1
0
mirror of https://github.com/SoftEtherVPN/SoftEtherVPN.git synced 2024-11-07 10:10:41 +03:00
SoftEtherVPN/src/Cedar/BridgeWin32.c
Davide Beatrici 3f5f716357 Revamp digest functions
- Hash() has been removed because it was ambiguous, Md5() and Sha0() are proper replacements.
- HMacMd5() and HMacSha1() now share a common implementation handled by the new Internal_HMac() function.
- NewMd() and MdProcess() now support plain hashing (without the key).
- NewMd(), SetMdKey() and MdProcess() now check the OpenSSL functions' return value and in case of failure a debug message is printed along with the error string, if available.
- SetMdKey()'s return value has been changed from void to bool, so that it's possible to know whether the function succeeded or not.
- MdProcess()' return value has been changed from void to UINT (unsigned int) and the function now returns the number of bytes written by HMAC_Final() or EVP_DigestFinal_ex().
2018-09-22 06:36:09 +02:00

2246 lines
46 KiB
C

// SoftEther VPN Source Code - Developer Edition Master Branch
// Cedar Communication Module
//
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
//
// Copyright (c) Daiyuu Nobori.
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
// Copyright (c) SoftEther Corporation.
//
// All Rights Reserved.
//
// http://www.softether.org/
//
// Author: Daiyuu Nobori, Ph.D.
// Comments: Tetsuo Sugiyama, Ph.D.
//
// This program is free software; you can redistribute it and/or
// modify it under the terms of the GNU General Public License
// version 2 as published by the Free Software Foundation.
//
// This program is distributed in the hope that it will be useful,
// but WITHOUT ANY WARRANTY; without even the implied warranty of
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
// GNU General Public License for more details.
//
// You should have received a copy of the GNU General Public License version 2
// along with this program; if not, write to the Free Software
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
//
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
//
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
//
//
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
//
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
// YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
// CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
// SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
// SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
// COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
// PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
// CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
// NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
// COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
// WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
// COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
// COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
// SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
// COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
// RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
// JUST A STATEMENT FOR WARNING AND DISCLAIMER.
//
//
// SOURCE CODE CONTRIBUTION
// ------------------------
//
// Your contribution to SoftEther VPN Project is much appreciated.
// Please send patches to us through GitHub.
// Read the SoftEther VPN Patch Acceptance Policy in advance:
// http://www.softether.org/5-download/src/9.patch
//
//
// DEAR SECURITY EXPERTS
// ---------------------
//
// If you find a bug or a security vulnerability please kindly inform us
// about the problem immediately so that we can fix the security problem
// to protect a lot of users around the world as soon as possible.
//
// Our e-mail address for security reports is:
// softether-vpn-security [at] softether.org
//
// Please note that the above e-mail address is not a technical support
// inquiry address. If you need technical assistance, please visit
// http://www.softether.org/ and ask your question on the users forum.
//
// Thank you for your cooperation.
//
//
// NO MEMORY OR RESOURCE LEAKS
// ---------------------------
//
// The memory-leaks and resource-leaks verification under the stress
// test has been passed before release this source code.
// BridgeWin32.c
// Ethernet Bridge Program (Win32)
#include <GlobalConst.h>
#ifdef BRIDGE_C
#include <winsock2.h>
#include <Ws2tcpip.h>
#include <windows.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <wchar.h>
#include <stdarg.h>
#include <time.h>
#include <errno.h>
#include <Packet32.h>
#include <Mayaqua/Mayaqua.h>
#include <Cedar/Cedar.h>
static WP *wp = NULL;
static LIST *eth_list = NULL;
static LOCK *eth_list_lock = NULL;
static bool is_see_mode = false;
static bool is_using_selow = false;
static bool enable_selow = true;
static bool g_bridge_win32_show_all_if = false;
#define LOAD_DLL_ADDR(name) \
{ \
void *addr = GetProcAddress(h, #name); \
Copy(&wp->name, &addr, sizeof(void *)); \
}
// Set the flag which indicates whether using SeLow
void Win32SetEnableSeLow(bool b)
{
enable_selow = b;
}
// Get the flag which indicates whether using SeLow
bool Win32GetEnableSeLow()
{
return enable_selow;
}
// Set the flag which indicates whether enumerating all interfaces
void Win32EthSetShowAllIf(bool b)
{
g_bridge_win32_show_all_if = b;
}
// Get the flag which indicates whether enumerating all interfaces
bool Win32EthGetShowAllIf()
{
return g_bridge_win32_show_all_if;
}
// Compare Ethernet device list
int CmpRpcEnumEthVLan(void *p1, void *p2)
{
RPC_ENUM_ETH_VLAN_ITEM *v1, *v2;
if (p1 == NULL || p2 == NULL)
{
return 0;
}
v1 = *((RPC_ENUM_ETH_VLAN_ITEM **)p1);
v2 = *((RPC_ENUM_ETH_VLAN_ITEM **)p2);
if (v1 == NULL || v2 == NULL)
{
return 0;
}
return StrCmpi(v1->DeviceName, v2->DeviceName);
}
// Get the value of MTU (Not supported in Windows)
UINT EthGetMtu(ETH *e)
{
return 0;
}
// Set the value of MTU (Not supported in Windows)
bool EthSetMtu(ETH *e, UINT mtu)
{
return false;
}
// Check whether setting MEU value (Not supported in Windows)
bool EthIsChangeMtuSupported(ETH *e)
{
return false;
}
// Set the state of VLAN tag pass-through
bool SetVLanEnableStatus(char *title, bool enable)
{
RPC_ENUM_ETH_VLAN t;
RPC_ENUM_ETH_VLAN_ITEM *e;
bool ret = false;
char key[MAX_SIZE];
char tcpkey[MAX_SIZE];
char short_key[MAX_SIZE];
// Validate arguments
if (title == NULL)
{
return false;
}
Zero(&t, sizeof(t));
if (EnumEthVLanWin32(&t) == false)
{
return false;
}
e = FindEthVLanItem(&t, title);
if (e != NULL)
{
if (GetClassRegKeyWin32(key, sizeof(key), short_key, sizeof(short_key), e->Guid))
{
if (StrCmpi(e->DriverType, "Intel") == 0)
{
if (enable)
{
MsRegWriteStr(REG_LOCAL_MACHINE, key, "VlanFiltering", "0");
MsRegWriteStr(REG_LOCAL_MACHINE, key, "TaggingMode", "0");
MsRegWriteInt(REG_LOCAL_MACHINE, key, "MonitorMode", 1);
MsRegWriteInt(REG_LOCAL_MACHINE, key, "MonitorModeEnabled", 1);
}
else
{
if (MsRegReadInt(REG_LOCAL_MACHINE, key, "TaggingMode") == 0)
{
MsRegDeleteValue(REG_LOCAL_MACHINE, key, "TaggingMode");
}
if (MsRegReadInt(REG_LOCAL_MACHINE, key, "MonitorMode") == 1)
{
MsRegDeleteValue(REG_LOCAL_MACHINE, key, "MonitorMode");
}
if (MsRegReadInt(REG_LOCAL_MACHINE, key, "MonitorModeEnabled") == 1)
{
MsRegDeleteValue(REG_LOCAL_MACHINE, key, "MonitorModeEnabled");
}
}
ret = true;
}
else if (StrCmpi(e->DriverType, "Broadcom") == 0)
{
if (enable)
{
MsRegWriteStr(REG_LOCAL_MACHINE, key, "PreserveVlanInfoInRxPacket", "1");
}
else
{
MsRegDeleteValue(REG_LOCAL_MACHINE, key, "PreserveVlanInfoInRxPacket");
}
ret = true;
}
else if (StrCmpi(e->DriverType, "Marvell") == 0)
{
if (enable)
{
MsRegWriteInt(REG_LOCAL_MACHINE, key, "SkDisableVlanStrip", 1);
}
else
{
MsRegDeleteValue(REG_LOCAL_MACHINE, key, "SkDisableVlanStrip");
}
ret = true;
}
Format(tcpkey, sizeof(tcpkey),
"SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces\\%s",
e->Guid);
if (enable)
{
if (MsRegIsValue(REG_LOCAL_MACHINE, tcpkey, "MTU") == false)
{
MsRegWriteInt(REG_LOCAL_MACHINE, tcpkey, "MTU", 1500);
}
}
else
{
UINT mtu = MsRegReadInt(REG_LOCAL_MACHINE, tcpkey, "MTU");
if (mtu == 1500)
{
MsRegDeleteValue(REG_LOCAL_MACHINE, tcpkey, "MTU");
}
}
}
}
FreeRpcEnumEthVLan(&t);
return ret;
}
// Find Ethernet device
RPC_ENUM_ETH_VLAN_ITEM *FindEthVLanItem(RPC_ENUM_ETH_VLAN *t, char *name)
{
UINT i;
// Validate arguments
if (t == NULL || name == NULL)
{
return NULL;
}
for (i = 0;i < t->NumItem;i++)
{
if (StrCmpi(t->Items[i].DeviceName, name) == 0)
{
return &t->Items[i];
}
}
return NULL;
}
// Get the state of VLAN tag pass-through
void GetVLanEnableStatus(RPC_ENUM_ETH_VLAN_ITEM *e)
{
char key[MAX_SIZE];
char short_key[MAX_SIZE];
char tcpkey[MAX_SIZE];
// Validate arguments
if (e == NULL)
{
return;
}
e->Enabled = false;
if (e->Support == false)
{
return;
}
if (GetClassRegKeyWin32(key, sizeof(key), short_key, sizeof(short_key), e->Guid) == false)
{
return;
}
Format(tcpkey, sizeof(tcpkey),
"SYSTEM\\CurrentControlSet\\Services\\Tcpip\\Parameters\\Interfaces\\%s",
e->Guid);
if (StrCmpi(e->DriverType, "Intel") == 0)
{
char *VlanFiltering = MsRegReadStr(REG_LOCAL_MACHINE, key, "VlanFiltering");
UINT MonitorMode = MsRegReadInt(REG_LOCAL_MACHINE, key, "MonitorMode");
UINT MonitorModeEnabled = MsRegReadInt(REG_LOCAL_MACHINE, key, "MonitorModeEnabled");
char *TaggingMode = MsRegReadStr(REG_LOCAL_MACHINE, key, "TaggingMode");
if (StrCmpi(VlanFiltering, "0") == 0 &&
MonitorMode == 1 &&
MonitorModeEnabled == 1 &&
StrCmpi(TaggingMode, "0") == 0)
{
e->Enabled = true;
}
Free(VlanFiltering);
Free(TaggingMode);
}
else if (StrCmpi(e->DriverType, "Broadcom") == 0)
{
char *PreserveVlanInfoInRxPacket = MsRegReadStr(REG_LOCAL_MACHINE,
key, "PreserveVlanInfoInRxPacket");
if (StrCmpi(PreserveVlanInfoInRxPacket, "1") == 0)
{
e->Enabled = true;
}
Free(PreserveVlanInfoInRxPacket);
}
else if (StrCmpi(e->DriverType, "Marvell") == 0)
{
DWORD SkDisableVlanStrip = MsRegReadInt(REG_LOCAL_MACHINE,
key, "SkDisableVlanStrip");
if (SkDisableVlanStrip == 1)
{
e->Enabled = true;
}
}
if (MsRegIsValue(REG_LOCAL_MACHINE, tcpkey, "MTU") == false)
{
e->Enabled = false;
}
}
// Get VLAN tag pass-through availability of the device
void GetVLanSupportStatus(RPC_ENUM_ETH_VLAN_ITEM *e)
{
BUF *b;
char filename[MAX_SIZE];
void *wow;
// Validate arguments
if (e == NULL)
{
return;
}
wow = MsDisableWow64FileSystemRedirection();
// Read the device driver file
CombinePath(filename, sizeof(filename), MsGetSystem32Dir(), "drivers");
CombinePath(filename, sizeof(filename), filename, e->DriverName);
b = ReadDump(filename);
if (b != NULL)
{
char intel1[] = "VlanFiltering";
char intel2[] = "V\0l\0a\0n\0F\0i\0l\0t\0e\0r\0i\0n\0g";
char intel3[] = "MonitorMode";
char intel4[] = "M\0o\0n\0i\0t\0o\0r\0M\0o\0d\0e";
char intel5[] = "TaggingMode";
char intel6[] = "T\0a\0g\0g\0i\0n\0g\0M\0o\0d\0e";
char broadcom1[] = "PreserveVlanInfoInRxPacket";
char broadcom2[] = "P\0r\0e\0s\0e\0r\0v\0e\0V\0l\0a\0n\0I\0n\0f\0o\0I\0n\0R\0x\0P\0a\0c\0k\0e\0t";
char marvell1[] = "SkDisableVlanStrip";
char marvell2[] = "S\0k\0D\0i\0s\0a\0b\0l\0e\0V\0l\0a\0n\0S\0t\0r\0i\0p";
char *driver_type = "";
if (SearchBin(b->Buf, 0, b->Size, intel1, sizeof(intel1)) != INFINITE
|| SearchBin(b->Buf, 0, b->Size, intel2, sizeof(intel2)) != INFINITE
|| SearchBin(b->Buf, 0, b->Size, intel3, sizeof(intel3)) != INFINITE
|| SearchBin(b->Buf, 0, b->Size, intel4, sizeof(intel4)) != INFINITE
|| SearchBin(b->Buf, 0, b->Size, intel5, sizeof(intel5)) != INFINITE
|| SearchBin(b->Buf, 0, b->Size, intel6, sizeof(intel6)) != INFINITE)
{
driver_type = "Intel";
}
else if (SearchBin(b->Buf, 0, b->Size, broadcom1, sizeof(broadcom1)) != INFINITE
|| SearchBin(b->Buf, 0, b->Size, broadcom2, sizeof(broadcom2)) != INFINITE)
{
driver_type = "Broadcom";
}
else if (SearchBin(b->Buf, 0, b->Size, marvell1, sizeof(marvell1)) != INFINITE
|| SearchBin(b->Buf, 0, b->Size, marvell2, sizeof(marvell2)) != INFINITE)
{
driver_type = "Marvell";
}
if (IsEmptyStr(driver_type) == false)
{
StrCpy(e->DriverType, sizeof(e->DriverType), driver_type);
e->Support = true;
}
FreeBuf(b);
}
MsRestoreWow64FileSystemRedirection(wow);
}
// Get the device instance id from short_key
char *SearchDeviceInstanceIdFromShortKey(char *short_key)
{
char *ret = NULL;
TOKEN_LIST *t1;
// Validate arguments
if (short_key == NULL)
{
return NULL;
}
t1 = MsRegEnumKey(REG_LOCAL_MACHINE, "SYSTEM\\CurrentControlSet\\Enum");
if (t1 != NULL)
{
TOKEN_LIST *t2;
char tmp[MAX_SIZE];
UINT i;
for (i = 0;i < t1->NumTokens;i++)
{
Format(tmp, sizeof(tmp), "SYSTEM\\CurrentControlSet\\Enum\\%s", t1->Token[i]);
t2 = MsRegEnumKey(REG_LOCAL_MACHINE, tmp);
if (t2 != NULL)
{
TOKEN_LIST *t3;
UINT i;
for (i = 0;i < t2->NumTokens;i++)
{
char tmp2[MAX_SIZE];
Format(tmp2, sizeof(tmp2), "%s\\%s", tmp, t2->Token[i]);
t3 = MsRegEnumKey(REG_LOCAL_MACHINE, tmp2);
if (t3 != NULL)
{
UINT i;
for (i = 0;i < t3->NumTokens;i++)
{
char tmp3[MAX_SIZE];
char *s;
Format(tmp3, sizeof(tmp3), "%s\\%s", tmp2, t3->Token[i]);
s = MsRegReadStr(REG_LOCAL_MACHINE, tmp3, "Driver");
if (s != NULL)
{
if (StrCmpi(s, short_key) == 0)
{
if (ret != NULL)
{
Free(ret);
}
ret = CopyStr(tmp3 + StrLen("SYSTEM\\CurrentControlSet\\Enum\\"));
}
Free(s);
}
}
FreeToken(t3);
}
}
FreeToken(t2);
}
}
FreeToken(t1);
}
return ret;
}
// Get VLAN tag pass-through availability of all devices
bool EnumEthVLanWin32(RPC_ENUM_ETH_VLAN *t)
{
UINT i;
LIST *o;
// Validate arguments
if (t == NULL)
{
return false;
}
Zero(t, sizeof(RPC_ENUM_ETH_VLAN));
if (MsIsWin2000OrGreater() == false)
{
return false;
}
if (IsEthSupported() == false)
{
return false;
}
// Get device list
Lock(eth_list_lock);
InitEthAdaptersList();
o = NewListFast(CmpRpcEnumEthVLan);
for (i = 0;i < LIST_NUM(eth_list);i++)
{
WP_ADAPTER *a = LIST_DATA(eth_list, i);
if (IsEmptyStr(a->Guid) == false)
{
char class_key[MAX_SIZE];
char short_key[MAX_SIZE];
if (GetClassRegKeyWin32(class_key, sizeof(class_key),
short_key, sizeof(short_key), a->Guid))
{
char *device_instance_id = MsRegReadStr(REG_LOCAL_MACHINE, class_key, "DeviceInstanceID");
if (IsEmptyStr(device_instance_id))
{
Free(device_instance_id);
device_instance_id = SearchDeviceInstanceIdFromShortKey(short_key);
}
if (IsEmptyStr(device_instance_id) == false)
{
char device_key[MAX_SIZE];
char *service_name;
Format(device_key, sizeof(device_key), "SYSTEM\\CurrentControlSet\\Enum\\%s",
device_instance_id);
service_name = MsRegReadStr(REG_LOCAL_MACHINE, device_key, "Service");
if (IsEmptyStr(service_name) == false)
{
char service_key[MAX_SIZE];
char *sys;
Format(service_key, sizeof(service_key),
"SYSTEM\\CurrentControlSet\\services\\%s",
service_name);
sys = MsRegReadStr(REG_LOCAL_MACHINE, service_key, "ImagePath");
if (IsEmptyStr(sys) == false)
{
char sysname[MAX_PATH];
GetFileNameFromFilePath(sysname, sizeof(sysname), sys);
Trim(sysname);
if (EndWith(sysname, ".sys"))
{
// device found
RPC_ENUM_ETH_VLAN_ITEM *e = ZeroMalloc(sizeof(RPC_ENUM_ETH_VLAN_ITEM));
StrCpy(e->DeviceName, sizeof(e->DeviceName), a->Title);
StrCpy(e->Guid, sizeof(e->Guid), a->Guid);
StrCpy(e->DeviceInstanceId, sizeof(e->DeviceInstanceId), device_instance_id);
StrCpy(e->DriverName, sizeof(e->DriverName), sysname);
// Get VLAN tag pass-through availability of the device
GetVLanSupportStatus(e);
// Get current pass-through setting of the device
GetVLanEnableStatus(e);
Insert(o, e);
}
}
Free(sys);
}
Free(service_name);
}
Free(device_instance_id);
}
}
}
t->NumItem = LIST_NUM(o);
t->Items = ZeroMalloc(sizeof(RPC_ENUM_ETH_VLAN_ITEM) * i);
for (i = 0;i < LIST_NUM(o);i++)
{
RPC_ENUM_ETH_VLAN_ITEM *e = LIST_DATA(o, i);
Copy(&t->Items[i], e, sizeof(RPC_ENUM_ETH_VLAN_ITEM));
Free(e);
}
ReleaseList(o);
Unlock(eth_list_lock);
return true;
}
// Get registry key of the network class data by GUID
bool GetClassRegKeyWin32(char *key, UINT key_size, char *short_key, UINT short_key_size, char *guid)
{
TOKEN_LIST *t;
bool ret = false;
UINT i;
// Validate arguments
if (key == NULL || short_key == NULL || guid == NULL)
{
return false;
}
t = MsRegEnumKey(REG_LOCAL_MACHINE,
"SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}");
if (t == NULL)
{
return false;
}
for (i = 0;i < t->NumTokens;i++)
{
char keyname[MAX_SIZE];
char *value;
Format(keyname, sizeof(keyname),
"SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\%s",
t->Token[i]);
value = MsRegReadStr(REG_LOCAL_MACHINE, keyname, "NetCfgInstanceId");
if (StrCmpi(value, guid) == 0)
{
ret = true;
StrCpy(key, key_size, keyname);
Format(short_key, short_key_size, "{4D36E972-E325-11CE-BFC1-08002BE10318}\\%s",
t->Token[i]);
}
Free(value);
}
FreeToken(t);
return ret;
}
// Send multiple packets
void EthPutPackets(ETH *e, UINT num, void **datas, UINT *sizes)
{
UINT i, total_size;
UCHAR *buf;
UINT write_pointer;
UINT err = 0;
// Validate arguments
if (e == NULL || num == 0 || datas == NULL || sizes == NULL)
{
return;
}
if (e->HasFatalError)
{
return;
}
if (e->SuAdapter != NULL)
{
bool ok = true;
// Send packets with SeLow
for (i = 0;i < num;i++)
{
UCHAR *data = datas[i];
UINT size = sizes[i];
if (ok)
{
// Actually, only enqueuing
ok = SuPutPacket(e->SuAdapter, data, size);
}
if (ok == false)
{
// Free memory on write error
Free(data);
}
}
if (ok)
{
// Send all data in queue at once
ok = SuPutPacket(e->SuAdapter, NULL, 0);
}
if (ok == false)
{
// Error occurred
e->HasFatalError = true;
}
return;
}
if (IsWin32BridgeWithSee() == false)
{
if (e->LastSetSingleCpu == 0 || (e->LastSetSingleCpu + 10000) <= Tick64())
{
e->LastSetSingleCpu = Tick64();
MsSetThreadSingleCpu();
}
}
// Calculate buffer size
total_size = 0;
for (i = 0;i < num;i++)
{
void *data = datas[i];
UINT size = sizes[i];
if (data != NULL && size >= 14 && size <= MAX_PACKET_SIZE)
{
total_size += size + sizeof(struct dump_bpf_hdr);
}
}
buf = MallocFast(total_size * 100 / 75 + 1600);
write_pointer = 0;
// Enqueue
for (i = 0;i < num;i++)
{
void *data = datas[i];
UINT size = sizes[i];
if (data != NULL && size >= 14 && size <= MAX_PACKET_SIZE)
{
struct dump_bpf_hdr *h;
h = (struct dump_bpf_hdr *)(buf + write_pointer);
Zero(h, sizeof(struct dump_bpf_hdr));
h->caplen = h->len = size;
write_pointer += sizeof(struct dump_bpf_hdr);
Copy(buf + write_pointer, data, size);
write_pointer += size;
PROBE_DATA2("EthPutPackets", data, size);
}
// Free original buffer
Free(data);
}
// Send
if (total_size != 0)
{
err = wp->PacketSendPackets(e->Adapter, buf, total_size, true);
}
Free(buf);
if (err == 0x7FFFFFFF)
{
// Critical error (infinite loop) occurred on sending
e->HasFatalError = true;
}
}
// Send a packet
void EthPutPacket(ETH *e, void *data, UINT size)
{
// Validate arguments
if (e == NULL || data == NULL || size == 0)
{
return;
}
EthPutPackets(e, 1, &data, &size);
}
// Read next packet
UINT EthGetPacket(ETH *e, void **data)
{
BLOCK *b;
bool flag = false;
// Validate arguments
if (e == NULL || data == NULL)
{
return INFINITE;
}
if (e->HasFatalError)
{
return INFINITE;
}
if (e->SuAdapter != NULL)
{
// Read packet with SeLow
UINT size;
if (SuGetNextPacket(e->SuAdapter, data, &size) == false)
{
// Error occurred
e->HasFatalError = true;
return INFINITE;
}
return size;
}
RETRY:
// Check the presence of the packet in queue
b = GetNext(e->PacketQueue);
if (b != NULL)
{
UINT size;
size = b->Size;
*data = b->Buf;
Free(b);
if (e->PacketQueue->num_item == 0)
{
e->Empty = true;
}
return size;
}
if (e->Empty)
{
e->Empty = false;
return 0;
}
if (flag == false)
{
// Try to get next packet
PROBE_STR("EthGetPacket: PacketInitPacket");
wp->PacketInitPacket(e->Packet, e->Buffer, e->BufferSize);
PROBE_STR("EthGetPacket: PacketReceivePacket");
if (wp->PacketReceivePacket(e->Adapter, e->Packet, false) == false)
{
// Failed
return INFINITE;
}
else
{
UCHAR *buf;
UINT total;
UINT offset;
buf = (UCHAR *)e->Packet->Buffer;
total = e->Packet->ulBytesReceived;
offset = 0;
while (offset < total)
{
struct bpf_hdr *header;
UINT packet_size;
UCHAR *packet_data;
header = (struct bpf_hdr *)(buf + offset);
packet_size = header->bh_caplen;
offset += header->bh_hdrlen;
packet_data = buf + offset;
offset = Packet_WORDALIGN(offset + packet_size);
if (packet_size >= 14)
{
UCHAR *tmp;
BLOCK *b;
PROBE_DATA2("EthGetPacket: NewBlock", packet_data, packet_size);
tmp = MallocFast(packet_size);
Copy(tmp, packet_data, packet_size);
b = NewBlock(tmp, packet_size, 0);
InsertQueue(e->PacketQueue, b);
}
}
flag = true;
goto RETRY;
}
}
// No more packet
return 0;
}
// Get cancel object
CANCEL *EthGetCancel(ETH *e)
{
// Validate arguments
if (e == NULL)
{
return NULL;
}
AddRef(e->Cancel->ref);
return e->Cancel;
}
// Close adapter
void CloseEth(ETH *e)
{
BLOCK *b;
// Validate arguments
if (e == NULL)
{
return;
}
ReleaseCancel(e->Cancel);
if (e->SuAdapter != NULL)
{
// Close SeLow adapter
SuCloseAdapter(e->SuAdapter);
SuFree(e->Su);
}
else
{
// Close SEE adapter
wp->PacketCloseAdapter(e->Adapter);
wp->PacketFreePacket(e->Packet);
wp->PacketFreePacket(e->PutPacket);
}
while (b = GetNext(e->PacketQueue))
{
FreeBlock(b);
}
ReleaseQueue(e->PacketQueue);
Free(e->Name);
Free(e->Title);
Free(e->Buffer);
Free(e);
}
// Search adapter with the name
struct WP_ADAPTER *Win32EthSearch(char *name)
{
UINT i;
UINT id;
char simple_name[MAX_SIZE];
WP_ADAPTER *ret = NULL;
id = Win32EthGetNameAndIdFromCombinedName(simple_name, sizeof(simple_name), name);
if (id != 0)
{
UINT num_match = 0;
// Search with ID when ID is specified
for (i = 0;i < LIST_NUM(eth_list);i++)
{
WP_ADAPTER *a = LIST_DATA(eth_list, i);
if (a->Id != 0 && a->Id == id)
{
ret = a;
num_match++;
}
}
if (num_match >= 2)
{
// If the ID matches to 2 or more devices, search with the name
for (i = 0;i < LIST_NUM(eth_list);i++)
{
WP_ADAPTER *a = LIST_DATA(eth_list, i);
if (a->Id != 0 && a->Id == id)
{
if (StrCmpi(a->Title, name) == 0)
{
ret = a;
break;
}
}
}
}
}
else
{
// Search with name when ID is not specified
for (i = 0;i < LIST_NUM(eth_list);i++)
{
WP_ADAPTER *a = LIST_DATA(eth_list, i);
if (StrCmpi(a->Title, name) == 0)
{
ret = a;
break;
}
}
}
return ret;
}
// Open adapter
ETH *OpenEth(char *name, bool local, bool tapmode, char *tapaddr)
{
ETH *ret;
void *p;
p = MsDisableWow64FileSystemRedirection();
ret = OpenEthInternal(name, local, tapmode, tapaddr);
MsRestoreWow64FileSystemRedirection(p);
return ret;
}
ETH *OpenEthInternal(char *name, bool local, bool tapmode, char *tapaddr)
{
WP_ADAPTER *t;
ETH *e;
ADAPTER *a = NULL;
HANDLE h;
CANCEL *c;
MS_ADAPTER *ms;
char name_with_id[MAX_SIZE];
SU *su = NULL;
SU_ADAPTER *su_adapter = NULL;
// Validate arguments
if (name == NULL || IsEthSupported() == false)
{
return NULL;
}
if (tapmode)
{
// Tap is not supported in Windows
return NULL;
}
Lock(eth_list_lock);
InitEthAdaptersList();
t = Win32EthSearch(name);
if (t == NULL)
{
Unlock(eth_list_lock);
return NULL;
}
Debug("OpenEthInternal: %s\n", t->Name);
if (StartWith(t->Name, SL_ADAPTER_ID_PREFIX))
{
// Open with SU
su = SuInit();
if (su == NULL)
{
// Fail to initialize SU
Unlock(eth_list_lock);
return NULL;
}
su_adapter = SuOpenAdapter(su, t->Name);
if (su_adapter == NULL)
{
// Fail to get adapter
SuFree(su);
Unlock(eth_list_lock);
return NULL;
}
is_using_selow = true;
}
else
{
// Open with SEE
a = wp->PacketOpenAdapter(t->Name);
if (a == NULL)
{
Unlock(eth_list_lock);
return NULL;
}
if (IsWin32BridgeWithSee() == false)
{
MsSetThreadSingleCpu();
}
is_using_selow = false;
}
e = ZeroMalloc(sizeof(ETH));
e->Name = CopyStr(t->Name);
Win32EthMakeCombinedName(name_with_id, sizeof(name_with_id), t->Title, t->Guid);
e->Title = CopyStr(name_with_id);
if (su_adapter != NULL)
{
// SU
e->SuAdapter = su_adapter;
e->Su = su;
// Get event object
h = e->SuAdapter->hEvent;
c = NewCancelSpecial(h);
e->Cancel = c;
}
else
{
// SEE
e->Adapter = a;
wp->PacketSetBuff(e->Adapter, BRIDGE_WIN32_ETH_BUFFER);
wp->PacketSetHwFilter(e->Adapter, local ? 0x0080 : 0x0020);
wp->PacketSetMode(e->Adapter, PACKET_MODE_CAPT);
wp->PacketSetReadTimeout(e->Adapter, -1);
wp->PacketSetNumWrites(e->Adapter, 1);
if (wp->PacketSetLoopbackBehavior != NULL)
{
// Filter loopback packet in kernel
if (GET_KETA(GetOsType(), 100) >= 3)
{
if (MsIsWindows8() == false)
{
// Enable for Windows XP, Server 2003 or later
// But disable for Windows 8 or later
bool ret = wp->PacketSetLoopbackBehavior(e->Adapter, 1);
Debug("*** PacketSetLoopbackBehavior: %u\n", ret);
e->LoopbackBlock = ret;
}
}
}
// Get event object
h = wp->PacketGetReadEvent(e->Adapter);
c = NewCancelSpecial(h);
e->Cancel = c;
e->Packet = wp->PacketAllocatePacket();
e->PutPacket = wp->PacketAllocatePacket();
}
e->Buffer = Malloc(BRIDGE_WIN32_ETH_BUFFER);
e->BufferSize = BRIDGE_WIN32_ETH_BUFFER;
e->PacketQueue = NewQueue();
// Get MAC address by GUID
ms = MsGetAdapterByGuid(t->Guid);
if (ms != NULL)
{
if (ms->AddressSize == 6)
{
Copy(e->MacAddress, ms->Address, 6);
}
MsFreeAdapter(ms);
}
Unlock(eth_list_lock);
return e;
}
// Generate a combined name from NIC name and GUID
void Win32EthMakeCombinedName(char *dst, UINT dst_size, char *nicname, char *guid)
{
// Validate arguments
if (dst == NULL || nicname == NULL || guid == NULL)
{
return;
}
if (IsEmptyStr(guid) == false)
{
Format(dst, dst_size, "%s (ID=%010u)", nicname, Win32EthGenIdFromGuid(guid));
}
else
{
StrCpy(dst, dst_size, nicname);
}
}
// Decompose combined name
UINT Win32EthGetNameAndIdFromCombinedName(char *name, UINT name_size, char *str)
{
UINT ret = 0;
char id_str[MAX_SIZE];
UINT len;
// Validate arguments
ClearStr(name, name_size);
StrCpy(name, name_size, str);
if (name == NULL || str == NULL)
{
return 0;
}
len = StrLen(str);
if (len >= 16)
{
StrCpy(id_str, sizeof(id_str), str + len - 16);
if (StartWith(id_str, " (ID="))
{
if (EndWith(id_str, ")"))
{
char num[MAX_SIZE];
Zero(num, sizeof(num));
StrCpy(num, sizeof(num), id_str + 5);
num[StrLen(num) - 1] = 0;
ret = ToInt(num);
if (ret != 0)
{
name[len - 16] = 0;
}
}
}
}
return ret;
}
// Generate an ID from GUID
UINT Win32EthGenIdFromGuid(char *guid)
{
char tmp[MAX_SIZE];
UCHAR hash[SHA1_SIZE];
UINT i;
// Validate arguments
if (guid == NULL)
{
return 0;
}
StrCpy(tmp, sizeof(tmp), guid);
Trim(tmp);
StrUpper(tmp);
Sha1(hash, tmp, StrLen(tmp));
Copy(&i, hash, sizeof(UINT));
i = Endian32(i);
if (i == 0)
{
i = 1;
}
return i;
}
// Get Ethernet adapter list
TOKEN_LIST *GetEthList()
{
UINT v;
return GetEthListEx(&v, true, false);
}
TOKEN_LIST *GetEthListEx(UINT *total_num_including_hidden, bool enum_normal, bool enum_rawip)
{
TOKEN_LIST *ret;
UINT i;
UINT j;
UINT dummy_int;
MS_ADAPTER_LIST *adapter_list;
if (IsEthSupported() == false)
{
return NULL;
}
if (enum_normal == false)
{
return NullToken();
}
if (total_num_including_hidden == NULL)
{
total_num_including_hidden = &dummy_int;
}
*total_num_including_hidden = 0;
Lock(eth_list_lock);
InitEthAdaptersList();
adapter_list = MsCreateAdapterList();
ret = ZeroMalloc(sizeof(TOKEN_LIST));
ret->NumTokens = LIST_NUM(eth_list);
ret->Token = ZeroMalloc(sizeof(char *) * ret->NumTokens);
j = 0;
for (i = 0;i < ret->NumTokens;i++)
{
char tmp[MAX_SIZE];
WP_ADAPTER *a = LIST_DATA(eth_list, i);
MS_ADAPTER *msa = NULL;
bool show = true;
if (Win32EthGetShowAllIf() == false)
{
msa = MsGetAdapterByGuidFromList(adapter_list, a->Guid);
if (InStr(a->Title, "vpn client adapter"))
{
// Hide virtual NIC for VPN client
show = false;
}
if (InStr(a->Title, "tunnel adapter"))
{
// Hide tunnel adapter
show = false;
}
if (InStr(a->Title, "teredo tunnel"))
{
// Hide tunnel adapter
show = false;
}
if (InStr(a->Title, "MS Tunnel Interface"))
{
// Hide tunnel adapter
show = false;
}
if (InStr(a->Title, "pseudo-interface"))
{
// Hide tunnel adapter
show = false;
}
}
if (msa != NULL)
{
// Hide except physical Ethernet NIC
if (msa->IsNotEthernetLan)
{
show = false;
}
MsFreeAdapter(msa);
}
Win32EthMakeCombinedName(tmp, sizeof(tmp), a->Title, a->Guid);
if (show)
{
ret->Token[j++] = CopyStr(tmp);
Debug("%s - %s\n", a->Guid, a->Title);
}
}
*total_num_including_hidden = ret->NumTokens;
ret->NumTokens = j;
Unlock(eth_list_lock);
MsFreeAdapterList(adapter_list);
return ret;
}
// Compare the name of WP_ADAPTER
int CompareWpAdapter(void *p1, void *p2)
{
int i;
WP_ADAPTER *a1, *a2;
if (p1 == NULL || p2 == NULL)
{
return 0;
}
a1 = *(WP_ADAPTER **)p1;
a2 = *(WP_ADAPTER **)p2;
if (a1 == NULL || a2 == NULL)
{
return 0;
}
i = StrCmpi(a1->Title, a2->Title);
return i;
}
// Get whether the SeLow is used
bool Win32IsUsingSeLow()
{
return is_using_selow;
}
// Get Ethernet adapter list
LIST *GetEthAdapterList()
{
void *p;
LIST *o;
p = MsDisableWow64FileSystemRedirection();
o = GetEthAdapterListInternal();
MsRestoreWow64FileSystemRedirection(p);
return o;
}
LIST *GetEthAdapterListInternal()
{
LIST *o;
LIST *ret;
UINT size;
char *buf;
UINT i, j;
char *qos_tag = " (Microsoft's Packet Scheduler)";
SU *su = NULL;
LIST *su_adapter_list = NULL;
// Try to use SeLow
if (enable_selow)
{
su = SuInit();
}
o = NewListFast(CompareWpAdapter);
size = 200000;
buf = ZeroMalloc(size);
// Try to enumerate with SeLow
if (su != NULL)
{
su_adapter_list = SuGetAdapterList(su);
if (su_adapter_list == NULL)
{
// Fail to enumerate
SuFree(su);
su = NULL;
//WHERE;
is_using_selow = false;
}
else
{
//WHERE;
is_using_selow = true;
}
}
else
{
is_using_selow = false;
}
if (su_adapter_list != NULL)
{
// If 1 or more adapters are enumerated by SeLow, create adapter list object
UINT i;
for (i = 0;i < LIST_NUM(su_adapter_list);i++)
{
SU_ADAPTER_LIST *t = LIST_DATA(su_adapter_list, i);
WP_ADAPTER *a = ZeroMalloc(sizeof(WP_ADAPTER));
StrCpy(a->Name, sizeof(a->Name), t->Name);
StrCpy(a->Guid, sizeof(a->Guid), t->Guid);
StrCpy(a->Title, sizeof(a->Title), t->Info.FriendlyName);
TrimCrlf(a->Title);
Trim(a->Title);
TrimCrlf(a->Title);
Trim(a->Title);
if (EndWith(a->Title, qos_tag))
{
a->Title[StrLen(a->Title) - StrLen(qos_tag)] = 0;
TrimCrlf(a->Title);
Trim(a->Title);
TrimCrlf(a->Title);
Trim(a->Title);
}
Add(o, a);
}
}
else
{
// When SeLow is not used, create adapter list with SEE or WinPcap
if (wp->PacketGetAdapterNames(buf, &size) == false)
{
Free(buf);
return o;
}
i = 0;
if (OS_IS_WINDOWS_NT(GetOsInfo()->OsType))
{
// Windows NT
if (size >= 2 && buf[0] != 0 && buf[1] != 0)
{
goto ANSI_STR;
}
while (true)
{
wchar_t tmp[MAX_SIZE];
WP_ADAPTER *a;
UniStrCpy(tmp, sizeof(tmp), L"");
if (*((wchar_t *)(&buf[i])) == 0)
{
i += sizeof(wchar_t);
break;
}
for (;*((wchar_t *)(&buf[i])) != 0;i += sizeof(wchar_t))
{
wchar_t str[2];
str[0] = *((wchar_t *)(&buf[i]));
str[1] = 0;
UniStrCat(tmp, sizeof(tmp), str);
}
i += sizeof(wchar_t);
a = ZeroMalloc(sizeof(WP_ADAPTER));
UniToStr(a->Name, sizeof(a->Name), tmp);
Add(o, a);
}
}
else
{
// Windows 9x
ANSI_STR:
while (true)
{
char tmp[MAX_SIZE];
WP_ADAPTER *a;
StrCpy(tmp, sizeof(tmp), "");
if (*((char *)(&buf[i])) == 0)
{
i += sizeof(char);
break;
}
for (;*((char *)(&buf[i])) != 0;i += sizeof(char))
{
char str[2];
str[0] = *((char *)(&buf[i]));
str[1] = 0;
StrCat(tmp, sizeof(tmp), str);
}
i += sizeof(char);
a = ZeroMalloc(sizeof(WP_ADAPTER));
StrCpy(a->Name, sizeof(a->Name), tmp);
Add(o, a);
}
}
for (j = 0;j < LIST_NUM(o);j++)
{
WP_ADAPTER *a = LIST_DATA(o, j);
StrCpy(a->Title, sizeof(a->Title), &buf[i]);
i += StrSize(a->Title);
// If device description is "Unknown" in Win9x, skip 1 byte
if (OS_IS_WINDOWS_9X(GetOsInfo()->OsType))
{
if (StrCmp(a->Title, "Unknown") == 0)
{
if (buf[i] == 0)
{
i+=sizeof(char);
}
}
}
TrimCrlf(a->Title);
Trim(a->Title);
TrimCrlf(a->Title);
Trim(a->Title);
if (EndWith(a->Title, qos_tag))
{
a->Title[StrLen(a->Title) - StrLen(qos_tag)] = 0;
TrimCrlf(a->Title);
Trim(a->Title);
TrimCrlf(a->Title);
Trim(a->Title);
}
}
}
for (j = 0;j < LIST_NUM(o);j++)
{
// Extract GUID
WP_ADAPTER *a = LIST_DATA(o, j);
if (IsEmptyStr(a->Guid))
{
StrCpy(a->Guid, sizeof(a->Guid), a->Name);
ReplaceStr(a->Guid, sizeof(a->Guid), a->Guid, "\\Device\\SEE_", "");
ReplaceStr(a->Guid, sizeof(a->Guid), a->Guid, "\\Device\\NPF_", "");
ReplaceStr(a->Guid, sizeof(a->Guid), a->Guid, "\\Device\\PCD_", "");
}
}
// Sort
if (su_adapter_list != NULL)
{
// Since adapter list made by SeLow is already sorted, don't sort here
Sort(o);
}
ret = NewListFast(CompareWpAdapter);
for (i = 0;i < LIST_NUM(o);i++)
{
WP_ADAPTER *a = LIST_DATA(o, i);
ADAPTER *ad;
bool is_ethernet = false;
bool ok = false;
if (SearchStrEx(a->Title, "ppp", 0, false) != INFINITE ||
SearchStrEx(a->Title, "wan", 0, false) != INFINITE ||
SearchStrEx(a->Title, "dialup", 0, false) != INFINITE ||
SearchStrEx(a->Title, "pptp", 0, false) != INFINITE ||
SearchStrEx(a->Title, "telepho", 0, false) != INFINITE ||
SearchStrEx(a->Title, "modem", 0, false) != INFINITE ||
SearchStrEx(a->Title, "ras", 0, false) != INFINITE)
{
Free(a);
continue;
}
// Determine whether the adapter type is Ethernet
if (su == NULL)
{
// Determine with See
ad = wp->PacketOpenAdapter(a->Name);
if (ad != NULL)
{
NetType type;
if (wp->PacketGetNetType(ad, &type))
{
if (type.LinkType == 0)
{
is_ethernet = true;
}
}
wp->PacketCloseAdapter(ad);
}
}
else
{
// In using SeLow, all devices should be Ethernet device
is_ethernet = true;
}
if (is_ethernet)
{
// Add only Ethernet device
char tmp[MAX_SIZE];
UINT k;
StrCpy(tmp, sizeof(tmp), a->Title);
for (k = 0;;k++)
{
if (k == 0)
{
StrCpy(tmp, sizeof(tmp), a->Title);
}
else
{
Format(tmp, sizeof(tmp), "%s (%u)", a->Title, k + 1);
}
ok = true;
for (j = 0;j < LIST_NUM(ret);j++)
{
WP_ADAPTER *aa = LIST_DATA(ret, j);
if (StrCmpi(aa->Title, tmp) == 0)
{
ok = false;
}
}
if (ok)
{
break;
}
}
StrCpy(a->Title, sizeof(a->Title), tmp);
a->Id = Win32EthGenIdFromGuid(a->Guid);
Add(ret, a);
}
if (ok == false)
{
Free(a);
}
}
Free(buf);
Sort(ret);
ReleaseList(o);
if (su != NULL)
{
SuFreeAdapterList(su_adapter_list);
SuFree(su);
}
return ret;
}
// Initialize Ethernet adapter list
void InitEthAdaptersList()
{
if (eth_list != NULL)
{
FreeEthAdaptersList();
eth_list = NULL;
}
eth_list = GetEthAdapterList();
}
// Free Ethernet adapter list
void FreeEthAdaptersList()
{
UINT i;
if (eth_list == NULL)
{
return;
}
for (i = 0;i < LIST_NUM(eth_list);i++)
{
WP_ADAPTER *a = LIST_DATA(eth_list, i);
Free(a);
}
ReleaseList(eth_list);
eth_list = NULL;
}
// Is the SU supported
bool Win32EthIsSuSupported()
{
bool ret = false;
SU *su = SuInit();
if (su != NULL)
{
ret = true;
}
SuFree(su);
return ret;
}
// Is the Ethernet supported
bool IsEthSupported()
{
bool ret = IsEthSupportedInner();
if (ret == false)
{
ret = Win32EthIsSuSupported();
}
return ret;
}
bool IsEthSupportedInner()
{
if (wp == NULL)
{
return false;
}
return wp->Inited;
}
// Is the PCD driver supported in current OS
bool IsPcdSupported()
{
UINT type;
OS_INFO *info = GetOsInfo();
if (MsIsWindows10())
{
// Windows 10 or later never supports PCD driver.
return false;
}
type = info->OsType;
if (OS_IS_WINDOWS_NT(type) == false)
{
// Only on Windows NT series
return false;
}
if (GET_KETA(type, 100) >= 2)
{
// Good for Windows 2000 or later
return true;
}
// Not good for Windows NT 4.0 or Longhorn
return false;
}
// Save build number of PCD driver
void SavePcdDriverBuild(UINT build)
{
MsRegWriteInt(REG_LOCAL_MACHINE, BRIDGE_WIN32_PCD_REGKEY, BRIDGE_WIN32_PCD_BUILDVALUE,
build);
}
// Load build number of PCD driver
UINT LoadPcdDriverBuild()
{
return MsRegReadInt(REG_LOCAL_MACHINE, BRIDGE_WIN32_PCD_REGKEY, BRIDGE_WIN32_PCD_BUILDVALUE);
}
// Try to install PCD driver
HINSTANCE InstallPcdDriver()
{
HINSTANCE ret;
void *p = MsDisableWow64FileSystemRedirection();
ret = InstallPcdDriverInternal();
MsRestoreWow64FileSystemRedirection(p);
return ret;
}
HINSTANCE InstallPcdDriverInternal()
{
char tmp[MAX_PATH];
bool install_driver = true;
HINSTANCE h;
char *dll_filename;
// Confirm whether the see.sys is installed in system32\drivers folder
Format(tmp, sizeof(tmp), "%s\\drivers\\see.sys", MsGetSystem32Dir());
if (IsFileExists(tmp))
{
// If driver file is exist, try to get build number from registry
if (LoadPcdDriverBuild() >= CEDAR_VERSION_BUILD)
{
// Already latest driver is installed
install_driver = false;
}
}
if (install_driver)
{
char *src_filename = BRIDGE_WIN32_PCD_SYS;
// If need to install the driver, confirm user is administrator
if (MsIsAdmin() == false)
{
// Non administrator can't install driver
return NULL;
}
if (MsIsX64())
{
src_filename = BRIDGE_WIN32_PCD_SYS_X64;
}
// Copy see.sys
if (FileCopy(src_filename, tmp) == false)
{
return NULL;
}
// Save build number
SavePcdDriverBuild(CEDAR_VERSION_BUILD);
}
dll_filename = BRIDGE_WIN32_PCD_DLL;
if (Is64())
{
if (MsIsX64())
{
dll_filename = BRIDGE_WIN32_PCD_DLL_X64;
}
}
// Try to load see.dll and initialize
h = MsLoadLibrary(dll_filename);
if (h == NULL)
{
return NULL;
}
return h;
}
// Initialize Ethernet
void InitEth()
{
HINSTANCE h;
if (wp != NULL)
{
// Already initialized
return;
}
eth_list_lock = NewLock();
wp = ZeroMalloc(sizeof(WP));
is_see_mode = false;
if (IsPcdSupported())
{
// PCD is supported in this OS
h = InstallPcdDriver();
if (h != NULL)
{
// Try to initialize with PCD
if (InitWpWithLoadLibrary(wp, h) == false)
{
Debug("InitEth: SEE Failed.\n");
FreeLibrary(h);
}
else
{
Debug("InitEth: SEE Loaded.\n");
is_see_mode = true;
}
}
}
if (wp->Inited == false)
{
// Try to initialize with Packet.dll of WinPcap
h = LoadLibrary(BRIDGE_WIN32_PACKET_DLL);
if (h != NULL)
{
if (InitWpWithLoadLibrary(wp, h) == false)
{
Debug("InitEth: Packet.dll Failed.\n");
FreeLibrary(h);
}
else
{
Debug("InitEth: Packet.dll Loaded.\n");
}
}
}
}
// Get whether local-bridge uses see.sys
bool IsWin32BridgeWithSee()
{
return is_see_mode;
}
// Initialize WP structure with DLL
bool InitWpWithLoadLibrary(WP *wp, HINSTANCE h)
{
TOKEN_LIST *o;
UINT total_num = 0;
// Validate arguments
if (wp == NULL || h == NULL)
{
return false;
}
wp->Inited = true;
wp->hPacketDll = h;
LOAD_DLL_ADDR(PacketGetVersion);
LOAD_DLL_ADDR(PacketGetDriverVersion);
LOAD_DLL_ADDR(PacketSetMinToCopy);
LOAD_DLL_ADDR(PacketSetNumWrites);
LOAD_DLL_ADDR(PacketSetMode);
LOAD_DLL_ADDR(PacketSetReadTimeout);
LOAD_DLL_ADDR(PacketSetBpf);
LOAD_DLL_ADDR(PacketSetSnapLen);
LOAD_DLL_ADDR(PacketGetStats);
LOAD_DLL_ADDR(PacketGetStatsEx);
LOAD_DLL_ADDR(PacketSetBuff);
LOAD_DLL_ADDR(PacketGetNetType);
LOAD_DLL_ADDR(PacketOpenAdapter);
LOAD_DLL_ADDR(PacketSendPacket);
LOAD_DLL_ADDR(PacketSendPackets);
LOAD_DLL_ADDR(PacketAllocatePacket);
LOAD_DLL_ADDR(PacketInitPacket);
LOAD_DLL_ADDR(PacketFreePacket);
LOAD_DLL_ADDR(PacketReceivePacket);
LOAD_DLL_ADDR(PacketSetHwFilter);
LOAD_DLL_ADDR(PacketGetAdapterNames);
LOAD_DLL_ADDR(PacketGetNetInfoEx);
LOAD_DLL_ADDR(PacketRequest);
LOAD_DLL_ADDR(PacketGetReadEvent);
LOAD_DLL_ADDR(PacketSetDumpName);
LOAD_DLL_ADDR(PacketSetDumpLimits);
LOAD_DLL_ADDR(PacketSetDumpLimits);
LOAD_DLL_ADDR(PacketIsDumpEnded);
LOAD_DLL_ADDR(PacketStopDriver);
LOAD_DLL_ADDR(PacketCloseAdapter);
LOAD_DLL_ADDR(PacketSetLoopbackBehavior);
if (wp->PacketSetMinToCopy == NULL ||
wp->PacketSetNumWrites == NULL ||
wp->PacketSetMode == NULL ||
wp->PacketSetReadTimeout == NULL ||
wp->PacketSetBuff == NULL ||
wp->PacketGetNetType == NULL ||
wp->PacketOpenAdapter == NULL ||
wp->PacketSendPacket == NULL ||
wp->PacketSendPackets == NULL ||
wp->PacketAllocatePacket == NULL ||
wp->PacketInitPacket == NULL ||
wp->PacketFreePacket == NULL ||
wp->PacketReceivePacket == NULL ||
wp->PacketSetHwFilter == NULL ||
wp->PacketGetAdapterNames == NULL ||
wp->PacketGetNetInfoEx == NULL ||
wp->PacketCloseAdapter == NULL)
{
RELEASE:
wp->Inited = false;
wp->hPacketDll = NULL;
return false;
}
o = GetEthListEx(&total_num, true, false);
if (o == NULL || total_num == 0)
{
FreeToken(o);
goto RELEASE;
}
FreeToken(o);
return true;
}
// Free Ethernet
void FreeEth()
{
if (wp == NULL)
{
// Not initialized
return;
}
// Free adapter list
FreeEthAdaptersList();
if (wp->Inited)
{
// Free DLL
FreeLibrary(wp->hPacketDll);
}
Free(wp);
wp = NULL;
DeleteLock(eth_list_lock);
eth_list_lock = NULL;
}
// Get network connection name from Ethernet device name
void GetEthNetworkConnectionName(wchar_t *dst, UINT size, char *device_name)
{
WP_ADAPTER *t;
char *tmp = NULL, guid[MAX_SIZE];
wchar_t *ncname = NULL;
UniStrCpy(dst, size, L"");
// Validate arguments
if (device_name == NULL || IsEthSupported() == false ||
IsNt() == false || MsIsWin2000OrGreater() == false)
{
return;
}
Lock(eth_list_lock);
InitEthAdaptersList();
t = Win32EthSearch(device_name);
if (t == NULL)
{
Unlock(eth_list_lock);
return;
}
tmp = CopyStr(t->Name);
Unlock(eth_list_lock);
if (IsEmptyStr(t->Guid) == false)
{
StrCpy(guid, sizeof(guid), t->Guid);
Free(tmp);
}
else
{
ReplaceStr(guid, sizeof(guid), tmp, "\\Device\\SEE_", "");
Free(tmp);
ReplaceStr(guid, sizeof(guid), guid, "\\Device\\NPF_", "");
ReplaceStr(guid, sizeof(guid), guid, "\\Device\\PCD_", "");
}
if(guid == NULL)
{
return;
}
ncname = MsGetNetworkConnectionName(guid);
if(ncname != NULL)
{
UniStrCpy(dst, size, ncname);
}
Free(ncname);
}
#endif // BRIDGE_C