2017-10-19 05:48:23 +03:00
|
|
|
// SoftEther VPN Source Code - Developer Edition Master Branch
|
2014-01-04 17:00:08 +04:00
|
|
|
// Cedar Communication Module
|
|
|
|
//
|
|
|
|
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
|
|
|
|
//
|
2017-10-19 05:48:23 +03:00
|
|
|
// Copyright (c) Daiyuu Nobori.
|
2017-10-18 12:24:21 +03:00
|
|
|
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
|
|
|
|
// Copyright (c) SoftEther Corporation.
|
2014-01-04 17:00:08 +04:00
|
|
|
//
|
|
|
|
// All Rights Reserved.
|
|
|
|
//
|
|
|
|
// http://www.softether.org/
|
|
|
|
//
|
2017-10-19 05:48:23 +03:00
|
|
|
// Author: Daiyuu Nobori, Ph.D.
|
2014-01-04 17:00:08 +04:00
|
|
|
// Comments: Tetsuo Sugiyama, Ph.D.
|
|
|
|
//
|
|
|
|
// This program is free software; you can redistribute it and/or
|
|
|
|
// modify it under the terms of the GNU General Public License
|
|
|
|
// version 2 as published by the Free Software Foundation.
|
|
|
|
//
|
|
|
|
// This program is distributed in the hope that it will be useful,
|
|
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
// GNU General Public License for more details.
|
|
|
|
//
|
|
|
|
// You should have received a copy of the GNU General Public License version 2
|
|
|
|
// along with this program; if not, write to the Free Software
|
|
|
|
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
|
|
//
|
|
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
|
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
|
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
|
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
|
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
|
|
//
|
|
|
|
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
|
|
|
|
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
|
|
|
|
//
|
|
|
|
//
|
|
|
|
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
|
|
|
|
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
|
|
|
|
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
|
|
|
|
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
|
|
|
|
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
|
|
|
|
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
|
|
|
|
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
|
|
|
|
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
|
|
|
|
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
|
|
|
|
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
|
|
|
|
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
|
|
|
|
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
|
|
|
|
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
|
|
|
|
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
|
|
|
|
//
|
2014-07-11 21:06:20 +04:00
|
|
|
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
|
|
|
|
// YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
|
|
|
|
// CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
|
|
|
|
// SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
|
|
|
|
// SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
|
|
|
|
// COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
|
|
|
|
// PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
|
|
|
|
// CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
|
|
|
|
// NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
|
|
|
|
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
|
|
|
|
// COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
|
|
|
|
// WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
|
|
|
|
// COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
|
|
|
|
// COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
|
|
|
|
// SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
|
|
|
|
// COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
|
|
|
|
// RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
|
|
|
|
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
|
|
|
|
// JUST A STATEMENT FOR WARNING AND DISCLAIMER.
|
2014-01-04 17:00:08 +04:00
|
|
|
//
|
|
|
|
//
|
2014-01-15 13:01:42 +04:00
|
|
|
// SOURCE CODE CONTRIBUTION
|
|
|
|
// ------------------------
|
|
|
|
//
|
|
|
|
// Your contribution to SoftEther VPN Project is much appreciated.
|
|
|
|
// Please send patches to us through GitHub.
|
|
|
|
// Read the SoftEther VPN Patch Acceptance Policy in advance:
|
|
|
|
// http://www.softether.org/5-download/src/9.patch
|
|
|
|
//
|
|
|
|
//
|
2014-01-04 17:00:08 +04:00
|
|
|
// DEAR SECURITY EXPERTS
|
|
|
|
// ---------------------
|
|
|
|
//
|
|
|
|
// If you find a bug or a security vulnerability please kindly inform us
|
|
|
|
// about the problem immediately so that we can fix the security problem
|
|
|
|
// to protect a lot of users around the world as soon as possible.
|
|
|
|
//
|
|
|
|
// Our e-mail address for security reports is:
|
|
|
|
// softether-vpn-security [at] softether.org
|
|
|
|
//
|
|
|
|
// Please note that the above e-mail address is not a technical support
|
|
|
|
// inquiry address. If you need technical assistance, please visit
|
|
|
|
// http://www.softether.org/ and ask your question on the users forum.
|
|
|
|
//
|
|
|
|
// Thank you for your cooperation.
|
2014-03-20 00:45:05 +04:00
|
|
|
//
|
|
|
|
//
|
|
|
|
// NO MEMORY OR RESOURCE LEAKS
|
|
|
|
// ---------------------------
|
|
|
|
//
|
|
|
|
// The memory-leaks and resource-leaks verification under the stress
|
|
|
|
// test has been passed before release this source code.
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
|
|
|
|
// Server.h
|
|
|
|
// Header of Server.c
|
|
|
|
|
|
|
|
#ifndef SERVER_H
|
|
|
|
#define SERVER_H
|
|
|
|
|
|
|
|
// Default ports
|
|
|
|
#define SERVER_DEF_PORTS_1 443
|
|
|
|
#define SERVER_DEF_PORTS_2 992
|
|
|
|
#define SERVER_DEF_PORTS_3 1194
|
|
|
|
#define SERVER_DEF_PORTS_4 GC_DEFAULT_PORT
|
|
|
|
|
|
|
|
#define SERVER_DEF_PORTS_INCLIENT_1 995
|
|
|
|
#define SERVER_DEF_PORTS_INCLIENT_2 465
|
|
|
|
#define SERVER_DEF_PORTS_INCLIENT_3 9008 // for admin (in client)
|
|
|
|
#define SERVER_DEF_PORTS_INCLIENT_4 1195
|
|
|
|
|
|
|
|
#define SERVER_DEF_PORTS_INCLIENT_DYN_MIN 1201
|
|
|
|
#define SERVER_DEF_PORTS_INCLIENT_DYN_MAX 1999
|
|
|
|
|
|
|
|
extern char *SERVER_CONFIG_FILE_NAME;
|
2018-02-08 02:13:41 +03:00
|
|
|
// This is set to an invalid OpenSSL cipher specification by default.
|
|
|
|
// The server will default to a list of sane and secure modern ciphers.
|
|
|
|
#define SERVER_DEFAULT_CIPHER_NAME "~DEFAULT~"
|
2014-01-04 17:00:08 +04:00
|
|
|
#define SERVER_DEFAULT_CERT_DAYS (365 * 10)
|
|
|
|
#define SERVER_DEFAULT_HUB_NAME "DEFAULT"
|
|
|
|
#define SERVER_DEFAULT_BRIDGE_NAME "BRIDGE"
|
|
|
|
#define SERVER_CONTROL_TCP_TIMEOUT (60 * 1000)
|
|
|
|
#define SERVER_FARM_CONTROL_INTERVAL (10 * 1000)
|
|
|
|
|
|
|
|
#define SERVER_FILE_SAVE_INTERVAL_DEFAULT (5 * 60 * 1000)
|
|
|
|
#define SERVER_FILE_SAVE_INTERVAL_MIN (5 * 1000)
|
|
|
|
#define SERVER_FILE_SAVE_INTERVAL_MAX (3600 * 1000)
|
|
|
|
#define SERVER_FILE_SAVE_INTERVAL_USERMODE (1 * 60 * 1000)
|
|
|
|
|
|
|
|
#define SERVER_LICENSE_VIOLATION_SPAN (SERVER_FARM_CONTROL_INTERVAL * 2)
|
|
|
|
|
|
|
|
|
|
|
|
#define SERVER_DEADLOCK_CHECK_SPAN (2 * 60 * 1000)
|
|
|
|
#define SERVER_DEADLOCK_CHECK_TIMEOUT (10 * 60 * 1000)
|
|
|
|
|
|
|
|
|
|
|
|
#define RETRY_CONNECT_TO_CONTROLLER_INTERVAL (1 * 1000)
|
|
|
|
|
|
|
|
#define MAX_PUBLIC_PORT_NUM 128
|
|
|
|
|
|
|
|
#define MEMBER_SELECTOR_TXT_FILENAME "@member_selector.config"
|
|
|
|
#define MEMBER_SELECTOR_CONNECT_TIMEOUT 2000
|
|
|
|
#define MEMBER_SELECTOR_DATA_TIMEOUT 5000
|
|
|
|
|
|
|
|
|
|
|
|
// Virtual HUB list hosted by each farm member
|
|
|
|
struct HUB_LIST
|
|
|
|
{
|
|
|
|
struct FARM_MEMBER *FarmMember; // Farm member
|
|
|
|
bool DynamicHub; // Dynamic HUB
|
|
|
|
char Name[MAX_HUBNAME_LEN + 1]; // HUB Name
|
|
|
|
UINT NumSessions; // Number of sessions
|
|
|
|
UINT NumSessionsClient; // Number of client sessions
|
|
|
|
UINT NumSessionsBridge; // Number of bridge sessions
|
|
|
|
UINT NumMacTables; // Number of MAC table entries
|
|
|
|
UINT NumIpTables; // Number of IP table entries
|
|
|
|
};
|
|
|
|
|
|
|
|
// Task
|
|
|
|
struct FARM_TASK
|
|
|
|
{
|
|
|
|
EVENT *CompleteEvent; // Completion notice
|
|
|
|
PACK *Request; // Request
|
|
|
|
PACK *Response; // Response
|
|
|
|
FARM_MEMBER *FarmMember; // Destination farm member
|
|
|
|
char TaskName[MAX_PATH]; // Task name
|
|
|
|
char HostName[MAX_PATH]; // Host name
|
|
|
|
};
|
|
|
|
|
|
|
|
// Farm member
|
|
|
|
struct FARM_MEMBER
|
|
|
|
{
|
|
|
|
CEDAR *Cedar; // Cedar
|
|
|
|
UINT64 ConnectedTime; // Connection date and time
|
|
|
|
UINT Me; // Myself
|
|
|
|
UINT Ip; // IP address
|
|
|
|
UINT NumPort; // Number of port numbers
|
|
|
|
UINT *Ports; // Port number
|
|
|
|
char hostname[MAX_HOST_NAME_LEN + 1]; // Host name
|
|
|
|
X *ServerCert; // Server certificate
|
|
|
|
LIST *HubList; // Virtual HUB list
|
|
|
|
QUEUE *TaskQueue; // Task queue
|
|
|
|
EVENT *TaskPostEvent; // Task queuing event
|
|
|
|
UINT Point; // Point
|
|
|
|
volatile bool Halting; // Stopped
|
|
|
|
UINT NumSessions; // Number of sessions
|
|
|
|
UINT MaxSessions; // Maximum number of sessions
|
|
|
|
UINT NumTcpConnections; // Number of TCP connections
|
|
|
|
TRAFFIC Traffic; // Traffic information
|
|
|
|
UINT AssignedClientLicense; // Number of assigned client licenses
|
|
|
|
UINT AssignedBridgeLicense; // Number of assigned bridge licenses
|
|
|
|
UINT Weight; // Performance ratio
|
|
|
|
UCHAR RandomKey[SHA1_SIZE]; // Random number key (license check)
|
|
|
|
UINT64 SystemId; // System ID (license check)
|
|
|
|
};
|
|
|
|
|
|
|
|
// Connection to the farm controller
|
|
|
|
struct FARM_CONTROLLER
|
|
|
|
{
|
|
|
|
LOCK *lock; // Lock
|
|
|
|
struct SERVER *Server; // Server
|
|
|
|
THREAD *Thread; // Thread
|
|
|
|
SOCK *Sock; // Socket
|
|
|
|
SESSION *Session; // Session
|
|
|
|
volatile bool Halt; // Halting flag
|
|
|
|
EVENT *HaltEvent; // Halting event
|
|
|
|
UINT LastError; // Last error
|
|
|
|
bool Online; // Online flag
|
|
|
|
UINT64 StartedTime; // Connection start time
|
|
|
|
UINT64 CurrentConnectedTime; // Connection time of this time
|
|
|
|
UINT64 FirstConnectedTime; // First connection time
|
|
|
|
UINT NumConnected; // Number of connection count
|
|
|
|
UINT NumTry; // Number of trials
|
|
|
|
UINT NumFailed; // Connection failure count
|
|
|
|
bool IsConnected; // Whether it's connected
|
|
|
|
};
|
|
|
|
|
|
|
|
// Server listener
|
|
|
|
struct SERVER_LISTENER
|
|
|
|
{
|
|
|
|
UINT Port; // Port number
|
|
|
|
bool Enabled; // Active flag
|
|
|
|
LISTENER *Listener; // Listener object
|
|
|
|
bool DisableDos; // Disable the DoS detection
|
|
|
|
};
|
|
|
|
|
|
|
|
// Syslog configuration
|
|
|
|
struct SYSLOG_SETTING
|
|
|
|
{
|
|
|
|
UINT SaveType; // Save type
|
|
|
|
char Hostname[MAX_HOST_NAME_LEN + 1]; // Host name
|
|
|
|
UINT Port; // Port number
|
|
|
|
};
|
|
|
|
|
|
|
|
// Setting of SSTP and OpenVPN
|
|
|
|
struct OPENVPN_SSTP_CONFIG
|
|
|
|
{
|
|
|
|
bool EnableOpenVPN; // OpenVPN is enabled
|
|
|
|
char OpenVPNPortList[MAX_SIZE]; // OpenVPN UDP port number list
|
2018-11-13 00:32:37 +03:00
|
|
|
bool OpenVPNObfuscation; // OpenVPN: Obfuscation mode
|
|
|
|
char OpenVPNObfuscationMask[MAX_SIZE]; // OpenVPN: String (mask) for XOR obfuscation
|
2014-01-04 17:00:08 +04:00
|
|
|
bool EnableSSTP; // SSTP is enabled
|
|
|
|
};
|
|
|
|
|
|
|
|
// Server object
|
|
|
|
struct SERVER
|
|
|
|
{
|
|
|
|
UINT ServerType; // Type of server
|
|
|
|
UINT UpdatedServerType; // Type of updated server
|
|
|
|
LIST *ServerListenerList; // Server listener list
|
|
|
|
UCHAR HashedPassword[SHA1_SIZE]; // Password
|
|
|
|
char ControllerName[MAX_HOST_NAME_LEN + 1]; // Controller name
|
|
|
|
UINT ControllerPort; // Controller port
|
|
|
|
UINT Weight; // Performance ratio
|
|
|
|
bool ControllerOnly; // Only controller function
|
|
|
|
UCHAR MemberPassword[SHA1_SIZE]; // Password for farm members
|
|
|
|
UINT PublicIp; // Public IP
|
|
|
|
UINT NumPublicPort; // Number of public ports
|
|
|
|
UINT *PublicPorts; // Public port array
|
|
|
|
UINT64 StartTime; // Start-up time
|
|
|
|
UINT AutoSaveConfigSpan; // Auto save interval
|
|
|
|
UINT AutoSaveConfigSpanSaved; // Auto save interval (stored value)
|
|
|
|
bool DontBackupConfig; // Do not save a backup of the configuration automatically
|
|
|
|
bool BackupConfigOnlyWhenModified; // Save a backup of the configuration only if there is a modification
|
|
|
|
UINT ConfigRevision; // Configuration file revision
|
2018-05-17 00:47:10 +03:00
|
|
|
bool DisableDosProtection; // Disable the DoS attack protection
|
2014-01-04 17:00:08 +04:00
|
|
|
UCHAR MyRandomKey[SHA1_SIZE]; // Their own random key
|
|
|
|
bool FarmControllerInited; // Initialization of farm controller has been completed
|
|
|
|
bool DisableDeadLockCheck; // Disable the deadlock check
|
|
|
|
bool UseWebUI; // Use the WebUI
|
|
|
|
bool SaveDebugLog; // Save the debug log
|
|
|
|
bool NoSendSignature; // Let the client not to send a signature
|
|
|
|
bool UseWebTimePage; // Use WebTimePage
|
|
|
|
bool NoLinuxArpFilter; // Not to set arp_filter in Linux
|
|
|
|
bool NoHighPriorityProcess; // Not to raise the priority of the process
|
|
|
|
bool NoDebugDump; // Not to output the debug dump
|
|
|
|
bool DisableSSTPServer; // Disable the SSTP server function
|
|
|
|
bool DisableOpenVPNServer; // Disable the OpenVPN server function
|
|
|
|
bool DisableNatTraversal; // Disable the NAT-traversal feature
|
|
|
|
bool EnableVpnOverIcmp; // VPN over ICMP is enabled
|
|
|
|
bool EnableVpnOverDns; // VPN over DNS is enabled
|
|
|
|
bool NoMoreSave; // Do not save any more
|
|
|
|
bool EnableConditionalAccept; // Apply the Conditional Accept the Listener
|
2014-07-11 21:06:20 +04:00
|
|
|
bool EnableLegacySSL; // Enable Legacy SSL
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
volatile bool Halt; // Halting flag
|
|
|
|
LOCK *lock; // Lock
|
|
|
|
REF *ref; // Reference counter
|
|
|
|
CEDAR *Cedar; // Cedar
|
|
|
|
CFG_RW *CfgRw; // Configuration file R/W
|
|
|
|
LOCK *SaveCfgLock; // Settings saving lock
|
|
|
|
EVENT *SaveHaltEvent; // Saving thread halting event
|
|
|
|
THREAD *SaveThread; // Settings saving thread
|
|
|
|
FARM_CONTROLLER *FarmController; // Farm controller
|
|
|
|
LOCK *TasksFromFarmControllerLock; // Lock while processing tasks from farm controller
|
|
|
|
LIST *FarmMemberList; // Farm members list
|
|
|
|
FARM_MEMBER *Me; // Register myself as a farm member
|
|
|
|
THREAD *FarmControlThread; // Farm control thread
|
|
|
|
EVENT *FarmControlThreadHaltEvent; // Farm control thread halting event
|
|
|
|
LIST *HubCreateHistoryList; // Virtual HUB creation history list
|
|
|
|
|
|
|
|
KEEP *Keep; // Maintaining connections
|
|
|
|
LOG *Logger; // Server logger
|
|
|
|
ERASER *Eraser; // Eraser
|
|
|
|
|
|
|
|
bool Led; // Use the LED display board
|
|
|
|
bool LedSpecial; // LED Special
|
|
|
|
|
|
|
|
UINT CurrentTotalNumSessionsOnFarm; // Total number of sessions in this server farm
|
|
|
|
UINT CurrentAssignedClientLicense; // Current number of assigned client licenses
|
|
|
|
UINT CurrentAssignedBridgeLicense; // Current number of assigned bridge license
|
|
|
|
|
|
|
|
|
|
|
|
LOCK *SyslogLock; // The lock of the syslog configuration
|
|
|
|
SYSLOG_SETTING SyslogSetting; // Syslog configuration
|
|
|
|
SLOG *Syslog; // Syslog object
|
|
|
|
|
|
|
|
LOCK *CapsCacheLock; // Lock for Caps cache
|
|
|
|
CAPSLIST *CapsListCache; // Caps cache
|
|
|
|
UINT LicenseHash; // Hash value of the license list
|
|
|
|
|
|
|
|
bool SnapshotInited;
|
|
|
|
EVENT *SnapshotHaltEvent; // Snapshot halting event
|
|
|
|
volatile bool HaltSnapshot; // Snapshot halting flag
|
|
|
|
THREAD *SnapshotThread; // Snapshot thread
|
|
|
|
LOG *SnapshotLogger; // Snapshot logger
|
|
|
|
UINT64 LastSnapshotTime; // Time that the last snapshot created
|
|
|
|
|
|
|
|
THREAD *DeadLockCheckThread; // Deadlock check thread
|
|
|
|
volatile bool HaltDeadLockThread; // Halting flag
|
|
|
|
EVENT *DeadLockWaitEvent; // Waiting Event
|
|
|
|
|
|
|
|
IPSEC_SERVER *IPsecServer; // IPsec server function
|
|
|
|
OPENVPN_SERVER_UDP *OpenVpnServerUdp; // OpenVPN server function
|
|
|
|
char OpenVpnServerUdpPorts[MAX_SIZE]; // UDP port list string
|
|
|
|
DDNS_CLIENT *DDnsClient; // DDNS client feature
|
|
|
|
LOCK *OpenVpnSstpConfigLock; // Lock OpenVPN and SSTP configuration
|
|
|
|
|
|
|
|
AZURE_CLIENT *AzureClient; // VPN Azure client
|
|
|
|
bool EnableVpnAzure; // Flag whether VPN Azure client is enabled
|
|
|
|
|
2014-10-03 19:09:23 +04:00
|
|
|
bool DisableGetHostNameWhenAcceptTcp; // Disable GetHostName when accepting TCP
|
|
|
|
bool DisableCoreDumpOnUnix; // Disable core dump on UNIX
|
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
TINY_LOG *DebugLog; // Debug log
|
|
|
|
|
|
|
|
DYNAMIC_LISTENER *DynListenerIcmp; // VPN over ICMP listener
|
|
|
|
DYNAMIC_LISTENER *DynListenerDns; // VPN over DNS listener
|
|
|
|
|
|
|
|
bool IPsecMessageDisplayed; // Flag for whether the message about IPsec is displayed
|
|
|
|
|
|
|
|
bool IsInVm; // Whether I'm within the VM
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
volatile UINT NatTGlobalUdpPort; // NAT-T global UDP port
|
2017-10-18 12:24:21 +03:00
|
|
|
|
2018-01-12 01:53:38 +03:00
|
|
|
IP ListenIP; // Listen IP
|
2017-10-18 12:24:21 +03:00
|
|
|
bool StrictSyslogDatetimeFormat; // Make syslog datetime format strict RFC3164
|
2014-01-04 17:00:08 +04:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
// Enumerate sessions *
|
|
|
|
struct RPC_ENUM_SESSION
|
|
|
|
{
|
|
|
|
char HubName[MAX_HUBNAME_LEN + 1]; // HUB Name
|
|
|
|
UINT NumSession; // Number of sessions
|
|
|
|
struct RPC_ENUM_SESSION_ITEM *Sessions; // Session list
|
|
|
|
};
|
|
|
|
|
|
|
|
// Session status *
|
|
|
|
struct RPC_SESSION_STATUS
|
|
|
|
{
|
|
|
|
char HubName[MAX_HUBNAME_LEN + 1]; // HUB Name
|
|
|
|
char Name[MAX_SESSION_NAME_LEN + 1]; // Session name
|
|
|
|
char Username[MAX_USERNAME_LEN + 1]; // User name
|
|
|
|
char RealUsername[MAX_USERNAME_LEN + 1]; // Real user name
|
|
|
|
char GroupName[MAX_USERNAME_LEN + 1]; // Group name
|
|
|
|
bool LinkMode; // Link mode
|
|
|
|
RPC_CLIENT_GET_CONNECTION_STATUS Status; // Status
|
|
|
|
UINT ClientIp; // Client IP address
|
|
|
|
UCHAR ClientIp6[16]; // Client IPv6 address
|
|
|
|
char ClientHostName[MAX_HOST_NAME_LEN + 1]; // Client host name
|
|
|
|
NODE_INFO NodeInfo; // Node information
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
// Type of server
|
|
|
|
#define SERVER_TYPE_STANDALONE 0 // Stand-alone server
|
|
|
|
#define SERVER_TYPE_FARM_CONTROLLER 1 // Farm controller server
|
|
|
|
#define SERVER_TYPE_FARM_MEMBER 2 // Farm member server
|
|
|
|
|
|
|
|
|
|
|
|
// Caps related
|
|
|
|
struct CAPS
|
|
|
|
{
|
|
|
|
char *Name; // Name
|
|
|
|
UINT Value; // Value
|
|
|
|
};
|
|
|
|
struct CAPSLIST
|
|
|
|
{
|
|
|
|
LIST *CapsList; // Caps list
|
|
|
|
};
|
|
|
|
|
|
|
|
// Log file
|
|
|
|
struct LOG_FILE
|
|
|
|
{
|
|
|
|
char Path[MAX_PATH]; // Path name
|
|
|
|
char ServerName[MAX_HOST_NAME_LEN + 1]; // Server name
|
|
|
|
UINT FileSize; // File size
|
|
|
|
UINT64 UpdatedTime; // Updating date
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2014-03-20 00:45:05 +04:00
|
|
|
// Global server flags
|
|
|
|
#define NUM_GLOBAL_SERVER_FLAGS 128
|
|
|
|
#define GSF_DISABLE_PUSH_ROUTE 1
|
|
|
|
#define GSF_DISABLE_RADIUS_AUTH 2
|
|
|
|
#define GSF_DISABLE_CERT_AUTH 3
|
|
|
|
#define GSF_DISABLE_DEEP_LOGGING 4
|
|
|
|
#define GSF_DISABLE_AC 5
|
|
|
|
#define GSF_DISABLE_SYSLOG 6
|
|
|
|
#define GSF_SHOW_OSS_MSG 7
|
2014-10-03 19:09:23 +04:00
|
|
|
#define GSF_LOCALBRIDGE_NO_DISABLE_OFFLOAD 8
|
|
|
|
#define GSF_DISABLE_SESSION_RECONNECT 9
|
|
|
|
|
|
|
|
// Global parameters
|
|
|
|
#define NUM_GLOBAL_PARAMS 128
|
|
|
|
#define GP_MAX_SEND_SOCKET_QUEUE_SIZE 1
|
|
|
|
#define GP_MIN_SEND_SOCKET_QUEUE_SIZE 2
|
|
|
|
#define GP_MAX_SEND_SOCKET_QUEUE_NUM 3
|
|
|
|
#define GP_SELECT_TIME 4
|
|
|
|
#define GP_SELECT_TIME_FOR_NAT 5
|
|
|
|
#define GP_MAX_STORED_QUEUE_NUM 6
|
|
|
|
#define GP_MAX_BUFFERING_PACKET_SIZE 7
|
|
|
|
#define GP_HUB_ARP_SEND_INTERVAL 8
|
|
|
|
#define GP_MAC_TABLE_EXPIRE_TIME 9
|
|
|
|
#define GP_IP_TABLE_EXPIRE_TIME 10
|
|
|
|
#define GP_IP_TABLE_EXPIRE_TIME_DHCP 11
|
|
|
|
#define GP_STORM_CHECK_SPAN 12
|
|
|
|
#define GP_STORM_DISCARD_VALUE_START 13
|
|
|
|
#define GP_STORM_DISCARD_VALUE_END 14
|
|
|
|
#define GP_MAX_MAC_TABLES 15
|
|
|
|
#define GP_MAX_IP_TABLES 16
|
|
|
|
#define GP_MAX_HUB_LINKS 17
|
|
|
|
#define GP_MEM_FIFO_REALLOC_MEM_SIZE 18
|
|
|
|
#define GP_QUEUE_BUDGET 19
|
|
|
|
#define GP_FIFO_BUDGET 20
|
|
|
|
|
|
|
|
extern UINT vpn_global_parameters[NUM_GLOBAL_PARAMS];
|
|
|
|
|
|
|
|
#define VPN_GP(id, default_value) ((UINT)(vpn_global_parameters[(id)] != 0 ? vpn_global_parameters[(id)] : (default_value)))
|
2014-03-20 00:45:05 +04:00
|
|
|
|
|
|
|
|
2014-06-06 01:53:20 +04:00
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
// Virtual HUB creation history
|
|
|
|
struct SERVER_HUB_CREATE_HISTORY
|
|
|
|
{
|
|
|
|
char HubName[MAX_HUBNAME_LEN + 1];
|
|
|
|
UINT64 CreatedTime;
|
|
|
|
};
|
|
|
|
|
|
|
|
// Function prototype declaration
|
|
|
|
SERVER *SiNewServer(bool bridge);
|
2015-01-30 16:30:34 +03:00
|
|
|
SERVER *SiNewServerEx(bool bridge, bool in_client_inner_server, bool relay_server);
|
2014-01-04 17:00:08 +04:00
|
|
|
void SiReleaseServer(SERVER *s);
|
|
|
|
void SiCleanupServer(SERVER *s);
|
|
|
|
void StStartServer(bool bridge);
|
|
|
|
void StStopServer();
|
|
|
|
void SiInitConfiguration(SERVER *s);
|
|
|
|
void SiFreeConfiguration(SERVER *s);
|
|
|
|
UINT SiWriteConfigurationFile(SERVER *s);
|
|
|
|
void SiLoadInitialConfiguration(SERVER *s);
|
|
|
|
bool SiLoadConfigurationFile(SERVER *s);
|
|
|
|
bool SiLoadConfigurationFileMain(SERVER *s, FOLDER *root);
|
|
|
|
void SiInitDefaultServerCert(SERVER *s);
|
|
|
|
void SiInitCipherName(SERVER *s);
|
|
|
|
void SiGenerateDefaultCert(X **server_x, K **server_k);
|
|
|
|
void SiGenerateDefaultCertEx(X **server_x, K **server_k, char *common_name);
|
|
|
|
void SiInitListenerList(SERVER *s);
|
|
|
|
void SiLockListenerList(SERVER *s);
|
|
|
|
void SiUnlockListenerList(SERVER *s);
|
|
|
|
bool SiAddListener(SERVER *s, UINT port, bool enabled);
|
|
|
|
bool SiAddListenerEx(SERVER *s, UINT port, bool enabled, bool disable_dos);
|
|
|
|
bool SiEnableListener(SERVER *s, UINT port);
|
|
|
|
bool SiDisableListener(SERVER *s, UINT port);
|
|
|
|
bool SiDeleteListener(SERVER *s, UINT port);
|
|
|
|
SERVER_LISTENER *SiGetListener(SERVER *s, UINT port);
|
|
|
|
int CompareServerListener(void *p1, void *p2);
|
|
|
|
void SiStopAllListener(SERVER *s);
|
|
|
|
void SiInitDefaultHubList(SERVER *s);
|
|
|
|
void SiSetDefaultHubOption(HUB_OPTION *o);
|
|
|
|
FOLDER *SiWriteConfigurationToCfg(SERVER *s);
|
|
|
|
bool SiLoadConfigurationCfg(SERVER *s, FOLDER *root);
|
|
|
|
void SiWriteLocalBridges(FOLDER *f, SERVER *s);
|
|
|
|
void SiLoadLocalBridges(SERVER *s, FOLDER *f);
|
|
|
|
void SiWriteLocalBridgeCfg(FOLDER *f, LOCALBRIDGE *br);
|
|
|
|
void SiLoadLocalBridgeCfg(SERVER *s, FOLDER *f);
|
|
|
|
void SiWriteListeners(FOLDER *f, SERVER *s);
|
|
|
|
void SiLoadListeners(SERVER *s, FOLDER *f);
|
|
|
|
void SiWriteListenerCfg(FOLDER *f, SERVER_LISTENER *r);
|
|
|
|
void SiLoadListenerCfg(SERVER *s, FOLDER *f);
|
|
|
|
void SiWriteServerCfg(FOLDER *f, SERVER *s);
|
|
|
|
void SiLoadServerCfg(SERVER *s, FOLDER *f);
|
2014-10-03 19:09:23 +04:00
|
|
|
void SiWriteGlobalParamsCfg(FOLDER *f);
|
|
|
|
void SiLoadGlobalParamsCfg(FOLDER *f);
|
|
|
|
void SiLoadGlobalParamItem(UINT id, UINT value);
|
2014-01-04 17:00:08 +04:00
|
|
|
void SiWriteTraffic(FOLDER *parent, char *name, TRAFFIC *t);
|
|
|
|
void SiWriteTrafficInner(FOLDER *parent, char *name, TRAFFIC_ENTRY *e);
|
|
|
|
void SiLoadTrafficInner(FOLDER *parent, char *name, TRAFFIC_ENTRY *e);
|
|
|
|
void SiLoadTraffic(FOLDER *parent, char *name, TRAFFIC *t);
|
|
|
|
void SiSaverThread(THREAD *thread, void *param);
|
|
|
|
void SiLoadLicenseManager(SERVER *s, FOLDER *f);
|
|
|
|
void SiWriteLicenseManager(FOLDER *f, SERVER *s);
|
|
|
|
void SiLoadL3Switchs(SERVER *s, FOLDER *f);
|
|
|
|
void SiLoadL3SwitchCfg(L3SW *sw, FOLDER *f);
|
|
|
|
void SiWriteL3Switchs(FOLDER *f, SERVER *s);
|
|
|
|
void SiWriteL3SwitchCfg(FOLDER *f, L3SW *sw);
|
|
|
|
void SiLoadIPsec(SERVER *s, FOLDER *f);
|
|
|
|
void SiWriteIPsec(FOLDER *f, SERVER *s);
|
|
|
|
void SiWriteHubs(FOLDER *f, SERVER *s);
|
|
|
|
void SiLoadHubs(SERVER *s, FOLDER *f);
|
|
|
|
void SiWriteHubCfg(FOLDER *f, HUB *h);
|
|
|
|
void SiLoadHubCfg(SERVER *s, FOLDER *f, char *name);
|
|
|
|
void SiLoadHubLogCfg(HUB_LOG *g, FOLDER *f);
|
|
|
|
void SiWriteHubOptionCfg(FOLDER *f, HUB_OPTION *o);
|
|
|
|
void SiWriteHubLogCfg(FOLDER *f, HUB_LOG *g);
|
|
|
|
void SiWriteHubLogCfgEx(FOLDER *f, HUB_LOG *g, bool el_mode);
|
|
|
|
void SiLoadHubOptionCfg(FOLDER *f, HUB_OPTION *o);
|
|
|
|
void SiWriteHubLinks(FOLDER *f, HUB *h);
|
|
|
|
void SiLoadHubLinks(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteHubAdminOptions(FOLDER *f, HUB *h);
|
|
|
|
void SiLoadHubAdminOptions(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteHubLinkCfg(FOLDER *f, LINK *k);
|
|
|
|
void SiLoadHubLinkCfg(FOLDER *f, HUB *h);
|
|
|
|
void SiWriteHubAccessLists(FOLDER *f, HUB *h);
|
|
|
|
void SiLoadHubAccessLists(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteHubAccessCfg(FOLDER *f, ACCESS *a);
|
|
|
|
void SiLoadHubAccessCfg(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteHubDb(FOLDER *f, HUBDB *db, bool no_save_ac_list);
|
|
|
|
void SiLoadHubDb(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteUserList(FOLDER *f, LIST *o);
|
|
|
|
void SiLoadUserList(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteUserCfg(FOLDER *f, USER *u);
|
|
|
|
void SiLoadUserCfg(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteGroupList(FOLDER *f, LIST *o);
|
|
|
|
void SiLoadGroupList(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteGroupCfg(FOLDER *f, USERGROUP *g);
|
|
|
|
void SiLoadGroupCfg(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteCertList(FOLDER *f, LIST *o);
|
|
|
|
void SiLoadCertList(LIST *o, FOLDER *f);
|
|
|
|
void SiWriteCrlList(FOLDER *f, LIST *o);
|
|
|
|
void SiLoadCrlList(LIST *o, FOLDER *f);
|
|
|
|
void SiWriteAcList(FOLDER *f, LIST *o);
|
|
|
|
void SiLoadAcList(LIST *o, FOLDER *f);
|
|
|
|
void SiWritePolicyCfg(FOLDER *f, POLICY *p, bool cascade_mode);
|
|
|
|
void SiLoadPolicyCfg(POLICY *p, FOLDER *f);
|
|
|
|
void SiLoadSecureNAT(HUB *h, FOLDER *f);
|
|
|
|
void SiWriteSecureNAT(HUB *h, FOLDER *f);
|
|
|
|
void SiRebootServerEx(bool bridge, bool reset_setting);
|
|
|
|
void SiRebootServer(bool bridge);
|
|
|
|
void SiRebootServerThread(THREAD *thread, void *param);
|
|
|
|
void StInit();
|
|
|
|
void StFree();
|
|
|
|
void SiSetServerType(SERVER *s, UINT type,
|
|
|
|
UINT ip, UINT num_port, UINT *ports,
|
|
|
|
char *controller_name, UINT controller_port, UCHAR *password, UINT weight, bool controller_only);
|
|
|
|
FARM_CONTROLLER *SiStartConnectToController(SERVER *s);
|
|
|
|
void SiStopConnectToController(FARM_CONTROLLER *f);
|
|
|
|
void SiFarmServ(SERVER *server, SOCK *sock, X *cert, UINT ip, UINT num_port, UINT *ports, char *hostname, UINT point, UINT weight, UINT max_sessions);
|
|
|
|
int CompareHubList(void *p1, void *p2);
|
|
|
|
void SiFarmServMain(SERVER *server, SOCK *sock, FARM_MEMBER *f);
|
|
|
|
FARM_TASK *SiFarmServPostTask(FARM_MEMBER *f, PACK *request);
|
|
|
|
PACK *SiFarmServWaitTask(FARM_TASK *t);
|
|
|
|
PACK *SiExecTask(FARM_MEMBER *f, PACK *p);
|
|
|
|
PACK *SiCallTask(FARM_MEMBER *f, PACK *p, char *taskname);
|
|
|
|
void SiAcceptTasksFromController(FARM_CONTROLLER *f, SOCK *sock);
|
|
|
|
void SiAcceptTasksFromControllerMain(FARM_CONTROLLER *f, SOCK *sock);
|
|
|
|
PACK *SiCalledTask(FARM_CONTROLLER *f, PACK *p, char *taskname);
|
|
|
|
void SiHubOnlineProc(HUB *h);
|
|
|
|
void SiHubOfflineProc(HUB *h);
|
|
|
|
FARM_MEMBER *SiGetNextFarmMember(SERVER *s, CONNECTION *c, HUB *h);
|
|
|
|
bool SiGetMemberSelectorUrl(char *url, UINT url_size);
|
|
|
|
void SiCallCreateHub(SERVER *s, FARM_MEMBER *f, HUB *h);
|
|
|
|
void SiCallUpdateHub(SERVER *s, FARM_MEMBER *f, HUB *h);
|
|
|
|
void SiCallDeleteHub(SERVER *s, FARM_MEMBER *f, HUB *h);
|
|
|
|
void SiCallEnumSession(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_SESSION *t);
|
|
|
|
void SiCallEnumNat(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_NAT *t);
|
|
|
|
void SiCallEnumDhcp(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_DHCP *t);
|
|
|
|
void SiCallGetNatStatus(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_NAT_STATUS *t);
|
|
|
|
void SiCallEnumMacTable(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_MAC_TABLE *t);
|
|
|
|
void SiCallEnumIpTable(SERVER *s, FARM_MEMBER *f, char *hubname, RPC_ENUM_IP_TABLE *t);
|
|
|
|
void SiCallDeleteSession(SERVER *s, FARM_MEMBER *f, char *hubname, char *session_name);
|
|
|
|
void SiCallCreateTicket(SERVER *s, FARM_MEMBER *f, char *hubname, char *username, char *realusername, POLICY *policy, UCHAR *ticket, UINT counter, char *groupname);
|
|
|
|
void SiCallDeleteMacTable(SERVER *s, FARM_MEMBER *f, char *hubname, UINT key);
|
|
|
|
void SiCallDeleteIpTable(SERVER *s, FARM_MEMBER *f, char *hubname, UINT key);
|
|
|
|
void SiCalledCreateHub(SERVER *s, PACK *p);
|
|
|
|
void SiCalledUpdateHub(SERVER *s, PACK *p);
|
|
|
|
void SiCalledDeleteHub(SERVER *s, PACK *p);
|
|
|
|
void SiCalledDeleteSession(SERVER *s, PACK *p);
|
|
|
|
void SiCalledDeleteMacTable(SERVER *s, PACK *p);
|
|
|
|
void SiCalledDeleteIpTable(SERVER *s, PACK *p);
|
|
|
|
PACK *SiCalledCreateTicket(SERVER *s, PACK *p);
|
|
|
|
PACK *SiCalledEnumSession(SERVER *s, PACK *p);
|
|
|
|
PACK *SiCalledEnumNat(SERVER *s, PACK *p);
|
|
|
|
PACK *SiCalledEnumDhcp(SERVER *s, PACK *p);
|
|
|
|
PACK *SiCalledGetNatStatus(SERVER *s, PACK *p);
|
|
|
|
PACK *SiCalledEnumMacTable(SERVER *s, PACK *p);
|
|
|
|
PACK *SiCalledEnumIpTable(SERVER *s, PACK *p);
|
|
|
|
void SiCalledEnumHub(SERVER *s, PACK *p, PACK *req);
|
|
|
|
void SiPackAddCreateHub(PACK *p, HUB *h);
|
|
|
|
FARM_MEMBER *SiGetHubHostingMember(SERVER *s, HUB *h, bool admin_mode, CONNECTION *c);
|
|
|
|
void SiCallEnumHub(SERVER *s, FARM_MEMBER *f);
|
|
|
|
void SiStartFarmControl(SERVER *s);
|
|
|
|
void SiStopFarmControl(SERVER *s);
|
|
|
|
void SiFarmControlThread(THREAD *thread, void *param);
|
|
|
|
void SiAccessListToPack(PACK *p, LIST *o);
|
|
|
|
void SiAccessToPack(PACK *p, ACCESS *a, UINT i, UINT total);
|
|
|
|
ACCESS *SiPackToAccess(PACK *p, UINT i);
|
|
|
|
UINT SiNumAccessFromPack(PACK *p);
|
|
|
|
void SiHubUpdateProc(HUB *h);
|
|
|
|
bool SiCheckTicket(HUB *h, UCHAR *ticket, char *username, UINT username_size, char *usernamereal, UINT usernamereal_size, POLICY *policy, char *sessionname, UINT sessionname_size, char *groupname, UINT groupname_size);
|
|
|
|
UINT SiGetPoint(SERVER *s);
|
|
|
|
UINT SiCalcPoint(SERVER *s, UINT num, UINT weight);
|
|
|
|
bool SiCallGetSessionStatus(SERVER *s, FARM_MEMBER *f, RPC_SESSION_STATUS *t);
|
|
|
|
PACK *SiCalledGetSessionStatus(SERVER *s, PACK *p);
|
|
|
|
bool SiCallEnumLogFileList(SERVER *s, FARM_MEMBER *f, RPC_ENUM_LOG_FILE *t, char *hubname);
|
|
|
|
PACK *SiCalledEnumLogFileList(SERVER *s, PACK *p);
|
|
|
|
bool SiCallReadLogFile(SERVER *s, FARM_MEMBER *f, RPC_READ_LOG_FILE *t);
|
|
|
|
PACK *SiCalledReadLogFile(SERVER *s, PACK *p);
|
|
|
|
int CmpLogFile(void *p1, void *p2);
|
|
|
|
LIST *EnumLogFile(char *hubname);
|
|
|
|
void EnumLogFileDir(LIST *o, char *dirname);
|
|
|
|
void FreeEnumLogFile(LIST *o);
|
|
|
|
bool CheckLogFileNameFromEnumList(LIST *o, char *name, char *server_name);
|
|
|
|
void IncrementServerConfigRevision(SERVER *s);
|
|
|
|
void GetServerProductName(SERVER *s, char *name, UINT size);
|
|
|
|
void GetServerProductNameInternal(SERVER *s, char *name, UINT size);
|
|
|
|
|
|
|
|
|
|
|
|
void SiSetSysLogSetting(SERVER *s, SYSLOG_SETTING *setting);
|
|
|
|
void SiGetSysLogSetting(SERVER *s, SYSLOG_SETTING *setting);
|
|
|
|
void SiWriteSysLog(SERVER *s, char *typestr, char *hubname, wchar_t *message);
|
|
|
|
UINT SiGetSysLogSaveStatus(SERVER *s);
|
|
|
|
void SiInitDeadLockCheck(SERVER *s);
|
|
|
|
void SiFreeDeadLockCheck(SERVER *s);
|
|
|
|
void SiDeadLockCheckThread(THREAD *t, void *param);
|
|
|
|
void SiCheckDeadLockMain(SERVER *s, UINT timeout);
|
|
|
|
void SiDebugLog(SERVER *s, char *msg);
|
|
|
|
UINT SiDebug(SERVER *s, RPC_TEST *ret, UINT i, char *str);
|
|
|
|
UINT SiDebugProcHelloWorld(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcExit(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcDump(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcRestorePriority(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcSetHighPriority(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcGetExeFileName(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcCrash(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcGetIPsecMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcSetIPsecMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcGetVgsMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
UINT SiDebugProcSetVgsMessageDisplayedValue(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
2014-10-03 19:09:23 +04:00
|
|
|
UINT SiDebugProcGetCurrentTcpSendQueueLength(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
2014-11-18 06:05:48 +03:00
|
|
|
UINT SiDebugProcGetCurrentGetIPThreadCount(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
typedef UINT (SI_DEBUG_PROC)(SERVER *s, char *in_str, char *ret_str, UINT ret_str_size);
|
|
|
|
|
|
|
|
CAPS *NewCaps(char *name, UINT value);
|
|
|
|
void FreeCaps(CAPS *c);
|
|
|
|
CAPSLIST *NewCapsList();
|
|
|
|
int CompareCaps(void *p1, void *p2);
|
|
|
|
void AddCaps(CAPSLIST *caps, CAPS *c);
|
|
|
|
CAPS *GetCaps(CAPSLIST *caps, char *name);
|
|
|
|
void FreeCapsList(CAPSLIST *caps);
|
|
|
|
bool GetCapsBool(CAPSLIST *caps, char *name);
|
|
|
|
UINT GetCapsInt(CAPSLIST *caps, char *name);
|
|
|
|
void AddCapsBool(CAPSLIST *caps, char *name, bool b);
|
|
|
|
void AddCapsInt(CAPSLIST *caps, char *name, UINT i);
|
|
|
|
void InRpcCapsList(CAPSLIST *t, PACK *p);
|
|
|
|
void OutRpcCapsList(PACK *p, CAPSLIST *t);
|
|
|
|
void FreeRpcCapsList(CAPSLIST *t);
|
|
|
|
void InitCapsList(CAPSLIST *t);
|
|
|
|
void InRpcSysLogSetting(SYSLOG_SETTING *t, PACK *p);
|
|
|
|
void OutRpcSysLogSetting(PACK *p, SYSLOG_SETTING *t);
|
|
|
|
|
|
|
|
void GetServerCaps(SERVER *s, CAPSLIST *t);
|
2014-03-20 00:45:05 +04:00
|
|
|
void FlushServerCaps(SERVER *s);
|
2014-01-04 17:00:08 +04:00
|
|
|
bool GetServerCapsBool(SERVER *s, char *name);
|
|
|
|
UINT GetServerCapsInt(SERVER *s, char *name);
|
|
|
|
void GetServerCapsMain(SERVER *s, CAPSLIST *t);
|
|
|
|
void InitServerCapsCache(SERVER *s);
|
|
|
|
void FreeServerCapsCache(SERVER *s);
|
|
|
|
void DestroyServerCapsCache(SERVER *s);
|
|
|
|
|
2014-03-20 00:45:05 +04:00
|
|
|
void SetGlobalServerFlag(UINT index, UINT value);
|
|
|
|
UINT GetGlobalServerFlag(UINT index);
|
|
|
|
void UpdateGlobalServerFlags(SERVER *s, CAPSLIST *t);
|
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
|
|
|
|
bool IsAdminPackSupportedServerProduct(char *name);
|
|
|
|
|
|
|
|
void SiInitHubCreateHistory(SERVER *s);
|
|
|
|
void SiFreeHubCreateHistory(SERVER *s);
|
|
|
|
void SiDeleteOldHubCreateHistory(SERVER *s);
|
|
|
|
void SiAddHubCreateHistory(SERVER *s, char *name);
|
|
|
|
void SiDelHubCreateHistory(SERVER *s, char *name);
|
|
|
|
bool SiIsHubRegistedOnCreateHistory(SERVER *s, char *name);
|
|
|
|
|
|
|
|
bool SiTooManyUserObjectsInServer(SERVER *s, bool oneMore);
|
|
|
|
|
|
|
|
void SiGetOpenVPNAndSSTPConfig(SERVER *s, OPENVPN_SSTP_CONFIG *c);
|
|
|
|
void SiSetOpenVPNAndSSTPConfig(SERVER *s, OPENVPN_SSTP_CONFIG *c);
|
|
|
|
|
|
|
|
bool SiCanOpenVpnOverDnsPort();
|
|
|
|
bool SiCanOpenVpnOverIcmpPort();
|
|
|
|
void SiApplySpecialListenerStatus(SERVER *s);
|
|
|
|
|
|
|
|
bool SiIsAzureEnabled(SERVER *s);
|
|
|
|
bool SiIsAzureSupported(SERVER *s);
|
|
|
|
void SiApplyAzureConfig(SERVER *s, DDNS_CLIENT_STATUS *ddns_status);
|
|
|
|
void SiSetAzureEnable(SERVER *s, bool enabled);
|
|
|
|
|
2014-03-20 00:45:05 +04:00
|
|
|
void SiUpdateCurrentRegion(CEDAR *c, char *region, bool force_update);
|
|
|
|
void SiGetCurrentRegion(CEDAR *c, char *region, UINT region_size);
|
|
|
|
bool SiIsEnterpriseFunctionsRestrictedOnOpenSource(CEDAR *c);
|
|
|
|
|
2014-01-04 17:00:08 +04:00
|
|
|
#endif // SERVER_H
|
|
|
|
|
|
|
|
|
|
|
|
|