Server.c 239 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583158415851586158715881589159015911592159315941595159615971598159916001601160216031604160516061607160816091610161116121613161416151616161716181619162016211622162316241625162616271628162916301631163216331634163516361637163816391640164116421643164416451646164716481649165016511652165316541655165616571658165916601661166216631664166516661667166816691670167116721673167416751676167716781679168016811682168316841685168616871688168916901691169216931694169516961697169816991700170117021703170417051706170717081709171017111712171317141715171617171718171917201721172217231724172517261727172817291730173117321733173417351736173717381739174017411742174317441745174617471748174917501751175217531754175517561757175817591760176117621763176417651766176717681769177017711772177317741775177617771778177917801781178217831784178517861787178817891790179117921793179417951796179717981799180018011802180318041805180618071808180918101811181218131814181518161817181818191820182118221823182418251826182718281829183018311832183318341835183618371838183918401841184218431844184518461847184818491850185118521853185418551856185718581859186018611862186318641865186618671868186918701871187218731874187518761877187818791880188118821883188418851886188718881889189018911892189318941895189618971898189919001901190219031904190519061907190819091910191119121913191419151916191719181919192019211922192319241925192619271928192919301931193219331934193519361937193819391940194119421943194419451946194719481949195019511952195319541955195619571958195919601961196219631964196519661967196819691970197119721973197419751976197719781979198019811982198319841985198619871988198919901991199219931994199519961997199819992000200120022003200420052006200720082009201020112012201320142015201620172018201920202021202220232024202520262027202820292030203120322033203420352036203720382039204020412042204320442045204620472048204920502051205220532054205520562057205820592060206120622063206420652066206720682069207020712072207320742075207620772078207920802081208220832084208520862087208820892090209120922093209420952096209720982099210021012102210321042105210621072108210921102111211221132114211521162117211821192120212121222123212421252126212721282129213021312132213321342135213621372138213921402141214221432144214521462147214821492150215121522153215421552156215721582159216021612162216321642165216621672168216921702171217221732174217521762177217821792180218121822183218421852186218721882189219021912192219321942195219621972198219922002201220222032204220522062207220822092210221122122213221422152216221722182219222022212222222322242225222622272228222922302231223222332234223522362237223822392240224122422243224422452246224722482249225022512252225322542255225622572258225922602261226222632264226522662267226822692270227122722273227422752276227722782279228022812282228322842285228622872288228922902291229222932294229522962297229822992300230123022303230423052306230723082309231023112312231323142315231623172318231923202321232223232324232523262327232823292330233123322333233423352336233723382339234023412342234323442345234623472348234923502351235223532354235523562357235823592360236123622363236423652366236723682369237023712372237323742375237623772378237923802381238223832384238523862387238823892390239123922393239423952396239723982399240024012402240324042405240624072408240924102411241224132414241524162417241824192420242124222423242424252426242724282429243024312432243324342435243624372438243924402441244224432444244524462447244824492450245124522453245424552456245724582459246024612462246324642465246624672468246924702471247224732474247524762477247824792480248124822483248424852486248724882489249024912492249324942495249624972498249925002501250225032504250525062507250825092510251125122513251425152516251725182519252025212522252325242525252625272528252925302531253225332534253525362537253825392540254125422543254425452546254725482549255025512552255325542555255625572558255925602561256225632564256525662567256825692570257125722573257425752576257725782579258025812582258325842585258625872588258925902591259225932594259525962597259825992600260126022603260426052606260726082609261026112612261326142615261626172618261926202621262226232624262526262627262826292630263126322633263426352636263726382639264026412642264326442645264626472648264926502651265226532654265526562657265826592660266126622663266426652666266726682669267026712672267326742675267626772678267926802681268226832684268526862687268826892690269126922693269426952696269726982699270027012702270327042705270627072708270927102711271227132714271527162717271827192720272127222723272427252726272727282729273027312732273327342735273627372738273927402741274227432744274527462747274827492750275127522753275427552756275727582759276027612762276327642765276627672768276927702771277227732774277527762777277827792780278127822783278427852786278727882789279027912792279327942795279627972798279928002801280228032804280528062807280828092810281128122813281428152816281728182819282028212822282328242825282628272828282928302831283228332834283528362837283828392840284128422843284428452846284728482849285028512852285328542855285628572858285928602861286228632864286528662867286828692870287128722873287428752876287728782879288028812882288328842885288628872888288928902891289228932894289528962897289828992900290129022903290429052906290729082909291029112912291329142915291629172918291929202921292229232924292529262927292829292930293129322933293429352936293729382939294029412942294329442945294629472948294929502951295229532954295529562957295829592960296129622963296429652966296729682969297029712972297329742975297629772978297929802981298229832984298529862987298829892990299129922993299429952996299729982999300030013002300330043005300630073008300930103011301230133014301530163017301830193020302130223023302430253026302730283029303030313032303330343035303630373038303930403041304230433044304530463047304830493050305130523053305430553056305730583059306030613062306330643065306630673068306930703071307230733074307530763077307830793080308130823083308430853086308730883089309030913092309330943095309630973098309931003101310231033104310531063107310831093110311131123113311431153116311731183119312031213122312331243125312631273128312931303131313231333134313531363137313831393140314131423143314431453146314731483149315031513152315331543155315631573158315931603161316231633164316531663167316831693170317131723173317431753176317731783179318031813182318331843185318631873188318931903191319231933194319531963197319831993200320132023203320432053206320732083209321032113212321332143215321632173218321932203221322232233224322532263227322832293230323132323233323432353236323732383239324032413242324332443245324632473248324932503251325232533254325532563257325832593260326132623263326432653266326732683269327032713272327332743275327632773278327932803281328232833284328532863287328832893290329132923293329432953296329732983299330033013302330333043305330633073308330933103311331233133314331533163317331833193320332133223323332433253326332733283329333033313332333333343335333633373338333933403341334233433344334533463347334833493350335133523353335433553356335733583359336033613362336333643365336633673368336933703371337233733374337533763377337833793380338133823383338433853386338733883389339033913392339333943395339633973398339934003401340234033404340534063407340834093410341134123413341434153416341734183419342034213422342334243425342634273428342934303431343234333434343534363437343834393440344134423443344434453446344734483449345034513452345334543455345634573458345934603461346234633464346534663467346834693470347134723473347434753476347734783479348034813482348334843485348634873488348934903491349234933494349534963497349834993500350135023503350435053506350735083509351035113512351335143515351635173518351935203521352235233524352535263527352835293530353135323533353435353536353735383539354035413542354335443545354635473548354935503551355235533554355535563557355835593560356135623563356435653566356735683569357035713572357335743575357635773578357935803581358235833584358535863587358835893590359135923593359435953596359735983599360036013602360336043605360636073608360936103611361236133614361536163617361836193620362136223623362436253626362736283629363036313632363336343635363636373638363936403641364236433644364536463647364836493650365136523653365436553656365736583659366036613662366336643665366636673668366936703671367236733674367536763677367836793680368136823683368436853686368736883689369036913692369336943695369636973698369937003701370237033704370537063707370837093710371137123713371437153716371737183719372037213722372337243725372637273728372937303731373237333734373537363737373837393740374137423743374437453746374737483749375037513752375337543755375637573758375937603761376237633764376537663767376837693770377137723773377437753776377737783779378037813782378337843785378637873788378937903791379237933794379537963797379837993800380138023803380438053806380738083809381038113812381338143815381638173818381938203821382238233824382538263827382838293830383138323833383438353836383738383839384038413842384338443845384638473848384938503851385238533854385538563857385838593860386138623863386438653866386738683869387038713872387338743875387638773878387938803881388238833884388538863887388838893890389138923893389438953896389738983899390039013902390339043905390639073908390939103911391239133914391539163917391839193920392139223923392439253926392739283929393039313932393339343935393639373938393939403941394239433944394539463947394839493950395139523953395439553956395739583959396039613962396339643965396639673968396939703971397239733974397539763977397839793980398139823983398439853986398739883989399039913992399339943995399639973998399940004001400240034004400540064007400840094010401140124013401440154016401740184019402040214022402340244025402640274028402940304031403240334034403540364037403840394040404140424043404440454046404740484049405040514052405340544055405640574058405940604061406240634064406540664067406840694070407140724073407440754076407740784079408040814082408340844085408640874088408940904091409240934094409540964097409840994100410141024103410441054106410741084109411041114112411341144115411641174118411941204121412241234124412541264127412841294130413141324133413441354136413741384139414041414142414341444145414641474148414941504151415241534154415541564157415841594160416141624163416441654166416741684169417041714172417341744175417641774178417941804181418241834184418541864187418841894190419141924193419441954196419741984199420042014202420342044205420642074208420942104211421242134214421542164217421842194220422142224223422442254226422742284229423042314232423342344235423642374238423942404241424242434244424542464247424842494250425142524253425442554256425742584259426042614262426342644265426642674268426942704271427242734274427542764277427842794280428142824283428442854286428742884289429042914292429342944295429642974298429943004301430243034304430543064307430843094310431143124313431443154316431743184319432043214322432343244325432643274328432943304331433243334334433543364337433843394340434143424343434443454346434743484349435043514352435343544355435643574358435943604361436243634364436543664367436843694370437143724373437443754376437743784379438043814382438343844385438643874388438943904391439243934394439543964397439843994400440144024403440444054406440744084409441044114412441344144415441644174418441944204421442244234424442544264427442844294430443144324433443444354436443744384439444044414442444344444445444644474448444944504451445244534454445544564457445844594460446144624463446444654466446744684469447044714472447344744475447644774478447944804481448244834484448544864487448844894490449144924493449444954496449744984499450045014502450345044505450645074508450945104511451245134514451545164517451845194520452145224523452445254526452745284529453045314532453345344535453645374538453945404541454245434544454545464547454845494550455145524553455445554556455745584559456045614562456345644565456645674568456945704571457245734574457545764577457845794580458145824583458445854586458745884589459045914592459345944595459645974598459946004601460246034604460546064607460846094610461146124613461446154616461746184619462046214622462346244625462646274628462946304631463246334634463546364637463846394640464146424643464446454646464746484649465046514652465346544655465646574658465946604661466246634664466546664667466846694670467146724673467446754676467746784679468046814682468346844685468646874688468946904691469246934694469546964697469846994700470147024703470447054706470747084709471047114712471347144715471647174718471947204721472247234724472547264727472847294730473147324733473447354736473747384739474047414742474347444745474647474748474947504751475247534754475547564757475847594760476147624763476447654766476747684769477047714772477347744775477647774778477947804781478247834784478547864787478847894790479147924793479447954796479747984799480048014802480348044805480648074808480948104811481248134814481548164817481848194820482148224823482448254826482748284829483048314832483348344835483648374838483948404841484248434844484548464847484848494850485148524853485448554856485748584859486048614862486348644865486648674868486948704871487248734874487548764877487848794880488148824883488448854886488748884889489048914892489348944895489648974898489949004901490249034904490549064907490849094910491149124913491449154916491749184919492049214922492349244925492649274928492949304931493249334934493549364937493849394940494149424943494449454946494749484949495049514952495349544955495649574958495949604961496249634964496549664967496849694970497149724973497449754976497749784979498049814982498349844985498649874988498949904991499249934994499549964997499849995000500150025003500450055006500750085009501050115012501350145015501650175018501950205021502250235024502550265027502850295030503150325033503450355036503750385039504050415042504350445045504650475048504950505051505250535054505550565057505850595060506150625063506450655066506750685069507050715072507350745075507650775078507950805081508250835084508550865087508850895090509150925093509450955096509750985099510051015102510351045105510651075108510951105111511251135114511551165117511851195120512151225123512451255126512751285129513051315132513351345135513651375138513951405141514251435144514551465147514851495150515151525153515451555156515751585159516051615162516351645165516651675168516951705171517251735174517551765177517851795180518151825183518451855186518751885189519051915192519351945195519651975198519952005201520252035204520552065207520852095210521152125213521452155216521752185219522052215222522352245225522652275228522952305231523252335234523552365237523852395240524152425243524452455246524752485249525052515252525352545255525652575258525952605261526252635264526552665267526852695270527152725273527452755276527752785279528052815282528352845285528652875288528952905291529252935294529552965297529852995300530153025303530453055306530753085309531053115312531353145315531653175318531953205321532253235324532553265327532853295330533153325333533453355336533753385339534053415342534353445345534653475348534953505351535253535354535553565357535853595360536153625363536453655366536753685369537053715372537353745375537653775378537953805381538253835384538553865387538853895390539153925393539453955396539753985399540054015402540354045405540654075408540954105411541254135414541554165417541854195420542154225423542454255426542754285429543054315432543354345435543654375438543954405441544254435444544554465447544854495450545154525453545454555456545754585459546054615462546354645465546654675468546954705471547254735474547554765477547854795480548154825483548454855486548754885489549054915492549354945495549654975498549955005501550255035504550555065507550855095510551155125513551455155516551755185519552055215522552355245525552655275528552955305531553255335534553555365537553855395540554155425543554455455546554755485549555055515552555355545555555655575558555955605561556255635564556555665567556855695570557155725573557455755576557755785579558055815582558355845585558655875588558955905591559255935594559555965597559855995600560156025603560456055606560756085609561056115612561356145615561656175618561956205621562256235624562556265627562856295630563156325633563456355636563756385639564056415642564356445645564656475648564956505651565256535654565556565657565856595660566156625663566456655666566756685669567056715672567356745675567656775678567956805681568256835684568556865687568856895690569156925693569456955696569756985699570057015702570357045705570657075708570957105711571257135714571557165717571857195720572157225723572457255726572757285729573057315732573357345735573657375738573957405741574257435744574557465747574857495750575157525753575457555756575757585759576057615762576357645765576657675768576957705771577257735774577557765777577857795780578157825783578457855786578757885789579057915792579357945795579657975798579958005801580258035804580558065807580858095810581158125813581458155816581758185819582058215822582358245825582658275828582958305831583258335834583558365837583858395840584158425843584458455846584758485849585058515852585358545855585658575858585958605861586258635864586558665867586858695870587158725873587458755876587758785879588058815882588358845885588658875888588958905891589258935894589558965897589858995900590159025903590459055906590759085909591059115912591359145915591659175918591959205921592259235924592559265927592859295930593159325933593459355936593759385939594059415942594359445945594659475948594959505951595259535954595559565957595859595960596159625963596459655966596759685969597059715972597359745975597659775978597959805981598259835984598559865987598859895990599159925993599459955996599759985999600060016002600360046005600660076008600960106011601260136014601560166017601860196020602160226023602460256026602760286029603060316032603360346035603660376038603960406041604260436044604560466047604860496050605160526053605460556056605760586059606060616062606360646065606660676068606960706071607260736074607560766077607860796080608160826083608460856086608760886089609060916092609360946095609660976098609961006101610261036104610561066107610861096110611161126113611461156116611761186119612061216122612361246125612661276128612961306131613261336134613561366137613861396140614161426143614461456146614761486149615061516152615361546155615661576158615961606161616261636164616561666167616861696170617161726173617461756176617761786179618061816182618361846185618661876188618961906191619261936194619561966197619861996200620162026203620462056206620762086209621062116212621362146215621662176218621962206221622262236224622562266227622862296230623162326233623462356236623762386239624062416242624362446245624662476248624962506251625262536254625562566257625862596260626162626263626462656266626762686269627062716272627362746275627662776278627962806281628262836284628562866287628862896290629162926293629462956296629762986299630063016302630363046305630663076308630963106311631263136314631563166317631863196320632163226323632463256326632763286329633063316332633363346335633663376338633963406341634263436344634563466347634863496350635163526353635463556356635763586359636063616362636363646365636663676368636963706371637263736374637563766377637863796380638163826383638463856386638763886389639063916392639363946395639663976398639964006401640264036404640564066407640864096410641164126413641464156416641764186419642064216422642364246425642664276428642964306431643264336434643564366437643864396440644164426443644464456446644764486449645064516452645364546455645664576458645964606461646264636464646564666467646864696470647164726473647464756476647764786479648064816482648364846485648664876488648964906491649264936494649564966497649864996500650165026503650465056506650765086509651065116512651365146515651665176518651965206521652265236524652565266527652865296530653165326533653465356536653765386539654065416542654365446545654665476548654965506551655265536554655565566557655865596560656165626563656465656566656765686569657065716572657365746575657665776578657965806581658265836584658565866587658865896590659165926593659465956596659765986599660066016602660366046605660666076608660966106611661266136614661566166617661866196620662166226623662466256626662766286629663066316632663366346635663666376638663966406641664266436644664566466647664866496650665166526653665466556656665766586659666066616662666366646665666666676668666966706671667266736674667566766677667866796680668166826683668466856686668766886689669066916692669366946695669666976698669967006701670267036704670567066707670867096710671167126713671467156716671767186719672067216722672367246725672667276728672967306731673267336734673567366737673867396740674167426743674467456746674767486749675067516752675367546755675667576758675967606761676267636764676567666767676867696770677167726773677467756776677767786779678067816782678367846785678667876788678967906791679267936794679567966797679867996800680168026803680468056806680768086809681068116812681368146815681668176818681968206821682268236824682568266827682868296830683168326833683468356836683768386839684068416842684368446845684668476848684968506851685268536854685568566857685868596860686168626863686468656866686768686869687068716872687368746875687668776878687968806881688268836884688568866887688868896890689168926893689468956896689768986899690069016902690369046905690669076908690969106911691269136914691569166917691869196920692169226923692469256926692769286929693069316932693369346935693669376938693969406941694269436944694569466947694869496950695169526953695469556956695769586959696069616962696369646965696669676968696969706971697269736974697569766977697869796980698169826983698469856986698769886989699069916992699369946995699669976998699970007001700270037004700570067007700870097010701170127013701470157016701770187019702070217022702370247025702670277028702970307031703270337034703570367037703870397040704170427043704470457046704770487049705070517052705370547055705670577058705970607061706270637064706570667067706870697070707170727073707470757076707770787079708070817082708370847085708670877088708970907091709270937094709570967097709870997100710171027103710471057106710771087109711071117112711371147115711671177118711971207121712271237124712571267127712871297130713171327133713471357136713771387139714071417142714371447145714671477148714971507151715271537154715571567157715871597160716171627163716471657166716771687169717071717172717371747175717671777178717971807181718271837184718571867187718871897190719171927193719471957196719771987199720072017202720372047205720672077208720972107211721272137214721572167217721872197220722172227223722472257226722772287229723072317232723372347235723672377238723972407241724272437244724572467247724872497250725172527253725472557256725772587259726072617262726372647265726672677268726972707271727272737274727572767277727872797280728172827283728472857286728772887289729072917292729372947295729672977298729973007301730273037304730573067307730873097310731173127313731473157316731773187319732073217322732373247325732673277328732973307331733273337334733573367337733873397340734173427343734473457346734773487349735073517352735373547355735673577358735973607361736273637364736573667367736873697370737173727373737473757376737773787379738073817382738373847385738673877388738973907391739273937394739573967397739873997400740174027403740474057406740774087409741074117412741374147415741674177418741974207421742274237424742574267427742874297430743174327433743474357436743774387439744074417442744374447445744674477448744974507451745274537454745574567457745874597460746174627463746474657466746774687469747074717472747374747475747674777478747974807481748274837484748574867487748874897490749174927493749474957496749774987499750075017502750375047505750675077508750975107511751275137514751575167517751875197520752175227523752475257526752775287529753075317532753375347535753675377538753975407541754275437544754575467547754875497550755175527553755475557556755775587559756075617562756375647565756675677568756975707571757275737574757575767577757875797580758175827583758475857586758775887589759075917592759375947595759675977598759976007601760276037604760576067607760876097610761176127613761476157616761776187619762076217622762376247625762676277628762976307631763276337634763576367637763876397640764176427643764476457646764776487649765076517652765376547655765676577658765976607661766276637664766576667667766876697670767176727673767476757676767776787679768076817682768376847685768676877688768976907691769276937694769576967697769876997700770177027703770477057706770777087709771077117712771377147715771677177718771977207721772277237724772577267727772877297730773177327733773477357736773777387739774077417742774377447745774677477748774977507751775277537754775577567757775877597760776177627763776477657766776777687769777077717772777377747775777677777778777977807781778277837784778577867787778877897790779177927793779477957796779777987799780078017802780378047805780678077808780978107811781278137814781578167817781878197820782178227823782478257826782778287829783078317832783378347835783678377838783978407841784278437844784578467847784878497850785178527853785478557856785778587859786078617862786378647865786678677868786978707871787278737874787578767877787878797880788178827883788478857886788778887889789078917892789378947895789678977898789979007901790279037904790579067907790879097910791179127913791479157916791779187919792079217922792379247925792679277928792979307931793279337934793579367937793879397940794179427943794479457946794779487949795079517952795379547955795679577958795979607961796279637964796579667967796879697970797179727973797479757976797779787979798079817982798379847985798679877988798979907991799279937994799579967997799879998000800180028003800480058006800780088009801080118012801380148015801680178018801980208021802280238024802580268027802880298030803180328033803480358036803780388039804080418042804380448045804680478048804980508051805280538054805580568057805880598060806180628063806480658066806780688069807080718072807380748075807680778078807980808081808280838084808580868087808880898090809180928093809480958096809780988099810081018102810381048105810681078108810981108111811281138114811581168117811881198120812181228123812481258126812781288129813081318132813381348135813681378138813981408141814281438144814581468147814881498150815181528153815481558156815781588159816081618162816381648165816681678168816981708171817281738174817581768177817881798180818181828183818481858186818781888189819081918192819381948195819681978198819982008201820282038204820582068207820882098210821182128213821482158216821782188219822082218222822382248225822682278228822982308231823282338234823582368237823882398240824182428243824482458246824782488249825082518252825382548255825682578258825982608261826282638264826582668267826882698270827182728273827482758276827782788279828082818282828382848285828682878288828982908291829282938294829582968297829882998300830183028303830483058306830783088309831083118312831383148315831683178318831983208321832283238324832583268327832883298330833183328333833483358336833783388339834083418342834383448345834683478348834983508351835283538354835583568357835883598360836183628363836483658366836783688369837083718372837383748375837683778378837983808381838283838384838583868387838883898390839183928393839483958396839783988399840084018402840384048405840684078408840984108411841284138414841584168417841884198420842184228423842484258426842784288429843084318432843384348435843684378438843984408441844284438444844584468447844884498450845184528453845484558456845784588459846084618462846384648465846684678468846984708471847284738474847584768477847884798480848184828483848484858486848784888489849084918492849384948495849684978498849985008501850285038504850585068507850885098510851185128513851485158516851785188519852085218522852385248525852685278528852985308531853285338534853585368537853885398540854185428543854485458546854785488549855085518552855385548555855685578558855985608561856285638564856585668567856885698570857185728573857485758576857785788579858085818582858385848585858685878588858985908591859285938594859585968597859885998600860186028603860486058606860786088609861086118612861386148615861686178618861986208621862286238624862586268627862886298630863186328633863486358636863786388639864086418642864386448645864686478648864986508651865286538654865586568657865886598660866186628663866486658666866786688669867086718672867386748675867686778678867986808681868286838684868586868687868886898690869186928693869486958696869786988699870087018702870387048705870687078708870987108711871287138714871587168717871887198720872187228723872487258726872787288729873087318732873387348735873687378738873987408741874287438744874587468747874887498750875187528753875487558756875787588759876087618762876387648765876687678768876987708771877287738774877587768777877887798780878187828783878487858786878787888789879087918792879387948795879687978798879988008801880288038804880588068807880888098810881188128813881488158816881788188819882088218822882388248825882688278828882988308831883288338834883588368837883888398840884188428843884488458846884788488849885088518852885388548855885688578858885988608861886288638864886588668867886888698870887188728873887488758876887788788879888088818882888388848885888688878888888988908891889288938894889588968897889888998900890189028903890489058906890789088909891089118912891389148915891689178918891989208921892289238924892589268927892889298930893189328933893489358936893789388939894089418942894389448945894689478948894989508951895289538954895589568957895889598960896189628963896489658966896789688969897089718972897389748975897689778978897989808981898289838984898589868987898889898990899189928993899489958996899789988999900090019002900390049005900690079008900990109011901290139014901590169017901890199020902190229023902490259026902790289029903090319032903390349035903690379038903990409041904290439044904590469047904890499050905190529053905490559056905790589059906090619062906390649065906690679068906990709071907290739074907590769077907890799080908190829083908490859086908790889089909090919092909390949095909690979098909991009101910291039104910591069107910891099110911191129113911491159116911791189119912091219122912391249125912691279128912991309131913291339134913591369137913891399140914191429143914491459146914791489149915091519152915391549155915691579158915991609161916291639164916591669167916891699170917191729173917491759176917791789179918091819182918391849185918691879188918991909191919291939194919591969197919891999200920192029203920492059206920792089209921092119212921392149215921692179218921992209221922292239224922592269227922892299230923192329233923492359236923792389239924092419242924392449245924692479248924992509251925292539254925592569257925892599260926192629263926492659266926792689269927092719272927392749275927692779278927992809281928292839284928592869287928892899290929192929293929492959296929792989299930093019302930393049305930693079308930993109311931293139314931593169317931893199320932193229323932493259326932793289329933093319332933393349335933693379338933993409341934293439344934593469347934893499350935193529353935493559356935793589359936093619362936393649365936693679368936993709371937293739374937593769377937893799380938193829383938493859386938793889389939093919392939393949395939693979398939994009401940294039404940594069407940894099410941194129413941494159416941794189419942094219422942394249425942694279428942994309431943294339434943594369437943894399440944194429443944494459446944794489449945094519452945394549455945694579458945994609461946294639464946594669467946894699470947194729473947494759476947794789479948094819482948394849485948694879488948994909491949294939494949594969497949894999500950195029503950495059506950795089509951095119512951395149515951695179518951995209521952295239524952595269527952895299530953195329533953495359536953795389539954095419542954395449545954695479548954995509551955295539554955595569557955895599560956195629563956495659566956795689569957095719572957395749575957695779578957995809581958295839584958595869587958895899590959195929593959495959596959795989599960096019602960396049605960696079608960996109611961296139614961596169617961896199620962196229623962496259626962796289629963096319632963396349635963696379638963996409641964296439644964596469647964896499650965196529653965496559656965796589659966096619662966396649665966696679668966996709671967296739674967596769677967896799680968196829683968496859686968796889689969096919692969396949695969696979698969997009701970297039704970597069707970897099710971197129713971497159716971797189719972097219722972397249725972697279728972997309731973297339734973597369737973897399740974197429743974497459746974797489749975097519752975397549755975697579758975997609761976297639764976597669767976897699770977197729773977497759776977797789779978097819782978397849785978697879788978997909791979297939794979597969797979897999800980198029803980498059806980798089809981098119812981398149815981698179818981998209821982298239824982598269827982898299830983198329833983498359836983798389839984098419842984398449845984698479848984998509851985298539854985598569857985898599860986198629863986498659866986798689869987098719872987398749875987698779878987998809881988298839884988598869887988898899890989198929893989498959896989798989899990099019902990399049905990699079908990999109911991299139914991599169917991899199920992199229923992499259926992799289929993099319932993399349935993699379938993999409941994299439944994599469947994899499950995199529953995499559956995799589959996099619962996399649965996699679968996999709971997299739974997599769977997899799980998199829983998499859986998799889989999099919992999399949995999699979998999910000100011000210003100041000510006100071000810009100101001110012100131001410015100161001710018100191002010021100221002310024100251002610027100281002910030100311003210033100341003510036100371003810039100401004110042100431004410045100461004710048100491005010051100521005310054100551005610057100581005910060100611006210063100641006510066100671006810069100701007110072100731007410075100761007710078100791008010081100821008310084100851008610087100881008910090100911009210093100941009510096100971009810099101001010110102101031010410105101061010710108101091011010111101121011310114101151011610117101181011910120101211012210123101241012510126101271012810129101301013110132101331013410135101361013710138101391014010141101421014310144101451014610147101481014910150101511015210153101541015510156101571015810159101601016110162101631016410165101661016710168101691017010171101721017310174101751017610177101781017910180101811018210183101841018510186101871018810189101901019110192101931019410195101961019710198101991020010201102021020310204102051020610207102081020910210102111021210213102141021510216102171021810219102201022110222102231022410225102261022710228102291023010231102321023310234102351023610237102381023910240102411024210243102441024510246102471024810249102501025110252102531025410255102561025710258102591026010261102621026310264102651026610267102681026910270102711027210273102741027510276102771027810279102801028110282102831028410285102861028710288102891029010291102921029310294102951029610297102981029910300103011030210303103041030510306103071030810309103101031110312103131031410315103161031710318103191032010321103221032310324103251032610327103281032910330103311033210333103341033510336103371033810339103401034110342103431034410345103461034710348103491035010351103521035310354103551035610357103581035910360103611036210363103641036510366103671036810369103701037110372103731037410375103761037710378103791038010381103821038310384103851038610387103881038910390103911039210393103941039510396103971039810399104001040110402104031040410405104061040710408104091041010411104121041310414104151041610417104181041910420104211042210423104241042510426104271042810429104301043110432104331043410435104361043710438104391044010441104421044310444104451044610447104481044910450104511045210453104541045510456104571045810459104601046110462104631046410465104661046710468104691047010471104721047310474104751047610477104781047910480104811048210483104841048510486104871048810489104901049110492104931049410495104961049710498104991050010501105021050310504105051050610507105081050910510105111051210513105141051510516105171051810519105201052110522105231052410525105261052710528105291053010531105321053310534105351053610537105381053910540105411054210543105441054510546105471054810549105501055110552105531055410555105561055710558105591056010561105621056310564105651056610567105681056910570105711057210573105741057510576105771057810579105801058110582105831058410585105861058710588105891059010591105921059310594105951059610597105981059910600106011060210603106041060510606106071060810609106101061110612106131061410615106161061710618106191062010621106221062310624106251062610627106281062910630106311063210633106341063510636106371063810639106401064110642106431064410645106461064710648106491065010651106521065310654106551065610657106581065910660106611066210663106641066510666106671066810669106701067110672106731067410675106761067710678106791068010681106821068310684106851068610687106881068910690106911069210693106941069510696106971069810699107001070110702107031070410705107061070710708107091071010711107121071310714107151071610717107181071910720107211072210723107241072510726107271072810729107301073110732107331073410735107361073710738107391074010741107421074310744107451074610747107481074910750107511075210753107541075510756107571075810759107601076110762107631076410765107661076710768107691077010771107721077310774107751077610777107781077910780
  1. // SoftEther VPN Source Code
  2. // Cedar Communication Module
  3. //
  4. // SoftEther VPN Server, Client and Bridge are free software under GPLv2.
  5. //
  6. // Copyright (c) 2012-2014 Daiyuu Nobori.
  7. // Copyright (c) 2012-2014 SoftEther VPN Project, University of Tsukuba, Japan.
  8. // Copyright (c) 2012-2014 SoftEther Corporation.
  9. //
  10. // All Rights Reserved.
  11. //
  12. // http://www.softether.org/
  13. //
  14. // Author: Daiyuu Nobori
  15. // Comments: Tetsuo Sugiyama, Ph.D.
  16. //
  17. // This program is free software; you can redistribute it and/or
  18. // modify it under the terms of the GNU General Public License
  19. // version 2 as published by the Free Software Foundation.
  20. //
  21. // This program is distributed in the hope that it will be useful,
  22. // but WITHOUT ANY WARRANTY; without even the implied warranty of
  23. // MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  24. // GNU General Public License for more details.
  25. //
  26. // You should have received a copy of the GNU General Public License version 2
  27. // along with this program; if not, write to the Free Software
  28. // Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
  29. //
  30. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
  31. // EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
  32. // MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
  33. // IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
  34. // CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
  35. // TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
  36. // SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
  37. //
  38. // THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
  39. // AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
  40. //
  41. //
  42. // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
  43. // UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
  44. // MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
  45. // SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
  46. // SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
  47. // CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
  48. // DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
  49. // MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
  50. // SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
  51. // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
  52. // EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
  53. // JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
  54. // AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
  55. // THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
  56. //
  57. // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
  58. // YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
  59. // CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
  60. // SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
  61. // SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
  62. // COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
  63. // PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
  64. // CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
  65. // NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
  66. // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
  67. // COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
  68. // WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
  69. // COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
  70. // COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
  71. // SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
  72. // COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
  73. // RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
  74. // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
  75. // JUST A STATEMENT FOR WARNING AND DISCLAIMER.
  76. //
  77. //
  78. // SOURCE CODE CONTRIBUTION
  79. // ------------------------
  80. //
  81. // Your contribution to SoftEther VPN Project is much appreciated.
  82. // Please send patches to us through GitHub.
  83. // Read the SoftEther VPN Patch Acceptance Policy in advance:
  84. // http://www.softether.org/5-download/src/9.patch
  85. //
  86. //
  87. // DEAR SECURITY EXPERTS
  88. // ---------------------
  89. //
  90. // If you find a bug or a security vulnerability please kindly inform us
  91. // about the problem immediately so that we can fix the security problem
  92. // to protect a lot of users around the world as soon as possible.
  93. //
  94. // Our e-mail address for security reports is:
  95. // softether-vpn-security [at] softether.org
  96. //
  97. // Please note that the above e-mail address is not a technical support
  98. // inquiry address. If you need technical assistance, please visit
  99. // http://www.softether.org/ and ask your question on the users forum.
  100. //
  101. // Thank you for your cooperation.
  102. //
  103. //
  104. // NO MEMORY OR RESOURCE LEAKS
  105. // ---------------------------
  106. //
  107. // The memory-leaks and resource-leaks verification under the stress
  108. // test has been passed before release this source code.
  109. // Server.c
  110. // VPN Server module
  111. #include "CedarPch.h"
  112. static SERVER *server = NULL;
  113. static LOCK *server_lock = NULL;
  114. char *SERVER_CONFIG_FILE_NAME = "@vpn_server.config";
  115. char *SERVER_CONFIG_FILE_NAME_IN_CLIENT = "@vpn_gate_svc.config";
  116. char *BRIDGE_CONFIG_FILE_NAME = "@vpn_bridge.config";
  117. static bool server_reset_setting = false;
  118. static volatile UINT global_server_flags[NUM_GLOBAL_SERVER_FLAGS] = {0};
  119. // Set the OpenVPN and SSTP setting
  120. void SiSetOpenVPNAndSSTPConfig(SERVER *s, OPENVPN_SSTP_CONFIG *c)
  121. {
  122. // Validate arguments
  123. if (s == NULL || c == NULL)
  124. {
  125. return;
  126. }
  127. Lock(s->OpenVpnSstpConfigLock);
  128. {
  129. // Save the settings
  130. if (s->Cedar->Bridge || s->ServerType != SERVER_TYPE_STANDALONE)
  131. {
  132. s->DisableSSTPServer = true;
  133. s->DisableOpenVPNServer = true;
  134. }
  135. else
  136. {
  137. s->DisableSSTPServer = !c->EnableSSTP;
  138. s->DisableOpenVPNServer = !c->EnableOpenVPN;
  139. }
  140. NormalizeIntListStr(s->OpenVpnServerUdpPorts, sizeof(s->OpenVpnServerUdpPorts),
  141. c->OpenVPNPortList, true, ", ");
  142. // Apply the OpenVPN configuration
  143. if (s->OpenVpnServerUdp != NULL)
  144. {
  145. if (s->DisableOpenVPNServer)
  146. {
  147. OvsApplyUdpPortList(s->OpenVpnServerUdp, "");
  148. }
  149. else
  150. {
  151. OvsApplyUdpPortList(s->OpenVpnServerUdp, s->OpenVpnServerUdpPorts);
  152. }
  153. }
  154. }
  155. Unlock(s->OpenVpnSstpConfigLock);
  156. }
  157. // Get the OpenVPN and SSTP setting
  158. void SiGetOpenVPNAndSSTPConfig(SERVER *s, OPENVPN_SSTP_CONFIG *c)
  159. {
  160. // Validate arguments
  161. if (s == NULL || c == NULL)
  162. {
  163. return;
  164. }
  165. Zero(c, sizeof(OPENVPN_SSTP_CONFIG));
  166. Lock(s->OpenVpnSstpConfigLock);
  167. {
  168. if (s->DisableOpenVPNServer == false)
  169. {
  170. c->EnableOpenVPN = true;
  171. }
  172. if (s->DisableSSTPServer == false)
  173. {
  174. c->EnableSSTP = true;
  175. }
  176. StrCpy(c->OpenVPNPortList, sizeof(c->OpenVPNPortList), s->OpenVpnServerUdpPorts);
  177. }
  178. Unlock(s->OpenVpnSstpConfigLock);
  179. }
  180. // Get whether the number of user objects that are registered in the VPN Server is too many
  181. bool SiTooManyUserObjectsInServer(SERVER *s, bool oneMore)
  182. {
  183. return false;
  184. }
  185. // Get the number of user objects that are registered in the VPN Server
  186. UINT SiGetServerNumUserObjects(SERVER *s)
  187. {
  188. CEDAR *c;
  189. UINT ret = 0;
  190. // Validate arguments
  191. if (s == NULL)
  192. {
  193. return 0;
  194. }
  195. c = s->Cedar;
  196. LockList(c->HubList);
  197. {
  198. UINT i;
  199. for (i = 0;i < LIST_NUM(c->HubList);i++)
  200. {
  201. HUB *h = LIST_DATA(c->HubList, i);
  202. if (h->HubDb != NULL)
  203. {
  204. ret += LIST_NUM(h->HubDb->UserList);
  205. }
  206. }
  207. }
  208. UnlockList(c->HubList);
  209. return ret;
  210. }
  211. typedef struct SI_DEBUG_PROC_LIST
  212. {
  213. UINT Id;
  214. char *Description;
  215. char *Args;
  216. SI_DEBUG_PROC *Proc;
  217. } SI_DEBUG_PROC_LIST;
  218. // Debugging function
  219. UINT SiDebug(SERVER *s, RPC_TEST *ret, UINT i, char *str)
  220. {
  221. SI_DEBUG_PROC_LIST proc_list[] =
  222. {
  223. {1, "Hello World", "<test string>", SiDebugProcHelloWorld},
  224. {2, "Terminate process now", "", SiDebugProcExit},
  225. {3, "Write memory dumpfile", "", SiDebugProcDump},
  226. {4, "Restore process priority", "", SiDebugProcRestorePriority},
  227. {5, "Set the process priority high", "", SiDebugProcSetHighPriority},
  228. {6, "Get the .exe filename of the process", "", SiDebugProcGetExeFileName},
  229. {7, "Crash the process", "", SiDebugProcCrash},
  230. {8, "Get IPsecMessageDisplayed Flag", "", SiDebugProcGetIPsecMessageDisplayedValue},
  231. {9, "Set IPsecMessageDisplayed Flag", "", SiDebugProcSetIPsecMessageDisplayedValue},
  232. {10, "Get VgsMessageDisplayed Flag", "", SiDebugProcGetVgsMessageDisplayedValue},
  233. {11, "Set VgsMessageDisplayed Flag", "", SiDebugProcSetVgsMessageDisplayedValue},
  234. };
  235. UINT num_proc_list = sizeof(proc_list) / sizeof(proc_list[0]);
  236. UINT j;
  237. UINT ret_value = ERR_NO_ERROR;
  238. // Validate arguments
  239. if (s == NULL || ret == NULL)
  240. {
  241. return ERR_INVALID_PARAMETER;
  242. }
  243. if (i == 0)
  244. {
  245. char tmp[MAX_SIZE];
  246. Zero(ret, sizeof(RPC_TEST));
  247. StrCat(ret->StrValue, sizeof(ret->StrValue),
  248. "\n--- Debug Functions List --\n");
  249. for (j = 0;j < num_proc_list;j++)
  250. {
  251. SI_DEBUG_PROC_LIST *p = &proc_list[j];
  252. if (IsEmptyStr(p->Args) == false)
  253. {
  254. Format(tmp, sizeof(tmp),
  255. " %u: %s - Usage: %u /ARG:\"%s\"\n",
  256. p->Id, p->Description, p->Id, p->Args);
  257. }
  258. else
  259. {
  260. Format(tmp, sizeof(tmp),
  261. " %u: %s - Usage: %u\n",
  262. p->Id, p->Description, p->Id);
  263. }
  264. StrCat(ret->StrValue, sizeof(ret->StrValue), tmp);
  265. }
  266. }
  267. else
  268. {
  269. ret_value = ERR_NOT_SUPPORTED;
  270. for (j = 0;j < num_proc_list;j++)
  271. {
  272. SI_DEBUG_PROC_LIST *p = &proc_list[j];
  273. if (p->Id == i)
  274. {
  275. ret_value = p->Proc(s, str, ret->StrValue, sizeof(ret->StrValue));
  276. if (ret_value == ERR_NO_ERROR && IsEmptyStr(ret->StrValue))
  277. {
  278. StrCpy(ret->StrValue, sizeof(ret->StrValue), "Ok.");
  279. }
  280. break;
  281. }
  282. }
  283. }
  284. return ret_value;
  285. }
  286. UINT SiDebugProcHelloWorld(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  287. {
  288. // Validate arguments
  289. if (s == NULL || in_str == NULL || ret_str == NULL)
  290. {
  291. return ERR_INVALID_PARAMETER;
  292. }
  293. Format(ret_str, ret_str_size, "Hello World %s\n", in_str);
  294. return ERR_NO_ERROR;
  295. }
  296. UINT SiDebugProcExit(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  297. {
  298. // Validate arguments
  299. if (s == NULL || in_str == NULL || ret_str == NULL)
  300. {
  301. return ERR_INVALID_PARAMETER;
  302. }
  303. _exit(1);
  304. return ERR_NO_ERROR;
  305. }
  306. UINT SiDebugProcDump(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  307. {
  308. // Validate arguments
  309. if (s == NULL || in_str == NULL || ret_str == NULL)
  310. {
  311. return ERR_INVALID_PARAMETER;
  312. }
  313. #ifdef OS_WIN32
  314. MsWriteMinidump(NULL, NULL);
  315. #else // OS_WIN32
  316. return ERR_NOT_SUPPORTED;
  317. #endif // OS_WIN32
  318. return ERR_NO_ERROR;
  319. }
  320. UINT SiDebugProcRestorePriority(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  321. {
  322. // Validate arguments
  323. if (s == NULL || in_str == NULL || ret_str == NULL)
  324. {
  325. return ERR_INVALID_PARAMETER;
  326. }
  327. OSRestorePriority();
  328. return ERR_NO_ERROR;
  329. }
  330. UINT SiDebugProcSetHighPriority(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  331. {
  332. // Validate arguments
  333. if (s == NULL || in_str == NULL || ret_str == NULL)
  334. {
  335. return ERR_INVALID_PARAMETER;
  336. }
  337. OSSetHighPriority();
  338. return ERR_NO_ERROR;
  339. }
  340. UINT SiDebugProcGetExeFileName(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  341. {
  342. // Validate arguments
  343. if (s == NULL || in_str == NULL || ret_str == NULL)
  344. {
  345. return ERR_INVALID_PARAMETER;
  346. }
  347. GetExeName(ret_str, ret_str_size);
  348. return ERR_NO_ERROR;
  349. }
  350. UINT SiDebugProcCrash(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  351. {
  352. // Validate arguments
  353. if (s == NULL || in_str == NULL || ret_str == NULL)
  354. {
  355. return ERR_INVALID_PARAMETER;
  356. }
  357. CrashNow();
  358. return ERR_NO_ERROR;
  359. }
  360. UINT SiDebugProcGetIPsecMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  361. {
  362. // Validate arguments
  363. if (s == NULL || in_str == NULL || ret_str == NULL)
  364. {
  365. return ERR_INVALID_PARAMETER;
  366. }
  367. ToStr(ret_str, s->IPsecMessageDisplayed);
  368. return ERR_NO_ERROR;
  369. }
  370. UINT SiDebugProcSetIPsecMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  371. {
  372. // Validate arguments
  373. if (s == NULL || in_str == NULL || ret_str == NULL)
  374. {
  375. return ERR_INVALID_PARAMETER;
  376. }
  377. s->IPsecMessageDisplayed = ToInt(in_str);
  378. return ERR_NO_ERROR;
  379. }
  380. UINT SiDebugProcGetVgsMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  381. {
  382. // Validate arguments
  383. if (s == NULL || in_str == NULL || ret_str == NULL)
  384. {
  385. return ERR_INVALID_PARAMETER;
  386. }
  387. #if 0
  388. if (VgDoNotPopupMessage() == false)
  389. {
  390. ToStr(ret_str, s->VgsMessageDisplayed);
  391. }
  392. else
  393. {
  394. ToStr(ret_str, 1);
  395. }
  396. #else
  397. // Do not show the VGS message in VPN Server of the current version
  398. ToStr(ret_str, 1);
  399. #endif
  400. return ERR_NO_ERROR;
  401. }
  402. UINT SiDebugProcSetVgsMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size)
  403. {
  404. // Validate arguments
  405. if (s == NULL || in_str == NULL || ret_str == NULL)
  406. {
  407. return ERR_INVALID_PARAMETER;
  408. }
  409. return ERR_NO_ERROR;
  410. }
  411. // Write the debug log
  412. void SiDebugLog(SERVER *s, char *msg)
  413. {
  414. // Validate arguments
  415. if (s == NULL || msg == NULL)
  416. {
  417. return;
  418. }
  419. if (s->DebugLog != NULL)
  420. {
  421. WriteTinyLog(s->DebugLog, msg);
  422. }
  423. }
  424. // Deadlock inspection main
  425. void SiCheckDeadLockMain(SERVER *s, UINT timeout)
  426. {
  427. CEDAR *cedar;
  428. // Validate arguments
  429. if (s == NULL)
  430. {
  431. return;
  432. }
  433. //Debug("SiCheckDeadLockMain Start.\n");
  434. cedar = s->Cedar;
  435. if (s->ServerListenerList != NULL)
  436. {
  437. CheckDeadLock(s->ServerListenerList->lock, timeout, "s->ServerListenerList->lock");
  438. }
  439. CheckDeadLock(s->lock, timeout, "s->lock");
  440. if (s->FarmMemberList != NULL)
  441. {
  442. CheckDeadLock(s->FarmMemberList->lock, timeout, "s->FarmMemberList->lock");
  443. }
  444. if (s->HubCreateHistoryList != NULL)
  445. {
  446. CheckDeadLock(s->HubCreateHistoryList->lock, timeout, "s->HubCreateHistoryList->lock");
  447. }
  448. CheckDeadLock(s->CapsCacheLock, timeout, "s->CapsCacheLock");
  449. CheckDeadLock(s->TasksFromFarmControllerLock, timeout, "s->TasksFromFarmControllerLock");
  450. if (cedar != NULL)
  451. {
  452. if (cedar->HubList != NULL)
  453. {
  454. CheckDeadLock(cedar->HubList->lock, timeout, "cedar->HubList->lock");
  455. }
  456. if (cedar->ListenerList != NULL)
  457. {
  458. UINT i;
  459. LIST *o = NewListFast(NULL);
  460. CheckDeadLock(cedar->ListenerList->lock, timeout, "cedar->ListenerList->lock");
  461. LockList(cedar->ListenerList);
  462. {
  463. for (i = 0;i < LIST_NUM(cedar->ListenerList);i++)
  464. {
  465. LISTENER *r = LIST_DATA(cedar->ListenerList, i);
  466. AddRef(r->ref);
  467. Add(o, r);
  468. }
  469. }
  470. UnlockList(cedar->ListenerList);
  471. for (i = 0;i < LIST_NUM(o);i++)
  472. {
  473. LISTENER *r = LIST_DATA(o, i);
  474. ReleaseListener(r);
  475. }
  476. ReleaseList(o);
  477. }
  478. if (cedar->ConnectionList != NULL)
  479. {
  480. CheckDeadLock(cedar->ConnectionList->lock, timeout, "cedar->ConnectionList->lock");
  481. }
  482. if (cedar->CaList != NULL)
  483. {
  484. CheckDeadLock(cedar->CaList->lock, timeout, "cedar->CaList->lock");
  485. }
  486. if (cedar->TrafficLock != NULL)
  487. {
  488. CheckDeadLock(cedar->TrafficLock, timeout, "cedar->TrafficLock");
  489. }
  490. if (cedar->TrafficDiffList != NULL)
  491. {
  492. CheckDeadLock(cedar->TrafficDiffList->lock, timeout, "cedar->TrafficDiffList->lock");
  493. }
  494. if (cedar->LocalBridgeList != NULL)
  495. {
  496. CheckDeadLock(cedar->LocalBridgeList->lock, timeout, "cedar->LocalBridgeList->lock");
  497. }
  498. if (cedar->L3SwList != NULL)
  499. {
  500. CheckDeadLock(cedar->L3SwList->lock, timeout, "cedar->L3SwList->lock");
  501. }
  502. }
  503. //Debug("SiCheckDeadLockMain Finish.\n");
  504. }
  505. // Deadlock check thread
  506. void SiDeadLockCheckThread(THREAD *t, void *param)
  507. {
  508. SERVER *s = (SERVER *)param;
  509. // Validate arguments
  510. if (s == NULL || t == NULL)
  511. {
  512. return;
  513. }
  514. while (true)
  515. {
  516. Wait(s->DeadLockWaitEvent, SERVER_DEADLOCK_CHECK_SPAN);
  517. if (s->HaltDeadLockThread)
  518. {
  519. break;
  520. }
  521. SiCheckDeadLockMain(s, SERVER_DEADLOCK_CHECK_TIMEOUT);
  522. }
  523. }
  524. // Initialize the deadlock check
  525. void SiInitDeadLockCheck(SERVER *s)
  526. {
  527. // Validate arguments
  528. if (s == NULL)
  529. {
  530. return;
  531. }
  532. if (s->DisableDeadLockCheck)
  533. {
  534. return;
  535. }
  536. s->HaltDeadLockThread = false;
  537. s->DeadLockWaitEvent = NewEvent();
  538. s->DeadLockCheckThread = NewThread(SiDeadLockCheckThread, s);
  539. }
  540. // Release the deadlock check
  541. void SiFreeDeadLockCheck(SERVER *s)
  542. {
  543. // Validate arguments
  544. if (s == NULL)
  545. {
  546. return;
  547. }
  548. if (s->DeadLockCheckThread == NULL)
  549. {
  550. return;
  551. }
  552. s->HaltDeadLockThread = true;
  553. Set(s->DeadLockWaitEvent);
  554. WaitThread(s->DeadLockCheckThread, INFINITE);
  555. ReleaseThread(s->DeadLockCheckThread);
  556. s->DeadLockCheckThread = NULL;
  557. ReleaseEvent(s->DeadLockWaitEvent);
  558. s->DeadLockWaitEvent = NULL;
  559. s->HaltDeadLockThread = false;
  560. }
  561. // Check whether the specified virtual HUB has been registered to creation history
  562. bool SiIsHubRegistedOnCreateHistory(SERVER *s, char *name)
  563. {
  564. UINT i;
  565. bool ret = false;
  566. // Validate arguments
  567. if (s == NULL || name == NULL)
  568. {
  569. return false;
  570. }
  571. SiDeleteOldHubCreateHistory(s);
  572. LockList(s->HubCreateHistoryList);
  573. {
  574. for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
  575. {
  576. SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
  577. if (StrCmpi(h->HubName, name) == 0)
  578. {
  579. ret = true;
  580. break;
  581. }
  582. }
  583. }
  584. UnlockList(s->HubCreateHistoryList);
  585. return ret;
  586. }
  587. // Delete the Virtual HUB creation history
  588. void SiDelHubCreateHistory(SERVER *s, char *name)
  589. {
  590. UINT i;
  591. // Validate arguments
  592. if (s == NULL || name == NULL)
  593. {
  594. return;
  595. }
  596. LockList(s->HubCreateHistoryList);
  597. {
  598. SERVER_HUB_CREATE_HISTORY *hh = NULL;
  599. for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
  600. {
  601. SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
  602. if (StrCmpi(h->HubName, name) == 0)
  603. {
  604. Delete(s->HubCreateHistoryList, h);
  605. Free(h);
  606. break;
  607. }
  608. }
  609. }
  610. UnlockList(s->HubCreateHistoryList);
  611. SiDeleteOldHubCreateHistory(s);
  612. }
  613. // Register to the Virtual HUB creation history
  614. void SiAddHubCreateHistory(SERVER *s, char *name)
  615. {
  616. UINT i;
  617. // Validate arguments
  618. if (s == NULL || name == NULL)
  619. {
  620. return;
  621. }
  622. LockList(s->HubCreateHistoryList);
  623. {
  624. SERVER_HUB_CREATE_HISTORY *hh = NULL;
  625. for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
  626. {
  627. SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
  628. if (StrCmpi(h->HubName, name) == 0)
  629. {
  630. hh = h;
  631. break;
  632. }
  633. }
  634. if (hh == NULL)
  635. {
  636. hh = ZeroMalloc(sizeof(SERVER_HUB_CREATE_HISTORY));
  637. StrCpy(hh->HubName, sizeof(hh->HubName), name);
  638. Add(s->HubCreateHistoryList, hh);
  639. }
  640. hh->CreatedTime = Tick64();
  641. }
  642. UnlockList(s->HubCreateHistoryList);
  643. SiDeleteOldHubCreateHistory(s);
  644. }
  645. // Delete outdated Virtual HUB creation histories
  646. void SiDeleteOldHubCreateHistory(SERVER *s)
  647. {
  648. UINT i;
  649. LIST *o;
  650. // Validate arguments
  651. if (s == NULL)
  652. {
  653. return;
  654. }
  655. LockList(s->HubCreateHistoryList);
  656. {
  657. o = NewListFast(NULL);
  658. for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
  659. {
  660. SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
  661. if ((h->CreatedTime + ((UINT64)TICKET_EXPIRES)) <= Tick64())
  662. {
  663. // Expired
  664. Add(o, h);
  665. }
  666. }
  667. for (i = 0;i < LIST_NUM(o);i++)
  668. {
  669. SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(o, i);
  670. Delete(s->HubCreateHistoryList, h);
  671. Free(h);
  672. }
  673. ReleaseList(o);
  674. }
  675. UnlockList(s->HubCreateHistoryList);
  676. }
  677. // Initialize the Virtual HUB creation history
  678. void SiInitHubCreateHistory(SERVER *s)
  679. {
  680. // Validate arguments
  681. if (s == NULL)
  682. {
  683. return;
  684. }
  685. s->HubCreateHistoryList = NewList(NULL);
  686. }
  687. // Release the Virtual HUB creation history
  688. void SiFreeHubCreateHistory(SERVER *s)
  689. {
  690. UINT i;
  691. // Validate arguments
  692. if (s == NULL)
  693. {
  694. return;
  695. }
  696. for (i = 0;i < LIST_NUM(s->HubCreateHistoryList);i++)
  697. {
  698. SERVER_HUB_CREATE_HISTORY *h = LIST_DATA(s->HubCreateHistoryList, i);
  699. Free(h);
  700. }
  701. ReleaseList(s->HubCreateHistoryList);
  702. s->HubCreateHistoryList = NULL;
  703. }
  704. // Identify whether the server can be connected from the VPN Client that is
  705. // created by the installer creating kit of Admin Pack
  706. bool IsAdminPackSupportedServerProduct(char *name)
  707. {
  708. return true;
  709. }
  710. // Get the saving status of syslog
  711. UINT SiGetSysLogSaveStatus(SERVER *s)
  712. {
  713. SYSLOG_SETTING set;
  714. // Validate arguments
  715. if (s == NULL)
  716. {
  717. return SYSLOG_NONE;
  718. }
  719. SiGetSysLogSetting(s, &set);
  720. return set.SaveType;
  721. }
  722. // Send a syslog
  723. void SiWriteSysLog(SERVER *s, char *typestr, char *hubname, wchar_t *message)
  724. {
  725. wchar_t tmp[1024];
  726. char machinename[MAX_HOST_NAME_LEN + 1];
  727. char datetime[MAX_PATH];
  728. SYSTEMTIME st;
  729. // Validate arguments
  730. if (s == NULL || typestr == NULL || message == NULL)
  731. {
  732. return;
  733. }
  734. if (GetGlobalServerFlag(GSF_DISABLE_SYSLOG) != 0)
  735. {
  736. return;
  737. }
  738. // Host name
  739. GetMachineName(machinename, sizeof(machinename));
  740. // Date and time
  741. LocalTime(&st);
  742. GetDateTimeStrMilli(datetime, sizeof(datetime), &st);
  743. if (IsEmptyStr(hubname) == false)
  744. {
  745. UniFormat(tmp, sizeof(tmp), L"[%S/VPN/%S] (%S) <%S>: %s",
  746. machinename, hubname, datetime, typestr, message);
  747. }
  748. else
  749. {
  750. UniFormat(tmp, sizeof(tmp), L"[%S/VPN] (%S) <%S>: %s",
  751. machinename, datetime, typestr, message);
  752. }
  753. SendSysLog(s->Syslog, tmp);
  754. }
  755. // Write the syslog configuration
  756. void SiSetSysLogSetting(SERVER *s, SYSLOG_SETTING *setting)
  757. {
  758. SYSLOG_SETTING set;
  759. // Validate arguments
  760. if (s == NULL || setting == NULL)
  761. {
  762. return;
  763. }
  764. Zero(&set, sizeof(set));
  765. Copy(&set, setting, sizeof(SYSLOG_SETTING));
  766. if (IsEmptyStr(set.Hostname) || set.Port == 0)
  767. {
  768. set.SaveType = SYSLOG_NONE;
  769. }
  770. Lock(s->SyslogLock);
  771. {
  772. Copy(&s->SyslogSetting, &set, sizeof(SYSLOG_SETTING));
  773. SetSysLog(s->Syslog, set.Hostname, set.Port);
  774. }
  775. Unlock(s->SyslogLock);
  776. }
  777. // Read the syslog configuration
  778. void SiGetSysLogSetting(SERVER *s, SYSLOG_SETTING *setting)
  779. {
  780. // Validate arguments
  781. if (s == NULL || setting == NULL)
  782. {
  783. return;
  784. }
  785. //Lock(s->SyslogLock);
  786. {
  787. Copy(setting, &s->SyslogSetting, sizeof(SYSLOG_SETTING));
  788. }
  789. //Unlock(s->SyslogLock);
  790. }
  791. // Get the server product name
  792. void GetServerProductName(SERVER *s, char *name, UINT size)
  793. {
  794. char *cpu;
  795. // Validate arguments
  796. if (s == NULL || name == NULL)
  797. {
  798. return;
  799. }
  800. GetServerProductNameInternal(s, name, size);
  801. #ifdef CPU_64
  802. cpu = " (64 bit)";
  803. #else // CPU_64
  804. cpu = " (32 bit)";
  805. #endif // CPU_64
  806. StrCat(name, size, cpu);
  807. StrCat(name, size, " (Open Source)");
  808. }
  809. void GetServerProductNameInternal(SERVER *s, char *name, UINT size)
  810. {
  811. // Validate arguments
  812. if (s == NULL || name == NULL)
  813. {
  814. return;
  815. }
  816. #ifdef BETA_NUMBER
  817. if (s->Cedar->Bridge)
  818. {
  819. StrCpy(name, size, CEDAR_BRIDGE_STR);
  820. }
  821. else
  822. {
  823. StrCpy(name, size, CEDAR_BETA_SERVER);
  824. }
  825. return;
  826. #else // BETA_NUMBER
  827. if (s->Cedar->Bridge)
  828. {
  829. StrCpy(name, size, CEDAR_BRIDGE_STR);
  830. }
  831. else
  832. {
  833. StrCpy(name, size, CEDAR_SERVER_STR);
  834. }
  835. #endif // BETA_NUMBER
  836. }
  837. // Adjoin the enumerations of log files
  838. void AdjoinEnumLogFile(LIST *o, LIST *src)
  839. {
  840. UINT i;
  841. // Validate arguments
  842. if (o == NULL || src == NULL)
  843. {
  844. return;
  845. }
  846. for (i = 0;i < LIST_NUM(src);i++)
  847. {
  848. LOG_FILE *f = LIST_DATA(src, i);
  849. Insert(o, Clone(f, sizeof(LOG_FILE)));
  850. }
  851. }
  852. // Check whether the log file with the specified name is contained in the enumerated list
  853. bool CheckLogFileNameFromEnumList(LIST *o, char *name, char *server_name)
  854. {
  855. LOG_FILE t;
  856. // Validate arguments
  857. if (o == NULL || name == NULL || server_name == NULL)
  858. {
  859. return false;
  860. }
  861. Zero(&t, sizeof(t));
  862. StrCpy(t.Path, sizeof(t.Path), name);
  863. StrCpy(t.ServerName, sizeof(t.ServerName), server_name);
  864. if (Search(o, &t) == NULL)
  865. {
  866. return false;
  867. }
  868. return true;
  869. }
  870. // Release the log file enumeration
  871. void FreeEnumLogFile(LIST *o)
  872. {
  873. UINT i;
  874. // Validate arguments
  875. if (o == NULL)
  876. {
  877. return;
  878. }
  879. for (i = 0;i < LIST_NUM(o);i++)
  880. {
  881. LOG_FILE *f = LIST_DATA(o, i);
  882. Free(f);
  883. }
  884. ReleaseList(o);
  885. }
  886. // Enumerate the log files associated with the virtual HUB (All logs are listed in the case of server administrator)
  887. LIST *EnumLogFile(char *hubname)
  888. {
  889. char exe_dir[MAX_PATH];
  890. char tmp[MAX_PATH];
  891. LIST *o = NewListFast(CmpLogFile);
  892. DIRLIST *dir;
  893. if (StrLen(hubname) == 0)
  894. {
  895. hubname = NULL;
  896. }
  897. GetExeDir(exe_dir, sizeof(exe_dir));
  898. // Enumerate in the server_log
  899. if (hubname == NULL)
  900. {
  901. EnumLogFileDir(o, "server_log");
  902. }
  903. // Enumerate in the packet_log
  904. Format(tmp, sizeof(tmp), "%s/packet_log", exe_dir);
  905. dir = EnumDir(tmp);
  906. if (dir != NULL)
  907. {
  908. UINT i;
  909. for (i = 0;i < dir->NumFiles;i++)
  910. {
  911. DIRENT *e = dir->File[i];
  912. if (e->Folder)
  913. {
  914. char dir_name[MAX_PATH];
  915. if (hubname == NULL || StrCmpi(hubname, e->FileName) == 0)
  916. {
  917. Format(dir_name, sizeof(dir_name), "packet_log/%s", e->FileName);
  918. EnumLogFileDir(o, dir_name);
  919. }
  920. }
  921. }
  922. FreeDir(dir);
  923. }
  924. // Enumerate in the security_log
  925. Format(tmp, sizeof(tmp), "%s/security_log", exe_dir);
  926. dir = EnumDir(tmp);
  927. if (dir != NULL)
  928. {
  929. UINT i;
  930. for (i = 0;i < dir->NumFiles;i++)
  931. {
  932. DIRENT *e = dir->File[i];
  933. if (e->Folder)
  934. {
  935. char dir_name[MAX_PATH];
  936. if (hubname == NULL || StrCmpi(hubname, e->FileName) == 0)
  937. {
  938. Format(dir_name, sizeof(dir_name), "security_log/%s", e->FileName);
  939. EnumLogFileDir(o, dir_name);
  940. }
  941. }
  942. }
  943. FreeDir(dir);
  944. }
  945. return o;
  946. }
  947. // Enumerate log files in the specified directory
  948. void EnumLogFileDir(LIST *o, char *dirname)
  949. {
  950. UINT i;
  951. char exe_dir[MAX_PATH];
  952. char dir_full_path[MAX_PATH];
  953. DIRLIST *dir;
  954. // Validate arguments
  955. if (o == NULL || dirname == NULL)
  956. {
  957. return;
  958. }
  959. GetExeDir(exe_dir, sizeof(exe_dir));
  960. Format(dir_full_path, sizeof(dir_full_path), "%s/%s", exe_dir, dirname);
  961. dir = EnumDir(dir_full_path);
  962. if (dir == NULL)
  963. {
  964. return;
  965. }
  966. for (i = 0;i < dir->NumFiles;i++)
  967. {
  968. DIRENT *e = dir->File[i];
  969. if (e->Folder == false && e->FileSize > 0)
  970. {
  971. char full_path[MAX_PATH];
  972. char file_path[MAX_PATH];
  973. Format(file_path, sizeof(file_path), "%s/%s", dirname, e->FileName);
  974. Format(full_path, sizeof(full_path), "%s/%s", exe_dir, file_path);
  975. if (EndWith(file_path, ".log"))
  976. {
  977. LOG_FILE *f = ZeroMalloc(sizeof(LOG_FILE));
  978. StrCpy(f->Path, sizeof(f->Path), file_path);
  979. f->FileSize = (UINT)(MIN(e->FileSize, 0xffffffffUL));
  980. f->UpdatedTime = e->UpdateDate;
  981. GetMachineName(f->ServerName, sizeof(f->ServerName));
  982. Insert(o, f);
  983. }
  984. }
  985. }
  986. FreeDir(dir);
  987. }
  988. // Log file list entry comparison
  989. int CmpLogFile(void *p1, void *p2)
  990. {
  991. LOG_FILE *f1, *f2;
  992. UINT i;
  993. if (p1 == NULL || p2 == NULL)
  994. {
  995. return 0;
  996. }
  997. f1 = *(LOG_FILE **)p1;
  998. f2 = *(LOG_FILE **)p2;
  999. if (f1 == NULL || f2 == NULL)
  1000. {
  1001. return 0;
  1002. }
  1003. i = StrCmpi(f1->Path, f2->Path);
  1004. if (i != 0)
  1005. {
  1006. return i;
  1007. }
  1008. return StrCmpi(f1->ServerName, f2->ServerName);
  1009. }
  1010. // Get the Caps of the server
  1011. UINT GetServerCapsInt(SERVER *s, char *name)
  1012. {
  1013. CAPSLIST t;
  1014. UINT ret;
  1015. // Validate arguments
  1016. if (s == NULL || name == NULL)
  1017. {
  1018. return 0;
  1019. }
  1020. Zero(&t, sizeof(t));
  1021. GetServerCaps(s, &t);
  1022. ret = GetCapsInt(&t, name);
  1023. return ret;
  1024. }
  1025. bool GetServerCapsBool(SERVER *s, char *name)
  1026. {
  1027. return (GetServerCapsInt(s, name) == 0) ? false : true;
  1028. }
  1029. // Initialize the Caps cache of the server
  1030. void InitServerCapsCache(SERVER *s)
  1031. {
  1032. // Validate arguments
  1033. if (s == NULL)
  1034. {
  1035. return;
  1036. }
  1037. s->CapsCacheLock = NewLock();
  1038. s->CapsListCache = NULL;
  1039. }
  1040. // Release the Caps cache of the server
  1041. void FreeServerCapsCache(SERVER *s)
  1042. {
  1043. // Validate arguments
  1044. if (s == NULL)
  1045. {
  1046. return;
  1047. }
  1048. if (s->CapsListCache != NULL)
  1049. {
  1050. FreeCapsList(s->CapsListCache);
  1051. s->CapsListCache = NULL;
  1052. }
  1053. DeleteLock(s->CapsCacheLock);
  1054. }
  1055. // Dispose the Caps cache of the server
  1056. void DestroyServerCapsCache(SERVER *s)
  1057. {
  1058. // Validate arguments
  1059. if (s == NULL)
  1060. {
  1061. return;
  1062. }
  1063. Lock(s->CapsCacheLock);
  1064. {
  1065. if (s->CapsListCache != NULL)
  1066. {
  1067. FreeCapsList(s->CapsListCache);
  1068. s->CapsListCache = NULL;
  1069. }
  1070. }
  1071. Unlock(s->CapsCacheLock);
  1072. }
  1073. // Flush the Caps list for this server
  1074. void FlushServerCaps(SERVER *s)
  1075. {
  1076. CAPSLIST t;
  1077. // Validate arguments
  1078. if (s == NULL)
  1079. {
  1080. return;
  1081. }
  1082. DestroyServerCapsCache(s);
  1083. Zero(&t, sizeof(t));
  1084. GetServerCaps(s, &t);
  1085. }
  1086. // Get the Caps list for this server
  1087. void GetServerCaps(SERVER *s, CAPSLIST *t)
  1088. {
  1089. // Validate arguments
  1090. if (s == NULL || t == NULL)
  1091. {
  1092. return;
  1093. }
  1094. Lock(s->CapsCacheLock);
  1095. {
  1096. if (s->CapsListCache == NULL)
  1097. {
  1098. s->CapsListCache = ZeroMalloc(sizeof(CAPSLIST));
  1099. GetServerCapsMain(s, s->CapsListCache);
  1100. }
  1101. Copy(t, s->CapsListCache, sizeof(s->CapsListCache));
  1102. }
  1103. Unlock(s->CapsCacheLock);
  1104. }
  1105. // Update the global server flags
  1106. void UpdateGlobalServerFlags(SERVER *s, CAPSLIST *t)
  1107. {
  1108. bool is_restricted = false;
  1109. // Validate arguments
  1110. if (s == NULL || t == NULL)
  1111. {
  1112. return;
  1113. }
  1114. is_restricted = SiIsEnterpriseFunctionsRestrictedOnOpenSource(s->Cedar);
  1115. SetGlobalServerFlag(GSF_DISABLE_PUSH_ROUTE, is_restricted);
  1116. SetGlobalServerFlag(GSF_DISABLE_RADIUS_AUTH, is_restricted);
  1117. SetGlobalServerFlag(GSF_DISABLE_CERT_AUTH, is_restricted);
  1118. SetGlobalServerFlag(GSF_DISABLE_DEEP_LOGGING, is_restricted);
  1119. SetGlobalServerFlag(GSF_DISABLE_AC, is_restricted);
  1120. SetGlobalServerFlag(GSF_DISABLE_SYSLOG, is_restricted);
  1121. }
  1122. // Set a global server flag
  1123. void SetGlobalServerFlag(UINT index, UINT value)
  1124. {
  1125. // Validate arguments
  1126. if (index >= NUM_GLOBAL_SERVER_FLAGS)
  1127. {
  1128. return;
  1129. }
  1130. global_server_flags[index] = value;
  1131. }
  1132. // Get a global server flag
  1133. UINT GetGlobalServerFlag(UINT index)
  1134. {
  1135. // Validate arguments
  1136. if (index >= NUM_GLOBAL_SERVER_FLAGS)
  1137. {
  1138. return 0;
  1139. }
  1140. return global_server_flags[index];
  1141. }
  1142. // Main of the aquisition of Caps of the server
  1143. void GetServerCapsMain(SERVER *s, CAPSLIST *t)
  1144. {
  1145. bool is_restricted = false;
  1146. // Validate arguments
  1147. if (s == NULL || t == NULL)
  1148. {
  1149. return;
  1150. }
  1151. is_restricted = SiIsEnterpriseFunctionsRestrictedOnOpenSource(s->Cedar);
  1152. // Initialize
  1153. InitCapsList(t);
  1154. // Maximum Ethernet packet size
  1155. AddCapsInt(t, "i_max_packet_size", MAX_PACKET_SIZE);
  1156. if (s->Cedar->Bridge == false)
  1157. {
  1158. UINT max_sessions, max_clients, max_bridges, max_user_creations;
  1159. max_clients = INFINITE;
  1160. max_bridges = INFINITE;
  1161. max_sessions = SERVER_MAX_SESSIONS_FOR_CARRIER_EDITION;
  1162. max_user_creations = INFINITE;
  1163. // Maximum number of virtual HUBs
  1164. AddCapsInt(t, "i_max_hubs", SERVER_MAX_SESSIONS_FOR_CARRIER_EDITION);
  1165. // The maximum number of concurrent sessions
  1166. AddCapsInt(t, "i_max_sessions", max_sessions);
  1167. // Maximum number of creatable users
  1168. AddCapsInt(t, "i_max_user_creation", max_user_creations);
  1169. // Maximum number of clients
  1170. AddCapsInt(t, "i_max_clients", max_clients);
  1171. // Maximum number of bridges
  1172. AddCapsInt(t, "i_max_bridges", max_bridges);
  1173. if (s->ServerType != SERVER_TYPE_FARM_MEMBER)
  1174. {
  1175. // Maximum number of registrable users / Virtual HUB
  1176. AddCapsInt(t, "i_max_users_per_hub", MAX_USERS);
  1177. // Maximum number of registrable groups / Virtual HUB
  1178. AddCapsInt(t, "i_max_groups_per_hub", MAX_GROUPS);
  1179. // Maximum number of registrable access list entries / Virtual HUB
  1180. AddCapsInt(t, "i_max_access_lists", MAX_ACCESSLISTS);
  1181. }
  1182. else
  1183. {
  1184. // Maximum number of registrable users / Virtual HUB
  1185. AddCapsInt(t, "i_max_users_per_hub", 0);
  1186. // Maximum number of registrable groups / Virtual HUB
  1187. AddCapsInt(t, "i_max_groups_per_hub", 0);
  1188. // Maximum number of registrable access list entries / Virtual HUB
  1189. AddCapsInt(t, "i_max_access_lists", 0);
  1190. }
  1191. // The policy related to multiple logins
  1192. AddCapsBool(t, "b_support_limit_multilogin", true);
  1193. // QoS / VoIP
  1194. AddCapsBool(t, "b_support_qos", true);
  1195. // syslog
  1196. AddCapsBool(t, "b_support_syslog", true);
  1197. // IPsec
  1198. // (Only works in stand-alone mode currently)
  1199. AddCapsBool(t, "b_support_ipsec", (s->ServerType == SERVER_TYPE_STANDALONE));
  1200. // SSTP
  1201. // (Only works in stand-alone mode currently)
  1202. AddCapsBool(t, "b_support_sstp", (s->ServerType == SERVER_TYPE_STANDALONE));
  1203. // OpenVPN
  1204. // (Only works in stand-alone mode currently)
  1205. AddCapsBool(t, "b_support_openvpn", (s->ServerType == SERVER_TYPE_STANDALONE));
  1206. // DDNS
  1207. AddCapsBool(t, "b_support_ddns", (s->DDnsClient != NULL));
  1208. if (s->DDnsClient != NULL)
  1209. {
  1210. // DDNS via Proxy
  1211. AddCapsBool(t, "b_support_ddns_proxy", true);
  1212. }
  1213. // VPN over ICMP, VPN over DNS
  1214. AddCapsBool(t, "b_support_special_listener", true);
  1215. }
  1216. else
  1217. {
  1218. // Maximum number of virtual HUBs
  1219. AddCapsInt(t, "i_max_hubs", 0);
  1220. // The maximum number of concurrent sessions
  1221. AddCapsInt(t, "i_max_sessions", 0);
  1222. // Maximum number of clients
  1223. AddCapsInt(t, "i_max_clients", 0);
  1224. // Maximum number of bridges
  1225. AddCapsInt(t, "i_max_bridges", 0);
  1226. // Maximum number of registrable users / Virtual HUB
  1227. AddCapsInt(t, "i_max_users_per_hub", 0);
  1228. // Maximum number of registrable groups / Virtual HUB
  1229. AddCapsInt(t, "i_max_groups_per_hub", 0);
  1230. // Maximum number of registrable access list entries / Virtual HUB
  1231. AddCapsInt(t, "i_max_access_lists", 0);
  1232. // QoS / VoIP
  1233. AddCapsBool(t, "b_support_qos", true);
  1234. // syslog
  1235. AddCapsBool(t, "b_support_syslog", true);
  1236. // IPsec
  1237. AddCapsBool(t, "b_support_ipsec", false);
  1238. // SSTP
  1239. AddCapsBool(t, "b_support_sstp", false);
  1240. // OpenVPN
  1241. AddCapsBool(t, "b_support_openvpn", false);
  1242. // DDNS
  1243. AddCapsBool(t, "b_support_ddns", false);
  1244. // VPN over ICMP, VPN over DNS
  1245. AddCapsBool(t, "b_support_special_listener", false);
  1246. }
  1247. // Changing the type of Virtual HUB in cluster is prohibited
  1248. AddCapsBool(t, "b_cluster_hub_type_fixed", true);
  1249. // Maximum MAC address table size / Virtual HUB
  1250. AddCapsInt(t, "i_max_mac_tables", MAX_MAC_TABLES);
  1251. // Maximum IP address table size / Virtual HUB
  1252. AddCapsInt(t, "i_max_ip_tables", MAX_IP_TABLES);
  1253. // SecureNAT function is available
  1254. AddCapsBool(t, "b_support_securenat", true);
  1255. // Pushing routing table function of SecureNAT Virtual DHCP Server is available
  1256. AddCapsBool(t, "b_suppport_push_route", !is_restricted);
  1257. AddCapsBool(t, "b_suppport_push_route_config", true);
  1258. if (s->ServerType != SERVER_TYPE_STANDALONE)
  1259. {
  1260. AddCapsBool(t, "b_virtual_nat_disabled", true);
  1261. }
  1262. // Maximum NAT table size / Virtual HUB
  1263. AddCapsInt(t, "i_max_secnat_tables", NAT_MAX_SESSIONS);
  1264. // Cascade connction
  1265. if (s->ServerType == SERVER_TYPE_STANDALONE)
  1266. {
  1267. AddCapsBool(t, "b_support_cascade", true);
  1268. }
  1269. else
  1270. {
  1271. AddCapsBool(t, "b_support_cascade", false);
  1272. }
  1273. if (s->Cedar->Bridge)
  1274. {
  1275. // Bridge mode
  1276. AddCapsBool(t, "b_bridge", true);
  1277. }
  1278. else if (s->ServerType == SERVER_TYPE_STANDALONE)
  1279. {
  1280. // Stand-alone mode
  1281. AddCapsBool(t, "b_standalone", true);
  1282. }
  1283. else if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  1284. {
  1285. // Cluster controller mode
  1286. AddCapsBool(t, "b_cluster_controller", true);
  1287. }
  1288. else
  1289. {
  1290. // Cluster member mode
  1291. AddCapsBool(t, "b_cluster_member", true);
  1292. }
  1293. // Virtual HUB is modifiable
  1294. AddCapsBool(t, "b_support_config_hub", s->ServerType != SERVER_TYPE_FARM_MEMBER &&
  1295. s->Cedar->Bridge == false);
  1296. // VPN client can be connected
  1297. AddCapsBool(t, "b_vpn_client_connect", s->Cedar->Bridge == false ? true : false);
  1298. // External authentication server is available
  1299. AddCapsBool(t, "b_support_radius", s->ServerType != SERVER_TYPE_FARM_MEMBER &&
  1300. s->Cedar->Bridge == false);
  1301. // Local-bridge function is available
  1302. AddCapsBool(t, "b_local_bridge", IsBridgeSupported());
  1303. if (OS_IS_WINDOWS(GetOsInfo()->OsType))
  1304. {
  1305. // Packet capture driver is not installed
  1306. AddCapsBool(t, "b_must_install_pcap", IsEthSupported() == false ? true : false);
  1307. }
  1308. else
  1309. {
  1310. // Regard that the driver is installed in the Linux version
  1311. AddCapsBool(t, "b_must_install_pcap", false);
  1312. }
  1313. if (IsBridgeSupported())
  1314. {
  1315. // Tun / tap device is available (only Linux)
  1316. AddCapsBool(t, "b_tap_supported", GetOsInfo()->OsType == OSTYPE_LINUX ? true : false);
  1317. }
  1318. // Cascade connction
  1319. if (s->ServerType == SERVER_TYPE_STANDALONE)
  1320. {
  1321. AddCapsBool(t, "b_support_cascade", true);
  1322. }
  1323. else
  1324. {
  1325. AddCapsBool(t, "b_support_cascade", false);
  1326. }
  1327. // Server authentication can be used in cascade connection
  1328. AddCapsBool(t, "b_support_cascade_cert", true);
  1329. // the log file settings is modifiable
  1330. AddCapsBool(t, "b_support_config_log", s->ServerType != SERVER_TYPE_FARM_MEMBER);
  1331. // Automatic deletion of log file is available
  1332. AddCapsBool(t, "b_support_autodelete", true);
  1333. // Config file operation is available
  1334. AddCapsBool(t, "b_support_config_rw", true);
  1335. // Attribute of each Virtual HUB can be set
  1336. AddCapsBool(t, "b_support_hub_admin_option", true);
  1337. // Client certificate can be set in a cascade connection
  1338. AddCapsBool(t, "b_support_cascade_client_cert", true);
  1339. // Virtual HUB can be hidden
  1340. AddCapsBool(t, "b_support_hide_hub", true);
  1341. // Integrated management
  1342. AddCapsBool(t, "b_support_cluster_admin", true);
  1343. // Flag of open-source version
  1344. AddCapsBool(t, "b_is_softether", true);
  1345. if (s->Cedar->Bridge == false)
  1346. {
  1347. // The virtual layer 3 switch function is available
  1348. AddCapsBool(t, "b_support_layer3", true);
  1349. AddCapsInt(t, "i_max_l3_sw", MAX_NUM_L3_SWITCH);
  1350. AddCapsInt(t, "i_max_l3_if", MAX_NUM_L3_IF);
  1351. AddCapsInt(t, "i_max_l3_table", MAX_NUM_L3_TABLE);
  1352. // Can act as a part of a cluster
  1353. AddCapsBool(t, "b_support_cluster", true);
  1354. }
  1355. else
  1356. {
  1357. AddCapsBool(t, "b_support_layer3", false);
  1358. AddCapsInt(t, "i_max_l3_sw", 0);
  1359. AddCapsInt(t, "i_max_l3_if", 0);
  1360. AddCapsInt(t, "i_max_l3_table", 0);
  1361. AddCapsBool(t, "b_support_cluster", false);
  1362. }
  1363. if (s->ServerType != SERVER_TYPE_FARM_MEMBER && s->Cedar->Bridge == false)
  1364. {
  1365. // Support for CRL
  1366. AddCapsBool(t, "b_support_crl", true);
  1367. // Supports AC
  1368. AddCapsBool(t, "b_support_ac", true);
  1369. }
  1370. // Supports downloading a log file
  1371. AddCapsBool(t, "b_support_read_log", true);
  1372. // Cascade connection can be renamed
  1373. AddCapsBool(t, "b_support_rename_cascade", true);
  1374. if (s->Cedar->Beta)
  1375. {
  1376. // Beta version
  1377. AddCapsBool(t, "b_beta_version", true);
  1378. }
  1379. // VM discrimination
  1380. AddCapsBool(t, "b_is_in_vm", s->IsInVm);
  1381. // Support for display name of the network connection for the local bridge
  1382. #ifdef OS_WIN32
  1383. if (IsBridgeSupported() && IsNt() && GetOsInfo()->OsType >= OSTYPE_WINDOWS_2000_PROFESSIONAL)
  1384. {
  1385. AddCapsBool(t, "b_support_network_connection_name", true);
  1386. }
  1387. #else // OS_WIN32
  1388. if (IsBridgeSupported() && EthIsInterfaceDescriptionSupportedUnix())
  1389. {
  1390. AddCapsBool(t, "b_support_network_connection_name", true);
  1391. }
  1392. #endif // OS_WIN32
  1393. // Support for MAC address filtering
  1394. AddCapsBool(t, "b_support_check_mac", true);
  1395. // Support for status check of the TCP connection
  1396. AddCapsBool(t, "b_support_check_tcp_state", true);
  1397. // Can specify multiple server and retry intervals in Radius authentication
  1398. AddCapsBool(t, "b_support_radius_retry_interval_and_several_servers", s->ServerType != SERVER_TYPE_FARM_MEMBER &&
  1399. s->Cedar->Bridge == false);
  1400. // Can manage the ID of the tagged VLAN in the MAC address table
  1401. AddCapsBool(t, "b_support_vlan", true);
  1402. // Support for Virtual HUB extended options
  1403. if ((s->Cedar->Bridge == false) &&
  1404. (s->ServerType == SERVER_TYPE_STANDALONE || s->ServerType == SERVER_TYPE_FARM_CONTROLLER))
  1405. {
  1406. AddCapsBool(t, "b_support_hub_ext_options", true);
  1407. }
  1408. else
  1409. {
  1410. AddCapsBool(t, "b_support_hub_ext_options", false);
  1411. }
  1412. // Support for Security Policy version 3.0
  1413. AddCapsBool(t, "b_support_policy_ver_3", true);
  1414. // Support for IPv6 access list
  1415. AddCapsBool(t, "b_support_ipv6_acl", true);
  1416. // Support for setting of delay, jitter and packet loss in the access list
  1417. AddCapsBool(t, "b_support_ex_acl", true);
  1418. // Support for URL redirection in the access list
  1419. AddCapsBool(t, "b_support_redirect_url_acl", true);
  1420. // Supports the specification by the group name in the access list
  1421. AddCapsBool(t, "b_support_acl_group", true);
  1422. // Support for IPv6 in connection source IP restriction list
  1423. AddCapsBool(t, "b_support_ipv6_ac", true);
  1424. // Support for VLAN tagged packet transmission configuration tool
  1425. AddCapsBool(t, "b_support_eth_vlan", (OS_IS_WINDOWS_NT(GetOsType()) && GET_KETA(GetOsType(), 100) >= 2));
  1426. // Support for the message display function when the VPN connect to the Virtual HUB
  1427. AddCapsBool(t, "b_support_msg", true);
  1428. // UDP acceleration feature
  1429. AddCapsBool(t, "b_support_udp_acceleration", true);
  1430. // Intel AES Acceleration function
  1431. AddCapsBool(t, "b_support_intel_aes", IsIntelAesNiSupported());
  1432. #ifdef OS_WIN32
  1433. // SeLow driver
  1434. AddCapsBool(t, "b_using_selow_driver", Win32IsUsingSeLow());
  1435. #endif // OS_WIN32
  1436. // VPN Azure function
  1437. AddCapsBool(t, "b_support_azure", SiIsAzureSupported(s));
  1438. // VPN3
  1439. AddCapsBool(t, "b_vpn3", true);
  1440. // VPN4
  1441. AddCapsBool(t, "b_vpn4", true);
  1442. UpdateGlobalServerFlags(s, t);
  1443. }
  1444. // SYSLOG_SETTING
  1445. void InRpcSysLogSetting(SYSLOG_SETTING *t, PACK *p)
  1446. {
  1447. // Validate arguments
  1448. if (t == NULL || p == NULL)
  1449. {
  1450. return;
  1451. }
  1452. Zero(t, sizeof(SYSLOG_SETTING));
  1453. t->SaveType = PackGetInt(p, "SaveType");
  1454. t->Port = PackGetInt(p, "Port");
  1455. PackGetStr(p, "Hostname", t->Hostname, sizeof(t->Hostname));
  1456. }
  1457. void OutRpcSysLogSetting(PACK *p, SYSLOG_SETTING *t)
  1458. {
  1459. // Validate arguments
  1460. if (t == NULL || p == NULL)
  1461. {
  1462. return;
  1463. }
  1464. PackAddInt(p, "SaveType", t->SaveType);
  1465. PackAddInt(p, "Port", t->Port);
  1466. PackAddStr(p, "Hostname", t->Hostname);
  1467. }
  1468. // CAPSLIST
  1469. void InitCapsList(CAPSLIST *t)
  1470. {
  1471. // Validate arguments
  1472. if (t == NULL)
  1473. {
  1474. return;
  1475. }
  1476. Zero(t, sizeof(CAPSLIST));
  1477. t->CapsList = NewListFast(NULL);
  1478. }
  1479. void InRpcCapsList(CAPSLIST *t, PACK *p)
  1480. {
  1481. UINT i;
  1482. // Validate arguments
  1483. if (t == NULL || p == NULL)
  1484. {
  1485. return;
  1486. }
  1487. Zero(t, sizeof(CAPSLIST));
  1488. t->CapsList = NewListFast(CompareCaps);
  1489. for (i = 0;i < LIST_NUM(p->elements);i++)
  1490. {
  1491. ELEMENT *e = LIST_DATA(p->elements, i);
  1492. if (StartWith(e->name, "caps_") && e->type == VALUE_INT && e->num_value == 1)
  1493. {
  1494. CAPS *c = NewCaps(e->name + 5, e->values[0]->IntValue);
  1495. Insert(t->CapsList, c);
  1496. }
  1497. }
  1498. }
  1499. void OutRpcCapsList(PACK *p, CAPSLIST *t)
  1500. {
  1501. UINT i;
  1502. // Validate arguments
  1503. if (t == NULL || p == NULL)
  1504. {
  1505. return;
  1506. }
  1507. for (i = 0;i < LIST_NUM(t->CapsList);i++)
  1508. {
  1509. char tmp[MAX_SIZE];
  1510. CAPS *c = LIST_DATA(t->CapsList, i);
  1511. Format(tmp, sizeof(tmp), "caps_%s", c->Name);
  1512. PackAddInt(p, tmp, c->Value);
  1513. }
  1514. }
  1515. void FreeRpcCapsList(CAPSLIST *t)
  1516. {
  1517. UINT i;
  1518. // Validate arguments
  1519. if (t == NULL)
  1520. {
  1521. return;
  1522. }
  1523. for (i = 0;i < LIST_NUM(t->CapsList);i++)
  1524. {
  1525. CAPS *c = LIST_DATA(t->CapsList, i);
  1526. FreeCaps(c);
  1527. }
  1528. ReleaseList(t->CapsList);
  1529. }
  1530. // Add a bool type to Caps list
  1531. void AddCapsBool(CAPSLIST *caps, char *name, bool b)
  1532. {
  1533. CAPS *c;
  1534. // Validate arguments
  1535. if (caps == NULL || name == NULL)
  1536. {
  1537. return;
  1538. }
  1539. c = NewCaps(name, b == false ? 0 : 1);
  1540. AddCaps(caps, c);
  1541. }
  1542. // Add the int type to Caps list
  1543. void AddCapsInt(CAPSLIST *caps, char *name, UINT i)
  1544. {
  1545. CAPS *c;
  1546. // Validate arguments
  1547. if (caps == NULL || name == NULL)
  1548. {
  1549. return;
  1550. }
  1551. c = NewCaps(name, i);
  1552. AddCaps(caps, c);
  1553. }
  1554. // Get the int type from the Caps list
  1555. UINT GetCapsInt(CAPSLIST *caps, char *name)
  1556. {
  1557. CAPS *c;
  1558. // Validate arguments
  1559. if (caps == NULL || name == NULL)
  1560. {
  1561. return 0;
  1562. }
  1563. c = GetCaps(caps, name);
  1564. if (c == NULL)
  1565. {
  1566. return 0;
  1567. }
  1568. return c->Value;
  1569. }
  1570. // Get bool type from the Caps list
  1571. bool GetCapsBool(CAPSLIST *caps, char *name)
  1572. {
  1573. CAPS *c;
  1574. // Validate arguments
  1575. if (caps == NULL || name == NULL)
  1576. {
  1577. return false;
  1578. }
  1579. c = GetCaps(caps, name);
  1580. if (c == NULL)
  1581. {
  1582. return false;
  1583. }
  1584. return c->Value == 0 ? false : true;
  1585. }
  1586. // Release the Caps list
  1587. void FreeCapsList(CAPSLIST *caps)
  1588. {
  1589. UINT i;
  1590. // Validate arguments
  1591. if (caps == NULL)
  1592. {
  1593. return;
  1594. }
  1595. for (i = 0;i < LIST_NUM(caps->CapsList);i++)
  1596. {
  1597. CAPS *c = LIST_DATA(caps->CapsList, i);
  1598. FreeCaps(c);
  1599. }
  1600. ReleaseList(caps->CapsList);
  1601. Free(caps);
  1602. }
  1603. // Get the Caps
  1604. CAPS *GetCaps(CAPSLIST *caps, char *name)
  1605. {
  1606. UINT i;
  1607. // Validate arguments
  1608. if (caps == NULL || name == NULL)
  1609. {
  1610. return NULL;
  1611. }
  1612. for (i = 0;i < LIST_NUM(caps->CapsList);i++)
  1613. {
  1614. CAPS *c = LIST_DATA(caps->CapsList, i);
  1615. if (StrCmpi(c->Name, name) == 0)
  1616. {
  1617. return c;
  1618. }
  1619. }
  1620. return NULL;
  1621. }
  1622. // Add to the Caps
  1623. void AddCaps(CAPSLIST *caps, CAPS *c)
  1624. {
  1625. // Validate arguments
  1626. if (caps == NULL || c == NULL)
  1627. {
  1628. return;
  1629. }
  1630. Insert(caps->CapsList, c);
  1631. }
  1632. // Comparison of Caps
  1633. int CompareCaps(void *p1, void *p2)
  1634. {
  1635. CAPS *c1, *c2;
  1636. if (p1 == NULL || p2 == NULL)
  1637. {
  1638. return 0;
  1639. }
  1640. c1 = *(CAPS **)p1;
  1641. c2 = *(CAPS **)p2;
  1642. if (c1 == NULL || c2 == NULL)
  1643. {
  1644. return 0;
  1645. }
  1646. return StrCmpi(c1->Name, c2->Name);
  1647. }
  1648. // Create a Caps list
  1649. CAPSLIST *NewCapsList()
  1650. {
  1651. CAPSLIST *caps = ZeroMalloc(sizeof(CAPSLIST));
  1652. caps->CapsList = NewListFast(CompareCaps);
  1653. return caps;
  1654. }
  1655. // Release the Caps
  1656. void FreeCaps(CAPS *c)
  1657. {
  1658. // Validate arguments
  1659. if (c == NULL)
  1660. {
  1661. return;
  1662. }
  1663. Free(c->Name);
  1664. Free(c);
  1665. }
  1666. // Create a Caps
  1667. CAPS *NewCaps(char *name, UINT value)
  1668. {
  1669. CAPS *c;
  1670. // Validate arguments
  1671. if (name == NULL)
  1672. {
  1673. return NULL;
  1674. }
  1675. c = ZeroMalloc(sizeof(CAPS));
  1676. c->Name = CopyStr(name);
  1677. c->Value = value;
  1678. return c;
  1679. }
  1680. // Calculate the score from the current number of connections and weight
  1681. UINT SiCalcPoint(SERVER *s, UINT num, UINT weight)
  1682. {
  1683. UINT server_max_sessions = SERVER_MAX_SESSIONS;
  1684. if (s == NULL)
  1685. {
  1686. return 0;
  1687. }
  1688. if (weight == 0)
  1689. {
  1690. weight = 100;
  1691. }
  1692. server_max_sessions = GetServerCapsInt(s, "i_max_sessions");
  1693. return (UINT)(((double)server_max_sessions -
  1694. MIN((double)num * 100.0 / (double)weight, (double)server_max_sessions))
  1695. * (double)FARM_BASE_POINT / (double)server_max_sessions);
  1696. }
  1697. // Get the server score
  1698. UINT SiGetPoint(SERVER *s)
  1699. {
  1700. UINT num_session;
  1701. // Validate arguments
  1702. if (s == NULL)
  1703. {
  1704. return 0;
  1705. }
  1706. num_session = Count(s->Cedar->CurrentSessions);
  1707. return SiCalcPoint(s, num_session, s->Weight);
  1708. }
  1709. // Generate the default certificate
  1710. void SiGenerateDefaultCert(X **server_x, K **server_k)
  1711. {
  1712. SiGenerateDefaultCertEx(server_x, server_k, NULL);
  1713. }
  1714. void SiGenerateDefaultCertEx(X **server_x, K **server_k, char *common_name)
  1715. {
  1716. X *x;
  1717. K *private_key, *public_key;
  1718. NAME *name;
  1719. char tmp[MAX_SIZE];
  1720. wchar_t cn[MAX_SIZE];
  1721. // Validate arguments
  1722. if (server_x == NULL || server_k == NULL)
  1723. {
  1724. return;
  1725. }
  1726. // Create a key pair
  1727. RsaGen(&private_key, &public_key, 2048);
  1728. if (IsEmptyStr(common_name))
  1729. {
  1730. // Get the host name
  1731. StrCpy(tmp, sizeof(tmp), "server.softether.vpn");
  1732. GetMachineName(tmp, sizeof(tmp));
  1733. StrToUni(cn, sizeof(cn), tmp);
  1734. }
  1735. else
  1736. {
  1737. StrToUni(cn, sizeof(cn), common_name);
  1738. }
  1739. name = NewName(cn, cn, cn,
  1740. L"US", NULL, NULL);
  1741. x = NewRootX(public_key, private_key, name, MAX(GetDaysUntil2038(), SERVER_DEFAULT_CERT_DAYS), NULL);
  1742. *server_x = x;
  1743. *server_k = private_key;
  1744. FreeName(name);
  1745. FreeK(public_key);
  1746. }
  1747. // Set the server certificate to default
  1748. void SiInitDefaultServerCert(SERVER *s)
  1749. {
  1750. X *x = NULL;
  1751. K *k = NULL;
  1752. // Validate arguments
  1753. if (s == NULL)
  1754. {
  1755. return;
  1756. }
  1757. // Generate a server certificate and private key
  1758. SiGenerateDefaultCert(&x, &k);
  1759. // Configure
  1760. SetCedarCert(s->Cedar, x, k);
  1761. FreeX(x);
  1762. FreeK(k);
  1763. }
  1764. // Set the encryption algorithm name to default
  1765. void SiInitCipherName(SERVER *s)
  1766. {
  1767. // Validate arguments
  1768. if (s == NULL)
  1769. {
  1770. return;
  1771. }
  1772. SetCedarCipherList(s->Cedar, SERVER_DEFAULT_CIPHER_NAME);
  1773. }
  1774. // Initialize the listener list
  1775. void SiInitListenerList(SERVER *s)
  1776. {
  1777. // Validate arguments
  1778. if (s == NULL)
  1779. {
  1780. return;
  1781. }
  1782. SiLockListenerList(s);
  1783. {
  1784. {
  1785. // Register the 4 ports (443, 992, 1194, 8888) as the default port
  1786. SiAddListener(s, SERVER_DEF_PORTS_1, true);
  1787. SiAddListener(s, SERVER_DEF_PORTS_2, true);
  1788. SiAddListener(s, SERVER_DEF_PORTS_3, true);
  1789. SiAddListener(s, SERVER_DEF_PORTS_4, true);
  1790. }
  1791. }
  1792. SiUnlockListenerList(s);
  1793. }
  1794. // Remove the listener
  1795. bool SiDeleteListener(SERVER *s, UINT port)
  1796. {
  1797. SERVER_LISTENER *e;
  1798. // Validate arguments
  1799. if (s == NULL || port == 0)
  1800. {
  1801. return false;
  1802. }
  1803. e = SiGetListener(s, port);
  1804. if (e == NULL)
  1805. {
  1806. return false;
  1807. }
  1808. // Stop if still alive
  1809. SiDisableListener(s, port);
  1810. if (e->Listener != NULL)
  1811. {
  1812. ReleaseListener(e->Listener);
  1813. }
  1814. Delete(s->ServerListenerList, e);
  1815. Free(e);
  1816. return true;
  1817. }
  1818. // Compare the SERVER_LISTENER
  1819. int CompareServerListener(void *p1, void *p2)
  1820. {
  1821. SERVER_LISTENER *s1, *s2;
  1822. if (p1 == NULL || p2 == NULL)
  1823. {
  1824. return 0;
  1825. }
  1826. s1 = *(SERVER_LISTENER **)p1;
  1827. s2 = *(SERVER_LISTENER **)p2;
  1828. if (s1 == NULL || s2 == NULL)
  1829. {
  1830. return 0;
  1831. }
  1832. if (s1->Port > s2->Port)
  1833. {
  1834. return 1;
  1835. }
  1836. else if (s1->Port < s2->Port)
  1837. {
  1838. return -1;
  1839. }
  1840. else
  1841. {
  1842. return 0;
  1843. }
  1844. }
  1845. // Stop the listener
  1846. bool SiDisableListener(SERVER *s, UINT port)
  1847. {
  1848. SERVER_LISTENER *e;
  1849. // Validate arguments
  1850. if (s == NULL || port == 0)
  1851. {
  1852. return false;
  1853. }
  1854. // Get the listener
  1855. e = SiGetListener(s, port);
  1856. if (e == NULL)
  1857. {
  1858. return false;
  1859. }
  1860. if (e->Enabled == false || e->Listener == NULL)
  1861. {
  1862. // Already stopped
  1863. return true;
  1864. }
  1865. // Stop the listener
  1866. StopListener(e->Listener);
  1867. // Release the listener
  1868. ReleaseListener(e->Listener);
  1869. e->Listener = NULL;
  1870. e->Enabled = false;
  1871. return true;
  1872. }
  1873. // Start the listener
  1874. bool SiEnableListener(SERVER *s, UINT port)
  1875. {
  1876. SERVER_LISTENER *e;
  1877. // Validate arguments
  1878. if (s == NULL || port == 0)
  1879. {
  1880. return false;
  1881. }
  1882. // Get the listener
  1883. e = SiGetListener(s, port);
  1884. if (e == NULL)
  1885. {
  1886. return false;
  1887. }
  1888. if (e->Enabled)
  1889. {
  1890. // It has already started
  1891. return true;
  1892. }
  1893. // Create a listener
  1894. e->Listener = NewListener(s->Cedar, LISTENER_TCP, e->Port);
  1895. if (e->Listener == NULL)
  1896. {
  1897. // Failure
  1898. return false;
  1899. }
  1900. e->Listener->DisableDos = e->DisableDos;
  1901. e->Enabled = true;
  1902. return true;
  1903. }
  1904. // Get the listener
  1905. SERVER_LISTENER *SiGetListener(SERVER *s, UINT port)
  1906. {
  1907. UINT i;
  1908. // Validate arguments
  1909. if (s == NULL || port == 0)
  1910. {
  1911. return NULL;
  1912. }
  1913. for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
  1914. {
  1915. SERVER_LISTENER *e = LIST_DATA(s->ServerListenerList, i);
  1916. if (e->Port == port)
  1917. {
  1918. return e;
  1919. }
  1920. }
  1921. return NULL;
  1922. }
  1923. // Add a listener
  1924. bool SiAddListener(SERVER *s, UINT port, bool enabled)
  1925. {
  1926. return SiAddListenerEx(s, port, enabled, false);
  1927. }
  1928. bool SiAddListenerEx(SERVER *s, UINT port, bool enabled, bool disable_dos)
  1929. {
  1930. SERVER_LISTENER *e;
  1931. UINT i;
  1932. // Validate arguments
  1933. if (s == NULL || port == 0)
  1934. {
  1935. return false;
  1936. }
  1937. // Check whether the listener exists already
  1938. for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
  1939. {
  1940. e = LIST_DATA(s->ServerListenerList, i);
  1941. if (e->Port == port)
  1942. {
  1943. // Already exist
  1944. return false;
  1945. }
  1946. }
  1947. // Register by initializing a new listener
  1948. e = ZeroMalloc(sizeof(SERVER_LISTENER));
  1949. e->Enabled = enabled;
  1950. e->Port = port;
  1951. e->DisableDos = disable_dos;
  1952. if (e->Enabled)
  1953. {
  1954. // Create a listener
  1955. e->Listener = NewListener(s->Cedar, LISTENER_TCP, e->Port);
  1956. if (e->Listener != NULL)
  1957. {
  1958. e->Listener->DisableDos = e->DisableDos;
  1959. }
  1960. }
  1961. Insert(s->ServerListenerList, e);
  1962. return true;
  1963. }
  1964. // Lock the listener list
  1965. void SiLockListenerList(SERVER *s)
  1966. {
  1967. // Validate arguments
  1968. if (s == NULL)
  1969. {
  1970. return;
  1971. }
  1972. LockList(s->ServerListenerList);
  1973. }
  1974. // Unlock the listener list
  1975. void SiUnlockListenerList(SERVER *s)
  1976. {
  1977. // Validate arguments
  1978. if (s == NULL)
  1979. {
  1980. return;
  1981. }
  1982. UnlockList(s->ServerListenerList);
  1983. }
  1984. // Initialize the Bridge
  1985. void SiInitBridge(SERVER *s)
  1986. {
  1987. HUB *h;
  1988. HUB_OPTION o;
  1989. HUB_LOG g;
  1990. // Validate arguments
  1991. if (s == NULL)
  1992. {
  1993. return;
  1994. }
  1995. Zero(&o, sizeof(o));
  1996. o.MaxSession = 0;
  1997. h = NewHub(s->Cedar, SERVER_DEFAULT_BRIDGE_NAME, &o);
  1998. AddHub(s->Cedar, h);
  1999. h->Offline = true;
  2000. SetHubOnline(h);
  2001. // Log settings
  2002. SiSetDefaultLogSetting(&g);
  2003. SetHubLogSetting(h, &g);
  2004. ReleaseHub(h);
  2005. }
  2006. // Set the default value of the Virtual HUB options
  2007. void SiSetDefaultHubOption(HUB_OPTION *o)
  2008. {
  2009. // Validate arguments
  2010. if (o == NULL)
  2011. {
  2012. return;
  2013. }
  2014. o->MaxSession = 0;
  2015. o->VlanTypeId = MAC_PROTO_TAGVLAN;
  2016. o->NoIPv6DefaultRouterInRAWhenIPv6 = true;
  2017. o->ManageOnlyPrivateIP = true;
  2018. o->ManageOnlyLocalUnicastIPv6 = true;
  2019. o->NoMacAddressLog = true;
  2020. o->NoDhcpPacketLogOutsideHub = true;
  2021. o->AccessListIncludeFileCacheLifetime = ACCESS_LIST_INCLUDE_FILE_CACHE_LIFETIME;
  2022. o->RemoveDefGwOnDhcpForLocalhost = true;
  2023. }
  2024. // Create a default virtual HUB
  2025. void SiInitDefaultHubList(SERVER *s)
  2026. {
  2027. HUB *h;
  2028. HUB_OPTION o;
  2029. HUB_LOG g;
  2030. // Validate arguments
  2031. if (s == NULL)
  2032. {
  2033. return;
  2034. }
  2035. Zero(&o, sizeof(o));
  2036. // Configure a default Virtual HUB management options
  2037. SiSetDefaultHubOption(&o);
  2038. h = NewHub(s->Cedar, s->Cedar->Bridge == false ? SERVER_DEFAULT_HUB_NAME : SERVER_DEFAULT_BRIDGE_NAME, &o);
  2039. h->CreatedTime = SystemTime64();
  2040. AddHub(s->Cedar, h);
  2041. if (s->Cedar->Bridge)
  2042. {
  2043. // Randomize the password
  2044. Rand(h->HashedPassword, sizeof(h->HashedPassword));
  2045. Rand(h->SecurePassword, sizeof(h->SecurePassword));
  2046. }
  2047. h->Offline = true;
  2048. SetHubOnline(h);
  2049. // Log settings
  2050. SiSetDefaultLogSetting(&g);
  2051. SetHubLogSetting(h, &g);
  2052. {
  2053. UINT i;
  2054. for (i = 0;i < 0;i++)
  2055. {
  2056. char tmp[MAX_SIZE];
  2057. USER *u;
  2058. sprintf(tmp, "user%u", i);
  2059. AcLock(h);
  2060. u = NewUser(tmp, L"test", L"", AUTHTYPE_ANONYMOUS, NULL);
  2061. AcAddUser(h, u);
  2062. ReleaseUser(u);
  2063. AcUnlock(h);
  2064. }
  2065. }
  2066. ReleaseHub(h);
  2067. }
  2068. // Set the log settings to default
  2069. void SiSetDefaultLogSetting(HUB_LOG *g)
  2070. {
  2071. // Validate arguments
  2072. if (g == NULL)
  2073. {
  2074. return;
  2075. }
  2076. Zero(g, sizeof(HUB_LOG));
  2077. g->SaveSecurityLog = true;
  2078. g->SecurityLogSwitchType = LOG_SWITCH_DAY;
  2079. g->SavePacketLog = true;
  2080. g->PacketLogSwitchType = LOG_SWITCH_DAY;
  2081. g->PacketLogConfig[PACKET_LOG_TCP_CONN] =
  2082. g->PacketLogConfig[PACKET_LOG_DHCP] = PACKET_LOG_HEADER;
  2083. }
  2084. // Test
  2085. void SiTest(SERVER *s)
  2086. {
  2087. }
  2088. // Set the initial configuration
  2089. void SiLoadInitialConfiguration(SERVER *s)
  2090. {
  2091. RPC_KEEP k;
  2092. // Validate arguments
  2093. if (s == NULL)
  2094. {
  2095. return;
  2096. }
  2097. // Auto saving interval related
  2098. s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
  2099. s->BackupConfigOnlyWhenModified = true;
  2100. s->Weight = FARM_DEFAULT_WEIGHT;
  2101. // KEEP related
  2102. Zero(&k, sizeof(k));
  2103. {
  2104. k.UseKeepConnect = true;
  2105. }
  2106. k.KeepConnectPort = 80;
  2107. StrCpy(k.KeepConnectHost, sizeof(k.KeepConnectHost), CLIENT_DEFAULT_KEEPALIVE_HOST);
  2108. k.KeepConnectInterval = KEEP_INTERVAL_DEFAULT * 1000;
  2109. k.KeepConnectProtocol = CONNECTION_UDP;
  2110. Lock(s->Keep->lock);
  2111. {
  2112. KEEP *keep = s->Keep;
  2113. keep->Enable = k.UseKeepConnect;
  2114. keep->Server = true;
  2115. StrCpy(keep->ServerName, sizeof(keep->ServerName), k.KeepConnectHost);
  2116. keep->ServerPort = k.KeepConnectPort;
  2117. keep->UdpMode = k.KeepConnectProtocol;
  2118. keep->Interval = k.KeepConnectInterval;
  2119. }
  2120. Unlock(s->Keep->lock);
  2121. // Initialize the password
  2122. {
  2123. Hash(s->HashedPassword, "", 0, true);
  2124. }
  2125. // Set the encryption algorithm name to default
  2126. SiInitCipherName(s);
  2127. // Set the server certificate to default
  2128. SiInitDefaultServerCert(s);
  2129. // Create a default HUB
  2130. {
  2131. SiInitDefaultHubList(s);
  2132. }
  2133. if (s->Cedar->Bridge == false)
  2134. {
  2135. // Create a DDNS client
  2136. s->DDnsClient = NewDDNSClient(s->Cedar, NULL, NULL);
  2137. }
  2138. // Set the listener list to default setting
  2139. SiInitListenerList(s);
  2140. if (s->Cedar->Bridge)
  2141. {
  2142. // SSTP, OpenVPN, and NAT traversal function can not be used in the bridge environment
  2143. s->DisableNatTraversal = true;
  2144. s->DisableSSTPServer = true;
  2145. s->DisableOpenVPNServer = true;
  2146. }
  2147. else
  2148. {
  2149. // Enable the SSTP and OpenVPN for default setting
  2150. OPENVPN_SSTP_CONFIG c;
  2151. Zero(&c, sizeof(c));
  2152. c.EnableOpenVPN = true;
  2153. c.EnableSSTP = true;
  2154. {
  2155. ToStr(c.OpenVPNPortList, OPENVPN_UDP_PORT);
  2156. }
  2157. SiSetOpenVPNAndSSTPConfig(s, &c);
  2158. {
  2159. // Enable VPN-over-ICMP" and VPN-over-DNS for default setting
  2160. s->EnableVpnOverIcmp = false;
  2161. s->EnableVpnOverDns = false;
  2162. }
  2163. }
  2164. s->Eraser = NewEraser(s->Logger, 0);
  2165. }
  2166. // Check whether the ports required for VPN-over-ICMP can be opened
  2167. bool SiCanOpenVpnOverIcmpPort()
  2168. {
  2169. // Whether the ICMP can be opened
  2170. SOCK *s = NewUDP(MAKE_SPECIAL_PORT(IP_PROTO_ICMPV4));
  2171. if (s == NULL)
  2172. {
  2173. // Failure
  2174. return false;
  2175. }
  2176. Disconnect(s);
  2177. ReleaseSock(s);
  2178. return true;
  2179. }
  2180. // Check whether the ports required for VPN-over-DNS can be opened
  2181. bool SiCanOpenVpnOverDnsPort()
  2182. {
  2183. // Whether UDP Port 53 can be listen on
  2184. SOCK *s = NewUDP(53);
  2185. if (s == NULL)
  2186. {
  2187. // Listening failure
  2188. return false;
  2189. }
  2190. Disconnect(s);
  2191. ReleaseSock(s);
  2192. return true;
  2193. }
  2194. // Read the configuration file (main)
  2195. bool SiLoadConfigurationFileMain(SERVER *s, FOLDER *root)
  2196. {
  2197. // Validate arguments
  2198. if (s == NULL || root == NULL)
  2199. {
  2200. return false;
  2201. }
  2202. return SiLoadConfigurationCfg(s, root);
  2203. }
  2204. // Read the configuration file
  2205. bool SiLoadConfigurationFile(SERVER *s)
  2206. {
  2207. // Validate arguments
  2208. bool ret = false;
  2209. FOLDER *root;
  2210. char *server_config_filename = SERVER_CONFIG_FILE_NAME;
  2211. if (s == NULL)
  2212. {
  2213. return false;
  2214. }
  2215. s->CfgRw = NewCfgRw(&root,
  2216. s->Cedar->Bridge == false ? server_config_filename : BRIDGE_CONFIG_FILE_NAME);
  2217. if (server_reset_setting)
  2218. {
  2219. CfgDeleteFolder(root);
  2220. root = NULL;
  2221. server_reset_setting = false;
  2222. }
  2223. if (root == NULL)
  2224. {
  2225. return false;
  2226. }
  2227. ret = SiLoadConfigurationFileMain(s, root);
  2228. CfgDeleteFolder(root);
  2229. return ret;
  2230. }
  2231. // Initialize the configuration
  2232. void SiInitConfiguration(SERVER *s)
  2233. {
  2234. // Validate arguments
  2235. if (s == NULL)
  2236. {
  2237. return;
  2238. }
  2239. s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
  2240. s->BackupConfigOnlyWhenModified = true;
  2241. // IPsec server
  2242. if (s->Cedar->Bridge == false)
  2243. {
  2244. s->IPsecServer = NewIPsecServer(s->Cedar);
  2245. }
  2246. // OpenVPN server (UDP)
  2247. if (s->Cedar->Bridge == false)
  2248. {
  2249. s->OpenVpnServerUdp = NewOpenVpnServerUdp(s->Cedar);
  2250. }
  2251. SLog(s->Cedar, "LS_LOAD_CONFIG_1");
  2252. if (SiLoadConfigurationFile(s) == false)
  2253. {
  2254. // Ethernet initialization
  2255. InitEth();
  2256. SLog(s->Cedar, "LS_LOAD_CONFIG_3");
  2257. SiLoadInitialConfiguration(s);
  2258. server_reset_setting = false;
  2259. }
  2260. else
  2261. {
  2262. SLog(s->Cedar, "LS_LOAD_CONFIG_2");
  2263. }
  2264. s->CfgRw->DontBackup = s->DontBackupConfig;
  2265. // The arp_filter in Linux
  2266. if (GetOsInfo()->OsType == OSTYPE_LINUX)
  2267. {
  2268. if (s->NoLinuxArpFilter == false)
  2269. {
  2270. SetLinuxArpFilter();
  2271. }
  2272. }
  2273. if (s->DisableDosProction)
  2274. {
  2275. DisableDosProtect();
  2276. }
  2277. else
  2278. {
  2279. EnableDosProtect();
  2280. }
  2281. s->AutoSaveConfigSpanSaved = s->AutoSaveConfigSpan;
  2282. // Create a VPN Azure client
  2283. if (s->DDnsClient != NULL && s->Cedar->Bridge == false && s->ServerType == SERVER_TYPE_STANDALONE)
  2284. {
  2285. s->AzureClient = NewAzureClient(s->Cedar, s);
  2286. AcSetEnable(s->AzureClient, s->EnableVpnAzure);
  2287. }
  2288. // Reduce the storage interval in the case of user mode
  2289. #ifdef OS_WIN32
  2290. if (MsIsUserMode())
  2291. {
  2292. s->AutoSaveConfigSpan = MIN(s->AutoSaveConfigSpan, SERVER_FILE_SAVE_INTERVAL_USERMODE);
  2293. }
  2294. #endif //OS_WIN32
  2295. // Create a saving thread
  2296. SLog(s->Cedar, "LS_INIT_SAVE_THREAD", s->AutoSaveConfigSpan / 1000);
  2297. s->SaveHaltEvent = NewEvent();
  2298. s->SaveThread = NewThread(SiSaverThread, s);
  2299. }
  2300. // Set the state of Enabled / Disabled of Azure Client
  2301. void SiSetAzureEnable(SERVER *s, bool enabled)
  2302. {
  2303. // Validate arguments
  2304. if (s == NULL)
  2305. {
  2306. return;
  2307. }
  2308. if (s->AzureClient != NULL)
  2309. {
  2310. AcSetEnable(s->AzureClient, enabled);
  2311. }
  2312. s->EnableVpnAzure = enabled;
  2313. }
  2314. // Get the state of Enabled / Disabled of Azure Client
  2315. bool SiGetAzureEnable(SERVER *s)
  2316. {
  2317. // Validate arguments
  2318. if (s == NULL)
  2319. {
  2320. return false;
  2321. }
  2322. if (s->AzureClient != NULL)
  2323. {
  2324. return AcGetEnable(s->AzureClient);
  2325. }
  2326. else
  2327. {
  2328. return false;
  2329. }
  2330. }
  2331. // Apply the Config to the Azure Client
  2332. void SiApplyAzureConfig(SERVER *s, DDNS_CLIENT_STATUS *ddns_status)
  2333. {
  2334. // Validate arguments
  2335. if (s == NULL)
  2336. {
  2337. return;
  2338. }
  2339. AcApplyCurrentConfig(s->AzureClient, ddns_status);
  2340. }
  2341. // Get whether the Azure Client is enabled
  2342. bool SiIsAzureEnabled(SERVER *s)
  2343. {
  2344. // Validate arguments
  2345. if (s == NULL)
  2346. {
  2347. return false;
  2348. }
  2349. if (s->AzureClient == NULL)
  2350. {
  2351. return false;
  2352. }
  2353. return s->EnableVpnAzure;
  2354. }
  2355. // Get whether the Azure Client is supported
  2356. bool SiIsAzureSupported(SERVER *s)
  2357. {
  2358. // Validate arguments
  2359. if (s == NULL)
  2360. {
  2361. return false;
  2362. }
  2363. if (s->AzureClient == NULL)
  2364. {
  2365. return false;
  2366. }
  2367. return true;
  2368. }
  2369. // Read the server settings from the CFG
  2370. bool SiLoadConfigurationCfg(SERVER *s, FOLDER *root)
  2371. {
  2372. FOLDER *f1, *f2, *f3, *f4, *f5, *f6, *f7, *f8, *f;
  2373. bool is_vgs_enabled = false;
  2374. // Validate arguments
  2375. if (s == NULL || root == NULL)
  2376. {
  2377. return false;
  2378. }
  2379. f = NULL;
  2380. f1 = CfgGetFolder(root, "ServerConfiguration");
  2381. f2 = CfgGetFolder(root, "VirtualHUB");
  2382. f3 = CfgGetFolder(root, "ListenerList");
  2383. f4 = CfgGetFolder(root, "LocalBridgeList");
  2384. f5 = CfgGetFolder(root, "VirtualLayer3SwitchList");
  2385. f6 = CfgGetFolder(root, "LicenseManager");
  2386. f7 = CfgGetFolder(root, "IPsec");
  2387. f8 = CfgGetFolder(root, "DDnsClient");
  2388. if (f1 == NULL)
  2389. {
  2390. SLog(s->Cedar, "LS_BAD_CONFIG");
  2391. return false;
  2392. }
  2393. #ifdef OS_WIN32
  2394. if (f4 != NULL)
  2395. {
  2396. // Read the flag of using the SeLow driver
  2397. bool b = true;
  2398. if (CfgIsItem(f4, "EnableSoftEtherKernelModeDriver"))
  2399. {
  2400. b = CfgGetBool(f4, "EnableSoftEtherKernelModeDriver");
  2401. }
  2402. Win32SetEnableSeLow(b);
  2403. }
  2404. #endif // OS_WIN32
  2405. // Ethernet initialization
  2406. InitEth();
  2407. s->ConfigRevision = CfgGetInt(root, "ConfigRevision");
  2408. if (s->Cedar->Bridge == false && f6 != NULL)
  2409. {
  2410. if (GetServerCapsBool(s, "b_support_license"))
  2411. {
  2412. SiLoadLicenseManager(s, f6);
  2413. }
  2414. }
  2415. DestroyServerCapsCache(s);
  2416. SiLoadServerCfg(s, f1);
  2417. if (s->ServerType != SERVER_TYPE_FARM_MEMBER)
  2418. {
  2419. SiLoadHubs(s, f2);
  2420. }
  2421. SiLoadListeners(s, f3);
  2422. if (f4 != NULL)
  2423. {
  2424. SiLoadLocalBridges(s, f4);
  2425. }
  2426. if (s->Cedar->Bridge == false && f5 != NULL)
  2427. {
  2428. SiLoadL3Switchs(s, f5);
  2429. }
  2430. if (f7 != NULL && GetServerCapsBool(s, "b_support_ipsec"))
  2431. {
  2432. SiLoadIPsec(s, f7);
  2433. }
  2434. if (s->Cedar->Bridge == false)
  2435. {
  2436. if (f8 == NULL)
  2437. {
  2438. // Create a DDNS client with a new key
  2439. s->DDnsClient = NewDDNSClient(s->Cedar, NULL, NULL);
  2440. }
  2441. else
  2442. {
  2443. // Create by reading the setting of the DDNS client
  2444. UCHAR key[SHA1_SIZE];
  2445. if (CfgGetBool(f8, "Disabled"))
  2446. {
  2447. // Disabled
  2448. }
  2449. else
  2450. {
  2451. char machine_name[MAX_SIZE];
  2452. char machine_name2[MAX_SIZE];
  2453. INTERNET_SETTING t;
  2454. BUF *pw;
  2455. // Proxy Setting
  2456. Zero(&t, sizeof(t));
  2457. t.ProxyType = CfgGetInt(f8, "ProxyType");
  2458. CfgGetStr(f8, "ProxyHostName", t.ProxyHostName, sizeof(t.ProxyHostName));
  2459. t.ProxyPort = CfgGetInt(f8, "ProxyPort");
  2460. CfgGetStr(f8, "ProxyUsername", t.ProxyUsername, sizeof(t.ProxyUsername));
  2461. pw = CfgGetBuf(f8, "ProxyPassword");
  2462. if (pw != NULL)
  2463. {
  2464. char *pw_str = DecryptPassword(pw);
  2465. StrCpy(t.ProxyPassword, sizeof(t.ProxyPassword), pw_str);
  2466. Free(pw_str);
  2467. FreeBuf(pw);
  2468. }
  2469. GetMachineHostName(machine_name, sizeof(machine_name));
  2470. CfgGetStr(f8, "LocalHostname", machine_name2, sizeof(machine_name2));
  2471. if (CfgGetByte(f8, "Key", key, sizeof(key)) != sizeof(key) || StrCmpi(machine_name, machine_name2) != 0)
  2472. {
  2473. // Create a DDNS client with a new key
  2474. s->DDnsClient = NewDDNSClient(s->Cedar, NULL, &t);
  2475. }
  2476. else
  2477. {
  2478. // Create the DDNS client with stored key
  2479. s->DDnsClient = NewDDNSClient(s->Cedar, key, &t);
  2480. }
  2481. }
  2482. }
  2483. }
  2484. {
  2485. HUB *h = NULL;
  2486. // Remove the virtual HUB "VPNGATE" when VGS disabled
  2487. LockHubList(s->Cedar);
  2488. {
  2489. h = GetHub(s->Cedar, VG_HUBNAME);
  2490. }
  2491. UnlockHubList(s->Cedar);
  2492. if (h != NULL)
  2493. {
  2494. StopHub(h);
  2495. DelHub(s->Cedar, h);
  2496. ReleaseHub(h);
  2497. }
  2498. }
  2499. s->IPsecMessageDisplayed = CfgGetBool(root, "IPsecMessageDisplayed");
  2500. return true;
  2501. }
  2502. // Write the listener configuration
  2503. void SiWriteListenerCfg(FOLDER *f, SERVER_LISTENER *r)
  2504. {
  2505. // Validate arguments
  2506. if (f == NULL || r == NULL)
  2507. {
  2508. return;
  2509. }
  2510. CfgAddBool(f, "Enabled", r->Enabled);
  2511. CfgAddInt(f, "Port", r->Port);
  2512. CfgAddBool(f, "DisableDos", r->DisableDos);
  2513. }
  2514. // Read the listener configuration
  2515. void SiLoadListenerCfg(SERVER *s, FOLDER *f)
  2516. {
  2517. bool enable;
  2518. UINT port;
  2519. bool disable_dos;
  2520. // Validate arguments
  2521. if (s == NULL || f == NULL)
  2522. {
  2523. return;
  2524. }
  2525. enable = CfgGetBool(f, "Enabled");
  2526. port = CfgGetInt(f, "Port");
  2527. disable_dos = CfgGetBool(f, "DisableDos");
  2528. if (port == 0)
  2529. {
  2530. return;
  2531. }
  2532. SiAddListenerEx(s, port, enable, disable_dos);
  2533. }
  2534. // Read the listener list
  2535. void SiLoadListeners(SERVER *s, FOLDER *f)
  2536. {
  2537. TOKEN_LIST *t;
  2538. UINT i;
  2539. // Validate arguments
  2540. if (s == NULL || f == NULL)
  2541. {
  2542. return;
  2543. }
  2544. t = CfgEnumFolderToTokenList(f);
  2545. for (i = 0;i < t->NumTokens;i++)
  2546. {
  2547. FOLDER *ff = CfgGetFolder(f, t->Token[i]);
  2548. if (ff != NULL)
  2549. {
  2550. SiLoadListenerCfg(s, ff);
  2551. }
  2552. }
  2553. FreeToken(t);
  2554. }
  2555. // Write the listener list
  2556. void SiWriteListeners(FOLDER *f, SERVER *s)
  2557. {
  2558. // Validate arguments
  2559. if (f == NULL || s == NULL)
  2560. {
  2561. return;
  2562. }
  2563. LockList(s->ServerListenerList);
  2564. {
  2565. UINT i;
  2566. for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
  2567. {
  2568. SERVER_LISTENER *r = LIST_DATA(s->ServerListenerList, i);
  2569. char name[MAX_SIZE];
  2570. Format(name, sizeof(name), "Listener%u", i);
  2571. SiWriteListenerCfg(CfgCreateFolder(f, name), r);
  2572. }
  2573. }
  2574. UnlockList(s->ServerListenerList);
  2575. }
  2576. // Write the bridge
  2577. void SiWriteLocalBridgeCfg(FOLDER *f, LOCALBRIDGE *br)
  2578. {
  2579. // Validate arguments
  2580. if (f == NULL || br == NULL)
  2581. {
  2582. return;
  2583. }
  2584. CfgAddStr(f, "DeviceName", br->DeviceName);
  2585. CfgAddStr(f, "HubName", br->HubName);
  2586. CfgAddBool(f, "NoPromiscuousMode", br->Local);
  2587. CfgAddBool(f, "MonitorMode", br->Monitor);
  2588. CfgAddBool(f, "LimitBroadcast", br->LimitBroadcast);
  2589. if (OS_IS_UNIX(GetOsInfo()->OsType))
  2590. {
  2591. CfgAddBool(f, "TapMode", br->TapMode);
  2592. if (br->TapMode)
  2593. {
  2594. char tmp[MAX_SIZE];
  2595. MacToStr(tmp, sizeof(tmp), br->TapMacAddress);
  2596. CfgAddStr(f, "TapMacAddress", tmp);
  2597. }
  2598. }
  2599. }
  2600. // Write the bridge list
  2601. void SiWriteLocalBridges(FOLDER *f, SERVER *s)
  2602. {
  2603. // Validate arguments
  2604. if (s == NULL || f == NULL)
  2605. {
  2606. return;
  2607. }
  2608. #ifdef OS_WIN32
  2609. CfgAddBool(f, "ShowAllInterfaces", Win32EthGetShowAllIf());
  2610. CfgAddBool(f, "EnableSoftEtherKernelModeDriver", Win32GetEnableSeLow());
  2611. #endif // OS_WIN32
  2612. LockList(s->Cedar->LocalBridgeList);
  2613. {
  2614. UINT i;
  2615. for (i = 0;i < LIST_NUM(s->Cedar->LocalBridgeList);i++)
  2616. {
  2617. LOCALBRIDGE *br = LIST_DATA(s->Cedar->LocalBridgeList, i);
  2618. char name[MAX_SIZE];
  2619. Format(name, sizeof(name), "LocalBridge%u", i);
  2620. SiWriteLocalBridgeCfg(CfgCreateFolder(f, name), br);
  2621. }
  2622. }
  2623. UnlockList(s->Cedar->LocalBridgeList);
  2624. }
  2625. // Read the bridge
  2626. void SiLoadLocalBridgeCfg(SERVER *s, FOLDER *f)
  2627. {
  2628. char hub[MAX_SIZE];
  2629. char nic[MAX_SIZE];
  2630. bool tapmode = false;
  2631. UCHAR tapaddr[6];
  2632. // Validate arguments
  2633. if (s == NULL || f == NULL)
  2634. {
  2635. return;
  2636. }
  2637. Zero(hub, sizeof(hub));
  2638. Zero(nic, sizeof(nic));
  2639. CfgGetStr(f, "HubName", hub, sizeof(hub));
  2640. CfgGetStr(f, "DeviceName", nic, sizeof(nic));
  2641. if (IsEmptyStr(hub) || IsEmptyStr(nic)
  2642. )
  2643. {
  2644. return;
  2645. }
  2646. if (OS_IS_UNIX(GetOsInfo()->OsType))
  2647. {
  2648. if (CfgGetBool(f, "TapMode"))
  2649. {
  2650. char tmp[MAX_SIZE];
  2651. tapmode = true;
  2652. Zero(tapaddr, sizeof(tapaddr));
  2653. if (CfgGetStr(f, "TapMacAddress", tmp, sizeof(tmp)))
  2654. {
  2655. BUF *b;
  2656. b = StrToBin(tmp);
  2657. if (b != NULL && b->Size == 6)
  2658. {
  2659. Copy(tapaddr, b->Buf, sizeof(tapaddr));
  2660. }
  2661. FreeBuf(b);
  2662. }
  2663. }
  2664. }
  2665. AddLocalBridge(s->Cedar, hub, nic, CfgGetBool(f, "NoPromiscuousMode"), CfgGetBool(f, "MonitorMode"),
  2666. tapmode, tapaddr, CfgGetBool(f, "LimitBroadcast"));
  2667. }
  2668. // Read the bridge list
  2669. void SiLoadLocalBridges(SERVER *s, FOLDER *f)
  2670. {
  2671. TOKEN_LIST *t;
  2672. UINT i;
  2673. // Validate arguments
  2674. if (s == NULL || f == NULL)
  2675. {
  2676. return;
  2677. }
  2678. #ifdef OS_WIN32
  2679. Win32EthSetShowAllIf(CfgGetBool(f, "ShowAllInterfaces"));
  2680. #endif // OS_WIN32
  2681. t = CfgEnumFolderToTokenList(f);
  2682. for (i = 0;i < t->NumTokens;i++)
  2683. {
  2684. char *name = t->Token[i];
  2685. SiLoadLocalBridgeCfg(s, CfgGetFolder(f, name));
  2686. }
  2687. FreeToken(t);
  2688. }
  2689. // Increment the configuration revision of the server
  2690. void IncrementServerConfigRevision(SERVER *s)
  2691. {
  2692. // Validate arguments
  2693. if (s == NULL)
  2694. {
  2695. return;
  2696. }
  2697. s->ConfigRevision++;
  2698. }
  2699. // Write the server settings to CFG
  2700. FOLDER *SiWriteConfigurationToCfg(SERVER *s)
  2701. {
  2702. FOLDER *root;
  2703. char region[128];
  2704. // Validate arguments
  2705. if (s == NULL)
  2706. {
  2707. return NULL;
  2708. }
  2709. root = CfgCreateFolder(NULL, TAG_ROOT);
  2710. SiGetCurrentRegion(s->Cedar, region, sizeof(region));
  2711. CfgAddStr(root, "Region", region);
  2712. CfgAddInt(root, "ConfigRevision", s->ConfigRevision);
  2713. SiWriteListeners(CfgCreateFolder(root, "ListenerList"), s);
  2714. SiWriteLocalBridges(CfgCreateFolder(root, "LocalBridgeList"), s);
  2715. SiWriteServerCfg(CfgCreateFolder(root, "ServerConfiguration"), s);
  2716. if (s->UpdatedServerType != SERVER_TYPE_FARM_MEMBER)
  2717. {
  2718. SiWriteHubs(CfgCreateFolder(root, "VirtualHUB"), s);
  2719. }
  2720. if (s->Cedar->Bridge == false)
  2721. {
  2722. SiWriteL3Switchs(CfgCreateFolder(root, "VirtualLayer3SwitchList"), s);
  2723. if (GetServerCapsBool(s, "b_support_license"))
  2724. {
  2725. SiWriteLicenseManager(CfgCreateFolder(root, "LicenseManager"), s);
  2726. }
  2727. }
  2728. if (s->Led)
  2729. {
  2730. CfgAddBool(root, "Led", true);
  2731. CfgAddBool(root, "LedSpecial", s->LedSpecial);
  2732. }
  2733. if (GetServerCapsBool(s, "b_support_ipsec"))
  2734. {
  2735. SiWriteIPsec(CfgCreateFolder(root, "IPsec"), s);
  2736. }
  2737. if (s->Cedar->Bridge == false)
  2738. {
  2739. FOLDER *ddns_folder = CfgCreateFolder(root, "DDnsClient");
  2740. if (s->DDnsClient == NULL)
  2741. {
  2742. // Disabled
  2743. CfgAddBool(ddns_folder, "Disabled", true);
  2744. }
  2745. else
  2746. {
  2747. char machine_name[MAX_SIZE];
  2748. BUF *pw;
  2749. INTERNET_SETTING *t;
  2750. // Enabled
  2751. CfgAddBool(ddns_folder, "Disabled", false);
  2752. CfgAddByte(ddns_folder, "Key", s->DDnsClient->Key, SHA1_SIZE);
  2753. GetMachineHostName(machine_name, sizeof(machine_name));
  2754. CfgAddStr(ddns_folder, "LocalHostname", machine_name);
  2755. t = &s->DDnsClient->InternetSetting;
  2756. CfgAddInt(ddns_folder, "ProxyType", t->ProxyType);
  2757. CfgAddStr(ddns_folder, "ProxyHostName", t->ProxyHostName);
  2758. CfgAddInt(ddns_folder, "ProxyPort", t->ProxyPort);
  2759. CfgAddStr(ddns_folder, "ProxyUsername", t->ProxyUsername);
  2760. if (IsEmptyStr(t->ProxyPassword) == false)
  2761. {
  2762. pw = EncryptPassword(t->ProxyPassword);
  2763. CfgAddBuf(ddns_folder, "ProxyPassword", pw);
  2764. FreeBuf(pw);
  2765. }
  2766. }
  2767. }
  2768. CfgAddBool(root, "IPsecMessageDisplayed", s->IPsecMessageDisplayed);
  2769. return root;
  2770. }
  2771. // Read the policy
  2772. void SiLoadPolicyCfg(POLICY *p, FOLDER *f)
  2773. {
  2774. // Validate arguments
  2775. if (f == NULL || p == NULL)
  2776. {
  2777. return;
  2778. }
  2779. Zero(p, sizeof(POLICY));
  2780. // Ver 2
  2781. p->Access = CfgGetBool(f, "Access");
  2782. p->DHCPFilter = CfgGetBool(f, "DHCPFilter");
  2783. p->DHCPNoServer = CfgGetBool(f, "DHCPNoServer");
  2784. p->DHCPForce = CfgGetBool(f, "DHCPForce");
  2785. p->NoBridge = CfgGetBool(f, "NoBridge");
  2786. p->NoRouting = CfgGetBool(f, "NoRouting");
  2787. p->CheckMac = CfgGetBool(f, "CheckMac");
  2788. p->CheckIP = CfgGetBool(f, "CheckIP");
  2789. p->ArpDhcpOnly = CfgGetBool(f, "ArpDhcpOnly");
  2790. p->PrivacyFilter = CfgGetBool(f, "PrivacyFilter");
  2791. p->NoServer = CfgGetBool(f, "NoServer");
  2792. p->NoBroadcastLimiter = CfgGetBool(f, "NoBroadcastLimiter");
  2793. p->MonitorPort = CfgGetBool(f, "MonitorPort");
  2794. p->MaxConnection = CfgGetInt(f, "MaxConnection");
  2795. p->TimeOut = CfgGetInt(f, "TimeOut");
  2796. p->MaxMac = CfgGetInt(f, "MaxMac");
  2797. p->MaxIP = CfgGetInt(f, "MaxIP");
  2798. p->MaxUpload = CfgGetInt(f, "MaxUpload");
  2799. p->MaxDownload = CfgGetInt(f, "MaxDownload");
  2800. p->FixPassword = CfgGetBool(f, "FixPassword");
  2801. p->MultiLogins = CfgGetInt(f, "MultiLogins");
  2802. p->NoQoS = CfgGetBool(f, "NoQoS");
  2803. // Ver 3
  2804. p->RSandRAFilter = CfgGetBool(f, "RSandRAFilter");
  2805. p->RAFilter = CfgGetBool(f, "RAFilter");
  2806. p->DHCPv6Filter = CfgGetBool(f, "DHCPv6Filter");
  2807. p->DHCPv6NoServer = CfgGetBool(f, "DHCPv6NoServer");
  2808. p->NoRoutingV6 = CfgGetBool(f, "NoRoutingV6");
  2809. p->CheckIPv6 = CfgGetBool(f, "CheckIPv6");
  2810. p->NoServerV6 = CfgGetBool(f, "NoServerV6");
  2811. p->MaxIPv6 = CfgGetInt(f, "MaxIPv6");
  2812. p->NoSavePassword = CfgGetBool(f, "NoSavePassword");
  2813. p->AutoDisconnect = CfgGetInt(f, "AutoDisconnect");
  2814. p->FilterIPv4 = CfgGetBool(f, "FilterIPv4");
  2815. p->FilterIPv6 = CfgGetBool(f, "FilterIPv6");
  2816. p->FilterNonIP = CfgGetBool(f, "FilterNonIP");
  2817. p->NoIPv6DefaultRouterInRA = CfgGetBool(f, "NoIPv6DefaultRouterInRA");
  2818. p->NoIPv6DefaultRouterInRAWhenIPv6 = CfgGetBool(f, "NoIPv6DefaultRouterInRAWhenIPv6");
  2819. p->VLanId = CfgGetInt(f, "VLanId");
  2820. }
  2821. // Write the policy
  2822. void SiWritePolicyCfg(FOLDER *f, POLICY *p, bool cascade_mode)
  2823. {
  2824. // Validate arguments
  2825. if (f == NULL || p == NULL)
  2826. {
  2827. return;
  2828. }
  2829. // Ver 2.0
  2830. if (cascade_mode == false)
  2831. {
  2832. CfgAddBool(f, "Access", p->Access);
  2833. }
  2834. CfgAddBool(f, "DHCPFilter", p->DHCPFilter);
  2835. CfgAddBool(f, "DHCPNoServer", p->DHCPNoServer);
  2836. CfgAddBool(f, "DHCPForce", p->DHCPForce);
  2837. if (cascade_mode == false)
  2838. {
  2839. CfgAddBool(f, "NoBridge", p->NoBridge);
  2840. CfgAddBool(f, "NoRouting", p->NoRouting);
  2841. }
  2842. CfgAddBool(f, "CheckMac", p->CheckMac);
  2843. CfgAddBool(f, "CheckIP", p->CheckIP);
  2844. CfgAddBool(f, "ArpDhcpOnly", p->ArpDhcpOnly);
  2845. if (cascade_mode == false)
  2846. {
  2847. CfgAddBool(f, "PrivacyFilter", p->PrivacyFilter);
  2848. }
  2849. CfgAddBool(f, "NoServer", p->NoServer);
  2850. CfgAddBool(f, "NoBroadcastLimiter", p->NoBroadcastLimiter);
  2851. if (cascade_mode == false)
  2852. {
  2853. CfgAddBool(f, "MonitorPort", p->MonitorPort);
  2854. CfgAddInt(f, "MaxConnection", p->MaxConnection);
  2855. CfgAddInt(f, "TimeOut", p->TimeOut);
  2856. }
  2857. CfgAddInt(f, "MaxMac", p->MaxMac);
  2858. CfgAddInt(f, "MaxIP", p->MaxIP);
  2859. CfgAddInt(f, "MaxUpload", p->MaxUpload);
  2860. CfgAddInt(f, "MaxDownload", p->MaxDownload);
  2861. if (cascade_mode == false)
  2862. {
  2863. CfgAddBool(f, "FixPassword", p->FixPassword);
  2864. CfgAddInt(f, "MultiLogins", p->MultiLogins);
  2865. CfgAddBool(f, "NoQoS", p->NoQoS);
  2866. }
  2867. // Ver 3.0
  2868. CfgAddBool(f, "RSandRAFilter", p->RSandRAFilter);
  2869. CfgAddBool(f, "RAFilter", p->RAFilter);
  2870. CfgAddBool(f, "DHCPv6Filter", p->DHCPv6Filter);
  2871. CfgAddBool(f, "DHCPv6NoServer", p->DHCPv6NoServer);
  2872. if (cascade_mode == false)
  2873. {
  2874. CfgAddBool(f, "NoRoutingV6", p->NoRoutingV6);
  2875. }
  2876. CfgAddBool(f, "CheckIPv6", p->CheckIPv6);
  2877. CfgAddBool(f, "NoServerV6", p->NoServerV6);
  2878. CfgAddInt(f, "MaxIPv6", p->MaxIPv6);
  2879. if (cascade_mode == false)
  2880. {
  2881. CfgAddBool(f, "NoSavePassword", p->NoSavePassword);
  2882. CfgAddInt(f, "AutoDisconnect", p->AutoDisconnect);
  2883. }
  2884. CfgAddBool(f, "FilterIPv4", p->FilterIPv4);
  2885. CfgAddBool(f, "FilterIPv6", p->FilterIPv6);
  2886. CfgAddBool(f, "FilterNonIP", p->FilterNonIP);
  2887. CfgAddBool(f, "NoIPv6DefaultRouterInRA", p->NoIPv6DefaultRouterInRA);
  2888. CfgAddBool(f, "NoIPv6DefaultRouterInRAWhenIPv6", p->NoIPv6DefaultRouterInRAWhenIPv6);
  2889. CfgAddInt(f, "VLanId", p->VLanId);
  2890. }
  2891. // Write the link information of the Virtual HUB
  2892. void SiWriteHubLinkCfg(FOLDER *f, LINK *k)
  2893. {
  2894. // Validate arguments
  2895. if (f == NULL || k == NULL)
  2896. {
  2897. return;
  2898. }
  2899. Lock(k->lock);
  2900. {
  2901. // Online
  2902. CfgAddBool(f, "Online", k->Offline ? false : true);
  2903. // Client options
  2904. CiWriteClientOption(CfgCreateFolder(f, "ClientOption"), k->Option);
  2905. // Client authentication data
  2906. CiWriteClientAuth(CfgCreateFolder(f, "ClientAuth"), k->Auth);
  2907. // Policy
  2908. if (k->Policy != NULL)
  2909. {
  2910. SiWritePolicyCfg(CfgCreateFolder(f, "Policy"), k->Policy, true);
  2911. }
  2912. CfgAddBool(f, "CheckServerCert", k->CheckServerCert);
  2913. if (k->ServerCert != NULL)
  2914. {
  2915. BUF *b = XToBuf(k->ServerCert, false);
  2916. CfgAddBuf(f, "ServerCert", b);
  2917. FreeBuf(b);
  2918. }
  2919. }
  2920. Unlock(k->lock);
  2921. }
  2922. // Read the link information
  2923. void SiLoadHubLinkCfg(FOLDER *f, HUB *h)
  2924. {
  2925. bool online;
  2926. CLIENT_OPTION *o;
  2927. CLIENT_AUTH *a;
  2928. FOLDER *pf;
  2929. POLICY p;
  2930. LINK *k;
  2931. // Validate arguments
  2932. if (f == NULL || h == NULL)
  2933. {
  2934. return;
  2935. }
  2936. pf = CfgGetFolder(f, "Policy");
  2937. if (pf == NULL)
  2938. {
  2939. return;
  2940. }
  2941. SiLoadPolicyCfg(&p, pf);
  2942. online = CfgGetBool(f, "Online");
  2943. o = CiLoadClientOption(CfgGetFolder(f, "ClientOption"));
  2944. a = CiLoadClientAuth(CfgGetFolder(f, "ClientAuth"));
  2945. if (o == NULL || a == NULL)
  2946. {
  2947. Free(o);
  2948. CiFreeClientAuth(a);
  2949. return;
  2950. }
  2951. k = NewLink(h->Cedar, h, o, a, &p);
  2952. if (k != NULL)
  2953. {
  2954. BUF *b;
  2955. k->CheckServerCert = CfgGetBool(f, "CheckServerCert");
  2956. b = CfgGetBuf(f, "ServerCert");
  2957. if (b != NULL)
  2958. {
  2959. k->ServerCert = BufToX(b, false);
  2960. FreeBuf(b);
  2961. }
  2962. if (online)
  2963. {
  2964. k->Offline = true;
  2965. SetLinkOnline(k);
  2966. }
  2967. else
  2968. {
  2969. k->Offline = false;
  2970. SetLinkOffline(k);
  2971. }
  2972. ReleaseLink(k);
  2973. }
  2974. Free(o);
  2975. CiFreeClientAuth(a);
  2976. }
  2977. // Write the SecureNAT of the Virtual HUB
  2978. void SiWriteSecureNAT(HUB *h, FOLDER *f)
  2979. {
  2980. // Validate arguments
  2981. if (h == NULL || f == NULL)
  2982. {
  2983. return;
  2984. }
  2985. CfgAddBool(f, "Disabled", h->EnableSecureNAT ? false : true);
  2986. NiWriteVhOptionEx(h->SecureNATOption, f);
  2987. }
  2988. // Read the administration options for the virtual HUB
  2989. void SiLoadHubAdminOptions(HUB *h, FOLDER *f)
  2990. {
  2991. TOKEN_LIST *t;
  2992. // Validate arguments
  2993. if (h == NULL || f == NULL)
  2994. {
  2995. return;
  2996. }
  2997. t = CfgEnumItemToTokenList(f);
  2998. if (t != NULL)
  2999. {
  3000. UINT i;
  3001. LockList(h->AdminOptionList);
  3002. {
  3003. DeleteAllHubAdminOption(h, false);
  3004. for (i = 0;i < t->NumTokens;i++)
  3005. {
  3006. char *name = t->Token[i];
  3007. ADMIN_OPTION *a;
  3008. UINT value = CfgGetInt(f, name);;
  3009. Trim(name);
  3010. a = ZeroMalloc(sizeof(ADMIN_OPTION));
  3011. StrCpy(a->Name, sizeof(a->Name), name);
  3012. a->Value = value;
  3013. Insert(h->AdminOptionList, a);
  3014. }
  3015. AddHubAdminOptionsDefaults(h, false);
  3016. }
  3017. UnlockList(h->AdminOptionList);
  3018. FreeToken(t);
  3019. }
  3020. }
  3021. // Write the administration options for the virtual HUB
  3022. void SiWriteHubAdminOptions(FOLDER *f, HUB *h)
  3023. {
  3024. // Validate arguments
  3025. if (f == NULL || h == NULL)
  3026. {
  3027. return;
  3028. }
  3029. LockList(h->AdminOptionList);
  3030. {
  3031. UINT i;
  3032. for (i = 0;i < LIST_NUM(h->AdminOptionList);i++)
  3033. {
  3034. ADMIN_OPTION *a = LIST_DATA(h->AdminOptionList, i);
  3035. CfgAddInt(f, a->Name, a->Value);
  3036. }
  3037. }
  3038. UnlockList(h->AdminOptionList);
  3039. }
  3040. // Write the link list of the Virtual HUB
  3041. void SiWriteHubLinks(FOLDER *f, HUB *h)
  3042. {
  3043. // Validate arguments
  3044. if (f == NULL || h == NULL)
  3045. {
  3046. return;
  3047. }
  3048. LockList(h->LinkList);
  3049. {
  3050. UINT i;
  3051. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  3052. {
  3053. LINK *k = LIST_DATA(h->LinkList, i);
  3054. char name[MAX_SIZE];
  3055. Format(name, sizeof(name), "Cascade%u", i);
  3056. SiWriteHubLinkCfg(CfgCreateFolder(f, name), k);
  3057. }
  3058. }
  3059. UnlockList(h->LinkList);
  3060. }
  3061. // Read the link list
  3062. void SiLoadHubLinks(HUB *h, FOLDER *f)
  3063. {
  3064. TOKEN_LIST *t;
  3065. UINT i;
  3066. // Validate arguments
  3067. if (h == NULL || f == NULL)
  3068. {
  3069. return;
  3070. }
  3071. t = CfgEnumFolderToTokenList(f);
  3072. for (i = 0;i < t->NumTokens;i++)
  3073. {
  3074. char *name = t->Token[i];
  3075. SiLoadHubLinkCfg(CfgGetFolder(f, name), h);
  3076. }
  3077. FreeToken(t);
  3078. }
  3079. // Write an item of the access list
  3080. void SiWriteHubAccessCfg(FOLDER *f, ACCESS *a)
  3081. {
  3082. // Validate arguments
  3083. if (f == NULL || a == NULL)
  3084. {
  3085. return;
  3086. }
  3087. CfgAddUniStr(f, "Note", a->Note);
  3088. CfgAddBool(f, "Active", a->Active);
  3089. CfgAddInt(f, "Priority", a->Priority);
  3090. CfgAddBool(f, "Discard", a->Discard);
  3091. CfgAddBool(f, "IsIPv6", a->IsIPv6);
  3092. if (a->IsIPv6 == false)
  3093. {
  3094. CfgAddIp32(f, "SrcIpAddress", a->SrcIpAddress);
  3095. CfgAddIp32(f, "SrcSubnetMask", a->SrcSubnetMask);
  3096. CfgAddIp32(f, "DestIpAddress", a->DestIpAddress);
  3097. CfgAddIp32(f, "DestSubnetMask", a->DestSubnetMask);
  3098. }
  3099. else
  3100. {
  3101. CfgAddIp6Addr(f, "SrcIpAddress6", &a->SrcIpAddress6);
  3102. CfgAddIp6Addr(f, "SrcSubnetMask6", &a->SrcSubnetMask6);
  3103. CfgAddIp6Addr(f, "DestIpAddress6", &a->DestIpAddress6);
  3104. CfgAddIp6Addr(f, "DestSubnetMask6", &a->DestSubnetMask6);
  3105. }
  3106. CfgAddInt(f, "Protocol", a->Protocol);
  3107. CfgAddInt(f, "SrcPortStart", a->SrcPortStart);
  3108. CfgAddInt(f, "SrcPortEnd", a->SrcPortEnd);
  3109. CfgAddInt(f, "DestPortStart", a->DestPortStart);
  3110. CfgAddInt(f, "DestPortEnd", a->DestPortEnd);
  3111. CfgAddStr(f, "SrcUsername", a->SrcUsername);
  3112. CfgAddStr(f, "DestUsername", a->DestUsername);
  3113. CfgAddBool(f, "CheckSrcMac", a->CheckSrcMac);
  3114. if (a->CheckSrcMac)
  3115. {
  3116. char tmp[MAX_PATH];
  3117. MacToStr(tmp, sizeof(tmp), a->SrcMacAddress);
  3118. CfgAddStr(f, "SrcMacAddress", tmp);
  3119. MacToStr(tmp, sizeof(tmp), a->SrcMacMask);
  3120. CfgAddStr(f, "SrcMacMask", tmp);
  3121. }
  3122. CfgAddBool(f, "CheckDstMac", a->CheckDstMac);
  3123. if (a->CheckDstMac)
  3124. {
  3125. char tmp[MAX_PATH];
  3126. MacToStr(tmp, sizeof(tmp), a->DstMacAddress);
  3127. CfgAddStr(f, "DstMacAddress", tmp);
  3128. MacToStr(tmp, sizeof(tmp), a->DstMacMask);
  3129. CfgAddStr(f, "DstMacMask", tmp);
  3130. }
  3131. CfgAddBool(f, "CheckTcpState", a->CheckTcpState);
  3132. CfgAddBool(f, "Established", a->Established);
  3133. CfgAddStr(f, "RedirectUrl", a->RedirectUrl);
  3134. CfgAddInt(f, "Delay", a->Delay);
  3135. CfgAddInt(f, "Jitter", a->Jitter);
  3136. CfgAddInt(f, "Loss", a->Loss);
  3137. }
  3138. // Read an item of the access list
  3139. void SiLoadHubAccessCfg(HUB *h, FOLDER *f)
  3140. {
  3141. ACCESS a;
  3142. char tmp[MAX_PATH];
  3143. // Validate arguments
  3144. if (h == NULL || f == NULL)
  3145. {
  3146. return;
  3147. }
  3148. Zero(&a, sizeof(a));
  3149. CfgGetUniStr(f, "Note", a.Note, sizeof(a.Note));
  3150. a.Active = CfgGetBool(f, "Active");
  3151. a.Priority = CfgGetInt(f, "Priority");
  3152. a.Discard = CfgGetBool(f, "Discard");
  3153. a.IsIPv6 = CfgGetBool(f, "IsIPv6");
  3154. if (a.IsIPv6 == false)
  3155. {
  3156. a.SrcIpAddress = CfgGetIp32(f, "SrcIpAddress");
  3157. a.SrcSubnetMask = CfgGetIp32(f, "SrcSubnetMask");
  3158. a.DestIpAddress = CfgGetIp32(f, "DestIpAddress");
  3159. a.DestSubnetMask = CfgGetIp32(f, "DestSubnetMask");
  3160. }
  3161. else
  3162. {
  3163. CfgGetIp6Addr(f, "SrcIpAddress6", &a.SrcIpAddress6);
  3164. CfgGetIp6Addr(f, "SrcSubnetMask6", &a.SrcSubnetMask6);
  3165. CfgGetIp6Addr(f, "DestIpAddress6", &a.DestIpAddress6);
  3166. CfgGetIp6Addr(f, "DestSubnetMask6", &a.DestSubnetMask6);
  3167. }
  3168. a.Protocol = CfgGetInt(f, "Protocol");
  3169. a.SrcPortStart = CfgGetInt(f, "SrcPortStart");
  3170. a.SrcPortEnd = CfgGetInt(f, "SrcPortEnd");
  3171. a.DestPortStart = CfgGetInt(f, "DestPortStart");
  3172. a.DestPortEnd = CfgGetInt(f, "DestPortEnd");
  3173. CfgGetStr(f, "SrcUsername", a.SrcUsername, sizeof(a.SrcUsername));
  3174. CfgGetStr(f, "DestUsername", a.DestUsername, sizeof(a.DestUsername));
  3175. a.CheckSrcMac = CfgGetBool(f, "CheckSrcMac");
  3176. if (CfgGetByte(f, "SrcMacAddress", a.SrcMacAddress, sizeof(a.SrcMacAddress)) == 0)
  3177. {
  3178. CfgGetStr(f, "SrcMacAddress", tmp, sizeof(tmp));
  3179. if (StrToMac(a.SrcMacAddress, tmp) == false)
  3180. {
  3181. a.CheckSrcMac = false;
  3182. }
  3183. }
  3184. if (CfgGetByte(f, "SrcMacMask", a.SrcMacMask, sizeof(a.SrcMacMask)) == 0)
  3185. {
  3186. CfgGetStr(f, "SrcMacMask", tmp, sizeof(tmp));
  3187. if (StrToMac(a.SrcMacMask, tmp) == false)
  3188. {
  3189. a.CheckSrcMac = false;
  3190. }
  3191. }
  3192. a.CheckDstMac = CfgGetBool(f, "CheckDstMac");
  3193. if (CfgGetByte(f, "DstMacAddress", a.DstMacAddress, sizeof(a.DstMacAddress)) == 0)
  3194. {
  3195. CfgGetStr(f, "DstMacAddress", tmp, sizeof(tmp));
  3196. if (StrToMac(a.DstMacAddress, tmp) == false)
  3197. {
  3198. a.CheckDstMac = false;
  3199. }
  3200. }
  3201. if (CfgGetByte(f, "DstMacMask", a.DstMacMask, sizeof(a.DstMacMask)) == 0)
  3202. {
  3203. CfgGetStr(f, "DstMacMask", tmp, sizeof(tmp));
  3204. if (StrToMac(a.DstMacMask, tmp) == false)
  3205. {
  3206. a.CheckDstMac = false;
  3207. }
  3208. }
  3209. a.CheckTcpState = CfgGetBool(f, "CheckTcpState");
  3210. a.Established = CfgGetBool(f, "Established");
  3211. a.Delay = MAKESURE(CfgGetInt(f, "Delay"), 0, HUB_ACCESSLIST_DELAY_MAX);
  3212. a.Jitter = MAKESURE(CfgGetInt(f, "Jitter"), 0, HUB_ACCESSLIST_JITTER_MAX);
  3213. a.Loss = MAKESURE(CfgGetInt(f, "Loss"), 0, HUB_ACCESSLIST_LOSS_MAX);
  3214. CfgGetStr(f, "RedirectUrl", a.RedirectUrl, sizeof(a.RedirectUrl));
  3215. AddAccessList(h, &a);
  3216. }
  3217. // Write the access list
  3218. void SiWriteHubAccessLists(FOLDER *f, HUB *h)
  3219. {
  3220. // Validate arguments
  3221. if (f == NULL || h == NULL)
  3222. {
  3223. return;
  3224. }
  3225. LockList(h->AccessList);
  3226. {
  3227. UINT i;
  3228. for (i = 0;i < LIST_NUM(h->AccessList);i++)
  3229. {
  3230. ACCESS *a = LIST_DATA(h->AccessList, i);
  3231. char name[MAX_SIZE];
  3232. ToStr(name, a->Id);
  3233. SiWriteHubAccessCfg(CfgCreateFolder(f, name), a);
  3234. }
  3235. }
  3236. UnlockList(h->AccessList);
  3237. }
  3238. // Read the access list
  3239. void SiLoadHubAccessLists(HUB *h, FOLDER *f)
  3240. {
  3241. TOKEN_LIST *t;
  3242. UINT i;
  3243. // Validate arguments
  3244. if (f == NULL || h == NULL)
  3245. {
  3246. return;
  3247. }
  3248. t = CfgEnumFolderToTokenList(f);
  3249. for (i = 0;i < t->NumTokens;i++)
  3250. {
  3251. char *name = t->Token[i];
  3252. UINT id = ToInt(name);
  3253. SiLoadHubAccessCfg(h, CfgGetFolder(f, name));
  3254. }
  3255. FreeToken(t);
  3256. }
  3257. // Read the HUB_OPTION
  3258. void SiLoadHubOptionCfg(FOLDER *f, HUB_OPTION *o)
  3259. {
  3260. char tmp[MAX_SIZE];
  3261. // Validate arguments
  3262. if (f == NULL || o == NULL)
  3263. {
  3264. return;
  3265. }
  3266. o->MaxSession = CfgGetInt(f, "MaxSession");
  3267. o->NoArpPolling = CfgGetBool(f, "NoArpPolling");
  3268. o->NoIPv6AddrPolling = CfgGetBool(f, "NoIPv6AddrPolling");
  3269. o->NoIpTable = CfgGetBool(f, "NoIpTable");
  3270. o->NoEnum = CfgGetBool(f, "NoEnum");
  3271. o->FilterPPPoE = CfgGetBool(f, "FilterPPPoE");
  3272. o->FilterOSPF = CfgGetBool(f, "FilterOSPF");
  3273. o->FilterIPv4 = CfgGetBool(f, "FilterIPv4");
  3274. o->FilterIPv6 = CfgGetBool(f, "FilterIPv6");
  3275. o->FilterNonIP = CfgGetBool(f, "FilterNonIP");
  3276. o->FilterBPDU = CfgGetBool(f, "FilterBPDU");
  3277. o->NoIPv4PacketLog = CfgGetBool(f, "NoIPv4PacketLog");
  3278. o->NoIPv6PacketLog = CfgGetBool(f, "NoIPv6PacketLog");
  3279. o->NoIPv6DefaultRouterInRAWhenIPv6 = CfgGetBool(f, "NoIPv6DefaultRouterInRAWhenIPv6");
  3280. o->DisableIPParsing = CfgGetBool(f, "DisableIPParsing");
  3281. o->YieldAfterStorePacket = CfgGetBool(f, "YieldAfterStorePacket");
  3282. o->NoSpinLockForPacketDelay = CfgGetBool(f, "NoSpinLockForPacketDelay");
  3283. o->BroadcastStormDetectionThreshold = CfgGetInt(f, "BroadcastStormDetectionThreshold");
  3284. o->ClientMinimumRequiredBuild = CfgGetInt(f, "ClientMinimumRequiredBuild");
  3285. o->RequiredClientId = CfgGetInt(f, "RequiredClientId");
  3286. o->NoManageVlanId = CfgGetBool(f, "NoManageVlanId");
  3287. o->VlanTypeId = 0;
  3288. if (CfgGetStr(f, "VlanTypeId", tmp, sizeof(tmp)))
  3289. {
  3290. o->VlanTypeId = HexToInt(tmp);
  3291. }
  3292. if (o->VlanTypeId == 0)
  3293. {
  3294. o->VlanTypeId = MAC_PROTO_TAGVLAN;
  3295. }
  3296. o->FixForDLinkBPDU = CfgGetBool(f, "FixForDLinkBPDU");
  3297. o->BroadcastLimiterStrictMode = CfgGetBool(f, "BroadcastLimiterStrictMode");
  3298. o->MaxLoggedPacketsPerMinute = CfgGetInt(f, "MaxLoggedPacketsPerMinute");
  3299. o->DoNotSaveHeavySecurityLogs = CfgGetBool(f, "DoNotSaveHeavySecurityLogs");
  3300. if (CfgIsItem(f, "DropBroadcastsInPrivacyFilterMode"))
  3301. {
  3302. o->DropBroadcastsInPrivacyFilterMode = CfgGetBool(f, "DropBroadcastsInPrivacyFilterMode");
  3303. }
  3304. else
  3305. {
  3306. o->DropBroadcastsInPrivacyFilterMode = true;
  3307. }
  3308. if (CfgIsItem(f, "DropArpInPrivacyFilterMode"))
  3309. {
  3310. o->DropArpInPrivacyFilterMode = CfgGetBool(f, "DropArpInPrivacyFilterMode");
  3311. }
  3312. else
  3313. {
  3314. o->DropArpInPrivacyFilterMode = true;
  3315. }
  3316. o->NoLookBPDUBridgeId = CfgGetBool(f, "NoLookBPDUBridgeId");
  3317. o->AdjustTcpMssValue = CfgGetInt(f, "AdjustTcpMssValue");
  3318. o->DisableAdjustTcpMss = CfgGetBool(f, "DisableAdjustTcpMss");
  3319. if (CfgIsItem(f, "NoDhcpPacketLogOutsideHub"))
  3320. {
  3321. o->NoDhcpPacketLogOutsideHub = CfgGetBool(f, "NoDhcpPacketLogOutsideHub");
  3322. }
  3323. else
  3324. {
  3325. o->NoDhcpPacketLogOutsideHub = true;
  3326. }
  3327. o->DisableHttpParsing = CfgGetBool(f, "DisableHttpParsing");
  3328. o->DisableUdpAcceleration = CfgGetBool(f, "DisableUdpAcceleration");
  3329. o->DisableUdpFilterForLocalBridgeNic = CfgGetBool(f, "DisableUdpFilterForLocalBridgeNic");
  3330. o->ApplyIPv4AccessListOnArpPacket = CfgGetBool(f, "ApplyIPv4AccessListOnArpPacket");
  3331. if (CfgIsItem(f, "RemoveDefGwOnDhcpForLocalhost"))
  3332. {
  3333. o->RemoveDefGwOnDhcpForLocalhost = CfgGetBool(f, "RemoveDefGwOnDhcpForLocalhost");
  3334. }
  3335. else
  3336. {
  3337. o->RemoveDefGwOnDhcpForLocalhost = true;
  3338. }
  3339. o->SecureNAT_MaxTcpSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxTcpSessionsPerIp");
  3340. o->SecureNAT_MaxTcpSynSentPerIp = CfgGetInt(f, "SecureNAT_MaxTcpSynSentPerIp");
  3341. o->SecureNAT_MaxUdpSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxUdpSessionsPerIp");
  3342. o->SecureNAT_MaxDnsSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxDnsSessionsPerIp");
  3343. o->SecureNAT_MaxIcmpSessionsPerIp = CfgGetInt(f, "SecureNAT_MaxIcmpSessionsPerIp");
  3344. o->AccessListIncludeFileCacheLifetime = CfgGetInt(f, "AccessListIncludeFileCacheLifetime");
  3345. if (o->AccessListIncludeFileCacheLifetime == 0)
  3346. {
  3347. o->AccessListIncludeFileCacheLifetime = ACCESS_LIST_INCLUDE_FILE_CACHE_LIFETIME;
  3348. }
  3349. o->DisableKernelModeSecureNAT = CfgGetBool(f, "DisableKernelModeSecureNAT");
  3350. o->DisableUserModeSecureNAT = CfgGetBool(f, "DisableUserModeSecureNAT");
  3351. o->DisableCheckMacOnLocalBridge = CfgGetBool(f, "DisableCheckMacOnLocalBridge");
  3352. o->DisableCorrectIpOffloadChecksum = CfgGetBool(f, "DisableCorrectIpOffloadChecksum");
  3353. o->SuppressClientUpdateNotification = CfgGetBool(f, "SuppressClientUpdateNotification");
  3354. // Enabled by default
  3355. if (CfgIsItem(f, "ManageOnlyPrivateIP"))
  3356. {
  3357. o->ManageOnlyPrivateIP = CfgGetBool(f, "ManageOnlyPrivateIP");
  3358. }
  3359. else
  3360. {
  3361. o->ManageOnlyPrivateIP = true;
  3362. }
  3363. if (CfgIsItem(f, "ManageOnlyLocalUnicastIPv6"))
  3364. {
  3365. o->ManageOnlyLocalUnicastIPv6 = CfgGetBool(f, "ManageOnlyLocalUnicastIPv6");
  3366. }
  3367. else
  3368. {
  3369. o->ManageOnlyLocalUnicastIPv6 = true;
  3370. }
  3371. if (CfgIsItem(f, "NoMacAddressLog"))
  3372. {
  3373. o->NoMacAddressLog = CfgGetBool(f, "NoMacAddressLog");
  3374. }
  3375. else
  3376. {
  3377. o->NoMacAddressLog = true;
  3378. }
  3379. }
  3380. // Write the HUB_OPTION
  3381. void SiWriteHubOptionCfg(FOLDER *f, HUB_OPTION *o)
  3382. {
  3383. char tmp[MAX_SIZE];
  3384. // Validate arguments
  3385. if (f == NULL || o == NULL)
  3386. {
  3387. return;
  3388. }
  3389. CfgAddInt(f, "MaxSession", o->MaxSession);
  3390. CfgAddBool(f, "NoArpPolling", o->NoArpPolling);
  3391. CfgAddBool(f, "NoIPv6AddrPolling", o->NoIPv6AddrPolling);
  3392. CfgAddBool(f, "NoIpTable", o->NoIpTable);
  3393. CfgAddBool(f, "NoEnum", o->NoEnum);
  3394. CfgAddBool(f, "FilterPPPoE", o->FilterPPPoE);
  3395. CfgAddBool(f, "FilterOSPF", o->FilterOSPF);
  3396. CfgAddBool(f, "FilterIPv4", o->FilterIPv4);
  3397. CfgAddBool(f, "FilterIPv6", o->FilterIPv6);
  3398. CfgAddBool(f, "FilterNonIP", o->FilterNonIP);
  3399. CfgAddBool(f, "NoIPv4PacketLog", o->NoIPv4PacketLog);
  3400. CfgAddBool(f, "NoIPv6PacketLog", o->NoIPv6PacketLog);
  3401. CfgAddBool(f, "FilterBPDU", o->FilterBPDU);
  3402. CfgAddBool(f, "NoIPv6DefaultRouterInRAWhenIPv6", o->NoIPv6DefaultRouterInRAWhenIPv6);
  3403. CfgAddBool(f, "NoMacAddressLog", o->NoMacAddressLog);
  3404. CfgAddBool(f, "ManageOnlyPrivateIP", o->ManageOnlyPrivateIP);
  3405. CfgAddBool(f, "ManageOnlyLocalUnicastIPv6", o->ManageOnlyLocalUnicastIPv6);
  3406. CfgAddBool(f, "DisableIPParsing", o->DisableIPParsing);
  3407. CfgAddBool(f, "YieldAfterStorePacket", o->YieldAfterStorePacket);
  3408. CfgAddBool(f, "NoSpinLockForPacketDelay", o->NoSpinLockForPacketDelay);
  3409. CfgAddInt(f, "BroadcastStormDetectionThreshold", o->BroadcastStormDetectionThreshold);
  3410. CfgAddInt(f, "ClientMinimumRequiredBuild", o->ClientMinimumRequiredBuild);
  3411. CfgAddInt(f, "RequiredClientId", o->RequiredClientId);
  3412. CfgAddBool(f, "NoManageVlanId", o->NoManageVlanId);
  3413. Format(tmp, sizeof(tmp), "0x%x", o->VlanTypeId);
  3414. CfgAddStr(f, "VlanTypeId", tmp);
  3415. if (o->FixForDLinkBPDU)
  3416. {
  3417. CfgAddBool(f, "FixForDLinkBPDU", o->FixForDLinkBPDU);
  3418. }
  3419. CfgAddBool(f, "BroadcastLimiterStrictMode", o->BroadcastLimiterStrictMode);
  3420. CfgAddInt(f, "MaxLoggedPacketsPerMinute", o->MaxLoggedPacketsPerMinute);
  3421. CfgAddBool(f, "DoNotSaveHeavySecurityLogs", o->DoNotSaveHeavySecurityLogs);
  3422. CfgAddBool(f, "DropBroadcastsInPrivacyFilterMode", o->DropBroadcastsInPrivacyFilterMode);
  3423. CfgAddBool(f, "DropArpInPrivacyFilterMode", o->DropArpInPrivacyFilterMode);
  3424. CfgAddBool(f, "SuppressClientUpdateNotification", o->SuppressClientUpdateNotification);
  3425. CfgAddBool(f, "NoLookBPDUBridgeId", o->NoLookBPDUBridgeId);
  3426. CfgAddInt(f, "AdjustTcpMssValue", o->AdjustTcpMssValue);
  3427. CfgAddBool(f, "DisableAdjustTcpMss", o->DisableAdjustTcpMss);
  3428. CfgAddBool(f, "NoDhcpPacketLogOutsideHub", o->NoDhcpPacketLogOutsideHub);
  3429. CfgAddBool(f, "DisableHttpParsing", o->DisableHttpParsing);
  3430. CfgAddBool(f, "DisableUdpAcceleration", o->DisableUdpAcceleration);
  3431. CfgAddBool(f, "DisableUdpFilterForLocalBridgeNic", o->DisableUdpFilterForLocalBridgeNic);
  3432. CfgAddBool(f, "ApplyIPv4AccessListOnArpPacket", o->ApplyIPv4AccessListOnArpPacket);
  3433. CfgAddBool(f, "RemoveDefGwOnDhcpForLocalhost", o->RemoveDefGwOnDhcpForLocalhost);
  3434. CfgAddInt(f, "SecureNAT_MaxTcpSessionsPerIp", o->SecureNAT_MaxTcpSessionsPerIp);
  3435. CfgAddInt(f, "SecureNAT_MaxTcpSynSentPerIp", o->SecureNAT_MaxTcpSynSentPerIp);
  3436. CfgAddInt(f, "SecureNAT_MaxUdpSessionsPerIp", o->SecureNAT_MaxUdpSessionsPerIp);
  3437. CfgAddInt(f, "SecureNAT_MaxDnsSessionsPerIp", o->SecureNAT_MaxDnsSessionsPerIp);
  3438. CfgAddInt(f, "SecureNAT_MaxIcmpSessionsPerIp", o->SecureNAT_MaxIcmpSessionsPerIp);
  3439. CfgAddInt(f, "AccessListIncludeFileCacheLifetime", o->AccessListIncludeFileCacheLifetime);
  3440. CfgAddBool(f, "DisableKernelModeSecureNAT", o->DisableKernelModeSecureNAT);
  3441. CfgAddBool(f, "DisableUserModeSecureNAT", o->DisableUserModeSecureNAT);
  3442. CfgAddBool(f, "DisableCheckMacOnLocalBridge", o->DisableCheckMacOnLocalBridge);
  3443. CfgAddBool(f, "DisableCorrectIpOffloadChecksum", o->DisableCorrectIpOffloadChecksum);
  3444. }
  3445. // Write the user
  3446. void SiWriteUserCfg(FOLDER *f, USER *u)
  3447. {
  3448. BUF *b;
  3449. AUTHPASSWORD *password;
  3450. AUTHRADIUS *radius;
  3451. AUTHNT *nt;
  3452. AUTHUSERCERT *usercert;
  3453. AUTHROOTCERT *rootcert;
  3454. // Validate arguments
  3455. if (f == NULL || u == NULL)
  3456. {
  3457. return;
  3458. }
  3459. Lock(u->lock);
  3460. {
  3461. CfgAddUniStr(f, "RealName", u->RealName);
  3462. CfgAddUniStr(f, "Note", u->Note);
  3463. if (u->Group != NULL)
  3464. {
  3465. CfgAddStr(f, "GroupName", u->GroupName);
  3466. }
  3467. CfgAddInt64(f, "CreatedTime", u->CreatedTime);
  3468. CfgAddInt64(f, "UpdatedTime", u->UpdatedTime);
  3469. CfgAddInt64(f, "ExpireTime", u->ExpireTime);
  3470. CfgAddInt64(f, "LastLoginTime", u->LastLoginTime);
  3471. CfgAddInt(f, "NumLogin", u->NumLogin);
  3472. if (u->Policy != NULL)
  3473. {
  3474. SiWritePolicyCfg(CfgCreateFolder(f, "Policy"), u->Policy, false);
  3475. }
  3476. SiWriteTraffic(f, "Traffic", u->Traffic);
  3477. CfgAddInt(f, "AuthType", u->AuthType);
  3478. if (u->AuthData != NULL)
  3479. {
  3480. switch (u->AuthType)
  3481. {
  3482. case AUTHTYPE_ANONYMOUS:
  3483. break;
  3484. case AUTHTYPE_PASSWORD:
  3485. password = (AUTHPASSWORD *)u->AuthData;
  3486. CfgAddByte(f, "AuthPassword", password->HashedKey, sizeof(password->HashedKey));
  3487. if (IsZero(password->NtLmSecureHash, sizeof(password->NtLmSecureHash)) == false)
  3488. {
  3489. CfgAddByte(f, "AuthNtLmSecureHash", password->NtLmSecureHash, sizeof(password->NtLmSecureHash));
  3490. }
  3491. break;
  3492. case AUTHTYPE_NT:
  3493. nt = (AUTHNT *)u->AuthData;
  3494. CfgAddUniStr(f, "AuthNtUserName", nt->NtUsername);
  3495. break;
  3496. case AUTHTYPE_RADIUS:
  3497. radius = (AUTHRADIUS *)u->AuthData;
  3498. CfgAddUniStr(f, "AuthRadiusUsername", radius->RadiusUsername);
  3499. break;
  3500. case AUTHTYPE_USERCERT:
  3501. usercert = (AUTHUSERCERT *)u->AuthData;
  3502. b = XToBuf(usercert->UserX, false);
  3503. if (b != NULL)
  3504. {
  3505. CfgAddBuf(f, "AuthUserCert", b);
  3506. FreeBuf(b);
  3507. }
  3508. break;
  3509. case AUTHTYPE_ROOTCERT:
  3510. rootcert = (AUTHROOTCERT *)u->AuthData;
  3511. if (rootcert->Serial != NULL && rootcert->Serial->size >= 1)
  3512. {
  3513. CfgAddByte(f, "AuthSerial", rootcert->Serial->data, rootcert->Serial->size);
  3514. }
  3515. if (rootcert->CommonName != NULL && UniIsEmptyStr(rootcert->CommonName) == false)
  3516. {
  3517. CfgAddUniStr(f, "AuthCommonName", rootcert->CommonName);
  3518. }
  3519. break;
  3520. }
  3521. }
  3522. }
  3523. Unlock(u->lock);
  3524. }
  3525. // Read an user
  3526. void SiLoadUserCfg(HUB *h, FOLDER *f)
  3527. {
  3528. char *username;
  3529. wchar_t realname[MAX_SIZE];
  3530. wchar_t note[MAX_SIZE];
  3531. char groupname[MAX_SIZE];
  3532. FOLDER *pf;
  3533. UINT64 created_time;
  3534. UINT64 updated_time;
  3535. UINT64 expire_time;
  3536. UINT64 last_login_time;
  3537. UINT num_login;
  3538. POLICY p;
  3539. TRAFFIC t;
  3540. BUF *b;
  3541. UINT authtype;
  3542. void *authdata;
  3543. X_SERIAL *serial = NULL;
  3544. wchar_t common_name[MAX_SIZE];
  3545. UCHAR hashed_password[SHA1_SIZE];
  3546. UCHAR md4_password[MD5_SIZE];
  3547. wchar_t tmp[MAX_SIZE];
  3548. USER *u;
  3549. USERGROUP *g;
  3550. // Validate arguments
  3551. if (h == NULL || f == NULL)
  3552. {
  3553. return;
  3554. }
  3555. username = f->Name;
  3556. CfgGetUniStr(f, "RealName", realname, sizeof(realname));
  3557. CfgGetUniStr(f, "Note", note, sizeof(note));
  3558. CfgGetStr(f, "GroupName", groupname, sizeof(groupname));
  3559. created_time = CfgGetInt64(f, "CreatedTime");
  3560. updated_time = CfgGetInt64(f, "UpdatedTime");
  3561. expire_time = CfgGetInt64(f, "ExpireTime");
  3562. last_login_time = CfgGetInt64(f, "LastLoginTime");
  3563. num_login = CfgGetInt(f, "NumLogin");
  3564. pf = CfgGetFolder(f, "Policy");
  3565. if (pf != NULL)
  3566. {
  3567. SiLoadPolicyCfg(&p, pf);
  3568. }
  3569. SiLoadTraffic(f, "Traffic", &t);
  3570. authtype = CfgGetInt(f, "AuthType");
  3571. authdata = NULL;
  3572. switch (authtype)
  3573. {
  3574. case AUTHTYPE_PASSWORD:
  3575. Zero(hashed_password, sizeof(hashed_password));
  3576. Zero(md4_password, sizeof(md4_password));
  3577. CfgGetByte(f, "AuthPassword", hashed_password, sizeof(hashed_password));
  3578. CfgGetByte(f, "AuthNtLmSecureHash", md4_password, sizeof(md4_password));
  3579. authdata = NewPasswordAuthDataRaw(hashed_password, md4_password);
  3580. break;
  3581. case AUTHTYPE_NT:
  3582. if (CfgGetUniStr(f, "AuthNtUserName", tmp, sizeof(tmp)))
  3583. {
  3584. authdata = NewNTAuthData(tmp);
  3585. }
  3586. else
  3587. {
  3588. authdata = NewNTAuthData(NULL);
  3589. }
  3590. break;
  3591. case AUTHTYPE_RADIUS:
  3592. if (CfgGetUniStr(f, "AuthRadiusUsername", tmp, sizeof(tmp)))
  3593. {
  3594. authdata = NewRadiusAuthData(tmp);
  3595. }
  3596. else
  3597. {
  3598. authdata = NewRadiusAuthData(NULL);
  3599. }
  3600. break;
  3601. case AUTHTYPE_USERCERT:
  3602. b = CfgGetBuf(f, "AuthUserCert");
  3603. if (b != NULL)
  3604. {
  3605. X *x = BufToX(b, false);
  3606. if (x != NULL)
  3607. {
  3608. authdata = NewUserCertAuthData(x);
  3609. FreeX(x);
  3610. }
  3611. FreeBuf(b);
  3612. }
  3613. break;
  3614. case AUTHTYPE_ROOTCERT:
  3615. b = CfgGetBuf(f, "AuthSerial");
  3616. if (b != NULL)
  3617. {
  3618. serial = NewXSerial(b->Buf, b->Size);
  3619. FreeBuf(b);
  3620. }
  3621. CfgGetUniStr(f, "AuthCommonName", common_name, sizeof(common_name));
  3622. authdata = NewRootCertAuthData(serial, common_name);
  3623. break;
  3624. }
  3625. // Add an user
  3626. AcLock(h);
  3627. {
  3628. if (StrLen(groupname) > 0)
  3629. {
  3630. g = AcGetGroup(h, groupname);
  3631. }
  3632. else
  3633. {
  3634. g = NULL;
  3635. }
  3636. u = NewUser(username, realname, note, authtype, authdata);
  3637. if (u != NULL)
  3638. {
  3639. if (g != NULL)
  3640. {
  3641. JoinUserToGroup(u, g);
  3642. }
  3643. SetUserTraffic(u, &t);
  3644. if (pf != NULL)
  3645. {
  3646. SetUserPolicy(u, &p);
  3647. }
  3648. Lock(u->lock);
  3649. {
  3650. u->CreatedTime = created_time;
  3651. u->UpdatedTime = updated_time;
  3652. u->ExpireTime = expire_time;
  3653. u->LastLoginTime = last_login_time;
  3654. u->NumLogin = num_login;
  3655. }
  3656. Unlock(u->lock);
  3657. AcAddUser(h, u);
  3658. ReleaseUser(u);
  3659. }
  3660. if (g != NULL)
  3661. {
  3662. ReleaseGroup(g);
  3663. }
  3664. }
  3665. AcUnlock(h);
  3666. if (serial != NULL)
  3667. {
  3668. FreeXSerial(serial);
  3669. }
  3670. }
  3671. // Write the user list
  3672. void SiWriteUserList(FOLDER *f, LIST *o)
  3673. {
  3674. // Validate arguments
  3675. if (f == NULL || o == NULL)
  3676. {
  3677. return;
  3678. }
  3679. LockList(o);
  3680. {
  3681. UINT i;
  3682. for (i = 0;i < LIST_NUM(o);i++)
  3683. {
  3684. USER *u = LIST_DATA(o, i);
  3685. SiWriteUserCfg(CfgCreateFolder(f, u->Name), u);
  3686. }
  3687. }
  3688. UnlockList(o);
  3689. }
  3690. // Read the user list
  3691. void SiLoadUserList(HUB *h, FOLDER *f)
  3692. {
  3693. TOKEN_LIST *t;
  3694. UINT i;
  3695. char *name;
  3696. // Validate arguments
  3697. if (f == NULL || h == NULL)
  3698. {
  3699. return;
  3700. }
  3701. t = CfgEnumFolderToTokenList(f);
  3702. for (i = 0;i < t->NumTokens;i++)
  3703. {
  3704. FOLDER *ff;
  3705. name = t->Token[i];
  3706. ff = CfgGetFolder(f, name);
  3707. SiLoadUserCfg(h, ff);
  3708. }
  3709. FreeToken(t);
  3710. }
  3711. // Write the group information
  3712. void SiWriteGroupCfg(FOLDER *f, USERGROUP *g)
  3713. {
  3714. // Validate arguments
  3715. if (f == NULL || g == NULL)
  3716. {
  3717. return;
  3718. }
  3719. Lock(g->lock);
  3720. {
  3721. CfgAddUniStr(f, "RealName", g->RealName);
  3722. CfgAddUniStr(f, "Note", g->Note);
  3723. if (g->Policy != NULL)
  3724. {
  3725. SiWritePolicyCfg(CfgCreateFolder(f, "Policy"), g->Policy, false);
  3726. }
  3727. SiWriteTraffic(f, "Traffic", g->Traffic);
  3728. }
  3729. Unlock(g->lock);
  3730. }
  3731. // Read the group information
  3732. void SiLoadGroupCfg(HUB *h, FOLDER *f)
  3733. {
  3734. wchar_t realname[MAX_SIZE];
  3735. wchar_t note[MAX_SIZE];
  3736. char *name;
  3737. FOLDER *pf;
  3738. POLICY p;
  3739. TRAFFIC t;
  3740. USERGROUP *g;
  3741. // Validate arguments
  3742. if (h == NULL || f == NULL)
  3743. {
  3744. return;
  3745. }
  3746. name = f->Name;
  3747. CfgGetUniStr(f, "RealName", realname, sizeof(realname));
  3748. CfgGetUniStr(f, "Note", note, sizeof(note));
  3749. pf = CfgGetFolder(f, "Policy");
  3750. if (pf != NULL)
  3751. {
  3752. SiLoadPolicyCfg(&p, pf);
  3753. }
  3754. SiLoadTraffic(f, "Traffic", &t);
  3755. g = NewGroup(name, realname, note);
  3756. if (g == NULL)
  3757. {
  3758. return;
  3759. }
  3760. if (pf != NULL)
  3761. {
  3762. SetGroupPolicy(g, &p);
  3763. }
  3764. SetGroupTraffic(g, &t);
  3765. AcLock(h);
  3766. {
  3767. AcAddGroup(h, g);
  3768. }
  3769. AcUnlock(h);
  3770. ReleaseGroup(g);
  3771. }
  3772. // Write the group list
  3773. void SiWriteGroupList(FOLDER *f, LIST *o)
  3774. {
  3775. // Validate arguments
  3776. if (f == NULL || o == NULL)
  3777. {
  3778. return;
  3779. }
  3780. LockList(o);
  3781. {
  3782. UINT i;
  3783. for (i = 0;i < LIST_NUM(o);i++)
  3784. {
  3785. USERGROUP *g = LIST_DATA(o, i);
  3786. SiWriteGroupCfg(CfgCreateFolder(f, g->Name), g);
  3787. }
  3788. }
  3789. UnlockList(o);
  3790. }
  3791. // Read the group List
  3792. void SiLoadGroupList(HUB *h, FOLDER *f)
  3793. {
  3794. TOKEN_LIST *t;
  3795. UINT i;
  3796. char *name;
  3797. // Validate arguments
  3798. if (f == NULL || h == NULL)
  3799. {
  3800. return;
  3801. }
  3802. t = CfgEnumFolderToTokenList(f);
  3803. for (i = 0;i < t->NumTokens;i++)
  3804. {
  3805. name = t->Token[i];
  3806. SiLoadGroupCfg(h, CfgGetFolder(f, name));
  3807. }
  3808. FreeToken(t);
  3809. }
  3810. // Write the AC list
  3811. void SiWriteAcList(FOLDER *f, LIST *o)
  3812. {
  3813. // Validate arguments
  3814. if (f == NULL || o == NULL)
  3815. {
  3816. return;
  3817. }
  3818. LockList(o);
  3819. {
  3820. UINT i;
  3821. for (i = 0;i < LIST_NUM(o);i++)
  3822. {
  3823. char name[MAX_SIZE];
  3824. AC *ac = LIST_DATA(o, i);
  3825. FOLDER *ff;
  3826. Format(name, sizeof(name), "Acl%u", i + 1);
  3827. ff = CfgCreateFolder(f, name);
  3828. CfgAddBool(ff, "Deny", ac->Deny);
  3829. CfgAddInt(ff, "Priority", ac->Priority);
  3830. CfgAddIp(ff, "IpAddress", &ac->IpAddress);
  3831. if (ac->Masked)
  3832. {
  3833. CfgAddIp(ff, "NetMask", &ac->SubnetMask);
  3834. }
  3835. }
  3836. }
  3837. UnlockList(o);
  3838. }
  3839. // Read the AC list
  3840. void SiLoadAcList(LIST *o, FOLDER *f)
  3841. {
  3842. // Validate arguments
  3843. if (o == NULL || f == NULL)
  3844. {
  3845. return;
  3846. }
  3847. LockList(o);
  3848. {
  3849. TOKEN_LIST *t = CfgEnumFolderToTokenList(f);
  3850. if (t != NULL)
  3851. {
  3852. UINT i;
  3853. for (i = 0;i < t->NumTokens;i++)
  3854. {
  3855. FOLDER *ff = CfgGetFolder(f, t->Token[i]);
  3856. if (ff != NULL)
  3857. {
  3858. AC ac;
  3859. Zero(&ac, sizeof(ac));
  3860. ac.Deny = CfgGetBool(ff, "Deny");
  3861. ac.Priority = CfgGetInt(ff, "Priority");
  3862. CfgGetIp(ff, "IpAddress", &ac.IpAddress);
  3863. if (CfgGetIp(ff, "NetMask", &ac.SubnetMask))
  3864. {
  3865. ac.Masked = true;
  3866. }
  3867. AddAc(o, &ac);
  3868. }
  3869. }
  3870. FreeToken(t);
  3871. }
  3872. }
  3873. UnlockList(o);
  3874. }
  3875. // Write the certificate revocation list
  3876. void SiWriteCrlList(FOLDER *f, LIST *o)
  3877. {
  3878. // Validate arguments
  3879. if (f == NULL || o == NULL)
  3880. {
  3881. return;
  3882. }
  3883. LockList(o);
  3884. {
  3885. UINT i;
  3886. for (i = 0;i < LIST_NUM(o);i++)
  3887. {
  3888. char name[MAX_SIZE];
  3889. CRL *crl = LIST_DATA(o, i);
  3890. FOLDER *ff;
  3891. NAME *n;
  3892. Format(name, sizeof(name), "Crl%u", i);
  3893. ff = CfgCreateFolder(f, name);
  3894. n = crl->Name;
  3895. if (UniIsEmptyStr(n->CommonName) == false)
  3896. {
  3897. CfgAddUniStr(ff, "CommonName", n->CommonName);
  3898. }
  3899. if (UniIsEmptyStr(n->Organization) == false)
  3900. {
  3901. CfgAddUniStr(ff, "Organization", n->Organization);
  3902. }
  3903. if (UniIsEmptyStr(n->Unit) == false)
  3904. {
  3905. CfgAddUniStr(ff, "Unit", n->Unit);
  3906. }
  3907. if (UniIsEmptyStr(n->Country) == false)
  3908. {
  3909. CfgAddUniStr(ff, "Country", n->Country);
  3910. }
  3911. if (UniIsEmptyStr(n->State) == false)
  3912. {
  3913. CfgAddUniStr(ff, "State", n->State);
  3914. }
  3915. if (UniIsEmptyStr(n->Local) == false)
  3916. {
  3917. CfgAddUniStr(ff, "Local", n->Local);
  3918. }
  3919. if (IsZero(crl->DigestMD5, MD5_SIZE) == false)
  3920. {
  3921. char tmp[MAX_SIZE];
  3922. BinToStr(tmp, sizeof(tmp), crl->DigestMD5, MD5_SIZE);
  3923. CfgAddStr(ff, "DigestMD5", tmp);
  3924. }
  3925. if (IsZero(crl->DigestSHA1, SHA1_SIZE) == false)
  3926. {
  3927. char tmp[MAX_SIZE];
  3928. BinToStr(tmp, sizeof(tmp), crl->DigestSHA1, SHA1_SIZE);
  3929. CfgAddStr(ff, "DigestSHA1", tmp);
  3930. }
  3931. if (crl->Serial != NULL)
  3932. {
  3933. char tmp[MAX_SIZE];
  3934. BinToStr(tmp, sizeof(tmp), crl->Serial->data, crl->Serial->size);
  3935. CfgAddStr(ff, "Serial", tmp);
  3936. }
  3937. }
  3938. }
  3939. UnlockList(o);
  3940. }
  3941. // Read the certificate revocation list
  3942. void SiLoadCrlList(LIST *o, FOLDER *f)
  3943. {
  3944. // Validate arguments
  3945. if (o == NULL || f == NULL)
  3946. {
  3947. return;
  3948. }
  3949. LockList(o);
  3950. {
  3951. UINT i;
  3952. TOKEN_LIST *t;
  3953. t = CfgEnumFolderToTokenList(f);
  3954. for (i = 0;i < t->NumTokens;i++)
  3955. {
  3956. CRL *crl;
  3957. FOLDER *ff = CfgGetFolder(f, t->Token[i]);
  3958. wchar_t cn[MAX_SIZE], org[MAX_SIZE], u[MAX_SIZE], c[MAX_SIZE],
  3959. st[MAX_SIZE], l[MAX_SIZE];
  3960. char tmp[MAX_SIZE];
  3961. if (ff != NULL)
  3962. {
  3963. BUF *b;
  3964. crl = ZeroMalloc(sizeof(CRL));
  3965. CfgGetUniStr(ff, "CommonName", cn, sizeof(cn));
  3966. CfgGetUniStr(ff, "Organization", org, sizeof(org));
  3967. CfgGetUniStr(ff, "Unit", u, sizeof(u));
  3968. CfgGetUniStr(ff, "Country", c, sizeof(c));
  3969. CfgGetUniStr(ff, "State", st, sizeof(st));
  3970. CfgGetUniStr(ff, "Local", l, sizeof(l));
  3971. crl->Name = NewName(cn, org, u, c, st, l);
  3972. if (CfgGetStr(ff, "Serial", tmp, sizeof(tmp)))
  3973. {
  3974. b = StrToBin(tmp);
  3975. if (b != NULL)
  3976. {
  3977. if (b->Size >= 1)
  3978. {
  3979. crl->Serial = NewXSerial(b->Buf, b->Size);
  3980. }
  3981. FreeBuf(b);
  3982. }
  3983. }
  3984. if (CfgGetStr(ff, "DigestMD5", tmp, sizeof(tmp)))
  3985. {
  3986. b = StrToBin(tmp);
  3987. if (b != NULL)
  3988. {
  3989. if (b->Size == MD5_SIZE)
  3990. {
  3991. Copy(crl->DigestMD5, b->Buf, MD5_SIZE);
  3992. }
  3993. FreeBuf(b);
  3994. }
  3995. }
  3996. if (CfgGetStr(ff, "DigestSHA1", tmp, sizeof(tmp)))
  3997. {
  3998. b = StrToBin(tmp);
  3999. if (b != NULL)
  4000. {
  4001. if (b->Size == SHA1_SIZE)
  4002. {
  4003. Copy(crl->DigestSHA1, b->Buf, SHA1_SIZE);
  4004. }
  4005. FreeBuf(b);
  4006. }
  4007. }
  4008. Insert(o, crl);
  4009. }
  4010. }
  4011. FreeToken(t);
  4012. }
  4013. UnlockList(o);
  4014. }
  4015. // Write the certificates list
  4016. void SiWriteCertList(FOLDER *f, LIST *o)
  4017. {
  4018. // Validate arguments
  4019. if (f == NULL || o == NULL)
  4020. {
  4021. return;
  4022. }
  4023. LockList(o);
  4024. {
  4025. UINT i;
  4026. X *x;
  4027. for (i = 0;i < LIST_NUM(o);i++)
  4028. {
  4029. char name[MAX_SIZE];
  4030. BUF *b;
  4031. x = LIST_DATA(o, i);
  4032. Format(name, sizeof(name), "Cert%u", i);
  4033. b = XToBuf(x, false);
  4034. if (b != NULL)
  4035. {
  4036. CfgAddBuf(CfgCreateFolder(f, name), "X509", b);
  4037. FreeBuf(b);
  4038. }
  4039. }
  4040. }
  4041. UnlockList(o);
  4042. }
  4043. // Read the certificates list
  4044. void SiLoadCertList(LIST *o, FOLDER *f)
  4045. {
  4046. // Validate arguments
  4047. if (o == NULL || f == NULL)
  4048. {
  4049. return;
  4050. }
  4051. LockList(o);
  4052. {
  4053. UINT i;
  4054. TOKEN_LIST *t;
  4055. t = CfgEnumFolderToTokenList(f);
  4056. for (i = 0;i < t->NumTokens;i++)
  4057. {
  4058. FOLDER *ff = CfgGetFolder(f, t->Token[i]);
  4059. BUF *b;
  4060. b = CfgGetBuf(ff, "X509");
  4061. if (b != NULL)
  4062. {
  4063. X *x = BufToX(b, false);
  4064. if (x != NULL)
  4065. {
  4066. Insert(o, x);
  4067. }
  4068. FreeBuf(b);
  4069. }
  4070. }
  4071. FreeToken(t);
  4072. }
  4073. UnlockList(o);
  4074. }
  4075. // Write the database
  4076. void SiWriteHubDb(FOLDER *f, HUBDB *db, bool no_save_ac_list)
  4077. {
  4078. // Validate arguments
  4079. if (f == NULL || db == NULL)
  4080. {
  4081. return;
  4082. }
  4083. SiWriteUserList(CfgCreateFolder(f, "UserList"), db->UserList);
  4084. SiWriteGroupList(CfgCreateFolder(f, "GroupList"), db->GroupList);
  4085. SiWriteCertList(CfgCreateFolder(f, "CertList"), db->RootCertList);
  4086. SiWriteCrlList(CfgCreateFolder(f, "CrlList"), db->CrlList);
  4087. if (no_save_ac_list == false)
  4088. {
  4089. SiWriteAcList(CfgCreateFolder(f, "IPAccessControlList"), db->AcList);
  4090. }
  4091. }
  4092. // Read the database
  4093. void SiLoadHubDb(HUB *h, FOLDER *f)
  4094. {
  4095. // Validate arguments
  4096. if (f == NULL || h == NULL)
  4097. {
  4098. return;
  4099. }
  4100. SiLoadGroupList(h, CfgGetFolder(f, "GroupList"));
  4101. SiLoadUserList(h, CfgGetFolder(f, "UserList"));
  4102. if (h->HubDb != NULL)
  4103. {
  4104. SiLoadCertList(h->HubDb->RootCertList, CfgGetFolder(f, "CertList"));
  4105. SiLoadCrlList(h->HubDb->CrlList, CfgGetFolder(f, "CrlList"));
  4106. SiLoadAcList(h->HubDb->AcList, CfgGetFolder(f, "IPAccessControlList"));
  4107. }
  4108. }
  4109. // Write the Virtual HUB setting
  4110. void SiWriteHubCfg(FOLDER *f, HUB *h)
  4111. {
  4112. // Validate arguments
  4113. if (f == NULL || h == NULL)
  4114. {
  4115. return;
  4116. }
  4117. // Radius server name
  4118. Lock(h->RadiusOptionLock);
  4119. {
  4120. if (h->RadiusServerName != NULL)
  4121. {
  4122. CfgAddStr(f, "RadiusServerName", h->RadiusServerName);
  4123. CfgAddBuf(f, "RadiusSecret", h->RadiusSecret);
  4124. }
  4125. CfgAddInt(f, "RadiusServerPort", h->RadiusServerPort);
  4126. CfgAddInt(f, "RadiusRetryInterval", h->RadiusRetryInterval);
  4127. CfgAddStr(f, "RadiusSuffixFilter", h->RadiusSuffixFilter);
  4128. CfgAddStr(f, "RadiusRealm", h->RadiusRealm);
  4129. }
  4130. Unlock(h->RadiusOptionLock);
  4131. // Password
  4132. CfgAddByte(f, "HashedPassword", h->HashedPassword, sizeof(h->HashedPassword));
  4133. CfgAddByte(f, "SecurePassword", h->SecurePassword, sizeof(h->SecurePassword));
  4134. // Online / Offline flag
  4135. if (h->Cedar->Bridge == false)
  4136. {
  4137. CfgAddBool(f, "Online", (h->Offline && (h->HubIsOnlineButHalting == false)) ? false : true);
  4138. }
  4139. // Traffic information
  4140. SiWriteTraffic(f, "Traffic", h->Traffic);
  4141. // HUB options
  4142. SiWriteHubOptionCfg(CfgCreateFolder(f, "Option"), h->Option);
  4143. // Message
  4144. {
  4145. FOLDER *folder = CfgCreateFolder(f, "Message");
  4146. if (IsEmptyUniStr(h->Msg) == false)
  4147. {
  4148. CfgAddUniStr(folder, "MessageText", h->Msg);
  4149. }
  4150. }
  4151. // HUB_LOG
  4152. SiWriteHubLogCfg(CfgCreateFolder(f, "LogSetting"), &h->LogSetting);
  4153. if (h->Type == HUB_TYPE_STANDALONE)
  4154. {
  4155. // Link list
  4156. SiWriteHubLinks(CfgCreateFolder(f, "CascadeList"), h);
  4157. }
  4158. if (h->Type != HUB_TYPE_FARM_STATIC)
  4159. {
  4160. if (GetServerCapsBool(h->Cedar->Server, "b_support_securenat"))
  4161. {
  4162. // SecureNAT
  4163. SiWriteSecureNAT(h, CfgCreateFolder(f, "SecureNAT"));
  4164. }
  4165. }
  4166. // Access list
  4167. SiWriteHubAccessLists(CfgCreateFolder(f, "AccessList"), h);
  4168. // Administration options
  4169. SiWriteHubAdminOptions(CfgCreateFolder(f, "AdminOption"), h);
  4170. // Type of HUB
  4171. CfgAddInt(f, "Type", h->Type);
  4172. // Database
  4173. if (h->Cedar->Bridge == false)
  4174. {
  4175. SiWriteHubDb(CfgCreateFolder(f, "SecurityAccountDatabase"), h->HubDb,
  4176. false
  4177. );
  4178. }
  4179. // Usage status
  4180. CfgAddInt64(f, "LastCommTime", h->LastCommTime);
  4181. CfgAddInt64(f, "LastLoginTime", h->LastLoginTime);
  4182. CfgAddInt64(f, "CreatedTime", h->CreatedTime);
  4183. CfgAddInt(f, "NumLogin", h->NumLogin);
  4184. }
  4185. // Read the logging options
  4186. void SiLoadHubLogCfg(HUB_LOG *g, FOLDER *f)
  4187. {
  4188. // Validate arguments
  4189. if (f == NULL || g == NULL)
  4190. {
  4191. return;
  4192. }
  4193. Zero(g, sizeof(HUB_LOG));
  4194. g->SaveSecurityLog = CfgGetBool(f, "SaveSecurityLog");
  4195. g->SecurityLogSwitchType = CfgGetInt(f, "SecurityLogSwitchType");
  4196. g->SavePacketLog = CfgGetBool(f, "SavePacketLog");
  4197. g->PacketLogSwitchType = CfgGetInt(f, "PacketLogSwitchType");
  4198. g->PacketLogConfig[PACKET_LOG_TCP_CONN] = CfgGetInt(f, "PACKET_LOG_TCP_CONN");
  4199. g->PacketLogConfig[PACKET_LOG_TCP] = CfgGetInt(f, "PACKET_LOG_TCP");
  4200. g->PacketLogConfig[PACKET_LOG_DHCP] = CfgGetInt(f, "PACKET_LOG_DHCP");
  4201. g->PacketLogConfig[PACKET_LOG_UDP] = CfgGetInt(f, "PACKET_LOG_UDP");
  4202. g->PacketLogConfig[PACKET_LOG_ICMP] = CfgGetInt(f, "PACKET_LOG_ICMP");
  4203. g->PacketLogConfig[PACKET_LOG_IP] = CfgGetInt(f, "PACKET_LOG_IP");
  4204. g->PacketLogConfig[PACKET_LOG_ARP] = CfgGetInt(f, "PACKET_LOG_ARP");
  4205. g->PacketLogConfig[PACKET_LOG_ETHERNET] = CfgGetInt(f, "PACKET_LOG_ETHERNET");
  4206. }
  4207. // Write the logging options
  4208. void SiWriteHubLogCfg(FOLDER *f, HUB_LOG *g)
  4209. {
  4210. SiWriteHubLogCfgEx(f, g, false);
  4211. }
  4212. void SiWriteHubLogCfgEx(FOLDER *f, HUB_LOG *g, bool el_mode)
  4213. {
  4214. // Validate arguments
  4215. if (f == NULL || g == NULL)
  4216. {
  4217. return;
  4218. }
  4219. if (el_mode == false)
  4220. {
  4221. CfgAddBool(f, "SaveSecurityLog", g->SaveSecurityLog);
  4222. CfgAddInt(f, "SecurityLogSwitchType", g->SecurityLogSwitchType);
  4223. CfgAddBool(f, "SavePacketLog", g->SavePacketLog);
  4224. }
  4225. CfgAddInt(f, "PacketLogSwitchType", g->PacketLogSwitchType);
  4226. CfgAddInt(f, "PACKET_LOG_TCP_CONN", g->PacketLogConfig[PACKET_LOG_TCP_CONN]);
  4227. CfgAddInt(f, "PACKET_LOG_TCP", g->PacketLogConfig[PACKET_LOG_TCP]);
  4228. CfgAddInt(f, "PACKET_LOG_DHCP", g->PacketLogConfig[PACKET_LOG_DHCP]);
  4229. CfgAddInt(f, "PACKET_LOG_UDP", g->PacketLogConfig[PACKET_LOG_UDP]);
  4230. CfgAddInt(f, "PACKET_LOG_ICMP", g->PacketLogConfig[PACKET_LOG_ICMP]);
  4231. CfgAddInt(f, "PACKET_LOG_IP", g->PacketLogConfig[PACKET_LOG_IP]);
  4232. CfgAddInt(f, "PACKET_LOG_ARP", g->PacketLogConfig[PACKET_LOG_ARP]);
  4233. CfgAddInt(f, "PACKET_LOG_ETHERNET", g->PacketLogConfig[PACKET_LOG_ETHERNET]);
  4234. }
  4235. // Read the Virtual HUB settings
  4236. void SiLoadHubCfg(SERVER *s, FOLDER *f, char *name)
  4237. {
  4238. HUB *h;
  4239. CEDAR *c;
  4240. HUB_OPTION o;
  4241. bool online;
  4242. UINT hub_old_type = 0;
  4243. // Validate arguments
  4244. if (s == NULL || f == NULL || name == NULL)
  4245. {
  4246. return;
  4247. }
  4248. c = s->Cedar;
  4249. // Get the option
  4250. Zero(&o, sizeof(o));
  4251. SiLoadHubOptionCfg(CfgGetFolder(f, "Option"), &o);
  4252. // Create a HUB
  4253. h = NewHub(c, name, &o);
  4254. if (h != NULL)
  4255. {
  4256. HUB_LOG g;
  4257. // Radius server settings
  4258. Lock(h->RadiusOptionLock);
  4259. {
  4260. char name[MAX_SIZE];
  4261. BUF *secret;
  4262. UINT port;
  4263. UINT interval;
  4264. port = CfgGetInt(f, "RadiusServerPort");
  4265. interval = CfgGetInt(f, "RadiusRetryInterval");
  4266. CfgGetStr(f, "RadiusSuffixFilter", h->RadiusSuffixFilter, sizeof(h->RadiusSuffixFilter));
  4267. CfgGetStr(f, "RadiusRealm", h->RadiusRealm, sizeof(h->RadiusRealm));
  4268. if (interval == 0)
  4269. {
  4270. interval = RADIUS_RETRY_INTERVAL;
  4271. }
  4272. if (port != 0 && CfgGetStr(f, "RadiusServerName", name, sizeof(name)))
  4273. {
  4274. secret = CfgGetBuf(f, "RadiusSecret");
  4275. if (secret != NULL)
  4276. {
  4277. char secret_str[MAX_SIZE];
  4278. Zero(secret_str, sizeof(secret_str));
  4279. if (secret->Size < sizeof(secret_str))
  4280. {
  4281. Copy(secret_str, secret->Buf, secret->Size);
  4282. }
  4283. secret_str[sizeof(secret_str) - 1] = 0;
  4284. //SetRadiusServer(h, name, port, secret_str);
  4285. SetRadiusServerEx(h, name, port, secret_str, interval);
  4286. FreeBuf(secret);
  4287. }
  4288. }
  4289. }
  4290. Unlock(h->RadiusOptionLock);
  4291. // Password
  4292. if (CfgGetByte(f, "HashedPassword", h->HashedPassword, sizeof(h->HashedPassword)) != sizeof(h->HashedPassword))
  4293. {
  4294. Hash(h->HashedPassword, "", 0, true);
  4295. }
  4296. if (CfgGetByte(f, "SecurePassword", h->SecurePassword, sizeof(h->SecurePassword)) != sizeof(h->SecurePassword))
  4297. {
  4298. HashPassword(h->SecurePassword, ADMINISTRATOR_USERNAME, "");
  4299. }
  4300. // Log Settings
  4301. Zero(&g, sizeof(g));
  4302. SiLoadHubLogCfg(&g, CfgGetFolder(f, "LogSetting"));
  4303. SetHubLogSetting(h, &g);
  4304. // Online / Offline flag
  4305. if (h->Cedar->Bridge == false)
  4306. {
  4307. online = CfgGetBool(f, "Online");
  4308. }
  4309. else
  4310. {
  4311. online = true;
  4312. }
  4313. // Traffic information
  4314. SiLoadTraffic(f, "Traffic", h->Traffic);
  4315. // Access list
  4316. SiLoadHubAccessLists(h, CfgGetFolder(f, "AccessList"));
  4317. // Type of HUB
  4318. hub_old_type = h->Type = CfgGetInt(f, "Type");
  4319. if (s->ServerType == SERVER_TYPE_STANDALONE)
  4320. {
  4321. if (h->Type != HUB_TYPE_STANDALONE)
  4322. {
  4323. // Change the type of all HUB to a stand-alone if the server is a stand-alone
  4324. h->Type = HUB_TYPE_STANDALONE;
  4325. }
  4326. }
  4327. else
  4328. {
  4329. if (h->Type == HUB_TYPE_STANDALONE)
  4330. {
  4331. // If the server is a farm controller, change the type of HUB to the farm supported types
  4332. h->Type = HUB_TYPE_FARM_DYNAMIC;
  4333. }
  4334. }
  4335. if (h->Type == HUB_TYPE_FARM_DYNAMIC)
  4336. {
  4337. h->CurrentVersion = h->LastVersion = 1;
  4338. }
  4339. // Message
  4340. {
  4341. FOLDER *folder = CfgGetFolder(f, "Message");
  4342. if (folder != NULL)
  4343. {
  4344. wchar_t *tmp = Malloc(sizeof(wchar_t) * (HUB_MAXMSG_LEN + 1));
  4345. if (CfgGetUniStr(folder, "MessageText", tmp, sizeof(wchar_t) * (HUB_MAXMSG_LEN + 1)))
  4346. {
  4347. SetHubMsg(h, tmp);
  4348. }
  4349. Free(tmp);
  4350. }
  4351. }
  4352. // Link list
  4353. if (h->Type == HUB_TYPE_STANDALONE)
  4354. {
  4355. // The link list is used only on stand-alone HUB
  4356. // In VPN Gate hubs, don't load this
  4357. {
  4358. SiLoadHubLinks(h, CfgGetFolder(f, "CascadeList"));
  4359. }
  4360. }
  4361. // SecureNAT
  4362. if (GetServerCapsBool(h->Cedar->Server, "b_support_securenat"))
  4363. {
  4364. if (h->Type == HUB_TYPE_STANDALONE || h->Type == HUB_TYPE_FARM_DYNAMIC)
  4365. {
  4366. // SecureNAT is used only in the case of dynamic HUB or standalone HUB
  4367. SiLoadSecureNAT(h, CfgGetFolder(f, "SecureNAT"));
  4368. if (h->Type != HUB_TYPE_STANDALONE && h->Cedar != NULL && h->Cedar->Server != NULL &&
  4369. h->Cedar->Server->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4370. {
  4371. NiClearUnsupportedVhOptionForDynamicHub(h->SecureNATOption,
  4372. hub_old_type == HUB_TYPE_STANDALONE);
  4373. }
  4374. }
  4375. }
  4376. // Administration options
  4377. SiLoadHubAdminOptions(h, CfgGetFolder(f, "AdminOption"));
  4378. // Database
  4379. if (h->Cedar->Bridge == false)
  4380. {
  4381. SiLoadHubDb(h, CfgGetFolder(f, "SecurityAccountDatabase"));
  4382. }
  4383. // Usage status
  4384. h->LastCommTime = CfgGetInt64(f, "LastCommTime");
  4385. if (h->LastCommTime == 0)
  4386. {
  4387. h->LastCommTime = SystemTime64();
  4388. }
  4389. h->LastLoginTime = CfgGetInt64(f, "LastLoginTime");
  4390. if (h->LastLoginTime == 0)
  4391. {
  4392. h->LastLoginTime = SystemTime64();
  4393. }
  4394. h->CreatedTime = CfgGetInt64(f, "CreatedTime");
  4395. h->NumLogin = CfgGetInt(f, "NumLogin");
  4396. // Start the operation of the HUB
  4397. AddHub(c, h);
  4398. if (online)
  4399. {
  4400. h->Offline = true;
  4401. SetHubOnline(h);
  4402. }
  4403. else
  4404. {
  4405. h->Offline = false;
  4406. SetHubOffline(h);
  4407. }
  4408. WaitLogFlush(h->SecurityLogger);
  4409. WaitLogFlush(h->PacketLogger);
  4410. ReleaseHub(h);
  4411. }
  4412. }
  4413. // Read the SecureNAT configuration
  4414. void SiLoadSecureNAT(HUB *h, FOLDER *f)
  4415. {
  4416. VH_OPTION o;
  4417. // Validate arguments
  4418. if (h == NULL || f == NULL)
  4419. {
  4420. return;
  4421. }
  4422. // Read the VH_OPTION
  4423. NiLoadVhOptionEx(&o, f);
  4424. // Set the VH_OPTION
  4425. Copy(h->SecureNATOption, &o, sizeof(VH_OPTION));
  4426. EnableSecureNAT(h, CfgGetBool(f, "Disabled") ? false : true);
  4427. }
  4428. // Read the virtual layer 3 switch settings
  4429. void SiLoadL3SwitchCfg(L3SW *sw, FOLDER *f)
  4430. {
  4431. UINT i;
  4432. FOLDER *if_folder, *table_folder;
  4433. TOKEN_LIST *t;
  4434. bool active = false;
  4435. // Validate arguments
  4436. if (sw == NULL || f == NULL)
  4437. {
  4438. return;
  4439. }
  4440. active = CfgGetBool(f, "Active");
  4441. // Interface list
  4442. if_folder = CfgGetFolder(f, "InterfaceList");
  4443. if (if_folder != NULL)
  4444. {
  4445. t = CfgEnumFolderToTokenList(if_folder);
  4446. if (t != NULL)
  4447. {
  4448. for (i = 0;i < t->NumTokens;i++)
  4449. {
  4450. FOLDER *ff = CfgGetFolder(if_folder, t->Token[i]);
  4451. char name[MAX_HUBNAME_LEN + 1];
  4452. UINT ip, subnet;
  4453. CfgGetStr(ff, "HubName", name, sizeof(name));
  4454. ip = CfgGetIp32(ff, "IpAddress");
  4455. subnet = CfgGetIp32(ff, "SubnetMask");
  4456. {
  4457. L3AddIf(sw, name, ip, subnet);
  4458. }
  4459. }
  4460. FreeToken(t);
  4461. }
  4462. }
  4463. // Routing table
  4464. table_folder = CfgGetFolder(f, "RoutingTable");
  4465. if (table_folder != NULL)
  4466. {
  4467. t = CfgEnumFolderToTokenList(table_folder);
  4468. if (t != NULL)
  4469. {
  4470. for (i = 0;i < t->NumTokens;i++)
  4471. {
  4472. FOLDER *ff = CfgGetFolder(table_folder, t->Token[i]);
  4473. L3TABLE tbl;
  4474. Zero(&tbl, sizeof(tbl));
  4475. tbl.NetworkAddress = CfgGetIp32(ff, "NetworkAddress");
  4476. tbl.SubnetMask = CfgGetIp32(ff, "SubnetMask");
  4477. tbl.GatewayAddress = CfgGetIp32(ff, "GatewayAddress");
  4478. tbl.Metric = CfgGetInt(ff, "Metric");
  4479. L3AddTable(sw, &tbl);
  4480. }
  4481. FreeToken(t);
  4482. }
  4483. }
  4484. if (active)
  4485. {
  4486. L3SwStart(sw);
  4487. }
  4488. }
  4489. // Write the virtual layer 3 switch settings
  4490. void SiWriteL3SwitchCfg(FOLDER *f, L3SW *sw)
  4491. {
  4492. UINT i;
  4493. FOLDER *if_folder, *table_folder;
  4494. char tmp[MAX_SIZE];
  4495. // Validate arguments
  4496. if (f == NULL || sw == NULL)
  4497. {
  4498. return;
  4499. }
  4500. // Active flag
  4501. CfgAddBool(f, "Active", sw->Active);
  4502. // Interface list
  4503. if_folder = CfgCreateFolder(f, "InterfaceList");
  4504. for (i = 0;i < LIST_NUM(sw->IfList);i++)
  4505. {
  4506. L3IF *e = LIST_DATA(sw->IfList, i);
  4507. FOLDER *ff;
  4508. Format(tmp, sizeof(tmp), "Interface%u", i);
  4509. ff = CfgCreateFolder(if_folder, tmp);
  4510. CfgAddStr(ff, "HubName", e->HubName);
  4511. CfgAddIp32(ff, "IpAddress", e->IpAddress);
  4512. CfgAddIp32(ff, "SubnetMask", e->SubnetMask);
  4513. }
  4514. // Routing table
  4515. table_folder = CfgCreateFolder(f, "RoutingTable");
  4516. for (i = 0;i < LIST_NUM(sw->TableList);i++)
  4517. {
  4518. L3TABLE *e = LIST_DATA(sw->TableList, i);
  4519. FOLDER *ff;
  4520. Format(tmp, sizeof(tmp), "Entry%u", i);
  4521. ff = CfgCreateFolder(table_folder, tmp);
  4522. CfgAddIp32(ff, "NetworkAddress", e->NetworkAddress);
  4523. CfgAddIp32(ff, "SubnetMask", e->SubnetMask);
  4524. CfgAddIp32(ff, "GatewayAddress", e->GatewayAddress);
  4525. CfgAddInt(ff, "Metric", e->Metric);
  4526. }
  4527. }
  4528. // Read the Virtual Layer 3 switch list
  4529. void SiLoadL3Switchs(SERVER *s, FOLDER *f)
  4530. {
  4531. UINT i;
  4532. TOKEN_LIST *t;
  4533. CEDAR *c;
  4534. // Validate arguments
  4535. if (s == NULL || f == NULL)
  4536. {
  4537. return;
  4538. }
  4539. c = s->Cedar;
  4540. t = CfgEnumFolderToTokenList(f);
  4541. if (t != NULL)
  4542. {
  4543. for (i = 0;i < t->NumTokens;i++)
  4544. {
  4545. char *name = t->Token[i];
  4546. L3SW *sw = L3AddSw(c, name);
  4547. SiLoadL3SwitchCfg(sw, CfgGetFolder(f, name));
  4548. ReleaseL3Sw(sw);
  4549. }
  4550. }
  4551. FreeToken(t);
  4552. }
  4553. // Write the Virtual Layer 3 switch list
  4554. void SiWriteL3Switchs(FOLDER *f, SERVER *s)
  4555. {
  4556. UINT i;
  4557. FOLDER *folder;
  4558. CEDAR *c;
  4559. // Validate arguments
  4560. if (f == NULL || s == NULL)
  4561. {
  4562. return;
  4563. }
  4564. c = s->Cedar;
  4565. LockList(c->L3SwList);
  4566. {
  4567. for (i = 0;i < LIST_NUM(c->L3SwList);i++)
  4568. {
  4569. L3SW *sw = LIST_DATA(c->L3SwList, i);
  4570. Lock(sw->lock);
  4571. {
  4572. folder = CfgCreateFolder(f, sw->Name);
  4573. SiWriteL3SwitchCfg(folder, sw);
  4574. }
  4575. Unlock(sw->lock);
  4576. }
  4577. }
  4578. UnlockList(c->L3SwList);
  4579. }
  4580. // Read the IPsec server configuration
  4581. void SiLoadIPsec(SERVER *s, FOLDER *f)
  4582. {
  4583. IPSEC_SERVICES sl;
  4584. FOLDER *list_folder;
  4585. // Validate arguments
  4586. if (s == NULL || f == NULL)
  4587. {
  4588. return;
  4589. }
  4590. Zero(&sl, sizeof(sl));
  4591. CfgGetStr(f, "IPsec_Secret", sl.IPsec_Secret, sizeof(sl.IPsec_Secret));
  4592. CfgGetStr(f, "L2TP_DefaultHub", sl.L2TP_DefaultHub, sizeof(sl.L2TP_DefaultHub));
  4593. if (s->ServerType == SERVER_TYPE_STANDALONE)
  4594. {
  4595. // IPsec feature only be enabled on a standalone server
  4596. sl.L2TP_Raw = CfgGetBool(f, "L2TP_Raw");
  4597. sl.L2TP_IPsec = CfgGetBool(f, "L2TP_IPsec");
  4598. sl.EtherIP_IPsec = CfgGetBool(f, "EtherIP_IPsec");
  4599. }
  4600. IPsecServerSetServices(s->IPsecServer, &sl);
  4601. list_folder = CfgGetFolder(f, "EtherIP_IDSettingsList");
  4602. if (list_folder != NULL)
  4603. {
  4604. TOKEN_LIST *t = CfgEnumFolderToTokenList(list_folder);
  4605. if (t != NULL)
  4606. {
  4607. UINT i;
  4608. for (i = 0;i < t->NumTokens;i++)
  4609. {
  4610. char *name = t->Token[i];
  4611. FOLDER *f = CfgGetFolder(list_folder, name);
  4612. if (f != NULL)
  4613. {
  4614. ETHERIP_ID d;
  4615. BUF *b;
  4616. Zero(&d, sizeof(d));
  4617. StrCpy(d.Id, sizeof(d.Id), name);
  4618. CfgGetStr(f, "HubName", d.HubName, sizeof(d.HubName));
  4619. CfgGetStr(f, "UserName", d.UserName, sizeof(d.UserName));
  4620. b = CfgGetBuf(f, "EncryptedPassword");
  4621. if (b != NULL)
  4622. {
  4623. char *pass = DecryptPassword2(b);
  4624. StrCpy(d.Password, sizeof(d.Password), pass);
  4625. Free(pass);
  4626. AddEtherIPId(s->IPsecServer, &d);
  4627. FreeBuf(b);
  4628. }
  4629. }
  4630. }
  4631. FreeToken(t);
  4632. }
  4633. }
  4634. }
  4635. // Write the IPsec server configuration
  4636. void SiWriteIPsec(FOLDER *f, SERVER *s)
  4637. {
  4638. IPSEC_SERVICES sl;
  4639. FOLDER *list_folder;
  4640. UINT i;
  4641. // Validate arguments
  4642. if (s == NULL || f == NULL)
  4643. {
  4644. return;
  4645. }
  4646. if (s->IPsecServer == NULL)
  4647. {
  4648. return;
  4649. }
  4650. Zero(&sl, sizeof(sl));
  4651. IPsecServerGetServices(s->IPsecServer, &sl);
  4652. CfgAddStr(f, "IPsec_Secret", sl.IPsec_Secret);
  4653. CfgAddStr(f, "L2TP_DefaultHub", sl.L2TP_DefaultHub);
  4654. CfgAddBool(f, "L2TP_Raw", sl.L2TP_Raw);
  4655. CfgAddBool(f, "L2TP_IPsec", sl.L2TP_IPsec);
  4656. CfgAddBool(f, "EtherIP_IPsec", sl.EtherIP_IPsec);
  4657. list_folder = CfgCreateFolder(f, "EtherIP_IDSettingsList");
  4658. Lock(s->IPsecServer->LockSettings);
  4659. {
  4660. for (i = 0;i < LIST_NUM(s->IPsecServer->EtherIPIdList);i++)
  4661. {
  4662. ETHERIP_ID *d = LIST_DATA(s->IPsecServer->EtherIPIdList, i);
  4663. FOLDER *f;
  4664. BUF *b;
  4665. f = CfgCreateFolder(list_folder, d->Id);
  4666. CfgAddStr(f, "HubName", d->HubName);
  4667. CfgAddStr(f, "UserName", d->UserName);
  4668. b = EncryptPassword2(d->Password);
  4669. CfgAddBuf(f, "EncryptedPassword", b);
  4670. FreeBuf(b);
  4671. }
  4672. }
  4673. Unlock(s->IPsecServer->LockSettings);
  4674. }
  4675. // Write the license list
  4676. void SiWriteLicenseManager(FOLDER *f, SERVER *s)
  4677. {
  4678. }
  4679. // Read the license list
  4680. void SiLoadLicenseManager(SERVER *s, FOLDER *f)
  4681. {
  4682. }
  4683. // Write the Virtual HUB list
  4684. void SiWriteHubs(FOLDER *f, SERVER *s)
  4685. {
  4686. UINT i;
  4687. FOLDER *hub_folder;
  4688. CEDAR *c;
  4689. UINT num;
  4690. HUB **hubs;
  4691. // Validate arguments
  4692. if (f == NULL || s == NULL)
  4693. {
  4694. return;
  4695. }
  4696. c = s->Cedar;
  4697. LockList(c->HubList);
  4698. {
  4699. hubs = ToArray(c->HubList);
  4700. num = LIST_NUM(c->HubList);
  4701. for (i = 0;i < num;i++)
  4702. {
  4703. AddRef(hubs[i]->ref);
  4704. }
  4705. }
  4706. UnlockList(c->HubList);
  4707. for (i = 0;i < num;i++)
  4708. {
  4709. HUB *h = hubs[i];
  4710. Lock(h->lock);
  4711. {
  4712. hub_folder = CfgCreateFolder(f, h->Name);
  4713. SiWriteHubCfg(hub_folder, h);
  4714. }
  4715. Unlock(h->lock);
  4716. ReleaseHub(h);
  4717. if ((i % 30) == 1)
  4718. {
  4719. YieldCpu();
  4720. }
  4721. }
  4722. Free(hubs);
  4723. }
  4724. // Read the Virtual HUB list
  4725. void SiLoadHubs(SERVER *s, FOLDER *f)
  4726. {
  4727. UINT i;
  4728. FOLDER *hub_folder;
  4729. CEDAR *c;
  4730. TOKEN_LIST *t;
  4731. bool b = false;
  4732. // Validate arguments
  4733. if (f == NULL || s == NULL)
  4734. {
  4735. return;
  4736. }
  4737. c = s->Cedar;
  4738. t = CfgEnumFolderToTokenList(f);
  4739. for (i = 0;i < t->NumTokens;i++)
  4740. {
  4741. char *name = t->Token[i];
  4742. if (s->Cedar->Bridge)
  4743. {
  4744. if (StrCmpi(name, SERVER_DEFAULT_BRIDGE_NAME) == 0)
  4745. {
  4746. // Read only the setting of Virtual HUB named "BRIDGE"
  4747. // in the case of the Bridge
  4748. b = true;
  4749. }
  4750. else
  4751. {
  4752. continue;
  4753. }
  4754. }
  4755. hub_folder = CfgGetFolder(f, name);
  4756. if (hub_folder != NULL)
  4757. {
  4758. SiLoadHubCfg(s, hub_folder, name);
  4759. }
  4760. }
  4761. FreeToken(t);
  4762. if (s->Cedar->Bridge && b == false)
  4763. {
  4764. // If there isn't "BRIDGE" virtual HUB setting, create it newly
  4765. SiInitDefaultHubList(s);
  4766. }
  4767. }
  4768. // Read the server-specific settings
  4769. void SiLoadServerCfg(SERVER *s, FOLDER *f)
  4770. {
  4771. BUF *b;
  4772. CEDAR *c;
  4773. char tmp[MAX_SIZE];
  4774. X *x = NULL;
  4775. K *k = NULL;
  4776. bool cluster_allowed = false;
  4777. UINT num_connections_per_ip = 0;
  4778. // Validate arguments
  4779. if (s == NULL || f == NULL)
  4780. {
  4781. return;
  4782. }
  4783. // Save interval related
  4784. s->AutoSaveConfigSpan = CfgGetInt(f, "AutoSaveConfigSpan") * 1000;
  4785. if (s->AutoSaveConfigSpan == 0)
  4786. {
  4787. s->AutoSaveConfigSpan = SERVER_FILE_SAVE_INTERVAL_DEFAULT;
  4788. }
  4789. else
  4790. {
  4791. s->AutoSaveConfigSpan = MAKESURE(s->AutoSaveConfigSpan, SERVER_FILE_SAVE_INTERVAL_MIN, SERVER_FILE_SAVE_INTERVAL_MAX);
  4792. }
  4793. s->DontBackupConfig = CfgGetBool(f, "DontBackupConfig");
  4794. if (CfgIsItem(f, "BackupConfigOnlyWhenModified"))
  4795. {
  4796. s->BackupConfigOnlyWhenModified = CfgGetBool(f, "BackupConfigOnlyWhenModified");
  4797. }
  4798. else
  4799. {
  4800. s->BackupConfigOnlyWhenModified = true;
  4801. }
  4802. c = s->Cedar;
  4803. Lock(c->lock);
  4804. {
  4805. OPENVPN_SSTP_CONFIG config;
  4806. FOLDER *syslog_f;
  4807. {
  4808. RPC_KEEP k;
  4809. // Keep-alive related
  4810. Zero(&k, sizeof(k));
  4811. k.UseKeepConnect = CfgGetBool(f, "UseKeepConnect");
  4812. CfgGetStr(f, "KeepConnectHost", k.KeepConnectHost, sizeof(k.KeepConnectHost));
  4813. k.KeepConnectPort = CfgGetInt(f, "KeepConnectPort");
  4814. k.KeepConnectProtocol = CfgGetInt(f, "KeepConnectProtocol");
  4815. k.KeepConnectInterval = CfgGetInt(f, "KeepConnectInterval") * 1000;
  4816. if (k.KeepConnectPort == 0)
  4817. {
  4818. k.KeepConnectPort = 80;
  4819. }
  4820. if (StrLen(k.KeepConnectHost) == 0)
  4821. {
  4822. StrCpy(k.KeepConnectHost, sizeof(k.KeepConnectHost), CLIENT_DEFAULT_KEEPALIVE_HOST);
  4823. }
  4824. if (k.KeepConnectInterval == 0)
  4825. {
  4826. k.KeepConnectInterval = KEEP_INTERVAL_DEFAULT * 1000;
  4827. }
  4828. if (k.KeepConnectInterval < 5000)
  4829. {
  4830. k.KeepConnectInterval = 5000;
  4831. }
  4832. if (k.KeepConnectInterval > 600000)
  4833. {
  4834. k.KeepConnectInterval = 600000;
  4835. }
  4836. Lock(s->Keep->lock);
  4837. {
  4838. KEEP *keep = s->Keep;
  4839. keep->Enable = k.UseKeepConnect;
  4840. keep->Server = true;
  4841. StrCpy(keep->ServerName, sizeof(keep->ServerName), k.KeepConnectHost);
  4842. keep->ServerPort = k.KeepConnectPort;
  4843. keep->UdpMode = k.KeepConnectProtocol;
  4844. keep->Interval = k.KeepConnectInterval;
  4845. }
  4846. Unlock(s->Keep->lock);
  4847. }
  4848. // syslog
  4849. syslog_f = CfgGetFolder(f, "SyslogSettings");
  4850. if (syslog_f != NULL && GetServerCapsBool(s, "b_support_syslog"))
  4851. {
  4852. SYSLOG_SETTING set;
  4853. Zero(&set, sizeof(set));
  4854. set.SaveType = CfgGetInt(syslog_f, "SaveType");
  4855. CfgGetStr(syslog_f, "HostName", set.Hostname, sizeof(set.Hostname));
  4856. set.Port = CfgGetInt(syslog_f, "Port");
  4857. SiSetSysLogSetting(s, &set);
  4858. }
  4859. // Whether to disable the IPv6 listener
  4860. s->Cedar->DisableIPv6Listener = CfgGetBool(f, "DisableIPv6Listener");
  4861. // DoS
  4862. s->DisableDosProction = CfgGetBool(f, "DisableDosProction");
  4863. // Num Connections Per IP
  4864. SetMaxConnectionsPerIp(CfgGetInt(f, "MaxConnectionsPerIP"));
  4865. // MaxUnestablishedConnections
  4866. SetMaxUnestablishedConnections(CfgGetInt(f, "MaxUnestablishedConnections"));
  4867. // DeadLock
  4868. s->DisableDeadLockCheck = CfgGetBool(f, "DisableDeadLockCheck");
  4869. // Eraser
  4870. s->Eraser = NewEraser(s->Logger, CfgGetInt64(f, "AutoDeleteCheckDiskFreeSpaceMin"));
  4871. // WebUI
  4872. s->UseWebUI = CfgGetBool(f, "UseWebUI");
  4873. // WebTimePage
  4874. s->UseWebTimePage = CfgGetBool(f, "UseWebTimePage");
  4875. // NoLinuxArpFilter
  4876. s->NoLinuxArpFilter = CfgGetBool(f, "NoLinuxArpFilter");
  4877. // NoHighPriorityProcess
  4878. s->NoHighPriorityProcess = CfgGetBool(f, "NoHighPriorityProcess");
  4879. // NoDebugDump
  4880. s->NoDebugDump = CfgGetBool(f, "NoDebugDump");
  4881. if (s->NoDebugDump)
  4882. {
  4883. #ifdef OS_WIN32
  4884. MsSetEnableMinidump(false);
  4885. #endif // OS_WIN32
  4886. }
  4887. // Disable the SSTP server function
  4888. s->DisableSSTPServer = CfgGetBool(f, "DisableSSTPServer");
  4889. // Disable the OpenVPN server function
  4890. s->DisableOpenVPNServer = CfgGetBool(f, "DisableOpenVPNServer");
  4891. // Disable the NAT-traversal feature
  4892. s->DisableNatTraversal = CfgGetBool(f, "DisableNatTraversal");
  4893. // Intel AES
  4894. s->DisableIntelAesAcceleration = CfgGetBool(f, "DisableIntelAesAcceleration");
  4895. if (s->Cedar->Bridge == false)
  4896. {
  4897. // Enable the VPN-over-ICMP
  4898. if (CfgIsItem(f, "EnableVpnOverIcmp"))
  4899. {
  4900. s->EnableVpnOverIcmp = CfgGetBool(f, "EnableVpnOverIcmp");
  4901. }
  4902. else
  4903. {
  4904. s->EnableVpnOverIcmp = false;
  4905. }
  4906. // Enable the VPN-over-DNS
  4907. if (CfgIsItem(f, "EnableVpnOverDns"))
  4908. {
  4909. s->EnableVpnOverDns = CfgGetBool(f, "EnableVpnOverDns");
  4910. }
  4911. else
  4912. {
  4913. s->EnableVpnOverDns = false;
  4914. }
  4915. }
  4916. // Debug log
  4917. s->SaveDebugLog = CfgGetBool(f, "SaveDebugLog");
  4918. if (s->SaveDebugLog)
  4919. {
  4920. s->DebugLog = NewTinyLog();
  4921. }
  4922. // Let the client not to send a signature
  4923. s->NoSendSignature = CfgGetBool(f, "NoSendSignature");
  4924. // Server certificate
  4925. b = CfgGetBuf(f, "ServerCert");
  4926. if (b != NULL)
  4927. {
  4928. x = BufToX(b, false);
  4929. FreeBuf(b);
  4930. }
  4931. // Server private key
  4932. b = CfgGetBuf(f, "ServerKey");
  4933. if (b != NULL)
  4934. {
  4935. k = BufToK(b, true, false, NULL);
  4936. FreeBuf(b);
  4937. }
  4938. if (x == NULL || k == NULL || CheckXandK(x, k) == false)
  4939. {
  4940. FreeX(x);
  4941. FreeK(k);
  4942. SiGenerateDefaultCert(&x, &k);
  4943. SetCedarCert(c, x, k);
  4944. FreeX(x);
  4945. FreeK(k);
  4946. }
  4947. else
  4948. {
  4949. SetCedarCert(c, x, k);
  4950. FreeX(x);
  4951. FreeK(k);
  4952. }
  4953. // Cipher Name
  4954. if (CfgGetStr(f, "CipherName", tmp, sizeof(tmp)))
  4955. {
  4956. StrUpper(tmp);
  4957. if (CheckCipherListName(tmp))
  4958. {
  4959. SetCedarCipherList(c, tmp);
  4960. }
  4961. }
  4962. // Traffic information
  4963. Lock(c->TrafficLock);
  4964. {
  4965. SiLoadTraffic(f, "ServerTraffic", c->Traffic);
  4966. }
  4967. Unlock(c->TrafficLock);
  4968. // Get whether the current license allows cluster mode
  4969. cluster_allowed = true;
  4970. // Type of server
  4971. s->UpdatedServerType = s->ServerType =
  4972. cluster_allowed ? CfgGetInt(f, "ServerType") : SERVER_TYPE_STANDALONE;
  4973. // Password
  4974. if (CfgGetByte(f, "HashedPassword", s->HashedPassword, sizeof(s->HashedPassword)) != sizeof(s->HashedPassword))
  4975. {
  4976. Hash(s->HashedPassword, "", 0, true);
  4977. }
  4978. if (s->ServerType != SERVER_TYPE_STANDALONE)
  4979. {
  4980. // Performance ratio of the server
  4981. s->Weight = CfgGetInt(f, "ClusterMemberWeight");
  4982. if (s->Weight == 0)
  4983. {
  4984. s->Weight = FARM_DEFAULT_WEIGHT;
  4985. }
  4986. }
  4987. else
  4988. {
  4989. s->Weight = FARM_DEFAULT_WEIGHT;
  4990. }
  4991. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4992. {
  4993. s->ControllerOnly = CfgGetBool(f, "ControllerOnly");
  4994. }
  4995. if (s->ServerType != SERVER_TYPE_STANDALONE)
  4996. {
  4997. // SSTP, OpenVPN, and NAT traversal can not be used in a cluster environment
  4998. s->DisableNatTraversal = true;
  4999. s->DisableSSTPServer = true;
  5000. s->DisableOpenVPNServer = true;
  5001. }
  5002. if (s->Cedar->Bridge)
  5003. {
  5004. // SSTP, OpenVPN, and NAT traversal function can not be used in the bridge environment
  5005. s->DisableNatTraversal = true;
  5006. s->DisableSSTPServer = true;
  5007. s->DisableOpenVPNServer = true;
  5008. }
  5009. // Read the OpenVPN Port List
  5010. if (CfgGetStr(f, "OpenVPN_UdpPortList", tmp, sizeof(tmp)) == false)
  5011. {
  5012. {
  5013. ToStr(tmp, OPENVPN_UDP_PORT);
  5014. }
  5015. }
  5016. // Apply the configuration of SSTP and OpenVPN
  5017. Zero(&config, sizeof(config));
  5018. config.EnableOpenVPN = !s->DisableOpenVPNServer;
  5019. config.EnableSSTP = !s->DisableSSTPServer;
  5020. StrCpy(config.OpenVPNPortList, sizeof(config.OpenVPNPortList), tmp);
  5021. SiSetOpenVPNAndSSTPConfig(s, &config);
  5022. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5023. {
  5024. char tmp[6 * MAX_PUBLIC_PORT_NUM + 1];
  5025. // Load the settings item in the case of farm members
  5026. CfgGetStr(f, "ControllerName", s->ControllerName, sizeof(s->ControllerName));
  5027. s->ControllerPort = CfgGetInt(f, "ControllerPort");
  5028. CfgGetByte(f, "MemberPassword", s->MemberPassword, SHA1_SIZE);
  5029. s->PublicIp = CfgGetIp32(f, "PublicIp");
  5030. if (CfgGetStr(f, "PublicPorts", tmp, sizeof(tmp)))
  5031. {
  5032. TOKEN_LIST *t = ParseToken(tmp, ", ");
  5033. UINT i;
  5034. s->NumPublicPort = t->NumTokens;
  5035. s->PublicPorts = ZeroMalloc(s->NumPublicPort * sizeof(UINT));
  5036. for (i = 0;i < s->NumPublicPort;i++)
  5037. {
  5038. s->PublicPorts[i] = ToInt(t->Token[i]);
  5039. }
  5040. FreeToken(t);
  5041. }
  5042. }
  5043. // Configuration of VPN Azure Client
  5044. s->EnableVpnAzure = CfgGetBool(f, "EnableVpnAzure");
  5045. }
  5046. Unlock(c->lock);
  5047. }
  5048. // Write the server-specific settings
  5049. void SiWriteServerCfg(FOLDER *f, SERVER *s)
  5050. {
  5051. BUF *b;
  5052. CEDAR *c;
  5053. // Validate arguments
  5054. if (f == NULL || s == NULL)
  5055. {
  5056. return;
  5057. }
  5058. CfgAddInt(f, "CurrentBuild", s->Cedar->Build);
  5059. CfgAddInt(f, "AutoSaveConfigSpan", s->AutoSaveConfigSpanSaved / 1000);
  5060. CfgAddBool(f, "DontBackupConfig", s->DontBackupConfig);
  5061. CfgAddBool(f, "BackupConfigOnlyWhenModified", s->BackupConfigOnlyWhenModified);
  5062. c = s->Cedar;
  5063. Lock(c->lock);
  5064. {
  5065. bool is_vgs_cert = false;
  5066. FOLDER *syslog_f;
  5067. Lock(s->Keep->lock);
  5068. {
  5069. KEEP *k = s->Keep;
  5070. CfgAddBool(f, "UseKeepConnect", k->Enable);
  5071. CfgAddStr(f, "KeepConnectHost", k->ServerName);
  5072. CfgAddInt(f, "KeepConnectPort", k->ServerPort);
  5073. CfgAddInt(f, "KeepConnectProtocol", k->UdpMode);
  5074. CfgAddInt(f, "KeepConnectInterval", k->Interval / 1000);
  5075. }
  5076. Unlock(s->Keep->lock);
  5077. // syslog
  5078. syslog_f = CfgCreateFolder(f, "SyslogSettings");
  5079. if (syslog_f != NULL)
  5080. {
  5081. SYSLOG_SETTING set;
  5082. SiGetSysLogSetting(s, &set);
  5083. CfgAddInt(syslog_f, "SaveType", set.SaveType);
  5084. CfgAddStr(syslog_f, "HostName", set.Hostname);
  5085. CfgAddInt(syslog_f, "Port", set.Port);
  5086. }
  5087. // IPv6 listener disable setting
  5088. CfgAddBool(f, "DisableIPv6Listener", s->Cedar->DisableIPv6Listener);
  5089. // DoS
  5090. CfgAddBool(f, "DisableDosProction", s->DisableDosProction);
  5091. // MaxConnectionsPerIP
  5092. CfgAddInt(f, "MaxConnectionsPerIP", GetMaxConnectionsPerIp());
  5093. // MaxUnestablishedConnections
  5094. CfgAddInt(f, "MaxUnestablishedConnections", GetMaxUnestablishedConnections());
  5095. // DeadLock
  5096. CfgAddBool(f, "DisableDeadLockCheck", s->DisableDeadLockCheck);
  5097. // Eraser related
  5098. CfgAddInt64(f, "AutoDeleteCheckDiskFreeSpaceMin", s->Eraser->MinFreeSpace);
  5099. // WebUI
  5100. CfgAddBool(f, "UseWebUI", s->UseWebUI);
  5101. // NoLinuxArpFilter
  5102. if (GetOsInfo()->OsType == OSTYPE_LINUX)
  5103. {
  5104. CfgAddBool(f, "NoLinuxArpFilter", s->NoLinuxArpFilter);
  5105. }
  5106. // NoHighPriorityProcess
  5107. CfgAddBool(f, "NoHighPriorityProcess", s->NoHighPriorityProcess);
  5108. #ifdef OS_WIN32
  5109. CfgAddBool(f, "NoDebugDump", s->NoDebugDump);
  5110. #endif // OS_WIN32
  5111. if (s->ServerType == SERVER_TYPE_STANDALONE)
  5112. {
  5113. if (c->Bridge == false)
  5114. {
  5115. // Disable the NAT-traversal feature
  5116. CfgAddBool(f, "DisableNatTraversal", s->DisableNatTraversal);
  5117. // Disable the SSTP server function
  5118. CfgAddBool(f, "DisableSSTPServer", s->DisableSSTPServer);
  5119. // Disable the OpenVPN server function
  5120. CfgAddBool(f, "DisableOpenVPNServer", s->DisableOpenVPNServer);
  5121. }
  5122. }
  5123. if (c->Bridge == false)
  5124. {
  5125. // VPN over ICMP
  5126. CfgAddBool(f, "EnableVpnOverIcmp", s->EnableVpnOverIcmp);
  5127. // VPN over DNS
  5128. CfgAddBool(f, "EnableVpnOverDns", s->EnableVpnOverDns);
  5129. }
  5130. // Intel AES
  5131. CfgAddBool(f, "DisableIntelAesAcceleration", s->DisableIntelAesAcceleration);
  5132. if (c->Bridge == false)
  5133. {
  5134. OPENVPN_SSTP_CONFIG config;
  5135. SiGetOpenVPNAndSSTPConfig(s, &config);
  5136. CfgAddStr(f, "OpenVPN_UdpPortList", config.OpenVPNPortList);
  5137. }
  5138. // WebTimePage
  5139. CfgAddBool(f, "UseWebTimePage", s->UseWebTimePage);
  5140. // Debug log
  5141. CfgAddBool(f, "SaveDebugLog", s->SaveDebugLog);
  5142. // Let the client not to send a signature
  5143. CfgAddBool(f, "NoSendSignature", s->NoSendSignature);
  5144. if (is_vgs_cert == false)
  5145. {
  5146. // Server certificate
  5147. b = XToBuf(c->ServerX, false);
  5148. CfgAddBuf(f, "ServerCert", b);
  5149. FreeBuf(b);
  5150. // Server private key
  5151. b = KToBuf(c->ServerK, false, NULL);
  5152. CfgAddBuf(f, "ServerKey", b);
  5153. FreeBuf(b);
  5154. }
  5155. // Traffic information
  5156. Lock(c->TrafficLock);
  5157. {
  5158. SiWriteTraffic(f, "ServerTraffic", c->Traffic);
  5159. }
  5160. Unlock(c->TrafficLock);
  5161. // Type of server
  5162. if (s->Cedar->Bridge == false)
  5163. {
  5164. CfgAddInt(f, "ServerType", s->UpdatedServerType);
  5165. }
  5166. // Cipher Name
  5167. CfgAddStr(f, "CipherName", s->Cedar->CipherList);
  5168. // Password
  5169. CfgAddByte(f, "HashedPassword", s->HashedPassword, sizeof(s->HashedPassword));
  5170. if (s->UpdatedServerType == SERVER_TYPE_FARM_MEMBER)
  5171. {
  5172. char tmp[6 * MAX_PUBLIC_PORT_NUM + 1];
  5173. UINT i;
  5174. // Setting items in the case of farm members
  5175. CfgAddStr(f, "ControllerName", s->ControllerName);
  5176. CfgAddInt(f, "ControllerPort", s->ControllerPort);
  5177. CfgAddByte(f, "MemberPassword", s->MemberPassword, SHA1_SIZE);
  5178. CfgAddIp32(f, "PublicIp", s->PublicIp);
  5179. tmp[0] = 0;
  5180. for (i = 0;i < s->NumPublicPort;i++)
  5181. {
  5182. char tmp2[MAX_SIZE];
  5183. ToStr(tmp2, s->PublicPorts[i]);
  5184. StrCat(tmp, sizeof(tmp), tmp2);
  5185. StrCat(tmp, sizeof(tmp), ",");
  5186. }
  5187. if (StrLen(tmp) >= 1)
  5188. {
  5189. if (tmp[StrLen(tmp) - 1] == ',')
  5190. {
  5191. tmp[StrLen(tmp) - 1] = 0;
  5192. }
  5193. }
  5194. CfgAddStr(f, "PublicPorts", tmp);
  5195. }
  5196. if (s->UpdatedServerType != SERVER_TYPE_STANDALONE)
  5197. {
  5198. CfgAddInt(f, "ClusterMemberWeight", s->Weight);
  5199. }
  5200. if (s->UpdatedServerType == SERVER_TYPE_FARM_CONTROLLER)
  5201. {
  5202. CfgAddBool(f, "ControllerOnly", s->ControllerOnly);
  5203. }
  5204. // VPN Azure Client
  5205. if (s->AzureClient != NULL)
  5206. {
  5207. CfgAddBool(f, "EnableVpnAzure", s->EnableVpnAzure);
  5208. }
  5209. }
  5210. Unlock(c->lock);
  5211. }
  5212. // Read the traffic information
  5213. void SiLoadTraffic(FOLDER *parent, char *name, TRAFFIC *t)
  5214. {
  5215. FOLDER *f;
  5216. // Validate arguments
  5217. if (t != NULL)
  5218. {
  5219. Zero(t, sizeof(TRAFFIC));
  5220. }
  5221. if (parent == NULL || name == NULL || t == NULL)
  5222. {
  5223. return;
  5224. }
  5225. f = CfgGetFolder(parent, name);
  5226. if (f == NULL)
  5227. {
  5228. return;
  5229. }
  5230. SiLoadTrafficInner(f, "SendTraffic", &t->Send);
  5231. SiLoadTrafficInner(f, "RecvTraffic", &t->Recv);
  5232. }
  5233. void SiLoadTrafficInner(FOLDER *parent, char *name, TRAFFIC_ENTRY *e)
  5234. {
  5235. FOLDER *f;
  5236. // Validate arguments
  5237. if (e != NULL)
  5238. {
  5239. Zero(e, sizeof(TRAFFIC_ENTRY));
  5240. }
  5241. if (parent == NULL || name == NULL || e == NULL)
  5242. {
  5243. return;
  5244. }
  5245. f = CfgGetFolder(parent, name);
  5246. if (f == NULL)
  5247. {
  5248. return;
  5249. }
  5250. e->BroadcastCount = CfgGetInt64(f, "BroadcastCount");
  5251. e->BroadcastBytes = CfgGetInt64(f, "BroadcastBytes");
  5252. e->UnicastCount = CfgGetInt64(f, "UnicastCount");
  5253. e->UnicastBytes = CfgGetInt64(f, "UnicastBytes");
  5254. }
  5255. // Write the traffic information
  5256. void SiWriteTraffic(FOLDER *parent, char *name, TRAFFIC *t)
  5257. {
  5258. FOLDER *f;
  5259. // Validate arguments
  5260. if (parent == NULL || name == NULL || t == NULL)
  5261. {
  5262. return;
  5263. }
  5264. f = CfgCreateFolder(parent, name);
  5265. SiWriteTrafficInner(f, "SendTraffic", &t->Send);
  5266. SiWriteTrafficInner(f, "RecvTraffic", &t->Recv);
  5267. }
  5268. void SiWriteTrafficInner(FOLDER *parent, char *name, TRAFFIC_ENTRY *e)
  5269. {
  5270. FOLDER *f;
  5271. // Validate arguments
  5272. if (parent == NULL || name == NULL || e == NULL)
  5273. {
  5274. return;
  5275. }
  5276. f = CfgCreateFolder(parent, name);
  5277. CfgAddInt64(f, "BroadcastCount", e->BroadcastCount);
  5278. CfgAddInt64(f, "BroadcastBytes", e->BroadcastBytes);
  5279. CfgAddInt64(f, "UnicastCount", e->UnicastCount);
  5280. CfgAddInt64(f, "UnicastBytes", e->UnicastBytes);
  5281. }
  5282. // Thread for writing configuration file
  5283. void SiSaverThread(THREAD *thread, void *param)
  5284. {
  5285. SERVER *s = (SERVER *)param;
  5286. // Validate arguments
  5287. if (thread == NULL || param == NULL)
  5288. {
  5289. return;
  5290. }
  5291. while (s->Halt == false)
  5292. {
  5293. // Save to the configuration file
  5294. if (s->NoMoreSave == false)
  5295. {
  5296. SiWriteConfigurationFile(s);
  5297. }
  5298. Wait(s->SaveHaltEvent, s->AutoSaveConfigSpan);
  5299. }
  5300. }
  5301. // Write to the configuration file
  5302. UINT SiWriteConfigurationFile(SERVER *s)
  5303. {
  5304. UINT ret;
  5305. // Validate arguments
  5306. if (s == NULL)
  5307. {
  5308. return 0;
  5309. }
  5310. if (s->CfgRw == NULL)
  5311. {
  5312. return 0;
  5313. }
  5314. if (s->NoMoreSave)
  5315. {
  5316. return 0;
  5317. }
  5318. Lock(s->SaveCfgLock);
  5319. {
  5320. FOLDER *f;
  5321. Debug("save: SiWriteConfigurationToCfg() start.\n");
  5322. f = SiWriteConfigurationToCfg(s);
  5323. Debug("save: SiWriteConfigurationToCfg() finished.\n");
  5324. Debug("save: SaveCfgRw() start.\n");
  5325. ret = SaveCfgRwEx(s->CfgRw, f, s->BackupConfigOnlyWhenModified ? s->ConfigRevision : INFINITE);
  5326. Debug("save: SaveCfgRw() finished.\n");
  5327. Debug("save: CfgDeleteFolder() start.\n");
  5328. CfgDeleteFolder(f);
  5329. Debug("save: CfgDeleteFolder() finished.\n");
  5330. }
  5331. Unlock(s->SaveCfgLock);
  5332. return ret;
  5333. }
  5334. // Release the configuration
  5335. void SiFreeConfiguration(SERVER *s)
  5336. {
  5337. // Validate arguments
  5338. if (s == NULL)
  5339. {
  5340. return;
  5341. }
  5342. // Write to the configuration file
  5343. SiWriteConfigurationFile(s);
  5344. // Terminate the configuration file saving thread
  5345. s->NoMoreSave = true;
  5346. s->Halt = true;
  5347. Set(s->SaveHaltEvent);
  5348. WaitThread(s->SaveThread, INFINITE);
  5349. ReleaseEvent(s->SaveHaltEvent);
  5350. ReleaseThread(s->SaveThread);
  5351. s->SaveHaltEvent = NULL;
  5352. s->SaveThread = NULL;
  5353. // Stop the IPsec server
  5354. if (s->IPsecServer != NULL)
  5355. {
  5356. FreeIPsecServer(s->IPsecServer);
  5357. s->IPsecServer = NULL;
  5358. }
  5359. // Terminate the OpenVPN server
  5360. if (s->OpenVpnServerUdp != NULL)
  5361. {
  5362. FreeOpenVpnServerUdp(s->OpenVpnServerUdp);
  5363. s->OpenVpnServerUdp = NULL;
  5364. }
  5365. // Terminate the DDNS client
  5366. if (s->DDnsClient != NULL)
  5367. {
  5368. FreeDDNSClient(s->DDnsClient);
  5369. s->DDnsClient = NULL;
  5370. }
  5371. // Terminate the VPN Azure client
  5372. if (s->AzureClient != NULL)
  5373. {
  5374. FreeAzureClient(s->AzureClient);
  5375. s->AzureClient = NULL;
  5376. }
  5377. FreeCfgRw(s->CfgRw);
  5378. s->CfgRw = NULL;
  5379. // Release the Ethernet
  5380. FreeEth();
  5381. }
  5382. // Initialize the StXxx related function
  5383. void StInit()
  5384. {
  5385. if (server_lock != NULL)
  5386. {
  5387. return;
  5388. }
  5389. server_lock = NewLock();
  5390. }
  5391. // Release the StXxx related function
  5392. void StFree()
  5393. {
  5394. DeleteLock(server_lock);
  5395. server_lock = NULL;
  5396. }
  5397. // Start the server
  5398. void StStartServer(bool bridge)
  5399. {
  5400. Lock(server_lock);
  5401. {
  5402. if (server != NULL)
  5403. {
  5404. // It has already started
  5405. Unlock(server_lock);
  5406. return;
  5407. }
  5408. // Create a server
  5409. server = SiNewServer(bridge);
  5410. }
  5411. Unlock(server_lock);
  5412. // StartCedarLog();
  5413. }
  5414. // Get the server
  5415. SERVER *StGetServer()
  5416. {
  5417. if (server == NULL)
  5418. {
  5419. return NULL;
  5420. }
  5421. return server;
  5422. }
  5423. // Stop the server
  5424. void StStopServer()
  5425. {
  5426. Lock(server_lock);
  5427. {
  5428. if (server == NULL)
  5429. {
  5430. // Not started
  5431. Unlock(server_lock);
  5432. return;
  5433. }
  5434. // Release the server
  5435. SiReleaseServer(server);
  5436. server = NULL;
  5437. }
  5438. Unlock(server_lock);
  5439. StopCedarLog();
  5440. }
  5441. // Set the type of server
  5442. void SiSetServerType(SERVER *s, UINT type,
  5443. UINT ip, UINT num_port, UINT *ports,
  5444. char *controller_name, UINT controller_port, UCHAR *password, UINT weight, bool controller_only)
  5445. {
  5446. bool bridge;
  5447. // Validate arguments
  5448. if (s == NULL)
  5449. {
  5450. return;
  5451. }
  5452. if (type == SERVER_TYPE_FARM_MEMBER &&
  5453. (num_port == 0 || ports == NULL || controller_name == NULL ||
  5454. controller_port == 0 || password == NULL || num_port > MAX_PUBLIC_PORT_NUM))
  5455. {
  5456. return;
  5457. }
  5458. if (weight == 0)
  5459. {
  5460. weight = FARM_DEFAULT_WEIGHT;
  5461. }
  5462. bridge = s->Cedar->Bridge;
  5463. Lock(s->lock);
  5464. {
  5465. // Update types
  5466. s->UpdatedServerType = type;
  5467. s->Weight = weight;
  5468. // Set the value
  5469. if (type == SERVER_TYPE_FARM_MEMBER)
  5470. {
  5471. StrCpy(s->ControllerName, sizeof(s->ControllerName), controller_name);
  5472. s->ControllerPort = controller_port;
  5473. if (IsZero(password, SHA1_SIZE) == false)
  5474. {
  5475. Copy(s->MemberPassword, password, SHA1_SIZE);
  5476. }
  5477. s->PublicIp = ip;
  5478. s->NumPublicPort = num_port;
  5479. if (s->PublicPorts != NULL)
  5480. {
  5481. Free(s->PublicPorts);
  5482. }
  5483. s->PublicPorts = ZeroMalloc(num_port * sizeof(UINT));
  5484. Copy(s->PublicPorts, ports, num_port * sizeof(UINT));
  5485. }
  5486. if (type == SERVER_TYPE_FARM_CONTROLLER)
  5487. {
  5488. s->ControllerOnly = controller_only;
  5489. }
  5490. }
  5491. Unlock(s->lock);
  5492. // Restart the server
  5493. SiRebootServer(bridge);
  5494. }
  5495. // Thread to restart the server
  5496. void SiRebootServerThread(THREAD *thread, void *param)
  5497. {
  5498. // Validate arguments
  5499. if (thread == NULL)
  5500. {
  5501. return;
  5502. }
  5503. if (server == NULL)
  5504. {
  5505. return;
  5506. }
  5507. // Stop the server
  5508. StStopServer();
  5509. // Start the server
  5510. StStartServer((bool)param);
  5511. }
  5512. // Restart the server
  5513. void SiRebootServer(bool bridge)
  5514. {
  5515. SiRebootServerEx(bridge, false);
  5516. }
  5517. void SiRebootServerEx(bool bridge, bool reset_setting)
  5518. {
  5519. THREAD *t;
  5520. server_reset_setting = reset_setting;
  5521. t = NewThread(SiRebootServerThread, (void *)bridge);
  5522. ReleaseThread(t);
  5523. }
  5524. // Set the state of the special listener
  5525. void SiApplySpecialListenerStatus(SERVER *s)
  5526. {
  5527. // Validate arguments
  5528. if (s == NULL)
  5529. {
  5530. return;
  5531. }
  5532. if (s->DynListenerDns != NULL)
  5533. {
  5534. *s->DynListenerDns->EnablePtr = s->EnableVpnOverDns;
  5535. ApplyDynamicListener(s->DynListenerDns);
  5536. }
  5537. if (s->DynListenerIcmp != NULL)
  5538. {
  5539. *s->DynListenerIcmp->EnablePtr = s->EnableVpnOverIcmp;
  5540. ApplyDynamicListener(s->DynListenerIcmp);
  5541. }
  5542. }
  5543. // Stop all listeners
  5544. void SiStopAllListener(SERVER *s)
  5545. {
  5546. // Validate arguments
  5547. if (s == NULL)
  5548. {
  5549. return;
  5550. }
  5551. SiLockListenerList(s);
  5552. {
  5553. UINT i;
  5554. LIST *o = NewListFast(NULL);
  5555. for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
  5556. {
  5557. SERVER_LISTENER *e = LIST_DATA(s->ServerListenerList, i);
  5558. Add(o, e);
  5559. }
  5560. for (i = 0;i < LIST_NUM(o);i++)
  5561. {
  5562. SERVER_LISTENER *e = LIST_DATA(o, i);
  5563. SiDeleteListener(s, e->Port);
  5564. }
  5565. ReleaseList(o);
  5566. }
  5567. SiUnlockListenerList(s);
  5568. ReleaseList(s->ServerListenerList);
  5569. // Stop the VPN over ICMP listener
  5570. FreeDynamicListener(s->DynListenerIcmp);
  5571. s->DynListenerIcmp = NULL;
  5572. // Stop the VPN over DNS listener
  5573. FreeDynamicListener(s->DynListenerDns);
  5574. s->DynListenerDns = NULL;
  5575. }
  5576. // Clean-up the server
  5577. void SiCleanupServer(SERVER *s)
  5578. {
  5579. UINT i;
  5580. CEDAR *c;
  5581. LISTENER **listener_list;
  5582. UINT num_listener;
  5583. HUB **hub_list;
  5584. UINT num_hub;
  5585. // Validate arguments
  5586. if (s == NULL)
  5587. {
  5588. return;
  5589. }
  5590. SiFreeDeadLockCheck(s);
  5591. c = s->Cedar;
  5592. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5593. {
  5594. // In the case of farm members, stop the connection to the farm controller
  5595. SLog(c, "LS_STOP_FARM_MEMBER");
  5596. SiStopConnectToController(s->FarmController);
  5597. s->FarmController = NULL;
  5598. SLog(c, "LS_STOP_FARM_MEMBER_2");
  5599. }
  5600. IncrementServerConfigRevision(s);
  5601. SLog(c, "LS_END_2");
  5602. SLog(c, "LS_STOP_ALL_LISTENER");
  5603. // Stop all listeners
  5604. LockList(c->ListenerList);
  5605. {
  5606. listener_list = ToArray(c->ListenerList);
  5607. num_listener = LIST_NUM(c->ListenerList);
  5608. for (i = 0;i < num_listener;i++)
  5609. {
  5610. AddRef(listener_list[i]->ref);
  5611. }
  5612. }
  5613. UnlockList(c->ListenerList);
  5614. for (i = 0;i < num_listener;i++)
  5615. {
  5616. StopListener(listener_list[i]);
  5617. ReleaseListener(listener_list[i]);
  5618. }
  5619. Free(listener_list);
  5620. SLog(c, "LS_STOP_ALL_LISTENER_2");
  5621. SLog(c, "LS_STOP_ALL_HUB");
  5622. // Stop all HUBs
  5623. LockList(c->HubList);
  5624. {
  5625. hub_list = ToArray(c->HubList);
  5626. num_hub = LIST_NUM(c->HubList);
  5627. for (i = 0;i < num_hub;i++)
  5628. {
  5629. AddRef(hub_list[i]->ref);
  5630. }
  5631. }
  5632. UnlockList(c->HubList);
  5633. for (i = 0;i < num_hub;i++)
  5634. {
  5635. StopHub(hub_list[i]);
  5636. ReleaseHub(hub_list[i]);
  5637. }
  5638. Free(hub_list);
  5639. SLog(c, "LS_STOP_ALL_HUB_2");
  5640. // Release the configuration
  5641. SiFreeConfiguration(s);
  5642. // Stop the Cedar
  5643. SLog(c, "LS_STOP_CEDAR");
  5644. StopCedar(s->Cedar);
  5645. SLog(c, "LS_STOP_CEDAR_2");
  5646. // Stop all listeners
  5647. SiStopAllListener(s);
  5648. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  5649. {
  5650. // In the case of farm controller
  5651. UINT i;
  5652. SLog(c, "LS_STOP_FARM_CONTROL");
  5653. // Stop the farm controling
  5654. SiStopFarmControl(s);
  5655. // Release the farm member information
  5656. ReleaseList(s->FarmMemberList);
  5657. s->FarmMemberList = NULL;
  5658. for (i = 0;i < LIST_NUM(s->Me->HubList);i++)
  5659. {
  5660. Free(LIST_DATA(s->Me->HubList, i));
  5661. }
  5662. ReleaseList(s->Me->HubList);
  5663. Free(s->Me);
  5664. SLog(c, "LS_STOP_FARM_CONTROL_2");
  5665. }
  5666. if (s->PublicPorts != NULL)
  5667. {
  5668. Free(s->PublicPorts);
  5669. }
  5670. SLog(s->Cedar, "LS_END_1");
  5671. SLog(s->Cedar, "L_LINE");
  5672. #ifdef ENABLE_AZURE_SERVER
  5673. if (s->AzureServer != NULL)
  5674. {
  5675. FreeAzureServer(s->AzureServer);
  5676. }
  5677. #endif // ENABLE_AZURE_SERVER
  5678. ReleaseCedar(s->Cedar);
  5679. DeleteLock(s->lock);
  5680. DeleteLock(s->SaveCfgLock);
  5681. StopKeep(s->Keep);
  5682. FreeEraser(s->Eraser);
  5683. FreeLog(s->Logger);
  5684. FreeSysLog(s->Syslog);
  5685. DeleteLock(s->SyslogLock);
  5686. FreeServerCapsCache(s);
  5687. SiFreeHubCreateHistory(s);
  5688. // Stop the debug log
  5689. FreeTinyLog(s->DebugLog);
  5690. DeleteLock(s->TasksFromFarmControllerLock);
  5691. DeleteLock(s->OpenVpnSstpConfigLock);
  5692. Free(s);
  5693. }
  5694. // Release the server
  5695. void SiReleaseServer(SERVER *s)
  5696. {
  5697. // Validate arguments
  5698. if (s == NULL)
  5699. {
  5700. return;
  5701. }
  5702. if (Release(s->ref) == 0)
  5703. {
  5704. SiCleanupServer(s);
  5705. }
  5706. }
  5707. // Get the URL of the member selector
  5708. bool SiGetMemberSelectorUrl(char *url, UINT url_size)
  5709. {
  5710. BUF *b;
  5711. bool ret = false;
  5712. // Validate arguments
  5713. if (url == NULL)
  5714. {
  5715. return false;
  5716. }
  5717. b = ReadDump(MEMBER_SELECTOR_TXT_FILENAME);
  5718. if (b == NULL)
  5719. {
  5720. return false;
  5721. }
  5722. while (true)
  5723. {
  5724. char *line = CfgReadNextLine(b);
  5725. if (line == NULL)
  5726. {
  5727. break;
  5728. }
  5729. Trim(line);
  5730. if (IsEmptyStr(line) == false && ret == false)
  5731. {
  5732. StrCpy(url, url_size, line);
  5733. ret = true;
  5734. }
  5735. Free(line);
  5736. }
  5737. FreeBuf(b);
  5738. return ret;
  5739. }
  5740. // Specify the farm member for the next processing
  5741. FARM_MEMBER *SiGetNextFarmMember(SERVER *s, CONNECTION *c, HUB *h)
  5742. {
  5743. UINT i, num;
  5744. UINT min_point = 0;
  5745. FARM_MEMBER *ret = NULL;
  5746. PACK *p;
  5747. char url[MAX_SIZE];
  5748. // Validate arguments
  5749. if (s == NULL || s->ServerType != SERVER_TYPE_FARM_CONTROLLER || c == NULL || h == NULL)
  5750. {
  5751. return NULL;
  5752. }
  5753. num = LIST_NUM(s->FarmMemberList);
  5754. if (num == 0)
  5755. {
  5756. return NULL;
  5757. }
  5758. if (SiGetMemberSelectorUrl(url, sizeof(url)))
  5759. {
  5760. UINT64 ret_key = 0;
  5761. // Generate the data for the member selector
  5762. p = NewPack();
  5763. for (i = 0;i < num;i++)
  5764. {
  5765. UINT num_sessions;
  5766. UINT max_sessions;
  5767. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  5768. bool do_not_select = false;
  5769. if (s->ControllerOnly)
  5770. {
  5771. if (f->Me)
  5772. {
  5773. // No to select myself in the case of ControllerOnly
  5774. do_not_select = true;
  5775. }
  5776. }
  5777. if (f->Me == false)
  5778. {
  5779. num_sessions = f->NumSessions;
  5780. max_sessions = f->MaxSessions;
  5781. }
  5782. else
  5783. {
  5784. num_sessions = Count(s->Cedar->CurrentSessions);
  5785. max_sessions = GetServerCapsInt(s, "i_max_sessions");
  5786. }
  5787. if (max_sessions == 0)
  5788. {
  5789. max_sessions = GetServerCapsInt(s, "i_max_sessions");
  5790. }
  5791. if (num_sessions >= max_sessions)
  5792. {
  5793. do_not_select = true;
  5794. }
  5795. if (true)
  5796. {
  5797. UINT point = f->Point;
  5798. char public_ip_str[MAX_SIZE];
  5799. IPToStr32(public_ip_str, sizeof(public_ip_str), f->Ip);
  5800. PackAddIntEx(p, "Point", point, i, num);
  5801. PackAddInt64Ex(p, "Key", (UINT64)f, i, num);
  5802. PackAddStrEx(p, "Hostname", f->hostname, i, num);
  5803. PackAddStrEx(p, "PublicIp", public_ip_str, i, num);
  5804. PackAddIntEx(p, "NumSessions", num_sessions, i, num);
  5805. PackAddIntEx(p, "MaxSessions", max_sessions, i, num);
  5806. PackAddIntEx(p, "AssignedClientLicense", f->AssignedClientLicense, i, num);
  5807. PackAddIntEx(p, "AssignedBridgeLicense", f->AssignedBridgeLicense, i, num);
  5808. PackAddIntEx(p, "Weight", f->Weight, i, num);
  5809. PackAddDataEx(p, "RandomKey", f->RandomKey, SHA1_SIZE, i, num);
  5810. PackAddIntEx(p, "NumTcpConnections", f->NumTcpConnections, i, num);
  5811. PackAddIntEx(p, "NumHubs", LIST_NUM(f->HubList), i, num);
  5812. PackAddBoolEx(p, "Me", f->Me, i, num);
  5813. PackAddInt64Ex(p, "ConnectedTime", f->ConnectedTime, i, num);
  5814. PackAddInt64Ex(p, "SystemId", f->SystemId, i, num);
  5815. PackAddBoolEx(p, "DoNotSelect", do_not_select, i, num);
  5816. }
  5817. }
  5818. if (true)
  5819. {
  5820. char client_ip_str[MAX_SIZE];
  5821. UINT client_port = 0;
  5822. UINT server_port = 0;
  5823. SOCK *s = c->FirstSock;
  5824. Zero(client_ip_str, sizeof(client_ip_str));
  5825. if (s != NULL)
  5826. {
  5827. IPToStr(client_ip_str, sizeof(client_ip_str), &s->RemoteIP);
  5828. client_port = s->RemotePort;
  5829. server_port = s->LocalPort;
  5830. }
  5831. PackAddStr(p, "ClientIp", client_ip_str);
  5832. PackAddInt(p, "ClientPort", client_port);
  5833. PackAddInt(p, "ServerPort", server_port);
  5834. PackAddInt(p, "ClientBuild", c->ClientBuild);
  5835. PackAddStr(p, "CipherName", c->CipherName);
  5836. PackAddStr(p, "ClientStr", c->ClientStr);
  5837. PackAddInt(p, "ClientVer", c->ClientVer);
  5838. PackAddInt64(p, "ConnectedTime", Tick64ToTime64(c->ConnectedTick));
  5839. PackAddStr(p, "HubName", h->Name);
  5840. PackAddBool(p, "StaticHub", h->Type == HUB_TYPE_FARM_STATIC);
  5841. }
  5842. PackAddInt(p, "NumMembers", num);
  5843. // Make the member selector choose a member
  5844. UnlockList(s->FarmMemberList);
  5845. Unlock(s->Cedar->CedarSuperLock);
  5846. {
  5847. PACK *ret;
  5848. Debug("Calling %s ...\n", url);
  5849. ret = WpcCall(url, NULL, MEMBER_SELECTOR_CONNECT_TIMEOUT, MEMBER_SELECTOR_DATA_TIMEOUT,
  5850. "Select", p, NULL, NULL, NULL);
  5851. if (GetErrorFromPack(ret) == ERR_NO_ERROR)
  5852. {
  5853. ret_key = PackGetInt64(ret, "Key");
  5854. Debug("Ret Key = %I64u\n", ret_key);
  5855. }
  5856. else
  5857. {
  5858. Debug("Error: %u\n", GetErrorFromPack(ret));
  5859. }
  5860. FreePack(ret);
  5861. }
  5862. Lock(s->Cedar->CedarSuperLock);
  5863. LockList(s->FarmMemberList);
  5864. FreePack(p);
  5865. if (ret_key != 0)
  5866. {
  5867. FARM_MEMBER *f = (FARM_MEMBER *)ret_key;
  5868. if (IsInList(s->FarmMemberList, f))
  5869. {
  5870. Debug("Farm Member Selected by Selector: %s\n", f->hostname);
  5871. return f;
  5872. }
  5873. else
  5874. {
  5875. Debug("Farm Member Key = %I64u Not Found.\n", ret_key);
  5876. }
  5877. }
  5878. else
  5879. {
  5880. // The member selector failed to select a member
  5881. return NULL;
  5882. }
  5883. }
  5884. num = LIST_NUM(s->FarmMemberList);
  5885. if (num == 0)
  5886. {
  5887. return NULL;
  5888. }
  5889. for (i = 0;i < num;i++)
  5890. {
  5891. UINT num_sessions;
  5892. UINT max_sessions;
  5893. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  5894. if (s->ControllerOnly)
  5895. {
  5896. if (f->Me)
  5897. {
  5898. // No to select myself in the case of ControllerOnly
  5899. continue;
  5900. }
  5901. }
  5902. if (f->Me == false)
  5903. {
  5904. num_sessions = f->NumSessions;
  5905. max_sessions = f->MaxSessions;
  5906. }
  5907. else
  5908. {
  5909. num_sessions = Count(s->Cedar->CurrentSessions);
  5910. max_sessions = GetServerCapsInt(s, "i_max_sessions");
  5911. }
  5912. if (max_sessions == 0)
  5913. {
  5914. max_sessions = GetServerCapsInt(s, "i_max_sessions");
  5915. }
  5916. if (num_sessions < max_sessions)
  5917. {
  5918. if (f->Point >= min_point)
  5919. {
  5920. min_point = f->Point;
  5921. ret = f;
  5922. }
  5923. }
  5924. }
  5925. return ret;
  5926. }
  5927. // Receive a HUB enumeration directive
  5928. void SiCalledEnumHub(SERVER *s, PACK *p, PACK *req)
  5929. {
  5930. UINT i;
  5931. CEDAR *c;
  5932. UINT num = 0;
  5933. // Validate arguments
  5934. if (s == NULL || p == NULL || req == NULL)
  5935. {
  5936. return;
  5937. }
  5938. c = s->Cedar;
  5939. LockList(c->HubList);
  5940. {
  5941. UINT num = LIST_NUM(c->HubList);
  5942. for (i = 0;i < num;i++)
  5943. {
  5944. HUB *h = LIST_DATA(c->HubList, i);
  5945. Lock(h->lock);
  5946. {
  5947. PackAddStrEx(p, "HubName", h->Name, i, num);
  5948. PackAddIntEx(p, "HubType", h->Type, i, num);
  5949. PackAddIntEx(p, "NumSession", Count(h->NumSessions), i, num);
  5950. PackAddIntEx(p, "NumSessions", LIST_NUM(h->SessionList), i, num);
  5951. PackAddIntEx(p, "NumSessionsClient", Count(h->NumSessionsClient), i, num);
  5952. PackAddIntEx(p, "NumSessionsBridge", Count(h->NumSessionsBridge), i, num);
  5953. PackAddIntEx(p, "NumMacTables", LIST_NUM(h->MacTable), i, num);
  5954. PackAddIntEx(p, "NumIpTables", LIST_NUM(h->IpTable), i, num);
  5955. PackAddInt64Ex(p, "LastCommTime", h->LastCommTime, i, num);
  5956. PackAddInt64Ex(p, "CreatedTime", h->CreatedTime, i, num);
  5957. }
  5958. Unlock(h->lock);
  5959. }
  5960. }
  5961. UnlockList(c->HubList);
  5962. PackAddInt(p, "Point", SiGetPoint(s));
  5963. PackAddInt(p, "NumTcpConnections", Count(s->Cedar->CurrentTcpConnections));
  5964. PackAddInt(p, "NumTotalSessions", Count(s->Cedar->CurrentSessions));
  5965. PackAddInt(p, "MaxSessions", GetServerCapsInt(s, "i_max_sessions"));
  5966. PackAddInt(p, "AssignedClientLicense", Count(s->Cedar->AssignedClientLicense));
  5967. PackAddInt(p, "AssignedBridgeLicense", Count(s->Cedar->AssignedBridgeLicense));
  5968. PackAddData(p, "RandomKey", s->MyRandomKey, SHA1_SIZE);
  5969. Lock(c->TrafficLock);
  5970. {
  5971. OutRpcTraffic(p, c->Traffic);
  5972. }
  5973. Unlock(c->TrafficLock);
  5974. LockList(c->TrafficDiffList);
  5975. {
  5976. UINT num = LIST_NUM(c->TrafficDiffList);
  5977. UINT i;
  5978. for (i = 0;i < num;i++)
  5979. {
  5980. TRAFFIC_DIFF *d = LIST_DATA(c->TrafficDiffList, i);
  5981. PackAddIntEx(p, "TdType", d->Type, i, num);
  5982. PackAddStrEx(p, "TdHubName", d->HubName, i, num);
  5983. PackAddStrEx(p, "TdName", d->Name, i, num);
  5984. OutRpcTrafficEx(&d->Traffic, p, i, num);
  5985. Free(d->HubName);
  5986. Free(d->Name);
  5987. Free(d);
  5988. }
  5989. DeleteAll(c->TrafficDiffList);
  5990. }
  5991. UnlockList(c->TrafficDiffList);
  5992. }
  5993. // Receive a HUB delete directive
  5994. void SiCalledDeleteHub(SERVER *s, PACK *p)
  5995. {
  5996. char name[MAX_SIZE];
  5997. HUB *h;
  5998. // Validate arguments
  5999. if (s == NULL || p == NULL)
  6000. {
  6001. return;
  6002. }
  6003. if (PackGetStr(p, "HubName", name, sizeof(name)) == false)
  6004. {
  6005. return;
  6006. }
  6007. LockHubList(s->Cedar);
  6008. h = GetHub(s->Cedar, name);
  6009. if (h == NULL)
  6010. {
  6011. UnlockHubList(s->Cedar);
  6012. return;
  6013. }
  6014. UnlockHubList(s->Cedar);
  6015. SetHubOffline(h);
  6016. LockHubList(s->Cedar);
  6017. DelHubEx(s->Cedar, h, true);
  6018. UnlockHubList(s->Cedar);
  6019. ReleaseHub(h);
  6020. }
  6021. // Receive a HUB update directive
  6022. void SiCalledUpdateHub(SERVER *s, PACK *p)
  6023. {
  6024. char name[MAX_SIZE];
  6025. UINT type;
  6026. HUB_OPTION o;
  6027. HUB_LOG log;
  6028. bool save_packet_log;
  6029. UINT packet_log_switch_type;
  6030. UINT packet_log_config[NUM_PACKET_LOG];
  6031. bool save_security_log;
  6032. bool type_changed = false;
  6033. UINT security_log_switch_type;
  6034. UINT i;
  6035. HUB *h;
  6036. // Validate arguments
  6037. if (s == NULL || p == NULL)
  6038. {
  6039. return;
  6040. }
  6041. PackGetStr(p, "HubName", name, sizeof(name));
  6042. type = PackGetInt(p, "HubType");
  6043. Zero(&o, sizeof(o));
  6044. o.MaxSession = PackGetInt(p, "MaxSession");
  6045. o.NoArpPolling = PackGetBool(p, "NoArpPolling");
  6046. o.NoIPv6AddrPolling = PackGetBool(p, "NoIPv6AddrPolling");
  6047. o.FilterPPPoE = PackGetBool(p, "FilterPPPoE");
  6048. o.YieldAfterStorePacket = PackGetBool(p, "YieldAfterStorePacket");
  6049. o.NoSpinLockForPacketDelay = PackGetBool(p, "NoSpinLockForPacketDelay");
  6050. o.BroadcastStormDetectionThreshold = PackGetInt(p, "BroadcastStormDetectionThreshold");
  6051. o.ClientMinimumRequiredBuild = PackGetInt(p, "ClientMinimumRequiredBuild");
  6052. o.FixForDLinkBPDU = PackGetBool(p, "FixForDLinkBPDU");
  6053. o.BroadcastLimiterStrictMode = PackGetBool(p, "BroadcastLimiterStrictMode");
  6054. o.NoLookBPDUBridgeId = PackGetBool(p, "NoLookBPDUBridgeId");
  6055. o.NoManageVlanId = PackGetBool(p, "NoManageVlanId");
  6056. o.MaxLoggedPacketsPerMinute = PackGetInt(p, "MaxLoggedPacketsPerMinute");
  6057. o.DoNotSaveHeavySecurityLogs = PackGetBool(p, "DoNotSaveHeavySecurityLogs");
  6058. o.DropBroadcastsInPrivacyFilterMode = PackGetBool(p, "DropBroadcastsInPrivacyFilterMode");
  6059. o.DropArpInPrivacyFilterMode = PackGetBool(p, "DropArpInPrivacyFilterMode");
  6060. o.SuppressClientUpdateNotification = PackGetBool(p, "SuppressClientUpdateNotification");
  6061. o.VlanTypeId = PackGetInt(p, "VlanTypeId");
  6062. if (o.VlanTypeId == 0)
  6063. {
  6064. o.VlanTypeId = MAC_PROTO_TAGVLAN;
  6065. }
  6066. o.FilterOSPF = PackGetBool(p, "FilterOSPF");
  6067. o.FilterIPv4 = PackGetBool(p, "FilterIPv4");
  6068. o.FilterIPv6 = PackGetBool(p, "FilterIPv6");
  6069. o.FilterNonIP = PackGetBool(p, "FilterNonIP");
  6070. o.NoIPv4PacketLog = PackGetBool(p, "NoIPv4PacketLog");
  6071. o.NoIPv6PacketLog = PackGetBool(p, "NoIPv6PacketLog");
  6072. o.FilterBPDU = PackGetBool(p, "FilterBPDU");
  6073. o.NoIPv6DefaultRouterInRAWhenIPv6 = PackGetBool(p, "NoIPv6DefaultRouterInRAWhenIPv6");
  6074. o.NoMacAddressLog = PackGetBool(p, "NoMacAddressLog");
  6075. o.ManageOnlyPrivateIP = PackGetBool(p, "ManageOnlyPrivateIP");
  6076. o.ManageOnlyLocalUnicastIPv6 = PackGetBool(p, "ManageOnlyLocalUnicastIPv6");
  6077. o.DisableIPParsing = PackGetBool(p, "DisableIPParsing");
  6078. o.NoIpTable = PackGetBool(p, "NoIpTable");
  6079. o.NoEnum = PackGetBool(p, "NoEnum");
  6080. o.AdjustTcpMssValue = PackGetInt(p, "AdjustTcpMssValue");
  6081. o.DisableAdjustTcpMss = PackGetBool(p, "DisableAdjustTcpMss");
  6082. o.NoDhcpPacketLogOutsideHub = PackGetBool(p, "NoDhcpPacketLogOutsideHub");
  6083. o.DisableHttpParsing = PackGetBool(p, "DisableHttpParsing");
  6084. o.DisableUdpAcceleration = PackGetBool(p, "DisableUdpAcceleration");
  6085. o.DisableUdpFilterForLocalBridgeNic = PackGetBool(p, "DisableUdpFilterForLocalBridgeNic");
  6086. o.ApplyIPv4AccessListOnArpPacket = PackGetBool(p, "ApplyIPv4AccessListOnArpPacket");
  6087. o.RemoveDefGwOnDhcpForLocalhost = PackGetBool(p, "RemoveDefGwOnDhcpForLocalhost");
  6088. o.SecureNAT_MaxTcpSessionsPerIp = PackGetInt(p, "SecureNAT_MaxTcpSessionsPerIp");
  6089. o.SecureNAT_MaxTcpSynSentPerIp = PackGetInt(p, "SecureNAT_MaxTcpSynSentPerIp");
  6090. o.SecureNAT_MaxUdpSessionsPerIp = PackGetInt(p, "SecureNAT_MaxUdpSessionsPerIp");
  6091. o.SecureNAT_MaxDnsSessionsPerIp = PackGetInt(p, "SecureNAT_MaxDnsSessionsPerIp");
  6092. o.SecureNAT_MaxIcmpSessionsPerIp = PackGetInt(p, "SecureNAT_MaxIcmpSessionsPerIp");
  6093. o.AccessListIncludeFileCacheLifetime = PackGetInt(p, "AccessListIncludeFileCacheLifetime");
  6094. if (o.AccessListIncludeFileCacheLifetime == 0)
  6095. {
  6096. o.AccessListIncludeFileCacheLifetime = ACCESS_LIST_INCLUDE_FILE_CACHE_LIFETIME;
  6097. }
  6098. o.DisableKernelModeSecureNAT = PackGetBool(p, "DisableKernelModeSecureNAT");
  6099. o.DisableUserModeSecureNAT = PackGetBool(p, "DisableUserModeSecureNAT");
  6100. o.DisableCheckMacOnLocalBridge = PackGetBool(p, "DisableCheckMacOnLocalBridge");
  6101. o.DisableCorrectIpOffloadChecksum = PackGetBool(p, "DisableCorrectIpOffloadChecksum");
  6102. save_packet_log = PackGetInt(p, "SavePacketLog");
  6103. packet_log_switch_type = PackGetInt(p, "PacketLogSwitchType");
  6104. for (i = 0;i < NUM_PACKET_LOG;i++)
  6105. {
  6106. packet_log_config[i] = PackGetIntEx(p, "PacketLogConfig", i);
  6107. }
  6108. save_security_log = PackGetInt(p, "SaveSecurityLog");
  6109. security_log_switch_type = PackGetInt(p, "SecurityLogSwitchType");
  6110. Zero(&log, sizeof(log));
  6111. log.SavePacketLog = save_packet_log;
  6112. log.PacketLogSwitchType = packet_log_switch_type;
  6113. Copy(log.PacketLogConfig, packet_log_config, sizeof(log.PacketLogConfig));
  6114. log.SaveSecurityLog = save_security_log;
  6115. log.SecurityLogSwitchType = security_log_switch_type;
  6116. h = GetHub(s->Cedar, name);
  6117. if (h == NULL)
  6118. {
  6119. return;
  6120. }
  6121. h->FarmMember_MaxSessionClient = PackGetInt(p, "MaxSessionClient");
  6122. h->FarmMember_MaxSessionBridge = PackGetInt(p, "MaxSessionBridge");
  6123. h->FarmMember_MaxSessionClientBridgeApply = PackGetBool(p, "MaxSessionClientBridgeApply");
  6124. if (h->FarmMember_MaxSessionClientBridgeApply == false)
  6125. {
  6126. h->FarmMember_MaxSessionClient = INFINITE;
  6127. h->FarmMember_MaxSessionBridge = INFINITE;
  6128. }
  6129. Lock(h->lock);
  6130. {
  6131. Copy(h->Option, &o, sizeof(HUB_OPTION));
  6132. PackGetData2(p, "SecurePassword", h->SecurePassword, SHA1_SIZE);
  6133. PackGetData2(p, "HashedPassword", h->HashedPassword, SHA1_SIZE);
  6134. }
  6135. Unlock(h->lock);
  6136. SetHubLogSetting(h, &log);
  6137. if (h->Type != type)
  6138. {
  6139. h->Type = type;
  6140. type_changed = true;
  6141. }
  6142. LockList(h->AccessList);
  6143. {
  6144. UINT i;
  6145. for (i = 0;i < LIST_NUM(h->AccessList);i++)
  6146. {
  6147. ACCESS *a = LIST_DATA(h->AccessList, i);
  6148. Free(a);
  6149. }
  6150. DeleteAll(h->AccessList);
  6151. }
  6152. UnlockList(h->AccessList);
  6153. for (i = 0;i < SiNumAccessFromPack(p);i++)
  6154. {
  6155. ACCESS *a = SiPackToAccess(p, i);
  6156. AddAccessList(h, a);
  6157. Free(a);
  6158. }
  6159. if (PackGetBool(p, "EnableSecureNAT"))
  6160. {
  6161. VH_OPTION t;
  6162. bool changed;
  6163. InVhOption(&t, p);
  6164. changed = Cmp(h->SecureNATOption, &t, sizeof(VH_OPTION)) == 0 ? false : true;
  6165. Copy(h->SecureNATOption, &t, sizeof(VH_OPTION));
  6166. EnableSecureNAT(h, true);
  6167. if (changed)
  6168. {
  6169. Lock(h->lock_online);
  6170. {
  6171. if (h->SecureNAT != NULL)
  6172. {
  6173. SetVirtualHostOption(h->SecureNAT->Nat->Virtual, &t);
  6174. Debug("SiCalledUpdateHub: SecureNAT Updated.\n");
  6175. }
  6176. }
  6177. Unlock(h->lock_online);
  6178. }
  6179. }
  6180. else
  6181. {
  6182. EnableSecureNAT(h, false);
  6183. Debug("SiCalledUpdateHub: SecureNAT Disabled.\n");
  6184. }
  6185. if (type_changed)
  6186. {
  6187. // Remove all sessions since the type of HUB has been changed
  6188. if (h->Offline == false)
  6189. {
  6190. SetHubOffline(h);
  6191. SetHubOnline(h);
  6192. }
  6193. }
  6194. ReleaseHub(h);
  6195. }
  6196. // Inspect the ticket
  6197. bool SiCheckTicket(HUB *h, UCHAR *ticket, char *username, UINT username_size, char *usernamereal, UINT usernamereal_size, POLICY *policy, char *sessionname, UINT sessionname_size, char *groupname, UINT groupname_size)
  6198. {
  6199. bool ret = false;
  6200. // Validate arguments
  6201. if (h == NULL || ticket == NULL || username == NULL || usernamereal == NULL || policy == NULL || sessionname == NULL)
  6202. {
  6203. return false;
  6204. }
  6205. LockList(h->TicketList);
  6206. {
  6207. UINT i;
  6208. for (i = 0;i < LIST_NUM(h->TicketList);i++)
  6209. {
  6210. TICKET *t = LIST_DATA(h->TicketList, i);
  6211. if (Cmp(t->Ticket, ticket, SHA1_SIZE) == 0)
  6212. {
  6213. ret = true;
  6214. StrCpy(username, username_size, t->Username);
  6215. StrCpy(usernamereal, usernamereal_size, t->UsernameReal);
  6216. StrCpy(sessionname, sessionname_size, t->SessionName);
  6217. StrCpy(groupname, groupname_size, t->GroupName);
  6218. Copy(policy, &t->Policy, sizeof(POLICY));
  6219. Delete(h->TicketList, t);
  6220. Free(t);
  6221. break;
  6222. }
  6223. }
  6224. }
  6225. UnlockList(h->TicketList);
  6226. return ret;
  6227. }
  6228. // Receive a MAC address deletion directive
  6229. void SiCalledDeleteMacTable(SERVER *s, PACK *p)
  6230. {
  6231. UINT key;
  6232. char hubname[MAX_HUBNAME_LEN + 1];
  6233. HUB *h;
  6234. // Validate arguments
  6235. if (s == NULL || p == NULL)
  6236. {
  6237. return;
  6238. }
  6239. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6240. {
  6241. return;
  6242. }
  6243. key = PackGetInt(p, "Key");
  6244. LockHubList(s->Cedar);
  6245. {
  6246. h = GetHub(s->Cedar, hubname);
  6247. }
  6248. UnlockHubList(s->Cedar);
  6249. if (h == NULL)
  6250. {
  6251. return;
  6252. }
  6253. LockList(h->MacTable);
  6254. {
  6255. if (IsInList(h->MacTable, (void *)key))
  6256. {
  6257. MAC_TABLE_ENTRY *e = (MAC_TABLE_ENTRY *)key;
  6258. Delete(h->MacTable, e);
  6259. Free(e);
  6260. }
  6261. }
  6262. UnlockList(h->MacTable);
  6263. ReleaseHub(h);
  6264. }
  6265. // Receive an IP address delete directive
  6266. void SiCalledDeleteIpTable(SERVER *s, PACK *p)
  6267. {
  6268. UINT key;
  6269. char hubname[MAX_HUBNAME_LEN + 1];
  6270. HUB *h;
  6271. // Validate arguments
  6272. if (s == NULL || p == NULL)
  6273. {
  6274. return;
  6275. }
  6276. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6277. {
  6278. return;
  6279. }
  6280. key = PackGetInt(p, "Key");
  6281. LockHubList(s->Cedar);
  6282. {
  6283. h = GetHub(s->Cedar, hubname);
  6284. }
  6285. UnlockHubList(s->Cedar);
  6286. if (h == NULL)
  6287. {
  6288. return;
  6289. }
  6290. LockList(h->IpTable);
  6291. {
  6292. if (IsInList(h->IpTable, (void *)key))
  6293. {
  6294. IP_TABLE_ENTRY *e = (IP_TABLE_ENTRY *)key;
  6295. Delete(h->IpTable, e);
  6296. Free(e);
  6297. }
  6298. }
  6299. UnlockList(h->IpTable);
  6300. ReleaseHub(h);
  6301. }
  6302. // Receive a session deletion directive
  6303. void SiCalledDeleteSession(SERVER *s, PACK *p)
  6304. {
  6305. char name[MAX_SESSION_NAME_LEN + 1];
  6306. char hubname[MAX_HUBNAME_LEN + 1];
  6307. HUB *h;
  6308. SESSION *sess;
  6309. // Validate arguments
  6310. if (s == NULL || p == NULL)
  6311. {
  6312. return;
  6313. }
  6314. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6315. {
  6316. return;
  6317. }
  6318. if (PackGetStr(p, "SessionName", name, sizeof(name)) == false)
  6319. {
  6320. return;
  6321. }
  6322. LockHubList(s->Cedar);
  6323. {
  6324. h = GetHub(s->Cedar, hubname);
  6325. }
  6326. UnlockHubList(s->Cedar);
  6327. if (h == NULL)
  6328. {
  6329. return;
  6330. }
  6331. sess = GetSessionByName(h, name);
  6332. if (sess != NULL)
  6333. {
  6334. if (sess->BridgeMode == false && sess->LinkModeServer == false && sess->SecureNATMode == false)
  6335. {
  6336. StopSession(sess);
  6337. }
  6338. ReleaseSession(sess);
  6339. }
  6340. ReleaseHub(h);
  6341. }
  6342. // Receive a log file reading directive
  6343. PACK *SiCalledReadLogFile(SERVER *s, PACK *p)
  6344. {
  6345. RPC_READ_LOG_FILE t;
  6346. PACK *ret;
  6347. char filepath[MAX_PATH];
  6348. UINT offset;
  6349. // Validate arguments
  6350. if (s == NULL || p == NULL)
  6351. {
  6352. return NULL;
  6353. }
  6354. PackGetStr(p, "FilePath", filepath, sizeof(filepath));
  6355. offset = PackGetInt(p, "Offset");
  6356. Zero(&t, sizeof(t));
  6357. SiReadLocalLogFile(s, filepath, offset, &t);
  6358. ret = NewPack();
  6359. OutRpcReadLogFile(ret, &t);
  6360. FreeRpcReadLogFile(&t);
  6361. return ret;
  6362. }
  6363. // Receive a log file enumeration directive
  6364. PACK *SiCalledEnumLogFileList(SERVER *s, PACK *p)
  6365. {
  6366. RPC_ENUM_LOG_FILE t;
  6367. PACK *ret;
  6368. char hubname[MAX_HUBNAME_LEN + 1];
  6369. // Validate arguments
  6370. if (s == NULL || p == NULL)
  6371. {
  6372. return NULL;
  6373. }
  6374. PackGetStr(p, "HubName", hubname, sizeof(hubname));
  6375. Zero(&t, sizeof(t));
  6376. SiEnumLocalLogFileList(s, hubname, &t);
  6377. ret = NewPack();
  6378. OutRpcEnumLogFile(ret, &t);
  6379. FreeRpcEnumLogFile(&t);
  6380. return ret;
  6381. }
  6382. // Receive a session information directive
  6383. PACK *SiCalledGetSessionStatus(SERVER *s, PACK *p)
  6384. {
  6385. RPC_SESSION_STATUS t;
  6386. ADMIN a;
  6387. PACK *ret;
  6388. // Validate arguments
  6389. if (s == NULL || p == NULL)
  6390. {
  6391. return NULL;
  6392. }
  6393. Zero(&t, sizeof(t));
  6394. InRpcSessionStatus(&t, p);
  6395. Zero(&a, sizeof(a));
  6396. a.Server = s;
  6397. a.ServerAdmin = true;
  6398. if (StGetSessionStatus(&a, &t) != ERR_NO_ERROR)
  6399. {
  6400. FreeRpcSessionStatus(&t);
  6401. return NULL;
  6402. }
  6403. ret = NewPack();
  6404. OutRpcSessionStatus(ret, &t);
  6405. FreeRpcSessionStatus(&t);
  6406. return ret;
  6407. }
  6408. // IP table enumeration directive
  6409. PACK *SiCalledEnumIpTable(SERVER *s, PACK *p)
  6410. {
  6411. char hubname[MAX_HUBNAME_LEN + 1];
  6412. RPC_ENUM_IP_TABLE t;
  6413. PACK *ret;
  6414. // Validate arguments
  6415. if (s == NULL || p == NULL)
  6416. {
  6417. return NewPack();
  6418. }
  6419. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6420. {
  6421. return NewPack();
  6422. }
  6423. Zero(&t, sizeof(t));
  6424. SiEnumIpTable(s, hubname, &t);
  6425. ret = NewPack();
  6426. OutRpcEnumIpTable(ret, &t);
  6427. FreeRpcEnumIpTable(&t);
  6428. return ret;
  6429. }
  6430. // MAC table enumeration directive
  6431. PACK *SiCalledEnumMacTable(SERVER *s, PACK *p)
  6432. {
  6433. char hubname[MAX_HUBNAME_LEN + 1];
  6434. RPC_ENUM_MAC_TABLE t;
  6435. PACK *ret;
  6436. // Validate arguments
  6437. if (s == NULL || p == NULL)
  6438. {
  6439. return NewPack();
  6440. }
  6441. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6442. {
  6443. return NewPack();
  6444. }
  6445. Zero(&t, sizeof(t));
  6446. SiEnumMacTable(s, hubname, &t);
  6447. ret = NewPack();
  6448. OutRpcEnumMacTable(ret, &t);
  6449. FreeRpcEnumMacTable(&t);
  6450. return ret;
  6451. }
  6452. // NAT status acquisition directive
  6453. PACK *SiCalledGetNatStatus(SERVER *s, PACK *p)
  6454. {
  6455. char hubname[MAX_HUBNAME_LEN + 1];
  6456. RPC_NAT_STATUS t;
  6457. PACK *ret;
  6458. HUB *h;
  6459. // Validate arguments
  6460. if (s == NULL || p == NULL)
  6461. {
  6462. return NewPack();
  6463. }
  6464. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6465. {
  6466. return NewPack();
  6467. }
  6468. Zero(&t, sizeof(t));
  6469. LockHubList(s->Cedar);
  6470. {
  6471. h = GetHub(s->Cedar, hubname);
  6472. }
  6473. UnlockHubList(s->Cedar);
  6474. if (h != NULL)
  6475. {
  6476. Lock(h->lock_online);
  6477. {
  6478. if (h->SecureNAT != NULL)
  6479. {
  6480. NtGetStatus(h->SecureNAT->Nat, &t);
  6481. }
  6482. }
  6483. Unlock(h->lock_online);
  6484. }
  6485. ReleaseHub(h);
  6486. ret = NewPack();
  6487. OutRpcNatStatus(ret, &t);
  6488. FreeRpcNatStatus(&t);
  6489. return ret;
  6490. }
  6491. // DHCP table enumeration directive
  6492. PACK *SiCalledEnumDhcp(SERVER *s, PACK *p)
  6493. {
  6494. char hubname[MAX_HUBNAME_LEN + 1];
  6495. RPC_ENUM_DHCP t;
  6496. PACK *ret;
  6497. HUB *h;
  6498. // Validate arguments
  6499. if (s == NULL || p == NULL)
  6500. {
  6501. return NewPack();
  6502. }
  6503. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6504. {
  6505. return NewPack();
  6506. }
  6507. Zero(&t, sizeof(t));
  6508. LockHubList(s->Cedar);
  6509. {
  6510. h = GetHub(s->Cedar, hubname);
  6511. }
  6512. UnlockHubList(s->Cedar);
  6513. if (h != NULL)
  6514. {
  6515. Lock(h->lock_online);
  6516. {
  6517. if (h->SecureNAT != NULL)
  6518. {
  6519. NtEnumDhcpList(h->SecureNAT->Nat, &t);
  6520. }
  6521. }
  6522. Unlock(h->lock_online);
  6523. }
  6524. ReleaseHub(h);
  6525. ret = NewPack();
  6526. OutRpcEnumDhcp(ret, &t);
  6527. FreeRpcEnumDhcp(&t);
  6528. return ret;
  6529. }
  6530. // NAT table enumeration directive
  6531. PACK *SiCalledEnumNat(SERVER *s, PACK *p)
  6532. {
  6533. char hubname[MAX_HUBNAME_LEN + 1];
  6534. RPC_ENUM_NAT t;
  6535. PACK *ret;
  6536. HUB *h;
  6537. // Validate arguments
  6538. if (s == NULL || p == NULL)
  6539. {
  6540. return NewPack();
  6541. }
  6542. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6543. {
  6544. return NewPack();
  6545. }
  6546. Zero(&t, sizeof(t));
  6547. LockHubList(s->Cedar);
  6548. {
  6549. h = GetHub(s->Cedar, hubname);
  6550. }
  6551. UnlockHubList(s->Cedar);
  6552. if (h != NULL)
  6553. {
  6554. Lock(h->lock_online);
  6555. {
  6556. if (h->SecureNAT != NULL)
  6557. {
  6558. NtEnumNatList(h->SecureNAT->Nat, &t);
  6559. }
  6560. }
  6561. Unlock(h->lock_online);
  6562. }
  6563. ReleaseHub(h);
  6564. ret = NewPack();
  6565. OutRpcEnumNat(ret, &t);
  6566. FreeRpcEnumNat(&t);
  6567. return ret;
  6568. }
  6569. // Receive a session enumeration directive
  6570. PACK *SiCalledEnumSession(SERVER *s, PACK *p)
  6571. {
  6572. char hubname[MAX_HUBNAME_LEN + 1];
  6573. RPC_ENUM_SESSION t;
  6574. PACK *ret;
  6575. // Validate arguments
  6576. if (s == NULL || p == NULL)
  6577. {
  6578. return NewPack();
  6579. }
  6580. if (PackGetStr(p, "HubName", hubname, sizeof(hubname)) == false)
  6581. {
  6582. return NewPack();
  6583. }
  6584. Zero(&t, sizeof(t));
  6585. SiEnumLocalSession(s, hubname, &t);
  6586. ret = NewPack();
  6587. OutRpcEnumSession(ret, &t);
  6588. FreeRpcEnumSession(&t);
  6589. return ret;
  6590. }
  6591. // Receive a ticket creation directive
  6592. PACK *SiCalledCreateTicket(SERVER *s, PACK *p)
  6593. {
  6594. char username[MAX_SIZE];
  6595. char hubname[MAX_SIZE];
  6596. char groupname[MAX_SIZE];
  6597. char realusername[MAX_SIZE];
  6598. char sessionname[MAX_SESSION_NAME_LEN + 1];
  6599. POLICY policy;
  6600. UCHAR ticket[SHA1_SIZE];
  6601. char ticket_str[MAX_SIZE];
  6602. HUB *h;
  6603. UINT i;
  6604. PACK *ret;
  6605. TICKET *t;
  6606. // Validate arguments
  6607. if (s == NULL || p == NULL)
  6608. {
  6609. return NewPack();
  6610. }
  6611. PackGetStr(p, "UserName", username, sizeof(username));
  6612. PackGetStr(p, "GroupName", groupname, sizeof(groupname));
  6613. PackGetStr(p, "HubName", hubname, sizeof(hubname));
  6614. PackGetStr(p, "RealUserName", realusername, sizeof(realusername));
  6615. PackGetStr(p, "SessionName", sessionname, sizeof(sessionname));
  6616. InRpcPolicy(&policy, p);
  6617. if (PackGetDataSize(p, "Ticket") == SHA1_SIZE)
  6618. {
  6619. PackGetData(p, "Ticket", ticket);
  6620. }
  6621. BinToStr(ticket_str, sizeof(ticket_str), ticket, SHA1_SIZE);
  6622. SLog(s->Cedar, "LS_TICKET_2", hubname, username, realusername, sessionname,
  6623. ticket_str, TICKET_EXPIRES / 1000);
  6624. // Get the HUB
  6625. h = GetHub(s->Cedar, hubname);
  6626. if (h == NULL)
  6627. {
  6628. return NewPack();
  6629. }
  6630. LockList(h->TicketList);
  6631. {
  6632. LIST *o = NewListFast(NULL);
  6633. // Discard old tickets
  6634. for (i = 0;i < LIST_NUM(h->TicketList);i++)
  6635. {
  6636. TICKET *t = LIST_DATA(h->TicketList, i);
  6637. if ((t->CreatedTick + TICKET_EXPIRES) < Tick64())
  6638. {
  6639. Add(o, t);
  6640. }
  6641. }
  6642. for (i = 0;i < LIST_NUM(o);i++)
  6643. {
  6644. TICKET *t = LIST_DATA(o, i);
  6645. Delete(h->TicketList, t);
  6646. Free(t);
  6647. }
  6648. ReleaseList(o);
  6649. // Create a ticket
  6650. t = ZeroMalloc(sizeof(TICKET));
  6651. t->CreatedTick = Tick64();
  6652. Copy(&t->Policy, &policy, sizeof(POLICY));
  6653. Copy(t->Ticket, ticket, SHA1_SIZE);
  6654. StrCpy(t->Username, sizeof(t->Username), username);
  6655. StrCpy(t->UsernameReal, sizeof(t->UsernameReal), realusername);
  6656. StrCpy(t->GroupName, sizeof(t->GroupName), groupname);
  6657. StrCpy(t->SessionName, sizeof(t->SessionName), sessionname);
  6658. Add(h->TicketList, t);
  6659. }
  6660. UnlockList(h->TicketList);
  6661. ReleaseHub(h);
  6662. ret = NewPack();
  6663. PackAddInt(ret, "Point", SiGetPoint(s));
  6664. return ret;
  6665. }
  6666. // Receive a HUB creation directive
  6667. void SiCalledCreateHub(SERVER *s, PACK *p)
  6668. {
  6669. char name[MAX_SIZE];
  6670. UINT type;
  6671. HUB_OPTION o;
  6672. HUB_LOG log;
  6673. bool save_packet_log;
  6674. UINT packet_log_switch_type;
  6675. UINT packet_log_config[NUM_PACKET_LOG];
  6676. bool save_security_log;
  6677. UINT security_log_switch_type;
  6678. UINT i;
  6679. HUB *h;
  6680. // Validate arguments
  6681. if (s == NULL || p == NULL)
  6682. {
  6683. return;
  6684. }
  6685. PackGetStr(p, "HubName", name, sizeof(name));
  6686. type = PackGetInt(p, "HubType");
  6687. Zero(&o, sizeof(o));
  6688. o.MaxSession = PackGetInt(p, "MaxSession");
  6689. save_packet_log = PackGetInt(p, "SavePacketLog");
  6690. packet_log_switch_type = PackGetInt(p, "PacketLogSwitchType");
  6691. for (i = 0;i < NUM_PACKET_LOG;i++)
  6692. {
  6693. packet_log_config[i] = PackGetIntEx(p, "PacketLogConfig", i);
  6694. }
  6695. save_security_log = PackGetInt(p, "SaveSecurityLog");
  6696. security_log_switch_type = PackGetInt(p, "SecurityLogSwitchType");
  6697. Zero(&log, sizeof(log));
  6698. log.SavePacketLog = save_packet_log;
  6699. log.PacketLogSwitchType = packet_log_switch_type;
  6700. Copy(log.PacketLogConfig, packet_log_config, sizeof(log.PacketLogConfig));
  6701. log.SaveSecurityLog = save_security_log;
  6702. log.SecurityLogSwitchType = security_log_switch_type;
  6703. h = NewHub(s->Cedar, name, &o);
  6704. h->LastCommTime = h->LastLoginTime = h->CreatedTime = 0;
  6705. SetHubLogSetting(h, &log);
  6706. h->Type = type;
  6707. h->FarmMember_MaxSessionClient = PackGetInt(p, "MaxSessionClient");
  6708. h->FarmMember_MaxSessionBridge = PackGetInt(p, "MaxSessionBridge");
  6709. h->FarmMember_MaxSessionClientBridgeApply = PackGetBool(p, "MaxSessionClientBridgeApply");
  6710. if (h->FarmMember_MaxSessionClientBridgeApply == false)
  6711. {
  6712. h->FarmMember_MaxSessionClient = INFINITE;
  6713. h->FarmMember_MaxSessionBridge = INFINITE;
  6714. }
  6715. PackGetData2(p, "SecurePassword", h->SecurePassword, SHA1_SIZE);
  6716. PackGetData2(p, "HashedPassword", h->HashedPassword, SHA1_SIZE);
  6717. for (i = 0;i < SiNumAccessFromPack(p);i++)
  6718. {
  6719. ACCESS *a = SiPackToAccess(p, i);
  6720. AddAccessList(h, a);
  6721. Free(a);
  6722. }
  6723. if (PackGetBool(p, "EnableSecureNAT"))
  6724. {
  6725. VH_OPTION t;
  6726. InVhOption(&t, p);
  6727. Copy(h->SecureNATOption, &t, sizeof(VH_OPTION));
  6728. EnableSecureNAT(h, true);
  6729. Debug("SiCalledCreateHub: SecureNAT Created.\n");
  6730. }
  6731. AddHub(s->Cedar, h);
  6732. h->Offline = true;
  6733. SetHubOnline(h);
  6734. ReleaseHub(h);
  6735. }
  6736. // Farm control thread
  6737. void SiFarmControlThread(THREAD *thread, void *param)
  6738. {
  6739. SERVER *s;
  6740. CEDAR *c;
  6741. EVENT *e;
  6742. LIST *o;
  6743. UINT i;
  6744. char tmp[MAX_PATH];
  6745. // Validate arguments
  6746. if (thread == NULL || param == NULL)
  6747. {
  6748. return;
  6749. }
  6750. s = (SERVER *)param;
  6751. c = s->Cedar;
  6752. e = s->FarmControlThreadHaltEvent;
  6753. while (true)
  6754. {
  6755. Lock(c->CedarSuperLock);
  6756. // Enumerate HUB list which is hosted by each farm member
  6757. Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
  6758. SiDebugLog(s, tmp);
  6759. LockList(s->FarmMemberList);
  6760. {
  6761. UINT i;
  6762. UINT num;
  6763. UINT assigned_client_license = 0;
  6764. UINT assigned_bridge_license = 0;
  6765. LIST *fm_list = NewListFast(NULL);
  6766. Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
  6767. SiDebugLog(s, tmp);
  6768. num = 0;
  6769. while (true)
  6770. {
  6771. bool escape = true;
  6772. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  6773. {
  6774. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  6775. if (IsInList(fm_list, f) == false)
  6776. {
  6777. SiCallEnumHub(s, f);
  6778. // Get the total number of sessions across the server farm
  6779. num += f->NumSessions;
  6780. assigned_client_license += f->AssignedClientLicense;
  6781. assigned_bridge_license += f->AssignedBridgeLicense;
  6782. escape = false;
  6783. Add(fm_list, f);
  6784. break;
  6785. }
  6786. }
  6787. if (escape)
  6788. {
  6789. break;
  6790. }
  6791. UnlockList(s->FarmMemberList);
  6792. LockList(s->FarmMemberList);
  6793. }
  6794. ReleaseList(fm_list);
  6795. s->CurrentTotalNumSessionsOnFarm = num;
  6796. // Update the number of assigned licenses
  6797. s->CurrentAssignedBridgeLicense = assigned_bridge_license;
  6798. s->CurrentAssignedClientLicense = assigned_client_license;
  6799. Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
  6800. SiDebugLog(s, tmp);
  6801. }
  6802. UnlockList(s->FarmMemberList);
  6803. Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
  6804. SiDebugLog(s, tmp);
  6805. o = NewListFast(NULL);
  6806. Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
  6807. SiDebugLog(s, tmp);
  6808. // Emit an update notification for each HUB
  6809. LockList(c->HubList);
  6810. {
  6811. UINT i;
  6812. for (i = 0;i < LIST_NUM(c->HubList);i++)
  6813. {
  6814. HUB *h = LIST_DATA(c->HubList, i);
  6815. AddRef(h->ref);
  6816. Add(o, h);
  6817. }
  6818. }
  6819. UnlockList(c->HubList);
  6820. Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
  6821. SiDebugLog(s, tmp);
  6822. for (i = 0;i < LIST_NUM(o);i++)
  6823. {
  6824. HUB *h = LIST_DATA(o, i);
  6825. SiHubUpdateProc(h);
  6826. ReleaseHub(h);
  6827. }
  6828. Format(tmp, sizeof(tmp), "CONTROLLER: %s %u", __FILE__, __LINE__);
  6829. SiDebugLog(s, tmp);
  6830. ReleaseList(o);
  6831. Unlock(c->CedarSuperLock);
  6832. Wait(e, SERVER_FARM_CONTROL_INTERVAL);
  6833. if (s->Halt)
  6834. {
  6835. break;
  6836. }
  6837. }
  6838. }
  6839. // Start the farm controling
  6840. void SiStartFarmControl(SERVER *s)
  6841. {
  6842. // Validate arguments
  6843. if (s == NULL || s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  6844. {
  6845. return;
  6846. }
  6847. s->FarmControlThreadHaltEvent = NewEvent();
  6848. s->FarmControlThread = NewThread(SiFarmControlThread, s);
  6849. }
  6850. // Stop the farm controling
  6851. void SiStopFarmControl(SERVER *s)
  6852. {
  6853. // Validate arguments
  6854. if (s == NULL || s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  6855. {
  6856. return;
  6857. }
  6858. Set(s->FarmControlThreadHaltEvent);
  6859. WaitThread(s->FarmControlThread, INFINITE);
  6860. ReleaseEvent(s->FarmControlThreadHaltEvent);
  6861. ReleaseThread(s->FarmControlThread);
  6862. }
  6863. // HUB enumeration directive (asynchronous start)
  6864. void SiCallEnumHubBegin(SERVER *s, FARM_MEMBER *f)
  6865. {
  6866. // Validate arguments
  6867. if (s == NULL || f == NULL)
  6868. {
  6869. return;
  6870. }
  6871. }
  6872. // HUB enumeration directive (asynchronous end)
  6873. void SiCallEnumHubEnd(SERVER *s, FARM_MEMBER *f)
  6874. {
  6875. // Validate arguments
  6876. if (s == NULL || f == NULL)
  6877. {
  6878. return;
  6879. }
  6880. }
  6881. // HUB enumeration directive
  6882. void SiCallEnumHub(SERVER *s, FARM_MEMBER *f)
  6883. {
  6884. CEDAR *c;
  6885. // Validate arguments
  6886. if (s == NULL || f == NULL)
  6887. {
  6888. return;
  6889. }
  6890. c = s->Cedar;
  6891. if (f->Me)
  6892. {
  6893. // Enumerate local HUBs
  6894. LockList(f->HubList);
  6895. {
  6896. // For a local HUB, re-enumerate by erasing all STATIC HUB list once first
  6897. UINT i;
  6898. LIST *o = NewListFast(NULL);
  6899. for (i = 0;i < LIST_NUM(f->HubList);i++)
  6900. {
  6901. HUB_LIST *h = LIST_DATA(f->HubList, i);
  6902. if (h->DynamicHub == false)
  6903. {
  6904. Add(o, h);
  6905. }
  6906. }
  6907. // Clear all the STATIC HUB
  6908. for (i = 0;i < LIST_NUM(o);i++)
  6909. {
  6910. HUB_LIST *h = LIST_DATA(o, i);
  6911. Free(h);
  6912. Delete(f->HubList, h);
  6913. }
  6914. ReleaseList(o);
  6915. // Second, stop DYNAMIC HUBs without user
  6916. o = NewListFast(NULL);
  6917. for (i = 0;i < LIST_NUM(f->HubList);i++)
  6918. {
  6919. HUB_LIST *h = LIST_DATA(f->HubList, i);
  6920. if (h->DynamicHub == true)
  6921. {
  6922. LockList(c->HubList);
  6923. {
  6924. HUB *hub = GetHub(s->Cedar, h->Name);
  6925. if (hub != NULL)
  6926. {
  6927. if (Count(hub->NumSessions) == 0 || hub->Type != HUB_TYPE_FARM_DYNAMIC)
  6928. {
  6929. Add(o, h);
  6930. }
  6931. ReleaseHub(hub);
  6932. }
  6933. }
  6934. UnlockList(c->HubList);
  6935. }
  6936. }
  6937. for (i = 0;i < LIST_NUM(o);i++)
  6938. {
  6939. HUB_LIST *h = LIST_DATA(o, i);
  6940. Debug("Delete HUB: %s\n", h->Name);
  6941. Free(h);
  6942. Delete(f->HubList, h);
  6943. }
  6944. ReleaseList(o);
  6945. // Set the enumeration results
  6946. LockList(c->HubList);
  6947. {
  6948. for (i = 0;i < LIST_NUM(c->HubList);i++)
  6949. {
  6950. HUB *h = LIST_DATA(c->HubList, i);
  6951. if (h->Offline == false)
  6952. {
  6953. if (h->Type == HUB_TYPE_FARM_STATIC)
  6954. {
  6955. HUB_LIST *hh = ZeroMalloc(sizeof(HUB_LIST));
  6956. hh->FarmMember = f;
  6957. hh->DynamicHub = false;
  6958. StrCpy(hh->Name, sizeof(hh->Name), h->Name);
  6959. Add(f->HubList, hh);
  6960. LockList(h->SessionList);
  6961. {
  6962. hh->NumSessions = LIST_NUM(h->SessionList);
  6963. hh->NumSessionsBridge = Count(h->NumSessionsBridge);
  6964. hh->NumSessionsClient = Count(h->NumSessionsClient);
  6965. }
  6966. UnlockList(h->SessionList);
  6967. LockList(h->MacTable);
  6968. {
  6969. hh->NumMacTables = LIST_NUM(h->MacTable);
  6970. }
  6971. UnlockList(h->MacTable);
  6972. LockList(h->IpTable);
  6973. {
  6974. hh->NumIpTables = LIST_NUM(h->IpTable);
  6975. }
  6976. UnlockList(h->IpTable);
  6977. }
  6978. }
  6979. }
  6980. }
  6981. UnlockList(c->HubList);
  6982. }
  6983. UnlockList(f->HubList);
  6984. // Point
  6985. f->Point = SiGetPoint(s);
  6986. f->NumSessions = Count(s->Cedar->CurrentSessions);
  6987. f->MaxSessions = GetServerCapsInt(s, "i_max_sessions");
  6988. f->NumTcpConnections = Count(s->Cedar->CurrentTcpConnections);
  6989. Lock(s->Cedar->TrafficLock);
  6990. {
  6991. Copy(&f->Traffic, s->Cedar->Traffic, sizeof(TRAFFIC));
  6992. }
  6993. Unlock(s->Cedar->TrafficLock);
  6994. f->AssignedBridgeLicense = Count(s->Cedar->AssignedBridgeLicense);
  6995. f->AssignedClientLicense = Count(s->Cedar->AssignedClientLicense);
  6996. Copy(f->RandomKey, s->MyRandomKey, SHA1_SIZE);
  6997. Debug("Server %s: Point %u\n", f->hostname, f->Point);
  6998. }
  6999. else
  7000. {
  7001. // Enumerate HUBs which are remote member
  7002. PACK *p = NewPack();
  7003. UINT i, num, j;
  7004. LIST *o = NewListFast(NULL);
  7005. num = 0;
  7006. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7007. {
  7008. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7009. if (IsZero(f->RandomKey, SHA1_SIZE) == false && f->SystemId != 0)
  7010. {
  7011. num++;
  7012. }
  7013. }
  7014. j = 0;
  7015. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7016. {
  7017. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7018. if (IsZero(f->RandomKey, SHA1_SIZE) == false && f->SystemId != 0)
  7019. {
  7020. PackAddDataEx(p, "MemberRandomKey", f->RandomKey, SHA1_SIZE, j, num);
  7021. PackAddInt64Ex(p, "MemberSystemId", f->SystemId, j, num);
  7022. j++;
  7023. }
  7024. }
  7025. PackAddInt(p, "MemberSystemIdNum", num);
  7026. p = SiCallTask(f, p, "enumhub");
  7027. if (p != NULL)
  7028. {
  7029. LockList(f->HubList);
  7030. {
  7031. UINT i;
  7032. // Erase the list
  7033. for (i = 0;i < LIST_NUM(f->HubList);i++)
  7034. {
  7035. HUB_LIST *hh = LIST_DATA(f->HubList, i);
  7036. Free(hh);
  7037. }
  7038. DeleteAll(f->HubList);
  7039. for (i = 0;i < PackGetIndexCount(p, "HubName");i++)
  7040. {
  7041. HUB_LIST *hh = ZeroMalloc(sizeof(HUB_LIST));
  7042. UINT num;
  7043. UINT64 LastCommTime;
  7044. PackGetStrEx(p, "HubName", hh->Name, sizeof(hh->Name), i);
  7045. num = PackGetIntEx(p, "NumSession", i);
  7046. hh->DynamicHub = ((PackGetIntEx(p, "HubType", i) == HUB_TYPE_FARM_DYNAMIC) ? true : false);
  7047. hh->FarmMember = f;
  7048. hh->NumSessions = PackGetIntEx(p, "NumSessions", i);
  7049. hh->NumSessionsClient = PackGetIntEx(p, "NumSessionsClient", i);
  7050. hh->NumSessionsBridge = PackGetIntEx(p, "NumSessionsBridge", i);
  7051. hh->NumIpTables = PackGetIntEx(p, "NumIpTables", i);
  7052. hh->NumMacTables = PackGetIntEx(p, "NumMacTables", i);
  7053. LastCommTime = PackGetInt64Ex(p, "LastCommTime", i);
  7054. Add(f->HubList, hh);
  7055. //Debug("%s\n", hh->Name);
  7056. LockList(c->HubList);
  7057. {
  7058. HUB *h = GetHub(c, hh->Name);
  7059. if (h != NULL)
  7060. {
  7061. // Update the LastCommTime of the Virtual HUB
  7062. Lock(h->lock);
  7063. {
  7064. if (h->LastCommTime < LastCommTime)
  7065. {
  7066. h->LastCommTime = LastCommTime;
  7067. }
  7068. }
  7069. Unlock(h->lock);
  7070. ReleaseHub(h);
  7071. }
  7072. }
  7073. UnlockList(c->HubList);
  7074. if (hh->DynamicHub && num >= 1)
  7075. {
  7076. // It is not necessary to be registered in the virtual HUB creation
  7077. // history list because user session is already connected.
  7078. // Remove from the Virtual HUB creation history list
  7079. SiDelHubCreateHistory(s, hh->Name);
  7080. }
  7081. if (hh->DynamicHub && num == 0)
  7082. {
  7083. // Check the Virtual HUB creation history list.
  7084. // If it is created within 60 seconds of the most recent
  7085. // in the case of Virtual HUB which the first user is not
  7086. // connected yet, not to remove because there is no user
  7087. if (SiIsHubRegistedOnCreateHistory(s, hh->Name) == false)
  7088. {
  7089. // Stop because all uses have gone in the dynamic HUB
  7090. HUB *h;
  7091. LockList(c->HubList);
  7092. {
  7093. h = GetHub(c, hh->Name);
  7094. }
  7095. UnlockList(c->HubList);
  7096. if (h != NULL)
  7097. {
  7098. Add(o, h);
  7099. }
  7100. }
  7101. }
  7102. }
  7103. }
  7104. UnlockList(f->HubList);
  7105. f->Point = PackGetInt(p, "Point");
  7106. Debug("Server %s: Point %u\n", f->hostname, f->Point);
  7107. f->NumSessions = PackGetInt(p, "NumTotalSessions");
  7108. if (f->NumSessions == 0)
  7109. {
  7110. f->NumSessions = PackGetInt(p, "NumSessions");
  7111. }
  7112. f->MaxSessions = PackGetInt(p, "MaxSessions");
  7113. f->NumTcpConnections = PackGetInt(p, "NumTcpConnections");
  7114. InRpcTraffic(&f->Traffic, p);
  7115. f->AssignedBridgeLicense = PackGetInt(p, "AssignedBridgeLicense");
  7116. f->AssignedClientLicense = PackGetInt(p, "AssignedClientLicense");
  7117. if (PackGetDataSize(p, "RandomKey") == SHA1_SIZE)
  7118. {
  7119. PackGetData(p, "RandomKey", f->RandomKey);
  7120. }
  7121. f->SystemId = PackGetInt64(p, "SystemId");
  7122. // Apply the traffic difference information
  7123. num = PackGetIndexCount(p, "TdType");
  7124. for (i = 0;i < num;i++)
  7125. {
  7126. TRAFFIC traffic;
  7127. UINT type;
  7128. HUB *h;
  7129. char name[MAX_SIZE];
  7130. char hubname[MAX_SIZE];
  7131. type = PackGetIntEx(p, "TdType", i);
  7132. PackGetStrEx(p, "TdName", name, sizeof(name), i);
  7133. PackGetStrEx(p, "TdHubName", hubname, sizeof(hubname), i);
  7134. InRpcTrafficEx(&traffic, p, i);
  7135. LockList(c->HubList);
  7136. {
  7137. h = GetHub(c, hubname);
  7138. if (h != NULL)
  7139. {
  7140. if (type == TRAFFIC_DIFF_HUB)
  7141. {
  7142. Lock(h->TrafficLock);
  7143. {
  7144. AddTraffic(h->Traffic, &traffic);
  7145. }
  7146. Unlock(h->TrafficLock);
  7147. }
  7148. else
  7149. {
  7150. AcLock(h);
  7151. {
  7152. USER *u = AcGetUser(h, name);
  7153. if (u != NULL)
  7154. {
  7155. Lock(u->lock);
  7156. {
  7157. AddTraffic(u->Traffic, &traffic);
  7158. }
  7159. Unlock(u->lock);
  7160. if (u->Group != NULL)
  7161. {
  7162. Lock(u->Group->lock);
  7163. {
  7164. AddTraffic(u->Group->Traffic, &traffic);
  7165. }
  7166. Unlock(u->Group->lock);
  7167. }
  7168. ReleaseUser(u);
  7169. }
  7170. }
  7171. AcUnlock(h);
  7172. }
  7173. ReleaseHub(h);
  7174. }
  7175. UnlockList(c->HubList);
  7176. }
  7177. }
  7178. FreePack(p);
  7179. }
  7180. for (i = 0;i < LIST_NUM(o);i++)
  7181. {
  7182. HUB *h = LIST_DATA(o, i);
  7183. SiCallDeleteHub(s, f, h);
  7184. Debug("Delete HUB: %s\n", h->Name);
  7185. ReleaseHub(h);
  7186. }
  7187. ReleaseList(o);
  7188. }
  7189. }
  7190. // Send a session information directive
  7191. bool SiCallGetSessionStatus(SERVER *s, FARM_MEMBER *f, RPC_SESSION_STATUS *t)
  7192. {
  7193. PACK *p;
  7194. // Validate arguments
  7195. if (s == NULL || f == NULL)
  7196. {
  7197. return false;
  7198. }
  7199. p = NewPack();
  7200. OutRpcSessionStatus(p, t);
  7201. FreeRpcSessionStatus(t);
  7202. Zero(t, sizeof(RPC_SESSION_STATUS));
  7203. p = SiCallTask(f, p, "getsessionstatus");
  7204. if (p == NULL)
  7205. {
  7206. return false;
  7207. }
  7208. InRpcSessionStatus(t, p);
  7209. FreePack(p);
  7210. return true;
  7211. }
  7212. // Log file reading directive
  7213. bool SiCallReadLogFile(SERVER *s, FARM_MEMBER *f, RPC_READ_LOG_FILE *t)
  7214. {
  7215. PACK *p;
  7216. // Validate arguments
  7217. if (s == NULL || f == NULL)
  7218. {
  7219. return false;
  7220. }
  7221. p = NewPack();
  7222. OutRpcReadLogFile(p, t);
  7223. FreeRpcReadLogFile(t);
  7224. Zero(t, sizeof(RPC_READ_LOG_FILE));
  7225. p = SiCallTask(f, p, "readlogfile");
  7226. if (p == NULL)
  7227. {
  7228. return false;
  7229. }
  7230. InRpcReadLogFile(t, p);
  7231. FreePack(p);
  7232. return true;
  7233. }
  7234. // Log file enumeration directive
  7235. bool SiCallEnumLogFileList(SERVER *s, FARM_MEMBER *f, RPC_ENUM_LOG_FILE *t, char *hubname)
  7236. {
  7237. PACK *p;
  7238. // Validate arguments
  7239. if (s == NULL || f == NULL)
  7240. {
  7241. return false;
  7242. }
  7243. p = NewPack();
  7244. OutRpcEnumLogFile(p, t);
  7245. FreeRpcEnumLogFile(t);
  7246. Zero(t, sizeof(RPC_ENUM_LOG_FILE));
  7247. PackAddStr(p, "HubName", hubname);
  7248. p = SiCallTask(f, p, "enumlogfilelist");
  7249. if (p == NULL)
  7250. {
  7251. return false;
  7252. }
  7253. InRpcEnumLogFile(t, p);
  7254. FreePack(p);
  7255. return true;
  7256. }
  7257. // HUB delete directive
  7258. void SiCallDeleteHub(SERVER *s, FARM_MEMBER *f, HUB *h)
  7259. {
  7260. PACK *p;
  7261. UINT i;
  7262. // Validate arguments
  7263. if (s == NULL || f == NULL)
  7264. {
  7265. return;
  7266. }
  7267. if (f->Me == false)
  7268. {
  7269. p = NewPack();
  7270. PackAddStr(p, "HubName", h->Name);
  7271. p = SiCallTask(f, p, "deletehub");
  7272. FreePack(p);
  7273. }
  7274. LockList(f->HubList);
  7275. {
  7276. for (i = 0;i < LIST_NUM(f->HubList);i++)
  7277. {
  7278. HUB_LIST *hh = LIST_DATA(f->HubList, i);
  7279. if (StrCmpi(hh->Name, h->Name) == 0)
  7280. {
  7281. Free(hh);
  7282. Delete(f->HubList, hh);
  7283. }
  7284. }
  7285. }
  7286. UnlockList(f->HubList);
  7287. }
  7288. // Submit a HUB update directive
  7289. void SiCallUpdateHub(SERVER *s, FARM_MEMBER *f, HUB *h)
  7290. {
  7291. PACK *p;
  7292. // Validate arguments
  7293. if (s == NULL || f == NULL)
  7294. {
  7295. return;
  7296. }
  7297. if (f->Me == false)
  7298. {
  7299. p = NewPack();
  7300. SiPackAddCreateHub(p, h);
  7301. p = SiCallTask(f, p, "updatehub");
  7302. FreePack(p);
  7303. }
  7304. }
  7305. // Send a ticket creation directive
  7306. void SiCallCreateTicket(SERVER *s, FARM_MEMBER *f, char *hubname, char *username, char *realusername, POLICY *policy, UCHAR *ticket, UINT counter, char *groupname)
  7307. {
  7308. PACK *p;
  7309. char name[MAX_SESSION_NAME_LEN + 1];
  7310. char hub_name_upper[MAX_SIZE];
  7311. char user_name_upper[MAX_USERNAME_LEN + 1];
  7312. char ticket_str[MAX_SIZE];
  7313. UINT point;
  7314. // Validate arguments
  7315. if (s == NULL || f == NULL || realusername == NULL || hubname == NULL || username == NULL || policy == NULL || ticket == NULL)
  7316. {
  7317. return;
  7318. }
  7319. if (groupname == NULL)
  7320. {
  7321. groupname = "";
  7322. }
  7323. p = NewPack();
  7324. PackAddStr(p, "HubName", hubname);
  7325. PackAddStr(p, "UserName", username);
  7326. PackAddStr(p, "groupname", groupname);
  7327. PackAddStr(p, "RealUserName", realusername);
  7328. OutRpcPolicy(p, policy);
  7329. PackAddData(p, "Ticket", ticket, SHA1_SIZE);
  7330. BinToStr(ticket_str, sizeof(ticket_str), ticket, SHA1_SIZE);
  7331. StrCpy(hub_name_upper, sizeof(hub_name_upper), hubname);
  7332. StrUpper(hub_name_upper);
  7333. StrCpy(user_name_upper, sizeof(user_name_upper), username);
  7334. StrUpper(user_name_upper);
  7335. Format(name, sizeof(name), "SID-%s-%u", user_name_upper,
  7336. counter);
  7337. PackAddStr(p, "SessionName", name);
  7338. p = SiCallTask(f, p, "createticket");
  7339. SLog(s->Cedar, "LS_TICKET_1", f->hostname, hubname, username, realusername, name, ticket_str);
  7340. point = PackGetInt(p, "Point");
  7341. if (point != 0)
  7342. {
  7343. f->Point = point;
  7344. f->NumSessions++;
  7345. }
  7346. FreePack(p);
  7347. }
  7348. // Send a MAC address deletion directive
  7349. void SiCallDeleteMacTable(SERVER *s, FARM_MEMBER *f, char *hubname, UINT key)
  7350. {
  7351. PACK *p;
  7352. // Validate arguments
  7353. if (s == NULL || f == NULL || hubname == NULL)
  7354. {
  7355. return;
  7356. }
  7357. p = NewPack();
  7358. PackAddStr(p, "HubName", hubname);
  7359. PackAddInt(p, "Key", key);
  7360. p = SiCallTask(f, p, "deletemactable");
  7361. FreePack(p);
  7362. }
  7363. // Send an IP address delete directive
  7364. void SiCallDeleteIpTable(SERVER *s, FARM_MEMBER *f, char *hubname, UINT key)
  7365. {
  7366. PACK *p;
  7367. // Validate arguments
  7368. if (s == NULL || f == NULL || hubname == NULL)
  7369. {
  7370. return;
  7371. }
  7372. p = NewPack();
  7373. PackAddStr(p, "HubName", hubname);
  7374. PackAddInt(p, "Key", key);
  7375. p = SiCallTask(f, p, "deleteiptable");
  7376. FreePack(p);
  7377. }
  7378. // Send a session deletion directive
  7379. void SiCallDeleteSession(SERVER *s, FARM_MEMBER *f, char *hubname, char *session_name)
  7380. {
  7381. PACK *p;
  7382. // Validate arguments
  7383. if (s == NULL || f == NULL || hubname == NULL || session_name == NULL)
  7384. {
  7385. return;
  7386. }
  7387. p = NewPack();
  7388. PackAddStr(p, "HubName", hubname);
  7389. PackAddStr(p, "SessionName", session_name);
  7390. p = SiCallTask(f, p, "deletesession");
  7391. FreePack(p);
  7392. }
  7393. // Send an IP table enumeration directive
  7394. void SiCallEnumIpTable(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_IP_TABLE *t)
  7395. {
  7396. PACK *p;
  7397. UINT i;
  7398. // Validate arguments
  7399. if (s == NULL || f == NULL || hubname == NULL || t == NULL)
  7400. {
  7401. return;
  7402. }
  7403. p = NewPack();
  7404. PackAddStr(p, "HubName", hubname);
  7405. p = SiCallTask(f, p, "enumiptable");
  7406. Zero(t, sizeof(RPC_ENUM_IP_TABLE));
  7407. InRpcEnumIpTable(t, p);
  7408. for (i = 0;i < t->NumIpTable;i++)
  7409. {
  7410. t->IpTables[i].RemoteItem = true;
  7411. StrCpy(t->IpTables[i].RemoteHostname, sizeof(t->IpTables[i].RemoteHostname),
  7412. f->hostname);
  7413. }
  7414. FreePack(p);
  7415. }
  7416. // Submit a MAC table enumeration directive
  7417. void SiCallEnumMacTable(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_MAC_TABLE *t)
  7418. {
  7419. PACK *p;
  7420. UINT i;
  7421. // Validate arguments
  7422. if (s == NULL || f == NULL || hubname == NULL || t == NULL)
  7423. {
  7424. return;
  7425. }
  7426. p = NewPack();
  7427. PackAddStr(p, "HubName", hubname);
  7428. p = SiCallTask(f, p, "enummactable");
  7429. Zero(t, sizeof(RPC_ENUM_MAC_TABLE));
  7430. InRpcEnumMacTable(t, p);
  7431. for (i = 0;i < t->NumMacTable;i++)
  7432. {
  7433. t->MacTables[i].RemoteItem = true;
  7434. StrCpy(t->MacTables[i].RemoteHostname, sizeof(t->MacTables[i].RemoteHostname),
  7435. f->hostname);
  7436. }
  7437. FreePack(p);
  7438. }
  7439. // Send a SecureNAT status acquisition directive
  7440. void SiCallGetNatStatus(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_NAT_STATUS *t)
  7441. {
  7442. PACK *p;
  7443. // Validate arguments
  7444. if (s == NULL || f == NULL || hubname == NULL || t == NULL)
  7445. {
  7446. return;
  7447. }
  7448. p = NewPack();
  7449. PackAddStr(p, "HubName", hubname);
  7450. p = SiCallTask(f, p, "getnatstatus");
  7451. Zero(t, sizeof(RPC_NAT_STATUS));
  7452. InRpcNatStatus(t, p);
  7453. FreePack(p);
  7454. }
  7455. // Submit a DHCP entry enumeration directive
  7456. void SiCallEnumDhcp(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_DHCP *t)
  7457. {
  7458. PACK *p;
  7459. // Validate arguments
  7460. if (s == NULL || f == NULL || hubname == NULL || t == NULL)
  7461. {
  7462. return;
  7463. }
  7464. p = NewPack();
  7465. PackAddStr(p, "HubName", hubname);
  7466. p = SiCallTask(f, p, "enumdhcp");
  7467. Zero(t, sizeof(RPC_ENUM_DHCP));
  7468. InRpcEnumDhcp(t, p);
  7469. FreePack(p);
  7470. }
  7471. // Submit a NAT entry enumeration directive
  7472. void SiCallEnumNat(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_NAT *t)
  7473. {
  7474. PACK *p;
  7475. // Validate arguments
  7476. if (s == NULL || f == NULL || hubname == NULL || t == NULL)
  7477. {
  7478. return;
  7479. }
  7480. p = NewPack();
  7481. PackAddStr(p, "HubName", hubname);
  7482. p = SiCallTask(f, p, "enumnat");
  7483. Zero(t, sizeof(RPC_ENUM_NAT));
  7484. InRpcEnumNat(t, p);
  7485. FreePack(p);
  7486. }
  7487. // Send a session enumeration directive
  7488. void SiCallEnumSession(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_SESSION *t)
  7489. {
  7490. PACK *p;
  7491. UINT i;
  7492. // Validate arguments
  7493. if (s == NULL || f == NULL || hubname == NULL || t == NULL)
  7494. {
  7495. return;
  7496. }
  7497. p = NewPack();
  7498. PackAddStr(p, "HubName", hubname);
  7499. p = SiCallTask(f, p, "enumsession");
  7500. Zero(t, sizeof(RPC_ENUM_SESSION));
  7501. InRpcEnumSession(t, p);
  7502. for (i = 0;i < t->NumSession;i++)
  7503. {
  7504. t->Sessions[i].RemoteSession = true;
  7505. StrCpy(t->Sessions[i].RemoteHostname, sizeof(t->Sessions[i].RemoteHostname),
  7506. f->hostname);
  7507. }
  7508. FreePack(p);
  7509. }
  7510. // Send a HUB creation directive
  7511. void SiCallCreateHub(SERVER *s, FARM_MEMBER *f, HUB *h)
  7512. {
  7513. PACK *p;
  7514. HUB_LIST *hh;
  7515. // Validate arguments
  7516. if (s == NULL || f == NULL)
  7517. {
  7518. return;
  7519. }
  7520. if (f->Me == false)
  7521. {
  7522. p = NewPack();
  7523. SiPackAddCreateHub(p, h);
  7524. p = SiCallTask(f, p, "createhub");
  7525. FreePack(p);
  7526. }
  7527. hh = ZeroMalloc(sizeof(HUB_LIST));
  7528. hh->DynamicHub = (h->Type == HUB_TYPE_FARM_DYNAMIC ? true : false);
  7529. StrCpy(hh->Name, sizeof(hh->Name), h->Name);
  7530. hh->FarmMember = f;
  7531. LockList(f->HubList);
  7532. {
  7533. bool exists = false;
  7534. UINT i;
  7535. for (i = 0;i < LIST_NUM(f->HubList);i++)
  7536. {
  7537. HUB_LIST *t = LIST_DATA(f->HubList, i);
  7538. if (StrCmpi(t->Name, hh->Name) == 0)
  7539. {
  7540. exists = true;
  7541. }
  7542. }
  7543. if (exists == false)
  7544. {
  7545. Add(f->HubList, hh);
  7546. }
  7547. else
  7548. {
  7549. Free(hh);
  7550. }
  7551. }
  7552. UnlockList(f->HubList);
  7553. }
  7554. // Write the PACK for creating HUB
  7555. void SiPackAddCreateHub(PACK *p, HUB *h)
  7556. {
  7557. UINT i;
  7558. UINT max_session;
  7559. SERVER *s;
  7560. // Validate arguments
  7561. if (p == NULL || h == NULL)
  7562. {
  7563. return;
  7564. }
  7565. s = h->Cedar->Server;
  7566. if (s != NULL)
  7567. {
  7568. }
  7569. PackAddStr(p, "HubName", h->Name);
  7570. PackAddInt(p, "HubType", h->Type);
  7571. max_session = h->Option->MaxSession;
  7572. if (GetHubAdminOption(h, "max_sessions") != 0)
  7573. {
  7574. if (max_session == 0)
  7575. {
  7576. max_session = GetHubAdminOption(h, "max_sessions");
  7577. }
  7578. else
  7579. {
  7580. UINT r = GetHubAdminOption(h, "max_sessions");
  7581. max_session = MIN(max_session, r);
  7582. }
  7583. }
  7584. PackAddInt(p, "MaxSession", max_session);
  7585. if (GetHubAdminOption(h, "max_sessions_client_bridge_apply") != 0
  7586. )
  7587. {
  7588. PackAddInt(p, "MaxSessionClient", GetHubAdminOption(h, "max_sessions_client"));
  7589. PackAddInt(p, "MaxSessionBridge", GetHubAdminOption(h, "max_sessions_bridge"));
  7590. PackAddBool(p, "MaxSessionClientBridgeApply", true);
  7591. }
  7592. else
  7593. {
  7594. PackAddInt(p, "MaxSessionClient", INFINITE);
  7595. PackAddInt(p, "MaxSessionBridge", INFINITE);
  7596. }
  7597. PackAddBool(p, "NoArpPolling", h->Option->NoArpPolling);
  7598. PackAddBool(p, "NoIPv6AddrPolling", h->Option->NoIPv6AddrPolling);
  7599. PackAddBool(p, "NoIpTable", h->Option->NoIpTable);
  7600. PackAddBool(p, "NoEnum", h->Option->NoEnum);
  7601. PackAddBool(p, "FilterPPPoE", h->Option->FilterPPPoE);
  7602. PackAddBool(p, "YieldAfterStorePacket", h->Option->YieldAfterStorePacket);
  7603. PackAddBool(p, "NoSpinLockForPacketDelay", h->Option->NoSpinLockForPacketDelay);
  7604. PackAddInt(p, "BroadcastStormDetectionThreshold", h->Option->BroadcastStormDetectionThreshold);
  7605. PackAddInt(p, "MaxLoggedPacketsPerMinute", h->Option->MaxLoggedPacketsPerMinute);
  7606. PackAddBool(p, "DoNotSaveHeavySecurityLogs", h->Option->DoNotSaveHeavySecurityLogs);
  7607. PackAddBool(p, "DropBroadcastsInPrivacyFilterMode", h->Option->DropBroadcastsInPrivacyFilterMode);
  7608. PackAddBool(p, "DropArpInPrivacyFilterMode", h->Option->DropArpInPrivacyFilterMode);
  7609. PackAddBool(p, "SuppressClientUpdateNotification", h->Option->SuppressClientUpdateNotification);
  7610. PackAddInt(p, "ClientMinimumRequiredBuild", h->Option->ClientMinimumRequiredBuild);
  7611. PackAddBool(p, "FixForDLinkBPDU", h->Option->FixForDLinkBPDU);
  7612. PackAddBool(p, "BroadcastLimiterStrictMode", h->Option->BroadcastLimiterStrictMode);
  7613. PackAddBool(p, "NoLookBPDUBridgeId", h->Option->NoLookBPDUBridgeId);
  7614. PackAddBool(p, "NoManageVlanId", h->Option->NoManageVlanId);
  7615. PackAddInt(p, "VlanTypeId", h->Option->VlanTypeId);
  7616. PackAddBool(p, "FilterOSPF", h->Option->FilterOSPF);
  7617. PackAddBool(p, "FilterIPv4", h->Option->FilterIPv4);
  7618. PackAddBool(p, "FilterIPv6", h->Option->FilterIPv6);
  7619. PackAddBool(p, "FilterNonIP", h->Option->FilterNonIP);
  7620. PackAddBool(p, "NoIPv4PacketLog", h->Option->NoIPv4PacketLog);
  7621. PackAddBool(p, "NoIPv6PacketLog", h->Option->NoIPv6PacketLog);
  7622. PackAddBool(p, "FilterBPDU", h->Option->FilterBPDU);
  7623. PackAddBool(p, "NoIPv6DefaultRouterInRAWhenIPv6", h->Option->NoIPv6DefaultRouterInRAWhenIPv6);
  7624. PackAddBool(p, "NoMacAddressLog", h->Option->NoMacAddressLog);
  7625. PackAddBool(p, "ManageOnlyPrivateIP", h->Option->ManageOnlyPrivateIP);
  7626. PackAddBool(p, "ManageOnlyLocalUnicastIPv6", h->Option->ManageOnlyLocalUnicastIPv6);
  7627. PackAddBool(p, "DisableIPParsing", h->Option->DisableIPParsing);
  7628. PackAddInt(p, "AdjustTcpMssValue", h->Option->AdjustTcpMssValue);
  7629. PackAddBool(p, "DisableAdjustTcpMss", h->Option->DisableAdjustTcpMss);
  7630. PackAddBool(p, "NoDhcpPacketLogOutsideHub", h->Option->NoDhcpPacketLogOutsideHub);
  7631. PackAddBool(p, "DisableHttpParsing", h->Option->DisableHttpParsing);
  7632. PackAddBool(p, "DisableUdpAcceleration", h->Option->DisableUdpAcceleration);
  7633. PackAddBool(p, "DisableUdpFilterForLocalBridgeNic", h->Option->DisableUdpFilterForLocalBridgeNic);
  7634. PackAddBool(p, "ApplyIPv4AccessListOnArpPacket", h->Option->ApplyIPv4AccessListOnArpPacket);
  7635. PackAddBool(p, "RemoveDefGwOnDhcpForLocalhost", h->Option->RemoveDefGwOnDhcpForLocalhost);
  7636. PackAddInt(p, "SecureNAT_MaxTcpSessionsPerIp", h->Option->SecureNAT_MaxTcpSessionsPerIp);
  7637. PackAddInt(p, "SecureNAT_MaxTcpSynSentPerIp", h->Option->SecureNAT_MaxTcpSynSentPerIp);
  7638. PackAddInt(p, "SecureNAT_MaxUdpSessionsPerIp", h->Option->SecureNAT_MaxUdpSessionsPerIp);
  7639. PackAddInt(p, "SecureNAT_MaxDnsSessionsPerIp", h->Option->SecureNAT_MaxDnsSessionsPerIp);
  7640. PackAddInt(p, "SecureNAT_MaxIcmpSessionsPerIp", h->Option->SecureNAT_MaxIcmpSessionsPerIp);
  7641. PackAddInt(p, "AccessListIncludeFileCacheLifetime", h->Option->AccessListIncludeFileCacheLifetime);
  7642. PackAddBool(p, "DisableKernelModeSecureNAT", h->Option->DisableKernelModeSecureNAT);
  7643. PackAddBool(p, "DisableUserModeSecureNAT", h->Option->DisableUserModeSecureNAT);
  7644. PackAddBool(p, "DisableCheckMacOnLocalBridge", h->Option->DisableCheckMacOnLocalBridge);
  7645. PackAddBool(p, "DisableCorrectIpOffloadChecksum", h->Option->DisableCorrectIpOffloadChecksum);
  7646. PackAddInt(p, "SavePacketLog", h->LogSetting.SavePacketLog);
  7647. PackAddInt(p, "PacketLogSwitchType", h->LogSetting.PacketLogSwitchType);
  7648. for (i = 0;i < NUM_PACKET_LOG;i++)
  7649. {
  7650. PackAddIntEx(p, "PacketLogConfig", h->LogSetting.PacketLogConfig[i], i, NUM_PACKET_LOG);
  7651. }
  7652. PackAddInt(p, "SaveSecurityLog", h->LogSetting.SaveSecurityLog);
  7653. PackAddInt(p, "SecurityLogSwitchType", h->LogSetting.SecurityLogSwitchType);
  7654. PackAddData(p, "HashedPassword", h->HashedPassword, SHA1_SIZE);
  7655. PackAddData(p, "SecurePassword", h->SecurePassword, SHA1_SIZE);
  7656. SiAccessListToPack(p, h->AccessList);
  7657. if (h->EnableSecureNAT)
  7658. {
  7659. PackAddBool(p, "EnableSecureNAT", h->EnableSecureNAT);
  7660. OutVhOption(p, h->SecureNATOption);
  7661. }
  7662. }
  7663. // Setting of the HUB has been updated
  7664. void SiHubUpdateProc(HUB *h)
  7665. {
  7666. SERVER *s;
  7667. UINT i;
  7668. // Validate arguments
  7669. if (h == NULL || h->Cedar->Server == NULL || h->Cedar->Server->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  7670. {
  7671. return;
  7672. }
  7673. s = h->Cedar->Server;
  7674. if (s->FarmMemberList == NULL)
  7675. {
  7676. return;
  7677. }
  7678. if (h->LastVersion != h->CurrentVersion || h->CurrentVersion == 0)
  7679. {
  7680. LIST *fm_list;
  7681. if (h->CurrentVersion == 0)
  7682. {
  7683. h->CurrentVersion = 1;
  7684. }
  7685. h->LastVersion = h->CurrentVersion;
  7686. Debug("SiHubUpdateProc HUB=%s, Ver=%u, Type=%u, Offline=%u\n", h->Name, h->CurrentVersion,
  7687. h->Type, h->Offline);
  7688. fm_list = NewListFast(NULL);
  7689. LockList(s->FarmMemberList);
  7690. {
  7691. while (true)
  7692. {
  7693. bool escape = true;
  7694. // Update the HUB on all members
  7695. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7696. {
  7697. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7698. if (IsInList(fm_list, f) == false)
  7699. {
  7700. Add(fm_list, f);
  7701. escape = false;
  7702. if (f->Me == false)
  7703. {
  7704. SiCallUpdateHub(s, f, h);
  7705. }
  7706. break;
  7707. }
  7708. }
  7709. if (escape)
  7710. {
  7711. break;
  7712. }
  7713. UnlockList(s->FarmMemberList);
  7714. LockList(s->FarmMemberList);
  7715. }
  7716. }
  7717. UnlockList(s->FarmMemberList);
  7718. ReleaseList(fm_list);
  7719. }
  7720. if (h->Offline == false)
  7721. {
  7722. SiHubOnlineProc(h);
  7723. }
  7724. }
  7725. // HUB turns to online
  7726. void SiHubOnlineProc(HUB *h)
  7727. {
  7728. SERVER *s;
  7729. UINT i;
  7730. // Validate arguments
  7731. if (h == NULL || h->Cedar->Server == NULL || h->Cedar->Server->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  7732. {
  7733. // Process only on the farm controller
  7734. return;
  7735. }
  7736. s = h->Cedar->Server;
  7737. if (s->FarmMemberList == NULL)
  7738. {
  7739. return;
  7740. }
  7741. LockList(s->FarmMemberList);
  7742. {
  7743. if (h->Type == HUB_TYPE_FARM_STATIC)
  7744. {
  7745. // Static HUB
  7746. // Create the HUB on all members
  7747. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7748. {
  7749. UINT j;
  7750. bool exists = false;
  7751. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7752. LockList(f->HubList);
  7753. {
  7754. for (j = 0;j < LIST_NUM(f->HubList);j++)
  7755. {
  7756. HUB_LIST *hh = LIST_DATA(f->HubList, j);
  7757. if (StrCmpi(hh->Name, h->Name) == 0)
  7758. {
  7759. exists = true;
  7760. }
  7761. }
  7762. }
  7763. UnlockList(f->HubList);
  7764. if (exists == false)
  7765. {
  7766. SiCallCreateHub(s, f, h);
  7767. }
  7768. }
  7769. }
  7770. }
  7771. UnlockList(s->FarmMemberList);
  7772. }
  7773. // HUB turns to offline
  7774. void SiHubOfflineProc(HUB *h)
  7775. {
  7776. SERVER *s;
  7777. char hubname[MAX_HUBNAME_LEN + 1];
  7778. UINT i;
  7779. LIST *fm_list;
  7780. // Validate arguments
  7781. if (h == NULL || h->Cedar->Server == NULL || h->Cedar->Server->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  7782. {
  7783. // Process only on the farm controller
  7784. return;
  7785. }
  7786. s = h->Cedar->Server;
  7787. if (s->FarmMemberList == NULL)
  7788. {
  7789. return;
  7790. }
  7791. StrCpy(hubname, sizeof(hubname), h->Name);
  7792. fm_list = NewListFast(NULL);
  7793. LockList(s->FarmMemberList);
  7794. {
  7795. while (true)
  7796. {
  7797. bool escape = true;
  7798. // Stop the HUB on all members
  7799. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7800. {
  7801. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7802. if (IsInList(fm_list, f) == false)
  7803. {
  7804. Add(fm_list, f);
  7805. escape = false;
  7806. SiCallDeleteHub(s, f, h);
  7807. break;
  7808. }
  7809. }
  7810. if (escape)
  7811. {
  7812. break;
  7813. }
  7814. UnlockList(s->FarmMemberList);
  7815. LockList(s->FarmMemberList);
  7816. }
  7817. }
  7818. UnlockList(s->FarmMemberList);
  7819. ReleaseList(fm_list);
  7820. }
  7821. // Convert an access to PACK
  7822. void SiAccessToPack(PACK *p, ACCESS *a, UINT i, UINT total)
  7823. {
  7824. // Validate arguments
  7825. if (p == NULL || a == NULL)
  7826. {
  7827. return;
  7828. }
  7829. PackAddUniStrEx(p, "Note", a->Note, i, total);
  7830. PackAddIntEx(p, "Active", a->Active, i, total);
  7831. PackAddIntEx(p, "Priority", a->Priority, i, total);
  7832. PackAddIntEx(p, "Discard", a->Discard, i, total);
  7833. if (a->IsIPv6)
  7834. {
  7835. PackAddIp32Ex(p, "SrcIpAddress", 0xFDFFFFDF, i, total);
  7836. PackAddIp32Ex(p, "SrcSubnetMask", 0xFFFFFFFF, i, total);
  7837. PackAddIp32Ex(p, "DestIpAddress", 0xFDFFFFDF, i, total);
  7838. PackAddIp32Ex(p, "DestSubnetMask", 0xFFFFFFFF, i, total);
  7839. }
  7840. else
  7841. {
  7842. PackAddIp32Ex(p, "SrcIpAddress", a->SrcIpAddress, i, total);
  7843. PackAddIp32Ex(p, "SrcSubnetMask", a->SrcSubnetMask, i, total);
  7844. PackAddIp32Ex(p, "DestIpAddress", a->DestIpAddress, i, total);
  7845. PackAddIp32Ex(p, "DestSubnetMask", a->DestSubnetMask, i, total);
  7846. }
  7847. PackAddIntEx(p, "Protocol", a->Protocol, i, total);
  7848. PackAddIntEx(p, "SrcPortStart", a->SrcPortStart, i, total);
  7849. PackAddIntEx(p, "SrcPortEnd", a->SrcPortEnd, i, total);
  7850. PackAddIntEx(p, "DestPortStart", a->DestPortStart, i, total);
  7851. PackAddIntEx(p, "DestPortEnd", a->DestPortEnd, i, total);
  7852. PackAddStrEx(p, "SrcUsername", a->SrcUsername, i, total);
  7853. PackAddStrEx(p, "DestUsername", a->DestUsername, i, total);
  7854. PackAddBoolEx(p, "CheckSrcMac", a->CheckSrcMac, i, total);
  7855. PackAddDataEx(p, "SrcMacAddress", a->SrcMacAddress, sizeof(a->SrcMacAddress), i, total);
  7856. PackAddDataEx(p, "SrcMacMask", a->SrcMacMask, sizeof(a->SrcMacMask), i, total);
  7857. PackAddBoolEx(p, "CheckDstMac", a->CheckDstMac, i, total);
  7858. PackAddDataEx(p, "DstMacAddress", a->DstMacAddress, sizeof(a->DstMacAddress), i, total);
  7859. PackAddDataEx(p, "DstMacMask", a->DstMacMask, sizeof(a->DstMacMask), i, total);
  7860. PackAddBoolEx(p, "CheckTcpState", a->CheckTcpState, i, total);
  7861. PackAddBoolEx(p, "Established", a->Established, i, total);
  7862. PackAddIntEx(p, "Delay", a->Delay, i, total);
  7863. PackAddIntEx(p, "Jitter", a->Jitter, i, total);
  7864. PackAddIntEx(p, "Loss", a->Loss, i, total);
  7865. PackAddStrEx(p, "RedirectUrl", a->RedirectUrl, i, total);
  7866. PackAddBoolEx(p, "IsIPv6", a->IsIPv6, i, total);
  7867. if (a->IsIPv6)
  7868. {
  7869. PackAddIp6AddrEx(p, "SrcIpAddress6", &a->SrcIpAddress6, i, total);
  7870. PackAddIp6AddrEx(p, "SrcSubnetMask6", &a->SrcSubnetMask6, i, total);
  7871. PackAddIp6AddrEx(p, "DestIpAddress6", &a->DestIpAddress6, i, total);
  7872. PackAddIp6AddrEx(p, "DestSubnetMask6", &a->DestSubnetMask6, i, total);
  7873. }
  7874. else
  7875. {
  7876. IPV6_ADDR zero;
  7877. Zero(&zero, sizeof(zero));
  7878. PackAddIp6AddrEx(p, "SrcIpAddress6", &zero, i, total);
  7879. PackAddIp6AddrEx(p, "SrcSubnetMask6", &zero, i, total);
  7880. PackAddIp6AddrEx(p, "DestIpAddress6", &zero, i, total);
  7881. PackAddIp6AddrEx(p, "DestSubnetMask6", &zero, i, total);
  7882. }
  7883. }
  7884. // Get number of access contained in the PACK
  7885. UINT SiNumAccessFromPack(PACK *p)
  7886. {
  7887. // Validate arguments
  7888. if (p == NULL)
  7889. {
  7890. return 0;
  7891. }
  7892. return PackGetIndexCount(p, "Active");
  7893. }
  7894. // Convert the PACK to access
  7895. ACCESS *SiPackToAccess(PACK *p, UINT i)
  7896. {
  7897. ACCESS *a;
  7898. // Validate arguments
  7899. if (p == NULL)
  7900. {
  7901. return NULL;
  7902. }
  7903. a = ZeroMalloc(sizeof(ACCESS));
  7904. PackGetUniStrEx(p, "Note", a->Note, sizeof(a->Note), i);
  7905. a->Active = PackGetIntEx(p, "Active", i);
  7906. a->Priority = PackGetIntEx(p, "Priority", i);
  7907. a->Discard = PackGetIntEx(p, "Discard", i);
  7908. a->SrcIpAddress = PackGetIp32Ex(p, "SrcIpAddress", i);
  7909. a->SrcSubnetMask = PackGetIp32Ex(p, "SrcSubnetMask", i);
  7910. a->DestIpAddress = PackGetIp32Ex(p, "DestIpAddress", i);
  7911. a->DestSubnetMask = PackGetIp32Ex(p, "DestSubnetMask", i);
  7912. a->Protocol = PackGetIntEx(p, "Protocol", i);
  7913. a->SrcPortStart = PackGetIntEx(p, "SrcPortStart", i);
  7914. a->SrcPortEnd = PackGetIntEx(p, "SrcPortEnd", i);
  7915. a->DestPortStart = PackGetIntEx(p, "DestPortStart", i);
  7916. a->DestPortEnd = PackGetIntEx(p, "DestPortEnd", i);
  7917. PackGetStrEx(p, "SrcUsername", a->SrcUsername, sizeof(a->SrcUsername), i);
  7918. PackGetStrEx(p, "DestUsername", a->DestUsername, sizeof(a->DestUsername), i);
  7919. a->CheckSrcMac = PackGetBoolEx(p, "CheckSrcMac", i);
  7920. PackGetDataEx2(p, "SrcMacAddress", a->SrcMacAddress, sizeof(a->SrcMacAddress), i);
  7921. PackGetDataEx2(p, "SrcMacMask", a->SrcMacMask, sizeof(a->SrcMacMask), i);
  7922. a->CheckDstMac = PackGetBoolEx(p, "CheckDstMac", i);
  7923. PackGetDataEx2(p, "DstMacAddress", a->DstMacAddress, sizeof(a->DstMacAddress), i);
  7924. PackGetDataEx2(p, "DstMacMask", a->DstMacMask, sizeof(a->DstMacMask), i);
  7925. a->CheckTcpState = PackGetBoolEx(p, "CheckTcpState", i);
  7926. a->Established = PackGetBoolEx(p, "Established", i);
  7927. a->Delay = PackGetIntEx(p, "Delay", i);
  7928. a->Jitter = PackGetIntEx(p, "Jitter", i);
  7929. a->Loss = PackGetIntEx(p, "Loss", i);
  7930. a->IsIPv6 = PackGetBoolEx(p, "IsIPv6", i);
  7931. PackGetStrEx(p, "RedirectUrl", a->RedirectUrl, sizeof(a->RedirectUrl), i);
  7932. if (a->IsIPv6)
  7933. {
  7934. PackGetIp6AddrEx(p, "SrcIpAddress6", &a->SrcIpAddress6, i);
  7935. PackGetIp6AddrEx(p, "SrcSubnetMask6", &a->SrcSubnetMask6, i);
  7936. PackGetIp6AddrEx(p, "DestIpAddress6", &a->DestIpAddress6, i);
  7937. PackGetIp6AddrEx(p, "DestSubnetMask6", &a->DestSubnetMask6, i);
  7938. }
  7939. return a;
  7940. }
  7941. // Convert the PACK to an access list
  7942. void SiAccessListToPack(PACK *p, LIST *o)
  7943. {
  7944. // Validate arguments
  7945. if (p == NULL || o == NULL)
  7946. {
  7947. return;
  7948. }
  7949. LockList(o);
  7950. {
  7951. UINT i;
  7952. for (i = 0;i < LIST_NUM(o);i++)
  7953. {
  7954. ACCESS *a = LIST_DATA(o, i);
  7955. SiAccessToPack(p, a, i, LIST_NUM(o));
  7956. }
  7957. }
  7958. UnlockList(o);
  7959. }
  7960. // Get the member that is hosting the specified HUB
  7961. FARM_MEMBER *SiGetHubHostingMember(SERVER *s, HUB *h, bool admin_mode, CONNECTION *c)
  7962. {
  7963. FARM_MEMBER *ret = NULL;
  7964. char name[MAX_SIZE];
  7965. UINT i;
  7966. // Validate arguments
  7967. if (s == NULL || h == NULL || c == NULL)
  7968. {
  7969. return NULL;
  7970. }
  7971. StrCpy(name, sizeof(name), h->Name);
  7972. if (h->Type == HUB_TYPE_FARM_STATIC)
  7973. {
  7974. // It is good to select any member in the case of static HUB
  7975. if (admin_mode == false)
  7976. {
  7977. ret = SiGetNextFarmMember(s, c, h);
  7978. }
  7979. else
  7980. {
  7981. UINT i;
  7982. ret = NULL;
  7983. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7984. {
  7985. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7986. if (f->Me)
  7987. {
  7988. ret = f;
  7989. break;
  7990. }
  7991. }
  7992. }
  7993. }
  7994. else
  7995. {
  7996. // Examine whether there is a member that is hosting the HUB already in the case of dynamic HUB
  7997. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7998. {
  7999. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  8000. HUB_LIST *hh, t;
  8001. StrCpy(t.Name, sizeof(t.Name), name);
  8002. LockList(f->HubList);
  8003. {
  8004. hh = Search(f->HubList, &t);
  8005. if (hh != NULL)
  8006. {
  8007. // Found
  8008. ret = f;
  8009. }
  8010. }
  8011. UnlockList(f->HubList);
  8012. }
  8013. if (ret == NULL)
  8014. {
  8015. // Let host the new HUB
  8016. FARM_MEMBER *f;
  8017. // Select the member to host
  8018. ret = SiGetNextFarmMember(s, c, h);
  8019. f = ret;
  8020. if (f != NULL)
  8021. {
  8022. // HUB creation directive
  8023. SiAddHubCreateHistory(s, name);
  8024. SiCallCreateHub(s, f, h);
  8025. SiCallUpdateHub(s, f, h);
  8026. }
  8027. }
  8028. }
  8029. return ret;
  8030. }
  8031. // Task is called
  8032. PACK *SiCalledTask(FARM_CONTROLLER *f, PACK *p, char *taskname)
  8033. {
  8034. PACK *ret;
  8035. SERVER *s;
  8036. // Validate arguments
  8037. if (f == NULL || p == NULL || taskname == NULL)
  8038. {
  8039. return NULL;
  8040. }
  8041. ret = NULL;
  8042. s = f->Server;
  8043. if (StrCmpi(taskname, "noop") == 0)
  8044. {
  8045. // NO OPERATION
  8046. ret = NewPack();
  8047. }
  8048. else
  8049. {
  8050. Debug("Task Called: [%s].\n", taskname);
  8051. if (StrCmpi(taskname, "createhub") == 0)
  8052. {
  8053. SiCalledCreateHub(s, p);
  8054. ret = NewPack();
  8055. }
  8056. else if (StrCmpi(taskname, "deletehub") == 0)
  8057. {
  8058. SiCalledDeleteHub(s, p);
  8059. ret = NewPack();
  8060. }
  8061. else if (StrCmpi(taskname, "enumhub") == 0)
  8062. {
  8063. ret = NewPack();
  8064. SiCalledEnumHub(s, ret, p);
  8065. }
  8066. else if (StrCmpi(taskname, "updatehub") == 0)
  8067. {
  8068. SiCalledUpdateHub(s, p);
  8069. ret = NewPack();
  8070. }
  8071. else if (StrCmpi(taskname, "createticket") == 0)
  8072. {
  8073. ret = SiCalledCreateTicket(s, p);
  8074. }
  8075. else if (StrCmpi(taskname, "enumnat") == 0)
  8076. {
  8077. ret = SiCalledEnumNat(s, p);
  8078. }
  8079. else if (StrCmpi(taskname, "enumdhcp") == 0)
  8080. {
  8081. ret = SiCalledEnumDhcp(s, p);
  8082. }
  8083. else if (StrCmpi(taskname, "getnatstatus") == 0)
  8084. {
  8085. ret = SiCalledGetNatStatus(s, p);
  8086. }
  8087. else if (StrCmpi(taskname, "enumsession") == 0)
  8088. {
  8089. ret = SiCalledEnumSession(s, p);
  8090. }
  8091. else if (StrCmpi(taskname, "deletesession") == 0)
  8092. {
  8093. SiCalledDeleteSession(s, p);
  8094. ret = NewPack();
  8095. }
  8096. else if (StrCmpi(taskname, "deletemactable") == 0)
  8097. {
  8098. SiCalledDeleteMacTable(s, p);
  8099. ret = NewPack();
  8100. }
  8101. else if (StrCmpi(taskname, "deleteiptable") == 0)
  8102. {
  8103. SiCalledDeleteIpTable(s, p);
  8104. ret = NewPack();
  8105. }
  8106. else if (StrCmpi(taskname, "enummactable") == 0)
  8107. {
  8108. ret = SiCalledEnumMacTable(s, p);
  8109. }
  8110. else if (StrCmpi(taskname, "enumiptable") == 0)
  8111. {
  8112. ret = SiCalledEnumIpTable(s, p);
  8113. }
  8114. else if (StrCmpi(taskname, "getsessionstatus") == 0)
  8115. {
  8116. ret = SiCalledGetSessionStatus(s, p);
  8117. }
  8118. else if (StrCmpi(taskname, "enumlogfilelist") == 0)
  8119. {
  8120. ret = SiCalledEnumLogFileList(s, p);
  8121. }
  8122. else if (StrCmpi(taskname, "readlogfile") == 0)
  8123. {
  8124. ret = SiCalledReadLogFile(s, p);
  8125. }
  8126. }
  8127. return ret;
  8128. }
  8129. // Call the task (asynchronous)
  8130. FARM_TASK *SiCallTaskAsyncBegin(FARM_MEMBER *f, PACK *p, char *taskname)
  8131. {
  8132. char tmp[MAX_PATH];
  8133. FARM_TASK *t;
  8134. // Validate arguments
  8135. if (f == NULL || p == NULL || taskname == NULL)
  8136. {
  8137. return NULL;
  8138. }
  8139. PackAddStr(p, "taskname", taskname);
  8140. Debug("Call Async Task [%s] (%s)\n", taskname, f->hostname);
  8141. Format(tmp, sizeof(tmp), "CLUSTER_CALL_ASYNC: Entering Call [%s] to %s", taskname, f->hostname);
  8142. SiDebugLog(f->Cedar->Server, tmp);
  8143. t = SiFarmServPostTask(f, p);
  8144. StrCpy(t->TaskName, sizeof(t->TaskName), taskname);
  8145. StrCpy(t->HostName, sizeof(t->HostName), f->hostname);
  8146. t->FarmMember = f;
  8147. return t;
  8148. }
  8149. // Get the results of the asynchronous task
  8150. PACK *SiCallTaskAsyncEnd(CEDAR *c, FARM_TASK *t)
  8151. {
  8152. PACK *p;
  8153. char taskname[MAX_PATH];
  8154. char hostname[MAX_PATH];
  8155. char tmp[MAX_SIZE];
  8156. // Validate arguments
  8157. if (t == NULL || c == NULL)
  8158. {
  8159. return NULL;
  8160. }
  8161. StrCpy(taskname, sizeof(taskname), t->TaskName);
  8162. StrCpy(hostname, sizeof(hostname), t->HostName);
  8163. p = SiFarmServWaitTask(t);
  8164. if (p == NULL)
  8165. {
  8166. Format(tmp, sizeof(tmp), "CLUSTER_CALL_ASYNC: Call ERROR [%s] to %s", taskname, hostname);
  8167. SiDebugLog(c->Server, tmp);
  8168. return NULL;
  8169. }
  8170. Format(tmp, sizeof(tmp), "CLUSTER_CALL_ASYNC: Retrieving Call Result [%s] to %s", taskname, hostname);
  8171. SiDebugLog(c->Server, tmp);
  8172. return p;
  8173. }
  8174. // Call the task
  8175. PACK *SiCallTask(FARM_MEMBER *f, PACK *p, char *taskname)
  8176. {
  8177. PACK *ret;
  8178. char tmp[MAX_PATH];
  8179. // Validate arguments
  8180. if (f == NULL || p == NULL || taskname == NULL)
  8181. {
  8182. return NULL;
  8183. }
  8184. PackAddStr(p, "taskname", taskname);
  8185. Debug("Call Task [%s] (%s)\n", taskname, f->hostname);
  8186. Format(tmp, sizeof(tmp), "CLUSTER_CALL: Entering Call [%s] to %s", taskname, f->hostname);
  8187. SiDebugLog(f->Cedar->Server, tmp);
  8188. ret = SiExecTask(f, p);
  8189. Format(tmp, sizeof(tmp), "CLUSTER_CALL: Leaving Call [%s] to %s", taskname, f->hostname);
  8190. SiDebugLog(f->Cedar->Server, tmp);
  8191. return ret;
  8192. }
  8193. // Task listening procedure (Main Process)
  8194. void SiAcceptTasksFromControllerMain(FARM_CONTROLLER *f, SOCK *sock)
  8195. {
  8196. PACK *request;
  8197. PACK *response;
  8198. char taskname[MAX_SIZE];
  8199. // Validate arguments
  8200. if (f == NULL || sock == NULL)
  8201. {
  8202. return;
  8203. }
  8204. f->IsConnected = true;
  8205. while (true)
  8206. {
  8207. bool ret;
  8208. // Receive the PACK
  8209. request = HttpClientRecv(sock);
  8210. if (request == NULL)
  8211. {
  8212. // Disconnect
  8213. break;
  8214. }
  8215. response = NULL;
  8216. // Get the name
  8217. if (PackGetStr(request, "taskname", taskname, sizeof(taskname)))
  8218. {
  8219. Lock(f->Server->TasksFromFarmControllerLock);
  8220. {
  8221. response = SiCalledTask(f, request, taskname);
  8222. }
  8223. Unlock(f->Server->TasksFromFarmControllerLock);
  8224. }
  8225. FreePack(request);
  8226. // Return a response
  8227. if (response == NULL)
  8228. {
  8229. response = NewPack();
  8230. }
  8231. else
  8232. {
  8233. PackAddInt(response, "succeed", 1);
  8234. }
  8235. ret = HttpClientSend(sock, response);
  8236. FreePack(response);
  8237. if (ret == false)
  8238. {
  8239. // Disconnect
  8240. break;
  8241. }
  8242. }
  8243. f->IsConnected = false;
  8244. }
  8245. // Task waiting procedure
  8246. void SiAcceptTasksFromController(FARM_CONTROLLER *f, SOCK *sock)
  8247. {
  8248. UINT i;
  8249. HUB **hubs;
  8250. UINT num_hubs;
  8251. CEDAR *c;
  8252. SERVER *s;
  8253. // Validate arguments
  8254. if (f == NULL || sock == NULL)
  8255. {
  8256. return;
  8257. }
  8258. s = f->Server;
  8259. c = s->Cedar;
  8260. // Main process
  8261. SiAcceptTasksFromControllerMain(f, sock);
  8262. // Stop all Virtual HUBs since the connection to the controller is disconnected
  8263. LockList(c->HubList);
  8264. {
  8265. hubs = ToArray(c->HubList);
  8266. num_hubs = LIST_NUM(c->HubList);
  8267. for (i = 0;i < num_hubs;i++)
  8268. {
  8269. AddRef(hubs[i]->ref);
  8270. }
  8271. }
  8272. UnlockList(c->HubList);
  8273. for (i = 0;i < num_hubs;i++)
  8274. {
  8275. SetHubOffline(hubs[i]);
  8276. DelHub(c, hubs[i]);
  8277. ReleaseHub(hubs[i]);
  8278. }
  8279. Free(hubs);
  8280. }
  8281. // Execute the task
  8282. PACK *SiExecTask(FARM_MEMBER *f, PACK *p)
  8283. {
  8284. FARM_TASK *t;
  8285. // Validate arguments
  8286. if (f == NULL || p == NULL)
  8287. {
  8288. return NULL;
  8289. }
  8290. t = SiFarmServPostTask(f, p);
  8291. if (t == NULL)
  8292. {
  8293. return NULL;
  8294. }
  8295. return SiFarmServWaitTask(t);
  8296. }
  8297. // Task queuing
  8298. FARM_TASK *SiFarmServPostTask(FARM_MEMBER *f, PACK *request)
  8299. {
  8300. FARM_TASK *t;
  8301. // Validate arguments
  8302. if (f == NULL || request == NULL)
  8303. {
  8304. return NULL;
  8305. }
  8306. t = ZeroMalloc(sizeof(FARM_TASK));
  8307. t->CompleteEvent = NewEvent();
  8308. t->Request = request;
  8309. LockQueue(f->TaskQueue);
  8310. {
  8311. if (f->Halting)
  8312. {
  8313. // Halting (failure)
  8314. UnlockQueue(f->TaskQueue);
  8315. ReleaseEvent(t->CompleteEvent);
  8316. Free(t);
  8317. return NULL;
  8318. }
  8319. InsertQueue(f->TaskQueue, t);
  8320. }
  8321. UnlockQueue(f->TaskQueue);
  8322. Set(f->TaskPostEvent);
  8323. return t;
  8324. }
  8325. // Wait for task results
  8326. PACK *SiFarmServWaitTask(FARM_TASK *t)
  8327. {
  8328. PACK *response;
  8329. // Validate arguments
  8330. if (t == NULL)
  8331. {
  8332. return NULL;
  8333. }
  8334. Wait(t->CompleteEvent, INFINITE);
  8335. ReleaseEvent(t->CompleteEvent);
  8336. FreePack(t->Request);
  8337. response = t->Response;
  8338. Free(t);
  8339. if (PackGetInt(response, "succeed") == 0)
  8340. {
  8341. // Task calling fails for any reason
  8342. FreePack(response);
  8343. return NULL;
  8344. }
  8345. return response;
  8346. }
  8347. // Server farm processing main
  8348. void SiFarmServMain(SERVER *server, SOCK *sock, FARM_MEMBER *f)
  8349. {
  8350. UINT wait_time = SERVER_CONTROL_TCP_TIMEOUT / 2;
  8351. bool send_noop = false;
  8352. UINT i;
  8353. CEDAR *c;
  8354. // Validate arguments
  8355. if (server == NULL || sock == NULL || f == NULL)
  8356. {
  8357. Debug("SiFarmServMain Failed.\n");
  8358. return;
  8359. }
  8360. Debug("SiFarmServMain Started.\n");
  8361. c = server->Cedar;
  8362. // Send a directive to create all static HUBs at the stage
  8363. // where the members have been connected to the controller
  8364. LockList(c->HubList);
  8365. {
  8366. for (i = 0;i < LIST_NUM(c->HubList);i++)
  8367. {
  8368. HUB *h = LIST_DATA(c->HubList, i);
  8369. if (h->Offline == false)
  8370. {
  8371. if (h->Type == HUB_TYPE_FARM_STATIC)
  8372. {
  8373. PACK *p;
  8374. HUB_LIST *hh;
  8375. p = NewPack();
  8376. SiPackAddCreateHub(p, h);
  8377. PackAddStr(p, "taskname", "createhub");
  8378. HttpServerSend(sock, p);
  8379. FreePack(p);
  8380. p = HttpServerRecv(sock);
  8381. FreePack(p);
  8382. p = NewPack();
  8383. SiPackAddCreateHub(p, h);
  8384. PackAddStr(p, "taskname", "updatehub");
  8385. HttpServerSend(sock, p);
  8386. FreePack(p);
  8387. p = HttpServerRecv(sock);
  8388. FreePack(p);
  8389. hh = ZeroMalloc(sizeof(HUB_LIST));
  8390. hh->DynamicHub = false;
  8391. hh->FarmMember = f;
  8392. StrCpy(hh->Name, sizeof(hh->Name), h->Name);
  8393. LockList(f->HubList);
  8394. {
  8395. Add(f->HubList, hh);
  8396. }
  8397. UnlockList(f->HubList);
  8398. }
  8399. }
  8400. }
  8401. }
  8402. UnlockList(c->HubList);
  8403. Debug("SiFarmServMain: while (true)\n");
  8404. while (true)
  8405. {
  8406. FARM_TASK *t;
  8407. UINT64 tick;
  8408. do
  8409. {
  8410. // Check whether a new task arrived
  8411. LockQueue(f->TaskQueue);
  8412. {
  8413. t = GetNext(f->TaskQueue);
  8414. }
  8415. UnlockQueue(f->TaskQueue);
  8416. if (t != NULL)
  8417. {
  8418. // Handle this task
  8419. PACK *p = t->Request;
  8420. bool ret;
  8421. // Transmission
  8422. ret = HttpServerSend(sock, p);
  8423. send_noop = false;
  8424. if (ret == false)
  8425. {
  8426. // Disconnected
  8427. // Cancel this task
  8428. Set(t->CompleteEvent);
  8429. goto DISCONNECTED;
  8430. }
  8431. // Receive
  8432. p = HttpServerRecv(sock);
  8433. t->Response = p;
  8434. Set(t->CompleteEvent);
  8435. send_noop = false;
  8436. }
  8437. }
  8438. while (t != NULL);
  8439. if (send_noop)
  8440. {
  8441. // Send a NOOP
  8442. PACK *p;
  8443. bool ret;
  8444. p = NewPack();
  8445. PackAddStr(p, "taskname", "noop");
  8446. ret = HttpServerSend(sock, p);
  8447. FreePack(p);
  8448. if (ret == false)
  8449. {
  8450. goto DISCONNECTED;
  8451. }
  8452. p = HttpServerRecv(sock);
  8453. if (p == NULL)
  8454. {
  8455. goto DISCONNECTED;
  8456. }
  8457. FreePack(p);
  8458. }
  8459. tick = Tick64();
  8460. while (true)
  8461. {
  8462. bool break_flag;
  8463. if ((tick + wait_time) <= Tick64())
  8464. {
  8465. break;
  8466. }
  8467. Wait(f->TaskPostEvent, 250);
  8468. break_flag = false;
  8469. LockQueue(f->TaskQueue);
  8470. {
  8471. if (f->TaskQueue->num_item != 0)
  8472. {
  8473. break_flag = true;
  8474. }
  8475. }
  8476. UnlockQueue(f->TaskQueue);
  8477. if (break_flag || f->Halting || server->Halt)
  8478. {
  8479. break;
  8480. }
  8481. }
  8482. send_noop = true;
  8483. }
  8484. DISCONNECTED:
  8485. Debug("SiFarmServMain: DISCONNECTED\n");
  8486. f->Halting = true;
  8487. // Cancel all outstanding tasks
  8488. LockQueue(f->TaskQueue);
  8489. {
  8490. FARM_TASK *t;
  8491. while (t = GetNext(f->TaskQueue))
  8492. {
  8493. Set(t->CompleteEvent);
  8494. }
  8495. }
  8496. UnlockQueue(f->TaskQueue);
  8497. }
  8498. // Farm server function that handles the connection from farm members
  8499. void SiFarmServ(SERVER *server, SOCK *sock, X *cert, UINT ip, UINT num_port, UINT *ports, char *hostname, UINT point, UINT weight, UINT max_sessions)
  8500. {
  8501. PACK *p;
  8502. FARM_MEMBER *f;
  8503. UINT i;
  8504. char tmp[MAX_SIZE];
  8505. // Validate arguments
  8506. if (server == NULL || sock == NULL || cert == NULL || num_port == 0 || ports == NULL || hostname == NULL)
  8507. {
  8508. return;
  8509. }
  8510. if (weight == 0)
  8511. {
  8512. weight = FARM_DEFAULT_WEIGHT;
  8513. }
  8514. if (max_sessions == 0)
  8515. {
  8516. max_sessions = SERVER_MAX_SESSIONS;
  8517. }
  8518. if (ip == 0)
  8519. {
  8520. // If the public IP address is not specified, specify the connection
  8521. // source IP address of this farm member server
  8522. ip = IPToUINT(&sock->RemoteIP);
  8523. }
  8524. IPToStr32(tmp, sizeof(tmp), ip);
  8525. SLog(server->Cedar, "LS_FARM_SERV_START", tmp, hostname);
  8526. // Inform the success
  8527. p = NewPack();
  8528. HttpServerSend(sock, p);
  8529. FreePack(p);
  8530. IPToStr32(tmp, sizeof(tmp), ip);
  8531. Debug("Farm Member %s Connected. IP: %s\n", hostname, tmp);
  8532. SetTimeout(sock, SERVER_CONTROL_TCP_TIMEOUT);
  8533. f = ZeroMalloc(sizeof(FARM_MEMBER));
  8534. f->Cedar = server->Cedar;
  8535. f->Ip = ip;
  8536. f->NumPort = num_port;
  8537. f->Ports = ports;
  8538. StrCpy(f->hostname, sizeof(f->hostname), hostname);
  8539. f->ServerCert = cert;
  8540. f->ConnectedTime = SystemTime64();
  8541. f->Weight = weight;
  8542. f->MaxSessions = max_sessions;
  8543. f->HubList = NewList(CompareHubList);
  8544. f->Point = point;
  8545. f->TaskQueue = NewQueue();
  8546. f->TaskPostEvent = NewEvent();
  8547. // Add to the list
  8548. LockList(server->FarmMemberList);
  8549. {
  8550. Add(server->FarmMemberList, f);
  8551. }
  8552. UnlockList(server->FarmMemberList);
  8553. // Main process
  8554. SiFarmServMain(server, sock, f);
  8555. // Remove from the list
  8556. LockList(server->FarmMemberList);
  8557. {
  8558. Delete(server->FarmMemberList, f);
  8559. }
  8560. UnlockList(server->FarmMemberList);
  8561. ReleaseQueue(f->TaskQueue);
  8562. ReleaseEvent(f->TaskPostEvent);
  8563. for (i = 0;i < LIST_NUM(f->HubList);i++)
  8564. {
  8565. HUB_LIST *hh = LIST_DATA(f->HubList, i);
  8566. Free(hh);
  8567. }
  8568. ReleaseList(f->HubList);
  8569. Free(f);
  8570. SLog(server->Cedar, "LS_FARM_SERV_END", hostname);
  8571. }
  8572. // Search in HUB list
  8573. int CompareHubList(void *p1, void *p2)
  8574. {
  8575. HUB_LIST *h1, *h2;
  8576. if (p1 == NULL || p2 == NULL)
  8577. {
  8578. return 0;
  8579. }
  8580. h1 = *(HUB_LIST **)p1;
  8581. h2 = *(HUB_LIST **)p2;
  8582. if (h1 == NULL || h2 == NULL)
  8583. {
  8584. return 0;
  8585. }
  8586. return StrCmpi(h1->Name, h2->Name);
  8587. }
  8588. // Connection thread to the controller
  8589. void SiConnectToControllerThread(THREAD *thread, void *param)
  8590. {
  8591. FARM_CONTROLLER *f;
  8592. SESSION *s;
  8593. CONNECTION *c;
  8594. SERVER *server;
  8595. bool first_failed;
  8596. // Validate arguments
  8597. if (thread == NULL || param == NULL)
  8598. {
  8599. return;
  8600. }
  8601. #ifdef OS_WIN32
  8602. MsSetThreadPriorityRealtime();
  8603. #endif // OS_WIN32
  8604. f = (FARM_CONTROLLER *)param;
  8605. f->Thread = thread;
  8606. AddRef(f->Thread->ref);
  8607. NoticeThreadInit(thread);
  8608. f->StartedTime = SystemTime64();
  8609. server = f->Server;
  8610. f->StartedTime = SystemTime64();
  8611. SLog(server->Cedar, "LS_FARM_CONNECT_1", server->ControllerName);
  8612. first_failed = true;
  8613. while (true)
  8614. {
  8615. // Attempt to connect
  8616. CLIENT_OPTION o;
  8617. f->LastError = ERR_TRYING_TO_CONNECT;
  8618. Zero(&o, sizeof(CLIENT_OPTION));
  8619. StrCpy(o.Hostname, sizeof(o.Hostname), server->ControllerName);
  8620. o.Port = server->ControllerPort;
  8621. f->NumTry++;
  8622. Debug("Try to Connect %s (Controller).\n", server->ControllerName);
  8623. s = NewRpcSessionEx(server->Cedar, &o, NULL, CEDAR_SERVER_FARM_STR);
  8624. if (s != NULL)
  8625. {
  8626. // Connection success: send the authentication data
  8627. PACK *p = NewPack();
  8628. UCHAR secure_password[SHA1_SIZE];
  8629. BUF *b;
  8630. c = s->Connection;
  8631. Lock(f->lock);
  8632. {
  8633. f->Sock = c->FirstSock;
  8634. AddRef(f->Sock->ref);
  8635. SetTimeout(f->Sock, SERVER_CONTROL_TCP_TIMEOUT);
  8636. }
  8637. Unlock(f->lock);
  8638. // Method
  8639. PackAddStr(p, "method", "farm_connect");
  8640. PackAddClientVersion(p, s->Connection);
  8641. // Password
  8642. SecurePassword(secure_password, server->MemberPassword, s->Connection->Random);
  8643. PackAddData(p, "SecurePassword", secure_password, sizeof(secure_password));
  8644. Lock(server->Cedar->lock);
  8645. {
  8646. b = XToBuf(server->Cedar->ServerX, false);
  8647. }
  8648. Unlock(server->Cedar->lock);
  8649. if (b != NULL)
  8650. {
  8651. char tmp[MAX_SIZE];
  8652. bool ret;
  8653. UINT i;
  8654. // Server certificate
  8655. PackAddBuf(p, "ServerCert", b);
  8656. FreeBuf(b);
  8657. // Maximum number of sessions
  8658. PackAddInt(p, "MaxSessions", GetServerCapsInt(server, "i_max_sessions"));
  8659. // Point
  8660. PackAddInt(p, "Point", SiGetPoint(server));
  8661. PackAddInt(p, "Weight", server->Weight);
  8662. // Host name
  8663. GetMachineName(tmp, sizeof(tmp));
  8664. PackAddStr(p, "HostName", tmp);
  8665. // Public IP
  8666. PackAddIp32(p, "PublicIp", server->PublicIp);
  8667. // Public port
  8668. for (i = 0;i < server->NumPublicPort;i++)
  8669. {
  8670. PackAddIntEx(p, "PublicPort", server->PublicPorts[i], i, server->NumPublicPort);
  8671. }
  8672. ret = HttpClientSend(c->FirstSock, p);
  8673. if (ret)
  8674. {
  8675. PACK *p;
  8676. UINT err = ERR_PROTOCOL_ERROR;
  8677. first_failed = true;
  8678. p = HttpClientRecv(c->FirstSock);
  8679. if (p != NULL && (err = GetErrorFromPack(p)) == 0)
  8680. {
  8681. // Successful connection
  8682. SLog(server->Cedar, "LS_FARM_START");
  8683. f->CurrentConnectedTime = SystemTime64();
  8684. if (f->FirstConnectedTime == 0)
  8685. {
  8686. f->FirstConnectedTime = SystemTime64();
  8687. }
  8688. f->NumConnected++;
  8689. Debug("Connect Succeed.\n");
  8690. f->Online = true;
  8691. // Main process
  8692. SiAcceptTasksFromController(f, c->FirstSock);
  8693. f->Online = false;
  8694. }
  8695. else
  8696. {
  8697. // Error
  8698. f->LastError = err;
  8699. SLog(server->Cedar, "LS_FARM_CONNECT_2", server->ControllerName,
  8700. GetUniErrorStr(err), err);
  8701. }
  8702. FreePack(p);
  8703. }
  8704. else
  8705. {
  8706. f->LastError = ERR_DISCONNECTED;
  8707. if (first_failed)
  8708. {
  8709. SLog(server->Cedar, "LS_FARM_CONNECT_3", server->ControllerName, RETRY_CONNECT_TO_CONTROLLER_INTERVAL / 1000);
  8710. first_failed = false;
  8711. }
  8712. }
  8713. }
  8714. FreePack(p);
  8715. // Disconnect
  8716. Lock(f->lock);
  8717. {
  8718. if (f->Sock != NULL)
  8719. {
  8720. ReleaseSock(f->Sock);
  8721. f->Sock = NULL;
  8722. }
  8723. }
  8724. Unlock(f->lock);
  8725. ReleaseSession(s);
  8726. s = NULL;
  8727. if (f->LastError == ERR_TRYING_TO_CONNECT)
  8728. {
  8729. f->LastError = ERR_DISCONNECTED;
  8730. }
  8731. }
  8732. else
  8733. {
  8734. // Connection failure
  8735. f->LastError = ERR_CONNECT_TO_FARM_CONTROLLER;
  8736. if (first_failed)
  8737. {
  8738. SLog(server->Cedar, "LS_FARM_CONNECT_3", server->ControllerName, RETRY_CONNECT_TO_CONTROLLER_INTERVAL / 1000);
  8739. first_failed = false;
  8740. }
  8741. }
  8742. Debug("Controller Disconnected. ERROR = %S\n", _E(f->LastError));
  8743. f->NumFailed = f->NumTry - f->NumConnected;
  8744. // Wait for event
  8745. Wait(f->HaltEvent, RETRY_CONNECT_TO_CONTROLLER_INTERVAL);
  8746. if (f->Halt)
  8747. {
  8748. // Halting flag
  8749. break;
  8750. }
  8751. }
  8752. SLog(server->Cedar, "LS_FARM_DISCONNECT");
  8753. }
  8754. // Disconnect the connection to the controller
  8755. void SiStopConnectToController(FARM_CONTROLLER *f)
  8756. {
  8757. // Validate arguments
  8758. if (f == NULL)
  8759. {
  8760. return;
  8761. }
  8762. f->Halt = true;
  8763. // Stop the connection
  8764. Lock(f->lock);
  8765. {
  8766. Disconnect(f->Sock);
  8767. }
  8768. Unlock(f->lock);
  8769. Set(f->HaltEvent);
  8770. // Wait for the thread termination
  8771. WaitThread(f->Thread, INFINITE);
  8772. ReleaseThread(f->Thread);
  8773. DeleteLock(f->lock);
  8774. ReleaseEvent(f->HaltEvent);
  8775. Free(f);
  8776. }
  8777. // Start a connection to the controller
  8778. FARM_CONTROLLER *SiStartConnectToController(SERVER *s)
  8779. {
  8780. FARM_CONTROLLER *f;
  8781. THREAD *t;
  8782. // Validate arguments
  8783. if (s == NULL)
  8784. {
  8785. return NULL;
  8786. }
  8787. f = ZeroMalloc(sizeof(FARM_CONTROLLER));
  8788. f->Server = s;
  8789. f->LastError = ERR_TRYING_TO_CONNECT;
  8790. f->HaltEvent = NewEvent();
  8791. f->lock = NewLock();
  8792. t = NewThread(SiConnectToControllerThread, f);
  8793. WaitThreadInit(t);
  8794. ReleaseThread(t);
  8795. return f;
  8796. }
  8797. // Get the current version
  8798. void SiGetCurrentRegion(CEDAR *c, char *region, UINT region_size)
  8799. {
  8800. ClearStr(region, region_size);
  8801. // Validate arguments
  8802. if (c == NULL || region == NULL)
  8803. {
  8804. return;
  8805. }
  8806. Lock(c->CurrentRegionLock);
  8807. {
  8808. StrCpy(region, region_size, c->CurrentRegion);
  8809. }
  8810. Unlock(c->CurrentRegionLock);
  8811. if (IsEmptyStr(region))
  8812. {
  8813. if (GetCurrentLangId() == SE_LANG_JAPANESE)
  8814. {
  8815. StrCpy(region, region_size, "JP");
  8816. }
  8817. else if (GetCurrentLangId() == SE_LANG_CHINESE_ZH)
  8818. {
  8819. StrCpy(region, region_size, "CN");
  8820. }
  8821. }
  8822. }
  8823. // Check the current region
  8824. bool SiCheckCurrentRegion(CEDAR *c, char *r)
  8825. {
  8826. char tmp[64];
  8827. // Validate arguments
  8828. if (c == NULL || r == NULL)
  8829. {
  8830. return false;
  8831. }
  8832. SiGetCurrentRegion(c, tmp, sizeof(tmp));
  8833. return (StrCmpi(r, tmp) == 0);
  8834. }
  8835. // Check whether some enterprise functions are restricted
  8836. //
  8837. // ** Hints by Daiyuu Nobori, written on March 19, 2014 **
  8838. //
  8839. // The following 'enterprise functions' are implemented on SoftEther VPN Server
  8840. // since March 19, 2014. However, these functions are disabled on
  8841. // SoftEther VPN Servers which run in Japan and China.
  8842. //
  8843. // - RADIUS / NT Domain user authentication
  8844. // - RSA certificate authentication
  8845. // - Deep-inspect packet logging
  8846. // - Source IP address control list
  8847. // - syslog transfer
  8848. //
  8849. // The SoftEther VPN Project intentionally disables these functions for users
  8850. // in Japan and China. The reason is: Daiyuu Nobori, the chief author of
  8851. // SoftEther VPN, has been liable to observe the existing agreements and
  8852. // restrictions between him and some companies. The agreements have regulated
  8853. // the region-limited restriction to implement and distribute the above
  8854. // enterprise functions on the SoftEther VPN open-source program.
  8855. //
  8856. // Therefore, the SoftEther VPN Project distributes the binary program and
  8857. // the source code with the "SiIsEnterpriseFunctionsRestrictedOnOpenSource"
  8858. // function. This function identifies whether the SoftEther VPN Server
  8859. // program is running in either Japan or China. If the restricted region is
  8860. // detected, then the above enterprise functions will be disabled.
  8861. //
  8862. // Please note that the above restriction has been imposed only on the
  8863. // original binaries and source codes from the SoftEther VPN Project.
  8864. // Anyone, except Daiyuu Nobori, who understands and writes the C language
  8865. // program can remove this restriction at his own risk.
  8866. //
  8867. bool SiIsEnterpriseFunctionsRestrictedOnOpenSource(CEDAR *c)
  8868. {
  8869. char region[128];
  8870. bool ret = false;
  8871. // Validate arguments
  8872. if (c == NULL)
  8873. {
  8874. return false;
  8875. }
  8876. SiGetCurrentRegion(c, region, sizeof(region));
  8877. if (StrCmpi(region, "JP") == 0 || StrCmpi(region, "CN") == 0)
  8878. {
  8879. ret = true;
  8880. }
  8881. return ret;
  8882. }
  8883. // Update the current region
  8884. void SiUpdateCurrentRegion(CEDAR *c, char *region, bool force_update)
  8885. {
  8886. bool changed = false;
  8887. // Validate arguments
  8888. if (c == NULL)
  8889. {
  8890. return;
  8891. }
  8892. if (IsEmptyStr(region) == false)
  8893. {
  8894. Lock(c->CurrentRegionLock);
  8895. {
  8896. if (StrCmpi(c->CurrentRegion, region) != 0)
  8897. {
  8898. StrCpy(c->CurrentRegion, sizeof(c->CurrentRegion), region);
  8899. changed = true;
  8900. }
  8901. }
  8902. Unlock(c->CurrentRegionLock);
  8903. }
  8904. if (force_update)
  8905. {
  8906. changed = true;
  8907. }
  8908. if (changed)
  8909. {
  8910. FlushServerCaps(c->Server);
  8911. }
  8912. }
  8913. // Create a server
  8914. SERVER *SiNewServer(bool bridge)
  8915. {
  8916. return SiNewServerEx(bridge, false);
  8917. }
  8918. SERVER *SiNewServerEx(bool bridge, bool in_client_inner_server)
  8919. {
  8920. SERVER *s;
  8921. LISTENER *inproc;
  8922. LISTENER *azure;
  8923. LISTENER *rudp;
  8924. s = ZeroMalloc(sizeof(SERVER));
  8925. SiInitHubCreateHistory(s);
  8926. InitServerCapsCache(s);
  8927. Rand(s->MyRandomKey, sizeof(s->MyRandomKey));
  8928. s->lock = NewLock();
  8929. s->OpenVpnSstpConfigLock = NewLock();
  8930. s->SaveCfgLock = NewLock();
  8931. s->ref = NewRef();
  8932. s->Cedar = NewCedar(NULL, NULL);
  8933. s->Cedar->Server = s;
  8934. #ifdef OS_WIN32
  8935. s->IsInVm = MsIsInVm();
  8936. #else // OS_WIN32
  8937. s->IsInVm = UnixIsInVm();
  8938. #endif // OS_WIN32
  8939. #ifdef ENABLE_AZURE_SERVER
  8940. if (IsFileExists("@azureserver.config"))
  8941. {
  8942. DisableRDUPServerGlobally();
  8943. s->AzureServer = NewAzureServer(s->Cedar);
  8944. SleepThread(500);
  8945. }
  8946. #endif // ENABLE_AZURE_SERVER
  8947. s->Cedar->CheckExpires = true;
  8948. s->ServerListenerList = NewList(CompareServerListener);
  8949. s->StartTime = SystemTime64();
  8950. s->Syslog = NewSysLog(NULL, 0);
  8951. s->SyslogLock = NewLock();
  8952. s->TasksFromFarmControllerLock = NewLock();
  8953. if (bridge)
  8954. {
  8955. SetCedarVpnBridge(s->Cedar);
  8956. }
  8957. #ifdef OS_WIN32
  8958. if (IsHamMode() == false)
  8959. {
  8960. RegistWindowsFirewallAll();
  8961. }
  8962. #endif
  8963. s->Keep = StartKeep();
  8964. // Log related
  8965. MakeDir(bridge == false ? SERVER_LOG_DIR_NAME : BRIDGE_LOG_DIR_NAME);
  8966. s->Logger = NewLog(bridge == false ? SERVER_LOG_DIR_NAME : BRIDGE_LOG_DIR_NAME, SERVER_LOG_PERFIX, LOG_SWITCH_DAY);
  8967. SLog(s->Cedar, "L_LINE");
  8968. SLog(s->Cedar, "LS_START_2", s->Cedar->ServerStr, s->Cedar->VerString);
  8969. SLog(s->Cedar, "LS_START_3", s->Cedar->BuildInfo);
  8970. SLog(s->Cedar, "LS_START_UTF8");
  8971. SLog(s->Cedar, "LS_START_1");
  8972. // Initialize the configuration
  8973. SiInitConfiguration(s);
  8974. if (s->DisableIntelAesAcceleration)
  8975. {
  8976. // Disable the Intel AES acceleration
  8977. DisableIntelAesAccel();
  8978. }
  8979. // Raise the priority
  8980. if (s->NoHighPriorityProcess == false)
  8981. {
  8982. OSSetHighPriority();
  8983. }
  8984. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  8985. {
  8986. // Start a connection to the controller
  8987. s->FarmController = SiStartConnectToController(s);
  8988. }
  8989. else if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  8990. {
  8991. FARM_MEMBER *f;
  8992. // Start operating as a controller
  8993. s->FarmMemberList = NewList(NULL);
  8994. f = ZeroMalloc(sizeof(FARM_MEMBER));
  8995. f->Cedar = s->Cedar;
  8996. GetMachineName(f->hostname, sizeof(f->hostname));
  8997. f->Me = true;
  8998. f->HubList = NewList(CompareHubList);
  8999. f->Weight = s->Weight;
  9000. s->Me = f;
  9001. Add(s->FarmMemberList, f);
  9002. SiStartFarmControl(s);
  9003. s->FarmControllerInited = true;
  9004. }
  9005. // Start a in-processlistener
  9006. inproc = NewListener(s->Cedar, LISTENER_INPROC, 0);
  9007. ReleaseListener(inproc);
  9008. // Start a listener for Azure
  9009. if (s->AzureClient != NULL)
  9010. {
  9011. azure = NewListener(s->Cedar, LISTENER_REVERSE, 0);
  9012. ReleaseListener(azure);
  9013. }
  9014. // Start a R-UDP listener
  9015. if (s->DisableNatTraversal == false && s->Cedar->Bridge == false)
  9016. {
  9017. rudp = NewListenerEx4(s->Cedar, LISTENER_RUDP, 0, TCPAcceptedThread, NULL, false, false,
  9018. &s->NatTGlobalUdpPort, RAND_PORT_ID_SERVER_LISTEN);
  9019. ReleaseListener(rudp);
  9020. }
  9021. // Start a VPN-over-ICMP listener
  9022. s->DynListenerIcmp = NewDynamicListener(s->Cedar, &s->EnableVpnOverIcmp, LISTENER_ICMP, 0);
  9023. // Start a VPN-over-DNS listener
  9024. s->DynListenerDns = NewDynamicListener(s->Cedar, &s->EnableVpnOverDns, LISTENER_DNS, 53);
  9025. SiInitDeadLockCheck(s);
  9026. SiUpdateCurrentRegion(s->Cedar, "", true);
  9027. return s;
  9028. }
  9029. // Developed by SoftEther VPN Project at University of Tsukuba in Japan.
  9030. // Department of Computer Science has dozens of overly-enthusiastic geeks.
  9031. // Join us: http://www.tsukuba.ac.jp/english/admission/