Admin.c 351 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047204820492050205120522053205420552056205720582059206020612062206320642065206620672068206920702071207220732074207520762077207820792080208120822083208420852086208720882089209020912092209320942095209620972098209921002101210221032104210521062107210821092110211121122113211421152116211721182119212021212122212321242125212621272128212921302131213221332134213521362137213821392140214121422143214421452146214721482149215021512152215321542155215621572158215921602161216221632164216521662167216821692170217121722173217421752176217721782179218021812182218321842185218621872188218921902191219221932194219521962197219821992200220122022203220422052206220722082209221022112212221322142215221622172218221922202221222222232224222522262227222822292230223122322233223422352236223722382239224022412242224322442245224622472248224922502251225222532254225522562257225822592260226122622263226422652266226722682269227022712272227322742275227622772278227922802281228222832284228522862287228822892290229122922293229422952296229722982299230023012302230323042305230623072308230923102311231223132314231523162317231823192320232123222323232423252326232723282329233023312332233323342335233623372338233923402341234223432344234523462347234823492350235123522353235423552356235723582359236023612362236323642365236623672368236923702371237223732374237523762377237823792380238123822383238423852386238723882389239023912392239323942395239623972398239924002401240224032404240524062407240824092410241124122413241424152416241724182419242024212422242324242425242624272428242924302431243224332434243524362437243824392440244124422443244424452446244724482449245024512452245324542455245624572458245924602461246224632464246524662467246824692470247124722473247424752476247724782479248024812482248324842485248624872488248924902491249224932494249524962497249824992500250125022503250425052506250725082509251025112512251325142515251625172518251925202521252225232524252525262527252825292530253125322533253425352536253725382539254025412542254325442545254625472548254925502551255225532554255525562557255825592560256125622563256425652566256725682569257025712572257325742575257625772578257925802581258225832584258525862587258825892590259125922593259425952596259725982599260026012602260326042605260626072608260926102611261226132614261526162617261826192620262126222623262426252626262726282629263026312632263326342635263626372638263926402641264226432644264526462647264826492650265126522653265426552656265726582659266026612662266326642665266626672668266926702671267226732674267526762677267826792680268126822683268426852686268726882689269026912692269326942695269626972698269927002701270227032704270527062707270827092710271127122713271427152716271727182719272027212722272327242725272627272728272927302731273227332734273527362737273827392740274127422743274427452746274727482749275027512752275327542755275627572758275927602761276227632764276527662767276827692770277127722773277427752776277727782779278027812782278327842785278627872788278927902791279227932794279527962797279827992800280128022803280428052806280728082809281028112812281328142815281628172818281928202821282228232824282528262827282828292830283128322833283428352836283728382839284028412842284328442845284628472848284928502851285228532854285528562857285828592860286128622863286428652866286728682869287028712872287328742875287628772878287928802881288228832884288528862887288828892890289128922893289428952896289728982899290029012902290329042905290629072908290929102911291229132914291529162917291829192920292129222923292429252926292729282929293029312932293329342935293629372938293929402941294229432944294529462947294829492950295129522953295429552956295729582959296029612962296329642965296629672968296929702971297229732974297529762977297829792980298129822983298429852986298729882989299029912992299329942995299629972998299930003001300230033004300530063007300830093010301130123013301430153016301730183019302030213022302330243025302630273028302930303031303230333034303530363037303830393040304130423043304430453046304730483049305030513052305330543055305630573058305930603061306230633064306530663067306830693070307130723073307430753076307730783079308030813082308330843085308630873088308930903091309230933094309530963097309830993100310131023103310431053106310731083109311031113112311331143115311631173118311931203121312231233124312531263127312831293130313131323133313431353136313731383139314031413142314331443145314631473148314931503151315231533154315531563157315831593160316131623163316431653166316731683169317031713172317331743175317631773178317931803181318231833184318531863187318831893190319131923193319431953196319731983199320032013202320332043205320632073208320932103211321232133214321532163217321832193220322132223223322432253226322732283229323032313232323332343235323632373238323932403241324232433244324532463247324832493250325132523253325432553256325732583259326032613262326332643265326632673268326932703271327232733274327532763277327832793280328132823283328432853286328732883289329032913292329332943295329632973298329933003301330233033304330533063307330833093310331133123313331433153316331733183319332033213322332333243325332633273328332933303331333233333334333533363337333833393340334133423343334433453346334733483349335033513352335333543355335633573358335933603361336233633364336533663367336833693370337133723373337433753376337733783379338033813382338333843385338633873388338933903391339233933394339533963397339833993400340134023403340434053406340734083409341034113412341334143415341634173418341934203421342234233424342534263427342834293430343134323433343434353436343734383439344034413442344334443445344634473448344934503451345234533454345534563457345834593460346134623463346434653466346734683469347034713472347334743475347634773478347934803481348234833484348534863487348834893490349134923493349434953496349734983499350035013502350335043505350635073508350935103511351235133514351535163517351835193520352135223523352435253526352735283529353035313532353335343535353635373538353935403541354235433544354535463547354835493550355135523553355435553556355735583559356035613562356335643565356635673568356935703571357235733574357535763577357835793580358135823583358435853586358735883589359035913592359335943595359635973598359936003601360236033604360536063607360836093610361136123613361436153616361736183619362036213622362336243625362636273628362936303631363236333634363536363637363836393640364136423643364436453646364736483649365036513652365336543655365636573658365936603661366236633664366536663667366836693670367136723673367436753676367736783679368036813682368336843685368636873688368936903691369236933694369536963697369836993700370137023703370437053706370737083709371037113712371337143715371637173718371937203721372237233724372537263727372837293730373137323733373437353736373737383739374037413742374337443745374637473748374937503751375237533754375537563757375837593760376137623763376437653766376737683769377037713772377337743775377637773778377937803781378237833784378537863787378837893790379137923793379437953796379737983799380038013802380338043805380638073808380938103811381238133814381538163817381838193820382138223823382438253826382738283829383038313832383338343835383638373838383938403841384238433844384538463847384838493850385138523853385438553856385738583859386038613862386338643865386638673868386938703871387238733874387538763877387838793880388138823883388438853886388738883889389038913892389338943895389638973898389939003901390239033904390539063907390839093910391139123913391439153916391739183919392039213922392339243925392639273928392939303931393239333934393539363937393839393940394139423943394439453946394739483949395039513952395339543955395639573958395939603961396239633964396539663967396839693970397139723973397439753976397739783979398039813982398339843985398639873988398939903991399239933994399539963997399839994000400140024003400440054006400740084009401040114012401340144015401640174018401940204021402240234024402540264027402840294030403140324033403440354036403740384039404040414042404340444045404640474048404940504051405240534054405540564057405840594060406140624063406440654066406740684069407040714072407340744075407640774078407940804081408240834084408540864087408840894090409140924093409440954096409740984099410041014102410341044105410641074108410941104111411241134114411541164117411841194120412141224123412441254126412741284129413041314132413341344135413641374138413941404141414241434144414541464147414841494150415141524153415441554156415741584159416041614162416341644165416641674168416941704171417241734174417541764177417841794180418141824183418441854186418741884189419041914192419341944195419641974198419942004201420242034204420542064207420842094210421142124213421442154216421742184219422042214222422342244225422642274228422942304231423242334234423542364237423842394240424142424243424442454246424742484249425042514252425342544255425642574258425942604261426242634264426542664267426842694270427142724273427442754276427742784279428042814282428342844285428642874288428942904291429242934294429542964297429842994300430143024303430443054306430743084309431043114312431343144315431643174318431943204321432243234324432543264327432843294330433143324333433443354336433743384339434043414342434343444345434643474348434943504351435243534354435543564357435843594360436143624363436443654366436743684369437043714372437343744375437643774378437943804381438243834384438543864387438843894390439143924393439443954396439743984399440044014402440344044405440644074408440944104411441244134414441544164417441844194420442144224423442444254426442744284429443044314432443344344435443644374438443944404441444244434444444544464447444844494450445144524453445444554456445744584459446044614462446344644465446644674468446944704471447244734474447544764477447844794480448144824483448444854486448744884489449044914492449344944495449644974498449945004501450245034504450545064507450845094510451145124513451445154516451745184519452045214522452345244525452645274528452945304531453245334534453545364537453845394540454145424543454445454546454745484549455045514552455345544555455645574558455945604561456245634564456545664567456845694570457145724573457445754576457745784579458045814582458345844585458645874588458945904591459245934594459545964597459845994600460146024603460446054606460746084609461046114612461346144615461646174618461946204621462246234624462546264627462846294630463146324633463446354636463746384639464046414642464346444645464646474648464946504651465246534654465546564657465846594660466146624663466446654666466746684669467046714672467346744675467646774678467946804681468246834684468546864687468846894690469146924693469446954696469746984699470047014702470347044705470647074708470947104711471247134714471547164717471847194720472147224723472447254726472747284729473047314732473347344735473647374738473947404741474247434744474547464747474847494750475147524753475447554756475747584759476047614762476347644765476647674768476947704771477247734774477547764777477847794780478147824783478447854786478747884789479047914792479347944795479647974798479948004801480248034804480548064807480848094810481148124813481448154816481748184819482048214822482348244825482648274828482948304831483248334834483548364837483848394840484148424843484448454846484748484849485048514852485348544855485648574858485948604861486248634864486548664867486848694870487148724873487448754876487748784879488048814882488348844885488648874888488948904891489248934894489548964897489848994900490149024903490449054906490749084909491049114912491349144915491649174918491949204921492249234924492549264927492849294930493149324933493449354936493749384939494049414942494349444945494649474948494949504951495249534954495549564957495849594960496149624963496449654966496749684969497049714972497349744975497649774978497949804981498249834984498549864987498849894990499149924993499449954996499749984999500050015002500350045005500650075008500950105011501250135014501550165017501850195020502150225023502450255026502750285029503050315032503350345035503650375038503950405041504250435044504550465047504850495050505150525053505450555056505750585059506050615062506350645065506650675068506950705071507250735074507550765077507850795080508150825083508450855086508750885089509050915092509350945095509650975098509951005101510251035104510551065107510851095110511151125113511451155116511751185119512051215122512351245125512651275128512951305131513251335134513551365137513851395140514151425143514451455146514751485149515051515152515351545155515651575158515951605161516251635164516551665167516851695170517151725173517451755176517751785179518051815182518351845185518651875188518951905191519251935194519551965197519851995200520152025203520452055206520752085209521052115212521352145215521652175218521952205221522252235224522552265227522852295230523152325233523452355236523752385239524052415242524352445245524652475248524952505251525252535254525552565257525852595260526152625263526452655266526752685269527052715272527352745275527652775278527952805281528252835284528552865287528852895290529152925293529452955296529752985299530053015302530353045305530653075308530953105311531253135314531553165317531853195320532153225323532453255326532753285329533053315332533353345335533653375338533953405341534253435344534553465347534853495350535153525353535453555356535753585359536053615362536353645365536653675368536953705371537253735374537553765377537853795380538153825383538453855386538753885389539053915392539353945395539653975398539954005401540254035404540554065407540854095410541154125413541454155416541754185419542054215422542354245425542654275428542954305431543254335434543554365437543854395440544154425443544454455446544754485449545054515452545354545455545654575458545954605461546254635464546554665467546854695470547154725473547454755476547754785479548054815482548354845485548654875488548954905491549254935494549554965497549854995500550155025503550455055506550755085509551055115512551355145515551655175518551955205521552255235524552555265527552855295530553155325533553455355536553755385539554055415542554355445545554655475548554955505551555255535554555555565557555855595560556155625563556455655566556755685569557055715572557355745575557655775578557955805581558255835584558555865587558855895590559155925593559455955596559755985599560056015602560356045605560656075608560956105611561256135614561556165617561856195620562156225623562456255626562756285629563056315632563356345635563656375638563956405641564256435644564556465647564856495650565156525653565456555656565756585659566056615662566356645665566656675668566956705671567256735674567556765677567856795680568156825683568456855686568756885689569056915692569356945695569656975698569957005701570257035704570557065707570857095710571157125713571457155716571757185719572057215722572357245725572657275728572957305731573257335734573557365737573857395740574157425743574457455746574757485749575057515752575357545755575657575758575957605761576257635764576557665767576857695770577157725773577457755776577757785779578057815782578357845785578657875788578957905791579257935794579557965797579857995800580158025803580458055806580758085809581058115812581358145815581658175818581958205821582258235824582558265827582858295830583158325833583458355836583758385839584058415842584358445845584658475848584958505851585258535854585558565857585858595860586158625863586458655866586758685869587058715872587358745875587658775878587958805881588258835884588558865887588858895890589158925893589458955896589758985899590059015902590359045905590659075908590959105911591259135914591559165917591859195920592159225923592459255926592759285929593059315932593359345935593659375938593959405941594259435944594559465947594859495950595159525953595459555956595759585959596059615962596359645965596659675968596959705971597259735974597559765977597859795980598159825983598459855986598759885989599059915992599359945995599659975998599960006001600260036004600560066007600860096010601160126013601460156016601760186019602060216022602360246025602660276028602960306031603260336034603560366037603860396040604160426043604460456046604760486049605060516052605360546055605660576058605960606061606260636064606560666067606860696070607160726073607460756076607760786079608060816082608360846085608660876088608960906091609260936094609560966097609860996100610161026103610461056106610761086109611061116112611361146115611661176118611961206121612261236124612561266127612861296130613161326133613461356136613761386139614061416142614361446145614661476148614961506151615261536154615561566157615861596160616161626163616461656166616761686169617061716172617361746175617661776178617961806181618261836184618561866187618861896190619161926193619461956196619761986199620062016202620362046205620662076208620962106211621262136214621562166217621862196220622162226223622462256226622762286229623062316232623362346235623662376238623962406241624262436244624562466247624862496250625162526253625462556256625762586259626062616262626362646265626662676268626962706271627262736274627562766277627862796280628162826283628462856286628762886289629062916292629362946295629662976298629963006301630263036304630563066307630863096310631163126313631463156316631763186319632063216322632363246325632663276328632963306331633263336334633563366337633863396340634163426343634463456346634763486349635063516352635363546355635663576358635963606361636263636364636563666367636863696370637163726373637463756376637763786379638063816382638363846385638663876388638963906391639263936394639563966397639863996400640164026403640464056406640764086409641064116412641364146415641664176418641964206421642264236424642564266427642864296430643164326433643464356436643764386439644064416442644364446445644664476448644964506451645264536454645564566457645864596460646164626463646464656466646764686469647064716472647364746475647664776478647964806481648264836484648564866487648864896490649164926493649464956496649764986499650065016502650365046505650665076508650965106511651265136514651565166517651865196520652165226523652465256526652765286529653065316532653365346535653665376538653965406541654265436544654565466547654865496550655165526553655465556556655765586559656065616562656365646565656665676568656965706571657265736574657565766577657865796580658165826583658465856586658765886589659065916592659365946595659665976598659966006601660266036604660566066607660866096610661166126613661466156616661766186619662066216622662366246625662666276628662966306631663266336634663566366637663866396640664166426643664466456646664766486649665066516652665366546655665666576658665966606661666266636664666566666667666866696670667166726673667466756676667766786679668066816682668366846685668666876688668966906691669266936694669566966697669866996700670167026703670467056706670767086709671067116712671367146715671667176718671967206721672267236724672567266727672867296730673167326733673467356736673767386739674067416742674367446745674667476748674967506751675267536754675567566757675867596760676167626763676467656766676767686769677067716772677367746775677667776778677967806781678267836784678567866787678867896790679167926793679467956796679767986799680068016802680368046805680668076808680968106811681268136814681568166817681868196820682168226823682468256826682768286829683068316832683368346835683668376838683968406841684268436844684568466847684868496850685168526853685468556856685768586859686068616862686368646865686668676868686968706871687268736874687568766877687868796880688168826883688468856886688768886889689068916892689368946895689668976898689969006901690269036904690569066907690869096910691169126913691469156916691769186919692069216922692369246925692669276928692969306931693269336934693569366937693869396940694169426943694469456946694769486949695069516952695369546955695669576958695969606961696269636964696569666967696869696970697169726973697469756976697769786979698069816982698369846985698669876988698969906991699269936994699569966997699869997000700170027003700470057006700770087009701070117012701370147015701670177018701970207021702270237024702570267027702870297030703170327033703470357036703770387039704070417042704370447045704670477048704970507051705270537054705570567057705870597060706170627063706470657066706770687069707070717072707370747075707670777078707970807081708270837084708570867087708870897090709170927093709470957096709770987099710071017102710371047105710671077108710971107111711271137114711571167117711871197120712171227123712471257126712771287129713071317132713371347135713671377138713971407141714271437144714571467147714871497150715171527153715471557156715771587159716071617162716371647165716671677168716971707171717271737174717571767177717871797180718171827183718471857186718771887189719071917192719371947195719671977198719972007201720272037204720572067207720872097210721172127213721472157216721772187219722072217222722372247225722672277228722972307231723272337234723572367237723872397240724172427243724472457246724772487249725072517252725372547255725672577258725972607261726272637264726572667267726872697270727172727273727472757276727772787279728072817282728372847285728672877288728972907291729272937294729572967297729872997300730173027303730473057306730773087309731073117312731373147315731673177318731973207321732273237324732573267327732873297330733173327333733473357336733773387339734073417342734373447345734673477348734973507351735273537354735573567357735873597360736173627363736473657366736773687369737073717372737373747375737673777378737973807381738273837384738573867387738873897390739173927393739473957396739773987399740074017402740374047405740674077408740974107411741274137414741574167417741874197420742174227423742474257426742774287429743074317432743374347435743674377438743974407441744274437444744574467447744874497450745174527453745474557456745774587459746074617462746374647465746674677468746974707471747274737474747574767477747874797480748174827483748474857486748774887489749074917492749374947495749674977498749975007501750275037504750575067507750875097510751175127513751475157516751775187519752075217522752375247525752675277528752975307531753275337534753575367537753875397540754175427543754475457546754775487549755075517552755375547555755675577558755975607561756275637564756575667567756875697570757175727573757475757576757775787579758075817582758375847585758675877588758975907591759275937594759575967597759875997600760176027603760476057606760776087609761076117612761376147615761676177618761976207621762276237624762576267627762876297630763176327633763476357636763776387639764076417642764376447645764676477648764976507651765276537654765576567657765876597660766176627663766476657666766776687669767076717672767376747675767676777678767976807681768276837684768576867687768876897690769176927693769476957696769776987699770077017702770377047705770677077708770977107711771277137714771577167717771877197720772177227723772477257726772777287729773077317732773377347735773677377738773977407741774277437744774577467747774877497750775177527753775477557756775777587759776077617762776377647765776677677768776977707771777277737774777577767777777877797780778177827783778477857786778777887789779077917792779377947795779677977798779978007801780278037804780578067807780878097810781178127813781478157816781778187819782078217822782378247825782678277828782978307831783278337834783578367837783878397840784178427843784478457846784778487849785078517852785378547855785678577858785978607861786278637864786578667867786878697870787178727873787478757876787778787879788078817882788378847885788678877888788978907891789278937894789578967897789878997900790179027903790479057906790779087909791079117912791379147915791679177918791979207921792279237924792579267927792879297930793179327933793479357936793779387939794079417942794379447945794679477948794979507951795279537954795579567957795879597960796179627963796479657966796779687969797079717972797379747975797679777978797979807981798279837984798579867987798879897990799179927993799479957996799779987999800080018002800380048005800680078008800980108011801280138014801580168017801880198020802180228023802480258026802780288029803080318032803380348035803680378038803980408041804280438044804580468047804880498050805180528053805480558056805780588059806080618062806380648065806680678068806980708071807280738074807580768077807880798080808180828083808480858086808780888089809080918092809380948095809680978098809981008101810281038104810581068107810881098110811181128113811481158116811781188119812081218122812381248125812681278128812981308131813281338134813581368137813881398140814181428143814481458146814781488149815081518152815381548155815681578158815981608161816281638164816581668167816881698170817181728173817481758176817781788179818081818182818381848185818681878188818981908191819281938194819581968197819881998200820182028203820482058206820782088209821082118212821382148215821682178218821982208221822282238224822582268227822882298230823182328233823482358236823782388239824082418242824382448245824682478248824982508251825282538254825582568257825882598260826182628263826482658266826782688269827082718272827382748275827682778278827982808281828282838284828582868287828882898290829182928293829482958296829782988299830083018302830383048305830683078308830983108311831283138314831583168317831883198320832183228323832483258326832783288329833083318332833383348335833683378338833983408341834283438344834583468347834883498350835183528353835483558356835783588359836083618362836383648365836683678368836983708371837283738374837583768377837883798380838183828383838483858386838783888389839083918392839383948395839683978398839984008401840284038404840584068407840884098410841184128413841484158416841784188419842084218422842384248425842684278428842984308431843284338434843584368437843884398440844184428443844484458446844784488449845084518452845384548455845684578458845984608461846284638464846584668467846884698470847184728473847484758476847784788479848084818482848384848485848684878488848984908491849284938494849584968497849884998500850185028503850485058506850785088509851085118512851385148515851685178518851985208521852285238524852585268527852885298530853185328533853485358536853785388539854085418542854385448545854685478548854985508551855285538554855585568557855885598560856185628563856485658566856785688569857085718572857385748575857685778578857985808581858285838584858585868587858885898590859185928593859485958596859785988599860086018602860386048605860686078608860986108611861286138614861586168617861886198620862186228623862486258626862786288629863086318632863386348635863686378638863986408641864286438644864586468647864886498650865186528653865486558656865786588659866086618662866386648665866686678668866986708671867286738674867586768677867886798680868186828683868486858686868786888689869086918692869386948695869686978698869987008701870287038704870587068707870887098710871187128713871487158716871787188719872087218722872387248725872687278728872987308731873287338734873587368737873887398740874187428743874487458746874787488749875087518752875387548755875687578758875987608761876287638764876587668767876887698770877187728773877487758776877787788779878087818782878387848785878687878788878987908791879287938794879587968797879887998800880188028803880488058806880788088809881088118812881388148815881688178818881988208821882288238824882588268827882888298830883188328833883488358836883788388839884088418842884388448845884688478848884988508851885288538854885588568857885888598860886188628863886488658866886788688869887088718872887388748875887688778878887988808881888288838884888588868887888888898890889188928893889488958896889788988899890089018902890389048905890689078908890989108911891289138914891589168917891889198920892189228923892489258926892789288929893089318932893389348935893689378938893989408941894289438944894589468947894889498950895189528953895489558956895789588959896089618962896389648965896689678968896989708971897289738974897589768977897889798980898189828983898489858986898789888989899089918992899389948995899689978998899990009001900290039004900590069007900890099010901190129013901490159016901790189019902090219022902390249025902690279028902990309031903290339034903590369037903890399040904190429043904490459046904790489049905090519052905390549055905690579058905990609061906290639064906590669067906890699070907190729073907490759076907790789079908090819082908390849085908690879088908990909091909290939094909590969097909890999100910191029103910491059106910791089109911091119112911391149115911691179118911991209121912291239124912591269127912891299130913191329133913491359136913791389139914091419142914391449145914691479148914991509151915291539154915591569157915891599160916191629163916491659166916791689169917091719172917391749175917691779178917991809181918291839184918591869187918891899190919191929193919491959196919791989199920092019202920392049205920692079208920992109211921292139214921592169217921892199220922192229223922492259226922792289229923092319232923392349235923692379238923992409241924292439244924592469247924892499250925192529253925492559256925792589259926092619262926392649265926692679268926992709271927292739274927592769277927892799280928192829283928492859286928792889289929092919292929392949295929692979298929993009301930293039304930593069307930893099310931193129313931493159316931793189319932093219322932393249325932693279328932993309331933293339334933593369337933893399340934193429343934493459346934793489349935093519352935393549355935693579358935993609361936293639364936593669367936893699370937193729373937493759376937793789379938093819382938393849385938693879388938993909391939293939394939593969397939893999400940194029403940494059406940794089409941094119412941394149415941694179418941994209421942294239424942594269427942894299430943194329433943494359436943794389439944094419442944394449445944694479448944994509451945294539454945594569457945894599460946194629463946494659466946794689469947094719472947394749475947694779478947994809481948294839484948594869487948894899490949194929493949494959496949794989499950095019502950395049505950695079508950995109511951295139514951595169517951895199520952195229523952495259526952795289529953095319532953395349535953695379538953995409541954295439544954595469547954895499550955195529553955495559556955795589559956095619562956395649565956695679568956995709571957295739574957595769577957895799580958195829583958495859586958795889589959095919592959395949595959695979598959996009601960296039604960596069607960896099610961196129613961496159616961796189619962096219622962396249625962696279628962996309631963296339634963596369637963896399640964196429643964496459646964796489649965096519652965396549655965696579658965996609661966296639664966596669667966896699670967196729673967496759676967796789679968096819682968396849685968696879688968996909691969296939694969596969697969896999700970197029703970497059706970797089709971097119712971397149715971697179718971997209721972297239724972597269727972897299730973197329733973497359736973797389739974097419742974397449745974697479748974997509751975297539754975597569757975897599760976197629763976497659766976797689769977097719772977397749775977697779778977997809781978297839784978597869787978897899790979197929793979497959796979797989799980098019802980398049805980698079808980998109811981298139814981598169817981898199820982198229823982498259826982798289829983098319832983398349835983698379838983998409841984298439844984598469847984898499850985198529853985498559856985798589859986098619862986398649865986698679868986998709871987298739874987598769877987898799880988198829883988498859886988798889889989098919892989398949895989698979898989999009901990299039904990599069907990899099910991199129913991499159916991799189919992099219922992399249925992699279928992999309931993299339934993599369937993899399940994199429943994499459946994799489949995099519952995399549955995699579958995999609961996299639964996599669967996899699970997199729973997499759976997799789979998099819982998399849985998699879988998999909991999299939994999599969997999899991000010001100021000310004100051000610007100081000910010100111001210013100141001510016100171001810019100201002110022100231002410025100261002710028100291003010031100321003310034100351003610037100381003910040100411004210043100441004510046100471004810049100501005110052100531005410055100561005710058100591006010061100621006310064100651006610067100681006910070100711007210073100741007510076100771007810079100801008110082100831008410085100861008710088100891009010091100921009310094100951009610097100981009910100101011010210103101041010510106101071010810109101101011110112101131011410115101161011710118101191012010121101221012310124101251012610127101281012910130101311013210133101341013510136101371013810139101401014110142101431014410145101461014710148101491015010151101521015310154101551015610157101581015910160101611016210163101641016510166101671016810169101701017110172101731017410175101761017710178101791018010181101821018310184101851018610187101881018910190101911019210193101941019510196101971019810199102001020110202102031020410205102061020710208102091021010211102121021310214102151021610217102181021910220102211022210223102241022510226102271022810229102301023110232102331023410235102361023710238102391024010241102421024310244102451024610247102481024910250102511025210253102541025510256102571025810259102601026110262102631026410265102661026710268102691027010271102721027310274102751027610277102781027910280102811028210283102841028510286102871028810289102901029110292102931029410295102961029710298102991030010301103021030310304103051030610307103081030910310103111031210313103141031510316103171031810319103201032110322103231032410325103261032710328103291033010331103321033310334103351033610337103381033910340103411034210343103441034510346103471034810349103501035110352103531035410355103561035710358103591036010361103621036310364103651036610367103681036910370103711037210373103741037510376103771037810379103801038110382103831038410385103861038710388103891039010391103921039310394103951039610397103981039910400104011040210403104041040510406104071040810409104101041110412104131041410415104161041710418104191042010421104221042310424104251042610427104281042910430104311043210433104341043510436104371043810439104401044110442104431044410445104461044710448104491045010451104521045310454104551045610457104581045910460104611046210463104641046510466104671046810469104701047110472104731047410475104761047710478104791048010481104821048310484104851048610487104881048910490104911049210493104941049510496104971049810499105001050110502105031050410505105061050710508105091051010511105121051310514105151051610517105181051910520105211052210523105241052510526105271052810529105301053110532105331053410535105361053710538105391054010541105421054310544105451054610547105481054910550105511055210553105541055510556105571055810559105601056110562105631056410565105661056710568105691057010571105721057310574105751057610577105781057910580105811058210583105841058510586105871058810589105901059110592105931059410595105961059710598105991060010601106021060310604106051060610607106081060910610106111061210613106141061510616106171061810619106201062110622106231062410625106261062710628106291063010631106321063310634106351063610637106381063910640106411064210643106441064510646106471064810649106501065110652106531065410655106561065710658106591066010661106621066310664106651066610667106681066910670106711067210673106741067510676106771067810679106801068110682106831068410685106861068710688106891069010691106921069310694106951069610697106981069910700107011070210703107041070510706107071070810709107101071110712107131071410715107161071710718107191072010721107221072310724107251072610727107281072910730107311073210733107341073510736107371073810739107401074110742107431074410745107461074710748107491075010751107521075310754107551075610757107581075910760107611076210763107641076510766107671076810769107701077110772107731077410775107761077710778107791078010781107821078310784107851078610787107881078910790107911079210793107941079510796107971079810799108001080110802108031080410805108061080710808108091081010811108121081310814108151081610817108181081910820108211082210823108241082510826108271082810829108301083110832108331083410835108361083710838108391084010841108421084310844108451084610847108481084910850108511085210853108541085510856108571085810859108601086110862108631086410865108661086710868108691087010871108721087310874108751087610877108781087910880108811088210883108841088510886108871088810889108901089110892108931089410895108961089710898108991090010901109021090310904109051090610907109081090910910109111091210913109141091510916109171091810919109201092110922109231092410925109261092710928109291093010931109321093310934109351093610937109381093910940109411094210943109441094510946109471094810949109501095110952109531095410955109561095710958109591096010961109621096310964109651096610967109681096910970109711097210973109741097510976109771097810979109801098110982109831098410985109861098710988109891099010991109921099310994109951099610997109981099911000110011100211003110041100511006110071100811009110101101111012110131101411015110161101711018110191102011021110221102311024110251102611027110281102911030110311103211033110341103511036110371103811039110401104111042110431104411045110461104711048110491105011051110521105311054110551105611057110581105911060110611106211063110641106511066110671106811069110701107111072110731107411075110761107711078110791108011081110821108311084110851108611087110881108911090110911109211093110941109511096110971109811099111001110111102111031110411105111061110711108111091111011111111121111311114111151111611117111181111911120111211112211123111241112511126111271112811129111301113111132111331113411135111361113711138111391114011141111421114311144111451114611147111481114911150111511115211153111541115511156111571115811159111601116111162111631116411165111661116711168111691117011171111721117311174111751117611177111781117911180111811118211183111841118511186111871118811189111901119111192111931119411195111961119711198111991120011201112021120311204112051120611207112081120911210112111121211213112141121511216112171121811219112201122111222112231122411225112261122711228112291123011231112321123311234112351123611237112381123911240112411124211243112441124511246112471124811249112501125111252112531125411255112561125711258112591126011261112621126311264112651126611267112681126911270112711127211273112741127511276112771127811279112801128111282112831128411285112861128711288112891129011291112921129311294112951129611297112981129911300113011130211303113041130511306113071130811309113101131111312113131131411315113161131711318113191132011321113221132311324113251132611327113281132911330113311133211333113341133511336113371133811339113401134111342113431134411345113461134711348113491135011351113521135311354113551135611357113581135911360113611136211363113641136511366113671136811369113701137111372113731137411375113761137711378113791138011381113821138311384113851138611387113881138911390113911139211393113941139511396113971139811399114001140111402114031140411405114061140711408114091141011411114121141311414114151141611417114181141911420114211142211423114241142511426114271142811429114301143111432114331143411435114361143711438114391144011441114421144311444114451144611447114481144911450114511145211453114541145511456114571145811459114601146111462114631146411465114661146711468114691147011471114721147311474114751147611477114781147911480114811148211483114841148511486114871148811489114901149111492114931149411495114961149711498114991150011501115021150311504115051150611507115081150911510115111151211513115141151511516115171151811519115201152111522115231152411525115261152711528115291153011531115321153311534115351153611537115381153911540115411154211543115441154511546115471154811549115501155111552115531155411555115561155711558115591156011561115621156311564115651156611567115681156911570115711157211573115741157511576115771157811579115801158111582115831158411585115861158711588115891159011591115921159311594115951159611597115981159911600116011160211603116041160511606116071160811609116101161111612116131161411615116161161711618116191162011621116221162311624116251162611627116281162911630116311163211633116341163511636116371163811639116401164111642116431164411645116461164711648116491165011651116521165311654116551165611657116581165911660116611166211663116641166511666116671166811669116701167111672116731167411675116761167711678116791168011681116821168311684116851168611687116881168911690116911169211693116941169511696116971169811699117001170111702117031170411705117061170711708117091171011711117121171311714117151171611717117181171911720117211172211723117241172511726117271172811729117301173111732117331173411735117361173711738117391174011741117421174311744117451174611747117481174911750117511175211753117541175511756117571175811759117601176111762117631176411765117661176711768117691177011771117721177311774117751177611777117781177911780117811178211783117841178511786117871178811789117901179111792117931179411795117961179711798117991180011801118021180311804118051180611807118081180911810118111181211813118141181511816118171181811819118201182111822118231182411825118261182711828118291183011831118321183311834118351183611837118381183911840118411184211843118441184511846118471184811849118501185111852118531185411855118561185711858118591186011861118621186311864118651186611867118681186911870118711187211873118741187511876118771187811879118801188111882118831188411885118861188711888118891189011891118921189311894118951189611897118981189911900119011190211903119041190511906119071190811909119101191111912119131191411915119161191711918119191192011921119221192311924119251192611927119281192911930119311193211933119341193511936119371193811939119401194111942119431194411945119461194711948119491195011951119521195311954119551195611957119581195911960119611196211963119641196511966119671196811969119701197111972119731197411975119761197711978119791198011981119821198311984119851198611987119881198911990119911199211993119941199511996119971199811999120001200112002120031200412005120061200712008120091201012011120121201312014120151201612017120181201912020120211202212023120241202512026120271202812029120301203112032120331203412035120361203712038120391204012041120421204312044120451204612047120481204912050120511205212053120541205512056120571205812059120601206112062120631206412065120661206712068120691207012071120721207312074120751207612077120781207912080120811208212083120841208512086120871208812089120901209112092120931209412095120961209712098120991210012101121021210312104121051210612107121081210912110121111211212113121141211512116121171211812119121201212112122121231212412125121261212712128121291213012131121321213312134121351213612137121381213912140121411214212143121441214512146121471214812149121501215112152121531215412155121561215712158121591216012161121621216312164121651216612167121681216912170121711217212173121741217512176121771217812179121801218112182121831218412185121861218712188121891219012191121921219312194121951219612197121981219912200122011220212203122041220512206122071220812209122101221112212122131221412215122161221712218122191222012221122221222312224122251222612227122281222912230122311223212233122341223512236122371223812239122401224112242122431224412245122461224712248122491225012251122521225312254122551225612257122581225912260122611226212263122641226512266122671226812269122701227112272122731227412275122761227712278122791228012281122821228312284122851228612287122881228912290122911229212293122941229512296122971229812299123001230112302123031230412305123061230712308123091231012311123121231312314123151231612317123181231912320123211232212323123241232512326123271232812329123301233112332123331233412335123361233712338123391234012341123421234312344123451234612347123481234912350123511235212353123541235512356123571235812359123601236112362123631236412365123661236712368123691237012371123721237312374123751237612377123781237912380123811238212383123841238512386123871238812389123901239112392123931239412395123961239712398123991240012401124021240312404124051240612407124081240912410124111241212413124141241512416124171241812419124201242112422124231242412425124261242712428124291243012431124321243312434124351243612437124381243912440124411244212443124441244512446124471244812449124501245112452124531245412455124561245712458124591246012461124621246312464124651246612467124681246912470124711247212473124741247512476124771247812479124801248112482124831248412485124861248712488124891249012491124921249312494124951249612497124981249912500125011250212503125041250512506125071250812509125101251112512125131251412515125161251712518125191252012521125221252312524125251252612527125281252912530125311253212533125341253512536125371253812539125401254112542125431254412545125461254712548125491255012551125521255312554125551255612557125581255912560125611256212563125641256512566125671256812569125701257112572125731257412575125761257712578125791258012581125821258312584125851258612587125881258912590125911259212593125941259512596125971259812599126001260112602126031260412605126061260712608126091261012611126121261312614126151261612617126181261912620126211262212623126241262512626126271262812629126301263112632126331263412635126361263712638126391264012641126421264312644126451264612647126481264912650126511265212653126541265512656126571265812659126601266112662126631266412665126661266712668126691267012671126721267312674126751267612677126781267912680126811268212683126841268512686126871268812689126901269112692126931269412695126961269712698126991270012701127021270312704127051270612707127081270912710127111271212713127141271512716127171271812719127201272112722127231272412725127261272712728127291273012731127321273312734127351273612737127381273912740127411274212743127441274512746127471274812749127501275112752127531275412755127561275712758127591276012761127621276312764127651276612767127681276912770127711277212773127741277512776127771277812779127801278112782127831278412785127861278712788127891279012791127921279312794127951279612797127981279912800128011280212803128041280512806128071280812809128101281112812128131281412815128161281712818128191282012821128221282312824128251282612827128281282912830128311283212833128341283512836128371283812839128401284112842128431284412845128461284712848128491285012851128521285312854128551285612857128581285912860128611286212863128641286512866128671286812869128701287112872128731287412875128761287712878128791288012881128821288312884128851288612887128881288912890128911289212893128941289512896128971289812899129001290112902129031290412905129061290712908129091291012911129121291312914129151291612917129181291912920129211292212923129241292512926129271292812929129301293112932129331293412935129361293712938129391294012941129421294312944129451294612947129481294912950129511295212953129541295512956129571295812959129601296112962129631296412965129661296712968129691297012971129721297312974129751297612977129781297912980129811298212983129841298512986129871298812989129901299112992129931299412995129961299712998129991300013001130021300313004130051300613007130081300913010130111301213013130141301513016130171301813019130201302113022130231302413025130261302713028130291303013031130321303313034130351303613037130381303913040130411304213043130441304513046130471304813049130501305113052130531305413055130561305713058130591306013061130621306313064130651306613067130681306913070130711307213073130741307513076130771307813079130801308113082130831308413085130861308713088130891309013091130921309313094130951309613097130981309913100131011310213103131041310513106131071310813109131101311113112131131311413115131161311713118131191312013121131221312313124131251312613127131281312913130131311313213133131341313513136131371313813139131401314113142131431314413145131461314713148131491315013151131521315313154131551315613157131581315913160131611316213163131641316513166131671316813169131701317113172131731317413175131761317713178131791318013181131821318313184131851318613187131881318913190131911319213193131941319513196131971319813199132001320113202132031320413205132061320713208132091321013211132121321313214132151321613217132181321913220132211322213223132241322513226132271322813229132301323113232132331323413235132361323713238132391324013241132421324313244132451324613247132481324913250132511325213253132541325513256132571325813259132601326113262132631326413265132661326713268132691327013271132721327313274132751327613277132781327913280132811328213283132841328513286132871328813289132901329113292132931329413295132961329713298132991330013301133021330313304133051330613307133081330913310133111331213313133141331513316133171331813319133201332113322133231332413325133261332713328133291333013331133321333313334133351333613337133381333913340133411334213343133441334513346133471334813349133501335113352133531335413355133561335713358133591336013361133621336313364133651336613367133681336913370133711337213373133741337513376133771337813379133801338113382133831338413385133861338713388133891339013391133921339313394133951339613397133981339913400134011340213403134041340513406134071340813409134101341113412134131341413415134161341713418134191342013421134221342313424134251342613427134281342913430134311343213433134341343513436134371343813439134401344113442134431344413445134461344713448134491345013451134521345313454134551345613457134581345913460134611346213463134641346513466134671346813469134701347113472134731347413475134761347713478134791348013481134821348313484134851348613487134881348913490134911349213493134941349513496134971349813499135001350113502135031350413505135061350713508135091351013511135121351313514135151351613517135181351913520135211352213523135241352513526135271352813529135301353113532135331353413535135361353713538135391354013541135421354313544135451354613547135481354913550135511355213553135541355513556135571355813559135601356113562135631356413565135661356713568135691357013571135721357313574135751357613577135781357913580135811358213583135841358513586135871358813589135901359113592135931359413595135961359713598135991360013601136021360313604136051360613607136081360913610136111361213613136141361513616136171361813619136201362113622136231362413625136261362713628136291363013631136321363313634136351363613637136381363913640136411364213643136441364513646136471364813649136501365113652136531365413655136561365713658136591366013661136621366313664136651366613667136681366913670136711367213673136741367513676136771367813679136801368113682136831368413685136861368713688136891369013691136921369313694136951369613697136981369913700137011370213703137041370513706137071370813709137101371113712137131371413715137161371713718137191372013721137221372313724137251372613727137281372913730137311373213733137341373513736137371373813739137401374113742137431374413745137461374713748137491375013751137521375313754137551375613757137581375913760137611376213763137641376513766137671376813769137701377113772137731377413775137761377713778137791378013781137821378313784137851378613787137881378913790137911379213793137941379513796137971379813799138001380113802138031380413805138061380713808138091381013811138121381313814138151381613817138181381913820138211382213823138241382513826138271382813829138301383113832138331383413835138361383713838138391384013841138421384313844138451384613847138481384913850138511385213853138541385513856138571385813859138601386113862138631386413865138661386713868138691387013871138721387313874138751387613877138781387913880138811388213883138841388513886138871388813889138901389113892138931389413895138961389713898138991390013901139021390313904139051390613907139081390913910139111391213913139141391513916139171391813919139201392113922139231392413925139261392713928139291393013931139321393313934139351393613937139381393913940139411394213943139441394513946139471394813949139501395113952139531395413955139561395713958139591396013961139621396313964139651396613967139681396913970139711397213973139741397513976139771397813979139801398113982139831398413985139861398713988139891399013991139921399313994139951399613997139981399914000140011400214003140041400514006140071400814009140101401114012140131401414015140161401714018140191402014021140221402314024140251402614027140281402914030140311403214033140341403514036140371403814039140401404114042140431404414045140461404714048140491405014051140521405314054140551405614057140581405914060140611406214063140641406514066140671406814069140701407114072140731407414075140761407714078140791408014081140821408314084140851408614087140881408914090140911409214093140941409514096140971409814099141001410114102141031410414105141061410714108141091411014111141121411314114141151411614117141181411914120141211412214123141241412514126141271412814129141301413114132141331413414135141361413714138141391414014141141421414314144141451414614147141481414914150141511415214153141541415514156141571415814159141601416114162141631416414165141661416714168141691417014171141721417314174141751417614177141781417914180141811418214183141841418514186141871418814189141901419114192141931419414195141961419714198141991420014201142021420314204142051420614207142081420914210142111421214213142141421514216142171421814219142201422114222142231422414225142261422714228142291423014231142321423314234142351423614237142381423914240142411424214243142441424514246142471424814249142501425114252142531425414255142561425714258142591426014261142621426314264142651426614267142681426914270142711427214273142741427514276142771427814279142801428114282142831428414285142861428714288142891429014291142921429314294142951429614297142981429914300143011430214303143041430514306143071430814309143101431114312143131431414315143161431714318143191432014321143221432314324143251432614327143281432914330143311433214333143341433514336143371433814339143401434114342143431434414345143461434714348143491435014351143521435314354143551435614357143581435914360143611436214363143641436514366143671436814369143701437114372143731437414375143761437714378143791438014381143821438314384143851438614387143881438914390143911439214393143941439514396143971439814399144001440114402144031440414405144061440714408144091441014411144121441314414144151441614417144181441914420144211442214423144241442514426144271442814429144301443114432144331443414435144361443714438144391444014441144421444314444144451444614447144481444914450144511445214453144541445514456144571445814459144601446114462144631446414465144661446714468144691447014471144721447314474144751447614477144781447914480144811448214483144841448514486144871448814489144901449114492144931449414495144961449714498144991450014501145021450314504145051450614507145081450914510145111451214513145141451514516145171451814519145201452114522145231452414525145261452714528145291453014531145321453314534145351453614537145381453914540145411454214543145441454514546145471454814549145501455114552145531455414555145561455714558145591456014561145621456314564145651456614567145681456914570145711457214573145741457514576145771457814579145801458114582145831458414585145861458714588145891459014591145921459314594145951459614597145981459914600146011460214603146041460514606146071460814609146101461114612146131461414615146161461714618146191462014621146221462314624146251462614627146281462914630146311463214633146341463514636146371463814639146401464114642146431464414645146461464714648146491465014651146521465314654146551465614657146581465914660146611466214663146641466514666146671466814669146701467114672146731467414675146761467714678146791468014681146821468314684146851468614687146881468914690146911469214693146941469514696146971469814699147001470114702147031470414705147061470714708147091471014711147121471314714147151471614717147181471914720147211472214723147241472514726147271472814729147301473114732147331473414735147361473714738147391474014741147421474314744147451474614747147481474914750147511475214753147541475514756147571475814759147601476114762147631476414765147661476714768147691477014771147721477314774147751477614777147781477914780147811478214783147841478514786147871478814789147901479114792147931479414795147961479714798147991480014801148021480314804148051480614807148081480914810148111481214813148141481514816148171481814819148201482114822148231482414825148261482714828148291483014831148321483314834148351483614837148381483914840148411484214843148441484514846148471484814849148501485114852148531485414855148561485714858148591486014861148621486314864148651486614867148681486914870148711487214873148741487514876148771487814879148801488114882148831488414885148861488714888148891489014891148921489314894148951489614897148981489914900149011490214903149041490514906149071490814909149101491114912149131491414915149161491714918149191492014921149221492314924149251492614927149281492914930149311493214933149341493514936149371493814939149401494114942149431494414945149461494714948149491495014951149521495314954149551495614957149581495914960149611496214963149641496514966149671496814969149701497114972149731497414975149761497714978149791498014981149821498314984149851498614987149881498914990149911499214993149941499514996149971499814999150001500115002150031500415005150061500715008150091501015011150121501315014150151501615017150181501915020150211502215023150241502515026150271502815029150301503115032150331503415035150361503715038150391504015041150421504315044150451504615047150481504915050150511505215053150541505515056150571505815059150601506115062150631506415065150661506715068150691507015071150721507315074150751507615077150781507915080150811508215083150841508515086150871508815089150901509115092150931509415095150961509715098150991510015101151021510315104151051510615107151081510915110151111511215113
  1. // SoftEther VPN Source Code - Stable Edition Repository
  2. // Cedar Communication Module
  3. //
  4. // SoftEther VPN Server, Client and Bridge are free software under the Apache License, Version 2.0.
  5. //
  6. // Copyright (c) Daiyuu Nobori.
  7. // Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
  8. // Copyright (c) SoftEther Corporation.
  9. // Copyright (c) all contributors on SoftEther VPN project in GitHub.
  10. //
  11. // All Rights Reserved.
  12. //
  13. // http://www.softether.org/
  14. //
  15. // This stable branch is officially managed by Daiyuu Nobori, the owner of SoftEther VPN Project.
  16. // Pull requests should be sent to the Developer Edition Master Repository on https://github.com/SoftEtherVPN/SoftEtherVPN
  17. // Contributors:
  18. // - ELIN (https://github.com/el1n)
  19. //
  20. // License: The Apache License, Version 2.0
  21. // https://www.apache.org/licenses/LICENSE-2.0
  22. //
  23. // DISCLAIMER
  24. // ==========
  25. //
  26. // THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
  27. // IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
  28. // FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
  29. // AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
  30. // LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
  31. // OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
  32. // SOFTWARE.
  33. //
  34. // THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN, UNDER
  35. // JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY, MERGE, PUBLISH,
  36. // DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS SOFTWARE, THAT ANY
  37. // JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS SOFTWARE OR ITS CONTENTS,
  38. // AGAINST US (SOFTETHER PROJECT, SOFTETHER CORPORATION, DAIYUU NOBORI OR OTHER
  39. // SUPPLIERS), OR ANY JURIDICAL DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND
  40. // OF USING, COPYING, MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING,
  41. // AND/OR SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
  42. // CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO EXCLUSIVE
  43. // JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO, JAPAN. YOU MUST WAIVE
  44. // ALL DEFENSES OF LACK OF PERSONAL JURISDICTION AND FORUM NON CONVENIENS.
  45. // PROCESS MAY BE SERVED ON EITHER PARTY IN THE MANNER AUTHORIZED BY APPLICABLE
  46. // LAW OR COURT RULE.
  47. //
  48. // USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS YOU HAVE
  49. // A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY CRIMINAL LAWS OR CIVIL
  50. // RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS SOFTWARE IN OTHER COUNTRIES IS
  51. // COMPLETELY AT YOUR OWN RISK. THE SOFTETHER VPN PROJECT HAS DEVELOPED AND
  52. // DISTRIBUTED THIS SOFTWARE TO COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING
  53. // CIVIL RIGHTS INCLUDING PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER
  54. // COUNTRIES' LAWS OR CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES.
  55. // WE HAVE NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
  56. // INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+ COUNTRIES
  57. // AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE WORLD, WITH
  58. // DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY COUNTRIES' LAWS, REGULATIONS
  59. // AND CIVIL RIGHTS TO MAKE THE SOFTWARE COMPLY WITH ALL COUNTRIES' LAWS BY THE
  60. // PROJECT. EVEN IF YOU WILL BE SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A
  61. // PUBLIC SERVANT IN YOUR COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE
  62. // LIABLE TO RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
  63. // RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT JUST A
  64. // STATEMENT FOR WARNING AND DISCLAIMER.
  65. //
  66. // READ AND UNDERSTAND THE 'WARNING.TXT' FILE BEFORE USING THIS SOFTWARE.
  67. // SOME SOFTWARE PROGRAMS FROM THIRD PARTIES ARE INCLUDED ON THIS SOFTWARE WITH
  68. // LICENSE CONDITIONS WHICH ARE DESCRIBED ON THE 'THIRD_PARTY.TXT' FILE.
  69. //
  70. //
  71. // SOURCE CODE CONTRIBUTION
  72. // ------------------------
  73. //
  74. // Your contribution to SoftEther VPN Project is much appreciated.
  75. // Please send patches to us through GitHub.
  76. // Read the SoftEther VPN Patch Acceptance Policy in advance:
  77. // http://www.softether.org/5-download/src/9.patch
  78. //
  79. //
  80. // DEAR SECURITY EXPERTS
  81. // ---------------------
  82. //
  83. // If you find a bug or a security vulnerability please kindly inform us
  84. // about the problem immediately so that we can fix the security problem
  85. // to protect a lot of users around the world as soon as possible.
  86. //
  87. // Our e-mail address for security reports is:
  88. // softether-vpn-security [at] softether.org
  89. //
  90. // Please note that the above e-mail address is not a technical support
  91. // inquiry address. If you need technical assistance, please visit
  92. // http://www.softether.org/ and ask your question on the users forum.
  93. //
  94. // Thank you for your cooperation.
  95. //
  96. //
  97. // NO MEMORY OR RESOURCE LEAKS
  98. // ---------------------------
  99. //
  100. // The memory-leaks and resource-leaks verification under the stress
  101. // test has been passed before release this source code.
  102. // Admin.c
  103. // RPC Module for Management
  104. #include "CedarPch.h"
  105. // Macro for RPC function declaration
  106. #define DECLARE_RPC_EX(rpc_name, data_type, function, in_rpc, out_rpc, free_rpc) \
  107. else if (StrCmpi(name, rpc_name) == 0) \
  108. { \
  109. data_type *t; \
  110. t = ZeroMalloc(sizeof(data_type)); \
  111. in_rpc(t, p); \
  112. err = function(a, t); \
  113. if (err == ERR_NO_ERROR) \
  114. { \
  115. out_rpc(ret, t); \
  116. } \
  117. free_rpc(t); \
  118. Free(t); \
  119. ok = true; \
  120. }
  121. #define DECLARE_RPC(rpc_name, data_type, function, in_rpc, out_rpc) \
  122. else if (StrCmpi(name, rpc_name) == 0) \
  123. { \
  124. data_type *t; \
  125. t = ZeroMalloc(sizeof(data_type)); \
  126. in_rpc(t, p); \
  127. err = function(a, t); \
  128. if (err == ERR_NO_ERROR) \
  129. { \
  130. out_rpc(ret, t); \
  131. } \
  132. Free(t); \
  133. ok = true; \
  134. }
  135. #define DECLARE_SC_EX(rpc_name, data_type, function, in_rpc, out_rpc, free_rpc) \
  136. UINT function(RPC *r, data_type *t) \
  137. { \
  138. PACK *p, *ret; \
  139. UINT err; \
  140. if (r == NULL || t == NULL) \
  141. { \
  142. return ERR_INTERNAL_ERROR; \
  143. } \
  144. p = NewPack(); \
  145. out_rpc(p, t); \
  146. free_rpc(t); \
  147. Zero(t, sizeof(data_type)); \
  148. ret = AdminCall(r, rpc_name, p); \
  149. err = GetErrorFromPack(ret); \
  150. if (err == ERR_NO_ERROR) \
  151. { \
  152. in_rpc(t, ret); \
  153. } \
  154. FreePack(ret); \
  155. return err; \
  156. }
  157. #define DECLARE_SC(rpc_name, data_type, function, in_rpc, out_rpc) \
  158. UINT function(RPC *r, data_type *t) \
  159. { \
  160. PACK *p, *ret; \
  161. UINT err; \
  162. if (r == NULL || t == NULL) \
  163. { \
  164. return ERR_INTERNAL_ERROR; \
  165. } \
  166. p = NewPack(); \
  167. out_rpc(p, t); \
  168. ret = AdminCall(r, rpc_name, p); \
  169. err = GetErrorFromPack(ret); \
  170. if (err == ERR_NO_ERROR) \
  171. { \
  172. in_rpc(t, ret); \
  173. } \
  174. FreePack(ret); \
  175. return err; \
  176. }
  177. #define CHECK_RIGHT \
  178. if (a->ServerAdmin == false && (t->HubName == NULL || StrCmpi(a->HubName, t->HubName) != 0)) \
  179. return ERR_NOT_ENOUGH_RIGHT; \
  180. if (IsEmptyStr(t->HubName)) \
  181. return ERR_INVALID_PARAMETER;
  182. #define SERVER_ADMIN_ONLY \
  183. if (a->ServerAdmin == false) \
  184. return ERR_NOT_ENOUGH_RIGHT;
  185. #define NO_SUPPORT_FOR_BRIDGE \
  186. if (a->Server->Cedar->Bridge) \
  187. return ERR_NOT_SUPPORTED;
  188. // Get server Caps (Guessing from the build number if failed to get Caps)
  189. CAPSLIST *ScGetCapsEx(RPC *rpc)
  190. {
  191. RPC_SERVER_INFO info;
  192. CAPSLIST *t;
  193. bool is_bridge = false;
  194. // Validate arguments
  195. if (rpc == NULL)
  196. {
  197. return NULL;
  198. }
  199. Zero(&info, sizeof(info));
  200. ScGetServerInfo(rpc, &info);
  201. t = ZeroMalloc(sizeof(CAPSLIST));
  202. // Try to get Caps by RPC
  203. if (ScGetCaps(rpc, t) != ERR_NO_ERROR)
  204. {
  205. UINT build;
  206. Free(t);
  207. t = NewCapsList();
  208. // Since acquisition of Caps went wrong, get build number
  209. build = info.ServerBuildInt;
  210. is_bridge = (SearchStrEx(info.ServerProductName, "bridge", 0, false) == INFINITE) ? false : true;
  211. AddCapsInt(t, "i_max_packet_size", 1514);
  212. if (is_bridge == false)
  213. {
  214. AddCapsInt(t, "i_max_hubs", 4096);
  215. AddCapsInt(t, "i_max_sessions", 4096);
  216. if (info.ServerType != SERVER_TYPE_FARM_MEMBER)
  217. {
  218. AddCapsInt(t, "i_max_users_per_hub", 10000);
  219. AddCapsInt(t, "i_max_groups_per_hub", 10000);
  220. AddCapsInt(t, "i_max_access_lists", 4096);
  221. }
  222. else
  223. {
  224. AddCapsInt(t, "i_max_users_per_hub", 0);
  225. AddCapsInt(t, "i_max_groups_per_hub", 0);
  226. AddCapsInt(t, "i_max_access_lists", 0);
  227. }
  228. }
  229. else
  230. {
  231. AddCapsInt(t, "i_max_hubs", 0);
  232. AddCapsInt(t, "i_max_sessions", 0);
  233. AddCapsInt(t, "i_max_users_per_hub", 0);
  234. AddCapsInt(t, "i_max_groups_per_hub", 0);
  235. AddCapsInt(t, "i_max_access_lists", 0);
  236. }
  237. AddCapsInt(t, "i_max_mac_tables", 10000);
  238. AddCapsInt(t, "i_max_ip_tables", 10000);
  239. if (info.ServerType == SERVER_TYPE_STANDALONE)
  240. {
  241. AddCapsBool(t, "b_support_securenat", (build >= 3600) ? true : false);
  242. AddCapsInt(t, "i_max_secnat_tables", 4096);
  243. }
  244. else
  245. {
  246. AddCapsBool(t, "b_support_securenat", false);
  247. AddCapsInt(t, "i_max_secnat_tables", 0);
  248. }
  249. if (is_bridge)
  250. {
  251. AddCapsBool(t, "b_bridge", true);
  252. }
  253. else if (info.ServerType == SERVER_TYPE_STANDALONE)
  254. {
  255. AddCapsBool(t, "b_standalone", true);
  256. }
  257. else if (info.ServerType == SERVER_TYPE_FARM_CONTROLLER)
  258. {
  259. AddCapsBool(t, "b_cluster_controller", true);
  260. }
  261. else
  262. {
  263. AddCapsBool(t, "b_cluster_member", true);
  264. }
  265. AddCapsBool(t, "b_support_config_hub", info.ServerType != SERVER_TYPE_FARM_MEMBER &&
  266. is_bridge == false);
  267. AddCapsBool(t, "b_vpn_client_connect", is_bridge == false ? true : false);
  268. AddCapsBool(t, "b_support_radius", info.ServerType != SERVER_TYPE_FARM_MEMBER &&
  269. is_bridge == false);
  270. if (build >= 3600)
  271. {
  272. RPC_BRIDGE_SUPPORT b;
  273. Zero(&b, sizeof(b));
  274. if (ScGetBridgeSupport(rpc, &b) == ERR_NO_ERROR)
  275. {
  276. AddCapsBool(t, "b_local_bridge", b.IsBridgeSupportedOs);
  277. AddCapsBool(t, "b_must_install_pcap", b.IsWinPcapNeeded);
  278. }
  279. else
  280. {
  281. AddCapsBool(t, "b_local_bridge", false);
  282. AddCapsBool(t, "b_must_install_pcap", false);
  283. }
  284. }
  285. else
  286. {
  287. AddCapsBool(t, "b_local_bridge", false);
  288. AddCapsBool(t, "b_must_install_pcap", false);
  289. }
  290. AddCapsBool(t, "b_tap_supported", false);
  291. if (info.ServerType == SERVER_TYPE_STANDALONE)
  292. {
  293. AddCapsBool(t, "b_support_cascade", true);
  294. }
  295. else
  296. {
  297. AddCapsBool(t, "b_support_cascade", false);
  298. }
  299. AddCapsBool(t, "b_support_cascade_cert", false);
  300. AddCapsBool(t, "b_support_config_log", info.ServerType != SERVER_TYPE_FARM_MEMBER);
  301. AddCapsBool(t, "b_support_autodelete", false);
  302. }
  303. else
  304. {
  305. // Success getting Caps
  306. if (info.ServerBuildInt <= 4350)
  307. {
  308. if (is_bridge == false)
  309. {
  310. // b_support_cluster should be true for build 4300 or earlier
  311. CAPS *caps = GetCaps(t, "b_support_cluster");
  312. if (caps == NULL)
  313. {
  314. AddCapsBool(t, "b_support_cluster", true);
  315. }
  316. else
  317. {
  318. caps->Value = 1;
  319. }
  320. }
  321. }
  322. }
  323. if (true)
  324. {
  325. TOKEN_LIST *names;
  326. // Fill items that doesn't exist in server-side as false
  327. names = GetTableNameStartWith("CT_b_");
  328. if (names != NULL)
  329. {
  330. UINT i;
  331. for (i = 0;i < names->NumTokens;i++)
  332. {
  333. char *name = names->Token[i] + 3;
  334. if (GetCaps(t, name) == NULL)
  335. {
  336. AddCapsBool(t, name, false);
  337. }
  338. }
  339. FreeToken(names);
  340. }
  341. }
  342. FreeRpcServerInfo(&info);
  343. return t;
  344. }
  345. // Process server side include
  346. BUF *AdminWebProcessServerSideInclude(BUF *src_txt, char *filename, UINT depth)
  347. {
  348. char *src_str;
  349. UINT src_str_size;
  350. UINT i, len;
  351. BUF *ret = NULL;
  352. UINT pos = 0;
  353. char dirname[MAX_PATH];
  354. if (src_txt == NULL || filename == NULL || depth >= 4)
  355. {
  356. return CloneBuf(src_txt);
  357. }
  358. if (EndWith(filename, ".html") == false)
  359. {
  360. // We process only .html files
  361. return CloneBuf(src_txt);
  362. }
  363. GetDirNameFromFilePath(dirname, sizeof(dirname), filename);
  364. src_str_size = src_txt->Size + 1;
  365. src_str = ZeroMalloc(src_str_size);
  366. Copy(src_str, src_txt->Buf, src_txt->Size);
  367. len = StrLen(src_str);
  368. ret = NewBuf();
  369. for (i = 0;i < len;i++)
  370. {
  371. char *start_tag = "<!--#include file=";
  372. bool is_ssi = false;
  373. if (StartWith(src_str + i, start_tag))
  374. {
  375. UINT a = i + StrLen(start_tag);
  376. if (src_str[a] == '\"' || src_str[a] == '\'')
  377. {
  378. char delimier = src_str[a];
  379. char delimier_str[2];
  380. UINT b;
  381. delimier_str[0] = delimier;
  382. delimier_str[1] = 0;
  383. b = SearchStrEx(src_str, delimier_str, i + StrLen(start_tag) + 1, true);
  384. if ((b != INFINITE) && (b >= i + StrLen(start_tag) + 1) && ((b - (i + StrLen(start_tag) + 1)) < 32))
  385. {
  386. char inc_filename[MAX_PATH];
  387. char *end_tag = "-->";
  388. UINT x;
  389. Zero(inc_filename, sizeof(inc_filename));
  390. StrCpy(inc_filename, sizeof(inc_filename), src_str + i + StrLen(start_tag) + 1);
  391. inc_filename[b - (i + StrLen(start_tag) + 1)] = 0;
  392. x = SearchStrEx(src_str, end_tag, b + 1, true);
  393. if ((x != INFINITE) && (x >= (b + 1)))
  394. {
  395. BUF *inc_buf;
  396. char full_inc_filename[MAX_PATH];
  397. if (StartWith(inc_filename, "/"))
  398. {
  399. Format(full_inc_filename, sizeof(full_inc_filename), "|wwwroot/%s", inc_filename + 1);
  400. }
  401. else
  402. {
  403. StrCpy(full_inc_filename, sizeof(full_inc_filename), dirname);
  404. StrCat(full_inc_filename, sizeof(full_inc_filename), "/");
  405. StrCat(full_inc_filename, sizeof(full_inc_filename), inc_filename);
  406. }
  407. Debug("dirname = %s, full_inc_filename (src) = %s\n\n", dirname, full_inc_filename);
  408. NormalizePath(full_inc_filename, sizeof(full_inc_filename), full_inc_filename);
  409. if (StartWith(full_inc_filename, "|wwwroot/") == false
  410. && StartWith(full_inc_filename, "|wwwroot\\") == false)
  411. {
  412. char tmp[MAX_PATH];
  413. Format(tmp, sizeof(tmp), "|wwwroot/%s", full_inc_filename);
  414. StrCpy(full_inc_filename, sizeof(full_inc_filename), tmp);
  415. }
  416. Debug("inc_filename = %s\nfull_inc_filename = %s\n\n", inc_filename, full_inc_filename);
  417. inc_buf = ReadDump(full_inc_filename);
  418. if (inc_buf != NULL)
  419. {
  420. BUF *inc_buf2;
  421. inc_buf2 = AdminWebProcessServerSideInclude(inc_buf, full_inc_filename, depth + 1);
  422. BufSkipUtf8Bom(inc_buf2);
  423. WriteBufBufWithOffset(ret, inc_buf2);
  424. FreeBuf(inc_buf);
  425. FreeBuf(inc_buf2);
  426. }
  427. else
  428. {
  429. Debug("Loading SSI '%s' error.\n", inc_buf);
  430. }
  431. i = (x + StrLen(end_tag) - 1);
  432. is_ssi = true;
  433. }
  434. }
  435. }
  436. }
  437. if (is_ssi == false)
  438. {
  439. WriteBufChar(ret, src_str[i]);
  440. }
  441. }
  442. Free(src_str);
  443. return ret;
  444. }
  445. // Handle the file request
  446. bool AdminWebHandleFileRequest(ADMIN *a, CONNECTION *c, SOCK *s, HTTP_HEADER *h, char *url_src, char *query_string, char *virtual_root_dir, char *physical_root_dir)
  447. {
  448. bool ret = false;
  449. char url[MAX_PATH];
  450. UINT i, len;
  451. if (a == NULL || c == NULL || s == NULL || h == NULL || url == NULL || query_string == NULL ||
  452. virtual_root_dir == NULL || physical_root_dir == NULL)
  453. {
  454. return false;
  455. }
  456. StrCpy(url, sizeof(url), url_src);
  457. len = StrLen(url);
  458. for (i = 0;i < len;i++)
  459. {
  460. if (url[i] == '\\')
  461. {
  462. url[i] = '/';
  463. }
  464. }
  465. // Is dangerous URL?
  466. if (InStr(url, "..") || InStr(url, "//") || InStr(url, "\\\\") || InStr(url, "/\\") || InStr(url, "\\/"))
  467. {
  468. ret = AdminWebSend404Error(s, h);
  469. }
  470. else
  471. {
  472. char filename[MAX_PATH];
  473. bool is_index_file = false;
  474. BUF *b = AdminWebTryFindAndReadFile(virtual_root_dir, physical_root_dir, url,
  475. filename, sizeof(filename), &is_index_file);
  476. if (b == NULL)
  477. {
  478. ret = AdminWebSend404Error(s, h);
  479. }
  480. else
  481. {
  482. if (is_index_file && EndWith(url, "/") == false)
  483. {
  484. char url2[MAX_PATH];
  485. StrCpy(url2, sizeof(url2), url);
  486. StrCat(url2, sizeof(url2), "/");
  487. ret = AdminWebSend302Redirect(s, url2, query_string, h);
  488. }
  489. else if (is_index_file == false && EndWith(url, "/"))
  490. {
  491. char url2[MAX_PATH];
  492. TrimEndWith(url2, sizeof(url2), url, "/");
  493. ret = AdminWebSend302Redirect(s, url2, query_string, h);
  494. }
  495. else
  496. {
  497. BUF *b2 = AdminWebProcessServerSideInclude(b, filename, 0);
  498. char *mime = GetMimeTypeFromFileName(filename);
  499. if (mime == NULL)
  500. {
  501. mime = "application/octet-stream";
  502. }
  503. ret = AdminWebSendBody(s, 200, "OK", b2->Buf, b2->Size, mime, NULL, NULL, h);
  504. FreeBuf(b2);
  505. }
  506. FreeBuf(b);
  507. }
  508. }
  509. return ret;
  510. }
  511. // Try to find a file, and if exists return the file contents
  512. BUF *AdminWebTryFindAndReadFile(char *vroot, char *proot, char *url, char *ret_filename, UINT ret_filename_size, bool *is_index_html)
  513. {
  514. char tmp[MAX_PATH];
  515. char tmp2[MAX_PATH];
  516. UINT vroot_len;
  517. UINT url_len;
  518. char relative_path[MAX_PATH];
  519. BUF *b;
  520. if (vroot == NULL || proot == NULL || url == NULL || ret_filename == NULL || is_index_html == NULL)
  521. {
  522. return NULL;
  523. }
  524. *is_index_html = false;
  525. if (StartWith(url, vroot) == false)
  526. {
  527. return NULL;
  528. }
  529. vroot_len = StrLen(vroot);
  530. url_len = StrLen(url);
  531. StrCpy(relative_path, sizeof(relative_path), url + vroot_len);
  532. if (StartWith(relative_path, "/"))
  533. {
  534. char tmp3[MAX_PATH];
  535. StrCpy(tmp3, sizeof(tmp3), relative_path + 1);
  536. StrCpy(relative_path, sizeof(relative_path), tmp3);
  537. }
  538. CombinePath(tmp, sizeof(tmp), proot, relative_path);
  539. // index.html
  540. CombinePath(tmp2, sizeof(tmp2), tmp, "index.html");
  541. b = AdminWebTryOneFile(tmp2, ret_filename, ret_filename_size);
  542. if (b != NULL)
  543. {
  544. *is_index_html = true;
  545. return b;
  546. }
  547. // dirname/filename
  548. StrCpy(tmp2, sizeof(tmp2), tmp);
  549. b = AdminWebTryOneFile(tmp2, ret_filename, ret_filename_size);
  550. if (b != NULL)
  551. {
  552. return b;
  553. }
  554. return NULL;
  555. }
  556. BUF *AdminWebTryOneFile(char *filename, char *ret_filename, UINT ret_filename_size)
  557. {
  558. BUF *b;
  559. if (filename == NULL || ret_filename == NULL)
  560. {
  561. return NULL;
  562. }
  563. b = ReadDump(filename);
  564. if (b == NULL)
  565. {
  566. return NULL;
  567. }
  568. StrCpy(ret_filename, ret_filename_size, filename);
  569. return b;
  570. }
  571. // Send a 401 Unauthorized error
  572. bool AdminWebSendUnauthorized(SOCK *s, HTTP_HEADER *http_request_headers)
  573. {
  574. char *http_401_str = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<html><head>\r\n<title>401 Unauthorized</title>\r\n</head><body>\r\n<h1>" CEDAR_SERVER_STR ": Administrative authentication required.</h1>\r\n<p>This VPN Server could not verify that you are authorized to access to the \r\nserver in administrative mode.</p>\r\n<p><strong>For web browser logins:<br></strong>You must supply the HTTP basic \r\nauthentication credential as following.</p>\r\n<ul>\r\n\t<li>To login to the VPN server as the entire server administrator, specify empty or &quot;administrator&quot; as the username field, and specify the server administrative \r\n\tpassword as the password field.<br></li>\r\n\t<li>To login to a particular Virtual Hub as the hub administrator, specify \r\n\tthe hub name as the username field, and specify the hub administrative \r\n\tpassword as the password field.</li>\r\n</ul>\r\n<p><strong>For JSON-RPC client logins:<br></strong>Instead to HTTP basic \r\nauthentication, you can also specify the HTTP header parameters as following.</p>\r\n<ul>\r\n\t<li>X-VPNADMIN-HUBNAME: Empty to login to the VPN Server as the entire \r\n\tserver administrator, or specify the target Virtual Hub name as the hub \r\n\tadministrator.</li>\r\n\t<li>X-VPNADMIN-PASSWORD: Specify the administrative password.</li>\r\n</ul>\r\n</body></html>\r\n";
  575. bool ret;
  576. // Validate arguments
  577. if (s == NULL || http_request_headers == NULL)
  578. {
  579. return false;
  580. }
  581. // Creating a Data
  582. ret = AdminWebSendBody(s, 401, "Unauthorized", http_401_str, StrLen(http_401_str), HTTP_CONTENT_TYPE,
  583. "WWW-Authenticate",
  584. "Basic realm=\"Username 'administrator' for entire VPN Server privilege, or specify Virtual Hub name as the username for specified Virtual Hub administrative privilege.\"",
  585. http_request_headers);
  586. return ret;
  587. }
  588. // Send reply
  589. bool AdminWebSendBody(SOCK *s, UINT status_code, char *status_string, UCHAR *data, UINT data_size, char *content_type, char *add_header_name, char *add_header_value,
  590. HTTP_HEADER *request_headers)
  591. {
  592. HTTP_HEADER *h;
  593. char date_str[MAX_SIZE];
  594. char error_code_str[16];
  595. bool ret = false;
  596. HTTP_VALUE *origin;
  597. if (s == NULL || status_string == NULL || (data_size != 0 && data == NULL) || request_headers == NULL)
  598. {
  599. return false;
  600. }
  601. if (content_type == NULL)
  602. {
  603. content_type = "text/html; charset=utf-8";
  604. }
  605. ToStr(error_code_str, status_code);
  606. GetHttpDateStr(date_str, sizeof(date_str), SystemTime64());
  607. h = NewHttpHeader("HTTP/1.1", error_code_str, status_string);
  608. if (StrCmpi(request_headers->Method, "OPTIONS") == 0)
  609. {
  610. AddHttpValue(h, NewHttpValue("Allow", "OPTIONS, GET, POST"));
  611. }
  612. AddHttpValue(h, NewHttpValue("Cache-Control", "no-cache"));
  613. AddHttpValue(h, NewHttpValue("Content-Type", content_type));
  614. AddHttpValue(h, NewHttpValue("Date", date_str));
  615. AddHttpValue(h, NewHttpValue("Connection", "Keep-Alive"));
  616. AddHttpValue(h, NewHttpValue("Access-Control-Allow-Methods", "OPTIONS,GET,POST"));
  617. AddHttpValue(h, NewHttpValue("Access-Control-Allow-Headers", "X-VPNADMIN-HUBNAME,X-VPNADMIN-PASSWORD"));
  618. AddHttpValue(h, NewHttpValue("Access-Control-Allow-Credentials", "true"));
  619. origin = GetHttpValue(request_headers, "Origin");
  620. if (origin != NULL)
  621. {
  622. AddHttpValue(h, NewHttpValue("Access-Control-Allow-Origin", origin->Data));
  623. }
  624. if (add_header_name != NULL && add_header_value != NULL)
  625. {
  626. AddHttpValue(h, NewHttpValue(add_header_name, add_header_value));
  627. }
  628. ret = PostHttp(s, h, data, data_size);
  629. FreeHttpHeader(h);
  630. return ret;
  631. }
  632. // Send 404 error
  633. bool AdminWebSend404Error(SOCK *s, HTTP_HEADER *request_headers)
  634. {
  635. char *body = "<!DOCTYPE HTML PUBLIC \"-//IETF//DTD HTML 2.0//EN\">\r\n<html><head><title>404 Not Found</title></head><body><h1>Not Found</h1><p>The requested URL was not found on this server.</p></body></html>\r\n";
  636. if (s == NULL || request_headers == NULL)
  637. {
  638. return false;
  639. }
  640. return AdminWebSendBody(s, 404, "Not Found", body, StrLen(body), NULL, NULL, NULL, request_headers);
  641. }
  642. // Send 302 redirect
  643. bool AdminWebSend302Redirect(SOCK *s, char *url, char *query_string, HTTP_HEADER *request_headers)
  644. {
  645. bool ret = false;
  646. char *txt;
  647. UINT txt_size;
  648. char *url2;
  649. UINT url2_size;
  650. char *body = "<html><head><title>Object moved</title></head><body>\r\n<h2>Object moved to <a href=\"$URL$\">here</a>.</h2>\r\n</body></html>";
  651. if (s == NULL || url == NULL || request_headers == NULL)
  652. {
  653. return false;
  654. }
  655. url2_size = (StrSize(url) + StrSize(query_string) + MAX_SIZE) * 2;
  656. url2 = ZeroMalloc(url2_size);
  657. StrCpy(url2, url2_size, url);
  658. if (IsEmptyStr(query_string) == false)
  659. {
  660. StrCat(url2, url2_size, "?");
  661. StrCat(url2, url2_size, query_string);
  662. }
  663. txt_size = (StrSize(body) + StrSize(url2) + MAX_SIZE) * 2;
  664. txt = ZeroMalloc(txt_size);
  665. ReplaceStrEx(txt, txt_size, body, "$URL$", url2, false);
  666. ret = AdminWebSendBody(s, 302, "Found", txt, StrLen(txt), NULL, "Location", url2, request_headers);
  667. Free(txt);
  668. Free(url2);
  669. return ret;
  670. }
  671. // "/admin" web page POST handler
  672. void AdminWebProcPost(CONNECTION *c, SOCK *s, HTTP_HEADER *h, UINT post_data_size, char *url_target)
  673. {
  674. ADMIN *a;
  675. UCHAR *data;
  676. char url[MAX_PATH];
  677. char query_string[MAX_SIZE];
  678. UINT i;
  679. if (c == NULL || s == NULL || h == NULL || url_target == NULL)
  680. {
  681. return;
  682. }
  683. a = JsonRpcAuthLogin(c->Cedar, s, h);
  684. if (a == NULL)
  685. {
  686. RecvAllWithDiscard(s, post_data_size, s->SecureMode);
  687. AdminWebSendUnauthorized(s, h);
  688. return;
  689. }
  690. if (post_data_size > a->MaxJsonRpcRecvSize)
  691. {
  692. Disconnect(s);
  693. return;
  694. }
  695. data = ZeroMalloc(post_data_size + 1);
  696. if (RecvAll(s, data, post_data_size, s->SecureMode))
  697. {
  698. c->JsonRpcAuthed = true;
  699. RemoveDosEntry(c->Listener, s);
  700. // Divide url_target into URL and query string
  701. StrCpy(url, sizeof(url), url_target);
  702. Zero(query_string, sizeof(query_string));
  703. i = SearchStr(url, "?", 0);
  704. if (i != INFINITE)
  705. {
  706. StrCpy(query_string, sizeof(query_string), url + i + 1);
  707. url[i] = 0;
  708. }
  709. AdminWebHandleFileRequest(a, c, s, h, url, query_string, "/admin", "|wwwroot/admin");
  710. }
  711. Free(data);
  712. Free(a);
  713. }
  714. // "/admin" web page GET handler
  715. void AdminWebProcGet(CONNECTION *c, SOCK *s, HTTP_HEADER *h, char *url_target)
  716. {
  717. ADMIN *a;
  718. char url[MAX_PATH];
  719. char query_string[MAX_SIZE];
  720. UINT i;
  721. if (c == NULL || s == NULL || h == NULL || url_target == NULL)
  722. {
  723. return;
  724. }
  725. a = JsonRpcAuthLogin(c->Cedar, s, h);
  726. if (a == NULL)
  727. {
  728. AdminWebSendUnauthorized(s, h);
  729. return;
  730. }
  731. c->JsonRpcAuthed = true;
  732. RemoveDosEntry(c->Listener, s);
  733. // Divide url_target into URL and query string
  734. StrCpy(url, sizeof(url), url_target);
  735. Zero(query_string, sizeof(query_string));
  736. i = SearchStr(url, "?", 0);
  737. if (i != INFINITE)
  738. {
  739. StrCpy(query_string, sizeof(query_string), url + i + 1);
  740. url[i] = 0;
  741. }
  742. AdminWebHandleFileRequest(a, c, s, h, url, query_string, "/admin", "|wwwroot/admin");
  743. Free(a);
  744. }
  745. // New JSON-RPC Result
  746. JSON_VALUE *JsonRpcNewResponse(PACK *p)
  747. {
  748. JSON_VALUE *jv;
  749. JSON_OBJECT *jo;
  750. JSON_VALUE *jv2;
  751. if (p == NULL)
  752. {
  753. return NULL;
  754. }
  755. jv = JsonNewObject();
  756. jo = JsonValueGetObject(jv);
  757. jv2 = PackToJson(p);
  758. JsonSet(jo, "result", jv2);
  759. return jv;
  760. }
  761. // New JSON-RPC Error
  762. JSON_VALUE *JsonRpcNewError(int code, wchar_t *message)
  763. {
  764. wchar_t msg[MAX_PATH];
  765. JSON_VALUE *jv;
  766. JSON_OBJECT *jo;
  767. JSON_VALUE *jv2;
  768. JSON_OBJECT *jo2;
  769. if (UniIsEmptyStr(message))
  770. {
  771. UniFormat(msg, sizeof(msg), L"Error code %u", code);
  772. }
  773. else
  774. {
  775. UniFormat(msg, sizeof(msg), L"Error code %u: %s", code, message);
  776. }
  777. jv = JsonNewObject();
  778. jo = JsonValueGetObject(jv);
  779. jv2 = JsonNewObject();
  780. jo2 = JsonValueGetObject(jv2);
  781. JsonSet(jo, "error", jv2);
  782. JsonSetNumber(jo2, "code", (UINT64)code);
  783. JsonSetUniStr(jo2, "message", msg);
  784. return jv;
  785. }
  786. // JSON-RPC process request object
  787. JSON_VALUE *JsonRpcProcRequestObject(ADMIN *admin, CONNECTION *c, SOCK *s, JSON_VALUE *json_req, char *method_name)
  788. {
  789. PACK *pack_request;
  790. JSON_VALUE *ret = NULL;
  791. if (c == NULL || s == NULL || json_req == NULL || admin == NULL)
  792. {
  793. return NULL;
  794. }
  795. pack_request = JsonToPack(json_req);
  796. PackAddStr(pack_request, "function_name", method_name);
  797. if (pack_request != NULL)
  798. {
  799. RPC *rpc;
  800. PACK *pack_response;
  801. UINT err;
  802. // RPC Server
  803. rpc = StartRpcServer(s, AdminDispatch, admin);
  804. admin->Rpc = rpc;
  805. pack_response = CallRpcDispatcher(rpc, pack_request);
  806. if (pack_response == NULL)
  807. {
  808. pack_response = PackError(ERR_NOT_SUPPORTED);
  809. }
  810. RpcFreeEx(rpc, true);
  811. FreePack(pack_request);
  812. // Construct response object
  813. err = GetErrorFromPack(pack_response);
  814. if (err != 0)
  815. {
  816. // Return the error
  817. ret = JsonRpcNewError(err, _E(err));
  818. }
  819. else
  820. {
  821. // Return the PACK
  822. ret = JsonRpcNewResponse(pack_response);
  823. }
  824. SLog(admin->Server->Cedar, "LS_API_RPC_CALL",
  825. &s->RemoteIP, s->RemotePort, s->RemoteHostname,
  826. method_name, err, _E(err));
  827. FreePack(pack_response);
  828. }
  829. return ret;
  830. }
  831. // JSON-RPC HTTP user authentication
  832. bool HttpParseBasicAuthHeader(HTTP_HEADER *h, char *username, UINT username_size, char *password, UINT password_size)
  833. {
  834. bool ret = false;
  835. HTTP_VALUE *auth_value;
  836. HTTP_VALUE *vpnadmin_hubname;
  837. HTTP_VALUE *vpnadmin_password;
  838. if (h == NULL || username == NULL || password == NULL)
  839. {
  840. return false;
  841. }
  842. auth_value = GetHttpValue(h, "Authorization");
  843. vpnadmin_hubname = GetHttpValue(h, "X-VPNADMIN-HUBNAME");
  844. vpnadmin_password = GetHttpValue(h, "X-VPNADMIN-PASSWORD");
  845. if (vpnadmin_password != NULL)
  846. {
  847. if (vpnadmin_hubname == NULL)
  848. {
  849. StrCpy(username, username_size, "");
  850. }
  851. else
  852. {
  853. StrCpy(username, username_size, vpnadmin_hubname->Data);
  854. }
  855. StrCpy(password, password_size, vpnadmin_password->Data);
  856. ret = true;
  857. }
  858. if (ret == false && auth_value != NULL)
  859. {
  860. char key[32], value[MAX_SIZE];
  861. if (GetKeyAndValue(auth_value->Data, key, sizeof(key), value, sizeof(value), " \t"))
  862. {
  863. if (StrCmpi(key, "Basic") == 0 && IsEmptyStr(value) == false)
  864. {
  865. UINT b64_dest_size = StrSize(value) * 2 + 256;
  866. char *b64_dest = ZeroMalloc(b64_dest_size);
  867. Decode64(b64_dest, value);
  868. if (IsEmptyStr(b64_dest) == false)
  869. {
  870. if (b64_dest[0] == ':')
  871. {
  872. // Empty username
  873. StrCpy(username, username_size, "");
  874. StrCpy(password, password_size, b64_dest + 1);
  875. ret = true;
  876. }
  877. else
  878. {
  879. if (GetKeyAndValue(b64_dest, username, username_size, password, password_size, ":"))
  880. {
  881. ret = true;
  882. }
  883. }
  884. }
  885. Free(b64_dest);
  886. }
  887. }
  888. }
  889. return ret;
  890. }
  891. // JSON-RPC Login
  892. ADMIN *JsonRpcAuthLogin(CEDAR *c, SOCK *sock, HTTP_HEADER *h)
  893. {
  894. ADMIN *a = NULL;
  895. char username[MAX_HUBNAME_LEN + 1];
  896. char password[MAX_PASSWORD_LEN + 1];
  897. SERVER *s;
  898. char empty_pw_hash[SHA1_SIZE];
  899. if (c == NULL || h == NULL || sock == NULL)
  900. {
  901. return NULL;
  902. }
  903. s = c->Server;
  904. HashAdminPassword(empty_pw_hash, "");
  905. Zero(username, sizeof(username));
  906. Zero(password, sizeof(password));
  907. if (HttpParseBasicAuthHeader(h, username, sizeof(username), password, sizeof(password)))
  908. {
  909. char pw_hash[SHA1_SIZE];
  910. bool is_server_admin = false;
  911. bool is_hub_admin = false;
  912. char hub_name[MAX_HUBNAME_LEN + 1];
  913. HashAdminPassword(pw_hash, password);
  914. Zero(hub_name, sizeof(hub_name));
  915. // Check if the server administrator password is empty. If yes, login always success.
  916. if (Cmp(s->HashedPassword, empty_pw_hash, SHA1_SIZE) == 0)
  917. {
  918. is_server_admin = true;
  919. }
  920. else
  921. {
  922. if (IsEmptyStr(username) || StrCmpi(username, ADMINISTRATOR_USERNAME) == 0)
  923. {
  924. // If the username is empty or 'administrator', verify with the server admin password.
  925. if (Cmp(s->HashedPassword, pw_hash, SHA1_SIZE) == 0)
  926. {
  927. is_server_admin = true;
  928. }
  929. }
  930. }
  931. if (is_server_admin == false)
  932. {
  933. HUB *h;
  934. // Hub admin mode
  935. LockHubList(c);
  936. {
  937. h = GetHub(c, username);
  938. }
  939. UnlockHubList(c);
  940. if (h != NULL)
  941. {
  942. Lock(h->lock);
  943. {
  944. if (Cmp(h->HashedPassword, empty_pw_hash, SHA1_SIZE) != 0 && IsZero(h->HashedPassword, sizeof(h->HashedPassword)) == false)
  945. {
  946. if (Cmp(pw_hash, h->HashedPassword, SHA1_SIZE) == 0)
  947. {
  948. is_hub_admin = true;
  949. StrCpy(hub_name, sizeof(hub_name), h->Name);
  950. }
  951. }
  952. }
  953. Unlock(h->lock);
  954. ReleaseHub(h);
  955. }
  956. }
  957. if (is_server_admin || is_hub_admin)
  958. {
  959. if (CheckAdminSourceAddress(sock, hub_name))
  960. {
  961. a = ZeroMalloc(sizeof(ADMIN));
  962. a->Server = s;
  963. a->ServerAdmin = is_server_admin;
  964. a->ClientBuild = c->Build;
  965. if (is_hub_admin)
  966. {
  967. StrCpy(a->dummy1, sizeof(a->dummy1), hub_name);
  968. a->HubName = a->dummy1;
  969. }
  970. }
  971. }
  972. }
  973. if (a != NULL)
  974. {
  975. char admin_mode[256];
  976. if (a->ServerAdmin)
  977. {
  978. a->MaxJsonRpcRecvSize = ADMIN_RPC_MAX_POST_SIZE_BY_SERVER_ADMIN;
  979. }
  980. else
  981. {
  982. a->MaxJsonRpcRecvSize = ADMIN_RPC_MAX_POST_SIZE_BY_HUB_ADMIN;
  983. }
  984. if (IsEmptyStr(a->HubName))
  985. {
  986. StrCpy(admin_mode, sizeof(admin_mode),
  987. "Entire VPN Server Admin Mode");
  988. }
  989. else
  990. {
  991. Format(admin_mode, sizeof(admin_mode),
  992. "Virtual Hub Admin Mode for '%s'",
  993. a->HubName);
  994. }
  995. SLog(s->Cedar, "LS_API_AUTH_OK",
  996. &sock->RemoteIP, sock->RemotePort, sock->RemoteHostname,
  997. admin_mode, username, h->Method, h->Target);
  998. }
  999. else
  1000. {
  1001. SLog(s->Cedar, "LS_API_AUTH_ERROR",
  1002. &sock->RemoteIP, sock->RemotePort, sock->RemoteHostname,
  1003. username, h->Method, h->Target);
  1004. }
  1005. return a;
  1006. }
  1007. // Query string to JSON list value
  1008. JSON_VALUE *QueryStringToJsonListValue(char *qs)
  1009. {
  1010. TOKEN_LIST *t;
  1011. UINT i;
  1012. LIST *distinct_list = NULL;
  1013. JSON_VALUE *v = NULL;
  1014. JSON_OBJECT *o = NULL;
  1015. if (qs == NULL)
  1016. {
  1017. return NULL;
  1018. }
  1019. t = ParseTokenWithoutNullStr(qs, "&");
  1020. if (t == NULL)
  1021. {
  1022. return NULL;
  1023. }
  1024. distinct_list = NewStrList();
  1025. v = JsonNewObject();
  1026. o = JsonValueGetObject(v);
  1027. for (i = 0;i < t->NumTokens;i++)
  1028. {
  1029. char *token = t->Token[i];
  1030. UINT pos;
  1031. pos = SearchStr(token, "=", 0);
  1032. if (pos != INFINITE)
  1033. {
  1034. char *key_decoded;
  1035. char *value_decoded;
  1036. char *key = CopyStr(token);
  1037. char *value = CopyStr(token + pos + 1);
  1038. key[pos] = 0;
  1039. key_decoded = UrlDecode(key);
  1040. value_decoded = UrlDecode(value);
  1041. if (key_decoded != NULL && value_decoded != NULL)
  1042. {
  1043. if (AddStrToStrListDistinct(distinct_list, key_decoded))
  1044. {
  1045. JsonSetStr(o, key_decoded, value_decoded);
  1046. }
  1047. }
  1048. Free(value_decoded);
  1049. Free(key_decoded);
  1050. Free(key);
  1051. Free(value);
  1052. }
  1053. }
  1054. FreeToken(t);
  1055. FreeStrList(distinct_list);
  1056. return v;
  1057. }
  1058. // Construct new JSON-RPC dummy request
  1059. JSON_VALUE *ConstructDummyJsonRpcRequest(char *method_name, JSON_VALUE *p)
  1060. {
  1061. JSON_VALUE *ret;
  1062. JSON_OBJECT *ret_object;
  1063. UCHAR rand[16];
  1064. char id_str[64];
  1065. Rand(rand, sizeof(rand));
  1066. BinToStr(id_str, sizeof(id_str), rand, sizeof(rand));
  1067. ret = JsonNewObject();
  1068. ret_object = JsonObject(ret);
  1069. JsonSetStr(ret_object, "jsonrpc", "2.0");
  1070. JsonSetStr(ret_object, "method", method_name);
  1071. JsonSet(ret_object, "params", p);
  1072. JsonSetStr(ret_object, "id", id_str);
  1073. return ret;
  1074. }
  1075. // JSON-RPC Options Dispatch
  1076. void JsonRpcProcOptions(CONNECTION *c, SOCK *s, HTTP_HEADER *h, char *url_target)
  1077. {
  1078. if (c == NULL || s == NULL || h == NULL || url_target == NULL)
  1079. {
  1080. return;
  1081. }
  1082. c->JsonRpcAuthed = true;
  1083. RemoveDosEntry(c->Listener, s);
  1084. AdminWebSendBody(s, 200, "OK", NULL, 0, NULL, NULL, NULL, h);
  1085. }
  1086. // JSON-RPC GET Dispatch
  1087. void JsonRpcProcGet(CONNECTION *c, SOCK *s, HTTP_HEADER *h, char *url_target)
  1088. {
  1089. ADMIN *a;
  1090. char url[MAX_PATH];
  1091. char query_string[MAX_SIZE];
  1092. UINT i;
  1093. bool reply_sent = false;
  1094. if (c == NULL || s == NULL || h == NULL || url_target == NULL)
  1095. {
  1096. return;
  1097. }
  1098. a = JsonRpcAuthLogin(c->Cedar, s, h);
  1099. if (a == NULL)
  1100. {
  1101. AdminWebSendUnauthorized(s, h);
  1102. return;
  1103. }
  1104. c->JsonRpcAuthed = true;
  1105. RemoveDosEntry(c->Listener, s);
  1106. // Divide url_target into URL and query string
  1107. StrCpy(url, sizeof(url), url_target);
  1108. Zero(query_string, sizeof(query_string));
  1109. i = SearchStr(url, "?", 0);
  1110. if (i != INFINITE)
  1111. {
  1112. StrCpy(query_string, sizeof(query_string), url + i + 1);
  1113. url[i] = 0;
  1114. }
  1115. if (StartWith(url, "/api/"))
  1116. {
  1117. // Call a method
  1118. JSON_VALUE *params_value = NULL;
  1119. JSON_OBJECT *params_object = NULL;
  1120. UINT i;
  1121. char method_name[MAX_PATH];
  1122. StrCpy(method_name, sizeof(method_name), url + 5);
  1123. i = SearchStr(method_name, "/", 0);
  1124. if (i != INFINITE)
  1125. {
  1126. method_name[i] = 0;
  1127. }
  1128. if (IsEmptyStr(method_name) == false)
  1129. {
  1130. // Call a method
  1131. params_value = QueryStringToJsonListValue(query_string);
  1132. if (params_value != NULL)
  1133. {
  1134. JSON_VALUE *json_ret = NULL;
  1135. char id[96];
  1136. char *ret_str = NULL;
  1137. GetDateTimeStrMilli64(id, sizeof(id), LocalTime64());
  1138. params_object = JsonObject(params_value);
  1139. // Process the request
  1140. json_ret = JsonRpcProcRequestObject(a, c, s, params_value, method_name);
  1141. if (json_ret == NULL)
  1142. {
  1143. json_ret = JsonRpcNewError(ERR_INTERNAL_ERROR, L"Internal error");
  1144. }
  1145. JsonSetStr(JsonObject(json_ret), "jsonrpc", "2.0");
  1146. JsonSetStr(JsonObject(json_ret), "id", id);
  1147. ret_str = JsonToStr(json_ret);
  1148. AdminWebSendBody(s, 200, "OK", ret_str, StrLen(ret_str), "text/plain; charset=UTF-8", NULL, NULL, h);
  1149. Free(ret_str);
  1150. JsonFree(json_ret);
  1151. JsonFree(params_value);
  1152. }
  1153. }
  1154. }
  1155. if (reply_sent == false)
  1156. {
  1157. BUF *html_buf = ReadDump("|vpnserver_api_doc.html");
  1158. if (html_buf != NULL)
  1159. {
  1160. AdminWebSendBody(s, 200, "OK", html_buf->Buf, html_buf->Size, "text/html; charset=UTF-8", NULL, NULL, h);
  1161. FreeBuf(html_buf);
  1162. }
  1163. else
  1164. {
  1165. AdminWebSend404Error(s, h);
  1166. }
  1167. }
  1168. if (a->LogFileList != NULL)
  1169. {
  1170. FreeEnumLogFile(a->LogFileList);
  1171. }
  1172. Free(a);
  1173. }
  1174. // JSON-RPC POST Dispatch
  1175. void JsonRpcProcPost(CONNECTION *c, SOCK *s, HTTP_HEADER *h, UINT post_data_size)
  1176. {
  1177. ADMIN *a;
  1178. UCHAR *data;
  1179. if (c == NULL || s == NULL || h == NULL)
  1180. {
  1181. return;
  1182. }
  1183. a = JsonRpcAuthLogin(c->Cedar, s, h);
  1184. if (a == NULL)
  1185. {
  1186. RecvAllWithDiscard(s, post_data_size, s->SecureMode);
  1187. AdminWebSendUnauthorized(s, h);
  1188. return;
  1189. }
  1190. if (post_data_size > a->MaxJsonRpcRecvSize)
  1191. {
  1192. Disconnect(s);
  1193. return;
  1194. }
  1195. data = ZeroMalloc(post_data_size + 1);
  1196. if (RecvAll(s, data, post_data_size, s->SecureMode))
  1197. {
  1198. // Parse JSON
  1199. JSON_VALUE *json_req = StrToJson(data);
  1200. JSON_OBJECT *json_req_object = JsonObject(json_req);
  1201. JSON_VALUE *json_ret = NULL;
  1202. char *res = NULL;
  1203. char *request_id = NULL;
  1204. char *method_name = NULL;
  1205. c->JsonRpcAuthed = true;
  1206. RemoveDosEntry(c->Listener, s);
  1207. if (json_req == NULL || json_req_object == NULL)
  1208. {
  1209. // Parse error
  1210. json_ret = JsonRpcNewError(ERR_INVALID_PARAMETER, L"Parameter is invalid: JSON-RPC Parse Error");
  1211. }
  1212. else
  1213. {
  1214. // check the JSON-RPC version
  1215. char *ver_str = JsonGetStr(json_req_object, "jsonrpc");
  1216. if (StrCmpi(ver_str, "2.0") != 0)
  1217. {
  1218. // Invalid version
  1219. json_ret = JsonRpcNewError(ERR_INVALID_PARAMETER, L"JSON-RPC version is invalid");
  1220. }
  1221. else
  1222. {
  1223. JSON_VALUE *params_value = NULL;
  1224. JSON_OBJECT *params_object = NULL;
  1225. // Get Request ID
  1226. request_id = JsonGetStr(json_req_object, "id");
  1227. // Get method name
  1228. method_name = JsonGetStr(json_req_object, "method");
  1229. // Get parameters
  1230. params_value = JsonGet(json_req_object, "params");
  1231. params_object = JsonObject(params_value);
  1232. if (IsEmptyStr(method_name))
  1233. {
  1234. // method is empty
  1235. json_ret = JsonRpcNewError(ERR_INVALID_PARAMETER, L"JSON-RPC method name is empty");
  1236. }
  1237. else if (params_value == NULL || params_object == NULL)
  1238. {
  1239. // params is empty
  1240. json_ret = JsonRpcNewError(ERR_INVALID_PARAMETER, L"JSON-RPC parameter is empty");
  1241. }
  1242. else
  1243. {
  1244. // Process the request
  1245. json_ret = JsonRpcProcRequestObject(a, c, s, params_value, method_name);
  1246. }
  1247. }
  1248. }
  1249. if (json_ret == NULL)
  1250. {
  1251. json_ret = JsonRpcNewError(ERR_INTERNAL_ERROR, L"Internal error");
  1252. }
  1253. JsonSetStr(JsonObject(json_ret), "jsonrpc", "2.0");
  1254. if (request_id == NULL)
  1255. {
  1256. request_id = "0";
  1257. }
  1258. JsonSetStr(JsonObject(json_ret), "id", request_id);
  1259. res = JsonToStr(json_ret);
  1260. AdminWebSendBody(s, 200, "OK", res, StrLen(res), "application/json", NULL, NULL, h);
  1261. Free(res);
  1262. JsonFree(json_ret);
  1263. JsonFree(json_req);
  1264. }
  1265. Free(data);
  1266. if (a->LogFileList != NULL)
  1267. {
  1268. FreeEnumLogFile(a->LogFileList);
  1269. }
  1270. Free(a);
  1271. }
  1272. // Dispatch routine for Administration RPC
  1273. PACK *AdminDispatch(RPC *rpc, char *name, PACK *p)
  1274. {
  1275. ADMIN *a;
  1276. PACK *ret;
  1277. UINT err;
  1278. SERVER *server = NULL;
  1279. CEDAR *cedar = NULL;
  1280. bool ok = false;
  1281. // Validate arguments
  1282. if (rpc == NULL || name == NULL || p == NULL)
  1283. {
  1284. return NULL;
  1285. }
  1286. ret = NewPack();
  1287. err = ERR_NO_ERROR;
  1288. // Administration structure
  1289. a = (ADMIN *)rpc->Param;
  1290. if (a == NULL)
  1291. {
  1292. FreePack(ret);
  1293. return NULL;
  1294. }
  1295. server = a->Server;
  1296. if (server != NULL)
  1297. {
  1298. cedar = server->Cedar;
  1299. }
  1300. Lock(cedar->CedarSuperLock);
  1301. if (true)
  1302. {
  1303. char tmp[MAX_PATH];
  1304. char ip[MAX_PATH];
  1305. UINT rpc_id = 0;
  1306. StrCpy(ip, sizeof(ip), "Unknown");
  1307. if (rpc->Sock != NULL)
  1308. {
  1309. IPToStr(ip, sizeof(ip), &rpc->Sock->RemoteIP);
  1310. rpc_id = rpc->Sock->socket;
  1311. }
  1312. Format(tmp, sizeof(tmp), "RPC: RPC-%u (%s): Entering RPC [%s]...",
  1313. rpc_id, ip, name);
  1314. SiDebugLog(a->Server, tmp);
  1315. }
  1316. if (0) {}
  1317. // RPC function declaration: from here
  1318. DECLARE_RPC_EX("Test", RPC_TEST, StTest, InRpcTest, OutRpcTest, FreeRpcTest)
  1319. DECLARE_RPC_EX("GetServerInfo", RPC_SERVER_INFO, StGetServerInfo, InRpcServerInfo, OutRpcServerInfo, FreeRpcServerInfo)
  1320. DECLARE_RPC("GetServerStatus", RPC_SERVER_STATUS, StGetServerStatus, InRpcServerStatus, OutRpcServerStatus)
  1321. DECLARE_RPC("CreateListener", RPC_LISTENER, StCreateListener, InRpcListener, OutRpcListener)
  1322. DECLARE_RPC_EX("EnumListener", RPC_LISTENER_LIST, StEnumListener, InRpcListenerList, OutRpcListenerList, FreeRpcListenerList)
  1323. DECLARE_RPC("DeleteListener", RPC_LISTENER, StDeleteListener, InRpcListener, OutRpcListener)
  1324. DECLARE_RPC("EnableListener", RPC_LISTENER, StEnableListener, InRpcListener, OutRpcListener)
  1325. DECLARE_RPC("SetServerPassword", RPC_SET_PASSWORD, StSetServerPassword, InRpcSetPassword, OutRpcSetPassword)
  1326. DECLARE_RPC_EX("SetFarmSetting", RPC_FARM, StSetFarmSetting, InRpcFarm, OutRpcFarm, FreeRpcFarm)
  1327. DECLARE_RPC_EX("GetFarmSetting", RPC_FARM, StGetFarmSetting, InRpcFarm, OutRpcFarm, FreeRpcFarm)
  1328. DECLARE_RPC_EX("GetFarmInfo", RPC_FARM_INFO, StGetFarmInfo, InRpcFarmInfo, OutRpcFarmInfo, FreeRpcFarmInfo)
  1329. DECLARE_RPC_EX("EnumFarmMember", RPC_ENUM_FARM, StEnumFarmMember, InRpcEnumFarm, OutRpcEnumFarm, FreeRpcEnumFarm)
  1330. DECLARE_RPC("GetFarmConnectionStatus", RPC_FARM_CONNECTION_STATUS, StGetFarmConnectionStatus, InRpcFarmConnectionStatus, OutRpcFarmConnectionStatus)
  1331. DECLARE_RPC_EX("SetServerCert", RPC_KEY_PAIR, StSetServerCert, InRpcKeyPair, OutRpcKeyPair, FreeRpcKeyPair)
  1332. DECLARE_RPC_EX("GetServerCert", RPC_KEY_PAIR, StGetServerCert, InRpcKeyPair, OutRpcKeyPair, FreeRpcKeyPair)
  1333. DECLARE_RPC_EX("GetServerCipher", RPC_STR, StGetServerCipher, InRpcStr, OutRpcStr, FreeRpcStr)
  1334. DECLARE_RPC_EX("SetServerCipher", RPC_STR, StSetServerCipher, InRpcStr, OutRpcStr, FreeRpcStr)
  1335. DECLARE_RPC("CreateHub", RPC_CREATE_HUB, StCreateHub, InRpcCreateHub, OutRpcCreateHub)
  1336. DECLARE_RPC("SetHub", RPC_CREATE_HUB, StSetHub, InRpcCreateHub, OutRpcCreateHub)
  1337. DECLARE_RPC("GetHub", RPC_CREATE_HUB, StGetHub, InRpcCreateHub, OutRpcCreateHub)
  1338. DECLARE_RPC_EX("EnumHub", RPC_ENUM_HUB, StEnumHub, InRpcEnumHub, OutRpcEnumHub, FreeRpcEnumHub)
  1339. DECLARE_RPC("DeleteHub", RPC_DELETE_HUB, StDeleteHub, InRpcDeleteHub, OutRpcDeleteHub)
  1340. DECLARE_RPC("GetHubRadius", RPC_RADIUS, StGetHubRadius, InRpcRadius, OutRpcRadius)
  1341. DECLARE_RPC("SetHubRadius", RPC_RADIUS, StSetHubRadius, InRpcRadius, OutRpcRadius)
  1342. DECLARE_RPC_EX("EnumConnection", RPC_ENUM_CONNECTION, StEnumConnection, InRpcEnumConnection, OutRpcEnumConnection, FreeRpcEnumConnetion)
  1343. DECLARE_RPC("DisconnectConnection", RPC_DISCONNECT_CONNECTION, StDisconnectConnection, InRpcDisconnectConnection, OutRpcDisconnectConnection)
  1344. DECLARE_RPC("GetConnectionInfo", RPC_CONNECTION_INFO, StGetConnectionInfo, InRpcConnectionInfo, OutRpcConnectionInfo)
  1345. DECLARE_RPC("SetHubOnline", RPC_SET_HUB_ONLINE, StSetHubOnline, InRpcSetHubOnline, OutRpcSetHubOnline)
  1346. DECLARE_RPC("GetHubStatus", RPC_HUB_STATUS, StGetHubStatus, InRpcHubStatus, OutRpcHubStatus)
  1347. DECLARE_RPC("SetHubLog", RPC_HUB_LOG, StSetHubLog, InRpcHubLog, OutRpcHubLog)
  1348. DECLARE_RPC("GetHubLog", RPC_HUB_LOG, StGetHubLog, InRpcHubLog, OutRpcHubLog)
  1349. DECLARE_RPC_EX("AddCa", RPC_HUB_ADD_CA, StAddCa, InRpcHubAddCa, OutRpcHubAddCa, FreeRpcHubAddCa)
  1350. DECLARE_RPC_EX("EnumCa", RPC_HUB_ENUM_CA, StEnumCa, InRpcHubEnumCa, OutRpcHubEnumCa, FreeRpcHubEnumCa)
  1351. DECLARE_RPC_EX("GetCa", RPC_HUB_GET_CA, StGetCa, InRpcHubGetCa, OutRpcHubGetCa, FreeRpcHubGetCa)
  1352. DECLARE_RPC("DeleteCa", RPC_HUB_DELETE_CA, StDeleteCa, InRpcHubDeleteCa, OutRpcHubDeleteCa)
  1353. DECLARE_RPC("SetLinkOnline", RPC_LINK, StSetLinkOnline, InRpcLink, OutRpcLink)
  1354. DECLARE_RPC("SetLinkOffline", RPC_LINK, StSetLinkOffline, InRpcLink, OutRpcLink)
  1355. DECLARE_RPC("DeleteLink", RPC_LINK, StDeleteLink, InRpcLink, OutRpcLink)
  1356. DECLARE_RPC("RenameLink", RPC_RENAME_LINK, StRenameLink, InRpcRenameLink, OutRpcRenameLink)
  1357. DECLARE_RPC_EX("CreateLink", RPC_CREATE_LINK, StCreateLink, InRpcCreateLink, OutRpcCreateLink, FreeRpcCreateLink)
  1358. DECLARE_RPC_EX("GetLink", RPC_CREATE_LINK, StGetLink, InRpcCreateLink, OutRpcCreateLink, FreeRpcCreateLink)
  1359. DECLARE_RPC_EX("SetLink", RPC_CREATE_LINK, StSetLink, InRpcCreateLink, OutRpcCreateLink, FreeRpcCreateLink)
  1360. DECLARE_RPC_EX("EnumLink", RPC_ENUM_LINK, StEnumLink, InRpcEnumLink, OutRpcEnumLink, FreeRpcEnumLink)
  1361. DECLARE_RPC_EX("GetLinkStatus", RPC_LINK_STATUS, StGetLinkStatus, InRpcLinkStatus, OutRpcLinkStatus, FreeRpcLinkStatus)
  1362. DECLARE_RPC("AddAccess", RPC_ADD_ACCESS, StAddAccess, InRpcAddAccess, OutRpcAddAccess)
  1363. DECLARE_RPC("DeleteAccess", RPC_DELETE_ACCESS, StDeleteAccess, InRpcDeleteAccess, OutRpcDeleteAccess)
  1364. DECLARE_RPC_EX("EnumAccess", RPC_ENUM_ACCESS_LIST, StEnumAccess, InRpcEnumAccessList, OutRpcEnumAccessList, FreeRpcEnumAccessList)
  1365. DECLARE_RPC_EX("SetAccessList", RPC_ENUM_ACCESS_LIST, StSetAccessList, InRpcEnumAccessList, OutRpcEnumAccessList, FreeRpcEnumAccessList)
  1366. DECLARE_RPC_EX("CreateUser", RPC_SET_USER, StCreateUser, InRpcSetUser, OutRpcSetUser, FreeRpcSetUser)
  1367. DECLARE_RPC_EX("SetUser", RPC_SET_USER, StSetUser, InRpcSetUser, OutRpcSetUser, FreeRpcSetUser)
  1368. DECLARE_RPC_EX("GetUser", RPC_SET_USER, StGetUser, InRpcSetUser, OutRpcSetUser, FreeRpcSetUser)
  1369. DECLARE_RPC("DeleteUser", RPC_DELETE_USER, StDeleteUser, InRpcDeleteUser, OutRpcDeleteUser)
  1370. DECLARE_RPC_EX("EnumUser", RPC_ENUM_USER, StEnumUser, InRpcEnumUser, OutRpcEnumUser, FreeRpcEnumUser)
  1371. DECLARE_RPC_EX("CreateGroup", RPC_SET_GROUP, StCreateGroup, InRpcSetGroup, OutRpcSetGroup, FreeRpcSetGroup)
  1372. DECLARE_RPC_EX("SetGroup", RPC_SET_GROUP, StSetGroup, InRpcSetGroup, OutRpcSetGroup, FreeRpcSetGroup)
  1373. DECLARE_RPC_EX("GetGroup", RPC_SET_GROUP, StGetGroup, InRpcSetGroup, OutRpcSetGroup, FreeRpcSetGroup)
  1374. DECLARE_RPC("DeleteGroup", RPC_DELETE_USER, StDeleteGroup, InRpcDeleteUser, OutRpcDeleteUser)
  1375. DECLARE_RPC_EX("EnumGroup", RPC_ENUM_GROUP, StEnumGroup, InRpcEnumGroup, OutRpcEnumGroup, FreeRpcEnumGroup)
  1376. DECLARE_RPC_EX("EnumSession", RPC_ENUM_SESSION, StEnumSession, InRpcEnumSession, OutRpcEnumSession, FreeRpcEnumSession)
  1377. DECLARE_RPC_EX("GetSessionStatus", RPC_SESSION_STATUS, StGetSessionStatus, InRpcSessionStatus, OutRpcSessionStatus, FreeRpcSessionStatus)
  1378. DECLARE_RPC("DeleteSession", RPC_DELETE_SESSION, StDeleteSession, InRpcDeleteSession, OutRpcDeleteSession)
  1379. DECLARE_RPC_EX("EnumMacTable", RPC_ENUM_MAC_TABLE, StEnumMacTable, InRpcEnumMacTable, OutRpcEnumMacTable, FreeRpcEnumMacTable)
  1380. DECLARE_RPC("DeleteMacTable", RPC_DELETE_TABLE, StDeleteMacTable, InRpcDeleteTable, OutRpcDeleteTable)
  1381. DECLARE_RPC_EX("EnumIpTable", RPC_ENUM_IP_TABLE, StEnumIpTable, InRpcEnumIpTable, OutRpcEnumIpTable, FreeRpcEnumIpTable)
  1382. DECLARE_RPC("DeleteIpTable", RPC_DELETE_TABLE, StDeleteIpTable, InRpcDeleteTable, OutRpcDeleteTable)
  1383. DECLARE_RPC("SetKeep", RPC_KEEP, StSetKeep, InRpcKeep, OutRpcKeep)
  1384. DECLARE_RPC("GetKeep", RPC_KEEP, StGetKeep, InRpcKeep, OutRpcKeep)
  1385. DECLARE_RPC("EnableSecureNAT", RPC_HUB, StEnableSecureNAT, InRpcHub, OutRpcHub)
  1386. DECLARE_RPC("DisableSecureNAT", RPC_HUB, StDisableSecureNAT, InRpcHub, OutRpcHub)
  1387. DECLARE_RPC("SetSecureNATOption", VH_OPTION, StSetSecureNATOption, InVhOption, OutVhOption)
  1388. DECLARE_RPC("GetSecureNATOption", VH_OPTION, StGetSecureNATOption, InVhOption, OutVhOption)
  1389. DECLARE_RPC_EX("EnumNAT", RPC_ENUM_NAT, StEnumNAT, InRpcEnumNat, OutRpcEnumNat, FreeRpcEnumNat)
  1390. DECLARE_RPC_EX("EnumDHCP", RPC_ENUM_DHCP, StEnumDHCP, InRpcEnumDhcp, OutRpcEnumDhcp, FreeRpcEnumDhcp)
  1391. DECLARE_RPC("GetSecureNATStatus", RPC_NAT_STATUS, StGetSecureNATStatus, InRpcNatStatus, OutRpcNatStatus)
  1392. DECLARE_RPC_EX("EnumEthernet", RPC_ENUM_ETH, StEnumEthernet, InRpcEnumEth, OutRpcEnumEth, FreeRpcEnumEth)
  1393. DECLARE_RPC("AddLocalBridge", RPC_LOCALBRIDGE, StAddLocalBridge, InRpcLocalBridge, OutRpcLocalBridge)
  1394. DECLARE_RPC("DeleteLocalBridge", RPC_LOCALBRIDGE, StDeleteLocalBridge, InRpcLocalBridge, OutRpcLocalBridge)
  1395. DECLARE_RPC_EX("EnumLocalBridge", RPC_ENUM_LOCALBRIDGE, StEnumLocalBridge, InRpcEnumLocalBridge, OutRpcEnumLocalBridge, FreeRpcEnumLocalBridge)
  1396. DECLARE_RPC("GetBridgeSupport", RPC_BRIDGE_SUPPORT, StGetBridgeSupport, InRpcBridgeSupport, OutRpcBridgeSupport)
  1397. DECLARE_RPC("RebootServer", RPC_TEST, StRebootServer, InRpcTest, OutRpcTest)
  1398. DECLARE_RPC_EX("GetCaps", CAPSLIST, StGetCaps, InRpcCapsList, OutRpcCapsList, FreeRpcCapsList)
  1399. DECLARE_RPC_EX("GetConfig", RPC_CONFIG, StGetConfig, InRpcConfig, OutRpcConfig, FreeRpcConfig)
  1400. DECLARE_RPC_EX("SetConfig", RPC_CONFIG, StSetConfig, InRpcConfig, OutRpcConfig, FreeRpcConfig)
  1401. DECLARE_RPC_EX("GetDefaultHubAdminOptions", RPC_ADMIN_OPTION, StGetDefaultHubAdminOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1402. DECLARE_RPC_EX("GetHubAdminOptions", RPC_ADMIN_OPTION, StGetHubAdminOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1403. DECLARE_RPC_EX("SetHubAdminOptions", RPC_ADMIN_OPTION, StSetHubAdminOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1404. DECLARE_RPC_EX("GetHubExtOptions", RPC_ADMIN_OPTION, StGetHubExtOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1405. DECLARE_RPC_EX("SetHubExtOptions", RPC_ADMIN_OPTION, StSetHubExtOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1406. DECLARE_RPC("AddL3Switch", RPC_L3SW, StAddL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1407. DECLARE_RPC("DelL3Switch", RPC_L3SW, StDelL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1408. DECLARE_RPC_EX("EnumL3Switch", RPC_ENUM_L3SW, StEnumL3Switch, InRpcEnumL3Sw, OutRpcEnumL3Sw, FreeRpcEnumL3Sw)
  1409. DECLARE_RPC("StartL3Switch", RPC_L3SW, StStartL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1410. DECLARE_RPC("StopL3Switch", RPC_L3SW, StStopL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1411. DECLARE_RPC("AddL3If", RPC_L3IF, StAddL3If, InRpcL3If, OutRpcL3If)
  1412. DECLARE_RPC("DelL3If", RPC_L3IF, StDelL3If, InRpcL3If, OutRpcL3If)
  1413. DECLARE_RPC_EX("EnumL3If", RPC_ENUM_L3IF, StEnumL3If, InRpcEnumL3If, OutRpcEnumL3If, FreeRpcEnumL3If)
  1414. DECLARE_RPC("AddL3Table", RPC_L3TABLE, StAddL3Table, InRpcL3Table, OutRpcL3Table)
  1415. DECLARE_RPC("DelL3Table", RPC_L3TABLE, StDelL3Table, InRpcL3Table, OutRpcL3Table)
  1416. DECLARE_RPC_EX("EnumL3Table", RPC_ENUM_L3TABLE, StEnumL3Table, InRpcEnumL3Table, OutRpcEnumL3Table, FreeRpcEnumL3Table)
  1417. DECLARE_RPC_EX("EnumCrl", RPC_ENUM_CRL, StEnumCrl, InRpcEnumCrl, OutRpcEnumCrl, FreeRpcEnumCrl)
  1418. DECLARE_RPC_EX("AddCrl", RPC_CRL, StAddCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1419. DECLARE_RPC_EX("DelCrl", RPC_CRL, StDelCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1420. DECLARE_RPC_EX("GetCrl", RPC_CRL, StGetCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1421. DECLARE_RPC_EX("SetCrl", RPC_CRL, StSetCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1422. DECLARE_RPC_EX("SetAcList", RPC_AC_LIST, StSetAcList, InRpcAcList, OutRpcAcList, FreeRpcAcList)
  1423. DECLARE_RPC_EX("GetAcList", RPC_AC_LIST, StGetAcList, InRpcAcList, OutRpcAcList, FreeRpcAcList)
  1424. DECLARE_RPC_EX("EnumLogFile", RPC_ENUM_LOG_FILE, StEnumLogFile, InRpcEnumLogFile, OutRpcEnumLogFile, FreeRpcEnumLogFile)
  1425. DECLARE_RPC_EX("ReadLogFile", RPC_READ_LOG_FILE, StReadLogFile, InRpcReadLogFile, OutRpcReadLogFile, FreeRpcReadLogFile)
  1426. DECLARE_RPC("AddLicenseKey", RPC_TEST, StAddLicenseKey, InRpcTest, OutRpcTest)
  1427. DECLARE_RPC("DelLicenseKey", RPC_TEST, StDelLicenseKey, InRpcTest, OutRpcTest)
  1428. DECLARE_RPC_EX("EnumLicenseKey", RPC_ENUM_LICENSE_KEY, StEnumLicenseKey, InRpcEnumLicenseKey, OutRpcEnumLicenseKey, FreeRpcEnumLicenseKey)
  1429. DECLARE_RPC("GetLicenseStatus", RPC_LICENSE_STATUS, StGetLicenseStatus, InRpcLicenseStatus, OutRpcLicenseStatus)
  1430. DECLARE_RPC("SetSysLog", SYSLOG_SETTING, StSetSysLog, InRpcSysLogSetting, OutRpcSysLogSetting)
  1431. DECLARE_RPC("GetSysLog", SYSLOG_SETTING, StGetSysLog, InRpcSysLogSetting, OutRpcSysLogSetting)
  1432. DECLARE_RPC_EX("EnumEthVLan", RPC_ENUM_ETH_VLAN, StEnumEthVLan, InRpcEnumEthVLan, OutRpcEnumEthVLan, FreeRpcEnumEthVLan)
  1433. DECLARE_RPC("SetEnableEthVLan", RPC_TEST, StSetEnableEthVLan, InRpcTest, OutRpcTest)
  1434. DECLARE_RPC_EX("SetHubMsg", RPC_MSG, StSetHubMsg, InRpcMsg, OutRpcMsg, FreeRpcMsg)
  1435. DECLARE_RPC_EX("GetHubMsg", RPC_MSG, StGetHubMsg, InRpcMsg, OutRpcMsg, FreeRpcMsg)
  1436. DECLARE_RPC("Crash", RPC_TEST, StCrash, InRpcTest, OutRpcTest)
  1437. DECLARE_RPC_EX("GetAdminMsg", RPC_MSG, StGetAdminMsg, InRpcMsg, OutRpcMsg, FreeRpcMsg)
  1438. DECLARE_RPC("Flush", RPC_TEST, StFlush, InRpcTest, OutRpcTest)
  1439. DECLARE_RPC("Debug", RPC_TEST, StDebug, InRpcTest, OutRpcTest)
  1440. DECLARE_RPC("SetIPsecServices", IPSEC_SERVICES, StSetIPsecServices, InIPsecServices, OutIPsecServices)
  1441. DECLARE_RPC("GetIPsecServices", IPSEC_SERVICES, StGetIPsecServices, InIPsecServices, OutIPsecServices)
  1442. DECLARE_RPC("AddEtherIpId", ETHERIP_ID, StAddEtherIpId, InEtherIpId, OutEtherIpId)
  1443. DECLARE_RPC("GetEtherIpId", ETHERIP_ID, StGetEtherIpId, InEtherIpId, OutEtherIpId)
  1444. DECLARE_RPC("DeleteEtherIpId", ETHERIP_ID, StDeleteEtherIpId, InEtherIpId, OutEtherIpId)
  1445. DECLARE_RPC_EX("EnumEtherIpId", RPC_ENUM_ETHERIP_ID, StEnumEtherIpId, InRpcEnumEtherIpId, OutRpcEnumEtherIpId, FreeRpcEnumEtherIpId)
  1446. DECLARE_RPC("SetOpenVpnSstpConfig", OPENVPN_SSTP_CONFIG, StSetOpenVpnSstpConfig, InOpenVpnSstpConfig, OutOpenVpnSstpConfig)
  1447. DECLARE_RPC("GetOpenVpnSstpConfig", OPENVPN_SSTP_CONFIG, StGetOpenVpnSstpConfig, InOpenVpnSstpConfig, OutOpenVpnSstpConfig)
  1448. DECLARE_RPC("GetDDnsClientStatus", DDNS_CLIENT_STATUS, StGetDDnsClientStatus, InDDnsClientStatus, OutDDnsClientStatus)
  1449. DECLARE_RPC("ChangeDDnsClientHostname", RPC_TEST, StChangeDDnsClientHostname, InRpcTest, OutRpcTest)
  1450. DECLARE_RPC("RegenerateServerCert", RPC_TEST, StRegenerateServerCert, InRpcTest, OutRpcTest)
  1451. DECLARE_RPC_EX("MakeOpenVpnConfigFile", RPC_READ_LOG_FILE, StMakeOpenVpnConfigFile, InRpcReadLogFile, OutRpcReadLogFile, FreeRpcReadLogFile)
  1452. DECLARE_RPC("SetSpecialListener", RPC_SPECIAL_LISTENER, StSetSpecialListener, InRpcSpecialListener, OutRpcSpecialListener)
  1453. DECLARE_RPC("GetSpecialListener", RPC_SPECIAL_LISTENER, StGetSpecialListener, InRpcSpecialListener, OutRpcSpecialListener)
  1454. DECLARE_RPC("GetAzureStatus", RPC_AZURE_STATUS, StGetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus)
  1455. DECLARE_RPC("SetAzureStatus", RPC_AZURE_STATUS, StSetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus)
  1456. DECLARE_RPC("GetDDnsInternetSettng", INTERNET_SETTING, StGetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting)
  1457. DECLARE_RPC("SetDDnsInternetSettng", INTERNET_SETTING, StSetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting)
  1458. // RPC function declaration: till here
  1459. if (ok == false)
  1460. {
  1461. err = ERR_NOT_SUPPORTED;
  1462. }
  1463. if (err != ERR_NO_ERROR)
  1464. {
  1465. PackAddInt(ret, "error", err);
  1466. }
  1467. if (true)
  1468. {
  1469. char tmp[MAX_PATH];
  1470. char ip[MAX_PATH];
  1471. UINT rpc_id = 0;
  1472. StrCpy(ip, sizeof(ip), "Unknown");
  1473. if (rpc->Sock != NULL)
  1474. {
  1475. IPToStr(ip, sizeof(ip), &rpc->Sock->RemoteIP);
  1476. rpc_id = rpc->Sock->socket;
  1477. }
  1478. Format(tmp, sizeof(tmp), "RPC: RPC-%u (%s): Leaving RPC [%s] (Error: %u).",
  1479. rpc_id, ip, name, err);
  1480. SiDebugLog(a->Server, tmp);
  1481. }
  1482. Unlock(cedar->CedarSuperLock);
  1483. return ret;
  1484. }
  1485. // RPC call function declaration: from here
  1486. DECLARE_SC_EX("Test", RPC_TEST, ScTest, InRpcTest, OutRpcTest, FreeRpcTest)
  1487. DECLARE_SC_EX("GetServerInfo", RPC_SERVER_INFO, ScGetServerInfo, InRpcServerInfo, OutRpcServerInfo, FreeRpcServerInfo)
  1488. DECLARE_SC("GetServerStatus", RPC_SERVER_STATUS, ScGetServerStatus, InRpcServerStatus, OutRpcServerStatus)
  1489. DECLARE_SC("CreateListener", RPC_LISTENER, ScCreateListener, InRpcListener, OutRpcListener)
  1490. DECLARE_SC_EX("EnumListener", RPC_LISTENER_LIST, ScEnumListener, InRpcListenerList, OutRpcListenerList, FreeRpcListenerList)
  1491. DECLARE_SC("DeleteListener", RPC_LISTENER, ScDeleteListener, InRpcListener, OutRpcListener)
  1492. DECLARE_SC("EnableListener", RPC_LISTENER, ScEnableListener, InRpcListener, OutRpcListener)
  1493. DECLARE_SC("SetServerPassword", RPC_SET_PASSWORD, ScSetServerPassword, InRpcSetPassword, OutRpcSetPassword)
  1494. DECLARE_SC_EX("SetFarmSetting", RPC_FARM, ScSetFarmSetting, InRpcFarm, OutRpcFarm, FreeRpcFarm)
  1495. DECLARE_SC_EX("GetFarmSetting", RPC_FARM, ScGetFarmSetting, InRpcFarm, OutRpcFarm, FreeRpcFarm)
  1496. DECLARE_SC_EX("GetFarmInfo", RPC_FARM_INFO, ScGetFarmInfo, InRpcFarmInfo, OutRpcFarmInfo, FreeRpcFarmInfo)
  1497. DECLARE_SC_EX("EnumFarmMember", RPC_ENUM_FARM, ScEnumFarmMember, InRpcEnumFarm, OutRpcEnumFarm, FreeRpcEnumFarm)
  1498. DECLARE_SC("GetFarmConnectionStatus", RPC_FARM_CONNECTION_STATUS, ScGetFarmConnectionStatus, InRpcFarmConnectionStatus, OutRpcFarmConnectionStatus)
  1499. DECLARE_SC_EX("SetServerCert", RPC_KEY_PAIR, ScSetServerCert, InRpcKeyPair, OutRpcKeyPair, FreeRpcKeyPair)
  1500. DECLARE_SC_EX("GetServerCert", RPC_KEY_PAIR, ScGetServerCert, InRpcKeyPair, OutRpcKeyPair, FreeRpcKeyPair)
  1501. DECLARE_SC_EX("GetServerCipher", RPC_STR, ScGetServerCipher, InRpcStr, OutRpcStr, FreeRpcStr)
  1502. DECLARE_SC_EX("SetServerCipher", RPC_STR, ScSetServerCipher, InRpcStr, OutRpcStr, FreeRpcStr)
  1503. DECLARE_SC("CreateHub", RPC_CREATE_HUB, ScCreateHub, InRpcCreateHub, OutRpcCreateHub)
  1504. DECLARE_SC("SetHub", RPC_CREATE_HUB, ScSetHub, InRpcCreateHub, OutRpcCreateHub)
  1505. DECLARE_SC("GetHub", RPC_CREATE_HUB, ScGetHub, InRpcCreateHub, OutRpcCreateHub)
  1506. DECLARE_SC_EX("EnumHub", RPC_ENUM_HUB, ScEnumHub, InRpcEnumHub, OutRpcEnumHub, FreeRpcEnumHub)
  1507. DECLARE_SC("DeleteHub", RPC_DELETE_HUB, ScDeleteHub, InRpcDeleteHub, OutRpcDeleteHub)
  1508. DECLARE_SC("GetHubRadius", RPC_RADIUS, ScGetHubRadius, InRpcRadius, OutRpcRadius)
  1509. DECLARE_SC("SetHubRadius", RPC_RADIUS, ScSetHubRadius, InRpcRadius, OutRpcRadius)
  1510. DECLARE_SC_EX("EnumConnection", RPC_ENUM_CONNECTION, ScEnumConnection, InRpcEnumConnection, OutRpcEnumConnection, FreeRpcEnumConnetion)
  1511. DECLARE_SC("DisconnectConnection", RPC_DISCONNECT_CONNECTION, ScDisconnectConnection, InRpcDisconnectConnection, OutRpcDisconnectConnection)
  1512. DECLARE_SC("GetConnectionInfo", RPC_CONNECTION_INFO, ScGetConnectionInfo, InRpcConnectionInfo, OutRpcConnectionInfo)
  1513. DECLARE_SC("SetHubOnline", RPC_SET_HUB_ONLINE, ScSetHubOnline, InRpcSetHubOnline, OutRpcSetHubOnline)
  1514. DECLARE_SC("GetHubStatus", RPC_HUB_STATUS, ScGetHubStatus, InRpcHubStatus, OutRpcHubStatus)
  1515. DECLARE_SC("SetHubLog", RPC_HUB_LOG, ScSetHubLog, InRpcHubLog, OutRpcHubLog)
  1516. DECLARE_SC("GetHubLog", RPC_HUB_LOG, ScGetHubLog, InRpcHubLog, OutRpcHubLog)
  1517. DECLARE_SC_EX("AddCa", RPC_HUB_ADD_CA, ScAddCa, InRpcHubAddCa, OutRpcHubAddCa, FreeRpcHubAddCa)
  1518. DECLARE_SC_EX("EnumCa", RPC_HUB_ENUM_CA, ScEnumCa, InRpcHubEnumCa, OutRpcHubEnumCa, FreeRpcHubEnumCa)
  1519. DECLARE_SC_EX("GetCa", RPC_HUB_GET_CA, ScGetCa, InRpcHubGetCa, OutRpcHubGetCa, FreeRpcHubGetCa)
  1520. DECLARE_SC("DeleteCa", RPC_HUB_DELETE_CA, ScDeleteCa, InRpcHubDeleteCa, OutRpcHubDeleteCa)
  1521. DECLARE_SC_EX("CreateLink", RPC_CREATE_LINK, ScCreateLink, InRpcCreateLink, OutRpcCreateLink, FreeRpcCreateLink)
  1522. DECLARE_SC_EX("GetLink", RPC_CREATE_LINK, ScGetLink, InRpcCreateLink, OutRpcCreateLink, FreeRpcCreateLink)
  1523. DECLARE_SC_EX("SetLink", RPC_CREATE_LINK, ScSetLink, InRpcCreateLink, OutRpcCreateLink, FreeRpcCreateLink)
  1524. DECLARE_SC_EX("EnumLink", RPC_ENUM_LINK, ScEnumLink, InRpcEnumLink, OutRpcEnumLink, FreeRpcEnumLink)
  1525. DECLARE_SC_EX("GetLinkStatus", RPC_LINK_STATUS, ScGetLinkStatus, InRpcLinkStatus, OutRpcLinkStatus, FreeRpcLinkStatus)
  1526. DECLARE_SC("SetLinkOnline", RPC_LINK, ScSetLinkOnline, InRpcLink, OutRpcLink)
  1527. DECLARE_SC("SetLinkOffline", RPC_LINK, ScSetLinkOffline, InRpcLink, OutRpcLink)
  1528. DECLARE_SC("DeleteLink", RPC_LINK, ScDeleteLink, InRpcLink, OutRpcLink)
  1529. DECLARE_SC("RenameLink", RPC_RENAME_LINK, ScRenameLink, InRpcRenameLink, OutRpcRenameLink)
  1530. DECLARE_SC("AddAccess", RPC_ADD_ACCESS, ScAddAccess, InRpcAddAccess, OutRpcAddAccess)
  1531. DECLARE_SC("DeleteAccess", RPC_DELETE_ACCESS, ScDeleteAccess, InRpcDeleteAccess, OutRpcDeleteAccess)
  1532. DECLARE_SC_EX("EnumAccess", RPC_ENUM_ACCESS_LIST, ScEnumAccess, InRpcEnumAccessList, OutRpcEnumAccessList, FreeRpcEnumAccessList)
  1533. DECLARE_SC_EX("SetAccessList", RPC_ENUM_ACCESS_LIST, ScSetAccessList, InRpcEnumAccessList, OutRpcEnumAccessList, FreeRpcEnumAccessList)
  1534. DECLARE_SC_EX("CreateUser", RPC_SET_USER, ScCreateUser, InRpcSetUser, OutRpcSetUser, FreeRpcSetUser)
  1535. DECLARE_SC_EX("SetUser", RPC_SET_USER, ScSetUser, InRpcSetUser, OutRpcSetUser, FreeRpcSetUser)
  1536. DECLARE_SC_EX("GetUser", RPC_SET_USER, ScGetUser, InRpcSetUser, OutRpcSetUser, FreeRpcSetUser)
  1537. DECLARE_SC("DeleteUser", RPC_DELETE_USER, ScDeleteUser, InRpcDeleteUser, OutRpcDeleteUser)
  1538. DECLARE_SC_EX("EnumUser", RPC_ENUM_USER, ScEnumUser, InRpcEnumUser, OutRpcEnumUser, FreeRpcEnumUser)
  1539. DECLARE_SC_EX("CreateGroup", RPC_SET_GROUP, ScCreateGroup, InRpcSetGroup, OutRpcSetGroup, FreeRpcSetGroup)
  1540. DECLARE_SC_EX("SetGroup", RPC_SET_GROUP, ScSetGroup, InRpcSetGroup, OutRpcSetGroup, FreeRpcSetGroup)
  1541. DECLARE_SC_EX("GetGroup", RPC_SET_GROUP, ScGetGroup, InRpcSetGroup, OutRpcSetGroup, FreeRpcSetGroup)
  1542. DECLARE_SC("DeleteGroup", RPC_DELETE_USER, ScDeleteGroup, InRpcDeleteUser, OutRpcDeleteUser)
  1543. DECLARE_SC_EX("EnumGroup", RPC_ENUM_GROUP, ScEnumGroup, InRpcEnumGroup, OutRpcEnumGroup, FreeRpcEnumGroup)
  1544. DECLARE_SC_EX("EnumSession", RPC_ENUM_SESSION, ScEnumSession, InRpcEnumSession, OutRpcEnumSession, FreeRpcEnumSession)
  1545. DECLARE_SC_EX("GetSessionStatus", RPC_SESSION_STATUS, ScGetSessionStatus, InRpcSessionStatus, OutRpcSessionStatus, FreeRpcSessionStatus)
  1546. DECLARE_SC("DeleteSession", RPC_DELETE_SESSION, ScDeleteSession, InRpcDeleteSession, OutRpcDeleteSession)
  1547. DECLARE_SC_EX("EnumMacTable", RPC_ENUM_MAC_TABLE, ScEnumMacTable, InRpcEnumMacTable, OutRpcEnumMacTable, FreeRpcEnumMacTable)
  1548. DECLARE_SC("DeleteMacTable", RPC_DELETE_TABLE, ScDeleteMacTable, InRpcDeleteTable, OutRpcDeleteTable)
  1549. DECLARE_SC_EX("EnumIpTable", RPC_ENUM_IP_TABLE, ScEnumIpTable, InRpcEnumIpTable, OutRpcEnumIpTable, FreeRpcEnumIpTable)
  1550. DECLARE_SC("DeleteIpTable", RPC_DELETE_TABLE, ScDeleteIpTable, InRpcDeleteTable, OutRpcDeleteTable)
  1551. DECLARE_SC("SetKeep", RPC_KEEP, ScSetKeep, InRpcKeep, OutRpcKeep)
  1552. DECLARE_SC("GetKeep", RPC_KEEP, ScGetKeep, InRpcKeep, OutRpcKeep)
  1553. DECLARE_SC("EnableSecureNAT", RPC_HUB, ScEnableSecureNAT, InRpcHub, OutRpcHub)
  1554. DECLARE_SC("DisableSecureNAT", RPC_HUB, ScDisableSecureNAT, InRpcHub, OutRpcHub)
  1555. DECLARE_SC("SetSecureNATOption", VH_OPTION, ScSetSecureNATOption, InVhOption, OutVhOption)
  1556. DECLARE_SC("GetSecureNATOption", VH_OPTION, ScGetSecureNATOption, InVhOption, OutVhOption)
  1557. DECLARE_SC_EX("EnumNAT", RPC_ENUM_NAT, ScEnumNAT, InRpcEnumNat, OutRpcEnumNat, FreeRpcEnumNat)
  1558. DECLARE_SC_EX("EnumDHCP", RPC_ENUM_DHCP, ScEnumDHCP, InRpcEnumDhcp, OutRpcEnumDhcp, FreeRpcEnumDhcp)
  1559. DECLARE_SC("GetSecureNATStatus", RPC_NAT_STATUS, ScGetSecureNATStatus, InRpcNatStatus, OutRpcNatStatus)
  1560. DECLARE_SC_EX("EnumEthernet", RPC_ENUM_ETH, ScEnumEthernet, InRpcEnumEth, OutRpcEnumEth, FreeRpcEnumEth)
  1561. DECLARE_SC("AddLocalBridge", RPC_LOCALBRIDGE, ScAddLocalBridge, InRpcLocalBridge, OutRpcLocalBridge)
  1562. DECLARE_SC("DeleteLocalBridge", RPC_LOCALBRIDGE, ScDeleteLocalBridge, InRpcLocalBridge, OutRpcLocalBridge)
  1563. DECLARE_SC_EX("EnumLocalBridge", RPC_ENUM_LOCALBRIDGE, ScEnumLocalBridge, InRpcEnumLocalBridge, OutRpcEnumLocalBridge, FreeRpcEnumLocalBridge)
  1564. DECLARE_SC("GetBridgeSupport", RPC_BRIDGE_SUPPORT, ScGetBridgeSupport, InRpcBridgeSupport, OutRpcBridgeSupport)
  1565. DECLARE_SC("RebootServer", RPC_TEST, ScRebootServer, InRpcTest, OutRpcTest)
  1566. DECLARE_SC_EX("GetCaps", CAPSLIST, ScGetCaps, InRpcCapsList, OutRpcCapsList, FreeRpcCapsList)
  1567. DECLARE_SC_EX("GetConfig", RPC_CONFIG, ScGetConfig, InRpcConfig, OutRpcConfig, FreeRpcConfig)
  1568. DECLARE_SC_EX("SetConfig", RPC_CONFIG, ScSetConfig, InRpcConfig, OutRpcConfig, FreeRpcConfig)
  1569. DECLARE_SC_EX("GetHubAdminOptions", RPC_ADMIN_OPTION, ScGetHubAdminOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1570. DECLARE_SC_EX("SetHubAdminOptions", RPC_ADMIN_OPTION, ScSetHubAdminOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1571. DECLARE_SC_EX("GetHubExtOptions", RPC_ADMIN_OPTION, ScGetHubExtOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1572. DECLARE_SC_EX("SetHubExtOptions", RPC_ADMIN_OPTION, ScSetHubExtOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1573. DECLARE_SC_EX("GetDefaultHubAdminOptions", RPC_ADMIN_OPTION, ScGetDefaultHubAdminOptions, InRpcAdminOption, OutRpcAdminOption, FreeRpcAdminOption)
  1574. DECLARE_SC("AddL3Switch", RPC_L3SW, ScAddL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1575. DECLARE_SC("DelL3Switch", RPC_L3SW, ScDelL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1576. DECLARE_SC_EX("EnumL3Switch", RPC_ENUM_L3SW, ScEnumL3Switch, InRpcEnumL3Sw, OutRpcEnumL3Sw, FreeRpcEnumL3Sw)
  1577. DECLARE_SC("StartL3Switch", RPC_L3SW, ScStartL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1578. DECLARE_SC("StopL3Switch", RPC_L3SW, ScStopL3Switch, InRpcL3Sw, OutRpcL3Sw)
  1579. DECLARE_SC("AddL3If", RPC_L3IF, ScAddL3If, InRpcL3If, OutRpcL3If)
  1580. DECLARE_SC("DelL3If", RPC_L3IF, ScDelL3If, InRpcL3If, OutRpcL3If)
  1581. DECLARE_SC_EX("EnumL3If", RPC_ENUM_L3IF, ScEnumL3If, InRpcEnumL3If, OutRpcEnumL3If, FreeRpcEnumL3If)
  1582. DECLARE_SC("AddL3Table", RPC_L3TABLE, ScAddL3Table, InRpcL3Table, OutRpcL3Table)
  1583. DECLARE_SC("DelL3Table", RPC_L3TABLE, ScDelL3Table, InRpcL3Table, OutRpcL3Table)
  1584. DECLARE_SC_EX("EnumL3Table", RPC_ENUM_L3TABLE, ScEnumL3Table, InRpcEnumL3Table, OutRpcEnumL3Table, FreeRpcEnumL3Table)
  1585. DECLARE_SC_EX("EnumCrl", RPC_ENUM_CRL, ScEnumCrl, InRpcEnumCrl, OutRpcEnumCrl, FreeRpcEnumCrl)
  1586. DECLARE_SC_EX("AddCrl", RPC_CRL, ScAddCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1587. DECLARE_SC_EX("DelCrl", RPC_CRL, ScDelCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1588. DECLARE_SC_EX("GetCrl", RPC_CRL, ScGetCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1589. DECLARE_SC_EX("SetCrl", RPC_CRL, ScSetCrl, InRpcCrl, OutRpcCrl, FreeRpcCrl)
  1590. DECLARE_SC_EX("SetAcList", RPC_AC_LIST, ScSetAcList, InRpcAcList, OutRpcAcList, FreeRpcAcList)
  1591. DECLARE_SC_EX("GetAcList", RPC_AC_LIST, ScGetAcList, InRpcAcList, OutRpcAcList, FreeRpcAcList)
  1592. DECLARE_SC_EX("EnumLogFile", RPC_ENUM_LOG_FILE, ScEnumLogFile, InRpcEnumLogFile, OutRpcEnumLogFile, FreeRpcEnumLogFile)
  1593. DECLARE_SC_EX("ReadLogFile", RPC_READ_LOG_FILE, ScReadLogFile, InRpcReadLogFile, OutRpcReadLogFile, FreeRpcReadLogFile)
  1594. DECLARE_SC("AddLicenseKey", RPC_TEST, ScAddLicenseKey, InRpcTest, OutRpcTest)
  1595. DECLARE_SC("DelLicenseKey", RPC_TEST, ScDelLicenseKey, InRpcTest, OutRpcTest)
  1596. DECLARE_SC_EX("EnumLicenseKey", RPC_ENUM_LICENSE_KEY, ScEnumLicenseKey, InRpcEnumLicenseKey, OutRpcEnumLicenseKey, FreeRpcEnumLicenseKey)
  1597. DECLARE_SC("GetLicenseStatus", RPC_LICENSE_STATUS, ScGetLicenseStatus, InRpcLicenseStatus, OutRpcLicenseStatus)
  1598. DECLARE_SC("SetSysLog", SYSLOG_SETTING, ScSetSysLog, InRpcSysLogSetting, OutRpcSysLogSetting)
  1599. DECLARE_SC("GetSysLog", SYSLOG_SETTING, ScGetSysLog, InRpcSysLogSetting, OutRpcSysLogSetting)
  1600. DECLARE_SC_EX("EnumEthVLan", RPC_ENUM_ETH_VLAN, ScEnumEthVLan, InRpcEnumEthVLan, OutRpcEnumEthVLan, FreeRpcEnumEthVLan)
  1601. DECLARE_SC("SetEnableEthVLan", RPC_TEST, ScSetEnableEthVLan, InRpcTest, OutRpcTest)
  1602. DECLARE_SC_EX("SetHubMsg", RPC_MSG, ScSetHubMsg, InRpcMsg, OutRpcMsg, FreeRpcMsg)
  1603. DECLARE_SC_EX("GetHubMsg", RPC_MSG, ScGetHubMsg, InRpcMsg, OutRpcMsg, FreeRpcMsg)
  1604. DECLARE_SC("Crash", RPC_TEST, ScCrash, InRpcTest, OutRpcTest)
  1605. DECLARE_SC_EX("GetAdminMsg", RPC_MSG, ScGetAdminMsg, InRpcMsg, OutRpcMsg, FreeRpcMsg)
  1606. DECLARE_SC("Flush", RPC_TEST, ScFlush, InRpcTest, OutRpcTest)
  1607. DECLARE_SC("Debug", RPC_TEST, ScDebug, InRpcTest, OutRpcTest)
  1608. DECLARE_SC("SetIPsecServices", IPSEC_SERVICES, ScSetIPsecServices, InIPsecServices, OutIPsecServices)
  1609. DECLARE_SC("GetIPsecServices", IPSEC_SERVICES, ScGetIPsecServices, InIPsecServices, OutIPsecServices)
  1610. DECLARE_SC("AddEtherIpId", ETHERIP_ID, ScAddEtherIpId, InEtherIpId, OutEtherIpId)
  1611. DECLARE_SC("GetEtherIpId", ETHERIP_ID, ScGetEtherIpId, InEtherIpId, OutEtherIpId)
  1612. DECLARE_SC("DeleteEtherIpId", ETHERIP_ID, ScDeleteEtherIpId, InEtherIpId, OutEtherIpId)
  1613. DECLARE_SC_EX("EnumEtherIpId", RPC_ENUM_ETHERIP_ID, ScEnumEtherIpId, InRpcEnumEtherIpId, OutRpcEnumEtherIpId, FreeRpcEnumEtherIpId)
  1614. DECLARE_SC("SetOpenVpnSstpConfig", OPENVPN_SSTP_CONFIG, ScSetOpenVpnSstpConfig, InOpenVpnSstpConfig, OutOpenVpnSstpConfig)
  1615. DECLARE_SC("GetOpenVpnSstpConfig", OPENVPN_SSTP_CONFIG, ScGetOpenVpnSstpConfig, InOpenVpnSstpConfig, OutOpenVpnSstpConfig)
  1616. DECLARE_SC("GetDDnsClientStatus", DDNS_CLIENT_STATUS, ScGetDDnsClientStatus, InDDnsClientStatus, OutDDnsClientStatus)
  1617. DECLARE_SC("ChangeDDnsClientHostname", RPC_TEST, ScChangeDDnsClientHostname, InRpcTest, OutRpcTest)
  1618. DECLARE_SC("RegenerateServerCert", RPC_TEST, ScRegenerateServerCert, InRpcTest, OutRpcTest)
  1619. DECLARE_SC_EX("MakeOpenVpnConfigFile", RPC_READ_LOG_FILE, ScMakeOpenVpnConfigFile, InRpcReadLogFile, OutRpcReadLogFile, FreeRpcReadLogFile)
  1620. DECLARE_SC("SetSpecialListener", RPC_SPECIAL_LISTENER, ScSetSpecialListener, InRpcSpecialListener, OutRpcSpecialListener)
  1621. DECLARE_SC("GetSpecialListener", RPC_SPECIAL_LISTENER, ScGetSpecialListener, InRpcSpecialListener, OutRpcSpecialListener)
  1622. DECLARE_SC("GetAzureStatus", RPC_AZURE_STATUS, ScGetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus)
  1623. DECLARE_SC("SetAzureStatus", RPC_AZURE_STATUS, ScSetAzureStatus, InRpcAzureStatus, OutRpcAzureStatus)
  1624. DECLARE_SC("GetDDnsInternetSettng", INTERNET_SETTING, ScGetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting)
  1625. DECLARE_SC("SetDDnsInternetSettng", INTERNET_SETTING, ScSetDDnsInternetSetting, InRpcInternetSetting, OutRpcInternetSetting)
  1626. // RPC call function declaration: till here
  1627. // Setting VPN Gate Server Configuration
  1628. UINT StSetVgsConfig(ADMIN *a, VGS_CONFIG *t)
  1629. {
  1630. return ERR_NOT_SUPPORTED;
  1631. }
  1632. // Get VPN Gate configuration
  1633. UINT StGetVgsConfig(ADMIN *a, VGS_CONFIG *t)
  1634. {
  1635. return ERR_NOT_SUPPORTED;
  1636. }
  1637. // Get DDNS proxy configuration
  1638. UINT StGetDDnsInternetSetting(ADMIN *a, INTERNET_SETTING *t)
  1639. {
  1640. SERVER *s = a->Server;
  1641. CEDAR *c = s->Cedar;
  1642. UINT ret = ERR_NO_ERROR;
  1643. SERVER_ADMIN_ONLY;
  1644. NO_SUPPORT_FOR_BRIDGE;
  1645. if (s->DDnsClient == NULL)
  1646. {
  1647. return ERR_NOT_SUPPORTED;
  1648. }
  1649. Zero(t, sizeof(INTERNET_SETTING));
  1650. DCGetInternetSetting(s->DDnsClient, t);
  1651. return ret;
  1652. }
  1653. // Set DDNS proxy configuration
  1654. UINT StSetDDnsInternetSetting(ADMIN *a, INTERNET_SETTING *t)
  1655. {
  1656. SERVER *s = a->Server;
  1657. CEDAR *c = s->Cedar;
  1658. UINT ret = ERR_NO_ERROR;
  1659. SERVER_ADMIN_ONLY;
  1660. NO_SUPPORT_FOR_BRIDGE;
  1661. if (s->DDnsClient == NULL)
  1662. {
  1663. return ERR_NOT_SUPPORTED;
  1664. }
  1665. DCSetInternetSetting(s->DDnsClient, t);
  1666. IncrementServerConfigRevision(s);
  1667. return ret;
  1668. }
  1669. // Get Azure status
  1670. UINT StGetAzureStatus(ADMIN *a, RPC_AZURE_STATUS *t)
  1671. {
  1672. SERVER *s = a->Server;
  1673. CEDAR *c = s->Cedar;
  1674. UINT ret = ERR_NO_ERROR;
  1675. AZURE_CLIENT *ac;
  1676. SERVER_ADMIN_ONLY;
  1677. NO_SUPPORT_FOR_BRIDGE;
  1678. if (SiIsAzureSupported(s) == false)
  1679. {
  1680. return ERR_NOT_SUPPORTED;
  1681. }
  1682. ac = s->AzureClient;
  1683. if (ac == NULL)
  1684. {
  1685. return ERR_NOT_SUPPORTED;
  1686. }
  1687. Zero(t, sizeof(RPC_AZURE_STATUS));
  1688. Lock(ac->Lock);
  1689. {
  1690. t->IsConnected = ac->IsConnected;
  1691. t->IsEnabled = ac->IsEnabled;
  1692. }
  1693. Unlock(ac->Lock);
  1694. return ERR_NO_ERROR;
  1695. }
  1696. // Set Azure status
  1697. UINT StSetAzureStatus(ADMIN *a, RPC_AZURE_STATUS *t)
  1698. {
  1699. SERVER *s = a->Server;
  1700. CEDAR *c = s->Cedar;
  1701. UINT ret = ERR_NO_ERROR;
  1702. SERVER_ADMIN_ONLY;
  1703. NO_SUPPORT_FOR_BRIDGE;
  1704. if (SiIsAzureSupported(s) == false)
  1705. {
  1706. return ERR_NOT_SUPPORTED;
  1707. }
  1708. SiSetAzureEnable(s, t->IsEnabled);
  1709. IncrementServerConfigRevision(s);
  1710. return ERR_NO_ERROR;
  1711. }
  1712. // Get special listener status
  1713. UINT StGetSpecialListener(ADMIN *a, RPC_SPECIAL_LISTENER *t)
  1714. {
  1715. SERVER *s = a->Server;
  1716. CEDAR *c = s->Cedar;
  1717. UINT ret = ERR_NO_ERROR;
  1718. SERVER_ADMIN_ONLY;
  1719. NO_SUPPORT_FOR_BRIDGE;
  1720. Zero(t, sizeof(RPC_SPECIAL_LISTENER));
  1721. t->VpnOverDnsListener = s->EnableVpnOverDns;
  1722. t->VpnOverIcmpListener = s->EnableVpnOverIcmp;
  1723. return ERR_NO_ERROR;
  1724. }
  1725. // Set special listener status
  1726. UINT StSetSpecialListener(ADMIN *a, RPC_SPECIAL_LISTENER *t)
  1727. {
  1728. SERVER *s = a->Server;
  1729. CEDAR *c = s->Cedar;
  1730. UINT ret = ERR_NO_ERROR;
  1731. SERVER_ADMIN_ONLY;
  1732. NO_SUPPORT_FOR_BRIDGE;
  1733. // Check ports
  1734. if (t->VpnOverDnsListener && (MAKEBOOL(s->EnableVpnOverDns) != MAKEBOOL(t->VpnOverDnsListener)))
  1735. {
  1736. if (SiCanOpenVpnOverDnsPort() == false)
  1737. {
  1738. return ERR_SPECIAL_LISTENER_DNS_ERROR;
  1739. }
  1740. }
  1741. if (t->VpnOverIcmpListener && (MAKEBOOL(s->EnableVpnOverIcmp) != MAKEBOOL(t->VpnOverIcmpListener)))
  1742. {
  1743. if (SiCanOpenVpnOverIcmpPort() == false)
  1744. {
  1745. return ERR_SPECIAL_LISTENER_ICMP_ERROR;
  1746. }
  1747. }
  1748. s->EnableVpnOverDns = t->VpnOverDnsListener;
  1749. s->EnableVpnOverIcmp = t->VpnOverIcmpListener;
  1750. SiApplySpecialListenerStatus(s);
  1751. ALog(a, NULL, "LA_SET_SPECIAL_LISTENER");
  1752. IncrementServerConfigRevision(s);
  1753. return ERR_NO_ERROR;
  1754. }
  1755. // Set configurations for OpenVPN and SSTP
  1756. UINT StSetOpenVpnSstpConfig(ADMIN *a, OPENVPN_SSTP_CONFIG *t)
  1757. {
  1758. SERVER *s = a->Server;
  1759. CEDAR *c = s->Cedar;
  1760. UINT ret = ERR_NO_ERROR;
  1761. SERVER_ADMIN_ONLY;
  1762. NO_SUPPORT_FOR_BRIDGE;
  1763. if (s->ServerType != SERVER_TYPE_STANDALONE)
  1764. {
  1765. return ERR_NOT_SUPPORTED;
  1766. }
  1767. SiSetOpenVPNAndSSTPConfig(s, t);
  1768. ALog(a, NULL, "LA_SET_OVPN_SSTP_CONFIG");
  1769. IncrementServerConfigRevision(s);
  1770. return ERR_NO_ERROR;
  1771. }
  1772. // Get configurations for OpenVPN and SSTP
  1773. UINT StGetOpenVpnSstpConfig(ADMIN *a, OPENVPN_SSTP_CONFIG *t)
  1774. {
  1775. SERVER *s = a->Server;
  1776. CEDAR *c = s->Cedar;
  1777. UINT ret = ERR_NO_ERROR;
  1778. SERVER_ADMIN_ONLY;
  1779. NO_SUPPORT_FOR_BRIDGE;
  1780. if (s->ServerType != SERVER_TYPE_STANDALONE)
  1781. {
  1782. return ERR_NOT_SUPPORTED;
  1783. }
  1784. Zero(t, sizeof(OPENVPN_SSTP_CONFIG));
  1785. SiGetOpenVPNAndSSTPConfig(s, t);
  1786. return ERR_NO_ERROR;
  1787. }
  1788. // Get status of DDNS client
  1789. UINT StGetDDnsClientStatus(ADMIN *a, DDNS_CLIENT_STATUS *t)
  1790. {
  1791. SERVER *s = a->Server;
  1792. CEDAR *c = s->Cedar;
  1793. UINT ret = ERR_NO_ERROR;
  1794. SERVER_ADMIN_ONLY;
  1795. NO_SUPPORT_FOR_BRIDGE;
  1796. if (s->DDnsClient == NULL)
  1797. {
  1798. return ERR_NOT_SUPPORTED;
  1799. }
  1800. Zero(t, sizeof(DDNS_CLIENT_STATUS));
  1801. DCGetStatus(s->DDnsClient, t);
  1802. return ERR_NO_ERROR;
  1803. }
  1804. // Change host-name for DDNS client
  1805. UINT StChangeDDnsClientHostname(ADMIN *a, RPC_TEST *t)
  1806. {
  1807. SERVER *s = a->Server;
  1808. CEDAR *c = s->Cedar;
  1809. UINT ret = ERR_NO_ERROR;
  1810. SERVER_ADMIN_ONLY;
  1811. NO_SUPPORT_FOR_BRIDGE;
  1812. if (s->DDnsClient == NULL)
  1813. {
  1814. return ERR_NOT_SUPPORTED;
  1815. }
  1816. ret = DCChangeHostName(s->DDnsClient, t->StrValue);
  1817. if (ret == ERR_NO_ERROR)
  1818. {
  1819. ALog(a, NULL, "LA_DDNS_HOSTNAME_CHANGED", t->StrValue);
  1820. }
  1821. IncrementServerConfigRevision(s);
  1822. return ret;
  1823. }
  1824. // Regenerate server certification
  1825. UINT StRegenerateServerCert(ADMIN *a, RPC_TEST *t)
  1826. {
  1827. SERVER *s = a->Server;
  1828. CEDAR *c = s->Cedar;
  1829. UINT ret = ERR_NO_ERROR;
  1830. X *x;
  1831. K *k;
  1832. SERVER_ADMIN_ONLY;
  1833. SiGenerateDefaultCertEx(&x, &k, t->StrValue);
  1834. SetCedarCert(c, x, k);
  1835. ALog(a, NULL, "LA_REGENERATE_SERVER_CERT", t->StrValue);
  1836. IncrementServerConfigRevision(s);
  1837. FreeX(x);
  1838. FreeK(k);
  1839. return ERR_NO_ERROR;
  1840. }
  1841. // Generate OpenVPN configuration files
  1842. UINT StMakeOpenVpnConfigFile(ADMIN *a, RPC_READ_LOG_FILE *t)
  1843. {
  1844. SERVER *s = a->Server;
  1845. CEDAR *c = s->Cedar;
  1846. UINT ret = ERR_NO_ERROR;
  1847. ZIP_PACKER *p;
  1848. FIFO *f;
  1849. BUF *readme_buf;
  1850. BUF *readme_pdf_buf;
  1851. BUF *sample_buf;
  1852. OPENVPN_SSTP_CONFIG config;
  1853. LIST *port_list;
  1854. char my_hostname[MAX_SIZE];
  1855. SERVER_ADMIN_ONLY;
  1856. NO_SUPPORT_FOR_BRIDGE;
  1857. if (s->ServerType != SERVER_TYPE_STANDALONE)
  1858. {
  1859. return ERR_NOT_SUPPORTED;
  1860. }
  1861. SiGetOpenVPNAndSSTPConfig(s, &config);
  1862. if (config.EnableOpenVPN == false)
  1863. {
  1864. return ERR_OPENVPN_IS_NOT_ENABLED;
  1865. }
  1866. port_list = StrToIntList(config.OpenVPNPortList, true);
  1867. FreeRpcReadLogFile(t);
  1868. Zero(t, sizeof(RPC_READ_LOG_FILE));
  1869. p = NewZipPacker();
  1870. // readme.txt
  1871. readme_buf = ReadDump("|openvpn_readme.txt");
  1872. // readme.pdf
  1873. readme_pdf_buf = ReadDump("|openvpn_readme.pdf");
  1874. // sample.ovpn
  1875. sample_buf = ReadDump("|openvpn_sample.ovpn");
  1876. // host name
  1877. GetMachineHostName(my_hostname, sizeof(my_hostname));
  1878. my_hostname[16] = 0;
  1879. if (readme_buf == NULL || sample_buf == NULL || readme_pdf_buf == NULL)
  1880. {
  1881. ret = ERR_INTERNAL_ERROR;
  1882. }
  1883. else
  1884. {
  1885. BUF *config_l3_buf, *config_l2_buf;
  1886. X *x = NULL;
  1887. BUF *x_buf;
  1888. char protocol[MAX_SIZE];
  1889. UINT port = OPENVPN_UDP_PORT;
  1890. char port_str[MAX_SIZE];
  1891. char hostname[MAX_SIZE];
  1892. char tag_before_hostname[MAX_SIZE];
  1893. DDNS_CLIENT_STATUS ddns;
  1894. UCHAR *zero_buffer;
  1895. UINT zero_buffer_size = 128 * 1024;
  1896. char name_tmp[MAX_SIZE];
  1897. zero_buffer = ZeroMalloc(zero_buffer_size);
  1898. if (x == NULL)
  1899. {
  1900. Lock(c->lock);
  1901. {
  1902. x = CloneX(c->ServerX);
  1903. }
  1904. Unlock(c->lock);
  1905. if (x != NULL)
  1906. {
  1907. // Get the root certificate
  1908. if (x->root_cert == false)
  1909. {
  1910. X *root_x = NULL;
  1911. LIST *cert_list = NewCertList(true);
  1912. if (TryGetRootCertChain(cert_list, x, true, &root_x))
  1913. {
  1914. FreeX(x);
  1915. x = root_x;
  1916. }
  1917. FreeCertList(cert_list);
  1918. }
  1919. }
  1920. }
  1921. x_buf = XToBuf(x, true);
  1922. SeekBufToEnd(x_buf);
  1923. WriteBufChar(x_buf, 0);
  1924. SeekBufToBegin(x_buf);
  1925. FreeX(x);
  1926. Zero(hostname, sizeof(hostname));
  1927. Zero(tag_before_hostname, sizeof(tag_before_hostname));
  1928. Zero(&ddns, sizeof(ddns));
  1929. if (s->DDnsClient != NULL)
  1930. {
  1931. DCGetStatus(s->DDnsClient, &ddns);
  1932. if (IsEmptyStr(ddns.CurrentHostName) == false && IsEmptyStr(ddns.DnsSuffix) == false &&
  1933. ddns.Err_IPv4 == ERR_NO_ERROR)
  1934. {
  1935. StrCpy(tag_before_hostname, sizeof(tag_before_hostname),
  1936. "# Note: The below hostname is came from the Dynamic DNS Client function\r\n"
  1937. "# which is running on the VPN Server. If you don't want to use\r\n"
  1938. "# the Dynamic DNS hostname, replace it to either IP address or\r\n"
  1939. "# other domain's hostname.\r\n\r\n");
  1940. Format(hostname, sizeof(hostname), "%s.v4%s", ddns.CurrentHostName, ddns.DnsSuffix);
  1941. }
  1942. }
  1943. if (IsEmptyStr(hostname))
  1944. {
  1945. IP myip;
  1946. Zero(&myip, sizeof(myip));
  1947. GetCurrentGlobalIP(&myip, false);
  1948. if (IsZeroIP(&myip))
  1949. {
  1950. GetCurrentGlobalIPGuess(&myip, false);
  1951. }
  1952. IPToStr(hostname, sizeof(hostname), &myip);
  1953. }
  1954. SeekBuf(sample_buf, sample_buf->Size, 0);
  1955. WriteBuf(sample_buf, zero_buffer, zero_buffer_size);
  1956. config_l3_buf = CloneBuf(sample_buf);
  1957. config_l2_buf = CloneBuf(sample_buf);
  1958. // Generate contents of configuration
  1959. if (LIST_NUM(port_list) >= 1)
  1960. {
  1961. StrCpy(protocol, sizeof(protocol), "udp");
  1962. if (IsIntInList(port_list, OPENVPN_UDP_PORT))
  1963. {
  1964. port = OPENVPN_UDP_PORT;
  1965. }
  1966. else
  1967. {
  1968. port = *((UINT *)(LIST_DATA(port_list, 0)));
  1969. }
  1970. }
  1971. else
  1972. {
  1973. RPC_LISTENER_LIST tt;
  1974. UINT i;
  1975. port = 0;
  1976. StrCpy(protocol, sizeof(protocol), "tcp");
  1977. Zero(&tt, sizeof(tt));
  1978. StEnumListener(a, &tt);
  1979. for (i = 0;i < tt.NumPort;i++)
  1980. {
  1981. if (tt.Enables[i] && tt.Errors[i] == false)
  1982. {
  1983. port = tt.Ports[i];
  1984. break;
  1985. }
  1986. }
  1987. FreeRpcListenerList(&tt);
  1988. if (port == 0)
  1989. {
  1990. StrCpy(protocol, sizeof(protocol), "udp");
  1991. port = OPENVPN_UDP_PORT;
  1992. }
  1993. }
  1994. ToStr(port_str, port);
  1995. if (IsEmptyStr(my_hostname) == false)
  1996. {
  1997. StrCat(my_hostname, sizeof(my_hostname), "_");
  1998. StrLower(my_hostname);
  1999. }
  2000. ZipAddFileSimple(p, "readme.txt", LocalTime64(), 0, readme_buf->Buf, readme_buf->Size);
  2001. ZipAddFileSimple(p, "readme.pdf", LocalTime64(), 0, readme_pdf_buf->Buf, readme_pdf_buf->Size);
  2002. ReplaceStrEx((char *)config_l3_buf->Buf, config_l3_buf->Size, (char *)config_l3_buf->Buf,
  2003. "$TAG_TUN_TAP$", "tun", false);
  2004. ReplaceStrEx((char *)config_l3_buf->Buf, config_l3_buf->Size, (char *)config_l3_buf->Buf,
  2005. "$TAG_PROTO$", protocol, false);
  2006. ReplaceStrEx((char *)config_l3_buf->Buf, config_l3_buf->Size, (char *)config_l3_buf->Buf,
  2007. "$TAG_HOSTNAME$", hostname, false);
  2008. ReplaceStrEx((char *)config_l3_buf->Buf, config_l3_buf->Size, (char *)config_l3_buf->Buf,
  2009. "$TAG_BEFORE_REMOTE$", tag_before_hostname, false);
  2010. ReplaceStrEx((char *)config_l3_buf->Buf, config_l3_buf->Size, (char *)config_l3_buf->Buf,
  2011. "$TAG_PORT$", port_str, false);
  2012. if (x_buf != NULL)
  2013. {
  2014. ReplaceStrEx((char *)config_l3_buf->Buf, config_l3_buf->Size, (char *)config_l3_buf->Buf,
  2015. "$CA$", x_buf->Buf, false);
  2016. }
  2017. Format(name_tmp, sizeof(name_tmp), "%sopenvpn_remote_access_l3.ovpn", my_hostname);
  2018. ZipAddFileSimple(p, name_tmp, LocalTime64(), 0, config_l3_buf->Buf, StrLen(config_l3_buf->Buf));
  2019. ReplaceStrEx((char *)config_l2_buf->Buf, config_l2_buf->Size, (char *)config_l2_buf->Buf,
  2020. "$TAG_TUN_TAP$", "tap", false);
  2021. ReplaceStrEx((char *)config_l2_buf->Buf, config_l2_buf->Size, (char *)config_l2_buf->Buf,
  2022. "$TAG_PROTO$", protocol, false);
  2023. ReplaceStrEx((char *)config_l2_buf->Buf, config_l2_buf->Size, (char *)config_l2_buf->Buf,
  2024. "$TAG_HOSTNAME$", hostname, false);
  2025. ReplaceStrEx((char *)config_l2_buf->Buf, config_l2_buf->Size, (char *)config_l2_buf->Buf,
  2026. "$TAG_BEFORE_REMOTE$", tag_before_hostname, false);
  2027. ReplaceStrEx((char *)config_l2_buf->Buf, config_l2_buf->Size, (char *)config_l2_buf->Buf,
  2028. "$TAG_PORT$", port_str, false);
  2029. if (x_buf != NULL)
  2030. {
  2031. ReplaceStrEx((char *)config_l2_buf->Buf, config_l2_buf->Size, (char *)config_l2_buf->Buf,
  2032. "$CA$", x_buf->Buf, false);
  2033. }
  2034. Format(name_tmp, sizeof(name_tmp), "%sopenvpn_site_to_site_bridge_l2.ovpn", my_hostname);
  2035. ZipAddFileSimple(p, name_tmp, LocalTime64(), 0, config_l2_buf->Buf, StrLen(config_l2_buf->Buf));
  2036. FreeBuf(config_l3_buf);
  2037. FreeBuf(config_l2_buf);
  2038. f = ZipFinish(p);
  2039. if (f != NULL)
  2040. {
  2041. t->Buffer = NewBuf();
  2042. WriteBuf(t->Buffer, FifoPtr(f), FifoSize(f));
  2043. SeekBuf(t->Buffer, 0, 0);
  2044. }
  2045. FreeBuf(readme_buf);
  2046. FreeBuf(sample_buf);
  2047. FreeBuf(readme_pdf_buf);
  2048. FreeBuf(x_buf);
  2049. Free(zero_buffer);
  2050. }
  2051. FreeStrList(port_list);
  2052. FreeZipPacker(p);
  2053. return ERR_NO_ERROR;
  2054. }
  2055. // Set IPsec service configuration
  2056. UINT StSetIPsecServices(ADMIN *a, IPSEC_SERVICES *t)
  2057. {
  2058. SERVER *s = a->Server;
  2059. CEDAR *c = s->Cedar;
  2060. UINT ret = ERR_NO_ERROR;
  2061. SERVER_ADMIN_ONLY;
  2062. NO_SUPPORT_FOR_BRIDGE;
  2063. if (GetServerCapsBool(s, "b_support_ipsec") == false || s->IPsecServer == NULL)
  2064. {
  2065. return ERR_NOT_SUPPORTED;
  2066. }
  2067. IPsecServerSetServices(s->IPsecServer, t);
  2068. ALog(a, NULL, "LA_SET_IPSEC_CONFIG");
  2069. IncrementServerConfigRevision(s);
  2070. return ERR_NO_ERROR;
  2071. }
  2072. // Get IPsec service configuration
  2073. UINT StGetIPsecServices(ADMIN *a, IPSEC_SERVICES *t)
  2074. {
  2075. SERVER *s = a->Server;
  2076. CEDAR *c = s->Cedar;
  2077. UINT ret = ERR_NO_ERROR;
  2078. SERVER_ADMIN_ONLY;
  2079. NO_SUPPORT_FOR_BRIDGE;
  2080. if (GetServerCapsBool(s, "b_support_ipsec") == false || s->IPsecServer == NULL)
  2081. {
  2082. return ERR_NOT_SUPPORTED;
  2083. }
  2084. Zero(t, sizeof(IPSEC_SERVICES));
  2085. IPsecServerGetServices(s->IPsecServer, t);
  2086. return ERR_NO_ERROR;
  2087. }
  2088. // Add EtherIP ID setting
  2089. UINT StAddEtherIpId(ADMIN *a, ETHERIP_ID *t)
  2090. {
  2091. SERVER *s = a->Server;
  2092. CEDAR *c = s->Cedar;
  2093. UINT ret = ERR_NO_ERROR;
  2094. SERVER_ADMIN_ONLY;
  2095. NO_SUPPORT_FOR_BRIDGE;
  2096. if (GetServerCapsBool(s, "b_support_ipsec") == false || s->IPsecServer == NULL)
  2097. {
  2098. return ERR_NOT_SUPPORTED;
  2099. }
  2100. AddEtherIPId(s->IPsecServer, t);
  2101. ALog(a, NULL, "LA_ADD_ETHERIP_ID", t->Id);
  2102. IncrementServerConfigRevision(s);
  2103. return ERR_NO_ERROR;
  2104. }
  2105. // Get EtherIP ID setting
  2106. UINT StGetEtherIpId(ADMIN *a, ETHERIP_ID *t)
  2107. {
  2108. SERVER *s = a->Server;
  2109. CEDAR *c = s->Cedar;
  2110. UINT ret = ERR_NO_ERROR;
  2111. char id[MAX_SIZE];
  2112. SERVER_ADMIN_ONLY;
  2113. NO_SUPPORT_FOR_BRIDGE;
  2114. if (GetServerCapsBool(s, "b_support_ipsec") == false || s->IPsecServer == NULL)
  2115. {
  2116. return ERR_NOT_SUPPORTED;
  2117. }
  2118. StrCpy(id, sizeof(id), t->Id);
  2119. Zero(t, sizeof(ETHERIP_ID));
  2120. if (SearchEtherIPId(s->IPsecServer, t, id) == false)
  2121. {
  2122. return ERR_OBJECT_NOT_FOUND;
  2123. }
  2124. return ERR_NO_ERROR;
  2125. }
  2126. // Delete EtherIP ID setting
  2127. UINT StDeleteEtherIpId(ADMIN *a, ETHERIP_ID *t)
  2128. {
  2129. SERVER *s = a->Server;
  2130. CEDAR *c = s->Cedar;
  2131. UINT ret = ERR_NO_ERROR;
  2132. char id[MAX_SIZE];
  2133. SERVER_ADMIN_ONLY;
  2134. NO_SUPPORT_FOR_BRIDGE;
  2135. if (GetServerCapsBool(s, "b_support_ipsec") == false || s->IPsecServer == NULL)
  2136. {
  2137. return ERR_NOT_SUPPORTED;
  2138. }
  2139. StrCpy(id, sizeof(id), t->Id);
  2140. if (DeleteEtherIPId(s->IPsecServer, id) == false)
  2141. {
  2142. return ERR_OBJECT_NOT_FOUND;
  2143. }
  2144. ALog(a, NULL, "LA_DEL_ETHERIP_ID", id);
  2145. IncrementServerConfigRevision(s);
  2146. return ERR_NO_ERROR;
  2147. }
  2148. // Enumerate EtherIP ID settings
  2149. UINT StEnumEtherIpId(ADMIN *a, RPC_ENUM_ETHERIP_ID *t)
  2150. {
  2151. SERVER *s = a->Server;
  2152. CEDAR *c = s->Cedar;
  2153. UINT ret = ERR_NO_ERROR;
  2154. SERVER_ADMIN_ONLY;
  2155. NO_SUPPORT_FOR_BRIDGE;
  2156. if (GetServerCapsBool(s, "b_support_ipsec") == false || s->IPsecServer == NULL)
  2157. {
  2158. return ERR_NOT_SUPPORTED;
  2159. }
  2160. FreeRpcEnumEtherIpId(t);
  2161. Zero(t, sizeof(RPC_ENUM_ETHERIP_ID));
  2162. Lock(s->IPsecServer->LockSettings);
  2163. {
  2164. UINT i;
  2165. UINT num;
  2166. num = LIST_NUM(s->IPsecServer->EtherIPIdList);
  2167. t->NumItem = num;
  2168. t->IdList = ZeroMalloc(sizeof(ETHERIP_ID) * num);
  2169. for (i = 0;i < num;i++)
  2170. {
  2171. ETHERIP_ID *d = &t->IdList[i];
  2172. ETHERIP_ID *src = LIST_DATA(s->IPsecServer->EtherIPIdList, i);
  2173. Copy(d, src, sizeof(ETHERIP_ID));
  2174. }
  2175. }
  2176. Unlock(s->IPsecServer->LockSettings);
  2177. return ERR_NO_ERROR;
  2178. }
  2179. // Set message of today on hub
  2180. UINT StSetHubMsg(ADMIN *a, RPC_MSG *t)
  2181. {
  2182. SERVER *s = a->Server;
  2183. CEDAR *c = s->Cedar;
  2184. HUB *h;
  2185. UINT ret = ERR_NO_ERROR;
  2186. char hubname[MAX_HUBNAME_LEN + 1];
  2187. CHECK_RIGHT;
  2188. NO_SUPPORT_FOR_BRIDGE;
  2189. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2190. {
  2191. return ERR_NOT_SUPPORTED;
  2192. }
  2193. if (UniStrLen(t->Msg) > HUB_MAXMSG_LEN)
  2194. {
  2195. return ERR_MEMORY_NOT_ENOUGH;
  2196. }
  2197. StrCpy(hubname, sizeof(hubname), t->HubName);
  2198. h = GetHub(c, hubname);
  2199. if (h == NULL)
  2200. {
  2201. ret = ERR_HUB_NOT_FOUND;
  2202. }
  2203. else
  2204. {
  2205. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_msg") != 0)
  2206. {
  2207. ret = ERR_NOT_ENOUGH_RIGHT;
  2208. }
  2209. else
  2210. {
  2211. SetHubMsg(h, t->Msg);
  2212. }
  2213. ReleaseHub(h);
  2214. }
  2215. IncrementServerConfigRevision(s);
  2216. return ret;
  2217. }
  2218. // Get message of today on hub
  2219. UINT StGetHubMsg(ADMIN *a, RPC_MSG *t)
  2220. {
  2221. SERVER *s = a->Server;
  2222. CEDAR *c = s->Cedar;
  2223. HUB *h;
  2224. UINT ret = ERR_NO_ERROR;
  2225. char hubname[MAX_HUBNAME_LEN + 1];
  2226. CHECK_RIGHT;
  2227. NO_SUPPORT_FOR_BRIDGE;
  2228. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2229. {
  2230. return ERR_NOT_SUPPORTED;
  2231. }
  2232. if (UniStrLen(t->Msg) > HUB_MAXMSG_LEN)
  2233. {
  2234. return ERR_MEMORY_NOT_ENOUGH;
  2235. }
  2236. StrCpy(hubname, sizeof(hubname), t->HubName);
  2237. h = GetHub(c, hubname);
  2238. if (h == NULL)
  2239. {
  2240. ret = ERR_HUB_NOT_FOUND;
  2241. }
  2242. else
  2243. {
  2244. FreeRpcMsg(t);
  2245. Zero(t, sizeof(RPC_MSG));
  2246. t->Msg = GetHubMsg(h);
  2247. ReleaseHub(h);
  2248. }
  2249. return ret;
  2250. }
  2251. // Do debug function
  2252. UINT StDebug(ADMIN *a, RPC_TEST *t)
  2253. {
  2254. SERVER *s = a->Server;
  2255. CEDAR *c = s->Cedar;
  2256. UINT ret = ERR_NO_ERROR;
  2257. RPC_TEST t2;
  2258. SERVER_ADMIN_ONLY;
  2259. Zero(&t2, sizeof(t2));
  2260. ret = SiDebug(s, &t2, t->IntValue, t->StrValue);
  2261. if (ret == ERR_NO_ERROR)
  2262. {
  2263. Copy(t, &t2, sizeof(RPC_TEST));
  2264. }
  2265. else
  2266. {
  2267. Zero(t, sizeof(RPC_TEST));
  2268. }
  2269. return ret;
  2270. }
  2271. // Flush configuration file
  2272. UINT StFlush(ADMIN *a, RPC_TEST *t)
  2273. {
  2274. SERVER *s = a->Server;
  2275. CEDAR *c = s->Cedar;
  2276. UINT ret = ERR_NO_ERROR;
  2277. UINT size;
  2278. SERVER_ADMIN_ONLY;
  2279. size = SiWriteConfigurationFile(s);
  2280. t->IntValue = size;
  2281. return ERR_NO_ERROR;
  2282. }
  2283. // Do Crash
  2284. UINT StCrash(ADMIN *a, RPC_TEST *t)
  2285. {
  2286. SERVER *s = a->Server;
  2287. CEDAR *c = s->Cedar;
  2288. UINT ret = ERR_NO_ERROR;
  2289. SERVER_ADMIN_ONLY;
  2290. #ifdef OS_WIN32
  2291. MsSetEnableMinidump(false);
  2292. #endif // OS_WIN32
  2293. CrashNow();
  2294. return ERR_NO_ERROR;
  2295. }
  2296. // Get message for administrators
  2297. UINT StGetAdminMsg(ADMIN *a, RPC_MSG *t)
  2298. {
  2299. SERVER *s = a->Server;
  2300. CEDAR *c = s->Cedar;
  2301. UINT ret = ERR_NO_ERROR;
  2302. RPC_WINVER server_ver;
  2303. RPC_WINVER client_ver;
  2304. wchar_t winver_msg_client[3800];
  2305. wchar_t winver_msg_server[3800];
  2306. UINT tmpsize;
  2307. wchar_t *tmp;
  2308. FreeRpcMsg(t);
  2309. Zero(t, sizeof(RPC_MSG));
  2310. // Check for Windows version
  2311. GetWinVer(&server_ver);
  2312. Copy(&client_ver, &a->ClientWinVer, sizeof(RPC_WINVER));
  2313. Zero(winver_msg_client, sizeof(winver_msg_client));
  2314. Zero(winver_msg_server, sizeof(winver_msg_server));
  2315. if (IsSupportedWinVer(&client_ver) == false)
  2316. {
  2317. SYSTEMTIME st;
  2318. LocalTime(&st);
  2319. UniFormat(winver_msg_client, sizeof(winver_msg_client), _UU("WINVER_ERROR_FORMAT"),
  2320. _UU("WINVER_ERROR_PC_LOCAL"),
  2321. client_ver.Title,
  2322. _UU("WINVER_ERROR_VPNSERVER"),
  2323. SUPPORTED_WINDOWS_LIST,
  2324. _UU("WINVER_ERROR_PC_LOCAL"),
  2325. _UU("WINVER_ERROR_VPNSERVER"),
  2326. _UU("WINVER_ERROR_VPNSERVER"),
  2327. _UU("WINVER_ERROR_VPNSERVER"),
  2328. st.wYear, st.wMonth);
  2329. }
  2330. if (IsSupportedWinVer(&server_ver) == false)
  2331. {
  2332. SYSTEMTIME st;
  2333. LocalTime(&st);
  2334. UniFormat(winver_msg_server, sizeof(winver_msg_server), _UU("WINVER_ERROR_FORMAT"),
  2335. _UU("WINVER_ERROR_PC_REMOTE"),
  2336. server_ver.Title,
  2337. _UU("WINVER_ERROR_VPNSERVER"),
  2338. SUPPORTED_WINDOWS_LIST,
  2339. _UU("WINVER_ERROR_PC_REMOTE"),
  2340. _UU("WINVER_ERROR_VPNSERVER"),
  2341. _UU("WINVER_ERROR_VPNSERVER"),
  2342. _UU("WINVER_ERROR_VPNSERVER"),
  2343. st.wYear, st.wMonth);
  2344. }
  2345. tmpsize = UniStrSize(winver_msg_client) + UniStrSize(winver_msg_server) + 10000;
  2346. tmp = ZeroMalloc(tmpsize);
  2347. if (
  2348. c->Bridge == false)
  2349. {
  2350. if (GetGlobalServerFlag(GSF_SHOW_OSS_MSG) != 0)
  2351. {
  2352. UniStrCat(tmp, tmpsize, _UU("OSS_MSG"));
  2353. }
  2354. }
  2355. UniStrCat(tmp, tmpsize, winver_msg_client);
  2356. UniStrCat(tmp, tmpsize, winver_msg_server);
  2357. t->Msg = tmp;
  2358. return ERR_NO_ERROR;
  2359. }
  2360. // Enumerate VLAN tag transparent setting
  2361. UINT StEnumEthVLan(ADMIN *a, RPC_ENUM_ETH_VLAN *t)
  2362. {
  2363. SERVER *s = a->Server;
  2364. CEDAR *c = s->Cedar;
  2365. UINT ret = ERR_NO_ERROR;
  2366. SERVER_ADMIN_ONLY;
  2367. #ifdef OS_WIN32
  2368. if (GetServerCapsBool(s, "b_support_eth_vlan") == false)
  2369. {
  2370. ret = ERR_NOT_SUPPORTED;
  2371. }
  2372. else
  2373. {
  2374. FreeRpcEnumEthVLan(t);
  2375. Zero(t, sizeof(RPC_ENUM_ETH_VLAN));
  2376. if (EnumEthVLanWin32(t) == false)
  2377. {
  2378. ret = ERR_INTERNAL_ERROR;
  2379. }
  2380. }
  2381. #else // OS_WIN32
  2382. ret = ERR_NOT_SUPPORTED;
  2383. #endif // OS_WIN32
  2384. return ret;
  2385. }
  2386. // Set VLAN tag transparent setting
  2387. UINT StSetEnableEthVLan(ADMIN *a, RPC_TEST *t)
  2388. {
  2389. SERVER *s = a->Server;
  2390. CEDAR *c = s->Cedar;
  2391. UINT ret = ERR_NO_ERROR;
  2392. SERVER_ADMIN_ONLY;
  2393. #ifdef OS_WIN32
  2394. if (GetServerCapsBool(s, "b_support_eth_vlan") == false)
  2395. {
  2396. ret = ERR_NOT_SUPPORTED;
  2397. }
  2398. else if (MsIsAdmin() == false)
  2399. {
  2400. ret = ERR_NOT_ENOUGH_RIGHT;
  2401. }
  2402. else
  2403. {
  2404. if (SetVLanEnableStatus(t->StrValue, MAKEBOOL(t->IntValue)) == false)
  2405. {
  2406. ret = ERR_INTERNAL_ERROR;
  2407. }
  2408. }
  2409. #else // OS_WIN32
  2410. ret = ERR_NOT_SUPPORTED;
  2411. #endif // OS_WIN32
  2412. return ret;
  2413. }
  2414. // Get license status
  2415. UINT StGetLicenseStatus(ADMIN *a, RPC_LICENSE_STATUS *t)
  2416. {
  2417. return ERR_NOT_SUPPORTED;
  2418. }
  2419. // Enumerate license key
  2420. UINT StEnumLicenseKey(ADMIN *a, RPC_ENUM_LICENSE_KEY *t)
  2421. {
  2422. return ERR_NOT_SUPPORTED;
  2423. }
  2424. // Add new license key
  2425. UINT StAddLicenseKey(ADMIN *a, RPC_TEST *t)
  2426. {
  2427. return ERR_NOT_SUPPORTED;
  2428. }
  2429. // Delete a license key
  2430. UINT StDelLicenseKey(ADMIN *a, RPC_TEST *t)
  2431. {
  2432. return ERR_NOT_SUPPORTED;
  2433. }
  2434. // Download a log file
  2435. BUF *DownloadFileFromServer(RPC *r, char *server_name, char *filepath, UINT total_size, DOWNLOAD_PROC *proc, void *param)
  2436. {
  2437. UINT offset;
  2438. BUF *buf;
  2439. // Validate arguments
  2440. if (r == NULL || filepath == NULL)
  2441. {
  2442. return NULL;
  2443. }
  2444. if (server_name == NULL)
  2445. {
  2446. server_name = "";
  2447. }
  2448. offset = 0;
  2449. buf = NewBuf();
  2450. while (true)
  2451. {
  2452. DOWNLOAD_PROGRESS g;
  2453. RPC_READ_LOG_FILE t;
  2454. UINT ret;
  2455. Zero(&t, sizeof(t));
  2456. StrCpy(t.FilePath, sizeof(t.FilePath), filepath);
  2457. t.Offset = offset;
  2458. StrCpy(t.ServerName, sizeof(t.ServerName), server_name);
  2459. ret = ScReadLogFile(r, &t);
  2460. if (ret != ERR_NO_ERROR)
  2461. {
  2462. // Failed
  2463. FreeRpcReadLogFile(&t);
  2464. FreeBuf(buf);
  2465. return NULL;
  2466. }
  2467. if (t.Buffer == NULL)
  2468. {
  2469. // read to the end
  2470. break;
  2471. }
  2472. // Update current progress
  2473. offset += t.Buffer->Size;
  2474. Zero(&g, sizeof(g));
  2475. g.Param = param;
  2476. g.CurrentSize = offset;
  2477. g.TotalSize = MAX(total_size, offset);
  2478. g.ProgressPercent = (UINT)(MAKESURE((UINT64)g.CurrentSize * 100ULL / (UINT64)(MAX(g.TotalSize, 1)), 0, 100ULL));
  2479. WriteBuf(buf, t.Buffer->Buf, t.Buffer->Size);
  2480. FreeRpcReadLogFile(&t);
  2481. if (proc != NULL)
  2482. {
  2483. if (proc(&g) == false)
  2484. {
  2485. // Canceled by user
  2486. FreeBuf(buf);
  2487. return NULL;
  2488. }
  2489. }
  2490. }
  2491. if (buf->Size == 0)
  2492. {
  2493. // Downloading failed
  2494. FreeBuf(buf);
  2495. return NULL;
  2496. }
  2497. return buf;
  2498. }
  2499. // Read a log file
  2500. UINT StReadLogFile(ADMIN *a, RPC_READ_LOG_FILE *t)
  2501. {
  2502. SERVER *s = a->Server;
  2503. CEDAR *c = s->Cedar;
  2504. char logfilename[MAX_PATH];
  2505. char servername[MAX_HOST_NAME_LEN + 1];
  2506. UINT offset;
  2507. bool local = true;
  2508. if (IsEmptyStr(t->FilePath))
  2509. {
  2510. return ERR_INVALID_PARAMETER;
  2511. }
  2512. StrCpy(logfilename, sizeof(logfilename), t->FilePath);
  2513. StrCpy(servername, sizeof(servername), t->ServerName);
  2514. offset = t->Offset;
  2515. if (s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  2516. {
  2517. GetMachineName(servername, sizeof(servername));
  2518. }
  2519. // Check the permission to read the log file
  2520. if (a->LogFileList == NULL)
  2521. {
  2522. // Enum the log files first
  2523. RPC_ENUM_LOG_FILE elf;
  2524. UINT elf_ret;
  2525. Zero(&elf, sizeof(elf));
  2526. elf_ret = StEnumLogFile(a, &elf);
  2527. FreeRpcEnumLogFile(&elf);
  2528. if (elf_ret != ERR_NO_ERROR)
  2529. {
  2530. return elf_ret;
  2531. }
  2532. }
  2533. if (CheckLogFileNameFromEnumList(a->LogFileList, logfilename, servername) == false)
  2534. {
  2535. // There is no such file in the log file list
  2536. return ERR_OBJECT_NOT_FOUND;
  2537. }
  2538. FreeRpcReadLogFile(t);
  2539. Zero(t, sizeof(RPC_READ_LOG_FILE));
  2540. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  2541. {
  2542. UINT i;
  2543. // When the host name in request is a cluster member, redirect the request
  2544. LockList(s->FarmMemberList);
  2545. {
  2546. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  2547. {
  2548. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  2549. if (f->Me == false)
  2550. {
  2551. if (StrCmpi(f->hostname, servername) == 0)
  2552. {
  2553. RPC_READ_LOG_FILE tt;
  2554. Zero(&tt, sizeof(tt));
  2555. local = false;
  2556. StrCpy(tt.ServerName, sizeof(tt.ServerName), servername);
  2557. StrCpy(tt.FilePath, sizeof(tt.FilePath), logfilename);
  2558. tt.Offset = offset;
  2559. if (SiCallReadLogFile(s, f, &tt))
  2560. {
  2561. if (tt.Buffer != NULL && tt.Buffer->Size > 0)
  2562. {
  2563. t->Buffer = NewBuf();
  2564. WriteBuf(t->Buffer, tt.Buffer->Buf, tt.Buffer->Size);
  2565. }
  2566. }
  2567. FreeRpcReadLogFile(&tt);
  2568. break;
  2569. }
  2570. }
  2571. }
  2572. }
  2573. UnlockList(s->FarmMemberList);
  2574. }
  2575. // Read a local file
  2576. if (local)
  2577. {
  2578. SiReadLocalLogFile(s, logfilename, offset, t);
  2579. }
  2580. if (offset == 0)
  2581. {
  2582. ALog(a, NULL, "LA_READ_LOG_FILE", servername, logfilename);
  2583. }
  2584. StrCpy(t->FilePath, sizeof(t->FilePath), logfilename);
  2585. StrCpy(t->ServerName, sizeof(t->ServerName), servername);
  2586. t->Offset = offset;
  2587. return ERR_NO_ERROR;
  2588. }
  2589. // Enumerate log files
  2590. UINT StEnumLogFile(ADMIN *a, RPC_ENUM_LOG_FILE *t)
  2591. {
  2592. SERVER *s = a->Server;
  2593. CEDAR *c = s->Cedar;
  2594. UINT i;
  2595. bool no_access = false;
  2596. HUB *h;
  2597. if (a->ServerAdmin == false)
  2598. {
  2599. h = GetHub(c, a->HubName);
  2600. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_read_log_file") != 0)
  2601. {
  2602. no_access = true;
  2603. }
  2604. ReleaseHub(h);
  2605. }
  2606. if (no_access)
  2607. {
  2608. return ERR_NOT_ENOUGH_RIGHT;
  2609. }
  2610. FreeRpcEnumLogFile(t);
  2611. Zero(t, sizeof(RPC_ENUM_LOG_FILE));
  2612. // Enumerate local log files
  2613. SiEnumLocalLogFileList(s, a->ServerAdmin ? NULL : a->HubName, t);
  2614. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  2615. {
  2616. UINT i;
  2617. LIST *tt_list = NewListFast(NULL);
  2618. LockList(s->FarmMemberList);
  2619. {
  2620. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  2621. {
  2622. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  2623. if (f->Me == false)
  2624. {
  2625. // Enumerate log files on other cluster members.
  2626. RPC_ENUM_LOG_FILE *tt;
  2627. tt = ZeroMalloc(sizeof(RPC_ENUM_LOG_FILE));
  2628. if (SiCallEnumLogFileList(s, f, tt, a->ServerAdmin ? "" : a->HubName))
  2629. {
  2630. UINT i;
  2631. for (i = 0;i < tt->NumItem;i++)
  2632. {
  2633. RPC_ENUM_LOG_FILE_ITEM *e = &tt->Items[i];
  2634. StrCpy(e->ServerName, sizeof(e->ServerName), f->hostname);
  2635. }
  2636. Add(tt_list, tt);
  2637. }
  2638. else
  2639. {
  2640. Free(tt);
  2641. }
  2642. }
  2643. }
  2644. }
  2645. UnlockList(s->FarmMemberList);
  2646. for (i = 0;i < LIST_NUM(tt_list);i++)
  2647. {
  2648. RPC_ENUM_LOG_FILE *tt = LIST_DATA(tt_list, i);
  2649. AdjoinRpcEnumLogFile(t, tt);
  2650. FreeRpcEnumLogFile(tt);
  2651. Free(tt);
  2652. }
  2653. ReleaseList(tt_list);
  2654. }
  2655. // Cache the last list of log files on RPC session
  2656. if (a->LogFileList != NULL)
  2657. {
  2658. FreeEnumLogFile(a->LogFileList);
  2659. }
  2660. a->LogFileList = NewListFast(CmpLogFile);
  2661. for (i = 0;i < t->NumItem;i++)
  2662. {
  2663. RPC_ENUM_LOG_FILE_ITEM *e = &t->Items[i];
  2664. LOG_FILE *f = ZeroMalloc(sizeof(LOG_FILE));
  2665. f->FileSize = e->FileSize;
  2666. f->UpdatedTime = e->UpdatedTime;
  2667. StrCpy(f->Path, sizeof(f->Path), e->FilePath);
  2668. StrCpy(f->ServerName, sizeof(f->ServerName), e->ServerName);
  2669. Insert(a->LogFileList, f);
  2670. }
  2671. return ERR_NO_ERROR;
  2672. }
  2673. // Get access control list
  2674. UINT StGetAcList(ADMIN *a, RPC_AC_LIST *t)
  2675. {
  2676. SERVER *s = a->Server;
  2677. CEDAR *c = s->Cedar;
  2678. HUB *h;
  2679. UINT ret = ERR_NO_ERROR;
  2680. char hubname[MAX_HUBNAME_LEN + 1];
  2681. CHECK_RIGHT;
  2682. NO_SUPPORT_FOR_BRIDGE;
  2683. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2684. {
  2685. return ERR_NOT_SUPPORTED;
  2686. }
  2687. StrCpy(hubname, sizeof(hubname), t->HubName);
  2688. FreeRpcAcList(t);
  2689. Zero(t, sizeof(RPC_AC_LIST));
  2690. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  2691. h = GetHub(c, hubname);
  2692. if (h == NULL)
  2693. {
  2694. ret = ERR_HUB_NOT_FOUND;
  2695. }
  2696. else
  2697. {
  2698. if (h->HubDb == NULL)
  2699. {
  2700. ret = ERR_NOT_SUPPORTED;
  2701. }
  2702. else
  2703. {
  2704. HUBDB *db = h->HubDb;
  2705. LockList(db->AcList);
  2706. {
  2707. t->o = NewAcList();
  2708. SetAcList(t->o, db->AcList);
  2709. }
  2710. UnlockList(db->AcList);
  2711. }
  2712. ReleaseHub(h);
  2713. }
  2714. return ret;
  2715. }
  2716. // Set access control list
  2717. UINT StSetAcList(ADMIN *a, RPC_AC_LIST *t)
  2718. {
  2719. SERVER *s = a->Server;
  2720. CEDAR *c = s->Cedar;
  2721. HUB *h;
  2722. UINT ret = ERR_NO_ERROR;
  2723. char hubname[MAX_HUBNAME_LEN + 1];
  2724. if (c->Bridge)
  2725. {
  2726. return ERR_NOT_SUPPORTED;
  2727. }
  2728. if (GetGlobalServerFlag(GSF_DISABLE_AC) != 0 && LIST_NUM(t->o) >= 1)
  2729. {
  2730. return ERR_NOT_SUPPORTED_FUNCTION_ON_OPENSOURCE;
  2731. }
  2732. CHECK_RIGHT;
  2733. NO_SUPPORT_FOR_BRIDGE;
  2734. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2735. {
  2736. return ERR_NOT_SUPPORTED;
  2737. }
  2738. StrCpy(hubname, sizeof(hubname), t->HubName);
  2739. h = GetHub(c, hubname);
  2740. if (h == NULL)
  2741. {
  2742. ret = ERR_HUB_NOT_FOUND;
  2743. }
  2744. else
  2745. {
  2746. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_access_control_list") != 0)
  2747. {
  2748. ret = ERR_NOT_ENOUGH_RIGHT;
  2749. }
  2750. else
  2751. {
  2752. if (h->HubDb == NULL)
  2753. {
  2754. ret = ERR_NOT_SUPPORTED;
  2755. }
  2756. else
  2757. {
  2758. HUBDB *db = h->HubDb;
  2759. LockList(db->AcList);
  2760. {
  2761. SetAcList(db->AcList, t->o);
  2762. {
  2763. ALog(a, h, "LA_SET_AC_LIST", LIST_NUM(t->o));
  2764. IncrementServerConfigRevision(s);
  2765. }
  2766. }
  2767. UnlockList(db->AcList);
  2768. }
  2769. }
  2770. ReleaseHub(h);
  2771. }
  2772. return ret;
  2773. }
  2774. // Set CRL (Certificate Revocation List) entry
  2775. UINT StSetCrl(ADMIN *a, RPC_CRL *t)
  2776. {
  2777. SERVER *s = a->Server;
  2778. CEDAR *c = s->Cedar;
  2779. HUB *h;
  2780. UINT ret = ERR_NO_ERROR;
  2781. UINT key;
  2782. char hubname[MAX_HUBNAME_LEN + 1];
  2783. CHECK_RIGHT;
  2784. NO_SUPPORT_FOR_BRIDGE;
  2785. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2786. {
  2787. return ERR_NOT_SUPPORTED;
  2788. }
  2789. StrCpy(hubname, sizeof(hubname), t->HubName);
  2790. key = t->Key;
  2791. h = GetHub(c, hubname);
  2792. if (h == NULL)
  2793. {
  2794. ret = ERR_HUB_NOT_FOUND;
  2795. }
  2796. else
  2797. {
  2798. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_crl_list") != 0)
  2799. {
  2800. ret = ERR_NOT_ENOUGH_RIGHT;
  2801. }
  2802. else
  2803. {
  2804. if (h->HubDb == NULL)
  2805. {
  2806. ret = ERR_NOT_SUPPORTED;
  2807. }
  2808. else
  2809. {
  2810. LockList(h->HubDb->CrlList);
  2811. {
  2812. CRL *crl = ListKeyToPointer(h->HubDb->CrlList, t->Key);
  2813. if (crl == NULL)
  2814. {
  2815. ret = ERR_OBJECT_NOT_FOUND;
  2816. }
  2817. else
  2818. {
  2819. CRL *new_crl = CopyCrl(t->Crl);
  2820. if (ReplaceListPointer(h->HubDb->CrlList, crl, new_crl))
  2821. {
  2822. ALog(a, h, "LA_ADD_CRL");
  2823. FreeCrl(crl);
  2824. IncrementServerConfigRevision(s);
  2825. }
  2826. }
  2827. }
  2828. UnlockList(h->HubDb->CrlList);
  2829. }
  2830. }
  2831. ReleaseHub(h);
  2832. }
  2833. return ret;
  2834. }
  2835. // Get CRL (Certificate Revocation List) entry
  2836. UINT StGetCrl(ADMIN *a, RPC_CRL *t)
  2837. {
  2838. SERVER *s = a->Server;
  2839. CEDAR *c = s->Cedar;
  2840. HUB *h;
  2841. UINT ret = ERR_NO_ERROR;
  2842. UINT key;
  2843. char hubname[MAX_HUBNAME_LEN + 1];
  2844. CHECK_RIGHT;
  2845. NO_SUPPORT_FOR_BRIDGE;
  2846. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2847. {
  2848. return ERR_NOT_SUPPORTED;
  2849. }
  2850. StrCpy(hubname, sizeof(hubname), t->HubName);
  2851. key = t->Key;
  2852. FreeRpcCrl(t);
  2853. Zero(t, sizeof(RPC_CRL));
  2854. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  2855. t->Key = key;
  2856. h = GetHub(c, hubname);
  2857. if (h == NULL)
  2858. {
  2859. ret = ERR_HUB_NOT_FOUND;
  2860. }
  2861. else
  2862. {
  2863. if (h->HubDb == NULL)
  2864. {
  2865. ret = ERR_NOT_SUPPORTED;
  2866. }
  2867. else
  2868. {
  2869. LockList(h->HubDb->CrlList);
  2870. {
  2871. CRL *crl = ListKeyToPointer(h->HubDb->CrlList, t->Key);
  2872. if (crl == NULL)
  2873. {
  2874. ret = ERR_OBJECT_NOT_FOUND;
  2875. }
  2876. else
  2877. {
  2878. t->Crl = CopyCrl(crl);
  2879. }
  2880. }
  2881. UnlockList(h->HubDb->CrlList);
  2882. }
  2883. ReleaseHub(h);
  2884. }
  2885. return ret;
  2886. }
  2887. // Delete CRL (Certificate Revocation List) entry
  2888. UINT StDelCrl(ADMIN *a, RPC_CRL *t)
  2889. {
  2890. SERVER *s = a->Server;
  2891. CEDAR *c = s->Cedar;
  2892. HUB *h;
  2893. UINT ret = ERR_NO_ERROR;
  2894. char hubname[MAX_HUBNAME_LEN + 1];
  2895. CHECK_RIGHT;
  2896. NO_SUPPORT_FOR_BRIDGE;
  2897. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2898. {
  2899. return ERR_NOT_SUPPORTED;
  2900. }
  2901. StrCpy(hubname, sizeof(hubname), t->HubName);
  2902. h = GetHub(c, hubname);
  2903. if (h == NULL)
  2904. {
  2905. ret = ERR_HUB_NOT_FOUND;
  2906. }
  2907. else
  2908. {
  2909. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_crl_list") != 0)
  2910. {
  2911. ret = ERR_NOT_ENOUGH_RIGHT;
  2912. }
  2913. else
  2914. {
  2915. if (h->HubDb == NULL)
  2916. {
  2917. ret = ERR_NOT_SUPPORTED;
  2918. }
  2919. else
  2920. {
  2921. LockList(h->HubDb->CrlList);
  2922. {
  2923. CRL *crl = ListKeyToPointer(h->HubDb->CrlList, t->Key);
  2924. if (crl == NULL)
  2925. {
  2926. ret = ERR_OBJECT_NOT_FOUND;
  2927. }
  2928. else
  2929. {
  2930. ALog(a, h, "LA_DEL_CRL");
  2931. FreeCrl(crl);
  2932. Delete(h->HubDb->CrlList, crl);
  2933. }
  2934. }
  2935. UnlockList(h->HubDb->CrlList);
  2936. }
  2937. }
  2938. ReleaseHub(h);
  2939. }
  2940. return ret;
  2941. }
  2942. // Add new CRL (Certificate Revocation List) entry
  2943. UINT StAddCrl(ADMIN *a, RPC_CRL *t)
  2944. {
  2945. SERVER *s = a->Server;
  2946. CEDAR *c = s->Cedar;
  2947. HUB *h;
  2948. UINT ret = ERR_NO_ERROR;
  2949. char hubname[MAX_HUBNAME_LEN + 1];
  2950. if (c->Bridge)
  2951. {
  2952. return ERR_NOT_SUPPORTED;
  2953. }
  2954. CHECK_RIGHT;
  2955. NO_SUPPORT_FOR_BRIDGE;
  2956. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  2957. {
  2958. return ERR_NOT_SUPPORTED;
  2959. }
  2960. StrCpy(hubname, sizeof(hubname), t->HubName);
  2961. h = GetHub(c, hubname);
  2962. if (h == NULL)
  2963. {
  2964. ret = ERR_HUB_NOT_FOUND;
  2965. }
  2966. else
  2967. {
  2968. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_crl_list") != 0)
  2969. {
  2970. ret = ERR_NOT_ENOUGH_RIGHT;
  2971. }
  2972. else
  2973. {
  2974. if (h->HubDb == NULL)
  2975. {
  2976. ret = ERR_NOT_SUPPORTED;
  2977. }
  2978. else
  2979. {
  2980. LockList(h->HubDb->CrlList);
  2981. {
  2982. if (LIST_NUM(h->HubDb->CrlList) < MAX_HUB_CRLS)
  2983. {
  2984. CRL *crl = CopyCrl(t->Crl);
  2985. Insert(h->HubDb->CrlList, crl);
  2986. ALog(a, h, "LA_SET_CRL");
  2987. IncrementServerConfigRevision(s);
  2988. }
  2989. }
  2990. UnlockList(h->HubDb->CrlList);
  2991. }
  2992. }
  2993. ReleaseHub(h);
  2994. }
  2995. return ret;
  2996. }
  2997. // Get CRL (Certificate Revocation List) index
  2998. UINT StEnumCrl(ADMIN *a, RPC_ENUM_CRL *t)
  2999. {
  3000. SERVER *s = a->Server;
  3001. CEDAR *c = s->Cedar;
  3002. HUB *h;
  3003. UINT ret = ERR_NO_ERROR;
  3004. char hubname[MAX_HUBNAME_LEN + 1];
  3005. CHECK_RIGHT;
  3006. NO_SUPPORT_FOR_BRIDGE;
  3007. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  3008. {
  3009. return ERR_NOT_SUPPORTED;
  3010. }
  3011. StrCpy(hubname, sizeof(hubname), t->HubName);
  3012. FreeRpcEnumCrl(t);
  3013. Zero(t, sizeof(RPC_ENUM_CRL));
  3014. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  3015. h = GetHub(c, hubname);
  3016. if (h == NULL)
  3017. {
  3018. ret = ERR_HUB_NOT_FOUND;
  3019. }
  3020. else
  3021. {
  3022. if (h->HubDb == NULL)
  3023. {
  3024. ret = ERR_NOT_SUPPORTED;
  3025. }
  3026. else
  3027. {
  3028. LockList(h->HubDb->CrlList);
  3029. {
  3030. UINT i;
  3031. t->NumItem = LIST_NUM(h->HubDb->CrlList);
  3032. t->Items = ZeroMalloc(sizeof(RPC_ENUM_CRL_ITEM) * t->NumItem);
  3033. for (i = 0;i < LIST_NUM(h->HubDb->CrlList);i++)
  3034. {
  3035. CRL *crl = LIST_DATA(h->HubDb->CrlList, i);
  3036. wchar_t *info = GenerateCrlStr(crl);
  3037. UniStrCpy(t->Items[i].CrlInfo, sizeof(t->Items[i].CrlInfo), info);
  3038. Free(info);
  3039. t->Items[i].Key = POINTER_TO_KEY(crl);
  3040. }
  3041. }
  3042. UnlockList(h->HubDb->CrlList);
  3043. }
  3044. ReleaseHub(h);
  3045. }
  3046. return ret;
  3047. }
  3048. // Get routing table on virtual L3 switch
  3049. UINT StEnumL3Table(ADMIN *a, RPC_ENUM_L3TABLE *t)
  3050. {
  3051. SERVER *s = a->Server;
  3052. CEDAR *c = s->Cedar;
  3053. UINT ret = ERR_NO_ERROR;
  3054. L3SW *sw;
  3055. char name[MAX_HUBNAME_LEN + 1];
  3056. if (IsEmptyStr(t->Name))
  3057. {
  3058. return ERR_INVALID_PARAMETER;
  3059. }
  3060. NO_SUPPORT_FOR_BRIDGE;
  3061. StrCpy(name, sizeof(name), t->Name);
  3062. FreeRpcEnumL3Table(t);
  3063. Zero(t, sizeof(RPC_ENUM_L3TABLE));
  3064. StrCpy(t->Name, sizeof(t->Name), name);
  3065. sw = L3GetSw(c, t->Name);
  3066. if (sw == NULL)
  3067. {
  3068. ret = ERR_LAYER3_SW_NOT_FOUND;
  3069. }
  3070. else
  3071. {
  3072. UINT i;
  3073. Lock(sw->lock);
  3074. {
  3075. t->NumItem = LIST_NUM(sw->TableList);
  3076. t->Items = ZeroMalloc(sizeof(RPC_L3TABLE) * t->NumItem);
  3077. for (i = 0;i < t->NumItem;i++)
  3078. {
  3079. L3TABLE *tbl = LIST_DATA(sw->TableList, i);
  3080. RPC_L3TABLE *e = &t->Items[i];
  3081. StrCpy(e->Name, sizeof(e->Name), name);
  3082. e->NetworkAddress = tbl->NetworkAddress;
  3083. e->SubnetMask = tbl->SubnetMask;
  3084. e->GatewayAddress = tbl->GatewayAddress;
  3085. e->Metric = tbl->Metric;
  3086. }
  3087. }
  3088. Unlock(sw->lock);
  3089. ReleaseL3Sw(sw);
  3090. }
  3091. return ret;
  3092. }
  3093. // Delete routing table entry on virtual L3 switch
  3094. UINT StDelL3Table(ADMIN *a, RPC_L3TABLE *t)
  3095. {
  3096. SERVER *s = a->Server;
  3097. CEDAR *c = s->Cedar;
  3098. UINT ret = ERR_NO_ERROR;
  3099. L3SW *sw;
  3100. SERVER_ADMIN_ONLY;
  3101. NO_SUPPORT_FOR_BRIDGE;
  3102. sw = L3GetSw(c, t->Name);
  3103. if (sw == NULL)
  3104. {
  3105. ret = ERR_LAYER3_SW_NOT_FOUND;
  3106. }
  3107. else
  3108. {
  3109. L3TABLE tbl;
  3110. Zero(&tbl, sizeof(tbl));
  3111. tbl.NetworkAddress = t->NetworkAddress;
  3112. tbl.SubnetMask = t->SubnetMask;
  3113. tbl.GatewayAddress = t->GatewayAddress;
  3114. tbl.Metric = t->Metric;
  3115. if (L3DelTable(sw, &tbl) == false)
  3116. {
  3117. ret = ERR_LAYER3_TABLE_DEL_FAILED;
  3118. }
  3119. else
  3120. {
  3121. char tmp[MAX_SIZE];
  3122. IPToStr32(tmp, sizeof(tmp), tbl.NetworkAddress);
  3123. ALog(a, NULL, "LA_DEL_L3_TABLE", tmp, t->Name);
  3124. IncrementServerConfigRevision(s);
  3125. }
  3126. ReleaseL3Sw(sw);
  3127. }
  3128. return ret;
  3129. }
  3130. // Add new routing table entry on virtual L3 switch
  3131. UINT StAddL3Table(ADMIN *a, RPC_L3TABLE *t)
  3132. {
  3133. SERVER *s = a->Server;
  3134. CEDAR *c = s->Cedar;
  3135. UINT ret = ERR_NO_ERROR;
  3136. L3SW *sw;
  3137. if (IsNetworkAddress32(t->NetworkAddress, t->SubnetMask) == false ||
  3138. IsHostIPAddress32(t->GatewayAddress) == false)
  3139. {
  3140. return ERR_INVALID_PARAMETER;
  3141. }
  3142. SERVER_ADMIN_ONLY;
  3143. NO_SUPPORT_FOR_BRIDGE;
  3144. sw = L3GetSw(c, t->Name);
  3145. if (sw == NULL)
  3146. {
  3147. ret = ERR_LAYER3_SW_NOT_FOUND;
  3148. }
  3149. else
  3150. {
  3151. L3TABLE tbl;
  3152. Zero(&tbl, sizeof(tbl));
  3153. tbl.NetworkAddress = t->NetworkAddress;
  3154. tbl.SubnetMask = t->SubnetMask;
  3155. tbl.GatewayAddress = t->GatewayAddress;
  3156. tbl.Metric = t->Metric;
  3157. if (L3AddTable(sw, &tbl) == false)
  3158. {
  3159. ret = ERR_LAYER3_TABLE_ADD_FAILED;
  3160. }
  3161. else
  3162. {
  3163. char tmp[MAX_SIZE];
  3164. IPToStr32(tmp, sizeof(tmp), tbl.NetworkAddress);
  3165. ALog(a, NULL, "LA_ADD_L3_TABLE", tmp, t->Name);
  3166. IncrementServerConfigRevision(s);
  3167. }
  3168. ReleaseL3Sw(sw);
  3169. }
  3170. return ret;
  3171. }
  3172. // Enumerate virtual interfaces on virtual L3 switch
  3173. UINT StEnumL3If(ADMIN *a, RPC_ENUM_L3IF *t)
  3174. {
  3175. SERVER *s = a->Server;
  3176. CEDAR *c = s->Cedar;
  3177. UINT ret = ERR_NO_ERROR;
  3178. L3SW *sw;
  3179. char name[MAX_HUBNAME_LEN + 1];
  3180. NO_SUPPORT_FOR_BRIDGE;
  3181. StrCpy(name, sizeof(name), t->Name);
  3182. FreeRpcEnumL3If(t);
  3183. Zero(t, sizeof(RPC_ENUM_L3IF));
  3184. StrCpy(t->Name, sizeof(t->Name), name);
  3185. sw = L3GetSw(c, t->Name);
  3186. if (sw == NULL)
  3187. {
  3188. ret = ERR_LAYER3_SW_NOT_FOUND;
  3189. }
  3190. else
  3191. {
  3192. Lock(sw->lock);
  3193. {
  3194. UINT i;
  3195. t->NumItem = LIST_NUM(sw->IfList);
  3196. t->Items = ZeroMalloc(sizeof(RPC_L3IF) * t->NumItem);
  3197. for (i = 0;i < t->NumItem;i++)
  3198. {
  3199. L3IF *f = LIST_DATA(sw->IfList, i);
  3200. RPC_L3IF *e = &t->Items[i];
  3201. StrCpy(e->Name, sizeof(e->Name), sw->Name);
  3202. StrCpy(e->HubName, sizeof(e->HubName), f->HubName);
  3203. e->IpAddress = f->IpAddress;
  3204. e->SubnetMask = f->SubnetMask;
  3205. }
  3206. }
  3207. Unlock(sw->lock);
  3208. ReleaseL3Sw(sw);
  3209. }
  3210. return ret;
  3211. }
  3212. // Delete a virtual interface on virtual L3 switch
  3213. UINT StDelL3If(ADMIN *a, RPC_L3IF *t)
  3214. {
  3215. SERVER *s = a->Server;
  3216. CEDAR *c = s->Cedar;
  3217. UINT ret = ERR_NO_ERROR;
  3218. L3SW *sw;
  3219. NO_SUPPORT_FOR_BRIDGE;
  3220. SERVER_ADMIN_ONLY;
  3221. sw = L3GetSw(c, t->Name);
  3222. if (sw == NULL)
  3223. {
  3224. ret = ERR_LAYER3_SW_NOT_FOUND;
  3225. }
  3226. else
  3227. {
  3228. if (L3DelIf(sw, t->HubName) == false)
  3229. {
  3230. ret = ERR_LAYER3_IF_DEL_FAILED;
  3231. }
  3232. else
  3233. {
  3234. ALog(a, NULL, "LA_DEL_L3_IF", t->HubName, t->Name);
  3235. IncrementServerConfigRevision(s);
  3236. }
  3237. ReleaseL3Sw(sw);
  3238. }
  3239. return ret;
  3240. }
  3241. // Add new virtual interface on virtual L3 switch
  3242. UINT StAddL3If(ADMIN *a, RPC_L3IF *t)
  3243. {
  3244. SERVER *s = a->Server;
  3245. CEDAR *c = s->Cedar;
  3246. UINT ret = ERR_NO_ERROR;
  3247. L3SW *sw;
  3248. if (IsSubnetMask32(t->SubnetMask) == false || IsHostIPAddress32(t->IpAddress) == false)
  3249. {
  3250. return ERR_INVALID_PARAMETER;
  3251. }
  3252. if ((t->IpAddress & (~t->SubnetMask)) == 0)
  3253. {
  3254. return ERR_INVALID_PARAMETER;
  3255. }
  3256. NO_SUPPORT_FOR_BRIDGE;
  3257. SERVER_ADMIN_ONLY;
  3258. sw = L3GetSw(c, t->Name);
  3259. if (sw == NULL)
  3260. {
  3261. ret = ERR_LAYER3_SW_NOT_FOUND;
  3262. }
  3263. else
  3264. {
  3265. Lock(sw->lock);
  3266. {
  3267. if (L3SearchIf(sw, t->HubName) != NULL)
  3268. {
  3269. // Already exists
  3270. ret = ERR_LAYER3_IF_EXISTS;
  3271. }
  3272. else
  3273. {
  3274. if (L3AddIf(sw, t->HubName, t->IpAddress, t->SubnetMask) == false)
  3275. {
  3276. ret = ERR_LAYER3_IF_ADD_FAILED;
  3277. }
  3278. else
  3279. {
  3280. ALog(a, NULL, "LA_ADD_L3_IF", t->HubName, t->Name);
  3281. IncrementServerConfigRevision(s);
  3282. }
  3283. }
  3284. }
  3285. Unlock(sw->lock);
  3286. ReleaseL3Sw(sw);
  3287. }
  3288. return ret;
  3289. }
  3290. // Stop a virtual layer-3 switch
  3291. UINT StStopL3Switch(ADMIN *a, RPC_L3SW *t)
  3292. {
  3293. SERVER *s = a->Server;
  3294. CEDAR *c = s->Cedar;
  3295. UINT ret = ERR_NO_ERROR;
  3296. L3SW *sw;
  3297. if (IsEmptyStr(t->Name))
  3298. {
  3299. return ERR_INVALID_PARAMETER;
  3300. }
  3301. NO_SUPPORT_FOR_BRIDGE;
  3302. SERVER_ADMIN_ONLY;
  3303. sw = L3GetSw(c, t->Name);
  3304. if (sw == NULL)
  3305. {
  3306. ret = ERR_LAYER3_SW_NOT_FOUND;
  3307. }
  3308. else
  3309. {
  3310. L3SwStop(sw);
  3311. ALog(a, NULL, "LA_STOP_L3_SW", sw->Name);
  3312. ReleaseL3Sw(sw);
  3313. IncrementServerConfigRevision(s);
  3314. }
  3315. return ret;
  3316. }
  3317. // Start a virtual layer-3 switch
  3318. UINT StStartL3Switch(ADMIN *a, RPC_L3SW *t)
  3319. {
  3320. SERVER *s = a->Server;
  3321. CEDAR *c = s->Cedar;
  3322. UINT ret = ERR_NO_ERROR;
  3323. L3SW *sw;
  3324. if (IsEmptyStr(t->Name))
  3325. {
  3326. return ERR_INVALID_PARAMETER;
  3327. }
  3328. NO_SUPPORT_FOR_BRIDGE;
  3329. SERVER_ADMIN_ONLY;
  3330. sw = L3GetSw(c, t->Name);
  3331. if (sw == NULL)
  3332. {
  3333. ret = ERR_LAYER3_SW_NOT_FOUND;
  3334. }
  3335. else
  3336. {
  3337. Lock(sw->lock);
  3338. {
  3339. // Count the registered virtual interfaces
  3340. if (LIST_NUM(sw->IfList) >= 1)
  3341. {
  3342. L3SwStart(sw);
  3343. ALog(a, NULL, "LA_START_L3_SW", sw->Name);
  3344. IncrementServerConfigRevision(s);
  3345. }
  3346. else
  3347. {
  3348. ret = ERR_LAYER3_CANT_START_SWITCH;
  3349. }
  3350. }
  3351. Unlock(sw->lock);
  3352. ReleaseL3Sw(sw);
  3353. }
  3354. return ret;
  3355. }
  3356. // Enumerate virtual layer-3 switches
  3357. UINT StEnumL3Switch(ADMIN *a, RPC_ENUM_L3SW *t)
  3358. {
  3359. UINT i;
  3360. SERVER *s = a->Server;
  3361. CEDAR *c = s->Cedar;
  3362. UINT ret = ERR_NO_ERROR;
  3363. NO_SUPPORT_FOR_BRIDGE;
  3364. FreeRpcEnumL3Sw(t);
  3365. Zero(t, sizeof(RPC_ENUM_L3SW));
  3366. LockList(c->L3SwList);
  3367. {
  3368. t->NumItem = LIST_NUM(c->L3SwList);
  3369. t->Items = ZeroMalloc(sizeof(RPC_ENUM_L3SW_ITEM) * t->NumItem);
  3370. for (i = 0;i < LIST_NUM(c->L3SwList);i++)
  3371. {
  3372. L3SW *sw = LIST_DATA(c->L3SwList, i);
  3373. RPC_ENUM_L3SW_ITEM *e = &t->Items[i];
  3374. Lock(sw->lock);
  3375. {
  3376. StrCpy(e->Name, sizeof(e->Name), sw->Name);
  3377. e->NumInterfaces = LIST_NUM(sw->IfList);
  3378. e->NumTables = LIST_NUM(sw->TableList);
  3379. e->Active = sw->Active;
  3380. e->Online = sw->Online;
  3381. }
  3382. Unlock(sw->lock);
  3383. }
  3384. }
  3385. UnlockList(c->L3SwList);
  3386. return ret;
  3387. }
  3388. // Delete a virtual layer-3 switch
  3389. UINT StDelL3Switch(ADMIN *a, RPC_L3SW *t)
  3390. {
  3391. SERVER *s = a->Server;
  3392. CEDAR *c = s->Cedar;
  3393. UINT ret = ERR_NO_ERROR;
  3394. if (IsEmptyStr(t->Name))
  3395. {
  3396. return ERR_INVALID_PARAMETER;
  3397. }
  3398. NO_SUPPORT_FOR_BRIDGE;
  3399. SERVER_ADMIN_ONLY;
  3400. if (L3DelSw(c, t->Name) == false)
  3401. {
  3402. ret = ERR_LAYER3_SW_NOT_FOUND;
  3403. }
  3404. else
  3405. {
  3406. ALog(a, NULL, "LA_DEL_L3_SW", t->Name);
  3407. IncrementServerConfigRevision(s);
  3408. }
  3409. return ret;
  3410. }
  3411. // Add a new virtual layer-3 switch
  3412. UINT StAddL3Switch(ADMIN *a, RPC_L3SW *t)
  3413. {
  3414. SERVER *s = a->Server;
  3415. CEDAR *c = s->Cedar;
  3416. UINT ret = ERR_NO_ERROR;
  3417. L3SW *sw;
  3418. NO_SUPPORT_FOR_BRIDGE;
  3419. if (IsEmptyStr(t->Name))
  3420. {
  3421. return ERR_INVALID_PARAMETER;
  3422. }
  3423. if (IsSafeStr(t->Name) == false)
  3424. {
  3425. return ERR_INVALID_PARAMETER;
  3426. }
  3427. SERVER_ADMIN_ONLY;
  3428. // Duplication check
  3429. sw = L3GetSw(c, t->Name);
  3430. if (sw != NULL)
  3431. {
  3432. // Already exists
  3433. ReleaseL3Sw(sw);
  3434. ret = ERR_LAYER3_SW_EXISTS;
  3435. }
  3436. else
  3437. {
  3438. LockList(c->L3SwList);
  3439. {
  3440. if (LIST_NUM(c->L3SwList) >= GetServerCapsInt(s, "i_max_l3_sw"))
  3441. {
  3442. // No more virtual interfaces
  3443. sw = NULL;
  3444. }
  3445. else
  3446. {
  3447. // Create
  3448. sw = L3AddSw(c, t->Name);
  3449. if (sw != NULL)
  3450. {
  3451. ALog(a, NULL, "LA_ADD_L3_SW", t->Name);
  3452. IncrementServerConfigRevision(s);
  3453. }
  3454. }
  3455. }
  3456. UnlockList(c->L3SwList);
  3457. if (sw == NULL)
  3458. {
  3459. // Failed
  3460. ret = ERR_INTERNAL_ERROR;
  3461. }
  3462. else
  3463. {
  3464. // Success
  3465. ReleaseL3Sw(sw);
  3466. }
  3467. }
  3468. return ret;
  3469. }
  3470. // Set hub extended options
  3471. UINT StSetHubExtOptions(ADMIN *a, RPC_ADMIN_OPTION *t)
  3472. {
  3473. SERVER *s = a->Server;
  3474. CEDAR *c = s->Cedar;
  3475. HUB *h;
  3476. bool not_server_admin = false;
  3477. if (t->NumItem > MAX_HUB_ADMIN_OPTIONS)
  3478. {
  3479. return ERR_TOO_MANT_ITEMS;
  3480. }
  3481. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  3482. {
  3483. return ERR_NOT_SUPPORTED;
  3484. }
  3485. CHECK_RIGHT;
  3486. if (a->ServerAdmin == false)
  3487. {
  3488. not_server_admin = true;
  3489. }
  3490. LockHubList(c);
  3491. {
  3492. h = GetHub(c, t->HubName);
  3493. }
  3494. UnlockHubList(c);
  3495. if (h == NULL)
  3496. {
  3497. return ERR_HUB_NOT_FOUND;
  3498. }
  3499. if (GetHubAdminOption(h, "deny_hub_admin_change_ext_option") && not_server_admin)
  3500. {
  3501. // Insufficient permission
  3502. ReleaseHub(h);
  3503. return ERR_NOT_ENOUGH_RIGHT;
  3504. }
  3505. // Update setting
  3506. Lock(h->lock);
  3507. {
  3508. DataToHubOptionStruct(h->Option, t);
  3509. }
  3510. Unlock(h->lock);
  3511. ALog(a, NULL, "LA_SET_HUB_EXT_OPTION", h->Name);
  3512. h->CurrentVersion++;
  3513. SiHubUpdateProc(h);
  3514. ReleaseHub(h);
  3515. IncrementServerConfigRevision(s);
  3516. return ERR_NO_ERROR;
  3517. }
  3518. // Get hub extended options
  3519. UINT StGetHubExtOptions(ADMIN *a, RPC_ADMIN_OPTION *t)
  3520. {
  3521. SERVER *s = a->Server;
  3522. CEDAR *c = s->Cedar;
  3523. HUB *h;
  3524. CHECK_RIGHT;
  3525. LockHubList(c);
  3526. {
  3527. h = GetHub(c, t->HubName);
  3528. }
  3529. UnlockHubList(c);
  3530. if (h == NULL)
  3531. {
  3532. return ERR_HUB_NOT_FOUND;
  3533. }
  3534. FreeRpcAdminOption(t);
  3535. Zero(t, sizeof(RPC_ADMIN_OPTION));
  3536. StrCpy(t->HubName, sizeof(t->HubName), h->Name);
  3537. // Get options
  3538. Lock(h->lock);
  3539. {
  3540. HubOptionStructToData(t, h->Option, h->Name);
  3541. }
  3542. Unlock(h->lock);
  3543. ReleaseHub(h);
  3544. return ERR_NO_ERROR;
  3545. }
  3546. // Set hub administration options
  3547. UINT StSetHubAdminOptions(ADMIN *a, RPC_ADMIN_OPTION *t)
  3548. {
  3549. UINT i;
  3550. SERVER *s = a->Server;
  3551. CEDAR *c = s->Cedar;
  3552. HUB *h;
  3553. bool not_server_admin = false;
  3554. if (t->NumItem > MAX_HUB_ADMIN_OPTIONS)
  3555. {
  3556. return ERR_TOO_MANT_ITEMS;
  3557. }
  3558. NO_SUPPORT_FOR_BRIDGE;
  3559. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  3560. {
  3561. return ERR_NOT_SUPPORTED;
  3562. }
  3563. CHECK_RIGHT;
  3564. if (a->ServerAdmin == false)
  3565. {
  3566. not_server_admin = true;
  3567. }
  3568. LockHubList(c);
  3569. {
  3570. h = GetHub(c, t->HubName);
  3571. }
  3572. UnlockHubList(c);
  3573. if (h == NULL)
  3574. {
  3575. return ERR_HUB_NOT_FOUND;
  3576. }
  3577. if (GetHubAdminOption(h, "allow_hub_admin_change_option") == false
  3578. && not_server_admin)
  3579. {
  3580. // Insufficient permission
  3581. ReleaseHub(h);
  3582. return ERR_NOT_ENOUGH_RIGHT;
  3583. }
  3584. LockList(h->AdminOptionList);
  3585. {
  3586. DeleteAllHubAdminOption(h, false);
  3587. for (i = 0;i < t->NumItem;i++)
  3588. {
  3589. ADMIN_OPTION *e = &t->Items[i];
  3590. ADMIN_OPTION *a = ZeroMalloc(sizeof(ADMIN_OPTION));
  3591. StrCpy(a->Name, sizeof(a->Name), e->Name);
  3592. a->Value = e->Value;
  3593. Insert(h->AdminOptionList, a);
  3594. }
  3595. AddHubAdminOptionsDefaults(h, false);
  3596. }
  3597. UnlockList(h->AdminOptionList);
  3598. ALog(a, NULL, "LA_SET_HUB_ADMIN_OPTION", h->Name);
  3599. h->CurrentVersion++;
  3600. SiHubUpdateProc(h);
  3601. ReleaseHub(h);
  3602. IncrementServerConfigRevision(s);
  3603. return ERR_NO_ERROR;
  3604. }
  3605. // Get hub administration options
  3606. UINT StGetHubAdminOptions(ADMIN *a, RPC_ADMIN_OPTION *t)
  3607. {
  3608. UINT i;
  3609. SERVER *s = a->Server;
  3610. CEDAR *c = s->Cedar;
  3611. HUB *h;
  3612. CHECK_RIGHT;
  3613. NO_SUPPORT_FOR_BRIDGE;
  3614. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  3615. {
  3616. return ERR_NOT_SUPPORTED;
  3617. }
  3618. LockHubList(c);
  3619. {
  3620. h = GetHub(c, t->HubName);
  3621. }
  3622. UnlockHubList(c);
  3623. if (h == NULL)
  3624. {
  3625. return ERR_HUB_NOT_FOUND;
  3626. }
  3627. FreeRpcAdminOption(t);
  3628. Zero(t, sizeof(RPC_ADMIN_OPTION));
  3629. StrCpy(t->HubName, sizeof(t->HubName), h->Name);
  3630. LockList(h->AdminOptionList);
  3631. {
  3632. t->NumItem = LIST_NUM(h->AdminOptionList);
  3633. t->Items = ZeroMalloc(sizeof(ADMIN_OPTION) * t->NumItem);
  3634. for (i = 0;i < t->NumItem;i++)
  3635. {
  3636. ADMIN_OPTION *a = LIST_DATA(h->AdminOptionList, i);
  3637. ADMIN_OPTION *e = &t->Items[i];
  3638. StrCpy(e->Name, sizeof(e->Name), a->Name);
  3639. e->Value = a->Value;
  3640. UniStrCpy(e->Descrption, sizeof(e->Descrption), GetHubAdminOptionHelpString(e->Name));
  3641. }
  3642. }
  3643. UnlockList(h->AdminOptionList);
  3644. ReleaseHub(h);
  3645. return ERR_NO_ERROR;
  3646. }
  3647. // Get default hub administration options
  3648. UINT StGetDefaultHubAdminOptions(ADMIN *a, RPC_ADMIN_OPTION *t)
  3649. {
  3650. UINT i;
  3651. NO_SUPPORT_FOR_BRIDGE;
  3652. if (a->Server->ServerType == SERVER_TYPE_FARM_MEMBER)
  3653. {
  3654. return ERR_NOT_SUPPORTED;
  3655. }
  3656. FreeRpcAdminOption(t);
  3657. Zero(t, sizeof(RPC_ADMIN_OPTION));
  3658. t->NumItem = num_admin_options;
  3659. t->Items = ZeroMalloc(sizeof(ADMIN_OPTION) * t->NumItem);
  3660. for (i = 0;i < t->NumItem;i++)
  3661. {
  3662. ADMIN_OPTION *a = &t->Items[i];
  3663. StrCpy(a->Name, sizeof(a->Name), admin_options[i].Name);
  3664. a->Value = admin_options[i].Value;
  3665. UniStrCpy(a->Descrption, sizeof(a->Descrption), GetHubAdminOptionHelpString(a->Name));
  3666. }
  3667. return ERR_NO_ERROR;
  3668. }
  3669. // Get configuration file stream
  3670. UINT StGetConfig(ADMIN *a, RPC_CONFIG *t)
  3671. {
  3672. SERVER *s;
  3673. SERVER_ADMIN_ONLY;
  3674. FreeRpcConfig(t);
  3675. Zero(t, sizeof(RPC_CONFIG));
  3676. s = a->Server;
  3677. ALog(a, NULL, "LA_GET_CONFIG");
  3678. if (s->CfgRw != NULL)
  3679. {
  3680. FOLDER *f = SiWriteConfigurationToCfg(s);
  3681. BUF *b = CfgFolderToBuf(f, true);
  3682. StrCpy(t->FileName, sizeof(t->FileName), s->CfgRw->FileName + (s->CfgRw->FileName[0] == '@' ? 1 : 0));
  3683. t->FileData = ZeroMalloc(b->Size + 1);
  3684. Copy(t->FileData, b->Buf, b->Size);
  3685. CfgDeleteFolder(f);
  3686. FreeBuf(b);
  3687. return ERR_NO_ERROR;
  3688. }
  3689. else
  3690. {
  3691. return ERR_INTERNAL_ERROR;
  3692. }
  3693. }
  3694. // Overwrite configuration file by specified data
  3695. UINT StSetConfig(ADMIN *a, RPC_CONFIG *t)
  3696. {
  3697. SERVER *s;
  3698. IO *o;
  3699. char filename[MAX_PATH];
  3700. SERVER_ADMIN_ONLY;
  3701. s = a->Server;
  3702. if (s->CfgRw == NULL)
  3703. {
  3704. return ERR_INTERNAL_ERROR;
  3705. }
  3706. // Write new configuration file
  3707. Format(filename, sizeof(filename), "%s.new", s->CfgRw->FileName);
  3708. o = FileCreate(filename);
  3709. FileWrite(o, t->FileData, StrLen(t->FileData));
  3710. FileClose(o);
  3711. IncrementServerConfigRevision(s);
  3712. ALog(a, NULL, "LA_SET_CONFIG");
  3713. // Reboot server itself
  3714. SiRebootServer(s->Cedar->Bridge);
  3715. return ERR_NO_ERROR;
  3716. }
  3717. // Get capabilities
  3718. UINT StGetCaps(ADMIN *a, CAPSLIST *t)
  3719. {
  3720. FreeRpcCapsList(t);
  3721. Zero(t, sizeof(CAPSLIST));
  3722. GetServerCapsMain(a->Server, t);
  3723. return ERR_NO_ERROR;
  3724. }
  3725. // Reboot server itself
  3726. UINT StRebootServer(ADMIN *a, RPC_TEST *t)
  3727. {
  3728. SERVER_ADMIN_ONLY;
  3729. ALog(a, NULL, "LA_REBOOT_SERVER");
  3730. SiRebootServerEx(a->Server->Cedar->Bridge, t->IntValue);
  3731. return ERR_NO_ERROR;
  3732. }
  3733. // Get availability to localbridge function
  3734. UINT StGetBridgeSupport(ADMIN *a, RPC_BRIDGE_SUPPORT *t)
  3735. {
  3736. Zero(t, sizeof(RPC_BRIDGE_SUPPORT));
  3737. t->IsBridgeSupportedOs = IsBridgeSupported();
  3738. t->IsWinPcapNeeded = IsNeedWinPcap();
  3739. return ERR_NO_ERROR;
  3740. }
  3741. // Enumerate Ethernet devices
  3742. UINT StEnumEthernet(ADMIN *a, RPC_ENUM_ETH *t)
  3743. {
  3744. TOKEN_LIST *o;
  3745. UINT i;
  3746. char tmp[MAX_SIZE];
  3747. bool unix_support = false;
  3748. SERVER_ADMIN_ONLY;
  3749. #ifdef OS_UNIX
  3750. unix_support = EthIsInterfaceDescriptionSupportedUnix();
  3751. #endif // OS_UNIX
  3752. o = GetEthList();
  3753. if (o == NULL)
  3754. {
  3755. return ERR_NOT_SUPPORTED;
  3756. }
  3757. FreeRpcEnumEth(t);
  3758. Zero(t, sizeof(RPC_ENUM_ETH));
  3759. t->NumItem = o->NumTokens;
  3760. t->Items = ZeroMalloc(sizeof(RPC_ENUM_ETH_ITEM) * t->NumItem);
  3761. for (i = 0;i < t->NumItem;i++)
  3762. {
  3763. RPC_ENUM_ETH_ITEM *e = &t->Items[i];
  3764. StrCpy(e->DeviceName, sizeof(e->DeviceName), o->Token[i]);
  3765. StrCpy(tmp, sizeof(tmp), e->DeviceName);
  3766. #ifdef OS_WIN32
  3767. GetEthNetworkConnectionName(e->NetworkConnectionName, sizeof(e->NetworkConnectionName), e->DeviceName);
  3768. #else
  3769. if (unix_support == false)
  3770. {
  3771. StrCpy(tmp, sizeof(tmp), "");
  3772. }
  3773. else
  3774. {
  3775. if (EthGetInterfaceDescriptionUnix(e->DeviceName, tmp, sizeof(tmp)) == false)
  3776. {
  3777. StrCpy(tmp, sizeof(tmp), e->DeviceName);
  3778. }
  3779. }
  3780. StrToUni(e->NetworkConnectionName, sizeof(e->NetworkConnectionName), tmp);
  3781. #endif
  3782. }
  3783. FreeToken(o);
  3784. return ERR_NO_ERROR;
  3785. }
  3786. // Add a new local bridge
  3787. UINT StAddLocalBridge(ADMIN *a, RPC_LOCALBRIDGE *t)
  3788. {
  3789. if (IsEmptyStr(t->DeviceName) || IsEmptyStr(t->HubName))
  3790. {
  3791. return ERR_INVALID_PARAMETER;
  3792. }
  3793. SERVER_ADMIN_ONLY;
  3794. if (IsEthSupported() == false)
  3795. {
  3796. return ERR_LOCAL_BRIDGE_UNSUPPORTED;
  3797. }
  3798. #ifdef OS_WIN32
  3799. if (true)
  3800. {
  3801. char tmp[MAX_SIZE];
  3802. UINT id = Win32EthGetNameAndIdFromCombinedName(tmp, sizeof(tmp), t->DeviceName);
  3803. if (id == 0)
  3804. {
  3805. // If a ID is not specified in Win32, adding will fail
  3806. return ERR_OBJECT_NOT_FOUND;
  3807. }
  3808. }
  3809. #endif // OS_WIN32
  3810. ALog(a, NULL, "LA_ADD_BRIDGE", t->HubName, t->DeviceName);
  3811. AddLocalBridge(a->Server->Cedar, t->HubName, t->DeviceName, false, false, t->TapMode, NULL, false);
  3812. IncrementServerConfigRevision(a->Server);
  3813. return ERR_NO_ERROR;
  3814. }
  3815. // Delete a local bridge
  3816. UINT StDeleteLocalBridge(ADMIN *a, RPC_LOCALBRIDGE *t)
  3817. {
  3818. if (IsEmptyStr(t->DeviceName) || IsEmptyStr(t->HubName))
  3819. {
  3820. return ERR_INVALID_PARAMETER;
  3821. }
  3822. SERVER_ADMIN_ONLY;
  3823. ALog(a, NULL, "LA_DELETE_BRIDGE", t->HubName, t->DeviceName);
  3824. if (DeleteLocalBridge(a->Server->Cedar, t->HubName, t->DeviceName) == false)
  3825. {
  3826. return ERR_OBJECT_NOT_FOUND;
  3827. }
  3828. IncrementServerConfigRevision(a->Server);
  3829. return ERR_NO_ERROR;
  3830. }
  3831. // Enumerate local bridges
  3832. UINT StEnumLocalBridge(ADMIN *a, RPC_ENUM_LOCALBRIDGE *t)
  3833. {
  3834. UINT i;
  3835. CEDAR *c;
  3836. if (IsEthSupported() == false)
  3837. {
  3838. return ERR_LOCAL_BRIDGE_UNSUPPORTED;
  3839. }
  3840. FreeRpcEnumLocalBridge(t);
  3841. Zero(t, sizeof(RPC_ENUM_LOCALBRIDGE));
  3842. c = a->Server->Cedar;
  3843. LockList(c->LocalBridgeList);
  3844. {
  3845. t->NumItem = LIST_NUM(c->LocalBridgeList);
  3846. t->Items = ZeroMalloc(sizeof(RPC_LOCALBRIDGE) * t->NumItem);
  3847. for (i = 0;i < t->NumItem;i++)
  3848. {
  3849. RPC_LOCALBRIDGE *e = &t->Items[i];
  3850. LOCALBRIDGE *br = LIST_DATA(c->LocalBridgeList, i);
  3851. if (br->Bridge == false)
  3852. {
  3853. e->Online = e->Active = false;
  3854. }
  3855. else
  3856. {
  3857. e->Online = true;
  3858. if (br->Bridge->Active)
  3859. {
  3860. e->Active = true;
  3861. }
  3862. else
  3863. {
  3864. e->Active = false;
  3865. }
  3866. }
  3867. StrCpy(e->DeviceName, sizeof(e->DeviceName), br->DeviceName);
  3868. StrCpy(e->HubName, sizeof(e->HubName), br->HubName);
  3869. e->TapMode = br->TapMode;
  3870. }
  3871. }
  3872. UnlockList(c->LocalBridgeList);
  3873. return ERR_NO_ERROR;
  3874. }
  3875. // Set syslog function setting
  3876. UINT StSetSysLog(ADMIN *a, SYSLOG_SETTING *t)
  3877. {
  3878. SERVER *s = a->Server;
  3879. SERVER_ADMIN_ONLY;
  3880. if (GetGlobalServerFlag(GSF_DISABLE_SYSLOG) != 0 && t->SaveType != SYSLOG_NONE)
  3881. {
  3882. return ERR_NOT_SUPPORTED_FUNCTION_ON_OPENSOURCE;
  3883. }
  3884. if (GetServerCapsBool(s, "b_support_syslog") == false)
  3885. {
  3886. return ERR_NOT_SUPPORTED;
  3887. }
  3888. SiSetSysLogSetting(s, t);
  3889. IncrementServerConfigRevision(s);
  3890. ALog(a, NULL, "LA_SET_SYSLOG");
  3891. return ERR_NO_ERROR;
  3892. }
  3893. // Get syslog function setting
  3894. UINT StGetSysLog(ADMIN *a, SYSLOG_SETTING *t)
  3895. {
  3896. SERVER *s = a->Server;
  3897. SiGetSysLogSetting(s, t);
  3898. if (a->ServerAdmin == false)
  3899. {
  3900. // Hide server name for non-administrator
  3901. if (t->SaveType == SYSLOG_NONE)
  3902. {
  3903. StrCpy(t->Hostname, sizeof(t->Hostname), "");
  3904. t->Port = 0;
  3905. }
  3906. else
  3907. {
  3908. StrCpy(t->Hostname, sizeof(t->Hostname), "Secret");
  3909. t->Port = 0;
  3910. }
  3911. }
  3912. return ERR_NO_ERROR;
  3913. }
  3914. // Set keep-alive function setting
  3915. UINT StSetKeep(ADMIN *a, RPC_KEEP *t)
  3916. {
  3917. SERVER *s = a->Server;
  3918. if (t->UseKeepConnect)
  3919. {
  3920. if (IsEmptyStr(t->KeepConnectHost) ||
  3921. t->KeepConnectPort == 0 ||
  3922. t->KeepConnectPort >= 65536)
  3923. {
  3924. return ERR_INVALID_PARAMETER;
  3925. }
  3926. }
  3927. SERVER_ADMIN_ONLY;
  3928. Lock(s->Keep->lock);
  3929. {
  3930. KEEP *keep = s->Keep;
  3931. keep->Enable = t->UseKeepConnect;
  3932. keep->Server = true;
  3933. StrCpy(keep->ServerName, sizeof(keep->ServerName), t->KeepConnectHost);
  3934. keep->ServerPort = t->KeepConnectPort;
  3935. keep->UdpMode = t->KeepConnectProtocol;
  3936. keep->Interval = t->KeepConnectInterval * 1000;
  3937. if (keep->Interval < 5000)
  3938. {
  3939. keep->Interval = 5000;
  3940. }
  3941. else if (keep->Interval > 600000)
  3942. {
  3943. keep->Interval = 600000;
  3944. }
  3945. }
  3946. Unlock(s->Keep->lock);
  3947. ALog(a, NULL, "LA_SET_KEEP");
  3948. IncrementServerConfigRevision(s);
  3949. return ERR_NO_ERROR;
  3950. }
  3951. // Get keep-alive function setting
  3952. UINT StGetKeep(ADMIN *a, RPC_KEEP *t)
  3953. {
  3954. SERVER *s = a->Server;
  3955. Zero(t, sizeof(RPC_KEEP));
  3956. Lock(s->Keep->lock);
  3957. {
  3958. KEEP *k = s->Keep;
  3959. t->UseKeepConnect = k->Enable;
  3960. StrCpy(t->KeepConnectHost, sizeof(t->KeepConnectHost), k->ServerName);
  3961. t->KeepConnectPort = k->ServerPort;
  3962. t->KeepConnectProtocol = k->UdpMode;
  3963. t->KeepConnectInterval = k->Interval / 1000;
  3964. }
  3965. Unlock(s->Keep->lock);
  3966. return ERR_NO_ERROR;
  3967. }
  3968. // Delete IP address table entry
  3969. UINT StDeleteIpTable(ADMIN *a, RPC_DELETE_TABLE *t)
  3970. {
  3971. SERVER *s = a->Server;
  3972. CEDAR *c = s->Cedar;
  3973. HUB *h = NULL;
  3974. UINT ret = ERR_NO_ERROR;
  3975. CHECK_RIGHT;
  3976. LockHubList(c);
  3977. {
  3978. h = GetHub(c, t->HubName);
  3979. }
  3980. UnlockHubList(c);
  3981. if (h == NULL)
  3982. {
  3983. return ERR_HUB_NOT_FOUND;
  3984. }
  3985. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_delete_iptable") != 0)
  3986. {
  3987. ReleaseHub(h);
  3988. return ERR_NOT_ENOUGH_RIGHT;
  3989. }
  3990. LockHashList(h->MacHashTable);
  3991. {
  3992. if (IsInListKey(h->IpTable, t->Key))
  3993. {
  3994. IP_TABLE_ENTRY *e = ListKeyToPointer(h->IpTable, t->Key);
  3995. Free(e);
  3996. Delete(h->IpTable, e);
  3997. }
  3998. else
  3999. {
  4000. ret = ERR_OBJECT_NOT_FOUND;
  4001. }
  4002. }
  4003. UnlockHashList(h->MacHashTable);
  4004. if (ret == ERR_OBJECT_NOT_FOUND)
  4005. {
  4006. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4007. {
  4008. UINT i;
  4009. LockList(s->FarmMemberList);
  4010. {
  4011. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  4012. {
  4013. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  4014. if (f->Me == false)
  4015. {
  4016. SiCallDeleteIpTable(s, f, t->HubName, t->Key);
  4017. ret = ERR_NO_ERROR;
  4018. }
  4019. }
  4020. }
  4021. UnlockList(s->FarmMemberList);
  4022. }
  4023. }
  4024. ReleaseHub(h);
  4025. return ret;
  4026. }
  4027. // Get local IP address table
  4028. UINT SiEnumIpTable(SERVER *s, char *hubname, RPC_ENUM_IP_TABLE *t)
  4029. {
  4030. CEDAR *c;
  4031. UINT i;
  4032. HUB *h = NULL;
  4033. // Validate arguments
  4034. if (s == NULL || hubname == NULL || t == NULL)
  4035. {
  4036. return ERR_INTERNAL_ERROR;
  4037. }
  4038. c = s->Cedar;
  4039. LockHubList(c);
  4040. {
  4041. h = GetHub(c, hubname);
  4042. }
  4043. UnlockHubList(c);
  4044. if (h == NULL)
  4045. {
  4046. return ERR_HUB_NOT_FOUND;
  4047. }
  4048. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4049. LockHashList(h->MacHashTable);
  4050. {
  4051. t->NumIpTable = LIST_NUM(h->IpTable);
  4052. t->IpTables = ZeroMalloc(sizeof(RPC_ENUM_IP_TABLE_ITEM) * t->NumIpTable);
  4053. for (i = 0;i < t->NumIpTable;i++)
  4054. {
  4055. RPC_ENUM_IP_TABLE_ITEM *e = &t->IpTables[i];
  4056. IP_TABLE_ENTRY *table = LIST_DATA(h->IpTable, i);
  4057. e->Key = POINTER_TO_KEY(table);
  4058. StrCpy(e->SessionName, sizeof(e->SessionName), table->Session->Name);
  4059. e->Ip = IPToUINT(&table->Ip);
  4060. Copy(&e->IpV6, &table->Ip, sizeof(IP));
  4061. Copy(&e->IpAddress, &table->Ip, sizeof(IP));
  4062. e->DhcpAllocated = table->DhcpAllocated;
  4063. e->CreatedTime = TickToTime(table->CreatedTime);
  4064. e->UpdatedTime = TickToTime(table->UpdatedTime);
  4065. GetMachineName(e->RemoteHostname, sizeof(e->RemoteHostname));
  4066. }
  4067. }
  4068. UnlockHashList(h->MacHashTable);
  4069. ReleaseHub(h);
  4070. return ERR_NO_ERROR;
  4071. }
  4072. // Get IP address table
  4073. UINT StEnumIpTable(ADMIN *a, RPC_ENUM_IP_TABLE *t)
  4074. {
  4075. SERVER *s = a->Server;
  4076. CEDAR *c = s->Cedar;
  4077. UINT ret = ERR_NO_ERROR;
  4078. char hubname[MAX_HUBNAME_LEN + 1];
  4079. UINT i;
  4080. CHECK_RIGHT;
  4081. // Get local IP address table
  4082. StrCpy(hubname, sizeof(hubname), t->HubName);
  4083. FreeRpcEnumIpTable(t);
  4084. Zero(t, sizeof(RPC_ENUM_IP_TABLE));
  4085. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4086. ret = SiEnumIpTable(s, hubname, t);
  4087. if (ret != ERR_NO_ERROR)
  4088. {
  4089. return ret;
  4090. }
  4091. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4092. {
  4093. // Get remote IP address table
  4094. LockList(s->FarmMemberList);
  4095. {
  4096. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  4097. {
  4098. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  4099. if (f->Me == false)
  4100. {
  4101. RPC_ENUM_IP_TABLE tmp;
  4102. Zero(&tmp, sizeof(tmp));
  4103. SiCallEnumIpTable(s, f, hubname, &tmp);
  4104. AdjoinRpcEnumIpTable(t, &tmp);
  4105. FreeRpcEnumIpTable(&tmp);
  4106. }
  4107. }
  4108. }
  4109. UnlockList(s->FarmMemberList);
  4110. }
  4111. return ret;
  4112. }
  4113. // Delete MAC address table entry
  4114. UINT StDeleteMacTable(ADMIN *a, RPC_DELETE_TABLE *t)
  4115. {
  4116. SERVER *s = a->Server;
  4117. CEDAR *c = s->Cedar;
  4118. HUB *h = NULL;
  4119. UINT ret = ERR_NO_ERROR;
  4120. CHECK_RIGHT;
  4121. LockHubList(c);
  4122. {
  4123. h = GetHub(c, t->HubName);
  4124. }
  4125. UnlockHubList(c);
  4126. if (h == NULL)
  4127. {
  4128. return ERR_HUB_NOT_FOUND;
  4129. }
  4130. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_delete_mactable") != 0)
  4131. {
  4132. ReleaseHub(h);
  4133. return ERR_NOT_ENOUGH_RIGHT;
  4134. }
  4135. LockHashList(h->MacHashTable);
  4136. {
  4137. if (IsInHashListKey(h->MacHashTable, t->Key))
  4138. {
  4139. MAC_TABLE_ENTRY *e = HashListKeyToPointer(h->MacHashTable, t->Key);
  4140. DeleteHash(h->MacHashTable, e);
  4141. Free(e);
  4142. }
  4143. else
  4144. {
  4145. ret = ERR_OBJECT_NOT_FOUND;
  4146. }
  4147. }
  4148. UnlockHashList(h->MacHashTable);
  4149. if (ret == ERR_OBJECT_NOT_FOUND)
  4150. {
  4151. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4152. {
  4153. UINT i;
  4154. LockList(s->FarmMemberList);
  4155. {
  4156. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  4157. {
  4158. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  4159. if (f->Me == false)
  4160. {
  4161. SiCallDeleteMacTable(s, f, t->HubName, t->Key);
  4162. ret = ERR_NO_ERROR;
  4163. }
  4164. }
  4165. }
  4166. UnlockList(s->FarmMemberList);
  4167. }
  4168. }
  4169. ReleaseHub(h);
  4170. return ret;
  4171. }
  4172. // Get local MAC address table
  4173. UINT SiEnumMacTable(SERVER *s, char *hubname, RPC_ENUM_MAC_TABLE *t)
  4174. {
  4175. CEDAR *c;
  4176. UINT i;
  4177. HUB *h = NULL;
  4178. // Validate arguments
  4179. if (s == NULL || hubname == NULL || t == NULL)
  4180. {
  4181. return ERR_INTERNAL_ERROR;
  4182. }
  4183. c = s->Cedar;
  4184. LockHubList(c);
  4185. {
  4186. h = GetHub(c, hubname);
  4187. }
  4188. UnlockHubList(c);
  4189. if (h == NULL)
  4190. {
  4191. return ERR_HUB_NOT_FOUND;
  4192. }
  4193. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4194. LockHashList(h->MacHashTable);
  4195. {
  4196. MAC_TABLE_ENTRY **pp = (MAC_TABLE_ENTRY **)HashListToArray(h->MacHashTable, &t->NumMacTable);
  4197. t->MacTables = ZeroMalloc(sizeof(RPC_ENUM_MAC_TABLE_ITEM) * t->NumMacTable);
  4198. for (i = 0;i < t->NumMacTable;i++)
  4199. {
  4200. RPC_ENUM_MAC_TABLE_ITEM *e = &t->MacTables[i];
  4201. MAC_TABLE_ENTRY *mac = pp[i];
  4202. e->Key = POINTER_TO_KEY(mac);
  4203. StrCpy(e->SessionName, sizeof(e->SessionName), mac->Session->Name);
  4204. Copy(e->MacAddress, mac->MacAddress, sizeof(e->MacAddress));
  4205. e->CreatedTime = TickToTime(mac->CreatedTime);
  4206. e->UpdatedTime = TickToTime(mac->UpdatedTime);
  4207. e->VlanId = mac->VlanId;
  4208. GetMachineName(e->RemoteHostname, sizeof(e->RemoteHostname));
  4209. }
  4210. Free(pp);
  4211. }
  4212. UnlockHashList(h->MacHashTable);
  4213. ReleaseHub(h);
  4214. return ERR_NO_ERROR;
  4215. }
  4216. // Get MAC address table
  4217. UINT StEnumMacTable(ADMIN *a, RPC_ENUM_MAC_TABLE *t)
  4218. {
  4219. SERVER *s = a->Server;
  4220. CEDAR *c = s->Cedar;
  4221. HUB *h = NULL;
  4222. UINT ret = ERR_NO_ERROR;
  4223. char hubname[MAX_HUBNAME_LEN + 1];
  4224. UINT i;
  4225. CHECK_RIGHT;
  4226. // Get local MAC address table
  4227. StrCpy(hubname, sizeof(hubname), t->HubName);
  4228. FreeRpcEnumMacTable(t);
  4229. Zero(t, sizeof(RPC_ENUM_MAC_TABLE));
  4230. ret = SiEnumMacTable(s, hubname, t);
  4231. if (ret != ERR_NO_ERROR)
  4232. {
  4233. return ret;
  4234. }
  4235. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4236. {
  4237. // Get remote MAC address table
  4238. LockList(s->FarmMemberList);
  4239. {
  4240. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  4241. {
  4242. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  4243. if (f->Me == false)
  4244. {
  4245. RPC_ENUM_MAC_TABLE tmp;
  4246. Zero(&tmp, sizeof(tmp));
  4247. SiCallEnumMacTable(s, f, hubname, &tmp);
  4248. AdjoinRpcEnumMacTable(t, &tmp);
  4249. FreeRpcEnumMacTable(&tmp);
  4250. }
  4251. }
  4252. }
  4253. UnlockList(s->FarmMemberList);
  4254. }
  4255. return ret;
  4256. }
  4257. // Delete a session
  4258. UINT StDeleteSession(ADMIN *a, RPC_DELETE_SESSION *t)
  4259. {
  4260. SERVER *s = a->Server;
  4261. CEDAR *c = s->Cedar;
  4262. HUB *h = NULL;
  4263. UINT ret = ERR_NO_ERROR;
  4264. char hubname[MAX_HUBNAME_LEN + 1];
  4265. char name[MAX_SESSION_NAME_LEN + 1];
  4266. SESSION *sess;
  4267. if (IsEmptyStr(t->Name))
  4268. {
  4269. return ERR_INVALID_PARAMETER;
  4270. }
  4271. StrCpy(hubname, sizeof(hubname), t->HubName);
  4272. StrCpy(name, sizeof(name), t->Name);
  4273. CHECK_RIGHT;
  4274. LockHubList(c);
  4275. {
  4276. h = GetHub(c, t->HubName);
  4277. }
  4278. UnlockHubList(c);
  4279. if (h == NULL)
  4280. {
  4281. return ERR_HUB_NOT_FOUND;
  4282. }
  4283. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_disconnect_session") != 0)
  4284. {
  4285. ReleaseHub(h);
  4286. return ERR_NOT_ENOUGH_RIGHT;
  4287. }
  4288. sess = GetSessionByName(h, name);
  4289. if (sess == NULL)
  4290. {
  4291. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4292. {
  4293. // Cluster controller
  4294. UINT i;
  4295. LockList(s->FarmMemberList);
  4296. {
  4297. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  4298. {
  4299. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  4300. if (f->Me == false)
  4301. {
  4302. // Try to disconnect
  4303. SiCallDeleteSession(s, f, t->HubName, t->Name);
  4304. }
  4305. }
  4306. }
  4307. UnlockList(s->FarmMemberList);
  4308. }
  4309. else
  4310. {
  4311. ret = ERR_OBJECT_NOT_FOUND;
  4312. }
  4313. }
  4314. else
  4315. {
  4316. if (sess->LinkModeServer)
  4317. {
  4318. ret = ERR_LINK_CANT_DISCONNECT;
  4319. }
  4320. else if (sess->SecureNATMode)
  4321. {
  4322. ret = ERR_SNAT_CANT_DISCONNECT;
  4323. }
  4324. else if (sess->BridgeMode)
  4325. {
  4326. ret = ERR_BRIDGE_CANT_DISCONNECT;
  4327. }
  4328. else if (sess->L3SwitchMode)
  4329. {
  4330. ret = ERR_LAYER3_CANT_DISCONNECT;
  4331. }
  4332. else
  4333. {
  4334. StopSession(sess);
  4335. }
  4336. ReleaseSession(sess);
  4337. }
  4338. if (ret != ERR_NO_ERROR)
  4339. {
  4340. ALog(a, h, "LA_DELETE_SESSION", t->Name);
  4341. }
  4342. ReleaseHub(h);
  4343. return ret;
  4344. }
  4345. // Get session status
  4346. UINT StGetSessionStatus(ADMIN *a, RPC_SESSION_STATUS *t)
  4347. {
  4348. SERVER *s = a->Server;
  4349. CEDAR *c = s->Cedar;
  4350. HUB *h = NULL;
  4351. UINT ret = ERR_NO_ERROR;
  4352. char hubname[MAX_HUBNAME_LEN + 1];
  4353. char name[MAX_SESSION_NAME_LEN + 1];
  4354. SESSION *sess;
  4355. StrCpy(hubname, sizeof(hubname), t->HubName);
  4356. StrCpy(name, sizeof(name), t->Name);
  4357. if (IsEmptyStr(t->Name))
  4358. {
  4359. return ERR_INVALID_PARAMETER;
  4360. }
  4361. CHECK_RIGHT;
  4362. LockHubList(c);
  4363. {
  4364. h = GetHub(c, t->HubName);
  4365. }
  4366. UnlockHubList(c);
  4367. if (h == NULL)
  4368. {
  4369. return ERR_HUB_NOT_FOUND;
  4370. }
  4371. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_query_session") != 0)
  4372. {
  4373. ReleaseHub(h);
  4374. return ERR_NOT_ENOUGH_RIGHT;
  4375. }
  4376. FreeRpcSessionStatus(t);
  4377. Zero(t, sizeof(RPC_SESSION_STATUS));
  4378. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4379. StrCpy(t->Name, sizeof(t->Name), name);
  4380. sess = GetSessionByName(h, t->Name);
  4381. if (sess == NULL)
  4382. {
  4383. if (s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  4384. {
  4385. // Session is not found
  4386. ret = ERR_OBJECT_NOT_FOUND;
  4387. }
  4388. else
  4389. {
  4390. UINT i;
  4391. // Try to find the session on other cluster member
  4392. LockList(s->FarmMemberList);
  4393. {
  4394. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  4395. {
  4396. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  4397. if (f->Me == false)
  4398. {
  4399. RPC_SESSION_STATUS tmp;
  4400. Zero(&tmp, sizeof(tmp));
  4401. StrCpy(tmp.HubName, sizeof(tmp.HubName), t->HubName);
  4402. StrCpy(tmp.Name, sizeof(tmp.Name), t->Name);
  4403. if (SiCallGetSessionStatus(s, f, &tmp))
  4404. {
  4405. if (StrLen(tmp.HubName) != 0)
  4406. {
  4407. // Success to get session status
  4408. Copy(t, &tmp, sizeof(RPC_SESSION_STATUS));
  4409. break;
  4410. }
  4411. else
  4412. {
  4413. FreeRpcSessionStatus(&tmp);
  4414. }
  4415. }
  4416. }
  4417. }
  4418. if (i == LIST_NUM(s->FarmMemberList))
  4419. {
  4420. // not found after all
  4421. //
  4422. ret = ERR_OBJECT_NOT_FOUND;
  4423. }
  4424. }
  4425. UnlockList(s->FarmMemberList);
  4426. }
  4427. }
  4428. else
  4429. {
  4430. SESSION *s = sess;
  4431. Lock(s->lock);
  4432. {
  4433. StrCpy(t->Username, sizeof(t->Username), s->Username);
  4434. StrCpy(t->RealUsername, sizeof(t->RealUsername), s->UserNameReal);
  4435. StrCpy(t->GroupName, sizeof(t->GroupName), s->GroupName);
  4436. Copy(&t->NodeInfo, &s->NodeInfo, sizeof(NODE_INFO));
  4437. if (s->Connection != NULL)
  4438. {
  4439. t->ClientIp = IPToUINT(&s->Connection->ClientIp);
  4440. if (IsIP6(&s->Connection->ClientIp))
  4441. {
  4442. Copy(&t->ClientIp6, &s->Connection->ClientIp.ipv6_addr, sizeof(t->ClientIp6));
  4443. }
  4444. CopyIP(&t->ClientIpAddress, &s->Connection->ClientIp);
  4445. StrCpy(t->ClientHostName, sizeof(t->ClientHostName), s->Connection->ClientHostname);
  4446. }
  4447. }
  4448. Unlock(s->lock);
  4449. CiGetSessionStatus(&t->Status, s);
  4450. ReleaseSession(s);
  4451. }
  4452. ReleaseHub(h);
  4453. return ret;
  4454. }
  4455. // Main routine of session enumeration
  4456. void SiEnumSessionMain(SERVER *s, RPC_ENUM_SESSION *t)
  4457. {
  4458. char hubname[MAX_HUBNAME_LEN + 1];
  4459. UINT ret = ERR_NO_ERROR;
  4460. UINT num;
  4461. UINT i;
  4462. // Validate arguments
  4463. if (s == NULL || t == NULL)
  4464. {
  4465. return;
  4466. }
  4467. StrCpy(hubname, sizeof(hubname), t->HubName);
  4468. FreeRpcEnumSession(t);
  4469. Zero(t, sizeof(RPC_ENUM_SESSION));
  4470. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4471. // Local session enumeration
  4472. num = 0;
  4473. SiEnumLocalSession(s, hubname, t);
  4474. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  4475. {
  4476. LIST *fm_list;
  4477. fm_list = NewListFast(NULL);
  4478. // Remote session enumeration
  4479. LockList(s->FarmMemberList);
  4480. {
  4481. while (true)
  4482. {
  4483. bool escape = true;
  4484. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  4485. {
  4486. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  4487. if (IsInList(fm_list, f) == false)
  4488. {
  4489. Add(fm_list, f);
  4490. escape = false;
  4491. if (f->Me == false)
  4492. {
  4493. RPC_ENUM_SESSION tmp;
  4494. Zero(&tmp, sizeof(tmp));
  4495. SiCallEnumSession(s, f, hubname, &tmp);
  4496. AdjoinRpcEnumSession(t, &tmp);
  4497. FreeRpcEnumSession(&tmp);
  4498. }
  4499. break;
  4500. }
  4501. }
  4502. if (escape)
  4503. {
  4504. break;
  4505. }
  4506. UnlockList(s->FarmMemberList);
  4507. LockList(s->FarmMemberList);
  4508. }
  4509. }
  4510. UnlockList(s->FarmMemberList);
  4511. ReleaseList(fm_list);
  4512. }
  4513. }
  4514. // Enumerate sessions
  4515. UINT StEnumSession(ADMIN *a, RPC_ENUM_SESSION *t)
  4516. {
  4517. SERVER *s = a->Server;
  4518. CEDAR *c = s->Cedar;
  4519. HUB *h = NULL;
  4520. UINT ret = ERR_NO_ERROR;
  4521. CHECK_RIGHT;
  4522. LockHubList(c);
  4523. {
  4524. h = GetHub(c, t->HubName);
  4525. }
  4526. UnlockHubList(c);
  4527. if (h == NULL)
  4528. {
  4529. return ERR_HUB_NOT_FOUND;
  4530. }
  4531. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_enum_session") != 0)
  4532. {
  4533. ReleaseHub(h);
  4534. return ERR_NOT_ENOUGH_RIGHT;
  4535. }
  4536. SiEnumSessionMain(s, t);
  4537. ReleaseHub(h);
  4538. return ret;
  4539. }
  4540. // Enumerate groups
  4541. UINT StEnumGroup(ADMIN *a, RPC_ENUM_GROUP *t)
  4542. {
  4543. SERVER *s = a->Server;
  4544. CEDAR *c = s->Cedar;
  4545. HUB *h = NULL;
  4546. UINT ret = ERR_NO_ERROR;
  4547. char hubname[MAX_HUBNAME_LEN + 1];
  4548. StrCpy(hubname, sizeof(hubname), t->HubName);
  4549. CHECK_RIGHT;
  4550. NO_SUPPORT_FOR_BRIDGE;
  4551. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4552. {
  4553. return ERR_NOT_SUPPORTED;
  4554. }
  4555. LockHubList(c);
  4556. {
  4557. h = GetHub(c, t->HubName);
  4558. }
  4559. UnlockHubList(c);
  4560. if (h == NULL)
  4561. {
  4562. return ERR_HUB_NOT_FOUND;
  4563. }
  4564. AcLock(h);
  4565. {
  4566. UINT i, j;
  4567. FreeRpcEnumGroup(t);
  4568. Zero(t, sizeof(RPC_ENUM_GROUP));
  4569. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4570. t->NumGroup = LIST_NUM(h->HubDb->GroupList);
  4571. t->Groups = ZeroMalloc(sizeof(RPC_ENUM_GROUP_ITEM) * t->NumGroup);
  4572. for (i = 0;i < t->NumGroup;i++)
  4573. {
  4574. RPC_ENUM_GROUP_ITEM *e = &t->Groups[i];
  4575. USERGROUP *g = LIST_DATA(h->HubDb->GroupList, i);
  4576. Lock(g->lock);
  4577. {
  4578. StrCpy(e->Name, sizeof(e->Name), g->Name);
  4579. UniStrCpy(e->Realname, sizeof(e->Realname), g->RealName);
  4580. UniStrCpy(e->Note, sizeof(e->Note), g->Note);
  4581. if (g->Policy != NULL)
  4582. {
  4583. if (g->Policy->Access == false)
  4584. {
  4585. e->DenyAccess = true;
  4586. }
  4587. }
  4588. }
  4589. Unlock(g->lock);
  4590. e->NumUsers = 0;
  4591. LockList(h->HubDb->UserList);
  4592. {
  4593. for (j = 0;j < LIST_NUM(h->HubDb->UserList);j++)
  4594. {
  4595. USER *u = LIST_DATA(h->HubDb->UserList, j);
  4596. Lock(u->lock);
  4597. {
  4598. if (u->Group == g)
  4599. {
  4600. e->NumUsers++;
  4601. }
  4602. }
  4603. Unlock(u->lock);
  4604. }
  4605. }
  4606. UnlockList(h->HubDb->UserList);
  4607. }
  4608. }
  4609. AcUnlock(h);
  4610. ReleaseHub(h);
  4611. return ERR_NO_ERROR;
  4612. }
  4613. // Delete a group
  4614. UINT StDeleteGroup(ADMIN *a, RPC_DELETE_USER *t)
  4615. {
  4616. SERVER *s = a->Server;
  4617. CEDAR *c = s->Cedar;
  4618. HUB *h = NULL;
  4619. UINT ret = ERR_NO_ERROR;
  4620. if (IsEmptyStr(t->Name) || IsSafeStr(t->Name) == false)
  4621. {
  4622. return ERR_INVALID_PARAMETER;
  4623. }
  4624. CHECK_RIGHT;
  4625. NO_SUPPORT_FOR_BRIDGE;
  4626. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4627. {
  4628. return ERR_NOT_SUPPORTED;
  4629. }
  4630. LockHubList(c);
  4631. {
  4632. h = GetHub(c, t->HubName);
  4633. }
  4634. UnlockHubList(c);
  4635. if (h == NULL)
  4636. {
  4637. return ERR_HUB_NOT_FOUND;
  4638. }
  4639. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_groups") != 0)
  4640. {
  4641. ReleaseHub(h);
  4642. return ERR_NOT_ENOUGH_RIGHT;
  4643. }
  4644. AcLock(h);
  4645. {
  4646. if (AcDeleteGroup(h, t->Name) == false)
  4647. {
  4648. ret = ERR_OBJECT_NOT_FOUND;
  4649. }
  4650. }
  4651. AcUnlock(h);
  4652. if (ret == ERR_NO_ERROR)
  4653. {
  4654. ALog(a, h, "LA_DELETE_GROUP", t->Name);
  4655. }
  4656. ReleaseHub(h);
  4657. IncrementServerConfigRevision(s);
  4658. return ret;
  4659. }
  4660. // Get group information
  4661. UINT StGetGroup(ADMIN *a, RPC_SET_GROUP *t)
  4662. {
  4663. SERVER *s = a->Server;
  4664. CEDAR *c = s->Cedar;
  4665. HUB *h = NULL;
  4666. UINT ret = ERR_NO_ERROR;
  4667. char hubname[MAX_HUBNAME_LEN + 1];
  4668. if (IsEmptyStr(t->Name) || IsSafeStr(t->Name) == false)
  4669. {
  4670. return ERR_INVALID_PARAMETER;
  4671. }
  4672. CHECK_RIGHT;
  4673. NO_SUPPORT_FOR_BRIDGE;
  4674. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4675. {
  4676. return ERR_NOT_SUPPORTED;
  4677. }
  4678. StrCpy(hubname, sizeof(hubname), t->HubName);
  4679. LockHubList(c);
  4680. {
  4681. h = GetHub(c, t->HubName);
  4682. }
  4683. UnlockHubList(c);
  4684. if (h == NULL)
  4685. {
  4686. return ERR_HUB_NOT_FOUND;
  4687. }
  4688. AcLock(h);
  4689. {
  4690. USERGROUP *g = AcGetGroup(h, t->Name);
  4691. if (g == NULL)
  4692. {
  4693. ret = ERR_OBJECT_NOT_FOUND;
  4694. }
  4695. else
  4696. {
  4697. FreeRpcSetGroup(t);
  4698. Zero(t, sizeof(RPC_SET_GROUP));
  4699. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4700. Lock(g->lock);
  4701. {
  4702. StrCpy(t->Name, sizeof(t->Name), g->Name);
  4703. UniStrCpy(t->Realname, sizeof(t->Realname), g->RealName);
  4704. UniStrCpy(t->Note, sizeof(t->Note), g->Note);
  4705. Copy(&t->Traffic, g->Traffic, sizeof(TRAFFIC));
  4706. }
  4707. Unlock(g->lock);
  4708. t->Policy = GetGroupPolicy(g);
  4709. ReleaseGroup(g);
  4710. }
  4711. }
  4712. AcUnlock(h);
  4713. ReleaseHub(h);
  4714. return ret;
  4715. }
  4716. // Set group setting
  4717. UINT StSetGroup(ADMIN *a, RPC_SET_GROUP *t)
  4718. {
  4719. SERVER *s = a->Server;
  4720. CEDAR *c = s->Cedar;
  4721. HUB *h = NULL;
  4722. UINT ret = ERR_NO_ERROR;
  4723. if (IsEmptyStr(t->Name) || IsSafeStr(t->Name) == false)
  4724. {
  4725. return ERR_INVALID_PARAMETER;
  4726. }
  4727. CHECK_RIGHT;
  4728. NO_SUPPORT_FOR_BRIDGE;
  4729. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4730. {
  4731. return ERR_NOT_SUPPORTED;
  4732. }
  4733. LockHubList(c);
  4734. {
  4735. h = GetHub(c, t->HubName);
  4736. }
  4737. UnlockHubList(c);
  4738. if (h == NULL)
  4739. {
  4740. return ERR_HUB_NOT_FOUND;
  4741. }
  4742. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_groups") != 0)
  4743. {
  4744. ReleaseHub(h);
  4745. return ERR_NOT_ENOUGH_RIGHT;
  4746. }
  4747. AcLock(h);
  4748. {
  4749. USERGROUP *g = AcGetGroup(h, t->Name);
  4750. if (g == NULL)
  4751. {
  4752. ret = ERR_OBJECT_NOT_FOUND;
  4753. }
  4754. else
  4755. {
  4756. Lock(g->lock);
  4757. {
  4758. Free(g->RealName);
  4759. Free(g->Note);
  4760. g->RealName = UniCopyStr(t->Realname);
  4761. g->Note = UniCopyStr(t->Note);
  4762. }
  4763. Unlock(g->lock);
  4764. SetGroupPolicy(g, t->Policy);
  4765. ReleaseGroup(g);
  4766. ALog(a, h, "LA_SET_GROUP", t->Name);
  4767. }
  4768. }
  4769. AcUnlock(h);
  4770. ReleaseHub(h);
  4771. IncrementServerConfigRevision(s);
  4772. return ret;
  4773. }
  4774. // Create a group
  4775. UINT StCreateGroup(ADMIN *a, RPC_SET_GROUP *t)
  4776. {
  4777. SERVER *s = a->Server;
  4778. CEDAR *c = s->Cedar;
  4779. HUB *h = NULL;
  4780. UINT ret = ERR_NO_ERROR;
  4781. if (IsEmptyStr(t->Name) || IsSafeStr(t->Name) == false)
  4782. {
  4783. return ERR_INVALID_PARAMETER;
  4784. }
  4785. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4786. {
  4787. return ERR_NOT_FARM_CONTROLLER;
  4788. }
  4789. CHECK_RIGHT;
  4790. NO_SUPPORT_FOR_BRIDGE;
  4791. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4792. {
  4793. return ERR_NOT_SUPPORTED;
  4794. }
  4795. LockHubList(c);
  4796. {
  4797. h = GetHub(c, t->HubName);
  4798. }
  4799. UnlockHubList(c);
  4800. if (h == NULL)
  4801. {
  4802. return ERR_HUB_NOT_FOUND;
  4803. }
  4804. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_groups") != 0)
  4805. {
  4806. ReleaseHub(h);
  4807. return ERR_NOT_ENOUGH_RIGHT;
  4808. }
  4809. AcLock(h);
  4810. {
  4811. if (AcIsGroup(h, t->Name))
  4812. {
  4813. ret = ERR_GROUP_ALREADY_EXISTS;
  4814. }
  4815. else
  4816. {
  4817. USERGROUP *g = NewGroup(t->Name, t->Realname, t->Note);
  4818. SetGroupPolicy(g, t->Policy);
  4819. if ((LIST_NUM(h->HubDb->GroupList) >= GetServerCapsInt(a->Server, "i_max_users_per_hub")) ||
  4820. ((GetHubAdminOption(h, "max_groups") != 0) && (LIST_NUM(h->HubDb->GroupList) >= GetHubAdminOption(h, "max_groups"))))
  4821. {
  4822. ret = ERR_TOO_MANY_GROUP;
  4823. }
  4824. else
  4825. {
  4826. AcAddGroup(h, g);
  4827. }
  4828. ReleaseGroup(g);
  4829. ALog(a, h, "LA_CREATE_GROUP", t->Name);
  4830. }
  4831. }
  4832. AcUnlock(h);
  4833. ReleaseHub(h);
  4834. IncrementServerConfigRevision(s);
  4835. return ret;
  4836. }
  4837. // Enumerate users
  4838. UINT StEnumUser(ADMIN *a, RPC_ENUM_USER *t)
  4839. {
  4840. SERVER *s = a->Server;
  4841. CEDAR *c = s->Cedar;
  4842. HUB *h = NULL;
  4843. UINT ret = ERR_NO_ERROR;
  4844. char hubname[MAX_HUBNAME_LEN + 1];
  4845. UINT i, num;
  4846. CHECK_RIGHT;
  4847. NO_SUPPORT_FOR_BRIDGE;
  4848. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4849. {
  4850. return ERR_NOT_SUPPORTED;
  4851. }
  4852. LockHubList(c);
  4853. {
  4854. h = GetHub(c, t->HubName);
  4855. }
  4856. UnlockHubList(c);
  4857. if (h == NULL)
  4858. {
  4859. return ERR_HUB_NOT_FOUND;
  4860. }
  4861. FreeRpcEnumUser(t);
  4862. StrCpy(hubname, sizeof(hubname), t->HubName);
  4863. Zero(t, sizeof(RPC_ENUM_USER));
  4864. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4865. LockList(h->HubDb->UserList);
  4866. {
  4867. num = LIST_NUM(h->HubDb->UserList);
  4868. t->NumUser = num;
  4869. t->Users = ZeroMalloc(sizeof(RPC_ENUM_USER_ITEM) * num);
  4870. for (i = 0;i < num;i++)
  4871. {
  4872. USER *u = LIST_DATA(h->HubDb->UserList, i);
  4873. Lock(u->lock);
  4874. {
  4875. RPC_ENUM_USER_ITEM *e = &t->Users[i];
  4876. StrCpy(e->Name, sizeof(e->Name), u->Name);
  4877. StrCpy(e->GroupName, sizeof(e->GroupName), u->GroupName);
  4878. UniStrCpy(e->Realname, sizeof(e->Realname), u->RealName);
  4879. UniStrCpy(e->Note, sizeof(e->Note), u->Note);
  4880. e->AuthType = u->AuthType;
  4881. e->LastLoginTime = u->LastLoginTime;
  4882. e->NumLogin = u->NumLogin;
  4883. if (u->Policy != NULL)
  4884. {
  4885. e->DenyAccess = u->Policy->Access ? false : true;
  4886. }
  4887. Copy(&e->Traffic, u->Traffic, sizeof(TRAFFIC));
  4888. e->IsTrafficFilled = true;
  4889. e->Expires = u->ExpireTime;
  4890. e->IsExpiresFilled = true;
  4891. }
  4892. Unlock(u->lock);
  4893. }
  4894. }
  4895. UnlockList(h->HubDb->UserList);
  4896. ReleaseHub(h);
  4897. IncrementServerConfigRevision(s);
  4898. return ERR_NO_ERROR;
  4899. }
  4900. // Delete a user
  4901. UINT StDeleteUser(ADMIN *a, RPC_DELETE_USER *t)
  4902. {
  4903. SERVER *s = a->Server;
  4904. CEDAR *c = s->Cedar;
  4905. HUB *h = NULL;
  4906. UINT ret = ERR_NO_ERROR;
  4907. if (IsEmptyStr(t->Name) || IsUserName(t->Name) == false)
  4908. {
  4909. return ERR_INVALID_PARAMETER;
  4910. }
  4911. CHECK_RIGHT;
  4912. NO_SUPPORT_FOR_BRIDGE;
  4913. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4914. {
  4915. return ERR_NOT_SUPPORTED;
  4916. }
  4917. LockHubList(c);
  4918. {
  4919. h = GetHub(c, t->HubName);
  4920. }
  4921. UnlockHubList(c);
  4922. if (h == NULL)
  4923. {
  4924. return ERR_HUB_NOT_FOUND;
  4925. }
  4926. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_users") != 0)
  4927. {
  4928. ReleaseHub(h);
  4929. return ERR_NOT_ENOUGH_RIGHT;
  4930. }
  4931. ALog(a, h, "LA_DELETE_USER", t->Name);
  4932. AcLock(h);
  4933. {
  4934. if (AcDeleteUser(h, t->Name) == false)
  4935. {
  4936. ret = ERR_OBJECT_NOT_FOUND;
  4937. }
  4938. }
  4939. AcUnlock(h);
  4940. ReleaseHub(h);
  4941. IncrementServerConfigRevision(s);
  4942. return ret;
  4943. }
  4944. // Get user setting
  4945. UINT StGetUser(ADMIN *a, RPC_SET_USER *t)
  4946. {
  4947. SERVER *s = a->Server;
  4948. CEDAR *c = s->Cedar;
  4949. HUB *h = NULL;
  4950. UINT ret = ERR_NO_ERROR;
  4951. USER *u = NULL;
  4952. USERGROUP *g = NULL;
  4953. char name[MAX_USERNAME_LEN + 1];
  4954. char hubname[MAX_HUBNAME_LEN + 1];
  4955. StrCpy(name, sizeof(name), t->Name);
  4956. StrCpy(hubname, sizeof(hubname), t->HubName);
  4957. if (IsEmptyStr(t->Name) || IsUserName(t->Name) == false)
  4958. {
  4959. return ERR_INVALID_PARAMETER;
  4960. }
  4961. CHECK_RIGHT;
  4962. NO_SUPPORT_FOR_BRIDGE;
  4963. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  4964. {
  4965. return ERR_NOT_SUPPORTED;
  4966. }
  4967. FreeRpcSetUser(t);
  4968. Zero(t, sizeof(RPC_SET_USER));
  4969. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  4970. StrCpy(t->Name, sizeof(t->Name), name);
  4971. LockHubList(c);
  4972. {
  4973. h = GetHub(c, hubname);
  4974. }
  4975. UnlockHubList(c);
  4976. if (h == NULL)
  4977. {
  4978. return ERR_HUB_NOT_FOUND;
  4979. }
  4980. AcLock(h);
  4981. {
  4982. u = AcGetUser(h, name);
  4983. if (u == NULL)
  4984. {
  4985. ret = ERR_OBJECT_NOT_FOUND;
  4986. }
  4987. else
  4988. {
  4989. Lock(u->lock);
  4990. {
  4991. StrCpy(t->GroupName, sizeof(t->GroupName), u->GroupName);
  4992. UniStrCpy(t->Realname, sizeof(t->Realname), u->RealName);
  4993. UniStrCpy(t->Note, sizeof(t->Note), u->Note);
  4994. t->CreatedTime = u->CreatedTime;
  4995. t->UpdatedTime = u->UpdatedTime;
  4996. t->ExpireTime = u->ExpireTime;
  4997. t->AuthType = u->AuthType;
  4998. t->AuthData = CopyAuthData(u->AuthData, t->AuthType);
  4999. t->NumLogin = u->NumLogin;
  5000. Copy(&t->Traffic, u->Traffic, sizeof(TRAFFIC));
  5001. if (u->Policy != NULL)
  5002. {
  5003. t->Policy = ClonePolicy(u->Policy);
  5004. }
  5005. }
  5006. Unlock(u->lock);
  5007. ReleaseUser(u);
  5008. }
  5009. }
  5010. AcUnlock(h);
  5011. ReleaseHub(h);
  5012. return ret;
  5013. }
  5014. // Set user setting
  5015. UINT StSetUser(ADMIN *a, RPC_SET_USER *t)
  5016. {
  5017. SERVER *s = a->Server;
  5018. CEDAR *c = s->Cedar;
  5019. HUB *h = NULL;
  5020. UINT ret = ERR_NO_ERROR;
  5021. USER *u = NULL;
  5022. USERGROUP *g = NULL;
  5023. if (IsEmptyStr(t->Name) || IsUserName(t->Name) == false)
  5024. {
  5025. return ERR_INVALID_PARAMETER;
  5026. }
  5027. NO_SUPPORT_FOR_BRIDGE;
  5028. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5029. {
  5030. return ERR_NOT_SUPPORTED;
  5031. }
  5032. CHECK_RIGHT;
  5033. if (GetGlobalServerFlag(GSF_DISABLE_RADIUS_AUTH) != 0)
  5034. {
  5035. if (t->AuthType == AUTHTYPE_USERCERT || t->AuthType == AUTHTYPE_RADIUS || t->AuthType == AUTHTYPE_ROOTCERT || t->AuthType == AUTHTYPE_NT)
  5036. {
  5037. return ERR_NOT_SUPPORTED_AUTH_ON_OPENSOURCE;
  5038. }
  5039. }
  5040. if (StrCmpi(t->Name, "*") == 0)
  5041. {
  5042. if (t->AuthType != AUTHTYPE_RADIUS && t->AuthType != AUTHTYPE_NT)
  5043. {
  5044. return ERR_INVALID_PARAMETER;
  5045. }
  5046. }
  5047. if (t->AuthType == AUTHTYPE_USERCERT)
  5048. {
  5049. AUTHUSERCERT *c = t->AuthData;
  5050. if (c != NULL && c->UserX != NULL &&
  5051. c->UserX->is_compatible_bit == false)
  5052. {
  5053. return ERR_NOT_RSA_1024;
  5054. }
  5055. if (c == NULL || c->UserX == NULL)
  5056. {
  5057. return ERR_INVALID_PARAMETER;
  5058. }
  5059. }
  5060. LockHubList(c);
  5061. {
  5062. h = GetHub(c, t->HubName);
  5063. }
  5064. UnlockHubList(c);
  5065. if (h == NULL)
  5066. {
  5067. return ERR_HUB_NOT_FOUND;
  5068. }
  5069. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_users") != 0)
  5070. {
  5071. ReleaseHub(h);
  5072. return ERR_NOT_ENOUGH_RIGHT;
  5073. }
  5074. AcLock(h);
  5075. {
  5076. u = AcGetUser(h, t->Name);
  5077. if (u == NULL)
  5078. {
  5079. ret = ERR_OBJECT_NOT_FOUND;
  5080. }
  5081. else
  5082. {
  5083. Lock(u->lock);
  5084. {
  5085. if (StrLen(t->GroupName) != 0)
  5086. {
  5087. g = AcGetGroup(h, t->GroupName);
  5088. if (g != NULL)
  5089. {
  5090. JoinUserToGroup(u, g);
  5091. ReleaseGroup(g);
  5092. }
  5093. else
  5094. {
  5095. ret = ERR_GROUP_NOT_FOUND;
  5096. }
  5097. }
  5098. else
  5099. {
  5100. JoinUserToGroup(u, NULL);
  5101. }
  5102. if (ret != ERR_GROUP_NOT_FOUND)
  5103. {
  5104. Free(u->RealName);
  5105. Free(u->Note);
  5106. u->RealName = UniCopyStr(t->Realname);
  5107. u->Note = UniCopyStr(t->Note);
  5108. SetUserAuthData(u, t->AuthType, CopyAuthData(t->AuthData, t->AuthType));
  5109. u->ExpireTime = t->ExpireTime;
  5110. u->UpdatedTime = SystemTime64();
  5111. SetUserPolicy(u, t->Policy);
  5112. }
  5113. }
  5114. Unlock(u->lock);
  5115. IncrementServerConfigRevision(s);
  5116. ReleaseUser(u);
  5117. }
  5118. }
  5119. AcUnlock(h);
  5120. if (ret == ERR_NO_ERROR)
  5121. {
  5122. ALog(a, h, "LA_SET_USER", t->Name);
  5123. }
  5124. ReleaseHub(h);
  5125. return ret;
  5126. }
  5127. // Create a user
  5128. UINT StCreateUser(ADMIN *a, RPC_SET_USER *t)
  5129. {
  5130. SERVER *s = a->Server;
  5131. CEDAR *c = s->Cedar;
  5132. HUB *h = NULL;
  5133. UINT ret = ERR_NO_ERROR;
  5134. USER *u;
  5135. USERGROUP *g = NULL;
  5136. if (IsEmptyStr(t->Name) || IsUserName(t->Name) == false)
  5137. {
  5138. return ERR_INVALID_PARAMETER;
  5139. }
  5140. NO_SUPPORT_FOR_BRIDGE;
  5141. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5142. {
  5143. return ERR_NOT_SUPPORTED;
  5144. }
  5145. CHECK_RIGHT;
  5146. if (GetGlobalServerFlag(GSF_DISABLE_RADIUS_AUTH) != 0)
  5147. {
  5148. if (t->AuthType == AUTHTYPE_USERCERT || t->AuthType == AUTHTYPE_RADIUS || t->AuthType == AUTHTYPE_ROOTCERT || t->AuthType == AUTHTYPE_NT)
  5149. {
  5150. return ERR_NOT_SUPPORTED_AUTH_ON_OPENSOURCE;
  5151. }
  5152. }
  5153. if (t->AuthType == AUTHTYPE_USERCERT)
  5154. {
  5155. AUTHUSERCERT *c = t->AuthData;
  5156. if (c != NULL && c->UserX != NULL &&
  5157. c->UserX->is_compatible_bit == false)
  5158. {
  5159. return ERR_NOT_RSA_1024;
  5160. }
  5161. if (c == NULL || c->UserX == NULL)
  5162. {
  5163. return ERR_INVALID_PARAMETER;
  5164. }
  5165. }
  5166. if (IsUserName(t->Name) == false)
  5167. {
  5168. return ERR_INVALID_PARAMETER;
  5169. }
  5170. if (StrCmpi(t->Name, "*") == 0)
  5171. {
  5172. if (t->AuthType != AUTHTYPE_RADIUS && t->AuthType != AUTHTYPE_NT)
  5173. {
  5174. return ERR_INVALID_PARAMETER;
  5175. }
  5176. }
  5177. LockHubList(c);
  5178. {
  5179. h = GetHub(c, t->HubName);
  5180. }
  5181. UnlockHubList(c);
  5182. if (h == NULL)
  5183. {
  5184. return ERR_HUB_NOT_FOUND;
  5185. }
  5186. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_users") != 0)
  5187. {
  5188. ReleaseHub(h);
  5189. return ERR_NOT_ENOUGH_RIGHT;
  5190. }
  5191. u = NewUser(t->Name, t->Realname, t->Note, t->AuthType, CopyAuthData(t->AuthData, t->AuthType));
  5192. if (u == NULL)
  5193. {
  5194. ReleaseHub(h);
  5195. return ERR_INTERNAL_ERROR;
  5196. }
  5197. u->ExpireTime = t->ExpireTime;
  5198. SetUserPolicy(u, t->Policy);
  5199. AcLock(h);
  5200. {
  5201. if ((LIST_NUM(h->HubDb->UserList) >= GetServerCapsInt(a->Server, "i_max_users_per_hub")) ||
  5202. ((GetHubAdminOption(h, "max_users") != 0) && (LIST_NUM(h->HubDb->UserList) >= GetHubAdminOption(h, "max_users"))))
  5203. {
  5204. ret = ERR_TOO_MANY_USER;
  5205. }
  5206. else if (SiTooManyUserObjectsInServer(s, false))
  5207. {
  5208. ret = ERR_TOO_MANY_USERS_CREATED;
  5209. ALog(a, h, "ERR_128");
  5210. }
  5211. else if (AcIsUser(h, t->Name))
  5212. {
  5213. ret = ERR_USER_ALREADY_EXISTS;
  5214. }
  5215. else
  5216. {
  5217. if (StrLen(t->GroupName) != 0)
  5218. {
  5219. g = AcGetGroup(h, t->GroupName);
  5220. if (g == NULL)
  5221. {
  5222. ret = ERR_GROUP_NOT_FOUND;
  5223. }
  5224. }
  5225. if (ret != ERR_GROUP_NOT_FOUND)
  5226. {
  5227. if (g != NULL)
  5228. {
  5229. JoinUserToGroup(u, g);
  5230. ReleaseGroup(g);
  5231. }
  5232. AcAddUser(h, u);
  5233. ALog(a, h, "LA_CREATE_USER", t->Name);
  5234. IncrementServerConfigRevision(s);
  5235. }
  5236. }
  5237. }
  5238. AcUnlock(h);
  5239. ReleaseUser(u);
  5240. ReleaseHub(h);
  5241. return ret;
  5242. }
  5243. // Get access list
  5244. UINT StEnumAccess(ADMIN *a, RPC_ENUM_ACCESS_LIST *t)
  5245. {
  5246. SERVER *s = a->Server;
  5247. CEDAR *c = s->Cedar;
  5248. HUB *h;
  5249. UINT i;
  5250. char hubname[MAX_HUBNAME_LEN + 1];
  5251. CHECK_RIGHT;
  5252. NO_SUPPORT_FOR_BRIDGE;
  5253. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5254. {
  5255. return ERR_NOT_SUPPORTED;
  5256. }
  5257. LockHubList(c);
  5258. {
  5259. h = GetHub(c, t->HubName);
  5260. }
  5261. UnlockHubList(c);
  5262. if (h == NULL)
  5263. {
  5264. return ERR_HUB_NOT_FOUND;
  5265. }
  5266. StrCpy(hubname, sizeof(hubname), t->HubName);
  5267. FreeRpcEnumAccessList(t);
  5268. Zero(t, sizeof(RPC_ENUM_ACCESS_LIST));
  5269. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  5270. LockList(h->AccessList);
  5271. {
  5272. t->NumAccess = LIST_NUM(h->AccessList);
  5273. t->Accesses = ZeroMalloc(sizeof(ACCESS) * t->NumAccess);
  5274. for (i = 0;i < LIST_NUM(h->AccessList);i++)
  5275. {
  5276. ACCESS *a = &t->Accesses[i];
  5277. Copy(a, LIST_DATA(h->AccessList, i), sizeof(ACCESS));
  5278. a->UniqueId = HashPtrToUINT(LIST_DATA(h->AccessList, i));
  5279. }
  5280. }
  5281. UnlockList(h->AccessList);
  5282. ReleaseHub(h);
  5283. return ERR_NO_ERROR;
  5284. }
  5285. // Delete access list entry
  5286. UINT StDeleteAccess(ADMIN *a, RPC_DELETE_ACCESS *t)
  5287. {
  5288. SERVER *s = a->Server;
  5289. CEDAR *c = s->Cedar;
  5290. HUB *h;
  5291. UINT i;
  5292. bool exists;
  5293. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5294. {
  5295. return ERR_NOT_FARM_CONTROLLER;
  5296. }
  5297. CHECK_RIGHT;
  5298. NO_SUPPORT_FOR_BRIDGE;
  5299. LockHubList(c);
  5300. {
  5301. h = GetHub(c, t->HubName);
  5302. }
  5303. UnlockHubList(c);
  5304. if (h == NULL)
  5305. {
  5306. return ERR_HUB_NOT_FOUND;
  5307. }
  5308. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_access_list") != 0)
  5309. {
  5310. ReleaseHub(h);
  5311. return ERR_NOT_ENOUGH_RIGHT;
  5312. }
  5313. exists = false;
  5314. LockList(h->AccessList);
  5315. {
  5316. for (i = 0;i < LIST_NUM(h->AccessList);i++)
  5317. {
  5318. ACCESS *access = LIST_DATA(h->AccessList, i);
  5319. if ((t->Id < MAX_ACCESSLISTS && access->Id == t->Id) ||
  5320. (t->Id >= MAX_ACCESSLISTS && HashPtrToUINT(access) == t->Id))
  5321. {
  5322. Free(access);
  5323. Delete(h->AccessList, access);
  5324. exists = true;
  5325. break;
  5326. }
  5327. }
  5328. }
  5329. UnlockList(h->AccessList);
  5330. if (exists == false)
  5331. {
  5332. ReleaseHub(h);
  5333. return ERR_OBJECT_NOT_FOUND;
  5334. }
  5335. ALog(a, h, "LA_DELETE_ACCESS");
  5336. IncrementServerConfigRevision(s);
  5337. ReleaseHub(h);
  5338. return ERR_NO_ERROR;
  5339. }
  5340. // Set access list
  5341. UINT StSetAccessList(ADMIN *a, RPC_ENUM_ACCESS_LIST *t)
  5342. {
  5343. SERVER *s = a->Server;
  5344. CEDAR *c = s->Cedar;
  5345. HUB *h;
  5346. UINT i;
  5347. bool no_jitter = false;
  5348. bool no_include = false;
  5349. UINT ret = ERR_NO_ERROR;
  5350. NO_SUPPORT_FOR_BRIDGE;
  5351. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5352. {
  5353. return ERR_NOT_SUPPORTED;
  5354. }
  5355. CHECK_RIGHT;
  5356. if (t->NumAccess > GetServerCapsInt(a->Server, "i_max_access_lists"))
  5357. {
  5358. return ERR_TOO_MANY_ACCESS_LIST;
  5359. }
  5360. LockHubList(c);
  5361. {
  5362. h = GetHub(c, t->HubName);
  5363. }
  5364. UnlockHubList(c);
  5365. if (h == NULL)
  5366. {
  5367. return ERR_HUB_NOT_FOUND;
  5368. }
  5369. no_jitter = GetHubAdminOption(h, "no_delay_jitter_packet_loss");
  5370. no_include = GetHubAdminOption(h, "no_access_list_include_file");
  5371. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_access_list") != 0)
  5372. {
  5373. ReleaseHub(h);
  5374. return ERR_NOT_ENOUGH_RIGHT;
  5375. }
  5376. if (a->ServerAdmin == false && GetHubAdminOption(h, "max_accesslists") != 0 &&
  5377. t->NumAccess > GetHubAdminOption(h, "max_accesslists"))
  5378. {
  5379. ReleaseHub(h);
  5380. return ERR_TOO_MANY_ACCESS_LIST;
  5381. }
  5382. LockList(h->AccessList);
  5383. {
  5384. UINT i;
  5385. // Confirm whether the access list of form which cannot handle by the old client already exists
  5386. if (a->ClientBuild != 0)
  5387. {
  5388. if (a->ClientBuild < 6560)
  5389. {
  5390. for (i = 0;i < LIST_NUM(h->AccessList);i++)
  5391. {
  5392. ACCESS *access = LIST_DATA(h->AccessList, i);
  5393. if (access->IsIPv6 ||
  5394. access->Jitter != 0 || access->Loss != 0 || access->Delay != 0)
  5395. {
  5396. ret = ERR_VERSION_INVALID;
  5397. break;
  5398. }
  5399. }
  5400. }
  5401. if (a->ClientBuild < 8234)
  5402. {
  5403. for (i = 0;i < LIST_NUM(h->AccessList);i++)
  5404. {
  5405. ACCESS *access = LIST_DATA(h->AccessList, i);
  5406. if (IsEmptyStr(access->RedirectUrl) == false)
  5407. {
  5408. ret = ERR_VERSION_INVALID;
  5409. break;
  5410. }
  5411. }
  5412. }
  5413. }
  5414. if (ret == ERR_NO_ERROR)
  5415. {
  5416. // Delete whole access list
  5417. for (i = 0;i < LIST_NUM(h->AccessList);i++)
  5418. {
  5419. ACCESS *access = LIST_DATA(h->AccessList, i);
  5420. Free(access);
  5421. }
  5422. DeleteAll(h->AccessList);
  5423. }
  5424. }
  5425. if (ret == ERR_NO_ERROR)
  5426. {
  5427. ALog(a, h, "LA_SET_ACCESS_LIST", t->NumAccess);
  5428. // Add whole access list
  5429. for (i = 0;i < t->NumAccess;i++)
  5430. {
  5431. ACCESS *a = &t->Accesses[i];
  5432. if (no_jitter)
  5433. {
  5434. a->Jitter = a->Loss = a->Delay = 0;
  5435. }
  5436. if (no_include)
  5437. {
  5438. if (StartWith(a->SrcUsername, ACCESS_LIST_INCLUDED_PREFIX) ||
  5439. StartWith(a->SrcUsername, ACCESS_LIST_EXCLUDED_PREFIX))
  5440. {
  5441. ClearStr(a->SrcUsername, sizeof(a->SrcUsername));
  5442. }
  5443. if (StartWith(a->DestUsername, ACCESS_LIST_INCLUDED_PREFIX) ||
  5444. StartWith(a->DestUsername, ACCESS_LIST_EXCLUDED_PREFIX))
  5445. {
  5446. ClearStr(a->DestUsername, sizeof(a->DestUsername));
  5447. }
  5448. }
  5449. if (i == (t->NumAccess - 1))
  5450. {
  5451. Sort(h->AccessList);
  5452. }
  5453. AddAccessListEx(h, a, ((i != (t->NumAccess - 1)) ? true : false), ((i != (t->NumAccess - 1)) ? true : false));
  5454. }
  5455. UnlockList(h->AccessList);
  5456. IncrementServerConfigRevision(s);
  5457. h->CurrentVersion++;
  5458. SiHubUpdateProc(h);
  5459. }
  5460. else
  5461. {
  5462. UnlockList(h->AccessList);
  5463. }
  5464. ReleaseHub(h);
  5465. return ret;
  5466. }
  5467. // Add access list entry
  5468. UINT StAddAccess(ADMIN *a, RPC_ADD_ACCESS *t)
  5469. {
  5470. SERVER *s = a->Server;
  5471. CEDAR *c = s->Cedar;
  5472. HUB *h;
  5473. bool no_jitter = false;
  5474. bool no_include = false;
  5475. NO_SUPPORT_FOR_BRIDGE;
  5476. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  5477. {
  5478. return ERR_NOT_SUPPORTED;
  5479. }
  5480. CHECK_RIGHT;
  5481. LockHubList(c);
  5482. {
  5483. h = GetHub(c, t->HubName);
  5484. }
  5485. UnlockHubList(c);
  5486. if (h == NULL)
  5487. {
  5488. return ERR_HUB_NOT_FOUND;
  5489. }
  5490. no_jitter = GetHubAdminOption(h, "no_delay_jitter_packet_loss");
  5491. no_include = GetHubAdminOption(h, "no_access_list_include_file");
  5492. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_access_list") != 0)
  5493. {
  5494. ReleaseHub(h);
  5495. return ERR_NOT_ENOUGH_RIGHT;
  5496. }
  5497. if ((LIST_NUM(h->AccessList) >= GetServerCapsInt(a->Server, "i_max_access_lists") ||
  5498. (GetHubAdminOption(h, "max_accesslists") != 0) && (LIST_NUM(h->AccessList) >= GetHubAdminOption(h, "max_accesslists"))))
  5499. {
  5500. ReleaseHub(h);
  5501. return ERR_TOO_MANY_ACCESS_LIST;
  5502. }
  5503. ALog(a, h, "LA_ADD_ACCESS");
  5504. if (no_jitter)
  5505. {
  5506. t->Access.Jitter = t->Access.Delay = t->Access.Loss = 0;
  5507. }
  5508. if (no_include)
  5509. {
  5510. if (no_include)
  5511. {
  5512. if (StartWith(t->Access.SrcUsername, ACCESS_LIST_INCLUDED_PREFIX) ||
  5513. StartWith(t->Access.SrcUsername, ACCESS_LIST_EXCLUDED_PREFIX))
  5514. {
  5515. ClearStr(t->Access.SrcUsername, sizeof(t->Access.SrcUsername));
  5516. }
  5517. if (StartWith(t->Access.DestUsername, ACCESS_LIST_INCLUDED_PREFIX) ||
  5518. StartWith(t->Access.DestUsername, ACCESS_LIST_EXCLUDED_PREFIX))
  5519. {
  5520. ClearStr(t->Access.DestUsername, sizeof(t->Access.DestUsername));
  5521. }
  5522. }
  5523. }
  5524. AddAccessList(h, &t->Access);
  5525. h->CurrentVersion++;
  5526. SiHubUpdateProc(h);
  5527. ReleaseHub(h);
  5528. IncrementServerConfigRevision(s);
  5529. return ERR_NO_ERROR;
  5530. }
  5531. // Rename link (cascade connection)
  5532. UINT StRenameLink(ADMIN *a, RPC_RENAME_LINK *t)
  5533. {
  5534. UINT i;
  5535. SERVER *s = a->Server;
  5536. CEDAR *c = s->Cedar;
  5537. HUB *h;
  5538. UINT ret = ERR_NO_ERROR;
  5539. LINK *k;
  5540. bool exists = false;
  5541. if (UniIsEmptyStr(t->OldAccountName) || UniIsEmptyStr(t->NewAccountName))
  5542. {
  5543. return ERR_INVALID_PARAMETER;
  5544. }
  5545. if (s->ServerType != SERVER_TYPE_STANDALONE)
  5546. {
  5547. return ERR_NOT_SUPPORTED;
  5548. }
  5549. CHECK_RIGHT;
  5550. if (UniStrCmpi(t->NewAccountName, t->OldAccountName) == 0)
  5551. {
  5552. // Noop if new name is same to old name
  5553. return ERR_NO_ERROR;
  5554. }
  5555. h = GetHub(c, t->HubName);
  5556. if (h == NULL)
  5557. {
  5558. return ERR_HUB_NOT_FOUND;
  5559. }
  5560. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_cascade") != 0)
  5561. {
  5562. ReleaseHub(h);
  5563. return ERR_NOT_ENOUGH_RIGHT;
  5564. }
  5565. k = NULL;
  5566. // Find specified link
  5567. LockList(h->LinkList);
  5568. {
  5569. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  5570. {
  5571. LINK *kk = LIST_DATA(h->LinkList, i);
  5572. Lock(kk->lock);
  5573. {
  5574. if (UniStrCmpi(kk->Option->AccountName, t->OldAccountName) == 0)
  5575. {
  5576. k = kk;
  5577. AddRef(kk->ref);
  5578. }
  5579. }
  5580. Unlock(kk->lock);
  5581. if (k != NULL)
  5582. {
  5583. break;
  5584. }
  5585. }
  5586. exists = false;
  5587. if (k != NULL)
  5588. {
  5589. // Check whether the new link name is same to other links
  5590. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  5591. {
  5592. LINK *kk = LIST_DATA(h->LinkList, i);
  5593. Lock(kk->lock);
  5594. {
  5595. if (UniStrCmpi(kk->Option->AccountName, t->NewAccountName) == 0)
  5596. {
  5597. // duplicated
  5598. exists = true;
  5599. }
  5600. }
  5601. Unlock(kk->lock);
  5602. }
  5603. if (exists)
  5604. {
  5605. // Already same name exists
  5606. ret = ERR_LINK_ALREADY_EXISTS;
  5607. }
  5608. else
  5609. {
  5610. // Do rename
  5611. UniStrCpy(k->Option->AccountName, sizeof(k->Option->AccountName), t->NewAccountName);
  5612. ALog(a, h, "LA_RENAME_LINK", t->OldAccountName, t->NewAccountName);
  5613. IncrementServerConfigRevision(s);
  5614. }
  5615. }
  5616. }
  5617. UnlockList(h->LinkList);
  5618. if (k == NULL)
  5619. {
  5620. // specified link is not found
  5621. ReleaseHub(h);
  5622. return ERR_OBJECT_NOT_FOUND;
  5623. }
  5624. ReleaseLink(k);
  5625. ReleaseHub(h);
  5626. return ret;
  5627. }
  5628. // Delete a link
  5629. UINT StDeleteLink(ADMIN *a, RPC_LINK *t)
  5630. {
  5631. UINT i;
  5632. SERVER *s = a->Server;
  5633. CEDAR *c = s->Cedar;
  5634. HUB *h;
  5635. UINT ret = ERR_NO_ERROR;
  5636. char hubname[MAX_HUBNAME_LEN + 1];
  5637. wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
  5638. LINK *k;
  5639. if (UniIsEmptyStr(t->AccountName))
  5640. {
  5641. return ERR_INVALID_PARAMETER;
  5642. }
  5643. if (s->ServerType != SERVER_TYPE_STANDALONE)
  5644. {
  5645. return ERR_NOT_SUPPORTED;
  5646. }
  5647. CHECK_RIGHT;
  5648. LockHubList(c);
  5649. {
  5650. h = GetHub(c, t->HubName);
  5651. }
  5652. UnlockHubList(c);
  5653. if (h == NULL)
  5654. {
  5655. return ERR_HUB_NOT_FOUND;
  5656. }
  5657. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_cascade") != 0)
  5658. {
  5659. ReleaseHub(h);
  5660. return ERR_NOT_ENOUGH_RIGHT;
  5661. }
  5662. StrCpy(hubname, sizeof(hubname), t->HubName);
  5663. UniStrCpy(accountname, sizeof(accountname), t->AccountName);
  5664. k = NULL;
  5665. // Find specified link
  5666. LockList(h->LinkList);
  5667. {
  5668. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  5669. {
  5670. LINK *kk = LIST_DATA(h->LinkList, i);
  5671. Lock(kk->lock);
  5672. {
  5673. if (UniStrCmpi(kk->Option->AccountName, accountname) == 0)
  5674. {
  5675. k = kk;
  5676. AddRef(kk->ref);
  5677. }
  5678. }
  5679. Unlock(kk->lock);
  5680. if (k != NULL)
  5681. {
  5682. break;
  5683. }
  5684. }
  5685. }
  5686. UnlockList(h->LinkList);
  5687. if (k == NULL)
  5688. {
  5689. // Specified link is not found
  5690. ReleaseHub(h);
  5691. return ERR_OBJECT_NOT_FOUND;
  5692. }
  5693. k->NoOnline = true;
  5694. ALog(a, h, "LA_DELETE_LINK", t->AccountName);
  5695. SetLinkOffline(k);
  5696. IncrementServerConfigRevision(s);
  5697. DelLink(h, k);
  5698. ReleaseLink(k);
  5699. ReleaseHub(h);
  5700. return ret;
  5701. }
  5702. // Make a link into off-line
  5703. UINT StSetLinkOffline(ADMIN *a, RPC_LINK *t)
  5704. {
  5705. UINT i;
  5706. SERVER *s = a->Server;
  5707. CEDAR *c = s->Cedar;
  5708. HUB *h;
  5709. UINT ret = ERR_NO_ERROR;
  5710. char hubname[MAX_HUBNAME_LEN + 1];
  5711. wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
  5712. LINK *k;
  5713. if (UniIsEmptyStr(t->AccountName))
  5714. {
  5715. return ERR_INVALID_PARAMETER;
  5716. }
  5717. if (s->ServerType != SERVER_TYPE_STANDALONE)
  5718. {
  5719. return ERR_NOT_SUPPORTED;
  5720. }
  5721. CHECK_RIGHT;
  5722. LockHubList(c);
  5723. {
  5724. h = GetHub(c, t->HubName);
  5725. }
  5726. UnlockHubList(c);
  5727. if (h == NULL)
  5728. {
  5729. return ERR_HUB_NOT_FOUND;
  5730. }
  5731. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_cascade") != 0)
  5732. {
  5733. ReleaseHub(h);
  5734. return ERR_NOT_ENOUGH_RIGHT;
  5735. }
  5736. StrCpy(hubname, sizeof(hubname), t->HubName);
  5737. UniStrCpy(accountname, sizeof(accountname), t->AccountName);
  5738. k = NULL;
  5739. // Find specified link
  5740. LockList(h->LinkList);
  5741. {
  5742. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  5743. {
  5744. LINK *kk = LIST_DATA(h->LinkList, i);
  5745. Lock(kk->lock);
  5746. {
  5747. if (UniStrCmpi(kk->Option->AccountName, accountname) == 0)
  5748. {
  5749. k = kk;
  5750. AddRef(kk->ref);
  5751. }
  5752. }
  5753. Unlock(kk->lock);
  5754. if (k != NULL)
  5755. {
  5756. break;
  5757. }
  5758. }
  5759. }
  5760. UnlockList(h->LinkList);
  5761. if (k == NULL)
  5762. {
  5763. // Link is not found
  5764. ReleaseHub(h);
  5765. return ERR_OBJECT_NOT_FOUND;
  5766. }
  5767. ALog(a, h, "LA_SET_LINK_OFFLINE", t->AccountName);
  5768. SetLinkOffline(k);
  5769. IncrementServerConfigRevision(s);
  5770. ReleaseLink(k);
  5771. ReleaseHub(h);
  5772. return ret;
  5773. }
  5774. // Make a link into on-line
  5775. UINT StSetLinkOnline(ADMIN *a, RPC_LINK *t)
  5776. {
  5777. UINT i;
  5778. SERVER *s = a->Server;
  5779. CEDAR *c = s->Cedar;
  5780. HUB *h;
  5781. UINT ret = ERR_NO_ERROR;
  5782. char hubname[MAX_HUBNAME_LEN + 1];
  5783. wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
  5784. LINK *k;
  5785. if (UniIsEmptyStr(t->AccountName))
  5786. {
  5787. return ERR_INVALID_PARAMETER;
  5788. }
  5789. if (s->ServerType != SERVER_TYPE_STANDALONE)
  5790. {
  5791. return ERR_NOT_SUPPORTED;
  5792. }
  5793. CHECK_RIGHT;
  5794. LockHubList(c);
  5795. {
  5796. h = GetHub(c, t->HubName);
  5797. }
  5798. UnlockHubList(c);
  5799. if (h == NULL)
  5800. {
  5801. return ERR_HUB_NOT_FOUND;
  5802. }
  5803. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_cascade") != 0)
  5804. {
  5805. ReleaseHub(h);
  5806. return ERR_NOT_ENOUGH_RIGHT;
  5807. }
  5808. StrCpy(hubname, sizeof(hubname), t->HubName);
  5809. UniStrCpy(accountname, sizeof(accountname), t->AccountName);
  5810. k = NULL;
  5811. // Find specified link
  5812. LockList(h->LinkList);
  5813. {
  5814. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  5815. {
  5816. LINK *kk = LIST_DATA(h->LinkList, i);
  5817. Lock(kk->lock);
  5818. {
  5819. if (UniStrCmpi(kk->Option->AccountName, accountname) == 0)
  5820. {
  5821. k = kk;
  5822. AddRef(kk->ref);
  5823. }
  5824. }
  5825. Unlock(kk->lock);
  5826. if (k != NULL)
  5827. {
  5828. break;
  5829. }
  5830. }
  5831. }
  5832. UnlockList(h->LinkList);
  5833. if (k == NULL)
  5834. {
  5835. // Specified link is not found
  5836. ReleaseHub(h);
  5837. return ERR_OBJECT_NOT_FOUND;
  5838. }
  5839. ALog(a, h, "LA_SET_LINK_ONLINE", t->AccountName);
  5840. SetLinkOnline(k);
  5841. ReleaseLink(k);
  5842. ReleaseHub(h);
  5843. IncrementServerConfigRevision(s);
  5844. return ret;
  5845. }
  5846. // Get link status
  5847. UINT StGetLinkStatus(ADMIN *a, RPC_LINK_STATUS *t)
  5848. {
  5849. UINT i;
  5850. SERVER *s = a->Server;
  5851. CEDAR *c = s->Cedar;
  5852. HUB *h;
  5853. UINT ret = ERR_NO_ERROR;
  5854. char hubname[MAX_HUBNAME_LEN + 1];
  5855. wchar_t accountname[MAX_ACCOUNT_NAME_LEN + 1];
  5856. LINK *k;
  5857. SESSION *sess;
  5858. if (UniIsEmptyStr(t->AccountName))
  5859. {
  5860. return ERR_INVALID_PARAMETER;
  5861. }
  5862. if (s->ServerType != SERVER_TYPE_STANDALONE)
  5863. {
  5864. return ERR_NOT_SUPPORTED;
  5865. }
  5866. CHECK_RIGHT;
  5867. LockHubList(c);
  5868. {
  5869. h = GetHub(c, t->HubName);
  5870. }
  5871. UnlockHubList(c);
  5872. if (h == NULL)
  5873. {
  5874. return ERR_HUB_NOT_FOUND;
  5875. }
  5876. StrCpy(hubname, sizeof(hubname), t->HubName);
  5877. UniStrCpy(accountname, sizeof(accountname), t->AccountName);
  5878. FreeRpcLinkStatus(t);
  5879. Zero(t, sizeof(RPC_LINK_STATUS));
  5880. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  5881. UniStrCpy(t->AccountName, sizeof(t->AccountName), accountname);
  5882. k = NULL;
  5883. // Find the link
  5884. LockList(h->LinkList);
  5885. {
  5886. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  5887. {
  5888. LINK *kk = LIST_DATA(h->LinkList, i);
  5889. Lock(kk->lock);
  5890. {
  5891. if (UniStrCmpi(kk->Option->AccountName, accountname) == 0)
  5892. {
  5893. k = kk;
  5894. AddRef(kk->ref);
  5895. }
  5896. }
  5897. Unlock(kk->lock);
  5898. if (k != NULL)
  5899. {
  5900. break;
  5901. }
  5902. }
  5903. }
  5904. UnlockList(h->LinkList);
  5905. if (k == NULL)
  5906. {
  5907. // Specified link is not found
  5908. ReleaseHub(h);
  5909. return ERR_OBJECT_NOT_FOUND;
  5910. }
  5911. // Get status infomation from session
  5912. Lock(k->lock);
  5913. {
  5914. sess = k->ClientSession;
  5915. if (sess != NULL)
  5916. {
  5917. AddRef(sess->ref);
  5918. }
  5919. }
  5920. Unlock(k->lock);
  5921. if (sess != NULL && k->Offline == false)
  5922. {
  5923. CiGetSessionStatus(&t->Status, sess);
  5924. }
  5925. else
  5926. {
  5927. ret = ERR_LINK_IS_OFFLINE;
  5928. }
  5929. ReleaseSession(sess);
  5930. ReleaseLink(k);
  5931. ReleaseHub(h);
  5932. return ret;
  5933. }
  5934. // Enumerate links
  5935. UINT StEnumLink(ADMIN *a, RPC_ENUM_LINK *t)
  5936. {
  5937. SERVER *s = a->Server;
  5938. CEDAR *c = s->Cedar;
  5939. HUB *h;
  5940. char hubname[MAX_HUBNAME_LEN + 1];
  5941. UINT i;
  5942. if (s->ServerType != SERVER_TYPE_STANDALONE)
  5943. {
  5944. return ERR_NOT_SUPPORTED;
  5945. }
  5946. CHECK_RIGHT;
  5947. LockHubList(c);
  5948. {
  5949. h = GetHub(c, t->HubName);
  5950. }
  5951. UnlockHubList(c);
  5952. if (h == NULL)
  5953. {
  5954. return ERR_HUB_NOT_FOUND;
  5955. }
  5956. StrCpy(hubname, sizeof(hubname), t->HubName);
  5957. FreeRpcEnumLink(t);
  5958. Zero(t, sizeof(RPC_ENUM_LINK));
  5959. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  5960. LockList(h->LinkList);
  5961. {
  5962. t->NumLink = LIST_NUM(h->LinkList);
  5963. t->Links = ZeroMalloc(sizeof(RPC_ENUM_LINK_ITEM) * t->NumLink);
  5964. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  5965. {
  5966. LINK *k = LIST_DATA(h->LinkList, i);
  5967. RPC_ENUM_LINK_ITEM *e = &t->Links[i];
  5968. Lock(k->lock);
  5969. {
  5970. UniStrCpy(e->AccountName, sizeof(e->AccountName), k->Option->AccountName);
  5971. StrCpy(e->Hostname, sizeof(e->Hostname), k->Option->Hostname);
  5972. StrCpy(e->HubName, sizeof(e->HubName), k->Option->HubName);
  5973. e->Online = k->Offline ? false : true;
  5974. if (e->Online)
  5975. {
  5976. if (k->ClientSession != NULL)
  5977. {
  5978. e->ConnectedTime = TickToTime(k->ClientSession->CurrentConnectionEstablishTime);
  5979. e->Connected = (k->ClientSession->ClientStatus == CLIENT_STATUS_ESTABLISHED);
  5980. e->LastError = k->ClientSession->Err;
  5981. }
  5982. }
  5983. }
  5984. Unlock(k->lock);
  5985. }
  5986. }
  5987. UnlockList(h->LinkList);
  5988. ReleaseHub(h);
  5989. return ERR_NO_ERROR;
  5990. }
  5991. // Get link configuration
  5992. UINT StGetLink(ADMIN *a, RPC_CREATE_LINK *t)
  5993. {
  5994. SERVER *s = a->Server;
  5995. CEDAR *c = s->Cedar;
  5996. HUB *h;
  5997. UINT ret = ERR_NO_ERROR;
  5998. UINT i;
  5999. char hubname[MAX_SIZE];
  6000. LINK *k;
  6001. if (s->ServerType != SERVER_TYPE_STANDALONE)
  6002. {
  6003. return ERR_NOT_SUPPORTED;
  6004. }
  6005. CHECK_RIGHT;
  6006. if (s->ServerType != SERVER_TYPE_STANDALONE)
  6007. {
  6008. return ERR_LINK_CANT_CREATE_ON_FARM;
  6009. }
  6010. LockHubList(c);
  6011. {
  6012. h = GetHub(c, t->HubName);
  6013. }
  6014. UnlockHubList(c);
  6015. if (h == NULL)
  6016. {
  6017. return ERR_HUB_NOT_FOUND;
  6018. }
  6019. k = NULL;
  6020. // Find the link
  6021. LockList(h->LinkList);
  6022. {
  6023. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  6024. {
  6025. LINK *kk = LIST_DATA(h->LinkList, i);
  6026. Lock(kk->lock);
  6027. {
  6028. if (UniStrCmpi(kk->Option->AccountName, t->ClientOption->AccountName) == 0)
  6029. {
  6030. k = kk;
  6031. AddRef(kk->ref);
  6032. }
  6033. }
  6034. Unlock(kk->lock);
  6035. if (k != NULL)
  6036. {
  6037. break;
  6038. }
  6039. }
  6040. }
  6041. UnlockList(h->LinkList);
  6042. if (k == NULL)
  6043. {
  6044. // The link is not found
  6045. ReleaseHub(h);
  6046. return ERR_OBJECT_NOT_FOUND;
  6047. }
  6048. StrCpy(hubname, sizeof(hubname), t->HubName);
  6049. FreeRpcCreateLink(t);
  6050. Zero(t, sizeof(RPC_CREATE_LINK));
  6051. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  6052. Lock(k->lock);
  6053. {
  6054. // Get configuration
  6055. t->Online = k->Offline ? false : true;
  6056. t->ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  6057. Copy(t->ClientOption, k->Option, sizeof(CLIENT_OPTION));
  6058. t->ClientAuth = CopyClientAuth(k->Auth);
  6059. Copy(&t->Policy, k->Policy, sizeof(POLICY));
  6060. t->CheckServerCert = k->CheckServerCert;
  6061. t->ServerCert = CloneX(k->ServerCert);
  6062. }
  6063. Unlock(k->lock);
  6064. ReleaseLink(k);
  6065. ReleaseHub(h);
  6066. return ret;
  6067. }
  6068. // Set link configuration
  6069. UINT StSetLink(ADMIN *a, RPC_CREATE_LINK *t)
  6070. {
  6071. SERVER *s = a->Server;
  6072. CEDAR *c = s->Cedar;
  6073. HUB *h;
  6074. UINT ret = ERR_NO_ERROR;
  6075. UINT i;
  6076. LINK *k;
  6077. if (s->ServerType != SERVER_TYPE_STANDALONE)
  6078. {
  6079. return ERR_NOT_SUPPORTED;
  6080. }
  6081. CHECK_RIGHT;
  6082. if (s->ServerType != SERVER_TYPE_STANDALONE)
  6083. {
  6084. return ERR_LINK_CANT_CREATE_ON_FARM;
  6085. }
  6086. LockHubList(c);
  6087. {
  6088. h = GetHub(c, t->HubName);
  6089. }
  6090. UnlockHubList(c);
  6091. if (h == NULL)
  6092. {
  6093. return ERR_HUB_NOT_FOUND;
  6094. }
  6095. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_cascade") != 0)
  6096. {
  6097. ReleaseHub(h);
  6098. return ERR_NOT_ENOUGH_RIGHT;
  6099. }
  6100. k = NULL;
  6101. // Find the link
  6102. LockList(h->LinkList);
  6103. {
  6104. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  6105. {
  6106. LINK *kk = LIST_DATA(h->LinkList, i);
  6107. Lock(kk->lock);
  6108. {
  6109. if (UniStrCmpi(kk->Option->AccountName, t->ClientOption->AccountName) == 0)
  6110. {
  6111. k = kk;
  6112. AddRef(kk->ref);
  6113. }
  6114. }
  6115. Unlock(kk->lock);
  6116. if (k != NULL)
  6117. {
  6118. break;
  6119. }
  6120. }
  6121. }
  6122. UnlockList(h->LinkList);
  6123. if (k == NULL)
  6124. {
  6125. // The link is not found
  6126. ReleaseHub(h);
  6127. return ERR_OBJECT_NOT_FOUND;
  6128. }
  6129. ALog(a, h, "LA_SET_LINK", t->ClientOption->AccountName);
  6130. Lock(k->lock);
  6131. {
  6132. // Update the configuration of the link
  6133. if (k->ServerCert != NULL)
  6134. {
  6135. FreeX(k->ServerCert);
  6136. k->ServerCert = NULL;
  6137. }
  6138. Copy(k->Option, t->ClientOption, sizeof(CLIENT_OPTION));
  6139. StrCpy(k->Option->DeviceName, sizeof(k->Option->DeviceName), LINK_DEVICE_NAME);
  6140. k->Option->NumRetry = INFINITE;
  6141. k->Option->RetryInterval = 10;
  6142. k->Option->NoRoutingTracking = true;
  6143. CiFreeClientAuth(k->Auth);
  6144. k->Auth = CopyClientAuth(t->ClientAuth);
  6145. if (t->Policy.Ver3 == false)
  6146. {
  6147. Copy(k->Policy, &t->Policy, sizeof(UINT) * NUM_POLICY_ITEM_FOR_VER2);
  6148. }
  6149. else
  6150. {
  6151. Copy(k->Policy, &t->Policy, sizeof(POLICY));
  6152. }
  6153. k->Option->RequireBridgeRoutingMode = true; // Enable Bridge / Routing mode
  6154. k->Option->RequireMonitorMode = false; // Disable monitor mode
  6155. k->CheckServerCert = t->CheckServerCert;
  6156. k->ServerCert = CloneX(t->ServerCert);
  6157. }
  6158. Unlock(k->lock);
  6159. IncrementServerConfigRevision(s);
  6160. ReleaseLink(k);
  6161. ReleaseHub(h);
  6162. return ret;
  6163. }
  6164. // Create a new link(cascade)
  6165. UINT StCreateLink(ADMIN *a, RPC_CREATE_LINK *t)
  6166. {
  6167. SERVER *s = a->Server;
  6168. CEDAR *c = s->Cedar;
  6169. HUB *h;
  6170. UINT ret = ERR_NO_ERROR;
  6171. UINT i;
  6172. LINK *k;
  6173. CHECK_RIGHT;
  6174. if (s->ServerType != SERVER_TYPE_STANDALONE)
  6175. {
  6176. return ERR_LINK_CANT_CREATE_ON_FARM;
  6177. }
  6178. LockHubList(c);
  6179. {
  6180. h = GetHub(c, t->HubName);
  6181. }
  6182. UnlockHubList(c);
  6183. if (h == NULL)
  6184. {
  6185. return ERR_HUB_NOT_FOUND;
  6186. }
  6187. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_cascade") != 0)
  6188. {
  6189. ReleaseHub(h);
  6190. return ERR_NOT_ENOUGH_RIGHT;
  6191. }
  6192. k = NULL;
  6193. // Check for existing a link which has same name
  6194. LockList(h->LinkList);
  6195. {
  6196. for (i = 0;i < LIST_NUM(h->LinkList);i++)
  6197. {
  6198. LINK *kk = LIST_DATA(h->LinkList, i);
  6199. Lock(kk->lock);
  6200. {
  6201. if (UniStrCmpi(kk->Option->AccountName, t->ClientOption->AccountName) == 0)
  6202. {
  6203. k = kk;
  6204. AddRef(kk->ref);
  6205. }
  6206. }
  6207. Unlock(kk->lock);
  6208. if (k != NULL)
  6209. {
  6210. break;
  6211. }
  6212. }
  6213. }
  6214. UnlockList(h->LinkList);
  6215. if (k != NULL)
  6216. {
  6217. // There is a link which has same name
  6218. ReleaseLink(k);
  6219. ReleaseHub(h);
  6220. return ERR_LINK_ALREADY_EXISTS;
  6221. }
  6222. ALog(a, h, "LA_CREATE_LINK", t->ClientOption->AccountName);
  6223. // Create a new link
  6224. k = NewLink(c, h, t->ClientOption, t->ClientAuth, &t->Policy);
  6225. if (k == NULL)
  6226. {
  6227. // Link creation failed
  6228. ret = ERR_INTERNAL_ERROR;
  6229. }
  6230. else
  6231. {
  6232. // setting of verifying server certification
  6233. //
  6234. k->CheckServerCert = t->CheckServerCert;
  6235. k->ServerCert = CloneX(t->ServerCert);
  6236. // stay this off-line
  6237. k->Offline = false;
  6238. SetLinkOffline(k);
  6239. ReleaseLink(k);
  6240. IncrementServerConfigRevision(s);
  6241. }
  6242. ReleaseHub(h);
  6243. return ret;
  6244. }
  6245. // Delete a CA(Certificate Authority) setting from the hub
  6246. UINT StDeleteCa(ADMIN *a, RPC_HUB_DELETE_CA *t)
  6247. {
  6248. SERVER *s = a->Server;
  6249. CEDAR *c = s->Cedar;
  6250. HUB *h;
  6251. UINT ret = ERR_NO_ERROR;
  6252. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6253. {
  6254. return ERR_NOT_FARM_CONTROLLER;
  6255. }
  6256. NO_SUPPORT_FOR_BRIDGE;
  6257. CHECK_RIGHT;
  6258. LockHubList(c);
  6259. {
  6260. h = GetHub(c, t->HubName);
  6261. }
  6262. UnlockHubList(c);
  6263. if (h == NULL)
  6264. {
  6265. return ERR_HUB_NOT_FOUND;
  6266. }
  6267. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_cert_list") != 0)
  6268. {
  6269. ReleaseHub(h);
  6270. return ERR_NOT_ENOUGH_RIGHT;
  6271. }
  6272. LockList(h->HubDb->RootCertList);
  6273. {
  6274. if (IsInListKey(h->HubDb->RootCertList, t->Key))
  6275. {
  6276. X *x = ListKeyToPointer(h->HubDb->RootCertList, t->Key);
  6277. Delete(h->HubDb->RootCertList, x);
  6278. FreeX(x);
  6279. ALog(a, h, "LA_DELETE_CA");
  6280. IncrementServerConfigRevision(s);
  6281. }
  6282. else
  6283. {
  6284. ret = ERR_OBJECT_NOT_FOUND;
  6285. }
  6286. }
  6287. UnlockList(h->HubDb->RootCertList);
  6288. ReleaseHub(h);
  6289. return ret;
  6290. }
  6291. // Get CA(Certificate Authority) setting from the hub
  6292. UINT StGetCa(ADMIN *a, RPC_HUB_GET_CA *t)
  6293. {
  6294. SERVER *s = a->Server;
  6295. CEDAR *c = s->Cedar;
  6296. HUB *h;
  6297. UINT ret = ERR_NO_ERROR;
  6298. char hubname[MAX_HUBNAME_LEN + 1];
  6299. UINT key;
  6300. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6301. {
  6302. return ERR_NOT_FARM_CONTROLLER;
  6303. }
  6304. NO_SUPPORT_FOR_BRIDGE;
  6305. StrCpy(hubname, sizeof(hubname), t->HubName);
  6306. key = t->Key;
  6307. FreeRpcHubGetCa(t);
  6308. Zero(t, sizeof(RPC_HUB_GET_CA));
  6309. t->Key = key;
  6310. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  6311. CHECK_RIGHT;
  6312. LockHubList(c);
  6313. {
  6314. h = GetHub(c, t->HubName);
  6315. }
  6316. UnlockHubList(c);
  6317. if (h == NULL)
  6318. {
  6319. return ERR_HUB_NOT_FOUND;
  6320. }
  6321. LockList(h->HubDb->RootCertList);
  6322. {
  6323. if (IsInListKey(h->HubDb->RootCertList, key))
  6324. {
  6325. X *x = ListKeyToPointer(h->HubDb->RootCertList, key);
  6326. t->Cert = CloneX(x);
  6327. }
  6328. else
  6329. {
  6330. ret = ERR_OBJECT_NOT_FOUND;
  6331. }
  6332. }
  6333. UnlockList(h->HubDb->RootCertList);
  6334. ReleaseHub(h);
  6335. return ret;
  6336. }
  6337. // Enumerate CA(Certificate Authority) in the hub
  6338. UINT StEnumCa(ADMIN *a, RPC_HUB_ENUM_CA *t)
  6339. {
  6340. SERVER *s = a->Server;
  6341. CEDAR *c = s->Cedar;
  6342. HUB *h;
  6343. char hubname[MAX_HUBNAME_LEN + 1];
  6344. UINT i;
  6345. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6346. {
  6347. return ERR_NOT_FARM_CONTROLLER;
  6348. }
  6349. NO_SUPPORT_FOR_BRIDGE;
  6350. StrCpy(hubname, sizeof(hubname), t->HubName);
  6351. FreeRpcHubEnumCa(t);
  6352. Zero(t, sizeof(RPC_HUB_ENUM_CA));
  6353. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  6354. CHECK_RIGHT;
  6355. LockHubList(c);
  6356. {
  6357. h = GetHub(c, hubname);
  6358. }
  6359. UnlockHubList(c);
  6360. if (h == NULL)
  6361. {
  6362. return ERR_HUB_NOT_FOUND;
  6363. }
  6364. Zero(t, sizeof(RPC_HUB_ENUM_CA));
  6365. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  6366. if (h->HubDb->RootCertList != NULL)
  6367. {
  6368. LockList(h->HubDb->RootCertList);
  6369. {
  6370. t->NumCa = LIST_NUM(h->HubDb->RootCertList);
  6371. t->Ca = ZeroMalloc(sizeof(RPC_HUB_ENUM_CA_ITEM) * t->NumCa);
  6372. for (i = 0;i < t->NumCa;i++)
  6373. {
  6374. RPC_HUB_ENUM_CA_ITEM *e = &t->Ca[i];
  6375. X *x = LIST_DATA(h->HubDb->RootCertList, i);
  6376. e->Key = POINTER_TO_KEY(x);
  6377. GetAllNameFromNameEx(e->SubjectName, sizeof(e->SubjectName), x->subject_name);
  6378. GetAllNameFromNameEx(e->IssuerName, sizeof(e->IssuerName), x->issuer_name);
  6379. e->Expires = x->notAfter;
  6380. }
  6381. }
  6382. UnlockList(h->HubDb->RootCertList);
  6383. }
  6384. ReleaseHub(h);
  6385. return ERR_NO_ERROR;
  6386. }
  6387. // Add CA(Certificate Authority) into the hub
  6388. UINT StAddCa(ADMIN *a, RPC_HUB_ADD_CA *t)
  6389. {
  6390. SERVER *s = a->Server;
  6391. CEDAR *c = s->Cedar;
  6392. HUB *h;
  6393. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6394. {
  6395. return ERR_NOT_FARM_CONTROLLER;
  6396. }
  6397. if (c->Bridge)
  6398. {
  6399. return ERR_NOT_SUPPORTED;
  6400. }
  6401. if (t->Cert == NULL)
  6402. {
  6403. return ERR_INVALID_PARAMETER;
  6404. }
  6405. if (t->Cert->is_compatible_bit == false)
  6406. {
  6407. return ERR_NOT_RSA_1024;
  6408. }
  6409. CHECK_RIGHT;
  6410. LockHubList(c);
  6411. {
  6412. h = GetHub(c, t->HubName);
  6413. }
  6414. UnlockHubList(c);
  6415. if (h == NULL)
  6416. {
  6417. return ERR_HUB_NOT_FOUND;
  6418. }
  6419. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_cert_list") != 0)
  6420. {
  6421. ReleaseHub(h);
  6422. return ERR_NOT_ENOUGH_RIGHT;
  6423. }
  6424. IncrementServerConfigRevision(s);
  6425. ALog(a, h, "LA_ADD_CA");
  6426. AddRootCert(h, t->Cert);
  6427. ReleaseHub(h);
  6428. return ERR_NO_ERROR;
  6429. }
  6430. // Get logging configuration of the hub
  6431. UINT StGetHubLog(ADMIN *a, RPC_HUB_LOG *t)
  6432. {
  6433. SERVER *s = a->Server;
  6434. CEDAR *c = s->Cedar;
  6435. HUB *h;
  6436. CHECK_RIGHT;
  6437. LockHubList(c);
  6438. {
  6439. h = GetHub(c, t->HubName);
  6440. }
  6441. UnlockHubList(c);
  6442. if (h == NULL)
  6443. {
  6444. return ERR_HUB_NOT_FOUND;
  6445. }
  6446. GetHubLogSetting(h, &t->LogSetting);
  6447. ReleaseHub(h);
  6448. return ERR_NO_ERROR;
  6449. }
  6450. // Set logging configuration into the hub
  6451. UINT StSetHubLog(ADMIN *a, RPC_HUB_LOG *t)
  6452. {
  6453. SERVER *s = a->Server;
  6454. CEDAR *c = s->Cedar;
  6455. HUB *h;
  6456. CHECK_RIGHT;
  6457. LockHubList(c);
  6458. {
  6459. h = GetHub(c, t->HubName);
  6460. }
  6461. UnlockHubList(c);
  6462. if (h == NULL)
  6463. {
  6464. return ERR_HUB_NOT_FOUND;
  6465. }
  6466. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_log_config") != 0)
  6467. {
  6468. ReleaseHub(h);
  6469. return ERR_NOT_ENOUGH_RIGHT;
  6470. }
  6471. ALog(a, h, "LA_SET_HUB_LOG");
  6472. SetHubLogSettingEx(h, &t->LogSetting,
  6473. (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_log_switch_type") != 0));
  6474. h->CurrentVersion++;
  6475. SiHubUpdateProc(h);
  6476. ReleaseHub(h);
  6477. IncrementServerConfigRevision(s);
  6478. return ERR_NO_ERROR;
  6479. }
  6480. // Get hub status
  6481. UINT StGetHubStatus(ADMIN *a, RPC_HUB_STATUS *t)
  6482. {
  6483. SERVER *s = a->Server;
  6484. CEDAR *c = s->Cedar;
  6485. HUB *h;
  6486. CHECK_RIGHT;
  6487. LockHubList(c);
  6488. {
  6489. h = GetHub(c, t->HubName);
  6490. }
  6491. UnlockHubList(c);
  6492. if (h == NULL)
  6493. {
  6494. return ERR_HUB_NOT_FOUND;
  6495. }
  6496. Zero(t, sizeof(RPC_HUB_STATUS));
  6497. Lock(h->lock);
  6498. {
  6499. StrCpy(t->HubName, sizeof(t->HubName), h->Name);
  6500. t->HubType = h->Type;
  6501. t->Online = h->Offline ? false : true;
  6502. t->NumSessions = LIST_NUM(h->SessionList);
  6503. t->NumSessionsClient = Count(h->NumSessionsClient);
  6504. t->NumSessionsBridge = Count(h->NumSessionsBridge);
  6505. t->NumAccessLists = LIST_NUM(h->AccessList);
  6506. if (h->HubDb != NULL)
  6507. {
  6508. t->NumUsers = LIST_NUM(h->HubDb->UserList);
  6509. t->NumGroups = LIST_NUM(h->HubDb->GroupList);
  6510. }
  6511. t->NumMacTables = HASH_LIST_NUM(h->MacHashTable);
  6512. t->NumIpTables = LIST_NUM(h->IpTable);
  6513. Lock(h->TrafficLock);
  6514. {
  6515. Copy(&t->Traffic, h->Traffic, sizeof(TRAFFIC));
  6516. }
  6517. Unlock(h->TrafficLock);
  6518. t->NumLogin = h->NumLogin;
  6519. t->LastCommTime = h->LastCommTime;
  6520. t->LastLoginTime = h->LastLoginTime;
  6521. t->CreatedTime = h->CreatedTime;
  6522. }
  6523. Unlock(h->lock);
  6524. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  6525. {
  6526. UINT i;
  6527. LockList(s->FarmMemberList);
  6528. {
  6529. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  6530. {
  6531. UINT k;
  6532. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  6533. if (f->Me == false)
  6534. {
  6535. LockList(f->HubList);
  6536. {
  6537. for (k = 0;k < LIST_NUM(f->HubList);k++)
  6538. {
  6539. HUB_LIST *h = LIST_DATA(f->HubList, k);
  6540. if (StrCmpi(h->Name, t->HubName) == 0)
  6541. {
  6542. t->NumSessions += h->NumSessions;
  6543. t->NumSessionsClient += h->NumSessionsClient;
  6544. t->NumSessionsBridge += h->NumSessionsBridge;
  6545. t->NumMacTables += h->NumMacTables;
  6546. t->NumIpTables += h->NumIpTables;
  6547. }
  6548. }
  6549. }
  6550. UnlockList(f->HubList);
  6551. }
  6552. }
  6553. }
  6554. UnlockList(s->FarmMemberList);
  6555. }
  6556. if (h->Type != HUB_TYPE_FARM_STATIC)
  6557. {
  6558. t->SecureNATEnabled = h->EnableSecureNAT;
  6559. }
  6560. ReleaseHub(h);
  6561. return ERR_NO_ERROR;
  6562. }
  6563. // Enable SecureNAT function of the hub
  6564. UINT StEnableSecureNAT(ADMIN *a, RPC_HUB *t)
  6565. {
  6566. SERVER *s = a->Server;
  6567. CEDAR *c = s->Cedar;
  6568. HUB *h;
  6569. CHECK_RIGHT;
  6570. LockHubList(c);
  6571. {
  6572. h = GetHub(c, t->HubName);
  6573. }
  6574. UnlockHubList(c);
  6575. if (h == NULL)
  6576. {
  6577. return ERR_HUB_NOT_FOUND;
  6578. }
  6579. if (h->Type == HUB_TYPE_FARM_STATIC || GetServerCapsBool(s, "b_support_securenat") == false)
  6580. {
  6581. ReleaseHub(h);
  6582. return ERR_NOT_SUPPORTED;
  6583. }
  6584. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6585. {
  6586. ReleaseHub(h);
  6587. return ERR_NOT_FARM_CONTROLLER;
  6588. }
  6589. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_securenat") != 0)
  6590. {
  6591. ReleaseHub(h);
  6592. return ERR_NOT_ENOUGH_RIGHT;
  6593. }
  6594. ALog(a, h, "LA_ENABLE_SNAT");
  6595. EnableSecureNAT(h, true);
  6596. h->CurrentVersion++;
  6597. SiHubUpdateProc(h);
  6598. IncrementServerConfigRevision(s);
  6599. ReleaseHub(h);
  6600. return ERR_NO_ERROR;
  6601. }
  6602. // Disable the SecureNAT function of the hub
  6603. UINT StDisableSecureNAT(ADMIN *a, RPC_HUB *t)
  6604. {
  6605. SERVER *s = a->Server;
  6606. CEDAR *c = s->Cedar;
  6607. HUB *h;
  6608. CHECK_RIGHT;
  6609. LockHubList(c);
  6610. {
  6611. h = GetHub(c, t->HubName);
  6612. }
  6613. UnlockHubList(c);
  6614. if (h == NULL)
  6615. {
  6616. return ERR_HUB_NOT_FOUND;
  6617. }
  6618. if (h->Type == HUB_TYPE_FARM_STATIC || GetServerCapsBool(s, "b_support_securenat") == false)
  6619. {
  6620. ReleaseHub(h);
  6621. return ERR_NOT_SUPPORTED;
  6622. }
  6623. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6624. {
  6625. ReleaseHub(h);
  6626. return ERR_NOT_FARM_CONTROLLER;
  6627. }
  6628. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_securenat") != 0)
  6629. {
  6630. ReleaseHub(h);
  6631. return ERR_NOT_ENOUGH_RIGHT;
  6632. }
  6633. ALog(a, h, "LA_DISABLE_SNAT");
  6634. EnableSecureNAT(h, false);
  6635. h->CurrentVersion++;
  6636. SiHubUpdateProc(h);
  6637. IncrementServerConfigRevision(s);
  6638. ReleaseHub(h);
  6639. return ERR_NO_ERROR;
  6640. }
  6641. // Enumerate NAT entries of the SecureNAT
  6642. UINT StEnumNAT(ADMIN *a, RPC_ENUM_NAT *t)
  6643. {
  6644. SERVER *s = a->Server;
  6645. CEDAR *c = s->Cedar;
  6646. HUB *h;
  6647. UINT ret = ERR_NO_ERROR;
  6648. char hubname[MAX_HUBNAME_LEN + 1];
  6649. UINT i;
  6650. CHECK_RIGHT;
  6651. StrCpy(hubname, sizeof(hubname), t->HubName);
  6652. LockHubList(c);
  6653. {
  6654. h = GetHub(c, t->HubName);
  6655. }
  6656. UnlockHubList(c);
  6657. if (h == NULL)
  6658. {
  6659. return ERR_HUB_NOT_FOUND;
  6660. }
  6661. if (h->Type == HUB_TYPE_FARM_STATIC || GetServerCapsBool(s, "b_support_securenat") == false)
  6662. {
  6663. ReleaseHub(h);
  6664. return ERR_NOT_SUPPORTED;
  6665. }
  6666. Lock(h->lock_online);
  6667. {
  6668. if (h->SecureNAT == NULL)
  6669. {
  6670. ret = ERR_SNAT_NOT_RUNNING;
  6671. }
  6672. else
  6673. {
  6674. NtEnumNatList(h->SecureNAT->Nat, t);
  6675. }
  6676. }
  6677. Unlock(h->lock_online);
  6678. if (h->Type == HUB_TYPE_FARM_DYNAMIC)
  6679. {
  6680. if (ret == ERR_SNAT_NOT_RUNNING)
  6681. {
  6682. // Get status of remote SecureNAT
  6683. LockList(s->FarmMemberList);
  6684. {
  6685. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  6686. {
  6687. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  6688. if (f->Me == false)
  6689. {
  6690. RPC_ENUM_NAT tmp;
  6691. Zero(&tmp, sizeof(tmp));
  6692. SiCallEnumNat(s, f, hubname, &tmp);
  6693. if (tmp.NumItem >= 1)
  6694. {
  6695. FreeRpcEnumNat(t);
  6696. Copy(t, &tmp, sizeof(RPC_ENUM_NAT));
  6697. ret = ERR_NO_ERROR;
  6698. break;
  6699. }
  6700. else
  6701. {
  6702. FreeRpcEnumNat(&tmp);
  6703. }
  6704. }
  6705. }
  6706. }
  6707. UnlockList(s->FarmMemberList);
  6708. }
  6709. }
  6710. ReleaseHub(h);
  6711. ret = ERR_NO_ERROR;
  6712. return ret;
  6713. }
  6714. // Get status of the SecureNAT
  6715. UINT StGetSecureNATStatus(ADMIN *a, RPC_NAT_STATUS *t)
  6716. {
  6717. SERVER *s = a->Server;
  6718. CEDAR *c = s->Cedar;
  6719. HUB *h;
  6720. UINT ret = ERR_NO_ERROR;
  6721. char hubname[MAX_HUBNAME_LEN + 1];
  6722. UINT i;
  6723. CHECK_RIGHT;
  6724. StrCpy(hubname, sizeof(hubname), t->HubName);
  6725. LockHubList(c);
  6726. {
  6727. h = GetHub(c, t->HubName);
  6728. }
  6729. UnlockHubList(c);
  6730. if (h == NULL)
  6731. {
  6732. return ERR_HUB_NOT_FOUND;
  6733. }
  6734. if (h->Type == HUB_TYPE_FARM_STATIC || GetServerCapsBool(s, "b_support_securenat") == false)
  6735. {
  6736. ReleaseHub(h);
  6737. return ERR_NOT_SUPPORTED;
  6738. }
  6739. Lock(h->lock_online);
  6740. {
  6741. if (h->SecureNAT == NULL)
  6742. {
  6743. ret = ERR_SNAT_NOT_RUNNING;
  6744. }
  6745. else
  6746. {
  6747. NtGetStatus(h->SecureNAT->Nat, t);
  6748. }
  6749. }
  6750. Unlock(h->lock_online);
  6751. if (h->Type == HUB_TYPE_FARM_DYNAMIC)
  6752. {
  6753. if (ret == ERR_SNAT_NOT_RUNNING)
  6754. {
  6755. // Get status of remote secureNAT
  6756. LockList(s->FarmMemberList);
  6757. {
  6758. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  6759. {
  6760. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  6761. if (f->Me == false)
  6762. {
  6763. RPC_NAT_STATUS tmp;
  6764. Zero(&tmp, sizeof(tmp));
  6765. SiCallGetNatStatus(s, f, hubname, &tmp);
  6766. if (tmp.NumDhcpClients == 0 && tmp.NumTcpSessions == 0 && tmp.NumUdpSessions == 0)
  6767. {
  6768. }
  6769. else
  6770. {
  6771. Copy(t, &tmp, sizeof(RPC_NAT_STATUS));
  6772. ret = ERR_NO_ERROR;
  6773. break;
  6774. }
  6775. }
  6776. }
  6777. }
  6778. UnlockList(s->FarmMemberList);
  6779. }
  6780. }
  6781. ReleaseHub(h);
  6782. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  6783. ret = ERR_NO_ERROR;
  6784. return ret;
  6785. }
  6786. // Enumerate DHCP entries
  6787. UINT StEnumDHCP(ADMIN *a, RPC_ENUM_DHCP *t)
  6788. {
  6789. SERVER *s = a->Server;
  6790. CEDAR *c = s->Cedar;
  6791. HUB *h;
  6792. UINT ret = ERR_NO_ERROR;
  6793. char hubname[MAX_HUBNAME_LEN + 1];
  6794. UINT i;
  6795. StrCpy(hubname, sizeof(hubname), t->HubName);
  6796. CHECK_RIGHT;
  6797. LockHubList(c);
  6798. {
  6799. h = GetHub(c, t->HubName);
  6800. }
  6801. UnlockHubList(c);
  6802. if (h == NULL)
  6803. {
  6804. return ERR_HUB_NOT_FOUND;
  6805. }
  6806. if (h->Type == HUB_TYPE_FARM_STATIC || GetServerCapsBool(s, "b_support_securenat") == false)
  6807. {
  6808. ReleaseHub(h);
  6809. return ERR_NOT_SUPPORTED;
  6810. }
  6811. Lock(h->lock_online);
  6812. {
  6813. if (h->SecureNAT == NULL)
  6814. {
  6815. ret = ERR_SNAT_NOT_RUNNING;
  6816. }
  6817. else
  6818. {
  6819. NtEnumDhcpList(h->SecureNAT->Nat, t);
  6820. }
  6821. }
  6822. Unlock(h->lock_online);
  6823. if (h->Type == HUB_TYPE_FARM_DYNAMIC)
  6824. {
  6825. if (ret == ERR_SNAT_NOT_RUNNING)
  6826. {
  6827. // Get status of remote DHCP service
  6828. LockList(s->FarmMemberList);
  6829. {
  6830. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  6831. {
  6832. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  6833. if (f->Me == false)
  6834. {
  6835. RPC_ENUM_DHCP tmp;
  6836. Zero(&tmp, sizeof(tmp));
  6837. SiCallEnumDhcp(s, f, hubname, &tmp);
  6838. if (tmp.NumItem >= 1)
  6839. {
  6840. FreeRpcEnumDhcp(t);
  6841. Copy(t, &tmp, sizeof(RPC_ENUM_DHCP));
  6842. ret = ERR_NO_ERROR;
  6843. break;
  6844. }
  6845. else
  6846. {
  6847. FreeRpcEnumDhcp(&tmp);
  6848. }
  6849. }
  6850. }
  6851. }
  6852. UnlockList(s->FarmMemberList);
  6853. }
  6854. }
  6855. ReleaseHub(h);
  6856. ret = ERR_NO_ERROR;
  6857. return ret;
  6858. }
  6859. // Set SecureNAT options
  6860. UINT StSetSecureNATOption(ADMIN *a, VH_OPTION *t)
  6861. {
  6862. SERVER *s = a->Server;
  6863. CEDAR *c = s->Cedar;
  6864. HUB *h;
  6865. char push_routes_str_old[MAX_DHCP_CLASSLESS_ROUTE_TABLE_STR_SIZE];
  6866. if (IsZero(t->MacAddress, sizeof(t->MacAddress)) ||
  6867. IsHostIPAddress4(&t->Ip) == false ||
  6868. IsSubnetMask4(&t->Mask) == false)
  6869. {
  6870. return ERR_INVALID_PARAMETER;
  6871. }
  6872. if ((IPToUINT(&t->Ip) & (~(IPToUINT(&t->Mask)))) == 0)
  6873. {
  6874. return ERR_INVALID_PARAMETER;
  6875. }
  6876. if (GetServerCapsBool(s, "b_support_securenat") == false)
  6877. {
  6878. t->ApplyDhcpPushRoutes = false;
  6879. }
  6880. if (t->ApplyDhcpPushRoutes)
  6881. {
  6882. if (NormalizeClasslessRouteTableStr(t->DhcpPushRoutes, sizeof(t->DhcpPushRoutes), t->DhcpPushRoutes) == false)
  6883. {
  6884. return ERR_INVALID_PARAMETER;
  6885. }
  6886. }
  6887. CHECK_RIGHT;
  6888. LockHubList(c);
  6889. {
  6890. h = GetHub(c, t->HubName);
  6891. }
  6892. UnlockHubList(c);
  6893. if (h == NULL)
  6894. {
  6895. return ERR_HUB_NOT_FOUND;
  6896. }
  6897. if (h->Type == HUB_TYPE_FARM_STATIC || GetServerCapsBool(s, "b_support_securenat") == false)
  6898. {
  6899. ReleaseHub(h);
  6900. return ERR_NOT_SUPPORTED;
  6901. }
  6902. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6903. {
  6904. ReleaseHub(h);
  6905. return ERR_NOT_FARM_CONTROLLER;
  6906. }
  6907. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_securenat") != 0)
  6908. {
  6909. ReleaseHub(h);
  6910. return ERR_NOT_ENOUGH_RIGHT;
  6911. }
  6912. if (h->SecureNATOption->UseNat == false && t->UseNat)
  6913. {
  6914. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_securenat_enablenat") != 0)
  6915. {
  6916. ReleaseHub(h);
  6917. return ERR_NOT_ENOUGH_RIGHT;
  6918. }
  6919. }
  6920. if (h->SecureNATOption->UseDhcp == false && t->UseDhcp)
  6921. {
  6922. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_securenat_enabledhcp") != 0)
  6923. {
  6924. ReleaseHub(h);
  6925. return ERR_NOT_ENOUGH_RIGHT;
  6926. }
  6927. }
  6928. StrCpy(push_routes_str_old, sizeof(push_routes_str_old), h->SecureNATOption->DhcpPushRoutes);
  6929. Copy(h->SecureNATOption, t, sizeof(VH_OPTION));
  6930. if (t->ApplyDhcpPushRoutes == false)
  6931. {
  6932. StrCpy(h->SecureNATOption->DhcpPushRoutes, sizeof(h->SecureNATOption->DhcpPushRoutes), push_routes_str_old);
  6933. }
  6934. if (h->Type != HUB_TYPE_STANDALONE && h->Cedar != NULL && h->Cedar->Server != NULL &&
  6935. h->Cedar->Server->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  6936. {
  6937. NiClearUnsupportedVhOptionForDynamicHub(h->SecureNATOption, false);
  6938. }
  6939. Lock(h->lock_online);
  6940. {
  6941. if (h->SecureNAT != NULL)
  6942. {
  6943. SetVirtualHostOption(h->SecureNAT->Nat->Virtual, t);
  6944. }
  6945. }
  6946. Unlock(h->lock_online);
  6947. ALog(a, h, "LA_SET_SNAT_OPTION");
  6948. h->CurrentVersion++;
  6949. SiHubUpdateProc(h);
  6950. IncrementServerConfigRevision(s);
  6951. ReleaseHub(h);
  6952. return ERR_NO_ERROR;
  6953. }
  6954. // Get SecureNAT options
  6955. UINT StGetSecureNATOption(ADMIN *a, VH_OPTION *t)
  6956. {
  6957. SERVER *s = a->Server;
  6958. CEDAR *c = s->Cedar;
  6959. HUB *h;
  6960. char hubname[MAX_HUBNAME_LEN + 1];
  6961. StrCpy(hubname, sizeof(hubname), t->HubName);
  6962. CHECK_RIGHT;
  6963. LockHubList(c);
  6964. {
  6965. h = GetHub(c, t->HubName);
  6966. }
  6967. UnlockHubList(c);
  6968. if (h == NULL)
  6969. {
  6970. return ERR_HUB_NOT_FOUND;
  6971. }
  6972. if (h->Type == HUB_TYPE_FARM_STATIC || GetServerCapsBool(s, "b_support_securenat") == false)
  6973. {
  6974. ReleaseHub(h);
  6975. return ERR_NOT_SUPPORTED;
  6976. }
  6977. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6978. {
  6979. ReleaseHub(h);
  6980. return ERR_NOT_FARM_CONTROLLER;
  6981. }
  6982. Zero(t, sizeof(VH_OPTION));
  6983. Copy(t, h->SecureNATOption, sizeof(VH_OPTION));
  6984. StrCpy(t->HubName, sizeof(t->HubName), hubname);
  6985. t->ApplyDhcpPushRoutes = true;
  6986. ReleaseHub(h);
  6987. return ERR_NO_ERROR;
  6988. }
  6989. // Make a hub on-line or off-line
  6990. UINT StSetHubOnline(ADMIN *a, RPC_SET_HUB_ONLINE *t)
  6991. {
  6992. SERVER *s = a->Server;
  6993. CEDAR *c = s->Cedar;
  6994. HUB *h;
  6995. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  6996. {
  6997. return ERR_NOT_FARM_CONTROLLER;
  6998. }
  6999. NO_SUPPORT_FOR_BRIDGE;
  7000. CHECK_RIGHT;
  7001. LockHubList(c);
  7002. {
  7003. h = GetHub(c, t->HubName);
  7004. }
  7005. UnlockHubList(c);
  7006. if (h == NULL)
  7007. {
  7008. return ERR_HUB_NOT_FOUND;
  7009. }
  7010. if (a->ServerAdmin == false && t->Online && GetHubAdminOption(h, "no_online") != 0)
  7011. {
  7012. ReleaseHub(h);
  7013. return ERR_NOT_ENOUGH_RIGHT;
  7014. }
  7015. if (a->ServerAdmin == false && t->Online == false && GetHubAdminOption(h, "no_offline") != 0)
  7016. {
  7017. ReleaseHub(h);
  7018. return ERR_NOT_ENOUGH_RIGHT;
  7019. }
  7020. if (t->Online)
  7021. {
  7022. ALog(a, h, "LA_SET_HUB_ONLINE");
  7023. SetHubOnline(h);
  7024. }
  7025. else
  7026. {
  7027. ALog(a, h, "LA_SET_HUB_OFFLINE");
  7028. SetHubOffline(h);
  7029. }
  7030. h->CurrentVersion++;
  7031. SiHubUpdateProc(h);
  7032. IncrementServerConfigRevision(s);
  7033. ReleaseHub(h);
  7034. return ERR_NO_ERROR;
  7035. }
  7036. // Get connection information
  7037. UINT StGetConnectionInfo(ADMIN *a, RPC_CONNECTION_INFO *t)
  7038. {
  7039. SERVER *s = a->Server;
  7040. CEDAR *c = s->Cedar;
  7041. CONNECTION *connection;
  7042. char name[MAX_CONNECTION_NAME_LEN + 1];
  7043. if (IsEmptyStr(t->Name))
  7044. {
  7045. return ERR_INVALID_PARAMETER;
  7046. }
  7047. SERVER_ADMIN_ONLY;
  7048. LockList(c->ConnectionList);
  7049. {
  7050. CONNECTION tt;
  7051. Zero(&tt, sizeof(tt));
  7052. tt.Name = t->Name;
  7053. StrCpy(name, sizeof(name), t->Name);
  7054. connection = Search(c->ConnectionList, &tt);
  7055. if (connection != NULL)
  7056. {
  7057. AddRef(connection->ref);
  7058. }
  7059. }
  7060. UnlockList(c->ConnectionList);
  7061. if (connection == NULL)
  7062. {
  7063. return ERR_OBJECT_NOT_FOUND;
  7064. }
  7065. Zero(t, sizeof(RPC_CONNECTION_INFO));
  7066. StrCpy(t->Name, sizeof(t->Name), name);
  7067. Lock(connection->lock);
  7068. {
  7069. SOCK *s = connection->FirstSock;
  7070. if (s != NULL)
  7071. {
  7072. t->Ip = IPToUINT(&s->RemoteIP);
  7073. t->Port = s->RemotePort;
  7074. StrCpy(t->Hostname, sizeof(t->Hostname), s->RemoteHostname);
  7075. }
  7076. StrCpy(t->Name, sizeof(t->Name), connection->Name);
  7077. t->ConnectedTime = TickToTime(connection->ConnectedTick);
  7078. t->Type = connection->Type;
  7079. StrCpy(t->ServerStr, sizeof(t->ServerStr), connection->ServerStr);
  7080. StrCpy(t->ClientStr, sizeof(t->ClientStr), connection->ClientStr);
  7081. t->ServerVer = connection->ServerVer;
  7082. t->ServerBuild = connection->ServerBuild;
  7083. t->ClientVer = connection->ClientVer;
  7084. t->ClientBuild = connection->ClientBuild;
  7085. }
  7086. Unlock(connection->lock);
  7087. ReleaseConnection(connection);
  7088. return ERR_NO_ERROR;
  7089. }
  7090. // Disconnect a connection
  7091. UINT StDisconnectConnection(ADMIN *a, RPC_DISCONNECT_CONNECTION *t)
  7092. {
  7093. SERVER *s = a->Server;
  7094. CEDAR *c = s->Cedar;
  7095. CONNECTION *connection;
  7096. if (IsEmptyStr(t->Name))
  7097. {
  7098. return ERR_INVALID_PARAMETER;
  7099. }
  7100. SERVER_ADMIN_ONLY;
  7101. LockList(c->ConnectionList);
  7102. {
  7103. CONNECTION tt;
  7104. Zero(&tt, sizeof(tt));
  7105. tt.Name = t->Name;
  7106. connection = Search(c->ConnectionList, &tt);
  7107. if (connection != NULL)
  7108. {
  7109. AddRef(connection->ref);
  7110. }
  7111. }
  7112. UnlockList(c->ConnectionList);
  7113. if (connection == NULL)
  7114. {
  7115. return ERR_OBJECT_NOT_FOUND;
  7116. }
  7117. StopConnection(connection, true);
  7118. ReleaseConnection(connection);
  7119. ALog(a, NULL, "LA_DISCONNECT_CONN", t->Name);
  7120. return ERR_NO_ERROR;
  7121. }
  7122. // Enumerate connections
  7123. UINT StEnumConnection(ADMIN *a, RPC_ENUM_CONNECTION *t)
  7124. {
  7125. SERVER *s = a->Server;
  7126. CEDAR *c = s->Cedar;
  7127. SERVER_ADMIN_ONLY;
  7128. FreeRpcEnumConnetion(t);
  7129. Zero(t, sizeof(RPC_ENUM_CONNECTION));
  7130. LockList(c->ConnectionList);
  7131. {
  7132. UINT i;
  7133. t->NumConnection = LIST_NUM(c->ConnectionList);
  7134. t->Connections = ZeroMalloc(sizeof(RPC_ENUM_CONNECTION_ITEM) * t->NumConnection);
  7135. for (i = 0;i < t->NumConnection;i++)
  7136. {
  7137. RPC_ENUM_CONNECTION_ITEM *e = &t->Connections[i];
  7138. CONNECTION *connection = LIST_DATA(c->ConnectionList, i);
  7139. Lock(connection->lock);
  7140. {
  7141. SOCK *s = connection->FirstSock;
  7142. if (s != NULL)
  7143. {
  7144. e->Ip = IPToUINT(&s->RemoteIP);
  7145. e->Port = s->RemotePort;
  7146. StrCpy(e->Hostname, sizeof(e->Hostname), s->RemoteHostname);
  7147. }
  7148. StrCpy(e->Name, sizeof(e->Name), connection->Name);
  7149. e->ConnectedTime = TickToTime(connection->ConnectedTick);
  7150. e->Type = connection->Type;
  7151. }
  7152. Unlock(connection->lock);
  7153. }
  7154. }
  7155. UnlockList(c->ConnectionList);
  7156. return ERR_NO_ERROR;
  7157. }
  7158. // Set Radius options of the hub
  7159. UINT StSetHubRadius(ADMIN *a, RPC_RADIUS *t)
  7160. {
  7161. SERVER *s = a->Server;
  7162. CEDAR *c = s->Cedar;
  7163. HUB *h = NULL;
  7164. NO_SUPPORT_FOR_BRIDGE;
  7165. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7166. {
  7167. return ERR_NOT_SUPPORTED;
  7168. }
  7169. if (GetGlobalServerFlag(GSF_DISABLE_RADIUS_AUTH) != 0 && IsEmptyStr(t->RadiusServerName) == false)
  7170. {
  7171. return ERR_NOT_SUPPORTED_FUNCTION_ON_OPENSOURCE;
  7172. }
  7173. CHECK_RIGHT;
  7174. LockHubList(c);
  7175. {
  7176. h = GetHub(c, t->HubName);
  7177. }
  7178. UnlockHubList(c);
  7179. if (h == NULL)
  7180. {
  7181. return ERR_HUB_NOT_FOUND;
  7182. }
  7183. //SetRadiusServer(h, t->RadiusServerName, t->RadiusPort, t->RadiusSecret);
  7184. SetRadiusServerEx(h, t->RadiusServerName, t->RadiusPort, t->RadiusSecret, t->RadiusRetryInterval);
  7185. ALog(a, h, "LA_SET_HUB_RADIUS");
  7186. ReleaseHub(h);
  7187. IncrementServerConfigRevision(s);
  7188. return ERR_NO_ERROR;
  7189. }
  7190. // Get Radius options of the hub
  7191. UINT StGetHubRadius(ADMIN *a, RPC_RADIUS *t)
  7192. {
  7193. SERVER *s = a->Server;
  7194. CEDAR *c = s->Cedar;
  7195. HUB *h = NULL;
  7196. CHECK_RIGHT;
  7197. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7198. {
  7199. return ERR_NOT_SUPPORTED;
  7200. }
  7201. LockHubList(c);
  7202. {
  7203. h = GetHub(c, t->HubName);
  7204. }
  7205. UnlockHubList(c);
  7206. if (h == NULL)
  7207. {
  7208. return ERR_HUB_NOT_FOUND;
  7209. }
  7210. Zero(t, sizeof(RPC_RADIUS));
  7211. //GetRadiusServer(h, t->RadiusServerName, sizeof(t->RadiusServerName),
  7212. // &t->RadiusPort, t->RadiusSecret, sizeof(t->RadiusSecret));
  7213. GetRadiusServerEx(h, t->RadiusServerName, sizeof(t->RadiusServerName),
  7214. &t->RadiusPort, t->RadiusSecret, sizeof(t->RadiusSecret), &t->RadiusRetryInterval);
  7215. ReleaseHub(h);
  7216. return ERR_NO_ERROR;
  7217. }
  7218. // Delete a hub
  7219. UINT StDeleteHub(ADMIN *a, RPC_DELETE_HUB *t)
  7220. {
  7221. SERVER *s = a->Server;
  7222. CEDAR *c = s->Cedar;
  7223. HUB *h = NULL;
  7224. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7225. {
  7226. return ERR_NOT_FARM_CONTROLLER;
  7227. }
  7228. if (IsEmptyStr(t->HubName) || IsSafeStr(t->HubName) == false)
  7229. {
  7230. return ERR_INVALID_PARAMETER;
  7231. }
  7232. NO_SUPPORT_FOR_BRIDGE;
  7233. SERVER_ADMIN_ONLY;
  7234. LockHubList(c);
  7235. {
  7236. h = GetHub(c, t->HubName);
  7237. }
  7238. UnlockHubList(c);
  7239. if (h == NULL)
  7240. {
  7241. return ERR_HUB_NOT_FOUND;
  7242. }
  7243. StopHub(h);
  7244. IncrementServerConfigRevision(s);
  7245. DelHub(c, h);
  7246. ReleaseHub(h);
  7247. ALog(a, NULL, "LA_DELETE_HUB", t->HubName);
  7248. return ERR_NO_ERROR;
  7249. }
  7250. // Enumerate hubs
  7251. UINT StEnumHub(ADMIN *a, RPC_ENUM_HUB *t)
  7252. {
  7253. SERVER *s = a->Server;
  7254. CEDAR *c = s->Cedar;
  7255. HUB *h = NULL;
  7256. FreeRpcEnumHub(t);
  7257. Zero(t, sizeof(RPC_ENUM_HUB));
  7258. LockHubList(c);
  7259. {
  7260. UINT i, num, j;
  7261. num = 0;
  7262. for (i = 0;i < LIST_NUM(c->HubList);i++)
  7263. {
  7264. HUB *h = LIST_DATA(c->HubList, i);
  7265. Lock(h->lock);
  7266. if (a->ServerAdmin == false &&
  7267. h->Option != NULL &&
  7268. StrCmpi(h->Name, a->HubName) != 0)
  7269. {
  7270. // This hub is not listed
  7271. }
  7272. else
  7273. {
  7274. // This hub is listed
  7275. num++;
  7276. }
  7277. }
  7278. t->NumHub = num;
  7279. t->Hubs = ZeroMalloc(sizeof(RPC_ENUM_HUB_ITEM) * num);
  7280. i = 0;
  7281. for (j = 0;j < LIST_NUM(c->HubList);j++)
  7282. {
  7283. HUB *h = LIST_DATA(c->HubList, j);
  7284. if (a->ServerAdmin == false &&
  7285. h->Option != NULL &&
  7286. StrCmpi(h->Name, a->HubName) != 0)
  7287. {
  7288. // This hub is not listed
  7289. }
  7290. else
  7291. {
  7292. // This hub is listed
  7293. RPC_ENUM_HUB_ITEM *e = &t->Hubs[i++];
  7294. StrCpy(e->HubName, sizeof(e->HubName), h->Name);
  7295. e->Online = h->Offline ? false : true;
  7296. e->HubType = h->Type;
  7297. e->NumSessions = LIST_NUM(h->SessionList);
  7298. LockHashList(h->MacHashTable);
  7299. {
  7300. e->NumMacTables = HASH_LIST_NUM(h->MacHashTable);
  7301. e->NumIpTables = LIST_NUM(h->IpTable);
  7302. }
  7303. UnlockHashList(h->MacHashTable);
  7304. if (h->HubDb != NULL)
  7305. {
  7306. LockList(h->HubDb->UserList);
  7307. {
  7308. e->NumUsers = LIST_NUM(h->HubDb->UserList);
  7309. }
  7310. UnlockList(h->HubDb->UserList);
  7311. LockList(h->HubDb->GroupList);
  7312. {
  7313. e->NumGroups = LIST_NUM(h->HubDb->GroupList);
  7314. }
  7315. UnlockList(h->HubDb->GroupList);
  7316. }
  7317. e->LastCommTime = h->LastCommTime;
  7318. e->LastLoginTime = h->LastLoginTime;
  7319. e->NumLogin = h->NumLogin;
  7320. e->CreatedTime = h->CreatedTime;
  7321. Lock(h->TrafficLock);
  7322. {
  7323. Copy(&e->Traffic, h->Traffic, sizeof(TRAFFIC));
  7324. }
  7325. Unlock(h->TrafficLock);
  7326. e->IsTrafficFilled = true;
  7327. }
  7328. Unlock(h->lock);
  7329. }
  7330. }
  7331. UnlockHubList(c);
  7332. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  7333. {
  7334. UINT i, j, k;
  7335. LockList(s->FarmMemberList);
  7336. {
  7337. for (i = 0;i < LIST_NUM(s->FarmMemberList);i++)
  7338. {
  7339. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7340. LockList(f->HubList);
  7341. {
  7342. if (f->Me == false)
  7343. {
  7344. for (j = 0;j < LIST_NUM(f->HubList);j++)
  7345. {
  7346. HUB_LIST *o = LIST_DATA(f->HubList, j);
  7347. for (k = 0;k < t->NumHub;k++)
  7348. {
  7349. RPC_ENUM_HUB_ITEM *e = &t->Hubs[k];
  7350. if (StrCmpi(e->HubName, o->Name) == 0)
  7351. {
  7352. e->NumIpTables += o->NumIpTables;
  7353. e->NumMacTables += o->NumMacTables;
  7354. e->NumSessions += o->NumSessions;
  7355. }
  7356. }
  7357. }
  7358. }
  7359. }
  7360. UnlockList(f->HubList);
  7361. }
  7362. }
  7363. UnlockList(s->FarmMemberList);
  7364. }
  7365. return ERR_NO_ERROR;
  7366. }
  7367. // Get hub configuration
  7368. UINT StGetHub(ADMIN *a, RPC_CREATE_HUB *t)
  7369. {
  7370. SERVER *s = a->Server;
  7371. CEDAR *c = s->Cedar;
  7372. UINT ret = ERR_NO_ERROR;
  7373. HUB *h;
  7374. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7375. {
  7376. return ERR_NOT_FARM_CONTROLLER;
  7377. }
  7378. if (IsEmptyStr(t->HubName) || IsSafeStr(t->HubName) == false)
  7379. {
  7380. return ERR_INVALID_PARAMETER;
  7381. }
  7382. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7383. {
  7384. return ERR_NOT_FARM_CONTROLLER;
  7385. }
  7386. NO_SUPPORT_FOR_BRIDGE;
  7387. CHECK_RIGHT;
  7388. LockHubList(c);
  7389. {
  7390. h = GetHub(c, t->HubName);
  7391. }
  7392. UnlockHubList(c);
  7393. Zero(t, sizeof(RPC_CREATE_HUB));
  7394. if (h == NULL)
  7395. {
  7396. return ERR_HUB_NOT_FOUND;
  7397. }
  7398. Lock(h->lock);
  7399. {
  7400. StrCpy(t->HubName, sizeof(t->HubName), h->Name);
  7401. t->Online = h->Offline ? false : true;
  7402. t->HubOption.MaxSession = h->Option->MaxSession;
  7403. t->HubOption.NoEnum = h->Option->NoEnum;
  7404. t->HubType = h->Type;
  7405. }
  7406. Unlock(h->lock);
  7407. ReleaseHub(h);
  7408. return ret;
  7409. }
  7410. // Set hub configuration
  7411. UINT StSetHub(ADMIN *a, RPC_CREATE_HUB *t)
  7412. {
  7413. SERVER *s = a->Server;
  7414. CEDAR *c = s->Cedar;
  7415. HUB *h;
  7416. UINT ret = ERR_NO_ERROR;
  7417. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7418. {
  7419. return ERR_NOT_FARM_CONTROLLER;
  7420. }
  7421. if (IsEmptyStr(t->HubName) || IsSafeStr(t->HubName) == false)
  7422. {
  7423. return ERR_INVALID_PARAMETER;
  7424. }
  7425. CHECK_RIGHT;
  7426. NO_SUPPORT_FOR_BRIDGE;
  7427. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7428. {
  7429. return ERR_NOT_FARM_CONTROLLER;
  7430. }
  7431. if (s->ServerType == SERVER_TYPE_STANDALONE)
  7432. {
  7433. if (t->HubType != HUB_TYPE_STANDALONE)
  7434. {
  7435. return ERR_INVALID_PARAMETER;
  7436. }
  7437. }
  7438. if (s->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  7439. {
  7440. if (t->HubType == HUB_TYPE_STANDALONE)
  7441. {
  7442. return ERR_INVALID_PARAMETER;
  7443. }
  7444. }
  7445. LockHubList(c);
  7446. {
  7447. h = GetHub(c, t->HubName);
  7448. }
  7449. UnlockHubList(c);
  7450. if (h == NULL)
  7451. {
  7452. return ERR_HUB_NOT_FOUND;
  7453. }
  7454. if (h->Type != t->HubType)
  7455. {
  7456. ReleaseHub(h);
  7457. return ERR_NOT_SUPPORTED;
  7458. }
  7459. // For JSON-RPC
  7460. if (StrLen(t->AdminPasswordPlainText) != 0)
  7461. {
  7462. Hash(t->HashedPassword, t->AdminPasswordPlainText, StrLen(t->AdminPasswordPlainText), true);
  7463. HashPassword(t->SecurePassword, ADMINISTRATOR_USERNAME, t->AdminPasswordPlainText);
  7464. }
  7465. if (IsZero(t->HashedPassword, sizeof(t->HashedPassword)) == false &&
  7466. IsZero(t->SecurePassword, sizeof(t->SecurePassword)) == false)
  7467. {
  7468. if (a->ServerAdmin == false && GetHubAdminOption(h, "no_change_admin_password") != 0)
  7469. {
  7470. ReleaseHub(h);
  7471. return ERR_NOT_ENOUGH_RIGHT;
  7472. }
  7473. }
  7474. // Is the password to be set blank
  7475. {
  7476. UCHAR hash1[SHA1_SIZE], hash2[SHA1_SIZE];
  7477. HashPassword(hash1, ADMINISTRATOR_USERNAME, "");
  7478. Hash(hash2, "", 0, true);
  7479. if (Cmp(t->HashedPassword, hash2, SHA1_SIZE) == 0 || Cmp(t->SecurePassword, hash1, SHA1_SIZE) == 0)
  7480. {
  7481. if (a->ServerAdmin == false && a->Rpc->Sock->RemoteIP.addr[0] != 127)
  7482. {
  7483. // Refuse to set a blank password to hub admin from remote host
  7484. ReleaseHub(h);
  7485. return ERR_INVALID_PARAMETER;
  7486. }
  7487. }
  7488. }
  7489. Lock(h->lock);
  7490. {
  7491. if (a->ServerAdmin == false && h->Type != t->HubType)
  7492. {
  7493. ret = ERR_NOT_ENOUGH_RIGHT;
  7494. }
  7495. else
  7496. {
  7497. h->Type = t->HubType;
  7498. h->Option->MaxSession = t->HubOption.MaxSession;
  7499. h->Option->NoEnum = t->HubOption.NoEnum;
  7500. if (IsZero(t->HashedPassword, sizeof(t->HashedPassword)) == false &&
  7501. IsZero(t->SecurePassword, sizeof(t->SecurePassword)) == false)
  7502. {
  7503. Copy(h->HashedPassword, t->HashedPassword, SHA1_SIZE);
  7504. Copy(h->SecurePassword, t->SecurePassword, SHA1_SIZE);
  7505. }
  7506. }
  7507. }
  7508. Unlock(h->lock);
  7509. if (t->Online)
  7510. {
  7511. if (a->ServerAdmin || GetHubAdminOption(h, "no_online") == 0)
  7512. {
  7513. SetHubOnline(h);
  7514. }
  7515. }
  7516. else
  7517. {
  7518. if (a->ServerAdmin || GetHubAdminOption(h, "no_offline") == 0)
  7519. {
  7520. SetHubOffline(h);
  7521. }
  7522. }
  7523. if (h->Type == HUB_TYPE_FARM_STATIC)
  7524. {
  7525. EnableSecureNAT(h, false);
  7526. }
  7527. h->CurrentVersion++;
  7528. SiHubUpdateProc(h);
  7529. IncrementServerConfigRevision(s);
  7530. ALog(a, h, "LA_SET_HUB");
  7531. ReleaseHub(h);
  7532. return ret;
  7533. }
  7534. // Create a hub
  7535. UINT StCreateHub(ADMIN *a, RPC_CREATE_HUB *t)
  7536. {
  7537. SERVER *s = a->Server;
  7538. CEDAR *c = s->Cedar;
  7539. HUB *h;
  7540. HUB_OPTION o;
  7541. UINT current_hub_num;
  7542. bool b;
  7543. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7544. {
  7545. return ERR_NOT_FARM_CONTROLLER;
  7546. }
  7547. if (IsEmptyStr(t->HubName) || IsSafeStr(t->HubName) == false)
  7548. {
  7549. return ERR_INVALID_PARAMETER;
  7550. }
  7551. NO_SUPPORT_FOR_BRIDGE;
  7552. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7553. {
  7554. return ERR_NOT_FARM_CONTROLLER;
  7555. }
  7556. SERVER_ADMIN_ONLY;
  7557. Trim(t->HubName);
  7558. if (StrLen(t->HubName) == 0)
  7559. {
  7560. return ERR_INVALID_PARAMETER;
  7561. }
  7562. if (StartWith(t->HubName, ".") || EndWith(t->HubName, "."))
  7563. {
  7564. return ERR_INVALID_PARAMETER;
  7565. }
  7566. if (s->ServerType == SERVER_TYPE_FARM_MEMBER)
  7567. {
  7568. return ERR_NOT_FARM_CONTROLLER;
  7569. }
  7570. if (s->ServerType == SERVER_TYPE_STANDALONE)
  7571. {
  7572. if (t->HubType != HUB_TYPE_STANDALONE)
  7573. {
  7574. return ERR_INVALID_PARAMETER;
  7575. }
  7576. }
  7577. else if (t->HubType != HUB_TYPE_FARM_DYNAMIC && t->HubType != HUB_TYPE_FARM_STATIC)
  7578. {
  7579. return ERR_INVALID_PARAMETER;
  7580. }
  7581. // Create a hub object
  7582. Zero(&o, sizeof(o));
  7583. o.MaxSession = t->HubOption.MaxSession;
  7584. o.NoEnum = t->HubOption.NoEnum;
  7585. // Default setting for hub admin options
  7586. SiSetDefaultHubOption(&o);
  7587. LockList(c->HubList);
  7588. {
  7589. current_hub_num = LIST_NUM(c->HubList);
  7590. }
  7591. UnlockList(c->HubList);
  7592. if (current_hub_num > GetServerCapsInt(a->Server, "i_max_hubs"))
  7593. {
  7594. return ERR_TOO_MANY_HUBS;
  7595. }
  7596. LockList(c->HubList);
  7597. {
  7598. b = IsHub(c, t->HubName);
  7599. }
  7600. UnlockList(c->HubList);
  7601. if (b)
  7602. {
  7603. return ERR_HUB_ALREADY_EXISTS;
  7604. }
  7605. ALog(a, NULL, "LA_CREATE_HUB", t->HubName);
  7606. // For JSON-RPC
  7607. if ((IsZero(t->HashedPassword, sizeof(t->HashedPassword)) &&
  7608. IsZero(t->SecurePassword, sizeof(t->SecurePassword))) ||
  7609. StrLen(t->AdminPasswordPlainText) != 0)
  7610. {
  7611. Hash(t->HashedPassword, t->AdminPasswordPlainText, StrLen(t->AdminPasswordPlainText), true);
  7612. HashPassword(t->SecurePassword, ADMINISTRATOR_USERNAME, t->AdminPasswordPlainText);
  7613. }
  7614. h = NewHub(c, t->HubName, &o);
  7615. Copy(h->HashedPassword, t->HashedPassword, SHA1_SIZE);
  7616. Copy(h->SecurePassword, t->SecurePassword, SHA1_SIZE);
  7617. h->Type = t->HubType;
  7618. AddHub(c, h);
  7619. if (t->Online)
  7620. {
  7621. h->Offline = true;
  7622. SetHubOnline(h);
  7623. }
  7624. else
  7625. {
  7626. h->Offline = false;
  7627. SetHubOffline(h);
  7628. }
  7629. h->CreatedTime = SystemTime64();
  7630. ReleaseHub(h);
  7631. IncrementServerConfigRevision(s);
  7632. return ERR_NO_ERROR;
  7633. }
  7634. // Set cipher for SSL to the server
  7635. UINT StSetServerCipher(ADMIN *a, RPC_STR *t)
  7636. {
  7637. SERVER *s = a->Server;
  7638. CEDAR *c = s->Cedar;
  7639. if (IsEmptyStr(t->String))
  7640. {
  7641. return ERR_INVALID_PARAMETER;
  7642. }
  7643. SERVER_ADMIN_ONLY;
  7644. StrUpper(t->String);
  7645. if (CheckCipherListName(t->String) == false)
  7646. {
  7647. return ERR_CIPHER_NOT_SUPPORTED;
  7648. }
  7649. else
  7650. {
  7651. ALog(a, NULL, "LA_SET_SERVER_CIPHER", t->String);
  7652. }
  7653. Lock(c->lock);
  7654. {
  7655. SetCedarCipherList(c, t->String);
  7656. }
  7657. Unlock(c->lock);
  7658. IncrementServerConfigRevision(s);
  7659. return ERR_NO_ERROR;
  7660. }
  7661. // Get cipher for SSL
  7662. UINT StGetServerCipher(ADMIN *a, RPC_STR *t)
  7663. {
  7664. SERVER *s = a->Server;
  7665. CEDAR *c = s->Cedar;
  7666. FreeRpcStr(t);
  7667. Zero(t, sizeof(RPC_STR));
  7668. Lock(c->lock);
  7669. {
  7670. t->String = CopyStr(c->CipherList);
  7671. }
  7672. Unlock(c->lock);
  7673. return ERR_NO_ERROR;
  7674. }
  7675. // Get the server certification
  7676. UINT StGetServerCert(ADMIN *a, RPC_KEY_PAIR *t)
  7677. {
  7678. bool admin;
  7679. SERVER *s = a->Server;
  7680. CEDAR *c = s->Cedar;
  7681. bool is_vgs_cert = false;
  7682. admin = a->ServerAdmin;
  7683. FreeRpcKeyPair(t);
  7684. Zero(t, sizeof(RPC_KEY_PAIR));
  7685. Lock(c->lock);
  7686. {
  7687. t->Cert = CloneX(c->ServerX);
  7688. if (admin && is_vgs_cert == false)
  7689. {
  7690. t->Key = CloneK(c->ServerK);
  7691. }
  7692. }
  7693. Unlock(c->lock);
  7694. return ERR_NO_ERROR;
  7695. }
  7696. // Set the server certification
  7697. UINT StSetServerCert(ADMIN *a, RPC_KEY_PAIR *t)
  7698. {
  7699. SERVER *s = a->Server;
  7700. CEDAR *c = s->Cedar;
  7701. SERVER_ADMIN_ONLY;
  7702. if (t->Cert == NULL || t->Key == NULL)
  7703. {
  7704. return ERR_PROTOCOL_ERROR;
  7705. }
  7706. if (t->Cert->is_compatible_bit == false)
  7707. {
  7708. return ERR_NOT_RSA_1024;
  7709. }
  7710. if (CheckXandK(t->Cert, t->Key) == false)
  7711. {
  7712. return ERR_PROTOCOL_ERROR;
  7713. }
  7714. t->Flag1 = 1;
  7715. if (t->Cert->root_cert == false)
  7716. {
  7717. if (DownloadAndSaveIntermediateCertificatesIfNecessary(t->Cert) == false)
  7718. {
  7719. t->Flag1 = 0;
  7720. }
  7721. }
  7722. SetCedarCert(c, t->Cert, t->Key);
  7723. ALog(a, NULL, "LA_SET_SERVER_CERT");
  7724. IncrementServerConfigRevision(s);
  7725. return ERR_NO_ERROR;
  7726. }
  7727. // Get status of connection to cluster controller
  7728. UINT StGetFarmConnectionStatus(ADMIN *a, RPC_FARM_CONNECTION_STATUS *t)
  7729. {
  7730. SERVER *s = a->Server;
  7731. CEDAR *c = s->Cedar;
  7732. FARM_CONTROLLER *fc;
  7733. if (s->ServerType != SERVER_TYPE_FARM_MEMBER)
  7734. {
  7735. return ERR_NOT_FARM_MEMBER;
  7736. }
  7737. Zero(t, sizeof(RPC_FARM_CONNECTION_STATUS));
  7738. fc = s->FarmController;
  7739. Lock(fc->lock);
  7740. {
  7741. if (fc->Sock != NULL)
  7742. {
  7743. t->Ip = IPToUINT(&fc->Sock->RemoteIP);
  7744. t->Port = fc->Sock->RemotePort;
  7745. }
  7746. t->Online = fc->Online;
  7747. t->LastError = ERR_NO_ERROR;
  7748. if (t->Online == false)
  7749. {
  7750. t->LastError = fc->LastError;
  7751. }
  7752. else
  7753. {
  7754. t->CurrentConnectedTime = fc->CurrentConnectedTime;
  7755. }
  7756. t->StartedTime = fc->StartedTime;
  7757. t->FirstConnectedTime = fc->FirstConnectedTime;
  7758. t->NumConnected = fc->NumConnected;
  7759. t->NumTry = fc->NumTry;
  7760. t->NumFailed = fc->NumFailed;
  7761. }
  7762. Unlock(fc->lock);
  7763. return ERR_NO_ERROR;
  7764. }
  7765. // Enumerate cluster members
  7766. UINT StEnumFarmMember(ADMIN *a, RPC_ENUM_FARM *t)
  7767. {
  7768. SERVER *s = a->Server;
  7769. CEDAR *c = s->Cedar;
  7770. UINT i;
  7771. FreeRpcEnumFarm(t);
  7772. Zero(t, sizeof(RPC_ENUM_FARM));
  7773. if (s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  7774. {
  7775. return ERR_NOT_FARM_CONTROLLER;
  7776. }
  7777. Zero(t, sizeof(RPC_ENUM_FARM));
  7778. LockList(s->FarmMemberList);
  7779. {
  7780. t->NumFarm = LIST_NUM(s->FarmMemberList);
  7781. t->Farms = ZeroMalloc(sizeof(RPC_ENUM_FARM_ITEM) * t->NumFarm);
  7782. for (i = 0;i < t->NumFarm;i++)
  7783. {
  7784. FARM_MEMBER *f = LIST_DATA(s->FarmMemberList, i);
  7785. RPC_ENUM_FARM_ITEM *e = &t->Farms[i];
  7786. e->Id = POINTER_TO_KEY(f);
  7787. e->Controller = f->Me;
  7788. if (e->Controller)
  7789. {
  7790. e->ConnectedTime = TickToTime(c->CreatedTick);
  7791. e->Ip = 0x0100007f;
  7792. GetMachineName(e->Hostname, sizeof(e->Hostname));
  7793. e->Point = f->Point;
  7794. e->NumSessions = Count(c->CurrentSessions);
  7795. e->NumTcpConnections = Count(c->CurrentTcpConnections);
  7796. e->AssignedBridgeLicense = Count(c->AssignedBridgeLicense);
  7797. e->AssignedClientLicense = Count(c->AssignedClientLicense);
  7798. }
  7799. else
  7800. {
  7801. e->ConnectedTime = f->ConnectedTime;
  7802. e->Ip = f->Ip;
  7803. StrCpy(e->Hostname, sizeof(e->Hostname), f->hostname);
  7804. e->Point = f->Point;
  7805. e->NumSessions = f->NumSessions;
  7806. e->NumTcpConnections = f->NumTcpConnections;
  7807. e->AssignedBridgeLicense = f->AssignedBridgeLicense;
  7808. e->AssignedClientLicense = f->AssignedClientLicense;
  7809. }
  7810. e->NumHubs = LIST_NUM(f->HubList);
  7811. }
  7812. }
  7813. UnlockList(s->FarmMemberList);
  7814. return ERR_NO_ERROR;
  7815. }
  7816. // Get cluster member information
  7817. UINT StGetFarmInfo(ADMIN *a, RPC_FARM_INFO *t)
  7818. {
  7819. SERVER *s = a->Server;
  7820. UINT id = t->Id;
  7821. UINT i;
  7822. UINT ret = ERR_NO_ERROR;
  7823. FreeRpcFarmInfo(t);
  7824. Zero(t, sizeof(RPC_FARM_INFO));
  7825. if (s->ServerType != SERVER_TYPE_FARM_CONTROLLER)
  7826. {
  7827. return ERR_NOT_FARM_CONTROLLER;
  7828. }
  7829. LockList(s->FarmMemberList);
  7830. {
  7831. if (IsInListKey(s->FarmMemberList, id))
  7832. {
  7833. FARM_MEMBER *f = ListKeyToPointer(s->FarmMemberList, id);
  7834. t->Id = id;
  7835. t->Controller = f->Me;
  7836. t->Weight = f->Weight;
  7837. LockList(f->HubList);
  7838. {
  7839. t->NumFarmHub = LIST_NUM(f->HubList);
  7840. t->FarmHubs = ZeroMalloc(sizeof(RPC_FARM_HUB) * t->NumFarmHub);
  7841. for (i = 0;i < t->NumFarmHub;i++)
  7842. {
  7843. RPC_FARM_HUB *h = &t->FarmHubs[i];
  7844. HUB_LIST *hh = LIST_DATA(f->HubList, i);
  7845. h->DynamicHub = hh->DynamicHub;
  7846. StrCpy(h->HubName, sizeof(h->HubName), hh->Name);
  7847. }
  7848. }
  7849. UnlockList(f->HubList);
  7850. if (t->Controller)
  7851. {
  7852. t->ConnectedTime = TickToTime(s->Cedar->CreatedTick);
  7853. t->Ip = 0x0100007f;
  7854. GetMachineName(t->Hostname, sizeof(t->Hostname));
  7855. t->Point = f->Point;
  7856. LockList(s->ServerListenerList);
  7857. {
  7858. UINT i, n;
  7859. t->NumPort = 0;
  7860. for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
  7861. {
  7862. SERVER_LISTENER *o = LIST_DATA(s->ServerListenerList, i);
  7863. if (o->Enabled)
  7864. {
  7865. t->NumPort++;
  7866. }
  7867. }
  7868. t->Ports = ZeroMalloc(sizeof(UINT) * t->NumPort);
  7869. n = 0;
  7870. for (i = 0;i < LIST_NUM(s->ServerListenerList);i++)
  7871. {
  7872. SERVER_LISTENER *o = LIST_DATA(s->ServerListenerList, i);
  7873. if (o->Enabled)
  7874. {
  7875. t->Ports[n++] = o->Port;
  7876. }
  7877. }
  7878. }
  7879. UnlockList(s->ServerListenerList);
  7880. t->ServerCert = CloneX(s->Cedar->ServerX);
  7881. t->NumSessions = Count(s->Cedar->CurrentSessions);
  7882. t->NumTcpConnections = Count(s->Cedar->CurrentTcpConnections);
  7883. }
  7884. else
  7885. {
  7886. t->ConnectedTime = f->ConnectedTime;
  7887. t->Ip = f->Ip;
  7888. StrCpy(t->Hostname, sizeof(t->Hostname), f->hostname);
  7889. t->Point = f->Point;
  7890. t->NumPort = f->NumPort;
  7891. t->Ports = ZeroMalloc(sizeof(UINT) * t->NumPort);
  7892. Copy(t->Ports, f->Ports, sizeof(UINT) * t->NumPort);
  7893. t->ServerCert = CloneX(f->ServerCert);
  7894. t->NumSessions = f->NumSessions;
  7895. t->NumTcpConnections = f->NumTcpConnections;
  7896. }
  7897. }
  7898. else
  7899. {
  7900. ret = ERR_OBJECT_NOT_FOUND;
  7901. }
  7902. }
  7903. UnlockList(s->FarmMemberList);
  7904. return ret;
  7905. }
  7906. // Get clustering configuration
  7907. UINT StGetFarmSetting(ADMIN *a, RPC_FARM *t)
  7908. {
  7909. SERVER *s;
  7910. FreeRpcFarm(t);
  7911. Zero(t, sizeof(RPC_FARM));
  7912. s = a->Server;
  7913. t->ServerType = s->ServerType;
  7914. t->ControllerOnly = s->ControllerOnly;
  7915. t->Weight = s->Weight;
  7916. if (t->ServerType == SERVER_TYPE_FARM_MEMBER)
  7917. {
  7918. t->NumPort = s->NumPublicPort;
  7919. t->Ports = ZeroMalloc(sizeof(UINT) * t->NumPort);
  7920. Copy(t->Ports, s->PublicPorts, sizeof(UINT) * t->NumPort);
  7921. t->PublicIp = s->PublicIp;
  7922. StrCpy(t->ControllerName, sizeof(t->ControllerName), s->ControllerName);
  7923. t->ControllerPort = s->ControllerPort;
  7924. }
  7925. else
  7926. {
  7927. t->NumPort = 0;
  7928. t->Ports = ZeroMalloc(0);
  7929. }
  7930. return ERR_NO_ERROR;
  7931. }
  7932. // Set clustering configuration
  7933. UINT StSetFarmSetting(ADMIN *a, RPC_FARM *t)
  7934. {
  7935. bool cluster_allowed = false;
  7936. SERVER_ADMIN_ONLY;
  7937. NO_SUPPORT_FOR_BRIDGE;
  7938. cluster_allowed = GetServerCapsInt(a->Server, "b_support_cluster");
  7939. if (t->ServerType != SERVER_TYPE_STANDALONE && cluster_allowed == false)
  7940. {
  7941. // When clustering function is disabled, deny turning into clustering mode
  7942. return ERR_NOT_SUPPORTED;
  7943. }
  7944. if (IsZero(t->MemberPassword, sizeof(t->MemberPassword)))
  7945. {
  7946. if (IsEmptyStr(t->MemberPasswordPlaintext) == false)
  7947. {
  7948. // For JSON-RPC
  7949. HashAdminPassword(t->MemberPassword, t->MemberPasswordPlaintext);
  7950. }
  7951. }
  7952. ALog(a, NULL, "LA_SET_FARM_SETTING");
  7953. IncrementServerConfigRevision(a->Server);
  7954. SiSetServerType(a->Server, t->ServerType, t->PublicIp, t->NumPort, t->Ports,
  7955. t->ControllerName, t->ControllerPort, t->MemberPassword, t->Weight, t->ControllerOnly);
  7956. return ERR_NO_ERROR;
  7957. }
  7958. // Set server password
  7959. UINT StSetServerPassword(ADMIN *a, RPC_SET_PASSWORD *t)
  7960. {
  7961. SERVER_ADMIN_ONLY;
  7962. if (IsZero(t->HashedPassword, sizeof(t->HashedPassword)))
  7963. {
  7964. // For JSON-RPC
  7965. HashAdminPassword(t->HashedPassword, t->PlainTextPassword);
  7966. }
  7967. Copy(a->Server->HashedPassword, t->HashedPassword, SHA1_SIZE);
  7968. ALog(a, NULL, "LA_SET_SERVER_PASSWORD");
  7969. IncrementServerConfigRevision(a->Server);
  7970. return ERR_NO_ERROR;
  7971. }
  7972. // Enable / Disable listener
  7973. UINT StEnableListener(ADMIN *a, RPC_LISTENER *t)
  7974. {
  7975. UINT ret = ERR_NO_ERROR;
  7976. SERVER_ADMIN_ONLY;
  7977. LockList(a->Server->ServerListenerList);
  7978. {
  7979. if (t->Enable)
  7980. {
  7981. if (SiEnableListener(a->Server, t->Port) == false)
  7982. {
  7983. ret = ERR_LISTENER_NOT_FOUND;
  7984. }
  7985. else
  7986. {
  7987. ALog(a, NULL, "LA_ENABLE_LISTENER", t->Port);
  7988. }
  7989. }
  7990. else
  7991. {
  7992. if (SiDisableListener(a->Server, t->Port) == false)
  7993. {
  7994. ret = ERR_LISTENER_NOT_FOUND;
  7995. }
  7996. else
  7997. {
  7998. ALog(a, NULL, "LA_DISABLE_LISTENER", t->Port);
  7999. }
  8000. }
  8001. }
  8002. UnlockList(a->Server->ServerListenerList);
  8003. IncrementServerConfigRevision(a->Server);
  8004. SleepThread(250);
  8005. return ret;
  8006. }
  8007. // Delete a listener
  8008. UINT StDeleteListener(ADMIN *a, RPC_LISTENER *t)
  8009. {
  8010. UINT ret = ERR_NO_ERROR;
  8011. SERVER_ADMIN_ONLY;
  8012. LockList(a->Server->ServerListenerList);
  8013. {
  8014. if (SiDeleteListener(a->Server, t->Port) == false)
  8015. {
  8016. ret = ERR_LISTENER_NOT_FOUND;
  8017. }
  8018. else
  8019. {
  8020. ALog(a, NULL, "LA_DELETE_LISTENER", t->Port);
  8021. IncrementServerConfigRevision(a->Server);
  8022. }
  8023. }
  8024. UnlockList(a->Server->ServerListenerList);
  8025. return ret;
  8026. }
  8027. // Enumerating listeners
  8028. UINT StEnumListener(ADMIN *a, RPC_LISTENER_LIST *t)
  8029. {
  8030. CEDAR *c = a->Server->Cedar;
  8031. UINT i;
  8032. FreeRpcListenerList(t);
  8033. Zero(t, sizeof(RPC_LISTENER_LIST));
  8034. LockList(a->Server->ServerListenerList);
  8035. {
  8036. t->NumPort = LIST_NUM(a->Server->ServerListenerList);
  8037. t->Ports = ZeroMalloc(sizeof(UINT) * t->NumPort);
  8038. t->Enables = ZeroMalloc(sizeof(bool) * t->NumPort);
  8039. t->Errors = ZeroMalloc(sizeof(bool) * t->NumPort);
  8040. for (i = 0;i < t->NumPort;i++)
  8041. {
  8042. SERVER_LISTENER *o = LIST_DATA(a->Server->ServerListenerList, i);
  8043. t->Ports[i] = o->Port;
  8044. t->Enables[i] = o->Enabled;
  8045. if (t->Enables[i])
  8046. {
  8047. if (o->Listener->Status == LISTENER_STATUS_TRYING)
  8048. {
  8049. t->Errors[i] = true;
  8050. }
  8051. }
  8052. }
  8053. }
  8054. UnlockList(a->Server->ServerListenerList);
  8055. return ERR_NO_ERROR;
  8056. }
  8057. // Create a listener
  8058. UINT StCreateListener(ADMIN *a, RPC_LISTENER *t)
  8059. {
  8060. UINT ret = ERR_NO_ERROR;
  8061. CEDAR *c = a->Server->Cedar;
  8062. if (t->Port == 0 || t->Port > 65535)
  8063. {
  8064. return ERR_INVALID_PARAMETER;
  8065. }
  8066. SERVER_ADMIN_ONLY;
  8067. LockList(a->Server->ServerListenerList);
  8068. {
  8069. if (SiAddListener(a->Server, t->Port, t->Enable) == false)
  8070. {
  8071. ret = ERR_LISTENER_ALREADY_EXISTS;
  8072. }
  8073. else
  8074. {
  8075. ALog(a, NULL, "LA_CREATE_LISTENER", t->Port);
  8076. IncrementServerConfigRevision(a->Server);
  8077. }
  8078. }
  8079. UnlockList(a->Server->ServerListenerList);
  8080. SleepThread(250);
  8081. return ret;
  8082. }
  8083. // Get server status
  8084. UINT StGetServerStatus(ADMIN *a, RPC_SERVER_STATUS *t)
  8085. {
  8086. CEDAR *c;
  8087. UINT i;
  8088. c = a->Server->Cedar;
  8089. Zero(t, sizeof(RPC_SERVER_STATUS));
  8090. Lock(c->TrafficLock);
  8091. {
  8092. Copy(&t->Traffic, c->Traffic, sizeof(TRAFFIC));
  8093. }
  8094. Unlock(c->TrafficLock);
  8095. GetMemInfo(&t->MemInfo);
  8096. t->ServerType = a->Server->ServerType;
  8097. t->NumTcpConnections = t->NumTcpConnectionsLocal = t->NumTcpConnectionsRemote = 0;
  8098. t->NumSessionsTotal = t->NumSessionsLocal = t->NumSessionsRemote = 0;
  8099. t->NumTcpConnectionsLocal = Count(c->CurrentTcpConnections);
  8100. if (a->Server->ServerType == SERVER_TYPE_FARM_CONTROLLER)
  8101. {
  8102. LockList(a->Server->FarmMemberList);
  8103. {
  8104. for (i = 0;i < LIST_NUM(a->Server->FarmMemberList);i++)
  8105. {
  8106. FARM_MEMBER *f = LIST_DATA(a->Server->FarmMemberList, i);
  8107. if (f->Me == false)
  8108. {
  8109. t->NumTcpConnectionsRemote += f->NumTcpConnections;
  8110. t->NumSessionsRemote += f->NumSessions;
  8111. AddTraffic(&t->Traffic, &f->Traffic);
  8112. }
  8113. }
  8114. }
  8115. UnlockList(a->Server->FarmMemberList);
  8116. }
  8117. t->NumMacTables = t->NumIpTables = t->NumUsers = t->NumGroups = 0;
  8118. // The number of hubs
  8119. LockList(c->HubList);
  8120. {
  8121. t->NumHubTotal = LIST_NUM(c->HubList);
  8122. t->NumHubStandalone = t->NumHubDynamic = t->NumHubStatic = 0;
  8123. for (i = 0;i < LIST_NUM(c->HubList);i++)
  8124. {
  8125. HUB *h = LIST_DATA(c->HubList, i);
  8126. Lock(h->lock);
  8127. {
  8128. switch (h->Type)
  8129. {
  8130. case HUB_TYPE_STANDALONE:
  8131. t->NumHubStandalone++;
  8132. break;
  8133. case HUB_TYPE_FARM_STATIC:
  8134. t->NumHubStatic++;
  8135. break;
  8136. case HUB_TYPE_FARM_DYNAMIC:
  8137. t->NumHubDynamic++;
  8138. break;
  8139. }
  8140. }
  8141. t->NumMacTables += HASH_LIST_NUM(h->MacHashTable);
  8142. t->NumIpTables += LIST_NUM(h->IpTable);
  8143. if (h->HubDb != NULL)
  8144. {
  8145. t->NumUsers += LIST_NUM(h->HubDb->UserList);
  8146. t->NumGroups += LIST_NUM(h->HubDb->GroupList);
  8147. }
  8148. Unlock(h->lock);
  8149. }
  8150. }
  8151. UnlockList(c->HubList);
  8152. // The number of sessions
  8153. t->NumSessionsLocal = Count(c->CurrentSessions);
  8154. t->NumSessionsTotal = t->NumSessionsLocal + t->NumSessionsRemote;
  8155. t->NumTcpConnections = t->NumTcpConnectionsLocal + t->NumTcpConnectionsRemote;
  8156. t->AssignedBridgeLicenses = Count(c->AssignedBridgeLicense);
  8157. t->AssignedClientLicenses = Count(c->AssignedClientLicense);
  8158. t->AssignedBridgeLicensesTotal = a->Server->CurrentAssignedBridgeLicense;
  8159. t->AssignedClientLicensesTotal = a->Server->CurrentAssignedClientLicense;
  8160. t->CurrentTick = Tick64();
  8161. t->CurrentTime = SystemTime64();
  8162. t->StartTime = a->Server->StartTime;
  8163. return ERR_NO_ERROR;
  8164. }
  8165. // Get server information
  8166. UINT StGetServerInfo(ADMIN *a, RPC_SERVER_INFO *t)
  8167. {
  8168. CEDAR *c;
  8169. OS_INFO *info;
  8170. SYSTEMTIME st;
  8171. // Validate arguments
  8172. if (a == NULL || t == NULL)
  8173. {
  8174. return ERR_INTERNAL_ERROR;
  8175. }
  8176. FreeRpcServerInfo(t);
  8177. Zero(t, sizeof(RPC_SERVER_INFO));
  8178. c = a->Server->Cedar;
  8179. GetServerProductName(a->Server, t->ServerProductName, sizeof(t->ServerProductName));
  8180. StrCpy(t->ServerVersionString, sizeof(t->ServerVersionString), c->VerString);
  8181. StrCpy(t->ServerBuildInfoString, sizeof(t->ServerBuildInfoString), c->BuildInfo);
  8182. t->ServerVerInt = c->Version;
  8183. t->ServerBuildInt = c->Build;
  8184. GetMachineName(t->ServerHostName, sizeof(t->ServerHostName));
  8185. t->ServerType = c->Server->ServerType;
  8186. Zero(&st, sizeof(st));
  8187. st.wYear = BUILD_DATE_Y;
  8188. st.wMonth = BUILD_DATE_M;
  8189. st.wDay = BUILD_DATE_D;
  8190. st.wHour = BUILD_DATE_HO;
  8191. st.wMinute = BUILD_DATE_MI;
  8192. st.wSecond = BUILD_DATE_SE;
  8193. t->ServerBuildDate = SystemToUINT64(&st);
  8194. StrCpy(t->ServerFamilyName, sizeof(t->ServerFamilyName), UPDATE_FAMILY_NAME);
  8195. info = GetOsInfo();
  8196. if (info != NULL)
  8197. {
  8198. CopyOsInfo(&t->OsInfo, info);
  8199. }
  8200. return ERR_NO_ERROR;
  8201. }
  8202. // Copy OS_INFO
  8203. void CopyOsInfo(OS_INFO *dst, OS_INFO *info)
  8204. {
  8205. // Validate arguments
  8206. if (info == NULL || dst == NULL)
  8207. {
  8208. return;
  8209. }
  8210. dst->OsType = info->OsType;
  8211. dst->OsServicePack = info->OsServicePack;
  8212. dst->OsSystemName = CopyStr(info->OsSystemName);
  8213. dst->OsProductName = CopyStr(info->OsProductName);
  8214. dst->OsVendorName = CopyStr(info->OsVendorName);
  8215. dst->OsVersion = CopyStr(info->OsVersion);
  8216. dst->KernelName = CopyStr(info->KernelName);
  8217. dst->KernelVersion = CopyStr(info->KernelVersion);
  8218. }
  8219. // OPENVPN_SSTP_CONFIG
  8220. void InOpenVpnSstpConfig(OPENVPN_SSTP_CONFIG *t, PACK *p)
  8221. {
  8222. // Validate arguments
  8223. if (t == NULL || p == NULL)
  8224. {
  8225. return;
  8226. }
  8227. Zero(t, sizeof(OPENVPN_SSTP_CONFIG));
  8228. t->EnableOpenVPN = PackGetBool(p, "EnableOpenVPN");
  8229. t->EnableSSTP = PackGetBool(p, "EnableSSTP");
  8230. PackGetStr(p, "OpenVPNPortList", t->OpenVPNPortList, sizeof(t->OpenVPNPortList));
  8231. }
  8232. void OutOpenVpnSstpConfig(PACK *p, OPENVPN_SSTP_CONFIG *t)
  8233. {
  8234. // Validate arguments
  8235. if (t == NULL || p == NULL)
  8236. {
  8237. return;
  8238. }
  8239. PackAddBool(p, "EnableOpenVPN", t->EnableOpenVPN);
  8240. PackAddBool(p, "EnableSSTP", t->EnableSSTP);
  8241. PackAddStr(p, "OpenVPNPortList", t->OpenVPNPortList);
  8242. }
  8243. // DDNS_CLIENT_STATUS
  8244. void InDDnsClientStatus(DDNS_CLIENT_STATUS *t, PACK *p)
  8245. {
  8246. // Validate arguments
  8247. if (t == NULL || p == NULL)
  8248. {
  8249. return;
  8250. }
  8251. Zero(t, sizeof(DDNS_CLIENT_STATUS));
  8252. t->Err_IPv4 = PackGetInt(p, "Err_IPv4");
  8253. t->Err_IPv6 = PackGetInt(p, "Err_IPv6");
  8254. PackGetStr(p, "CurrentHostName", t->CurrentHostName, sizeof(t->CurrentHostName));
  8255. PackGetStr(p, "CurrentFqdn", t->CurrentFqdn, sizeof(t->CurrentFqdn));
  8256. PackGetStr(p, "DnsSuffix", t->DnsSuffix, sizeof(t->DnsSuffix));
  8257. PackGetStr(p, "CurrentIPv4", t->CurrentIPv4, sizeof(t->CurrentIPv4));
  8258. PackGetStr(p, "CurrentIPv6", t->CurrentIPv6, sizeof(t->CurrentIPv6));
  8259. PackGetUniStr(p, "ErrStr_IPv4", t->ErrStr_IPv4, sizeof(t->ErrStr_IPv4));
  8260. PackGetUniStr(p, "ErrStr_IPv6", t->ErrStr_IPv6, sizeof(t->ErrStr_IPv6));
  8261. }
  8262. void OutDDnsClientStatus(PACK *p, DDNS_CLIENT_STATUS *t)
  8263. {
  8264. // Validate arguments
  8265. if (t == NULL || p == NULL)
  8266. {
  8267. return;
  8268. }
  8269. PackAddInt(p, "Err_IPv4", t->Err_IPv4);
  8270. PackAddInt(p, "Err_IPv6", t->Err_IPv6);
  8271. PackAddStr(p, "CurrentHostName", t->CurrentHostName);
  8272. PackAddStr(p, "CurrentFqdn", t->CurrentFqdn);
  8273. PackAddStr(p, "DnsSuffix", t->DnsSuffix);
  8274. PackAddStr(p, "CurrentIPv4", t->CurrentIPv4);
  8275. PackAddStr(p, "CurrentIPv6", t->CurrentIPv6);
  8276. PackAddUniStr(p, "ErrStr_IPv4", t->ErrStr_IPv4);
  8277. PackAddUniStr(p, "ErrStr_IPv6", t->ErrStr_IPv6);
  8278. }
  8279. // INTERNET_SETTING
  8280. void InRpcInternetSetting(INTERNET_SETTING *t, PACK *p)
  8281. {
  8282. // Validate arguments
  8283. if (t == NULL || p == NULL)
  8284. {
  8285. return;
  8286. }
  8287. t->ProxyType = PackGetInt(p, "ProxyType");
  8288. PackGetStr(p, "ProxyHostName", t->ProxyHostName, sizeof(t->ProxyHostName));
  8289. t->ProxyPort = PackGetInt(p, "ProxyPort");
  8290. PackGetStr(p, "ProxyUsername", t->ProxyUsername, sizeof(t->ProxyUsername));
  8291. PackGetStr(p, "ProxyPassword", t->ProxyPassword, sizeof(t->ProxyPassword));
  8292. }
  8293. void OutRpcInternetSetting(PACK *p, INTERNET_SETTING *t)
  8294. {
  8295. // Validate arguments
  8296. if (t == NULL || p == NULL)
  8297. {
  8298. return;
  8299. }
  8300. PackAddInt(p, "ProxyType", t->ProxyType);
  8301. PackAddStr(p, "ProxyHostName", t->ProxyHostName);
  8302. PackAddInt(p, "ProxyPort", t->ProxyPort);
  8303. PackAddStr(p, "ProxyUsername", t->ProxyUsername);
  8304. PackAddStr(p, "ProxyPassword", t->ProxyPassword);
  8305. }
  8306. // RPC_AZURE_STATUS
  8307. void InRpcAzureStatus(RPC_AZURE_STATUS *t, PACK *p)
  8308. {
  8309. // Validate arguments
  8310. if (t == NULL || p == NULL)
  8311. {
  8312. return;
  8313. }
  8314. Zero(t, sizeof(RPC_AZURE_STATUS));
  8315. t->IsConnected = PackGetBool(p, "IsConnected");
  8316. t->IsEnabled = PackGetBool(p, "IsEnabled");
  8317. }
  8318. void OutRpcAzureStatus(PACK *p, RPC_AZURE_STATUS *t)
  8319. {
  8320. // Validate arguments
  8321. if (t == NULL || p == NULL)
  8322. {
  8323. return;
  8324. }
  8325. PackAddBool(p, "IsConnected", t->IsConnected);
  8326. PackAddBool(p, "IsEnabled", t->IsEnabled);
  8327. }
  8328. // RPC_SPECIAL_LISTENER
  8329. void InRpcSpecialListener(RPC_SPECIAL_LISTENER *t, PACK *p)
  8330. {
  8331. // Validate arguments
  8332. if (t == NULL || p == NULL)
  8333. {
  8334. return;
  8335. }
  8336. Zero(t, sizeof(RPC_SPECIAL_LISTENER));
  8337. t->VpnOverIcmpListener = PackGetBool(p, "VpnOverIcmpListener");
  8338. t->VpnOverDnsListener = PackGetBool(p, "VpnOverDnsListener");
  8339. }
  8340. void OutRpcSpecialListener(PACK *p, RPC_SPECIAL_LISTENER *t)
  8341. {
  8342. // Validate arguments
  8343. if (t == NULL || p == NULL)
  8344. {
  8345. return;
  8346. }
  8347. PackAddBool(p, "VpnOverIcmpListener", t->VpnOverIcmpListener);
  8348. PackAddBool(p, "VpnOverDnsListener", t->VpnOverDnsListener);
  8349. }
  8350. // ETHERIP_ID
  8351. void InEtherIpId(ETHERIP_ID *t, PACK *p)
  8352. {
  8353. // Validate arguments
  8354. if (t == NULL || p == NULL)
  8355. {
  8356. return;
  8357. }
  8358. Zero(t, sizeof(ETHERIP_ID));
  8359. PackGetStr(p, "Id", t->Id, sizeof(t->Id));
  8360. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  8361. PackGetStr(p, "UserName", t->UserName, sizeof(t->UserName));
  8362. PackGetStr(p, "Password", t->Password, sizeof(t->Password));
  8363. }
  8364. void OutEtherIpId(PACK *p, ETHERIP_ID *t)
  8365. {
  8366. // Validate arguments
  8367. if (t == NULL || p == NULL)
  8368. {
  8369. return;
  8370. }
  8371. PackAddStr(p, "Id", t->Id);
  8372. PackAddStr(p, "HubName", t->HubName);
  8373. PackAddStr(p, "UserName", t->UserName);
  8374. PackAddStr(p, "Password", t->Password);
  8375. }
  8376. // RPC_ENUM_ETHERIP_ID
  8377. void InRpcEnumEtherIpId(RPC_ENUM_ETHERIP_ID *t, PACK *p)
  8378. {
  8379. UINT i;
  8380. // Validate arguments
  8381. if (t == NULL || p == NULL)
  8382. {
  8383. return;
  8384. }
  8385. Zero(t, sizeof(RPC_ENUM_ETHERIP_ID));
  8386. t->NumItem = PackGetInt(p, "NumItem");
  8387. t->IdList = ZeroMalloc(sizeof(ETHERIP_ID) * t->NumItem);
  8388. for (i = 0;i < t->NumItem;i++)
  8389. {
  8390. ETHERIP_ID *e = &t->IdList[i];
  8391. PackGetStrEx(p, "Id", e->Id, sizeof(e->Id), i);
  8392. PackGetStrEx(p, "HubName", e->HubName, sizeof(e->HubName), i);
  8393. PackGetStrEx(p, "UserName", e->UserName, sizeof(e->UserName), i);
  8394. PackGetStrEx(p, "Password", e->Password, sizeof(e->Password), i);
  8395. }
  8396. }
  8397. void OutRpcEnumEtherIpId(PACK *p, RPC_ENUM_ETHERIP_ID *t)
  8398. {
  8399. UINT i;
  8400. // Validate arguments
  8401. if (p == NULL || t == NULL)
  8402. {
  8403. return;
  8404. }
  8405. PackAddInt(p, "NumItem", t->NumItem);
  8406. PackSetCurrentJsonGroupName(p, "Settings");
  8407. for (i = 0;i < t->NumItem;i++)
  8408. {
  8409. ETHERIP_ID *e = &t->IdList[i];
  8410. PackAddStrEx(p, "Id", e->Id, i, t->NumItem);
  8411. PackAddStrEx(p, "HubName", e->HubName, i, t->NumItem);
  8412. PackAddStrEx(p, "UserName", e->UserName, i, t->NumItem);
  8413. PackAddStrEx(p, "Password", e->Password, i, t->NumItem);
  8414. }
  8415. PackSetCurrentJsonGroupName(p, NULL);
  8416. }
  8417. void FreeRpcEnumEtherIpId(RPC_ENUM_ETHERIP_ID *t)
  8418. {
  8419. // Validate arguments
  8420. if (t == NULL)
  8421. {
  8422. return;
  8423. }
  8424. Free(t->IdList);
  8425. }
  8426. // IPSEC_SERVICES
  8427. void InIPsecServices(IPSEC_SERVICES *t, PACK *p)
  8428. {
  8429. // Validate arguments
  8430. if (t == NULL || p == NULL)
  8431. {
  8432. return;
  8433. }
  8434. Zero(t, sizeof(IPSEC_SERVICES));
  8435. t->L2TP_Raw = PackGetBool(p, "L2TP_Raw");
  8436. t->L2TP_IPsec = PackGetBool(p, "L2TP_IPsec");
  8437. t->EtherIP_IPsec = PackGetBool(p, "EtherIP_IPsec");
  8438. PackGetStr(p, "IPsec_Secret", t->IPsec_Secret, sizeof(t->IPsec_Secret));
  8439. PackGetStr(p, "L2TP_DefaultHub", t->L2TP_DefaultHub, sizeof(t->L2TP_DefaultHub));
  8440. }
  8441. void OutIPsecServices(PACK *p, IPSEC_SERVICES *t)
  8442. {
  8443. // Validate arguments
  8444. if (t == NULL || p == NULL)
  8445. {
  8446. return;
  8447. }
  8448. PackAddBool(p, "L2TP_Raw", t->L2TP_Raw);
  8449. PackAddBool(p, "L2TP_IPsec", t->L2TP_IPsec);
  8450. PackAddBool(p, "EtherIP_IPsec", t->EtherIP_IPsec);
  8451. PackAddStr(p, "IPsec_Secret", t->IPsec_Secret);
  8452. PackAddStr(p, "L2TP_DefaultHub", t->L2TP_DefaultHub);
  8453. }
  8454. // RPC_WINVER
  8455. void InRpcWinVer(RPC_WINVER *t, PACK *p)
  8456. {
  8457. // Validate arguments
  8458. if (t == NULL || p == NULL)
  8459. {
  8460. return;
  8461. }
  8462. Zero(t, sizeof(RPC_WINVER));
  8463. t->IsWindows = PackGetBool(p, "V_IsWindows");
  8464. t->IsNT = PackGetBool(p, "V_IsNT");
  8465. t->IsServer = PackGetBool(p, "V_IsServer");
  8466. t->IsBeta = PackGetBool(p, "V_IsBeta");
  8467. t->VerMajor = PackGetInt(p, "V_VerMajor");
  8468. t->VerMinor = PackGetInt(p, "V_VerMinor");
  8469. t->Build = PackGetInt(p, "V_Build");
  8470. t->ServicePack = PackGetInt(p, "V_ServicePack");
  8471. PackGetStr(p, "V_Title", t->Title, sizeof(t->Title));
  8472. }
  8473. void OutRpcWinVer(PACK *p, RPC_WINVER *t)
  8474. {
  8475. // Validate arguments
  8476. if (t == NULL || p == NULL)
  8477. {
  8478. return;
  8479. }
  8480. PackAddBool(p, "V_IsWindows", t->IsWindows);
  8481. PackAddBool(p, "V_IsNT", t->IsNT);
  8482. PackAddBool(p, "V_IsServer", t->IsServer);
  8483. PackAddBool(p, "V_IsBeta", t->IsBeta);
  8484. PackAddInt(p, "V_VerMajor", t->VerMajor);
  8485. PackAddInt(p, "V_VerMinor", t->VerMinor);
  8486. PackAddInt(p, "V_Build", t->Build);
  8487. PackAddInt(p, "V_ServicePack", t->ServicePack);
  8488. PackAddStr(p, "V_Title", t->Title);
  8489. }
  8490. // RPC_MSG
  8491. void InRpcMsg(RPC_MSG *t, PACK *p)
  8492. {
  8493. UINT size;
  8494. char *utf8;
  8495. // Validate arguments
  8496. if (t == NULL || p == NULL)
  8497. {
  8498. return;
  8499. }
  8500. Zero(t, sizeof(RPC_MSG));
  8501. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  8502. size = PackGetDataSize(p, "Msg");
  8503. utf8 = ZeroMalloc(size + 8);
  8504. PackGetData(p, "Msg", utf8);
  8505. t->Msg = CopyUtfToUni(utf8);
  8506. Free(utf8);
  8507. }
  8508. void OutRpcMsg(PACK *p, RPC_MSG *t)
  8509. {
  8510. UINT size;
  8511. char *utf8;
  8512. // Validate arguments
  8513. if (t == NULL || p == NULL)
  8514. {
  8515. return;
  8516. }
  8517. PackAddStr(p, "HubName", t->HubName);
  8518. utf8 = CopyUniToUtf(t->Msg);
  8519. size = StrLen(utf8);
  8520. PackAddData(p, "Msg", utf8, size);
  8521. Free(utf8);
  8522. }
  8523. void FreeRpcMsg(RPC_MSG *t)
  8524. {
  8525. // Validate arguments
  8526. if (t == NULL)
  8527. {
  8528. return;
  8529. }
  8530. Free(t->Msg);
  8531. }
  8532. // RPC_ENUM_ETH_VLAN
  8533. void InRpcEnumEthVLan(RPC_ENUM_ETH_VLAN *t, PACK *p)
  8534. {
  8535. UINT i;
  8536. // Validate arguments
  8537. if (t == NULL || p == NULL)
  8538. {
  8539. return;
  8540. }
  8541. Zero(t, sizeof(RPC_ENUM_ETH_VLAN));
  8542. t->NumItem = PackGetIndexCount(p, "DeviceName");
  8543. t->Items = ZeroMalloc(sizeof(RPC_ENUM_ETH_VLAN_ITEM) * t->NumItem);
  8544. for (i = 0;i < t->NumItem;i++)
  8545. {
  8546. RPC_ENUM_ETH_VLAN_ITEM *e = &t->Items[i];
  8547. PackGetStrEx(p, "DeviceName", e->DeviceName, sizeof(e->DeviceName), i);
  8548. PackGetStrEx(p, "Guid", e->Guid, sizeof(e->Guid), i);
  8549. PackGetStrEx(p, "DeviceInstanceId", e->DeviceInstanceId, sizeof(e->DeviceInstanceId), i);
  8550. PackGetStrEx(p, "DriverName", e->DriverName, sizeof(e->DriverName), i);
  8551. PackGetStrEx(p, "DriverType", e->DriverType, sizeof(e->DriverType), i);
  8552. e->Support = PackGetBoolEx(p, "Support", i);
  8553. e->Enabled = PackGetBoolEx(p, "Enabled", i);
  8554. }
  8555. }
  8556. void OutRpcEnumEthVLan(PACK *p, RPC_ENUM_ETH_VLAN *t)
  8557. {
  8558. UINT i;
  8559. // Validate arguments
  8560. if (t == NULL || p == NULL)
  8561. {
  8562. return;
  8563. }
  8564. PackSetCurrentJsonGroupName(p, "Devices");
  8565. for (i = 0;i < t->NumItem;i++)
  8566. {
  8567. RPC_ENUM_ETH_VLAN_ITEM *e = &t->Items[i];
  8568. PackAddStrEx(p, "DeviceName", e->DeviceName, i, t->NumItem);
  8569. PackAddStrEx(p, "Guid", e->Guid, i, t->NumItem);
  8570. PackAddStrEx(p, "DeviceInstanceId", e->DeviceInstanceId, i, t->NumItem);
  8571. PackAddStrEx(p, "DriverName", e->DriverName, i, t->NumItem);
  8572. PackAddStrEx(p, "DriverType", e->DriverType, i, t->NumItem);
  8573. PackAddBoolEx(p, "Support", e->Support, i, t->NumItem);
  8574. PackAddBoolEx(p, "Enabled", e->Enabled, i, t->NumItem);
  8575. }
  8576. PackSetCurrentJsonGroupName(p, NULL);
  8577. }
  8578. void FreeRpcEnumEthVLan(RPC_ENUM_ETH_VLAN *t)
  8579. {
  8580. // Validate arguments
  8581. if (t == NULL)
  8582. {
  8583. return;
  8584. }
  8585. Free(t->Items);
  8586. }
  8587. // RPC_ENUM_LOG_FILE
  8588. void InRpcEnumLogFile(RPC_ENUM_LOG_FILE *t, PACK *p)
  8589. {
  8590. UINT i;
  8591. // Validate arguments
  8592. if (t == NULL || p == NULL)
  8593. {
  8594. return;
  8595. }
  8596. Zero(t, sizeof(RPC_ENUM_LOG_FILE));
  8597. t->NumItem = PackGetInt(p, "NumItem");
  8598. t->Items = ZeroMalloc(sizeof(RPC_ENUM_LOG_FILE_ITEM) * t->NumItem);
  8599. for (i = 0;i < t->NumItem;i++)
  8600. {
  8601. RPC_ENUM_LOG_FILE_ITEM *e = &t->Items[i];
  8602. PackGetStrEx(p, "FilePath", e->FilePath, sizeof(e->FilePath), i);
  8603. PackGetStrEx(p, "ServerName", e->ServerName, sizeof(e->ServerName), i);
  8604. e->FileSize = PackGetIntEx(p, "FileSize", i);
  8605. e->UpdatedTime = PackGetInt64Ex(p, "UpdatedTime", i);
  8606. }
  8607. }
  8608. void OutRpcEnumLogFile(PACK *p, RPC_ENUM_LOG_FILE *t)
  8609. {
  8610. UINT i;
  8611. // Validate arguments
  8612. if (t == NULL || p == NULL)
  8613. {
  8614. return;
  8615. }
  8616. PackAddInt(p, "NumItem", t->NumItem);
  8617. PackSetCurrentJsonGroupName(p, "LogFiles");
  8618. for (i = 0;i < t->NumItem;i++)
  8619. {
  8620. RPC_ENUM_LOG_FILE_ITEM *e = &t->Items[i];
  8621. PackAddStrEx(p, "FilePath", e->FilePath, i, t->NumItem);
  8622. PackAddStrEx(p, "ServerName", e->ServerName, i, t->NumItem);
  8623. PackAddIntEx(p, "FileSize", e->FileSize, i, t->NumItem);
  8624. PackAddTime64Ex(p, "UpdatedTime", e->UpdatedTime, i, t->NumItem);
  8625. }
  8626. PackSetCurrentJsonGroupName(p, NULL);
  8627. }
  8628. void FreeRpcEnumLogFile(RPC_ENUM_LOG_FILE *t)
  8629. {
  8630. // Validate arguments
  8631. if (t == NULL)
  8632. {
  8633. return;
  8634. }
  8635. Free(t->Items);
  8636. }
  8637. void AdjoinRpcEnumLogFile(RPC_ENUM_LOG_FILE *t, RPC_ENUM_LOG_FILE *src)
  8638. {
  8639. LIST *o;
  8640. UINT i;
  8641. // Validate arguments
  8642. if (t == NULL || src == NULL)
  8643. {
  8644. return;
  8645. }
  8646. o = NewListFast(CmpLogFile);
  8647. for (i = 0;i < t->NumItem;i++)
  8648. {
  8649. RPC_ENUM_LOG_FILE_ITEM *e = &t->Items[i];
  8650. LOG_FILE *f = ZeroMalloc(sizeof(LOG_FILE));
  8651. f->FileSize = e->FileSize;
  8652. StrCpy(f->Path, sizeof(f->Path), e->FilePath);
  8653. StrCpy(f->ServerName, sizeof(f->ServerName), e->ServerName);
  8654. f->UpdatedTime = e->UpdatedTime;
  8655. Add(o, f);
  8656. }
  8657. for (i = 0;i < src->NumItem;i++)
  8658. {
  8659. RPC_ENUM_LOG_FILE_ITEM *e = &src->Items[i];
  8660. LOG_FILE *f = ZeroMalloc(sizeof(LOG_FILE));
  8661. f->FileSize = e->FileSize;
  8662. StrCpy(f->Path, sizeof(f->Path), e->FilePath);
  8663. StrCpy(f->ServerName, sizeof(f->ServerName), e->ServerName);
  8664. f->UpdatedTime = e->UpdatedTime;
  8665. Add(o, f);
  8666. }
  8667. FreeRpcEnumLogFile(t);
  8668. Sort(o);
  8669. Zero(t, sizeof(RPC_ENUM_LOG_FILE));
  8670. t->NumItem = LIST_NUM(o);
  8671. t->Items = ZeroMalloc(sizeof(RPC_ENUM_LOG_FILE_ITEM) * t->NumItem);
  8672. for (i = 0;i < t->NumItem;i++)
  8673. {
  8674. LOG_FILE *f = LIST_DATA(o, i);
  8675. RPC_ENUM_LOG_FILE_ITEM *e = &t->Items[i];
  8676. StrCpy(e->FilePath, sizeof(e->FilePath), f->Path);
  8677. StrCpy(e->ServerName, sizeof(e->ServerName), f->ServerName);
  8678. e->FileSize = f->FileSize;
  8679. e->UpdatedTime = f->UpdatedTime;
  8680. }
  8681. FreeEnumLogFile(o);
  8682. }
  8683. // RPC_READ_LOG_FILE
  8684. void InRpcReadLogFile(RPC_READ_LOG_FILE *t, PACK *p)
  8685. {
  8686. // Validate arguments
  8687. if (t == NULL || p == NULL)
  8688. {
  8689. return;
  8690. }
  8691. Zero(t, sizeof(RPC_READ_LOG_FILE));
  8692. PackGetStr(p, "FilePath", t->FilePath, sizeof(t->FilePath));
  8693. PackGetStr(p, "ServerName", t->ServerName, sizeof(t->ServerName));
  8694. t->Offset = PackGetInt(p, "Offset");
  8695. t->Buffer = PackGetBuf(p, "Buffer");
  8696. }
  8697. void OutRpcReadLogFile(PACK *p, RPC_READ_LOG_FILE *t)
  8698. {
  8699. // Validate arguments
  8700. if (p == NULL || t == NULL)
  8701. {
  8702. return;
  8703. }
  8704. PackAddStr(p, "FilePath", t->FilePath);
  8705. PackAddStr(p, "ServerName", t->ServerName);
  8706. PackAddInt(p, "Offset", t->Offset);
  8707. if (t->Buffer != NULL)
  8708. {
  8709. PackAddBuf(p, "Buffer", t->Buffer);
  8710. }
  8711. }
  8712. void FreeRpcReadLogFile(RPC_READ_LOG_FILE *t)
  8713. {
  8714. // Validate arguments
  8715. if (t == NULL)
  8716. {
  8717. return;
  8718. }
  8719. if (t->Buffer != NULL)
  8720. {
  8721. FreeBuf(t->Buffer);
  8722. }
  8723. }
  8724. // RPC_AC_LIST
  8725. void InRpcAcList(RPC_AC_LIST *t, PACK *p)
  8726. {
  8727. UINT i;
  8728. LIST *o;
  8729. UINT num;
  8730. // Validate arguments
  8731. if (t == NULL || p == NULL)
  8732. {
  8733. return;
  8734. }
  8735. Zero(t, sizeof(RPC_AC_LIST));
  8736. o = NewAcList();
  8737. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  8738. num = PackGetIndexCount(p, "IpAddress");
  8739. for (i = 0;i < num;i++)
  8740. {
  8741. AC *ac = ZeroMalloc(sizeof(AC));
  8742. ac->Id = PackGetIntEx(p, "Id", i);
  8743. ac->Deny = PackGetBoolEx(p, "Deny", i);
  8744. PackGetIpEx(p, "IpAddress", &ac->IpAddress, i);
  8745. ac->Masked = PackGetBoolEx(p, "Masked", i);
  8746. if (ac->Masked)
  8747. {
  8748. PackGetIpEx(p, "SubnetMask", &ac->SubnetMask, i);
  8749. }
  8750. ac->Priority = PackGetIntEx(p, "Priority", i);
  8751. AddAc(o, ac);
  8752. Free(ac);
  8753. }
  8754. t->o = o;
  8755. }
  8756. void OutRpcAcList(PACK *p, RPC_AC_LIST *t)
  8757. {
  8758. UINT i, num;
  8759. LIST *o;
  8760. // Validate arguments
  8761. if (t == NULL || p == NULL)
  8762. {
  8763. return;
  8764. }
  8765. o = t->o;
  8766. num = LIST_NUM(o);
  8767. PackAddInt(p, "NumItem", num);
  8768. PackAddStr(p, "HubName", t->HubName);
  8769. PackSetCurrentJsonGroupName(p, "ACList");
  8770. for (i = 0;i < num;i++)
  8771. {
  8772. AC *ac = LIST_DATA(o, i);
  8773. PackAddIntEx(p, "Id", ac->Id, i, num);
  8774. PackAddBoolEx(p, "Deny", ac->Deny, i, num);
  8775. PackAddIpEx(p, "IpAddress", &ac->IpAddress, i, num);
  8776. PackAddBoolEx(p, "Masked", ac->Masked, i, num);
  8777. PackAddIpEx(p, "SubnetMask", &ac->SubnetMask, i, num);
  8778. PackAddIntEx(p, "Priority", ac->Priority, i, num);
  8779. }
  8780. PackSetCurrentJsonGroupName(p, NULL);
  8781. }
  8782. void FreeRpcAcList(RPC_AC_LIST *t)
  8783. {
  8784. // Validate arguments
  8785. if (t == NULL)
  8786. {
  8787. return;
  8788. }
  8789. FreeAcList(t->o);
  8790. }
  8791. // RPC_INT
  8792. void InRpcInt(RPC_INT *t, PACK *p)
  8793. {
  8794. // Validate arguments
  8795. if (t == NULL || p == NULL)
  8796. {
  8797. return;
  8798. }
  8799. Zero(t, sizeof(RPC_INT));
  8800. t->IntValue = PackGetInt(p, "IntValue");
  8801. }
  8802. void OutRpcInt(PACK *p, RPC_INT *t)
  8803. {
  8804. // Validate arguments
  8805. if (t == NULL || p == NULL)
  8806. {
  8807. return;
  8808. }
  8809. PackAddInt(p, "IntValue", t->IntValue);
  8810. }
  8811. // RPC_ENUM_CRL
  8812. void InRpcEnumCrl(RPC_ENUM_CRL *t, PACK *p)
  8813. {
  8814. UINT i;
  8815. // Validate arguments
  8816. if (t == NULL || p == NULL)
  8817. {
  8818. return;
  8819. }
  8820. Zero(t, sizeof(RPC_ENUM_CRL));
  8821. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  8822. t->NumItem = PackGetInt(p, "NumItem");
  8823. t->Items = ZeroMalloc(sizeof(RPC_ENUM_CRL_ITEM) * t->NumItem);
  8824. for (i = 0;i < t->NumItem;i++)
  8825. {
  8826. RPC_ENUM_CRL_ITEM *e = &t->Items[i];
  8827. e->Key = PackGetIntEx(p, "Key", i);
  8828. PackGetUniStrEx(p, "CrlInfo", e->CrlInfo, sizeof(e->CrlInfo), i);
  8829. }
  8830. }
  8831. void OutRpcEnumCrl(PACK *p, RPC_ENUM_CRL *t)
  8832. {
  8833. UINT i;
  8834. // Validate arguments
  8835. if (t == NULL || p == NULL)
  8836. {
  8837. return;
  8838. }
  8839. PackAddStr(p, "HubName", t->HubName);
  8840. PackAddInt(p, "NumItem", t->NumItem);
  8841. PackSetCurrentJsonGroupName(p, "CRLList");
  8842. for (i = 0;i < t->NumItem;i++)
  8843. {
  8844. RPC_ENUM_CRL_ITEM *e = &t->Items[i];
  8845. PackAddIntEx(p, "Key", e->Key, i, t->NumItem);
  8846. PackAddUniStrEx(p, "CrlInfo", e->CrlInfo, i, t->NumItem);
  8847. }
  8848. PackSetCurrentJsonGroupName(p, NULL);
  8849. }
  8850. void FreeRpcEnumCrl(RPC_ENUM_CRL *t)
  8851. {
  8852. // Validate arguments
  8853. if (t == NULL)
  8854. {
  8855. return;
  8856. }
  8857. Free(t->Items);
  8858. }
  8859. // RPC_CRL
  8860. void InRpcCrl(RPC_CRL *t, PACK *p)
  8861. {
  8862. BUF *b;
  8863. NAME *n;
  8864. wchar_t tmp[MAX_SIZE];
  8865. // Validate arguments
  8866. if (t == NULL || p == NULL)
  8867. {
  8868. return;
  8869. }
  8870. Zero(t, sizeof(RPC_CRL));
  8871. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  8872. t->Key = PackGetInt(p, "Key");
  8873. b = PackGetBuf(p, "Serial");
  8874. t->Crl = ZeroMalloc(sizeof(CRL));
  8875. if (b != NULL)
  8876. {
  8877. t->Crl->Serial = NewXSerial(b->Buf, b->Size);
  8878. FreeBuf(b);
  8879. }
  8880. t->Crl->Name = ZeroMalloc(sizeof(NAME));
  8881. n = t->Crl->Name;
  8882. if (PackGetUniStr(p, "CommonName", tmp, sizeof(tmp)))
  8883. {
  8884. n->CommonName = CopyUniStr(tmp);
  8885. }
  8886. if (PackGetUniStr(p, "Organization", tmp, sizeof(tmp)))
  8887. {
  8888. n->Organization = CopyUniStr(tmp);
  8889. }
  8890. if (PackGetUniStr(p, "Unit", tmp, sizeof(tmp)))
  8891. {
  8892. n->Unit = CopyUniStr(tmp);
  8893. }
  8894. if (PackGetUniStr(p, "Country", tmp, sizeof(tmp)))
  8895. {
  8896. n->Country = CopyUniStr(tmp);
  8897. }
  8898. if (PackGetUniStr(p, "State", tmp, sizeof(tmp)))
  8899. {
  8900. n->State = CopyUniStr(tmp);
  8901. }
  8902. if (PackGetUniStr(p, "Local", tmp, sizeof(tmp)))
  8903. {
  8904. n->Local = CopyUniStr(tmp);
  8905. }
  8906. if (PackGetDataSize(p, "DigestMD5") == MD5_SIZE)
  8907. {
  8908. PackGetData(p, "DigestMD5", t->Crl->DigestMD5);
  8909. }
  8910. if (PackGetDataSize(p, "DigestSHA1") == SHA1_SIZE)
  8911. {
  8912. PackGetData(p, "DigestSHA1", t->Crl->DigestSHA1);
  8913. }
  8914. }
  8915. void OutRpcCrl(PACK *p, RPC_CRL *t)
  8916. {
  8917. NAME *n;
  8918. // Validate arguments
  8919. if (p == NULL || t == NULL)
  8920. {
  8921. return;
  8922. }
  8923. PackAddStr(p, "HubName", t->HubName);
  8924. PackAddInt(p, "Key", t->Key);
  8925. if (t->Crl == NULL)
  8926. {
  8927. return;
  8928. }
  8929. if (t->Crl->Serial != NULL)
  8930. {
  8931. PackAddData(p, "Serial", t->Crl->Serial->data, t->Crl->Serial->size);
  8932. }
  8933. n = t->Crl->Name;
  8934. if (n->CommonName != NULL)
  8935. {
  8936. PackAddUniStr(p, "CommonName", n->CommonName);
  8937. }
  8938. if (n->Organization != NULL)
  8939. {
  8940. PackAddUniStr(p, "Organization", n->Organization);
  8941. }
  8942. if (n->Unit != NULL)
  8943. {
  8944. PackAddUniStr(p, "Unit", n->Unit);
  8945. }
  8946. if (n->Country != NULL)
  8947. {
  8948. PackAddUniStr(p, "Country", n->Country);
  8949. }
  8950. if (n->State != NULL)
  8951. {
  8952. PackAddUniStr(p, "State", n->State);
  8953. }
  8954. if (n->Local != NULL)
  8955. {
  8956. PackAddUniStr(p, "Local", n->Local);
  8957. }
  8958. if (IsZero(t->Crl->DigestMD5, MD5_SIZE) == false)
  8959. {
  8960. PackAddData(p, "DigestMD5", t->Crl->DigestMD5, MD5_SIZE);
  8961. }
  8962. if (IsZero(t->Crl->DigestSHA1, SHA1_SIZE) == false)
  8963. {
  8964. PackAddData(p, "DigestSHA1", t->Crl->DigestSHA1, SHA1_SIZE);
  8965. }
  8966. }
  8967. void FreeRpcCrl(RPC_CRL *t)
  8968. {
  8969. // Validate arguments
  8970. if (t == NULL)
  8971. {
  8972. return;
  8973. }
  8974. FreeCrl(t->Crl);
  8975. }
  8976. // RPC_ENUM_L3TABLE
  8977. void InRpcEnumL3Table(RPC_ENUM_L3TABLE *t, PACK *p)
  8978. {
  8979. UINT i;
  8980. // Validate arguments
  8981. if (t == NULL || p == NULL)
  8982. {
  8983. return;
  8984. }
  8985. Zero(t, sizeof(RPC_ENUM_L3TABLE));
  8986. t->NumItem = PackGetInt(p, "NumItem");
  8987. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  8988. t->Items = ZeroMalloc(sizeof(RPC_L3TABLE) * t->NumItem);
  8989. for (i = 0;i < t->NumItem;i++)
  8990. {
  8991. RPC_L3TABLE *e = &t->Items[i];
  8992. e->NetworkAddress = PackGetIp32Ex(p, "NetworkAddress", i);
  8993. e->SubnetMask = PackGetIp32Ex(p, "SubnetMask", i);
  8994. e->GatewayAddress = PackGetIp32Ex(p, "GatewayAddress", i);
  8995. e->Metric = PackGetIntEx(p, "Metric", i);
  8996. }
  8997. }
  8998. void OutRpcEnumL3Table(PACK *p, RPC_ENUM_L3TABLE *t)
  8999. {
  9000. UINT i;
  9001. // Validate arguments
  9002. if (p == NULL || t == NULL)
  9003. {
  9004. return;
  9005. }
  9006. PackAddInt(p, "NumItem", t->NumItem);
  9007. PackAddStr(p, "Name", t->Name);
  9008. PackSetCurrentJsonGroupName(p, "L3Table");
  9009. for (i = 0;i < t->NumItem;i++)
  9010. {
  9011. RPC_L3TABLE *e = &t->Items[i];
  9012. PackAddIp32Ex(p, "NetworkAddress", e->NetworkAddress, i, t->NumItem);
  9013. PackAddIp32Ex(p, "SubnetMask", e->SubnetMask, i, t->NumItem);
  9014. PackAddIp32Ex(p, "GatewayAddress", e->GatewayAddress, i, t->NumItem);
  9015. PackAddIntEx(p, "Metric", e->Metric, i, t->NumItem);
  9016. }
  9017. PackSetCurrentJsonGroupName(p, NULL);
  9018. }
  9019. void FreeRpcEnumL3Table(RPC_ENUM_L3TABLE *t)
  9020. {
  9021. Free(t->Items);
  9022. }
  9023. // RPC_L3TABLE
  9024. void InRpcL3Table(RPC_L3TABLE *t, PACK *p)
  9025. {
  9026. // Validate arguments
  9027. if (t == NULL || p == NULL)
  9028. {
  9029. return;
  9030. }
  9031. Zero(t, sizeof(RPC_L3TABLE));
  9032. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  9033. t->NetworkAddress = PackGetIp32(p, "NetworkAddress");
  9034. t->SubnetMask = PackGetIp32(p, "SubnetMask");
  9035. t->GatewayAddress = PackGetIp32(p, "GatewayAddress");
  9036. t->Metric = PackGetInt(p, "Metric");
  9037. }
  9038. void OutRpcL3Table(PACK *p, RPC_L3TABLE *t)
  9039. {
  9040. // Validate arguments
  9041. if (p == NULL || t == NULL)
  9042. {
  9043. return;
  9044. }
  9045. PackAddStr(p, "Name", t->Name);
  9046. PackAddIp32(p, "NetworkAddress", t->NetworkAddress);
  9047. PackAddIp32(p, "SubnetMask", t->SubnetMask);
  9048. PackAddIp32(p, "GatewayAddress", t->GatewayAddress);
  9049. PackAddInt(p, "Metric", t->Metric);
  9050. }
  9051. // RPC_ENUM_L3IF
  9052. void InRpcEnumL3If(RPC_ENUM_L3IF *t, PACK *p)
  9053. {
  9054. UINT i;
  9055. // Validate arguments
  9056. if (t == NULL || p == NULL)
  9057. {
  9058. return;
  9059. }
  9060. Zero(t, sizeof(RPC_ENUM_L3IF));
  9061. t->NumItem = PackGetInt(p, "NumItem");
  9062. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  9063. t->Items = ZeroMalloc(sizeof(RPC_L3IF) * t->NumItem);
  9064. for (i = 0;i < t->NumItem;i++)
  9065. {
  9066. RPC_L3IF *f = &t->Items[i];
  9067. PackGetStrEx(p, "HubName", f->HubName, sizeof(f->HubName), i);
  9068. f->IpAddress = PackGetIp32Ex(p, "IpAddress", i);
  9069. f->SubnetMask = PackGetIp32Ex(p, "SubnetMask", i);
  9070. }
  9071. }
  9072. void OutRpcEnumL3If(PACK *p, RPC_ENUM_L3IF *t)
  9073. {
  9074. UINT i;
  9075. // Validate arguments
  9076. if (p == NULL || t == NULL)
  9077. {
  9078. return;
  9079. }
  9080. PackAddInt(p, "NumItem", t->NumItem);
  9081. PackAddStr(p, "Name", t->Name);
  9082. PackSetCurrentJsonGroupName(p, "L3IFList");
  9083. for (i = 0;i < t->NumItem;i++)
  9084. {
  9085. RPC_L3IF *f = &t->Items[i];
  9086. PackAddStrEx(p, "HubName", f->HubName, i, t->NumItem);
  9087. PackAddIp32Ex(p, "IpAddress", f->IpAddress, i, t->NumItem);
  9088. PackAddIp32Ex(p, "SubnetMask", f->SubnetMask, i, t->NumItem);
  9089. }
  9090. PackSetCurrentJsonGroupName(p, NULL);
  9091. }
  9092. void FreeRpcEnumL3If(RPC_ENUM_L3IF *t)
  9093. {
  9094. // Validate arguments
  9095. if (t == NULL)
  9096. {
  9097. return;
  9098. }
  9099. Free(t->Items);
  9100. }
  9101. // RPC_L3IF
  9102. void InRpcL3If(RPC_L3IF *t, PACK *p)
  9103. {
  9104. // Validate arguments
  9105. if (t == NULL || p == NULL)
  9106. {
  9107. return;
  9108. }
  9109. Zero(t, sizeof(RPC_L3IF));
  9110. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  9111. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  9112. t->IpAddress = PackGetIp32(p, "IpAddress");
  9113. t->SubnetMask = PackGetIp32(p, "SubnetMask");
  9114. }
  9115. void OutRpcL3If(PACK *p, RPC_L3IF *t)
  9116. {
  9117. // Validate arguments
  9118. if (p == NULL || t == NULL)
  9119. {
  9120. return;
  9121. }
  9122. PackAddStr(p, "Name", t->Name);
  9123. PackAddStr(p, "HubName", t->HubName);
  9124. PackAddIp32(p, "IpAddress", t->IpAddress);
  9125. PackAddIp32(p, "SubnetMask", t->SubnetMask);
  9126. }
  9127. // RPC_L3SW
  9128. void InRpcL3Sw(RPC_L3SW *t, PACK *p)
  9129. {
  9130. // Validate arguments
  9131. if (t == NULL || p == NULL)
  9132. {
  9133. return;
  9134. }
  9135. Zero(t, sizeof(RPC_L3SW));
  9136. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  9137. }
  9138. void OutRpcL3Sw(PACK *p, RPC_L3SW *t)
  9139. {
  9140. // Validate arguments
  9141. if (p == NULL || t == NULL)
  9142. {
  9143. return;
  9144. }
  9145. PackAddStr(p, "Name", t->Name);
  9146. }
  9147. // RPC_ENUM_L3SW
  9148. void InRpcEnumL3Sw(RPC_ENUM_L3SW *t, PACK *p)
  9149. {
  9150. UINT i;
  9151. // Validate arguments
  9152. if (t == NULL || p == NULL)
  9153. {
  9154. return;
  9155. }
  9156. Zero(t, sizeof(RPC_ENUM_L3SW));
  9157. t->NumItem = PackGetInt(p, "NumItem");
  9158. t->Items = ZeroMalloc(sizeof(RPC_ENUM_L3SW_ITEM) * t->NumItem);
  9159. for (i = 0;i < t->NumItem;i++)
  9160. {
  9161. RPC_ENUM_L3SW_ITEM *s = &t->Items[i];
  9162. PackGetStrEx(p, "Name", s->Name, sizeof(s->Name), i);
  9163. s->NumInterfaces = PackGetIntEx(p, "NumInterfaces", i);
  9164. s->NumTables = PackGetIntEx(p, "NumTables", i);
  9165. s->Active = PackGetBoolEx(p, "Active", i);
  9166. s->Online = PackGetBoolEx(p, "Online", i);
  9167. }
  9168. }
  9169. void OutRpcEnumL3Sw(PACK *p, RPC_ENUM_L3SW *t)
  9170. {
  9171. UINT i;
  9172. // Validate arguments
  9173. if (p == NULL || t == NULL)
  9174. {
  9175. return;
  9176. }
  9177. PackAddInt(p, "NumItem", t->NumItem);
  9178. PackSetCurrentJsonGroupName(p, "L3SWList");
  9179. for (i = 0;i < t->NumItem;i++)
  9180. {
  9181. RPC_ENUM_L3SW_ITEM *s = &t->Items[i];
  9182. PackAddStrEx(p, "Name", s->Name, i, t->NumItem);
  9183. PackAddIntEx(p, "NumInterfaces", s->NumInterfaces, i, t->NumItem);
  9184. PackAddIntEx(p, "NumTables", s->NumTables, i, t->NumItem);
  9185. PackAddBoolEx(p, "Active", s->Active, i, t->NumItem);
  9186. PackAddBoolEx(p, "Online", s->Online, i, t->NumItem);
  9187. }
  9188. PackSetCurrentJsonGroupName(p, NULL);
  9189. }
  9190. void FreeRpcEnumL3Sw(RPC_ENUM_L3SW *t)
  9191. {
  9192. // Validate arguments
  9193. if (t == NULL)
  9194. {
  9195. return;
  9196. }
  9197. Free(t->Items);
  9198. }
  9199. // RPC_ENUM_ETH
  9200. void InRpcEnumEth(RPC_ENUM_ETH *t, PACK *p)
  9201. {
  9202. UINT i;
  9203. // Validate arguments
  9204. if (t == NULL || p == NULL)
  9205. {
  9206. return;
  9207. }
  9208. Zero(t, sizeof(RPC_ENUM_ETH));
  9209. t->NumItem = PackGetInt(p, "NumItem");
  9210. t->Items = ZeroMalloc(sizeof(RPC_ENUM_ETH_ITEM) * t->NumItem);
  9211. for (i = 0;i < t->NumItem;i++)
  9212. {
  9213. RPC_ENUM_ETH_ITEM *e = &t->Items[i];
  9214. PackGetStrEx(p, "DeviceName", e->DeviceName, sizeof(e->DeviceName), i);
  9215. PackGetUniStrEx(p, "NetworkConnectionName", e->NetworkConnectionName, sizeof(e->NetworkConnectionName), i);
  9216. }
  9217. }
  9218. void OutRpcEnumEth(PACK *p, RPC_ENUM_ETH *t)
  9219. {
  9220. UINT i;
  9221. // Validate arguments
  9222. if (p == NULL || t == NULL)
  9223. {
  9224. return;
  9225. }
  9226. PackAddInt(p, "NumItem", t->NumItem);
  9227. PackSetCurrentJsonGroupName(p, "EthList");
  9228. for (i = 0;i < t->NumItem;i++)
  9229. {
  9230. RPC_ENUM_ETH_ITEM *e = &t->Items[i];
  9231. PackAddStrEx(p, "DeviceName", e->DeviceName, i, t->NumItem);
  9232. PackAddUniStrEx(p, "NetworkConnectionName", e->NetworkConnectionName, i, t->NumItem);
  9233. }
  9234. PackSetCurrentJsonGroupName(p, NULL);
  9235. }
  9236. void FreeRpcEnumEth(RPC_ENUM_ETH *t)
  9237. {
  9238. // Validate arguments
  9239. if (t == NULL)
  9240. {
  9241. return;
  9242. }
  9243. Free(t->Items);
  9244. }
  9245. // RPC_LOCALBRIDGE
  9246. void InRpcLocalBridge(RPC_LOCALBRIDGE *t, PACK *p)
  9247. {
  9248. // Validate arguments
  9249. if (t == NULL || p == NULL)
  9250. {
  9251. return;
  9252. }
  9253. Zero(t, sizeof(RPC_LOCALBRIDGE));
  9254. PackGetStr(p, "DeviceName", t->DeviceName, sizeof(t->DeviceName));
  9255. PackGetStr(p, "HubNameLB", t->HubName, sizeof(t->HubName));
  9256. t->TapMode = PackGetBool(p, "TapMode");
  9257. }
  9258. void OutRpcLocalBridge(PACK *p, RPC_LOCALBRIDGE *t)
  9259. {
  9260. // Validate arguments
  9261. if (t == NULL || p == NULL)
  9262. {
  9263. return;
  9264. }
  9265. PackAddStr(p, "DeviceName", t->DeviceName);
  9266. PackAddStr(p, "HubNameLB", t->HubName);
  9267. PackAddBool(p, "TapMode", t->TapMode);
  9268. }
  9269. // RPC_ENUM_LOCALBRIDGE
  9270. void InRpcEnumLocalBridge(RPC_ENUM_LOCALBRIDGE *t, PACK *p)
  9271. {
  9272. UINT i;
  9273. // Validate arguments
  9274. if (t == NULL || p == NULL)
  9275. {
  9276. return;
  9277. }
  9278. Zero(t, sizeof(RPC_ENUM_LOCALBRIDGE));
  9279. t->NumItem = PackGetInt(p, "NumItem");
  9280. t->Items = ZeroMalloc(sizeof(RPC_LOCALBRIDGE) * t->NumItem);
  9281. for (i = 0;i < t->NumItem;i++)
  9282. {
  9283. RPC_LOCALBRIDGE *e = &t->Items[i];
  9284. PackGetStrEx(p, "DeviceName", e->DeviceName, sizeof(e->DeviceName), i);
  9285. PackGetStrEx(p, "HubNameLB", e->HubName, sizeof(e->HubName), i);
  9286. e->Online = PackGetBoolEx(p, "Online", i);
  9287. e->Active = PackGetBoolEx(p, "Active", i);
  9288. e->TapMode = PackGetBoolEx(p, "TapMode", i);
  9289. }
  9290. }
  9291. void OutRpcEnumLocalBridge(PACK *p, RPC_ENUM_LOCALBRIDGE *t)
  9292. {
  9293. UINT i;
  9294. // Validate arguments
  9295. if (t == NULL || p == NULL)
  9296. {
  9297. return;
  9298. }
  9299. PackAddInt(p, "NumItem", t->NumItem);
  9300. PackSetCurrentJsonGroupName(p, "LocalBridgeList");
  9301. for (i = 0;i < t->NumItem;i++)
  9302. {
  9303. RPC_LOCALBRIDGE *e = &t->Items[i];
  9304. PackAddStrEx(p, "DeviceName", e->DeviceName, i, t->NumItem);
  9305. PackAddStrEx(p, "HubNameLB", e->HubName, i, t->NumItem);
  9306. PackAddBoolEx(p, "Online", e->Online, i, t->NumItem);
  9307. PackAddBoolEx(p, "Active", e->Active, i, t->NumItem);
  9308. PackAddBoolEx(p, "TapMode", e->TapMode, i, t->NumItem);
  9309. }
  9310. PackSetCurrentJsonGroupName(p, NULL);
  9311. }
  9312. void FreeRpcEnumLocalBridge(RPC_ENUM_LOCALBRIDGE *t)
  9313. {
  9314. // Validate arguments
  9315. if (t == NULL)
  9316. {
  9317. return;
  9318. }
  9319. Free(t->Items);
  9320. }
  9321. // MEMINFO
  9322. void InRpcMemInfo(MEMINFO *t, PACK *p)
  9323. {
  9324. // Validate arguments
  9325. if (t == NULL || p == NULL)
  9326. {
  9327. return;
  9328. }
  9329. Zero(t, sizeof(MEMINFO));
  9330. t->TotalMemory = PackGetInt64(p, "TotalMemory");
  9331. t->UsedMemory = PackGetInt64(p, "UsedMemory");
  9332. t->FreeMemory = PackGetInt64(p, "FreeMemory");
  9333. t->TotalPhys = PackGetInt64(p, "TotalPhys");
  9334. t->UsedPhys = PackGetInt64(p, "UsedPhys");
  9335. t->FreePhys = PackGetInt64(p, "FreePhys");
  9336. }
  9337. void OutRpcMemInfo(PACK *p, MEMINFO *t)
  9338. {
  9339. // Validate arguments
  9340. if (t == NULL || p == NULL)
  9341. {
  9342. return;
  9343. }
  9344. PackAddInt64(p, "TotalMemory", t->TotalMemory);
  9345. PackAddInt64(p, "UsedMemory", t->UsedMemory);
  9346. PackAddInt64(p, "FreeMemory", t->FreeMemory);
  9347. PackAddInt64(p, "TotalPhys", t->TotalPhys);
  9348. PackAddInt64(p, "UsedPhys", t->UsedPhys);
  9349. PackAddInt64(p, "FreePhys", t->FreePhys);
  9350. }
  9351. // OS_INFO
  9352. void InRpcOsInfo(OS_INFO *t, PACK *p)
  9353. {
  9354. char tmp[MAX_SIZE];
  9355. // Validate arguments
  9356. if (t == NULL || p == NULL)
  9357. {
  9358. return;
  9359. }
  9360. Zero(t, sizeof(OS_INFO));
  9361. t->OsType = PackGetInt(p, "OsType");
  9362. t->OsServicePack = PackGetInt(p, "OsServicePack");
  9363. if (PackGetStr(p, "OsSystemName", tmp, sizeof(tmp)))
  9364. {
  9365. t->OsSystemName = CopyStr(tmp);
  9366. }
  9367. if (PackGetStr(p, "OsProductName", tmp, sizeof(tmp)))
  9368. {
  9369. t->OsProductName = CopyStr(tmp);
  9370. }
  9371. if (PackGetStr(p, "OsVendorName", tmp, sizeof(tmp)))
  9372. {
  9373. t->OsVendorName = CopyStr(tmp);
  9374. }
  9375. if (PackGetStr(p, "OsVersion", tmp, sizeof(tmp)))
  9376. {
  9377. t->OsVersion = CopyStr(tmp);
  9378. }
  9379. if (PackGetStr(p, "KernelName", tmp, sizeof(tmp)))
  9380. {
  9381. t->KernelName = CopyStr(tmp);
  9382. }
  9383. if (PackGetStr(p, "KernelVersion", tmp, sizeof(tmp)))
  9384. {
  9385. t->KernelVersion = CopyStr(tmp);
  9386. }
  9387. }
  9388. void OutRpcOsInfo(PACK *p, OS_INFO *t)
  9389. {
  9390. // Validate arguments
  9391. if (t == NULL || p == NULL)
  9392. {
  9393. return;
  9394. }
  9395. PackAddInt(p, "OsType", t->OsType);
  9396. PackAddInt(p, "OsServicePack", t->OsServicePack);
  9397. PackAddStr(p, "OsSystemName", t->OsSystemName);
  9398. PackAddStr(p, "OsProductName", t->OsProductName);
  9399. PackAddStr(p, "OsVendorName", t->OsVendorName);
  9400. PackAddStr(p, "OsVersion", t->OsVersion);
  9401. PackAddStr(p, "KernelName", t->KernelName);
  9402. PackAddStr(p, "KernelVersion", t->KernelVersion);
  9403. }
  9404. void FreeRpcOsInfo(OS_INFO *t)
  9405. {
  9406. // Validate arguments
  9407. if (t == NULL)
  9408. {
  9409. return;
  9410. }
  9411. Free(t->OsSystemName);
  9412. Free(t->OsProductName);
  9413. Free(t->OsVendorName);
  9414. Free(t->OsVersion);
  9415. Free(t->KernelName);
  9416. Free(t->KernelVersion);
  9417. }
  9418. // Read a local log file
  9419. void SiReadLocalLogFile(SERVER *s, char *filepath, UINT offset, RPC_READ_LOG_FILE *t)
  9420. {
  9421. char exe_dir[MAX_PATH], full_path[MAX_PATH];
  9422. IO *o;
  9423. // Validate arguments
  9424. if (s == NULL || t == NULL || filepath == NULL)
  9425. {
  9426. return;
  9427. }
  9428. Zero(t, sizeof(RPC_READ_LOG_FILE));
  9429. GetExeDir(exe_dir, sizeof(exe_dir));
  9430. Format(full_path, sizeof(full_path), "%s/%s", exe_dir, filepath);
  9431. // Read file
  9432. o = FileOpenEx(full_path, false, false);
  9433. if (o != NULL)
  9434. {
  9435. UINT filesize = FileSize(o);
  9436. if (offset < filesize)
  9437. {
  9438. UINT readsize = MIN(filesize - offset, FTP_BLOCK_SIZE);
  9439. void *buf = ZeroMalloc(readsize);
  9440. FileSeek(o, FILE_BEGIN, offset);
  9441. FileRead(o, buf, readsize);
  9442. t->Buffer = NewBuf();
  9443. WriteBuf(t->Buffer, buf, readsize);
  9444. Free(buf);
  9445. }
  9446. FileClose(o);
  9447. }
  9448. }
  9449. // Enumerate local log files
  9450. void SiEnumLocalLogFileList(SERVER *s, char *hubname, RPC_ENUM_LOG_FILE *t)
  9451. {
  9452. LIST *o;
  9453. UINT i;
  9454. // Validate arguments
  9455. if (s == NULL || t == NULL)
  9456. {
  9457. return;
  9458. }
  9459. Zero(t, sizeof(RPC_ENUM_LOG_FILE));
  9460. o = EnumLogFile(hubname);
  9461. t->NumItem = LIST_NUM(o);
  9462. t->Items = ZeroMalloc(sizeof(RPC_ENUM_LOG_FILE_ITEM) * t->NumItem);
  9463. for (i = 0;i < LIST_NUM(o);i++)
  9464. {
  9465. LOG_FILE *f = LIST_DATA(o, i);
  9466. RPC_ENUM_LOG_FILE_ITEM *e = &t->Items[i];
  9467. StrCpy(e->FilePath, sizeof(e->FilePath), f->Path);
  9468. StrCpy(e->ServerName, sizeof(e->ServerName), f->ServerName);
  9469. e->FileSize = f->FileSize;
  9470. e->UpdatedTime = f->UpdatedTime;
  9471. }
  9472. FreeEnumLogFile(o);
  9473. }
  9474. // Enumerate local sessions
  9475. void SiEnumLocalSession(SERVER *s, char *hubname, RPC_ENUM_SESSION *t)
  9476. {
  9477. HUB *h;
  9478. UINT64 now = Tick64();
  9479. UINT64 dormant_interval = 0;
  9480. // Validate arguments
  9481. if (s == NULL || hubname == NULL || t == NULL)
  9482. {
  9483. return;
  9484. }
  9485. LockHubList(s->Cedar);
  9486. h = GetHub(s->Cedar, hubname);
  9487. UnlockHubList(s->Cedar);
  9488. if (h == NULL)
  9489. {
  9490. t->NumSession = 0;
  9491. t->Sessions = ZeroMalloc(0);
  9492. return;
  9493. }
  9494. if (h->Option != NULL)
  9495. {
  9496. dormant_interval = h->Option->DetectDormantSessionInterval * (UINT64)1000;
  9497. }
  9498. LockList(h->SessionList);
  9499. {
  9500. UINT i;
  9501. t->NumSession = LIST_NUM(h->SessionList);
  9502. t->Sessions = ZeroMalloc(sizeof(RPC_ENUM_SESSION_ITEM) * t->NumSession);
  9503. for (i = 0;i < t->NumSession;i++)
  9504. {
  9505. SESSION *s = LIST_DATA(h->SessionList, i);
  9506. RPC_ENUM_SESSION_ITEM *e = &t->Sessions[i];
  9507. Lock(s->lock);
  9508. {
  9509. StrCpy(e->Name, sizeof(e->Name), s->Name);
  9510. StrCpy(e->Username, sizeof(e->Username), s->Username);
  9511. e->Ip = IPToUINT(&s->Connection->ClientIp);
  9512. CopyIP(&e->ClientIP, &s->Connection->ClientIp);
  9513. StrCpy(e->Hostname, sizeof(e->Hostname), s->Connection->ClientHostname);
  9514. e->MaxNumTcp = s->MaxConnection;
  9515. e->CreatedTime = Tick64ToTime64(s->CreatedTime);
  9516. e->LastCommTime = Tick64ToTime64(s->LastCommTime);
  9517. e->LinkMode = s->LinkModeServer;
  9518. e->SecureNATMode = s->SecureNATMode;
  9519. e->BridgeMode = s->BridgeMode;
  9520. e->Layer3Mode = s->L3SwitchMode;
  9521. e->VLanId = s->VLanId;
  9522. LockList(s->Connection->Tcp->TcpSockList);
  9523. {
  9524. e->CurrentNumTcp = s->Connection->Tcp->TcpSockList->num_item;
  9525. }
  9526. UnlockList(s->Connection->Tcp->TcpSockList);
  9527. Lock(s->TrafficLock);
  9528. {
  9529. e->PacketSize = GetTrafficPacketSize(s->Traffic);
  9530. e->PacketNum = GetTrafficPacketNum(s->Traffic);
  9531. }
  9532. Unlock(s->TrafficLock);
  9533. e->Client_BridgeMode = s->IsBridgeMode;
  9534. e->Client_MonitorMode = s->IsMonitorMode;
  9535. Copy(e->UniqueId, s->NodeInfo.UniqueId, 16);
  9536. if (s->NormalClient)
  9537. {
  9538. e->IsDormantEnabled = (dormant_interval == 0 ? false : true);
  9539. if (e->IsDormantEnabled)
  9540. {
  9541. if (s->LastCommTimeForDormant == 0)
  9542. {
  9543. e->LastCommDormant = (UINT64)0x7FFFFFFF;
  9544. }
  9545. else
  9546. {
  9547. e->LastCommDormant = now - s->LastCommTimeForDormant;
  9548. }
  9549. if (s->LastCommTimeForDormant == 0)
  9550. {
  9551. e->IsDormant = true;
  9552. }
  9553. else
  9554. {
  9555. if ((s->LastCommTimeForDormant + dormant_interval) < now)
  9556. {
  9557. e->IsDormant = true;
  9558. }
  9559. }
  9560. }
  9561. }
  9562. }
  9563. Unlock(s->lock);
  9564. GetMachineName(e->RemoteHostname, sizeof(e->RemoteHostname));
  9565. }
  9566. }
  9567. UnlockList(h->SessionList);
  9568. ReleaseHub(h);
  9569. }
  9570. // RPC_ENUM_LICENSE_KEY
  9571. void InRpcEnumLicenseKey(RPC_ENUM_LICENSE_KEY *t, PACK *p)
  9572. {
  9573. UINT i;
  9574. // Validate arguments
  9575. if (t == NULL || p == NULL)
  9576. {
  9577. return;
  9578. }
  9579. Zero(t, sizeof(RPC_ENUM_LICENSE_KEY));
  9580. t->NumItem = PackGetInt(p, "NumItem");
  9581. t->Items = ZeroMalloc(sizeof(RPC_ENUM_LICENSE_KEY_ITEM) * t->NumItem);
  9582. for (i = 0;i < t->NumItem;i++)
  9583. {
  9584. RPC_ENUM_LICENSE_KEY_ITEM *e = &t->Items[i];
  9585. e->Id = PackGetIntEx(p, "Id", i);
  9586. PackGetStrEx(p, "LicenseKey", e->LicenseKey, sizeof(e->LicenseKey), i);
  9587. PackGetStrEx(p, "LicenseId", e->LicenseId, sizeof(e->LicenseId), i);
  9588. PackGetStrEx(p, "LicenseName", e->LicenseName, sizeof(e->LicenseName), i);
  9589. e->Expires = PackGetInt64Ex(p, "Expires", i);
  9590. e->Status = PackGetIntEx(p, "Status", i);
  9591. e->ProductId = PackGetIntEx(p, "ProductId", i);
  9592. e->SystemId = PackGetInt64Ex(p, "SystemId", i);
  9593. e->SerialId = PackGetIntEx(p, "SerialId", i);
  9594. }
  9595. }
  9596. void OutRpcEnumLicenseKey(PACK *p, RPC_ENUM_LICENSE_KEY *t)
  9597. {
  9598. UINT i;
  9599. // Validate arguments
  9600. if (t == NULL || p == NULL)
  9601. {
  9602. return;
  9603. }
  9604. PackAddInt(p, "NumItem", t->NumItem);
  9605. PackSetCurrentJsonGroupName(p, "LicenseKeyList");
  9606. for (i = 0;i < t->NumItem;i++)
  9607. {
  9608. RPC_ENUM_LICENSE_KEY_ITEM *e = &t->Items[i];
  9609. PackAddIntEx(p, "Id", e->Id, i, t->NumItem);
  9610. PackAddStrEx(p, "LicenseKey", e->LicenseKey, i, t->NumItem);
  9611. PackAddStrEx(p, "LicenseId", e->LicenseId, i, t->NumItem);
  9612. PackAddStrEx(p, "LicenseName", e->LicenseName, i, t->NumItem);
  9613. PackAddTime64Ex(p, "Expires", e->Expires, i, t->NumItem);
  9614. PackAddIntEx(p, "Status", e->Status, i, t->NumItem);
  9615. PackAddIntEx(p, "ProductId", e->ProductId, i, t->NumItem);
  9616. PackAddInt64Ex(p, "SystemId", e->SystemId, i, t->NumItem);
  9617. PackAddIntEx(p, "SerialId", e->SerialId, i, t->NumItem);
  9618. }
  9619. PackSetCurrentJsonGroupName(p, NULL);
  9620. }
  9621. void FreeRpcEnumLicenseKey(RPC_ENUM_LICENSE_KEY *t)
  9622. {
  9623. // Validate arguments
  9624. if (t == NULL)
  9625. {
  9626. return;
  9627. }
  9628. Free(t->Items);
  9629. }
  9630. // RPC_LICENSE_STATUS
  9631. void InRpcLicenseStatus(RPC_LICENSE_STATUS *t, PACK *p)
  9632. {
  9633. // Validate arguments
  9634. if (t == NULL || p == NULL)
  9635. {
  9636. return;
  9637. }
  9638. Zero(t, sizeof(RPC_LICENSE_STATUS));
  9639. t->EditionId = PackGetInt(p, "EditionId");
  9640. PackGetStr(p, "EditionStr", t->EditionStr, sizeof(t->EditionStr) );
  9641. t->SystemId = PackGetInt64(p, "SystemId");
  9642. t->SystemExpires = PackGetInt64(p, "SystemExpires");
  9643. t->NumClientConnectLicense = PackGetInt(p, "NumClientConnectLicense");
  9644. t->NumBridgeConnectLicense = PackGetInt(p, "NumBridgeConnectLicense");
  9645. // v3.0
  9646. t->NeedSubscription = PackGetBool(p, "NeedSubscription");
  9647. t->AllowEnterpriseFunction = PackGetBool(p, "AllowEnterpriseFunction");
  9648. t->SubscriptionExpires = PackGetInt64(p, "SubscriptionExpires");
  9649. t->IsSubscriptionExpired = PackGetBool(p, "IsSubscriptionExpired");
  9650. t->NumUserCreationLicense = PackGetInt(p, "NumUserCreationLicense");
  9651. t->ReleaseDate = PackGetInt64(p, "ReleaseDate");
  9652. }
  9653. void OutRpcLicenseStatus(PACK *p, RPC_LICENSE_STATUS *t)
  9654. {
  9655. // Validate arguments
  9656. if (t == NULL || p == NULL)
  9657. {
  9658. return;
  9659. }
  9660. PackAddInt(p, "EditionId", t->EditionId);
  9661. PackAddStr(p, "EditionStr", t->EditionStr);
  9662. PackAddInt64(p, "SystemId", t->SystemId);
  9663. PackAddTime64(p, "SystemExpires", t->SystemExpires);
  9664. PackAddInt(p, "NumClientConnectLicense", t->NumClientConnectLicense);
  9665. PackAddInt(p, "NumBridgeConnectLicense", t->NumBridgeConnectLicense);
  9666. // v3.0
  9667. PackAddBool(p, "NeedSubscription", t->NeedSubscription);
  9668. PackAddBool(p, "AllowEnterpriseFunction", t->AllowEnterpriseFunction);
  9669. PackAddTime64(p, "SubscriptionExpires", t->SubscriptionExpires);
  9670. PackAddBool(p, "IsSubscriptionExpired", t->IsSubscriptionExpired);
  9671. PackAddInt(p, "NumUserCreationLicense", t->NumUserCreationLicense);
  9672. PackAddTime64(p, "ReleaseDate", t->ReleaseDate);
  9673. }
  9674. // RPC_ADMIN_OPTION
  9675. void InRpcAdminOption(RPC_ADMIN_OPTION *t, PACK *p)
  9676. {
  9677. UINT i;
  9678. // Validate arguments
  9679. if (t == NULL || p == NULL)
  9680. {
  9681. return;
  9682. }
  9683. Zero(t, sizeof(RPC_ADMIN_OPTION));
  9684. t->NumItem = PackGetIndexCount(p, "Name");
  9685. t->Items = ZeroMalloc(sizeof(ADMIN_OPTION) * t->NumItem);
  9686. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  9687. for (i = 0;i < t->NumItem;i++)
  9688. {
  9689. ADMIN_OPTION *o = &t->Items[i];
  9690. PackGetStrEx(p, "Name", o->Name, sizeof(o->Name), i);
  9691. o->Value = PackGetIntEx(p, "Value", i);
  9692. PackGetUniStrEx(p, "Descrption", o->Descrption, sizeof(o->Descrption), i);
  9693. }
  9694. }
  9695. void OutRpcAdminOption(PACK *p, RPC_ADMIN_OPTION *t)
  9696. {
  9697. UINT i;
  9698. // Validate arguments
  9699. if (t == NULL || p == NULL)
  9700. {
  9701. return;
  9702. }
  9703. PackAddInt(p, "NumItem", t->NumItem);
  9704. PackAddStr(p, "HubName", t->HubName);
  9705. PackSetCurrentJsonGroupName(p, "AdminOptionList");
  9706. for (i = 0;i < t->NumItem;i++)
  9707. {
  9708. ADMIN_OPTION *o = &t->Items[i];
  9709. PackAddStrEx(p, "Name", o->Name, i, t->NumItem);
  9710. PackAddIntEx(p, "Value", o->Value, i, t->NumItem);
  9711. PackAddUniStrEx(p, "Descrption", o->Descrption, i, t->NumItem);
  9712. }
  9713. PackSetCurrentJsonGroupName(p, NULL);
  9714. }
  9715. void FreeRpcAdminOption(RPC_ADMIN_OPTION *t)
  9716. {
  9717. // Validate arguments
  9718. if (t == NULL)
  9719. {
  9720. return;
  9721. }
  9722. Free(t->Items);
  9723. }
  9724. // RPC_CONFIG
  9725. void InRpcConfig(RPC_CONFIG *t, PACK *p)
  9726. {
  9727. UINT size;
  9728. // Validate arguments
  9729. if (t == NULL || p == NULL)
  9730. {
  9731. return;
  9732. }
  9733. Zero(t, sizeof(RPC_CONFIG));
  9734. PackGetStr(p, "FileName", t->FileName, sizeof(t->FileName));
  9735. size = PackGetDataSize(p, "FileData");
  9736. t->FileData = ZeroMalloc(size + 1);
  9737. PackGetData(p, "FileData", t->FileData);
  9738. }
  9739. void OutRpcConfig(PACK *p, RPC_CONFIG *t)
  9740. {
  9741. // Validate arguments
  9742. if (t == NULL || p == NULL)
  9743. {
  9744. return;
  9745. }
  9746. PackAddStr(p, "FileName", t->FileName);
  9747. PackAddData(p, "FileData", t->FileData, StrLen(t->FileData));
  9748. }
  9749. void FreeRpcConfig(RPC_CONFIG *t)
  9750. {
  9751. // Validate arguments
  9752. if (t == NULL)
  9753. {
  9754. return;
  9755. }
  9756. Free(t->FileData);
  9757. }
  9758. // RPC_BRIDGE_SUPPORT
  9759. void InRpcBridgeSupport(RPC_BRIDGE_SUPPORT *t, PACK *p)
  9760. {
  9761. // Validate arguments
  9762. if (t == NULL || p == NULL)
  9763. {
  9764. return;
  9765. }
  9766. Zero(t, sizeof(RPC_BRIDGE_SUPPORT));
  9767. t->IsBridgeSupportedOs = PackGetBool(p, "IsBridgeSupportedOs");
  9768. t->IsWinPcapNeeded = PackGetBool(p, "IsWinPcapNeeded");
  9769. }
  9770. void OutRpcBridgeSupport(PACK *p, RPC_BRIDGE_SUPPORT *t)
  9771. {
  9772. // Validate arguments
  9773. if (p == NULL || t == NULL)
  9774. {
  9775. return;
  9776. }
  9777. PackAddBool(p, "IsBridgeSupportedOs", t->IsBridgeSupportedOs);
  9778. PackAddBool(p, "IsWinPcapNeeded",t->IsWinPcapNeeded);
  9779. }
  9780. // RPC_ADD_ACCESS
  9781. void InRpcAddAccess(RPC_ADD_ACCESS *t, PACK *p)
  9782. {
  9783. // Validate arguments
  9784. if (t == NULL || p == NULL)
  9785. {
  9786. return;
  9787. }
  9788. Zero(t, sizeof(RPC_ADD_ACCESS));
  9789. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  9790. InRpcAccess(&t->Access, p);
  9791. }
  9792. void OutRpcAddAccess(PACK *p, RPC_ADD_ACCESS *t)
  9793. {
  9794. // Validate arguments
  9795. if (t == NULL || p == NULL)
  9796. {
  9797. return;
  9798. }
  9799. PackAddStr(p, "HubName", t->HubName);
  9800. OutRpcAccess(p, &t->Access);
  9801. }
  9802. // RPC_DELETE_ACCESS
  9803. void InRpcDeleteAccess(RPC_DELETE_ACCESS *t, PACK *p)
  9804. {
  9805. // Validate arguments
  9806. if (t == NULL || p == NULL)
  9807. {
  9808. return;
  9809. }
  9810. Zero(t, sizeof(RPC_DELETE_ACCESS));
  9811. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  9812. t->Id = PackGetInt(p, "Id");
  9813. }
  9814. void OutRpcDeleteAccess(PACK *p, RPC_DELETE_ACCESS *t)
  9815. {
  9816. // Validate arguments
  9817. if (t == NULL || p == NULL)
  9818. {
  9819. return;
  9820. }
  9821. PackAddStr(p, "HubName", t->HubName);
  9822. PackAddInt(p, "Id", t->Id);
  9823. }
  9824. // RPC_SERVER_INFO
  9825. void InRpcServerInfo(RPC_SERVER_INFO *t, PACK *p)
  9826. {
  9827. // Validate arguments
  9828. if (t == NULL || p == NULL)
  9829. {
  9830. return;
  9831. }
  9832. Zero(t, sizeof(RPC_SERVER_INFO));
  9833. PackGetStr(p, "ServerProductName", t->ServerProductName, sizeof(t->ServerProductName));
  9834. PackGetStr(p, "ServerVersionString", t->ServerVersionString, sizeof(t->ServerVersionString));
  9835. PackGetStr(p, "ServerBuildInfoString", t->ServerBuildInfoString, sizeof(t->ServerBuildInfoString));
  9836. t->ServerVerInt = PackGetInt(p, "ServerVerInt");
  9837. t->ServerBuildInt = PackGetInt(p, "ServerBuildInt");
  9838. PackGetStr(p, "ServerHostName", t->ServerHostName, sizeof(t->ServerHostName));
  9839. t->ServerType = PackGetInt(p, "ServerType");
  9840. t->ServerBuildDate = PackGetInt64(p, "ServerBuildDate");
  9841. PackGetStr(p, "ServerFamilyName", t->ServerFamilyName, sizeof(t->ServerFamilyName));
  9842. InRpcOsInfo(&t->OsInfo, p);
  9843. }
  9844. void OutRpcServerInfo(PACK *p, RPC_SERVER_INFO *t)
  9845. {
  9846. // Validate arguments
  9847. if (t == NULL || p == NULL)
  9848. {
  9849. return;
  9850. }
  9851. PackAddStr(p, "ServerProductName", t->ServerProductName);
  9852. PackAddStr(p, "ServerVersionString", t->ServerVersionString);
  9853. PackAddStr(p, "ServerBuildInfoString", t->ServerBuildInfoString);
  9854. PackAddInt(p, "ServerVerInt", t->ServerVerInt);
  9855. PackAddInt(p, "ServerBuildInt", t->ServerBuildInt);
  9856. PackAddStr(p, "ServerHostName", t->ServerHostName);
  9857. PackAddInt(p, "ServerType", t->ServerType);
  9858. PackAddTime64(p, "ServerBuildDate", t->ServerBuildDate);
  9859. PackAddStr(p, "ServerFamilyName", t->ServerFamilyName);
  9860. OutRpcOsInfo(p, &t->OsInfo);
  9861. }
  9862. void FreeRpcServerInfo(RPC_SERVER_INFO *t)
  9863. {
  9864. // Validate arguments
  9865. if (t == NULL)
  9866. {
  9867. return;
  9868. }
  9869. FreeRpcOsInfo(&t->OsInfo);
  9870. }
  9871. // RPC_SERVER_STATUS
  9872. void InRpcServerStatus(RPC_SERVER_STATUS *t, PACK *p)
  9873. {
  9874. // Validate arguments
  9875. if (t == NULL || p == NULL)
  9876. {
  9877. return;
  9878. }
  9879. Zero(t, sizeof(RPC_SERVER_STATUS));
  9880. t->ServerType = PackGetInt(p, "ServerType");
  9881. t->NumTcpConnections = PackGetInt(p, "NumTcpConnections");
  9882. t->NumTcpConnectionsLocal = PackGetInt(p, "NumTcpConnectionsLocal");
  9883. t->NumTcpConnectionsRemote = PackGetInt(p, "NumTcpConnectionsRemote");
  9884. t->NumHubTotal = PackGetInt(p, "NumHubTotal");
  9885. t->NumHubStandalone = PackGetInt(p, "NumHubStandalone");
  9886. t->NumHubStatic = PackGetInt(p, "NumHubStatic");
  9887. t->NumHubDynamic = PackGetInt(p, "NumHubDynamic");
  9888. t->NumSessionsTotal = PackGetInt(p, "NumSessionsTotal");
  9889. t->NumSessionsLocal = PackGetInt(p, "NumSessionsLocal");
  9890. t->NumSessionsRemote = PackGetInt(p, "NumSessionsRemote");
  9891. t->NumMacTables = PackGetInt(p, "NumMacTables");
  9892. t->NumIpTables = PackGetInt(p, "NumIpTables");
  9893. t->NumUsers = PackGetInt(p, "NumUsers");
  9894. t->NumGroups = PackGetInt(p, "NumGroups");
  9895. t->CurrentTime = PackGetInt64(p, "CurrentTime");
  9896. t->CurrentTick = PackGetInt64(p, "CurrentTick");
  9897. t->AssignedBridgeLicenses = PackGetInt(p, "AssignedBridgeLicenses");
  9898. t->AssignedClientLicenses = PackGetInt(p, "AssignedClientLicenses");
  9899. t->AssignedBridgeLicensesTotal = PackGetInt(p, "AssignedBridgeLicensesTotal");
  9900. t->AssignedClientLicensesTotal = PackGetInt(p, "AssignedClientLicensesTotal");
  9901. t->StartTime = PackGetInt64(p, "StartTime");
  9902. InRpcTraffic(&t->Traffic, p);
  9903. InRpcMemInfo(&t->MemInfo, p);
  9904. }
  9905. void OutRpcServerStatus(PACK *p, RPC_SERVER_STATUS *t)
  9906. {
  9907. // Validate arguments
  9908. if (t == NULL || p == NULL)
  9909. {
  9910. return;
  9911. }
  9912. PackAddInt(p, "ServerType", t->ServerType);
  9913. PackAddInt(p, "NumHubTotal", t->NumHubTotal);
  9914. PackAddInt(p, "NumHubStandalone", t->NumHubStandalone);
  9915. PackAddInt(p, "NumHubStatic", t->NumHubStatic);
  9916. PackAddInt(p, "NumHubDynamic", t->NumHubDynamic);
  9917. PackAddInt(p, "NumSessionsTotal", t->NumSessionsTotal);
  9918. PackAddInt(p, "NumSessionsLocal", t->NumSessionsLocal);
  9919. PackAddInt(p, "NumSessionsRemote", t->NumSessionsRemote);
  9920. PackAddInt(p, "NumTcpConnections", t->NumTcpConnections);
  9921. PackAddInt(p, "NumTcpConnectionsLocal", t->NumTcpConnectionsLocal);
  9922. PackAddInt(p, "NumTcpConnectionsRemote", t->NumTcpConnectionsRemote);
  9923. PackAddInt(p, "NumMacTables", t->NumMacTables);
  9924. PackAddInt(p, "NumIpTables", t->NumIpTables);
  9925. PackAddInt(p, "NumUsers", t->NumUsers);
  9926. PackAddInt(p, "NumGroups", t->NumGroups);
  9927. PackAddTime64(p, "CurrentTime", t->CurrentTime);
  9928. PackAddInt64(p, "CurrentTick", t->CurrentTick);
  9929. PackAddInt(p, "AssignedBridgeLicenses", t->AssignedBridgeLicenses);
  9930. PackAddInt(p, "AssignedClientLicenses", t->AssignedClientLicenses);
  9931. PackAddInt(p, "AssignedBridgeLicensesTotal", t->AssignedBridgeLicensesTotal);
  9932. PackAddInt(p, "AssignedClientLicensesTotal", t->AssignedClientLicensesTotal);
  9933. PackAddTime64(p, "StartTime", t->StartTime);
  9934. OutRpcTraffic(p, &t->Traffic);
  9935. OutRpcMemInfo(p, &t->MemInfo);
  9936. }
  9937. // RPC_LISTENER
  9938. void InRpcListener(RPC_LISTENER *t, PACK *p)
  9939. {
  9940. // Validate arguments
  9941. if (t == NULL || p == NULL)
  9942. {
  9943. return;
  9944. }
  9945. Zero(t, sizeof(RPC_LISTENER));
  9946. t->Port = PackGetInt(p, "Port");
  9947. t->Enable = PackGetBool(p, "Enable");
  9948. }
  9949. void OutRpcListener(PACK *p, RPC_LISTENER *t)
  9950. {
  9951. // Validate arguments
  9952. if (t == NULL || p == NULL)
  9953. {
  9954. return;
  9955. }
  9956. PackAddInt(p, "Port", t->Port);
  9957. PackAddBool(p, "Enable", t->Enable);
  9958. }
  9959. // RPC_LISTENER_LIST
  9960. void InRpcListenerList(RPC_LISTENER_LIST *t, PACK *p)
  9961. {
  9962. UINT i;
  9963. // Validate arguments
  9964. if (t == NULL || p == NULL)
  9965. {
  9966. return;
  9967. }
  9968. Zero(t, sizeof(RPC_LISTENER_LIST));
  9969. t->NumPort = PackGetIndexCount(p, "Ports");
  9970. t->Ports = ZeroMalloc(sizeof(UINT) * t->NumPort);
  9971. t->Enables = ZeroMalloc(sizeof(UINT) * t->NumPort);
  9972. t->Errors = ZeroMalloc(sizeof(UINT) * t->NumPort);
  9973. for (i = 0;i < t->NumPort;i++)
  9974. {
  9975. t->Ports[i] = PackGetIntEx(p, "Ports", i);
  9976. t->Enables[i] = PackGetBoolEx(p, "Enables", i);
  9977. t->Errors[i] = PackGetBoolEx(p, "Errors", i);
  9978. }
  9979. }
  9980. void OutRpcListenerList(PACK *p, RPC_LISTENER_LIST *t)
  9981. {
  9982. UINT i;
  9983. // Validate arguments
  9984. if (t == NULL || p == NULL)
  9985. {
  9986. return;
  9987. }
  9988. PackSetCurrentJsonGroupName(p, "ListenerList");
  9989. for (i = 0;i < t->NumPort;i++)
  9990. {
  9991. PackAddIntEx(p, "Ports", t->Ports[i], i, t->NumPort);
  9992. PackAddBoolEx(p, "Enables", t->Enables[i], i, t->NumPort);
  9993. PackAddBoolEx(p, "Errors", t->Errors[i], i, t->NumPort);
  9994. }
  9995. PackSetCurrentJsonGroupName(p, NULL);
  9996. }
  9997. void FreeRpcListenerList(RPC_LISTENER_LIST *t)
  9998. {
  9999. // Validate arguments
  10000. if (t == NULL)
  10001. {
  10002. return;
  10003. }
  10004. Free(t->Ports);
  10005. Free(t->Enables);
  10006. Free(t->Errors);
  10007. }
  10008. // RPC_STR
  10009. void InRpcStr(RPC_STR *t, PACK *p)
  10010. {
  10011. UINT size = 65536;
  10012. char *tmp = Malloc(size);
  10013. // Validate arguments
  10014. if (t == NULL || p == NULL)
  10015. {
  10016. return;
  10017. }
  10018. Zero(t, sizeof(RPC_STR));
  10019. if (PackGetStr(p, "String", tmp, size) == false)
  10020. {
  10021. t->String = CopyStr("");
  10022. }
  10023. else
  10024. {
  10025. t->String = CopyStr(tmp);
  10026. }
  10027. Free(tmp);
  10028. }
  10029. void OutRpcStr(PACK *p, RPC_STR *t)
  10030. {
  10031. // Validate arguments
  10032. if (t == NULL || p == NULL)
  10033. {
  10034. return;
  10035. }
  10036. PackAddStr(p, "String", t->String);
  10037. }
  10038. void FreeRpcStr(RPC_STR *t)
  10039. {
  10040. // Validate arguments
  10041. if (t == NULL )
  10042. {
  10043. return;
  10044. }
  10045. Free(t->String);
  10046. }
  10047. // RPC_SET_PASSWORD
  10048. void InRpcSetPassword(RPC_SET_PASSWORD *t, PACK *p)
  10049. {
  10050. // Validate arguments
  10051. if (t == NULL || p == NULL)
  10052. {
  10053. return;
  10054. }
  10055. Zero(t, sizeof(RPC_SET_PASSWORD));
  10056. PackGetData2(p, "HashedPassword", t->HashedPassword, sizeof(t->HashedPassword));
  10057. PackGetStr(p, "PlainTextPassword", t->PlainTextPassword, sizeof(t->PlainTextPassword));
  10058. }
  10059. void OutRpcSetPassword(PACK *p, RPC_SET_PASSWORD *t)
  10060. {
  10061. // Validate arguments
  10062. if (t == NULL || p == NULL)
  10063. {
  10064. return;
  10065. }
  10066. PackAddData(p, "HashedPassword", t->HashedPassword, sizeof(t->HashedPassword));
  10067. PackAddStr(p, "PlainTextPassword", t->PlainTextPassword);
  10068. }
  10069. // RPC_FARM
  10070. void InRpcFarm(RPC_FARM *t, PACK *p)
  10071. {
  10072. UINT i;
  10073. // Validate arguments
  10074. if (t == NULL || p == NULL)
  10075. {
  10076. return;
  10077. }
  10078. Zero(t, sizeof(RPC_FARM));
  10079. t->ServerType = PackGetInt(p, "ServerType");
  10080. t->NumPort = PackGetIndexCount(p, "Ports");
  10081. t->Ports = ZeroMalloc(sizeof(UINT) * t->NumPort);
  10082. for (i = 0;i < t->NumPort;i++)
  10083. {
  10084. t->Ports[i] = PackGetIntEx(p, "Ports", i);
  10085. }
  10086. t->PublicIp = PackGetIp32(p, "PublicIp");
  10087. PackGetStr(p, "ControllerName", t->ControllerName, sizeof(t->ControllerName));
  10088. t->ControllerPort = PackGetInt(p, "ControllerPort");
  10089. PackGetData2(p, "MemberPassword", t->MemberPassword, sizeof(t->MemberPassword));
  10090. PackGetStr(p, "MemberPasswordPlaintext", t->MemberPasswordPlaintext, sizeof(t->MemberPasswordPlaintext));
  10091. t->Weight = PackGetInt(p, "Weight");
  10092. t->ControllerOnly = PackGetBool(p, "ControllerOnly");
  10093. }
  10094. void OutRpcFarm(PACK *p, RPC_FARM *t)
  10095. {
  10096. UINT i;
  10097. // Validate arguments
  10098. if (t == NULL || p == NULL)
  10099. {
  10100. return;
  10101. }
  10102. PackAddInt(p, "ServerType", t->ServerType);
  10103. for (i = 0;i < t->NumPort;i++)
  10104. {
  10105. PackAddIntEx(p, "Ports", t->Ports[i], i, t->NumPort);
  10106. }
  10107. PackAddIp32(p, "PublicIp", t->PublicIp);
  10108. PackAddStr(p, "ControllerName", t->ControllerName);
  10109. PackAddInt(p, "ControllerPort", t->ControllerPort);
  10110. PackAddData(p, "MemberPassword", t->MemberPassword, sizeof(t->MemberPassword));
  10111. PackAddStr(p, "MemberPasswordPlaintext", t->MemberPasswordPlaintext);
  10112. PackAddInt(p, "Weight", t->Weight);
  10113. PackAddBool(p, "ControllerOnly", t->ControllerOnly);
  10114. }
  10115. void FreeRpcFarm(RPC_FARM *t)
  10116. {
  10117. // Validate arguments
  10118. if (t == NULL)
  10119. {
  10120. return;
  10121. }
  10122. Free(t->Ports);
  10123. }
  10124. // RPC_FARM_HUB
  10125. void InRpcFarmHub(RPC_FARM_HUB *t, PACK *p)
  10126. {
  10127. // Validate arguments
  10128. if (t == NULL || p == NULL)
  10129. {
  10130. return;
  10131. }
  10132. Zero(t, sizeof(RPC_FARM_HUB));
  10133. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10134. t->DynamicHub = PackGetBool(p, "DynamicHub");
  10135. }
  10136. void OutRpcFarmHub(PACK *p, RPC_FARM_HUB *t)
  10137. {
  10138. // Validate arguments
  10139. if (t == NULL || p == NULL)
  10140. {
  10141. return;
  10142. }
  10143. PackAddStr(p, "HubName", t->HubName);
  10144. PackAddBool(p, "DynamicHub", t->DynamicHub);
  10145. }
  10146. // RPC_FARM_INFO
  10147. void InRpcFarmInfo(RPC_FARM_INFO *t, PACK *p)
  10148. {
  10149. UINT i;
  10150. // Validate arguments
  10151. if (t == NULL)
  10152. {
  10153. return;
  10154. }
  10155. Zero(t, sizeof(RPC_FARM_INFO));
  10156. t->Id = PackGetInt(p, "Id");
  10157. t->Controller = PackGetBool(p, "Controller");
  10158. t->ConnectedTime = PackGetInt64(p, "ConnectedTime");
  10159. t->Ip = PackGetIp32(p, "Ip");
  10160. PackGetStr(p, "Hostname", t->Hostname, sizeof(t->Hostname));
  10161. t->Point = PackGetInt(p, "Point");
  10162. t->NumPort = PackGetIndexCount(p, "Ports");
  10163. t->Ports = ZeroMalloc(sizeof(UINT) * t->NumPort);
  10164. for (i = 0;i < t->NumPort;i++)
  10165. {
  10166. t->Ports[i] = PackGetIntEx(p, "Ports", i);
  10167. }
  10168. t->ServerCert = PackGetX(p, "ServerCert");
  10169. t->NumFarmHub = PackGetIndexCount(p, "HubName");
  10170. t->FarmHubs = ZeroMalloc(sizeof(RPC_FARM_HUB) * t->NumFarmHub);
  10171. for (i = 0;i < t->NumFarmHub;i++)
  10172. {
  10173. PackGetStrEx(p, "HubName", t->FarmHubs[i].HubName, sizeof(t->FarmHubs[i].HubName), i);
  10174. t->FarmHubs[i].DynamicHub = PackGetBoolEx(p, "DynamicHub", i);
  10175. }
  10176. t->NumSessions = PackGetInt(p, "NumSessions");
  10177. t->NumTcpConnections = PackGetInt(p, "NumTcpConnections");
  10178. t->Weight = PackGetInt(p, "Weight");
  10179. }
  10180. void OutRpcFarmInfo(PACK *p, RPC_FARM_INFO *t)
  10181. {
  10182. UINT i;
  10183. // Validate arguments
  10184. if (t == NULL || p == NULL)
  10185. {
  10186. return;
  10187. }
  10188. PackAddInt(p, "Id", t->Id);
  10189. PackAddBool(p, "Controller", t->Controller);
  10190. PackAddTime64(p, "ConnectedTime", t->ConnectedTime);
  10191. PackAddIp32(p, "Ip", t->Ip);
  10192. PackAddStr(p, "Hostname", t->Hostname);
  10193. PackAddInt(p, "Point", t->Point);
  10194. for (i = 0;i < t->NumPort;i++)
  10195. {
  10196. PackAddIntEx(p, "Ports", t->Ports[i], i, t->NumPort);
  10197. }
  10198. PackAddX(p, "ServerCert", t->ServerCert);
  10199. PackSetCurrentJsonGroupName(p, "HubsList");
  10200. for (i = 0;i < t->NumFarmHub;i++)
  10201. {
  10202. PackAddStrEx(p, "HubName", t->FarmHubs[i].HubName, i, t->NumFarmHub);
  10203. PackAddBoolEx(p, "DynamicHub", t->FarmHubs[i].DynamicHub, i, t->NumFarmHub);
  10204. }
  10205. PackSetCurrentJsonGroupName(p, NULL);
  10206. PackAddInt(p, "NumSessions", t->NumSessions);
  10207. PackAddInt(p, "NumTcpConnections", t->NumTcpConnections);
  10208. PackAddInt(p, "Weight", t->Weight);
  10209. }
  10210. void FreeRpcFarmInfo(RPC_FARM_INFO *t)
  10211. {
  10212. // Validate arguments
  10213. if (t == NULL)
  10214. {
  10215. return;
  10216. }
  10217. Free(t->Ports);
  10218. Free(t->FarmHubs);
  10219. FreeX(t->ServerCert);
  10220. }
  10221. void InRpcEnumFarm(RPC_ENUM_FARM *t, PACK *p)
  10222. {
  10223. UINT i;
  10224. // Validate arguments
  10225. if (t == NULL || p == NULL)
  10226. {
  10227. return;
  10228. }
  10229. Zero(t, sizeof(RPC_ENUM_FARM));
  10230. t->NumFarm = PackGetIndexCount(p, "Id");
  10231. t->Farms = ZeroMalloc(sizeof(RPC_ENUM_FARM_ITEM) * t->NumFarm);
  10232. for (i = 0;i < t->NumFarm;i++)
  10233. {
  10234. RPC_ENUM_FARM_ITEM *e = &t->Farms[i];
  10235. e->Id = PackGetIntEx(p, "Id", i);
  10236. e->Controller = PackGetBoolEx(p, "Controller", i);
  10237. e->ConnectedTime = PackGetInt64Ex(p, "ConnectedTime", i);
  10238. e->Ip = PackGetIp32Ex(p, "Ip", i);
  10239. PackGetStrEx(p, "Hostname", e->Hostname, sizeof(e->Hostname), i);
  10240. e->Point = PackGetIntEx(p, "Point", i);
  10241. e->NumSessions = PackGetIntEx(p, "NumSessions", i);
  10242. e->NumTcpConnections = PackGetIntEx(p, "NumTcpConnections", i);
  10243. e->NumHubs = PackGetIntEx(p, "NumHubs", i);
  10244. e->AssignedClientLicense = PackGetIntEx(p, "AssignedClientLicense", i);
  10245. e->AssignedBridgeLicense = PackGetIntEx(p, "AssignedBridgeLicense", i);
  10246. }
  10247. }
  10248. void OutRpcEnumFarm(PACK *p, RPC_ENUM_FARM *t)
  10249. {
  10250. UINT i;
  10251. // Validate arguments
  10252. if (t == NULL || p == NULL)
  10253. {
  10254. return;
  10255. }
  10256. PackSetCurrentJsonGroupName(p, "FarmMemberList");
  10257. for (i = 0;i < t->NumFarm;i++)
  10258. {
  10259. RPC_ENUM_FARM_ITEM *e = &t->Farms[i];
  10260. PackAddIntEx(p, "Id", e->Id, i, t->NumFarm);
  10261. PackAddBoolEx(p, "Controller", e->Controller, i, t->NumFarm);
  10262. PackAddTime64Ex(p, "ConnectedTime", e->ConnectedTime, i, t->NumFarm);
  10263. PackAddIp32Ex(p, "Ip", e->Ip, i, t->NumFarm);
  10264. PackAddStrEx(p, "Hostname", e->Hostname, i, t->NumFarm);
  10265. PackAddIntEx(p, "Point", e->Point, i, t->NumFarm);
  10266. PackAddIntEx(p, "NumSessions", e->NumSessions, i, t->NumFarm);
  10267. PackAddIntEx(p, "NumTcpConnections", e->NumTcpConnections, i, t->NumFarm);
  10268. PackAddIntEx(p, "NumHubs", e->NumHubs, i, t->NumFarm);
  10269. PackAddIntEx(p, "AssignedClientLicense", e->AssignedClientLicense, i, t->NumFarm);
  10270. PackAddIntEx(p, "AssignedBridgeLicense", e->AssignedBridgeLicense, i, t->NumFarm);
  10271. }
  10272. PackSetCurrentJsonGroupName(p, NULL);
  10273. }
  10274. void FreeRpcEnumFarm(RPC_ENUM_FARM *t)
  10275. {
  10276. // Validate arguments
  10277. if (t == NULL)
  10278. {
  10279. return;
  10280. }
  10281. Free(t->Farms);
  10282. }
  10283. // RPC_FARM_CONNECTION_STATUS
  10284. void InRpcFarmConnectionStatus(RPC_FARM_CONNECTION_STATUS *t, PACK *p)
  10285. {
  10286. Zero(t, sizeof(RPC_FARM_CONNECTION_STATUS));
  10287. // Validate arguments
  10288. if (t == NULL || p == NULL)
  10289. {
  10290. return;
  10291. }
  10292. t->Ip = PackGetIp32(p, "Ip");
  10293. t->Port = PackGetInt(p, "Port");
  10294. t->Online = PackGetBool(p, "Online");
  10295. t->LastError = PackGetInt(p, "LastError");
  10296. t->StartedTime = PackGetInt64(p, "StartedTime");
  10297. t->CurrentConnectedTime = PackGetInt64(p, "CurrentConnectedTime");
  10298. t->FirstConnectedTime = PackGetInt64(p, "FirstConnectedTime");
  10299. t->NumConnected = PackGetInt(p, "NumConnected");
  10300. t->NumTry = PackGetInt(p, "NumTry");
  10301. t->NumFailed = PackGetInt(p, "NumFailed");
  10302. }
  10303. void OutRpcFarmConnectionStatus(PACK *p, RPC_FARM_CONNECTION_STATUS *t)
  10304. {
  10305. // Validate arguments
  10306. if (t == NULL || p == NULL)
  10307. {
  10308. return;
  10309. }
  10310. PackAddIp32(p, "Ip", t->Ip);
  10311. PackAddInt(p, "Port", t->Port);
  10312. PackAddBool(p, "Online", t->Online);
  10313. PackAddInt(p, "LastError", t->LastError);
  10314. PackAddTime64(p, "StartedTime", t->StartedTime);
  10315. PackAddTime64(p, "CurrentConnectedTime", t->CurrentConnectedTime);
  10316. PackAddTime64(p, "FirstConnectedTime", t->FirstConnectedTime);
  10317. PackAddInt(p, "NumConnected", t->NumConnected);
  10318. PackAddInt(p, "NumTry", t->NumTry);
  10319. PackAddInt(p, "NumFailed", t->NumFailed);
  10320. }
  10321. // RPC_HUB_OPTION
  10322. void InRpcHubOption(RPC_HUB_OPTION *t, PACK *p)
  10323. {
  10324. // Validate arguments
  10325. if (t == NULL || p == NULL)
  10326. {
  10327. return;
  10328. }
  10329. Zero(t, sizeof(RPC_HUB_OPTION));
  10330. t->MaxSession = PackGetInt(p, "MaxSession");
  10331. t->NoEnum = PackGetBool(p, "NoEnum");
  10332. }
  10333. void OutRpcHubOption(PACK *p, RPC_HUB_OPTION *t)
  10334. {
  10335. // Validate arguments
  10336. if (t == NULL || p == NULL)
  10337. {
  10338. return;
  10339. }
  10340. PackAddInt(p, "MaxSession", t->MaxSession);
  10341. PackAddBool(p, "NoEnum", t->NoEnum);
  10342. }
  10343. // RPC_RADIUS
  10344. void InRpcRadius(RPC_RADIUS *t, PACK *p)
  10345. {
  10346. // Validate arguments
  10347. if (t == NULL || p == NULL)
  10348. {
  10349. return;
  10350. }
  10351. Zero(t, sizeof(RPC_RADIUS));
  10352. PackGetStr(p, "RadiusServerName", t->RadiusServerName, sizeof(t->RadiusServerName));
  10353. t->RadiusPort = PackGetInt(p, "RadiusPort");
  10354. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10355. PackGetStr(p, "RadiusSecret", t->RadiusSecret, sizeof(t->RadiusSecret));
  10356. t->RadiusRetryInterval = PackGetInt(p, "RadiusRetryInterval");
  10357. }
  10358. void OutRpcRadius(PACK *p, RPC_RADIUS *t)
  10359. {
  10360. // Validate arguments
  10361. if (t == NULL || p == NULL)
  10362. {
  10363. return;
  10364. }
  10365. PackAddStr(p, "RadiusServerName", t->RadiusServerName);
  10366. PackAddInt(p, "RadiusPort", t->RadiusPort);
  10367. PackAddStr(p, "HubName", t->HubName);
  10368. PackAddStr(p, "RadiusSecret", t->RadiusSecret);
  10369. PackAddInt(p, "RadiusRetryInterval", t->RadiusRetryInterval);
  10370. }
  10371. // RPC_HUB
  10372. void InRpcHub(RPC_HUB *t, PACK *p)
  10373. {
  10374. // Validate arguments
  10375. if (t == NULL || p == NULL)
  10376. {
  10377. return;
  10378. }
  10379. Zero(t, sizeof(RPC_HUB));
  10380. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10381. }
  10382. void OutRpcHub(PACK *p, RPC_HUB *t)
  10383. {
  10384. // Validate arguments
  10385. if (t == NULL || p == NULL)
  10386. {
  10387. return;
  10388. }
  10389. PackAddStr(p, "HubName", t->HubName);
  10390. }
  10391. // RPC_CREATE_HUB
  10392. void InRpcCreateHub(RPC_CREATE_HUB *t, PACK *p)
  10393. {
  10394. // Validate arguments
  10395. if (t == NULL || p == NULL)
  10396. {
  10397. return;
  10398. }
  10399. Zero(t, sizeof(RPC_CREATE_HUB));
  10400. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10401. PackGetData2(p, "HashedPassword", t->HashedPassword, sizeof(t->HashedPassword));
  10402. PackGetData2(p, "SecurePassword", t->SecurePassword, sizeof(t->SecurePassword));
  10403. PackGetStr(p, "AdminPasswordPlainText", t->AdminPasswordPlainText, sizeof(t->AdminPasswordPlainText));
  10404. t->Online = PackGetBool(p, "Online");
  10405. InRpcHubOption(&t->HubOption, p);
  10406. t->HubType = PackGetInt(p, "HubType");
  10407. }
  10408. void OutRpcCreateHub(PACK *p, RPC_CREATE_HUB *t)
  10409. {
  10410. // Validate arguments
  10411. if (t == NULL || p == NULL)
  10412. {
  10413. return;
  10414. }
  10415. PackAddStr(p, "HubName", t->HubName);
  10416. PackAddData(p, "HashedPassword", t->HashedPassword, sizeof(t->HashedPassword));
  10417. PackAddData(p, "SecurePassword", t->SecurePassword, sizeof(t->SecurePassword));
  10418. PackAddBool(p, "Online", t->Online);
  10419. PackAddStr(p, "AdminPasswordPlainText", t->AdminPasswordPlainText);
  10420. OutRpcHubOption(p, &t->HubOption);
  10421. PackAddInt(p, "HubType", t->HubType);
  10422. }
  10423. // RPC_ENUM_HUB
  10424. void InRpcEnumHub(RPC_ENUM_HUB *t, PACK *p)
  10425. {
  10426. UINT i;
  10427. // Validate arguments
  10428. if (t == NULL || p == NULL)
  10429. {
  10430. return;
  10431. }
  10432. Zero(t, sizeof(RPC_ENUM_HUB));
  10433. t->NumHub = PackGetIndexCount(p, "HubName");
  10434. t->Hubs = ZeroMalloc(sizeof(RPC_ENUM_HUB_ITEM) * t->NumHub);
  10435. for (i = 0;i < t->NumHub;i++)
  10436. {
  10437. RPC_ENUM_HUB_ITEM *e = &t->Hubs[i];
  10438. PackGetStrEx(p, "HubName", e->HubName, sizeof(e->HubName), i);
  10439. e->Online = PackGetBoolEx(p, "Online", i);
  10440. e->HubType = PackGetIntEx(p, "HubType", i);
  10441. e->NumSessions = PackGetIntEx(p, "NumSessions", i);
  10442. e->NumUsers = PackGetIntEx(p, "NumUsers", i);
  10443. e->NumGroups = PackGetIntEx(p, "NumGroups", i);
  10444. e->NumMacTables = PackGetIntEx(p, "NumMacTables", i);
  10445. e->NumIpTables = PackGetIntEx(p, "NumIpTables", i);
  10446. e->LastCommTime = PackGetInt64Ex(p, "LastCommTime", i);
  10447. e->CreatedTime = PackGetInt64Ex(p, "CreatedTime", i);
  10448. e->LastLoginTime = PackGetInt64Ex(p, "LastLoginTime", i);
  10449. e->NumLogin = PackGetIntEx(p, "NumLogin", i);
  10450. e->IsTrafficFilled = PackGetBoolEx(p, "IsTrafficFilled", i);
  10451. InRpcTrafficEx(&e->Traffic, p, i);
  10452. }
  10453. }
  10454. void OutRpcEnumHub(PACK *p, RPC_ENUM_HUB *t)
  10455. {
  10456. UINT i;
  10457. // Validate arguments
  10458. if (t == NULL || p == NULL)
  10459. {
  10460. return;
  10461. }
  10462. PackSetCurrentJsonGroupName(p, "HubList");
  10463. for (i = 0;i < t->NumHub;i++)
  10464. {
  10465. RPC_ENUM_HUB_ITEM *e = &t->Hubs[i];
  10466. PackAddStrEx(p, "HubName", e->HubName, i, t->NumHub);
  10467. PackAddBoolEx(p, "Online", e->Online, i, t->NumHub);
  10468. PackAddIntEx(p, "HubType", e->HubType, i, t->NumHub);
  10469. PackAddIntEx(p, "NumSessions", e->NumSessions, i, t->NumHub);
  10470. PackAddIntEx(p, "NumUsers", e->NumUsers, i, t->NumHub);
  10471. PackAddIntEx(p, "NumGroups", e->NumGroups, i, t->NumHub);
  10472. PackAddIntEx(p, "NumMacTables", e->NumMacTables, i, t->NumHub);
  10473. PackAddIntEx(p, "NumIpTables", e->NumIpTables, i, t->NumHub);
  10474. PackAddTime64Ex(p, "LastCommTime", e->LastCommTime, i, t->NumHub);
  10475. PackAddTime64Ex(p, "CreatedTime", e->CreatedTime, i, t->NumHub);
  10476. PackAddTime64Ex(p, "LastLoginTime", e->LastLoginTime, i, t->NumHub);
  10477. PackAddIntEx(p, "NumLogin", e->NumLogin, i, t->NumHub);
  10478. PackAddBoolEx(p, "IsTrafficFilled", e->IsTrafficFilled, i, t->NumHub);
  10479. OutRpcTrafficEx(&e->Traffic, p, i, t->NumHub);
  10480. }
  10481. PackSetCurrentJsonGroupName(p, NULL);
  10482. }
  10483. void FreeRpcEnumHub(RPC_ENUM_HUB *t)
  10484. {
  10485. // Validate arguments
  10486. if (t == NULL)
  10487. {
  10488. return;
  10489. }
  10490. Free(t->Hubs);
  10491. }
  10492. // RPC_DELETE_HUB
  10493. void InRpcDeleteHub(RPC_DELETE_HUB *t, PACK *p)
  10494. {
  10495. // Validate arguments
  10496. if (t == NULL || p == NULL)
  10497. {
  10498. return;
  10499. }
  10500. Zero(t, sizeof(RPC_DELETE_HUB));
  10501. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10502. }
  10503. void OutRpcDeleteHub(PACK *p, RPC_DELETE_HUB *t)
  10504. {
  10505. // Validate arguments
  10506. if (t == NULL || p == NULL)
  10507. {
  10508. return;
  10509. }
  10510. PackAddStr(p, "HubName", t->HubName);
  10511. }
  10512. // RPC_ENUM_CONNECTION
  10513. void InRpcEnumConnection(RPC_ENUM_CONNECTION *t, PACK *p)
  10514. {
  10515. UINT i;
  10516. // Validate arguments
  10517. if (t == NULL || p == NULL)
  10518. {
  10519. return;
  10520. }
  10521. Zero(t, sizeof(RPC_ENUM_CONNECTION));
  10522. t->NumConnection = PackGetIndexCount(p, "Name");
  10523. t->Connections = ZeroMalloc(sizeof(RPC_ENUM_CONNECTION_ITEM) * t->NumConnection);
  10524. for (i = 0;i < t->NumConnection;i++)
  10525. {
  10526. RPC_ENUM_CONNECTION_ITEM *e = &t->Connections[i];
  10527. e->Ip = PackGetIp32Ex(p, "Ip", i);
  10528. e->Port = PackGetIntEx(p, "Port", i);
  10529. PackGetStrEx(p, "Name", e->Name, sizeof(e->Name), i);
  10530. PackGetStrEx(p, "Hostname", e->Hostname, sizeof(e->Hostname), i);
  10531. e->ConnectedTime = PackGetInt64Ex(p, "ConnectedTime", i);
  10532. e->Type = PackGetIntEx(p, "Type", i);
  10533. }
  10534. }
  10535. void OutRpcEnumConnection(PACK *p, RPC_ENUM_CONNECTION *t)
  10536. {
  10537. UINT i;
  10538. // Validate arguments
  10539. if (t == NULL || p == NULL)
  10540. {
  10541. return;
  10542. }
  10543. PackSetCurrentJsonGroupName(p, "ConnectionList");
  10544. for (i = 0;i < t->NumConnection;i++)
  10545. {
  10546. RPC_ENUM_CONNECTION_ITEM *e = &t->Connections[i];
  10547. PackAddIp32Ex(p, "Ip", e->Ip, i, t->NumConnection);
  10548. PackAddIntEx(p, "Port", e->Port, i, t->NumConnection);
  10549. PackAddStrEx(p, "Name", e->Name, i, t->NumConnection);
  10550. PackAddStrEx(p, "Hostname", e->Hostname, i, t->NumConnection);
  10551. PackAddTime64Ex(p, "ConnectedTime", e->ConnectedTime, i, t->NumConnection);
  10552. PackAddIntEx(p, "Type", e->Type, i, t->NumConnection);
  10553. }
  10554. PackSetCurrentJsonGroupName(p, NULL);
  10555. }
  10556. void FreeRpcEnumConnetion(RPC_ENUM_CONNECTION *t)
  10557. {
  10558. // Validate arguments
  10559. if (t == NULL)
  10560. {
  10561. return;
  10562. }
  10563. Free(t->Connections);
  10564. }
  10565. // RPC_DISCONNECT_CONNECTION
  10566. void InRpcDisconnectConnection(RPC_DISCONNECT_CONNECTION *t, PACK *p)
  10567. {
  10568. // Validate arguments
  10569. if (t == NULL || p == NULL)
  10570. {
  10571. return;
  10572. }
  10573. Zero(t, sizeof(RPC_DISCONNECT_CONNECTION));
  10574. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  10575. }
  10576. void OutRpcDisconnectConnection(PACK *p, RPC_DISCONNECT_CONNECTION *t)
  10577. {
  10578. // Validate arguments
  10579. if (t == NULL || p == NULL)
  10580. {
  10581. return;
  10582. }
  10583. PackAddStr(p, "Name", t->Name);
  10584. }
  10585. // RPC_CONNECTION_INFO
  10586. void InRpcConnectionInfo(RPC_CONNECTION_INFO *t, PACK *p)
  10587. {
  10588. // Validate arguments
  10589. if (t == NULL || p == NULL)
  10590. {
  10591. return;
  10592. }
  10593. Zero(t, sizeof(RPC_CONNECTION_INFO));
  10594. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  10595. t->Ip = PackGetIp32(p, "Ip");
  10596. t->Port = PackGetInt(p, "Port");
  10597. t->ConnectedTime = PackGetInt64(p, "ConnectedTime");
  10598. PackGetStr(p, "Hostname", t->Hostname, sizeof(t->Hostname));
  10599. PackGetStr(p, "ServerStr", t->ServerStr, sizeof(t->ServerStr));
  10600. PackGetStr(p, "ClientStr", t->ClientStr, sizeof(t->ClientStr));
  10601. t->ServerVer = PackGetInt(p, "ServerVer");
  10602. t->ServerBuild = PackGetInt(p, "ServerBuild");
  10603. t->ClientVer = PackGetInt(p, "ClientVer");
  10604. t->ClientBuild = PackGetInt(p, "ClientBuild");
  10605. t->Type = PackGetInt(p, "Type");
  10606. }
  10607. void OutRpcConnectionInfo(PACK *p, RPC_CONNECTION_INFO *t)
  10608. {
  10609. // Validate arguments
  10610. if (t == NULL || p == NULL)
  10611. {
  10612. return;
  10613. }
  10614. PackAddStr(p, "Name", t->Name);
  10615. PackAddIp32(p, "Ip", t->Ip);
  10616. PackAddInt(p, "Port", t->Port);
  10617. PackAddTime64(p, "ConnectedTime", t->ConnectedTime);
  10618. PackAddStr(p, "Hostname", t->Hostname);
  10619. PackAddStr(p, "ServerStr", t->ServerStr);
  10620. PackAddStr(p, "ClientStr", t->ClientStr);
  10621. PackAddInt(p, "ServerVer", t->ServerVer);
  10622. PackAddInt(p, "ServerBuild", t->ServerBuild);
  10623. PackAddInt(p, "ClientVer", t->ClientVer);
  10624. PackAddInt(p, "ClientBuild", t->ClientBuild);
  10625. PackAddInt(p, "Type", t->Type);
  10626. }
  10627. // RPC_SET_HUB_ONLINE
  10628. void InRpcSetHubOnline(RPC_SET_HUB_ONLINE *t, PACK *p)
  10629. {
  10630. // Validate arguments
  10631. if (t == NULL || p == NULL)
  10632. {
  10633. return;
  10634. }
  10635. Zero(t, sizeof(RPC_SET_HUB_ONLINE));
  10636. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10637. t->Online = PackGetBool(p, "Online");
  10638. }
  10639. void OutRpcSetHubOnline(PACK *p, RPC_SET_HUB_ONLINE *t)
  10640. {
  10641. // Validate arguments
  10642. if (t == NULL || p == NULL)
  10643. {
  10644. return;
  10645. }
  10646. PackAddStr(p, "HubName", t->HubName);
  10647. PackAddBool(p, "Online", t->Online);
  10648. }
  10649. // RPC_HUB_STATUS
  10650. void InRpcHubStatus(RPC_HUB_STATUS *t, PACK *p)
  10651. {
  10652. Zero(t, sizeof(RPC_HUB_STATUS));
  10653. // Validate arguments
  10654. if (t == NULL || p == NULL)
  10655. {
  10656. return;
  10657. }
  10658. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10659. t->Online = PackGetBool(p, "Online");
  10660. t->HubType = PackGetInt(p, "HubType");
  10661. t->NumSessions = PackGetInt(p, "NumSessions");
  10662. t->NumSessionsClient = PackGetInt(p, "NumSessionsClient");
  10663. t->NumSessionsBridge = PackGetInt(p, "NumSessionsBridge");
  10664. t->NumAccessLists = PackGetInt(p, "NumAccessLists");
  10665. t->NumUsers = PackGetInt(p, "NumUsers");
  10666. t->NumGroups = PackGetInt(p, "NumGroups");
  10667. t->NumMacTables = PackGetInt(p, "NumMacTables");
  10668. t->NumIpTables = PackGetInt(p, "NumIpTables");
  10669. t->SecureNATEnabled = PackGetBool(p, "SecureNATEnabled");
  10670. InRpcTraffic(&t->Traffic, p);
  10671. t->LastCommTime = PackGetInt64(p, "LastCommTime");
  10672. t->CreatedTime = PackGetInt64(p, "CreatedTime");
  10673. t->LastLoginTime = PackGetInt64(p, "LastLoginTime");
  10674. t->NumLogin = PackGetInt(p, "NumLogin");
  10675. }
  10676. void OutRpcHubStatus(PACK *p, RPC_HUB_STATUS *t)
  10677. {
  10678. // Validate arguments
  10679. if (t == NULL || p == NULL)
  10680. {
  10681. return;
  10682. }
  10683. PackAddStr(p, "HubName", t->HubName);
  10684. PackAddBool(p, "Online", t->Online);
  10685. PackAddInt(p, "HubType", t->HubType);
  10686. PackAddInt(p, "NumSessions", t->NumSessions);
  10687. PackAddInt(p, "NumSessionsClient", t->NumSessionsClient);
  10688. PackAddInt(p, "NumSessionsBridge", t->NumSessionsBridge);
  10689. PackAddInt(p, "NumAccessLists", t->NumAccessLists);
  10690. PackAddInt(p, "NumUsers", t->NumUsers);
  10691. PackAddInt(p, "NumGroups", t->NumGroups);
  10692. PackAddInt(p, "NumMacTables", t->NumMacTables);
  10693. PackAddInt(p, "NumIpTables", t->NumIpTables);
  10694. PackAddBool(p, "SecureNATEnabled", t->SecureNATEnabled);
  10695. OutRpcTraffic(p, &t->Traffic);
  10696. PackAddTime64(p, "LastCommTime", t->LastCommTime);
  10697. PackAddTime64(p, "CreatedTime", t->CreatedTime);
  10698. PackAddTime64(p, "LastLoginTime", t->LastLoginTime);
  10699. PackAddInt(p, "NumLogin", t->NumLogin);
  10700. }
  10701. // RPC_HUB_LOG
  10702. void InRpcHubLog(RPC_HUB_LOG *t, PACK *p)
  10703. {
  10704. UINT i;
  10705. // Validate arguments
  10706. if (t == NULL || p == NULL)
  10707. {
  10708. return;
  10709. }
  10710. Zero(t, sizeof(RPC_HUB_LOG));
  10711. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10712. t->LogSetting.SaveSecurityLog = PackGetBool(p, "SaveSecurityLog");
  10713. t->LogSetting.SecurityLogSwitchType = PackGetInt(p, "SecurityLogSwitchType");
  10714. t->LogSetting.SavePacketLog = PackGetBool(p, "SavePacketLog");
  10715. t->LogSetting.PacketLogSwitchType = PackGetInt(p, "PacketLogSwitchType");
  10716. for (i = 0;i < NUM_PACKET_LOG;i++)
  10717. {
  10718. t->LogSetting.PacketLogConfig[i] = PackGetIntEx(p, "PacketLogConfig", i);
  10719. }
  10720. }
  10721. void OutRpcHubLog(PACK *p, RPC_HUB_LOG *t)
  10722. {
  10723. UINT i;
  10724. // Validate arguments
  10725. if (t == NULL || p == NULL)
  10726. {
  10727. return;
  10728. }
  10729. PackAddStr(p, "HubName", t->HubName);
  10730. PackAddBool(p, "SaveSecurityLog", t->LogSetting.SaveSecurityLog);
  10731. PackAddInt(p, "SecurityLogSwitchType", t->LogSetting.SecurityLogSwitchType);
  10732. PackAddBool(p, "SavePacketLog", t->LogSetting.SavePacketLog);
  10733. PackAddInt(p, "PacketLogSwitchType", t->LogSetting.PacketLogSwitchType);
  10734. for (i = 0;i < NUM_PACKET_LOG;i++)
  10735. {
  10736. PackAddIntEx(p, "PacketLogConfig", t->LogSetting.PacketLogConfig[i], i, NUM_PACKET_LOG);
  10737. }
  10738. }
  10739. // RPC_HUB_ADD_CA
  10740. void InRpcHubAddCa(RPC_HUB_ADD_CA *t, PACK *p)
  10741. {
  10742. // Validate arguments
  10743. if (t == NULL || p == NULL)
  10744. {
  10745. return;
  10746. }
  10747. Zero(t, sizeof(RPC_HUB_ADD_CA));
  10748. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10749. t->Cert = PackGetX(p, "Cert");
  10750. }
  10751. void OutRpcHubAddCa(PACK *p, RPC_HUB_ADD_CA *t)
  10752. {
  10753. // Validate arguments
  10754. if (t == NULL || p == NULL)
  10755. {
  10756. return;
  10757. }
  10758. PackAddStr(p, "HubName", t->HubName);
  10759. PackAddX(p, "Cert", t->Cert);
  10760. }
  10761. void FreeRpcHubAddCa(RPC_HUB_ADD_CA *t)
  10762. {
  10763. // Validate arguments
  10764. if (t == NULL)
  10765. {
  10766. return;
  10767. }
  10768. FreeX(t->Cert);
  10769. }
  10770. // RPC_HUB_ENUM_CA
  10771. void InRpcHubEnumCa(RPC_HUB_ENUM_CA *t, PACK *p)
  10772. {
  10773. UINT i;
  10774. // Validate arguments
  10775. if (t == NULL || p == NULL)
  10776. {
  10777. return;
  10778. }
  10779. Zero(t, sizeof(RPC_HUB_ENUM_CA));
  10780. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10781. t->NumCa = PackGetIndexCount(p, "Key");
  10782. t->Ca = ZeroMalloc(sizeof(RPC_HUB_ENUM_CA_ITEM) * t->NumCa);
  10783. for (i = 0;i < t->NumCa;i++)
  10784. {
  10785. RPC_HUB_ENUM_CA_ITEM *e = &t->Ca[i];
  10786. e->Key = PackGetIntEx(p, "Key", i);
  10787. PackGetUniStrEx(p, "SubjectName", e->SubjectName, sizeof(e->SubjectName), i);
  10788. PackGetUniStrEx(p, "IssuerName", e->IssuerName, sizeof(e->IssuerName), i);
  10789. e->Expires = PackGetInt64Ex(p, "Expires", i);
  10790. }
  10791. }
  10792. void OutRpcHubEnumCa(PACK *p, RPC_HUB_ENUM_CA *t)
  10793. {
  10794. UINT i;
  10795. // Validate arguments
  10796. if (t == NULL || p == NULL)
  10797. {
  10798. return;
  10799. }
  10800. PackAddStr(p, "HubName", t->HubName);
  10801. PackSetCurrentJsonGroupName(p, "CAList");
  10802. for (i = 0;i < t->NumCa;i++)
  10803. {
  10804. RPC_HUB_ENUM_CA_ITEM *e = &t->Ca[i];
  10805. PackAddIntEx(p, "Key", e->Key, i, t->NumCa);
  10806. PackAddUniStrEx(p, "SubjectName", e->SubjectName, i, t->NumCa);
  10807. PackAddUniStrEx(p, "IssuerName", e->IssuerName, i, t->NumCa);
  10808. PackAddTime64Ex(p, "Expires", e->Expires, i, t->NumCa);
  10809. }
  10810. PackSetCurrentJsonGroupName(p, NULL);
  10811. }
  10812. void FreeRpcHubEnumCa(RPC_HUB_ENUM_CA *t)
  10813. {
  10814. // Validate arguments
  10815. if (t == NULL)
  10816. {
  10817. return;
  10818. }
  10819. Free(t->Ca);
  10820. }
  10821. // RPC_HUB_GET_CA
  10822. void InRpcHubGetCa(RPC_HUB_GET_CA *t, PACK *p)
  10823. {
  10824. // Validate arguments
  10825. if (t == NULL || p == NULL)
  10826. {
  10827. return;
  10828. }
  10829. Zero(t, sizeof(RPC_HUB_GET_CA));
  10830. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10831. t->Key = PackGetInt(p, "Key");
  10832. t->Cert = PackGetX(p, "Cert");
  10833. }
  10834. void OutRpcHubGetCa(PACK *p, RPC_HUB_GET_CA *t)
  10835. {
  10836. // Validate arguments
  10837. if (t == NULL || p == NULL)
  10838. {
  10839. return;
  10840. }
  10841. PackAddStr(p, "HubName", t->HubName);
  10842. PackAddInt(p, "Key", t->Key);
  10843. PackAddX(p, "Cert", t->Cert);
  10844. }
  10845. void FreeRpcHubGetCa(RPC_HUB_GET_CA *t)
  10846. {
  10847. // Validate arguments
  10848. if (t == NULL)
  10849. {
  10850. return;
  10851. }
  10852. FreeX(t->Cert);
  10853. }
  10854. // RPC_HUB_DELETE_CA
  10855. void InRpcHubDeleteCa(RPC_HUB_DELETE_CA *t, PACK *p)
  10856. {
  10857. // Validate arguments
  10858. if (t == NULL || p == NULL)
  10859. {
  10860. return;
  10861. }
  10862. Zero(t, sizeof(RPC_HUB_DELETE_CA));
  10863. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10864. t->Key = PackGetInt(p, "Key");
  10865. }
  10866. void OutRpcHubDeleteCa(PACK *p, RPC_HUB_DELETE_CA *t)
  10867. {
  10868. // Validate arguments
  10869. if (t == NULL || p == NULL)
  10870. {
  10871. return;
  10872. }
  10873. PackAddStr(p, "HubName", t->HubName);
  10874. PackAddInt(p, "Key", t->Key);
  10875. }
  10876. // RPC_CREATE_LINK
  10877. void InRpcCreateLink(RPC_CREATE_LINK *t, PACK *p)
  10878. {
  10879. BUF *b;
  10880. // Validate arguments
  10881. if (t == NULL || p == NULL)
  10882. {
  10883. return;
  10884. }
  10885. Zero(t, sizeof(RPC_CREATE_LINK));
  10886. PackGetStr(p, "HubName_Ex", t->HubName, sizeof(t->HubName));
  10887. t->Online = PackGetBool(p, "Online");
  10888. t->ClientOption = ZeroMalloc(sizeof(CLIENT_OPTION));
  10889. InRpcClientOption(t->ClientOption, p);
  10890. t->ClientAuth = ZeroMalloc(sizeof(CLIENT_AUTH));
  10891. InRpcClientAuth(t->ClientAuth, p);
  10892. InRpcPolicy(&t->Policy, p);
  10893. t->CheckServerCert = PackGetBool(p, "CheckServerCert");
  10894. b = PackGetBuf(p, "ServerCert");
  10895. if (b != NULL)
  10896. {
  10897. t->ServerCert = BufToX(b, false);
  10898. FreeBuf(b);
  10899. }
  10900. }
  10901. void OutRpcCreateLink(PACK *p, RPC_CREATE_LINK *t)
  10902. {
  10903. // Validate arguments
  10904. if (t == NULL || p == NULL)
  10905. {
  10906. return;
  10907. }
  10908. PackAddStr(p, "HubName_Ex",t->HubName);
  10909. PackAddBool(p, "Online", t->Online);
  10910. OutRpcClientOption(p, t->ClientOption);
  10911. OutRpcClientAuth(p, t->ClientAuth);
  10912. OutRpcPolicy(p, &t->Policy);
  10913. PackAddBool(p, "CheckServerCert", t->CheckServerCert);
  10914. if (t->ServerCert != NULL)
  10915. {
  10916. BUF *b;
  10917. b = XToBuf(t->ServerCert, false);
  10918. PackAddBuf(p, "ServerCert", b);
  10919. FreeBuf(b);
  10920. }
  10921. }
  10922. void FreeRpcCreateLink(RPC_CREATE_LINK *t)
  10923. {
  10924. // Validate arguments
  10925. if (t == NULL)
  10926. {
  10927. return;
  10928. }
  10929. if (t->ServerCert != NULL)
  10930. {
  10931. FreeX(t->ServerCert);
  10932. }
  10933. Free(t->ClientOption);
  10934. CiFreeClientAuth(t->ClientAuth);
  10935. }
  10936. // RPC_ENUM_LINK
  10937. void InRpcEnumLink(RPC_ENUM_LINK *t, PACK *p)
  10938. {
  10939. UINT i;
  10940. // Validate arguments
  10941. if (t == NULL || p == NULL)
  10942. {
  10943. return;
  10944. }
  10945. Zero(t, sizeof(RPC_ENUM_LINK));
  10946. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  10947. t->NumLink = PackGetIndexCount(p, "AccountName");
  10948. t->Links = ZeroMalloc(sizeof(RPC_ENUM_LINK_ITEM) * t->NumLink);
  10949. for (i = 0;i < t->NumLink;i++)
  10950. {
  10951. RPC_ENUM_LINK_ITEM *e = &t->Links[i];
  10952. PackGetUniStrEx(p, "AccountName", e->AccountName, sizeof(e->AccountName), i);
  10953. PackGetStrEx(p, "Hostname", e->Hostname, sizeof(e->Hostname), i);
  10954. PackGetStrEx(p, "ConnectedHubName", e->HubName, sizeof(e->HubName), i);
  10955. e->Online = PackGetBoolEx(p, "Online", i);
  10956. e->ConnectedTime = PackGetInt64Ex(p, "ConnectedTime", i);
  10957. e->Connected = PackGetBoolEx(p, "Connected", i);
  10958. e->LastError = PackGetIntEx(p, "LastError", i);
  10959. }
  10960. }
  10961. void OutRpcEnumLink(PACK *p, RPC_ENUM_LINK *t)
  10962. {
  10963. UINT i;
  10964. // Validate arguments
  10965. if (t == NULL || p == NULL)
  10966. {
  10967. return;
  10968. }
  10969. PackAddStr(p, "HubName", t->HubName);
  10970. PackSetCurrentJsonGroupName(p, "LinkList");
  10971. for (i = 0;i < t->NumLink;i++)
  10972. {
  10973. RPC_ENUM_LINK_ITEM *e = &t->Links[i];
  10974. PackAddUniStrEx(p, "AccountName", e->AccountName, i, t->NumLink);
  10975. PackAddStrEx(p, "ConnectedHubName", e->HubName, i, t->NumLink);
  10976. PackAddStrEx(p, "Hostname", e->Hostname, i, t->NumLink);
  10977. PackAddBoolEx(p, "Online", e->Online, i, t->NumLink);
  10978. PackAddTime64Ex(p, "ConnectedTime", e->ConnectedTime, i, t->NumLink);
  10979. PackAddBoolEx(p, "Connected", e->Connected, i, t->NumLink);
  10980. PackAddIntEx(p, "LastError", e->LastError, i, t->NumLink);
  10981. PackAddStrEx(p, "TargetHubName", e->HubName, i, t->NumLink);
  10982. }
  10983. PackSetCurrentJsonGroupName(p, NULL);
  10984. }
  10985. void FreeRpcEnumLink(RPC_ENUM_LINK *t)
  10986. {
  10987. // Validate arguments
  10988. if (t == NULL)
  10989. {
  10990. return;
  10991. }
  10992. Free(t->Links);
  10993. }
  10994. // RPC_LINK_STATUS
  10995. void InRpcLinkStatus(RPC_LINK_STATUS *t, PACK *p)
  10996. {
  10997. // Validate arguments
  10998. if (t == NULL || p == NULL)
  10999. {
  11000. return;
  11001. }
  11002. Zero(t, sizeof(RPC_LINK_STATUS));
  11003. PackGetStr(p, "HubName_Ex", t->HubName, sizeof(t->HubName));
  11004. PackGetUniStr(p, "AccountName", t->AccountName, sizeof(t->AccountName));
  11005. InRpcClientGetConnectionStatus(&t->Status, p);
  11006. }
  11007. void OutRpcLinkStatus(PACK *p, RPC_LINK_STATUS *t)
  11008. {
  11009. // Validate arguments
  11010. if (t == NULL || p == NULL)
  11011. {
  11012. return;
  11013. }
  11014. PackAddStr(p, "HubName_Ex", t->HubName);
  11015. PackAddUniStr(p, "AccountName", t->AccountName);
  11016. OutRpcClientGetConnectionStatus(p, &t->Status);
  11017. }
  11018. void FreeRpcLinkStatus(RPC_LINK_STATUS *t)
  11019. {
  11020. // Validate arguments
  11021. if (t == NULL)
  11022. {
  11023. return;
  11024. }
  11025. CiFreeClientGetConnectionStatus(&t->Status);
  11026. }
  11027. // RPC_LINK
  11028. void InRpcLink(RPC_LINK *t, PACK *p)
  11029. {
  11030. // Validate arguments
  11031. if (t == NULL || p == NULL)
  11032. {
  11033. return;
  11034. }
  11035. Zero(t, sizeof(RPC_LINK));
  11036. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11037. PackGetUniStr(p, "AccountName", t->AccountName, sizeof(t->AccountName));
  11038. }
  11039. void OutRpcLink(PACK *p, RPC_LINK *t)
  11040. {
  11041. // Validate arguments
  11042. if (t == NULL)
  11043. {
  11044. return;
  11045. }
  11046. PackAddStr(p, "HubName", t->HubName);
  11047. PackAddUniStr(p, "AccountName", t->AccountName);
  11048. }
  11049. // RPC_RENAME_LINK
  11050. void InRpcRenameLink(RPC_RENAME_LINK *t, PACK *p)
  11051. {
  11052. // Validate arguments
  11053. if (t == NULL || p == NULL)
  11054. {
  11055. return;
  11056. }
  11057. Zero(t, sizeof(RPC_RENAME_LINK));
  11058. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11059. PackGetUniStr(p, "OldAccountName", t->OldAccountName, sizeof(t->OldAccountName));
  11060. PackGetUniStr(p, "NewAccountName", t->NewAccountName, sizeof(t->NewAccountName));
  11061. }
  11062. void OutRpcRenameLink(PACK *p, RPC_RENAME_LINK *t)
  11063. {
  11064. // Validate arguments
  11065. if (p == NULL || t == NULL)
  11066. {
  11067. return;
  11068. }
  11069. PackAddStr(p, "HubName", t->HubName);
  11070. PackAddUniStr(p, "OldAccountName", t->OldAccountName);
  11071. PackAddUniStr(p, "NewAccountName", t->NewAccountName);
  11072. }
  11073. // ACCESS
  11074. void InRpcAccessEx(ACCESS *a, PACK *p, UINT index)
  11075. {
  11076. // Validate arguments
  11077. if (a == NULL || p == NULL)
  11078. {
  11079. return;
  11080. }
  11081. Zero(a, sizeof(ACCESS));
  11082. a->Id = PackGetIntEx(p, "Id", index);
  11083. PackGetUniStrEx(p, "Note", a->Note, sizeof(a->Note), index);
  11084. a->Active = PackGetBoolEx(p, "Active", index);
  11085. a->Priority = PackGetIntEx(p, "Priority", index);
  11086. a->Discard = PackGetBoolEx(p, "Discard", index);
  11087. a->SrcIpAddress = PackGetIp32Ex(p, "SrcIpAddress", index);
  11088. a->SrcSubnetMask = PackGetIp32Ex(p, "SrcSubnetMask", index);
  11089. a->DestIpAddress = PackGetIp32Ex(p, "DestIpAddress", index);
  11090. a->DestSubnetMask = PackGetIp32Ex(p, "DestSubnetMask", index);
  11091. a->Protocol = PackGetIntEx(p, "Protocol", index);
  11092. a->SrcPortStart = PackGetIntEx(p, "SrcPortStart", index);
  11093. a->SrcPortEnd = PackGetIntEx(p, "SrcPortEnd", index);
  11094. a->DestPortStart = PackGetIntEx(p, "DestPortStart", index);
  11095. a->DestPortEnd = PackGetIntEx(p, "DestPortEnd", index);
  11096. //a->SrcUsernameHash = PackGetIntEx(p, "SrcUsernameHash", index);
  11097. PackGetStrEx(p, "SrcUsername", a->SrcUsername, sizeof(a->SrcUsername), index);
  11098. //a->DestUsernameHash = PackGetIntEx(p, "DestUsernameHash", index);
  11099. PackGetStrEx(p, "DestUsername", a->DestUsername, sizeof(a->DestUsername), index);
  11100. a->CheckSrcMac = PackGetBoolEx(p, "CheckSrcMac", index);
  11101. PackGetDataEx2(p, "SrcMacAddress", a->SrcMacAddress, sizeof(a->SrcMacAddress), index);
  11102. PackGetDataEx2(p, "SrcMacMask", a->SrcMacMask, sizeof(a->SrcMacMask), index);
  11103. a->CheckDstMac = PackGetBoolEx(p, "CheckDstMac", index);
  11104. PackGetDataEx2(p, "DstMacAddress", a->DstMacAddress, sizeof(a->DstMacAddress), index);
  11105. PackGetDataEx2(p, "DstMacMask", a->DstMacMask, sizeof(a->DstMacMask), index);
  11106. a->CheckTcpState = PackGetBoolEx(p, "CheckTcpState", index);
  11107. a->Established = PackGetBoolEx(p, "Established", index);
  11108. a->Delay = PackGetIntEx(p, "Delay", index);
  11109. a->Jitter = PackGetIntEx(p, "Jitter", index);
  11110. a->Loss = PackGetIntEx(p, "Loss", index);
  11111. a->IsIPv6 = PackGetBoolEx(p, "IsIPv6", index);
  11112. a->UniqueId = PackGetIntEx(p, "UniqueId", index);
  11113. PackGetStrEx(p, "RedirectUrl", a->RedirectUrl, sizeof(a->RedirectUrl), index);
  11114. if (a->IsIPv6)
  11115. {
  11116. PackGetIp6AddrEx(p, "SrcIpAddress6", &a->SrcIpAddress6, index);
  11117. PackGetIp6AddrEx(p, "SrcSubnetMask6", &a->SrcSubnetMask6, index);
  11118. PackGetIp6AddrEx(p, "DestIpAddress6", &a->DestIpAddress6, index);
  11119. PackGetIp6AddrEx(p, "DestSubnetMask6", &a->DestSubnetMask6, index);
  11120. }
  11121. }
  11122. void InRpcAccess(ACCESS *a, PACK *p)
  11123. {
  11124. // Validate arguments
  11125. if (a == NULL || p == NULL)
  11126. {
  11127. return;
  11128. }
  11129. InRpcAccessEx(a, p, 0);
  11130. }
  11131. void OutRpcAccessEx(PACK *p, ACCESS *a, UINT index, UINT total)
  11132. {
  11133. // Validate arguments
  11134. if (a == NULL || p == NULL)
  11135. {
  11136. return;
  11137. }
  11138. PackAddIntEx(p, "Id", a->Id, index, total);
  11139. PackAddUniStrEx(p, "Note", a->Note, index, total);
  11140. PackAddBoolEx(p, "Active", a->Active, index, total);
  11141. PackAddIntEx(p, "Priority", a->Priority, index, total);
  11142. PackAddBoolEx(p, "Discard", a->Discard, index, total);
  11143. if (a->IsIPv6)
  11144. {
  11145. PackAddIp32Ex(p, "SrcIpAddress", 0xFDFFFFDF, index, total);
  11146. PackAddIp32Ex(p, "SrcSubnetMask", 0xFFFFFFFF, index, total);
  11147. PackAddIp32Ex(p, "DestIpAddress", 0xFDFFFFDF, index, total);
  11148. PackAddIp32Ex(p, "DestSubnetMask", 0xFFFFFFFF, index, total);
  11149. }
  11150. else
  11151. {
  11152. PackAddIp32Ex(p, "SrcIpAddress", a->SrcIpAddress, index, total);
  11153. PackAddIp32Ex(p, "SrcSubnetMask", a->SrcSubnetMask, index, total);
  11154. PackAddIp32Ex(p, "DestIpAddress", a->DestIpAddress, index, total);
  11155. PackAddIp32Ex(p, "DestSubnetMask", a->DestSubnetMask, index, total);
  11156. }
  11157. PackAddIntEx(p, "Protocol", a->Protocol, index, total);
  11158. PackAddIntEx(p, "SrcPortStart", a->SrcPortStart, index, total);
  11159. PackAddIntEx(p, "SrcPortEnd", a->SrcPortEnd, index, total);
  11160. PackAddIntEx(p, "DestPortStart", a->DestPortStart, index, total);
  11161. PackAddIntEx(p, "DestPortEnd", a->DestPortEnd, index, total);
  11162. //PackAddIntEx(p, "SrcUsernameHash", a->SrcUsernameHash, index, total);
  11163. PackAddStrEx(p, "SrcUsername", a->SrcUsername, index, total);
  11164. //PackAddIntEx(p, "DestUsernameHash", a->DestUsernameHash, index, total);
  11165. PackAddStrEx(p, "DestUsername", a->DestUsername, index, total);
  11166. PackAddBoolEx(p, "CheckSrcMac", a->CheckSrcMac, index, total);
  11167. PackAddDataEx(p, "SrcMacAddress", a->SrcMacAddress, sizeof(a->SrcMacAddress), index, total);
  11168. PackAddDataEx(p, "SrcMacMask", a->SrcMacMask, sizeof(a->SrcMacMask), index, total);
  11169. PackAddBoolEx(p, "CheckDstMac", a->CheckDstMac, index, total);
  11170. PackAddDataEx(p, "DstMacAddress", a->DstMacAddress, sizeof(a->DstMacAddress), index, total);
  11171. PackAddDataEx(p, "DstMacMask", a->DstMacMask, sizeof(a->DstMacMask), index, total);
  11172. PackAddBoolEx(p, "CheckTcpState", a->CheckTcpState, index, total);
  11173. PackAddBoolEx(p, "Established", a->Established, index, total);
  11174. PackAddIntEx(p, "Delay", a->Delay, index, total);
  11175. PackAddIntEx(p, "Jitter", a->Jitter, index, total);
  11176. PackAddIntEx(p, "Loss", a->Loss, index, total);
  11177. PackAddBoolEx(p, "IsIPv6", a->IsIPv6, index, total);
  11178. PackAddIntEx(p, "UniqueId", a->UniqueId, index, total);
  11179. PackAddStrEx(p, "RedirectUrl", a->RedirectUrl, index, total);
  11180. if (a->IsIPv6)
  11181. {
  11182. PackAddIp6AddrEx(p, "SrcIpAddress6", &a->SrcIpAddress6, index, total);
  11183. PackAddIp6AddrEx(p, "SrcSubnetMask6", &a->SrcSubnetMask6, index, total);
  11184. PackAddIp6AddrEx(p, "DestIpAddress6", &a->DestIpAddress6, index, total);
  11185. PackAddIp6AddrEx(p, "DestSubnetMask6", &a->DestSubnetMask6, index, total);
  11186. }
  11187. else
  11188. {
  11189. IPV6_ADDR zero;
  11190. Zero(&zero, sizeof(zero));
  11191. PackAddIp6AddrEx(p, "SrcIpAddress6", &zero, index, total);
  11192. PackAddIp6AddrEx(p, "SrcSubnetMask6", &zero, index, total);
  11193. PackAddIp6AddrEx(p, "DestIpAddress6", &zero, index, total);
  11194. PackAddIp6AddrEx(p, "DestSubnetMask6", &zero, index, total);
  11195. }
  11196. }
  11197. void OutRpcAccess(PACK *p, ACCESS *a)
  11198. {
  11199. // Validate arguments
  11200. if (a == NULL || p == NULL)
  11201. {
  11202. return;
  11203. }
  11204. OutRpcAccessEx(p, a, 0, 1);
  11205. }
  11206. // RPC_ENUM_ACCESS_LIST
  11207. void InRpcEnumAccessList(RPC_ENUM_ACCESS_LIST *a, PACK *p)
  11208. {
  11209. UINT i;
  11210. // Validate arguments
  11211. if (a == NULL || p == NULL)
  11212. {
  11213. return;
  11214. }
  11215. Zero(a, sizeof(RPC_ENUM_ACCESS_LIST));
  11216. PackGetStr(p, "HubName", a->HubName, sizeof(a->HubName));
  11217. a->NumAccess = PackGetIndexCount(p, "Protocol");
  11218. a->Accesses = ZeroMalloc(sizeof(ACCESS) * a->NumAccess);
  11219. for (i = 0;i < a->NumAccess;i++)
  11220. {
  11221. ACCESS *e = &a->Accesses[i];
  11222. InRpcAccessEx(e, p, i);
  11223. }
  11224. }
  11225. void OutRpcEnumAccessList(PACK *p, RPC_ENUM_ACCESS_LIST *a)
  11226. {
  11227. UINT i;
  11228. // Validate arguments
  11229. if (a == NULL || p == NULL)
  11230. {
  11231. return;
  11232. }
  11233. PackAddStr(p, "HubName", a->HubName);
  11234. PackSetCurrentJsonGroupName(p, "AccessList");
  11235. for (i = 0;i < a->NumAccess;i++)
  11236. {
  11237. ACCESS *e = &a->Accesses[i];
  11238. OutRpcAccessEx(p, e, i, a->NumAccess);
  11239. }
  11240. PackSetCurrentJsonGroupName(p, NULL);
  11241. }
  11242. void FreeRpcEnumAccessList(RPC_ENUM_ACCESS_LIST *a)
  11243. {
  11244. // Validate arguments
  11245. if (a == NULL)
  11246. {
  11247. return;
  11248. }
  11249. Free(a->Accesses);
  11250. }
  11251. // AUTHDATA
  11252. void *InRpcAuthData(PACK *p, UINT *authtype, char *username)
  11253. {
  11254. wchar_t tmp[MAX_SIZE];
  11255. AUTHPASSWORD *pw;
  11256. AUTHUSERCERT *usercert;
  11257. AUTHROOTCERT *rootcert;
  11258. AUTHRADIUS *radius;
  11259. AUTHNT *nt;
  11260. BUF *b;
  11261. char plain_pw[MAX_SIZE];
  11262. // Validate arguments
  11263. if (p == NULL)
  11264. {
  11265. return NULL;
  11266. }
  11267. if (authtype == NULL)
  11268. {
  11269. return NULL;
  11270. }
  11271. *authtype = PackGetInt(p, "AuthType");
  11272. switch (*authtype)
  11273. {
  11274. case AUTHTYPE_PASSWORD:
  11275. pw = ZeroMalloc(sizeof(AUTHPASSWORD));
  11276. PackGetData2(p, "HashedKey", pw->HashedKey, sizeof(pw->HashedKey));
  11277. PackGetData2(p, "NtLmSecureHash", pw->NtLmSecureHash, sizeof(pw->NtLmSecureHash));
  11278. if (PackGetStr(p, "Auth_Password", plain_pw, sizeof(plain_pw)))
  11279. {
  11280. if (IsZero(pw->HashedKey, sizeof(pw->HashedKey)))
  11281. {
  11282. HashPassword(pw->HashedKey, username, plain_pw);
  11283. GenerateNtPasswordHash(pw->NtLmSecureHash, plain_pw);
  11284. }
  11285. }
  11286. return pw;
  11287. case AUTHTYPE_USERCERT:
  11288. usercert = ZeroMalloc(sizeof(AUTHUSERCERT));
  11289. usercert->UserX = PackGetX(p, "UserX");
  11290. return usercert;
  11291. case AUTHTYPE_ROOTCERT:
  11292. rootcert = ZeroMalloc(sizeof(AUTHROOTCERT));
  11293. b = PackGetBuf(p, "Serial");
  11294. if (b != NULL)
  11295. {
  11296. rootcert->Serial = NewXSerial(b->Buf, b->Size);
  11297. FreeBuf(b);
  11298. }
  11299. if (PackGetUniStr(p, "CommonName", tmp, sizeof(tmp)))
  11300. {
  11301. rootcert->CommonName = CopyUniStr(tmp);
  11302. }
  11303. return rootcert;
  11304. case AUTHTYPE_RADIUS:
  11305. radius = ZeroMalloc(sizeof(AUTHRADIUS));
  11306. if (PackGetUniStr(p, "RadiusUsername", tmp, sizeof(tmp)))
  11307. {
  11308. radius->RadiusUsername = CopyUniStr(tmp);
  11309. }
  11310. else
  11311. {
  11312. radius->RadiusUsername = CopyUniStr(L"");
  11313. }
  11314. return radius;
  11315. case AUTHTYPE_NT:
  11316. nt = ZeroMalloc(sizeof(AUTHNT));
  11317. if (PackGetUniStr(p, "NtUsername", tmp, sizeof(tmp)))
  11318. {
  11319. nt->NtUsername = CopyUniStr(tmp);
  11320. }
  11321. else
  11322. {
  11323. nt->NtUsername = CopyUniStr(L"");
  11324. }
  11325. return nt;
  11326. }
  11327. return NULL;
  11328. }
  11329. void OutRpcAuthData(PACK *p, void *authdata, UINT authtype)
  11330. {
  11331. AUTHPASSWORD *pw = authdata;
  11332. AUTHUSERCERT *usercert = authdata;
  11333. AUTHROOTCERT *rootcert = authdata;
  11334. AUTHRADIUS *radius = authdata;
  11335. AUTHNT *nt = authdata;
  11336. // Validate arguments
  11337. if (p == NULL)
  11338. {
  11339. return;
  11340. }
  11341. PackAddInt(p, "AuthType", authtype);
  11342. switch (authtype)
  11343. {
  11344. case AUTHTYPE_PASSWORD:
  11345. PackAddData(p, "HashedKey", pw->HashedKey, sizeof(pw->HashedKey));
  11346. PackAddData(p, "NtLmSecureHash", pw->NtLmSecureHash, sizeof(pw->NtLmSecureHash));
  11347. break;
  11348. case AUTHTYPE_USERCERT:
  11349. PackAddX(p, "UserX", usercert->UserX);
  11350. break;
  11351. case AUTHTYPE_ROOTCERT:
  11352. if (rootcert->Serial != NULL)
  11353. {
  11354. PackAddData(p, "Serial", rootcert->Serial->data, rootcert->Serial->size);
  11355. }
  11356. if (rootcert->CommonName != NULL)
  11357. {
  11358. PackAddUniStr(p, "CommonName", rootcert->CommonName);
  11359. }
  11360. break;
  11361. case AUTHTYPE_RADIUS:
  11362. PackAddUniStr(p, "RadiusUsername", radius->RadiusUsername);
  11363. break;
  11364. case AUTHTYPE_NT:
  11365. PackAddUniStr(p, "NtUsername", nt->NtUsername);
  11366. break;
  11367. }
  11368. }
  11369. void FreeRpcAuthData(void *authdata, UINT authtype)
  11370. {
  11371. FreeAuthData(authtype, authdata);
  11372. }
  11373. // RPC_SET_USER
  11374. void InRpcSetUser(RPC_SET_USER *t, PACK *p)
  11375. {
  11376. // Validate arguments
  11377. if (t == NULL || p == NULL)
  11378. {
  11379. return;
  11380. }
  11381. Zero(t, sizeof(RPC_SET_USER));
  11382. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11383. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  11384. PackGetStr(p, "GroupName", t->GroupName, sizeof(t->GroupName));
  11385. PackGetUniStr(p, "Realname", t->Realname, sizeof(t->Realname));
  11386. PackGetUniStr(p, "Note", t->Note, sizeof(t->Note));
  11387. t->CreatedTime = PackGetInt64(p, "CreatedTime");
  11388. t->UpdatedTime = PackGetInt64(p, "UpdatedTime");
  11389. t->ExpireTime = PackGetInt64(p, "ExpireTime");
  11390. t->AuthData = InRpcAuthData(p, &t->AuthType, t->Name);
  11391. t->NumLogin = PackGetInt(p, "NumLogin");
  11392. InRpcTraffic(&t->Traffic, p);
  11393. if (PackGetBool(p, "UsePolicy"))
  11394. {
  11395. t->Policy = ZeroMalloc(sizeof(POLICY));
  11396. InRpcPolicy(t->Policy, p);
  11397. }
  11398. }
  11399. void OutRpcSetUser(PACK *p, RPC_SET_USER *t)
  11400. {
  11401. // Validate arguments
  11402. if (t == NULL || p == NULL)
  11403. {
  11404. return;
  11405. }
  11406. PackAddStr(p, "HubName", t->HubName);
  11407. PackAddStr(p, "Name", t->Name);
  11408. PackAddStr(p, "GroupName", t->GroupName);
  11409. PackAddUniStr(p, "Realname", t->Realname);
  11410. PackAddUniStr(p, "Note", t->Note);
  11411. PackAddTime64(p, "CreatedTime", t->CreatedTime);
  11412. PackAddTime64(p, "UpdatedTime", t->UpdatedTime);
  11413. PackAddTime64(p, "ExpireTime", t->ExpireTime);
  11414. OutRpcAuthData(p, t->AuthData, t->AuthType);
  11415. PackAddInt(p, "NumLogin", t->NumLogin);
  11416. OutRpcTraffic(p, &t->Traffic);
  11417. if (t->Policy != NULL)
  11418. {
  11419. PackAddBool(p, "UsePolicy", true);
  11420. OutRpcPolicy(p, t->Policy);
  11421. }
  11422. }
  11423. void FreeRpcSetUser(RPC_SET_USER *t)
  11424. {
  11425. // Validate arguments
  11426. if (t == NULL)
  11427. {
  11428. return;
  11429. }
  11430. FreeRpcAuthData(t->AuthData, t->AuthType);
  11431. if (t->Policy)
  11432. {
  11433. Free(t->Policy);
  11434. }
  11435. }
  11436. // RPC_ENUM_USER
  11437. void InRpcEnumUser(RPC_ENUM_USER *t, PACK *p)
  11438. {
  11439. UINT i;
  11440. // Validate arguments
  11441. if (t == NULL || p == NULL)
  11442. {
  11443. return;
  11444. }
  11445. Zero(t, sizeof(RPC_ENUM_USER));
  11446. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11447. t->NumUser = PackGetIndexCount(p, "Name");
  11448. t->Users = ZeroMalloc(sizeof(RPC_ENUM_USER_ITEM) * t->NumUser);
  11449. for (i = 0;i < t->NumUser;i++)
  11450. {
  11451. RPC_ENUM_USER_ITEM *e = &t->Users[i];
  11452. PackGetStrEx(p, "Name", e->Name, sizeof(e->Name), i);
  11453. PackGetStrEx(p, "GroupName", e->GroupName, sizeof(e->GroupName), i);
  11454. PackGetUniStrEx(p, "Realname", e->Realname, sizeof(e->Realname), i);
  11455. PackGetUniStrEx(p, "Note", e->Note, sizeof(e->Note), i);
  11456. e->AuthType = PackGetIntEx(p, "AuthType", i);
  11457. e->LastLoginTime = PackGetInt64Ex(p, "LastLoginTime", i);
  11458. e->NumLogin = PackGetIntEx(p, "NumLogin", i);
  11459. e->DenyAccess = PackGetBoolEx(p, "DenyAccess", i);
  11460. e->IsTrafficFilled = PackGetBoolEx(p, "IsTrafficFilled", i);
  11461. InRpcTrafficEx(&e->Traffic, p, i);
  11462. e->IsExpiresFilled = PackGetBoolEx(p, "IsExpiresFilled", i);
  11463. e->Expires = PackGetInt64Ex(p, "Expires", i);
  11464. }
  11465. }
  11466. void OutRpcEnumUser(PACK *p, RPC_ENUM_USER *t)
  11467. {
  11468. UINT i;
  11469. // Validate arguments
  11470. if (t == NULL || p == NULL)
  11471. {
  11472. return;
  11473. }
  11474. PackAddStr(p, "HubName", t->HubName);
  11475. PackSetCurrentJsonGroupName(p, "UserList");
  11476. for (i = 0;i < t->NumUser;i++)
  11477. {
  11478. RPC_ENUM_USER_ITEM *e = &t->Users[i];
  11479. PackAddStrEx(p, "Name", e->Name, i, t->NumUser);
  11480. PackAddStrEx(p, "GroupName", e->GroupName, i, t->NumUser);
  11481. PackAddUniStrEx(p, "Realname", e->Realname, i, t->NumUser);
  11482. PackAddUniStrEx(p, "Note", e->Note, i, t->NumUser);
  11483. PackAddIntEx(p, "AuthType", e->AuthType, i, t->NumUser);
  11484. PackAddTime64Ex(p, "LastLoginTime", e->LastLoginTime, i, t->NumUser);
  11485. PackAddIntEx(p, "NumLogin", e->NumLogin, i, t->NumUser);
  11486. PackAddBoolEx(p, "DenyAccess", e->DenyAccess, i, t->NumUser);
  11487. PackAddBoolEx(p, "IsTrafficFilled", e->IsTrafficFilled, i, t->NumUser);
  11488. OutRpcTrafficEx(&e->Traffic, p, i, t->NumUser);
  11489. PackAddBoolEx(p, "IsExpiresFilled", e->IsExpiresFilled, i, t->NumUser);
  11490. PackAddTime64Ex(p, "Expires", e->Expires, i, t->NumUser);
  11491. }
  11492. PackSetCurrentJsonGroupName(p, NULL);
  11493. }
  11494. void FreeRpcEnumUser(RPC_ENUM_USER *t)
  11495. {
  11496. // Validate arguments
  11497. if (t == NULL)
  11498. {
  11499. return;
  11500. }
  11501. Free(t->Users);
  11502. }
  11503. // RPC_SET_GROUP
  11504. void InRpcSetGroup(RPC_SET_GROUP *t, PACK *p)
  11505. {
  11506. // Validate arguments
  11507. if (t == NULL || p == NULL)
  11508. {
  11509. return;
  11510. }
  11511. Zero(t, sizeof(RPC_SET_GROUP));
  11512. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11513. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  11514. PackGetUniStr(p, "Realname", t->Realname, sizeof(t->Realname));
  11515. PackGetUniStr(p, "Note", t->Note, sizeof(t->Note));
  11516. InRpcTraffic(&t->Traffic, p);
  11517. if (PackGetBool(p, "UsePolicy"))
  11518. {
  11519. t->Policy = ZeroMalloc(sizeof(POLICY));
  11520. InRpcPolicy(t->Policy, p);
  11521. }
  11522. }
  11523. void OutRpcSetGroup(PACK *p, RPC_SET_GROUP *t)
  11524. {
  11525. // Validate arguments
  11526. if (t == NULL || p == NULL)
  11527. {
  11528. return;
  11529. }
  11530. PackAddStr(p, "HubName", t->HubName);
  11531. PackAddStr(p, "Name", t->Name);
  11532. PackAddUniStr(p, "Realname", t->Realname);
  11533. PackAddUniStr(p, "Note", t->Note);
  11534. OutRpcTraffic(p, &t->Traffic);
  11535. if (t->Policy != NULL)
  11536. {
  11537. PackAddBool(p, "UsePolicy", true);
  11538. OutRpcPolicy(p, t->Policy);
  11539. }
  11540. }
  11541. void FreeRpcSetGroup(RPC_SET_GROUP *t)
  11542. {
  11543. Free(t->Policy);
  11544. }
  11545. // RPC_ENUM_GROUP
  11546. void InRpcEnumGroup(RPC_ENUM_GROUP *t, PACK *p)
  11547. {
  11548. UINT i;
  11549. // Validate arguments
  11550. if (t == NULL || p == NULL)
  11551. {
  11552. return;
  11553. }
  11554. Zero(t, sizeof(RPC_ENUM_GROUP));
  11555. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11556. t->NumGroup = PackGetIndexCount(p, "Name");
  11557. t->Groups = ZeroMalloc(sizeof(RPC_ENUM_GROUP_ITEM) * t->NumGroup);
  11558. for (i = 0;i < t->NumGroup;i++)
  11559. {
  11560. RPC_ENUM_GROUP_ITEM *e = &t->Groups[i];
  11561. PackGetStrEx(p, "Name", e->Name, sizeof(e->Name), i);
  11562. PackGetUniStrEx(p, "Realname", e->Realname, sizeof(e->Realname), i);
  11563. PackGetUniStrEx(p, "Note", e->Note, sizeof(e->Note), i);
  11564. e->NumUsers = PackGetIntEx(p, "NumUsers", i);
  11565. e->DenyAccess = PackGetBoolEx(p, "DenyAccess", i);
  11566. }
  11567. }
  11568. void OutRpcEnumGroup(PACK *p, RPC_ENUM_GROUP *t)
  11569. {
  11570. UINT i;
  11571. // Validate arguments
  11572. if (t == NULL || p == NULL)
  11573. {
  11574. return;
  11575. }
  11576. PackAddStr(p, "HubName", t->HubName);
  11577. PackSetCurrentJsonGroupName(p, "GroupList");
  11578. for (i = 0;i < t->NumGroup;i++)
  11579. {
  11580. RPC_ENUM_GROUP_ITEM *e = &t->Groups[i];
  11581. PackAddStrEx(p, "Name", e->Name, i, t->NumGroup);
  11582. PackAddUniStrEx(p, "Realname", e->Realname, i, t->NumGroup);
  11583. PackAddUniStrEx(p, "Note", e->Note, i, t->NumGroup);
  11584. PackAddIntEx(p, "NumUsers", e->NumUsers, i, t->NumGroup);
  11585. PackAddBoolEx(p, "DenyAccess", e->DenyAccess, i, t->NumGroup);
  11586. }
  11587. PackSetCurrentJsonGroupName(p, NULL);
  11588. }
  11589. void FreeRpcEnumGroup(RPC_ENUM_GROUP *t)
  11590. {
  11591. // Validate arguments
  11592. if (t == NULL)
  11593. {
  11594. return;
  11595. }
  11596. Free(t->Groups);
  11597. }
  11598. // RPC_DELETE_USER
  11599. void InRpcDeleteUser(RPC_DELETE_USER *t, PACK *p)
  11600. {
  11601. // Validate arguments
  11602. if (t == NULL || p == NULL)
  11603. {
  11604. return;
  11605. }
  11606. Zero(t, sizeof(RPC_DELETE_USER));
  11607. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11608. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  11609. }
  11610. void OutRpcDeleteUser(PACK *p, RPC_DELETE_USER *t)
  11611. {
  11612. // Validate arguments
  11613. if (t == NULL || p == NULL)
  11614. {
  11615. return;
  11616. }
  11617. PackAddStr(p, "HubName", t->HubName);
  11618. PackAddStr(p, "Name", t->Name);
  11619. }
  11620. // RPC_ENUM_SESSION
  11621. void InRpcEnumSession(RPC_ENUM_SESSION *t, PACK *p)
  11622. {
  11623. UINT i;
  11624. // Validate arguments
  11625. if (t == NULL || p == NULL)
  11626. {
  11627. return;
  11628. }
  11629. Zero(t, sizeof(RPC_ENUM_SESSION));
  11630. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11631. t->NumSession = PackGetIndexCount(p, "Name");
  11632. t->Sessions = ZeroMalloc(sizeof(RPC_ENUM_SESSION_ITEM) * t->NumSession);
  11633. for (i = 0;i < t->NumSession;i++)
  11634. {
  11635. RPC_ENUM_SESSION_ITEM *e = &t->Sessions[i];
  11636. PackGetStrEx(p, "Name", e->Name, sizeof(e->Name), i);
  11637. PackGetStrEx(p, "Username", e->Username, sizeof(e->Username), i);
  11638. e->Ip = PackGetIntEx(p, "Ip", i);
  11639. PackGetIpEx(p, "ClientIP", &e->ClientIP, i);
  11640. PackGetStrEx(p, "Hostname", e->Hostname, sizeof(e->Hostname), i);
  11641. e->MaxNumTcp = PackGetIntEx(p, "MaxNumTcp", i);
  11642. e->CurrentNumTcp = PackGetIntEx(p, "CurrentNumTcp", i);
  11643. e->PacketSize = PackGetInt64Ex(p, "PacketSize", i);
  11644. e->PacketNum = PackGetInt64Ex(p, "PacketNum", i);
  11645. e->RemoteSession = PackGetBoolEx(p, "RemoteSession", i);
  11646. e->LinkMode = PackGetBoolEx(p, "LinkMode", i);
  11647. e->SecureNATMode = PackGetBoolEx(p, "SecureNATMode", i);
  11648. e->BridgeMode = PackGetBoolEx(p, "BridgeMode", i);
  11649. e->Layer3Mode = PackGetBoolEx(p, "Layer3Mode", i);
  11650. e->Client_BridgeMode = PackGetBoolEx(p, "Client_BridgeMode", i);
  11651. e->Client_MonitorMode = PackGetBoolEx(p, "Client_MonitorMode", i);
  11652. PackGetStrEx(p, "RemoteHostname", e->RemoteHostname, sizeof(e->RemoteHostname), i);
  11653. e->VLanId = PackGetIntEx(p, "VLanId", i);
  11654. PackGetDataEx2(p, "UniqueId", e->UniqueId, sizeof(e->UniqueId), i);
  11655. e->IsDormantEnabled = PackGetBoolEx(p, "IsDormantEnabled", i);
  11656. e->IsDormant = PackGetBoolEx(p, "IsDormant", i);
  11657. e->LastCommDormant = PackGetInt64Ex(p, "LastCommDormant", i);
  11658. e->CreatedTime = PackGetInt64Ex(p, "CreatedTime", i);
  11659. e->LastCommTime = PackGetInt64Ex(p, "LastCommTime", i);
  11660. }
  11661. }
  11662. void OutRpcEnumSession(PACK *p, RPC_ENUM_SESSION *t)
  11663. {
  11664. UINT i;
  11665. // Validate arguments
  11666. if (t == NULL || p == NULL)
  11667. {
  11668. return;
  11669. }
  11670. PackAddStr(p, "HubName", t->HubName);
  11671. PackSetCurrentJsonGroupName(p, "SessionList");
  11672. for (i = 0;i < t->NumSession;i++)
  11673. {
  11674. RPC_ENUM_SESSION_ITEM *e = &t->Sessions[i];
  11675. PackAddStrEx(p, "Name", e->Name, i, t->NumSession);
  11676. PackAddStrEx(p, "Username", e->Username, i, t->NumSession);
  11677. PackAddIp32Ex(p, "Ip", e->Ip, i, t->NumSession);
  11678. PackAddIpEx(p, "ClientIP", &e->ClientIP, i, t->NumSession);
  11679. PackAddStrEx(p, "Hostname", e->Hostname, i, t->NumSession);
  11680. PackAddIntEx(p, "MaxNumTcp", e->MaxNumTcp, i, t->NumSession);
  11681. PackAddIntEx(p, "CurrentNumTcp", e->CurrentNumTcp, i, t->NumSession);
  11682. PackAddInt64Ex(p, "PacketSize", e->PacketSize, i, t->NumSession);
  11683. PackAddInt64Ex(p, "PacketNum", e->PacketNum, i, t->NumSession);
  11684. PackAddBoolEx(p, "RemoteSession", e->RemoteSession, i, t->NumSession);
  11685. PackAddStrEx(p, "RemoteHostname", e->RemoteHostname, i, t->NumSession);
  11686. PackAddBoolEx(p, "LinkMode", e->LinkMode, i, t->NumSession);
  11687. PackAddBoolEx(p, "SecureNATMode", e->SecureNATMode, i, t->NumSession);
  11688. PackAddBoolEx(p, "BridgeMode", e->BridgeMode, i, t->NumSession);
  11689. PackAddBoolEx(p, "Layer3Mode", e->Layer3Mode, i, t->NumSession);
  11690. PackAddBoolEx(p, "Client_BridgeMode", e->Client_BridgeMode, i, t->NumSession);
  11691. PackAddBoolEx(p, "Client_MonitorMode", e->Client_MonitorMode, i, t->NumSession);
  11692. PackAddIntEx(p, "VLanId", e->VLanId, i, t->NumSession);
  11693. PackAddDataEx(p, "UniqueId", e->UniqueId, sizeof(e->UniqueId), i, t->NumSession);
  11694. PackAddBoolEx(p, "IsDormantEnabled", e->IsDormantEnabled, i, t->NumSession);
  11695. PackAddBoolEx(p, "IsDormant", e->IsDormant, i, t->NumSession);
  11696. PackAddTime64Ex(p, "LastCommDormant", e->LastCommDormant, i, t->NumSession);
  11697. PackAddTime64Ex(p, "CreatedTime", e->CreatedTime, i, t->NumSession);
  11698. PackAddTime64Ex(p, "LastCommTime", e->LastCommTime, i, t->NumSession);
  11699. }
  11700. PackSetCurrentJsonGroupName(p, NULL);
  11701. }
  11702. void FreeRpcEnumSession(RPC_ENUM_SESSION *t)
  11703. {
  11704. // Validate arguments
  11705. if (t == NULL)
  11706. {
  11707. return;
  11708. }
  11709. Free(t->Sessions);
  11710. }
  11711. // RPC_KEY_PAIR
  11712. void InRpcKeyPair(RPC_KEY_PAIR *t, PACK *p)
  11713. {
  11714. // Validate arguments
  11715. if (t == NULL || p == NULL)
  11716. {
  11717. return;
  11718. }
  11719. t->Cert = PackGetX(p, "Cert");
  11720. t->Key = PackGetK(p, "Key");
  11721. t->Flag1 = PackGetInt(p, "Flag1");
  11722. }
  11723. void OutRpcKeyPair(PACK *p, RPC_KEY_PAIR *t)
  11724. {
  11725. // Validate arguments
  11726. if (p == NULL || t == NULL)
  11727. {
  11728. return;
  11729. }
  11730. PackAddX(p, "Cert", t->Cert);
  11731. PackAddK(p, "Key", t->Key);
  11732. PackAddInt(p, "Flag1", t->Flag1);
  11733. }
  11734. void FreeRpcKeyPair(RPC_KEY_PAIR *t)
  11735. {
  11736. FreeX(t->Cert);
  11737. FreeK(t->Key);
  11738. }
  11739. // NODE_INFO
  11740. void InRpcNodeInfo(NODE_INFO *t, PACK *p)
  11741. {
  11742. // Validate arguments
  11743. if (t == NULL || p == NULL)
  11744. {
  11745. return;
  11746. }
  11747. Zero(t, sizeof(NODE_INFO));
  11748. PackGetStr(p, "ClientProductName", t->ClientProductName, sizeof(t->ClientProductName));
  11749. PackGetStr(p, "ServerProductName", t->ServerProductName, sizeof(t->ServerProductName));
  11750. PackGetStr(p, "ClientOsName", t->ClientOsName, sizeof(t->ClientOsName));
  11751. PackGetStr(p, "ClientOsVer", t->ClientOsVer, sizeof(t->ClientOsVer));
  11752. PackGetStr(p, "ClientOsProductId", t->ClientOsProductId, sizeof(t->ClientOsProductId));
  11753. PackGetStr(p, "ClientHostname", t->ClientHostname, sizeof(t->ClientHostname));
  11754. PackGetStr(p, "ServerHostname", t->ServerHostname, sizeof(t->ServerHostname));
  11755. PackGetStr(p, "ProxyHostname", t->ProxyHostname, sizeof(t->ProxyHostname));
  11756. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11757. PackGetData2(p, "UniqueId", t->UniqueId, sizeof(t->UniqueId));
  11758. t->ClientProductVer = LittleEndian32(PackGetInt(p, "ClientProductVer"));
  11759. t->ClientProductBuild = LittleEndian32(PackGetInt(p, "ClientProductBuild"));
  11760. t->ServerProductVer = LittleEndian32(PackGetInt(p, "ServerProductVer"));
  11761. t->ServerProductBuild = LittleEndian32(PackGetInt(p, "ServerProductBuild"));
  11762. t->ClientIpAddress = PackGetIp32(p, "ClientIpAddress");
  11763. PackGetData2(p, "ClientIpAddress6", t->ClientIpAddress6, sizeof(t->ClientIpAddress6));
  11764. t->ClientPort = LittleEndian32(PackGetInt(p, "ClientPort"));
  11765. t->ServerIpAddress = PackGetIp32(p, "ServerIpAddress");
  11766. PackGetData2(p, "ServerIpAddress6", t->ServerIpAddress6, sizeof(t->ServerIpAddress6));
  11767. t->ServerPort = LittleEndian32(PackGetInt(p, "ServerPort2"));
  11768. t->ProxyIpAddress = PackGetIp32(p, "ProxyIpAddress");
  11769. PackGetData2(p, "ProxyIpAddress6", t->ProxyIpAddress6, sizeof(t->ProxyIpAddress6));
  11770. t->ProxyPort = LittleEndian32(PackGetInt(p, "ProxyPort"));
  11771. }
  11772. void OutRpcNodeInfo(PACK *p, NODE_INFO *t)
  11773. {
  11774. // Validate arguments
  11775. if (t == NULL || p == NULL)
  11776. {
  11777. return;
  11778. }
  11779. PackAddStr(p, "ClientProductName", t->ClientProductName);
  11780. PackAddStr(p, "ServerProductName", t->ServerProductName);
  11781. PackAddStr(p, "ClientOsName", t->ClientOsName);
  11782. PackAddStr(p, "ClientOsVer", t->ClientOsVer);
  11783. PackAddStr(p, "ClientOsProductId", t->ClientOsProductId);
  11784. PackAddStr(p, "ClientHostname", t->ClientHostname);
  11785. PackAddStr(p, "ServerHostname", t->ServerHostname);
  11786. PackAddStr(p, "ProxyHostname", t->ProxyHostname);
  11787. PackAddStr(p, "HubName", t->HubName);
  11788. PackAddData(p, "UniqueId", t->UniqueId, sizeof(t->UniqueId));
  11789. PackAddInt(p, "ClientProductVer", LittleEndian32(t->ClientProductVer));
  11790. PackAddInt(p, "ClientProductBuild", LittleEndian32(t->ClientProductBuild));
  11791. PackAddInt(p, "ServerProductVer", LittleEndian32(t->ServerProductVer));
  11792. PackAddInt(p, "ServerProductBuild", LittleEndian32(t->ServerProductBuild));
  11793. PackAddIp32(p, "ClientIpAddress", t->ClientIpAddress);
  11794. PackAddData(p, "ClientIpAddress6", t->ClientIpAddress6, sizeof(t->ClientIpAddress6));
  11795. PackAddInt(p, "ClientPort", LittleEndian32(t->ClientPort));
  11796. PackAddIp32(p, "ServerIpAddress", t->ServerIpAddress);
  11797. PackAddData(p, "ServerIpAddress6", t->ServerIpAddress6, sizeof(t->ServerIpAddress6));
  11798. PackAddInt(p, "ServerPort2", LittleEndian32(t->ServerPort));
  11799. PackAddIp32(p, "ProxyIpAddress", t->ProxyIpAddress);
  11800. PackAddData(p, "ProxyIpAddress6", t->ProxyIpAddress6, sizeof(t->ProxyIpAddress6));
  11801. PackAddInt(p, "ProxyPort", LittleEndian32(t->ProxyPort));
  11802. }
  11803. // RPC_SESSION_STATUS
  11804. void InRpcSessionStatus(RPC_SESSION_STATUS *t, PACK *p)
  11805. {
  11806. // Validate arguments
  11807. if (t == NULL || p == NULL)
  11808. {
  11809. return;
  11810. }
  11811. Zero(t, sizeof(RPC_SESSION_STATUS));
  11812. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11813. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  11814. PackGetStr(p, "Username", t->Username, sizeof(t->Username));
  11815. PackGetStr(p, "GroupName", t->GroupName, sizeof(t->GroupName));
  11816. PackGetStr(p, "RealUsername", t->RealUsername, sizeof(t->RealUsername));
  11817. t->ClientIp = PackGetIp32(p, "SessionStatus_ClientIp");
  11818. PackGetData2(p, "SessionStatus_ClientIp6", t->ClientIp6, sizeof(t->ClientIp6));
  11819. PackGetStr(p, "SessionStatus_ClientHostName", t->ClientHostName, sizeof(t->ClientHostName));
  11820. PackGetIp(p, "Client_Ip_Address", &t->ClientIpAddress);
  11821. InRpcClientGetConnectionStatus(&t->Status, p);
  11822. InRpcNodeInfo(&t->NodeInfo, p);
  11823. }
  11824. void OutRpcSessionStatus(PACK *p, RPC_SESSION_STATUS *t)
  11825. {
  11826. // Validate arguments
  11827. if (t == NULL || p == NULL)
  11828. {
  11829. return;
  11830. }
  11831. PackAddStr(p, "HubName", t->HubName);
  11832. PackAddStr(p, "Name", t->Name);
  11833. PackAddStr(p, "Username", t->Username);
  11834. PackAddStr(p, "GroupName", t->GroupName);
  11835. PackAddStr(p, "RealUsername", t->RealUsername);
  11836. PackAddIp32(p, "SessionStatus_ClientIp", t->ClientIp);
  11837. PackAddData(p, "SessionStatus_ClientIp6", t->ClientIp6, sizeof(t->ClientIp6));
  11838. PackAddStr(p, "SessionStatus_ClientHostName", t->ClientHostName);
  11839. PackAddIp(p, "Client_Ip_Address", &t->ClientIpAddress);
  11840. OutRpcClientGetConnectionStatus(p, &t->Status);
  11841. OutRpcNodeInfo(p, &t->NodeInfo);
  11842. }
  11843. void FreeRpcSessionStatus(RPC_SESSION_STATUS *t)
  11844. {
  11845. // Validate arguments
  11846. if (t == NULL)
  11847. {
  11848. return;
  11849. }
  11850. CiFreeClientGetConnectionStatus(&t->Status);
  11851. }
  11852. // RPC_DELETE_SESSION
  11853. void InRpcDeleteSession(RPC_DELETE_SESSION *t, PACK *p)
  11854. {
  11855. // Validate arguments
  11856. if (t == NULL || p == NULL)
  11857. {
  11858. return;
  11859. }
  11860. Zero(t, sizeof(RPC_DELETE_SESSION));
  11861. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11862. PackGetStr(p, "Name", t->Name, sizeof(t->Name));
  11863. }
  11864. void OutRpcDeleteSession(PACK *p, RPC_DELETE_SESSION *t)
  11865. {
  11866. // Validate arguments
  11867. if (t == NULL || p == NULL)
  11868. {
  11869. return;
  11870. }
  11871. PackAddStr(p, "HubName", t->HubName);
  11872. PackAddStr(p, "Name", t->Name);
  11873. }
  11874. // RPC_ENUM_MAC_TABLE
  11875. void InRpcEnumMacTable(RPC_ENUM_MAC_TABLE *t, PACK *p)
  11876. {
  11877. UINT i;
  11878. // Validate arguments
  11879. if (t == NULL || p == NULL)
  11880. {
  11881. return;
  11882. }
  11883. Zero(t, sizeof(RPC_ENUM_MAC_TABLE));
  11884. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11885. t->NumMacTable = PackGetIndexCount(p, "SessionName");
  11886. t->MacTables = ZeroMalloc(sizeof(RPC_ENUM_MAC_TABLE_ITEM) * t->NumMacTable);
  11887. for (i = 0;i < t->NumMacTable;i++)
  11888. {
  11889. RPC_ENUM_MAC_TABLE_ITEM *e = &t->MacTables[i];
  11890. e->Key = PackGetIntEx(p, "Key", i);
  11891. PackGetStrEx(p, "SessionName", e->SessionName, sizeof(e->SessionName), i);
  11892. PackGetDataEx2(p, "MacAddress", e->MacAddress, sizeof(e->MacAddress), i);
  11893. e->VlanId = PackGetIntEx(p, "VlanId", i);
  11894. e->CreatedTime = PackGetInt64Ex(p, "CreatedTime", i);
  11895. e->UpdatedTime = PackGetInt64Ex(p, "UpdatedTime", i);
  11896. e->RemoteItem = PackGetBoolEx(p, "RemoteItem", i);
  11897. PackGetStrEx(p, "RemoteHostname", e->RemoteHostname, sizeof(e->RemoteHostname), i);
  11898. }
  11899. }
  11900. void OutRpcEnumMacTable(PACK *p, RPC_ENUM_MAC_TABLE *t)
  11901. {
  11902. UINT i;
  11903. // Validate arguments
  11904. if (t == NULL || p == NULL)
  11905. {
  11906. return;
  11907. }
  11908. PackAddStr(p, "HubName", t->HubName);
  11909. PackSetCurrentJsonGroupName(p, "MacTable");
  11910. for (i = 0;i < t->NumMacTable;i++)
  11911. {
  11912. RPC_ENUM_MAC_TABLE_ITEM *e = &t->MacTables[i];
  11913. PackAddIntEx(p, "Key", e->Key, i, t->NumMacTable);
  11914. PackAddStrEx(p, "SessionName", e->SessionName, i, t->NumMacTable);
  11915. PackAddDataEx(p, "MacAddress", e->MacAddress, sizeof(e->MacAddress), i, t->NumMacTable);
  11916. PackAddIntEx(p, "VlanId", e->VlanId, i, t->NumMacTable);
  11917. PackAddTime64Ex(p, "CreatedTime", e->CreatedTime, i, t->NumMacTable);
  11918. PackAddTime64Ex(p, "UpdatedTime", e->UpdatedTime, i, t->NumMacTable);
  11919. PackAddBoolEx(p, "RemoteItem", e->RemoteItem, i, t->NumMacTable);
  11920. PackAddStrEx(p, "RemoteHostname", e->RemoteHostname, i, t->NumMacTable);
  11921. }
  11922. PackSetCurrentJsonGroupName(p, NULL);
  11923. }
  11924. void FreeRpcEnumMacTable(RPC_ENUM_MAC_TABLE *t)
  11925. {
  11926. // Validate arguments
  11927. if (t == NULL)
  11928. {
  11929. return;
  11930. }
  11931. Free(t->MacTables);
  11932. }
  11933. // RPC_ENUM_IP_TABLE
  11934. void InRpcEnumIpTable(RPC_ENUM_IP_TABLE *t, PACK *p)
  11935. {
  11936. UINT i;
  11937. // Validate arguments
  11938. if (t == NULL || p == NULL)
  11939. {
  11940. return;
  11941. }
  11942. Zero(t, sizeof(RPC_ENUM_IP_TABLE));
  11943. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  11944. t->NumIpTable = PackGetIndexCount(p, "SessionName");
  11945. t->IpTables = ZeroMalloc(sizeof(RPC_ENUM_IP_TABLE_ITEM) * t->NumIpTable);
  11946. for (i = 0;i < t->NumIpTable;i++)
  11947. {
  11948. RPC_ENUM_IP_TABLE_ITEM *e = &t->IpTables[i];
  11949. e->Key = PackGetIntEx(p, "Key", i);
  11950. PackGetStrEx(p, "SessionName", e->SessionName, sizeof(e->SessionName), i);
  11951. e->Ip = PackGetIp32Ex(p, "Ip", i);
  11952. if (PackGetIpEx(p, "IpV6", &e->IpV6, i) == false)
  11953. {
  11954. UINTToIP(&e->IpV6, e->Ip);
  11955. }
  11956. PackGetIp(p, "IpAddress", &e->IpAddress);
  11957. e->DhcpAllocated = PackGetBoolEx(p, "DhcpAllocated", i);
  11958. e->CreatedTime = PackGetInt64Ex(p, "CreatedTime", i);
  11959. e->UpdatedTime = PackGetInt64Ex(p, "UpdatedTime", i);
  11960. e->RemoteItem = PackGetBoolEx(p, "RemoteItem", i);
  11961. PackGetStrEx(p, "RemoteHostname", e->RemoteHostname, sizeof(e->RemoteHostname), i);
  11962. }
  11963. }
  11964. void OutRpcEnumIpTable(PACK *p, RPC_ENUM_IP_TABLE *t)
  11965. {
  11966. UINT i;
  11967. // Validate arguments
  11968. if (t == NULL || p == NULL)
  11969. {
  11970. return;
  11971. }
  11972. PackAddStr(p, "HubName", t->HubName);
  11973. PackSetCurrentJsonGroupName(p, "IpTable");
  11974. for (i = 0;i < t->NumIpTable;i++)
  11975. {
  11976. RPC_ENUM_IP_TABLE_ITEM *e = &t->IpTables[i];
  11977. PackAddIntEx(p, "Key", e->Key, i, t->NumIpTable);
  11978. PackAddStrEx(p, "SessionName", e->SessionName, i, t->NumIpTable);
  11979. PackAddIp32Ex(p, "Ip", e->Ip, i, t->NumIpTable);
  11980. PackAddIpEx(p, "IpV6", &e->IpV6, i, t->NumIpTable);
  11981. PackAddIpEx(p, "IpAddress", &e->IpAddress, i, t->NumIpTable);
  11982. PackAddBoolEx(p, "DhcpAllocated", e->DhcpAllocated, i, t->NumIpTable);
  11983. PackAddTime64Ex(p, "CreatedTime", e->CreatedTime, i, t->NumIpTable);
  11984. PackAddTime64Ex(p, "UpdatedTime", e->UpdatedTime, i, t->NumIpTable);
  11985. PackAddBoolEx(p, "RemoteItem", e->RemoteItem, i, t->NumIpTable);
  11986. PackAddStrEx(p, "RemoteHostname", e->RemoteHostname, i, t->NumIpTable);
  11987. }
  11988. PackSetCurrentJsonGroupName(p, NULL);
  11989. }
  11990. void FreeRpcEnumIpTable(RPC_ENUM_IP_TABLE *t)
  11991. {
  11992. // Validate arguments
  11993. if (t == NULL)
  11994. {
  11995. return;
  11996. }
  11997. Free(t->IpTables);
  11998. }
  11999. // RPC_DELETE_TABLE
  12000. void InRpcDeleteTable(RPC_DELETE_TABLE *t, PACK *p)
  12001. {
  12002. // Validate arguments
  12003. if (t == NULL || p == NULL)
  12004. {
  12005. return;
  12006. }
  12007. Zero(t, sizeof(RPC_DELETE_TABLE));
  12008. PackGetStr(p, "HubName", t->HubName, sizeof(t->HubName));
  12009. t->Key = PackGetInt(p, "Key");
  12010. }
  12011. void OutRpcDeleteTable(PACK *p, RPC_DELETE_TABLE *t)
  12012. {
  12013. // Validate arguments
  12014. if (t == NULL || p == NULL)
  12015. {
  12016. return;
  12017. }
  12018. PackAddStr(p, "HubName", t->HubName);
  12019. PackAddInt(p, "Key", t->Key);
  12020. }
  12021. // Adjoin RPC_ENUM_IP_TABLE
  12022. void AdjoinRpcEnumIpTable(RPC_ENUM_IP_TABLE *dest, RPC_ENUM_IP_TABLE *src)
  12023. {
  12024. UINT old_num;
  12025. UINT i, n;
  12026. if (dest == NULL || src == NULL)
  12027. {
  12028. return;
  12029. }
  12030. if (src->NumIpTable == 0)
  12031. {
  12032. return;
  12033. }
  12034. old_num = dest->NumIpTable;
  12035. dest->NumIpTable += src->NumIpTable;
  12036. dest->IpTables = ReAlloc(dest->IpTables, sizeof(RPC_ENUM_IP_TABLE_ITEM) * dest->NumIpTable);
  12037. n = 0;
  12038. for (i = old_num;i < dest->NumIpTable;i++)
  12039. {
  12040. Copy(&dest->IpTables[i], &src->IpTables[n++], sizeof(RPC_ENUM_IP_TABLE_ITEM));
  12041. }
  12042. }
  12043. // Adjoin RPC_ENUM_MAC_TABLE
  12044. void AdjoinRpcEnumMacTable(RPC_ENUM_MAC_TABLE *dest, RPC_ENUM_MAC_TABLE *src)
  12045. {
  12046. UINT old_num;
  12047. UINT i, n;
  12048. if (dest == NULL || src == NULL)
  12049. {
  12050. return;
  12051. }
  12052. if (src->NumMacTable == 0)
  12053. {
  12054. return;
  12055. }
  12056. old_num = dest->NumMacTable;
  12057. dest->NumMacTable += src->NumMacTable;
  12058. dest->MacTables = ReAlloc(dest->MacTables, sizeof(RPC_ENUM_MAC_TABLE_ITEM) * dest->NumMacTable);
  12059. n = 0;
  12060. for (i = old_num;i < dest->NumMacTable;i++)
  12061. {
  12062. Copy(&dest->MacTables[i], &src->MacTables[n++], sizeof(RPC_ENUM_MAC_TABLE_ITEM));
  12063. }
  12064. }
  12065. // Adjoin RPC_ENUM_SESSION
  12066. void AdjoinRpcEnumSession(RPC_ENUM_SESSION *dest, RPC_ENUM_SESSION *src)
  12067. {
  12068. UINT old_num;
  12069. UINT i, n;
  12070. if (dest == NULL || src == NULL)
  12071. {
  12072. return;
  12073. }
  12074. if (src->NumSession == 0)
  12075. {
  12076. return;
  12077. }
  12078. old_num = dest->NumSession;
  12079. dest->NumSession += src->NumSession;
  12080. dest->Sessions = ReAlloc(dest->Sessions, sizeof(RPC_ENUM_SESSION_ITEM) * dest->NumSession);
  12081. n = 0;
  12082. for (i = old_num;i < dest->NumSession;i++)
  12083. {
  12084. Copy(&dest->Sessions[i], &src->Sessions[n++], sizeof(RPC_ENUM_SESSION_ITEM));
  12085. }
  12086. }
  12087. // RPC_KEEP
  12088. void InRpcKeep(RPC_KEEP *t, PACK *p)
  12089. {
  12090. // Validate arguments
  12091. if (t == NULL || p == NULL)
  12092. {
  12093. return;
  12094. }
  12095. Zero(t, sizeof(RPC_KEEP));
  12096. t->UseKeepConnect = PackGetBool(p, "UseKeepConnect");
  12097. PackGetStr(p, "KeepConnectHost", t->KeepConnectHost, sizeof(t->KeepConnectHost));
  12098. t->KeepConnectPort = PackGetInt(p, "KeepConnectPort");
  12099. t->KeepConnectProtocol = PackGetInt(p, "KeepConnectProtocol");
  12100. t->KeepConnectInterval = PackGetInt(p, "KeepConnectInterval");
  12101. }
  12102. void OutRpcKeep(PACK *p, RPC_KEEP *t)
  12103. {
  12104. // Validate arguments
  12105. if (t == NULL || p == NULL)
  12106. {
  12107. return;
  12108. }
  12109. PackAddBool(p, "UseKeepConnect", t->UseKeepConnect);
  12110. PackAddStr(p, "KeepConnectHost", t->KeepConnectHost);
  12111. PackAddInt(p, "KeepConnectPort", t->KeepConnectPort);
  12112. PackAddInt(p, "KeepConnectProtocol", t->KeepConnectProtocol);
  12113. PackAddInt(p, "KeepConnectInterval", t->KeepConnectInterval);
  12114. }
  12115. // test RPC function
  12116. UINT StTest(ADMIN *a, RPC_TEST *t)
  12117. {
  12118. Format(t->StrValue, sizeof(t->StrValue), "%u", t->IntValue);
  12119. return ERR_NO_ERROR;
  12120. }
  12121. // RPC_TEST
  12122. void InRpcTest(RPC_TEST *t, PACK *p)
  12123. {
  12124. Zero(t, sizeof(RPC_TEST));
  12125. t->IntValue = PackGetInt(p, "IntValue");
  12126. t->Int64Value = PackGetInt64(p, "Int64Value");
  12127. PackGetStr(p, "StrValue", t->StrValue, sizeof(t->StrValue));
  12128. PackGetUniStr(p, "UniStrValue", t->UniStrValue, sizeof(t->UniStrValue));
  12129. }
  12130. void OutRpcTest(PACK *p, RPC_TEST *t)
  12131. {
  12132. PackAddInt(p, "IntValue", t->IntValue);
  12133. PackAddInt64(p, "Int64Value", t->Int64Value);
  12134. PackAddStr(p, "StrValue", t->StrValue);
  12135. PackAddUniStr(p, "UniStrValue", t->UniStrValue);
  12136. }
  12137. void FreeRpcTest(RPC_TEST *t)
  12138. {
  12139. }
  12140. // Admin RPC call
  12141. PACK *AdminCall(RPC *rpc, char *function_name, PACK *p)
  12142. {
  12143. // Validate arguments
  12144. if (rpc == NULL || function_name == NULL)
  12145. {
  12146. return NULL;
  12147. }
  12148. if (p == NULL)
  12149. {
  12150. p = NewPack();
  12151. }
  12152. // Debug("Admin RPC Call: %s\n", function_name);
  12153. return RpcCall(rpc, function_name, p);
  12154. }
  12155. // Check whether the source IP address is permitted to admin connection
  12156. bool CheckAdminSourceAddress(SOCK *sock, char *hubname)
  12157. {
  12158. BUF *b;
  12159. char *s;
  12160. bool ok = false;
  12161. // Validate arguments
  12162. if (sock == NULL)
  12163. {
  12164. return false;
  12165. }
  12166. b = ReadDump(ADMINIP_TXT);
  12167. if (b == NULL)
  12168. {
  12169. return true;
  12170. }
  12171. while (true)
  12172. {
  12173. UINT i;
  12174. TOKEN_LIST *t;
  12175. IP ip;
  12176. IP mask;
  12177. IP ip1;
  12178. IP ip2;
  12179. s = CfgReadNextLine(b);
  12180. if (s == NULL)
  12181. {
  12182. break;
  12183. }
  12184. Trim(s);
  12185. i = SearchStrEx(s, "//", 0, false);
  12186. if (i != INFINITE)
  12187. {
  12188. s[i] = 0;
  12189. }
  12190. i = SearchStrEx(s, "#", 0, false);
  12191. if (i != INFINITE)
  12192. {
  12193. s[i] = 0;
  12194. }
  12195. Trim(s);
  12196. t = ParseToken(s, " \t");
  12197. if (t != NULL)
  12198. {
  12199. if (t->NumTokens >= 1)
  12200. {
  12201. if (t->NumTokens == 1 || StrCmpi(hubname, t->Token[1]) == 0)
  12202. {
  12203. if (ParseIpAndMask46(t->Token[0], &ip, &mask))
  12204. {
  12205. if (IsIP4(&sock->RemoteIP) && IsIP4(&ip))
  12206. {
  12207. IPAnd4(&ip1, &sock->RemoteIP, &mask);
  12208. IPAnd4(&ip2, &ip, &mask);
  12209. if (CmpIpAddr(&ip1, &ip2) == 0)
  12210. {
  12211. ok = true;
  12212. }
  12213. }
  12214. else if (IsIP6(&sock->RemoteIP) && IsIP6(&ip))
  12215. {
  12216. IPAnd6(&ip1, &sock->RemoteIP, &mask);
  12217. IPAnd6(&ip2, &ip, &mask);
  12218. if (CmpIpAddr(&ip1, &ip2) == 0)
  12219. {
  12220. ok = true;
  12221. }
  12222. }
  12223. }
  12224. else if (StrToIP(&ip, t->Token[0]))
  12225. {
  12226. if (CmpIpAddr(&sock->RemoteIP, &ip) == 0)
  12227. {
  12228. ok = true;
  12229. }
  12230. }
  12231. if (StrCmpi(t->Token[0], "*") == 0)
  12232. {
  12233. ok = true;
  12234. }
  12235. }
  12236. }
  12237. FreeToken(t);
  12238. }
  12239. Free(s);
  12240. }
  12241. FreeBuf(b);
  12242. return ok;
  12243. }
  12244. // Accept admin connection
  12245. UINT AdminAccept(CONNECTION *c, PACK *p)
  12246. {
  12247. ADMIN *a;
  12248. UCHAR secure_password[SHA1_SIZE];
  12249. UCHAR null_password[SHA1_SIZE];
  12250. UCHAR secure_null_password[SHA1_SIZE];
  12251. char hubname[MAX_HUBNAME_LEN + 1];
  12252. CEDAR *cedar;
  12253. SOCK *sock;
  12254. RPC *rpc;
  12255. UINT err;
  12256. SERVER *server = NULL;
  12257. RPC_WINVER ver;
  12258. bool accept_empty_password;
  12259. bool is_empty_password = false;
  12260. // Validate arguments
  12261. if (c == NULL || p == NULL)
  12262. {
  12263. return ERR_INTERNAL_ERROR;
  12264. }
  12265. cedar = c->Cedar;
  12266. sock = c->FirstSock;
  12267. if (cedar != NULL)
  12268. {
  12269. server = cedar->Server;
  12270. }
  12271. accept_empty_password = PackGetBool(p, "accept_empty_password");
  12272. // Get client OS version
  12273. InRpcWinVer(&ver, p);
  12274. // Get hub name
  12275. if (PackGetStr(p, "hubname", hubname, sizeof(hubname)) == false)
  12276. {
  12277. // without hub name
  12278. StrCpy(hubname, sizeof(hubname), "");
  12279. }
  12280. // Cehck source IP address
  12281. if (CheckAdminSourceAddress(sock, hubname) == false)
  12282. {
  12283. SLog(c->Cedar, "LA_IP_DENIED", c->Name);
  12284. return ERR_IP_ADDRESS_DENIED;
  12285. }
  12286. // Get password information
  12287. if (PackGetDataSize(p, "secure_password") != SHA1_SIZE)
  12288. {
  12289. // Malformed information
  12290. return ERR_PROTOCOL_ERROR;
  12291. }
  12292. PackGetData(p, "secure_password", secure_password);
  12293. if (StrLen(hubname) == 0)
  12294. {
  12295. // Server admin mode
  12296. SLog(c->Cedar, "LA_CONNECTED_1", c->Name);
  12297. }
  12298. else
  12299. {
  12300. // Hub admin mode
  12301. if (cedar->Server != NULL && cedar->Server->ServerType == SERVER_TYPE_FARM_MEMBER)
  12302. {
  12303. // Connection with hub admin mode to cluster member is not permitted
  12304. return ERR_NOT_ENOUGH_RIGHT;
  12305. }
  12306. SLog(c->Cedar, "LA_CONNECTED_2", c->Name, hubname);
  12307. }
  12308. // Check password
  12309. err = AdminCheckPassword(cedar, c->Random, secure_password,
  12310. StrLen(hubname) != 0 ? hubname : NULL, accept_empty_password, &is_empty_password);
  12311. if (err != ERR_NO_ERROR)
  12312. {
  12313. // Error occured
  12314. SLog(c->Cedar, "LA_ERROR", c->Name, GetUniErrorStr(err), err);
  12315. return err;
  12316. }
  12317. SLog(c->Cedar, "LA_OK", c->Name);
  12318. HashAdminPassword(null_password, "");
  12319. SecurePassword(secure_null_password, null_password, c->Random);
  12320. if (Cmp(secure_null_password, secure_password, SHA1_SIZE) == 0)
  12321. {
  12322. if (sock->RemoteIP.addr[0] != 127)
  12323. {
  12324. // The client tried to use blank password for hub admin mode from remote
  12325. if (StrLen(hubname) != 0)
  12326. {
  12327. return ERR_NULL_PASSWORD_LOCAL_ONLY;
  12328. }
  12329. }
  12330. }
  12331. // Reply success result
  12332. p = NewPack();
  12333. if (accept_empty_password && is_empty_password)
  12334. {
  12335. PackAddBool(p, "empty_password", true);
  12336. }
  12337. HttpServerSend(sock, p);
  12338. FreePack(p);
  12339. // Construct ADMIN object
  12340. a = ZeroMalloc(sizeof(ADMIN));
  12341. a->ServerAdmin = ((StrLen(hubname) == 0) ? true : false);
  12342. a->HubName = (StrLen(hubname) != 0 ? hubname : NULL);
  12343. a->Server = c->Cedar->Server;
  12344. a->ClientBuild = c->ClientBuild;
  12345. Copy(&a->ClientWinVer, &ver, sizeof(RPC_WINVER));
  12346. // Timeout setting
  12347. SetTimeout(sock, INFINITE);
  12348. // RPC Server
  12349. rpc = StartRpcServer(sock, AdminDispatch, a);
  12350. a->Rpc = rpc;
  12351. SLog(c->Cedar, "LA_RPC_START", c->Name, rpc->Name);
  12352. RpcServer(rpc);
  12353. RpcFree(rpc);
  12354. if (a->LogFileList != NULL)
  12355. {
  12356. // Free cached log file list, if it exists
  12357. FreeEnumLogFile(a->LogFileList);
  12358. }
  12359. // Free ADMIN object
  12360. Free(a);
  12361. return ERR_NO_ERROR;
  12362. }
  12363. // Check for admin password
  12364. UINT AdminCheckPassword(CEDAR *c, void *random, void *secure_password, char *hubname,
  12365. bool accept_empty_password, bool *is_password_empty)
  12366. {
  12367. UCHAR check[SHA1_SIZE];
  12368. bool b_dummy;
  12369. // Validate arguments
  12370. if (c == NULL || random == NULL || secure_password == NULL)
  12371. {
  12372. return ERR_INTERNAL_ERROR;
  12373. }
  12374. if (is_password_empty == NULL)
  12375. {
  12376. is_password_empty = &b_dummy;
  12377. }
  12378. *is_password_empty = false;
  12379. if (hubname == NULL || StrLen(hubname) == 0)
  12380. {
  12381. // Server admin mode
  12382. Lock(c->lock);
  12383. {
  12384. if (accept_empty_password && SiIsEmptyPassword(c->Server->HashedPassword))
  12385. {
  12386. // blank password
  12387. *is_password_empty = true;
  12388. }
  12389. SecurePassword(check, c->Server->HashedPassword, random);
  12390. }
  12391. Unlock(c->lock);
  12392. if (Cmp(check, secure_password, SHA1_SIZE) != 0)
  12393. {
  12394. // Password incorrect
  12395. return ERR_ACCESS_DENIED;
  12396. }
  12397. }
  12398. else
  12399. {
  12400. HUB *h;
  12401. #if 0
  12402. if (c->Server->ServerType == SERVER_TYPE_FARM_MEMBER)
  12403. {
  12404. // In cluster member mode, hub admin mode is disabled
  12405. return ERR_FARM_MEMBER_HUB_ADMIN;
  12406. }
  12407. #endif
  12408. // Hub admin mode
  12409. LockHubList(c);
  12410. {
  12411. h = GetHub(c, hubname);
  12412. }
  12413. UnlockHubList(c);
  12414. if (h == NULL)
  12415. {
  12416. // Specified hub is not found
  12417. return ERR_HUB_NOT_FOUND;
  12418. }
  12419. Lock(h->lock);
  12420. {
  12421. if (accept_empty_password && SiIsEmptyPassword(h->HashedPassword))
  12422. {
  12423. // User specified blank password
  12424. *is_password_empty = true;
  12425. }
  12426. SecurePassword(check, h->HashedPassword, random);
  12427. }
  12428. Unlock(h->lock);
  12429. ReleaseHub(h);
  12430. if (Cmp(check, secure_password, SHA1_SIZE) != 0)
  12431. {
  12432. // Incorrect password
  12433. return ERR_ACCESS_DENIED;
  12434. }
  12435. }
  12436. return ERR_NO_ERROR;
  12437. }
  12438. // Hash admin password
  12439. void HashAdminPassword(void *hash, char *password)
  12440. {
  12441. // Validate arguments
  12442. if (hash == NULL || password == NULL)
  12443. {
  12444. return;
  12445. }
  12446. Hash(hash, password, StrLen(password), true);
  12447. }
  12448. // Disconnect admin connection
  12449. void AdminDisconnect(RPC *rpc)
  12450. {
  12451. SESSION *s;
  12452. SOCK *sock;
  12453. // Validate arguments
  12454. if (rpc == NULL)
  12455. {
  12456. return;
  12457. }
  12458. s = (SESSION *)rpc->Param;
  12459. sock = rpc->Sock;
  12460. EndRpc(rpc);
  12461. Disconnect(sock);
  12462. ReleaseSession(s);
  12463. }
  12464. // Admin connection main routine
  12465. SESSION *AdminConnectMain(CEDAR *cedar, CLIENT_OPTION *o, char *hubname, void *hashed_password, UINT *err, char *client_name, void *hWnd, bool *empty_password)
  12466. {
  12467. UCHAR secure_password[SHA1_SIZE];
  12468. SESSION *s;
  12469. SOCK *sock;
  12470. PACK *p;
  12471. RPC_WINVER ver;
  12472. // connect
  12473. s = NewRpcSessionEx2(cedar, o, err, client_name, hWnd);
  12474. if (s == NULL)
  12475. {
  12476. return NULL;
  12477. }
  12478. // Get socket
  12479. sock = s->Connection->FirstSock;
  12480. // Generate connect method
  12481. p = NewPack();
  12482. PackAddClientVersion(p, s->Connection);
  12483. PackAddStr(p, "method", "admin");
  12484. PackAddBool(p, "accept_empty_password", true);
  12485. // Windows version on client
  12486. GetWinVer(&ver);
  12487. OutRpcWinVer(p, &ver);
  12488. // Secure Password
  12489. SecurePassword(secure_password, hashed_password, s->Connection->Random);
  12490. PackAddData(p, "secure_password", secure_password, sizeof(secure_password));
  12491. // HUB name
  12492. if (hubname != NULL)
  12493. {
  12494. PackAddStr(p, "hubname", hubname);
  12495. }
  12496. if (HttpClientSend(sock, p) == false)
  12497. {
  12498. // disconnect
  12499. FreePack(p);
  12500. ReleaseSession(s);
  12501. *err = ERR_DISCONNECTED;
  12502. return NULL;
  12503. }
  12504. FreePack(p);
  12505. p = HttpClientRecv(sock);
  12506. if (p == NULL)
  12507. {
  12508. // disconnect
  12509. ReleaseSession(s);
  12510. *err = ERR_DISCONNECTED;
  12511. return NULL;
  12512. }
  12513. if (GetErrorFromPack(p) != 0)
  12514. {
  12515. // error
  12516. ReleaseSession(s);
  12517. *err = GetErrorFromPack(p);
  12518. FreePack(p);
  12519. return NULL;
  12520. }
  12521. if (empty_password != NULL)
  12522. {
  12523. *empty_password = PackGetBool(p, "empty_password");
  12524. }
  12525. FreePack(p);
  12526. return s;
  12527. }
  12528. // Admin connection
  12529. RPC *AdminConnect(CEDAR *cedar, CLIENT_OPTION *o, char *hubname, void *hashed_password, UINT *err)
  12530. {
  12531. return AdminConnectEx(cedar, o, hubname, hashed_password, err, NULL);
  12532. }
  12533. RPC *AdminConnectEx(CEDAR *cedar, CLIENT_OPTION *o, char *hubname, void *hashed_password, UINT *err, char *client_name)
  12534. {
  12535. return AdminConnectEx2(cedar, o, hubname, hashed_password, err, client_name, NULL);
  12536. }
  12537. RPC *AdminConnectEx2(CEDAR *cedar, CLIENT_OPTION *o, char *hubname, void *hashed_password, UINT *err, char *client_name, void *hWnd)
  12538. {
  12539. SESSION *s;
  12540. SOCK *sock;
  12541. RPC *rpc;
  12542. UCHAR hashed_password_2[SHA1_SIZE];
  12543. bool empty_password = false;
  12544. // Validate arguments
  12545. if (cedar == NULL || o == NULL || hashed_password == NULL || err == NULL)
  12546. {
  12547. return NULL;
  12548. }
  12549. if (client_name == NULL)
  12550. {
  12551. client_name = CEDAR_MANAGER_STR;
  12552. }
  12553. Copy(hashed_password_2, hashed_password, SHA1_SIZE);
  12554. s = AdminConnectMain(cedar, o, hubname, hashed_password_2, err, client_name, hWnd, &empty_password);
  12555. if (s == NULL)
  12556. {
  12557. return NULL;
  12558. }
  12559. sock = s->Connection->FirstSock;
  12560. // RPC start
  12561. rpc = StartRpcClient(sock, s);
  12562. rpc->IsVpnServer = true;
  12563. Copy(&rpc->VpnServerClientOption, o, sizeof(CLIENT_OPTION));
  12564. StrCpy(rpc->VpnServerHubName, sizeof(rpc->VpnServerHubName), hubname);
  12565. StrCpy(rpc->VpnServerClientName, sizeof(rpc->VpnServerClientName), client_name);
  12566. if (empty_password == false)
  12567. {
  12568. Copy(rpc->VpnServerHashedPassword, hashed_password_2, SHA1_SIZE);
  12569. }
  12570. else
  12571. {
  12572. HashAdminPassword(rpc->VpnServerHashedPassword, "");
  12573. }
  12574. // timeout setting
  12575. SetTimeout(sock, INFINITE);
  12576. return rpc;
  12577. }
  12578. // Reconnect admin connection
  12579. UINT AdminReconnect(RPC *rpc)
  12580. {
  12581. SESSION *s;
  12582. SOCK *sock;
  12583. CEDAR *cedar;
  12584. UINT err;
  12585. bool empty_password = false;
  12586. // Validate arguments
  12587. if (rpc == NULL || rpc->IsVpnServer == false)
  12588. {
  12589. return ERR_INTERNAL_ERROR;
  12590. }
  12591. s = (SESSION *)rpc->Param;
  12592. cedar = s->Cedar;
  12593. AddRef(cedar->ref);
  12594. sock = rpc->Sock;
  12595. Disconnect(sock);
  12596. ReleaseSock(sock);
  12597. ReleaseSession(s);
  12598. rpc->Param = NULL;
  12599. rpc->Sock = NULL;
  12600. s = AdminConnectMain(cedar, &rpc->VpnServerClientOption,
  12601. rpc->VpnServerHubName,
  12602. rpc->VpnServerHashedPassword,
  12603. &err,
  12604. rpc->VpnServerClientName, NULL, &empty_password);
  12605. ReleaseCedar(cedar);
  12606. if (s == NULL)
  12607. {
  12608. return err;
  12609. }
  12610. if (empty_password)
  12611. {
  12612. HashAdminPassword(rpc->VpnServerHashedPassword, "");
  12613. }
  12614. rpc->Param = s;
  12615. rpc->Sock = s->Connection->FirstSock;
  12616. AddRef(rpc->Sock->ref);
  12617. return ERR_NO_ERROR;
  12618. }
  12619. // Identify blank password
  12620. bool SiIsEmptyPassword(void *hash_password)
  12621. {
  12622. UCHAR hash[SHA1_SIZE];
  12623. // Validate arguments
  12624. if (hash_password == NULL)
  12625. {
  12626. return false;
  12627. }
  12628. Hash(hash, "", 0, true);
  12629. if (Cmp(hash_password, hash, SHA1_SIZE) == 0)
  12630. {
  12631. return true;
  12632. }
  12633. return false;
  12634. }