2017-10-19 05:48:23 +03:00
|
|
|
// SoftEther VPN Source Code - Developer Edition Master Branch
|
2014-01-04 17:00:08 +04:00
|
|
|
// Cedar Communication Module
|
|
|
|
|
|
|
|
|
|
|
|
// VLanUnix.c
|
|
|
|
// Virtual device driver library for UNIX
|
|
|
|
|
|
|
|
#include <GlobalConst.h>
|
|
|
|
|
|
|
|
#ifdef VLAN_C
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <wchar.h>
|
|
|
|
#include <stdarg.h>
|
|
|
|
#include <time.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <Mayaqua/Mayaqua.h>
|
|
|
|
#include <Cedar/Cedar.h>
|
2018-08-23 11:56:30 +03:00
|
|
|
#ifdef UNIX_BSD
|
|
|
|
#ifdef UNIX_OPENBSD
|
|
|
|
#include <netinet/if_ether.h>
|
|
|
|
#else // UNIX_OPENBSD
|
2014-03-12 03:06:21 +04:00
|
|
|
#include <net/ethernet.h>
|
2018-08-23 11:56:30 +03:00
|
|
|
#endif // UNIX_OPENBSD
|
|
|
|
#endif // UNIX_BSD
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
#ifdef OS_UNIX
|
|
|
|
|
|
|
|
static LIST *unix_vlan = NULL;
|
|
|
|
|
|
|
|
#ifndef NO_VLAN
|
|
|
|
|
|
|
|
// Get the PACKET_ADAPTER
|
|
|
|
PACKET_ADAPTER *VLanGetPacketAdapter()
|
|
|
|
{
|
|
|
|
PACKET_ADAPTER *pa;
|
|
|
|
|
|
|
|
pa = NewPacketAdapter(VLanPaInit, VLanPaGetCancel,
|
|
|
|
VLanPaGetNextPacket, VLanPaPutPacket, VLanPaFree);
|
|
|
|
if (pa == NULL)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return pa;
|
|
|
|
}
|
|
|
|
|
|
|
|
// PA initialization
|
|
|
|
bool VLanPaInit(SESSION *s)
|
|
|
|
{
|
|
|
|
VLAN *v;
|
|
|
|
// Validate arguments
|
|
|
|
if (s == NULL)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Connect to the driver
|
|
|
|
v = NewVLan(s->ClientOption->DeviceName, NULL);
|
|
|
|
if (v == NULL)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->PacketAdapter->Param = v;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the cancel object
|
|
|
|
CANCEL *VLanPaGetCancel(SESSION *s)
|
|
|
|
{
|
|
|
|
VLAN *v;
|
|
|
|
// Validate arguments
|
|
|
|
if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
return VLanGetCancel(v);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Release the packet adapter
|
|
|
|
void VLanPaFree(SESSION *s)
|
|
|
|
{
|
|
|
|
VLAN *v;
|
|
|
|
// Validate arguments
|
|
|
|
if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
// End the virtual LAN card
|
|
|
|
FreeVLan(v);
|
|
|
|
|
|
|
|
s->PacketAdapter->Param = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write a packet
|
|
|
|
bool VLanPaPutPacket(SESSION *s, void *data, UINT size)
|
|
|
|
{
|
|
|
|
VLAN *v;
|
|
|
|
// Validate arguments
|
|
|
|
if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return VLanPutPacket(v, data, size);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the next packet
|
|
|
|
UINT VLanPaGetNextPacket(SESSION *s, void **data)
|
|
|
|
{
|
|
|
|
VLAN *v;
|
|
|
|
UINT size;
|
|
|
|
// Validate arguments
|
|
|
|
if (data == NULL || (s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
|
|
|
|
{
|
|
|
|
return INFINITE;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (VLanGetNextPacket(v, data, &size) == false)
|
|
|
|
{
|
|
|
|
return INFINITE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Write a packet to the virtual LAN card
|
|
|
|
bool VLanPutPacket(VLAN *v, void *buf, UINT size)
|
|
|
|
{
|
|
|
|
UINT ret;
|
|
|
|
// Validate arguments
|
|
|
|
if (v == NULL)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (v->Halt)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (size > MAX_PACKET_SIZE)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (buf == NULL || size == 0)
|
|
|
|
{
|
|
|
|
if (buf != NULL)
|
|
|
|
{
|
|
|
|
Free(buf);
|
|
|
|
}
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = write(v->fd, buf, size);
|
|
|
|
|
|
|
|
if (ret >= 1)
|
|
|
|
{
|
|
|
|
Free(buf);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (errno == EAGAIN || ret == 0)
|
|
|
|
{
|
|
|
|
Free(buf);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the next packet from the virtual LAN card
|
|
|
|
bool VLanGetNextPacket(VLAN *v, void **buf, UINT *size)
|
|
|
|
{
|
|
|
|
UCHAR tmp[TAP_READ_BUF_SIZE];
|
|
|
|
int ret;
|
|
|
|
// Validate arguments
|
|
|
|
if (v == NULL || buf == NULL || size == 0)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
if (v->Halt)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Read
|
|
|
|
ret = read(v->fd, tmp, sizeof(tmp));
|
|
|
|
|
|
|
|
if (ret == 0 ||
|
|
|
|
(ret == -1 && errno == EAGAIN))
|
|
|
|
{
|
|
|
|
// No packet
|
|
|
|
*buf = NULL;
|
|
|
|
*size = 0;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
else if (ret == -1 || ret > TAP_READ_BUF_SIZE)
|
|
|
|
{
|
|
|
|
// Error
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// Reading packet success
|
|
|
|
*buf = Malloc(ret);
|
|
|
|
Copy(*buf, tmp, ret);
|
|
|
|
*size = ret;
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the cancel object
|
|
|
|
CANCEL *VLanGetCancel(VLAN *v)
|
|
|
|
{
|
|
|
|
CANCEL *c;
|
|
|
|
int fd;
|
|
|
|
int yes = 0;
|
|
|
|
// Validate arguments
|
|
|
|
if (v == NULL)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
c = NewCancel();
|
|
|
|
UnixDeletePipe(c->pipe_read, c->pipe_write);
|
|
|
|
c->pipe_read = c->pipe_write = -1;
|
|
|
|
|
|
|
|
fd = v->fd;
|
|
|
|
|
|
|
|
UnixSetSocketNonBlockingMode(fd, true);
|
|
|
|
|
|
|
|
c->SpecialFlag = true;
|
|
|
|
c->pipe_read = fd;
|
|
|
|
|
|
|
|
return c;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close the Virtual LAN card
|
|
|
|
void FreeVLan(VLAN *v)
|
|
|
|
{
|
|
|
|
// Validate arguments
|
|
|
|
if (v == NULL)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
Free(v->InstanceName);
|
|
|
|
|
|
|
|
Free(v);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a tap
|
2018-08-05 18:35:57 +03:00
|
|
|
VLAN *NewTap(char *name, char *mac_address, bool create_up)
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
VLAN *v;
|
|
|
|
// Validate arguments
|
|
|
|
if (name == NULL || mac_address == NULL)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-08-05 18:35:57 +03:00
|
|
|
fd = UnixCreateTapDeviceEx(name, "tap", mac_address, create_up);
|
2014-01-04 17:00:08 +04:00
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
v = ZeroMalloc(sizeof(VLAN));
|
|
|
|
v->Halt = false;
|
|
|
|
v->InstanceName = CopyStr(name);
|
|
|
|
v->fd = fd;
|
|
|
|
|
|
|
|
return v;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Close the tap
|
|
|
|
void FreeTap(VLAN *v)
|
|
|
|
{
|
|
|
|
// Validate arguments
|
|
|
|
if (v == NULL)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(v->fd);
|
|
|
|
FreeVLan(v);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the Virtual LAN card list
|
|
|
|
VLAN *NewVLan(char *instance_name, VLAN_PARAM *param)
|
|
|
|
{
|
|
|
|
int fd;
|
|
|
|
VLAN *v;
|
|
|
|
// Validate arguments
|
|
|
|
if (instance_name == NULL)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Open the tap
|
|
|
|
fd = UnixVLanGet(instance_name);
|
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
v = ZeroMalloc(sizeof(VLAN));
|
|
|
|
v->Halt = false;
|
|
|
|
v->InstanceName = CopyStr(instance_name);
|
|
|
|
v->fd = fd;
|
|
|
|
|
|
|
|
return v;
|
|
|
|
}
|
|
|
|
|
2018-08-05 18:35:57 +03:00
|
|
|
// Generate TUN interface name
|
|
|
|
void GenerateTunName(char *name, char *prefix, char *tun_name, size_t tun_name_len)
|
|
|
|
{
|
|
|
|
char instance_name_lower[MAX_SIZE];
|
|
|
|
|
|
|
|
// Generate the device name
|
|
|
|
StrCpy(instance_name_lower, sizeof(instance_name_lower), name);
|
|
|
|
Trim(instance_name_lower);
|
|
|
|
StrLower(instance_name_lower);
|
|
|
|
Format(tun_name, tun_name_len, "%s_%s", prefix, instance_name_lower);
|
|
|
|
|
|
|
|
tun_name[15] = 0;
|
|
|
|
}
|
2014-01-04 17:00:08 +04:00
|
|
|
// Create a tap device
|
2018-08-05 18:35:57 +03:00
|
|
|
int UnixCreateTapDeviceEx(char *name, char *prefix, UCHAR *mac_address, bool create_up)
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
2018-08-26 05:20:57 +03:00
|
|
|
int fd = -1, s = -1;
|
|
|
|
char tap_name[MAX_SIZE], tap_path[MAX_SIZE];
|
2014-01-04 17:00:08 +04:00
|
|
|
struct ifreq ifr;
|
2018-08-26 05:20:57 +03:00
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
// Validate arguments
|
|
|
|
if (name == NULL)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2018-08-26 05:20:57 +03:00
|
|
|
GenerateTunName(name, prefix, tap_name, sizeof(tap_name));
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
// Open the tun / tap
|
2018-08-23 11:56:30 +03:00
|
|
|
#ifndef UNIX_BSD
|
2014-01-04 17:00:08 +04:00
|
|
|
if (GetOsInfo()->OsType == OSTYPE_LINUX)
|
|
|
|
{
|
|
|
|
// Linux
|
|
|
|
if (IsFile(TAP_FILENAME_1) == false)
|
|
|
|
{
|
|
|
|
char tmp[MAX_SIZE];
|
|
|
|
|
|
|
|
Format(tmp, sizeof(tmp), "%s c 10 200", TAP_FILENAME_1);
|
|
|
|
Run("mknod", tmp, true, true);
|
|
|
|
|
|
|
|
Format(tmp, sizeof(tmp), "600 %s", TAP_FILENAME_1);
|
|
|
|
Run("chmod", tmp, true, true);
|
|
|
|
}
|
|
|
|
}
|
2018-08-23 11:56:30 +03:00
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
fd = open(TAP_FILENAME_1, O_RDWR);
|
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
fd = open(TAP_FILENAME_2, O_RDWR);
|
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
2018-08-23 11:56:30 +03:00
|
|
|
#else // UNIX_BSD
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
2018-08-26 05:20:57 +03:00
|
|
|
sprintf(tap_path, "%s", TAP_DIR TAP_NAME);
|
|
|
|
for (int i = 0; i < TAP_MAX; i++) {
|
|
|
|
sprintf(tap_path + StrLen(TAP_DIR TAP_NAME), "%d", i);
|
|
|
|
fd = open(tap_path, O_RDWR);
|
2014-01-14 18:19:37 +04:00
|
|
|
if (fd != -1)
|
|
|
|
{
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2018-08-26 05:20:57 +03:00
|
|
|
|
2014-01-14 18:19:37 +04:00
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
2014-01-04 17:00:08 +04:00
|
|
|
}
|
2018-08-23 11:56:30 +03:00
|
|
|
#endif // UNIX_BSD
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
#ifdef UNIX_LINUX
|
2018-08-26 05:20:57 +03:00
|
|
|
// Create a TAP device for Linux
|
2014-01-04 17:00:08 +04:00
|
|
|
|
2018-08-26 05:20:57 +03:00
|
|
|
// Set the name and the flags
|
2014-01-04 17:00:08 +04:00
|
|
|
Zero(&ifr, sizeof(ifr));
|
2018-08-26 05:20:57 +03:00
|
|
|
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
|
2014-01-04 17:00:08 +04:00
|
|
|
ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
|
|
|
|
|
|
|
|
if (ioctl(fd, TUNSETIFF, &ifr) == -1)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
s = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (s != -1)
|
|
|
|
{
|
2018-08-26 05:20:57 +03:00
|
|
|
// Set the MAC address
|
2014-01-04 17:00:08 +04:00
|
|
|
if (mac_address != NULL)
|
|
|
|
{
|
|
|
|
Zero(&ifr, sizeof(ifr));
|
2018-08-26 05:20:57 +03:00
|
|
|
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
|
2014-01-04 17:00:08 +04:00
|
|
|
ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
|
2018-08-26 05:20:57 +03:00
|
|
|
Copy(&ifr.ifr_hwaddr.sa_data, mac_address, ETHER_ADDR_LEN);
|
2014-01-04 17:00:08 +04:00
|
|
|
ioctl(s, SIOCSIFHWADDR, &ifr);
|
|
|
|
}
|
|
|
|
|
2018-08-05 18:35:57 +03:00
|
|
|
if (create_up)
|
|
|
|
{
|
2018-08-26 05:20:57 +03:00
|
|
|
Zero(&ifr, sizeof(ifr));
|
|
|
|
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
|
|
|
|
ioctl(s, SIOCGIFFLAGS, &ifr);
|
2018-08-05 18:35:57 +03:00
|
|
|
ifr.ifr_flags |= IFF_UP;
|
|
|
|
ioctl(s, SIOCSIFFLAGS, &ifr);
|
|
|
|
}
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
close(s);
|
|
|
|
}
|
2018-08-26 05:20:57 +03:00
|
|
|
#endif // UNIX_LINUX
|
2014-01-04 17:00:08 +04:00
|
|
|
|
2018-08-23 11:56:30 +03:00
|
|
|
#ifdef UNIX_BSD
|
2018-08-26 05:20:57 +03:00
|
|
|
// Create a TAP device for BSD
|
|
|
|
Zero(&ifr, sizeof(ifr));
|
|
|
|
|
|
|
|
// Get the current name
|
|
|
|
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_path + StrLen(TAP_DIR));
|
|
|
|
|
2014-01-14 18:19:37 +04:00
|
|
|
s = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (s != -1)
|
|
|
|
{
|
2018-08-26 05:20:57 +03:00
|
|
|
// Set the name, if possible
|
|
|
|
#ifdef SIOCSIFNAME
|
|
|
|
ifr.ifr_data = tap_name;
|
|
|
|
ioctl(s, SIOCSIFNAME, &ifr);
|
|
|
|
#else // SIOCSIFNAME
|
|
|
|
StrCpy(tap_name, sizeof(tap_name), ifr.ifr_name);
|
|
|
|
#endif // SIOCSIFNAME
|
2014-01-14 18:19:37 +04:00
|
|
|
|
2018-08-26 05:20:57 +03:00
|
|
|
// Set the MAC address
|
2014-01-14 18:19:37 +04:00
|
|
|
if (mac_address != NULL)
|
|
|
|
{
|
|
|
|
Zero(&ifr, sizeof(ifr));
|
2018-08-26 05:20:57 +03:00
|
|
|
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
|
2014-03-12 03:06:21 +04:00
|
|
|
ifr.ifr_addr.sa_len = ETHER_ADDR_LEN;
|
|
|
|
ifr.ifr_addr.sa_family = AF_LINK;
|
|
|
|
Copy(&ifr.ifr_addr.sa_data, mac_address, ETHER_ADDR_LEN);
|
2014-01-14 18:19:37 +04:00
|
|
|
ioctl(s, SIOCSIFLLADDR, &ifr);
|
|
|
|
}
|
|
|
|
|
2018-08-05 18:35:57 +03:00
|
|
|
if (create_up)
|
|
|
|
{
|
2018-08-26 05:20:57 +03:00
|
|
|
Zero(&ifr, sizeof(ifr));
|
|
|
|
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), tap_name);
|
|
|
|
ioctl(s, SIOCGIFFLAGS, &ifr);
|
2018-08-05 18:35:57 +03:00
|
|
|
ifr.ifr_flags |= IFF_UP;
|
|
|
|
ioctl(s, SIOCSIFFLAGS, &ifr);
|
|
|
|
}
|
2014-01-14 18:19:37 +04:00
|
|
|
|
|
|
|
close(s);
|
|
|
|
}
|
2018-08-23 11:56:30 +03:00
|
|
|
#endif // UNIX_BSD
|
2018-08-26 05:20:57 +03:00
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
#ifdef UNIX_SOLARIS
|
2018-08-26 05:20:57 +03:00
|
|
|
// Create a TAP device for Solaris
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
|
|
|
int ip_fd;
|
|
|
|
int tun_fd;
|
|
|
|
int ppa;
|
|
|
|
|
|
|
|
tun_fd = open(tap_name, O_RDWR);
|
|
|
|
if (tun_fd == -1)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ip_fd = open("/dev/ip", O_RDWR);
|
|
|
|
if (ip_fd == -1)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
close(tun_fd);
|
|
|
|
close(fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
ppa = -1;
|
|
|
|
ppa = ioctl(tun_fd, TUNNEWPPA, ppa);
|
|
|
|
if (ppa == -1)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
close(tun_fd);
|
|
|
|
close(fd);
|
|
|
|
close(ip_fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ioctl(fd, I_PUSH, "ip") < 0)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
close(tun_fd);
|
|
|
|
close(fd);
|
|
|
|
close(ip_fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ioctl(fd, IF_UNITSEL, (char *)&ppa) < 0)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
close(tun_fd);
|
|
|
|
close(fd);
|
|
|
|
close(ip_fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ioctl(ip_fd, I_LINK, fd) < 0)
|
|
|
|
{
|
|
|
|
// Failure
|
|
|
|
close(tun_fd);
|
|
|
|
close(fd);
|
|
|
|
close(ip_fd);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(tun_fd);
|
|
|
|
close(ip_fd);
|
|
|
|
}
|
|
|
|
#endif // UNIX_SOLARIS
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
2018-08-05 18:35:57 +03:00
|
|
|
int UnixCreateTapDevice(char *name, UCHAR *mac_address, bool create_up)
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
2018-08-05 18:35:57 +03:00
|
|
|
return UnixCreateTapDeviceEx(name, "vpn", mac_address, create_up);
|
2014-01-04 17:00:08 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Close the tap device
|
|
|
|
void UnixCloseTapDevice(int fd)
|
|
|
|
{
|
|
|
|
// Validate arguments
|
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
close(fd);
|
|
|
|
}
|
|
|
|
|
|
|
|
#else // NO_VLAN
|
|
|
|
|
|
|
|
void UnixCloseTapDevice(int fd)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
2018-08-23 05:39:13 +03:00
|
|
|
int UnixCreateTapDeviceEx(char *name, char *prefix, UCHAR *mac_address, bool create_up)
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
2018-08-23 05:39:13 +03:00
|
|
|
int UnixCreateTapDevice(char *name, UCHAR *mac_address, bool create_up)
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif // NO_VLAN
|
|
|
|
|
|
|
|
// Comparison of the VLAN list entries
|
|
|
|
int UnixCompareVLan(void *p1, void *p2)
|
|
|
|
{
|
|
|
|
UNIX_VLAN_LIST *v1, *v2;
|
|
|
|
if (p1 == NULL || p2 == NULL)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
v1 = *(UNIX_VLAN_LIST **)p1;
|
|
|
|
v2 = *(UNIX_VLAN_LIST **)p2;
|
|
|
|
if (v1 == NULL || v2 == NULL)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
return StrCmpi(v1->Name, v2->Name);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Initialize the VLAN list
|
|
|
|
void UnixVLanInit()
|
|
|
|
{
|
|
|
|
unix_vlan = NewList(UnixCompareVLan);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a VLAN
|
2018-08-05 18:35:57 +03:00
|
|
|
bool UnixVLanCreateEx(char *name, char *prefix, UCHAR *mac_address, bool create_up)
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
|
|
|
// Validate arguments
|
|
|
|
char tmp[MAX_SIZE];
|
|
|
|
if (name == NULL)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
StrCpy(tmp, sizeof(tmp), name);
|
|
|
|
Trim(tmp);
|
|
|
|
name = tmp;
|
|
|
|
|
|
|
|
LockList(unix_vlan);
|
|
|
|
{
|
|
|
|
UNIX_VLAN_LIST *t, tt;
|
|
|
|
int fd;
|
|
|
|
|
|
|
|
// Check whether a device with the same name exists
|
|
|
|
Zero(&tt, sizeof(tt));
|
|
|
|
StrCpy(tt.Name, sizeof(tt.Name), name);
|
|
|
|
|
|
|
|
t = Search(unix_vlan, &tt);
|
|
|
|
if (t != NULL)
|
|
|
|
{
|
|
|
|
// Already exist
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Create a tap device
|
2018-08-05 18:35:57 +03:00
|
|
|
fd = UnixCreateTapDeviceEx(name, prefix, mac_address, create_up);
|
2014-01-04 17:00:08 +04:00
|
|
|
if (fd == -1)
|
|
|
|
{
|
|
|
|
// Failure to create
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
t = ZeroMalloc(sizeof(UNIX_VLAN_LIST));
|
|
|
|
t->fd = fd;
|
|
|
|
StrCpy(t->Name, sizeof(t->Name), name);
|
|
|
|
|
|
|
|
Insert(unix_vlan, t);
|
|
|
|
}
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
2018-08-05 18:35:57 +03:00
|
|
|
bool UnixVLanCreate(char *name, UCHAR *mac_address, bool create_up)
|
|
|
|
{
|
|
|
|
return UnixVLanCreateEx(name, "vpn", mac_address, create_up);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set a VLAN up/down
|
|
|
|
bool UnixVLanSetState(char* name, bool state_up)
|
2014-01-04 17:00:08 +04:00
|
|
|
{
|
2018-08-05 18:35:57 +03:00
|
|
|
#ifdef UNIX_LINUX
|
|
|
|
UNIX_VLAN_LIST *t, tt;
|
|
|
|
struct ifreq ifr;
|
|
|
|
int s;
|
|
|
|
char eth_name[MAX_SIZE];
|
|
|
|
|
|
|
|
LockList(unix_vlan);
|
|
|
|
{
|
|
|
|
int result;
|
|
|
|
// Find a device with the same name
|
|
|
|
Zero(&tt, sizeof(tt));
|
|
|
|
StrCpy(tt.Name, sizeof(tt.Name), name);
|
|
|
|
|
|
|
|
t = Search(unix_vlan, &tt);
|
|
|
|
if (t == NULL)
|
|
|
|
{
|
|
|
|
// No such device
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
GenerateTunName(name, "vpn", eth_name, sizeof(eth_name));
|
|
|
|
Zero(&ifr, sizeof(ifr));
|
|
|
|
StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), eth_name);
|
|
|
|
|
|
|
|
s = socket(AF_INET, SOCK_DGRAM, 0);
|
|
|
|
if (s == -1)
|
|
|
|
{
|
|
|
|
// Failed to create socket
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
ioctl(s, SIOCGIFFLAGS, &ifr);
|
|
|
|
if (state_up)
|
|
|
|
{
|
|
|
|
ifr.ifr_flags |= IFF_UP;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
ifr.ifr_flags &= ~IFF_UP;
|
|
|
|
}
|
|
|
|
result = ioctl(s, SIOCSIFFLAGS, &ifr);
|
|
|
|
close(s);
|
|
|
|
}
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
#endif // UNIX_LINUX
|
|
|
|
|
|
|
|
return true;
|
2014-01-04 17:00:08 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
// Enumerate VLANs
|
|
|
|
TOKEN_LIST *UnixVLanEnum()
|
|
|
|
{
|
|
|
|
TOKEN_LIST *ret;
|
|
|
|
UINT i;
|
|
|
|
if (unix_vlan == NULL)
|
|
|
|
{
|
|
|
|
return NullToken();
|
|
|
|
}
|
|
|
|
|
|
|
|
ret = ZeroMalloc(sizeof(TOKEN_LIST));
|
|
|
|
|
|
|
|
LockList(unix_vlan);
|
|
|
|
{
|
|
|
|
ret->NumTokens = LIST_NUM(unix_vlan);
|
|
|
|
ret->Token = ZeroMalloc(sizeof(char *) * ret->NumTokens);
|
|
|
|
|
|
|
|
for (i = 0;i < ret->NumTokens;i++)
|
|
|
|
{
|
|
|
|
UNIX_VLAN_LIST *t = LIST_DATA(unix_vlan, i);
|
|
|
|
|
|
|
|
ret->Token[i] = CopyStr(t->Name);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Delete the VLAN
|
|
|
|
void UnixVLanDelete(char *name)
|
|
|
|
{
|
|
|
|
// Validate arguments
|
|
|
|
if (name == NULL || unix_vlan == NULL)
|
|
|
|
{
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
LockList(unix_vlan);
|
|
|
|
{
|
|
|
|
UINT i;
|
|
|
|
UNIX_VLAN_LIST *t, tt;
|
|
|
|
|
|
|
|
Zero(&tt, sizeof(tt));
|
|
|
|
StrCpy(tt.Name, sizeof(tt.Name), name);
|
|
|
|
|
|
|
|
t = Search(unix_vlan, &tt);
|
|
|
|
if (t != NULL)
|
|
|
|
{
|
|
|
|
UnixCloseTapDevice(t->fd);
|
|
|
|
Delete(unix_vlan, t);
|
|
|
|
Free(t);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Get the VLAN
|
|
|
|
int UnixVLanGet(char *name)
|
|
|
|
{
|
|
|
|
int fd = -1;
|
|
|
|
// Validate arguments
|
|
|
|
if (name == NULL || unix_vlan == NULL)
|
|
|
|
{
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
LockList(unix_vlan);
|
|
|
|
{
|
|
|
|
UINT i;
|
|
|
|
UNIX_VLAN_LIST *t, tt;
|
|
|
|
|
|
|
|
Zero(&tt, sizeof(tt));
|
|
|
|
StrCpy(tt.Name, sizeof(tt.Name), name);
|
|
|
|
|
|
|
|
t = Search(unix_vlan, &tt);
|
|
|
|
if (t != NULL)
|
|
|
|
{
|
|
|
|
fd = t->fd;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
UnlockList(unix_vlan);
|
|
|
|
|
|
|
|
return fd;
|
|
|
|
}
|
|
|
|
|
|
|
|
// Release the VLAN list
|
|
|
|
void UnixVLanFree()
|
|
|
|
{
|
|
|
|
UINT i;
|
|
|
|
|
|
|
|
for (i = 0;i < LIST_NUM(unix_vlan);i++)
|
|
|
|
{
|
|
|
|
UNIX_VLAN_LIST *t = LIST_DATA(unix_vlan, i);
|
|
|
|
|
|
|
|
UnixCloseTapDevice(t->fd);
|
|
|
|
Free(t);
|
|
|
|
}
|
|
|
|
|
|
|
|
ReleaseList(unix_vlan);
|
|
|
|
unix_vlan = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif // OS_UNIX
|
|
|
|
|
|
|
|
#endif // VLAN_C
|
|
|
|
|