Remote.c 10 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474
  1. // SoftEther VPN Source Code - Stable Edition Repository
  2. // Cedar Communication Module
  3. //
  4. // SoftEther VPN Server, Client and Bridge are free software under GPLv2.
  5. //
  6. // Copyright (c) Daiyuu Nobori.
  7. // Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
  8. // Copyright (c) SoftEther Corporation.
  9. //
  10. // All Rights Reserved.
  11. //
  12. // http://www.softether.org/
  13. //
  14. // Author: Daiyuu Nobori, Ph.D.
  15. // Comments: Tetsuo Sugiyama, Ph.D.
  16. //
  17. // This program is free software; you can redistribute it and/or
  18. // modify it under the terms of the GNU General Public License
  19. // version 2 as published by the Free Software Foundation.
  20. //
  21. // This program is distributed in the hope that it will be useful,
  22. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  23. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  24. // GNU General Public License for more details.
  25. //
  26. // You should have received a copy of the GNU General Public License version 2
  27. // along with this program; if not, write to the Free Software
  28. // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  29. //
  30. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  31. // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  32. // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  33. // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
  34. // CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
  35. // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
  36. // SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  37. //
  38. // THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
  39. // AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
  40. //
  41. //
  42. // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
  43. // UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
  44. // MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
  45. // SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
  46. // SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
  47. // CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
  48. // DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
  49. // MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
  50. // SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
  51. // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
  52. // EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
  53. // JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
  54. // AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
  55. // THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
  56. //
  57. // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
  58. // YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
  59. // CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
  60. // SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
  61. // SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
  62. // COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
  63. // PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
  64. // CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
  65. // NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
  66. // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
  67. // COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
  68. // WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
  69. // COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
  70. // COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
  71. // SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
  72. // COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
  73. // RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
  74. // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
  75. // JUST A STATEMENT FOR WARNING AND DISCLAIMER.
  76. //
  77. //
  78. // SOURCE CODE CONTRIBUTION
  79. // ------------------------
  80. //
  81. // Your contribution to SoftEther VPN Project is much appreciated.
  82. // Please send patches to us through GitHub.
  83. // Read the SoftEther VPN Patch Acceptance Policy in advance:
  84. // http://www.softether.org/5-download/src/9.patch
  85. //
  86. //
  87. // DEAR SECURITY EXPERTS
  88. // ---------------------
  89. //
  90. // If you find a bug or a security vulnerability please kindly inform us
  91. // about the problem immediately so that we can fix the security problem
  92. // to protect a lot of users around the world as soon as possible.
  93. //
  94. // Our e-mail address for security reports is:
  95. // softether-vpn-security [at] softether.org
  96. //
  97. // Please note that the above e-mail address is not a technical support
  98. // inquiry address. If you need technical assistance, please visit
  99. // http://www.softether.org/ and ask your question on the users forum.
  100. //
  101. // Thank you for your cooperation.
  102. //
  103. //
  104. // NO MEMORY OR RESOURCE LEAKS
  105. // ---------------------------
  106. //
  107. // The memory-leaks and resource-leaks verification under the stress
  108. // test has been passed before release this source code.
  109. // Remote.c
  110. // Remote Procedure Call
  111. #include "CedarPch.h"
  112. // End of RPC
  113. void EndRpc(RPC *rpc)
  114. {
  115. RpcFree(rpc);
  116. }
  117. // Release the RPC
  118. void RpcFree(RPC *rpc)
  119. {
  120. // Validate arguments
  121. if (rpc == NULL)
  122. {
  123. return;
  124. }
  125. Disconnect(rpc->Sock);
  126. ReleaseSock(rpc->Sock);
  127. DeleteLock(rpc->Lock);
  128. Free(rpc);
  129. }
  130. // Get error
  131. UINT RpcGetError(PACK *p)
  132. {
  133. // Validate arguments
  134. if (p == NULL)
  135. {
  136. return ERR_DISCONNECTED;
  137. }
  138. return PackGetInt(p, "error_code");
  139. }
  140. // Error checking
  141. bool RpcIsOk(PACK *p)
  142. {
  143. // Validate arguments
  144. if (p == NULL)
  145. {
  146. return false;
  147. }
  148. if (PackGetInt(p, "error") == 0)
  149. {
  150. return true;
  151. }
  152. else
  153. {
  154. return false;
  155. }
  156. }
  157. // Error code setting
  158. void RpcError(PACK *p, UINT err)
  159. {
  160. // Validate arguments
  161. if (p == NULL)
  162. {
  163. return;
  164. }
  165. PackAddInt(p, "error", 1);
  166. PackAddInt(p, "error_code", err);
  167. }
  168. // Start the RPC dispatcher
  169. PACK *CallRpcDispatcher(RPC *r, PACK *p)
  170. {
  171. char func_name[MAX_SIZE];
  172. // Validate arguments
  173. if (r == NULL || p == NULL)
  174. {
  175. return NULL;
  176. }
  177. if (PackGetStr(p, "function_name", func_name, sizeof(func_name)) == false)
  178. {
  179. return NULL;
  180. }
  181. return r->Dispatch(r, func_name, p);
  182. }
  183. // Wait for the next RPC call
  184. bool RpcRecvNextCall(RPC *r)
  185. {
  186. UINT size;
  187. void *tmp;
  188. SOCK *s;
  189. BUF *b;
  190. PACK *p;
  191. PACK *ret;
  192. // Validate arguments
  193. if (r == NULL)
  194. {
  195. return false;
  196. }
  197. s = r->Sock;
  198. if (RecvAll(s, &size, sizeof(UINT), s->SecureMode) == false)
  199. {
  200. return false;
  201. }
  202. size = Endian32(size);
  203. if (size > MAX_PACK_SIZE)
  204. {
  205. return false;
  206. }
  207. tmp = MallocEx(size, true);
  208. if (RecvAll(s, tmp, size, s->SecureMode) == false)
  209. {
  210. Free(tmp);
  211. return false;
  212. }
  213. b = NewBuf();
  214. WriteBuf(b, tmp, size);
  215. SeekBuf(b, 0, 0);
  216. Free(tmp);
  217. p = BufToPack(b);
  218. FreeBuf(b);
  219. if (p == NULL)
  220. {
  221. return false;
  222. }
  223. ret = CallRpcDispatcher(r, p);
  224. FreePack(p);
  225. if (ret == NULL)
  226. {
  227. ret = PackError(ERR_NOT_SUPPORTED);
  228. }
  229. b = PackToBuf(ret);
  230. FreePack(ret);
  231. size = Endian32(b->Size);
  232. SendAdd(s, &size, sizeof(UINT));
  233. SendAdd(s, b->Buf, b->Size);
  234. if (SendNow(s, s->SecureMode) == false)
  235. {
  236. FreeBuf(b);
  237. return false;
  238. }
  239. FreeBuf(b);
  240. return true;
  241. }
  242. // RPC server operation
  243. void RpcServer(RPC *r)
  244. {
  245. SOCK *s;
  246. // Validate arguments
  247. if (r == NULL)
  248. {
  249. return;
  250. }
  251. s = r->Sock;
  252. while (true)
  253. {
  254. // Wait for the next RPC call
  255. if (RpcRecvNextCall(r) == false)
  256. {
  257. // Communication error
  258. break;
  259. }
  260. }
  261. }
  262. // RPC call
  263. PACK *RpcCall(RPC *r, char *function_name, PACK *p)
  264. {
  265. PACK *ret;
  266. UINT num_retry = 0;
  267. UINT err = 0;
  268. // Validate arguments
  269. if (r == NULL || function_name == NULL)
  270. {
  271. return NULL;
  272. }
  273. // Debug("RpcCall: %s\n", function_name);
  274. Lock(r->Lock);
  275. {
  276. if (p == NULL)
  277. {
  278. p = NewPack();
  279. }
  280. PackAddStr(p, "function_name", function_name);
  281. RETRY:
  282. err = 0;
  283. ret = RpcCallInternal(r, p);
  284. if (ret == NULL)
  285. {
  286. if (r->IsVpnServer && r->Sock != NULL)
  287. {
  288. if (num_retry < 1)
  289. {
  290. num_retry++;
  291. // Attempt to reconnect the RPC to the VPN Server
  292. err = AdminReconnect(r);
  293. if (err == ERR_NO_ERROR)
  294. {
  295. goto RETRY;
  296. }
  297. }
  298. }
  299. }
  300. FreePack(p);
  301. if (ret == NULL)
  302. {
  303. if (err == 0)
  304. {
  305. err = ERR_DISCONNECTED;
  306. }
  307. ret = PackError(err);
  308. PackAddInt(ret, "error_code", err);
  309. }
  310. }
  311. Unlock(r->Lock);
  312. return ret;
  313. }
  314. // RPC internal call
  315. PACK *RpcCallInternal(RPC *r, PACK *p)
  316. {
  317. BUF *b;
  318. UINT size;
  319. PACK *ret;
  320. void *tmp;
  321. // Validate arguments
  322. if (r == NULL || p == NULL)
  323. {
  324. return NULL;
  325. }
  326. if (r->Sock == NULL)
  327. {
  328. return NULL;
  329. }
  330. b = PackToBuf(p);
  331. size = Endian32(b->Size);
  332. SendAdd(r->Sock, &size, sizeof(UINT));
  333. SendAdd(r->Sock, b->Buf, b->Size);
  334. FreeBuf(b);
  335. if (SendNow(r->Sock, r->Sock->SecureMode) == false)
  336. {
  337. return NULL;
  338. }
  339. if (RecvAll(r->Sock, &size, sizeof(UINT), r->Sock->SecureMode) == false)
  340. {
  341. return NULL;
  342. }
  343. size = Endian32(size);
  344. if (size > MAX_PACK_SIZE)
  345. {
  346. return NULL;
  347. }
  348. tmp = MallocEx(size, true);
  349. if (RecvAll(r->Sock, tmp, size, r->Sock->SecureMode) == false)
  350. {
  351. Free(tmp);
  352. return NULL;
  353. }
  354. b = NewBuf();
  355. WriteBuf(b, tmp, size);
  356. SeekBuf(b, 0, 0);
  357. Free(tmp);
  358. ret = BufToPack(b);
  359. if (ret == NULL)
  360. {
  361. FreeBuf(b);
  362. return NULL;
  363. }
  364. FreeBuf(b);
  365. return ret;
  366. }
  367. // Start the RPC server
  368. RPC *StartRpcServer(SOCK *s, RPC_DISPATCHER *dispatch, void *param)
  369. {
  370. RPC *r;
  371. // Validate arguments
  372. if (s == NULL)
  373. {
  374. return NULL;
  375. }
  376. r = ZeroMallocEx(sizeof(RPC), true);
  377. r->Sock = s;
  378. r->Param = param;
  379. r->Lock = NewLock();
  380. AddRef(s->ref);
  381. r->ServerMode = true;
  382. r->Dispatch = dispatch;
  383. // Name generation
  384. Format(r->Name, sizeof(r->Name), "RPC-%u", s->socket);
  385. return r;
  386. }
  387. // Start the RPC client
  388. RPC *StartRpcClient(SOCK *s, void *param)
  389. {
  390. RPC *r;
  391. // Validate arguments
  392. if (s == NULL)
  393. {
  394. return NULL;
  395. }
  396. r = ZeroMalloc(sizeof(RPC));
  397. r->Sock = s;
  398. r->Param = param;
  399. r->Lock = NewLock();
  400. AddRef(s->ref);
  401. r->ServerMode = false;
  402. return r;
  403. }