, &ip_src, &port_src, r->TmpBuf, sizeof(r->TmpBuf));
  3373. if (ret == SOCK_LATER)
  3374. {
  3375. // There is no packet more
  3376. break;
  3377. }
  3378. else if (ret != 0)
  3379. {
  3380. // Receive a Packet
  3381. bool ok = false;
  3382. UDPPACKET *p = NewUdpPacket(&ip_src, port_src,
  3383. &r->UdpSock->LocalIP, r->UdpSock->LocalPort,
  3384. Clone(r->TmpBuf, ret), ret);
  3385. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  3386. {
  3387. // Analyse the incoming ICMP packet
  3388. UINT ip_header_size = GetIpHeaderSize(p->Data, p->Size);
  3389. if (ip_header_size >= sizeof(IPV4_HEADER))
  3390. {
  3391. if (p->Size >= (ip_header_size + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO) + SHA1_SIZE))
  3392. {
  3393. IPV4_HEADER *ip_header = (IPV4_HEADER *)(((UCHAR *)p->Data) + 0);
  3394. ICMP_HEADER *icmp_header = (ICMP_HEADER *)(((UCHAR *)p->Data) + ip_header_size);
  3395. ICMP_ECHO *echo_header = (ICMP_ECHO *)(((UCHAR *)p->Data) + ip_header_size + sizeof(ICMP_HEADER));
  3396. if (icmp_header->Type == ICMP_TYPE_ECHO_RESPONSE ||
  3397. icmp_header->Type == (r->ServerMode ? ICMP_TYPE_INFORMATION_REQUEST : ICMP_TYPE_INFORMATION_REPLY))
  3398. {
  3399. UCHAR hash[SHA1_SIZE];
  3400. HashSha1(hash, ((UCHAR *)p->Data) + ip_header_size + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO) + SHA1_SIZE,
  3401. p->Size - (ip_header_size + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO) + SHA1_SIZE));
  3402. if (Cmp(hash, ((UCHAR *)p->Data) + ip_header_size + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO), SHA1_SIZE) == 0)
  3403. {
  3404. UCHAR *new_data;
  3405. UINT new_data_size;
  3406. if (r->ServerMode)
  3407. {
  3408. // On the server side, the ICMP ID and the SEQ NO of received messages are treated as a source port number
  3409. Copy(&p->SrcPort, echo_header, sizeof(UINT));
  3410. }
  3411. // Record the Type
  3412. p->Type = icmp_header->Type;
  3413. // Erase the header part
  3414. new_data_size = p->Size - (ip_header_size + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO) + SHA1_SIZE);
  3415. new_data = Clone(((UCHAR *)p->Data) + ip_header_size + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO) + SHA1_SIZE, new_data_size);
  3416. Free(p->Data);
  3417. p->Data = new_data;
  3418. p->Size = new_data_size;
  3419. ok = true;
  3420. }
  3421. }
  3422. }
  3423. }
  3424. }
  3425. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  3426. {
  3427. // Analyse the incoming DNS packet
  3428. UINT offset;
  3429. if (r->ServerMode == false)
  3430. {
  3431. offset = 42;
  3432. }
  3433. else
  3434. {
  3435. offset = 37;
  3436. }
  3437. if (p->Size > offset)
  3438. {
  3439. UCHAR *new_data;
  3440. UINT new_size = p->Size - offset;
  3441. p->Type = *((USHORT *)p->Data);
  3442. new_data = Clone(((UCHAR *)p->Data) + offset, new_size);
  3443. Free(p->Data);
  3444. p->Data = new_data;
  3445. p->Size = new_size;
  3446. ok = true;
  3447. }
  3448. }
  3449. else
  3450. {
  3451. // Don't do anything for ordinary UDP packet
  3452. ok = true;
  3453. }
  3454. if (ok)
  3455. {
  3456. // Process the received packet
  3457. RUDPRecvProc(r, p);
  3458. r->TotalPhysicalReceived += ret;
  3459. }
  3460. FreeUdpPacket(p);
  3461. }
  3462. else
  3463. {
  3464. if (r->UdpSock->IgnoreRecvErr)
  3465. {
  3466. // An ignorable reception error occurs
  3467. if ((num_ignore_errors++) >= MAX_NUM_IGNORE_ERRORS)
  3468. {
  3469. break;
  3470. }
  3471. }
  3472. else
  3473. {
  3474. // A non-ignorable reception error occurs
  3475. break;
  3476. }
  3477. }
  3478. }
  3479. // Call the interrupt notification callback function
  3480. if (r->ProcInterrupts != NULL)
  3481. {
  3482. r->ProcInterrupts(r);
  3483. }
  3484. RUDPInterruptProc(r);
  3485. // Send all packets in the transmission packet list
  3486. for (i = 0;i < LIST_NUM(r->SendPacketList);i++)
  3487. {
  3488. UDPPACKET *p = LIST_DATA(r->SendPacketList, i);
  3489. if (r->Protocol == RUDP_PROTOCOL_ICMP)
  3490. {
  3491. // In case of the ICMP protocol, assemble an ICMP header
  3492. UINT dst_size = sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO) + SHA1_SIZE + p->Size;
  3493. UCHAR *dst_data = ZeroMalloc(dst_size);
  3494. ICMP_HEADER *icmp_header = (ICMP_HEADER *)dst_data;
  3495. ICMP_ECHO *icmp_echo = (ICMP_ECHO *)(dst_data + sizeof(ICMP_HEADER));
  3496. UCHAR *hash = dst_data + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO);
  3497. UCHAR *icmp_data = dst_data + sizeof(ICMP_HEADER) + sizeof(ICMP_ECHO) + SHA1_SIZE;
  3498. // Header
  3499. icmp_header->Type = (UCHAR)p->Type;
  3500. icmp_header->Code = 0;
  3501. icmp_header->Checksum = 0;
  3502. if (r->ServerMode)
  3503. {
  3504. // On the server side, use the port number in the opponent internal data as ICMP ID and SEQ NO
  3505. Copy(icmp_echo, &p->DestPort, 4);
  3506. }
  3507. else
  3508. {
  3509. // Use the fixed ICMP ID and SEQ NO on the client side
  3510. icmp_echo->Identifier = Endian16(r->Client_IcmpId);
  3511. icmp_echo->SeqNo = Endian16(r->Client_IcmpSeqNo);
  3512. }
  3513. // Data body
  3514. Copy(icmp_data, p->Data, p->Size);
  3515. // Hash
  3516. HashSha1(hash, icmp_data, p->Size);
  3517. // Checksum calculation
  3518. icmp_header->Checksum = IpChecksum(dst_data, dst_size);
  3519. // Replacement
  3520. Free(p->Data);
  3521. p->Data = dst_data;
  3522. p->Size = dst_size;
  3523. }
  3524. else if (r->Protocol == RUDP_PROTOCOL_DNS)
  3525. {
  3526. BUF *b = NewBuf();
  3527. // In case of over DNS protocol, assemble a header that conforms to the DNS protocol
  3528. if (r->ServerMode == false)
  3529. {
  3530. // DNS query header
  3531. USHORT us = Rand16() % 65535 + 1;
  3532. static UCHAR dns_query_header_1[] =
  3533. {
  3534. 0x01, 0x00, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, 0x00, 0x01, 0x08,
  3535. };
  3536. static UCHAR dns_query_header_2[] =
  3537. {
  3538. 0x00, 0x00, 0x30, 0x00, 0x01, 0x00, 0x00, 0x29, 0x10,
  3539. 0x00, 0x00, 0x00, 0x80, 0x00,
  3540. };
  3541. UCHAR rand_data[4];
  3542. char rand_str[MAX_SIZE];
  3543. Rand(rand_data, sizeof(rand_data));
  3544. BinToStr(rand_str, sizeof(rand_str), rand_data, sizeof(rand_data));
  3545. StrLower(rand_str);
  3546. WriteBuf(b, &us, sizeof(USHORT));
  3547. WriteBuf(b, dns_query_header_1, sizeof(dns_query_header_1));
  3548. WriteBuf(b, rand_str, 8);
  3549. WriteBuf(b, dns_query_header_2, sizeof(dns_query_header_2));
  3550. us = Endian16((USHORT)p->Size);
  3551. WriteBuf(b, &us, sizeof(USHORT));
  3552. WriteBuf(b, p->Data, p->Size);
  3553. }
  3554. else
  3555. {
  3556. // DNS response header
  3557. USHORT us = p->Type;
  3558. UINT ui;
  3559. static UCHAR dns_response_header_1[] =
  3560. {
  3561. 0x81, 0x80, 0x00, 0x01, 0x00, 0x01, 0x00, 0x00,
  3562. 0x00, 0x00, 0x08,
  3563. };
  3564. static UCHAR dns_response_header_2[] =
  3565. {
  3566. 0x00, 0x00, 0x30, 0x00, 0x01,
  3567. 0xc0, 0x0c, 0x00, 0x30, 0x00, 0x01, 0x00, 0x00, 0xa4, 0x5b,
  3568. };
  3569. static UCHAR dns_response_header_3[] =
  3570. {
  3571. 0x01, 0x00, 0x03, 0x08,
  3572. };
  3573. UCHAR rand_data[4];
  3574. char rand_str[MAX_SIZE];
  3575. Rand(rand_data, sizeof(rand_data));
  3576. BinToStr(rand_str, sizeof(rand_str), rand_data, sizeof(rand_data));
  3577. StrLower(rand_str);
  3578. WriteBuf(b, &us, sizeof(USHORT));
  3579. WriteBuf(b, dns_response_header_1, sizeof(dns_response_header_1));
  3580. WriteBuf(b, rand_str, 8);
  3581. WriteBuf(b, dns_response_header_2, sizeof(dns_response_header_2));
  3582. us = Endian16((USHORT)(p->Size + 4));
  3583. WriteBuf(b, &us, sizeof(USHORT));
  3584. WriteBuf(b, dns_response_header_3, sizeof(dns_response_header_3));
  3585. WriteBuf(b, p->Data, p->Size);
  3586. ui = Rand16() % (60 * 60 * 12) + (60 * 60 * 12);
  3587. WRITE_UINT(((UCHAR *)b->Buf) + 0x20, ui);
  3588. }
  3589. Free(p->Data);
  3590. p->Data = b->Buf;
  3591. p->Size = b->Size;
  3592. Free(b);
  3593. }
  3594. SendTo(r->UdpSock, &p->DstIP, p->DestPort, p->Data, p->Size);
  3595. r->TotalPhysicalSent += p->Size;
  3596. FreeUdpPacket(p);
  3597. }
  3598. DeleteAll(r->SendPacketList);
  3599. if (r->Halt)
  3600. {
  3601. // If it is necessary to stop, stop it after cycling through a loop
  3602. if (halt_flag == false)
  3603. {
  3604. halt_flag = true;
  3605. continue;
  3606. }
  3607. else
  3608. {
  3609. break;
  3610. }
  3611. }
  3612. // Rest the CPU until the next event
  3613. wait_interval = GetNextIntervalForInterrupt(r->Interrupt);
  3614. if (r->ServerMode)
  3615. {
  3616. min_wait_interval = RUDP_LOOP_WAIT_INTERVAL_S;
  3617. }
  3618. else
  3619. {
  3620. min_wait_interval = RUDP_LOOP_WAIT_INTERVAL_C;
  3621. }
  3622. if (wait_interval == INFINITE)
  3623. {
  3624. wait_interval = min_wait_interval;
  3625. }
  3626. else
  3627. {
  3628. wait_interval = MIN(min_wait_interval, wait_interval);
  3629. }
  3630. #ifdef RUDP_DETAIL_LOG
  3631. Debug("wait_interval = %u\n", wait_interval);
  3632. #endif // RUDP_DETAIL_LOG
  3633. if (wait_interval >= 1)
  3634. {
  3635. WaitSockEvent(r->SockEvent, wait_interval);
  3636. }
  3637. #ifdef RUDP_DETAIL_LOG
  3638. if (r->ServerMode)
  3639. {
  3640. char str1[MAX_SIZE];
  3641. char str2[MAX_SIZE];
  3642. double rate = 0.0;
  3643. ToStr64(str1, r->TotalPhysicalReceived);
  3644. ToStr64(str2, r->TotalLogicalReceived);
  3645. if (r->TotalPhysicalReceived >= 1)
  3646. {
  3647. rate = (double)r->TotalLogicalReceived / (double)r->TotalPhysicalReceived;
  3648. }
  3649. Debug("%s / %s %.4f\n", str1, str2, rate);
  3650. }
  3651. #endif // RUDP_DETAIL_LOG
  3652. }
  3653. Disconnect(r->UdpSock);
  3654. DelWaitThread(thread);
  3655. }
  3656. // Generate a appropriate register host name from the IP address
  3657. void RUDPGetRegisterHostNameByIP(char *dst, UINT size, IP *ip)
  3658. {
  3659. char tmp[16];
  3660. // Validate arguments
  3661. if (dst == NULL)
  3662. {
  3663. return;
  3664. }
  3665. if (ip != NULL && IsIP4(ip))
  3666. {
  3667. UCHAR hash[SHA1_SIZE];
  3668. HashSha1(hash, ip->addr, 4);
  3669. BinToStr(tmp, sizeof(tmp), hash, 2);
  3670. }
  3671. else
  3672. {
  3673. UCHAR rand[2];
  3674. Rand(rand, 2);
  3675. BinToStr(tmp, sizeof(tmp), rand, 2);
  3676. }
  3677. StrLower(tmp);
  3678. Format(dst, size,
  3679. (IsUseAlternativeHostname() ? UDP_NAT_T_SERVER_TAG_ALT : UDP_NAT_T_SERVER_TAG),
  3680. tmp[2], tmp[3]);
  3681. if (false)
  3682. {
  3683. Debug("Hash Src IP: %r\n"
  3684. "Hash Dst HN: %s\n",
  3685. ip,
  3686. dst);
  3687. }
  3688. }
  3689. // Analyze the IP address and port number from the string
  3690. bool RUDPParseIPAndPortStr(void *data, UINT data_size, IP *ip, UINT *port)
  3691. {
  3692. char tmp[MAX_SIZE];
  3693. UINT i;
  3694. char ipstr[MAX_SIZE];
  3695. char *portstr;
  3696. // Validate arguments
  3697. if (data == NULL || ip == NULL || port == NULL)
  3698. {
  3699. return false;
  3700. }
  3701. Zero(tmp, sizeof(tmp));
  3702. Copy(tmp, data, MIN(data_size, sizeof(tmp) - 1));
  3703. if (StartWith(tmp, "IP=") == false)
  3704. {
  3705. return false;
  3706. }
  3707. i = SearchStrEx(tmp, "#", 0, true);
  3708. if (i != INFINITE)
  3709. {
  3710. tmp[i] = 0;
  3711. }
  3712. StrCpy(ipstr, sizeof(ipstr), tmp + 3);
  3713. i = SearchStrEx(ipstr, ",PORT=", 0, true);
  3714. if (i == INFINITE)
  3715. {
  3716. return false;
  3717. }
  3718. ipstr[i] = 0;
  3719. portstr = ipstr + i + 6;
  3720. StrToIP(ip, ipstr);
  3721. *port = ToInt(portstr);
  3722. return true;
  3723. }
  3724. // R-UDP NAT-T IP address acquisition thread
  3725. void RUDPIpQueryThread(THREAD *thread, void *param)
  3726. {
  3727. RUDP_STACK *r;
  3728. UINT64 next_getip_tick = 0;
  3729. UINT64 next_getprivate_ip_tick = 0;
  3730. UINT last_ip_hash = 0;
  3731. void *route_change_poller = NULL;
  3732. char current_hostname[MAX_SIZE];
  3733. bool last_time_ip_changed = false;
  3734. UINT num_retry = 0;
  3735. // Validate arguments
  3736. if (thread == NULL || param == NULL)
  3737. {
  3738. return;
  3739. }
  3740. r = (RUDP_STACK *)param;
  3741. last_ip_hash = GetHostIPAddressHash32();
  3742. route_change_poller = NewRouteChange();
  3743. IsRouteChanged(route_change_poller);
  3744. Zero(current_hostname, sizeof(current_hostname));
  3745. while (r->Halt == false)
  3746. {
  3747. UINT ip_hash = GetHostIPAddressHash32();
  3748. UINT64 now = Tick64();
  3749. bool ip_changed = false;
  3750. if (ip_hash != last_ip_hash)
  3751. {
  3752. last_time_ip_changed = false;
  3753. }
  3754. if ((ip_hash != last_ip_hash) || (IsRouteChanged(route_change_poller)))
  3755. {
  3756. if (last_time_ip_changed == false)
  3757. {
  3758. // Call all getting functions from the beginning
  3759. // if the routing table or the IP address of this host has changed
  3760. next_getip_tick = 0;
  3761. next_getprivate_ip_tick = 0;
  3762. ip_changed = true;
  3763. last_ip_hash = ip_hash;
  3764. last_time_ip_changed = true;
  3765. }
  3766. }
  3767. else
  3768. {
  3769. last_time_ip_changed = false;
  3770. }
  3771. Lock(r->Lock);
  3772. {
  3773. if (StrCmpi(current_hostname, r->CurrentRegisterHostname) != 0)
  3774. {
  3775. // The target host name has changed
  3776. next_getip_tick = 0;
  3777. StrCpy(current_hostname, sizeof(current_hostname), r->CurrentRegisterHostname);
  3778. }
  3779. }
  3780. Unlock(r->Lock);
  3781. // Get the IP address of the NAT-T server with DNS
  3782. if (next_getip_tick == 0 || now >= next_getip_tick)
  3783. {
  3784. IP ip;
  3785. if (GetIP4(&ip, current_hostname) && IsZeroIp(&ip) == false)
  3786. {
  3787. Lock(r->Lock);
  3788. {
  3789. // Debug("%r %r\n",&r->NatT_IP, &ip);
  3790. if (CmpIpAddr(&r->NatT_IP, &ip) != 0)
  3791. {
  3792. // WHERE;
  3793. ip_changed = true;
  3794. Copy(&r->NatT_IP, &ip, sizeof(IP));
  3795. }
  3796. }
  3797. Unlock(r->Lock);
  3798. }
  3799. if (IsZeroIp(&r->NatT_IP))
  3800. {
  3801. num_retry++;
  3802. next_getip_tick = now + MIN((UINT64)UDP_NAT_T_GET_IP_INTERVAL * (UINT64)num_retry, (UINT64)UDP_NAT_T_GET_IP_INTERVAL_MAX);
  3803. }
  3804. else
  3805. {
  3806. next_getip_tick = now + (UINT64)UDP_NAT_T_GET_IP_INTERVAL_AFTER;
  3807. }
  3808. if (ip_changed)
  3809. {
  3810. Debug("NAT-T: NAT-T Server IP (%s): %r\n", current_hostname, &r->NatT_IP);
  3811. r->NatT_GetTokenNextTick = 0;
  3812. r->NatT_RegisterNextTick = 0;
  3813. r->NatT_GetTokenFailNum = 0;
  3814. r->NatT_RegisterFailNum = 0;
  3815. r->NatT_TranId = Rand64();
  3816. SetSockEvent(r->SockEvent);
  3817. }
  3818. }
  3819. // Get a private IP address of this host using TCP
  3820. if (next_getprivate_ip_tick == 0 || now >= next_getprivate_ip_tick)
  3821. {
  3822. IP ip;
  3823. if (GetMyPrivateIP(&ip, false))
  3824. {
  3825. Lock(r->Lock);
  3826. {
  3827. Copy(&r->My_Private_IP, &ip, sizeof(IP));
  3828. }
  3829. Unlock(r->Lock);
  3830. }
  3831. if (IsZeroIp(&r->My_Private_IP))
  3832. {
  3833. next_getprivate_ip_tick = now + (UINT64)UDP_NAT_T_GET_PRIVATE_IP_INTERVAL;
  3834. }
  3835. else
  3836. {
  3837. next_getprivate_ip_tick = now + (UINT64)GenRandInterval(UDP_NAT_T_GET_PRIVATE_IP_INTERVAL_AFTER_MIN, UDP_NAT_T_GET_PRIVATE_IP_INTERVAL_AFTER_MAX);
  3838. }
  3839. Debug("NAT-T: My Private IP: %r\n", &r->My_Private_IP);
  3840. }
  3841. if (r->Halt)
  3842. {
  3843. break;
  3844. }
  3845. Wait(r->HaltEvent, RUDP_LOOP_WAIT_INTERVAL_S);
  3846. }
  3847. FreeRouteChange(route_change_poller);
  3848. }
  3849. // Generate a random intervals
  3850. UINT GenRandInterval(UINT min, UINT max)
  3851. {
  3852. UINT a, b;
  3853. a = MIN(min, max);
  3854. b = MAX(min, max);
  3855. if (a == b)
  3856. {
  3857. return a;
  3858. }
  3859. return (Rand32() % (b - a)) + a;
  3860. }
  3861. // Identify the private IP of the interface which is used to connect to the Internet currently
  3862. bool GetMyPrivateIP(IP *ip, bool from_vg)
  3863. {
  3864. SOCK *s;
  3865. IP t;
  3866. char *hostname = UDP_NAT_T_GET_PRIVATE_IP_TCP_SERVER;
  3867. // Validate arguments
  3868. if (ip == NULL)
  3869. {
  3870. return false;
  3871. }
  3872. s = ConnectEx(hostname, UDP_NAT_T_PORT_FOR_TCP_1, UDP_NAT_T_GET_PRIVATE_IP_CONNECT_TIMEOUT);
  3873. if (s == NULL)
  3874. {
  3875. s = ConnectEx(hostname, UDP_NAT_T_PORT_FOR_TCP_2, UDP_NAT_T_GET_PRIVATE_IP_CONNECT_TIMEOUT);
  3876. if (s == NULL)
  3877. {
  3878. s = ConnectEx(GetRandHostNameForGetMyPrivateIP(), UDP_NAT_T_PORT_FOR_TCP_1, UDP_NAT_T_GET_PRIVATE_IP_CONNECT_TIMEOUT);
  3879. if (s == NULL)
  3880. {
  3881. return false;
  3882. }
  3883. }
  3884. }
  3885. Copy(&t, &s->LocalIP, sizeof(IP));
  3886. Disconnect(s);
  3887. ReleaseSock(s);
  3888. if (IsZeroIp(&t))
  3889. {
  3890. return false;
  3891. }
  3892. Copy(ip, &t, sizeof(IP));
  3893. return true;
  3894. }
  3895. char *GetRandHostNameForGetMyPrivateIP()
  3896. {
  3897. char *hosts[] =
  3898. {
  3899. "www.microsoft.com",
  3900. "www.yahoo.com",
  3901. "www.bing.com",
  3902. };
  3903. UINT num_hosts = 3;
  3904. return hosts[Rand32() % num_hosts];
  3905. }
  3906. // Function to wait until changing any IP address of the host or expiring the specified time or waking the event
  3907. void WaitUntilHostIPAddressChanged(void *p, EVENT *event, UINT timeout, UINT ip_check_interval)
  3908. {
  3909. UINT64 start, end;
  3910. UINT last_hash;
  3911. // Validate arguments
  3912. if (timeout == 0x7FFFFFFF)
  3913. {
  3914. timeout = 0xFFFFFFFF;
  3915. }
  3916. if (ip_check_interval == 0)
  3917. {
  3918. ip_check_interval = 0xFFFFFFFF;
  3919. }
  3920. if (event == NULL || timeout == 0)
  3921. {
  3922. return;
  3923. }
  3924. start = Tick64();
  3925. end = start + (UINT64)timeout;
  3926. last_hash = GetHostIPAddressHash32();
  3927. while (true)
  3928. {
  3929. UINT64 now = Tick64();
  3930. UINT next_interval;
  3931. if (now >= end)
  3932. {
  3933. break;
  3934. }
  3935. if (p != NULL)
  3936. {
  3937. if (IsRouteChanged(p))
  3938. {
  3939. break;
  3940. }
  3941. }
  3942. if (last_hash != GetHostIPAddressHash32())
  3943. {
  3944. break;
  3945. }
  3946. next_interval = (UINT)(end - now);
  3947. next_interval = MIN(next_interval, ip_check_interval);
  3948. if (Wait(event, next_interval))
  3949. {
  3950. break;
  3951. }
  3952. }
  3953. }
  3954. void *InitWaitUntilHostIPAddressChanged()
  3955. {
  3956. void *p = NewRouteChange();
  3957. if (p != NULL)
  3958. {
  3959. IsRouteChanged(p);
  3960. }
  3961. return p;
  3962. }
  3963. void FreeWaitUntilHostIPAddressChanged(void *p)
  3964. {
  3965. FreeRouteChange(p);
  3966. }
  3967. // Get whether the specified IPv6 address is on the local network
  3968. bool IsIPv6LocalNetworkAddress(IP *ip)
  3969. {
  3970. UINT type;
  3971. LIST *o;
  3972. UINT i;
  3973. bool ret = false;
  3974. IP mask64;
  3975. // Validate arguments
  3976. if (ip == NULL)
  3977. {
  3978. return false;
  3979. }
  3980. if (IsIP6(ip) == false)
  3981. {
  3982. return false;
  3983. }
  3984. if (IsZeroIp(ip))
  3985. {
  3986. return false;
  3987. }
  3988. type = GetIPAddrType6(ip);
  3989. if (type & IPV6_ADDR_LOCAL_UNICAST)
  3990. {
  3991. return true;
  3992. }
  3993. if ((type & IPV6_ADDR_GLOBAL_UNICAST) == 0)
  3994. {
  3995. return false;
  3996. }
  3997. IntToSubnetMask6(&mask64, 64);
  3998. o = GetHostIPAddressList();
  3999. ret = false;
  4000. for (i = 0;i < LIST_NUM(o);i++)
  4001. {
  4002. IP *p = LIST_DATA(o, i);
  4003. if (IsIP6(p))
  4004. {
  4005. if (IsZeroIp(p) == false)
  4006. {
  4007. if (IsLocalHostIP6(p) == false)
  4008. {
  4009. if (IsInSameNetwork6(p, ip, &mask64))
  4010. {
  4011. ret = true;
  4012. }
  4013. }
  4014. }
  4015. }
  4016. }
  4017. FreeHostIPAddressList(o);
  4018. return ret;
  4019. }
  4020. // Check whether the specified IP address is localhost or the IP address of the local interface of itself
  4021. bool IsIPLocalHostOrMySelf(IP *ip)
  4022. {
  4023. LIST *o;
  4024. bool ret = false;
  4025. UINT i;
  4026. // Validate arguments
  4027. if (ip == NULL)
  4028. {
  4029. return false;
  4030. }
  4031. o = GetHostIPAddressList();
  4032. if (o == NULL)
  4033. {
  4034. return false;
  4035. }
  4036. for (i = 0;i < LIST_NUM(o);i++)
  4037. {
  4038. IP *p = LIST_DATA(o, i);
  4039. if (CmpIpAddr(p, ip) == 0)
  4040. {
  4041. ret = true;
  4042. break;
  4043. }
  4044. }
  4045. FreeHostIPAddressList(o);
  4046. if (IsLocalHostIP4(ip) || IsLocalHostIP6(ip))
  4047. {
  4048. ret = true;
  4049. }
  4050. return ret;
  4051. }
  4052. // Get the results of the port number that is determined at random
  4053. UINT RUDPGetRandPortNumber(UCHAR rand_port_id)
  4054. {
  4055. UINT ret;
  4056. // Validate arguments
  4057. if (rand_port_id == 0)
  4058. {
  4059. return 0;
  4060. }
  4061. ret = rand_port_numbers[rand_port_id];
  4062. Debug("rand_port_id[%u] = %u\n", rand_port_id, ret);
  4063. return ret;
  4064. }
  4065. // Obtain the hash value of combining all of the IP address assigned to the host
  4066. UINT GetHostIPAddressHash32()
  4067. {
  4068. BUF *b;
  4069. UINT i;
  4070. UCHAR hash[SHA1_SIZE];
  4071. UINT ret;
  4072. LIST *o = GetHostIPAddressList();
  4073. if (o == NULL)
  4074. {
  4075. return 0;
  4076. }
  4077. b = NewBuf();
  4078. for (i = 0;i < LIST_NUM(o);i++)
  4079. {
  4080. IP *ip = LIST_DATA(o, i);
  4081. WriteBuf(b, ip, sizeof(IP));
  4082. WriteBufStr(b, ":-) yas (-:");
  4083. }
  4084. FreeHostIPAddressList(o);
  4085. WriteBuf(b, rand_port_numbers, sizeof(rand_port_numbers));
  4086. HashSha1(hash, b->Buf, b->Size);
  4087. FreeBuf(b);
  4088. Copy(&ret, hash, sizeof(UINT));
  4089. return ret;
  4090. }
  4091. // Create an IPv4 UDP socket destined for a particular target
  4092. SOCK *NewUDP4ForSpecificIp(IP *target_ip, UINT port)
  4093. {
  4094. SOCK *s;
  4095. IP local_ip;
  4096. // Validate arguments
  4097. if (target_ip == NULL || IsZeroIP(target_ip) || IsIP4(target_ip) == false)
  4098. {
  4099. target_ip = NULL;
  4100. }
  4101. Zero(&local_ip, sizeof(local_ip));
  4102. GetBestLocalIpForTarget(&local_ip, target_ip);
  4103. s = NewUDP4(port, &local_ip);
  4104. if (s == NULL)
  4105. {
  4106. s = NewUDP4(port, NULL);
  4107. }
  4108. return s;
  4109. }
  4110. // Get the best self IPv4 address to connect to the target IPv4 address
  4111. bool GetBestLocalIpForTarget(IP *local_ip, IP *target_ip)
  4112. {
  4113. bool ret = false;
  4114. ROUTE_ENTRY *e;
  4115. IP ip2;
  4116. UINT n = 0;
  4117. IP zero_ip;
  4118. // Validate arguments
  4119. Zero(local_ip, sizeof(IP));
  4120. ZeroIP4(&zero_ip);
  4121. if (target_ip == NULL)
  4122. {
  4123. target_ip = &zero_ip;
  4124. }
  4125. if (local_ip == NULL || IsIP4(target_ip) == false)
  4126. {
  4127. return false;
  4128. }
  4129. Copy(&ip2, target_ip, sizeof(IP));
  4130. while (true)
  4131. {
  4132. n++;
  4133. if (n >= 64)
  4134. {
  4135. break;
  4136. }
  4137. e = GetBestRouteEntry(&ip2);
  4138. if (e != NULL)
  4139. {
  4140. if (IsZeroIp(&e->GatewayIP))
  4141. {
  4142. Free(e);
  4143. break;
  4144. }
  4145. if (e->LocalRouting)
  4146. {
  4147. ret = true;
  4148. Copy(local_ip, &e->GatewayIP, sizeof(IP));
  4149. Free(e);
  4150. break;
  4151. }
  4152. else
  4153. {
  4154. Copy(&ip2, &e->GatewayIP, sizeof(IP));
  4155. }
  4156. Free(e);
  4157. }
  4158. }
  4159. if (ret == false)
  4160. {
  4161. if (IsLocalHostIP4(target_ip))
  4162. {
  4163. GetLocalHostIP4(local_ip);
  4164. ret = true;
  4165. }
  4166. }
  4167. return ret;
  4168. }
  4169. // Create a R-UDP client (Connection via NAT-T gateway)
  4170. SOCK *NewRUDPClientNatT(char *svc_name, IP *ip, UINT *error_code, UINT timeout, bool *cancel, char *hint_str, char *target_hostname)
  4171. {
  4172. IP nat_t_ip;
  4173. UINT dummy_int = 0;
  4174. UINT64 giveup_tick;
  4175. bool dummy_bool = false;
  4176. SOCK_EVENT *sock_event;
  4177. SOCK *sock;
  4178. bool same_lan = false;
  4179. char hostname[MAX_SIZE];
  4180. if (timeout == 0)
  4181. {
  4182. timeout = RUDP_TIMEOUT;
  4183. }
  4184. if (error_code == NULL)
  4185. {
  4186. error_code = &dummy_int;
  4187. }
  4188. if (cancel == NULL)
  4189. {
  4190. cancel = &dummy_bool;
  4191. }
  4192. *error_code = RUDP_ERROR_UNKNOWN;
  4193. if (svc_name == NULL || ip == NULL)
  4194. {
  4195. return NULL;
  4196. }
  4197. ListenTcpForPopupFirewallDialog();
  4198. giveup_tick = Tick64() + (UINT64)timeout;
  4199. // Get the IP address of the NAT-T server
  4200. RUDPGetRegisterHostNameByIP(hostname, sizeof(hostname), ip);
  4201. if (GetIP4Ex(&nat_t_ip, hostname, 0, cancel) == false)
  4202. {
  4203. *error_code = RUDP_ERROR_NAT_T_NO_RESPONSE;
  4204. return NULL;
  4205. }
  4206. if (Tick64() >= giveup_tick)
  4207. {
  4208. *error_code = RUDP_ERROR_TIMEOUT;
  4209. return NULL;
  4210. }
  4211. if (*cancel)
  4212. {
  4213. *error_code = RUDP_ERROR_USER_CANCELED;
  4214. return NULL;
  4215. }
  4216. sock = NewUDP4ForSpecificIp(&nat_t_ip, 0);
  4217. if (sock == NULL)
  4218. {
  4219. *error_code = RUDP_ERROR_UNKNOWN;
  4220. return NULL;
  4221. }
  4222. else
  4223. {
  4224. UINT64 next_send_request_tick = 0;
  4225. INTERRUPT_MANAGER *interrupt = NewInterruptManager();
  4226. UINT64 tran_id = Rand64();
  4227. UINT tmp_size = 65536;
  4228. UCHAR *tmp = Malloc(tmp_size);
  4229. char result_ip_str[MAX_SIZE];
  4230. IP result_ip;
  4231. UINT result_port;
  4232. SOCK *ret = NULL;
  4233. UINT num_tries = 0;
  4234. UINT64 current_cookie = 0;
  4235. AddInterrupt(interrupt, giveup_tick);
  4236. sock_event = NewSockEvent();
  4237. JoinSockToSockEvent(sock, sock_event);
  4238. // Communication with the NAT-T server
  4239. while (true)
  4240. {
  4241. UINT64 now = Tick64();
  4242. UINT interval;
  4243. UINT r;
  4244. IP src_ip;
  4245. UINT src_port;
  4246. UINT err;
  4247. UINT num_ignore_errors = 0;
  4248. if (now >= giveup_tick)
  4249. {
  4250. // Time-out
  4251. LABEL_TIMEOUT:
  4252. *error_code = RUDP_ERROR_NAT_T_NO_RESPONSE;
  4253. break;
  4254. }
  4255. if (*cancel)
  4256. {
  4257. // User canceled
  4258. *error_code = RUDP_ERROR_USER_CANCELED;
  4259. break;
  4260. }
  4261. err = INFINITE;
  4262. // Receive a response packet from the NAT-T server
  4263. while (err == INFINITE)
  4264. {
  4265. r = RecvFrom(sock, &src_ip, &src_port, tmp, tmp_size);
  4266. if (r == SOCK_LATER)
  4267. {
  4268. // No packet
  4269. break;
  4270. }
  4271. else if (r == 0)
  4272. {
  4273. if (sock->IgnoreRecvErr == false)
  4274. {
  4275. // Communication error
  4276. goto LABEL_TIMEOUT;
  4277. }
  4278. else
  4279. {
  4280. if ((num_ignore_errors++) >= MAX_NUM_IGNORE_ERRORS)
  4281. {
  4282. goto LABEL_TIMEOUT;
  4283. }
  4284. }
  4285. }
  4286. else
  4287. {
  4288. // Check the source IP address and the port number
  4289. if (CmpIpAddr(&src_ip, &nat_t_ip) == 0 && src_port == UDP_NAT_T_PORT)
  4290. {
  4291. BUF *b = NewBuf();
  4292. PACK *p;
  4293. WriteBuf(b, tmp, r);
  4294. SeekBuf(b, 0, 0);
  4295. p = BufToPack(b);
  4296. if (p != NULL)
  4297. {
  4298. UINT64 cookie = PackGetInt64(p, "cookie");
  4299. if (cookie != 0)
  4300. {
  4301. current_cookie = cookie;
  4302. }
  4303. // Compare tran_id
  4304. if (PackGetInt64(p, "tran_id") == tran_id)
  4305. {
  4306. // Compare opcode
  4307. if (PackCmpStr(p, "opcode", "nat_t_connect_request"))
  4308. {
  4309. bool ok = PackGetBool(p, "ok");
  4310. bool multi_candidate = PackGetBool(p, "multi_candidates");
  4311. if (ok)
  4312. {
  4313. // Success
  4314. PackGetStr(p, "result_ip", result_ip_str, sizeof(result_ip_str));
  4315. StrToIP(&result_ip, result_ip_str);
  4316. result_port = PackGetInt(p, "result_port");
  4317. same_lan = PackGetBool(p, "same_lan");
  4318. if (result_port != 0)
  4319. {
  4320. if (IsZeroIp(&result_ip) == false)
  4321. {
  4322. if ((sock->IPv6 == false && IsIP4(&result_ip)) ||
  4323. (sock->IPv6 && IsIP6(&result_ip)))
  4324. {
  4325. err = RUDP_ERROR_OK;
  4326. }
  4327. }
  4328. }
  4329. }
  4330. else if (multi_candidate)
  4331. {
  4332. // There are two or more computers behind the specified IP address
  4333. err = RUDP_ERROR_NAT_T_TWO_OR_MORE;
  4334. }
  4335. else
  4336. {
  4337. // Failure
  4338. err = RUDP_ERROR_NAT_T_NOT_FOUND;
  4339. }
  4340. }
  4341. }
  4342. FreePack(p);
  4343. }
  4344. FreeBuf(b);
  4345. }
  4346. }
  4347. }
  4348. if (err != INFINITE)
  4349. {
  4350. *error_code = err;
  4351. break;
  4352. }
  4353. if (next_send_request_tick == 0 || now >= next_send_request_tick)
  4354. {
  4355. // Send a connection request to the NAT-T server
  4356. BUF *b;
  4357. char ip_str[MAX_SIZE];
  4358. PACK *p = NewPack();
  4359. PackAddStr(p, "opcode", "nat_t_connect_request");
  4360. PackAddInt64(p, "tran_id", tran_id);
  4361. IPToStr(ip_str, sizeof(ip_str), ip);
  4362. PackAddStr(p, "dest_ip", ip_str);
  4363. PackAddInt64(p, "cookie", current_cookie);
  4364. if (IsEmptyStr(hint_str) == false)
  4365. {
  4366. PackAddStr(p, "hint", hint_str);
  4367. }
  4368. if (IsEmptyStr(target_hostname) == false)
  4369. {
  4370. PackAddStr(p, "target_hostname", target_hostname);
  4371. }
  4372. PackAddStr(p, "svc_name", svc_name);
  4373. PackAddInt(p, "nat_traversal_version", UDP_NAT_TRAVERSAL_VERSION);
  4374. b = PackToBuf(p);
  4375. FreePack(p);
  4376. SendTo(sock, &nat_t_ip, UDP_NAT_T_PORT, b->Buf, b->Size);
  4377. FreeBuf(b);
  4378. // Determine the next transmission time
  4379. next_send_request_tick = now + (UINT64)UDP_NAT_T_CONNECT_INTERVAL * (UINT64)(Power(2, MAX(num_tries, 6)));
  4380. num_tries++;
  4381. AddInterrupt(interrupt, next_send_request_tick);
  4382. }
  4383. interval = GetNextIntervalForInterrupt(interrupt);
  4384. interval = MIN(interval, 50);
  4385. WaitSockEvent(sock_event, interval);
  4386. }
  4387. Free(tmp);
  4388. FreeInterruptManager(interrupt);
  4389. if (*error_code == RUDP_ERROR_OK)
  4390. {
  4391. UINT remain_timeout;
  4392. UINT64 now = Tick64();
  4393. // Success to get the IP address and the port number of the target
  4394. // Get the rest timeout tolerance
  4395. if (now <= giveup_tick)
  4396. {
  4397. remain_timeout = (UINT)(giveup_tick - now);
  4398. }
  4399. else
  4400. {
  4401. remain_timeout = 0;
  4402. }
  4403. remain_timeout = MAX(remain_timeout, 2000);
  4404. if (same_lan)
  4405. {
  4406. // Discard current UDP socket and create a new UDP socket in NewRUDPClientDirect().
  4407. // Because using a UDP socket which used for communication with the NAT-T server
  4408. // can cause trouble when the client and the server exists in the same LAN.
  4409. ReleaseSockEvent(sock_event);
  4410. ReleaseSock(sock);
  4411. sock = NULL;
  4412. sock_event = NULL;
  4413. }
  4414. ret = NewRUDPClientDirect(svc_name, &result_ip, result_port, error_code, remain_timeout, cancel,
  4415. sock, sock_event, 0, false);
  4416. }
  4417. if (sock_event != NULL)
  4418. {
  4419. ReleaseSockEvent(sock_event);
  4420. }
  4421. if (sock != NULL)
  4422. {
  4423. if (ret == NULL)
  4424. {
  4425. Disconnect(sock);
  4426. }
  4427. ReleaseSock(sock);
  4428. }
  4429. return ret;
  4430. }
  4431. }
  4432. // Listen to the TCP for a moment to show the firewall dialog
  4433. void ListenTcpForPopupFirewallDialog()
  4434. {
  4435. #ifdef OS_WIN32
  4436. static bool tried = false;
  4437. if (tried == false)
  4438. {
  4439. SOCK *s;
  4440. tried = true;
  4441. s = ListenAnyPortEx2(false, true);
  4442. if (s != NULL)
  4443. {
  4444. Disconnect(s);
  4445. ReleaseSock(s);
  4446. }
  4447. }
  4448. #endif // OS_WIN32
  4449. }
  4450. // Create a R-UDP client (direct connection)
  4451. SOCK *NewRUDPClientDirect(char *svc_name, IP *ip, UINT port, UINT *error_code, UINT timeout, bool *cancel, SOCK *sock, SOCK_EVENT *sock_event, UINT local_port, bool over_dns_mode)
  4452. {
  4453. RUDP_STACK *r;
  4454. UINT dummy_int = 0;
  4455. SOCK *ret = NULL;
  4456. // Validate arguments
  4457. if (error_code == NULL)
  4458. {
  4459. error_code = &dummy_int;
  4460. }
  4461. if (timeout == 0)
  4462. {
  4463. timeout = RUDP_TIMEOUT;
  4464. }
  4465. *error_code = RUDP_ERROR_UNKNOWN;
  4466. if (svc_name == NULL || ip == NULL || port == 0)
  4467. {
  4468. return NULL;
  4469. }
  4470. r = NewRUDP(false, svc_name, NULL, NULL, NULL, local_port, sock, sock_event, false, over_dns_mode, ip, NULL, 0);
  4471. if (r == NULL)
  4472. {
  4473. *error_code = RUDP_ERROR_UNKNOWN;
  4474. return NULL;
  4475. }
  4476. // Set the port number and the target IP address
  4477. Lock(r->Lock);
  4478. {
  4479. Copy(&r->TargetIp, ip, sizeof(IP));
  4480. r->TargetPort = port;
  4481. r->TargetIpAndPortInited = true;
  4482. }
  4483. Unlock(r->Lock);
  4484. SetSockEvent(r->SockEvent);
  4485. // Wait for a connection success/failure to the target IP address
  4486. WaitEx(r->TargetConnectedEvent, timeout, cancel);
  4487. Lock(r->Lock);
  4488. {
  4489. if (r->TargetConnectedSock != NULL)
  4490. {
  4491. // The connection succeeded
  4492. ret = r->TargetConnectedSock;
  4493. r->TargetConnectedSock = NULL;
  4494. }
  4495. else
  4496. {
  4497. r->DoNotSetTargetConnectedSock = true;
  4498. }
  4499. }
  4500. Unlock(r->Lock);
  4501. if (ret == NULL)
  4502. {
  4503. // Stop the R-UDP stack if the connection has failed
  4504. *error_code = RUDP_ERROR_TIMEOUT;
  4505. FreeRUDP(r);
  4506. }
  4507. else if (cancel != NULL && (*cancel))
  4508. {
  4509. // User canceled
  4510. *error_code = RUDP_ERROR_USER_CANCELED;
  4511. Disconnect(ret);
  4512. ReleaseSock(ret);
  4513. ret = NULL;
  4514. }
  4515. else
  4516. {
  4517. *error_code = RUDP_ERROR_OK;
  4518. }
  4519. return ret;
  4520. }
  4521. // Creating a R-UDP server
  4522. RUDP_STACK *NewRUDPServer(char *svc_name, RUDP_STACK_INTERRUPTS_PROC *proc_interrupts, RUDP_STACK_RPC_RECV_PROC *proc_rpc_recv, void *param, UINT port, bool no_natt_register, bool over_dns_mode, volatile UINT *natt_global_udp_port, UCHAR rand_port_id)
  4523. {
  4524. RUDP_STACK *r;
  4525. // Validate arguments
  4526. if (IsEmptyStr(svc_name))
  4527. {
  4528. return NULL;
  4529. }
  4530. if (g_no_rudp_server)
  4531. {
  4532. return NULL;
  4533. }
  4534. ListenTcpForPopupFirewallDialog();
  4535. r = NewRUDP(true, svc_name, proc_interrupts, proc_rpc_recv, param, port, NULL, NULL, no_natt_register, over_dns_mode, NULL, natt_global_udp_port, rand_port_id);
  4536. if (r == NULL)
  4537. {
  4538. return NULL;
  4539. }
  4540. return r;
  4541. }
  4542. // Creating a R-UDP
  4543. RUDP_STACK *NewRUDP(bool server_mode, char *svc_name, RUDP_STACK_INTERRUPTS_PROC *proc_interrupts, RUDP_STACK_RPC_RECV_PROC *proc_rpc_recv, void *param, UINT port, SOCK *sock, SOCK_EVENT *sock_event, bool server_no_natt_register, bool over_dns_mode, IP *client_target_ip, volatile UINT *natt_global_udp_port, UCHAR rand_port_id)
  4544. {
  4545. RUDP_STACK *r;
  4546. char tmp[MAX_SIZE];
  4547. UCHAR pid_hash[SHA1_SIZE];
  4548. UINT pid;
  4549. USHORT pid_us;
  4550. // Validate arguments
  4551. if (IsEmptyStr(svc_name))
  4552. {
  4553. return NULL;
  4554. }
  4555. ListenTcpForPopupFirewallDialog();
  4556. if (sock == NULL)
  4557. {
  4558. if (server_mode == false && client_target_ip != NULL)
  4559. {
  4560. sock = NewUDP4ForSpecificIp(client_target_ip, port);
  4561. }
  4562. else
  4563. {
  4564. if (rand_port_id == 0)
  4565. {
  4566. sock = NewUDP(port);
  4567. }
  4568. else
  4569. {
  4570. sock = NewUDPEx2RandMachineAndExePath(false, NULL, 0, rand_port_id);
  4571. }
  4572. }
  4573. if (sock == NULL)
  4574. {
  4575. return NULL;
  4576. }
  4577. }
  4578. else
  4579. {
  4580. AddRef(sock->ref);
  4581. }
  4582. if (port == 0)
  4583. {
  4584. port = sock->LocalPort;
  4585. }
  4586. if (rand_port_id != 0)
  4587. {
  4588. rand_port_numbers[rand_port_id] = port;
  4589. }
  4590. if (sock_event == NULL)
  4591. {
  4592. sock_event = NewSockEvent();
  4593. }
  4594. else
  4595. {
  4596. AddRef(sock_event->ref);
  4597. }
  4598. r = ZeroMalloc(sizeof(RUDP_STACK));
  4599. r->NatT_SessionKey = Rand64();
  4600. StrCpy(r->SvcName, sizeof(r->SvcName), svc_name);
  4601. r->RandPortId = rand_port_id;
  4602. r->NatTGlobalUdpPort = natt_global_udp_port;
  4603. r->ServerMode = server_mode;
  4604. r->Interrupt = NewInterruptManager();
  4605. r->SessionList = NewList(RUDPCompareSessionList);
  4606. r->UdpSock = sock;
  4607. r->Port = port;
  4608. r->SockEvent = sock_event;
  4609. r->HaltEvent = NewEvent();
  4610. r->Now = Tick64();
  4611. r->Lock = NewLock();
  4612. r->Param = param;
  4613. r->TargetConnectedEvent = NewEvent();
  4614. r->SendPacketList = NewList(NULL);
  4615. r->NewSockConnectEvent = NewEvent();
  4616. r->NewSockQueue = NewQueue();
  4617. r->NatT_TranId = Rand64();
  4618. r->NatT_SourceIpList = NewListFast(NULL);
  4619. StrCpy(tmp, sizeof(tmp), r->SvcName);
  4620. Trim(tmp);
  4621. StrLower(tmp);
  4622. HashSha1(r->SvcNameHash, tmp, StrLen(tmp));
  4623. r->Client_IcmpId = (USHORT)(Rand32() % 65534 + 1);
  4624. r->Client_IcmpSeqNo = (USHORT)(Rand32() % 65534 + 1);
  4625. // Determination of the type of the protocol
  4626. r->Protocol = RUDP_PROTOCOL_UDP;
  4627. if (r->Port == MAKE_SPECIAL_PORT(IP_PROTO_ICMPV4))
  4628. {
  4629. r->Protocol = RUDP_PROTOCOL_ICMP;
  4630. // Generate the ICMP ID based on the process ID
  4631. #ifdef OS_WIN32
  4632. pid = (UINT)MsGetProcessId();
  4633. #else // OS_WIN32
  4634. pid = (UINT)getpid();
  4635. #endif // OS_WIN32
  4636. pid = Endian32(pid);
  4637. HashSha1(pid_hash, &pid, sizeof(UINT));
  4638. pid_us = READ_USHORT(pid_hash);
  4639. if (pid_us == 0 || pid_us == 0xFFFF)
  4640. {
  4641. pid_us = 1;
  4642. }
  4643. r->Client_IcmpId = pid_us;
  4644. }
  4645. else if (over_dns_mode)
  4646. {
  4647. r->Protocol = RUDP_PROTOCOL_DNS;
  4648. }
  4649. if (r->ServerMode)
  4650. {
  4651. r->NoNatTRegister = server_no_natt_register;
  4652. if (r->Protocol == RUDP_PROTOCOL_ICMP || r->Protocol == RUDP_PROTOCOL_DNS)
  4653. {
  4654. // Never register to the NAT-T server in case of using the DNS or the ICMP
  4655. r->NoNatTRegister = true;
  4656. }
  4657. }
  4658. if (true
  4659. )
  4660. {
  4661. RUDPGetRegisterHostNameByIP(r->CurrentRegisterHostname, sizeof(r->CurrentRegisterHostname), NULL);
  4662. }
  4663. if (r->ServerMode)
  4664. {
  4665. r->ProcInterrupts = proc_interrupts;
  4666. r->ProcRpcRecv = proc_rpc_recv;
  4667. }
  4668. if (r->ServerMode && r->NoNatTRegister == false
  4669. )
  4670. {
  4671. r->IpQueryThread = NewThread(RUDPIpQueryThread, r);
  4672. }
  4673. JoinSockToSockEvent(r->UdpSock, r->SockEvent);
  4674. r->Thread = NewThread(RUDPMainThread, r);
  4675. WaitThreadInit(r->Thread);
  4676. return r;
  4677. }
  4678. // R-UDP session comparison function
  4679. int RUDPCompareSessionList(void *p1, void *p2)
  4680. {
  4681. RUDP_SESSION *s1, *s2;
  4682. UINT r;
  4683. // Validate arguments
  4684. if (p1 == NULL || p2 == NULL)
  4685. {
  4686. return 0;
  4687. }
  4688. s1 = *((RUDP_SESSION **)p1);
  4689. s2 = *((RUDP_SESSION **)p2);
  4690. if (s1 == NULL || s2 == NULL)
  4691. {
  4692. return 0;
  4693. }
  4694. r = CmpIpAddr(&s1->YourIp, &s2->YourIp);
  4695. if (r != 0)
  4696. {
  4697. return r;
  4698. }
  4699. r = COMPARE_RET(s1->YourPort, s2->YourPort);
  4700. if (r != 0)
  4701. {
  4702. return r;
  4703. }
  4704. r = CmpIpAddr(&s1->MyIp, &s2->MyIp);
  4705. if (r != 0)
  4706. {
  4707. return r;
  4708. }
  4709. r = COMPARE_RET(s1->MyPort, s2->MyPort);
  4710. if (r != 0)
  4711. {
  4712. return r;
  4713. }
  4714. return 0;
  4715. }
  4716. // Release of the R-UDP
  4717. void FreeRUDP(RUDP_STACK *r)
  4718. {
  4719. UINT i;
  4720. // Validate arguments
  4721. if (r == NULL)
  4722. {
  4723. return;
  4724. }
  4725. r->Halt = true;
  4726. Set(r->HaltEvent);
  4727. SetSockEvent(r->SockEvent);
  4728. if (r->ServerMode && r->NoNatTRegister == false)
  4729. {
  4730. if (r->IpQueryThread != NULL)
  4731. {
  4732. WaitThread(r->IpQueryThread, INFINITE);
  4733. ReleaseThread(r->IpQueryThread);
  4734. }
  4735. }
  4736. WaitThread(r->Thread, INFINITE);
  4737. ReleaseThread(r->Thread);
  4738. for (i = 0;i < LIST_NUM(r->SessionList);i++)
  4739. {
  4740. RUDP_SESSION *se = LIST_DATA(r->SessionList, i);
  4741. RUDPFreeSession(se);
  4742. }
  4743. ReleaseList(r->SessionList);
  4744. for (i = 0;i < LIST_NUM(r->SendPacketList);i++)
  4745. {
  4746. UDPPACKET *p = LIST_DATA(r->SendPacketList, i);
  4747. FreeUdpPacket(p);
  4748. }
  4749. while (true)
  4750. {
  4751. SOCK *s = GetNext(r->NewSockQueue);
  4752. if (s == NULL)
  4753. {
  4754. break;
  4755. }
  4756. Disconnect(s);
  4757. ReleaseSock(s);
  4758. }
  4759. for (i = 0;i < LIST_NUM(r->NatT_SourceIpList);i++)
  4760. {
  4761. RUDP_SOURCE_IP *sip = (RUDP_SOURCE_IP *)LIST_DATA(r->NatT_SourceIpList, i);
  4762. Free(sip);
  4763. }
  4764. ReleaseList(r->NatT_SourceIpList);
  4765. ReleaseQueue(r->NewSockQueue);
  4766. ReleaseList(r->SendPacketList);
  4767. FreeInterruptManager(r->Interrupt);
  4768. Disconnect(r->UdpSock);
  4769. ReleaseSock(r->UdpSock);
  4770. ReleaseSockEvent(r->SockEvent);
  4771. ReleaseEvent(r->HaltEvent);
  4772. ReleaseEvent(r->TargetConnectedEvent);
  4773. ReleaseEvent(r->NewSockConnectEvent);
  4774. Disconnect(r->TargetConnectedSock);
  4775. ReleaseSock(r->TargetConnectedSock);
  4776. DeleteLock(r->Lock);
  4777. if (r->RandPortId != 0)
  4778. {
  4779. rand_port_numbers[r->RandPortId] = 0;
  4780. }
  4781. Free(r);
  4782. }
  4783. // Generate a hash from the current computer name and the process name
  4784. void GetCurrentMachineIpProcessHash(void *hash)
  4785. {
  4786. // Validate arguments
  4787. if (hash == NULL)
  4788. {
  4789. return;
  4790. }
  4791. Lock(machine_ip_process_hash_lock);
  4792. {
  4793. if (IsZero(machine_ip_process_hash, SHA1_SIZE))
  4794. {
  4795. GetCurrentMachineIpProcessHashInternal(machine_ip_process_hash);
  4796. }
  4797. Copy(hash, machine_ip_process_hash, SHA1_SIZE);
  4798. }
  4799. Unlock(machine_ip_process_hash_lock);
  4800. }
  4801. void GetCurrentMachineIpProcessHashInternal(void *hash)
  4802. {
  4803. BUF *b;
  4804. LIST *ip_list;
  4805. char machine_name[MAX_SIZE];
  4806. wchar_t exe_path[MAX_PATH];
  4807. char *product_id = NULL;
  4808. // Validate arguments
  4809. if (hash == NULL)
  4810. {
  4811. return;
  4812. }
  4813. #ifdef OS_WIN32
  4814. product_id = MsRegReadStr(REG_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", "ProductId");
  4815. if (product_id == NULL)
  4816. {
  4817. product_id = MsRegReadStr(REG_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "ProductId");
  4818. }
  4819. #endif // OS_WIN32
  4820. b = NewBuf();
  4821. GetMachineHostName(machine_name, sizeof(machine_name));
  4822. Trim(machine_name);
  4823. StrUpper(machine_name);
  4824. GetExeNameW(exe_path, sizeof(exe_path));
  4825. UniTrim(exe_path);
  4826. UniStrUpper(exe_path);
  4827. WriteBuf(b, machine_name, StrSize(machine_name));
  4828. WriteBuf(b, exe_path, UniStrSize(exe_path));
  4829. WriteBuf(b, product_id, StrSize(product_id));
  4830. ip_list = GetHostIPAddressList();
  4831. if (ip_list != NULL)
  4832. {
  4833. UINT i;
  4834. for (i = 0;i < LIST_NUM(ip_list);i++)
  4835. {
  4836. IP *ip = LIST_DATA(ip_list, i);
  4837. WriteBuf(b, ip, sizeof(IP));
  4838. }
  4839. }
  4840. FreeHostIPAddressList(ip_list);
  4841. HashSha1(hash, b->Buf, b->Size);
  4842. FreeBuf(b);
  4843. Free(product_id);
  4844. }
  4845. // Create a pair of pre-bound TCP sockets
  4846. bool NewTcpPair(SOCK **s1, SOCK **s2)
  4847. {
  4848. SOCK *a;
  4849. SOCK *s, *c;
  4850. TUBE *t1, *t2;
  4851. SOCK_EVENT *e1, *e2;
  4852. // Validate arguments
  4853. if (s1 == NULL || s2 == NULL)
  4854. {
  4855. return false;
  4856. }
  4857. a = ListenAnyPortEx2(true, true);
  4858. if (a == NULL)
  4859. {
  4860. return false;
  4861. }
  4862. c = Connect("127.0.0.1", a->LocalPort);
  4863. if (c == NULL)
  4864. {
  4865. ReleaseSock(a);
  4866. return false;
  4867. }
  4868. s = Accept(a);
  4869. if (s == NULL)
  4870. {
  4871. ReleaseSock(c);
  4872. ReleaseSock(a);
  4873. return false;
  4874. }
  4875. ReleaseSock(a);
  4876. if ((s->LocalPort != c->RemotePort) || (s->RemotePort != c->LocalPort))
  4877. {
  4878. ReleaseSock(s);
  4879. ReleaseSock(c);
  4880. return false;
  4881. }
  4882. NewTubePair(&t1, &t2, sizeof(TCP_PAIR_HEADER));
  4883. // Creating a socket event
  4884. e1 = NewSockEvent();
  4885. e2 = NewSockEvent();
  4886. SetTubeSockEvent(t1, e1);
  4887. SetTubeSockEvent(t2, e2);
  4888. AddRef(t1->Ref);
  4889. AddRef(t2->Ref);
  4890. s->BulkRecvTube = c->BulkSendTube = t1;
  4891. s->BulkSendTube = c->BulkRecvTube = t2;
  4892. ReleaseSockEvent(e1);
  4893. ReleaseSockEvent(e2);
  4894. *s1 = s;
  4895. *s2 = c;
  4896. return true;
  4897. }
  4898. // Listen in any available port
  4899. SOCK *ListenAnyPortEx(bool local_only)
  4900. {
  4901. return ListenAnyPortEx2(local_only, false);
  4902. }
  4903. SOCK *ListenAnyPortEx2(bool local_only, bool disable_ca)
  4904. {
  4905. UINT i;
  4906. SOCK *s;
  4907. for (i = 40000;i < 65536;i++)
  4908. {
  4909. s = ListenEx(i, local_only);
  4910. if (s != NULL)
  4911. {
  4912. return s;
  4913. }
  4914. }
  4915. return NULL;
  4916. }
  4917. int cb_test(int a, X509_STORE_CTX *ctx)
  4918. {
  4919. WHERE;
  4920. return 1;
  4921. }
  4922. // Verify client SSL certificate during TLS handshake.
  4923. //
  4924. // (actually, only save the certificate for later authentication in Protocol.c)
  4925. int SslCertVerifyCallback(int preverify_ok, X509_STORE_CTX *ctx)
  4926. {
  4927. SSL *ssl;
  4928. struct SslClientCertInfo *clientcert;
  4929. ssl = X509_STORE_CTX_get_ex_data(ctx, SSL_get_ex_data_X509_STORE_CTX_idx());
  4930. clientcert = SSL_get_ex_data(ssl, GetSslClientCertIndex());
  4931. if (clientcert != NULL)
  4932. {
  4933. clientcert->PreverifyErr = 0;
  4934. clientcert->PreverifyErrMessage[0] = '\0';
  4935. if (!preverify_ok)
  4936. {
  4937. char *msg;
  4938. clientcert->PreverifyErr = X509_STORE_CTX_get_error(ctx);
  4939. msg = (char *)X509_verify_cert_error_string(clientcert->PreverifyErr);
  4940. StrCpy(clientcert->PreverifyErrMessage, PREVERIFY_ERR_MESSAGE_SIZE, msg);
  4941. Debug("SslCertVerifyCallback preverify error: '%s'\n", msg);
  4942. }
  4943. else
  4944. {
  4945. if (ctx->cert != NULL)
  4946. {
  4947. X *tmpX = X509ToX(ctx->cert); // this only wraps ctx->cert, but we need to make a copy
  4948. X *copyX = CloneX(tmpX);
  4949. tmpX->do_not_free = true; // do not release inner X509 object
  4950. FreeX(tmpX);
  4951. clientcert->X = copyX;
  4952. }
  4953. }
  4954. }
  4955. return 1; /* allow the verification process to continue */
  4956. }
  4957. // Create a new SSL pipe
  4958. SSL_PIPE *NewSslPipe(bool server_mode, X *x, K *k, DH_CTX *dh)
  4959. {
  4960. return NewSslPipeEx(server_mode, x, k, dh, false, NULL);
  4961. }
  4962. // Create a new SSL pipe with extended options
  4963. SSL_PIPE *NewSslPipeEx(bool server_mode, X *x, K *k, DH_CTX *dh, bool verify_peer, struct SslClientCertInfo *clientcert)
  4964. {
  4965. SSL_PIPE *s;
  4966. SSL *ssl;
  4967. SSL_CTX *ssl_ctx = NewSSLCtx(server_mode);
  4968. Lock(openssl_lock);
  4969. {
  4970. if (server_mode)
  4971. {
  4972. SSL_CTX_set_ssl_version(ssl_ctx, SSLv23_method());
  4973. SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_SSLv2);
  4974. AddChainSslCertOnDirectory(ssl_ctx);
  4975. if (dh != NULL)
  4976. {
  4977. SSL_CTX_set_tmp_dh(ssl_ctx, dh->dh);
  4978. }
  4979. }
  4980. else
  4981. {
  4982. SSL_CTX_set_ssl_version(ssl_ctx, SSLv23_client_method());
  4983. }
  4984. if (verify_peer)
  4985. {
  4986. SSL_CTX_set_verify(ssl_ctx, SSL_VERIFY_PEER, SslCertVerifyCallback);
  4987. }
  4988. if (dh != NULL)
  4989. {
  4990. SSL_CTX_set_options(ssl_ctx, SSL_OP_SINGLE_DH_USE);
  4991. }
  4992. if (server_mode == false)
  4993. {
  4994. SSL_CTX_set_options(ssl_ctx, SSL_OP_DONT_INSERT_EMPTY_FRAGMENTS);
  4995. }
  4996. ssl = SSL_new(ssl_ctx);
  4997. SSL_set_ex_data(ssl, GetSslClientCertIndex(), clientcert);
  4998. }
  4999. Unlock(openssl_lock);
  5000. s = ZeroMalloc(sizeof(SSL_PIPE));
  5001. s->ssl = ssl;
  5002. s->ssl_ctx = ssl_ctx;
  5003. s->ServerMode = server_mode;
  5004. s->SslInOut = NewSslBioSsl();
  5005. s->RawIn = NewSslBioMem();
  5006. s->RawOut = NewSslBioMem();
  5007. if (x != NULL && k != NULL)
  5008. {
  5009. Lock(openssl_lock);
  5010. {
  5011. SSL_use_certificate(s->ssl, x->x509);
  5012. SSL_use_PrivateKey(s->ssl, k->pkey);
  5013. }
  5014. Unlock(openssl_lock);
  5015. }
  5016. if (s->ServerMode == false)
  5017. {
  5018. SSL_set_connect_state(s->ssl);
  5019. }
  5020. else
  5021. {
  5022. SSL_set_accept_state(s->ssl);
  5023. }
  5024. SSL_set_bio(s->ssl, s->RawIn->bio, s->RawOut->bio);
  5025. BIO_set_ssl(s->SslInOut->bio, s->ssl, BIO_NOCLOSE);
  5026. //s->RawIn->NoFree = true;
  5027. s->RawOut->NoFree = true;
  5028. return s;
  5029. }
  5030. // Synchronization of the SSL pipe
  5031. bool SyncSslPipe(SSL_PIPE *s)
  5032. {
  5033. UINT i;
  5034. // Validate arguments
  5035. if (s == NULL || s->IsDisconnected)
  5036. {
  5037. return false;
  5038. }
  5039. for (i = 0;i < 2;i++)
  5040. {
  5041. if (SslBioSync(s->RawIn, true, false) == false)
  5042. {
  5043. s->IsDisconnected = true;
  5044. Debug("SyncSslPipe: s->RawIn error.\n");
  5045. return false;
  5046. }
  5047. if (SslBioSync(s->RawOut, false, true) == false)
  5048. {
  5049. s->IsDisconnected = true;
  5050. Debug("SyncSslPipe: s->RawOut error.\n");
  5051. return false;
  5052. }
  5053. if (SslBioSync(s->SslInOut, true, true) == false)
  5054. {
  5055. s->IsDisconnected = true;
  5056. Debug("SyncSslPipe: s->SslInOut error.\n");
  5057. return false;
  5058. }
  5059. }
  5060. return true;
  5061. }
  5062. // Release of the SSL pipe
  5063. void FreeSslPipe(SSL_PIPE *s)
  5064. {
  5065. // Validate arguments
  5066. if (s == NULL)
  5067. {
  5068. return;
  5069. }
  5070. FreeSslBio(s->SslInOut);
  5071. FreeSslBio(s->RawIn);
  5072. FreeSslBio(s->RawOut);
  5073. SSL_free(s->ssl);
  5074. SSL_CTX_free(s->ssl_ctx);
  5075. Free(s);
  5076. }
  5077. // Release of the SSL BIO
  5078. void FreeSslBio(SSL_BIO *b)
  5079. {
  5080. // Validate arguments
  5081. if (b == NULL)
  5082. {
  5083. return;
  5084. }
  5085. if (b->NoFree == false)
  5086. {
  5087. BIO_free(b->bio);
  5088. }
  5089. ReleaseFifo(b->RecvFifo);
  5090. ReleaseFifo(b->SendFifo);
  5091. Free(b);
  5092. }
  5093. // Create a new SSL BIO (SSL)
  5094. SSL_BIO *NewSslBioSsl()
  5095. {
  5096. SSL_BIO *b = ZeroMalloc(sizeof(SSL_BIO));
  5097. b->bio = BIO_new(BIO_f_ssl());
  5098. b->RecvFifo = NewFifo();
  5099. b->SendFifo = NewFifo();
  5100. return b;
  5101. }
  5102. // Create a new SSL BIO (memory)
  5103. SSL_BIO *NewSslBioMem()
  5104. {
  5105. SSL_BIO *b = ZeroMalloc(sizeof(SSL_BIO));
  5106. b->bio = BIO_new(BIO_s_mem());
  5107. b->RecvFifo = NewFifo();
  5108. b->SendFifo = NewFifo();
  5109. return b;
  5110. }
  5111. // Synchronize memory contents of the SSL BIO with the FIFO
  5112. bool SslBioSync(SSL_BIO *b, bool sync_send, bool sync_recv)
  5113. {
  5114. // Validate arguments
  5115. if (b == NULL)
  5116. {
  5117. return false;
  5118. }
  5119. if (b->IsDisconnected)
  5120. {
  5121. return false;
  5122. }
  5123. // Write the contents of the SendFifo to the BIO
  5124. if (sync_send)
  5125. {
  5126. while (b->SendFifo->size >= 1)
  5127. {
  5128. int r = BIO_write(b->bio, GetFifoPointer(b->SendFifo), FifoSize(b->SendFifo));
  5129. if (r == 0)
  5130. {
  5131. b->IsDisconnected = true;
  5132. WHERE;
  5133. return false;
  5134. }
  5135. else
  5136. {
  5137. if (r < 0)
  5138. {
  5139. if (BIO_should_retry(b->bio))
  5140. {
  5141. break;
  5142. }
  5143. else
  5144. {
  5145. b->IsDisconnected = true;
  5146. WHERE;
  5147. return false;
  5148. }
  5149. }
  5150. else
  5151. {
  5152. ReadFifo(b->SendFifo, NULL, (UINT)r);
  5153. }
  5154. }
  5155. }
  5156. }
  5157. // Save to the RecvFifo by reading from the BIO
  5158. if (sync_recv)
  5159. {
  5160. while (true)
  5161. {
  5162. UCHAR tmp[4096];
  5163. int r;
  5164. r = BIO_read(b->bio, tmp, sizeof(tmp));
  5165. if (r == 0)
  5166. {
  5167. b->IsDisconnected = true;
  5168. WHERE;
  5169. return false;
  5170. }
  5171. else
  5172. {
  5173. if (r < 0)
  5174. {
  5175. if (BIO_should_retry(b->bio))
  5176. {
  5177. break;
  5178. }
  5179. else
  5180. {
  5181. b->IsDisconnected = true;
  5182. WHERE;
  5183. Debug("OpenSSL Error: %s\n", ERR_error_string(ERR_peek_last_error(), NULL));
  5184. return false;
  5185. }
  5186. }
  5187. else
  5188. {
  5189. WriteFifo(b->RecvFifo, tmp, (UINT)r);
  5190. }
  5191. }
  5192. }
  5193. }
  5194. return true;
  5195. }
  5196. // Release the memory for the return value of the ICMP API
  5197. void IcmpApiFreeResult(ICMP_RESULT *ret)
  5198. {
  5199. // Validate arguments
  5200. if (ret == NULL)
  5201. {
  5202. return;
  5203. }
  5204. if (ret->Data != NULL)
  5205. {
  5206. Free(ret->Data);
  5207. }
  5208. Free(ret);
  5209. }
  5210. // Send an ICMP Echo using ICMP API
  5211. ICMP_RESULT *IcmpApiEchoSend(IP *dest_ip, UCHAR ttl, UCHAR *data, UINT size, UINT timeout)
  5212. {
  5213. #ifdef OS_WIN32
  5214. // Validate arguments
  5215. if (dest_ip == NULL || IsIP4(dest_ip) == false || (size != 0 && data == NULL))
  5216. {
  5217. return NULL;
  5218. }
  5219. if (ttl == 0)
  5220. {
  5221. ttl = 127;
  5222. }
  5223. if (IsIcmpApiSupported())
  5224. {
  5225. HANDLE h;
  5226. DWORD dw;
  5227. IPAddr dest_addr;
  5228. UINT reply_size;
  5229. ICMP_ECHO_REPLY *reply;
  5230. ICMP_RESULT *ret = NULL;
  5231. IP_OPTION_INFORMATION opt;
  5232. h = w32net->IcmpCreateFile();
  5233. if (h == INVALID_HANDLE_VALUE)
  5234. {
  5235. return NULL;
  5236. }
  5237. Zero(&opt, sizeof(opt));
  5238. opt.Ttl = ttl;
  5239. IPToInAddr((struct in_addr *)&dest_addr, dest_ip);
  5240. reply_size = sizeof(*reply) + size + 64;
  5241. reply = ZeroMalloc(reply_size);
  5242. dw = w32net->IcmpSendEcho(h, dest_addr, data, size, &opt, reply, reply_size, timeout);
  5243. ret = ZeroMalloc(sizeof(ICMP_RESULT));
  5244. if (dw >= 1 && reply->Status == IP_SUCCESS)
  5245. {
  5246. ret->Ok = true;
  5247. }
  5248. else
  5249. {
  5250. switch (reply->Status)
  5251. {
  5252. case IP_DEST_NET_UNREACHABLE:
  5253. ret->Type = ICMP_TYPE_DESTINATION_UNREACHABLE;
  5254. ret->Code = ICMP_CODE_NET_UNREACHABLE;
  5255. break;
  5256. case IP_DEST_HOST_UNREACHABLE:
  5257. ret->Type = ICMP_TYPE_DESTINATION_UNREACHABLE;
  5258. ret->Code = ICMP_CODE_HOST_UNREACHABLE;
  5259. break;
  5260. case IP_DEST_PROT_UNREACHABLE:
  5261. ret->Type = ICMP_TYPE_DESTINATION_UNREACHABLE;
  5262. ret->Code = ICMP_CODE_PROTOCOL_UNREACHABLE;
  5263. break;
  5264. case IP_DEST_PORT_UNREACHABLE:
  5265. ret->Type = ICMP_TYPE_DESTINATION_UNREACHABLE;
  5266. ret->Code = ICMP_CODE_PORT_UNREACHABLE;
  5267. break;
  5268. case IP_TTL_EXPIRED_TRANSIT:
  5269. ret->Type = ICMP_TYPE_TIME_EXCEEDED;
  5270. ret->Code = ICMP_CODE_TTL_EXCEEDED_IN_TRANSIT;
  5271. break;
  5272. case IP_TTL_EXPIRED_REASSEM:
  5273. ret->Type = ICMP_TYPE_TIME_EXCEEDED;
  5274. ret->Code = ICMP_CODE_FRAGMENT_REASSEMBLY_TIME_EXCEEDED;
  5275. break;
  5276. default:
  5277. ret->Timeout = true;
  5278. break;
  5279. }
  5280. }
  5281. if (ret->Timeout == false)
  5282. {
  5283. ret->Ttl = reply->Options.Ttl;
  5284. ret->Rtt = reply->RoundTripTime;
  5285. InAddrToIP(&ret->IpAddress, (struct in_addr *)&reply->Address);
  5286. if (reply->DataSize >= 1 && reply->Data != NULL)
  5287. {
  5288. ret->DataSize = reply->DataSize;
  5289. ret->Data = Clone(reply->Data, reply->DataSize);
  5290. }
  5291. }
  5292. Free(reply);
  5293. w32net->IcmpCloseHandle(h);
  5294. return ret;
  5295. }
  5296. else
  5297. {
  5298. return NULL;
  5299. }
  5300. #else // OS_WIN32
  5301. return NULL;
  5302. #endif // OS_WIN32
  5303. }
  5304. // Detect whether the ICMP API is supported
  5305. bool IsIcmpApiSupported()
  5306. {
  5307. #ifdef OS_WIN32
  5308. if (w32net->IcmpCloseHandle != NULL &&
  5309. w32net->IcmpCreateFile != NULL &&
  5310. w32net->IcmpSendEcho != NULL)
  5311. {
  5312. return true;
  5313. }
  5314. #endif // OS_WIN32
  5315. return false;
  5316. }
  5317. // Initialize the routing table change detector
  5318. ROUTE_CHANGE *NewRouteChange()
  5319. {
  5320. #ifdef OS_WIN32
  5321. return Win32NewRouteChange();
  5322. #else // OS_WIN32
  5323. return NULL;
  5324. #endif // OS_WIN32
  5325. }
  5326. // Release the routing table change detector
  5327. void FreeRouteChange(ROUTE_CHANGE *r)
  5328. {
  5329. #ifdef OS_WIN32
  5330. Win32FreeRouteChange(r);
  5331. #endif // OS_WIN32
  5332. }
  5333. // Get whether the routing table has been changed
  5334. bool IsRouteChanged(ROUTE_CHANGE *r)
  5335. {
  5336. #ifdef OS_WIN32
  5337. return Win32IsRouteChanged(r);
  5338. #else // OS_WIN32
  5339. return false;
  5340. #endif // OS_WIN32
  5341. }
  5342. // Routing table change detector function (Win32)
  5343. #ifdef OS_WIN32
  5344. ROUTE_CHANGE *Win32NewRouteChange()
  5345. {
  5346. ROUTE_CHANGE *r;
  5347. bool ret;
  5348. if (MsIsNt() == false)
  5349. {
  5350. return NULL;
  5351. }
  5352. if (w32net->CancelIPChangeNotify == NULL ||
  5353. w32net->NotifyRouteChange == NULL)
  5354. {
  5355. return NULL;
  5356. }
  5357. r = ZeroMalloc(sizeof(ROUTE_CHANGE));
  5358. r->Data = ZeroMalloc(sizeof(ROUTE_CHANGE_DATA));
  5359. r->Data->Overlapped.hEvent = CreateEventA(NULL, false, true, NULL);
  5360. ret = w32net->NotifyRouteChange(&r->Data->Handle, &r->Data->Overlapped);
  5361. if (!(ret == NO_ERROR || ret == WSA_IO_PENDING || WSAGetLastError() == WSA_IO_PENDING))
  5362. {
  5363. Free(r->Data);
  5364. Free(r);
  5365. return NULL;
  5366. }
  5367. return r;
  5368. }
  5369. void Win32FreeRouteChange(ROUTE_CHANGE *r)
  5370. {
  5371. // Validate arguments
  5372. if (r == NULL)
  5373. {
  5374. return;
  5375. }
  5376. w32net->CancelIPChangeNotify(&r->Data->Overlapped);
  5377. CloseHandle(r->Data->Overlapped.hEvent);
  5378. Free(r->Data);
  5379. Free(r);
  5380. }
  5381. bool Win32IsRouteChanged(ROUTE_CHANGE *r)
  5382. {
  5383. // Validate arguments
  5384. if (r == NULL)
  5385. {
  5386. return false;
  5387. }
  5388. if ((r->Data->NumCalled++) == 0)
  5389. {
  5390. return true;
  5391. }
  5392. if (WaitForSingleObject(r->Data->Overlapped.hEvent, 0) == WAIT_OBJECT_0)
  5393. {
  5394. w32net->NotifyRouteChange(&r->Data->Handle, &r->Data->Overlapped);
  5395. return true;
  5396. }
  5397. return false;
  5398. }
  5399. typedef struct WIN32_ACCEPT_CHECK_DATA
  5400. {
  5401. bool IsIPv6;
  5402. bool Rejected;
  5403. } WIN32_ACCEPT_CHECK_DATA;
  5404. // Function for determining whether accept or not in Win32
  5405. int CALLBACK Win32AcceptCheckCallback_Delay(LPWSABUF lpCallerId, LPWSABUF lpCallerData, LPQOS pQos,
  5406. LPQOS lpGQOS, LPWSABUF lpCalleeId, LPWSABUF lpCalleeData,
  5407. GROUP FAR * g, DWORD_PTR dwCallbackData)
  5408. {
  5409. return CF_DEFER;
  5410. }
  5411. int CALLBACK Win32AcceptCheckCallback(LPWSABUF lpCallerId, LPWSABUF lpCallerData, LPQOS pQos,
  5412. LPQOS lpGQOS, LPWSABUF lpCalleeId, LPWSABUF lpCalleeData,
  5413. GROUP FAR * g, DWORD_PTR dwCallbackData)
  5414. {
  5415. return CF_ACCEPT;
  5416. }
  5417. // Accept function for Win32
  5418. SOCKET Win32Accept_XP(SOCK *sock, SOCKET s, struct sockaddr *addr, int *addrlen, bool ipv6)
  5419. {
  5420. SOCKET ret;
  5421. WIN32_ACCEPT_CHECK_DATA d;
  5422. UINT err;
  5423. int initial_addrlen = *addrlen;
  5424. UINT num_error = 0;
  5425. // Validate arguments
  5426. if (s == INVALID_SOCKET)
  5427. {
  5428. return INVALID_SOCKET;
  5429. }
  5430. L_LOOP:
  5431. Zero(&d, sizeof(d));
  5432. d.IsIPv6 = ipv6;
  5433. *addrlen = initial_addrlen;
  5434. Zero(addr, initial_addrlen);
  5435. ret = WSAAccept(s, addr, addrlen, Win32AcceptCheckCallback, (DWORD_PTR)&d);
  5436. if (ret == INVALID_SOCKET)
  5437. {
  5438. err = WSAGetLastError();
  5439. num_error++;
  5440. Debug("!!! WSAAccept Error: %u rej=%u num=%u tick=%I64u\n", WSAGetLastError(), d.Rejected, num_error, Tick64());
  5441. if (d.Rejected && err == WSAECONNREFUSED)
  5442. {
  5443. goto L_LOOP;
  5444. }
  5445. if (err == WSAETIMEDOUT)
  5446. {
  5447. goto L_LOOP;
  5448. }
  5449. }
  5450. return ret;
  5451. }
  5452. // Accept function for Win32
  5453. SOCKET Win32Accept(SOCK *sock, SOCKET s, struct sockaddr *addr, int *addrlen, bool ipv6)
  5454. {
  5455. SOCKET ret;
  5456. WIN32_ACCEPT_CHECK_DATA d;
  5457. UINT err;
  5458. int initial_addrlen = *addrlen;
  5459. UINT num_error = 0;
  5460. UINT zero = 0;
  5461. UINT tmp = 0;
  5462. UINT ret_size = 0;
  5463. // Validate arguments
  5464. if (sock == NULL || s == INVALID_SOCKET)
  5465. {
  5466. return INVALID_SOCKET;
  5467. }
  5468. if (sock->hAcceptEvent == NULL)
  5469. {
  5470. sock->hAcceptEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
  5471. WSAEventSelect(s, sock->hAcceptEvent, FD_ACCEPT | FD_CLOSE);
  5472. }
  5473. L_LOOP:
  5474. if (sock->CancelAccept)
  5475. {
  5476. return INVALID_SOCKET;
  5477. }
  5478. Zero(&d, sizeof(d));
  5479. d.IsIPv6 = ipv6;
  5480. *addrlen = initial_addrlen;
  5481. Zero(addr, initial_addrlen);
  5482. ret = WSAAccept(s, addr, addrlen, Win32AcceptCheckCallback, (DWORD_PTR)&d);
  5483. if (ret == INVALID_SOCKET)
  5484. {
  5485. err = WSAGetLastError();
  5486. if (err == WSAEWOULDBLOCK)
  5487. {
  5488. //Debug("!!! WSAAccept: WSAEWOULDBLOCK\n");
  5489. UINT wait_ret = WaitForSingleObject(sock->hAcceptEvent, 1234);
  5490. if (wait_ret == WAIT_OBJECT_0 || wait_ret == WAIT_TIMEOUT)
  5491. {
  5492. goto L_LOOP;
  5493. }
  5494. Debug("!!! WaitForSingleObject Error. ret=%u GetLastError=%u\n", wait_ret, GetLastError());
  5495. }
  5496. num_error++;
  5497. Debug("!!! WSAAccept Error: %u rej=%u num=%u tick=%I64u\n", err, d.Rejected, num_error, Tick64());
  5498. if (d.Rejected && err == WSAECONNREFUSED)
  5499. {
  5500. goto L_LOOP;
  5501. }
  5502. if (err == WSAETIMEDOUT)
  5503. {
  5504. goto L_LOOP;
  5505. }
  5506. }
  5507. else
  5508. {
  5509. // Remove a new socket from the event
  5510. WSAEventSelect(ret, sock->hAcceptEvent, 0);
  5511. // Restore the new socket to synchronized
  5512. WSAIoctl(ret, FIONBIO, &zero, sizeof(zero), &tmp, sizeof(tmp), &ret_size, NULL, NULL);
  5513. }
  5514. return ret;
  5515. }
  5516. #endif // OS_WIN32
  5517. // Get whether the aquirement of the Process ID of the TCP connection succeed
  5518. bool CanGetTcpProcessId()
  5519. {
  5520. UINT i;
  5521. bool ret = false;
  5522. LIST *o = GetTcpTableList();
  5523. if (o == NULL)
  5524. {
  5525. return false;
  5526. }
  5527. for (i = 0;i < LIST_NUM(o);i++)
  5528. {
  5529. TCPTABLE *t = LIST_DATA(o, i);
  5530. if (t->ProcessId != 0)
  5531. {
  5532. ret = true;
  5533. break;
  5534. }
  5535. }
  5536. FreeTcpTableList(o);
  5537. return ret;
  5538. }
  5539. #define USE_OLD_GETIP
  5540. // Set the arp_filter in Linux
  5541. void SetLinuxArpFilter()
  5542. {
  5543. char *filename = "/proc/sys/net/ipv4/conf/all/arp_filter";
  5544. char *data = "1\n";
  5545. IO *o;
  5546. o = FileCreate(filename);
  5547. if (o == NULL)
  5548. {
  5549. return;
  5550. }
  5551. FileWrite(o, data, StrLen(data));
  5552. FileFlush(o);
  5553. FileClose(o);
  5554. }
  5555. // Determine whether the string is a IPv6 mask
  5556. bool IsIpMask6(char *str)
  5557. {
  5558. IP mask;
  5559. // Validate arguments
  5560. if (str == NULL)
  5561. {
  5562. return false;
  5563. }
  5564. return StrToMask6(&mask, str);
  5565. }
  5566. // Determine whether the string is a IPv6 address
  5567. bool IsStrIPv6Address(char *str)
  5568. {
  5569. IP ip;
  5570. // Validate arguments
  5571. if (str == NULL)
  5572. {
  5573. return false;
  5574. }
  5575. if (StrToIP6(&ip, str) == false)
  5576. {
  5577. return false;
  5578. }
  5579. return true;
  5580. }
  5581. // Convert the subnet mask to an integer
  5582. UINT SubnetMaskToInt6(IP *a)
  5583. {
  5584. UINT i;
  5585. // Validate arguments
  5586. if (IsIP6(a) == false)
  5587. {
  5588. return 0;
  5589. }
  5590. for (i = 0;i <= 128;i++)
  5591. {
  5592. IP tmp;
  5593. IntToSubnetMask6(&tmp, i);
  5594. if (CmpIpAddr(a, &tmp) == 0)
  5595. {
  5596. return i;
  5597. }
  5598. }
  5599. return 0;
  5600. }
  5601. UINT SubnetMaskToInt4(IP *a)
  5602. {
  5603. UINT i;
  5604. // Validate arguments
  5605. if (IsIP4(a) == false)
  5606. {
  5607. return 0;
  5608. }
  5609. for (i = 0;i <= 32;i++)
  5610. {
  5611. IP tmp;
  5612. IntToSubnetMask4(&tmp, i);
  5613. if (CmpIpAddr(a, &tmp) == 0)
  5614. {
  5615. return i;
  5616. }
  5617. }
  5618. return 0;
  5619. }
  5620. UINT SubnetMaskToInt(IP *a)
  5621. {
  5622. if (IsIP6(a))
  5623. {
  5624. return SubnetMaskToInt6(a);
  5625. }
  5626. else
  5627. {
  5628. return SubnetMaskToInt4(a);
  5629. }
  5630. }
  5631. // Determine whether the specified IP address is a subnet mask
  5632. bool IsSubnetMask6(IP *a)
  5633. {
  5634. UINT i;
  5635. // Validate arguments
  5636. if (IsIP6(a) == false)
  5637. {
  5638. return false;
  5639. }
  5640. for (i = 0;i <= 128;i++)
  5641. {
  5642. IP tmp;
  5643. IntToSubnetMask6(&tmp, i);
  5644. if (CmpIpAddr(a, &tmp) == 0)
  5645. {
  5646. return true;
  5647. }
  5648. }
  5649. return false;
  5650. }
  5651. // Generate a global address from the MAC address
  5652. void GenerateEui64GlobalAddress(IP *ip, IP *prefix, IP *subnet, UCHAR *mac)
  5653. {
  5654. UCHAR tmp[8];
  5655. IP a;
  5656. IP subnet_not;
  5657. IP or1, or2;
  5658. // Validate arguments
  5659. if (ip == NULL || prefix == NULL || subnet == NULL || mac == NULL)
  5660. {
  5661. return;
  5662. }
  5663. GenerateEui64Address6(tmp, mac);
  5664. ZeroIP6(&a);
  5665. Copy(&a.ipv6_addr[8], tmp, 8);
  5666. IPNot6(&subnet_not, subnet);
  5667. IPAnd6(&or1, &a, &subnet_not);
  5668. IPAnd6(&or2, prefix, subnet);
  5669. IPOr6(ip, &or1, &or2);
  5670. }
  5671. // Generate a local address from the MAC address
  5672. void GenerateEui64LocalAddress(IP *a, UCHAR *mac)
  5673. {
  5674. UCHAR tmp[8];
  5675. // Validate arguments
  5676. if (a == NULL || mac == NULL)
  5677. {
  5678. return;
  5679. }
  5680. GenerateEui64Address6(tmp, mac);
  5681. ZeroIP6(a);
  5682. a->ipv6_addr[0] = 0xfe;
  5683. a->ipv6_addr[1] = 0x80;
  5684. Copy(&a->ipv6_addr[8], tmp, 8);
  5685. }
  5686. // Generate the EUI-64 address from the MAC address
  5687. void GenerateEui64Address6(UCHAR *dst, UCHAR *mac)
  5688. {
  5689. // Validate arguments
  5690. if (dst == NULL || mac == NULL)
  5691. {
  5692. return;
  5693. }
  5694. Copy(dst, mac, 3);
  5695. Copy(dst + 5, mac, 3);
  5696. dst[3] = 0xff;
  5697. dst[4] = 0xfe;
  5698. dst[0] = ((~(dst[0] & 0x02)) & 0x02) | (dst[0] & 0xfd);
  5699. }
  5700. // Examine whether two IP addresses are in the same network
  5701. bool IsInSameNetwork6ByStr(char *ip1, char *ip2, char *subnet)
  5702. {
  5703. IP p1, p2, s;
  5704. if (StrToIP6(&p1, ip1) == false)
  5705. {
  5706. return false;
  5707. }
  5708. if (StrToIP6(&p2, ip2) == false)
  5709. {
  5710. return false;
  5711. }
  5712. if (StrToMask6(&s, subnet) == false)
  5713. {
  5714. return false;
  5715. }
  5716. return IsInSameNetwork6(&p1, &p2, &s);
  5717. }
  5718. bool IsInSameNetwork6(IP *a1, IP *a2, IP *subnet)
  5719. {
  5720. IP prefix1, prefix2;
  5721. // Validate arguments
  5722. if (IsIP6(a1) == false || IsIP6(a2) == false || IsIP6(subnet) == false)
  5723. {
  5724. return false;
  5725. }
  5726. if (a1->ipv6_scope_id != a2->ipv6_scope_id)
  5727. {
  5728. return false;
  5729. }
  5730. GetPrefixAddress6(&prefix1, a1, subnet);
  5731. GetPrefixAddress6(&prefix2, a2, subnet);
  5732. if (CmpIpAddr(&prefix1, &prefix2) == 0)
  5733. {
  5734. return true;
  5735. }
  5736. return false;
  5737. }
  5738. bool IsInSameNetwork4(IP *a1, IP *a2, IP *subnet)
  5739. {
  5740. IP net1, net2;
  5741. // Validate arguments
  5742. if (IsIP4(a1) == false || IsIP4(a2) == false || IsIP4(subnet) == false)
  5743. {
  5744. return false;
  5745. }
  5746. IPAnd4(&net1, a1, subnet);
  5747. IPAnd4(&net2, a2, subnet);
  5748. if (CmpIpAddr(&net1, &net2) == 0)
  5749. {
  5750. return true;
  5751. }
  5752. return false;
  5753. }
  5754. bool IsInSameNetwork4Standard(IP *a1, IP *a2)
  5755. {
  5756. IP subnet;
  5757. SetIP(&subnet, 255, 255, 0, 0);
  5758. return IsInSameNetwork4(a1, a2, &subnet);
  5759. }
  5760. bool IsInSameLocalNetworkToMe4(IP *a)
  5761. {
  5762. IP g1, g2;
  5763. Zero(&g1, sizeof(g1));
  5764. Zero(&g2, sizeof(g2));
  5765. GetCurrentGlobalIPGuess(&g1, false);
  5766. if (IsZeroIp(&g1) == false)
  5767. {
  5768. if (IsInSameNetwork4Standard(&g1, a))
  5769. {
  5770. return true;
  5771. }
  5772. }
  5773. if (GetCurrentGlobalIP(&g2, false))
  5774. {
  5775. if (IsInSameNetwork4Standard(&g2, a))
  5776. {
  5777. return true;
  5778. }
  5779. }
  5780. if (IsIPAddressInSameLocalNetwork(a))
  5781. {
  5782. return true;
  5783. }
  5784. return false;
  5785. }
  5786. // Check whether it is a network address prefix
  5787. bool IsNetworkAddress6(IP *ip, IP *subnet)
  5788. {
  5789. return IsNetworkPrefixAddress6(ip, subnet);
  5790. }
  5791. bool IsNetworkPrefixAddress6(IP *ip, IP *subnet)
  5792. {
  5793. IP host;
  5794. // Validate arguments
  5795. if (ip == NULL || subnet == NULL)
  5796. {
  5797. return false;
  5798. }
  5799. if (IsIP6(ip) == false || IsIP6(subnet) == false)
  5800. {
  5801. return false;
  5802. }
  5803. GetHostAddress6(&host, ip, subnet);
  5804. if (IsZeroIp(&host))
  5805. {
  5806. return true;
  5807. }
  5808. return false;
  5809. }
  5810. // Check whether the unicast address is available
  5811. bool CheckUnicastAddress(IP *ip)
  5812. {
  5813. // Validate arguments
  5814. if (ip == NULL)
  5815. {
  5816. return false;
  5817. }
  5818. if ((GetIPAddrType6(ip) & IPV6_ADDR_UNICAST) == 0)
  5819. {
  5820. return false;
  5821. }
  5822. return true;
  5823. }
  5824. // Get the host address
  5825. void GetHostAddress6(IP *dst, IP *ip, IP *subnet)
  5826. {
  5827. IP not;
  5828. // Validate arguments
  5829. if (dst == NULL || ip == NULL || subnet == NULL)
  5830. {
  5831. return;
  5832. }
  5833. IPNot6(&not, subnet);
  5834. IPAnd6(dst, ip, &not);
  5835. dst->ipv6_scope_id = ip->ipv6_scope_id;
  5836. }
  5837. // Get the prefix address
  5838. void GetPrefixAddress6(IP *dst, IP *ip, IP *subnet)
  5839. {
  5840. // Validate arguments
  5841. if (dst == NULL || ip == NULL || subnet == NULL)
  5842. {
  5843. return;
  5844. }
  5845. IPAnd6(dst, ip, subnet);
  5846. dst->ipv6_scope_id = ip->ipv6_scope_id;
  5847. }
  5848. // Get the solicited-node multicast address
  5849. void GetSoliciationMulticastAddr6(IP *dst, IP *src)
  5850. {
  5851. IP prefix;
  5852. IP mask104;
  5853. IP or1, or2;
  5854. // Validate arguments
  5855. if (dst == NULL || src == NULL)
  5856. {
  5857. return;
  5858. }
  5859. ZeroIP6(&prefix);
  5860. prefix.ipv6_addr[0] = 0xff;
  5861. prefix.ipv6_addr[1] = 0x02;
  5862. prefix.ipv6_addr[11] = 0x01;
  5863. prefix.ipv6_addr[12] = 0xff;
  5864. IntToSubnetMask6(&mask104, 104);
  5865. IPAnd6(&or1, &prefix, &mask104);
  5866. IPAnd6(&or2, src, &mask104);
  5867. IPOr6(dst, &or1, &or2);
  5868. dst->ipv6_scope_id = src->ipv6_scope_id;
  5869. }
  5870. // Generate a MAC address corresponding to the multicast address
  5871. void GenerateMulticastMacAddress6(UCHAR *mac, IP *ip)
  5872. {
  5873. // Validate arguments
  5874. if (mac == NULL)
  5875. {
  5876. return;
  5877. }
  5878. mac[0] = 0x33;
  5879. mac[1] = 0x33;
  5880. mac[2] = ip->ipv6_addr[12];
  5881. mac[3] = ip->ipv6_addr[13];
  5882. mac[4] = ip->ipv6_addr[14];
  5883. mac[5] = ip->ipv6_addr[15];
  5884. }
  5885. // Get the type of the IPv6 address
  5886. UINT GetIPv6AddrType(IPV6_ADDR *addr)
  5887. {
  5888. IP ip;
  5889. // Validate arguments
  5890. if (addr == NULL)
  5891. {
  5892. return 0;
  5893. }
  5894. IPv6AddrToIP(&ip, addr);
  5895. return GetIPAddrType6(&ip);
  5896. }
  5897. UINT GetIPAddrType6(IP *ip)
  5898. {
  5899. UINT ret = 0;
  5900. // Validate arguments
  5901. if (IsIP6(ip) == false)
  5902. {
  5903. return 0;
  5904. }
  5905. if (ip->ipv6_addr[0] == 0xff)
  5906. {
  5907. IP all_node, all_router;
  5908. GetAllNodeMulticaseAddress6(&all_node);
  5909. GetAllRouterMulticastAddress6(&all_router);
  5910. ret |= IPV6_ADDR_MULTICAST;
  5911. if (Cmp(ip->ipv6_addr, all_node.ipv6_addr, 16) == 0)
  5912. {
  5913. ret |= IPV6_ADDR_ALL_NODE_MULTICAST;
  5914. }
  5915. else if (Cmp(ip->ipv6_addr, all_router.ipv6_addr, 16) == 0)
  5916. {
  5917. ret |= IPV6_ADDR_ALL_ROUTER_MULTICAST;
  5918. }
  5919. else
  5920. {
  5921. if (ip->ipv6_addr[1] == 0x02 && ip->ipv6_addr[2] == 0 && ip->ipv6_addr[3] == 0 &&
  5922. ip->ipv6_addr[4] == 0 && ip->ipv6_addr[5] == 0 && ip->ipv6_addr[6] == 0 &&
  5923. ip->ipv6_addr[7] == 0 && ip->ipv6_addr[8] == 0 && ip->ipv6_addr[9] == 0 &&
  5924. ip->ipv6_addr[10] == 0 && ip->ipv6_addr[11] == 0x01 && ip->ipv6_addr[12] == 0xff)
  5925. {
  5926. ret |= IPV6_ADDR_SOLICIATION_MULTICAST;
  5927. }
  5928. }
  5929. }
  5930. else
  5931. {
  5932. ret |= IPV6_ADDR_UNICAST;
  5933. if (ip->ipv6_addr[0] == 0xfe && (ip->ipv6_addr[1] & 0xc0) == 0x80)
  5934. {
  5935. ret |= IPV6_ADDR_LOCAL_UNICAST;
  5936. }
  5937. else
  5938. {
  5939. ret |= IPV6_ADDR_GLOBAL_UNICAST;
  5940. if (IsZero(&ip->ipv6_addr, 16))
  5941. {
  5942. ret |= IPV6_ADDR_ZERO;
  5943. }
  5944. else
  5945. {
  5946. IP loopback;
  5947. GetLoopbackAddress6(&loopback);
  5948. if (Cmp(ip->ipv6_addr, loopback.ipv6_addr, 16) == 0)
  5949. {
  5950. ret |= IPV6_ADDR_LOOPBACK;
  5951. }
  5952. }
  5953. }
  5954. }
  5955. return ret;
  5956. }
  5957. // Address that all of the bits are set
  5958. void GetAllFilledAddress6(IP *ip)
  5959. {
  5960. UINT i;
  5961. // Validate arguments
  5962. if (ip == NULL)
  5963. {
  5964. return;
  5965. }
  5966. ZeroIP6(ip);
  5967. for (i = 0;i < 15;i++)
  5968. {
  5969. ip->ipv6_addr[i] = 0xff;
  5970. }
  5971. }
  5972. // Loopback address
  5973. void GetLoopbackAddress6(IP *ip)
  5974. {
  5975. // Validate arguments
  5976. if (ip == NULL)
  5977. {
  5978. return;
  5979. }
  5980. ZeroIP6(ip);
  5981. ip->ipv6_addr[15] = 0x01;
  5982. }
  5983. // All-nodes multicast address
  5984. void GetAllNodeMulticaseAddress6(IP *ip)
  5985. {
  5986. // Validate arguments
  5987. if (ip == NULL)
  5988. {
  5989. return;
  5990. }
  5991. ZeroIP6(ip);
  5992. ip->ipv6_addr[0] = 0xff;
  5993. ip->ipv6_addr[1] = 0x02;
  5994. ip->ipv6_addr[15] = 0x01;
  5995. }
  5996. // All-routers multicast address
  5997. void GetAllRouterMulticastAddress6(IP *ip)
  5998. {
  5999. // Validate arguments
  6000. if (ip == NULL)
  6001. {
  6002. return;
  6003. }
  6004. ZeroIP6(ip);
  6005. ip->ipv6_addr[0] = 0xff;
  6006. ip->ipv6_addr[1] = 0x02;
  6007. ip->ipv6_addr[15] = 0x02;
  6008. }
  6009. // Logical operation of the IPv4 address
  6010. void IPNot4(IP *dst, IP *a)
  6011. {
  6012. UINT i;
  6013. // Validate arguments
  6014. if (dst == NULL || a == NULL || IsIP4(a) == false)
  6015. {
  6016. Zero(dst, sizeof(IP));
  6017. return;
  6018. }
  6019. i = IPToUINT(a);
  6020. i = ~i;
  6021. UINTToIP(dst, i);
  6022. }
  6023. void IPOr4(IP *dst, IP *a, IP *b)
  6024. {
  6025. UINT i;
  6026. // Validate arguments
  6027. if (dst == NULL || a == NULL || b == NULL || IsIP4(a) == false || IsIP4(b) == false)
  6028. {
  6029. Zero(dst, sizeof(IP));
  6030. return;
  6031. }
  6032. i = IPToUINT(a) | IPToUINT(b);
  6033. UINTToIP(dst, i);
  6034. }
  6035. void IPAnd4(IP *dst, IP *a, IP *b)
  6036. {
  6037. UINT i;
  6038. // Validate arguments
  6039. if (dst == NULL || a == NULL || b == NULL || IsIP4(a) == false || IsIP4(b) == false)
  6040. {
  6041. Zero(dst, sizeof(IP));
  6042. return;
  6043. }
  6044. i = IPToUINT(a) & IPToUINT(b);
  6045. UINTToIP(dst, i);
  6046. }
  6047. // Logical operation of the IPv6 address
  6048. void IPAnd6(IP *dst, IP *a, IP *b)
  6049. {
  6050. UINT i;
  6051. // Validate arguments
  6052. if (dst == NULL || IsIP6(a) == false || IsIP6(b) == false)
  6053. {
  6054. ZeroIP6(dst);
  6055. return;
  6056. }
  6057. ZeroIP6(dst);
  6058. for (i = 0;i < 16;i++)
  6059. {
  6060. dst->ipv6_addr[i] = a->ipv6_addr[i] & b->ipv6_addr[i];
  6061. }
  6062. }
  6063. void IPOr6(IP *dst, IP *a, IP *b)
  6064. {
  6065. UINT i;
  6066. // Validate arguments
  6067. if (dst == NULL || IsIP6(a) == false || IsIP6(b) == false)
  6068. {
  6069. ZeroIP6(dst);
  6070. return;
  6071. }
  6072. ZeroIP6(dst);
  6073. for (i = 0;i < 16;i++)
  6074. {
  6075. dst->ipv6_addr[i] = a->ipv6_addr[i] | b->ipv6_addr[i];
  6076. }
  6077. }
  6078. void IPNot6(IP *dst, IP *a)
  6079. {
  6080. UINT i;
  6081. // Validate arguments
  6082. if (dst == NULL || IsIP6(a) == false)
  6083. {
  6084. ZeroIP6(dst);
  6085. return;
  6086. }
  6087. ZeroIP6(dst);
  6088. for (i = 0;i < 16;i++)
  6089. {
  6090. dst->ipv6_addr[i] = ~(a->ipv6_addr[i]);
  6091. }
  6092. }
  6093. // Creating a subnet mask
  6094. void IntToSubnetMask6(IP *ip, UINT i)
  6095. {
  6096. UINT j = i / 8;
  6097. UINT k = i % 8;
  6098. UINT z;
  6099. IP a;
  6100. ZeroIP6(&a);
  6101. for (z = 0;z < 16;z++)
  6102. {
  6103. if (z < j)
  6104. {
  6105. a.ipv6_addr[z] = 0xff;
  6106. }
  6107. else if (z == j)
  6108. {
  6109. a.ipv6_addr[z] = ~(0xff >> k);
  6110. }
  6111. }
  6112. Copy(ip, &a, sizeof(IP));
  6113. }
  6114. // Convert the IP address to a string
  6115. void IP6AddrToStr(char *str, UINT size, IPV6_ADDR *addr)
  6116. {
  6117. // Validate arguments
  6118. if (str == NULL || addr == NULL)
  6119. {
  6120. return;
  6121. }
  6122. IPToStr6Array(str, size, addr->Value);
  6123. }
  6124. void IPToStr6Array(char *str, UINT size, UCHAR *bytes)
  6125. {
  6126. IP ip;
  6127. // Validate arguments
  6128. if (str == NULL || bytes == NULL)
  6129. {
  6130. return;
  6131. }
  6132. SetIP6(&ip, bytes);
  6133. IPToStr6(str, size, &ip);
  6134. }
  6135. void IPToStr6(char *str, UINT size, IP *ip)
  6136. {
  6137. char tmp[MAX_SIZE];
  6138. IPToStr6Inner(tmp, ip);
  6139. StrCpy(str, size, tmp);
  6140. }
  6141. void IPToStr6Inner(char *str, IP *ip)
  6142. {
  6143. UINT i;
  6144. USHORT values[8];
  6145. UINT zero_started_index;
  6146. UINT max_zero_len;
  6147. UINT max_zero_start;
  6148. IP a;
  6149. // Validate arguments
  6150. if (str == NULL || ip == NULL)
  6151. {
  6152. return;
  6153. }
  6154. Copy(&a, ip, sizeof(IP));
  6155. for (i = 0;i < 8;i++)
  6156. {
  6157. Copy(&values[i], &a.ipv6_addr[i * 2], sizeof(USHORT));
  6158. values[i] = Endian16(values[i]);
  6159. }
  6160. // Search for omitable part
  6161. zero_started_index = INFINITE;
  6162. max_zero_len = 0;
  6163. max_zero_start = INFINITE;
  6164. for (i = 0;i < 9;i++)
  6165. {
  6166. USHORT v = (i != 8 ? values[i] : 1);
  6167. if (v == 0)
  6168. {
  6169. if (zero_started_index == INFINITE)
  6170. {
  6171. zero_started_index = i;
  6172. }
  6173. }
  6174. else
  6175. {
  6176. UINT zero_len;
  6177. if (zero_started_index != INFINITE)
  6178. {
  6179. zero_len = i - zero_started_index;
  6180. if (zero_len >= 2)
  6181. {
  6182. if (max_zero_len < zero_len)
  6183. {
  6184. max_zero_start = zero_started_index;
  6185. max_zero_len = zero_len;
  6186. }
  6187. }
  6188. zero_started_index = INFINITE;
  6189. }
  6190. }
  6191. }
  6192. // Format a string
  6193. StrCpy(str, 0, "");
  6194. for (i = 0;i < 8;i++)
  6195. {
  6196. char tmp[16];
  6197. ToHex(tmp, values[i]);
  6198. StrLower(tmp);
  6199. if (i == max_zero_start)
  6200. {
  6201. if (i == 0)
  6202. {
  6203. StrCat(str, 0, "::");
  6204. }
  6205. else
  6206. {
  6207. StrCat(str, 0, ":");
  6208. }
  6209. i += max_zero_len - 1;
  6210. }
  6211. else
  6212. {
  6213. StrCat(str, 0, tmp);
  6214. if (i != 7)
  6215. {
  6216. StrCat(str, 0, ":");
  6217. }
  6218. }
  6219. }
  6220. // Scope ID
  6221. if (ip->ipv6_scope_id != 0)
  6222. {
  6223. char tmp[64];
  6224. StrCat(str, 0, "%");
  6225. ToStr(tmp, ip->ipv6_scope_id);
  6226. StrCat(str, 0, tmp);
  6227. }
  6228. }
  6229. // Convert the string to an IP address
  6230. bool StrToIP6(IP *ip, char *str)
  6231. {
  6232. TOKEN_LIST *t;
  6233. char tmp[MAX_PATH];
  6234. IP a;
  6235. UINT i;
  6236. UINT scope_id = 0;
  6237. // Validate arguments
  6238. if (str == NULL || ip == NULL)
  6239. {
  6240. return false;
  6241. }
  6242. ZeroIP6(&a);
  6243. StrCpy(tmp, sizeof(tmp), str);
  6244. Trim(tmp);
  6245. if (StartWith(tmp, "[") && EndWith(tmp, "]"))
  6246. {
  6247. // If the string is enclosed in square brackets, remove brackets
  6248. StrCpyAllowOverlap(tmp, sizeof(tmp), &tmp[1]);
  6249. if (StrLen(tmp) >= 1)
  6250. {
  6251. tmp[StrLen(tmp) - 1] = 0;
  6252. }
  6253. }
  6254. // Remove the scope ID by analyzing if there is it
  6255. i = SearchStrEx(tmp, "%", 0, false);
  6256. if (i != INFINITE)
  6257. {
  6258. char ss[MAX_PATH];
  6259. StrCpy(ss, sizeof(ss), &tmp[i + 1]);
  6260. tmp[i] = 0;
  6261. Trim(tmp);
  6262. Trim(ss);
  6263. scope_id = ToInt(ss);
  6264. }
  6265. // Tokenize
  6266. t = ParseTokenWithNullStr(tmp, ":");
  6267. if (t->NumTokens >= 3 && t->NumTokens <= 8)
  6268. {
  6269. UINT i, n;
  6270. bool b = true;
  6271. UINT k = 0;
  6272. n = 0;
  6273. for (i = 0;i < t->NumTokens;i++)
  6274. {
  6275. char *str = t->Token[i];
  6276. if (i != 0 && i != (t->NumTokens - 1) && StrLen(str) == 0)
  6277. {
  6278. n++;
  6279. if (n == 1)
  6280. {
  6281. k += 2 * (8 - t->NumTokens + 1);
  6282. }
  6283. else
  6284. {
  6285. b = false;
  6286. break;
  6287. }
  6288. }
  6289. else
  6290. {
  6291. UCHAR chars[2];
  6292. if (CheckIPItemStr6(str) == false)
  6293. {
  6294. b = false;
  6295. break;
  6296. }
  6297. IPItemStrToChars6(chars, str);
  6298. a.ipv6_addr[k++] = chars[0];
  6299. a.ipv6_addr[k++] = chars[1];
  6300. }
  6301. }
  6302. if (n != 0 && n != 1)
  6303. {
  6304. b = false;
  6305. }
  6306. else if (n == 0 && t->NumTokens != 8)
  6307. {
  6308. b = false;
  6309. }
  6310. if (b == false)
  6311. {
  6312. FreeToken(t);
  6313. return false;
  6314. }
  6315. }
  6316. else
  6317. {
  6318. FreeToken(t);
  6319. return false;
  6320. }
  6321. FreeToken(t);
  6322. Copy(ip, &a, sizeof(IP));
  6323. ip->ipv6_scope_id = scope_id;
  6324. return true;
  6325. }
  6326. bool StrToIP6Addr(IPV6_ADDR *ip, char *str)
  6327. {
  6328. IP ip2;
  6329. // Validate arguments
  6330. if (ip == NULL || str == NULL)
  6331. {
  6332. Zero(ip, sizeof(IPV6_ADDR));
  6333. return false;
  6334. }
  6335. if (StrToIP6(&ip2, str) == false)
  6336. {
  6337. return false;
  6338. }
  6339. if (IPToIPv6Addr(ip, &ip2) == false)
  6340. {
  6341. return false;
  6342. }
  6343. return true;
  6344. }
  6345. // Convert an IP address character to the UCHAR type
  6346. void IPItemStrToChars6(UCHAR *chars, char *str)
  6347. {
  6348. char tmp[5];
  6349. BUF *b;
  6350. UINT len;
  6351. // Validate arguments
  6352. if (chars == NULL)
  6353. {
  6354. return;
  6355. }
  6356. Zero(tmp, sizeof(tmp));
  6357. len = StrLen(str);
  6358. switch (len)
  6359. {
  6360. case 0:
  6361. tmp[0] = tmp[1] = tmp[2] = tmp[3] = '0';
  6362. break;
  6363. case 1:
  6364. tmp[0] = tmp[1] = tmp[2] = '0';
  6365. tmp[3] = str[0];
  6366. break;
  6367. case 2:
  6368. tmp[0] = tmp[1] = '0';
  6369. tmp[2] = str[0];
  6370. tmp[3] = str[1];
  6371. break;
  6372. case 3:
  6373. tmp[0] = '0';
  6374. tmp[1] = str[0];
  6375. tmp[2] = str[1];
  6376. tmp[3] = str[2];
  6377. break;
  6378. case 4:
  6379. tmp[0] = str[0];
  6380. tmp[1] = str[1];
  6381. tmp[2] = str[2];
  6382. tmp[3] = str[3];
  6383. break;
  6384. }
  6385. b = StrToBin(tmp);
  6386. chars[0] = ((UCHAR *)b->Buf)[0];
  6387. chars[1] = ((UCHAR *)b->Buf)[1];
  6388. FreeBuf(b);
  6389. }
  6390. // Check whether invalid characters are included in the element string of the IP address
  6391. bool CheckIPItemStr6(char *str)
  6392. {
  6393. UINT i, len;
  6394. // Validate arguments
  6395. if (str == NULL)
  6396. {
  6397. return false;
  6398. }
  6399. len = StrLen(str);
  6400. if (len >= 5)
  6401. {
  6402. // Invalid length
  6403. return false;
  6404. }
  6405. for (i = 0;i < len;i++)
  6406. {
  6407. char c = str[i];
  6408. if ((c >= 'a' && c <= 'f') ||
  6409. (c >= 'A' && c <= 'F') ||
  6410. (c >= '0' && c <= '9'))
  6411. {
  6412. }
  6413. else
  6414. {
  6415. return false;
  6416. }
  6417. }
  6418. return true;
  6419. }
  6420. // Create an IPv4 address of all zero
  6421. void ZeroIP4(IP *ip)
  6422. {
  6423. // Validate arguments
  6424. if (ip == NULL)
  6425. {
  6426. return;
  6427. }
  6428. Zero(ip, sizeof(IP));
  6429. }
  6430. // Create an IPv6 address of all zero
  6431. void ZeroIP6(IP *ip)
  6432. {
  6433. // Validate arguments
  6434. if (ip == NULL)
  6435. {
  6436. return;
  6437. }
  6438. SetIP6(ip, NULL);
  6439. }
  6440. // Get the IP address of the localhost
  6441. void GetLocalHostIP6(IP *ip)
  6442. {
  6443. // Validate arguments
  6444. if (ip == NULL)
  6445. {
  6446. return;
  6447. }
  6448. ZeroIP6(ip);
  6449. ip->ipv6_addr[15] = 1;
  6450. }
  6451. void GetLocalHostIP4(IP *ip)
  6452. {
  6453. // Validate arguments
  6454. if (ip == NULL)
  6455. {
  6456. return;
  6457. }
  6458. SetIP(ip, 127, 0, 0, 1);
  6459. }
  6460. // Check whether the specified address is a localhost
  6461. bool IsLocalHostIP6(IP *ip)
  6462. {
  6463. IP local;
  6464. // Validate arguments
  6465. if (ip == NULL)
  6466. {
  6467. return false;
  6468. }
  6469. if (IsIP6(ip) == false)
  6470. {
  6471. return false;
  6472. }
  6473. GetLocalHostIP6(&local);
  6474. if (CmpIpAddr(&local, ip) == 0)
  6475. {
  6476. return true;
  6477. }
  6478. return false;
  6479. }
  6480. bool IsLocalHostIP4(IP *ip)
  6481. {
  6482. // Validate arguments
  6483. if (ip == NULL)
  6484. {
  6485. return false;
  6486. }
  6487. if (IsIP4(ip) == false)
  6488. {
  6489. return false;
  6490. }
  6491. if (ip->addr[0] == 127)
  6492. {
  6493. return true;
  6494. }
  6495. return false;
  6496. }
  6497. bool IsLocalHostIP(IP *ip)
  6498. {
  6499. // Validate arguments
  6500. if (ip == NULL)
  6501. {
  6502. return false;
  6503. }
  6504. if (IsIP4(ip))
  6505. {
  6506. return IsLocalHostIP4(ip);
  6507. }
  6508. else
  6509. {
  6510. return IsLocalHostIP6(ip);
  6511. }
  6512. }
  6513. // Convert the IPV6_ADDR to an IP
  6514. void IPv6AddrToIP(IP *ip, IPV6_ADDR *addr)
  6515. {
  6516. // Validate arguments
  6517. if (ip == NULL || addr == NULL)
  6518. {
  6519. return;
  6520. }
  6521. SetIP6(ip, addr->Value);
  6522. }
  6523. // Convert the IP to an IPV6_ADDR
  6524. bool IPToIPv6Addr(IPV6_ADDR *addr, IP *ip)
  6525. {
  6526. UINT i;
  6527. // Validate arguments
  6528. if (addr == NULL || ip == NULL)
  6529. {
  6530. Zero(addr, sizeof(IPV6_ADDR));
  6531. return false;
  6532. }
  6533. if (IsIP6(ip) == false)
  6534. {
  6535. Zero(addr, sizeof(IPV6_ADDR));
  6536. return false;
  6537. }
  6538. for (i = 0;i < 16;i++)
  6539. {
  6540. addr->Value[i] = ip->ipv6_addr[i];
  6541. }
  6542. return true;
  6543. }
  6544. // Set an IPv6 address
  6545. void SetIP6(IP *ip, UCHAR *value)
  6546. {
  6547. // Validate arguments
  6548. if (ip == NULL)
  6549. {
  6550. return;
  6551. }
  6552. Zero(ip, sizeof(IP));
  6553. ip->addr[0] = 223;
  6554. ip->addr[1] = 255;
  6555. ip->addr[2] = 255;
  6556. ip->addr[3] = 254;
  6557. if (value != NULL)
  6558. {
  6559. UINT i;
  6560. for (i = 0;i < 16;i++)
  6561. {
  6562. ip->ipv6_addr[i] = value[i];
  6563. }
  6564. }
  6565. }
  6566. // Check whether the specified address is a IPv6 address
  6567. bool IsIP6(IP *ip)
  6568. {
  6569. // Validate arguments
  6570. if (ip == NULL)
  6571. {
  6572. return false;
  6573. }
  6574. if (ip->addr[0] == 223 && ip->addr[1] == 255 && ip->addr[2] == 255 && ip->addr[3] == 254)
  6575. {
  6576. return true;
  6577. }
  6578. return false;
  6579. }
  6580. bool IsIP4(IP *ip)
  6581. {
  6582. // Validate arguments
  6583. if (ip == NULL)
  6584. {
  6585. return false;
  6586. }
  6587. return (IsIP6(ip) ? false : true);
  6588. }
  6589. // Examine whether the version of the two IP addresses are same
  6590. bool IsSameIPVer(IP *ip1, IP *ip2)
  6591. {
  6592. // Validate arguments
  6593. if (ip1 == NULL || ip2 == NULL)
  6594. {
  6595. return false;
  6596. }
  6597. if (IsIP4(ip1) && IsIP4(ip2))
  6598. {
  6599. return true;
  6600. }
  6601. if (IsIP6(ip1) && IsIP6(ip2))
  6602. {
  6603. return true;
  6604. }
  6605. return false;
  6606. }
  6607. // Copy the IP address
  6608. void CopyIP(IP *dst, IP *src)
  6609. {
  6610. Copy(dst, src, sizeof(IP));
  6611. }
  6612. // Check the length of the IPv6 subnet
  6613. bool CheckSubnetLength6(UINT i)
  6614. {
  6615. if (i >= 1 && i <= 127)
  6616. {
  6617. return true;
  6618. }
  6619. return false;
  6620. }
  6621. // Get the process ID of the corresponding TCP connection by the socket
  6622. UINT GetTcpProcessIdFromSocket(SOCK *s)
  6623. {
  6624. LIST *o;
  6625. TCPTABLE *t;
  6626. UINT pid = 0;
  6627. // Validate arguments
  6628. if (s == NULL)
  6629. {
  6630. return 0;
  6631. }
  6632. o = GetTcpTableList();
  6633. if (o == NULL)
  6634. {
  6635. return 0;
  6636. }
  6637. t = GetTcpTableFromEndPoint(o, &s->LocalIP, s->LocalPort,
  6638. &s->RemoteIP, s->RemotePort);
  6639. if (t != NULL)
  6640. {
  6641. pid = t->ProcessId;
  6642. }
  6643. FreeTcpTableList(o);
  6644. return pid;
  6645. }
  6646. UINT GetTcpProcessIdFromSocketReverse(SOCK *s)
  6647. {
  6648. LIST *o;
  6649. TCPTABLE *t;
  6650. UINT pid = 0;
  6651. // Validate arguments
  6652. if (s == NULL)
  6653. {
  6654. return 0;
  6655. }
  6656. o = GetTcpTableList();
  6657. if (o == NULL)
  6658. {
  6659. return 0;
  6660. }
  6661. t = GetTcpTableFromEndPoint(o, &s->RemoteIP, s->RemotePort,
  6662. &s->LocalIP, s->LocalPort);
  6663. if (t != NULL)
  6664. {
  6665. pid = t->ProcessId;
  6666. }
  6667. FreeTcpTableList(o);
  6668. return pid;
  6669. }
  6670. // Search in the TCP table by the end point
  6671. TCPTABLE *GetTcpTableFromEndPoint(LIST *o, IP *local_ip, UINT local_port, IP *remote_ip, UINT remote_port)
  6672. {
  6673. IP local;
  6674. UINT i;
  6675. // Validate arguments
  6676. if (o == NULL)
  6677. {
  6678. return NULL;
  6679. }
  6680. SetIP(&local, 127, 0, 0, 1);
  6681. if (local_ip == NULL)
  6682. {
  6683. local_ip = &local;
  6684. }
  6685. if (remote_ip == NULL)
  6686. {
  6687. remote_ip = &local;
  6688. }
  6689. for (i = 0;i < LIST_NUM(o);i++)
  6690. {
  6691. TCPTABLE *t = LIST_DATA(o, i);
  6692. if (t->Status == TCP_STATE_SYN_SENT || t->Status == TCP_STATE_SYN_RCVD ||
  6693. t->Status == TCP_STATE_ESTAB)
  6694. {
  6695. if (CmpIpAddr(&t->LocalIP, local_ip) == 0)
  6696. {
  6697. if (CmpIpAddr(&t->RemoteIP, remote_ip) == 0)
  6698. {
  6699. if (t->LocalPort == local_port)
  6700. {
  6701. if (t->RemotePort == remote_port)
  6702. {
  6703. return t;
  6704. }
  6705. }
  6706. }
  6707. }
  6708. }
  6709. }
  6710. return NULL;
  6711. }
  6712. // Get the TCP table list (Win32)
  6713. #ifdef OS_WIN32
  6714. LIST *Win32GetTcpTableList()
  6715. {
  6716. LIST *o;
  6717. // Windows XP SP2 or later
  6718. o = Win32GetTcpTableListByGetExtendedTcpTable();
  6719. if (o != NULL)
  6720. {
  6721. return o;
  6722. }
  6723. // Windows XP or later
  6724. o = Win32GetTcpTableListByAllocateAndGetTcpExTableFromStack();
  6725. if (o != NULL)
  6726. {
  6727. return o;
  6728. }
  6729. // For legacy Windows
  6730. return Win32GetTcpTableListByGetTcpTable();
  6731. }
  6732. // Get the TCP table list (for Windows XP SP2 or later)
  6733. LIST *Win32GetTcpTableListByGetExtendedTcpTable()
  6734. {
  6735. UINT need_size;
  6736. UINT i;
  6737. MIB_TCPTABLE_OWNER_PID *table;
  6738. bool ok = false;
  6739. LIST *o;
  6740. if (w32net->GetExtendedTcpTable == NULL)
  6741. {
  6742. return NULL;
  6743. }
  6744. for (i = 0;i < 128;i++)
  6745. {
  6746. UINT ret;
  6747. table = MallocFast(sizeof(MIB_TCPTABLE_OWNER_PID));
  6748. need_size = sizeof(MIB_TCPTABLE_OWNER_PID);
  6749. ret = w32net->GetExtendedTcpTable(table, &need_size, true, AF_INET, _TCP_TABLE_OWNER_PID_ALL, 0);
  6750. if (ret == NO_ERROR)
  6751. {
  6752. ok = true;
  6753. break;
  6754. }
  6755. else
  6756. {
  6757. Free(table);
  6758. if (ret != ERROR_INSUFFICIENT_BUFFER)
  6759. {
  6760. return NULL;
  6761. }
  6762. }
  6763. table = MallocFast(need_size);
  6764. ret = w32net->GetExtendedTcpTable(table, &need_size, true, AF_INET, _TCP_TABLE_OWNER_PID_ALL, 0);
  6765. if (ret == NO_ERROR)
  6766. {
  6767. ok = true;
  6768. break;
  6769. }
  6770. else
  6771. {
  6772. Free(table);
  6773. if (ret != ERROR_INSUFFICIENT_BUFFER)
  6774. {
  6775. return NULL;
  6776. }
  6777. }
  6778. }
  6779. if (ok == false)
  6780. {
  6781. return NULL;
  6782. }
  6783. o = NewListEx(NULL, true);
  6784. for (i = 0;i < table->dwNumEntries;i++)
  6785. {
  6786. MIB_TCPROW_OWNER_PID *r = &table->table[i];
  6787. TCPTABLE *t = ZeroMallocFast(sizeof(TCPTABLE));
  6788. UINTToIP(&t->LocalIP, r->dwLocalAddr);
  6789. t->LocalPort = Endian16((USHORT)r->dwLocalPort);
  6790. if (r->dwState != TCP_STATE_LISTEN)
  6791. {
  6792. UINTToIP(&t->RemoteIP, r->dwRemoteAddr);
  6793. t->RemotePort = Endian16((USHORT)r->dwRemotePort);
  6794. }
  6795. t->Status = r->dwState;
  6796. t->ProcessId = r->dwOwningPid;
  6797. Add(o, t);
  6798. }
  6799. Free(table);
  6800. return o;
  6801. }
  6802. // Get the TCP table list (Windows XP or later)
  6803. LIST *Win32GetTcpTableListByAllocateAndGetTcpExTableFromStack()
  6804. {
  6805. HANDLE heap;
  6806. UINT i;
  6807. MIB_TCPTABLE_OWNER_PID *table;
  6808. bool ok = false;
  6809. LIST *o;
  6810. if (w32net->AllocateAndGetTcpExTableFromStack == NULL)
  6811. {
  6812. return NULL;
  6813. }
  6814. heap = GetProcessHeap();
  6815. if (w32net->AllocateAndGetTcpExTableFromStack(&table, true, heap, HEAP_GROWABLE, AF_INET) != ERROR_SUCCESS)
  6816. {
  6817. return NULL;
  6818. }
  6819. o = NewListEx(NULL, true);
  6820. for (i = 0;i < table->dwNumEntries;i++)
  6821. {
  6822. MIB_TCPROW_OWNER_PID *r = &table->table[i];
  6823. TCPTABLE *t = ZeroMallocFast(sizeof(TCPTABLE));
  6824. UINTToIP(&t->LocalIP, r->dwLocalAddr);
  6825. t->LocalPort = Endian16((USHORT)r->dwLocalPort);
  6826. if (r->dwState != TCP_STATE_LISTEN)
  6827. {
  6828. UINTToIP(&t->RemoteIP, r->dwRemoteAddr);
  6829. t->RemotePort = Endian16((USHORT)r->dwRemotePort);
  6830. }
  6831. t->ProcessId = r->dwOwningPid;
  6832. t->Status = r->dwState;
  6833. Add(o, t);
  6834. }
  6835. HeapFree(heap, 0, table);
  6836. return o;
  6837. }
  6838. // Get the TCP table list (For legacy Windows)
  6839. LIST *Win32GetTcpTableListByGetTcpTable()
  6840. {
  6841. UINT need_size;
  6842. UINT i;
  6843. MIB_TCPTABLE *table;
  6844. bool ok = false;
  6845. LIST *o;
  6846. if (w32net->GetTcpTable == NULL)
  6847. {
  6848. return NULL;
  6849. }
  6850. for (i = 0;i < 128;i++)
  6851. {
  6852. UINT ret;
  6853. table = MallocFast(sizeof(MIB_TCPTABLE));
  6854. need_size = sizeof(MIB_TCPTABLE);
  6855. ret = w32net->GetTcpTable(table, &need_size, true);
  6856. if (ret == NO_ERROR)
  6857. {
  6858. ok = true;
  6859. break;
  6860. }
  6861. else
  6862. {
  6863. Free(table);
  6864. if (ret != ERROR_INSUFFICIENT_BUFFER)
  6865. {
  6866. return NULL;
  6867. }
  6868. }
  6869. table = MallocFast(need_size);
  6870. ret = w32net->GetTcpTable(table, &need_size, true);
  6871. if (ret == NO_ERROR)
  6872. {
  6873. ok = true;
  6874. break;
  6875. }
  6876. else
  6877. {
  6878. Free(table);
  6879. if (ret != ERROR_INSUFFICIENT_BUFFER)
  6880. {
  6881. return NULL;
  6882. }
  6883. }
  6884. }
  6885. if (ok == false)
  6886. {
  6887. return NULL;
  6888. }
  6889. o = NewListEx(NULL, true);
  6890. for (i = 0;i < table->dwNumEntries;i++)
  6891. {
  6892. MIB_TCPROW *r = &table->table[i];
  6893. TCPTABLE *t = ZeroMallocFast(sizeof(TCPTABLE));
  6894. UINTToIP(&t->LocalIP, r->dwLocalAddr);
  6895. t->LocalPort = Endian16((USHORT)r->dwLocalPort);
  6896. if (r->dwState != TCP_STATE_LISTEN)
  6897. {
  6898. UINTToIP(&t->RemoteIP, r->dwRemoteAddr);
  6899. t->RemotePort = Endian16((USHORT)r->dwRemotePort);
  6900. }
  6901. t->Status = r->dwState;
  6902. Add(o, t);
  6903. }
  6904. Free(table);
  6905. return o;
  6906. }
  6907. #endif // OS_WIN32
  6908. // Display the TCP table
  6909. void PrintTcpTableList(LIST *o)
  6910. {
  6911. UINT i;
  6912. // Validate arguments
  6913. if (o == NULL)
  6914. {
  6915. Print("o == NULL\n\n");
  6916. return;
  6917. }
  6918. Print("--- TCPTABLE: %u Entries ---\n", LIST_NUM(o));
  6919. for (i = 0;i < LIST_NUM(o);i++)
  6920. {
  6921. char tmp1[MAX_PATH], tmp2[MAX_PATH];
  6922. TCPTABLE *t = LIST_DATA(o, i);
  6923. IPToStr(tmp1, sizeof(tmp1), &t->LocalIP);
  6924. IPToStr(tmp2, sizeof(tmp2), &t->RemoteIP);
  6925. Print("%s:%u <--> %s:%u state=%u pid=%u\n",
  6926. tmp1, t->LocalPort,
  6927. tmp2, t->RemotePort,
  6928. t->Status,
  6929. t->ProcessId);
  6930. }
  6931. Print("------\n\n");
  6932. }
  6933. // Comparison of TCP table items
  6934. int CompareTcpTable(void *p1, void *p2)
  6935. {
  6936. TCPTABLE *t1, *t2;
  6937. if (p1 == NULL || p2 == NULL)
  6938. {
  6939. return 0;
  6940. }
  6941. t1 = *(TCPTABLE **)p1;
  6942. t2 = *(TCPTABLE **)p2;
  6943. if (t1 == NULL || t2 == NULL)
  6944. {
  6945. return 0;
  6946. }
  6947. return Cmp(t1, t2, sizeof(TCPTABLE));
  6948. }
  6949. // Get the TCP table list
  6950. LIST *GetTcpTableList()
  6951. {
  6952. #ifdef OS_WIN32
  6953. return Win32GetTcpTableList();
  6954. #else // OS_WIN32
  6955. return NULL;
  6956. #endif // OS_WIN32
  6957. }
  6958. // Release the TCP table list
  6959. void FreeTcpTableList(LIST *o)
  6960. {
  6961. UINT i;
  6962. // Validate arguments
  6963. if (o == NULL)
  6964. {
  6965. return;
  6966. }
  6967. for (i = 0;i < LIST_NUM(o);i++)
  6968. {
  6969. TCPTABLE *t = LIST_DATA(o, i);
  6970. Free(t);
  6971. }
  6972. ReleaseList(o);
  6973. }
  6974. // Get the number of clients connected from the specified IP address
  6975. UINT GetNumIpClient(IP *ip)
  6976. {
  6977. IP_CLIENT *c;
  6978. UINT ret = 0;
  6979. // Validate arguments
  6980. if (ip == NULL)
  6981. {
  6982. return 0;
  6983. }
  6984. LockList(ip_clients);
  6985. {
  6986. c = SearchIpClient(ip);
  6987. if (c != NULL)
  6988. {
  6989. ret = c->NumConnections;
  6990. }
  6991. }
  6992. UnlockList(ip_clients);
  6993. return ret;
  6994. }
  6995. // Add to the IP client entry
  6996. void AddIpClient(IP *ip)
  6997. {
  6998. IP_CLIENT *c;
  6999. // Validate arguments
  7000. if (ip == NULL)
  7001. {
  7002. return;
  7003. }
  7004. LockList(ip_clients);
  7005. {
  7006. c = SearchIpClient(ip);
  7007. if (c == NULL)
  7008. {
  7009. c = ZeroMallocFast(sizeof(IP_CLIENT));
  7010. Copy(&c->IpAddress, ip, sizeof(IP));
  7011. c->NumConnections = 0;
  7012. Add(ip_clients, c);
  7013. }
  7014. c->NumConnections++;
  7015. }
  7016. UnlockList(ip_clients);
  7017. //Debug("AddIpClient: %r\n", ip);
  7018. }
  7019. // Remove from the IP client list
  7020. void DelIpClient(IP *ip)
  7021. {
  7022. IP_CLIENT *c;
  7023. // Validate arguments
  7024. if (ip == NULL)
  7025. {
  7026. return;
  7027. }
  7028. LockList(ip_clients);
  7029. {
  7030. c = SearchIpClient(ip);
  7031. if (c != NULL)
  7032. {
  7033. c->NumConnections--;
  7034. if (c->NumConnections == 0)
  7035. {
  7036. Delete(ip_clients, c);
  7037. Free(c);
  7038. }
  7039. }
  7040. }
  7041. UnlockList(ip_clients);
  7042. //Debug("DelIpClient: %r\n", ip);
  7043. }
  7044. // Search for the IP client entry
  7045. IP_CLIENT *SearchIpClient(IP *ip)
  7046. {
  7047. IP_CLIENT t;
  7048. // Validate arguments
  7049. if (ip == NULL)
  7050. {
  7051. return NULL;
  7052. }
  7053. Zero(&t, sizeof(t));
  7054. Copy(&t.IpAddress, ip, sizeof(IP));
  7055. return Search(ip_clients, &t);
  7056. }
  7057. // Initialization of the client list
  7058. void InitIpClientList()
  7059. {
  7060. ip_clients = NewList(CompareIpClientList);
  7061. }
  7062. // Release of the client list
  7063. void FreeIpClientList()
  7064. {
  7065. UINT i;
  7066. for (i = 0;i < LIST_NUM(ip_clients);i++)
  7067. {
  7068. IP_CLIENT *c = LIST_DATA(ip_clients, i);
  7069. Free(c);
  7070. }
  7071. ReleaseList(ip_clients);
  7072. ip_clients = NULL;
  7073. }
  7074. // Comparison of the client list entries
  7075. int CompareIpClientList(void *p1, void *p2)
  7076. {
  7077. IP_CLIENT *c1, *c2;
  7078. if (p1 == NULL || p2 == NULL)
  7079. {
  7080. return 0;
  7081. }
  7082. c1 = *(IP_CLIENT **)p1;
  7083. c2 = *(IP_CLIENT **)p2;
  7084. if (c1 == NULL || c2 == NULL)
  7085. {
  7086. return 0;
  7087. }
  7088. return CmpIpAddr(&c1->IpAddress, &c2->IpAddress);
  7089. }
  7090. // Normalization of the MAC address
  7091. bool NormalizeMacAddress(char *dst, UINT size, char *src)
  7092. {
  7093. BUF *b;
  7094. bool ret = false;
  7095. // Validate arguments
  7096. if (dst == NULL || src == NULL)
  7097. {
  7098. return false;
  7099. }
  7100. b = StrToBin(src);
  7101. if (b != NULL && b->Size == 6)
  7102. {
  7103. ret = true;
  7104. BinToStr(dst, size, b->Buf, b->Size);
  7105. }
  7106. FreeBuf(b);
  7107. return ret;
  7108. }
  7109. // Identify whether the IP address is empty
  7110. bool IsZeroIP(IP *ip)
  7111. {
  7112. return IsZeroIp(ip);
  7113. }
  7114. bool IsZeroIp(IP *ip)
  7115. {
  7116. // Validate arguments
  7117. if (ip == NULL)
  7118. {
  7119. return true;
  7120. }
  7121. if (IsIP6(ip) == false)
  7122. {
  7123. return IsZero(ip->addr, sizeof(ip->addr));
  7124. }
  7125. else
  7126. {
  7127. return IsZero(ip->ipv6_addr, sizeof(ip->ipv6_addr));
  7128. }
  7129. }
  7130. bool IsZeroIP6Addr(IPV6_ADDR *addr)
  7131. {
  7132. // Validate arguments
  7133. if (addr == NULL)
  7134. {
  7135. return true;
  7136. }
  7137. return IsZero(addr, sizeof(IPV6_ADDR));
  7138. }
  7139. // Examine whether the specified IP address is meaningful as a host
  7140. bool IsHostIPAddress4(IP *ip)
  7141. {
  7142. UINT a;
  7143. // Validate arguments
  7144. if (ip == NULL)
  7145. {
  7146. return false;
  7147. }
  7148. a = IPToUINT(ip);
  7149. if (a == 0 || a == 0xffffffff)
  7150. {
  7151. return false;
  7152. }
  7153. return true;
  7154. }
  7155. bool IsHostIPAddress32(UINT ip)
  7156. {
  7157. IP p;
  7158. UINTToIP(&p, ip);
  7159. return IsHostIPAddress4(&p);
  7160. }
  7161. // Check whether the specified IP address and subnet mask indicates a network correctly
  7162. bool IsNetworkAddress(IP *ip, IP *mask)
  7163. {
  7164. if (IsIP4(ip))
  7165. {
  7166. return IsNetworkAddress4(ip, mask);
  7167. }
  7168. else
  7169. {
  7170. return IsNetworkAddress6(ip, mask);
  7171. }
  7172. }
  7173. bool IsNetworkAddress4(IP *ip, IP *mask)
  7174. {
  7175. UINT a, b;
  7176. // Validate arguments
  7177. if (ip == NULL || mask == NULL)
  7178. {
  7179. return false;
  7180. }
  7181. if (IsIP4(ip) == false || IsIP4(mask) == false)
  7182. {
  7183. return false;
  7184. }
  7185. if (IsSubnetMask4(mask) == false)
  7186. {
  7187. return false;
  7188. }
  7189. a = IPToUINT(ip);
  7190. b = IPToUINT(mask);
  7191. if ((a & b) == a)
  7192. {
  7193. return true;
  7194. }
  7195. return false;
  7196. }
  7197. bool IsNetworkAddress32(UINT ip, UINT mask)
  7198. {
  7199. IP a, b;
  7200. UINTToIP(&a, ip);
  7201. UINTToIP(&b, mask);
  7202. return IsNetworkAddress4(&a, &b);
  7203. }
  7204. // Convert the integer to a subnet mask
  7205. UINT IntToSubnetMask32(UINT i)
  7206. {
  7207. UINT ret = 0xFFFFFFFF;
  7208. switch (i)
  7209. {
  7210. case 0: ret = 0x00000000; break;
  7211. case 1: ret = 0x80000000; break;
  7212. case 2: ret = 0xC0000000; break;
  7213. case 3: ret = 0xE0000000; break;
  7214. case 4: ret = 0xF0000000; break;
  7215. case 5: ret = 0xF8000000; break;
  7216. case 6: ret = 0xFC000000; break;
  7217. case 7: ret = 0xFE000000; break;
  7218. case 8: ret = 0xFF000000; break;
  7219. case 9: ret = 0xFF800000; break;
  7220. case 10: ret = 0xFFC00000; break;
  7221. case 11: ret = 0xFFE00000; break;
  7222. case 12: ret = 0xFFF00000; break;
  7223. case 13: ret = 0xFFF80000; break;
  7224. case 14: ret = 0xFFFC0000; break;
  7225. case 15: ret = 0xFFFE0000; break;
  7226. case 16: ret = 0xFFFF0000; break;
  7227. case 17: ret = 0xFFFF8000; break;
  7228. case 18: ret = 0xFFFFC000; break;
  7229. case 19: ret = 0xFFFFE000; break;
  7230. case 20: ret = 0xFFFFF000; break;
  7231. case 21: ret = 0xFFFFF800; break;
  7232. case 22: ret = 0xFFFFFC00; break;
  7233. case 23: ret = 0xFFFFFE00; break;
  7234. case 24: ret = 0xFFFFFF00; break;
  7235. case 25: ret = 0xFFFFFF80; break;
  7236. case 26: ret = 0xFFFFFFC0; break;
  7237. case 27: ret = 0xFFFFFFE0; break;
  7238. case 28: ret = 0xFFFFFFF0; break;
  7239. case 29: ret = 0xFFFFFFF8; break;
  7240. case 30: ret = 0xFFFFFFFC; break;
  7241. case 31: ret = 0xFFFFFFFE; break;
  7242. case 32: ret = 0xFFFFFFFF; break;
  7243. }
  7244. if (IsLittleEndian())
  7245. {
  7246. ret = Swap32(ret);
  7247. }
  7248. return ret;
  7249. }
  7250. void IntToSubnetMask4(IP *ip, UINT i)
  7251. {
  7252. UINT m;
  7253. // Validate arguments
  7254. if (ip == NULL)
  7255. {
  7256. return;
  7257. }
  7258. m = IntToSubnetMask32(i);
  7259. UINTToIP(ip, m);
  7260. }
  7261. // Examine whether the specified IP address is a subnet mask
  7262. bool IsSubnetMask(IP *ip)
  7263. {
  7264. if (IsIP6(ip))
  7265. {
  7266. return IsSubnetMask6(ip);
  7267. }
  7268. else
  7269. {
  7270. return IsSubnetMask4(ip);
  7271. }
  7272. }
  7273. bool IsSubnetMask4(IP *ip)
  7274. {
  7275. UINT i;
  7276. // Validate arguments
  7277. if (ip == NULL)
  7278. {
  7279. return false;
  7280. }
  7281. if (IsIP6(ip))
  7282. {
  7283. return false;
  7284. }
  7285. i = IPToUINT(ip);
  7286. if (IsLittleEndian())
  7287. {
  7288. i = Swap32(i);
  7289. }
  7290. switch (i)
  7291. {
  7292. case 0x00000000:
  7293. case 0x80000000:
  7294. case 0xC0000000:
  7295. case 0xE0000000:
  7296. case 0xF0000000:
  7297. case 0xF8000000:
  7298. case 0xFC000000:
  7299. case 0xFE000000:
  7300. case 0xFF000000:
  7301. case 0xFF800000:
  7302. case 0xFFC00000:
  7303. case 0xFFE00000:
  7304. case 0xFFF00000:
  7305. case 0xFFF80000:
  7306. case 0xFFFC0000:
  7307. case 0xFFFE0000:
  7308. case 0xFFFF0000:
  7309. case 0xFFFF8000:
  7310. case 0xFFFFC000:
  7311. case 0xFFFFE000:
  7312. case 0xFFFFF000:
  7313. case 0xFFFFF800:
  7314. case 0xFFFFFC00:
  7315. case 0xFFFFFE00:
  7316. case 0xFFFFFF00:
  7317. case 0xFFFFFF80:
  7318. case 0xFFFFFFC0:
  7319. case 0xFFFFFFE0:
  7320. case 0xFFFFFFF0:
  7321. case 0xFFFFFFF8:
  7322. case 0xFFFFFFFC:
  7323. case 0xFFFFFFFE:
  7324. case 0xFFFFFFFF:
  7325. return true;
  7326. }
  7327. return false;
  7328. }
  7329. bool IsSubnetMask32(UINT ip)
  7330. {
  7331. IP p;
  7332. UINTToIP(&p, ip);
  7333. return IsSubnetMask4(&p);
  7334. }
  7335. // Network release mode
  7336. void SetNetworkReleaseMode()
  7337. {
  7338. NetworkReleaseMode = true;
  7339. }
  7340. #ifdef OS_UNIX // Code for UNIX
  7341. // Turn on and off the non-blocking mode of the socket
  7342. void UnixSetSocketNonBlockingMode(int fd, bool nonblock)
  7343. {
  7344. UINT flag = 0;
  7345. // Validate arguments
  7346. if (fd == INVALID_SOCKET)
  7347. {
  7348. return;
  7349. }
  7350. if (nonblock)
  7351. {
  7352. flag = 1;
  7353. }
  7354. #ifdef FIONBIO
  7355. ioctl(fd, FIONBIO, &flag);
  7356. #else // FIONBIO
  7357. {
  7358. int flag = fcntl(fd, F_GETFL, 0);
  7359. if (flag != -1)
  7360. {
  7361. if (nonblock)
  7362. {
  7363. flag |= O_NONBLOCK;
  7364. }
  7365. else
  7366. {
  7367. flag = flag & ~O_NONBLOCK;
  7368. fcntl(fd, F_SETFL, flag);
  7369. }
  7370. }
  7371. }
  7372. #endif // FIONBIO
  7373. }
  7374. // Do Nothing
  7375. void UnixIpForwardRowToRouteEntry(ROUTE_ENTRY *entry, void *ip_forward_row)
  7376. {
  7377. }
  7378. // Do Nothing
  7379. void UnixRouteEntryToIpForwardRow(void *ip_forward_row, ROUTE_ENTRY *entry)
  7380. {
  7381. }
  7382. // Do Nothing
  7383. int UnixCompareRouteEntryByMetric(void *p1, void *p2)
  7384. {
  7385. return 1;
  7386. }
  7387. // Do Nothing
  7388. ROUTE_TABLE *UnixGetRouteTable()
  7389. {
  7390. ROUTE_TABLE *ret = ZeroMalloc(sizeof(ROUTE_TABLE));
  7391. ret->NumEntry = 0;
  7392. ret->Entry = ZeroMalloc(0);
  7393. return ret;
  7394. }
  7395. // Do Nothing
  7396. bool UnixAddRouteEntry(ROUTE_ENTRY *e, bool *already_exists)
  7397. {
  7398. return true;
  7399. }
  7400. // Do Nothing
  7401. void UnixDeleteRouteEntry(ROUTE_ENTRY *e)
  7402. {
  7403. return;
  7404. }
  7405. // Do Nothing
  7406. UINT UnixGetVLanInterfaceID(char *instance_name)
  7407. {
  7408. return 1;
  7409. }
  7410. // Do Nothing
  7411. char **UnixEnumVLan(char *tag_name)
  7412. {
  7413. char **list;
  7414. list = ZeroMalloc(sizeof(char *));
  7415. return list;
  7416. }
  7417. // Do Nothing
  7418. void UnixRenewDhcp()
  7419. {
  7420. }
  7421. // Get the IP address of the default DNS server
  7422. bool UnixGetDefaultDns(IP *ip)
  7423. {
  7424. BUF *b;
  7425. // Validate arguments
  7426. if (ip == NULL)
  7427. {
  7428. return false;
  7429. }
  7430. Lock(unix_dns_server_addr_lock);
  7431. {
  7432. if (IsZero(&unix_dns_server, sizeof(IP)) == false)
  7433. {
  7434. Copy(ip, &unix_dns_server, sizeof(IP));
  7435. Unlock(unix_dns_server_addr_lock);
  7436. return true;
  7437. }
  7438. ip->addr[0] = 127;
  7439. ip->addr[1] = 0;
  7440. ip->addr[2] = 0;
  7441. ip->addr[3] = 1;
  7442. b = ReadDump("/etc/resolv.conf");
  7443. if (b != NULL)
  7444. {
  7445. char *s;
  7446. bool f = false;
  7447. while ((s = CfgReadNextLine(b)) != NULL)
  7448. {
  7449. TOKEN_LIST *t = ParseToken(s, "\" \t,");
  7450. if (t->NumTokens == 2)
  7451. {
  7452. if (StrCmpi(t->Token[0], "nameserver") == 0)
  7453. {
  7454. StrToIP(ip, t->Token[1]);
  7455. f = true;
  7456. }
  7457. }
  7458. FreeToken(t);
  7459. Free(s);
  7460. if (f)
  7461. {
  7462. break;
  7463. }
  7464. }
  7465. FreeBuf(b);
  7466. }
  7467. Copy(&unix_dns_server, ip, sizeof(IP));
  7468. }
  7469. Unlock(unix_dns_server_addr_lock);
  7470. return true;
  7471. }
  7472. // Select procedure
  7473. void UnixSelect(SOCKSET *set, UINT timeout, CANCEL *c1, CANCEL *c2)
  7474. {
  7475. UINT reads[MAXIMUM_WAIT_OBJECTS];
  7476. UINT writes[MAXIMUM_WAIT_OBJECTS];
  7477. UINT num_read, num_write, i;
  7478. UINT p1, p2;
  7479. SOCK_EVENT *sock_events[MAXIMUM_WAIT_OBJECTS];
  7480. UINT num_sock_events;
  7481. SOCK *s;
  7482. UCHAR tmp[MAX_SIZE];
  7483. int ret;
  7484. bool any_of_tubes_are_readable = false;
  7485. // Initialization of array
  7486. Zero(reads, sizeof(reads));
  7487. Zero(writes, sizeof(writes));
  7488. Zero(sock_events, sizeof(sock_events));
  7489. num_read = num_write = num_sock_events = 0;
  7490. // Setting the event array
  7491. if (set != NULL)
  7492. {
  7493. for (i = 0;i < set->NumSocket;i++)
  7494. {
  7495. s = set->Sock[i];
  7496. if (s != NULL)
  7497. {
  7498. UnixInitAsyncSocket(s);
  7499. if (s->Type == SOCK_INPROC)
  7500. {
  7501. TUBE *t = s->RecvTube;
  7502. if (t != NULL)
  7503. {
  7504. reads[num_read++] = t->SockEvent->pipe_read;
  7505. sock_events[num_sock_events++] = t->SockEvent;
  7506. if (t->SockEvent->current_pipe_data != 0)
  7507. {
  7508. any_of_tubes_are_readable = true;
  7509. }
  7510. }
  7511. }
  7512. else
  7513. {
  7514. if (s->NoNeedToRead == false)
  7515. {
  7516. reads[num_read++] = s->socket;
  7517. }
  7518. }
  7519. if (s->BulkRecvTube != NULL)
  7520. {
  7521. TUBE *t = s->BulkRecvTube;
  7522. if (t != NULL)
  7523. {
  7524. reads[num_read++] = t->SockEvent->pipe_read;
  7525. sock_events[num_sock_events++] = t->SockEvent;
  7526. if (t->SockEvent->current_pipe_data != 0)
  7527. {
  7528. any_of_tubes_are_readable = true;
  7529. }
  7530. }
  7531. }
  7532. if (s->WriteBlocked)
  7533. {
  7534. writes[num_write++] = s->socket;
  7535. }
  7536. }
  7537. }
  7538. }
  7539. if (timeout == 0)
  7540. {
  7541. return;
  7542. }
  7543. p1 = p2 = -1;
  7544. if (c1 != NULL)
  7545. {
  7546. reads[num_read++] = p1 = c1->pipe_read;
  7547. if (c1->SpecialFlag)
  7548. {
  7549. if (c1->pipe_special_read2 != -1 && c1->pipe_special_read2 != 0)
  7550. {
  7551. reads[num_read++] = c1->pipe_special_read2;
  7552. }
  7553. if (c1->pipe_special_read3 != -1 && c1->pipe_special_read3 != 0)
  7554. {
  7555. reads[num_read++] = c1->pipe_special_read3;
  7556. }
  7557. }
  7558. }
  7559. if (c2 != NULL)
  7560. {
  7561. reads[num_read++] = p2 = c2->pipe_read;
  7562. if (c2->SpecialFlag)
  7563. {
  7564. if (c2->pipe_special_read2 != -1 && c2->pipe_special_read2 != 0)
  7565. {
  7566. reads[num_read++] = c2->pipe_special_read2;
  7567. }
  7568. if (c2->pipe_special_read3 != -1 && c2->pipe_special_read3 != 0)
  7569. {
  7570. reads[num_read++] = c2->pipe_special_read3;
  7571. }
  7572. }
  7573. }
  7574. // Call the select
  7575. if (any_of_tubes_are_readable == false)
  7576. {
  7577. UnixSelectInner(num_read, reads, num_write, writes, timeout);
  7578. }
  7579. // Read from the pipe
  7580. if (c1 != NULL && c1->SpecialFlag == false && p1 != -1)
  7581. {
  7582. do
  7583. {
  7584. ret = read(p1, tmp, sizeof(tmp));
  7585. }
  7586. while (ret >= 1);
  7587. }
  7588. if (c2 != NULL && c2->SpecialFlag == false && p2 != -1)
  7589. {
  7590. do
  7591. {
  7592. ret = read(p2, tmp, sizeof(tmp));
  7593. }
  7594. while (ret >= 1);
  7595. }
  7596. // Read from the pipe of sockevent
  7597. for (i = 0;i < num_sock_events;i++)
  7598. {
  7599. SOCK_EVENT *e = sock_events[i];
  7600. e->current_pipe_data = 0;
  7601. do
  7602. {
  7603. ret = read(e->pipe_read, tmp, sizeof(tmp));
  7604. }
  7605. while (ret >= 1);
  7606. }
  7607. }
  7608. // Cancel
  7609. void UnixCancel(CANCEL *c)
  7610. {
  7611. // Validate arguments
  7612. if (c == NULL)
  7613. {
  7614. return;
  7615. }
  7616. UnixWritePipe(c->pipe_write);
  7617. }
  7618. // Release of the cancel object
  7619. void UnixCleanupCancel(CANCEL *c)
  7620. {
  7621. // Validate arguments
  7622. if (c == NULL)
  7623. {
  7624. return;
  7625. }
  7626. if (c->SpecialFlag == false)
  7627. {
  7628. UnixDeletePipe(c->pipe_read, c->pipe_write);
  7629. }
  7630. Free(c);
  7631. }
  7632. // Creating a new cancel object
  7633. CANCEL *UnixNewCancel()
  7634. {
  7635. CANCEL *c = ZeroMallocFast(sizeof(CANCEL));
  7636. c->ref = NewRef();
  7637. c->SpecialFlag = false;
  7638. UnixNewPipe(&c->pipe_read, &c->pipe_write);
  7639. c->pipe_special_read2 = c->pipe_special_read3 = -1;
  7640. return c;
  7641. }
  7642. // Add the socket to the socket event
  7643. void UnixJoinSockToSockEvent(SOCK *sock, SOCK_EVENT *event)
  7644. {
  7645. // Validate arguments
  7646. if (sock == NULL || event == NULL || sock->AsyncMode)
  7647. {
  7648. return;
  7649. }
  7650. if (sock->ListenMode != false || (sock->Type == SOCK_TCP && sock->Connected == false))
  7651. {
  7652. return;
  7653. }
  7654. sock->AsyncMode = true;
  7655. LockList(event->SockList);
  7656. {
  7657. Add(event->SockList, sock);
  7658. AddRef(sock->ref);
  7659. }
  7660. UnlockList(event->SockList);
  7661. // Make the socket asynchronous mode
  7662. if (sock->Type != SOCK_INPROC)
  7663. {
  7664. UnixSetSocketNonBlockingMode(sock->socket, true);
  7665. }
  7666. // Increase the reference count of the SOCK_EVENT
  7667. AddRef(event->ref);
  7668. sock->SockEvent = event;
  7669. // Set the socket event
  7670. SetSockEvent(event);
  7671. }
  7672. // Wait for a socket event
  7673. bool UnixWaitSockEvent(SOCK_EVENT *event, UINT timeout)
  7674. {
  7675. UINT num_read, num_write;
  7676. UINT *reads, *writes;
  7677. UINT n;
  7678. char tmp[MAX_SIZE];
  7679. int readret = 0;
  7680. bool event_pipe_is_readable = false;
  7681. // Validate arguments
  7682. if (event == NULL)
  7683. {
  7684. return false;
  7685. }
  7686. LockList(event->SockList);
  7687. {
  7688. UINT i;
  7689. reads = ZeroMallocFast(sizeof(SOCK *) * (LIST_NUM(event->SockList) + 1));
  7690. num_write = 0;
  7691. num_read = 0;
  7692. for (i = 0;i < LIST_NUM(event->SockList);i++)
  7693. {
  7694. SOCK *s = LIST_DATA(event->SockList, i);
  7695. if (s->NoNeedToRead == false)
  7696. {
  7697. reads[num_read++] = s->socket;
  7698. }
  7699. if (s->WriteBlocked)
  7700. {
  7701. num_write++;
  7702. }
  7703. }
  7704. reads[num_read++] = event->pipe_read;
  7705. if (event->current_pipe_data != 0)
  7706. {
  7707. event_pipe_is_readable = true;
  7708. }
  7709. writes = ZeroMallocFast(sizeof(SOCK *) * num_write);
  7710. n = 0;
  7711. for (i = 0;i < (num_read - 1);i++)
  7712. {
  7713. SOCK *s = LIST_DATA(event->SockList, i);
  7714. if (s->WriteBlocked)
  7715. {
  7716. writes[n++] = s->socket;
  7717. }
  7718. }
  7719. }
  7720. UnlockList(event->SockList);
  7721. if (event_pipe_is_readable == false)
  7722. {
  7723. UnixSelectInner(num_read, reads, num_write, writes, timeout);
  7724. }
  7725. event->current_pipe_data = 0;
  7726. do
  7727. {
  7728. readret = read(event->pipe_read, tmp, sizeof(tmp));
  7729. }
  7730. while (readret >= 1);
  7731. Free(reads);
  7732. Free(writes);
  7733. return true;
  7734. }
  7735. // Set the socket event
  7736. void UnixSetSockEvent(SOCK_EVENT *event)
  7737. {
  7738. // Validate arguments
  7739. if (event == NULL)
  7740. {
  7741. return;
  7742. }
  7743. if (event->current_pipe_data <= 100)
  7744. {
  7745. UnixWritePipe(event->pipe_write);
  7746. event->current_pipe_data++;
  7747. }
  7748. }
  7749. // This is a helper function for select()
  7750. int safe_fd_set(int fd, fd_set* fds, int* max_fd) {
  7751. FD_SET(fd, fds);
  7752. if (fd > *max_fd) {
  7753. *max_fd = fd;
  7754. }
  7755. return 0;
  7756. }
  7757. // Execute 'select' for the socket
  7758. void UnixSelectInner(UINT num_read, UINT *reads, UINT num_write, UINT *writes, UINT timeout)
  7759. {
  7760. #ifdef UNIX_MACOS
  7761. fd_set rfds; //read descriptors
  7762. fd_set wfds; //write descriptors
  7763. int max_fd = 0; //maximum descriptor id
  7764. struct timeval tv; //timeval for timeout
  7765. #else // UNIX_MACOS
  7766. struct pollfd *p;
  7767. #endif // UNIX_MACOS
  7768. UINT num;
  7769. UINT i;
  7770. UINT n;
  7771. UINT num_read_total, num_write_total;
  7772. if (num_read != 0 && reads == NULL)
  7773. {
  7774. num_read = 0;
  7775. }
  7776. if (num_write != 0 && writes == NULL)
  7777. {
  7778. num_write = 0;
  7779. }
  7780. if (timeout == 0)
  7781. {
  7782. return;
  7783. }
  7784. num_read_total = num_write_total = 0;
  7785. for (i = 0;i < num_read;i++)
  7786. {
  7787. if (reads[i] != INVALID_SOCKET)
  7788. {
  7789. num_read_total++;
  7790. }
  7791. }
  7792. for (i = 0;i < num_write;i++)
  7793. {
  7794. if (writes[i] != INVALID_SOCKET)
  7795. {
  7796. num_write_total++;
  7797. }
  7798. }
  7799. num = num_read_total + num_write_total;
  7800. #ifdef UNIX_MACOS
  7801. FD_ZERO(&rfds); //zero out descriptor set for read descriptors
  7802. FD_ZERO(&wfds); //same for write
  7803. #else // UNIX_MACOS
  7804. p = ZeroMallocFast(sizeof(struct pollfd) * num);
  7805. #endif // UNIX_MACOS
  7806. n = 0;
  7807. for (i = 0;i < num_read;i++)
  7808. {
  7809. if (reads[i] != INVALID_SOCKET)
  7810. {
  7811. #ifdef UNIX_MACOS
  7812. safe_fd_set(reads[i], &rfds, &max_fd);
  7813. #else // UNIX_MACOS
  7814. struct pollfd *pfd = &p[n++];
  7815. pfd->fd = reads[i];
  7816. pfd->events = POLLIN | POLLPRI | POLLERR | POLLHUP;
  7817. #endif // UNIX_MACOS
  7818. }
  7819. }
  7820. for (i = 0;i < num_write;i++)
  7821. {
  7822. if (writes[i] != INVALID_SOCKET)
  7823. {
  7824. #ifdef UNIX_MACOS
  7825. safe_fd_set(writes[i], &wfds, &max_fd);
  7826. #else // UNIX_MACOS
  7827. struct pollfd *pfd = &p[n++];
  7828. pfd->fd = writes[i];
  7829. pfd->events = POLLIN | POLLPRI | POLLERR | POLLHUP | POLLOUT;
  7830. #endif // UNIX_MACOS
  7831. }
  7832. }
  7833. if (num != 0)
  7834. {
  7835. #ifdef UNIX_MACOS
  7836. tv.tv_sec = timeout / 1000;
  7837. tv.tv_usec = (timeout % 1000) * 1000l;
  7838. select(max_fd + 1, &rfds, &wfds, NULL, timeout == INFINITE ? NULL : &tv);
  7839. #else // UNIX_MACOS
  7840. poll(p, num, timeout == INFINITE ? -1 : (int)timeout);
  7841. #endif // UNIX_MACOS
  7842. }
  7843. else
  7844. {
  7845. SleepThread(timeout);
  7846. }
  7847. #ifndef UNIX_MACOS
  7848. Free(p);
  7849. #endif // not UNIX_MACOS
  7850. }
  7851. // Clean-up of the socket event
  7852. void UnixCleanupSockEvent(SOCK_EVENT *event)
  7853. {
  7854. UINT i;
  7855. // Validate arguments
  7856. if (event == NULL)
  7857. {
  7858. return;
  7859. }
  7860. for (i = 0;i < LIST_NUM(event->SockList);i++)
  7861. {
  7862. SOCK *s = LIST_DATA(event->SockList, i);
  7863. ReleaseSock(s);
  7864. }
  7865. ReleaseList(event->SockList);
  7866. UnixDeletePipe(event->pipe_read, event->pipe_write);
  7867. Free(event);
  7868. }
  7869. // Create a socket event
  7870. SOCK_EVENT *UnixNewSockEvent()
  7871. {
  7872. SOCK_EVENT *e = ZeroMallocFast(sizeof(SOCK_EVENT));
  7873. e->SockList = NewList(NULL);
  7874. e->ref = NewRef();
  7875. UnixNewPipe(&e->pipe_read, &e->pipe_write);
  7876. return e;
  7877. }
  7878. // Close the pipe
  7879. void UnixDeletePipe(int p1, int p2)
  7880. {
  7881. if (p1 != -1)
  7882. {
  7883. close(p1);
  7884. }
  7885. if (p2 != -1)
  7886. {
  7887. close(p2);
  7888. }
  7889. }
  7890. // Write to the pipe
  7891. void UnixWritePipe(int pipe_write)
  7892. {
  7893. char c = 1;
  7894. write(pipe_write, &c, 1);
  7895. }
  7896. // Create a new pipe
  7897. void UnixNewPipe(int *pipe_read, int *pipe_write)
  7898. {
  7899. int fd[2];
  7900. // Validate arguments
  7901. if (pipe_read == NULL || pipe_write == NULL)
  7902. {
  7903. return;
  7904. }
  7905. fd[0] = fd[1] = 0;
  7906. pipe(fd);
  7907. *pipe_read = fd[0];
  7908. *pipe_write = fd[1];
  7909. UnixSetSocketNonBlockingMode(*pipe_write, true);
  7910. UnixSetSocketNonBlockingMode(*pipe_read, true);
  7911. }
  7912. // Release the asynchronous socket
  7913. void UnixFreeAsyncSocket(SOCK *sock)
  7914. {
  7915. UINT p;
  7916. // Validate arguments
  7917. if (sock == NULL)
  7918. {
  7919. return;
  7920. }
  7921. Lock(sock->lock);
  7922. {
  7923. if (sock->AsyncMode == false)
  7924. {
  7925. Unlock(sock->lock);
  7926. return;
  7927. }
  7928. sock->AsyncMode = false;
  7929. // Examine whether this socket are associated to SockEvent
  7930. if (sock->SockEvent != NULL)
  7931. {
  7932. SOCK_EVENT *e = sock->SockEvent;
  7933. AddRef(e->ref);
  7934. p = e->pipe_write;
  7935. LockList(e->SockList);
  7936. {
  7937. if (Delete(e->SockList, sock))
  7938. {
  7939. ReleaseSock(sock);
  7940. }
  7941. }
  7942. UnlockList(e->SockList);
  7943. // Release the socket event
  7944. ReleaseSockEvent(sock->SockEvent);
  7945. sock->SockEvent = NULL;
  7946. SetSockEvent(e);
  7947. ReleaseSockEvent(e);
  7948. }
  7949. }
  7950. Unlock(sock->lock);
  7951. }
  7952. // Set the socket to asynchronous mode
  7953. void UnixInitAsyncSocket(SOCK *sock)
  7954. {
  7955. // Validate arguments
  7956. if (sock == NULL)
  7957. {
  7958. return;
  7959. }
  7960. if (sock->AsyncMode)
  7961. {
  7962. // The socket has been set in asynchronous mode already
  7963. return;
  7964. }
  7965. if (sock->ListenMode != false || ((sock->Type == SOCK_TCP || sock->Type == SOCK_INPROC) && sock->Connected == false))
  7966. {
  7967. return;
  7968. }
  7969. sock->AsyncMode = true;
  7970. if (sock->Type != SOCK_INPROC)
  7971. {
  7972. UnixSetSocketNonBlockingMode(sock->socket, true);
  7973. }
  7974. #if OPENSSL_VERSION_NUMBER < 0x10100000L
  7975. if (sock->ssl != NULL && sock->ssl->s3 != NULL)
  7976. {
  7977. sock->Ssl_Init_Async_SendAlert[0] = sock->ssl->s3->send_alert[0];
  7978. sock->Ssl_Init_Async_SendAlert[1] = sock->ssl->s3->send_alert[1];
  7979. }
  7980. #endif
  7981. }
  7982. // Initializing the socket library
  7983. void UnixInitSocketLibrary()
  7984. {
  7985. // Do not do anything special
  7986. }
  7987. // Release of the socket library
  7988. void UnixFreeSocketLibrary()
  7989. {
  7990. // Do not do anything special
  7991. }
  7992. #endif // OS_UNIX
  7993. #ifdef OS_WIN32 // Code for Windows
  7994. NETWORK_WIN32_FUNCTIONS *w32net;
  7995. // Comparison of IP_ADAPTER_INDEX_MAP
  7996. int CompareIpAdapterIndexMap(void *p1, void *p2)
  7997. {
  7998. IP_ADAPTER_INDEX_MAP *a1, *a2;
  7999. if (p1 == NULL || p2 == NULL)
  8000. {
  8001. return 0;
  8002. }
  8003. a1 = *(IP_ADAPTER_INDEX_MAP **)p1;
  8004. a2 = *(IP_ADAPTER_INDEX_MAP **)p2;
  8005. if (a1 == NULL || a2 == NULL)
  8006. {
  8007. return 0;
  8008. }
  8009. if (a1->Index > a2->Index)
  8010. {
  8011. return 1;
  8012. }
  8013. else if (a1->Index < a2->Index)
  8014. {
  8015. return -1;
  8016. }
  8017. else
  8018. {
  8019. return 0;
  8020. }
  8021. }
  8022. // Update the IP address of the adapter
  8023. bool Win32RenewAddressByGuid(char *guid)
  8024. {
  8025. IP_ADAPTER_INDEX_MAP a;
  8026. // Validate arguments
  8027. if (guid == NULL)
  8028. {
  8029. return false;
  8030. }
  8031. Zero(&a, sizeof(a));
  8032. if (Win32GetAdapterFromGuid(&a, guid) == false)
  8033. {
  8034. return false;
  8035. }
  8036. return Win32RenewAddress(&a);
  8037. }
  8038. bool Win32RenewAddress(void *a)
  8039. {
  8040. DWORD ret;
  8041. // Validate arguments
  8042. if (a == NULL)
  8043. {
  8044. return false;
  8045. }
  8046. if (w32net->IpRenewAddress == NULL)
  8047. {
  8048. return false;
  8049. }
  8050. ret = w32net->IpRenewAddress(a);
  8051. if (ret == NO_ERROR)
  8052. {
  8053. return true;
  8054. }
  8055. else
  8056. {
  8057. Debug("IpRenewAddress: Error: %u\n", ret);
  8058. return false;
  8059. }
  8060. }
  8061. // Release the IP address of the adapter
  8062. bool Win32ReleaseAddress(void *a)
  8063. {
  8064. DWORD ret;
  8065. // Validate arguments
  8066. if (a == NULL)
  8067. {
  8068. return false;
  8069. }
  8070. if (w32net->IpReleaseAddress == NULL)
  8071. {
  8072. return false;
  8073. }
  8074. ret = w32net->IpReleaseAddress(a);
  8075. if (ret == NO_ERROR)
  8076. {
  8077. return true;
  8078. }
  8079. else
  8080. {
  8081. Debug("IpReleaseAddress: Error: %u\n", ret);
  8082. return false;
  8083. }
  8084. }
  8085. bool Win32ReleaseAddressByGuid(char *guid)
  8086. {
  8087. IP_ADAPTER_INDEX_MAP a;
  8088. // Validate arguments
  8089. if (guid == NULL)
  8090. {
  8091. return false;
  8092. }
  8093. Zero(&a, sizeof(a));
  8094. if (Win32GetAdapterFromGuid(&a, guid) == false)
  8095. {
  8096. return false;
  8097. }
  8098. return Win32ReleaseAddress(&a);
  8099. }
  8100. void Win32ReleaseAddressByGuidExThread(THREAD *t, void *param)
  8101. {
  8102. WIN32_RELEASEADDRESS_THREAD_PARAM *p;
  8103. // Validate arguments
  8104. if (t == NULL || param == NULL)
  8105. {
  8106. return;
  8107. }
  8108. p = (WIN32_RELEASEADDRESS_THREAD_PARAM *)param;
  8109. AddRef(p->Ref);
  8110. NoticeThreadInit(t);
  8111. AddWaitThread(t);
  8112. if (p->Renew == false)
  8113. {
  8114. p->Ok = Win32ReleaseAddressByGuid(p->Guid);
  8115. }
  8116. else
  8117. {
  8118. p->Ok = Win32RenewAddressByGuid(p->Guid);
  8119. }
  8120. ReleaseWin32ReleaseAddressByGuidThreadParam(p);
  8121. DelWaitThread(t);
  8122. }
  8123. bool Win32RenewAddressByGuidEx(char *guid, UINT timeout)
  8124. {
  8125. return Win32ReleaseOrRenewAddressByGuidEx(guid, timeout, true);
  8126. }
  8127. bool Win32ReleaseAddressByGuidEx(char *guid, UINT timeout)
  8128. {
  8129. return Win32ReleaseOrRenewAddressByGuidEx(guid, timeout, false);
  8130. }
  8131. bool Win32ReleaseOrRenewAddressByGuidEx(char *guid, UINT timeout, bool renew)
  8132. {
  8133. THREAD *t;
  8134. WIN32_RELEASEADDRESS_THREAD_PARAM *p;
  8135. bool ret = false;
  8136. UINT64 start_tick = 0;
  8137. UINT64 end_tick = 0;
  8138. // Validate arguments
  8139. if (guid == NULL)
  8140. {
  8141. return false;
  8142. }
  8143. if (timeout == 0)
  8144. {
  8145. timeout = INFINITE;
  8146. }
  8147. p = ZeroMalloc(sizeof(WIN32_RELEASEADDRESS_THREAD_PARAM));
  8148. p->Ref = NewRef();
  8149. StrCpy(p->Guid, sizeof(p->Guid), guid);
  8150. p->Timeout = timeout;
  8151. p->Renew = renew;
  8152. t = NewThread(Win32ReleaseAddressByGuidExThread, p);
  8153. WaitThreadInit(t);
  8154. start_tick = Tick64();
  8155. end_tick = start_tick + (UINT64)timeout;
  8156. while (true)
  8157. {
  8158. UINT64 now = Tick64();
  8159. UINT64 remain;
  8160. UINT remain32;
  8161. if (now >= end_tick)
  8162. {
  8163. break;
  8164. }
  8165. remain = end_tick - now;
  8166. remain32 = MIN((UINT)remain, 100);
  8167. if (WaitThread(t, remain32))
  8168. {
  8169. break;
  8170. }
  8171. }
  8172. ReleaseThread(t);
  8173. if (p->Ok)
  8174. {
  8175. ret = true;
  8176. }
  8177. ReleaseWin32ReleaseAddressByGuidThreadParam(p);
  8178. return ret;
  8179. }
  8180. void ReleaseWin32ReleaseAddressByGuidThreadParam(WIN32_RELEASEADDRESS_THREAD_PARAM *p)
  8181. {
  8182. // Validate arguments
  8183. if (p == NULL)
  8184. {
  8185. return;
  8186. }
  8187. if (Release(p->Ref) == 0)
  8188. {
  8189. Free(p);
  8190. }
  8191. }
  8192. // Get the adapter by the GUID
  8193. bool Win32GetAdapterFromGuid(void *a, char *guid)
  8194. {
  8195. bool ret = false;
  8196. IP_INTERFACE_INFO *info;
  8197. UINT size;
  8198. int i;
  8199. LIST *o;
  8200. wchar_t tmp[MAX_SIZE];
  8201. // Validate arguments
  8202. if (a == NULL || guid == NULL)
  8203. {
  8204. return false;
  8205. }
  8206. if (w32net->GetInterfaceInfo == NULL)
  8207. {
  8208. return false;
  8209. }
  8210. UniFormat(tmp, sizeof(tmp), L"\\DEVICE\\TCPIP_%S", guid);
  8211. size = sizeof(IP_INTERFACE_INFO);
  8212. info = ZeroMallocFast(size);
  8213. if (w32net->GetInterfaceInfo(info, &size) == ERROR_INSUFFICIENT_BUFFER)
  8214. {
  8215. Free(info);
  8216. info = ZeroMallocFast(size);
  8217. }
  8218. if (w32net->GetInterfaceInfo(info, &size) != NO_ERROR)
  8219. {
  8220. Free(info);
  8221. return false;
  8222. }
  8223. o = NewListFast(CompareIpAdapterIndexMap);
  8224. for (i = 0;i < info->NumAdapters;i++)
  8225. {
  8226. IP_ADAPTER_INDEX_MAP *a = &info->Adapter[i];
  8227. Add(o, a);
  8228. }
  8229. Sort(o);
  8230. for (i = 0;i < (int)(LIST_NUM(o));i++)
  8231. {
  8232. IP_ADAPTER_INDEX_MAP *e = LIST_DATA(o, i);
  8233. if (UniStrCmpi(e->Name, tmp) == 0)
  8234. {
  8235. Copy(a, e, sizeof(IP_ADAPTER_INDEX_MAP));
  8236. ret = true;
  8237. break;
  8238. }
  8239. }
  8240. ReleaseList(o);
  8241. Free(info);
  8242. return ret;
  8243. }
  8244. // Test
  8245. void Win32NetworkTest()
  8246. {
  8247. IP_INTERFACE_INFO *info;
  8248. UINT size;
  8249. int i;
  8250. LIST *o;
  8251. size = sizeof(IP_INTERFACE_INFO);
  8252. info = ZeroMallocFast(size);
  8253. if (w32net->GetInterfaceInfo(info, &size) == ERROR_INSUFFICIENT_BUFFER)
  8254. {
  8255. Free(info);
  8256. info = ZeroMallocFast(size);
  8257. }
  8258. if (w32net->GetInterfaceInfo(info, &size) != NO_ERROR)
  8259. {
  8260. Free(info);
  8261. return;
  8262. }
  8263. o = NewListFast(CompareIpAdapterIndexMap);
  8264. for (i = 0;i < info->NumAdapters;i++)
  8265. {
  8266. IP_ADAPTER_INDEX_MAP *a = &info->Adapter[i];
  8267. Add(o, a);
  8268. }
  8269. Sort(o);
  8270. for (i = 0;i < (int)(LIST_NUM(o));i++)
  8271. {
  8272. IP_ADAPTER_INDEX_MAP *a = LIST_DATA(o, i);
  8273. DoNothing();
  8274. }
  8275. ReleaseList(o);
  8276. Free(info);
  8277. }
  8278. // Clear the DNS cache on Win32
  8279. void Win32FlushDnsCache()
  8280. {
  8281. Run("ipconfig.exe", "/flushdns", true, false);
  8282. }
  8283. // Update the DHCP address of the specified LAN card
  8284. void Win32RenewDhcp9x(UINT if_id)
  8285. {
  8286. IP_INTERFACE_INFO *info;
  8287. UINT size;
  8288. int i;
  8289. LIST *o;
  8290. // Validate arguments
  8291. if (if_id == 0)
  8292. {
  8293. return;
  8294. }
  8295. size = sizeof(IP_INTERFACE_INFO);
  8296. info = ZeroMallocFast(size);
  8297. if (w32net->GetInterfaceInfo(info, &size) == ERROR_INSUFFICIENT_BUFFER)
  8298. {
  8299. Free(info);
  8300. info = ZeroMallocFast(size);
  8301. }
  8302. if (w32net->GetInterfaceInfo(info, &size) != NO_ERROR)
  8303. {
  8304. Free(info);
  8305. return;
  8306. }
  8307. o = NewListFast(CompareIpAdapterIndexMap);
  8308. for (i = 0;i < info->NumAdapters;i++)
  8309. {
  8310. IP_ADAPTER_INDEX_MAP *a = &info->Adapter[i];
  8311. Add(o, a);
  8312. }
  8313. Sort(o);
  8314. for (i = 0;i < (int)(LIST_NUM(o));i++)
  8315. {
  8316. IP_ADAPTER_INDEX_MAP *a = LIST_DATA(o, i);
  8317. if (a->Index == if_id)
  8318. {
  8319. char arg[MAX_PATH];
  8320. Format(arg, sizeof(arg), "/renew %u", i);
  8321. Run("ipconfig.exe", arg, true, false);
  8322. }
  8323. }
  8324. ReleaseList(o);
  8325. Free(info);
  8326. }
  8327. // Release the DHCP address of the specified LAN card
  8328. void Win32ReleaseDhcp9x(UINT if_id, bool wait)
  8329. {
  8330. IP_INTERFACE_INFO *info;
  8331. UINT size;
  8332. int i;
  8333. LIST *o;
  8334. // Validate arguments
  8335. if (if_id == 0)
  8336. {
  8337. return;
  8338. }
  8339. size = sizeof(IP_INTERFACE_INFO);
  8340. info = ZeroMallocFast(size);
  8341. if (w32net->GetInterfaceInfo(info, &size) == ERROR_INSUFFICIENT_BUFFER)
  8342. {
  8343. Free(info);
  8344. info = ZeroMallocFast(size);
  8345. }
  8346. if (w32net->GetInterfaceInfo(info, &size) != NO_ERROR)
  8347. {
  8348. Free(info);
  8349. return;
  8350. }
  8351. o = NewListFast(CompareIpAdapterIndexMap);
  8352. for (i = 0;i < info->NumAdapters;i++)
  8353. {
  8354. IP_ADAPTER_INDEX_MAP *a = &info->Adapter[i];
  8355. Add(o, a);
  8356. }
  8357. Sort(o);
  8358. for (i = 0;i < (int)(LIST_NUM(o));i++)
  8359. {
  8360. IP_ADAPTER_INDEX_MAP *a = LIST_DATA(o, i);
  8361. if (a->Index == if_id)
  8362. {
  8363. char arg[MAX_PATH];
  8364. Format(arg, sizeof(arg), "/release %u", i);
  8365. Run("ipconfig.exe", arg, true, wait);
  8366. }
  8367. }
  8368. ReleaseList(o);
  8369. Free(info);
  8370. }
  8371. // Re-obtain an IP address from a DHCP server
  8372. void Win32RenewDhcp()
  8373. {
  8374. if (OS_IS_WINDOWS_NT(GetOsInfo()->OsType))
  8375. {
  8376. Run("ipconfig.exe", "/renew", true, false);
  8377. if (MsIsVista())
  8378. {
  8379. Run("ipconfig.exe", "/renew6", true, false);
  8380. }
  8381. else
  8382. {
  8383. Run("netsh.exe", "int ipv6 renew", true, false);
  8384. }
  8385. }
  8386. else
  8387. {
  8388. Run("ipconfig.exe", "/renew_all", true, false);
  8389. }
  8390. }
  8391. // Enumerate a list of virtual LAN cards that contains the specified string
  8392. char **Win32EnumVLan(char *tag_name)
  8393. {
  8394. MIB_IFTABLE *p;
  8395. UINT ret;
  8396. UINT size_needed;
  8397. UINT num_retry = 0;
  8398. UINT i;
  8399. LIST *o;
  8400. char **ss;
  8401. // Validate arguments
  8402. if (tag_name == 0)
  8403. {
  8404. return NULL;
  8405. }
  8406. RETRY:
  8407. p = ZeroMallocFast(sizeof(MIB_IFTABLE));
  8408. size_needed = 0;
  8409. // Examine the needed size
  8410. ret = w32net->GetIfTable(p, &size_needed, 0);
  8411. if (ret == ERROR_INSUFFICIENT_BUFFER)
  8412. {
  8413. // Re-allocate the memory block of the needed size
  8414. Free(p);
  8415. p = ZeroMallocFast(size_needed);
  8416. }
  8417. else if (ret != NO_ERROR)
  8418. {
  8419. // Acquisition failure
  8420. FAILED:
  8421. Free(p);
  8422. return NULL;
  8423. }
  8424. // Actually get
  8425. ret = w32net->GetIfTable(p, &size_needed, FALSE);
  8426. if (ret != NO_ERROR)
  8427. {
  8428. // Acquisition failure
  8429. if ((++num_retry) >= 5)
  8430. {
  8431. goto FAILED;
  8432. }
  8433. Free(p);
  8434. goto RETRY;
  8435. }
  8436. // Search
  8437. ret = 0;
  8438. o = NewListFast(CompareStr);
  8439. for (i = 0;i < p->dwNumEntries;i++)
  8440. {
  8441. MIB_IFROW *r = &p->table[i];
  8442. if (SearchStrEx(r->bDescr, tag_name, 0, false) != INFINITE)
  8443. {
  8444. char *s = CopyStr(r->bDescr);
  8445. Add(o, s);
  8446. }
  8447. }
  8448. Free(p);
  8449. // Sort
  8450. Sort(o);
  8451. // Convert to string
  8452. ss = ZeroMallocFast(sizeof(char *) * (LIST_NUM(o) + 1));
  8453. for (i = 0;i < LIST_NUM(o);i++)
  8454. {
  8455. ss[i] = LIST_DATA(o, i);
  8456. }
  8457. ss[LIST_NUM(o)] = NULL;
  8458. ReleaseList(o);
  8459. return ss;
  8460. }
  8461. // Get the ID of the virtual LAN card from the instance name of the virtual LAN card
  8462. UINT Win32GetVLanInterfaceID(char *instance_name)
  8463. {
  8464. MIB_IFTABLE *p;
  8465. UINT ret;
  8466. UINT size_needed;
  8467. UINT num_retry = 0;
  8468. UINT i;
  8469. char ps_miniport_str[MAX_SIZE];
  8470. char ps_miniport_str2[MAX_SIZE];
  8471. UINT min_len = 0x7FFFFFFF;
  8472. // Validate arguments
  8473. if (instance_name == 0)
  8474. {
  8475. return 0;
  8476. }
  8477. RETRY:
  8478. p = ZeroMallocFast(sizeof(MIB_IFTABLE));
  8479. size_needed = 0;
  8480. // Examine the needed size
  8481. ret = w32net->GetIfTable(p, &size_needed, 0);
  8482. if (ret == ERROR_INSUFFICIENT_BUFFER)
  8483. {
  8484. // Re-allocate the memory block of the needed size
  8485. Free(p);
  8486. p = ZeroMallocFast(size_needed);
  8487. }
  8488. else if (ret != NO_ERROR)
  8489. {
  8490. // Acquisition failure
  8491. FAILED:
  8492. Free(p);
  8493. Debug("******** GetIfTable Failed 1. Err = %u\n", ret);
  8494. return 0;
  8495. }
  8496. // Actually get
  8497. ret = w32net->GetIfTable(p, &size_needed, FALSE);
  8498. if (ret != NO_ERROR)
  8499. {
  8500. // Acquisition failure
  8501. if ((++num_retry) >= 5)
  8502. {
  8503. goto FAILED;
  8504. }
  8505. Free(p);
  8506. Debug("******** GetIfTable Failed 2. Err = %u\n", ret);
  8507. goto RETRY;
  8508. }
  8509. // "%s - Packet scheduler miniport"
  8510. Format(ps_miniport_str, sizeof(ps_miniport_str), "%s - ", instance_name);
  8511. Format(ps_miniport_str2, sizeof(ps_miniport_str2), "%s (Microsoft", instance_name);
  8512. // Search
  8513. ret = 0;
  8514. for (i = 0;i < p->dwNumEntries;i++)
  8515. {
  8516. MIB_IFROW *r = &p->table[i];
  8517. if (instance_name[0] != '@')
  8518. {
  8519. if (StrCmpi(r->bDescr, instance_name) == 0 || StartWith(r->bDescr, ps_miniport_str) || StartWith(r->bDescr, ps_miniport_str2))
  8520. {
  8521. UINT len = StrLen(r->bDescr);
  8522. if (len < min_len)
  8523. {
  8524. ret = r->dwIndex;
  8525. min_len = len;
  8526. }
  8527. }
  8528. }
  8529. else
  8530. {
  8531. if (SearchStrEx(r->bDescr, &instance_name[1], 0, false) != INFINITE)
  8532. {
  8533. ret = r->dwIndex;
  8534. }
  8535. }
  8536. //Debug("if[%u] (dwIndex=%u): %u, %s\n", i, r->dwIndex, r->dwType, r->bDescr);
  8537. }
  8538. Free(p);
  8539. return ret;
  8540. }
  8541. // Get the DNS suffix in another way
  8542. bool Win32GetDnsSuffix(char *domain, UINT size)
  8543. {
  8544. IP_ADAPTER_ADDRESSES_XP *info;
  8545. IP_ADAPTER_ADDRESSES_XP *cur;
  8546. UINT info_size;
  8547. bool ret = false;
  8548. // Validate arguments
  8549. ClearStr(domain, size);
  8550. if (domain == NULL)
  8551. {
  8552. return false;
  8553. }
  8554. if (w32net->GetAdaptersAddresses == NULL)
  8555. {
  8556. return false;
  8557. }
  8558. info_size = 0;
  8559. info = ZeroMalloc(sizeof(IP_ADAPTER_ADDRESSES_XP));
  8560. if (w32net->GetAdaptersAddresses(AF_INET, 0, NULL, info, &info_size) == ERROR_BUFFER_OVERFLOW)
  8561. {
  8562. Free(info);
  8563. info = ZeroMalloc(info_size);
  8564. }
  8565. if (w32net->GetAdaptersAddresses(AF_INET, 0, NULL, info, &info_size) != NO_ERROR)
  8566. {
  8567. Free(info);
  8568. return false;
  8569. }
  8570. cur = info;
  8571. while (cur != NULL)
  8572. {
  8573. if (UniIsEmptyStr(cur->DnsSuffix) == false)
  8574. {
  8575. UniToStr(domain, size, cur->DnsSuffix);
  8576. ret = true;
  8577. break;
  8578. }
  8579. cur = cur->Next;
  8580. }
  8581. Free(info);
  8582. return ret;
  8583. }
  8584. // Get the DNS server address of the default
  8585. bool Win32GetDefaultDns(IP *ip, char *domain, UINT size)
  8586. {
  8587. FIXED_INFO *info;
  8588. UINT info_size;
  8589. char *dns_name;
  8590. // Validate arguments
  8591. ClearStr(domain, size);
  8592. if (ip == NULL)
  8593. {
  8594. return false;
  8595. }
  8596. Zero(ip, sizeof(IP));
  8597. if (w32net->GetNetworkParams == NULL)
  8598. {
  8599. return false;
  8600. }
  8601. info_size = 0;
  8602. info = ZeroMallocFast(sizeof(FIXED_INFO));
  8603. if (w32net->GetNetworkParams(info, &info_size) == ERROR_BUFFER_OVERFLOW)
  8604. {
  8605. Free(info);
  8606. info = ZeroMallocFast(info_size);
  8607. }
  8608. if (w32net->GetNetworkParams(info, &info_size) != NO_ERROR)
  8609. {
  8610. Free(info);
  8611. return false;
  8612. }
  8613. if (info->DnsServerList.IpAddress.String == NULL)
  8614. {
  8615. Free(info);
  8616. return false;
  8617. }
  8618. dns_name = info->DnsServerList.IpAddress.String;
  8619. StrToIP(ip, dns_name);
  8620. if (domain != NULL)
  8621. {
  8622. StrCpy(domain, size, info->DomainName);
  8623. Trim(domain);
  8624. }
  8625. Free(info);
  8626. return true;
  8627. }
  8628. // IP conversion function for Win32
  8629. void Win32UINTToIP(IP *ip, UINT i)
  8630. {
  8631. UINTToIP(ip, i);
  8632. }
  8633. // IP conversion function for Win32
  8634. UINT Win32IPToUINT(IP *ip)
  8635. {
  8636. return IPToUINT(ip);
  8637. }
  8638. // Remove a routing entry from the routing table
  8639. void Win32DeleteRouteEntry(ROUTE_ENTRY *e)
  8640. {
  8641. MIB_IPFORWARDROW *p;
  8642. // Validate arguments
  8643. if (e == NULL)
  8644. {
  8645. return;
  8646. }
  8647. p = ZeroMallocFast(sizeof(MIB_IPFORWARDROW));
  8648. Win32RouteEntryToIpForwardRow(p, e);
  8649. // Delete
  8650. w32net->DeleteIpForwardEntry(p);
  8651. Free(p);
  8652. }
  8653. // Add a routing entry to the routing table
  8654. bool Win32AddRouteEntry(ROUTE_ENTRY *e, bool *already_exists)
  8655. {
  8656. bool ret = false;
  8657. bool dummy = false;
  8658. MIB_IPFORWARDROW *p;
  8659. UINT err = 0;
  8660. // Validate arguments
  8661. if (e == NULL)
  8662. {
  8663. return false;
  8664. }
  8665. if (already_exists == NULL)
  8666. {
  8667. already_exists = &dummy;
  8668. }
  8669. *already_exists = false;
  8670. p = ZeroMallocFast(sizeof(MIB_IPFORWARDROW));
  8671. Win32RouteEntryToIpForwardRow(p, e);
  8672. // Adding
  8673. err = w32net->CreateIpForwardEntry(p);
  8674. if (err != 0)
  8675. {
  8676. if (err == ERROR_OBJECT_ALREADY_EXISTS)
  8677. {
  8678. Debug("CreateIpForwardEntry: Already Exists\n");
  8679. *already_exists = true;
  8680. ret = true;
  8681. }
  8682. else
  8683. {
  8684. Debug("CreateIpForwardEntry Error: %u\n", err);
  8685. ret = false;
  8686. }
  8687. }
  8688. else
  8689. {
  8690. ret = true;
  8691. }
  8692. Free(p);
  8693. return ret;
  8694. }
  8695. // Get the routing table
  8696. ROUTE_TABLE *Win32GetRouteTable()
  8697. {
  8698. ROUTE_TABLE *t = ZeroMallocFast(sizeof(ROUTE_TABLE));
  8699. MIB_IPFORWARDTABLE *p;
  8700. UINT ret;
  8701. UINT size_needed;
  8702. UINT num_retry = 0;
  8703. LIST *o;
  8704. UINT i;
  8705. ROUTE_ENTRY *e;
  8706. RETRY:
  8707. p = ZeroMallocFast(sizeof(MIB_IFTABLE));
  8708. size_needed = 0;
  8709. // Examine the needed size
  8710. ret = w32net->GetIpForwardTable(p, &size_needed, 0);
  8711. if (ret == ERROR_INSUFFICIENT_BUFFER)
  8712. {
  8713. // Re-allocate the memory block of the needed size
  8714. Free(p);
  8715. p = ZeroMallocFast(size_needed);
  8716. }
  8717. else if (ret != NO_ERROR)
  8718. {
  8719. // Acquisition failure
  8720. FAILED:
  8721. Free(p);
  8722. t->Entry = MallocFast(0);
  8723. return t;
  8724. }
  8725. // Actually get
  8726. ret = w32net->GetIpForwardTable(p, &size_needed, FALSE);
  8727. if (ret != NO_ERROR)
  8728. {
  8729. // Acquisition failure
  8730. if ((++num_retry) >= 5)
  8731. {
  8732. goto FAILED;
  8733. }
  8734. Free(p);
  8735. goto RETRY;
  8736. }
  8737. // Add to the list along
  8738. o = NewListFast(Win32CompareRouteEntryByMetric);
  8739. for (i = 0;i < p->dwNumEntries;i++)
  8740. {
  8741. e = ZeroMallocFast(sizeof(ROUTE_ENTRY));
  8742. Win32IpForwardRowToRouteEntry(e, &p->table[i]);
  8743. Add(o, e);
  8744. }
  8745. Free(p);
  8746. // Sort by metric
  8747. Sort(o);
  8748. // Combine the results
  8749. t->NumEntry = LIST_NUM(o);
  8750. t->Entry = ToArrayEx(o, true);
  8751. ReleaseList(o);
  8752. return t;
  8753. }
  8754. // Sort the routing entries by metric
  8755. int Win32CompareRouteEntryByMetric(void *p1, void *p2)
  8756. {
  8757. ROUTE_ENTRY *e1, *e2;
  8758. // Validate arguments
  8759. if (p1 == NULL || p2 == NULL)
  8760. {
  8761. return 0;
  8762. }
  8763. e1 = *(ROUTE_ENTRY **)p1;
  8764. e2 = *(ROUTE_ENTRY **)p2;
  8765. if (e1 == NULL || e2 == NULL)
  8766. {
  8767. return 0;
  8768. }
  8769. if (e1->Metric > e2->Metric)
  8770. {
  8771. return 1;
  8772. }
  8773. else if (e1->Metric == e2->Metric)
  8774. {
  8775. return 0;
  8776. }
  8777. else
  8778. {
  8779. return -1;
  8780. }
  8781. }
  8782. // Convert the ROUTE_ENTRY to a MIB_IPFORWARDROW
  8783. void Win32RouteEntryToIpForwardRow(void *ip_forward_row, ROUTE_ENTRY *entry)
  8784. {
  8785. MIB_IPFORWARDROW *r;
  8786. // Validate arguments
  8787. if (entry == NULL || ip_forward_row == NULL)
  8788. {
  8789. return;
  8790. }
  8791. r = (MIB_IPFORWARDROW *)ip_forward_row;
  8792. Zero(r, sizeof(MIB_IPFORWARDROW));
  8793. // IP address
  8794. r->dwForwardDest = Win32IPToUINT(&entry->DestIP);
  8795. // Subnet mask
  8796. r->dwForwardMask = Win32IPToUINT(&entry->DestMask);
  8797. // Gateway IP address
  8798. r->dwForwardNextHop = Win32IPToUINT(&entry->GatewayIP);
  8799. // Local routing flag
  8800. if (entry->LocalRouting)
  8801. {
  8802. // Local
  8803. r->dwForwardType = 3;
  8804. }
  8805. else
  8806. {
  8807. // Remote router
  8808. r->dwForwardType = 4;
  8809. }
  8810. // Protocol
  8811. r->dwForwardProto = r->dwForwardType - 1; // Subtract by 1 in most cases
  8812. if (entry->PPPConnection)
  8813. {
  8814. // Isn't this a PPP? Danger!
  8815. r->dwForwardProto++;
  8816. }
  8817. // Metric
  8818. r->dwForwardMetric1 = entry->Metric;
  8819. if (MsIsVista() == false)
  8820. {
  8821. r->dwForwardMetric2 = r->dwForwardMetric3 = r->dwForwardMetric4 = r->dwForwardMetric5 = INFINITE;
  8822. }
  8823. else
  8824. {
  8825. r->dwForwardMetric2 = r->dwForwardMetric3 = r->dwForwardMetric4 = r->dwForwardMetric5 = 0;
  8826. r->dwForwardAge = 163240;
  8827. }
  8828. // Interface ID
  8829. r->dwForwardIfIndex = entry->InterfaceID;
  8830. Debug("Win32RouteEntryToIpForwardRow()\n");
  8831. Debug(" r->dwForwardDest=%X\n", r->dwForwardDest);
  8832. Debug(" r->dwForwardMask=%X\n", r->dwForwardMask);
  8833. Debug(" r->dwForwardNextHop=%X\n", r->dwForwardNextHop);
  8834. Debug(" r->dwForwardType=%u\n", r->dwForwardType);
  8835. Debug(" r->dwForwardProto=%u\n", r->dwForwardProto);
  8836. Debug(" r->dwForwardMetric1=%u\n", r->dwForwardMetric1);
  8837. Debug(" r->dwForwardMetric2=%u\n", r->dwForwardMetric2);
  8838. Debug(" r->dwForwardIfIndex=%u\n", r->dwForwardIfIndex);
  8839. }
  8840. // Convert the MIB_IPFORWARDROW to a ROUTE_ENTRY
  8841. void Win32IpForwardRowToRouteEntry(ROUTE_ENTRY *entry, void *ip_forward_row)
  8842. {
  8843. MIB_IPFORWARDROW *r;
  8844. // Validate arguments
  8845. if (entry == NULL || ip_forward_row == NULL)
  8846. {
  8847. return;
  8848. }
  8849. r = (MIB_IPFORWARDROW *)ip_forward_row;
  8850. Zero(entry, sizeof(ROUTE_ENTRY));
  8851. // IP address
  8852. Win32UINTToIP(&entry->DestIP, r->dwForwardDest);
  8853. // Subnet mask
  8854. Win32UINTToIP(&entry->DestMask, r->dwForwardMask);
  8855. // Gateway IP address
  8856. Win32UINTToIP(&entry->GatewayIP, r->dwForwardNextHop);
  8857. // Local routing flag
  8858. if (r->dwForwardType == 3)
  8859. {
  8860. entry->LocalRouting = true;
  8861. }
  8862. else
  8863. {
  8864. entry->LocalRouting = false;
  8865. }
  8866. if (entry->LocalRouting && r->dwForwardProto == 3)
  8867. {
  8868. // PPP. Danger!
  8869. entry->PPPConnection = true;
  8870. }
  8871. // Metric
  8872. entry->Metric = r->dwForwardMetric1;
  8873. // Interface ID
  8874. entry->InterfaceID = r->dwForwardIfIndex;
  8875. }
  8876. // Initializing the socket library
  8877. void Win32InitSocketLibrary()
  8878. {
  8879. WSADATA data;
  8880. Zero(&data, sizeof(data));
  8881. WSAStartup(MAKEWORD(2, 2), &data);
  8882. // Load the DLL functions
  8883. w32net = ZeroMalloc(sizeof(NETWORK_WIN32_FUNCTIONS));
  8884. w32net->hIpHlpApi32 = LoadLibrary("iphlpapi.dll");
  8885. w32net->hIcmp = LoadLibrary("icmp.dll");
  8886. if (w32net->hIpHlpApi32 != NULL)
  8887. {
  8888. w32net->CreateIpForwardEntry =
  8889. (DWORD (__stdcall *)(PMIB_IPFORWARDROW))
  8890. GetProcAddress(w32net->hIpHlpApi32, "CreateIpForwardEntry");
  8891. w32net->DeleteIpForwardEntry =
  8892. (DWORD (__stdcall *)(PMIB_IPFORWARDROW))
  8893. GetProcAddress(w32net->hIpHlpApi32, "DeleteIpForwardEntry");
  8894. w32net->GetIfTable =
  8895. (DWORD (__stdcall *)(PMIB_IFTABLE, PULONG, BOOL))
  8896. GetProcAddress(w32net->hIpHlpApi32, "GetIfTable");
  8897. w32net->GetIfTable2 =
  8898. (DWORD (__stdcall *)(void **))
  8899. GetProcAddress(w32net->hIpHlpApi32, "GetIfTable2");
  8900. w32net->FreeMibTable =
  8901. (void (__stdcall *)(PVOID))
  8902. GetProcAddress(w32net->hIpHlpApi32, "FreeMibTable");
  8903. w32net->GetIpForwardTable =
  8904. (DWORD (__stdcall *)(PMIB_IPFORWARDTABLE, PULONG, BOOL))
  8905. GetProcAddress(w32net->hIpHlpApi32, "GetIpForwardTable");
  8906. w32net->GetNetworkParams =
  8907. (DWORD (__stdcall *)(PFIXED_INFO,PULONG))
  8908. GetProcAddress(w32net->hIpHlpApi32, "GetNetworkParams");
  8909. w32net->GetAdaptersAddresses =
  8910. (ULONG (__stdcall *)(ULONG,ULONG,PVOID,PIP_ADAPTER_ADDRESSES,PULONG))
  8911. GetProcAddress(w32net->hIpHlpApi32, "GetAdaptersAddresses");
  8912. w32net->IpRenewAddress =
  8913. (DWORD (__stdcall *)(PIP_ADAPTER_INDEX_MAP))
  8914. GetProcAddress(w32net->hIpHlpApi32, "IpRenewAddress");
  8915. w32net->IpReleaseAddress =
  8916. (DWORD (__stdcall *)(PIP_ADAPTER_INDEX_MAP))
  8917. GetProcAddress(w32net->hIpHlpApi32, "IpReleaseAddress");
  8918. w32net->GetInterfaceInfo =
  8919. (DWORD (__stdcall *)(PIP_INTERFACE_INFO, PULONG))
  8920. GetProcAddress(w32net->hIpHlpApi32, "GetInterfaceInfo");
  8921. w32net->GetAdaptersInfo =
  8922. (DWORD (__stdcall *)(PIP_ADAPTER_INFO, PULONG))
  8923. GetProcAddress(w32net->hIpHlpApi32, "GetAdaptersInfo");
  8924. w32net->GetExtendedTcpTable =
  8925. (DWORD (__stdcall *)(PVOID,PDWORD,BOOL,ULONG,_TCP_TABLE_CLASS,ULONG))
  8926. GetProcAddress(w32net->hIpHlpApi32, "GetExtendedTcpTable");
  8927. w32net->AllocateAndGetTcpExTableFromStack =
  8928. (DWORD (__stdcall *)(PVOID *,BOOL,HANDLE,DWORD,DWORD))
  8929. GetProcAddress(w32net->hIpHlpApi32, "AllocateAndGetTcpExTableFromStack");
  8930. w32net->GetTcpTable =
  8931. (DWORD (__stdcall *)(PMIB_TCPTABLE,PDWORD,BOOL))
  8932. GetProcAddress(w32net->hIpHlpApi32, "GetTcpTable");
  8933. w32net->NotifyRouteChange =
  8934. (DWORD (__stdcall *)(PHANDLE,LPOVERLAPPED))
  8935. GetProcAddress(w32net->hIpHlpApi32, "NotifyRouteChange");
  8936. w32net->CancelIPChangeNotify =
  8937. (BOOL (__stdcall *)(LPOVERLAPPED))
  8938. GetProcAddress(w32net->hIpHlpApi32, "CancelIPChangeNotify");
  8939. w32net->NhpAllocateAndGetInterfaceInfoFromStack =
  8940. (DWORD (__stdcall *)(IP_INTERFACE_NAME_INFO **,PDWORD,BOOL,HANDLE,DWORD))
  8941. GetProcAddress(w32net->hIpHlpApi32, "NhpAllocateAndGetInterfaceInfoFromStack");
  8942. w32net->IcmpCreateFile =
  8943. (HANDLE (__stdcall *)())
  8944. GetProcAddress(w32net->hIpHlpApi32, "IcmpCreateFile");
  8945. w32net->IcmpCloseHandle =
  8946. (BOOL (__stdcall *)(HANDLE))
  8947. GetProcAddress(w32net->hIpHlpApi32, "IcmpCloseHandle");
  8948. w32net->IcmpSendEcho =
  8949. (DWORD (__stdcall *)(HANDLE,IPAddr,LPVOID,WORD,PIP_OPTION_INFORMATION,LPVOID,DWORD,DWORD))
  8950. GetProcAddress(w32net->hIpHlpApi32, "IcmpSendEcho");
  8951. }
  8952. if (w32net->hIcmp != NULL)
  8953. {
  8954. if (w32net->IcmpCreateFile == NULL || w32net->IcmpCloseHandle == NULL || w32net->IcmpSendEcho == NULL)
  8955. {
  8956. w32net->IcmpCreateFile =
  8957. (HANDLE (__stdcall *)())
  8958. GetProcAddress(w32net->hIcmp, "IcmpCreateFile");
  8959. w32net->IcmpCloseHandle =
  8960. (BOOL (__stdcall *)(HANDLE))
  8961. GetProcAddress(w32net->hIcmp, "IcmpCloseHandle");
  8962. w32net->IcmpSendEcho =
  8963. (DWORD (__stdcall *)(HANDLE,IPAddr,LPVOID,WORD,PIP_OPTION_INFORMATION,LPVOID,DWORD,DWORD))
  8964. GetProcAddress(w32net->hIcmp, "IcmpSendEcho");
  8965. }
  8966. }
  8967. if (w32net->IcmpCreateFile == NULL || w32net->IcmpCloseHandle == NULL || w32net->IcmpSendEcho == NULL)
  8968. {
  8969. w32net->IcmpCreateFile = NULL;
  8970. w32net->IcmpCloseHandle = NULL;
  8971. w32net->IcmpSendEcho = NULL;
  8972. }
  8973. }
  8974. // Release of the socket library
  8975. void Win32FreeSocketLibrary()
  8976. {
  8977. if (w32net != NULL)
  8978. {
  8979. if (w32net->hIpHlpApi32 != NULL)
  8980. {
  8981. FreeLibrary(w32net->hIpHlpApi32);
  8982. }
  8983. if (w32net->hIcmp != NULL)
  8984. {
  8985. FreeLibrary(w32net->hIcmp);
  8986. }
  8987. Free(w32net);
  8988. w32net = NULL;
  8989. }
  8990. WSACleanup();
  8991. }
  8992. // Cancel
  8993. void Win32Cancel(CANCEL *c)
  8994. {
  8995. // Validate arguments
  8996. if (c == NULL)
  8997. {
  8998. return;
  8999. }
  9000. SetEvent((HANDLE)c->hEvent);
  9001. }
  9002. // Cleanup of the cancel object
  9003. void Win32CleanupCancel(CANCEL *c)
  9004. {
  9005. // Validate arguments
  9006. if (c == NULL)
  9007. {
  9008. return;
  9009. }
  9010. if (c->SpecialFlag == false)
  9011. {
  9012. CloseHandle(c->hEvent);
  9013. }
  9014. Free(c);
  9015. }
  9016. // New cancel object
  9017. CANCEL *Win32NewCancel()
  9018. {
  9019. CANCEL *c = ZeroMallocFast(sizeof(CANCEL));
  9020. c->ref = NewRef();
  9021. c->SpecialFlag = false;
  9022. c->hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
  9023. return c;
  9024. }
  9025. // Waiting for a socket event
  9026. bool Win32WaitSockEvent(SOCK_EVENT *event, UINT timeout)
  9027. {
  9028. // Validate arguments
  9029. if (event == NULL || timeout == 0)
  9030. {
  9031. return false;
  9032. }
  9033. if (WaitForSingleObject((HANDLE)event->hEvent, timeout) == WAIT_OBJECT_0)
  9034. {
  9035. return true;
  9036. }
  9037. else
  9038. {
  9039. return false;
  9040. }
  9041. }
  9042. // Clean-up of the socket event
  9043. void Win32CleanupSockEvent(SOCK_EVENT *event)
  9044. {
  9045. // Validate arguments
  9046. if (event == NULL)
  9047. {
  9048. return;
  9049. }
  9050. CloseHandle((HANDLE)event->hEvent);
  9051. Free(event);
  9052. }
  9053. // Set of the socket event
  9054. void Win32SetSockEvent(SOCK_EVENT *event)
  9055. {
  9056. // Validate arguments
  9057. if (event == NULL)
  9058. {
  9059. return;
  9060. }
  9061. SetEvent((HANDLE)event->hEvent);
  9062. }
  9063. // Creating a socket event
  9064. SOCK_EVENT *Win32NewSockEvent()
  9065. {
  9066. SOCK_EVENT *e = ZeroMallocFast(sizeof(SOCK_EVENT));
  9067. e->ref = NewRef();
  9068. e->hEvent = (void *)CreateEvent(NULL, FALSE, FALSE, NULL);
  9069. return e;
  9070. }
  9071. // Associate the socket with socket event and set it to asynchronous mode
  9072. void Win32JoinSockToSockEvent(SOCK *sock, SOCK_EVENT *event)
  9073. {
  9074. HANDLE hEvent;
  9075. // Validate arguments
  9076. if (sock == NULL || event == NULL || sock->AsyncMode)
  9077. {
  9078. return;
  9079. }
  9080. if (sock->ListenMode != false || (sock->Type != SOCK_UDP && sock->Connected == false))
  9081. {
  9082. return;
  9083. }
  9084. sock->AsyncMode = true;
  9085. hEvent = event->hEvent;
  9086. // Association
  9087. WSAEventSelect(sock->socket, hEvent, FD_READ | FD_WRITE | FD_CLOSE);
  9088. // Increase the reference count of the SOCK_EVENT
  9089. AddRef(event->ref);
  9090. sock->SockEvent = event;
  9091. }
  9092. // Set the socket to asynchronous mode
  9093. void Win32InitAsyncSocket(SOCK *sock)
  9094. {
  9095. // Validate arguments
  9096. if (sock == NULL)
  9097. {
  9098. return;
  9099. }
  9100. if (sock->AsyncMode)
  9101. {
  9102. // This socket is already in asynchronous mode
  9103. return;
  9104. }
  9105. if (sock->ListenMode || ((sock->Type == SOCK_TCP || sock->Type == SOCK_INPROC) && sock->Connected == false))
  9106. {
  9107. return;
  9108. }
  9109. sock->AsyncMode = true;
  9110. if (sock->Type == SOCK_INPROC)
  9111. {
  9112. // Fetch the event of the TUBE
  9113. TUBE *t = sock->RecvTube;
  9114. if (t != NULL)
  9115. {
  9116. if (t->SockEvent != NULL)
  9117. {
  9118. sock->hEvent = t->SockEvent->hEvent;
  9119. }
  9120. }
  9121. }
  9122. else
  9123. {
  9124. // Creating an Event
  9125. sock->hEvent = (void *)CreateEvent(NULL, FALSE, FALSE, NULL);
  9126. // Association
  9127. WSAEventSelect(sock->socket, sock->hEvent, FD_READ | FD_WRITE | FD_CLOSE);
  9128. }
  9129. }
  9130. // Release the asynchronous socket
  9131. void Win32FreeAsyncSocket(SOCK *sock)
  9132. {
  9133. // Validate arguments
  9134. if (sock == NULL)
  9135. {
  9136. return;
  9137. }
  9138. // Asynchronous socket
  9139. if (sock->hEvent != NULL)
  9140. {
  9141. if (sock->Type != SOCK_INPROC)
  9142. {
  9143. CloseHandle((HANDLE)sock->hEvent);
  9144. }
  9145. }
  9146. sock->hEvent = NULL;
  9147. sock->AsyncMode = false;
  9148. // Socket event
  9149. if (sock->SockEvent != NULL)
  9150. {
  9151. ReleaseSockEvent(sock->SockEvent);
  9152. sock->SockEvent = NULL;
  9153. }
  9154. }
  9155. // Select function for Win32
  9156. void Win32Select(SOCKSET *set, UINT timeout, CANCEL *c1, CANCEL *c2)
  9157. {
  9158. HANDLE array[MAXIMUM_WAIT_OBJECTS];
  9159. UINT n, i;
  9160. SOCK *s;
  9161. // Initialization of array
  9162. Zero(array, sizeof(array));
  9163. n = 0;
  9164. // Setting the event array
  9165. if (set != NULL)
  9166. {
  9167. for (i = 0;i < set->NumSocket;i++)
  9168. {
  9169. s = set->Sock[i];
  9170. if (s != NULL)
  9171. {
  9172. Win32InitAsyncSocket(s);
  9173. if (s->hEvent != NULL)
  9174. {
  9175. array[n++] = (HANDLE)s->hEvent;
  9176. }
  9177. if (s->BulkRecvTube != NULL)
  9178. {
  9179. array[n++] = (HANDLE)s->BulkRecvTube->SockEvent->hEvent;
  9180. }
  9181. }
  9182. }
  9183. }
  9184. if (c1 != NULL && c1->hEvent != NULL)
  9185. {
  9186. array[n++] = c1->hEvent;
  9187. }
  9188. if (c2 != NULL && c2->hEvent != NULL)
  9189. {
  9190. array[n++] = c2->hEvent;
  9191. }
  9192. if (timeout == 0)
  9193. {
  9194. return;
  9195. }
  9196. if (n == 0)
  9197. {
  9198. // Call normal waiting function if no events to wait are registered
  9199. SleepThread(timeout);
  9200. }
  9201. else
  9202. {
  9203. // Wait for the event if events are registered at least one
  9204. if (n == 1)
  9205. {
  9206. // Calling a lightweight version If the event is only one
  9207. WaitForSingleObject(array[0], timeout);
  9208. }
  9209. else
  9210. {
  9211. // In case of multiple events
  9212. WaitForMultipleObjects(n, array, false, timeout);
  9213. }
  9214. }
  9215. }
  9216. #endif // OS_WIN32
  9217. // Check whether the IPv6 is supported
  9218. bool IsIPv6Supported()
  9219. {
  9220. #ifdef NO_IPV6
  9221. return false;
  9222. #else // NO_IPV6
  9223. SOCKET s;
  9224. s = socket(AF_INET6, SOCK_STREAM, 0);
  9225. if (s == INVALID_SOCKET)
  9226. {
  9227. return false;
  9228. }
  9229. closesocket(s);
  9230. return true;
  9231. #endif // NO_IPV6
  9232. }
  9233. // Get the host name from the host cache
  9234. bool GetHostCache(char *hostname, UINT size, IP *ip)
  9235. {
  9236. bool ret;
  9237. // Validate arguments
  9238. if (hostname == NULL || ip == NULL)
  9239. {
  9240. return false;
  9241. }
  9242. ret = false;
  9243. LockList(HostCacheList);
  9244. {
  9245. HOSTCACHE t, *c;
  9246. Zero(&t, sizeof(t));
  9247. Copy(&t.IpAddress, ip, sizeof(IP));
  9248. c = Search(HostCacheList, &t);
  9249. if (c != NULL)
  9250. {
  9251. if (IsEmptyStr(c->HostName) == false)
  9252. {
  9253. ret = true;
  9254. StrCpy(hostname, size, c->HostName);
  9255. }
  9256. else
  9257. {
  9258. ret = true;
  9259. StrCpy(hostname, size, "");
  9260. }
  9261. }
  9262. }
  9263. UnlockList(HostCacheList);
  9264. return ret;
  9265. }
  9266. // Add to the host name cache
  9267. void AddHostCache(IP *ip, char *hostname)
  9268. {
  9269. // Validate arguments
  9270. if (ip == NULL || hostname == NULL)
  9271. {
  9272. return;
  9273. }
  9274. if (IsNetworkNameCacheEnabled() == false)
  9275. {
  9276. return;
  9277. }
  9278. LockList(HostCacheList);
  9279. {
  9280. HOSTCACHE t, *c;
  9281. UINT i;
  9282. LIST *o;
  9283. Zero(&t, sizeof(t));
  9284. Copy(&t.IpAddress, ip, sizeof(IP));
  9285. c = Search(HostCacheList, &t);
  9286. if (c == NULL)
  9287. {
  9288. c = ZeroMalloc(sizeof(HOSTCACHE));
  9289. Copy(&c->IpAddress, ip, sizeof(IP));
  9290. Add(HostCacheList, c);
  9291. }
  9292. StrCpy(c->HostName, sizeof(c->HostName), hostname);
  9293. c->Expires = Tick64() + (UINT64)EXPIRES_HOSTNAME;
  9294. o = NewListFast(NULL);
  9295. for (i = 0;i < LIST_NUM(HostCacheList);i++)
  9296. {
  9297. HOSTCACHE *c = LIST_DATA(HostCacheList, i);
  9298. if (c->Expires <= Tick64())
  9299. {
  9300. Add(o, c);
  9301. }
  9302. }
  9303. for (i = 0;i < LIST_NUM(o);i++)
  9304. {
  9305. HOSTCACHE *c = LIST_DATA(o, i);
  9306. if (Delete(HostCacheList, c))
  9307. {
  9308. Free(c);
  9309. }
  9310. }
  9311. ReleaseList(o);
  9312. }
  9313. UnlockList(HostCacheList);
  9314. }
  9315. // Comparison of host name cache entries
  9316. int CompareHostCache(void *p1, void *p2)
  9317. {
  9318. HOSTCACHE *c1, *c2;
  9319. if (p1 == NULL || p2 == NULL)
  9320. {
  9321. return 0;
  9322. }
  9323. c1 = *(HOSTCACHE **)p1;
  9324. c2 = *(HOSTCACHE **)p2;
  9325. if (c1 == NULL || c2 == NULL)
  9326. {
  9327. return 0;
  9328. }
  9329. return CmpIpAddr(&c1->IpAddress, &c2->IpAddress);
  9330. }
  9331. // Release of the host name cache
  9332. void FreeHostCache()
  9333. {
  9334. UINT i;
  9335. for (i = 0;i < LIST_NUM(HostCacheList);i++)
  9336. {
  9337. HOSTCACHE *c = LIST_DATA(HostCacheList, i);
  9338. Free(c);
  9339. }
  9340. ReleaseList(HostCacheList);
  9341. HostCacheList = NULL;
  9342. }
  9343. // Initialization of the host name cache
  9344. void InitHostCache()
  9345. {
  9346. HostCacheList = NewList(CompareHostCache);
  9347. }
  9348. // Get the number of wait threads
  9349. UINT GetNumWaitThread()
  9350. {
  9351. UINT ret = 0;
  9352. LockList(WaitThreadList);
  9353. {
  9354. ret = LIST_NUM(WaitThreadList);
  9355. }
  9356. UnlockList(WaitThreadList);
  9357. return ret;
  9358. }
  9359. // Add the thread to the thread waiting list
  9360. void AddWaitThread(THREAD *t)
  9361. {
  9362. // Validate arguments
  9363. if (t == NULL)
  9364. {
  9365. return;
  9366. }
  9367. AddRef(t->ref);
  9368. LockList(WaitThreadList);
  9369. {
  9370. Add(WaitThreadList, t);
  9371. }
  9372. UnlockList(WaitThreadList);
  9373. }
  9374. // Remove the thread from the waiting list
  9375. void DelWaitThread(THREAD *t)
  9376. {
  9377. // Validate arguments
  9378. if (t == NULL)
  9379. {
  9380. return;
  9381. }
  9382. LockList(WaitThreadList);
  9383. {
  9384. if (Delete(WaitThreadList, t))
  9385. {
  9386. ReleaseThread(t);
  9387. }
  9388. }
  9389. UnlockList(WaitThreadList);
  9390. }
  9391. // Creating a thread waiting list
  9392. void InitWaitThread()
  9393. {
  9394. WaitThreadList = NewList(NULL);
  9395. }
  9396. // Release of the thread waiting list
  9397. void FreeWaitThread()
  9398. {
  9399. UINT i, num;
  9400. THREAD **threads;
  9401. LockList(WaitThreadList);
  9402. {
  9403. num = LIST_NUM(WaitThreadList);
  9404. threads = ToArray(WaitThreadList);
  9405. DeleteAll(WaitThreadList);
  9406. }
  9407. UnlockList(WaitThreadList);
  9408. for (i = 0;i < num;i++)
  9409. {
  9410. THREAD *t = threads[i];
  9411. WaitThread(t, INFINITE);
  9412. ReleaseThread(t);
  9413. }
  9414. Free(threads);
  9415. ReleaseList(WaitThreadList);
  9416. WaitThreadList = NULL;
  9417. }
  9418. // Check the cipher list name
  9419. bool CheckCipherListName(char *name)
  9420. {
  9421. UINT i;
  9422. // Validate arguments
  9423. if (name == NULL)
  9424. {
  9425. return false;
  9426. }
  9427. for (i = 0;i < cipher_list_token->NumTokens;i++)
  9428. {
  9429. if (StrCmpi(cipher_list_token->Token[i], name) == 0)
  9430. {
  9431. return true;
  9432. }
  9433. }
  9434. return false;
  9435. }
  9436. // Renewing the IP address of the DHCP server
  9437. void RenewDhcp()
  9438. {
  9439. #ifdef OS_WIN32
  9440. Win32RenewDhcp();
  9441. #else
  9442. UnixRenewDhcp();
  9443. #endif
  9444. }
  9445. // Get a domain name for UNIX
  9446. bool UnixGetDomainName(char *name, UINT size)
  9447. {
  9448. bool ret = false;
  9449. BUF *b = ReadDump("/etc/resolv.conf");
  9450. if (b == NULL)
  9451. {
  9452. return false;
  9453. }
  9454. while (true)
  9455. {
  9456. char *s = CfgReadNextLine(b);
  9457. TOKEN_LIST *t;
  9458. if (s == NULL)
  9459. {
  9460. break;
  9461. }
  9462. Trim(s);
  9463. t = ParseToken(s, " \t");
  9464. if (t != NULL)
  9465. {
  9466. if (t->NumTokens == 2)
  9467. {
  9468. if (StrCmpi(t->Token[0], "domain") == 0)
  9469. {
  9470. StrCpy(name, size, t->Token[1]);
  9471. ret = true;
  9472. }
  9473. }
  9474. FreeToken(t);
  9475. }
  9476. Free(s);
  9477. }
  9478. FreeBuf(b);
  9479. return ret;
  9480. }
  9481. // Get the domain name
  9482. bool GetDomainName(char *name, UINT size)
  9483. {
  9484. bool ret = false;
  9485. IP ip;
  9486. // Validate arguments
  9487. ClearStr(name, size);
  9488. if (name == NULL)
  9489. {
  9490. return false;
  9491. }
  9492. #ifdef OS_WIN32
  9493. ClearStr(name, size);
  9494. ret = Win32GetDefaultDns(&ip, name, size);
  9495. if (ret == false || IsEmptyStr(name))
  9496. {
  9497. ret = Win32GetDnsSuffix(name, size);
  9498. }
  9499. #else // OS_WIN32
  9500. ret = UnixGetDomainName(name, size);
  9501. #endif // OS_WIN32
  9502. if (ret == false)
  9503. {
  9504. return false;
  9505. }
  9506. return (IsEmptyStr(name) ? false : true);
  9507. }
  9508. // Get the default DNS server
  9509. bool GetDefaultDns(IP *ip)
  9510. {
  9511. bool ret = false;
  9512. #ifdef OS_WIN32
  9513. ret = Win32GetDefaultDns(ip, NULL, 0);
  9514. #else
  9515. ret = UnixGetDefaultDns(ip);
  9516. #endif // OS_WIN32
  9517. return ret;
  9518. }
  9519. // Creating a socket event
  9520. SOCK_EVENT *NewSockEvent()
  9521. {
  9522. SOCK_EVENT *e = NULL;
  9523. #ifdef OS_WIN32
  9524. e = Win32NewSockEvent();
  9525. #else
  9526. e = UnixNewSockEvent();
  9527. #endif // OS_WIN32
  9528. return e;
  9529. }
  9530. // Set of the socket event
  9531. void SetSockEvent(SOCK_EVENT *event)
  9532. {
  9533. #ifdef OS_WIN32
  9534. Win32SetSockEvent(event);
  9535. #else
  9536. UnixSetSockEvent(event);
  9537. #endif // OS_WIN32
  9538. }
  9539. // Clean-up of the socket event
  9540. void CleanupSockEvent(SOCK_EVENT *event)
  9541. {
  9542. #ifdef OS_WIN32
  9543. Win32CleanupSockEvent(event);
  9544. #else
  9545. UnixCleanupSockEvent(event);
  9546. #endif // OS_WIN32
  9547. }
  9548. // Waiting for the socket event
  9549. bool WaitSockEvent(SOCK_EVENT *event, UINT timeout)
  9550. {
  9551. bool ret = false;
  9552. #ifdef OS_WIN32
  9553. ret = Win32WaitSockEvent(event, timeout);
  9554. #else
  9555. ret = UnixWaitSockEvent(event, timeout);
  9556. #endif // OS_WIN32
  9557. return ret;
  9558. }
  9559. // Release of the socket event
  9560. void ReleaseSockEvent(SOCK_EVENT *event)
  9561. {
  9562. // Validate arguments
  9563. if (event == NULL)
  9564. {
  9565. return;
  9566. }
  9567. if (Release(event->ref) == 0)
  9568. {
  9569. CleanupSockEvent(event);
  9570. }
  9571. }
  9572. // Let belonging the socket to the socket event
  9573. void JoinSockToSockEvent(SOCK *sock, SOCK_EVENT *event)
  9574. {
  9575. // Validate arguments
  9576. if (sock == NULL || event == NULL)
  9577. {
  9578. return;
  9579. }
  9580. if (sock->Type == SOCK_INPROC)
  9581. {
  9582. // Set the SockEvent on the receiver TUBE for in-process type socket
  9583. SetTubeSockEvent(sock->RecvTube, event);
  9584. return;
  9585. }
  9586. if (sock->BulkRecvTube != NULL)
  9587. {
  9588. // Set the SockEvent on the receiver TUBE in case of R-UDP socket
  9589. SetTubeSockEvent(sock->BulkRecvTube, event);
  9590. }
  9591. #ifdef OS_WIN32
  9592. Win32JoinSockToSockEvent(sock, event);
  9593. #else
  9594. UnixJoinSockToSockEvent(sock, event);
  9595. #endif // OS_WIN32
  9596. }
  9597. // New special cancel object
  9598. CANCEL *NewCancelSpecial(void *hEvent)
  9599. {
  9600. CANCEL *c;
  9601. // Validate arguments
  9602. if (hEvent == NULL)
  9603. {
  9604. return NULL;
  9605. }
  9606. c = ZeroMalloc(sizeof(CANCEL));
  9607. c->ref = NewRef();
  9608. c->SpecialFlag = true;
  9609. #ifdef OS_WIN32
  9610. c->hEvent = (HANDLE)hEvent;
  9611. #else // OS_WIN32
  9612. c->pipe_read = (int)hEvent;
  9613. c->pipe_write = -1;
  9614. #endif // OS_WIN32
  9615. return c;
  9616. }
  9617. // Creating a cancel object
  9618. CANCEL *NewCancel()
  9619. {
  9620. CANCEL *c = NULL;
  9621. #ifdef OS_WIN32
  9622. c = Win32NewCancel();
  9623. #else
  9624. c = UnixNewCancel();
  9625. #endif // OS_WIN32
  9626. return c;
  9627. }
  9628. // Release of the cancel object
  9629. void ReleaseCancel(CANCEL *c)
  9630. {
  9631. // Validate arguments
  9632. if (c == NULL)
  9633. {
  9634. return;
  9635. }
  9636. if (Release(c->ref) == 0)
  9637. {
  9638. CleanupCancel(c);
  9639. }
  9640. }
  9641. // Clean up of the cancel object
  9642. void CleanupCancel(CANCEL *c)
  9643. {
  9644. #ifdef OS_WIN32
  9645. Win32CleanupCancel(c);
  9646. #else
  9647. UnixCleanupCancel(c);
  9648. #endif
  9649. }
  9650. // Cancellation triggered
  9651. void Cancel(CANCEL *c)
  9652. {
  9653. #ifdef OS_WIN32
  9654. Win32Cancel(c);
  9655. #else
  9656. UnixCancel(c);
  9657. #endif
  9658. }
  9659. // Calculate the optimal route from the specified routing table
  9660. ROUTE_ENTRY *GetBestRouteEntryFromRouteTable(ROUTE_TABLE *table, IP *ip)
  9661. {
  9662. return GetBestRouteEntryFromRouteTableEx(table, ip, 0);
  9663. }
  9664. ROUTE_ENTRY *GetBestRouteEntryFromRouteTableEx(ROUTE_TABLE *table, IP *ip, UINT exclude_if_id)
  9665. {
  9666. UINT i;
  9667. ROUTE_ENTRY *ret = NULL;
  9668. ROUTE_ENTRY *tmp = NULL;
  9669. UINT64 min_score = 0;
  9670. // Validate arguments
  9671. if (ip == NULL || table == NULL)
  9672. {
  9673. return NULL;
  9674. }
  9675. if (IsIP6(ip))
  9676. {
  9677. // IPv6 is not supported
  9678. return NULL;
  9679. }
  9680. // Select routing table entry by following rule
  9681. // 1. Largest subnet mask
  9682. // 2. Smallest metric value
  9683. for (i = 0;i < table->NumEntry;i++)
  9684. {
  9685. ROUTE_ENTRY *e = table->Entry[i];
  9686. UINT dest, net, mask;
  9687. dest = IPToUINT(ip);
  9688. net = IPToUINT(&e->DestIP);
  9689. mask = IPToUINT(&e->DestMask);
  9690. if (exclude_if_id != 0)
  9691. {
  9692. if (e->InterfaceID == exclude_if_id)
  9693. {
  9694. continue;
  9695. }
  9696. }
  9697. // Mask test
  9698. if ((dest & mask) == (net & mask))
  9699. {
  9700. // Calculate the score
  9701. UINT score_high32 = mask;
  9702. UINT score_low32 = 0xFFFFFFFF - e->Metric;
  9703. UINT64 score64 = (UINT64)score_high32 * (UINT64)0x80000000 * (UINT64)2 + (UINT64)score_low32;
  9704. if (score64 == 0)
  9705. {
  9706. score64 = 1;
  9707. }
  9708. e->InnerScore = score64;
  9709. }
  9710. }
  9711. tmp = NULL;
  9712. // Search for the item with maximum score
  9713. for (i = 0;i < table->NumEntry;i++)
  9714. {
  9715. ROUTE_ENTRY *e = table->Entry[i];
  9716. if (e->InnerScore != 0)
  9717. {
  9718. if (e->InnerScore >= min_score)
  9719. {
  9720. tmp = e;
  9721. min_score = e->InnerScore;
  9722. }
  9723. }
  9724. }
  9725. if (tmp != NULL)
  9726. {
  9727. UINT dest, gateway, mask;
  9728. // Generate an entry
  9729. ret = ZeroMallocFast(sizeof(ROUTE_ENTRY));
  9730. Copy(&ret->DestIP, ip, sizeof(IP));
  9731. ret->DestMask.addr[0] = 255;
  9732. ret->DestMask.addr[1] = 255;
  9733. ret->DestMask.addr[2] = 255;
  9734. ret->DestMask.addr[3] = 255;
  9735. Copy(&ret->GatewayIP, &tmp->GatewayIP, sizeof(IP));
  9736. ret->InterfaceID = tmp->InterfaceID;
  9737. ret->LocalRouting = tmp->LocalRouting;
  9738. ret->OldIfMetric = tmp->Metric;
  9739. ret->Metric = 1;
  9740. ret->PPPConnection = tmp->PPPConnection;
  9741. // Calculation related to routing control
  9742. dest = IPToUINT(&tmp->DestIP);
  9743. gateway = IPToUINT(&tmp->GatewayIP);
  9744. mask = IPToUINT(&tmp->DestMask);
  9745. if ((dest & mask) == (gateway & mask))
  9746. {
  9747. #ifdef OS_WIN32
  9748. if (MsIsVista() == false)
  9749. {
  9750. // Adjust for Windows
  9751. ret->PPPConnection = true;
  9752. }
  9753. #endif // OS_WIN32
  9754. }
  9755. }
  9756. return ret;
  9757. }
  9758. // Release the routing entry
  9759. void FreeRouteEntry(ROUTE_ENTRY *e)
  9760. {
  9761. // Validate arguments
  9762. if (e == NULL)
  9763. {
  9764. return;
  9765. }
  9766. Free(e);
  9767. }
  9768. // Get the best route entry by analyzing the current routing table
  9769. ROUTE_ENTRY *GetBestRouteEntry(IP *ip)
  9770. {
  9771. return GetBestRouteEntryEx(ip, 0);
  9772. }
  9773. ROUTE_ENTRY *GetBestRouteEntryEx(IP *ip, UINT exclude_if_id)
  9774. {
  9775. ROUTE_TABLE *table;
  9776. ROUTE_ENTRY *e = NULL;
  9777. // Validate arguments
  9778. if (ip == NULL)
  9779. {
  9780. return NULL;
  9781. }
  9782. table = GetRouteTable();
  9783. if (table == NULL)
  9784. {
  9785. return NULL;
  9786. }
  9787. e = GetBestRouteEntryFromRouteTableEx(table, ip, exclude_if_id);
  9788. FreeRouteTable(table);
  9789. return e;
  9790. }
  9791. // Get the interface ID of the virtual LAN card
  9792. UINT GetVLanInterfaceID(char *tag_name)
  9793. {
  9794. UINT ret = 0;
  9795. #ifdef OS_WIN32
  9796. ret = Win32GetVLanInterfaceID(tag_name);
  9797. #else // OS_WIN32
  9798. ret = UnixGetVLanInterfaceID(tag_name);
  9799. #endif // OS_WIN32
  9800. return ret;
  9801. }
  9802. // Release of enumeration variable of virtual LAN card
  9803. void FreeEnumVLan(char **s)
  9804. {
  9805. char *a;
  9806. UINT i;
  9807. // Validate arguments
  9808. if (s == NULL)
  9809. {
  9810. return;
  9811. }
  9812. i = 0;
  9813. while (true)
  9814. {
  9815. a = s[i++];
  9816. if (a == NULL)
  9817. {
  9818. break;
  9819. }
  9820. Free(a);
  9821. }
  9822. Free(s);
  9823. }
  9824. // Enumeration of virtual LAN cards
  9825. char **EnumVLan(char *tag_name)
  9826. {
  9827. char **ret = NULL;
  9828. #ifdef OS_WIN32
  9829. ret = Win32EnumVLan(tag_name);
  9830. #else // OS_WIN32
  9831. ret = UnixEnumVLan(tag_name);
  9832. #endif // OS_WIN32
  9833. return ret;
  9834. }
  9835. // Display the routing table
  9836. void DebugPrintRouteTable(ROUTE_TABLE *r)
  9837. {
  9838. UINT i;
  9839. // Validate arguments
  9840. if (r == NULL)
  9841. {
  9842. return;
  9843. }
  9844. if (IsDebug() == false)
  9845. {
  9846. return;
  9847. }
  9848. Debug("---- Routing Table (%u Entries) ----\n", r->NumEntry);
  9849. for (i = 0;i < r->NumEntry;i++)
  9850. {
  9851. Debug(" ");
  9852. DebugPrintRoute(r->Entry[i]);
  9853. }
  9854. Debug("------------------------------------\n");
  9855. }
  9856. // Display the routing table entry
  9857. void DebugPrintRoute(ROUTE_ENTRY *e)
  9858. {
  9859. char tmp[MAX_SIZE];
  9860. // Validate arguments
  9861. if (e == NULL)
  9862. {
  9863. return;
  9864. }
  9865. if (IsDebug() == false)
  9866. {
  9867. return;
  9868. }
  9869. RouteToStr(tmp, sizeof(tmp), e);
  9870. Debug("%s\n", tmp);
  9871. }
  9872. // Convert the routing table entry to string
  9873. void RouteToStr(char *str, UINT str_size, ROUTE_ENTRY *e)
  9874. {
  9875. char dest_ip[MAX_PATH];
  9876. char dest_mask[MAX_PATH];
  9877. char gateway_ip[MAX_PATH];
  9878. // Validate arguments
  9879. if (str == NULL || e == NULL)
  9880. {
  9881. return;
  9882. }
  9883. IPToStr(dest_ip, sizeof(dest_ip), &e->DestIP);
  9884. IPToStr(dest_mask, sizeof(dest_mask), &e->DestMask);
  9885. IPToStr(gateway_ip, sizeof(gateway_ip), &e->GatewayIP);
  9886. Format(str, str_size, "%s/%s %s m=%u oif=%u if=%u lo=%u p=%u",
  9887. dest_ip, dest_mask, gateway_ip,
  9888. e->Metric, e->OldIfMetric, e->InterfaceID,
  9889. e->LocalRouting, e->PPPConnection);
  9890. }
  9891. // Delete the routing table
  9892. void DeleteRouteEntry(ROUTE_ENTRY *e)
  9893. {
  9894. Debug("DeleteRouteEntry();\n");
  9895. #ifdef OS_WIN32
  9896. Win32DeleteRouteEntry(e);
  9897. #else // OS_WIN32
  9898. UnixDeleteRouteEntry(e);
  9899. #endif
  9900. }
  9901. // Add to the routing table
  9902. bool AddRouteEntry(ROUTE_ENTRY *e)
  9903. {
  9904. bool dummy = false;
  9905. return AddRouteEntryEx(e, &dummy);
  9906. }
  9907. bool AddRouteEntryEx(ROUTE_ENTRY *e, bool *already_exists)
  9908. {
  9909. bool ret = false;
  9910. Debug("AddRouteEntryEx();\n");
  9911. #ifdef OS_WIN32
  9912. ret = Win32AddRouteEntry(e, already_exists);
  9913. #else // OS_WIN32
  9914. ret = UnixAddRouteEntry(e, already_exists);
  9915. #endif
  9916. return ret;
  9917. }
  9918. // Get the routing table
  9919. ROUTE_TABLE *GetRouteTable()
  9920. {
  9921. ROUTE_TABLE *t = NULL;
  9922. UINT i;
  9923. BUF *buf = NewBuf();
  9924. UCHAR hash[MD5_SIZE];
  9925. #ifdef OS_WIN32
  9926. t = Win32GetRouteTable();
  9927. #else //OS_WIN32
  9928. t = UnixGetRouteTable();
  9929. #endif // OS_WIN32
  9930. WriteBuf(buf, &t->NumEntry, sizeof(t->NumEntry));
  9931. for (i = 0;i < t->NumEntry;i++)
  9932. {
  9933. ROUTE_ENTRY *e = t->Entry[i];
  9934. WriteBuf(buf, e, sizeof(ROUTE_ENTRY));
  9935. }
  9936. Hash(hash, buf->Buf, buf->Size, false);
  9937. FreeBuf(buf);
  9938. Copy(&t->HashedValue, hash, sizeof(t->HashedValue));
  9939. return t;
  9940. }
  9941. // Release of the routing table
  9942. void FreeRouteTable(ROUTE_TABLE *t)
  9943. {
  9944. UINT i;
  9945. // Validate arguments
  9946. if (t == NULL)
  9947. {
  9948. return;
  9949. }
  9950. for (i = 0;i < t->NumEntry;i++)
  9951. {
  9952. Free(t->Entry[i]);
  9953. }
  9954. Free(t->Entry);
  9955. Free(t);
  9956. }
  9957. // UDP receiving
  9958. UINT RecvFrom(SOCK *sock, IP *src_addr, UINT *src_port, void *data, UINT size)
  9959. {
  9960. SOCKET s;
  9961. int ret, sz;
  9962. struct sockaddr_in addr;
  9963. // Validate arguments
  9964. if (sock != NULL)
  9965. {
  9966. sock->IgnoreRecvErr = false;
  9967. }
  9968. if (sock == NULL || src_addr == NULL || src_port == NULL || data == NULL)
  9969. {
  9970. return false;
  9971. }
  9972. if (sock->Type != SOCK_UDP || sock->socket == INVALID_SOCKET)
  9973. {
  9974. return false;
  9975. }
  9976. if (size == 0)
  9977. {
  9978. return false;
  9979. }
  9980. if (sock->IPv6)
  9981. {
  9982. return RecvFrom6(sock, src_addr, src_port, data, size);
  9983. }
  9984. s = sock->socket;
  9985. sz = sizeof(addr);
  9986. ret = recvfrom(s, data, size, 0, (struct sockaddr *)&addr, (int *)&sz);
  9987. if (ret > 0)
  9988. {
  9989. InAddrToIP(src_addr, &addr.sin_addr);
  9990. *src_port = (UINT)ntohs(addr.sin_port);
  9991. if (sock->IsRawSocket)
  9992. {
  9993. *src_port = sock->LocalPort;
  9994. /*
  9995. {
  9996. char tmp[MAX_SIZE];
  9997. IPToStr(tmp, sizeof(tmp), &sock->LocalIP);
  9998. Debug("Raw: %u from %s\n", sock->LocalPort, tmp);
  9999. }*/
  10000. }
  10001. Lock(sock->lock);
  10002. {
  10003. sock->RecvNum++;
  10004. sock->RecvSize += (UINT64)ret;
  10005. }
  10006. Unlock(sock->lock);
  10007. // Debug("UDP RecvFrom: %u\n", ret);
  10008. return (UINT)ret;
  10009. }
  10010. else
  10011. {
  10012. sock->IgnoreRecvErr = false;
  10013. #ifdef OS_WIN32
  10014. if (WSAGetLastError() == WSAECONNRESET || WSAGetLastError() == WSAENETRESET || WSAGetLastError() == WSAEMSGSIZE || WSAGetLastError() == WSAENETUNREACH ||
  10015. WSAGetLastError() == WSAENOBUFS || WSAGetLastError() == WSAEHOSTUNREACH || WSAGetLastError() == WSAEUSERS || WSAGetLastError() == WSAEADDRNOTAVAIL || WSAGetLastError() == WSAEADDRNOTAVAIL)
  10016. {
  10017. sock->IgnoreRecvErr = true;
  10018. }
  10019. else if (WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINPROGRESS)
  10020. {
  10021. return SOCK_LATER;
  10022. }
  10023. else
  10024. {
  10025. UINT e = WSAGetLastError();
  10026. // Debug("RecvFrom Error: %u\n", e);
  10027. }
  10028. #else // OS_WIN32
  10029. if (errno == ECONNREFUSED || errno == ECONNRESET || errno == EMSGSIZE || errno == ENOBUFS || errno == ENOMEM || errno == EINTR)
  10030. {
  10031. sock->IgnoreRecvErr = true;
  10032. }
  10033. else if (errno == EAGAIN)
  10034. {
  10035. return SOCK_LATER;
  10036. }
  10037. #endif // OS_WIN32
  10038. return 0;
  10039. }
  10040. }
  10041. UINT RecvFrom6(SOCK *sock, IP *src_addr, UINT *src_port, void *data, UINT size)
  10042. {
  10043. SOCKET s;
  10044. int ret, sz;
  10045. struct sockaddr_in6 addr;
  10046. // Validate arguments
  10047. if (sock != NULL)
  10048. {
  10049. sock->IgnoreRecvErr = false;
  10050. }
  10051. if (sock == NULL || src_addr == NULL || src_port == NULL || data == NULL)
  10052. {
  10053. return false;
  10054. }
  10055. if (sock->Type != SOCK_UDP || sock->socket == INVALID_SOCKET)
  10056. {
  10057. return false;
  10058. }
  10059. if (size == 0)
  10060. {
  10061. return false;
  10062. }
  10063. s = sock->socket;
  10064. sz = sizeof(addr);
  10065. ret = recvfrom(s, data, size, 0, (struct sockaddr *)&addr, (int *)&sz);
  10066. if (ret > 0)
  10067. {
  10068. InAddrToIP6(src_addr, &addr.sin6_addr);
  10069. src_addr->ipv6_scope_id = addr.sin6_scope_id;
  10070. *src_port = (UINT)ntohs(addr.sin6_port);
  10071. if (sock->IsRawSocket)
  10072. {
  10073. *src_port = sock->LocalPort;
  10074. }
  10075. Lock(sock->lock);
  10076. {
  10077. sock->RecvNum++;
  10078. sock->RecvSize += (UINT64)ret;
  10079. }
  10080. Unlock(sock->lock);
  10081. // Debug("UDP RecvFrom: %u\n", ret);
  10082. return (UINT)ret;
  10083. }
  10084. else
  10085. {
  10086. sock->IgnoreRecvErr = false;
  10087. #ifdef OS_WIN32
  10088. if (WSAGetLastError() == WSAECONNRESET || WSAGetLastError() == WSAENETRESET || WSAGetLastError() == WSAEMSGSIZE || WSAGetLastError() == WSAENETUNREACH ||
  10089. WSAGetLastError() == WSAENOBUFS || WSAGetLastError() == WSAEHOSTUNREACH || WSAGetLastError() == WSAEUSERS || WSAGetLastError() == WSAEADDRNOTAVAIL || WSAGetLastError() == WSAEADDRNOTAVAIL)
  10090. {
  10091. sock->IgnoreRecvErr = true;
  10092. }
  10093. else if (WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINPROGRESS)
  10094. {
  10095. return SOCK_LATER;
  10096. }
  10097. else
  10098. {
  10099. UINT e = WSAGetLastError();
  10100. // Debug("RecvFrom Error: %u\n", e);
  10101. }
  10102. #else // OS_WIN32
  10103. if (errno == ECONNREFUSED || errno == ECONNRESET || errno == EMSGSIZE || errno == ENOBUFS || errno == ENOMEM || errno == EINTR)
  10104. {
  10105. sock->IgnoreRecvErr = true;
  10106. }
  10107. else if (errno == EAGAIN)
  10108. {
  10109. return SOCK_LATER;
  10110. }
  10111. #endif // OS_WIN32
  10112. return 0;
  10113. }
  10114. }
  10115. // Lock the OpenSSL
  10116. void LockOpenSSL()
  10117. {
  10118. Lock(openssl_lock);
  10119. }
  10120. // Unlock the OpenSSL
  10121. void UnlockOpenSSL()
  10122. {
  10123. Unlock(openssl_lock);
  10124. }
  10125. // UDP transmission
  10126. UINT SendTo(SOCK *sock, IP *dest_addr, UINT dest_port, void *data, UINT size)
  10127. {
  10128. return SendToEx(sock, dest_addr, dest_port, data, size, false);
  10129. }
  10130. UINT SendToEx(SOCK *sock, IP *dest_addr, UINT dest_port, void *data, UINT size, bool broadcast)
  10131. {
  10132. SOCKET s;
  10133. int ret;
  10134. struct sockaddr_in addr;
  10135. // Validate arguments
  10136. if (sock != NULL)
  10137. {
  10138. sock->IgnoreSendErr = false;
  10139. }
  10140. if (sock == NULL || dest_addr == NULL || (sock->IsRawSocket == false && dest_port == 0) || data == NULL)
  10141. {
  10142. return 0;
  10143. }
  10144. if (dest_port >= 65536 && sock->IsRawSocket == false)
  10145. {
  10146. return 0;
  10147. }
  10148. if (sock->Type != SOCK_UDP || sock->socket == INVALID_SOCKET)
  10149. {
  10150. return 0;
  10151. }
  10152. if (size == 0)
  10153. {
  10154. return 0;
  10155. }
  10156. if (sock->IPv6)
  10157. {
  10158. return SendTo6Ex(sock, dest_addr, dest_port, data, size, broadcast);
  10159. }
  10160. if (IsIP4(dest_addr) == false)
  10161. {
  10162. return 0;
  10163. }
  10164. s = sock->socket;
  10165. Zero(&addr, sizeof(addr));
  10166. addr.sin_family = AF_INET;
  10167. if (sock->IsRawSocket == false)
  10168. {
  10169. addr.sin_port = htons((USHORT)dest_port);
  10170. }
  10171. IPToInAddr(&addr.sin_addr, dest_addr);
  10172. if ((dest_addr->addr[0] == 255 && dest_addr->addr[1] == 255 &&
  10173. dest_addr->addr[2] == 255 && dest_addr->addr[3] == 255) ||
  10174. (dest_addr->addr[0] >= 224 && dest_addr->addr[0] <= 239)
  10175. || broadcast)
  10176. {
  10177. if (sock->UdpBroadcast == false)
  10178. {
  10179. bool yes = true;
  10180. sock->UdpBroadcast = true;
  10181. setsockopt(s, SOL_SOCKET, SO_BROADCAST, (char *)&yes, sizeof(yes));
  10182. }
  10183. }
  10184. ret = sendto(s, data, size, 0, (struct sockaddr *)&addr, sizeof(addr));
  10185. if (ret != (int)size)
  10186. {
  10187. sock->IgnoreSendErr = false;
  10188. #ifdef OS_WIN32
  10189. if (WSAGetLastError() == WSAECONNRESET || WSAGetLastError() == WSAENETRESET || WSAGetLastError() == WSAEMSGSIZE || WSAGetLastError() == WSAENETUNREACH ||
  10190. WSAGetLastError() == WSAENOBUFS || WSAGetLastError() == WSAEHOSTUNREACH || WSAGetLastError() == WSAEUSERS || WSAGetLastError() == WSAEINVAL || WSAGetLastError() == WSAEADDRNOTAVAIL)
  10191. {
  10192. sock->IgnoreSendErr = true;
  10193. }
  10194. else if (WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINPROGRESS)
  10195. {
  10196. return SOCK_LATER;
  10197. }
  10198. else
  10199. {
  10200. UINT e = WSAGetLastError();
  10201. Debug("SendTo Error; %u\n", e);
  10202. }
  10203. #else // OS_WIN32
  10204. if (errno == ECONNREFUSED || errno == ECONNRESET || errno == EMSGSIZE || errno == ENOBUFS || errno == ENOMEM || errno == EINTR)
  10205. {
  10206. sock->IgnoreSendErr = true;
  10207. }
  10208. else if (errno == EAGAIN)
  10209. {
  10210. return SOCK_LATER;
  10211. }
  10212. #endif // OS_WIN32
  10213. return 0;
  10214. }
  10215. Lock(sock->lock);
  10216. {
  10217. sock->SendSize += (UINT64)size;
  10218. sock->SendNum++;
  10219. }
  10220. Unlock(sock->lock);
  10221. return ret;
  10222. }
  10223. UINT SendTo6(SOCK *sock, IP *dest_addr, UINT dest_port, void *data, UINT size)
  10224. {
  10225. return SendTo6Ex(sock, dest_addr, dest_port, data, size, false);
  10226. }
  10227. UINT SendTo6Ex(SOCK *sock, IP *dest_addr, UINT dest_port, void *data, UINT size, bool broadcast)
  10228. {
  10229. SOCKET s;
  10230. int ret;
  10231. struct sockaddr_in6 addr;
  10232. UINT type;
  10233. // Validate arguments
  10234. if (sock != NULL)
  10235. {
  10236. sock->IgnoreSendErr = false;
  10237. }
  10238. if (sock == NULL || dest_addr == NULL || (sock->IsRawSocket == false && dest_port == 0) || data == NULL)
  10239. {
  10240. return 0;
  10241. }
  10242. if (dest_port >= 65536 && sock->IsRawSocket == false)
  10243. {
  10244. return 0;
  10245. }
  10246. if (sock->Type != SOCK_UDP || sock->socket == INVALID_SOCKET)
  10247. {
  10248. return 0;
  10249. }
  10250. if (size == 0)
  10251. {
  10252. return 0;
  10253. }
  10254. if (IsIP6(dest_addr) == false)
  10255. {
  10256. return 0;
  10257. }
  10258. s = sock->socket;
  10259. Zero(&addr, sizeof(addr));
  10260. addr.sin6_family = AF_INET6;
  10261. if (sock->IsRawSocket == false)
  10262. {
  10263. addr.sin6_port = htons((USHORT)dest_port);
  10264. }
  10265. IPToInAddr6(&addr.sin6_addr, dest_addr);
  10266. addr.sin6_scope_id = dest_addr->ipv6_scope_id;
  10267. type = GetIPAddrType6(dest_addr);
  10268. if ((type & IPV6_ADDR_MULTICAST) || broadcast)
  10269. {
  10270. if (sock->UdpBroadcast == false)
  10271. {
  10272. bool yes = true;
  10273. sock->UdpBroadcast = true;
  10274. setsockopt(s, SOL_SOCKET, SO_BROADCAST, (char *)&yes, sizeof(yes));
  10275. }
  10276. }
  10277. ret = sendto(s, data, size, 0, (struct sockaddr *)&addr, sizeof(addr));
  10278. if (ret != (int)size)
  10279. {
  10280. sock->IgnoreSendErr = false;
  10281. #ifdef OS_WIN32
  10282. if (WSAGetLastError() == WSAECONNRESET || WSAGetLastError() == WSAENETRESET || WSAGetLastError() == WSAEMSGSIZE || WSAGetLastError() == WSAENETUNREACH ||
  10283. WSAGetLastError() == WSAENOBUFS || WSAGetLastError() == WSAEHOSTUNREACH || WSAGetLastError() == WSAEUSERS || WSAGetLastError() == WSAEINVAL || WSAGetLastError() == WSAEADDRNOTAVAIL)
  10284. {
  10285. sock->IgnoreSendErr = true;
  10286. }
  10287. else if (WSAGetLastError() == WSAEWOULDBLOCK || WSAGetLastError() == WSAEINPROGRESS)
  10288. {
  10289. return SOCK_LATER;
  10290. }
  10291. else
  10292. {
  10293. UINT e = WSAGetLastError();
  10294. }
  10295. #else // OS_WIN32
  10296. if (errno == ECONNREFUSED || errno == ECONNRESET || errno == EMSGSIZE || errno == ENOBUFS || errno == ENOMEM || errno == EINTR)
  10297. {
  10298. sock->IgnoreSendErr = true;
  10299. }
  10300. else if (errno == EAGAIN)
  10301. {
  10302. return SOCK_LATER;
  10303. }
  10304. #endif // OS_WIN32
  10305. return 0;
  10306. }
  10307. Lock(sock->lock);
  10308. {
  10309. sock->SendSize += (UINT64)size;
  10310. sock->SendNum++;
  10311. }
  10312. Unlock(sock->lock);
  10313. return ret;
  10314. }
  10315. // Disable the UDP checksum
  10316. void DisableUDPChecksum(SOCK *s)
  10317. {
  10318. bool true_flag = true;
  10319. // Validate arguments
  10320. if (s == NULL || s->Type != SOCK_UDP)
  10321. {
  10322. return;
  10323. }
  10324. if (s->socket != INVALID_SOCKET)
  10325. {
  10326. if (s->IPv6 == false)
  10327. {
  10328. #ifdef UDP_NOCHECKSUM
  10329. setsockopt(s->socket, IPPROTO_UDP, UDP_NOCHECKSUM, (char *)&true_flag, sizeof(bool));
  10330. #endif // UDP_NOCHECKSUM
  10331. }
  10332. }
  10333. }
  10334. // Set the socket to asynchronous mode
  10335. void InitAsyncSocket(SOCK *sock)
  10336. {
  10337. #ifdef OS_WIN32
  10338. Win32InitAsyncSocket(sock);
  10339. #else // OS_WIN32
  10340. UnixInitAsyncSocket(sock);
  10341. #endif // OS_WIN32
  10342. }
  10343. // Get a new available UDP port number
  10344. UINT GetNewAvailableUdpPortRand()
  10345. {
  10346. UINT num_retry = 8;
  10347. UINT i;
  10348. UINT ret = 0;
  10349. UCHAR seed[SHA1_SIZE];
  10350. Rand(seed, sizeof(seed));
  10351. for (i = 0;i < num_retry;i++)
  10352. {
  10353. SOCK *s = NewUDPEx2Rand(false, NULL, seed, sizeof(seed), RAND_UDP_PORT_DEFAULT_NUM_RETRY);
  10354. if (s != NULL)
  10355. {
  10356. ret = s->LocalPort;
  10357. Disconnect(s);
  10358. ReleaseSock(s);
  10359. }
  10360. if (ret != 0)
  10361. {
  10362. break;
  10363. }
  10364. }
  10365. return ret;
  10366. }
  10367. // Open a UDP port (port number is random, but determine the randomness in the seed)
  10368. SOCK *NewUDPEx2Rand(bool ipv6, IP *ip, void *rand_seed, UINT rand_seed_size, UINT num_retry)
  10369. {
  10370. UINT i;
  10371. // Validate arguments
  10372. if (rand_seed == NULL || rand_seed_size == 0)
  10373. {
  10374. return NULL;
  10375. }
  10376. if (num_retry == 0)
  10377. {
  10378. num_retry = RAND_UDP_PORT_DEFAULT_NUM_RETRY;
  10379. }
  10380. for (i = 0; i < (num_retry + 1);i++)
  10381. {
  10382. BUF *buf = NewBuf();
  10383. UCHAR hash[SHA1_SIZE];
  10384. UINT port = 0;
  10385. SOCK *s;
  10386. WriteBuf(buf, rand_seed, rand_seed_size);
  10387. WriteBufInt(buf, i);
  10388. HashSha1(hash, buf->Buf, buf->Size);
  10389. FreeBuf(buf);
  10390. port = READ_UINT(hash);
  10391. port = RAND_UDP_PORT_START + (port % (RAND_UDP_PORT_END - RAND_UDP_PORT_START));
  10392. s = NewUDPEx2(port, ipv6, ip);
  10393. if (s != NULL)
  10394. {
  10395. return s;
  10396. }
  10397. }
  10398. return NewUDPEx2(0, ipv6, ip);
  10399. }
  10400. // Generate a random port number (based on the EXE path and machine key)
  10401. UINT NewRandPortByMachineAndExePath(UINT start_port, UINT end_port, UINT additional_int)
  10402. {
  10403. BUF *b;
  10404. char machine_name[MAX_SIZE];
  10405. wchar_t exe_path[MAX_PATH];
  10406. char *product_id = NULL;
  10407. UCHAR hash[SHA1_SIZE];
  10408. #ifdef OS_WIN32
  10409. product_id = MsRegReadStr(REG_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", "ProductId");
  10410. if (product_id == NULL)
  10411. {
  10412. product_id = MsRegReadStr(REG_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "ProductId");
  10413. }
  10414. #endif // OS_WIN32
  10415. b = NewBuf();
  10416. GetMachineHostName(machine_name, sizeof(machine_name));
  10417. Trim(machine_name);
  10418. StrUpper(machine_name);
  10419. GetExeNameW(exe_path, sizeof(exe_path));
  10420. UniTrim(exe_path);
  10421. UniStrUpper(exe_path);
  10422. WriteBuf(b, machine_name, StrSize(machine_name));
  10423. WriteBuf(b, exe_path, UniStrSize(exe_path));
  10424. WriteBuf(b, product_id, StrSize(product_id));
  10425. WriteBufInt(b, additional_int);
  10426. HashSha1(hash, b->Buf, b->Size);
  10427. FreeBuf(b);
  10428. Free(product_id);
  10429. return (READ_UINT(hash) % (end_port - start_port)) + start_port;
  10430. }
  10431. // Open the UDP port (based on the EXE path and machine key)
  10432. SOCK *NewUDPEx2RandMachineAndExePath(bool ipv6, IP *ip, UINT num_retry, UCHAR rand_port_id)
  10433. {
  10434. BUF *b;
  10435. char machine_name[MAX_SIZE];
  10436. wchar_t exe_path[MAX_PATH];
  10437. char *product_id = NULL;
  10438. UCHAR hash[SHA1_SIZE];
  10439. #ifdef OS_WIN32
  10440. product_id = MsRegReadStr(REG_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows NT\\CurrentVersion", "ProductId");
  10441. if (product_id == NULL)
  10442. {
  10443. product_id = MsRegReadStr(REG_LOCAL_MACHINE, "SOFTWARE\\Microsoft\\Windows\\CurrentVersion", "ProductId");
  10444. }
  10445. #endif // OS_WIN32
  10446. b = NewBuf();
  10447. GetMachineHostName(machine_name, sizeof(machine_name));
  10448. Trim(machine_name);
  10449. StrUpper(machine_name);
  10450. GetExeNameW(exe_path, sizeof(exe_path));
  10451. UniTrim(exe_path);
  10452. UniStrUpper(exe_path);
  10453. WriteBuf(b, machine_name, StrSize(machine_name));
  10454. WriteBuf(b, exe_path, UniStrSize(exe_path));
  10455. WriteBuf(b, product_id, StrSize(product_id));
  10456. WriteBufChar(b, rand_port_id);
  10457. //WriteBufInt(b, GetHostIPAddressHash32());
  10458. HashSha1(hash, b->Buf, b->Size);
  10459. FreeBuf(b);
  10460. Free(product_id);
  10461. return NewUDPEx2Rand(ipv6, ip, hash, sizeof(hash), num_retry);
  10462. }
  10463. // Set the DF bit of the socket
  10464. void ClearSockDfBit(SOCK *s)
  10465. {
  10466. #ifdef IP_PMTUDISC_DONT
  10467. #ifdef IP_MTU_DISCOVER
  10468. UINT value = IP_PMTUDISC_DONT;
  10469. if (s == NULL)
  10470. {
  10471. return;
  10472. }
  10473. setsockopt(s->socket, IPPROTO_IP, IP_MTU_DISCOVER, (char *)&value, sizeof(value));
  10474. #endif // IP_MTU_DISCOVER
  10475. #endif // IP_PMTUDISC_DONT
  10476. }
  10477. // Set the header-include option
  10478. void SetRawSockHeaderIncludeOption(SOCK *s, bool enable)
  10479. {
  10480. UINT value = BOOL_TO_INT(enable);
  10481. if (s == NULL || s->IsRawSocket == false)
  10482. {
  10483. return;
  10484. }
  10485. setsockopt(s->socket, IPPROTO_IP, IP_HDRINCL, (char *)&value, sizeof(value));
  10486. s->RawIP_HeaderIncludeFlag = enable;
  10487. }
  10488. // Create and initialize the UDP socket
  10489. // If port is specified as 0, system assigns a certain port.
  10490. SOCK *NewUDP(UINT port)
  10491. {
  10492. return NewUDPEx(port, false);
  10493. }
  10494. SOCK *NewUDPEx(UINT port, bool ipv6)
  10495. {
  10496. return NewUDPEx2(port, ipv6, NULL);
  10497. }
  10498. SOCK *NewUDPEx2(UINT port, bool ipv6, IP *ip)
  10499. {
  10500. if (ipv6 == false)
  10501. {
  10502. return NewUDP4(port, ip);
  10503. }
  10504. else
  10505. {
  10506. return NewUDP6(port, ip);
  10507. }
  10508. }
  10509. SOCK *NewUDPEx3(UINT port, IP *ip)
  10510. {
  10511. // Validate arguments
  10512. if (ip == NULL)
  10513. {
  10514. return NewUDPEx2(port, false, NULL);
  10515. }
  10516. if (IsIP4(ip))
  10517. {
  10518. return NewUDPEx2(port, false, ip);
  10519. }
  10520. else
  10521. {
  10522. return NewUDPEx2(port, true, ip);
  10523. }
  10524. }
  10525. SOCK *NewUDP4(UINT port, IP *ip)
  10526. {
  10527. SOCK *sock;
  10528. SOCKET s;
  10529. struct sockaddr_in addr;
  10530. // Validate arguments
  10531. if (ip != NULL && IsIP4(ip) == false)
  10532. {
  10533. return NULL;
  10534. }
  10535. if (IS_SPECIAL_PORT(port) == false)
  10536. {
  10537. s = socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
  10538. }
  10539. else
  10540. {
  10541. s = socket(AF_INET, SOCK_RAW, GET_SPECIAL_PORT(port));
  10542. }
  10543. if (s == INVALID_SOCKET)
  10544. {
  10545. return NULL;
  10546. }
  10547. Zero(&addr, sizeof(addr));
  10548. addr.sin_family = AF_INET;
  10549. if (ip == NULL || IsZeroIP(ip))
  10550. {
  10551. addr.sin_addr.s_addr = htonl(INADDR_ANY);
  10552. }
  10553. else
  10554. {
  10555. IPToInAddr(&addr.sin_addr, ip);
  10556. }
  10557. if (port == 0 || IS_SPECIAL_PORT(port))
  10558. {
  10559. addr.sin_port = 0;
  10560. }
  10561. else
  10562. {
  10563. addr.sin_port = htons((USHORT)port);
  10564. }
  10565. if (bind(s, (struct sockaddr *)&addr, sizeof(addr)) != 0)
  10566. {
  10567. // Failure
  10568. if (port != 0)
  10569. {
  10570. bool true_flag = true;
  10571. setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&true_flag, sizeof(bool));
  10572. if (bind(s, (struct sockaddr *)&addr, sizeof(addr)) != 0)
  10573. {
  10574. bool false_flag = false;
  10575. setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&false_flag, sizeof(bool));
  10576. #ifdef SO_EXCLUSIVEADDRUSE
  10577. setsockopt(s, SOL_SOCKET, SO_EXCLUSIVEADDRUSE, (char *)&true_flag, sizeof(bool));
  10578. #endif // SO_EXCLUSIVEADDRUSE
  10579. if (bind(s, (struct sockaddr *)&addr, sizeof(addr)) != 0)
  10580. {
  10581. closesocket(s);
  10582. return NULL;
  10583. }
  10584. }
  10585. }
  10586. else
  10587. {
  10588. closesocket(s);
  10589. return NULL;
  10590. }
  10591. }
  10592. sock = NewSock();
  10593. sock->Type = SOCK_UDP;
  10594. sock->Connected = false;
  10595. sock->AsyncMode = false;
  10596. sock->ServerMode = false;
  10597. if (port != 0)
  10598. {
  10599. sock->ServerMode = true;
  10600. }
  10601. sock->socket = s;
  10602. InitUdpSocketBufferSize((int)s);
  10603. if (IS_SPECIAL_PORT(port))
  10604. {
  10605. bool no = false;
  10606. setsockopt(sock->socket, IPPROTO_IP, IP_HDRINCL, (char *)&no, sizeof(no));
  10607. sock->IsRawSocket = true;
  10608. sock->RawSocketIPProtocol = GET_SPECIAL_PORT(port);
  10609. }
  10610. QuerySocketInformation(sock);
  10611. return sock;
  10612. }
  10613. SOCK *NewUDP6(UINT port, IP *ip)
  10614. {
  10615. SOCK *sock;
  10616. SOCKET s;
  10617. struct sockaddr_in6 addr;
  10618. // Validate arguments
  10619. if (ip != NULL && IsIP6(ip) == false)
  10620. {
  10621. return NULL;
  10622. }
  10623. if (IS_SPECIAL_PORT(port) == false)
  10624. {
  10625. s = socket(AF_INET6, SOCK_DGRAM, IPPROTO_UDP);
  10626. }
  10627. else
  10628. {
  10629. s = socket(AF_INET6, SOCK_RAW, GET_SPECIAL_PORT(port));
  10630. }
  10631. if (s == INVALID_SOCKET)
  10632. {
  10633. return NULL;
  10634. }
  10635. Zero(&addr, sizeof(addr));
  10636. addr.sin6_family = AF_INET6;
  10637. if (port == 0)
  10638. {
  10639. addr.sin6_port = 0;
  10640. }
  10641. else
  10642. {
  10643. addr.sin6_port = htons((USHORT)port);
  10644. }
  10645. if (ip != NULL && IsZeroIP(ip) == false)
  10646. {
  10647. IPToInAddr6(&addr.sin6_addr, ip);
  10648. addr.sin6_scope_id = ip->ipv6_scope_id;
  10649. }
  10650. if (bind(s, (struct sockaddr *)&addr, sizeof(addr)) != 0)
  10651. {
  10652. // Failure
  10653. if (port != 0)
  10654. {
  10655. bool true_flag = true;
  10656. setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&true_flag, sizeof(bool));
  10657. if (bind(s, (struct sockaddr *)&addr, sizeof(addr)) != 0)
  10658. {
  10659. bool false_flag = false;
  10660. setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&false_flag, sizeof(bool));
  10661. #ifdef SO_EXCLUSIVEADDRUSE
  10662. setsockopt(s, SOL_SOCKET, SO_EXCLUSIVEADDRUSE, (char *)&true_flag, sizeof(bool));
  10663. #endif // SO_EXCLUSIVEADDRUSE
  10664. if (bind(s, (struct sockaddr *)&addr, sizeof(addr)) != 0)
  10665. {
  10666. closesocket(s);
  10667. return NULL;
  10668. }
  10669. }
  10670. }
  10671. else
  10672. {
  10673. closesocket(s);
  10674. return NULL;
  10675. }
  10676. }
  10677. sock = NewSock();
  10678. sock->Type = SOCK_UDP;
  10679. sock->Connected = false;
  10680. sock->AsyncMode = false;
  10681. sock->ServerMode = false;
  10682. sock->IPv6 = true;
  10683. if (port != 0)
  10684. {
  10685. sock->ServerMode = true;
  10686. }
  10687. sock->socket = s;
  10688. InitUdpSocketBufferSize(s);
  10689. if (IS_SPECIAL_PORT(port))
  10690. {
  10691. bool no = false;
  10692. #ifdef IPV6_HDRINCL
  10693. setsockopt(sock->socket, IPPROTO_IP, IPV6_HDRINCL, (char *)&no, sizeof(no));
  10694. #endif // IPV6_HDRINCL
  10695. setsockopt(sock->socket, IPPROTO_IP, IP_HDRINCL, (char *)&no, sizeof(no));
  10696. sock->IsRawSocket = true;
  10697. sock->RawSocketIPProtocol = GET_SPECIAL_PORT(port);
  10698. }
  10699. QuerySocketInformation(sock);
  10700. return sock;
  10701. }
  10702. // Select function
  10703. void Select(SOCKSET *set, UINT timeout, CANCEL *c1, CANCEL *c2)
  10704. {
  10705. #ifdef OS_WIN32
  10706. Win32Select(set, timeout, c1, c2);
  10707. #else
  10708. UnixSelect(set, timeout, c1, c2);
  10709. #endif // OS_WIN32
  10710. }
  10711. // Add a socket to the socket set
  10712. void AddSockSet(SOCKSET *set, SOCK *sock)
  10713. {
  10714. // Validate arguments
  10715. if (set == NULL || sock == NULL)
  10716. {
  10717. return;
  10718. }
  10719. if (sock->Type == SOCK_TCP && sock->Connected == false)
  10720. {
  10721. return;
  10722. }
  10723. if (set->NumSocket >= MAX_SOCKSET_NUM)
  10724. {
  10725. // Upper limit
  10726. return;
  10727. }
  10728. set->Sock[set->NumSocket++] = sock;
  10729. }
  10730. // Initializing the socket set
  10731. void InitSockSet(SOCKSET *set)
  10732. {
  10733. // Validate arguments
  10734. if (set == NULL)
  10735. {
  10736. return;
  10737. }
  10738. Zero(set, sizeof(SOCKSET));
  10739. }
  10740. // Receive data and discard all of them
  10741. bool RecvAllWithDiscard(SOCK *sock, UINT size, bool secure)
  10742. {
  10743. static UCHAR buffer[4096];
  10744. UINT recv_size, sz, ret;
  10745. if (sock == NULL)
  10746. {
  10747. return false;
  10748. }
  10749. if (size == 0)
  10750. {
  10751. return true;
  10752. }
  10753. if (sock->AsyncMode)
  10754. {
  10755. return false;
  10756. }
  10757. recv_size = 0;
  10758. while (true)
  10759. {
  10760. sz = MIN(size - recv_size, sizeof(buffer));
  10761. ret = Recv(sock, buffer, sz, secure);
  10762. if (ret == 0)
  10763. {
  10764. return false;
  10765. }
  10766. if (ret == SOCK_LATER)
  10767. {
  10768. // I suppose that this is safe because the RecvAll() function is used only
  10769. // if the sock->AsyncMode == true. And the Recv() function may return
  10770. // SOCK_LATER only if the sock->AsyncMode == false. Therefore the call of
  10771. // Recv() function in the RecvAll() function never returns SOCK_LATER.
  10772. return false;
  10773. }
  10774. recv_size += ret;
  10775. if (recv_size >= size)
  10776. {
  10777. return true;
  10778. }
  10779. }
  10780. }
  10781. // Receive all by TCP
  10782. bool RecvAll(SOCK *sock, void *data, UINT size, bool secure)
  10783. {
  10784. UINT recv_size, sz, ret;
  10785. // Validate arguments
  10786. if (sock == NULL || data == NULL)
  10787. {
  10788. return false;
  10789. }
  10790. if (size == 0)
  10791. {
  10792. return true;
  10793. }
  10794. if (sock->AsyncMode)
  10795. {
  10796. return false;
  10797. }
  10798. recv_size = 0;
  10799. while (true)
  10800. {
  10801. sz = size - recv_size;
  10802. ret = Recv(sock, (UCHAR *)data + recv_size, sz, secure);
  10803. if (ret == 0)
  10804. {
  10805. return false;
  10806. }
  10807. if (ret == SOCK_LATER)
  10808. {
  10809. // I suppose that this is safe because the RecvAll() function is used only
  10810. // if the sock->AsyncMode == true. And the Recv() function may return
  10811. // SOCK_LATER only if the sock->AsyncMode == false. Therefore the call of
  10812. // Recv() function in the RecvAll() function never returns SOCK_LATER.
  10813. return false;
  10814. }
  10815. recv_size += ret;
  10816. if (recv_size >= size)
  10817. {
  10818. return true;
  10819. }
  10820. }
  10821. }
  10822. // Send the TCP send buffer
  10823. bool SendNow(SOCK *sock, int secure)
  10824. {
  10825. bool ret;
  10826. // Validate arguments
  10827. if (sock == NULL || sock->AsyncMode != false)
  10828. {
  10829. return false;
  10830. }
  10831. if (sock->SendBuf->Size == 0)
  10832. {
  10833. return true;
  10834. }
  10835. ret = SendAll(sock, sock->SendBuf->Buf, sock->SendBuf->Size, secure);
  10836. ClearBuf(sock->SendBuf);
  10837. return ret;
  10838. }
  10839. // Append to the TCP send buffer
  10840. void SendAdd(SOCK *sock, void *data, UINT size)
  10841. {
  10842. // Validate arguments
  10843. if (sock == NULL || data == NULL || size == 0 || sock->AsyncMode != false)
  10844. {
  10845. return;
  10846. }
  10847. WriteBuf(sock->SendBuf, data, size);
  10848. }
  10849. // Send all by TCP
  10850. bool SendAll(SOCK *sock, void *data, UINT size, bool secure)
  10851. {
  10852. UCHAR *buf;
  10853. UINT sent_size;
  10854. UINT ret;
  10855. // Validate arguments
  10856. if (sock == NULL || data == NULL)
  10857. {
  10858. return false;
  10859. }
  10860. if (sock->AsyncMode)
  10861. {
  10862. return false;
  10863. }
  10864. if (size == 0)
  10865. {
  10866. return true;
  10867. }
  10868. buf = (UCHAR *)data;
  10869. sent_size = 0;
  10870. while (true)
  10871. {
  10872. ret = Send(sock, buf, size - sent_size, secure);
  10873. if (ret == 0)
  10874. {
  10875. return false;
  10876. }
  10877. sent_size += ret;
  10878. buf += ret;
  10879. if (sent_size >= size)
  10880. {
  10881. return true;
  10882. }
  10883. }
  10884. }
  10885. // Set the cipher algorithm name to want to use
  10886. void SetWantToUseCipher(SOCK *sock, char *name)
  10887. {
  10888. char tmp[2048];
  10889. // Validate arguments
  10890. if (sock == NULL || name == NULL)
  10891. {
  10892. return;
  10893. }
  10894. if (sock->WaitToUseCipher)
  10895. {
  10896. Free(sock->WaitToUseCipher);
  10897. }
  10898. Zero(tmp, sizeof(tmp));
  10899. StrCpy(tmp, sizeof(tmp), name);
  10900. StrCat(tmp, sizeof(tmp), " ");
  10901. StrCat(tmp, sizeof(tmp), cipher_list);
  10902. sock->WaitToUseCipher = CopyStr(tmp);
  10903. }
  10904. // Add all the chain certificates in the chain_certs directory
  10905. void AddChainSslCertOnDirectory(struct ssl_ctx_st *ctx)
  10906. {
  10907. wchar_t dirname[MAX_SIZE];
  10908. wchar_t exedir[MAX_SIZE];
  10909. wchar_t txtname[MAX_SIZE];
  10910. DIRLIST *dir;
  10911. LIST *o;
  10912. UINT i;
  10913. // Validate arguments
  10914. if (ctx == NULL)
  10915. {
  10916. return;
  10917. }
  10918. o = NewListFast(NULL);
  10919. GetExeDirW(exedir, sizeof(exedir));
  10920. CombinePathW(dirname, sizeof(dirname), exedir, L"chain_certs");
  10921. MakeDirExW(dirname);
  10922. CombinePathW(txtname, sizeof(txtname), dirname, L"Readme_Chain_Certs.txt");
  10923. if (IsFileExistsW(txtname) == false)
  10924. {
  10925. FileCopyW(L"|chain_certs.txt", txtname);
  10926. }
  10927. dir = EnumDirW(dirname);
  10928. if (dir != NULL)
  10929. {
  10930. for (i = 0;i < dir->NumFiles;i++)
  10931. {
  10932. DIRENT *e = dir->File[i];
  10933. if (e->Folder == false)
  10934. {
  10935. wchar_t tmp[MAX_SIZE];
  10936. X *x;
  10937. CombinePathW(tmp, sizeof(tmp), dirname, e->FileNameW);
  10938. x = FileToXW(tmp);
  10939. if (x != NULL)
  10940. {
  10941. UINT j;
  10942. bool exists = false;
  10943. UCHAR hash[SHA1_SIZE];
  10944. GetXDigest(x, hash, true);
  10945. for (j = 0;j < LIST_NUM(o);j++)
  10946. {
  10947. UCHAR *hash2 = LIST_DATA(o, j);
  10948. if (Cmp(hash, hash2, SHA1_SIZE) == 0)
  10949. {
  10950. exists = true;
  10951. }
  10952. }
  10953. if (exists == false)
  10954. {
  10955. AddChainSslCert(ctx, x);
  10956. Add(o, Clone(hash, SHA1_SIZE));
  10957. }
  10958. FreeX(x);
  10959. }
  10960. }
  10961. }
  10962. FreeDir(dir);
  10963. }
  10964. for (i = 0;i < LIST_NUM(o);i++)
  10965. {
  10966. UCHAR *hash = LIST_DATA(o, i);
  10967. Free(hash);
  10968. }
  10969. ReleaseList(o);
  10970. }
  10971. // Add the chain certificate
  10972. bool AddChainSslCert(struct ssl_ctx_st *ctx, X *x)
  10973. {
  10974. bool ret = false;
  10975. X *x_copy;
  10976. // Validate arguments
  10977. if (ctx == NULL || x == NULL)
  10978. {
  10979. return ret;
  10980. }
  10981. x_copy = CloneX(x);
  10982. if (x_copy != NULL)
  10983. {
  10984. SSL_CTX_add_extra_chain_cert(ctx, x_copy->x509);
  10985. x_copy->do_not_free = true;
  10986. ret = true;
  10987. FreeX(x_copy);
  10988. }
  10989. return ret;
  10990. }
  10991. // Start a TCP-SSL communication
  10992. bool StartSSL(SOCK *sock, X *x, K *priv)
  10993. {
  10994. return StartSSLEx(sock, x, priv, true, 0, NULL);
  10995. }
  10996. bool StartSSLEx(SOCK *sock, X *x, K *priv, bool client_tls, UINT ssl_timeout, char *sni_hostname)
  10997. {
  10998. X509 *x509;
  10999. EVP_PKEY *key;
  11000. UINT prev_timeout = 1024;
  11001. SSL_CTX *ssl_ctx;
  11002. #ifdef UNIX_SOLARIS
  11003. SOCKET_TIMEOUT_PARAM *ttparam;
  11004. #endif //UNIX_SOLARIS
  11005. // Validate arguments
  11006. if (sock == NULL)
  11007. {
  11008. Debug("StartSSL Error: #0\n");
  11009. return false;
  11010. }
  11011. if (sock->Connected && sock->Type == SOCK_INPROC && sock->ListenMode == false)
  11012. {
  11013. sock->SecureMode = true;
  11014. return true;
  11015. }
  11016. if (sock->Connected == false || sock->socket == INVALID_SOCKET ||
  11017. sock->ListenMode != false)
  11018. {
  11019. Debug("StartSSL Error: #1\n");
  11020. return false;
  11021. }
  11022. if (x != NULL && priv == NULL)
  11023. {
  11024. Debug("StartSSL Error: #2\n");
  11025. return false;
  11026. }
  11027. if (ssl_timeout == 0)
  11028. {
  11029. ssl_timeout = TIMEOUT_SSL_CONNECT;
  11030. }
  11031. if (sock->SecureMode)
  11032. {
  11033. //Debug("StartSSL Error: #3\n");
  11034. // SSL communication has already started
  11035. return true;
  11036. }
  11037. Lock(sock->ssl_lock);
  11038. if (sock->SecureMode)
  11039. {
  11040. //Debug("StartSSL Error: #4\n");
  11041. // SSL communication has already started
  11042. Unlock(sock->ssl_lock);
  11043. return true;
  11044. }
  11045. ssl_ctx = NewSSLCtx(sock->ServerMode);
  11046. Lock(openssl_lock);
  11047. {
  11048. if (sock->ServerMode)
  11049. {
  11050. SSL_CTX_set_ssl_version(ssl_ctx, SSLv23_method());
  11051. #ifdef SSL_OP_NO_SSLv2
  11052. SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_SSLv2);
  11053. #endif // SSL_OP_NO_SSLv2
  11054. if (sock->SslAcceptSettings.AcceptOnlyTls)
  11055. {
  11056. #ifdef SSL_OP_NO_SSLv3
  11057. SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_SSLv3);
  11058. #endif // SSL_OP_NO_SSLv3
  11059. }
  11060. if (sock->SslAcceptSettings.Tls_Disable1_0)
  11061. {
  11062. #ifdef SSL_OP_NO_TLSv1
  11063. SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_TLSv1);
  11064. #endif // SSL_OP_NO_TLSv1
  11065. }
  11066. if (sock->SslAcceptSettings.Tls_Disable1_1)
  11067. {
  11068. #ifdef SSL_OP_NO_TLSv1_1
  11069. SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_TLSv1_1);
  11070. #endif // SSL_OP_NO_TLSv1_1
  11071. }
  11072. if (sock->SslAcceptSettings.Tls_Disable1_2)
  11073. {
  11074. #ifdef SSL_OP_NO_TLSv1_2
  11075. SSL_CTX_set_options(ssl_ctx, SSL_OP_NO_TLSv1_2);
  11076. #endif // SSL_OP_NO_TLSv1_2
  11077. }
  11078. Unlock(openssl_lock);
  11079. AddChainSslCertOnDirectory(ssl_ctx);
  11080. Lock(openssl_lock);
  11081. }
  11082. else
  11083. {
  11084. if (client_tls == false)
  11085. {
  11086. #if OPENSSL_VERSION_NUMBER < 0x10100000L
  11087. SSL_CTX_set_ssl_version(ssl_ctx, SSLv3_method());
  11088. #else
  11089. SSL_CTX_set_ssl_version(ssl_ctx, SSLv23_method());
  11090. #endif
  11091. }
  11092. else
  11093. {
  11094. SSL_CTX_set_ssl_version(ssl_ctx, SSLv23_client_method());
  11095. }
  11096. }
  11097. sock->ssl = SSL_new(ssl_ctx);
  11098. SSL_set_fd(sock->ssl, (int)sock->socket);
  11099. #ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
  11100. if (sock->ServerMode == false && client_tls)
  11101. {
  11102. if (IsEmptyStr(sni_hostname) == false)
  11103. {
  11104. // Set the SNI host name
  11105. SSL_set_tlsext_host_name(sock->ssl, sni_hostname);
  11106. }
  11107. }
  11108. #endif // SSL_CTRL_SET_TLSEXT_HOSTNAME
  11109. }
  11110. Unlock(openssl_lock);
  11111. if (x != NULL)
  11112. {
  11113. // Check the certificate and the private key
  11114. if (CheckXandK(x, priv))
  11115. {
  11116. // Use the certificate
  11117. x509 = x->x509;
  11118. key = priv->pkey;
  11119. Lock(openssl_lock);
  11120. {
  11121. SSL_use_certificate(sock->ssl, x509);
  11122. SSL_use_PrivateKey(sock->ssl, key);
  11123. }
  11124. Unlock(openssl_lock);
  11125. }
  11126. }
  11127. if (sock->WaitToUseCipher != NULL)
  11128. {
  11129. // Set the cipher algorithm name to want to use
  11130. Lock(openssl_lock);
  11131. {
  11132. SSL_set_cipher_list(sock->ssl, sock->WaitToUseCipher);
  11133. }
  11134. Unlock(openssl_lock);
  11135. }
  11136. if (sock->ServerMode)
  11137. {
  11138. // Lock(ssl_connect_lock);
  11139. // Run the time-out thread for SOLARIS
  11140. #ifdef UNIX_SOLARIS
  11141. ttparam = NewSocketTimeout(sock);
  11142. #endif // UNIX_SOLARIS
  11143. // Server mode
  11144. if (SSL_accept(sock->ssl) <= 0)
  11145. {
  11146. // Stop the timeout thread
  11147. #ifdef UNIX_SOLARIS
  11148. FreeSocketTimeout(ttparam);
  11149. #endif // UNIX_SOLARIS
  11150. // Unlock(ssl_connect_lock);
  11151. // SSL-Accept failure
  11152. Lock(openssl_lock);
  11153. {
  11154. SSL_free(sock->ssl);
  11155. sock->ssl = NULL;
  11156. }
  11157. Unlock(openssl_lock);
  11158. Unlock(sock->ssl_lock);
  11159. Debug("StartSSL Error: #5\n");
  11160. FreeSSLCtx(ssl_ctx);
  11161. return false;
  11162. }
  11163. #ifdef SSL_CTRL_SET_TLSEXT_HOSTNAME
  11164. #ifdef TLSEXT_NAMETYPE_host_name
  11165. if (true)
  11166. {
  11167. // Get the SNI host name
  11168. const char *sni_recv_hostname = SSL_get_servername(sock->ssl, TLSEXT_NAMETYPE_host_name);
  11169. if (IsEmptyStr((char *)sni_recv_hostname) == false)
  11170. {
  11171. StrCpy(sock->SniHostname, sizeof(sock->SniHostname), (char *)sni_recv_hostname);
  11172. }
  11173. }
  11174. #endif // TLSEXT_NAMETYPE_host_name
  11175. #endif // SSL_CTRL_SET_TLSEXT_HOSTNAME
  11176. // Stop the timeout thread
  11177. #ifdef UNIX_SOLARIS
  11178. FreeSocketTimeout(ttparam);
  11179. #endif // UNIX_SOLARIS
  11180. // Unlock(ssl_connect_lock);
  11181. }
  11182. else
  11183. {
  11184. prev_timeout = GetTimeout(sock);
  11185. SetTimeout(sock, ssl_timeout);
  11186. Lock(ssl_connect_lock);
  11187. // Client mode
  11188. if (SSL_connect(sock->ssl) <= 0)
  11189. {
  11190. Unlock(ssl_connect_lock);
  11191. // SSL-connect failure
  11192. Lock(openssl_lock);
  11193. {
  11194. SSL_free(sock->ssl);
  11195. sock->ssl = NULL;
  11196. }
  11197. Unlock(openssl_lock);
  11198. Unlock(sock->ssl_lock);
  11199. Debug("StartSSL Error: #5\n");
  11200. SetTimeout(sock, prev_timeout);
  11201. FreeSSLCtx(ssl_ctx);
  11202. return false;
  11203. }
  11204. Unlock(ssl_connect_lock);
  11205. SetTimeout(sock, prev_timeout);
  11206. }
  11207. // SSL communication is initiated
  11208. sock->SecureMode = true;
  11209. // Get the certificate of the remote host
  11210. Lock(openssl_lock);
  11211. {
  11212. x509 = SSL_get_peer_certificate(sock->ssl);
  11213. sock->SslVersion = SSL_get_version(sock->ssl);
  11214. }
  11215. Unlock(openssl_lock);
  11216. if (x509 == NULL)
  11217. {
  11218. // The certificate does not exist on the remote host
  11219. sock->RemoteX = NULL;
  11220. }
  11221. else
  11222. {
  11223. // Got a certificate
  11224. sock->RemoteX = X509ToX(x509);
  11225. }
  11226. // Get the certificate of local host
  11227. Lock(openssl_lock);
  11228. {
  11229. x509 = SSL_get_certificate(sock->ssl);
  11230. }
  11231. Unlock(openssl_lock);
  11232. if (x509 == NULL)
  11233. {
  11234. // The certificate does not exist on the remote host
  11235. sock->LocalX = NULL;
  11236. }
  11237. else
  11238. {
  11239. X *local_x;
  11240. // Got a certificate
  11241. local_x = X509ToX(x509);
  11242. local_x->do_not_free = true;
  11243. sock->LocalX = CloneX(local_x);
  11244. FreeX(local_x);
  11245. }
  11246. // Automatic retry mode
  11247. SSL_set_mode(sock->ssl, SSL_MODE_AUTO_RETRY);
  11248. // Strange flag
  11249. SSL_set_mode(sock->ssl, SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER);
  11250. sock->ssl_ctx = ssl_ctx;
  11251. // Get the algorithm name used to encrypt
  11252. Lock(openssl_lock);
  11253. {
  11254. sock->CipherName = CopyStr((char *)SSL_get_cipher(sock->ssl));
  11255. }
  11256. Unlock(openssl_lock);
  11257. Debug("SSL connected with %s\n", SSL_get_version(sock->ssl));
  11258. Unlock(sock->ssl_lock);
  11259. #ifdef ENABLE_SSL_LOGGING
  11260. if (sock->ServerMode)
  11261. {
  11262. SockEnableSslLogging(sock);
  11263. }
  11264. #endif // ENABLE_SSL_LOGGING
  11265. return true;
  11266. }
  11267. #ifdef ENABLE_SSL_LOGGING
  11268. // Enable SSL logging
  11269. void SockEnableSslLogging(SOCK *s)
  11270. {
  11271. char dirname[MAX_PATH];
  11272. char tmp[MAX_PATH];
  11273. char dtstr[MAX_PATH];
  11274. char fn1[MAX_PATH], fn2[MAX_PATH];
  11275. // Validate arguments
  11276. if (s == NULL)
  11277. {
  11278. return;
  11279. }
  11280. if (s->IsSslLoggingEnabled)
  11281. {
  11282. return;
  11283. }
  11284. s->IsSslLoggingEnabled = true;
  11285. GetDateTimeStrMilli64ForFileName(dtstr, sizeof(dtstr), LocalTime64());
  11286. Format(tmp, sizeof(tmp), "%s__%r_%u__%r_%u", dtstr,
  11287. &s->LocalIP, s->LocalPort, &s->RemoteIP, s->RemotePort);
  11288. CombinePath(dirname, sizeof(dirname), SSL_LOGGING_DIRNAME, tmp);
  11289. MakeDirEx(dirname);
  11290. CombinePath(fn1, sizeof(fn1), dirname, "send.c");
  11291. CombinePath(fn2, sizeof(fn2), dirname, "recv.c");
  11292. s->SslLogging_Send = FileCreate(fn1);
  11293. s->SslLogging_Recv = FileCreate(fn2);
  11294. s->SslLogging_Lock = NewLock();
  11295. }
  11296. // Close SSL logging
  11297. void SockCloseSslLogging(SOCK *s)
  11298. {
  11299. // Validate arguments
  11300. if (s == NULL)
  11301. {
  11302. return;
  11303. }
  11304. if (s->IsSslLoggingEnabled == false)
  11305. {
  11306. return;
  11307. }
  11308. s->IsSslLoggingEnabled = false;
  11309. FileClose(s->SslLogging_Recv);
  11310. s->SslLogging_Recv = NULL;
  11311. FileClose(s->SslLogging_Send);
  11312. s->SslLogging_Send = NULL;
  11313. DeleteLock(s->SslLogging_Lock);
  11314. s->SslLogging_Lock = NULL;
  11315. }
  11316. // Write SSL log
  11317. void SockWriteSslLog(SOCK *s, void *send_data, UINT send_size, void *recv_data, UINT recv_size)
  11318. {
  11319. // Validate arguments
  11320. if (s == NULL)
  11321. {
  11322. return;
  11323. }
  11324. if (s->IsSslLoggingEnabled == false)
  11325. {
  11326. return;
  11327. }
  11328. Lock(s->SslLogging_Lock);
  11329. {
  11330. if (s->SslLogging_Send != NULL)
  11331. {
  11332. if (send_size >= 1 && send_data != NULL)
  11333. {
  11334. FileWrite(s->SslLogging_Send, send_data, send_size);
  11335. }
  11336. }
  11337. if (s->SslLogging_Recv != NULL)
  11338. {
  11339. if (recv_size >= 1 && recv_data != NULL)
  11340. {
  11341. FileWrite(s->SslLogging_Recv, recv_data, recv_size);
  11342. }
  11343. }
  11344. }
  11345. Unlock(s->SslLogging_Lock);
  11346. }
  11347. #endif // ENABLE_SSL_LOGGING
  11348. // Set the flag to indicate that the socket doesn't require reading
  11349. void SetNoNeedToRead(SOCK *sock)
  11350. {
  11351. // Validate arguments
  11352. if (sock == NULL)
  11353. {
  11354. return;
  11355. }
  11356. sock->NoNeedToRead = true;
  11357. }
  11358. // TCP-SSL receive
  11359. UINT SecureRecv(SOCK *sock, void *data, UINT size)
  11360. {
  11361. SOCKET s;
  11362. int ret, e = 0;
  11363. SSL *ssl;
  11364. #ifdef UNIX_SOLARIS
  11365. SOCKET_TIMEOUT_PARAM *ttparam;
  11366. #endif //UNIX_SOLARIS
  11367. s = sock->socket;
  11368. ssl = sock->ssl;
  11369. if (sock->AsyncMode)
  11370. {
  11371. // Confirm whether the data is readable even 1 byte in the case of asynchronous mode.
  11372. // To read data results blocking, if there is no readable data.
  11373. // We must avoid blocking.
  11374. char c;
  11375. Lock(sock->ssl_lock);
  11376. {
  11377. if (sock->Connected == false)
  11378. {
  11379. Unlock(sock->ssl_lock);
  11380. Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11381. return 0;
  11382. }
  11383. ret = SSL_peek(ssl, &c, sizeof(c));
  11384. }
  11385. Unlock(sock->ssl_lock);
  11386. if (ret == 0)
  11387. {
  11388. // The communication have been disconnected
  11389. Disconnect(sock);
  11390. Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11391. return 0;
  11392. }
  11393. if (ret < 0)
  11394. {
  11395. // An error has occurred
  11396. e = SSL_get_error(ssl, ret);
  11397. if (e == SSL_ERROR_WANT_READ || e == SSL_ERROR_WANT_WRITE || e == SSL_ERROR_SSL)
  11398. {
  11399. if (e == SSL_ERROR_SSL
  11400. #if OPENSSL_VERSION_NUMBER < 0x10100000L
  11401. &&
  11402. sock->ssl->s3->send_alert[0] == SSL3_AL_FATAL &&
  11403. sock->ssl->s3->send_alert[0] != sock->Ssl_Init_Async_SendAlert[0] &&
  11404. sock->ssl->s3->send_alert[1] != sock->Ssl_Init_Async_SendAlert[1]
  11405. #endif
  11406. )
  11407. {
  11408. Debug("%s %u SSL Fatal Error on ASYNC socket !!!\n", __FILE__, __LINE__);
  11409. Disconnect(sock);
  11410. return 0;
  11411. }
  11412. // Packet has not arrived yet, that is not to be read
  11413. return SOCK_LATER;
  11414. }
  11415. }
  11416. }
  11417. // Receive
  11418. Lock(sock->ssl_lock);
  11419. {
  11420. if (sock->Connected == false)
  11421. {
  11422. Unlock(sock->ssl_lock);
  11423. Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11424. return 0;
  11425. }
  11426. #ifdef OS_UNIX
  11427. if (sock->AsyncMode == false)
  11428. {
  11429. sock->CallingThread = pthread_self();
  11430. }
  11431. #endif // OS_UNIX
  11432. // Run the time-out thread for SOLARIS
  11433. #ifdef UNIX_SOLARIS
  11434. ttparam = NewSocketTimeout(sock);
  11435. #endif // UNIX_SOLARIS
  11436. ret = SSL_read(ssl, data, size);
  11437. // Stop the timeout thread
  11438. #ifdef UNIX_SOLARIS
  11439. FreeSocketTimeout(ttparam);
  11440. #endif // UNIX_SOLARIS
  11441. #ifdef OS_UNIX
  11442. if (sock->AsyncMode == false)
  11443. {
  11444. sock->CallingThread = 0;
  11445. }
  11446. #endif // OS_UNIX
  11447. if (ret < 0)
  11448. {
  11449. e = SSL_get_error(ssl, ret);
  11450. }
  11451. }
  11452. Unlock(sock->ssl_lock);
  11453. #ifdef ENABLE_SSL_LOGGING
  11454. if (ret > 0)
  11455. {
  11456. SockWriteSslLog(sock, NULL, 0, data, ret);
  11457. }
  11458. #endif // ENABLE_SSL_LOGGING
  11459. if (ret > 0)
  11460. {
  11461. // Successful reception
  11462. sock->RecvSize += (UINT64)ret;
  11463. sock->RecvNum++;
  11464. return (UINT)ret;
  11465. }
  11466. if (ret == 0)
  11467. {
  11468. // Disconnect the communication
  11469. Disconnect(sock);
  11470. //Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11471. return 0;
  11472. }
  11473. if (sock->AsyncMode)
  11474. {
  11475. if (e == SSL_ERROR_WANT_READ || e == SSL_ERROR_WANT_WRITE || e == SSL_ERROR_SSL)
  11476. {
  11477. if (e == SSL_ERROR_SSL
  11478. #if OPENSSL_VERSION_NUMBER < 0x10100000L
  11479. &&
  11480. sock->ssl->s3->send_alert[0] == SSL3_AL_FATAL &&
  11481. sock->ssl->s3->send_alert[0] != sock->Ssl_Init_Async_SendAlert[0] &&
  11482. sock->ssl->s3->send_alert[1] != sock->Ssl_Init_Async_SendAlert[1]
  11483. #endif
  11484. )
  11485. {
  11486. Debug("%s %u SSL Fatal Error on ASYNC socket !!!\n", __FILE__, __LINE__);
  11487. Disconnect(sock);
  11488. return 0;
  11489. }
  11490. // Packet has not yet arrived
  11491. return SOCK_LATER;
  11492. }
  11493. }
  11494. Disconnect(sock);
  11495. Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11496. return 0;
  11497. }
  11498. // TCP-SSL transmission
  11499. UINT SecureSend(SOCK *sock, void *data, UINT size)
  11500. {
  11501. SOCKET s;
  11502. int ret, e;
  11503. SSL *ssl;
  11504. s = sock->socket;
  11505. ssl = sock->ssl;
  11506. if (sock->AsyncMode)
  11507. {
  11508. // Asynchronous mode
  11509. SSL_set_mode(ssl, SSL_MODE_ENABLE_PARTIAL_WRITE);
  11510. }
  11511. // Transmission
  11512. Lock(sock->ssl_lock);
  11513. {
  11514. if (sock->Connected == false)
  11515. {
  11516. Unlock(sock->ssl_lock);
  11517. Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11518. return 0;
  11519. }
  11520. ret = SSL_write(ssl, data, size);
  11521. if (ret < 0)
  11522. {
  11523. e = SSL_get_error(ssl, ret);
  11524. }
  11525. }
  11526. Unlock(sock->ssl_lock);
  11527. #ifdef ENABLE_SSL_LOGGING
  11528. if (ret > 0)
  11529. {
  11530. SockWriteSslLog(sock, data, ret, NULL, 0);
  11531. }
  11532. #endif // ENABLE_SSL_LOGGING
  11533. if (ret > 0)
  11534. {
  11535. // Successful transmission
  11536. sock->SendSize += (UINT64)ret;
  11537. sock->SendNum++;
  11538. sock->WriteBlocked = false;
  11539. return (UINT)ret;
  11540. }
  11541. if (ret == 0)
  11542. {
  11543. // Disconnect
  11544. Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11545. Disconnect(sock);
  11546. return 0;
  11547. }
  11548. if (sock->AsyncMode)
  11549. {
  11550. // Confirmation of the error value
  11551. if (e == SSL_ERROR_WANT_READ || e == SSL_ERROR_WANT_WRITE || e == SSL_ERROR_SSL)
  11552. {
  11553. sock->WriteBlocked = true;
  11554. return SOCK_LATER;
  11555. }
  11556. Debug("%s %u e=%u\n", __FILE__, __LINE__, e);
  11557. }
  11558. //Debug("%s %u SecureRecv() Disconnect\n", __FILE__, __LINE__);
  11559. Disconnect(sock);
  11560. return 0;
  11561. }
  11562. // Peep the TCP
  11563. UINT Peek(SOCK *sock, void *data, UINT size)
  11564. {
  11565. SOCKET s;
  11566. int ret;
  11567. // Validate arguments
  11568. if (sock == NULL || data == NULL || size == 0)
  11569. {
  11570. return 0;
  11571. }
  11572. if (sock->Type == SOCK_INPROC)
  11573. {
  11574. return 0;
  11575. }
  11576. if (sock->Type != SOCK_TCP || sock->Connected == false || sock->ListenMode != false ||
  11577. sock->socket == INVALID_SOCKET)
  11578. {
  11579. return 0;
  11580. }
  11581. if (sock->AsyncMode)
  11582. {
  11583. return 0;
  11584. }
  11585. // Receive
  11586. s = sock->socket;
  11587. ret = recv(s, data, size, MSG_PEEK);
  11588. //Debug("Peek: %u\n", ret);
  11589. if (ret > 0)
  11590. {
  11591. return ret;
  11592. }
  11593. return 0;
  11594. }
  11595. // TCP receive
  11596. UINT Recv(SOCK *sock, void *data, UINT size, bool secure)
  11597. {
  11598. SOCKET s;
  11599. int ret;
  11600. #ifdef UNIX_SOLARIS
  11601. SOCKET_TIMEOUT_PARAM *ttparam;
  11602. #endif //UNIX_SOLARIS
  11603. // Validate arguments
  11604. if (sock == NULL || data == NULL || size == 0)
  11605. {
  11606. return 0;
  11607. }
  11608. sock->NoNeedToRead = false;
  11609. if (sock->Type == SOCK_INPROC)
  11610. {
  11611. return RecvInProc(sock, data, size);
  11612. }
  11613. if (sock->Type != SOCK_TCP || sock->Connected == false || sock->ListenMode != false ||
  11614. sock->socket == INVALID_SOCKET)
  11615. {
  11616. return 0;
  11617. }
  11618. if (secure != false && sock->SecureMode == false)
  11619. {
  11620. return 0;
  11621. }
  11622. if (secure)
  11623. {
  11624. return SecureRecv(sock, data, size);
  11625. }
  11626. // Receive
  11627. s = sock->socket;
  11628. #ifdef OS_UNIX
  11629. if (sock->AsyncMode == false)
  11630. {
  11631. sock->CallingThread = pthread_self();
  11632. }
  11633. #endif // OS_UNIX
  11634. // Start of the timeout thread for SOLARIS
  11635. #ifdef UNIX_SOLARIS
  11636. ttparam = NewSocketTimeout(sock);
  11637. #endif // UNIX_SOLARIS
  11638. ret = recv(s, data, size, 0);
  11639. // Stop the timeout thread
  11640. #ifdef UNIX_SOLARIS
  11641. FreeSocketTimeout(ttparam);
  11642. #endif // UNIX_SOLARIS
  11643. #ifdef OS_UNIX
  11644. if (sock->AsyncMode == false)
  11645. {
  11646. sock->CallingThread = 0;
  11647. }
  11648. #endif // OS_UNIX
  11649. if (ret > 0)
  11650. {
  11651. // Successful reception
  11652. Lock(sock->lock);
  11653. {
  11654. sock->RecvSize += (UINT64)ret;
  11655. sock->SendNum++;
  11656. }
  11657. Unlock(sock->lock);
  11658. return (UINT)ret;
  11659. }
  11660. // Transmission failure
  11661. if (sock->AsyncMode)
  11662. {
  11663. // In asynchronous mode, examine the error
  11664. if (ret == SOCKET_ERROR)
  11665. {
  11666. #ifdef OS_WIN32
  11667. if (WSAGetLastError() == WSAEWOULDBLOCK)
  11668. {
  11669. // In blocking
  11670. return SOCK_LATER;
  11671. }
  11672. else
  11673. {
  11674. //Debug("Socket Error: %u\n", WSAGetLastError());
  11675. }
  11676. #else // OS_WIN32
  11677. if (errno == EAGAIN)
  11678. {
  11679. // In blocking
  11680. return SOCK_LATER;
  11681. }
  11682. #endif // OS_WIN32
  11683. }
  11684. }
  11685. // Disconnected
  11686. Disconnect(sock);
  11687. return 0;
  11688. }
  11689. // TCP transmission
  11690. UINT Send(SOCK *sock, void *data, UINT size, bool secure)
  11691. {
  11692. SOCKET s;
  11693. int ret;
  11694. // Validate arguments
  11695. if (sock == NULL || data == NULL || size == 0)
  11696. {
  11697. return 0;
  11698. }
  11699. if (sock->Type == SOCK_INPROC)
  11700. {
  11701. return SendInProc(sock, data, size);
  11702. }
  11703. size = MIN(size, MAX_SEND_BUF_MEM_SIZE);
  11704. if (sock->Type != SOCK_TCP || sock->Connected == false || sock->ListenMode != false ||
  11705. sock->socket == INVALID_SOCKET)
  11706. {
  11707. return 0;
  11708. }
  11709. if (secure != false && sock->SecureMode == false)
  11710. {
  11711. return 0;
  11712. }
  11713. if (secure)
  11714. {
  11715. return SecureSend(sock, data, size);
  11716. }
  11717. // Transmission
  11718. s = sock->socket;
  11719. ret = send(s, data, size, 0);
  11720. if (ret > 0)
  11721. {
  11722. // Successful transmission
  11723. Lock(sock->lock);
  11724. {
  11725. sock->SendSize += (UINT64)ret;
  11726. sock->SendNum++;
  11727. }
  11728. Unlock(sock->lock);
  11729. sock->WriteBlocked = false;
  11730. return (UINT)ret;
  11731. }
  11732. // Transmission failure
  11733. if (sock->AsyncMode)
  11734. {
  11735. // In asynchronous mode, examine the error
  11736. if (ret == SOCKET_ERROR)
  11737. {
  11738. #ifdef OS_WIN32
  11739. if (WSAGetLastError() == WSAEWOULDBLOCK)
  11740. {
  11741. // In blocking
  11742. sock->WriteBlocked = true;
  11743. return SOCK_LATER;
  11744. }
  11745. else
  11746. {
  11747. //Debug("Socket Error: %u\n", WSAGetLastError());
  11748. }
  11749. #else // OS_WIN32
  11750. if (errno == EAGAIN)
  11751. {
  11752. // In blocking
  11753. sock->WriteBlocked = true;
  11754. return SOCK_LATER;
  11755. }
  11756. #endif // OS_WIN32
  11757. }
  11758. }
  11759. // Disconnected
  11760. Disconnect(sock);
  11761. return 0;
  11762. }
  11763. // Get the time-out value (in milliseconds)
  11764. UINT GetTimeout(SOCK *sock)
  11765. {
  11766. // Validate arguments
  11767. if (sock == NULL)
  11768. {
  11769. return INFINITE;
  11770. }
  11771. if (sock->Type != SOCK_TCP && sock->Type != SOCK_INPROC)
  11772. {
  11773. return INFINITE;
  11774. }
  11775. return sock->TimeOut;
  11776. }
  11777. // Setting the time-out value (in milliseconds)
  11778. void SetTimeout(SOCK *sock, UINT timeout)
  11779. {
  11780. // Validate arguments
  11781. if (sock == NULL)
  11782. {
  11783. return;
  11784. }
  11785. if (sock->Type == SOCK_UDP)
  11786. {
  11787. return;
  11788. }
  11789. if (timeout == INFINITE)
  11790. {
  11791. timeout = TIMEOUT_INFINITE;
  11792. }
  11793. sock->TimeOut = timeout;
  11794. // Debug("SetTimeout(%u)\n",timeout);
  11795. if (sock->Type != SOCK_INPROC)
  11796. {
  11797. #ifdef OS_WIN32
  11798. setsockopt(sock->socket, SOL_SOCKET, SO_SNDTIMEO, (char *)&timeout, sizeof(UINT));
  11799. setsockopt(sock->socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&timeout, sizeof(UINT));
  11800. #endif
  11801. #ifdef OS_UNIX
  11802. #ifndef UNIX_SOLARIS
  11803. {
  11804. struct timeval tv_timeout;
  11805. tv_timeout.tv_sec = timeout / 1000; // miliseconds to seconds
  11806. tv_timeout.tv_usec = (timeout % 1000) * 1000; // miliseconds to microseconds
  11807. setsockopt(sock->socket, SOL_SOCKET, SO_SNDTIMEO, (char *)&tv_timeout, sizeof(tv_timeout));
  11808. setsockopt(sock->socket, SOL_SOCKET, SO_RCVTIMEO, (char *)&tv_timeout, sizeof(tv_timeout));
  11809. }
  11810. #endif // UNIX_SOLARIS
  11811. #endif // OS_UNIX
  11812. }
  11813. }
  11814. // Disable GetHostName call by accepting new TCP connection
  11815. void DisableGetHostNameWhenAcceptInit()
  11816. {
  11817. disable_gethostname_by_accept = true;
  11818. }
  11819. // Initialize the connection acceptance
  11820. void AcceptInit(SOCK *s)
  11821. {
  11822. AcceptInitEx(s, false);
  11823. }
  11824. void AcceptInitEx(SOCK *s, bool no_lookup_hostname)
  11825. {
  11826. char tmp[MAX_SIZE];
  11827. // Validate arguments
  11828. if (s == NULL)
  11829. {
  11830. return;
  11831. }
  11832. Zero(tmp, sizeof(tmp));
  11833. if (disable_gethostname_by_accept == false && no_lookup_hostname == false)
  11834. {
  11835. if (GetHostName(tmp, sizeof(tmp), &s->RemoteIP) == false ||
  11836. IsEmptyStr(tmp))
  11837. {
  11838. IPToStr(tmp, sizeof(tmp), &s->RemoteIP);
  11839. }
  11840. }
  11841. else
  11842. {
  11843. IPToStr(tmp, sizeof(tmp), &s->RemoteIP);
  11844. }
  11845. if (s->RemoteHostname != NULL)
  11846. {
  11847. Free(s->RemoteHostname);
  11848. }
  11849. s->RemoteHostname = CopyStr(tmp);
  11850. }
  11851. // TCP connection acceptance (IPv4)
  11852. SOCK *Accept(SOCK *sock)
  11853. {
  11854. SOCK *ret;
  11855. SOCKET s, new_socket;
  11856. int size;
  11857. struct sockaddr_in addr;
  11858. bool true_flag = true;
  11859. // Validate arguments
  11860. if (sock == NULL)
  11861. {
  11862. return NULL;
  11863. }
  11864. if (sock->Type == SOCK_INPROC)
  11865. {
  11866. return AcceptInProc(sock);
  11867. }
  11868. if (sock->Type == SOCK_REVERSE_LISTEN)
  11869. {
  11870. return AcceptReverse(sock);
  11871. }
  11872. if (sock->Type == SOCK_RUDP_LISTEN)
  11873. {
  11874. return AcceptRUDP(sock);
  11875. }
  11876. if (sock->ListenMode == false || sock->Type != SOCK_TCP || sock->ServerMode == false)
  11877. {
  11878. return NULL;
  11879. }
  11880. if (sock->CancelAccept)
  11881. {
  11882. return NULL;
  11883. }
  11884. if (sock->IPv6)
  11885. {
  11886. return Accept6(sock);
  11887. }
  11888. s = sock->socket;
  11889. if (s == INVALID_SOCKET)
  11890. {
  11891. return NULL;
  11892. }
  11893. Zero(&addr, sizeof(addr));
  11894. size = sizeof(addr);
  11895. #ifdef OS_UNIX
  11896. #if defined(UNIX_LINUX) || defined(UNIX_MACOS)
  11897. UnixIgnoreSignalForThread(SIGUSR1);
  11898. #endif // defined(UNIX_LINUX) || defined(UNIX_MACOS)
  11899. sock->CallingThread = pthread_self();
  11900. #endif // OS_UNIX
  11901. #ifdef OS_WIN32
  11902. if (sock->EnableConditionalAccept)
  11903. {
  11904. new_socket = Win32Accept(sock, s, (struct sockaddr *)&addr,(int *)&size, false);
  11905. }
  11906. else
  11907. {
  11908. new_socket = accept(s, (struct sockaddr *)&addr,(int *)&size);
  11909. }
  11910. #else // OS_WIN32
  11911. new_socket = accept(s, (struct sockaddr *)&addr,(int *)&size);
  11912. #endif // OS_WIN32
  11913. #ifdef OS_UNIX
  11914. sock->CallingThread = 0;
  11915. #endif // OS_UNIX
  11916. if (new_socket == INVALID_SOCKET)
  11917. {
  11918. if (sock->CancelAccept)
  11919. {
  11920. sock->AcceptCanceled = true;
  11921. }
  11922. return NULL;
  11923. }
  11924. if (sock->CancelAccept)
  11925. {
  11926. sock->AcceptCanceled = true;
  11927. closesocket(new_socket);
  11928. return NULL;
  11929. }
  11930. ret = NewSock();
  11931. ret->socket = new_socket;
  11932. ret->Connected = true;
  11933. ret->AsyncMode = false;
  11934. ret->Type = SOCK_TCP;
  11935. ret->ServerMode = true;
  11936. ret->SecureMode = false;
  11937. // Configuring the TCP options
  11938. setsockopt(ret->socket, IPPROTO_TCP, TCP_NODELAY, (char *)&true_flag, sizeof(bool));
  11939. // Initialization of the time-out value
  11940. SetTimeout(ret, TIMEOUT_INFINITE);
  11941. // Socket information
  11942. QuerySocketInformation(ret);
  11943. if (IsLocalHostIP(&ret->RemoteIP) == false)
  11944. {
  11945. ret->IpClientAdded = true;
  11946. AddIpClient(&ret->RemoteIP);
  11947. }
  11948. if (IsZeroIp(&sock->LocalIP) == false && IsLocalHostIP(&sock->LocalIP) == false)
  11949. {
  11950. IP current_ip;
  11951. if (GetCurrentGlobalIP(&current_ip, false) == false)
  11952. {
  11953. SetCurrentGlobalIP(&sock->LocalIP, false);
  11954. }
  11955. }
  11956. StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_NATIVE_V4);
  11957. AddProtocolDetailsStr(ret->ProtocolDetails, sizeof(ret->ProtocolDetails), "IPv4");
  11958. return ret;
  11959. }
  11960. // TCP connection acceptance (IPv6)
  11961. SOCK *Accept6(SOCK *sock)
  11962. {
  11963. SOCK *ret;
  11964. SOCKET s, new_socket;
  11965. int size;
  11966. struct sockaddr_in6 addr;
  11967. bool true_flag = true;
  11968. // Validate arguments
  11969. if (sock == NULL)
  11970. {
  11971. return NULL;
  11972. }
  11973. if (sock->ListenMode == false || sock->Type != SOCK_TCP || sock->ServerMode == false)
  11974. {
  11975. return NULL;
  11976. }
  11977. if (sock->CancelAccept)
  11978. {
  11979. return NULL;
  11980. }
  11981. if (sock->IPv6 == false)
  11982. {
  11983. return NULL;
  11984. }
  11985. s = sock->socket;
  11986. if (s == INVALID_SOCKET)
  11987. {
  11988. return NULL;
  11989. }
  11990. Zero(&addr, sizeof(addr));
  11991. size = sizeof(addr);
  11992. #ifdef OS_UNIX
  11993. #if defined(UNIX_LINUX) || defined(UNIX_MACOS)
  11994. UnixIgnoreSignalForThread(SIGUSR1);
  11995. #endif // defined(UNIX_LINUX) || defined(UNIX_MACOS)
  11996. sock->CallingThread = pthread_self();
  11997. #endif // OS_UNIX
  11998. #ifdef OS_WIN32
  11999. if (sock->EnableConditionalAccept)
  12000. {
  12001. new_socket = Win32Accept(sock, s, (struct sockaddr *)&addr,(int *)&size, true);
  12002. }
  12003. else
  12004. {
  12005. new_socket = accept(s, (struct sockaddr *)&addr,(int *)&size);
  12006. }
  12007. #else // OS_WIN32
  12008. new_socket = accept(s, (struct sockaddr *)&addr,(int *)&size);
  12009. #endif // OS_WIN32
  12010. #ifdef OS_UNIX
  12011. sock->CallingThread = 0;
  12012. #endif // OS_UNIX
  12013. if (new_socket == INVALID_SOCKET)
  12014. {
  12015. if (sock->CancelAccept)
  12016. {
  12017. sock->AcceptCanceled = true;
  12018. }
  12019. return NULL;
  12020. }
  12021. if (sock->CancelAccept)
  12022. {
  12023. sock->AcceptCanceled = true;
  12024. closesocket(new_socket);
  12025. return NULL;
  12026. }
  12027. ret = NewSock();
  12028. ret->socket = new_socket;
  12029. ret->Connected = true;
  12030. ret->AsyncMode = false;
  12031. ret->Type = SOCK_TCP;
  12032. ret->ServerMode = true;
  12033. ret->SecureMode = false;
  12034. // Configuring the TCP options
  12035. setsockopt(ret->socket, IPPROTO_TCP, TCP_NODELAY, (char *)&true_flag, sizeof(bool));
  12036. // Initialize the time-out value
  12037. SetTimeout(ret, TIMEOUT_INFINITE);
  12038. // Socket information
  12039. QuerySocketInformation(ret);
  12040. if (IsLocalHostIP(&ret->RemoteIP) == false)
  12041. {
  12042. ret->IpClientAdded = true;
  12043. AddIpClient(&ret->RemoteIP);
  12044. }
  12045. if (IsZeroIp(&sock->LocalIP) == false && IsLocalHostIP(&sock->LocalIP) == false)
  12046. {
  12047. IP current_ip;
  12048. if (GetCurrentGlobalIP(&current_ip, true) == false)
  12049. {
  12050. SetCurrentGlobalIP(&sock->LocalIP, true);
  12051. }
  12052. }
  12053. StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_NATIVE_V6);
  12054. AddProtocolDetailsStr(ret->ProtocolDetails, sizeof(ret->ProtocolDetails), "IPv6");
  12055. return ret;
  12056. }
  12057. // Standby for TCP (IPv6)
  12058. SOCK *Listen6(UINT port)
  12059. {
  12060. return ListenEx6(port, false);
  12061. }
  12062. SOCK *ListenEx6(UINT port, bool local_only)
  12063. {
  12064. return ListenEx62(port, local_only, false);
  12065. }
  12066. SOCK *ListenEx62(UINT port, bool local_only, bool enable_ca)
  12067. {
  12068. SOCKET s;
  12069. SOCK *sock;
  12070. struct sockaddr_in6 addr;
  12071. struct in6_addr in;
  12072. bool true_flag = true;
  12073. bool disable_conditional_accept = false;
  12074. IP localhost;
  12075. UINT backlog = SOMAXCONN;
  12076. // Validate arguments
  12077. if (port == 0 || port >= 65536)
  12078. {
  12079. return NULL;
  12080. }
  12081. #ifdef OS_WIN32
  12082. if (MsIsVista() == false)
  12083. {
  12084. // Disable the Conditional Accept due to a bug in Windows
  12085. enable_ca = false;
  12086. }
  12087. #endif // OS_WIN32
  12088. // Initialization
  12089. Zero(&addr, sizeof(addr));
  12090. Zero(&in, sizeof(in));
  12091. GetLocalHostIP6(&localhost);
  12092. addr.sin6_port = htons((UINT)port);
  12093. addr.sin6_family = AF_INET6;
  12094. if (local_only)
  12095. {
  12096. IPToInAddr6(&addr.sin6_addr, &localhost);
  12097. enable_ca = false;
  12098. }
  12099. // Creating a socket
  12100. s = socket(AF_INET6, SOCK_STREAM, 0);
  12101. if (s == INVALID_SOCKET)
  12102. {
  12103. return NULL;
  12104. }
  12105. #ifdef OS_UNIX
  12106. // It is necessary to set the IPv6 Only flag on a UNIX system
  12107. setsockopt(s, IPPROTO_IPV6, IPV6_V6ONLY, &true_flag, sizeof(true_flag));
  12108. #endif // OS_UNIX
  12109. //SetSocketSendRecvBufferSize(s, SOCKET_BUFFER_SIZE);
  12110. #ifdef OS_UNIX
  12111. // This only have enabled for UNIX system since there is a bug
  12112. // in the implementation of REUSEADDR in Windows OS
  12113. setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&true_flag, sizeof(bool));
  12114. #endif // OS_UNIX
  12115. if (bind(s, (struct sockaddr *)&addr, sizeof(struct sockaddr_in6)) != 0)
  12116. {
  12117. // Bind failure
  12118. closesocket(s);
  12119. return NULL;
  12120. }
  12121. #ifdef OS_WIN32
  12122. if (enable_ca)
  12123. {
  12124. if (MsIsWinXPOrGreater())
  12125. {
  12126. setsockopt(s, SOL_SOCKET, SO_CONDITIONAL_ACCEPT, (char *)&true_flag, sizeof(bool));
  12127. backlog = 1;
  12128. }
  12129. }
  12130. #endif // OS_WIN32
  12131. if (listen(s, backlog))
  12132. {
  12133. // Listen failure
  12134. closesocket(s);
  12135. return NULL;
  12136. }
  12137. // Success
  12138. sock = NewSock();
  12139. sock->Connected = false;
  12140. sock->AsyncMode = false;
  12141. sock->ServerMode = true;
  12142. sock->Type = SOCK_TCP;
  12143. sock->socket = s;
  12144. sock->ListenMode = true;
  12145. sock->SecureMode = false;
  12146. sock->LocalPort = port;
  12147. sock->IPv6 = true;
  12148. sock->LocalOnly = local_only;
  12149. sock->EnableConditionalAccept = enable_ca;
  12150. return sock;
  12151. }
  12152. // Standby for the TCP
  12153. SOCK *Listen(UINT port)
  12154. {
  12155. return ListenEx(port, false);
  12156. }
  12157. SOCK *ListenEx(UINT port, bool local_only)
  12158. {
  12159. return ListenEx2(port, local_only, false);
  12160. }
  12161. SOCK *ListenEx2(UINT port, bool local_only, bool enable_ca)
  12162. {
  12163. SOCKET s;
  12164. SOCK *sock;
  12165. struct sockaddr_in addr;
  12166. struct in_addr in;
  12167. bool true_flag = true;
  12168. IP localhost;
  12169. UINT backlog = SOMAXCONN;
  12170. // Validate arguments
  12171. if (port == 0 || port >= 65536)
  12172. {
  12173. return NULL;
  12174. }
  12175. #ifdef OS_WIN32
  12176. if (MsIsVista() == false)
  12177. {
  12178. // Disable the Conditional Accept due to a bug in Windows
  12179. enable_ca = false;
  12180. }
  12181. #endif // OS_WIN32
  12182. // Initialization
  12183. Zero(&addr, sizeof(addr));
  12184. Zero(&in, sizeof(in));
  12185. SetIP(&localhost, 127, 0, 0, 1);
  12186. addr.sin_port = htons((UINT)port);
  12187. *((UINT *)&addr.sin_addr) = htonl(INADDR_ANY);
  12188. addr.sin_family = AF_INET;
  12189. if (local_only)
  12190. {
  12191. IPToInAddr(&addr.sin_addr, &localhost);
  12192. enable_ca = false;
  12193. }
  12194. // Creating a socket
  12195. s = socket(AF_INET, SOCK_STREAM, 0);
  12196. if (s == INVALID_SOCKET)
  12197. {
  12198. return NULL;
  12199. }
  12200. //SetSocketSendRecvBufferSize(s, SOCKET_BUFFER_SIZE);
  12201. #ifdef OS_UNIX
  12202. // This only have enabled for UNIX system since there is a bug
  12203. // in the implementation of REUSEADDR in Windows OS
  12204. setsockopt(s, SOL_SOCKET, SO_REUSEADDR, (char *)&true_flag, sizeof(bool));
  12205. #endif // OS_UNIX
  12206. if (bind(s, (struct sockaddr *)&addr, sizeof(struct sockaddr_in)) != 0)
  12207. {
  12208. // Bind failure
  12209. closesocket(s);
  12210. return NULL;
  12211. }
  12212. #ifdef OS_WIN32
  12213. if (enable_ca)
  12214. {
  12215. if (MsIsWinXPOrGreater())
  12216. {
  12217. setsockopt(s, SOL_SOCKET, SO_CONDITIONAL_ACCEPT, (char *)&true_flag, sizeof(bool));
  12218. backlog = 1;
  12219. }
  12220. }
  12221. #endif // OS_WIN32
  12222. if (listen(s, backlog))
  12223. {
  12224. // Listen failure
  12225. closesocket(s);
  12226. return NULL;
  12227. }
  12228. // Success
  12229. sock = NewSock();
  12230. sock->Connected = false;
  12231. sock->AsyncMode = false;
  12232. sock->ServerMode = true;
  12233. sock->Type = SOCK_TCP;
  12234. sock->socket = s;
  12235. sock->ListenMode = true;
  12236. sock->SecureMode = false;
  12237. sock->LocalPort = port;
  12238. sock->LocalOnly = local_only;
  12239. sock->EnableConditionalAccept = enable_ca;
  12240. return sock;
  12241. }
  12242. // TCP disconnect
  12243. void Disconnect(SOCK *sock)
  12244. {
  12245. SOCKET s;
  12246. bool true_flag = true;
  12247. bool false_flag = false;
  12248. // Validate arguments
  12249. if (sock == NULL)
  12250. {
  12251. return;
  12252. }
  12253. sock->Disconnecting = true;
  12254. #ifdef ENABLE_SSL_LOGGING
  12255. SockCloseSslLogging(sock);
  12256. #endif // ENABLE_SSL_LOGGING
  12257. #ifdef OS_UNIX
  12258. UnixFreeAsyncSocket(sock);
  12259. #endif // UnixFreeAsyncSocket
  12260. if (sock->Type == SOCK_TCP && sock->ListenMode)
  12261. {
  12262. bool no_tcp_check_port = false;
  12263. // Connect to localhost if the socket is in listening
  12264. sock->CancelAccept = true;
  12265. #if defined(UNIX_LINUX) || defined(UNIX_MACOS)
  12266. {
  12267. pthread_t t = sock->CallingThread;
  12268. // Send a signal to the socket to abort accept() forcibly on Linux
  12269. if (t != 0)
  12270. {
  12271. pthread_kill(t, SIGUSR1);
  12272. SleepThread(200);
  12273. }
  12274. }
  12275. #endif // defined(UNIX_LINUX) || defined(UNIX_MACOS)
  12276. #ifdef OS_WIN32
  12277. if (sock->hAcceptEvent != NULL)
  12278. {
  12279. SetEvent(sock->hAcceptEvent);
  12280. no_tcp_check_port = true;
  12281. }
  12282. #endif // OS_WIN32
  12283. if (sock->AcceptCanceled == false)
  12284. {
  12285. if (no_tcp_check_port == false)
  12286. {
  12287. if (sock->IPv6 == false)
  12288. {
  12289. CheckTCPPort("127.0.0.1", sock->LocalPort);
  12290. }
  12291. else
  12292. {
  12293. CheckTCPPort("::1", sock->LocalPort);
  12294. }
  12295. }
  12296. }
  12297. }
  12298. Lock(disconnect_function_lock);
  12299. Lock(sock->disconnect_lock);
  12300. if (sock->Type == SOCK_TCP)
  12301. {
  12302. if (sock->socket != INVALID_SOCKET)
  12303. {
  12304. // Forced disconnection flag
  12305. #ifdef SO_DONTLINGER
  12306. setsockopt(sock->socket, SOL_SOCKET, SO_DONTLINGER, (char *)&true_flag, sizeof(bool));
  12307. #else // SO_DONTLINGER
  12308. setsockopt(sock->socket, SOL_SOCKET, SO_LINGER, (char *)&false_flag, sizeof(bool));
  12309. #endif // SO_DONTLINGER
  12310. // setsockopt(sock->socket, SOL_SOCKET, SO_REUSEADDR, (char *)&true_flag, sizeof(bool));
  12311. }
  12312. // TCP socket
  12313. Lock(sock->lock);
  12314. {
  12315. if (sock->socket == INVALID_SOCKET)
  12316. {
  12317. Unlock(sock->lock);
  12318. Unlock(sock->disconnect_lock);
  12319. Unlock(disconnect_function_lock);
  12320. return;
  12321. }
  12322. s = sock->socket;
  12323. if (sock->Connected)
  12324. {
  12325. struct linger ling;
  12326. Zero(&ling, sizeof(ling));
  12327. #if 0
  12328. // SSL disconnect
  12329. Lock(sock->ssl_lock);
  12330. {
  12331. if (sock->SecureMode)
  12332. {
  12333. SSL_shutdown(sock->ssl);
  12334. }
  12335. }
  12336. Unlock(sock->ssl_lock);
  12337. #endif
  12338. // Disconnect
  12339. shutdown(s, 2);
  12340. }
  12341. // Close the socket
  12342. closesocket(s);
  12343. #ifdef OS_UNIX
  12344. #ifdef FIX_SSL_BLOCKING
  12345. if (sock->CallingThread != NULL)
  12346. {
  12347. pthread_kill(sock->CallingThread, 64);
  12348. }
  12349. #endif // FIX_SSL_BLOCKING
  12350. #endif // OS_UNIX
  12351. // Release the SSL
  12352. Lock(sock->ssl_lock);
  12353. {
  12354. if (sock->SecureMode)
  12355. {
  12356. if (sock->ssl != NULL)
  12357. {
  12358. Lock(openssl_lock);
  12359. {
  12360. SSL_free(sock->ssl);
  12361. FreeSSLCtx(sock->ssl_ctx);
  12362. }
  12363. Unlock(openssl_lock);
  12364. sock->ssl = NULL;
  12365. sock->ssl_ctx = NULL;
  12366. }
  12367. sock->Connected = false;
  12368. sock->SecureMode = false;
  12369. }
  12370. }
  12371. Unlock(sock->ssl_lock);
  12372. // Initialization
  12373. sock->socket = INVALID_SOCKET;
  12374. sock->Type = 0;
  12375. sock->AsyncMode = false;
  12376. sock->Connected = false;
  12377. sock->ListenMode = false;
  12378. sock->SecureMode = false;
  12379. if (sock->IpClientAdded)
  12380. {
  12381. DelIpClient(&sock->RemoteIP);
  12382. sock->IpClientAdded = false;
  12383. }
  12384. }
  12385. Unlock(sock->lock);
  12386. if (sock->BulkSendTube != NULL)
  12387. {
  12388. TubeDisconnect(sock->BulkSendTube);
  12389. }
  12390. if (sock->BulkRecvTube != NULL)
  12391. {
  12392. TubeDisconnect(sock->BulkRecvTube);
  12393. }
  12394. }
  12395. else if (sock->Type == SOCK_UDP)
  12396. {
  12397. // UDP socket
  12398. Lock(sock->lock);
  12399. {
  12400. if (sock->socket == INVALID_SOCKET)
  12401. {
  12402. Unlock(sock->lock);
  12403. Unlock(sock->disconnect_lock);
  12404. Unlock(disconnect_function_lock);
  12405. return;
  12406. }
  12407. s = sock->socket;
  12408. // Close the socket
  12409. closesocket(s);
  12410. // Initialization
  12411. sock->socket = INVALID_SOCKET;
  12412. sock->Type = 0;
  12413. sock->AsyncMode = false;
  12414. sock->Connected = false;
  12415. sock->ListenMode = false;
  12416. sock->SecureMode = false;
  12417. }
  12418. Unlock(sock->lock);
  12419. }
  12420. else if (sock->Type == SOCK_INPROC)
  12421. {
  12422. // In-process socket
  12423. if (sock->ListenMode)
  12424. {
  12425. // Stop the Accept process
  12426. sock->CancelAccept = true;
  12427. Set(sock->InProcAcceptEvent);
  12428. LockQueue(sock->InProcAcceptQueue);
  12429. {
  12430. while (true)
  12431. {
  12432. SOCK *ss = GetNext(sock->InProcAcceptQueue);
  12433. if (ss == NULL)
  12434. {
  12435. break;
  12436. }
  12437. Disconnect(ss);
  12438. ReleaseSock(ss);
  12439. }
  12440. }
  12441. UnlockQueue(sock->InProcAcceptQueue);
  12442. }
  12443. else
  12444. {
  12445. // Disconnect the Tube
  12446. TubeDisconnect(sock->SendTube);
  12447. TubeDisconnect(sock->RecvTube);
  12448. sock->socket = INVALID_SOCKET;
  12449. sock->AsyncMode = false;
  12450. sock->Connected = false;
  12451. sock->ListenMode = false;
  12452. sock->SecureMode = false;
  12453. }
  12454. }
  12455. else if (sock->Type == SOCK_RUDP_LISTEN)
  12456. {
  12457. // RUDP Listen socket
  12458. if (sock->ListenMode)
  12459. {
  12460. // Stop the Accept process
  12461. sock->CancelAccept = true;
  12462. Set(sock->R_UDP_Stack->NewSockConnectEvent);
  12463. sock->R_UDP_Stack->Halt = true;
  12464. Set(sock->R_UDP_Stack->HaltEvent);
  12465. SetSockEvent(sock->R_UDP_Stack->SockEvent);
  12466. }
  12467. }
  12468. else if (sock->Type == SOCK_REVERSE_LISTEN)
  12469. {
  12470. // Reverse Listen socket
  12471. if (sock->ListenMode)
  12472. {
  12473. // Stop the Accept process
  12474. sock->CancelAccept = true;
  12475. Set(sock->ReverseAcceptEvent);
  12476. LockQueue(sock->ReverseAcceptQueue);
  12477. {
  12478. while (true)
  12479. {
  12480. SOCK *ss = GetNext(sock->ReverseAcceptQueue);
  12481. if (ss == NULL)
  12482. {
  12483. break;
  12484. }
  12485. Disconnect(ss);
  12486. ReleaseSock(ss);
  12487. }
  12488. }
  12489. UnlockQueue(sock->ReverseAcceptQueue);
  12490. }
  12491. }
  12492. Unlock(sock->disconnect_lock);
  12493. Unlock(disconnect_function_lock);
  12494. }
  12495. typedef struct TCP_PORT_CHECK
  12496. {
  12497. REF *ref;
  12498. char hostname[MAX_SIZE];
  12499. UINT port;
  12500. bool ok;
  12501. } TCP_PORT_CHECK;
  12502. // The thread to check the TCP port
  12503. void CheckTCPPortThread(THREAD *thread, void *param)
  12504. {
  12505. TCP_PORT_CHECK *c;
  12506. SOCK *s;
  12507. // Validate arguments
  12508. if (thread == NULL || param == NULL)
  12509. {
  12510. return;
  12511. }
  12512. c = (TCP_PORT_CHECK *)param;
  12513. AddRef(c->ref);
  12514. NoticeThreadInit(thread);
  12515. AddWaitThread(thread);
  12516. s = Connect(c->hostname, c->port);
  12517. if (s != NULL)
  12518. {
  12519. c->ok = true;
  12520. Disconnect(s);
  12521. ReleaseSock(s);
  12522. }
  12523. if (Release(c->ref) == 0)
  12524. {
  12525. Free(c);
  12526. }
  12527. DelWaitThread(thread);
  12528. }
  12529. // Check whether the TCP port can be connected
  12530. bool CheckTCPPortEx(char *hostname, UINT port, UINT timeout)
  12531. {
  12532. SOCK *s;
  12533. // Validate arguments
  12534. if (hostname == NULL || port == 0 || port >= 65536)
  12535. {
  12536. return false;
  12537. }
  12538. if (timeout == 0)
  12539. {
  12540. timeout = TIMEOUT_TCP_PORT_CHECK;
  12541. }
  12542. s = ConnectEx(hostname, port, timeout);
  12543. if (s == NULL)
  12544. {
  12545. return false;
  12546. }
  12547. else
  12548. {
  12549. Disconnect(s);
  12550. ReleaseSock(s);
  12551. return true;
  12552. }
  12553. }
  12554. bool CheckTCPPort(char *hostname, UINT port)
  12555. {
  12556. return CheckTCPPortEx(hostname, port, TIMEOUT_TCP_PORT_CHECK);
  12557. }
  12558. #ifdef OS_UNIX
  12559. // Connection with timeout (UNIX version)
  12560. int connect_timeout(SOCKET s, struct sockaddr *addr, int size, int timeout, bool *cancel_flag)
  12561. {
  12562. SOCKSET set;
  12563. bool ok = false;
  12564. UINT64 start_time;
  12565. // Validate arguments
  12566. if (s == INVALID_SOCKET || addr == NULL)
  12567. {
  12568. return -1;
  12569. }
  12570. if (timeout == 0)
  12571. {
  12572. timeout = TIMEOUT_TCP_PORT_CHECK;
  12573. }
  12574. UnixSetSocketNonBlockingMode(s, true);
  12575. start_time = Tick64();
  12576. while (true)
  12577. {
  12578. int ret;
  12579. ret = connect(s, addr, size);
  12580. if (ret == 0 || errno == EISCONN)
  12581. {
  12582. ok = true;
  12583. break;
  12584. }
  12585. else
  12586. {
  12587. if (((start_time + (UINT64)timeout) <= Tick64()) || (errno != EAGAIN && errno != EINPROGRESS && errno != EALREADY))
  12588. {
  12589. // Failure
  12590. break;
  12591. }
  12592. else if (*cancel_flag)
  12593. {
  12594. // Cancel
  12595. break;
  12596. }
  12597. else
  12598. {
  12599. // Connecting
  12600. SleepThread(50);
  12601. UnixSelectInner(1, (UINT *)&s, 1, (UINT *)&s, 100);
  12602. }
  12603. }
  12604. }
  12605. UnixSetSocketNonBlockingMode(s, false);
  12606. if (ok)
  12607. {
  12608. return 0;
  12609. }
  12610. else
  12611. {
  12612. return -1;
  12613. }
  12614. }
  12615. #else
  12616. // Connection with timeout (Win32 version)
  12617. int connect_timeout(SOCKET s, struct sockaddr *addr, int size, int timeout, bool *cancel_flag)
  12618. {
  12619. UINT64 start_time;
  12620. bool ok = false;
  12621. bool timeouted = false;
  12622. WSAEVENT hEvent;
  12623. UINT zero = 0;
  12624. UINT tmp = 0;
  12625. UINT ret_size = 0;
  12626. bool is_nt = false;
  12627. // Validate arguments
  12628. if (s == INVALID_SOCKET || addr == NULL)
  12629. {
  12630. return -1;
  12631. }
  12632. if (timeout == 0)
  12633. {
  12634. timeout = TIMEOUT_TCP_PORT_CHECK;
  12635. }
  12636. is_nt = OS_IS_WINDOWS_NT(GetOsInfo()->OsType);
  12637. // Create an event
  12638. hEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
  12639. // Associate the socket with the event
  12640. WSAEventSelect(s, hEvent, FD_CONNECT);
  12641. start_time = Tick64();
  12642. while (true)
  12643. {
  12644. int ret;
  12645. ret = connect(s, addr, size);
  12646. if (ret == 0)
  12647. {
  12648. ok = true;
  12649. break;
  12650. }
  12651. else
  12652. {
  12653. int err = WSAGetLastError();
  12654. //Debug("err=%u\n", err);
  12655. //Debug("cancel_flag=%u\n", *cancel_flag);
  12656. if (timeouted && ((err == WSAEALREADY) || (err == WSAEWOULDBLOCK && !is_nt)))
  12657. {
  12658. // Time-out
  12659. ok = false;
  12660. break;
  12661. }
  12662. if (*cancel_flag)
  12663. {
  12664. // Cancel
  12665. ok = false;
  12666. break;
  12667. }
  12668. if (err == WSAEISCONN || (err == WSAEINVAL && is_nt))
  12669. {
  12670. ok = true;
  12671. break;
  12672. }
  12673. if (((start_time + (UINT64)timeout) <= Tick64()) || (err != WSAEWOULDBLOCK && err != WSAEALREADY && (is_nt || err != WSAEINVAL)))
  12674. {
  12675. // Failure (timeout)
  12676. break;
  12677. }
  12678. else
  12679. {
  12680. SleepThread(10);
  12681. // Connecting
  12682. if (WaitForSingleObject(hEvent, 100) == WAIT_OBJECT_0)
  12683. {
  12684. timeouted = true;
  12685. }
  12686. }
  12687. }
  12688. }
  12689. // Remove the socket from the event
  12690. WSAEventSelect(s, hEvent, 0);
  12691. // Restore to synchronized socket
  12692. WSAIoctl(s, FIONBIO, &zero, sizeof(zero), &tmp, sizeof(tmp), &ret_size, NULL, NULL);
  12693. // Close the event
  12694. CloseHandle(hEvent);
  12695. if (ok)
  12696. {
  12697. return 0;
  12698. }
  12699. else
  12700. {
  12701. return -1;
  12702. }
  12703. }
  12704. #endif // OS_UNIX
  12705. // Set the TOS value of the socket
  12706. void SetSockTos(SOCK *s, int tos)
  12707. {
  12708. // Validate arguments
  12709. if (s == NULL)
  12710. {
  12711. return;
  12712. }
  12713. if (s->CurrentTos == tos)
  12714. {
  12715. return;
  12716. }
  12717. #ifdef IP_TOS
  12718. setsockopt(s->socket, IPPROTO_IP, IP_TOS, (char *)&tos, sizeof(int));
  12719. #endif // IP_TOS
  12720. s->CurrentTos = tos;
  12721. }
  12722. // Set the priority of the socket
  12723. void SetSockHighPriority(SOCK *s, bool flag)
  12724. {
  12725. // Validate arguments
  12726. if (s == NULL)
  12727. {
  12728. return;
  12729. }
  12730. SetSockTos(s, (flag ? 16 : 0));
  12731. }
  12732. // Connect to the IPv4 host using a socket
  12733. SOCKET ConnectTimeoutIPv4(IP *ip, UINT port, UINT timeout, bool *cancel_flag)
  12734. {
  12735. SOCKET s;
  12736. struct sockaddr_in sockaddr4;
  12737. struct in_addr addr4;
  12738. Zero(&sockaddr4, sizeof(sockaddr4));
  12739. Zero(&addr4, sizeof(addr4));
  12740. // Generate a sockaddr_in
  12741. IPToInAddr(&addr4, ip);
  12742. sockaddr4.sin_port = htons((USHORT)port);
  12743. sockaddr4.sin_family = AF_INET;
  12744. sockaddr4.sin_addr.s_addr = addr4.s_addr;
  12745. // Socket creation
  12746. s = socket(AF_INET, SOCK_STREAM, 0);
  12747. if (s != INVALID_SOCKET)
  12748. {
  12749. // Connection
  12750. if (connect_timeout(s, (struct sockaddr *)&sockaddr4, sizeof(struct sockaddr_in), timeout, cancel_flag) != 0)
  12751. {
  12752. // Connection failure
  12753. closesocket(s);
  12754. s = INVALID_SOCKET;
  12755. }
  12756. }
  12757. return s;
  12758. }
  12759. // Identify whether the HTTPS server to be connected is a SoftEther VPN
  12760. bool DetectIsServerSoftEtherVPN(SOCK *s)
  12761. {
  12762. HTTP_HEADER *h;
  12763. char ip_str[MAX_SIZE];
  12764. char *send_str;
  12765. UINT content_len;
  12766. BUF *recv_buf;
  12767. void *socket_buffer;
  12768. UINT socket_buffer_size = 32768;
  12769. bool ok = false;
  12770. // Validate arguments
  12771. if (s == NULL)
  12772. {
  12773. return false;
  12774. }
  12775. IPToStr(ip_str, sizeof(ip_str), &s->RemoteIP);
  12776. // Request generation
  12777. h = NewHttpHeaderEx("GET", "/", "HTTP/1.1", true);
  12778. AddHttpValue(h, NewHttpValue("X-VPN", "1"));
  12779. AddHttpValue(h, NewHttpValue("Host", ip_str));
  12780. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  12781. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  12782. AddHttpValue(h, NewHttpValue("Accept-Language", "ja"));
  12783. AddHttpValue(h, NewHttpValue("User-Agent", DEFAULT_USER_AGENT));
  12784. AddHttpValue(h, NewHttpValue("Pragma", "no-cache"));
  12785. AddHttpValue(h, NewHttpValue("Cache-Control", "no-cache"));
  12786. send_str = HttpHeaderToStr(h);
  12787. FreeHttpHeader(h);
  12788. // Transmission
  12789. if (SendAll(s, send_str, StrLen(send_str), true) == false)
  12790. {
  12791. Free(send_str);
  12792. return false;
  12793. }
  12794. Free(send_str);
  12795. // Receive
  12796. h = RecvHttpHeader(s);
  12797. if (h == NULL)
  12798. {
  12799. return false;
  12800. }
  12801. // Get the length of the content
  12802. content_len = GetContentLength(h);
  12803. FreeHttpHeader(h);
  12804. if (content_len == 0 || content_len >= (1024 * 1024))
  12805. {
  12806. return false;
  12807. }
  12808. // Receive contents
  12809. recv_buf = NewBuf();
  12810. socket_buffer = Malloc(socket_buffer_size);
  12811. while (true)
  12812. {
  12813. UINT recvsize = MIN(socket_buffer_size, content_len - recv_buf->Size);
  12814. UINT size;
  12815. if (recvsize == 0)
  12816. {
  12817. ok = true;
  12818. break;
  12819. }
  12820. size = Recv(s, socket_buffer, recvsize, true);
  12821. if (size == 0)
  12822. {
  12823. // Disconnected
  12824. break;
  12825. }
  12826. WriteBuf(recv_buf, socket_buffer, size);
  12827. }
  12828. SeekBuf(recv_buf, 0, 0);
  12829. Free(socket_buffer);
  12830. if (ok)
  12831. {
  12832. // Examine to confirm whether the incoming data is a SoftEther VPN protocol
  12833. char tmp[1024];
  12834. Zero(tmp, sizeof(tmp));
  12835. Copy(tmp, recv_buf->Buf, MIN(recv_buf->Size, (sizeof(tmp) - 1)));
  12836. ok = false;
  12837. if (StartWith(tmp, http_detect_server_startwith))
  12838. {
  12839. ok = true;
  12840. }
  12841. else if (InStr(tmp, http_detect_server_tag_future))
  12842. {
  12843. ok = true;
  12844. }
  12845. }
  12846. FreeBuf(recv_buf);
  12847. return ok;
  12848. }
  12849. // TCP connection thread
  12850. void ConnectThreadForTcp(THREAD *thread, void *param)
  12851. {
  12852. SOCK *sock;
  12853. char hostname[MAX_SIZE];
  12854. CONNECT_TCP_RUDP_PARAM *p = (CONNECT_TCP_RUDP_PARAM *)param;
  12855. if (thread == NULL || p == NULL)
  12856. {
  12857. return;
  12858. }
  12859. // Delay
  12860. if (p->Delay >= 1)
  12861. {
  12862. WaitEx(NULL, p->Delay, p->CancelFlag);
  12863. }
  12864. // Connecting process
  12865. IPToStr(hostname, sizeof(hostname), &p->Ip);
  12866. sock = ConnectEx3(hostname, p->Port, p->Timeout, p->CancelFlag, NULL, NULL, false, false, true);
  12867. if (sock != NULL && p->Tcp_TryStartSsl)
  12868. {
  12869. bool ssl_ret = false;
  12870. p->Tcp_InNegotiation = true;
  12871. // Attempt the SSL negotiation to take this opportunity
  12872. Lock(p->CancelLock);
  12873. {
  12874. if ((*p->CancelFlag) == false)
  12875. {
  12876. p->CancelDisconnectSock = sock;
  12877. AddRef(sock->ref);
  12878. }
  12879. else
  12880. {
  12881. Debug("User Cancel to StartSSL.\n");
  12882. goto LABEL_CANCEL;
  12883. }
  12884. }
  12885. Unlock(p->CancelLock);
  12886. // Start the SSL communication
  12887. ssl_ret = StartSSLEx(sock, NULL, NULL, p->Tcp_SslNoTls, 0, p->Hostname);
  12888. if (ssl_ret)
  12889. {
  12890. // Identify whether the HTTPS server to be connected is a SoftEther VPN
  12891. SetTimeout(sock, (10 * 1000));
  12892. ssl_ret = DetectIsServerSoftEtherVPN(sock);
  12893. SetTimeout(sock, INFINITE);
  12894. if (ssl_ret == false)
  12895. {
  12896. Debug("DetectIsServerSoftEtherVPN Error.\n");
  12897. }
  12898. }
  12899. Lock(p->CancelLock);
  12900. {
  12901. ReleaseSock(p->CancelDisconnectSock);
  12902. p->CancelDisconnectSock = NULL;
  12903. LABEL_CANCEL:
  12904. DoNothing();
  12905. }
  12906. Unlock(p->CancelLock);
  12907. if (ssl_ret == false)
  12908. {
  12909. // SSL negotiation failure
  12910. Disconnect(sock);
  12911. ReleaseSock(sock);
  12912. Debug("Fail to StartSSL.\n");
  12913. sock = NULL;
  12914. }
  12915. }
  12916. p->Result_Tcp_Sock = sock;
  12917. p->Ok = (p->Result_Tcp_Sock == NULL ? false : true);
  12918. p->FinishedTick = Tick64();
  12919. p->Finished = true;
  12920. p->Tcp_InNegotiation = false;
  12921. Set(p->FinishEvent);
  12922. }
  12923. // R-UDP over ICMP / over DNS connection thread
  12924. void ConnectThreadForOverDnsOrIcmp(THREAD *thread, void *param)
  12925. {
  12926. SOCK *sock;
  12927. CONNECT_TCP_RUDP_PARAM *p = (CONNECT_TCP_RUDP_PARAM *)param;
  12928. if (thread == NULL || p == NULL)
  12929. {
  12930. return;
  12931. }
  12932. // Delay
  12933. if (p->Delay >= 1)
  12934. {
  12935. WaitEx(NULL, p->Delay, p->CancelFlag);
  12936. }
  12937. // Connecting process
  12938. sock = NewRUDPClientDirect(p->SvcName, &p->Ip,
  12939. (p->RUdpProtocol == RUDP_PROTOCOL_DNS ? 53 : MAKE_SPECIAL_PORT(IP_PROTO_ICMPV4)),
  12940. &p->NatT_ErrorCode, p->Timeout, p->CancelFlag, NULL, NULL,
  12941. (p->RUdpProtocol == RUDP_PROTOCOL_DNS ? 0 : MAKE_SPECIAL_PORT(IP_PROTO_ICMPV4)),
  12942. (p->RUdpProtocol == RUDP_PROTOCOL_DNS ? true : false));
  12943. p->Result_Nat_T_Sock = sock;
  12944. p->Ok = (p->Result_Nat_T_Sock == NULL ? false : true);
  12945. p->FinishedTick = Tick64();
  12946. p->Finished = true;
  12947. Set(p->FinishEvent);
  12948. }
  12949. // R-UDP (via NAT-T) connection thread
  12950. void ConnectThreadForRUDP(THREAD *thread, void *param)
  12951. {
  12952. SOCK *sock;
  12953. CONNECT_TCP_RUDP_PARAM *p = (CONNECT_TCP_RUDP_PARAM *)param;
  12954. if (thread == NULL || p == NULL)
  12955. {
  12956. return;
  12957. }
  12958. // Delay
  12959. if (p->Delay >= 1)
  12960. {
  12961. WaitEx(NULL, p->Delay, p->CancelFlag);
  12962. }
  12963. // Connecting process
  12964. sock = NewRUDPClientNatT(p->SvcName, &p->Ip, &p->NatT_ErrorCode, p->Timeout, p->CancelFlag, p->HintStr, p->TargetHostname);
  12965. p->Result_Nat_T_Sock = sock;
  12966. p->Ok = (p->Result_Nat_T_Sock == NULL ? false : true);
  12967. p->FinishedTick = Tick64();
  12968. p->Finished = true;
  12969. Set(p->FinishEvent);
  12970. }
  12971. // TCP connection
  12972. SOCK *Connect(char *hostname, UINT port)
  12973. {
  12974. return ConnectEx(hostname, port, 0);
  12975. }
  12976. SOCK *ConnectEx(char *hostname, UINT port, UINT timeout)
  12977. {
  12978. return ConnectEx2(hostname, port, timeout, NULL);
  12979. }
  12980. SOCK *ConnectEx2(char *hostname, UINT port, UINT timeout, bool *cancel_flag)
  12981. {
  12982. return ConnectEx3(hostname, port, timeout, cancel_flag, NULL, NULL, false, false, true);
  12983. }
  12984. SOCK *ConnectEx3(char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool ssl_no_tls, bool no_get_hostname)
  12985. {
  12986. return ConnectEx4(hostname, port, timeout, cancel_flag, nat_t_svc_name, nat_t_error_code, try_start_ssl, ssl_no_tls,
  12987. no_get_hostname, NULL);
  12988. }
  12989. SOCK *ConnectEx4(char *hostname, UINT port, UINT timeout, bool *cancel_flag, char *nat_t_svc_name, UINT *nat_t_error_code, bool try_start_ssl, bool ssl_no_tls, bool no_get_hostname, IP *ret_ip)
  12990. {
  12991. SOCK *sock;
  12992. SOCKET s;
  12993. struct linger ling;
  12994. IP ip4;
  12995. IP ip6;
  12996. bool true_flag = true;
  12997. bool false_flag = false;
  12998. char tmp[MAX_SIZE];
  12999. IP current_ip;
  13000. bool is_ipv6 = false;
  13001. bool dummy = false;
  13002. bool use_natt = false;
  13003. char hostname_original[MAX_SIZE];
  13004. char hint_str[MAX_SIZE];
  13005. bool force_use_natt = false;
  13006. UINT dummy_int = 0;
  13007. IP dummy_ret_ip;
  13008. // Validate arguments
  13009. if (hostname == NULL || port == 0 || port >= 65536 || IsEmptyStr(hostname))
  13010. {
  13011. return NULL;
  13012. }
  13013. if (timeout == 0)
  13014. {
  13015. timeout = TIMEOUT_TCP_PORT_CHECK;
  13016. }
  13017. if (cancel_flag == NULL)
  13018. {
  13019. cancel_flag = &dummy;
  13020. }
  13021. if (nat_t_error_code == NULL)
  13022. {
  13023. nat_t_error_code = &dummy_int;
  13024. }
  13025. Zero(&dummy_ret_ip, sizeof(IP));
  13026. if (ret_ip == NULL)
  13027. {
  13028. ret_ip = &dummy_ret_ip;
  13029. }
  13030. Zero(hint_str, sizeof(hint_str));
  13031. StrCpy(hostname_original, sizeof(hostname_original), hostname);
  13032. use_natt = (IsEmptyStr(nat_t_svc_name) ? false : true);
  13033. if (use_natt)
  13034. {
  13035. // In case of using NAT-T, split host name if the '/' is included in the host name
  13036. UINT i = SearchStrEx(hostname, "/", 0, false);
  13037. if (i == INFINITE)
  13038. {
  13039. // Not included
  13040. StrCpy(hostname_original, sizeof(hostname_original), hostname);
  13041. }
  13042. else
  13043. {
  13044. // Included
  13045. StrCpy(hostname_original, sizeof(hostname_original), hostname);
  13046. hostname_original[i] = 0;
  13047. // Force to use the NAT-T
  13048. force_use_natt = true;
  13049. // Copy the hint string
  13050. StrCpy(hint_str, sizeof(hint_str), hostname + i + 1);
  13051. if (StrCmpi(hint_str, "tcp") == 0 || StrCmpi(hint_str, "disable") == 0
  13052. || StrCmpi(hint_str, "disabled") == 0
  13053. || StrCmpi(hint_str, "no") == 0 || StrCmpi(hint_str, "none") == 0)
  13054. {
  13055. // Force not to use the NAT-T
  13056. force_use_natt = false;
  13057. use_natt = false;
  13058. }
  13059. }
  13060. }
  13061. else
  13062. {
  13063. StrCpy(hostname_original, sizeof(hostname_original), hostname);
  13064. }
  13065. Zero(&current_ip, sizeof(current_ip));
  13066. Zero(&ip4, sizeof(ip4));
  13067. Zero(&ip6, sizeof(ip6));
  13068. if (IsZeroIp(ret_ip) == false)
  13069. {
  13070. // Skip name resolution
  13071. if (IsIP6(ret_ip))
  13072. {
  13073. Copy(&ip6, ret_ip, sizeof(IP));
  13074. }
  13075. else
  13076. {
  13077. Copy(&ip4, ret_ip, sizeof(IP));
  13078. }
  13079. //Debug("Using cached IP address: %s = %r\n", hostname_original, ret_ip);
  13080. }
  13081. else
  13082. {
  13083. // Forward resolution
  13084. if (GetIP46Ex(&ip4, &ip6, hostname_original, 0, cancel_flag) == false)
  13085. {
  13086. return NULL;
  13087. }
  13088. }
  13089. if (IsZeroIp(&ip4) == false && IsIPLocalHostOrMySelf(&ip4))
  13090. {
  13091. // NAT-T isn't used in the case of connection to localhost
  13092. force_use_natt = false;
  13093. use_natt = false;
  13094. }
  13095. s = INVALID_SOCKET;
  13096. // Attempt to connect with IPv4
  13097. if (IsZeroIp(&ip4) == false)
  13098. {
  13099. if (use_natt == false)
  13100. {
  13101. // Normal connection without using NAT-T
  13102. s = ConnectTimeoutIPv4(&ip4, port, timeout, cancel_flag);
  13103. if (s != INVALID_SOCKET)
  13104. {
  13105. Copy(&current_ip, &ip4, sizeof(IP));
  13106. Copy(ret_ip, &ip4, sizeof(IP));
  13107. }
  13108. }
  13109. else if (force_use_natt)
  13110. {
  13111. // The connection by forcing the use of NAT-T (not to connection with normal TCP)
  13112. SOCK *nat_t_sock = NewRUDPClientNatT(nat_t_svc_name, &ip4, nat_t_error_code, timeout, cancel_flag,
  13113. hint_str, hostname);
  13114. if (nat_t_sock != NULL)
  13115. {
  13116. StrCpy(nat_t_sock->UnderlayProtocol, sizeof(nat_t_sock->UnderlayProtocol), SOCK_UNDERLAY_NAT_T);
  13117. AddProtocolDetailsStr(nat_t_sock->ProtocolDetails, sizeof(nat_t_sock->ProtocolDetails),
  13118. "RUDP");
  13119. }
  13120. Copy(ret_ip, &ip4, sizeof(IP));
  13121. return nat_t_sock;
  13122. }
  13123. else
  13124. {
  13125. // Use the connections using NAT-T with normal TCP connection together
  13126. // (Use multiple threads to try to connect in four connection methods concurrently)
  13127. CONNECT_TCP_RUDP_PARAM p1, p2, p3, p4;
  13128. EVENT *finish_event;
  13129. THREAD *t1, *t2, *t3, *t4;
  13130. UINT64 start_tick = Tick64();
  13131. UINT64 giveup_for_all_tick = start_tick + (UINT64)SOCK_CONNECT_WAIT_FOR_ICMP_AND_DNS_AT_LEAST;
  13132. bool cancel_flag2 = false;
  13133. SOCK *cancel_sock = NULL;
  13134. finish_event = NewEvent();
  13135. Zero(&p1, sizeof(p1));
  13136. Zero(&p2, sizeof(p2));
  13137. Zero(&p3, sizeof(p3));
  13138. Zero(&p4, sizeof(p4));
  13139. // p1: TCP
  13140. StrCpy(p1.Hostname, sizeof(p1.Hostname), hostname_original);
  13141. Copy(&p1.Ip, &ip4, sizeof(IP));
  13142. p1.Port = port;
  13143. p1.Timeout = timeout;
  13144. p1.CancelFlag = &cancel_flag2;
  13145. p1.FinishEvent = finish_event;
  13146. p1.Tcp_TryStartSsl = try_start_ssl;
  13147. p1.Tcp_SslNoTls = ssl_no_tls;
  13148. p1.CancelLock = NewLock();
  13149. // p2: NAT-T
  13150. StrCpy(p2.Hostname, sizeof(p2.Hostname), hostname_original);
  13151. Copy(&p2.Ip, &ip4, sizeof(IP));
  13152. p2.Port = port;
  13153. p2.Timeout = timeout;
  13154. p2.CancelFlag = &cancel_flag2;
  13155. p2.FinishEvent = finish_event;
  13156. StrCpy(p2.HintStr, sizeof(p2.HintStr), hint_str);
  13157. StrCpy(p2.TargetHostname, sizeof(p2.TargetHostname), hostname);
  13158. StrCpy(p2.SvcName, sizeof(p2.SvcName), nat_t_svc_name);
  13159. p2.Delay = 30; // Delay by 30ms
  13160. // p3: over ICMP
  13161. StrCpy(p3.Hostname, sizeof(p3.Hostname), hostname_original);
  13162. Copy(&p3.Ip, &ip4, sizeof(IP));
  13163. p3.Port = port;
  13164. p3.Timeout = timeout;
  13165. p3.CancelFlag = &cancel_flag2;
  13166. p3.FinishEvent = finish_event;
  13167. StrCpy(p3.SvcName, sizeof(p3.SvcName), nat_t_svc_name);
  13168. p3.RUdpProtocol = RUDP_PROTOCOL_ICMP;
  13169. p3.Delay = 200; // Delay by 200ms
  13170. // p4: over DNS
  13171. StrCpy(p4.Hostname, sizeof(p4.Hostname), hostname_original);
  13172. Copy(&p4.Ip, &ip4, sizeof(IP));
  13173. p4.Port = port;
  13174. p4.Timeout = timeout;
  13175. p4.CancelFlag = &cancel_flag2;
  13176. p4.FinishEvent = finish_event;
  13177. StrCpy(p4.SvcName, sizeof(p4.SvcName), nat_t_svc_name);
  13178. p4.RUdpProtocol = RUDP_PROTOCOL_DNS;
  13179. p4.Delay = 100; // Delay by 100ms
  13180. t1 = NewThread(ConnectThreadForTcp, &p1);
  13181. t2 = NewThread(ConnectThreadForRUDP, &p2);
  13182. t4 = NewThread(ConnectThreadForOverDnsOrIcmp, &p4);
  13183. t3 = NewThread(ConnectThreadForOverDnsOrIcmp, &p3);
  13184. while (true)
  13185. {
  13186. UINT64 now = Tick64();
  13187. if (*cancel_flag)
  13188. {
  13189. // Cancel by the user
  13190. break;
  13191. }
  13192. if (p1.Finished && p2.Finished)
  13193. {
  13194. // Results for both the TCP and the NAT-T were confirmed
  13195. if (now >= giveup_for_all_tick)
  13196. {
  13197. // Wait at least minimum time until successful of the ICMP or the DNS
  13198. break;
  13199. }
  13200. if (p3.Ok || p4.Ok)
  13201. {
  13202. // Exit the loop immediately if any of the ICMP or the DNS is successful
  13203. break;
  13204. }
  13205. }
  13206. if (p1.Finished && p1.Ok)
  13207. {
  13208. // Have successfully connected by TCP
  13209. break;
  13210. }
  13211. if (p2.Finished && p2.Ok)
  13212. {
  13213. UINT p1_wait_time;
  13214. UINT64 tcp_giveup_tick;
  13215. UINT p2_spent_time;
  13216. // Have successfully connected by R-UDP
  13217. if (p1.Finished)
  13218. {
  13219. // Result of TCP is confirmed
  13220. break;
  13221. }
  13222. // Calculate the time takes to complete connection of R-UDP
  13223. p2_spent_time = (UINT)(p2.FinishedTick - start_tick);
  13224. // Decide the grace time for results of TCP until settled.
  13225. // The grace time is four times the duration of the R-UDP, and at least 400 milliseconds from the start,
  13226. // and up to 2500 milliseconds after the R-UDP results settled
  13227. p1_wait_time = p2_spent_time * 4;
  13228. p1_wait_time = MAX(p1_wait_time, 400);
  13229. //Debug("p2_spent_time = %u, p1_wait_time = %u\n", p2_spent_time, p1_wait_time);
  13230. tcp_giveup_tick = start_tick + (UINT64)p1_wait_time;
  13231. tcp_giveup_tick = MIN(tcp_giveup_tick, (p2.FinishedTick + 2500ULL));
  13232. if (now >= tcp_giveup_tick)
  13233. {
  13234. // Result of the TCP is uncertain, but give up
  13235. if (p1.Finished || p1.Tcp_InNegotiation == false)
  13236. {
  13237. // Break only when TCP SSL negotiation is not being processed
  13238. break;
  13239. }
  13240. }
  13241. }
  13242. Wait(finish_event, 25);
  13243. }
  13244. cancel_flag2 = true;
  13245. Lock(p1.CancelLock);
  13246. {
  13247. if (p1.CancelDisconnectSock != NULL)
  13248. {
  13249. cancel_sock = p1.CancelDisconnectSock;
  13250. AddRef(cancel_sock->ref);
  13251. }
  13252. }
  13253. Unlock(p1.CancelLock);
  13254. if (cancel_sock != NULL)
  13255. {
  13256. Disconnect(cancel_sock);
  13257. ReleaseSock(cancel_sock);
  13258. }
  13259. WaitThread(t1, INFINITE);
  13260. WaitThread(t2, INFINITE);
  13261. WaitThread(t3, INFINITE);
  13262. WaitThread(t4, INFINITE);
  13263. ReleaseThread(t1);
  13264. ReleaseThread(t2);
  13265. ReleaseThread(t3);
  13266. ReleaseThread(t4);
  13267. ReleaseEvent(finish_event);
  13268. DeleteLock(p1.CancelLock);
  13269. if (*cancel_flag)
  13270. {
  13271. // Abandon all the results because the user canceled
  13272. Disconnect(p1.Result_Nat_T_Sock);
  13273. ReleaseSock(p1.Result_Nat_T_Sock);
  13274. Disconnect(p2.Result_Nat_T_Sock);
  13275. ReleaseSock(p2.Result_Nat_T_Sock);
  13276. Disconnect(p3.Result_Nat_T_Sock);
  13277. ReleaseSock(p3.Result_Nat_T_Sock);
  13278. Disconnect(p4.Result_Nat_T_Sock);
  13279. ReleaseSock(p4.Result_Nat_T_Sock);
  13280. return NULL;
  13281. }
  13282. if (p1.Ok)
  13283. {
  13284. char hostname[MAX_SIZE];
  13285. // Use the results of the TCP
  13286. // Dispose other results
  13287. Disconnect(p2.Result_Nat_T_Sock);
  13288. ReleaseSock(p2.Result_Nat_T_Sock);
  13289. Disconnect(p3.Result_Nat_T_Sock);
  13290. ReleaseSock(p3.Result_Nat_T_Sock);
  13291. Disconnect(p4.Result_Nat_T_Sock);
  13292. ReleaseSock(p4.Result_Nat_T_Sock);
  13293. if (GetHostName(hostname, sizeof(hostname), &ip4))
  13294. {
  13295. Free(p1.Result_Tcp_Sock->RemoteHostname);
  13296. p1.Result_Tcp_Sock->RemoteHostname = CopyStr(hostname);
  13297. }
  13298. Copy(ret_ip, &ip4, sizeof(IP));
  13299. return p1.Result_Tcp_Sock;
  13300. }
  13301. else if (p2.Ok)
  13302. {
  13303. // Use the results of the R-UDP
  13304. // Dispose other results
  13305. Disconnect(p3.Result_Nat_T_Sock);
  13306. ReleaseSock(p3.Result_Nat_T_Sock);
  13307. Disconnect(p4.Result_Nat_T_Sock);
  13308. ReleaseSock(p4.Result_Nat_T_Sock);
  13309. StrCpy(p2.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p2.Result_Nat_T_Sock->UnderlayProtocol),
  13310. SOCK_UNDERLAY_NAT_T);
  13311. AddProtocolDetailsStr(p2.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p2.Result_Nat_T_Sock->UnderlayProtocol),
  13312. "RUDP/UDP");
  13313. Copy(ret_ip, &ip4, sizeof(IP));
  13314. return p2.Result_Nat_T_Sock;
  13315. }
  13316. else if (p4.Ok)
  13317. {
  13318. // Use this if over-DNS success
  13319. // Dispose other results
  13320. Disconnect(p3.Result_Nat_T_Sock);
  13321. ReleaseSock(p3.Result_Nat_T_Sock);
  13322. StrCpy(p4.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p4.Result_Nat_T_Sock->UnderlayProtocol),
  13323. SOCK_UNDERLAY_DNS);
  13324. AddProtocolDetailsStr(p4.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p4.Result_Nat_T_Sock->UnderlayProtocol),
  13325. "RUDP/DNS");
  13326. Copy(ret_ip, &ip4, sizeof(IP));
  13327. return p4.Result_Nat_T_Sock;
  13328. }
  13329. else if (p3.Ok)
  13330. {
  13331. // Use this if over ICMP success
  13332. StrCpy(p3.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p3.Result_Nat_T_Sock->UnderlayProtocol),
  13333. SOCK_UNDERLAY_ICMP);
  13334. AddProtocolDetailsStr(p3.Result_Nat_T_Sock->UnderlayProtocol, sizeof(p3.Result_Nat_T_Sock->UnderlayProtocol),
  13335. "RUDP/ICMP");
  13336. Copy(ret_ip, &ip4, sizeof(IP));
  13337. return p3.Result_Nat_T_Sock;
  13338. }
  13339. else
  13340. {
  13341. // Continue the process if all trials failed
  13342. *nat_t_error_code = p2.NatT_ErrorCode;
  13343. }
  13344. }
  13345. }
  13346. // Attempt to connect with IPv6
  13347. if (s == INVALID_SOCKET && IsZeroIp(&ip6) == false)
  13348. {
  13349. struct sockaddr_in6 sockaddr6;
  13350. struct in6_addr addr6;
  13351. Zero(&sockaddr6, sizeof(sockaddr6));
  13352. Zero(&addr6, sizeof(addr6));
  13353. // Generation of the sockaddr_in6
  13354. IPToInAddr6(&addr6, &ip6);
  13355. sockaddr6.sin6_port = htons((USHORT)port);
  13356. sockaddr6.sin6_family = AF_INET6;
  13357. sockaddr6.sin6_scope_id = ip6.ipv6_scope_id;
  13358. Copy(&sockaddr6.sin6_addr, &addr6, sizeof(addr6));
  13359. // Socket creation
  13360. s = socket(AF_INET6, SOCK_STREAM, 0);
  13361. if (s != INVALID_SOCKET)
  13362. {
  13363. // Connection
  13364. if (connect_timeout(s, (struct sockaddr *)&sockaddr6, sizeof(struct sockaddr_in6), timeout, cancel_flag) != 0)
  13365. {
  13366. // Connection failure
  13367. closesocket(s);
  13368. s = INVALID_SOCKET;
  13369. }
  13370. else
  13371. {
  13372. Copy(&current_ip, &ip6, sizeof(IP));
  13373. is_ipv6 = true;
  13374. Copy(ret_ip, &ip6, sizeof(IP));
  13375. }
  13376. }
  13377. }
  13378. if (s == INVALID_SOCKET)
  13379. {
  13380. // Connection fails on both of IPv4, IPv6
  13381. return NULL;
  13382. }
  13383. // Creating a SOCK
  13384. sock = NewSock();
  13385. sock->socket = s;
  13386. sock->Type = SOCK_TCP;
  13387. sock->ServerMode = false;
  13388. StrCpy(sock->UnderlayProtocol, sizeof(sock->UnderlayProtocol),
  13389. (is_ipv6 ? SOCK_UNDERLAY_NATIVE_V6 : SOCK_UNDERLAY_NATIVE_V4));
  13390. AddProtocolDetailsStr(sock->ProtocolDetails, sizeof(sock->ProtocolDetails),
  13391. is_ipv6 ? "IPv6" : "IPv4");
  13392. // Host name resolution
  13393. if (no_get_hostname || (GetHostName(tmp, sizeof(tmp), &current_ip) == false))
  13394. {
  13395. StrCpy(tmp, sizeof(tmp), hostname_original);
  13396. }
  13397. //Debug("PTR: %s\n", tmp);
  13398. sock->RemoteHostname = CopyStr(tmp);
  13399. // Debug("new socket: %u\n", s);
  13400. Zero(&ling, sizeof(ling));
  13401. // Forced disconnection flag
  13402. #ifdef SO_DONTLINGER
  13403. setsockopt(sock->socket, SOL_SOCKET, SO_DONTLINGER, (char *)&true_flag, sizeof(bool));
  13404. #else // SO_DONTLINGER
  13405. setsockopt(sock->socket, SOL_SOCKET, SO_LINGER, (char *)&false_flag, sizeof(bool));
  13406. #endif // SO_DONTLINGER
  13407. // setsockopt(sock->socket, SOL_SOCKET, SO_REUSEADDR, (char *)&true_flag, sizeof(bool));
  13408. // Configuring TCP options
  13409. setsockopt(sock->socket, IPPROTO_TCP, TCP_NODELAY, (char *)&true_flag, sizeof(bool));
  13410. // Initialization of the time-out value
  13411. SetTimeout(sock, TIMEOUT_INFINITE);
  13412. // Get the socket information
  13413. QuerySocketInformation(sock);
  13414. if (IsZeroIp(&sock->LocalIP) == false && IsLocalHostIP(&sock->LocalIP) == false)
  13415. {
  13416. IP current_ip;
  13417. if (GetCurrentGlobalIP(&current_ip, is_ipv6) == false)
  13418. {
  13419. SetCurrentGlobalIP(&sock->LocalIP, is_ipv6);
  13420. }
  13421. }
  13422. sock->Connected = true;
  13423. sock->AsyncMode = false;
  13424. sock->SecureMode = false;
  13425. sock->IPv6 = is_ipv6;
  13426. return sock;
  13427. }
  13428. // Get the current accepting IPv4 address
  13429. void TryGetCurrentAcceptingIPv4Address(IP *ip)
  13430. {
  13431. SOCK *s = ConnectEx(UDP_NAT_T_GET_PRIVATE_IP_TCP_SERVER, 80, 2000);
  13432. if (s != NULL)
  13433. {
  13434. Disconnect(s);
  13435. ReleaseSock(s);
  13436. }
  13437. if (GetCurrentGlobalIP(ip, false))
  13438. {
  13439. return;
  13440. }
  13441. GetCurrentGlobalIPGuess(ip, false);
  13442. }
  13443. // Add a protocol details strings
  13444. void AddProtocolDetailsStr(char *dst, UINT dst_size, char *str)
  13445. {
  13446. TOKEN_LIST *t1, *t2;
  13447. UINT i, j;
  13448. if (dst == NULL || str == NULL)
  13449. {
  13450. return;
  13451. }
  13452. t1 = ParseTokenWithoutNullStr(dst, " ");
  13453. t2 = ParseTokenWithoutNullStr(str, " ");
  13454. for (i = 0;i < t2->NumTokens;i++)
  13455. {
  13456. bool exists = false;
  13457. for (j = 0;j < t1->NumTokens;j++)
  13458. {
  13459. if (StrCmpi(t1->Token[j], t2->Token[i]) == 0)
  13460. {
  13461. exists = true;
  13462. break;
  13463. }
  13464. }
  13465. if (exists == false)
  13466. {
  13467. StrCat(dst, dst_size, t2->Token[i]);
  13468. StrCat(dst, dst_size, " ");
  13469. }
  13470. }
  13471. FreeToken(t1);
  13472. FreeToken(t2);
  13473. }
  13474. void AddProtocolDetailsKeyValueStr(char *dst, UINT dst_size, char *key, char *value)
  13475. {
  13476. char tmp[128];
  13477. StrCpy(tmp, sizeof(tmp), key);
  13478. StrCat(tmp, sizeof(tmp), "=");
  13479. StrCat(tmp, sizeof(tmp), value);
  13480. AddProtocolDetailsStr(dst, dst_size, tmp);
  13481. }
  13482. void AddProtocolDetailsKeyValueInt(char *dst, UINT dst_size, char *key, UINT value)
  13483. {
  13484. char tmp[128];
  13485. ToStr(tmp, value);
  13486. AddProtocolDetailsKeyValueStr(dst, dst_size, key, tmp);
  13487. }
  13488. // Maximize the I/O buffer size of the socket
  13489. void SetSocketSendRecvBufferSize(SOCKET s, UINT size)
  13490. {
  13491. int value = (int)size;
  13492. // Validate arguments
  13493. if (s == INVALID_SOCKET)
  13494. {
  13495. return;
  13496. }
  13497. setsockopt(s, SOL_SOCKET, SO_RCVBUF, (char *)&value, sizeof(int));
  13498. setsockopt(s, SOL_SOCKET, SO_SNDBUF, (char *)&value, sizeof(int));
  13499. }
  13500. // Get the buffer size of the socket
  13501. UINT GetSocketBufferSize(SOCKET s, bool send)
  13502. {
  13503. int value = 0;
  13504. int len = sizeof(int);
  13505. // Validate arguments
  13506. if (s == INVALID_SOCKET)
  13507. {
  13508. return 0;
  13509. }
  13510. if (getsockopt(s, SOL_SOCKET, (send ? SO_SNDBUF : SO_RCVBUF), (char *)&value, &len) != 0)
  13511. {
  13512. return 0;
  13513. }
  13514. return value;
  13515. }
  13516. // Setting the buffer size of the socket
  13517. bool SetSocketBufferSize(SOCKET s, bool send, UINT size)
  13518. {
  13519. int value = (int)size;
  13520. // Validate arguments
  13521. if (s == INVALID_SOCKET)
  13522. {
  13523. return false;
  13524. }
  13525. if (setsockopt(s, SOL_SOCKET, (send ? SO_SNDBUF : SO_RCVBUF), (char *)&value, sizeof(int)) != 0)
  13526. {
  13527. return false;
  13528. }
  13529. return true;
  13530. }
  13531. UINT SetSocketBufferSizeWithBestEffort(SOCKET s, bool send, UINT size)
  13532. {
  13533. // Validate arguments
  13534. if (s == INVALID_SOCKET)
  13535. {
  13536. return 0;
  13537. }
  13538. while (true)
  13539. {
  13540. if (SetSocketBufferSize(s, send, size))
  13541. {
  13542. return size;
  13543. }
  13544. size = (UINT)((double)size / 1.5);
  13545. if (size <= 32767)
  13546. {
  13547. return 0;
  13548. }
  13549. }
  13550. }
  13551. // Initialize the buffer size of the UDP socket
  13552. void InitUdpSocketBufferSize(SOCKET s)
  13553. {
  13554. SetSocketBufferSizeWithBestEffort(s, true, UDP_MAX_BUFFER_SIZE);
  13555. SetSocketBufferSizeWithBestEffort(s, false, UDP_MAX_BUFFER_SIZE);
  13556. }
  13557. // Get the socket information
  13558. void QuerySocketInformation(SOCK *sock)
  13559. {
  13560. // Validate arguments
  13561. if (sock == NULL)
  13562. {
  13563. return;
  13564. }
  13565. Lock(sock->lock);
  13566. {
  13567. struct sockaddr_in6 sockaddr6;
  13568. struct in6_addr *addr6;
  13569. int size;
  13570. DWORD dw;
  13571. UINT opt_value = 0;
  13572. if (sock->Type == SOCK_TCP)
  13573. {
  13574. // Get the information of the remote host
  13575. size = sizeof(sockaddr6);
  13576. if (getpeername(sock->socket, (struct sockaddr *)&sockaddr6, (int *)&size) == 0)
  13577. {
  13578. if (size >= sizeof(struct sockaddr_in6))
  13579. {
  13580. sock->RemotePort = (UINT)ntohs(sockaddr6.sin6_port);
  13581. addr6 = &sockaddr6.sin6_addr;
  13582. InAddrToIP6(&sock->RemoteIP, addr6);
  13583. sock->RemoteIP.ipv6_scope_id = sockaddr6.sin6_scope_id;
  13584. }
  13585. else
  13586. {
  13587. struct sockaddr_in *sockaddr;
  13588. struct in_addr *addr;
  13589. sockaddr = (struct sockaddr_in *)&sockaddr6;
  13590. sock->RemotePort = (UINT)ntohs(sockaddr->sin_port);
  13591. addr = &sockaddr->sin_addr;
  13592. InAddrToIP(&sock->RemoteIP, addr);
  13593. }
  13594. }
  13595. }
  13596. // Get the local host information
  13597. size = sizeof(sockaddr6);
  13598. if (getsockname(sock->socket, (struct sockaddr *)&sockaddr6, (int *)&size) == 0)
  13599. {
  13600. if (size >= sizeof(struct sockaddr_in6))
  13601. {
  13602. sock->LocalPort = (UINT)ntohs(sockaddr6.sin6_port);
  13603. addr6 = &sockaddr6.sin6_addr;
  13604. InAddrToIP6(&sock->LocalIP, addr6);
  13605. sock->LocalIP.ipv6_scope_id = sockaddr6.sin6_scope_id;
  13606. }
  13607. else
  13608. {
  13609. struct sockaddr_in *sockaddr;
  13610. struct in_addr *addr;
  13611. sockaddr = (struct sockaddr_in *)&sockaddr6;
  13612. sock->LocalPort = (UINT)ntohs(sockaddr->sin_port);
  13613. addr = &sockaddr->sin_addr;
  13614. InAddrToIP(&sock->LocalIP, addr);
  13615. }
  13616. }
  13617. if (sock->IsRawSocket)
  13618. {
  13619. sock->LocalPort = sock->RemotePort = MAKE_SPECIAL_PORT(sock->RawSocketIPProtocol);
  13620. }
  13621. if (sock->Type == SOCK_UDP)
  13622. {
  13623. sock->UdpMaxMsgSize = UDP_MAX_MSG_SIZE_DEFAULT;
  13624. #ifdef OS_WIN32
  13625. if (true)
  13626. {
  13627. // Get the buffer size that can be transmitted and received at once
  13628. UINT max_value = 0;
  13629. int len = sizeof(UINT);
  13630. if (getsockopt(sock->socket, SOL_SOCKET, SO_MAX_MSG_SIZE, (char *)&max_value, &len) == 0)
  13631. {
  13632. sock->UdpMaxMsgSize = max_value;
  13633. }
  13634. }
  13635. #endif // OS_WIN32
  13636. }
  13637. if (sock->IPv6)
  13638. {
  13639. #ifdef IPV6_UNICAST_HOPS
  13640. opt_value = IPV6_UNICAST_HOPS;
  13641. #endif // IPV6_UNICAST_HOPS
  13642. }
  13643. else
  13644. {
  13645. #ifdef IP_TTL
  13646. opt_value = IP_TTL;
  13647. #endif // IP_TTL
  13648. }
  13649. // Support of the TTL value
  13650. size = sizeof(DWORD);
  13651. if (opt_value == 0 ||
  13652. getsockopt(sock->socket, (sock->IPv6 ? IPPROTO_IPV6 : IPPROTO_IP), opt_value, (char *)&dw, &size) != 0)
  13653. {
  13654. sock->IsTtlSupported = false;
  13655. }
  13656. else
  13657. {
  13658. sock->IsTtlSupported = true;
  13659. sock->CurrentTtl = dw;
  13660. }
  13661. }
  13662. Unlock(sock->lock);
  13663. }
  13664. // Setting the TTL value
  13665. bool SetTtl(SOCK *sock, UINT ttl)
  13666. {
  13667. DWORD dw;
  13668. int size;
  13669. UINT opt_value = 0;
  13670. // Validate arguments
  13671. if (sock == NULL)
  13672. {
  13673. return false;
  13674. }
  13675. if (sock->IsTtlSupported == false)
  13676. {
  13677. return false;
  13678. }
  13679. if (sock->CurrentTtl == ttl)
  13680. {
  13681. return true;
  13682. }
  13683. dw = ttl;
  13684. size = sizeof(DWORD);
  13685. if (sock->IPv6)
  13686. {
  13687. #ifdef IPV6_UNICAST_HOPS
  13688. opt_value = IPV6_UNICAST_HOPS;
  13689. #endif // IPV6_UNICAST_HOPS
  13690. }
  13691. else
  13692. {
  13693. #ifdef IP_TTL
  13694. opt_value = IP_TTL;
  13695. #endif // IP_TTL
  13696. }
  13697. if (opt_value == 0 ||
  13698. setsockopt(sock->socket, (sock->IPv6 ? IPPROTO_IPV6 : IPPROTO_IP), opt_value, (char *)&dw, size) == false)
  13699. {
  13700. return false;
  13701. }
  13702. sock->CurrentTtl = ttl;
  13703. return true;
  13704. }
  13705. // Release of the socket
  13706. void ReleaseSock(SOCK *s)
  13707. {
  13708. // Validate arguments
  13709. if (s == NULL)
  13710. {
  13711. return;
  13712. }
  13713. if (Release(s->ref) == 0)
  13714. {
  13715. if (s->ListenMode == false && s->ServerMode)
  13716. {
  13717. Print("");
  13718. }
  13719. CleanupSock(s);
  13720. }
  13721. }
  13722. // Clean-up of the socket
  13723. void CleanupSock(SOCK *s)
  13724. {
  13725. // Validate arguments
  13726. if (s == NULL)
  13727. {
  13728. return;
  13729. }
  13730. // {Debug("CleanupSock: Disconnect() Called: %s %u\n", __FILE__, __LINE__);Disconnect(s);}
  13731. Disconnect(s);
  13732. if (s->InProcAcceptQueue != NULL)
  13733. {
  13734. while (true)
  13735. {
  13736. SOCK *ss = GetNext(s->InProcAcceptQueue);
  13737. if (ss == NULL)
  13738. {
  13739. break;
  13740. }
  13741. Disconnect(ss);
  13742. ReleaseSock(ss);
  13743. }
  13744. ReleaseQueue(s->InProcAcceptQueue);
  13745. }
  13746. if (s->InProcAcceptEvent != NULL)
  13747. {
  13748. ReleaseEvent(s->InProcAcceptEvent);
  13749. }
  13750. if (s->ReverseAcceptQueue != NULL)
  13751. {
  13752. while (true)
  13753. {
  13754. SOCK *ss = GetNext(s->ReverseAcceptQueue);
  13755. if (ss == NULL)
  13756. {
  13757. break;
  13758. }
  13759. Disconnect(ss);
  13760. ReleaseSock(ss);
  13761. }
  13762. ReleaseQueue(s->ReverseAcceptQueue);
  13763. }
  13764. if (s->ReverseAcceptEvent != NULL)
  13765. {
  13766. ReleaseEvent(s->ReverseAcceptEvent);
  13767. }
  13768. if (s->SendTube != NULL)
  13769. {
  13770. TubeDisconnect(s->SendTube);
  13771. ReleaseTube(s->SendTube);
  13772. }
  13773. if (s->RecvTube != NULL)
  13774. {
  13775. TubeDisconnect(s->RecvTube);
  13776. ReleaseTube(s->RecvTube);
  13777. }
  13778. if (s->BulkRecvTube != NULL)
  13779. {
  13780. TubeDisconnect(s->BulkRecvTube);
  13781. ReleaseTube(s->BulkRecvTube);
  13782. }
  13783. if (s->BulkSendTube != NULL)
  13784. {
  13785. TubeDisconnect(s->BulkSendTube);
  13786. ReleaseTube(s->BulkSendTube);
  13787. }
  13788. if (s->BulkSendKey != NULL)
  13789. {
  13790. ReleaseSharedBuffer(s->BulkSendKey);
  13791. }
  13792. if (s->BulkRecvKey != NULL)
  13793. {
  13794. ReleaseSharedBuffer(s->BulkRecvKey);
  13795. }
  13796. if (s->InProcRecvFifo != NULL)
  13797. {
  13798. ReleaseFifo(s->InProcRecvFifo);
  13799. }
  13800. if (s->R_UDP_Stack != NULL)
  13801. {
  13802. FreeRUDP(s->R_UDP_Stack);
  13803. }
  13804. #ifdef OS_WIN32
  13805. Win32FreeAsyncSocket(s);
  13806. #else // OS_WIN32
  13807. UnixFreeAsyncSocket(s);
  13808. #endif // OS_WIN32
  13809. FreeBuf(s->SendBuf);
  13810. if (s->socket != INVALID_SOCKET)
  13811. {
  13812. #ifdef OS_WIN32
  13813. closesocket(s->socket);
  13814. #else // OS_WIN32
  13815. close(s->socket);
  13816. #endif // OS_WIN32
  13817. }
  13818. Free(s->RemoteHostname);
  13819. #ifdef OS_WIN32
  13820. if (s->hAcceptEvent != NULL)
  13821. {
  13822. CloseHandle(s->hAcceptEvent);
  13823. }
  13824. #endif // OS_WIN32
  13825. // Release the certificate
  13826. if (s->RemoteX != NULL)
  13827. {
  13828. FreeX(s->RemoteX);
  13829. s->RemoteX = NULL;
  13830. }
  13831. if (s->LocalX != NULL)
  13832. {
  13833. FreeX(s->LocalX);
  13834. s->LocalX = NULL;
  13835. }
  13836. // Cipher algorithm name
  13837. if (s->CipherName != NULL)
  13838. {
  13839. Free(s->CipherName);
  13840. s->CipherName = NULL;
  13841. }
  13842. Free(s->WaitToUseCipher);
  13843. DeleteLock(s->lock);
  13844. DeleteLock(s->ssl_lock);
  13845. DeleteLock(s->disconnect_lock);
  13846. Dec(num_tcp_connections);
  13847. Free(s);
  13848. }
  13849. // Creating a new socket
  13850. SOCK *NewSock()
  13851. {
  13852. SOCK *s = ZeroMallocFast(sizeof(SOCK));
  13853. s->ref = NewRef();
  13854. s->lock = NewLock();
  13855. s->SendBuf = NewBuf();
  13856. s->socket = INVALID_SOCKET;
  13857. s->ssl_lock = NewLock();
  13858. s->disconnect_lock = NewLock();
  13859. Inc(num_tcp_connections);
  13860. return s;
  13861. }
  13862. // Convert the IP to UINT
  13863. UINT IPToUINT(IP *ip)
  13864. {
  13865. UCHAR *b;
  13866. UINT i, value = 0;
  13867. // Validate arguments
  13868. if (ip == NULL)
  13869. {
  13870. return 0;
  13871. }
  13872. b = (UCHAR *)&value;
  13873. for (i = 0;i < 4;i++)
  13874. {
  13875. b[i] = ip->addr[i];
  13876. }
  13877. return value;
  13878. }
  13879. // Convert UINT to IP
  13880. void UINTToIP(IP *ip, UINT value)
  13881. {
  13882. UCHAR *b;
  13883. UINT i;
  13884. // Validate arguments
  13885. if (ip == NULL)
  13886. {
  13887. return;
  13888. }
  13889. ZeroIP4(ip);
  13890. b = (UCHAR *)&value;
  13891. for (i = 0;i < 4;i++)
  13892. {
  13893. ip->addr[i] = b[i];
  13894. }
  13895. }
  13896. // Get the host name of the computer
  13897. void GetMachineHostName(char *name, UINT size)
  13898. {
  13899. char tmp[MAX_SIZE];
  13900. UINT i, len;
  13901. // Validate arguments
  13902. if (name == NULL)
  13903. {
  13904. return;
  13905. }
  13906. GetMachineName(tmp, sizeof(tmp));
  13907. len = StrLen(tmp);
  13908. for (i = 0;i < len;i++)
  13909. {
  13910. if (tmp[i] == '.')
  13911. {
  13912. tmp[i] = 0;
  13913. }
  13914. }
  13915. ConvertSafeFileName(name, size, tmp);
  13916. }
  13917. // Get the IP address of this computer
  13918. void GetMachineIp(IP *ip)
  13919. {
  13920. char tmp[MAX_SIZE];
  13921. // Validate arguments
  13922. if (ip == NULL)
  13923. {
  13924. return;
  13925. }
  13926. Zero(ip, sizeof(IP));
  13927. SetIP(ip, 127, 0, 0, 1);
  13928. GetMachineName(tmp, sizeof(tmp));
  13929. GetIP(ip, tmp);
  13930. }
  13931. // Get the computer name from 'hosts'
  13932. bool GetMachineNameFromHosts(char *name, UINT size)
  13933. {
  13934. bool ret = false;
  13935. char *s;
  13936. BUF *b;
  13937. // Validate arguments
  13938. if (name == NULL)
  13939. {
  13940. return false;
  13941. }
  13942. b = ReadDump("/etc/hosts");
  13943. if (b == NULL)
  13944. {
  13945. return false;
  13946. }
  13947. while (true)
  13948. {
  13949. s = CfgReadNextLine(b);
  13950. if (s == NULL)
  13951. {
  13952. break;
  13953. }
  13954. else
  13955. {
  13956. TOKEN_LIST *t = ParseToken(s, " \t");
  13957. if (t != NULL)
  13958. {
  13959. if (t->NumTokens >= 2)
  13960. {
  13961. if (StrCmpi(t->Token[0], "127.0.0.1") == 0)
  13962. {
  13963. UINT i;
  13964. for (i = 1;i < t->NumTokens;i++)
  13965. {
  13966. if (StartWith(t->Token[i], "localhost") == false)
  13967. {
  13968. StrCpy(name, size, t->Token[i]);
  13969. ret = true;
  13970. }
  13971. }
  13972. }
  13973. }
  13974. }
  13975. FreeToken(t);
  13976. }
  13977. Free(s);
  13978. }
  13979. FreeBuf(b);
  13980. return ret;
  13981. }
  13982. // Get the computer name of this computer
  13983. void GetMachineName(char *name, UINT size)
  13984. {
  13985. GetMachineNameEx(name, size, false);
  13986. }
  13987. void GetMachineNameEx(char *name, UINT size, bool no_load_hosts)
  13988. {
  13989. static char name_cache[MAX_SIZE];
  13990. static bool name_cached = false;
  13991. char tmp[MAX_SIZE];
  13992. char tmp2[MAX_SIZE];
  13993. // Validate arguments
  13994. if (name == NULL)
  13995. {
  13996. return;
  13997. }
  13998. Lock(machine_name_lock);
  13999. {
  14000. if (name_cached != false)
  14001. {
  14002. StrCpy(name, size, name_cache);
  14003. Unlock(machine_name_lock);
  14004. return;
  14005. }
  14006. ClearStr(tmp, sizeof(tmp));
  14007. if (gethostname(tmp, MAX_SIZE) != 0)
  14008. {
  14009. StrCpy(name, size, "Unknown");
  14010. Unlock(machine_name_lock);
  14011. return;
  14012. }
  14013. ClearStr(name, size);
  14014. StrCpy(name, size, tmp);
  14015. if (IsEmptyStr(name) || StartWith(name, "localhost"))
  14016. {
  14017. #ifdef OS_WIN32
  14018. ClearStr(name, size);
  14019. MsGetComputerName(name, size);
  14020. #endif // OS_WIN32
  14021. }
  14022. if (IsEmptyStr(name) || StartWith(name, "localhost"))
  14023. {
  14024. if (no_load_hosts == false && OS_IS_UNIX(GetOsInfo()->OsType))
  14025. {
  14026. if (GetMachineNameFromHosts(tmp2, sizeof(tmp2)))
  14027. {
  14028. StrCpy(name, sizeof(name), tmp2); // 2019/02/09 by Dayiuu Nobori: DO NOT fix it! It affects DDNS configs.
  14029. }
  14030. }
  14031. }
  14032. StrCpy(name_cache, sizeof(name_cache), name);
  14033. name_cached = true;
  14034. }
  14035. Unlock(machine_name_lock);
  14036. }
  14037. // Host name acquisition thread
  14038. void GetHostNameThread(THREAD *t, void *p)
  14039. {
  14040. IP *ip;
  14041. char hostname[256];
  14042. // Validate arguments
  14043. if (t == NULL || p == NULL)
  14044. {
  14045. return;
  14046. }
  14047. ip = (IP *)p;
  14048. AddWaitThread(t);
  14049. NoticeThreadInit(t);
  14050. if (GetHostNameInner(hostname, sizeof(hostname), ip))
  14051. {
  14052. AddHostCache(ip, hostname);
  14053. }
  14054. Free(ip);
  14055. DelWaitThread(t);
  14056. }
  14057. // Get the host name
  14058. bool GetHostName(char *hostname, UINT size, IP *ip)
  14059. {
  14060. THREAD *t;
  14061. IP *p_ip;
  14062. bool ret;
  14063. // Validate arguments
  14064. if (hostname == NULL || ip == NULL)
  14065. {
  14066. return false;
  14067. }
  14068. if (GetHostCache(hostname, size, ip))
  14069. {
  14070. if (IsEmptyStr(hostname) == false)
  14071. {
  14072. return true;
  14073. }
  14074. else
  14075. {
  14076. return false;
  14077. }
  14078. }
  14079. p_ip = ZeroMalloc(sizeof(IP));
  14080. Copy(p_ip, ip, sizeof(IP));
  14081. t = NewThread(GetHostNameThread, p_ip);
  14082. WaitThreadInit(t);
  14083. WaitThread(t, TIMEOUT_HOSTNAME);
  14084. ReleaseThread(t);
  14085. ret = GetHostCache(hostname, size, ip);
  14086. if (ret == false)
  14087. {
  14088. if (IsIP4(ip))
  14089. {
  14090. ret = GetNetBiosName(hostname, size, ip);
  14091. if (ret)
  14092. {
  14093. AddHostCache(ip, hostname);
  14094. }
  14095. }
  14096. }
  14097. else
  14098. {
  14099. if (IsEmptyStr(hostname))
  14100. {
  14101. ret = false;
  14102. }
  14103. }
  14104. if (ret == false)
  14105. {
  14106. AddHostCache(ip, "");
  14107. StrCpy(hostname, size, "");
  14108. }
  14109. return ret;
  14110. }
  14111. // Perform a DNS reverse query
  14112. bool GetHostNameInner(char *hostname, UINT size, IP *ip)
  14113. {
  14114. struct in_addr addr;
  14115. struct sockaddr_in sa;
  14116. char tmp[MAX_SIZE];
  14117. char ip_str[64];
  14118. // Validate arguments
  14119. if (hostname == NULL || ip == NULL)
  14120. {
  14121. return false;
  14122. }
  14123. if (IsIP6(ip))
  14124. {
  14125. return GetHostNameInner6(hostname, size, ip);
  14126. }
  14127. // Reverse resolution
  14128. IPToInAddr(&addr, ip);
  14129. Zero(&sa, sizeof(sa));
  14130. sa.sin_family = AF_INET;
  14131. #if defined(UNIX_BSD) || defined(UNIX_MACOS)
  14132. sa.sin_len = INET_ADDRSTRLEN;
  14133. #endif // UNIX_BSD || UNIX_MACOS
  14134. Copy(&sa.sin_addr, &addr, sizeof(struct in_addr));
  14135. sa.sin_port = 0;
  14136. if (getnameinfo((struct sockaddr *)&sa, sizeof(sa), tmp, sizeof(tmp), NULL, 0, 0) != 0)
  14137. {
  14138. return false;
  14139. }
  14140. IPToStr(ip_str, sizeof(ip_str), ip);
  14141. if (StrCmpi(tmp, ip_str) == 0)
  14142. {
  14143. return false;
  14144. }
  14145. if (IsEmptyStr(tmp))
  14146. {
  14147. return false;
  14148. }
  14149. StrCpy(hostname, size, tmp);
  14150. return true;
  14151. }
  14152. bool GetHostNameInner6(char *hostname, UINT size, IP *ip)
  14153. {
  14154. struct in6_addr addr;
  14155. struct sockaddr_in6 sa;
  14156. char tmp[MAX_SIZE];
  14157. char ip_str[256];
  14158. // Validate arguments
  14159. if (hostname == NULL || ip == NULL)
  14160. {
  14161. return false;
  14162. }
  14163. // Reverse resolution
  14164. IPToInAddr6(&addr, ip);
  14165. Zero(&sa, sizeof(sa));
  14166. sa.sin6_family = AF_INET6;
  14167. #if defined(UNIX_BSD) || defined(UNIX_MACOS)
  14168. sa.sin6_len = INET6_ADDRSTRLEN;
  14169. #endif // UNIX_BSD || UNIX_MACOS
  14170. Copy(&sa.sin6_addr, &addr, sizeof(struct in6_addr));
  14171. sa.sin6_port = 0;
  14172. if (getnameinfo((struct sockaddr *)&sa, sizeof(sa), tmp, sizeof(tmp), NULL, 0, 0) != 0)
  14173. {
  14174. return false;
  14175. }
  14176. IPToStr(ip_str, sizeof(ip_str), ip);
  14177. if (StrCmpi(tmp, ip_str) == 0)
  14178. {
  14179. return false;
  14180. }
  14181. if (IsEmptyStr(tmp))
  14182. {
  14183. return false;
  14184. }
  14185. StrCpy(hostname, size, tmp);
  14186. return true;
  14187. }
  14188. #define NUM_NBT_QUERYS_SEND 3
  14189. // Get the NetBIOS name of the machine from the IP address
  14190. bool GetNetBiosName(char *name, UINT size, IP *ip)
  14191. {
  14192. SOCK *s;
  14193. UINT i, j;
  14194. bool flag = false;
  14195. bool ok = false;
  14196. NBTREQUEST req;
  14197. UCHAR buf[1024];
  14198. USHORT tran_id[NUM_NBT_QUERYS_SEND];
  14199. UINT64 timeout_tick;
  14200. // Validate arguments
  14201. if (name == NULL || ip == NULL)
  14202. {
  14203. return false;
  14204. }
  14205. IPToStr(name, size, ip);
  14206. for (i = 0;i < NUM_NBT_QUERYS_SEND;i++)
  14207. {
  14208. tran_id[i] = Rand16();
  14209. }
  14210. s = NewUDP(0);
  14211. if (s == NULL)
  14212. {
  14213. return false;
  14214. }
  14215. for (j = 0;j < NUM_NBT_QUERYS_SEND;j++)
  14216. {
  14217. Zero(&req, sizeof(req));
  14218. req.TransactionId = Endian16(tran_id[j]);
  14219. req.NumQuestions = Endian16(1);
  14220. req.Query[0] = 0x20;
  14221. req.Query[1] = 0x43;
  14222. req.Query[2] = 0x4b;
  14223. for (i = 3;i <= 32;i++)
  14224. {
  14225. req.Query[i] = 0x41;
  14226. }
  14227. req.Query[35] = 0x21;
  14228. req.Query[37] = 0x01;
  14229. if (SendTo(s, ip, 137, &req, sizeof(req)) == 0)
  14230. {
  14231. ReleaseSock(s);
  14232. return false;
  14233. }
  14234. }
  14235. timeout_tick = Tick64() + (UINT64)TIMEOUT_NETBIOS_HOSTNAME;
  14236. while (1)
  14237. {
  14238. UINT ret;
  14239. IP src_ip;
  14240. UINT src_port;
  14241. SOCKSET set;
  14242. if (Tick64() >= timeout_tick)
  14243. {
  14244. break;
  14245. }
  14246. InitSockSet(&set);
  14247. AddSockSet(&set, s);
  14248. Select(&set, 100, NULL, NULL);
  14249. if (flag == false)
  14250. {
  14251. flag = true;
  14252. }
  14253. else
  14254. {
  14255. SleepThread(10);
  14256. }
  14257. ret = RecvFrom(s, &src_ip, &src_port, buf, sizeof(buf));
  14258. if (ret == SOCK_LATER)
  14259. {
  14260. continue;
  14261. }
  14262. else if (ret == 0)
  14263. {
  14264. break;
  14265. }
  14266. else
  14267. {
  14268. if (ret >= sizeof(NBTRESPONSE))
  14269. {
  14270. NBTRESPONSE *r = (NBTRESPONSE *)buf;
  14271. bool b = false;
  14272. UINT i;
  14273. USHORT id = Endian16(r->TransactionId);
  14274. for (i = 0;i < NUM_NBT_QUERYS_SEND;i++)
  14275. {
  14276. if (id == tran_id[i])
  14277. {
  14278. b = true;
  14279. break;
  14280. }
  14281. }
  14282. if (b)
  14283. {
  14284. if (r->Flags != 0 && r->NumQuestions == 0 && r->AnswerRRs >= 1)
  14285. {
  14286. if (r->Response[0] == 0x20 && r->Response[1] == 0x43 &&
  14287. r->Response[2] == 0x4b)
  14288. {
  14289. if (r->Response[34] == 0x00 && r->Response[35] == 0x21 &&
  14290. r->Response[36] == 0x00 && r->Response[37] == 0x01)
  14291. {
  14292. char *a = (char *)(&r->Response[45]);
  14293. if (StrCheckLen(a, 15))
  14294. {
  14295. if (IsEmptyStr(a) == false)
  14296. {
  14297. StrCpy(name, size, a);
  14298. Trim(name);
  14299. ok = true;
  14300. }
  14301. else
  14302. {
  14303. ok = false;
  14304. break;
  14305. }
  14306. }
  14307. }
  14308. }
  14309. }
  14310. }
  14311. }
  14312. }
  14313. }
  14314. ReleaseSock(s);
  14315. return ok;
  14316. }
  14317. // Set the IP address
  14318. void SetIP(IP *ip, UCHAR a1, UCHAR a2, UCHAR a3, UCHAR a4)
  14319. {
  14320. // Validate arguments
  14321. if (ip == NULL)
  14322. {
  14323. return;
  14324. }
  14325. Zero(ip, sizeof(IP));
  14326. ip->addr[0] = a1;
  14327. ip->addr[1] = a2;
  14328. ip->addr[2] = a3;
  14329. ip->addr[3] = a4;
  14330. }
  14331. UINT SetIP32(UCHAR a1, UCHAR a2, UCHAR a3, UCHAR a4)
  14332. {
  14333. IP ip;
  14334. Zero(&ip, sizeof(ip));
  14335. SetIP(&ip, a1, a2, a3, a4);
  14336. return IPToUINT(&ip);
  14337. }
  14338. // Get either of v4 and v6 results with a DNS forward lookup (The IPv4 precedes in the case of both results)
  14339. bool GetIP46Any4(IP *ip, char *hostname)
  14340. {
  14341. IP ip4, ip6;
  14342. bool b = false;
  14343. // Validate arguments
  14344. if (ip == NULL || hostname == NULL)
  14345. {
  14346. return false;
  14347. }
  14348. if (GetIP46(&ip4, &ip6, hostname) == false)
  14349. {
  14350. return false;
  14351. }
  14352. if (IsZeroIp(&ip6) == false)
  14353. {
  14354. Copy(ip, &ip6, sizeof(IP));
  14355. b = true;
  14356. }
  14357. if (IsZeroIp(&ip4) == false)
  14358. {
  14359. Copy(ip, &ip4, sizeof(IP));
  14360. b = true;
  14361. }
  14362. return b;
  14363. }
  14364. // Get either of v4 and v6 results with a DNS forward lookup (The IPv6 precedes in the case of both)
  14365. bool GetIP46Any6(IP *ip, char *hostname)
  14366. {
  14367. IP ip4, ip6;
  14368. bool b = false;
  14369. // Validate arguments
  14370. if (ip == NULL || hostname == NULL)
  14371. {
  14372. return false;
  14373. }
  14374. if (GetIP46(&ip4, &ip6, hostname) == false)
  14375. {
  14376. return false;
  14377. }
  14378. if (IsZeroIp(&ip4) == false)
  14379. {
  14380. Copy(ip, &ip4, sizeof(IP));
  14381. b = true;
  14382. }
  14383. if (IsZeroIp(&ip6) == false)
  14384. {
  14385. Copy(ip, &ip6, sizeof(IP));
  14386. b = true;
  14387. }
  14388. return b;
  14389. }
  14390. // Obtain in both v4 and v6 results with a DNS forward lookup
  14391. bool GetIP46(IP *ip4, IP *ip6, char *hostname)
  14392. {
  14393. return GetIP46Ex(ip4, ip6, hostname, 0, NULL);
  14394. }
  14395. bool GetIP46Ex(IP *ip4, IP *ip6, char *hostname, UINT timeout, bool *cancel)
  14396. {
  14397. IP a, b;
  14398. bool ok_a, ok_b;
  14399. // Validate arguments
  14400. if (ip4 == NULL || ip6 == NULL || hostname == NULL)
  14401. {
  14402. return false;
  14403. }
  14404. ZeroIP4(ip4);
  14405. ZeroIP6(ip6);
  14406. ok_a = ok_b = false;
  14407. if (GetIP6Ex(&a, hostname, timeout, cancel))
  14408. {
  14409. ok_a = true;
  14410. }
  14411. if (GetIP4Ex(&b, hostname, timeout, cancel))
  14412. {
  14413. ok_b = true;
  14414. }
  14415. if (ok_a)
  14416. {
  14417. if (IsIP4(&a))
  14418. {
  14419. Copy(ip4, &a, sizeof(IP));
  14420. }
  14421. }
  14422. if (ok_b)
  14423. {
  14424. if (IsIP4(&b))
  14425. {
  14426. Copy(ip4, &b, sizeof(IP));
  14427. }
  14428. if (IsIP6(&b))
  14429. {
  14430. Copy(ip6, &b, sizeof(IP));
  14431. }
  14432. }
  14433. if (ok_a)
  14434. {
  14435. if (IsIP6(&a))
  14436. {
  14437. Copy(ip6, &a, sizeof(IP));
  14438. }
  14439. }
  14440. if (IsZeroIp(ip4) && IsZeroIp(ip6))
  14441. {
  14442. return false;
  14443. }
  14444. return true;
  14445. }
  14446. // Clean-up of the parameters for GetIP thread
  14447. void CleanupGetIPThreadParam(GETIP_THREAD_PARAM *p)
  14448. {
  14449. // Validate arguments
  14450. if (p == NULL)
  14451. {
  14452. return;
  14453. }
  14454. Free(p);
  14455. }
  14456. // Release of the parameters of the GetIP for thread
  14457. void ReleaseGetIPThreadParam(GETIP_THREAD_PARAM *p)
  14458. {
  14459. // Validate arguments
  14460. if (p == NULL)
  14461. {
  14462. return;
  14463. }
  14464. if (Release(p->Ref) == 0)
  14465. {
  14466. CleanupGetIPThreadParam(p);
  14467. }
  14468. }
  14469. // Thread to perform to query the DNS forward lookup (with timeout)
  14470. void GetIP4Ex6ExThread(THREAD *t, void *param)
  14471. {
  14472. GETIP_THREAD_PARAM *p;
  14473. // Validate arguments
  14474. if (t == NULL || param == NULL)
  14475. {
  14476. return;
  14477. }
  14478. p = (GETIP_THREAD_PARAM *)param;
  14479. AddRef(p->Ref);
  14480. NoticeThreadInit(t);
  14481. AddWaitThread(t);
  14482. // Execution of resolution
  14483. if (p->IPv6 == false)
  14484. {
  14485. // IPv4
  14486. p->Ok = GetIP4Inner(&p->Ip, p->HostName);
  14487. }
  14488. else
  14489. {
  14490. // IPv6
  14491. p->Ok = GetIP6Inner(&p->Ip, p->HostName);
  14492. }
  14493. ReleaseGetIPThreadParam(p);
  14494. DelWaitThread(t);
  14495. Dec(getip_thread_counter);
  14496. }
  14497. // Perform a forward DNS query (with timeout)
  14498. bool GetIP4Ex6Ex(IP *ip, char *hostname_arg, UINT timeout, bool ipv6, bool *cancel)
  14499. {
  14500. return GetIP4Ex6Ex2(ip, hostname_arg, timeout, ipv6, cancel, false);
  14501. }
  14502. bool GetIP4Ex6Ex2(IP *ip, char *hostname_arg, UINT timeout, bool ipv6, bool *cancel, bool only_direct_dns)
  14503. {
  14504. GETIP_THREAD_PARAM *p;
  14505. THREAD *t;
  14506. bool ret = false;
  14507. UINT64 start_tick = 0;
  14508. UINT64 end_tick = 0;
  14509. UINT64 spent_time = 0;
  14510. UINT64 now;
  14511. UINT n;
  14512. bool use_dns_proxy = false;
  14513. char hostname[260];
  14514. UINT i;
  14515. bool timed_out;
  14516. // Validate arguments
  14517. if (ip == NULL || hostname_arg == NULL)
  14518. {
  14519. return false;
  14520. }
  14521. if (timeout == 0)
  14522. {
  14523. timeout = TIMEOUT_GETIP;
  14524. }
  14525. Zero(hostname, sizeof(hostname));
  14526. StrCpy(hostname, sizeof(hostname), hostname_arg);
  14527. i = SearchStrEx(hostname, "/", 0, true);
  14528. if (i != INFINITE)
  14529. {
  14530. hostname[i] = 0;
  14531. }
  14532. if (ipv6 == false)
  14533. {
  14534. IP ip2;
  14535. if (StrToIP(&ip2, hostname) && IsZeroIp(&ip2) == false)
  14536. {
  14537. if (IsIP4(&ip2))
  14538. {
  14539. // IPv4 address direct specification
  14540. Copy(ip, &ip2, sizeof(IP));
  14541. return true;
  14542. }
  14543. else
  14544. {
  14545. // IPv6 address direct specification
  14546. return false;
  14547. }
  14548. }
  14549. }
  14550. else
  14551. {
  14552. IP ip2;
  14553. if (StrToIP(&ip2, hostname) && IsZeroIp(&ip2) == false)
  14554. {
  14555. if (IsIP6(&ip2))
  14556. {
  14557. // IPv6 address direct specification
  14558. Copy(ip, &ip2, sizeof(IP));
  14559. return true;
  14560. }
  14561. else
  14562. {
  14563. // IPv4 address direct specification
  14564. return false;
  14565. }
  14566. }
  14567. }
  14568. if (only_direct_dns == false)
  14569. {
  14570. if (ipv6 == false)
  14571. {
  14572. if (IsUseDnsProxy())
  14573. {
  14574. use_dns_proxy = true;
  14575. }
  14576. }
  14577. }
  14578. // check the quota
  14579. start_tick = Tick64();
  14580. end_tick = start_tick + (UINT64)timeout;
  14581. n = 0;
  14582. timed_out = false;
  14583. while (true)
  14584. {
  14585. UINT64 now = Tick64();
  14586. UINT64 remain;
  14587. UINT remain32;
  14588. if (GetGetIpThreadMaxNum() > GetCurrentGetIpThreadNum())
  14589. {
  14590. // below the quota
  14591. break;
  14592. }
  14593. if (now >= end_tick)
  14594. {
  14595. // timeouted
  14596. timed_out = true;
  14597. break;
  14598. }
  14599. if (cancel != NULL && (*cancel))
  14600. {
  14601. // cancelled
  14602. timed_out = true;
  14603. break;
  14604. }
  14605. remain = end_tick - now;
  14606. remain32 = MIN((UINT)remain, 100);
  14607. SleepThread(remain32);
  14608. n++;
  14609. }
  14610. now = Tick64();
  14611. spent_time = now - start_tick;
  14612. if (n == 0)
  14613. {
  14614. spent_time = 0;
  14615. }
  14616. if ((UINT)spent_time >= timeout)
  14617. {
  14618. timed_out = true;
  14619. }
  14620. if (timed_out)
  14621. {
  14622. IP ip2;
  14623. // timed out, cancelled
  14624. if (QueryDnsCache(&ip2, hostname))
  14625. {
  14626. ret = true;
  14627. Copy(ip, &ip2, sizeof(IP));
  14628. }
  14629. Debug("GetIP4Ex6Ex2: Worker thread quota exceeded: max=%u current=%u\n",
  14630. GetGetIpThreadMaxNum(), GetCurrentGetIpThreadNum());
  14631. return ret;
  14632. }
  14633. // Increment the counter
  14634. Inc(getip_thread_counter);
  14635. if (spent_time != 0)
  14636. {
  14637. Debug("GetIP4Ex6Ex2: Waited for %u msecs to create a worker thread.\n",
  14638. spent_time);
  14639. }
  14640. timeout -= (UINT)spent_time;
  14641. p = ZeroMalloc(sizeof(GETIP_THREAD_PARAM));
  14642. p->Ref = NewRef();
  14643. StrCpy(p->HostName, sizeof(p->HostName), hostname);
  14644. p->IPv6 = ipv6;
  14645. p->Timeout = timeout;
  14646. p->Ok = false;
  14647. t = NewThread(GetIP4Ex6ExThread, p);
  14648. WaitThreadInit(t);
  14649. if (cancel == NULL)
  14650. {
  14651. WaitThread(t, timeout);
  14652. }
  14653. else
  14654. {
  14655. start_tick = Tick64();
  14656. end_tick = start_tick + (UINT64)timeout;
  14657. while (true)
  14658. {
  14659. UINT64 now = Tick64();
  14660. UINT64 remain;
  14661. UINT remain32;
  14662. if (*cancel)
  14663. {
  14664. break;
  14665. }
  14666. if (now >= end_tick)
  14667. {
  14668. break;
  14669. }
  14670. remain = end_tick - now;
  14671. remain32 = MIN((UINT)remain, 100);
  14672. if (WaitThread(t, remain32))
  14673. {
  14674. break;
  14675. }
  14676. }
  14677. }
  14678. ReleaseThread(t);
  14679. if (p->Ok)
  14680. {
  14681. ret = true;
  14682. Copy(ip, &p->Ip, sizeof(IP));
  14683. }
  14684. else
  14685. {
  14686. IP ip2;
  14687. #if 0
  14688. if (only_direct_dns == false)
  14689. {
  14690. if (ipv6)
  14691. {
  14692. UINT flets_type = DetectFletsType();
  14693. // if I'm in the FLETs of NTT East,
  14694. // try to get an IP address using the DNS proxy server
  14695. if ((flets_type & FLETS_DETECT_TYPE_EAST_BFLETS_PRIVATE) &&
  14696. GetIPViaDnsProxyForJapanFlets(ip, hostname, true, 0, cancel, NULL))
  14697. {
  14698. // B FLETs
  14699. ret = true;
  14700. }
  14701. else if ((flets_type & FLETS_DETECT_TYPE_EAST_NGN_PRIVATE) &&
  14702. GetIPViaDnsProxyForJapanFlets(ip, hostname, true, 0, cancel, FLETS_NGN_EAST_DNS_PROXY_HOSTNAME))
  14703. {
  14704. // FLET'S Hikar-Next (NTT East)
  14705. ret = true;
  14706. }
  14707. else if ((flets_type & FLETS_DETECT_TYPE_WEST_NGN_PRIVATE) &&
  14708. GetIPViaDnsProxyForJapanFlets(ip, hostname, true, 0, cancel, FLETS_NGN_WEST_DNS_PROXY_HOSTNAME))
  14709. {
  14710. // FLET'S Hikar-Next (NTT West)
  14711. ret = true;
  14712. }
  14713. }
  14714. }
  14715. #endif
  14716. if (QueryDnsCache(&ip2, hostname))
  14717. {
  14718. ret = true;
  14719. Copy(ip, &ip2, sizeof(IP));
  14720. }
  14721. }
  14722. ReleaseGetIPThreadParam(p);
  14723. return ret;
  14724. }
  14725. bool GetIP4Ex(IP *ip, char *hostname, UINT timeout, bool *cancel)
  14726. {
  14727. return GetIP4Ex6Ex(ip, hostname, timeout, false, cancel);
  14728. }
  14729. bool GetIP6Ex(IP *ip, char *hostname, UINT timeout, bool *cancel)
  14730. {
  14731. return GetIP4Ex6Ex(ip, hostname, timeout, true, cancel);
  14732. }
  14733. bool GetIP4(IP *ip, char *hostname)
  14734. {
  14735. return GetIP4Ex(ip, hostname, 0, NULL);
  14736. }
  14737. bool GetIP6(IP *ip, char *hostname)
  14738. {
  14739. return GetIP6Ex(ip, hostname, 0, NULL);
  14740. }
  14741. // Perform a DNS forward lookup query
  14742. bool GetIP(IP *ip, char *hostname)
  14743. {
  14744. return GetIPEx(ip, hostname, false);
  14745. }
  14746. bool GetIPEx(IP *ip, char *hostname, bool ipv6)
  14747. {
  14748. if (ipv6 == false)
  14749. {
  14750. return GetIP4(ip, hostname);
  14751. }
  14752. else
  14753. {
  14754. return GetIP6(ip, hostname);
  14755. }
  14756. }
  14757. bool GetIP6Inner(IP *ip, char *hostname)
  14758. {
  14759. struct sockaddr_in6 in;
  14760. struct in6_addr addr;
  14761. struct addrinfo hint;
  14762. struct addrinfo *info;
  14763. // Validate arguments
  14764. if (ip == NULL || hostname == NULL)
  14765. {
  14766. return false;
  14767. }
  14768. if (IsEmptyStr(hostname))
  14769. {
  14770. return false;
  14771. }
  14772. if (StrCmpi(hostname, "localhost") == 0)
  14773. {
  14774. GetLocalHostIP6(ip);
  14775. return true;
  14776. }
  14777. if (StrToIP6(ip, hostname) == false && StrToIP(ip, hostname) == false)
  14778. {
  14779. // Forward resolution
  14780. Zero(&hint, sizeof(hint));
  14781. hint.ai_family = AF_INET6;
  14782. hint.ai_socktype = SOCK_STREAM;
  14783. hint.ai_protocol = IPPROTO_TCP;
  14784. info = NULL;
  14785. if (getaddrinfo(hostname, NULL, &hint, &info) != 0 ||
  14786. info->ai_family != AF_INET6)
  14787. {
  14788. if (info)
  14789. {
  14790. freeaddrinfo(info);
  14791. }
  14792. return QueryDnsCacheEx(ip, hostname, true);
  14793. }
  14794. // Forward resolution success
  14795. Copy(&in, info->ai_addr, sizeof(struct sockaddr_in6));
  14796. freeaddrinfo(info);
  14797. Copy(&addr, &in.sin6_addr, sizeof(addr));
  14798. InAddrToIP6(ip, &addr);
  14799. }
  14800. // Save Cache
  14801. NewDnsCache(hostname, ip);
  14802. return true;
  14803. }
  14804. bool GetIP4Inner(IP *ip, char *hostname)
  14805. {
  14806. struct sockaddr_in in;
  14807. struct in_addr addr;
  14808. struct addrinfo hint;
  14809. struct addrinfo *info;
  14810. // Validate arguments
  14811. if (ip == NULL || hostname == NULL)
  14812. {
  14813. return false;
  14814. }
  14815. if (IsEmptyStr(hostname))
  14816. {
  14817. return false;
  14818. }
  14819. if (StrCmpi(hostname, "localhost") == 0)
  14820. {
  14821. SetIP(ip, 127, 0, 0, 1);
  14822. return true;
  14823. }
  14824. if (StrToIP6(ip, hostname) == false && StrToIP(ip, hostname) == false)
  14825. {
  14826. // Forward resolution
  14827. Zero(&hint, sizeof(hint));
  14828. hint.ai_family = AF_INET;
  14829. hint.ai_socktype = SOCK_STREAM;
  14830. hint.ai_protocol = IPPROTO_TCP;
  14831. info = NULL;
  14832. if (getaddrinfo(hostname, NULL, &hint, &info) != 0 ||
  14833. info->ai_family != AF_INET)
  14834. {
  14835. if (info)
  14836. {
  14837. freeaddrinfo(info);
  14838. }
  14839. return QueryDnsCache(ip, hostname);
  14840. }
  14841. // Forward resolution success
  14842. Copy(&in, info->ai_addr, sizeof(struct sockaddr_in));
  14843. freeaddrinfo(info);
  14844. Copy(&addr, &in.sin_addr, sizeof(addr));
  14845. InAddrToIP(ip, &addr);
  14846. }
  14847. // Save Cache
  14848. NewDnsCache(hostname, ip);
  14849. return true;
  14850. }
  14851. // Search in the DNS cache
  14852. bool QueryDnsCache(IP *ip, char *hostname)
  14853. {
  14854. return QueryDnsCacheEx(ip, hostname, false);
  14855. }
  14856. bool QueryDnsCacheEx(IP *ip, char *hostname, bool ipv6)
  14857. {
  14858. DNSCACHE *c;
  14859. char tmp[MAX_SIZE];
  14860. // Validate arguments
  14861. if (ip == NULL || hostname == NULL)
  14862. {
  14863. return false;
  14864. }
  14865. GenDnsCacheKeyName(tmp, sizeof(tmp), hostname, ipv6);
  14866. c = FindDnsCache(tmp);
  14867. if (c == NULL)
  14868. {
  14869. return false;
  14870. }
  14871. Copy(ip, &c->IpAddress, sizeof(IP));
  14872. return true;
  14873. }
  14874. // Convert the IP to a string
  14875. void IPToUniStr(wchar_t *str, UINT size, IP *ip)
  14876. {
  14877. char tmp[128];
  14878. IPToStr(tmp, sizeof(tmp), ip);
  14879. StrToUni(str, size, tmp);
  14880. }
  14881. // Convert the IP to a string (32bit UINT)
  14882. void IPToUniStr32(wchar_t *str, UINT size, UINT ip)
  14883. {
  14884. char tmp[128];
  14885. IPToStr32(tmp, sizeof(tmp), ip);
  14886. StrToUni(str, size, tmp);
  14887. }
  14888. // Convert the IP to a string (128bit byte array)
  14889. void IPToStr128(char *str, UINT size, UCHAR *ip_bytes)
  14890. {
  14891. IP ip_st;
  14892. // Validate arguments
  14893. if (str == NULL)
  14894. {
  14895. return;
  14896. }
  14897. SetIP6(&ip_st, ip_bytes);
  14898. IPToStr(str, size, &ip_st);
  14899. }
  14900. // Convert the IP to a string (32bit UINT)
  14901. void IPToStr32(char *str, UINT size, UINT ip)
  14902. {
  14903. IP ip_st;
  14904. // Validate arguments
  14905. if (str == NULL)
  14906. {
  14907. return;
  14908. }
  14909. UINTToIP(&ip_st, ip);
  14910. IPToStr(str, size, &ip_st);
  14911. }
  14912. // Convert IPv4 or IPv6 to a string
  14913. void IPToStr4or6(char *str, UINT size, UINT ip_4_uint, UCHAR *ip_6_bytes)
  14914. {
  14915. IP ip4;
  14916. IP ip6;
  14917. IP ip;
  14918. // Validate arguments
  14919. if (str == NULL)
  14920. {
  14921. return;
  14922. }
  14923. Zero(&ip, sizeof(ip));
  14924. UINTToIP(&ip4, ip_4_uint);
  14925. SetIP6(&ip6, ip_6_bytes);
  14926. if (IsIP6(&ip4) || (IsZeroIp(&ip4) && (IsZeroIp(&ip6) == false)))
  14927. {
  14928. Copy(&ip, &ip6, sizeof(IP));
  14929. }
  14930. else
  14931. {
  14932. Copy(&ip, &ip4, sizeof(IP));
  14933. }
  14934. IPToStr(str, size, &ip);
  14935. }
  14936. // Convert the IP to a string
  14937. void IPToStr(char *str, UINT size, IP *ip)
  14938. {
  14939. // Validate arguments
  14940. if (str == NULL || ip == NULL)
  14941. {
  14942. return;
  14943. }
  14944. if (IsIP6(ip))
  14945. {
  14946. IPToStr6(str, size, ip);
  14947. }
  14948. else
  14949. {
  14950. IPToStr4(str, size, ip);
  14951. }
  14952. }
  14953. // Convert the IPv4 to a string
  14954. void IPToStr4(char *str, UINT size, IP *ip)
  14955. {
  14956. // Validate arguments
  14957. if (str == NULL || ip == NULL)
  14958. {
  14959. return;
  14960. }
  14961. // Conversion
  14962. snprintf(str, size != 0 ? size : 64, "%u.%u.%u.%u", ip->addr[0], ip->addr[1], ip->addr[2], ip->addr[3]);
  14963. }
  14964. // Convert the string to an IP
  14965. bool StrToIP(IP *ip, char *str)
  14966. {
  14967. TOKEN_LIST *token;
  14968. char *tmp;
  14969. UINT i;
  14970. // Validate arguments
  14971. if (ip == NULL || str == NULL)
  14972. {
  14973. return false;
  14974. }
  14975. if (StrToIP6(ip, str))
  14976. {
  14977. return true;
  14978. }
  14979. Zero(ip, sizeof(IP));
  14980. tmp = CopyStr(str);
  14981. Trim(tmp);
  14982. token = ParseToken(tmp, ".");
  14983. Free(tmp);
  14984. if (token->NumTokens != 4)
  14985. {
  14986. FreeToken(token);
  14987. return false;
  14988. }
  14989. for (i = 0;i < 4;i++)
  14990. {
  14991. char *s = token->Token[i];
  14992. if (s[0] < '0' || s[0] > '9' ||
  14993. (ToInt(s) >= 256))
  14994. {
  14995. FreeToken(token);
  14996. return false;
  14997. }
  14998. }
  14999. Zero(ip, sizeof(IP));
  15000. for (i = 0;i < 4;i++)
  15001. {
  15002. ip->addr[i] = (UCHAR)ToInt(token->Token[i]);
  15003. }
  15004. FreeToken(token);
  15005. return true;
  15006. }
  15007. UINT StrToIP32(char *str)
  15008. {
  15009. IP ip;
  15010. // Validate arguments
  15011. if (str == NULL)
  15012. {
  15013. return 0;
  15014. }
  15015. if (StrToIP(&ip, str) == false)
  15016. {
  15017. return 0;
  15018. }
  15019. return IPToUINT(&ip);
  15020. }
  15021. bool UniStrToIP(IP *ip, wchar_t *str)
  15022. {
  15023. char *tmp;
  15024. bool ret;
  15025. tmp = CopyUniToStr(str);
  15026. ret = StrToIP(ip, tmp);
  15027. Free(tmp);
  15028. return ret;
  15029. }
  15030. UINT UniStrToIP32(wchar_t *str)
  15031. {
  15032. UINT ret;
  15033. char *tmp;
  15034. tmp = CopyUniToStr(str);
  15035. ret = StrToIP32(tmp);
  15036. Free(tmp);
  15037. return ret;
  15038. }
  15039. // Convert the IP to the in_addr
  15040. void IPToInAddr(struct in_addr *addr, IP *ip)
  15041. {
  15042. UINT i;
  15043. // Validate arguments
  15044. if (addr == NULL || ip == NULL)
  15045. {
  15046. return;
  15047. }
  15048. Zero(addr, sizeof(struct in_addr));
  15049. if (IsIP6(ip) == false)
  15050. {
  15051. for (i = 0;i < 4;i++)
  15052. {
  15053. ((UCHAR *)addr)[i] = ip->addr[i];
  15054. }
  15055. }
  15056. }
  15057. // Convert the IP to the in6_addr
  15058. void IPToInAddr6(struct in6_addr *addr, IP *ip)
  15059. {
  15060. UINT i;
  15061. // Validate arguments
  15062. if (addr == NULL || ip == NULL)
  15063. {
  15064. return;
  15065. }
  15066. Zero(addr, sizeof(struct in6_addr));
  15067. if (IsIP6(ip))
  15068. {
  15069. for (i = 0;i < 16;i++)
  15070. {
  15071. ((UCHAR *)addr)[i] = ip->ipv6_addr[i];
  15072. }
  15073. }
  15074. }
  15075. // Convert the in_addr to the IP
  15076. void InAddrToIP(IP *ip, struct in_addr *addr)
  15077. {
  15078. UINT i;
  15079. // Validate arguments
  15080. if (ip == NULL || addr == NULL)
  15081. {
  15082. return;
  15083. }
  15084. Zero(ip, sizeof(IP));
  15085. for (i = 0;i < 4;i++)
  15086. {
  15087. ip->addr[i] = ((UCHAR *)addr)[i];
  15088. }
  15089. }
  15090. // Convert the in6_addr to the IP
  15091. void InAddrToIP6(IP *ip, struct in6_addr *addr)
  15092. {
  15093. UINT i;
  15094. // Validate arguments
  15095. if (ip == NULL || addr == NULL)
  15096. {
  15097. return;
  15098. }
  15099. ZeroIP6(ip);
  15100. for (i = 0;i < 16;i++)
  15101. {
  15102. ip->ipv6_addr[i] = ((UCHAR *)addr)[i];
  15103. }
  15104. }
  15105. // Search in the DNS cache
  15106. DNSCACHE *FindDnsCache(char *hostname)
  15107. {
  15108. return FindDnsCacheEx(hostname, false);
  15109. }
  15110. DNSCACHE *FindDnsCacheEx(char *hostname, bool ipv6)
  15111. {
  15112. DNSCACHE *c;
  15113. char tmp[MAX_SIZE];
  15114. if (hostname == NULL)
  15115. {
  15116. return NULL;
  15117. }
  15118. GenDnsCacheKeyName(tmp, sizeof(tmp), hostname, ipv6);
  15119. LockDnsCache();
  15120. {
  15121. DNSCACHE t;
  15122. t.HostName = tmp;
  15123. c = Search(DnsCache, &t);
  15124. }
  15125. UnlockDnsCache();
  15126. return c;
  15127. }
  15128. // Generate the IPv4 / IPv6 key name for the DNS cache
  15129. void GenDnsCacheKeyName(char *dst, UINT size, char *src, bool ipv6)
  15130. {
  15131. // Validate arguments
  15132. if (dst == NULL || src == NULL)
  15133. {
  15134. return;
  15135. }
  15136. if (ipv6 == false)
  15137. {
  15138. StrCpy(dst, size, src);
  15139. }
  15140. else
  15141. {
  15142. Format(dst, size, "%s@ipv6", src);
  15143. }
  15144. }
  15145. // Registration of the new DNS cache
  15146. void NewDnsCache(char *hostname, IP *ip)
  15147. {
  15148. NewDnsCacheEx(hostname, ip, IsIP6(ip));
  15149. }
  15150. void NewDnsCacheEx(char *hostname, IP *ip, bool ipv6)
  15151. {
  15152. DNSCACHE *c;
  15153. char tmp[MAX_PATH];
  15154. // Validate arguments
  15155. if (hostname == NULL || ip == NULL)
  15156. {
  15157. return;
  15158. }
  15159. if (IsNetworkNameCacheEnabled() == false)
  15160. {
  15161. return;
  15162. }
  15163. GenDnsCacheKeyName(tmp, sizeof(tmp), hostname, ipv6);
  15164. LockDnsCache();
  15165. {
  15166. DNSCACHE t;
  15167. // Search for anything matches to the hostname first
  15168. t.HostName = tmp;
  15169. c = Search(DnsCache, &t);
  15170. if (c == NULL)
  15171. {
  15172. // Newly register
  15173. c = ZeroMalloc(sizeof(DNSCACHE));
  15174. c->HostName = CopyStr(tmp);
  15175. Copy(&c->IpAddress, ip, sizeof(IP));
  15176. Add(DnsCache, c);
  15177. }
  15178. else
  15179. {
  15180. // Update
  15181. Copy(&c->IpAddress, ip, sizeof(IP));
  15182. }
  15183. }
  15184. UnlockDnsCache();
  15185. }
  15186. // Name comparison of the DNS cache entries
  15187. int CompareDnsCache(void *p1, void *p2)
  15188. {
  15189. DNSCACHE *c1, *c2;
  15190. if (p1 == NULL || p2 == NULL)
  15191. {
  15192. return 0;
  15193. }
  15194. c1 = *(DNSCACHE **)p1;
  15195. c2 = *(DNSCACHE **)p2;
  15196. if (c1 == NULL || c2 == NULL)
  15197. {
  15198. return 0;
  15199. }
  15200. return StrCmpi(c1->HostName, c2->HostName);
  15201. }
  15202. // Initialization of the DNS cache
  15203. void InitDnsCache()
  15204. {
  15205. // Creating a List
  15206. DnsCache = NewList(CompareDnsCache);
  15207. }
  15208. // Release of the DNS cache
  15209. void FreeDnsCache()
  15210. {
  15211. LockDnsCache();
  15212. {
  15213. DNSCACHE *c;
  15214. UINT i;
  15215. for (i = 0;i < LIST_NUM(DnsCache);i++)
  15216. {
  15217. // Release the memory for the entry
  15218. c = LIST_DATA(DnsCache, i);
  15219. Free(c->HostName);
  15220. Free(c);
  15221. }
  15222. }
  15223. UnlockDnsCache();
  15224. // Release the list
  15225. ReleaseList(DnsCache);
  15226. DnsCache = NULL;
  15227. }
  15228. // Lock the DNS cache
  15229. void LockDnsCache()
  15230. {
  15231. LockList(DnsCache);
  15232. }
  15233. // Unlock the DNS cache
  15234. void UnlockDnsCache()
  15235. {
  15236. UnlockList(DnsCache);
  15237. }
  15238. // DH temp key callback
  15239. DH *TmpDhCallback(SSL *ssl, int is_export, int keylength)
  15240. {
  15241. DH *ret = NULL;
  15242. if (dh_2048 != NULL)
  15243. {
  15244. ret = dh_2048->dh;
  15245. }
  15246. return ret;
  15247. }
  15248. // Create the SSL_CTX
  15249. struct ssl_ctx_st *NewSSLCtx(bool server_mode)
  15250. {
  15251. struct ssl_ctx_st *ctx = SSL_CTX_new(SSLv23_method());
  15252. #ifdef SSL_OP_NO_TICKET
  15253. SSL_CTX_set_options(ctx, SSL_OP_NO_TICKET);
  15254. #endif // SSL_OP_NO_TICKET
  15255. #ifdef SSL_OP_CIPHER_SERVER_PREFERENCE
  15256. if (server_mode)
  15257. {
  15258. SSL_CTX_set_options(ctx, SSL_OP_CIPHER_SERVER_PREFERENCE);
  15259. }
  15260. #endif // SSL_OP_CIPHER_SERVER_PREFERENCE
  15261. SSL_CTX_set_tmp_dh_callback(ctx, TmpDhCallback);
  15262. #ifdef SSL_CTX_set_ecdh_auto
  15263. SSL_CTX_set_ecdh_auto(ctx, 1);
  15264. #endif // SSL_CTX_set_ecdh_auto
  15265. return ctx;
  15266. }
  15267. // Release of the SSL_CTX
  15268. void FreeSSLCtx(struct ssl_ctx_st *ctx)
  15269. {
  15270. // Validate arguments
  15271. if (ctx == NULL)
  15272. {
  15273. return;
  15274. }
  15275. SSL_CTX_free(ctx);
  15276. }
  15277. // The number of get ip threads
  15278. void SetGetIpThreadMaxNum(UINT num)
  15279. {
  15280. max_getip_thread = num;
  15281. }
  15282. UINT GetGetIpThreadMaxNum()
  15283. {
  15284. UINT ret = max_getip_thread;
  15285. if (ret == 0)
  15286. {
  15287. ret = 0x7FFFFFFF;
  15288. }
  15289. return ret;
  15290. }
  15291. UINT GetCurrentGetIpThreadNum()
  15292. {
  15293. return Count(getip_thread_counter);
  15294. }
  15295. // Initialize the network communication module
  15296. void InitNetwork()
  15297. {
  15298. disable_gethostname_by_accept = false;
  15299. InitDynList();
  15300. host_ip_address_list_cache_lock = NewLock();
  15301. host_ip_address_list_cache_last = 0;
  15302. num_tcp_connections = NewCounter();
  15303. getip_thread_counter = NewCounter();
  15304. // Initialization of client list
  15305. InitIpClientList();
  15306. // Thread related initialization
  15307. InitWaitThread();
  15308. // Initialization of the host name cache
  15309. InitHostCache();
  15310. #ifdef OS_WIN32
  15311. // Initializing the socket library
  15312. Win32InitSocketLibrary();
  15313. #else
  15314. UnixInitSocketLibrary();
  15315. #endif // OS_WIN32
  15316. // Initialization of the DNS cache
  15317. InitDnsCache();
  15318. // Locking initialization
  15319. machine_name_lock = NewLock();
  15320. disconnect_function_lock = NewLock();
  15321. aho = NewLock();
  15322. machine_ip_process_hash_lock = NewLock();
  15323. socket_library_lock = NewLock();
  15324. //ssl_connect_lock = NewLock(); //2012.9.28 Not required for recent OpenSSL
  15325. // ssl_accept_lock = NewLock();
  15326. dns_lock = NewLock();
  15327. unix_dns_server_addr_lock = NewLock();
  15328. Zero(&unix_dns_server, sizeof(unix_dns_server));
  15329. local_mac_list_lock = NewLock();
  15330. cipher_list_token = ParseToken(cipher_list, " ");
  15331. current_global_ip_lock = NewLock();
  15332. current_fqdn_lock = NewLock();
  15333. current_global_ip_set = false;
  15334. disable_cache = false;
  15335. dh_2048 = DhNew2048();
  15336. Zero(rand_port_numbers, sizeof(rand_port_numbers));
  15337. SetGetIpThreadMaxNum(DEFAULT_GETIP_THREAD_MAX_NUM);
  15338. }
  15339. // Enable the network name cache
  15340. void EnableNetworkNameCache()
  15341. {
  15342. disable_cache = false;
  15343. }
  15344. // Disable the network name cache
  15345. void DisableNetworkNameCache()
  15346. {
  15347. disable_cache = true;
  15348. }
  15349. // Get whether the network name cache is enabled
  15350. bool IsNetworkNameCacheEnabled()
  15351. {
  15352. return !disable_cache;
  15353. }
  15354. // Get the cipher algorithm list
  15355. TOKEN_LIST *GetCipherList()
  15356. {
  15357. return cipher_list_token;
  15358. }
  15359. // Get the TCP connections counter
  15360. COUNTER *GetNumTcpConnectionsCounter()
  15361. {
  15362. return num_tcp_connections;
  15363. }
  15364. // Get the current global IP address
  15365. bool GetCurrentGlobalIP(IP *ip, bool ipv6)
  15366. {
  15367. bool ret = false;
  15368. // Validate arguments
  15369. if (ip == NULL)
  15370. {
  15371. return false;
  15372. }
  15373. Zero(ip, sizeof(IP));
  15374. Lock(current_global_ip_lock);
  15375. {
  15376. if (ipv6 == false)
  15377. {
  15378. Copy(ip, &current_glocal_ipv4, sizeof(IP));
  15379. }
  15380. else
  15381. {
  15382. Copy(ip, &current_glocal_ipv6, sizeof(IP));
  15383. }
  15384. ret = current_global_ip_set;
  15385. }
  15386. Unlock(current_global_ip_lock);
  15387. return ret;
  15388. }
  15389. // Check whether the specified IP address is assigned to the local host
  15390. bool IsIPMyHost(IP *ip)
  15391. {
  15392. LIST *o;
  15393. UINT i;
  15394. bool ret = false;
  15395. // Validate arguments
  15396. if (ip == NULL)
  15397. {
  15398. return false;
  15399. }
  15400. if (IsZeroIp(ip))
  15401. {
  15402. return false;
  15403. }
  15404. // Search to check whether it matches to any of the IP of the local host
  15405. o = GetHostIPAddressList();
  15406. for (i = 0;i < LIST_NUM(o);i++)
  15407. {
  15408. IP *p = LIST_DATA(o, i);
  15409. if (CmpIpAddr(p, ip) == 0)
  15410. {
  15411. // Matched
  15412. ret = true;
  15413. break;
  15414. }
  15415. }
  15416. FreeHostIPAddressList(o);
  15417. if (ret == false)
  15418. {
  15419. if (IsLocalHostIP(ip))
  15420. {
  15421. // localhost IP addresses
  15422. ret = true;
  15423. }
  15424. }
  15425. return ret;
  15426. }
  15427. // Check whether the specified IP address is a private IP address
  15428. bool IsIPPrivate(IP *ip)
  15429. {
  15430. // Validate arguments
  15431. if (ip == NULL)
  15432. {
  15433. return false;
  15434. }
  15435. if (ip->addr[0] == 10)
  15436. {
  15437. return true;
  15438. }
  15439. if (ip->addr[0] == 172)
  15440. {
  15441. if (ip->addr[1] >= 16 && ip->addr[1] <= 31)
  15442. {
  15443. return true;
  15444. }
  15445. }
  15446. if (ip->addr[0] == 192 && ip->addr[1] == 168)
  15447. {
  15448. return true;
  15449. }
  15450. if (ip->addr[0] == 169 && ip->addr[1] == 254)
  15451. {
  15452. return true;
  15453. }
  15454. if (ip->addr[0] == 100)
  15455. {
  15456. if (ip->addr[1] >= 64 && ip->addr[1] <= 127)
  15457. {
  15458. return true;
  15459. }
  15460. }
  15461. if (g_private_ip_list != NULL)
  15462. {
  15463. if (IsIP4(ip))
  15464. {
  15465. UINT ip4 = IPToUINT(ip);
  15466. return IsOnPrivateIPFile(ip4);
  15467. }
  15468. }
  15469. return false;
  15470. }
  15471. // Is the IP address either local or private?
  15472. bool IsIPLocalOrPrivate(IP *ip)
  15473. {
  15474. // Validate arguments
  15475. if (ip == NULL)
  15476. {
  15477. return false;
  15478. }
  15479. if (IsIPPrivate(ip))
  15480. {
  15481. return true;
  15482. }
  15483. if (IsLocalHostIP(ip))
  15484. {
  15485. return true;
  15486. }
  15487. if (IsIPMyHost(ip))
  15488. {
  15489. return true;
  15490. }
  15491. return false;
  15492. }
  15493. // Read a private IP list file
  15494. void LoadPrivateIPFile()
  15495. {
  15496. BUF *b = ReadDump(PRIVATE_IP_TXT_FILENAME);
  15497. LIST *o;
  15498. if (b == NULL)
  15499. {
  15500. return;
  15501. }
  15502. o = NewList(NULL);
  15503. while (true)
  15504. {
  15505. char *line = CfgReadNextLine(b);
  15506. if (line == NULL)
  15507. {
  15508. break;
  15509. }
  15510. Trim(line);
  15511. if (IsEmptyStr(line) == false)
  15512. {
  15513. UINT ip = 0, mask = 0;
  15514. if (ParseIpAndSubnetMask4(line, &ip, &mask))
  15515. {
  15516. PRIVATE_IP_SUBNET *p = ZeroMalloc(sizeof(PRIVATE_IP_SUBNET));
  15517. p->Ip = ip;
  15518. p->Mask = mask;
  15519. p->Ip2 = ip & mask;
  15520. Add(o, p);
  15521. }
  15522. }
  15523. Free(line);
  15524. }
  15525. g_private_ip_list = o;
  15526. g_use_privateip_file = true;
  15527. FreeBuf(b);
  15528. }
  15529. // Examine whether the specified IP address is in the private IP file
  15530. bool IsOnPrivateIPFile(UINT ip)
  15531. {
  15532. bool ret = false;
  15533. if (g_private_ip_list != NULL)
  15534. {
  15535. LIST *o = g_private_ip_list;
  15536. UINT i;
  15537. for (i = 0;i < LIST_NUM(o);i++)
  15538. {
  15539. PRIVATE_IP_SUBNET *p = LIST_DATA(o, i);
  15540. if ((ip & p->Mask) == p->Ip2)
  15541. {
  15542. ret = true;
  15543. }
  15544. }
  15545. }
  15546. return ret;
  15547. }
  15548. // Free the private IP file
  15549. void FreePrivateIPFile()
  15550. {
  15551. if (g_private_ip_list != NULL)
  15552. {
  15553. LIST *o = g_private_ip_list;
  15554. UINT i;
  15555. g_private_ip_list = NULL;
  15556. for (i = 0;i < LIST_NUM(o);i++)
  15557. {
  15558. PRIVATE_IP_SUBNET *p = LIST_DATA(o, i);
  15559. Free(p);
  15560. }
  15561. ReleaseList(o);
  15562. }
  15563. g_use_privateip_file = false;
  15564. }
  15565. // Check whether the specified IP address is in the same network to this computer
  15566. bool IsIPAddressInSameLocalNetwork(IP *a)
  15567. {
  15568. bool ret = false;
  15569. LIST *o;
  15570. UINT i;
  15571. // Validate arguments
  15572. if (a == NULL)
  15573. {
  15574. return false;
  15575. }
  15576. o = GetHostIPAddressList();
  15577. if (o != NULL)
  15578. {
  15579. for (i = 0;i < LIST_NUM(o);i++)
  15580. {
  15581. IP *p = LIST_DATA(o, i);
  15582. if (IsIP4(p))
  15583. {
  15584. if (IsZeroIp(p) == false && p->addr[0] != 127)
  15585. {
  15586. if (IsInSameNetwork4Standard(p, a))
  15587. {
  15588. ret = true;
  15589. break;
  15590. }
  15591. }
  15592. }
  15593. }
  15594. FreeHostIPAddressList(o);
  15595. }
  15596. return ret;
  15597. }
  15598. // Guess the IPv4, IPv6 global address from the IP address list of the current interface
  15599. void GetCurrentGlobalIPGuess(IP *ip, bool ipv6)
  15600. {
  15601. LIST *o;
  15602. UINT i;
  15603. // Validate arguments
  15604. if (ip == NULL)
  15605. {
  15606. return;
  15607. }
  15608. Zero(ip, sizeof(IP));
  15609. o = GetHostIPAddressList();
  15610. if (ipv6 == false)
  15611. {
  15612. // IPv4
  15613. for (i = 0;i < LIST_NUM(o);i++)
  15614. {
  15615. IP *p = LIST_DATA(o, i);
  15616. if (IsIP4(p))
  15617. {
  15618. if (IsZeroIp(p) == false && IsIPPrivate(p) == false && p->addr[0] != 127)
  15619. {
  15620. Copy(ip, p, sizeof(IP));
  15621. }
  15622. }
  15623. }
  15624. if (IsZeroIp(ip))
  15625. {
  15626. for (i = 0;i < LIST_NUM(o);i++)
  15627. {
  15628. IP *p = LIST_DATA(o, i);
  15629. if (IsIP4(p))
  15630. {
  15631. if (IsZeroIp(p) == false && IsIPPrivate(p) && p->addr[0] != 127)
  15632. {
  15633. Copy(ip, p, sizeof(IP));
  15634. }
  15635. }
  15636. }
  15637. }
  15638. if (IsZeroIp(ip))
  15639. {
  15640. SetIP(ip, 127, 0, 0, 1);
  15641. }
  15642. }
  15643. else
  15644. {
  15645. // IPv6
  15646. for (i = 0;i < LIST_NUM(o);i++)
  15647. {
  15648. IP *p = LIST_DATA(o, i);
  15649. if (IsIP6(p))
  15650. {
  15651. UINT type = GetIPAddrType6(p);
  15652. if ((type & IPV6_ADDR_GLOBAL_UNICAST) && ((type & IPV6_ADDR_ZERO) == 0) && ((type & IPV6_ADDR_LOOPBACK) == 0))
  15653. {
  15654. Copy(ip, p, sizeof(IP));
  15655. }
  15656. }
  15657. }
  15658. }
  15659. FreeHostIPAddressList(o);
  15660. }
  15661. // Record the current global IP address
  15662. void SetCurrentGlobalIP(IP *ip, bool ipv6)
  15663. {
  15664. // Validate arguments
  15665. if (ip == NULL)
  15666. {
  15667. return;
  15668. }
  15669. if (IsZeroIp(ip))
  15670. {
  15671. return;
  15672. }
  15673. Lock(current_global_ip_lock);
  15674. {
  15675. if (ipv6 == false)
  15676. {
  15677. Copy(&current_glocal_ipv4, ip, sizeof(IP));
  15678. }
  15679. else
  15680. {
  15681. Copy(&current_glocal_ipv6, ip, sizeof(IP));
  15682. }
  15683. current_global_ip_set = true;
  15684. }
  15685. Unlock(current_global_ip_lock);
  15686. }
  15687. // Release of the network communication module
  15688. void FreeNetwork()
  15689. {
  15690. if (dh_2048 != NULL)
  15691. {
  15692. DhFree(dh_2048);
  15693. dh_2048 = NULL;
  15694. }
  15695. // Release of thread-related
  15696. FreeWaitThread();
  15697. FreeToken(cipher_list_token);
  15698. cipher_list_token = NULL;
  15699. Zero(&unix_dns_server, sizeof(unix_dns_server));
  15700. // Release the locks
  15701. DeleteLock(unix_dns_server_addr_lock);
  15702. DeleteLock(dns_lock);
  15703. DeleteLock(ssl_accept_lock);
  15704. DeleteLock(machine_name_lock);
  15705. DeleteLock(disconnect_function_lock);
  15706. DeleteLock(aho);
  15707. DeleteLock(socket_library_lock);
  15708. DeleteLock(ssl_connect_lock);
  15709. DeleteLock(machine_ip_process_hash_lock);
  15710. machine_name_lock = NULL;
  15711. ssl_accept_lock = machine_name_lock = disconnect_function_lock =
  15712. aho = socket_library_lock = ssl_connect_lock = machine_ip_process_hash_lock = NULL;
  15713. // Release of the DNS cache
  15714. FreeDnsCache();
  15715. // Release of the host name cache
  15716. FreeHostCache();
  15717. #ifdef OS_WIN32
  15718. // Release of the socket library
  15719. Win32FreeSocketLibrary();
  15720. #else
  15721. UnixFreeSocketLibrary();
  15722. #endif // OS_WIN32
  15723. DeleteCounter(num_tcp_connections);
  15724. num_tcp_connections = NULL;
  15725. // Release of client list
  15726. FreeIpClientList();
  15727. DeleteLock(current_global_ip_lock);
  15728. current_global_ip_lock = NULL;
  15729. DeleteLock(current_fqdn_lock);
  15730. current_fqdn_lock = NULL;
  15731. // Release of the local MAC list
  15732. if (local_mac_list != NULL)
  15733. {
  15734. FreeNicList(local_mac_list);
  15735. local_mac_list = NULL;
  15736. }
  15737. DeleteLock(local_mac_list_lock);
  15738. local_mac_list_lock = NULL;
  15739. DeleteLock(host_ip_address_list_cache_lock);
  15740. host_ip_address_list_cache_lock = NULL;
  15741. FreeHostIPAddressList(host_ip_address_cache);
  15742. host_ip_address_cache = NULL;
  15743. FreeDynList();
  15744. DeleteCounter(getip_thread_counter);
  15745. getip_thread_counter = NULL;
  15746. }
  15747. // Add a socket to socket list
  15748. void AddSockList(SOCKLIST *sl, SOCK *s)
  15749. {
  15750. // Validate arguments
  15751. if (sl == NULL || s == NULL)
  15752. {
  15753. return;
  15754. }
  15755. LockList(sl->SockList);
  15756. {
  15757. if (IsInList(sl->SockList, s) == false)
  15758. {
  15759. AddRef(s->ref);
  15760. Insert(sl->SockList, s);
  15761. }
  15762. }
  15763. UnlockList(sl->SockList);
  15764. }
  15765. // Remove the socket from socket list
  15766. void DelSockList(SOCKLIST *sl, SOCK *s)
  15767. {
  15768. // Validate arguments
  15769. if (sl == NULL || s == NULL)
  15770. {
  15771. return;
  15772. }
  15773. LockList(sl->SockList);
  15774. {
  15775. if (Delete(sl->SockList, s))
  15776. {
  15777. ReleaseSock(s);
  15778. }
  15779. }
  15780. UnlockList(sl->SockList);
  15781. }
  15782. // Stop all the sockets in the list and delete it
  15783. void StopSockList(SOCKLIST *sl)
  15784. {
  15785. SOCK **ss;
  15786. UINT num, i;
  15787. // Validate arguments
  15788. if (sl == NULL)
  15789. {
  15790. return;
  15791. }
  15792. LockList(sl->SockList);
  15793. {
  15794. num = LIST_NUM(sl->SockList);
  15795. ss = ToArray(sl->SockList);
  15796. DeleteAll(sl->SockList);
  15797. }
  15798. UnlockList(sl->SockList);
  15799. for (i = 0;i < num;i++)
  15800. {
  15801. SOCK *s = ss[i];
  15802. Disconnect(s);
  15803. ReleaseSock(s);
  15804. }
  15805. Free(ss);
  15806. }
  15807. // Delete the socket list
  15808. void FreeSockList(SOCKLIST *sl)
  15809. {
  15810. // Validate arguments
  15811. if (sl == NULL)
  15812. {
  15813. return;
  15814. }
  15815. StopSockList(sl);
  15816. ReleaseList(sl->SockList);
  15817. Free(sl);
  15818. }
  15819. // Creating a socket list
  15820. SOCKLIST *NewSockList()
  15821. {
  15822. SOCKLIST *sl = ZeroMallocFast(sizeof(SOCKLIST));
  15823. sl->SockList = NewList(NULL);
  15824. return sl;
  15825. }
  15826. // Time-out thread of the socket on Solaris
  15827. void SocketTimeoutThread(THREAD *t, void *param)
  15828. {
  15829. SOCKET_TIMEOUT_PARAM *ttparam;
  15830. ttparam = (SOCKET_TIMEOUT_PARAM *)param;
  15831. // Wait for time-out period
  15832. Select(NULL, ttparam->sock->TimeOut, ttparam->cancel, NULL);
  15833. // Disconnect if it is blocked
  15834. if(! ttparam->unblocked)
  15835. {
  15836. // Debug("Socket timeouted\n");
  15837. closesocket(ttparam->sock->socket);
  15838. }
  15839. else
  15840. {
  15841. // Debug("Socket timeout cancelled\n");
  15842. }
  15843. }
  15844. // Initialize and start the thread for time-out
  15845. SOCKET_TIMEOUT_PARAM *NewSocketTimeout(SOCK *sock)
  15846. {
  15847. SOCKET_TIMEOUT_PARAM *ttp;
  15848. if(! sock->AsyncMode && sock->TimeOut != TIMEOUT_INFINITE)
  15849. {
  15850. // Debug("NewSockTimeout(%u)\n",sock->TimeOut);
  15851. ttp = (SOCKET_TIMEOUT_PARAM*)Malloc(sizeof(SOCKET_TIMEOUT_PARAM));
  15852. // Set the parameters of the time-out thread
  15853. ttp->cancel = NewCancel();
  15854. ttp->sock = sock;
  15855. ttp->unblocked = false;
  15856. ttp->thread = NewThread(SocketTimeoutThread, ttp);
  15857. return ttp;
  15858. }
  15859. return NULL;
  15860. }
  15861. // Stop and free the thread for timeout
  15862. void FreeSocketTimeout(SOCKET_TIMEOUT_PARAM *ttp)
  15863. {
  15864. if(ttp == NULL)
  15865. {
  15866. return;
  15867. }
  15868. ttp->unblocked = true;
  15869. Cancel(ttp->cancel);
  15870. WaitThread(ttp->thread, INFINITE);
  15871. ReleaseCancel(ttp->cancel);
  15872. ReleaseThread(ttp->thread);
  15873. Free(ttp);
  15874. // Debug("FreeSocketTimeout succeed\n");
  15875. return;
  15876. }
  15877. // Parse the IP address and subnet mask
  15878. bool ParseIpAndSubnetMask46(char *src, IP *ip, IP *mask)
  15879. {
  15880. // Validate arguments
  15881. if (src == NULL || ip == NULL || mask == NULL)
  15882. {
  15883. return false;
  15884. }
  15885. if (ParseIpAndMask46(src, ip, mask) == false)
  15886. {
  15887. return false;
  15888. }
  15889. if (IsIP4(ip))
  15890. {
  15891. return IsSubnetMask4(mask);
  15892. }
  15893. else
  15894. {
  15895. return IsSubnetMask6(mask);
  15896. }
  15897. }
  15898. bool ParseIpAndSubnetMask6(char *src, IP *ip, IP *mask)
  15899. {
  15900. if (ParseIpAndSubnetMask46(src, ip, mask) == false)
  15901. {
  15902. return false;
  15903. }
  15904. if (IsIP6(ip) == false)
  15905. {
  15906. return false;
  15907. }
  15908. return true;
  15909. }
  15910. bool ParseIpAndSubnetMask4(char *src, UINT *ip, UINT *mask)
  15911. {
  15912. IP ip2, mask2;
  15913. // Validate arguments
  15914. if (src == NULL)
  15915. {
  15916. return false;
  15917. }
  15918. if (ParseIpAndSubnetMask46(src, &ip2, &mask2) == false)
  15919. {
  15920. return false;
  15921. }
  15922. if (IsIP4(&ip2) == false)
  15923. {
  15924. return false;
  15925. }
  15926. if (ip != NULL)
  15927. {
  15928. *ip = IPToUINT(&ip2);
  15929. }
  15930. if (mask != NULL)
  15931. {
  15932. *mask = IPToUINT(&mask2);
  15933. }
  15934. return true;
  15935. }
  15936. // Parse the IP address and the mask
  15937. bool ParseIpAndMask46(char *src, IP *ip, IP *mask)
  15938. {
  15939. TOKEN_LIST *t;
  15940. char *ipstr;
  15941. char *subnetstr;
  15942. bool ret = false;
  15943. IP ip2;
  15944. IP mask2;
  15945. // Validate arguments
  15946. if (src == NULL || ip == NULL || mask == NULL)
  15947. {
  15948. return false;
  15949. }
  15950. Zero(&ip2, sizeof(IP));
  15951. Zero(&mask2, sizeof(IP));
  15952. t = ParseToken(src, "/");
  15953. if (t->NumTokens != 2)
  15954. {
  15955. FreeToken(t);
  15956. return false;
  15957. }
  15958. ipstr = t->Token[0];
  15959. subnetstr = t->Token[1];
  15960. Trim(ipstr);
  15961. Trim(subnetstr);
  15962. if (StrToIP(&ip2, ipstr))
  15963. {
  15964. if (StrToIP(&mask2, subnetstr))
  15965. {
  15966. // Compare the kind of the mask part and the IP address part to confirm same
  15967. if (IsIP6(&ip2) && IsIP6(&mask2))
  15968. {
  15969. // Both are IPv6
  15970. ret = true;
  15971. Copy(ip, &ip2, sizeof(IP));
  15972. Copy(mask, &mask2, sizeof(IP));
  15973. }
  15974. else if (IsIP4(&ip2) && IsIP4(&mask2))
  15975. {
  15976. // Both are IPv4
  15977. ret = true;
  15978. Copy(ip, &ip2, sizeof(IP));
  15979. Copy(mask, &mask2, sizeof(IP));
  15980. }
  15981. }
  15982. else
  15983. {
  15984. if (IsNum(subnetstr))
  15985. {
  15986. UINT i = ToInt(subnetstr);
  15987. // Mask part is a number
  15988. if (IsIP6(&ip2) && i <= 128)
  15989. {
  15990. ret = true;
  15991. Copy(ip, &ip2, sizeof(IP));
  15992. IntToSubnetMask6(mask, i);
  15993. }
  15994. else if (i <= 32)
  15995. {
  15996. ret = true;
  15997. Copy(ip, &ip2, sizeof(IP));
  15998. IntToSubnetMask4(mask, i);
  15999. }
  16000. }
  16001. }
  16002. }
  16003. FreeToken(t);
  16004. return ret;
  16005. }
  16006. bool ParseIpAndMask4(char *src, UINT *ip, UINT *mask)
  16007. {
  16008. IP ip_ip, ip_mask;
  16009. if (ParseIpAndMask46(src, &ip_ip, &ip_mask) == false)
  16010. {
  16011. return false;
  16012. }
  16013. if (IsIP4(&ip_ip) == false)
  16014. {
  16015. return false;
  16016. }
  16017. if (ip != NULL)
  16018. {
  16019. *ip = IPToUINT(&ip_ip);
  16020. }
  16021. if (mask != NULL)
  16022. {
  16023. *mask = IPToUINT(&ip_mask);
  16024. }
  16025. return true;
  16026. }
  16027. bool ParseIpAndMask6(char *src, IP *ip, IP *mask)
  16028. {
  16029. if (ParseIpAndMask46(src, ip, mask) == false)
  16030. {
  16031. return false;
  16032. }
  16033. if (IsIP6(ip) == false)
  16034. {
  16035. return false;
  16036. }
  16037. return true;
  16038. }
  16039. // Check whether the specification of the IPv4 address is correct
  16040. bool IsIpStr4(char *str)
  16041. {
  16042. // Validate arguments
  16043. if (str == NULL)
  16044. {
  16045. return false;
  16046. }
  16047. if (StrToIP32(str) == 0 && StrCmpi(str, "0.0.0.0") != 0)
  16048. {
  16049. return false;
  16050. }
  16051. return true;
  16052. }
  16053. // Check whether the specification of the IPv6 address is correct
  16054. bool IsIpStr6(char *str)
  16055. {
  16056. IP ip;
  16057. // Validate arguments
  16058. if (str == NULL)
  16059. {
  16060. return false;
  16061. }
  16062. if (StrToIP6(&ip, str) == false)
  16063. {
  16064. return false;
  16065. }
  16066. return true;
  16067. }
  16068. // Check whether the IP address specification is correct
  16069. bool IsIpStr46(char *str)
  16070. {
  16071. if (IsIpStr4(str) || IsIpStr6(str))
  16072. {
  16073. return true;
  16074. }
  16075. return false;
  16076. }
  16077. // Convert the string to an IPv4 mask
  16078. bool StrToMask4(IP *mask, char *str)
  16079. {
  16080. // Validate arguments
  16081. if (mask == NULL || str == NULL)
  16082. {
  16083. return false;
  16084. }
  16085. if (str[0] == '/')
  16086. {
  16087. str++;
  16088. }
  16089. if (IsNum(str))
  16090. {
  16091. UINT n = ToInt(str);
  16092. if (n <= 32)
  16093. {
  16094. IntToSubnetMask4(mask, n);
  16095. return true;
  16096. }
  16097. else
  16098. {
  16099. return false;
  16100. }
  16101. }
  16102. else
  16103. {
  16104. if (StrToIP(mask, str) == false)
  16105. {
  16106. return false;
  16107. }
  16108. else
  16109. {
  16110. return IsIP4(mask);
  16111. }
  16112. }
  16113. }
  16114. // Convert the string to an IPv6 mask
  16115. bool StrToMask6(IP *mask, char *str)
  16116. {
  16117. // Validate arguments
  16118. if (mask == NULL || str == NULL)
  16119. {
  16120. return false;
  16121. }
  16122. if (str[0] == '/')
  16123. {
  16124. str++;
  16125. }
  16126. if (IsNum(str))
  16127. {
  16128. UINT n = ToInt(str);
  16129. if (n <= 128)
  16130. {
  16131. IntToSubnetMask6(mask, n);
  16132. return true;
  16133. }
  16134. else
  16135. {
  16136. return false;
  16137. }
  16138. }
  16139. else
  16140. {
  16141. if (StrToIP(mask, str) == false)
  16142. {
  16143. return false;
  16144. }
  16145. else
  16146. {
  16147. return IsIP6(mask);
  16148. }
  16149. }
  16150. }
  16151. bool StrToMask6Addr(IPV6_ADDR *mask, char *str)
  16152. {
  16153. IP ip;
  16154. if (StrToMask6(&ip, str) == false)
  16155. {
  16156. return false;
  16157. }
  16158. if (IPToIPv6Addr(mask, &ip) == false)
  16159. {
  16160. return false;
  16161. }
  16162. return true;
  16163. }
  16164. // Convert the string to an IPv4 / IPv6 mask
  16165. bool StrToMask46(IP *mask, char *str, bool ipv6)
  16166. {
  16167. if (ipv6)
  16168. {
  16169. return StrToMask6(mask, str);
  16170. }
  16171. else
  16172. {
  16173. return StrToMask4(mask, str);
  16174. }
  16175. }
  16176. // Convert the IPv4 / IPv6 mask to a string
  16177. void MaskToStr(char *str, UINT size, IP *mask)
  16178. {
  16179. MaskToStrEx(str, size, mask, false);
  16180. }
  16181. void MaskToStrEx(char *str, UINT size, IP *mask, bool always_full_address)
  16182. {
  16183. // Validate arguments
  16184. if (str == NULL || mask == NULL)
  16185. {
  16186. return;
  16187. }
  16188. if (always_full_address == false && IsSubnetMask(mask))
  16189. {
  16190. ToStr(str, SubnetMaskToInt(mask));
  16191. }
  16192. else
  16193. {
  16194. IPToStr(str, size, mask);
  16195. }
  16196. }
  16197. void MaskToStr32(char *str, UINT size, UINT mask)
  16198. {
  16199. MaskToStr32Ex(str, size, mask, false);
  16200. }
  16201. void MaskToStr32Ex(char *str, UINT size, UINT mask, bool always_full_address)
  16202. {
  16203. IP ip;
  16204. UINTToIP(&ip, mask);
  16205. MaskToStrEx(str, size, &ip, always_full_address);
  16206. }
  16207. void Mask6AddrToStrEx(char *str, UINT size, IPV6_ADDR *mask, bool always_full_address)
  16208. {
  16209. IP ip;
  16210. // Validate arguments
  16211. if (str == NULL || mask == NULL)
  16212. {
  16213. StrCpy(str, size, "");
  16214. return;
  16215. }
  16216. IPv6AddrToIP(&ip, mask);
  16217. MaskToStrEx(str, size, &ip, always_full_address);
  16218. }
  16219. void Mask6AddrToStr(char *str, UINT size, IPV6_ADDR *mask)
  16220. {
  16221. Mask6AddrToStrEx(str, size, mask, false);
  16222. }
  16223. // Disconnecting of the tube
  16224. void TubeDisconnect(TUBE *t)
  16225. {
  16226. // Validate arguments
  16227. if (t == NULL)
  16228. {
  16229. return;
  16230. }
  16231. if (t->TubePairData == NULL)
  16232. {
  16233. return;
  16234. }
  16235. Lock(t->TubePairData->Lock);
  16236. {
  16237. t->TubePairData->IsDisconnected = true;
  16238. Set(t->TubePairData->Event1);
  16239. Set(t->TubePairData->Event2);
  16240. SetSockEvent(t->TubePairData->SockEvent1);
  16241. SetSockEvent(t->TubePairData->SockEvent2);
  16242. }
  16243. Unlock(t->TubePairData->Lock);
  16244. }
  16245. // Creating a tube pair
  16246. void NewTubePair(TUBE **t1, TUBE **t2, UINT size_of_header)
  16247. {
  16248. TUBEPAIR_DATA *d;
  16249. // Validate arguments
  16250. if (t1 == NULL || t2 == NULL)
  16251. {
  16252. return;
  16253. }
  16254. *t1 = NewTube(size_of_header);
  16255. *t2 = NewTube(size_of_header);
  16256. (*t1)->IndexInTubePair = 0;
  16257. (*t2)->IndexInTubePair = 1;
  16258. d = NewTubePairData();
  16259. AddRef(d->Ref);
  16260. (*t1)->TubePairData = d;
  16261. (*t2)->TubePairData = d;
  16262. d->Event1 = (*t1)->Event;
  16263. d->Event2 = (*t2)->Event;
  16264. AddRef(d->Event1->ref);
  16265. AddRef(d->Event2->ref);
  16266. }
  16267. // Creating a tube pair data
  16268. TUBEPAIR_DATA *NewTubePairData()
  16269. {
  16270. TUBEPAIR_DATA *d = ZeroMalloc(sizeof(TUBEPAIR_DATA));
  16271. d->Ref = NewRef();
  16272. d->Lock = NewLock();
  16273. return d;
  16274. }
  16275. // Set the SockEvent to the tube
  16276. void SetTubeSockEvent(TUBE *t, SOCK_EVENT *e)
  16277. {
  16278. // Validate arguments
  16279. if (t == NULL)
  16280. {
  16281. return;
  16282. }
  16283. Lock(t->Lock);
  16284. {
  16285. TUBEPAIR_DATA *d;
  16286. if (t->SockEvent != e)
  16287. {
  16288. if (t->SockEvent != NULL)
  16289. {
  16290. ReleaseSockEvent(t->SockEvent);
  16291. }
  16292. if (e != NULL)
  16293. {
  16294. AddRef(e->ref);
  16295. }
  16296. t->SockEvent = e;
  16297. }
  16298. d = t->TubePairData;
  16299. if (d != NULL)
  16300. {
  16301. Lock(d->Lock);
  16302. {
  16303. SOCK_EVENT **sep = (t->IndexInTubePair == 0 ? &d->SockEvent1 : &d->SockEvent2);
  16304. if (*sep != e)
  16305. {
  16306. if (*sep != NULL)
  16307. {
  16308. ReleaseSockEvent(*sep);
  16309. }
  16310. if (e != NULL)
  16311. {
  16312. AddRef(e->ref);
  16313. }
  16314. *sep = e;
  16315. }
  16316. }
  16317. Unlock(d->Lock);
  16318. }
  16319. }
  16320. Unlock(t->Lock);
  16321. }
  16322. // Release of the tube pair data
  16323. void ReleaseTubePairData(TUBEPAIR_DATA *d)
  16324. {
  16325. // Validate arguments
  16326. if (d == NULL)
  16327. {
  16328. return;
  16329. }
  16330. if (Release(d->Ref) == 0)
  16331. {
  16332. CleanupTubePairData(d);
  16333. }
  16334. }
  16335. void CleanupTubePairData(TUBEPAIR_DATA *d)
  16336. {
  16337. // Validate arguments
  16338. if (d == NULL)
  16339. {
  16340. return;
  16341. }
  16342. ReleaseEvent(d->Event1);
  16343. ReleaseEvent(d->Event2);
  16344. ReleaseSockEvent(d->SockEvent1);
  16345. ReleaseSockEvent(d->SockEvent2);
  16346. DeleteLock(d->Lock);
  16347. Free(d);
  16348. }
  16349. // Check whether the tube is connected to the opponent still
  16350. bool IsTubeConnected(TUBE *t)
  16351. {
  16352. // Validate arguments
  16353. if (t == NULL)
  16354. {
  16355. return false;
  16356. }
  16357. if (t->TubePairData == NULL)
  16358. {
  16359. return true;
  16360. }
  16361. if (t->TubePairData->IsDisconnected)
  16362. {
  16363. return false;
  16364. }
  16365. return true;
  16366. }
  16367. // Send the data to the tube
  16368. bool TubeSend(TUBE *t, void *data, UINT size, void *header)
  16369. {
  16370. return TubeSendEx(t, data, size, header, false);
  16371. }
  16372. bool TubeSendEx(TUBE *t, void *data, UINT size, void *header, bool no_flush)
  16373. {
  16374. return TubeSendEx2(t, data, size, header, no_flush, 0);
  16375. }
  16376. bool TubeSendEx2(TUBE *t, void *data, UINT size, void *header, bool no_flush, UINT max_num_in_queue)
  16377. {
  16378. // Validate arguments
  16379. if (t == NULL || data == NULL || size == 0)
  16380. {
  16381. return false;
  16382. }
  16383. if (IsTubeConnected(t) == false)
  16384. {
  16385. return false;
  16386. }
  16387. LockQueue(t->Queue);
  16388. {
  16389. if (max_num_in_queue == 0 || (t->Queue->num_item <= max_num_in_queue))
  16390. {
  16391. InsertQueue(t->Queue, NewTubeData(data, size, header, t->SizeOfHeader));
  16392. }
  16393. else
  16394. {
  16395. no_flush = true;
  16396. }
  16397. }
  16398. UnlockQueue(t->Queue);
  16399. if (no_flush == false)
  16400. {
  16401. Set(t->Event);
  16402. SetSockEvent(t->SockEvent);
  16403. }
  16404. return true;
  16405. }
  16406. // Flush the tube
  16407. void TubeFlush(TUBE *t)
  16408. {
  16409. TubeFlushEx(t, false);
  16410. }
  16411. void TubeFlushEx(TUBE *t, bool force)
  16412. {
  16413. // Validate arguments
  16414. if (t == NULL)
  16415. {
  16416. return;
  16417. }
  16418. if (IsTubeConnected(t) == false)
  16419. {
  16420. return;
  16421. }
  16422. if (force == false)
  16423. {
  16424. if (t->Queue->num_item == 0)
  16425. {
  16426. return;
  16427. }
  16428. }
  16429. Set(t->Event);
  16430. SetSockEvent(t->SockEvent);
  16431. }
  16432. // Receive the data from the tube (asynchronous)
  16433. TUBEDATA *TubeRecvAsync(TUBE *t)
  16434. {
  16435. TUBEDATA *d;
  16436. // Validate arguments
  16437. if (t == NULL)
  16438. {
  16439. return NULL;
  16440. }
  16441. if (IsTubeConnected(t) == false)
  16442. {
  16443. return NULL;
  16444. }
  16445. LockQueue(t->Queue);
  16446. {
  16447. d = GetNext(t->Queue);
  16448. }
  16449. UnlockQueue(t->Queue);
  16450. return d;
  16451. }
  16452. // Get the SockEvent associated with the tube
  16453. SOCK_EVENT *GetTubeSockEvent(TUBE *t)
  16454. {
  16455. SOCK_EVENT *e = NULL;
  16456. // Validate arguments
  16457. if (t == NULL)
  16458. {
  16459. return NULL;
  16460. }
  16461. Lock(t->Lock);
  16462. {
  16463. if (t->SockEvent != NULL)
  16464. {
  16465. AddRef(t->SockEvent->ref);
  16466. e = t->SockEvent;
  16467. }
  16468. }
  16469. Unlock(t->Lock);
  16470. return e;
  16471. }
  16472. // Receive the data from the tube (synchronous)
  16473. TUBEDATA *TubeRecvSync(TUBE *t, UINT timeout)
  16474. {
  16475. UINT64 start_tick, timeout_tick;
  16476. TUBEDATA *d = NULL;
  16477. // Validate arguments
  16478. if (t == NULL)
  16479. {
  16480. return NULL;
  16481. }
  16482. if (IsTubeConnected(t) == false)
  16483. {
  16484. return NULL;
  16485. }
  16486. start_tick = Tick64();
  16487. timeout_tick = start_tick + (UINT64)timeout;
  16488. while (true)
  16489. {
  16490. UINT64 now = Tick64();
  16491. UINT remain_time;
  16492. SOCK_EVENT *e;
  16493. UINT interval;
  16494. d = NULL;
  16495. if (IsTubeConnected(t) == false)
  16496. {
  16497. break;
  16498. }
  16499. LockQueue(t->Queue);
  16500. {
  16501. d = GetNext(t->Queue);
  16502. }
  16503. UnlockQueue(t->Queue);
  16504. if (d != NULL)
  16505. {
  16506. break;
  16507. }
  16508. if (timeout != INFINITE && now >= timeout_tick)
  16509. {
  16510. return NULL;
  16511. }
  16512. remain_time = (UINT)(timeout_tick - now);
  16513. e = GetTubeSockEvent(t);
  16514. interval = (timeout == INFINITE ? INFINITE : remain_time);
  16515. if (e == NULL)
  16516. {
  16517. Wait(t->Event, interval);
  16518. }
  16519. else
  16520. {
  16521. WaitSockEvent(e, interval);
  16522. ReleaseSockEvent(e);
  16523. }
  16524. }
  16525. return d;
  16526. }
  16527. // Creating a tube
  16528. TUBE *NewTube(UINT size_of_header)
  16529. {
  16530. TUBE *t = ZeroMalloc(sizeof(TUBE));
  16531. t->Event = NewEvent();
  16532. t->Queue = NewQueue();
  16533. t->Ref = NewRef();
  16534. t->Lock = NewLock();
  16535. t->SockEvent = NewSockEvent();
  16536. t->SizeOfHeader = size_of_header;
  16537. return t;
  16538. }
  16539. // Release of the tube
  16540. void ReleaseTube(TUBE *t)
  16541. {
  16542. // Validate arguments
  16543. if (t == NULL)
  16544. {
  16545. return;
  16546. }
  16547. if (Release(t->Ref) == 0)
  16548. {
  16549. CleanupTube(t);
  16550. }
  16551. }
  16552. void CleanupTube(TUBE *t)
  16553. {
  16554. // Validate arguments
  16555. if (t == NULL)
  16556. {
  16557. return;
  16558. }
  16559. while (true)
  16560. {
  16561. TUBEDATA *d = GetNext(t->Queue);
  16562. if (d == NULL)
  16563. {
  16564. break;
  16565. }
  16566. FreeTubeData(d);
  16567. }
  16568. ReleaseQueue(t->Queue);
  16569. ReleaseEvent(t->Event);
  16570. ReleaseSockEvent(t->SockEvent);
  16571. ReleaseTubePairData(t->TubePairData);
  16572. DeleteLock(t->Lock);
  16573. Free(t);
  16574. }
  16575. // Creating a tube data
  16576. TUBEDATA *NewTubeData(void *data, UINT size, void *header, UINT header_size)
  16577. {
  16578. TUBEDATA *d;
  16579. // Validate arguments
  16580. if (size == 0 || data == NULL)
  16581. {
  16582. return NULL;
  16583. }
  16584. d = ZeroMalloc(sizeof(TUBEDATA));
  16585. d->Data = Clone(data, size);
  16586. d->DataSize = size;
  16587. if (header != NULL)
  16588. {
  16589. d->Header = Clone(header, header_size);
  16590. d->HeaderSize = header_size;
  16591. }
  16592. else
  16593. {
  16594. d->Header = ZeroMalloc(header_size);
  16595. }
  16596. return d;
  16597. }
  16598. // Release of the tube data
  16599. void FreeTubeData(TUBEDATA *d)
  16600. {
  16601. // Validate arguments
  16602. if (d == NULL)
  16603. {
  16604. return;
  16605. }
  16606. Free(d->Data);
  16607. Free(d->Header);
  16608. Free(d);
  16609. }
  16610. // Release of the IP address list of the host
  16611. void FreeHostIPAddressList(LIST *o)
  16612. {
  16613. UINT i;
  16614. // Validate arguments
  16615. if (o == NULL)
  16616. {
  16617. return;
  16618. }
  16619. for (i = 0;i < LIST_NUM(o);i++)
  16620. {
  16621. IP *ip = LIST_DATA(o, i);
  16622. Free(ip);
  16623. }
  16624. ReleaseList(o);
  16625. }
  16626. // Get whether the specified IP address is held by this host
  16627. bool IsMyIPAddress(IP *ip)
  16628. {
  16629. LIST *o;
  16630. UINT i;
  16631. bool ret = false;
  16632. // Validate arguments
  16633. if (ip == NULL)
  16634. {
  16635. return false;
  16636. }
  16637. o = GetHostIPAddressList();
  16638. for (i = 0;i < LIST_NUM(o);i++)
  16639. {
  16640. IP *a = LIST_DATA(o, i);
  16641. if (CmpIpAddr(ip, a) == 0)
  16642. {
  16643. ret = true;
  16644. break;
  16645. }
  16646. }
  16647. FreeHostIPAddressList(o);
  16648. return ret;
  16649. }
  16650. // Add the IP address to the list
  16651. void AddHostIPAddressToList(LIST *o, IP *ip)
  16652. {
  16653. IP *r;
  16654. // Validate arguments
  16655. if (o == NULL || ip == NULL)
  16656. {
  16657. return;
  16658. }
  16659. r = Search(o, ip);
  16660. if (r != NULL)
  16661. {
  16662. return;
  16663. }
  16664. Insert(o, Clone(ip, sizeof(IP)));
  16665. }
  16666. // Comparison of the IP address list items
  16667. int CmpIpAddressList(void *p1, void *p2)
  16668. {
  16669. IP *ip1, *ip2;
  16670. UINT r;
  16671. // Validate arguments
  16672. if (p1 == NULL || p2 == NULL)
  16673. {
  16674. return 0;
  16675. }
  16676. ip1 = *(IP **)p1;
  16677. ip2 = *(IP **)p2;
  16678. if (ip1 == NULL || ip2 == NULL)
  16679. {
  16680. return 0;
  16681. }
  16682. // IPv4 < IPv6
  16683. r = COMPARE_RET(IsIP6(ip1), IsIP6(ip2));
  16684. if (r != 0)
  16685. {
  16686. return r;
  16687. }
  16688. // any > specified IP
  16689. if (IsZeroIP(ip1) && IsZeroIP(ip2) == false)
  16690. {
  16691. return 1;
  16692. }
  16693. if (IsZeroIP(ip1) == false && IsZeroIP(ip2))
  16694. {
  16695. return -1;
  16696. }
  16697. // local > others
  16698. if (IsLocalHostIP(ip1) && IsLocalHostIP(ip2) == false)
  16699. {
  16700. return 1;
  16701. }
  16702. if (IsLocalHostIP(ip1) == false && IsLocalHostIP(ip2))
  16703. {
  16704. return -1;
  16705. }
  16706. // ip address
  16707. r = CmpIpAddr(ip1, ip2);
  16708. if (r != 0)
  16709. {
  16710. return r;
  16711. }
  16712. // interface index
  16713. if (IsIP6(ip1))
  16714. {
  16715. r = COMPARE_RET(ip1->ipv6_scope_id, ip2->ipv6_scope_id);
  16716. }
  16717. else
  16718. {
  16719. r = 0;
  16720. }
  16721. return r;
  16722. }
  16723. // Get the IP address list hash of the host
  16724. UINT64 GetHostIPAddressListHash()
  16725. {
  16726. UINT i;
  16727. LIST *o;
  16728. BUF *buf = NewBuf();
  16729. UCHAR hash[SHA1_SIZE];
  16730. UINT64 ret = 0;
  16731. o = GetHostIPAddressList();
  16732. if (o != NULL)
  16733. {
  16734. for (i = 0;i < LIST_NUM(o);i++)
  16735. {
  16736. IP *ip = LIST_DATA(o, i);
  16737. char tmp[128];
  16738. Zero(tmp, sizeof(tmp));
  16739. IPToStr(tmp, sizeof(tmp), ip);
  16740. WriteBufStr(buf, tmp);
  16741. }
  16742. FreeHostIPAddressList(o);
  16743. }
  16744. WriteBufStr(buf, "test");
  16745. HashSha1(hash, buf->Buf, buf->Size);
  16746. FreeBuf(buf);
  16747. Copy(&ret, hash, sizeof(UINT64));
  16748. ret = Endian64(ret);
  16749. return ret;
  16750. }
  16751. // Get the IP address list of the host (using cache)
  16752. LIST *GetHostIPAddressList()
  16753. {
  16754. LIST *o = NULL;
  16755. if (host_ip_address_list_cache_lock == NULL)
  16756. {
  16757. return GetHostIPAddressListInternal();
  16758. }
  16759. Lock(host_ip_address_list_cache_lock);
  16760. {
  16761. UINT64 now = Tick64();
  16762. if (host_ip_address_list_cache_last == 0 ||
  16763. ((host_ip_address_list_cache_last + (UINT64)HOST_IP_ADDRESS_LIST_CACHE) < now) ||
  16764. host_ip_address_cache == NULL)
  16765. {
  16766. if (host_ip_address_cache != NULL)
  16767. {
  16768. FreeHostIPAddressList(host_ip_address_cache);
  16769. }
  16770. host_ip_address_cache = GetHostIPAddressListInternal();
  16771. host_ip_address_list_cache_last = now;
  16772. }
  16773. o = CloneIPAddressList(host_ip_address_cache);
  16774. }
  16775. Unlock(host_ip_address_list_cache_lock);
  16776. if (o == NULL)
  16777. {
  16778. o = GetHostIPAddressListInternal();
  16779. }
  16780. return o;
  16781. }
  16782. // Copy of the IP address list
  16783. LIST *CloneIPAddressList(LIST *o)
  16784. {
  16785. LIST *ret;
  16786. UINT i;
  16787. // Validate arguments
  16788. if (o == NULL)
  16789. {
  16790. return NULL;
  16791. }
  16792. ret = NewListFast(CmpIpAddressList);
  16793. for (i = 0;i < LIST_NUM(o);i++)
  16794. {
  16795. IP *ip = LIST_DATA(o, i);
  16796. if (ip != NULL)
  16797. {
  16798. ip = Clone(ip, sizeof(IP));
  16799. Add(ret, ip);
  16800. }
  16801. }
  16802. return ret;
  16803. }
  16804. // Get an IP address list of the host
  16805. LIST *GetHostIPAddressListInternal()
  16806. {
  16807. char hostname[MAX_SIZE];
  16808. LIST *o;
  16809. IP any6, any4;
  16810. IP local6, local4;
  16811. bool is_v6_supported = IsIPv6Supported();
  16812. GetLocalHostIP4(&local4);
  16813. GetLocalHostIP6(&local6);
  16814. ZeroIP4(&any4);
  16815. ZeroIP6(&any6);
  16816. Zero(hostname, sizeof(hostname));
  16817. gethostname(hostname, sizeof(hostname));
  16818. o = NewListFast(CmpIpAddressList);
  16819. // any
  16820. AddHostIPAddressToList(o, &any4);
  16821. if (is_v6_supported)
  16822. {
  16823. AddHostIPAddressToList(o, &any6);
  16824. }
  16825. // localhost
  16826. AddHostIPAddressToList(o, &local4);
  16827. if (is_v6_supported)
  16828. {
  16829. AddHostIPAddressToList(o, &local6);
  16830. }
  16831. #ifndef MAYAQUA_SUPPORTS_GETIFADDRS
  16832. // IPv4
  16833. if (true)
  16834. {
  16835. struct sockaddr_in in;
  16836. struct in_addr addr;
  16837. struct addrinfo hint;
  16838. struct addrinfo *info;
  16839. // Debug("***** GetHostIPAddressListInternal IPv4 Begin *****\n");
  16840. Zero(&hint, sizeof(hint));
  16841. hint.ai_family = AF_INET;
  16842. hint.ai_socktype = SOCK_DGRAM;
  16843. hint.ai_protocol = IPPROTO_UDP;
  16844. info = NULL;
  16845. if (getaddrinfo(hostname, NULL, &hint, &info) == 0)
  16846. {
  16847. if (info->ai_family == AF_INET)
  16848. {
  16849. struct addrinfo *current = info;
  16850. while (current != NULL)
  16851. {
  16852. IP ip;
  16853. Copy(&in, current->ai_addr, sizeof(in));
  16854. Copy(&addr, &in.sin_addr, sizeof(addr));
  16855. InAddrToIP(&ip, &addr);
  16856. AddHostIPAddressToList(o, &ip);
  16857. // Debug("%r\n", &ip);
  16858. current = current->ai_next;
  16859. }
  16860. }
  16861. freeaddrinfo(info);
  16862. }
  16863. // Debug("***** GetHostIPAddressListInternal IPv4 End *****\n");
  16864. }
  16865. #ifndef UNIX_LINUX
  16866. // IPv6
  16867. if (is_v6_supported)
  16868. {
  16869. struct sockaddr_in6 in;
  16870. struct in6_addr addr;
  16871. struct addrinfo hint;
  16872. struct addrinfo *info;
  16873. Zero(&hint, sizeof(hint));
  16874. hint.ai_family = AF_INET6;
  16875. hint.ai_socktype = SOCK_DGRAM;
  16876. hint.ai_protocol = IPPROTO_UDP;
  16877. info = NULL;
  16878. // Debug("***** GetHostIPAddressListInternal IPv6 Begin *****\n");
  16879. if (getaddrinfo(hostname, NULL, &hint, &info) == 0)
  16880. {
  16881. if (info->ai_family == AF_INET6)
  16882. {
  16883. struct addrinfo *current = info;
  16884. while (current != NULL)
  16885. {
  16886. IP ip;
  16887. Copy(&in, current->ai_addr, sizeof(in));
  16888. Copy(&addr, &in.sin6_addr, sizeof(addr));
  16889. InAddrToIP6(&ip, &addr);
  16890. ip.ipv6_scope_id = in.sin6_scope_id;
  16891. AddHostIPAddressToList(o, &ip);
  16892. // Debug("%r\n", &ip);
  16893. current = current->ai_next;
  16894. }
  16895. }
  16896. freeaddrinfo(info);
  16897. }
  16898. // Debug("***** GetHostIPAddressListInternal IPv6 End *****\n");
  16899. }
  16900. #endif // UNIX_LINUX
  16901. #endif // MAYAQUA_SUPPORTS_GETIFADDRS
  16902. #ifdef MAYAQUA_SUPPORTS_GETIFADDRS
  16903. // If the getifaddrs is available, use this
  16904. if (true)
  16905. {
  16906. struct ifaddrs *aa = NULL;
  16907. if (getifaddrs(&aa) == 0)
  16908. {
  16909. struct ifaddrs *a = aa;
  16910. while (a != NULL)
  16911. {
  16912. if (a->ifa_addr != NULL)
  16913. {
  16914. struct sockaddr *addr = a->ifa_addr;
  16915. if (addr->sa_family == AF_INET)
  16916. {
  16917. IP ip;
  16918. struct sockaddr_in *d = (struct sockaddr_in *)addr;
  16919. struct in_addr *addr = &d->sin_addr;
  16920. InAddrToIP(&ip, addr);
  16921. AddHostIPAddressToList(o, &ip);
  16922. }
  16923. else if (addr->sa_family == AF_INET6)
  16924. {
  16925. IP ip;
  16926. struct sockaddr_in6 *d = (struct sockaddr_in6 *)addr;
  16927. UINT scope_id = d->sin6_scope_id;
  16928. struct in6_addr *addr = &d->sin6_addr;
  16929. InAddrToIP6(&ip, addr);
  16930. ip.ipv6_scope_id = scope_id;
  16931. AddHostIPAddressToList(o, &ip);
  16932. }
  16933. }
  16934. a = a->ifa_next;
  16935. }
  16936. freeifaddrs(aa);
  16937. }
  16938. }
  16939. #endif // MAYAQUA_SUPPORTS_GETIFADDRS
  16940. return o;
  16941. }
  16942. // Get whether the UDP listener opens the specified port
  16943. bool IsUdpPortOpened(UDPLISTENER *u, IP *server_ip, UINT port)
  16944. {
  16945. UINT i;
  16946. // Validate arguments
  16947. if (u == NULL || port == 0)
  16948. {
  16949. return false;
  16950. }
  16951. if (server_ip != NULL)
  16952. {
  16953. for (i = 0;i < LIST_NUM(u->SockList);i++)
  16954. {
  16955. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, i);
  16956. if (us->Sock != NULL && us->HasError == false)
  16957. {
  16958. if (us->Port == port)
  16959. {
  16960. if (CmpIpAddr(server_ip, &us->IpAddress) == 0)
  16961. {
  16962. return true;
  16963. }
  16964. }
  16965. }
  16966. }
  16967. }
  16968. for (i = 0;i < LIST_NUM(u->SockList);i++)
  16969. {
  16970. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, i);
  16971. if (us->Sock != NULL && us->HasError == false)
  16972. {
  16973. if (us->Port == port)
  16974. {
  16975. if (IsZeroIP(&us->IpAddress))
  16976. {
  16977. return true;
  16978. }
  16979. }
  16980. }
  16981. }
  16982. return false;
  16983. }
  16984. // IP address acquisition thread
  16985. void QueryIpThreadMain(THREAD *thread, void *param)
  16986. {
  16987. QUERYIPTHREAD *t = (QUERYIPTHREAD *)param;
  16988. // Validate arguments
  16989. if (thread == NULL || param == NULL)
  16990. {
  16991. return;
  16992. }
  16993. while (t->Halt == false)
  16994. {
  16995. UINT next_wait_time = 0;
  16996. IP ip;
  16997. bool ok = false;
  16998. if (GetIP4Ex(&ip, t->Hostname, 5000, &t->Halt))
  16999. {
  17000. if (IsZeroIP(&ip) == false)
  17001. {
  17002. Lock(t->Lock);
  17003. {
  17004. Copy(&t->Ip, &ip, sizeof(IP));
  17005. }
  17006. Unlock(t->Lock);
  17007. ok = true;
  17008. }
  17009. }
  17010. if (ok == false)
  17011. {
  17012. next_wait_time = t->IntervalLastNg;
  17013. }
  17014. else
  17015. {
  17016. next_wait_time = t->IntervalLastOk;
  17017. }
  17018. if (t->Halt)
  17019. {
  17020. break;
  17021. }
  17022. Wait(t->HaltEvent, next_wait_time);
  17023. }
  17024. }
  17025. // Creating an IP address acquisition thread
  17026. QUERYIPTHREAD *NewQueryIpThread(char *hostname, UINT interval_last_ok, UINT interval_last_ng)
  17027. {
  17028. QUERYIPTHREAD *t;
  17029. t = ZeroMalloc(sizeof(QUERYIPTHREAD));
  17030. t->HaltEvent = NewEvent();
  17031. t->Lock = NewLock();
  17032. StrCpy(t->Hostname, sizeof(t->Hostname), hostname);
  17033. t->IntervalLastOk = interval_last_ok;
  17034. t->IntervalLastNg = interval_last_ng;
  17035. t->Thread = NewThread(QueryIpThreadMain, t);
  17036. return t;
  17037. }
  17038. // Get the results of the IP address acquisition thread
  17039. bool GetQueryIpThreadResult(QUERYIPTHREAD *t, IP *ip)
  17040. {
  17041. bool ret = false;
  17042. Zero(ip, sizeof(IP));
  17043. // Validate arguments
  17044. if (t == NULL || ip == NULL)
  17045. {
  17046. return false;
  17047. }
  17048. Lock(t->Lock);
  17049. if (IsZero(&t->Ip, sizeof(IP)))
  17050. {
  17051. ret = false;
  17052. }
  17053. else
  17054. {
  17055. Copy(ip, &t->Ip, sizeof(IP));
  17056. }
  17057. Unlock(t->Lock);
  17058. return ret;
  17059. }
  17060. // Release of the IP address acquisition thread
  17061. void FreeQueryIpThread(QUERYIPTHREAD *t)
  17062. {
  17063. // Validate arguments
  17064. if (t == NULL)
  17065. {
  17066. return;
  17067. }
  17068. t->Halt = true;
  17069. Set(t->HaltEvent);
  17070. WaitThread(t->Thread, INFINITE);
  17071. ReleaseThread(t->Thread);
  17072. ReleaseEvent(t->HaltEvent);
  17073. DeleteLock(t->Lock);
  17074. Free(t);
  17075. }
  17076. // Get a public port list which is known by UDP listener
  17077. void UdpListenerGetPublicPortList(UDPLISTENER *u, char *dst, UINT size)
  17078. {
  17079. UINT k;
  17080. // Validate arguments
  17081. ClearStr(dst, size);
  17082. if (u == NULL || dst == NULL)
  17083. {
  17084. return;
  17085. }
  17086. LockList(u->PortList);
  17087. {
  17088. for (k = 0;k < LIST_NUM(u->SockList);k++)
  17089. {
  17090. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, k);
  17091. if (us->PublicPort != 0)
  17092. {
  17093. char tmp[64];
  17094. ToStr(tmp, us->PublicPort);
  17095. StrCat(dst, size, tmp);
  17096. StrCat(dst, size, " ");
  17097. }
  17098. }
  17099. }
  17100. UnlockList(u->PortList);
  17101. Trim(dst);
  17102. }
  17103. // UDP listener thread
  17104. void UdpListenerThread(THREAD *thread, void *param)
  17105. {
  17106. UDPLISTENER *u = (UDPLISTENER *)param;
  17107. UINT i, j, k;
  17108. UINT buf_size = 65536;
  17109. void *buf;
  17110. bool cont_flag;
  17111. BUF *ip_list_buf = NewBuf();
  17112. // Validate arguments
  17113. if (thread == NULL || param == NULL)
  17114. {
  17115. return;
  17116. }
  17117. buf = Malloc(buf_size);
  17118. // Initializing the socket list
  17119. u->SockList = NewList(NULL);
  17120. u->LastCheckTick = 0;
  17121. // u->PollMyIpAndPort = true;
  17122. // Main loop
  17123. while (u->Halt == false)
  17124. {
  17125. LIST *recv_list;
  17126. UINT64 now = Tick64();
  17127. UINT interval;
  17128. bool stage_changed = false;
  17129. IP nat_t_ip;
  17130. Zero(&nat_t_ip, sizeof(nat_t_ip));
  17131. if (u->LastCheckTick == 0 || (now >= (u->LastCheckTick + UDPLISTENER_CHECK_INTERVAL)))
  17132. {
  17133. LIST *iplist;
  17134. LIST *del_us_list = NewListFast(NULL);
  17135. BUF *ip_list_buf_new = NewBuf();
  17136. u->LastCheckTick = now;
  17137. // Obtain an IP address list
  17138. iplist = GetHostIPAddressList();
  17139. LockList(u->PortList);
  17140. {
  17141. for (k = 0;k < LIST_NUM(u->SockList);k++)
  17142. {
  17143. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, k);
  17144. us->Mark = false;
  17145. }
  17146. // If the combination of the IP address and the port number doesn't exist in the list, add it to the list
  17147. for (i = 0;i < LIST_NUM(iplist);i++)
  17148. {
  17149. IP *ip = LIST_DATA(iplist, i);
  17150. WriteBuf(ip_list_buf_new, ip, sizeof(IP));
  17151. for (j = 0;j < LIST_NUM(u->PortList);j++)
  17152. {
  17153. UINT k;
  17154. UINT *port = LIST_DATA(u->PortList, j);
  17155. bool existing = false;
  17156. if (IsZeroIP(ip) && (IS_SPECIAL_PORT(*port)))
  17157. {
  17158. continue;
  17159. }
  17160. for (k = 0;k < LIST_NUM(u->SockList);k++)
  17161. {
  17162. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, k);
  17163. if (CmpIpAddr(&us->IpAddress, ip) == 0 && us->Port == *port)
  17164. {
  17165. existing = true;
  17166. us->Mark = true;
  17167. break;
  17168. }
  17169. }
  17170. if (existing == false)
  17171. {
  17172. UDPLISTENER_SOCK *us = ZeroMalloc(sizeof(UDPLISTENER_SOCK));
  17173. Copy(&us->IpAddress, ip, sizeof(IP));
  17174. us->Port = *port;
  17175. us->Mark = true;
  17176. Add(u->SockList, us);
  17177. }
  17178. }
  17179. }
  17180. // If any errors suspected or the combination of IP address and port number
  17181. // has been regarded to delete already, delete it
  17182. for (k = 0;k < LIST_NUM(u->SockList);k++)
  17183. {
  17184. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, k);
  17185. if (us->Mark == false || us->HasError)
  17186. {
  17187. Debug("mark=%u error=%u\n", us->Mark, us->HasError);
  17188. Add(del_us_list, us);
  17189. }
  17190. }
  17191. for (i = 0;i < LIST_NUM(del_us_list);i++)
  17192. {
  17193. UDPLISTENER_SOCK *us = LIST_DATA(del_us_list, i);
  17194. char ipstr[MAX_SIZE];
  17195. IPToStr(ipstr, sizeof(ipstr), &us->IpAddress);
  17196. Debug("Closed UDP Port %u at %s.\n", us->Port, ipstr);
  17197. Delete(u->SockList, us);
  17198. if (us->Sock != NULL)
  17199. {
  17200. Disconnect(us->Sock);
  17201. ReleaseSock(us->Sock);
  17202. }
  17203. Free(us);
  17204. }
  17205. }
  17206. UnlockList(u->PortList);
  17207. // Open the UDP sockets which is not opend yet
  17208. for (k = 0;k < LIST_NUM(u->SockList);k++)
  17209. {
  17210. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, k);
  17211. if (us->Sock == NULL)
  17212. {
  17213. char ipstr[MAX_SIZE];
  17214. IPToStr(ipstr, sizeof(ipstr), &us->IpAddress);
  17215. if (us->ErrorDebugDisplayed == false)
  17216. {
  17217. Debug("Opening UDP Port %u at %s ...", us->Port, ipstr);
  17218. }
  17219. us->Sock = NewUDPEx2(us->Port, IsIP6(&us->IpAddress), &us->IpAddress);
  17220. if (us->Sock != NULL)
  17221. {
  17222. if (us->ErrorDebugDisplayed == false)
  17223. {
  17224. Debug("Ok.\n");
  17225. }
  17226. else
  17227. {
  17228. Debug("Opening UDP Port %u at %s ...", us->Port, ipstr);
  17229. Debug("Ok.\n");
  17230. }
  17231. JoinSockToSockEvent(us->Sock, u->Event);
  17232. us->ErrorDebugDisplayed = false;
  17233. }
  17234. else
  17235. {
  17236. if (us->ErrorDebugDisplayed == false)
  17237. {
  17238. Debug("Error.\n");
  17239. }
  17240. us->ErrorDebugDisplayed = true;
  17241. }
  17242. }
  17243. }
  17244. FreeHostIPAddressList(iplist);
  17245. ReleaseList(del_us_list);
  17246. if (CompareBuf(ip_list_buf, ip_list_buf_new) == false)
  17247. {
  17248. u->HostIPAddressListChanged = true;
  17249. }
  17250. FreeBuf(ip_list_buf);
  17251. ip_list_buf = ip_list_buf_new;
  17252. }
  17253. LABEL_RESTART:
  17254. stage_changed = false;
  17255. recv_list = NewListFast(NULL);
  17256. if (u->PollMyIpAndPort)
  17257. {
  17258. {
  17259. // Create a thread to get a NAT-T IP address if necessary
  17260. if (u->GetNatTIpThread == NULL)
  17261. {
  17262. char natt_hostname[MAX_SIZE];
  17263. RUDPGetRegisterHostNameByIP(natt_hostname, sizeof(natt_hostname), NULL);
  17264. u->GetNatTIpThread = NewQueryIpThread(natt_hostname, QUERYIPTHREAD_INTERVAL_LAST_OK, QUERYIPTHREAD_INTERVAL_LAST_NG);
  17265. }
  17266. GetQueryIpThreadResult(u->GetNatTIpThread, &nat_t_ip);
  17267. }
  17268. }
  17269. // Receive the data that is arriving at the socket
  17270. for (k = 0;k < LIST_NUM(u->SockList);k++)
  17271. {
  17272. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, k);
  17273. if (us->Sock != NULL)
  17274. {
  17275. UINT num_ignore_errors = 0;
  17276. if (u->PollMyIpAndPort && IsIP4(&us->IpAddress))
  17277. {
  17278. if (us->NextMyIpAndPortPollTick == 0 || us->NextMyIpAndPortPollTick <= now)
  17279. {
  17280. // Examine the self IP address and the self port number by using NAT-T server
  17281. us->NextMyIpAndPortPollTick = now + (UINT64)GenRandInterval(UDP_NAT_T_NAT_STATUS_CHECK_INTERVAL_MIN, UDP_NAT_T_NAT_STATUS_CHECK_INTERVAL_MAX);
  17282. if (IsZeroIP(&nat_t_ip) == false
  17283. )
  17284. {
  17285. UCHAR c = 'A';
  17286. SendTo(us->Sock, &nat_t_ip, UDP_NAT_T_PORT, &c, 1);
  17287. }
  17288. }
  17289. }
  17290. while (true)
  17291. {
  17292. IP src_addr;
  17293. UINT src_port;
  17294. UDPPACKET *p;
  17295. UINT size = RecvFrom(us->Sock, &src_addr, &src_port, buf, buf_size);
  17296. if (size == 0)
  17297. {
  17298. // Socket failure
  17299. if (us->Sock->IgnoreRecvErr == false)
  17300. {
  17301. LABEL_FATAL_ERROR:
  17302. Debug("RecvFrom has Error.\n");
  17303. us->HasError = true;
  17304. }
  17305. else
  17306. {
  17307. if ((num_ignore_errors++) >= MAX_NUM_IGNORE_ERRORS)
  17308. {
  17309. goto LABEL_FATAL_ERROR;
  17310. }
  17311. }
  17312. break;
  17313. }
  17314. else if (size == SOCK_LATER)
  17315. {
  17316. // No packet
  17317. break;
  17318. }
  17319. //Debug("UDP %u\n", size);
  17320. if (src_port == UDP_NAT_T_PORT && CmpIpAddr(&src_addr, &nat_t_ip) == 0)
  17321. {
  17322. // Receive a packet in which the IP address and the port number are written from the NAT-T server
  17323. if (size >= 8)
  17324. {
  17325. IP my_ip;
  17326. UINT my_port;
  17327. if (RUDPParseIPAndPortStr(buf, size, &my_ip, &my_port))
  17328. {
  17329. Copy(&us->PublicIpAddress, &my_ip, sizeof(IP));
  17330. us->PublicPort = my_port;
  17331. }
  17332. }
  17333. }
  17334. else
  17335. {
  17336. // Receive a regular packet
  17337. p = NewUdpPacket(&src_addr, src_port, &us->Sock->LocalIP, us->Sock->LocalPort,
  17338. Clone(buf, size), size);
  17339. if (p->SrcPort == MAKE_SPECIAL_PORT(52))
  17340. {
  17341. p->SrcPort = p->DestPort = MAKE_SPECIAL_PORT(50);
  17342. }
  17343. Add(recv_list, p);
  17344. }
  17345. stage_changed = true;
  17346. }
  17347. }
  17348. }
  17349. // Pass the received packet to the procedure
  17350. u->RecvProc(u, recv_list);
  17351. // Release the packet
  17352. for (i = 0;i < LIST_NUM(recv_list);i++)
  17353. {
  17354. UDPPACKET *p = LIST_DATA(recv_list, i);
  17355. FreeUdpPacket(p);
  17356. }
  17357. ReleaseList(recv_list);
  17358. cont_flag = true;
  17359. do
  17360. {
  17361. // When there are packets to be transmitted, transmit it
  17362. LockList(u->SendPacketList);
  17363. {
  17364. UDPLISTENER_SOCK *last_us = NULL;
  17365. IP last_src_ip;
  17366. UINT last_src_port;
  17367. Zero(&last_src_ip, sizeof(IP));
  17368. last_src_port = 0;
  17369. for (i = 0;i < LIST_NUM(u->SendPacketList);i++)
  17370. {
  17371. UDPPACKET *p = LIST_DATA(u->SendPacketList, i);
  17372. UDPLISTENER_SOCK *us;
  17373. if (last_us != NULL && last_src_port == p->SrcPort && CmpIpAddr(&last_src_ip, &p->SrcIP) == 0)
  17374. {
  17375. us = last_us;
  17376. }
  17377. else
  17378. {
  17379. // Search for a good interface for the transmission
  17380. us = DetermineUdpSocketForSending(u, p);
  17381. if (us != NULL)
  17382. {
  17383. last_us = us;
  17384. last_src_port = p->SrcPort;
  17385. Copy(&last_src_ip, &p->SrcIP, sizeof(IP));
  17386. }
  17387. }
  17388. if (us != NULL)
  17389. {
  17390. // Send
  17391. UINT ret = SendTo(us->Sock, &p->DstIP, p->DestPort, p->Data, p->Size);
  17392. if (ret == 0)
  17393. {
  17394. if (us->Sock->IgnoreSendErr == false)
  17395. {
  17396. // Socket failure
  17397. Debug("SendTo has Error.\n");
  17398. us->HasError = true;
  17399. last_us = NULL;
  17400. }
  17401. }
  17402. else
  17403. {
  17404. if (ret != SOCK_LATER)
  17405. {
  17406. stage_changed = true;
  17407. }
  17408. }
  17409. }
  17410. FreeUdpPacket(p);
  17411. }
  17412. DeleteAll(u->SendPacketList);
  17413. }
  17414. UnlockList(u->SendPacketList);
  17415. if (LIST_NUM(u->SendPacketList) == 0)
  17416. {
  17417. cont_flag = false;
  17418. }
  17419. }
  17420. while (cont_flag);
  17421. if (stage_changed && u->Halt == false)
  17422. {
  17423. goto LABEL_RESTART;
  17424. }
  17425. // Timing adjustment
  17426. interval = GetNextIntervalForInterrupt(u->Interrupts);
  17427. if (interval == INFINITE)
  17428. {
  17429. interval = UDPLISTENER_WAIT_INTERVAL;
  17430. }
  17431. else
  17432. {
  17433. interval = MIN(UDPLISTENER_WAIT_INTERVAL, interval);
  17434. }
  17435. if (interval >= 1)
  17436. {
  17437. WaitSockEvent(u->Event, interval);
  17438. }
  17439. }
  17440. if (u->GetNatTIpThread != NULL)
  17441. {
  17442. FreeQueryIpThread(u->GetNatTIpThread);
  17443. }
  17444. // Release of the socket list
  17445. for (i = 0;i < LIST_NUM(u->SockList);i++)
  17446. {
  17447. UDPLISTENER_SOCK *us = (UDPLISTENER_SOCK *)LIST_DATA(u->SockList, i);
  17448. Disconnect(us->Sock);
  17449. ReleaseSock(us->Sock);
  17450. Free(us);
  17451. }
  17452. ReleaseList(u->SockList);
  17453. FreeBuf(ip_list_buf);
  17454. Free(buf);
  17455. }
  17456. // Select the best UDP socket to be used for transmission
  17457. UDPLISTENER_SOCK *DetermineUdpSocketForSending(UDPLISTENER *u, UDPPACKET *p)
  17458. {
  17459. UINT i;
  17460. // Validate arguments
  17461. if (u == NULL || p == NULL)
  17462. {
  17463. return NULL;
  17464. }
  17465. for (i = 0;i < LIST_NUM(u->SockList);i++)
  17466. {
  17467. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, i);
  17468. if (us->Sock != NULL && us->HasError == false)
  17469. {
  17470. if (us->Port == p->SrcPort)
  17471. {
  17472. if (CmpIpAddr(&us->IpAddress, &p->SrcIP) == 0)
  17473. {
  17474. return us;
  17475. }
  17476. }
  17477. }
  17478. }
  17479. for (i = 0;i < LIST_NUM(u->SockList);i++)
  17480. {
  17481. UDPLISTENER_SOCK *us = LIST_DATA(u->SockList, i);
  17482. if (us->Sock != NULL && us->HasError == false)
  17483. {
  17484. if (us->Port == p->SrcPort)
  17485. {
  17486. if (IsZeroIP(&us->IpAddress))
  17487. {
  17488. if ((IsIP4(&p->DstIP) && IsIP4(&us->IpAddress)) ||
  17489. (IsIP6(&p->DstIP) && IsIP6(&us->IpAddress)))
  17490. {
  17491. return us;
  17492. }
  17493. }
  17494. }
  17495. }
  17496. }
  17497. return NULL;
  17498. }
  17499. // Release of the UDP packet
  17500. void FreeUdpPacket(UDPPACKET *p)
  17501. {
  17502. // Validate arguments
  17503. if (p == NULL)
  17504. {
  17505. return;
  17506. }
  17507. Free(p->Data);
  17508. Free(p);
  17509. }
  17510. // Create a new UDP packet
  17511. UDPPACKET *NewUdpPacket(IP *src_ip, UINT src_port, IP *dst_ip, UINT dst_port, void *data, UINT size)
  17512. {
  17513. UDPPACKET *p;
  17514. // Validate arguments
  17515. if (data == NULL || size == 0 || dst_ip == NULL || dst_port == 0)
  17516. {
  17517. return NULL;
  17518. }
  17519. p = ZeroMalloc(sizeof(UDPPACKET));
  17520. p->Data = data;
  17521. p->Size = size;
  17522. Copy(&p->SrcIP, src_ip, sizeof(IP));
  17523. p->SrcPort = src_port;
  17524. Copy(&p->DstIP, dst_ip, sizeof(IP));
  17525. p->DestPort = dst_port;
  17526. return p;
  17527. }
  17528. // Transmit the packets via UDP Listener
  17529. void UdpListenerSendPackets(UDPLISTENER *u, LIST *packet_list)
  17530. {
  17531. UINT num = 0;
  17532. // Validate arguments
  17533. if (u == NULL || packet_list == NULL)
  17534. {
  17535. return;
  17536. }
  17537. LockList(u->SendPacketList);
  17538. {
  17539. UINT i;
  17540. num = LIST_NUM(packet_list);
  17541. for (i = 0;i < LIST_NUM(packet_list);i++)
  17542. {
  17543. UDPPACKET *p = LIST_DATA(packet_list, i);
  17544. Add(u->SendPacketList, p);
  17545. }
  17546. }
  17547. UnlockList(u->SendPacketList);
  17548. if (num >= 1)
  17549. {
  17550. SetSockEvent(u->Event);
  17551. }
  17552. }
  17553. void UdpListenerSendPacket(UDPLISTENER *u, UDPPACKET *packet)
  17554. {
  17555. LIST *o;
  17556. // Validate arguments
  17557. if (u == NULL || packet == NULL)
  17558. {
  17559. return;
  17560. }
  17561. o = NewListFast(NULL);
  17562. Add(o, packet);
  17563. UdpListenerSendPackets(u, o);
  17564. ReleaseList(o);
  17565. }
  17566. // Creating a UDP listener
  17567. UDPLISTENER *NewUdpListener(UDPLISTENER_RECV_PROC *recv_proc, void *param)
  17568. {
  17569. UDPLISTENER *u;
  17570. // Validate arguments
  17571. if (recv_proc == NULL)
  17572. {
  17573. return NULL;
  17574. }
  17575. u = ZeroMalloc(sizeof(UDPLISTENER));
  17576. u->Param = param;
  17577. u->PortList = NewList(NULL);
  17578. u->Event = NewSockEvent();
  17579. u->RecvProc = recv_proc;
  17580. u->SendPacketList = NewList(NULL);
  17581. u->Interrupts = NewInterruptManager();
  17582. u->Thread = NewThread(UdpListenerThread, u);
  17583. return u;
  17584. }
  17585. // Release the UDP listener
  17586. void FreeUdpListener(UDPLISTENER *u)
  17587. {
  17588. UINT i;
  17589. // Validate arguments
  17590. if (u == NULL)
  17591. {
  17592. return;
  17593. }
  17594. u->Halt = true;
  17595. SetSockEvent(u->Event);
  17596. WaitThread(u->Thread, INFINITE);
  17597. ReleaseThread(u->Thread);
  17598. ReleaseSockEvent(u->Event);
  17599. ReleaseIntList(u->PortList);
  17600. for (i = 0;i < LIST_NUM(u->SendPacketList);i++)
  17601. {
  17602. UDPPACKET *p = LIST_DATA(u->SendPacketList, i);
  17603. FreeUdpPacket(p);
  17604. }
  17605. ReleaseList(u->SendPacketList);
  17606. FreeInterruptManager(u->Interrupts);
  17607. Free(u);
  17608. }
  17609. // Add the UDP port
  17610. void AddPortToUdpListener(UDPLISTENER *u, UINT port)
  17611. {
  17612. // Validate arguments
  17613. if (u == NULL || port == 0)
  17614. {
  17615. return;
  17616. }
  17617. LockList(u->PortList);
  17618. {
  17619. AddIntDistinct(u->PortList, port);
  17620. }
  17621. UnlockList(u->PortList);
  17622. SetSockEvent(u->Event);
  17623. }
  17624. // Get the port list
  17625. UINT GetUdpListenerPortList(UDPLISTENER *u, UINT **port_list)
  17626. {
  17627. UINT num_ports;
  17628. // Validate arguments
  17629. if (u == NULL || port_list == NULL)
  17630. {
  17631. return 0;
  17632. }
  17633. LockList(u->PortList);
  17634. {
  17635. UINT *ports;
  17636. UINT i;
  17637. num_ports = LIST_NUM(u->PortList);
  17638. ports = ZeroMalloc(sizeof(UINT) * num_ports);
  17639. for (i = 0;i < num_ports;i++)
  17640. {
  17641. ports[i] = *((UINT *)(LIST_DATA(u->PortList, i)));
  17642. }
  17643. *port_list = ports;
  17644. }
  17645. UnlockList(u->PortList);
  17646. return num_ports;
  17647. }
  17648. // Dekete all the UDP ports
  17649. void DeleteAllPortFromUdpListener(UDPLISTENER *u)
  17650. {
  17651. // Validate arguments
  17652. if (u == NULL)
  17653. {
  17654. return;
  17655. }
  17656. LockList(u->PortList);
  17657. {
  17658. UINT num_ports = LIST_NUM(u->PortList);
  17659. UINT *ports = ZeroMalloc(sizeof(UINT) * num_ports);
  17660. UINT i;
  17661. for (i = 0;i < num_ports;i++)
  17662. {
  17663. ports[i] = *((UINT *)(LIST_DATA(u->PortList, i)));
  17664. }
  17665. for (i = 0;i < num_ports;i++)
  17666. {
  17667. UINT port = ports[i];
  17668. DelInt(u->PortList, port);
  17669. }
  17670. Free(ports);
  17671. }
  17672. UnlockList(u->PortList);
  17673. SetSockEvent(u->Event);
  17674. }
  17675. // Delete the UDP port
  17676. void DeletePortFromUdpListener(UDPLISTENER *u, UINT port)
  17677. {
  17678. // Validate arguments
  17679. if (u == NULL || port == 0)
  17680. {
  17681. return;
  17682. }
  17683. LockList(u->PortList);
  17684. {
  17685. DelInt(u->PortList, port);
  17686. }
  17687. UnlockList(u->PortList);
  17688. SetSockEvent(u->Event);
  17689. }
  17690. // Sort function of the interrupt management list
  17691. int CmpInterruptManagerTickList(void *p1, void *p2)
  17692. {
  17693. UINT64 *v1, *v2;
  17694. if (p1 == NULL || p2 == NULL)
  17695. {
  17696. return 0;
  17697. }
  17698. v1 = *(UINT64 **)p1;
  17699. v2 = *(UINT64 **)p2;
  17700. if (v1 == NULL || v2 == NULL)
  17701. {
  17702. return 0;
  17703. }
  17704. if (*v1 > *v2)
  17705. {
  17706. return 1;
  17707. }
  17708. else if (*v1 < *v2)
  17709. {
  17710. return -1;
  17711. }
  17712. else
  17713. {
  17714. return 0;
  17715. }
  17716. }
  17717. // Initialization of the interrupt management
  17718. INTERRUPT_MANAGER *NewInterruptManager()
  17719. {
  17720. INTERRUPT_MANAGER *m = ZeroMalloc(sizeof(INTERRUPT_MANAGER));
  17721. m->TickList = NewList(CmpInterruptManagerTickList);
  17722. return m;
  17723. }
  17724. // Release of the interrupt management
  17725. void FreeInterruptManager(INTERRUPT_MANAGER *m)
  17726. {
  17727. UINT i;
  17728. // Validate arguments
  17729. if (m == NULL)
  17730. {
  17731. return;
  17732. }
  17733. for (i = 0;i < LIST_NUM(m->TickList);i++)
  17734. {
  17735. UINT64 *v = LIST_DATA(m->TickList, i);
  17736. Free(v);
  17737. }
  17738. ReleaseList(m->TickList);
  17739. Free(m);
  17740. }
  17741. // Add a number to the interrupt management
  17742. void AddInterrupt(INTERRUPT_MANAGER *m, UINT64 tick)
  17743. {
  17744. // Validate arguments
  17745. if (tick == 0)
  17746. {
  17747. return;
  17748. }
  17749. LockList(m->TickList);
  17750. {
  17751. if (Search(m->TickList, &tick) == NULL)
  17752. {
  17753. Insert(m->TickList, Clone(&tick, sizeof(UINT64)));
  17754. }
  17755. }
  17756. UnlockList(m->TickList);
  17757. }
  17758. // Get the interval to the next calling
  17759. UINT GetNextIntervalForInterrupt(INTERRUPT_MANAGER *m)
  17760. {
  17761. UINT ret = INFINITE;
  17762. UINT i;
  17763. LIST *o = NULL;
  17764. UINT64 now = Tick64();
  17765. // Validate arguments
  17766. if (m == NULL)
  17767. {
  17768. return 0;
  17769. }
  17770. LockList(m->TickList);
  17771. {
  17772. // Remove entries older than now already
  17773. for (i = 0;i < LIST_NUM(m->TickList);i++)
  17774. {
  17775. UINT64 *v = LIST_DATA(m->TickList, i);
  17776. if (now >= *v)
  17777. {
  17778. ret = 0;
  17779. if (o == NULL)
  17780. {
  17781. o = NewListFast(NULL);
  17782. }
  17783. Add(o, v);
  17784. }
  17785. else
  17786. {
  17787. break;
  17788. }
  17789. }
  17790. for (i = 0;i < LIST_NUM(o);i++)
  17791. {
  17792. UINT64 *v = LIST_DATA(o, i);
  17793. Free(v);
  17794. Delete(m->TickList, v);
  17795. }
  17796. if (o != NULL)
  17797. {
  17798. ReleaseList(o);
  17799. }
  17800. if (ret == INFINITE)
  17801. {
  17802. if (LIST_NUM(m->TickList) >= 1)
  17803. {
  17804. UINT64 *v = LIST_DATA(m->TickList, 0);
  17805. ret = (UINT)(*v - now);
  17806. }
  17807. }
  17808. }
  17809. UnlockList(m->TickList);
  17810. return ret;
  17811. }
  17812. // Let that the listening socket for the reverse socket to accept the new socket
  17813. void InjectNewReverseSocketToAccept(SOCK *listen_sock, SOCK *s, IP *client_ip, UINT client_port)
  17814. {
  17815. bool ok = false;
  17816. // Validate arguments
  17817. if (listen_sock == NULL || s == NULL)
  17818. {
  17819. return;
  17820. }
  17821. LockQueue(listen_sock->ReverseAcceptQueue);
  17822. {
  17823. if (listen_sock->CancelAccept == false && listen_sock->Disconnecting == false)
  17824. {
  17825. InsertQueue(listen_sock->ReverseAcceptQueue, s);
  17826. ok = true;
  17827. s->ServerMode = true;
  17828. s->IsReverseAcceptedSocket = true;
  17829. Copy(&s->RemoteIP, client_ip, sizeof(IP));
  17830. s->RemotePort = client_port;
  17831. }
  17832. }
  17833. UnlockQueue(listen_sock->ReverseAcceptQueue);
  17834. if (ok == false)
  17835. {
  17836. Disconnect(s);
  17837. ReleaseSock(s);
  17838. }
  17839. else
  17840. {
  17841. Set(listen_sock->ReverseAcceptEvent);
  17842. }
  17843. }
  17844. // Create a listening socket for the reverse socket
  17845. SOCK *ListenReverse()
  17846. {
  17847. SOCK *s = NewSock();
  17848. s->Type = SOCK_REVERSE_LISTEN;
  17849. s->ListenMode = true;
  17850. s->ReverseAcceptQueue = NewQueue();
  17851. s->ReverseAcceptEvent = NewEvent();
  17852. s->Connected = true;
  17853. return s;
  17854. }
  17855. // Accept on the reverse socket
  17856. SOCK *AcceptReverse(SOCK *s)
  17857. {
  17858. // Validate arguments
  17859. if (s == NULL || s->Type != SOCK_REVERSE_LISTEN || s->ListenMode == false)
  17860. {
  17861. return NULL;
  17862. }
  17863. while (true)
  17864. {
  17865. SOCK *ret;
  17866. if (s->Disconnecting || s->CancelAccept)
  17867. {
  17868. return NULL;
  17869. }
  17870. LockQueue(s->ReverseAcceptQueue);
  17871. {
  17872. ret = GetNext(s->ReverseAcceptQueue);
  17873. }
  17874. UnlockQueue(s->ReverseAcceptQueue);
  17875. if (ret != NULL)
  17876. {
  17877. StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_AZURE);
  17878. AddProtocolDetailsStr(ret->ProtocolDetails, sizeof(ret->ProtocolDetails), "VPNAzure");
  17879. return ret;
  17880. }
  17881. Wait(s->ReverseAcceptEvent, INFINITE);
  17882. }
  17883. }
  17884. // Start listening on the in-process socket
  17885. SOCK *ListenInProc()
  17886. {
  17887. SOCK *s = NewSock();
  17888. s->Type = SOCK_INPROC;
  17889. s->ListenMode = true;
  17890. s->InProcAcceptQueue = NewQueue();
  17891. s->InProcAcceptEvent = NewEvent();
  17892. s->Connected = true;
  17893. return s;
  17894. }
  17895. // Accept at the in-process socket
  17896. SOCK *AcceptInProc(SOCK *s)
  17897. {
  17898. // Validate arguments
  17899. if (s == NULL || s->Type != SOCK_INPROC || s->ListenMode == false)
  17900. {
  17901. return NULL;
  17902. }
  17903. while (true)
  17904. {
  17905. SOCK *ret;
  17906. if (s->Disconnecting || s->CancelAccept)
  17907. {
  17908. return NULL;
  17909. }
  17910. LockQueue(s->InProcAcceptQueue);
  17911. {
  17912. ret = GetNext(s->InProcAcceptQueue);
  17913. }
  17914. UnlockQueue(s->InProcAcceptQueue);
  17915. if (ret != NULL)
  17916. {
  17917. StrCpy(ret->UnderlayProtocol, sizeof(ret->UnderlayProtocol), SOCK_UNDERLAY_INPROC);
  17918. AddProtocolDetailsStr(ret->ProtocolDetails, sizeof(ret->ProtocolDetails), "InProc");
  17919. return ret;
  17920. }
  17921. Wait(s->InProcAcceptEvent, INFINITE);
  17922. }
  17923. }
  17924. // Connect by the in-process socket
  17925. SOCK *ConnectInProc(SOCK *listen_sock, IP *client_ip, UINT client_port, IP *server_ip, UINT server_port)
  17926. {
  17927. SOCK *ss, *sc;
  17928. bool ok = false;
  17929. // Validate arguments
  17930. if (listen_sock == NULL || listen_sock->Type != SOCK_INPROC || listen_sock->ListenMode == false)
  17931. {
  17932. return NULL;
  17933. }
  17934. NewSocketPair(&sc, &ss, client_ip, client_port, server_ip, server_port);
  17935. LockQueue(listen_sock->InProcAcceptQueue);
  17936. {
  17937. if (listen_sock->CancelAccept == false && listen_sock->Disconnecting == false)
  17938. {
  17939. InsertQueue(listen_sock->InProcAcceptQueue, ss);
  17940. ok = true;
  17941. }
  17942. }
  17943. UnlockQueue(listen_sock->InProcAcceptQueue);
  17944. if (ok == false)
  17945. {
  17946. ReleaseSock(ss);
  17947. ReleaseSock(sc);
  17948. return NULL;
  17949. }
  17950. Set(listen_sock->InProcAcceptEvent);
  17951. return sc;
  17952. }
  17953. // Creating a new socket pair
  17954. void NewSocketPair(SOCK **client, SOCK **server, IP *client_ip, UINT client_port, IP *server_ip, UINT server_port)
  17955. {
  17956. IP iptmp;
  17957. TUBE *t1, *t2;
  17958. SOCK *sc, *ss;
  17959. SOCK_EVENT *e1, *e2;
  17960. // Validate arguments
  17961. if (client == NULL || server == NULL)
  17962. {
  17963. return;
  17964. }
  17965. SetIP(&iptmp, 127, 0, 0, 1);
  17966. if (client_ip == NULL)
  17967. {
  17968. client_ip = &iptmp;
  17969. }
  17970. if (server_ip == NULL)
  17971. {
  17972. server_ip = &iptmp;
  17973. }
  17974. // Creating a tube
  17975. NewTubePair(&t1, &t2, 0); // t1: C -> S, t2: S -> C
  17976. // Creating a socket event
  17977. e1 = NewSockEvent();
  17978. e2 = NewSockEvent();
  17979. SetTubeSockEvent(t1, e1);
  17980. SetTubeSockEvent(t2, e2);
  17981. sc = NewInProcSocket(t1, t2);
  17982. ss = NewInProcSocket(t2, t1);
  17983. Copy(&sc->LocalIP, client_ip, sizeof(IP));
  17984. sc->LocalPort = client_port;
  17985. Copy(&sc->RemoteIP, server_ip, sizeof(IP));
  17986. sc->RemotePort = server_port;
  17987. Copy(&ss->LocalIP, server_ip, sizeof(IP));
  17988. ss->LocalPort = server_port;
  17989. Copy(&ss->RemoteIP, client_ip, sizeof(IP));
  17990. ss->RemotePort = client_port;
  17991. sc->Connected = true;
  17992. sc->ServerMode = false;
  17993. ss->Connected = true;
  17994. ss->ServerMode = true;
  17995. SetTimeout(sc, INFINITE);
  17996. SetTimeout(ss, INFINITE);
  17997. QuerySocketInformation(sc);
  17998. QuerySocketInformation(ss);
  17999. ReleaseSockEvent(e1);
  18000. ReleaseSockEvent(e2);
  18001. ReleaseTube(t1);
  18002. ReleaseTube(t2);
  18003. *client = sc;
  18004. *server = ss;
  18005. }
  18006. // Creating a new in-process socket
  18007. SOCK *NewInProcSocket(TUBE *tube_send, TUBE *tube_recv)
  18008. {
  18009. SOCK *s;
  18010. // Validate arguments
  18011. if (tube_recv == NULL || tube_send == NULL)
  18012. {
  18013. return NULL;
  18014. }
  18015. s = NewSock();
  18016. s->Type = SOCK_INPROC;
  18017. s->SendTube = tube_send;
  18018. s->RecvTube = tube_recv;
  18019. AddRef(tube_send->Ref);
  18020. AddRef(tube_recv->Ref);
  18021. s->InProcRecvFifo = NewFifo();
  18022. s->Connected = true;
  18023. return s;
  18024. }
  18025. // Transmission process for the in-process socket
  18026. UINT SendInProc(SOCK *sock, void *data, UINT size)
  18027. {
  18028. if (sock == NULL || sock->Type != SOCK_INPROC || sock->Disconnecting || sock->Connected == false)
  18029. {
  18030. return 0;
  18031. }
  18032. if (IsTubeConnected(sock->SendTube) == false)
  18033. {
  18034. return 0;
  18035. }
  18036. if (TubeSend(sock->SendTube, data, size, NULL) == false)
  18037. {
  18038. return 0;
  18039. }
  18040. return size;
  18041. }
  18042. // Receiving process for the in-process socket
  18043. UINT RecvInProc(SOCK *sock, void *data, UINT size)
  18044. {
  18045. FIFO *f;
  18046. UINT ret;
  18047. UINT timeout;
  18048. UINT64 giveup_time;
  18049. TUBEDATA *d = NULL;
  18050. if (sock == NULL || sock->Type != SOCK_INPROC || sock->Disconnecting || sock->Connected == false)
  18051. {
  18052. return 0;
  18053. }
  18054. if (IsTubeConnected(sock->SendTube) == false)
  18055. {
  18056. return 0;
  18057. }
  18058. f = sock->InProcRecvFifo;
  18059. if (f == NULL)
  18060. {
  18061. return 0;
  18062. }
  18063. // If there is data in the FIFO, return it immediately
  18064. ret = ReadFifo(f, data, size);
  18065. if (ret != 0)
  18066. {
  18067. return ret;
  18068. }
  18069. timeout = GetTimeout(sock);
  18070. giveup_time = Tick64() + (UINT)timeout;
  18071. // When there is no data in the FIFO, read the next data from the tube
  18072. d = NULL;
  18073. while (true)
  18074. {
  18075. UINT64 now = 0;
  18076. UINT interval;
  18077. if (sock->AsyncMode == false)
  18078. {
  18079. now = Tick64();
  18080. if (now >= giveup_time)
  18081. {
  18082. break;
  18083. }
  18084. }
  18085. d = TubeRecvAsync(sock->RecvTube);
  18086. if (d != NULL)
  18087. {
  18088. break;
  18089. }
  18090. if (IsTubeConnected(sock->RecvTube) == false)
  18091. {
  18092. break;
  18093. }
  18094. if (sock->AsyncMode)
  18095. {
  18096. break;
  18097. }
  18098. interval = (UINT)(giveup_time - now);
  18099. Wait(sock->RecvTube->Event, interval);
  18100. }
  18101. if (d == NULL)
  18102. {
  18103. if (IsTubeConnected(sock->RecvTube) == false)
  18104. {
  18105. return 0;
  18106. }
  18107. if (sock->AsyncMode == false)
  18108. {
  18109. // If a timeout occurs in synchronous mode, disconnect ir
  18110. Disconnect(sock);
  18111. return 0;
  18112. }
  18113. else
  18114. {
  18115. // If a timeout occurs in asynchronous mode, returns the blocking error
  18116. return SOCK_LATER;
  18117. }
  18118. }
  18119. else
  18120. {
  18121. // If the received data is larger than the requested size, write the rest to FIFO
  18122. if (d->DataSize > size)
  18123. {
  18124. WriteFifo(f, ((UCHAR *)d->Data) + size, d->DataSize - size);
  18125. ret = size;
  18126. }
  18127. else
  18128. {
  18129. ret = d->DataSize;
  18130. }
  18131. Copy(data, d->Data, ret);
  18132. FreeTubeData(d);
  18133. return ret;
  18134. }
  18135. }
  18136. // Wait for the arrival of data on multiple tubes
  18137. void WaitForTubes(TUBE **tubes, UINT num, UINT timeout)
  18138. {
  18139. // Validate arguments
  18140. if (num != 0 && tubes == NULL)
  18141. {
  18142. return;
  18143. }
  18144. if (timeout == 0)
  18145. {
  18146. return;
  18147. }
  18148. if (num == 0)
  18149. {
  18150. SleepThread(timeout);
  18151. return;
  18152. }
  18153. #ifdef OS_WIN32
  18154. Win32WaitForTubes(tubes, num, timeout);
  18155. #else // OS_WIN32
  18156. UnixWaitForTubes(tubes, num, timeout);
  18157. #endif // OS_WIN32
  18158. }
  18159. #ifdef OS_WIN32
  18160. void Win32WaitForTubes(TUBE **tubes, UINT num, UINT timeout)
  18161. {
  18162. HANDLE array[MAXIMUM_WAIT_OBJECTS];
  18163. UINT i;
  18164. Zero(array, sizeof(array));
  18165. for (i = 0;i < num;i++)
  18166. {
  18167. TUBE *t = tubes[i];
  18168. array[i] = t->Event->pData;
  18169. }
  18170. if (num == 1)
  18171. {
  18172. WaitForSingleObject(array[0], timeout);
  18173. }
  18174. else
  18175. {
  18176. WaitForMultipleObjects(num, array, false, timeout);
  18177. }
  18178. }
  18179. #else // OS_WIN32
  18180. void UnixWaitForTubes(TUBE **tubes, UINT num, UINT timeout)
  18181. {
  18182. int *fds;
  18183. UINT i;
  18184. char tmp[MAX_SIZE];
  18185. bool any_of_tubes_are_readable = false;
  18186. fds = ZeroMalloc(sizeof(int) * num);
  18187. for (i = 0;i < num;i++)
  18188. {
  18189. fds[i] = tubes[i]->SockEvent->pipe_read;
  18190. if (tubes[i]->SockEvent->current_pipe_data != 0)
  18191. {
  18192. any_of_tubes_are_readable = true;
  18193. }
  18194. }
  18195. if (any_of_tubes_are_readable == false)
  18196. {
  18197. UnixSelectInner(num, fds, 0, NULL, timeout);
  18198. }
  18199. for (i = 0;i < num;i++)
  18200. {
  18201. int fd = fds[i];
  18202. int readret;
  18203. tubes[i]->SockEvent->current_pipe_data = 0;
  18204. do
  18205. {
  18206. readret = read(fd, tmp, sizeof(tmp));
  18207. }
  18208. while (readret >= 1);
  18209. }
  18210. Free(fds);
  18211. }
  18212. #endif // OS_WIN32
  18213. // Creating a Tube Flush List
  18214. TUBE_FLUSH_LIST *NewTubeFlushList()
  18215. {
  18216. TUBE_FLUSH_LIST *f = ZeroMalloc(sizeof(TUBE_FLUSH_LIST));
  18217. f->List = NewListFast(NULL);
  18218. return f;
  18219. }
  18220. // Release of the Tube Flush List
  18221. void FreeTubeFlushList(TUBE_FLUSH_LIST *f)
  18222. {
  18223. UINT i;
  18224. // Validate arguments
  18225. if (f == NULL)
  18226. {
  18227. return;
  18228. }
  18229. for (i = 0;i < LIST_NUM(f->List);i++)
  18230. {
  18231. TUBE *t = LIST_DATA(f->List, i);
  18232. ReleaseTube(t);
  18233. }
  18234. ReleaseList(f->List);
  18235. Free(f);
  18236. }
  18237. // Add a Tube to the Tube Flush List
  18238. void AddTubeToFlushList(TUBE_FLUSH_LIST *f, TUBE *t)
  18239. {
  18240. // Validate arguments
  18241. if (f == NULL || t == NULL)
  18242. {
  18243. return;
  18244. }
  18245. if (t->IsInFlushList)
  18246. {
  18247. return;
  18248. }
  18249. if (IsInList(f->List, t) == false)
  18250. {
  18251. Add(f->List, t);
  18252. AddRef(t->Ref);
  18253. t->IsInFlushList = true;
  18254. }
  18255. }
  18256. // Flush the all tubes in the Tube Flush List
  18257. void FlushTubeFlushList(TUBE_FLUSH_LIST *f)
  18258. {
  18259. UINT i;
  18260. // Validate arguments
  18261. if (f == NULL)
  18262. {
  18263. return;
  18264. }
  18265. for (i = 0;i < LIST_NUM(f->List);i++)
  18266. {
  18267. TUBE *t = LIST_DATA(f->List, i);
  18268. TubeFlush(t);
  18269. t->IsInFlushList = false;
  18270. ReleaseTube(t);
  18271. }
  18272. DeleteAll(f->List);
  18273. }
  18274. // The server receives a PACK from the client
  18275. PACK *HttpServerRecv(SOCK *s)
  18276. {
  18277. return HttpServerRecvEx(s, 0);
  18278. }
  18279. PACK *HttpServerRecvEx(SOCK *s, UINT max_data_size)
  18280. {
  18281. BUF *b;
  18282. PACK *p;
  18283. HTTP_HEADER *h;
  18284. UINT size;
  18285. UCHAR *tmp;
  18286. HTTP_VALUE *v;
  18287. UINT num_noop = 0;
  18288. if (max_data_size == 0) max_data_size = HTTP_PACK_MAX_SIZE;
  18289. // Validate arguments
  18290. if (s == NULL)
  18291. {
  18292. return NULL;
  18293. }
  18294. START:
  18295. h = RecvHttpHeader(s);
  18296. if (h == NULL)
  18297. {
  18298. goto BAD_REQUEST;
  18299. }
  18300. if (StrCmpi(h->Method, "POST") != 0 ||
  18301. StrCmpi(h->Target, HTTP_VPN_TARGET) != 0 ||
  18302. StrCmpi(h->Version, "HTTP/1.1") != 0)
  18303. {
  18304. FreeHttpHeader(h);
  18305. goto BAD_REQUEST;
  18306. }
  18307. v = GetHttpValue(h, "Content-Type");
  18308. if (v == NULL || StrCmpi(v->Data, HTTP_CONTENT_TYPE2) != 0)
  18309. {
  18310. FreeHttpHeader(h);
  18311. goto BAD_REQUEST;
  18312. }
  18313. size = GetContentLength(h);
  18314. if (size == 0 || (size > max_data_size))
  18315. {
  18316. FreeHttpHeader(h);
  18317. goto BAD_REQUEST;
  18318. }
  18319. tmp = MallocEx(size, true);
  18320. if (RecvAll(s, tmp, size, s->SecureMode) == false)
  18321. {
  18322. Free(tmp);
  18323. FreeHttpHeader(h);
  18324. return NULL;
  18325. }
  18326. b = NewBuf();
  18327. WriteBuf(b, tmp, size);
  18328. Free(tmp);
  18329. FreeHttpHeader(h);
  18330. SeekBuf(b, 0, 0);
  18331. p = BufToPack(b);
  18332. FreeBuf(b);
  18333. // Determine whether it's a NOOP
  18334. if (PackGetInt(p, "noop") != 0)
  18335. {
  18336. Debug("recv: noop\n");
  18337. FreePack(p);
  18338. p = PackError(0);
  18339. PackAddInt(p, "noop", 1);
  18340. if (HttpServerSend(s, p) == false)
  18341. {
  18342. FreePack(p);
  18343. return NULL;
  18344. }
  18345. FreePack(p);
  18346. num_noop++;
  18347. if (num_noop > MAX_NOOP_PER_SESSION)
  18348. {
  18349. return NULL;
  18350. }
  18351. goto START;
  18352. }
  18353. return p;
  18354. BAD_REQUEST:
  18355. // Return an error
  18356. return NULL;
  18357. }
  18358. // Store the error value into PACK
  18359. PACK *PackError(UINT error)
  18360. {
  18361. PACK *p;
  18362. p = NewPack();
  18363. PackAddInt(p, "error", error);
  18364. return p;
  18365. }
  18366. // Get the error value from PACK
  18367. UINT GetErrorFromPack(PACK *p)
  18368. {
  18369. // Validate arguments
  18370. if (p == NULL)
  18371. {
  18372. return 0;
  18373. }
  18374. return PackGetInt(p, "error");
  18375. }
  18376. // Client receives a PACK from the server
  18377. PACK *HttpClientRecv(SOCK *s)
  18378. {
  18379. BUF *b;
  18380. PACK *p;
  18381. HTTP_HEADER *h;
  18382. UINT size;
  18383. UCHAR *tmp;
  18384. HTTP_VALUE *v;
  18385. // Validate arguments
  18386. if (s == NULL)
  18387. {
  18388. return NULL;
  18389. }
  18390. h = RecvHttpHeader(s);
  18391. if (h == NULL)
  18392. {
  18393. return NULL;
  18394. }
  18395. if (StrCmpi(h->Method, "HTTP/1.1") != 0 ||
  18396. StrCmpi(h->Target, "200") != 0)
  18397. {
  18398. FreeHttpHeader(h);
  18399. return NULL;
  18400. }
  18401. v = GetHttpValue(h, "Content-Type");
  18402. if (v == NULL || StrCmpi(v->Data, HTTP_CONTENT_TYPE2) != 0)
  18403. {
  18404. FreeHttpHeader(h);
  18405. return NULL;
  18406. }
  18407. size = GetContentLength(h);
  18408. if (size == 0 || size > MAX_PACK_SIZE)
  18409. {
  18410. FreeHttpHeader(h);
  18411. return NULL;
  18412. }
  18413. tmp = MallocEx(size, true);
  18414. if (RecvAll(s, tmp, size, s->SecureMode) == false)
  18415. {
  18416. Free(tmp);
  18417. FreeHttpHeader(h);
  18418. return NULL;
  18419. }
  18420. b = NewBuf();
  18421. WriteBuf(b, tmp, size);
  18422. Free(tmp);
  18423. FreeHttpHeader(h);
  18424. SeekBuf(b, 0, 0);
  18425. p = BufToPack(b);
  18426. FreeBuf(b);
  18427. return p;
  18428. }
  18429. // Create an entry to PACK for the dummy
  18430. void CreateDummyValue(PACK *p)
  18431. {
  18432. UINT size;
  18433. UCHAR *buf;
  18434. // Validate arguments
  18435. if (p == NULL)
  18436. {
  18437. return;
  18438. }
  18439. size = Rand32() % HTTP_PACK_RAND_SIZE_MAX;
  18440. buf = Malloc(size);
  18441. Rand(buf, size);
  18442. PackAddData(p, "pencore", buf, size);
  18443. Free(buf);
  18444. }
  18445. // Client sends a PACK to the server
  18446. bool HttpClientSend(SOCK *s, PACK *p)
  18447. {
  18448. BUF *b;
  18449. bool ret;
  18450. HTTP_HEADER *h;
  18451. char date_str[MAX_SIZE];
  18452. char ip_str[MAX_SIZE];
  18453. // Validate arguments
  18454. if (s == NULL || p == NULL)
  18455. {
  18456. return false;
  18457. }
  18458. IPToStr(ip_str, sizeof(ip_str), &s->RemoteIP);
  18459. CreateDummyValue(p);
  18460. b = PackToBuf(p);
  18461. if (b == NULL)
  18462. {
  18463. return false;
  18464. }
  18465. h = NewHttpHeader("POST", HTTP_VPN_TARGET, "HTTP/1.1");
  18466. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18467. AddHttpValue(h, NewHttpValue("Date", date_str));
  18468. AddHttpValue(h, NewHttpValue("Host", ip_str));
  18469. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  18470. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  18471. AddHttpValue(h, NewHttpValue("Content-Type", HTTP_CONTENT_TYPE2));
  18472. ret = PostHttp(s, h, b->Buf, b->Size);
  18473. FreeHttpHeader(h);
  18474. FreeBuf(b);
  18475. return ret;
  18476. }
  18477. // Server sends a PACK to the client
  18478. bool HttpServerSend(SOCK *s, PACK *p)
  18479. {
  18480. BUF *b;
  18481. bool ret;
  18482. HTTP_HEADER *h;
  18483. char date_str[MAX_SIZE];
  18484. // Validate arguments
  18485. if (s == NULL || p == NULL)
  18486. {
  18487. return false;
  18488. }
  18489. CreateDummyValue(p);
  18490. b = PackToBuf(p);
  18491. if (b == NULL)
  18492. {
  18493. return false;
  18494. }
  18495. h = NewHttpHeader("HTTP/1.1", "200", "OK");
  18496. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18497. AddHttpValue(h, NewHttpValue("Date", date_str));
  18498. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  18499. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  18500. AddHttpValue(h, NewHttpValue("Content-Type", HTTP_CONTENT_TYPE2));
  18501. ret = PostHttp(s, h, b->Buf, b->Size);
  18502. FreeHttpHeader(h);
  18503. FreeBuf(b);
  18504. return ret;
  18505. }
  18506. // Replace unsafe characters in target
  18507. void ReplaceUnsafeCharInTarget(char *target){
  18508. UINT i;
  18509. for(i = 0; target[i] ; i++) {
  18510. if(target[i] == '<')
  18511. target[i] = '(';
  18512. else if(target[i] == '>')
  18513. target[i] = ')';
  18514. }
  18515. }
  18516. // Sending the 400 Bad Request: Invalid Hostname
  18517. bool HttpSendInvalidHostname(SOCK *s, char *method)
  18518. {
  18519. HTTP_HEADER *h;
  18520. char date_str[MAX_SIZE];
  18521. char *str;
  18522. bool ret;
  18523. char host[MAX_SIZE];
  18524. UINT port;
  18525. // Validate arguments
  18526. if (s == NULL)
  18527. {
  18528. return false;
  18529. }
  18530. // Get the host name
  18531. //GetMachineName(host, MAX_SIZE);
  18532. Zero(host, sizeof(host));
  18533. IPToStr(host, sizeof(host), &s->LocalIP);
  18534. // Get the port number
  18535. port = s->LocalPort;
  18536. // Creating a header
  18537. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18538. h = NewHttpHeader("HTTP/1.1", "400", "Bad Request");
  18539. AddHttpValue(h, NewHttpValue("Date", date_str));
  18540. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  18541. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  18542. AddHttpValue(h, NewHttpValue("Content-Type", HTTP_CONTENT_TYPE));
  18543. // Creating a Data
  18544. str = "<h1>Bad Request (Invalid Hostname)</h1>\n";
  18545. // Transmission
  18546. ret = PostHttp(s, h, str, StrLen(str));
  18547. FreeHttpHeader(h);
  18548. return ret;
  18549. }
  18550. // Sending the 501 Not Implemented error
  18551. bool HttpSendNotImplemented(SOCK *s, char *method, char *target, char *version)
  18552. {
  18553. HTTP_HEADER *h;
  18554. char date_str[MAX_SIZE];
  18555. char *str;
  18556. UINT str_size;
  18557. char port_str[MAX_SIZE];
  18558. bool ret;
  18559. char host[MAX_SIZE];
  18560. UINT port;
  18561. // Validate arguments
  18562. if (s == NULL || target == NULL)
  18563. {
  18564. return false;
  18565. }
  18566. // Get the host name
  18567. //GetMachineName(host, MAX_SIZE);
  18568. Zero(host, sizeof(host));
  18569. IPToStr(host, sizeof(host), &s->LocalIP);
  18570. // Get the port number
  18571. port = s->LocalPort;
  18572. // Creating a header
  18573. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18574. h = NewHttpHeader("HTTP/1.1", "501", "Method Not Implemented");
  18575. AddHttpValue(h, NewHttpValue("Date", date_str));
  18576. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  18577. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  18578. AddHttpValue(h, NewHttpValue("Content-Type", HTTP_CONTENT_TYPE));
  18579. // Creating a Data
  18580. str_size = sizeof(http_501_str) * 2 + StrLen(target) + StrLen(host) + StrLen(method) + StrLen(version);
  18581. str = Malloc(str_size);
  18582. StrCpy(str, str_size, http_501_str);
  18583. // TARGET
  18584. ReplaceUnsafeCharInTarget(target);
  18585. ReplaceStri(str, str_size, str, "$TARGET$", target);
  18586. // HOST
  18587. ReplaceStri(str, str_size, str, "$HOST$", host);
  18588. // PORT
  18589. ToStr(port_str, port);
  18590. ReplaceStri(str, str_size, str, "$PORT$", port_str);
  18591. // METHOD
  18592. ReplaceStri(str, str_size, str, "$METHOD$", method);
  18593. // VERSION
  18594. ReplaceStri(str, str_size, str, "$VERSION$", version);
  18595. // Transmission
  18596. ret = PostHttp(s, h, str, StrLen(str));
  18597. FreeHttpHeader(h);
  18598. Free(str);
  18599. return ret;
  18600. }
  18601. // Sending a HTTP body contents
  18602. bool HttpSendBody(SOCK *s, void *data, UINT size, char *contents_type)
  18603. {
  18604. HTTP_HEADER *h;
  18605. char date_str[MAX_SIZE];
  18606. bool ret;
  18607. if (s == NULL || (size != 0 && data == NULL))
  18608. {
  18609. return false;
  18610. }
  18611. if (contents_type == NULL)
  18612. {
  18613. contents_type = "application/octet-stream";
  18614. }
  18615. // Creating a header
  18616. h = NewHttpHeader("HTTP/1.1", "200", "OK");
  18617. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18618. AddHttpValue(h, NewHttpValue("Date", date_str));
  18619. AddHttpValue(h, NewHttpValue("Content-Type", contents_type));
  18620. AddHttpValue(h, NewHttpValue("Cache-Control", "no-cache"));
  18621. ret = PostHttp(s, h, data, size);
  18622. FreeHttpHeader(h);
  18623. return ret;
  18624. }
  18625. // Sending a 404 Not Found error
  18626. bool HttpSendNotFound(SOCK *s, char *target)
  18627. {
  18628. HTTP_HEADER *h;
  18629. char date_str[MAX_SIZE];
  18630. char *str;
  18631. UINT str_size;
  18632. char port_str[MAX_SIZE];
  18633. bool ret;
  18634. char host[MAX_SIZE];
  18635. UINT port;
  18636. // Validate arguments
  18637. if (s == NULL || target == NULL)
  18638. {
  18639. return false;
  18640. }
  18641. // Get the host name
  18642. //GetMachineName(host, MAX_SIZE);
  18643. Zero(host, sizeof(host));
  18644. IPToStr(host, sizeof(host), &s->LocalIP);
  18645. // Get the port number
  18646. port = s->LocalPort;
  18647. // Creating a header
  18648. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18649. h = NewHttpHeader("HTTP/1.1", "404", "Not Found");
  18650. AddHttpValue(h, NewHttpValue("Date", date_str));
  18651. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  18652. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  18653. AddHttpValue(h, NewHttpValue("Content-Type", HTTP_CONTENT_TYPE));
  18654. // Creating a Data
  18655. str_size = sizeof(http_404_str) * 2 + StrLen(target) + StrLen(host);
  18656. str = Malloc(str_size);
  18657. StrCpy(str, str_size, http_404_str);
  18658. // TARGET
  18659. ReplaceUnsafeCharInTarget(target);
  18660. ReplaceStri(str, str_size, str, "$TARGET$", target);
  18661. // HOST
  18662. ReplaceStri(str, str_size, str, "$HOST$", host);
  18663. // PORT
  18664. ToStr(port_str, port);
  18665. ReplaceStri(str, str_size, str, "$PORT$", port_str);
  18666. // Transmission
  18667. ret = PostHttp(s, h, str, StrLen(str));
  18668. FreeHttpHeader(h);
  18669. Free(str);
  18670. return ret;
  18671. }
  18672. // Sending a 500 Server Error
  18673. bool HttpSendServerError(SOCK *s, char *target)
  18674. {
  18675. HTTP_HEADER *h;
  18676. char date_str[MAX_SIZE];
  18677. char *str;
  18678. UINT str_size;
  18679. char port_str[MAX_SIZE];
  18680. bool ret;
  18681. char host[MAX_SIZE];
  18682. UINT port;
  18683. // Validate arguments
  18684. if (s == NULL || target == NULL)
  18685. {
  18686. return false;
  18687. }
  18688. // Get the host name
  18689. //GetMachineName(host, MAX_SIZE);
  18690. Zero(host, sizeof(host));
  18691. IPToStr(host, sizeof(host), &s->LocalIP);
  18692. // Get the port number
  18693. port = s->LocalPort;
  18694. // Creating a header
  18695. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18696. h = NewHttpHeader("HTTP/1.1", "500", "Server Error");
  18697. AddHttpValue(h, NewHttpValue("Date", date_str));
  18698. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  18699. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  18700. AddHttpValue(h, NewHttpValue("Content-Type", HTTP_CONTENT_TYPE));
  18701. // Creating a Data
  18702. str_size = sizeof(http_500_str) * 2 + StrLen(target) + StrLen(host);
  18703. str = Malloc(str_size);
  18704. StrCpy(str, str_size, http_500_str);
  18705. // TARGET
  18706. ReplaceUnsafeCharInTarget(target);
  18707. ReplaceStri(str, str_size, str, "$TARGET$", target);
  18708. // HOST
  18709. ReplaceStri(str, str_size, str, "$HOST$", host);
  18710. // PORT
  18711. ToStr(port_str, port);
  18712. ReplaceStri(str, str_size, str, "$PORT$", port_str);
  18713. // Transmission
  18714. ret = PostHttp(s, h, str, StrLen(str));
  18715. FreeHttpHeader(h);
  18716. Free(str);
  18717. return ret;
  18718. }
  18719. // Sending a 403 Forbidden error
  18720. bool HttpSendForbidden(SOCK *s, char *target, char *server_id)
  18721. {
  18722. HTTP_HEADER *h;
  18723. char date_str[MAX_SIZE];
  18724. char *str;
  18725. UINT str_size;
  18726. char port_str[MAX_SIZE];
  18727. bool ret;
  18728. char host[MAX_SIZE];
  18729. UINT port;
  18730. // Validate arguments
  18731. if (s == NULL || target == NULL)
  18732. {
  18733. return false;
  18734. }
  18735. // Get the host name
  18736. //GetMachineName(host, MAX_SIZE);
  18737. Zero(host, sizeof(host));
  18738. IPToStr(host, sizeof(host), &s->LocalIP);
  18739. // Get the port number
  18740. port = s->LocalPort;
  18741. // Creating a header
  18742. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  18743. h = NewHttpHeader("HTTP/1.1", "403", "Forbidden");
  18744. AddHttpValue(h, NewHttpValue("Date", date_str));
  18745. AddHttpValue(h, NewHttpValue("Keep-Alive", HTTP_KEEP_ALIVE));
  18746. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  18747. AddHttpValue(h, NewHttpValue("Content-Type", HTTP_CONTENT_TYPE));
  18748. // Creating a Data
  18749. str_size = sizeof(http_403_str) * 2 + StrLen(target) + StrLen(host);
  18750. str = Malloc(str_size);
  18751. StrCpy(str, str_size, http_403_str);
  18752. // TARGET
  18753. ReplaceUnsafeCharInTarget(target);
  18754. ReplaceStri(str, str_size, str, "$TARGET$", target);
  18755. // HOST
  18756. ReplaceStri(str, str_size, str, "$HOST$", host);
  18757. // PORT
  18758. ToStr(port_str, port);
  18759. ReplaceStri(str, str_size, str, "$PORT$", port_str);
  18760. // Transmission
  18761. ret = PostHttp(s, h, str, StrLen(str));
  18762. FreeHttpHeader(h);
  18763. Free(str);
  18764. return ret;
  18765. }
  18766. // Get the date and time string for the HTTP header
  18767. void GetHttpDateStr(char *str, UINT size, UINT64 t)
  18768. {
  18769. SYSTEMTIME s;
  18770. static char *wday[] =
  18771. {
  18772. "Sun", "Mon", "Tue", "Wed", "Thu", "Fri", "Sat",
  18773. };
  18774. static char *month[] =
  18775. {
  18776. "Jan", "Feb", "Mar", "Apr", "May", "Jun", "Jul", "Aug", "Sep", "Oct",
  18777. "Nov", "Dec",
  18778. };
  18779. // Validate arguments
  18780. if (str == NULL)
  18781. {
  18782. return;
  18783. }
  18784. UINT64ToSystem(&s, t);
  18785. Format(str, size, "%s, %02u %s %04u %02u:%02u:%02u GMT",
  18786. wday[s.wDayOfWeek], s.wDay, month[s.wMonth - 1], s.wYear,
  18787. s.wHour, s.wMinute, s.wSecond);
  18788. }
  18789. // Get the Content-Length from the HTTP header
  18790. UINT GetContentLength(HTTP_HEADER *header)
  18791. {
  18792. UINT ret;
  18793. HTTP_VALUE *v;
  18794. // Validate arguments
  18795. if (header == NULL)
  18796. {
  18797. return 0;
  18798. }
  18799. v = GetHttpValue(header, "Content-Length");
  18800. if (v == NULL)
  18801. {
  18802. return 0;
  18803. }
  18804. ret = ToInt(v->Data);
  18805. return ret;
  18806. }
  18807. // Send the data in the HTTP
  18808. bool PostHttp(SOCK *s, HTTP_HEADER *header, void *post_data, UINT post_size)
  18809. {
  18810. char *header_str;
  18811. BUF *b;
  18812. bool ret;
  18813. // Validate arguments
  18814. if (s == NULL || header == NULL || (post_size != 0 && post_data == NULL))
  18815. {
  18816. return false;
  18817. }
  18818. // Check whether the Content-Lentgh exists?
  18819. if (GetHttpValue(header, "Content-Length") == NULL)
  18820. {
  18821. char tmp[MAX_SIZE];
  18822. // Add because it does not exist
  18823. ToStr(tmp, post_size);
  18824. AddHttpValue(header, NewHttpValue("Content-Length", tmp));
  18825. }
  18826. // Convert the header to string
  18827. header_str = HttpHeaderToStr(header);
  18828. if (header_str == NULL)
  18829. {
  18830. return false;
  18831. }
  18832. b = NewBuf();
  18833. WriteBuf(b, header_str, StrLen(header_str));
  18834. Free(header_str);
  18835. // Append the data
  18836. WriteBuf(b, post_data, post_size);
  18837. // Send
  18838. ret = SendAll(s, b->Buf, b->Size, s->SecureMode);
  18839. FreeBuf(b);
  18840. return ret;
  18841. }
  18842. // Convert a HTTP header to a string
  18843. char *HttpHeaderToStr(HTTP_HEADER *header)
  18844. {
  18845. BUF *b;
  18846. char *tmp;
  18847. UINT i;
  18848. char *s;
  18849. // Validate arguments
  18850. if (header == NULL)
  18851. {
  18852. return NULL;
  18853. }
  18854. tmp = Malloc(HTTP_HEADER_LINE_MAX_SIZE);
  18855. b = NewBuf();
  18856. // Header
  18857. Format(tmp, HTTP_HEADER_LINE_MAX_SIZE,
  18858. "%s %s %s\r\n", header->Method, header->Target, header->Version);
  18859. WriteBuf(b, tmp, StrLen(tmp));
  18860. // Value
  18861. for (i = 0;i < LIST_NUM(header->ValueList);i++)
  18862. {
  18863. HTTP_VALUE *v = (HTTP_VALUE *)LIST_DATA(header->ValueList, i);
  18864. Format(tmp, HTTP_HEADER_LINE_MAX_SIZE,
  18865. "%s: %s\r\n", v->Name, v->Data);
  18866. WriteBuf(b, tmp, StrLen(tmp));
  18867. }
  18868. // Trailing newline
  18869. WriteBuf(b, "\r\n", 2);
  18870. s = Malloc(b->Size + 1);
  18871. Copy(s, b->Buf, b->Size);
  18872. s[b->Size] = 0;
  18873. FreeBuf(b);
  18874. Free(tmp);
  18875. return s;
  18876. }
  18877. // Send the HTTP header
  18878. bool SendHttpHeader(SOCK *s, HTTP_HEADER *header)
  18879. {
  18880. char *str;
  18881. bool ret;
  18882. // Validate arguments
  18883. if (s == NULL || header == NULL)
  18884. {
  18885. return false;
  18886. }
  18887. // Convert to string
  18888. str = HttpHeaderToStr(header);
  18889. // Transmission
  18890. ret = SendAll(s, str, StrLen(str), s->SecureMode);
  18891. Free(str);
  18892. return ret;
  18893. }
  18894. // Receive an HTTP header
  18895. HTTP_HEADER *RecvHttpHeader(SOCK *s)
  18896. {
  18897. TOKEN_LIST *token = NULL;
  18898. char *str = NULL;
  18899. HTTP_HEADER *header = NULL;
  18900. // Validate arguments
  18901. if (s == NULL)
  18902. {
  18903. return NULL;
  18904. }
  18905. // Get the first line
  18906. str = RecvLine(s, HTTP_HEADER_LINE_MAX_SIZE);
  18907. if (str == NULL)
  18908. {
  18909. goto LABEL_ERROR;
  18910. }
  18911. // Split into tokens
  18912. token = ParseToken(str, " ");
  18913. if (token->NumTokens < 3)
  18914. {
  18915. goto LABEL_ERROR;
  18916. }
  18917. Free(str);
  18918. str = NULL;
  18919. // Creating a header object
  18920. header = NewHttpHeader(token->Token[0], token->Token[1], token->Token[2]);
  18921. if (StrCmpi(header->Version, "HTTP/0.9") == 0)
  18922. {
  18923. // The header ends with this line
  18924. FreeToken(token);
  18925. return header;
  18926. }
  18927. // Get the subsequent lines
  18928. while (true)
  18929. {
  18930. UINT pos;
  18931. HTTP_VALUE *v;
  18932. char *value_name, *value_data;
  18933. str = RecvLine(s, HTTP_HEADER_LINE_MAX_SIZE);
  18934. if (str == NULL)
  18935. {
  18936. goto LABEL_ERROR;
  18937. }
  18938. Trim(str);
  18939. if (StrLen(str) == 0)
  18940. {
  18941. // End of header
  18942. Free(str);
  18943. str = NULL;
  18944. break;
  18945. }
  18946. // Get the position of the colon
  18947. pos = SearchStr(str, ":", 0);
  18948. if (pos == INFINITE)
  18949. {
  18950. // The colon does not exist
  18951. goto LABEL_ERROR;
  18952. }
  18953. // Divide into the name and the data
  18954. value_name = Malloc(pos + 1);
  18955. Copy(value_name, str, pos);
  18956. value_name[pos] = 0;
  18957. value_data = &str[pos + 1];
  18958. v = NewHttpValue(value_name, value_data);
  18959. if (v == NULL)
  18960. {
  18961. Free(value_name);
  18962. goto LABEL_ERROR;
  18963. }
  18964. Free(value_name);
  18965. AddHttpValue(header, v);
  18966. Free(str);
  18967. }
  18968. FreeToken(token);
  18969. return header;
  18970. LABEL_ERROR:
  18971. // Memory release
  18972. if (token)
  18973. {
  18974. FreeToken(token);
  18975. }
  18976. if (str)
  18977. {
  18978. Free(str);
  18979. }
  18980. if (header)
  18981. {
  18982. FreeHttpHeader(header);
  18983. }
  18984. return NULL;
  18985. }
  18986. // Receive a line
  18987. char *RecvLine(SOCK *s, UINT max_size)
  18988. {
  18989. BUF *b;
  18990. char c;
  18991. char *str;
  18992. // Validate arguments
  18993. if (s == NULL || max_size == 0)
  18994. {
  18995. return NULL;
  18996. }
  18997. b = NewBuf();
  18998. while (true)
  18999. {
  19000. UCHAR *buf;
  19001. if (RecvAll(s, &c, sizeof(c), s->SecureMode) == false)
  19002. {
  19003. FreeBuf(b);
  19004. return NULL;
  19005. }
  19006. WriteBuf(b, &c, sizeof(c));
  19007. buf = (UCHAR *)b->Buf;
  19008. if (b->Size > max_size)
  19009. {
  19010. FreeBuf(b);
  19011. return NULL;
  19012. }
  19013. if (b->Size >= 1)
  19014. {
  19015. if (buf[b->Size - 1] == '\n')
  19016. {
  19017. b->Size--;
  19018. if (b->Size >= 1)
  19019. {
  19020. if (buf[b->Size - 1] == '\r')
  19021. {
  19022. b->Size--;
  19023. }
  19024. }
  19025. str = Malloc(b->Size + 1);
  19026. Copy(str, b->Buf, b->Size);
  19027. str[b->Size] = 0;
  19028. FreeBuf(b);
  19029. return str;
  19030. }
  19031. }
  19032. }
  19033. }
  19034. // Creating a new HTTP value
  19035. HTTP_VALUE *NewHttpValue(char *name, char *data)
  19036. {
  19037. HTTP_VALUE *v;
  19038. // Validate arguments
  19039. if (name == NULL || data == NULL)
  19040. {
  19041. return NULL;
  19042. }
  19043. v = ZeroMalloc(sizeof(HTTP_VALUE));
  19044. v->Name = CopyStr(name);
  19045. v->Data = CopyStr(data);
  19046. Trim(v->Name);
  19047. Trim(v->Data);
  19048. return v;
  19049. }
  19050. // Look for the HTTP value from the HTTP header
  19051. HTTP_VALUE *GetHttpValue(HTTP_HEADER *header, char *name)
  19052. {
  19053. HTTP_VALUE *v, t;
  19054. // Validate arguments
  19055. if (header == NULL || name == NULL)
  19056. {
  19057. return NULL;
  19058. }
  19059. t.Name = name;
  19060. v = Search(header->ValueList, &t);
  19061. if (v == NULL)
  19062. {
  19063. return NULL;
  19064. }
  19065. return v;
  19066. }
  19067. // Add a HTTP value to the HTTP header
  19068. void AddHttpValue(HTTP_HEADER *header, HTTP_VALUE *value)
  19069. {
  19070. // Validate arguments
  19071. if (header == NULL || value == NULL)
  19072. {
  19073. return;
  19074. }
  19075. if (LIST_NUM(header->ValueList) < HTTP_HEADER_MAX_LINES)
  19076. {
  19077. Insert(header->ValueList, value);
  19078. }
  19079. else
  19080. {
  19081. FreeHttpValue(value);
  19082. }
  19083. }
  19084. // Create an HTTP header
  19085. HTTP_HEADER *NewHttpHeader(char *method, char *target, char *version)
  19086. {
  19087. return NewHttpHeaderEx(method, target, version, false);
  19088. }
  19089. HTTP_HEADER *NewHttpHeaderEx(char *method, char *target, char *version, bool no_sort)
  19090. {
  19091. HTTP_HEADER *header;
  19092. // Validate arguments
  19093. if (method == NULL || target == NULL || version == NULL)
  19094. {
  19095. return NULL;
  19096. }
  19097. header = ZeroMalloc(sizeof(HTTP_HEADER));
  19098. header->Method = CopyStr(method);
  19099. header->Target = CopyStr(target);
  19100. header->Version = CopyStr(version);
  19101. header->ValueList = NewListFast(no_sort ? NULL : CompareHttpValue);
  19102. return header;
  19103. }
  19104. // Comparison function of the HTTP value
  19105. int CompareHttpValue(void *p1, void *p2)
  19106. {
  19107. HTTP_VALUE *v1, *v2;
  19108. if (p1 == NULL || p2 == NULL)
  19109. {
  19110. return 0;
  19111. }
  19112. v1 = *(HTTP_VALUE **)p1;
  19113. v2 = *(HTTP_VALUE **)p2;
  19114. if (v1 == NULL || v2 == NULL)
  19115. {
  19116. return 0;
  19117. }
  19118. return StrCmpi(v1->Name, v2->Name);
  19119. }
  19120. // Release the HTTP value
  19121. void FreeHttpValue(HTTP_VALUE *value)
  19122. {
  19123. // Validate arguments
  19124. if (value == NULL)
  19125. {
  19126. return;
  19127. }
  19128. Free(value->Data);
  19129. Free(value->Name);
  19130. Free(value);
  19131. }
  19132. // Release the HTTP header
  19133. void FreeHttpHeader(HTTP_HEADER *header)
  19134. {
  19135. UINT i;
  19136. HTTP_VALUE **values;
  19137. // Validate arguments
  19138. if (header == NULL)
  19139. {
  19140. return;
  19141. }
  19142. Free(header->Method);
  19143. Free(header->Target);
  19144. Free(header->Version);
  19145. values = ToArray(header->ValueList);
  19146. for (i = 0;i < LIST_NUM(header->ValueList);i++)
  19147. {
  19148. FreeHttpValue(values[i]);
  19149. }
  19150. Free(values);
  19151. ReleaseList(header->ValueList);
  19152. Free(header);
  19153. }
  19154. // Receive a PACK
  19155. PACK *RecvPack(SOCK *s)
  19156. {
  19157. PACK *p;
  19158. BUF *b;
  19159. void *data;
  19160. UINT sz;
  19161. // Validate arguments
  19162. if (s == NULL || s->Type != SOCK_TCP)
  19163. {
  19164. return false;
  19165. }
  19166. if (RecvAll(s, &sz, sizeof(UINT), s->SecureMode) == false)
  19167. {
  19168. return false;
  19169. }
  19170. sz = Endian32(sz);
  19171. if (sz > MAX_PACK_SIZE)
  19172. {
  19173. return false;
  19174. }
  19175. data = MallocEx(sz, true);
  19176. if (RecvAll(s, data, sz, s->SecureMode) == false)
  19177. {
  19178. Free(data);
  19179. return false;
  19180. }
  19181. b = NewBuf();
  19182. WriteBuf(b, data, sz);
  19183. SeekBuf(b, 0, 0);
  19184. p = BufToPack(b);
  19185. FreeBuf(b);
  19186. Free(data);
  19187. return p;
  19188. }
  19189. // Receive a PACK (with checking the hash)
  19190. PACK *RecvPackWithHash(SOCK *s)
  19191. {
  19192. PACK *p;
  19193. BUF *b;
  19194. void *data;
  19195. UINT sz;
  19196. UCHAR hash1[SHA1_SIZE];
  19197. UCHAR hash2[SHA1_SIZE];
  19198. // Validate arguments
  19199. if (s == NULL || s->Type != SOCK_TCP)
  19200. {
  19201. return false;
  19202. }
  19203. if (RecvAll(s, &sz, sizeof(UINT), s->SecureMode) == false)
  19204. {
  19205. return false;
  19206. }
  19207. sz = Endian32(sz);
  19208. if (sz > MAX_PACK_SIZE)
  19209. {
  19210. return false;
  19211. }
  19212. data = MallocEx(sz, true);
  19213. if (RecvAll(s, data, sz, s->SecureMode) == false)
  19214. {
  19215. Free(data);
  19216. return false;
  19217. }
  19218. HashSha1(hash1, data, sz);
  19219. if (RecvAll(s, hash2, sizeof(hash2), s->SecureMode) == false)
  19220. {
  19221. Free(data);
  19222. return false;
  19223. }
  19224. if (Cmp(hash1, hash2, SHA1_SIZE) != 0)
  19225. {
  19226. Free(data);
  19227. return false;
  19228. }
  19229. b = NewBuf();
  19230. WriteBuf(b, data, sz);
  19231. SeekBuf(b, 0, 0);
  19232. p = BufToPack(b);
  19233. FreeBuf(b);
  19234. Free(data);
  19235. return p;
  19236. }
  19237. // Send a PACK
  19238. bool SendPack(SOCK *s, PACK *p)
  19239. {
  19240. BUF *b;
  19241. UINT sz;
  19242. // Validate arguments
  19243. if (s == NULL || p == NULL || s->Type != SOCK_TCP)
  19244. {
  19245. return false;
  19246. }
  19247. b = PackToBuf(p);
  19248. sz = Endian32(b->Size);
  19249. SendAdd(s, &sz, sizeof(UINT));
  19250. SendAdd(s, b->Buf, b->Size);
  19251. FreeBuf(b);
  19252. return SendNow(s, s->SecureMode);
  19253. }
  19254. // Send a Pack (with adding a hash)
  19255. bool SendPackWithHash(SOCK *s, PACK *p)
  19256. {
  19257. BUF *b;
  19258. UINT sz;
  19259. UCHAR hash[SHA1_SIZE];
  19260. // Validate arguments
  19261. if (s == NULL || p == NULL || s->Type != SOCK_TCP)
  19262. {
  19263. return false;
  19264. }
  19265. b = PackToBuf(p);
  19266. sz = Endian32(b->Size);
  19267. SendAdd(s, &sz, sizeof(UINT));
  19268. SendAdd(s, b->Buf, b->Size);
  19269. HashSha1(hash, b->Buf, b->Size);
  19270. SendAdd(s, hash, sizeof(hash));
  19271. FreeBuf(b);
  19272. return SendNow(s, s->SecureMode);
  19273. }
  19274. // Get SNI name from the data that has arrived to the TCP connection before accepting an SSL connection
  19275. bool GetSniNameFromPreSslConnection(SOCK *s, char *sni, UINT sni_size)
  19276. {
  19277. UCHAR tmp[1500];
  19278. UINT size;
  19279. // Validate arguments
  19280. if (s == NULL || sni == NULL)
  19281. {
  19282. return false;
  19283. }
  19284. size = Peek(s, tmp, sizeof(tmp));
  19285. if (size == 0)
  19286. {
  19287. return false;
  19288. }
  19289. return GetSniNameFromSslPacket(tmp, size, sni, sni_size);
  19290. }
  19291. // Get SNI name from the SSL packet
  19292. bool GetSniNameFromSslPacket(UCHAR *packet_buf, UINT packet_size, char *sni, UINT sni_size)
  19293. {
  19294. BUF *buf;
  19295. bool ret = false;
  19296. UCHAR content_type;
  19297. USHORT version;
  19298. USHORT handshake_length;
  19299. // Validate arguments
  19300. if (packet_buf == NULL || packet_size <= 11)
  19301. {
  19302. return false;
  19303. }
  19304. if (!(packet_buf[0] == 0x16 && packet_buf[1] >= 0x03 &&
  19305. packet_buf[5] == 0x01 && packet_buf[6] == 0x00 &&
  19306. packet_buf[9] >= 0x03))
  19307. {
  19308. return false;
  19309. }
  19310. buf = NewBufFromMemory(packet_buf, packet_size);
  19311. if (ReadBuf(buf, &content_type, sizeof(UCHAR)) == sizeof(UCHAR) &&
  19312. ReadBuf(buf, &version, sizeof(USHORT)) == sizeof(USHORT) &&
  19313. ReadBuf(buf, &handshake_length, sizeof(USHORT)) == sizeof(USHORT))
  19314. {
  19315. version = Endian16(version);
  19316. handshake_length = Endian16(handshake_length);
  19317. if (content_type == 0x16 && version >= 0x0301)
  19318. {
  19319. UCHAR *handshake_data = Malloc(handshake_length);
  19320. if (ReadBuf(buf, handshake_data, handshake_length) == handshake_length)
  19321. {
  19322. BUF *buf2 = NewBufFromMemory(handshake_data, handshake_length);
  19323. USHORT handshake_type;
  19324. USHORT handshake_length_2;
  19325. if (ReadBuf(buf2, &handshake_type, sizeof(USHORT)) == sizeof(USHORT) &&
  19326. ReadBuf(buf2, &handshake_length_2, sizeof(USHORT)) == sizeof(USHORT))
  19327. {
  19328. handshake_type = Endian16(handshake_type);
  19329. handshake_length_2 = Endian16(handshake_length_2);
  19330. if (handshake_type == 0x0100 && handshake_length_2 <= (handshake_length - 4))
  19331. {
  19332. USHORT version2;
  19333. if (ReadBuf(buf2, &version2, sizeof(USHORT)) == sizeof(USHORT))
  19334. {
  19335. version2 = Endian16(version2);
  19336. if (version2 >= 0x0301)
  19337. {
  19338. UCHAR rand[32];
  19339. if (ReadBuf(buf2, rand, sizeof(rand)) == sizeof(rand))
  19340. {
  19341. UCHAR session_id_len;
  19342. if (ReadBuf(buf2, &session_id_len, sizeof(UCHAR)) == sizeof(UCHAR))
  19343. {
  19344. if (ReadBuf(buf2, NULL, session_id_len) == session_id_len)
  19345. {
  19346. USHORT cipher_len;
  19347. if (ReadBuf(buf2, &cipher_len, sizeof(USHORT)) == sizeof(USHORT))
  19348. {
  19349. cipher_len = Endian16(cipher_len);
  19350. if (ReadBuf(buf2, NULL, cipher_len) == cipher_len)
  19351. {
  19352. UCHAR comps_len;
  19353. if (ReadBuf(buf2, &comps_len, sizeof(UCHAR)) == sizeof(UCHAR))
  19354. {
  19355. if (ReadBuf(buf2, NULL, comps_len) == comps_len)
  19356. {
  19357. USHORT ext_length;
  19358. if (ReadBuf(buf2, &ext_length, sizeof(USHORT)) == sizeof(USHORT))
  19359. {
  19360. UCHAR *ext_buf;
  19361. ext_length = Endian16(ext_length);
  19362. ext_buf = Malloc(ext_length);
  19363. if (ReadBuf(buf2, ext_buf, ext_length) == ext_length)
  19364. {
  19365. BUF *ebuf = NewBufFromMemory(ext_buf, ext_length);
  19366. while (ret == false)
  19367. {
  19368. USHORT type;
  19369. USHORT data_len;
  19370. UCHAR *data;
  19371. if (ReadBuf(ebuf, &type, sizeof(USHORT)) != sizeof(USHORT))
  19372. {
  19373. break;
  19374. }
  19375. if (ReadBuf(ebuf, &data_len, sizeof(USHORT)) != sizeof(USHORT))
  19376. {
  19377. break;
  19378. }
  19379. type = Endian16(type);
  19380. data_len = Endian16(data_len);
  19381. data = Malloc(data_len);
  19382. if (ReadBuf(ebuf, data, data_len) != data_len)
  19383. {
  19384. Free(data);
  19385. break;
  19386. }
  19387. if (type == 0x0000)
  19388. {
  19389. BUF *dbuf = NewBufFromMemory(data, data_len);
  19390. USHORT total_len;
  19391. if (ReadBuf(dbuf, &total_len, sizeof(USHORT)) == sizeof(USHORT))
  19392. {
  19393. UCHAR c;
  19394. total_len = Endian16(total_len);
  19395. if (ReadBuf(dbuf, &c, sizeof(UCHAR)) == sizeof(UCHAR))
  19396. {
  19397. if (c == 0)
  19398. {
  19399. USHORT name_len;
  19400. if (ReadBuf(dbuf, &name_len, sizeof(USHORT)) == sizeof(USHORT))
  19401. {
  19402. char *name_buf;
  19403. name_len = Endian16(name_len);
  19404. name_buf = ZeroMalloc(name_len + 1);
  19405. if (ReadBuf(dbuf, name_buf, name_len) == name_len)
  19406. {
  19407. if (StrLen(name_buf) >= 1)
  19408. {
  19409. ret = true;
  19410. StrCpy(sni, sni_size, name_buf);
  19411. }
  19412. }
  19413. Free(name_buf);
  19414. }
  19415. }
  19416. }
  19417. }
  19418. FreeBuf(dbuf);
  19419. }
  19420. Free(data);
  19421. }
  19422. FreeBuf(ebuf);
  19423. }
  19424. Free(ext_buf);
  19425. }
  19426. }
  19427. }
  19428. }
  19429. }
  19430. }
  19431. }
  19432. }
  19433. }
  19434. }
  19435. }
  19436. }
  19437. FreeBuf(buf2);
  19438. }
  19439. Free(handshake_data);
  19440. }
  19441. }
  19442. FreeBuf(buf);
  19443. if (ret)
  19444. {
  19445. Trim(sni);
  19446. if (IsEmptyStr(sni))
  19447. {
  19448. ret = false;
  19449. }
  19450. }
  19451. return ret;
  19452. }