1
0
mirror of https://github.com/SoftEtherVPN/SoftEtherVPN.git synced 2024-11-14 05:30:41 +03:00
SoftEtherVPN/src/Cedar/EtherLog.c
2021-04-05 04:48:25 +02:00

1276 lines
26 KiB
C

// SoftEther VPN Source Code - Developer Edition Master Branch
// Cedar Communication Module
// EtherLog.c
// EtherLogger program
#include "EtherLog.h"
#include "Admin.h"
#include "BridgeUnix.h"
#include "BridgeWin32.h"
#include "Listener.h"
#include "Remote.h"
#include "Sam.h"
#include "Server.h"
#include "WinUi.h"
#include "Mayaqua/Cfg.h"
#include "Mayaqua/Encrypt.h"
#include "Mayaqua/Memory.h"
#include "Mayaqua/Object.h"
#include "Mayaqua/OS.h"
#include "Mayaqua/Pack.h"
#include "Mayaqua/Str.h"
static LOCK *el_lock = NULL;
static EL *el = NULL;
// RPC functional related macro
#define DECLARE_RPC_EX(rpc_name, data_type, function, in_rpc, out_rpc, free_rpc) \
else if (StrCmpi(name, rpc_name) == 0) \
{ \
data_type t; \
Zero(&t, sizeof(t)); \
in_rpc(&t, p); \
err = function(e, &t); \
if (err == ERR_NO_ERROR) \
{ \
out_rpc(ret, &t); \
} \
free_rpc(&t); \
ok = true; \
}
#define DECLARE_RPC(rpc_name, data_type, function, in_rpc, out_rpc) \
else if (StrCmpi(name, rpc_name) == 0) \
{ \
data_type t; \
Zero(&t, sizeof(t)); \
in_rpc(&t, p); \
err = function(e, &t); \
if (err == ERR_NO_ERROR) \
{ \
out_rpc(ret, &t); \
} \
ok = true; \
}
#define DECLARE_SC_EX(rpc_name, data_type, function, in_rpc, out_rpc, free_rpc) \
UINT function(RPC *r, data_type *t) \
{ \
PACK *p, *ret; \
UINT err; \
if (r == NULL || t == NULL) \
{ \
return ERR_INTERNAL_ERROR; \
} \
p = NewPack(); \
out_rpc(p, t); \
free_rpc(t); \
Zero(t, sizeof(data_type)); \
ret = AdminCall(r, rpc_name, p); \
err = GetErrorFromPack(ret); \
if (err == ERR_NO_ERROR) \
{ \
in_rpc(t, ret); \
} \
FreePack(ret); \
return err; \
}
#define DECLARE_SC(rpc_name, data_type, function, in_rpc, out_rpc) \
UINT function(RPC *r, data_type *t) \
{ \
PACK *p, *ret; \
UINT err; \
if (r == NULL || t == NULL) \
{ \
return ERR_INTERNAL_ERROR; \
} \
p = NewPack(); \
out_rpc(p, t); \
ret = AdminCall(r, rpc_name, p); \
err = GetErrorFromPack(ret); \
if (err == ERR_NO_ERROR) \
{ \
in_rpc(t, ret); \
} \
FreePack(ret); \
return err; \
}
// RPC client disconnect
void EcDisconnect(RPC *rpc)
{
// Validate arguments
if (rpc == NULL)
{
return;
}
RpcFree(rpc);
}
// RPC client connect
UINT EcConnect(char *host, UINT port, char *password, RPC **rpc)
{
SOCK *s;
UCHAR password_hash[SHA1_SIZE];
UCHAR rand[SHA1_SIZE];
UCHAR response[SHA1_SIZE];
bool retcode;
// Validate arguments
if (host == NULL)
{
host = "localhost";
}
if (port == 0)
{
port = EL_ADMIN_PORT;
}
if (password == NULL)
{
password = "";
}
if (rpc == NULL)
{
return ERR_INTERNAL_ERROR;
}
// Connect to the server
s = Connect(host, port);
if (s == NULL)
{
// Connection failure
return ERR_CONNECT_FAILED;
}
SetTimeout(s, 5000);
// Hash the password
Sha0(password_hash, password, StrLen(password));
// Receive the random number
Zero(rand, sizeof(rand));
(void)RecvAll(s, rand, sizeof(rand), false);
SecurePassword(response, password_hash, rand);
// Send a response
SendAll(s, response, sizeof(response), false);
// Receive results
retcode = false;
if (RecvAll(s, &retcode, sizeof(retcode), false) == false)
{
// Disconnect
ReleaseSock(s);
return ERR_PROTOCOL_ERROR;
}
retcode = Endian32(retcode);
if (retcode == false)
{
// Password incorrect
ReleaseSock(s);
return ERR_AUTH_FAILED;
}
// Successful connection
SetTimeout(s, INFINITE);
*rpc = StartRpcClient(s, NULL);
ReleaseSock(s);
return ERR_NO_ERROR;
}
// RPC server function
PACK *ElRpcServer(RPC *r, char *name, PACK *p)
{
EL *e;
PACK *ret;
UINT err;
bool ok;
// Validate arguments
if (r == NULL || name == NULL || p == NULL || r->Param == NULL)
{
return NULL;
}
e = (EL *)r->Param;
ret = NewPack();
err = ERR_NO_ERROR;
ok = false;
if (0) {}
DECLARE_RPC("AddDevice", RPC_ADD_DEVICE, EtAddDevice, InRpcAddDevice, OutRpcAddDevice)
DECLARE_RPC("DelDevice", RPC_DELETE_DEVICE, EtDelDevice, InRpcDeleteDevice, OutRpcDeleteDevice)
DECLARE_RPC("SetDevice", RPC_ADD_DEVICE, EtSetDevice, InRpcAddDevice, OutRpcAddDevice)
DECLARE_RPC("GetDevice", RPC_ADD_DEVICE, EtGetDevice, InRpcAddDevice, OutRpcAddDevice)
DECLARE_RPC_EX("EnumDevice", RPC_ENUM_DEVICE, EtEnumDevice, InRpcEnumDevice, OutRpcEnumDevice, FreeRpcEnumDevice)
DECLARE_RPC("SetPassword", RPC_SET_PASSWORD, EtSetPassword, InRpcSetPassword, OutRpcSetPassword)
DECLARE_RPC_EX("EnumAllDevice", RPC_ENUM_DEVICE, EtEnumAllDevice, InRpcEnumDevice, OutRpcEnumDevice, FreeRpcEnumDevice)
DECLARE_RPC("AddLicenseKey", RPC_TEST, EtAddLicenseKey, InRpcTest, OutRpcTest)
DECLARE_RPC("DelLicenseKey", RPC_TEST, EtDelLicenseKey, InRpcTest, OutRpcTest)
DECLARE_RPC_EX("EnumLicenseKey", RPC_ENUM_LICENSE_KEY, EtEnumLicenseKey, InRpcEnumLicenseKey, OutRpcEnumLicenseKey, FreeRpcEnumLicenseKey)
DECLARE_RPC("GetLicenseStatus", RPC_EL_LICENSE_STATUS, EtGetLicenseStatus, InRpcElLicenseStatus, OutRpcElLicenseStatus)
DECLARE_RPC("GetBridgeSupport", RPC_BRIDGE_SUPPORT, EtGetBridgeSupport, InRpcBridgeSupport, OutRpcBridgeSupport)
DECLARE_RPC("RebootServer", RPC_TEST, EtRebootServer, InRpcTest, OutRpcTest)
if (ok == false)
{
err = ERR_NOT_SUPPORTED;
}
PackAddInt(ret, "error", err);
return ret;
}
DECLARE_SC("AddDevice", RPC_ADD_DEVICE, EcAddDevice, InRpcAddDevice, OutRpcAddDevice)
DECLARE_SC("DelDevice", RPC_DELETE_DEVICE, EcDelDevice, InRpcDeleteDevice, OutRpcDeleteDevice)
DECLARE_SC("SetDevice", RPC_ADD_DEVICE, EcSetDevice, InRpcAddDevice, OutRpcAddDevice)
DECLARE_SC("GetDevice", RPC_ADD_DEVICE, EcGetDevice, InRpcAddDevice, OutRpcAddDevice)
DECLARE_SC_EX("EnumDevice", RPC_ENUM_DEVICE, EcEnumDevice, InRpcEnumDevice, OutRpcEnumDevice, FreeRpcEnumDevice)
DECLARE_SC("SetPassword", RPC_SET_PASSWORD, EcSetPassword, InRpcSetPassword, OutRpcSetPassword)
DECLARE_SC_EX("EnumAllDevice", RPC_ENUM_DEVICE, EcEnumAllDevice, InRpcEnumDevice, OutRpcEnumDevice, FreeRpcEnumDevice)
DECLARE_SC("DelLicenseKey", RPC_TEST, EcDelLicenseKey, InRpcTest, OutRpcTest)
DECLARE_SC_EX("EnumLicenseKey", RPC_ENUM_LICENSE_KEY, EcEnumLicenseKey, InRpcEnumLicenseKey, OutRpcEnumLicenseKey, FreeRpcEnumLicenseKey)
DECLARE_SC("GetLicenseStatus", RPC_EL_LICENSE_STATUS, EcGetLicenseStatus, InRpcElLicenseStatus, OutRpcElLicenseStatus)
DECLARE_SC("GetBridgeSupport", RPC_BRIDGE_SUPPORT, EcGetBridgeSupport, InRpcBridgeSupport, OutRpcBridgeSupport)
DECLARE_SC("RebootServer", RPC_TEST, EcRebootServer, InRpcTest, OutRpcTest)
// Thread to restart the server
void EiRebootServerThread(THREAD *thread, void *param)
{
// Validate arguments
if (thread == NULL)
{
return;
}
if (el == NULL)
{
return;
}
// Stopping the server
ElStop();
// Starting the server
ElStart();
}
// Restarting the server
void EiRebootServer()
{
THREAD *t;
t = NewThread(EiRebootServerThread, NULL);
ReleaseThread(t);
}
// RPC to restart server
UINT EtRebootServer(EL *a, RPC_TEST *t)
{
EiRebootServer();
return ERR_NO_ERROR;
}
// Get support information for the local bridge
UINT EtGetBridgeSupport(EL *a, RPC_BRIDGE_SUPPORT *t)
{
Zero(t, sizeof(RPC_BRIDGE_SUPPORT));
t->IsBridgeSupportedOs = IsBridgeSupported();
t->IsWinPcapNeeded = IsNeedWinPcap();
return ERR_NO_ERROR;
}
// Save by analyzing the status of the current license
void ElParseCurrentLicenseStatus(LICENSE_SYSTEM *s, EL_LICENSE_STATUS *st)
{
}
// Get a license status
UINT EtGetLicenseStatus(EL *e, RPC_EL_LICENSE_STATUS *t)
{
UINT ret = ERR_NO_ERROR;
LICENSE_SYSTEM *ls = e->LicenseSystem;
if (ls == NULL)
{
return ERR_NOT_SUPPORTED;
}
Zero(t, sizeof(RPC_EL_LICENSE_STATUS));
// Get the current license status
ElParseCurrentLicenseStatus(ls, e->LicenseStatus);
t->Valid = e->LicenseStatus->Valid;
t->SystemId = e->LicenseStatus->SystemId;
t->SystemExpires = e->LicenseStatus->Expires;
return ret;
}
// Enumerate the license keys
UINT EtEnumLicenseKey(EL *el, RPC_ENUM_LICENSE_KEY *t)
{
return ERR_NOT_SUPPORTED;
}
// Add a license key
UINT EtAddLicenseKey(EL *e, RPC_TEST *t)
{
return ERR_NOT_SUPPORTED;
}
// Delete the license key
UINT EtDelLicenseKey(EL *e, RPC_TEST *t)
{
return ERR_NOT_SUPPORTED;
}
// Password setting
UINT EtSetPassword(EL *e, RPC_SET_PASSWORD *t)
{
Copy(e->HashedPassword, t->HashedPassword, SHA1_SIZE);
ElSaveConfig(e);
return ERR_NO_ERROR;
}
// Add a device
UINT EtAddDevice(EL *e, RPC_ADD_DEVICE *t)
{
if (ElAddCaptureDevice(e, t->DeviceName, &t->LogSetting, t->NoPromiscuous) == false)
{
return ERR_CAPTURE_DEVICE_ADD_ERROR;
}
ElSaveConfig(e);
return ERR_NO_ERROR;
}
// Remove the device
UINT EtDelDevice(EL *e, RPC_DELETE_DEVICE *t)
{
if (ElDeleteCaptureDevice(e, t->DeviceName) == false)
{
return ERR_CAPTURE_NOT_FOUND;
}
ElSaveConfig(e);
return ERR_NO_ERROR;
}
// Get the device
UINT EtGetDevice(EL *e, RPC_ADD_DEVICE *t)
{
UINT ret = ERR_CAPTURE_NOT_FOUND;
LockList(e->DeviceList);
{
EL_DEVICE *d, a;
Zero(&a, sizeof(a));
StrCpy(a.DeviceName, sizeof(a.DeviceName), t->DeviceName);
d = Search(e->DeviceList, &a);
if (d != NULL)
{
ret = ERR_NO_ERROR;
Copy(&t->LogSetting, &d->LogSetting, sizeof(HUB_LOG));
t->NoPromiscuous = d->NoPromiscuous;
}
}
UnlockList(e->DeviceList);
return ret;
}
// Device Setting
UINT EtSetDevice(EL *e, RPC_ADD_DEVICE *t)
{
if (ElSetCaptureDeviceLogSetting(e, t->DeviceName, &t->LogSetting) == false)
{
return ERR_CAPTURE_NOT_FOUND;
}
ElSaveConfig(e);
return ERR_NO_ERROR;
}
// Enumerate all devices
UINT EtEnumAllDevice(EL *e, RPC_ENUM_DEVICE *t)
{
TOKEN_LIST *eth;
UINT i;
if (IsEthSupported() == false)
{
return ERR_NOT_SUPPORTED;
}
FreeRpcEnumDevice(t);
Zero(t, sizeof(RPC_ENUM_DEVICE));
eth = GetEthList();
t->NumItem = eth->NumTokens;
t->Items = ZeroMalloc(sizeof(RPC_ENUM_DEVICE_ITEM) * t->NumItem);
for (i = 0;i < eth->NumTokens;i++)
{
char *name = eth->Token[i];
RPC_ENUM_DEVICE_ITEM *item = &t->Items[i];
StrCpy(item->DeviceName, sizeof(item->DeviceName), name);
}
FreeToken(eth);
return ERR_NO_ERROR;
}
// Device enumeration
UINT EtEnumDevice(EL *e, RPC_ENUM_DEVICE *t)
{
bool is_beta_expired = ElIsBetaExpired();
if (is_beta_expired)
{
// The beta version has expired
return ERR_BETA_EXPIRES;
}
FreeRpcEnumDevice(t);
Zero(t, sizeof(RPC_ENUM_DEVICE));
LockList(e->DeviceList);
{
UINT i;
t->NumItem = LIST_NUM(e->DeviceList);
t->Items = ZeroMalloc(sizeof(RPC_ENUM_DEVICE_ITEM) * t->NumItem);
for (i = 0;i < t->NumItem;i++)
{
RPC_ENUM_DEVICE_ITEM *d = &t->Items[i];
EL_DEVICE *eld = LIST_DATA(e->DeviceList, i);
StrCpy(d->DeviceName, sizeof(d->DeviceName), eld->DeviceName);
d->Active = eld->Active && ((ELOG_IS_BETA || e->LicenseStatus->Valid) ? true : false);
}
}
UnlockList(e->DeviceList);
return ERR_NO_ERROR;
}
void InRpcAddDevice(RPC_ADD_DEVICE *t, PACK *p)
{
UINT i;
// Validate arguments
if (t == NULL || p == NULL)
{
return;
}
Zero(t, sizeof(RPC_ADD_DEVICE));
PackGetStr(p, "DeviceName", t->DeviceName, sizeof(t->DeviceName));
t->NoPromiscuous = PackGetInt(p, "NoPromiscuous");
t->LogSetting.PacketLogSwitchType = PackGetInt(p, "PacketLogSwitchType");
for (i = 0;i < NUM_PACKET_LOG;i++)
{
t->LogSetting.PacketLogConfig[i] = PackGetIntEx(p, "PacketLogConfig", i);
}
}
void OutRpcAddDevice(PACK *p, RPC_ADD_DEVICE *t)
{
UINT i;
// Validate arguments
if (t == NULL || p == NULL)
{
return;
}
PackAddStr(p, "DeviceName", t->DeviceName);
PackAddInt(p, "NoPromiscuous", t->NoPromiscuous);
PackAddInt(p, "PacketLogSwitchType", t->LogSetting.PacketLogSwitchType);
for (i = 0;i < NUM_PACKET_LOG;i++)
{
PackAddIntEx(p, "PacketLogConfig", t->LogSetting.PacketLogConfig[i], i, NUM_PACKET_LOG);
}
}
void InRpcDeleteDevice(RPC_DELETE_DEVICE *t, PACK *p)
{
// Validate arguments
if (t == NULL || p == NULL)
{
return;
}
Zero(t, sizeof(RPC_DELETE_DEVICE));
PackGetStr(p, "DeviceName", t->DeviceName, sizeof(t->DeviceName));
}
void OutRpcDeleteDevice(PACK *p, RPC_DELETE_DEVICE *t)
{
// Validate arguments
if (p == NULL || t == NULL)
{
return;
}
PackAddStr(p, "DeviceName", t->DeviceName);
}
void InRpcEnumDevice(RPC_ENUM_DEVICE *t, PACK *p)
{
UINT i;
// Validate arguments
if (t == NULL || p == NULL)
{
return;
}
Zero(t, sizeof(RPC_ENUM_DEVICE));
t->NumItem = PackGetInt(p, "NumItem");
t->Items = ZeroMalloc(sizeof(RPC_ENUM_DEVICE_ITEM) * t->NumItem);
for (i = 0;i < t->NumItem;i++)
{
RPC_ENUM_DEVICE_ITEM *d = &t->Items[i];
PackGetStrEx(p, "DeviceName", d->DeviceName, sizeof(d->DeviceName), i);
d->Active = PackGetBoolEx(p, "Active", i);
}
t->IsLicenseSupported = PackGetBool(p, "IsLicenseSupported");
}
void OutRpcEnumDevice(PACK *p, RPC_ENUM_DEVICE *t)
{
UINT i;
// Validate arguments
if (t == NULL || p == NULL)
{
return;
}
PackAddInt(p, "NumItem", t->NumItem);
PackSetCurrentJsonGroupName(p, "DeviceList");
for (i = 0;i < t->NumItem;i++)
{
RPC_ENUM_DEVICE_ITEM *d = &t->Items[i];
PackAddStrEx(p, "DeviceName", d->DeviceName, i, t->NumItem);
PackAddBoolEx(p, "Active", d->Active, i, t->NumItem);
}
PackSetCurrentJsonGroupName(p, NULL);
PackAddBool(p, "IsLicenseSupported", t->IsLicenseSupported);
}
void FreeRpcEnumDevice(RPC_ENUM_DEVICE *t)
{
// Validate arguments
if (t == NULL)
{
return;
}
Free(t->Items);
}
// RPC_LICENSE_STATUS
void InRpcElLicenseStatus(RPC_EL_LICENSE_STATUS *t, PACK *p)
{
// Validate arguments
if (t == NULL || p == NULL)
{
return;
}
Zero(t, sizeof(RPC_EL_LICENSE_STATUS));
t->Valid = PackGetBool(p, "Valid");
t->SystemId = PackGetInt64(p, "SystemId");
t->SystemExpires = PackGetInt64(p, "SystemExpires");
}
void OutRpcElLicenseStatus(PACK *p, RPC_EL_LICENSE_STATUS *t)
{
// Validate arguments
if (t == NULL || p == NULL)
{
return;
}
PackAddBool(p, "Valid", t->Valid);
PackAddInt64(p, "SystemId", t->SystemId);
PackAddTime64(p, "SystemExpires", t->SystemExpires);
}
// Listener thread
void ElListenerProc(THREAD *thread, void *param)
{
TCP_ACCEPTED_PARAM *data = (TCP_ACCEPTED_PARAM *)param;
EL *e;
SOCK *s;
UCHAR rand[SHA1_SIZE];
UCHAR pass1[SHA1_SIZE], pass2[SHA1_SIZE];
// Validate arguments
if (data == NULL || thread == NULL)
{
return;
}
e = (EL *)data->r->ThreadParam;
s = data->s;
AddRef(s->ref);
SetTimeout(s, 5000);
LockList(e->AdminThreadList);
{
AddRef(thread->ref);
AddRef(s->ref);
Insert(e->AdminThreadList, thread);
Insert(e->AdminSockList, s);
}
UnlockList(e->AdminThreadList);
NoticeThreadInit(thread);
// Submit a challenge
Rand(rand, sizeof(rand));
SendAll(s, rand, sizeof(rand), false);
// Receive a response
SecurePassword(pass1, e->HashedPassword, rand);
Zero(pass2, sizeof(pass2));
(void)RecvAll(s, pass2, sizeof(pass2), false);
if (Cmp(pass1, pass2, SHA1_SIZE) != 0)
{
// Password incorrect
bool code = false;
code = Endian32(code);
SendAll(s, &code, sizeof(code), false);
}
else
{
// Password match
bool code = true;
RPC *r;
code = Endian32(code);
SendAll(s, &code, sizeof(code), false);
SetTimeout(s, INFINITE);
// Start operation as a RPC server
r = StartRpcServer(s, ElRpcServer, e);
RpcServer(r);
RpcFree(r);
}
Disconnect(s);
ReleaseSock(s);
LockList(e->AdminThreadList);
{
if (Delete(e->AdminThreadList, thread))
{
ReleaseThread(thread);
}
if (Delete(e->AdminSockList, s))
{
ReleaseSock(s);
}
}
UnlockList(e->AdminThreadList);
}
// Listener start
void ElStartListener(EL *e)
{
// Validate arguments
if (e == NULL)
{
return;
}
e->AdminThreadList = NewList(NULL);
e->AdminSockList = NewList(NULL);
e->Listener = NewListenerEx(e->Cedar, LISTENER_TCP, e->Port == 0 ? EL_ADMIN_PORT : e->Port,
ElListenerProc, e);
}
// Listener stop
void ElStopListener(EL *e)
{
UINT i;
THREAD **threads;
SOCK **socks;
UINT num_threads, num_socks;
// Validate arguments
if (e == NULL)
{
return;
}
StopAllListener(e->Cedar);
LockList(e->AdminThreadList);
{
threads = ToArray(e->AdminThreadList);
num_threads = LIST_NUM(e->AdminThreadList);
DeleteAll(e->AdminThreadList);
socks = ToArray(e->AdminSockList);
num_socks = LIST_NUM(e->AdminSockList);
DeleteAll(e->AdminSockList);
}
UnlockList(e->AdminThreadList);
for (i = 0;i < num_socks;i++)
{
Disconnect(socks[i]);
ReleaseSock(socks[i]);
}
for (i = 0;i < num_threads;i++)
{
WaitThread(threads[i], INFINITE);
ReleaseThread(threads[i]);
}
Free(threads);
Free(socks);
ReleaseList(e->AdminSockList);
ReleaseList(e->AdminThreadList);
ReleaseListener(e->Listener);
}
// Update the log configuration of the capture device
bool ElSetCaptureDeviceLogSetting(EL *e, char *name, HUB_LOG *log)
{
EL_DEVICE *d;
bool ret = false;
// Validate arguments
if (e == NULL || log == NULL || name == NULL)
{
return false;
}
LockList(e->DeviceList);
{
EL_DEVICE t;
Zero(&t, sizeof(t));
StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
d = Search(e->DeviceList, &t);
if (d != NULL)
{
Copy(&d->LogSetting, log, sizeof(HUB_LOG));
SetLogSwitchType(d->Logger, log->PacketLogSwitchType);
ret = true;
}
}
UnlockList(e->DeviceList);
return ret;
}
// Confirm whether the beta version has expired
bool ElIsBetaExpired()
{
SYSTEMTIME st;
UINT64 expires64;
UINT64 now64;
if (ELOG_IS_BETA == false)
{
return false;
}
Zero(&st, sizeof(st));
st.wYear = ELOG_BETA_EXPIRES_YEAR;
st.wMonth = ELOG_BETA_EXPIRES_MONTH;
st.wDay = ELOG_BETA_EXPIRES_DAY;
expires64 = SystemToUINT64(&st);
now64 = LocalTime64();
if (now64 >= expires64)
{
return true;
}
return false;
}
// Capture thread
void ElCaptureThread(THREAD *thread, void *param)
{
}
// Delete the capture device
bool ElDeleteCaptureDevice(EL *e, char *name)
{
bool ret = false;
EL_DEVICE *d, t;
// Validate arguments
if (e == NULL || name == NULL)
{
return false;
}
LockList(e->DeviceList);
{
Zero(&t, sizeof(t));
StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
d = Search(e->DeviceList, &t);
if (d != NULL)
{
// Stop capture
d->Halt = true;
Cancel(d->Cancel1);
// Wait for thread stop
WaitThread(d->Thread, INFINITE);
ReleaseThread(d->Thread);
// Release the memory
Delete(e->DeviceList, d);
Free(d);
ret = true;
}
}
UnlockList(e->DeviceList);
return ret;
}
// Add a capture device
bool ElAddCaptureDevice(EL *e, char *name, HUB_LOG *log, bool no_promiscuous)
{
EL_DEVICE *d, t;
// Validate arguments
if (e == NULL || name == NULL || log == NULL)
{
return false;
}
Zero(&t, sizeof(t));
StrCpy(t.DeviceName, sizeof(t.DeviceName), name);
LockList(e->DeviceList);
{
d = Search(e->DeviceList, &t);
if (d != NULL)
{
// Capture settings with the same name already exists
UnlockList(e->DeviceList);
return false;
}
// Add a device
d = ZeroMalloc(sizeof(EL_DEVICE));
StrCpy(d->DeviceName, sizeof(d->DeviceName), name);
Copy(&d->LogSetting, log, sizeof(HUB_LOG));
d->NoPromiscuous = no_promiscuous;
d->el = e;
Insert(e->DeviceList, d);
// Start the thread
d->Thread = NewThread(ElCaptureThread, d);
WaitThreadInit(d->Thread);
}
UnlockList(e->DeviceList);
ElSaveConfig(e);
return true;
}
// Write the license List
void EiWriteLicenseManager(FOLDER *f, EL *s)
{
}
// Read the license list
void EiLoadLicenseManager(EL *s, FOLDER *f)
{
}
// Configuration initialization
void ElInitConfig(EL *e)
{
// Validate arguments
if (e == NULL)
{
return;
}
// Device list initialization
e->DeviceList = NewList(ElCompareDevice);
// Read configuration file
ElLoadConfig(e);
// Write configuration file
ElSaveConfig(e);
}
// Write the configuration
void ElSaveConfig(EL *e)
{
FOLDER *root;
// Validate arguments
if (e == NULL)
{
return;
}
root = CfgCreateFolder(NULL, TAG_ROOT);
ElSaveConfigToFolder(e, root);
SaveCfgRw(e->CfgRw, root);
CfgDeleteFolder(root);
}
// Write the configuration to the folder
void ElSaveConfigToFolder(EL *e, FOLDER *root)
{
UINT i;
FOLDER *devices;
// Validate arguments
if (e == NULL || root == NULL)
{
return;
}
CfgAddInt64(root, "AutoDeleteCheckDiskFreeSpaceMin", e->AutoDeleteCheckDiskFreeSpaceMin);
CfgAddInt(root, "AdminPort", e->Port);
CfgAddByte(root, "AdminPassword", e->HashedPassword, sizeof(e->HashedPassword));
if (ELOG_IS_BETA == false)
{
EiWriteLicenseManager(CfgCreateFolder(root, "LicenseManager"), e);
}
devices = CfgCreateFolder(root,"Devices");
LockList(e->DeviceList);
{
for (i = 0;i < LIST_NUM(e->DeviceList);i++)
{
FOLDER *f;
EL_DEVICE *d = LIST_DATA(e->DeviceList, i);
f = CfgCreateFolder(devices, d->DeviceName);
SiWriteHubLogCfgEx(f, &d->LogSetting, true);
CfgAddBool(f, "NoPromiscuousMode", d->NoPromiscuous);
}
}
UnlockList(e->DeviceList);
}
// Read the configuration from the folder
void ElLoadConfigFromFolder(EL *e, FOLDER *root)
{
UINT i;
TOKEN_LIST *t;
FOLDER *devices;
// Validate arguments
if (e == NULL || root == NULL)
{
return;
}
i = CfgGetInt(root, "AdminPort");
if (i >= 1 && i <= 65535)
{
e->Port = i;
}
e->AutoDeleteCheckDiskFreeSpaceMin = CfgGetInt64(root, "AutoDeleteCheckDiskFreeSpaceMin");
if (CfgIsItem(root, "AutoDeleteCheckDiskFreeSpaceMin") == false && e->AutoDeleteCheckDiskFreeSpaceMin == 0)
{
e->AutoDeleteCheckDiskFreeSpaceMin = DISK_FREE_SPACE_DEFAULT;
}
if (e->AutoDeleteCheckDiskFreeSpaceMin != 0)
{
if (e->AutoDeleteCheckDiskFreeSpaceMin < DISK_FREE_SPACE_MIN)
{
e->AutoDeleteCheckDiskFreeSpaceMin = DISK_FREE_SPACE_MIN;
}
}
if (CfgGetByte(root, "AdminPassword", e->HashedPassword, sizeof(e->HashedPassword)) != sizeof(e->HashedPassword))
{
Sha0(e->HashedPassword, "", 0);
}
if (ELOG_IS_BETA == false)
{
EiLoadLicenseManager(e, CfgGetFolder(root, "LicenseManager"));
}
devices = CfgGetFolder(root, "Devices");
if(devices != NULL)
{
LockList(e->DeviceList);
{
t = CfgEnumFolderToTokenList(devices);
for (i = 0;i < t->NumTokens;i++)
{
char *name = t->Token[i];
FOLDER *f = CfgGetFolder(devices, name);
if (f != NULL)
{
HUB_LOG g;
Zero(&g, sizeof(g));
SiLoadHubLogCfg(&g, f);
ElAddCaptureDevice(e, name, &g, CfgGetBool(f, "NoPromiscuousMode"));
}
}
FreeToken(t);
}
UnlockList(e->DeviceList);
}
}
// Reading configuration
bool ElLoadConfig(EL *e)
{
FOLDER *root;
bool ret = false;
// Validate arguments
if (e == NULL)
{
return false;
}
e->Port = EL_ADMIN_PORT;
e->CfgRw = NewCfgRw(&root, EL_CONFIG_FILENAME);
if (root != NULL)
{
ElLoadConfigFromFolder(e, root);
CfgDeleteFolder(root);
}
else
{
char *pass = "";
Sha0(e->HashedPassword, pass, StrLen(pass));
e->AutoDeleteCheckDiskFreeSpaceMin = DISK_FREE_SPACE_DEFAULT;
}
return ret;
}
// Configuration release
void ElFreeConfig(EL *e)
{
UINT i;
LIST *o;
// Validate arguments
if (e == NULL)
{
return;
}
// Write the configuration file
ElSaveConfig(e);
FreeCfgRw(e->CfgRw);
// Stop all capture
o = NewList(NULL);
LockList(e->DeviceList);
{
for (i = 0;i < LIST_NUM(e->DeviceList);i++)
{
EL_DEVICE *d = LIST_DATA(e->DeviceList, i);
Insert(o, CopyStr(d->DeviceName));
}
for (i = 0;i < LIST_NUM(o);i++)
{
char *name = LIST_DATA(o, i);
ElDeleteCaptureDevice(e, name);
Free(name);
}
ReleaseList(o);
}
UnlockList(e->DeviceList);
ReleaseList(e->DeviceList);
}
// Comparison function of the device
int ElCompareDevice(void *p1, void *p2)
{
EL_DEVICE *d1, *d2;
// Validate arguments
if (p1 == NULL || p2 == NULL)
{
return 0;
}
d1 = *(EL_DEVICE **)p1;
d2 = *(EL_DEVICE **)p2;
if (d1 == NULL || d2 == NULL)
{
return 0;
}
return StrCmpi(d1->DeviceName, d2->DeviceName);
}
// Clean-up the EL
void CleanupEl(EL *e)
{
// Validate arguments
if (e == NULL)
{
return;
}
// Stop Eraser
FreeEraser(e->Eraser);
// Stop Listener
ElStopListener(e);
// Setting release
ElFreeConfig(e);
// Free the license system
if(e->LicenseSystem != NULL)
{
}
// Free the license status
if(e->LicenseStatus != NULL)
{
Free(e->LicenseStatus);
}
// Ethernet release
FreeEth();
ReleaseCedar(e->Cedar);
DeleteLock(e->lock);
Free(e);
}
// Release the EL
void ReleaseEl(EL *e)
{
// Validate arguments
if (e == NULL)
{
return;
}
if (Release(e->ref) == 0)
{
CleanupEl(e);
}
}
// Create the EL
EL *NewEl()
{
EL *e;
#ifdef OS_WIN32
RegistWindowsFirewallAll();
#endif
e = ZeroMalloc(sizeof(EL));
e->lock = NewLock();
e->ref = NewRef();
e->Cedar = NewCedar(NULL, NULL);
// Ethernet initialization
InitEth();
// Setting initialization
ElInitConfig(e);
// Listener start
ElStartListener(e);
// Initialize the license status
ElParseCurrentLicenseStatus(e->LicenseSystem, e->LicenseStatus);
// Eraser start
e->Eraser = NewEraser(NULL, e->AutoDeleteCheckDiskFreeSpaceMin);
return e;
}
// EL start
void ElStart()
{
// Raise the priority
OSSetHighPriority();
Lock(el_lock);
{
el = NewEl();
}
Unlock(el_lock);
}
// EL stop
void ElStop()
{
Lock(el_lock);
{
ReleaseEl(el);
el = NULL;
}
Unlock(el_lock);
}