Command.c 534 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615861686178618861986208621862286238624862586268627862886298630863186328633863486358636863786388639864086418642864386448645864686478648864986508651865286538654865586568657865886598660866186628663866486658666866786688669867086718672867386748675867686778678867986808681868286838684868586868687868886898690869186928693869486958696869786988699870087018702870387048705870687078708870987108711871287138714871587168717871887198720872187228723872487258726872787288729873087318732873387348735873687378738873987408741874287438744874587468747874887498750875187528753875487558756875787588759876087618762876387648765876687678768876987708771877287738774877587768777877887798780878187828783878487858786878787888789879087918792879387948795879687978798879988008801880288038804880588068807880888098810881188128813881488158816881788188819882088218822882388248825882688278828882988308831883288338834883588368837883888398840884188428843884488458846884788488849885088518852885388548855885688578858885988608861886288638864886588668867886888698870887188728873887488758876887788788879888088818882888388848885888688878888888988908891889288938894889588968897889888998900890189028903890489058906890789088909891089118912891389148915891689178918891989208921892289238924892589268927892889298930893189328933893489358936893789388939894089418942894389448945894689478948894989508951895289538954895589568957895889598960896189628963896489658966896789688969897089718972897389748975897689778978897989808981898289838984898589868987898889898990899189928993899489958996899789988999900090019002900390049005900690079008900990109011901290139014901590169017901890199020902190229023902490259026902790289029903090319032903390349035903690379038903990409041904290439044904590469047904890499050905190529053905490559056905790589059906090619062906390649065906690679068906990709071907290739074907590769077907890799080908190829083908490859086908790889089909090919092909390949095909690979098909991009101910291039104910591069107910891099110911191129113911491159116911791189119912091219122912391249125912691279128912991309131913291339134913591369137913891399140914191429143914491459146914791489149915091519152915391549155915691579158915991609161916291639164916591669167916891699170917191729173917491759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239224922592269227922892299230923192329233923492359236923792389239924092419242924392449245924692479248924992509251925292539254925592569257925892599260926192629263926492659266926792689269927092719272927392749275927692779278927992809281928292839284928592869287928892899290929192929293929492959296929792989299930093019302930393049305930693079308930993109311931293139314931593169317931893199320932193229323932493259326932793289329933093319332933393349335933693379338933993409341934293439344934593469347934893499350935193529353935493559356935793589359936093619362936393649365936693679368936993709371937293739374937593769377937893799380938193829383938493859386938793889389939093919392939393949395939693979398939994009401940294039404940594069407940894099410941194129413941494159416941794189419942094219422942394249425942694279428942994309431943294339434943594369437943894399440944194429443944494459446944794489449945094519452945394549455945694579458945994609461946294639464946594669467946894699470947194729473947494759476947794789479948094819482948394849485948694879488948994909491949294939494949594969497949894999500950195029503950495059506950795089509951095119512951395149515951695179518951995209521952295239524952595269527952895299530953195329533953495359536953795389539954095419542954395449545954695479548954995509551955295539554955595569557955895599560956195629563956495659566956795689569957095719572957395749575957695779578957995809581958295839584958595869587958895899590959195929593959495959596959795989599960096019602960396049605960696079608960996109611961296139614961596169617961896199620962196229623962496259626962796289629963096319632963396349635963696379638963996409641964296439644964596469647964896499650965196529653965496559656965796589659966096619662966396649665966696679668966996709671967296739674967596769677967896799680968196829683968496859686968796889689969096919692969396949695969696979698969997009701970297039704970597069707970897099710971197129713971497159716971797189719972097219722972397249725972697279728972997309731973297339734973597369737973897399740974197429743974497459746974797489749975097519752975397549755975697579758975997609761976297639764976597669767976897699770977197729773977497759776977797789779978097819782978397849785978697879788978997909791979297939794979597969797979897999800980198029803980498059806980798089809981098119812981398149815981698179818981998209821982298239824982598269827982898299830983198329833983498359836983798389839984098419842984398449845984698479848984998509851985298539854985598569857985898599860986198629863986498659866986798689869987098719872987398749875987698779878987998809881988298839884988598869887988898899890989198929893989498959896989798989899990099019902990399049905990699079908990999109911991299139914991599169917991899199920992199229923992499259926992799289929993099319932993399349935993699379938993999409941994299439944994599469947994899499950995199529953995499559956995799589959996099619962996399649965996699679968996999709971997299739974997599769977997899799980998199829983998499859986998799889989999099919992999399949995999699979998999910000100011000210003100041000510006100071000810009100101001110012100131001410015100161001710018100191002010021100221002310024100251002610027100281002910030100311003210033100341003510036100371003810039100401004110042100431004410045100461004710048100491005010051100521005310054100551005610057100581005910060100611006210063100641006510066100671006810069100701007110072100731007410075100761007710078100791008010081100821008310084100851008610087100881008910090100911009210093100941009510096100971009810099101001010110102101031010410105101061010710108101091011010111101121011310114101151011610117101181011910120101211012210123101241012510126101271012810129101301013110132101331013410135101361013710138101391014010141101421014310144101451014610147101481014910150101511015210153101541015510156101571015810159101601016110162101631016410165101661016710168101691017010171101721017310174101751017610177101781017910180101811018210183101841018510186101871018810189101901019110192101931019410195101961019710198101991020010201102021020310204102051020610207102081020910210102111021210213102141021510216102171021810219102201022110222102231022410225102261022710228102291023010231102321023310234102351023610237102381023910240102411024210243102441024510246102471024810249102501025110252102531025410255102561025710258102591026010261102621026310264102651026610267102681026910270102711027210273102741027510276102771027810279102801028110282102831028410285102861028710288102891029010291102921029310294102951029610297102981029910300103011030210303103041030510306103071030810309103101031110312103131031410315103161031710318103191032010321103221032310324103251032610327103281032910330103311033210333103341033510336103371033810339103401034110342103431034410345103461034710348103491035010351103521035310354103551035610357103581035910360103611036210363103641036510366103671036810369103701037110372103731037410375103761037710378103791038010381103821038310384103851038610387103881038910390103911039210393103941039510396103971039810399104001040110402104031040410405104061040710408104091041010411104121041310414104151041610417104181041910420104211042210423104241042510426104271042810429104301043110432104331043410435104361043710438104391044010441104421044310444104451044610447104481044910450104511045210453104541045510456104571045810459104601046110462104631046410465104661046710468104691047010471104721047310474104751047610477104781047910480104811048210483104841048510486104871048810489104901049110492104931049410495104961049710498104991050010501105021050310504105051050610507105081050910510105111051210513105141051510516105171051810519105201052110522105231052410525105261052710528105291053010531105321053310534105351053610537105381053910540105411054210543105441054510546105471054810549105501055110552105531055410555105561055710558105591056010561105621056310564105651056610567105681056910570105711057210573105741057510576105771057810579105801058110582105831058410585105861058710588105891059010591105921059310594105951059610597105981059910600106011060210603106041060510606106071060810609106101061110612106131061410615106161061710618106191062010621106221062310624106251062610627106281062910630106311063210633106341063510636106371063810639106401064110642106431064410645106461064710648106491065010651106521065310654106551065610657106581065910660106611066210663106641066510666106671066810669106701067110672106731067410675106761067710678106791068010681106821068310684106851068610687106881068910690106911069210693106941069510696106971069810699107001070110702107031070410705107061070710708107091071010711107121071310714107151071610717107181071910720107211072210723107241072510726107271072810729107301073110732107331073410735107361073710738107391074010741107421074310744107451074610747107481074910750107511075210753107541075510756107571075810759107601076110762107631076410765107661076710768107691077010771107721077310774107751077610777107781077910780107811078210783107841078510786107871078810789107901079110792107931079410795107961079710798107991080010801108021080310804108051080610807108081080910810108111081210813108141081510816108171081810819108201082110822108231082410825108261082710828108291083010831108321083310834108351083610837108381083910840108411084210843108441084510846108471084810849108501085110852108531085410855108561085710858108591086010861108621086310864108651086610867108681086910870108711087210873108741087510876108771087810879108801088110882108831088410885108861088710888108891089010891108921089310894108951089610897108981089910900109011090210903109041090510906109071090810909109101091110912109131091410915109161091710918109191092010921109221092310924109251092610927109281092910930109311093210933109341093510936109371093810939109401094110942109431094410945109461094710948109491095010951109521095310954109551095610957109581095910960109611096210963109641096510966109671096810969109701097110972109731097410975109761097710978109791098010981109821098310984109851098610987109881098910990109911099210993109941099510996109971099810999110001100111002110031100411005110061100711008110091101011011110121101311014110151101611017110181101911020110211102211023110241102511026110271102811029110301103111032110331103411035110361103711038110391104011041110421104311044110451104611047110481104911050110511105211053110541105511056110571105811059110601106111062110631106411065110661106711068110691107011071110721107311074110751107611077110781107911080110811108211083110841108511086110871108811089110901109111092110931109411095110961109711098110991110011101111021110311104111051110611107111081110911110111111111211113111141111511116111171111811119111201112111122111231112411125111261112711128111291113011131111321113311134111351113611137111381113911140111411114211143111441114511146111471114811149111501115111152111531115411155111561115711158111591116011161111621116311164111651116611167111681116911170111711117211173111741117511176111771117811179111801118111182111831118411185111861118711188111891119011191111921119311194111951119611197111981119911200112011120211203112041120511206112071120811209112101121111212112131121411215112161121711218112191122011221112221122311224112251122611227112281122911230112311123211233112341123511236112371123811239112401124111242112431124411245112461124711248112491125011251112521125311254112551125611257112581125911260112611126211263112641126511266112671126811269112701127111272112731127411275112761127711278112791128011281112821128311284112851128611287112881128911290112911129211293112941129511296112971129811299113001130111302113031130411305113061130711308113091131011311113121131311314113151131611317113181131911320113211132211323113241132511326113271132811329113301133111332113331133411335113361133711338113391134011341113421134311344113451134611347113481134911350113511135211353113541135511356113571135811359113601136111362113631136411365113661136711368113691137011371113721137311374113751137611377113781137911380113811138211383113841138511386113871138811389113901139111392113931139411395113961139711398113991140011401114021140311404114051140611407114081140911410114111141211413114141141511416114171141811419114201142111422114231142411425114261142711428114291143011431114321143311434114351143611437114381143911440114411144211443114441144511446114471144811449114501145111452114531145411455114561145711458114591146011461114621146311464114651146611467114681146911470114711147211473114741147511476114771147811479114801148111482114831148411485114861148711488114891149011491114921149311494114951149611497114981149911500115011150211503115041150511506115071150811509115101151111512115131151411515115161151711518115191152011521115221152311524115251152611527115281152911530115311153211533115341153511536115371153811539115401154111542115431154411545115461154711548115491155011551115521155311554115551155611557115581155911560115611156211563115641156511566115671156811569115701157111572115731157411575115761157711578115791158011581115821158311584115851158611587115881158911590115911159211593115941159511596115971159811599116001160111602116031160411605116061160711608116091161011611116121161311614116151161611617116181161911620116211162211623116241162511626116271162811629116301163111632116331163411635116361163711638116391164011641116421164311644116451164611647116481164911650116511165211653116541165511656116571165811659116601166111662116631166411665116661166711668116691167011671116721167311674116751167611677116781167911680116811168211683116841168511686116871168811689116901169111692116931169411695116961169711698116991170011701117021170311704117051170611707117081170911710117111171211713117141171511716117171171811719117201172111722117231172411725117261172711728117291173011731117321173311734117351173611737117381173911740117411174211743117441174511746117471174811749117501175111752117531175411755117561175711758117591176011761117621176311764117651176611767117681176911770117711177211773117741177511776117771177811779117801178111782117831178411785117861178711788117891179011791117921179311794117951179611797117981179911800118011180211803118041180511806118071180811809118101181111812118131181411815118161181711818118191182011821118221182311824118251182611827118281182911830118311183211833118341183511836118371183811839118401184111842118431184411845118461184711848118491185011851118521185311854118551185611857118581185911860118611186211863118641186511866118671186811869118701187111872118731187411875118761187711878118791188011881118821188311884118851188611887118881188911890118911189211893118941189511896118971189811899119001190111902119031190411905119061190711908119091191011911119121191311914119151191611917119181191911920119211192211923119241192511926119271192811929119301193111932119331193411935119361193711938119391194011941119421194311944119451194611947119481194911950119511195211953119541195511956119571195811959119601196111962119631196411965119661196711968119691197011971119721197311974119751197611977119781197911980119811198211983119841198511986119871198811989119901199111992119931199411995119961199711998119991200012001120021200312004120051200612007120081200912010120111201212013120141201512016120171201812019120201202112022120231202412025120261202712028120291203012031120321203312034120351203612037120381203912040120411204212043120441204512046120471204812049120501205112052120531205412055120561205712058120591206012061120621206312064120651206612067120681206912070120711207212073120741207512076120771207812079120801208112082120831208412085120861208712088120891209012091120921209312094120951209612097120981209912100121011210212103121041210512106121071210812109121101211112112121131211412115121161211712118121191212012121121221212312124121251212612127121281212912130121311213212133121341213512136121371213812139121401214112142121431214412145121461214712148121491215012151121521215312154121551215612157121581215912160121611216212163121641216512166121671216812169121701217112172121731217412175121761217712178121791218012181121821218312184121851218612187121881218912190121911219212193121941219512196121971219812199122001220112202122031220412205122061220712208122091221012211122121221312214122151221612217122181221912220122211222212223122241222512226122271222812229122301223112232122331223412235122361223712238122391224012241122421224312244122451224612247122481224912250122511225212253122541225512256122571225812259122601226112262122631226412265122661226712268122691227012271122721227312274122751227612277122781227912280122811228212283122841228512286122871228812289122901229112292122931229412295122961229712298122991230012301123021230312304123051230612307123081230912310123111231212313123141231512316123171231812319123201232112322123231232412325123261232712328123291233012331123321233312334123351233612337123381233912340123411234212343123441234512346123471234812349123501235112352123531235412355123561235712358123591236012361123621236312364123651236612367123681236912370123711237212373123741237512376123771237812379123801238112382123831238412385123861238712388123891239012391123921239312394123951239612397123981239912400124011240212403124041240512406124071240812409124101241112412124131241412415124161241712418124191242012421124221242312424124251242612427124281242912430124311243212433124341243512436124371243812439124401244112442124431244412445124461244712448124491245012451124521245312454124551245612457124581245912460124611246212463124641246512466124671246812469124701247112472124731247412475124761247712478124791248012481124821248312484124851248612487124881248912490124911249212493124941249512496124971249812499125001250112502125031250412505125061250712508125091251012511125121251312514125151251612517125181251912520125211252212523125241252512526125271252812529125301253112532125331253412535125361253712538125391254012541125421254312544125451254612547125481254912550125511255212553125541255512556125571255812559125601256112562125631256412565125661256712568125691257012571125721257312574125751257612577125781257912580125811258212583125841258512586125871258812589125901259112592125931259412595125961259712598125991260012601126021260312604126051260612607126081260912610126111261212613126141261512616126171261812619126201262112622126231262412625126261262712628126291263012631126321263312634126351263612637126381263912640126411264212643126441264512646126471264812649126501265112652126531265412655126561265712658126591266012661126621266312664126651266612667126681266912670126711267212673126741267512676126771267812679126801268112682126831268412685126861268712688126891269012691126921269312694126951269612697126981269912700127011270212703127041270512706127071270812709127101271112712127131271412715127161271712718127191272012721127221272312724127251272612727127281272912730127311273212733127341273512736127371273812739127401274112742127431274412745127461274712748127491275012751127521275312754127551275612757127581275912760127611276212763127641276512766127671276812769127701277112772127731277412775127761277712778127791278012781127821278312784127851278612787127881278912790127911279212793127941279512796127971279812799128001280112802128031280412805128061280712808128091281012811128121281312814128151281612817128181281912820128211282212823128241282512826128271282812829128301283112832128331283412835128361283712838128391284012841128421284312844128451284612847128481284912850128511285212853128541285512856128571285812859128601286112862128631286412865128661286712868128691287012871128721287312874128751287612877128781287912880128811288212883128841288512886128871288812889128901289112892128931289412895128961289712898128991290012901129021290312904129051290612907129081290912910129111291212913129141291512916129171291812919129201292112922129231292412925129261292712928129291293012931129321293312934129351293612937129381293912940129411294212943129441294512946129471294812949129501295112952129531295412955129561295712958129591296012961129621296312964129651296612967129681296912970129711297212973129741297512976129771297812979129801298112982129831298412985129861298712988129891299012991129921299312994129951299612997129981299913000130011300213003130041300513006130071300813009130101301113012130131301413015130161301713018130191302013021130221302313024130251302613027130281302913030130311303213033130341303513036130371303813039130401304113042130431304413045130461304713048130491305013051130521305313054130551305613057130581305913060130611306213063130641306513066130671306813069130701307113072130731307413075130761307713078130791308013081130821308313084130851308613087130881308913090130911309213093130941309513096130971309813099131001310113102131031310413105131061310713108131091311013111131121311313114131151311613117131181311913120131211312213123131241312513126131271312813129131301313113132131331313413135131361313713138131391314013141131421314313144131451314613147131481314913150131511315213153131541315513156131571315813159131601316113162131631316413165131661316713168131691317013171131721317313174131751317613177131781317913180131811318213183131841318513186131871318813189131901319113192131931319413195131961319713198131991320013201132021320313204132051320613207132081320913210132111321213213132141321513216132171321813219132201322113222132231322413225132261322713228132291323013231132321323313234132351323613237132381323913240132411324213243132441324513246132471324813249132501325113252132531325413255132561325713258132591326013261132621326313264132651326613267132681326913270132711327213273132741327513276132771327813279132801328113282132831328413285132861328713288132891329013291132921329313294132951329613297132981329913300133011330213303133041330513306133071330813309133101331113312133131331413315133161331713318133191332013321133221332313324133251332613327133281332913330133311333213333133341333513336133371333813339133401334113342133431334413345133461334713348133491335013351133521335313354133551335613357133581335913360133611336213363133641336513366133671336813369133701337113372133731337413375133761337713378133791338013381133821338313384133851338613387133881338913390133911339213393133941339513396133971339813399134001340113402134031340413405134061340713408134091341013411134121341313414134151341613417134181341913420134211342213423134241342513426134271342813429134301343113432134331343413435134361343713438134391344013441134421344313444134451344613447134481344913450134511345213453134541345513456134571345813459134601346113462134631346413465134661346713468134691347013471134721347313474134751347613477134781347913480134811348213483134841348513486134871348813489134901349113492134931349413495134961349713498134991350013501135021350313504135051350613507135081350913510135111351213513135141351513516135171351813519135201352113522135231352413525135261352713528135291353013531135321353313534135351353613537135381353913540135411354213543135441354513546135471354813549135501355113552135531355413555135561355713558135591356013561135621356313564135651356613567135681356913570135711357213573135741357513576135771357813579135801358113582135831358413585135861358713588135891359013591135921359313594135951359613597135981359913600136011360213603136041360513606136071360813609136101361113612136131361413615136161361713618136191362013621136221362313624136251362613627136281362913630136311363213633136341363513636136371363813639136401364113642136431364413645136461364713648136491365013651136521365313654136551365613657136581365913660136611366213663136641366513666136671366813669136701367113672136731367413675136761367713678136791368013681136821368313684136851368613687136881368913690136911369213693136941369513696136971369813699137001370113702137031370413705137061370713708137091371013711137121371313714137151371613717137181371913720137211372213723137241372513726137271372813729137301373113732137331373413735137361373713738137391374013741137421374313744137451374613747137481374913750137511375213753137541375513756137571375813759137601376113762137631376413765137661376713768137691377013771137721377313774137751377613777137781377913780137811378213783137841378513786137871378813789137901379113792137931379413795137961379713798137991380013801138021380313804138051380613807138081380913810138111381213813138141381513816138171381813819138201382113822138231382413825138261382713828138291383013831138321383313834138351383613837138381383913840138411384213843138441384513846138471384813849138501385113852138531385413855138561385713858138591386013861138621386313864138651386613867138681386913870138711387213873138741387513876138771387813879138801388113882138831388413885138861388713888138891389013891138921389313894138951389613897138981389913900139011390213903139041390513906139071390813909139101391113912139131391413915139161391713918139191392013921139221392313924139251392613927139281392913930139311393213933139341393513936139371393813939139401394113942139431394413945139461394713948139491395013951139521395313954139551395613957139581395913960139611396213963139641396513966139671396813969139701397113972139731397413975139761397713978139791398013981139821398313984139851398613987139881398913990139911399213993139941399513996139971399813999140001400114002140031400414005140061400714008140091401014011140121401314014140151401614017140181401914020140211402214023140241402514026140271402814029140301403114032140331403414035140361403714038140391404014041140421404314044140451404614047140481404914050140511405214053140541405514056140571405814059140601406114062140631406414065140661406714068140691407014071140721407314074140751407614077140781407914080140811408214083140841408514086140871408814089140901409114092140931409414095140961409714098140991410014101141021410314104141051410614107141081410914110141111411214113141141411514116141171411814119141201412114122141231412414125141261412714128141291413014131141321413314134141351413614137141381413914140141411414214143141441414514146141471414814149141501415114152141531415414155141561415714158141591416014161141621416314164141651416614167141681416914170141711417214173141741417514176141771417814179141801418114182141831418414185141861418714188141891419014191141921419314194141951419614197141981419914200142011420214203142041420514206142071420814209142101421114212142131421414215142161421714218142191422014221142221422314224142251422614227142281422914230142311423214233142341423514236142371423814239142401424114242142431424414245142461424714248142491425014251142521425314254142551425614257142581425914260142611426214263142641426514266142671426814269142701427114272142731427414275142761427714278142791428014281142821428314284142851428614287142881428914290142911429214293142941429514296142971429814299143001430114302143031430414305143061430714308143091431014311143121431314314143151431614317143181431914320143211432214323143241432514326143271432814329143301433114332143331433414335143361433714338143391434014341143421434314344143451434614347143481434914350143511435214353143541435514356143571435814359143601436114362143631436414365143661436714368143691437014371143721437314374143751437614377143781437914380143811438214383143841438514386143871438814389143901439114392143931439414395143961439714398143991440014401144021440314404144051440614407144081440914410144111441214413144141441514416144171441814419144201442114422144231442414425144261442714428144291443014431144321443314434144351443614437144381443914440144411444214443144441444514446144471444814449144501445114452144531445414455144561445714458144591446014461144621446314464144651446614467144681446914470144711447214473144741447514476144771447814479144801448114482144831448414485144861448714488144891449014491144921449314494144951449614497144981449914500145011450214503145041450514506145071450814509145101451114512145131451414515145161451714518145191452014521145221452314524145251452614527145281452914530145311453214533145341453514536145371453814539145401454114542145431454414545145461454714548145491455014551145521455314554145551455614557145581455914560145611456214563145641456514566145671456814569145701457114572145731457414575145761457714578145791458014581145821458314584145851458614587145881458914590145911459214593145941459514596145971459814599146001460114602146031460414605146061460714608146091461014611146121461314614146151461614617146181461914620146211462214623146241462514626146271462814629146301463114632146331463414635146361463714638146391464014641146421464314644146451464614647146481464914650146511465214653146541465514656146571465814659146601466114662146631466414665146661466714668146691467014671146721467314674146751467614677146781467914680146811468214683146841468514686146871468814689146901469114692146931469414695146961469714698146991470014701147021470314704147051470614707147081470914710147111471214713147141471514716147171471814719147201472114722147231472414725147261472714728147291473014731147321473314734147351473614737147381473914740147411474214743147441474514746147471474814749147501475114752147531475414755147561475714758147591476014761147621476314764147651476614767147681476914770147711477214773147741477514776147771477814779147801478114782147831478414785147861478714788147891479014791147921479314794147951479614797147981479914800148011480214803148041480514806148071480814809148101481114812148131481414815148161481714818148191482014821148221482314824148251482614827148281482914830148311483214833148341483514836148371483814839148401484114842148431484414845148461484714848148491485014851148521485314854148551485614857148581485914860148611486214863148641486514866148671486814869148701487114872148731487414875148761487714878148791488014881148821488314884148851488614887148881488914890148911489214893148941489514896148971489814899149001490114902149031490414905149061490714908149091491014911149121491314914149151491614917149181491914920149211492214923149241492514926149271492814929149301493114932149331493414935149361493714938149391494014941149421494314944149451494614947149481494914950149511495214953149541495514956149571495814959149601496114962149631496414965149661496714968149691497014971149721497314974149751497614977149781497914980149811498214983149841498514986149871498814989149901499114992149931499414995149961499714998149991500015001150021500315004150051500615007150081500915010150111501215013150141501515016150171501815019150201502115022150231502415025150261502715028150291503015031150321503315034150351503615037150381503915040150411504215043150441504515046150471504815049150501505115052150531505415055150561505715058150591506015061150621506315064150651506615067150681506915070150711507215073150741507515076150771507815079150801508115082150831508415085150861508715088150891509015091150921509315094150951509615097150981509915100151011510215103151041510515106151071510815109151101511115112151131511415115151161511715118151191512015121151221512315124151251512615127151281512915130151311513215133151341513515136151371513815139151401514115142151431514415145151461514715148151491515015151151521515315154151551515615157151581515915160151611516215163151641516515166151671516815169151701517115172151731517415175151761517715178151791518015181151821518315184151851518615187151881518915190151911519215193151941519515196151971519815199152001520115202152031520415205152061520715208152091521015211152121521315214152151521615217152181521915220152211522215223152241522515226152271522815229152301523115232152331523415235152361523715238152391524015241152421524315244152451524615247152481524915250152511525215253152541525515256152571525815259152601526115262152631526415265152661526715268152691527015271152721527315274152751527615277152781527915280152811528215283152841528515286152871528815289152901529115292152931529415295152961529715298152991530015301153021530315304153051530615307153081530915310153111531215313153141531515316153171531815319153201532115322153231532415325153261532715328153291533015331153321533315334153351533615337153381533915340153411534215343153441534515346153471534815349153501535115352153531535415355153561535715358153591536015361153621536315364153651536615367153681536915370153711537215373153741537515376153771537815379153801538115382153831538415385153861538715388153891539015391153921539315394153951539615397153981539915400154011540215403154041540515406154071540815409154101541115412154131541415415154161541715418154191542015421154221542315424154251542615427154281542915430154311543215433154341543515436154371543815439154401544115442154431544415445154461544715448154491545015451154521545315454154551545615457154581545915460154611546215463154641546515466154671546815469154701547115472154731547415475154761547715478154791548015481154821548315484154851548615487154881548915490154911549215493154941549515496154971549815499155001550115502155031550415505155061550715508155091551015511155121551315514155151551615517155181551915520155211552215523155241552515526155271552815529155301553115532155331553415535155361553715538155391554015541155421554315544155451554615547155481554915550155511555215553155541555515556155571555815559155601556115562155631556415565155661556715568155691557015571155721557315574155751557615577155781557915580155811558215583155841558515586155871558815589155901559115592155931559415595155961559715598155991560015601156021560315604156051560615607156081560915610156111561215613156141561515616156171561815619156201562115622156231562415625156261562715628156291563015631156321563315634156351563615637156381563915640156411564215643156441564515646156471564815649156501565115652156531565415655156561565715658156591566015661156621566315664156651566615667156681566915670156711567215673156741567515676156771567815679156801568115682156831568415685156861568715688156891569015691156921569315694156951569615697156981569915700157011570215703157041570515706157071570815709157101571115712157131571415715157161571715718157191572015721157221572315724157251572615727157281572915730157311573215733157341573515736157371573815739157401574115742157431574415745157461574715748157491575015751157521575315754157551575615757157581575915760157611576215763157641576515766157671576815769157701577115772157731577415775157761577715778157791578015781157821578315784157851578615787157881578915790157911579215793157941579515796157971579815799158001580115802158031580415805158061580715808158091581015811158121581315814158151581615817158181581915820158211582215823158241582515826158271582815829158301583115832158331583415835158361583715838158391584015841158421584315844158451584615847158481584915850158511585215853158541585515856158571585815859158601586115862158631586415865158661586715868158691587015871158721587315874158751587615877158781587915880158811588215883158841588515886158871588815889158901589115892158931589415895158961589715898158991590015901159021590315904159051590615907159081590915910159111591215913159141591515916159171591815919159201592115922159231592415925159261592715928159291593015931159321593315934159351593615937159381593915940159411594215943159441594515946159471594815949159501595115952159531595415955159561595715958159591596015961159621596315964159651596615967159681596915970159711597215973159741597515976159771597815979159801598115982159831598415985159861598715988159891599015991159921599315994159951599615997159981599916000160011600216003160041600516006160071600816009160101601116012160131601416015160161601716018160191602016021160221602316024160251602616027160281602916030160311603216033160341603516036160371603816039160401604116042160431604416045160461604716048160491605016051160521605316054160551605616057160581605916060160611606216063160641606516066160671606816069160701607116072160731607416075160761607716078160791608016081160821608316084160851608616087160881608916090160911609216093160941609516096160971609816099161001610116102161031610416105161061610716108161091611016111161121611316114161151611616117161181611916120161211612216123161241612516126161271612816129161301613116132161331613416135161361613716138161391614016141161421614316144161451614616147161481614916150161511615216153161541615516156161571615816159161601616116162161631616416165161661616716168161691617016171161721617316174161751617616177161781617916180161811618216183161841618516186161871618816189161901619116192161931619416195161961619716198161991620016201162021620316204162051620616207162081620916210162111621216213162141621516216162171621816219162201622116222162231622416225162261622716228162291623016231162321623316234162351623616237162381623916240162411624216243162441624516246162471624816249162501625116252162531625416255162561625716258162591626016261162621626316264162651626616267162681626916270162711627216273162741627516276162771627816279162801628116282162831628416285162861628716288162891629016291162921629316294162951629616297162981629916300163011630216303163041630516306163071630816309163101631116312163131631416315163161631716318163191632016321163221632316324163251632616327163281632916330163311633216333163341633516336163371633816339163401634116342163431634416345163461634716348163491635016351163521635316354163551635616357163581635916360163611636216363163641636516366163671636816369163701637116372163731637416375163761637716378163791638016381163821638316384163851638616387163881638916390163911639216393163941639516396163971639816399164001640116402164031640416405164061640716408164091641016411164121641316414164151641616417164181641916420164211642216423164241642516426164271642816429164301643116432164331643416435164361643716438164391644016441164421644316444164451644616447164481644916450164511645216453164541645516456164571645816459164601646116462164631646416465164661646716468164691647016471164721647316474164751647616477164781647916480164811648216483164841648516486164871648816489164901649116492164931649416495164961649716498164991650016501165021650316504165051650616507165081650916510165111651216513165141651516516165171651816519165201652116522165231652416525165261652716528165291653016531165321653316534165351653616537165381653916540165411654216543165441654516546165471654816549165501655116552165531655416555165561655716558165591656016561165621656316564165651656616567165681656916570165711657216573165741657516576165771657816579165801658116582165831658416585165861658716588165891659016591165921659316594165951659616597165981659916600166011660216603166041660516606166071660816609166101661116612166131661416615166161661716618166191662016621166221662316624166251662616627166281662916630166311663216633166341663516636166371663816639166401664116642166431664416645166461664716648166491665016651166521665316654166551665616657166581665916660166611666216663166641666516666166671666816669166701667116672166731667416675166761667716678166791668016681166821668316684166851668616687166881668916690166911669216693166941669516696166971669816699167001670116702167031670416705167061670716708167091671016711167121671316714167151671616717167181671916720167211672216723167241672516726167271672816729167301673116732167331673416735167361673716738167391674016741167421674316744167451674616747167481674916750167511675216753167541675516756167571675816759167601676116762167631676416765167661676716768167691677016771167721677316774167751677616777167781677916780167811678216783167841678516786167871678816789167901679116792167931679416795167961679716798167991680016801168021680316804168051680616807168081680916810168111681216813168141681516816168171681816819168201682116822168231682416825168261682716828168291683016831168321683316834168351683616837168381683916840168411684216843168441684516846168471684816849168501685116852168531685416855168561685716858168591686016861168621686316864168651686616867168681686916870168711687216873168741687516876168771687816879168801688116882168831688416885168861688716888168891689016891168921689316894168951689616897168981689916900169011690216903169041690516906169071690816909169101691116912169131691416915169161691716918169191692016921169221692316924169251692616927169281692916930169311693216933169341693516936169371693816939169401694116942169431694416945169461694716948169491695016951169521695316954169551695616957169581695916960169611696216963169641696516966169671696816969169701697116972169731697416975169761697716978169791698016981169821698316984169851698616987169881698916990169911699216993169941699516996169971699816999170001700117002170031700417005170061700717008170091701017011170121701317014170151701617017170181701917020170211702217023170241702517026170271702817029170301703117032170331703417035170361703717038170391704017041170421704317044170451704617047170481704917050170511705217053170541705517056170571705817059170601706117062170631706417065170661706717068170691707017071170721707317074170751707617077170781707917080170811708217083170841708517086170871708817089170901709117092170931709417095170961709717098170991710017101171021710317104171051710617107171081710917110171111711217113171141711517116171171711817119171201712117122171231712417125171261712717128171291713017131171321713317134171351713617137171381713917140171411714217143171441714517146171471714817149171501715117152171531715417155171561715717158171591716017161171621716317164171651716617167171681716917170171711717217173171741717517176171771717817179171801718117182171831718417185171861718717188171891719017191171921719317194171951719617197171981719917200172011720217203172041720517206172071720817209172101721117212172131721417215172161721717218172191722017221172221722317224172251722617227172281722917230172311723217233172341723517236172371723817239172401724117242172431724417245172461724717248172491725017251172521725317254172551725617257172581725917260172611726217263172641726517266172671726817269172701727117272172731727417275172761727717278172791728017281172821728317284172851728617287172881728917290172911729217293172941729517296172971729817299173001730117302173031730417305173061730717308173091731017311173121731317314173151731617317173181731917320173211732217323173241732517326173271732817329173301733117332173331733417335173361733717338173391734017341173421734317344173451734617347173481734917350173511735217353173541735517356173571735817359173601736117362173631736417365173661736717368173691737017371173721737317374173751737617377173781737917380173811738217383173841738517386173871738817389173901739117392173931739417395173961739717398173991740017401174021740317404174051740617407174081740917410174111741217413174141741517416174171741817419174201742117422174231742417425174261742717428174291743017431174321743317434174351743617437174381743917440174411744217443174441744517446174471744817449174501745117452174531745417455174561745717458174591746017461174621746317464174651746617467174681746917470174711747217473174741747517476174771747817479174801748117482174831748417485174861748717488174891749017491174921749317494174951749617497174981749917500175011750217503175041750517506175071750817509175101751117512175131751417515175161751717518175191752017521175221752317524175251752617527175281752917530175311753217533175341753517536175371753817539175401754117542175431754417545175461754717548175491755017551175521755317554175551755617557175581755917560175611756217563175641756517566175671756817569175701757117572175731757417575175761757717578175791758017581175821758317584175851758617587175881758917590175911759217593175941759517596175971759817599176001760117602176031760417605176061760717608176091761017611176121761317614176151761617617176181761917620176211762217623176241762517626176271762817629176301763117632176331763417635176361763717638176391764017641176421764317644176451764617647176481764917650176511765217653176541765517656176571765817659176601766117662176631766417665176661766717668176691767017671176721767317674176751767617677176781767917680176811768217683176841768517686176871768817689176901769117692176931769417695176961769717698176991770017701177021770317704177051770617707177081770917710177111771217713177141771517716177171771817719177201772117722177231772417725177261772717728177291773017731177321773317734177351773617737177381773917740177411774217743177441774517746177471774817749177501775117752177531775417755177561775717758177591776017761177621776317764177651776617767177681776917770177711777217773177741777517776177771777817779177801778117782177831778417785177861778717788177891779017791177921779317794177951779617797177981779917800178011780217803178041780517806178071780817809178101781117812178131781417815178161781717818178191782017821178221782317824178251782617827178281782917830178311783217833178341783517836178371783817839178401784117842178431784417845178461784717848178491785017851178521785317854178551785617857178581785917860178611786217863178641786517866178671786817869178701787117872178731787417875178761787717878178791788017881178821788317884178851788617887178881788917890178911789217893178941789517896178971789817899179001790117902179031790417905179061790717908179091791017911179121791317914179151791617917179181791917920179211792217923179241792517926179271792817929179301793117932179331793417935179361793717938179391794017941179421794317944179451794617947179481794917950179511795217953179541795517956179571795817959179601796117962179631796417965179661796717968179691797017971179721797317974179751797617977179781797917980179811798217983179841798517986179871798817989179901799117992179931799417995179961799717998179991800018001180021800318004180051800618007180081800918010180111801218013180141801518016180171801818019180201802118022180231802418025180261802718028180291803018031180321803318034180351803618037180381803918040180411804218043180441804518046180471804818049180501805118052180531805418055180561805718058180591806018061180621806318064180651806618067180681806918070180711807218073180741807518076180771807818079180801808118082180831808418085180861808718088180891809018091180921809318094180951809618097180981809918100181011810218103181041810518106181071810818109181101811118112181131811418115181161811718118181191812018121181221812318124181251812618127181281812918130181311813218133181341813518136181371813818139181401814118142181431814418145181461814718148181491815018151181521815318154181551815618157181581815918160181611816218163181641816518166181671816818169181701817118172181731817418175181761817718178181791818018181181821818318184181851818618187181881818918190181911819218193181941819518196181971819818199182001820118202182031820418205182061820718208182091821018211182121821318214182151821618217182181821918220182211822218223182241822518226182271822818229182301823118232182331823418235182361823718238182391824018241182421824318244182451824618247182481824918250182511825218253182541825518256182571825818259182601826118262182631826418265182661826718268182691827018271182721827318274182751827618277182781827918280182811828218283182841828518286182871828818289182901829118292182931829418295182961829718298182991830018301183021830318304183051830618307183081830918310183111831218313183141831518316183171831818319183201832118322183231832418325183261832718328183291833018331183321833318334183351833618337183381833918340183411834218343183441834518346183471834818349183501835118352183531835418355183561835718358183591836018361183621836318364183651836618367183681836918370183711837218373183741837518376183771837818379183801838118382183831838418385183861838718388183891839018391183921839318394183951839618397183981839918400184011840218403184041840518406184071840818409184101841118412184131841418415184161841718418184191842018421184221842318424184251842618427184281842918430184311843218433184341843518436184371843818439184401844118442184431844418445184461844718448184491845018451184521845318454184551845618457184581845918460184611846218463184641846518466184671846818469184701847118472184731847418475184761847718478184791848018481184821848318484184851848618487184881848918490184911849218493184941849518496184971849818499185001850118502185031850418505185061850718508185091851018511185121851318514185151851618517185181851918520185211852218523185241852518526185271852818529185301853118532185331853418535185361853718538185391854018541185421854318544185451854618547185481854918550185511855218553185541855518556185571855818559185601856118562185631856418565185661856718568185691857018571185721857318574185751857618577185781857918580185811858218583185841858518586185871858818589185901859118592185931859418595185961859718598185991860018601186021860318604186051860618607186081860918610186111861218613186141861518616186171861818619186201862118622186231862418625186261862718628186291863018631186321863318634186351863618637186381863918640186411864218643186441864518646186471864818649186501865118652186531865418655186561865718658186591866018661186621866318664186651866618667186681866918670186711867218673186741867518676186771867818679186801868118682186831868418685186861868718688186891869018691186921869318694186951869618697186981869918700187011870218703187041870518706187071870818709187101871118712187131871418715187161871718718187191872018721187221872318724187251872618727187281872918730187311873218733187341873518736187371873818739187401874118742187431874418745187461874718748187491875018751187521875318754187551875618757187581875918760187611876218763187641876518766187671876818769187701877118772187731877418775187761877718778187791878018781187821878318784187851878618787187881878918790187911879218793187941879518796187971879818799188001880118802188031880418805188061880718808188091881018811188121881318814188151881618817188181881918820188211882218823188241882518826188271882818829188301883118832188331883418835188361883718838188391884018841188421884318844188451884618847188481884918850188511885218853188541885518856188571885818859188601886118862188631886418865188661886718868188691887018871188721887318874188751887618877188781887918880188811888218883188841888518886188871888818889188901889118892188931889418895188961889718898188991890018901189021890318904189051890618907189081890918910189111891218913189141891518916189171891818919189201892118922189231892418925189261892718928189291893018931189321893318934189351893618937189381893918940189411894218943189441894518946189471894818949189501895118952189531895418955189561895718958189591896018961189621896318964189651896618967189681896918970189711897218973189741897518976189771897818979189801898118982189831898418985189861898718988189891899018991189921899318994189951899618997189981899919000190011900219003190041900519006190071900819009190101901119012190131901419015190161901719018190191902019021190221902319024190251902619027190281902919030190311903219033190341903519036190371903819039190401904119042190431904419045190461904719048190491905019051190521905319054190551905619057190581905919060190611906219063190641906519066190671906819069190701907119072190731907419075190761907719078190791908019081190821908319084190851908619087190881908919090190911909219093190941909519096190971909819099191001910119102191031910419105191061910719108191091911019111191121911319114191151911619117191181911919120191211912219123191241912519126191271912819129191301913119132191331913419135191361913719138191391914019141191421914319144191451914619147191481914919150191511915219153191541915519156191571915819159191601916119162191631916419165191661916719168191691917019171191721917319174191751917619177191781917919180191811918219183191841918519186191871918819189191901919119192191931919419195191961919719198191991920019201192021920319204192051920619207192081920919210192111921219213192141921519216192171921819219192201922119222192231922419225192261922719228192291923019231192321923319234192351923619237192381923919240192411924219243192441924519246192471924819249192501925119252192531925419255192561925719258192591926019261192621926319264192651926619267192681926919270192711927219273192741927519276192771927819279192801928119282192831928419285192861928719288192891929019291192921929319294192951929619297192981929919300193011930219303193041930519306193071930819309193101931119312193131931419315193161931719318193191932019321193221932319324193251932619327193281932919330193311933219333193341933519336193371933819339193401934119342193431934419345193461934719348193491935019351193521935319354193551935619357193581935919360193611936219363193641936519366193671936819369193701937119372193731937419375193761937719378193791938019381193821938319384193851938619387193881938919390193911939219393193941939519396193971939819399194001940119402194031940419405194061940719408194091941019411194121941319414194151941619417194181941919420194211942219423194241942519426194271942819429194301943119432194331943419435194361943719438194391944019441194421944319444194451944619447194481944919450194511945219453194541945519456194571945819459194601946119462194631946419465194661946719468194691947019471194721947319474194751947619477194781947919480194811948219483194841948519486194871948819489194901949119492194931949419495194961949719498194991950019501195021950319504195051950619507195081950919510195111951219513195141951519516195171951819519195201952119522195231952419525195261952719528195291953019531195321953319534195351953619537195381953919540195411954219543195441954519546195471954819549195501955119552195531955419555195561955719558195591956019561195621956319564195651956619567195681956919570195711957219573195741957519576195771957819579195801958119582195831958419585195861958719588195891959019591195921959319594195951959619597195981959919600196011960219603196041960519606196071960819609196101961119612196131961419615196161961719618196191962019621196221962319624196251962619627196281962919630196311963219633196341963519636196371963819639196401964119642196431964419645196461964719648196491965019651196521965319654196551965619657196581965919660196611966219663196641966519666196671966819669196701967119672196731967419675196761967719678196791968019681196821968319684196851968619687196881968919690196911969219693196941969519696196971969819699197001970119702197031970419705197061970719708197091971019711197121971319714197151971619717197181971919720197211972219723197241972519726197271972819729197301973119732197331973419735197361973719738197391974019741197421974319744197451974619747197481974919750197511975219753197541975519756197571975819759197601976119762197631976419765197661976719768197691977019771197721977319774197751977619777197781977919780197811978219783197841978519786197871978819789197901979119792197931979419795197961979719798197991980019801198021980319804198051980619807198081980919810198111981219813198141981519816198171981819819198201982119822198231982419825198261982719828198291983019831198321983319834198351983619837198381983919840198411984219843198441984519846198471984819849198501985119852198531985419855198561985719858198591986019861198621986319864198651986619867198681986919870198711987219873198741987519876198771987819879198801988119882198831988419885198861988719888198891989019891198921989319894198951989619897198981989919900199011990219903199041990519906199071990819909199101991119912199131991419915199161991719918199191992019921199221992319924199251992619927199281992919930199311993219933199341993519936199371993819939199401994119942199431994419945199461994719948199491995019951199521995319954199551995619957199581995919960199611996219963199641996519966199671996819969199701997119972199731997419975199761997719978199791998019981199821998319984199851998619987199881998919990199911999219993199941999519996199971999819999200002000120002200032000420005200062000720008200092001020011200122001320014200152001620017200182001920020200212002220023200242002520026200272002820029200302003120032200332003420035200362003720038200392004020041200422004320044200452004620047200482004920050200512005220053200542005520056200572005820059200602006120062200632006420065200662006720068200692007020071200722007320074200752007620077200782007920080200812008220083200842008520086200872008820089200902009120092200932009420095200962009720098200992010020101201022010320104201052010620107201082010920110201112011220113201142011520116201172011820119201202012120122201232012420125201262012720128201292013020131201322013320134201352013620137201382013920140201412014220143201442014520146201472014820149201502015120152201532015420155201562015720158201592016020161201622016320164201652016620167201682016920170201712017220173201742017520176201772017820179201802018120182201832018420185201862018720188201892019020191201922019320194201952019620197201982019920200202012020220203202042020520206202072020820209202102021120212202132021420215202162021720218202192022020221202222022320224202252022620227202282022920230202312023220233202342023520236202372023820239202402024120242202432024420245202462024720248202492025020251202522025320254202552025620257202582025920260202612026220263202642026520266202672026820269202702027120272202732027420275202762027720278202792028020281202822028320284202852028620287202882028920290202912029220293202942029520296202972029820299203002030120302203032030420305203062030720308203092031020311203122031320314203152031620317203182031920320203212032220323203242032520326203272032820329203302033120332203332033420335203362033720338203392034020341203422034320344203452034620347203482034920350203512035220353203542035520356203572035820359203602036120362203632036420365203662036720368203692037020371203722037320374203752037620377203782037920380203812038220383203842038520386203872038820389203902039120392203932039420395203962039720398203992040020401204022040320404204052040620407204082040920410204112041220413204142041520416204172041820419204202042120422204232042420425204262042720428204292043020431204322043320434204352043620437204382043920440204412044220443204442044520446204472044820449204502045120452204532045420455204562045720458204592046020461204622046320464204652046620467204682046920470204712047220473204742047520476204772047820479204802048120482204832048420485204862048720488204892049020491204922049320494204952049620497204982049920500205012050220503205042050520506205072050820509205102051120512205132051420515205162051720518205192052020521205222052320524205252052620527205282052920530205312053220533205342053520536205372053820539205402054120542205432054420545205462054720548205492055020551205522055320554205552055620557205582055920560205612056220563205642056520566205672056820569205702057120572205732057420575205762057720578205792058020581205822058320584205852058620587205882058920590205912059220593205942059520596205972059820599206002060120602206032060420605206062060720608206092061020611206122061320614206152061620617206182061920620206212062220623206242062520626206272062820629206302063120632206332063420635206362063720638206392064020641206422064320644206452064620647206482064920650206512065220653206542065520656206572065820659206602066120662206632066420665206662066720668206692067020671206722067320674206752067620677206782067920680206812068220683206842068520686206872068820689206902069120692206932069420695206962069720698206992070020701207022070320704207052070620707207082070920710207112071220713207142071520716207172071820719207202072120722207232072420725207262072720728207292073020731207322073320734207352073620737207382073920740207412074220743207442074520746207472074820749207502075120752207532075420755207562075720758207592076020761207622076320764207652076620767207682076920770207712077220773207742077520776207772077820779207802078120782207832078420785207862078720788207892079020791207922079320794207952079620797207982079920800208012080220803208042080520806208072080820809208102081120812208132081420815208162081720818208192082020821208222082320824208252082620827208282082920830208312083220833208342083520836208372083820839208402084120842208432084420845208462084720848208492085020851208522085320854208552085620857208582085920860208612086220863208642086520866208672086820869208702087120872208732087420875208762087720878208792088020881208822088320884208852088620887208882088920890208912089220893208942089520896208972089820899209002090120902209032090420905209062090720908209092091020911209122091320914209152091620917209182091920920209212092220923209242092520926209272092820929209302093120932209332093420935209362093720938209392094020941209422094320944209452094620947209482094920950209512095220953209542095520956209572095820959209602096120962209632096420965209662096720968209692097020971209722097320974209752097620977209782097920980209812098220983209842098520986209872098820989209902099120992209932099420995209962099720998209992100021001210022100321004210052100621007210082100921010210112101221013210142101521016210172101821019210202102121022210232102421025210262102721028210292103021031210322103321034210352103621037210382103921040210412104221043210442104521046210472104821049210502105121052210532105421055210562105721058210592106021061210622106321064210652106621067210682106921070210712107221073210742107521076210772107821079210802108121082210832108421085210862108721088210892109021091210922109321094210952109621097210982109921100211012110221103211042110521106211072110821109211102111121112211132111421115211162111721118211192112021121211222112321124211252112621127211282112921130211312113221133211342113521136211372113821139211402114121142211432114421145211462114721148211492115021151211522115321154211552115621157211582115921160211612116221163211642116521166211672116821169211702117121172211732117421175211762117721178211792118021181211822118321184211852118621187211882118921190211912119221193211942119521196211972119821199212002120121202212032120421205212062120721208212092121021211212122121321214212152121621217212182121921220212212122221223212242122521226212272122821229212302123121232212332123421235212362123721238212392124021241212422124321244212452124621247212482124921250212512125221253212542125521256212572125821259212602126121262212632126421265212662126721268212692127021271212722127321274212752127621277212782127921280212812128221283212842128521286212872128821289212902129121292212932129421295212962129721298212992130021301213022130321304213052130621307213082130921310213112131221313213142131521316213172131821319213202132121322213232132421325213262132721328213292133021331213322133321334213352133621337213382133921340213412134221343213442134521346213472134821349213502135121352213532135421355213562135721358213592136021361213622136321364213652136621367213682136921370213712137221373213742137521376213772137821379213802138121382213832138421385213862138721388213892139021391213922139321394213952139621397213982139921400214012140221403214042140521406214072140821409214102141121412214132141421415214162141721418214192142021421214222142321424214252142621427214282142921430214312143221433214342143521436214372143821439214402144121442214432144421445214462144721448214492145021451214522145321454214552145621457214582145921460214612146221463214642146521466214672146821469214702147121472214732147421475214762147721478214792148021481214822148321484214852148621487214882148921490214912149221493214942149521496214972149821499215002150121502215032150421505215062150721508215092151021511215122151321514215152151621517215182151921520215212152221523215242152521526215272152821529215302153121532215332153421535215362153721538215392154021541215422154321544215452154621547215482154921550215512155221553215542155521556215572155821559215602156121562215632156421565215662156721568215692157021571215722157321574215752157621577215782157921580215812158221583215842158521586215872158821589215902159121592215932159421595215962159721598215992160021601216022160321604216052160621607216082160921610216112161221613216142161521616216172161821619216202162121622216232162421625216262162721628216292163021631216322163321634216352163621637216382163921640216412164221643216442164521646216472164821649216502165121652216532165421655216562165721658216592166021661216622166321664216652166621667216682166921670216712167221673216742167521676216772167821679216802168121682216832168421685216862168721688216892169021691216922169321694216952169621697216982169921700217012170221703217042170521706217072170821709217102171121712217132171421715217162171721718217192172021721217222172321724217252172621727217282172921730217312173221733217342173521736217372173821739217402174121742217432174421745217462174721748217492175021751217522175321754217552175621757217582175921760217612176221763217642176521766217672176821769217702177121772217732177421775217762177721778217792178021781217822178321784217852178621787217882178921790217912179221793217942179521796217972179821799218002180121802218032180421805218062180721808218092181021811218122181321814218152181621817218182181921820218212182221823218242182521826218272182821829218302183121832218332183421835218362183721838218392184021841218422184321844218452184621847218482184921850218512185221853218542185521856218572185821859218602186121862218632186421865218662186721868218692187021871218722187321874218752187621877218782187921880218812188221883218842188521886218872188821889218902189121892218932189421895218962189721898218992190021901219022190321904219052190621907219082190921910219112191221913219142191521916219172191821919219202192121922219232192421925219262192721928219292193021931219322193321934219352193621937219382193921940219412194221943219442194521946219472194821949219502195121952219532195421955219562195721958219592196021961219622196321964219652196621967219682196921970219712197221973219742197521976219772197821979219802198121982219832198421985219862198721988219892199021991219922199321994219952199621997219982199922000220012200222003220042200522006220072200822009220102201122012220132201422015220162201722018220192202022021220222202322024220252202622027220282202922030220312203222033220342203522036220372203822039220402204122042220432204422045220462204722048220492205022051220522205322054220552205622057220582205922060220612206222063220642206522066220672206822069220702207122072220732207422075220762207722078220792208022081220822208322084220852208622087220882208922090220912209222093220942209522096220972209822099221002210122102221032210422105221062210722108221092211022111221122211322114221152211622117221182211922120221212212222123221242212522126221272212822129221302213122132221332213422135221362213722138221392214022141221422214322144221452214622147221482214922150221512215222153221542215522156221572215822159221602216122162221632216422165221662216722168221692217022171221722217322174221752217622177221782217922180221812218222183221842218522186221872218822189221902219122192221932219422195221962219722198221992220022201222022220322204222052220622207222082220922210222112221222213222142221522216222172221822219222202222122222222232222422225222262222722228222292223022231222322223322234222352223622237222382223922240222412224222243222442224522246222472224822249222502225122252222532225422255222562225722258222592226022261222622226322264222652226622267222682226922270222712227222273222742227522276222772227822279222802228122282222832228422285222862228722288222892229022291222922229322294222952229622297222982229922300223012230222303223042230522306223072230822309223102231122312223132231422315223162231722318223192232022321223222232322324223252232622327223282232922330223312233222333223342233522336223372233822339223402234122342223432234422345223462234722348223492235022351223522235322354223552235622357223582235922360223612236222363223642236522366223672236822369223702237122372223732237422375223762237722378223792238022381223822238322384223852238622387223882238922390223912239222393223942239522396223972239822399224002240122402224032240422405224062240722408224092241022411224122241322414224152241622417224182241922420224212242222423224242242522426224272242822429224302243122432224332243422435224362243722438224392244022441224422244322444224452244622447224482244922450224512245222453224542245522456224572245822459224602246122462224632246422465224662246722468224692247022471224722247322474224752247622477224782247922480224812248222483224842248522486224872248822489224902249122492224932249422495224962249722498224992250022501225022250322504225052250622507225082250922510225112251222513225142251522516225172251822519225202252122522225232252422525225262252722528225292253022531225322253322534225352253622537225382253922540225412254222543225442254522546225472254822549225502255122552225532255422555225562255722558225592256022561225622256322564225652256622567225682256922570225712257222573225742257522576225772257822579225802258122582225832258422585225862258722588225892259022591225922259322594225952259622597225982259922600226012260222603226042260522606226072260822609226102261122612226132261422615226162261722618226192262022621226222262322624226252262622627226282262922630226312263222633226342263522636226372263822639226402264122642226432264422645226462264722648226492265022651226522265322654226552265622657226582265922660226612266222663226642266522666226672266822669226702267122672226732267422675226762267722678226792268022681226822268322684226852268622687226882268922690226912269222693226942269522696226972269822699227002270122702227032270422705227062270722708227092271022711227122271322714227152271622717227182271922720227212272222723227242272522726227272272822729227302273122732227332273422735227362273722738227392274022741227422274322744227452274622747227482274922750227512275222753227542275522756227572275822759227602276122762227632276422765227662276722768227692277022771227722277322774227752277622777227782277922780227812278222783227842278522786227872278822789227902279122792227932279422795227962279722798227992280022801228022280322804228052280622807228082280922810228112281222813228142281522816228172281822819228202282122822228232282422825228262282722828228292283022831228322283322834228352283622837228382283922840228412284222843228442284522846228472284822849228502285122852228532285422855228562285722858228592286022861228622286322864228652286622867228682286922870228712287222873228742287522876228772287822879228802288122882228832288422885228862288722888228892289022891228922289322894228952289622897228982289922900229012290222903229042290522906229072290822909229102291122912229132291422915229162291722918229192292022921229222292322924229252292622927229282292922930229312293222933229342293522936229372293822939229402294122942229432294422945229462294722948229492295022951229522295322954229552295622957229582295922960229612296222963229642296522966229672296822969229702297122972229732297422975229762297722978229792298022981229822298322984229852298622987229882298922990229912299222993229942299522996229972299822999230002300123002230032300423005230062300723008230092301023011230122301323014230152301623017230182301923020230212302223023230242302523026230272302823029230302303123032230332303423035230362303723038230392304023041230422304323044230452304623047230482304923050230512305223053230542305523056230572305823059230602306123062230632306423065230662306723068230692307023071230722307323074230752307623077230782307923080230812308223083230842308523086230872308823089230902309123092230932309423095230962309723098230992310023101231022310323104231052310623107231082310923110231112311223113231142311523116231172311823119231202312123122231232312423125231262312723128231292313023131231322313323134231352313623137231382313923140231412314223143231442314523146231472314823149231502315123152231532315423155231562315723158231592316023161231622316323164231652316623167231682316923170231712317223173231742317523176231772317823179231802318123182231832318423185231862318723188231892319023191231922319323194231952319623197231982319923200232012320223203232042320523206232072320823209232102321123212232132321423215232162321723218232192322023221232222322323224232252322623227232282322923230232312323223233232342323523236232372323823239232402324123242232432324423245232462324723248232492325023251232522325323254232552325623257232582325923260232612326223263232642326523266232672326823269232702327123272232732327423275232762327723278232792328023281232822328323284232852328623287232882328923290232912329223293232942329523296232972329823299233002330123302233032330423305233062330723308233092331023311233122331323314233152331623317233182331923320233212332223323233242332523326233272332823329233302333123332233332333423335233362333723338233392334023341233422334323344233452334623347233482334923350233512335223353233542335523356233572335823359233602336123362233632336423365233662336723368233692337023371233722337323374233752337623377233782337923380233812338223383233842338523386233872338823389233902339123392233932339423395233962339723398233992340023401234022340323404234052340623407234082340923410234112341223413234142341523416234172341823419234202342123422234232342423425234262342723428234292343023431234322343323434234352343623437234382343923440234412344223443234442344523446234472344823449234502345123452234532345423455234562345723458234592346023461234622346323464234652346623467234682346923470234712347223473234742347523476234772347823479234802348123482234832348423485234862348723488234892349023491234922349323494234952349623497234982349923500235012350223503235042350523506235072350823509235102351123512235132351423515235162351723518235192352023521235222352323524235252352623527235282352923530235312353223533235342353523536235372353823539235402354123542235432354423545235462354723548235492355023551235522355323554235552355623557235582355923560235612356223563235642356523566235672356823569235702357123572235732357423575235762357723578235792358023581235822358323584235852358623587235882358923590235912359223593235942359523596235972359823599236002360123602236032360423605236062360723608236092361023611236122361323614236152361623617236182361923620236212362223623236242362523626236272362823629236302363123632236332363423635236362363723638236392364023641236422364323644236452364623647236482364923650236512365223653236542365523656236572365823659236602366123662236632366423665236662366723668236692367023671236722367323674236752367623677236782367923680236812368223683236842368523686236872368823689236902369123692236932369423695236962369723698236992370023701237022370323704237052370623707237082370923710237112371223713237142371523716237172371823719237202372123722237232372423725237262372723728237292373023731237322373323734237352373623737237382373923740237412374223743237442374523746237472374823749237502375123752237532375423755237562375723758237592376023761237622376323764237652376623767237682376923770237712377223773237742377523776237772377823779237802378123782237832378423785237862378723788237892379023791237922379323794237952379623797237982379923800238012380223803238042380523806238072380823809238102381123812238132381423815238162381723818238192382023821238222382323824238252382623827238282382923830238312383223833238342383523836238372383823839238402384123842238432384423845238462384723848238492385023851238522385323854238552385623857238582385923860238612386223863238642386523866238672386823869238702387123872238732387423875238762387723878238792388023881238822388323884238852388623887238882388923890238912389223893238942389523896238972389823899239002390123902239032390423905239062390723908239092391023911239122391323914239152391623917239182391923920239212392223923239242392523926239272392823929239302393123932239332393423935239362393723938239392394023941239422394323944239452394623947239482394923950239512395223953239542395523956239572395823959239602396123962239632396423965239662396723968239692397023971239722397323974239752397623977239782397923980239812398223983239842398523986239872398823989239902399123992
  1. // SoftEther VPN Source Code - Stable Edition Repository
  2. // Cedar Communication Module
  3. //
  4. // SoftEther VPN Server, Client and Bridge are free software under the Apache License, Version 2.0.
  5. //
  6. // Copyright (c) Daiyuu Nobori.
  7. // Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
  8. // Copyright (c) SoftEther Corporation.
  9. // Copyright (c) all contributors on SoftEther VPN project in GitHub.
  10. //
  11. // All Rights Reserved.
  12. //
  13. // http://www.softether.org/
  14. //
  15. // This stable branch is officially managed by Daiyuu Nobori, the owner of SoftEther VPN Project.
  16. // Pull requests should be sent to the Developer Edition Master Repository on https://github.com/SoftEtherVPN/SoftEtherVPN
  17. //
  18. // License: The Apache License, Version 2.0
  19. // https://www.apache.org/licenses/LICENSE-2.0
  20. //
  21. // DISCLAIMER
  22. // ==========
  23. //
  24. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  25. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  26. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  27. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  28. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  29. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  30. // SOFTWARE.
  31. //
  32. // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN, UNDER
  33. // JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY, MERGE, PUBLISH,
  34. // DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS SOFTWARE, THAT ANY
  35. // JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS SOFTWARE OR ITS CONTENTS,
  36. // AGAINST US (SOFTETHER PROJECT, SOFTETHER CORPORATION, DAIYUU NOBORI OR OTHER
  37. // SUPPLIERS), OR ANY JURIDICAL DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND
  38. // OF USING, COPYING, MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING,
  39. // AND/OR SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
  40. // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO EXCLUSIVE
  41. // JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO, JAPAN. YOU MUST WAIVE
  42. // ALL DEFENSES OF LACK OF PERSONAL JURISDICTION AND FORUM NON CONVENIENS.
  43. // PROCESS MAY BE SERVED ON EITHER PARTY IN THE MANNER AUTHORIZED BY APPLICABLE
  44. // LAW OR COURT RULE.
  45. //
  46. // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS YOU HAVE
  47. // A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY CRIMINAL LAWS OR CIVIL
  48. // RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS SOFTWARE IN OTHER COUNTRIES IS
  49. // COMPLETELY AT YOUR OWN RISK. THE SOFTETHER VPN PROJECT HAS DEVELOPED AND
  50. // DISTRIBUTED THIS SOFTWARE TO COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING
  51. // CIVIL RIGHTS INCLUDING PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER
  52. // COUNTRIES' LAWS OR CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES.
  53. // WE HAVE NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
  54. // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ COUNTRIES
  55. // AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE WORLD, WITH
  56. // DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY COUNTRIES' LAWS, REGULATIONS
  57. // AND CIVIL RIGHTS TO MAKE THE SOFTWARE COMPLY WITH ALL COUNTRIES' LAWS BY THE
  58. // PROJECT. EVEN IF YOU WILL BE SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A
  59. // PUBLIC SERVANT IN YOUR COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE
  60. // LIABLE TO RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
  61. // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT JUST A
  62. // STATEMENT FOR WARNING AND DISCLAIMER.
  63. //
  64. // READ AND UNDERSTAND THE 'WARNING.TXT' FILE BEFORE USING THIS SOFTWARE.
  65. // SOME SOFTWARE PROGRAMS FROM THIRD PARTIES ARE INCLUDED ON THIS SOFTWARE WITH
  66. // LICENSE CONDITIONS WHICH ARE DESCRIBED ON THE 'THIRD_PARTY.TXT' FILE.
  67. //
  68. //
  69. // SOURCE CODE CONTRIBUTION
  70. // ------------------------
  71. //
  72. // Your contribution to SoftEther VPN Project is much appreciated.
  73. // Please send patches to us through GitHub.
  74. // Read the SoftEther VPN Patch Acceptance Policy in advance:
  75. // http://www.softether.org/5-download/src/9.patch
  76. //
  77. //
  78. // DEAR SECURITY EXPERTS
  79. // ---------------------
  80. //
  81. // If you find a bug or a security vulnerability please kindly inform us
  82. // about the problem immediately so that we can fix the security problem
  83. // to protect a lot of users around the world as soon as possible.
  84. //
  85. // Our e-mail address for security reports is:
  86. // softether-vpn-security [at] softether.org
  87. //
  88. // Please note that the above e-mail address is not a technical support
  89. // inquiry address. If you need technical assistance, please visit
  90. // http://www.softether.org/ and ask your question on the users forum.
  91. //
  92. // Thank you for your cooperation.
  93. //
  94. //
  95. // NO MEMORY OR RESOURCE LEAKS
  96. // ---------------------------
  97. //
  98. // The memory-leaks and resource-leaks verification under the stress
  99. // test has been passed before release this source code.
  100. // Command.c
  101. // vpncmd Command Line Management Utility
  102. #include "CedarPch.h"
  103. // System checker definition
  104. typedef bool (CHECKER_PROC_DEF)();
  105. typedef struct CHECKER_PROC
  106. {
  107. char *Title;
  108. CHECKER_PROC_DEF *Proc;
  109. } CHECKER_PROC;
  110. static CHECKER_PROC checker_procs[] =
  111. {
  112. {"CHECK_PROC_KERNEL", CheckKernel},
  113. {"CHECK_PROC_MEMORY", CheckMemory},
  114. {"CHECK_PROC_STRINGS", CheckStrings},
  115. {"CHECK_PROC_FILESYSTEM", CheckFileSystem},
  116. {"CHECK_PROC_THREAD", CheckThread},
  117. {"CHECK_PROC_NETWORK", CheckNetwork},
  118. };
  119. typedef struct CHECK_NETWORK_1
  120. {
  121. SOCK *ListenSocket;
  122. } CHECK_NETWORK_1;
  123. typedef struct CHECK_NETWORK_2
  124. {
  125. SOCK *s;
  126. X *x;
  127. K *k;
  128. } CHECK_NETWORK_2;
  129. // Convert the TT_RESULT to RPC
  130. void OutRpcTtResult(PACK *p, TT_RESULT *t)
  131. {
  132. if (p == NULL || t == NULL)
  133. {
  134. return;
  135. }
  136. PackAddBool(p, "Raw", t->Raw);
  137. PackAddBool(p, "Double", t->Double);
  138. PackAddInt64(p, "NumBytesUpload", t->NumBytesUpload);
  139. PackAddInt64(p, "NumBytesDownload", t->NumBytesDownload);
  140. PackAddInt64(p, "NumBytesTotal", t->NumBytesTotal);
  141. PackAddInt64(p, "Span", t->Span);
  142. PackAddInt64(p, "BpsUpload", t->BpsUpload);
  143. PackAddInt64(p, "BpsDownload", t->BpsDownload);
  144. PackAddInt64(p, "BpsTotal", t->BpsTotal);
  145. }
  146. // Convert an RPC to a TT_RESULT
  147. void InRpcTtResult(PACK *p, TT_RESULT *t)
  148. {
  149. if (p == NULL || t == NULL)
  150. {
  151. return;
  152. }
  153. Zero(t, sizeof(TT_RESULT));
  154. t->Raw = PackGetBool(p, "Raw");
  155. t->Double = PackGetBool(p, "Double");
  156. t->NumBytesUpload = PackGetInt64(p, "NumBytesUpload");
  157. t->NumBytesDownload = PackGetInt64(p, "NumBytesDownload");
  158. t->NumBytesTotal = PackGetInt64(p, "NumBytesTotal");
  159. t->Span = PackGetInt64(p, "Span");
  160. t->BpsUpload = PackGetInt64(p, "BpsUpload");
  161. t->BpsDownload = PackGetInt64(p, "BpsDownload");
  162. t->BpsTotal = PackGetInt64(p, "BpsTotal");
  163. }
  164. // Accept thread
  165. void CheckNetworkAcceptThread(THREAD *thread, void *param)
  166. {
  167. CHECK_NETWORK_2 *c = (CHECK_NETWORK_2 *)param;
  168. SOCK *s = c->s;
  169. UINT i = 0;
  170. if (StartSSL(s, c->x, c->k))
  171. {
  172. while (true)
  173. {
  174. i++;
  175. if (Send(s, &i, sizeof(UINT), true) == 0)
  176. {
  177. break;
  178. }
  179. }
  180. }
  181. Disconnect(s);
  182. ReleaseSock(s);
  183. }
  184. // Listen thread
  185. void CheckNetworkListenThread(THREAD *thread, void *param)
  186. {
  187. CHECK_NETWORK_1 *c = (CHECK_NETWORK_1 *)param;
  188. SOCK *s;
  189. UINT i;
  190. K *pub, *pri;
  191. X *x;
  192. LIST *o = NewList(NULL);
  193. NAME *name = NewName(L"Test", L"Test", L"Test", L"JP", L"Ibaraki", L"Tsukuba");
  194. RsaGen(&pri, &pub, 1024);
  195. x = NewRootX(pub, pri, name, 1000, NULL);
  196. FreeName(name);
  197. for (i = 1025;;i++)
  198. {
  199. s = Listen(i);
  200. if (s != NULL)
  201. {
  202. break;
  203. }
  204. }
  205. c->ListenSocket = s;
  206. AddRef(s->ref);
  207. NoticeThreadInit(thread);
  208. while (true)
  209. {
  210. SOCK *new_sock = Accept(s);
  211. if (new_sock == NULL)
  212. {
  213. break;
  214. }
  215. else
  216. {
  217. CHECK_NETWORK_2 c;
  218. THREAD *t;
  219. Zero(&c, sizeof(c));
  220. c.s = new_sock;
  221. c.k = pri;
  222. c.x = x;
  223. t = NewThread(CheckNetworkAcceptThread, &c);
  224. Insert(o, t);
  225. }
  226. }
  227. for (i = 0;i < LIST_NUM(o);i++)
  228. {
  229. THREAD *t = LIST_DATA(o, i);
  230. WaitThread(t, INFINITE);
  231. ReleaseThread(t);
  232. }
  233. FreeK(pri);
  234. FreeK(pub);
  235. FreeX(x);
  236. ReleaseSock(s);
  237. ReleaseList(o);
  238. }
  239. // Network function check
  240. bool CheckNetwork()
  241. {
  242. CHECK_NETWORK_1 c;
  243. THREAD *t;
  244. SOCK *listen_socket;
  245. UINT port;
  246. UINT i, num;
  247. bool ok = true;
  248. SOCK **socks;
  249. SOCK_EVENT *se = NewSockEvent();
  250. Zero(&c, sizeof(c));
  251. t = NewThread(CheckNetworkListenThread, &c);
  252. WaitThreadInit(t);
  253. listen_socket = c.ListenSocket;
  254. port = listen_socket->LocalPort;
  255. num = 8;
  256. socks = ZeroMalloc(sizeof(SOCK *) * num);
  257. for (i = 0;i < num;i++)
  258. {
  259. socks[i] = Connect("localhost", port);
  260. if (socks[i] == NULL)
  261. {
  262. Print("Connect Failed. (%u)\n", i);
  263. ok = false;
  264. num = i;
  265. break;
  266. }
  267. if (StartSSL(socks[i], NULL, NULL) == false)
  268. {
  269. ReleaseSock(socks[i]);
  270. Print("Connect Failed. (%u)\n", i);
  271. ok = false;
  272. num = i;
  273. break;
  274. }
  275. JoinSockToSockEvent(socks[i], se);
  276. }
  277. if (ok)
  278. {
  279. while (true)
  280. {
  281. UINT i;
  282. bool end = false;
  283. bool all_blocked = true;
  284. for (i = 0;i < num;i++)
  285. {
  286. UINT n;
  287. UINT ret;
  288. n = 0;
  289. ret = Recv(socks[i], &n, sizeof(UINT), true);
  290. if (ret == 0)
  291. {
  292. Print("Recv Failed (Disconnected).\n", ret);
  293. end = true;
  294. ok = false;
  295. }
  296. if (ret != SOCK_LATER)
  297. {
  298. all_blocked = false;
  299. }
  300. if (n >= 128)
  301. {
  302. end = true;
  303. }
  304. }
  305. if (end)
  306. {
  307. break;
  308. }
  309. if (all_blocked)
  310. {
  311. WaitSockEvent(se, INFINITE);
  312. }
  313. }
  314. }
  315. for (i = 0;i < num;i++)
  316. {
  317. Disconnect(socks[i]);
  318. ReleaseSock(socks[i]);
  319. }
  320. Free(socks);
  321. Disconnect(listen_socket);
  322. WaitThread(t, INFINITE);
  323. ReleaseThread(t);
  324. ReleaseSock(listen_socket);
  325. ReleaseSockEvent(se);
  326. return ok;
  327. }
  328. typedef struct CHECK_THREAD_1
  329. {
  330. UINT num;
  331. LOCK *lock;
  332. THREAD *wait_thread;
  333. } CHECK_THREAD_1;
  334. static UINT check_thread_global_1 = 0;
  335. #define CHECK_THREAD_INCREMENT_COUNT 32
  336. // Test thread 1
  337. void CheckThread1(THREAD *thread, void *param)
  338. {
  339. CHECK_THREAD_1 *ct1 = (CHECK_THREAD_1 *)param;
  340. UINT i;
  341. UINT num = CHECK_THREAD_INCREMENT_COUNT;
  342. WaitThread(ct1->wait_thread, INFINITE);
  343. for (i = 0;i < num;i++)
  344. {
  345. Lock(ct1->lock);
  346. check_thread_global_1 = ct1->num;
  347. InputToNull((void *)check_thread_global_1);
  348. check_thread_global_1 = check_thread_global_1 + 1 + RetZero();
  349. ct1->num = check_thread_global_1;
  350. Unlock(ct1->lock);
  351. }
  352. }
  353. // Test thread 2
  354. void CheckThread2(THREAD *thread, void *param)
  355. {
  356. EVENT *e = (EVENT *)param;
  357. Wait(e, INFINITE);
  358. }
  359. typedef struct CHECK_THREAD_3
  360. {
  361. UINT num, a;
  362. } CHECK_THREAD_3;
  363. // Test thread 3
  364. void CheckThread3(THREAD *thread, void *param)
  365. {
  366. CHECK_THREAD_3 *c = (CHECK_THREAD_3 *)param;
  367. THREAD *t;
  368. if (c->num == 0)
  369. {
  370. return;
  371. }
  372. c->num--;
  373. c->a++;
  374. t = NewThread(CheckThread3, c);
  375. WaitThread(t, INFINITE);
  376. ReleaseThread(t);
  377. }
  378. // Thread check
  379. bool CheckThread()
  380. {
  381. bool ok = true;
  382. CHECK_THREAD_1 ct1;
  383. UINT num = 32;
  384. UINT i;
  385. THREAD **threads;
  386. EVENT *e;
  387. THREAD *t2;
  388. THREAD *t;
  389. CHECK_THREAD_3 c;
  390. e = NewEvent();
  391. Zero(&ct1, sizeof(ct1));
  392. ct1.lock = NewLock();
  393. t2 = NewThread(CheckThread2, e);
  394. ct1.wait_thread = t2;
  395. threads = ZeroMalloc(sizeof(THREAD *) * num);
  396. for (i = 0;i < num;i++)
  397. {
  398. threads[i] = NewThread(CheckThread1, &ct1);
  399. if (threads[i] == NULL)
  400. {
  401. Print("Thread %u Create Failed.\n", i);
  402. ok = false;
  403. }
  404. }
  405. Set(e);
  406. for (i = 0;i < num;i++)
  407. {
  408. WaitThread(threads[i], INFINITE);
  409. ReleaseThread(threads[i]);
  410. }
  411. Free(threads);
  412. if (ct1.num != (num * CHECK_THREAD_INCREMENT_COUNT))
  413. {
  414. Print("Threading: %u != %u\n", ct1.num, num * CHECK_THREAD_INCREMENT_COUNT);
  415. ok = false;
  416. }
  417. DeleteLock(ct1.lock);
  418. WaitThread(t2, INFINITE);
  419. ReleaseThread(t2);
  420. ReleaseEvent(e);
  421. num = 32;
  422. Zero(&c, sizeof(c));
  423. c.num = num;
  424. t = NewThread(CheckThread3, &c);
  425. WaitThread(t, INFINITE);
  426. ReleaseThread(t);
  427. if (c.a != num)
  428. {
  429. Print("Threading: %u != %u\n", c.a, num);
  430. ok = false;
  431. }
  432. return ok;
  433. }
  434. // File system check
  435. bool CheckFileSystem()
  436. {
  437. bool ok = true;
  438. char exe[MAX_PATH];
  439. char exe_dir[MAX_PATH];
  440. DIRLIST *dirs;
  441. UINT i;
  442. GetExeName(exe, sizeof(exe));
  443. GetExeDir(exe_dir, sizeof(exe_dir));
  444. ok = false;
  445. dirs = EnumDir(exe_dir);
  446. for (i = 0;i < dirs->NumFiles;i++)
  447. {
  448. if (EndWith(exe, dirs->File[i]->FileName))
  449. {
  450. ok = true;
  451. break;
  452. }
  453. }
  454. FreeDir(dirs);
  455. if (ok == false)
  456. {
  457. Print("EnumDir Failed.\n");
  458. return false;
  459. }
  460. else
  461. {
  462. UINT size = 1234567;
  463. UCHAR *buf;
  464. IO *io;
  465. #ifndef OS_WIN32
  466. wchar_t *filename = L"/tmp/vpn_checker_tmp";
  467. #else // OS_WIN32
  468. wchar_t filename[MAX_PATH];
  469. CombinePathW(filename, sizeof(filename), MsGetMyTempDirW(), L"vpn_checker_tmp");
  470. #endif // OS_WIN32
  471. buf = Malloc(size);
  472. for (i = 0;i < size;i++)
  473. {
  474. buf[i] = i % 256;
  475. }
  476. io = FileCreateW(filename);
  477. if (io == NULL)
  478. {
  479. Print("FileCreate Failed.\n");
  480. Free(buf);
  481. return false;
  482. }
  483. else
  484. {
  485. FileWrite(io, buf, size);
  486. Free(buf);
  487. FileClose(io);
  488. io = FileOpenW(filename, false);
  489. if (FileSize(io) != 1234567)
  490. {
  491. Print("FileSize Failed.\n");
  492. FileClose(io);
  493. return false;
  494. }
  495. else
  496. {
  497. BUF *b;
  498. FileClose(io);
  499. b = ReadDumpW(filename);
  500. for (i = 0;i < b->Size;i++)
  501. {
  502. UCHAR c = ((UCHAR *)b->Buf)[i];
  503. if (c != (i % 256))
  504. {
  505. Print("FileToBuf Failed.\n");
  506. FreeBuf(b);
  507. return false;
  508. }
  509. }
  510. FreeBuf(b);
  511. }
  512. }
  513. FileDeleteW(filename);
  514. }
  515. return ok;
  516. }
  517. // String check
  518. bool CheckStrings()
  519. {
  520. wchar_t *numstr = _UU("CHECK_TEST_123456789");
  521. char tmp[MAX_SIZE];
  522. wchar_t tmp2[MAX_SIZE];
  523. UINT i;
  524. UINT sum, sum2;
  525. UNI_TOKEN_LIST *t;
  526. UniStrCpy(tmp2, sizeof(tmp2), L"");
  527. sum2 = 0;
  528. for (i = 0;i < 64;i++)
  529. {
  530. sum2 += i;
  531. UniFormat(tmp2, sizeof(tmp2), L"%s,%u", tmp2, i);
  532. }
  533. t = UniParseToken(tmp2, L",");
  534. sum = 0;
  535. for (i = 0;i < t->NumTokens;i++)
  536. {
  537. wchar_t *s = t->Token[i];
  538. UINT n = UniToInt(s);
  539. sum += n;
  540. }
  541. UniFreeToken(t);
  542. if (sum != sum2)
  543. {
  544. Print("UniParseToken Failed.\n");
  545. return false;
  546. }
  547. if (UniToInt(numstr) != 123456789)
  548. {
  549. Print("UniToInt Failed.\n");
  550. return false;
  551. }
  552. UniToStr(tmp, sizeof(tmp), numstr);
  553. if (ToInt(tmp) != 123456789)
  554. {
  555. Print("UniToStr Failed.\n");
  556. return false;
  557. }
  558. return true;
  559. }
  560. // Memory check
  561. bool CheckMemory()
  562. {
  563. UINT i, num, size, j;
  564. void **pp;
  565. bool ok = true;
  566. UINT old_size;
  567. num = 2000;
  568. size = 1000;
  569. pp = ZeroMalloc(sizeof(void *) * num);
  570. for (i = 0;i < num;i++)
  571. {
  572. pp[i] = ZeroMalloc(size);
  573. InputToNull(pp[i]);
  574. for (j = 0;j < size;j++)
  575. {
  576. ((UCHAR *)pp[i])[j] = j % 256;
  577. }
  578. }
  579. old_size = size;
  580. size = size * 3;
  581. for (i = 0;i < num;i++)
  582. {
  583. pp[i] = ReAlloc(pp[i], size);
  584. for (j = old_size;j < size;j++)
  585. {
  586. InputToNull((void *)(UINT)(((UCHAR *)pp[i])[j] = j % 256));
  587. }
  588. }
  589. for (i = 0;i < num;i++)
  590. {
  591. for (j = 0;j < size;j++)
  592. {
  593. if (((UCHAR *)pp[i])[j] != (j % 256))
  594. {
  595. ok = false;
  596. }
  597. }
  598. Free(pp[i]);
  599. }
  600. Free(pp);
  601. // OpenSSL Check
  602. if (RsaCheckEx() == false)
  603. {
  604. // Abort
  605. Print("RsaCheck(): OpenSSL Library Init Failed. (too old?)\nPlease install the latest version of OpenSSL.\n\n");
  606. ok = false;
  607. }
  608. return ok;
  609. }
  610. // Function that do not do anything
  611. void InputToNull(void *p)
  612. {
  613. if (RetZero() == 1)
  614. {
  615. UCHAR *c = (UCHAR *)p;
  616. c[0] = 0x32;
  617. }
  618. }
  619. // Function that returns 0
  620. UINT RetZero()
  621. {
  622. if (g_debug == 0x123455)
  623. {
  624. return 1;
  625. }
  626. else
  627. {
  628. return 0;
  629. }
  630. }
  631. // Kernel check
  632. bool CheckKernel()
  633. {
  634. UINT num = 10, i;
  635. UINT64 s = Tick64();
  636. UINT64 t = Tick64();
  637. for (i = 0;i < num;i++)
  638. {
  639. UINT64 q = Tick64();
  640. if (t > q)
  641. {
  642. Print("Tick64 #1 Failed.\n");
  643. return false;
  644. }
  645. t = q;
  646. SleepThread(100);
  647. }
  648. t = (Tick64() - s);
  649. if (t <= 500 || t >= 2000)
  650. {
  651. Print("Tick64 #2 Failed.\n");
  652. return false;
  653. }
  654. else if (false)
  655. {
  656. UINT64 tick1 = Tick64();
  657. UINT64 time1;
  658. UINT64 tick2, time2;
  659. SleepThread(1000);
  660. tick2 = Tick64();
  661. time2 = LocalTime64();
  662. time1 = SystemToLocal64(TickToTime(tick1));
  663. if (time2 > time1)
  664. {
  665. s = time2 - time1;
  666. }
  667. else
  668. {
  669. s = time1 - time2;
  670. }
  671. if (s <= 500 || s >= 2000)
  672. {
  673. Print("TickToTime Failed.\n");
  674. return false;
  675. }
  676. }
  677. #ifdef OS_UNIX
  678. {
  679. // Test of child process
  680. UINT pid;
  681. char exe[MAX_SIZE];
  682. GetExeName(exe, sizeof(exe));
  683. pid = fork();
  684. if (pid == -1)
  685. {
  686. Print("fork Failed.\n");
  687. return false;
  688. }
  689. if (pid == 0)
  690. {
  691. char *param = UNIX_ARG_EXIT;
  692. char **args;
  693. args = ZeroMalloc(sizeof(char *) * 3);
  694. args[0] = exe;
  695. args[1] = param;
  696. args[2] = NULL;
  697. setsid();
  698. // Close the standard I/O
  699. UnixCloseIO();
  700. // Stop unwanted signals
  701. signal(SIGHUP, SIG_IGN);
  702. execvp(exe, args);
  703. AbortExit();
  704. }
  705. else
  706. {
  707. int status = 0, ret;
  708. // Wait for the termination of the child process
  709. ret = waitpid(pid, &status, 0);
  710. if (WIFEXITED(status) == 0)
  711. {
  712. // Aborted
  713. Print("waitpid Failed: 0x%x\n", ret);
  714. return false;
  715. }
  716. }
  717. }
  718. #endif // OS_UNIX
  719. return true;
  720. }
  721. // System checker
  722. bool SystemCheck()
  723. {
  724. UINT i;
  725. bool ng = false;
  726. UniPrint(_UU("CHECK_TITLE"));
  727. UniPrint(_UU("CHECK_NOTE"));
  728. for (i = 0;i < sizeof(checker_procs) / sizeof(checker_procs[0]);i++)
  729. {
  730. wchar_t *title;
  731. bool ret = false;
  732. CHECKER_PROC *p = &checker_procs[i];
  733. title = _UU(p->Title);
  734. UniPrint(_UU("CHECK_EXEC_TAG"), title);
  735. ret = p->Proc();
  736. if (ret == false)
  737. {
  738. ng = true;
  739. }
  740. UniPrint(L" %s\n", ret ? _UU("CHECK_PASS") : _UU("CHECK_FAIL"));
  741. }
  742. UniPrint(L"\n");
  743. if (ng == false)
  744. {
  745. UniPrint(L"%s\n\n", _UU("CHECK_RESULT_1"));
  746. }
  747. else
  748. {
  749. UniPrint(L"%s\n\n", _UU("CHECK_RESULT_2"));
  750. }
  751. return true;
  752. }
  753. // Behavior checker
  754. UINT PtCheck(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  755. {
  756. LIST *o;
  757. UINT ret = ERR_NO_ERROR;
  758. // Get the parameter list
  759. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  760. if (o == NULL)
  761. {
  762. return ERR_INVALID_PARAMETER;
  763. }
  764. if (SystemCheck() == false)
  765. {
  766. ret = ERR_INTERNAL_ERROR;
  767. }
  768. FreeParamValueList(o);
  769. return ret;
  770. }
  771. // VPN Tools main function
  772. void PtMain(PT *pt)
  773. {
  774. char prompt[MAX_SIZE];
  775. wchar_t tmp[MAX_SIZE];
  776. // Validate arguments
  777. if (pt == NULL)
  778. {
  779. return;
  780. }
  781. // Display a message that start-up is complete
  782. UniFormat(tmp, sizeof(tmp), _UU("CMD_VPNCMD_TOOLS_CONNECTED"));
  783. pt->Console->Write(pt->Console, tmp);
  784. pt->Console->Write(pt->Console, L"");
  785. while (true)
  786. {
  787. // Definition of command
  788. CMD cmd[] =
  789. {
  790. {"About", PsAbout},
  791. {"MakeCert", PtMakeCert},
  792. {"MakeCert2048", PtMakeCert2048},
  793. {"TrafficClient", PtTrafficClient},
  794. {"TrafficServer", PtTrafficServer},
  795. {"Check", PtCheck},
  796. };
  797. // Generate a prompt
  798. StrCpy(prompt, sizeof(prompt), "VPN Tools>");
  799. if (DispatchNextCmdEx(pt->Console, pt->CmdLine, prompt, cmd, sizeof(cmd) / sizeof(cmd[0]), pt) == false)
  800. {
  801. break;
  802. }
  803. pt->LastError = pt->Console->RetCode;
  804. if (pt->LastError == ERR_NO_ERROR && pt->Console->ConsoleType != CONSOLE_CSV)
  805. {
  806. pt->Console->Write(pt->Console, _UU("CMD_MSG_OK"));
  807. pt->Console->Write(pt->Console, L"");
  808. }
  809. if (pt->CmdLine != NULL)
  810. {
  811. break;
  812. }
  813. }
  814. }
  815. // Create a VPN Tools context
  816. PT *NewPt(CONSOLE *c, wchar_t *cmdline)
  817. {
  818. PT *pt;
  819. // Validate arguments
  820. if (c == NULL)
  821. {
  822. return NULL;
  823. }
  824. if (UniIsEmptyStr(cmdline))
  825. {
  826. cmdline = NULL;
  827. }
  828. pt = ZeroMalloc(sizeof(PT));
  829. pt->Console = c;
  830. pt->CmdLine = CopyUniStr(cmdline);
  831. return pt;
  832. }
  833. // Release the VPN Tools context
  834. void FreePt(PT *pt)
  835. {
  836. // Validate arguments
  837. if (pt == NULL)
  838. {
  839. return;
  840. }
  841. Free(pt->CmdLine);
  842. Free(pt);
  843. }
  844. // Start VPN Tools
  845. UINT PtConnect(CONSOLE *c, wchar_t *cmdline)
  846. {
  847. PT *pt;
  848. UINT ret = 0;
  849. // Validate arguments
  850. if (c == NULL)
  851. {
  852. return ERR_INTERNAL_ERROR;
  853. }
  854. pt = NewPt(c, cmdline);
  855. PtMain(pt);
  856. ret = pt->LastError;
  857. FreePt(pt);
  858. return ret;
  859. }
  860. // Initialize the execution path information of vpncmd command
  861. void VpnCmdInitBootPath()
  862. {
  863. #ifdef OS_WIN32
  864. char exe_path[MAX_PATH];
  865. char tmp[MAX_PATH];
  866. GetExeName(exe_path, sizeof(exe_path));
  867. if (SearchStrEx(exe_path, "ham.exe", 0, false) != INFINITE || SearchStrEx(exe_path, "ham_x64.exe", 0, false) != INFINITE || SearchStrEx(exe_path, "ham_ia64.exe", 0, false) != INFINITE)
  868. {
  869. return;
  870. }
  871. if (MsIsAdmin())
  872. {
  873. UINT current_ver;
  874. // Get the version of vpncmd that is currently installed
  875. current_ver = MsRegReadInt(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_VER);
  876. if ((CEDAR_BUILD >= current_ver) ||
  877. MsRegIsValue(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH) == false)
  878. {
  879. char *src_filename;
  880. bool b = false;
  881. // Copy the vpncmdsys.exe to system32
  882. if (MsIsNt())
  883. {
  884. Format(tmp, sizeof(tmp), "%s\\vpncmd.exe", MsGetSystem32Dir());
  885. }
  886. else
  887. {
  888. Format(tmp, sizeof(tmp), "%s\\vpncmd.exe", MsGetWindowsDir());
  889. }
  890. src_filename = VPNCMD_BOOTSTRAP_FILENAME;
  891. if (IsX64())
  892. {
  893. src_filename = VPNCMD_BOOTSTRAP_FILENAME_X64;
  894. }
  895. if (IsIA64())
  896. {
  897. src_filename = VPNCMD_BOOTSTRAP_FILENAME_IA64;
  898. }
  899. b = true;
  900. if (MsIs64BitWindows() == false || Is64())
  901. {
  902. if (IsFile(tmp) == false || (CEDAR_BUILD > current_ver) || MsRegIsValue(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH) == false)
  903. {
  904. b = FileCopy(src_filename, tmp);
  905. }
  906. }
  907. else
  908. {
  909. void *wow;
  910. wow = MsDisableWow64FileSystemRedirection();
  911. if (true)
  912. {
  913. if (IsFile(tmp) == false || (CEDAR_BUILD > current_ver) || MsRegIsValue(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH) == false)
  914. {
  915. b = FileCopy(src_filename, tmp);
  916. }
  917. }
  918. MsRestoreWow64FileSystemRedirection(wow);
  919. if (true)
  920. {
  921. if (IsFile(tmp) == false || (CEDAR_BUILD > current_ver) || MsRegIsValue(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH) == false)
  922. {
  923. b = FileCopy(src_filename, tmp);
  924. }
  925. }
  926. }
  927. // Because the currently running prompt is newer version, overwrite the registry
  928. if (MsIs64BitWindows() == false)
  929. {
  930. MsRegWriteStr(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH, exe_path);
  931. MsRegWriteInt(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_VER, CEDAR_BUILD);
  932. }
  933. else
  934. {
  935. MsRegWriteStrEx2(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH, exe_path, true, false);
  936. MsRegWriteIntEx2(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_VER, CEDAR_BUILD, true, false);
  937. MsRegWriteStrEx2(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_PATH, exe_path, false, true);
  938. MsRegWriteIntEx2(REG_LOCAL_MACHINE, VPNCMD_BOOTSTRAP_REG_KEYNAME, VPNCMD_BOOTSTRAP_REG_VALUENAME_VER, CEDAR_BUILD, false, true);
  939. }
  940. }
  941. }
  942. #endif // OS_WIN32
  943. }
  944. // Show the string
  945. void TtPrint(void *param, TT_PRINT_PROC *print_proc, wchar_t *str)
  946. {
  947. // Validate arguments
  948. if (print_proc == NULL || str == NULL)
  949. {
  950. return;
  951. }
  952. print_proc(param, str);
  953. }
  954. // Generate new random data
  955. void TtGenerateRandomData(UCHAR **buf, UINT *size)
  956. {
  957. UCHAR *tmp;
  958. UINT sz;
  959. UINT i;
  960. // Validate arguments
  961. if (buf == NULL || size == NULL)
  962. {
  963. return;
  964. }
  965. sz = TRAFFIC_BUF_SIZE;
  966. tmp = Malloc(sz);
  967. for (i = 0;i < sz;i++)
  968. {
  969. tmp[i] = rand() % 256;
  970. if (tmp[i] == '!')
  971. {
  972. tmp[i] = '_';
  973. }
  974. }
  975. *buf = tmp;
  976. *size = sz;
  977. }
  978. // Communication throughput measurement server worker thread
  979. void TtsWorkerThread(THREAD *thread, void *param)
  980. {
  981. TTS *tts;
  982. TTS_WORKER *w;
  983. UINT buf_size;
  984. UCHAR *send_buf_data, *recv_buf_data;
  985. bool all_sockets_blocked = false;
  986. UINT64 tmp64;
  987. LIST *o;
  988. UINT i;
  989. wchar_t tmp[MAX_SIZE];
  990. bool dont_block_next_time = false;
  991. char *ver_str = TRAFFIC_VER_STR;
  992. // Validate arguments
  993. if (thread == NULL || param == NULL)
  994. {
  995. return;
  996. }
  997. // Allocate the data area
  998. TtGenerateRandomData(&send_buf_data, &buf_size);
  999. TtGenerateRandomData(&recv_buf_data, &buf_size);
  1000. w = (TTS_WORKER *)param;
  1001. tts = (TTS *)w->Tts;
  1002. // Preparation of socket events
  1003. w->SockEvent = NewSockEvent();
  1004. AddRef(w->SockEvent->ref);
  1005. // Preparing the Server socket list
  1006. w->TtsSockList = NewList(NULL);
  1007. // Notify completion of preparation to parent thread
  1008. NoticeThreadInit(thread);
  1009. o = NewList(NULL);
  1010. while (tts->Halt == false)
  1011. {
  1012. UINT64 now = Tick64();
  1013. // Wait for all sockets
  1014. if (dont_block_next_time == false)
  1015. {
  1016. WaitSockEvent(w->SockEvent, 50);
  1017. }
  1018. dont_block_next_time = false;
  1019. // Process for sockets that are currently registered
  1020. LockList(w->TtsSockList);
  1021. {
  1022. UINT i;
  1023. all_sockets_blocked = false;
  1024. // Continue to send and receive data
  1025. // until all sockets become block state
  1026. while (all_sockets_blocked == false)
  1027. {
  1028. all_sockets_blocked = true;
  1029. for (i = 0;i < LIST_NUM(w->TtsSockList);i++)
  1030. {
  1031. UINT ret = SOCK_LATER;
  1032. UCHAR *send_data = NULL, *recv_data = NULL;
  1033. UINT send_size = 0, recv_size = 0;
  1034. TTS_SOCK *ts = LIST_DATA(w->TtsSockList, i);
  1035. bool blocked_for_this_socket = false;
  1036. if (ts->SockJoined == false)
  1037. {
  1038. JoinSockToSockEvent(ts->Sock, w->SockEvent);
  1039. ts->SockJoined = true;
  1040. }
  1041. switch (ts->State)
  1042. {
  1043. case 0:
  1044. // Return the version string
  1045. ret = Send(ts->Sock, ver_str, TRAFFIC_VER_STR_SIZE, false);
  1046. if (ret != 0 && ret != SOCK_LATER)
  1047. {
  1048. ts->State = 5;
  1049. ts->LastCommTime = now;
  1050. }
  1051. break;
  1052. case 5:
  1053. // Receive the direction from the client
  1054. ret = Recv(ts->Sock, recv_buf_data, buf_size, false);
  1055. if (ret != 0 && ret != SOCK_LATER)
  1056. {
  1057. UCHAR c;
  1058. ts->LastCommTime = now;
  1059. // Direction of the data is in the first byte that is received
  1060. c = recv_buf_data[0];
  1061. if (c == 0)
  1062. {
  1063. // In the case of 0, Client -> Server
  1064. ts->State = 1;
  1065. }
  1066. else
  1067. {
  1068. // Otherwise Server -> Client
  1069. ts->State = 2;
  1070. }
  1071. if (ret >= (sizeof(UINT64) + sizeof(UINT64) + 1))
  1072. {
  1073. // Session ID
  1074. ts->SessionId = READ_UINT64(recv_buf_data + 1);
  1075. // Span
  1076. ts->Span = READ_UINT64(recv_buf_data + sizeof(UINT64) + 1);
  1077. ts->GiveupSpan = ts->Span * 3ULL + 180000ULL;
  1078. }
  1079. }
  1080. break;
  1081. case 1:
  1082. // Client -> Server
  1083. ret = Recv(ts->Sock, recv_buf_data, buf_size, false);
  1084. if (ret != 0 && ret != SOCK_LATER)
  1085. {
  1086. // Checking the first byte of received
  1087. UCHAR c = recv_buf_data[0];
  1088. ts->LastCommTime = now;
  1089. if (ts->FirstRecvTick == 0)
  1090. {
  1091. // Record the time at which the data has been received for the first
  1092. ts->FirstRecvTick = now;
  1093. }
  1094. else
  1095. {
  1096. // Check whether the span didn't finish yet
  1097. if (ts->FirstRecvTick <= now)
  1098. {
  1099. if (ts->Span != 0)
  1100. {
  1101. UINT64 giveup_tick = ts->FirstRecvTick + ts->Span;
  1102. if (now > giveup_tick)
  1103. {
  1104. // Span has expired
  1105. c = '!';
  1106. }
  1107. }
  1108. }
  1109. }
  1110. if (c == '!')
  1111. {
  1112. // Notice the size information from the server to the client
  1113. ts->State = 3;
  1114. Debug("!");
  1115. }
  1116. }
  1117. break;
  1118. case 2:
  1119. // Server -> Client
  1120. if (ts->NoMoreSendData == false)
  1121. {
  1122. ret = Send(ts->Sock, send_buf_data, buf_size, false);
  1123. if (ret != 0 && ret != SOCK_LATER)
  1124. {
  1125. ts->LastCommTime = now;
  1126. }
  1127. }
  1128. else
  1129. {
  1130. ret = Recv(ts->Sock, recv_buf_data, buf_size, false);
  1131. if (ret != 0 && ret != SOCK_LATER)
  1132. {
  1133. ts->LastCommTime = now;
  1134. }
  1135. }
  1136. if (ts->FirstSendTick == 0)
  1137. {
  1138. ts->FirstSendTick = now;
  1139. }
  1140. else
  1141. {
  1142. if (ts->FirstSendTick <= now)
  1143. {
  1144. if (ts->Span != 0)
  1145. {
  1146. UINT64 giveup_tick = ts->FirstSendTick + ts->Span * 3ULL + 180000ULL;
  1147. if (now > giveup_tick)
  1148. {
  1149. ret = 0;
  1150. }
  1151. }
  1152. }
  1153. }
  1154. break;
  1155. case 3:
  1156. // Notice the size information from the server to the client
  1157. tmp64 = Endian64(ts->NumBytes);
  1158. Recv(ts->Sock, recv_buf_data, buf_size, false);
  1159. if (ts->LastWaitTick == 0 || ts->LastWaitTick <= Tick64())
  1160. {
  1161. ret = Send(ts->Sock, &tmp64, sizeof(tmp64), false);
  1162. if (ret != 0 && ret != SOCK_LATER)
  1163. {
  1164. ts->LastCommTime = now;
  1165. }
  1166. if (ret != SOCK_LATER)
  1167. {
  1168. UINT j;
  1169. ts->LastWaitTick = Tick64() + 100;
  1170. if (ts->SessionId != 0)
  1171. {
  1172. // Not to send more data to the socket of the
  1173. // transmission direction in the same session ID
  1174. for (j = 0;j < LIST_NUM(w->TtsSockList);j++)
  1175. {
  1176. TTS_SOCK *ts2 = LIST_DATA(w->TtsSockList, j);
  1177. if (ts2->SessionId == ts->SessionId &&
  1178. ts2 != ts)
  1179. {
  1180. ts2->NoMoreSendData = true;
  1181. }
  1182. }
  1183. }
  1184. }
  1185. }
  1186. break;
  1187. }
  1188. if (now > (ts->LastCommTime + ts->GiveupSpan))
  1189. {
  1190. // Timeout: disconnect orphan sessions
  1191. ret = 0;
  1192. }
  1193. if (ret == 0)
  1194. {
  1195. // Mark as deleting the socket because it is disconnected
  1196. Insert(o, ts);
  1197. }
  1198. else if (ret == SOCK_LATER)
  1199. {
  1200. // Delay has occurred
  1201. blocked_for_this_socket = true;
  1202. dont_block_next_time = false;
  1203. }
  1204. else
  1205. {
  1206. if (ts->State == 1)
  1207. {
  1208. ts->NumBytes += (UINT64)ret;
  1209. }
  1210. }
  1211. if (blocked_for_this_socket == false)
  1212. {
  1213. all_sockets_blocked = false;
  1214. }
  1215. }
  1216. if (LIST_NUM(o) != 0)
  1217. {
  1218. UINT i;
  1219. // One or more sockets is disconnected
  1220. for (i = 0;i < LIST_NUM(o);i++)
  1221. {
  1222. TTS_SOCK *ts = LIST_DATA(o, i);
  1223. UniFormat(tmp, sizeof(tmp), _UU("TTS_DISCONNECTED"), ts->Id, ts->Sock->RemoteHostname);
  1224. TtPrint(tts->Param, tts->Print, tmp);
  1225. Disconnect(ts->Sock);
  1226. ReleaseSock(ts->Sock);
  1227. Delete(w->TtsSockList, ts);
  1228. Free(ts);
  1229. }
  1230. DeleteAll(o);
  1231. }
  1232. if (w->NewSocketArrived || tts->Halt)
  1233. {
  1234. w->NewSocketArrived = false;
  1235. all_sockets_blocked = true;
  1236. dont_block_next_time = true;
  1237. }
  1238. }
  1239. }
  1240. UnlockList(w->TtsSockList);
  1241. }
  1242. LockList(w->TtsSockList);
  1243. {
  1244. // Release the sockets of all remaining
  1245. for (i = 0;i < LIST_NUM(w->TtsSockList);i++)
  1246. {
  1247. TTS_SOCK *ts = LIST_DATA(w->TtsSockList, i);
  1248. UniFormat(tmp, sizeof(tmp), _UU("TTS_DISCONNECT"), ts->Id, ts->Sock->RemoteHostname);
  1249. TtPrint(tts->Param, tts->Print, tmp);
  1250. Disconnect(ts->Sock);
  1251. ReleaseSock(ts->Sock);
  1252. Free(ts);
  1253. }
  1254. }
  1255. UnlockList(w->TtsSockList);
  1256. // Cleanup
  1257. ReleaseList(o);
  1258. ReleaseList(w->TtsSockList);
  1259. ReleaseSockEvent(w->SockEvent);
  1260. Free(send_buf_data);
  1261. Free(recv_buf_data);
  1262. }
  1263. // Accept thread for IPv6
  1264. void TtsIPv6AcceptThread(THREAD *thread, void *param)
  1265. {
  1266. TTS *tts = (TTS *)param;
  1267. // Validate arguments
  1268. if (tts == NULL || param == NULL)
  1269. {
  1270. return;
  1271. }
  1272. TtsAcceptProc(tts, tts->ListenSocketV6);
  1273. }
  1274. // Accept procedure
  1275. void TtsAcceptProc(TTS *tts, SOCK *listen_socket)
  1276. {
  1277. wchar_t tmp[MAX_SIZE];
  1278. UINT seed = 0;
  1279. // Validate arguments
  1280. if (tts == NULL || listen_socket == NULL)
  1281. {
  1282. return;
  1283. }
  1284. while (tts->Halt == false)
  1285. {
  1286. SOCK *s;
  1287. // Accept
  1288. s = Accept(listen_socket);
  1289. if (s == NULL)
  1290. {
  1291. if (tts->Halt == false)
  1292. {
  1293. SleepThread(10);
  1294. }
  1295. continue;
  1296. }
  1297. else
  1298. {
  1299. UINT num, i;
  1300. TTS_WORKER *w;
  1301. // Connected from the client
  1302. AcceptInitEx(s, true);
  1303. // Choose a worker thread
  1304. num = LIST_NUM(tts->WorkerList);
  1305. i = seed % num;
  1306. seed++;
  1307. w = LIST_DATA(tts->WorkerList, i);
  1308. w->NewSocketArrived = true;
  1309. LockList(w->TtsSockList);
  1310. {
  1311. TTS_SOCK *ts = ZeroMalloc(sizeof(TTS_SOCK));
  1312. ts->Id = (++tts->IdSeed);
  1313. ts->Sock = s;
  1314. ts->GiveupSpan = (UINT64)(10 * 60 * 1000);
  1315. ts->LastCommTime = Tick64();
  1316. UniFormat(tmp, sizeof(tmp), _UU("TTS_ACCEPTED"), ts->Id,
  1317. s->RemoteHostname, s->RemotePort);
  1318. TtPrint(tts->Param, tts->Print, tmp);
  1319. Insert(w->TtsSockList, ts);
  1320. w->NewSocketArrived = true;
  1321. }
  1322. UnlockList(w->TtsSockList);
  1323. SetSockEvent(w->SockEvent);
  1324. }
  1325. }
  1326. }
  1327. // Communication throughput measurement server wait thread
  1328. void TtsListenThread(THREAD *thread, void *param)
  1329. {
  1330. TTS *tts;
  1331. wchar_t tmp[MAX_SIZE];
  1332. // Validate arguments
  1333. if (thread == NULL || param == NULL)
  1334. {
  1335. return;
  1336. }
  1337. tts = (TTS *)param;
  1338. tts->ListenSocket = NULL;
  1339. tts->ListenSocket = ListenEx(tts->Port, false);
  1340. tts->ListenSocketV6 = ListenEx6(tts->Port, false);
  1341. if (tts->ListenSocket == NULL && tts->ListenSocketV6 == NULL)
  1342. {
  1343. // Failed to Listen
  1344. UniFormat(tmp, sizeof(tmp), _UU("TT_LISTEN_FAILED"), tts->Port);
  1345. TtPrint(tts->Param, tts->Print, tmp);
  1346. // Notify completion of preparation to parent thread
  1347. NoticeThreadInit(thread);
  1348. tts->ErrorCode = ERR_INTERNAL_ERROR;
  1349. }
  1350. else
  1351. {
  1352. UINT i, num_worker_threads;
  1353. UniFormat(tmp, sizeof(tmp), _UU("TTS_LISTEN_STARTED"), tts->Port);
  1354. TtPrint(tts->Param, tts->Print, tmp);
  1355. if (tts->ListenSocketV6 != NULL)
  1356. {
  1357. UniFormat(tmp, sizeof(tmp), _UU("TTS_LISTEN_STARTED_V6"), tts->Port);
  1358. TtPrint(tts->Param, tts->Print, tmp);
  1359. }
  1360. else
  1361. {
  1362. UniFormat(tmp, sizeof(tmp), _UU("TTS_LISTEN_FAILED_V6"), tts->Port);
  1363. TtPrint(tts->Param, tts->Print, tmp);
  1364. }
  1365. if (tts->ListenSocket != NULL)
  1366. {
  1367. AddRef(tts->ListenSocket->ref);
  1368. }
  1369. if (tts->ListenSocketV6 != NULL)
  1370. {
  1371. AddRef(tts->ListenSocketV6->ref);
  1372. }
  1373. num_worker_threads = GetNumberOfCpu();
  1374. // Start the worker threads
  1375. for (i = 0;i < num_worker_threads;i++)
  1376. {
  1377. TTS_WORKER *w = ZeroMalloc(sizeof(TTS_WORKER));
  1378. w->Tts = tts;
  1379. w->WorkThread = NewThread(TtsWorkerThread, w);
  1380. WaitThreadInit(w->WorkThread);
  1381. Add(tts->WorkerList, w);
  1382. }
  1383. // Notify completion of preparation to parent thread
  1384. NoticeThreadInit(thread);
  1385. // Prepare for IPv6 Accept thread
  1386. tts->IPv6AcceptThread = NULL;
  1387. if (tts->ListenSocketV6 != NULL)
  1388. {
  1389. tts->IPv6AcceptThread = NewThread(TtsIPv6AcceptThread, tts);
  1390. }
  1391. TtsAcceptProc(tts, tts->ListenSocket);
  1392. if (tts->IPv6AcceptThread != NULL)
  1393. {
  1394. WaitThread(tts->IPv6AcceptThread, INFINITE);
  1395. ReleaseThread(tts->IPv6AcceptThread);
  1396. }
  1397. TtPrint(tts->Param, tts->Print, _UU("TTS_LISTEN_STOP"));
  1398. ReleaseSock(tts->ListenSocket);
  1399. ReleaseSock(tts->ListenSocketV6);
  1400. for (i = 0;i < LIST_NUM(tts->WorkerList);i++)
  1401. {
  1402. TTS_WORKER *w = LIST_DATA(tts->WorkerList, i);
  1403. SetSockEvent(w->SockEvent);
  1404. // Wait for stopping the worker thread
  1405. WaitThread(w->WorkThread, INFINITE);
  1406. ReleaseThread(w->WorkThread);
  1407. ReleaseSockEvent(w->SockEvent);
  1408. Free(w);
  1409. }
  1410. }
  1411. }
  1412. // String of the direction in which data flows
  1413. wchar_t *GetTtcTypeStr(UINT type)
  1414. {
  1415. switch (type)
  1416. {
  1417. case TRAFFIC_TYPE_DOWNLOAD:
  1418. return _UU("TTC_TYPE_DOWNLOAD");
  1419. case TRAFFIC_TYPE_UPLOAD:
  1420. return _UU("TTC_TYPE_UPLOAD");
  1421. default:
  1422. return _UU("TTC_TYPE_FULL");
  1423. }
  1424. }
  1425. // Show a Summary
  1426. void TtcPrintSummary(TTC *ttc)
  1427. {
  1428. wchar_t tmp[MAX_SIZE];
  1429. wchar_t tmp2[MAX_SIZE];
  1430. wchar_t *tag = L"%-35s %s";
  1431. // Validate arguments
  1432. if (ttc == NULL)
  1433. {
  1434. return;
  1435. }
  1436. TtPrint(ttc->Param, ttc->Print, L"");
  1437. TtPrint(ttc->Param, ttc->Print, _UU("TTC_SUMMARY_BAR"));
  1438. TtPrint(ttc->Param, ttc->Print, _UU("TTC_SUMMARY_TITLE"));
  1439. TtPrint(ttc->Param, ttc->Print, L"");
  1440. // Destination host name
  1441. StrToUni(tmp2, sizeof(tmp2), ttc->Host);
  1442. UniFormat(tmp, sizeof(tmp), tag, _UU("TTC_SUMMARY_HOST"), tmp2);
  1443. TtPrint(ttc->Param, ttc->Print, tmp);
  1444. // Destination TCP port number
  1445. UniToStru(tmp2, ttc->Port);
  1446. UniFormat(tmp, sizeof(tmp), tag, _UU("TTC_SUMMARY_PORT"), tmp2);
  1447. TtPrint(ttc->Param, ttc->Print, tmp);
  1448. // Number of TCP connections to establish
  1449. UniToStru(tmp2, ttc->NumTcp);
  1450. UniFormat(tmp, sizeof(tmp), tag, _UU("TTC_SUMMARY_NUMTCP"), tmp2);
  1451. TtPrint(ttc->Param, ttc->Print, tmp);
  1452. // Data transmission direction
  1453. UniFormat(tmp, sizeof(tmp), tag, _UU("TTC_SUMMARY_TYPE"), GetTtcTypeStr(ttc->Type));
  1454. TtPrint(ttc->Param, ttc->Print, tmp);
  1455. // Data transmission span
  1456. UniFormat(tmp2, sizeof(tmp2), _UU("TTC_SPAN_STR"), (double)(ttc->Span) / 1000.0);
  1457. UniFormat(tmp, sizeof(tmp), tag, _UU("TTC_SUMMARY_SPAN"), tmp2);
  1458. TtPrint(ttc->Param, ttc->Print, tmp);
  1459. // Correct the data for Ethernet frame
  1460. UniFormat(tmp, sizeof(tmp), tag, _UU("TTC_SUMMARY_ETHER"), ttc->Raw ? _UU("SEC_NO") : _UU("SEC_YES"));
  1461. TtPrint(ttc->Param, ttc->Print, tmp);
  1462. // Measure the total amount of input and output throughput of relay equipment
  1463. UniFormat(tmp, sizeof(tmp), tag, _UU("TTC_SUMMARY_DOUBLE"), ttc->Double ? _UU("SEC_YES") : _UU("SEC_NO"));
  1464. TtPrint(ttc->Param, ttc->Print, tmp);
  1465. TtPrint(ttc->Param, ttc->Print, _UU("TTC_SUMMARY_BAR"));
  1466. TtPrint(ttc->Param, ttc->Print, L"");
  1467. }
  1468. // Stop the communication throughput measurement client
  1469. void StopTtc(TTC *ttc)
  1470. {
  1471. // Validate arguments
  1472. if (ttc == NULL)
  1473. {
  1474. return;
  1475. }
  1476. TtPrint(ttc->Param, ttc->Print, _UU("TTC_STOPPING"));
  1477. ttc->Halt = true;
  1478. }
  1479. // Generate a result
  1480. void TtcGenerateResult(TTC *ttc)
  1481. {
  1482. TT_RESULT *res;
  1483. UINT i;
  1484. // Validate arguments
  1485. if (ttc == NULL)
  1486. {
  1487. return;
  1488. }
  1489. res = &ttc->Result;
  1490. Zero(res, sizeof(TT_RESULT));
  1491. res->Raw = ttc->Raw;
  1492. res->Double = ttc->Double;
  1493. res->Span = ttc->RealSpan;
  1494. for (i = 0;i < LIST_NUM(ttc->ItcSockList);i++)
  1495. {
  1496. TTC_SOCK *ts = LIST_DATA(ttc->ItcSockList, i);
  1497. if (ts->Download == false)
  1498. {
  1499. // Upload
  1500. res->NumBytesUpload += ts->NumBytes;
  1501. }
  1502. else
  1503. {
  1504. // Download
  1505. res->NumBytesDownload += ts->NumBytes;
  1506. }
  1507. }
  1508. if (res->Raw == false)
  1509. {
  1510. // Correct to match the Ethernet
  1511. res->NumBytesDownload = (UINT64)((double)res->NumBytesDownload * 1514.0 / 1460.0);
  1512. res->NumBytesUpload = (UINT64)((double)res->NumBytesUpload * 1514.0 / 1460.0);
  1513. }
  1514. res->NumBytesTotal = res->NumBytesDownload + res->NumBytesUpload;
  1515. // Measure the throughput
  1516. if (res->Span != 0)
  1517. {
  1518. res->BpsUpload = (UINT64)((double)res->NumBytesUpload * 8.0 / ((double)res->Span / 1000.0));
  1519. res->BpsDownload = (UINT64)((double)res->NumBytesDownload * 8.0 / ((double)res->Span / 1000.0));
  1520. }
  1521. if (res->Double)
  1522. {
  1523. res->BpsUpload *= 2ULL;
  1524. res->BpsDownload *= 2ULL;
  1525. }
  1526. res->BpsTotal = res->BpsUpload + res->BpsDownload;
  1527. }
  1528. // Client worker thread
  1529. void TtcWorkerThread(THREAD *thread, void *param)
  1530. {
  1531. TTC_WORKER *w;
  1532. TTC *ttc;
  1533. bool dont_block_next_time = false;
  1534. bool halting = false;
  1535. UINT64 halt_timeout = 0;
  1536. bool all_sockets_blocked;
  1537. wchar_t tmp[MAX_SIZE];
  1538. UCHAR *send_buf_data, *recv_buf_data;
  1539. UINT buf_size;
  1540. UINT64 tmp64;
  1541. if (thread == NULL || param == NULL)
  1542. {
  1543. return;
  1544. }
  1545. w = (TTC_WORKER *)param;
  1546. ttc = w->Ttc;
  1547. // Allocate the data area
  1548. TtGenerateRandomData(&send_buf_data, &buf_size);
  1549. TtGenerateRandomData(&recv_buf_data, &buf_size);
  1550. NoticeThreadInit(thread);
  1551. // Wait for start
  1552. Wait(w->StartEvent, INFINITE);
  1553. // Main loop
  1554. while (true)
  1555. {
  1556. UINT i;
  1557. if (dont_block_next_time == false)
  1558. {
  1559. WaitSockEvent(w->SockEvent, 50);
  1560. }
  1561. dont_block_next_time = false;
  1562. if (ttc->AbnormalTerminated)
  1563. {
  1564. // Abnormal termination occured
  1565. break;
  1566. }
  1567. if (ttc->Halt || ttc->end_tick <= Tick64() || (ttc->Cancel != NULL && (*ttc->Cancel)))
  1568. {
  1569. // End measurement
  1570. if (halting == false)
  1571. {
  1572. if (ttc->Halt || (ttc->Cancel != NULL && (*ttc->Cancel)))
  1573. {
  1574. if ((ttc->flag1++) == 0)
  1575. {
  1576. // User cancel
  1577. TtPrint(ttc->Param, ttc->Print, _UU("TTC_COMM_USER_CANCEL"));
  1578. }
  1579. }
  1580. else
  1581. {
  1582. // Time elapsed
  1583. if ((ttc->flag2++) == 0)
  1584. {
  1585. UniFormat(tmp, sizeof(tmp), _UU("TTC_COMM_END"),
  1586. (double)ttc->Span / 1000.0);
  1587. TtPrint(ttc->Param, ttc->Print, tmp);
  1588. }
  1589. }
  1590. if (ttc->RealSpan == 0)
  1591. {
  1592. ttc->RealSpan = Tick64() - ttc->start_tick;
  1593. }
  1594. halting = true;
  1595. // Wait for reporting data from the server
  1596. halt_timeout = Tick64() + 60000ULL;
  1597. }
  1598. }
  1599. if (halt_timeout != 0)
  1600. {
  1601. bool ok = true;
  1602. // Wait that all TCP connections to finish processing
  1603. for (i = 0;i < LIST_NUM(w->SockList);i++)
  1604. {
  1605. TTC_SOCK *ts = LIST_DATA(w->SockList, i);
  1606. if (ts->Download == false)
  1607. {
  1608. if (ts->ServerUploadReportReceived == false)
  1609. {
  1610. ok = false;
  1611. }
  1612. }
  1613. }
  1614. if (ok)
  1615. {
  1616. // Measurement completed
  1617. w->Ok = true;
  1618. break;
  1619. }
  1620. else
  1621. {
  1622. if (halt_timeout <= Tick64())
  1623. {
  1624. // An error occured
  1625. ttc->AbnormalTerminated = true;
  1626. ttc->ErrorCode = ERR_PROTOCOL_ERROR;
  1627. break;
  1628. }
  1629. }
  1630. }
  1631. all_sockets_blocked = false;
  1632. // Continue to send and receive data
  1633. // until all sockets become block state
  1634. while (all_sockets_blocked == false)
  1635. {
  1636. all_sockets_blocked = true;
  1637. for (i = 0;i < LIST_NUM(w->SockList);i++)
  1638. {
  1639. UINT ret = SOCK_LATER;
  1640. TTC_SOCK *ts = LIST_DATA(w->SockList, i);
  1641. bool blocked_for_this_socket = false;
  1642. UCHAR c = 0;
  1643. UCHAR c_and_session_id[1 + sizeof(UINT64) + sizeof(UINT64)];
  1644. if (halt_timeout != 0)
  1645. {
  1646. if (ts->State != 3 && ts->State != 4)
  1647. {
  1648. if (ts->Download == false)
  1649. {
  1650. if (ts->State != 0)
  1651. {
  1652. ts->State = 3;
  1653. }
  1654. else
  1655. {
  1656. ts->ServerUploadReportReceived = true;
  1657. ts->State = 4;
  1658. }
  1659. }
  1660. else
  1661. {
  1662. ts->State = 4;
  1663. }
  1664. }
  1665. }
  1666. switch (ts->State)
  1667. {
  1668. case 0:
  1669. // Initial state: Specify the direction of
  1670. // the data flow between client-server
  1671. if (ts->Download)
  1672. {
  1673. c = 1;
  1674. }
  1675. else
  1676. {
  1677. c = 0;
  1678. }
  1679. c_and_session_id[0] = c;
  1680. WRITE_UINT64(c_and_session_id + 1, ttc->session_id);
  1681. WRITE_UINT64(c_and_session_id + sizeof(UINT64) + 1, ttc->Span);
  1682. ret = Send(ts->Sock, c_and_session_id, 1 + sizeof(UINT64) + sizeof(UINT64), false);
  1683. if (ret != 0 && ret != SOCK_LATER)
  1684. {
  1685. if (ts->Download)
  1686. {
  1687. ts->State = 1;
  1688. }
  1689. else
  1690. {
  1691. ts->State = 2;
  1692. }
  1693. }
  1694. break;
  1695. case 1:
  1696. // Server -> Client (download)
  1697. ret = Recv(ts->Sock, recv_buf_data, buf_size, false);
  1698. break;
  1699. case 2:
  1700. // Client -> Server (upload)
  1701. ret = Send(ts->Sock, send_buf_data, buf_size, false);
  1702. break;
  1703. case 3:
  1704. // Transmission completion client -> server (upload)
  1705. // Request the data size
  1706. if (ts->NextSendRequestReportTick == 0 ||
  1707. (Tick64() >= ts->NextSendRequestReportTick))
  1708. {
  1709. UCHAR suprise[MAX_SIZE];
  1710. UINT i;
  1711. ts->NextSendRequestReportTick = Tick64() + 200ULL;
  1712. for (i = 0;i < sizeof(suprise);i++)
  1713. {
  1714. suprise[i] = '!';
  1715. }
  1716. ret = Send(ts->Sock, suprise, sizeof(suprise), false);
  1717. }
  1718. ret = Recv(ts->Sock, &tmp64, sizeof(tmp64), false);
  1719. if (ret != 0 && ret != SOCK_LATER && ret == sizeof(tmp64))
  1720. {
  1721. ts->NumBytes = Endian64(tmp64);
  1722. ts->ServerUploadReportReceived = true;
  1723. ts->State = 4;
  1724. }
  1725. break;
  1726. case 4:
  1727. // Do Nothing
  1728. if (Recv(ts->Sock, recv_buf_data, buf_size, false) == SOCK_LATER)
  1729. {
  1730. ret = SOCK_LATER;
  1731. }
  1732. break;
  1733. }
  1734. if (ret == 0)
  1735. {
  1736. // The socket is disconnected
  1737. ttc->AbnormalTerminated = true;
  1738. ttc->ErrorCode = ERR_PROTOCOL_ERROR;
  1739. blocked_for_this_socket = true;
  1740. dont_block_next_time = false;
  1741. if (ts->HideErrMsg == false)
  1742. {
  1743. UniFormat(tmp, sizeof(tmp), _UU("TTC_COMM_DISCONNECTED"), ts->Id);
  1744. TtPrint(ttc->Param, ttc->Print, tmp);
  1745. ts->HideErrMsg = true;
  1746. }
  1747. }
  1748. else if (ret == SOCK_LATER)
  1749. {
  1750. // Delay has occurred
  1751. blocked_for_this_socket = true;
  1752. dont_block_next_time = false;
  1753. }
  1754. else
  1755. {
  1756. if (ts->Download)
  1757. {
  1758. ts->NumBytes += (UINT64)ret;
  1759. }
  1760. }
  1761. if (blocked_for_this_socket == false)
  1762. {
  1763. all_sockets_blocked = false;
  1764. }
  1765. }
  1766. if (ttc->Halt || (ttc->Cancel != NULL && (*ttc->Cancel)))
  1767. {
  1768. all_sockets_blocked = true;
  1769. dont_block_next_time = true;
  1770. }
  1771. if (ttc->end_tick <= Tick64())
  1772. {
  1773. all_sockets_blocked = true;
  1774. dont_block_next_time = true;
  1775. }
  1776. }
  1777. }
  1778. Free(send_buf_data);
  1779. Free(recv_buf_data);
  1780. }
  1781. // Client thread
  1782. void TtcThread(THREAD *thread, void *param)
  1783. {
  1784. TTC *ttc;
  1785. UINT i;
  1786. wchar_t tmp[MAX_SIZE];
  1787. bool ok = false;
  1788. IP ip_ret;
  1789. // Validate arguments
  1790. if (thread == NULL || param == NULL)
  1791. {
  1792. return;
  1793. }
  1794. ttc = (TTC *)param;
  1795. // Ready
  1796. NoticeThreadInit(thread);
  1797. TtcPrintSummary(ttc);
  1798. UniFormat(tmp, sizeof(tmp), _UU("TTC_CONNECT_START"),
  1799. ttc->Host, ttc->Port, ttc->NumTcp);
  1800. TtPrint(ttc->Param, ttc->Print, tmp);
  1801. // Establish all connections to the client
  1802. ttc->ItcSockList = NewList(NULL);
  1803. ok = true;
  1804. Zero(&ip_ret, sizeof(ip_ret));
  1805. for (i = 0;i < ttc->NumTcp;i++)
  1806. {
  1807. SOCK *s;
  1808. TTC_SOCK *ts = ZeroMalloc(sizeof(TTC_SOCK));
  1809. char target_host[MAX_SIZE];
  1810. ts->Id = i + 1;
  1811. if (ttc->Type == TRAFFIC_TYPE_DOWNLOAD)
  1812. {
  1813. ts->Download = true;
  1814. }
  1815. else if (ttc->Type == TRAFFIC_TYPE_UPLOAD)
  1816. {
  1817. ts->Download = false;
  1818. }
  1819. else
  1820. {
  1821. ts->Download = ((i % 2) == 0) ? true : false;
  1822. }
  1823. StrCpy(target_host, sizeof(target_host), ttc->Host);
  1824. if (IsZeroIp(&ip_ret) == false)
  1825. {
  1826. IPToStr(target_host, sizeof(target_host), &ip_ret);
  1827. }
  1828. s = ConnectEx4(target_host, ttc->Port, 0, ttc->Cancel, NULL, NULL, false, false, true, &ip_ret);
  1829. if (s == NULL)
  1830. {
  1831. UniFormat(tmp, sizeof(tmp), _UU("TTC_CONNECT_FAILED"), i + 1);
  1832. TtPrint(ttc->Param, ttc->Print, tmp);
  1833. ok = false;
  1834. Free(ts);
  1835. break;
  1836. }
  1837. else
  1838. {
  1839. char buffer[TRAFFIC_VER_STR_SIZE];
  1840. SetTimeout(s, 5000);
  1841. Zero(buffer, sizeof(buffer));
  1842. if (Recv(s, buffer, sizeof(buffer), false) != sizeof(buffer) || Cmp(buffer, TRAFFIC_VER_STR, TRAFFIC_VER_STR_SIZE) != 0)
  1843. {
  1844. TtPrint(ttc->Param, ttc->Print, _UU("TTC_CONNECT_NOT_SERVER"));
  1845. ok = false;
  1846. ReleaseSock(s);
  1847. Free(ts);
  1848. break;
  1849. }
  1850. UniFormat(tmp, sizeof(tmp), _UU("TTC_CONNECT_OK"), i + 1);
  1851. TtPrint(ttc->Param, ttc->Print, tmp);
  1852. UniFormat(tmp, sizeof(tmp), _UU("TTC_CONNECT_OK_2"), GetTtcTypeStr(ts->Download ? TRAFFIC_TYPE_DOWNLOAD : TRAFFIC_TYPE_UPLOAD));
  1853. TtPrint(ttc->Param, ttc->Print, tmp);
  1854. ts->Sock = s;
  1855. SetTimeout(s, TIMEOUT_INFINITE);
  1856. }
  1857. Insert(ttc->ItcSockList, ts);
  1858. }
  1859. Set(ttc->InitedEvent);
  1860. if (ttc->StartEvent != NULL)
  1861. {
  1862. Wait(ttc->StartEvent, INFINITE);
  1863. SleepThread(500);
  1864. }
  1865. if (ok)
  1866. {
  1867. UINT64 start_tick, end_tick;
  1868. UINT64 halt_timeout = 0;
  1869. wchar_t tmp1[MAX_SIZE], tmp2[MAX_SIZE];
  1870. UINT check_clock_seed = 0;
  1871. bool halting = false;
  1872. UINT64 session_id = Rand64();
  1873. UINT i, num_cpu;
  1874. bool all_ok = false;
  1875. ttc->session_id = session_id;
  1876. num_cpu = GetNumberOfCpu();
  1877. ttc->WorkerThreadList = NewList(NULL);
  1878. for (i = 0;i < num_cpu;i++)
  1879. {
  1880. TTC_WORKER *w = ZeroMalloc(sizeof(TTC_WORKER));
  1881. w->Ttc = ttc;
  1882. w->SockList = NewList(NULL);
  1883. w->StartEvent = NewEvent();
  1884. w->SockEvent = NewSockEvent();
  1885. w->WorkerThread = NewThread(TtcWorkerThread, w);
  1886. WaitThreadInit(w->WorkerThread);
  1887. Add(ttc->WorkerThreadList, w);
  1888. }
  1889. // Assign each of sockets to each of worker threads
  1890. for (i = 0;i < LIST_NUM(ttc->ItcSockList);i++)
  1891. {
  1892. TTC_SOCK *ts = LIST_DATA(ttc->ItcSockList, i);
  1893. UINT num = LIST_NUM(ttc->WorkerThreadList);
  1894. UINT j = i % num;
  1895. TTC_WORKER *w = LIST_DATA(ttc->WorkerThreadList, j);
  1896. Add(w->SockList, ts);
  1897. JoinSockToSockEvent(ts->Sock, w->SockEvent);
  1898. }
  1899. // Record the current time
  1900. start_tick = Tick64();
  1901. end_tick = start_tick + ttc->Span;
  1902. ttc->start_tick = start_tick;
  1903. ttc->end_tick = end_tick;
  1904. // Set the start event for all worker threads
  1905. for (i = 0;i < LIST_NUM(ttc->WorkerThreadList);i++)
  1906. {
  1907. TTC_WORKER *w = LIST_DATA(ttc->WorkerThreadList, i);
  1908. Set(w->StartEvent);
  1909. }
  1910. // Show start message
  1911. GetDateTimeStrEx64(tmp1, sizeof(tmp1), SystemToLocal64(TickToTime(start_tick)), NULL);
  1912. GetDateTimeStrEx64(tmp2, sizeof(tmp2), SystemToLocal64(TickToTime(end_tick)), NULL);
  1913. UniFormat(tmp, sizeof(tmp), _UU("TTC_COMM_START"), tmp1, tmp2);
  1914. TtPrint(ttc->Param, ttc->Print, tmp);
  1915. // Wait for all worker threads finish
  1916. all_ok = true;
  1917. for (i = 0;i < LIST_NUM(ttc->WorkerThreadList);i++)
  1918. {
  1919. TTC_WORKER *w = LIST_DATA(ttc->WorkerThreadList, i);
  1920. WaitThread(w->WorkerThread, INFINITE);
  1921. if (w->Ok == false)
  1922. {
  1923. all_ok = false;
  1924. }
  1925. }
  1926. if (all_ok)
  1927. {
  1928. // Measurement completed
  1929. // Show the result
  1930. TtcGenerateResult(ttc);
  1931. }
  1932. // Release worker threads
  1933. for (i = 0;i < LIST_NUM(ttc->WorkerThreadList);i++)
  1934. {
  1935. TTC_WORKER *w = LIST_DATA(ttc->WorkerThreadList, i);
  1936. ReleaseThread(w->WorkerThread);
  1937. ReleaseEvent(w->StartEvent);
  1938. ReleaseList(w->SockList);
  1939. ReleaseSockEvent(w->SockEvent);
  1940. Free(w);
  1941. }
  1942. ReleaseList(ttc->WorkerThreadList);
  1943. ttc->WorkerThreadList = NULL;
  1944. }
  1945. else
  1946. {
  1947. // Abort
  1948. TtPrint(ttc->Param, ttc->Print, _UU("TTC_ERROR_ABORTED"));
  1949. ttc->ErrorCode = ERR_CONNECT_FAILED;
  1950. }
  1951. // Cleanup
  1952. for (i = 0;i < LIST_NUM(ttc->ItcSockList);i++)
  1953. {
  1954. TTC_SOCK *ts = LIST_DATA(ttc->ItcSockList, i);
  1955. Disconnect(ts->Sock);
  1956. ReleaseSock(ts->Sock);
  1957. Free(ts);
  1958. }
  1959. ReleaseList(ttc->ItcSockList);
  1960. }
  1961. // Start the communication throughput measurement client
  1962. TTC *NewTtc(char *host, UINT port, UINT numtcp, UINT type, UINT64 span, bool dbl, bool raw, TT_PRINT_PROC *print_proc, void *param)
  1963. {
  1964. return NewTtcEx(host, port, numtcp, type, span, dbl, raw, print_proc, param, NULL, NULL);
  1965. }
  1966. TTC *NewTtcEx(char *host, UINT port, UINT numtcp, UINT type, UINT64 span, bool dbl, bool raw, TT_PRINT_PROC *print_proc, void *param, EVENT *start_event, bool *cancel)
  1967. {
  1968. TTC *ttc;
  1969. ttc = ZeroMalloc(sizeof(TTC));
  1970. ttc->InitedEvent = NewEvent();
  1971. ttc->Port = port;
  1972. StrCpy(ttc->Host, sizeof(ttc->Host), host);
  1973. ttc->NumTcp = numtcp;
  1974. ttc->Type = type;
  1975. ttc->Span = span;
  1976. ttc->Double = dbl;
  1977. ttc->Raw = raw;
  1978. ttc->StartEvent = start_event;
  1979. ttc->Cancel = cancel;
  1980. if (ttc->Type == TRAFFIC_TYPE_FULL && ttc->NumTcp < 2)
  1981. {
  1982. ttc->NumTcp = 2;
  1983. }
  1984. ttc->Print = print_proc;
  1985. ttc->Param = param;
  1986. ttc->ErrorCode = ERR_NO_ERROR;
  1987. TtPrint(ttc->Param, ttc->Print, _UU("TTC_INIT"));
  1988. ttc->Thread = NewThread(TtcThread, ttc);
  1989. WaitThreadInit(ttc->Thread);
  1990. return ttc;
  1991. }
  1992. // Wait for stopping the communication throughput measurement client
  1993. UINT FreeTtc(TTC *ttc, TT_RESULT *result)
  1994. {
  1995. UINT ret;
  1996. // Validate arguments
  1997. if (ttc == NULL)
  1998. {
  1999. return ERR_INVALID_PARAMETER;
  2000. }
  2001. WaitThread(ttc->Thread, INFINITE);
  2002. ReleaseThread(ttc->Thread);
  2003. TtPrint(ttc->Param, ttc->Print, _UU("TTC_FREE"));
  2004. ret = ttc->ErrorCode;
  2005. if (ret == ERR_NO_ERROR)
  2006. {
  2007. if (result != NULL)
  2008. {
  2009. Copy(result, &ttc->Result, sizeof(TT_RESULT));
  2010. }
  2011. }
  2012. ReleaseEvent(ttc->InitedEvent);
  2013. Free(ttc);
  2014. return ret;
  2015. }
  2016. // Start the communication throughput measurement server
  2017. TTS *NewTts(UINT port, void *param, TT_PRINT_PROC *print_proc)
  2018. {
  2019. TTS *tts;
  2020. THREAD *t;
  2021. tts = ZeroMalloc(sizeof(TTS));
  2022. tts->Port = port;
  2023. tts->Param = param;
  2024. tts->Print = print_proc;
  2025. TtPrint(param, print_proc, _UU("TTS_INIT"));
  2026. tts->WorkerList = NewList(NULL);
  2027. // Creating a thread
  2028. t = NewThread(TtsListenThread, tts);
  2029. WaitThreadInit(t);
  2030. tts->Thread = t;
  2031. return tts;
  2032. }
  2033. // Wait for stopping the communication throughput measurement server
  2034. UINT FreeTts(TTS *tts)
  2035. {
  2036. UINT ret;
  2037. // Validate arguments
  2038. if (tts == NULL)
  2039. {
  2040. return ERR_INVALID_PARAMETER;
  2041. }
  2042. TtPrint(tts->Param, tts->Print, _UU("TTS_STOP_INIT"));
  2043. tts->Halt = true;
  2044. Disconnect(tts->ListenSocket);
  2045. ReleaseSock(tts->ListenSocket);
  2046. Disconnect(tts->ListenSocketV6);
  2047. ReleaseSock(tts->ListenSocketV6);
  2048. // Wait for the termination of the thread
  2049. WaitThread(tts->Thread, INFINITE);
  2050. ReleaseThread(tts->Thread);
  2051. TtPrint(tts->Param, tts->Print, _UU("TTS_STOP_FINISHED"));
  2052. ret = tts->ErrorCode;
  2053. ReleaseList(tts->WorkerList);
  2054. Free(tts);
  2055. return ret;
  2056. }
  2057. // Show the measurement tools prompt
  2058. void PtTrafficPrintProc(void *param, wchar_t *str)
  2059. {
  2060. CONSOLE *c;
  2061. // Validate arguments
  2062. if (param == NULL || str == NULL)
  2063. {
  2064. return;
  2065. }
  2066. c = (CONSOLE *)param;
  2067. if (c->ConsoleType == CONSOLE_LOCAL)
  2068. {
  2069. Lock(c->OutputLock);
  2070. {
  2071. wchar_t tmp[MAX_SIZE];
  2072. // Display only if the local console
  2073. // (Can not be displayed because threads aren't synchronized otherwise?)
  2074. UniStrCpy(tmp, sizeof(tmp), str);
  2075. if (UniEndWith(str, L"\n") == false)
  2076. {
  2077. UniStrCat(tmp, sizeof(tmp), L"\n");
  2078. }
  2079. UniPrint(L"%s", tmp);
  2080. }
  2081. Unlock(c->OutputLock);
  2082. }
  2083. }
  2084. // Display the communication throughput results
  2085. void TtcPrintResult(CONSOLE *c, TT_RESULT *res)
  2086. {
  2087. CT *ct;
  2088. wchar_t tmp[MAX_SIZE];
  2089. wchar_t tmp1[MAX_SIZE];
  2090. wchar_t tmp2[MAX_SIZE];
  2091. char str[MAX_SIZE];
  2092. // Validate arguments
  2093. if (c == NULL || res == NULL)
  2094. {
  2095. return;
  2096. }
  2097. c->Write(c, _UU("TTC_RES_TITLE"));
  2098. ct = CtNew();
  2099. CtInsertColumn(ct, _UU("TTC_RES_COLUMN_1"), false);
  2100. CtInsertColumn(ct, _UU("TTC_RES_COLUMN_2"), true);
  2101. CtInsertColumn(ct, _UU("TTC_RES_COLUMN_3"), true);
  2102. // Time that was used to measure
  2103. GetSpanStrMilli(str, sizeof(str), res->Span);
  2104. StrToUni(tmp, sizeof(tmp), str);
  2105. CtInsert(ct, _UU("TTC_RES_SPAN"), tmp, L"");
  2106. // Correct the data for Ethernet frame
  2107. CtInsert(ct, _UU("TTC_RES_ETHER"), res->Raw ? _UU("SEC_NO") : _UU("SEC_YES"), L"");
  2108. // Amount of communication data of download direction
  2109. ToStr3(str, sizeof(str), res->NumBytesDownload);
  2110. UniFormat(tmp1, sizeof(tmp1), L"%S Bytes", str);
  2111. ToStrByte1000(str, sizeof(str), res->NumBytesDownload);
  2112. StrToUni(tmp2, sizeof(tmp2), str);
  2113. CtInsert(ct, _UU("TTC_RES_BYTES_DOWNLOAD"), tmp1, tmp2);
  2114. // Amount of communication data of upload direction
  2115. ToStr3(str, sizeof(str), res->NumBytesUpload);
  2116. UniFormat(tmp1, sizeof(tmp1), L"%S Bytes", str);
  2117. ToStrByte1000(str, sizeof(str), res->NumBytesUpload);
  2118. StrToUni(tmp2, sizeof(tmp2), str);
  2119. CtInsert(ct, _UU("TTC_RES_BYTES_UPLOAD"), tmp1, tmp2);
  2120. // Total amount of communication data
  2121. ToStr3(str, sizeof(str), res->NumBytesTotal);
  2122. UniFormat(tmp1, sizeof(tmp1), L"%S Bytes", str);
  2123. ToStrByte1000(str, sizeof(str), res->NumBytesTotal);
  2124. StrToUni(tmp2, sizeof(tmp2), str);
  2125. CtInsert(ct, _UU("TTC_RES_BYTES_TOTAL"), tmp1, tmp2);
  2126. // Calculate the total throughput of input and output of the relay equipment
  2127. CtInsert(ct, _UU("TTC_RES_DOUBLE"), (res->Double == false) ? _UU("SEC_NO") : _UU("SEC_YES"), L"");
  2128. // Average throughput of download direction
  2129. ToStr3(str, sizeof(str), res->BpsDownload);
  2130. UniFormat(tmp1, sizeof(tmp1), L"%S bps", str);
  2131. ToStrByte1000(str, sizeof(str), res->BpsDownload);
  2132. ReplaceStr(str, sizeof(str), str, "Bytes", "bps");
  2133. StrToUni(tmp2, sizeof(tmp2), str);
  2134. CtInsert(ct, _UU("TTC_RES_BPS_DOWNLOAD"), tmp1, tmp2);
  2135. // Average throughput of upload direction
  2136. ToStr3(str, sizeof(str), res->BpsUpload);
  2137. UniFormat(tmp1, sizeof(tmp1), L"%S bps", str);
  2138. ToStrByte1000(str, sizeof(str), res->BpsUpload);
  2139. ReplaceStr(str, sizeof(str), str, "Bytes", "bps");
  2140. StrToUni(tmp2, sizeof(tmp2), str);
  2141. CtInsert(ct, _UU("TTC_RES_BPS_UPLOAD"), tmp1, tmp2);
  2142. // Total average throughput
  2143. ToStr3(str, sizeof(str), res->BpsTotal);
  2144. UniFormat(tmp1, sizeof(tmp1), L"%S bps", str);
  2145. ToStrByte1000(str, sizeof(str), res->BpsTotal);
  2146. ReplaceStr(str, sizeof(str), str, "Bytes", "bps");
  2147. StrToUni(tmp2, sizeof(tmp2), str);
  2148. CtInsert(ct, _UU("TTC_RES_BPS_TOTAL"), tmp1, tmp2);
  2149. CtFree(ct, c);
  2150. }
  2151. // Execute the communication throughput measurement tool server
  2152. UINT PtTrafficServer(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2153. {
  2154. LIST *o;
  2155. UINT ret = ERR_NO_ERROR;
  2156. UINT port;
  2157. bool nohup;
  2158. TTS *tts;
  2159. PARAM args[] =
  2160. {
  2161. {"[port]", NULL, NULL, NULL, NULL},
  2162. {"NOHUP", NULL, NULL, NULL, NULL},
  2163. };
  2164. // Get the parameter list
  2165. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2166. if (o == NULL)
  2167. {
  2168. return ERR_INVALID_PARAMETER;
  2169. }
  2170. port = GetParamInt(o, "[port]");
  2171. if (port == 0)
  2172. {
  2173. port = TRAFFIC_DEFAULT_PORT;
  2174. }
  2175. nohup = GetParamYes(o, "nohup");
  2176. tts = NewTts(port, c, PtTrafficPrintProc);
  2177. if (nohup)
  2178. {
  2179. while (true)
  2180. {
  2181. SleepThread(10000);
  2182. }
  2183. }
  2184. c->Write(c, _UU("TTS_ENTER_TO_EXIT"));
  2185. Free(c->ReadLine(c, L"", true));
  2186. ret = tts->ErrorCode;
  2187. FreeTts(tts);
  2188. if (ret != ERR_NO_ERROR)
  2189. {
  2190. CmdPrintError(c, ret);
  2191. }
  2192. // Release of the parameter list
  2193. FreeParamValueList(o);
  2194. return ret;
  2195. }
  2196. // Execute the communication throughput measurement tool client
  2197. UINT PtTrafficClient(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2198. {
  2199. TTC *ttc;
  2200. LIST *o;
  2201. UINT ret = ERR_NO_ERROR;
  2202. char *host = NULL;
  2203. UINT port;
  2204. UINT num, type;
  2205. bool dbl = false, raw = false;
  2206. UINT64 span;
  2207. // Parameter list that can be specified
  2208. CMD_EVAL_MIN_MAX minmax =
  2209. {
  2210. "CMD_TrafficClient_EVAL_NUMTCP",
  2211. 0, TRAFFIC_NUMTCP_MAX,
  2212. };
  2213. PARAM args[] =
  2214. {
  2215. {"[host:port]", CmdPrompt, _UU("CMD_TrafficClient_PROMPT_HOST"), CmdEvalNotEmpty, NULL},
  2216. {"NUMTCP", NULL, NULL, CmdEvalMinMax, &minmax},
  2217. {"TYPE", NULL, NULL, NULL, NULL},
  2218. {"SPAN", NULL, NULL, NULL, NULL},
  2219. {"DOUBLE", NULL, NULL, NULL, NULL},
  2220. {"RAW", NULL, NULL, NULL, NULL},
  2221. };
  2222. // Get the parameter list
  2223. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2224. if (o == NULL)
  2225. {
  2226. return ERR_INVALID_PARAMETER;
  2227. }
  2228. if (ParseHostPort(GetParamStr(o, "[host:port]"), &host, &port, TRAFFIC_DEFAULT_PORT) == false)
  2229. {
  2230. c->Write(c, _UU("CMD_TrafficClient_ERROR_HOSTPORT"));
  2231. ret = ERR_INVALID_PARAMETER;
  2232. }
  2233. else
  2234. {
  2235. char *s;
  2236. UINT i;
  2237. Trim(host);
  2238. num = GetParamInt(o, "NUMTCP");
  2239. if (num == 0)
  2240. {
  2241. num = TRAFFIC_NUMTCP_DEFAULT;
  2242. }
  2243. s = GetParamStr(o, "TYPE");
  2244. if (StartWith("download", s))
  2245. {
  2246. type = TRAFFIC_TYPE_DOWNLOAD;
  2247. }
  2248. else if (StartWith("upload", s))
  2249. {
  2250. type = TRAFFIC_TYPE_UPLOAD;
  2251. }
  2252. else
  2253. {
  2254. type = TRAFFIC_TYPE_FULL;
  2255. }
  2256. i = GetParamInt(o, "SPAN");
  2257. if (i == 0)
  2258. {
  2259. i = TRAFFIC_SPAN_DEFAULT;
  2260. }
  2261. span = (UINT64)i * 1000ULL;
  2262. dbl = GetParamYes(o, "DOUBLE");
  2263. raw = GetParamYes(o, "RAW");
  2264. if (type == TRAFFIC_TYPE_FULL)
  2265. {
  2266. if ((num % 2) != 0)
  2267. {
  2268. ret = ERR_INVALID_PARAMETER;
  2269. c->Write(c, _UU("CMD_TrafficClient_ERROR_NUMTCP"));
  2270. }
  2271. }
  2272. if (ret == ERR_NO_ERROR)
  2273. {
  2274. TT_RESULT result;
  2275. ttc = NewTtc(host, port, num, type, span, dbl, raw, PtTrafficPrintProc, c);
  2276. if (c->ConsoleType == CONSOLE_LOCAL)
  2277. {
  2278. if (c->Param != NULL && (((LOCAL_CONSOLE_PARAM *)c->Param)->InBuf == NULL))
  2279. {
  2280. // c->Write(c, _UU("TTC_ENTER_TO_EXIT"));
  2281. // GetLine(NULL, 0);
  2282. // StopTtc(ttc);
  2283. }
  2284. }
  2285. Zero(&result, sizeof(result));
  2286. ret = FreeTtc(ttc, &result);
  2287. if (ret == ERR_NO_ERROR)
  2288. {
  2289. TtcPrintResult(c, &result);
  2290. }
  2291. }
  2292. }
  2293. if (ret != ERR_NO_ERROR)
  2294. {
  2295. CmdPrintError(c, ret);
  2296. }
  2297. // Release of the parameter list
  2298. FreeParamValueList(o);
  2299. Free(host);
  2300. return ret;
  2301. }
  2302. // Certificate easy creation tool (1024 bit)
  2303. UINT PtMakeCert(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2304. {
  2305. LIST *o;
  2306. UINT ret = ERR_NO_ERROR;
  2307. X *x = NULL;
  2308. K *pub = NULL;
  2309. K *pri = NULL;
  2310. NAME *n;
  2311. X_SERIAL *x_serial = NULL;
  2312. BUF *buf;
  2313. UINT days;
  2314. X *root_x = NULL;
  2315. K *root_k = NULL;
  2316. // Parameter list that can be specified
  2317. CMD_EVAL_MIN_MAX minmax =
  2318. {
  2319. "CMD_MakeCert_EVAL_EXPIRES",
  2320. 0,
  2321. 10950,
  2322. };
  2323. PARAM args[] =
  2324. {
  2325. {"CN", CmdPrompt, _UU("CMD_MakeCert_PROMPT_CN"), NULL, NULL},
  2326. {"O", CmdPrompt, _UU("CMD_MakeCert_PROMPT_O"), NULL, NULL},
  2327. {"OU", CmdPrompt, _UU("CMD_MakeCert_PROMPT_OU"), NULL, NULL},
  2328. {"C", CmdPrompt, _UU("CMD_MakeCert_PROMPT_C"), NULL, NULL},
  2329. {"ST", CmdPrompt, _UU("CMD_MakeCert_PROMPT_ST"), NULL, NULL},
  2330. {"L", CmdPrompt, _UU("CMD_MakeCert_PROMPT_L"), NULL, NULL},
  2331. {"SERIAL", CmdPrompt, _UU("CMD_MakeCert_PROMPT_SERIAL"), NULL, NULL},
  2332. {"EXPIRES", CmdPrompt, _UU("CMD_MakeCert_PROMPT_EXPIRES"), CmdEvalMinMax, &minmax},
  2333. {"SIGNCERT", NULL, NULL, CmdEvalIsFile, NULL},
  2334. {"SIGNKEY", NULL, NULL, CmdEvalIsFile, NULL},
  2335. {"SAVECERT", CmdPrompt, _UU("CMD_MakeCert_PROMPT_SAVECERT"), CmdEvalNotEmpty, NULL},
  2336. {"SAVEKEY", CmdPrompt, _UU("CMD_MakeCert_PROMPT_SAVEKEY"), CmdEvalNotEmpty, NULL},
  2337. };
  2338. // Get the parameter list
  2339. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2340. if (o == NULL)
  2341. {
  2342. return ERR_INVALID_PARAMETER;
  2343. }
  2344. if (IsEmptyStr(GetParamStr(o, "SIGNCERT")) == false && IsEmptyStr(GetParamStr(o, "SIGNKEY")) == false)
  2345. {
  2346. root_x = FileToXW(GetParamUniStr(o, "SIGNCERT"));
  2347. root_k = FileToKW(GetParamUniStr(o, "SIGNKEY"), true, NULL);
  2348. if (root_x == NULL || root_k == NULL || CheckXandK(root_x, root_k) == false)
  2349. {
  2350. ret = ERR_INTERNAL_ERROR;
  2351. c->Write(c, _UU("CMD_MakeCert_ERROR_SIGNKEY"));
  2352. }
  2353. }
  2354. if (ret == ERR_NO_ERROR)
  2355. {
  2356. buf = StrToBin(GetParamStr(o, "SERIAL"));
  2357. if (buf != NULL && buf->Size >= 1)
  2358. {
  2359. x_serial = NewXSerial(buf->Buf, buf->Size);
  2360. }
  2361. FreeBuf(buf);
  2362. n = NewName(GetParamUniStr(o, "CN"), GetParamUniStr(o, "O"), GetParamUniStr(o, "OU"),
  2363. GetParamUniStr(o, "C"), GetParamUniStr(o, "ST"), GetParamUniStr(o, "L"));
  2364. days = GetParamInt(o, "EXPIRES");
  2365. if (days == 0)
  2366. {
  2367. days = 3650;
  2368. }
  2369. RsaGen(&pri, &pub, 1024);
  2370. if (root_x == NULL)
  2371. {
  2372. x = NewRootX(pub, pri, n, days, x_serial);
  2373. }
  2374. else
  2375. {
  2376. x = NewX(pub, root_k, root_x, n, days, x_serial);
  2377. }
  2378. FreeXSerial(x_serial);
  2379. FreeName(n);
  2380. if (x == NULL)
  2381. {
  2382. ret = ERR_INTERNAL_ERROR;
  2383. c->Write(c, _UU("CMD_MakeCert_ERROR_GEN_FAILED"));
  2384. }
  2385. else
  2386. {
  2387. if (XToFileW(x, GetParamUniStr(o, "SAVECERT"), true) == false)
  2388. {
  2389. c->Write(c, _UU("CMD_SAVECERT_FAILED"));
  2390. }
  2391. else if (KToFileW(pri, GetParamUniStr(o, "SAVEKEY"), true, NULL) == false)
  2392. {
  2393. c->Write(c, _UU("CMD_SAVEKEY_FAILED"));
  2394. }
  2395. }
  2396. }
  2397. if (ret != ERR_NO_ERROR)
  2398. {
  2399. // Error has occurred
  2400. CmdPrintError(c, ret);
  2401. }
  2402. // Release of the parameter list
  2403. FreeParamValueList(o);
  2404. FreeX(root_x);
  2405. FreeK(root_k);
  2406. FreeX(x);
  2407. FreeK(pri);
  2408. FreeK(pub);
  2409. return ret;
  2410. }
  2411. // Certificate easy creation tool (2048 bit)
  2412. UINT PtMakeCert2048(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2413. {
  2414. LIST *o;
  2415. UINT ret = ERR_NO_ERROR;
  2416. X *x = NULL;
  2417. K *pub = NULL;
  2418. K *pri = NULL;
  2419. NAME *n;
  2420. X_SERIAL *x_serial = NULL;
  2421. BUF *buf;
  2422. UINT days;
  2423. X *root_x = NULL;
  2424. K *root_k = NULL;
  2425. // Parameter list that can be specified
  2426. CMD_EVAL_MIN_MAX minmax =
  2427. {
  2428. "CMD_MakeCert_EVAL_EXPIRES",
  2429. 0,
  2430. 10950,
  2431. };
  2432. PARAM args[] =
  2433. {
  2434. {"CN", CmdPrompt, _UU("CMD_MakeCert_PROMPT_CN"), NULL, NULL},
  2435. {"O", CmdPrompt, _UU("CMD_MakeCert_PROMPT_O"), NULL, NULL},
  2436. {"OU", CmdPrompt, _UU("CMD_MakeCert_PROMPT_OU"), NULL, NULL},
  2437. {"C", CmdPrompt, _UU("CMD_MakeCert_PROMPT_C"), NULL, NULL},
  2438. {"ST", CmdPrompt, _UU("CMD_MakeCert_PROMPT_ST"), NULL, NULL},
  2439. {"L", CmdPrompt, _UU("CMD_MakeCert_PROMPT_L"), NULL, NULL},
  2440. {"SERIAL", CmdPrompt, _UU("CMD_MakeCert_PROMPT_SERIAL"), NULL, NULL},
  2441. {"EXPIRES", CmdPrompt, _UU("CMD_MakeCert_PROMPT_EXPIRES"), CmdEvalMinMax, &minmax},
  2442. {"SIGNCERT", NULL, NULL, CmdEvalIsFile, NULL},
  2443. {"SIGNKEY", NULL, NULL, CmdEvalIsFile, NULL},
  2444. {"SAVECERT", CmdPrompt, _UU("CMD_MakeCert_PROMPT_SAVECERT"), CmdEvalNotEmpty, NULL},
  2445. {"SAVEKEY", CmdPrompt, _UU("CMD_MakeCert_PROMPT_SAVEKEY"), CmdEvalNotEmpty, NULL},
  2446. };
  2447. // Get the parameter list
  2448. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2449. if (o == NULL)
  2450. {
  2451. return ERR_INVALID_PARAMETER;
  2452. }
  2453. if (IsEmptyStr(GetParamStr(o, "SIGNCERT")) == false && IsEmptyStr(GetParamStr(o, "SIGNKEY")) == false)
  2454. {
  2455. root_x = FileToXW(GetParamUniStr(o, "SIGNCERT"));
  2456. root_k = FileToKW(GetParamUniStr(o, "SIGNKEY"), true, NULL);
  2457. if (root_x == NULL || root_k == NULL || CheckXandK(root_x, root_k) == false)
  2458. {
  2459. ret = ERR_INTERNAL_ERROR;
  2460. c->Write(c, _UU("CMD_MakeCert_ERROR_SIGNKEY"));
  2461. }
  2462. }
  2463. if (ret == ERR_NO_ERROR)
  2464. {
  2465. buf = StrToBin(GetParamStr(o, "SERIAL"));
  2466. if (buf != NULL && buf->Size >= 1)
  2467. {
  2468. x_serial = NewXSerial(buf->Buf, buf->Size);
  2469. }
  2470. FreeBuf(buf);
  2471. n = NewName(GetParamUniStr(o, "CN"), GetParamUniStr(o, "O"), GetParamUniStr(o, "OU"),
  2472. GetParamUniStr(o, "C"), GetParamUniStr(o, "ST"), GetParamUniStr(o, "L"));
  2473. days = GetParamInt(o, "EXPIRES");
  2474. if (days == 0)
  2475. {
  2476. days = 3650;
  2477. }
  2478. RsaGen(&pri, &pub, 2048);
  2479. if (root_x == NULL)
  2480. {
  2481. x = NewRootX(pub, pri, n, days, x_serial);
  2482. }
  2483. else
  2484. {
  2485. x = NewX(pub, root_k, root_x, n, days, x_serial);
  2486. }
  2487. FreeXSerial(x_serial);
  2488. FreeName(n);
  2489. if (x == NULL)
  2490. {
  2491. ret = ERR_INTERNAL_ERROR;
  2492. c->Write(c, _UU("CMD_MakeCert_ERROR_GEN_FAILED"));
  2493. }
  2494. else
  2495. {
  2496. if (XToFileW(x, GetParamUniStr(o, "SAVECERT"), true) == false)
  2497. {
  2498. c->Write(c, _UU("CMD_SAVECERT_FAILED"));
  2499. }
  2500. else if (KToFileW(pri, GetParamUniStr(o, "SAVEKEY"), true, NULL) == false)
  2501. {
  2502. c->Write(c, _UU("CMD_SAVEKEY_FAILED"));
  2503. }
  2504. }
  2505. }
  2506. if (ret != ERR_NO_ERROR)
  2507. {
  2508. // Error has occurred
  2509. CmdPrintError(c, ret);
  2510. }
  2511. // Release of the parameter list
  2512. FreeParamValueList(o);
  2513. FreeX(root_x);
  2514. FreeK(root_k);
  2515. FreeX(x);
  2516. FreeK(pri);
  2517. FreeK(pub);
  2518. return ret;
  2519. }
  2520. // Client management tool main
  2521. void PcMain(PC *pc)
  2522. {
  2523. char prompt[MAX_SIZE];
  2524. wchar_t tmp[MAX_SIZE];
  2525. // Validate arguments
  2526. if (pc == NULL)
  2527. {
  2528. return;
  2529. }
  2530. // Display a message that the connection has been made
  2531. UniFormat(tmp, sizeof(tmp), _UU("CMD_VPNCMD_CLIENT_CONNECTED"),
  2532. pc->ServerName);
  2533. pc->Console->Write(pc->Console, tmp);
  2534. pc->Console->Write(pc->Console, L"");
  2535. while (true)
  2536. {
  2537. // Definition of command
  2538. CMD cmd[] =
  2539. {
  2540. {"About", PsAbout},
  2541. {"Check", PtCheck},
  2542. {"VersionGet", PcVersionGet},
  2543. {"PasswordSet", PcPasswordSet},
  2544. {"PasswordGet", PcPasswordGet},
  2545. {"CertList", PcCertList},
  2546. {"CertAdd", PcCertAdd},
  2547. {"CertDelete", PcCertDelete},
  2548. {"CertGet", PcCertGet},
  2549. {"SecureList", PcSecureList},
  2550. {"SecureSelect", PcSecureSelect},
  2551. {"SecureGet", PcSecureGet},
  2552. {"NicCreate", PcNicCreate},
  2553. {"NicDelete", PcNicDelete},
  2554. {"NicUpgrade", PcNicUpgrade},
  2555. {"NicGetSetting", PcNicGetSetting},
  2556. {"NicSetSetting", PcNicSetSetting},
  2557. {"NicEnable", PcNicEnable},
  2558. {"NicDisable", PcNicDisable},
  2559. {"NicList", PcNicList},
  2560. {"AccountList", PcAccountList},
  2561. {"AccountCreate", PcAccountCreate},
  2562. {"AccountSet", PcAccountSet},
  2563. {"AccountGet", PcAccountGet},
  2564. {"AccountDelete", PcAccountDelete},
  2565. {"AccountUsernameSet", PcAccountUsernameSet},
  2566. {"AccountAnonymousSet", PcAccountAnonymousSet},
  2567. {"AccountPasswordSet", PcAccountPasswordSet},
  2568. {"AccountCertSet", PcAccountCertSet},
  2569. {"AccountCertGet", PcAccountCertGet},
  2570. {"AccountEncryptDisable", PcAccountEncryptDisable},
  2571. {"AccountEncryptEnable", PcAccountEncryptEnable},
  2572. {"AccountCompressEnable", PcAccountCompressEnable},
  2573. {"AccountCompressDisable", PcAccountCompressDisable},
  2574. {"AccountProxyNone", PcAccountProxyNone},
  2575. {"AccountProxyHttp", PcAccountProxyHttp},
  2576. {"AccountProxySocks", PcAccountProxySocks},
  2577. {"AccountServerCertEnable", PcAccountServerCertEnable},
  2578. {"AccountServerCertDisable", PcAccountServerCertDisable},
  2579. {"AccountServerCertSet", PcAccountServerCertSet},
  2580. {"AccountServerCertDelete", PcAccountServerCertDelete},
  2581. {"AccountServerCertGet", PcAccountServerCertGet},
  2582. {"AccountDetailSet", PcAccountDetailSet},
  2583. {"AccountRename", PcAccountRename},
  2584. {"AccountConnect", PcAccountConnect},
  2585. {"AccountDisconnect", PcAccountDisconnect},
  2586. {"AccountStatusGet", PcAccountStatusGet},
  2587. {"AccountNicSet", PcAccountNicSet},
  2588. {"AccountStatusShow", PcAccountStatusShow},
  2589. {"AccountStatusHide", PcAccountStatusHide},
  2590. {"AccountSecureCertSet", PcAccountSecureCertSet},
  2591. {"AccountRetrySet", PcAccountRetrySet},
  2592. {"AccountStartupSet", PcAccountStartupSet},
  2593. {"AccountStartupRemove", PcAccountStartupRemove},
  2594. {"AccountExport", PcAccountExport},
  2595. {"AccountImport", PcAccountImport},
  2596. {"RemoteEnable", PcRemoteEnable},
  2597. {"RemoteDisable", PcRemoteDisable},
  2598. {"KeepEnable", PcKeepEnable},
  2599. {"KeepDisable", PcKeepDisable},
  2600. {"KeepSet", PcKeepSet},
  2601. {"KeepGet", PcKeepGet},
  2602. {"MakeCert", PtMakeCert},
  2603. {"MakeCert2048", PtMakeCert2048},
  2604. {"TrafficClient", PtTrafficClient},
  2605. {"TrafficServer", PtTrafficServer},
  2606. };
  2607. // Generate a prompt
  2608. StrCpy(prompt, sizeof(prompt), "VPN Client>");
  2609. if (DispatchNextCmdEx(pc->Console, pc->CmdLine, prompt, cmd, sizeof(cmd) / sizeof(cmd[0]), pc) == false)
  2610. {
  2611. break;
  2612. }
  2613. pc->LastError = pc->Console->RetCode;
  2614. if (pc->LastError == ERR_NO_ERROR && pc->Console->ConsoleType != CONSOLE_CSV)
  2615. {
  2616. pc->Console->Write(pc->Console, _UU("CMD_MSG_OK"));
  2617. pc->Console->Write(pc->Console, L"");
  2618. }
  2619. if (pc->CmdLine != NULL)
  2620. {
  2621. break;
  2622. }
  2623. }
  2624. }
  2625. // Retrieve the version information of VPN Client service
  2626. UINT PcVersionGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2627. {
  2628. LIST *o;
  2629. PC *pc = (PC *)param;
  2630. UINT ret = ERR_NO_ERROR;
  2631. RPC_CLIENT_VERSION t;
  2632. // Get the parameter list
  2633. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  2634. if (o == NULL)
  2635. {
  2636. return ERR_INVALID_PARAMETER;
  2637. }
  2638. // RPC call
  2639. Zero(&t, sizeof(t));
  2640. ret = CcGetClientVersion(pc->RemoteClient, &t);
  2641. if (ret == ERR_NO_ERROR)
  2642. {
  2643. wchar_t tmp[MAX_SIZE];
  2644. CT *ct;
  2645. // Success
  2646. ct = CtNewStandard();
  2647. StrToUni(tmp, sizeof(tmp), t.ClientProductName);
  2648. CtInsert(ct, _UU("CMD_VersionGet_1"), tmp);
  2649. StrToUni(tmp, sizeof(tmp), t.ClientVersionString);
  2650. CtInsert(ct, _UU("CMD_VersionGet_2"), tmp);
  2651. StrToUni(tmp, sizeof(tmp), t.ClientBuildInfoString);
  2652. CtInsert(ct, _UU("CMD_VersionGet_3"), tmp);
  2653. UniToStru(tmp, t.ProcessId);
  2654. CtInsert(ct, _UU("CMD_VersionGet_4"), tmp);
  2655. StrToUni(tmp, sizeof(tmp), OsTypeToStr(t.OsType));
  2656. CtInsert(ct, _UU("CMD_VersionGet_5"), tmp);
  2657. CtFree(ct, c);
  2658. }
  2659. if (ret != ERR_NO_ERROR)
  2660. {
  2661. // Error has occurred
  2662. CmdPrintError(c, ret);
  2663. }
  2664. // Release the parameter list
  2665. FreeParamValueList(o);
  2666. return ret;
  2667. }
  2668. // Set a password to connect to the VPN Client Service
  2669. UINT PcPasswordSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2670. {
  2671. LIST *o;
  2672. PC *pc = (PC *)param;
  2673. UINT ret = ERR_NO_ERROR;
  2674. RPC_CLIENT_PASSWORD t;
  2675. // Parameter list that can be specified
  2676. PARAM args[] =
  2677. {
  2678. {"[password]", CmdPromptChoosePassword, NULL, NULL, NULL},
  2679. {"REMOTEONLY", NULL, NULL, NULL, NULL},
  2680. };
  2681. // Get the parameter list
  2682. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2683. if (o == NULL)
  2684. {
  2685. return ERR_INVALID_PARAMETER;
  2686. }
  2687. // RPC call
  2688. Zero(&t, sizeof(t));
  2689. StrCpy(t.Password, sizeof(t.Password), GetParamStr(o, "[password]"));
  2690. t.PasswordRemoteOnly = GetParamYes(o, "REMOTEONLY");
  2691. ret = CcSetPassword(pc->RemoteClient, &t);
  2692. if (ret == ERR_NO_ERROR)
  2693. {
  2694. // Success
  2695. }
  2696. if (ret != ERR_NO_ERROR)
  2697. {
  2698. // Error has occurred
  2699. CmdPrintError(c, ret);
  2700. }
  2701. // Release of the parameter list
  2702. FreeParamValueList(o);
  2703. return ret;
  2704. }
  2705. // Get the settings of the password to connect to the VPN Client service
  2706. UINT PcPasswordGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2707. {
  2708. LIST *o;
  2709. PC *pc = (PC *)param;
  2710. UINT ret = ERR_NO_ERROR;
  2711. RPC_CLIENT_PASSWORD_SETTING t;
  2712. // Get the parameter list
  2713. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  2714. if (o == NULL)
  2715. {
  2716. return ERR_INVALID_PARAMETER;
  2717. }
  2718. // RPC call
  2719. Zero(&t, sizeof(t));
  2720. ret = CcGetPasswordSetting(pc->RemoteClient, &t);
  2721. if (ret == ERR_NO_ERROR)
  2722. {
  2723. // Success
  2724. CT *ct = CtNewStandard();
  2725. CtInsert(ct, _UU("CMD_PasswordGet_1"),
  2726. t.IsPasswordPresented ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  2727. CtInsert(ct, _UU("CMD_PasswordGet_2"),
  2728. t.PasswordRemoteOnly ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  2729. CtFree(ct, c);
  2730. }
  2731. if (ret != ERR_NO_ERROR)
  2732. {
  2733. // Error has occurred
  2734. CmdPrintError(c, ret);
  2735. }
  2736. // Release the parameter list
  2737. FreeParamValueList(o);
  2738. return ret;
  2739. }
  2740. // Get the list of certificates of the trusted certification authority
  2741. UINT PcCertList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2742. {
  2743. LIST *o;
  2744. PC *pc = (PC *)param;
  2745. UINT ret = ERR_NO_ERROR;
  2746. RPC_CLIENT_ENUM_CA t;
  2747. // Get the parameter list
  2748. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  2749. if (o == NULL)
  2750. {
  2751. return ERR_INVALID_PARAMETER;
  2752. }
  2753. // RPC call
  2754. Zero(&t, sizeof(t));
  2755. ret = CcEnumCa(pc->RemoteClient, &t);
  2756. if (ret == ERR_NO_ERROR)
  2757. {
  2758. // Success
  2759. UINT i;
  2760. CT *ct = CtNewStandard();
  2761. for (i = 0;i < t.NumItem;i++)
  2762. {
  2763. wchar_t tmp[MAX_SIZE];
  2764. wchar_t tmp2[64];
  2765. RPC_CLIENT_ENUM_CA_ITEM *e = t.Items[i];
  2766. GetDateStrEx64(tmp, sizeof(tmp), SystemToLocal64(e->Expires), NULL);
  2767. UniToStru(tmp2, e->Key);
  2768. CtInsert(ct, _UU("CMD_CAList_COLUMN_ID"), tmp2);
  2769. CtInsert(ct, _UU("CM_CERT_COLUMN_1"), e->SubjectName);
  2770. CtInsert(ct, _UU("CM_CERT_COLUMN_2"), e->IssuerName);
  2771. CtInsert(ct, _UU("CM_CERT_COLUMN_3"), tmp);
  2772. if (i != (t.NumItem - 1))
  2773. {
  2774. CtInsert(ct, L"---", L"---");
  2775. }
  2776. }
  2777. CtFree(ct, c);
  2778. CiFreeClientEnumCa(&t);
  2779. }
  2780. if (ret != ERR_NO_ERROR)
  2781. {
  2782. // Error has occurred
  2783. CmdPrintError(c, ret);
  2784. }
  2785. // Release of the parameter list
  2786. FreeParamValueList(o);
  2787. return ret;
  2788. }
  2789. // Add a certificate of the trusted certification authority
  2790. UINT PcCertAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2791. {
  2792. LIST *o;
  2793. PC *pc = (PC *)param;
  2794. UINT ret = ERR_NO_ERROR;
  2795. RPC_CERT t;
  2796. X *x;
  2797. // Parameter list that can be specified
  2798. PARAM args[] =
  2799. {
  2800. {"[path]", CmdPrompt, _UU("CMD_CAAdd_PROMPT_PATH"), CmdEvalIsFile, NULL},
  2801. };
  2802. // Get the parameter list
  2803. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2804. if (o == NULL)
  2805. {
  2806. return ERR_INVALID_PARAMETER;
  2807. }
  2808. x = FileToXW(GetParamUniStr(o, "[path]"));
  2809. if (x == NULL)
  2810. {
  2811. FreeParamValueList(o);
  2812. c->Write(c, _UU("CMD_MSG_LOAD_CERT_FAILED"));
  2813. return ERR_INVALID_PARAMETER;
  2814. }
  2815. // RPC call
  2816. Zero(&t, sizeof(t));
  2817. t.x = x;
  2818. ret = CcAddCa(pc->RemoteClient, &t);
  2819. if (ret == ERR_NO_ERROR)
  2820. {
  2821. // Success
  2822. }
  2823. if (ret != ERR_NO_ERROR)
  2824. {
  2825. // Error has occurred
  2826. CmdPrintError(c, ret);
  2827. }
  2828. FreeX(x);
  2829. // Release of the parameter list
  2830. FreeParamValueList(o);
  2831. return ret;
  2832. }
  2833. // Delete the certificate of the trusted certification authority
  2834. UINT PcCertDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2835. {
  2836. LIST *o;
  2837. PC *pc = (PC *)param;
  2838. UINT ret = ERR_NO_ERROR;
  2839. RPC_CLIENT_DELETE_CA t;
  2840. // Parameter list that can be specified
  2841. PARAM args[] =
  2842. {
  2843. {"[id]", CmdPrompt, _UU("CMD_CADelete_PROMPT_ID"), CmdEvalNotEmpty, NULL},
  2844. };
  2845. // Get the parameter list
  2846. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2847. if (o == NULL)
  2848. {
  2849. return ERR_INVALID_PARAMETER;
  2850. }
  2851. // RPC call
  2852. Zero(&t, sizeof(t));
  2853. t.Key = GetParamInt(o, "[id]");
  2854. ret = CcDeleteCa(pc->RemoteClient, &t);
  2855. if (ret == ERR_NO_ERROR)
  2856. {
  2857. // Success
  2858. }
  2859. if (ret != ERR_NO_ERROR)
  2860. {
  2861. // Error has occurred
  2862. CmdPrintError(c, ret);
  2863. }
  2864. // Release of the parameter list
  2865. FreeParamValueList(o);
  2866. return ret;
  2867. }
  2868. // Get the certificate of the trusted certification authority
  2869. UINT PcCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2870. {
  2871. LIST *o;
  2872. PC *pc = (PC *)param;
  2873. UINT ret = ERR_NO_ERROR;
  2874. RPC_GET_CA t;
  2875. // Parameter list that can be specified
  2876. PARAM args[] =
  2877. {
  2878. {"[id]", CmdPrompt, _UU("CMD_CAGet_PROMPT_ID"), CmdEvalNotEmpty, NULL},
  2879. {"SAVECERT", CmdPrompt, _UU("CMD_CAGet_PROMPT_SAVECERT"), CmdEvalNotEmpty, NULL},
  2880. };
  2881. // Get the parameter list
  2882. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2883. if (o == NULL)
  2884. {
  2885. return ERR_INVALID_PARAMETER;
  2886. }
  2887. // RPC call
  2888. Zero(&t, sizeof(t));
  2889. t.Key = GetParamInt(o, "[id]");
  2890. ret = CcGetCa(pc->RemoteClient, &t);
  2891. if (ret == ERR_NO_ERROR)
  2892. {
  2893. // Success
  2894. if (XToFileW(t.x, GetParamUniStr(o, "SAVECERT"), true))
  2895. {
  2896. // Success
  2897. }
  2898. else
  2899. {
  2900. // Failure
  2901. ret = ERR_INTERNAL_ERROR;
  2902. c->Write(c, _UU("CMD_MSG_SAVE_CERT_FAILED"));
  2903. }
  2904. CiFreeGetCa(&t);
  2905. }
  2906. if (ret != ERR_NO_ERROR)
  2907. {
  2908. // Error has occurred
  2909. CmdPrintError(c, ret);
  2910. }
  2911. // Release of the parameter list
  2912. FreeParamValueList(o);
  2913. return ret;
  2914. }
  2915. // Get the list of the type of smart card that can be used
  2916. UINT PcSecureList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2917. {
  2918. LIST *o;
  2919. PC *pc = (PC *)param;
  2920. UINT ret = ERR_NO_ERROR;
  2921. RPC_CLIENT_ENUM_SECURE t;
  2922. // Get the parameter list
  2923. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  2924. if (o == NULL)
  2925. {
  2926. return ERR_INVALID_PARAMETER;
  2927. }
  2928. // RPC call
  2929. Zero(&t, sizeof(t));
  2930. ret = CcEnumSecure(pc->RemoteClient, &t);
  2931. if (ret == ERR_NO_ERROR)
  2932. {
  2933. CT *ct;
  2934. UINT i;
  2935. wchar_t tmp1[MAX_SIZE];
  2936. wchar_t tmp2[MAX_SIZE];
  2937. wchar_t tmp4[MAX_SIZE];
  2938. wchar_t *tmp3;
  2939. // Success
  2940. ct = CtNew();
  2941. CtInsertColumn(ct, _UU("SEC_COLUMN1"), false);
  2942. CtInsertColumn(ct, _UU("SEC_COLUMN2"), false);
  2943. CtInsertColumn(ct, _UU("SEC_COLUMN3"), false);
  2944. CtInsertColumn(ct, _UU("SEC_COLUMN4"), false);
  2945. for (i = 0;i < t.NumItem;i++)
  2946. {
  2947. RPC_CLIENT_ENUM_SECURE_ITEM *e = t.Items[i];
  2948. // ID
  2949. UniToStru(tmp1, e->DeviceId);
  2950. // Device name
  2951. StrToUni(tmp2, sizeof(tmp2), e->DeviceName);
  2952. // Type
  2953. tmp3 = (e->Type == SECURE_IC_CARD) ? _UU("SEC_SMART_CARD") : _UU("SEC_USB_TOKEN");
  2954. // Manufacturer
  2955. StrToUni(tmp4, sizeof(tmp4), e->Manufacturer);
  2956. CtInsert(ct, tmp1, tmp2, tmp3, tmp4);
  2957. }
  2958. CtFreeEx(ct, c, true);
  2959. CiFreeClientEnumSecure(&t);
  2960. }
  2961. if (ret != ERR_NO_ERROR)
  2962. {
  2963. // Error has occurred
  2964. CmdPrintError(c, ret);
  2965. }
  2966. // Release of the parameter list
  2967. FreeParamValueList(o);
  2968. return ret;
  2969. }
  2970. // Select the type of smart card to be used
  2971. UINT PcSecureSelect(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  2972. {
  2973. LIST *o;
  2974. PC *pc = (PC *)param;
  2975. UINT ret = ERR_NO_ERROR;
  2976. RPC_USE_SECURE t;
  2977. // Parameter list that can be specified
  2978. PARAM args[] =
  2979. {
  2980. {"[id]", CmdPrompt, _UU("CMD_SecureSelect_PROMPT_ID"), NULL, NULL},
  2981. };
  2982. // Get the parameter list
  2983. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  2984. if (o == NULL)
  2985. {
  2986. return ERR_INVALID_PARAMETER;
  2987. }
  2988. // RPC call
  2989. Zero(&t, sizeof(t));
  2990. t.DeviceId = GetParamInt(o, "[id]");
  2991. ret = CcUseSecure(pc->RemoteClient, &t);
  2992. if (ret == ERR_NO_ERROR)
  2993. {
  2994. // Success
  2995. }
  2996. if (ret != ERR_NO_ERROR)
  2997. {
  2998. // Error has occurred
  2999. CmdPrintError(c, ret);
  3000. }
  3001. // Release of the parameter list
  3002. FreeParamValueList(o);
  3003. return ret;
  3004. }
  3005. // Get the type ID of smart card to be used
  3006. UINT PcSecureGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3007. {
  3008. LIST *o;
  3009. PC *pc = (PC *)param;
  3010. UINT ret = ERR_NO_ERROR;
  3011. RPC_USE_SECURE t;
  3012. // Get the parameter list
  3013. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  3014. if (o == NULL)
  3015. {
  3016. return ERR_INVALID_PARAMETER;
  3017. }
  3018. // RPC call
  3019. Zero(&t, sizeof(t));
  3020. ret = CcGetUseSecure(pc->RemoteClient, &t);
  3021. if (ret == ERR_NO_ERROR)
  3022. {
  3023. // Success
  3024. wchar_t tmp[MAX_SIZE];
  3025. if (t.DeviceId != 0)
  3026. {
  3027. UniFormat(tmp, sizeof(tmp), _UU("CMD_SecureGet_Print"), t.DeviceId);
  3028. }
  3029. else
  3030. {
  3031. UniStrCpy(tmp, sizeof(tmp), _UU("CMD_SecureGet_NoPrint"));
  3032. }
  3033. c->Write(c, tmp);
  3034. }
  3035. if (ret != ERR_NO_ERROR)
  3036. {
  3037. // Error has occurred
  3038. CmdPrintError(c, ret);
  3039. }
  3040. // Release of the parameter list
  3041. FreeParamValueList(o);
  3042. return ret;
  3043. }
  3044. // Create a new virtual LAN card
  3045. UINT PcNicCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3046. {
  3047. LIST *o;
  3048. PC *pc = (PC *)param;
  3049. UINT ret = ERR_NO_ERROR;
  3050. RPC_CLIENT_CREATE_VLAN t;
  3051. // Parameter list that can be specified
  3052. PARAM args[] =
  3053. {
  3054. {"[name]", CmdPrompt, _UU("CMD_NicCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  3055. };
  3056. // Get the parameter list
  3057. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3058. if (o == NULL)
  3059. {
  3060. return ERR_INVALID_PARAMETER;
  3061. }
  3062. // RPC call
  3063. Zero(&t, sizeof(t));
  3064. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
  3065. ret = CcCreateVLan(pc->RemoteClient, &t);
  3066. if (ret == ERR_NO_ERROR)
  3067. {
  3068. // Success
  3069. }
  3070. if (ret != ERR_NO_ERROR)
  3071. {
  3072. // Error has occurred
  3073. CmdPrintError(c, ret);
  3074. }
  3075. // Release of the parameter list
  3076. FreeParamValueList(o);
  3077. return ret;
  3078. }
  3079. // Delete the virtual LAN card
  3080. UINT PcNicDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3081. {
  3082. LIST *o;
  3083. PC *pc = (PC *)param;
  3084. UINT ret = ERR_NO_ERROR;
  3085. RPC_CLIENT_CREATE_VLAN t;
  3086. // Parameter list that can be specified
  3087. PARAM args[] =
  3088. {
  3089. {"[name]", CmdPrompt, _UU("CMD_NicCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  3090. };
  3091. // Get the parameter list
  3092. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3093. if (o == NULL)
  3094. {
  3095. return ERR_INVALID_PARAMETER;
  3096. }
  3097. // RPC call
  3098. Zero(&t, sizeof(t));
  3099. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
  3100. ret = CcDeleteVLan(pc->RemoteClient, &t);
  3101. if (ret == ERR_NO_ERROR)
  3102. {
  3103. // Success
  3104. }
  3105. if (ret != ERR_NO_ERROR)
  3106. {
  3107. // Error has occurred
  3108. CmdPrintError(c, ret);
  3109. }
  3110. // Release of the parameter list
  3111. FreeParamValueList(o);
  3112. return ret;
  3113. }
  3114. // Upgrading the device driver of the virtual LAN card
  3115. UINT PcNicUpgrade(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3116. {
  3117. LIST *o;
  3118. PC *pc = (PC *)param;
  3119. UINT ret = ERR_NO_ERROR;
  3120. RPC_CLIENT_CREATE_VLAN t;
  3121. // Parameter list that can be specified
  3122. PARAM args[] =
  3123. {
  3124. {"[name]", CmdPrompt, _UU("CMD_NicCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  3125. };
  3126. // Get the parameter list
  3127. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3128. if (o == NULL)
  3129. {
  3130. return ERR_INVALID_PARAMETER;
  3131. }
  3132. // RPC call
  3133. Zero(&t, sizeof(t));
  3134. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
  3135. ret = CcUpgradeVLan(pc->RemoteClient, &t);
  3136. if (ret == ERR_NO_ERROR)
  3137. {
  3138. // Success
  3139. }
  3140. if (ret != ERR_NO_ERROR)
  3141. {
  3142. // Error has occurred
  3143. CmdPrintError(c, ret);
  3144. }
  3145. // Release of the parameter list
  3146. FreeParamValueList(o);
  3147. return ret;
  3148. }
  3149. // Get the settings of the virtual LAN card
  3150. UINT PcNicGetSetting(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3151. {
  3152. LIST *o;
  3153. PC *pc = (PC *)param;
  3154. UINT ret = ERR_NO_ERROR;
  3155. RPC_CLIENT_GET_VLAN t;
  3156. // Parameter list that can be specified
  3157. PARAM args[] =
  3158. {
  3159. {"[name]", CmdPrompt, _UU("CMD_NicCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  3160. };
  3161. // Get the parameter list
  3162. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3163. if (o == NULL)
  3164. {
  3165. return ERR_INVALID_PARAMETER;
  3166. }
  3167. // RPC call
  3168. Zero(&t, sizeof(t));
  3169. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
  3170. ret = CcGetVLan(pc->RemoteClient, &t);
  3171. if (ret == ERR_NO_ERROR)
  3172. {
  3173. // Success
  3174. CT *ct = CtNewStandard();
  3175. wchar_t tmp[MAX_SIZE];
  3176. StrToUni(tmp, sizeof(tmp), t.DeviceName);
  3177. CtInsert(ct, _UU("CMD_NicGetSetting_1"), tmp);
  3178. CtInsert(ct, _UU("CMD_NicGetSetting_2"), t.Enabled ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3179. StrToUni(tmp, sizeof(tmp), t.MacAddress);
  3180. CtInsert(ct, _UU("CMD_NicGetSetting_3"), tmp);
  3181. StrToUni(tmp, sizeof(tmp), t.Version);
  3182. CtInsert(ct, _UU("CMD_NicGetSetting_4"), tmp);
  3183. StrToUni(tmp, sizeof(tmp), t.FileName);
  3184. CtInsert(ct, _UU("CMD_NicGetSetting_5"), tmp);
  3185. StrToUni(tmp, sizeof(tmp), t.Guid);
  3186. CtInsert(ct, _UU("CMD_NicGetSetting_6"), tmp);
  3187. CtFree(ct, c);
  3188. }
  3189. if (ret != ERR_NO_ERROR)
  3190. {
  3191. // Error has occurred
  3192. CmdPrintError(c, ret);
  3193. }
  3194. // Release of the parameter list
  3195. FreeParamValueList(o);
  3196. return ret;
  3197. }
  3198. // Change the settings for the virtual LAN card
  3199. UINT PcNicSetSetting(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3200. {
  3201. LIST *o;
  3202. PC *pc = (PC *)param;
  3203. UINT ret = ERR_NO_ERROR;
  3204. RPC_CLIENT_SET_VLAN t;
  3205. UCHAR mac_address[6];
  3206. BUF *b;
  3207. // Parameter list that can be specified
  3208. PARAM args[] =
  3209. {
  3210. {"[name]", CmdPrompt, _UU("CMD_NicCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  3211. {"MAC", CmdPrompt, _UU("CMD_NicSetSetting_PROMPT_MAC"), CmdEvalNotEmpty, NULL},
  3212. };
  3213. // Get the parameter list
  3214. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3215. if (o == NULL)
  3216. {
  3217. return ERR_INVALID_PARAMETER;
  3218. }
  3219. // Inspect the MAC address
  3220. Zero(mac_address, sizeof(mac_address));
  3221. b = StrToBin(GetParamStr(o, "MAC"));
  3222. if (b != NULL && b->Size == 6)
  3223. {
  3224. Copy(mac_address, b->Buf, 6);
  3225. }
  3226. FreeBuf(b);
  3227. if (IsZero(mac_address, 6))
  3228. {
  3229. // MAC address is invalid
  3230. FreeParamValueList(o);
  3231. CmdPrintError(c, ERR_INVALID_PARAMETER);
  3232. return ERR_INVALID_PARAMETER;
  3233. }
  3234. // RPC call
  3235. Zero(&t, sizeof(t));
  3236. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
  3237. NormalizeMacAddress(t.MacAddress, sizeof(t.MacAddress), GetParamStr(o, "MAC"));
  3238. ret = CcSetVLan(pc->RemoteClient, &t);
  3239. if (ret == ERR_NO_ERROR)
  3240. {
  3241. // Success
  3242. }
  3243. if (ret != ERR_NO_ERROR)
  3244. {
  3245. // Error has occurred
  3246. CmdPrintError(c, ret);
  3247. }
  3248. // Release of the parameter list
  3249. FreeParamValueList(o);
  3250. return ret;
  3251. }
  3252. // Enable the virtual LAN card
  3253. UINT PcNicEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3254. {
  3255. LIST *o;
  3256. PC *pc = (PC *)param;
  3257. UINT ret = ERR_NO_ERROR;
  3258. RPC_CLIENT_CREATE_VLAN t;
  3259. // Parameter list that can be specified
  3260. PARAM args[] =
  3261. {
  3262. {"[name]", CmdPrompt, _UU("CMD_NicCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  3263. };
  3264. // Get the parameter list
  3265. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3266. if (o == NULL)
  3267. {
  3268. return ERR_INVALID_PARAMETER;
  3269. }
  3270. // RPC call
  3271. Zero(&t, sizeof(t));
  3272. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
  3273. ret = CcEnableVLan(pc->RemoteClient, &t);
  3274. if (ret == ERR_NO_ERROR)
  3275. {
  3276. // Success
  3277. }
  3278. if (ret != ERR_NO_ERROR)
  3279. {
  3280. // Error has occurred
  3281. CmdPrintError(c, ret);
  3282. }
  3283. // Release of the parameter list
  3284. FreeParamValueList(o);
  3285. return ret;
  3286. }
  3287. // Disable the virtual LAN card
  3288. UINT PcNicDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3289. {
  3290. LIST *o;
  3291. PC *pc = (PC *)param;
  3292. UINT ret = ERR_NO_ERROR;
  3293. RPC_CLIENT_CREATE_VLAN t;
  3294. // Parameter list that can be specified
  3295. PARAM args[] =
  3296. {
  3297. {"[name]", CmdPrompt, _UU("CMD_NicCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  3298. };
  3299. // Get the parameter list
  3300. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3301. if (o == NULL)
  3302. {
  3303. return ERR_INVALID_PARAMETER;
  3304. }
  3305. // RPC call
  3306. Zero(&t, sizeof(t));
  3307. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "[name]"));
  3308. ret = CcDisableVLan(pc->RemoteClient, &t);
  3309. if (ret == ERR_NO_ERROR)
  3310. {
  3311. // Success
  3312. }
  3313. if (ret != ERR_NO_ERROR)
  3314. {
  3315. // Error has occurred
  3316. CmdPrintError(c, ret);
  3317. }
  3318. // Release of the parameter list
  3319. FreeParamValueList(o);
  3320. return ret;
  3321. }
  3322. // Get the Virtual LAN card list
  3323. UINT PcNicList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3324. {
  3325. LIST *o;
  3326. PC *pc = (PC *)param;
  3327. UINT ret = ERR_NO_ERROR;
  3328. RPC_CLIENT_ENUM_VLAN t;
  3329. // Get the parameter list
  3330. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  3331. if (o == NULL)
  3332. {
  3333. return ERR_INVALID_PARAMETER;
  3334. }
  3335. // RPC call
  3336. Zero(&t, sizeof(t));
  3337. ret = CcEnumVLan(pc->RemoteClient, &t);
  3338. if (ret == ERR_NO_ERROR)
  3339. {
  3340. CT *ct;
  3341. UINT i;
  3342. // Success
  3343. ct = CtNew();
  3344. CtInsertColumn(ct, _UU("CM_VLAN_COLUMN_1"), false);
  3345. CtInsertColumn(ct, _UU("CM_VLAN_COLUMN_2"), false);
  3346. CtInsertColumn(ct, _UU("CM_VLAN_COLUMN_3"), false);
  3347. CtInsertColumn(ct, _UU("CM_VLAN_COLUMN_4"), false);
  3348. for (i = 0;i < t.NumItem;i++)
  3349. {
  3350. wchar_t name[MAX_SIZE];
  3351. wchar_t mac[MAX_SIZE];
  3352. wchar_t ver[MAX_SIZE];
  3353. wchar_t *status;
  3354. RPC_CLIENT_ENUM_VLAN_ITEM *v = t.Items[i];
  3355. // Device name
  3356. StrToUni(name, sizeof(name), v->DeviceName);
  3357. // State
  3358. status = v->Enabled ? _UU("CM_VLAN_ENABLED") : _UU("CM_VLAN_DISABLED");
  3359. // MAC address
  3360. StrToUni(mac, sizeof(mac), v->MacAddress);
  3361. // Version
  3362. StrToUni(ver, sizeof(ver), v->Version);
  3363. CtInsert(ct,
  3364. name, status, mac, ver);
  3365. }
  3366. CtFreeEx(ct, c, true);
  3367. }
  3368. if (ret != ERR_NO_ERROR)
  3369. {
  3370. // Error has occurred
  3371. CmdPrintError(c, ret);
  3372. }
  3373. CiFreeClientEnumVLan(&t);
  3374. // Release of the parameter list
  3375. FreeParamValueList(o);
  3376. return ret;
  3377. }
  3378. // Get the protocol name string from ID
  3379. wchar_t *GetProtocolName(UINT n)
  3380. {
  3381. switch (n)
  3382. {
  3383. case PROXY_DIRECT:
  3384. return _UU("PROTO_DIRECT_TCP");
  3385. case PROXY_HTTP:
  3386. return _UU("PROTO_HTTP_PROXY");
  3387. case PROXY_SOCKS:
  3388. return _UU("PROTO_SOCKS_PROXY");
  3389. }
  3390. return _UU("PROTO_UNKNOWN");
  3391. }
  3392. // Get the connection settings list
  3393. UINT PcAccountList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3394. {
  3395. LIST *o;
  3396. PC *pc = (PC *)param;
  3397. UINT ret = ERR_NO_ERROR;
  3398. RPC_CLIENT_ENUM_ACCOUNT t;
  3399. // Get the parameter list
  3400. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  3401. if (o == NULL)
  3402. {
  3403. return ERR_INVALID_PARAMETER;
  3404. }
  3405. // RPC call
  3406. Zero(&t, sizeof(t));
  3407. ret = CcEnumAccount(pc->RemoteClient, &t);
  3408. if (ret == ERR_NO_ERROR)
  3409. {
  3410. UINT i;
  3411. CT *ct;
  3412. // Success
  3413. ct = CtNew();
  3414. CtInsertColumn(ct, _UU("CM_ACCOUNT_COLUMN_1"), false);
  3415. CtInsertColumn(ct, _UU("CM_ACCOUNT_COLUMN_2"), false);
  3416. CtInsertColumn(ct, _UU("CM_ACCOUNT_COLUMN_3"), false);
  3417. CtInsertColumn(ct, _UU("CM_ACCOUNT_COLUMN_3_2"), false);
  3418. CtInsertColumn(ct, _UU("CM_ACCOUNT_COLUMN_4"), false);
  3419. for (i = 0;i < t.NumItem;i++)
  3420. {
  3421. RPC_CLIENT_ENUM_ACCOUNT_ITEM *e = t.Items[i];
  3422. wchar_t tmp[MAX_SIZE];
  3423. wchar_t tmp2[MAX_SIZE];
  3424. wchar_t tmp4[MAX_SIZE];
  3425. IP ip;
  3426. char ip_str[MAX_SIZE];
  3427. // Special treatment for IPv6 addresses
  3428. if (StrToIP6(&ip, e->ServerName) && StartWith(e->ServerName, "[") == false)
  3429. {
  3430. Format(ip_str, sizeof(ip_str),
  3431. "[%s]", e->ServerName);
  3432. }
  3433. else
  3434. {
  3435. StrCpy(ip_str, sizeof(ip_str), e->ServerName);
  3436. }
  3437. if (e->Port == 0)
  3438. {
  3439. // Port number unknown
  3440. UniFormat(tmp2, sizeof(tmp2), L"%S (%s)", ip_str, GetProtocolName(e->ProxyType));
  3441. }
  3442. else
  3443. {
  3444. // Port number are also shown
  3445. UniFormat(tmp2, sizeof(tmp2), L"%S:%u (%s)", ip_str, e->Port, GetProtocolName(e->ProxyType));
  3446. }
  3447. // Virtual HUB name
  3448. StrToUni(tmp4, sizeof(tmp4), e->HubName);
  3449. // Add
  3450. StrToUni(tmp, sizeof(tmp), e->DeviceName);
  3451. CtInsert(ct,
  3452. e->AccountName,
  3453. e->Active == false ? _UU("CM_ACCOUNT_OFFLINE") :
  3454. (e->Connected ? _UU("CM_ACCOUNT_ONLINE") : _UU("CM_ACCOUNT_CONNECTING")),
  3455. tmp2, tmp4,
  3456. tmp);
  3457. }
  3458. CtFreeEx(ct, c, true);
  3459. }
  3460. CiFreeClientEnumAccount(&t);
  3461. if (ret != ERR_NO_ERROR)
  3462. {
  3463. // Error has occurred
  3464. CmdPrintError(c, ret);
  3465. }
  3466. // Release of the parameter list
  3467. FreeParamValueList(o);
  3468. return ret;
  3469. }
  3470. // Create new connection settings
  3471. UINT PcAccountCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3472. {
  3473. LIST *o;
  3474. PC *pc = (PC *)param;
  3475. UINT ret = ERR_NO_ERROR;
  3476. RPC_CLIENT_CREATE_ACCOUNT t;
  3477. UINT port = 443;
  3478. char *host = NULL;
  3479. // Parameter list that can be specified
  3480. PARAM args[] =
  3481. {
  3482. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3483. {"SERVER", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Server"), CmdEvalHostAndPort, NULL},
  3484. {"HUB", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Hub"), CmdEvalSafe, NULL},
  3485. {"USERNAME", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Username"), CmdEvalNotEmpty, NULL},
  3486. {"NICNAME", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Nicname"), CmdEvalNotEmpty, NULL},
  3487. };
  3488. // Get the parameter list
  3489. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3490. if (o == NULL)
  3491. {
  3492. return ERR_INVALID_PARAMETER;
  3493. }
  3494. ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 443);
  3495. // RPC call
  3496. Zero(&t, sizeof(t));
  3497. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  3498. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  3499. t.ClientOption->Port = port;
  3500. StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
  3501. StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
  3502. t.ClientOption->NumRetry = INFINITE;
  3503. t.ClientOption->RetryInterval = 15;
  3504. t.ClientOption->MaxConnection = 1;
  3505. t.ClientOption->UseEncrypt = true;
  3506. t.ClientOption->AdditionalConnectionInterval = 1;
  3507. StrCpy(t.ClientOption->DeviceName, sizeof(t.ClientOption->DeviceName), GetParamStr(o, "NICNAME"));
  3508. t.ClientAuth = ZeroMalloc(sizeof(CLIENT_AUTH));
  3509. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_ANONYMOUS;
  3510. StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username), GetParamStr(o, "USERNAME"));
  3511. Free(host);
  3512. ret = CcCreateAccount(pc->RemoteClient, &t);
  3513. if (ret == ERR_NO_ERROR)
  3514. {
  3515. // Success
  3516. }
  3517. CiFreeClientCreateAccount(&t);
  3518. if (ret != ERR_NO_ERROR)
  3519. {
  3520. // Error has occurred
  3521. CmdPrintError(c, ret);
  3522. }
  3523. // Release of the parameter list
  3524. FreeParamValueList(o);
  3525. return ret;
  3526. }
  3527. // Set the destination of the connection settings
  3528. UINT PcAccountSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3529. {
  3530. LIST *o;
  3531. PC *pc = (PC *)param;
  3532. UINT ret = ERR_NO_ERROR;
  3533. RPC_CLIENT_GET_ACCOUNT t;
  3534. char *host = NULL;
  3535. UINT port = 443;
  3536. // Parameter list that can be specified
  3537. PARAM args[] =
  3538. {
  3539. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3540. {"SERVER", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Server"), CmdEvalHostAndPort, NULL},
  3541. {"HUB", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Hub"), CmdEvalSafe, NULL},
  3542. };
  3543. // Get the parameter list
  3544. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3545. if (o == NULL)
  3546. {
  3547. return ERR_INVALID_PARAMETER;
  3548. }
  3549. // RPC call
  3550. Zero(&t, sizeof(t));
  3551. ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 443);
  3552. Zero(&t, sizeof(t));
  3553. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3554. ret = CcGetAccount(pc->RemoteClient, &t);
  3555. if (ret == ERR_NO_ERROR)
  3556. {
  3557. RPC_CLIENT_CREATE_ACCOUNT c;
  3558. // Success
  3559. t.ClientOption->Port = port;
  3560. StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
  3561. StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
  3562. Zero(&c, sizeof(c));
  3563. c.ClientAuth = t.ClientAuth;
  3564. c.ClientOption = t.ClientOption;
  3565. c.CheckServerCert = t.CheckServerCert;
  3566. c.ServerCert = t.ServerCert;
  3567. c.StartupAccount = t.StartupAccount;
  3568. ret = CcSetAccount(pc->RemoteClient, &c);
  3569. }
  3570. if (ret != ERR_NO_ERROR)
  3571. {
  3572. // Error has occurred
  3573. CmdPrintError(c, ret);
  3574. }
  3575. CiFreeClientGetAccount(&t);
  3576. // Release of the parameter list
  3577. FreeParamValueList(o);
  3578. Free(host);
  3579. return ret;
  3580. }
  3581. // Get the configuration of the connection settings
  3582. UINT PcAccountGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3583. {
  3584. LIST *o;
  3585. PC *pc = (PC *)param;
  3586. UINT ret = ERR_NO_ERROR;
  3587. RPC_CLIENT_GET_ACCOUNT t;
  3588. // Parameter list that can be specified
  3589. PARAM args[] =
  3590. {
  3591. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3592. };
  3593. // Get the parameter list
  3594. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3595. if (o == NULL)
  3596. {
  3597. return ERR_INVALID_PARAMETER;
  3598. }
  3599. // RPC call
  3600. Zero(&t, sizeof(t));
  3601. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3602. ret = CcGetAccount(pc->RemoteClient, &t);
  3603. if (ret == ERR_NO_ERROR)
  3604. {
  3605. // Show the contents of the connection settings
  3606. wchar_t tmp[MAX_SIZE];
  3607. CT *ct = CtNewStandard();
  3608. // Connection settings name
  3609. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_NAME"), t.ClientOption->AccountName);
  3610. // Host name of the destination VPN Server
  3611. StrToUni(tmp, sizeof(tmp), t.ClientOption->Hostname);
  3612. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_HOSTNAME"), tmp);
  3613. // The port number to connect to VPN Server
  3614. UniToStru(tmp, t.ClientOption->Port);
  3615. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PORT"), tmp);
  3616. // Virtual HUB name of the destination VPN Server
  3617. StrToUni(tmp, sizeof(tmp), t.ClientOption->HubName);
  3618. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_HUBNAME"), tmp);
  3619. // Type of proxy server to go through
  3620. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_TYPE"), GetProxyTypeStr(t.ClientOption->ProxyType));
  3621. if (t.ClientOption->ProxyType != PROXY_DIRECT)
  3622. {
  3623. // Host name of the proxy server
  3624. StrToUni(tmp, sizeof(tmp), t.ClientOption->ProxyName);
  3625. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_HOSTNAME"), tmp);
  3626. // Port number of the proxy server
  3627. UniToStru(tmp, t.ClientOption->ProxyPort);
  3628. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_PORT"), tmp);
  3629. // User name of the proxy server
  3630. StrToUni(tmp, sizeof(tmp), t.ClientOption->ProxyUsername);
  3631. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_USERNAME"), tmp);
  3632. }
  3633. // Verify the server certificate
  3634. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_SERVER_CERT_USE"),
  3635. t.CheckServerCert ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3636. // Registered specific certificate
  3637. if (t.ServerCert != NULL)
  3638. {
  3639. GetAllNameFromX(tmp, sizeof(tmp), t.ServerCert);
  3640. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_SERVER_CERT_NAME"), tmp);
  3641. }
  3642. // Device name to be used for the connection
  3643. StrToUni(tmp, sizeof(tmp), t.ClientOption->DeviceName);
  3644. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_DEVICE_NAME"), tmp);
  3645. // Authentication type
  3646. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_AUTH_TYPE"), GetClientAuthTypeStr(t.ClientAuth->AuthType));
  3647. // User name
  3648. StrToUni(tmp, sizeof(tmp), t.ClientAuth->Username);
  3649. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_AUTH_USERNAME"), tmp);
  3650. if (t.ClientAuth->AuthType == CLIENT_AUTHTYPE_CERT)
  3651. {
  3652. if (t.ClientAuth->ClientX != NULL)
  3653. {
  3654. // Client certificate name
  3655. GetAllNameFromX(tmp, sizeof(tmp), t.ClientAuth->ClientX);
  3656. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_AUTH_CERT_NAME"), tmp);
  3657. }
  3658. }
  3659. // Number of TCP connections to be used for VPN communication
  3660. UniToStru(tmp, t.ClientOption->MaxConnection);
  3661. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_NUMTCP"), tmp);
  3662. // Establishment interval of each TCP connection
  3663. UniToStru(tmp, t.ClientOption->AdditionalConnectionInterval);
  3664. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_TCP_INTERVAL"), tmp);
  3665. // Life span of each TCP connection
  3666. if (t.ClientOption->ConnectionDisconnectSpan != 0)
  3667. {
  3668. UniToStru(tmp, t.ClientOption->ConnectionDisconnectSpan);
  3669. }
  3670. else
  3671. {
  3672. UniStrCpy(tmp, sizeof(tmp), _UU("CMD_MSG_INFINITE"));
  3673. }
  3674. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_TCP_TTL"), tmp);
  3675. // Use of half-duplex mode
  3676. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_TCP_HALF"),
  3677. t.ClientOption->HalfConnection ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3678. // Encryption by SSL
  3679. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_ENCRYPT"),
  3680. t.ClientOption->UseEncrypt ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3681. // Data compression
  3682. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_COMPRESS"),
  3683. t.ClientOption->UseCompress ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3684. // Connect in bridge / router mode
  3685. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_BRIDGE_ROUTER"),
  3686. t.ClientOption->RequireBridgeRoutingMode ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3687. // Connect in monitoring mode
  3688. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_MONITOR"),
  3689. t.ClientOption->RequireMonitorMode ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3690. // Not to rewrite the routing table
  3691. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_NO_TRACKING"),
  3692. t.ClientOption->NoRoutingTracking ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3693. // Disable the QoS control
  3694. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_QOS_DISABLE"),
  3695. t.ClientOption->DisableQoS ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  3696. CtFree(ct, c);
  3697. }
  3698. if (ret != ERR_NO_ERROR)
  3699. {
  3700. // Error has occurred
  3701. CmdPrintError(c, ret);
  3702. }
  3703. CiFreeClientGetAccount(&t);
  3704. // Release of the parameter list
  3705. FreeParamValueList(o);
  3706. return ret;
  3707. }
  3708. // Delete the connection settings
  3709. UINT PcAccountDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3710. {
  3711. LIST *o;
  3712. PC *pc = (PC *)param;
  3713. UINT ret = ERR_NO_ERROR;
  3714. RPC_CLIENT_DELETE_ACCOUNT t;
  3715. // Parameter list that can be specified
  3716. PARAM args[] =
  3717. {
  3718. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3719. };
  3720. // Get the parameter list
  3721. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3722. if (o == NULL)
  3723. {
  3724. return ERR_INVALID_PARAMETER;
  3725. }
  3726. // RPC call
  3727. Zero(&t, sizeof(t));
  3728. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3729. ret = CcDeleteAccount(pc->RemoteClient, &t);
  3730. if (ret == ERR_NO_ERROR)
  3731. {
  3732. // Success
  3733. }
  3734. if (ret != ERR_NO_ERROR)
  3735. {
  3736. // Error has occurred
  3737. CmdPrintError(c, ret);
  3738. }
  3739. // Release of the parameter list
  3740. FreeParamValueList(o);
  3741. return ret;
  3742. }
  3743. // Set the user name used to connect with connection settings
  3744. UINT PcAccountUsernameSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3745. {
  3746. LIST *o;
  3747. PC *pc = (PC *)param;
  3748. UINT ret = ERR_NO_ERROR;
  3749. RPC_CLIENT_GET_ACCOUNT t;
  3750. // Parameter list that can be specified
  3751. PARAM args[] =
  3752. {
  3753. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3754. {"USERNAME", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Username"), CmdEvalNotEmpty, NULL},
  3755. };
  3756. // Get the parameter list
  3757. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3758. if (o == NULL)
  3759. {
  3760. return ERR_INVALID_PARAMETER;
  3761. }
  3762. // RPC call
  3763. Zero(&t, sizeof(t));
  3764. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3765. ret = CcGetAccount(pc->RemoteClient, &t);
  3766. if (ret == ERR_NO_ERROR)
  3767. {
  3768. RPC_CLIENT_CREATE_ACCOUNT z;
  3769. // Change the settings
  3770. StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username), GetParamStr(o, "USERNAME"));
  3771. if (t.ClientAuth->AuthType == CLIENT_AUTHTYPE_PASSWORD)
  3772. {
  3773. c->Write(c, _UU("CMD_AccountUsername_Notice"));
  3774. }
  3775. Zero(&z, sizeof(z));
  3776. z.CheckServerCert = t.CheckServerCert;
  3777. z.ClientAuth = t.ClientAuth;
  3778. z.ClientOption = t.ClientOption;
  3779. z.ServerCert = t.ServerCert;
  3780. z.StartupAccount = t.StartupAccount;
  3781. ret = CcSetAccount(pc->RemoteClient, &z);
  3782. }
  3783. if (ret != ERR_NO_ERROR)
  3784. {
  3785. // Error has occurred
  3786. CmdPrintError(c, ret);
  3787. }
  3788. CiFreeClientGetAccount(&t);
  3789. // Release of the parameter list
  3790. FreeParamValueList(o);
  3791. return ret;
  3792. }
  3793. // Set the type of user authentication of connection settings to anonymous authentication
  3794. UINT PcAccountAnonymousSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3795. {
  3796. LIST *o;
  3797. PC *pc = (PC *)param;
  3798. UINT ret = ERR_NO_ERROR;
  3799. RPC_CLIENT_GET_ACCOUNT t;
  3800. // Parameter list that can be specified
  3801. PARAM args[] =
  3802. {
  3803. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3804. };
  3805. // Get the parameter list
  3806. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3807. if (o == NULL)
  3808. {
  3809. return ERR_INVALID_PARAMETER;
  3810. }
  3811. // RPC call
  3812. Zero(&t, sizeof(t));
  3813. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3814. ret = CcGetAccount(pc->RemoteClient, &t);
  3815. if (ret == ERR_NO_ERROR)
  3816. {
  3817. RPC_CLIENT_CREATE_ACCOUNT z;
  3818. // Change the settings
  3819. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_ANONYMOUS;
  3820. Zero(&z, sizeof(z));
  3821. z.CheckServerCert = t.CheckServerCert;
  3822. z.ClientAuth = t.ClientAuth;
  3823. z.ClientOption = t.ClientOption;
  3824. z.ServerCert = t.ServerCert;
  3825. z.StartupAccount = t.StartupAccount;
  3826. ret = CcSetAccount(pc->RemoteClient, &z);
  3827. }
  3828. if (ret != ERR_NO_ERROR)
  3829. {
  3830. // Error has occurred
  3831. CmdPrintError(c, ret);
  3832. }
  3833. CiFreeClientGetAccount(&t);
  3834. // Release of the parameter list
  3835. FreeParamValueList(o);
  3836. return ret;
  3837. }
  3838. // Set the type of user authentication of connection settings to the password authentication
  3839. UINT PcAccountPasswordSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3840. {
  3841. LIST *o;
  3842. PC *pc = (PC *)param;
  3843. UINT ret = ERR_NO_ERROR;
  3844. RPC_CLIENT_GET_ACCOUNT t;
  3845. // Parameter list that can be specified
  3846. PARAM args[] =
  3847. {
  3848. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3849. {"PASSWORD", CmdPromptChoosePassword, NULL, NULL, NULL},
  3850. {"TYPE", CmdPrompt, _UU("CMD_CascadePasswordSet_Prompt_Type"), CmdEvalNotEmpty, NULL},
  3851. };
  3852. // Get the parameter list
  3853. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3854. if (o == NULL)
  3855. {
  3856. return ERR_INVALID_PARAMETER;
  3857. }
  3858. // RPC call
  3859. Zero(&t, sizeof(t));
  3860. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3861. ret = CcGetAccount(pc->RemoteClient, &t);
  3862. if (ret == ERR_NO_ERROR)
  3863. {
  3864. char *typestr = GetParamStr(o, "TYPE");
  3865. RPC_CLIENT_CREATE_ACCOUNT z;
  3866. // Change the settings
  3867. if (StartWith("standard", typestr))
  3868. {
  3869. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_PASSWORD;
  3870. HashPassword(t.ClientAuth->HashedPassword, t.ClientAuth->Username,
  3871. GetParamStr(o, "PASSWORD"));
  3872. }
  3873. else if (StartWith("radius", typestr) || StartWith("ntdomain", typestr))
  3874. {
  3875. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_PLAIN_PASSWORD;
  3876. StrCpy(t.ClientAuth->PlainPassword, sizeof(t.ClientAuth->PlainPassword),
  3877. GetParamStr(o, "PASSWORD"));
  3878. }
  3879. else
  3880. {
  3881. // Error has occured
  3882. c->Write(c, _UU("CMD_CascadePasswordSet_Type_Invalid"));
  3883. ret = ERR_INVALID_PARAMETER;
  3884. }
  3885. if (ret == ERR_NO_ERROR)
  3886. {
  3887. Zero(&z, sizeof(z));
  3888. z.CheckServerCert = t.CheckServerCert;
  3889. z.ClientAuth = t.ClientAuth;
  3890. z.ClientOption = t.ClientOption;
  3891. z.ServerCert = t.ServerCert;
  3892. z.StartupAccount = t.StartupAccount;
  3893. ret = CcSetAccount(pc->RemoteClient, &z);
  3894. }
  3895. }
  3896. if (ret != ERR_NO_ERROR)
  3897. {
  3898. // Error has occurred
  3899. CmdPrintError(c, ret);
  3900. }
  3901. CiFreeClientGetAccount(&t);
  3902. // Release of the parameter list
  3903. FreeParamValueList(o);
  3904. return ret;
  3905. }
  3906. // Set the type of user authentication of connection settings to the client certificate authentication
  3907. UINT PcAccountCertSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3908. {
  3909. LIST *o;
  3910. PC *pc = (PC *)param;
  3911. UINT ret = ERR_NO_ERROR;
  3912. RPC_CLIENT_GET_ACCOUNT t;
  3913. X *x;
  3914. K *k;
  3915. // Parameter list that can be specified
  3916. PARAM args[] =
  3917. {
  3918. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3919. {"LOADCERT", CmdPrompt, _UU("CMD_LOADCERTPATH"), CmdEvalIsFile, NULL},
  3920. {"LOADKEY", CmdPrompt, _UU("CMD_LOADKEYPATH"), CmdEvalIsFile, NULL},
  3921. };
  3922. // Get the parameter list
  3923. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3924. if (o == NULL)
  3925. {
  3926. return ERR_INVALID_PARAMETER;
  3927. }
  3928. if (CmdLoadCertAndKey(c, &x, &k, GetParamUniStr(o, "LOADCERT"), GetParamUniStr(o, "LOADKEY")) == false)
  3929. {
  3930. return ERR_INTERNAL_ERROR;
  3931. }
  3932. // RPC call
  3933. Zero(&t, sizeof(t));
  3934. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3935. ret = CcGetAccount(pc->RemoteClient, &t);
  3936. if (ret == ERR_NO_ERROR)
  3937. {
  3938. RPC_CLIENT_CREATE_ACCOUNT z;
  3939. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_CERT;
  3940. if (t.ClientAuth->ClientX != NULL)
  3941. {
  3942. FreeX(t.ClientAuth->ClientX);
  3943. }
  3944. if (t.ClientAuth->ClientK != NULL)
  3945. {
  3946. FreeK(t.ClientAuth->ClientK);
  3947. }
  3948. t.ClientAuth->ClientX = CloneX(x);
  3949. t.ClientAuth->ClientK = CloneK(k);
  3950. Zero(&z, sizeof(z));
  3951. z.CheckServerCert = t.CheckServerCert;
  3952. z.ClientAuth = t.ClientAuth;
  3953. z.ClientOption = t.ClientOption;
  3954. z.ServerCert = t.ServerCert;
  3955. z.StartupAccount = t.StartupAccount;
  3956. ret = CcSetAccount(pc->RemoteClient, &z);
  3957. }
  3958. if (ret != ERR_NO_ERROR)
  3959. {
  3960. // Error has occurred
  3961. CmdPrintError(c, ret);
  3962. }
  3963. FreeX(x);
  3964. FreeK(k);
  3965. CiFreeClientGetAccount(&t);
  3966. // Release of the parameter list
  3967. FreeParamValueList(o);
  3968. return ret;
  3969. }
  3970. // Get the client certificate to be used for the connection settings
  3971. UINT PcAccountCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  3972. {
  3973. LIST *o;
  3974. PC *pc = (PC *)param;
  3975. UINT ret = ERR_NO_ERROR;
  3976. RPC_CLIENT_GET_ACCOUNT t;
  3977. // Parameter list that can be specified
  3978. PARAM args[] =
  3979. {
  3980. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  3981. {"SAVECERT", CmdPrompt, _UU("CMD_SAVECERTPATH"), CmdEvalNotEmpty, NULL},
  3982. };
  3983. // Get the parameter list
  3984. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  3985. if (o == NULL)
  3986. {
  3987. return ERR_INVALID_PARAMETER;
  3988. }
  3989. // RPC call
  3990. Zero(&t, sizeof(t));
  3991. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  3992. ret = CcGetAccount(pc->RemoteClient, &t);
  3993. if (ret == ERR_NO_ERROR)
  3994. {
  3995. if (t.ClientAuth->AuthType != CLIENT_AUTHTYPE_CERT)
  3996. {
  3997. c->Write(c, _UU("CMD_CascadeCertSet_Not_Auth_Cert"));
  3998. ret = ERR_INTERNAL_ERROR;
  3999. }
  4000. else if (t.ClientAuth->ClientX == NULL)
  4001. {
  4002. c->Write(c, _UU("CMD_CascadeCertSet_Cert_Not_Exists"));
  4003. ret = ERR_INTERNAL_ERROR;
  4004. }
  4005. else
  4006. {
  4007. XToFileW(t.ClientAuth->ClientX, GetParamUniStr(o, "SAVECERT"), true);
  4008. }
  4009. }
  4010. CiFreeClientGetAccount(&t);
  4011. if (ret != ERR_NO_ERROR)
  4012. {
  4013. // Error has occurred
  4014. CmdPrintError(c, ret);
  4015. }
  4016. // Release of the parameter list
  4017. FreeParamValueList(o);
  4018. return ret;
  4019. }
  4020. // Disable communication encryption with the connection settings
  4021. UINT PcAccountEncryptDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4022. {
  4023. LIST *o;
  4024. PC *pc = (PC *)param;
  4025. UINT ret = ERR_NO_ERROR;
  4026. RPC_CLIENT_GET_ACCOUNT t;
  4027. // Parameter list that can be specified
  4028. PARAM args[] =
  4029. {
  4030. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4031. };
  4032. // Get the parameter list
  4033. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4034. if (o == NULL)
  4035. {
  4036. return ERR_INVALID_PARAMETER;
  4037. }
  4038. // RPC call
  4039. Zero(&t, sizeof(t));
  4040. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4041. ret = CcGetAccount(pc->RemoteClient, &t);
  4042. if (ret == ERR_NO_ERROR)
  4043. {
  4044. RPC_CLIENT_CREATE_ACCOUNT z;
  4045. // Change the settings
  4046. t.ClientOption->UseEncrypt = false;
  4047. Zero(&z, sizeof(z));
  4048. z.CheckServerCert = t.CheckServerCert;
  4049. z.ClientAuth = t.ClientAuth;
  4050. z.ClientOption = t.ClientOption;
  4051. z.ServerCert = t.ServerCert;
  4052. z.StartupAccount = t.StartupAccount;
  4053. ret = CcSetAccount(pc->RemoteClient, &z);
  4054. }
  4055. if (ret != ERR_NO_ERROR)
  4056. {
  4057. // Error has occurred
  4058. CmdPrintError(c, ret);
  4059. }
  4060. CiFreeClientGetAccount(&t);
  4061. // Release of the parameter list
  4062. FreeParamValueList(o);
  4063. return ret;
  4064. }
  4065. // Enable communication encryption with the connection settings
  4066. UINT PcAccountEncryptEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4067. {
  4068. LIST *o;
  4069. PC *pc = (PC *)param;
  4070. UINT ret = ERR_NO_ERROR;
  4071. RPC_CLIENT_GET_ACCOUNT t;
  4072. // Parameter list that can be specified
  4073. PARAM args[] =
  4074. {
  4075. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4076. };
  4077. // Get the parameter list
  4078. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4079. if (o == NULL)
  4080. {
  4081. return ERR_INVALID_PARAMETER;
  4082. }
  4083. // RPC call
  4084. Zero(&t, sizeof(t));
  4085. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4086. ret = CcGetAccount(pc->RemoteClient, &t);
  4087. if (ret == ERR_NO_ERROR)
  4088. {
  4089. RPC_CLIENT_CREATE_ACCOUNT z;
  4090. // Change the settings
  4091. t.ClientOption->UseEncrypt = true;
  4092. Zero(&z, sizeof(z));
  4093. z.CheckServerCert = t.CheckServerCert;
  4094. z.ClientAuth = t.ClientAuth;
  4095. z.ClientOption = t.ClientOption;
  4096. z.ServerCert = t.ServerCert;
  4097. z.StartupAccount = t.StartupAccount;
  4098. ret = CcSetAccount(pc->RemoteClient, &z);
  4099. }
  4100. if (ret != ERR_NO_ERROR)
  4101. {
  4102. // Error has occurred
  4103. CmdPrintError(c, ret);
  4104. }
  4105. CiFreeClientGetAccount(&t);
  4106. // Release of the parameter list
  4107. FreeParamValueList(o);
  4108. return ret;
  4109. }
  4110. // Enable communication data compression with the connection settings
  4111. UINT PcAccountCompressEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4112. {
  4113. LIST *o;
  4114. PC *pc = (PC *)param;
  4115. UINT ret = ERR_NO_ERROR;
  4116. RPC_CLIENT_GET_ACCOUNT t;
  4117. // Parameter list that can be specified
  4118. PARAM args[] =
  4119. {
  4120. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4121. };
  4122. // Get the parameter list
  4123. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4124. if (o == NULL)
  4125. {
  4126. return ERR_INVALID_PARAMETER;
  4127. }
  4128. // RPC call
  4129. Zero(&t, sizeof(t));
  4130. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4131. ret = CcGetAccount(pc->RemoteClient, &t);
  4132. if (ret == ERR_NO_ERROR)
  4133. {
  4134. RPC_CLIENT_CREATE_ACCOUNT z;
  4135. // Change the settings
  4136. t.ClientOption->UseCompress = true;
  4137. Zero(&z, sizeof(z));
  4138. z.CheckServerCert = t.CheckServerCert;
  4139. z.ClientAuth = t.ClientAuth;
  4140. z.ClientOption = t.ClientOption;
  4141. z.ServerCert = t.ServerCert;
  4142. z.StartupAccount = t.StartupAccount;
  4143. ret = CcSetAccount(pc->RemoteClient, &z);
  4144. }
  4145. if (ret != ERR_NO_ERROR)
  4146. {
  4147. // Error has occurred
  4148. CmdPrintError(c, ret);
  4149. }
  4150. CiFreeClientGetAccount(&t);
  4151. // Release of the parameter list
  4152. FreeParamValueList(o);
  4153. return ret;
  4154. }
  4155. // Disable communication data compression with the connection settings
  4156. UINT PcAccountCompressDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4157. {
  4158. LIST *o;
  4159. PC *pc = (PC *)param;
  4160. UINT ret = ERR_NO_ERROR;
  4161. RPC_CLIENT_GET_ACCOUNT t;
  4162. // Parameter list that can be specified
  4163. PARAM args[] =
  4164. {
  4165. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4166. };
  4167. // Get the parameter list
  4168. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4169. if (o == NULL)
  4170. {
  4171. return ERR_INVALID_PARAMETER;
  4172. }
  4173. // RPC call
  4174. Zero(&t, sizeof(t));
  4175. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4176. ret = CcGetAccount(pc->RemoteClient, &t);
  4177. if (ret == ERR_NO_ERROR)
  4178. {
  4179. RPC_CLIENT_CREATE_ACCOUNT z;
  4180. // Change the settings
  4181. t.ClientOption->UseCompress = false;
  4182. Zero(&z, sizeof(z));
  4183. z.CheckServerCert = t.CheckServerCert;
  4184. z.ClientAuth = t.ClientAuth;
  4185. z.ClientOption = t.ClientOption;
  4186. z.ServerCert = t.ServerCert;
  4187. z.StartupAccount = t.StartupAccount;
  4188. ret = CcSetAccount(pc->RemoteClient, &z);
  4189. }
  4190. if (ret != ERR_NO_ERROR)
  4191. {
  4192. // Error has occurred
  4193. CmdPrintError(c, ret);
  4194. }
  4195. CiFreeClientGetAccount(&t);
  4196. // Release of the parameter list
  4197. FreeParamValueList(o);
  4198. return ret;
  4199. }
  4200. // Set the connection method of the connection settings to the direct TCP/IP connection
  4201. UINT PcAccountProxyNone(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4202. {
  4203. LIST *o;
  4204. PC *pc = (PC *)param;
  4205. UINT ret = ERR_NO_ERROR;
  4206. RPC_CLIENT_GET_ACCOUNT t;
  4207. // Parameter list that can be specified
  4208. PARAM args[] =
  4209. {
  4210. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4211. };
  4212. // Get the parameter list
  4213. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4214. if (o == NULL)
  4215. {
  4216. return ERR_INVALID_PARAMETER;
  4217. }
  4218. // RPC call
  4219. Zero(&t, sizeof(t));
  4220. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4221. ret = CcGetAccount(pc->RemoteClient, &t);
  4222. if (ret == ERR_NO_ERROR)
  4223. {
  4224. RPC_CLIENT_CREATE_ACCOUNT z;
  4225. // Change the settings
  4226. t.ClientOption->ProxyType = PROXY_DIRECT;
  4227. Zero(&z, sizeof(z));
  4228. z.CheckServerCert = t.CheckServerCert;
  4229. z.ClientAuth = t.ClientAuth;
  4230. z.ClientOption = t.ClientOption;
  4231. z.ServerCert = t.ServerCert;
  4232. z.StartupAccount = t.StartupAccount;
  4233. ret = CcSetAccount(pc->RemoteClient, &z);
  4234. }
  4235. if (ret != ERR_NO_ERROR)
  4236. {
  4237. // Error has occurred
  4238. CmdPrintError(c, ret);
  4239. }
  4240. CiFreeClientGetAccount(&t);
  4241. // Release of the parameter list
  4242. FreeParamValueList(o);
  4243. return ret;
  4244. }
  4245. // Set the connection method of the connection settings to the HTTP proxy server connection
  4246. UINT PcAccountProxyHttp(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4247. {
  4248. LIST *o;
  4249. PC *pc = (PC *)param;
  4250. UINT ret = ERR_NO_ERROR;
  4251. RPC_CLIENT_GET_ACCOUNT t;
  4252. // Parameter list that can be specified
  4253. PARAM args[] =
  4254. {
  4255. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4256. {"SERVER", CmdPrompt, _UU("CMD_AccountProxyHttp_Prompt_Server"), CmdEvalHostAndPort, NULL},
  4257. {"USERNAME", NULL, NULL, NULL, NULL},
  4258. {"PASSWORD", NULL, NULL, NULL, NULL},
  4259. };
  4260. // Get the parameter list
  4261. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4262. if (o == NULL)
  4263. {
  4264. return ERR_INVALID_PARAMETER;
  4265. }
  4266. // RPC call
  4267. Zero(&t, sizeof(t));
  4268. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4269. ret = CcGetAccount(pc->RemoteClient, &t);
  4270. if (ret == ERR_NO_ERROR)
  4271. {
  4272. RPC_CLIENT_CREATE_ACCOUNT z;
  4273. char *host;
  4274. UINT port;
  4275. // Data change
  4276. if (ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 8080))
  4277. {
  4278. t.ClientOption->ProxyType = PROXY_HTTP;
  4279. StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
  4280. t.ClientOption->ProxyPort = port;
  4281. StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
  4282. StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
  4283. Free(host);
  4284. }
  4285. Zero(&z, sizeof(z));
  4286. z.CheckServerCert = t.CheckServerCert;
  4287. z.ClientAuth = t.ClientAuth;
  4288. z.ClientOption = t.ClientOption;
  4289. z.ServerCert = t.ServerCert;
  4290. z.StartupAccount = t.StartupAccount;
  4291. ret = CcSetAccount(pc->RemoteClient, &z);
  4292. }
  4293. if (ret != ERR_NO_ERROR)
  4294. {
  4295. // Error has occurred
  4296. CmdPrintError(c, ret);
  4297. }
  4298. CiFreeClientGetAccount(&t);
  4299. // Release of the parameter list
  4300. FreeParamValueList(o);
  4301. return ret;
  4302. }
  4303. // Set the connection method of the connection settings to the SOCKS proxy server connection
  4304. UINT PcAccountProxySocks(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4305. {
  4306. LIST *o;
  4307. PC *pc = (PC *)param;
  4308. UINT ret = ERR_NO_ERROR;
  4309. RPC_CLIENT_GET_ACCOUNT t;
  4310. // Parameter list that can be specified
  4311. PARAM args[] =
  4312. {
  4313. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4314. {"SERVER", CmdPrompt, _UU("CMD_AccountProxyHttp_Prompt_Server"), CmdEvalHostAndPort, NULL},
  4315. {"USERNAME", NULL, NULL, NULL, NULL},
  4316. {"PASSWORD", NULL, NULL, NULL, NULL},
  4317. };
  4318. // Get the parameter list
  4319. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4320. if (o == NULL)
  4321. {
  4322. return ERR_INVALID_PARAMETER;
  4323. }
  4324. // RPC call
  4325. Zero(&t, sizeof(t));
  4326. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4327. ret = CcGetAccount(pc->RemoteClient, &t);
  4328. if (ret == ERR_NO_ERROR)
  4329. {
  4330. RPC_CLIENT_CREATE_ACCOUNT z;
  4331. char *host;
  4332. UINT port;
  4333. // Data change
  4334. if (ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 8080))
  4335. {
  4336. t.ClientOption->ProxyType = PROXY_SOCKS;
  4337. StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
  4338. t.ClientOption->ProxyPort = port;
  4339. StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
  4340. StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
  4341. Free(host);
  4342. }
  4343. Zero(&z, sizeof(z));
  4344. z.CheckServerCert = t.CheckServerCert;
  4345. z.ClientAuth = t.ClientAuth;
  4346. z.ClientOption = t.ClientOption;
  4347. z.ServerCert = t.ServerCert;
  4348. z.StartupAccount = t.StartupAccount;
  4349. ret = CcSetAccount(pc->RemoteClient, &z);
  4350. }
  4351. if (ret != ERR_NO_ERROR)
  4352. {
  4353. // Error has occurred
  4354. CmdPrintError(c, ret);
  4355. }
  4356. CiFreeClientGetAccount(&t);
  4357. // Release of the parameter list
  4358. FreeParamValueList(o);
  4359. return ret;
  4360. }
  4361. // Enable validation option for server certificate of connection settings
  4362. UINT PcAccountServerCertEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4363. {
  4364. LIST *o;
  4365. PC *pc = (PC *)param;
  4366. UINT ret = ERR_NO_ERROR;
  4367. RPC_CLIENT_GET_ACCOUNT t;
  4368. // Parameter list that can be specified
  4369. PARAM args[] =
  4370. {
  4371. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4372. };
  4373. // Get the parameter list
  4374. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4375. if (o == NULL)
  4376. {
  4377. return ERR_INVALID_PARAMETER;
  4378. }
  4379. // RPC call
  4380. Zero(&t, sizeof(t));
  4381. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4382. ret = CcGetAccount(pc->RemoteClient, &t);
  4383. if (ret == ERR_NO_ERROR)
  4384. {
  4385. RPC_CLIENT_CREATE_ACCOUNT z;
  4386. // Change the settings
  4387. t.CheckServerCert = true;
  4388. Zero(&z, sizeof(z));
  4389. z.CheckServerCert = t.CheckServerCert;
  4390. z.ClientAuth = t.ClientAuth;
  4391. z.ClientOption = t.ClientOption;
  4392. z.ServerCert = t.ServerCert;
  4393. z.StartupAccount = t.StartupAccount;
  4394. ret = CcSetAccount(pc->RemoteClient, &z);
  4395. }
  4396. if (ret != ERR_NO_ERROR)
  4397. {
  4398. // Error has occurred
  4399. CmdPrintError(c, ret);
  4400. }
  4401. CiFreeClientGetAccount(&t);
  4402. // Release of the parameter list
  4403. FreeParamValueList(o);
  4404. return ret;
  4405. }
  4406. // Disable validation option of the server certificate of connection settings
  4407. UINT PcAccountServerCertDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4408. {
  4409. LIST *o;
  4410. PC *pc = (PC *)param;
  4411. UINT ret = ERR_NO_ERROR;
  4412. RPC_CLIENT_GET_ACCOUNT t;
  4413. // Parameter list that can be specified
  4414. PARAM args[] =
  4415. {
  4416. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4417. };
  4418. // Get the parameter list
  4419. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4420. if (o == NULL)
  4421. {
  4422. return ERR_INVALID_PARAMETER;
  4423. }
  4424. // RPC call
  4425. Zero(&t, sizeof(t));
  4426. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4427. ret = CcGetAccount(pc->RemoteClient, &t);
  4428. if (ret == ERR_NO_ERROR)
  4429. {
  4430. RPC_CLIENT_CREATE_ACCOUNT z;
  4431. // Change the settings
  4432. t.CheckServerCert = false;
  4433. Zero(&z, sizeof(z));
  4434. z.CheckServerCert = t.CheckServerCert;
  4435. z.ClientAuth = t.ClientAuth;
  4436. z.ClientOption = t.ClientOption;
  4437. z.ServerCert = t.ServerCert;
  4438. z.StartupAccount = t.StartupAccount;
  4439. ret = CcSetAccount(pc->RemoteClient, &z);
  4440. }
  4441. if (ret != ERR_NO_ERROR)
  4442. {
  4443. // Error has occurred
  4444. CmdPrintError(c, ret);
  4445. }
  4446. CiFreeClientGetAccount(&t);
  4447. // Release of the parameter list
  4448. FreeParamValueList(o);
  4449. return ret;
  4450. }
  4451. // Set the server-specific certificate of connection settings
  4452. UINT PcAccountServerCertSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4453. {
  4454. LIST *o;
  4455. PC *pc = (PC *)param;
  4456. UINT ret = ERR_NO_ERROR;
  4457. RPC_CLIENT_GET_ACCOUNT t;
  4458. X *x;
  4459. // Parameter list that can be specified
  4460. PARAM args[] =
  4461. {
  4462. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4463. {"LOADCERT", CmdPrompt, _UU("CMD_LOADCERTPATH"), CmdEvalIsFile, NULL},
  4464. };
  4465. // Get the parameter list
  4466. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4467. if (o == NULL)
  4468. {
  4469. return ERR_INVALID_PARAMETER;
  4470. }
  4471. x = FileToXW(GetParamUniStr(o, "LOADCERT"));
  4472. if (x == NULL)
  4473. {
  4474. FreeParamValueList(o);
  4475. c->Write(c, _UU("CMD_LOADCERT_FAILED"));
  4476. return ERR_INTERNAL_ERROR;
  4477. }
  4478. // RPC call
  4479. Zero(&t, sizeof(t));
  4480. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4481. ret = CcGetAccount(pc->RemoteClient, &t);
  4482. if (ret == ERR_NO_ERROR)
  4483. {
  4484. RPC_CLIENT_CREATE_ACCOUNT z;
  4485. // Change the settings
  4486. if (t.ServerCert != NULL)
  4487. {
  4488. FreeX(t.ServerCert);
  4489. }
  4490. t.ServerCert = CloneX(x);
  4491. Zero(&z, sizeof(z));
  4492. z.CheckServerCert = t.CheckServerCert;
  4493. z.ClientAuth = t.ClientAuth;
  4494. z.ClientOption = t.ClientOption;
  4495. z.ServerCert = t.ServerCert;
  4496. z.StartupAccount = t.StartupAccount;
  4497. ret = CcSetAccount(pc->RemoteClient, &z);
  4498. }
  4499. if (ret != ERR_NO_ERROR)
  4500. {
  4501. // Error has occurred
  4502. CmdPrintError(c, ret);
  4503. }
  4504. CiFreeClientGetAccount(&t);
  4505. // Release of the parameter list
  4506. FreeParamValueList(o);
  4507. FreeX(x);
  4508. return ret;
  4509. }
  4510. // Delete a server-specific certificate of connection settings
  4511. UINT PcAccountServerCertDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4512. {
  4513. LIST *o;
  4514. PC *pc = (PC *)param;
  4515. UINT ret = ERR_NO_ERROR;
  4516. RPC_CLIENT_GET_ACCOUNT t;
  4517. // Parameter list that can be specified
  4518. PARAM args[] =
  4519. {
  4520. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4521. };
  4522. // Get the parameter list
  4523. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4524. if (o == NULL)
  4525. {
  4526. return ERR_INVALID_PARAMETER;
  4527. }
  4528. // RPC call
  4529. Zero(&t, sizeof(t));
  4530. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4531. ret = CcGetAccount(pc->RemoteClient, &t);
  4532. if (ret == ERR_NO_ERROR)
  4533. {
  4534. RPC_CLIENT_CREATE_ACCOUNT z;
  4535. // Change the settings
  4536. if (t.ServerCert != NULL)
  4537. {
  4538. FreeX(t.ServerCert);
  4539. }
  4540. t.ServerCert = NULL;
  4541. Zero(&z, sizeof(z));
  4542. z.CheckServerCert = t.CheckServerCert;
  4543. z.ClientAuth = t.ClientAuth;
  4544. z.ClientOption = t.ClientOption;
  4545. z.ServerCert = t.ServerCert;
  4546. z.StartupAccount = t.StartupAccount;
  4547. ret = CcSetAccount(pc->RemoteClient, &z);
  4548. }
  4549. if (ret != ERR_NO_ERROR)
  4550. {
  4551. // Error has occurred
  4552. CmdPrintError(c, ret);
  4553. }
  4554. CiFreeClientGetAccount(&t);
  4555. // Release of the parameter list
  4556. FreeParamValueList(o);
  4557. return ret;
  4558. }
  4559. // Get a server-specific certificate of connection settings
  4560. UINT PcAccountServerCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4561. {
  4562. LIST *o;
  4563. PC *pc = (PC *)param;
  4564. UINT ret = ERR_NO_ERROR;
  4565. RPC_CLIENT_GET_ACCOUNT t;
  4566. // Parameter list that can be specified
  4567. PARAM args[] =
  4568. {
  4569. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4570. {"SAVECERT", CmdPrompt, _UU("CMD_SAVECERTPATH"), CmdEvalNotEmpty, NULL},
  4571. };
  4572. // Get the parameter list
  4573. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4574. if (o == NULL)
  4575. {
  4576. return ERR_INVALID_PARAMETER;
  4577. }
  4578. // RPC call
  4579. Zero(&t, sizeof(t));
  4580. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4581. ret = CcGetAccount(pc->RemoteClient, &t);
  4582. if (ret == ERR_NO_ERROR)
  4583. {
  4584. RPC_CLIENT_CREATE_ACCOUNT z;
  4585. // Change the settings
  4586. if (t.ServerCert != NULL)
  4587. {
  4588. FreeX(t.ServerCert);
  4589. }
  4590. t.ServerCert = NULL;
  4591. Zero(&z, sizeof(z));
  4592. z.CheckServerCert = t.CheckServerCert;
  4593. z.ClientAuth = t.ClientAuth;
  4594. z.ClientOption = t.ClientOption;
  4595. z.ServerCert = t.ServerCert;
  4596. z.StartupAccount = t.StartupAccount;
  4597. ret = CcSetAccount(pc->RemoteClient, &z);
  4598. }
  4599. if (ret != ERR_NO_ERROR)
  4600. {
  4601. // Error has occurred
  4602. CmdPrintError(c, ret);
  4603. }
  4604. CiFreeClientGetAccount(&t);
  4605. // Release of the parameter list
  4606. FreeParamValueList(o);
  4607. return ret;
  4608. }
  4609. // Set the advanced settings of connection settings
  4610. UINT PcAccountDetailSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4611. {
  4612. LIST *o;
  4613. PC *pc = (PC *)param;
  4614. UINT ret = ERR_NO_ERROR;
  4615. RPC_CLIENT_GET_ACCOUNT t;
  4616. CMD_EVAL_MIN_MAX mm_maxtcp =
  4617. {
  4618. "CMD_CascadeDetailSet_Eval_MaxTcp", 1, 32
  4619. };
  4620. CMD_EVAL_MIN_MAX mm_interval =
  4621. {
  4622. "CMD_CascadeDetailSet_Eval_Interval", 1, 4294967295UL
  4623. };
  4624. // Parameter list that can be specified
  4625. PARAM args[] =
  4626. {
  4627. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4628. {"MAXTCP", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_MaxTcp"), CmdEvalMinMax, &mm_maxtcp},
  4629. {"INTERVAL", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_Interval"), CmdEvalMinMax, &mm_interval},
  4630. {"TTL", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_TTL"), NULL, NULL},
  4631. {"HALF", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_HALF"), NULL, NULL},
  4632. {"BRIDGE", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_BRIDGE"), NULL, NULL},
  4633. {"MONITOR", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_MONITOR"), NULL, NULL},
  4634. {"NOTRACK", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_NOTRACK"), NULL, NULL},
  4635. {"NOQOS", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_NOQOS"), NULL, NULL},
  4636. };
  4637. // Get the parameter list
  4638. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4639. if (o == NULL)
  4640. {
  4641. return ERR_INVALID_PARAMETER;
  4642. }
  4643. // RPC call
  4644. Zero(&t, sizeof(t));
  4645. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4646. ret = CcGetAccount(pc->RemoteClient, &t);
  4647. if (ret == ERR_NO_ERROR)
  4648. {
  4649. RPC_CLIENT_CREATE_ACCOUNT z;
  4650. // Data change
  4651. t.ClientOption->MaxConnection = GetParamInt(o, "MAXTCP");
  4652. t.ClientOption->AdditionalConnectionInterval = GetParamInt(o, "INTERVAL");
  4653. t.ClientOption->ConnectionDisconnectSpan = GetParamInt(o, "TTL");
  4654. t.ClientOption->HalfConnection = GetParamYes(o, "HALF");
  4655. t.ClientOption->RequireBridgeRoutingMode = GetParamYes(o, "BRIDGE");
  4656. t.ClientOption->RequireMonitorMode = GetParamYes(o, "MONITOR");
  4657. t.ClientOption->NoRoutingTracking = GetParamYes(o, "NOTRACK");
  4658. t.ClientOption->DisableQoS = GetParamYes(o, "NOQOS");
  4659. Zero(&z, sizeof(z));
  4660. z.CheckServerCert = t.CheckServerCert;
  4661. z.ClientAuth = t.ClientAuth;
  4662. z.ClientOption = t.ClientOption;
  4663. z.ServerCert = t.ServerCert;
  4664. z.StartupAccount = t.StartupAccount;
  4665. ret = CcSetAccount(pc->RemoteClient, &z);
  4666. }
  4667. if (ret != ERR_NO_ERROR)
  4668. {
  4669. // Error has occurred
  4670. CmdPrintError(c, ret);
  4671. }
  4672. CiFreeClientGetAccount(&t);
  4673. // Release of the parameter list
  4674. FreeParamValueList(o);
  4675. return ret;
  4676. }
  4677. // Change the name of the connection settings
  4678. UINT PcAccountRename(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4679. {
  4680. LIST *o;
  4681. PC *pc = (PC *)param;
  4682. UINT ret = ERR_NO_ERROR;
  4683. RPC_RENAME_ACCOUNT t;
  4684. // Parameter list that can be specified
  4685. PARAM args[] =
  4686. {
  4687. {"[name]", CmdPrompt, _UU("CMD_AccountRename_PROMPT_OLD"), CmdEvalNotEmpty, NULL},
  4688. {"NEW", CmdPrompt, _UU("CMD_AccountRename_PROMPT_NEW"), CmdEvalNotEmpty, NULL},
  4689. };
  4690. // Get the parameter list
  4691. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4692. if (o == NULL)
  4693. {
  4694. return ERR_INVALID_PARAMETER;
  4695. }
  4696. // RPC call
  4697. Zero(&t, sizeof(t));
  4698. UniStrCpy(t.NewName, sizeof(t.NewName), GetParamUniStr(o, "NEW"));
  4699. UniStrCpy(t.OldName, sizeof(t.OldName), GetParamUniStr(o, "[name]"));
  4700. ret = CcRenameAccount(pc->RemoteClient, &t);
  4701. if (ret == ERR_NO_ERROR)
  4702. {
  4703. // Success
  4704. }
  4705. if (ret != ERR_NO_ERROR)
  4706. {
  4707. // Error has occurred
  4708. CmdPrintError(c, ret);
  4709. }
  4710. // Release of the parameter list
  4711. FreeParamValueList(o);
  4712. return ret;
  4713. }
  4714. // Start to connect to the VPN Server using the connection settings
  4715. UINT PcAccountConnect(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4716. {
  4717. LIST *o;
  4718. PC *pc = (PC *)param;
  4719. UINT ret = ERR_NO_ERROR;
  4720. RPC_CLIENT_CONNECT t;
  4721. // Parameter list that can be specified
  4722. PARAM args[] =
  4723. {
  4724. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4725. };
  4726. // Get the parameter list
  4727. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4728. if (o == NULL)
  4729. {
  4730. return ERR_INVALID_PARAMETER;
  4731. }
  4732. // RPC call
  4733. Zero(&t, sizeof(t));
  4734. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4735. ret = CcConnect(pc->RemoteClient, &t);
  4736. if (ret == ERR_NO_ERROR)
  4737. {
  4738. // Success
  4739. }
  4740. if (ret != ERR_NO_ERROR)
  4741. {
  4742. // Error has occurred
  4743. CmdPrintError(c, ret);
  4744. }
  4745. // Release of the parameter list
  4746. FreeParamValueList(o);
  4747. return ret;
  4748. }
  4749. // Disconnect the connection settings of connected
  4750. UINT PcAccountDisconnect(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4751. {
  4752. LIST *o;
  4753. PC *pc = (PC *)param;
  4754. UINT ret = ERR_NO_ERROR;
  4755. RPC_CLIENT_CONNECT t;
  4756. // Parameter list that can be specified
  4757. PARAM args[] =
  4758. {
  4759. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4760. };
  4761. // Get the parameter list
  4762. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4763. if (o == NULL)
  4764. {
  4765. return ERR_INVALID_PARAMETER;
  4766. }
  4767. // RPC call
  4768. Zero(&t, sizeof(t));
  4769. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4770. ret = CcDisconnect(pc->RemoteClient, &t);
  4771. if (ret == ERR_NO_ERROR)
  4772. {
  4773. // Success
  4774. }
  4775. if (ret != ERR_NO_ERROR)
  4776. {
  4777. // Error has occurred
  4778. CmdPrintError(c, ret);
  4779. }
  4780. // Release of the parameter list
  4781. FreeParamValueList(o);
  4782. return ret;
  4783. }
  4784. // Get the current state of the connection settings
  4785. UINT PcAccountStatusGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4786. {
  4787. LIST *o;
  4788. PC *pc = (PC *)param;
  4789. UINT ret = ERR_NO_ERROR;
  4790. RPC_CLIENT_GET_CONNECTION_STATUS t;
  4791. // Parameter list that can be specified
  4792. PARAM args[] =
  4793. {
  4794. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4795. };
  4796. // Get the parameter list
  4797. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4798. if (o == NULL)
  4799. {
  4800. return ERR_INVALID_PARAMETER;
  4801. }
  4802. // RPC call
  4803. Zero(&t, sizeof(t));
  4804. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4805. ret = CcGetAccountStatus(pc->RemoteClient, &t);
  4806. if (ret == ERR_NO_ERROR)
  4807. {
  4808. if (t.Active == false)
  4809. {
  4810. // Has been disconnected
  4811. ret = ERR_ACCOUNT_INACTIVE;
  4812. }
  4813. else
  4814. {
  4815. CT *ct = CtNewStandard();
  4816. CmdPrintStatusToListView(ct, &t);
  4817. CtFree(ct, c);
  4818. }
  4819. }
  4820. if (ret != ERR_NO_ERROR)
  4821. {
  4822. // Error has occurred
  4823. CmdPrintError(c, ret);
  4824. }
  4825. CiFreeClientGetConnectionStatus(&t);
  4826. // Release of the parameter list
  4827. FreeParamValueList(o);
  4828. return ret;
  4829. }
  4830. // Set a virtual LAN card to be used in the connection settings
  4831. UINT PcAccountNicSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4832. {
  4833. LIST *o;
  4834. PC *pc = (PC *)param;
  4835. UINT ret = ERR_NO_ERROR;
  4836. RPC_CLIENT_GET_ACCOUNT t;
  4837. // Parameter list that can be specified
  4838. PARAM args[] =
  4839. {
  4840. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4841. {"NICNAME", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Nicname"), CmdEvalNotEmpty, NULL},
  4842. };
  4843. // Get the parameter list
  4844. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4845. if (o == NULL)
  4846. {
  4847. return ERR_INVALID_PARAMETER;
  4848. }
  4849. // RPC call
  4850. Zero(&t, sizeof(t));
  4851. Zero(&t, sizeof(t));
  4852. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4853. ret = CcGetAccount(pc->RemoteClient, &t);
  4854. if (ret == ERR_NO_ERROR)
  4855. {
  4856. RPC_CLIENT_CREATE_ACCOUNT c;
  4857. // Success
  4858. StrCpy(t.ClientOption->DeviceName, sizeof(t.ClientOption->DeviceName),
  4859. GetParamStr(o, "NICNAME"));
  4860. Zero(&c, sizeof(c));
  4861. c.ClientAuth = t.ClientAuth;
  4862. c.ClientOption = t.ClientOption;
  4863. c.CheckServerCert = t.CheckServerCert;
  4864. c.ServerCert = t.ServerCert;
  4865. c.StartupAccount = t.StartupAccount;
  4866. ret = CcSetAccount(pc->RemoteClient, &c);
  4867. }
  4868. if (ret != ERR_NO_ERROR)
  4869. {
  4870. // Error has occurred
  4871. CmdPrintError(c, ret);
  4872. }
  4873. CiFreeClientGetAccount(&t);
  4874. // Release of the parameter list
  4875. FreeParamValueList(o);
  4876. return ret;
  4877. }
  4878. // Set to display error screens and connection status while connecting to the VPN Server
  4879. UINT PcAccountStatusShow(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4880. {
  4881. LIST *o;
  4882. PC *pc = (PC *)param;
  4883. UINT ret = ERR_NO_ERROR;
  4884. RPC_CLIENT_GET_ACCOUNT t;
  4885. // Parameter list that can be specified
  4886. PARAM args[] =
  4887. {
  4888. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4889. };
  4890. // Get the parameter list
  4891. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4892. if (o == NULL)
  4893. {
  4894. return ERR_INVALID_PARAMETER;
  4895. }
  4896. // RPC call
  4897. Zero(&t, sizeof(t));
  4898. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4899. ret = CcGetAccount(pc->RemoteClient, &t);
  4900. if (ret == ERR_NO_ERROR)
  4901. {
  4902. RPC_CLIENT_CREATE_ACCOUNT z;
  4903. // Change the settings
  4904. t.ClientOption->HideStatusWindow = false;
  4905. Zero(&z, sizeof(z));
  4906. z.CheckServerCert = t.CheckServerCert;
  4907. z.ClientAuth = t.ClientAuth;
  4908. z.ClientOption = t.ClientOption;
  4909. z.ServerCert = t.ServerCert;
  4910. z.StartupAccount = t.StartupAccount;
  4911. ret = CcSetAccount(pc->RemoteClient, &z);
  4912. }
  4913. if (ret != ERR_NO_ERROR)
  4914. {
  4915. // Error has occurred
  4916. CmdPrintError(c, ret);
  4917. }
  4918. CiFreeClientGetAccount(&t);
  4919. // Release of the parameter list
  4920. FreeParamValueList(o);
  4921. return ret;
  4922. }
  4923. // Configure not to display error screens and connection status while connecting to the VPN Server
  4924. UINT PcAccountStatusHide(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4925. {
  4926. LIST *o;
  4927. PC *pc = (PC *)param;
  4928. UINT ret = ERR_NO_ERROR;
  4929. RPC_CLIENT_GET_ACCOUNT t;
  4930. // Parameter list that can be specified
  4931. PARAM args[] =
  4932. {
  4933. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4934. };
  4935. // Get the parameter list
  4936. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4937. if (o == NULL)
  4938. {
  4939. return ERR_INVALID_PARAMETER;
  4940. }
  4941. // RPC call
  4942. Zero(&t, sizeof(t));
  4943. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4944. ret = CcGetAccount(pc->RemoteClient, &t);
  4945. if (ret == ERR_NO_ERROR)
  4946. {
  4947. RPC_CLIENT_CREATE_ACCOUNT z;
  4948. // Change the settings
  4949. t.ClientOption->HideStatusWindow = true;
  4950. Zero(&z, sizeof(z));
  4951. z.CheckServerCert = t.CheckServerCert;
  4952. z.ClientAuth = t.ClientAuth;
  4953. z.ClientOption = t.ClientOption;
  4954. z.ServerCert = t.ServerCert;
  4955. z.StartupAccount = t.StartupAccount;
  4956. ret = CcSetAccount(pc->RemoteClient, &z);
  4957. }
  4958. if (ret != ERR_NO_ERROR)
  4959. {
  4960. // Error has occurred
  4961. CmdPrintError(c, ret);
  4962. }
  4963. CiFreeClientGetAccount(&t);
  4964. // Release of the parameter list
  4965. FreeParamValueList(o);
  4966. return ret;
  4967. }
  4968. // Set the type of user authentication of connection settings to the smart card authentication
  4969. UINT PcAccountSecureCertSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  4970. {
  4971. LIST *o;
  4972. PC *pc = (PC *)param;
  4973. UINT ret = ERR_NO_ERROR;
  4974. RPC_CLIENT_GET_ACCOUNT t;
  4975. // Parameter list that can be specified
  4976. PARAM args[] =
  4977. {
  4978. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  4979. {"CERTNAME", CmdPrompt, _UU("CMD_AccountSecureCertSet_PROMPT_CERTNAME"), CmdEvalNotEmpty, NULL},
  4980. {"KEYNAME", CmdPrompt, _UU("CMD_AccountSecureCertSet_PROMPT_KEYNAME"), CmdEvalNotEmpty, NULL},
  4981. };
  4982. // Get the parameter list
  4983. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  4984. if (o == NULL)
  4985. {
  4986. return ERR_INVALID_PARAMETER;
  4987. }
  4988. // RPC call
  4989. Zero(&t, sizeof(t));
  4990. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  4991. ret = CcGetAccount(pc->RemoteClient, &t);
  4992. if (ret == ERR_NO_ERROR)
  4993. {
  4994. RPC_CLIENT_CREATE_ACCOUNT z;
  4995. // Change the settings
  4996. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_SECURE;
  4997. StrCpy(t.ClientAuth->SecurePublicCertName, sizeof(t.ClientAuth->SecurePublicCertName),
  4998. GetParamStr(o, "CERTNAME"));
  4999. StrCpy(t.ClientAuth->SecurePrivateKeyName, sizeof(t.ClientAuth->SecurePrivateKeyName),
  5000. GetParamStr(o, "KEYNAME"));
  5001. Zero(&z, sizeof(z));
  5002. z.CheckServerCert = t.CheckServerCert;
  5003. z.ClientAuth = t.ClientAuth;
  5004. z.ClientOption = t.ClientOption;
  5005. z.ServerCert = t.ServerCert;
  5006. z.StartupAccount = t.StartupAccount;
  5007. ret = CcSetAccount(pc->RemoteClient, &z);
  5008. }
  5009. if (ret != ERR_NO_ERROR)
  5010. {
  5011. // Error has occurred
  5012. CmdPrintError(c, ret);
  5013. }
  5014. CiFreeClientGetAccount(&t);
  5015. // Release of the parameter list
  5016. FreeParamValueList(o);
  5017. return ret;
  5018. }
  5019. // Set the retry interval and number of retries when disconnect or connection failure of connection settings
  5020. UINT PcAccountRetrySet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5021. {
  5022. LIST *o;
  5023. PC *pc = (PC *)param;
  5024. UINT ret = ERR_NO_ERROR;
  5025. RPC_CLIENT_GET_ACCOUNT t;
  5026. // Parameter list that can be specified
  5027. CMD_EVAL_MIN_MAX minmax =
  5028. {
  5029. "CMD_AccountRetrySet_EVAL_INTERVAL",
  5030. 5,
  5031. 4294967295UL,
  5032. };
  5033. PARAM args[] =
  5034. {
  5035. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  5036. {"NUM", CmdPrompt, _UU("CMD_AccountRetrySet_PROMPT_NUM"), CmdEvalNotEmpty, NULL},
  5037. {"INTERVAL", CmdPrompt, _UU("CMD_AccountRetrySet_PROMPY_INTERVAL"), CmdEvalMinMax, &minmax},
  5038. };
  5039. // Get the parameter list
  5040. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  5041. if (o == NULL)
  5042. {
  5043. return ERR_INVALID_PARAMETER;
  5044. }
  5045. // RPC call
  5046. Zero(&t, sizeof(t));
  5047. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  5048. ret = CcGetAccount(pc->RemoteClient, &t);
  5049. if (ret == ERR_NO_ERROR)
  5050. {
  5051. RPC_CLIENT_CREATE_ACCOUNT z;
  5052. // Change the settings
  5053. UINT num = GetParamInt(o, "NUM");
  5054. UINT interval = GetParamInt(o, "INTERVAL");
  5055. t.ClientOption->NumRetry = (num == 999) ? INFINITE : num;
  5056. t.ClientOption->RetryInterval = interval;
  5057. Zero(&z, sizeof(z));
  5058. z.CheckServerCert = t.CheckServerCert;
  5059. z.ClientAuth = t.ClientAuth;
  5060. z.ClientOption = t.ClientOption;
  5061. z.ServerCert = t.ServerCert;
  5062. z.StartupAccount = t.StartupAccount;
  5063. ret = CcSetAccount(pc->RemoteClient, &z);
  5064. }
  5065. if (ret != ERR_NO_ERROR)
  5066. {
  5067. // Error has occurred
  5068. CmdPrintError(c, ret);
  5069. }
  5070. CiFreeClientGetAccount(&t);
  5071. // Release of the parameter list
  5072. FreeParamValueList(o);
  5073. return ret;
  5074. }
  5075. // Set to start-up connection the connection settings
  5076. UINT PcAccountStartupSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5077. {
  5078. LIST *o;
  5079. PC *pc = (PC *)param;
  5080. UINT ret = ERR_NO_ERROR;
  5081. RPC_CLIENT_GET_ACCOUNT t;
  5082. // Parameter list that can be specified
  5083. PARAM args[] =
  5084. {
  5085. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  5086. };
  5087. // Get the parameter list
  5088. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  5089. if (o == NULL)
  5090. {
  5091. return ERR_INVALID_PARAMETER;
  5092. }
  5093. // RPC call
  5094. Zero(&t, sizeof(t));
  5095. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  5096. ret = CcGetAccount(pc->RemoteClient, &t);
  5097. if (ret == ERR_NO_ERROR)
  5098. {
  5099. RPC_CLIENT_CREATE_ACCOUNT z;
  5100. // Change the settings
  5101. t.StartupAccount = true;
  5102. Zero(&z, sizeof(z));
  5103. z.CheckServerCert = t.CheckServerCert;
  5104. z.ClientAuth = t.ClientAuth;
  5105. z.ClientOption = t.ClientOption;
  5106. z.ServerCert = t.ServerCert;
  5107. z.StartupAccount = t.StartupAccount;
  5108. ret = CcSetAccount(pc->RemoteClient, &z);
  5109. }
  5110. if (ret != ERR_NO_ERROR)
  5111. {
  5112. // Error has occurred
  5113. CmdPrintError(c, ret);
  5114. }
  5115. CiFreeClientGetAccount(&t);
  5116. // Release of the parameter list
  5117. FreeParamValueList(o);
  5118. return ret;
  5119. }
  5120. // Unset the start-up connection of the connection settings
  5121. UINT PcAccountStartupRemove(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5122. {
  5123. LIST *o;
  5124. PC *pc = (PC *)param;
  5125. UINT ret = ERR_NO_ERROR;
  5126. RPC_CLIENT_GET_ACCOUNT t;
  5127. // Parameter list that can be specified
  5128. PARAM args[] =
  5129. {
  5130. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  5131. };
  5132. // Get the parameter list
  5133. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  5134. if (o == NULL)
  5135. {
  5136. return ERR_INVALID_PARAMETER;
  5137. }
  5138. // RPC call
  5139. Zero(&t, sizeof(t));
  5140. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  5141. ret = CcGetAccount(pc->RemoteClient, &t);
  5142. if (ret == ERR_NO_ERROR)
  5143. {
  5144. RPC_CLIENT_CREATE_ACCOUNT z;
  5145. // Change the settings
  5146. t.StartupAccount = false;
  5147. Zero(&z, sizeof(z));
  5148. z.CheckServerCert = t.CheckServerCert;
  5149. z.ClientAuth = t.ClientAuth;
  5150. z.ClientOption = t.ClientOption;
  5151. z.ServerCert = t.ServerCert;
  5152. z.StartupAccount = t.StartupAccount;
  5153. ret = CcSetAccount(pc->RemoteClient, &z);
  5154. }
  5155. if (ret != ERR_NO_ERROR)
  5156. {
  5157. // Error has occurred
  5158. CmdPrintError(c, ret);
  5159. }
  5160. CiFreeClientGetAccount(&t);
  5161. // Release of the parameter list
  5162. FreeParamValueList(o);
  5163. return ret;
  5164. }
  5165. // Export the connection settings
  5166. UINT PcAccountExport(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5167. {
  5168. LIST *o;
  5169. PC *pc = (PC *)param;
  5170. UINT ret = ERR_NO_ERROR;
  5171. RPC_CLIENT_GET_ACCOUNT t;
  5172. // Parameter list that can be specified
  5173. PARAM args[] =
  5174. {
  5175. {"[name]", CmdPrompt, _UU("CMD_AccountCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  5176. {"SAVEPATH", CmdPrompt, _UU("CMD_AccountExport_PROMPT_SAVEPATH"), CmdEvalNotEmpty, NULL},
  5177. };
  5178. // Get the parameter list
  5179. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  5180. if (o == NULL)
  5181. {
  5182. return ERR_INVALID_PARAMETER;
  5183. }
  5184. // RPC call
  5185. Zero(&t, sizeof(t));
  5186. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  5187. ret = CcGetAccount(pc->RemoteClient, &t);
  5188. if (ret == ERR_NO_ERROR)
  5189. {
  5190. RPC_CLIENT_CREATE_ACCOUNT z;
  5191. BUF *b;
  5192. BUF *b2;
  5193. char tmp[MAX_SIZE];
  5194. UCHAR *buf;
  5195. UINT buf_size;
  5196. UCHAR bom[] = {0xef, 0xbb, 0xbf, };
  5197. Zero(&z, sizeof(z));
  5198. z.CheckServerCert = t.CheckServerCert;
  5199. z.ClientAuth = t.ClientAuth;
  5200. z.ClientOption = t.ClientOption;
  5201. z.ServerCert = t.ServerCert;
  5202. z.StartupAccount = t.StartupAccount;
  5203. b = CiAccountToCfg(&z);
  5204. StrCpy(tmp, sizeof(tmp), GetParamStr(o, "SAVEPATH"));
  5205. b2 = NewBuf();
  5206. WriteBuf(b2, bom, sizeof(bom));
  5207. // Add the header part
  5208. buf_size = CalcUniToUtf8(_UU("CM_ACCOUNT_FILE_BANNER"));
  5209. buf = ZeroMalloc(buf_size + 32);
  5210. UniToUtf8(buf, buf_size, _UU("CM_ACCOUNT_FILE_BANNER"));
  5211. WriteBuf(b2, buf, StrLen((char *)buf));
  5212. WriteBuf(b2, b->Buf, b->Size);
  5213. SeekBuf(b2, 0, 0);
  5214. FreeBuf(b);
  5215. if (DumpBuf(b2, tmp) == false)
  5216. {
  5217. c->Write(c, _UU("CMD_SAVEFILE_FAILED"));
  5218. ret = ERR_INTERNAL_ERROR;
  5219. }
  5220. FreeBuf(b2);
  5221. Free(buf);
  5222. }
  5223. if (ret != ERR_NO_ERROR)
  5224. {
  5225. // Error has occurred
  5226. CmdPrintError(c, ret);
  5227. }
  5228. CiFreeClientGetAccount(&t);
  5229. // Release of the parameter list
  5230. FreeParamValueList(o);
  5231. return ret;
  5232. }
  5233. // Check whether the specified account name exists
  5234. bool CmdIsAccountName(REMOTE_CLIENT *r, wchar_t *name)
  5235. {
  5236. UINT i;
  5237. RPC_CLIENT_ENUM_ACCOUNT t;
  5238. wchar_t tmp[MAX_SIZE];
  5239. bool b = false;
  5240. // Validate arguments
  5241. if (r == NULL || name == NULL)
  5242. {
  5243. return false;
  5244. }
  5245. if (CcEnumAccount(r, &t) != ERR_NO_ERROR)
  5246. {
  5247. return false;
  5248. }
  5249. UniStrCpy(tmp, sizeof(tmp), name);
  5250. UniTrim(tmp);
  5251. for (i = 0;i < t.NumItem;i++)
  5252. {
  5253. if (UniStrCmpi(t.Items[i]->AccountName, tmp) == 0)
  5254. {
  5255. b = true;
  5256. break;
  5257. }
  5258. }
  5259. CiFreeClientEnumAccount(&t);
  5260. return b;
  5261. }
  5262. // Generate an import name
  5263. void CmdGenerateImportName(REMOTE_CLIENT *r, wchar_t *name, UINT size, wchar_t *old_name)
  5264. {
  5265. UINT i;
  5266. // Validate arguments
  5267. if (r == NULL || name == NULL || old_name == NULL)
  5268. {
  5269. return;
  5270. }
  5271. for (i = 1;;i++)
  5272. {
  5273. wchar_t tmp[MAX_SIZE];
  5274. if (i == 1)
  5275. {
  5276. UniFormat(tmp, sizeof(tmp), _UU("CM_IMPORT_NAME_1"), old_name);
  5277. }
  5278. else
  5279. {
  5280. UniFormat(tmp, sizeof(tmp), _UU("CM_IMPORT_NAME_2"), old_name, i);
  5281. }
  5282. if (CmdIsAccountName(r, tmp) == false)
  5283. {
  5284. UniStrCpy(name, size, tmp);
  5285. return;
  5286. }
  5287. }
  5288. }
  5289. // Import a connection setting
  5290. UINT PcAccountImport(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5291. {
  5292. LIST *o;
  5293. PC *pc = (PC *)param;
  5294. UINT ret = ERR_NO_ERROR;
  5295. BUF *b;
  5296. wchar_t name[MAX_SIZE];
  5297. // Parameter list that can be specified
  5298. PARAM args[] =
  5299. {
  5300. {"[path]", CmdPrompt, _UU("CMD_AccountImport_PROMPT_PATH"), CmdEvalIsFile, NULL},
  5301. };
  5302. // Get the parameter list
  5303. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  5304. if (o == NULL)
  5305. {
  5306. return ERR_INVALID_PARAMETER;
  5307. }
  5308. // Read the file
  5309. b = ReadDumpW(GetParamUniStr(o, "[path]"));
  5310. if (b == NULL)
  5311. {
  5312. // Read failure
  5313. c->Write(c, _UU("CMD_LOADFILE_FAILED"));
  5314. ret = ERR_INTERNAL_ERROR;
  5315. }
  5316. else
  5317. {
  5318. RPC_CLIENT_CREATE_ACCOUNT *t;
  5319. t = CiCfgToAccount(b);
  5320. if (t == NULL)
  5321. {
  5322. // Failed to parse
  5323. c->Write(c, _UU("CMD_AccountImport_FAILED_PARSE"));
  5324. ret = ERR_INTERNAL_ERROR;
  5325. }
  5326. else
  5327. {
  5328. CmdGenerateImportName(pc->RemoteClient, name, sizeof(name), t->ClientOption->AccountName);
  5329. UniStrCpy(t->ClientOption->AccountName, sizeof(t->ClientOption->AccountName), name);
  5330. ret = CcCreateAccount(pc->RemoteClient, t);
  5331. if (ret == ERR_NO_ERROR)
  5332. {
  5333. wchar_t tmp[MAX_SIZE];
  5334. UniFormat(tmp, sizeof(tmp), _UU("CMD_AccountImport_OK"), name);
  5335. c->Write(c, tmp);
  5336. }
  5337. CiFreeClientCreateAccount(t);
  5338. Free(t);
  5339. }
  5340. FreeBuf(b);
  5341. }
  5342. if (ret != ERR_NO_ERROR)
  5343. {
  5344. // Error has occurred
  5345. CmdPrintError(c, ret);
  5346. }
  5347. // Release of the parameter list
  5348. FreeParamValueList(o);
  5349. return ret;
  5350. }
  5351. // Allow remote management of the VPN Client Service
  5352. UINT PcRemoteEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5353. {
  5354. LIST *o;
  5355. PC *pc = (PC *)param;
  5356. UINT ret = ERR_NO_ERROR;
  5357. CLIENT_CONFIG t;
  5358. // Get the parameter list
  5359. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  5360. if (o == NULL)
  5361. {
  5362. return ERR_INVALID_PARAMETER;
  5363. }
  5364. // RPC call
  5365. Zero(&t, sizeof(t));
  5366. ret = CcGetClientConfig(pc->RemoteClient, &t);
  5367. if (ret == ERR_NO_ERROR)
  5368. {
  5369. t.AllowRemoteConfig = true;
  5370. ret = CcSetClientConfig(pc->RemoteClient, &t);
  5371. }
  5372. if (ret == ERR_NO_ERROR)
  5373. {
  5374. // Success
  5375. }
  5376. if (ret != ERR_NO_ERROR)
  5377. {
  5378. // Error has occurred
  5379. CmdPrintError(c, ret);
  5380. }
  5381. // Release of the parameter list
  5382. FreeParamValueList(o);
  5383. return ret;
  5384. }
  5385. // Prohibit remote management of the VPN Client Service
  5386. UINT PcRemoteDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5387. {
  5388. LIST *o;
  5389. PC *pc = (PC *)param;
  5390. UINT ret = ERR_NO_ERROR;
  5391. CLIENT_CONFIG t;
  5392. // Get the parameter list
  5393. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  5394. if (o == NULL)
  5395. {
  5396. return ERR_INVALID_PARAMETER;
  5397. }
  5398. // RPC call
  5399. Zero(&t, sizeof(t));
  5400. ret = CcGetClientConfig(pc->RemoteClient, &t);
  5401. if (ret == ERR_NO_ERROR)
  5402. {
  5403. t.AllowRemoteConfig = false;
  5404. ret = CcSetClientConfig(pc->RemoteClient, &t);
  5405. }
  5406. if (ret == ERR_NO_ERROR)
  5407. {
  5408. // Success
  5409. }
  5410. if (ret != ERR_NO_ERROR)
  5411. {
  5412. // Error has occurred
  5413. CmdPrintError(c, ret);
  5414. }
  5415. // Release of the parameter list
  5416. FreeParamValueList(o);
  5417. return ret;
  5418. }
  5419. // Enable the maintenance function of the Internet connection
  5420. UINT PcKeepEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5421. {
  5422. LIST *o;
  5423. PC *pc = (PC *)param;
  5424. UINT ret = ERR_NO_ERROR;
  5425. CLIENT_CONFIG t;
  5426. // Get the parameter list
  5427. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  5428. if (o == NULL)
  5429. {
  5430. return ERR_INVALID_PARAMETER;
  5431. }
  5432. // RPC call
  5433. Zero(&t, sizeof(t));
  5434. ret = CcGetClientConfig(pc->RemoteClient, &t);
  5435. if (ret == ERR_NO_ERROR)
  5436. {
  5437. // Change the settings
  5438. t.UseKeepConnect = true;
  5439. ret = CcSetClientConfig(pc->RemoteClient, &t);
  5440. }
  5441. if (ret == ERR_NO_ERROR)
  5442. {
  5443. // Success
  5444. }
  5445. if (ret != ERR_NO_ERROR)
  5446. {
  5447. // Error has occurred
  5448. CmdPrintError(c, ret);
  5449. }
  5450. // Release of the parameter list
  5451. FreeParamValueList(o);
  5452. return ret;
  5453. }
  5454. // Disable the maintenance function of the Internet connection
  5455. UINT PcKeepDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5456. {
  5457. LIST *o;
  5458. PC *pc = (PC *)param;
  5459. UINT ret = ERR_NO_ERROR;
  5460. CLIENT_CONFIG t;
  5461. // Get the parameter list
  5462. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  5463. if (o == NULL)
  5464. {
  5465. return ERR_INVALID_PARAMETER;
  5466. }
  5467. // RPC call
  5468. Zero(&t, sizeof(t));
  5469. ret = CcGetClientConfig(pc->RemoteClient, &t);
  5470. if (ret == ERR_NO_ERROR)
  5471. {
  5472. // Change the settings
  5473. t.UseKeepConnect = false;
  5474. ret = CcSetClientConfig(pc->RemoteClient, &t);
  5475. }
  5476. if (ret == ERR_NO_ERROR)
  5477. {
  5478. // Success
  5479. }
  5480. if (ret != ERR_NO_ERROR)
  5481. {
  5482. // Error has occurred
  5483. CmdPrintError(c, ret);
  5484. }
  5485. // Release of the parameter list
  5486. FreeParamValueList(o);
  5487. return ret;
  5488. }
  5489. // Set the maintenance function of the Internet connection
  5490. UINT PcKeepSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5491. {
  5492. LIST *o;
  5493. PC *pc = (PC *)param;
  5494. UINT ret = ERR_NO_ERROR;
  5495. CLIENT_CONFIG t;
  5496. char *host;
  5497. UINT port;
  5498. // Parameter list that can be specified
  5499. PARAM args[] =
  5500. {
  5501. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  5502. {"HOST", CmdPrompt, _UU("CMD_KeepSet_PROMPT_HOST"), CmdEvalHostAndPort, NULL},
  5503. {"PROTOCOL", CmdPrompt, _UU("CMD_KeepSet_PROMPT_PROTOCOL"), CmdEvalTcpOrUdp, NULL},
  5504. {"INTERVAL", CmdPrompt, _UU("CMD_KeepSet_PROMPT_INTERVAL"), NULL, NULL},
  5505. };
  5506. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  5507. if (o == NULL)
  5508. {
  5509. return ERR_INVALID_PARAMETER;
  5510. }
  5511. // RPC call
  5512. Zero(&t, sizeof(t));
  5513. ret = CcGetClientConfig(pc->RemoteClient, &t);
  5514. if (ret == ERR_NO_ERROR)
  5515. {
  5516. if (ParseHostPort(GetParamStr(o, "HOST"), &host, &port, 0))
  5517. {
  5518. StrCpy(t.KeepConnectHost, sizeof(t.KeepConnectHost), host);
  5519. t.KeepConnectPort = port;
  5520. t.KeepConnectInterval = GetParamInt(o, "INTERVAL");
  5521. t.KeepConnectProtocol = (StrCmpi(GetParamStr(o, "PROTOCOL"), "tcp") == 0) ? 0 : 1;
  5522. Free(host);
  5523. ret = CcSetClientConfig(pc->RemoteClient, &t);
  5524. }
  5525. }
  5526. if (ret != ERR_NO_ERROR)
  5527. {
  5528. // Error has occurred
  5529. CmdPrintError(c, ret);
  5530. }
  5531. // Release of the parameter list
  5532. FreeParamValueList(o);
  5533. return ret;
  5534. }
  5535. // Get the maintenance function of the Internet connection
  5536. UINT PcKeepGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5537. {
  5538. LIST *o;
  5539. PC *pc = (PC *)param;
  5540. UINT ret = ERR_NO_ERROR;
  5541. CLIENT_CONFIG t;
  5542. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  5543. if (o == NULL)
  5544. {
  5545. return ERR_INVALID_PARAMETER;
  5546. }
  5547. // RPC call
  5548. Zero(&t, sizeof(t));
  5549. ret = CcGetClientConfig(pc->RemoteClient, &t);
  5550. if (ret == ERR_NO_ERROR)
  5551. {
  5552. wchar_t tmp[MAX_SIZE];
  5553. CT *ct = CtNewStandard();
  5554. StrToUni(tmp, sizeof(tmp), t.KeepConnectHost);
  5555. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_1"), tmp);
  5556. UniToStru(tmp, t.KeepConnectPort);
  5557. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_2"), tmp);
  5558. UniToStru(tmp, t.KeepConnectInterval);
  5559. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_3"), tmp);
  5560. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_4"),
  5561. t.KeepConnectProtocol == 0 ? L"TCP/IP" : L"UDP/IP");
  5562. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_5"),
  5563. t.UseKeepConnect ? _UU("SM_ACCESS_ENABLE") : _UU("SM_ACCESS_DISABLE"));
  5564. CtFree(ct, c);
  5565. }
  5566. if (ret != ERR_NO_ERROR)
  5567. {
  5568. // Error has occurred
  5569. CmdPrintError(c, ret);
  5570. }
  5571. // Release of the parameter list
  5572. FreeParamValueList(o);
  5573. return ret;
  5574. }
  5575. // Creat a new client management tool context
  5576. PC *NewPc(CONSOLE *c, REMOTE_CLIENT *remote_client, char *servername, wchar_t *cmdline)
  5577. {
  5578. PC *pc;
  5579. // Validate arguments
  5580. if (c == NULL || remote_client == NULL || servername == NULL)
  5581. {
  5582. return NULL;
  5583. }
  5584. if (UniIsEmptyStr(cmdline))
  5585. {
  5586. cmdline = NULL;
  5587. }
  5588. pc = ZeroMalloc(sizeof(PC));
  5589. pc->ConsoleForServer = false;
  5590. pc->ServerName = CopyStr(servername);
  5591. pc->Console = c;
  5592. pc->LastError = 0;
  5593. pc->RemoteClient = remote_client;
  5594. pc->CmdLine = CopyUniStr(cmdline);
  5595. return pc;
  5596. }
  5597. // Release the client management tools context
  5598. void FreePc(PC *pc)
  5599. {
  5600. // Validate arguments
  5601. if (pc == NULL)
  5602. {
  5603. return;
  5604. }
  5605. Free(pc->ServerName);
  5606. Free(pc->CmdLine);
  5607. Free(pc);
  5608. }
  5609. // Client management tool
  5610. UINT PcConnect(CONSOLE *c, char *target, wchar_t *cmdline, char *password)
  5611. {
  5612. CEDAR *cedar;
  5613. REMOTE_CLIENT *client;
  5614. bool bad_pass;
  5615. bool no_remote;
  5616. char pass[MAX_SIZE];
  5617. UINT ret = 0;
  5618. // Validate arguments
  5619. if (c == NULL || target == NULL)
  5620. {
  5621. return ERR_INTERNAL_ERROR;
  5622. }
  5623. StrCpy(pass, sizeof(pass), password);
  5624. cedar = NewCedar(NULL, NULL);
  5625. RETRY:
  5626. client = CcConnectRpc(target, pass, &bad_pass, &no_remote, 0);
  5627. if (client == NULL)
  5628. {
  5629. if (no_remote)
  5630. {
  5631. // Remote connection refusal
  5632. c->Write(c, _UU("CMD_VPNCMD_CLIENT_NO_REMODE"));
  5633. ReleaseCedar(cedar);
  5634. return ERR_INTERNAL_ERROR;
  5635. }
  5636. else if (bad_pass)
  5637. {
  5638. char *tmp;
  5639. // Password is different
  5640. c->Write(c, _UU("CMD_VPNCMD_PASSWORD_1"));
  5641. tmp = c->ReadPassword(c, _UU("CMD_VPNCMD_PASSWORD_2"));
  5642. c->Write(c, L"");
  5643. if (tmp == NULL)
  5644. {
  5645. // Cancel
  5646. ReleaseCedar(cedar);
  5647. return ERR_ACCESS_DENIED;
  5648. }
  5649. else
  5650. {
  5651. StrCpy(pass, sizeof(pass), tmp);
  5652. Free(tmp);
  5653. }
  5654. goto RETRY;
  5655. }
  5656. else
  5657. {
  5658. // Connection failure
  5659. CmdPrintError(c, ERR_CONNECT_FAILED);
  5660. ReleaseCedar(cedar);
  5661. return ERR_CONNECT_FAILED;
  5662. }
  5663. }
  5664. else
  5665. {
  5666. // Connection complete
  5667. PC *pc = NewPc(c, client, target, cmdline);
  5668. PcMain(pc);
  5669. ret = pc->LastError;
  5670. FreePc(pc);
  5671. }
  5672. CcDisconnectRpc(client);
  5673. ReleaseCedar(cedar);
  5674. return ret;
  5675. }
  5676. // Server Administration Tool Processor Main
  5677. void PsMain(PS *ps)
  5678. {
  5679. char prompt[MAX_SIZE];
  5680. wchar_t tmp[MAX_SIZE];
  5681. // Validate arguments
  5682. if (ps == NULL)
  5683. {
  5684. return;
  5685. }
  5686. // If it's not in CSV mode, to display a message that the connection has been made
  5687. if(ps->Console->ConsoleType != CONSOLE_CSV)
  5688. {
  5689. UniFormat(tmp, sizeof(tmp), _UU("CMD_VPNCMD_SERVER_CONNECTED"),
  5690. ps->ServerName, ps->ServerPort);
  5691. ps->Console->Write(ps->Console, tmp);
  5692. ps->Console->Write(ps->Console, L"");
  5693. if (ps->HubName == NULL)
  5694. {
  5695. // Server management mode
  5696. ps->Console->Write(ps->Console, _UU("CMD_VPNCMD_SERVER_CONNECTED_1"));
  5697. }
  5698. else
  5699. {
  5700. // Virtual HUB management mode
  5701. UniFormat(tmp, sizeof(tmp), _UU("CMD_VPNCMD_SERVER_CONNECTED_2"),
  5702. ps->HubName);
  5703. ps->Console->Write(ps->Console, tmp);
  5704. }
  5705. ps->Console->Write(ps->Console, L"");
  5706. }
  5707. // Get the Caps
  5708. ps->CapsList = ScGetCapsEx(ps->Rpc);
  5709. if (ps->AdminHub != NULL)
  5710. {
  5711. RPC_HUB_STATUS t;
  5712. UINT ret;
  5713. wchar_t tmp[MAX_SIZE];
  5714. // Choose the Virtual HUB that is specified in the ADMINHUB
  5715. Zero(&t, sizeof(t));
  5716. StrCpy(t.HubName, sizeof(t.HubName), ps->AdminHub);
  5717. ret = ScGetHubStatus(ps->Rpc, &t);
  5718. if (ret == ERR_NO_ERROR)
  5719. {
  5720. // Success
  5721. UniFormat(tmp, sizeof(tmp), _UU("CMD_Hub_Selected"), t.HubName);
  5722. if (ps->HubName != NULL)
  5723. {
  5724. Free(ps->HubName);
  5725. }
  5726. ps->HubName = CopyStr(t.HubName);
  5727. if( ps->Console->ConsoleType != CONSOLE_CSV)
  5728. {
  5729. ps->Console->Write(ps->Console, tmp);
  5730. }
  5731. }
  5732. else
  5733. {
  5734. // Failure
  5735. UniFormat(tmp, sizeof(tmp), _UU("CMD_Hub_Select_Failed"), ps->AdminHub);
  5736. ps->Console->Write(ps->Console, tmp);
  5737. CmdPrintError(ps->Console, ret);
  5738. }
  5739. }
  5740. if (ps->HubName == NULL)
  5741. {
  5742. RPC_KEY_PAIR t;
  5743. Zero(&t, sizeof(t));
  5744. if (ScGetServerCert(ps->Rpc, &t) == ERR_NO_ERROR)
  5745. {
  5746. if (t.Cert != NULL && t.Cert->has_basic_constraints == false)
  5747. {
  5748. if (t.Cert->root_cert)
  5749. {
  5750. ps->Console->Write(ps->Console, L"");
  5751. ps->Console->Write(ps->Console, _UU("SM_CERT_MESSAGE_CLI"));
  5752. ps->Console->Write(ps->Console, L"");
  5753. }
  5754. }
  5755. FreeRpcKeyPair(&t);
  5756. }
  5757. }
  5758. while (true)
  5759. {
  5760. // Definition of command
  5761. CMD cmd[] =
  5762. {
  5763. {"About", PsAbout},
  5764. {"Check", PtCheck},
  5765. {"Crash", PsCrash},
  5766. {"Flush", PsFlush},
  5767. {"Debug", PsDebug},
  5768. {"ServerInfoGet", PsServerInfoGet},
  5769. {"ServerStatusGet", PsServerStatusGet},
  5770. {"ListenerCreate", PsListenerCreate},
  5771. {"ListenerDelete", PsListenerDelete},
  5772. {"ListenerList", PsListenerList},
  5773. {"ListenerEnable", PsListenerEnable},
  5774. {"ListenerDisable", PsListenerDisable},
  5775. {"ServerPasswordSet", PsServerPasswordSet},
  5776. {"ClusterSettingGet", PsClusterSettingGet},
  5777. {"ClusterSettingStandalone", PsClusterSettingStandalone},
  5778. {"ClusterSettingController", PsClusterSettingController},
  5779. {"ClusterSettingMember", PsClusterSettingMember},
  5780. {"ClusterMemberList", PsClusterMemberList},
  5781. {"ClusterMemberInfoGet", PsClusterMemberInfoGet},
  5782. {"ClusterMemberCertGet", PsClusterMemberCertGet},
  5783. {"ClusterConnectionStatusGet", PsClusterConnectionStatusGet},
  5784. {"ServerCertGet", PsServerCertGet},
  5785. {"ServerKeyGet", PsServerKeyGet},
  5786. {"ServerCertSet", PsServerCertSet},
  5787. {"ServerCipherGet", PsServerCipherGet},
  5788. {"ServerCipherSet", PsServerCipherSet},
  5789. {"KeepEnable", PsKeepEnable},
  5790. {"KeepDisable", PsKeepDisable},
  5791. {"KeepSet", PsKeepSet},
  5792. {"KeepGet", PsKeepGet},
  5793. {"SyslogGet", PsSyslogGet},
  5794. {"SyslogDisable", PsSyslogDisable},
  5795. {"SyslogEnable", PsSyslogEnable},
  5796. {"ConnectionList", PsConnectionList},
  5797. {"ConnectionGet", PsConnectionGet},
  5798. {"ConnectionDisconnect", PsConnectionDisconnect},
  5799. {"BridgeDeviceList", PsBridgeDeviceList},
  5800. {"BridgeList", PsBridgeList},
  5801. {"BridgeCreate", PsBridgeCreate},
  5802. {"BridgeDelete", PsBridgeDelete},
  5803. {"Caps", PsCaps},
  5804. {"Reboot", PsReboot},
  5805. {"ConfigGet", PsConfigGet},
  5806. {"ConfigSet", PsConfigSet},
  5807. {"RouterList", PsRouterList},
  5808. {"RouterAdd", PsRouterAdd},
  5809. {"RouterDelete", PsRouterDelete},
  5810. {"RouterStart", PsRouterStart},
  5811. {"RouterStop", PsRouterStop},
  5812. {"RouterIfList", PsRouterIfList},
  5813. {"RouterIfAdd", PsRouterIfAdd},
  5814. {"RouterIfDel", PsRouterIfDel},
  5815. {"RouterTableList", PsRouterTableList},
  5816. {"RouterTableAdd", PsRouterTableAdd},
  5817. {"RouterTableDel", PsRouterTableDel},
  5818. {"LogFileList", PsLogFileList},
  5819. {"LogFileGet", PsLogFileGet},
  5820. {"HubCreate", PsHubCreate},
  5821. {"HubCreateDynamic", PsHubCreateDynamic},
  5822. {"HubCreateStatic", PsHubCreateStatic},
  5823. {"HubDelete", PsHubDelete},
  5824. {"HubSetStatic", PsHubSetStatic},
  5825. {"HubSetDynamic", PsHubSetDynamic},
  5826. {"HubList", PsHubList},
  5827. {"Hub", PsHub},
  5828. {"Online", PsOnline},
  5829. {"Offline", PsOffline},
  5830. {"SetMaxSession", PsSetMaxSession},
  5831. {"SetHubPassword", PsSetHubPassword},
  5832. {"SetEnumAllow", PsSetEnumAllow},
  5833. {"SetEnumDeny", PsSetEnumDeny},
  5834. {"OptionsGet", PsOptionsGet},
  5835. {"RadiusServerSet", PsRadiusServerSet},
  5836. {"RadiusServerDelete", PsRadiusServerDelete},
  5837. {"RadiusServerGet", PsRadiusServerGet},
  5838. {"StatusGet", PsStatusGet},
  5839. {"LogGet", PsLogGet},
  5840. {"LogEnable", PsLogEnable},
  5841. {"LogDisable", PsLogDisable},
  5842. {"LogSwitchSet", PsLogSwitchSet},
  5843. {"LogPacketSaveType", PsLogPacketSaveType},
  5844. {"CAList", PsCAList},
  5845. {"CAAdd", PsCAAdd},
  5846. {"CADelete", PsCADelete},
  5847. {"CAGet", PsCAGet},
  5848. {"CascadeList", PsCascadeList},
  5849. {"CascadeCreate", PsCascadeCreate},
  5850. {"CascadeSet", PsCascadeSet},
  5851. {"CascadeGet", PsCascadeGet},
  5852. {"CascadeDelete", PsCascadeDelete},
  5853. {"CascadeUsernameSet", PsCascadeUsernameSet},
  5854. {"CascadeAnonymousSet", PsCascadeAnonymousSet},
  5855. {"CascadePasswordSet", PsCascadePasswordSet},
  5856. {"CascadeCertSet", PsCascadeCertSet},
  5857. {"CascadeCertGet", PsCascadeCertGet},
  5858. {"CascadeEncryptEnable", PsCascadeEncryptEnable},
  5859. {"CascadeEncryptDisable", PsCascadeEncryptDisable},
  5860. {"CascadeCompressEnable", PsCascadeCompressEnable},
  5861. {"CascadeCompressDisable", PsCascadeCompressDisable},
  5862. {"CascadeProxyNone", PsCascadeProxyNone},
  5863. {"CascadeProxyHttp", PsCascadeProxyHttp},
  5864. {"CascadeProxySocks", PsCascadeProxySocks},
  5865. {"CascadeServerCertEnable", PsCascadeServerCertEnable},
  5866. {"CascadeServerCertDisable", PsCascadeServerCertDisable},
  5867. {"CascadeServerCertSet", PsCascadeServerCertSet},
  5868. {"CascadeServerCertDelete", PsCascadeServerCertDelete},
  5869. {"CascadeServerCertGet", PsCascadeServerCertGet},
  5870. {"CascadeDetailSet", PsCascadeDetailSet},
  5871. {"CascadePolicySet", PsCascadePolicySet},
  5872. {"PolicyList", PsPolicyList},
  5873. {"CascadeStatusGet", PsCascadeStatusGet},
  5874. {"CascadeRename", PsCascadeRename},
  5875. {"CascadeOnline", PsCascadeOnline},
  5876. {"CascadeOffline", PsCascadeOffline},
  5877. {"AccessAdd", PsAccessAdd},
  5878. {"AccessAddEx", PsAccessAddEx},
  5879. {"AccessAdd6", PsAccessAdd6},
  5880. {"AccessAddEx6", PsAccessAddEx6},
  5881. {"AccessList", PsAccessList},
  5882. {"AccessDelete", PsAccessDelete},
  5883. {"AccessEnable", PsAccessEnable},
  5884. {"AccessDisable", PsAccessDisable},
  5885. {"UserList", PsUserList},
  5886. {"UserCreate", PsUserCreate},
  5887. {"UserSet", PsUserSet},
  5888. {"UserDelete", PsUserDelete},
  5889. {"UserGet", PsUserGet},
  5890. {"UserAnonymousSet", PsUserAnonymousSet},
  5891. {"UserPasswordSet", PsUserPasswordSet},
  5892. {"UserCertSet", PsUserCertSet},
  5893. {"UserCertGet", PsUserCertGet},
  5894. {"UserSignedSet", PsUserSignedSet},
  5895. {"UserRadiusSet", PsUserRadiusSet},
  5896. {"UserNTLMSet", PsUserNTLMSet},
  5897. {"UserPolicyRemove", PsUserPolicyRemove},
  5898. {"UserPolicySet", PsUserPolicySet},
  5899. {"UserExpiresSet", PsUserExpiresSet},
  5900. {"GroupList", PsGroupList},
  5901. {"GroupCreate", PsGroupCreate},
  5902. {"GroupSet", PsGroupSet},
  5903. {"GroupDelete", PsGroupDelete},
  5904. {"GroupGet", PsGroupGet},
  5905. {"GroupJoin", PsGroupJoin},
  5906. {"GroupUnjoin", PsGroupUnjoin},
  5907. {"GroupPolicyRemove", PsGroupPolicyRemove},
  5908. {"GroupPolicySet", PsGroupPolicySet},
  5909. {"SessionList", PsSessionList},
  5910. {"SessionGet", PsSessionGet},
  5911. {"SessionDisconnect", PsSessionDisconnect},
  5912. {"MacTable", PsMacTable},
  5913. {"MacDelete", PsMacDelete},
  5914. {"IpTable", PsIpTable},
  5915. {"IpDelete", PsIpDelete},
  5916. {"SecureNatEnable", PsSecureNatEnable},
  5917. {"SecureNatDisable", PsSecureNatDisable},
  5918. {"SecureNatStatusGet", PsSecureNatStatusGet},
  5919. {"SecureNatHostGet", PsSecureNatHostGet},
  5920. {"SecureNatHostSet", PsSecureNatHostSet},
  5921. {"NatGet", PsNatGet},
  5922. {"NatEnable", PsNatEnable},
  5923. {"NatDisable", PsNatDisable},
  5924. {"NatSet", PsNatSet},
  5925. {"NatTable", PsNatTable},
  5926. {"DhcpGet", PsDhcpGet},
  5927. {"DhcpEnable", PsDhcpEnable},
  5928. {"DhcpDisable", PsDhcpDisable},
  5929. {"DhcpSet", PsDhcpSet},
  5930. {"DhcpTable", PsDhcpTable},
  5931. {"AdminOptionList", PsAdminOptionList},
  5932. {"AdminOptionSet", PsAdminOptionSet},
  5933. {"ExtOptionList", PsExtOptionList},
  5934. {"ExtOptionSet", PsExtOptionSet},
  5935. {"CrlList", PsCrlList},
  5936. {"CrlAdd", PsCrlAdd},
  5937. {"CrlDel", PsCrlDel},
  5938. {"CrlGet", PsCrlGet},
  5939. {"AcList", PsAcList},
  5940. {"AcAdd", PsAcAdd},
  5941. {"AcAdd6", PsAcAdd6},
  5942. {"AcDel", PsAcDel},
  5943. {"MakeCert", PtMakeCert},
  5944. {"MakeCert2048", PtMakeCert2048},
  5945. {"TrafficClient", PtTrafficClient},
  5946. {"TrafficServer", PtTrafficServer},
  5947. {"LicenseAdd", PsLicenseAdd},
  5948. {"LicenseDel", PsLicenseDel},
  5949. {"LicenseList", PsLicenseList},
  5950. {"LicenseStatus", PsLicenseStatus},
  5951. {"IPsecEnable", PsIPsecEnable},
  5952. {"IPsecGet", PsIPsecGet},
  5953. {"EtherIpClientAdd", PsEtherIpClientAdd},
  5954. {"EtherIpClientDelete", PsEtherIpClientDelete},
  5955. {"EtherIpClientList", PsEtherIpClientList},
  5956. {"OpenVpnEnable", PsOpenVpnEnable},
  5957. {"OpenVpnGet", PsOpenVpnGet},
  5958. {"OpenVpnMakeConfig", PsOpenVpnMakeConfig},
  5959. {"SstpEnable", PsSstpEnable},
  5960. {"SstpGet", PsSstpGet},
  5961. {"ServerCertRegenerate", PsServerCertRegenerate},
  5962. {"VpnOverIcmpDnsEnable", PsVpnOverIcmpDnsEnable},
  5963. {"VpnOverIcmpDnsGet", PsVpnOverIcmpDnsGet},
  5964. {"DynamicDnsGetStatus", PsDynamicDnsGetStatus},
  5965. {"DynamicDnsSetHostname", PsDynamicDnsSetHostname},
  5966. {"VpnAzureGetStatus", PsVpnAzureGetStatus},
  5967. {"VpnAzureSetEnable", PsVpnAzureSetEnable},
  5968. };
  5969. // Generate a prompt
  5970. if (ps->HubName == NULL)
  5971. {
  5972. Format(prompt, sizeof(prompt), "VPN Server>");
  5973. }
  5974. else
  5975. {
  5976. Format(prompt, sizeof(prompt), "VPN Server/%s>", ps->HubName);
  5977. }
  5978. if (DispatchNextCmdEx(ps->Console, ps->CmdLine, prompt, cmd, sizeof(cmd) / sizeof(cmd[0]), ps) == false)
  5979. {
  5980. break;
  5981. }
  5982. ps->LastError = ps->Console->RetCode;
  5983. if (ps->LastError == ERR_NO_ERROR && ps->Console->ConsoleType != CONSOLE_CSV)
  5984. {
  5985. ps->Console->Write(ps->Console, _UU("CMD_MSG_OK"));
  5986. ps->Console->Write(ps->Console, L"");
  5987. }
  5988. if (ps->CmdLine != NULL)
  5989. {
  5990. break;
  5991. }
  5992. }
  5993. // Release the Caps
  5994. FreeCapsList(ps->CapsList);
  5995. ps->CapsList = NULL;
  5996. }
  5997. // A template for a new command function
  5998. UINT PsXxx(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  5999. {
  6000. LIST *o;
  6001. PS *ps = (PS *)param;
  6002. UINT ret;
  6003. RPC_LISTENER t;
  6004. PARAM args[] =
  6005. {
  6006. {"[port]", CmdPromptPort, _UU("CMD_ListenerCreate_PortPrompt"), CmdEvalPort, NULL},
  6007. };
  6008. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6009. if (o == NULL)
  6010. {
  6011. return ERR_INVALID_PARAMETER;
  6012. }
  6013. Zero(&t, sizeof(t));
  6014. t.Enable = true;
  6015. t.Port = ToInt(GetParamStr(o, "[port]"));
  6016. ret = ScCreateListener(ps->Rpc, &t);
  6017. if (ret != ERR_NO_ERROR)
  6018. {
  6019. CmdPrintError(c, ret);
  6020. FreeParamValueList(o);
  6021. return ret;
  6022. }
  6023. FreeParamValueList(o);
  6024. return 0;
  6025. }
  6026. // Set to the stand-alone mode
  6027. UINT PsClusterSettingStandalone(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6028. {
  6029. LIST *o;
  6030. PS *ps = (PS *)param;
  6031. UINT ret = 0;
  6032. RPC_FARM t;
  6033. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  6034. if (o == NULL)
  6035. {
  6036. return ERR_INVALID_PARAMETER;
  6037. }
  6038. Zero(&t, sizeof(t));
  6039. t.ServerType = SERVER_TYPE_STANDALONE;
  6040. // RPC call
  6041. ret = ScSetFarmSetting(ps->Rpc, &t);
  6042. if (ret != ERR_NO_ERROR)
  6043. {
  6044. // An error has occured
  6045. CmdPrintError(c, ret);
  6046. FreeParamValueList(o);
  6047. return ret;
  6048. }
  6049. FreeParamValueList(o);
  6050. return 0;
  6051. }
  6052. // Set to the cluster controller mode
  6053. UINT PsClusterSettingController(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6054. {
  6055. LIST *o;
  6056. PS *ps = (PS *)param;
  6057. UINT ret = 0;
  6058. RPC_FARM t;
  6059. UINT weight;
  6060. PARAM args[] =
  6061. {
  6062. {"WEIGHT", NULL, NULL, NULL, NULL},
  6063. {"ONLY", NULL, NULL, NULL, NULL},
  6064. };
  6065. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6066. if (o == NULL)
  6067. {
  6068. return ERR_INVALID_PARAMETER;
  6069. }
  6070. weight = GetParamInt(o, "WEIGHT");
  6071. if (weight == 0)
  6072. {
  6073. weight = FARM_DEFAULT_WEIGHT;
  6074. }
  6075. Zero(&t, sizeof(t));
  6076. t.ServerType = SERVER_TYPE_FARM_CONTROLLER;
  6077. t.Weight = weight;
  6078. t.ControllerOnly = GetParamYes(o, "ONLY");
  6079. // RPC call
  6080. ret = ScSetFarmSetting(ps->Rpc, &t);
  6081. if (ret != ERR_NO_ERROR)
  6082. {
  6083. // An error has occured
  6084. CmdPrintError(c, ret);
  6085. FreeParamValueList(o);
  6086. return ret;
  6087. }
  6088. FreeParamValueList(o);
  6089. return 0;
  6090. }
  6091. // Evaluate the IP address
  6092. bool CmdEvalIp(CONSOLE *c, wchar_t *str, void *param)
  6093. {
  6094. // Validate arguments
  6095. if (c == NULL || str == NULL)
  6096. {
  6097. return false;
  6098. }
  6099. if (UniIsEmptyStr(str))
  6100. {
  6101. return true;
  6102. }
  6103. if (UniStrToIP32(str) == 0 && UniStrCmpi(str, L"0.0.0.0") != 0)
  6104. {
  6105. wchar_t *msg = (param == NULL) ? _UU("CMD_IP_EVAL_FAILED") : (wchar_t *)param;
  6106. c->Write(c, msg);
  6107. return false;
  6108. }
  6109. return true;
  6110. }
  6111. // Convert a string to port list
  6112. LIST *StrToPortList(char *str)
  6113. {
  6114. LIST *o;
  6115. TOKEN_LIST *t;
  6116. UINT i;
  6117. if (str == NULL)
  6118. {
  6119. return NULL;
  6120. }
  6121. // Convert to token
  6122. t = ParseToken(str, ", ");
  6123. if (t == NULL)
  6124. {
  6125. return NULL;
  6126. }
  6127. if (t->NumTokens == 0)
  6128. {
  6129. FreeToken(t);
  6130. return NULL;
  6131. }
  6132. o = NewListFast(NULL);
  6133. for (i = 0;i < t->NumTokens;i++)
  6134. {
  6135. char *s = t->Token[i];
  6136. UINT n;
  6137. if (IsNum(s) == false)
  6138. {
  6139. ReleaseList(o);
  6140. FreeToken(t);
  6141. return NULL;
  6142. }
  6143. n = ToInt(s);
  6144. if (n == 0 || n >= 65536)
  6145. {
  6146. ReleaseList(o);
  6147. FreeToken(t);
  6148. return NULL;
  6149. }
  6150. if (IsInList(o, (void *)n))
  6151. {
  6152. ReleaseList(o);
  6153. FreeToken(t);
  6154. return NULL;
  6155. }
  6156. Add(o, (void *)n);
  6157. }
  6158. FreeToken(t);
  6159. if (LIST_NUM(o) > MAX_PUBLIC_PORT_NUM)
  6160. {
  6161. ReleaseList(o);
  6162. return NULL;
  6163. }
  6164. return o;
  6165. }
  6166. // Set to the cluster member mode
  6167. UINT PsClusterSettingMember(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6168. {
  6169. LIST *o;
  6170. PS *ps = (PS *)param;
  6171. UINT ret = 0;
  6172. RPC_FARM t;
  6173. char *host_and_port;
  6174. char *host;
  6175. UINT port;
  6176. UINT weight;
  6177. // Parameter list that can be specified
  6178. PARAM args[] =
  6179. {
  6180. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  6181. {"[server:port]", CmdPrompt, _UU("CMD_ClusterSettingMember_Prompt_HOST_1"), CmdEvalHostAndPort, NULL},
  6182. {"IP", PsClusterSettingMemberPromptIp, NULL, CmdEvalIp, NULL},
  6183. {"PORTS", PsClusterSettingMemberPromptPorts, NULL, CmdEvalPortList, NULL},
  6184. {"PASSWORD", CmdPromptChoosePassword, NULL, NULL, NULL},
  6185. {"WEIGHT", NULL, NULL, NULL, NULL},
  6186. };
  6187. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6188. if (o == NULL)
  6189. {
  6190. return ERR_INVALID_PARAMETER;
  6191. }
  6192. weight = GetParamInt(o, "WEIGHT");
  6193. if (weight == 0)
  6194. {
  6195. weight = FARM_DEFAULT_WEIGHT;
  6196. }
  6197. Zero(&t, sizeof(t));
  6198. host_and_port = GetParamStr(o, "[server:port]");
  6199. if (ParseHostPort(host_and_port, &host, &port, 0))
  6200. {
  6201. char *pw;
  6202. char *ports_str;
  6203. LIST *ports;
  6204. UINT i;
  6205. StrCpy(t.ControllerName, sizeof(t.ControllerName), host);
  6206. t.ControllerPort = port;
  6207. Free(host);
  6208. pw = GetParamStr(o, "PASSWORD");
  6209. Hash(t.MemberPassword, pw, StrLen(pw), true);
  6210. t.PublicIp = StrToIP32(GetParamStr(o, "IP"));
  6211. t.ServerType = SERVER_TYPE_FARM_MEMBER;
  6212. ports_str = GetParamStr(o, "PORTS");
  6213. ports = StrToPortList(ports_str);
  6214. t.NumPort = LIST_NUM(ports);
  6215. t.Ports = ZeroMalloc(sizeof(UINT) * t.NumPort);
  6216. for (i = 0;i < t.NumPort;i++)
  6217. {
  6218. t.Ports[i] = (UINT)LIST_DATA(ports, i);
  6219. }
  6220. t.Weight = weight;
  6221. ReleaseList(ports);
  6222. // RPC call
  6223. ret = ScSetFarmSetting(ps->Rpc, &t);
  6224. if (ret != ERR_NO_ERROR)
  6225. {
  6226. // An error has occured
  6227. CmdPrintError(c, ret);
  6228. FreeParamValueList(o);
  6229. return ret;
  6230. }
  6231. FreeRpcFarm(&t);
  6232. }
  6233. FreeParamValueList(o);
  6234. return 0;
  6235. }
  6236. // Evaluate the port list
  6237. bool CmdEvalPortList(CONSOLE *c, wchar_t *str, void *param)
  6238. {
  6239. char *s;
  6240. bool ret = false;
  6241. LIST *o;
  6242. // Validate arguments
  6243. if (c == NULL || str == NULL)
  6244. {
  6245. return false;
  6246. }
  6247. s = CopyUniToStr(str);
  6248. o = StrToPortList(s);
  6249. if (o != NULL)
  6250. {
  6251. ret = true;
  6252. }
  6253. ReleaseList(o);
  6254. Free(s);
  6255. if (ret == false)
  6256. {
  6257. c->Write(c, _UU("CMD_PORTLIST_EVAL_FAILED"));
  6258. }
  6259. return ret;
  6260. }
  6261. // Check the string of the form of the host name and port number
  6262. bool CmdEvalHostAndPort(CONSOLE *c, wchar_t *str, void *param)
  6263. {
  6264. char *tmp;
  6265. bool ret = false;
  6266. // Validate arguments
  6267. if (c == NULL || str == NULL)
  6268. {
  6269. return false;
  6270. }
  6271. tmp = CopyUniToStr(str);
  6272. ret = ParseHostPort(tmp, NULL, NULL, (UINT)param);
  6273. if (ret == false)
  6274. {
  6275. c->Write(c, param == NULL ? _UU("CMD_HOSTPORT_EVAL_FAILED") : (wchar_t *)param);
  6276. }
  6277. Free(tmp);
  6278. return ret;
  6279. }
  6280. // Input the public port number
  6281. wchar_t *PsClusterSettingMemberPromptPorts(CONSOLE *c, void *param)
  6282. {
  6283. wchar_t *ret;
  6284. // Validate arguments
  6285. if (c == NULL)
  6286. {
  6287. return NULL;
  6288. }
  6289. c->Write(c, _UU("CMD_ClusterSettingMember_Prompt_PORT_1"));
  6290. c->Write(c, L"");
  6291. ret = c->ReadLine(c, _UU("CMD_ClusterSettingMember_Prompt_PORT_2"), true);
  6292. return ret;
  6293. }
  6294. // Input the public IP address
  6295. wchar_t *PsClusterSettingMemberPromptIp(CONSOLE *c, void *param)
  6296. {
  6297. wchar_t *ret;
  6298. // Validate arguments
  6299. if (c == NULL)
  6300. {
  6301. return NULL;
  6302. }
  6303. c->Write(c, _UU("CMD_ClusterSettingMember_Prompt_IP_1"));
  6304. c->Write(c, L"");
  6305. ret = c->ReadLine(c, _UU("CMD_ClusterSettingMember_Prompt_IP_2"), true);
  6306. return ret;
  6307. }
  6308. // Show the cluster members list
  6309. UINT PsClusterMemberList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6310. {
  6311. LIST *o;
  6312. PS *ps = (PS *)param;
  6313. UINT ret = 0;
  6314. RPC_ENUM_FARM t;
  6315. CT *ct;
  6316. UINT i;
  6317. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  6318. if (o == NULL)
  6319. {
  6320. return ERR_INVALID_PARAMETER;
  6321. }
  6322. Zero(&t, sizeof(t));
  6323. // RPC call
  6324. ret = ScEnumFarmMember(ps->Rpc, &t);
  6325. if (ret != ERR_NO_ERROR)
  6326. {
  6327. // An error has occured
  6328. CmdPrintError(c, ret);
  6329. FreeParamValueList(o);
  6330. return ret;
  6331. }
  6332. ct = CtNew();
  6333. CtInsertColumn(ct, _UU("CMD_ID"), true);
  6334. CtInsertColumn(ct, _UU("SM_FM_COLUMN_1"), false);
  6335. CtInsertColumn(ct, _UU("SM_FM_COLUMN_2"), false);
  6336. CtInsertColumn(ct, _UU("SM_FM_COLUMN_3"), false);
  6337. CtInsertColumn(ct, _UU("SM_FM_COLUMN_4"), true);
  6338. CtInsertColumn(ct, _UU("SM_FM_COLUMN_5"), true);
  6339. CtInsertColumn(ct, _UU("SM_FM_COLUMN_6"), true);
  6340. CtInsertColumn(ct, _UU("SM_FM_COLUMN_7"), true);
  6341. CtInsertColumn(ct, _UU("SM_FM_COLUMN_8"), true);
  6342. CtInsertColumn(ct, _UU("SM_FM_COLUMN_9"), true);
  6343. for (i = 0;i < t.NumFarm;i++)
  6344. {
  6345. RPC_ENUM_FARM_ITEM *e = &t.Farms[i];
  6346. wchar_t tmp0[64];
  6347. wchar_t tmp1[MAX_SIZE];
  6348. wchar_t tmp2[MAX_SIZE];
  6349. wchar_t tmp3[64];
  6350. wchar_t tmp4[64];
  6351. wchar_t tmp5[64];
  6352. wchar_t tmp6[64];
  6353. wchar_t tmp7[64];
  6354. wchar_t tmp8[64];
  6355. GetDateTimeStrEx64(tmp1, sizeof(tmp1), SystemToLocal64(e->ConnectedTime), NULL);
  6356. StrToUni(tmp2, sizeof(tmp2), e->Hostname);
  6357. UniToStru(tmp3, e->Point);
  6358. UniToStru(tmp4, e->NumSessions);
  6359. UniToStru(tmp5, e->NumTcpConnections);
  6360. UniToStru(tmp6, e->NumHubs);
  6361. UniToStru(tmp7, e->AssignedClientLicense);
  6362. UniToStru(tmp8, e->AssignedBridgeLicense);
  6363. UniToStru(tmp0, e->Id);
  6364. CtInsert(ct, tmp0,
  6365. e->Controller ? _UU("SM_FM_CONTROLLER") : _UU("SM_FM_MEMBER"),
  6366. tmp1, tmp2, tmp3, tmp4, tmp5, tmp6, tmp7, tmp8);
  6367. }
  6368. CtFree(ct, c);
  6369. FreeRpcEnumFarm(&t);
  6370. FreeParamValueList(o);
  6371. return 0;
  6372. }
  6373. // Get information of cluster members
  6374. UINT PsClusterMemberInfoGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6375. {
  6376. LIST *o;
  6377. PS *ps = (PS *)param;
  6378. UINT ret = 0;
  6379. RPC_FARM_INFO t;
  6380. CT *ct;
  6381. // Parameter list that can be specified
  6382. PARAM args[] =
  6383. {
  6384. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  6385. {"[id]", CmdPrompt, _UU("CMD_ClusterMemberInfoGet_PROMPT_ID"), NULL, NULL},
  6386. };
  6387. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6388. if (o == NULL)
  6389. {
  6390. return ERR_INVALID_PARAMETER;
  6391. }
  6392. Zero(&t, sizeof(t));
  6393. t.Id = UniToInt(GetParamUniStr(o, "[id]"));
  6394. // RPC call
  6395. ret = ScGetFarmInfo(ps->Rpc, &t);
  6396. if (ret != ERR_NO_ERROR)
  6397. {
  6398. // An error has occured
  6399. CmdPrintError(c, ret);
  6400. FreeParamValueList(o);
  6401. return ret;
  6402. }
  6403. ct = CtNewStandard();
  6404. {
  6405. wchar_t tmp[MAX_SIZE];
  6406. char str[MAX_SIZE];
  6407. UINT i;
  6408. CtInsert(ct, _UU("SM_FMINFO_TYPE"),
  6409. t.Controller ? _UU("SM_FARM_CONTROLLER") : _UU("SM_FARM_MEMBER"));
  6410. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.ConnectedTime), NULL);
  6411. CtInsert(ct, _UU("SM_FMINFO_CONNECT_TIME"), tmp);
  6412. IPToStr32(str, sizeof(str), t.Ip);
  6413. StrToUni(tmp, sizeof(tmp), str);
  6414. CtInsert(ct, _UU("SM_FMINFO_IP"), tmp);
  6415. StrToUni(tmp, sizeof(tmp), t.Hostname);
  6416. CtInsert(ct, _UU("SM_FMINFO_HOSTNAME"), tmp);
  6417. UniToStru(tmp, t.Point);
  6418. CtInsert(ct, _UU("SM_FMINFO_POINT"), tmp);
  6419. UniToStru(tmp, t.Weight);
  6420. CtInsert(ct, _UU("SM_FMINFO_WEIGHT"), tmp);
  6421. UniToStru(tmp, t.NumPort);
  6422. CtInsert(ct, _UU("SM_FMINFO_NUM_PORT"), tmp);
  6423. for (i = 0;i < t.NumPort;i++)
  6424. {
  6425. wchar_t tmp2[MAX_SIZE];
  6426. UniFormat(tmp, sizeof(tmp), _UU("SM_FMINFO_PORT"), i + 1);
  6427. UniToStru(tmp2, t.Ports[i]);
  6428. CtInsert(ct, tmp, tmp2);
  6429. }
  6430. UniToStru(tmp, t.NumFarmHub);
  6431. CtInsert(ct, _UU("SM_FMINFO_NUM_HUB"), tmp);
  6432. for (i = 0;i < t.NumFarmHub;i++)
  6433. {
  6434. wchar_t tmp2[MAX_SIZE];
  6435. UniFormat(tmp, sizeof(tmp), _UU("SM_FMINFO_HUB"), i + 1);
  6436. UniFormat(tmp2, sizeof(tmp2),
  6437. t.FarmHubs[i].DynamicHub ? _UU("SM_FMINFO_HUB_TAG_2") : _UU("SM_FMINFO_HUB_TAG_1"),
  6438. t.FarmHubs[i].HubName);
  6439. CtInsert(ct, tmp, tmp2);
  6440. }
  6441. UniToStru(tmp, t.NumSessions);
  6442. CtInsert(ct, _UU("SM_FMINFO_NUM_SESSION"), tmp);
  6443. UniToStru(tmp, t.NumTcpConnections);
  6444. CtInsert(ct, _UU("SM_FMINFO_NUN_CONNECTION"), tmp);
  6445. }
  6446. CtFree(ct, c);
  6447. FreeRpcFarmInfo(&t);
  6448. FreeParamValueList(o);
  6449. return 0;
  6450. }
  6451. // Get certificates of cluster members
  6452. UINT PsClusterMemberCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6453. {
  6454. LIST *o;
  6455. PS *ps = (PS *)param;
  6456. UINT ret = 0;
  6457. RPC_FARM_INFO t;
  6458. // Parameter list that can be specified
  6459. PARAM args[] =
  6460. {
  6461. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  6462. {"[id]", CmdPrompt, _UU("CMD_ClusterMemberCertGet_PROMPT_ID"), NULL, NULL},
  6463. {"SAVECERT", CmdPrompt, _UU("CMD_SAVECERTPATH"), CmdEvalNotEmpty, NULL},
  6464. };
  6465. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6466. if (o == NULL)
  6467. {
  6468. return ERR_INVALID_PARAMETER;
  6469. }
  6470. Zero(&t, sizeof(t));
  6471. t.Id = UniToInt(GetParamUniStr(o, "[id]"));
  6472. // RPC call
  6473. ret = ScGetFarmInfo(ps->Rpc, &t);
  6474. if (ret != ERR_NO_ERROR)
  6475. {
  6476. // An error has occured
  6477. CmdPrintError(c, ret);
  6478. FreeParamValueList(o);
  6479. return ret;
  6480. }
  6481. else
  6482. {
  6483. X *x = t.ServerCert;
  6484. wchar_t *filename = GetParamUniStr(o, "SAVECERT");
  6485. if (XToFileW(x, filename, true) == false)
  6486. {
  6487. c->Write(c, _UU("CMD_SAVECERT_FAILED"));
  6488. ret = ERR_INTERNAL_ERROR;
  6489. }
  6490. }
  6491. FreeRpcFarmInfo(&t);
  6492. FreeParamValueList(o);
  6493. return ret;
  6494. }
  6495. // Get the status of the connection to the cluster controller
  6496. UINT PsClusterConnectionStatusGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6497. {
  6498. LIST *o;
  6499. PS *ps = (PS *)param;
  6500. UINT ret = 0;
  6501. RPC_FARM_CONNECTION_STATUS t;
  6502. wchar_t tmp[MAX_SIZE];
  6503. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  6504. if (o == NULL)
  6505. {
  6506. return ERR_INVALID_PARAMETER;
  6507. }
  6508. Zero(&t, sizeof(t));
  6509. // RPC call
  6510. ret = ScGetFarmConnectionStatus(ps->Rpc, &t);
  6511. if (ret != ERR_NO_ERROR)
  6512. {
  6513. // An error has occured
  6514. CmdPrintError(c, ret);
  6515. FreeParamValueList(o);
  6516. return ret;
  6517. }
  6518. else
  6519. {
  6520. CT *ct = CtNewStandard();
  6521. char str[MAX_SIZE];
  6522. if (t.Online == false)
  6523. {
  6524. CtInsert(ct, _UU("SM_FC_IP"), _UU("SM_FC_NOT_CONNECTED"));
  6525. CtInsert(ct, _UU("SM_FC_PORT"), _UU("SM_FC_NOT_CONNECTED"));
  6526. }
  6527. else
  6528. {
  6529. IPToStr32(str, sizeof(str), t.Ip);
  6530. StrToUni(tmp, sizeof(tmp), str);
  6531. CtInsert(ct, _UU("SM_FC_IP"), tmp);
  6532. UniToStru(tmp, t.Port);
  6533. CtInsert(ct, _UU("SM_FC_PORT"), tmp);
  6534. }
  6535. CtInsert(ct,
  6536. _UU("SM_FC_STATUS"),
  6537. t.Online ? _UU("SM_FC_ONLINE") : _UU("SM_FC_OFFLINE"));
  6538. if (t.Online == false)
  6539. {
  6540. UniFormat(tmp, sizeof(tmp), _UU("SM_FC_ERROR_TAG"), _E(t.LastError), t.LastError);
  6541. CtInsert(ct,
  6542. _UU("SM_FC_LAST_ERROR"), tmp);
  6543. }
  6544. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.StartedTime), NULL);
  6545. CtInsert(ct, _UU("SM_FC_START_TIME"), tmp);
  6546. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.FirstConnectedTime), NULL);
  6547. CtInsert(ct, _UU("SM_FC_FIRST_TIME"), tmp);
  6548. //if (t.Online == false)
  6549. {
  6550. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.CurrentConnectedTime), NULL);
  6551. CtInsert(ct, _UU("SM_FC_CURRENT_TIME"), tmp);
  6552. }
  6553. UniToStru(tmp, t.NumTry);
  6554. CtInsert(ct, _UU("SM_FC_NUM_TRY"), tmp);
  6555. UniToStru(tmp, t.NumConnected);
  6556. CtInsert(ct, _UU("SM_FC_NUM_CONNECTED"), tmp);
  6557. UniToStru(tmp, t.NumFailed);
  6558. CtInsert(ct, _UU("SM_FC_NUM_FAILED"), tmp);
  6559. CtFree(ct, c);
  6560. }
  6561. FreeParamValueList(o);
  6562. return 0;
  6563. }
  6564. // Get the SSL certificate of the VPN Server
  6565. UINT PsServerCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6566. {
  6567. LIST *o;
  6568. PS *ps = (PS *)param;
  6569. UINT ret = 0;
  6570. RPC_KEY_PAIR t;
  6571. // Parameter list that can be specified
  6572. PARAM args[] =
  6573. {
  6574. {"[cert]", CmdPrompt, _UU("CMD_SAVECERTPATH"), CmdEvalNotEmpty, NULL},
  6575. };
  6576. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6577. if (o == NULL)
  6578. {
  6579. return ERR_INVALID_PARAMETER;
  6580. }
  6581. Zero(&t, sizeof(t));
  6582. // RPC call
  6583. ret = ScGetServerCert(ps->Rpc, &t);
  6584. if (ret != ERR_NO_ERROR)
  6585. {
  6586. // An error has occured
  6587. CmdPrintError(c, ret);
  6588. FreeParamValueList(o);
  6589. return ret;
  6590. }
  6591. if (XToFileW(t.Cert, GetParamUniStr(o, "[cert]"), true) == false)
  6592. {
  6593. c->Write(c, _UU("CMD_SAVECERT_FAILED"));
  6594. }
  6595. FreeRpcKeyPair(&t);
  6596. FreeParamValueList(o);
  6597. return 0;
  6598. }
  6599. // Get the private key of the SSL certificate of the VPN Server
  6600. UINT PsServerKeyGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6601. {
  6602. LIST *o;
  6603. PS *ps = (PS *)param;
  6604. UINT ret = 0;
  6605. RPC_KEY_PAIR t;
  6606. // Parameter list that can be specified
  6607. PARAM args[] =
  6608. {
  6609. {"[key]", CmdPrompt, _UU("CMD_SAVEKEYPATH"), CmdEvalNotEmpty, NULL},
  6610. };
  6611. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6612. if (o == NULL)
  6613. {
  6614. return ERR_INVALID_PARAMETER;
  6615. }
  6616. Zero(&t, sizeof(t));
  6617. // RPC call
  6618. ret = ScGetServerCert(ps->Rpc, &t);
  6619. if (ret != ERR_NO_ERROR)
  6620. {
  6621. // An error has occured
  6622. CmdPrintError(c, ret);
  6623. FreeParamValueList(o);
  6624. return ret;
  6625. }
  6626. if (t.Key != NULL)
  6627. {
  6628. if (KToFileW(t.Key, GetParamUniStr(o, "[key]"), true, NULL) == false)
  6629. {
  6630. c->Write(c, _UU("CMD_SAVEKEY_FAILED"));
  6631. }
  6632. }
  6633. else
  6634. {
  6635. ret = ERR_NOT_ENOUGH_RIGHT;
  6636. CmdPrintError(c, ret);
  6637. }
  6638. FreeRpcKeyPair(&t);
  6639. FreeParamValueList(o);
  6640. return ret;
  6641. }
  6642. // Read the certificate and the private key
  6643. bool CmdLoadCertAndKey(CONSOLE *c, X **xx, K **kk, wchar_t *cert_filename, wchar_t *key_filename)
  6644. {
  6645. X *x;
  6646. K *k;
  6647. // Validate arguments
  6648. if (c == NULL || cert_filename == NULL || key_filename == NULL || xx == NULL || kk == NULL)
  6649. {
  6650. return false;
  6651. }
  6652. x = FileToXW(cert_filename);
  6653. if (x == NULL)
  6654. {
  6655. c->Write(c, _UU("CMD_LOADCERT_FAILED"));
  6656. return false;
  6657. }
  6658. k = CmdLoadKey(c, key_filename);
  6659. if (k == NULL)
  6660. {
  6661. c->Write(c, _UU("CMD_LOADKEY_FAILED"));
  6662. FreeX(x);
  6663. return false;
  6664. }
  6665. if (CheckXandK(x, k) == false)
  6666. {
  6667. c->Write(c, _UU("CMD_KEYPAIR_FAILED"));
  6668. FreeX(x);
  6669. FreeK(k);
  6670. return false;
  6671. }
  6672. *xx = x;
  6673. *kk = k;
  6674. return true;
  6675. }
  6676. // Read the secret key
  6677. K *CmdLoadKey(CONSOLE *c, wchar_t *filename)
  6678. {
  6679. BUF *b;
  6680. // Validate arguments
  6681. if (c == NULL || filename == NULL)
  6682. {
  6683. return NULL;
  6684. }
  6685. b = ReadDumpW(filename);
  6686. if (b == NULL)
  6687. {
  6688. c->Write(c, _UU("CMD_LOADCERT_FAILED"));
  6689. return NULL;
  6690. }
  6691. else
  6692. {
  6693. K *key;
  6694. if (IsEncryptedK(b, true) == false)
  6695. {
  6696. key = BufToK(b, true, IsBase64(b), NULL);
  6697. }
  6698. else
  6699. {
  6700. c->Write(c, _UU("CMD_LOADKEY_ENCRYPTED_1"));
  6701. while (true)
  6702. {
  6703. char *pass = c->ReadPassword(c, _UU("CMD_LOADKEY_ENCRYPTED_2"));
  6704. if (pass == NULL)
  6705. {
  6706. FreeBuf(b);
  6707. return NULL;
  6708. }
  6709. key = BufToK(b, true, IsBase64(b), pass);
  6710. Free(pass);
  6711. if (key != NULL)
  6712. {
  6713. break;
  6714. }
  6715. c->Write(c, _UU("CMD_LOADKEY_ENCRYPTED_3"));
  6716. }
  6717. }
  6718. FreeBuf(b);
  6719. return key;
  6720. }
  6721. }
  6722. // Set the SSL certificate and the private key of the VPN Server
  6723. UINT PsServerCertSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6724. {
  6725. LIST *o;
  6726. PS *ps = (PS *)param;
  6727. UINT ret = 0;
  6728. RPC_KEY_PAIR t;
  6729. // Parameter list that can be specified
  6730. PARAM args[] =
  6731. {
  6732. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  6733. {"LOADCERT", CmdPrompt, _UU("CMD_LOADCERTPATH"), CmdEvalIsFile, NULL},
  6734. {"LOADKEY", CmdPrompt, _UU("CMD_LOADKEYPATH"), CmdEvalIsFile, NULL},
  6735. };
  6736. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6737. if (o == NULL)
  6738. {
  6739. return ERR_INVALID_PARAMETER;
  6740. }
  6741. Zero(&t, sizeof(t));
  6742. if (CmdLoadCertAndKey(c, &t.Cert, &t.Key,
  6743. GetParamUniStr(o, "LOADCERT"),
  6744. GetParamUniStr(o, "LOADKEY")))
  6745. {
  6746. // RPC call
  6747. ret = ScSetServerCert(ps->Rpc, &t);
  6748. if (ret != ERR_NO_ERROR)
  6749. {
  6750. // An error has occured
  6751. CmdPrintError(c, ret);
  6752. FreeParamValueList(o);
  6753. return ret;
  6754. }
  6755. if (t.Flag1 == 0)
  6756. {
  6757. // Show the warning message
  6758. c->Write(c, L"");
  6759. c->Write(c, _UU("SM_CERT_NEED_ROOT"));
  6760. c->Write(c, L"");
  6761. }
  6762. FreeRpcKeyPair(&t);
  6763. }
  6764. else
  6765. {
  6766. ret = ERR_INTERNAL_ERROR;
  6767. }
  6768. FreeParamValueList(o);
  6769. return ret;
  6770. }
  6771. // Get the encryption algorithm used for the VPN communication
  6772. UINT PsServerCipherGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6773. {
  6774. LIST *o;
  6775. PS *ps = (PS *)param;
  6776. UINT ret = 0;
  6777. RPC_STR t;
  6778. TOKEN_LIST *ciphers;
  6779. UINT i;
  6780. wchar_t tmp[4096];
  6781. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  6782. if (o == NULL)
  6783. {
  6784. return ERR_INVALID_PARAMETER;
  6785. }
  6786. Zero(&t, sizeof(t));
  6787. // RPC call
  6788. ret = ScGetServerCipher(ps->Rpc, &t);
  6789. if (ret != ERR_NO_ERROR)
  6790. {
  6791. // An error has occured
  6792. CmdPrintError(c, ret);
  6793. FreeParamValueList(o);
  6794. return ret;
  6795. }
  6796. ciphers = GetCipherList();
  6797. c->Write(c, _UU("CMD_ServerCipherGet_SERVER"));
  6798. UniFormat(tmp, sizeof(tmp), L" %S", t.String);
  6799. c->Write(c, tmp);
  6800. c->Write(c, L"");
  6801. c->Write(c, _UU("CMD_ServerCipherGet_CIPHERS"));
  6802. for (i = 0;i < ciphers->NumTokens;i++)
  6803. {
  6804. UniFormat(tmp, sizeof(tmp), L" %S", ciphers->Token[i]);
  6805. c->Write(c, tmp);
  6806. }
  6807. FreeRpcStr(&t);
  6808. FreeParamValueList(o);
  6809. return 0;
  6810. }
  6811. // Set the encryption algorithm used for the VPN communication
  6812. UINT PsServerCipherSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6813. {
  6814. LIST *o;
  6815. PS *ps = (PS *)param;
  6816. UINT ret = 0;
  6817. RPC_STR t;
  6818. // Parameter list that can be specified
  6819. PARAM args[] =
  6820. {
  6821. {"[name]", CmdPrompt, _UU("CMD_ServerCipherSet_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  6822. };
  6823. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6824. if (o == NULL)
  6825. {
  6826. return ERR_INVALID_PARAMETER;
  6827. }
  6828. Zero(&t, sizeof(t));
  6829. t.String = CopyStr(GetParamStr(o, "[name]"));
  6830. // RPC call
  6831. ret = ScSetServerCipher(ps->Rpc, &t);
  6832. if (ret != ERR_NO_ERROR)
  6833. {
  6834. // An error has occured
  6835. CmdPrintError(c, ret);
  6836. FreeParamValueList(o);
  6837. return ret;
  6838. }
  6839. FreeRpcStr(&t);
  6840. FreeParamValueList(o);
  6841. return 0;
  6842. }
  6843. // Enabling the maintenance function of the Internet connection
  6844. UINT PsKeepEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6845. {
  6846. LIST *o;
  6847. PS *ps = (PS *)param;
  6848. UINT ret = 0;
  6849. RPC_KEEP t;
  6850. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  6851. if (o == NULL)
  6852. {
  6853. return ERR_INVALID_PARAMETER;
  6854. }
  6855. Zero(&t, sizeof(t));
  6856. // RPC call
  6857. ret = ScGetKeep(ps->Rpc, &t);
  6858. if (ret != ERR_NO_ERROR)
  6859. {
  6860. // An error has occured
  6861. CmdPrintError(c, ret);
  6862. FreeParamValueList(o);
  6863. return ret;
  6864. }
  6865. t.UseKeepConnect = true;
  6866. ret = ScSetKeep(ps->Rpc, &t);
  6867. if (ret != ERR_NO_ERROR)
  6868. {
  6869. // An error has occured
  6870. CmdPrintError(c, ret);
  6871. FreeParamValueList(o);
  6872. return ret;
  6873. }
  6874. FreeParamValueList(o);
  6875. return 0;
  6876. }
  6877. // Disabling the maintenance function of the Internet connection
  6878. UINT PsKeepDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6879. {
  6880. LIST *o;
  6881. PS *ps = (PS *)param;
  6882. UINT ret = 0;
  6883. RPC_KEEP t;
  6884. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  6885. if (o == NULL)
  6886. {
  6887. return ERR_INVALID_PARAMETER;
  6888. }
  6889. Zero(&t, sizeof(t));
  6890. // RPC call
  6891. ret = ScGetKeep(ps->Rpc, &t);
  6892. if (ret != ERR_NO_ERROR)
  6893. {
  6894. // An error has occured
  6895. CmdPrintError(c, ret);
  6896. FreeParamValueList(o);
  6897. return ret;
  6898. }
  6899. t.UseKeepConnect = false;
  6900. ret = ScSetKeep(ps->Rpc, &t);
  6901. if (ret != ERR_NO_ERROR)
  6902. {
  6903. // An error has occured
  6904. CmdPrintError(c, ret);
  6905. FreeParamValueList(o);
  6906. return ret;
  6907. }
  6908. FreeParamValueList(o);
  6909. return 0;
  6910. }
  6911. // Evaluate the UDP or the TCP
  6912. bool CmdEvalTcpOrUdp(CONSOLE *c, wchar_t *str, void *param)
  6913. {
  6914. // Validate arguments
  6915. if (c == NULL || str == NULL)
  6916. {
  6917. return false;
  6918. }
  6919. if (UniStrCmpi(str, L"tcp") == 0 || UniStrCmpi(str, L"udp") == 0)
  6920. {
  6921. return true;
  6922. }
  6923. c->Write(c, _UU("CMD_KeepSet_EVAL_TCP_UDP"));
  6924. return false;
  6925. }
  6926. // Enable the syslog configuration
  6927. UINT PsSyslogEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6928. {
  6929. LIST *o;
  6930. PS *ps = (PS *)param;
  6931. UINT ret = 0;
  6932. SYSLOG_SETTING t;
  6933. CMD_EVAL_MIN_MAX minmax = {"CMD_SyslogEnable_MINMAX", 1, 3};
  6934. char *host;
  6935. UINT port;
  6936. // Parameter list that can be specified
  6937. PARAM args[] =
  6938. {
  6939. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  6940. {"[1|2|3]", CmdPrompt, _UU("CMD_SyslogEnable_Prompt_123"), CmdEvalMinMax, &minmax},
  6941. {"HOST", CmdPrompt, _UU("CMD_SyslogEnable_Prompt_HOST"), CmdEvalHostAndPort, (void *)SYSLOG_PORT},
  6942. };
  6943. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  6944. if (o == NULL)
  6945. {
  6946. return ERR_INVALID_PARAMETER;
  6947. }
  6948. Zero(&t, sizeof(t));
  6949. if (ParseHostPort(GetParamStr(o, "HOST"), &host, &port, SYSLOG_PORT))
  6950. {
  6951. StrCpy(t.Hostname, sizeof(t.Hostname), host);
  6952. t.Port = port;
  6953. t.SaveType = GetParamInt(o, "[1|2|3]");
  6954. Free(host);
  6955. // RPC call
  6956. ret = ScSetSysLog(ps->Rpc, &t);
  6957. if (ret != ERR_NO_ERROR)
  6958. {
  6959. // An error has occured
  6960. CmdPrintError(c, ret);
  6961. FreeParamValueList(o);
  6962. return ret;
  6963. }
  6964. }
  6965. FreeParamValueList(o);
  6966. return 0;
  6967. }
  6968. // Disable the syslog configuration
  6969. UINT PsSyslogDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  6970. {
  6971. LIST *o;
  6972. PS *ps = (PS *)param;
  6973. UINT ret = 0;
  6974. SYSLOG_SETTING t;
  6975. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  6976. if (o == NULL)
  6977. {
  6978. return ERR_INVALID_PARAMETER;
  6979. }
  6980. Zero(&t, sizeof(t));
  6981. // RPC call
  6982. ret = ScGetSysLog(ps->Rpc, &t);
  6983. if (ret != ERR_NO_ERROR)
  6984. {
  6985. // An error has occured
  6986. CmdPrintError(c, ret);
  6987. FreeParamValueList(o);
  6988. return ret;
  6989. }
  6990. t.SaveType = SYSLOG_NONE;
  6991. // RPC call
  6992. ret = ScSetSysLog(ps->Rpc, &t);
  6993. if (ret != ERR_NO_ERROR)
  6994. {
  6995. // An error has occured
  6996. CmdPrintError(c, ret);
  6997. FreeParamValueList(o);
  6998. return ret;
  6999. }
  7000. FreeParamValueList(o);
  7001. return 0;
  7002. }
  7003. // Get the syslog configuration
  7004. UINT PsSyslogGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7005. {
  7006. LIST *o;
  7007. PS *ps = (PS *)param;
  7008. UINT ret = 0;
  7009. SYSLOG_SETTING t;
  7010. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  7011. if (o == NULL)
  7012. {
  7013. return ERR_INVALID_PARAMETER;
  7014. }
  7015. Zero(&t, sizeof(t));
  7016. // RPC call
  7017. ret = ScGetSysLog(ps->Rpc, &t);
  7018. if (ret != ERR_NO_ERROR)
  7019. {
  7020. // An error has occured
  7021. CmdPrintError(c, ret);
  7022. FreeParamValueList(o);
  7023. return ret;
  7024. }
  7025. else
  7026. {
  7027. wchar_t tmp[MAX_SIZE];
  7028. CT *ct = CtNewStandard();
  7029. CtInsert(ct, _UU("CMD_SyslogGet_COLUMN_1"), GetSyslogSettingName(t.SaveType));
  7030. if (t.SaveType != SYSLOG_NONE)
  7031. {
  7032. StrToUni(tmp, sizeof(tmp), t.Hostname);
  7033. CtInsert(ct, _UU("CMD_SyslogGet_COLUMN_2"), tmp);
  7034. UniToStru(tmp, t.Port);
  7035. CtInsert(ct, _UU("CMD_SyslogGet_COLUMN_3"), tmp);
  7036. }
  7037. CtFree(ct, c);
  7038. }
  7039. FreeParamValueList(o);
  7040. return 0;
  7041. }
  7042. // Get the syslog configuration name
  7043. wchar_t *GetSyslogSettingName(UINT n)
  7044. {
  7045. char tmp[MAX_PATH];
  7046. Format(tmp, sizeof(tmp), "SM_SYSLOG_%u", n);
  7047. return _UU(tmp);
  7048. }
  7049. // Setting of maintenance function of the Internet connection
  7050. UINT PsKeepSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7051. {
  7052. LIST *o;
  7053. PS *ps = (PS *)param;
  7054. UINT ret = 0;
  7055. RPC_KEEP t;
  7056. char *host;
  7057. UINT port;
  7058. // Parameter list that can be specified
  7059. PARAM args[] =
  7060. {
  7061. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7062. {"HOST", CmdPrompt, _UU("CMD_KeepSet_PROMPT_HOST"), CmdEvalHostAndPort, NULL},
  7063. {"PROTOCOL", CmdPrompt, _UU("CMD_KeepSet_PROMPT_PROTOCOL"), CmdEvalTcpOrUdp, NULL},
  7064. {"INTERVAL", CmdPrompt, _UU("CMD_KeepSet_PROMPT_INTERVAL"), NULL, NULL},
  7065. };
  7066. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7067. if (o == NULL)
  7068. {
  7069. return ERR_INVALID_PARAMETER;
  7070. }
  7071. Zero(&t, sizeof(t));
  7072. // RPC call
  7073. ret = ScGetKeep(ps->Rpc, &t);
  7074. if (ret != ERR_NO_ERROR)
  7075. {
  7076. // An error has occured
  7077. CmdPrintError(c, ret);
  7078. FreeParamValueList(o);
  7079. return ret;
  7080. }
  7081. if (ParseHostPort(GetParamStr(o, "HOST"), &host, &port, 0))
  7082. {
  7083. StrCpy(t.KeepConnectHost, sizeof(t.KeepConnectHost), host);
  7084. t.KeepConnectPort = port;
  7085. t.KeepConnectInterval = GetParamInt(o, "INTERVAL");
  7086. t.KeepConnectProtocol = (StrCmpi(GetParamStr(o, "PROTOCOL"), "tcp") == 0) ? 0 : 1;
  7087. Free(host);
  7088. // RPC call
  7089. ret = ScSetKeep(ps->Rpc, &t);
  7090. if (ret != ERR_NO_ERROR)
  7091. {
  7092. // An error has occured
  7093. CmdPrintError(c, ret);
  7094. FreeParamValueList(o);
  7095. return ret;
  7096. }
  7097. }
  7098. FreeParamValueList(o);
  7099. return 0;
  7100. }
  7101. // Get the maintenance function of the Internet connection
  7102. UINT PsKeepGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7103. {
  7104. LIST *o;
  7105. PS *ps = (PS *)param;
  7106. UINT ret = 0;
  7107. RPC_KEEP t;
  7108. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  7109. if (o == NULL)
  7110. {
  7111. return ERR_INVALID_PARAMETER;
  7112. }
  7113. Zero(&t, sizeof(t));
  7114. // RPC call
  7115. ret = ScGetKeep(ps->Rpc, &t);
  7116. if (ret != ERR_NO_ERROR)
  7117. {
  7118. // An error has occured
  7119. CmdPrintError(c, ret);
  7120. FreeParamValueList(o);
  7121. return ret;
  7122. }
  7123. else
  7124. {
  7125. wchar_t tmp[MAX_SIZE];
  7126. CT *ct = CtNewStandard();
  7127. StrToUni(tmp, sizeof(tmp), t.KeepConnectHost);
  7128. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_1"), tmp);
  7129. UniToStru(tmp, t.KeepConnectPort);
  7130. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_2"), tmp);
  7131. UniToStru(tmp, t.KeepConnectInterval);
  7132. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_3"), tmp);
  7133. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_4"),
  7134. t.KeepConnectProtocol == 0 ? L"TCP/IP" : L"UDP/IP");
  7135. CtInsert(ct, _UU("CMD_KeepGet_COLUMN_5"),
  7136. t.UseKeepConnect ? _UU("SM_ACCESS_ENABLE") : _UU("SM_ACCESS_DISABLE"));
  7137. CtFree(ct, c);
  7138. }
  7139. FreeParamValueList(o);
  7140. return 0;
  7141. }
  7142. // Get the connection type string
  7143. wchar_t *GetConnectionTypeStr(UINT type)
  7144. {
  7145. char tmp[MAX_SIZE];
  7146. Format(tmp, sizeof(tmp), "SM_CONNECTION_TYPE_%u", type);
  7147. return _UU(tmp);
  7148. }
  7149. // Get the list of TCP connections connected to VPN Server
  7150. UINT PsConnectionList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7151. {
  7152. LIST *o;
  7153. PS *ps = (PS *)param;
  7154. UINT ret = 0;
  7155. RPC_ENUM_CONNECTION t;
  7156. UINT i;
  7157. CT *ct;
  7158. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  7159. if (o == NULL)
  7160. {
  7161. return ERR_INVALID_PARAMETER;
  7162. }
  7163. Zero(&t, sizeof(t));
  7164. // RPC call
  7165. ret = ScEnumConnection(ps->Rpc, &t);
  7166. if (ret != ERR_NO_ERROR)
  7167. {
  7168. // An error has occured
  7169. CmdPrintError(c, ret);
  7170. FreeParamValueList(o);
  7171. return ret;
  7172. }
  7173. ct = CtNew();
  7174. CtInsertColumn(ct, _UU("SM_CONN_COLUMN_1"), false);
  7175. CtInsertColumn(ct, _UU("SM_CONN_COLUMN_2"), false);
  7176. CtInsertColumn(ct, _UU("SM_CONN_COLUMN_3"), false);
  7177. CtInsertColumn(ct, _UU("SM_CONN_COLUMN_4"), false);
  7178. for (i = 0;i < t.NumConnection;i++)
  7179. {
  7180. wchar_t tmp[MAX_SIZE];
  7181. wchar_t name[MAX_SIZE];
  7182. wchar_t datetime[MAX_SIZE];
  7183. RPC_ENUM_CONNECTION_ITEM *e = &t.Connections[i];
  7184. StrToUni(name, sizeof(name), e->Name);
  7185. UniFormat(tmp, sizeof(tmp), _UU("SM_HOSTNAME_AND_PORT"), e->Hostname, e->Port);
  7186. GetDateTimeStrEx64(datetime, sizeof(datetime), SystemToLocal64(e->ConnectedTime), NULL);
  7187. CtInsert(ct, name, tmp, datetime,
  7188. GetConnectionTypeStr(e->Type));
  7189. }
  7190. CtFree(ct, c);
  7191. FreeRpcEnumConnetion(&t);
  7192. FreeParamValueList(o);
  7193. return 0;
  7194. }
  7195. // Get the TCP connection information currently connected to the VPN Server
  7196. UINT PsConnectionGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7197. {
  7198. LIST *o;
  7199. PS *ps = (PS *)param;
  7200. UINT ret = 0;
  7201. RPC_CONNECTION_INFO t;
  7202. CT *ct;
  7203. wchar_t tmp[MAX_SIZE];
  7204. // Parameter list that can be specified
  7205. PARAM args[] =
  7206. {
  7207. {"[name]", CmdPrompt, _UU("CMD_ConnectionGet_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  7208. };
  7209. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7210. if (o == NULL)
  7211. {
  7212. return ERR_INVALID_PARAMETER;
  7213. }
  7214. Zero(&t, sizeof(t));
  7215. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  7216. // RPC call
  7217. ret = ScGetConnectionInfo(ps->Rpc, &t);
  7218. if (ret != ERR_NO_ERROR)
  7219. {
  7220. // An error has occured
  7221. CmdPrintError(c, ret);
  7222. FreeParamValueList(o);
  7223. return ret;
  7224. }
  7225. else
  7226. {
  7227. ct = CtNewStandard();
  7228. StrToUni(tmp, sizeof(tmp), t.Name);
  7229. CtInsert(ct, _UU("SM_CONNINFO_NAME"), tmp);
  7230. CtInsert(ct, _UU("SM_CONNINFO_TYPE"), GetConnectionTypeStr(t.Type));
  7231. StrToUni(tmp, sizeof(tmp), t.Hostname);
  7232. CtInsert(ct, _UU("SM_CONNINFO_HOSTNAME"), tmp);
  7233. UniToStru(tmp, t.Port);
  7234. CtInsert(ct, _UU("SM_CONNINFO_PORT"), tmp);
  7235. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.ConnectedTime), NULL);
  7236. CtInsert(ct, _UU("SM_CONNINFO_TIME"), tmp);
  7237. StrToUni(tmp, sizeof(tmp), t.ServerStr);
  7238. CtInsert(ct, _UU("SM_CONNINFO_SERVER_STR"), tmp);
  7239. UniFormat(tmp, sizeof(tmp), L"%u.%02u", t.ServerVer / 100, t.ServerVer % 100);
  7240. CtInsert(ct, _UU("SM_CONNINFO_SERVER_VER"), tmp);
  7241. UniToStru(tmp, t.ServerBuild);
  7242. CtInsert(ct, _UU("SM_CONNINFO_SERVER_BUILD"), tmp);
  7243. if (StrLen(t.ClientStr) != 0)
  7244. {
  7245. StrToUni(tmp, sizeof(tmp), t.ClientStr);
  7246. CtInsert(ct, _UU("SM_CONNINFO_CLIENT_STR"), tmp);
  7247. UniFormat(tmp, sizeof(tmp), L"%u.%02u", t.ClientVer / 100, t.ClientVer % 100);
  7248. CtInsert(ct, _UU("SM_CONNINFO_CLIENT_VER"), tmp);
  7249. UniToStru(tmp, t.ClientBuild);
  7250. CtInsert(ct, _UU("SM_CONNINFO_CLIENT_BUILD"), tmp);
  7251. }
  7252. CtFree(ct, c);
  7253. }
  7254. FreeParamValueList(o);
  7255. return 0;
  7256. }
  7257. // Disconnect the TCP connection connected to the VPN Server
  7258. UINT PsConnectionDisconnect(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7259. {
  7260. LIST *o;
  7261. PS *ps = (PS *)param;
  7262. UINT ret = 0;
  7263. RPC_DISCONNECT_CONNECTION t;
  7264. // Parameter list that can be specified
  7265. PARAM args[] =
  7266. {
  7267. {"[name]", CmdPrompt, _UU("CMD_ConnectionDisconnect_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  7268. };
  7269. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7270. if (o == NULL)
  7271. {
  7272. return ERR_INVALID_PARAMETER;
  7273. }
  7274. Zero(&t, sizeof(t));
  7275. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  7276. // RPC call
  7277. ret = ScDisconnectConnection(ps->Rpc, &t);
  7278. if (ret != ERR_NO_ERROR)
  7279. {
  7280. // An error has occured
  7281. CmdPrintError(c, ret);
  7282. FreeParamValueList(o);
  7283. return ret;
  7284. }
  7285. FreeParamValueList(o);
  7286. return 0;
  7287. }
  7288. // Get the LAN card list that can be used for local bridge
  7289. UINT PsBridgeDeviceList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7290. {
  7291. LIST *o;
  7292. PS *ps = (PS *)param;
  7293. UINT ret = 0;
  7294. RPC_ENUM_ETH t;
  7295. UINT i;
  7296. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  7297. if (o == NULL)
  7298. {
  7299. return ERR_INVALID_PARAMETER;
  7300. }
  7301. Zero(&t, sizeof(t));
  7302. // RPC call
  7303. ret = ScEnumEthernet(ps->Rpc, &t);
  7304. if (ret != ERR_NO_ERROR)
  7305. {
  7306. // An error has occured
  7307. CmdPrintError(c, ret);
  7308. FreeParamValueList(o);
  7309. return ret;
  7310. }
  7311. for (i = 0;i < t.NumItem;i++)
  7312. {
  7313. RPC_ENUM_ETH_ITEM *item = &t.Items[i];
  7314. wchar_t tmp[MAX_SIZE * 2];
  7315. StrToUni(tmp, sizeof(tmp), item->DeviceName);
  7316. c->Write(c, tmp);
  7317. }
  7318. FreeRpcEnumEth(&t);
  7319. FreeParamValueList(o);
  7320. return 0;
  7321. }
  7322. // Get the list of local bridge connection
  7323. UINT PsBridgeList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7324. {
  7325. LIST *o;
  7326. PS *ps = (PS *)param;
  7327. UINT ret = 0;
  7328. RPC_ENUM_LOCALBRIDGE t;
  7329. UINT i;
  7330. CT *ct;
  7331. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  7332. if (o == NULL)
  7333. {
  7334. return ERR_INVALID_PARAMETER;
  7335. }
  7336. Zero(&t, sizeof(t));
  7337. // RPC call
  7338. ret = ScEnumLocalBridge(ps->Rpc, &t);
  7339. if (ret != ERR_NO_ERROR)
  7340. {
  7341. // An error has occured
  7342. CmdPrintError(c, ret);
  7343. FreeParamValueList(o);
  7344. return ret;
  7345. }
  7346. ct = CtNew();
  7347. CtInsertColumn(ct, _UU("SM_BRIDGE_COLUMN_1"), false);
  7348. CtInsertColumn(ct, _UU("SM_BRIDGE_COLUMN_2"), false);
  7349. CtInsertColumn(ct, _UU("SM_BRIDGE_COLUMN_3"), false);
  7350. CtInsertColumn(ct, _UU("SM_BRIDGE_COLUMN_4"), false);
  7351. for (i = 0;i < t.NumItem;i++)
  7352. {
  7353. RPC_LOCALBRIDGE *e = &t.Items[i];
  7354. wchar_t name[MAX_SIZE];
  7355. wchar_t nic[MAX_SIZE];
  7356. wchar_t hub[MAX_SIZE];
  7357. wchar_t *status = _UU("SM_BRIDGE_OFFLINE");
  7358. UniToStru(name, i + 1);
  7359. StrToUni(nic, sizeof(nic), e->DeviceName);
  7360. StrToUni(hub, sizeof(hub), e->HubName);
  7361. if (e->Online)
  7362. {
  7363. status = e->Active ? _UU("SM_BRIDGE_ONLINE") : _UU("SM_BRIDGE_ERROR");
  7364. }
  7365. CtInsert(ct, name, hub, nic, status);
  7366. }
  7367. CtFree(ct, c);
  7368. FreeRpcEnumLocalBridge(&t);
  7369. FreeParamValueList(o);
  7370. return 0;
  7371. }
  7372. // Create a local bridge connection
  7373. UINT PsBridgeCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7374. {
  7375. LIST *o;
  7376. PS *ps = (PS *)param;
  7377. UINT ret = 0;
  7378. RPC_LOCALBRIDGE t;
  7379. // Parameter list that can be specified
  7380. PARAM args[] =
  7381. {
  7382. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7383. {"[hubname]", CmdPrompt, _UU("CMD_BridgeCreate_PROMPT_HUBNAME"), CmdEvalNotEmpty, NULL},
  7384. {"DEVICE", CmdPrompt, _UU("CMD_BridgeCreate_PROMPT_DEVICE"), CmdEvalNotEmpty, NULL},
  7385. {"TAP", NULL, NULL, NULL, NULL},
  7386. };
  7387. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7388. if (o == NULL)
  7389. {
  7390. return ERR_INVALID_PARAMETER;
  7391. }
  7392. Zero(&t, sizeof(t));
  7393. t.Active = true;
  7394. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "DEVICE"));
  7395. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[hubname]"));
  7396. t.Online = true;
  7397. t.TapMode = GetParamYes(o, "TAP");
  7398. // RPC call
  7399. ret = ScAddLocalBridge(ps->Rpc, &t);
  7400. if (ret != ERR_NO_ERROR)
  7401. {
  7402. // An error has occured
  7403. CmdPrintError(c, ret);
  7404. FreeParamValueList(o);
  7405. return ret;
  7406. }
  7407. else
  7408. {
  7409. c->Write(c, _UU("SM_BRIDGE_INTEL"));
  7410. c->Write(c, L"");
  7411. if (GetCapsBool(ps->CapsList, "b_is_in_vm"))
  7412. {
  7413. // Message in the case of operating in a VM
  7414. c->Write(c, _UU("D_SM_VMBRIDGE@CAPTION"));
  7415. c->Write(c, _UU("D_SM_VMBRIDGE@S_1"));
  7416. c->Write(c, _UU("D_SM_VMBRIDGE@S_2"));
  7417. c->Write(c, L"");
  7418. }
  7419. }
  7420. FreeParamValueList(o);
  7421. return 0;
  7422. }
  7423. // Delete the local bridge connection
  7424. UINT PsBridgeDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7425. {
  7426. LIST *o;
  7427. PS *ps = (PS *)param;
  7428. UINT ret = 0;
  7429. RPC_LOCALBRIDGE t;
  7430. // Parameter list that can be specified
  7431. PARAM args[] =
  7432. {
  7433. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7434. {"[hubname]", CmdPrompt, _UU("CMD_BridgeDelete_PROMPT_HUBNAME"), CmdEvalNotEmpty, NULL},
  7435. {"DEVICE", CmdPrompt, _UU("CMD_BridgeDelete_PROMPT_DEVICE"), CmdEvalNotEmpty, NULL},
  7436. };
  7437. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7438. if (o == NULL)
  7439. {
  7440. return ERR_INVALID_PARAMETER;
  7441. }
  7442. Zero(&t, sizeof(t));
  7443. StrCpy(t.DeviceName, sizeof(t.DeviceName), GetParamStr(o, "DEVICE"));
  7444. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[hubname]"));
  7445. // RPC call
  7446. ret = ScDeleteLocalBridge(ps->Rpc, &t);
  7447. if (ret != ERR_NO_ERROR)
  7448. {
  7449. // An error has occured
  7450. CmdPrintError(c, ret);
  7451. FreeParamValueList(o);
  7452. return ret;
  7453. }
  7454. FreeParamValueList(o);
  7455. return 0;
  7456. }
  7457. // Get the list of features and capabilities of the server
  7458. UINT PsCaps(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7459. {
  7460. LIST *o;
  7461. PS *ps = (PS *)param;
  7462. UINT ret = 0;
  7463. CAPSLIST *t;
  7464. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  7465. if (o == NULL)
  7466. {
  7467. return ERR_INVALID_PARAMETER;
  7468. }
  7469. // RPC call
  7470. t = ScGetCapsEx(ps->Rpc);
  7471. if (ret != ERR_NO_ERROR)
  7472. {
  7473. // An error has occured
  7474. CmdPrintError(c, ret);
  7475. FreeParamValueList(o);
  7476. return ret;
  7477. }
  7478. else
  7479. {
  7480. UINT i;
  7481. CT *ct;
  7482. ct = CtNewStandard();
  7483. for (i = 0;i < LIST_NUM(t->CapsList);i++)
  7484. {
  7485. CAPS *c = LIST_DATA(t->CapsList, i);
  7486. wchar_t title[MAX_SIZE];
  7487. char name[256];
  7488. Format(name, sizeof(name), "CT_%s", c->Name);
  7489. UniStrCpy(title, sizeof(title), _UU(name));
  7490. if (UniIsEmptyStr(title))
  7491. {
  7492. UniFormat(title, sizeof(title), L"%S", (StrLen(c->Name) >= 2) ? c->Name + 2 : c->Name);
  7493. }
  7494. if (StartWith(c->Name, "b_"))
  7495. {
  7496. bool icon_pass = c->Value == 0 ? false : true;
  7497. if (StrCmpi(c->Name, "b_must_install_pcap") == 0)
  7498. {
  7499. // Reverse only item of WinPcap
  7500. icon_pass = !icon_pass;
  7501. }
  7502. CtInsert(ct, title, c->Value == 0 ? _UU("CAPS_NO") : _UU("CAPS_YES"));
  7503. }
  7504. else
  7505. {
  7506. wchar_t str[64];
  7507. UniToStru(str, c->Value);
  7508. CtInsert(ct, title, str);
  7509. }
  7510. }
  7511. CtFree(ct, c);
  7512. }
  7513. FreeCapsList(t);
  7514. FreeParamValueList(o);
  7515. return 0;
  7516. }
  7517. // Restart the VPN Server service
  7518. UINT PsReboot(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7519. {
  7520. LIST *o;
  7521. PS *ps = (PS *)param;
  7522. UINT ret = 0;
  7523. RPC_TEST t;
  7524. // Parameter list that can be specified
  7525. PARAM args[] =
  7526. {
  7527. {"RESETCONFIG", NULL, NULL, NULL, NULL},
  7528. };
  7529. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7530. if (o == NULL)
  7531. {
  7532. return ERR_INVALID_PARAMETER;
  7533. }
  7534. Zero(&t, sizeof(t));
  7535. t.IntValue = GetParamYes(o, "RESETCONFIG") ? 1 : 0;
  7536. // RPC call
  7537. ret = ScRebootServer(ps->Rpc, &t);
  7538. if (ret != ERR_NO_ERROR)
  7539. {
  7540. // An error has occured
  7541. CmdPrintError(c, ret);
  7542. FreeParamValueList(o);
  7543. return ret;
  7544. }
  7545. FreeRpcTest(&t);
  7546. FreeParamValueList(o);
  7547. return 0;
  7548. }
  7549. // Get the current configuration of the VPN Server
  7550. UINT PsConfigGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7551. {
  7552. LIST *o;
  7553. PS *ps = (PS *)param;
  7554. UINT ret = 0;
  7555. RPC_CONFIG t;
  7556. // Parameter list that can be specified
  7557. PARAM args[] =
  7558. {
  7559. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7560. {"[path]", NULL, NULL, NULL, NULL},
  7561. };
  7562. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7563. if (o == NULL)
  7564. {
  7565. return ERR_INVALID_PARAMETER;
  7566. }
  7567. Zero(&t, sizeof(t));
  7568. // RPC call
  7569. ret = ScGetConfig(ps->Rpc, &t);
  7570. if (ret != ERR_NO_ERROR)
  7571. {
  7572. // An error has occured
  7573. CmdPrintError(c, ret);
  7574. FreeParamValueList(o);
  7575. return ret;
  7576. }
  7577. else
  7578. {
  7579. wchar_t *filename = GetParamUniStr(o, "[path]");
  7580. if (IsEmptyUniStr(filename))
  7581. {
  7582. // Display on the screen
  7583. wchar_t tmp[MAX_SIZE];
  7584. UINT buf_size;
  7585. wchar_t *buf;
  7586. UNI_TOKEN_LIST *lines;
  7587. UniFormat(tmp, sizeof(tmp), _UU("CMD_ConfigGet_FILENAME"), t.FileName,
  7588. StrLen(t.FileData));
  7589. c->Write(c, tmp);
  7590. c->Write(c, L"");
  7591. buf_size = CalcUtf8ToUni((BYTE *)t.FileData, StrLen(t.FileData));
  7592. buf = ZeroMalloc(buf_size + 32);
  7593. Utf8ToUni(buf, buf_size, (BYTE *)t.FileData, StrLen(t.FileData));
  7594. lines = UniGetLines(buf);
  7595. if (lines != NULL)
  7596. {
  7597. UINT i;
  7598. for (i = 0;i < lines->NumTokens;i++)
  7599. {
  7600. c->Write(c, lines->Token[i]);
  7601. }
  7602. UniFreeToken(lines);
  7603. }
  7604. c->Write(c, L"");
  7605. Free(buf);
  7606. }
  7607. else
  7608. {
  7609. // Save to the file
  7610. IO *io = FileCreateW(filename);
  7611. if (io == NULL)
  7612. {
  7613. c->Write(c, _UU("CMD_ConfigGet_FILE_SAVE_FAILED"));
  7614. ret = ERR_INTERNAL_ERROR;
  7615. }
  7616. else
  7617. {
  7618. FileWrite(io, t.FileData, StrLen(t.FileData));
  7619. FileClose(io);
  7620. }
  7621. }
  7622. }
  7623. FreeRpcConfig(&t);
  7624. FreeParamValueList(o);
  7625. return ret;
  7626. }
  7627. // Write the configuration to the VPN Server
  7628. UINT PsConfigSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7629. {
  7630. LIST *o;
  7631. PS *ps = (PS *)param;
  7632. UINT ret = 0;
  7633. RPC_CONFIG t;
  7634. wchar_t *filename;
  7635. BUF *buf;
  7636. // Parameter list that can be specified
  7637. PARAM args[] =
  7638. {
  7639. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7640. {"[path]", CmdPrompt, _UU("CMD_ConfigSet_PROMPT_PATH"), CmdEvalIsFile, NULL},
  7641. };
  7642. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7643. if (o == NULL)
  7644. {
  7645. return ERR_INVALID_PARAMETER;
  7646. }
  7647. filename = GetParamUniStr(o, "[path]");
  7648. buf = ReadDumpW(filename);
  7649. if (buf == NULL)
  7650. {
  7651. c->Write(c, _UU("CMD_ConfigSet_FILE_LOAD_FAILED"));
  7652. }
  7653. else
  7654. {
  7655. Zero(&t, sizeof(t));
  7656. t.FileData = ZeroMalloc(buf->Size + 1);
  7657. Copy(t.FileData, buf->Buf, buf->Size);
  7658. FreeBuf(buf);
  7659. // RPC call
  7660. ret = ScSetConfig(ps->Rpc, &t);
  7661. if (ret != ERR_NO_ERROR)
  7662. {
  7663. // An error has occured
  7664. CmdPrintError(c, ret);
  7665. FreeParamValueList(o);
  7666. return ret;
  7667. }
  7668. FreeRpcConfig(&t);
  7669. }
  7670. FreeParamValueList(o);
  7671. return 0;
  7672. }
  7673. // Get the Virtual Layer 3 switch list
  7674. UINT PsRouterList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7675. {
  7676. LIST *o;
  7677. PS *ps = (PS *)param;
  7678. UINT ret = 0;
  7679. RPC_ENUM_L3SW t;
  7680. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  7681. if (o == NULL)
  7682. {
  7683. return ERR_INVALID_PARAMETER;
  7684. }
  7685. Zero(&t, sizeof(t));
  7686. // RPC call
  7687. ret = ScEnumL3Switch(ps->Rpc, &t);
  7688. if (ret != ERR_NO_ERROR)
  7689. {
  7690. // An error has occured
  7691. CmdPrintError(c, ret);
  7692. FreeParamValueList(o);
  7693. return ret;
  7694. }
  7695. else
  7696. {
  7697. CT *ct = CtNew();
  7698. UINT i;
  7699. CtInsertColumn(ct, _UU("SM_L3_SW_COLUMN1"), false);
  7700. CtInsertColumn(ct, _UU("SM_L3_SW_COLUMN2"), false);
  7701. CtInsertColumn(ct, _UU("SM_L3_SW_COLUMN3"), true);
  7702. CtInsertColumn(ct, _UU("SM_L3_SW_COLUMN4"), true);
  7703. for (i = 0;i < t.NumItem;i++)
  7704. {
  7705. RPC_ENUM_L3SW_ITEM *e = &t.Items[i];
  7706. wchar_t tmp1[MAX_SIZE], *tmp2, tmp3[64], tmp4[64];
  7707. StrToUni(tmp1, sizeof(tmp1), e->Name);
  7708. if (e->Active == false)
  7709. {
  7710. tmp2 = _UU("SM_L3_SW_ST_F_F");
  7711. }
  7712. else if (e->Online == false)
  7713. {
  7714. tmp2 = _UU("SM_L3_SW_ST_T_F");
  7715. }
  7716. else
  7717. {
  7718. tmp2 = _UU("SM_L3_SW_ST_T_T");
  7719. }
  7720. UniToStru(tmp3, e->NumInterfaces);
  7721. UniToStru(tmp4, e->NumTables);
  7722. CtInsert(ct,
  7723. tmp1, tmp2, tmp3, tmp4);
  7724. }
  7725. CtFree(ct, c);
  7726. }
  7727. FreeRpcEnumL3Sw(&t);
  7728. FreeParamValueList(o);
  7729. return 0;
  7730. }
  7731. // Define a new virtual layer 3 switch
  7732. UINT PsRouterAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7733. {
  7734. LIST *o;
  7735. PS *ps = (PS *)param;
  7736. UINT ret = 0;
  7737. RPC_L3SW t;
  7738. // Parameter list that can be specified
  7739. PARAM args[] =
  7740. {
  7741. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7742. {"[name]", CmdPrompt, _UU("CMD_RouterAdd_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  7743. };
  7744. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7745. if (o == NULL)
  7746. {
  7747. return ERR_INVALID_PARAMETER;
  7748. }
  7749. Zero(&t, sizeof(t));
  7750. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  7751. // RPC call
  7752. ret = ScAddL3Switch(ps->Rpc, &t);
  7753. if (ret != ERR_NO_ERROR)
  7754. {
  7755. // An error has occured
  7756. CmdPrintError(c, ret);
  7757. FreeParamValueList(o);
  7758. return ret;
  7759. }
  7760. FreeParamValueList(o);
  7761. return 0;
  7762. }
  7763. // Delete the Virtual Layer 3 Switch
  7764. UINT PsRouterDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7765. {
  7766. LIST *o;
  7767. PS *ps = (PS *)param;
  7768. UINT ret = 0;
  7769. RPC_L3SW t;
  7770. // Parameter list that can be specified
  7771. PARAM args[] =
  7772. {
  7773. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7774. {"[name]", CmdPrompt, _UU("CMD_RouterDelete_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  7775. };
  7776. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7777. if (o == NULL)
  7778. {
  7779. return ERR_INVALID_PARAMETER;
  7780. }
  7781. Zero(&t, sizeof(t));
  7782. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  7783. // RPC call
  7784. ret = ScDelL3Switch(ps->Rpc, &t);
  7785. if (ret != ERR_NO_ERROR)
  7786. {
  7787. // An error has occured
  7788. CmdPrintError(c, ret);
  7789. FreeParamValueList(o);
  7790. return ret;
  7791. }
  7792. FreeParamValueList(o);
  7793. return 0;
  7794. }
  7795. // Start the Virtual Layer 3 Switch
  7796. UINT PsRouterStart(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7797. {
  7798. LIST *o;
  7799. PS *ps = (PS *)param;
  7800. UINT ret = 0;
  7801. RPC_L3SW t;
  7802. // Parameter list that can be specified
  7803. PARAM args[] =
  7804. {
  7805. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7806. {"[name]", CmdPrompt, _UU("CMD_RouterStart_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  7807. };
  7808. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7809. if (o == NULL)
  7810. {
  7811. return ERR_INVALID_PARAMETER;
  7812. }
  7813. Zero(&t, sizeof(t));
  7814. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  7815. // RPC call
  7816. ret = ScStartL3Switch(ps->Rpc, &t);
  7817. if (ret != ERR_NO_ERROR)
  7818. {
  7819. // An error has occured
  7820. CmdPrintError(c, ret);
  7821. FreeParamValueList(o);
  7822. return ret;
  7823. }
  7824. FreeParamValueList(o);
  7825. return 0;
  7826. }
  7827. // Stop the Virtual Layer 3 Switch
  7828. UINT PsRouterStop(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7829. {
  7830. LIST *o;
  7831. PS *ps = (PS *)param;
  7832. UINT ret = 0;
  7833. RPC_L3SW t;
  7834. // Parameter list that can be specified
  7835. PARAM args[] =
  7836. {
  7837. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7838. {"[name]", CmdPrompt, _UU("CMD_RouterStop_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  7839. };
  7840. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7841. if (o == NULL)
  7842. {
  7843. return ERR_INVALID_PARAMETER;
  7844. }
  7845. Zero(&t, sizeof(t));
  7846. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  7847. // RPC call
  7848. ret = ScStopL3Switch(ps->Rpc, &t);
  7849. if (ret != ERR_NO_ERROR)
  7850. {
  7851. // An error has occured
  7852. CmdPrintError(c, ret);
  7853. FreeParamValueList(o);
  7854. return ret;
  7855. }
  7856. FreeParamValueList(o);
  7857. return 0;
  7858. }
  7859. // Get the interface list registered on Virtual Layer 3 Switch
  7860. UINT PsRouterIfList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  7861. {
  7862. LIST *o;
  7863. PS *ps = (PS *)param;
  7864. UINT ret = 0;
  7865. RPC_ENUM_L3IF t;
  7866. // Parameter list that can be specified
  7867. PARAM args[] =
  7868. {
  7869. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  7870. {"[name]", CmdPrompt, _UU("CMD_RouterIfList_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  7871. };
  7872. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  7873. if (o == NULL)
  7874. {
  7875. return ERR_INVALID_PARAMETER;
  7876. }
  7877. Zero(&t, sizeof(t));
  7878. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  7879. // RPC call
  7880. ret = ScEnumL3If(ps->Rpc, &t);
  7881. if (ret != ERR_NO_ERROR)
  7882. {
  7883. // An error has occured
  7884. CmdPrintError(c, ret);
  7885. FreeParamValueList(o);
  7886. return ret;
  7887. }
  7888. else
  7889. {
  7890. UINT i;
  7891. wchar_t tmp1[MAX_SIZE];
  7892. wchar_t tmp2[MAX_SIZE];
  7893. wchar_t tmp3[MAX_SIZE];
  7894. CT *ct = CtNew();
  7895. CtInsertColumn(ct, _UU("SM_L3_SW_IF_COLUMN1"), false);
  7896. CtInsertColumn(ct, _UU("SM_L3_SW_IF_COLUMN2"), false);
  7897. CtInsertColumn(ct, _UU("SM_L3_SW_IF_COLUMN3"), false);
  7898. for (i = 0;i < t.NumItem;i++)
  7899. {
  7900. RPC_L3IF *e = &t.Items[i];
  7901. IPToUniStr32(tmp1, sizeof(tmp1), e->IpAddress);
  7902. IPToUniStr32(tmp2, sizeof(tmp2), e->SubnetMask);
  7903. StrToUni(tmp3, sizeof(tmp3), e->HubName);
  7904. CtInsert(ct, tmp1, tmp2, tmp3);
  7905. }
  7906. CtFree(ct, c);
  7907. }
  7908. FreeRpcEnumL3If(&t);
  7909. FreeParamValueList(o);
  7910. return 0;
  7911. }
  7912. // Evaluate the IP address and mask
  7913. bool CmdEvalIpAndMask4(CONSOLE *c, wchar_t *str, void *param)
  7914. {
  7915. char tmp[MAX_SIZE];
  7916. UINT ip, mask;
  7917. // Validate arguments
  7918. if (c == NULL || str == NULL)
  7919. {
  7920. return false;
  7921. }
  7922. UniToStr(tmp, sizeof(tmp), str);
  7923. if (ParseIpAndMask4(tmp, &ip, &mask) == false)
  7924. {
  7925. c->Write(c, _UU("CMD_PARSE_IP_MASK_ERROR_1"));
  7926. return false;
  7927. }
  7928. return true;
  7929. }
  7930. bool CmdEvalIpAndMask6(CONSOLE *c, wchar_t *str, void *param)
  7931. {
  7932. char tmp[MAX_SIZE];
  7933. IP ip, mask;
  7934. // Validate arguments
  7935. if (c == NULL || str == NULL)
  7936. {
  7937. return false;
  7938. }
  7939. UniToStr(tmp, sizeof(tmp), str);
  7940. if (ParseIpAndMask6(tmp, &ip, &mask) == false)
  7941. {
  7942. c->Write(c, _UU("CMD_PARSE_IP_MASK_ERROR_1_6"));
  7943. return false;
  7944. }
  7945. return true;
  7946. }
  7947. bool CmdEvalIpAndMask46(CONSOLE *c, wchar_t *str, void *param)
  7948. {
  7949. char tmp[MAX_SIZE];
  7950. TOKEN_LIST *t;
  7951. bool ret = false;
  7952. Zero(tmp, sizeof(tmp));
  7953. UniToStr(tmp, sizeof(tmp), str);
  7954. t = ParseToken(tmp, "/");
  7955. if (t == NULL)
  7956. {
  7957. return false;
  7958. }
  7959. if (t->NumTokens >= 1)
  7960. {
  7961. Trim(t->Token[0]);
  7962. if (IsIpStr4(t->Token[0]))
  7963. {
  7964. ret = CmdEvalIpAndMask4(c, str, param);
  7965. }
  7966. else
  7967. {
  7968. ret = CmdEvalIpAndMask6(c, str, param);
  7969. }
  7970. }
  7971. FreeToken(t);
  7972. return ret;
  7973. }
  7974. // Evaluate the network address and the subnet mask
  7975. bool CmdEvalNetworkAndSubnetMask4(CONSOLE *c, wchar_t *str, void *param)
  7976. {
  7977. char tmp[MAX_SIZE];
  7978. UINT ip, mask;
  7979. // Validate arguments
  7980. if (c == NULL || str == NULL)
  7981. {
  7982. return false;
  7983. }
  7984. UniToStr(tmp, sizeof(tmp), str);
  7985. if (ParseIpAndSubnetMask4(tmp, &ip, &mask) == false)
  7986. {
  7987. c->Write(c, _UU("CMD_PARSE_IP_SUBNET_ERROR_1"));
  7988. return false;
  7989. }
  7990. if (IsNetworkAddress32(ip, mask) == false)
  7991. {
  7992. c->Write(c, _UU("CMD_PARSE_IP_SUBNET_ERROR_2"));
  7993. return false;
  7994. }
  7995. return true;
  7996. }
  7997. bool CmdEvalNetworkAndSubnetMask6(CONSOLE *c, wchar_t *str, void *param)
  7998. {
  7999. char tmp[MAX_SIZE];
  8000. IP ip, mask;
  8001. // Validate arguments
  8002. if (c == NULL || str == NULL)
  8003. {
  8004. return false;
  8005. }
  8006. UniToStr(tmp, sizeof(tmp), str);
  8007. if (ParseIpAndSubnetMask6(tmp, &ip, &mask) == false)
  8008. {
  8009. c->Write(c, _UU("CMD_PARSE_IP_SUBNET_ERROR_1_6"));
  8010. return false;
  8011. }
  8012. if (IsNetworkPrefixAddress6(&ip, &mask) == false)
  8013. {
  8014. c->Write(c, _UU("CMD_PARSE_IP_SUBNET_ERROR_3"));
  8015. return false;
  8016. }
  8017. return true;
  8018. }
  8019. bool CmdEvalNetworkAndSubnetMask46(CONSOLE *c, wchar_t *str, void *param)
  8020. {
  8021. char tmp[MAX_SIZE];
  8022. TOKEN_LIST *t;
  8023. bool ret = false;
  8024. Zero(tmp, sizeof(tmp));
  8025. UniToStr(tmp, sizeof(tmp), str);
  8026. t = ParseToken(tmp, "/");
  8027. if (t == NULL)
  8028. {
  8029. return false;
  8030. }
  8031. if (t->NumTokens >= 1)
  8032. {
  8033. Trim(t->Token[0]);
  8034. if (IsIpStr4(t->Token[0]))
  8035. {
  8036. ret = CmdEvalNetworkAndSubnetMask4(c, str, param);
  8037. }
  8038. else
  8039. {
  8040. ret = CmdEvalNetworkAndSubnetMask6(c, str, param);
  8041. }
  8042. }
  8043. FreeToken(t);
  8044. return ret;
  8045. }
  8046. // Evaluate the IP address and subnet mask
  8047. bool CmdEvalHostAndSubnetMask4(CONSOLE *c, wchar_t *str, void *param)
  8048. {
  8049. char tmp[MAX_SIZE];
  8050. // Validate arguments
  8051. if (c == NULL || str == NULL)
  8052. {
  8053. return false;
  8054. }
  8055. UniToStr(tmp, sizeof(tmp), str);
  8056. if (ParseIpAndSubnetMask4(tmp, NULL, NULL) == false)
  8057. {
  8058. c->Write(c, _UU("CMD_PARSE_IP_SUBNET_ERROR_1"));
  8059. return false;
  8060. }
  8061. return true;
  8062. }
  8063. // Add a virtual interface to the virtual layer 3 switch
  8064. UINT PsRouterIfAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8065. {
  8066. LIST *o;
  8067. PS *ps = (PS *)param;
  8068. UINT ret = 0;
  8069. RPC_L3IF t;
  8070. // Parameter list that can be specified
  8071. PARAM args[] =
  8072. {
  8073. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8074. {"[name]", CmdPrompt, _UU("CMD_RouterIfAdd_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8075. {"HUB", CmdPrompt, _UU("CMD_RouterIfAdd_PROMPT_HUB"), CmdEvalNotEmpty, NULL},
  8076. {"IP", CmdPrompt, _UU("CMD_RouterIfAdd_PROMPT_IP"), CmdEvalHostAndSubnetMask4, NULL},
  8077. };
  8078. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8079. if (o == NULL)
  8080. {
  8081. return ERR_INVALID_PARAMETER;
  8082. }
  8083. Zero(&t, sizeof(t));
  8084. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  8085. ParseIpAndSubnetMask4(GetParamStr(o, "IP"), &t.IpAddress, &t.SubnetMask);
  8086. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "HUB"));
  8087. // RPC call
  8088. ret = ScAddL3If(ps->Rpc, &t);
  8089. if (ret != ERR_NO_ERROR)
  8090. {
  8091. // An error has occured
  8092. CmdPrintError(c, ret);
  8093. FreeParamValueList(o);
  8094. return ret;
  8095. }
  8096. FreeParamValueList(o);
  8097. return 0;
  8098. }
  8099. // Delete the virtual interface of the virtual layer 3 switch
  8100. UINT PsRouterIfDel(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8101. {
  8102. LIST *o;
  8103. PS *ps = (PS *)param;
  8104. UINT ret = 0;
  8105. RPC_L3IF t;
  8106. // Parameter list that can be specified
  8107. PARAM args[] =
  8108. {
  8109. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8110. {"[name]", CmdPrompt, _UU("CMD_RouterIfAdd_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8111. {"HUB", CmdPrompt, _UU("CMD_RouterIfAdd_PROMPT_HUB"), CmdEvalNotEmpty, NULL},
  8112. };
  8113. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8114. if (o == NULL)
  8115. {
  8116. return ERR_INVALID_PARAMETER;
  8117. }
  8118. Zero(&t, sizeof(t));
  8119. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  8120. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "HUB"));
  8121. // RPC call
  8122. ret = ScDelL3If(ps->Rpc, &t);
  8123. if (ret != ERR_NO_ERROR)
  8124. {
  8125. // An error has occured
  8126. CmdPrintError(c, ret);
  8127. FreeParamValueList(o);
  8128. return ret;
  8129. }
  8130. FreeParamValueList(o);
  8131. return 0;
  8132. }
  8133. // Get the routing table of the Virtual Layer 3 Switch
  8134. UINT PsRouterTableList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8135. {
  8136. LIST *o;
  8137. PS *ps = (PS *)param;
  8138. UINT ret = 0;
  8139. RPC_ENUM_L3TABLE t;
  8140. CT *ct;
  8141. wchar_t tmp1[MAX_SIZE];
  8142. wchar_t tmp2[MAX_SIZE];
  8143. wchar_t tmp3[MAX_SIZE];
  8144. wchar_t tmp4[MAX_SIZE];
  8145. // Parameter list that can be specified
  8146. PARAM args[] =
  8147. {
  8148. {"[name]", CmdPrompt, _UU("CMD_RouterTableList_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8149. };
  8150. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8151. if (o == NULL)
  8152. {
  8153. return ERR_INVALID_PARAMETER;
  8154. }
  8155. Zero(&t, sizeof(t));
  8156. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  8157. // RPC call
  8158. ret = ScEnumL3Table(ps->Rpc, &t);
  8159. if (ret != ERR_NO_ERROR)
  8160. {
  8161. // An error has occured
  8162. CmdPrintError(c, ret);
  8163. FreeParamValueList(o);
  8164. return ret;
  8165. }
  8166. else
  8167. {
  8168. UINT i;
  8169. ct = CtNew();
  8170. CtInsertColumn(ct, _UU("SM_L3_SW_TABLE_COLUMN1"), false);
  8171. CtInsertColumn(ct, _UU("SM_L3_SW_TABLE_COLUMN2"), false);
  8172. CtInsertColumn(ct, _UU("SM_L3_SW_TABLE_COLUMN3"), false);
  8173. CtInsertColumn(ct, _UU("SM_L3_SW_TABLE_COLUMN4"), true);
  8174. for (i = 0;i < t.NumItem;i++)
  8175. {
  8176. RPC_L3TABLE *e = &t.Items[i];
  8177. IPToUniStr32(tmp1, sizeof(tmp1), e->NetworkAddress);
  8178. IPToUniStr32(tmp2, sizeof(tmp2), e->SubnetMask);
  8179. IPToUniStr32(tmp3, sizeof(tmp3), e->GatewayAddress);
  8180. UniToStru(tmp4, e->Metric);
  8181. CtInsert(ct, tmp1, tmp2, tmp3, tmp4);
  8182. }
  8183. CtFree(ct, c);
  8184. }
  8185. FreeRpcEnumL3Table(&t);
  8186. FreeParamValueList(o);
  8187. return 0;
  8188. }
  8189. // Add a routing table entry to the Virtual Layer 3 Switch
  8190. UINT PsRouterTableAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8191. {
  8192. LIST *o;
  8193. PS *ps = (PS *)param;
  8194. UINT ret = 0;
  8195. RPC_L3TABLE t;
  8196. // Parameter list that can be specified
  8197. PARAM args[] =
  8198. {
  8199. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8200. {"[name]", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8201. {"NETWORK", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_NETWORK"), CmdEvalNetworkAndSubnetMask4, NULL},
  8202. {"GATEWAY", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_GATEWAY"), CmdEvalIp, NULL},
  8203. {"METRIC", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_METRIC"), CmdEvalInt1, NULL},
  8204. };
  8205. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8206. if (o == NULL)
  8207. {
  8208. return ERR_INVALID_PARAMETER;
  8209. }
  8210. Zero(&t, sizeof(t));
  8211. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  8212. ParseIpAndSubnetMask4(GetParamStr(o, "NETWORK"), &t.NetworkAddress, &t.SubnetMask);
  8213. t.Metric = GetParamInt(o, "METRIC");
  8214. t.GatewayAddress = StrToIP32(GetParamStr(o, "GATEWAY"));
  8215. // RPC call
  8216. ret = ScAddL3Table(ps->Rpc, &t);
  8217. if (ret != ERR_NO_ERROR)
  8218. {
  8219. // An error has occured
  8220. CmdPrintError(c, ret);
  8221. FreeParamValueList(o);
  8222. return ret;
  8223. }
  8224. FreeParamValueList(o);
  8225. return 0;
  8226. }
  8227. // Delete the routing table entry of the Virtual Layer 3 Switch
  8228. UINT PsRouterTableDel(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8229. {
  8230. LIST *o;
  8231. PS *ps = (PS *)param;
  8232. UINT ret = 0;
  8233. RPC_L3TABLE t;
  8234. // Parameter list that can be specified
  8235. PARAM args[] =
  8236. {
  8237. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8238. {"[name]", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8239. {"NETWORK", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_NETWORK"), CmdEvalNetworkAndSubnetMask4, NULL},
  8240. {"GATEWAY", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_GATEWAY"), CmdEvalIp, NULL},
  8241. {"METRIC", CmdPrompt, _UU("CMD_RouterTableAdd_PROMPT_METRIC"), CmdEvalInt1, NULL},
  8242. };
  8243. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8244. if (o == NULL)
  8245. {
  8246. return ERR_INVALID_PARAMETER;
  8247. }
  8248. Zero(&t, sizeof(t));
  8249. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  8250. ParseIpAndSubnetMask4(GetParamStr(o, "NETWORK"), &t.NetworkAddress, &t.SubnetMask);
  8251. t.Metric = GetParamInt(o, "METRIC");
  8252. t.GatewayAddress = StrToIP32(GetParamStr(o, "GATEWAY"));
  8253. // RPC call
  8254. ret = ScDelL3Table(ps->Rpc, &t);
  8255. if (ret != ERR_NO_ERROR)
  8256. {
  8257. // An error has occured
  8258. CmdPrintError(c, ret);
  8259. FreeParamValueList(o);
  8260. return ret;
  8261. }
  8262. FreeParamValueList(o);
  8263. return 0;
  8264. }
  8265. // Get the log files list
  8266. UINT PsLogFileList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8267. {
  8268. LIST *o;
  8269. PS *ps = (PS *)param;
  8270. UINT ret = 0;
  8271. RPC_ENUM_LOG_FILE t;
  8272. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  8273. if (o == NULL)
  8274. {
  8275. return ERR_INVALID_PARAMETER;
  8276. }
  8277. Zero(&t, sizeof(t));
  8278. c->Write(c, _UU("CMD_LogFileList_START"));
  8279. c->Write(c, L"");
  8280. // RPC call
  8281. ret = ScEnumLogFile(ps->Rpc, &t);
  8282. if (ret != ERR_NO_ERROR)
  8283. {
  8284. // An error has occured
  8285. CmdPrintError(c, ret);
  8286. FreeParamValueList(o);
  8287. return ret;
  8288. }
  8289. else
  8290. {
  8291. UINT i;
  8292. wchar_t tmp[MAX_SIZE];
  8293. CT *ct;
  8294. UniFormat(tmp, sizeof(tmp), _UU("CMD_LogFileList_NUM_LOGS"), t.NumItem);
  8295. c->Write(c, tmp);
  8296. ct = CtNew();
  8297. CtInsertColumn(ct, _UU("SM_LOG_FILE_COLUMN_1"), false);
  8298. CtInsertColumn(ct, _UU("SM_LOG_FILE_COLUMN_2"), true);
  8299. CtInsertColumn(ct, _UU("SM_LOG_FILE_COLUMN_3"), false);
  8300. CtInsertColumn(ct, _UU("SM_LOG_FILE_COLUMN_4"), false);
  8301. for (i = 0;i < t.NumItem;i++)
  8302. {
  8303. RPC_ENUM_LOG_FILE_ITEM *e = &t.Items[i];
  8304. wchar_t tmp1[MAX_PATH], tmp2[128], tmp3[128], tmp4[MAX_HOST_NAME_LEN + 1];
  8305. char tmp[MAX_SIZE];
  8306. StrToUni(tmp1, sizeof(tmp1), e->FilePath);
  8307. ToStrByte(tmp, sizeof(tmp), e->FileSize);
  8308. StrToUni(tmp2, sizeof(tmp2), tmp);
  8309. GetDateTimeStr64Uni(tmp3, sizeof(tmp3), SystemToLocal64(e->UpdatedTime));
  8310. StrToUni(tmp4, sizeof(tmp4), e->ServerName);
  8311. CtInsert(ct, tmp1, tmp2, tmp3, tmp4);
  8312. }
  8313. CtFreeEx(ct, c, true);
  8314. }
  8315. FreeRpcEnumLogFile(&t);
  8316. FreeParamValueList(o);
  8317. return 0;
  8318. }
  8319. // Download a log file
  8320. UINT PsLogFileGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8321. {
  8322. LIST *o;
  8323. PS *ps = (PS *)param;
  8324. UINT ret = 0;
  8325. BUF *buf;
  8326. char *filename = NULL;
  8327. char *server_name;
  8328. // Parameter list that can be specified
  8329. PARAM args[] =
  8330. {
  8331. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8332. {"[name]", CmdPrompt, _UU("CMD_LogFileGet_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8333. {"SERVER", NULL, NULL, NULL, NULL},
  8334. {"SAVEPATH", NULL, NULL, NULL, NULL},
  8335. };
  8336. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8337. if (o == NULL)
  8338. {
  8339. return ERR_INVALID_PARAMETER;
  8340. }
  8341. filename = GetParamStr(o, "SAVE");
  8342. if (IsEmptyStr(filename))
  8343. {
  8344. filename = GetParamStr(o, "SAVEPATH");
  8345. }
  8346. c->Write(c, _UU("CMD_LogFileGet_START"));
  8347. server_name = GetParamStr(o, "SERVER");
  8348. buf = DownloadFileFromServer(ps->Rpc, server_name,
  8349. GetParamStr(o, "[name]"), 0, NULL, NULL);
  8350. if (buf == NULL)
  8351. {
  8352. c->Write(c, _UU("CMD_LogFileGet_FAILED"));
  8353. ret = ERR_INTERNAL_ERROR;
  8354. }
  8355. else
  8356. {
  8357. if (IsEmptyStr(filename) == false)
  8358. {
  8359. // Save to the file
  8360. if (DumpBuf(buf, filename) == false)
  8361. {
  8362. ret = ERR_INTERNAL_ERROR;
  8363. c->Write(c, _UU("CMD_LogFileGet_SAVE_FAILED"));
  8364. }
  8365. }
  8366. else
  8367. {
  8368. // Display on the screen
  8369. wchar_t tmp[MAX_SIZE];
  8370. UINT buf_size;
  8371. wchar_t *uni_buf;
  8372. UniFormat(tmp, sizeof(tmp), _UU("CMD_LogFileGet_FILESIZE"),
  8373. buf->Size);
  8374. c->Write(c, tmp);
  8375. c->Write(c, L"");
  8376. buf_size = CalcUtf8ToUni((BYTE *)buf->Buf, buf->Size);
  8377. uni_buf = ZeroMalloc(buf_size + 32);
  8378. Utf8ToUni(uni_buf, buf_size, (BYTE *)buf->Buf, buf->Size);
  8379. c->Write(c, uni_buf);
  8380. c->Write(c, L"");
  8381. Free(uni_buf);
  8382. }
  8383. FreeBuf(buf);
  8384. }
  8385. FreeParamValueList(o);
  8386. return ret;
  8387. }
  8388. // Create a New Virtual HUB
  8389. UINT PsHubCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8390. {
  8391. LIST *o;
  8392. PS *ps = (PS *)param;
  8393. UINT ret = 0;
  8394. RPC_CREATE_HUB t;
  8395. char *pass = "";
  8396. UINT hub_type = HUB_TYPE_STANDALONE;
  8397. // Parameter list that can be specified
  8398. PARAM args[] =
  8399. {
  8400. {"[name]", CmdPrompt, _UU("CMD_HubCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8401. {"PASSWORD", CmdPromptChoosePassword, NULL, NULL, NULL},
  8402. };
  8403. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8404. if (o == NULL)
  8405. {
  8406. return ERR_INVALID_PARAMETER;
  8407. }
  8408. else
  8409. {
  8410. RPC_SERVER_INFO t;
  8411. Zero(&t, sizeof(t));
  8412. if (ScGetServerInfo(ps->Rpc, &t) == ERR_NO_ERROR)
  8413. {
  8414. if (t.ServerType == SERVER_TYPE_FARM_CONTROLLER)
  8415. {
  8416. hub_type = HUB_TYPE_FARM_DYNAMIC;
  8417. }
  8418. FreeRpcServerInfo(&t);
  8419. }
  8420. }
  8421. Zero(&t, sizeof(t));
  8422. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8423. t.HubType = hub_type;
  8424. if (IsEmptyStr(GetParamStr(o, "PASSWORD")) == false)
  8425. {
  8426. pass = GetParamStr(o, "PASSWORD");
  8427. }
  8428. Hash(t.HashedPassword, pass, StrLen(pass), true);
  8429. HashPassword(t.SecurePassword, ADMINISTRATOR_USERNAME, pass);
  8430. t.Online = true;
  8431. // RPC call
  8432. ret = ScCreateHub(ps->Rpc, &t);
  8433. if (ret != ERR_NO_ERROR)
  8434. {
  8435. // An error has occured
  8436. CmdPrintError(c, ret);
  8437. FreeParamValueList(o);
  8438. return ret;
  8439. }
  8440. FreeParamValueList(o);
  8441. return 0;
  8442. }
  8443. // Create a New Virtual HUB (dynamic mode)
  8444. UINT PsHubCreateDynamic(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8445. {
  8446. LIST *o;
  8447. PS *ps = (PS *)param;
  8448. UINT ret = 0;
  8449. RPC_CREATE_HUB t;
  8450. char *pass = "";
  8451. UINT hub_type = HUB_TYPE_FARM_DYNAMIC;
  8452. // Parameter list that can be specified
  8453. PARAM args[] =
  8454. {
  8455. {"[name]", CmdPrompt, _UU("CMD_HubCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8456. {"PASSWORD", CmdPromptChoosePassword, NULL, NULL, NULL},
  8457. };
  8458. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8459. if (o == NULL)
  8460. {
  8461. return ERR_INVALID_PARAMETER;
  8462. }
  8463. Zero(&t, sizeof(t));
  8464. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8465. t.HubType = hub_type;
  8466. if (IsEmptyStr(GetParamStr(o, "PASSWORD")) == false)
  8467. {
  8468. pass = GetParamStr(o, "PASSWORD");
  8469. }
  8470. Hash(t.HashedPassword, pass, StrLen(pass), true);
  8471. HashPassword(t.SecurePassword, ADMINISTRATOR_USERNAME, pass);
  8472. t.Online = true;
  8473. // RPC call
  8474. ret = ScCreateHub(ps->Rpc, &t);
  8475. if (ret != ERR_NO_ERROR)
  8476. {
  8477. // An error has occured
  8478. CmdPrintError(c, ret);
  8479. FreeParamValueList(o);
  8480. return ret;
  8481. }
  8482. FreeParamValueList(o);
  8483. return 0;
  8484. }
  8485. // Create a New Virtual HUB (static mode)
  8486. UINT PsHubCreateStatic(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8487. {
  8488. LIST *o;
  8489. PS *ps = (PS *)param;
  8490. UINT ret = 0;
  8491. RPC_CREATE_HUB t;
  8492. char *pass = "";
  8493. UINT hub_type = HUB_TYPE_FARM_STATIC;
  8494. // Parameter list that can be specified
  8495. PARAM args[] =
  8496. {
  8497. {"[name]", CmdPrompt, _UU("CMD_HubCreate_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8498. {"PASSWORD", CmdPromptChoosePassword, NULL, NULL, NULL},
  8499. };
  8500. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8501. if (o == NULL)
  8502. {
  8503. return ERR_INVALID_PARAMETER;
  8504. }
  8505. Zero(&t, sizeof(t));
  8506. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8507. t.HubType = hub_type;
  8508. if (IsEmptyStr(GetParamStr(o, "PASSWORD")) == false)
  8509. {
  8510. pass = GetParamStr(o, "PASSWORD");
  8511. }
  8512. Hash(t.HashedPassword, pass, StrLen(pass), true);
  8513. HashPassword(t.SecurePassword, ADMINISTRATOR_USERNAME, pass);
  8514. t.Online = true;
  8515. // RPC call
  8516. ret = ScCreateHub(ps->Rpc, &t);
  8517. if (ret != ERR_NO_ERROR)
  8518. {
  8519. // An error has occured
  8520. CmdPrintError(c, ret);
  8521. FreeParamValueList(o);
  8522. return ret;
  8523. }
  8524. FreeParamValueList(o);
  8525. return 0;
  8526. }
  8527. // Delete a Virtual HUB
  8528. UINT PsHubDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8529. {
  8530. LIST *o;
  8531. PS *ps = (PS *)param;
  8532. UINT ret = 0;
  8533. RPC_DELETE_HUB t;
  8534. // Parameter list that can be specified
  8535. PARAM args[] =
  8536. {
  8537. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8538. {"[name]", CmdPrompt, _UU("CMD_HubDelete_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8539. };
  8540. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8541. if (o == NULL)
  8542. {
  8543. return ERR_INVALID_PARAMETER;
  8544. }
  8545. Zero(&t, sizeof(t));
  8546. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8547. // RPC call
  8548. ret = ScDeleteHub(ps->Rpc, &t);
  8549. if (ret != ERR_NO_ERROR)
  8550. {
  8551. // An error has occured
  8552. CmdPrintError(c, ret);
  8553. FreeParamValueList(o);
  8554. return ret;
  8555. }
  8556. FreeParamValueList(o);
  8557. return 0;
  8558. }
  8559. // Set the Virtual HUB to static
  8560. UINT PsHubSetStatic(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8561. {
  8562. LIST *o;
  8563. PS *ps = (PS *)param;
  8564. UINT ret = 0;
  8565. RPC_CREATE_HUB t;
  8566. // Parameter list that can be specified
  8567. PARAM args[] =
  8568. {
  8569. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8570. {"[name]", CmdPrompt, _UU("CMD_HubChange_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8571. };
  8572. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8573. if (o == NULL)
  8574. {
  8575. return ERR_INVALID_PARAMETER;
  8576. }
  8577. Zero(&t, sizeof(t));
  8578. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8579. // Retrieve the current setting first
  8580. ret = ScGetHub(ps->Rpc, &t);
  8581. if (ret != ERR_NO_ERROR)
  8582. {
  8583. // An error has occured
  8584. CmdPrintError(c, ret);
  8585. FreeParamValueList(o);
  8586. return ret;
  8587. }
  8588. // Change the settings
  8589. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8590. t.HubType = HUB_TYPE_FARM_STATIC;
  8591. // Write
  8592. ret = ScSetHub(ps->Rpc, &t);
  8593. if (ret != ERR_NO_ERROR)
  8594. {
  8595. // An error has occured
  8596. CmdPrintError(c, ret);
  8597. FreeParamValueList(o);
  8598. return ret;
  8599. }
  8600. FreeParamValueList(o);
  8601. return 0;
  8602. }
  8603. // Change the type of Virtual HUB to dynamic Virtual HUB
  8604. UINT PsHubSetDynamic(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8605. {
  8606. LIST *o;
  8607. PS *ps = (PS *)param;
  8608. UINT ret = 0;
  8609. RPC_CREATE_HUB t;
  8610. // Parameter list that can be specified
  8611. PARAM args[] =
  8612. {
  8613. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8614. {"[name]", CmdPrompt, _UU("CMD_HubChange_PROMPT_NAME"), CmdEvalNotEmpty, NULL},
  8615. };
  8616. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8617. if (o == NULL)
  8618. {
  8619. return ERR_INVALID_PARAMETER;
  8620. }
  8621. Zero(&t, sizeof(t));
  8622. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8623. // Retrieve the current setting first
  8624. ret = ScGetHub(ps->Rpc, &t);
  8625. if (ret != ERR_NO_ERROR)
  8626. {
  8627. // An error has occured
  8628. CmdPrintError(c, ret);
  8629. FreeParamValueList(o);
  8630. return ret;
  8631. }
  8632. // Change the settings
  8633. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8634. t.HubType = HUB_TYPE_FARM_DYNAMIC;
  8635. // Write
  8636. ret = ScSetHub(ps->Rpc, &t);
  8637. if (ret != ERR_NO_ERROR)
  8638. {
  8639. // An error has occured
  8640. CmdPrintError(c, ret);
  8641. FreeParamValueList(o);
  8642. return ret;
  8643. }
  8644. FreeParamValueList(o);
  8645. return 0;
  8646. }
  8647. // Get the list of Virtual HUB
  8648. UINT PsHubList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8649. {
  8650. LIST *o;
  8651. PS *ps = (PS *)param;
  8652. UINT ret = 0;
  8653. RPC_ENUM_HUB t;
  8654. UINT i;
  8655. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  8656. if (o == NULL)
  8657. {
  8658. return ERR_INVALID_PARAMETER;
  8659. }
  8660. Zero(&t, sizeof(t));
  8661. // RPC call
  8662. ret = ScEnumHub(ps->Rpc, &t);
  8663. if (ret != ERR_NO_ERROR)
  8664. {
  8665. // An error has occured
  8666. CmdPrintError(c, ret);
  8667. FreeParamValueList(o);
  8668. return ret;
  8669. }
  8670. else
  8671. {
  8672. CT *ct = CtNew();
  8673. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_1"), false);
  8674. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_2"), false);
  8675. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_3"), false);
  8676. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_4"), false);
  8677. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_5"), false);
  8678. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_6"), false);
  8679. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_7"), false);
  8680. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_8"), false);
  8681. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_9"), false);
  8682. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_10"), false);
  8683. CtInsertColumn(ct, _UU("SM_HUB_COLUMN_11"), false);
  8684. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_6"), false);
  8685. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_7"), false);
  8686. for (i = 0;i < t.NumHub;i++)
  8687. {
  8688. RPC_ENUM_HUB_ITEM *e = &t.Hubs[i];
  8689. wchar_t name[MAX_HUBNAME_LEN + 1];
  8690. wchar_t s1[64], s2[64], s3[64], s4[64], s5[64];
  8691. wchar_t s6[64], s7[128], s8[128];
  8692. wchar_t s9[64], s10[64];
  8693. UniToStru(s1, e->NumUsers);
  8694. UniToStru(s2, e->NumGroups);
  8695. UniToStru(s3, e->NumSessions);
  8696. UniToStru(s4, e->NumMacTables);
  8697. UniToStru(s5, e->NumIpTables);
  8698. UniToStru(s6, e->NumLogin);
  8699. if (e->LastLoginTime != 0)
  8700. {
  8701. GetDateTimeStr64Uni(s7, sizeof(s7), SystemToLocal64(e->LastLoginTime));
  8702. }
  8703. else
  8704. {
  8705. UniStrCpy(s7, sizeof(s7), _UU("COMMON_UNKNOWN"));
  8706. }
  8707. if (e->LastCommTime != 0)
  8708. {
  8709. GetDateTimeStr64Uni(s8, sizeof(s8), SystemToLocal64(e->LastCommTime));
  8710. }
  8711. else
  8712. {
  8713. UniStrCpy(s8, sizeof(s8), _UU("COMMON_UNKNOWN"));
  8714. }
  8715. if (e->IsTrafficFilled == false)
  8716. {
  8717. UniStrCpy(s9, sizeof(s9), _UU("CM_ST_NONE"));
  8718. UniStrCpy(s10, sizeof(s10), _UU("CM_ST_NONE"));
  8719. }
  8720. else
  8721. {
  8722. UniToStr3(s9, sizeof(s9),
  8723. e->Traffic.Recv.BroadcastBytes + e->Traffic.Recv.UnicastBytes +
  8724. e->Traffic.Send.BroadcastBytes + e->Traffic.Send.UnicastBytes);
  8725. UniToStr3(s10, sizeof(s10),
  8726. e->Traffic.Recv.BroadcastCount + e->Traffic.Recv.UnicastCount +
  8727. e->Traffic.Send.BroadcastCount + e->Traffic.Send.UnicastCount);
  8728. }
  8729. StrToUni(name, sizeof(name), e->HubName);
  8730. CtInsert(ct,
  8731. name,
  8732. e->Online ? _UU("SM_HUB_ONLINE") : _UU("SM_HUB_OFFLINE"),
  8733. GetHubTypeStr(e->HubType),
  8734. s1, s2, s3, s4, s5, s6, s7, s8, s9, s10);
  8735. }
  8736. CtFreeEx(ct, c, true);
  8737. }
  8738. FreeRpcEnumHub(&t);
  8739. FreeParamValueList(o);
  8740. return 0;
  8741. }
  8742. // Select a Virtual HUB to manage
  8743. UINT PsHub(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8744. {
  8745. LIST *o;
  8746. PS *ps = (PS *)param;
  8747. UINT ret = 0;
  8748. RPC_HUB_STATUS t;
  8749. // Parameter list that can be specified
  8750. PARAM args[] =
  8751. {
  8752. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  8753. {"[name]", NULL, NULL, NULL, NULL},
  8754. };
  8755. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8756. if (o == NULL)
  8757. {
  8758. return ERR_INVALID_PARAMETER;
  8759. }
  8760. if (IsEmptyStr(GetParamStr(o, "[name]")) == false)
  8761. {
  8762. wchar_t tmp[MAX_SIZE];
  8763. Zero(&t, sizeof(t));
  8764. // Examine whether the specified Virtual HUB is accessible
  8765. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "[name]"));
  8766. // RPC call
  8767. ret = ScGetHubStatus(ps->Rpc, &t);
  8768. if (ret != ERR_NO_ERROR)
  8769. {
  8770. // An error has occured
  8771. CmdPrintError(c, ret);
  8772. FreeParamValueList(o);
  8773. return ret;
  8774. }
  8775. // Change the selection
  8776. if (ps->HubName != NULL)
  8777. {
  8778. Free(ps->HubName);
  8779. }
  8780. ps->HubName = CopyStr(t.HubName);
  8781. UniFormat(tmp, sizeof(tmp), _UU("CMD_Hub_Selected"), t.HubName);
  8782. c->Write(c, tmp);
  8783. }
  8784. else
  8785. {
  8786. // Deselect
  8787. if (ps->HubName != NULL)
  8788. {
  8789. c->Write(c, _UU("CMD_Hub_Unselected"));
  8790. Free(ps->HubName);
  8791. }
  8792. ps->HubName = NULL;
  8793. }
  8794. FreeParamValueList(o);
  8795. return 0;
  8796. }
  8797. // Set the Virtual HUB to online
  8798. UINT PsOnline(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8799. {
  8800. LIST *o;
  8801. PS *ps = (PS *)param;
  8802. UINT ret = 0;
  8803. RPC_SET_HUB_ONLINE t;
  8804. // If virtual HUB is not selected, it's an error
  8805. if (ps->HubName == NULL)
  8806. {
  8807. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  8808. return ERR_INVALID_PARAMETER;
  8809. }
  8810. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  8811. if (o == NULL)
  8812. {
  8813. return ERR_INVALID_PARAMETER;
  8814. }
  8815. Zero(&t, sizeof(t));
  8816. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  8817. t.Online = true;
  8818. // RPC call
  8819. ret = ScSetHubOnline(ps->Rpc, &t);
  8820. if (ret != ERR_NO_ERROR)
  8821. {
  8822. // An error has occured
  8823. CmdPrintError(c, ret);
  8824. FreeParamValueList(o);
  8825. return ret;
  8826. }
  8827. FreeParamValueList(o);
  8828. return 0;
  8829. }
  8830. // Set the Virtual HUB to offline
  8831. UINT PsOffline(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8832. {
  8833. LIST *o;
  8834. PS *ps = (PS *)param;
  8835. UINT ret = 0;
  8836. RPC_SET_HUB_ONLINE t;
  8837. // If virtual HUB is not selected, it's an error
  8838. if (ps->HubName == NULL)
  8839. {
  8840. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  8841. return ERR_INVALID_PARAMETER;
  8842. }
  8843. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  8844. if (o == NULL)
  8845. {
  8846. return ERR_INVALID_PARAMETER;
  8847. }
  8848. Zero(&t, sizeof(t));
  8849. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  8850. t.Online = false;
  8851. // RPC call
  8852. ret = ScSetHubOnline(ps->Rpc, &t);
  8853. if (ret != ERR_NO_ERROR)
  8854. {
  8855. // An error has occured
  8856. CmdPrintError(c, ret);
  8857. FreeParamValueList(o);
  8858. return ret;
  8859. }
  8860. FreeParamValueList(o);
  8861. return 0;
  8862. }
  8863. // Set the maximum number of concurrent connecting sessions of the Virtual HUB
  8864. UINT PsSetMaxSession(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8865. {
  8866. LIST *o;
  8867. PS *ps = (PS *)param;
  8868. UINT ret = 0;
  8869. RPC_CREATE_HUB t;
  8870. // Parameter list that can be specified
  8871. PARAM args[] =
  8872. {
  8873. {"[max_session]", CmdPrompt, _UU("CMD_SetMaxSession_Prompt"), CmdEvalNotEmpty, NULL},
  8874. };
  8875. // If virtual HUB is not selected, it's an error
  8876. if (ps->HubName == NULL)
  8877. {
  8878. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  8879. return ERR_INVALID_PARAMETER;
  8880. }
  8881. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8882. if (o == NULL)
  8883. {
  8884. return ERR_INVALID_PARAMETER;
  8885. }
  8886. // Get current settings of Virtual HUB
  8887. Zero(&t, sizeof(t));
  8888. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  8889. ret = ScGetHub(ps->Rpc, &t);
  8890. if (ret != ERR_NO_ERROR)
  8891. {
  8892. // An error has occured
  8893. CmdPrintError(c, ret);
  8894. FreeParamValueList(o);
  8895. return ret;
  8896. }
  8897. t.HubOption.MaxSession = GetParamInt(o, "[max_session]");
  8898. // Write the configuration of Virtual HUB
  8899. ret = ScSetHub(ps->Rpc, &t);
  8900. if (ret != ERR_NO_ERROR)
  8901. {
  8902. // An error has occured
  8903. CmdPrintError(c, ret);
  8904. FreeParamValueList(o);
  8905. return ret;
  8906. }
  8907. FreeParamValueList(o);
  8908. return 0;
  8909. }
  8910. // Set the administrative password of the Virtual HUB
  8911. UINT PsSetHubPassword(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8912. {
  8913. LIST *o;
  8914. PS *ps = (PS *)param;
  8915. UINT ret = 0;
  8916. RPC_CREATE_HUB t;
  8917. char *pw;
  8918. // Parameter list that can be specified
  8919. PARAM args[] =
  8920. {
  8921. {"[password]", CmdPromptChoosePassword, NULL, NULL, NULL},
  8922. };
  8923. // If virtual HUB is not selected, it's an error
  8924. if (ps->HubName == NULL)
  8925. {
  8926. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  8927. return ERR_INVALID_PARAMETER;
  8928. }
  8929. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  8930. if (o == NULL)
  8931. {
  8932. return ERR_INVALID_PARAMETER;
  8933. }
  8934. // Get current settings of Virtual HUB
  8935. Zero(&t, sizeof(t));
  8936. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  8937. ret = ScGetHub(ps->Rpc, &t);
  8938. if (ret != ERR_NO_ERROR)
  8939. {
  8940. // An error has occured
  8941. CmdPrintError(c, ret);
  8942. FreeParamValueList(o);
  8943. return ret;
  8944. }
  8945. // Change the settings
  8946. pw = GetParamStr(o, "[password]");
  8947. HashPassword(t.SecurePassword, ADMINISTRATOR_USERNAME, pw);
  8948. Hash(t.HashedPassword, pw, StrLen(pw), true);
  8949. // Write the configuration of Virtual HUB
  8950. ret = ScSetHub(ps->Rpc, &t);
  8951. if (ret != ERR_NO_ERROR)
  8952. {
  8953. // An error has occured
  8954. CmdPrintError(c, ret);
  8955. FreeParamValueList(o);
  8956. return ret;
  8957. }
  8958. FreeParamValueList(o);
  8959. return 0;
  8960. }
  8961. // Set the Virtual HUB to permit to be enumerated for anonymous users
  8962. UINT PsSetEnumAllow(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  8963. {
  8964. LIST *o;
  8965. PS *ps = (PS *)param;
  8966. UINT ret = 0;
  8967. RPC_CREATE_HUB t;
  8968. // If virtual HUB is not selected, it's an error
  8969. if (ps->HubName == NULL)
  8970. {
  8971. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  8972. return ERR_INVALID_PARAMETER;
  8973. }
  8974. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  8975. if (o == NULL)
  8976. {
  8977. return ERR_INVALID_PARAMETER;
  8978. }
  8979. // Get current settings of Virtual HUB
  8980. Zero(&t, sizeof(t));
  8981. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  8982. ret = ScGetHub(ps->Rpc, &t);
  8983. if (ret != ERR_NO_ERROR)
  8984. {
  8985. // An error has occured
  8986. CmdPrintError(c, ret);
  8987. FreeParamValueList(o);
  8988. return ret;
  8989. }
  8990. t.HubOption.NoEnum = false;
  8991. // Write the configuration of Virtual HUB
  8992. ret = ScSetHub(ps->Rpc, &t);
  8993. if (ret != ERR_NO_ERROR)
  8994. {
  8995. // An error has occured
  8996. CmdPrintError(c, ret);
  8997. FreeParamValueList(o);
  8998. return ret;
  8999. }
  9000. FreeParamValueList(o);
  9001. return 0;
  9002. }
  9003. // Set the Virtual HUB to deny to be enumerated for anonymous users
  9004. UINT PsSetEnumDeny(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9005. {
  9006. LIST *o;
  9007. PS *ps = (PS *)param;
  9008. UINT ret = 0;
  9009. RPC_CREATE_HUB t;
  9010. // If virtual HUB is not selected, it's an error
  9011. if (ps->HubName == NULL)
  9012. {
  9013. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9014. return ERR_INVALID_PARAMETER;
  9015. }
  9016. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  9017. if (o == NULL)
  9018. {
  9019. return ERR_INVALID_PARAMETER;
  9020. }
  9021. // Get current settings of Virtual HUB
  9022. Zero(&t, sizeof(t));
  9023. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9024. ret = ScGetHub(ps->Rpc, &t);
  9025. if (ret != ERR_NO_ERROR)
  9026. {
  9027. // An error has occured
  9028. CmdPrintError(c, ret);
  9029. FreeParamValueList(o);
  9030. return ret;
  9031. }
  9032. t.HubOption.NoEnum = true;
  9033. // Write the configuration of Virtual HUB
  9034. ret = ScSetHub(ps->Rpc, &t);
  9035. if (ret != ERR_NO_ERROR)
  9036. {
  9037. // An error has occured
  9038. CmdPrintError(c, ret);
  9039. FreeParamValueList(o);
  9040. return ret;
  9041. }
  9042. FreeParamValueList(o);
  9043. return 0;
  9044. }
  9045. // Get the option settings for the virtual HUB
  9046. UINT PsOptionsGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9047. {
  9048. LIST *o;
  9049. PS *ps = (PS *)param;
  9050. UINT ret = 0;
  9051. RPC_CREATE_HUB t;
  9052. // If virtual HUB is not selected, it's an error
  9053. if (ps->HubName == NULL)
  9054. {
  9055. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9056. return ERR_INVALID_PARAMETER;
  9057. }
  9058. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  9059. if (o == NULL)
  9060. {
  9061. return ERR_INVALID_PARAMETER;
  9062. }
  9063. Zero(&t, sizeof(t));
  9064. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9065. // RPC call
  9066. ret = ScGetHub(ps->Rpc, &t);
  9067. if (ret != ERR_NO_ERROR)
  9068. {
  9069. // An error has occured
  9070. CmdPrintError(c, ret);
  9071. FreeParamValueList(o);
  9072. return ret;
  9073. }
  9074. else
  9075. {
  9076. CT *ct;
  9077. wchar_t tmp[MAX_SIZE];
  9078. UniFormat(tmp, sizeof(tmp), _UU("CMD_OptionsGet_TITLE"), ps->HubName);
  9079. c->Write(c, tmp);
  9080. // Display settings
  9081. ct = CtNewStandard();
  9082. CtInsert(ct, _UU("CMD_OptionsGet_ENUM"),
  9083. t.HubOption.NoEnum ? _UU("CMD_MSG_DENY") : _UU("CMD_MSG_ALLOW"));
  9084. if (t.HubOption.MaxSession == 0)
  9085. {
  9086. UniStrCpy(tmp, sizeof(tmp), _UU("CMD_MSG_INFINITE"));
  9087. }
  9088. else
  9089. {
  9090. UniToStru(tmp, t.HubOption.MaxSession);
  9091. }
  9092. CtInsert(ct, _UU("CMD_OptionsGet_MAXSESSIONS"), tmp);
  9093. CtInsert(ct, _UU("CMD_OptionsGet_STATUS"), t.Online ? _UU("SM_HUB_ONLINE") : _UU("SM_HUB_OFFLINE"));
  9094. CtInsert(ct, _UU("CMD_OptionsGet_TYPE"), GetHubTypeStr(t.HubType));
  9095. CtFree(ct, c);
  9096. }
  9097. FreeParamValueList(o);
  9098. return 0;
  9099. }
  9100. // Setting the Radius server to use for user authentication
  9101. UINT PsRadiusServerSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9102. {
  9103. LIST *o;
  9104. PS *ps = (PS *)param;
  9105. UINT ret = 0;
  9106. RPC_RADIUS t;
  9107. char *host;
  9108. UINT port;
  9109. // Parameter list that can be specified
  9110. CMD_EVAL_MIN_MAX minmax =
  9111. {
  9112. "CMD_RadiusServerSet_EVAL_NUMINTERVAL", RADIUS_RETRY_INTERVAL, RADIUS_RETRY_TIMEOUT,
  9113. };
  9114. PARAM args[] =
  9115. {
  9116. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  9117. {"[server_name:port]", CmdPrompt, _UU("CMD_RadiusServerSet_Prompt_Host"), CmdEvalNotEmpty, NULL},
  9118. {"SECRET", CmdPromptChoosePassword, _UU("CMD_RadiusServerSet_Prompt_Secret"), NULL, NULL},
  9119. {"RETRY_INTERVAL", CmdPrompt, _UU("CMD_RadiusServerSet_Prompt_RetryInterval"), CmdEvalMinMax, &minmax},
  9120. };
  9121. // If virtual HUB is not selected, it's an error
  9122. if (ps->HubName == NULL)
  9123. {
  9124. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9125. return ERR_INVALID_PARAMETER;
  9126. }
  9127. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9128. if (o == NULL)
  9129. {
  9130. return ERR_INVALID_PARAMETER;
  9131. }
  9132. if (ParseHostPort(GetParamStr(o, "[server_name:port]"), &host, &port, 1812))
  9133. {
  9134. Zero(&t, sizeof(t));
  9135. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9136. t.RadiusPort = port;
  9137. StrCpy(t.RadiusServerName, sizeof(t.RadiusServerName), host);
  9138. StrCpy(t.RadiusSecret, sizeof(t.RadiusSecret), GetParamStr(o, "SECRET"));
  9139. t.RadiusRetryInterval = GetParamInt(o, "RETRY_INTERVAL");
  9140. Free(host);
  9141. // RPC call
  9142. ret = ScSetHubRadius(ps->Rpc, &t);
  9143. if (ret != ERR_NO_ERROR)
  9144. {
  9145. // An error has occured
  9146. CmdPrintError(c, ret);
  9147. FreeParamValueList(o);
  9148. return ret;
  9149. }
  9150. }
  9151. FreeParamValueList(o);
  9152. return 0;
  9153. }
  9154. // Delete the Radius server configuration to be used for user authentication
  9155. UINT PsRadiusServerDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9156. {
  9157. LIST *o;
  9158. PS *ps = (PS *)param;
  9159. UINT ret = 0;
  9160. RPC_RADIUS t;
  9161. // If virtual HUB is not selected, it's an error
  9162. if (ps->HubName == NULL)
  9163. {
  9164. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9165. return ERR_INVALID_PARAMETER;
  9166. }
  9167. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  9168. if (o == NULL)
  9169. {
  9170. return ERR_INVALID_PARAMETER;
  9171. }
  9172. Zero(&t, sizeof(t));
  9173. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9174. t.RadiusPort = 1812;
  9175. // RPC call
  9176. ret = ScSetHubRadius(ps->Rpc, &t);
  9177. if (ret != ERR_NO_ERROR)
  9178. {
  9179. // An error has occured
  9180. CmdPrintError(c, ret);
  9181. FreeParamValueList(o);
  9182. return ret;
  9183. }
  9184. FreeParamValueList(o);
  9185. return 0;
  9186. }
  9187. // Get the Radius server settings to use for user authentication
  9188. UINT PsRadiusServerGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9189. {
  9190. LIST *o;
  9191. PS *ps = (PS *)param;
  9192. UINT ret = 0;
  9193. RPC_RADIUS t;
  9194. // If virtual HUB is not selected, it's an error
  9195. if (ps->HubName == NULL)
  9196. {
  9197. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9198. return ERR_INVALID_PARAMETER;
  9199. }
  9200. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  9201. if (o == NULL)
  9202. {
  9203. return ERR_INVALID_PARAMETER;
  9204. }
  9205. Zero(&t, sizeof(t));
  9206. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9207. // RPC call
  9208. ret = ScGetHubRadius(ps->Rpc, &t);
  9209. if (ret != ERR_NO_ERROR)
  9210. {
  9211. // An error has occured
  9212. CmdPrintError(c, ret);
  9213. FreeParamValueList(o);
  9214. return ret;
  9215. }
  9216. else
  9217. {
  9218. CT *ct;
  9219. wchar_t tmp[MAX_SIZE];
  9220. ct = CtNewStandard();
  9221. if (IsEmptyStr(t.RadiusServerName))
  9222. {
  9223. CtInsert(ct, _UU("CMD_RadiusServerGet_STATUS"), _UU("CMD_MSG_DISABLE"));
  9224. }
  9225. else
  9226. {
  9227. CtInsert(ct, _UU("CMD_RadiusServerGet_STATUS"), _UU("CMD_MSG_ENABLE"));
  9228. StrToUni(tmp, sizeof(tmp), t.RadiusServerName);
  9229. CtInsert(ct, _UU("CMD_RadiusServerGet_HOST"), tmp);
  9230. UniToStri(tmp, t.RadiusPort);
  9231. CtInsert(ct, _UU("CMD_RadiusServerGet_PORT"), tmp);
  9232. StrToUni(tmp, sizeof(tmp), t.RadiusSecret);
  9233. CtInsert(ct, _UU("CMD_RadiusServerGet_SECRET"), tmp);
  9234. UniToStri(tmp, t.RadiusRetryInterval);
  9235. CtInsert(ct, _UU("CMD_RadiusServerGet_RetryInterval"), tmp);
  9236. }
  9237. CtFree(ct, c);
  9238. }
  9239. FreeParamValueList(o);
  9240. return 0;
  9241. }
  9242. // Get the current status of the Virtual HUB
  9243. UINT PsStatusGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9244. {
  9245. LIST *o;
  9246. PS *ps = (PS *)param;
  9247. UINT ret = 0;
  9248. RPC_HUB_STATUS t;
  9249. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  9250. if (o == NULL)
  9251. {
  9252. return ERR_INVALID_PARAMETER;
  9253. }
  9254. // If virtual HUB is not selected, it's an error
  9255. if (ps->HubName == NULL)
  9256. {
  9257. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9258. return ERR_INVALID_PARAMETER;
  9259. }
  9260. Zero(&t, sizeof(t));
  9261. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9262. // RPC call
  9263. ret = ScGetHubStatus(ps->Rpc, &t);
  9264. if (ret != ERR_NO_ERROR)
  9265. {
  9266. // An error has occured
  9267. CmdPrintError(c, ret);
  9268. FreeParamValueList(o);
  9269. return ret;
  9270. }
  9271. else
  9272. {
  9273. CT *ct = CtNewStandard();
  9274. wchar_t *s;
  9275. wchar_t tmp[MAX_SIZE];
  9276. // HUB name
  9277. s = CopyStrToUni(t.HubName);
  9278. CtInsert(ct, _UU("SM_HUB_STATUS_HUBNAME"), s);
  9279. Free(s);
  9280. // Online
  9281. CtInsert(ct, _UU("SM_HUB_STATUS_ONLINE"),
  9282. t.Online ? _UU("SM_HUB_ONLINE") : _UU("SM_HUB_OFFLINE"));
  9283. // Type of HUB
  9284. CtInsert(ct, _UU("SM_HUB_TYPE"),
  9285. GetHubTypeStr(t.HubType));
  9286. if (t.HubType == HUB_TYPE_STANDALONE)
  9287. {
  9288. // Enable / Disable the SecureNAT
  9289. CtInsert(ct, _UU("SM_HUB_SECURE_NAT"),
  9290. t.SecureNATEnabled ? _UU("SM_HUB_SECURE_NAT_YES") : _UU("SM_HUB_SECURE_NAT_NO"));
  9291. }
  9292. // Other values
  9293. UniToStru(tmp, t.NumSessions);
  9294. CtInsert(ct, _UU("SM_HUB_NUM_SESSIONS"), tmp);
  9295. if (t.NumSessionsClient != 0 || t.NumSessionsBridge != 0)
  9296. {
  9297. UniToStru(tmp, t.NumSessionsClient);
  9298. CtInsert(ct, _UU("SM_HUB_NUM_SESSIONS_CLIENT"), tmp);
  9299. UniToStru(tmp, t.NumSessionsBridge);
  9300. CtInsert(ct, _UU("SM_HUB_NUM_SESSIONS_BRIDGE"), tmp);
  9301. }
  9302. UniToStru(tmp, t.NumAccessLists);
  9303. CtInsert(ct, _UU("SM_HUB_NUM_ACCESSES"), tmp);
  9304. UniToStru(tmp, t.NumUsers);
  9305. CtInsert(ct, _UU("SM_HUB_NUM_USERS"), tmp);
  9306. UniToStru(tmp, t.NumGroups);
  9307. CtInsert(ct, _UU("SM_HUB_NUM_GROUPS"), tmp);
  9308. UniToStru(tmp, t.NumMacTables);
  9309. CtInsert(ct, _UU("SM_HUB_NUM_MAC_TABLES"), tmp);
  9310. UniToStru(tmp, t.NumIpTables);
  9311. CtInsert(ct, _UU("SM_HUB_NUM_IP_TABLES"), tmp);
  9312. // Usage status
  9313. UniToStru(tmp, t.NumLogin);
  9314. CtInsert(ct, _UU("SM_HUB_NUM_LOGIN"), tmp);
  9315. if (t.LastLoginTime != 0)
  9316. {
  9317. GetDateTimeStr64Uni(tmp, sizeof(tmp), SystemToLocal64(t.LastLoginTime));
  9318. }
  9319. else
  9320. {
  9321. UniStrCpy(tmp, sizeof(tmp), _UU("COMMON_UNKNOWN"));
  9322. }
  9323. CtInsert(ct, _UU("SM_HUB_LAST_LOGIN_TIME"), tmp);
  9324. if (t.LastCommTime != 0)
  9325. {
  9326. GetDateTimeStr64Uni(tmp, sizeof(tmp), SystemToLocal64(t.LastCommTime));
  9327. }
  9328. else
  9329. {
  9330. UniStrCpy(tmp, sizeof(tmp), _UU("COMMON_UNKNOWN"));
  9331. }
  9332. CtInsert(ct, _UU("SM_HUB_LAST_COMM_TIME"), tmp);
  9333. if (t.CreatedTime != 0)
  9334. {
  9335. GetDateTimeStr64Uni(tmp, sizeof(tmp), SystemToLocal64(t.CreatedTime));
  9336. }
  9337. else
  9338. {
  9339. UniStrCpy(tmp, sizeof(tmp), _UU("COMMON_UNKNOWN"));
  9340. }
  9341. CtInsert(ct, _UU("SM_HUB_CREATED_TIME"), tmp);
  9342. // Traffic information
  9343. CmdInsertTrafficInfo(ct, &t.Traffic);
  9344. CtFree(ct, c);
  9345. }
  9346. FreeParamValueList(o);
  9347. return 0;
  9348. }
  9349. // Get the log switching string
  9350. wchar_t *GetLogSwitchStr(UINT i)
  9351. {
  9352. char tmp[64];
  9353. Format(tmp, sizeof(tmp), "SM_LOG_SWITCH_%u", i);
  9354. return _UU(tmp);
  9355. }
  9356. // Get the packet log name string
  9357. wchar_t *GetPacketLogNameStr(UINT i)
  9358. {
  9359. char tmp[64];
  9360. Format(tmp, sizeof(tmp), "CMD_Log_%u", i);
  9361. return _UU(tmp);
  9362. }
  9363. // Get the log storage settings for the virtual HUB
  9364. UINT PsLogGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9365. {
  9366. LIST *o;
  9367. PS *ps = (PS *)param;
  9368. UINT ret = 0;
  9369. RPC_HUB_LOG t;
  9370. // If virtual HUB is not selected, it's an error
  9371. if (ps->HubName == NULL)
  9372. {
  9373. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9374. return ERR_INVALID_PARAMETER;
  9375. }
  9376. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  9377. if (o == NULL)
  9378. {
  9379. return ERR_INVALID_PARAMETER;
  9380. }
  9381. Zero(&t, sizeof(t));
  9382. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9383. // RPC call
  9384. ret = ScGetHubLog(ps->Rpc, &t);
  9385. if (ret != ERR_NO_ERROR)
  9386. {
  9387. // An error has occured
  9388. CmdPrintError(c, ret);
  9389. FreeParamValueList(o);
  9390. return ret;
  9391. }
  9392. else
  9393. {
  9394. CT *ct = CtNewStandard();
  9395. CtInsert(ct, _UU("CMD_Log_SecurityLog"),
  9396. t.LogSetting.SaveSecurityLog ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  9397. if (t.LogSetting.SaveSecurityLog)
  9398. {
  9399. CtInsert(ct, _UU("CMD_Log_SwitchType"), GetLogSwitchStr(t.LogSetting.SecurityLogSwitchType));
  9400. }
  9401. CtInsert(ct, L"", L"");
  9402. CtInsert(ct, _UU("CMD_Log_PacketLog"),
  9403. t.LogSetting.SavePacketLog ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  9404. if (t.LogSetting.SavePacketLog)
  9405. {
  9406. UINT i;
  9407. CtInsert(ct, _UU("CMD_Log_SwitchType"), GetLogSwitchStr(t.LogSetting.PacketLogSwitchType));
  9408. for (i = 0;i <= 7;i++)
  9409. {
  9410. wchar_t *tmp = NULL;
  9411. switch (t.LogSetting.PacketLogConfig[i])
  9412. {
  9413. case PACKET_LOG_NONE:
  9414. tmp = _UU("D_SM_LOG@B_PACKET_0_0");
  9415. break;
  9416. case PACKET_LOG_HEADER:
  9417. tmp = _UU("D_SM_LOG@B_PACKET_0_1");
  9418. break;
  9419. case PACKET_LOG_ALL:
  9420. tmp = _UU("D_SM_LOG@B_PACKET_0_2");
  9421. break;
  9422. }
  9423. CtInsert(ct, GetPacketLogNameStr(i),
  9424. tmp);
  9425. }
  9426. }
  9427. CtFree(ct, c);
  9428. }
  9429. FreeParamValueList(o);
  9430. return 0;
  9431. }
  9432. // LogEnable command
  9433. UINT PsLogEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9434. {
  9435. LIST *o;
  9436. PS *ps = (PS *)param;
  9437. UINT ret = 0;
  9438. RPC_HUB_LOG t;
  9439. bool packet_log = false;
  9440. char *tmp;
  9441. // Parameter list that can be specified
  9442. PARAM args[] =
  9443. {
  9444. {"[security|packet]", CmdPrompt, _UU("CMD_LogEnable_Prompt"), CmdEvalNotEmpty, NULL},
  9445. };
  9446. // If virtual HUB is not selected, it's an error
  9447. if (ps->HubName == NULL)
  9448. {
  9449. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9450. return ERR_INVALID_PARAMETER;
  9451. }
  9452. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9453. if (o == NULL)
  9454. {
  9455. return ERR_INVALID_PARAMETER;
  9456. }
  9457. tmp = GetParamStr(o, "[security|packet]");
  9458. if (StartWith(tmp, "p"))
  9459. {
  9460. packet_log = true;
  9461. }
  9462. else if (StartWith(tmp, "s") == false)
  9463. {
  9464. c->Write(c, _UU("CMD_LogEnable_Prompt_Error"));
  9465. FreeParamValueList(o);
  9466. return ret;
  9467. }
  9468. Zero(&t, sizeof(t));
  9469. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9470. // RPC call
  9471. ret = ScGetHubLog(ps->Rpc, &t);
  9472. if (ret != ERR_NO_ERROR)
  9473. {
  9474. // An error has occured
  9475. CmdPrintError(c, ret);
  9476. FreeParamValueList(o);
  9477. return ret;
  9478. }
  9479. if (packet_log == false)
  9480. {
  9481. t.LogSetting.SaveSecurityLog = true;
  9482. }
  9483. else
  9484. {
  9485. t.LogSetting.SavePacketLog = true;
  9486. }
  9487. // RPC call
  9488. ret = ScSetHubLog(ps->Rpc, &t);
  9489. if (ret != ERR_NO_ERROR)
  9490. {
  9491. // An error has occured
  9492. CmdPrintError(c, ret);
  9493. FreeParamValueList(o);
  9494. return ret;
  9495. }
  9496. FreeParamValueList(o);
  9497. return 0;
  9498. }
  9499. // Disable the packet log or the security log
  9500. UINT PsLogDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9501. {
  9502. LIST *o;
  9503. PS *ps = (PS *)param;
  9504. UINT ret = 0;
  9505. RPC_HUB_LOG t;
  9506. bool packet_log = false;
  9507. char *tmp;
  9508. // Parameter list that can be specified
  9509. PARAM args[] =
  9510. {
  9511. {"[security|packet]", CmdPrompt, _UU("CMD_LogEnable_Prompt"), CmdEvalNotEmpty, NULL},
  9512. };
  9513. // If virtual HUB is not selected, it's an error
  9514. if (ps->HubName == NULL)
  9515. {
  9516. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9517. return ERR_INVALID_PARAMETER;
  9518. }
  9519. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9520. if (o == NULL)
  9521. {
  9522. return ERR_INVALID_PARAMETER;
  9523. }
  9524. tmp = GetParamStr(o, "[security|packet]");
  9525. if (StartWith(tmp, "p"))
  9526. {
  9527. packet_log = true;
  9528. }
  9529. else if (StartWith(tmp, "s") == false)
  9530. {
  9531. c->Write(c, _UU("CMD_LogEnable_Prompt_Error"));
  9532. FreeParamValueList(o);
  9533. return ERR_INVALID_PARAMETER;
  9534. }
  9535. Zero(&t, sizeof(t));
  9536. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9537. // RPC call
  9538. ret = ScGetHubLog(ps->Rpc, &t);
  9539. if (ret != ERR_NO_ERROR)
  9540. {
  9541. // An error has occured
  9542. CmdPrintError(c, ret);
  9543. FreeParamValueList(o);
  9544. return ret;
  9545. }
  9546. if (packet_log == false)
  9547. {
  9548. t.LogSetting.SaveSecurityLog = false;
  9549. }
  9550. else
  9551. {
  9552. t.LogSetting.SavePacketLog = false;
  9553. }
  9554. // RPC call
  9555. ret = ScSetHubLog(ps->Rpc, &t);
  9556. if (ret != ERR_NO_ERROR)
  9557. {
  9558. // An error has occured
  9559. CmdPrintError(c, ret);
  9560. FreeParamValueList(o);
  9561. return ret;
  9562. }
  9563. FreeParamValueList(o);
  9564. return 0;
  9565. }
  9566. // Convert the string to log switching type
  9567. UINT StrToLogSwitchType(char *str)
  9568. {
  9569. UINT ret = INFINITE;
  9570. // Validate arguments
  9571. if (str == NULL)
  9572. {
  9573. return INFINITE;
  9574. }
  9575. if (IsEmptyStr(str) || StartWith("none", str))
  9576. {
  9577. ret = LOG_SWITCH_NO;
  9578. }
  9579. else if (StartWith("second", str))
  9580. {
  9581. ret = LOG_SWITCH_SECOND;
  9582. }
  9583. else if (StartWith("minute", str))
  9584. {
  9585. ret = LOG_SWITCH_MINUTE;
  9586. }
  9587. else if (StartWith("hour", str))
  9588. {
  9589. ret = LOG_SWITCH_HOUR;
  9590. }
  9591. else if (StartWith("day", str))
  9592. {
  9593. ret = LOG_SWITCH_DAY;
  9594. }
  9595. else if (StartWith("month", str))
  9596. {
  9597. ret = LOG_SWITCH_MONTH;
  9598. }
  9599. return ret;
  9600. }
  9601. // Set the switching period of the log file
  9602. UINT PsLogSwitchSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9603. {
  9604. LIST *o;
  9605. PS *ps = (PS *)param;
  9606. UINT ret = 0;
  9607. RPC_HUB_LOG t;
  9608. bool packet_log = false;
  9609. char *tmp;
  9610. UINT new_switch_type = 0;
  9611. // Parameter list that can be specified
  9612. PARAM args[] =
  9613. {
  9614. {"[security|packet]", CmdPrompt, _UU("CMD_LogEnable_Prompt"), CmdEvalNotEmpty, NULL},
  9615. {"SWITCH", CmdPrompt, _UU("CMD_LogSwitchSet_Prompt"), NULL, NULL},
  9616. };
  9617. // If virtual HUB is not selected, it's an error
  9618. if (ps->HubName == NULL)
  9619. {
  9620. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9621. return ERR_INVALID_PARAMETER;
  9622. }
  9623. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9624. if (o == NULL)
  9625. {
  9626. return ERR_INVALID_PARAMETER;
  9627. }
  9628. tmp = GetParamStr(o, "[security|packet]");
  9629. if (StartWith(tmp, "p"))
  9630. {
  9631. packet_log = true;
  9632. }
  9633. else if (StartWith(tmp, "s") == false)
  9634. {
  9635. c->Write(c, _UU("CMD_LogEnable_Prompt_Error"));
  9636. FreeParamValueList(o);
  9637. return ERR_INVALID_PARAMETER;
  9638. }
  9639. new_switch_type = StrToLogSwitchType(GetParamStr(o, "SWITCH"));
  9640. if (new_switch_type == INFINITE)
  9641. {
  9642. c->Write(c, _UU("CMD_LogEnable_Prompt_Error"));
  9643. FreeParamValueList(o);
  9644. return ERR_INVALID_PARAMETER;
  9645. }
  9646. Zero(&t, sizeof(t));
  9647. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9648. // RPC call
  9649. ret = ScGetHubLog(ps->Rpc, &t);
  9650. if (ret != ERR_NO_ERROR)
  9651. {
  9652. // An error has occured
  9653. CmdPrintError(c, ret);
  9654. FreeParamValueList(o);
  9655. return ret;
  9656. }
  9657. if (packet_log == false)
  9658. {
  9659. t.LogSetting.SecurityLogSwitchType = new_switch_type;
  9660. }
  9661. else
  9662. {
  9663. t.LogSetting.PacketLogSwitchType = new_switch_type;
  9664. }
  9665. // RPC call
  9666. ret = ScSetHubLog(ps->Rpc, &t);
  9667. if (ret != ERR_NO_ERROR)
  9668. {
  9669. // An error has occured
  9670. CmdPrintError(c, ret);
  9671. FreeParamValueList(o);
  9672. return ret;
  9673. }
  9674. FreeParamValueList(o);
  9675. return 0;
  9676. }
  9677. // Convert the type string of the packet log contents to an integer
  9678. UINT StrToPacketLogSaveInfoType(char *str)
  9679. {
  9680. UINT ret = INFINITE;
  9681. if (str == NULL)
  9682. {
  9683. return INFINITE;
  9684. }
  9685. if (StartWith("none", str) || IsEmptyStr(str))
  9686. {
  9687. ret = PACKET_LOG_NONE;
  9688. }
  9689. else if (StartWith("header", str))
  9690. {
  9691. ret = PACKET_LOG_HEADER;
  9692. }
  9693. else if (StartWith("full", str) || StartWith("all", str))
  9694. {
  9695. ret = PACKET_LOG_ALL;
  9696. }
  9697. return ret;
  9698. }
  9699. // Convert a packet type string of the packet log to an integer
  9700. UINT StrToPacketLogType(char *str)
  9701. {
  9702. UINT ret = INFINITE;
  9703. if (str == NULL || IsEmptyStr(str))
  9704. {
  9705. return INFINITE;
  9706. }
  9707. if (StartWith("tcpconn", str))
  9708. {
  9709. ret = PACKET_LOG_TCP_CONN;
  9710. }
  9711. else if (StartWith("tcpdata", str))
  9712. {
  9713. ret = PACKET_LOG_TCP;
  9714. }
  9715. else if (StartWith("dhcp", str))
  9716. {
  9717. ret = PACKET_LOG_DHCP;
  9718. }
  9719. else if (StartWith("udp", str))
  9720. {
  9721. ret = PACKET_LOG_UDP;
  9722. }
  9723. else if (StartWith("icmp", str))
  9724. {
  9725. ret = PACKET_LOG_ICMP;
  9726. }
  9727. else if (StartWith("ip", str))
  9728. {
  9729. ret = PACKET_LOG_IP;
  9730. }
  9731. else if (StartWith("arp", str))
  9732. {
  9733. ret = PACKET_LOG_ARP;
  9734. }
  9735. else if (StartWith("ethernet", str))
  9736. {
  9737. ret = PACKET_LOG_ETHERNET;
  9738. }
  9739. return ret;
  9740. }
  9741. // Set the detail level and type of packet to be stored in the packet log
  9742. UINT PsLogPacketSaveType(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9743. {
  9744. LIST *o;
  9745. PS *ps = (PS *)param;
  9746. UINT ret = 0;
  9747. RPC_HUB_LOG t;
  9748. bool packet_log = false;
  9749. UINT packet_type = INFINITE;
  9750. UINT packet_save_info_type = INFINITE;
  9751. // Parameter list that can be specified
  9752. PARAM args[] =
  9753. {
  9754. {"TYPE", CmdPrompt, _UU("CMD_LogPacketSaveType_Prompt_TYPE"), NULL, NULL},
  9755. {"SAVE", CmdPrompt, _UU("CMD_LogPacketSaveType_Prompt_SAVE"), NULL, NULL},
  9756. };
  9757. // If virtual HUB is not selected, it's an error
  9758. if (ps->HubName == NULL)
  9759. {
  9760. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9761. return ERR_INVALID_PARAMETER;
  9762. }
  9763. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9764. if (o == NULL)
  9765. {
  9766. return ERR_INVALID_PARAMETER;
  9767. }
  9768. packet_type = StrToPacketLogType(GetParamStr(o, "TYPE"));
  9769. packet_save_info_type = StrToPacketLogSaveInfoType(GetParamStr(o, "SAVE"));
  9770. if (packet_type == INFINITE || packet_save_info_type == INFINITE)
  9771. {
  9772. c->Write(c, _UU("CMD_LogEnable_Prompt_Error"));
  9773. FreeParamValueList(o);
  9774. return ERR_INVALID_PARAMETER;
  9775. }
  9776. Zero(&t, sizeof(t));
  9777. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9778. // RPC call
  9779. ret = ScGetHubLog(ps->Rpc, &t);
  9780. if (ret != ERR_NO_ERROR)
  9781. {
  9782. // An error has occured
  9783. CmdPrintError(c, ret);
  9784. FreeParamValueList(o);
  9785. return ret;
  9786. }
  9787. t.LogSetting.PacketLogConfig[packet_type] = packet_save_info_type;
  9788. // RPC call
  9789. ret = ScSetHubLog(ps->Rpc, &t);
  9790. if (ret != ERR_NO_ERROR)
  9791. {
  9792. // An error has occured
  9793. CmdPrintError(c, ret);
  9794. FreeParamValueList(o);
  9795. return ret;
  9796. }
  9797. FreeParamValueList(o);
  9798. return 0;
  9799. }
  9800. // Get the list of certificates of the trusted certification authority
  9801. UINT PsCAList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9802. {
  9803. LIST *o;
  9804. PS *ps = (PS *)param;
  9805. UINT ret = 0;
  9806. RPC_HUB_ENUM_CA t;
  9807. // If virtual HUB is not selected, it's an error
  9808. if (ps->HubName == NULL)
  9809. {
  9810. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9811. return ERR_INVALID_PARAMETER;
  9812. }
  9813. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  9814. if (o == NULL)
  9815. {
  9816. return ERR_INVALID_PARAMETER;
  9817. }
  9818. Zero(&t, sizeof(t));
  9819. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9820. // RPC call
  9821. ret = ScEnumCa(ps->Rpc, &t);
  9822. if (ret != ERR_NO_ERROR)
  9823. {
  9824. // An error has occured
  9825. CmdPrintError(c, ret);
  9826. FreeParamValueList(o);
  9827. return ret;
  9828. }
  9829. else
  9830. {
  9831. UINT i;
  9832. CT *ct = CtNewStandard();
  9833. for (i = 0;i < t.NumCa;i++)
  9834. {
  9835. wchar_t tmp[MAX_SIZE];
  9836. wchar_t tmp2[64];
  9837. RPC_HUB_ENUM_CA_ITEM *e = &t.Ca[i];
  9838. GetDateStrEx64(tmp, sizeof(tmp), SystemToLocal64(e->Expires), NULL);
  9839. UniToStru(tmp2, e->Key);
  9840. CtInsert(ct, _UU("CMD_CAList_COLUMN_ID"), tmp2);
  9841. CtInsert(ct, _UU("CM_CERT_COLUMN_1"), e->SubjectName);
  9842. CtInsert(ct, _UU("CM_CERT_COLUMN_2"), e->IssuerName);
  9843. CtInsert(ct, _UU("CM_CERT_COLUMN_3"), tmp);
  9844. if (i != (t.NumCa - 1))
  9845. {
  9846. CtInsert(ct, L"---", L"---");
  9847. }
  9848. }
  9849. CtFree(ct, c);
  9850. }
  9851. FreeRpcHubEnumCa(&t);
  9852. FreeParamValueList(o);
  9853. return 0;
  9854. }
  9855. // Add a certificate to the trusted certification authority
  9856. UINT PsCAAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9857. {
  9858. LIST *o;
  9859. PS *ps = (PS *)param;
  9860. UINT ret = 0;
  9861. RPC_HUB_ADD_CA t;
  9862. X *x;
  9863. // Parameter list that can be specified
  9864. PARAM args[] =
  9865. {
  9866. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  9867. {"[path]", CmdPrompt, _UU("CMD_CAAdd_PROMPT_PATH"), CmdEvalIsFile, NULL},
  9868. };
  9869. // If virtual HUB is not selected, it's an error
  9870. if (ps->HubName == NULL)
  9871. {
  9872. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9873. return ERR_INVALID_PARAMETER;
  9874. }
  9875. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9876. if (o == NULL)
  9877. {
  9878. return ERR_INVALID_PARAMETER;
  9879. }
  9880. x = FileToXW(GetParamUniStr(o, "[path]"));
  9881. if (x == NULL)
  9882. {
  9883. FreeParamValueList(o);
  9884. c->Write(c, _UU("CMD_MSG_LOAD_CERT_FAILED"));
  9885. return ERR_INVALID_PARAMETER;
  9886. }
  9887. Zero(&t, sizeof(t));
  9888. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9889. t.Cert = x;
  9890. // RPC call
  9891. ret = ScAddCa(ps->Rpc, &t);
  9892. if (ret != ERR_NO_ERROR)
  9893. {
  9894. // An error has occured
  9895. CmdPrintError(c, ret);
  9896. FreeParamValueList(o);
  9897. return ret;
  9898. }
  9899. FreeRpcHubAddCa(&t);
  9900. FreeParamValueList(o);
  9901. return 0;
  9902. }
  9903. // Delete the certificate of the trusted certification authority
  9904. UINT PsCADelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9905. {
  9906. LIST *o;
  9907. PS *ps = (PS *)param;
  9908. UINT ret = 0;
  9909. RPC_HUB_DELETE_CA t;
  9910. // Parameter list that can be specified
  9911. PARAM args[] =
  9912. {
  9913. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  9914. {"[id]", CmdPrompt, _UU("CMD_CADelete_PROMPT_ID"), CmdEvalNotEmpty, NULL},
  9915. };
  9916. // If virtual HUB is not selected, it's an error
  9917. if (ps->HubName == NULL)
  9918. {
  9919. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9920. return ERR_INVALID_PARAMETER;
  9921. }
  9922. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9923. if (o == NULL)
  9924. {
  9925. return ERR_INVALID_PARAMETER;
  9926. }
  9927. Zero(&t, sizeof(t));
  9928. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9929. t.Key = GetParamInt(o, "[id]");
  9930. // RPC call
  9931. ret = ScDeleteCa(ps->Rpc, &t);
  9932. if (ret != ERR_NO_ERROR)
  9933. {
  9934. // An error has occured
  9935. CmdPrintError(c, ret);
  9936. FreeParamValueList(o);
  9937. return ret;
  9938. }
  9939. FreeParamValueList(o);
  9940. return 0;
  9941. }
  9942. // Get the certificate of the trusted certification authority
  9943. UINT PsCAGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9944. {
  9945. LIST *o;
  9946. PS *ps = (PS *)param;
  9947. UINT ret = 0;
  9948. RPC_HUB_GET_CA t;
  9949. // Parameter list that can be specified
  9950. PARAM args[] =
  9951. {
  9952. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  9953. {"[id]", CmdPrompt, _UU("CMD_CAGet_PROMPT_ID"), CmdEvalNotEmpty, NULL},
  9954. {"SAVECERT", CmdPrompt, _UU("CMD_CAGet_PROMPT_SAVECERT"), CmdEvalNotEmpty, NULL},
  9955. };
  9956. // If virtual HUB is not selected, it's an error
  9957. if (ps->HubName == NULL)
  9958. {
  9959. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  9960. return ERR_INVALID_PARAMETER;
  9961. }
  9962. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  9963. if (o == NULL)
  9964. {
  9965. return ERR_INVALID_PARAMETER;
  9966. }
  9967. Zero(&t, sizeof(t));
  9968. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  9969. t.Key = GetParamInt(o, "[id]");
  9970. // RPC call
  9971. ret = ScGetCa(ps->Rpc, &t);
  9972. if (ret != ERR_NO_ERROR)
  9973. {
  9974. // An error has occured
  9975. CmdPrintError(c, ret);
  9976. FreeParamValueList(o);
  9977. return ret;
  9978. }
  9979. else
  9980. {
  9981. if (XToFileW(t.Cert, GetParamUniStr(o, "SAVECERT"), true))
  9982. {
  9983. // Success
  9984. }
  9985. else
  9986. {
  9987. ret = ERR_INTERNAL_ERROR;
  9988. c->Write(c, _UU("CMD_MSG_SAVE_CERT_FAILED"));
  9989. }
  9990. }
  9991. FreeRpcHubGetCa(&t);
  9992. FreeParamValueList(o);
  9993. return ret;
  9994. }
  9995. // Get the cascade connection list
  9996. UINT PsCascadeList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  9997. {
  9998. LIST *o;
  9999. PS *ps = (PS *)param;
  10000. UINT ret = 0;
  10001. RPC_ENUM_LINK t;
  10002. // If virtual HUB is not selected, it's an error
  10003. if (ps->HubName == NULL)
  10004. {
  10005. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10006. return ERR_INVALID_PARAMETER;
  10007. }
  10008. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  10009. if (o == NULL)
  10010. {
  10011. return ERR_INVALID_PARAMETER;
  10012. }
  10013. Zero(&t, sizeof(t));
  10014. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10015. // RPC call
  10016. ret = ScEnumLink(ps->Rpc, &t);
  10017. if (ret != ERR_NO_ERROR)
  10018. {
  10019. // An error has occured
  10020. CmdPrintError(c, ret);
  10021. FreeParamValueList(o);
  10022. return ret;
  10023. }
  10024. else
  10025. {
  10026. CT *ct = CtNew();
  10027. UINT i;
  10028. CtInsertColumn(ct, _UU("SM_LINK_COLUMN_1"), false);
  10029. CtInsertColumn(ct, _UU("SM_LINK_COLUMN_2"), false);
  10030. CtInsertColumn(ct, _UU("SM_LINK_COLUMN_3"), false);
  10031. CtInsertColumn(ct, _UU("SM_LINK_COLUMN_4"), false);
  10032. CtInsertColumn(ct, _UU("SM_LINK_COLUMN_5"), false);
  10033. for (i = 0;i < t.NumLink;i++)
  10034. {
  10035. RPC_ENUM_LINK_ITEM *e = &t.Links[i];
  10036. wchar_t tmp1[MAX_SIZE];
  10037. wchar_t tmp2[MAX_SIZE];
  10038. wchar_t tmp3[MAX_SIZE];
  10039. wchar_t tmp4[MAX_SIZE];
  10040. GetDateTimeStrEx64(tmp1, sizeof(tmp1), SystemToLocal64(e->ConnectedTime), NULL);
  10041. StrToUni(tmp2, sizeof(tmp2), e->Hostname);
  10042. StrToUni(tmp3, sizeof(tmp3), e->HubName);
  10043. if (e->Online == false)
  10044. {
  10045. UniStrCpy(tmp4, sizeof(tmp4), _UU("SM_LINK_STATUS_OFFLINE"));
  10046. }
  10047. else
  10048. {
  10049. if (e->Connected)
  10050. {
  10051. UniStrCpy(tmp4, sizeof(tmp4), _UU("SM_LINK_STATUS_ONLINE"));
  10052. }
  10053. else
  10054. {
  10055. if (e->LastError != 0)
  10056. {
  10057. UniFormat(tmp4, sizeof(tmp4), _UU("SM_LINK_STATUS_ERROR"), e->LastError, _E(e->LastError));
  10058. }
  10059. else
  10060. {
  10061. UniStrCpy(tmp4, sizeof(tmp4), _UU("SM_LINK_CONNECTING"));
  10062. }
  10063. }
  10064. }
  10065. CtInsert(ct, e->AccountName, tmp4, tmp1, tmp2, tmp3);
  10066. }
  10067. CtFreeEx(ct, c, true);
  10068. }
  10069. FreeRpcEnumLink(&t);
  10070. FreeParamValueList(o);
  10071. return 0;
  10072. }
  10073. // Creat a new cascade
  10074. UINT PsCascadeCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10075. {
  10076. LIST *o;
  10077. PS *ps = (PS *)param;
  10078. UINT ret = 0;
  10079. RPC_CREATE_LINK t;
  10080. char *host = NULL;
  10081. UINT port = 443;
  10082. // Parameter list that can be specified
  10083. PARAM args[] =
  10084. {
  10085. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10086. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10087. {"SERVER", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Server"), CmdEvalHostAndPort, NULL},
  10088. {"HUB", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Hub"), CmdEvalSafe, NULL},
  10089. {"USERNAME", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Username"), CmdEvalNotEmpty, NULL},
  10090. };
  10091. // If virtual HUB is not selected, it's an error
  10092. if (ps->HubName == NULL)
  10093. {
  10094. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10095. return ERR_INVALID_PARAMETER;
  10096. }
  10097. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10098. if (o == NULL)
  10099. {
  10100. return ERR_INVALID_PARAMETER;
  10101. }
  10102. ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 443);
  10103. Zero(&t, sizeof(t));
  10104. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10105. t.Online = false;
  10106. Copy(&t.Policy, GetDefaultPolicy(), sizeof(POLICY));
  10107. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10108. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10109. t.ClientOption->Port = port;
  10110. StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
  10111. StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
  10112. t.ClientOption->NumRetry = INFINITE;
  10113. t.ClientOption->RetryInterval = 15;
  10114. t.ClientOption->MaxConnection = 8;
  10115. t.ClientOption->UseEncrypt = true;
  10116. t.ClientOption->AdditionalConnectionInterval = 1;
  10117. t.ClientOption->RequireBridgeRoutingMode = true;
  10118. t.ClientAuth = ZeroMalloc(sizeof(CLIENT_AUTH));
  10119. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_ANONYMOUS;
  10120. StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username), GetParamStr(o, "USERNAME"));
  10121. Free(host);
  10122. // RPC call
  10123. ret = ScCreateLink(ps->Rpc, &t);
  10124. if (ret != ERR_NO_ERROR)
  10125. {
  10126. // An error has occured
  10127. CmdPrintError(c, ret);
  10128. FreeParamValueList(o);
  10129. return ret;
  10130. }
  10131. FreeRpcCreateLink(&t);
  10132. FreeParamValueList(o);
  10133. return 0;
  10134. }
  10135. // Set the user name and destination of the cascade connection
  10136. UINT PsCascadeSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10137. {
  10138. LIST *o;
  10139. PS *ps = (PS *)param;
  10140. UINT ret = 0;
  10141. RPC_CREATE_LINK t;
  10142. char *host = NULL;
  10143. UINT port = 443;
  10144. // Parameter list that can be specified
  10145. PARAM args[] =
  10146. {
  10147. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10148. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10149. {"SERVER", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Server"), CmdEvalHostAndPort, NULL},
  10150. {"HUB", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Hub"), CmdEvalSafe, NULL},
  10151. };
  10152. // If virtual HUB is not selected, it's an error
  10153. if (ps->HubName == NULL)
  10154. {
  10155. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10156. return ERR_INVALID_PARAMETER;
  10157. }
  10158. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10159. if (o == NULL)
  10160. {
  10161. return ERR_INVALID_PARAMETER;
  10162. }
  10163. ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 443);
  10164. Zero(&t, sizeof(t));
  10165. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10166. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10167. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10168. ret = ScGetLink(ps->Rpc, &t);
  10169. if (ret != ERR_NO_ERROR)
  10170. {
  10171. // An error has occured
  10172. CmdPrintError(c, ret);
  10173. FreeParamValueList(o);
  10174. Free(host);
  10175. return ret;
  10176. }
  10177. t.ClientOption->Port = port;
  10178. StrCpy(t.ClientOption->Hostname, sizeof(t.ClientOption->Hostname), host);
  10179. StrCpy(t.ClientOption->HubName, sizeof(t.ClientOption->HubName), GetParamStr(o, "HUB"));
  10180. Free(host);
  10181. // RPC call
  10182. ret = ScSetLink(ps->Rpc, &t);
  10183. if (ret != ERR_NO_ERROR)
  10184. {
  10185. // An error has occured
  10186. CmdPrintError(c, ret);
  10187. FreeParamValueList(o);
  10188. return ret;
  10189. }
  10190. FreeRpcCreateLink(&t);
  10191. FreeParamValueList(o);
  10192. return 0;
  10193. }
  10194. // Get the type string of proxy
  10195. wchar_t *GetProxyTypeStr(UINT i)
  10196. {
  10197. switch (i)
  10198. {
  10199. case PROXY_DIRECT:
  10200. return _UU("PROTO_DIRECT_TCP");
  10201. case PROXY_HTTP:
  10202. return _UU("PROTO_HTTP_PROXY");
  10203. case PROXY_SOCKS:
  10204. return _UU("PROTO_SOCKS_PROXY");
  10205. default:
  10206. return _UU("PROTO_UNKNOWN");
  10207. }
  10208. }
  10209. // Get type string in user authentication for client
  10210. wchar_t *GetClientAuthTypeStr(UINT i)
  10211. {
  10212. char tmp[MAX_SIZE];
  10213. Format(tmp, sizeof(tmp), "PW_TYPE_%u", i);
  10214. return _UU(tmp);
  10215. }
  10216. // Get the setting of cascade connection
  10217. UINT PsCascadeGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10218. {
  10219. LIST *o;
  10220. PS *ps = (PS *)param;
  10221. UINT ret = 0;
  10222. RPC_CREATE_LINK t;
  10223. // Parameter list that can be specified
  10224. PARAM args[] =
  10225. {
  10226. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10227. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10228. };
  10229. // If virtual HUB is not selected, it's an error
  10230. if (ps->HubName == NULL)
  10231. {
  10232. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10233. return ERR_INVALID_PARAMETER;
  10234. }
  10235. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10236. if (o == NULL)
  10237. {
  10238. return ERR_INVALID_PARAMETER;
  10239. }
  10240. Zero(&t, sizeof(t));
  10241. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10242. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10243. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName),
  10244. GetParamUniStr(o, "[name]"));
  10245. // RPC call
  10246. ret = ScGetLink(ps->Rpc, &t);
  10247. if (ret != ERR_NO_ERROR)
  10248. {
  10249. // An error has occured
  10250. CmdPrintError(c, ret);
  10251. FreeParamValueList(o);
  10252. return ret;
  10253. }
  10254. else
  10255. {
  10256. // Show the contents of the connection settings
  10257. wchar_t tmp[MAX_SIZE];
  10258. CT *ct = CtNewStandard();
  10259. // Connection settings name
  10260. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_NAME"), t.ClientOption->AccountName);
  10261. // Host name of the destination VPN Server
  10262. StrToUni(tmp, sizeof(tmp), t.ClientOption->Hostname);
  10263. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_HOSTNAME"), tmp);
  10264. // The port number to connect to VPN Server
  10265. UniToStru(tmp, t.ClientOption->Port);
  10266. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PORT"), tmp);
  10267. // Virtual HUB name of the destination VPN Server
  10268. StrToUni(tmp, sizeof(tmp), t.ClientOption->HubName);
  10269. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_HUBNAME"), tmp);
  10270. // Type of proxy server to go through
  10271. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_TYPE"), GetProxyTypeStr(t.ClientOption->ProxyType));
  10272. if (t.ClientOption->ProxyType != PROXY_DIRECT)
  10273. {
  10274. // Host name of the proxy server
  10275. StrToUni(tmp, sizeof(tmp), t.ClientOption->ProxyName);
  10276. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_HOSTNAME"), tmp);
  10277. // Port number of the proxy server
  10278. UniToStru(tmp, t.ClientOption->ProxyPort);
  10279. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_PORT"), tmp);
  10280. // User name of the proxy server
  10281. StrToUni(tmp, sizeof(tmp), t.ClientOption->ProxyUsername);
  10282. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_PROXY_USERNAME"), tmp);
  10283. }
  10284. // To verify the server certificate
  10285. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_SERVER_CERT_USE"),
  10286. t.CheckServerCert ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10287. // Registered specific certificate
  10288. if (t.ServerCert != NULL)
  10289. {
  10290. GetAllNameFromX(tmp, sizeof(tmp), t.ServerCert);
  10291. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_SERVER_CERT_NAME"), tmp);
  10292. }
  10293. // Device name to be used for the connection
  10294. StrToUni(tmp, sizeof(tmp), t.ClientOption->DeviceName);
  10295. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_DEVICE_NAME"), tmp);
  10296. // Authentication type
  10297. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_AUTH_TYPE"), GetClientAuthTypeStr(t.ClientAuth->AuthType));
  10298. // User name
  10299. StrToUni(tmp, sizeof(tmp), t.ClientAuth->Username);
  10300. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_AUTH_USERNAME"), tmp);
  10301. if (t.ClientAuth->AuthType == CLIENT_AUTHTYPE_CERT)
  10302. {
  10303. if (t.ClientAuth->ClientX != NULL)
  10304. {
  10305. // Client certificate name
  10306. GetAllNameFromX(tmp, sizeof(tmp), t.ClientAuth->ClientX);
  10307. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_AUTH_CERT_NAME"), tmp);
  10308. }
  10309. }
  10310. // Number of TCP connections to be used for VPN communication
  10311. UniToStru(tmp, t.ClientOption->MaxConnection);
  10312. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_NUMTCP"), tmp);
  10313. // Establishment interval of each TCP connection
  10314. UniToStru(tmp, t.ClientOption->AdditionalConnectionInterval);
  10315. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_TCP_INTERVAL"), tmp);
  10316. // Life span of each TCP connection
  10317. if (t.ClientOption->ConnectionDisconnectSpan != 0)
  10318. {
  10319. UniToStru(tmp, t.ClientOption->ConnectionDisconnectSpan);
  10320. }
  10321. else
  10322. {
  10323. UniStrCpy(tmp, sizeof(tmp), _UU("CMD_MSG_INFINITE"));
  10324. }
  10325. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_TCP_TTL"), tmp);
  10326. // Use of half-duplex mode
  10327. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_TCP_HALF"),
  10328. t.ClientOption->HalfConnection ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10329. // Encryption by SSL
  10330. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_ENCRYPT"),
  10331. t.ClientOption->UseEncrypt ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10332. // Data compression
  10333. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_COMPRESS"),
  10334. t.ClientOption->UseCompress ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10335. // Connect in bridge / router mode
  10336. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_BRIDGE_ROUTER"),
  10337. t.ClientOption->RequireBridgeRoutingMode ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10338. // Connect in monitoring mode
  10339. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_MONITOR"),
  10340. t.ClientOption->RequireMonitorMode ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10341. // Not to rewrite the routing table
  10342. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_NO_TRACKING"),
  10343. t.ClientOption->NoRoutingTracking ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10344. // Disable the QoS control
  10345. CtInsert(ct, _UU("CMD_ACCOUNT_COLUMN_QOS_DISABLE"),
  10346. t.ClientOption->DisableQoS ? _UU("CMD_MSG_ENABLE") : _UU("CMD_MSG_DISABLE"));
  10347. CtFree(ct, c);
  10348. // Security policy
  10349. c->Write(c, L"");
  10350. c->Write(c, _UU("CMD_CascadeGet_Policy"));
  10351. PrintPolicy(c, &t.Policy, true);
  10352. }
  10353. FreeRpcCreateLink(&t);
  10354. FreeParamValueList(o);
  10355. return 0;
  10356. }
  10357. // Delete the cascade connection
  10358. UINT PsCascadeDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10359. {
  10360. LIST *o;
  10361. PS *ps = (PS *)param;
  10362. UINT ret = 0;
  10363. RPC_LINK t;
  10364. // Parameter list that can be specified
  10365. PARAM args[] =
  10366. {
  10367. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10368. };
  10369. // If virtual HUB is not selected, it's an error
  10370. if (ps->HubName == NULL)
  10371. {
  10372. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10373. return ERR_INVALID_PARAMETER;
  10374. }
  10375. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10376. if (o == NULL)
  10377. {
  10378. return ERR_INVALID_PARAMETER;
  10379. }
  10380. Zero(&t, sizeof(t));
  10381. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  10382. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10383. // RPC call
  10384. ret = ScDeleteLink(ps->Rpc, &t);
  10385. if (ret != ERR_NO_ERROR)
  10386. {
  10387. // An error has occured
  10388. CmdPrintError(c, ret);
  10389. FreeParamValueList(o);
  10390. return ret;
  10391. }
  10392. FreeParamValueList(o);
  10393. return 0;
  10394. }
  10395. // Set the user name to use for the cascade connection
  10396. UINT PsCascadeUsernameSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10397. {
  10398. LIST *o;
  10399. PS *ps = (PS *)param;
  10400. UINT ret = 0;
  10401. RPC_CREATE_LINK t;
  10402. // Parameter list that can be specified
  10403. PARAM args[] =
  10404. {
  10405. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10406. {"USERNAME", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Username"), CmdEvalNotEmpty, NULL},
  10407. };
  10408. // If virtual HUB is not selected, it's an error
  10409. if (ps->HubName == NULL)
  10410. {
  10411. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10412. return ERR_INVALID_PARAMETER;
  10413. }
  10414. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10415. if (o == NULL)
  10416. {
  10417. return ERR_INVALID_PARAMETER;
  10418. }
  10419. Zero(&t, sizeof(t));
  10420. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10421. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10422. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10423. // RPC call
  10424. ret = ScGetLink(ps->Rpc, &t);
  10425. if (ret != ERR_NO_ERROR)
  10426. {
  10427. // An error has occured
  10428. CmdPrintError(c, ret);
  10429. FreeParamValueList(o);
  10430. return ret;
  10431. }
  10432. else
  10433. {
  10434. // Change the settings for the cascade connection
  10435. StrCpy(t.ClientAuth->Username, sizeof(t.ClientAuth->Username),
  10436. GetParamStr(o, "USERNAME"));
  10437. if (t.ClientAuth->AuthType == CLIENT_AUTHTYPE_PASSWORD)
  10438. {
  10439. c->Write(c, _UU("CMD_CascadeUsername_Notice"));
  10440. }
  10441. ret = ScSetLink(ps->Rpc, &t);
  10442. if (ret != ERR_NO_ERROR)
  10443. {
  10444. // An error has occured
  10445. CmdPrintError(c, ret);
  10446. FreeParamValueList(o);
  10447. return ret;
  10448. }
  10449. FreeRpcCreateLink(&t);
  10450. }
  10451. FreeParamValueList(o);
  10452. return 0;
  10453. }
  10454. //Set the type of user authentication of cascade connection to the anonymous authentication
  10455. UINT PsCascadeAnonymousSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10456. {
  10457. LIST *o;
  10458. PS *ps = (PS *)param;
  10459. UINT ret = 0;
  10460. RPC_CREATE_LINK t;
  10461. // Parameter list that can be specified
  10462. PARAM args[] =
  10463. {
  10464. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10465. };
  10466. // If virtual HUB is not selected, it's an error
  10467. if (ps->HubName == NULL)
  10468. {
  10469. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10470. return ERR_INVALID_PARAMETER;
  10471. }
  10472. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10473. if (o == NULL)
  10474. {
  10475. return ERR_INVALID_PARAMETER;
  10476. }
  10477. Zero(&t, sizeof(t));
  10478. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10479. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10480. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10481. // RPC call
  10482. ret = ScGetLink(ps->Rpc, &t);
  10483. if (ret != ERR_NO_ERROR)
  10484. {
  10485. // An error has occured
  10486. CmdPrintError(c, ret);
  10487. FreeParamValueList(o);
  10488. return ret;
  10489. }
  10490. else
  10491. {
  10492. // Change the settings for the cascade connection
  10493. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_ANONYMOUS;
  10494. ret = ScSetLink(ps->Rpc, &t);
  10495. if (ret != ERR_NO_ERROR)
  10496. {
  10497. // An error has occured
  10498. CmdPrintError(c, ret);
  10499. FreeParamValueList(o);
  10500. return ret;
  10501. }
  10502. FreeRpcCreateLink(&t);
  10503. }
  10504. FreeParamValueList(o);
  10505. return 0;
  10506. }
  10507. // Set the type of user authentication of cascade connection to the password authentication
  10508. UINT PsCascadePasswordSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10509. {
  10510. LIST *o;
  10511. PS *ps = (PS *)param;
  10512. UINT ret = 0;
  10513. RPC_CREATE_LINK t;
  10514. // Parameter list that can be specified
  10515. PARAM args[] =
  10516. {
  10517. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10518. {"PASSWORD", CmdPromptChoosePassword, NULL, NULL, NULL},
  10519. {"TYPE", CmdPrompt, _UU("CMD_CascadePasswordSet_Prompt_Type"), CmdEvalNotEmpty, NULL},
  10520. };
  10521. // If virtual HUB is not selected, it's an error
  10522. if (ps->HubName == NULL)
  10523. {
  10524. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10525. return ERR_INVALID_PARAMETER;
  10526. }
  10527. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10528. if (o == NULL)
  10529. {
  10530. return ERR_INVALID_PARAMETER;
  10531. }
  10532. Zero(&t, sizeof(t));
  10533. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10534. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10535. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10536. // RPC call
  10537. ret = ScGetLink(ps->Rpc, &t);
  10538. if (ret != ERR_NO_ERROR)
  10539. {
  10540. // An error has occured
  10541. CmdPrintError(c, ret);
  10542. FreeParamValueList(o);
  10543. return ret;
  10544. }
  10545. else
  10546. {
  10547. // Change the settings for the cascade connection
  10548. char *typestr = GetParamStr(o, "TYPE");
  10549. if (StartWith("standard", typestr))
  10550. {
  10551. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_PASSWORD;
  10552. HashPassword(t.ClientAuth->HashedPassword, t.ClientAuth->Username,
  10553. GetParamStr(o, "PASSWORD"));
  10554. }
  10555. else if (StartWith("radius", typestr) || StartWith("ntdomain", typestr))
  10556. {
  10557. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_PLAIN_PASSWORD;
  10558. StrCpy(t.ClientAuth->PlainPassword, sizeof(t.ClientAuth->PlainPassword),
  10559. GetParamStr(o, "PASSWORD"));
  10560. }
  10561. else
  10562. {
  10563. // An error has occured
  10564. c->Write(c, _UU("CMD_CascadePasswordSet_Type_Invalid"));
  10565. FreeRpcCreateLink(&t);
  10566. ret = ERR_INVALID_PARAMETER;
  10567. CmdPrintError(c, ret);
  10568. FreeParamValueList(o);
  10569. return ERR_INTERNAL_ERROR;
  10570. }
  10571. ret = ScSetLink(ps->Rpc, &t);
  10572. if (ret != ERR_NO_ERROR)
  10573. {
  10574. // An error has occured
  10575. CmdPrintError(c, ret);
  10576. FreeParamValueList(o);
  10577. return ret;
  10578. }
  10579. FreeRpcCreateLink(&t);
  10580. }
  10581. FreeParamValueList(o);
  10582. return 0;
  10583. }
  10584. // Set the type of user authentication of cascade connection to the client certificate authentication
  10585. UINT PsCascadeCertSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10586. {
  10587. LIST *o;
  10588. PS *ps = (PS *)param;
  10589. UINT ret = 0;
  10590. RPC_CREATE_LINK t;
  10591. X *x;
  10592. K *k;
  10593. // Parameter list that can be specified
  10594. PARAM args[] =
  10595. {
  10596. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10597. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10598. {"LOADCERT", CmdPrompt, _UU("CMD_LOADCERTPATH"), CmdEvalIsFile, NULL},
  10599. {"LOADKEY", CmdPrompt, _UU("CMD_LOADKEYPATH"), CmdEvalIsFile, NULL},
  10600. };
  10601. // If virtual HUB is not selected, it's an error
  10602. if (ps->HubName == NULL)
  10603. {
  10604. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10605. return ERR_INVALID_PARAMETER;
  10606. }
  10607. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10608. if (o == NULL)
  10609. {
  10610. return ERR_INVALID_PARAMETER;
  10611. }
  10612. if (CmdLoadCertAndKey(c, &x, &k, GetParamUniStr(o, "LOADCERT"), GetParamUniStr(o, "LOADKEY")) == false)
  10613. {
  10614. return ERR_INTERNAL_ERROR;
  10615. }
  10616. Zero(&t, sizeof(t));
  10617. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10618. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10619. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10620. // RPC call
  10621. ret = ScGetLink(ps->Rpc, &t);
  10622. if (ret != ERR_NO_ERROR)
  10623. {
  10624. // An error has occured
  10625. FreeX(x);
  10626. FreeK(k);
  10627. CmdPrintError(c, ret);
  10628. FreeParamValueList(o);
  10629. return ret;
  10630. }
  10631. else
  10632. {
  10633. // Change authentication data
  10634. t.ClientAuth->AuthType = CLIENT_AUTHTYPE_CERT;
  10635. if (t.ClientAuth->ClientX != NULL)
  10636. {
  10637. FreeX(t.ClientAuth->ClientX);
  10638. }
  10639. if (t.ClientAuth->ClientK != NULL)
  10640. {
  10641. FreeK(t.ClientAuth->ClientK);
  10642. }
  10643. t.ClientAuth->ClientX = x;
  10644. t.ClientAuth->ClientK = k;
  10645. ret = ScSetLink(ps->Rpc, &t);
  10646. if (ret != ERR_NO_ERROR)
  10647. {
  10648. // An error has occured
  10649. CmdPrintError(c, ret);
  10650. FreeParamValueList(o);
  10651. return ret;
  10652. }
  10653. FreeRpcCreateLink(&t);
  10654. }
  10655. FreeParamValueList(o);
  10656. return 0;
  10657. }
  10658. // Get the client certificate to be used in the cascade connection
  10659. UINT PsCascadeCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10660. {
  10661. LIST *o;
  10662. PS *ps = (PS *)param;
  10663. UINT ret = 0;
  10664. RPC_CREATE_LINK t;
  10665. // Parameter list that can be specified
  10666. PARAM args[] =
  10667. {
  10668. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10669. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10670. {"SAVECERT", CmdPrompt, _UU("CMD_SAVECERTPATH"), CmdEvalNotEmpty, NULL},
  10671. };
  10672. // If virtual HUB is not selected, it's an error
  10673. if (ps->HubName == NULL)
  10674. {
  10675. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10676. return ERR_INVALID_PARAMETER;
  10677. }
  10678. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10679. if (o == NULL)
  10680. {
  10681. return ERR_INVALID_PARAMETER;
  10682. }
  10683. Zero(&t, sizeof(t));
  10684. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10685. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10686. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10687. // RPC call
  10688. ret = ScGetLink(ps->Rpc, &t);
  10689. if (ret != ERR_NO_ERROR)
  10690. {
  10691. // An error has occured
  10692. CmdPrintError(c, ret);
  10693. FreeParamValueList(o);
  10694. return ret;
  10695. }
  10696. else
  10697. {
  10698. if (t.ClientAuth->AuthType != CLIENT_AUTHTYPE_CERT)
  10699. {
  10700. c->Write(c, _UU("CMD_CascadeCertSet_Not_Auth_Cert"));
  10701. ret = ERR_INTERNAL_ERROR;
  10702. }
  10703. else if (t.ClientAuth->ClientX == NULL)
  10704. {
  10705. c->Write(c, _UU("CMD_CascadeCertSet_Cert_Not_Exists"));
  10706. ret = ERR_INTERNAL_ERROR;
  10707. }
  10708. else
  10709. {
  10710. XToFileW(t.ClientAuth->ClientX, GetParamUniStr(o, "SAVECERT"), true);
  10711. }
  10712. FreeRpcCreateLink(&t);
  10713. }
  10714. FreeParamValueList(o);
  10715. return ret;
  10716. }
  10717. // Enable encryption of communication at the time of the cascade connection
  10718. UINT PsCascadeEncryptEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10719. {
  10720. LIST *o;
  10721. PS *ps = (PS *)param;
  10722. UINT ret = 0;
  10723. RPC_CREATE_LINK t;
  10724. // Parameter list that can be specified
  10725. PARAM args[] =
  10726. {
  10727. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10728. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10729. };
  10730. // If virtual HUB is not selected, it's an error
  10731. if (ps->HubName == NULL)
  10732. {
  10733. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10734. return ERR_INVALID_PARAMETER;
  10735. }
  10736. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10737. if (o == NULL)
  10738. {
  10739. return ERR_INVALID_PARAMETER;
  10740. }
  10741. Zero(&t, sizeof(t));
  10742. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10743. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10744. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10745. // RPC call
  10746. ret = ScGetLink(ps->Rpc, &t);
  10747. if (ret != ERR_NO_ERROR)
  10748. {
  10749. // An error has occured
  10750. CmdPrintError(c, ret);
  10751. FreeParamValueList(o);
  10752. return ret;
  10753. }
  10754. else
  10755. {
  10756. // Data change
  10757. t.ClientOption->UseEncrypt = true;
  10758. ret = ScSetLink(ps->Rpc, &t);
  10759. if (ret != ERR_NO_ERROR)
  10760. {
  10761. // An error has occured
  10762. CmdPrintError(c, ret);
  10763. FreeParamValueList(o);
  10764. return ret;
  10765. }
  10766. FreeRpcCreateLink(&t);
  10767. }
  10768. FreeParamValueList(o);
  10769. return 0;
  10770. }
  10771. // Disable encryption of communication at the time of the cascade connection
  10772. UINT PsCascadeEncryptDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10773. {
  10774. LIST *o;
  10775. PS *ps = (PS *)param;
  10776. UINT ret = 0;
  10777. RPC_CREATE_LINK t;
  10778. // Parameter list that can be specified
  10779. PARAM args[] =
  10780. {
  10781. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10782. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10783. };
  10784. // If virtual HUB is not selected, it's an error
  10785. if (ps->HubName == NULL)
  10786. {
  10787. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10788. return ERR_INVALID_PARAMETER;
  10789. }
  10790. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10791. if (o == NULL)
  10792. {
  10793. return ERR_INVALID_PARAMETER;
  10794. }
  10795. Zero(&t, sizeof(t));
  10796. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10797. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10798. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10799. // RPC call
  10800. ret = ScGetLink(ps->Rpc, &t);
  10801. if (ret != ERR_NO_ERROR)
  10802. {
  10803. // An error has occured
  10804. CmdPrintError(c, ret);
  10805. FreeParamValueList(o);
  10806. return ret;
  10807. }
  10808. else
  10809. {
  10810. // Data change
  10811. t.ClientOption->UseEncrypt = false;
  10812. ret = ScSetLink(ps->Rpc, &t);
  10813. if (ret != ERR_NO_ERROR)
  10814. {
  10815. // An error has occured
  10816. CmdPrintError(c, ret);
  10817. FreeParamValueList(o);
  10818. return ret;
  10819. }
  10820. FreeRpcCreateLink(&t);
  10821. }
  10822. FreeParamValueList(o);
  10823. return 0;
  10824. }
  10825. // Enable data compression at the time of communication of the cascade connection
  10826. UINT PsCascadeCompressEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10827. {
  10828. LIST *o;
  10829. PS *ps = (PS *)param;
  10830. UINT ret = 0;
  10831. RPC_CREATE_LINK t;
  10832. // Parameter list that can be specified
  10833. PARAM args[] =
  10834. {
  10835. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10836. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10837. };
  10838. // If virtual HUB is not selected, it's an error
  10839. if (ps->HubName == NULL)
  10840. {
  10841. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10842. return ERR_INVALID_PARAMETER;
  10843. }
  10844. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10845. if (o == NULL)
  10846. {
  10847. return ERR_INVALID_PARAMETER;
  10848. }
  10849. Zero(&t, sizeof(t));
  10850. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10851. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10852. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10853. // RPC call
  10854. ret = ScGetLink(ps->Rpc, &t);
  10855. if (ret != ERR_NO_ERROR)
  10856. {
  10857. // An error has occured
  10858. CmdPrintError(c, ret);
  10859. FreeParamValueList(o);
  10860. return ret;
  10861. }
  10862. else
  10863. {
  10864. // Data change
  10865. t.ClientOption->UseCompress = true;
  10866. ret = ScSetLink(ps->Rpc, &t);
  10867. if (ret != ERR_NO_ERROR)
  10868. {
  10869. // An error has occured
  10870. CmdPrintError(c, ret);
  10871. FreeParamValueList(o);
  10872. return ret;
  10873. }
  10874. FreeRpcCreateLink(&t);
  10875. }
  10876. FreeParamValueList(o);
  10877. return 0;
  10878. }
  10879. // Disable data compression at the time of communication of the cascade connection
  10880. UINT PsCascadeCompressDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10881. {
  10882. LIST *o;
  10883. PS *ps = (PS *)param;
  10884. UINT ret = 0;
  10885. RPC_CREATE_LINK t;
  10886. // Parameter list that can be specified
  10887. PARAM args[] =
  10888. {
  10889. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10890. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10891. };
  10892. // If virtual HUB is not selected, it's an error
  10893. if (ps->HubName == NULL)
  10894. {
  10895. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10896. return ERR_INVALID_PARAMETER;
  10897. }
  10898. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10899. if (o == NULL)
  10900. {
  10901. return ERR_INVALID_PARAMETER;
  10902. }
  10903. Zero(&t, sizeof(t));
  10904. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10905. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10906. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10907. // RPC call
  10908. ret = ScGetLink(ps->Rpc, &t);
  10909. if (ret != ERR_NO_ERROR)
  10910. {
  10911. // An error has occured
  10912. CmdPrintError(c, ret);
  10913. FreeParamValueList(o);
  10914. return ret;
  10915. }
  10916. else
  10917. {
  10918. // Data change
  10919. t.ClientOption->UseCompress = false;
  10920. ret = ScSetLink(ps->Rpc, &t);
  10921. if (ret != ERR_NO_ERROR)
  10922. {
  10923. // An error has occured
  10924. CmdPrintError(c, ret);
  10925. FreeParamValueList(o);
  10926. return ret;
  10927. }
  10928. FreeRpcCreateLink(&t);
  10929. }
  10930. FreeParamValueList(o);
  10931. return 0;
  10932. }
  10933. // Set the cascade connection method to the TCP/IP direct connection mode
  10934. UINT PsCascadeProxyNone(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10935. {
  10936. LIST *o;
  10937. PS *ps = (PS *)param;
  10938. UINT ret = 0;
  10939. RPC_CREATE_LINK t;
  10940. // Parameter list that can be specified
  10941. PARAM args[] =
  10942. {
  10943. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10944. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10945. };
  10946. // If virtual HUB is not selected, it's an error
  10947. if (ps->HubName == NULL)
  10948. {
  10949. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  10950. return ERR_INVALID_PARAMETER;
  10951. }
  10952. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  10953. if (o == NULL)
  10954. {
  10955. return ERR_INVALID_PARAMETER;
  10956. }
  10957. Zero(&t, sizeof(t));
  10958. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  10959. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10960. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  10961. // RPC call
  10962. ret = ScGetLink(ps->Rpc, &t);
  10963. if (ret != ERR_NO_ERROR)
  10964. {
  10965. // An error has occured
  10966. CmdPrintError(c, ret);
  10967. FreeParamValueList(o);
  10968. return ret;
  10969. }
  10970. else
  10971. {
  10972. // Data change
  10973. t.ClientOption->ProxyType = PROXY_DIRECT;
  10974. ret = ScSetLink(ps->Rpc, &t);
  10975. if (ret != ERR_NO_ERROR)
  10976. {
  10977. // An error has occured
  10978. CmdPrintError(c, ret);
  10979. FreeParamValueList(o);
  10980. return ret;
  10981. }
  10982. FreeRpcCreateLink(&t);
  10983. }
  10984. FreeParamValueList(o);
  10985. return 0;
  10986. }
  10987. // Set the cascade connection method as the mode via HTTP proxy server
  10988. UINT PsCascadeProxyHttp(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  10989. {
  10990. LIST *o;
  10991. PS *ps = (PS *)param;
  10992. UINT ret = 0;
  10993. RPC_CREATE_LINK t;
  10994. // Parameter list that can be specified
  10995. PARAM args[] =
  10996. {
  10997. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  10998. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  10999. {"SERVER", CmdPrompt, _UU("CMD_CascadeProxyHttp_Prompt_Server"), CmdEvalHostAndPort, NULL},
  11000. {"USERNAME", NULL, NULL, NULL, NULL},
  11001. {"PASSWORD", NULL, NULL, NULL, NULL},
  11002. };
  11003. // If virtual HUB is not selected, it's an error
  11004. if (ps->HubName == NULL)
  11005. {
  11006. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11007. return ERR_INVALID_PARAMETER;
  11008. }
  11009. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11010. if (o == NULL)
  11011. {
  11012. return ERR_INVALID_PARAMETER;
  11013. }
  11014. Zero(&t, sizeof(t));
  11015. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11016. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11017. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11018. // RPC call
  11019. ret = ScGetLink(ps->Rpc, &t);
  11020. if (ret != ERR_NO_ERROR)
  11021. {
  11022. // An error has occured
  11023. CmdPrintError(c, ret);
  11024. FreeParamValueList(o);
  11025. return ret;
  11026. }
  11027. else
  11028. {
  11029. char *host;
  11030. UINT port;
  11031. // Data change
  11032. if (ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 8080))
  11033. {
  11034. t.ClientOption->ProxyType = PROXY_HTTP;
  11035. StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
  11036. t.ClientOption->ProxyPort = port;
  11037. StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
  11038. StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
  11039. Free(host);
  11040. }
  11041. ret = ScSetLink(ps->Rpc, &t);
  11042. if (ret != ERR_NO_ERROR)
  11043. {
  11044. // An error has occured
  11045. CmdPrintError(c, ret);
  11046. FreeParamValueList(o);
  11047. return ret;
  11048. }
  11049. FreeRpcCreateLink(&t);
  11050. }
  11051. FreeParamValueList(o);
  11052. return 0;
  11053. }
  11054. // Set the cascade connection method as the mode via SOCKS proxy server
  11055. UINT PsCascadeProxySocks(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11056. {
  11057. LIST *o;
  11058. PS *ps = (PS *)param;
  11059. UINT ret = 0;
  11060. RPC_CREATE_LINK t;
  11061. // Parameter list that can be specified
  11062. PARAM args[] =
  11063. {
  11064. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11065. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11066. {"SERVER", CmdPrompt, _UU("CMD_CascadeProxyHttp_Prompt_Server"), CmdEvalHostAndPort, NULL},
  11067. {"USERNAME", NULL, NULL, NULL, NULL},
  11068. {"PASSWORD", NULL, NULL, NULL, NULL},
  11069. };
  11070. // If virtual HUB is not selected, it's an error
  11071. if (ps->HubName == NULL)
  11072. {
  11073. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11074. return ERR_INVALID_PARAMETER;
  11075. }
  11076. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11077. if (o == NULL)
  11078. {
  11079. return ERR_INVALID_PARAMETER;
  11080. }
  11081. Zero(&t, sizeof(t));
  11082. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11083. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11084. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11085. // RPC call
  11086. ret = ScGetLink(ps->Rpc, &t);
  11087. if (ret != ERR_NO_ERROR)
  11088. {
  11089. // An error has occured
  11090. CmdPrintError(c, ret);
  11091. FreeParamValueList(o);
  11092. return ret;
  11093. }
  11094. else
  11095. {
  11096. char *host;
  11097. UINT port;
  11098. // Data change
  11099. if (ParseHostPort(GetParamStr(o, "SERVER"), &host, &port, 8080))
  11100. {
  11101. t.ClientOption->ProxyType = PROXY_SOCKS;
  11102. StrCpy(t.ClientOption->ProxyName, sizeof(t.ClientOption->ProxyName), host);
  11103. t.ClientOption->ProxyPort = port;
  11104. StrCpy(t.ClientOption->ProxyUsername, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "USERNAME"));
  11105. StrCpy(t.ClientOption->ProxyPassword, sizeof(t.ClientOption->ProxyName), GetParamStr(o, "PASSWORD"));
  11106. Free(host);
  11107. }
  11108. ret = ScSetLink(ps->Rpc, &t);
  11109. if (ret != ERR_NO_ERROR)
  11110. {
  11111. // An error has occured
  11112. CmdPrintError(c, ret);
  11113. FreeParamValueList(o);
  11114. return ret;
  11115. }
  11116. FreeRpcCreateLink(&t);
  11117. }
  11118. FreeParamValueList(o);
  11119. return 0;
  11120. }
  11121. // Enable the validation options for the server certificate of cascade connection
  11122. UINT PsCascadeServerCertEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11123. {
  11124. LIST *o;
  11125. PS *ps = (PS *)param;
  11126. UINT ret = 0;
  11127. RPC_CREATE_LINK t;
  11128. // Parameter list that can be specified
  11129. PARAM args[] =
  11130. {
  11131. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11132. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11133. };
  11134. // If virtual HUB is not selected, it's an error
  11135. if (ps->HubName == NULL)
  11136. {
  11137. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11138. return ERR_INVALID_PARAMETER;
  11139. }
  11140. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11141. if (o == NULL)
  11142. {
  11143. return ERR_INVALID_PARAMETER;
  11144. }
  11145. Zero(&t, sizeof(t));
  11146. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11147. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11148. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11149. // RPC call
  11150. ret = ScGetLink(ps->Rpc, &t);
  11151. if (ret != ERR_NO_ERROR)
  11152. {
  11153. // An error has occured
  11154. CmdPrintError(c, ret);
  11155. FreeParamValueList(o);
  11156. return ret;
  11157. }
  11158. else
  11159. {
  11160. // Data change
  11161. t.CheckServerCert = true;
  11162. ret = ScSetLink(ps->Rpc, &t);
  11163. if (ret != ERR_NO_ERROR)
  11164. {
  11165. // An error has occured
  11166. CmdPrintError(c, ret);
  11167. FreeParamValueList(o);
  11168. return ret;
  11169. }
  11170. FreeRpcCreateLink(&t);
  11171. }
  11172. FreeParamValueList(o);
  11173. return 0;
  11174. }
  11175. // Disable the validation options for the server certificate of cascade connection
  11176. UINT PsCascadeServerCertDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11177. {
  11178. LIST *o;
  11179. PS *ps = (PS *)param;
  11180. UINT ret = 0;
  11181. RPC_CREATE_LINK t;
  11182. // Parameter list that can be specified
  11183. PARAM args[] =
  11184. {
  11185. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11186. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11187. };
  11188. // If virtual HUB is not selected, it's an error
  11189. if (ps->HubName == NULL)
  11190. {
  11191. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11192. return ERR_INVALID_PARAMETER;
  11193. }
  11194. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11195. if (o == NULL)
  11196. {
  11197. return ERR_INVALID_PARAMETER;
  11198. }
  11199. Zero(&t, sizeof(t));
  11200. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11201. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11202. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11203. // RPC call
  11204. ret = ScGetLink(ps->Rpc, &t);
  11205. if (ret != ERR_NO_ERROR)
  11206. {
  11207. // An error has occured
  11208. CmdPrintError(c, ret);
  11209. FreeParamValueList(o);
  11210. return ret;
  11211. }
  11212. else
  11213. {
  11214. // Data change
  11215. t.CheckServerCert = false;
  11216. ret = ScSetLink(ps->Rpc, &t);
  11217. if (ret != ERR_NO_ERROR)
  11218. {
  11219. // An error has occured
  11220. CmdPrintError(c, ret);
  11221. FreeParamValueList(o);
  11222. return ret;
  11223. }
  11224. FreeRpcCreateLink(&t);
  11225. }
  11226. FreeParamValueList(o);
  11227. return 0;
  11228. }
  11229. // Server-specific certificate settings of cascade connection
  11230. UINT PsCascadeServerCertSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11231. {
  11232. LIST *o;
  11233. PS *ps = (PS *)param;
  11234. UINT ret = 0;
  11235. RPC_CREATE_LINK t;
  11236. X *x;
  11237. // Parameter list that can be specified
  11238. PARAM args[] =
  11239. {
  11240. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11241. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11242. {"LOADCERT", CmdPrompt, _UU("CMD_LOADCERTPATH"), CmdEvalIsFile, NULL},
  11243. };
  11244. // If virtual HUB is not selected, it's an error
  11245. if (ps->HubName == NULL)
  11246. {
  11247. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11248. return ERR_INVALID_PARAMETER;
  11249. }
  11250. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11251. if (o == NULL)
  11252. {
  11253. return ERR_INVALID_PARAMETER;
  11254. }
  11255. x = FileToXW(GetParamUniStr(o, "LOADCERT"));
  11256. if (x == NULL)
  11257. {
  11258. FreeParamValueList(o);
  11259. c->Write(c, _UU("CMD_LOADCERT_FAILED"));
  11260. return ERR_INTERNAL_ERROR;
  11261. }
  11262. Zero(&t, sizeof(t));
  11263. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11264. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11265. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11266. // RPC call
  11267. ret = ScGetLink(ps->Rpc, &t);
  11268. if (ret != ERR_NO_ERROR)
  11269. {
  11270. // An error has occured
  11271. CmdPrintError(c, ret);
  11272. FreeParamValueList(o);
  11273. FreeX(x);
  11274. return ret;
  11275. }
  11276. else
  11277. {
  11278. // Data change
  11279. if (t.ServerCert != NULL)
  11280. {
  11281. FreeX(t.ServerCert);
  11282. }
  11283. t.ServerCert = x;
  11284. ret = ScSetLink(ps->Rpc, &t);
  11285. if (ret != ERR_NO_ERROR)
  11286. {
  11287. // An error has occured
  11288. CmdPrintError(c, ret);
  11289. FreeParamValueList(o);
  11290. return ret;
  11291. }
  11292. FreeRpcCreateLink(&t);
  11293. }
  11294. FreeParamValueList(o);
  11295. return 0;
  11296. }
  11297. // Delete the server-specific certificate of cascade connection
  11298. UINT PsCascadeServerCertDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11299. {
  11300. LIST *o;
  11301. PS *ps = (PS *)param;
  11302. UINT ret = 0;
  11303. RPC_CREATE_LINK t;
  11304. // Parameter list that can be specified
  11305. PARAM args[] =
  11306. {
  11307. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11308. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11309. };
  11310. // If virtual HUB is not selected, it's an error
  11311. if (ps->HubName == NULL)
  11312. {
  11313. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11314. return ERR_INVALID_PARAMETER;
  11315. }
  11316. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11317. if (o == NULL)
  11318. {
  11319. return ERR_INVALID_PARAMETER;
  11320. }
  11321. Zero(&t, sizeof(t));
  11322. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11323. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11324. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11325. // RPC call
  11326. ret = ScGetLink(ps->Rpc, &t);
  11327. if (ret != ERR_NO_ERROR)
  11328. {
  11329. // An error has occured
  11330. CmdPrintError(c, ret);
  11331. FreeParamValueList(o);
  11332. return ret;
  11333. }
  11334. else
  11335. {
  11336. // Data change
  11337. if (t.ServerCert != NULL)
  11338. {
  11339. FreeX(t.ServerCert);
  11340. }
  11341. t.ServerCert = NULL;
  11342. ret = ScSetLink(ps->Rpc, &t);
  11343. if (ret != ERR_NO_ERROR)
  11344. {
  11345. // An error has occured
  11346. CmdPrintError(c, ret);
  11347. FreeParamValueList(o);
  11348. return ret;
  11349. }
  11350. FreeRpcCreateLink(&t);
  11351. }
  11352. FreeParamValueList(o);
  11353. return 0;
  11354. }
  11355. // Get the server-specific certificate of cascade connection
  11356. UINT PsCascadeServerCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11357. {
  11358. LIST *o;
  11359. PS *ps = (PS *)param;
  11360. UINT ret = 0;
  11361. RPC_CREATE_LINK t;
  11362. // Parameter list that can be specified
  11363. PARAM args[] =
  11364. {
  11365. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11366. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11367. {"SAVECERT", CmdPrompt, _UU("CMD_SAVECERTPATH"), CmdEvalNotEmpty, NULL},
  11368. };
  11369. // If virtual HUB is not selected, it's an error
  11370. if (ps->HubName == NULL)
  11371. {
  11372. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11373. return ERR_INVALID_PARAMETER;
  11374. }
  11375. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11376. if (o == NULL)
  11377. {
  11378. return ERR_INVALID_PARAMETER;
  11379. }
  11380. Zero(&t, sizeof(t));
  11381. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11382. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11383. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11384. // RPC call
  11385. ret = ScGetLink(ps->Rpc, &t);
  11386. if (ret != ERR_NO_ERROR)
  11387. {
  11388. // An error has occured
  11389. CmdPrintError(c, ret);
  11390. FreeParamValueList(o);
  11391. return ret;
  11392. }
  11393. else
  11394. {
  11395. // Save the certificate
  11396. if (t.ServerCert == NULL)
  11397. {
  11398. c->Write(c, _UU("CMD_CERT_NOT_EXISTS"));
  11399. ret = ERR_INTERNAL_ERROR;
  11400. }
  11401. else
  11402. {
  11403. if (XToFileW(t.ServerCert, GetParamUniStr(o, "SAVECERT"), true) == false)
  11404. {
  11405. c->Write(c, _UU("CMD_SAVECERT_FAILED"));
  11406. ret = ERR_INTERNAL_ERROR;
  11407. }
  11408. }
  11409. FreeRpcCreateLink(&t);
  11410. }
  11411. FreeParamValueList(o);
  11412. return ret;
  11413. }
  11414. // Set the advanced settings of the cascade connection
  11415. UINT PsCascadeDetailSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11416. {
  11417. LIST *o;
  11418. PS *ps = (PS *)param;
  11419. UINT ret = 0;
  11420. RPC_CREATE_LINK t;
  11421. CMD_EVAL_MIN_MAX mm_maxtcp =
  11422. {
  11423. "CMD_CascadeDetailSet_Eval_MaxTcp", 1, 32
  11424. };
  11425. CMD_EVAL_MIN_MAX mm_interval =
  11426. {
  11427. "CMD_CascadeDetailSet_Eval_Interval", 1, 4294967295UL
  11428. };
  11429. // Parameter list that can be specified
  11430. PARAM args[] =
  11431. {
  11432. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11433. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11434. {"MAXTCP", CmdPrompt, _UU("CMD_CascadeDetailSet_Prompt_MaxTcp"), CmdEvalMinMax, &mm_maxtcp},
  11435. {"INTERVAL", CmdPrompt, _UU("CMD_CascadeDetailSet_Prompt_Interval"), CmdEvalMinMax, &mm_interval},
  11436. {"TTL", CmdPrompt, _UU("CMD_CascadeDetailSet_Prompt_TTL"), NULL, NULL},
  11437. {"HALF", CmdPrompt, _UU("CMD_CascadeDetailSet_Prompt_HALF"), NULL, NULL},
  11438. {"NOQOS", CmdPrompt, _UU("CMD_AccountDetailSet_Prompt_NOQOS"), NULL, NULL},
  11439. };
  11440. // If virtual HUB is not selected, it's an error
  11441. if (ps->HubName == NULL)
  11442. {
  11443. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11444. return ERR_INVALID_PARAMETER;
  11445. }
  11446. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11447. if (o == NULL)
  11448. {
  11449. return ERR_INVALID_PARAMETER;
  11450. }
  11451. Zero(&t, sizeof(t));
  11452. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11453. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11454. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11455. // RPC call
  11456. ret = ScGetLink(ps->Rpc, &t);
  11457. if (ret != ERR_NO_ERROR)
  11458. {
  11459. // An error has occured
  11460. CmdPrintError(c, ret);
  11461. FreeParamValueList(o);
  11462. return ret;
  11463. }
  11464. else
  11465. {
  11466. // Data change
  11467. t.ClientOption->MaxConnection = GetParamInt(o, "MAXTCP");
  11468. t.ClientOption->AdditionalConnectionInterval = GetParamInt(o, "INTERVAL");
  11469. t.ClientOption->ConnectionDisconnectSpan = GetParamInt(o, "TTL");
  11470. t.ClientOption->HalfConnection = GetParamYes(o, "HALF");
  11471. t.ClientOption->DisableQoS = GetParamYes(o, "NOQOS");
  11472. ret = ScSetLink(ps->Rpc, &t);
  11473. if (ret != ERR_NO_ERROR)
  11474. {
  11475. // An error has occured
  11476. CmdPrintError(c, ret);
  11477. FreeParamValueList(o);
  11478. return ret;
  11479. }
  11480. FreeRpcCreateLink(&t);
  11481. }
  11482. FreeParamValueList(o);
  11483. return 0;
  11484. }
  11485. // Show a security policy
  11486. void PrintPolicy(CONSOLE *c, POLICY *pol, bool cascade_mode)
  11487. {
  11488. UINT i;
  11489. CT *ct;
  11490. PACK *p;
  11491. // Validate arguments
  11492. if (c == NULL || pol == NULL)
  11493. {
  11494. return;
  11495. }
  11496. ct = CtNew();
  11497. CtInsertColumn(ct, _UU("CMD_PolicyList_Column_1"), false);
  11498. CtInsertColumn(ct, _UU("CMD_PolicyList_Column_2"), false);
  11499. CtInsertColumn(ct, _UU("CMD_PolicyList_Column_3"), false);
  11500. p = NewPack();
  11501. OutRpcPolicy(p, pol);
  11502. // Show the list of all policies
  11503. for (i = 0; i < PolicyNum();i++)
  11504. {
  11505. char name[64];
  11506. wchar_t *tmp;
  11507. if (cascade_mode == false || PolicyIsSupportedForCascade(i))
  11508. {
  11509. wchar_t value_str[256];
  11510. UINT value;
  11511. char tmp2[256];
  11512. Format(tmp2, sizeof(tmp2), "policy:%s", PolicyIdToStr(i));
  11513. value = PackGetInt(p, tmp2);
  11514. tmp = CopyStrToUni(PolicyIdToStr(i));
  11515. FormatPolicyValue(value_str, sizeof(value_str),
  11516. i, value);
  11517. Format(name, sizeof(name), "POL_%u", i);
  11518. CtInsert(ct, tmp, _UU(name), value_str);
  11519. Free(tmp);
  11520. }
  11521. }
  11522. FreePack(p);
  11523. CtFree(ct, c);
  11524. }
  11525. // Show the security policy list
  11526. void PrintPolicyList(CONSOLE *c, char *name)
  11527. {
  11528. UINT id;
  11529. // Validate arguments
  11530. if (c == NULL)
  11531. {
  11532. return;
  11533. }
  11534. if (IsEmptyStr(name))
  11535. {
  11536. name = NULL;
  11537. }
  11538. if (name != NULL)
  11539. {
  11540. id = PolicyStrToId(name);
  11541. if (id == INFINITE)
  11542. {
  11543. // Invalid ID
  11544. c->Write(c, _UU("CMD_PolicyList_Invalid_Name"));
  11545. }
  11546. else
  11547. {
  11548. wchar_t tmp[MAX_SIZE];
  11549. wchar_t tmp2[MAX_SIZE];
  11550. char name1[64], name2[64];
  11551. wchar_t *title, *descript;
  11552. wchar_t policy_name[MAX_SIZE];
  11553. Format(name1, sizeof(name1), "POL_%u", id);
  11554. Format(name2, sizeof(name2), "POL_EX_%u", id);
  11555. title = _UU(name1);
  11556. descript = _UU(name2);
  11557. StrToUni(policy_name, sizeof(policy_name), PolicyIdToStr(id));
  11558. // Policy name
  11559. c->Write(c, _UU("CMD_PolicyList_Help_1"));
  11560. UniFormat(tmp2, sizeof(tmp2), L" %s", policy_name);
  11561. c->Write(c, tmp2);
  11562. c->Write(c, L"");
  11563. // Simple description of the policy
  11564. c->Write(c, _UU("CMD_PolicyList_Help_2"));
  11565. UniFormat(tmp2, sizeof(tmp2), L" %s", title);
  11566. c->Write(c, tmp2);
  11567. c->Write(c, L"");
  11568. // Range of the value that can be set
  11569. GetPolicyValueRangeStr(tmp, sizeof(tmp), id);
  11570. c->Write(c, _UU("CMD_PolicyList_Help_3"));
  11571. UniFormat(tmp2, sizeof(tmp2), L" %s", tmp);
  11572. c->Write(c, tmp2);
  11573. c->Write(c, L"");
  11574. // Default value
  11575. FormatPolicyValue(tmp, sizeof(tmp), id, GetPolicyItem(id)->DefaultValue);
  11576. c->Write(c, _UU("CMD_PolicyList_Help_4"));
  11577. UniFormat(tmp2, sizeof(tmp2), L" %s", tmp);
  11578. c->Write(c, tmp2);
  11579. c->Write(c, L"");
  11580. // Detailed description of the policy
  11581. c->Write(c, _UU("CMD_PolicyList_Help_5"));
  11582. c->Write(c, descript);
  11583. c->Write(c, L"");
  11584. }
  11585. }
  11586. else
  11587. {
  11588. UINT i;
  11589. CT *ct = CtNew();
  11590. CtInsertColumn(ct, _UU("CMD_PolicyList_Column_1"), false);
  11591. CtInsertColumn(ct, _UU("CMD_PolicyList_Column_2"), false);
  11592. // Show the list of all policies
  11593. for (i = 0; i < PolicyNum();i++)
  11594. {
  11595. char name[64];
  11596. wchar_t *tmp;
  11597. tmp = CopyStrToUni(PolicyIdToStr(i));
  11598. Format(name, sizeof(name), "POL_%u", i);
  11599. CtInsert(ct, tmp, _UU(name));
  11600. Free(tmp);
  11601. }
  11602. CtFree(ct, c);
  11603. }
  11604. }
  11605. // Editing the contents of the policy
  11606. bool EditPolicy(CONSOLE *c, POLICY *pol, char *name, char *value, bool cascade_mode)
  11607. {
  11608. PACK *p;
  11609. ELEMENT *e;
  11610. POLICY_ITEM *item;
  11611. UINT id;
  11612. wchar_t tmp[MAX_SIZE];
  11613. wchar_t tmp2[MAX_SIZE];
  11614. char pack_name[128];
  11615. // Validate arguments
  11616. if (c == NULL || pol == NULL || name == NULL || value == NULL)
  11617. {
  11618. return false;
  11619. }
  11620. p = NewPack();
  11621. OutRpcPolicy(p, pol);
  11622. Format(pack_name, sizeof(pack_name), "policy:%s", PolicyIdToStr(PolicyStrToId(name)));
  11623. if ((e = GetElement(p, pack_name, VALUE_INT)) == NULL || (id = PolicyStrToId(name)) == INFINITE)
  11624. {
  11625. UniFormat(tmp, sizeof(tmp), _UU("CMD_CascadePolicySet_Invalid_Name"), name);
  11626. c->Write(c, tmp);
  11627. FreePack(p);
  11628. return false;
  11629. }
  11630. if (cascade_mode && (PolicyIsSupportedForCascade(id) == false))
  11631. {
  11632. UniFormat(tmp, sizeof(tmp), _UU("CMD_CascadePolicySet_Invalid_Name_For_Cadcade"), name);
  11633. c->Write(c, tmp);
  11634. FreePack(p);
  11635. return false;
  11636. }
  11637. item = GetPolicyItem(id);
  11638. if (item->TypeInt == false)
  11639. {
  11640. // bool type
  11641. e->values[0]->IntValue = (
  11642. StartWith(value, "y") || StartWith(value, "t") ||
  11643. ToInt(value) != 0) ? 1 : 0;
  11644. }
  11645. else
  11646. {
  11647. UINT n = ToInt(value);
  11648. bool b = true;
  11649. // int type
  11650. GetPolicyValueRangeStr(tmp, sizeof(tmp), id);
  11651. if (item->AllowZero == false)
  11652. {
  11653. if (n == 0)
  11654. {
  11655. b = false;
  11656. }
  11657. }
  11658. if (n != 0 && (n < item->MinValue || n > item->MaxValue))
  11659. {
  11660. b = false;
  11661. }
  11662. if (b == false)
  11663. {
  11664. UniFormat(tmp2, sizeof(tmp2), _UU("CMD_CascadePolicySet_Invalid_Range"), PolicyIdToStr(id), tmp);
  11665. c->Write(c, tmp2);
  11666. FreePack(p);
  11667. return false;
  11668. }
  11669. e->values[0]->IntValue = n;
  11670. }
  11671. Zero(pol, sizeof(POLICY));
  11672. InRpcPolicy(pol, p);
  11673. FreePack(p);
  11674. return true;
  11675. }
  11676. // Show the list of the type of security policy and possible values
  11677. UINT PsPolicyList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11678. {
  11679. LIST *o;
  11680. PARAM args[] =
  11681. {
  11682. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11683. {"[name]", NULL, NULL, NULL, NULL}
  11684. };
  11685. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11686. if (o == NULL)
  11687. {
  11688. return ERR_INVALID_PARAMETER;
  11689. }
  11690. PrintPolicyList(c, GetParamStr(o, "[name]"));
  11691. FreeParamValueList(o);
  11692. return ERR_NO_ERROR;
  11693. }
  11694. // Set the security policy of the cascade session
  11695. UINT PsCascadePolicySet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11696. {
  11697. LIST *o;
  11698. PS *ps = (PS *)param;
  11699. UINT ret = 0;
  11700. RPC_CREATE_LINK t;
  11701. // Parameter list that can be specified
  11702. PARAM args[] =
  11703. {
  11704. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11705. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11706. {"NAME", CmdPrompt, _UU("CMD_CascadePolicySet_PROMPT_POLNAME"), CmdEvalNotEmpty, NULL},
  11707. {"VALUE", CmdPrompt, _UU("CMD_CascadePolicySet_PROMPT_POLVALUE"), CmdEvalNotEmpty, NULL},
  11708. };
  11709. // If virtual HUB is not selected, it's an error
  11710. if (ps->HubName == NULL)
  11711. {
  11712. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11713. return ERR_INVALID_PARAMETER;
  11714. }
  11715. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11716. if (o == NULL)
  11717. {
  11718. return ERR_INVALID_PARAMETER;
  11719. }
  11720. Zero(&t, sizeof(t));
  11721. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11722. t.ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  11723. UniStrCpy(t.ClientOption->AccountName, sizeof(t.ClientOption->AccountName), GetParamUniStr(o, "[name]"));
  11724. // RPC call
  11725. ret = ScGetLink(ps->Rpc, &t);
  11726. if (ret != ERR_NO_ERROR)
  11727. {
  11728. // An error has occured
  11729. CmdPrintError(c, ret);
  11730. FreeParamValueList(o);
  11731. return ret;
  11732. }
  11733. else
  11734. {
  11735. if (EditPolicy(c, &t.Policy, GetParamStr(o, "NAME"), GetParamStr(o, "VALUE"), true) == false)
  11736. {
  11737. // An error has occured
  11738. FreeRpcCreateLink(&t);
  11739. FreeParamValueList(o);
  11740. return ERR_INTERNAL_ERROR;
  11741. }
  11742. ret = ScSetLink(ps->Rpc, &t);
  11743. if (ret != ERR_NO_ERROR)
  11744. {
  11745. // An error has occured
  11746. CmdPrintError(c, ret);
  11747. FreeParamValueList(o);
  11748. return ret;
  11749. }
  11750. FreeRpcCreateLink(&t);
  11751. }
  11752. FreeParamValueList(o);
  11753. return 0;
  11754. }
  11755. // Display the status information of the session
  11756. void CmdPrintStatusToListView(CT *ct, RPC_CLIENT_GET_CONNECTION_STATUS *s)
  11757. {
  11758. CmdPrintStatusToListViewEx(ct, s, false);
  11759. }
  11760. void CmdPrintStatusToListViewEx(CT *ct, RPC_CLIENT_GET_CONNECTION_STATUS *s, bool server_mode)
  11761. {
  11762. wchar_t tmp[MAX_SIZE];
  11763. char str[MAX_SIZE];
  11764. char vv[128];
  11765. // Validate arguments
  11766. if (s == NULL)
  11767. {
  11768. return;
  11769. }
  11770. if (server_mode == false)
  11771. {
  11772. CtInsert(ct, _UU("CM_ST_ACCOUNT_NAME"), s->AccountName);
  11773. if (s->Connected == false)
  11774. {
  11775. wchar_t *st = _UU("CM_ST_CONNECTED_FALSE");
  11776. switch (s->SessionStatus)
  11777. {
  11778. case CLIENT_STATUS_CONNECTING:
  11779. st = _UU("CM_ST_CONNECTING");
  11780. break;
  11781. case CLIENT_STATUS_NEGOTIATION:
  11782. st = _UU("CM_ST_NEGOTIATION");
  11783. break;
  11784. case CLIENT_STATUS_AUTH:
  11785. st = _UU("CM_ST_AUTH");
  11786. break;
  11787. case CLIENT_STATUS_ESTABLISHED:
  11788. st = _UU("CM_ST_ESTABLISHED");
  11789. break;
  11790. case CLIENT_STATUS_RETRY:
  11791. st = _UU("CM_ST_RETRY");
  11792. break;
  11793. case CLIENT_STATUS_IDLE:
  11794. st = _UU("CM_ST_IDLE");
  11795. break;
  11796. }
  11797. CtInsert(ct, _UU("CM_ST_CONNECTED"), st);
  11798. }
  11799. else
  11800. {
  11801. CtInsert(ct, _UU("CM_ST_CONNECTED"), _UU("CM_ST_CONNECTED_TRUE"));
  11802. }
  11803. }
  11804. if (s->Connected)
  11805. {
  11806. if (s->VLanId == 0)
  11807. {
  11808. UniStrCpy(tmp, sizeof(tmp), _UU("CM_ST_NO_VLAN"));
  11809. }
  11810. else
  11811. {
  11812. UniToStru(tmp, s->VLanId);
  11813. }
  11814. CtInsert(ct, _UU("CM_ST_VLAN_ID"), tmp);
  11815. if (server_mode == false)
  11816. {
  11817. StrToUni(tmp, sizeof(tmp), s->ServerName);
  11818. CtInsert(ct, _UU("CM_ST_SERVER_NAME"), tmp);
  11819. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_PORT_TCP"), s->ServerPort);
  11820. CtInsert(ct, _UU("CM_ST_SERVER_PORT"), tmp);
  11821. }
  11822. StrToUni(tmp, sizeof(tmp), s->ServerProductName);
  11823. CtInsert(ct, _UU("CM_ST_SERVER_P_NAME"), tmp);
  11824. UniFormat(tmp, sizeof(tmp), L"%u.%02u", s->ServerProductVer / 100, s->ServerProductVer % 100);
  11825. CtInsert(ct, _UU("CM_ST_SERVER_P_VER"), tmp);
  11826. UniFormat(tmp, sizeof(tmp), L"Build %u", s->ServerProductBuild);
  11827. CtInsert(ct, _UU("CM_ST_SERVER_P_BUILD"), tmp);
  11828. }
  11829. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(s->StartTime), NULL);
  11830. CtInsert(ct, _UU("CM_ST_START_TIME"), tmp);
  11831. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(s->FirstConnectionEstablisiedTime), NULL);
  11832. CtInsert(ct, _UU("CM_ST_FIRST_ESTAB_TIME"), s->FirstConnectionEstablisiedTime == 0 ? _UU("CM_ST_NONE") : tmp);
  11833. if (s->Connected)
  11834. {
  11835. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(s->CurrentConnectionEstablishTime), NULL);
  11836. CtInsert(ct, _UU("CM_ST_CURR_ESTAB_TIME"), tmp);
  11837. }
  11838. if (server_mode == false)
  11839. {
  11840. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_NUM_STR"), s->NumConnectionsEatablished);
  11841. CtInsert(ct, _UU("CM_ST_NUM_ESTABLISHED"), tmp);
  11842. }
  11843. if (s->Connected)
  11844. {
  11845. CtInsert(ct, _UU("CM_ST_HALF_CONNECTION"), s->HalfConnection ? _UU("CM_ST_HALF_TRUE") : _UU("CM_ST_HALF_FALSE"));
  11846. CtInsert(ct, _UU("CM_ST_QOS"), s->QoS ? _UU("CM_ST_QOS_TRUE") : _UU("CM_ST_QOS_FALSE"));
  11847. UniFormat(tmp, sizeof(tmp), L"%u", s->NumTcpConnections);
  11848. CtInsert(ct, _UU("CM_ST_NUM_TCP"), tmp);
  11849. if (s->HalfConnection)
  11850. {
  11851. UniFormat(tmp, sizeof(tmp), L"%u", s->NumTcpConnectionsUpload);
  11852. CtInsert(ct, _UU("CM_ST_NUM_TCP_UPLOAD"), tmp);
  11853. UniFormat(tmp, sizeof(tmp), L"%u", s->NumTcpConnectionsDownload);
  11854. CtInsert(ct, _UU("CM_ST_NUM_TCP_DOWNLOAD"), tmp);
  11855. }
  11856. UniFormat(tmp, sizeof(tmp), L"%u", s->MaxTcpConnections);
  11857. CtInsert(ct, _UU("CM_ST_MAX_TCP"), tmp);
  11858. if (s->UseEncrypt == false)
  11859. {
  11860. UniStrCpy(tmp, sizeof(tmp), _UU("CM_ST_USE_ENCRYPT_FALSE"));
  11861. }
  11862. else
  11863. {
  11864. if (StrLen(s->CipherName) != 0)
  11865. {
  11866. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_USE_ENCRYPT_TRUE"), s->CipherName);
  11867. }
  11868. else
  11869. {
  11870. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_USE_ENCRYPT_TRUE2"));
  11871. }
  11872. }
  11873. CtInsert(ct, _UU("CM_ST_USE_ENCRYPT"), tmp);
  11874. if (s->UseCompress)
  11875. {
  11876. UINT percent = 0;
  11877. if ((s->TotalRecvSize + s->TotalSendSize) > 0)
  11878. {
  11879. percent = (UINT)((UINT64)100 - (UINT64)(s->TotalRecvSizeReal + s->TotalSendSizeReal) * (UINT64)100 /
  11880. (s->TotalRecvSize + s->TotalSendSize));
  11881. percent = MAKESURE(percent, 0, 100);
  11882. }
  11883. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_COMPRESS_TRUE"), percent);
  11884. }
  11885. else
  11886. {
  11887. UniStrCpy(tmp, sizeof(tmp), _UU("CM_ST_COMPRESS_FALSE"));
  11888. }
  11889. CtInsert(ct, _UU("CM_ST_USE_COMPRESS"), tmp);
  11890. if (IsEmptyStr(s->UnderlayProtocol) == false)
  11891. {
  11892. StrToUni(tmp, sizeof(tmp), s->UnderlayProtocol);
  11893. CtInsert(ct, _UU("CM_ST_UNDERLAY_PROTOCOL"), tmp);
  11894. }
  11895. CtInsert(ct, _UU("CM_ST_UDP_ACCEL_ENABLED"), (s->IsUdpAccelerationEnabled ? _UU("CM_ST_YES") : _UU("CM_ST_NO")));
  11896. CtInsert(ct, _UU("CM_ST_UDP_ACCEL_USING"), (s->IsUsingUdpAcceleration ? _UU("CM_ST_YES") : _UU("CM_ST_NO")));
  11897. StrToUni(tmp, sizeof(tmp), s->SessionName);
  11898. CtInsert(ct, _UU("CM_ST_SESSION_NAME"), tmp);
  11899. StrToUni(tmp, sizeof(tmp), s->ConnectionName);
  11900. if (UniStrCmpi(tmp, L"INITING") != 0)
  11901. {
  11902. CtInsert(ct, _UU("CM_ST_CONNECTION_NAME"), tmp);
  11903. }
  11904. BinToStr(str, sizeof(str), s->SessionKey, sizeof(s->SessionKey));
  11905. StrToUni(tmp, sizeof(tmp), str);
  11906. CtInsert(ct, _UU("CM_ST_SESSION_KEY"), tmp);
  11907. CtInsert(ct, _UU("CM_ST_BRIDGE_MODE"), s->IsBridgeMode ? _UU("CM_ST_YES") : _UU("CM_ST_NO"));
  11908. CtInsert(ct, _UU("CM_ST_MONITOR_MODE"), s->IsMonitorMode ? _UU("CM_ST_YES") : _UU("CM_ST_NO"));
  11909. ToStr3(vv, sizeof(vv), s->TotalSendSize);
  11910. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_SIZE_BYTE_STR"), vv);
  11911. CtInsert(ct, _UU("CM_ST_SEND_SIZE"), tmp);
  11912. ToStr3(vv, sizeof(vv), s->TotalRecvSize);
  11913. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_SIZE_BYTE_STR"), vv);
  11914. CtInsert(ct, _UU("CM_ST_RECV_SIZE"), tmp);
  11915. ToStr3(vv, sizeof(vv), s->Traffic.Send.UnicastCount);
  11916. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_NUM_PACKET_STR"), vv);
  11917. CtInsert(ct, _UU("CM_ST_SEND_UCAST_NUM"), tmp);
  11918. ToStr3(vv, sizeof(vv), s->Traffic.Send.UnicastBytes);
  11919. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_SIZE_BYTE_STR"), vv);
  11920. CtInsert(ct, _UU("CM_ST_SEND_UCAST_SIZE"), tmp);
  11921. ToStr3(vv, sizeof(vv), s->Traffic.Send.BroadcastCount);
  11922. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_NUM_PACKET_STR"), vv);
  11923. CtInsert(ct, _UU("CM_ST_SEND_BCAST_NUM"), tmp);
  11924. ToStr3(vv, sizeof(vv), s->Traffic.Send.BroadcastBytes);
  11925. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_SIZE_BYTE_STR"), vv);
  11926. CtInsert(ct, _UU("CM_ST_SEND_BCAST_SIZE"), tmp);
  11927. ToStr3(vv, sizeof(vv), s->Traffic.Recv.UnicastCount);
  11928. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_NUM_PACKET_STR"), vv);
  11929. CtInsert(ct, _UU("CM_ST_RECV_UCAST_NUM"), tmp);
  11930. ToStr3(vv, sizeof(vv), s->Traffic.Recv.UnicastBytes);
  11931. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_SIZE_BYTE_STR"), vv);
  11932. CtInsert(ct, _UU("CM_ST_RECV_UCAST_SIZE"), tmp);
  11933. ToStr3(vv, sizeof(vv), s->Traffic.Recv.BroadcastCount);
  11934. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_NUM_PACKET_STR"), vv);
  11935. CtInsert(ct, _UU("CM_ST_RECV_BCAST_NUM"), tmp);
  11936. ToStr3(vv, sizeof(vv), s->Traffic.Recv.BroadcastBytes);
  11937. UniFormat(tmp, sizeof(tmp), _UU("CM_ST_SIZE_BYTE_STR"), vv);
  11938. CtInsert(ct, _UU("CM_ST_RECV_BCAST_SIZE"), tmp);
  11939. }
  11940. }
  11941. // Get the current state of the cascade connection
  11942. UINT PsCascadeStatusGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11943. {
  11944. LIST *o;
  11945. PS *ps = (PS *)param;
  11946. UINT ret = 0;
  11947. RPC_LINK_STATUS t;
  11948. // Parameter list that can be specified
  11949. PARAM args[] =
  11950. {
  11951. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11952. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  11953. };
  11954. // If virtual HUB is not selected, it's an error
  11955. if (ps->HubName == NULL)
  11956. {
  11957. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  11958. return ERR_INVALID_PARAMETER;
  11959. }
  11960. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  11961. if (o == NULL)
  11962. {
  11963. return ERR_INVALID_PARAMETER;
  11964. }
  11965. Zero(&t, sizeof(t));
  11966. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  11967. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  11968. // RPC call
  11969. ret = ScGetLinkStatus(ps->Rpc, &t);
  11970. if (ret != ERR_NO_ERROR)
  11971. {
  11972. // An error has occured
  11973. CmdPrintError(c, ret);
  11974. FreeParamValueList(o);
  11975. return ret;
  11976. }
  11977. else
  11978. {
  11979. // Get the cascade connection state
  11980. CT *ct = CtNewStandard();
  11981. CmdPrintStatusToListView(ct, &t.Status);
  11982. CtFree(ct, c);
  11983. FreeRpcLinkStatus(&t);
  11984. }
  11985. FreeParamValueList(o);
  11986. return 0;
  11987. }
  11988. // Rename the cascade connection
  11989. UINT PsCascadeRename(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  11990. {
  11991. LIST *o;
  11992. PS *ps = (PS *)param;
  11993. UINT ret = 0;
  11994. RPC_RENAME_LINK t;
  11995. // Parameter list that can be specified
  11996. PARAM args[] =
  11997. {
  11998. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  11999. {"[name]", CmdPrompt, _UU("CMD_CascadeRename_PROMPT_OLD"), CmdEvalNotEmpty, NULL},
  12000. {"NEW", CmdPrompt, _UU("CMD_CascadeRename_PROMPT_NEW"), CmdEvalNotEmpty, NULL},
  12001. };
  12002. // If virtual HUB is not selected, it's an error
  12003. if (ps->HubName == NULL)
  12004. {
  12005. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12006. return ERR_INVALID_PARAMETER;
  12007. }
  12008. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12009. if (o == NULL)
  12010. {
  12011. return ERR_INVALID_PARAMETER;
  12012. }
  12013. Zero(&t, sizeof(t));
  12014. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12015. UniStrCpy(t.NewAccountName, sizeof(t.NewAccountName), GetParamUniStr(o, "NEW"));
  12016. UniStrCpy(t.OldAccountName, sizeof(t.OldAccountName), GetParamUniStr(o, "[name]"));
  12017. // RPC call
  12018. ret = ScRenameLink(ps->Rpc, &t);
  12019. if (ret != ERR_NO_ERROR)
  12020. {
  12021. // An error has occured
  12022. CmdPrintError(c, ret);
  12023. FreeParamValueList(o);
  12024. return ret;
  12025. }
  12026. FreeParamValueList(o);
  12027. return 0;
  12028. }
  12029. // Set the cascade connection to on-line state
  12030. UINT PsCascadeOnline(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12031. {
  12032. LIST *o;
  12033. PS *ps = (PS *)param;
  12034. UINT ret = 0;
  12035. RPC_LINK t;
  12036. // Parameter list that can be specified
  12037. PARAM args[] =
  12038. {
  12039. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12040. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  12041. };
  12042. // If virtual HUB is not selected, it's an error
  12043. if (ps->HubName == NULL)
  12044. {
  12045. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12046. return ERR_INVALID_PARAMETER;
  12047. }
  12048. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12049. if (o == NULL)
  12050. {
  12051. return ERR_INVALID_PARAMETER;
  12052. }
  12053. Zero(&t, sizeof(t));
  12054. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12055. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  12056. // RPC call
  12057. ret = ScSetLinkOnline(ps->Rpc, &t);
  12058. if (ret != ERR_NO_ERROR)
  12059. {
  12060. // An error has occured
  12061. CmdPrintError(c, ret);
  12062. FreeParamValueList(o);
  12063. return ret;
  12064. }
  12065. FreeParamValueList(o);
  12066. return 0;
  12067. }
  12068. // Set the cascade connection to the off-line state
  12069. UINT PsCascadeOffline(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12070. {
  12071. LIST *o;
  12072. PS *ps = (PS *)param;
  12073. UINT ret = 0;
  12074. RPC_LINK t;
  12075. // Parameter list that can be specified
  12076. PARAM args[] =
  12077. {
  12078. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12079. {"[name]", CmdPrompt, _UU("CMD_CascadeCreate_Prompt_Name"), CmdEvalNotEmpty, NULL},
  12080. };
  12081. // If virtual HUB is not selected, it's an error
  12082. if (ps->HubName == NULL)
  12083. {
  12084. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12085. return ERR_INVALID_PARAMETER;
  12086. }
  12087. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12088. if (o == NULL)
  12089. {
  12090. return ERR_INVALID_PARAMETER;
  12091. }
  12092. Zero(&t, sizeof(t));
  12093. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12094. UniStrCpy(t.AccountName, sizeof(t.AccountName), GetParamUniStr(o, "[name]"));
  12095. // RPC call
  12096. ret = ScSetLinkOffline(ps->Rpc, &t);
  12097. if (ret != ERR_NO_ERROR)
  12098. {
  12099. // An error has occured
  12100. CmdPrintError(c, ret);
  12101. FreeParamValueList(o);
  12102. return ret;
  12103. }
  12104. FreeParamValueList(o);
  12105. return 0;
  12106. }
  12107. // Convert the string to pass / discard flag
  12108. bool StrToPassOrDiscard(char *str)
  12109. {
  12110. // Validate arguments
  12111. if (str == NULL)
  12112. {
  12113. return false;
  12114. }
  12115. if (ToInt(str) != 0)
  12116. {
  12117. return true;
  12118. }
  12119. if (StartWith(str, "p") || StartWith(str, "y") || StartWith(str, "t"))
  12120. {
  12121. return true;
  12122. }
  12123. return false;
  12124. }
  12125. // Convert the string to the protocol
  12126. UINT StrToProtocol(char *str)
  12127. {
  12128. if (IsEmptyStr(str))
  12129. {
  12130. return 0;
  12131. }
  12132. if (StartWith("ip", str))
  12133. {
  12134. return 0;
  12135. }
  12136. else if (StartWith("tcp", str))
  12137. {
  12138. return IP_PROTO_TCP;
  12139. }
  12140. else if (StartWith("udp", str))
  12141. {
  12142. return IP_PROTO_UDP;
  12143. }
  12144. else if (StartWith("icmpv4", str))
  12145. {
  12146. return IP_PROTO_ICMPV4;
  12147. }
  12148. else if (StartWith("icmpv6", str))
  12149. {
  12150. return IP_PROTO_ICMPV6;
  12151. }
  12152. if (ToInt(str) == 0)
  12153. {
  12154. if (StrCmpi(str, "0") == 0)
  12155. {
  12156. return 0;
  12157. }
  12158. else
  12159. {
  12160. return INFINITE;
  12161. }
  12162. }
  12163. if (ToInt(str) >= 256)
  12164. {
  12165. return INFINITE;
  12166. }
  12167. return ToInt(str);
  12168. }
  12169. // Check the protocol name
  12170. bool CmdEvalProtocol(CONSOLE *c, wchar_t *str, void *param)
  12171. {
  12172. char tmp[64];
  12173. // Validate arguments
  12174. if (c == NULL || str == NULL)
  12175. {
  12176. return false;
  12177. }
  12178. UniToStr(tmp, sizeof(tmp), str);
  12179. if (StrToProtocol(tmp) == INFINITE)
  12180. {
  12181. c->Write(c, _UU("CMD_PROTOCOL_EVAL_FAILED"));
  12182. return false;
  12183. }
  12184. return true;
  12185. }
  12186. // Parse the port range
  12187. bool ParsePortRange(char *str, UINT *start, UINT *end)
  12188. {
  12189. UINT a = 0, b = 0;
  12190. TOKEN_LIST *t;
  12191. // Validate arguments
  12192. if (str == NULL)
  12193. {
  12194. return false;
  12195. }
  12196. if (IsEmptyStr(str) == false)
  12197. {
  12198. t = ParseToken(str, "\t -");
  12199. if (t->NumTokens == 1)
  12200. {
  12201. a = b = ToInt(t->Token[0]);
  12202. }
  12203. else if (t->NumTokens == 2)
  12204. {
  12205. a = ToInt(t->Token[0]);
  12206. b = ToInt(t->Token[1]);
  12207. }
  12208. FreeToken(t);
  12209. if (a > b)
  12210. {
  12211. return false;
  12212. }
  12213. if (a >= 65536 || b >= 65536)
  12214. {
  12215. return false;
  12216. }
  12217. if (a == 0 && b != 0)
  12218. {
  12219. return false;
  12220. }
  12221. }
  12222. if (start != NULL)
  12223. {
  12224. *start = a;
  12225. }
  12226. if (end != NULL)
  12227. {
  12228. *end = b;
  12229. }
  12230. return true;
  12231. }
  12232. // Check the port range
  12233. bool CmdEvalPortRange(CONSOLE *c, wchar_t *str, void *param)
  12234. {
  12235. char tmp[64];
  12236. // Validate arguments
  12237. if (c == NULL || str == NULL)
  12238. {
  12239. return false;
  12240. }
  12241. UniToStr(tmp, sizeof(tmp), str);
  12242. if (ParsePortRange(tmp, NULL, NULL) == false)
  12243. {
  12244. c->Write(c, _UU("CMD_PORT_RANGE_EVAL_FAILED"));
  12245. return false;
  12246. }
  12247. return true;
  12248. }
  12249. // Parse the MAC address and the mask
  12250. bool ParseMacAddressAndMask(char *src, bool *check_mac, UCHAR *mac_bin, UCHAR *mask_bin)
  12251. {
  12252. TOKEN_LIST *t;
  12253. char *macstr, *maskstr;
  12254. UCHAR mac[6], mask[6];
  12255. bool ok = false;
  12256. // Validate arguments
  12257. if (src == NULL)
  12258. {
  12259. return false;
  12260. }
  12261. //Zero(mac, sizeof(mac));
  12262. //Zero(mask, sizeof(mask));
  12263. if(check_mac != NULL && mac_bin != NULL && mask_bin != NULL)
  12264. {
  12265. ok = true;
  12266. }
  12267. if(IsEmptyStr(src) != false)
  12268. {
  12269. if(ok != false)
  12270. {
  12271. *check_mac = false;
  12272. Zero(mac_bin, 6);
  12273. Zero(mask_bin, 6);
  12274. }
  12275. return true;
  12276. }
  12277. t = ParseToken(src, "/");
  12278. if(t->NumTokens != 2)
  12279. {
  12280. FreeToken(t);
  12281. return false;
  12282. }
  12283. macstr = t->Token[0];
  12284. maskstr = t->Token[1];
  12285. Trim(macstr);
  12286. Trim(maskstr);
  12287. if(StrToMac(mac, macstr) == false || StrToMac(mask, maskstr) == false)
  12288. {
  12289. FreeToken(t);
  12290. return false;
  12291. }
  12292. else
  12293. {
  12294. if(ok != false)
  12295. {
  12296. Copy(mac_bin, mac, 6);
  12297. Copy(mask_bin, mask, 6);
  12298. *check_mac = true;
  12299. }
  12300. }
  12301. FreeToken(t);
  12302. return true;
  12303. }
  12304. // Check the MAC address and mask
  12305. bool CmdEvalMacAddressAndMask(CONSOLE *c, wchar_t *str, void *param)
  12306. {
  12307. char tmp[64];
  12308. // Validate arguments
  12309. if(c == NULL || str == NULL)
  12310. {
  12311. return false;
  12312. }
  12313. UniToStr(tmp, sizeof(tmp), str);
  12314. if(ParseMacAddressAndMask(tmp, NULL, NULL, NULL) == false)
  12315. {
  12316. c->Write(c, _UU("CMD_MAC_ADDRESS_AND_MASK_EVAL_FAILED"));
  12317. return false;
  12318. }
  12319. return true;
  12320. }
  12321. // Parse the status of TCP connection
  12322. bool ParseTcpState(char *src, bool *check_tcp_state, bool *established)
  12323. {
  12324. bool ok = false;
  12325. // Validate arguments
  12326. if(src == NULL)
  12327. {
  12328. return false;
  12329. }
  12330. if(check_tcp_state != NULL && established != NULL)
  12331. {
  12332. ok = true;
  12333. }
  12334. if (IsEmptyStr(src) == false)
  12335. {
  12336. if (StartWith("Established", src) == 0)
  12337. {
  12338. if(ok != false)
  12339. {
  12340. *check_tcp_state = true;
  12341. *established = true;
  12342. }
  12343. }
  12344. else if (StartWith("Unestablished", src) == 0)
  12345. {
  12346. if(ok != false)
  12347. {
  12348. *check_tcp_state = true;
  12349. *established = false;
  12350. }
  12351. }
  12352. else
  12353. {
  12354. // Illegal string
  12355. return false;
  12356. }
  12357. }
  12358. else
  12359. {
  12360. if(ok != false)
  12361. {
  12362. *check_tcp_state = false;
  12363. *established = false;
  12364. }
  12365. }
  12366. return true;
  12367. }
  12368. // Check the status of the TCP connection
  12369. bool CmdEvalTcpState(CONSOLE *c, wchar_t *str, void *param)
  12370. {
  12371. char tmp[64];
  12372. // Validate arguments
  12373. if(c == NULL || str == NULL)
  12374. {
  12375. return false;
  12376. }
  12377. UniToStr(tmp, sizeof(tmp), str);
  12378. if(ParseTcpState(tmp, NULL, NULL) == false)
  12379. {
  12380. c->Write(c, _UU("CMD_TCP_CONNECTION_STATE_EVAL_FAILED"));
  12381. return false;
  12382. }
  12383. return true;
  12384. }
  12385. // Adding a rule to the access list (Standard, IPv4)
  12386. UINT PsAccessAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12387. {
  12388. LIST *o;
  12389. PS *ps = (PS *)param;
  12390. UINT ret = 0;
  12391. RPC_ADD_ACCESS t;
  12392. ACCESS *a;
  12393. // Parameter list that can be specified
  12394. CMD_EVAL_MIN_MAX minmax =
  12395. {
  12396. "CMD_AccessAdd_Eval_PRIORITY", 1, 4294967295UL,
  12397. };
  12398. PARAM args[] =
  12399. {
  12400. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12401. {"[pass|discard]", CmdPrompt, _UU("CMD_AccessAdd_Prompt_TYPE"), CmdEvalNotEmpty, NULL},
  12402. {"MEMO", CmdPrompt, _UU("CMD_AccessAdd_Prompt_MEMO"), NULL, NULL},
  12403. {"PRIORITY", CmdPrompt, _UU("CMD_AccessAdd_Prompt_PRIORITY"), CmdEvalMinMax, &minmax},
  12404. {"SRCUSERNAME", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCUSERNAME"), NULL, NULL},
  12405. {"DESTUSERNAME", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTUSERNAME"), NULL, NULL},
  12406. {"SRCMAC", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCMAC"), CmdEvalMacAddressAndMask, NULL},
  12407. {"DESTMAC", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTMAC"), CmdEvalMacAddressAndMask, NULL},
  12408. {"SRCIP", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCIP"), CmdEvalIpAndMask4, NULL},
  12409. {"DESTIP", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTIP"), CmdEvalIpAndMask4, NULL},
  12410. {"PROTOCOL", CmdPrompt, _UU("CMD_AccessAdd_Prompt_PROTOCOL"), CmdEvalProtocol, NULL},
  12411. {"SRCPORT", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCPORT"), CmdEvalPortRange, NULL},
  12412. {"DESTPORT", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTPORT"), CmdEvalPortRange, NULL},
  12413. {"TCPSTATE", CmdPrompt, _UU("CMD_AccessAdd_Prompt_TCPSTATE"), CmdEvalTcpState, NULL},
  12414. };
  12415. // If virtual HUB is not selected, it's an error
  12416. if (ps->HubName == NULL)
  12417. {
  12418. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12419. return ERR_INVALID_PARAMETER;
  12420. }
  12421. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12422. if (o == NULL)
  12423. {
  12424. return ERR_INVALID_PARAMETER;
  12425. }
  12426. Zero(&t, sizeof(t));
  12427. a = &t.Access;
  12428. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12429. UniStrCpy(a->Note, sizeof(a->Note), GetParamUniStr(o, "MEMO"));
  12430. a->Active = true;
  12431. a->Priority = GetParamInt(o, "PRIORITY");
  12432. a->Discard = StrToPassOrDiscard(GetParamStr(o, "[pass|discard]")) ? false : true;
  12433. StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
  12434. StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
  12435. ParseMacAddressAndMask(GetParamStr(o, "SRCMAC"), &a->CheckSrcMac, a->SrcMacAddress, a->SrcMacMask);
  12436. ParseMacAddressAndMask(GetParamStr(o, "DESTMAC"), &a->CheckDstMac, a->DstMacAddress, a->DstMacMask);
  12437. ParseIpAndMask4(GetParamStr(o, "SRCIP"), &a->SrcIpAddress, &a->SrcSubnetMask);
  12438. ParseIpAndMask4(GetParamStr(o, "DESTIP"), &a->DestIpAddress, &a->DestSubnetMask);
  12439. a->Protocol = StrToProtocol(GetParamStr(o, "PROTOCOL"));
  12440. ParsePortRange(GetParamStr(o, "SRCPORT"), &a->SrcPortStart, &a->SrcPortEnd);
  12441. ParsePortRange(GetParamStr(o, "DESTPORT"), &a->DestPortStart, &a->DestPortEnd);
  12442. ParseTcpState(GetParamStr(o, "TCPSTATE"), &a->CheckTcpState, &a->Established);
  12443. // RPC call
  12444. ret = ScAddAccess(ps->Rpc, &t);
  12445. if (ret != ERR_NO_ERROR)
  12446. {
  12447. // An error has occured
  12448. CmdPrintError(c, ret);
  12449. FreeParamValueList(o);
  12450. return ret;
  12451. }
  12452. FreeParamValueList(o);
  12453. return 0;
  12454. }
  12455. // Adding a rule to the access list (Extended, IPv4)
  12456. UINT PsAccessAddEx(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12457. {
  12458. LIST *o;
  12459. PS *ps = (PS *)param;
  12460. UINT ret = 0;
  12461. RPC_ADD_ACCESS t;
  12462. ACCESS *a;
  12463. // Parameter list that can be specified
  12464. CMD_EVAL_MIN_MAX minmax =
  12465. {
  12466. "CMD_AccessAdd_Eval_PRIORITY", 1, 4294967295UL,
  12467. };
  12468. CMD_EVAL_MIN_MAX minmax_delay =
  12469. {
  12470. "CMD_AccessAddEx_Eval_DELAY", 0, HUB_ACCESSLIST_DELAY_MAX,
  12471. };
  12472. CMD_EVAL_MIN_MAX minmax_jitter =
  12473. {
  12474. "CMD_AccessAddEx_Eval_JITTER", 0, HUB_ACCESSLIST_JITTER_MAX,
  12475. };
  12476. CMD_EVAL_MIN_MAX minmax_loss =
  12477. {
  12478. "CMD_AccessAddEx_Eval_LOSS", 0, HUB_ACCESSLIST_LOSS_MAX,
  12479. };
  12480. PARAM args[] =
  12481. {
  12482. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12483. {"[pass|discard]", CmdPrompt, _UU("CMD_AccessAdd_Prompt_TYPE"), CmdEvalNotEmpty, NULL},
  12484. {"MEMO", CmdPrompt, _UU("CMD_AccessAdd_Prompt_MEMO"), NULL, NULL},
  12485. {"PRIORITY", CmdPrompt, _UU("CMD_AccessAdd_Prompt_PRIORITY"), CmdEvalMinMax, &minmax},
  12486. {"SRCUSERNAME", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCUSERNAME"), NULL, NULL},
  12487. {"DESTUSERNAME", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTUSERNAME"), NULL, NULL},
  12488. {"SRCMAC", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCMAC"), CmdEvalMacAddressAndMask, NULL},
  12489. {"DESTMAC", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTMAC"), CmdEvalMacAddressAndMask, NULL},
  12490. {"SRCIP", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCIP"), CmdEvalIpAndMask4, NULL},
  12491. {"DESTIP", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTIP"), CmdEvalIpAndMask4, NULL},
  12492. {"PROTOCOL", CmdPrompt, _UU("CMD_AccessAdd_Prompt_PROTOCOL"), CmdEvalProtocol, NULL},
  12493. {"SRCPORT", CmdPrompt, _UU("CMD_AccessAdd_Prompt_SRCPORT"), CmdEvalPortRange, NULL},
  12494. {"DESTPORT", CmdPrompt, _UU("CMD_AccessAdd_Prompt_DESTPORT"), CmdEvalPortRange, NULL},
  12495. {"TCPSTATE", CmdPrompt, _UU("CMD_AccessAdd_Prompt_TCPSTATE"), CmdEvalTcpState, NULL},
  12496. {"DELAY", CmdPrompt, _UU("CMD_AccessAddEx_Prompt_DELAY"), CmdEvalMinMax, &minmax_delay},
  12497. {"JITTER", CmdPrompt, _UU("CMD_AccessAddEx_Prompt_JITTER"), CmdEvalMinMax, &minmax_jitter},
  12498. {"LOSS", CmdPrompt, _UU("CMD_AccessAddEx_Prompt_LOSS"), CmdEvalMinMax, &minmax_loss},
  12499. {"REDIRECTURL", NULL, NULL, NULL, NULL},
  12500. };
  12501. // If virtual HUB is not selected, it's an error
  12502. if (ps->HubName == NULL)
  12503. {
  12504. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12505. return ERR_INVALID_PARAMETER;
  12506. }
  12507. // Check whether it is supported
  12508. if (GetCapsBool(ps->CapsList, "b_support_ex_acl") == false)
  12509. {
  12510. c->Write(c, _E(ERR_NOT_SUPPORTED));
  12511. return ERR_NOT_SUPPORTED;
  12512. }
  12513. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12514. if (o == NULL)
  12515. {
  12516. return ERR_INVALID_PARAMETER;
  12517. }
  12518. Zero(&t, sizeof(t));
  12519. a = &t.Access;
  12520. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12521. UniStrCpy(a->Note, sizeof(a->Note), GetParamUniStr(o, "MEMO"));
  12522. a->Active = true;
  12523. a->Priority = GetParamInt(o, "PRIORITY");
  12524. a->Discard = StrToPassOrDiscard(GetParamStr(o, "[pass|discard]")) ? false : true;
  12525. StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
  12526. StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
  12527. ParseMacAddressAndMask(GetParamStr(o, "SRCMAC"), &a->CheckSrcMac, a->SrcMacAddress, a->SrcMacMask);
  12528. ParseMacAddressAndMask(GetParamStr(o, "DESTMAC"), &a->CheckDstMac, a->DstMacAddress, a->DstMacMask);
  12529. ParseIpAndMask4(GetParamStr(o, "SRCIP"), &a->SrcIpAddress, &a->SrcSubnetMask);
  12530. ParseIpAndMask4(GetParamStr(o, "DESTIP"), &a->DestIpAddress, &a->DestSubnetMask);
  12531. a->Protocol = StrToProtocol(GetParamStr(o, "PROTOCOL"));
  12532. ParsePortRange(GetParamStr(o, "SRCPORT"), &a->SrcPortStart, &a->SrcPortEnd);
  12533. ParsePortRange(GetParamStr(o, "DESTPORT"), &a->DestPortStart, &a->DestPortEnd);
  12534. ParseTcpState(GetParamStr(o, "TCPSTATE"), &a->CheckTcpState, &a->Established);
  12535. a->Delay = GetParamInt(o, "DELAY");
  12536. a->Jitter = GetParamInt(o, "JITTER");
  12537. a->Loss = GetParamInt(o, "LOSS");
  12538. StrCpy(a->RedirectUrl, sizeof(a->RedirectUrl), GetParamStr(o, "REDIRECTURL"));
  12539. // RPC call
  12540. ret = ScAddAccess(ps->Rpc, &t);
  12541. if (ret != ERR_NO_ERROR)
  12542. {
  12543. // An error has occured
  12544. CmdPrintError(c, ret);
  12545. FreeParamValueList(o);
  12546. return ret;
  12547. }
  12548. FreeParamValueList(o);
  12549. return 0;
  12550. }
  12551. // Adding a rule to the access list (Standard, IPv6)
  12552. UINT PsAccessAdd6(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12553. {
  12554. LIST *o;
  12555. PS *ps = (PS *)param;
  12556. UINT ret = 0;
  12557. RPC_ADD_ACCESS t;
  12558. ACCESS *a;
  12559. IP ip, mask;
  12560. // Parameter list that can be specified
  12561. CMD_EVAL_MIN_MAX minmax =
  12562. {
  12563. "CMD_AccessAdd6_Eval_PRIORITY", 1, 4294967295UL,
  12564. };
  12565. PARAM args[] =
  12566. {
  12567. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12568. {"[pass|discard]", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_TYPE"), CmdEvalNotEmpty, NULL},
  12569. {"MEMO", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_MEMO"), NULL, NULL},
  12570. {"PRIORITY", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_PRIORITY"), CmdEvalMinMax, &minmax},
  12571. {"SRCUSERNAME", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCUSERNAME"), NULL, NULL},
  12572. {"DESTUSERNAME", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTUSERNAME"), NULL, NULL},
  12573. {"SRCMAC", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCMAC"), CmdEvalMacAddressAndMask, NULL},
  12574. {"DESTMAC", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTMAC"), CmdEvalMacAddressAndMask, NULL},
  12575. {"SRCIP", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCIP"), CmdEvalIpAndMask6, NULL},
  12576. {"DESTIP", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTIP"), CmdEvalIpAndMask6, NULL},
  12577. {"PROTOCOL", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_PROTOCOL"), CmdEvalProtocol, NULL},
  12578. {"SRCPORT", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCPORT"), CmdEvalPortRange, NULL},
  12579. {"DESTPORT", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTPORT"), CmdEvalPortRange, NULL},
  12580. {"TCPSTATE", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_TCPSTATE"), CmdEvalTcpState, NULL},
  12581. };
  12582. // If virtual HUB is not selected, it's an error
  12583. if (ps->HubName == NULL)
  12584. {
  12585. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12586. return ERR_INVALID_PARAMETER;
  12587. }
  12588. // Check whether it is supported
  12589. if (GetCapsBool(ps->CapsList, "b_support_ex_acl") == false)
  12590. {
  12591. c->Write(c, _E(ERR_NOT_SUPPORTED));
  12592. return ERR_NOT_SUPPORTED;
  12593. }
  12594. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12595. if (o == NULL)
  12596. {
  12597. return ERR_INVALID_PARAMETER;
  12598. }
  12599. Zero(&t, sizeof(t));
  12600. a = &t.Access;
  12601. a->IsIPv6 = true;
  12602. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12603. UniStrCpy(a->Note, sizeof(a->Note), GetParamUniStr(o, "MEMO"));
  12604. a->Active = true;
  12605. a->Priority = GetParamInt(o, "PRIORITY");
  12606. a->Discard = StrToPassOrDiscard(GetParamStr(o, "[pass|discard]")) ? false : true;
  12607. StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
  12608. StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
  12609. ParseMacAddressAndMask(GetParamStr(o, "SRCMAC"), &a->CheckSrcMac, a->SrcMacAddress, a->SrcMacMask);
  12610. ParseMacAddressAndMask(GetParamStr(o, "DESTMAC"), &a->CheckDstMac, a->DstMacAddress, a->DstMacMask);
  12611. Zero(&ip, sizeof(ip));
  12612. Zero(&mask, sizeof(mask));
  12613. ParseIpAndMask6(GetParamStr(o, "SRCIP"), &ip, &mask);
  12614. IPToIPv6Addr(&a->SrcIpAddress6, &ip);
  12615. IPToIPv6Addr(&a->SrcSubnetMask6, &mask);
  12616. ParseIpAndMask6(GetParamStr(o, "DESTIP"), &ip, &mask);
  12617. IPToIPv6Addr(&a->DestIpAddress6, &ip);
  12618. IPToIPv6Addr(&a->DestSubnetMask6, &mask);
  12619. a->Protocol = StrToProtocol(GetParamStr(o, "PROTOCOL"));
  12620. ParsePortRange(GetParamStr(o, "SRCPORT"), &a->SrcPortStart, &a->SrcPortEnd);
  12621. ParsePortRange(GetParamStr(o, "DESTPORT"), &a->DestPortStart, &a->DestPortEnd);
  12622. ParseTcpState(GetParamStr(o, "TCPSTATE"), &a->CheckTcpState, &a->Established);
  12623. // RPC call
  12624. ret = ScAddAccess(ps->Rpc, &t);
  12625. if (ret != ERR_NO_ERROR)
  12626. {
  12627. // An error has occured
  12628. CmdPrintError(c, ret);
  12629. FreeParamValueList(o);
  12630. return ret;
  12631. }
  12632. FreeParamValueList(o);
  12633. return 0;
  12634. }
  12635. // Adding a rule to the access list (Extended, IPv6)
  12636. UINT PsAccessAddEx6(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12637. {
  12638. LIST *o;
  12639. PS *ps = (PS *)param;
  12640. UINT ret = 0;
  12641. RPC_ADD_ACCESS t;
  12642. ACCESS *a;
  12643. IP ip, mask;
  12644. // Parameter list that can be specified
  12645. CMD_EVAL_MIN_MAX minmax =
  12646. {
  12647. "CMD_AccessAdd6_Eval_PRIORITY", 1, 4294967295UL,
  12648. };
  12649. CMD_EVAL_MIN_MAX minmax_delay =
  12650. {
  12651. "CMD_AccessAddEx6_Eval_DELAY", 0, HUB_ACCESSLIST_DELAY_MAX,
  12652. };
  12653. CMD_EVAL_MIN_MAX minmax_jitter =
  12654. {
  12655. "CMD_AccessAddEx6_Eval_JITTER", 0, HUB_ACCESSLIST_JITTER_MAX,
  12656. };
  12657. CMD_EVAL_MIN_MAX minmax_loss =
  12658. {
  12659. "CMD_AccessAddEx6_Eval_LOSS", 0, HUB_ACCESSLIST_LOSS_MAX,
  12660. };
  12661. PARAM args[] =
  12662. {
  12663. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12664. {"[pass|discard]", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_TYPE"), CmdEvalNotEmpty, NULL},
  12665. {"MEMO", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_MEMO"), NULL, NULL},
  12666. {"PRIORITY", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_PRIORITY"), CmdEvalMinMax, &minmax},
  12667. {"SRCUSERNAME", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCUSERNAME"), NULL, NULL},
  12668. {"DESTUSERNAME", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTUSERNAME"), NULL, NULL},
  12669. {"SRCMAC", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCMAC"), CmdEvalMacAddressAndMask, NULL},
  12670. {"DESTMAC", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTMAC"), CmdEvalMacAddressAndMask, NULL},
  12671. {"SRCIP", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCIP"), CmdEvalIpAndMask6, NULL},
  12672. {"DESTIP", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTIP"), CmdEvalIpAndMask6, NULL},
  12673. {"PROTOCOL", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_PROTOCOL"), CmdEvalProtocol, NULL},
  12674. {"SRCPORT", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_SRCPORT"), CmdEvalPortRange, NULL},
  12675. {"DESTPORT", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_DESTPORT"), CmdEvalPortRange, NULL},
  12676. {"TCPSTATE", CmdPrompt, _UU("CMD_AccessAdd6_Prompt_TCPSTATE"), CmdEvalTcpState, NULL},
  12677. {"DELAY", CmdPrompt, _UU("CMD_AccessAddEx6_Prompt_DELAY"), CmdEvalMinMax, &minmax_delay},
  12678. {"JITTER", CmdPrompt, _UU("CMD_AccessAddEx6_Prompt_JITTER"), CmdEvalMinMax, &minmax_jitter},
  12679. {"LOSS", CmdPrompt, _UU("CMD_AccessAddEx6_Prompt_LOSS"), CmdEvalMinMax, &minmax_loss},
  12680. {"REDIRECTURL", NULL, NULL, NULL, NULL},
  12681. };
  12682. // If virtual HUB is not selected, it's an error
  12683. if (ps->HubName == NULL)
  12684. {
  12685. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12686. return ERR_INVALID_PARAMETER;
  12687. }
  12688. // Check whether it is supported
  12689. if (GetCapsBool(ps->CapsList, "b_support_ex_acl") == false)
  12690. {
  12691. c->Write(c, _E(ERR_NOT_SUPPORTED));
  12692. return ERR_NOT_SUPPORTED;
  12693. }
  12694. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12695. if (o == NULL)
  12696. {
  12697. return ERR_INVALID_PARAMETER;
  12698. }
  12699. Zero(&t, sizeof(t));
  12700. a = &t.Access;
  12701. a->IsIPv6 = true;
  12702. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12703. UniStrCpy(a->Note, sizeof(a->Note), GetParamUniStr(o, "MEMO"));
  12704. a->Active = true;
  12705. a->Priority = GetParamInt(o, "PRIORITY");
  12706. a->Discard = StrToPassOrDiscard(GetParamStr(o, "[pass|discard]")) ? false : true;
  12707. StrCpy(a->SrcUsername, sizeof(a->SrcUsername), GetParamStr(o, "SRCUSERNAME"));
  12708. StrCpy(a->DestUsername, sizeof(a->DestUsername), GetParamStr(o, "DESTUSERNAME"));
  12709. ParseMacAddressAndMask(GetParamStr(o, "SRCMAC"), &a->CheckSrcMac, a->SrcMacAddress, a->SrcMacMask);
  12710. ParseMacAddressAndMask(GetParamStr(o, "DESTMAC"), &a->CheckDstMac, a->DstMacAddress, a->DstMacMask);
  12711. Zero(&ip, sizeof(ip));
  12712. Zero(&mask, sizeof(mask));
  12713. ParseIpAndMask6(GetParamStr(o, "SRCIP"), &ip, &mask);
  12714. IPToIPv6Addr(&a->SrcIpAddress6, &ip);
  12715. IPToIPv6Addr(&a->SrcSubnetMask6, &mask);
  12716. ParseIpAndMask6(GetParamStr(o, "DESTIP"), &ip, &mask);
  12717. IPToIPv6Addr(&a->DestIpAddress6, &ip);
  12718. IPToIPv6Addr(&a->DestSubnetMask6, &mask);
  12719. a->Protocol = StrToProtocol(GetParamStr(o, "PROTOCOL"));
  12720. ParsePortRange(GetParamStr(o, "SRCPORT"), &a->SrcPortStart, &a->SrcPortEnd);
  12721. ParsePortRange(GetParamStr(o, "DESTPORT"), &a->DestPortStart, &a->DestPortEnd);
  12722. ParseTcpState(GetParamStr(o, "TCPSTATE"), &a->CheckTcpState, &a->Established);
  12723. a->Delay = GetParamInt(o, "DELAY");
  12724. a->Jitter = GetParamInt(o, "JITTER");
  12725. a->Loss = GetParamInt(o, "LOSS");
  12726. StrCpy(a->RedirectUrl, sizeof(a->RedirectUrl), GetParamStr(o, "REDIRECTURL"));
  12727. // RPC call
  12728. ret = ScAddAccess(ps->Rpc, &t);
  12729. if (ret != ERR_NO_ERROR)
  12730. {
  12731. // An error has occured
  12732. CmdPrintError(c, ret);
  12733. FreeParamValueList(o);
  12734. return ret;
  12735. }
  12736. FreeParamValueList(o);
  12737. return 0;
  12738. }
  12739. // Get the list of rules in the access list
  12740. UINT PsAccessList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12741. {
  12742. LIST *o;
  12743. PS *ps = (PS *)param;
  12744. UINT ret = 0;
  12745. RPC_ENUM_ACCESS_LIST t;
  12746. CT *ct;
  12747. UINT i;
  12748. // If virtual HUB is not selected, it's an error
  12749. if (ps->HubName == NULL)
  12750. {
  12751. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12752. return ERR_INVALID_PARAMETER;
  12753. }
  12754. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  12755. if (o == NULL)
  12756. {
  12757. return ERR_INVALID_PARAMETER;
  12758. }
  12759. Zero(&t, sizeof(t));
  12760. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12761. // RPC call
  12762. ret = ScEnumAccess(ps->Rpc, &t);
  12763. if (ret != ERR_NO_ERROR)
  12764. {
  12765. // An error has occured
  12766. CmdPrintError(c, ret);
  12767. FreeParamValueList(o);
  12768. return ret;
  12769. }
  12770. ct = CtNew();
  12771. CtInsertColumn(ct, _UU("SM_ACCESS_COLUMN_0"), true);
  12772. CtInsertColumn(ct, _UU("SM_ACCESS_COLUMN_1"), true);
  12773. CtInsertColumn(ct, _UU("SM_ACCESS_COLUMN_2"), true);
  12774. CtInsertColumn(ct, _UU("SM_ACCESS_COLUMN_3"), true);
  12775. CtInsertColumn(ct, _UU("SM_ACCESS_COLUMN_6"), true);
  12776. CtInsertColumn(ct, _UU("SM_ACCESS_COLUMN_5"), false);
  12777. CtInsertColumn(ct, _UU("SM_ACCESS_COLUMN_4"), false);
  12778. for (i = 0;i < t.NumAccess;i++)
  12779. {
  12780. ACCESS *a = &t.Accesses[i];
  12781. char tmp[MAX_SIZE];
  12782. wchar_t tmp3[MAX_SIZE];
  12783. wchar_t tmp1[MAX_SIZE];
  12784. wchar_t tmp2[MAX_SIZE];
  12785. wchar_t tmp4[MAX_SIZE];
  12786. GetAccessListStr(tmp, sizeof(tmp), a);
  12787. UniToStru(tmp1, a->Priority);
  12788. StrToUni(tmp2, sizeof(tmp2), tmp);
  12789. UniToStru(tmp4, a->UniqueId);
  12790. if (a->UniqueId == 0)
  12791. {
  12792. UniStrCpy(tmp4, sizeof(tmp4), _UU("SEC_NONE"));
  12793. }
  12794. UniToStru(tmp3, a->Id);
  12795. CtInsert(ct,
  12796. tmp3,
  12797. a->Discard ? _UU("SM_ACCESS_DISCARD") : _UU("SM_ACCESS_PASS"),
  12798. a->Active ? _UU("SM_ACCESS_ENABLE") : _UU("SM_ACCESS_DISABLE"),
  12799. tmp1,
  12800. tmp4,
  12801. tmp2,
  12802. a->Note);
  12803. }
  12804. CtFreeEx(ct, c, true);
  12805. FreeRpcEnumAccessList(&t);
  12806. FreeParamValueList(o);
  12807. return 0;
  12808. }
  12809. // Remove a rule from the access list
  12810. UINT PsAccessDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12811. {
  12812. LIST *o;
  12813. PS *ps = (PS *)param;
  12814. UINT ret = 0;
  12815. RPC_DELETE_ACCESS t;
  12816. // Parameter list that can be specified
  12817. PARAM args[] =
  12818. {
  12819. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12820. {"[id]", CmdPrompt, _UU("CMD_Access_Prompt_ID"), CmdEvalNotEmpty, NULL},
  12821. };
  12822. // If virtual HUB is not selected, it's an error
  12823. if (ps->HubName == NULL)
  12824. {
  12825. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12826. return ERR_INVALID_PARAMETER;
  12827. }
  12828. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12829. if (o == NULL)
  12830. {
  12831. return ERR_INVALID_PARAMETER;
  12832. }
  12833. Zero(&t, sizeof(t));
  12834. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12835. t.Id = GetParamInt(o, "[id]");
  12836. // RPC call
  12837. ret = ScDeleteAccess(ps->Rpc, &t);
  12838. if (ret != ERR_NO_ERROR)
  12839. {
  12840. // An error has occured
  12841. CmdPrintError(c, ret);
  12842. FreeParamValueList(o);
  12843. return ret;
  12844. }
  12845. FreeParamValueList(o);
  12846. return 0;
  12847. }
  12848. // Enable the rule of access list
  12849. UINT PsAccessEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12850. {
  12851. LIST *o;
  12852. PS *ps = (PS *)param;
  12853. UINT ret = 0;
  12854. RPC_ENUM_ACCESS_LIST t;
  12855. // Parameter list that can be specified
  12856. PARAM args[] =
  12857. {
  12858. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12859. {"[id]", CmdPrompt, _UU("CMD_Access_Prompt_ID"), CmdEvalNotEmpty, NULL},
  12860. };
  12861. // If virtual HUB is not selected, it's an error
  12862. if (ps->HubName == NULL)
  12863. {
  12864. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12865. return ERR_INVALID_PARAMETER;
  12866. }
  12867. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12868. if (o == NULL)
  12869. {
  12870. return ERR_INVALID_PARAMETER;
  12871. }
  12872. Zero(&t, sizeof(t));
  12873. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12874. // RPC call
  12875. ret = ScEnumAccess(ps->Rpc, &t);
  12876. if (ret != ERR_NO_ERROR)
  12877. {
  12878. // An error has occured
  12879. CmdPrintError(c, ret);
  12880. FreeParamValueList(o);
  12881. return ret;
  12882. }
  12883. else
  12884. {
  12885. UINT i;
  12886. bool b = false;
  12887. for (i = 0;i < t.NumAccess;i++)
  12888. {
  12889. ACCESS *a = &t.Accesses[i];
  12890. if (a->Id == GetParamInt(o, "[id]"))
  12891. {
  12892. b = true;
  12893. a->Active = true;
  12894. }
  12895. }
  12896. if (b == false)
  12897. {
  12898. // The specified ID is not found
  12899. ret = ERR_OBJECT_NOT_FOUND;
  12900. CmdPrintError(c, ret);
  12901. FreeParamValueList(o);
  12902. FreeRpcEnumAccessList(&t);
  12903. return ret;
  12904. }
  12905. ret = ScSetAccessList(ps->Rpc, &t);
  12906. if (ret != ERR_NO_ERROR)
  12907. {
  12908. // An error has occured
  12909. CmdPrintError(c, ret);
  12910. FreeParamValueList(o);
  12911. return ret;
  12912. }
  12913. FreeRpcEnumAccessList(&t);
  12914. }
  12915. FreeParamValueList(o);
  12916. return ret;
  12917. }
  12918. // Disable the rule of access list
  12919. UINT PsAccessDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12920. {
  12921. LIST *o;
  12922. PS *ps = (PS *)param;
  12923. UINT ret = 0;
  12924. RPC_ENUM_ACCESS_LIST t;
  12925. // Parameter list that can be specified
  12926. PARAM args[] =
  12927. {
  12928. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  12929. {"[id]", CmdPrompt, _UU("CMD_Access_Prompt_ID"), CmdEvalNotEmpty, NULL},
  12930. };
  12931. // If virtual HUB is not selected, it's an error
  12932. if (ps->HubName == NULL)
  12933. {
  12934. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12935. return ERR_INVALID_PARAMETER;
  12936. }
  12937. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  12938. if (o == NULL)
  12939. {
  12940. return ERR_INVALID_PARAMETER;
  12941. }
  12942. Zero(&t, sizeof(t));
  12943. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  12944. // RPC call
  12945. ret = ScEnumAccess(ps->Rpc, &t);
  12946. if (ret != ERR_NO_ERROR)
  12947. {
  12948. // An error has occured
  12949. CmdPrintError(c, ret);
  12950. FreeParamValueList(o);
  12951. return ret;
  12952. }
  12953. else
  12954. {
  12955. UINT i;
  12956. bool b = false;
  12957. for (i = 0;i < t.NumAccess;i++)
  12958. {
  12959. ACCESS *a = &t.Accesses[i];
  12960. if (a->Id == GetParamInt(o, "[id]"))
  12961. {
  12962. b = true;
  12963. a->Active = false;
  12964. }
  12965. }
  12966. if (b == false)
  12967. {
  12968. // The specified ID is not found
  12969. ret = ERR_OBJECT_NOT_FOUND;
  12970. CmdPrintError(c, ret);
  12971. FreeParamValueList(o);
  12972. FreeRpcEnumAccessList(&t);
  12973. return ret;
  12974. }
  12975. ret = ScSetAccessList(ps->Rpc, &t);
  12976. if (ret != ERR_NO_ERROR)
  12977. {
  12978. // An error has occured
  12979. CmdPrintError(c, ret);
  12980. FreeParamValueList(o);
  12981. return ret;
  12982. }
  12983. FreeRpcEnumAccessList(&t);
  12984. }
  12985. FreeParamValueList(o);
  12986. return ret;
  12987. }
  12988. // Get the user list
  12989. UINT PsUserList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  12990. {
  12991. LIST *o;
  12992. PS *ps = (PS *)param;
  12993. UINT ret = 0;
  12994. RPC_ENUM_USER t;
  12995. // If virtual HUB is not selected, it's an error
  12996. if (ps->HubName == NULL)
  12997. {
  12998. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  12999. return ERR_INVALID_PARAMETER;
  13000. }
  13001. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  13002. if (o == NULL)
  13003. {
  13004. return ERR_INVALID_PARAMETER;
  13005. }
  13006. Zero(&t, sizeof(t));
  13007. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13008. // RPC call
  13009. ret = ScEnumUser(ps->Rpc, &t);
  13010. if (ret != ERR_NO_ERROR)
  13011. {
  13012. // An error has occured
  13013. CmdPrintError(c, ret);
  13014. FreeParamValueList(o);
  13015. return ret;
  13016. }
  13017. else
  13018. {
  13019. UINT i;
  13020. CT *ct = CtNew();
  13021. CtInsertColumn(ct, _UU("SM_USER_COLUMN_1"), false);
  13022. CtInsertColumn(ct, _UU("SM_USER_COLUMN_2"), false);
  13023. CtInsertColumn(ct, _UU("SM_USER_COLUMN_3"), false);
  13024. CtInsertColumn(ct, _UU("SM_USER_COLUMN_4"), false);
  13025. CtInsertColumn(ct, _UU("SM_USER_COLUMN_5"), false);
  13026. CtInsertColumn(ct, _UU("SM_USER_COLUMN_6"), false);
  13027. CtInsertColumn(ct, _UU("SM_USER_COLUMN_7"), false);
  13028. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_5"), false);
  13029. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_6"), false);
  13030. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_7"), false);
  13031. for (i = 0;i < t.NumUser;i++)
  13032. {
  13033. RPC_ENUM_USER_ITEM *e = &t.Users[i];
  13034. wchar_t name[MAX_SIZE];
  13035. wchar_t group[MAX_SIZE];
  13036. wchar_t num[MAX_SIZE];
  13037. wchar_t time[MAX_SIZE];
  13038. wchar_t exp[MAX_SIZE];
  13039. wchar_t num1[64], num2[64];
  13040. StrToUni(name, sizeof(name), e->Name);
  13041. if (StrLen(e->GroupName) != 0)
  13042. {
  13043. StrToUni(group, sizeof(group), e->GroupName);
  13044. }
  13045. else
  13046. {
  13047. UniStrCpy(group, sizeof(group), _UU("SM_NO_GROUP"));
  13048. }
  13049. UniToStru(num, e->NumLogin);
  13050. GetDateTimeStrEx64(time, sizeof(time), SystemToLocal64(e->LastLoginTime), NULL);
  13051. if (e->IsExpiresFilled == false)
  13052. {
  13053. UniStrCpy(exp, sizeof(exp), _UU("CM_ST_NONE"));
  13054. }
  13055. else
  13056. {
  13057. if (e->Expires == 0)
  13058. {
  13059. UniStrCpy(exp, sizeof(exp), _UU("SM_LICENSE_NO_EXPIRES"));
  13060. }
  13061. else
  13062. {
  13063. GetDateTimeStrEx64(exp, sizeof(exp), SystemToLocal64(e->Expires), NULL);
  13064. }
  13065. }
  13066. if (e->IsTrafficFilled == false)
  13067. {
  13068. UniStrCpy(num1, sizeof(num1), _UU("CM_ST_NONE"));
  13069. UniStrCpy(num2, sizeof(num2), _UU("CM_ST_NONE"));
  13070. }
  13071. else
  13072. {
  13073. UniToStr3(num1, sizeof(num1),
  13074. e->Traffic.Recv.BroadcastBytes + e->Traffic.Recv.UnicastBytes +
  13075. e->Traffic.Send.BroadcastBytes + e->Traffic.Send.UnicastBytes);
  13076. UniToStr3(num2, sizeof(num2),
  13077. e->Traffic.Recv.BroadcastCount + e->Traffic.Recv.UnicastCount +
  13078. e->Traffic.Send.BroadcastBytes + e->Traffic.Send.UnicastCount);
  13079. }
  13080. CtInsert(ct,
  13081. name, e->Realname, group, e->Note, GetAuthTypeStr(e->AuthType),
  13082. num, time, exp, num1, num2);
  13083. }
  13084. CtFreeEx(ct, c, true);
  13085. }
  13086. FreeRpcEnumUser(&t);
  13087. FreeParamValueList(o);
  13088. return 0;
  13089. }
  13090. // Get a string of user authentication method
  13091. wchar_t *GetAuthTypeStr(UINT id)
  13092. {
  13093. char tmp[MAX_SIZE];
  13094. Format(tmp, sizeof(tmp), "SM_AUTHTYPE_%u", id);
  13095. return _UU(tmp);
  13096. }
  13097. // Creating a user
  13098. UINT PsUserCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13099. {
  13100. LIST *o;
  13101. PS *ps = (PS *)param;
  13102. UINT ret = 0;
  13103. RPC_SET_USER t;
  13104. // Parameter list that can be specified
  13105. PARAM args[] =
  13106. {
  13107. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13108. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13109. {"GROUP", CmdPrompt, _UU("CMD_UserCreate_Prompt_GROUP"), NULL, NULL},
  13110. {"REALNAME", CmdPrompt, _UU("CMD_UserCreate_Prompt_REALNAME"), NULL, NULL},
  13111. {"NOTE", CmdPrompt, _UU("CMD_UserCreate_Prompt_NOTE"), NULL, NULL},
  13112. };
  13113. // If virtual HUB is not selected, it's an error
  13114. if (ps->HubName == NULL)
  13115. {
  13116. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13117. return ERR_INVALID_PARAMETER;
  13118. }
  13119. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13120. if (o == NULL)
  13121. {
  13122. return ERR_INVALID_PARAMETER;
  13123. }
  13124. Zero(&t, sizeof(t));
  13125. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13126. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13127. StrCpy(t.GroupName, sizeof(t.GroupName), GetParamStr(o, "GROUP"));
  13128. UniStrCpy(t.Realname, sizeof(t.Realname), GetParamUniStr(o, "REALNAME"));
  13129. UniStrCpy(t.Note, sizeof(t.Note), GetParamUniStr(o, "NOTE"));
  13130. Trim(t.Name);
  13131. if (StrCmpi(t.Name, "*") == 0)
  13132. {
  13133. t.AuthType = AUTHTYPE_RADIUS;
  13134. t.AuthData = NewRadiusAuthData(NULL);
  13135. }
  13136. else
  13137. {
  13138. UCHAR random_pass[SHA1_SIZE];
  13139. UCHAR random_pass2[MD5_SIZE];
  13140. Rand(random_pass, sizeof(random_pass));
  13141. Rand(random_pass2, sizeof(random_pass2));
  13142. t.AuthType = AUTHTYPE_PASSWORD;
  13143. t.AuthData = NewPasswordAuthDataRaw(random_pass, random_pass2);
  13144. }
  13145. // RPC call
  13146. ret = ScCreateUser(ps->Rpc, &t);
  13147. if (ret != ERR_NO_ERROR)
  13148. {
  13149. // An error has occured
  13150. CmdPrintError(c, ret);
  13151. FreeParamValueList(o);
  13152. return ret;
  13153. }
  13154. FreeRpcSetUser(&t);
  13155. FreeParamValueList(o);
  13156. return 0;
  13157. }
  13158. // Change the user information
  13159. UINT PsUserSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13160. {
  13161. LIST *o;
  13162. PS *ps = (PS *)param;
  13163. UINT ret = 0;
  13164. RPC_SET_USER t;
  13165. // Parameter list that can be specified
  13166. PARAM args[] =
  13167. {
  13168. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13169. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13170. {"GROUP", CmdPrompt, _UU("CMD_UserCreate_Prompt_GROUP"), NULL, NULL},
  13171. {"REALNAME", CmdPrompt, _UU("CMD_UserCreate_Prompt_REALNAME"), NULL, NULL},
  13172. {"NOTE", CmdPrompt, _UU("CMD_UserCreate_Prompt_NOTE"), NULL, NULL},
  13173. };
  13174. // If virtual HUB is not selected, it's an error
  13175. if (ps->HubName == NULL)
  13176. {
  13177. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13178. return ERR_INVALID_PARAMETER;
  13179. }
  13180. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13181. if (o == NULL)
  13182. {
  13183. return ERR_INVALID_PARAMETER;
  13184. }
  13185. Zero(&t, sizeof(t));
  13186. // Get the user object
  13187. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13188. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13189. ret = ScGetUser(ps->Rpc, &t);
  13190. if (ret != ERR_NO_ERROR)
  13191. {
  13192. // An error has occured
  13193. CmdPrintError(c, ret);
  13194. FreeParamValueList(o);
  13195. return ret;
  13196. }
  13197. // Update the information
  13198. StrCpy(t.GroupName, sizeof(t.GroupName), GetParamStr(o, "GROUP"));
  13199. UniStrCpy(t.Realname, sizeof(t.Realname), GetParamUniStr(o, "REALNAME"));
  13200. UniStrCpy(t.Note, sizeof(t.Note), GetParamUniStr(o, "NOTE"));
  13201. // Write the user object
  13202. ret = ScSetUser(ps->Rpc, &t);
  13203. if (ret != ERR_NO_ERROR)
  13204. {
  13205. // An error has occured
  13206. CmdPrintError(c, ret);
  13207. FreeParamValueList(o);
  13208. return ret;
  13209. }
  13210. FreeRpcSetUser(&t);
  13211. FreeParamValueList(o);
  13212. return 0;
  13213. }
  13214. // Delete the user
  13215. UINT PsUserDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13216. {
  13217. LIST *o;
  13218. PS *ps = (PS *)param;
  13219. UINT ret = 0;
  13220. RPC_DELETE_USER t;
  13221. // Parameter list that can be specified
  13222. PARAM args[] =
  13223. {
  13224. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13225. };
  13226. // If virtual HUB is not selected, it's an error
  13227. if (ps->HubName == NULL)
  13228. {
  13229. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13230. return ERR_INVALID_PARAMETER;
  13231. }
  13232. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13233. if (o == NULL)
  13234. {
  13235. return ERR_INVALID_PARAMETER;
  13236. }
  13237. Zero(&t, sizeof(t));
  13238. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13239. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13240. // RPC call
  13241. ret = ScDeleteUser(ps->Rpc, &t);
  13242. if (ret != ERR_NO_ERROR)
  13243. {
  13244. // An error has occured
  13245. CmdPrintError(c, ret);
  13246. FreeParamValueList(o);
  13247. return ret;
  13248. }
  13249. FreeParamValueList(o);
  13250. return 0;
  13251. }
  13252. // Get the user information
  13253. UINT PsUserGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13254. {
  13255. LIST *o;
  13256. PS *ps = (PS *)param;
  13257. UINT ret = 0;
  13258. RPC_SET_USER t;
  13259. // Parameter list that can be specified
  13260. PARAM args[] =
  13261. {
  13262. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13263. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13264. };
  13265. // If virtual HUB is not selected, it's an error
  13266. if (ps->HubName == NULL)
  13267. {
  13268. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13269. return ERR_INVALID_PARAMETER;
  13270. }
  13271. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13272. if (o == NULL)
  13273. {
  13274. return ERR_INVALID_PARAMETER;
  13275. }
  13276. Zero(&t, sizeof(t));
  13277. // Get the user object
  13278. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13279. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13280. ret = ScGetUser(ps->Rpc, &t);
  13281. if (ret != ERR_NO_ERROR)
  13282. {
  13283. // An error has occured
  13284. CmdPrintError(c, ret);
  13285. FreeParamValueList(o);
  13286. return ret;
  13287. }
  13288. else
  13289. {
  13290. wchar_t tmp[MAX_SIZE];
  13291. CT *ct;
  13292. // Display the user's data
  13293. ct = CtNewStandard();
  13294. // User name
  13295. StrToUni(tmp, sizeof(tmp), t.Name);
  13296. CtInsert(ct, _UU("CMD_UserGet_Column_Name"), tmp);
  13297. // Real name
  13298. CtInsert(ct, _UU("CMD_UserGet_Column_RealName"), t.Realname);
  13299. // Description
  13300. CtInsert(ct, _UU("CMD_UserGet_Column_Note"), t.Note);
  13301. // Group name
  13302. if (IsEmptyStr(t.GroupName) == false)
  13303. {
  13304. StrToUni(tmp, sizeof(tmp), t.GroupName);
  13305. CtInsert(ct, _UU("CMD_UserGet_Column_Group"), tmp);
  13306. }
  13307. // Expiration date
  13308. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.ExpireTime), NULL);
  13309. CtInsert(ct, _UU("CMD_UserGet_Column_Expires"), tmp);
  13310. // Authentication method
  13311. CtInsert(ct, _UU("CMD_UserGet_Column_AuthType"), GetAuthTypeStr(t.AuthType));
  13312. switch (t.AuthType)
  13313. {
  13314. case AUTHTYPE_USERCERT:
  13315. if (t.AuthData != NULL)
  13316. {
  13317. AUTHUSERCERT *auc = (AUTHUSERCERT *)t.AuthData;
  13318. if (auc != NULL && auc->UserX != NULL)
  13319. {
  13320. // Registered user-specific certificate
  13321. GetAllNameFromX(tmp, sizeof(tmp), auc->UserX);
  13322. CtInsert(ct, _UU("CMD_UserGet_Column_UserCert"), tmp);
  13323. }
  13324. }
  13325. break;
  13326. case AUTHTYPE_ROOTCERT:
  13327. if (t.AuthData != NULL)
  13328. {
  13329. AUTHROOTCERT *arc = (AUTHROOTCERT *)t.AuthData;
  13330. if (IsEmptyUniStr(arc->CommonName) == false)
  13331. {
  13332. // Limitation the value of the certificate's CN
  13333. CtInsert(ct, _UU("CMD_UserGet_Column_RootCert_CN"), arc->CommonName);
  13334. }
  13335. if (arc->Serial != NULL && arc->Serial->size >= 1)
  13336. {
  13337. char tmp2[MAX_SIZE];
  13338. // Limitation the serial number of the certificate
  13339. BinToStrEx(tmp2, sizeof(tmp2), arc->Serial->data, arc->Serial->size);
  13340. StrToUni(tmp, sizeof(tmp), tmp2);
  13341. CtInsert(ct, _UU("CMD_UserGet_Column_RootCert_SERIAL"), tmp);
  13342. }
  13343. }
  13344. break;
  13345. case AUTHTYPE_RADIUS:
  13346. case AUTHTYPE_NT:
  13347. if (t.AuthData != NULL)
  13348. {
  13349. AUTHRADIUS *ar = (AUTHRADIUS *)t.AuthData;
  13350. // Authentication user name of the external authentication server
  13351. if (IsEmptyUniStr(ar->RadiusUsername) == false)
  13352. {
  13353. CtInsert(ct, _UU("CMD_UserGet_Column_RadiusAlias"), ar->RadiusUsername);
  13354. }
  13355. }
  13356. break;
  13357. }
  13358. CtInsert(ct, L"---", L"---");
  13359. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.CreatedTime), NULL);
  13360. CtInsert(ct, _UU("SM_USERINFO_CREATE"), tmp);
  13361. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.UpdatedTime), NULL);
  13362. CtInsert(ct, _UU("SM_USERINFO_UPDATE"), tmp);
  13363. CmdInsertTrafficInfo(ct, &t.Traffic);
  13364. UniToStru(tmp, t.NumLogin);
  13365. CtInsert(ct, _UU("SM_USERINFO_NUMLOGIN"), tmp);
  13366. CtFree(ct, c);
  13367. if (t.Policy != NULL)
  13368. {
  13369. c->Write(c, L"");
  13370. c->Write(c, _UU("CMD_UserGet_Policy"));
  13371. PrintPolicy(c, t.Policy, false);
  13372. }
  13373. }
  13374. FreeRpcSetUser(&t);
  13375. FreeParamValueList(o);
  13376. return 0;
  13377. }
  13378. // Set the authentication method for the user to the anonymous authentication
  13379. UINT PsUserAnonymousSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13380. {
  13381. LIST *o;
  13382. PS *ps = (PS *)param;
  13383. UINT ret = 0;
  13384. RPC_SET_USER t;
  13385. // Parameter list that can be specified
  13386. PARAM args[] =
  13387. {
  13388. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13389. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13390. };
  13391. // If virtual HUB is not selected, it's an error
  13392. if (ps->HubName == NULL)
  13393. {
  13394. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13395. return ERR_INVALID_PARAMETER;
  13396. }
  13397. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13398. if (o == NULL)
  13399. {
  13400. return ERR_INVALID_PARAMETER;
  13401. }
  13402. Zero(&t, sizeof(t));
  13403. // Get the user object
  13404. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13405. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13406. ret = ScGetUser(ps->Rpc, &t);
  13407. if (ret != ERR_NO_ERROR)
  13408. {
  13409. // An error has occured
  13410. CmdPrintError(c, ret);
  13411. FreeParamValueList(o);
  13412. return ret;
  13413. }
  13414. // Update the information
  13415. FreeAuthData(t.AuthType, t.AuthData);
  13416. // Set to anonymous authentication
  13417. t.AuthType = AUTHTYPE_ANONYMOUS;
  13418. t.AuthData = NULL;
  13419. // Write the user object
  13420. ret = ScSetUser(ps->Rpc, &t);
  13421. if (ret != ERR_NO_ERROR)
  13422. {
  13423. // An error has occured
  13424. CmdPrintError(c, ret);
  13425. FreeParamValueList(o);
  13426. return ret;
  13427. }
  13428. FreeRpcSetUser(&t);
  13429. FreeParamValueList(o);
  13430. return 0;
  13431. }
  13432. // Set the authentication method for the user to the password authentication and set a password
  13433. UINT PsUserPasswordSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13434. {
  13435. LIST *o;
  13436. PS *ps = (PS *)param;
  13437. UINT ret = 0;
  13438. RPC_SET_USER t;
  13439. // Parameter list that can be specified
  13440. PARAM args[] =
  13441. {
  13442. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13443. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13444. {"PASSWORD", CmdPromptChoosePassword, NULL, NULL, NULL},
  13445. };
  13446. // If virtual HUB is not selected, it's an error
  13447. if (ps->HubName == NULL)
  13448. {
  13449. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13450. return ERR_INVALID_PARAMETER;
  13451. }
  13452. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13453. if (o == NULL)
  13454. {
  13455. return ERR_INVALID_PARAMETER;
  13456. }
  13457. Zero(&t, sizeof(t));
  13458. // Get the user object
  13459. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13460. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13461. ret = ScGetUser(ps->Rpc, &t);
  13462. if (ret != ERR_NO_ERROR)
  13463. {
  13464. // An error has occured
  13465. CmdPrintError(c, ret);
  13466. FreeParamValueList(o);
  13467. return ret;
  13468. }
  13469. // Update the information
  13470. FreeAuthData(t.AuthType, t.AuthData);
  13471. {
  13472. AUTHPASSWORD *pw;
  13473. pw = NewPasswordAuthData(t.Name, GetParamStr(o, "PASSWORD"));
  13474. // Set to the password authentication
  13475. t.AuthType = AUTHTYPE_PASSWORD;
  13476. t.AuthData = pw;
  13477. }
  13478. // Write the user object
  13479. ret = ScSetUser(ps->Rpc, &t);
  13480. if (ret != ERR_NO_ERROR)
  13481. {
  13482. // An error has occured
  13483. CmdPrintError(c, ret);
  13484. FreeParamValueList(o);
  13485. return ret;
  13486. }
  13487. FreeRpcSetUser(&t);
  13488. FreeParamValueList(o);
  13489. return 0;
  13490. }
  13491. // Set the authentication method for the user to the specific certificate authentication and set a certificate
  13492. UINT PsUserCertSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13493. {
  13494. LIST *o;
  13495. PS *ps = (PS *)param;
  13496. UINT ret = 0;
  13497. RPC_SET_USER t;
  13498. X *x;
  13499. // Parameter list that can be specified
  13500. PARAM args[] =
  13501. {
  13502. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13503. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13504. {"LOADCERT", CmdPrompt, _UU("CMD_LOADCERTPATH"), CmdEvalIsFile, NULL},
  13505. };
  13506. // If virtual HUB is not selected, it's an error
  13507. if (ps->HubName == NULL)
  13508. {
  13509. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13510. return ERR_INVALID_PARAMETER;
  13511. }
  13512. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13513. if (o == NULL)
  13514. {
  13515. return ERR_INVALID_PARAMETER;
  13516. }
  13517. // Read the certificate
  13518. x = FileToXW(GetParamUniStr(o, "LOADCERT"));
  13519. if (x == NULL)
  13520. {
  13521. c->Write(c, _UU("CMD_LOADCERT_FAILED"));
  13522. FreeParamValueList(o);
  13523. return ERR_INTERNAL_ERROR;
  13524. }
  13525. Zero(&t, sizeof(t));
  13526. // Get the user object
  13527. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13528. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13529. ret = ScGetUser(ps->Rpc, &t);
  13530. if (ret != ERR_NO_ERROR)
  13531. {
  13532. // An error has occured
  13533. CmdPrintError(c, ret);
  13534. FreeParamValueList(o);
  13535. FreeX(x);
  13536. return ret;
  13537. }
  13538. // Update the information
  13539. FreeAuthData(t.AuthType, t.AuthData);
  13540. {
  13541. AUTHUSERCERT *c;
  13542. c = NewUserCertAuthData(x);
  13543. FreeX(x);
  13544. // Set to the password authentication
  13545. t.AuthType = AUTHTYPE_USERCERT;
  13546. t.AuthData = c;
  13547. }
  13548. // Write the user object
  13549. ret = ScSetUser(ps->Rpc, &t);
  13550. if (ret != ERR_NO_ERROR)
  13551. {
  13552. // An error has occured
  13553. CmdPrintError(c, ret);
  13554. FreeParamValueList(o);
  13555. return ret;
  13556. }
  13557. FreeRpcSetUser(&t);
  13558. FreeParamValueList(o);
  13559. return 0;
  13560. }
  13561. // Get certificates that are registered in the user which uses certificate authentication
  13562. UINT PsUserCertGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13563. {
  13564. LIST *o;
  13565. PS *ps = (PS *)param;
  13566. UINT ret = 0;
  13567. RPC_SET_USER t;
  13568. AUTHUSERCERT *a;
  13569. // Parameter list that can be specified
  13570. PARAM args[] =
  13571. {
  13572. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13573. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13574. {"SAVECERT", CmdPrompt, _UU("CMD_SAVECERTPATH"), NULL, NULL},
  13575. };
  13576. // If virtual HUB is not selected, it's an error
  13577. if (ps->HubName == NULL)
  13578. {
  13579. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13580. return ERR_INVALID_PARAMETER;
  13581. }
  13582. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13583. if (o == NULL)
  13584. {
  13585. return ERR_INVALID_PARAMETER;
  13586. }
  13587. Zero(&t, sizeof(t));
  13588. // Get the user object
  13589. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13590. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13591. ret = ScGetUser(ps->Rpc, &t);
  13592. if (ret != ERR_NO_ERROR)
  13593. {
  13594. // An error has occured
  13595. CmdPrintError(c, ret);
  13596. FreeParamValueList(o);
  13597. return ret;
  13598. }
  13599. a = (AUTHUSERCERT *)t.AuthData;
  13600. if (t.AuthType != AUTHTYPE_USERCERT || a == NULL || a->UserX == NULL)
  13601. {
  13602. // The user is not using specific certificate authentication
  13603. ret = ERR_INVALID_PARAMETER;
  13604. c->Write(c, _UU("CMD_UserCertGet_Not_Cert"));
  13605. }
  13606. else
  13607. {
  13608. if (XToFileW(a->UserX, GetParamUniStr(o, "SAVECERT"), true) == false)
  13609. {
  13610. c->Write(c, _UU("CMD_SAVECERT_FAILED"));
  13611. }
  13612. }
  13613. FreeRpcSetUser(&t);
  13614. FreeParamValueList(o);
  13615. return ret;
  13616. }
  13617. // Set the authentication method for the user to the signed certificate authentication
  13618. UINT PsUserSignedSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13619. {
  13620. LIST *o;
  13621. PS *ps = (PS *)param;
  13622. UINT ret = 0;
  13623. RPC_SET_USER t;
  13624. // Parameter list that can be specified
  13625. PARAM args[] =
  13626. {
  13627. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13628. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13629. {"CN", CmdPrompt, _UU("CMD_UserSignedSet_Prompt_CN"), NULL, NULL},
  13630. {"SERIAL", CmdPrompt, _UU("CMD_UserSignedSet_Prompt_SERIAL"), NULL, NULL},
  13631. };
  13632. // If virtual HUB is not selected, it's an error
  13633. if (ps->HubName == NULL)
  13634. {
  13635. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13636. return ERR_INVALID_PARAMETER;
  13637. }
  13638. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13639. if (o == NULL)
  13640. {
  13641. return ERR_INVALID_PARAMETER;
  13642. }
  13643. Zero(&t, sizeof(t));
  13644. // Get the user object
  13645. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13646. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13647. ret = ScGetUser(ps->Rpc, &t);
  13648. if (ret != ERR_NO_ERROR)
  13649. {
  13650. // An error has occured
  13651. CmdPrintError(c, ret);
  13652. FreeParamValueList(o);
  13653. return ret;
  13654. }
  13655. // Update the information
  13656. FreeAuthData(t.AuthType, t.AuthData);
  13657. {
  13658. AUTHROOTCERT *c;
  13659. BUF *b;
  13660. X_SERIAL *serial = NULL;
  13661. b = StrToBin(GetParamStr(o, "SERIAL"));
  13662. if (b != NULL && b->Size >= 1)
  13663. {
  13664. serial = NewXSerial(b->Buf, b->Size);
  13665. }
  13666. FreeBuf(b);
  13667. c = NewRootCertAuthData(serial, GetParamUniStr(o, "CN"));
  13668. FreeXSerial(serial);
  13669. // Set to the signed certificate authentication
  13670. t.AuthType = AUTHTYPE_ROOTCERT;
  13671. t.AuthData = c;
  13672. }
  13673. // Write the user object
  13674. ret = ScSetUser(ps->Rpc, &t);
  13675. if (ret != ERR_NO_ERROR)
  13676. {
  13677. // An error has occured
  13678. CmdPrintError(c, ret);
  13679. FreeParamValueList(o);
  13680. return ret;
  13681. }
  13682. FreeRpcSetUser(&t);
  13683. FreeParamValueList(o);
  13684. return 0;
  13685. }
  13686. // Set the authentication method for the user to the Radius authentication
  13687. UINT PsUserRadiusSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13688. {
  13689. LIST *o;
  13690. PS *ps = (PS *)param;
  13691. UINT ret = 0;
  13692. RPC_SET_USER t;
  13693. // Parameter list that can be specified
  13694. PARAM args[] =
  13695. {
  13696. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13697. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13698. {"ALIAS", CmdPrompt, _UU("CMD_UserRadiusSet_Prompt_ALIAS"), NULL, NULL},
  13699. };
  13700. // If virtual HUB is not selected, it's an error
  13701. if (ps->HubName == NULL)
  13702. {
  13703. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13704. return ERR_INVALID_PARAMETER;
  13705. }
  13706. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13707. if (o == NULL)
  13708. {
  13709. return ERR_INVALID_PARAMETER;
  13710. }
  13711. Zero(&t, sizeof(t));
  13712. // Get the user object
  13713. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13714. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13715. ret = ScGetUser(ps->Rpc, &t);
  13716. if (ret != ERR_NO_ERROR)
  13717. {
  13718. // An error has occured
  13719. CmdPrintError(c, ret);
  13720. FreeParamValueList(o);
  13721. return ret;
  13722. }
  13723. // Update the information
  13724. FreeAuthData(t.AuthType, t.AuthData);
  13725. {
  13726. AUTHRADIUS *a;
  13727. a = NewRadiusAuthData(GetParamUniStr(o, "ALIAS"));
  13728. // Set to Radius authentication
  13729. t.AuthType = AUTHTYPE_RADIUS;
  13730. t.AuthData = a;
  13731. }
  13732. // Write the user object
  13733. ret = ScSetUser(ps->Rpc, &t);
  13734. if (ret != ERR_NO_ERROR)
  13735. {
  13736. // An error has occured
  13737. CmdPrintError(c, ret);
  13738. FreeParamValueList(o);
  13739. return ret;
  13740. }
  13741. FreeRpcSetUser(&t);
  13742. FreeParamValueList(o);
  13743. return 0;
  13744. }
  13745. // Set the authentication method for the user to the NT domain authentication
  13746. UINT PsUserNTLMSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13747. {
  13748. LIST *o;
  13749. PS *ps = (PS *)param;
  13750. UINT ret = 0;
  13751. RPC_SET_USER t;
  13752. // Parameter list that can be specified
  13753. PARAM args[] =
  13754. {
  13755. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13756. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13757. {"ALIAS", CmdPrompt, _UU("CMD_UserRadiusSet_Prompt_ALIAS"), NULL, NULL},
  13758. };
  13759. // If virtual HUB is not selected, it's an error
  13760. if (ps->HubName == NULL)
  13761. {
  13762. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13763. return ERR_INVALID_PARAMETER;
  13764. }
  13765. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13766. if (o == NULL)
  13767. {
  13768. return ERR_INVALID_PARAMETER;
  13769. }
  13770. Zero(&t, sizeof(t));
  13771. // Get the user object
  13772. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13773. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13774. ret = ScGetUser(ps->Rpc, &t);
  13775. if (ret != ERR_NO_ERROR)
  13776. {
  13777. // An error has occured
  13778. CmdPrintError(c, ret);
  13779. FreeParamValueList(o);
  13780. return ret;
  13781. }
  13782. // Update the information
  13783. FreeAuthData(t.AuthType, t.AuthData);
  13784. {
  13785. AUTHRADIUS *a;
  13786. a = NewRadiusAuthData(GetParamUniStr(o, "ALIAS"));
  13787. // Set to the NT domain authentication
  13788. t.AuthType = AUTHTYPE_NT;
  13789. t.AuthData = a;
  13790. }
  13791. // Write the user object
  13792. ret = ScSetUser(ps->Rpc, &t);
  13793. if (ret != ERR_NO_ERROR)
  13794. {
  13795. // An error has occured
  13796. CmdPrintError(c, ret);
  13797. FreeParamValueList(o);
  13798. return ret;
  13799. }
  13800. FreeRpcSetUser(&t);
  13801. FreeParamValueList(o);
  13802. return 0;
  13803. }
  13804. // Delete the security policy of the user
  13805. UINT PsUserPolicyRemove(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13806. {
  13807. LIST *o;
  13808. PS *ps = (PS *)param;
  13809. UINT ret = 0;
  13810. RPC_SET_USER t;
  13811. // Parameter list that can be specified
  13812. PARAM args[] =
  13813. {
  13814. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13815. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13816. };
  13817. // If virtual HUB is not selected, it's an error
  13818. if (ps->HubName == NULL)
  13819. {
  13820. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13821. return ERR_INVALID_PARAMETER;
  13822. }
  13823. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13824. if (o == NULL)
  13825. {
  13826. return ERR_INVALID_PARAMETER;
  13827. }
  13828. Zero(&t, sizeof(t));
  13829. // Get the user object
  13830. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13831. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13832. ret = ScGetUser(ps->Rpc, &t);
  13833. if (ret != ERR_NO_ERROR)
  13834. {
  13835. // An error has occured
  13836. CmdPrintError(c, ret);
  13837. FreeParamValueList(o);
  13838. return ret;
  13839. }
  13840. // Update
  13841. if (t.Policy != NULL)
  13842. {
  13843. Free(t.Policy);
  13844. t.Policy = NULL;
  13845. }
  13846. // Write the user object
  13847. ret = ScSetUser(ps->Rpc, &t);
  13848. if (ret != ERR_NO_ERROR)
  13849. {
  13850. // An error has occured
  13851. CmdPrintError(c, ret);
  13852. FreeParamValueList(o);
  13853. return ret;
  13854. }
  13855. FreeRpcSetUser(&t);
  13856. FreeParamValueList(o);
  13857. return 0;
  13858. }
  13859. // Set a security policy of the user
  13860. UINT PsUserPolicySet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13861. {
  13862. LIST *o;
  13863. PS *ps = (PS *)param;
  13864. UINT ret = 0;
  13865. RPC_SET_USER t;
  13866. // Parameter list that can be specified
  13867. PARAM args[] =
  13868. {
  13869. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13870. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13871. {"NAME", CmdPrompt, _UU("CMD_CascadePolicySet_PROMPT_POLNAME"), CmdEvalNotEmpty, NULL},
  13872. {"VALUE", CmdPrompt, _UU("CMD_CascadePolicySet_PROMPT_POLVALUE"), CmdEvalNotEmpty, NULL},
  13873. };
  13874. // If virtual HUB is not selected, it's an error
  13875. if (ps->HubName == NULL)
  13876. {
  13877. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  13878. return ERR_INVALID_PARAMETER;
  13879. }
  13880. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  13881. if (o == NULL)
  13882. {
  13883. return ERR_INVALID_PARAMETER;
  13884. }
  13885. Zero(&t, sizeof(t));
  13886. // Get the user object
  13887. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  13888. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  13889. ret = ScGetUser(ps->Rpc, &t);
  13890. if (ret != ERR_NO_ERROR)
  13891. {
  13892. // An error has occured
  13893. CmdPrintError(c, ret);
  13894. FreeParamValueList(o);
  13895. return ret;
  13896. }
  13897. // Update
  13898. if (t.Policy == NULL)
  13899. {
  13900. t.Policy = ClonePolicy(GetDefaultPolicy());
  13901. }
  13902. // Edit
  13903. if (EditPolicy(c, t.Policy, GetParamStr(o, "NAME"), GetParamStr(o, "VALUE"), false) == false)
  13904. {
  13905. ret = ERR_INVALID_PARAMETER;
  13906. }
  13907. else
  13908. {
  13909. // Write the user object
  13910. ret = ScSetUser(ps->Rpc, &t);
  13911. if (ret != ERR_NO_ERROR)
  13912. {
  13913. // An error has occured
  13914. CmdPrintError(c, ret);
  13915. FreeParamValueList(o);
  13916. return ret;
  13917. }
  13918. }
  13919. FreeRpcSetUser(&t);
  13920. FreeParamValueList(o);
  13921. return ret;
  13922. }
  13923. // Convert the string to a date and time
  13924. UINT64 StrToDateTime64(char *str)
  13925. {
  13926. UINT64 ret = 0;
  13927. TOKEN_LIST *t;
  13928. UINT a, b, c, d, e, f;
  13929. // Validate arguments
  13930. if (str == NULL)
  13931. {
  13932. return INFINITE;
  13933. }
  13934. if (IsEmptyStr(str) || StrCmpi(str, "none") == 0)
  13935. {
  13936. return 0;
  13937. }
  13938. t = ParseToken(str, ":/,. \"");
  13939. if (t->NumTokens != 6)
  13940. {
  13941. FreeToken(t);
  13942. return INFINITE;
  13943. }
  13944. a = ToInt(t->Token[0]);
  13945. b = ToInt(t->Token[1]);
  13946. c = ToInt(t->Token[2]);
  13947. d = ToInt(t->Token[3]);
  13948. e = ToInt(t->Token[4]);
  13949. f = ToInt(t->Token[5]);
  13950. ret = INFINITE;
  13951. if (a >= 1000 && a <= 9999 && b >= 1 && b <= 12 && c >= 1 && c <= 31 &&
  13952. d >= 0 && d <= 23 && e >= 0 && e <= 59 && f >= 0 && f <= 59)
  13953. {
  13954. SYSTEMTIME t;
  13955. Zero(&t, sizeof(t));
  13956. t.wYear = a;
  13957. t.wMonth = b;
  13958. t.wDay = c;
  13959. t.wHour = d;
  13960. t.wMinute = e;
  13961. t.wSecond = f;
  13962. ret = SystemToUINT64(&t);
  13963. }
  13964. FreeToken(t);
  13965. return ret;
  13966. }
  13967. // Evaluate the date and time string
  13968. bool CmdEvalDateTime(CONSOLE *c, wchar_t *str, void *param)
  13969. {
  13970. UINT64 ret;
  13971. char tmp[MAX_SIZE];
  13972. // Validate arguments
  13973. if (c == NULL || str == NULL)
  13974. {
  13975. return false;
  13976. }
  13977. UniToStr(tmp, sizeof(tmp), str);
  13978. ret = StrToDateTime64(tmp);
  13979. if (ret == INFINITE)
  13980. {
  13981. c->Write(c, _UU("CMD_EVAL_DATE_TIME_FAILED"));
  13982. return false;
  13983. }
  13984. return true;
  13985. }
  13986. // Set the expiration date of the user
  13987. UINT PsUserExpiresSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  13988. {
  13989. LIST *o;
  13990. PS *ps = (PS *)param;
  13991. UINT ret = 0;
  13992. RPC_SET_USER t;
  13993. UINT64 expires;
  13994. // Parameter list that can be specified
  13995. PARAM args[] =
  13996. {
  13997. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  13998. {"[name]", CmdPrompt, _UU("CMD_UserCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  13999. {"EXPIRES", CmdPrompt, _UU("CMD_UserExpiresSet_Prompt_EXPIRES"), CmdEvalDateTime, NULL},
  14000. };
  14001. // If virtual HUB is not selected, it's an error
  14002. if (ps->HubName == NULL)
  14003. {
  14004. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14005. return ERR_INVALID_PARAMETER;
  14006. }
  14007. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14008. if (o == NULL)
  14009. {
  14010. return ERR_INVALID_PARAMETER;
  14011. }
  14012. Zero(&t, sizeof(t));
  14013. // Get the user object
  14014. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14015. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14016. ret = ScGetUser(ps->Rpc, &t);
  14017. if (ret != ERR_NO_ERROR)
  14018. {
  14019. // An error has occured
  14020. CmdPrintError(c, ret);
  14021. FreeParamValueList(o);
  14022. return ret;
  14023. }
  14024. // Update the information
  14025. expires = StrToDateTime64(GetParamStr(o, "EXPIRES"));
  14026. if (expires != 0)
  14027. {
  14028. expires = LocalToSystem64(expires);
  14029. }
  14030. t.ExpireTime = expires;
  14031. // Write the user object
  14032. ret = ScSetUser(ps->Rpc, &t);
  14033. if (ret != ERR_NO_ERROR)
  14034. {
  14035. // An error has occured
  14036. CmdPrintError(c, ret);
  14037. FreeParamValueList(o);
  14038. return ret;
  14039. }
  14040. FreeRpcSetUser(&t);
  14041. FreeParamValueList(o);
  14042. return 0;
  14043. }
  14044. // Get the group list
  14045. UINT PsGroupList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14046. {
  14047. LIST *o;
  14048. PS *ps = (PS *)param;
  14049. UINT ret = 0;
  14050. RPC_ENUM_GROUP t;
  14051. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  14052. if (o == NULL)
  14053. {
  14054. return ERR_INVALID_PARAMETER;
  14055. }
  14056. // If virtual HUB is not selected, it's an error
  14057. if (ps->HubName == NULL)
  14058. {
  14059. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14060. return ERR_INVALID_PARAMETER;
  14061. }
  14062. Zero(&t, sizeof(t));
  14063. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14064. // RPC call
  14065. ret = ScEnumGroup(ps->Rpc, &t);
  14066. if (ret != ERR_NO_ERROR)
  14067. {
  14068. // An error has occured
  14069. CmdPrintError(c, ret);
  14070. FreeParamValueList(o);
  14071. return ret;
  14072. }
  14073. else
  14074. {
  14075. CT *ct = CtNew();
  14076. UINT i;
  14077. CtInsertColumn(ct, _UU("SM_GROUPLIST_NAME"), false);
  14078. CtInsertColumn(ct, _UU("SM_GROUPLIST_REALNAME"), false);
  14079. CtInsertColumn(ct, _UU("SM_GROUPLIST_NOTE"), false);
  14080. CtInsertColumn(ct, _UU("SM_GROUPLIST_NUMUSERS"), false);
  14081. for (i = 0;i < t.NumGroup;i++)
  14082. {
  14083. wchar_t tmp1[MAX_SIZE];
  14084. wchar_t tmp2[MAX_SIZE];
  14085. RPC_ENUM_GROUP_ITEM *e = &t.Groups[i];
  14086. StrToUni(tmp1, sizeof(tmp1), e->Name);
  14087. UniToStru(tmp2, e->NumUsers);
  14088. CtInsert(ct, tmp1, e->Realname, e->Note, tmp2);
  14089. }
  14090. CtFreeEx(ct, c, true);
  14091. }
  14092. FreeRpcEnumGroup(&t);
  14093. FreeParamValueList(o);
  14094. return 0;
  14095. }
  14096. // Create a group
  14097. UINT PsGroupCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14098. {
  14099. LIST *o;
  14100. PS *ps = (PS *)param;
  14101. UINT ret = 0;
  14102. RPC_SET_GROUP t;
  14103. // Parameter list that can be specified
  14104. PARAM args[] =
  14105. {
  14106. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14107. {"[name]", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14108. {"REALNAME", CmdPrompt, _UU("CMD_GroupCreate_Prompt_REALNAME"), NULL, NULL},
  14109. {"NOTE", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NOTE"), NULL, NULL},
  14110. };
  14111. // If virtual HUB is not selected, it's an error
  14112. if (ps->HubName == NULL)
  14113. {
  14114. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14115. return ERR_INVALID_PARAMETER;
  14116. }
  14117. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14118. if (o == NULL)
  14119. {
  14120. return ERR_INVALID_PARAMETER;
  14121. }
  14122. Zero(&t, sizeof(t));
  14123. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14124. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14125. UniStrCpy(t.Realname, sizeof(t.Realname), GetParamUniStr(o, "REALNAME"));
  14126. UniStrCpy(t.Note, sizeof(t.Note), GetParamUniStr(o, "NOTE"));
  14127. // RPC call
  14128. ret = ScCreateGroup(ps->Rpc, &t);
  14129. if (ret != ERR_NO_ERROR)
  14130. {
  14131. // An error has occured
  14132. CmdPrintError(c, ret);
  14133. FreeParamValueList(o);
  14134. return ret;
  14135. }
  14136. FreeRpcSetGroup(&t);
  14137. FreeParamValueList(o);
  14138. return 0;
  14139. }
  14140. // Set the group information
  14141. UINT PsGroupSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14142. {
  14143. LIST *o;
  14144. PS *ps = (PS *)param;
  14145. UINT ret = 0;
  14146. RPC_SET_GROUP t;
  14147. // Parameter list that can be specified
  14148. PARAM args[] =
  14149. {
  14150. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14151. {"[name]", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14152. {"REALNAME", CmdPrompt, _UU("CMD_GroupCreate_Prompt_REALNAME"), NULL, NULL},
  14153. {"NOTE", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NOTE"), NULL, NULL},
  14154. };
  14155. // If virtual HUB is not selected, it's an error
  14156. if (ps->HubName == NULL)
  14157. {
  14158. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14159. return ERR_INVALID_PARAMETER;
  14160. }
  14161. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14162. if (o == NULL)
  14163. {
  14164. return ERR_INVALID_PARAMETER;
  14165. }
  14166. Zero(&t, sizeof(t));
  14167. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14168. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14169. // RPC call
  14170. ret = ScGetGroup(ps->Rpc, &t);
  14171. if (ret != ERR_NO_ERROR)
  14172. {
  14173. // An error has occured
  14174. CmdPrintError(c, ret);
  14175. FreeParamValueList(o);
  14176. return ret;
  14177. }
  14178. // Information update
  14179. UniStrCpy(t.Realname, sizeof(t.Realname), GetParamUniStr(o, "REALNAME"));
  14180. UniStrCpy(t.Note, sizeof(t.Note), GetParamUniStr(o, "NOTE"));
  14181. // RPC call
  14182. ret = ScSetGroup(ps->Rpc, &t);
  14183. if (ret != ERR_NO_ERROR)
  14184. {
  14185. // An error has occured
  14186. CmdPrintError(c, ret);
  14187. FreeParamValueList(o);
  14188. return ret;
  14189. }
  14190. FreeRpcSetGroup(&t);
  14191. FreeParamValueList(o);
  14192. return 0;
  14193. }
  14194. // Delete a group
  14195. UINT PsGroupDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14196. {
  14197. LIST *o;
  14198. PS *ps = (PS *)param;
  14199. UINT ret = 0;
  14200. RPC_DELETE_USER t;
  14201. // Parameter list that can be specified
  14202. PARAM args[] =
  14203. {
  14204. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14205. {"[name]", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14206. };
  14207. // If virtual HUB is not selected, it's an error
  14208. if (ps->HubName == NULL)
  14209. {
  14210. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14211. return ERR_INVALID_PARAMETER;
  14212. }
  14213. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14214. if (o == NULL)
  14215. {
  14216. return ERR_INVALID_PARAMETER;
  14217. }
  14218. Zero(&t, sizeof(t));
  14219. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14220. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14221. // RPC call
  14222. ret = ScDeleteGroup(ps->Rpc, &t);
  14223. if (ret != ERR_NO_ERROR)
  14224. {
  14225. // An error has occured
  14226. CmdPrintError(c, ret);
  14227. FreeParamValueList(o);
  14228. return ret;
  14229. }
  14230. FreeParamValueList(o);
  14231. return 0;
  14232. }
  14233. // Get the group information and the list of users who belong to the group
  14234. UINT PsGroupGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14235. {
  14236. LIST *o;
  14237. PS *ps = (PS *)param;
  14238. UINT ret = 0;
  14239. RPC_SET_GROUP t;
  14240. // Parameter list that can be specified
  14241. PARAM args[] =
  14242. {
  14243. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14244. {"[name]", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14245. };
  14246. // If virtual HUB is not selected, it's an error
  14247. if (ps->HubName == NULL)
  14248. {
  14249. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14250. return ERR_INVALID_PARAMETER;
  14251. }
  14252. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14253. if (o == NULL)
  14254. {
  14255. return ERR_INVALID_PARAMETER;
  14256. }
  14257. Zero(&t, sizeof(t));
  14258. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14259. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14260. // RPC call
  14261. ret = ScGetGroup(ps->Rpc, &t);
  14262. if (ret != ERR_NO_ERROR)
  14263. {
  14264. // An error has occured
  14265. CmdPrintError(c, ret);
  14266. FreeParamValueList(o);
  14267. return ret;
  14268. }
  14269. else
  14270. {
  14271. wchar_t tmp[MAX_SIZE];
  14272. char groupname[MAX_USERNAME_LEN + 1];
  14273. CT *ct = CtNewStandard();
  14274. StrCpy(groupname, sizeof(groupname), t.Name);
  14275. StrToUni(tmp, sizeof(tmp), t.Name);
  14276. CtInsert(ct, _UU("CMD_GroupGet_Column_NAME"), tmp);
  14277. CtInsert(ct, _UU("CMD_GroupGet_Column_REALNAME"), t.Realname);
  14278. CtInsert(ct, _UU("CMD_GroupGet_Column_NOTE"), t.Note);
  14279. CtFree(ct, c);
  14280. if (t.Policy != NULL)
  14281. {
  14282. c->Write(c, L"");
  14283. c->Write(c, _UU("CMD_GroupGet_Column_POLICY"));
  14284. PrintPolicy(c, t.Policy, false);
  14285. }
  14286. {
  14287. RPC_ENUM_USER t;
  14288. bool b = false;
  14289. Zero(&t, sizeof(t));
  14290. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14291. if (ScEnumUser(ps->Rpc, &t) == ERR_NO_ERROR)
  14292. {
  14293. UINT i;
  14294. for (i = 0;i < t.NumUser;i++)
  14295. {
  14296. RPC_ENUM_USER_ITEM *u = &t.Users[i];
  14297. if (StrCmpi(u->GroupName, groupname) == 0)
  14298. {
  14299. if (b == false)
  14300. {
  14301. b = true;
  14302. c->Write(c, L"");
  14303. c->Write(c, _UU("CMD_GroupGet_Column_MEMBERS"));
  14304. }
  14305. UniFormat(tmp, sizeof(tmp), L" %S", u->Name);
  14306. c->Write(c, tmp);
  14307. }
  14308. }
  14309. FreeRpcEnumUser(&t);
  14310. if (b)
  14311. {
  14312. c->Write(c, L"");
  14313. }
  14314. }
  14315. }
  14316. }
  14317. FreeRpcSetGroup(&t);
  14318. FreeParamValueList(o);
  14319. return 0;
  14320. }
  14321. // Add an user to the group
  14322. UINT PsGroupJoin(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14323. {
  14324. LIST *o;
  14325. PS *ps = (PS *)param;
  14326. UINT ret = 0;
  14327. RPC_SET_USER t;
  14328. // Parameter list that can be specified
  14329. PARAM args[] =
  14330. {
  14331. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14332. {"[name]", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14333. {"USERNAME", CmdPrompt, _UU("CMD_GroupJoin_Prompt_USERNAME"), CmdEvalNotEmpty, NULL},
  14334. };
  14335. // If virtual HUB is not selected, it's an error
  14336. if (ps->HubName == NULL)
  14337. {
  14338. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14339. return ERR_INVALID_PARAMETER;
  14340. }
  14341. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14342. if (o == NULL)
  14343. {
  14344. return ERR_INVALID_PARAMETER;
  14345. }
  14346. Zero(&t, sizeof(t));
  14347. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14348. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "USERNAME"));
  14349. // RPC call
  14350. ret = ScGetUser(ps->Rpc, &t);
  14351. if (ret != ERR_NO_ERROR)
  14352. {
  14353. // An error has occured
  14354. CmdPrintError(c, ret);
  14355. FreeParamValueList(o);
  14356. return ret;
  14357. }
  14358. else
  14359. {
  14360. // Update the Group
  14361. StrCpy(t.GroupName, sizeof(t.GroupName), GetParamStr(o, "[name]"));
  14362. ret = ScSetUser(ps->Rpc, &t);
  14363. if (ret != ERR_NO_ERROR)
  14364. {
  14365. // An error has occured
  14366. CmdPrintError(c, ret);
  14367. FreeParamValueList(o);
  14368. return ret;
  14369. }
  14370. }
  14371. FreeRpcSetUser(&t);
  14372. FreeParamValueList(o);
  14373. return 0;
  14374. }
  14375. // Delete the user from a group
  14376. UINT PsGroupUnjoin(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14377. {
  14378. LIST *o;
  14379. PS *ps = (PS *)param;
  14380. UINT ret = 0;
  14381. RPC_SET_USER t;
  14382. // Parameter list that can be specified
  14383. PARAM args[] =
  14384. {
  14385. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14386. {"[name]", CmdPrompt, _UU("CMD_GroupUnjoin_Prompt_name"), CmdEvalNotEmpty, NULL},
  14387. };
  14388. // If virtual HUB is not selected, it's an error
  14389. if (ps->HubName == NULL)
  14390. {
  14391. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14392. return ERR_INVALID_PARAMETER;
  14393. }
  14394. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14395. if (o == NULL)
  14396. {
  14397. return ERR_INVALID_PARAMETER;
  14398. }
  14399. Zero(&t, sizeof(t));
  14400. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14401. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14402. // RPC call
  14403. ret = ScGetUser(ps->Rpc, &t);
  14404. if (ret != ERR_NO_ERROR)
  14405. {
  14406. // An error has occured
  14407. CmdPrintError(c, ret);
  14408. FreeParamValueList(o);
  14409. return ret;
  14410. }
  14411. else
  14412. {
  14413. // Update the Group
  14414. StrCpy(t.GroupName, sizeof(t.GroupName), "");
  14415. ret = ScSetUser(ps->Rpc, &t);
  14416. if (ret != ERR_NO_ERROR)
  14417. {
  14418. // An error has occured
  14419. CmdPrintError(c, ret);
  14420. FreeParamValueList(o);
  14421. return ret;
  14422. }
  14423. }
  14424. FreeRpcSetUser(&t);
  14425. FreeParamValueList(o);
  14426. return 0;
  14427. }
  14428. // Delete the security policy of the group
  14429. UINT PsGroupPolicyRemove(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14430. {
  14431. LIST *o;
  14432. PS *ps = (PS *)param;
  14433. UINT ret = 0;
  14434. RPC_SET_GROUP t;
  14435. // Parameter list that can be specified
  14436. PARAM args[] =
  14437. {
  14438. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14439. {"[name]", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14440. };
  14441. // If virtual HUB is not selected, it's an error
  14442. if (ps->HubName == NULL)
  14443. {
  14444. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14445. return ERR_INVALID_PARAMETER;
  14446. }
  14447. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14448. if (o == NULL)
  14449. {
  14450. return ERR_INVALID_PARAMETER;
  14451. }
  14452. Zero(&t, sizeof(t));
  14453. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14454. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14455. // RPC call
  14456. ret = ScGetGroup(ps->Rpc, &t);
  14457. if (ret != ERR_NO_ERROR)
  14458. {
  14459. // An error has occured
  14460. CmdPrintError(c, ret);
  14461. FreeParamValueList(o);
  14462. return ret;
  14463. }
  14464. else
  14465. {
  14466. // Update
  14467. if (t.Policy != NULL)
  14468. {
  14469. Free(t.Policy);
  14470. t.Policy = NULL;
  14471. }
  14472. ret = ScSetGroup(ps->Rpc, &t);
  14473. if (ret != ERR_NO_ERROR)
  14474. {
  14475. // An error has occured
  14476. CmdPrintError(c, ret);
  14477. FreeParamValueList(o);
  14478. return ret;
  14479. }
  14480. }
  14481. FreeRpcSetGroup(&t);
  14482. FreeParamValueList(o);
  14483. return 0;
  14484. }
  14485. // Set a security policy to a group
  14486. UINT PsGroupPolicySet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14487. {
  14488. LIST *o;
  14489. PS *ps = (PS *)param;
  14490. UINT ret = 0;
  14491. RPC_SET_GROUP t;
  14492. // Parameter list that can be specified
  14493. PARAM args[] =
  14494. {
  14495. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14496. {"[name]", CmdPrompt, _UU("CMD_GroupCreate_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14497. {"NAME", CmdPrompt, _UU("CMD_CascadePolicySet_PROMPT_POLNAME"), CmdEvalNotEmpty, NULL},
  14498. {"VALUE", CmdPrompt, _UU("CMD_CascadePolicySet_PROMPT_POLVALUE"), CmdEvalNotEmpty, NULL},
  14499. };
  14500. // If virtual HUB is not selected, it's an error
  14501. if (ps->HubName == NULL)
  14502. {
  14503. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14504. return ERR_INVALID_PARAMETER;
  14505. }
  14506. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14507. if (o == NULL)
  14508. {
  14509. return ERR_INVALID_PARAMETER;
  14510. }
  14511. Zero(&t, sizeof(t));
  14512. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14513. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14514. // RPC call
  14515. ret = ScGetGroup(ps->Rpc, &t);
  14516. if (ret != ERR_NO_ERROR)
  14517. {
  14518. // An error has occured
  14519. CmdPrintError(c, ret);
  14520. FreeParamValueList(o);
  14521. return ret;
  14522. }
  14523. else
  14524. {
  14525. // Update
  14526. if (t.Policy == NULL)
  14527. {
  14528. t.Policy = ClonePolicy(GetDefaultPolicy());
  14529. }
  14530. if (EditPolicy(c, t.Policy, GetParamStr(o, "NAME"), GetParamStr(o, "VALUE"), false) == false)
  14531. {
  14532. // An error has occured
  14533. FreeRpcSetGroup(&t);
  14534. CmdPrintError(c, ret);
  14535. FreeParamValueList(o);
  14536. return ERR_INTERNAL_ERROR;
  14537. }
  14538. ret = ScSetGroup(ps->Rpc, &t);
  14539. if (ret != ERR_NO_ERROR)
  14540. {
  14541. // An error has occured
  14542. CmdPrintError(c, ret);
  14543. FreeParamValueList(o);
  14544. return ret;
  14545. }
  14546. }
  14547. FreeRpcSetGroup(&t);
  14548. FreeParamValueList(o);
  14549. return 0;
  14550. }
  14551. // Get the connected session list
  14552. UINT PsSessionList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14553. {
  14554. LIST *o;
  14555. PS *ps = (PS *)param;
  14556. UINT ret = 0;
  14557. RPC_ENUM_SESSION t;
  14558. UINT server_type = 0;
  14559. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  14560. if (o == NULL)
  14561. {
  14562. return ERR_INVALID_PARAMETER;
  14563. }
  14564. // If virtual HUB is not selected, it's an error
  14565. if (ps->HubName == NULL)
  14566. {
  14567. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14568. return ERR_INVALID_PARAMETER;
  14569. }
  14570. {
  14571. // Get the server type
  14572. RPC_SERVER_INFO t;
  14573. Zero(&t, sizeof(t));
  14574. if (ScGetServerInfo(ps->Rpc, &t) == ERR_NO_ERROR)
  14575. {
  14576. server_type = t.ServerType;
  14577. FreeRpcServerInfo(&t);
  14578. }
  14579. }
  14580. Zero(&t, sizeof(t));
  14581. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14582. // RPC call
  14583. ret = ScEnumSession(ps->Rpc, &t);
  14584. if (ret != ERR_NO_ERROR)
  14585. {
  14586. // An error has occured
  14587. CmdPrintError(c, ret);
  14588. FreeParamValueList(o);
  14589. return ret;
  14590. }
  14591. else
  14592. {
  14593. CT *ct = CtNew();
  14594. UINT i;
  14595. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_1"), false);
  14596. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_8"), false);
  14597. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_2"), false);
  14598. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_3"), false);
  14599. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_4"), false);
  14600. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_5"), true);
  14601. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_6"), true);
  14602. CtInsertColumn(ct, _UU("SM_SESS_COLUMN_7"), true);
  14603. for (i = 0;i < t.NumSession;i++)
  14604. {
  14605. RPC_ENUM_SESSION_ITEM *e = &t.Sessions[i];
  14606. wchar_t tmp1[MAX_SIZE];
  14607. wchar_t *tmp2;
  14608. wchar_t tmp3[MAX_SIZE];
  14609. wchar_t tmp4[MAX_SIZE];
  14610. wchar_t tmp5[MAX_SIZE];
  14611. wchar_t tmp6[MAX_SIZE];
  14612. wchar_t tmp7[MAX_SIZE];
  14613. wchar_t tmp8[MAX_SIZE];
  14614. bool free_tmp2 = false;
  14615. StrToUni(tmp1, sizeof(tmp1), e->Name);
  14616. tmp2 = _UU("SM_SESS_NORMAL");
  14617. if (server_type != SERVER_TYPE_STANDALONE)
  14618. {
  14619. if (e->RemoteSession)
  14620. {
  14621. tmp2 = ZeroMalloc(MAX_SIZE);
  14622. UniFormat(tmp2, MAX_SIZE, _UU("SM_SESS_REMOTE"), e->RemoteHostname);
  14623. free_tmp2 = true;
  14624. }
  14625. else
  14626. {
  14627. if (StrLen(e->RemoteHostname) == 0)
  14628. {
  14629. tmp2 = _UU("SM_SESS_LOCAL");
  14630. }
  14631. else
  14632. {
  14633. tmp2 = ZeroMalloc(MAX_SIZE);
  14634. UniFormat(tmp2, MAX_SIZE, _UU("SM_SESS_LOCAL_2"), e->RemoteHostname);
  14635. free_tmp2 = true;
  14636. }
  14637. }
  14638. }
  14639. if (e->LinkMode)
  14640. {
  14641. if (free_tmp2)
  14642. {
  14643. Free(tmp2);
  14644. free_tmp2 = false;
  14645. }
  14646. tmp2 = _UU("SM_SESS_LINK");
  14647. }
  14648. else if (e->SecureNATMode)
  14649. {
  14650. /*if (free_tmp2)
  14651. {
  14652. Free(tmp2);
  14653. free_tmp2 = false;
  14654. }*/
  14655. tmp2 = _UU("SM_SESS_SNAT");
  14656. }
  14657. StrToUni(tmp3, sizeof(tmp3), e->Username);
  14658. StrToUni(tmp4, sizeof(tmp4), e->Hostname);
  14659. if (e->LinkMode)
  14660. {
  14661. UniStrCpy(tmp4, sizeof(tmp4), _UU("SM_SESS_LINK_HOSTNAME"));
  14662. }
  14663. else if (e->SecureNATMode)
  14664. {
  14665. UniStrCpy(tmp4, sizeof(tmp4), _UU("SM_SESS_SNAT_HOSTNAME"));
  14666. }
  14667. else if (e->BridgeMode)
  14668. {
  14669. UniStrCpy(tmp4, sizeof(tmp4), _UU("SM_SESS_BRIDGE_HOSTNAME"));
  14670. }
  14671. else if (StartWith(e->Username, L3_USERNAME))
  14672. {
  14673. UniStrCpy(tmp4, sizeof(tmp4), _UU("SM_SESS_LAYER3_HOSTNAME"));
  14674. }
  14675. UniFormat(tmp5, sizeof(tmp5), L"%u / %u", e->CurrentNumTcp, e->MaxNumTcp);
  14676. if (e->LinkMode)
  14677. {
  14678. UniStrCpy(tmp5, sizeof(tmp5), _UU("SM_SESS_LINK_TCP"));
  14679. }
  14680. else if (e->SecureNATMode)
  14681. {
  14682. UniStrCpy(tmp5, sizeof(tmp5), _UU("SM_SESS_SNAT_TCP"));
  14683. }
  14684. else if (e->BridgeMode)
  14685. {
  14686. UniStrCpy(tmp5, sizeof(tmp5), _UU("SM_SESS_BRIDGE_TCP"));
  14687. }
  14688. UniToStr3(tmp6, sizeof(tmp6), e->PacketSize);
  14689. UniToStr3(tmp7, sizeof(tmp7), e->PacketNum);
  14690. if (e->VLanId == 0)
  14691. {
  14692. UniStrCpy(tmp8, sizeof(tmp8), _UU("CM_ST_NO_VLAN"));
  14693. }
  14694. else
  14695. {
  14696. UniToStru(tmp8, e->VLanId);
  14697. }
  14698. CtInsert(ct, tmp1, tmp8, tmp2, tmp3, tmp4, tmp5, tmp6, tmp7);
  14699. if (free_tmp2)
  14700. {
  14701. Free(tmp2);
  14702. }
  14703. }
  14704. CtFreeEx(ct, c, true);
  14705. }
  14706. FreeRpcEnumSession(&t);
  14707. FreeParamValueList(o);
  14708. return 0;
  14709. }
  14710. // Display the NODE_INFO
  14711. void CmdPrintNodeInfo(CT *ct, NODE_INFO *info)
  14712. {
  14713. wchar_t tmp[MAX_SIZE];
  14714. char str[MAX_SIZE];
  14715. // Validate arguments
  14716. if (ct == NULL || info == NULL)
  14717. {
  14718. return;
  14719. }
  14720. StrToUni(tmp, sizeof(tmp), info->ClientProductName);
  14721. CtInsert(ct, _UU("SM_NODE_CLIENT_NAME"), tmp);
  14722. UniFormat(tmp, sizeof(tmp), L"%u.%02u", Endian32(info->ClientProductVer) / 100, Endian32(info->ClientProductVer) % 100);
  14723. CtInsert(ct, _UU("SM_NODE_CLIENT_VER"), tmp);
  14724. UniFormat(tmp, sizeof(tmp), L"Build %u", Endian32(info->ClientProductBuild));
  14725. CtInsert(ct, _UU("SM_NODE_CLIENT_BUILD"), tmp);
  14726. StrToUni(tmp, sizeof(tmp), info->ClientOsName);
  14727. CtInsert(ct, _UU("SM_NODE_CLIENT_OS_NAME"), tmp);
  14728. StrToUni(tmp, sizeof(tmp), info->ClientOsVer);
  14729. CtInsert(ct, _UU("SM_NODE_CLIENT_OS_VER"), tmp);
  14730. StrToUni(tmp, sizeof(tmp), info->ClientOsProductId);
  14731. CtInsert(ct, _UU("SM_NODE_CLIENT_OS_PID"), tmp);
  14732. StrToUni(tmp, sizeof(tmp), info->ClientHostname);
  14733. CtInsert(ct, _UU("SM_NODE_CLIENT_HOST"), tmp);
  14734. IPToStr4or6(str, sizeof(str), info->ClientIpAddress, info->ClientIpAddress6);
  14735. StrToUni(tmp, sizeof(tmp), str);
  14736. CtInsert(ct, _UU("SM_NODE_CLIENT_IP"), tmp);
  14737. UniToStru(tmp, Endian32(info->ClientPort));
  14738. CtInsert(ct, _UU("SM_NODE_CLIENT_PORT"), tmp);
  14739. StrToUni(tmp, sizeof(tmp), info->ServerHostname);
  14740. CtInsert(ct, _UU("SM_NODE_SERVER_HOST"), tmp);
  14741. IPToStr4or6(str, sizeof(str), info->ServerIpAddress, info->ServerIpAddress6);
  14742. StrToUni(tmp, sizeof(tmp), str);
  14743. CtInsert(ct, _UU("SM_NODE_SERVER_IP"), tmp);
  14744. UniToStru(tmp, Endian32(info->ServerPort));
  14745. CtInsert(ct, _UU("SM_NODE_SERVER_PORT"), tmp);
  14746. if (StrLen(info->ProxyHostname) != 0)
  14747. {
  14748. StrToUni(tmp, sizeof(tmp), info->ProxyHostname);
  14749. CtInsert(ct, _UU("SM_NODE_PROXY_HOSTNAME"), tmp);
  14750. IPToStr4or6(str, sizeof(str), info->ProxyIpAddress, info->ProxyIpAddress6);
  14751. StrToUni(tmp, sizeof(tmp), str);
  14752. CtInsert(ct, _UU("SM_NODE_PROXY_IP"), tmp);
  14753. UniToStru(tmp, Endian32(info->ProxyPort));
  14754. CtInsert(ct, _UU("SM_NODE_PROXY_PORT"), tmp);
  14755. }
  14756. }
  14757. // Get the session information
  14758. UINT PsSessionGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14759. {
  14760. LIST *o;
  14761. PS *ps = (PS *)param;
  14762. UINT ret = 0;
  14763. RPC_SESSION_STATUS t;
  14764. // Parameter list that can be specified
  14765. PARAM args[] =
  14766. {
  14767. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14768. {"[name]", CmdPrompt, _UU("CMD_SessionGet_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14769. };
  14770. // If virtual HUB is not selected, it's an error
  14771. if (ps->HubName == NULL)
  14772. {
  14773. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14774. return ERR_INVALID_PARAMETER;
  14775. }
  14776. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14777. if (o == NULL)
  14778. {
  14779. return ERR_INVALID_PARAMETER;
  14780. }
  14781. Zero(&t, sizeof(t));
  14782. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14783. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14784. // RPC call
  14785. ret = ScGetSessionStatus(ps->Rpc, &t);
  14786. if (ret != ERR_NO_ERROR)
  14787. {
  14788. // An error has occured
  14789. CmdPrintError(c, ret);
  14790. FreeParamValueList(o);
  14791. return ret;
  14792. }
  14793. else
  14794. {
  14795. wchar_t tmp[MAX_SIZE];
  14796. char str[MAX_SIZE];
  14797. CT *ct = CtNewStandard();
  14798. if (t.ClientIp != 0)
  14799. {
  14800. IPToStr4or6(str, sizeof(str), t.ClientIp, t.ClientIp6);
  14801. StrToUni(tmp, sizeof(tmp), str);
  14802. CtInsert(ct, _UU("SM_CLIENT_IP"), tmp);
  14803. }
  14804. if (StrLen(t.ClientHostName) != 0)
  14805. {
  14806. StrToUni(tmp, sizeof(tmp), t.ClientHostName);
  14807. CtInsert(ct, _UU("SM_CLIENT_HOSTNAME"), tmp);
  14808. }
  14809. StrToUni(tmp, sizeof(tmp), t.Username);
  14810. CtInsert(ct, _UU("SM_SESS_STATUS_USERNAME"), tmp);
  14811. if (StrCmpi(t.Username, LINK_USER_NAME_PRINT) != 0 && StrCmpi(t.Username, SNAT_USER_NAME_PRINT) != 0 && StrCmpi(t.Username, BRIDGE_USER_NAME_PRINT) != 0)
  14812. {
  14813. StrToUni(tmp, sizeof(tmp), t.RealUsername);
  14814. CtInsert(ct, _UU("SM_SESS_STATUS_REALUSER"), tmp);
  14815. }
  14816. if (IsEmptyStr(t.GroupName) == false)
  14817. {
  14818. StrToUni(tmp, sizeof(tmp), t.GroupName);
  14819. CtInsert(ct, _UU("SM_SESS_STATUS_GROUPNAME"), tmp);
  14820. }
  14821. CmdPrintStatusToListViewEx(ct, &t.Status, true);
  14822. if (StrCmpi(t.Username, LINK_USER_NAME_PRINT) != 0 && StrCmpi(t.Username, SNAT_USER_NAME_PRINT) != 0 && StrCmpi(t.Username, BRIDGE_USER_NAME_PRINT) != 0 &&
  14823. StartWith(t.Username, L3_USERNAME) == false)
  14824. {
  14825. CmdPrintNodeInfo(ct, &t.NodeInfo);
  14826. }
  14827. CtFree(ct, c);
  14828. }
  14829. FreeRpcSessionStatus(&t);
  14830. FreeParamValueList(o);
  14831. return 0;
  14832. }
  14833. // Disconnect the session
  14834. UINT PsSessionDisconnect(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14835. {
  14836. LIST *o;
  14837. PS *ps = (PS *)param;
  14838. UINT ret = 0;
  14839. RPC_DELETE_SESSION t;
  14840. // Parameter list that can be specified
  14841. PARAM args[] =
  14842. {
  14843. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14844. {"[name]", CmdPrompt, _UU("CMD_SessionGet_Prompt_NAME"), CmdEvalNotEmpty, NULL},
  14845. };
  14846. // If virtual HUB is not selected, it's an error
  14847. if (ps->HubName == NULL)
  14848. {
  14849. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14850. return ERR_INVALID_PARAMETER;
  14851. }
  14852. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14853. if (o == NULL)
  14854. {
  14855. return ERR_INVALID_PARAMETER;
  14856. }
  14857. Zero(&t, sizeof(t));
  14858. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14859. StrCpy(t.Name, sizeof(t.Name), GetParamStr(o, "[name]"));
  14860. // RPC call
  14861. ret = ScDeleteSession(ps->Rpc, &t);
  14862. if (ret != ERR_NO_ERROR)
  14863. {
  14864. // An error has occured
  14865. CmdPrintError(c, ret);
  14866. FreeParamValueList(o);
  14867. return ret;
  14868. }
  14869. FreeParamValueList(o);
  14870. return 0;
  14871. }
  14872. // Get the MAC address table database
  14873. UINT PsMacTable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14874. {
  14875. LIST *o;
  14876. PS *ps = (PS *)param;
  14877. UINT ret = 0;
  14878. RPC_ENUM_MAC_TABLE t;
  14879. UINT i;
  14880. // Parameter list that can be specified
  14881. PARAM args[] =
  14882. {
  14883. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14884. {"[session_name]", NULL, NULL, NULL, NULL,}
  14885. };
  14886. // If virtual HUB is not selected, it's an error
  14887. if (ps->HubName == NULL)
  14888. {
  14889. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14890. return ERR_INVALID_PARAMETER;
  14891. }
  14892. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14893. if (o == NULL)
  14894. {
  14895. return ERR_INVALID_PARAMETER;
  14896. }
  14897. Zero(&t, sizeof(t));
  14898. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14899. // RPC call
  14900. ret = ScEnumMacTable(ps->Rpc, &t);
  14901. if (ret != ERR_NO_ERROR)
  14902. {
  14903. // An error has occured
  14904. CmdPrintError(c, ret);
  14905. FreeParamValueList(o);
  14906. return ret;
  14907. }
  14908. else
  14909. {
  14910. CT *ct = CtNew();
  14911. char *session_name = GetParamStr(o, "[session_name]");
  14912. if (IsEmptyStr(session_name))
  14913. {
  14914. session_name = NULL;
  14915. }
  14916. CtInsertColumn(ct, _UU("CMD_ID"), false);
  14917. CtInsertColumn(ct, _UU("SM_MAC_COLUMN_1"), false);
  14918. CtInsertColumn(ct, _UU("SM_MAC_COLUMN_1A"), false);
  14919. CtInsertColumn(ct, _UU("SM_MAC_COLUMN_2"), false);
  14920. CtInsertColumn(ct, _UU("SM_MAC_COLUMN_3"), false);
  14921. CtInsertColumn(ct, _UU("SM_MAC_COLUMN_4"), false);
  14922. CtInsertColumn(ct, _UU("SM_MAC_COLUMN_5"), false);
  14923. for (i = 0;i < t.NumMacTable;i++)
  14924. {
  14925. char str[MAX_SIZE];
  14926. wchar_t tmp0[128];
  14927. wchar_t tmp1[MAX_SIZE];
  14928. wchar_t tmp2[MAX_SIZE];
  14929. wchar_t tmp3[MAX_SIZE];
  14930. wchar_t tmp4[MAX_SIZE];
  14931. wchar_t tmp5[MAX_SIZE];
  14932. wchar_t tmp6[MAX_SIZE];
  14933. RPC_ENUM_MAC_TABLE_ITEM *e = &t.MacTables[i];
  14934. if (session_name == NULL || StrCmpi(e->SessionName, session_name) == 0)
  14935. {
  14936. UniToStru(tmp0, e->Key);
  14937. StrToUni(tmp1, sizeof(tmp1), e->SessionName);
  14938. MacToStr(str, sizeof(str), e->MacAddress);
  14939. StrToUni(tmp2, sizeof(tmp2), str);
  14940. GetDateTimeStr64Uni(tmp3, sizeof(tmp3), SystemToLocal64(e->CreatedTime));
  14941. GetDateTimeStr64Uni(tmp4, sizeof(tmp4), SystemToLocal64(e->UpdatedTime));
  14942. if (StrLen(e->RemoteHostname) == 0)
  14943. {
  14944. UniStrCpy(tmp5, sizeof(tmp5), _UU("SM_MACIP_LOCAL"));
  14945. }
  14946. else
  14947. {
  14948. UniFormat(tmp5, sizeof(tmp5), _UU("SM_MACIP_SERVER"), e->RemoteHostname);
  14949. }
  14950. UniToStru(tmp6, e->VlanId);
  14951. if (e->VlanId == 0)
  14952. {
  14953. UniStrCpy(tmp6, sizeof(tmp6), _UU("CM_ST_NONE"));
  14954. }
  14955. CtInsert(ct,
  14956. tmp0, tmp1, tmp6, tmp2, tmp3, tmp4, tmp5);
  14957. }
  14958. }
  14959. CtFreeEx(ct, c, true);
  14960. }
  14961. FreeRpcEnumMacTable(&t);
  14962. FreeParamValueList(o);
  14963. return 0;
  14964. }
  14965. // Delete a MAC address table entry
  14966. UINT PsMacDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  14967. {
  14968. LIST *o;
  14969. PS *ps = (PS *)param;
  14970. UINT ret = 0;
  14971. RPC_DELETE_TABLE t;
  14972. // Parameter list that can be specified
  14973. PARAM args[] =
  14974. {
  14975. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  14976. {"[id]", CmdPrompt, _UU("CMD_MacDelete_Prompt"), CmdEvalNotEmpty, NULL},
  14977. };
  14978. // If virtual HUB is not selected, it's an error
  14979. if (ps->HubName == NULL)
  14980. {
  14981. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  14982. return ERR_INVALID_PARAMETER;
  14983. }
  14984. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  14985. if (o == NULL)
  14986. {
  14987. return ERR_INVALID_PARAMETER;
  14988. }
  14989. Zero(&t, sizeof(t));
  14990. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  14991. t.Key = GetParamInt(o, "[id]");
  14992. // RPC call
  14993. ret = ScDeleteMacTable(ps->Rpc, &t);
  14994. if (ret != ERR_NO_ERROR)
  14995. {
  14996. // An error has occured
  14997. CmdPrintError(c, ret);
  14998. FreeParamValueList(o);
  14999. return ret;
  15000. }
  15001. FreeParamValueList(o);
  15002. return 0;
  15003. }
  15004. // Get the IP address table database
  15005. UINT PsIpTable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15006. {
  15007. LIST *o;
  15008. PS *ps = (PS *)param;
  15009. UINT ret = 0;
  15010. RPC_ENUM_IP_TABLE t;
  15011. UINT i;
  15012. // Parameter list that can be specified
  15013. PARAM args[] =
  15014. {
  15015. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  15016. {"[session_name]", NULL, NULL, NULL, NULL,}
  15017. };
  15018. // If virtual HUB is not selected, it's an error
  15019. if (ps->HubName == NULL)
  15020. {
  15021. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15022. return ERR_INVALID_PARAMETER;
  15023. }
  15024. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  15025. if (o == NULL)
  15026. {
  15027. return ERR_INVALID_PARAMETER;
  15028. }
  15029. Zero(&t, sizeof(t));
  15030. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15031. // RPC call
  15032. ret = ScEnumIpTable(ps->Rpc, &t);
  15033. if (ret != ERR_NO_ERROR)
  15034. {
  15035. // An error has occured
  15036. CmdPrintError(c, ret);
  15037. FreeParamValueList(o);
  15038. return ret;
  15039. }
  15040. else
  15041. {
  15042. CT *ct = CtNew();
  15043. char *session_name = GetParamStr(o, "[session_name]");
  15044. if (IsEmptyStr(session_name))
  15045. {
  15046. session_name = NULL;
  15047. }
  15048. CtInsertColumn(ct, _UU("CMD_ID"), false);
  15049. CtInsertColumn(ct, _UU("SM_IP_COLUMN_1"), false);
  15050. CtInsertColumn(ct, _UU("SM_IP_COLUMN_2"), false);
  15051. CtInsertColumn(ct, _UU("SM_IP_COLUMN_3"), false);
  15052. CtInsertColumn(ct, _UU("SM_IP_COLUMN_4"), false);
  15053. CtInsertColumn(ct, _UU("SM_IP_COLUMN_5"), false);
  15054. for (i = 0;i < t.NumIpTable;i++)
  15055. {
  15056. char str[MAX_SIZE];
  15057. wchar_t tmp0[128];
  15058. wchar_t tmp1[MAX_SIZE];
  15059. wchar_t tmp2[MAX_SIZE];
  15060. wchar_t tmp3[MAX_SIZE];
  15061. wchar_t tmp4[MAX_SIZE];
  15062. wchar_t tmp5[MAX_SIZE];
  15063. RPC_ENUM_IP_TABLE_ITEM *e = &t.IpTables[i];
  15064. if (session_name == NULL || StrCmpi(e->SessionName, session_name) == 0)
  15065. {
  15066. UniToStru(tmp0, e->Key);
  15067. StrToUni(tmp1, sizeof(tmp1), e->SessionName);
  15068. if (e->DhcpAllocated == false)
  15069. {
  15070. IPToStr(str, sizeof(str), &e->IpV6);
  15071. StrToUni(tmp2, sizeof(tmp2), str);
  15072. }
  15073. else
  15074. {
  15075. IPToStr(str, sizeof(str), &e->IpV6);
  15076. UniFormat(tmp2, sizeof(tmp2), _UU("SM_MAC_IP_DHCP"), str);
  15077. }
  15078. GetDateTimeStr64Uni(tmp3, sizeof(tmp3), SystemToLocal64(e->CreatedTime));
  15079. GetDateTimeStr64Uni(tmp4, sizeof(tmp4), SystemToLocal64(e->UpdatedTime));
  15080. if (StrLen(e->RemoteHostname) == 0)
  15081. {
  15082. UniStrCpy(tmp5, sizeof(tmp5), _UU("SM_MACIP_LOCAL"));
  15083. }
  15084. else
  15085. {
  15086. UniFormat(tmp5, sizeof(tmp5), _UU("SM_MACIP_SERVER"), e->RemoteHostname);
  15087. }
  15088. CtInsert(ct,
  15089. tmp0, tmp1, tmp2, tmp3, tmp4, tmp5);
  15090. }
  15091. }
  15092. CtFreeEx(ct, c, true);
  15093. }
  15094. FreeRpcEnumIpTable(&t);
  15095. FreeParamValueList(o);
  15096. return 0;
  15097. }
  15098. // Delete the IP address table entry
  15099. UINT PsIpDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15100. {
  15101. LIST *o;
  15102. PS *ps = (PS *)param;
  15103. UINT ret = 0;
  15104. RPC_DELETE_TABLE t;
  15105. // Parameter list that can be specified
  15106. PARAM args[] =
  15107. {
  15108. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  15109. {"[id]", CmdPrompt, _UU("CMD_MacDelete_Prompt"), CmdEvalNotEmpty, NULL},
  15110. };
  15111. // If virtual HUB is not selected, it's an error
  15112. if (ps->HubName == NULL)
  15113. {
  15114. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15115. return ERR_INVALID_PARAMETER;
  15116. }
  15117. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  15118. if (o == NULL)
  15119. {
  15120. return ERR_INVALID_PARAMETER;
  15121. }
  15122. Zero(&t, sizeof(t));
  15123. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15124. t.Key = GetParamInt(o, "[id]");
  15125. // RPC call
  15126. ret = ScDeleteIpTable(ps->Rpc, &t);
  15127. if (ret != ERR_NO_ERROR)
  15128. {
  15129. // An error has occured
  15130. CmdPrintError(c, ret);
  15131. FreeParamValueList(o);
  15132. return ret;
  15133. }
  15134. FreeParamValueList(o);
  15135. return 0;
  15136. }
  15137. // Enable the DHCP server function and the virtual NAT (SecureNAT function)
  15138. UINT PsSecureNatEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15139. {
  15140. LIST *o;
  15141. PS *ps = (PS *)param;
  15142. UINT ret = 0;
  15143. RPC_HUB t;
  15144. // If virtual HUB is not selected, it's an error
  15145. if (ps->HubName == NULL)
  15146. {
  15147. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15148. return ERR_INVALID_PARAMETER;
  15149. }
  15150. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15151. if (o == NULL)
  15152. {
  15153. return ERR_INVALID_PARAMETER;
  15154. }
  15155. Zero(&t, sizeof(t));
  15156. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15157. // RPC call
  15158. ret = ScEnableSecureNAT(ps->Rpc, &t);
  15159. if (ret != ERR_NO_ERROR)
  15160. {
  15161. // An error has occured
  15162. CmdPrintError(c, ret);
  15163. FreeParamValueList(o);
  15164. return ret;
  15165. }
  15166. FreeParamValueList(o);
  15167. return 0;
  15168. }
  15169. // Disable the DHCP server function and the virtual NAT (SecureNAT function)
  15170. UINT PsSecureNatDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15171. {
  15172. LIST *o;
  15173. PS *ps = (PS *)param;
  15174. UINT ret = 0;
  15175. RPC_HUB t;
  15176. // If virtual HUB is not selected, it's an error
  15177. if (ps->HubName == NULL)
  15178. {
  15179. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15180. return ERR_INVALID_PARAMETER;
  15181. }
  15182. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15183. if (o == NULL)
  15184. {
  15185. return ERR_INVALID_PARAMETER;
  15186. }
  15187. Zero(&t, sizeof(t));
  15188. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15189. // RPC call
  15190. ret = ScDisableSecureNAT(ps->Rpc, &t);
  15191. if (ret != ERR_NO_ERROR)
  15192. {
  15193. // An error has occured
  15194. CmdPrintError(c, ret);
  15195. FreeParamValueList(o);
  15196. return ret;
  15197. }
  15198. FreeParamValueList(o);
  15199. return 0;
  15200. }
  15201. // Get the operating status of the DHCP server function and the virtual NAT (SecureNAT function)
  15202. UINT PsSecureNatStatusGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15203. {
  15204. LIST *o;
  15205. PS *ps = (PS *)param;
  15206. UINT ret = 0;
  15207. RPC_NAT_STATUS t;
  15208. // If virtual HUB is not selected, it's an error
  15209. if (ps->HubName == NULL)
  15210. {
  15211. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15212. return ERR_INVALID_PARAMETER;
  15213. }
  15214. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15215. if (o == NULL)
  15216. {
  15217. return ERR_INVALID_PARAMETER;
  15218. }
  15219. Zero(&t, sizeof(t));
  15220. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15221. // RPC call
  15222. ret = ScGetSecureNATStatus(ps->Rpc, &t);
  15223. if (ret != ERR_NO_ERROR)
  15224. {
  15225. // An error has occured
  15226. CmdPrintError(c, ret);
  15227. FreeParamValueList(o);
  15228. return ret;
  15229. }
  15230. else
  15231. {
  15232. wchar_t tmp[MAX_SIZE];
  15233. CT *ct = CtNewStandard();
  15234. StrToUni(tmp, sizeof(tmp), ps->HubName);
  15235. CtInsert(ct, _UU("SM_HUB_COLUMN_1"), tmp);
  15236. UniFormat(tmp, sizeof(tmp), _UU("SM_SNAT_NUM_SESSION"), t.NumTcpSessions);
  15237. CtInsert(ct, _UU("NM_STATUS_TCP"), tmp);
  15238. UniFormat(tmp, sizeof(tmp), _UU("SM_SNAT_NUM_SESSION"), t.NumUdpSessions);
  15239. CtInsert(ct, _UU("NM_STATUS_UDP"), tmp);
  15240. UniFormat(tmp, sizeof(tmp), _UU("SM_SNAT_NUM_SESSION"), t.NumIcmpSessions);
  15241. CtInsert(ct, _UU("NM_STATUS_ICMP"), tmp);
  15242. UniFormat(tmp, sizeof(tmp), _UU("SM_SNAT_NUM_SESSION"), t.NumDnsSessions);
  15243. CtInsert(ct, _UU("NM_STATUS_DNS"), tmp);
  15244. UniFormat(tmp, sizeof(tmp), _UU("SM_SNAT_NUM_CLIENT"), t.NumDhcpClients);
  15245. CtInsert(ct, _UU("NM_STATUS_DHCP"), tmp);
  15246. CtInsert(ct, _UU("SM_SNAT_IS_KERNEL"), t.IsKernelMode ? _UU("SEC_YES") : _UU("SEC_NO"));
  15247. CtInsert(ct, _UU("SM_SNAT_IS_RAW"), t.IsRawIpMode ? _UU("SEC_YES") : _UU("SEC_NO"));
  15248. CtFree(ct, c);
  15249. }
  15250. FreeRpcNatStatus(&t);
  15251. FreeParamValueList(o);
  15252. return 0;
  15253. }
  15254. // Get the network interface settings for a virtual host of SecureNAT function
  15255. UINT PsSecureNatHostGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15256. {
  15257. LIST *o;
  15258. PS *ps = (PS *)param;
  15259. UINT ret = 0;
  15260. VH_OPTION t;
  15261. // If virtual HUB is not selected, it's an error
  15262. if (ps->HubName == NULL)
  15263. {
  15264. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15265. return ERR_INVALID_PARAMETER;
  15266. }
  15267. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15268. if (o == NULL)
  15269. {
  15270. return ERR_INVALID_PARAMETER;
  15271. }
  15272. Zero(&t, sizeof(t));
  15273. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15274. // RPC call
  15275. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15276. if (ret != ERR_NO_ERROR)
  15277. {
  15278. // An error has occured
  15279. CmdPrintError(c, ret);
  15280. FreeParamValueList(o);
  15281. return ret;
  15282. }
  15283. else
  15284. {
  15285. wchar_t tmp[MAX_SIZE];
  15286. char str[MAX_SIZE];
  15287. CT *ct = CtNewStandard();
  15288. // Flags
  15289. // MAC Address
  15290. MacToStr(str, sizeof(str), t.MacAddress);
  15291. StrToUni(tmp, sizeof(tmp), str);
  15292. CtInsert(ct, _UU("CMD_SecureNatHostGet_Column_MAC"), tmp);
  15293. // IP address
  15294. IPToUniStr(tmp, sizeof(tmp), &t.Ip);
  15295. CtInsert(ct, _UU("CMD_SecureNatHostGet_Column_IP"), tmp);
  15296. // Subnet mask
  15297. IPToUniStr(tmp, sizeof(tmp), &t.Mask);
  15298. CtInsert(ct, _UU("CMD_SecureNatHostGet_Column_MASK"), tmp);
  15299. CtFree(ct, c);
  15300. }
  15301. FreeParamValueList(o);
  15302. return 0;
  15303. }
  15304. // Change the network interface settings for a virtual host of SecureNAT function
  15305. UINT PsSecureNatHostSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15306. {
  15307. LIST *o;
  15308. PS *ps = (PS *)param;
  15309. UINT ret = 0;
  15310. VH_OPTION t;
  15311. // Parameter list that can be specified
  15312. PARAM args[] =
  15313. {
  15314. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  15315. {"MAC", CmdPrompt, _UU("CMD_SecureNatHostSet_Prompt_MAC"), NULL, NULL},
  15316. {"IP", CmdPrompt, _UU("CMD_SecureNatHostSet_Prompt_IP"), CmdEvalIp, NULL},
  15317. {"MASK", CmdPrompt, _UU("CMD_SecureNatHostSet_Prompt_MASK"), CmdEvalIp, NULL},
  15318. };
  15319. // If virtual HUB is not selected, it's an error
  15320. if (ps->HubName == NULL)
  15321. {
  15322. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15323. return ERR_INVALID_PARAMETER;
  15324. }
  15325. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  15326. if (o == NULL)
  15327. {
  15328. return ERR_INVALID_PARAMETER;
  15329. }
  15330. Zero(&t, sizeof(t));
  15331. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15332. // RPC call
  15333. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15334. if (ret != ERR_NO_ERROR)
  15335. {
  15336. // An error has occured
  15337. CmdPrintError(c, ret);
  15338. FreeParamValueList(o);
  15339. return ret;
  15340. }
  15341. else
  15342. {
  15343. char *mac, *ip, *mask;
  15344. bool ok = true;
  15345. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15346. mac = GetParamStr(o, "MAC");
  15347. ip = GetParamStr(o, "IP");
  15348. mask = GetParamStr(o, "MASK");
  15349. if (IsEmptyStr(mac) == false)
  15350. {
  15351. BUF *b = StrToBin(mac);
  15352. if (b == NULL || b->Size != 6)
  15353. {
  15354. ok = false;
  15355. }
  15356. else
  15357. {
  15358. Copy(t.MacAddress, b->Buf, 6);
  15359. }
  15360. FreeBuf(b);
  15361. }
  15362. if (IsEmptyStr(ip) == false)
  15363. {
  15364. if (IsIpStr4(ip) == false)
  15365. {
  15366. ok = false;
  15367. }
  15368. else
  15369. {
  15370. UINT u = StrToIP32(ip);
  15371. if (u == 0 || u == 0xffffffff)
  15372. {
  15373. ok = false;
  15374. }
  15375. else
  15376. {
  15377. UINTToIP(&t.Ip, u);
  15378. }
  15379. }
  15380. }
  15381. if (IsEmptyStr(mask) == false)
  15382. {
  15383. if (IsIpStr4(mask) == false)
  15384. {
  15385. ok = false;
  15386. }
  15387. else
  15388. {
  15389. StrToIP(&t.Mask, mask);
  15390. }
  15391. }
  15392. if (ok == false)
  15393. {
  15394. // Parameter is invalid
  15395. ret = ERR_INVALID_PARAMETER;
  15396. CmdPrintError(c, ret);
  15397. FreeParamValueList(o);
  15398. return ret;
  15399. }
  15400. else
  15401. {
  15402. ret = ScSetSecureNATOption(ps->Rpc, &t);
  15403. if (ret != ERR_NO_ERROR)
  15404. {
  15405. // An error has occured
  15406. CmdPrintError(c, ret);
  15407. FreeParamValueList(o);
  15408. return ret;
  15409. }
  15410. }
  15411. }
  15412. FreeParamValueList(o);
  15413. return 0;
  15414. }
  15415. // Get the settings for the virtual NAT function of the SecureNAT function
  15416. UINT PsNatGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15417. {
  15418. LIST *o;
  15419. PS *ps = (PS *)param;
  15420. UINT ret = 0;
  15421. VH_OPTION t;
  15422. // If virtual HUB is not selected, it's an error
  15423. if (ps->HubName == NULL)
  15424. {
  15425. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15426. return ERR_INVALID_PARAMETER;
  15427. }
  15428. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15429. if (o == NULL)
  15430. {
  15431. return ERR_INVALID_PARAMETER;
  15432. }
  15433. Zero(&t, sizeof(t));
  15434. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15435. // RPC call
  15436. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15437. if (ret != ERR_NO_ERROR)
  15438. {
  15439. // An error has occured
  15440. CmdPrintError(c, ret);
  15441. FreeParamValueList(o);
  15442. return ret;
  15443. }
  15444. else
  15445. {
  15446. wchar_t tmp[MAX_SIZE];
  15447. CT *ct = CtNewStandard();
  15448. // Use the virtual NAT function
  15449. CtInsert(ct, _UU("CMD_NatGet_Column_USE"), t.UseNat ? _UU("SEC_YES") : _UU("SEC_NO"));
  15450. // MTU value
  15451. UniToStru(tmp, t.Mtu);
  15452. CtInsert(ct, _UU("CMD_NetGet_Column_MTU"), tmp);
  15453. // TCP session timeout (in seconds)
  15454. UniToStru(tmp, t.NatTcpTimeout);
  15455. CtInsert(ct, _UU("CMD_NatGet_Column_TCP"), tmp);
  15456. // UDP session timeout (in seconds)
  15457. UniToStru(tmp, t.NatUdpTimeout);
  15458. CtInsert(ct, _UU("CMD_NatGet_Column_UDP"), tmp);
  15459. // To save the log
  15460. CtInsert(ct, _UU("CMD_SecureNatHostGet_Column_LOG"), t.SaveLog ? _UU("SEC_YES") : _UU("SEC_NO"));
  15461. CtFree(ct, c);
  15462. }
  15463. FreeParamValueList(o);
  15464. return 0;
  15465. }
  15466. // Enable the virtual NAT function of the SecureNAT function
  15467. UINT PsNatEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15468. {
  15469. LIST *o;
  15470. PS *ps = (PS *)param;
  15471. UINT ret = 0;
  15472. VH_OPTION t;
  15473. // If virtual HUB is not selected, it's an error
  15474. if (ps->HubName == NULL)
  15475. {
  15476. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15477. return ERR_INVALID_PARAMETER;
  15478. }
  15479. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15480. if (o == NULL)
  15481. {
  15482. return ERR_INVALID_PARAMETER;
  15483. }
  15484. Zero(&t, sizeof(t));
  15485. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15486. // RPC call
  15487. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15488. if (ret != ERR_NO_ERROR)
  15489. {
  15490. // An error has occured
  15491. CmdPrintError(c, ret);
  15492. FreeParamValueList(o);
  15493. return ret;
  15494. }
  15495. else
  15496. {
  15497. bool ok = true;
  15498. t.UseNat = true;
  15499. if (ok == false)
  15500. {
  15501. // Parameter is invalid
  15502. ret = ERR_INVALID_PARAMETER;
  15503. CmdPrintError(c, ret);
  15504. FreeParamValueList(o);
  15505. return ret;
  15506. }
  15507. else
  15508. {
  15509. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15510. ret = ScSetSecureNATOption(ps->Rpc, &t);
  15511. if (ret != ERR_NO_ERROR)
  15512. {
  15513. // An error has occured
  15514. CmdPrintError(c, ret);
  15515. FreeParamValueList(o);
  15516. return ret;
  15517. }
  15518. }
  15519. }
  15520. FreeParamValueList(o);
  15521. return 0;
  15522. }
  15523. // Disable the virtual NAT function of the SecureNAT function
  15524. UINT PsNatDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15525. {
  15526. LIST *o;
  15527. PS *ps = (PS *)param;
  15528. UINT ret = 0;
  15529. VH_OPTION t;
  15530. // If virtual HUB is not selected, it's an error
  15531. if (ps->HubName == NULL)
  15532. {
  15533. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15534. return ERR_INVALID_PARAMETER;
  15535. }
  15536. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15537. if (o == NULL)
  15538. {
  15539. return ERR_INVALID_PARAMETER;
  15540. }
  15541. Zero(&t, sizeof(t));
  15542. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15543. // RPC call
  15544. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15545. if (ret != ERR_NO_ERROR)
  15546. {
  15547. // An error has occured
  15548. CmdPrintError(c, ret);
  15549. FreeParamValueList(o);
  15550. return ret;
  15551. }
  15552. else
  15553. {
  15554. bool ok = true;
  15555. t.UseNat = false;
  15556. if (ok == false)
  15557. {
  15558. // Parameter is invalid
  15559. ret = ERR_INVALID_PARAMETER;
  15560. CmdPrintError(c, ret);
  15561. FreeParamValueList(o);
  15562. return ret;
  15563. }
  15564. else
  15565. {
  15566. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15567. ret = ScSetSecureNATOption(ps->Rpc, &t);
  15568. if (ret != ERR_NO_ERROR)
  15569. {
  15570. // An error has occured
  15571. CmdPrintError(c, ret);
  15572. FreeParamValueList(o);
  15573. return ret;
  15574. }
  15575. }
  15576. }
  15577. FreeParamValueList(o);
  15578. return 0;
  15579. }
  15580. // Change the settings for the virtual NAT function of the SecureNAT function
  15581. UINT PsNatSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15582. {
  15583. LIST *o;
  15584. PS *ps = (PS *)param;
  15585. UINT ret = 0;
  15586. VH_OPTION t;
  15587. // Parameter list that can be specified
  15588. CMD_EVAL_MIN_MAX mtu_mm =
  15589. {
  15590. "CMD_NatSet_Eval_MTU", TCP_HEADER_SIZE + IP_HEADER_SIZE + MAC_HEADER_SIZE + 8, MAX_L3_DATA_SIZE,
  15591. };
  15592. CMD_EVAL_MIN_MAX tcp_mm =
  15593. {
  15594. "CMD_NatSet_Eval_TCP", NAT_TCP_MIN_TIMEOUT / 1000, NAT_TCP_MAX_TIMEOUT / 1000,
  15595. };
  15596. CMD_EVAL_MIN_MAX udp_mm =
  15597. {
  15598. "CMD_NatSet_Eval_UDP", NAT_UDP_MIN_TIMEOUT / 1000, NAT_UDP_MAX_TIMEOUT / 1000,
  15599. };
  15600. PARAM args[] =
  15601. {
  15602. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  15603. {"MTU", CmdPrompt, _UU("CMD_NatSet_Prompt_MTU"), CmdEvalMinMax, &mtu_mm},
  15604. {"TCPTIMEOUT", CmdPrompt, _UU("CMD_NatSet_Prompt_TCPTIMEOUT"), CmdEvalMinMax, &tcp_mm},
  15605. {"UDPTIMEOUT", CmdPrompt, _UU("CMD_NatSet_Prompt_UDPTIMEOUT"), CmdEvalMinMax, &udp_mm},
  15606. {"LOG", CmdPrompt, _UU("CMD_NatSet_Prompt_LOG"), CmdEvalNotEmpty, NULL},
  15607. };
  15608. // If virtual HUB is not selected, it's an error
  15609. if (ps->HubName == NULL)
  15610. {
  15611. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15612. return ERR_INVALID_PARAMETER;
  15613. }
  15614. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  15615. if (o == NULL)
  15616. {
  15617. return ERR_INVALID_PARAMETER;
  15618. }
  15619. Zero(&t, sizeof(t));
  15620. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15621. // RPC call
  15622. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15623. if (ret != ERR_NO_ERROR)
  15624. {
  15625. // An error has occured
  15626. CmdPrintError(c, ret);
  15627. FreeParamValueList(o);
  15628. return ret;
  15629. }
  15630. else
  15631. {
  15632. bool ok = true;
  15633. t.Mtu = GetParamInt(o, "MTU");
  15634. t.NatTcpTimeout = GetParamInt(o, "TCPTIMEOUT");
  15635. t.NatUdpTimeout = GetParamInt(o, "UDPTIMEOUT");
  15636. t.SaveLog = GetParamYes(o, "LOG");
  15637. if (ok == false)
  15638. {
  15639. // Parameter is invalid
  15640. ret = ERR_INVALID_PARAMETER;
  15641. CmdPrintError(c, ret);
  15642. FreeParamValueList(o);
  15643. return ret;
  15644. }
  15645. else
  15646. {
  15647. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15648. ret = ScSetSecureNATOption(ps->Rpc, &t);
  15649. if (ret != ERR_NO_ERROR)
  15650. {
  15651. // An error has occured
  15652. CmdPrintError(c, ret);
  15653. FreeParamValueList(o);
  15654. return ret;
  15655. }
  15656. }
  15657. }
  15658. FreeParamValueList(o);
  15659. return 0;
  15660. }
  15661. // Get the session table of the virtual NAT function of the SecureNAT function
  15662. UINT PsNatTable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15663. {
  15664. LIST *o;
  15665. PS *ps = (PS *)param;
  15666. UINT ret = 0;
  15667. RPC_ENUM_NAT t;
  15668. // If virtual HUB is not selected, it's an error
  15669. if (ps->HubName == NULL)
  15670. {
  15671. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15672. return ERR_INVALID_PARAMETER;
  15673. }
  15674. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15675. if (o == NULL)
  15676. {
  15677. return ERR_INVALID_PARAMETER;
  15678. }
  15679. Zero(&t, sizeof(t));
  15680. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15681. // RPC call
  15682. ret = ScEnumNAT(ps->Rpc, &t);
  15683. if (ret != ERR_NO_ERROR)
  15684. {
  15685. // An error has occured
  15686. CmdPrintError(c, ret);
  15687. FreeParamValueList(o);
  15688. return ret;
  15689. }
  15690. else
  15691. {
  15692. CT *ct = CtNew();
  15693. UINT i;
  15694. CtInsertColumn(ct, _UU("NM_NAT_ID"), false);
  15695. CtInsertColumn(ct, _UU("NM_NAT_PROTOCOL"), false);
  15696. CtInsertColumn(ct, _UU("NM_NAT_SRC_HOST"), false);
  15697. CtInsertColumn(ct, _UU("NM_NAT_SRC_PORT"), false);
  15698. CtInsertColumn(ct, _UU("NM_NAT_DST_HOST"), false);
  15699. CtInsertColumn(ct, _UU("NM_NAT_DST_PORT"), false);
  15700. CtInsertColumn(ct, _UU("NM_NAT_CREATED"), false);
  15701. CtInsertColumn(ct, _UU("NM_NAT_LAST_COMM"), false);
  15702. CtInsertColumn(ct, _UU("NM_NAT_SIZE"), false);
  15703. CtInsertColumn(ct, _UU("NM_NAT_TCP_STATUS"), false);
  15704. for (i = 0;i < t.NumItem;i++)
  15705. {
  15706. RPC_ENUM_NAT_ITEM *e = &t.Items[i];
  15707. wchar_t tmp0[MAX_SIZE];
  15708. wchar_t *tmp1 = L"";
  15709. wchar_t tmp2[MAX_SIZE];
  15710. wchar_t tmp3[MAX_SIZE];
  15711. wchar_t tmp4[MAX_SIZE];
  15712. wchar_t tmp5[MAX_SIZE];
  15713. wchar_t tmp6[MAX_SIZE];
  15714. wchar_t tmp7[MAX_SIZE];
  15715. wchar_t tmp8[MAX_SIZE];
  15716. wchar_t *tmp9 = L"";
  15717. char v1[128], v2[128];
  15718. // ID
  15719. UniToStru(tmp0, e->Id);
  15720. // Protocol
  15721. switch (e->Protocol)
  15722. {
  15723. case NAT_TCP:
  15724. tmp1 = _UU("NM_NAT_PROTO_TCP");
  15725. break;
  15726. case NAT_UDP:
  15727. tmp1 = _UU("NM_NAT_PROTO_UDP");
  15728. break;
  15729. case NAT_DNS:
  15730. tmp1 = _UU("NM_NAT_PROTO_DNS");
  15731. break;
  15732. case NAT_ICMP:
  15733. tmp1 = _UU("NM_NAT_PROTO_ICMP");
  15734. break;
  15735. }
  15736. // Source host
  15737. StrToUni(tmp2, sizeof(tmp2), e->SrcHost);
  15738. // Source port
  15739. UniToStru(tmp3, e->SrcPort);
  15740. // Destination host
  15741. StrToUni(tmp4, sizeof(tmp4), e->DestHost);
  15742. // Destination port
  15743. UniToStru(tmp5, e->DestPort);
  15744. // Creation date and time of the session
  15745. GetDateTimeStrEx64(tmp6, sizeof(tmp6), SystemToLocal64(e->CreatedTime), NULL);
  15746. // Last communication date and time
  15747. GetDateTimeStrEx64(tmp7, sizeof(tmp7), SystemToLocal64(e->LastCommTime), NULL);
  15748. // Communication amount
  15749. ToStr3(v1, sizeof(v1), e->RecvSize);
  15750. ToStr3(v2, sizeof(v2), e->SendSize);
  15751. UniFormat(tmp8, sizeof(tmp8), L"%S / %S", v1, v2);
  15752. // TCP state
  15753. if (e->Protocol == NAT_TCP)
  15754. {
  15755. switch (e->TcpStatus)
  15756. {
  15757. case NAT_TCP_CONNECTING:
  15758. tmp9 = _UU("NAT_TCP_CONNECTING");
  15759. break;
  15760. case NAT_TCP_SEND_RESET:
  15761. tmp9 = _UU("NAT_TCP_SEND_RESET");
  15762. break;
  15763. case NAT_TCP_CONNECTED:
  15764. tmp9 = _UU("NAT_TCP_CONNECTED");
  15765. break;
  15766. case NAT_TCP_ESTABLISHED:
  15767. tmp9 = _UU("NAT_TCP_ESTABLISHED");
  15768. break;
  15769. case NAT_TCP_WAIT_DISCONNECT:
  15770. tmp9 = _UU("NAT_TCP_WAIT_DISCONNECT");
  15771. break;
  15772. }
  15773. }
  15774. CtInsert(ct,
  15775. tmp0, tmp1, tmp2, tmp3, tmp4, tmp5, tmp6, tmp7, tmp8, tmp9);
  15776. }
  15777. CtFreeEx(ct, c, true);
  15778. }
  15779. FreeRpcEnumNat(&t);
  15780. FreeParamValueList(o);
  15781. return 0;
  15782. }
  15783. // Get the settings for a virtual DHCP server function of the SecureNAT function
  15784. UINT PsDhcpGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15785. {
  15786. LIST *o;
  15787. PS *ps = (PS *)param;
  15788. UINT ret = 0;
  15789. VH_OPTION t;
  15790. // If virtual HUB is not selected, it's an error
  15791. if (ps->HubName == NULL)
  15792. {
  15793. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15794. return ERR_INVALID_PARAMETER;
  15795. }
  15796. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15797. if (o == NULL)
  15798. {
  15799. return ERR_INVALID_PARAMETER;
  15800. }
  15801. Zero(&t, sizeof(t));
  15802. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15803. // RPC call
  15804. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15805. if (ret != ERR_NO_ERROR)
  15806. {
  15807. // An error has occured
  15808. CmdPrintError(c, ret);
  15809. FreeParamValueList(o);
  15810. return ret;
  15811. }
  15812. else
  15813. {
  15814. wchar_t tmp[MAX_SIZE];
  15815. CT *ct = CtNewStandard();
  15816. // To use the virtual DHCP function
  15817. CtInsert(ct, _UU("CMD_DhcpGet_Column_USE"), t.UseDhcp ? _UU("SEC_YES") : _UU("SEC_NO"));
  15818. // Start address of the distributing address zone
  15819. IPToUniStr(tmp, sizeof(tmp), &t.DhcpLeaseIPStart);
  15820. CtInsert(ct, _UU("CMD_DhcpGet_Column_IP1"), tmp);
  15821. // End address of the distributing address zone
  15822. IPToUniStr(tmp, sizeof(tmp), &t.DhcpLeaseIPEnd);
  15823. CtInsert(ct, _UU("CMD_DhcpGet_Column_IP2"), tmp);
  15824. // Subnet mask
  15825. IPToUniStr(tmp, sizeof(tmp), &t.DhcpSubnetMask);
  15826. CtInsert(ct, _UU("CMD_DhcpGet_Column_MASK"), tmp);
  15827. // Lease time (in seconds)
  15828. UniToStru(tmp, t.DhcpExpireTimeSpan);
  15829. CtInsert(ct, _UU("CMD_DhcpGet_Column_LEASE"), tmp);
  15830. // Default gateway address
  15831. UniStrCpy(tmp, sizeof(tmp), _UU("SEC_NONE"));
  15832. if (IPToUINT(&t.DhcpGatewayAddress) != 0)
  15833. {
  15834. IPToUniStr(tmp, sizeof(tmp), &t.DhcpGatewayAddress);
  15835. }
  15836. CtInsert(ct, _UU("CMD_DhcpGet_Column_GW"), tmp);
  15837. // DNS server address 1
  15838. UniStrCpy(tmp, sizeof(tmp), _UU("SEC_NONE"));
  15839. if (IPToUINT(&t.DhcpDnsServerAddress) != 0)
  15840. {
  15841. IPToUniStr(tmp, sizeof(tmp), &t.DhcpDnsServerAddress);
  15842. }
  15843. CtInsert(ct, _UU("CMD_DhcpGet_Column_DNS"), tmp);
  15844. // DNS server address 2
  15845. UniStrCpy(tmp, sizeof(tmp), _UU("SEC_NONE"));
  15846. if (IPToUINT(&t.DhcpDnsServerAddress2) != 0)
  15847. {
  15848. IPToUniStr(tmp, sizeof(tmp), &t.DhcpDnsServerAddress2);
  15849. }
  15850. CtInsert(ct, _UU("CMD_DhcpGet_Column_DNS2"), tmp);
  15851. // Domain name
  15852. StrToUni(tmp, sizeof(tmp), t.DhcpDomainName);
  15853. CtInsert(ct, _UU("CMD_DhcpGet_Column_DOMAIN"), tmp);
  15854. // To save the log
  15855. CtInsert(ct, _UU("CMD_SecureNatHostGet_Column_LOG"), t.SaveLog ? _UU("SEC_YES") : _UU("SEC_NO"));
  15856. // Push routing table
  15857. if (t.ApplyDhcpPushRoutes)
  15858. {
  15859. StrToUni(tmp, sizeof(tmp), t.DhcpPushRoutes);
  15860. CtInsert(ct, _UU("CMD_DhcpGet_Column_PUSHROUTE"), tmp);
  15861. }
  15862. CtFree(ct, c);
  15863. }
  15864. FreeParamValueList(o);
  15865. return 0;
  15866. }
  15867. // Enable the Virtual DHCP server function of SecureNAT function
  15868. UINT PsDhcpEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15869. {
  15870. LIST *o;
  15871. PS *ps = (PS *)param;
  15872. UINT ret = 0;
  15873. VH_OPTION t;
  15874. // If virtual HUB is not selected, it's an error
  15875. if (ps->HubName == NULL)
  15876. {
  15877. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15878. return ERR_INVALID_PARAMETER;
  15879. }
  15880. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15881. if (o == NULL)
  15882. {
  15883. return ERR_INVALID_PARAMETER;
  15884. }
  15885. Zero(&t, sizeof(t));
  15886. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15887. // RPC call
  15888. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15889. if (ret != ERR_NO_ERROR)
  15890. {
  15891. // An error has occured
  15892. CmdPrintError(c, ret);
  15893. FreeParamValueList(o);
  15894. return ret;
  15895. }
  15896. else
  15897. {
  15898. bool ok = true;
  15899. t.UseDhcp = true;
  15900. if (ok == false)
  15901. {
  15902. // Parameter is invalid
  15903. ret = ERR_INVALID_PARAMETER;
  15904. CmdPrintError(c, ret);
  15905. FreeParamValueList(o);
  15906. return ret;
  15907. }
  15908. else
  15909. {
  15910. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15911. ret = ScSetSecureNATOption(ps->Rpc, &t);
  15912. if (ret != ERR_NO_ERROR)
  15913. {
  15914. // An error has occured
  15915. CmdPrintError(c, ret);
  15916. FreeParamValueList(o);
  15917. return ret;
  15918. }
  15919. }
  15920. }
  15921. FreeParamValueList(o);
  15922. return 0;
  15923. }
  15924. // Disable the virtual DHCP server function of SecureNAT function
  15925. UINT PsDhcpDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15926. {
  15927. LIST *o;
  15928. PS *ps = (PS *)param;
  15929. UINT ret = 0;
  15930. VH_OPTION t;
  15931. // If virtual HUB is not selected, it's an error
  15932. if (ps->HubName == NULL)
  15933. {
  15934. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15935. return ERR_INVALID_PARAMETER;
  15936. }
  15937. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  15938. if (o == NULL)
  15939. {
  15940. return ERR_INVALID_PARAMETER;
  15941. }
  15942. Zero(&t, sizeof(t));
  15943. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  15944. // RPC call
  15945. ret = ScGetSecureNATOption(ps->Rpc, &t);
  15946. if (ret != ERR_NO_ERROR)
  15947. {
  15948. // An error has occured
  15949. CmdPrintError(c, ret);
  15950. FreeParamValueList(o);
  15951. return ret;
  15952. }
  15953. else
  15954. {
  15955. t.UseDhcp = false;
  15956. ret = ScSetSecureNATOption(ps->Rpc, &t);
  15957. if (ret != ERR_NO_ERROR)
  15958. {
  15959. // An error has occured
  15960. CmdPrintError(c, ret);
  15961. FreeParamValueList(o);
  15962. return ret;
  15963. }
  15964. }
  15965. FreeParamValueList(o);
  15966. return 0;
  15967. }
  15968. // Change the settings for a virtual DHCP server function of the SecureNAT function
  15969. UINT PsDhcpSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  15970. {
  15971. LIST *o;
  15972. PS *ps = (PS *)param;
  15973. UINT ret = 0;
  15974. VH_OPTION t;
  15975. // Parameter list that can be specified
  15976. CMD_EVAL_MIN_MAX mm =
  15977. {
  15978. "CMD_NatSet_Eval_UDP", NAT_UDP_MIN_TIMEOUT / 1000, NAT_UDP_MAX_TIMEOUT / 1000,
  15979. };
  15980. PARAM args[] =
  15981. {
  15982. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  15983. {"START", CmdPrompt, _UU("CMD_DhcpSet_Prompt_START"), CmdEvalIp, NULL},
  15984. {"END", CmdPrompt, _UU("CMD_DhcpSet_Prompt_END"), CmdEvalIp, NULL},
  15985. {"MASK", CmdPrompt, _UU("CMD_DhcpSet_Prompt_MASK"), CmdEvalIp, NULL},
  15986. {"EXPIRE", CmdPrompt, _UU("CMD_DhcpSet_Prompt_EXPIRE"), CmdEvalMinMax, &mm},
  15987. {"GW", CmdPrompt, _UU("CMD_DhcpSet_Prompt_GW"), CmdEvalIp, NULL},
  15988. {"DNS", CmdPrompt, _UU("CMD_DhcpSet_Prompt_DNS"), CmdEvalIp, NULL},
  15989. {"DNS2", CmdPrompt, _UU("CMD_DhcpSet_Prompt_DNS2"), CmdEvalIp, NULL},
  15990. {"DOMAIN", CmdPrompt, _UU("CMD_DhcpSet_Prompt_DOMAIN"), NULL, NULL},
  15991. {"LOG", CmdPrompt, _UU("CMD_NatSet_Prompt_LOG"), CmdEvalNotEmpty, NULL},
  15992. {"PUSHROUTE", NULL, _UU("CMD_DhcpSet_PUSHROUTE"), NULL, NULL},
  15993. };
  15994. // If virtual HUB is not selected, it's an error
  15995. if (ps->HubName == NULL)
  15996. {
  15997. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  15998. return ERR_INVALID_PARAMETER;
  15999. }
  16000. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16001. if (o == NULL)
  16002. {
  16003. return ERR_INVALID_PARAMETER;
  16004. }
  16005. Zero(&t, sizeof(t));
  16006. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16007. // RPC call
  16008. ret = ScGetSecureNATOption(ps->Rpc, &t);
  16009. if (ret != ERR_NO_ERROR)
  16010. {
  16011. // An error has occured
  16012. CmdPrintError(c, ret);
  16013. FreeParamValueList(o);
  16014. return ret;
  16015. }
  16016. else
  16017. {
  16018. bool ok = true;
  16019. StrToIP(&t.DhcpLeaseIPStart, GetParamStr(o, "START"));
  16020. StrToIP(&t.DhcpLeaseIPEnd, GetParamStr(o, "END"));
  16021. StrToIP(&t.DhcpSubnetMask, GetParamStr(o, "MASK"));
  16022. t.DhcpExpireTimeSpan = GetParamInt(o, "EXPIRE");
  16023. StrToIP(&t.DhcpGatewayAddress, GetParamStr(o, "GW"));
  16024. StrToIP(&t.DhcpDnsServerAddress, GetParamStr(o, "DNS"));
  16025. StrToIP(&t.DhcpDnsServerAddress2, GetParamStr(o, "DNS2"));
  16026. StrCpy(t.DhcpDomainName, sizeof(t.DhcpDomainName), GetParamStr(o, "DOMAIN"));
  16027. t.SaveLog = GetParamYes(o, "LOG");
  16028. StrCpy(t.DhcpPushRoutes, sizeof(t.DhcpPushRoutes), GetParamStr(o, "PUSHROUTE"));
  16029. t.ApplyDhcpPushRoutes = true;
  16030. if (ok == false)
  16031. {
  16032. // Parameter is invalid
  16033. ret = ERR_INVALID_PARAMETER;
  16034. CmdPrintError(c, ret);
  16035. FreeParamValueList(o);
  16036. return ret;
  16037. }
  16038. else
  16039. {
  16040. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16041. ret = ScSetSecureNATOption(ps->Rpc, &t);
  16042. if (ret != ERR_NO_ERROR)
  16043. {
  16044. // An error has occured
  16045. CmdPrintError(c, ret);
  16046. FreeParamValueList(o);
  16047. return ret;
  16048. }
  16049. if (IsEmptyStr(GetParamStr(o, "PUSHROUTE")) == false)
  16050. {
  16051. if (GetCapsBool(ps->CapsList, "b_suppport_push_route") == false &&
  16052. GetCapsBool(ps->CapsList, "b_suppport_push_route_config"))
  16053. {
  16054. CmdPrintError(c, ERR_NOT_SUPPORTED_FUNCTION_ON_OPENSOURCE);
  16055. }
  16056. }
  16057. }
  16058. }
  16059. FreeParamValueList(o);
  16060. return 0;
  16061. }
  16062. // Get the lease table of virtual DHCP server function of the SecureNAT function
  16063. UINT PsDhcpTable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16064. {
  16065. LIST *o;
  16066. PS *ps = (PS *)param;
  16067. UINT ret = 0;
  16068. RPC_ENUM_DHCP t;
  16069. // If virtual HUB is not selected, it's an error
  16070. if (ps->HubName == NULL)
  16071. {
  16072. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16073. return ERR_INVALID_PARAMETER;
  16074. }
  16075. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  16076. if (o == NULL)
  16077. {
  16078. return ERR_INVALID_PARAMETER;
  16079. }
  16080. Zero(&t, sizeof(t));
  16081. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16082. // RPC call
  16083. ret = ScEnumDHCP(ps->Rpc, &t);
  16084. if (ret != ERR_NO_ERROR)
  16085. {
  16086. // An error has occured
  16087. CmdPrintError(c, ret);
  16088. FreeParamValueList(o);
  16089. return ret;
  16090. }
  16091. else
  16092. {
  16093. CT *ct = CtNew();
  16094. UINT i;
  16095. CtInsertColumn(ct, _UU("DHCP_DHCP_ID"), false);
  16096. CtInsertColumn(ct, _UU("DHCP_LEASED_TIME"), false);
  16097. CtInsertColumn(ct, _UU("DHCP_EXPIRE_TIME"), false);
  16098. CtInsertColumn(ct, _UU("DHCP_MAC_ADDRESS"), false);
  16099. CtInsertColumn(ct, _UU("DHCP_IP_ADDRESS"), false);
  16100. CtInsertColumn(ct, _UU("DHCP_HOSTNAME"), false);
  16101. for (i = 0;i < t.NumItem;i++)
  16102. {
  16103. RPC_ENUM_DHCP_ITEM *e = &t.Items[i];
  16104. wchar_t tmp0[MAX_SIZE];
  16105. wchar_t tmp1[MAX_SIZE];
  16106. wchar_t tmp2[MAX_SIZE];
  16107. wchar_t tmp3[MAX_SIZE];
  16108. wchar_t tmp4[MAX_SIZE];
  16109. wchar_t tmp5[MAX_SIZE];
  16110. char str[MAX_SIZE];
  16111. // ID
  16112. UniToStru(tmp0, e->Id);
  16113. // Time
  16114. GetDateTimeStrEx64(tmp1, sizeof(tmp1), SystemToLocal64(e->LeasedTime), NULL);
  16115. GetDateTimeStrEx64(tmp2, sizeof(tmp2), SystemToLocal64(e->ExpireTime), NULL);
  16116. MacToStr(str, sizeof(str), e->MacAddress);
  16117. StrToUni(tmp3, sizeof(tmp3), str);
  16118. IPToStr32(str, sizeof(str), e->IpAddress);
  16119. StrToUni(tmp4, sizeof(tmp4), str);
  16120. StrToUni(tmp5, sizeof(tmp5), e->Hostname);
  16121. CtInsert(ct,
  16122. tmp0, tmp1, tmp2, tmp3, tmp4, tmp5);
  16123. }
  16124. CtFreeEx(ct, c, true);
  16125. }
  16126. FreeRpcEnumDhcp(&t);
  16127. FreeParamValueList(o);
  16128. return 0;
  16129. }
  16130. // Get the list of Virtual HUB management options
  16131. UINT PsAdminOptionList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16132. {
  16133. LIST *o;
  16134. PS *ps = (PS *)param;
  16135. UINT ret = 0;
  16136. RPC_ADMIN_OPTION t;
  16137. // If virtual HUB is not selected, it's an error
  16138. if (ps->HubName == NULL)
  16139. {
  16140. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16141. return ERR_INVALID_PARAMETER;
  16142. }
  16143. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  16144. if (o == NULL)
  16145. {
  16146. return ERR_INVALID_PARAMETER;
  16147. }
  16148. Zero(&t, sizeof(t));
  16149. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16150. // RPC call
  16151. ret = ScGetHubAdminOptions(ps->Rpc, &t);
  16152. if (ret != ERR_NO_ERROR)
  16153. {
  16154. // An error has occured
  16155. CmdPrintError(c, ret);
  16156. FreeParamValueList(o);
  16157. return ret;
  16158. }
  16159. else
  16160. {
  16161. CT *ct = CtNewStandardEx();
  16162. UINT i;
  16163. for (i = 0;i < t.NumItem;i++)
  16164. {
  16165. ADMIN_OPTION *e = &t.Items[i];
  16166. wchar_t tmp1[MAX_SIZE];
  16167. wchar_t tmp2[MAX_SIZE];
  16168. StrToUni(tmp1, sizeof(tmp1), e->Name);
  16169. UniToStru(tmp2, e->Value);
  16170. CtInsert(ct, tmp1, tmp2, GetHubAdminOptionHelpString(e->Name));
  16171. }
  16172. CtFreeEx(ct, c, true);
  16173. }
  16174. FreeRpcAdminOption(&t);
  16175. FreeParamValueList(o);
  16176. return 0;
  16177. }
  16178. // Set the value of a Virtual HUB management option
  16179. UINT PsAdminOptionSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16180. {
  16181. LIST *o;
  16182. PS *ps = (PS *)param;
  16183. UINT ret = 0;
  16184. RPC_ADMIN_OPTION t;
  16185. // Parameter list that can be specified
  16186. PARAM args[] =
  16187. {
  16188. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16189. {"[name]", CmdPrompt, _UU("CMD_AdminOptionSet_Prompt_name"), CmdEvalNotEmpty, NULL},
  16190. {"VALUE", CmdPrompt, _UU("CMD_AdminOptionSet_Prompt_VALUE"), CmdEvalNotEmpty, NULL},
  16191. };
  16192. // If virtual HUB is not selected, it's an error
  16193. if (ps->HubName == NULL)
  16194. {
  16195. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16196. return ERR_INVALID_PARAMETER;
  16197. }
  16198. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16199. if (o == NULL)
  16200. {
  16201. return ERR_INVALID_PARAMETER;
  16202. }
  16203. Zero(&t, sizeof(t));
  16204. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16205. // RPC call
  16206. ret = ScGetHubAdminOptions(ps->Rpc, &t);
  16207. if (ret != ERR_NO_ERROR)
  16208. {
  16209. // An error has occured
  16210. CmdPrintError(c, ret);
  16211. FreeParamValueList(o);
  16212. return ret;
  16213. }
  16214. else
  16215. {
  16216. UINT i;
  16217. bool b = false;
  16218. for (i = 0;i < t.NumItem;i++)
  16219. {
  16220. if (StrCmpi(t.Items[i].Name, GetParamStr(o, "[name]")) == 0)
  16221. {
  16222. t.Items[i].Value = GetParamInt(o, "VALUE");
  16223. b = true;
  16224. }
  16225. }
  16226. if (b == false)
  16227. {
  16228. // An error has occured
  16229. ret = ERR_OBJECT_NOT_FOUND;
  16230. CmdPrintError(c, ret);
  16231. FreeParamValueList(o);
  16232. FreeRpcAdminOption(&t);
  16233. return ret;
  16234. }
  16235. else
  16236. {
  16237. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16238. ret = ScSetHubAdminOptions(ps->Rpc, &t);
  16239. if (ret != ERR_NO_ERROR)
  16240. {
  16241. // An error has occured
  16242. CmdPrintError(c, ret);
  16243. FreeParamValueList(o);
  16244. return ret;
  16245. }
  16246. }
  16247. }
  16248. FreeRpcAdminOption(&t);
  16249. FreeParamValueList(o);
  16250. return 0;
  16251. }
  16252. // Get the list of Virtual HUB extended options
  16253. UINT PsExtOptionList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16254. {
  16255. LIST *o;
  16256. PS *ps = (PS *)param;
  16257. UINT ret = 0;
  16258. RPC_ADMIN_OPTION t;
  16259. // If virtual HUB is not selected, it's an error
  16260. if (ps->HubName == NULL)
  16261. {
  16262. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16263. return ERR_INVALID_PARAMETER;
  16264. }
  16265. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  16266. if (o == NULL)
  16267. {
  16268. return ERR_INVALID_PARAMETER;
  16269. }
  16270. Zero(&t, sizeof(t));
  16271. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16272. // RPC call
  16273. ret = ScGetHubExtOptions(ps->Rpc, &t);
  16274. if (ret != ERR_NO_ERROR)
  16275. {
  16276. // An error has occured
  16277. CmdPrintError(c, ret);
  16278. FreeParamValueList(o);
  16279. return ret;
  16280. }
  16281. else
  16282. {
  16283. CT *ct = CtNewStandardEx();
  16284. UINT i;
  16285. for (i = 0;i < t.NumItem;i++)
  16286. {
  16287. ADMIN_OPTION *e = &t.Items[i];
  16288. wchar_t tmp1[MAX_SIZE];
  16289. wchar_t tmp2[MAX_SIZE];
  16290. StrToUni(tmp1, sizeof(tmp1), e->Name);
  16291. UniToStru(tmp2, e->Value);
  16292. CtInsert(ct, tmp1, tmp2, GetHubAdminOptionHelpString(e->Name));
  16293. }
  16294. CtFreeEx(ct, c, true);
  16295. }
  16296. FreeRpcAdminOption(&t);
  16297. FreeParamValueList(o);
  16298. return 0;
  16299. }
  16300. // Set the value of a Virtual HUB extended option
  16301. UINT PsExtOptionSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16302. {
  16303. LIST *o;
  16304. PS *ps = (PS *)param;
  16305. UINT ret = 0;
  16306. RPC_ADMIN_OPTION t;
  16307. // Parameter list that can be specified
  16308. PARAM args[] =
  16309. {
  16310. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16311. {"[name]", CmdPrompt, _UU("CMD_AdminOptionSet_Prompt_name"), CmdEvalNotEmpty, NULL},
  16312. {"VALUE", CmdPrompt, _UU("CMD_AdminOptionSet_Prompt_VALUE"), CmdEvalNotEmpty, NULL},
  16313. };
  16314. // If virtual HUB is not selected, it's an error
  16315. if (ps->HubName == NULL)
  16316. {
  16317. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16318. return ERR_INVALID_PARAMETER;
  16319. }
  16320. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16321. if (o == NULL)
  16322. {
  16323. return ERR_INVALID_PARAMETER;
  16324. }
  16325. Zero(&t, sizeof(t));
  16326. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16327. // RPC call
  16328. ret = ScGetHubExtOptions(ps->Rpc, &t);
  16329. if (ret != ERR_NO_ERROR)
  16330. {
  16331. // An error has occured
  16332. CmdPrintError(c, ret);
  16333. FreeParamValueList(o);
  16334. return ret;
  16335. }
  16336. else
  16337. {
  16338. UINT i;
  16339. bool b = false;
  16340. for (i = 0;i < t.NumItem;i++)
  16341. {
  16342. if (StrCmpi(t.Items[i].Name, GetParamStr(o, "[name]")) == 0)
  16343. {
  16344. t.Items[i].Value = GetParamInt(o, "VALUE");
  16345. b = true;
  16346. }
  16347. }
  16348. if (b == false)
  16349. {
  16350. // An error has occured
  16351. ret = ERR_OBJECT_NOT_FOUND;
  16352. CmdPrintError(c, ret);
  16353. FreeParamValueList(o);
  16354. FreeRpcAdminOption(&t);
  16355. return ret;
  16356. }
  16357. else
  16358. {
  16359. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16360. ret = ScSetHubExtOptions(ps->Rpc, &t);
  16361. if (ret != ERR_NO_ERROR)
  16362. {
  16363. // An error has occured
  16364. CmdPrintError(c, ret);
  16365. FreeParamValueList(o);
  16366. return ret;
  16367. }
  16368. }
  16369. }
  16370. FreeRpcAdminOption(&t);
  16371. FreeParamValueList(o);
  16372. return 0;
  16373. }
  16374. // Get the list of revoked certificate list
  16375. UINT PsCrlList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16376. {
  16377. LIST *o;
  16378. PS *ps = (PS *)param;
  16379. UINT ret = 0;
  16380. RPC_ENUM_CRL t;
  16381. // If virtual HUB is not selected, it's an error
  16382. if (ps->HubName == NULL)
  16383. {
  16384. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16385. return ERR_INVALID_PARAMETER;
  16386. }
  16387. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  16388. if (o == NULL)
  16389. {
  16390. return ERR_INVALID_PARAMETER;
  16391. }
  16392. Zero(&t, sizeof(t));
  16393. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16394. // RPC call
  16395. ret = ScEnumCrl(ps->Rpc, &t);
  16396. if (ret != ERR_NO_ERROR)
  16397. {
  16398. // An error has occured
  16399. CmdPrintError(c, ret);
  16400. FreeParamValueList(o);
  16401. return ret;
  16402. }
  16403. else
  16404. {
  16405. UINT i;
  16406. CT *ct = CtNew();
  16407. CtInsertColumn(ct, _UU("CMD_ID"), false);
  16408. CtInsertColumn(ct, _UU("SM_CRL_COLUMN_1"), false);
  16409. for (i = 0;i < t.NumItem;i++)
  16410. {
  16411. wchar_t tmp[64];
  16412. RPC_ENUM_CRL_ITEM *e = &t.Items[i];
  16413. UniToStru(tmp, e->Key);
  16414. CtInsert(ct, tmp, e->CrlInfo);
  16415. }
  16416. CtFreeEx(ct, c, true);
  16417. }
  16418. FreeRpcEnumCrl(&t);
  16419. FreeParamValueList(o);
  16420. return 0;
  16421. }
  16422. // Add a revoked certificate
  16423. UINT PsCrlAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16424. {
  16425. LIST *o;
  16426. PS *ps = (PS *)param;
  16427. UINT ret = 0;
  16428. RPC_CRL t;
  16429. // Parameter list that can be specified
  16430. PARAM args[] =
  16431. {
  16432. {"SERIAL", NULL, NULL, NULL, NULL},
  16433. {"MD5", NULL, NULL, NULL, NULL},
  16434. {"SHA1", NULL, NULL, NULL, NULL},
  16435. {"CN", NULL, NULL, NULL, NULL},
  16436. {"O", NULL, NULL, NULL, NULL},
  16437. {"OU", NULL, NULL, NULL, NULL},
  16438. {"C", NULL, NULL, NULL, NULL},
  16439. {"ST", NULL, NULL, NULL, NULL},
  16440. {"L", NULL, NULL, NULL, NULL},
  16441. };
  16442. // If virtual HUB is not selected, it's an error
  16443. if (ps->HubName == NULL)
  16444. {
  16445. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16446. return ERR_INVALID_PARAMETER;
  16447. }
  16448. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16449. if (o == NULL)
  16450. {
  16451. return ERR_INVALID_PARAMETER;
  16452. }
  16453. Zero(&t, sizeof(t));
  16454. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16455. {
  16456. bool param_exists = false;
  16457. CRL *crl = ZeroMalloc(sizeof(CRL));
  16458. NAME *n;
  16459. n = crl->Name = ZeroMalloc(sizeof(NAME));
  16460. if (IsEmptyStr(GetParamStr(o, "CN")) == false)
  16461. {
  16462. n->CommonName = CopyUniStr(GetParamUniStr(o, "CN"));
  16463. param_exists = true;
  16464. }
  16465. if (IsEmptyStr(GetParamStr(o, "O")) == false)
  16466. {
  16467. n->CommonName = CopyUniStr(GetParamUniStr(o, "O"));
  16468. param_exists = true;
  16469. }
  16470. if (IsEmptyStr(GetParamStr(o, "OU")) == false)
  16471. {
  16472. n->CommonName = CopyUniStr(GetParamUniStr(o, "OU"));
  16473. param_exists = true;
  16474. }
  16475. if (IsEmptyStr(GetParamStr(o, "C")) == false)
  16476. {
  16477. n->CommonName = CopyUniStr(GetParamUniStr(o, "C"));
  16478. param_exists = true;
  16479. }
  16480. if (IsEmptyStr(GetParamStr(o, "ST")) == false)
  16481. {
  16482. n->CommonName = CopyUniStr(GetParamUniStr(o, "ST"));
  16483. param_exists = true;
  16484. }
  16485. if (IsEmptyStr(GetParamStr(o, "L")) == false)
  16486. {
  16487. n->CommonName = CopyUniStr(GetParamUniStr(o, "L"));
  16488. param_exists = true;
  16489. }
  16490. if (IsEmptyStr(GetParamStr(o, "SERIAL")) == false)
  16491. {
  16492. BUF *b;
  16493. b = StrToBin(GetParamStr(o, "SERIAL"));
  16494. if (b != NULL && b->Size >= 1)
  16495. {
  16496. crl->Serial = NewXSerial(b->Buf, b->Size);
  16497. param_exists = true;
  16498. }
  16499. FreeBuf(b);
  16500. }
  16501. if (IsEmptyStr(GetParamStr(o, "MD5")) == false)
  16502. {
  16503. BUF *b;
  16504. b = StrToBin(GetParamStr(o, "MD5"));
  16505. if (b != NULL && b->Size == MD5_SIZE)
  16506. {
  16507. Copy(crl->DigestMD5, b->Buf, MD5_SIZE);
  16508. param_exists = true;
  16509. }
  16510. FreeBuf(b);
  16511. }
  16512. if (IsEmptyStr(GetParamStr(o, "SHA1")) == false)
  16513. {
  16514. BUF *b;
  16515. b = StrToBin(GetParamStr(o, "SHA1"));
  16516. if (b != NULL && b->Size == SHA1_SIZE)
  16517. {
  16518. Copy(crl->DigestSHA1, b->Buf, SHA1_SIZE);
  16519. param_exists = true;
  16520. }
  16521. FreeBuf(b);
  16522. }
  16523. t.Crl = crl;
  16524. if (param_exists == false)
  16525. {
  16526. FreeRpcCrl(&t);
  16527. ret = ERR_INVALID_PARAMETER;
  16528. CmdPrintError(c, ret);
  16529. FreeParamValueList(o);
  16530. return ret;
  16531. }
  16532. }
  16533. // RPC call
  16534. ret = ScAddCrl(ps->Rpc, &t);
  16535. if (ret != ERR_NO_ERROR)
  16536. {
  16537. // An error has occured
  16538. CmdPrintError(c, ret);
  16539. FreeParamValueList(o);
  16540. return ret;
  16541. }
  16542. FreeRpcCrl(&t);
  16543. FreeParamValueList(o);
  16544. return 0;
  16545. }
  16546. // Delete the revoked certificate
  16547. UINT PsCrlDel(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16548. {
  16549. LIST *o;
  16550. PS *ps = (PS *)param;
  16551. UINT ret = 0;
  16552. RPC_CRL t;
  16553. // Parameter list that can be specified
  16554. PARAM args[] =
  16555. {
  16556. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16557. {"[id]", CmdPrompt, _UU("CMD_CrlDel_Prompt_ID"), CmdEvalNotEmpty, NULL},
  16558. };
  16559. // If virtual HUB is not selected, it's an error
  16560. if (ps->HubName == NULL)
  16561. {
  16562. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16563. return ERR_INVALID_PARAMETER;
  16564. }
  16565. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16566. if (o == NULL)
  16567. {
  16568. return ERR_INVALID_PARAMETER;
  16569. }
  16570. Zero(&t, sizeof(t));
  16571. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16572. t.Key = GetParamInt(o, "[id]");
  16573. // RPC call
  16574. ret = ScDelCrl(ps->Rpc, &t);
  16575. if (ret != ERR_NO_ERROR)
  16576. {
  16577. // An error has occured
  16578. CmdPrintError(c, ret);
  16579. FreeParamValueList(o);
  16580. return ret;
  16581. }
  16582. FreeRpcCrl(&t);
  16583. FreeParamValueList(o);
  16584. return 0;
  16585. }
  16586. // Get the revoked certificate
  16587. UINT PsCrlGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16588. {
  16589. LIST *o;
  16590. PS *ps = (PS *)param;
  16591. UINT ret = 0;
  16592. RPC_CRL t;
  16593. // Parameter list that can be specified
  16594. PARAM args[] =
  16595. {
  16596. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16597. {"[id]", CmdPrompt, _UU("CMD_CrlGet_Prompt_ID"), CmdEvalNotEmpty, NULL},
  16598. };
  16599. // If virtual HUB is not selected, it's an error
  16600. if (ps->HubName == NULL)
  16601. {
  16602. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16603. return ERR_INVALID_PARAMETER;
  16604. }
  16605. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16606. if (o == NULL)
  16607. {
  16608. return ERR_INVALID_PARAMETER;
  16609. }
  16610. Zero(&t, sizeof(t));
  16611. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16612. t.Key = GetParamInt(o, "[id]");
  16613. // RPC call
  16614. ret = ScGetCrl(ps->Rpc, &t);
  16615. if (ret != ERR_NO_ERROR)
  16616. {
  16617. // An error has occured
  16618. CmdPrintError(c, ret);
  16619. FreeParamValueList(o);
  16620. return ret;
  16621. }
  16622. else
  16623. {
  16624. // Show contents
  16625. CT *ct = CtNewStandard();
  16626. CRL *crl = t.Crl;
  16627. NAME *n;
  16628. if (crl != NULL)
  16629. {
  16630. n = crl->Name;
  16631. if (n != NULL)
  16632. {
  16633. if (UniIsEmptyStr(n->CommonName) == false)
  16634. {
  16635. CtInsert(ct, _UU("CMD_CrlGet_CN"), n->CommonName);
  16636. }
  16637. if (UniIsEmptyStr(n->Organization) == false)
  16638. {
  16639. CtInsert(ct, _UU("CMD_CrlGet_O"), n->Organization);
  16640. }
  16641. if (UniIsEmptyStr(n->Unit) == false)
  16642. {
  16643. CtInsert(ct, _UU("CMD_CrlGet_OU"), n->Unit);
  16644. }
  16645. if (UniIsEmptyStr(n->Country) == false)
  16646. {
  16647. CtInsert(ct, _UU("CMD_CrlGet_C"), n->Country);
  16648. }
  16649. if (UniIsEmptyStr(n->State) == false)
  16650. {
  16651. CtInsert(ct, _UU("CMD_CrlGet_ST"), n->State);
  16652. }
  16653. if (UniIsEmptyStr(n->Local) == false)
  16654. {
  16655. CtInsert(ct, _UU("CMD_CrlGet_L"), n->Local);
  16656. }
  16657. }
  16658. if (crl->Serial != NULL && crl->Serial->size >= 1)
  16659. {
  16660. wchar_t tmp[MAX_SIZE];
  16661. char str[MAX_SIZE];
  16662. BinToStrEx(str, sizeof(str), crl->Serial->data, crl->Serial->size);
  16663. StrToUni(tmp, sizeof(tmp), str);
  16664. CtInsert(ct, _UU("CMD_CrlGet_SERI"), tmp);
  16665. }
  16666. if (IsZero(crl->DigestMD5, MD5_SIZE) == false)
  16667. {
  16668. wchar_t tmp[MAX_SIZE];
  16669. char str[MAX_SIZE];
  16670. BinToStrEx(str, sizeof(str), crl->DigestMD5, MD5_SIZE);
  16671. StrToUni(tmp, sizeof(tmp), str);
  16672. CtInsert(ct, _UU("CMD_CrlGet_MD5_HASH"), tmp);
  16673. }
  16674. if (IsZero(crl->DigestSHA1, SHA1_SIZE) == false)
  16675. {
  16676. wchar_t tmp[MAX_SIZE];
  16677. char str[MAX_SIZE];
  16678. BinToStrEx(str, sizeof(str), crl->DigestSHA1, SHA1_SIZE);
  16679. StrToUni(tmp, sizeof(tmp), str);
  16680. CtInsert(ct, _UU("CMD_CrlGet_SHA1_HASH"), tmp);
  16681. }
  16682. }
  16683. CtFree(ct, c);
  16684. }
  16685. FreeRpcCrl(&t);
  16686. FreeParamValueList(o);
  16687. return 0;
  16688. }
  16689. // Get the rules of IP access control list
  16690. UINT PsAcList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16691. {
  16692. LIST *o;
  16693. PS *ps = (PS *)param;
  16694. UINT ret = 0;
  16695. RPC_AC_LIST t;
  16696. // If virtual HUB is not selected, it's an error
  16697. if (ps->HubName == NULL)
  16698. {
  16699. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16700. return ERR_INVALID_PARAMETER;
  16701. }
  16702. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  16703. if (o == NULL)
  16704. {
  16705. return ERR_INVALID_PARAMETER;
  16706. }
  16707. Zero(&t, sizeof(t));
  16708. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16709. // RPC call
  16710. ret = ScGetAcList(ps->Rpc, &t);
  16711. if (ret != ERR_NO_ERROR)
  16712. {
  16713. // An error has occured
  16714. CmdPrintError(c, ret);
  16715. FreeParamValueList(o);
  16716. return ret;
  16717. }
  16718. else
  16719. {
  16720. UINT i;
  16721. CT *ct;
  16722. ct = CtNew();
  16723. CtInsertColumn(ct, _UU("SM_AC_COLUMN_1"), true);
  16724. CtInsertColumn(ct, _UU("SM_AC_COLUMN_2"), true);
  16725. CtInsertColumn(ct, _UU("SM_AC_COLUMN_3"), false);
  16726. CtInsertColumn(ct, _UU("SM_AC_COLUMN_4"), false);
  16727. for (i = 0;i < LIST_NUM(t.o);i++)
  16728. {
  16729. wchar_t tmp1[32], *tmp2, tmp3[MAX_SIZE], tmp4[32];
  16730. char *tmp_str;
  16731. AC *ac = LIST_DATA(t.o, i);
  16732. UniToStru(tmp1, ac->Id);
  16733. tmp2 = ac->Deny ? _UU("SM_AC_DENY") : _UU("SM_AC_PASS");
  16734. tmp_str = GenerateAcStr(ac);
  16735. StrToUni(tmp3, sizeof(tmp3), tmp_str);
  16736. Free(tmp_str);
  16737. UniToStru(tmp4, ac->Priority);
  16738. CtInsert(ct, tmp1, tmp4, tmp2, tmp3);
  16739. }
  16740. CtFree(ct, c);
  16741. }
  16742. FreeRpcAcList(&t);
  16743. FreeParamValueList(o);
  16744. return 0;
  16745. }
  16746. // Add a rule to the IP access control list (IPv4)
  16747. UINT PsAcAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16748. {
  16749. LIST *o;
  16750. PS *ps = (PS *)param;
  16751. UINT ret = 0;
  16752. RPC_AC_LIST t;
  16753. // Parameter list that can be specified
  16754. CMD_EVAL_MIN_MAX mm =
  16755. {
  16756. "CMD_AcAdd_Eval_PRIORITY", 1, 4294967295UL,
  16757. };
  16758. PARAM args[] =
  16759. {
  16760. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16761. {"[allow|deny]", CmdPrompt, _UU("CMD_AcAdd_Prompt_AD"), CmdEvalNotEmpty, NULL},
  16762. {"PRIORITY", CmdPrompt, _UU("CMD_AcAdd_Prompt_PRIORITY"), CmdEvalMinMax, &mm},
  16763. {"IP", CmdPrompt, _UU("CMD_AcAdd_Prompt_IP"), CmdEvalIpAndMask4, NULL},
  16764. };
  16765. // If virtual HUB is not selected, it's an error
  16766. if (ps->HubName == NULL)
  16767. {
  16768. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16769. return ERR_INVALID_PARAMETER;
  16770. }
  16771. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16772. if (o == NULL)
  16773. {
  16774. return ERR_INVALID_PARAMETER;
  16775. }
  16776. Zero(&t, sizeof(t));
  16777. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16778. // RPC call
  16779. ret = ScGetAcList(ps->Rpc, &t);
  16780. if (ret != ERR_NO_ERROR)
  16781. {
  16782. // An error has occured
  16783. CmdPrintError(c, ret);
  16784. FreeParamValueList(o);
  16785. return ret;
  16786. }
  16787. else
  16788. {
  16789. // Add a new item to the list
  16790. AC *ac = ZeroMalloc(sizeof(AC));
  16791. char *test = GetParamStr(o, "[allow|deny]");
  16792. UINT u_ip, u_mask;
  16793. if (StartWith("deny", test))
  16794. {
  16795. ac->Deny = true;
  16796. }
  16797. ParseIpAndMask4(GetParamStr(o, "IP"), &u_ip, &u_mask);
  16798. UINTToIP(&ac->IpAddress, u_ip);
  16799. if (u_mask == 0xffffffff)
  16800. {
  16801. ac->Masked = false;
  16802. }
  16803. else
  16804. {
  16805. ac->Masked = true;
  16806. UINTToIP(&ac->SubnetMask, u_mask);
  16807. }
  16808. ac->Priority = GetParamInt(o, "PRIORITY");
  16809. Insert(t.o, ac);
  16810. ret = ScSetAcList(ps->Rpc, &t);
  16811. if (ret != ERR_NO_ERROR)
  16812. {
  16813. // An error has occured
  16814. CmdPrintError(c, ret);
  16815. FreeParamValueList(o);
  16816. return ret;
  16817. }
  16818. }
  16819. FreeRpcAcList(&t);
  16820. FreeParamValueList(o);
  16821. return 0;
  16822. }
  16823. // Add a rule to the IP access control list (IPv6)
  16824. UINT PsAcAdd6(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16825. {
  16826. LIST *o;
  16827. PS *ps = (PS *)param;
  16828. UINT ret = 0;
  16829. RPC_AC_LIST t;
  16830. // Parameter list that can be specified
  16831. CMD_EVAL_MIN_MAX mm =
  16832. {
  16833. "CMD_AcAdd6_Eval_PRIORITY", 1, 4294967295UL,
  16834. };
  16835. PARAM args[] =
  16836. {
  16837. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16838. {"[allow|deny]", CmdPrompt, _UU("CMD_AcAdd6_Prompt_AD"), CmdEvalNotEmpty, NULL},
  16839. {"PRIORITY", CmdPrompt, _UU("CMD_AcAdd6_Prompt_PRIORITY"), CmdEvalMinMax, &mm},
  16840. {"IP", CmdPrompt, _UU("CMD_AcAdd6_Prompt_IP"), CmdEvalIpAndMask6, NULL},
  16841. };
  16842. // If virtual HUB is not selected, it's an error
  16843. if (ps->HubName == NULL)
  16844. {
  16845. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  16846. return ERR_INVALID_PARAMETER;
  16847. }
  16848. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16849. if (o == NULL)
  16850. {
  16851. return ERR_INVALID_PARAMETER;
  16852. }
  16853. Zero(&t, sizeof(t));
  16854. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  16855. // RPC call
  16856. ret = ScGetAcList(ps->Rpc, &t);
  16857. if (ret != ERR_NO_ERROR)
  16858. {
  16859. // An error has occured
  16860. CmdPrintError(c, ret);
  16861. FreeParamValueList(o);
  16862. return ret;
  16863. }
  16864. else
  16865. {
  16866. // Add a new item to the list
  16867. AC *ac = ZeroMalloc(sizeof(AC));
  16868. char *test = GetParamStr(o, "[allow|deny]");
  16869. IP u_ip, u_mask;
  16870. if (StartWith("deny", test))
  16871. {
  16872. ac->Deny = true;
  16873. }
  16874. ParseIpAndMask6(GetParamStr(o, "IP"), &u_ip, &u_mask);
  16875. Copy(&ac->IpAddress, &u_ip, sizeof(IP));
  16876. if (SubnetMaskToInt6(&u_mask) == 128)
  16877. {
  16878. ac->Masked = false;
  16879. }
  16880. else
  16881. {
  16882. ac->Masked = true;
  16883. Copy(&ac->SubnetMask, &u_mask, sizeof(IP));
  16884. }
  16885. ac->Priority = GetParamInt(o, "PRIORITY");
  16886. Insert(t.o, ac);
  16887. ret = ScSetAcList(ps->Rpc, &t);
  16888. if (ret != ERR_NO_ERROR)
  16889. {
  16890. // An error has occured
  16891. CmdPrintError(c, ret);
  16892. FreeParamValueList(o);
  16893. return ret;
  16894. }
  16895. }
  16896. FreeRpcAcList(&t);
  16897. FreeParamValueList(o);
  16898. return 0;
  16899. }
  16900. // Run the debug command
  16901. UINT PsDebug(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16902. {
  16903. LIST *o;
  16904. PS *ps = (PS *)param;
  16905. UINT ret = 0;
  16906. UINT id;
  16907. // Parameter list that can be specified
  16908. PARAM args[] =
  16909. {
  16910. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16911. {"[id]", NULL, NULL, NULL, NULL},
  16912. {"ARG", NULL, NULL, NULL, NULL},
  16913. };
  16914. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16915. if (o == NULL)
  16916. {
  16917. return ERR_INVALID_PARAMETER;
  16918. }
  16919. id = GetParamInt(o, "[id]");
  16920. if (true)
  16921. {
  16922. RPC_TEST t;
  16923. UINT ret;
  16924. c->Write(c, _UU("CMD_Debug_Msg1"));
  16925. Zero(&t, sizeof(t));
  16926. t.IntValue = id;
  16927. StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "ARG"));
  16928. ret = ScDebug(ps->Rpc, &t);
  16929. if (ret != ERR_NO_ERROR)
  16930. {
  16931. // An error has occured
  16932. CmdPrintError(c, ret);
  16933. FreeParamValueList(o);
  16934. return ret;
  16935. }
  16936. else
  16937. {
  16938. wchar_t tmp[sizeof(t.StrValue)];
  16939. UniFormat(tmp, sizeof(tmp), _UU("CMD_Debug_Msg2"), t.StrValue);
  16940. c->Write(c, tmp);
  16941. }
  16942. }
  16943. FreeParamValueList(o);
  16944. return 0;
  16945. }
  16946. // Flush the configuration file on the server
  16947. UINT PsFlush(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16948. {
  16949. LIST *o;
  16950. PS *ps = (PS *)param;
  16951. UINT ret = 0;
  16952. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  16953. if (o == NULL)
  16954. {
  16955. return ERR_INVALID_PARAMETER;
  16956. }
  16957. if (true)
  16958. {
  16959. RPC_TEST t;
  16960. UINT ret;
  16961. wchar_t tmp[MAX_SIZE];
  16962. char sizestr[MAX_SIZE];
  16963. c->Write(c, _UU("CMD_Flush_Msg1"));
  16964. Zero(&t, sizeof(t));
  16965. ret = ScFlush(ps->Rpc, &t);
  16966. if (ret != ERR_NO_ERROR)
  16967. {
  16968. // An error has occured
  16969. CmdPrintError(c, ret);
  16970. FreeParamValueList(o);
  16971. return ret;
  16972. }
  16973. ToStr3(sizestr, sizeof(sizestr), (UINT64)t.IntValue);
  16974. UniFormat(tmp, sizeof(tmp), _UU("CMD_Flush_Msg2"), sizestr);
  16975. c->Write(c, tmp);
  16976. }
  16977. FreeParamValueList(o);
  16978. return 0;
  16979. }
  16980. // Crash
  16981. UINT PsCrash(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  16982. {
  16983. LIST *o;
  16984. PS *ps = (PS *)param;
  16985. UINT ret = 0;
  16986. char *yes;
  16987. // Parameter list that can be specified
  16988. PARAM args[] =
  16989. {
  16990. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  16991. {"[yes]", CmdPrompt, _UU("CMD_Crash_Confirm"), NULL, NULL},
  16992. };
  16993. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  16994. if (o == NULL)
  16995. {
  16996. return ERR_INVALID_PARAMETER;
  16997. }
  16998. yes = GetParamStr(o, "[yes]");
  16999. if (StrCmpi(yes, "yes") != 0)
  17000. {
  17001. c->Write(c, _UU("CMD_Crash_Aborted"));
  17002. }
  17003. else
  17004. {
  17005. RPC_TEST t;
  17006. UINT ret;
  17007. c->Write(c, _UU("CMD_Crash_Msg"));
  17008. Zero(&t, sizeof(t));
  17009. ret = ScCrash(ps->Rpc, &t);
  17010. if (ret != ERR_NO_ERROR)
  17011. {
  17012. // An error has occured
  17013. CmdPrintError(c, ret);
  17014. FreeParamValueList(o);
  17015. return ret;
  17016. }
  17017. }
  17018. FreeParamValueList(o);
  17019. return 0;
  17020. }
  17021. // Remove a rule in the IP access control list
  17022. UINT PsAcDel(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17023. {
  17024. LIST *o;
  17025. PS *ps = (PS *)param;
  17026. UINT ret = 0;
  17027. RPC_AC_LIST t;
  17028. // Parameter list that can be specified
  17029. PARAM args[] =
  17030. {
  17031. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17032. {"[id]", CmdPrompt, _UU("CMD_AcDel_Prompt_ID"), CmdEvalNotEmpty, NULL},
  17033. };
  17034. // If virtual HUB is not selected, it's an error
  17035. if (ps->HubName == NULL)
  17036. {
  17037. c->Write(c, _UU("CMD_Hub_Not_Selected"));
  17038. return ERR_INVALID_PARAMETER;
  17039. }
  17040. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17041. if (o == NULL)
  17042. {
  17043. return ERR_INVALID_PARAMETER;
  17044. }
  17045. Zero(&t, sizeof(t));
  17046. StrCpy(t.HubName, sizeof(t.HubName), ps->HubName);
  17047. // RPC call
  17048. ret = ScGetAcList(ps->Rpc, &t);
  17049. if (ret != ERR_NO_ERROR)
  17050. {
  17051. // An error has occured
  17052. CmdPrintError(c, ret);
  17053. FreeParamValueList(o);
  17054. return ret;
  17055. }
  17056. else
  17057. {
  17058. // Remove matched ID
  17059. UINT i;
  17060. bool b = false;
  17061. for (i = 0;i < LIST_NUM(t.o);i++)
  17062. {
  17063. AC *ac = LIST_DATA(t.o, i);
  17064. if (ac->Id == GetParamInt(o, "[id]"))
  17065. {
  17066. Delete(t.o, ac);
  17067. Free(ac);
  17068. b = true;
  17069. break;
  17070. }
  17071. }
  17072. if (b == false)
  17073. {
  17074. ret = ERR_OBJECT_NOT_FOUND;
  17075. FreeRpcAcList(&t);
  17076. }
  17077. else
  17078. {
  17079. ret = ScSetAcList(ps->Rpc, &t);
  17080. }
  17081. if (ret != ERR_NO_ERROR)
  17082. {
  17083. // An error has occured
  17084. CmdPrintError(c, ret);
  17085. FreeParamValueList(o);
  17086. return ret;
  17087. }
  17088. }
  17089. FreeRpcAcList(&t);
  17090. FreeParamValueList(o);
  17091. return 0;
  17092. }
  17093. // Enable / Disable the IPsec VPN server function
  17094. UINT PsIPsecEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17095. {
  17096. LIST *o;
  17097. PS *ps = (PS *)param;
  17098. UINT ret = 0;
  17099. IPSEC_SERVICES t;
  17100. // Parameter list that can be specified
  17101. PARAM args[] =
  17102. {
  17103. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17104. {"L2TP", CmdPrompt, _UU("CMD_IPsecEnable_Prompt_L2TP"), CmdEvalNotEmpty, NULL},
  17105. {"L2TPRAW", CmdPrompt, _UU("CMD_IPsecEnable_Prompt_L2TPRAW"), CmdEvalNotEmpty, NULL},
  17106. {"ETHERIP", CmdPrompt, _UU("CMD_IPsecEnable_Prompt_ETHERIP"), CmdEvalNotEmpty, NULL},
  17107. {"PSK", CmdPrompt, _UU("CMD_IPsecEnable_Prompt_PSK"), CmdEvalNotEmpty, NULL},
  17108. {"DEFAULTHUB", CmdPrompt, _UU("CMD_IPsecEnable_Prompt_DEFAULTHUB"), CmdEvalNotEmpty, NULL},
  17109. };
  17110. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17111. if (o == NULL)
  17112. {
  17113. return ERR_INVALID_PARAMETER;
  17114. }
  17115. Zero(&t, sizeof(t));
  17116. t.L2TP_IPsec = GetParamYes(o, "L2TP");
  17117. t.L2TP_Raw = GetParamYes(o, "L2TPRAW");
  17118. t.EtherIP_IPsec = GetParamYes(o, "ETHERIP");
  17119. StrCpy(t.IPsec_Secret, sizeof(t.IPsec_Secret), GetParamStr(o, "PSK"));
  17120. StrCpy(t.L2TP_DefaultHub, sizeof(t.L2TP_DefaultHub), GetParamStr(o, "DEFAULTHUB"));
  17121. // RPC call
  17122. ret = ScSetIPsecServices(ps->Rpc, &t);
  17123. if (ret != ERR_NO_ERROR)
  17124. {
  17125. // An error has occured
  17126. CmdPrintError(c, ret);
  17127. FreeParamValueList(o);
  17128. return ret;
  17129. }
  17130. FreeParamValueList(o);
  17131. return 0;
  17132. }
  17133. // Get the current configuration of IPsec VPN server function
  17134. UINT PsIPsecGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17135. {
  17136. LIST *o;
  17137. PS *ps = (PS *)param;
  17138. UINT ret = 0;
  17139. IPSEC_SERVICES t;
  17140. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17141. if (o == NULL)
  17142. {
  17143. return ERR_INVALID_PARAMETER;
  17144. }
  17145. Zero(&t, sizeof(t));
  17146. // RPC call
  17147. ret = ScGetIPsecServices(ps->Rpc, &t);
  17148. if (ret != ERR_NO_ERROR)
  17149. {
  17150. // An error has occured
  17151. CmdPrintError(c, ret);
  17152. FreeParamValueList(o);
  17153. return ret;
  17154. }
  17155. else
  17156. {
  17157. wchar_t tmp[MAX_PATH];
  17158. CT *ct = CtNewStandard();
  17159. CtInsert(ct, _UU("CMD_IPsecGet_PRINT_L2TP"), _UU(t.L2TP_IPsec ? "SEC_YES" : "SEC_NO"));
  17160. CtInsert(ct, _UU("CMD_IPsecGet_PRINT_L2TPRAW"), _UU(t.L2TP_Raw ? "SEC_YES" : "SEC_NO"));
  17161. CtInsert(ct, _UU("CMD_IPsecGet_PRINT_ETHERIP"), _UU(t.EtherIP_IPsec ? "SEC_YES" : "SEC_NO"));
  17162. StrToUni(tmp, sizeof(tmp), t.IPsec_Secret);
  17163. CtInsert(ct, _UU("CMD_IPsecGet_PRINT_PSK"), tmp);
  17164. StrToUni(tmp, sizeof(tmp), t.L2TP_DefaultHub);
  17165. CtInsert(ct, _UU("CMD_IPsecGet_PRINT_DEFAULTHUB"), tmp);
  17166. CtFree(ct, c);
  17167. }
  17168. FreeParamValueList(o);
  17169. return 0;
  17170. }
  17171. // Add connection settings for accepting connections from client devices of EtherIP / L2TPv3 over IPsec server function
  17172. UINT PsEtherIpClientAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17173. {
  17174. LIST *o;
  17175. PS *ps = (PS *)param;
  17176. UINT ret = 0;
  17177. ETHERIP_ID t;
  17178. // Parameter list that can be specified
  17179. PARAM args[] =
  17180. {
  17181. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17182. {"[ID]", CmdPrompt, _UU("CMD_EtherIpClientAdd_Prompt_ID"), CmdEvalNotEmpty, NULL},
  17183. {"HUB", CmdPrompt, _UU("CMD_EtherIpClientAdd_Prompt_HUB"), CmdEvalNotEmpty, NULL},
  17184. {"USERNAME", CmdPrompt, _UU("CMD_EtherIpClientAdd_Prompt_USERNAME"), CmdEvalNotEmpty, NULL},
  17185. {"PASSWORD", CmdPrompt, _UU("CMD_EtherIpClientAdd_Prompt_PASSWORD"), CmdEvalNotEmpty, NULL},
  17186. };
  17187. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17188. if (o == NULL)
  17189. {
  17190. return ERR_INVALID_PARAMETER;
  17191. }
  17192. Zero(&t, sizeof(t));
  17193. StrCpy(t.Id, sizeof(t.Id), GetParamStr(o, "[ID]"));
  17194. StrCpy(t.HubName, sizeof(t.HubName), GetParamStr(o, "HUB"));
  17195. StrCpy(t.UserName, sizeof(t.UserName), GetParamStr(o, "USERNAME"));
  17196. StrCpy(t.Password, sizeof(t.Password), GetParamStr(o, "PASSWORD"));
  17197. // RPC call
  17198. ret = ScAddEtherIpId(ps->Rpc, &t);
  17199. if (ret != ERR_NO_ERROR)
  17200. {
  17201. // An error has occured
  17202. CmdPrintError(c, ret);
  17203. FreeParamValueList(o);
  17204. return ret;
  17205. }
  17206. FreeParamValueList(o);
  17207. return 0;
  17208. }
  17209. // Delete the connection settings for accepting connections from client devices of EtherIP / L2TPv3 over IPsec server function
  17210. UINT PsEtherIpClientDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17211. {
  17212. LIST *o;
  17213. PS *ps = (PS *)param;
  17214. UINT ret = 0;
  17215. ETHERIP_ID t;
  17216. // Parameter list that can be specified
  17217. PARAM args[] =
  17218. {
  17219. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17220. {"[ID]", CmdPrompt, _UU("CMD_EtherIpClientDelete_Prompt_ID"), CmdEvalNotEmpty, NULL},
  17221. };
  17222. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17223. if (o == NULL)
  17224. {
  17225. return ERR_INVALID_PARAMETER;
  17226. }
  17227. Zero(&t, sizeof(t));
  17228. StrCpy(t.Id, sizeof(t.Id), GetParamStr(o, "[ID]"));
  17229. // RPC call
  17230. ret = ScDeleteEtherIpId(ps->Rpc, &t);
  17231. if (ret != ERR_NO_ERROR)
  17232. {
  17233. // An error has occured
  17234. CmdPrintError(c, ret);
  17235. FreeParamValueList(o);
  17236. return ret;
  17237. }
  17238. FreeParamValueList(o);
  17239. return 0;
  17240. }
  17241. // Show the list of connection settings for accepting connections from client devices of EtherIP / L2TPv3 over IPsec server function
  17242. UINT PsEtherIpClientList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17243. {
  17244. LIST *o;
  17245. PS *ps = (PS *)param;
  17246. UINT ret = 0;
  17247. RPC_ENUM_ETHERIP_ID t;
  17248. UINT i;
  17249. CT *b;
  17250. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17251. if (o == NULL)
  17252. {
  17253. return ERR_INVALID_PARAMETER;
  17254. }
  17255. Zero(&t, sizeof(t));
  17256. // RPC call
  17257. ret = ScEnumEtherIpId(ps->Rpc, &t);
  17258. if (ret != ERR_NO_ERROR)
  17259. {
  17260. // An error has occured
  17261. CmdPrintError(c, ret);
  17262. FreeParamValueList(o);
  17263. return ret;
  17264. }
  17265. else
  17266. {
  17267. b = CtNew();
  17268. CtInsertColumn(b, _UU("SM_ETHERIP_COLUMN_0"), false);
  17269. CtInsertColumn(b, _UU("SM_ETHERIP_COLUMN_1"), false);
  17270. CtInsertColumn(b, _UU("SM_ETHERIP_COLUMN_2"), false);
  17271. for (i = 0;i < t.NumItem;i++)
  17272. {
  17273. ETHERIP_ID *d = &t.IdList[i];
  17274. wchar_t id[MAX_SIZE], hubname[MAX_SIZE], username[MAX_SIZE];
  17275. StrToUni(id, sizeof(id), d->Id);
  17276. StrToUni(hubname, sizeof(hubname), d->HubName);
  17277. StrToUni(username, sizeof(username), d->UserName);
  17278. CtInsert(b, id, hubname, username);
  17279. }
  17280. CtFree(b, c);
  17281. FreeRpcEnumEtherIpId(&t);
  17282. }
  17283. FreeParamValueList(o);
  17284. return 0;
  17285. }
  17286. // Enable / disable the OpenVPN compatible server function
  17287. UINT PsOpenVpnEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17288. {
  17289. LIST *o;
  17290. PS *ps = (PS *)param;
  17291. UINT ret = 0;
  17292. OPENVPN_SSTP_CONFIG t;
  17293. // Parameter list that can be specified
  17294. PARAM args[] =
  17295. {
  17296. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17297. {"[yes|no]", CmdPrompt, _UU("CMD_OpenVpnEnable_Prompt_[yes|no]"), CmdEvalNotEmpty, NULL},
  17298. {"PORTS", CmdPrompt, _UU("CMD_OpenVpnEnable_Prompt_PORTS"), CmdEvalNotEmpty, NULL},
  17299. };
  17300. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17301. if (o == NULL)
  17302. {
  17303. return ERR_INVALID_PARAMETER;
  17304. }
  17305. Zero(&t, sizeof(t));
  17306. // RPC call
  17307. ret = ScGetOpenVpnSstpConfig(ps->Rpc, &t);
  17308. if (ret != ERR_NO_ERROR)
  17309. {
  17310. // An error has occured
  17311. CmdPrintError(c, ret);
  17312. FreeParamValueList(o);
  17313. return ret;
  17314. }
  17315. t.EnableOpenVPN = GetParamYes(o, "[yes|no]");
  17316. StrCpy(t.OpenVPNPortList, sizeof(t.OpenVPNPortList), GetParamStr(o, "PORTS"));
  17317. // RPC call
  17318. ret = ScSetOpenVpnSstpConfig(ps->Rpc, &t);
  17319. if (ret != ERR_NO_ERROR)
  17320. {
  17321. // An error has occured
  17322. CmdPrintError(c, ret);
  17323. FreeParamValueList(o);
  17324. return ret;
  17325. }
  17326. FreeParamValueList(o);
  17327. return 0;
  17328. }
  17329. // Get the current settings for the OpenVPN compatible server function
  17330. UINT PsOpenVpnGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17331. {
  17332. LIST *o;
  17333. PS *ps = (PS *)param;
  17334. UINT ret = 0;
  17335. OPENVPN_SSTP_CONFIG t;
  17336. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17337. if (o == NULL)
  17338. {
  17339. return ERR_INVALID_PARAMETER;
  17340. }
  17341. Zero(&t, sizeof(t));
  17342. // RPC call
  17343. ret = ScGetOpenVpnSstpConfig(ps->Rpc, &t);
  17344. if (ret != ERR_NO_ERROR)
  17345. {
  17346. // An error has occured
  17347. CmdPrintError(c, ret);
  17348. FreeParamValueList(o);
  17349. return ret;
  17350. }
  17351. else
  17352. {
  17353. wchar_t tmp[MAX_PATH];
  17354. CT *ct = CtNewStandard();
  17355. CtInsert(ct, _UU("CMD_OpenVpnGet_PRINT_Enabled"), _UU(t.EnableOpenVPN ? "SEC_YES" : "SEC_NO"));
  17356. StrToUni(tmp, sizeof(tmp), t.OpenVPNPortList);
  17357. CtInsert(ct, _UU("CMD_OpenVpnGet_PRINT_Ports"), tmp);
  17358. CtFree(ct, c);
  17359. }
  17360. FreeParamValueList(o);
  17361. return 0;
  17362. }
  17363. // Generate a OpenVPN sample configuration file that can connect to the OpenVPN compatible server function
  17364. UINT PsOpenVpnMakeConfig(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17365. {
  17366. LIST *o;
  17367. PS *ps = (PS *)param;
  17368. UINT ret = 0;
  17369. RPC_READ_LOG_FILE t;
  17370. // Parameter list that can be specified
  17371. PARAM args[] =
  17372. {
  17373. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17374. {"[ZIP_FileName]", CmdPrompt, _UU("CMD_OpenVpnMakeConfig_Prompt_ZIP"), CmdEvalNotEmpty, NULL},
  17375. };
  17376. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17377. if (o == NULL)
  17378. {
  17379. return ERR_INVALID_PARAMETER;
  17380. }
  17381. Zero(&t, sizeof(t));
  17382. // RPC call
  17383. ret = ScMakeOpenVpnConfigFile(ps->Rpc, &t);
  17384. if (ret != ERR_NO_ERROR)
  17385. {
  17386. // An error has occured
  17387. CmdPrintError(c, ret);
  17388. FreeParamValueList(o);
  17389. return ret;
  17390. }
  17391. else
  17392. {
  17393. // Determine the file name to save
  17394. wchar_t filename[MAX_SIZE];
  17395. wchar_t tmp[MAX_SIZE];
  17396. UniStrCpy(filename, sizeof(filename), GetParamUniStr(o, "[ZIP_FileName]"));
  17397. if (UniEndWith(filename, L".zip") == false)
  17398. {
  17399. UniStrCat(filename, sizeof(filename), L".zip");
  17400. }
  17401. if (DumpBufW(t.Buffer, filename) == false)
  17402. {
  17403. ret = ERR_INTERNAL_ERROR;
  17404. UniFormat(tmp, sizeof(tmp), _UU("CMD_OpenVpnMakeConfig_ERROR"), filename);
  17405. }
  17406. else
  17407. {
  17408. UniFormat(tmp, sizeof(tmp), _UU("CMD_OpenVpnMakeConfig_OK"), filename);
  17409. }
  17410. c->Write(c, tmp);
  17411. FreeRpcReadLogFile(&t);
  17412. }
  17413. FreeParamValueList(o);
  17414. return ret;
  17415. }
  17416. // Enable / disable the Microsoft SSTP VPN compatible server function
  17417. UINT PsSstpEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17418. {
  17419. LIST *o;
  17420. PS *ps = (PS *)param;
  17421. UINT ret = 0;
  17422. OPENVPN_SSTP_CONFIG t;
  17423. // Parameter list that can be specified
  17424. PARAM args[] =
  17425. {
  17426. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17427. {"[yes|no]", CmdPrompt, _UU("CMD_SstpEnable_Prompt_[yes|no]"), CmdEvalNotEmpty, NULL},
  17428. };
  17429. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17430. if (o == NULL)
  17431. {
  17432. return ERR_INVALID_PARAMETER;
  17433. }
  17434. Zero(&t, sizeof(t));
  17435. // RPC call
  17436. ret = ScGetOpenVpnSstpConfig(ps->Rpc, &t);
  17437. if (ret != ERR_NO_ERROR)
  17438. {
  17439. // An error has occured
  17440. CmdPrintError(c, ret);
  17441. FreeParamValueList(o);
  17442. return ret;
  17443. }
  17444. t.EnableSSTP = GetParamYes(o, "[yes|no]");
  17445. // RPC call
  17446. ret = ScSetOpenVpnSstpConfig(ps->Rpc, &t);
  17447. if (ret != ERR_NO_ERROR)
  17448. {
  17449. // An error has occured
  17450. CmdPrintError(c, ret);
  17451. FreeParamValueList(o);
  17452. return ret;
  17453. }
  17454. FreeParamValueList(o);
  17455. return 0;
  17456. }
  17457. // Get the current settings for the Microsoft SSTP VPN compatible server function
  17458. UINT PsSstpGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17459. {
  17460. LIST *o;
  17461. PS *ps = (PS *)param;
  17462. UINT ret = 0;
  17463. OPENVPN_SSTP_CONFIG t;
  17464. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17465. if (o == NULL)
  17466. {
  17467. return ERR_INVALID_PARAMETER;
  17468. }
  17469. Zero(&t, sizeof(t));
  17470. // RPC call
  17471. ret = ScGetOpenVpnSstpConfig(ps->Rpc, &t);
  17472. if (ret != ERR_NO_ERROR)
  17473. {
  17474. // An error has occured
  17475. CmdPrintError(c, ret);
  17476. FreeParamValueList(o);
  17477. return ret;
  17478. }
  17479. else
  17480. {
  17481. CT *ct = CtNewStandard();
  17482. CtInsert(ct, _UU("CMD_SstpEnable_PRINT_Enabled"), _UU(t.EnableSSTP ? "SEC_YES" : "SEC_NO"));
  17483. CtFree(ct, c);
  17484. }
  17485. FreeParamValueList(o);
  17486. return 0;
  17487. }
  17488. // Register to the VPN Server by creating a new self-signed certificate with the specified CN (Common Name)
  17489. UINT PsServerCertRegenerate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17490. {
  17491. LIST *o;
  17492. PS *ps = (PS *)param;
  17493. UINT ret = 0;
  17494. RPC_TEST t;
  17495. // Parameter list that can be specified
  17496. PARAM args[] =
  17497. {
  17498. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17499. {"[CN]", CmdPrompt, _UU("CMD_ServerCertRegenerate_Prompt_CN"), CmdEvalNotEmpty, NULL},
  17500. };
  17501. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17502. if (o == NULL)
  17503. {
  17504. return ERR_INVALID_PARAMETER;
  17505. }
  17506. Zero(&t, sizeof(t));
  17507. StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "[CN]"));
  17508. // RPC call
  17509. ret = ScRegenerateServerCert(ps->Rpc, &t);
  17510. if (ret != ERR_NO_ERROR)
  17511. {
  17512. // An error has occured
  17513. CmdPrintError(c, ret);
  17514. FreeParamValueList(o);
  17515. return ret;
  17516. }
  17517. c->Write(c, L"");
  17518. c->Write(c, _UU("CM_CERT_SET_MSG"));
  17519. c->Write(c, L"");
  17520. FreeParamValueList(o);
  17521. return 0;
  17522. }
  17523. // Enable / disable the VPN over ICMP / VPN over DNS server function
  17524. UINT PsVpnOverIcmpDnsEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17525. {
  17526. LIST *o;
  17527. PS *ps = (PS *)param;
  17528. UINT ret = 0;
  17529. RPC_SPECIAL_LISTENER t;
  17530. // Parameter list that can be specified
  17531. PARAM args[] =
  17532. {
  17533. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17534. {"ICMP", CmdPrompt, _UU("CMD_VpnOverIcmpDnsEnable_Prompt_ICMP"), CmdEvalNotEmpty, NULL},
  17535. {"DNS", CmdPrompt, _UU("CMD_VpnOverIcmpDnsEnable_Prompt_DNS"), CmdEvalNotEmpty, NULL},
  17536. };
  17537. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17538. if (o == NULL)
  17539. {
  17540. return ERR_INVALID_PARAMETER;
  17541. }
  17542. Zero(&t, sizeof(t));
  17543. t.VpnOverIcmpListener = GetParamYes(o, "ICMP");
  17544. t.VpnOverDnsListener = GetParamYes(o, "DNS");
  17545. // RPC call
  17546. ret = ScSetSpecialListener(ps->Rpc, &t);
  17547. if (ret != ERR_NO_ERROR)
  17548. {
  17549. // An error has occured
  17550. CmdPrintError(c, ret);
  17551. FreeParamValueList(o);
  17552. return ret;
  17553. }
  17554. FreeParamValueList(o);
  17555. return 0;
  17556. }
  17557. // Get current settings of VPN over ICMP / VPN over DNS server function
  17558. UINT PsVpnOverIcmpDnsGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17559. {
  17560. LIST *o;
  17561. PS *ps = (PS *)param;
  17562. UINT ret = 0;
  17563. RPC_SPECIAL_LISTENER t;
  17564. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17565. if (o == NULL)
  17566. {
  17567. return ERR_INVALID_PARAMETER;
  17568. }
  17569. Zero(&t, sizeof(t));
  17570. // RPC call
  17571. ret = ScGetSpecialListener(ps->Rpc, &t);
  17572. if (ret != ERR_NO_ERROR)
  17573. {
  17574. // An error has occured
  17575. CmdPrintError(c, ret);
  17576. FreeParamValueList(o);
  17577. return ret;
  17578. }
  17579. else
  17580. {
  17581. CT *ct = CtNewStandard();
  17582. CtInsert(ct, _UU("CMD_VpnOverIcmpDnsGet_PRINT_ICMP"), _UU(t.VpnOverIcmpListener ? "SEC_YES" : "SEC_NO"));
  17583. CtInsert(ct, _UU("CMD_VpnOverIcmpDnsGet_PRINT_DNS"), _UU(t.VpnOverDnsListener ? "SEC_YES" : "SEC_NO"));
  17584. CtFree(ct, c);
  17585. }
  17586. FreeParamValueList(o);
  17587. return 0;
  17588. }
  17589. // Enable / disable the VPN Azure function
  17590. UINT PsVpnAzureSetEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17591. {
  17592. LIST *o;
  17593. PS *ps = (PS *)param;
  17594. UINT ret = 0;
  17595. RPC_AZURE_STATUS t;
  17596. // Parameter list that can be specified
  17597. PARAM args[] =
  17598. {
  17599. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17600. {"[yes|no]", CmdPrompt, _UU("VpnAzureSetEnable_PROMPT"), CmdEvalNotEmpty, NULL},
  17601. };
  17602. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17603. if (o == NULL)
  17604. {
  17605. return ERR_INVALID_PARAMETER;
  17606. }
  17607. Zero(&t, sizeof(t));
  17608. t.IsEnabled = GetParamYes(o, "[yes|no]");
  17609. // RPC call
  17610. ret = ScSetAzureStatus(ps->Rpc, &t);
  17611. if (ret != ERR_NO_ERROR)
  17612. {
  17613. // An error has occured
  17614. CmdPrintError(c, ret);
  17615. FreeParamValueList(o);
  17616. return ret;
  17617. }
  17618. FreeParamValueList(o);
  17619. return 0;
  17620. }
  17621. // Get the current state of the VPN Azure function
  17622. UINT PsVpnAzureGetStatus(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17623. {
  17624. LIST *o;
  17625. PS *ps = (PS *)param;
  17626. UINT ret = 0;
  17627. RPC_AZURE_STATUS t;
  17628. DDNS_CLIENT_STATUS t2;
  17629. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17630. if (o == NULL)
  17631. {
  17632. return ERR_INVALID_PARAMETER;
  17633. }
  17634. Zero(&t, sizeof(t));
  17635. Zero(&t2, sizeof(t2));
  17636. // RPC call
  17637. ret = ScGetAzureStatus(ps->Rpc, &t);
  17638. if (ret == ERR_NO_ERROR)
  17639. {
  17640. ret = ScGetDDnsClientStatus(ps->Rpc, &t2);
  17641. }
  17642. if (ret != ERR_NO_ERROR)
  17643. {
  17644. // An error has occured
  17645. CmdPrintError(c, ret);
  17646. FreeParamValueList(o);
  17647. return ret;
  17648. }
  17649. else
  17650. {
  17651. CT *ct = CtNewStandard();
  17652. CtInsert(ct, _UU("CMD_VpnAzureGetStatus_PRINT_ENABLED"), _UU(t.IsEnabled ? "SEC_YES" : "SEC_NO"));
  17653. if (t.IsEnabled)
  17654. {
  17655. wchar_t tmp[MAX_SIZE];
  17656. UniFormat(tmp, sizeof(tmp), L"%S%S", t2.CurrentHostName, AZURE_DOMAIN_SUFFIX);
  17657. CtInsert(ct, _UU("CMD_VpnAzureGetStatus_PRINT_CONNECTED"), _UU(t.IsConnected ? "SEC_YES" : "SEC_NO"));
  17658. CtInsert(ct, _UU("CMD_VpnAzureGetStatus_PRINT_HOSTNAME"), tmp);
  17659. }
  17660. CtFree(ct, c);
  17661. }
  17662. FreeParamValueList(o);
  17663. return 0;
  17664. }
  17665. // Get the current state of the dynamic DNS function
  17666. UINT PsDynamicDnsGetStatus(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17667. {
  17668. LIST *o;
  17669. PS *ps = (PS *)param;
  17670. UINT ret = 0;
  17671. DDNS_CLIENT_STATUS t;
  17672. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17673. if (o == NULL)
  17674. {
  17675. return ERR_INVALID_PARAMETER;
  17676. }
  17677. Zero(&t, sizeof(t));
  17678. // RPC call
  17679. ret = ScGetDDnsClientStatus(ps->Rpc, &t);
  17680. if (ret != ERR_NO_ERROR)
  17681. {
  17682. // An error has occured
  17683. CmdPrintError(c, ret);
  17684. FreeParamValueList(o);
  17685. return ret;
  17686. }
  17687. else
  17688. {
  17689. CT *ct = CtNewStandard();
  17690. wchar_t tmp[MAX_SIZE];
  17691. // FQDN
  17692. if (IsEmptyStr(t.CurrentFqdn) == false)
  17693. {
  17694. StrToUni(tmp, sizeof(tmp), t.CurrentFqdn);
  17695. }
  17696. else
  17697. {
  17698. UniStrCpy(tmp, sizeof(tmp), _UU("SM_DDNS_FQDN_EMPTY"));
  17699. }
  17700. CtInsert(ct, _UU("CMD_DynamicDnsGetStatus_PRINT_FQDN"), tmp);
  17701. // Hostname
  17702. if (IsEmptyStr(t.CurrentHostName) == false)
  17703. {
  17704. StrToUni(tmp, sizeof(tmp), t.CurrentHostName);
  17705. }
  17706. else
  17707. {
  17708. UniStrCpy(tmp, sizeof(tmp), _UU("SM_DDNS_FQDN_EMPTY"));
  17709. }
  17710. CtInsert(ct, _UU("CMD_DynamicDnsGetStatus_PRINT_HOSTNAME"), tmp);
  17711. // Suffix
  17712. if (IsEmptyStr(t.DnsSuffix) == false)
  17713. {
  17714. StrToUni(tmp, sizeof(tmp), t.DnsSuffix);
  17715. }
  17716. else
  17717. {
  17718. UniStrCpy(tmp, sizeof(tmp), _UU("SM_DDNS_FQDN_EMPTY"));
  17719. }
  17720. CtInsert(ct, _UU("CMD_DynamicDnsGetStatus_PRINT_SUFFIX"), tmp);
  17721. // IPv4
  17722. if (t.Err_IPv4 == ERR_NO_ERROR)
  17723. {
  17724. StrToUni(tmp, sizeof(tmp), t.CurrentIPv4);
  17725. }
  17726. else
  17727. {
  17728. UniStrCpy(tmp, sizeof(tmp), _E(t.Err_IPv4));
  17729. }
  17730. CtInsert(ct, _UU("CMD_DynamicDnsGetStatus_PRINT_IPv4"), tmp);
  17731. // IPv6
  17732. if (t.Err_IPv6 == ERR_NO_ERROR)
  17733. {
  17734. StrToUni(tmp, sizeof(tmp), t.CurrentIPv6);
  17735. }
  17736. else
  17737. {
  17738. UniStrCpy(tmp, sizeof(tmp), _E(t.Err_IPv6));
  17739. }
  17740. CtInsert(ct, _UU("CMD_DynamicDnsGetStatus_PRINT_IPv6"), tmp);
  17741. CtFree(ct, c);
  17742. }
  17743. FreeParamValueList(o);
  17744. return 0;
  17745. }
  17746. // Configure the dynamic DNS host name
  17747. UINT PsDynamicDnsSetHostname(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17748. {
  17749. LIST *o;
  17750. PS *ps = (PS *)param;
  17751. UINT ret = 0;
  17752. RPC_TEST t;
  17753. // Parameter list that can be specified
  17754. PARAM args[] =
  17755. {
  17756. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17757. {"[hostname]", CmdPrompt, _UU("CMD_DynamicDnsSetHostname_Prompt_hostname"), CmdEvalNotEmpty, NULL},
  17758. };
  17759. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17760. if (o == NULL)
  17761. {
  17762. return ERR_INVALID_PARAMETER;
  17763. }
  17764. Zero(&t, sizeof(t));
  17765. StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "[hostname]"));
  17766. // RPC call
  17767. ret = ScChangeDDnsClientHostname(ps->Rpc, &t);
  17768. if (ret != ERR_NO_ERROR)
  17769. {
  17770. // An error has occured
  17771. CmdPrintError(c, ret);
  17772. FreeParamValueList(o);
  17773. return ret;
  17774. }
  17775. FreeParamValueList(o);
  17776. return 0;
  17777. }
  17778. // Register a new license key
  17779. UINT PsLicenseAdd(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17780. {
  17781. LIST *o;
  17782. PS *ps = (PS *)param;
  17783. UINT ret = 0;
  17784. RPC_TEST t;
  17785. // Parameter list that can be specified
  17786. PARAM args[] =
  17787. {
  17788. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17789. {"[key]", CmdPrompt, _UU("CMD_LicenseAdd_Prompt_Key"), CmdEvalNotEmpty, NULL},
  17790. };
  17791. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17792. if (o == NULL)
  17793. {
  17794. return ERR_INVALID_PARAMETER;
  17795. }
  17796. Zero(&t, sizeof(t));
  17797. StrCpy(t.StrValue, sizeof(t.StrValue), GetParamStr(o, "[key]"));
  17798. // RPC call
  17799. ret = ScAddLicenseKey(ps->Rpc, &t);
  17800. if (ret != ERR_NO_ERROR)
  17801. {
  17802. // An error has occured
  17803. CmdPrintError(c, ret);
  17804. FreeParamValueList(o);
  17805. return ret;
  17806. }
  17807. FreeParamValueList(o);
  17808. return 0;
  17809. }
  17810. // Delete the registered license
  17811. UINT PsLicenseDel(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17812. {
  17813. LIST *o;
  17814. PS *ps = (PS *)param;
  17815. UINT ret = 0;
  17816. RPC_TEST t;
  17817. // Parameter list that can be specified
  17818. PARAM args[] =
  17819. {
  17820. // "name", prompt_proc, prompt_param, eval_proc, eval_param
  17821. {"[id]", CmdPrompt, _UU("CMD_LicenseDel_Prompt_ID"), CmdEvalNotEmpty, NULL},
  17822. };
  17823. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  17824. if (o == NULL)
  17825. {
  17826. return ERR_INVALID_PARAMETER;
  17827. }
  17828. Zero(&t, sizeof(t));
  17829. t.IntValue = GetParamInt(o, "[id]");
  17830. // RPC call
  17831. ret = ScDelLicenseKey(ps->Rpc, &t);
  17832. if (ret != ERR_NO_ERROR)
  17833. {
  17834. // An error has occured
  17835. CmdPrintError(c, ret);
  17836. FreeParamValueList(o);
  17837. return ret;
  17838. }
  17839. FreeParamValueList(o);
  17840. return 0;
  17841. }
  17842. // Get the registered license list
  17843. UINT PsLicenseList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17844. {
  17845. LIST *o;
  17846. PS *ps = (PS *)param;
  17847. UINT ret = 0;
  17848. RPC_ENUM_LICENSE_KEY t;
  17849. CT *ct;
  17850. UINT i;
  17851. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17852. if (o == NULL)
  17853. {
  17854. return ERR_INVALID_PARAMETER;
  17855. }
  17856. Zero(&t, sizeof(t));
  17857. // RPC call
  17858. ret = ScEnumLicenseKey(ps->Rpc, &t);
  17859. if (ret != ERR_NO_ERROR)
  17860. {
  17861. // An error has occured
  17862. CmdPrintError(c, ret);
  17863. FreeParamValueList(o);
  17864. return ret;
  17865. }
  17866. ct = CtNew();
  17867. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_1"), false);
  17868. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_2"), false);
  17869. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_3"), false);
  17870. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_4"), false);
  17871. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_5"), false);
  17872. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_6"), false);
  17873. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_7"), false);
  17874. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_8"), false);
  17875. CtInsertColumn(ct, _UU("SM_LICENSE_COLUMN_9"), false);
  17876. for (i = 0;i < t.NumItem;i++)
  17877. {
  17878. wchar_t tmp1[32], tmp2[LICENSE_KEYSTR_LEN + 1], tmp3[LICENSE_MAX_PRODUCT_NAME_LEN + 1],
  17879. *tmp4, tmp5[128], tmp6[LICENSE_LICENSEID_STR_LEN + 1], tmp7[64],
  17880. tmp8[64], tmp9[64];
  17881. RPC_ENUM_LICENSE_KEY_ITEM *e = &t.Items[i];
  17882. UniToStru(tmp1, e->Id);
  17883. StrToUni(tmp2, sizeof(tmp2), e->LicenseKey);
  17884. StrToUni(tmp3, sizeof(tmp3), e->LicenseName);
  17885. tmp4 = LiGetLicenseStatusStr(e->Status);
  17886. if (e->Expires == 0)
  17887. {
  17888. UniStrCpy(tmp5, sizeof(tmp5), _UU("SM_LICENSE_NO_EXPIRES"));
  17889. }
  17890. else
  17891. {
  17892. GetDateStrEx64(tmp5, sizeof(tmp5), e->Expires, NULL);
  17893. }
  17894. StrToUni(tmp6, sizeof(tmp6), e->LicenseId);
  17895. UniToStru(tmp7, e->ProductId);
  17896. UniFormat(tmp8, sizeof(tmp8), L"%I64u", e->SystemId);
  17897. UniToStru(tmp9, e->SerialId);
  17898. CtInsert(ct,
  17899. tmp1, tmp2, tmp3, tmp4, tmp5, tmp6, tmp7, tmp8, tmp9);
  17900. }
  17901. CtFreeEx(ct, c, true);
  17902. FreeRpcEnumLicenseKey(&t);
  17903. FreeParamValueList(o);
  17904. return 0;
  17905. }
  17906. // Get the license status of the current VPN Server
  17907. UINT PsLicenseStatus(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  17908. {
  17909. LIST *o;
  17910. PS *ps = (PS *)param;
  17911. UINT ret = 0;
  17912. RPC_LICENSE_STATUS st;
  17913. CT *ct;
  17914. wchar_t tmp[MAX_SIZE];
  17915. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  17916. if (o == NULL)
  17917. {
  17918. return ERR_INVALID_PARAMETER;
  17919. }
  17920. Zero(&st, sizeof(st));
  17921. // RPC call
  17922. ret = ScGetLicenseStatus(ps->Rpc, &st);
  17923. if (ret != ERR_NO_ERROR)
  17924. {
  17925. // An error has occured
  17926. CmdPrintError(c, ret);
  17927. FreeParamValueList(o);
  17928. return ret;
  17929. }
  17930. ct = CtNewStandard();
  17931. if (st.EditionId == LICENSE_EDITION_VPN3_NO_LICENSE)
  17932. {
  17933. CtInsert(ct, _UU("SM_NO_LICENSE_COLUMN"), _UU("SM_NO_LICENSE"));
  17934. }
  17935. else
  17936. {
  17937. // Product edition name
  17938. StrToUni(tmp, sizeof(tmp), st.EditionStr);
  17939. CtInsert(ct, _UU("SM_LICENSE_STATUS_EDITION"), tmp);
  17940. // Release date
  17941. if (st.ReleaseDate != 0)
  17942. {
  17943. GetDateStrEx64(tmp, sizeof(tmp), st.ReleaseDate, NULL);
  17944. CtInsert(ct, _UU("SM_LICENSE_STATUS_RELEASE"), tmp);
  17945. }
  17946. // Current system ID
  17947. UniFormat(tmp, sizeof(tmp), L"%I64u", st.SystemId);
  17948. CtInsert(ct, _UU("SM_LICENSE_STATUS_SYSTEM_ID"), tmp);
  17949. // Expiration date of the current license product
  17950. if (st.SystemExpires == 0)
  17951. {
  17952. UniStrCpy(tmp, sizeof(tmp), _UU("SM_LICENSE_NO_EXPIRES"));
  17953. }
  17954. else
  17955. {
  17956. GetDateStrEx64(tmp, sizeof(tmp), st.SystemExpires, NULL);
  17957. }
  17958. CtInsert(ct, _UU("SM_LICENSE_STATUS_EXPIRES"), tmp);
  17959. // Subscription (support) contract
  17960. if (st.NeedSubscription == false)
  17961. {
  17962. UniStrCpy(tmp, sizeof(tmp), _UU("SM_LICENSE_STATUS_SUBSCRIPTION_NONEED"));
  17963. }
  17964. else
  17965. {
  17966. if (st.SubscriptionExpires == 0)
  17967. {
  17968. UniStrCpy(tmp, sizeof(tmp), _UU("SM_LICENSE_STATUS_SUBSCRIPTION_NONE"));
  17969. }
  17970. else
  17971. {
  17972. wchar_t dtstr[MAX_PATH];
  17973. GetDateStrEx64(dtstr, sizeof(dtstr), st.SubscriptionExpires, NULL);
  17974. UniFormat(tmp, sizeof(tmp),
  17975. st.IsSubscriptionExpired ? _UU("SM_LICENSE_STATUS_SUBSCRIPTION_EXPIRED") : _UU("SM_LICENSE_STATUS_SUBSCRIPTION_VALID"),
  17976. dtstr);
  17977. }
  17978. }
  17979. CtInsert(ct, _UU("SM_LICENSE_STATUS_SUBSCRIPTION"), tmp);
  17980. if (st.NeedSubscription == false && st.SubscriptionExpires != 0)
  17981. {
  17982. wchar_t dtstr[MAX_PATH];
  17983. GetDateStrEx64(dtstr, sizeof(dtstr), st.SubscriptionExpires, NULL);
  17984. CtInsert(ct, _UU("SM_LICENSE_STATUS_SUBSCRIPTION_BUILD_STR"), tmp);
  17985. }
  17986. if (GetCapsBool(ps->CapsList, "b_vpn3"))
  17987. {
  17988. // Maximum creatable number of users
  17989. if (st.NumClientConnectLicense == INFINITE)
  17990. {
  17991. UniStrCpy(tmp, sizeof(tmp), _UU("SM_LICENSE_INFINITE"));
  17992. }
  17993. else
  17994. {
  17995. UniToStru(tmp, st.NumClientConnectLicense);
  17996. }
  17997. CtInsert(ct, _UU("SM_LICENSE_NUM_CLIENT"), tmp);
  17998. }
  17999. // Available number of concurrent client connections
  18000. if (st.NumBridgeConnectLicense == INFINITE)
  18001. {
  18002. UniStrCpy(tmp, sizeof(tmp), _UU("SM_LICENSE_INFINITE"));
  18003. }
  18004. else
  18005. {
  18006. UniToStru(tmp, st.NumBridgeConnectLicense);
  18007. }
  18008. CtInsert(ct, _UU("SM_LICENSE_NUM_BRIDGE"), tmp);
  18009. // Availability of enterprise features
  18010. CtInsert(ct, _UU("SM_LICENSE_STATUS_ENTERPRISE"),
  18011. st.AllowEnterpriseFunction ? _UU("SM_LICENSE_STATUS_ENTERPRISE_YES") : _UU("SM_LICENSE_STATUS_ENTERPRISE_NO"));
  18012. }
  18013. CtFreeEx(ct, c, false);
  18014. FreeParamValueList(o);
  18015. return 0;
  18016. }
  18017. // Get the cluster configuration
  18018. UINT PsClusterSettingGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18019. {
  18020. LIST *o;
  18021. PS *ps = (PS *)param;
  18022. UINT ret;
  18023. RPC_FARM t;
  18024. CT *ct;
  18025. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  18026. if (o == NULL)
  18027. {
  18028. return ERR_INVALID_PARAMETER;
  18029. }
  18030. Zero(&t, sizeof(t));
  18031. ret = ScGetFarmSetting(ps->Rpc, &t);
  18032. if (ret != ERR_NO_ERROR)
  18033. {
  18034. CmdPrintError(c, ret);
  18035. FreeParamValueList(o);
  18036. return ret;
  18037. }
  18038. if (t.Weight == 0)
  18039. {
  18040. t.Weight = FARM_DEFAULT_WEIGHT;
  18041. }
  18042. // Show the cluster configuration
  18043. ct = CtNewStandard();
  18044. CtInsert(ct, _UU("CMD_ClusterSettingGet_Current"),
  18045. GetServerTypeStr(t.ServerType));
  18046. if (t.ServerType == SERVER_TYPE_FARM_CONTROLLER)
  18047. {
  18048. CtInsert(ct, _UU("CMD_ClusterSettingGet_ControllerOnly"), t.ControllerOnly ? _UU("SEC_YES") : _UU("SEC_NO"));
  18049. }
  18050. if (t.ServerType != SERVER_TYPE_STANDALONE)
  18051. {
  18052. wchar_t tmp[MAX_SIZE];
  18053. UniToStru(tmp, t.Weight);
  18054. CtInsert(ct, _UU("CMD_ClusterSettingGet_Weight"), tmp);
  18055. }
  18056. if (t.ServerType == SERVER_TYPE_FARM_MEMBER)
  18057. {
  18058. wchar_t tmp[MAX_SIZE];
  18059. UINT i;
  18060. // Public IP address
  18061. if (t.PublicIp != 0)
  18062. {
  18063. IPToUniStr32(tmp, sizeof(tmp), t.PublicIp);
  18064. }
  18065. else
  18066. {
  18067. UniStrCpy(tmp, sizeof(tmp), _UU("CMD_ClusterSettingGet_None"));
  18068. }
  18069. CtInsert(ct, _UU("CMD_ClusterSettingGet_PublicIp"), tmp);
  18070. // Public port list
  18071. tmp[0] = 0;
  18072. for (i = 0;i < t.NumPort;i++)
  18073. {
  18074. wchar_t tmp2[64];
  18075. UniFormat(tmp2, sizeof(tmp2), L"%u, ", t.Ports[i]);
  18076. UniStrCat(tmp, sizeof(tmp), tmp2);
  18077. }
  18078. if (UniEndWith(tmp, L", "))
  18079. {
  18080. tmp[UniStrLen(tmp) - 2] = 0;
  18081. }
  18082. CtInsert(ct, _UU("CMD_ClusterSettingGet_PublicPorts"), tmp);
  18083. // Controller to connect
  18084. UniFormat(tmp, sizeof(tmp), L"%S:%u", t.ControllerName, t.ControllerPort);
  18085. CtInsert(ct, _UU("CMD_ClusterSettingGet_Controller"), tmp);
  18086. }
  18087. CtFree(ct, c);
  18088. FreeRpcFarm(&t);
  18089. FreeParamValueList(o);
  18090. return 0;
  18091. }
  18092. // Set the server password
  18093. UINT PsServerPasswordSet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18094. {
  18095. LIST *o;
  18096. PS *ps = (PS *)param;
  18097. UINT ret;
  18098. RPC_SET_PASSWORD t;
  18099. char *pw;
  18100. PARAM args[] =
  18101. {
  18102. {"[password]", CmdPromptChoosePassword, NULL, NULL, NULL},
  18103. };
  18104. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  18105. if (o == NULL)
  18106. {
  18107. return ERR_INVALID_PARAMETER;
  18108. }
  18109. pw = GetParamStr(o, "[password]");
  18110. Zero(&t, sizeof(t));
  18111. Hash(t.HashedPassword, pw, StrLen(pw), true);
  18112. ret = ScSetServerPassword(ps->Rpc, &t);
  18113. if (ret != ERR_NO_ERROR)
  18114. {
  18115. CmdPrintError(c, ret);
  18116. FreeParamValueList(o);
  18117. return ret;
  18118. }
  18119. FreeParamValueList(o);
  18120. return 0;
  18121. }
  18122. // Password decision prompt (for Prompt function)
  18123. wchar_t *CmdPromptChoosePassword(CONSOLE *c, void *param)
  18124. {
  18125. char *s;
  18126. // Validate arguments
  18127. if (c == NULL)
  18128. {
  18129. return NULL;
  18130. }
  18131. s = CmdPasswordPrompt(c);
  18132. if (s == NULL)
  18133. {
  18134. return NULL;
  18135. }
  18136. else
  18137. {
  18138. wchar_t *ret = CopyStrToUni(s);
  18139. Free(s);
  18140. return ret;
  18141. }
  18142. }
  18143. // Password input prompt (general-purpose)
  18144. char *CmdPasswordPrompt(CONSOLE *c)
  18145. {
  18146. char *pw1, *pw2;
  18147. // Validate arguments
  18148. if (c == NULL)
  18149. {
  18150. return NULL;
  18151. }
  18152. c->Write(c, _UU("CMD_VPNCMD_PWPROMPT_0"));
  18153. RETRY:
  18154. c->Write(c, L"");
  18155. pw1 = c->ReadPassword(c, _UU("CMD_VPNCMD_PWPROMPT_1"));
  18156. if (pw1 == NULL)
  18157. {
  18158. return NULL;
  18159. }
  18160. pw2 = c->ReadPassword(c, _UU("CMD_VPNCMD_PWPROMPT_2"));
  18161. if (pw2 == NULL)
  18162. {
  18163. Free(pw1);
  18164. return NULL;
  18165. }
  18166. c->Write(c, L"");
  18167. if (StrCmp(pw1, pw2) != 0)
  18168. {
  18169. Free(pw1);
  18170. Free(pw2);
  18171. c->Write(c, _UU("CMD_VPNCMD_PWPROMPT_3"));
  18172. goto RETRY;
  18173. }
  18174. Free(pw1);
  18175. return pw2;
  18176. }
  18177. // Disable the listener
  18178. UINT PsListenerDisable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18179. {
  18180. LIST *o;
  18181. PS *ps = (PS *)param;
  18182. UINT ret;
  18183. RPC_LISTENER t;
  18184. PARAM args[] =
  18185. {
  18186. {"[port]", CmdPromptPort, _UU("CMD_ListenerDisable_PortPrompt"), CmdEvalPort, NULL},
  18187. };
  18188. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  18189. if (o == NULL)
  18190. {
  18191. return ERR_INVALID_PARAMETER;
  18192. }
  18193. Zero(&t, sizeof(t));
  18194. t.Enable = false;
  18195. t.Port = ToInt(GetParamStr(o, "[port]"));
  18196. ret = ScEnableListener(ps->Rpc, &t);
  18197. if (ret != ERR_NO_ERROR)
  18198. {
  18199. CmdPrintError(c, ret);
  18200. FreeParamValueList(o);
  18201. return ret;
  18202. }
  18203. FreeParamValueList(o);
  18204. return 0;
  18205. }
  18206. // Enable the listener
  18207. UINT PsListenerEnable(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18208. {
  18209. LIST *o;
  18210. PS *ps = (PS *)param;
  18211. UINT ret;
  18212. RPC_LISTENER t;
  18213. PARAM args[] =
  18214. {
  18215. {"[port]", CmdPromptPort, _UU("CMD_ListenerEnable_PortPrompt"), CmdEvalPort, NULL},
  18216. };
  18217. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  18218. if (o == NULL)
  18219. {
  18220. return ERR_INVALID_PARAMETER;
  18221. }
  18222. Zero(&t, sizeof(t));
  18223. t.Enable = true;
  18224. t.Port = ToInt(GetParamStr(o, "[port]"));
  18225. ret = ScEnableListener(ps->Rpc, &t);
  18226. if (ret != ERR_NO_ERROR)
  18227. {
  18228. CmdPrintError(c, ret);
  18229. FreeParamValueList(o);
  18230. return ret;
  18231. }
  18232. FreeParamValueList(o);
  18233. return 0;
  18234. }
  18235. // Draw a row of console table
  18236. void CtPrintRow(CONSOLE *c, UINT num, UINT *widths, wchar_t **strings, bool *rights, char separate_char)
  18237. {
  18238. UINT i;
  18239. wchar_t *buf;
  18240. UINT buf_size;
  18241. bool is_sep_line = true;
  18242. // Validate arguments
  18243. if (c == NULL || num == 0 || widths == NULL || strings == NULL || rights == NULL)
  18244. {
  18245. return;
  18246. }
  18247. buf_size = 32;
  18248. for (i = 0;i < num;i++)
  18249. {
  18250. buf_size += sizeof(wchar_t) * widths[i] + 6;
  18251. }
  18252. buf = ZeroMalloc(buf_size);
  18253. for (i = 0;i < num;i++)
  18254. {
  18255. char *tmp;
  18256. wchar_t *space_string;
  18257. UINT w;
  18258. UINT space = 0;
  18259. wchar_t *string = strings[i];
  18260. wchar_t *tmp_line = NULL;
  18261. if (UniStrCmpi(string, L"---") == 0)
  18262. {
  18263. char *s = MakeCharArray('-', widths[i]);
  18264. tmp_line = string = CopyStrToUni(s);
  18265. Free(s);
  18266. }
  18267. else
  18268. {
  18269. is_sep_line = false;
  18270. }
  18271. w = UniStrWidth(string);
  18272. if (widths[i] >= w)
  18273. {
  18274. space = widths[i] - w;
  18275. }
  18276. tmp = MakeCharArray(' ', space);
  18277. space_string = CopyStrToUni(tmp);
  18278. if (rights[i] != false)
  18279. {
  18280. UniStrCat(buf, buf_size, space_string);
  18281. }
  18282. UniStrCat(buf, buf_size, string);
  18283. if (rights[i] == false)
  18284. {
  18285. UniStrCat(buf, buf_size, space_string);
  18286. }
  18287. Free(space_string);
  18288. Free(tmp);
  18289. if (i < (num - 1))
  18290. {
  18291. wchar_t tmp[4];
  18292. char str[2];
  18293. if (UniStrCmpi(strings[i], L"---") == 0)
  18294. {
  18295. str[0] = '+';
  18296. }
  18297. else
  18298. {
  18299. str[0] = separate_char;
  18300. }
  18301. str[1] = 0;
  18302. StrToUni(tmp, sizeof(tmp), str);
  18303. UniStrCat(buf, buf_size, tmp);
  18304. }
  18305. if (tmp_line != NULL)
  18306. {
  18307. Free(tmp_line);
  18308. }
  18309. }
  18310. UniTrimRight(buf);
  18311. if (is_sep_line)
  18312. {
  18313. if (UniStrLen(buf) > (c->GetWidth(c) - 1))
  18314. {
  18315. buf[c->GetWidth(c) - 1] = 0;
  18316. }
  18317. }
  18318. c->Write(c, buf);
  18319. Free(buf);
  18320. }
  18321. // Draw the console table in standard format
  18322. void CtPrintStandard(CT *ct, CONSOLE *c)
  18323. {
  18324. CT *t;
  18325. UINT i, j;
  18326. // Validate arguments
  18327. if (ct == NULL || c == NULL)
  18328. {
  18329. return;
  18330. }
  18331. t = CtNewStandard();
  18332. for (i = 0;i < LIST_NUM(ct->Rows);i++)
  18333. {
  18334. CTR *row = LIST_DATA(ct->Rows, i);
  18335. for (j = 0;j < LIST_NUM(ct->Columns);j++)
  18336. {
  18337. CTC *column = LIST_DATA(ct->Columns, j);
  18338. CtInsert(t, column->String, row->Strings[j]);
  18339. }
  18340. if (i != (LIST_NUM(ct->Rows) - 1))
  18341. {
  18342. CtInsert(t, L"---", L"---");
  18343. }
  18344. }
  18345. CtFree(t, c);
  18346. }
  18347. // Draw the console table
  18348. void CtPrint(CT *ct, CONSOLE *c)
  18349. {
  18350. UINT *widths;
  18351. UINT num;
  18352. UINT i, j;
  18353. wchar_t **header_strings;
  18354. bool *rights;
  18355. // Validate arguments
  18356. if (ct == NULL || c == NULL)
  18357. {
  18358. return;
  18359. }
  18360. num = LIST_NUM(ct->Columns);
  18361. widths = ZeroMalloc(sizeof(UINT) * num);
  18362. // Calculate the maximum character width of each column
  18363. for (i = 0;i < num;i++)
  18364. {
  18365. CTC *ctc = LIST_DATA(ct->Columns, i);
  18366. UINT w;
  18367. w = UniStrWidth(ctc->String);
  18368. widths[i] = MAX(widths[i], w);
  18369. }
  18370. for (j = 0;j < LIST_NUM(ct->Rows);j++)
  18371. {
  18372. CTR *ctr = LIST_DATA(ct->Rows, j);
  18373. for (i = 0;i < num;i++)
  18374. {
  18375. UINT w;
  18376. w = UniStrWidth(ctr->Strings[i]);
  18377. widths[i] = MAX(widths[i], w);
  18378. }
  18379. }
  18380. // Display the header part
  18381. header_strings = ZeroMalloc(sizeof(wchar_t *) * num);
  18382. rights = ZeroMalloc(sizeof(bool) * num);
  18383. for (i = 0;i < num;i++)
  18384. {
  18385. CTC *ctc = LIST_DATA(ct->Columns, i);
  18386. header_strings[i] = ctc->String;
  18387. rights[i] = ctc->Right;
  18388. }
  18389. CtPrintRow(c, num, widths, header_strings, rights, '|');
  18390. for (i = 0;i < num;i++)
  18391. {
  18392. char *s;
  18393. s = MakeCharArray('-', widths[i]);
  18394. header_strings[i] = CopyStrToUni(s);
  18395. Free(s);
  18396. }
  18397. CtPrintRow(c, num, widths, header_strings, rights, '+');
  18398. for (i = 0;i < num;i++)
  18399. {
  18400. Free(header_strings[i]);
  18401. }
  18402. // Display the data part
  18403. for (j = 0;j < LIST_NUM(ct->Rows);j++)
  18404. {
  18405. CTR *ctr = LIST_DATA(ct->Rows, j);
  18406. CtPrintRow(c, num, widths, ctr->Strings, rights, '|');
  18407. }
  18408. Free(rights);
  18409. Free(header_strings);
  18410. Free(widths);
  18411. }
  18412. // Escape the meta-characters in CSV
  18413. void CtEscapeCsv(wchar_t *dst, UINT size, wchar_t *src){
  18414. UINT i;
  18415. UINT len = UniStrLen(src);
  18416. UINT idx;
  18417. BOOL need_to_escape = false;
  18418. wchar_t tmp[2]=L"*";
  18419. // Check the input value
  18420. if (src==NULL || dst==NULL)
  18421. {
  18422. return;
  18423. }
  18424. // If there is no character that need to be escaped in the input characters, copy it to the output
  18425. len = UniStrLen(src);
  18426. for (i=0; i<len; i++)
  18427. {
  18428. tmp[0] = src[i];
  18429. if (tmp[0] == L","[0] || tmp[0] == L"\n"[0] || tmp[0] == L"\""[0])
  18430. {
  18431. need_to_escape = true;
  18432. }
  18433. }
  18434. if (need_to_escape == false)
  18435. {
  18436. UniStrCpy(dst,size,src);
  18437. return;
  18438. }
  18439. // If it contains meta characters (newline, comma, double quote), enclose with "
  18440. UniStrCpy(dst, size, L"\"");
  18441. idx = UniStrLen(dst);
  18442. if(idx<size-1)
  18443. {
  18444. for (i=0; i<len; i++)
  18445. {
  18446. tmp[0] = src[i];
  18447. // Convert " to "" in contents(MS-Excel method)
  18448. if (tmp[0] == L"\""[0])
  18449. {
  18450. UniStrCat(dst, size, tmp);
  18451. }
  18452. UniStrCat(dst, size, tmp);
  18453. }
  18454. }
  18455. UniStrCat(dst, size, L"\"");
  18456. return;
  18457. }
  18458. // Show a CSV format of console table
  18459. void CtPrintCsv(CT *ct, CONSOLE *c)
  18460. {
  18461. UINT i, j;
  18462. UINT num_columns = LIST_NUM(ct->Columns);
  18463. wchar_t buf[MAX_SIZE*4];
  18464. wchar_t fmtbuf[MAX_SIZE*4];
  18465. // Show the heading row
  18466. buf[0] = 0;
  18467. for(i=0; i<num_columns; i++)
  18468. {
  18469. CTC *ctc = LIST_DATA(ct->Columns, i);
  18470. CtEscapeCsv(fmtbuf, sizeof(fmtbuf), ctc->String);
  18471. UniStrCat(buf, sizeof(buf), fmtbuf);
  18472. if(i != num_columns-1)
  18473. UniStrCat(buf, sizeof(buf), L",");
  18474. }
  18475. c->Write(c, buf);
  18476. // Show the table body
  18477. for(j=0; j<LIST_NUM(ct->Rows); j++)
  18478. {
  18479. CTR *ctr = LIST_DATA(ct->Rows, j);
  18480. buf[0] = 0;
  18481. for(i=0; i<num_columns; i++)
  18482. {
  18483. CtEscapeCsv(fmtbuf, sizeof(fmtbuf), ctr->Strings[i]);
  18484. UniStrCat(buf, sizeof(buf), fmtbuf);
  18485. if(i != num_columns-1)
  18486. UniStrCat(buf, sizeof(buf), L",");
  18487. }
  18488. c->Write(c, buf);
  18489. }
  18490. }
  18491. // Delete the console table
  18492. void CtFreeEx(CT *ct, CONSOLE *c, bool standard_view)
  18493. {
  18494. UINT i, num;
  18495. // Validate arguments
  18496. if (ct == NULL)
  18497. {
  18498. return;
  18499. }
  18500. if (c != NULL)
  18501. {
  18502. if (c->ConsoleType == CONSOLE_CSV)
  18503. {
  18504. CtPrintCsv(ct, c);
  18505. }
  18506. else
  18507. {
  18508. if (standard_view == false)
  18509. {
  18510. CtPrint(ct, c);
  18511. }
  18512. else
  18513. {
  18514. CtPrintStandard(ct, c);
  18515. }
  18516. }
  18517. }
  18518. num = LIST_NUM(ct->Columns);
  18519. for (i = 0;i < LIST_NUM(ct->Rows);i++)
  18520. {
  18521. UINT j;
  18522. CTR *ctr = LIST_DATA(ct->Rows, i);
  18523. for (j = 0;j < num;j++)
  18524. {
  18525. Free(ctr->Strings[j]);
  18526. }
  18527. Free(ctr->Strings);
  18528. Free(ctr);
  18529. }
  18530. for (i = 0;i < LIST_NUM(ct->Columns);i++)
  18531. {
  18532. CTC *ctc = LIST_DATA(ct->Columns, i);
  18533. Free(ctc->String);
  18534. Free(ctc);
  18535. }
  18536. ReleaseList(ct->Columns);
  18537. ReleaseList(ct->Rows);
  18538. Free(ct);
  18539. }
  18540. void CtFree(CT *ct, CONSOLE *c)
  18541. {
  18542. CtFreeEx(ct, c, false);
  18543. }
  18544. // Add a row to the table
  18545. void CtInsert(CT *ct, ...)
  18546. {
  18547. CTR *ctr;
  18548. UINT num, i;
  18549. va_list va;
  18550. // Validate arguments
  18551. if (ct == NULL)
  18552. {
  18553. return;
  18554. }
  18555. num = LIST_NUM(ct->Columns);
  18556. va_start(va, ct);
  18557. ctr = ZeroMalloc(sizeof(CTR));
  18558. ctr->Strings = ZeroMalloc(sizeof(wchar_t *) * num);
  18559. for (i = 0;i < num;i++)
  18560. {
  18561. wchar_t *s = va_arg(va, wchar_t *);
  18562. ctr->Strings[i] = CopyUniStr(s);
  18563. }
  18564. va_end(va);
  18565. Insert(ct->Rows, ctr);
  18566. }
  18567. // Add a column to the table
  18568. void CtInsertColumn(CT *ct, wchar_t *str, bool right)
  18569. {
  18570. CTC *ctc;
  18571. // Validate arguments
  18572. if (ct == NULL)
  18573. {
  18574. return;
  18575. }
  18576. if (str == NULL)
  18577. {
  18578. str = L"";
  18579. }
  18580. ctc = ZeroMalloc(sizeof(CTC));
  18581. ctc->String = CopyUniStr(str);
  18582. ctc->Right = right;
  18583. Insert(ct->Columns, ctc);
  18584. }
  18585. // Create a new console table
  18586. CT *CtNew()
  18587. {
  18588. CT *ct;
  18589. ct = ZeroMalloc(sizeof(CT));
  18590. ct->Columns = NewList(NULL);
  18591. ct->Rows = NewList(NULL);
  18592. return ct;
  18593. }
  18594. // Add a standard column to a column in a table
  18595. CT *CtNewStandard()
  18596. {
  18597. CT *ct = CtNew();
  18598. CtInsertColumn(ct, _UU("CMD_CT_STD_COLUMN_1"), false);
  18599. CtInsertColumn(ct, _UU("CMD_CT_STD_COLUMN_2"), false);
  18600. return ct;
  18601. }
  18602. CT *CtNewStandardEx()
  18603. {
  18604. CT *ct = CtNew();
  18605. CtInsertColumn(ct, _UU("CMD_CT_STD_COLUMN_1"), false);
  18606. CtInsertColumn(ct, _UU("CMD_CT_STD_COLUMN_2"), false);
  18607. CtInsertColumn(ct, _UU("CMD_CT_STD_COLUMN_3"), false);
  18608. return ct;
  18609. }
  18610. // Get the TCP listener list
  18611. UINT PsListenerList(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18612. {
  18613. LIST *o;
  18614. PS *ps = (PS *)param;
  18615. UINT ret;
  18616. RPC_LISTENER_LIST t;
  18617. UINT i;
  18618. CT *ct;
  18619. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  18620. if (o == NULL)
  18621. {
  18622. return ERR_INVALID_PARAMETER;
  18623. }
  18624. Zero(&t, sizeof(t));
  18625. ret = ScEnumListener(ps->Rpc, &t);
  18626. if (ret != ERR_NO_ERROR)
  18627. {
  18628. CmdPrintError(c, ret);
  18629. FreeParamValueList(o);
  18630. return ret;
  18631. }
  18632. ct = CtNew();
  18633. CtInsertColumn(ct, _UU("CM_LISTENER_COLUMN_1"), false);
  18634. CtInsertColumn(ct, _UU("CM_LISTENER_COLUMN_2"), false);
  18635. for (i = 0;i < t.NumPort;i++)
  18636. {
  18637. wchar_t *status = _UU("CM_LISTENER_OFFLINE");
  18638. wchar_t tmp[128];
  18639. if (t.Errors[i])
  18640. {
  18641. status = _UU("CM_LISTENER_ERROR");
  18642. }
  18643. else if (t.Enables[i])
  18644. {
  18645. status = _UU("CM_LISTENER_ONLINE");
  18646. }
  18647. UniFormat(tmp, sizeof(tmp), _UU("CM_LISTENER_TCP_PORT"), t.Ports[i]);
  18648. CtInsert(ct, tmp, status);
  18649. }
  18650. CtFree(ct, c);
  18651. FreeRpcListenerList(&t);
  18652. FreeParamValueList(o);
  18653. return 0;
  18654. }
  18655. // Delete the TCP listener
  18656. UINT PsListenerDelete(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18657. {
  18658. LIST *o;
  18659. PS *ps = (PS *)param;
  18660. UINT ret;
  18661. RPC_LISTENER t;
  18662. PARAM args[] =
  18663. {
  18664. {"[port]", CmdPromptPort, _UU("CMD_ListenerDelete_PortPrompt"), CmdEvalPort, NULL},
  18665. };
  18666. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  18667. if (o == NULL)
  18668. {
  18669. return ERR_INVALID_PARAMETER;
  18670. }
  18671. Zero(&t, sizeof(t));
  18672. t.Enable = true;
  18673. t.Port = ToInt(GetParamStr(o, "[port]"));
  18674. ret = ScDeleteListener(ps->Rpc, &t);
  18675. if (ret != ERR_NO_ERROR)
  18676. {
  18677. CmdPrintError(c, ret);
  18678. FreeParamValueList(o);
  18679. return ret;
  18680. }
  18681. FreeParamValueList(o);
  18682. return 0;
  18683. }
  18684. // Draw a row
  18685. void CmdPrintRow(CONSOLE *c, wchar_t *title, wchar_t *tag, ...)
  18686. {
  18687. wchar_t buf[MAX_SIZE * 2];
  18688. wchar_t buf2[MAX_SIZE * 2];
  18689. va_list args;
  18690. // Validate arguments
  18691. if (title == NULL || c == NULL || tag == NULL)
  18692. {
  18693. return;
  18694. }
  18695. va_start(args, tag);
  18696. UniFormatArgs(buf, sizeof(buf), tag, args);
  18697. UniFormat(buf2, sizeof(buf2), L"[%s] %s", title, buf);
  18698. va_end(args);
  18699. c->Write(c, buf2);
  18700. }
  18701. // ServerInfoGet command
  18702. UINT PsServerInfoGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18703. {
  18704. LIST *o;
  18705. PS *ps = (PS *)param;
  18706. UINT ret;
  18707. RPC_SERVER_INFO t;
  18708. CT *ct;
  18709. wchar_t tmp[MAX_SIZE];
  18710. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  18711. if (o == NULL)
  18712. {
  18713. return ERR_INVALID_PARAMETER;
  18714. }
  18715. Zero(&t, sizeof(t));
  18716. ret = ScGetServerInfo(ps->Rpc, &t);
  18717. if (ret != ERR_NO_ERROR)
  18718. {
  18719. CmdPrintError(c, ret);
  18720. FreeParamValueList(o);
  18721. return ret;
  18722. }
  18723. ct = CtNew();
  18724. CtInsertColumn(ct, _UU("SM_STATUS_COLUMN_1"), false);
  18725. CtInsertColumn(ct, _UU("SM_STATUS_COLUMN_2"), false);
  18726. // Product name
  18727. StrToUni(tmp, sizeof(tmp), t.ServerProductName);
  18728. CtInsert(ct, _UU("SM_INFO_PRODUCT_NAME"), tmp);
  18729. // Version
  18730. StrToUni(tmp, sizeof(tmp), t.ServerVersionString);
  18731. CtInsert(ct, _UU("SM_INFO_VERSION"), tmp);
  18732. // Build
  18733. StrToUni(tmp, sizeof(tmp), t.ServerBuildInfoString);
  18734. CtInsert(ct, _UU("SM_INFO_BUILD"), tmp);
  18735. // Host name
  18736. StrToUni(tmp, sizeof(tmp), t.ServerHostName);
  18737. CtInsert(ct, _UU("SM_INFO_HOSTNAME"), tmp);
  18738. // Type
  18739. CtInsert(ct, _UU("SM_ST_SERVER_TYPE"), GetServerTypeStr(t.ServerType));
  18740. // OS
  18741. StrToUni(tmp, sizeof(tmp), t.OsInfo.OsSystemName);
  18742. CtInsert(ct, _UU("SM_OS_SYSTEM_NAME"), tmp);
  18743. StrToUni(tmp, sizeof(tmp), t.OsInfo.OsProductName);
  18744. CtInsert(ct, _UU("SM_OS_PRODUCT_NAME"), tmp);
  18745. if (t.OsInfo.OsServicePack != 0)
  18746. {
  18747. UniFormat(tmp, sizeof(tmp), _UU("SM_OS_SP_TAG"), t.OsInfo.OsServicePack);
  18748. CtInsert(ct, _UU("SM_OS_SERVICE_PACK"), tmp);
  18749. }
  18750. StrToUni(tmp, sizeof(tmp), t.OsInfo.OsVendorName);
  18751. CtInsert(ct, _UU("SM_OS_VENDER_NAME"), tmp);
  18752. StrToUni(tmp, sizeof(tmp), t.OsInfo.OsVersion);
  18753. CtInsert(ct, _UU("SM_OS_VERSION"), tmp);
  18754. StrToUni(tmp, sizeof(tmp), t.OsInfo.KernelName);
  18755. CtInsert(ct, _UU("SM_OS_KERNEL_NAME"), tmp);
  18756. StrToUni(tmp, sizeof(tmp), t.OsInfo.KernelVersion);
  18757. CtInsert(ct, _UU("SM_OS_KERNEL_VERSION"), tmp);
  18758. CtFree(ct, c);
  18759. FreeRpcServerInfo(&t);
  18760. FreeParamValueList(o);
  18761. return 0;
  18762. }
  18763. // Get the string for type of the HUB
  18764. wchar_t *GetHubTypeStr(UINT type)
  18765. {
  18766. if (type == HUB_TYPE_FARM_STATIC)
  18767. {
  18768. return _UU("SM_HUB_STATIC");
  18769. }
  18770. else if (type == HUB_TYPE_FARM_DYNAMIC)
  18771. {
  18772. return _UU("SM_HUB_DYNAMIC");
  18773. }
  18774. return _UU("SM_HUB_STANDALONE");
  18775. }
  18776. // Get a string of the type of server
  18777. wchar_t *GetServerTypeStr(UINT type)
  18778. {
  18779. if (type == SERVER_TYPE_FARM_CONTROLLER)
  18780. {
  18781. return _UU("SM_FARM_CONTROLLER");
  18782. }
  18783. else if (type == SERVER_TYPE_FARM_MEMBER)
  18784. {
  18785. return _UU("SM_FARM_MEMBER");
  18786. }
  18787. return _UU("SM_SERVER_STANDALONE");
  18788. }
  18789. // ServerStatusGet command
  18790. UINT PsServerStatusGet(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18791. {
  18792. LIST *o;
  18793. PS *ps = (PS *)param;
  18794. UINT ret;
  18795. RPC_SERVER_STATUS t;
  18796. wchar_t tmp[MAX_PATH];
  18797. char tmp2[MAX_PATH];
  18798. CT *ct;
  18799. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  18800. if (o == NULL)
  18801. {
  18802. return ERR_INVALID_PARAMETER;
  18803. }
  18804. Zero(&t, sizeof(t));
  18805. ret = ScGetServerStatus(ps->Rpc, &t);
  18806. if (ret != ERR_NO_ERROR)
  18807. {
  18808. CmdPrintError(c, ret);
  18809. FreeParamValueList(o);
  18810. return ret;
  18811. }
  18812. ct = CtNew();
  18813. CtInsertColumn(ct, _UU("SM_STATUS_COLUMN_1"), false);
  18814. CtInsertColumn(ct, _UU("SM_STATUS_COLUMN_2"), false);
  18815. // Type of server
  18816. CtInsert(ct, _UU("SM_ST_SERVER_TYPE"),
  18817. t.ServerType == SERVER_TYPE_STANDALONE ? _UU("SM_SERVER_STANDALONE") :
  18818. t.ServerType == SERVER_TYPE_FARM_MEMBER ? _UU("SM_FARM_MEMBER") : _UU("SM_FARM_CONTROLLER"));
  18819. // Number of TCP connections
  18820. UniToStru(tmp, t.NumTcpConnections);
  18821. CtInsert(ct, _UU("SM_ST_NUM_TCP"), tmp);
  18822. if (t.ServerType == SERVER_TYPE_FARM_CONTROLLER)
  18823. {
  18824. // Number of local TCP connections
  18825. UniToStru(tmp, t.NumTcpConnectionsLocal);
  18826. CtInsert(ct, _UU("SM_ST_NUM_TCP_LOCAL"), tmp);
  18827. // Number of remote TCP connections
  18828. UniToStru(tmp, t.NumTcpConnectionsRemote);
  18829. CtInsert(ct, _UU("SM_ST_NUM_TCP_REMOTE"), tmp);
  18830. }
  18831. // Number of Virtual HUBs
  18832. UniToStru(tmp, t.NumHubTotal);
  18833. CtInsert(ct, _UU("SM_ST_NUM_HUB_TOTAL"), tmp);
  18834. if (t.ServerType != SERVER_TYPE_STANDALONE)
  18835. {
  18836. // Number of static HUBs
  18837. UniToStru(tmp, t.NumHubStatic);
  18838. CtInsert(ct, _UU("SM_ST_NUM_HUB_STATIC"), tmp);
  18839. // Number of dynamic HUBs
  18840. UniToStru(tmp, t.NumHubDynamic);
  18841. CtInsert(ct, _UU("SM_ST_NUM_HUB_DYNAMIC"), tmp);
  18842. }
  18843. // Number of sessions
  18844. UniToStru(tmp, t.NumSessionsTotal);
  18845. CtInsert(ct, _UU("SM_ST_NUM_SESSION_TOTAL"), tmp);
  18846. if (t.ServerType == SERVER_TYPE_FARM_CONTROLLER)
  18847. {
  18848. // Number of local sessions
  18849. UniToStru(tmp, t.NumSessionsLocal);
  18850. CtInsert(ct, _UU("SM_ST_NUM_SESSION_LOCAL"), tmp);
  18851. // Number of remote sessions
  18852. UniToStru(tmp, t.NumSessionsRemote);
  18853. CtInsert(ct, _UU("SM_ST_NUM_SESSION_REMOTE"), tmp);
  18854. }
  18855. // Number of MAC tables
  18856. UniToStru(tmp, t.NumMacTables);
  18857. CtInsert(ct, _UU("SM_ST_NUM_MAC_TABLE"), tmp);
  18858. // Number of IP tables
  18859. UniToStru(tmp, t.NumIpTables);
  18860. CtInsert(ct, _UU("SM_ST_NUM_IP_TABLE"), tmp);
  18861. // Number of users
  18862. UniToStru(tmp, t.NumUsers);
  18863. CtInsert(ct, _UU("SM_ST_NUM_USERS"), tmp);
  18864. // Number of groups
  18865. UniToStru(tmp, t.NumGroups);
  18866. CtInsert(ct, _UU("SM_ST_NUM_GROUPS"), tmp);
  18867. // Number of assigned licenses
  18868. UniToStru(tmp, t.AssignedClientLicenses);
  18869. CtInsert(ct, _UU("SM_ST_CLIENT_LICENSE"), tmp);
  18870. UniToStru(tmp, t.AssignedBridgeLicenses);
  18871. CtInsert(ct, _UU("SM_ST_BRIDGE_LICENSE"), tmp);
  18872. if (t.ServerType == SERVER_TYPE_FARM_CONTROLLER)
  18873. {
  18874. UniToStru(tmp, t.AssignedClientLicensesTotal);
  18875. CtInsert(ct, _UU("SM_ST_CLIENT_LICENSE_EX"), tmp);
  18876. UniToStru(tmp, t.AssignedBridgeLicensesTotal);
  18877. CtInsert(ct, _UU("SM_ST_BRIDGE_LICENSE_EX"), tmp);
  18878. }
  18879. // Traffic
  18880. CmdInsertTrafficInfo(ct, &t.Traffic);
  18881. // Server start-up time
  18882. GetDateTimeStrEx64(tmp, sizeof(tmp), SystemToLocal64(t.StartTime), NULL);
  18883. CtInsert(ct, _UU("SM_ST_START_TIME"), tmp);
  18884. // Current time
  18885. GetDateTimeStrMilli64(tmp2, sizeof(tmp2), SystemToLocal64(t.CurrentTime));
  18886. StrToUni(tmp, sizeof(tmp), tmp2);
  18887. CtInsert(ct, _UU("SM_ST_CURRENT_TIME"), tmp);
  18888. // Tick value
  18889. UniFormat(tmp, sizeof(tmp), L"%I64u", t.CurrentTick);
  18890. CtInsert(ct, _UU("SM_ST_CURRENT_TICK"), tmp);
  18891. // Memory information
  18892. if (t.MemInfo.TotalMemory != 0)
  18893. {
  18894. char vv[128];
  18895. ToStr3(vv, sizeof(vv), t.MemInfo.TotalMemory);
  18896. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_RAM_SIZE_KB"), vv);
  18897. CtInsert(ct, _UU("SM_ST_TOTAL_MEMORY"), tmp);
  18898. ToStr3(vv, sizeof(vv), t.MemInfo.UsedMemory);
  18899. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_RAM_SIZE_KB"), vv);
  18900. CtInsert(ct, _UU("SM_ST_USED_MEMORY"), tmp);
  18901. ToStr3(vv, sizeof(vv), t.MemInfo.FreeMemory);
  18902. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_RAM_SIZE_KB"), vv);
  18903. CtInsert(ct, _UU("SM_ST_FREE_MEMORY"), tmp);
  18904. ToStr3(vv, sizeof(vv), t.MemInfo.TotalPhys);
  18905. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_RAM_SIZE_KB"), vv);
  18906. CtInsert(ct, _UU("SM_ST_TOTAL_PHYS"), tmp);
  18907. ToStr3(vv, sizeof(vv), t.MemInfo.UsedPhys);
  18908. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_RAM_SIZE_KB"), vv);
  18909. CtInsert(ct, _UU("SM_ST_USED_PHYS"), tmp);
  18910. ToStr3(vv, sizeof(vv), t.MemInfo.FreePhys);
  18911. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_RAM_SIZE_KB"), vv);
  18912. CtInsert(ct, _UU("SM_ST_FREE_PHYS"), tmp);
  18913. }
  18914. CtFree(ct, c);
  18915. FreeParamValueList(o);
  18916. return 0;
  18917. }
  18918. // Add traffic information to LVB
  18919. void CmdInsertTrafficInfo(CT *ct, TRAFFIC *t)
  18920. {
  18921. wchar_t tmp[MAX_SIZE];
  18922. char vv[128];
  18923. // Validate arguments
  18924. if (ct == NULL || t == NULL)
  18925. {
  18926. return;
  18927. }
  18928. // Transmission information
  18929. ToStr3(vv, sizeof(vv), t->Send.UnicastCount);
  18930. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_NUM_PACKET_STR"), vv);
  18931. CtInsert(ct, _UU("SM_ST_SEND_UCAST_NUM"), tmp);
  18932. ToStr3(vv, sizeof(vv), t->Send.UnicastBytes);
  18933. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_SIZE_BYTE_STR"), vv);
  18934. CtInsert(ct, _UU("SM_ST_SEND_UCAST_SIZE"), tmp);
  18935. ToStr3(vv, sizeof(vv), t->Send.BroadcastCount);
  18936. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_NUM_PACKET_STR"), vv);
  18937. CtInsert(ct, _UU("SM_ST_SEND_BCAST_NUM"), tmp);
  18938. ToStr3(vv, sizeof(vv), t->Send.BroadcastBytes);
  18939. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_SIZE_BYTE_STR"), vv);
  18940. CtInsert(ct, _UU("SM_ST_SEND_BCAST_SIZE"), tmp);
  18941. // Reception information
  18942. ToStr3(vv, sizeof(vv), t->Recv.UnicastCount);
  18943. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_NUM_PACKET_STR"), vv);
  18944. CtInsert(ct, _UU("SM_ST_RECV_UCAST_NUM"), tmp);
  18945. ToStr3(vv, sizeof(vv), t->Recv.UnicastBytes);
  18946. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_SIZE_BYTE_STR"), vv);
  18947. CtInsert(ct, _UU("SM_ST_RECV_UCAST_SIZE"), tmp);
  18948. ToStr3(vv, sizeof(vv), t->Recv.BroadcastCount);
  18949. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_NUM_PACKET_STR"), vv);
  18950. CtInsert(ct, _UU("SM_ST_RECV_BCAST_NUM"), tmp);
  18951. ToStr3(vv, sizeof(vv), t->Recv.BroadcastBytes);
  18952. UniFormat(tmp, sizeof(tmp), _UU("SM_ST_SIZE_BYTE_STR"), vv);
  18953. CtInsert(ct, _UU("SM_ST_RECV_BCAST_SIZE"), tmp);
  18954. }
  18955. // Input a port number
  18956. wchar_t *CmdPromptPort(CONSOLE *c, void *param)
  18957. {
  18958. wchar_t *prompt_str;
  18959. if (param != NULL)
  18960. {
  18961. prompt_str = (wchar_t *)param;
  18962. }
  18963. else
  18964. {
  18965. prompt_str = _UU("CMD_PROPMT_PORT");
  18966. }
  18967. return c->ReadLine(c, prompt_str, true);
  18968. }
  18969. // Verify the port number
  18970. bool CmdEvalPort(CONSOLE *c, wchar_t *str, void *param)
  18971. {
  18972. UINT i;
  18973. // Validate arguments
  18974. if (c == NULL || str == NULL)
  18975. {
  18976. return false;
  18977. }
  18978. i = UniToInt(str);
  18979. if (i >= 1 && i <= 65535)
  18980. {
  18981. return true;
  18982. }
  18983. c->Write(c, _UU("CMD_EVAL_PORT"));
  18984. return false;
  18985. }
  18986. // ListenerCreate command
  18987. UINT PsListenerCreate(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  18988. {
  18989. LIST *o;
  18990. PS *ps = (PS *)param;
  18991. UINT ret;
  18992. RPC_LISTENER t;
  18993. PARAM args[] =
  18994. {
  18995. {"[port]", CmdPromptPort, _UU("CMD_ListenerCreate_PortPrompt"), CmdEvalPort, NULL},
  18996. };
  18997. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  18998. if (o == NULL)
  18999. {
  19000. return ERR_INVALID_PARAMETER;
  19001. }
  19002. Zero(&t, sizeof(t));
  19003. t.Enable = true;
  19004. t.Port = ToInt(GetParamStr(o, "[port]"));
  19005. ret = ScCreateListener(ps->Rpc, &t);
  19006. if (ret != ERR_NO_ERROR)
  19007. {
  19008. CmdPrintError(c, ret);
  19009. FreeParamValueList(o);
  19010. return ret;
  19011. }
  19012. FreeParamValueList(o);
  19013. return 0;
  19014. }
  19015. // About command
  19016. UINT PsAbout(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  19017. {
  19018. LIST *o;
  19019. BUF *b;
  19020. o = ParseCommandList(c, cmd_name, str, NULL, 0);
  19021. if (o == NULL)
  19022. {
  19023. return ERR_INVALID_PARAMETER;
  19024. }
  19025. b = ReadDump("|legal.txt");
  19026. CmdPrintAbout(c);
  19027. c->Write(c, L"\r\n");
  19028. if (b != NULL)
  19029. {
  19030. wchar_t *s;
  19031. SeekBufToEnd(b);
  19032. WriteBufChar(b, 13);
  19033. WriteBufChar(b, 10);
  19034. WriteBufChar(b, 0);
  19035. s = CopyUtfToUni(b->Buf);
  19036. c->Write(c, s);
  19037. Free(s);
  19038. }
  19039. // Display the version information
  19040. c->Write(c, _UU("D_ABOUT@S_INFO3"));
  19041. c->Write(c, L"\r\n");
  19042. c->Write(c, _UU("D_ABOUT@S_INFO4"));
  19043. c->Write(c, L"\r\n");
  19044. CmdPrintAbout(c);
  19045. c->Write(c, L"\r\n");
  19046. FreeParamValueList(o);
  19047. FreeBuf(b);
  19048. return 0;
  19049. }
  19050. // Creat a new server management context
  19051. PS *NewPs(CONSOLE *c, RPC *rpc, char *servername, UINT serverport, char *hubname, char *adminhub, wchar_t *cmdline)
  19052. {
  19053. PS *ps;
  19054. // Validate arguments
  19055. if (c == NULL || rpc == NULL || servername == NULL)
  19056. {
  19057. return NULL;
  19058. }
  19059. if (IsEmptyStr(hubname))
  19060. {
  19061. hubname = NULL;
  19062. }
  19063. if (IsEmptyStr(adminhub))
  19064. {
  19065. adminhub = NULL;
  19066. }
  19067. if (UniIsEmptyStr(cmdline))
  19068. {
  19069. cmdline = NULL;
  19070. }
  19071. ps = ZeroMalloc(sizeof(PS));
  19072. ps->ConsoleForServer = true;
  19073. ps->ServerPort = serverport;
  19074. ps->ServerName = CopyStr(servername);
  19075. ps->Console = c;
  19076. ps->Rpc = rpc;
  19077. ps->HubName = CopyStr(hubname);
  19078. ps->LastError = 0;
  19079. ps->AdminHub = CopyStr(adminhub);
  19080. ps->CmdLine = CopyUniStr(cmdline);
  19081. return ps;
  19082. }
  19083. // Release the server management context
  19084. void FreePs(PS *ps)
  19085. {
  19086. // Validate arguments
  19087. if (ps == NULL)
  19088. {
  19089. return;
  19090. }
  19091. Free(ps->HubName);
  19092. Free(ps->AdminHub);
  19093. Free(ps->CmdLine);
  19094. Free(ps->ServerName);
  19095. Free(ps);
  19096. }
  19097. // Server Administration Tool
  19098. UINT PsConnect(CONSOLE *c, char *host, UINT port, char *hub, char *adminhub, wchar_t *cmdline, char *password)
  19099. {
  19100. UINT retcode = 0;
  19101. RPC *rpc = NULL;
  19102. CEDAR *cedar;
  19103. CLIENT_OPTION o;
  19104. UCHAR hashed_password[SHA1_SIZE];
  19105. bool b = false;
  19106. // Validate arguments
  19107. if (c == NULL || host == NULL)
  19108. {
  19109. return ERR_INVALID_PARAMETER;
  19110. }
  19111. if (port == 0)
  19112. {
  19113. port = 443;
  19114. }
  19115. if (hub != NULL)
  19116. {
  19117. adminhub = NULL;
  19118. }
  19119. cedar = NewCedar(NULL, NULL);
  19120. Zero(&o, sizeof(o));
  19121. UniStrCpy(o.AccountName, sizeof(o.AccountName), L"VPNCMD");
  19122. StrCpy(o.Hostname, sizeof(o.Hostname), host);
  19123. o.Port = port;
  19124. o.ProxyType = PROXY_DIRECT;
  19125. Hash(hashed_password, password, StrLen(password), true);
  19126. if (IsEmptyStr(password) == false)
  19127. {
  19128. b = true;
  19129. }
  19130. // Connect
  19131. while (true)
  19132. {
  19133. UINT err;
  19134. rpc = AdminConnectEx(cedar, &o, hub, hashed_password, &err, CEDAR_CUI_STR);
  19135. if (rpc == NULL)
  19136. {
  19137. // Failure
  19138. retcode = err;
  19139. if (err == ERR_ACCESS_DENIED && c->ProgrammingMode == false)
  19140. {
  19141. char *pass;
  19142. // Password is incorrect
  19143. if (b)
  19144. {
  19145. // Input the password
  19146. c->Write(c, _UU("CMD_VPNCMD_PASSWORD_1"));
  19147. }
  19148. b = true;
  19149. pass = c->ReadPassword(c, _UU("CMD_VPNCMD_PASSWORD_2"));
  19150. c->Write(c, L"");
  19151. if (pass != NULL)
  19152. {
  19153. Hash(hashed_password, pass, StrLen(pass), true);
  19154. Free(pass);
  19155. }
  19156. else
  19157. {
  19158. break;
  19159. }
  19160. }
  19161. else
  19162. {
  19163. // Other errors
  19164. CmdPrintError(c, err);
  19165. break;
  19166. }
  19167. }
  19168. else
  19169. {
  19170. PS *ps;
  19171. // Success
  19172. ps = NewPs(c, rpc, host, port, hub, adminhub, cmdline);
  19173. PsMain(ps);
  19174. retcode = ps->LastError;
  19175. FreePs(ps);
  19176. AdminDisconnect(rpc);
  19177. break;
  19178. }
  19179. }
  19180. ReleaseCedar(cedar);
  19181. return retcode;
  19182. }
  19183. // Display the error
  19184. void CmdPrintError(CONSOLE *c, UINT err)
  19185. {
  19186. wchar_t tmp[MAX_SIZE];
  19187. // Validate arguments
  19188. if (c == NULL)
  19189. {
  19190. return;
  19191. }
  19192. UniFormat(tmp, sizeof(tmp), _UU("CMD_VPNCMD_ERROR"),
  19193. err, GetUniErrorStr(err));
  19194. c->Write(c, tmp);
  19195. if (err == ERR_DISCONNECTED)
  19196. {
  19197. c->Write(c, _UU("CMD_DISCONNECTED_MSG"));
  19198. }
  19199. }
  19200. // Display the version information
  19201. void CmdPrintAbout(CONSOLE *c)
  19202. {
  19203. CEDAR *cedar;
  19204. wchar_t tmp[MAX_SIZE];
  19205. char exe[MAX_PATH];
  19206. // Validate arguments
  19207. if (c == NULL)
  19208. {
  19209. return;
  19210. }
  19211. cedar = NewCedar(NULL, NULL);
  19212. GetExeName(exe, sizeof(exe));
  19213. UniFormat(tmp, sizeof(tmp), _UU("CMD_VPNCMD_ABOUT"),
  19214. cedar->VerString, cedar->BuildInfo);
  19215. c->Write(c, tmp);
  19216. ReleaseCedar(cedar);
  19217. }
  19218. // Parse the host name and port number (Separated by @)
  19219. bool ParseHostPortAtmark(char *src, char **host, UINT *port, UINT default_port)
  19220. {
  19221. TOKEN_LIST *t;
  19222. bool ret = false;
  19223. // Validate arguments
  19224. if (src == NULL)
  19225. {
  19226. return false;
  19227. }
  19228. t = ParseToken(src, "@");
  19229. if (t == NULL)
  19230. {
  19231. return false;
  19232. }
  19233. if (port != NULL)
  19234. {
  19235. *port = 0;
  19236. }
  19237. if (default_port == 0)
  19238. {
  19239. if (t->NumTokens < 2)
  19240. {
  19241. FreeToken(t);
  19242. return false;
  19243. }
  19244. if (ToInt(t->Token[1]) == 0)
  19245. {
  19246. FreeToken(t);
  19247. return false;
  19248. }
  19249. }
  19250. if (t->NumTokens >= 2 && ToInt(t->Token[1]) == 0)
  19251. {
  19252. FreeToken(t);
  19253. return false;
  19254. }
  19255. if (t->NumTokens >= 1 && IsEmptyStr(t->Token[0]) == false)
  19256. {
  19257. ret = true;
  19258. if (host != NULL)
  19259. {
  19260. *host = CopyStr(t->Token[0]);
  19261. Trim(*host);
  19262. }
  19263. if (t->NumTokens >= 2)
  19264. {
  19265. if (port != NULL)
  19266. {
  19267. *port = ToInt(t->Token[1]);
  19268. }
  19269. }
  19270. }
  19271. if (port != NULL)
  19272. {
  19273. if (*port == 0)
  19274. {
  19275. *port = default_port;
  19276. }
  19277. }
  19278. FreeToken(t);
  19279. return ret;
  19280. }
  19281. // Parse the host name and port number
  19282. bool ParseHostPort(char *src, char **host, UINT *port, UINT default_port)
  19283. {
  19284. TOKEN_LIST *t;
  19285. bool ret = false;
  19286. // Validate arguments
  19287. if (src == NULL)
  19288. {
  19289. return false;
  19290. }
  19291. if (StartWith(src, "["))
  19292. {
  19293. if (InStr(src, "]"))
  19294. {
  19295. // Format of [target]:port
  19296. UINT i, n;
  19297. char tmp[MAX_SIZE];
  19298. StrCpy(tmp, sizeof(tmp), src);
  19299. n = SearchStrEx(tmp, "]", 0, false);
  19300. if (n != INFINITE)
  19301. {
  19302. UINT len = StrLen(tmp);
  19303. for (i = n;i < len;i++)
  19304. {
  19305. if (tmp[i] == ':')
  19306. {
  19307. tmp[i] = '@';
  19308. }
  19309. }
  19310. }
  19311. return ParseHostPortAtmark(tmp, host, port, default_port);
  19312. }
  19313. }
  19314. if (InStr(src, "@"))
  19315. {
  19316. // It is separated by @
  19317. return ParseHostPortAtmark(src, host, port, default_port);
  19318. }
  19319. t = ParseToken(src, ":");
  19320. if (t == NULL)
  19321. {
  19322. return false;
  19323. }
  19324. if (port != NULL)
  19325. {
  19326. *port = 0;
  19327. }
  19328. if (default_port == 0)
  19329. {
  19330. if (t->NumTokens < 2)
  19331. {
  19332. FreeToken(t);
  19333. return false;
  19334. }
  19335. if (ToInt(t->Token[1]) == 0)
  19336. {
  19337. FreeToken(t);
  19338. return false;
  19339. }
  19340. }
  19341. if (t->NumTokens >= 2 && ToInt(t->Token[1]) == 0)
  19342. {
  19343. FreeToken(t);
  19344. return false;
  19345. }
  19346. if (t->NumTokens >= 1 && IsEmptyStr(t->Token[0]) == false)
  19347. {
  19348. ret = true;
  19349. if (host != NULL)
  19350. {
  19351. *host = CopyStr(t->Token[0]);
  19352. Trim(*host);
  19353. }
  19354. if (t->NumTokens >= 2)
  19355. {
  19356. if (port != NULL)
  19357. {
  19358. *port = ToInt(t->Token[1]);
  19359. }
  19360. }
  19361. }
  19362. if (port != NULL)
  19363. {
  19364. if (*port == 0)
  19365. {
  19366. *port = default_port;
  19367. }
  19368. }
  19369. FreeToken(t);
  19370. return ret;
  19371. }
  19372. // Vpncmd command procedure
  19373. UINT VpnCmdProc(CONSOLE *c, char *cmd_name, wchar_t *str, void *param)
  19374. {
  19375. LIST *o;
  19376. char *target;
  19377. bool server = false;
  19378. bool client = false;
  19379. bool tools = false;
  19380. char *hostname = NULL;
  19381. char *password;
  19382. wchar_t *cmdline;
  19383. bool host_inputted = false;
  19384. UINT port = 0;
  19385. UINT retcode = 0;
  19386. PARAM args[] =
  19387. {
  19388. {"[host:port]", NULL, NULL, NULL, NULL},
  19389. {"CLIENT", NULL, NULL, NULL, NULL},
  19390. {"SERVER", NULL, NULL, NULL, NULL},
  19391. {"TOOLS", NULL, NULL, NULL, NULL},
  19392. {"HUB", NULL, NULL, NULL, NULL},
  19393. {"ADMINHUB", NULL, NULL, NULL, NULL},
  19394. {"PASSWORD", NULL, NULL, NULL, NULL},
  19395. {"IN", NULL, NULL, NULL, NULL},
  19396. {"OUT", NULL, NULL, NULL, NULL},
  19397. {"CMD", NULL, NULL, NULL, NULL},
  19398. {"CSV", NULL, NULL, NULL, NULL},
  19399. {"PROGRAMMING", NULL, NULL, NULL, NULL},
  19400. };
  19401. #ifdef OS_WIN32
  19402. if (UniStrCmpi(str, L"/debug") == 0)
  19403. {
  19404. // Debug information write mode
  19405. Win32CmdDebug(false);
  19406. return 0;
  19407. }
  19408. if (UniStrCmpi(str, L"/debug_uac") == 0)
  19409. {
  19410. // Debug information write mode
  19411. Win32CmdDebug(true);
  19412. return 0;
  19413. }
  19414. #endif // OS_WIN32
  19415. if (c->ConsoleType == CONSOLE_LOCAL)
  19416. {
  19417. // Initialize the execute path information
  19418. VpnCmdInitBootPath();
  19419. }
  19420. if(c->ConsoleType != CONSOLE_CSV)
  19421. {
  19422. CmdPrintAbout(c);
  19423. c->Write(c, L"");
  19424. }
  19425. o = ParseCommandList(c, cmd_name, str, args, sizeof(args) / sizeof(args[0]));
  19426. if (o == NULL)
  19427. {
  19428. return ERR_INVALID_PARAMETER;
  19429. }
  19430. // Specification of the mode of Tools or Server or Client
  19431. if ((GetParamStr(o, "CLIENT") == NULL && GetParamStr(o, "SERVER") == NULL && GetParamStr(o, "TOOLS") == NULL) ||
  19432. (GetParamStr(o, "CLIENT") != NULL && GetParamStr(o, "SERVER") != NULL && GetParamStr(o, "TOOLS") != NULL))
  19433. {
  19434. wchar_t *ret;
  19435. UINT code;
  19436. // The mode of Tools or Server or Client is not specified
  19437. c->Write(c, _UU("CMD_VPNCMD_CS_1"));
  19438. ret = c->ReadLine(c, _UU("CMD_VPNCMD_CS_2"), true);
  19439. code = UniToInt(ret);
  19440. Free(ret);
  19441. switch (code)
  19442. {
  19443. case 1:
  19444. // Server
  19445. server = true;
  19446. break;
  19447. case 2:
  19448. // Client
  19449. client = true;
  19450. break;
  19451. case 3:
  19452. // Tools
  19453. tools = true;
  19454. break;
  19455. default:
  19456. // Unspecified
  19457. FreeParamValueList(o);
  19458. return ERR_USER_CANCEL;
  19459. }
  19460. c->Write(c, L"");
  19461. }
  19462. else
  19463. {
  19464. if (GetParamStr(o, "SERVER") != NULL)
  19465. {
  19466. server = true;
  19467. }
  19468. else if (GetParamStr(o, "CLIENT") != NULL)
  19469. {
  19470. client = true;
  19471. }
  19472. else
  19473. {
  19474. tools = true;
  19475. }
  19476. }
  19477. // Destination host name
  19478. target = CopyStr(GetParamStr(o, "[host:port]"));
  19479. if (target == NULL && tools == false)
  19480. {
  19481. wchar_t *str;
  19482. // Input a host name
  19483. if (server)
  19484. {
  19485. c->Write(c, _UU("CMD_VPNCMD_HOST_1"));
  19486. }
  19487. else if (client)
  19488. {
  19489. c->Write(c, _UU("CMD_VPNCMD_HOST_2"));
  19490. }
  19491. str = c->ReadLine(c, _UU("CMD_VPNCMD_HOST_3"), true);
  19492. c->Write(c, L"");
  19493. target = CopyUniToStr(str);
  19494. Free(str);
  19495. if (target == NULL)
  19496. {
  19497. // Cancel
  19498. FreeParamValueList(o);
  19499. return ERR_USER_CANCEL;
  19500. }
  19501. if (IsEmptyStr(target))
  19502. {
  19503. Free(target);
  19504. target = CopyStr("localhost");
  19505. }
  19506. }
  19507. else
  19508. {
  19509. // User specifies a host name
  19510. host_inputted = true;
  19511. }
  19512. if (tools == false)
  19513. {
  19514. if (ParseHostPort(target, &hostname, &port, 443) == false)
  19515. {
  19516. c->Write(c, _UU("CMD_MSG_INVALID_HOSTNAME"));
  19517. Free(target);
  19518. FreeParamValueList(o);
  19519. return ERR_INVALID_PARAMETER;
  19520. }
  19521. }
  19522. // Password
  19523. password = GetParamStr(o, "PASSWORD");
  19524. if (password == NULL)
  19525. {
  19526. password = "";
  19527. }
  19528. // Command line
  19529. cmdline = GetParamUniStr(o, "CMD");
  19530. if (server)
  19531. {
  19532. // Process as the server
  19533. char *hub;
  19534. char *adminhub = NULL;
  19535. hub = CopyStr(GetParamStr(o, "HUB"));
  19536. adminhub = GetParamStr(o, "ADMINHUB");
  19537. // Decide the Virtual HUB to be specified in the Virtual HUB management mode
  19538. if (hub == NULL)
  19539. {
  19540. if (host_inputted == false)
  19541. {
  19542. wchar_t *s;
  19543. // If the user does not specify a host name on the command line,
  19544. // get also a Virtual HUB name by displaying the prompt
  19545. c->Write(c, _UU("CMD_VPNCMD_HUB_1"));
  19546. s = c->ReadLine(c, _UU("CMD_VPNCMD_HUB_2"), true);
  19547. hub = CopyUniToStr(s);
  19548. Free(s);
  19549. }
  19550. }
  19551. if (IsEmptyStr(hub))
  19552. {
  19553. Free(hub);
  19554. hub = NULL;
  19555. }
  19556. if (IsEmptyStr(adminhub))
  19557. {
  19558. adminhub = NULL;
  19559. }
  19560. retcode = PsConnect(c, hostname, port, hub, adminhub, cmdline, password);
  19561. Free(hub);
  19562. }
  19563. else if (client)
  19564. {
  19565. // Treated as a client
  19566. Trim(target);
  19567. retcode = PcConnect(c, target, cmdline, password);
  19568. }
  19569. else if (tools)
  19570. {
  19571. // Treated as a VPN Tools
  19572. retcode = PtConnect(c, cmdline);
  19573. }
  19574. Free(hostname);
  19575. Free(target);
  19576. FreeParamValueList(o);
  19577. return retcode;
  19578. }
  19579. // Entry point of vpncmd
  19580. UINT CommandMain(wchar_t *command_line)
  19581. {
  19582. UINT ret = 0;
  19583. wchar_t *infile, *outfile;
  19584. char *a_infile, *a_outfile;
  19585. wchar_t *csvmode;
  19586. wchar_t *programming_mode;
  19587. CONSOLE *c;
  19588. // Validate arguments
  19589. if (command_line == NULL)
  19590. {
  19591. return ERR_INVALID_PARAMETER;
  19592. }
  19593. // Look ahead only items of /in and /out
  19594. infile = ParseCommand(command_line, L"in");
  19595. outfile = ParseCommand(command_line, L"out");
  19596. if (UniIsEmptyStr(infile))
  19597. {
  19598. Free(infile);
  19599. infile = NULL;
  19600. }
  19601. if (UniIsEmptyStr(outfile))
  19602. {
  19603. Free(outfile);
  19604. outfile = NULL;
  19605. }
  19606. a_infile = CopyUniToStr(infile);
  19607. a_outfile = CopyUniToStr(outfile);
  19608. // Allocate the local console
  19609. c = NewLocalConsole(infile, outfile);
  19610. if (c != NULL)
  19611. {
  19612. // Definition of commands of vpncmd
  19613. CMD cmd[] =
  19614. {
  19615. {"vpncmd", VpnCmdProc},
  19616. };
  19617. // Read ahead to check the CSV mode
  19618. csvmode = ParseCommand(command_line, L"csv");
  19619. if(csvmode != NULL)
  19620. {
  19621. Free(csvmode);
  19622. c->ConsoleType = CONSOLE_CSV;
  19623. }
  19624. programming_mode = ParseCommand(command_line, L"programming");
  19625. if (programming_mode != NULL)
  19626. {
  19627. Free(programming_mode);
  19628. c->ProgrammingMode = true;
  19629. }
  19630. if (DispatchNextCmdEx(c, command_line, ">", cmd, sizeof(cmd) / sizeof(cmd[0]), NULL) == false)
  19631. {
  19632. ret = ERR_INVALID_PARAMETER;
  19633. }
  19634. else
  19635. {
  19636. ret = c->RetCode;
  19637. }
  19638. // Release the local console
  19639. c->Free(c);
  19640. }
  19641. else
  19642. {
  19643. Print("Error: Couldn't open local console.\n");
  19644. }
  19645. Free(a_infile);
  19646. Free(a_outfile);
  19647. Free(infile);
  19648. Free(outfile);
  19649. return ret;
  19650. }
  19651. #ifdef OS_WIN32
  19652. // Debug information write mode
  19653. void Win32CmdDebug(bool is_uac)
  19654. {
  19655. wchar_t *dst;
  19656. wchar_t def_filename[MAX_SIZE];
  19657. SYSTEMTIME st;
  19658. InitWinUi(_UU("CMD_DEBUG_SOFTNAME"), NULL, 0);
  19659. UniPrint(_UU("CMD_DEBUG_PRINT"));
  19660. if (MsIsWin2000OrGreater() == false)
  19661. {
  19662. MsgBox(NULL, 0x00000040L, _UU("CMD_DEBUG_NOT_2000"));
  19663. goto LABEL_CLEANUP;
  19664. }
  19665. if ((MsIsVista() == false || is_uac) && MsIsAdmin() == false)
  19666. {
  19667. MsgBox(NULL, 0x00000040L, _UU("CMD_DEBUG_NOT_ADMIN"));
  19668. goto LABEL_CLEANUP;
  19669. }
  19670. if (MsIsVista() && MsIsAdmin() == false)
  19671. {
  19672. void *process_handle = NULL;
  19673. // Launch myself using the UAC
  19674. if (MsExecuteEx2W(MsGetExeFileNameW(), L"/debug_uac", &process_handle, true) == false)
  19675. {
  19676. MsgBox(NULL, 0x00000030L, _UU("CMD_DEBUG_UAC_FAILED"));
  19677. return;
  19678. }
  19679. MsCloseHandle(process_handle);
  19680. goto LABEL_CLEANUP;
  19681. }
  19682. LocalTime(&st);
  19683. UniFormat(def_filename, sizeof(def_filename), L"vpn_debuginfo_%04u%02u%02u_%02u%02u%02u.zip",
  19684. st.wYear, st.wMonth, st.wDay, st.wHour, st.wMinute, st.wSecond);
  19685. // Specify the destination
  19686. dst = SaveDlg(NULL, _UU("DLG_ZIP_FILER"), _UU("CMD_DEBUG_SAVE_TITLE"), def_filename, L".zip");
  19687. if (dst != NULL)
  19688. {
  19689. if (MsSaveSystemInfo(dst) == false)
  19690. {
  19691. // Failure
  19692. MsgBoxEx(NULL, 0x00000030L, _UU("CMD_DEBUG_NG"), dst);
  19693. }
  19694. else
  19695. {
  19696. // Success
  19697. MsgBoxEx(NULL, 0x00000040L, _UU("CMD_DEBUG_OK"), dst);
  19698. }
  19699. Free(dst);
  19700. }
  19701. LABEL_CLEANUP:
  19702. FreeWinUi();
  19703. }
  19704. #endif // OS_WIN32