| 12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615861686178618861986208621862286238624862586268627862886298630863186328633863486358636863786388639864086418642864386448645864686478648864986508651865286538654865586568657865886598660866186628663866486658666866786688669867086718672867386748675867686778678867986808681868286838684868586868687868886898690869186928693869486958696869786988699870087018702870387048705870687078708870987108711871287138714871587168717871887198720872187228723872487258726872787288729873087318732873387348735873687378738873987408741874287438744874587468747874887498750875187528753875487558756875787588759876087618762876387648765876687678768876987708771877287738774877587768777877887798780878187828783878487858786878787888789879087918792879387948795879687978798879988008801880288038804880588068807880888098810881188128813881488158816881788188819882088218822882388248825882688278828882988308831883288338834883588368837883888398840884188428843884488458846884788488849885088518852885388548855885688578858885988608861886288638864886588668867886888698870887188728873887488758876887788788879888088818882888388848885888688878888888988908891889288938894889588968897889888998900890189028903890489058906890789088909891089118912891389148915891689178918891989208921892289238924892589268927892889298930893189328933893489358936893789388939894089418942894389448945894689478948894989508951895289538954895589568957895889598960896189628963896489658966896789688969897089718972897389748975897689778978897989808981898289838984898589868987898889898990899189928993899489958996899789988999900090019002900390049005900690079008900990109011901290139014901590169017901890199020902190229023902490259026902790289029903090319032903390349035903690379038903990409041904290439044904590469047904890499050905190529053905490559056905790589059906090619062906390649065906690679068906990709071907290739074907590769077907890799080908190829083908490859086908790889089909090919092909390949095909690979098909991009101910291039104910591069107910891099110911191129113911491159116911791189119912091219122912391249125912691279128912991309131913291339134913591369137913891399140914191429143914491459146914791489149915091519152915391549155915691579158915991609161916291639164916591669167916891699170917191729173917491759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239224922592269227922892299230923192329233923492359236923792389239924092419242924392449245924692479248924992509251925292539254925592569257925892599260926192629263926492659266926792689269927092719272927392749275927692779278927992809281928292839284928592869287928892899290929192929293929492959296929792989299930093019302930393049305930693079308930993109311931293139314931593169317931893199320932193229323932493259326932793289329933093319332933393349335933693379338933993409341934293439344934593469347934893499350935193529353935493559356935793589359936093619362936393649365936693679368936993709371937293739374937593769377937893799380938193829383938493859386938793889389939093919392939393949395939693979398939994009401940294039404940594069407940894099410941194129413941494159416941794189419942094219422942394249425942694279428942994309431943294339434943594369437943894399440944194429443944494459446944794489449945094519452945394549455945694579458945994609461946294639464946594669467946894699470947194729473947494759476947794789479948094819482948394849485948694879488948994909491949294939494949594969497949894999500950195029503950495059506950795089509951095119512951395149515951695179518951995209521952295239524952595269527952895299530953195329533953495359536953795389539954095419542954395449545954695479548954995509551955295539554955595569557955895599560956195629563956495659566956795689569957095719572957395749575957695779578957995809581958295839584958595869587958895899590959195929593959495959596959795989599960096019602960396049605960696079608960996109611961296139614961596169617961896199620962196229623962496259626962796289629963096319632963396349635963696379638963996409641964296439644964596469647964896499650965196529653965496559656965796589659966096619662966396649665966696679668966996709671967296739674967596769677967896799680968196829683968496859686968796889689969096919692969396949695969696979698969997009701970297039704970597069707970897099710971197129713971497159716971797189719972097219722972397249725972697279728972997309731973297339734973597369737973897399740974197429743974497459746974797489749975097519752975397549755975697579758975997609761976297639764976597669767976897699770977197729773977497759776977797789779978097819782978397849785978697879788978997909791979297939794979597969797979897999800980198029803980498059806980798089809981098119812981398149815981698179818981998209821982298239824982598269827982898299830983198329833983498359836983798389839984098419842984398449845984698479848984998509851985298539854985598569857985898599860986198629863986498659866986798689869987098719872987398749875987698779878987998809881988298839884988598869887988898899890989198929893989498959896989798989899990099019902990399049905990699079908990999109911991299139914991599169917991899199920992199229923992499259926992799289929993099319932993399349935993699379938993999409941994299439944994599469947994899499950995199529953995499559956995799589959996099619962996399649965996699679968996999709971997299739974997599769977997899799980998199829983998499859986998799889989999099919992999399949995999699979998999910000100011000210003100041000510006100071000810009100101001110012100131001410015100161001710018100191002010021100221002310024100251002610027100281002910030100311003210033100341003510036100371003810039100401004110042100431004410045100461004710048100491005010051100521005310054100551005610057100581005910060100611006210063100641006510066100671006810069100701007110072100731007410075100761007710078100791008010081100821008310084100851008610087100881008910090100911009210093100941009510096100971009810099101001010110102101031010410105101061010710108101091011010111101121011310114101151011610117101181011910120101211012210123101241012510126101271012810129101301013110132101331013410135101361013710138101391014010141101421014310144101451014610147101481014910150101511015210153101541015510156101571015810159101601016110162101631016410165101661016710168101691017010171101721017310174101751017610177101781017910180101811018210183101841018510186101871018810189101901019110192101931019410195101961019710198101991020010201102021020310204102051020610207102081020910210102111021210213102141021510216102171021810219102201022110222102231022410225102261022710228102291023010231102321023310234102351023610237102381023910240102411024210243102441024510246102471024810249102501025110252102531025410255102561025710258102591026010261102621026310264102651026610267102681026910270102711027210273102741027510276102771027810279102801028110282102831028410285102861028710288102891029010291102921029310294102951029610297102981029910300103011030210303103041030510306103071030810309103101031110312103131031410315103161031710318103191032010321103221032310324103251032610327103281032910330103311033210333103341033510336103371033810339103401034110342103431034410345103461034710348103491035010351103521035310354103551035610357103581035910360103611036210363103641036510366103671036810369103701037110372103731037410375103761037710378103791038010381103821038310384103851038610387103881038910390103911039210393103941039510396103971039810399104001040110402104031040410405104061040710408104091041010411104121041310414104151041610417104181041910420104211042210423104241042510426104271042810429104301043110432104331043410435104361043710438104391044010441104421044310444104451044610447104481044910450104511045210453104541045510456104571045810459104601046110462104631046410465104661046710468104691047010471104721047310474104751047610477104781047910480104811048210483104841048510486104871048810489104901049110492104931049410495104961049710498104991050010501105021050310504105051050610507105081050910510105111051210513105141051510516105171051810519105201052110522105231052410525105261052710528105291053010531105321053310534105351053610537105381053910540105411054210543105441054510546105471054810549105501055110552105531055410555105561055710558105591056010561105621056310564105651056610567105681056910570105711057210573105741057510576105771057810579105801058110582105831058410585105861058710588105891059010591105921059310594105951059610597105981059910600106011060210603106041060510606106071060810609106101061110612106131061410615106161061710618106191062010621106221062310624106251062610627106281062910630106311063210633106341063510636106371063810639106401064110642106431064410645106461064710648106491065010651106521065310654106551065610657106581065910660106611066210663106641066510666106671066810669106701067110672106731067410675106761067710678106791068010681106821068310684106851068610687106881068910690106911069210693106941069510696106971069810699107001070110702107031070410705107061070710708107091071010711107121071310714107151071610717107181071910720107211072210723107241072510726107271072810729107301073110732107331073410735107361073710738107391074010741107421074310744107451074610747107481074910750107511075210753107541075510756107571075810759107601076110762107631076410765107661076710768107691077010771107721077310774107751077610777107781077910780 |
- // SoftEther VPN Source Code
- // Cedar Communication Module
- //
- // SoftEther VPN Server, Client and Bridge are free software under GPLv2.
- //
- // Copyright (c) 2012-2014 Daiyuu Nobori.
- // Copyright (c) 2012-2014 SoftEther VPN Project, University of Tsukuba, Japan.
- // Copyright (c) 2012-2014 SoftEther Corporation.
- //
- // All Rights Reserved.
- //
- // http://www.softether.org/
- //
- // Author: Daiyuu Nobori
- // Comments: Tetsuo Sugiyama, Ph.D.
- //
- // This program is free software; you can redistribute it and/or
- // modify it under the terms of the GNU General Public License
- // version 2 as published by the Free Software Foundation.
- //
- // This program is distributed in the hope that it will be useful,
- // but WITHOUT ANY WARRANTY; without even the implied warranty of
- // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
- // GNU General Public License for more details.
- //
- // You should have received a copy of the GNU General Public License version 2
- // along with this program; if not, write to the Free Software
- // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
- //
- // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
- // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
- // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
- // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
- // CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
- // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
- // SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
- //
- // THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
- // AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
- //
- //
- // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
- // UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
- // MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
- // SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
- // SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
- // CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
- // DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
- // MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
- // SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
- // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
- // EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
- // JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
- // AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
- // THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
- //
- // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
- // YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
- // CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
- // SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
- // SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
- // COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
- // PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
- // CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
- // NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
- // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
- // COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
- // WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
- // COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
- // COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
- // SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
- // COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
- // RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
- // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
- // JUST A STATEMENT FOR WARNING AND DISCLAIMER.
- //
- //
- // SOURCE CODE CONTRIBUTION
- // ------------------------
- //
- // Your contribution to SoftEther VPN Project is much appreciated.
- // Please send patches to us through GitHub.
- // Read the SoftEther VPN Patch Acceptance Policy in advance:
- // http://www.softether.org/5-download/src/9.patch
- //
- //
- // DEAR SECURITY EXPERTS
- // ---------------------
- //
- // If you find a bug or a security vulnerability please kindly inform us
- // about the problem immediately so that we can fix the security problem
- // to protect a lot of users around the world as soon as possible.
- //
- // Our e-mail address for security reports is:
- // softether-vpn-security [at] softether.org
- //
- // Please note that the above e-mail address is not a technical support
- // inquiry address. If you need technical assistance, please visit
- // http://www.softether.org/ and ask your question on the users forum.
- //
- // Thank you for your cooperation.
- //
- //
- // NO MEMORY OR RESOURCE LEAKS
- // ---------------------------
- //
- // The memory-leaks and resource-leaks verification under the stress
- // test has been passed before release this source code.
- // Server.c
- // VPN Server module
- #include "CedarPch.h"
- static SERVER *server = NULL;
- static LOCK *server_lock = NULL;
- char *SERVER_CONFIG_FILE_NAME = "@vpn_server.config";
- char *SERVER_CONFIG_FILE_NAME_IN_CLIENT = "@vpn_gate_svc.config";
- char *BRIDGE_CONFIG_FILE_NAME = "@vpn_bridge.config";
- static bool server_reset_setting = false;
- static volatile UINT global_server_flags[NUM_GLOBAL_SERVER_FLAGS] = {0};
- // Set the OpenVPN and SSTP setting
- void SiSetOpenVPNAndSSTPConfig(SERVER *s, OPENVPN_SSTP_CONFIG *c)
- {
- // Validate arguments
- if (s == NULL || c == NULL)
- {
- return;
- }
- Lock(s->OpenVpnSstpConfigLock);
- {
- // Save the settings
- if (s->Cedar->Bridge || s->ServerType != SERVER_TYPE_STANDALONE)
- {
- s->DisableSSTPServer = true;
- s->DisableOpenVPNServer = true;
- }
- else
- {
- s->DisableSSTPServer = !c->EnableSSTP;
- s->DisableOpenVPNServer = !c->EnableOpenVPN;
- }
- NormalizeIntListStr(s->OpenVpnServerUdpPorts, sizeof(s->OpenVpnServerUdpPorts),
- c->OpenVPNPortList, true, ", ");
- // Apply the OpenVPN configuration
- if (s->OpenVpnServerUdp != NULL)
- {
- if (s->DisableOpenVPNServer)
- {
- OvsApplyUdpPortList(s->OpenVpnServerUdp, "");
- }
- else
- {
- OvsApplyUdpPortList(s->OpenVpnServerUdp, s->OpenVpnServerUdpPorts);
- }
- }
- }
- Unlock(s->OpenVpnSstpConfigLock);
- }
- // Get the OpenVPN and SSTP setting
- void SiGetOpenVPNAndSSTPConfig(SERVER *s, OPENVPN_SSTP_CONFIG *c)
- {
- // Validate arguments
- if (s == NULL || c == NULL)
- {
- return;
- }
- Zero(c, sizeof(OPENVPN_SSTP_CONFIG));
- Lock(s->OpenVpnSstpConfigLock);
- {
- if (s->DisableOpenVPNServer == false)
- {
- c->EnableOpenVPN = true;
- }
- if (s->DisableSSTPServer == false)
- {
- c->EnableSSTP = true;
- }
- StrCpy(c->OpenVPNPortList, sizeof(c->OpenVPNPortList), s->OpenVpnServerUdpPorts);
- }
- Unlock(s->OpenVpnSstpConfigLock);
- }
- // Get whether the number of user objects that are registered in the VPN Server is too many
- bool SiTooManyUserObjectsInServer(SERVER *s, bool oneMore)
- {
- return false;
- }
- // Get the number of user objects that are registered in the VPN Server
- UINT SiGetServerNumUserObjects(SERVER *s)
- {
- CEDAR *c;
- UINT ret = 0;
- // Validate arguments
- if (s == NULL)
- {
- return 0;
- }
- c = s->Cedar;
- LockList(c->HubList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(c->HubList);i++)
- {
- HUB *h = LIST_DATA(c->HubList, i);
- if (h->HubDb != NULL)
- {
- ret += LIST_NUM(h->HubDb->UserList);
- }
- }
- }
- UnlockList(c->HubList);
- return ret;
- }
- typedef struct SI_DEBUG_PROC_LIST
- {
- UINT Id;
- char *Description;
- char *Args;
- SI_DEBUG_PROC *Proc;
- } SI_DEBUG_PROC_LIST;
- // Debugging function
- UINT SiDebug(SERVER *s, RPC_TEST *ret, UINT i, char *str)
- {
- SI_DEBUG_PROC_LIST proc_list[] =
- {
- {1, "Hello World", "<test string>", SiDebugProcHelloWorld},
- {2, "Terminate process now", "", SiDebugProcExit},
- {3, "Write memory dumpfile", "", SiDebugProcDump},
- {4, "Restore process priority", "", SiDebugProcRestorePriority},
- {5, "Set the process priority high", "", SiDebugProcSetHighPriority},
- {6, "Get the .exe filename of the process", "", SiDebugProcGetExeFileName},
- {7, "Crash the process", "", SiDebugProcCrash},
- {8, "Get IPsecMessageDisplayed Flag", "", SiDebugProcGetIPsecMessageDisplayedValue},
- {9, "Set IPsecMessageDisplayed Flag", "", SiDebugProcSetIPsecMessageDisplayedValue},
- {10, "Get VgsMessageDisplayed Flag", "", SiDebugProcGetVgsMessageDisplayedValue},
- {11, "Set VgsMessageDisplayed Flag", "", SiDebugProcSetVgsMessageDisplayedValue},
- };
- UINT num_proc_list = sizeof(proc_list) / sizeof(proc_list[0]);
- UINT j;
- UINT ret_value = ERR_NO_ERROR;
- // Validate arguments
- if (s == NULL || ret == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- if (i == 0)
- {
- char tmp[MAX_SIZE];
- Zero(ret, sizeof(RPC_TEST));
- StrCat(ret->StrValue, sizeof(ret->StrValue),
- "\n--- Debug Functions List --\n");
- for (j = 0;j < num_proc_list;j++)
- {
- SI_DEBUG_PROC_LIST *p = &proc_list[j];
- if (IsEmptyStr(p->Args) == false)
- {
- Format(tmp, sizeof(tmp),
- " %u: %s - Usage: %u /ARG:\"%s\"\n",
- p->Id, p->Description, p->Id, p->Args);
- }
- else
- {
- Format(tmp, sizeof(tmp),
- " %u: %s - Usage: %u\n",
- p->Id, p->Description, p->Id);
- }
- StrCat(ret->StrValue, sizeof(ret->StrValue), tmp);
- }
- }
- else
- {
- ret_value = ERR_NOT_SUPPORTED;
- for (j = 0;j < num_proc_list;j++)
- {
- SI_DEBUG_PROC_LIST *p = &proc_list[j];
- if (p->Id == i)
- {
- ret_value = p->Proc(s, str, ret->StrValue, sizeof(ret->StrValue));
- if (ret_value == ERR_NO_ERROR && IsEmptyStr(ret->StrValue))
- {
- StrCpy(ret->StrValue, sizeof(ret->StrValue), "Ok.");
- }
- break;
- }
- }
- }
- return ret_value;
- }
- UINT SiDebugProcHelloWorld(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- Format(ret_str, ret_str_size, "Hello World %s\n", in_str);
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcExit(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- _exit(1);
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcDump(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- #ifdef OS_WIN32
- MsWriteMinidump(NULL, NULL);
- #else // OS_WIN32
- return ERR_NOT_SUPPORTED;
- #endif // OS_WIN32
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcRestorePriority(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- OSRestorePriority();
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcSetHighPriority(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- OSSetHighPriority();
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcGetExeFileName(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- GetExeName(ret_str, ret_str_size);
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcCrash(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- CrashNow();
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcGetIPsecMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- ToStr(ret_str, s->IPsecMessageDisplayed);
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcSetIPsecMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- s->IPsecMessageDisplayed = ToInt(in_str);
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcGetVgsMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- #if 0
- if (VgDoNotPopupMessage() == false)
- {
- ToStr(ret_str, s->VgsMessageDisplayed);
- }
- else
- {
- ToStr(ret_str, 1);
- }
- #else
- // Do not show the VGS message in VPN Server of the current version
- ToStr(ret_str, 1);
- #endif
- return ERR_NO_ERROR;
- }
- UINT SiDebugProcSetVgsMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
- {
- // Validate arguments
- if (s == NULL || in_str == NULL || ret_str == NULL)
- {
- return ERR_INVALID_PARAMETER;
- }
- return ERR_NO_ERROR;
- }
- // Write the debug log
- void SiDebugLog(SERVER *s, char *msg)
- {
- // Validate arguments
- if (s == NULL || msg == NULL)
- {
- return;
- }
- if (s->DebugLog != NULL)
- {
- WriteTinyLog(s->DebugLog, msg);
- }
- }
- // Deadlock inspection main
- void SiCheckDeadLockMain(SERVER *s, UINT timeout)
- {
- CEDAR *cedar;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- //Debug("SiCheckDeadLockMain Start.\n");
- cedar = s->Cedar;
- if (s->ServerListenerList != NULL)
- {
- CheckDeadLock(s->ServerListenerList->lock, timeout, "s->ServerListenerList->lock");
- }
- CheckDeadLock(s->lock, timeout, "s->lock");
- if (s->FarmMemberList != NULL)
- {
- CheckDeadLock(s->FarmMemberList->lock, timeout, "s->FarmMemberList->lock");
- }
- if (s->HubCreateHistoryList != NULL)
- {
- CheckDeadLock(s->HubCreateHistoryList->lock, timeout, "s->HubCreateHistoryList->lock");
- }
- CheckDeadLock(s->CapsCacheLock, timeout, "s->CapsCacheLock");
- CheckDeadLock(s->TasksFromFarmControllerLock, timeout, "s->TasksFromFarmControllerLock");
- if (cedar != NULL)
- {
- if (cedar->HubList != NULL)
- {
- CheckDeadLock(cedar->HubList->lock, timeout, "cedar->HubList->lock");
- }
- if (cedar->ListenerList != NULL)
- {
- UINT i;
- LIST *o = NewListFast(NULL);
- CheckDeadLock(cedar->ListenerList->lock, timeout, "cedar->ListenerList->lock");
- LockList(cedar->ListenerList);
- {
- for (i = 0;i < LIST_NUM(cedar->ListenerList);i++)
- {
- LISTENER *r = LIST_DATA(cedar->ListenerList, i);
- AddRef(r->ref);
- Add(o, r);
- }
- }
- UnlockList(cedar->ListenerList);
- for (i = 0;i < LIST_NUM(o);i++)
- {
- LISTENER *r = LIST_DATA(o, i);
- ReleaseListener(r);
- }
- ReleaseList(o);
- }
- if (cedar->ConnectionList != NULL)
- {
- CheckDeadLock(cedar->ConnectionList->lock, timeout, "cedar->ConnectionList->lock");
- }
- if (cedar->CaList != NULL)
- {
- CheckDeadLock(cedar->CaList->lock, timeout, "cedar->CaList->lock");
- }
- if (cedar->TrafficLock != NULL)
- {
- CheckDeadLock(cedar->TrafficLock, timeout, "cedar->TrafficLock");
- }
- if (cedar->TrafficDiffList != NULL)
- {
- CheckDeadLock(cedar->TrafficDiffList->lock, timeout, "cedar->TrafficDiffList->lock");
- }
- if (cedar->LocalBridgeList != NULL)
- {
- CheckDeadLock(cedar->LocalBridgeList->lock, timeout, "cedar->LocalBridgeList->lock");
- }
- if (cedar->L3SwList != NULL)
- {
- CheckDeadLock(cedar->L3SwList->lock, timeout, "cedar->L3SwList->lock");
- }
- }
- //Debug("SiCheckDeadLockMain Finish.\n");
- }
- // Deadlock check thread
- void SiDeadLockCheckThread(THREAD *t, void *param)
- {
- SERVER *s = (SERVER *)param;
- // Validate arguments
- if (s == NULL || t == NULL)
- {
- return;
- }
- while (true)
- {
- Wait(s->DeadLockWaitEvent, SERVER_DEADLOCK_CHECK_SPAN);
- if (s->HaltDeadLockThread)
- {
- break;
- }
- SiCheckDeadLockMain(s, SERVER_DEADLOCK_CHECK_TIMEOUT);
- }
- }
- // Initialize the deadlock check
- void SiInitDeadLockCheck(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- if (s->DisableDeadLockCheck)
- {
- return;
- }
- s->HaltDeadLockThread = false;
- s->DeadLockWaitEvent = NewEvent();
- s->DeadLockCheckThread = NewThread(SiDeadLockCheckThread, s);
- }
- // Release the deadlock check
- void SiFreeDeadLockCheck(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- if (s->DeadLockCheckThread == NULL)
- {
- return;
- }
- s->HaltDeadLockThread = true;
- Set(s->DeadLockWaitEvent);
- WaitThread(s->DeadLockCheckThread, INFINITE);
- ReleaseThread(s->DeadLockCheckThread);
- s->DeadLockCheckThread = NULL;
- ReleaseEvent(s->DeadLockWaitEvent);
- s->DeadLockWaitEvent = NULL;
- s->HaltDeadLockThread = false;
- }
- // Check whether the specified virtual HUB has been registered to creation history
- bool SiIsHubRegistedOnCreateHistory(SERVER *s, char *name)
- {
- UINT i;
- bool ret = false;
- // Validate arguments
- if (s == NULL || name == NULL)
- {
- return false;
- }
- SiDeleteOldHubCreateHistory(s);
- LockList(s->HubCreateHistoryList);
- {
- for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
- {
- SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
- if (StrCmpi(h->HubName, name) == 0)
- {
- ret = true;
- break;
- }
- }
- }
- UnlockList(s->HubCreateHistoryList);
- return ret;
- }
- // Delete the Virtual HUB creation history
- void SiDelHubCreateHistory(SERVER *s, char *name)
- {
- UINT i;
- // Validate arguments
- if (s == NULL || name == NULL)
- {
- return;
- }
- LockList(s->HubCreateHistoryList);
- {
- SERVER_HUB_CREATE_HISTORY *hh = NULL;
- for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
- {
- SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
- if (StrCmpi(h->HubName, name) == 0)
- {
- Delete(s->HubCreateHistoryList, h);
- Free(h);
- break;
- }
- }
- }
- UnlockList(s->HubCreateHistoryList);
- SiDeleteOldHubCreateHistory(s);
- }
- // Register to the Virtual HUB creation history
- void SiAddHubCreateHistory(SERVER *s, char *name)
- {
- UINT i;
- // Validate arguments
- if (s == NULL || name == NULL)
- {
- return;
- }
- LockList(s->HubCreateHistoryList);
- {
- SERVER_HUB_CREATE_HISTORY *hh = NULL;
- for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
- {
- SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
- if (StrCmpi(h->HubName, name) == 0)
- {
- hh = h;
- break;
- }
- }
- if (hh == NULL)
- {
- hh = ZeroMalloc(sizeof(SERVER_HUB_CREATE_HISTORY));
- StrCpy(hh->HubName, sizeof(hh->HubName), name);
- Add(s->HubCreateHistoryList, hh);
- }
- hh->CreatedTime = Tick64();
- }
- UnlockList(s->HubCreateHistoryList);
- SiDeleteOldHubCreateHistory(s);
- }
- // Delete outdated Virtual HUB creation histories
- void SiDeleteOldHubCreateHistory(SERVER *s)
- {
- UINT i;
- LIST *o;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- LockList(s->HubCreateHistoryList);
- {
- o = NewListFast(NULL);
- for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
- {
- SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
- if ((h->CreatedTime + ((UINT64)TICKET_EXPIRES)) <= Tick64())
- {
- // Expired
- Add(o, h);
- }
- }
- for (i = 0;i < LIST_NUM(o);i++)
- {
- SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(o, i);
- Delete(s->HubCreateHistoryList, h);
- Free(h);
- }
- ReleaseList(o);
- }
- UnlockList(s->HubCreateHistoryList);
- }
- // Initialize the Virtual HUB creation history
- void SiInitHubCreateHistory(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- s->HubCreateHistoryList = NewList(NULL);
- }
- // Release the Virtual HUB creation history
- void SiFreeHubCreateHistory(SERVER *s)
- {
- UINT i;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
- {
- SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
- Free(h);
- }
- ReleaseList(s->HubCreateHistoryList);
- s->HubCreateHistoryList = NULL;
- }
- // Identify whether the server can be connected from the VPN Client that is
- // created by the installer creating kit of Admin Pack
- bool IsAdminPackSupportedServerProduct(char *name)
- {
- return true;
- }
- // Get the saving status of syslog
- UINT SiGetSysLogSaveStatus(SERVER *s)
- {
- SYSLOG_SETTING set;
- // Validate arguments
- if (s == NULL)
- {
- return SYSLOG_NONE;
- }
- SiGetSysLogSetting(s, &set);
- return set.SaveType;
- }
- // Send a syslog
- void SiWriteSysLog(SERVER *s, char *typestr, char *hubname, wchar_t *message)
- {
- wchar_t tmp[1024];
- char machinename[MAX_HOST_NAME_LEN + 1];
- char datetime[MAX_PATH];
- SYSTEMTIME st;
- // Validate arguments
- if (s == NULL || typestr == NULL || message == NULL)
- {
- return;
- }
- if (GetGlobalServerFlag(GSF_DISABLE_SYSLOG) != 0)
- {
- return;
- }
- // Host name
- GetMachineName(machinename, sizeof(machinename));
- // Date and time
- LocalTime(&st);
- GetDateTimeStrMilli(datetime, sizeof(datetime), &st);
- if (IsEmptyStr(hubname) == false)
- {
- UniFormat(tmp, sizeof(tmp), L"[%S/VPN/%S] (%S) <%S>: %s",
- machinename, hubname, datetime, typestr, message);
- }
- else
- {
- UniFormat(tmp, sizeof(tmp), L"[%S/VPN] (%S) <%S>: %s",
- machinename, datetime, typestr, message);
- }
- SendSysLog(s->Syslog, tmp);
- }
- // Write the syslog configuration
- void SiSetSysLogSetting(SERVER *s, SYSLOG_SETTING *setting)
- {
- SYSLOG_SETTING set;
- // Validate arguments
- if (s == NULL || setting == NULL)
- {
- return;
- }
- Zero(&set, sizeof(set));
- Copy(&set, setting, sizeof(SYSLOG_SETTING));
- if (IsEmptyStr(set.Hostname) || set.Port == 0)
- {
- set.SaveType = SYSLOG_NONE;
- }
- Lock(s->SyslogLock);
- {
- Copy(&s->SyslogSetting, &set, sizeof(SYSLOG_SETTING));
- SetSysLog(s->Syslog, set.Hostname, set.Port);
- }
- Unlock(s->SyslogLock);
- }
- // Read the syslog configuration
- void SiGetSysLogSetting(SERVER *s, SYSLOG_SETTING *setting)
- {
- // Validate arguments
- if (s == NULL || setting == NULL)
- {
- return;
- }
- //Lock(s->SyslogLock);
- {
- Copy(setting, &s->SyslogSetting, sizeof(SYSLOG_SETTING));
- }
- //Unlock(s->SyslogLock);
- }
- // Get the server product name
- void GetServerProductName(SERVER *s, char *name, UINT size)
- {
- char *cpu;
- // Validate arguments
- if (s == NULL || name == NULL)
- {
- return;
- }
- GetServerProductNameInternal(s, name, size);
- #ifdef CPU_64
- cpu = " (64 bit)";
- #else // CPU_64
- cpu = " (32 bit)";
- #endif // CPU_64
- StrCat(name, size, cpu);
- StrCat(name, size, " (Open Source)");
- }
- void GetServerProductNameInternal(SERVER *s, char *name, UINT size)
- {
- // Validate arguments
- if (s == NULL || name == NULL)
- {
- return;
- }
- #ifdef BETA_NUMBER
- if (s->Cedar->Bridge)
- {
- StrCpy(name, size, CEDAR_BRIDGE_STR);
- }
- else
- {
- StrCpy(name, size, CEDAR_BETA_SERVER);
- }
- return;
- #else // BETA_NUMBER
- if (s->Cedar->Bridge)
- {
- StrCpy(name, size, CEDAR_BRIDGE_STR);
- }
- else
- {
- StrCpy(name, size, CEDAR_SERVER_STR);
- }
- #endif // BETA_NUMBER
- }
- // Adjoin the enumerations of log files
- void AdjoinEnumLogFile(LIST *o, LIST *src)
- {
- UINT i;
- // Validate arguments
- if (o == NULL || src == NULL)
- {
- return;
- }
- for (i = 0;i < LIST_NUM(src);i++)
- {
- LOG_FILE *f = LIST_DATA(src, i);
- Insert(o, Clone(f, sizeof(LOG_FILE)));
- }
- }
- // Check whether the log file with the specified name is contained in the enumerated list
- bool CheckLogFileNameFromEnumList(LIST *o, char *name, char *server_name)
- {
- LOG_FILE t;
- // Validate arguments
- if (o == NULL || name == NULL || server_name == NULL)
- {
- return false;
- }
- Zero(&t, sizeof(t));
- StrCpy(t.Path, sizeof(t.Path), name);
- StrCpy(t.ServerName, sizeof(t.ServerName), server_name);
- if (Search(o, &t) == NULL)
- {
- return false;
- }
- return true;
- }
- // Release the log file enumeration
- void FreeEnumLogFile(LIST *o)
- {
- UINT i;
- // Validate arguments
- if (o == NULL)
- {
- return;
- }
- for (i = 0;i < LIST_NUM(o);i++)
- {
- LOG_FILE *f = LIST_DATA(o, i);
- Free(f);
- }
- ReleaseList(o);
- }
- // Enumerate the log files associated with the virtual HUB (All logs are listed in the case of server administrator)
- LIST *EnumLogFile(char *hubname)
- {
- char exe_dir[MAX_PATH];
- char tmp[MAX_PATH];
- LIST *o = NewListFast(CmpLogFile);
- DIRLIST *dir;
- if (StrLen(hubname) == 0)
- {
- hubname = NULL;
- }
- GetExeDir(exe_dir, sizeof(exe_dir));
- // Enumerate in the server_log
- if (hubname == NULL)
- {
- EnumLogFileDir(o, "server_log");
- }
- // Enumerate in the packet_log
- Format(tmp, sizeof(tmp), "%s/packet_log", exe_dir);
- dir = EnumDir(tmp);
- if (dir != NULL)
- {
- UINT i;
- for (i = 0;i < dir->NumFiles;i++)
- {
- DIRENT *e = dir->File[i];
- if (e->Folder)
- {
- char dir_name[MAX_PATH];
- if (hubname == NULL || StrCmpi(hubname, e->FileName) == 0)
- {
- Format(dir_name, sizeof(dir_name), "packet_log/%s", e->FileName);
- EnumLogFileDir(o, dir_name);
- }
- }
- }
- FreeDir(dir);
- }
- // Enumerate in the security_log
- Format(tmp, sizeof(tmp), "%s/security_log", exe_dir);
- dir = EnumDir(tmp);
- if (dir != NULL)
- {
- UINT i;
- for (i = 0;i < dir->NumFiles;i++)
- {
- DIRENT *e = dir->File[i];
- if (e->Folder)
- {
- char dir_name[MAX_PATH];
- if (hubname == NULL || StrCmpi(hubname, e->FileName) == 0)
- {
- Format(dir_name, sizeof(dir_name), "security_log/%s", e->FileName);
- EnumLogFileDir(o, dir_name);
- }
- }
- }
- FreeDir(dir);
- }
- return o;
- }
- // Enumerate log files in the specified directory
- void EnumLogFileDir(LIST *o, char *dirname)
- {
- UINT i;
- char exe_dir[MAX_PATH];
- char dir_full_path[MAX_PATH];
- DIRLIST *dir;
- // Validate arguments
- if (o == NULL || dirname == NULL)
- {
- return;
- }
- GetExeDir(exe_dir, sizeof(exe_dir));
- Format(dir_full_path, sizeof(dir_full_path), "%s/%s", exe_dir, dirname);
- dir = EnumDir(dir_full_path);
- if (dir == NULL)
- {
- return;
- }
- for (i = 0;i < dir->NumFiles;i++)
- {
- DIRENT *e = dir->File[i];
- if (e->Folder == false && e->FileSize > 0)
- {
- char full_path[MAX_PATH];
- char file_path[MAX_PATH];
- Format(file_path, sizeof(file_path), "%s/%s", dirname, e->FileName);
- Format(full_path, sizeof(full_path), "%s/%s", exe_dir, file_path);
- if (EndWith(file_path, ".log"))
- {
- LOG_FILE *f = ZeroMalloc(sizeof(LOG_FILE));
- StrCpy(f->Path, sizeof(f->Path), file_path);
- f->FileSize = (UINT)(MIN(e->FileSize, 0xffffffffUL));
- f->UpdatedTime = e->UpdateDate;
- GetMachineName(f->ServerName, sizeof(f->ServerName));
- Insert(o, f);
- }
- }
- }
- FreeDir(dir);
- }
- // Log file list entry comparison
- int CmpLogFile(void *p1, void *p2)
- {
- LOG_FILE *f1, *f2;
- UINT i;
- if (p1 == NULL || p2 == NULL)
- {
- return 0;
- }
- f1 = *(LOG_FILE **)p1;
- f2 = *(LOG_FILE **)p2;
- if (f1 == NULL || f2 == NULL)
- {
- return 0;
- }
- i = StrCmpi(f1->Path, f2->Path);
- if (i != 0)
- {
- return i;
- }
- return StrCmpi(f1->ServerName, f2->ServerName);
- }
- // Get the Caps of the server
- UINT GetServerCapsInt(SERVER *s, char *name)
- {
- CAPSLIST t;
- UINT ret;
- // Validate arguments
- if (s == NULL || name == NULL)
- {
- return 0;
- }
- Zero(&t, sizeof(t));
- GetServerCaps(s, &t);
- ret = GetCapsInt(&t, name);
- return ret;
- }
- bool GetServerCapsBool(SERVER *s, char *name)
- {
- return (GetServerCapsInt(s, name) == 0) ? false : true;
- }
- // Initialize the Caps cache of the server
- void InitServerCapsCache(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- s->CapsCacheLock = NewLock();
- s->CapsListCache = NULL;
- }
- // Release the Caps cache of the server
- void FreeServerCapsCache(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- if (s->CapsListCache != NULL)
- {
- FreeCapsList(s->CapsListCache);
- s->CapsListCache = NULL;
- }
- DeleteLock(s->CapsCacheLock);
- }
- // Dispose the Caps cache of the server
- void DestroyServerCapsCache(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- Lock(s->CapsCacheLock);
- {
- if (s->CapsListCache != NULL)
- {
- FreeCapsList(s->CapsListCache);
- s->CapsListCache = NULL;
- }
- }
- Unlock(s->CapsCacheLock);
- }
- // Flush the Caps list for this server
- void FlushServerCaps(SERVER *s)
- {
- CAPSLIST t;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- DestroyServerCapsCache(s);
- Zero(&t, sizeof(t));
- GetServerCaps(s, &t);
- }
- // Get the Caps list for this server
- void GetServerCaps(SERVER *s, CAPSLIST *t)
- {
- // Validate arguments
- if (s == NULL || t == NULL)
- {
- return;
- }
- Lock(s->CapsCacheLock);
- {
- if (s->CapsListCache == NULL)
- {
- s->CapsListCache = ZeroMalloc(sizeof(CAPSLIST));
- GetServerCapsMain(s, s->CapsListCache);
- }
- Copy(t, s->CapsListCache, sizeof(s->CapsListCache));
- }
- Unlock(s->CapsCacheLock);
- }
- // Update the global server flags
- void UpdateGlobalServerFlags(SERVER *s, CAPSLIST *t)
- {
- bool is_restricted = false;
- // Validate arguments
- if (s == NULL || t == NULL)
- {
- return;
- }
- is_restricted = SiIsEnterpriseFunctionsRestrictedOnOpenSource(s->Cedar);
- SetGlobalServerFlag(GSF_DISABLE_PUSH_ROUTE, is_restricted);
- SetGlobalServerFlag(GSF_DISABLE_RADIUS_AUTH, is_restricted);
- SetGlobalServerFlag(GSF_DISABLE_CERT_AUTH, is_restricted);
- SetGlobalServerFlag(GSF_DISABLE_DEEP_LOGGING, is_restricted);
- SetGlobalServerFlag(GSF_DISABLE_AC, is_restricted);
- SetGlobalServerFlag(GSF_DISABLE_SYSLOG, is_restricted);
- }
- // Set a global server flag
- void SetGlobalServerFlag(UINT index, UINT value)
- {
- // Validate arguments
- if (index >= NUM_GLOBAL_SERVER_FLAGS)
- {
- return;
- }
- global_server_flags[index] = value;
- }
- // Get a global server flag
- UINT GetGlobalServerFlag(UINT index)
- {
- // Validate arguments
- if (index >= NUM_GLOBAL_SERVER_FLAGS)
- {
- return 0;
- }
- return global_server_flags[index];
- }
- // Main of the aquisition of Caps of the server
- void GetServerCapsMain(SERVER *s, CAPSLIST *t)
- {
- bool is_restricted = false;
- // Validate arguments
- if (s == NULL || t == NULL)
- {
- return;
- }
- is_restricted = SiIsEnterpriseFunctionsRestrictedOnOpenSource(s->Cedar);
- // Initialize
- InitCapsList(t);
- // Maximum Ethernet packet size
- AddCapsInt(t, "i_max_packet_size", MAX_PACKET_SIZE);
- if (s->Cedar->Bridge == false)
- {
- UINT max_sessions, max_clients, max_bridges, max_user_creations;
- max_clients = INFINITE;
- max_bridges = INFINITE;
- max_sessions = SERVER_MAX_SESSIONS_FOR_CARRIER_EDITION;
- max_user_creations = INFINITE;
- // Maximum number of virtual HUBs
- AddCapsInt(t, "i_max_hubs", SERVER_MAX_SESSIONS_FOR_CARRIER_EDITION);
- // The maximum number of concurrent sessions
- AddCapsInt(t, "i_max_sessions", max_sessions);
- // Maximum number of creatable users
- AddCapsInt(t, "i_max_user_creation", max_user_creations);
- // Maximum number of clients
- AddCapsInt(t, "i_max_clients", max_clients);
- // Maximum number of bridges
- AddCapsInt(t, "i_max_bridges", max_bridges);
- if (s->ServerType != SERVER_TYPE_FARM_MEMBER)
- {
- // Maximum number of registrable users / Virtual HUB
- AddCapsInt(t, "i_max_users_per_hub", MAX_USERS);
- // Maximum number of registrable groups / Virtual HUB
- AddCapsInt(t, "i_max_groups_per_hub", MAX_GROUPS);
- // Maximum number of registrable access list entries / Virtual HUB
- AddCapsInt(t, "i_max_access_lists", MAX_ACCESSLISTS);
- }
- else
- {
- // Maximum number of registrable users / Virtual HUB
- AddCapsInt(t, "i_max_users_per_hub", 0);
- // Maximum number of registrable groups / Virtual HUB
- AddCapsInt(t, "i_max_groups_per_hub", 0);
- // Maximum number of registrable access list entries / Virtual HUB
- AddCapsInt(t, "i_max_access_lists", 0);
- }
- // The policy related to multiple logins
- AddCapsBool(t, "b_support_limit_multilogin", true);
- // QoS / VoIP
- AddCapsBool(t, "b_support_qos", true);
- // syslog
- AddCapsBool(t, "b_support_syslog", true);
- // IPsec
- // (Only works in stand-alone mode currently)
- AddCapsBool(t, "b_support_ipsec", (s->ServerType == SERVER_TYPE_STANDALONE));
- // SSTP
- // (Only works in stand-alone mode currently)
- AddCapsBool(t, "b_support_sstp", (s->ServerType == SERVER_TYPE_STANDALONE));
- // OpenVPN
- // (Only works in stand-alone mode currently)
- AddCapsBool(t, "b_support_openvpn", (s->ServerType == SERVER_TYPE_STANDALONE));
- // DDNS
- AddCapsBool(t, "b_support_ddns", (s->DDnsClient != NULL));
- if (s->DDnsClient != NULL)
- {
- // DDNS via Proxy
- AddCapsBool(t, "b_support_ddns_proxy", true);
- }
- // VPN over ICMP, VPN over DNS
- AddCapsBool(t, "b_support_special_listener", true);
- }
- else
- {
- // Maximum number of virtual HUBs
- AddCapsInt(t, "i_max_hubs", 0);
- // The maximum number of concurrent sessions
- AddCapsInt(t, "i_max_sessions", 0);
- // Maximum number of clients
- AddCapsInt(t, "i_max_clients", 0);
- // Maximum number of bridges
- AddCapsInt(t, "i_max_bridges", 0);
- // Maximum number of registrable users / Virtual HUB
- AddCapsInt(t, "i_max_users_per_hub", 0);
- // Maximum number of registrable groups / Virtual HUB
- AddCapsInt(t, "i_max_groups_per_hub", 0);
- // Maximum number of registrable access list entries / Virtual HUB
- AddCapsInt(t, "i_max_access_lists", 0);
- // QoS / VoIP
- AddCapsBool(t, "b_support_qos", true);
- // syslog
- AddCapsBool(t, "b_support_syslog", true);
- // IPsec
- AddCapsBool(t, "b_support_ipsec", false);
- // SSTP
- AddCapsBool(t, "b_support_sstp", false);
- // OpenVPN
- AddCapsBool(t, "b_support_openvpn", false);
- // DDNS
- AddCapsBool(t, "b_support_ddns", false);
- // VPN over ICMP, VPN over DNS
- AddCapsBool(t, "b_support_special_listener", false);
- }
- // Changing the type of Virtual HUB in cluster is prohibited
- AddCapsBool(t, "b_cluster_hub_type_fixed", true);
- // Maximum MAC address table size / Virtual HUB
- AddCapsInt(t, "i_max_mac_tables", MAX_MAC_TABLES);
- // Maximum IP address table size / Virtual HUB
- AddCapsInt(t, "i_max_ip_tables", MAX_IP_TABLES);
- // SecureNAT function is available
- AddCapsBool(t, "b_support_securenat", true);
- // Pushing routing table function of SecureNAT Virtual DHCP Server is available
- AddCapsBool(t, "b_suppport_push_route", !is_restricted);
- AddCapsBool(t, "b_suppport_push_route_config", true);
- if (s->ServerType != SERVER_TYPE_STANDALONE)
- {
- AddCapsBool(t, "b_virtual_nat_disabled", true);
- }
- // Maximum NAT table size / Virtual HUB
- AddCapsInt(t, "i_max_secnat_tables", NAT_MAX_SESSIONS);
- // Cascade connction
- if (s->ServerType == SERVER_TYPE_STANDALONE)
- {
- AddCapsBool(t, "b_support_cascade", true);
- }
- else
- {
- AddCapsBool(t, "b_support_cascade", false);
- }
- if (s->Cedar->Bridge)
- {
- // Bridge mode
- AddCapsBool(t, "b_bridge", true);
- }
- else if (s->ServerType == SERVER_TYPE_STANDALONE)
- {
- // Stand-alone mode
- AddCapsBool(t, "b_standalone", true);
- }
- else if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
- {
- // Cluster controller mode
- AddCapsBool(t, "b_cluster_controller", true);
- }
- else
- {
- // Cluster member mode
- AddCapsBool(t, "b_cluster_member", true);
- }
- // Virtual HUB is modifiable
- AddCapsBool(t, "b_support_config_hub", s->ServerType != SERVER_TYPE_FARM_MEMBER &&
- s->Cedar->Bridge == false);
- // VPN client can be connected
- AddCapsBool(t, "b_vpn_client_connect", s->Cedar->Bridge == false ? true : false);
- // External authentication server is available
- AddCapsBool(t, "b_support_radius", s->ServerType != SERVER_TYPE_FARM_MEMBER &&
- s->Cedar->Bridge == false);
- // Local-bridge function is available
- AddCapsBool(t, "b_local_bridge", IsBridgeSupported());
- if (OS_IS_WINDOWS(GetOsInfo()->OsType))
- {
- // Packet capture driver is not installed
- AddCapsBool(t, "b_must_install_pcap", IsEthSupported() == false ? true : false);
- }
- else
- {
- // Regard that the driver is installed in the Linux version
- AddCapsBool(t, "b_must_install_pcap", false);
- }
- if (IsBridgeSupported())
- {
- // Tun / tap device is available (only Linux)
- AddCapsBool(t, "b_tap_supported", GetOsInfo()->OsType == OSTYPE_LINUX ? true : false);
- }
- // Cascade connction
- if (s->ServerType == SERVER_TYPE_STANDALONE)
- {
- AddCapsBool(t, "b_support_cascade", true);
- }
- else
- {
- AddCapsBool(t, "b_support_cascade", false);
- }
- // Server authentication can be used in cascade connection
- AddCapsBool(t, "b_support_cascade_cert", true);
- // the log file settings is modifiable
- AddCapsBool(t, "b_support_config_log", s->ServerType != SERVER_TYPE_FARM_MEMBER);
- // Automatic deletion of log file is available
- AddCapsBool(t, "b_support_autodelete", true);
- // Config file operation is available
- AddCapsBool(t, "b_support_config_rw", true);
- // Attribute of each Virtual HUB can be set
- AddCapsBool(t, "b_support_hub_admin_option", true);
- // Client certificate can be set in a cascade connection
- AddCapsBool(t, "b_support_cascade_client_cert", true);
- // Virtual HUB can be hidden
- AddCapsBool(t, "b_support_hide_hub", true);
- // Integrated management
- AddCapsBool(t, "b_support_cluster_admin", true);
- // Flag of open-source version
- AddCapsBool(t, "b_is_softether", true);
- if (s->Cedar->Bridge == false)
- {
- // The virtual layer 3 switch function is available
- AddCapsBool(t, "b_support_layer3", true);
- AddCapsInt(t, "i_max_l3_sw", MAX_NUM_L3_SWITCH);
- AddCapsInt(t, "i_max_l3_if", MAX_NUM_L3_IF);
- AddCapsInt(t, "i_max_l3_table", MAX_NUM_L3_TABLE);
- // Can act as a part of a cluster
- AddCapsBool(t, "b_support_cluster", true);
- }
- else
- {
- AddCapsBool(t, "b_support_layer3", false);
- AddCapsInt(t, "i_max_l3_sw", 0);
- AddCapsInt(t, "i_max_l3_if", 0);
- AddCapsInt(t, "i_max_l3_table", 0);
- AddCapsBool(t, "b_support_cluster", false);
- }
- if (s->ServerType != SERVER_TYPE_FARM_MEMBER && s->Cedar->Bridge == false)
- {
- // Support for CRL
- AddCapsBool(t, "b_support_crl", true);
- // Supports AC
- AddCapsBool(t, "b_support_ac", true);
- }
- // Supports downloading a log file
- AddCapsBool(t, "b_support_read_log", true);
- // Cascade connection can be renamed
- AddCapsBool(t, "b_support_rename_cascade", true);
- if (s->Cedar->Beta)
- {
- // Beta version
- AddCapsBool(t, "b_beta_version", true);
- }
- // VM discrimination
- AddCapsBool(t, "b_is_in_vm", s->IsInVm);
- // Support for display name of the network connection for the local bridge
- #ifdef OS_WIN32
- if (IsBridgeSupported() && IsNt() && GetOsInfo()->OsType >= OSTYPE_WINDOWS_2000_PROFESSIONAL)
- {
- AddCapsBool(t, "b_support_network_connection_name", true);
- }
- #else // OS_WIN32
- if (IsBridgeSupported() && EthIsInterfaceDescriptionSupportedUnix())
- {
- AddCapsBool(t, "b_support_network_connection_name", true);
- }
- #endif // OS_WIN32
- // Support for MAC address filtering
- AddCapsBool(t, "b_support_check_mac", true);
- // Support for status check of the TCP connection
- AddCapsBool(t, "b_support_check_tcp_state", true);
- // Can specify multiple server and retry intervals in Radius authentication
- AddCapsBool(t, "b_support_radius_retry_interval_and_several_servers", s->ServerType != SERVER_TYPE_FARM_MEMBER &&
- s->Cedar->Bridge == false);
- // Can manage the ID of the tagged VLAN in the MAC address table
- AddCapsBool(t, "b_support_vlan", true);
- // Support for Virtual HUB extended options
- if ((s->Cedar->Bridge == false) &&
- (s->ServerType == SERVER_TYPE_STANDALONE || s->ServerType == SERVER_TYPE_FARM_CONTROLLER))
- {
- AddCapsBool(t, "b_support_hub_ext_options", true);
- }
- else
- {
- AddCapsBool(t, "b_support_hub_ext_options", false);
- }
- // Support for Security Policy version 3.0
- AddCapsBool(t, "b_support_policy_ver_3", true);
- // Support for IPv6 access list
- AddCapsBool(t, "b_support_ipv6_acl", true);
- // Support for setting of delay, jitter and packet loss in the access list
- AddCapsBool(t, "b_support_ex_acl", true);
- // Support for URL redirection in the access list
- AddCapsBool(t, "b_support_redirect_url_acl", true);
- // Supports the specification by the group name in the access list
- AddCapsBool(t, "b_support_acl_group", true);
- // Support for IPv6 in connection source IP restriction list
- AddCapsBool(t, "b_support_ipv6_ac", true);
- // Support for VLAN tagged packet transmission configuration tool
- AddCapsBool(t, "b_support_eth_vlan", (OS_IS_WINDOWS_NT(GetOsType()) && GET_KETA(GetOsType(), 100) >= 2));
- // Support for the message display function when the VPN connect to the Virtual HUB
- AddCapsBool(t, "b_support_msg", true);
- // UDP acceleration feature
- AddCapsBool(t, "b_support_udp_acceleration", true);
- // Intel AES Acceleration function
- AddCapsBool(t, "b_support_intel_aes", IsIntelAesNiSupported());
- #ifdef OS_WIN32
- // SeLow driver
- AddCapsBool(t, "b_using_selow_driver", Win32IsUsingSeLow());
- #endif // OS_WIN32
- // VPN Azure function
- AddCapsBool(t, "b_support_azure", SiIsAzureSupported(s));
- // VPN3
- AddCapsBool(t, "b_vpn3", true);
- // VPN4
- AddCapsBool(t, "b_vpn4", true);
- UpdateGlobalServerFlags(s, t);
- }
- // SYSLOG_SETTING
- void InRpcSysLogSetting(SYSLOG_SETTING *t, PACK *p)
- {
- // Validate arguments
- if (t == NULL || p == NULL)
- {
- return;
- }
- Zero(t, sizeof(SYSLOG_SETTING));
- t->SaveType = PackGetInt(p, "SaveType");
- t->Port = PackGetInt(p, "Port");
- PackGetStr(p, "Hostname", t->Hostname, sizeof(t->Hostname));
- }
- void OutRpcSysLogSetting(PACK *p, SYSLOG_SETTING *t)
- {
- // Validate arguments
- if (t == NULL || p == NULL)
- {
- return;
- }
- PackAddInt(p, "SaveType", t->SaveType);
- PackAddInt(p, "Port", t->Port);
- PackAddStr(p, "Hostname", t->Hostname);
- }
- // CAPSLIST
- void InitCapsList(CAPSLIST *t)
- {
- // Validate arguments
- if (t == NULL)
- {
- return;
- }
- Zero(t, sizeof(CAPSLIST));
- t->CapsList = NewListFast(NULL);
- }
- void InRpcCapsList(CAPSLIST *t, PACK *p)
- {
- UINT i;
- // Validate arguments
- if (t == NULL || p == NULL)
- {
- return;
- }
- Zero(t, sizeof(CAPSLIST));
- t->CapsList = NewListFast(CompareCaps);
- for (i = 0;i < LIST_NUM(p->elements);i++)
- {
- ELEMENT *e = LIST_DATA(p->elements, i);
- if (StartWith(e->name, "caps_") && e->type == VALUE_INT && e->num_value == 1)
- {
- CAPS *c = NewCaps(e->name + 5, e->values[0]->IntValue);
- Insert(t->CapsList, c);
- }
- }
- }
- void OutRpcCapsList(PACK *p, CAPSLIST *t)
- {
- UINT i;
- // Validate arguments
- if (t == NULL || p == NULL)
- {
- return;
- }
- for (i = 0;i < LIST_NUM(t->CapsList);i++)
- {
- char tmp[MAX_SIZE];
- CAPS *c = LIST_DATA(t->CapsList, i);
- Format(tmp, sizeof(tmp), "caps_%s", c->Name);
- PackAddInt(p, tmp, c->Value);
- }
- }
- void FreeRpcCapsList(CAPSLIST *t)
- {
- UINT i;
- // Validate arguments
- if (t == NULL)
- {
- return;
- }
- for (i = 0;i < LIST_NUM(t->CapsList);i++)
- {
- CAPS *c = LIST_DATA(t->CapsList, i);
- FreeCaps(c);
- }
- ReleaseList(t->CapsList);
- }
- // Add a bool type to Caps list
- void AddCapsBool(CAPSLIST *caps, char *name, bool b)
- {
- CAPS *c;
- // Validate arguments
- if (caps == NULL || name == NULL)
- {
- return;
- }
- c = NewCaps(name, b == false ? 0 : 1);
- AddCaps(caps, c);
- }
- // Add the int type to Caps list
- void AddCapsInt(CAPSLIST *caps, char *name, UINT i)
- {
- CAPS *c;
- // Validate arguments
- if (caps == NULL || name == NULL)
- {
- return;
- }
- c = NewCaps(name, i);
- AddCaps(caps, c);
- }
- // Get the int type from the Caps list
- UINT GetCapsInt(CAPSLIST *caps, char *name)
- {
- CAPS *c;
- // Validate arguments
- if (caps == NULL || name == NULL)
- {
- return 0;
- }
- c = GetCaps(caps, name);
- if (c == NULL)
- {
- return 0;
- }
- return c->Value;
- }
- // Get bool type from the Caps list
- bool GetCapsBool(CAPSLIST *caps, char *name)
- {
- CAPS *c;
- // Validate arguments
- if (caps == NULL || name == NULL)
- {
- return false;
- }
- c = GetCaps(caps, name);
- if (c == NULL)
- {
- return false;
- }
- return c->Value == 0 ? false : true;
- }
- // Release the Caps list
- void FreeCapsList(CAPSLIST *caps)
- {
- UINT i;
- // Validate arguments
- if (caps == NULL)
- {
- return;
- }
- for (i = 0;i < LIST_NUM(caps->CapsList);i++)
- {
- CAPS *c = LIST_DATA(caps->CapsList, i);
- FreeCaps(c);
- }
- ReleaseList(caps->CapsList);
- Free(caps);
- }
- // Get the Caps
- CAPS *GetCaps(CAPSLIST *caps, char *name)
- {
- UINT i;
- // Validate arguments
- if (caps == NULL || name == NULL)
- {
- return NULL;
- }
- for (i = 0;i < LIST_NUM(caps->CapsList);i++)
- {
- CAPS *c = LIST_DATA(caps->CapsList, i);
- if (StrCmpi(c->Name, name) == 0)
- {
- return c;
- }
- }
- return NULL;
- }
- // Add to the Caps
- void AddCaps(CAPSLIST *caps, CAPS *c)
- {
- // Validate arguments
- if (caps == NULL || c == NULL)
- {
- return;
- }
- Insert(caps->CapsList, c);
- }
- // Comparison of Caps
- int CompareCaps(void *p1, void *p2)
- {
- CAPS *c1, *c2;
- if (p1 == NULL || p2 == NULL)
- {
- return 0;
- }
- c1 = *(CAPS **)p1;
- c2 = *(CAPS **)p2;
- if (c1 == NULL || c2 == NULL)
- {
- return 0;
- }
- return StrCmpi(c1->Name, c2->Name);
- }
- // Create a Caps list
- CAPSLIST *NewCapsList()
- {
- CAPSLIST *caps = ZeroMalloc(sizeof(CAPSLIST));
- caps->CapsList = NewListFast(CompareCaps);
- return caps;
- }
- // Release the Caps
- void FreeCaps(CAPS *c)
- {
- // Validate arguments
- if (c == NULL)
- {
- return;
- }
- Free(c->Name);
- Free(c);
- }
- // Create a Caps
- CAPS *NewCaps(char *name, UINT value)
- {
- CAPS *c;
- // Validate arguments
- if (name == NULL)
- {
- return NULL;
- }
- c = ZeroMalloc(sizeof(CAPS));
- c->Name = CopyStr(name);
- c->Value = value;
- return c;
- }
- // Calculate the score from the current number of connections and weight
- UINT SiCalcPoint(SERVER *s, UINT num, UINT weight)
- {
- UINT server_max_sessions = SERVER_MAX_SESSIONS;
- if (s == NULL)
- {
- return 0;
- }
- if (weight == 0)
- {
- weight = 100;
- }
- server_max_sessions = GetServerCapsInt(s, "i_max_sessions");
- return (UINT)(((double)server_max_sessions -
- MIN((double)num * 100.0 / (double)weight, (double)server_max_sessions))
- * (double)FARM_BASE_POINT / (double)server_max_sessions);
- }
- // Get the server score
- UINT SiGetPoint(SERVER *s)
- {
- UINT num_session;
- // Validate arguments
- if (s == NULL)
- {
- return 0;
- }
- num_session = Count(s->Cedar->CurrentSessions);
- return SiCalcPoint(s, num_session, s->Weight);
- }
- // Generate the default certificate
- void SiGenerateDefaultCert(X **server_x, K **server_k)
- {
- SiGenerateDefaultCertEx(server_x, server_k, NULL);
- }
- void SiGenerateDefaultCertEx(X **server_x, K **server_k, char *common_name)
- {
- X *x;
- K *private_key, *public_key;
- NAME *name;
- char tmp[MAX_SIZE];
- wchar_t cn[MAX_SIZE];
- // Validate arguments
- if (server_x == NULL || server_k == NULL)
- {
- return;
- }
- // Create a key pair
- RsaGen(&private_key, &public_key, 2048);
- if (IsEmptyStr(common_name))
- {
- // Get the host name
- StrCpy(tmp, sizeof(tmp), "server.softether.vpn");
- GetMachineName(tmp, sizeof(tmp));
- StrToUni(cn, sizeof(cn), tmp);
- }
- else
- {
- StrToUni(cn, sizeof(cn), common_name);
- }
- name = NewName(cn, cn, cn,
- L"US", NULL, NULL);
- x = NewRootX(public_key, private_key, name, MAX(GetDaysUntil2038(), SERVER_DEFAULT_CERT_DAYS), NULL);
- *server_x = x;
- *server_k = private_key;
- FreeName(name);
- FreeK(public_key);
- }
- // Set the server certificate to default
- void SiInitDefaultServerCert(SERVER *s)
- {
- X *x = NULL;
- K *k = NULL;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- // Generate a server certificate and private key
- SiGenerateDefaultCert(&x, &k);
- // Configure
- SetCedarCert(s->Cedar, x, k);
- FreeX(x);
- FreeK(k);
- }
- // Set the encryption algorithm name to default
- void SiInitCipherName(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- SetCedarCipherList(s->Cedar, SERVER_DEFAULT_CIPHER_NAME);
- }
- // Initialize the listener list
- void SiInitListenerList(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- SiLockListenerList(s);
- {
- {
- // Register the 4 ports (443, 992, 1194, 8888) as the default port
- SiAddListener(s, SERVER_DEF_PORTS_1, true);
- SiAddListener(s, SERVER_DEF_PORTS_2, true);
- SiAddListener(s, SERVER_DEF_PORTS_3, true);
- SiAddListener(s, SERVER_DEF_PORTS_4, true);
- }
- }
- SiUnlockListenerList(s);
- }
- // Remove the listener
- bool SiDeleteListener(SERVER *s, UINT port)
- {
- SERVER_LISTENER *e;
- // Validate arguments
- if (s == NULL || port == 0)
- {
- return false;
- }
- e = SiGetListener(s, port);
- if (e == NULL)
- {
- return false;
- }
- // Stop if still alive
- SiDisableListener(s, port);
- if (e->Listener != NULL)
- {
- ReleaseListener(e->Listener);
- }
- Delete(s->ServerListenerList, e);
- Free(e);
- return true;
- }
- // Compare the SERVER_LISTENER
- int CompareServerListener(void *p1, void *p2)
- {
- SERVER_LISTENER *s1, *s2;
- if (p1 == NULL || p2 == NULL)
- {
- return 0;
- }
- s1 = *(SERVER_LISTENER **)p1;
- s2 = *(SERVER_LISTENER **)p2;
- if (s1 == NULL || s2 == NULL)
- {
- return 0;
- }
- if (s1->Port > s2->Port)
- {
- return 1;
- }
- else if (s1->Port < s2->Port)
- {
- return -1;
- }
- else
- {
- return 0;
- }
- }
- // Stop the listener
- bool SiDisableListener(SERVER *s, UINT port)
- {
- SERVER_LISTENER *e;
- // Validate arguments
- if (s == NULL || port == 0)
- {
- return false;
- }
- // Get the listener
- e = SiGetListener(s, port);
- if (e == NULL)
- {
- return false;
- }
- if (e->Enabled == false || e->Listener == NULL)
- {
- // Already stopped
- return true;
- }
- // Stop the listener
- StopListener(e->Listener);
- // Release the listener
- ReleaseListener(e->Listener);
- e->Listener = NULL;
- e->Enabled = false;
- return true;
- }
- // Start the listener
- bool SiEnableListener(SERVER *s, UINT port)
- {
- SERVER_LISTENER *e;
- // Validate arguments
- if (s == NULL || port == 0)
- {
- return false;
- }
- // Get the listener
- e = SiGetListener(s, port);
- if (e == NULL)
- {
- return false;
- }
- if (e->Enabled)
- {
- // It has already started
- return true;
- }
- // Create a listener
- e->Listener = NewListener(s->Cedar, LISTENER_TCP, e->Port);
- if (e->Listener == NULL)
- {
- // Failure
- return false;
- }
- e->Listener->DisableDos = e->DisableDos;
- e->Enabled = true;
- return true;
- }
- // Get the listener
- SERVER_LISTENER *SiGetListener(SERVER *s, UINT port)
- {
- UINT i;
- // Validate arguments
- if (s == NULL || port == 0)
- {
- return NULL;
- }
- for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
- {
- SERVER_LISTENER *e = LIST_DATA(s->ServerListenerList, i);
- if (e->Port == port)
- {
- return e;
- }
- }
- return NULL;
- }
- // Add a listener
- bool SiAddListener(SERVER *s, UINT port, bool enabled)
- {
- return SiAddListenerEx(s, port, enabled, false);
- }
- bool SiAddListenerEx(SERVER *s, UINT port, bool enabled, bool disable_dos)
- {
- SERVER_LISTENER *e;
- UINT i;
- // Validate arguments
- if (s == NULL || port == 0)
- {
- return false;
- }
- // Check whether the listener exists already
- for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
- {
- e = LIST_DATA(s->ServerListenerList, i);
- if (e->Port == port)
- {
- // Already exist
- return false;
- }
- }
- // Register by initializing a new listener
- e = ZeroMalloc(sizeof(SERVER_LISTENER));
- e->Enabled = enabled;
- e->Port = port;
- e->DisableDos = disable_dos;
- if (e->Enabled)
- {
- // Create a listener
- e->Listener = NewListener(s->Cedar, LISTENER_TCP, e->Port);
- if (e->Listener != NULL)
- {
- e->Listener->DisableDos = e->DisableDos;
- }
- }
- Insert(s->ServerListenerList, e);
- return true;
- }
- // Lock the listener list
- void SiLockListenerList(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- LockList(s->ServerListenerList);
- }
- // Unlock the listener list
- void SiUnlockListenerList(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- UnlockList(s->ServerListenerList);
- }
- // Initialize the Bridge
- void SiInitBridge(SERVER *s)
- {
- HUB *h;
- HUB_OPTION o;
- HUB_LOG g;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- Zero(&o, sizeof(o));
- o.MaxSession = 0;
- h = NewHub(s->Cedar, SERVER_DEFAULT_BRIDGE_NAME, &o);
- AddHub(s->Cedar, h);
- h->Offline = true;
- SetHubOnline(h);
- // Log settings
- SiSetDefaultLogSetting(&g);
- SetHubLogSetting(h, &g);
- ReleaseHub(h);
- }
- // Set the default value of the Virtual HUB options
- void SiSetDefaultHubOption(HUB_OPTION *o)
- {
- // Validate arguments
- if (o == NULL)
- {
- return;
- }
- o->MaxSession = 0;
- o->VlanTypeId = MAC_PROTO_TAGVLAN;
- o->NoIPv6DefaultRouterInRAWhenIPv6 = true;
- o->ManageOnlyPrivateIP = true;
- o->ManageOnlyLocalUnicastIPv6 = true;
- o->NoMacAddressLog = true;
- o->NoDhcpPacketLogOutsideHub = true;
- o->AccessListIncludeFileCacheLifetime = ACCESS_LIST_INCLUDE_FILE_CACHE_LIFETIME;
- o->RemoveDefGwOnDhcpForLocalhost = true;
- }
- // Create a default virtual HUB
- void SiInitDefaultHubList(SERVER *s)
- {
- HUB *h;
- HUB_OPTION o;
- HUB_LOG g;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- Zero(&o, sizeof(o));
- // Configure a default Virtual HUB management options
- SiSetDefaultHubOption(&o);
- h = NewHub(s->Cedar, s->Cedar->Bridge == false ? SERVER_DEFAULT_HUB_NAME : SERVER_DEFAULT_BRIDGE_NAME, &o);
- h->CreatedTime = SystemTime64();
- AddHub(s->Cedar, h);
- if (s->Cedar->Bridge)
- {
- // Randomize the password
- Rand(h->HashedPassword, sizeof(h->HashedPassword));
- Rand(h->SecurePassword, sizeof(h->SecurePassword));
- }
- h->Offline = true;
- SetHubOnline(h);
- // Log settings
- SiSetDefaultLogSetting(&g);
- SetHubLogSetting(h, &g);
- {
- UINT i;
- for (i = 0;i < 0;i++)
- {
- char tmp[MAX_SIZE];
- USER *u;
- sprintf(tmp, "user%u", i);
- AcLock(h);
- u = NewUser(tmp, L"test", L"", AUTHTYPE_ANONYMOUS, NULL);
- AcAddUser(h, u);
- ReleaseUser(u);
- AcUnlock(h);
- }
- }
- ReleaseHub(h);
- }
- // Set the log settings to default
- void SiSetDefaultLogSetting(HUB_LOG *g)
- {
- // Validate arguments
- if (g == NULL)
- {
- return;
- }
- Zero(g, sizeof(HUB_LOG));
- g->SaveSecurityLog = true;
- g->SecurityLogSwitchType = LOG_SWITCH_DAY;
- g->SavePacketLog = true;
- g->PacketLogSwitchType = LOG_SWITCH_DAY;
- g->PacketLogConfig[PACKET_LOG_TCP_CONN] =
- g->PacketLogConfig[PACKET_LOG_DHCP] = PACKET_LOG_HEADER;
- }
- // Test
- void SiTest(SERVER *s)
- {
- }
- // Set the initial configuration
- void SiLoadInitialConfiguration(SERVER *s)
- {
- RPC_KEEP k;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- // Auto saving interval related
- s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
- s->BackupConfigOnlyWhenModified = true;
- s->Weight = FARM_DEFAULT_WEIGHT;
- // KEEP related
- Zero(&k, sizeof(k));
- {
- k.UseKeepConnect = true;
- }
- k.KeepConnectPort = 80;
- StrCpy(k.KeepConnectHost, sizeof(k.KeepConnectHost), CLIENT_DEFAULT_KEEPALIVE_HOST);
- k.KeepConnectInterval = KEEP_INTERVAL_DEFAULT * 1000;
- k.KeepConnectProtocol = CONNECTION_UDP;
- Lock(s->Keep->lock);
- {
- KEEP *keep = s->Keep;
- keep->Enable = k.UseKeepConnect;
- keep->Server = true;
- StrCpy(keep->ServerName, sizeof(keep->ServerName), k.KeepConnectHost);
- keep->ServerPort = k.KeepConnectPort;
- keep->UdpMode = k.KeepConnectProtocol;
- keep->Interval = k.KeepConnectInterval;
- }
- Unlock(s->Keep->lock);
- // Initialize the password
- {
- Hash(s->HashedPassword, "", 0, true);
- }
- // Set the encryption algorithm name to default
- SiInitCipherName(s);
- // Set the server certificate to default
- SiInitDefaultServerCert(s);
- // Create a default HUB
- {
- SiInitDefaultHubList(s);
- }
- if (s->Cedar->Bridge == false)
- {
- // Create a DDNS client
- s->DDnsClient = NewDDNSClient(s->Cedar, NULL, NULL);
- }
- // Set the listener list to default setting
- SiInitListenerList(s);
- if (s->Cedar->Bridge)
- {
- // SSTP, OpenVPN, and NAT traversal function can not be used in the bridge environment
- s->DisableNatTraversal = true;
- s->DisableSSTPServer = true;
- s->DisableOpenVPNServer = true;
- }
- else
- {
- // Enable the SSTP and OpenVPN for default setting
- OPENVPN_SSTP_CONFIG c;
- Zero(&c, sizeof(c));
- c.EnableOpenVPN = true;
- c.EnableSSTP = true;
- {
- ToStr(c.OpenVPNPortList, OPENVPN_UDP_PORT);
- }
- SiSetOpenVPNAndSSTPConfig(s, &c);
- {
- // Enable VPN-over-ICMP" and VPN-over-DNS for default setting
- s->EnableVpnOverIcmp = false;
- s->EnableVpnOverDns = false;
- }
- }
- s->Eraser = NewEraser(s->Logger, 0);
- }
- // Check whether the ports required for VPN-over-ICMP can be opened
- bool SiCanOpenVpnOverIcmpPort()
- {
- // Whether the ICMP can be opened
- SOCK *s = NewUDP(MAKE_SPECIAL_PORT(IP_PROTO_ICMPV4));
- if (s == NULL)
- {
- // Failure
- return false;
- }
- Disconnect(s);
- ReleaseSock(s);
- return true;
- }
- // Check whether the ports required for VPN-over-DNS can be opened
- bool SiCanOpenVpnOverDnsPort()
- {
- // Whether UDP Port 53 can be listen on
- SOCK *s = NewUDP(53);
- if (s == NULL)
- {
- // Listening failure
- return false;
- }
- Disconnect(s);
- ReleaseSock(s);
- return true;
- }
- // Read the configuration file (main)
- bool SiLoadConfigurationFileMain(SERVER *s, FOLDER *root)
- {
- // Validate arguments
- if (s == NULL || root == NULL)
- {
- return false;
- }
- return SiLoadConfigurationCfg(s, root);
- }
- // Read the configuration file
- bool SiLoadConfigurationFile(SERVER *s)
- {
- // Validate arguments
- bool ret = false;
- FOLDER *root;
- char *server_config_filename = SERVER_CONFIG_FILE_NAME;
- if (s == NULL)
- {
- return false;
- }
- s->CfgRw = NewCfgRw(&root,
- s->Cedar->Bridge == false ? server_config_filename : BRIDGE_CONFIG_FILE_NAME);
- if (server_reset_setting)
- {
- CfgDeleteFolder(root);
- root = NULL;
- server_reset_setting = false;
- }
- if (root == NULL)
- {
- return false;
- }
- ret = SiLoadConfigurationFileMain(s, root);
- CfgDeleteFolder(root);
- return ret;
- }
- // Initialize the configuration
- void SiInitConfiguration(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
- s->BackupConfigOnlyWhenModified = true;
- // IPsec server
- if (s->Cedar->Bridge == false)
- {
- s->IPsecServer = NewIPsecServer(s->Cedar);
- }
- // OpenVPN server (UDP)
- if (s->Cedar->Bridge == false)
- {
- s->OpenVpnServerUdp = NewOpenVpnServerUdp(s->Cedar);
- }
- SLog(s->Cedar, "LS_LOAD_CONFIG_1");
- if (SiLoadConfigurationFile(s) == false)
- {
- // Ethernet initialization
- InitEth();
- SLog(s->Cedar, "LS_LOAD_CONFIG_3");
- SiLoadInitialConfiguration(s);
- server_reset_setting = false;
- }
- else
- {
- SLog(s->Cedar, "LS_LOAD_CONFIG_2");
- }
- s->CfgRw->DontBackup = s->DontBackupConfig;
- // The arp_filter in Linux
- if (GetOsInfo()->OsType == OSTYPE_LINUX)
- {
- if (s->NoLinuxArpFilter == false)
- {
- SetLinuxArpFilter();
- }
- }
- if (s->DisableDosProction)
- {
- DisableDosProtect();
- }
- else
- {
- EnableDosProtect();
- }
- s->AutoSaveConfigSpanSaved = s->AutoSaveConfigSpan;
- // Create a VPN Azure client
- if (s->DDnsClient != NULL && s->Cedar->Bridge == false && s->ServerType == SERVER_TYPE_STANDALONE)
- {
- s->AzureClient = NewAzureClient(s->Cedar, s);
- AcSetEnable(s->AzureClient, s->EnableVpnAzure);
- }
- // Reduce the storage interval in the case of user mode
- #ifdef OS_WIN32
- if (MsIsUserMode())
- {
- s->AutoSaveConfigSpan = MIN(s->AutoSaveConfigSpan, SERVER_FILE_SAVE_INTERVAL_USERMODE);
- }
- #endif //OS_WIN32
- // Create a saving thread
- SLog(s->Cedar, "LS_INIT_SAVE_THREAD", s->AutoSaveConfigSpan / 1000);
- s->SaveHaltEvent = NewEvent();
- s->SaveThread = NewThread(SiSaverThread, s);
- }
- // Set the state of Enabled / Disabled of Azure Client
- void SiSetAzureEnable(SERVER *s, bool enabled)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- if (s->AzureClient != NULL)
- {
- AcSetEnable(s->AzureClient, enabled);
- }
- s->EnableVpnAzure = enabled;
- }
- // Get the state of Enabled / Disabled of Azure Client
- bool SiGetAzureEnable(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return false;
- }
- if (s->AzureClient != NULL)
- {
- return AcGetEnable(s->AzureClient);
- }
- else
- {
- return false;
- }
- }
- // Apply the Config to the Azure Client
- void SiApplyAzureConfig(SERVER *s, DDNS_CLIENT_STATUS *ddns_status)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- AcApplyCurrentConfig(s->AzureClient, ddns_status);
- }
- // Get whether the Azure Client is enabled
- bool SiIsAzureEnabled(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return false;
- }
- if (s->AzureClient == NULL)
- {
- return false;
- }
- return s->EnableVpnAzure;
- }
- // Get whether the Azure Client is supported
- bool SiIsAzureSupported(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return false;
- }
- if (s->AzureClient == NULL)
- {
- return false;
- }
- return true;
- }
- // Read the server settings from the CFG
- bool SiLoadConfigurationCfg(SERVER *s, FOLDER *root)
- {
- FOLDER *f1, *f2, *f3, *f4, *f5, *f6, *f7, *f8, *f;
- bool is_vgs_enabled = false;
- // Validate arguments
- if (s == NULL || root == NULL)
- {
- return false;
- }
- f = NULL;
- f1 = CfgGetFolder(root, "ServerConfiguration");
- f2 = CfgGetFolder(root, "VirtualHUB");
- f3 = CfgGetFolder(root, "ListenerList");
- f4 = CfgGetFolder(root, "LocalBridgeList");
- f5 = CfgGetFolder(root, "VirtualLayer3SwitchList");
- f6 = CfgGetFolder(root, "LicenseManager");
- f7 = CfgGetFolder(root, "IPsec");
- f8 = CfgGetFolder(root, "DDnsClient");
- if (f1 == NULL)
- {
- SLog(s->Cedar, "LS_BAD_CONFIG");
- return false;
- }
- #ifdef OS_WIN32
- if (f4 != NULL)
- {
- // Read the flag of using the SeLow driver
- bool b = true;
- if (CfgIsItem(f4, "EnableSoftEtherKernelModeDriver"))
- {
- b = CfgGetBool(f4, "EnableSoftEtherKernelModeDriver");
- }
- Win32SetEnableSeLow(b);
- }
- #endif // OS_WIN32
- // Ethernet initialization
- InitEth();
- s->ConfigRevision = CfgGetInt(root, "ConfigRevision");
- if (s->Cedar->Bridge == false && f6 != NULL)
- {
- if (GetServerCapsBool(s, "b_support_license"))
- {
- SiLoadLicenseManager(s, f6);
- }
- }
- DestroyServerCapsCache(s);
- SiLoadServerCfg(s, f1);
- if (s->ServerType != SERVER_TYPE_FARM_MEMBER)
- {
- SiLoadHubs(s, f2);
- }
- SiLoadListeners(s, f3);
- if (f4 != NULL)
- {
- SiLoadLocalBridges(s, f4);
- }
- if (s->Cedar->Bridge == false && f5 != NULL)
- {
- SiLoadL3Switchs(s, f5);
- }
- if (f7 != NULL && GetServerCapsBool(s, "b_support_ipsec"))
- {
- SiLoadIPsec(s, f7);
- }
- if (s->Cedar->Bridge == false)
- {
- if (f8 == NULL)
- {
- // Create a DDNS client with a new key
- s->DDnsClient = NewDDNSClient(s->Cedar, NULL, NULL);
- }
- else
- {
- // Create by reading the setting of the DDNS client
- UCHAR key[SHA1_SIZE];
- if (CfgGetBool(f8, "Disabled"))
- {
- // Disabled
- }
- else
- {
- char machine_name[MAX_SIZE];
- char machine_name2[MAX_SIZE];
- INTERNET_SETTING t;
- BUF *pw;
- // Proxy Setting
- Zero(&t, sizeof(t));
- t.ProxyType = CfgGetInt(f8, "ProxyType");
- CfgGetStr(f8, "ProxyHostName", t.ProxyHostName, sizeof(t.ProxyHostName));
- t.ProxyPort = CfgGetInt(f8, "ProxyPort");
- CfgGetStr(f8, "ProxyUsername", t.ProxyUsername, sizeof(t.ProxyUsername));
- pw = CfgGetBuf(f8, "ProxyPassword");
- if (pw != NULL)
- {
- char *pw_str = DecryptPassword(pw);
- StrCpy(t.ProxyPassword, sizeof(t.ProxyPassword), pw_str);
- Free(pw_str);
- FreeBuf(pw);
- }
- GetMachineHostName(machine_name, sizeof(machine_name));
- CfgGetStr(f8, "LocalHostname", machine_name2, sizeof(machine_name2));
- if (CfgGetByte(f8, "Key", key, sizeof(key)) != sizeof(key) || StrCmpi(machine_name, machine_name2) != 0)
- {
- // Create a DDNS client with a new key
- s->DDnsClient = NewDDNSClient(s->Cedar, NULL, &t);
- }
- else
- {
- // Create the DDNS client with stored key
- s->DDnsClient = NewDDNSClient(s->Cedar, key, &t);
- }
- }
- }
- }
- {
- HUB *h = NULL;
- // Remove the virtual HUB "VPNGATE" when VGS disabled
- LockHubList(s->Cedar);
- {
- h = GetHub(s->Cedar, VG_HUBNAME);
- }
- UnlockHubList(s->Cedar);
- if (h != NULL)
- {
- StopHub(h);
- DelHub(s->Cedar, h);
- ReleaseHub(h);
- }
- }
- s->IPsecMessageDisplayed = CfgGetBool(root, "IPsecMessageDisplayed");
- return true;
- }
- // Write the listener configuration
- void SiWriteListenerCfg(FOLDER *f, SERVER_LISTENER *r)
- {
- // Validate arguments
- if (f == NULL || r == NULL)
- {
- return;
- }
- CfgAddBool(f, "Enabled", r->Enabled);
- CfgAddInt(f, "Port", r->Port);
- CfgAddBool(f, "DisableDos", r->DisableDos);
- }
- // Read the listener configuration
- void SiLoadListenerCfg(SERVER *s, FOLDER *f)
- {
- bool enable;
- UINT port;
- bool disable_dos;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- enable = CfgGetBool(f, "Enabled");
- port = CfgGetInt(f, "Port");
- disable_dos = CfgGetBool(f, "DisableDos");
- if (port == 0)
- {
- return;
- }
- SiAddListenerEx(s, port, enable, disable_dos);
- }
- // Read the listener list
- void SiLoadListeners(SERVER *s, FOLDER *f)
- {
- TOKEN_LIST *t;
- UINT i;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- FOLDER *ff = CfgGetFolder(f, t->Token[i]);
- if (ff != NULL)
- {
- SiLoadListenerCfg(s, ff);
- }
- }
- FreeToken(t);
- }
- // Write the listener list
- void SiWriteListeners(FOLDER *f, SERVER *s)
- {
- // Validate arguments
- if (f == NULL || s == NULL)
- {
- return;
- }
- LockList(s->ServerListenerList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
- {
- SERVER_LISTENER *r = LIST_DATA(s->ServerListenerList, i);
- char name[MAX_SIZE];
- Format(name, sizeof(name), "Listener%u", i);
- SiWriteListenerCfg(CfgCreateFolder(f, name), r);
- }
- }
- UnlockList(s->ServerListenerList);
- }
- // Write the bridge
- void SiWriteLocalBridgeCfg(FOLDER *f, LOCALBRIDGE *br)
- {
- // Validate arguments
- if (f == NULL || br == NULL)
- {
- return;
- }
- CfgAddStr(f, "DeviceName", br->DeviceName);
- CfgAddStr(f, "HubName", br->HubName);
- CfgAddBool(f, "NoPromiscuousMode", br->Local);
- CfgAddBool(f, "MonitorMode", br->Monitor);
- CfgAddBool(f, "LimitBroadcast", br->LimitBroadcast);
- if (OS_IS_UNIX(GetOsInfo()->OsType))
- {
- CfgAddBool(f, "TapMode", br->TapMode);
- if (br->TapMode)
- {
- char tmp[MAX_SIZE];
- MacToStr(tmp, sizeof(tmp), br->TapMacAddress);
- CfgAddStr(f, "TapMacAddress", tmp);
- }
- }
- }
- // Write the bridge list
- void SiWriteLocalBridges(FOLDER *f, SERVER *s)
- {
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- #ifdef OS_WIN32
- CfgAddBool(f, "ShowAllInterfaces", Win32EthGetShowAllIf());
- CfgAddBool(f, "EnableSoftEtherKernelModeDriver", Win32GetEnableSeLow());
- #endif // OS_WIN32
- LockList(s->Cedar->LocalBridgeList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(s->Cedar->LocalBridgeList);i++)
- {
- LOCALBRIDGE *br = LIST_DATA(s->Cedar->LocalBridgeList, i);
- char name[MAX_SIZE];
- Format(name, sizeof(name), "LocalBridge%u", i);
- SiWriteLocalBridgeCfg(CfgCreateFolder(f, name), br);
- }
- }
- UnlockList(s->Cedar->LocalBridgeList);
- }
- // Read the bridge
- void SiLoadLocalBridgeCfg(SERVER *s, FOLDER *f)
- {
- char hub[MAX_SIZE];
- char nic[MAX_SIZE];
- bool tapmode = false;
- UCHAR tapaddr[6];
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- Zero(hub, sizeof(hub));
- Zero(nic, sizeof(nic));
- CfgGetStr(f, "HubName", hub, sizeof(hub));
- CfgGetStr(f, "DeviceName", nic, sizeof(nic));
- if (IsEmptyStr(hub) || IsEmptyStr(nic)
- )
- {
- return;
- }
- if (OS_IS_UNIX(GetOsInfo()->OsType))
- {
- if (CfgGetBool(f, "TapMode"))
- {
- char tmp[MAX_SIZE];
- tapmode = true;
- Zero(tapaddr, sizeof(tapaddr));
- if (CfgGetStr(f, "TapMacAddress", tmp, sizeof(tmp)))
- {
- BUF *b;
- b = StrToBin(tmp);
- if (b != NULL && b->Size == 6)
- {
- Copy(tapaddr, b->Buf, sizeof(tapaddr));
- }
- FreeBuf(b);
- }
- }
- }
- AddLocalBridge(s->Cedar, hub, nic, CfgGetBool(f, "NoPromiscuousMode"), CfgGetBool(f, "MonitorMode"),
- tapmode, tapaddr, CfgGetBool(f, "LimitBroadcast"));
- }
- // Read the bridge list
- void SiLoadLocalBridges(SERVER *s, FOLDER *f)
- {
- TOKEN_LIST *t;
- UINT i;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- #ifdef OS_WIN32
- Win32EthSetShowAllIf(CfgGetBool(f, "ShowAllInterfaces"));
- #endif // OS_WIN32
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- char *name = t->Token[i];
- SiLoadLocalBridgeCfg(s, CfgGetFolder(f, name));
- }
- FreeToken(t);
- }
- // Increment the configuration revision of the server
- void IncrementServerConfigRevision(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- s->ConfigRevision++;
- }
- // Write the server settings to CFG
- FOLDER *SiWriteConfigurationToCfg(SERVER *s)
- {
- FOLDER *root;
- char region[128];
- // Validate arguments
- if (s == NULL)
- {
- return NULL;
- }
- root = CfgCreateFolder(NULL, TAG_ROOT);
- SiGetCurrentRegion(s->Cedar, region, sizeof(region));
- CfgAddStr(root, "Region", region);
- CfgAddInt(root, "ConfigRevision", s->ConfigRevision);
- SiWriteListeners(CfgCreateFolder(root, "ListenerList"), s);
- SiWriteLocalBridges(CfgCreateFolder(root, "LocalBridgeList"), s);
- SiWriteServerCfg(CfgCreateFolder(root, "ServerConfiguration"), s);
- if (s->UpdatedServerType != SERVER_TYPE_FARM_MEMBER)
- {
- SiWriteHubs(CfgCreateFolder(root, "VirtualHUB"), s);
- }
- if (s->Cedar->Bridge == false)
- {
- SiWriteL3Switchs(CfgCreateFolder(root, "VirtualLayer3SwitchList"), s);
- if (GetServerCapsBool(s, "b_support_license"))
- {
- SiWriteLicenseManager(CfgCreateFolder(root, "LicenseManager"), s);
- }
- }
- if (s->Led)
- {
- CfgAddBool(root, "Led", true);
- CfgAddBool(root, "LedSpecial", s->LedSpecial);
- }
- if (GetServerCapsBool(s, "b_support_ipsec"))
- {
- SiWriteIPsec(CfgCreateFolder(root, "IPsec"), s);
- }
- if (s->Cedar->Bridge == false)
- {
- FOLDER *ddns_folder = CfgCreateFolder(root, "DDnsClient");
- if (s->DDnsClient == NULL)
- {
- // Disabled
- CfgAddBool(ddns_folder, "Disabled", true);
- }
- else
- {
- char machine_name[MAX_SIZE];
- BUF *pw;
- INTERNET_SETTING *t;
- // Enabled
- CfgAddBool(ddns_folder, "Disabled", false);
- CfgAddByte(ddns_folder, "Key", s->DDnsClient->Key, SHA1_SIZE);
- GetMachineHostName(machine_name, sizeof(machine_name));
- CfgAddStr(ddns_folder, "LocalHostname", machine_name);
- t = &s->DDnsClient->InternetSetting;
- CfgAddInt(ddns_folder, "ProxyType", t->ProxyType);
- CfgAddStr(ddns_folder, "ProxyHostName", t->ProxyHostName);
- CfgAddInt(ddns_folder, "ProxyPort", t->ProxyPort);
- CfgAddStr(ddns_folder, "ProxyUsername", t->ProxyUsername);
- if (IsEmptyStr(t->ProxyPassword) == false)
- {
- pw = EncryptPassword(t->ProxyPassword);
- CfgAddBuf(ddns_folder, "ProxyPassword", pw);
- FreeBuf(pw);
- }
- }
- }
- CfgAddBool(root, "IPsecMessageDisplayed", s->IPsecMessageDisplayed);
- return root;
- }
- // Read the policy
- void SiLoadPolicyCfg(POLICY *p, FOLDER *f)
- {
- // Validate arguments
- if (f == NULL || p == NULL)
- {
- return;
- }
- Zero(p, sizeof(POLICY));
- // Ver 2
- p->Access = CfgGetBool(f, "Access");
- p->DHCPFilter = CfgGetBool(f, "DHCPFilter");
- p->DHCPNoServer = CfgGetBool(f, "DHCPNoServer");
- p->DHCPForce = CfgGetBool(f, "DHCPForce");
- p->NoBridge = CfgGetBool(f, "NoBridge");
- p->NoRouting = CfgGetBool(f, "NoRouting");
- p->CheckMac = CfgGetBool(f, "CheckMac");
- p->CheckIP = CfgGetBool(f, "CheckIP");
- p->ArpDhcpOnly = CfgGetBool(f, "ArpDhcpOnly");
- p->PrivacyFilter = CfgGetBool(f, "PrivacyFilter");
- p->NoServer = CfgGetBool(f, "NoServer");
- p->NoBroadcastLimiter = CfgGetBool(f, "NoBroadcastLimiter");
- p->MonitorPort = CfgGetBool(f, "MonitorPort");
- p->MaxConnection = CfgGetInt(f, "MaxConnection");
- p->TimeOut = CfgGetInt(f, "TimeOut");
- p->MaxMac = CfgGetInt(f, "MaxMac");
- p->MaxIP = CfgGetInt(f, "MaxIP");
- p->MaxUpload = CfgGetInt(f, "MaxUpload");
- p->MaxDownload = CfgGetInt(f, "MaxDownload");
- p->FixPassword = CfgGetBool(f, "FixPassword");
- p->MultiLogins = CfgGetInt(f, "MultiLogins");
- p->NoQoS = CfgGetBool(f, "NoQoS");
- // Ver 3
- p->RSandRAFilter = CfgGetBool(f, "RSandRAFilter");
- p->RAFilter = CfgGetBool(f, "RAFilter");
- p->DHCPv6Filter = CfgGetBool(f, "DHCPv6Filter");
- p->DHCPv6NoServer = CfgGetBool(f, "DHCPv6NoServer");
- p->NoRoutingV6 = CfgGetBool(f, "NoRoutingV6");
- p->CheckIPv6 = CfgGetBool(f, "CheckIPv6");
- p->NoServerV6 = CfgGetBool(f, "NoServerV6");
- p->MaxIPv6 = CfgGetInt(f, "MaxIPv6");
- p->NoSavePassword = CfgGetBool(f, "NoSavePassword");
- p->AutoDisconnect = CfgGetInt(f, "AutoDisconnect");
- p->FilterIPv4 = CfgGetBool(f, "FilterIPv4");
- p->FilterIPv6 = CfgGetBool(f, "FilterIPv6");
- p->FilterNonIP = CfgGetBool(f, "FilterNonIP");
- p->NoIPv6DefaultRouterInRA = CfgGetBool(f, "NoIPv6DefaultRouterInRA");
- p->NoIPv6DefaultRouterInRAWhenIPv6 = CfgGetBool(f, "NoIPv6DefaultRouterInRAWhenIPv6");
- p->VLanId = CfgGetInt(f, "VLanId");
- }
- // Write the policy
- void SiWritePolicyCfg(FOLDER *f, POLICY *p, bool cascade_mode)
- {
- // Validate arguments
- if (f == NULL || p == NULL)
- {
- return;
- }
- // Ver 2.0
- if (cascade_mode == false)
- {
- CfgAddBool(f, "Access", p->Access);
- }
- CfgAddBool(f, "DHCPFilter", p->DHCPFilter);
- CfgAddBool(f, "DHCPNoServer", p->DHCPNoServer);
- CfgAddBool(f, "DHCPForce", p->DHCPForce);
- if (cascade_mode == false)
- {
- CfgAddBool(f, "NoBridge", p->NoBridge);
- CfgAddBool(f, "NoRouting", p->NoRouting);
- }
- CfgAddBool(f, "CheckMac", p->CheckMac);
- CfgAddBool(f, "CheckIP", p->CheckIP);
- CfgAddBool(f, "ArpDhcpOnly", p->ArpDhcpOnly);
- if (cascade_mode == false)
- {
- CfgAddBool(f, "PrivacyFilter", p->PrivacyFilter);
- }
- CfgAddBool(f, "NoServer", p->NoServer);
- CfgAddBool(f, "NoBroadcastLimiter", p->NoBroadcastLimiter);
- if (cascade_mode == false)
- {
- CfgAddBool(f, "MonitorPort", p->MonitorPort);
- CfgAddInt(f, "MaxConnection", p->MaxConnection);
- CfgAddInt(f, "TimeOut", p->TimeOut);
- }
- CfgAddInt(f, "MaxMac", p->MaxMac);
- CfgAddInt(f, "MaxIP", p->MaxIP);
- CfgAddInt(f, "MaxUpload", p->MaxUpload);
- CfgAddInt(f, "MaxDownload", p->MaxDownload);
- if (cascade_mode == false)
- {
- CfgAddBool(f, "FixPassword", p->FixPassword);
- CfgAddInt(f, "MultiLogins", p->MultiLogins);
- CfgAddBool(f, "NoQoS", p->NoQoS);
- }
- // Ver 3.0
- CfgAddBool(f, "RSandRAFilter", p->RSandRAFilter);
- CfgAddBool(f, "RAFilter", p->RAFilter);
- CfgAddBool(f, "DHCPv6Filter", p->DHCPv6Filter);
- CfgAddBool(f, "DHCPv6NoServer", p->DHCPv6NoServer);
- if (cascade_mode == false)
- {
- CfgAddBool(f, "NoRoutingV6", p->NoRoutingV6);
- }
- CfgAddBool(f, "CheckIPv6", p->CheckIPv6);
- CfgAddBool(f, "NoServerV6", p->NoServerV6);
- CfgAddInt(f, "MaxIPv6", p->MaxIPv6);
- if (cascade_mode == false)
- {
- CfgAddBool(f, "NoSavePassword", p->NoSavePassword);
- CfgAddInt(f, "AutoDisconnect", p->AutoDisconnect);
- }
- CfgAddBool(f, "FilterIPv4", p->FilterIPv4);
- CfgAddBool(f, "FilterIPv6", p->FilterIPv6);
- CfgAddBool(f, "FilterNonIP", p->FilterNonIP);
- CfgAddBool(f, "NoIPv6DefaultRouterInRA", p->NoIPv6DefaultRouterInRA);
- CfgAddBool(f, "NoIPv6DefaultRouterInRAWhenIPv6", p->NoIPv6DefaultRouterInRAWhenIPv6);
- CfgAddInt(f, "VLanId", p->VLanId);
- }
- // Write the link information of the Virtual HUB
- void SiWriteHubLinkCfg(FOLDER *f, LINK *k)
- {
- // Validate arguments
- if (f == NULL || k == NULL)
- {
- return;
- }
- Lock(k->lock);
- {
- // Online
- CfgAddBool(f, "Online", k->Offline ? false : true);
- // Client options
- CiWriteClientOption(CfgCreateFolder(f, "ClientOption"), k->Option);
- // Client authentication data
- CiWriteClientAuth(CfgCreateFolder(f, "ClientAuth"), k->Auth);
- // Policy
- if (k->Policy != NULL)
- {
- SiWritePolicyCfg(CfgCreateFolder(f, "Policy"), k->Policy, true);
- }
- CfgAddBool(f, "CheckServerCert", k->CheckServerCert);
- if (k->ServerCert != NULL)
- {
- BUF *b = XToBuf(k->ServerCert, false);
- CfgAddBuf(f, "ServerCert", b);
- FreeBuf(b);
- }
- }
- Unlock(k->lock);
- }
- // Read the link information
- void SiLoadHubLinkCfg(FOLDER *f, HUB *h)
- {
- bool online;
- CLIENT_OPTION *o;
- CLIENT_AUTH *a;
- FOLDER *pf;
- POLICY p;
- LINK *k;
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- pf = CfgGetFolder(f, "Policy");
- if (pf == NULL)
- {
- return;
- }
- SiLoadPolicyCfg(&p, pf);
- online = CfgGetBool(f, "Online");
- o = CiLoadClientOption(CfgGetFolder(f, "ClientOption"));
- a = CiLoadClientAuth(CfgGetFolder(f, "ClientAuth"));
- if (o == NULL || a == NULL)
- {
- Free(o);
- CiFreeClientAuth(a);
- return;
- }
- k = NewLink(h->Cedar, h, o, a, &p);
- if (k != NULL)
- {
- BUF *b;
- k->CheckServerCert = CfgGetBool(f, "CheckServerCert");
- b = CfgGetBuf(f, "ServerCert");
- if (b != NULL)
- {
- k->ServerCert = BufToX(b, false);
- FreeBuf(b);
- }
- if (online)
- {
- k->Offline = true;
- SetLinkOnline(k);
- }
- else
- {
- k->Offline = false;
- SetLinkOffline(k);
- }
- ReleaseLink(k);
- }
- Free(o);
- CiFreeClientAuth(a);
- }
- // Write the SecureNAT of the Virtual HUB
- void SiWriteSecureNAT(HUB *h, FOLDER *f)
- {
- // Validate arguments
- if (h == NULL || f == NULL)
- {
- return;
- }
- CfgAddBool(f, "Disabled", h->EnableSecureNAT ? false : true);
- NiWriteVhOptionEx(h->SecureNATOption, f);
- }
- // Read the administration options for the virtual HUB
- void SiLoadHubAdminOptions(HUB *h, FOLDER *f)
- {
- TOKEN_LIST *t;
- // Validate arguments
- if (h == NULL || f == NULL)
- {
- return;
- }
- t = CfgEnumItemToTokenList(f);
- if (t != NULL)
- {
- UINT i;
- LockList(h->AdminOptionList);
- {
- DeleteAllHubAdminOption(h, false);
- for (i = 0;i < t->NumTokens;i++)
- {
- char *name = t->Token[i];
- ADMIN_OPTION *a;
- UINT value = CfgGetInt(f, name);;
- Trim(name);
- a = ZeroMalloc(sizeof(ADMIN_OPTION));
- StrCpy(a->Name, sizeof(a->Name), name);
- a->Value = value;
- Insert(h->AdminOptionList, a);
- }
- AddHubAdminOptionsDefaults(h, false);
- }
- UnlockList(h->AdminOptionList);
- FreeToken(t);
- }
- }
- // Write the administration options for the virtual HUB
- void SiWriteHubAdminOptions(FOLDER *f, HUB *h)
- {
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- LockList(h->AdminOptionList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(h->AdminOptionList);i++)
- {
- ADMIN_OPTION *a = LIST_DATA(h->AdminOptionList, i);
- CfgAddInt(f, a->Name, a->Value);
- }
- }
- UnlockList(h->AdminOptionList);
- }
- // Write the link list of the Virtual HUB
- void SiWriteHubLinks(FOLDER *f, HUB *h)
- {
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- LockList(h->LinkList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(h->LinkList);i++)
- {
- LINK *k = LIST_DATA(h->LinkList, i);
- char name[MAX_SIZE];
- Format(name, sizeof(name), "Cascade%u", i);
- SiWriteHubLinkCfg(CfgCreateFolder(f, name), k);
- }
- }
- UnlockList(h->LinkList);
- }
- // Read the link list
- void SiLoadHubLinks(HUB *h, FOLDER *f)
- {
- TOKEN_LIST *t;
- UINT i;
- // Validate arguments
- if (h == NULL || f == NULL)
- {
- return;
- }
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- char *name = t->Token[i];
- SiLoadHubLinkCfg(CfgGetFolder(f, name), h);
- }
- FreeToken(t);
- }
- // Write an item of the access list
- void SiWriteHubAccessCfg(FOLDER *f, ACCESS *a)
- {
- // Validate arguments
- if (f == NULL || a == NULL)
- {
- return;
- }
- CfgAddUniStr(f, "Note", a->Note);
- CfgAddBool(f, "Active", a->Active);
- CfgAddInt(f, "Priority", a->Priority);
- CfgAddBool(f, "Discard", a->Discard);
- CfgAddBool(f, "IsIPv6", a->IsIPv6);
- if (a->IsIPv6 == false)
- {
- CfgAddIp32(f, "SrcIpAddress", a->SrcIpAddress);
- CfgAddIp32(f, "SrcSubnetMask", a->SrcSubnetMask);
- CfgAddIp32(f, "DestIpAddress", a->DestIpAddress);
- CfgAddIp32(f, "DestSubnetMask", a->DestSubnetMask);
- }
- else
- {
- CfgAddIp6Addr(f, "SrcIpAddress6", &a->SrcIpAddress6);
- CfgAddIp6Addr(f, "SrcSubnetMask6", &a->SrcSubnetMask6);
- CfgAddIp6Addr(f, "DestIpAddress6", &a->DestIpAddress6);
- CfgAddIp6Addr(f, "DestSubnetMask6", &a->DestSubnetMask6);
- }
- CfgAddInt(f, "Protocol", a->Protocol);
- CfgAddInt(f, "SrcPortStart", a->SrcPortStart);
- CfgAddInt(f, "SrcPortEnd", a->SrcPortEnd);
- CfgAddInt(f, "DestPortStart", a->DestPortStart);
- CfgAddInt(f, "DestPortEnd", a->DestPortEnd);
- CfgAddStr(f, "SrcUsername", a->SrcUsername);
- CfgAddStr(f, "DestUsername", a->DestUsername);
- CfgAddBool(f, "CheckSrcMac", a->CheckSrcMac);
- if (a->CheckSrcMac)
- {
- char tmp[MAX_PATH];
- MacToStr(tmp, sizeof(tmp), a->SrcMacAddress);
- CfgAddStr(f, "SrcMacAddress", tmp);
- MacToStr(tmp, sizeof(tmp), a->SrcMacMask);
- CfgAddStr(f, "SrcMacMask", tmp);
- }
- CfgAddBool(f, "CheckDstMac", a->CheckDstMac);
- if (a->CheckDstMac)
- {
- char tmp[MAX_PATH];
- MacToStr(tmp, sizeof(tmp), a->DstMacAddress);
- CfgAddStr(f, "DstMacAddress", tmp);
- MacToStr(tmp, sizeof(tmp), a->DstMacMask);
- CfgAddStr(f, "DstMacMask", tmp);
- }
- CfgAddBool(f, "CheckTcpState", a->CheckTcpState);
- CfgAddBool(f, "Established", a->Established);
- CfgAddStr(f, "RedirectUrl", a->RedirectUrl);
- CfgAddInt(f, "Delay", a->Delay);
- CfgAddInt(f, "Jitter", a->Jitter);
- CfgAddInt(f, "Loss", a->Loss);
- }
- // Read an item of the access list
- void SiLoadHubAccessCfg(HUB *h, FOLDER *f)
- {
- ACCESS a;
- char tmp[MAX_PATH];
- // Validate arguments
- if (h == NULL || f == NULL)
- {
- return;
- }
- Zero(&a, sizeof(a));
- CfgGetUniStr(f, "Note", a.Note, sizeof(a.Note));
- a.Active = CfgGetBool(f, "Active");
- a.Priority = CfgGetInt(f, "Priority");
- a.Discard = CfgGetBool(f, "Discard");
- a.IsIPv6 = CfgGetBool(f, "IsIPv6");
- if (a.IsIPv6 == false)
- {
- a.SrcIpAddress = CfgGetIp32(f, "SrcIpAddress");
- a.SrcSubnetMask = CfgGetIp32(f, "SrcSubnetMask");
- a.DestIpAddress = CfgGetIp32(f, "DestIpAddress");
- a.DestSubnetMask = CfgGetIp32(f, "DestSubnetMask");
- }
- else
- {
- CfgGetIp6Addr(f, "SrcIpAddress6", &a.SrcIpAddress6);
- CfgGetIp6Addr(f, "SrcSubnetMask6", &a.SrcSubnetMask6);
- CfgGetIp6Addr(f, "DestIpAddress6", &a.DestIpAddress6);
- CfgGetIp6Addr(f, "DestSubnetMask6", &a.DestSubnetMask6);
- }
- a.Protocol = CfgGetInt(f, "Protocol");
- a.SrcPortStart = CfgGetInt(f, "SrcPortStart");
- a.SrcPortEnd = CfgGetInt(f, "SrcPortEnd");
- a.DestPortStart = CfgGetInt(f, "DestPortStart");
- a.DestPortEnd = CfgGetInt(f, "DestPortEnd");
- CfgGetStr(f, "SrcUsername", a.SrcUsername, sizeof(a.SrcUsername));
- CfgGetStr(f, "DestUsername", a.DestUsername, sizeof(a.DestUsername));
- a.CheckSrcMac = CfgGetBool(f, "CheckSrcMac");
- if (CfgGetByte(f, "SrcMacAddress", a.SrcMacAddress, sizeof(a.SrcMacAddress)) == 0)
- {
- CfgGetStr(f, "SrcMacAddress", tmp, sizeof(tmp));
- if (StrToMac(a.SrcMacAddress, tmp) == false)
- {
- a.CheckSrcMac = false;
- }
- }
- if (CfgGetByte(f, "SrcMacMask", a.SrcMacMask, sizeof(a.SrcMacMask)) == 0)
- {
- CfgGetStr(f, "SrcMacMask", tmp, sizeof(tmp));
- if (StrToMac(a.SrcMacMask, tmp) == false)
- {
- a.CheckSrcMac = false;
- }
- }
- a.CheckDstMac = CfgGetBool(f, "CheckDstMac");
- if (CfgGetByte(f, "DstMacAddress", a.DstMacAddress, sizeof(a.DstMacAddress)) == 0)
- {
- CfgGetStr(f, "DstMacAddress", tmp, sizeof(tmp));
- if (StrToMac(a.DstMacAddress, tmp) == false)
- {
- a.CheckDstMac = false;
- }
- }
- if (CfgGetByte(f, "DstMacMask", a.DstMacMask, sizeof(a.DstMacMask)) == 0)
- {
- CfgGetStr(f, "DstMacMask", tmp, sizeof(tmp));
- if (StrToMac(a.DstMacMask, tmp) == false)
- {
- a.CheckDstMac = false;
- }
- }
- a.CheckTcpState = CfgGetBool(f, "CheckTcpState");
- a.Established = CfgGetBool(f, "Established");
- a.Delay = MAKESURE(CfgGetInt(f, "Delay"), 0, HUB_ACCESSLIST_DELAY_MAX);
- a.Jitter = MAKESURE(CfgGetInt(f, "Jitter"), 0, HUB_ACCESSLIST_JITTER_MAX);
- a.Loss = MAKESURE(CfgGetInt(f, "Loss"), 0, HUB_ACCESSLIST_LOSS_MAX);
- CfgGetStr(f, "RedirectUrl", a.RedirectUrl, sizeof(a.RedirectUrl));
- AddAccessList(h, &a);
- }
- // Write the access list
- void SiWriteHubAccessLists(FOLDER *f, HUB *h)
- {
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- LockList(h->AccessList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(h->AccessList);i++)
- {
- ACCESS *a = LIST_DATA(h->AccessList, i);
- char name[MAX_SIZE];
- ToStr(name, a->Id);
- SiWriteHubAccessCfg(CfgCreateFolder(f, name), a);
- }
- }
- UnlockList(h->AccessList);
- }
- // Read the access list
- void SiLoadHubAccessLists(HUB *h, FOLDER *f)
- {
- TOKEN_LIST *t;
- UINT i;
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- char *name = t->Token[i];
- UINT id = ToInt(name);
- SiLoadHubAccessCfg(h, CfgGetFolder(f, name));
- }
- FreeToken(t);
- }
- // Read the HUB_OPTION
- void SiLoadHubOptionCfg(FOLDER *f, HUB_OPTION *o)
- {
- char tmp[MAX_SIZE];
- // Validate arguments
- if (f == NULL || o == NULL)
- {
- return;
- }
- o->MaxSession = CfgGetInt(f, "MaxSession");
- o->NoArpPolling = CfgGetBool(f, "NoArpPolling");
- o->NoIPv6AddrPolling = CfgGetBool(f, "NoIPv6AddrPolling");
- o->NoIpTable = CfgGetBool(f, "NoIpTable");
- o->NoEnum = CfgGetBool(f, "NoEnum");
- o->FilterPPPoE = CfgGetBool(f, "FilterPPPoE");
- o->FilterOSPF = CfgGetBool(f, "FilterOSPF");
- o->FilterIPv4 = CfgGetBool(f, "FilterIPv4");
- o->FilterIPv6 = CfgGetBool(f, "FilterIPv6");
- o->FilterNonIP = CfgGetBool(f, "FilterNonIP");
- o->FilterBPDU = CfgGetBool(f, "FilterBPDU");
- o->NoIPv4PacketLog = CfgGetBool(f, "NoIPv4PacketLog");
- o->NoIPv6PacketLog = CfgGetBool(f, "NoIPv6PacketLog");
- o->NoIPv6DefaultRouterInRAWhenIPv6 = CfgGetBool(f, "NoIPv6DefaultRouterInRAWhenIPv6");
- o->DisableIPParsing = CfgGetBool(f, "DisableIPParsing");
- o->YieldAfterStorePacket = CfgGetBool(f, "YieldAfterStorePacket");
- o->NoSpinLockForPacketDelay = CfgGetBool(f, "NoSpinLockForPacketDelay");
- o->BroadcastStormDetectionThreshold = CfgGetInt(f, "BroadcastStormDetectionThreshold");
- o->ClientMinimumRequiredBuild = CfgGetInt(f, "ClientMinimumRequiredBuild");
- o->RequiredClientId = CfgGetInt(f, "RequiredClientId");
- o->NoManageVlanId = CfgGetBool(f, "NoManageVlanId");
- o->VlanTypeId = 0;
- if (CfgGetStr(f, "VlanTypeId", tmp, sizeof(tmp)))
- {
- o->VlanTypeId = HexToInt(tmp);
- }
- if (o->VlanTypeId == 0)
- {
- o->VlanTypeId = MAC_PROTO_TAGVLAN;
- }
- o->FixForDLinkBPDU = CfgGetBool(f, "FixForDLinkBPDU");
- o->BroadcastLimiterStrictMode = CfgGetBool(f, "BroadcastLimiterStrictMode");
- o->MaxLoggedPacketsPerMinute = CfgGetInt(f, "MaxLoggedPacketsPerMinute");
- o->DoNotSaveHeavySecurityLogs = CfgGetBool(f, "DoNotSaveHeavySecurityLogs");
- if (CfgIsItem(f, "DropBroadcastsInPrivacyFilterMode"))
- {
- o->DropBroadcastsInPrivacyFilterMode = CfgGetBool(f, "DropBroadcastsInPrivacyFilterMode");
- }
- else
- {
- o->DropBroadcastsInPrivacyFilterMode = true;
- }
- if (CfgIsItem(f, "DropArpInPrivacyFilterMode"))
- {
- o->DropArpInPrivacyFilterMode = CfgGetBool(f, "DropArpInPrivacyFilterMode");
- }
- else
- {
- o->DropArpInPrivacyFilterMode = true;
- }
- o->NoLookBPDUBridgeId = CfgGetBool(f, "NoLookBPDUBridgeId");
- o->AdjustTcpMssValue = CfgGetInt(f, "AdjustTcpMssValue");
- o->DisableAdjustTcpMss = CfgGetBool(f, "DisableAdjustTcpMss");
- if (CfgIsItem(f, "NoDhcpPacketLogOutsideHub"))
- {
- o->NoDhcpPacketLogOutsideHub = CfgGetBool(f, "NoDhcpPacketLogOutsideHub");
- }
- else
- {
- o->NoDhcpPacketLogOutsideHub = true;
- }
- o->DisableHttpParsing = CfgGetBool(f, "DisableHttpParsing");
- o->DisableUdpAcceleration = CfgGetBool(f, "DisableUdpAcceleration");
- o->DisableUdpFilterForLocalBridgeNic = CfgGetBool(f, "DisableUdpFilterForLocalBridgeNic");
- o->ApplyIPv4AccessListOnArpPacket = CfgGetBool(f, "ApplyIPv4AccessListOnArpPacket");
- if (CfgIsItem(f, "RemoveDefGwOnDhcpForLocalhost"))
- {
- o->RemoveDefGwOnDhcpForLocalhost = CfgGetBool(f, "RemoveDefGwOnDhcpForLocalhost");
- }
- else
- {
- o->RemoveDefGwOnDhcpForLocalhost = true;
- }
- o->SecureNAT_MaxTcpSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxTcpSessionsPerIp");
- o->SecureNAT_MaxTcpSynSentPerIp = CfgGetInt(f, "SecureNAT_MaxTcpSynSentPerIp");
- o->SecureNAT_MaxUdpSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxUdpSessionsPerIp");
- o->SecureNAT_MaxDnsSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxDnsSessionsPerIp");
- o->SecureNAT_MaxIcmpSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxIcmpSessionsPerIp");
- o->AccessListIncludeFileCacheLifetime = CfgGetInt(f, "AccessListIncludeFileCacheLifetime");
- if (o->AccessListIncludeFileCacheLifetime == 0)
- {
- o->AccessListIncludeFileCacheLifetime = ACCESS_LIST_INCLUDE_FILE_CACHE_LIFETIME;
- }
- o->DisableKernelModeSecureNAT = CfgGetBool(f, "DisableKernelModeSecureNAT");
- o->DisableUserModeSecureNAT = CfgGetBool(f, "DisableUserModeSecureNAT");
- o->DisableCheckMacOnLocalBridge = CfgGetBool(f, "DisableCheckMacOnLocalBridge");
- o->DisableCorrectIpOffloadChecksum = CfgGetBool(f, "DisableCorrectIpOffloadChecksum");
- o->SuppressClientUpdateNotification = CfgGetBool(f, "SuppressClientUpdateNotification");
- // Enabled by default
- if (CfgIsItem(f, "ManageOnlyPrivateIP"))
- {
- o->ManageOnlyPrivateIP = CfgGetBool(f, "ManageOnlyPrivateIP");
- }
- else
- {
- o->ManageOnlyPrivateIP = true;
- }
- if (CfgIsItem(f, "ManageOnlyLocalUnicastIPv6"))
- {
- o->ManageOnlyLocalUnicastIPv6 = CfgGetBool(f, "ManageOnlyLocalUnicastIPv6");
- }
- else
- {
- o->ManageOnlyLocalUnicastIPv6 = true;
- }
- if (CfgIsItem(f, "NoMacAddressLog"))
- {
- o->NoMacAddressLog = CfgGetBool(f, "NoMacAddressLog");
- }
- else
- {
- o->NoMacAddressLog = true;
- }
- }
- // Write the HUB_OPTION
- void SiWriteHubOptionCfg(FOLDER *f, HUB_OPTION *o)
- {
- char tmp[MAX_SIZE];
- // Validate arguments
- if (f == NULL || o == NULL)
- {
- return;
- }
- CfgAddInt(f, "MaxSession", o->MaxSession);
- CfgAddBool(f, "NoArpPolling", o->NoArpPolling);
- CfgAddBool(f, "NoIPv6AddrPolling", o->NoIPv6AddrPolling);
- CfgAddBool(f, "NoIpTable", o->NoIpTable);
- CfgAddBool(f, "NoEnum", o->NoEnum);
- CfgAddBool(f, "FilterPPPoE", o->FilterPPPoE);
- CfgAddBool(f, "FilterOSPF", o->FilterOSPF);
- CfgAddBool(f, "FilterIPv4", o->FilterIPv4);
- CfgAddBool(f, "FilterIPv6", o->FilterIPv6);
- CfgAddBool(f, "FilterNonIP", o->FilterNonIP);
- CfgAddBool(f, "NoIPv4PacketLog", o->NoIPv4PacketLog);
- CfgAddBool(f, "NoIPv6PacketLog", o->NoIPv6PacketLog);
- CfgAddBool(f, "FilterBPDU", o->FilterBPDU);
- CfgAddBool(f, "NoIPv6DefaultRouterInRAWhenIPv6", o->NoIPv6DefaultRouterInRAWhenIPv6);
- CfgAddBool(f, "NoMacAddressLog", o->NoMacAddressLog);
- CfgAddBool(f, "ManageOnlyPrivateIP", o->ManageOnlyPrivateIP);
- CfgAddBool(f, "ManageOnlyLocalUnicastIPv6", o->ManageOnlyLocalUnicastIPv6);
- CfgAddBool(f, "DisableIPParsing", o->DisableIPParsing);
- CfgAddBool(f, "YieldAfterStorePacket", o->YieldAfterStorePacket);
- CfgAddBool(f, "NoSpinLockForPacketDelay", o->NoSpinLockForPacketDelay);
- CfgAddInt(f, "BroadcastStormDetectionThreshold", o->BroadcastStormDetectionThreshold);
- CfgAddInt(f, "ClientMinimumRequiredBuild", o->ClientMinimumRequiredBuild);
- CfgAddInt(f, "RequiredClientId", o->RequiredClientId);
- CfgAddBool(f, "NoManageVlanId", o->NoManageVlanId);
- Format(tmp, sizeof(tmp), "0x%x", o->VlanTypeId);
- CfgAddStr(f, "VlanTypeId", tmp);
- if (o->FixForDLinkBPDU)
- {
- CfgAddBool(f, "FixForDLinkBPDU", o->FixForDLinkBPDU);
- }
- CfgAddBool(f, "BroadcastLimiterStrictMode", o->BroadcastLimiterStrictMode);
- CfgAddInt(f, "MaxLoggedPacketsPerMinute", o->MaxLoggedPacketsPerMinute);
- CfgAddBool(f, "DoNotSaveHeavySecurityLogs", o->DoNotSaveHeavySecurityLogs);
- CfgAddBool(f, "DropBroadcastsInPrivacyFilterMode", o->DropBroadcastsInPrivacyFilterMode);
- CfgAddBool(f, "DropArpInPrivacyFilterMode", o->DropArpInPrivacyFilterMode);
- CfgAddBool(f, "SuppressClientUpdateNotification", o->SuppressClientUpdateNotification);
- CfgAddBool(f, "NoLookBPDUBridgeId", o->NoLookBPDUBridgeId);
- CfgAddInt(f, "AdjustTcpMssValue", o->AdjustTcpMssValue);
- CfgAddBool(f, "DisableAdjustTcpMss", o->DisableAdjustTcpMss);
- CfgAddBool(f, "NoDhcpPacketLogOutsideHub", o->NoDhcpPacketLogOutsideHub);
- CfgAddBool(f, "DisableHttpParsing", o->DisableHttpParsing);
- CfgAddBool(f, "DisableUdpAcceleration", o->DisableUdpAcceleration);
- CfgAddBool(f, "DisableUdpFilterForLocalBridgeNic", o->DisableUdpFilterForLocalBridgeNic);
- CfgAddBool(f, "ApplyIPv4AccessListOnArpPacket", o->ApplyIPv4AccessListOnArpPacket);
- CfgAddBool(f, "RemoveDefGwOnDhcpForLocalhost", o->RemoveDefGwOnDhcpForLocalhost);
- CfgAddInt(f, "SecureNAT_MaxTcpSessionsPerIp", o->SecureNAT_MaxTcpSessionsPerIp);
- CfgAddInt(f, "SecureNAT_MaxTcpSynSentPerIp", o->SecureNAT_MaxTcpSynSentPerIp);
- CfgAddInt(f, "SecureNAT_MaxUdpSessionsPerIp", o->SecureNAT_MaxUdpSessionsPerIp);
- CfgAddInt(f, "SecureNAT_MaxDnsSessionsPerIp", o->SecureNAT_MaxDnsSessionsPerIp);
- CfgAddInt(f, "SecureNAT_MaxIcmpSessionsPerIp", o->SecureNAT_MaxIcmpSessionsPerIp);
- CfgAddInt(f, "AccessListIncludeFileCacheLifetime", o->AccessListIncludeFileCacheLifetime);
- CfgAddBool(f, "DisableKernelModeSecureNAT", o->DisableKernelModeSecureNAT);
- CfgAddBool(f, "DisableUserModeSecureNAT", o->DisableUserModeSecureNAT);
- CfgAddBool(f, "DisableCheckMacOnLocalBridge", o->DisableCheckMacOnLocalBridge);
- CfgAddBool(f, "DisableCorrectIpOffloadChecksum", o->DisableCorrectIpOffloadChecksum);
- }
- // Write the user
- void SiWriteUserCfg(FOLDER *f, USER *u)
- {
- BUF *b;
- AUTHPASSWORD *password;
- AUTHRADIUS *radius;
- AUTHNT *nt;
- AUTHUSERCERT *usercert;
- AUTHROOTCERT *rootcert;
- // Validate arguments
- if (f == NULL || u == NULL)
- {
- return;
- }
- Lock(u->lock);
- {
- CfgAddUniStr(f, "RealName", u->RealName);
- CfgAddUniStr(f, "Note", u->Note);
- if (u->Group != NULL)
- {
- CfgAddStr(f, "GroupName", u->GroupName);
- }
- CfgAddInt64(f, "CreatedTime", u->CreatedTime);
- CfgAddInt64(f, "UpdatedTime", u->UpdatedTime);
- CfgAddInt64(f, "ExpireTime", u->ExpireTime);
- CfgAddInt64(f, "LastLoginTime", u->LastLoginTime);
- CfgAddInt(f, "NumLogin", u->NumLogin);
- if (u->Policy != NULL)
- {
- SiWritePolicyCfg(CfgCreateFolder(f, "Policy"), u->Policy, false);
- }
- SiWriteTraffic(f, "Traffic", u->Traffic);
- CfgAddInt(f, "AuthType", u->AuthType);
- if (u->AuthData != NULL)
- {
- switch (u->AuthType)
- {
- case AUTHTYPE_ANONYMOUS:
- break;
- case AUTHTYPE_PASSWORD:
- password = (AUTHPASSWORD *)u->AuthData;
- CfgAddByte(f, "AuthPassword", password->HashedKey, sizeof(password->HashedKey));
- if (IsZero(password->NtLmSecureHash, sizeof(password->NtLmSecureHash)) == false)
- {
- CfgAddByte(f, "AuthNtLmSecureHash", password->NtLmSecureHash, sizeof(password->NtLmSecureHash));
- }
- break;
- case AUTHTYPE_NT:
- nt = (AUTHNT *)u->AuthData;
- CfgAddUniStr(f, "AuthNtUserName", nt->NtUsername);
- break;
- case AUTHTYPE_RADIUS:
- radius = (AUTHRADIUS *)u->AuthData;
- CfgAddUniStr(f, "AuthRadiusUsername", radius->RadiusUsername);
- break;
- case AUTHTYPE_USERCERT:
- usercert = (AUTHUSERCERT *)u->AuthData;
- b = XToBuf(usercert->UserX, false);
- if (b != NULL)
- {
- CfgAddBuf(f, "AuthUserCert", b);
- FreeBuf(b);
- }
- break;
- case AUTHTYPE_ROOTCERT:
- rootcert = (AUTHROOTCERT *)u->AuthData;
- if (rootcert->Serial != NULL && rootcert->Serial->size >= 1)
- {
- CfgAddByte(f, "AuthSerial", rootcert->Serial->data, rootcert->Serial->size);
- }
- if (rootcert->CommonName != NULL && UniIsEmptyStr(rootcert->CommonName) == false)
- {
- CfgAddUniStr(f, "AuthCommonName", rootcert->CommonName);
- }
- break;
- }
- }
- }
- Unlock(u->lock);
- }
- // Read an user
- void SiLoadUserCfg(HUB *h, FOLDER *f)
- {
- char *username;
- wchar_t realname[MAX_SIZE];
- wchar_t note[MAX_SIZE];
- char groupname[MAX_SIZE];
- FOLDER *pf;
- UINT64 created_time;
- UINT64 updated_time;
- UINT64 expire_time;
- UINT64 last_login_time;
- UINT num_login;
- POLICY p;
- TRAFFIC t;
- BUF *b;
- UINT authtype;
- void *authdata;
- X_SERIAL *serial = NULL;
- wchar_t common_name[MAX_SIZE];
- UCHAR hashed_password[SHA1_SIZE];
- UCHAR md4_password[MD5_SIZE];
- wchar_t tmp[MAX_SIZE];
- USER *u;
- USERGROUP *g;
- // Validate arguments
- if (h == NULL || f == NULL)
- {
- return;
- }
- username = f->Name;
- CfgGetUniStr(f, "RealName", realname, sizeof(realname));
- CfgGetUniStr(f, "Note", note, sizeof(note));
- CfgGetStr(f, "GroupName", groupname, sizeof(groupname));
- created_time = CfgGetInt64(f, "CreatedTime");
- updated_time = CfgGetInt64(f, "UpdatedTime");
- expire_time = CfgGetInt64(f, "ExpireTime");
- last_login_time = CfgGetInt64(f, "LastLoginTime");
- num_login = CfgGetInt(f, "NumLogin");
- pf = CfgGetFolder(f, "Policy");
- if (pf != NULL)
- {
- SiLoadPolicyCfg(&p, pf);
- }
- SiLoadTraffic(f, "Traffic", &t);
- authtype = CfgGetInt(f, "AuthType");
- authdata = NULL;
- switch (authtype)
- {
- case AUTHTYPE_PASSWORD:
- Zero(hashed_password, sizeof(hashed_password));
- Zero(md4_password, sizeof(md4_password));
- CfgGetByte(f, "AuthPassword", hashed_password, sizeof(hashed_password));
- CfgGetByte(f, "AuthNtLmSecureHash", md4_password, sizeof(md4_password));
- authdata = NewPasswordAuthDataRaw(hashed_password, md4_password);
- break;
- case AUTHTYPE_NT:
- if (CfgGetUniStr(f, "AuthNtUserName", tmp, sizeof(tmp)))
- {
- authdata = NewNTAuthData(tmp);
- }
- else
- {
- authdata = NewNTAuthData(NULL);
- }
- break;
- case AUTHTYPE_RADIUS:
- if (CfgGetUniStr(f, "AuthRadiusUsername", tmp, sizeof(tmp)))
- {
- authdata = NewRadiusAuthData(tmp);
- }
- else
- {
- authdata = NewRadiusAuthData(NULL);
- }
- break;
- case AUTHTYPE_USERCERT:
- b = CfgGetBuf(f, "AuthUserCert");
- if (b != NULL)
- {
- X *x = BufToX(b, false);
- if (x != NULL)
- {
- authdata = NewUserCertAuthData(x);
- FreeX(x);
- }
- FreeBuf(b);
- }
- break;
- case AUTHTYPE_ROOTCERT:
- b = CfgGetBuf(f, "AuthSerial");
- if (b != NULL)
- {
- serial = NewXSerial(b->Buf, b->Size);
- FreeBuf(b);
- }
- CfgGetUniStr(f, "AuthCommonName", common_name, sizeof(common_name));
- authdata = NewRootCertAuthData(serial, common_name);
- break;
- }
- // Add an user
- AcLock(h);
- {
- if (StrLen(groupname) > 0)
- {
- g = AcGetGroup(h, groupname);
- }
- else
- {
- g = NULL;
- }
- u = NewUser(username, realname, note, authtype, authdata);
- if (u != NULL)
- {
- if (g != NULL)
- {
- JoinUserToGroup(u, g);
- }
- SetUserTraffic(u, &t);
- if (pf != NULL)
- {
- SetUserPolicy(u, &p);
- }
- Lock(u->lock);
- {
- u->CreatedTime = created_time;
- u->UpdatedTime = updated_time;
- u->ExpireTime = expire_time;
- u->LastLoginTime = last_login_time;
- u->NumLogin = num_login;
- }
- Unlock(u->lock);
- AcAddUser(h, u);
- ReleaseUser(u);
- }
- if (g != NULL)
- {
- ReleaseGroup(g);
- }
- }
- AcUnlock(h);
- if (serial != NULL)
- {
- FreeXSerial(serial);
- }
- }
- // Write the user list
- void SiWriteUserList(FOLDER *f, LIST *o)
- {
- // Validate arguments
- if (f == NULL || o == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(o);i++)
- {
- USER *u = LIST_DATA(o, i);
- SiWriteUserCfg(CfgCreateFolder(f, u->Name), u);
- }
- }
- UnlockList(o);
- }
- // Read the user list
- void SiLoadUserList(HUB *h, FOLDER *f)
- {
- TOKEN_LIST *t;
- UINT i;
- char *name;
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- FOLDER *ff;
- name = t->Token[i];
- ff = CfgGetFolder(f, name);
- SiLoadUserCfg(h, ff);
- }
- FreeToken(t);
- }
- // Write the group information
- void SiWriteGroupCfg(FOLDER *f, USERGROUP *g)
- {
- // Validate arguments
- if (f == NULL || g == NULL)
- {
- return;
- }
- Lock(g->lock);
- {
- CfgAddUniStr(f, "RealName", g->RealName);
- CfgAddUniStr(f, "Note", g->Note);
- if (g->Policy != NULL)
- {
- SiWritePolicyCfg(CfgCreateFolder(f, "Policy"), g->Policy, false);
- }
- SiWriteTraffic(f, "Traffic", g->Traffic);
- }
- Unlock(g->lock);
- }
- // Read the group information
- void SiLoadGroupCfg(HUB *h, FOLDER *f)
- {
- wchar_t realname[MAX_SIZE];
- wchar_t note[MAX_SIZE];
- char *name;
- FOLDER *pf;
- POLICY p;
- TRAFFIC t;
- USERGROUP *g;
- // Validate arguments
- if (h == NULL || f == NULL)
- {
- return;
- }
- name = f->Name;
- CfgGetUniStr(f, "RealName", realname, sizeof(realname));
- CfgGetUniStr(f, "Note", note, sizeof(note));
- pf = CfgGetFolder(f, "Policy");
- if (pf != NULL)
- {
- SiLoadPolicyCfg(&p, pf);
- }
- SiLoadTraffic(f, "Traffic", &t);
- g = NewGroup(name, realname, note);
- if (g == NULL)
- {
- return;
- }
- if (pf != NULL)
- {
- SetGroupPolicy(g, &p);
- }
- SetGroupTraffic(g, &t);
- AcLock(h);
- {
- AcAddGroup(h, g);
- }
- AcUnlock(h);
- ReleaseGroup(g);
- }
- // Write the group list
- void SiWriteGroupList(FOLDER *f, LIST *o)
- {
- // Validate arguments
- if (f == NULL || o == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(o);i++)
- {
- USERGROUP *g = LIST_DATA(o, i);
- SiWriteGroupCfg(CfgCreateFolder(f, g->Name), g);
- }
- }
- UnlockList(o);
- }
- // Read the group List
- void SiLoadGroupList(HUB *h, FOLDER *f)
- {
- TOKEN_LIST *t;
- UINT i;
- char *name;
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- name = t->Token[i];
- SiLoadGroupCfg(h, CfgGetFolder(f, name));
- }
- FreeToken(t);
- }
- // Write the AC list
- void SiWriteAcList(FOLDER *f, LIST *o)
- {
- // Validate arguments
- if (f == NULL || o == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(o);i++)
- {
- char name[MAX_SIZE];
- AC *ac = LIST_DATA(o, i);
- FOLDER *ff;
- Format(name, sizeof(name), "Acl%u", i + 1);
- ff = CfgCreateFolder(f, name);
- CfgAddBool(ff, "Deny", ac->Deny);
- CfgAddInt(ff, "Priority", ac->Priority);
- CfgAddIp(ff, "IpAddress", &ac->IpAddress);
- if (ac->Masked)
- {
- CfgAddIp(ff, "NetMask", &ac->SubnetMask);
- }
- }
- }
- UnlockList(o);
- }
- // Read the AC list
- void SiLoadAcList(LIST *o, FOLDER *f)
- {
- // Validate arguments
- if (o == NULL || f == NULL)
- {
- return;
- }
- LockList(o);
- {
- TOKEN_LIST *t = CfgEnumFolderToTokenList(f);
- if (t != NULL)
- {
- UINT i;
- for (i = 0;i < t->NumTokens;i++)
- {
- FOLDER *ff = CfgGetFolder(f, t->Token[i]);
- if (ff != NULL)
- {
- AC ac;
- Zero(&ac, sizeof(ac));
- ac.Deny = CfgGetBool(ff, "Deny");
- ac.Priority = CfgGetInt(ff, "Priority");
- CfgGetIp(ff, "IpAddress", &ac.IpAddress);
- if (CfgGetIp(ff, "NetMask", &ac.SubnetMask))
- {
- ac.Masked = true;
- }
- AddAc(o, &ac);
- }
- }
- FreeToken(t);
- }
- }
- UnlockList(o);
- }
- // Write the certificate revocation list
- void SiWriteCrlList(FOLDER *f, LIST *o)
- {
- // Validate arguments
- if (f == NULL || o == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(o);i++)
- {
- char name[MAX_SIZE];
- CRL *crl = LIST_DATA(o, i);
- FOLDER *ff;
- NAME *n;
- Format(name, sizeof(name), "Crl%u", i);
- ff = CfgCreateFolder(f, name);
- n = crl->Name;
- if (UniIsEmptyStr(n->CommonName) == false)
- {
- CfgAddUniStr(ff, "CommonName", n->CommonName);
- }
- if (UniIsEmptyStr(n->Organization) == false)
- {
- CfgAddUniStr(ff, "Organization", n->Organization);
- }
- if (UniIsEmptyStr(n->Unit) == false)
- {
- CfgAddUniStr(ff, "Unit", n->Unit);
- }
- if (UniIsEmptyStr(n->Country) == false)
- {
- CfgAddUniStr(ff, "Country", n->Country);
- }
- if (UniIsEmptyStr(n->State) == false)
- {
- CfgAddUniStr(ff, "State", n->State);
- }
- if (UniIsEmptyStr(n->Local) == false)
- {
- CfgAddUniStr(ff, "Local", n->Local);
- }
- if (IsZero(crl->DigestMD5, MD5_SIZE) == false)
- {
- char tmp[MAX_SIZE];
- BinToStr(tmp, sizeof(tmp), crl->DigestMD5, MD5_SIZE);
- CfgAddStr(ff, "DigestMD5", tmp);
- }
- if (IsZero(crl->DigestSHA1, SHA1_SIZE) == false)
- {
- char tmp[MAX_SIZE];
- BinToStr(tmp, sizeof(tmp), crl->DigestSHA1, SHA1_SIZE);
- CfgAddStr(ff, "DigestSHA1", tmp);
- }
- if (crl->Serial != NULL)
- {
- char tmp[MAX_SIZE];
- BinToStr(tmp, sizeof(tmp), crl->Serial->data, crl->Serial->size);
- CfgAddStr(ff, "Serial", tmp);
- }
- }
- }
- UnlockList(o);
- }
- // Read the certificate revocation list
- void SiLoadCrlList(LIST *o, FOLDER *f)
- {
- // Validate arguments
- if (o == NULL || f == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- TOKEN_LIST *t;
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- CRL *crl;
- FOLDER *ff = CfgGetFolder(f, t->Token[i]);
- wchar_t cn[MAX_SIZE], org[MAX_SIZE], u[MAX_SIZE], c[MAX_SIZE],
- st[MAX_SIZE], l[MAX_SIZE];
- char tmp[MAX_SIZE];
- if (ff != NULL)
- {
- BUF *b;
- crl = ZeroMalloc(sizeof(CRL));
- CfgGetUniStr(ff, "CommonName", cn, sizeof(cn));
- CfgGetUniStr(ff, "Organization", org, sizeof(org));
- CfgGetUniStr(ff, "Unit", u, sizeof(u));
- CfgGetUniStr(ff, "Country", c, sizeof(c));
- CfgGetUniStr(ff, "State", st, sizeof(st));
- CfgGetUniStr(ff, "Local", l, sizeof(l));
- crl->Name = NewName(cn, org, u, c, st, l);
- if (CfgGetStr(ff, "Serial", tmp, sizeof(tmp)))
- {
- b = StrToBin(tmp);
- if (b != NULL)
- {
- if (b->Size >= 1)
- {
- crl->Serial = NewXSerial(b->Buf, b->Size);
- }
- FreeBuf(b);
- }
- }
- if (CfgGetStr(ff, "DigestMD5", tmp, sizeof(tmp)))
- {
- b = StrToBin(tmp);
- if (b != NULL)
- {
- if (b->Size == MD5_SIZE)
- {
- Copy(crl->DigestMD5, b->Buf, MD5_SIZE);
- }
- FreeBuf(b);
- }
- }
- if (CfgGetStr(ff, "DigestSHA1", tmp, sizeof(tmp)))
- {
- b = StrToBin(tmp);
- if (b != NULL)
- {
- if (b->Size == SHA1_SIZE)
- {
- Copy(crl->DigestSHA1, b->Buf, SHA1_SIZE);
- }
- FreeBuf(b);
- }
- }
- Insert(o, crl);
- }
- }
- FreeToken(t);
- }
- UnlockList(o);
- }
- // Write the certificates list
- void SiWriteCertList(FOLDER *f, LIST *o)
- {
- // Validate arguments
- if (f == NULL || o == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- X *x;
- for (i = 0;i < LIST_NUM(o);i++)
- {
- char name[MAX_SIZE];
- BUF *b;
- x = LIST_DATA(o, i);
- Format(name, sizeof(name), "Cert%u", i);
- b = XToBuf(x, false);
- if (b != NULL)
- {
- CfgAddBuf(CfgCreateFolder(f, name), "X509", b);
- FreeBuf(b);
- }
- }
- }
- UnlockList(o);
- }
- // Read the certificates list
- void SiLoadCertList(LIST *o, FOLDER *f)
- {
- // Validate arguments
- if (o == NULL || f == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- TOKEN_LIST *t;
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- FOLDER *ff = CfgGetFolder(f, t->Token[i]);
- BUF *b;
- b = CfgGetBuf(ff, "X509");
- if (b != NULL)
- {
- X *x = BufToX(b, false);
- if (x != NULL)
- {
- Insert(o, x);
- }
- FreeBuf(b);
- }
- }
- FreeToken(t);
- }
- UnlockList(o);
- }
- // Write the database
- void SiWriteHubDb(FOLDER *f, HUBDB *db, bool no_save_ac_list)
- {
- // Validate arguments
- if (f == NULL || db == NULL)
- {
- return;
- }
- SiWriteUserList(CfgCreateFolder(f, "UserList"), db->UserList);
- SiWriteGroupList(CfgCreateFolder(f, "GroupList"), db->GroupList);
- SiWriteCertList(CfgCreateFolder(f, "CertList"), db->RootCertList);
- SiWriteCrlList(CfgCreateFolder(f, "CrlList"), db->CrlList);
- if (no_save_ac_list == false)
- {
- SiWriteAcList(CfgCreateFolder(f, "IPAccessControlList"), db->AcList);
- }
- }
- // Read the database
- void SiLoadHubDb(HUB *h, FOLDER *f)
- {
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- SiLoadGroupList(h, CfgGetFolder(f, "GroupList"));
- SiLoadUserList(h, CfgGetFolder(f, "UserList"));
- if (h->HubDb != NULL)
- {
- SiLoadCertList(h->HubDb->RootCertList, CfgGetFolder(f, "CertList"));
- SiLoadCrlList(h->HubDb->CrlList, CfgGetFolder(f, "CrlList"));
- SiLoadAcList(h->HubDb->AcList, CfgGetFolder(f, "IPAccessControlList"));
- }
- }
- // Write the Virtual HUB setting
- void SiWriteHubCfg(FOLDER *f, HUB *h)
- {
- // Validate arguments
- if (f == NULL || h == NULL)
- {
- return;
- }
- // Radius server name
- Lock(h->RadiusOptionLock);
- {
- if (h->RadiusServerName != NULL)
- {
- CfgAddStr(f, "RadiusServerName", h->RadiusServerName);
- CfgAddBuf(f, "RadiusSecret", h->RadiusSecret);
- }
- CfgAddInt(f, "RadiusServerPort", h->RadiusServerPort);
- CfgAddInt(f, "RadiusRetryInterval", h->RadiusRetryInterval);
- CfgAddStr(f, "RadiusSuffixFilter", h->RadiusSuffixFilter);
- CfgAddStr(f, "RadiusRealm", h->RadiusRealm);
- }
- Unlock(h->RadiusOptionLock);
- // Password
- CfgAddByte(f, "HashedPassword", h->HashedPassword, sizeof(h->HashedPassword));
- CfgAddByte(f, "SecurePassword", h->SecurePassword, sizeof(h->SecurePassword));
- // Online / Offline flag
- if (h->Cedar->Bridge == false)
- {
- CfgAddBool(f, "Online", (h->Offline && (h->HubIsOnlineButHalting == false)) ? false : true);
- }
- // Traffic information
- SiWriteTraffic(f, "Traffic", h->Traffic);
- // HUB options
- SiWriteHubOptionCfg(CfgCreateFolder(f, "Option"), h->Option);
- // Message
- {
- FOLDER *folder = CfgCreateFolder(f, "Message");
- if (IsEmptyUniStr(h->Msg) == false)
- {
- CfgAddUniStr(folder, "MessageText", h->Msg);
- }
- }
- // HUB_LOG
- SiWriteHubLogCfg(CfgCreateFolder(f, "LogSetting"), &h->LogSetting);
- if (h->Type == HUB_TYPE_STANDALONE)
- {
- // Link list
- SiWriteHubLinks(CfgCreateFolder(f, "CascadeList"), h);
- }
- if (h->Type != HUB_TYPE_FARM_STATIC)
- {
- if (GetServerCapsBool(h->Cedar->Server, "b_support_securenat"))
- {
- // SecureNAT
- SiWriteSecureNAT(h, CfgCreateFolder(f, "SecureNAT"));
- }
- }
- // Access list
- SiWriteHubAccessLists(CfgCreateFolder(f, "AccessList"), h);
- // Administration options
- SiWriteHubAdminOptions(CfgCreateFolder(f, "AdminOption"), h);
- // Type of HUB
- CfgAddInt(f, "Type", h->Type);
- // Database
- if (h->Cedar->Bridge == false)
- {
- SiWriteHubDb(CfgCreateFolder(f, "SecurityAccountDatabase"), h->HubDb,
- false
- );
- }
- // Usage status
- CfgAddInt64(f, "LastCommTime", h->LastCommTime);
- CfgAddInt64(f, "LastLoginTime", h->LastLoginTime);
- CfgAddInt64(f, "CreatedTime", h->CreatedTime);
- CfgAddInt(f, "NumLogin", h->NumLogin);
- }
- // Read the logging options
- void SiLoadHubLogCfg(HUB_LOG *g, FOLDER *f)
- {
- // Validate arguments
- if (f == NULL || g == NULL)
- {
- return;
- }
- Zero(g, sizeof(HUB_LOG));
- g->SaveSecurityLog = CfgGetBool(f, "SaveSecurityLog");
- g->SecurityLogSwitchType = CfgGetInt(f, "SecurityLogSwitchType");
- g->SavePacketLog = CfgGetBool(f, "SavePacketLog");
- g->PacketLogSwitchType = CfgGetInt(f, "PacketLogSwitchType");
- g->PacketLogConfig[PACKET_LOG_TCP_CONN] = CfgGetInt(f, "PACKET_LOG_TCP_CONN");
- g->PacketLogConfig[PACKET_LOG_TCP] = CfgGetInt(f, "PACKET_LOG_TCP");
- g->PacketLogConfig[PACKET_LOG_DHCP] = CfgGetInt(f, "PACKET_LOG_DHCP");
- g->PacketLogConfig[PACKET_LOG_UDP] = CfgGetInt(f, "PACKET_LOG_UDP");
- g->PacketLogConfig[PACKET_LOG_ICMP] = CfgGetInt(f, "PACKET_LOG_ICMP");
- g->PacketLogConfig[PACKET_LOG_IP] = CfgGetInt(f, "PACKET_LOG_IP");
- g->PacketLogConfig[PACKET_LOG_ARP] = CfgGetInt(f, "PACKET_LOG_ARP");
- g->PacketLogConfig[PACKET_LOG_ETHERNET] = CfgGetInt(f, "PACKET_LOG_ETHERNET");
- }
- // Write the logging options
- void SiWriteHubLogCfg(FOLDER *f, HUB_LOG *g)
- {
- SiWriteHubLogCfgEx(f, g, false);
- }
- void SiWriteHubLogCfgEx(FOLDER *f, HUB_LOG *g, bool el_mode)
- {
- // Validate arguments
- if (f == NULL || g == NULL)
- {
- return;
- }
- if (el_mode == false)
- {
- CfgAddBool(f, "SaveSecurityLog", g->SaveSecurityLog);
- CfgAddInt(f, "SecurityLogSwitchType", g->SecurityLogSwitchType);
- CfgAddBool(f, "SavePacketLog", g->SavePacketLog);
- }
- CfgAddInt(f, "PacketLogSwitchType", g->PacketLogSwitchType);
- CfgAddInt(f, "PACKET_LOG_TCP_CONN", g->PacketLogConfig[PACKET_LOG_TCP_CONN]);
- CfgAddInt(f, "PACKET_LOG_TCP", g->PacketLogConfig[PACKET_LOG_TCP]);
- CfgAddInt(f, "PACKET_LOG_DHCP", g->PacketLogConfig[PACKET_LOG_DHCP]);
- CfgAddInt(f, "PACKET_LOG_UDP", g->PacketLogConfig[PACKET_LOG_UDP]);
- CfgAddInt(f, "PACKET_LOG_ICMP", g->PacketLogConfig[PACKET_LOG_ICMP]);
- CfgAddInt(f, "PACKET_LOG_IP", g->PacketLogConfig[PACKET_LOG_IP]);
- CfgAddInt(f, "PACKET_LOG_ARP", g->PacketLogConfig[PACKET_LOG_ARP]);
- CfgAddInt(f, "PACKET_LOG_ETHERNET", g->PacketLogConfig[PACKET_LOG_ETHERNET]);
- }
- // Read the Virtual HUB settings
- void SiLoadHubCfg(SERVER *s, FOLDER *f, char *name)
- {
- HUB *h;
- CEDAR *c;
- HUB_OPTION o;
- bool online;
- UINT hub_old_type = 0;
- // Validate arguments
- if (s == NULL || f == NULL || name == NULL)
- {
- return;
- }
- c = s->Cedar;
- // Get the option
- Zero(&o, sizeof(o));
- SiLoadHubOptionCfg(CfgGetFolder(f, "Option"), &o);
- // Create a HUB
- h = NewHub(c, name, &o);
- if (h != NULL)
- {
- HUB_LOG g;
- // Radius server settings
- Lock(h->RadiusOptionLock);
- {
- char name[MAX_SIZE];
- BUF *secret;
- UINT port;
- UINT interval;
- port = CfgGetInt(f, "RadiusServerPort");
- interval = CfgGetInt(f, "RadiusRetryInterval");
- CfgGetStr(f, "RadiusSuffixFilter", h->RadiusSuffixFilter, sizeof(h->RadiusSuffixFilter));
- CfgGetStr(f, "RadiusRealm", h->RadiusRealm, sizeof(h->RadiusRealm));
- if (interval == 0)
- {
- interval = RADIUS_RETRY_INTERVAL;
- }
- if (port != 0 && CfgGetStr(f, "RadiusServerName", name, sizeof(name)))
- {
- secret = CfgGetBuf(f, "RadiusSecret");
- if (secret != NULL)
- {
- char secret_str[MAX_SIZE];
- Zero(secret_str, sizeof(secret_str));
- if (secret->Size < sizeof(secret_str))
- {
- Copy(secret_str, secret->Buf, secret->Size);
- }
- secret_str[sizeof(secret_str) - 1] = 0;
- //SetRadiusServer(h, name, port, secret_str);
- SetRadiusServerEx(h, name, port, secret_str, interval);
- FreeBuf(secret);
- }
- }
- }
- Unlock(h->RadiusOptionLock);
- // Password
- if (CfgGetByte(f, "HashedPassword", h->HashedPassword, sizeof(h->HashedPassword)) != sizeof(h->HashedPassword))
- {
- Hash(h->HashedPassword, "", 0, true);
- }
- if (CfgGetByte(f, "SecurePassword", h->SecurePassword, sizeof(h->SecurePassword)) != sizeof(h->SecurePassword))
- {
- HashPassword(h->SecurePassword, ADMINISTRATOR_USERNAME, "");
- }
- // Log Settings
- Zero(&g, sizeof(g));
- SiLoadHubLogCfg(&g, CfgGetFolder(f, "LogSetting"));
- SetHubLogSetting(h, &g);
- // Online / Offline flag
- if (h->Cedar->Bridge == false)
- {
- online = CfgGetBool(f, "Online");
- }
- else
- {
- online = true;
- }
- // Traffic information
- SiLoadTraffic(f, "Traffic", h->Traffic);
- // Access list
- SiLoadHubAccessLists(h, CfgGetFolder(f, "AccessList"));
- // Type of HUB
- hub_old_type = h->Type = CfgGetInt(f, "Type");
- if (s->ServerType == SERVER_TYPE_STANDALONE)
- {
- if (h->Type != HUB_TYPE_STANDALONE)
- {
- // Change the type of all HUB to a stand-alone if the server is a stand-alone
- h->Type = HUB_TYPE_STANDALONE;
- }
- }
- else
- {
- if (h->Type == HUB_TYPE_STANDALONE)
- {
- // If the server is a farm controller, change the type of HUB to the farm supported types
- h->Type = HUB_TYPE_FARM_DYNAMIC;
- }
- }
- if (h->Type == HUB_TYPE_FARM_DYNAMIC)
- {
- h->CurrentVersion = h->LastVersion = 1;
- }
- // Message
- {
- FOLDER *folder = CfgGetFolder(f, "Message");
- if (folder != NULL)
- {
- wchar_t *tmp = Malloc(sizeof(wchar_t) * (HUB_MAXMSG_LEN + 1));
- if (CfgGetUniStr(folder, "MessageText", tmp, sizeof(wchar_t) * (HUB_MAXMSG_LEN + 1)))
- {
- SetHubMsg(h, tmp);
- }
- Free(tmp);
- }
- }
- // Link list
- if (h->Type == HUB_TYPE_STANDALONE)
- {
- // The link list is used only on stand-alone HUB
- // In VPN Gate hubs, don't load this
- {
- SiLoadHubLinks(h, CfgGetFolder(f, "CascadeList"));
- }
- }
- // SecureNAT
- if (GetServerCapsBool(h->Cedar->Server, "b_support_securenat"))
- {
- if (h->Type == HUB_TYPE_STANDALONE || h->Type == HUB_TYPE_FARM_DYNAMIC)
- {
- // SecureNAT is used only in the case of dynamic HUB or standalone HUB
- SiLoadSecureNAT(h, CfgGetFolder(f, "SecureNAT"));
- if (h->Type != HUB_TYPE_STANDALONE && h->Cedar != NULL && h->Cedar->Server != NULL &&
- h->Cedar->Server->ServerType == SERVER_TYPE_FARM_CONTROLLER)
- {
- NiClearUnsupportedVhOptionForDynamicHub(h->SecureNATOption,
- hub_old_type == HUB_TYPE_STANDALONE);
- }
- }
- }
- // Administration options
- SiLoadHubAdminOptions(h, CfgGetFolder(f, "AdminOption"));
- // Database
- if (h->Cedar->Bridge == false)
- {
- SiLoadHubDb(h, CfgGetFolder(f, "SecurityAccountDatabase"));
- }
- // Usage status
- h->LastCommTime = CfgGetInt64(f, "LastCommTime");
- if (h->LastCommTime == 0)
- {
- h->LastCommTime = SystemTime64();
- }
- h->LastLoginTime = CfgGetInt64(f, "LastLoginTime");
- if (h->LastLoginTime == 0)
- {
- h->LastLoginTime = SystemTime64();
- }
- h->CreatedTime = CfgGetInt64(f, "CreatedTime");
- h->NumLogin = CfgGetInt(f, "NumLogin");
- // Start the operation of the HUB
- AddHub(c, h);
- if (online)
- {
- h->Offline = true;
- SetHubOnline(h);
- }
- else
- {
- h->Offline = false;
- SetHubOffline(h);
- }
- WaitLogFlush(h->SecurityLogger);
- WaitLogFlush(h->PacketLogger);
- ReleaseHub(h);
- }
- }
- // Read the SecureNAT configuration
- void SiLoadSecureNAT(HUB *h, FOLDER *f)
- {
- VH_OPTION o;
- // Validate arguments
- if (h == NULL || f == NULL)
- {
- return;
- }
- // Read the VH_OPTION
- NiLoadVhOptionEx(&o, f);
- // Set the VH_OPTION
- Copy(h->SecureNATOption, &o, sizeof(VH_OPTION));
- EnableSecureNAT(h, CfgGetBool(f, "Disabled") ? false : true);
- }
- // Read the virtual layer 3 switch settings
- void SiLoadL3SwitchCfg(L3SW *sw, FOLDER *f)
- {
- UINT i;
- FOLDER *if_folder, *table_folder;
- TOKEN_LIST *t;
- bool active = false;
- // Validate arguments
- if (sw == NULL || f == NULL)
- {
- return;
- }
- active = CfgGetBool(f, "Active");
- // Interface list
- if_folder = CfgGetFolder(f, "InterfaceList");
- if (if_folder != NULL)
- {
- t = CfgEnumFolderToTokenList(if_folder);
- if (t != NULL)
- {
- for (i = 0;i < t->NumTokens;i++)
- {
- FOLDER *ff = CfgGetFolder(if_folder, t->Token[i]);
- char name[MAX_HUBNAME_LEN + 1];
- UINT ip, subnet;
- CfgGetStr(ff, "HubName", name, sizeof(name));
- ip = CfgGetIp32(ff, "IpAddress");
- subnet = CfgGetIp32(ff, "SubnetMask");
- {
- L3AddIf(sw, name, ip, subnet);
- }
- }
- FreeToken(t);
- }
- }
- // Routing table
- table_folder = CfgGetFolder(f, "RoutingTable");
- if (table_folder != NULL)
- {
- t = CfgEnumFolderToTokenList(table_folder);
- if (t != NULL)
- {
- for (i = 0;i < t->NumTokens;i++)
- {
- FOLDER *ff = CfgGetFolder(table_folder, t->Token[i]);
- L3TABLE tbl;
- Zero(&tbl, sizeof(tbl));
- tbl.NetworkAddress = CfgGetIp32(ff, "NetworkAddress");
- tbl.SubnetMask = CfgGetIp32(ff, "SubnetMask");
- tbl.GatewayAddress = CfgGetIp32(ff, "GatewayAddress");
- tbl.Metric = CfgGetInt(ff, "Metric");
- L3AddTable(sw, &tbl);
- }
- FreeToken(t);
- }
- }
- if (active)
- {
- L3SwStart(sw);
- }
- }
- // Write the virtual layer 3 switch settings
- void SiWriteL3SwitchCfg(FOLDER *f, L3SW *sw)
- {
- UINT i;
- FOLDER *if_folder, *table_folder;
- char tmp[MAX_SIZE];
- // Validate arguments
- if (f == NULL || sw == NULL)
- {
- return;
- }
- // Active flag
- CfgAddBool(f, "Active", sw->Active);
- // Interface list
- if_folder = CfgCreateFolder(f, "InterfaceList");
- for (i = 0;i < LIST_NUM(sw->IfList);i++)
- {
- L3IF *e = LIST_DATA(sw->IfList, i);
- FOLDER *ff;
- Format(tmp, sizeof(tmp), "Interface%u", i);
- ff = CfgCreateFolder(if_folder, tmp);
- CfgAddStr(ff, "HubName", e->HubName);
- CfgAddIp32(ff, "IpAddress", e->IpAddress);
- CfgAddIp32(ff, "SubnetMask", e->SubnetMask);
- }
- // Routing table
- table_folder = CfgCreateFolder(f, "RoutingTable");
- for (i = 0;i < LIST_NUM(sw->TableList);i++)
- {
- L3TABLE *e = LIST_DATA(sw->TableList, i);
- FOLDER *ff;
- Format(tmp, sizeof(tmp), "Entry%u", i);
- ff = CfgCreateFolder(table_folder, tmp);
- CfgAddIp32(ff, "NetworkAddress", e->NetworkAddress);
- CfgAddIp32(ff, "SubnetMask", e->SubnetMask);
- CfgAddIp32(ff, "GatewayAddress", e->GatewayAddress);
- CfgAddInt(ff, "Metric", e->Metric);
- }
- }
- // Read the Virtual Layer 3 switch list
- void SiLoadL3Switchs(SERVER *s, FOLDER *f)
- {
- UINT i;
- TOKEN_LIST *t;
- CEDAR *c;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- c = s->Cedar;
- t = CfgEnumFolderToTokenList(f);
- if (t != NULL)
- {
- for (i = 0;i < t->NumTokens;i++)
- {
- char *name = t->Token[i];
- L3SW *sw = L3AddSw(c, name);
- SiLoadL3SwitchCfg(sw, CfgGetFolder(f, name));
- ReleaseL3Sw(sw);
- }
- }
- FreeToken(t);
- }
- // Write the Virtual Layer 3 switch list
- void SiWriteL3Switchs(FOLDER *f, SERVER *s)
- {
- UINT i;
- FOLDER *folder;
- CEDAR *c;
- // Validate arguments
- if (f == NULL || s == NULL)
- {
- return;
- }
- c = s->Cedar;
- LockList(c->L3SwList);
- {
- for (i = 0;i < LIST_NUM(c->L3SwList);i++)
- {
- L3SW *sw = LIST_DATA(c->L3SwList, i);
- Lock(sw->lock);
- {
- folder = CfgCreateFolder(f, sw->Name);
- SiWriteL3SwitchCfg(folder, sw);
- }
- Unlock(sw->lock);
- }
- }
- UnlockList(c->L3SwList);
- }
- // Read the IPsec server configuration
- void SiLoadIPsec(SERVER *s, FOLDER *f)
- {
- IPSEC_SERVICES sl;
- FOLDER *list_folder;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- Zero(&sl, sizeof(sl));
- CfgGetStr(f, "IPsec_Secret", sl.IPsec_Secret, sizeof(sl.IPsec_Secret));
- CfgGetStr(f, "L2TP_DefaultHub", sl.L2TP_DefaultHub, sizeof(sl.L2TP_DefaultHub));
- if (s->ServerType == SERVER_TYPE_STANDALONE)
- {
- // IPsec feature only be enabled on a standalone server
- sl.L2TP_Raw = CfgGetBool(f, "L2TP_Raw");
- sl.L2TP_IPsec = CfgGetBool(f, "L2TP_IPsec");
- sl.EtherIP_IPsec = CfgGetBool(f, "EtherIP_IPsec");
- }
- IPsecServerSetServices(s->IPsecServer, &sl);
- list_folder = CfgGetFolder(f, "EtherIP_IDSettingsList");
- if (list_folder != NULL)
- {
- TOKEN_LIST *t = CfgEnumFolderToTokenList(list_folder);
- if (t != NULL)
- {
- UINT i;
- for (i = 0;i < t->NumTokens;i++)
- {
- char *name = t->Token[i];
- FOLDER *f = CfgGetFolder(list_folder, name);
- if (f != NULL)
- {
- ETHERIP_ID d;
- BUF *b;
- Zero(&d, sizeof(d));
- StrCpy(d.Id, sizeof(d.Id), name);
- CfgGetStr(f, "HubName", d.HubName, sizeof(d.HubName));
- CfgGetStr(f, "UserName", d.UserName, sizeof(d.UserName));
- b = CfgGetBuf(f, "EncryptedPassword");
- if (b != NULL)
- {
- char *pass = DecryptPassword2(b);
- StrCpy(d.Password, sizeof(d.Password), pass);
- Free(pass);
- AddEtherIPId(s->IPsecServer, &d);
- FreeBuf(b);
- }
- }
- }
- FreeToken(t);
- }
- }
- }
- // Write the IPsec server configuration
- void SiWriteIPsec(FOLDER *f, SERVER *s)
- {
- IPSEC_SERVICES sl;
- FOLDER *list_folder;
- UINT i;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- if (s->IPsecServer == NULL)
- {
- return;
- }
- Zero(&sl, sizeof(sl));
- IPsecServerGetServices(s->IPsecServer, &sl);
- CfgAddStr(f, "IPsec_Secret", sl.IPsec_Secret);
- CfgAddStr(f, "L2TP_DefaultHub", sl.L2TP_DefaultHub);
- CfgAddBool(f, "L2TP_Raw", sl.L2TP_Raw);
- CfgAddBool(f, "L2TP_IPsec", sl.L2TP_IPsec);
- CfgAddBool(f, "EtherIP_IPsec", sl.EtherIP_IPsec);
- list_folder = CfgCreateFolder(f, "EtherIP_IDSettingsList");
- Lock(s->IPsecServer->LockSettings);
- {
- for (i = 0;i < LIST_NUM(s->IPsecServer->EtherIPIdList);i++)
- {
- ETHERIP_ID *d = LIST_DATA(s->IPsecServer->EtherIPIdList, i);
- FOLDER *f;
- BUF *b;
- f = CfgCreateFolder(list_folder, d->Id);
- CfgAddStr(f, "HubName", d->HubName);
- CfgAddStr(f, "UserName", d->UserName);
- b = EncryptPassword2(d->Password);
- CfgAddBuf(f, "EncryptedPassword", b);
- FreeBuf(b);
- }
- }
- Unlock(s->IPsecServer->LockSettings);
- }
- // Write the license list
- void SiWriteLicenseManager(FOLDER *f, SERVER *s)
- {
- }
- // Read the license list
- void SiLoadLicenseManager(SERVER *s, FOLDER *f)
- {
- }
- // Write the Virtual HUB list
- void SiWriteHubs(FOLDER *f, SERVER *s)
- {
- UINT i;
- FOLDER *hub_folder;
- CEDAR *c;
- UINT num;
- HUB **hubs;
- // Validate arguments
- if (f == NULL || s == NULL)
- {
- return;
- }
- c = s->Cedar;
- LockList(c->HubList);
- {
- hubs = ToArray(c->HubList);
- num = LIST_NUM(c->HubList);
- for (i = 0;i < num;i++)
- {
- AddRef(hubs[i]->ref);
- }
- }
- UnlockList(c->HubList);
- for (i = 0;i < num;i++)
- {
- HUB *h = hubs[i];
- Lock(h->lock);
- {
- hub_folder = CfgCreateFolder(f, h->Name);
- SiWriteHubCfg(hub_folder, h);
- }
- Unlock(h->lock);
- ReleaseHub(h);
- if ((i % 30) == 1)
- {
- YieldCpu();
- }
- }
- Free(hubs);
- }
- // Read the Virtual HUB list
- void SiLoadHubs(SERVER *s, FOLDER *f)
- {
- UINT i;
- FOLDER *hub_folder;
- CEDAR *c;
- TOKEN_LIST *t;
- bool b = false;
- // Validate arguments
- if (f == NULL || s == NULL)
- {
- return;
- }
- c = s->Cedar;
- t = CfgEnumFolderToTokenList(f);
- for (i = 0;i < t->NumTokens;i++)
- {
- char *name = t->Token[i];
- if (s->Cedar->Bridge)
- {
- if (StrCmpi(name, SERVER_DEFAULT_BRIDGE_NAME) == 0)
- {
- // Read only the setting of Virtual HUB named "BRIDGE"
- // in the case of the Bridge
- b = true;
- }
- else
- {
- continue;
- }
- }
- hub_folder = CfgGetFolder(f, name);
- if (hub_folder != NULL)
- {
- SiLoadHubCfg(s, hub_folder, name);
- }
- }
- FreeToken(t);
- if (s->Cedar->Bridge && b == false)
- {
- // If there isn't "BRIDGE" virtual HUB setting, create it newly
- SiInitDefaultHubList(s);
- }
- }
- // Read the server-specific settings
- void SiLoadServerCfg(SERVER *s, FOLDER *f)
- {
- BUF *b;
- CEDAR *c;
- char tmp[MAX_SIZE];
- X *x = NULL;
- K *k = NULL;
- bool cluster_allowed = false;
- UINT num_connections_per_ip = 0;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- // Save interval related
- s->AutoSaveConfigSpan = CfgGetInt(f, "AutoSaveConfigSpan") * 1000;
- if (s->AutoSaveConfigSpan == 0)
- {
- s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
- }
- else
- {
- s->AutoSaveConfigSpan = MAKESURE(s->AutoSaveConfigSpan, SERVER_FILE_SAVE_INTERVAL_MIN, SERVER_FILE_SAVE_INTERVAL_MAX);
- }
- s->DontBackupConfig = CfgGetBool(f, "DontBackupConfig");
- if (CfgIsItem(f, "BackupConfigOnlyWhenModified"))
- {
- s->BackupConfigOnlyWhenModified = CfgGetBool(f, "BackupConfigOnlyWhenModified");
- }
- else
- {
- s->BackupConfigOnlyWhenModified = true;
- }
- c = s->Cedar;
- Lock(c->lock);
- {
- OPENVPN_SSTP_CONFIG config;
- FOLDER *syslog_f;
- {
- RPC_KEEP k;
- // Keep-alive related
- Zero(&k, sizeof(k));
- k.UseKeepConnect = CfgGetBool(f, "UseKeepConnect");
- CfgGetStr(f, "KeepConnectHost", k.KeepConnectHost, sizeof(k.KeepConnectHost));
- k.KeepConnectPort = CfgGetInt(f, "KeepConnectPort");
- k.KeepConnectProtocol = CfgGetInt(f, "KeepConnectProtocol");
- k.KeepConnectInterval = CfgGetInt(f, "KeepConnectInterval") * 1000;
- if (k.KeepConnectPort == 0)
- {
- k.KeepConnectPort = 80;
- }
- if (StrLen(k.KeepConnectHost) == 0)
- {
- StrCpy(k.KeepConnectHost, sizeof(k.KeepConnectHost), CLIENT_DEFAULT_KEEPALIVE_HOST);
- }
- if (k.KeepConnectInterval == 0)
- {
- k.KeepConnectInterval = KEEP_INTERVAL_DEFAULT * 1000;
- }
- if (k.KeepConnectInterval < 5000)
- {
- k.KeepConnectInterval = 5000;
- }
- if (k.KeepConnectInterval > 600000)
- {
- k.KeepConnectInterval = 600000;
- }
- Lock(s->Keep->lock);
- {
- KEEP *keep = s->Keep;
- keep->Enable = k.UseKeepConnect;
- keep->Server = true;
- StrCpy(keep->ServerName, sizeof(keep->ServerName), k.KeepConnectHost);
- keep->ServerPort = k.KeepConnectPort;
- keep->UdpMode = k.KeepConnectProtocol;
- keep->Interval = k.KeepConnectInterval;
- }
- Unlock(s->Keep->lock);
- }
- // syslog
- syslog_f = CfgGetFolder(f, "SyslogSettings");
- if (syslog_f != NULL && GetServerCapsBool(s, "b_support_syslog"))
- {
- SYSLOG_SETTING set;
- Zero(&set, sizeof(set));
- set.SaveType = CfgGetInt(syslog_f, "SaveType");
- CfgGetStr(syslog_f, "HostName", set.Hostname, sizeof(set.Hostname));
- set.Port = CfgGetInt(syslog_f, "Port");
- SiSetSysLogSetting(s, &set);
- }
- // Whether to disable the IPv6 listener
- s->Cedar->DisableIPv6Listener = CfgGetBool(f, "DisableIPv6Listener");
- // DoS
- s->DisableDosProction = CfgGetBool(f, "DisableDosProction");
- // Num Connections Per IP
- SetMaxConnectionsPerIp(CfgGetInt(f, "MaxConnectionsPerIP"));
- // MaxUnestablishedConnections
- SetMaxUnestablishedConnections(CfgGetInt(f, "MaxUnestablishedConnections"));
- // DeadLock
- s->DisableDeadLockCheck = CfgGetBool(f, "DisableDeadLockCheck");
- // Eraser
- s->Eraser = NewEraser(s->Logger, CfgGetInt64(f, "AutoDeleteCheckDiskFreeSpaceMin"));
- // WebUI
- s->UseWebUI = CfgGetBool(f, "UseWebUI");
- // WebTimePage
- s->UseWebTimePage = CfgGetBool(f, "UseWebTimePage");
- // NoLinuxArpFilter
- s->NoLinuxArpFilter = CfgGetBool(f, "NoLinuxArpFilter");
- // NoHighPriorityProcess
- s->NoHighPriorityProcess = CfgGetBool(f, "NoHighPriorityProcess");
- // NoDebugDump
- s->NoDebugDump = CfgGetBool(f, "NoDebugDump");
- if (s->NoDebugDump)
- {
- #ifdef OS_WIN32
- MsSetEnableMinidump(false);
- #endif // OS_WIN32
- }
- // Disable the SSTP server function
- s->DisableSSTPServer = CfgGetBool(f, "DisableSSTPServer");
- // Disable the OpenVPN server function
- s->DisableOpenVPNServer = CfgGetBool(f, "DisableOpenVPNServer");
- // Disable the NAT-traversal feature
- s->DisableNatTraversal = CfgGetBool(f, "DisableNatTraversal");
- // Intel AES
- s->DisableIntelAesAcceleration = CfgGetBool(f, "DisableIntelAesAcceleration");
- if (s->Cedar->Bridge == false)
- {
- // Enable the VPN-over-ICMP
- if (CfgIsItem(f, "EnableVpnOverIcmp"))
- {
- s->EnableVpnOverIcmp = CfgGetBool(f, "EnableVpnOverIcmp");
- }
- else
- {
- s->EnableVpnOverIcmp = false;
- }
- // Enable the VPN-over-DNS
- if (CfgIsItem(f, "EnableVpnOverDns"))
- {
- s->EnableVpnOverDns = CfgGetBool(f, "EnableVpnOverDns");
- }
- else
- {
- s->EnableVpnOverDns = false;
- }
- }
- // Debug log
- s->SaveDebugLog = CfgGetBool(f, "SaveDebugLog");
- if (s->SaveDebugLog)
- {
- s->DebugLog = NewTinyLog();
- }
- // Let the client not to send a signature
- s->NoSendSignature = CfgGetBool(f, "NoSendSignature");
- // Server certificate
- b = CfgGetBuf(f, "ServerCert");
- if (b != NULL)
- {
- x = BufToX(b, false);
- FreeBuf(b);
- }
- // Server private key
- b = CfgGetBuf(f, "ServerKey");
- if (b != NULL)
- {
- k = BufToK(b, true, false, NULL);
- FreeBuf(b);
- }
- if (x == NULL || k == NULL || CheckXandK(x, k) == false)
- {
- FreeX(x);
- FreeK(k);
- SiGenerateDefaultCert(&x, &k);
- SetCedarCert(c, x, k);
- FreeX(x);
- FreeK(k);
- }
- else
- {
- SetCedarCert(c, x, k);
- FreeX(x);
- FreeK(k);
- }
- // Cipher Name
- if (CfgGetStr(f, "CipherName", tmp, sizeof(tmp)))
- {
- StrUpper(tmp);
- if (CheckCipherListName(tmp))
- {
- SetCedarCipherList(c, tmp);
- }
- }
- // Traffic information
- Lock(c->TrafficLock);
- {
- SiLoadTraffic(f, "ServerTraffic", c->Traffic);
- }
- Unlock(c->TrafficLock);
- // Get whether the current license allows cluster mode
- cluster_allowed = true;
- // Type of server
- s->UpdatedServerType = s->ServerType =
- cluster_allowed ? CfgGetInt(f, "ServerType") : SERVER_TYPE_STANDALONE;
- // Password
- if (CfgGetByte(f, "HashedPassword", s->HashedPassword, sizeof(s->HashedPassword)) != sizeof(s->HashedPassword))
- {
- Hash(s->HashedPassword, "", 0, true);
- }
- if (s->ServerType != SERVER_TYPE_STANDALONE)
- {
- // Performance ratio of the server
- s->Weight = CfgGetInt(f, "ClusterMemberWeight");
- if (s->Weight == 0)
- {
- s->Weight = FARM_DEFAULT_WEIGHT;
- }
- }
- else
- {
- s->Weight = FARM_DEFAULT_WEIGHT;
- }
- if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
- {
- s->ControllerOnly = CfgGetBool(f, "ControllerOnly");
- }
- if (s->ServerType != SERVER_TYPE_STANDALONE)
- {
- // SSTP, OpenVPN, and NAT traversal can not be used in a cluster environment
- s->DisableNatTraversal = true;
- s->DisableSSTPServer = true;
- s->DisableOpenVPNServer = true;
- }
- if (s->Cedar->Bridge)
- {
- // SSTP, OpenVPN, and NAT traversal function can not be used in the bridge environment
- s->DisableNatTraversal = true;
- s->DisableSSTPServer = true;
- s->DisableOpenVPNServer = true;
- }
- // Read the OpenVPN Port List
- if (CfgGetStr(f, "OpenVPN_UdpPortList", tmp, sizeof(tmp)) == false)
- {
- {
- ToStr(tmp, OPENVPN_UDP_PORT);
- }
- }
- // Apply the configuration of SSTP and OpenVPN
- Zero(&config, sizeof(config));
- config.EnableOpenVPN = !s->DisableOpenVPNServer;
- config.EnableSSTP = !s->DisableSSTPServer;
- StrCpy(config.OpenVPNPortList, sizeof(config.OpenVPNPortList), tmp);
- SiSetOpenVPNAndSSTPConfig(s, &config);
- if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
- {
- char tmp[6 * MAX_PUBLIC_PORT_NUM + 1];
- // Load the settings item in the case of farm members
- CfgGetStr(f, "ControllerName", s->ControllerName, sizeof(s->ControllerName));
- s->ControllerPort = CfgGetInt(f, "ControllerPort");
- CfgGetByte(f, "MemberPassword", s->MemberPassword, SHA1_SIZE);
- s->PublicIp = CfgGetIp32(f, "PublicIp");
- if (CfgGetStr(f, "PublicPorts", tmp, sizeof(tmp)))
- {
- TOKEN_LIST *t = ParseToken(tmp, ", ");
- UINT i;
- s->NumPublicPort = t->NumTokens;
- s->PublicPorts = ZeroMalloc(s->NumPublicPort * sizeof(UINT));
- for (i = 0;i < s->NumPublicPort;i++)
- {
- s->PublicPorts[i] = ToInt(t->Token[i]);
- }
- FreeToken(t);
- }
- }
- // Configuration of VPN Azure Client
- s->EnableVpnAzure = CfgGetBool(f, "EnableVpnAzure");
- }
- Unlock(c->lock);
- }
- // Write the server-specific settings
- void SiWriteServerCfg(FOLDER *f, SERVER *s)
- {
- BUF *b;
- CEDAR *c;
- // Validate arguments
- if (f == NULL || s == NULL)
- {
- return;
- }
- CfgAddInt(f, "CurrentBuild", s->Cedar->Build);
- CfgAddInt(f, "AutoSaveConfigSpan", s->AutoSaveConfigSpanSaved / 1000);
- CfgAddBool(f, "DontBackupConfig", s->DontBackupConfig);
- CfgAddBool(f, "BackupConfigOnlyWhenModified", s->BackupConfigOnlyWhenModified);
- c = s->Cedar;
- Lock(c->lock);
- {
- bool is_vgs_cert = false;
- FOLDER *syslog_f;
- Lock(s->Keep->lock);
- {
- KEEP *k = s->Keep;
- CfgAddBool(f, "UseKeepConnect", k->Enable);
- CfgAddStr(f, "KeepConnectHost", k->ServerName);
- CfgAddInt(f, "KeepConnectPort", k->ServerPort);
- CfgAddInt(f, "KeepConnectProtocol", k->UdpMode);
- CfgAddInt(f, "KeepConnectInterval", k->Interval / 1000);
- }
- Unlock(s->Keep->lock);
- // syslog
- syslog_f = CfgCreateFolder(f, "SyslogSettings");
- if (syslog_f != NULL)
- {
- SYSLOG_SETTING set;
- SiGetSysLogSetting(s, &set);
- CfgAddInt(syslog_f, "SaveType", set.SaveType);
- CfgAddStr(syslog_f, "HostName", set.Hostname);
- CfgAddInt(syslog_f, "Port", set.Port);
- }
- // IPv6 listener disable setting
- CfgAddBool(f, "DisableIPv6Listener", s->Cedar->DisableIPv6Listener);
- // DoS
- CfgAddBool(f, "DisableDosProction", s->DisableDosProction);
- // MaxConnectionsPerIP
- CfgAddInt(f, "MaxConnectionsPerIP", GetMaxConnectionsPerIp());
- // MaxUnestablishedConnections
- CfgAddInt(f, "MaxUnestablishedConnections", GetMaxUnestablishedConnections());
- // DeadLock
- CfgAddBool(f, "DisableDeadLockCheck", s->DisableDeadLockCheck);
- // Eraser related
- CfgAddInt64(f, "AutoDeleteCheckDiskFreeSpaceMin", s->Eraser->MinFreeSpace);
- // WebUI
- CfgAddBool(f, "UseWebUI", s->UseWebUI);
- // NoLinuxArpFilter
- if (GetOsInfo()->OsType == OSTYPE_LINUX)
- {
- CfgAddBool(f, "NoLinuxArpFilter", s->NoLinuxArpFilter);
- }
- // NoHighPriorityProcess
- CfgAddBool(f, "NoHighPriorityProcess", s->NoHighPriorityProcess);
- #ifdef OS_WIN32
- CfgAddBool(f, "NoDebugDump", s->NoDebugDump);
- #endif // OS_WIN32
- if (s->ServerType == SERVER_TYPE_STANDALONE)
- {
- if (c->Bridge == false)
- {
- // Disable the NAT-traversal feature
- CfgAddBool(f, "DisableNatTraversal", s->DisableNatTraversal);
- // Disable the SSTP server function
- CfgAddBool(f, "DisableSSTPServer", s->DisableSSTPServer);
- // Disable the OpenVPN server function
- CfgAddBool(f, "DisableOpenVPNServer", s->DisableOpenVPNServer);
- }
- }
- if (c->Bridge == false)
- {
- // VPN over ICMP
- CfgAddBool(f, "EnableVpnOverIcmp", s->EnableVpnOverIcmp);
- // VPN over DNS
- CfgAddBool(f, "EnableVpnOverDns", s->EnableVpnOverDns);
- }
- // Intel AES
- CfgAddBool(f, "DisableIntelAesAcceleration", s->DisableIntelAesAcceleration);
- if (c->Bridge == false)
- {
- OPENVPN_SSTP_CONFIG config;
- SiGetOpenVPNAndSSTPConfig(s, &config);
- CfgAddStr(f, "OpenVPN_UdpPortList", config.OpenVPNPortList);
- }
- // WebTimePage
- CfgAddBool(f, "UseWebTimePage", s->UseWebTimePage);
- // Debug log
- CfgAddBool(f, "SaveDebugLog", s->SaveDebugLog);
- // Let the client not to send a signature
- CfgAddBool(f, "NoSendSignature", s->NoSendSignature);
- if (is_vgs_cert == false)
- {
- // Server certificate
- b = XToBuf(c->ServerX, false);
- CfgAddBuf(f, "ServerCert", b);
- FreeBuf(b);
- // Server private key
- b = KToBuf(c->ServerK, false, NULL);
- CfgAddBuf(f, "ServerKey", b);
- FreeBuf(b);
- }
- // Traffic information
- Lock(c->TrafficLock);
- {
- SiWriteTraffic(f, "ServerTraffic", c->Traffic);
- }
- Unlock(c->TrafficLock);
- // Type of server
- if (s->Cedar->Bridge == false)
- {
- CfgAddInt(f, "ServerType", s->UpdatedServerType);
- }
- // Cipher Name
- CfgAddStr(f, "CipherName", s->Cedar->CipherList);
- // Password
- CfgAddByte(f, "HashedPassword", s->HashedPassword, sizeof(s->HashedPassword));
- if (s->UpdatedServerType == SERVER_TYPE_FARM_MEMBER)
- {
- char tmp[6 * MAX_PUBLIC_PORT_NUM + 1];
- UINT i;
- // Setting items in the case of farm members
- CfgAddStr(f, "ControllerName", s->ControllerName);
- CfgAddInt(f, "ControllerPort", s->ControllerPort);
- CfgAddByte(f, "MemberPassword", s->MemberPassword, SHA1_SIZE);
- CfgAddIp32(f, "PublicIp", s->PublicIp);
- tmp[0] = 0;
- for (i = 0;i < s->NumPublicPort;i++)
- {
- char tmp2[MAX_SIZE];
- ToStr(tmp2, s->PublicPorts[i]);
- StrCat(tmp, sizeof(tmp), tmp2);
- StrCat(tmp, sizeof(tmp), ",");
- }
- if (StrLen(tmp) >= 1)
- {
- if (tmp[StrLen(tmp) - 1] == ',')
- {
- tmp[StrLen(tmp) - 1] = 0;
- }
- }
- CfgAddStr(f, "PublicPorts", tmp);
- }
- if (s->UpdatedServerType != SERVER_TYPE_STANDALONE)
- {
- CfgAddInt(f, "ClusterMemberWeight", s->Weight);
- }
- if (s->UpdatedServerType == SERVER_TYPE_FARM_CONTROLLER)
- {
- CfgAddBool(f, "ControllerOnly", s->ControllerOnly);
- }
- // VPN Azure Client
- if (s->AzureClient != NULL)
- {
- CfgAddBool(f, "EnableVpnAzure", s->EnableVpnAzure);
- }
- }
- Unlock(c->lock);
- }
- // Read the traffic information
- void SiLoadTraffic(FOLDER *parent, char *name, TRAFFIC *t)
- {
- FOLDER *f;
- // Validate arguments
- if (t != NULL)
- {
- Zero(t, sizeof(TRAFFIC));
- }
- if (parent == NULL || name == NULL || t == NULL)
- {
- return;
- }
- f = CfgGetFolder(parent, name);
- if (f == NULL)
- {
- return;
- }
- SiLoadTrafficInner(f, "SendTraffic", &t->Send);
- SiLoadTrafficInner(f, "RecvTraffic", &t->Recv);
- }
- void SiLoadTrafficInner(FOLDER *parent, char *name, TRAFFIC_ENTRY *e)
- {
- FOLDER *f;
- // Validate arguments
- if (e != NULL)
- {
- Zero(e, sizeof(TRAFFIC_ENTRY));
- }
- if (parent == NULL || name == NULL || e == NULL)
- {
- return;
- }
- f = CfgGetFolder(parent, name);
- if (f == NULL)
- {
- return;
- }
- e->BroadcastCount = CfgGetInt64(f, "BroadcastCount");
- e->BroadcastBytes = CfgGetInt64(f, "BroadcastBytes");
- e->UnicastCount = CfgGetInt64(f, "UnicastCount");
- e->UnicastBytes = CfgGetInt64(f, "UnicastBytes");
- }
- // Write the traffic information
- void SiWriteTraffic(FOLDER *parent, char *name, TRAFFIC *t)
- {
- FOLDER *f;
- // Validate arguments
- if (parent == NULL || name == NULL || t == NULL)
- {
- return;
- }
- f = CfgCreateFolder(parent, name);
- SiWriteTrafficInner(f, "SendTraffic", &t->Send);
- SiWriteTrafficInner(f, "RecvTraffic", &t->Recv);
- }
- void SiWriteTrafficInner(FOLDER *parent, char *name, TRAFFIC_ENTRY *e)
- {
- FOLDER *f;
- // Validate arguments
- if (parent == NULL || name == NULL || e == NULL)
- {
- return;
- }
- f = CfgCreateFolder(parent, name);
- CfgAddInt64(f, "BroadcastCount", e->BroadcastCount);
- CfgAddInt64(f, "BroadcastBytes", e->BroadcastBytes);
- CfgAddInt64(f, "UnicastCount", e->UnicastCount);
- CfgAddInt64(f, "UnicastBytes", e->UnicastBytes);
- }
- // Thread for writing configuration file
- void SiSaverThread(THREAD *thread, void *param)
- {
- SERVER *s = (SERVER *)param;
- // Validate arguments
- if (thread == NULL || param == NULL)
- {
- return;
- }
- while (s->Halt == false)
- {
- // Save to the configuration file
- if (s->NoMoreSave == false)
- {
- SiWriteConfigurationFile(s);
- }
- Wait(s->SaveHaltEvent, s->AutoSaveConfigSpan);
- }
- }
- // Write to the configuration file
- UINT SiWriteConfigurationFile(SERVER *s)
- {
- UINT ret;
- // Validate arguments
- if (s == NULL)
- {
- return 0;
- }
- if (s->CfgRw == NULL)
- {
- return 0;
- }
- if (s->NoMoreSave)
- {
- return 0;
- }
- Lock(s->SaveCfgLock);
- {
- FOLDER *f;
- Debug("save: SiWriteConfigurationToCfg() start.\n");
- f = SiWriteConfigurationToCfg(s);
- Debug("save: SiWriteConfigurationToCfg() finished.\n");
- Debug("save: SaveCfgRw() start.\n");
- ret = SaveCfgRwEx(s->CfgRw, f, s->BackupConfigOnlyWhenModified ? s->ConfigRevision : INFINITE);
- Debug("save: SaveCfgRw() finished.\n");
- Debug("save: CfgDeleteFolder() start.\n");
- CfgDeleteFolder(f);
- Debug("save: CfgDeleteFolder() finished.\n");
- }
- Unlock(s->SaveCfgLock);
- return ret;
- }
- // Release the configuration
- void SiFreeConfiguration(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- // Write to the configuration file
- SiWriteConfigurationFile(s);
- // Terminate the configuration file saving thread
- s->NoMoreSave = true;
- s->Halt = true;
- Set(s->SaveHaltEvent);
- WaitThread(s->SaveThread, INFINITE);
- ReleaseEvent(s->SaveHaltEvent);
- ReleaseThread(s->SaveThread);
- s->SaveHaltEvent = NULL;
- s->SaveThread = NULL;
- // Stop the IPsec server
- if (s->IPsecServer != NULL)
- {
- FreeIPsecServer(s->IPsecServer);
- s->IPsecServer = NULL;
- }
- // Terminate the OpenVPN server
- if (s->OpenVpnServerUdp != NULL)
- {
- FreeOpenVpnServerUdp(s->OpenVpnServerUdp);
- s->OpenVpnServerUdp = NULL;
- }
- // Terminate the DDNS client
- if (s->DDnsClient != NULL)
- {
- FreeDDNSClient(s->DDnsClient);
- s->DDnsClient = NULL;
- }
- // Terminate the VPN Azure client
- if (s->AzureClient != NULL)
- {
- FreeAzureClient(s->AzureClient);
- s->AzureClient = NULL;
- }
- FreeCfgRw(s->CfgRw);
- s->CfgRw = NULL;
- // Release the Ethernet
- FreeEth();
- }
- // Initialize the StXxx related function
- void StInit()
- {
- if (server_lock != NULL)
- {
- return;
- }
- server_lock = NewLock();
- }
- // Release the StXxx related function
- void StFree()
- {
- DeleteLock(server_lock);
- server_lock = NULL;
- }
- // Start the server
- void StStartServer(bool bridge)
- {
- Lock(server_lock);
- {
- if (server != NULL)
- {
- // It has already started
- Unlock(server_lock);
- return;
- }
- // Create a server
- server = SiNewServer(bridge);
- }
- Unlock(server_lock);
- // StartCedarLog();
- }
- // Get the server
- SERVER *StGetServer()
- {
- if (server == NULL)
- {
- return NULL;
- }
- return server;
- }
- // Stop the server
- void StStopServer()
- {
- Lock(server_lock);
- {
- if (server == NULL)
- {
- // Not started
- Unlock(server_lock);
- return;
- }
- // Release the server
- SiReleaseServer(server);
- server = NULL;
- }
- Unlock(server_lock);
- StopCedarLog();
- }
- // Set the type of server
- void SiSetServerType(SERVER *s, UINT type,
- UINT ip, UINT num_port, UINT *ports,
- char *controller_name, UINT controller_port, UCHAR *password, UINT weight, bool controller_only)
- {
- bool bridge;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- if (type == SERVER_TYPE_FARM_MEMBER &&
- (num_port == 0 || ports == NULL || controller_name == NULL ||
- controller_port == 0 || password == NULL || num_port > MAX_PUBLIC_PORT_NUM))
- {
- return;
- }
- if (weight == 0)
- {
- weight = FARM_DEFAULT_WEIGHT;
- }
- bridge = s->Cedar->Bridge;
- Lock(s->lock);
- {
- // Update types
- s->UpdatedServerType = type;
- s->Weight = weight;
- // Set the value
- if (type == SERVER_TYPE_FARM_MEMBER)
- {
- StrCpy(s->ControllerName, sizeof(s->ControllerName), controller_name);
- s->ControllerPort = controller_port;
- if (IsZero(password, SHA1_SIZE) == false)
- {
- Copy(s->MemberPassword, password, SHA1_SIZE);
- }
- s->PublicIp = ip;
- s->NumPublicPort = num_port;
- if (s->PublicPorts != NULL)
- {
- Free(s->PublicPorts);
- }
- s->PublicPorts = ZeroMalloc(num_port * sizeof(UINT));
- Copy(s->PublicPorts, ports, num_port * sizeof(UINT));
- }
- if (type == SERVER_TYPE_FARM_CONTROLLER)
- {
- s->ControllerOnly = controller_only;
- }
- }
- Unlock(s->lock);
- // Restart the server
- SiRebootServer(bridge);
- }
- // Thread to restart the server
- void SiRebootServerThread(THREAD *thread, void *param)
- {
- // Validate arguments
- if (thread == NULL)
- {
- return;
- }
- if (server == NULL)
- {
- return;
- }
- // Stop the server
- StStopServer();
- // Start the server
- StStartServer((bool)param);
- }
- // Restart the server
- void SiRebootServer(bool bridge)
- {
- SiRebootServerEx(bridge, false);
- }
- void SiRebootServerEx(bool bridge, bool reset_setting)
- {
- THREAD *t;
- server_reset_setting = reset_setting;
- t = NewThread(SiRebootServerThread, (void *)bridge);
- ReleaseThread(t);
- }
- // Set the state of the special listener
- void SiApplySpecialListenerStatus(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- if (s->DynListenerDns != NULL)
- {
- *s->DynListenerDns->EnablePtr = s->EnableVpnOverDns;
- ApplyDynamicListener(s->DynListenerDns);
- }
- if (s->DynListenerIcmp != NULL)
- {
- *s->DynListenerIcmp->EnablePtr = s->EnableVpnOverIcmp;
- ApplyDynamicListener(s->DynListenerIcmp);
- }
- }
- // Stop all listeners
- void SiStopAllListener(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- SiLockListenerList(s);
- {
- UINT i;
- LIST *o = NewListFast(NULL);
- for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
- {
- SERVER_LISTENER *e = LIST_DATA(s->ServerListenerList, i);
- Add(o, e);
- }
- for (i = 0;i < LIST_NUM(o);i++)
- {
- SERVER_LISTENER *e = LIST_DATA(o, i);
- SiDeleteListener(s, e->Port);
- }
- ReleaseList(o);
- }
- SiUnlockListenerList(s);
- ReleaseList(s->ServerListenerList);
- // Stop the VPN over ICMP listener
- FreeDynamicListener(s->DynListenerIcmp);
- s->DynListenerIcmp = NULL;
- // Stop the VPN over DNS listener
- FreeDynamicListener(s->DynListenerDns);
- s->DynListenerDns = NULL;
- }
- // Clean-up the server
- void SiCleanupServer(SERVER *s)
- {
- UINT i;
- CEDAR *c;
- LISTENER **listener_list;
- UINT num_listener;
- HUB **hub_list;
- UINT num_hub;
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- SiFreeDeadLockCheck(s);
- c = s->Cedar;
- if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
- {
- // In the case of farm members, stop the connection to the farm controller
- SLog(c, "LS_STOP_FARM_MEMBER");
- SiStopConnectToController(s->FarmController);
- s->FarmController = NULL;
- SLog(c, "LS_STOP_FARM_MEMBER_2");
- }
- IncrementServerConfigRevision(s);
- SLog(c, "LS_END_2");
- SLog(c, "LS_STOP_ALL_LISTENER");
- // Stop all listeners
- LockList(c->ListenerList);
- {
- listener_list = ToArray(c->ListenerList);
- num_listener = LIST_NUM(c->ListenerList);
- for (i = 0;i < num_listener;i++)
- {
- AddRef(listener_list[i]->ref);
- }
- }
- UnlockList(c->ListenerList);
- for (i = 0;i < num_listener;i++)
- {
- StopListener(listener_list[i]);
- ReleaseListener(listener_list[i]);
- }
- Free(listener_list);
- SLog(c, "LS_STOP_ALL_LISTENER_2");
- SLog(c, "LS_STOP_ALL_HUB");
- // Stop all HUBs
- LockList(c->HubList);
- {
- hub_list = ToArray(c->HubList);
- num_hub = LIST_NUM(c->HubList);
- for (i = 0;i < num_hub;i++)
- {
- AddRef(hub_list[i]->ref);
- }
- }
- UnlockList(c->HubList);
- for (i = 0;i < num_hub;i++)
- {
- StopHub(hub_list[i]);
- ReleaseHub(hub_list[i]);
- }
- Free(hub_list);
- SLog(c, "LS_STOP_ALL_HUB_2");
- // Release the configuration
- SiFreeConfiguration(s);
- // Stop the Cedar
- SLog(c, "LS_STOP_CEDAR");
- StopCedar(s->Cedar);
- SLog(c, "LS_STOP_CEDAR_2");
- // Stop all listeners
- SiStopAllListener(s);
- if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
- {
- // In the case of farm controller
- UINT i;
- SLog(c, "LS_STOP_FARM_CONTROL");
- // Stop the farm controling
- SiStopFarmControl(s);
- // Release the farm member information
- ReleaseList(s->FarmMemberList);
- s->FarmMemberList = NULL;
- for (i = 0;i < LIST_NUM(s->Me->HubList);i++)
- {
- Free(LIST_DATA(s->Me->HubList, i));
- }
- ReleaseList(s->Me->HubList);
- Free(s->Me);
- SLog(c, "LS_STOP_FARM_CONTROL_2");
- }
- if (s->PublicPorts != NULL)
- {
- Free(s->PublicPorts);
- }
- SLog(s->Cedar, "LS_END_1");
- SLog(s->Cedar, "L_LINE");
- #ifdef ENABLE_AZURE_SERVER
- if (s->AzureServer != NULL)
- {
- FreeAzureServer(s->AzureServer);
- }
- #endif // ENABLE_AZURE_SERVER
- ReleaseCedar(s->Cedar);
- DeleteLock(s->lock);
- DeleteLock(s->SaveCfgLock);
- StopKeep(s->Keep);
- FreeEraser(s->Eraser);
- FreeLog(s->Logger);
- FreeSysLog(s->Syslog);
- DeleteLock(s->SyslogLock);
- FreeServerCapsCache(s);
- SiFreeHubCreateHistory(s);
- // Stop the debug log
- FreeTinyLog(s->DebugLog);
- DeleteLock(s->TasksFromFarmControllerLock);
- DeleteLock(s->OpenVpnSstpConfigLock);
- Free(s);
- }
- // Release the server
- void SiReleaseServer(SERVER *s)
- {
- // Validate arguments
- if (s == NULL)
- {
- return;
- }
- if (Release(s->ref) == 0)
- {
- SiCleanupServer(s);
- }
- }
- // Get the URL of the member selector
- bool SiGetMemberSelectorUrl(char *url, UINT url_size)
- {
- BUF *b;
- bool ret = false;
- // Validate arguments
- if (url == NULL)
- {
- return false;
- }
- b = ReadDump(MEMBER_SELECTOR_TXT_FILENAME);
- if (b == NULL)
- {
- return false;
- }
- while (true)
- {
- char *line = CfgReadNextLine(b);
- if (line == NULL)
- {
- break;
- }
- Trim(line);
- if (IsEmptyStr(line) == false && ret == false)
- {
- StrCpy(url, url_size, line);
- ret = true;
- }
- Free(line);
- }
- FreeBuf(b);
- return ret;
- }
- // Specify the farm member for the next processing
- FARM_MEMBER *SiGetNextFarmMember(SERVER *s, CONNECTION *c, HUB *h)
- {
- UINT i, num;
- UINT min_point = 0;
- FARM_MEMBER *ret = NULL;
- PACK *p;
- char url[MAX_SIZE];
- // Validate arguments
- if (s == NULL || s->ServerType != SERVER_TYPE_FARM_CONTROLLER || c == NULL || h == NULL)
- {
- return NULL;
- }
- num = LIST_NUM(s->FarmMemberList);
- if (num == 0)
- {
- return NULL;
- }
- if (SiGetMemberSelectorUrl(url, sizeof(url)))
- {
- UINT64 ret_key = 0;
- // Generate the data for the member selector
- p = NewPack();
- for (i = 0;i < num;i++)
- {
- UINT num_sessions;
- UINT max_sessions;
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- bool do_not_select = false;
- if (s->ControllerOnly)
- {
- if (f->Me)
- {
- // No to select myself in the case of ControllerOnly
- do_not_select = true;
- }
- }
- if (f->Me == false)
- {
- num_sessions = f->NumSessions;
- max_sessions = f->MaxSessions;
- }
- else
- {
- num_sessions = Count(s->Cedar->CurrentSessions);
- max_sessions = GetServerCapsInt(s, "i_max_sessions");
- }
- if (max_sessions == 0)
- {
- max_sessions = GetServerCapsInt(s, "i_max_sessions");
- }
- if (num_sessions >= max_sessions)
- {
- do_not_select = true;
- }
- if (true)
- {
- UINT point = f->Point;
- char public_ip_str[MAX_SIZE];
- IPToStr32(public_ip_str, sizeof(public_ip_str), f->Ip);
- PackAddIntEx(p, "Point", point, i, num);
- PackAddInt64Ex(p, "Key", (UINT64)f, i, num);
- PackAddStrEx(p, "Hostname", f->hostname, i, num);
- PackAddStrEx(p, "PublicIp", public_ip_str, i, num);
- PackAddIntEx(p, "NumSessions", num_sessions, i, num);
- PackAddIntEx(p, "MaxSessions", max_sessions, i, num);
- PackAddIntEx(p, "AssignedClientLicense", f->AssignedClientLicense, i, num);
- PackAddIntEx(p, "AssignedBridgeLicense", f->AssignedBridgeLicense, i, num);
- PackAddIntEx(p, "Weight", f->Weight, i, num);
- PackAddDataEx(p, "RandomKey", f->RandomKey, SHA1_SIZE, i, num);
- PackAddIntEx(p, "NumTcpConnections", f->NumTcpConnections, i, num);
- PackAddIntEx(p, "NumHubs", LIST_NUM(f->HubList), i, num);
- PackAddBoolEx(p, "Me", f->Me, i, num);
- PackAddInt64Ex(p, "ConnectedTime", f->ConnectedTime, i, num);
- PackAddInt64Ex(p, "SystemId", f->SystemId, i, num);
- PackAddBoolEx(p, "DoNotSelect", do_not_select, i, num);
- }
- }
- if (true)
- {
- char client_ip_str[MAX_SIZE];
- UINT client_port = 0;
- UINT server_port = 0;
- SOCK *s = c->FirstSock;
- Zero(client_ip_str, sizeof(client_ip_str));
- if (s != NULL)
- {
- IPToStr(client_ip_str, sizeof(client_ip_str), &s->RemoteIP);
- client_port = s->RemotePort;
- server_port = s->LocalPort;
- }
- PackAddStr(p, "ClientIp", client_ip_str);
- PackAddInt(p, "ClientPort", client_port);
- PackAddInt(p, "ServerPort", server_port);
- PackAddInt(p, "ClientBuild", c->ClientBuild);
- PackAddStr(p, "CipherName", c->CipherName);
- PackAddStr(p, "ClientStr", c->ClientStr);
- PackAddInt(p, "ClientVer", c->ClientVer);
- PackAddInt64(p, "ConnectedTime", Tick64ToTime64(c->ConnectedTick));
- PackAddStr(p, "HubName", h->Name);
- PackAddBool(p, "StaticHub", h->Type == HUB_TYPE_FARM_STATIC);
- }
- PackAddInt(p, "NumMembers", num);
- // Make the member selector choose a member
- UnlockList(s->FarmMemberList);
- Unlock(s->Cedar->CedarSuperLock);
- {
- PACK *ret;
- Debug("Calling %s ...\n", url);
- ret = WpcCall(url, NULL, MEMBER_SELECTOR_CONNECT_TIMEOUT, MEMBER_SELECTOR_DATA_TIMEOUT,
- "Select", p, NULL, NULL, NULL);
- if (GetErrorFromPack(ret) == ERR_NO_ERROR)
- {
- ret_key = PackGetInt64(ret, "Key");
- Debug("Ret Key = %I64u\n", ret_key);
- }
- else
- {
- Debug("Error: %u\n", GetErrorFromPack(ret));
- }
- FreePack(ret);
- }
- Lock(s->Cedar->CedarSuperLock);
- LockList(s->FarmMemberList);
- FreePack(p);
- if (ret_key != 0)
- {
- FARM_MEMBER *f = (FARM_MEMBER *)ret_key;
- if (IsInList(s->FarmMemberList, f))
- {
- Debug("Farm Member Selected by Selector: %s\n", f->hostname);
- return f;
- }
- else
- {
- Debug("Farm Member Key = %I64u Not Found.\n", ret_key);
- }
- }
- else
- {
- // The member selector failed to select a member
- return NULL;
- }
- }
- num = LIST_NUM(s->FarmMemberList);
- if (num == 0)
- {
- return NULL;
- }
- for (i = 0;i < num;i++)
- {
- UINT num_sessions;
- UINT max_sessions;
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- if (s->ControllerOnly)
- {
- if (f->Me)
- {
- // No to select myself in the case of ControllerOnly
- continue;
- }
- }
- if (f->Me == false)
- {
- num_sessions = f->NumSessions;
- max_sessions = f->MaxSessions;
- }
- else
- {
- num_sessions = Count(s->Cedar->CurrentSessions);
- max_sessions = GetServerCapsInt(s, "i_max_sessions");
- }
- if (max_sessions == 0)
- {
- max_sessions = GetServerCapsInt(s, "i_max_sessions");
- }
- if (num_sessions < max_sessions)
- {
- if (f->Point >= min_point)
- {
- min_point = f->Point;
- ret = f;
- }
- }
- }
- return ret;
- }
- // Receive a HUB enumeration directive
- void SiCalledEnumHub(SERVER *s, PACK *p, PACK *req)
- {
- UINT i;
- CEDAR *c;
- UINT num = 0;
- // Validate arguments
- if (s == NULL || p == NULL || req == NULL)
- {
- return;
- }
- c = s->Cedar;
- LockList(c->HubList);
- {
- UINT num = LIST_NUM(c->HubList);
- for (i = 0;i < num;i++)
- {
- HUB *h = LIST_DATA(c->HubList, i);
- Lock(h->lock);
- {
- PackAddStrEx(p, "HubName", h->Name, i, num);
- PackAddIntEx(p, "HubType", h->Type, i, num);
- PackAddIntEx(p, "NumSession", Count(h->NumSessions), i, num);
- PackAddIntEx(p, "NumSessions", LIST_NUM(h->SessionList), i, num);
- PackAddIntEx(p, "NumSessionsClient", Count(h->NumSessionsClient), i, num);
- PackAddIntEx(p, "NumSessionsBridge", Count(h->NumSessionsBridge), i, num);
- PackAddIntEx(p, "NumMacTables", LIST_NUM(h->MacTable), i, num);
- PackAddIntEx(p, "NumIpTables", LIST_NUM(h->IpTable), i, num);
- PackAddInt64Ex(p, "LastCommTime", h->LastCommTime, i, num);
- PackAddInt64Ex(p, "CreatedTime", h->CreatedTime, i, num);
- }
- Unlock(h->lock);
- }
- }
- UnlockList(c->HubList);
- PackAddInt(p, "Point", SiGetPoint(s));
- PackAddInt(p, "NumTcpConnections", Count(s->Cedar->CurrentTcpConnections));
- PackAddInt(p, "NumTotalSessions", Count(s->Cedar->CurrentSessions));
- PackAddInt(p, "MaxSessions", GetServerCapsInt(s, "i_max_sessions"));
- PackAddInt(p, "AssignedClientLicense", Count(s->Cedar->AssignedClientLicense));
- PackAddInt(p, "AssignedBridgeLicense", Count(s->Cedar->AssignedBridgeLicense));
- PackAddData(p, "RandomKey", s->MyRandomKey, SHA1_SIZE);
- Lock(c->TrafficLock);
- {
- OutRpcTraffic(p, c->Traffic);
- }
- Unlock(c->TrafficLock);
- LockList(c->TrafficDiffList);
- {
- UINT num = LIST_NUM(c->TrafficDiffList);
- UINT i;
- for (i = 0;i < num;i++)
- {
- TRAFFIC_DIFF *d = LIST_DATA(c->TrafficDiffList, i);
- PackAddIntEx(p, "TdType", d->Type, i, num);
- PackAddStrEx(p, "TdHubName", d->HubName, i, num);
- PackAddStrEx(p, "TdName", d->Name, i, num);
- OutRpcTrafficEx(&d->Traffic, p, i, num);
- Free(d->HubName);
- Free(d->Name);
- Free(d);
- }
- DeleteAll(c->TrafficDiffList);
- }
- UnlockList(c->TrafficDiffList);
- }
- // Receive a HUB delete directive
- void SiCalledDeleteHub(SERVER *s, PACK *p)
- {
- char name[MAX_SIZE];
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return;
- }
- if (PackGetStr(p, "HubName", name, sizeof(name)) == false)
- {
- return;
- }
- LockHubList(s->Cedar);
- h = GetHub(s->Cedar, name);
- if (h == NULL)
- {
- UnlockHubList(s->Cedar);
- return;
- }
- UnlockHubList(s->Cedar);
- SetHubOffline(h);
- LockHubList(s->Cedar);
- DelHubEx(s->Cedar, h, true);
- UnlockHubList(s->Cedar);
- ReleaseHub(h);
- }
- // Receive a HUB update directive
- void SiCalledUpdateHub(SERVER *s, PACK *p)
- {
- char name[MAX_SIZE];
- UINT type;
- HUB_OPTION o;
- HUB_LOG log;
- bool save_packet_log;
- UINT packet_log_switch_type;
- UINT packet_log_config[NUM_PACKET_LOG];
- bool save_security_log;
- bool type_changed = false;
- UINT security_log_switch_type;
- UINT i;
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return;
- }
- PackGetStr(p, "HubName", name, sizeof(name));
- type = PackGetInt(p, "HubType");
- Zero(&o, sizeof(o));
- o.MaxSession = PackGetInt(p, "MaxSession");
- o.NoArpPolling = PackGetBool(p, "NoArpPolling");
- o.NoIPv6AddrPolling = PackGetBool(p, "NoIPv6AddrPolling");
- o.FilterPPPoE = PackGetBool(p, "FilterPPPoE");
- o.YieldAfterStorePacket = PackGetBool(p, "YieldAfterStorePacket");
- o.NoSpinLockForPacketDelay = PackGetBool(p, "NoSpinLockForPacketDelay");
- o.BroadcastStormDetectionThreshold = PackGetInt(p, "BroadcastStormDetectionThreshold");
- o.ClientMinimumRequiredBuild = PackGetInt(p, "ClientMinimumRequiredBuild");
- o.FixForDLinkBPDU = PackGetBool(p, "FixForDLinkBPDU");
- o.BroadcastLimiterStrictMode = PackGetBool(p, "BroadcastLimiterStrictMode");
- o.NoLookBPDUBridgeId = PackGetBool(p, "NoLookBPDUBridgeId");
- o.NoManageVlanId = PackGetBool(p, "NoManageVlanId");
- o.MaxLoggedPacketsPerMinute = PackGetInt(p, "MaxLoggedPacketsPerMinute");
- o.DoNotSaveHeavySecurityLogs = PackGetBool(p, "DoNotSaveHeavySecurityLogs");
- o.DropBroadcastsInPrivacyFilterMode = PackGetBool(p, "DropBroadcastsInPrivacyFilterMode");
- o.DropArpInPrivacyFilterMode = PackGetBool(p, "DropArpInPrivacyFilterMode");
- o.SuppressClientUpdateNotification = PackGetBool(p, "SuppressClientUpdateNotification");
- o.VlanTypeId = PackGetInt(p, "VlanTypeId");
- if (o.VlanTypeId == 0)
- {
- o.VlanTypeId = MAC_PROTO_TAGVLAN;
- }
- o.FilterOSPF = PackGetBool(p, "FilterOSPF");
- o.FilterIPv4 = PackGetBool(p, "FilterIPv4");
- o.FilterIPv6 = PackGetBool(p, "FilterIPv6");
- o.FilterNonIP = PackGetBool(p, "FilterNonIP");
- o.NoIPv4PacketLog = PackGetBool(p, "NoIPv4PacketLog");
- o.NoIPv6PacketLog = PackGetBool(p, "NoIPv6PacketLog");
- o.FilterBPDU = PackGetBool(p, "FilterBPDU");
- o.NoIPv6DefaultRouterInRAWhenIPv6 = PackGetBool(p, "NoIPv6DefaultRouterInRAWhenIPv6");
- o.NoMacAddressLog = PackGetBool(p, "NoMacAddressLog");
- o.ManageOnlyPrivateIP = PackGetBool(p, "ManageOnlyPrivateIP");
- o.ManageOnlyLocalUnicastIPv6 = PackGetBool(p, "ManageOnlyLocalUnicastIPv6");
- o.DisableIPParsing = PackGetBool(p, "DisableIPParsing");
- o.NoIpTable = PackGetBool(p, "NoIpTable");
- o.NoEnum = PackGetBool(p, "NoEnum");
- o.AdjustTcpMssValue = PackGetInt(p, "AdjustTcpMssValue");
- o.DisableAdjustTcpMss = PackGetBool(p, "DisableAdjustTcpMss");
- o.NoDhcpPacketLogOutsideHub = PackGetBool(p, "NoDhcpPacketLogOutsideHub");
- o.DisableHttpParsing = PackGetBool(p, "DisableHttpParsing");
- o.DisableUdpAcceleration = PackGetBool(p, "DisableUdpAcceleration");
- o.DisableUdpFilterForLocalBridgeNic = PackGetBool(p, "DisableUdpFilterForLocalBridgeNic");
- o.ApplyIPv4AccessListOnArpPacket = PackGetBool(p, "ApplyIPv4AccessListOnArpPacket");
- o.RemoveDefGwOnDhcpForLocalhost = PackGetBool(p, "RemoveDefGwOnDhcpForLocalhost");
- o.SecureNAT_MaxTcpSessionsPerIp = PackGetInt(p, "SecureNAT_MaxTcpSessionsPerIp");
- o.SecureNAT_MaxTcpSynSentPerIp = PackGetInt(p, "SecureNAT_MaxTcpSynSentPerIp");
- o.SecureNAT_MaxUdpSessionsPerIp = PackGetInt(p, "SecureNAT_MaxUdpSessionsPerIp");
- o.SecureNAT_MaxDnsSessionsPerIp = PackGetInt(p, "SecureNAT_MaxDnsSessionsPerIp");
- o.SecureNAT_MaxIcmpSessionsPerIp = PackGetInt(p, "SecureNAT_MaxIcmpSessionsPerIp");
- o.AccessListIncludeFileCacheLifetime = PackGetInt(p, "AccessListIncludeFileCacheLifetime");
- if (o.AccessListIncludeFileCacheLifetime == 0)
- {
- o.AccessListIncludeFileCacheLifetime = ACCESS_LIST_INCLUDE_FILE_CACHE_LIFETIME;
- }
- o.DisableKernelModeSecureNAT = PackGetBool(p, "DisableKernelModeSecureNAT");
- o.DisableUserModeSecureNAT = PackGetBool(p, "DisableUserModeSecureNAT");
- o.DisableCheckMacOnLocalBridge = PackGetBool(p, "DisableCheckMacOnLocalBridge");
- o.DisableCorrectIpOffloadChecksum = PackGetBool(p, "DisableCorrectIpOffloadChecksum");
- save_packet_log = PackGetInt(p, "SavePacketLog");
- packet_log_switch_type = PackGetInt(p, "PacketLogSwitchType");
- for (i = 0;i < NUM_PACKET_LOG;i++)
- {
- packet_log_config[i] = PackGetIntEx(p, "PacketLogConfig", i);
- }
- save_security_log = PackGetInt(p, "SaveSecurityLog");
- security_log_switch_type = PackGetInt(p, "SecurityLogSwitchType");
- Zero(&log, sizeof(log));
- log.SavePacketLog = save_packet_log;
- log.PacketLogSwitchType = packet_log_switch_type;
- Copy(log.PacketLogConfig, packet_log_config, sizeof(log.PacketLogConfig));
- log.SaveSecurityLog = save_security_log;
- log.SecurityLogSwitchType = security_log_switch_type;
- h = GetHub(s->Cedar, name);
- if (h == NULL)
- {
- return;
- }
- h->FarmMember_MaxSessionClient = PackGetInt(p, "MaxSessionClient");
- h->FarmMember_MaxSessionBridge = PackGetInt(p, "MaxSessionBridge");
- h->FarmMember_MaxSessionClientBridgeApply = PackGetBool(p, "MaxSessionClientBridgeApply");
- if (h->FarmMember_MaxSessionClientBridgeApply == false)
- {
- h->FarmMember_MaxSessionClient = INFINITE;
- h->FarmMember_MaxSessionBridge = INFINITE;
- }
- Lock(h->lock);
- {
- Copy(h->Option, &o, sizeof(HUB_OPTION));
- PackGetData2(p, "SecurePassword", h->SecurePassword, SHA1_SIZE);
- PackGetData2(p, "HashedPassword", h->HashedPassword, SHA1_SIZE);
- }
- Unlock(h->lock);
- SetHubLogSetting(h, &log);
- if (h->Type != type)
- {
- h->Type = type;
- type_changed = true;
- }
- LockList(h->AccessList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(h->AccessList);i++)
- {
- ACCESS *a = LIST_DATA(h->AccessList, i);
- Free(a);
- }
- DeleteAll(h->AccessList);
- }
- UnlockList(h->AccessList);
- for (i = 0;i < SiNumAccessFromPack(p);i++)
- {
- ACCESS *a = SiPackToAccess(p, i);
- AddAccessList(h, a);
- Free(a);
- }
- if (PackGetBool(p, "EnableSecureNAT"))
- {
- VH_OPTION t;
- bool changed;
- InVhOption(&t, p);
- changed = Cmp(h->SecureNATOption, &t, sizeof(VH_OPTION)) == 0 ? false : true;
- Copy(h->SecureNATOption, &t, sizeof(VH_OPTION));
- EnableSecureNAT(h, true);
- if (changed)
- {
- Lock(h->lock_online);
- {
- if (h->SecureNAT != NULL)
- {
- SetVirtualHostOption(h->SecureNAT->Nat->Virtual, &t);
- Debug("SiCalledUpdateHub: SecureNAT Updated.\n");
- }
- }
- Unlock(h->lock_online);
- }
- }
- else
- {
- EnableSecureNAT(h, false);
- Debug("SiCalledUpdateHub: SecureNAT Disabled.\n");
- }
- if (type_changed)
- {
- // Remove all sessions since the type of HUB has been changed
- if (h->Offline == false)
- {
- SetHubOffline(h);
- SetHubOnline(h);
- }
- }
- ReleaseHub(h);
- }
- // Inspect the ticket
- bool SiCheckTicket(HUB *h, UCHAR *ticket, char *username, UINT username_size, char *usernamereal, UINT usernamereal_size, POLICY *policy, char *sessionname, UINT sessionname_size, char *groupname, UINT groupname_size)
- {
- bool ret = false;
- // Validate arguments
- if (h == NULL || ticket == NULL || username == NULL || usernamereal == NULL || policy == NULL || sessionname == NULL)
- {
- return false;
- }
- LockList(h->TicketList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(h->TicketList);i++)
- {
- TICKET *t = LIST_DATA(h->TicketList, i);
- if (Cmp(t->Ticket, ticket, SHA1_SIZE) == 0)
- {
- ret = true;
- StrCpy(username, username_size, t->Username);
- StrCpy(usernamereal, usernamereal_size, t->UsernameReal);
- StrCpy(sessionname, sessionname_size, t->SessionName);
- StrCpy(groupname, groupname_size, t->GroupName);
- Copy(policy, &t->Policy, sizeof(POLICY));
- Delete(h->TicketList, t);
- Free(t);
- break;
- }
- }
- }
- UnlockList(h->TicketList);
- return ret;
- }
- // Receive a MAC address deletion directive
- void SiCalledDeleteMacTable(SERVER *s, PACK *p)
- {
- UINT key;
- char hubname[MAX_HUBNAME_LEN + 1];
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return;
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return;
- }
- key = PackGetInt(p, "Key");
- LockHubList(s->Cedar);
- {
- h = GetHub(s->Cedar, hubname);
- }
- UnlockHubList(s->Cedar);
- if (h == NULL)
- {
- return;
- }
- LockList(h->MacTable);
- {
- if (IsInList(h->MacTable, (void *)key))
- {
- MAC_TABLE_ENTRY *e = (MAC_TABLE_ENTRY *)key;
- Delete(h->MacTable, e);
- Free(e);
- }
- }
- UnlockList(h->MacTable);
- ReleaseHub(h);
- }
- // Receive an IP address delete directive
- void SiCalledDeleteIpTable(SERVER *s, PACK *p)
- {
- UINT key;
- char hubname[MAX_HUBNAME_LEN + 1];
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return;
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return;
- }
- key = PackGetInt(p, "Key");
- LockHubList(s->Cedar);
- {
- h = GetHub(s->Cedar, hubname);
- }
- UnlockHubList(s->Cedar);
- if (h == NULL)
- {
- return;
- }
- LockList(h->IpTable);
- {
- if (IsInList(h->IpTable, (void *)key))
- {
- IP_TABLE_ENTRY *e = (IP_TABLE_ENTRY *)key;
- Delete(h->IpTable, e);
- Free(e);
- }
- }
- UnlockList(h->IpTable);
- ReleaseHub(h);
- }
- // Receive a session deletion directive
- void SiCalledDeleteSession(SERVER *s, PACK *p)
- {
- char name[MAX_SESSION_NAME_LEN + 1];
- char hubname[MAX_HUBNAME_LEN + 1];
- HUB *h;
- SESSION *sess;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return;
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return;
- }
- if (PackGetStr(p, "SessionName", name, sizeof(name)) == false)
- {
- return;
- }
- LockHubList(s->Cedar);
- {
- h = GetHub(s->Cedar, hubname);
- }
- UnlockHubList(s->Cedar);
- if (h == NULL)
- {
- return;
- }
- sess = GetSessionByName(h, name);
- if (sess != NULL)
- {
- if (sess->BridgeMode == false && sess->LinkModeServer == false && sess->SecureNATMode == false)
- {
- StopSession(sess);
- }
- ReleaseSession(sess);
- }
- ReleaseHub(h);
- }
- // Receive a log file reading directive
- PACK *SiCalledReadLogFile(SERVER *s, PACK *p)
- {
- RPC_READ_LOG_FILE t;
- PACK *ret;
- char filepath[MAX_PATH];
- UINT offset;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NULL;
- }
- PackGetStr(p, "FilePath", filepath, sizeof(filepath));
- offset = PackGetInt(p, "Offset");
- Zero(&t, sizeof(t));
- SiReadLocalLogFile(s, filepath, offset, &t);
- ret = NewPack();
- OutRpcReadLogFile(ret, &t);
- FreeRpcReadLogFile(&t);
- return ret;
- }
- // Receive a log file enumeration directive
- PACK *SiCalledEnumLogFileList(SERVER *s, PACK *p)
- {
- RPC_ENUM_LOG_FILE t;
- PACK *ret;
- char hubname[MAX_HUBNAME_LEN + 1];
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NULL;
- }
- PackGetStr(p, "HubName", hubname, sizeof(hubname));
- Zero(&t, sizeof(t));
- SiEnumLocalLogFileList(s, hubname, &t);
- ret = NewPack();
- OutRpcEnumLogFile(ret, &t);
- FreeRpcEnumLogFile(&t);
- return ret;
- }
- // Receive a session information directive
- PACK *SiCalledGetSessionStatus(SERVER *s, PACK *p)
- {
- RPC_SESSION_STATUS t;
- ADMIN a;
- PACK *ret;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NULL;
- }
- Zero(&t, sizeof(t));
- InRpcSessionStatus(&t, p);
- Zero(&a, sizeof(a));
- a.Server = s;
- a.ServerAdmin = true;
- if (StGetSessionStatus(&a, &t) != ERR_NO_ERROR)
- {
- FreeRpcSessionStatus(&t);
- return NULL;
- }
- ret = NewPack();
- OutRpcSessionStatus(ret, &t);
- FreeRpcSessionStatus(&t);
- return ret;
- }
- // IP table enumeration directive
- PACK *SiCalledEnumIpTable(SERVER *s, PACK *p)
- {
- char hubname[MAX_HUBNAME_LEN + 1];
- RPC_ENUM_IP_TABLE t;
- PACK *ret;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NewPack();
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return NewPack();
- }
- Zero(&t, sizeof(t));
- SiEnumIpTable(s, hubname, &t);
- ret = NewPack();
- OutRpcEnumIpTable(ret, &t);
- FreeRpcEnumIpTable(&t);
- return ret;
- }
- // MAC table enumeration directive
- PACK *SiCalledEnumMacTable(SERVER *s, PACK *p)
- {
- char hubname[MAX_HUBNAME_LEN + 1];
- RPC_ENUM_MAC_TABLE t;
- PACK *ret;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NewPack();
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return NewPack();
- }
- Zero(&t, sizeof(t));
- SiEnumMacTable(s, hubname, &t);
- ret = NewPack();
- OutRpcEnumMacTable(ret, &t);
- FreeRpcEnumMacTable(&t);
- return ret;
- }
- // NAT status acquisition directive
- PACK *SiCalledGetNatStatus(SERVER *s, PACK *p)
- {
- char hubname[MAX_HUBNAME_LEN + 1];
- RPC_NAT_STATUS t;
- PACK *ret;
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NewPack();
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return NewPack();
- }
- Zero(&t, sizeof(t));
- LockHubList(s->Cedar);
- {
- h = GetHub(s->Cedar, hubname);
- }
- UnlockHubList(s->Cedar);
- if (h != NULL)
- {
- Lock(h->lock_online);
- {
- if (h->SecureNAT != NULL)
- {
- NtGetStatus(h->SecureNAT->Nat, &t);
- }
- }
- Unlock(h->lock_online);
- }
- ReleaseHub(h);
- ret = NewPack();
- OutRpcNatStatus(ret, &t);
- FreeRpcNatStatus(&t);
- return ret;
- }
- // DHCP table enumeration directive
- PACK *SiCalledEnumDhcp(SERVER *s, PACK *p)
- {
- char hubname[MAX_HUBNAME_LEN + 1];
- RPC_ENUM_DHCP t;
- PACK *ret;
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NewPack();
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return NewPack();
- }
- Zero(&t, sizeof(t));
- LockHubList(s->Cedar);
- {
- h = GetHub(s->Cedar, hubname);
- }
- UnlockHubList(s->Cedar);
- if (h != NULL)
- {
- Lock(h->lock_online);
- {
- if (h->SecureNAT != NULL)
- {
- NtEnumDhcpList(h->SecureNAT->Nat, &t);
- }
- }
- Unlock(h->lock_online);
- }
- ReleaseHub(h);
- ret = NewPack();
- OutRpcEnumDhcp(ret, &t);
- FreeRpcEnumDhcp(&t);
- return ret;
- }
- // NAT table enumeration directive
- PACK *SiCalledEnumNat(SERVER *s, PACK *p)
- {
- char hubname[MAX_HUBNAME_LEN + 1];
- RPC_ENUM_NAT t;
- PACK *ret;
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NewPack();
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return NewPack();
- }
- Zero(&t, sizeof(t));
- LockHubList(s->Cedar);
- {
- h = GetHub(s->Cedar, hubname);
- }
- UnlockHubList(s->Cedar);
- if (h != NULL)
- {
- Lock(h->lock_online);
- {
- if (h->SecureNAT != NULL)
- {
- NtEnumNatList(h->SecureNAT->Nat, &t);
- }
- }
- Unlock(h->lock_online);
- }
- ReleaseHub(h);
- ret = NewPack();
- OutRpcEnumNat(ret, &t);
- FreeRpcEnumNat(&t);
- return ret;
- }
- // Receive a session enumeration directive
- PACK *SiCalledEnumSession(SERVER *s, PACK *p)
- {
- char hubname[MAX_HUBNAME_LEN + 1];
- RPC_ENUM_SESSION t;
- PACK *ret;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NewPack();
- }
- if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
- {
- return NewPack();
- }
- Zero(&t, sizeof(t));
- SiEnumLocalSession(s, hubname, &t);
- ret = NewPack();
- OutRpcEnumSession(ret, &t);
- FreeRpcEnumSession(&t);
- return ret;
- }
- // Receive a ticket creation directive
- PACK *SiCalledCreateTicket(SERVER *s, PACK *p)
- {
- char username[MAX_SIZE];
- char hubname[MAX_SIZE];
- char groupname[MAX_SIZE];
- char realusername[MAX_SIZE];
- char sessionname[MAX_SESSION_NAME_LEN + 1];
- POLICY policy;
- UCHAR ticket[SHA1_SIZE];
- char ticket_str[MAX_SIZE];
- HUB *h;
- UINT i;
- PACK *ret;
- TICKET *t;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return NewPack();
- }
- PackGetStr(p, "UserName", username, sizeof(username));
- PackGetStr(p, "GroupName", groupname, sizeof(groupname));
- PackGetStr(p, "HubName", hubname, sizeof(hubname));
- PackGetStr(p, "RealUserName", realusername, sizeof(realusername));
- PackGetStr(p, "SessionName", sessionname, sizeof(sessionname));
- InRpcPolicy(&policy, p);
- if (PackGetDataSize(p, "Ticket") == SHA1_SIZE)
- {
- PackGetData(p, "Ticket", ticket);
- }
- BinToStr(ticket_str, sizeof(ticket_str), ticket, SHA1_SIZE);
- SLog(s->Cedar, "LS_TICKET_2", hubname, username, realusername, sessionname,
- ticket_str, TICKET_EXPIRES / 1000);
- // Get the HUB
- h = GetHub(s->Cedar, hubname);
- if (h == NULL)
- {
- return NewPack();
- }
- LockList(h->TicketList);
- {
- LIST *o = NewListFast(NULL);
- // Discard old tickets
- for (i = 0;i < LIST_NUM(h->TicketList);i++)
- {
- TICKET *t = LIST_DATA(h->TicketList, i);
- if ((t->CreatedTick + TICKET_EXPIRES) < Tick64())
- {
- Add(o, t);
- }
- }
- for (i = 0;i < LIST_NUM(o);i++)
- {
- TICKET *t = LIST_DATA(o, i);
- Delete(h->TicketList, t);
- Free(t);
- }
- ReleaseList(o);
- // Create a ticket
- t = ZeroMalloc(sizeof(TICKET));
- t->CreatedTick = Tick64();
- Copy(&t->Policy, &policy, sizeof(POLICY));
- Copy(t->Ticket, ticket, SHA1_SIZE);
- StrCpy(t->Username, sizeof(t->Username), username);
- StrCpy(t->UsernameReal, sizeof(t->UsernameReal), realusername);
- StrCpy(t->GroupName, sizeof(t->GroupName), groupname);
- StrCpy(t->SessionName, sizeof(t->SessionName), sessionname);
- Add(h->TicketList, t);
- }
- UnlockList(h->TicketList);
- ReleaseHub(h);
- ret = NewPack();
- PackAddInt(ret, "Point", SiGetPoint(s));
- return ret;
- }
- // Receive a HUB creation directive
- void SiCalledCreateHub(SERVER *s, PACK *p)
- {
- char name[MAX_SIZE];
- UINT type;
- HUB_OPTION o;
- HUB_LOG log;
- bool save_packet_log;
- UINT packet_log_switch_type;
- UINT packet_log_config[NUM_PACKET_LOG];
- bool save_security_log;
- UINT security_log_switch_type;
- UINT i;
- HUB *h;
- // Validate arguments
- if (s == NULL || p == NULL)
- {
- return;
- }
- PackGetStr(p, "HubName", name, sizeof(name));
- type = PackGetInt(p, "HubType");
- Zero(&o, sizeof(o));
- o.MaxSession = PackGetInt(p, "MaxSession");
- save_packet_log = PackGetInt(p, "SavePacketLog");
- packet_log_switch_type = PackGetInt(p, "PacketLogSwitchType");
- for (i = 0;i < NUM_PACKET_LOG;i++)
- {
- packet_log_config[i] = PackGetIntEx(p, "PacketLogConfig", i);
- }
- save_security_log = PackGetInt(p, "SaveSecurityLog");
- security_log_switch_type = PackGetInt(p, "SecurityLogSwitchType");
- Zero(&log, sizeof(log));
- log.SavePacketLog = save_packet_log;
- log.PacketLogSwitchType = packet_log_switch_type;
- Copy(log.PacketLogConfig, packet_log_config, sizeof(log.PacketLogConfig));
- log.SaveSecurityLog = save_security_log;
- log.SecurityLogSwitchType = security_log_switch_type;
- h = NewHub(s->Cedar, name, &o);
- h->LastCommTime = h->LastLoginTime = h->CreatedTime = 0;
- SetHubLogSetting(h, &log);
- h->Type = type;
- h->FarmMember_MaxSessionClient = PackGetInt(p, "MaxSessionClient");
- h->FarmMember_MaxSessionBridge = PackGetInt(p, "MaxSessionBridge");
- h->FarmMember_MaxSessionClientBridgeApply = PackGetBool(p, "MaxSessionClientBridgeApply");
- if (h->FarmMember_MaxSessionClientBridgeApply == false)
- {
- h->FarmMember_MaxSessionClient = INFINITE;
- h->FarmMember_MaxSessionBridge = INFINITE;
- }
- PackGetData2(p, "SecurePassword", h->SecurePassword, SHA1_SIZE);
- PackGetData2(p, "HashedPassword", h->HashedPassword, SHA1_SIZE);
- for (i = 0;i < SiNumAccessFromPack(p);i++)
- {
- ACCESS *a = SiPackToAccess(p, i);
- AddAccessList(h, a);
- Free(a);
- }
- if (PackGetBool(p, "EnableSecureNAT"))
- {
- VH_OPTION t;
- InVhOption(&t, p);
- Copy(h->SecureNATOption, &t, sizeof(VH_OPTION));
- EnableSecureNAT(h, true);
- Debug("SiCalledCreateHub: SecureNAT Created.\n");
- }
- AddHub(s->Cedar, h);
- h->Offline = true;
- SetHubOnline(h);
- ReleaseHub(h);
- }
- // Farm control thread
- void SiFarmControlThread(THREAD *thread, void *param)
- {
- SERVER *s;
- CEDAR *c;
- EVENT *e;
- LIST *o;
- UINT i;
- char tmp[MAX_PATH];
- // Validate arguments
- if (thread == NULL || param == NULL)
- {
- return;
- }
- s = (SERVER *)param;
- c = s->Cedar;
- e = s->FarmControlThreadHaltEvent;
- while (true)
- {
- Lock(c->CedarSuperLock);
- // Enumerate HUB list which is hosted by each farm member
- Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
- SiDebugLog(s, tmp);
- LockList(s->FarmMemberList);
- {
- UINT i;
- UINT num;
- UINT assigned_client_license = 0;
- UINT assigned_bridge_license = 0;
- LIST *fm_list = NewListFast(NULL);
- Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
- SiDebugLog(s, tmp);
- num = 0;
- while (true)
- {
- bool escape = true;
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- if (IsInList(fm_list, f) == false)
- {
- SiCallEnumHub(s, f);
- // Get the total number of sessions across the server farm
- num += f->NumSessions;
- assigned_client_license += f->AssignedClientLicense;
- assigned_bridge_license += f->AssignedBridgeLicense;
- escape = false;
- Add(fm_list, f);
- break;
- }
- }
- if (escape)
- {
- break;
- }
- UnlockList(s->FarmMemberList);
- LockList(s->FarmMemberList);
- }
- ReleaseList(fm_list);
- s->CurrentTotalNumSessionsOnFarm = num;
- // Update the number of assigned licenses
- s->CurrentAssignedBridgeLicense = assigned_bridge_license;
- s->CurrentAssignedClientLicense = assigned_client_license;
- Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
- SiDebugLog(s, tmp);
- }
- UnlockList(s->FarmMemberList);
- Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
- SiDebugLog(s, tmp);
- o = NewListFast(NULL);
- Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
- SiDebugLog(s, tmp);
- // Emit an update notification for each HUB
- LockList(c->HubList);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(c->HubList);i++)
- {
- HUB *h = LIST_DATA(c->HubList, i);
- AddRef(h->ref);
- Add(o, h);
- }
- }
- UnlockList(c->HubList);
- Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
- SiDebugLog(s, tmp);
- for (i = 0;i < LIST_NUM(o);i++)
- {
- HUB *h = LIST_DATA(o, i);
- SiHubUpdateProc(h);
- ReleaseHub(h);
- }
- Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
- SiDebugLog(s, tmp);
- ReleaseList(o);
- Unlock(c->CedarSuperLock);
- Wait(e, SERVER_FARM_CONTROL_INTERVAL);
- if (s->Halt)
- {
- break;
- }
- }
- }
- // Start the farm controling
- void SiStartFarmControl(SERVER *s)
- {
- // Validate arguments
- if (s == NULL || s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
- {
- return;
- }
- s->FarmControlThreadHaltEvent = NewEvent();
- s->FarmControlThread = NewThread(SiFarmControlThread, s);
- }
- // Stop the farm controling
- void SiStopFarmControl(SERVER *s)
- {
- // Validate arguments
- if (s == NULL || s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
- {
- return;
- }
- Set(s->FarmControlThreadHaltEvent);
- WaitThread(s->FarmControlThread, INFINITE);
- ReleaseEvent(s->FarmControlThreadHaltEvent);
- ReleaseThread(s->FarmControlThread);
- }
- // HUB enumeration directive (asynchronous start)
- void SiCallEnumHubBegin(SERVER *s, FARM_MEMBER *f)
- {
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- }
- // HUB enumeration directive (asynchronous end)
- void SiCallEnumHubEnd(SERVER *s, FARM_MEMBER *f)
- {
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- }
- // HUB enumeration directive
- void SiCallEnumHub(SERVER *s, FARM_MEMBER *f)
- {
- CEDAR *c;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- c = s->Cedar;
- if (f->Me)
- {
- // Enumerate local HUBs
- LockList(f->HubList);
- {
- // For a local HUB, re-enumerate by erasing all STATIC HUB list once first
- UINT i;
- LIST *o = NewListFast(NULL);
- for (i = 0;i < LIST_NUM(f->HubList);i++)
- {
- HUB_LIST *h = LIST_DATA(f->HubList, i);
- if (h->DynamicHub == false)
- {
- Add(o, h);
- }
- }
- // Clear all the STATIC HUB
- for (i = 0;i < LIST_NUM(o);i++)
- {
- HUB_LIST *h = LIST_DATA(o, i);
- Free(h);
- Delete(f->HubList, h);
- }
- ReleaseList(o);
- // Second, stop DYNAMIC HUBs without user
- o = NewListFast(NULL);
- for (i = 0;i < LIST_NUM(f->HubList);i++)
- {
- HUB_LIST *h = LIST_DATA(f->HubList, i);
- if (h->DynamicHub == true)
- {
- LockList(c->HubList);
- {
- HUB *hub = GetHub(s->Cedar, h->Name);
- if (hub != NULL)
- {
- if (Count(hub->NumSessions) == 0 || hub->Type != HUB_TYPE_FARM_DYNAMIC)
- {
- Add(o, h);
- }
- ReleaseHub(hub);
- }
- }
- UnlockList(c->HubList);
- }
- }
- for (i = 0;i < LIST_NUM(o);i++)
- {
- HUB_LIST *h = LIST_DATA(o, i);
- Debug("Delete HUB: %s\n", h->Name);
- Free(h);
- Delete(f->HubList, h);
- }
- ReleaseList(o);
- // Set the enumeration results
- LockList(c->HubList);
- {
- for (i = 0;i < LIST_NUM(c->HubList);i++)
- {
- HUB *h = LIST_DATA(c->HubList, i);
- if (h->Offline == false)
- {
- if (h->Type == HUB_TYPE_FARM_STATIC)
- {
- HUB_LIST *hh = ZeroMalloc(sizeof(HUB_LIST));
- hh->FarmMember = f;
- hh->DynamicHub = false;
- StrCpy(hh->Name, sizeof(hh->Name), h->Name);
- Add(f->HubList, hh);
- LockList(h->SessionList);
- {
- hh->NumSessions = LIST_NUM(h->SessionList);
- hh->NumSessionsBridge = Count(h->NumSessionsBridge);
- hh->NumSessionsClient = Count(h->NumSessionsClient);
- }
- UnlockList(h->SessionList);
- LockList(h->MacTable);
- {
- hh->NumMacTables = LIST_NUM(h->MacTable);
- }
- UnlockList(h->MacTable);
- LockList(h->IpTable);
- {
- hh->NumIpTables = LIST_NUM(h->IpTable);
- }
- UnlockList(h->IpTable);
- }
- }
- }
- }
- UnlockList(c->HubList);
- }
- UnlockList(f->HubList);
- // Point
- f->Point = SiGetPoint(s);
- f->NumSessions = Count(s->Cedar->CurrentSessions);
- f->MaxSessions = GetServerCapsInt(s, "i_max_sessions");
- f->NumTcpConnections = Count(s->Cedar->CurrentTcpConnections);
- Lock(s->Cedar->TrafficLock);
- {
- Copy(&f->Traffic, s->Cedar->Traffic, sizeof(TRAFFIC));
- }
- Unlock(s->Cedar->TrafficLock);
- f->AssignedBridgeLicense = Count(s->Cedar->AssignedBridgeLicense);
- f->AssignedClientLicense = Count(s->Cedar->AssignedClientLicense);
- Copy(f->RandomKey, s->MyRandomKey, SHA1_SIZE);
- Debug("Server %s: Point %u\n", f->hostname, f->Point);
- }
- else
- {
- // Enumerate HUBs which are remote member
- PACK *p = NewPack();
- UINT i, num, j;
- LIST *o = NewListFast(NULL);
- num = 0;
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- if (IsZero(f->RandomKey, SHA1_SIZE) == false && f->SystemId != 0)
- {
- num++;
- }
- }
- j = 0;
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- if (IsZero(f->RandomKey, SHA1_SIZE) == false && f->SystemId != 0)
- {
- PackAddDataEx(p, "MemberRandomKey", f->RandomKey, SHA1_SIZE, j, num);
- PackAddInt64Ex(p, "MemberSystemId", f->SystemId, j, num);
- j++;
- }
- }
- PackAddInt(p, "MemberSystemIdNum", num);
- p = SiCallTask(f, p, "enumhub");
- if (p != NULL)
- {
- LockList(f->HubList);
- {
- UINT i;
- // Erase the list
- for (i = 0;i < LIST_NUM(f->HubList);i++)
- {
- HUB_LIST *hh = LIST_DATA(f->HubList, i);
- Free(hh);
- }
- DeleteAll(f->HubList);
- for (i = 0;i < PackGetIndexCount(p, "HubName");i++)
- {
- HUB_LIST *hh = ZeroMalloc(sizeof(HUB_LIST));
- UINT num;
- UINT64 LastCommTime;
- PackGetStrEx(p, "HubName", hh->Name, sizeof(hh->Name), i);
- num = PackGetIntEx(p, "NumSession", i);
- hh->DynamicHub = ((PackGetIntEx(p, "HubType", i) == HUB_TYPE_FARM_DYNAMIC) ? true : false);
- hh->FarmMember = f;
- hh->NumSessions = PackGetIntEx(p, "NumSessions", i);
- hh->NumSessionsClient = PackGetIntEx(p, "NumSessionsClient", i);
- hh->NumSessionsBridge = PackGetIntEx(p, "NumSessionsBridge", i);
- hh->NumIpTables = PackGetIntEx(p, "NumIpTables", i);
- hh->NumMacTables = PackGetIntEx(p, "NumMacTables", i);
- LastCommTime = PackGetInt64Ex(p, "LastCommTime", i);
- Add(f->HubList, hh);
- //Debug("%s\n", hh->Name);
- LockList(c->HubList);
- {
- HUB *h = GetHub(c, hh->Name);
- if (h != NULL)
- {
- // Update the LastCommTime of the Virtual HUB
- Lock(h->lock);
- {
- if (h->LastCommTime < LastCommTime)
- {
- h->LastCommTime = LastCommTime;
- }
- }
- Unlock(h->lock);
- ReleaseHub(h);
- }
- }
- UnlockList(c->HubList);
- if (hh->DynamicHub && num >= 1)
- {
- // It is not necessary to be registered in the virtual HUB creation
- // history list because user session is already connected.
- // Remove from the Virtual HUB creation history list
- SiDelHubCreateHistory(s, hh->Name);
- }
- if (hh->DynamicHub && num == 0)
- {
- // Check the Virtual HUB creation history list.
- // If it is created within 60 seconds of the most recent
- // in the case of Virtual HUB which the first user is not
- // connected yet, not to remove because there is no user
- if (SiIsHubRegistedOnCreateHistory(s, hh->Name) == false)
- {
- // Stop because all uses have gone in the dynamic HUB
- HUB *h;
- LockList(c->HubList);
- {
- h = GetHub(c, hh->Name);
- }
- UnlockList(c->HubList);
- if (h != NULL)
- {
- Add(o, h);
- }
- }
- }
- }
- }
- UnlockList(f->HubList);
- f->Point = PackGetInt(p, "Point");
- Debug("Server %s: Point %u\n", f->hostname, f->Point);
- f->NumSessions = PackGetInt(p, "NumTotalSessions");
- if (f->NumSessions == 0)
- {
- f->NumSessions = PackGetInt(p, "NumSessions");
- }
- f->MaxSessions = PackGetInt(p, "MaxSessions");
- f->NumTcpConnections = PackGetInt(p, "NumTcpConnections");
- InRpcTraffic(&f->Traffic, p);
- f->AssignedBridgeLicense = PackGetInt(p, "AssignedBridgeLicense");
- f->AssignedClientLicense = PackGetInt(p, "AssignedClientLicense");
- if (PackGetDataSize(p, "RandomKey") == SHA1_SIZE)
- {
- PackGetData(p, "RandomKey", f->RandomKey);
- }
- f->SystemId = PackGetInt64(p, "SystemId");
- // Apply the traffic difference information
- num = PackGetIndexCount(p, "TdType");
- for (i = 0;i < num;i++)
- {
- TRAFFIC traffic;
- UINT type;
- HUB *h;
- char name[MAX_SIZE];
- char hubname[MAX_SIZE];
- type = PackGetIntEx(p, "TdType", i);
- PackGetStrEx(p, "TdName", name, sizeof(name), i);
- PackGetStrEx(p, "TdHubName", hubname, sizeof(hubname), i);
- InRpcTrafficEx(&traffic, p, i);
- LockList(c->HubList);
- {
- h = GetHub(c, hubname);
- if (h != NULL)
- {
- if (type == TRAFFIC_DIFF_HUB)
- {
- Lock(h->TrafficLock);
- {
- AddTraffic(h->Traffic, &traffic);
- }
- Unlock(h->TrafficLock);
- }
- else
- {
- AcLock(h);
- {
- USER *u = AcGetUser(h, name);
- if (u != NULL)
- {
- Lock(u->lock);
- {
- AddTraffic(u->Traffic, &traffic);
- }
- Unlock(u->lock);
- if (u->Group != NULL)
- {
- Lock(u->Group->lock);
- {
- AddTraffic(u->Group->Traffic, &traffic);
- }
- Unlock(u->Group->lock);
- }
- ReleaseUser(u);
- }
- }
- AcUnlock(h);
- }
- ReleaseHub(h);
- }
- UnlockList(c->HubList);
- }
- }
- FreePack(p);
- }
- for (i = 0;i < LIST_NUM(o);i++)
- {
- HUB *h = LIST_DATA(o, i);
- SiCallDeleteHub(s, f, h);
- Debug("Delete HUB: %s\n", h->Name);
- ReleaseHub(h);
- }
- ReleaseList(o);
- }
- }
- // Send a session information directive
- bool SiCallGetSessionStatus(SERVER *s, FARM_MEMBER *f, RPC_SESSION_STATUS *t)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return false;
- }
- p = NewPack();
- OutRpcSessionStatus(p, t);
- FreeRpcSessionStatus(t);
- Zero(t, sizeof(RPC_SESSION_STATUS));
- p = SiCallTask(f, p, "getsessionstatus");
- if (p == NULL)
- {
- return false;
- }
- InRpcSessionStatus(t, p);
- FreePack(p);
- return true;
- }
- // Log file reading directive
- bool SiCallReadLogFile(SERVER *s, FARM_MEMBER *f, RPC_READ_LOG_FILE *t)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return false;
- }
- p = NewPack();
- OutRpcReadLogFile(p, t);
- FreeRpcReadLogFile(t);
- Zero(t, sizeof(RPC_READ_LOG_FILE));
- p = SiCallTask(f, p, "readlogfile");
- if (p == NULL)
- {
- return false;
- }
- InRpcReadLogFile(t, p);
- FreePack(p);
- return true;
- }
- // Log file enumeration directive
- bool SiCallEnumLogFileList(SERVER *s, FARM_MEMBER *f, RPC_ENUM_LOG_FILE *t, char *hubname)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return false;
- }
- p = NewPack();
- OutRpcEnumLogFile(p, t);
- FreeRpcEnumLogFile(t);
- Zero(t, sizeof(RPC_ENUM_LOG_FILE));
- PackAddStr(p, "HubName", hubname);
- p = SiCallTask(f, p, "enumlogfilelist");
- if (p == NULL)
- {
- return false;
- }
- InRpcEnumLogFile(t, p);
- FreePack(p);
- return true;
- }
- // HUB delete directive
- void SiCallDeleteHub(SERVER *s, FARM_MEMBER *f, HUB *h)
- {
- PACK *p;
- UINT i;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- if (f->Me == false)
- {
- p = NewPack();
- PackAddStr(p, "HubName", h->Name);
- p = SiCallTask(f, p, "deletehub");
- FreePack(p);
- }
- LockList(f->HubList);
- {
- for (i = 0;i < LIST_NUM(f->HubList);i++)
- {
- HUB_LIST *hh = LIST_DATA(f->HubList, i);
- if (StrCmpi(hh->Name, h->Name) == 0)
- {
- Free(hh);
- Delete(f->HubList, hh);
- }
- }
- }
- UnlockList(f->HubList);
- }
- // Submit a HUB update directive
- void SiCallUpdateHub(SERVER *s, FARM_MEMBER *f, HUB *h)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- if (f->Me == false)
- {
- p = NewPack();
- SiPackAddCreateHub(p, h);
- p = SiCallTask(f, p, "updatehub");
- FreePack(p);
- }
- }
- // Send a ticket creation directive
- void SiCallCreateTicket(SERVER *s, FARM_MEMBER *f, char *hubname, char *username, char *realusername, POLICY *policy, UCHAR *ticket, UINT counter, char *groupname)
- {
- PACK *p;
- char name[MAX_SESSION_NAME_LEN + 1];
- char hub_name_upper[MAX_SIZE];
- char user_name_upper[MAX_USERNAME_LEN + 1];
- char ticket_str[MAX_SIZE];
- UINT point;
- // Validate arguments
- if (s == NULL || f == NULL || realusername == NULL || hubname == NULL || username == NULL || policy == NULL || ticket == NULL)
- {
- return;
- }
- if (groupname == NULL)
- {
- groupname = "";
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- PackAddStr(p, "UserName", username);
- PackAddStr(p, "groupname", groupname);
- PackAddStr(p, "RealUserName", realusername);
- OutRpcPolicy(p, policy);
- PackAddData(p, "Ticket", ticket, SHA1_SIZE);
- BinToStr(ticket_str, sizeof(ticket_str), ticket, SHA1_SIZE);
- StrCpy(hub_name_upper, sizeof(hub_name_upper), hubname);
- StrUpper(hub_name_upper);
- StrCpy(user_name_upper, sizeof(user_name_upper), username);
- StrUpper(user_name_upper);
- Format(name, sizeof(name), "SID-%s-%u", user_name_upper,
- counter);
- PackAddStr(p, "SessionName", name);
- p = SiCallTask(f, p, "createticket");
- SLog(s->Cedar, "LS_TICKET_1", f->hostname, hubname, username, realusername, name, ticket_str);
- point = PackGetInt(p, "Point");
- if (point != 0)
- {
- f->Point = point;
- f->NumSessions++;
- }
- FreePack(p);
- }
- // Send a MAC address deletion directive
- void SiCallDeleteMacTable(SERVER *s, FARM_MEMBER *f, char *hubname, UINT key)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- PackAddInt(p, "Key", key);
- p = SiCallTask(f, p, "deletemactable");
- FreePack(p);
- }
- // Send an IP address delete directive
- void SiCallDeleteIpTable(SERVER *s, FARM_MEMBER *f, char *hubname, UINT key)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- PackAddInt(p, "Key", key);
- p = SiCallTask(f, p, "deleteiptable");
- FreePack(p);
- }
- // Send a session deletion directive
- void SiCallDeleteSession(SERVER *s, FARM_MEMBER *f, char *hubname, char *session_name)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL || session_name == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- PackAddStr(p, "SessionName", session_name);
- p = SiCallTask(f, p, "deletesession");
- FreePack(p);
- }
- // Send an IP table enumeration directive
- void SiCallEnumIpTable(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_IP_TABLE *t)
- {
- PACK *p;
- UINT i;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL || t == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- p = SiCallTask(f, p, "enumiptable");
- Zero(t, sizeof(RPC_ENUM_IP_TABLE));
- InRpcEnumIpTable(t, p);
- for (i = 0;i < t->NumIpTable;i++)
- {
- t->IpTables[i].RemoteItem = true;
- StrCpy(t->IpTables[i].RemoteHostname, sizeof(t->IpTables[i].RemoteHostname),
- f->hostname);
- }
- FreePack(p);
- }
- // Submit a MAC table enumeration directive
- void SiCallEnumMacTable(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_MAC_TABLE *t)
- {
- PACK *p;
- UINT i;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL || t == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- p = SiCallTask(f, p, "enummactable");
- Zero(t, sizeof(RPC_ENUM_MAC_TABLE));
- InRpcEnumMacTable(t, p);
- for (i = 0;i < t->NumMacTable;i++)
- {
- t->MacTables[i].RemoteItem = true;
- StrCpy(t->MacTables[i].RemoteHostname, sizeof(t->MacTables[i].RemoteHostname),
- f->hostname);
- }
- FreePack(p);
- }
- // Send a SecureNAT status acquisition directive
- void SiCallGetNatStatus(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_NAT_STATUS *t)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL || t == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- p = SiCallTask(f, p, "getnatstatus");
- Zero(t, sizeof(RPC_NAT_STATUS));
- InRpcNatStatus(t, p);
- FreePack(p);
- }
- // Submit a DHCP entry enumeration directive
- void SiCallEnumDhcp(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_DHCP *t)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL || t == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- p = SiCallTask(f, p, "enumdhcp");
- Zero(t, sizeof(RPC_ENUM_DHCP));
- InRpcEnumDhcp(t, p);
- FreePack(p);
- }
- // Submit a NAT entry enumeration directive
- void SiCallEnumNat(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_NAT *t)
- {
- PACK *p;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL || t == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- p = SiCallTask(f, p, "enumnat");
- Zero(t, sizeof(RPC_ENUM_NAT));
- InRpcEnumNat(t, p);
- FreePack(p);
- }
- // Send a session enumeration directive
- void SiCallEnumSession(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_SESSION *t)
- {
- PACK *p;
- UINT i;
- // Validate arguments
- if (s == NULL || f == NULL || hubname == NULL || t == NULL)
- {
- return;
- }
- p = NewPack();
- PackAddStr(p, "HubName", hubname);
- p = SiCallTask(f, p, "enumsession");
- Zero(t, sizeof(RPC_ENUM_SESSION));
- InRpcEnumSession(t, p);
- for (i = 0;i < t->NumSession;i++)
- {
- t->Sessions[i].RemoteSession = true;
- StrCpy(t->Sessions[i].RemoteHostname, sizeof(t->Sessions[i].RemoteHostname),
- f->hostname);
- }
- FreePack(p);
- }
- // Send a HUB creation directive
- void SiCallCreateHub(SERVER *s, FARM_MEMBER *f, HUB *h)
- {
- PACK *p;
- HUB_LIST *hh;
- // Validate arguments
- if (s == NULL || f == NULL)
- {
- return;
- }
- if (f->Me == false)
- {
- p = NewPack();
- SiPackAddCreateHub(p, h);
- p = SiCallTask(f, p, "createhub");
- FreePack(p);
- }
- hh = ZeroMalloc(sizeof(HUB_LIST));
- hh->DynamicHub = (h->Type == HUB_TYPE_FARM_DYNAMIC ? true : false);
- StrCpy(hh->Name, sizeof(hh->Name), h->Name);
- hh->FarmMember = f;
- LockList(f->HubList);
- {
- bool exists = false;
- UINT i;
- for (i = 0;i < LIST_NUM(f->HubList);i++)
- {
- HUB_LIST *t = LIST_DATA(f->HubList, i);
- if (StrCmpi(t->Name, hh->Name) == 0)
- {
- exists = true;
- }
- }
- if (exists == false)
- {
- Add(f->HubList, hh);
- }
- else
- {
- Free(hh);
- }
- }
- UnlockList(f->HubList);
- }
- // Write the PACK for creating HUB
- void SiPackAddCreateHub(PACK *p, HUB *h)
- {
- UINT i;
- UINT max_session;
- SERVER *s;
- // Validate arguments
- if (p == NULL || h == NULL)
- {
- return;
- }
- s = h->Cedar->Server;
- if (s != NULL)
- {
- }
- PackAddStr(p, "HubName", h->Name);
- PackAddInt(p, "HubType", h->Type);
- max_session = h->Option->MaxSession;
- if (GetHubAdminOption(h, "max_sessions") != 0)
- {
- if (max_session == 0)
- {
- max_session = GetHubAdminOption(h, "max_sessions");
- }
- else
- {
- UINT r = GetHubAdminOption(h, "max_sessions");
- max_session = MIN(max_session, r);
- }
- }
- PackAddInt(p, "MaxSession", max_session);
- if (GetHubAdminOption(h, "max_sessions_client_bridge_apply") != 0
- )
- {
- PackAddInt(p, "MaxSessionClient", GetHubAdminOption(h, "max_sessions_client"));
- PackAddInt(p, "MaxSessionBridge", GetHubAdminOption(h, "max_sessions_bridge"));
- PackAddBool(p, "MaxSessionClientBridgeApply", true);
- }
- else
- {
- PackAddInt(p, "MaxSessionClient", INFINITE);
- PackAddInt(p, "MaxSessionBridge", INFINITE);
- }
- PackAddBool(p, "NoArpPolling", h->Option->NoArpPolling);
- PackAddBool(p, "NoIPv6AddrPolling", h->Option->NoIPv6AddrPolling);
- PackAddBool(p, "NoIpTable", h->Option->NoIpTable);
- PackAddBool(p, "NoEnum", h->Option->NoEnum);
- PackAddBool(p, "FilterPPPoE", h->Option->FilterPPPoE);
- PackAddBool(p, "YieldAfterStorePacket", h->Option->YieldAfterStorePacket);
- PackAddBool(p, "NoSpinLockForPacketDelay", h->Option->NoSpinLockForPacketDelay);
- PackAddInt(p, "BroadcastStormDetectionThreshold", h->Option->BroadcastStormDetectionThreshold);
- PackAddInt(p, "MaxLoggedPacketsPerMinute", h->Option->MaxLoggedPacketsPerMinute);
- PackAddBool(p, "DoNotSaveHeavySecurityLogs", h->Option->DoNotSaveHeavySecurityLogs);
- PackAddBool(p, "DropBroadcastsInPrivacyFilterMode", h->Option->DropBroadcastsInPrivacyFilterMode);
- PackAddBool(p, "DropArpInPrivacyFilterMode", h->Option->DropArpInPrivacyFilterMode);
- PackAddBool(p, "SuppressClientUpdateNotification", h->Option->SuppressClientUpdateNotification);
- PackAddInt(p, "ClientMinimumRequiredBuild", h->Option->ClientMinimumRequiredBuild);
- PackAddBool(p, "FixForDLinkBPDU", h->Option->FixForDLinkBPDU);
- PackAddBool(p, "BroadcastLimiterStrictMode", h->Option->BroadcastLimiterStrictMode);
- PackAddBool(p, "NoLookBPDUBridgeId", h->Option->NoLookBPDUBridgeId);
- PackAddBool(p, "NoManageVlanId", h->Option->NoManageVlanId);
- PackAddInt(p, "VlanTypeId", h->Option->VlanTypeId);
- PackAddBool(p, "FilterOSPF", h->Option->FilterOSPF);
- PackAddBool(p, "FilterIPv4", h->Option->FilterIPv4);
- PackAddBool(p, "FilterIPv6", h->Option->FilterIPv6);
- PackAddBool(p, "FilterNonIP", h->Option->FilterNonIP);
- PackAddBool(p, "NoIPv4PacketLog", h->Option->NoIPv4PacketLog);
- PackAddBool(p, "NoIPv6PacketLog", h->Option->NoIPv6PacketLog);
- PackAddBool(p, "FilterBPDU", h->Option->FilterBPDU);
- PackAddBool(p, "NoIPv6DefaultRouterInRAWhenIPv6", h->Option->NoIPv6DefaultRouterInRAWhenIPv6);
- PackAddBool(p, "NoMacAddressLog", h->Option->NoMacAddressLog);
- PackAddBool(p, "ManageOnlyPrivateIP", h->Option->ManageOnlyPrivateIP);
- PackAddBool(p, "ManageOnlyLocalUnicastIPv6", h->Option->ManageOnlyLocalUnicastIPv6);
- PackAddBool(p, "DisableIPParsing", h->Option->DisableIPParsing);
- PackAddInt(p, "AdjustTcpMssValue", h->Option->AdjustTcpMssValue);
- PackAddBool(p, "DisableAdjustTcpMss", h->Option->DisableAdjustTcpMss);
- PackAddBool(p, "NoDhcpPacketLogOutsideHub", h->Option->NoDhcpPacketLogOutsideHub);
- PackAddBool(p, "DisableHttpParsing", h->Option->DisableHttpParsing);
- PackAddBool(p, "DisableUdpAcceleration", h->Option->DisableUdpAcceleration);
- PackAddBool(p, "DisableUdpFilterForLocalBridgeNic", h->Option->DisableUdpFilterForLocalBridgeNic);
- PackAddBool(p, "ApplyIPv4AccessListOnArpPacket", h->Option->ApplyIPv4AccessListOnArpPacket);
- PackAddBool(p, "RemoveDefGwOnDhcpForLocalhost", h->Option->RemoveDefGwOnDhcpForLocalhost);
- PackAddInt(p, "SecureNAT_MaxTcpSessionsPerIp", h->Option->SecureNAT_MaxTcpSessionsPerIp);
- PackAddInt(p, "SecureNAT_MaxTcpSynSentPerIp", h->Option->SecureNAT_MaxTcpSynSentPerIp);
- PackAddInt(p, "SecureNAT_MaxUdpSessionsPerIp", h->Option->SecureNAT_MaxUdpSessionsPerIp);
- PackAddInt(p, "SecureNAT_MaxDnsSessionsPerIp", h->Option->SecureNAT_MaxDnsSessionsPerIp);
- PackAddInt(p, "SecureNAT_MaxIcmpSessionsPerIp", h->Option->SecureNAT_MaxIcmpSessionsPerIp);
- PackAddInt(p, "AccessListIncludeFileCacheLifetime", h->Option->AccessListIncludeFileCacheLifetime);
- PackAddBool(p, "DisableKernelModeSecureNAT", h->Option->DisableKernelModeSecureNAT);
- PackAddBool(p, "DisableUserModeSecureNAT", h->Option->DisableUserModeSecureNAT);
- PackAddBool(p, "DisableCheckMacOnLocalBridge", h->Option->DisableCheckMacOnLocalBridge);
- PackAddBool(p, "DisableCorrectIpOffloadChecksum", h->Option->DisableCorrectIpOffloadChecksum);
- PackAddInt(p, "SavePacketLog", h->LogSetting.SavePacketLog);
- PackAddInt(p, "PacketLogSwitchType", h->LogSetting.PacketLogSwitchType);
- for (i = 0;i < NUM_PACKET_LOG;i++)
- {
- PackAddIntEx(p, "PacketLogConfig", h->LogSetting.PacketLogConfig[i], i, NUM_PACKET_LOG);
- }
- PackAddInt(p, "SaveSecurityLog", h->LogSetting.SaveSecurityLog);
- PackAddInt(p, "SecurityLogSwitchType", h->LogSetting.SecurityLogSwitchType);
- PackAddData(p, "HashedPassword", h->HashedPassword, SHA1_SIZE);
- PackAddData(p, "SecurePassword", h->SecurePassword, SHA1_SIZE);
- SiAccessListToPack(p, h->AccessList);
- if (h->EnableSecureNAT)
- {
- PackAddBool(p, "EnableSecureNAT", h->EnableSecureNAT);
- OutVhOption(p, h->SecureNATOption);
- }
- }
- // Setting of the HUB has been updated
- void SiHubUpdateProc(HUB *h)
- {
- SERVER *s;
- UINT i;
- // Validate arguments
- if (h == NULL || h->Cedar->Server == NULL || h->Cedar->Server->ServerType != SERVER_TYPE_FARM_CONTROLLER)
- {
- return;
- }
- s = h->Cedar->Server;
- if (s->FarmMemberList == NULL)
- {
- return;
- }
- if (h->LastVersion != h->CurrentVersion || h->CurrentVersion == 0)
- {
- LIST *fm_list;
- if (h->CurrentVersion == 0)
- {
- h->CurrentVersion = 1;
- }
- h->LastVersion = h->CurrentVersion;
- Debug("SiHubUpdateProc HUB=%s, Ver=%u, Type=%u, Offline=%u\n", h->Name, h->CurrentVersion,
- h->Type, h->Offline);
- fm_list = NewListFast(NULL);
- LockList(s->FarmMemberList);
- {
- while (true)
- {
- bool escape = true;
- // Update the HUB on all members
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- if (IsInList(fm_list, f) == false)
- {
- Add(fm_list, f);
- escape = false;
- if (f->Me == false)
- {
- SiCallUpdateHub(s, f, h);
- }
- break;
- }
- }
- if (escape)
- {
- break;
- }
- UnlockList(s->FarmMemberList);
- LockList(s->FarmMemberList);
- }
- }
- UnlockList(s->FarmMemberList);
- ReleaseList(fm_list);
- }
- if (h->Offline == false)
- {
- SiHubOnlineProc(h);
- }
- }
- // HUB turns to online
- void SiHubOnlineProc(HUB *h)
- {
- SERVER *s;
- UINT i;
- // Validate arguments
- if (h == NULL || h->Cedar->Server == NULL || h->Cedar->Server->ServerType != SERVER_TYPE_FARM_CONTROLLER)
- {
- // Process only on the farm controller
- return;
- }
- s = h->Cedar->Server;
- if (s->FarmMemberList == NULL)
- {
- return;
- }
- LockList(s->FarmMemberList);
- {
- if (h->Type == HUB_TYPE_FARM_STATIC)
- {
- // Static HUB
- // Create the HUB on all members
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- UINT j;
- bool exists = false;
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- LockList(f->HubList);
- {
- for (j = 0;j < LIST_NUM(f->HubList);j++)
- {
- HUB_LIST *hh = LIST_DATA(f->HubList, j);
- if (StrCmpi(hh->Name, h->Name) == 0)
- {
- exists = true;
- }
- }
- }
- UnlockList(f->HubList);
- if (exists == false)
- {
- SiCallCreateHub(s, f, h);
- }
- }
- }
- }
- UnlockList(s->FarmMemberList);
- }
- // HUB turns to offline
- void SiHubOfflineProc(HUB *h)
- {
- SERVER *s;
- char hubname[MAX_HUBNAME_LEN + 1];
- UINT i;
- LIST *fm_list;
- // Validate arguments
- if (h == NULL || h->Cedar->Server == NULL || h->Cedar->Server->ServerType != SERVER_TYPE_FARM_CONTROLLER)
- {
- // Process only on the farm controller
- return;
- }
- s = h->Cedar->Server;
- if (s->FarmMemberList == NULL)
- {
- return;
- }
- StrCpy(hubname, sizeof(hubname), h->Name);
- fm_list = NewListFast(NULL);
- LockList(s->FarmMemberList);
- {
- while (true)
- {
- bool escape = true;
- // Stop the HUB on all members
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- if (IsInList(fm_list, f) == false)
- {
- Add(fm_list, f);
- escape = false;
- SiCallDeleteHub(s, f, h);
- break;
- }
- }
- if (escape)
- {
- break;
- }
- UnlockList(s->FarmMemberList);
- LockList(s->FarmMemberList);
- }
- }
- UnlockList(s->FarmMemberList);
- ReleaseList(fm_list);
- }
- // Convert an access to PACK
- void SiAccessToPack(PACK *p, ACCESS *a, UINT i, UINT total)
- {
- // Validate arguments
- if (p == NULL || a == NULL)
- {
- return;
- }
- PackAddUniStrEx(p, "Note", a->Note, i, total);
- PackAddIntEx(p, "Active", a->Active, i, total);
- PackAddIntEx(p, "Priority", a->Priority, i, total);
- PackAddIntEx(p, "Discard", a->Discard, i, total);
- if (a->IsIPv6)
- {
- PackAddIp32Ex(p, "SrcIpAddress", 0xFDFFFFDF, i, total);
- PackAddIp32Ex(p, "SrcSubnetMask", 0xFFFFFFFF, i, total);
- PackAddIp32Ex(p, "DestIpAddress", 0xFDFFFFDF, i, total);
- PackAddIp32Ex(p, "DestSubnetMask", 0xFFFFFFFF, i, total);
- }
- else
- {
- PackAddIp32Ex(p, "SrcIpAddress", a->SrcIpAddress, i, total);
- PackAddIp32Ex(p, "SrcSubnetMask", a->SrcSubnetMask, i, total);
- PackAddIp32Ex(p, "DestIpAddress", a->DestIpAddress, i, total);
- PackAddIp32Ex(p, "DestSubnetMask", a->DestSubnetMask, i, total);
- }
- PackAddIntEx(p, "Protocol", a->Protocol, i, total);
- PackAddIntEx(p, "SrcPortStart", a->SrcPortStart, i, total);
- PackAddIntEx(p, "SrcPortEnd", a->SrcPortEnd, i, total);
- PackAddIntEx(p, "DestPortStart", a->DestPortStart, i, total);
- PackAddIntEx(p, "DestPortEnd", a->DestPortEnd, i, total);
- PackAddStrEx(p, "SrcUsername", a->SrcUsername, i, total);
- PackAddStrEx(p, "DestUsername", a->DestUsername, i, total);
- PackAddBoolEx(p, "CheckSrcMac", a->CheckSrcMac, i, total);
- PackAddDataEx(p, "SrcMacAddress", a->SrcMacAddress, sizeof(a->SrcMacAddress), i, total);
- PackAddDataEx(p, "SrcMacMask", a->SrcMacMask, sizeof(a->SrcMacMask), i, total);
- PackAddBoolEx(p, "CheckDstMac", a->CheckDstMac, i, total);
- PackAddDataEx(p, "DstMacAddress", a->DstMacAddress, sizeof(a->DstMacAddress), i, total);
- PackAddDataEx(p, "DstMacMask", a->DstMacMask, sizeof(a->DstMacMask), i, total);
- PackAddBoolEx(p, "CheckTcpState", a->CheckTcpState, i, total);
- PackAddBoolEx(p, "Established", a->Established, i, total);
- PackAddIntEx(p, "Delay", a->Delay, i, total);
- PackAddIntEx(p, "Jitter", a->Jitter, i, total);
- PackAddIntEx(p, "Loss", a->Loss, i, total);
- PackAddStrEx(p, "RedirectUrl", a->RedirectUrl, i, total);
- PackAddBoolEx(p, "IsIPv6", a->IsIPv6, i, total);
- if (a->IsIPv6)
- {
- PackAddIp6AddrEx(p, "SrcIpAddress6", &a->SrcIpAddress6, i, total);
- PackAddIp6AddrEx(p, "SrcSubnetMask6", &a->SrcSubnetMask6, i, total);
- PackAddIp6AddrEx(p, "DestIpAddress6", &a->DestIpAddress6, i, total);
- PackAddIp6AddrEx(p, "DestSubnetMask6", &a->DestSubnetMask6, i, total);
- }
- else
- {
- IPV6_ADDR zero;
- Zero(&zero, sizeof(zero));
- PackAddIp6AddrEx(p, "SrcIpAddress6", &zero, i, total);
- PackAddIp6AddrEx(p, "SrcSubnetMask6", &zero, i, total);
- PackAddIp6AddrEx(p, "DestIpAddress6", &zero, i, total);
- PackAddIp6AddrEx(p, "DestSubnetMask6", &zero, i, total);
- }
- }
- // Get number of access contained in the PACK
- UINT SiNumAccessFromPack(PACK *p)
- {
- // Validate arguments
- if (p == NULL)
- {
- return 0;
- }
- return PackGetIndexCount(p, "Active");
- }
- // Convert the PACK to access
- ACCESS *SiPackToAccess(PACK *p, UINT i)
- {
- ACCESS *a;
- // Validate arguments
- if (p == NULL)
- {
- return NULL;
- }
- a = ZeroMalloc(sizeof(ACCESS));
- PackGetUniStrEx(p, "Note", a->Note, sizeof(a->Note), i);
- a->Active = PackGetIntEx(p, "Active", i);
- a->Priority = PackGetIntEx(p, "Priority", i);
- a->Discard = PackGetIntEx(p, "Discard", i);
- a->SrcIpAddress = PackGetIp32Ex(p, "SrcIpAddress", i);
- a->SrcSubnetMask = PackGetIp32Ex(p, "SrcSubnetMask", i);
- a->DestIpAddress = PackGetIp32Ex(p, "DestIpAddress", i);
- a->DestSubnetMask = PackGetIp32Ex(p, "DestSubnetMask", i);
- a->Protocol = PackGetIntEx(p, "Protocol", i);
- a->SrcPortStart = PackGetIntEx(p, "SrcPortStart", i);
- a->SrcPortEnd = PackGetIntEx(p, "SrcPortEnd", i);
- a->DestPortStart = PackGetIntEx(p, "DestPortStart", i);
- a->DestPortEnd = PackGetIntEx(p, "DestPortEnd", i);
- PackGetStrEx(p, "SrcUsername", a->SrcUsername, sizeof(a->SrcUsername), i);
- PackGetStrEx(p, "DestUsername", a->DestUsername, sizeof(a->DestUsername), i);
- a->CheckSrcMac = PackGetBoolEx(p, "CheckSrcMac", i);
- PackGetDataEx2(p, "SrcMacAddress", a->SrcMacAddress, sizeof(a->SrcMacAddress), i);
- PackGetDataEx2(p, "SrcMacMask", a->SrcMacMask, sizeof(a->SrcMacMask), i);
- a->CheckDstMac = PackGetBoolEx(p, "CheckDstMac", i);
- PackGetDataEx2(p, "DstMacAddress", a->DstMacAddress, sizeof(a->DstMacAddress), i);
- PackGetDataEx2(p, "DstMacMask", a->DstMacMask, sizeof(a->DstMacMask), i);
- a->CheckTcpState = PackGetBoolEx(p, "CheckTcpState", i);
- a->Established = PackGetBoolEx(p, "Established", i);
- a->Delay = PackGetIntEx(p, "Delay", i);
- a->Jitter = PackGetIntEx(p, "Jitter", i);
- a->Loss = PackGetIntEx(p, "Loss", i);
- a->IsIPv6 = PackGetBoolEx(p, "IsIPv6", i);
- PackGetStrEx(p, "RedirectUrl", a->RedirectUrl, sizeof(a->RedirectUrl), i);
- if (a->IsIPv6)
- {
- PackGetIp6AddrEx(p, "SrcIpAddress6", &a->SrcIpAddress6, i);
- PackGetIp6AddrEx(p, "SrcSubnetMask6", &a->SrcSubnetMask6, i);
- PackGetIp6AddrEx(p, "DestIpAddress6", &a->DestIpAddress6, i);
- PackGetIp6AddrEx(p, "DestSubnetMask6", &a->DestSubnetMask6, i);
- }
- return a;
- }
- // Convert the PACK to an access list
- void SiAccessListToPack(PACK *p, LIST *o)
- {
- // Validate arguments
- if (p == NULL || o == NULL)
- {
- return;
- }
- LockList(o);
- {
- UINT i;
- for (i = 0;i < LIST_NUM(o);i++)
- {
- ACCESS *a = LIST_DATA(o, i);
- SiAccessToPack(p, a, i, LIST_NUM(o));
- }
- }
- UnlockList(o);
- }
- // Get the member that is hosting the specified HUB
- FARM_MEMBER *SiGetHubHostingMember(SERVER *s, HUB *h, bool admin_mode, CONNECTION *c)
- {
- FARM_MEMBER *ret = NULL;
- char name[MAX_SIZE];
- UINT i;
- // Validate arguments
- if (s == NULL || h == NULL || c == NULL)
- {
- return NULL;
- }
- StrCpy(name, sizeof(name), h->Name);
- if (h->Type == HUB_TYPE_FARM_STATIC)
- {
- // It is good to select any member in the case of static HUB
- if (admin_mode == false)
- {
- ret = SiGetNextFarmMember(s, c, h);
- }
- else
- {
- UINT i;
- ret = NULL;
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- if (f->Me)
- {
- ret = f;
- break;
- }
- }
- }
- }
- else
- {
- // Examine whether there is a member that is hosting the HUB already in the case of dynamic HUB
- for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
- {
- FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
- HUB_LIST *hh, t;
- StrCpy(t.Name, sizeof(t.Name), name);
- LockList(f->HubList);
- {
- hh = Search(f->HubList, &t);
- if (hh != NULL)
- {
- // Found
- ret = f;
- }
- }
- UnlockList(f->HubList);
- }
- if (ret == NULL)
- {
- // Let host the new HUB
- FARM_MEMBER *f;
- // Select the member to host
- ret = SiGetNextFarmMember(s, c, h);
- f = ret;
- if (f != NULL)
- {
- // HUB creation directive
- SiAddHubCreateHistory(s, name);
- SiCallCreateHub(s, f, h);
- SiCallUpdateHub(s, f, h);
- }
- }
- }
- return ret;
- }
- // Task is called
- PACK *SiCalledTask(FARM_CONTROLLER *f, PACK *p, char *taskname)
- {
- PACK *ret;
- SERVER *s;
- // Validate arguments
- if (f == NULL || p == NULL || taskname == NULL)
- {
- return NULL;
- }
- ret = NULL;
- s = f->Server;
- if (StrCmpi(taskname, "noop") == 0)
- {
- // NO OPERATION
- ret = NewPack();
- }
- else
- {
- Debug("Task Called: [%s].\n", taskname);
- if (StrCmpi(taskname, "createhub") == 0)
- {
- SiCalledCreateHub(s, p);
- ret = NewPack();
- }
- else if (StrCmpi(taskname, "deletehub") == 0)
- {
- SiCalledDeleteHub(s, p);
- ret = NewPack();
- }
- else if (StrCmpi(taskname, "enumhub") == 0)
- {
- ret = NewPack();
- SiCalledEnumHub(s, ret, p);
- }
- else if (StrCmpi(taskname, "updatehub") == 0)
- {
- SiCalledUpdateHub(s, p);
- ret = NewPack();
- }
- else if (StrCmpi(taskname, "createticket") == 0)
- {
- ret = SiCalledCreateTicket(s, p);
- }
- else if (StrCmpi(taskname, "enumnat") == 0)
- {
- ret = SiCalledEnumNat(s, p);
- }
- else if (StrCmpi(taskname, "enumdhcp") == 0)
- {
- ret = SiCalledEnumDhcp(s, p);
- }
- else if (StrCmpi(taskname, "getnatstatus") == 0)
- {
- ret = SiCalledGetNatStatus(s, p);
- }
- else if (StrCmpi(taskname, "enumsession") == 0)
- {
- ret = SiCalledEnumSession(s, p);
- }
- else if (StrCmpi(taskname, "deletesession") == 0)
- {
- SiCalledDeleteSession(s, p);
- ret = NewPack();
- }
- else if (StrCmpi(taskname, "deletemactable") == 0)
- {
- SiCalledDeleteMacTable(s, p);
- ret = NewPack();
- }
- else if (StrCmpi(taskname, "deleteiptable") == 0)
- {
- SiCalledDeleteIpTable(s, p);
- ret = NewPack();
- }
- else if (StrCmpi(taskname, "enummactable") == 0)
- {
- ret = SiCalledEnumMacTable(s, p);
- }
- else if (StrCmpi(taskname, "enumiptable") == 0)
- {
- ret = SiCalledEnumIpTable(s, p);
- }
- else if (StrCmpi(taskname, "getsessionstatus") == 0)
- {
- ret = SiCalledGetSessionStatus(s, p);
- }
- else if (StrCmpi(taskname, "enumlogfilelist") == 0)
- {
- ret = SiCalledEnumLogFileList(s, p);
- }
- else if (StrCmpi(taskname, "readlogfile") == 0)
- {
- ret = SiCalledReadLogFile(s, p);
- }
- }
- return ret;
- }
- // Call the task (asynchronous)
- FARM_TASK *SiCallTaskAsyncBegin(FARM_MEMBER *f, PACK *p, char *taskname)
- {
- char tmp[MAX_PATH];
- FARM_TASK *t;
- // Validate arguments
- if (f == NULL || p == NULL || taskname == NULL)
- {
- return NULL;
- }
- PackAddStr(p, "taskname", taskname);
- Debug("Call Async Task [%s] (%s)\n", taskname, f->hostname);
- Format(tmp, sizeof(tmp), "CLUSTER_CALL_ASYNC: Entering Call [%s] to %s", taskname, f->hostname);
- SiDebugLog(f->Cedar->Server, tmp);
- t = SiFarmServPostTask(f, p);
- StrCpy(t->TaskName, sizeof(t->TaskName), taskname);
- StrCpy(t->HostName, sizeof(t->HostName), f->hostname);
- t->FarmMember = f;
- return t;
- }
- // Get the results of the asynchronous task
- PACK *SiCallTaskAsyncEnd(CEDAR *c, FARM_TASK *t)
- {
- PACK *p;
- char taskname[MAX_PATH];
- char hostname[MAX_PATH];
- char tmp[MAX_SIZE];
- // Validate arguments
- if (t == NULL || c == NULL)
- {
- return NULL;
- }
- StrCpy(taskname, sizeof(taskname), t->TaskName);
- StrCpy(hostname, sizeof(hostname), t->HostName);
- p = SiFarmServWaitTask(t);
- if (p == NULL)
- {
- Format(tmp, sizeof(tmp), "CLUSTER_CALL_ASYNC: Call ERROR [%s] to %s", taskname, hostname);
- SiDebugLog(c->Server, tmp);
- return NULL;
- }
- Format(tmp, sizeof(tmp), "CLUSTER_CALL_ASYNC: Retrieving Call Result [%s] to %s", taskname, hostname);
- SiDebugLog(c->Server, tmp);
- return p;
- }
- // Call the task
- PACK *SiCallTask(FARM_MEMBER *f, PACK *p, char *taskname)
- {
- PACK *ret;
- char tmp[MAX_PATH];
- // Validate arguments
- if (f == NULL || p == NULL || taskname == NULL)
- {
- return NULL;
- }
- PackAddStr(p, "taskname", taskname);
- Debug("Call Task [%s] (%s)\n", taskname, f->hostname);
- Format(tmp, sizeof(tmp), "CLUSTER_CALL: Entering Call [%s] to %s", taskname, f->hostname);
- SiDebugLog(f->Cedar->Server, tmp);
- ret = SiExecTask(f, p);
- Format(tmp, sizeof(tmp), "CLUSTER_CALL: Leaving Call [%s] to %s", taskname, f->hostname);
- SiDebugLog(f->Cedar->Server, tmp);
- return ret;
- }
- // Task listening procedure (Main Process)
- void SiAcceptTasksFromControllerMain(FARM_CONTROLLER *f, SOCK *sock)
- {
- PACK *request;
- PACK *response;
- char taskname[MAX_SIZE];
- // Validate arguments
- if (f == NULL || sock == NULL)
- {
- return;
- }
- f->IsConnected = true;
- while (true)
- {
- bool ret;
- // Receive the PACK
- request = HttpClientRecv(sock);
- if (request == NULL)
- {
- // Disconnect
- break;
- }
- response = NULL;
- // Get the name
- if (PackGetStr(request, "taskname", taskname, sizeof(taskname)))
- {
- Lock(f->Server->TasksFromFarmControllerLock);
- {
- response = SiCalledTask(f, request, taskname);
- }
- Unlock(f->Server->TasksFromFarmControllerLock);
- }
- FreePack(request);
- // Return a response
- if (response == NULL)
- {
- response = NewPack();
- }
- else
- {
- PackAddInt(response, "succeed", 1);
- }
- ret = HttpClientSend(sock, response);
- FreePack(response);
- if (ret == false)
- {
- // Disconnect
- break;
- }
- }
- f->IsConnected = false;
- }
- // Task waiting procedure
- void SiAcceptTasksFromController(FARM_CONTROLLER *f, SOCK *sock)
- {
- UINT i;
- HUB **hubs;
- UINT num_hubs;
- CEDAR *c;
- SERVER *s;
- // Validate arguments
- if (f == NULL || sock == NULL)
- {
- return;
- }
- s = f->Server;
- c = s->Cedar;
- // Main process
- SiAcceptTasksFromControllerMain(f, sock);
- // Stop all Virtual HUBs since the connection to the controller is disconnected
- LockList(c->HubList);
- {
- hubs = ToArray(c->HubList);
- num_hubs = LIST_NUM(c->HubList);
- for (i = 0;i < num_hubs;i++)
- {
- AddRef(hubs[i]->ref);
- }
- }
- UnlockList(c->HubList);
- for (i = 0;i < num_hubs;i++)
- {
- SetHubOffline(hubs[i]);
- DelHub(c, hubs[i]);
- ReleaseHub(hubs[i]);
- }
- Free(hubs);
- }
- // Execute the task
- PACK *SiExecTask(FARM_MEMBER *f, PACK *p)
- {
- FARM_TASK *t;
- // Validate arguments
- if (f == NULL || p == NULL)
- {
- return NULL;
- }
- t = SiFarmServPostTask(f, p);
- if (t == NULL)
- {
- return NULL;
- }
- return SiFarmServWaitTask(t);
- }
- // Task queuing
- FARM_TASK *SiFarmServPostTask(FARM_MEMBER *f, PACK *request)
- {
- FARM_TASK *t;
- // Validate arguments
- if (f == NULL || request == NULL)
- {
- return NULL;
- }
- t = ZeroMalloc(sizeof(FARM_TASK));
- t->CompleteEvent = NewEvent();
- t->Request = request;
- LockQueue(f->TaskQueue);
- {
- if (f->Halting)
- {
- // Halting (failure)
- UnlockQueue(f->TaskQueue);
- ReleaseEvent(t->CompleteEvent);
- Free(t);
- return NULL;
- }
- InsertQueue(f->TaskQueue, t);
- }
- UnlockQueue(f->TaskQueue);
- Set(f->TaskPostEvent);
- return t;
- }
- // Wait for task results
- PACK *SiFarmServWaitTask(FARM_TASK *t)
- {
- PACK *response;
- // Validate arguments
- if (t == NULL)
- {
- return NULL;
- }
- Wait(t->CompleteEvent, INFINITE);
- ReleaseEvent(t->CompleteEvent);
- FreePack(t->Request);
- response = t->Response;
- Free(t);
- if (PackGetInt(response, "succeed") == 0)
- {
- // Task calling fails for any reason
- FreePack(response);
- return NULL;
- }
- return response;
- }
- // Server farm processing main
- void SiFarmServMain(SERVER *server, SOCK *sock, FARM_MEMBER *f)
- {
- UINT wait_time = SERVER_CONTROL_TCP_TIMEOUT / 2;
- bool send_noop = false;
- UINT i;
- CEDAR *c;
- // Validate arguments
- if (server == NULL || sock == NULL || f == NULL)
- {
- Debug("SiFarmServMain Failed.\n");
- return;
- }
- Debug("SiFarmServMain Started.\n");
- c = server->Cedar;
- // Send a directive to create all static HUBs at the stage
- // where the members have been connected to the controller
- LockList(c->HubList);
- {
- for (i = 0;i < LIST_NUM(c->HubList);i++)
- {
- HUB *h = LIST_DATA(c->HubList, i);
- if (h->Offline == false)
- {
- if (h->Type == HUB_TYPE_FARM_STATIC)
- {
- PACK *p;
- HUB_LIST *hh;
- p = NewPack();
- SiPackAddCreateHub(p, h);
- PackAddStr(p, "taskname", "createhub");
- HttpServerSend(sock, p);
- FreePack(p);
- p = HttpServerRecv(sock);
- FreePack(p);
- p = NewPack();
- SiPackAddCreateHub(p, h);
- PackAddStr(p, "taskname", "updatehub");
- HttpServerSend(sock, p);
- FreePack(p);
- p = HttpServerRecv(sock);
- FreePack(p);
- hh = ZeroMalloc(sizeof(HUB_LIST));
- hh->DynamicHub = false;
- hh->FarmMember = f;
- StrCpy(hh->Name, sizeof(hh->Name), h->Name);
- LockList(f->HubList);
- {
- Add(f->HubList, hh);
- }
- UnlockList(f->HubList);
- }
- }
- }
- }
- UnlockList(c->HubList);
- Debug("SiFarmServMain: while (true)\n");
- while (true)
- {
- FARM_TASK *t;
- UINT64 tick;
- do
- {
- // Check whether a new task arrived
- LockQueue(f->TaskQueue);
- {
- t = GetNext(f->TaskQueue);
- }
- UnlockQueue(f->TaskQueue);
- if (t != NULL)
- {
- // Handle this task
- PACK *p = t->Request;
- bool ret;
- // Transmission
- ret = HttpServerSend(sock, p);
- send_noop = false;
- if (ret == false)
- {
- // Disconnected
- // Cancel this task
- Set(t->CompleteEvent);
- goto DISCONNECTED;
- }
- // Receive
- p = HttpServerRecv(sock);
- t->Response = p;
- Set(t->CompleteEvent);
- send_noop = false;
- }
- }
- while (t != NULL);
- if (send_noop)
- {
- // Send a NOOP
- PACK *p;
- bool ret;
- p = NewPack();
- PackAddStr(p, "taskname", "noop");
- ret = HttpServerSend(sock, p);
- FreePack(p);
- if (ret == false)
- {
- goto DISCONNECTED;
- }
- p = HttpServerRecv(sock);
- if (p == NULL)
- {
- goto DISCONNECTED;
- }
- FreePack(p);
- }
- tick = Tick64();
- while (true)
- {
- bool break_flag;
- if ((tick + wait_time) <= Tick64())
- {
- break;
- }
- Wait(f->TaskPostEvent, 250);
- break_flag = false;
- LockQueue(f->TaskQueue);
- {
- if (f->TaskQueue->num_item != 0)
- {
- break_flag = true;
- }
- }
- UnlockQueue(f->TaskQueue);
- if (break_flag || f->Halting || server->Halt)
- {
- break;
- }
- }
- send_noop = true;
- }
- DISCONNECTED:
- Debug("SiFarmServMain: DISCONNECTED\n");
- f->Halting = true;
- // Cancel all outstanding tasks
- LockQueue(f->TaskQueue);
- {
- FARM_TASK *t;
- while (t = GetNext(f->TaskQueue))
- {
- Set(t->CompleteEvent);
- }
- }
- UnlockQueue(f->TaskQueue);
- }
- // Farm server function that handles the connection from farm members
- void SiFarmServ(SERVER *server, SOCK *sock, X *cert, UINT ip, UINT num_port, UINT *ports, char *hostname, UINT point, UINT weight, UINT max_sessions)
- {
- PACK *p;
- FARM_MEMBER *f;
- UINT i;
- char tmp[MAX_SIZE];
- // Validate arguments
- if (server == NULL || sock == NULL || cert == NULL || num_port == 0 || ports == NULL || hostname == NULL)
- {
- return;
- }
- if (weight == 0)
- {
- weight = FARM_DEFAULT_WEIGHT;
- }
- if (max_sessions == 0)
- {
- max_sessions = SERVER_MAX_SESSIONS;
- }
- if (ip == 0)
- {
- // If the public IP address is not specified, specify the connection
- // source IP address of this farm member server
- ip = IPToUINT(&sock->RemoteIP);
- }
- IPToStr32(tmp, sizeof(tmp), ip);
- SLog(server->Cedar, "LS_FARM_SERV_START", tmp, hostname);
- // Inform the success
- p = NewPack();
- HttpServerSend(sock, p);
- FreePack(p);
- IPToStr32(tmp, sizeof(tmp), ip);
- Debug("Farm Member %s Connected. IP: %s\n", hostname, tmp);
- SetTimeout(sock, SERVER_CONTROL_TCP_TIMEOUT);
- f = ZeroMalloc(sizeof(FARM_MEMBER));
- f->Cedar = server->Cedar;
- f->Ip = ip;
- f->NumPort = num_port;
- f->Ports = ports;
- StrCpy(f->hostname, sizeof(f->hostname), hostname);
- f->ServerCert = cert;
- f->ConnectedTime = SystemTime64();
- f->Weight = weight;
- f->MaxSessions = max_sessions;
- f->HubList = NewList(CompareHubList);
- f->Point = point;
- f->TaskQueue = NewQueue();
- f->TaskPostEvent = NewEvent();
- // Add to the list
- LockList(server->FarmMemberList);
- {
- Add(server->FarmMemberList, f);
- }
- UnlockList(server->FarmMemberList);
- // Main process
- SiFarmServMain(server, sock, f);
- // Remove from the list
- LockList(server->FarmMemberList);
- {
- Delete(server->FarmMemberList, f);
- }
- UnlockList(server->FarmMemberList);
- ReleaseQueue(f->TaskQueue);
- ReleaseEvent(f->TaskPostEvent);
- for (i = 0;i < LIST_NUM(f->HubList);i++)
- {
- HUB_LIST *hh = LIST_DATA(f->HubList, i);
- Free(hh);
- }
- ReleaseList(f->HubList);
- Free(f);
- SLog(server->Cedar, "LS_FARM_SERV_END", hostname);
- }
- // Search in HUB list
- int CompareHubList(void *p1, void *p2)
- {
- HUB_LIST *h1, *h2;
- if (p1 == NULL || p2 == NULL)
- {
- return 0;
- }
- h1 = *(HUB_LIST **)p1;
- h2 = *(HUB_LIST **)p2;
- if (h1 == NULL || h2 == NULL)
- {
- return 0;
- }
- return StrCmpi(h1->Name, h2->Name);
- }
- // Connection thread to the controller
- void SiConnectToControllerThread(THREAD *thread, void *param)
- {
- FARM_CONTROLLER *f;
- SESSION *s;
- CONNECTION *c;
- SERVER *server;
- bool first_failed;
- // Validate arguments
- if (thread == NULL || param == NULL)
- {
- return;
- }
- #ifdef OS_WIN32
- MsSetThreadPriorityRealtime();
- #endif // OS_WIN32
- f = (FARM_CONTROLLER *)param;
- f->Thread = thread;
- AddRef(f->Thread->ref);
- NoticeThreadInit(thread);
- f->StartedTime = SystemTime64();
- server = f->Server;
- f->StartedTime = SystemTime64();
- SLog(server->Cedar, "LS_FARM_CONNECT_1", server->ControllerName);
- first_failed = true;
- while (true)
- {
- // Attempt to connect
- CLIENT_OPTION o;
- f->LastError = ERR_TRYING_TO_CONNECT;
- Zero(&o, sizeof(CLIENT_OPTION));
- StrCpy(o.Hostname, sizeof(o.Hostname), server->ControllerName);
- o.Port = server->ControllerPort;
- f->NumTry++;
- Debug("Try to Connect %s (Controller).\n", server->ControllerName);
- s = NewRpcSessionEx(server->Cedar, &o, NULL, CEDAR_SERVER_FARM_STR);
- if (s != NULL)
- {
- // Connection success: send the authentication data
- PACK *p = NewPack();
- UCHAR secure_password[SHA1_SIZE];
- BUF *b;
- c = s->Connection;
- Lock(f->lock);
- {
- f->Sock = c->FirstSock;
- AddRef(f->Sock->ref);
- SetTimeout(f->Sock, SERVER_CONTROL_TCP_TIMEOUT);
- }
- Unlock(f->lock);
- // Method
- PackAddStr(p, "method", "farm_connect");
- PackAddClientVersion(p, s->Connection);
- // Password
- SecurePassword(secure_password, server->MemberPassword, s->Connection->Random);
- PackAddData(p, "SecurePassword", secure_password, sizeof(secure_password));
- Lock(server->Cedar->lock);
- {
- b = XToBuf(server->Cedar->ServerX, false);
- }
- Unlock(server->Cedar->lock);
- if (b != NULL)
- {
- char tmp[MAX_SIZE];
- bool ret;
- UINT i;
- // Server certificate
- PackAddBuf(p, "ServerCert", b);
- FreeBuf(b);
- // Maximum number of sessions
- PackAddInt(p, "MaxSessions", GetServerCapsInt(server, "i_max_sessions"));
- // Point
- PackAddInt(p, "Point", SiGetPoint(server));
- PackAddInt(p, "Weight", server->Weight);
- // Host name
- GetMachineName(tmp, sizeof(tmp));
- PackAddStr(p, "HostName", tmp);
- // Public IP
- PackAddIp32(p, "PublicIp", server->PublicIp);
- // Public port
- for (i = 0;i < server->NumPublicPort;i++)
- {
- PackAddIntEx(p, "PublicPort", server->PublicPorts[i], i, server->NumPublicPort);
- }
- ret = HttpClientSend(c->FirstSock, p);
- if (ret)
- {
- PACK *p;
- UINT err = ERR_PROTOCOL_ERROR;
- first_failed = true;
- p = HttpClientRecv(c->FirstSock);
- if (p != NULL && (err = GetErrorFromPack(p)) == 0)
- {
- // Successful connection
- SLog(server->Cedar, "LS_FARM_START");
- f->CurrentConnectedTime = SystemTime64();
- if (f->FirstConnectedTime == 0)
- {
- f->FirstConnectedTime = SystemTime64();
- }
- f->NumConnected++;
- Debug("Connect Succeed.\n");
- f->Online = true;
- // Main process
- SiAcceptTasksFromController(f, c->FirstSock);
- f->Online = false;
- }
- else
- {
- // Error
- f->LastError = err;
- SLog(server->Cedar, "LS_FARM_CONNECT_2", server->ControllerName,
- GetUniErrorStr(err), err);
- }
- FreePack(p);
- }
- else
- {
- f->LastError = ERR_DISCONNECTED;
- if (first_failed)
- {
- SLog(server->Cedar, "LS_FARM_CONNECT_3", server->ControllerName, RETRY_CONNECT_TO_CONTROLLER_INTERVAL / 1000);
- first_failed = false;
- }
- }
- }
- FreePack(p);
- // Disconnect
- Lock(f->lock);
- {
- if (f->Sock != NULL)
- {
- ReleaseSock(f->Sock);
- f->Sock = NULL;
- }
- }
- Unlock(f->lock);
- ReleaseSession(s);
- s = NULL;
- if (f->LastError == ERR_TRYING_TO_CONNECT)
- {
- f->LastError = ERR_DISCONNECTED;
- }
- }
- else
- {
- // Connection failure
- f->LastError = ERR_CONNECT_TO_FARM_CONTROLLER;
- if (first_failed)
- {
- SLog(server->Cedar, "LS_FARM_CONNECT_3", server->ControllerName, RETRY_CONNECT_TO_CONTROLLER_INTERVAL / 1000);
- first_failed = false;
- }
- }
- Debug("Controller Disconnected. ERROR = %S\n", _E(f->LastError));
- f->NumFailed = f->NumTry - f->NumConnected;
- // Wait for event
- Wait(f->HaltEvent, RETRY_CONNECT_TO_CONTROLLER_INTERVAL);
- if (f->Halt)
- {
- // Halting flag
- break;
- }
- }
- SLog(server->Cedar, "LS_FARM_DISCONNECT");
- }
- // Disconnect the connection to the controller
- void SiStopConnectToController(FARM_CONTROLLER *f)
- {
- // Validate arguments
- if (f == NULL)
- {
- return;
- }
- f->Halt = true;
- // Stop the connection
- Lock(f->lock);
- {
- Disconnect(f->Sock);
- }
- Unlock(f->lock);
- Set(f->HaltEvent);
- // Wait for the thread termination
- WaitThread(f->Thread, INFINITE);
- ReleaseThread(f->Thread);
- DeleteLock(f->lock);
- ReleaseEvent(f->HaltEvent);
- Free(f);
- }
- // Start a connection to the controller
- FARM_CONTROLLER *SiStartConnectToController(SERVER *s)
- {
- FARM_CONTROLLER *f;
- THREAD *t;
- // Validate arguments
- if (s == NULL)
- {
- return NULL;
- }
- f = ZeroMalloc(sizeof(FARM_CONTROLLER));
- f->Server = s;
- f->LastError = ERR_TRYING_TO_CONNECT;
- f->HaltEvent = NewEvent();
- f->lock = NewLock();
- t = NewThread(SiConnectToControllerThread, f);
- WaitThreadInit(t);
- ReleaseThread(t);
- return f;
- }
- // Get the current version
- void SiGetCurrentRegion(CEDAR *c, char *region, UINT region_size)
- {
- ClearStr(region, region_size);
- // Validate arguments
- if (c == NULL || region == NULL)
- {
- return;
- }
- Lock(c->CurrentRegionLock);
- {
- StrCpy(region, region_size, c->CurrentRegion);
- }
- Unlock(c->CurrentRegionLock);
- if (IsEmptyStr(region))
- {
- if (GetCurrentLangId() == SE_LANG_JAPANESE)
- {
- StrCpy(region, region_size, "JP");
- }
- else if (GetCurrentLangId() == SE_LANG_CHINESE_ZH)
- {
- StrCpy(region, region_size, "CN");
- }
- }
- }
- // Check the current region
- bool SiCheckCurrentRegion(CEDAR *c, char *r)
- {
- char tmp[64];
- // Validate arguments
- if (c == NULL || r == NULL)
- {
- return false;
- }
- SiGetCurrentRegion(c, tmp, sizeof(tmp));
- return (StrCmpi(r, tmp) == 0);
- }
- // Check whether some enterprise functions are restricted
- //
- // ** Hints by Daiyuu Nobori, written on March 19, 2014 **
- //
- // The following 'enterprise functions' are implemented on SoftEther VPN Server
- // since March 19, 2014. However, these functions are disabled on
- // SoftEther VPN Servers which run in Japan and China.
- //
- // - RADIUS / NT Domain user authentication
- // - RSA certificate authentication
- // - Deep-inspect packet logging
- // - Source IP address control list
- // - syslog transfer
- //
- // The SoftEther VPN Project intentionally disables these functions for users
- // in Japan and China. The reason is: Daiyuu Nobori, the chief author of
- // SoftEther VPN, has been liable to observe the existing agreements and
- // restrictions between him and some companies. The agreements have regulated
- // the region-limited restriction to implement and distribute the above
- // enterprise functions on the SoftEther VPN open-source program.
- //
- // Therefore, the SoftEther VPN Project distributes the binary program and
- // the source code with the "SiIsEnterpriseFunctionsRestrictedOnOpenSource"
- // function. This function identifies whether the SoftEther VPN Server
- // program is running in either Japan or China. If the restricted region is
- // detected, then the above enterprise functions will be disabled.
- //
- // Please note that the above restriction has been imposed only on the
- // original binaries and source codes from the SoftEther VPN Project.
- // Anyone, except Daiyuu Nobori, who understands and writes the C language
- // program can remove this restriction at his own risk.
- //
- bool SiIsEnterpriseFunctionsRestrictedOnOpenSource(CEDAR *c)
- {
- char region[128];
- bool ret = false;
- // Validate arguments
- if (c == NULL)
- {
- return false;
- }
- SiGetCurrentRegion(c, region, sizeof(region));
- if (StrCmpi(region, "JP") == 0 || StrCmpi(region, "CN") == 0)
- {
- ret = true;
- }
- return ret;
- }
- // Update the current region
- void SiUpdateCurrentRegion(CEDAR *c, char *region, bool force_update)
- {
- bool changed = false;
- // Validate arguments
- if (c == NULL)
- {
- return;
- }
- if (IsEmptyStr(region) == false)
- {
- Lock(c->CurrentRegionLock);
- {
- if (StrCmpi(c->CurrentRegion, region) != 0)
- {
- StrCpy(c->CurrentRegion, sizeof(c->CurrentRegion), region);
- changed = true;
- }
- }
- Unlock(c->CurrentRegionLock);
- }
- if (force_update)
- {
- changed = true;
- }
- if (changed)
- {
- FlushServerCaps(c->Server);
- }
- }
- // Create a server
- SERVER *SiNewServer(bool bridge)
- {
- return SiNewServerEx(bridge, false);
- }
- SERVER *SiNewServerEx(bool bridge, bool in_client_inner_server)
- {
- SERVER *s;
- LISTENER *inproc;
- LISTENER *azure;
- LISTENER *rudp;
- s = ZeroMalloc(sizeof(SERVER));
- SiInitHubCreateHistory(s);
- InitServerCapsCache(s);
- Rand(s->MyRandomKey, sizeof(s->MyRandomKey));
- s->lock = NewLock();
- s->OpenVpnSstpConfigLock = NewLock();
- s->SaveCfgLock = NewLock();
- s->ref = NewRef();
- s->Cedar = NewCedar(NULL, NULL);
- s->Cedar->Server = s;
- #ifdef OS_WIN32
- s->IsInVm = MsIsInVm();
- #else // OS_WIN32
- s->IsInVm = UnixIsInVm();
- #endif // OS_WIN32
- #ifdef ENABLE_AZURE_SERVER
- if (IsFileExists("@azureserver.config"))
- {
- DisableRDUPServerGlobally();
- s->AzureServer = NewAzureServer(s->Cedar);
- SleepThread(500);
- }
- #endif // ENABLE_AZURE_SERVER
- s->Cedar->CheckExpires = true;
- s->ServerListenerList = NewList(CompareServerListener);
- s->StartTime = SystemTime64();
- s->Syslog = NewSysLog(NULL, 0);
- s->SyslogLock = NewLock();
- s->TasksFromFarmControllerLock = NewLock();
- if (bridge)
- {
- SetCedarVpnBridge(s->Cedar);
- }
- #ifdef OS_WIN32
- if (IsHamMode() == false)
- {
- RegistWindowsFirewallAll();
- }
- #endif
- s->Keep = StartKeep();
- // Log related
- MakeDir(bridge == false ? SERVER_LOG_DIR_NAME : BRIDGE_LOG_DIR_NAME);
- s->Logger = NewLog(bridge == false ? SERVER_LOG_DIR_NAME : BRIDGE_LOG_DIR_NAME, SERVER_LOG_PERFIX, LOG_SWITCH_DAY);
- SLog(s->Cedar, "L_LINE");
- SLog(s->Cedar, "LS_START_2", s->Cedar->ServerStr, s->Cedar->VerString);
- SLog(s->Cedar, "LS_START_3", s->Cedar->BuildInfo);
- SLog(s->Cedar, "LS_START_UTF8");
- SLog(s->Cedar, "LS_START_1");
- // Initialize the configuration
- SiInitConfiguration(s);
- if (s->DisableIntelAesAcceleration)
- {
- // Disable the Intel AES acceleration
- DisableIntelAesAccel();
- }
- // Raise the priority
- if (s->NoHighPriorityProcess == false)
- {
- OSSetHighPriority();
- }
- if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
- {
- // Start a connection to the controller
- s->FarmController = SiStartConnectToController(s);
- }
- else if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
- {
- FARM_MEMBER *f;
- // Start operating as a controller
- s->FarmMemberList = NewList(NULL);
- f = ZeroMalloc(sizeof(FARM_MEMBER));
- f->Cedar = s->Cedar;
- GetMachineName(f->hostname, sizeof(f->hostname));
- f->Me = true;
- f->HubList = NewList(CompareHubList);
- f->Weight = s->Weight;
- s->Me = f;
- Add(s->FarmMemberList, f);
- SiStartFarmControl(s);
- s->FarmControllerInited = true;
- }
- // Start a in-processlistener
- inproc = NewListener(s->Cedar, LISTENER_INPROC, 0);
- ReleaseListener(inproc);
- // Start a listener for Azure
- if (s->AzureClient != NULL)
- {
- azure = NewListener(s->Cedar, LISTENER_REVERSE, 0);
- ReleaseListener(azure);
- }
- // Start a R-UDP listener
- if (s->DisableNatTraversal == false && s->Cedar->Bridge == false)
- {
- rudp = NewListenerEx4(s->Cedar, LISTENER_RUDP, 0, TCPAcceptedThread, NULL, false, false,
- &s->NatTGlobalUdpPort, RAND_PORT_ID_SERVER_LISTEN);
- ReleaseListener(rudp);
- }
- // Start a VPN-over-ICMP listener
- s->DynListenerIcmp = NewDynamicListener(s->Cedar, &s->EnableVpnOverIcmp, LISTENER_ICMP, 0);
- // Start a VPN-over-DNS listener
- s->DynListenerDns = NewDynamicListener(s->Cedar, &s->EnableVpnOverDns, LISTENER_DNS, 53);
- SiInitDeadLockCheck(s);
- SiUpdateCurrentRegion(s->Cedar, "", true);
- return s;
- }
- // Developed by SoftEther VPN Project at University of Tsukuba in Japan.
- // Department of Computer Science has dozens of overly-enthusiastic geeks.
- // Join us: http://www.tsukuba.ac.jp/english/admission/
|