mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2024-11-14 05:30:41 +03:00
7de986dcca
Buffer overread in ParseL2TPPacket() Memory corruption in IcmpParseResult Missing bounds check in ParseUDP() can lead to invalid memory access Out-of-bounds read in IPsec_PPP.c (unterminated string buffer) Overlapping parameters to memcpy() via StrToIp6() PACK ReadValue() crash vulnerability Potential use of uninitialized memory via IPToInAddr6() 4 memory leaks. While the amount of leakage is very small per time, these bugs can finally cause process crash by out of memory. So these bugs must be fixed. Memory leak in NnReadDnsRecord Memory leak in RadiusLogin() Memory leak via ParsePacketIPv4WithDummyMacHeader Remote memory leak in OpenVPN server code 1 coding improvement. This is not a bug, however, I fixed the code to avoid furture misunderstanding. RecvAll can return success on failure (leading to use of uninitialized memory) Contributors for this bugfix: - Max Planck Institute for Molecular Genetics - Guido Vranken
2718 lines
58 KiB
C
2718 lines
58 KiB
C
// SoftEther VPN Source Code - Developer Edition Master Branch
|
|
// Cedar Communication Module
|
|
//
|
|
// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
|
|
//
|
|
// Copyright (c) Daiyuu Nobori.
|
|
// Copyright (c) SoftEther VPN Project, University of Tsukuba, Japan.
|
|
// Copyright (c) SoftEther Corporation.
|
|
//
|
|
// All Rights Reserved.
|
|
//
|
|
// http://www.softether.org/
|
|
//
|
|
// Author: Daiyuu Nobori, Ph.D.
|
|
// Comments: Tetsuo Sugiyama, Ph.D.
|
|
//
|
|
// This program is free software; you can redistribute it and/or
|
|
// modify it under the terms of the GNU General Public License
|
|
// version 2 as published by the Free Software Foundation.
|
|
//
|
|
// This program is distributed in the hope that it will be useful,
|
|
// but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
// GNU General Public License for more details.
|
|
//
|
|
// You should have received a copy of the GNU General Public License version 2
|
|
// along with this program; if not, write to the Free Software
|
|
// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
|
|
//
|
|
// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
|
|
// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
|
|
// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
|
|
// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
|
|
// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
|
|
// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
|
|
// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
|
//
|
|
// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
|
|
// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
|
|
//
|
|
//
|
|
// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
|
|
// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
|
|
// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
|
|
// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
|
|
// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
|
|
// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
|
|
// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
|
|
// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
|
|
// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
|
|
// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
|
|
// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
|
|
// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
|
|
// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
|
|
// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
|
|
//
|
|
// USE ONLY IN JAPAN. DO NOT USE THIS SOFTWARE IN ANOTHER COUNTRY UNLESS
|
|
// YOU HAVE A CONFIRMATION THAT THIS SOFTWARE DOES NOT VIOLATE ANY
|
|
// CRIMINAL LAWS OR CIVIL RIGHTS IN THAT PARTICULAR COUNTRY. USING THIS
|
|
// SOFTWARE IN OTHER COUNTRIES IS COMPLETELY AT YOUR OWN RISK. THE
|
|
// SOFTETHER VPN PROJECT HAS DEVELOPED AND DISTRIBUTED THIS SOFTWARE TO
|
|
// COMPLY ONLY WITH THE JAPANESE LAWS AND EXISTING CIVIL RIGHTS INCLUDING
|
|
// PATENTS WHICH ARE SUBJECTS APPLY IN JAPAN. OTHER COUNTRIES' LAWS OR
|
|
// CIVIL RIGHTS ARE NONE OF OUR CONCERNS NOR RESPONSIBILITIES. WE HAVE
|
|
// NEVER INVESTIGATED ANY CRIMINAL REGULATIONS, CIVIL LAWS OR
|
|
// INTELLECTUAL PROPERTY RIGHTS INCLUDING PATENTS IN ANY OF OTHER 200+
|
|
// COUNTRIES AND TERRITORIES. BY NATURE, THERE ARE 200+ REGIONS IN THE
|
|
// WORLD, WITH DIFFERENT LAWS. IT IS IMPOSSIBLE TO VERIFY EVERY
|
|
// COUNTRIES' LAWS, REGULATIONS AND CIVIL RIGHTS TO MAKE THE SOFTWARE
|
|
// COMPLY WITH ALL COUNTRIES' LAWS BY THE PROJECT. EVEN IF YOU WILL BE
|
|
// SUED BY A PRIVATE ENTITY OR BE DAMAGED BY A PUBLIC SERVANT IN YOUR
|
|
// COUNTRY, THE DEVELOPERS OF THIS SOFTWARE WILL NEVER BE LIABLE TO
|
|
// RECOVER OR COMPENSATE SUCH DAMAGES, CRIMINAL OR CIVIL
|
|
// RESPONSIBILITIES. NOTE THAT THIS LINE IS NOT LICENSE RESTRICTION BUT
|
|
// JUST A STATEMENT FOR WARNING AND DISCLAIMER.
|
|
//
|
|
//
|
|
// SOURCE CODE CONTRIBUTION
|
|
// ------------------------
|
|
//
|
|
// Your contribution to SoftEther VPN Project is much appreciated.
|
|
// Please send patches to us through GitHub.
|
|
// Read the SoftEther VPN Patch Acceptance Policy in advance:
|
|
// http://www.softether.org/5-download/src/9.patch
|
|
//
|
|
//
|
|
// DEAR SECURITY EXPERTS
|
|
// ---------------------
|
|
//
|
|
// If you find a bug or a security vulnerability please kindly inform us
|
|
// about the problem immediately so that we can fix the security problem
|
|
// to protect a lot of users around the world as soon as possible.
|
|
//
|
|
// Our e-mail address for security reports is:
|
|
// softether-vpn-security [at] softether.org
|
|
//
|
|
// Please note that the above e-mail address is not a technical support
|
|
// inquiry address. If you need technical assistance, please visit
|
|
// http://www.softether.org/ and ask your question on the users forum.
|
|
//
|
|
// Thank you for your cooperation.
|
|
//
|
|
//
|
|
// NO MEMORY OR RESOURCE LEAKS
|
|
// ---------------------------
|
|
//
|
|
// The memory-leaks and resource-leaks verification under the stress
|
|
// test has been passed before release this source code.
|
|
|
|
|
|
// IPsec_L2TP.c
|
|
// L2TP protocol stack
|
|
|
|
#include "CedarPch.h"
|
|
|
|
// Release the L2TP AVP value
|
|
void FreeL2TPAVP(L2TP_AVP *a)
|
|
{
|
|
// Validate arguments
|
|
if (a == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (a->Data != NULL)
|
|
{
|
|
Free(a->Data);
|
|
}
|
|
|
|
Free(a);
|
|
}
|
|
|
|
// Release the L2TP packet
|
|
void FreeL2TPPacket(L2TP_PACKET *p)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (p == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (p->AvpList != NULL)
|
|
{
|
|
for (i = 0;i < LIST_NUM(p->AvpList);i++)
|
|
{
|
|
L2TP_AVP *a = LIST_DATA(p->AvpList, i);
|
|
|
|
FreeL2TPAVP(a);
|
|
}
|
|
|
|
ReleaseList(p->AvpList);
|
|
}
|
|
|
|
if (p->Data != NULL)
|
|
{
|
|
Free(p->Data);
|
|
}
|
|
|
|
Free(p);
|
|
}
|
|
|
|
// Send an L2TP control packet
|
|
void SendL2TPControlPacket(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, UINT session_id, L2TP_PACKET *p)
|
|
{
|
|
BUF *buf;
|
|
L2TP_QUEUE *q;
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || p == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
p->IsControl = true;
|
|
p->TunnelId = t->TunnelId1;
|
|
p->SessionId = session_id;
|
|
|
|
p->Ns = t->NextNs;
|
|
t->NextNs++;
|
|
|
|
p->Nr = t->LastNr + 1;
|
|
|
|
buf = BuildL2TPPacketData(p, t);
|
|
|
|
q = ZeroMalloc(sizeof(L2TP_QUEUE));
|
|
q->Buf = buf;
|
|
q->Ns = p->Ns;
|
|
q->NextSendTick = l2tp->Now + (UINT64)L2TP_PACKET_RESEND_INTERVAL;
|
|
SendL2TPControlPacketMain(l2tp, t, q);
|
|
|
|
L2TPAddInterrupt(l2tp, q->NextSendTick);
|
|
|
|
Add(t->SendQueue, q);
|
|
|
|
}
|
|
|
|
// Specify the interrupt occurrence time of the next
|
|
void L2TPAddInterrupt(L2TP_SERVER *l2tp, UINT64 next_tick)
|
|
{
|
|
// Validate arguments
|
|
if (l2tp == NULL || next_tick == 0)
|
|
{
|
|
return;
|
|
}
|
|
|
|
AddInterrupt(l2tp->Interrupts, next_tick);
|
|
}
|
|
|
|
// Send a L2TP data packet
|
|
void SendL2TPDataPacket(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, L2TP_SESSION *s, void *data, UINT size)
|
|
{
|
|
UDPPACKET *p;
|
|
UCHAR *buf;
|
|
UINT buf_size;
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || s == NULL || (size != 0 && data == NULL))
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Build a L2TP data packet
|
|
if (s->IsV3 == false)
|
|
{
|
|
// L2TP Ver 2
|
|
buf_size = 8 + size;
|
|
buf = Malloc(buf_size);
|
|
buf[0] = 0x40;
|
|
buf[1] = 0x02;
|
|
|
|
WRITE_USHORT(buf + 2, buf_size);
|
|
WRITE_USHORT(buf + 4, t->TunnelId1);
|
|
WRITE_USHORT(buf + 6, s->SessionId1);
|
|
|
|
Copy(buf + 8, data, size);
|
|
|
|
// Transmission
|
|
p = NewUdpPacket(&t->ServerIp, t->ServerPort, &t->ClientIp, t->ClientPort, buf, buf_size);
|
|
}
|
|
else
|
|
{
|
|
// L2TPv3
|
|
if (t->IsYamahaV3 == false)
|
|
{
|
|
buf_size = 4 + size;
|
|
buf = Malloc(buf_size);
|
|
|
|
WRITE_UINT(buf, s->SessionId1);
|
|
|
|
Copy(buf + 4, data, size);
|
|
|
|
// Transmission
|
|
p = NewUdpPacket(&t->ServerIp, IPSEC_PORT_L2TPV3_VIRTUAL, &t->ClientIp, IPSEC_PORT_L2TPV3_VIRTUAL, buf, buf_size);
|
|
}
|
|
else
|
|
{
|
|
UINT header = 0x00030000;
|
|
|
|
buf_size = 8 + size;
|
|
buf = Malloc(buf_size);
|
|
|
|
WRITE_UINT(buf, header);
|
|
WRITE_UINT(buf + 4, s->SessionId1);
|
|
|
|
Copy(buf + 8, data, size);
|
|
|
|
// Transmission
|
|
p = NewUdpPacket(&t->ServerIp, t->ServerPort, &t->ClientIp, t->ClientPort, buf, buf_size);
|
|
}
|
|
}
|
|
|
|
L2TPSendUDP(l2tp, p);
|
|
}
|
|
|
|
// L2TP packet transmission main
|
|
void SendL2TPControlPacketMain(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, L2TP_QUEUE *q)
|
|
{
|
|
UDPPACKET *p;
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || q == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
p = NewUdpPacket(&t->ServerIp, t->ServerPort, &t->ClientIp, t->ClientPort,
|
|
Clone(q->Buf->Buf, q->Buf->Size), q->Buf->Size);
|
|
|
|
// Update the received sequence number
|
|
WRITE_USHORT(((UCHAR *)p->Data) + (p->SrcPort == IPSEC_PORT_L2TPV3_VIRTUAL ? 14 : 10), t->LastNr + 1);
|
|
|
|
L2TPSendUDP(l2tp, p);
|
|
}
|
|
|
|
// Send a UDP packet
|
|
void L2TPSendUDP(L2TP_SERVER *l2tp, UDPPACKET *p)
|
|
{
|
|
// Validate arguments
|
|
if (l2tp == NULL || p == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Add(l2tp->SendPacketList, p);
|
|
}
|
|
|
|
// Build a L2TP packet
|
|
BUF *BuildL2TPPacketData(L2TP_PACKET *pp, L2TP_TUNNEL *t)
|
|
{
|
|
BUF *ret;
|
|
UCHAR c;
|
|
USHORT us;
|
|
UINT ui;
|
|
// Validate arguments
|
|
if (pp == NULL || t == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ret = NewBuf();
|
|
|
|
c = 0;
|
|
|
|
if (pp->Ver == 3)
|
|
{
|
|
if (pp->SessionId != 0)
|
|
{
|
|
// Add the Remote Session ID AVP
|
|
L2TP_AVP *a = GetAVPValue(pp, L2TP_AVP_TYPE_V3_SESSION_ID_REMOTE);
|
|
if (a == NULL || a->DataSize != sizeof(UINT))
|
|
{
|
|
UINT ui = Endian32(pp->SessionId);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_V3_SESSION_ID_REMOTE, true, 0, &ui, sizeof(UINT)));
|
|
|
|
if (GetAVPValueEx(pp, L2TPV3_CISCO_AVP_SESSION_ID_LOCAL, L2TP_AVP_VENDOR_ID_CISCO) != NULL)
|
|
{
|
|
Add(pp->AvpList, NewAVP(L2TPV3_CISCO_AVP_SESSION_ID_REMOTE, true, L2TP_AVP_VENDOR_ID_CISCO, &ui, sizeof(UINT)));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (pp->Ver == 3)
|
|
{
|
|
if (t->IsYamahaV3 == false)
|
|
{
|
|
// Zero as Session ID
|
|
ui = 0;
|
|
WriteBuf(ret, &ui, sizeof(UINT));
|
|
}
|
|
}
|
|
|
|
// Flags
|
|
if (pp->IsControl)
|
|
{
|
|
c |= L2TP_HEADER_BIT_TYPE;
|
|
c |= L2TP_HEADER_BIT_LENGTH;
|
|
c |= L2TP_HEADER_BIT_SEQUENCE;
|
|
}
|
|
else
|
|
{
|
|
c |= L2TP_HEADER_BIT_OFFSET;
|
|
}
|
|
|
|
if (pp->IsControl == false && pp->Ver == 3 && t->IsYamahaV3)
|
|
{
|
|
c = 0;
|
|
}
|
|
|
|
WriteBuf(ret, &c, 1);
|
|
|
|
// Ver
|
|
c = 2;
|
|
if (pp->Ver == 3)
|
|
{
|
|
c = 3;
|
|
}
|
|
WriteBuf(ret, &c, 1);
|
|
|
|
// Length
|
|
if (pp->IsControl)
|
|
{
|
|
us = 0;
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
}
|
|
|
|
// Reserved
|
|
if (pp->IsControl == false && pp->Ver == 3 && t->IsYamahaV3)
|
|
{
|
|
us = 0;
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
}
|
|
|
|
// Tunnel ID
|
|
if (pp->Ver != 3)
|
|
{
|
|
us = Endian16((USHORT)pp->TunnelId);
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
}
|
|
else
|
|
{
|
|
ui = Endian32(pp->TunnelId);
|
|
WriteBuf(ret, &ui, sizeof(UINT));
|
|
}
|
|
|
|
// Session ID
|
|
if (pp->Ver != 3)
|
|
{
|
|
us = Endian16((USHORT)pp->SessionId);
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
}
|
|
|
|
if (pp->IsControl)
|
|
{
|
|
// Ns
|
|
us = Endian16(pp->Ns);
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
|
|
// Nr
|
|
us = Endian16(pp->Nr);
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
}
|
|
else
|
|
{
|
|
if (!(pp->IsControl == false && pp->Ver == 3 && t->IsYamahaV3))
|
|
{
|
|
// Offset Size = 0
|
|
us = 0;
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
}
|
|
}
|
|
|
|
if (pp->IsControl)
|
|
{
|
|
// AVP
|
|
UINT i;
|
|
for (i = 0;i < LIST_NUM(pp->AvpList);i++)
|
|
{
|
|
L2TP_AVP *a = LIST_DATA(pp->AvpList, i);
|
|
|
|
// Length and Flags
|
|
us = Endian16(a->DataSize + 6);
|
|
|
|
if (a->Mandatory)
|
|
{
|
|
*((UCHAR *)&us) |= L2TP_AVP_BIT_MANDATORY;
|
|
}
|
|
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
|
|
// Vendor ID
|
|
us = Endian16(a->VendorID);
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
|
|
// Type
|
|
us = Endian16(a->Type);
|
|
WriteBuf(ret, &us, sizeof(USHORT));
|
|
|
|
// Data
|
|
WriteBuf(ret, a->Data, a->DataSize);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Payload
|
|
WriteBuf(ret, pp->Data, pp->DataSize);
|
|
}
|
|
|
|
if (pp->IsControl)
|
|
{
|
|
// Update Length
|
|
bool l2tpv3_non_yamaha = ((pp->Ver == 3) && (t->IsYamahaV3 == false));
|
|
WRITE_USHORT(((UCHAR *)ret->Buf) + 2 + (l2tpv3_non_yamaha ? sizeof(UINT) : 0), (USHORT)(ret->Size - (l2tpv3_non_yamaha ? sizeof(UINT) : 0)));
|
|
}
|
|
|
|
SeekBuf(ret, 0, 0);
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Parse the L2TP packet
|
|
L2TP_PACKET *ParseL2TPPacket(UDPPACKET *p)
|
|
{
|
|
L2TP_PACKET *ret;
|
|
UCHAR *buf;
|
|
UINT size;
|
|
bool is_l2tpv3 = false;
|
|
bool is_l2tpv3_yamaha = false;
|
|
// Validate arguments
|
|
if (p == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ret = ZeroMalloc(sizeof(L2TP_PACKET));
|
|
|
|
if (p->SrcPort == IPSEC_PORT_L2TPV3_VIRTUAL)
|
|
{
|
|
// L2TPv3 (Cisco)
|
|
is_l2tpv3 = true;
|
|
}
|
|
|
|
buf = p->Data;
|
|
size = p->Size;
|
|
|
|
if (size >= 2 && ((buf[1] & L2TP_HEADER_BIT_VER) == 3))
|
|
{
|
|
if (p->SrcPort != IPSEC_PORT_L2TPV3_VIRTUAL)
|
|
{
|
|
// L2TPv3 (YAMAHA)
|
|
is_l2tpv3 = true;
|
|
is_l2tpv3_yamaha = true;
|
|
}
|
|
}
|
|
|
|
if (is_l2tpv3 && (is_l2tpv3_yamaha == false))
|
|
{
|
|
// L2TPv3 (Cisco)
|
|
UINT session_id;
|
|
if (size < 4)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
session_id = READ_UINT(buf);
|
|
|
|
if (session_id != 0)
|
|
{
|
|
// L2TPv3 data packet reception
|
|
ret->SessionId = session_id;
|
|
|
|
buf += sizeof(UINT);
|
|
size -= sizeof(UINT);
|
|
|
|
ret->Data = Clone(buf, size);
|
|
ret->DataSize = size;
|
|
|
|
ret->Ver = 3;
|
|
|
|
return ret;
|
|
}
|
|
else
|
|
{
|
|
// L2TPv3 control packet reception
|
|
buf += sizeof(UINT);
|
|
size -= sizeof(UINT);
|
|
}
|
|
}
|
|
|
|
// L2TP
|
|
if (size < 6)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (*buf & L2TP_HEADER_BIT_TYPE)
|
|
{
|
|
ret->IsControl = true;
|
|
}
|
|
|
|
if (*buf & L2TP_HEADER_BIT_LENGTH)
|
|
{
|
|
ret->HasLength = true;
|
|
}
|
|
|
|
if (*buf & L2TP_HEADER_BIT_SEQUENCE)
|
|
{
|
|
ret->HasSequence = true;
|
|
}
|
|
|
|
if (is_l2tpv3 == false)
|
|
{
|
|
if (*buf & L2TP_HEADER_BIT_OFFSET)
|
|
{
|
|
ret->HasOffset = true;
|
|
}
|
|
|
|
if (*buf & L2TP_HEADER_BIT_PRIORITY)
|
|
{
|
|
ret->IsPriority = true;
|
|
}
|
|
}
|
|
|
|
buf++;
|
|
size--;
|
|
|
|
ret->Ver = *buf & L2TP_HEADER_BIT_VER;
|
|
|
|
buf++;
|
|
size--;
|
|
|
|
if (is_l2tpv3 == false)
|
|
{
|
|
// L2TP
|
|
if (ret->Ver != 2)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// L2TPv3
|
|
if (ret->Ver != 3)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
}
|
|
|
|
if (ret->IsControl)
|
|
{
|
|
if (ret->HasLength == false || ret->HasSequence == false)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/*if (ret->HasSequence)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}*/
|
|
}
|
|
|
|
if (ret->HasLength)
|
|
{
|
|
// Length
|
|
if (size < 2)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
ret->Length = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
|
|
if (size < (ret->Length - 4))
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
size = ret->Length - 4;
|
|
}
|
|
|
|
if (is_l2tpv3)
|
|
{
|
|
if (p->SrcPort != IPSEC_PORT_L2TPV3_VIRTUAL)
|
|
{
|
|
if (ret->IsControl == false)
|
|
{
|
|
// Reserved
|
|
if (size < 2)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
buf += 2;
|
|
size -= 2;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Tunnel ID, Session ID
|
|
if (size < 4)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (is_l2tpv3 == false)
|
|
{
|
|
// L2TP
|
|
ret->TunnelId = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
|
|
ret->SessionId = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
}
|
|
else
|
|
{
|
|
// L2TPv3: Only tunnel ID is written in the header
|
|
ret->TunnelId = READ_UINT(buf);
|
|
buf += 4;
|
|
size -= 4;
|
|
|
|
// The session ID is not written in the header
|
|
ret->SessionId = 0;
|
|
|
|
if (ret->IsControl == false)
|
|
{
|
|
ret->SessionId = ret->TunnelId;
|
|
}
|
|
}
|
|
|
|
if (ret->HasSequence)
|
|
{
|
|
// Ns, Nr
|
|
if (size < 4)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
ret->Ns = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
|
|
ret->Nr = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
}
|
|
|
|
if (ret->HasOffset)
|
|
{
|
|
// Offset
|
|
if (size < 2)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
ret->OffsetSize = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
|
|
if (size < ret->OffsetSize)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
buf += ret->OffsetSize;
|
|
size -= ret->OffsetSize;
|
|
}
|
|
|
|
ret->DataSize = size;
|
|
ret->Data = Clone(buf, ret->DataSize);
|
|
|
|
if (ret->IsControl == false)
|
|
{
|
|
if (ret->DataSize == 0)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
}
|
|
|
|
if (ret->IsControl)
|
|
{
|
|
if (ret->DataSize == 0)
|
|
{
|
|
ret->IsZLB = true;
|
|
}
|
|
}
|
|
|
|
if (ret->IsControl)
|
|
{
|
|
ret->AvpList = NewListFast(NULL);
|
|
|
|
// Parse the AVP field
|
|
while (size != 0)
|
|
{
|
|
L2TP_AVP a;
|
|
|
|
Zero(&a, sizeof(a));
|
|
|
|
// Header
|
|
if (size < 6)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (*buf & L2TP_AVP_BIT_MANDATORY)
|
|
{
|
|
a.Mandatory = true;
|
|
}
|
|
|
|
if (*buf & L2TP_AVP_BIT_HIDDEN)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
a.Length = READ_USHORT(buf) & L2TP_AVP_LENGTH;
|
|
|
|
if (a.Length < 6)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
buf += 2;
|
|
size -= 2;
|
|
|
|
a.VendorID = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
|
|
a.Type = READ_USHORT(buf);
|
|
buf += 2;
|
|
size -= 2;
|
|
|
|
a.DataSize = a.Length - 6;
|
|
|
|
if (a.DataSize > size)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
a.Data = Clone(buf, a.DataSize);
|
|
|
|
buf += a.DataSize;
|
|
size -= a.DataSize;
|
|
|
|
Add(ret->AvpList, Clone(&a, sizeof(a)));
|
|
}
|
|
}
|
|
|
|
if (ret->IsControl && ret->IsZLB == false)
|
|
{
|
|
// Get the MessageType in the case of Control packet
|
|
L2TP_AVP *a = GetAVPValue(ret, L2TP_AVP_TYPE_MESSAGE_TYPE);
|
|
if (a == NULL || a->DataSize != 2)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
ret->MessageType = READ_USHORT(a->Data);
|
|
}
|
|
|
|
if (ret->Ver == 3 && ret->IsControl)
|
|
{
|
|
// Get the Remote Session ID in the case of L2TPv3
|
|
L2TP_AVP *a = GetAVPValue(ret, L2TP_AVP_TYPE_V3_SESSION_ID_REMOTE);
|
|
if (a != NULL && a->DataSize == sizeof(UINT))
|
|
{
|
|
ret->SessionId = READ_UINT(a->Data);
|
|
}
|
|
}
|
|
|
|
ret->IsYamahaV3 = is_l2tpv3_yamaha;
|
|
|
|
return ret;
|
|
|
|
LABEL_ERROR:
|
|
FreeL2TPPacket(ret);
|
|
return NULL;
|
|
}
|
|
|
|
// Get the AVP value
|
|
L2TP_AVP *GetAVPValue(L2TP_PACKET *p, UINT type)
|
|
{
|
|
return GetAVPValueEx(p, type, 0);
|
|
}
|
|
L2TP_AVP *GetAVPValueEx(L2TP_PACKET *p, UINT type, UINT vendor_id)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (p == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(p->AvpList);i++)
|
|
{
|
|
L2TP_AVP *a = LIST_DATA(p->AvpList, i);
|
|
|
|
if (a->Type == type && a->VendorID == vendor_id)
|
|
{
|
|
return a;
|
|
}
|
|
}
|
|
|
|
if (vendor_id == 0)
|
|
{
|
|
if (type == L2TP_AVP_TYPE_V3_TUNNEL_ID)
|
|
{
|
|
return GetAVPValueEx(p, L2TPV3_CISCO_AVP_TUNNEL_ID, L2TP_AVP_VENDOR_ID_CISCO);
|
|
}
|
|
else if (type == L2TP_AVP_TYPE_V3_SESSION_ID_LOCAL)
|
|
{
|
|
return GetAVPValueEx(p, L2TPV3_CISCO_AVP_SESSION_ID_LOCAL, L2TP_AVP_VENDOR_ID_CISCO);
|
|
}
|
|
else if (type == L2TP_AVP_TYPE_V3_SESSION_ID_REMOTE)
|
|
{
|
|
return GetAVPValueEx(p, L2TPV3_CISCO_AVP_SESSION_ID_REMOTE, L2TP_AVP_VENDOR_ID_CISCO);
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Release the L2TP transmission queue
|
|
void FreeL2TPQueue(L2TP_QUEUE *q)
|
|
{
|
|
// Validate arguments
|
|
if (q == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
FreeBuf(q->Buf);
|
|
|
|
FreeL2TPPacket(q->L2TPPacket);
|
|
|
|
Free(q);
|
|
}
|
|
|
|
// Sort function of L2TP reception queue
|
|
int CmpL2TPQueueForRecv(void *p1, void *p2)
|
|
{
|
|
L2TP_QUEUE *q1, *q2;
|
|
// Validate arguments
|
|
if (p1 == NULL || p2 == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
q1 = *(L2TP_QUEUE **)p1;
|
|
q2 = *(L2TP_QUEUE **)p2;
|
|
if (q1 == NULL || q2 == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
if (L2TP_SEQ_LT(q1->Ns, q2->Ns))
|
|
{
|
|
return -1;
|
|
}
|
|
else if (q1->Ns == q2->Ns)
|
|
{
|
|
return 0;
|
|
}
|
|
else
|
|
{
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
// Create a L2TP tunnel
|
|
L2TP_TUNNEL *NewL2TPTunnel(L2TP_SERVER *l2tp, L2TP_PACKET *p, UDPPACKET *udp)
|
|
{
|
|
L2TP_TUNNEL *t;
|
|
L2TP_AVP *a;
|
|
// Validate arguments
|
|
if (l2tp == NULL || p == NULL || udp == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
t = ZeroMalloc(sizeof(L2TP_TUNNEL));
|
|
|
|
if (p->Ver == 3)
|
|
{
|
|
t->IsV3 = true;
|
|
}
|
|
|
|
t->SessionList = NewList(NULL);
|
|
|
|
Copy(&t->ClientIp, &udp->SrcIP, sizeof(IP));
|
|
t->ClientPort = udp->SrcPort;
|
|
|
|
Copy(&t->ServerIp, &udp->DstIP, sizeof(IP));
|
|
t->ServerPort = udp->DestPort;
|
|
|
|
// Hostname
|
|
a = GetAVPValue(p, L2TP_AVP_TYPE_HOST_NAME);
|
|
if (a != NULL && a->DataSize >= 1 && a->DataSize < sizeof(t->HostName))
|
|
{
|
|
Copy(t->HostName, a->Data, a->DataSize);
|
|
}
|
|
else
|
|
{
|
|
IPToStr(t->HostName, sizeof(t->HostName), &t->ClientIp);
|
|
}
|
|
|
|
// Vendor Name
|
|
a = GetAVPValue(p, L2TP_AVP_TYPE_VENDOR_NAME);
|
|
if (a != NULL && a->DataSize >= 1 && a->DataSize < sizeof(t->VendorName))
|
|
{
|
|
Copy(t->VendorName, a->Data, a->DataSize);
|
|
}
|
|
|
|
// Assigned Tunnel ID
|
|
a = GetAVPValue(p, (p->Ver == 3 ? L2TP_AVP_TYPE_V3_TUNNEL_ID : L2TP_AVP_TYPE_ASSIGNED_TUNNEL));
|
|
if (a == NULL || a->DataSize != (t->IsV3 ? sizeof(UINT) : sizeof(USHORT)))
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
t->TunnelId1 = (t->IsV3 ? READ_UINT(a->Data) : READ_USHORT(a->Data));
|
|
t->TunnelId2 = GenerateNewTunnelIdEx(l2tp, &t->ClientIp, t->IsV3);
|
|
|
|
if (t->TunnelId2 == 0)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (p->Ver == 3)
|
|
{
|
|
// Identify whether it's Cisco
|
|
a = GetAVPValueEx(p, L2TPV3_CISCO_AVP_TUNNEL_ID, L2TP_AVP_VENDOR_ID_CISCO);
|
|
if (a != NULL)
|
|
{
|
|
t->IsCiscoV3 = true;
|
|
}
|
|
|
|
// L2TPv3 on YAMAHA
|
|
t->IsYamahaV3 = p->IsYamahaV3;
|
|
}
|
|
|
|
// Transmission queue
|
|
t->SendQueue = NewList(NULL);
|
|
|
|
// Reception queue
|
|
t->RecvQueue = NewList(CmpL2TPQueueForRecv);
|
|
|
|
t->LastRecvTick = l2tp->Now;
|
|
t->LastHelloSent = l2tp->Now;
|
|
|
|
return t;
|
|
|
|
LABEL_ERROR:
|
|
FreeL2TPTunnel(t);
|
|
return NULL;
|
|
}
|
|
|
|
// Search a tunnel
|
|
L2TP_TUNNEL *GetTunnelFromId(L2TP_SERVER *l2tp, IP *client_ip, UINT tunnel_id, bool is_v3)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (l2tp == NULL || client_ip == 0 || tunnel_id == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
if (t->TunnelId2 == tunnel_id && CmpIpAddr(&t->ClientIp, client_ip) == 0)
|
|
{
|
|
if (EQUAL_BOOL(t->IsV3, is_v3))
|
|
{
|
|
return t;
|
|
}
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Search the tunnel by the tunnel ID that is assigned by the client
|
|
L2TP_TUNNEL *GetTunnelFromIdOfAssignedByClient(L2TP_SERVER *l2tp, IP *client_ip, UINT tunnel_id)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (l2tp == NULL || client_ip == 0 || tunnel_id == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
if (t->TunnelId1 == tunnel_id && CmpIpAddr(&t->ClientIp, client_ip) == 0)
|
|
{
|
|
return t;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
L2TP_TUNNEL *GetTunnelFromIdOfAssignedByClientEx(L2TP_SERVER *l2tp, IP *client_ip, UINT tunnel_id, bool is_v3)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (l2tp == NULL || client_ip == 0 || tunnel_id == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
if (t->TunnelId1 == tunnel_id && CmpIpAddr(&t->ClientIp, client_ip) == 0)
|
|
{
|
|
if (EQUAL_BOOL(t->IsV3, is_v3))
|
|
{
|
|
return t;
|
|
}
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Create a new tunnel ID
|
|
UINT GenerateNewTunnelId(L2TP_SERVER *l2tp, IP *client_ip)
|
|
{
|
|
return GenerateNewTunnelIdEx(l2tp, client_ip, false);
|
|
}
|
|
UINT GenerateNewTunnelIdEx(L2TP_SERVER *l2tp, IP *client_ip, bool is_32bit)
|
|
{
|
|
UINT id;
|
|
UINT max_number = 0xffff;
|
|
// Validate arguments
|
|
if (l2tp == NULL || client_ip == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
if (is_32bit)
|
|
{
|
|
max_number = 0xfffffffe;
|
|
}
|
|
|
|
for (id = 1;id <= max_number;id++)
|
|
{
|
|
if (GetTunnelFromId(l2tp, client_ip, id, is_32bit) == NULL)
|
|
{
|
|
return id;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
// Release the L2TP tunnel
|
|
void FreeL2TPTunnel(L2TP_TUNNEL *t)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (t == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(t->SessionList);i++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(t->SessionList, i);
|
|
|
|
FreeL2TPSession(s);
|
|
}
|
|
|
|
ReleaseList(t->SessionList);
|
|
|
|
for (i = 0;i < LIST_NUM(t->SendQueue);i++)
|
|
{
|
|
L2TP_QUEUE *q = LIST_DATA(t->SendQueue, i);
|
|
|
|
FreeL2TPQueue(q);
|
|
}
|
|
|
|
ReleaseList(t->SendQueue);
|
|
|
|
for (i = 0;i < LIST_NUM(t->RecvQueue);i++)
|
|
{
|
|
L2TP_QUEUE *q = LIST_DATA(t->RecvQueue, i);
|
|
|
|
FreeL2TPQueue(q);
|
|
}
|
|
|
|
ReleaseList(t->RecvQueue);
|
|
|
|
Free(t);
|
|
}
|
|
|
|
// Generate a new L2TP control packet
|
|
L2TP_PACKET *NewL2TPControlPacket(UINT message_type, bool is_v3)
|
|
{
|
|
L2TP_PACKET *p = ZeroMalloc(sizeof(L2TP_PACKET));
|
|
|
|
p->IsControl = true;
|
|
p->HasLength = true;
|
|
p->HasSequence = true;
|
|
p->Ver = (is_v3 ? 3 : 2);
|
|
p->MessageType = message_type;
|
|
|
|
p->AvpList = NewListFast(NULL);
|
|
|
|
if (message_type != 0)
|
|
{
|
|
L2TP_AVP *a;
|
|
USHORT us;
|
|
|
|
a = ZeroMalloc(sizeof(L2TP_AVP));
|
|
|
|
a->Type = L2TP_AVP_TYPE_MESSAGE_TYPE;
|
|
a->Mandatory = true;
|
|
|
|
us = Endian16(message_type);
|
|
a->Data = Clone(&us, sizeof(USHORT));
|
|
a->DataSize = sizeof(USHORT);
|
|
|
|
Add(p->AvpList, a);
|
|
}
|
|
|
|
return p;
|
|
}
|
|
|
|
// Create a new AVP value
|
|
L2TP_AVP *NewAVP(USHORT type, bool mandatory, USHORT vendor_id, void *data, UINT data_size)
|
|
{
|
|
L2TP_AVP *a;
|
|
// Validate arguments
|
|
if (data_size != 0 && data == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
a = ZeroMalloc(sizeof(L2TP_AVP));
|
|
|
|
a->Type = type;
|
|
a->Mandatory = mandatory;
|
|
a->VendorID = vendor_id;
|
|
a->Data = Clone(data, data_size);
|
|
a->DataSize = data_size;
|
|
|
|
return a;
|
|
}
|
|
|
|
// Process a received L2TP packet
|
|
void L2TPProcessRecvControlPacket(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, L2TP_PACKET *p)
|
|
{
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || p == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (p->SessionId == 0)
|
|
{
|
|
if (p->MessageType == L2TP_MESSAGE_TYPE_SCCCN && l2tp->Halt == false)
|
|
{
|
|
// Tunnel establishment completed
|
|
if (t->Established == false)
|
|
{
|
|
if (t->Disconnecting == false)
|
|
{
|
|
t->Established = true;
|
|
t->LastHelloSent = l2tp->Now;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (t->Established)
|
|
{
|
|
if (p->MessageType == L2TP_MESSAGE_TYPE_ICRQ && t->WantToDisconnect == false && l2tp->Halt == false)
|
|
{
|
|
// Request to establish a new session arrives
|
|
L2TP_AVP *a = GetAVPValue(p,
|
|
(t->IsV3 ? L2TP_AVP_TYPE_V3_SESSION_ID_LOCAL : L2TP_AVP_TYPE_ASSIGNED_SESSION));
|
|
if (a != NULL && a->DataSize == (t->IsV3 ? sizeof(UINT) : sizeof(USHORT)) && IsZero(a->Data, (t->IsV3 ? sizeof(UINT) : sizeof(USHORT))) == false)
|
|
{
|
|
UINT session_id = (t->IsV3 ? READ_UINT(a->Data) : READ_USHORT(a->Data));
|
|
|
|
// Check whether there is other same session ID
|
|
if (GetSessionFromIdAssignedByClient(t, session_id) == NULL)
|
|
{
|
|
// Create a session
|
|
L2TP_SESSION *s = NewL2TPSession(l2tp, t, session_id);
|
|
|
|
if (s != NULL)
|
|
{
|
|
L2TP_PACKET *pp;
|
|
USHORT us;
|
|
UINT ui;
|
|
|
|
// Get the PseudowireType
|
|
if (t->IsV3)
|
|
{
|
|
s->PseudowireType = L2TPV3_PW_TYPE_ETHERNET;
|
|
|
|
a = GetAVPValue(p, L2TP_AVP_TYPE_V3_PW_TYPE);
|
|
|
|
if (a != NULL && a->DataSize == sizeof(USHORT))
|
|
{
|
|
ui = READ_USHORT(a->Data);
|
|
|
|
s->PseudowireType = ui;
|
|
}
|
|
}
|
|
|
|
Add(t->SessionList, s);
|
|
Debug("L2TP New Session: ID = %u/%u on Tunnel %u/%u\n", s->SessionId1, s->SessionId2,
|
|
t->TunnelId1, t->TunnelId2);
|
|
|
|
// Respond the session creation completion notice
|
|
pp = NewL2TPControlPacket(L2TP_MESSAGE_TYPE_ICRP, s->IsV3);
|
|
|
|
// Assigned Session AVP
|
|
if (s->IsV3 == false)
|
|
{
|
|
us = Endian16(s->SessionId2);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_ASSIGNED_SESSION, true, 0, &us, sizeof(USHORT)));
|
|
}
|
|
else
|
|
{
|
|
ui = Endian32(s->SessionId2);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_V3_SESSION_ID_LOCAL, true, 0, &ui, sizeof(UINT)));
|
|
|
|
if (s->IsCiscoV3)
|
|
{
|
|
Add(pp->AvpList, NewAVP(L2TPV3_CISCO_AVP_SESSION_ID_LOCAL, true, L2TP_AVP_VENDOR_ID_CISCO, &ui, sizeof(UINT)));
|
|
}
|
|
}
|
|
|
|
if (s->IsV3)
|
|
{
|
|
if (t->IsYamahaV3 == false)
|
|
{
|
|
// Pseudowire AVP
|
|
us = Endian16(s->PseudowireType);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_V3_PW_TYPE, true, 0, &us, sizeof(USHORT)));
|
|
}
|
|
|
|
if (s->IsCiscoV3)
|
|
{
|
|
Add(pp->AvpList, NewAVP(L2TPV3_CISCO_AVP_PW_TYPE, true, L2TP_AVP_VENDOR_ID_CISCO, &us, sizeof(USHORT)));
|
|
}
|
|
|
|
if (t->IsYamahaV3)
|
|
{
|
|
us = Endian16(0x0003);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_V3_CIRCUIT_STATUS, true, 0, &us, sizeof(USHORT)));
|
|
}
|
|
}
|
|
|
|
SendL2TPControlPacket(l2tp, t, session_id, pp);
|
|
|
|
FreeL2TPPacket(pp);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else if (p->MessageType == L2TP_MESSAGE_TYPE_STOPCCN)
|
|
{
|
|
// Tunnel disconnect request arrives
|
|
L2TP_AVP *a = GetAVPValue(p, (t->IsV3 ? L2TP_AVP_TYPE_V3_TUNNEL_ID : L2TP_AVP_TYPE_ASSIGNED_TUNNEL));
|
|
if (a != NULL && a->DataSize == (t->IsV3 ? sizeof(UINT) : sizeof(USHORT)))
|
|
{
|
|
UINT ui = (t->IsV3 ? READ_UINT(a->Data) : READ_USHORT(a->Data));
|
|
|
|
if (ui == t->TunnelId1)
|
|
{
|
|
// Disconnect the tunnel
|
|
DisconnectL2TPTunnel(t);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Search a session
|
|
L2TP_SESSION *s = GetSessionFromId(t, p->SessionId);
|
|
|
|
if (s != NULL)
|
|
{
|
|
if (s->Established == false)
|
|
{
|
|
if (p->MessageType == L2TP_MESSAGE_TYPE_ICCN)
|
|
{
|
|
// Session establishment completed
|
|
if (s->Disconnecting == false)
|
|
{
|
|
s->Established = true;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (p->MessageType == L2TP_MESSAGE_TYPE_CDN)
|
|
{
|
|
// Received a session disconnection request
|
|
L2TP_AVP *a = GetAVPValue(p,
|
|
(t->IsV3 ? L2TP_AVP_TYPE_V3_SESSION_ID_LOCAL : L2TP_AVP_TYPE_ASSIGNED_SESSION));
|
|
if (a != NULL && a->DataSize == (t->IsV3 ? sizeof(UINT) : sizeof(USHORT)))
|
|
{
|
|
UINT ui = (t->IsV3 ? READ_UINT(a->Data) : READ_USHORT(a->Data));
|
|
|
|
if (ui == s->SessionId1)
|
|
{
|
|
// Disconnect the session
|
|
DisconnectL2TPSession(t, s);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
Debug("Session ID %u not found in Tunnel ID %u/%u\n", p->SessionId, t->TunnelId1, t->TunnelId2);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Disconnect the L2TP tunnel
|
|
void DisconnectL2TPTunnel(L2TP_TUNNEL *t)
|
|
{
|
|
// Validate arguments
|
|
if (t == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (/*t->Established && */t->Disconnecting == false && t->WantToDisconnect == false)
|
|
{
|
|
UINT i;
|
|
|
|
Debug("Trying to Disconnect Tunnel ID %u/%u\n", t->TunnelId1, t->TunnelId2);
|
|
t->WantToDisconnect = true;
|
|
|
|
// Disconnect all sessions within the tunnel
|
|
for (i = 0;i < LIST_NUM(t->SessionList);i++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(t->SessionList, i);
|
|
|
|
DisconnectL2TPSession(t, s);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Disconnect the L2TP session
|
|
void DisconnectL2TPSession(L2TP_TUNNEL *t, L2TP_SESSION *s)
|
|
{
|
|
// Validate arguments
|
|
if (t == NULL || s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (s->Established && s->Disconnecting == false && s->WantToDisconnect == false)
|
|
{
|
|
Debug("Trying to Disconnect Session ID %u/%u on Tunnel %u/%u\n", s->SessionId1, s->SessionId2,
|
|
t->TunnelId1, t->TunnelId2);
|
|
s->WantToDisconnect = true;
|
|
}
|
|
}
|
|
|
|
// Create a new session
|
|
L2TP_SESSION *NewL2TPSession(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, UINT session_id_by_client)
|
|
{
|
|
L2TP_SESSION *s;
|
|
UINT session_id_by_server;
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || session_id_by_client == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
if (LIST_NUM(t->SessionList) >= L2TP_QUOTA_MAX_NUM_SESSIONS_PER_TUNNEL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
if (t->IsV3 == false)
|
|
{
|
|
session_id_by_server = GenerateNewSessionIdEx(t, t->IsV3);
|
|
}
|
|
else
|
|
{
|
|
session_id_by_server = GenerateNewSessionIdForL2TPv3(l2tp);
|
|
}
|
|
if (session_id_by_server == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
s = ZeroMalloc(sizeof(L2TP_SESSION));
|
|
|
|
s->SessionId1 = session_id_by_client;
|
|
s->SessionId2 = session_id_by_server;
|
|
|
|
s->IsV3 = t->IsV3;
|
|
s->IsCiscoV3 = t->IsCiscoV3;
|
|
|
|
s->Tunnel = t;
|
|
|
|
return s;
|
|
}
|
|
|
|
// Retrieve a session from L2TP session ID
|
|
L2TP_SESSION *SearchL2TPSessionById(L2TP_SERVER *l2tp, bool is_v3, UINT id)
|
|
{
|
|
UINT i, j;
|
|
// Validate arguments
|
|
if (l2tp == NULL || id == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
for (j = 0;j < LIST_NUM(t->SessionList);j++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(t->SessionList, j);
|
|
|
|
if (s->SessionId2 == id)
|
|
{
|
|
if (EQUAL_BOOL(s->IsV3, is_v3))
|
|
{
|
|
return s;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Create a new session ID
|
|
UINT GenerateNewSessionId(L2TP_TUNNEL *t)
|
|
{
|
|
return GenerateNewSessionIdEx(t, false);
|
|
}
|
|
UINT GenerateNewSessionIdEx(L2TP_TUNNEL *t, bool is_32bit)
|
|
{
|
|
UINT i;
|
|
UINT max_number = 0xffff;
|
|
// Validate arguments
|
|
if (t == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
if (is_32bit)
|
|
{
|
|
max_number = 0xfffffffe;
|
|
}
|
|
|
|
for (i = 1;i <= max_number;i++)
|
|
{
|
|
if (GetSessionFromId(t, i) == NULL)
|
|
{
|
|
return i;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
UINT GenerateNewSessionIdForL2TPv3(L2TP_SERVER *l2tp)
|
|
{
|
|
// Validate arguments
|
|
if (l2tp == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
while (true)
|
|
{
|
|
UINT id = Rand32();
|
|
|
|
if (id == 0 || id == 0xffffffff)
|
|
{
|
|
continue;
|
|
}
|
|
|
|
if (SearchL2TPSessionById(l2tp, true, id) == false)
|
|
{
|
|
return id;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Release the session
|
|
void FreeL2TPSession(L2TP_SESSION *s)
|
|
{
|
|
// Validate arguments
|
|
if (s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Free(s);
|
|
}
|
|
|
|
// Search a session from the session ID
|
|
L2TP_SESSION *GetSessionFromId(L2TP_TUNNEL *t, UINT session_id)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (t == NULL || session_id == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(t->SessionList);i++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(t->SessionList, i);
|
|
|
|
if (s->SessionId2 == session_id)
|
|
{
|
|
return s;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Search a session from the session ID (Search by ID assigned from the client side)
|
|
L2TP_SESSION *GetSessionFromIdAssignedByClient(L2TP_TUNNEL *t, UINT session_id)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (t == NULL || session_id == 0)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
for (i = 0;i < LIST_NUM(t->SessionList);i++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(t->SessionList, i);
|
|
|
|
if (s->SessionId1 == session_id)
|
|
{
|
|
return s;
|
|
}
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// Get the number of L2TP sessions connected from the client IP address
|
|
UINT GetNumL2TPTunnelsByClientIP(L2TP_SERVER *l2tp, IP *client_ip)
|
|
{
|
|
UINT i, ret;
|
|
// Validate arguments
|
|
if (l2tp == NULL || client_ip == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
ret = 0;
|
|
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
if (CmpIpAddr(&t->ClientIp, client_ip) == 0)
|
|
{
|
|
ret++;
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Performs processing L2TP received packets.
|
|
void ProcL2TPPacketRecv(L2TP_SERVER *l2tp, UDPPACKET *p)
|
|
{
|
|
L2TP_PACKET *pp;
|
|
bool no_free = false;
|
|
// Validate arguments
|
|
if (l2tp == NULL || p == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Parse a packet.
|
|
pp = ParseL2TPPacket(p);
|
|
if (pp == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (pp->MessageType == L2TP_MESSAGE_TYPE_SCCRQ && pp->SessionId == 0 && pp->TunnelId == 0 &&
|
|
pp->Nr == 0 && pp->Ns == 0 && l2tp->Halt == false)
|
|
{
|
|
{
|
|
L2TP_AVP *a = GetAVPValue(pp, (pp->Ver == 3 ? L2TP_AVP_TYPE_V3_TUNNEL_ID : L2TP_AVP_TYPE_ASSIGNED_TUNNEL));
|
|
if (a != NULL && a->DataSize == (pp->Ver == 3 ? sizeof(UINT) : sizeof(USHORT)))
|
|
{
|
|
UINT client_assigned_id = (pp->Ver == 3 ? READ_UINT(a->Data) : READ_USHORT(a->Data));
|
|
if (GetTunnelFromIdOfAssignedByClient(l2tp, &p->SrcIP, client_assigned_id) == NULL)
|
|
{
|
|
if (LIST_NUM(l2tp->TunnelList) < L2TP_QUOTA_MAX_NUM_TUNNELS && GetNumL2TPTunnelsByClientIP(l2tp, &p->SrcIP) < L2TP_QUOTA_MAX_NUM_TUNNELS_PER_IP)
|
|
{
|
|
char ipstr[MAX_SIZE];
|
|
L2TP_PACKET *pp2;
|
|
UCHAR protocol_version[2];
|
|
UCHAR caps_data[4];
|
|
USHORT us;
|
|
char hostname[MAX_SIZE];
|
|
|
|
// Begin Tunneling
|
|
L2TP_TUNNEL *t = NewL2TPTunnel(l2tp, pp, p);
|
|
|
|
if (t != NULL)
|
|
{
|
|
IPToStr(ipstr, sizeof(ipstr), &t->ClientIp);
|
|
Debug("L2TP New Tunnel From %s (%s, %s): New Tunnel ID = %u/%u\n", ipstr, t->HostName, t->VendorName,
|
|
t->TunnelId1, t->TunnelId2);
|
|
|
|
// Add the tunnel to the list
|
|
Add(l2tp->TunnelList, t);
|
|
|
|
// Respond with SCCEP to SCCRQ
|
|
pp2 = NewL2TPControlPacket(L2TP_MESSAGE_TYPE_SCCRP, t->IsV3);
|
|
|
|
if (t->IsYamahaV3 == false)
|
|
{
|
|
// Protocol Version
|
|
protocol_version[0] = 1;
|
|
protocol_version[1] = 0;
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_PROTOCOL_VERSION, true, 0, protocol_version, sizeof(protocol_version)));
|
|
|
|
// Framing Capabilities
|
|
Zero(caps_data, sizeof(caps_data));
|
|
if (t->IsV3 == false)
|
|
{
|
|
caps_data[3] = 3;
|
|
}
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_FRAME_CAP, false, 0, caps_data, sizeof(caps_data)));
|
|
}
|
|
|
|
if (t->IsV3 == false)
|
|
{
|
|
// Bearer Capabilities
|
|
Zero(caps_data, sizeof(caps_data));
|
|
caps_data[3] = 3;
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_BEARER_CAP, false, 0, caps_data, sizeof(caps_data)));
|
|
}
|
|
|
|
// Host Name
|
|
GetMachineHostName(hostname, sizeof(hostname));
|
|
if (IsEmptyStr(hostname))
|
|
{
|
|
StrCpy(hostname, sizeof(hostname), "vpn");
|
|
}
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_HOST_NAME, true, 0, hostname, StrLen(hostname)));
|
|
|
|
// Vendor Name
|
|
if (t->IsYamahaV3 == false)
|
|
{
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_VENDOR_NAME, false, 0, L2TP_VENDOR_NAME, StrLen(L2TP_VENDOR_NAME)));
|
|
}
|
|
else
|
|
{
|
|
char *yamaha_str = "YAMAHA Corporation";
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_VENDOR_NAME, false, 0, yamaha_str, StrLen(yamaha_str)));
|
|
}
|
|
|
|
if (t->IsYamahaV3)
|
|
{
|
|
UINT zero = 0;
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_V3_ROUTER_ID, true, 0, &zero, sizeof(UINT)));
|
|
}
|
|
|
|
// Assigned Tunnel ID
|
|
if (t->IsV3 == false)
|
|
{
|
|
us = Endian16(t->TunnelId2);
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_ASSIGNED_TUNNEL, true, 0, &us, sizeof(USHORT)));
|
|
}
|
|
else
|
|
{
|
|
UINT ui = Endian32(t->TunnelId2);
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_V3_TUNNEL_ID, true, 0, &ui, sizeof(UINT)));
|
|
|
|
if (t->IsCiscoV3)
|
|
{
|
|
Add(pp2->AvpList, NewAVP(L2TPV3_CISCO_AVP_TUNNEL_ID, true, L2TP_AVP_VENDOR_ID_CISCO, &ui, sizeof(UINT)));
|
|
}
|
|
}
|
|
|
|
// Pseudowire Capabilities List
|
|
if (t->IsV3)
|
|
{
|
|
// Only Ethernet
|
|
USHORT cap_list[2];
|
|
cap_list[0] = Endian16(L2TPV3_PW_TYPE_ETHERNET);
|
|
cap_list[1] = Endian16(L2TPV3_PW_TYPE_ETHERNET_VLAN);
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_V3_PW_CAP_LIST, true, 0, cap_list, sizeof(cap_list)));
|
|
|
|
if (t->IsCiscoV3)
|
|
{
|
|
Add(pp2->AvpList, NewAVP(L2TPV3_CISCO_AVP_PW_CAP_LIST, true, L2TP_AVP_VENDOR_ID_CISCO, cap_list, sizeof(cap_list)));
|
|
}
|
|
}
|
|
|
|
// Cisco AVP
|
|
if (t->IsCiscoV3)
|
|
{
|
|
USHORT us = Endian16(1);
|
|
Add(pp2->AvpList, NewAVP(L2TPV3_CISCO_AVP_DRAFT_AVP_VERSION, true, L2TP_AVP_VENDOR_ID_CISCO, &us, sizeof(USHORT)));
|
|
}
|
|
|
|
// Recv Window Size
|
|
if (t->IsYamahaV3 == false)
|
|
{
|
|
us = Endian16(L2TP_WINDOW_SIZE);
|
|
Add(pp2->AvpList, NewAVP(L2TP_AVP_TYPE_RECV_WINDOW_SIZE, false, 0, &us, sizeof(USHORT)));
|
|
}
|
|
|
|
SendL2TPControlPacket(l2tp, t, 0, pp2);
|
|
|
|
FreeL2TPPacket(pp2);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Process related to the existing tunnel
|
|
// Find the tunnel
|
|
L2TP_TUNNEL *t = NULL;
|
|
L2TP_SESSION *l2tpv3_session = NULL;
|
|
|
|
if (pp->IsControl || pp->Ver != 3)
|
|
{
|
|
t = GetTunnelFromId(l2tp, &p->SrcIP, pp->TunnelId, pp->Ver == 3);
|
|
}
|
|
else
|
|
{
|
|
l2tpv3_session = SearchL2TPSessionById(l2tp, true, pp->SessionId);
|
|
if (l2tpv3_session != NULL)
|
|
{
|
|
t = l2tpv3_session->Tunnel;
|
|
|
|
pp->TunnelId = t->TunnelId2;
|
|
}
|
|
}
|
|
|
|
if (t == NULL)
|
|
{
|
|
char ipstr[MAX_SIZE];
|
|
|
|
IPToStr(ipstr, sizeof(ipstr), &p->SrcIP);
|
|
Debug("L2TP Tunnel From %s ID=%u Not Found on the Table.\n", ipstr, pp->TunnelId);
|
|
}
|
|
else
|
|
{
|
|
// Update last reception time
|
|
t->LastRecvTick = l2tp->Now;
|
|
|
|
if (pp->IsControl)
|
|
{
|
|
// Control packet
|
|
UINT i;
|
|
LIST *o = NULL;
|
|
L2TP_QUEUE *q;
|
|
L2TP_QUEUE tt;
|
|
|
|
// Delete the queue that the other party has already received from the retransmission queue
|
|
for (i = 0;i < LIST_NUM(t->SendQueue);i++)
|
|
{
|
|
L2TP_QUEUE *q = LIST_DATA(t->SendQueue, i);
|
|
if (L2TP_SEQ_LT(q->Ns, pp->Nr))
|
|
{
|
|
if (o == NULL)
|
|
{
|
|
o = NewListFast(NULL);
|
|
}
|
|
|
|
Add(o, q);
|
|
}
|
|
}
|
|
|
|
if (o != NULL)
|
|
{
|
|
for (i = 0;i < LIST_NUM(o);i++)
|
|
{
|
|
L2TP_QUEUE *q = LIST_DATA(o, i);
|
|
|
|
Delete(t->SendQueue, q);
|
|
|
|
FreeL2TPQueue(q);
|
|
}
|
|
|
|
ReleaseList(o);
|
|
}
|
|
|
|
if ((!L2TP_SEQ_LT(pp->Ns, t->LastNr)) && (pp->Ns != t->LastNr))
|
|
{
|
|
// Add the packet received from the opposite to the queue
|
|
if (LIST_NUM(t->RecvQueue) < L2TP_WINDOW_SIZE)
|
|
{
|
|
Zero(&tt, sizeof(tt));
|
|
tt.Ns = pp->Ns;
|
|
|
|
if (Search(t->RecvQueue, &tt) == NULL)
|
|
{
|
|
q = ZeroMalloc(sizeof(L2TP_QUEUE));
|
|
q->Ns = pp->Ns;
|
|
q->L2TPPacket = pp;
|
|
no_free = true;
|
|
Insert(t->RecvQueue, q);
|
|
|
|
// Read to the end of completed part from the head of the queue
|
|
while (TRUE)
|
|
{
|
|
L2TP_QUEUE *q;
|
|
if (LIST_NUM(t->RecvQueue) == 0)
|
|
{
|
|
break;
|
|
}
|
|
|
|
q = LIST_DATA(t->RecvQueue, 0);
|
|
if (!L2TP_SEQ_EQ(q->Ns, t->LastNr + 1))
|
|
{
|
|
break;
|
|
}
|
|
|
|
if (q->L2TPPacket->IsZLB == false)
|
|
{
|
|
t->LastNr = q->Ns;
|
|
|
|
// The packet other than ZLB is treated
|
|
t->StateChanged = true;
|
|
}
|
|
|
|
Delete(t->RecvQueue, q);
|
|
|
|
// Process the received packet
|
|
L2TPProcessRecvControlPacket(l2tp, t, q->L2TPPacket);
|
|
|
|
FreeL2TPQueue(q);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Reply ACK for already-received packets
|
|
if (pp->IsZLB == false)
|
|
{
|
|
// The packet other than ZLB is treated
|
|
t->StateChanged = true;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// Data packet
|
|
L2TP_SESSION *s = GetSessionFromId(t, pp->SessionId);
|
|
|
|
if (s != NULL && s->Established)
|
|
{
|
|
if (s->IsV3 == false)
|
|
{
|
|
// Start the L2TP thread (If not already started)
|
|
StartL2TPThread(l2tp, t, s);
|
|
|
|
// Pass the data
|
|
TubeSendEx(s->TubeRecv, pp->Data, pp->DataSize, NULL, true);
|
|
AddTubeToFlushList(l2tp->FlushList, s->TubeRecv);
|
|
}
|
|
else
|
|
{
|
|
BLOCK *b;
|
|
|
|
// Start the EtherIP session (If it's not have yet started)
|
|
L2TPSessionManageEtherIPServer(l2tp, s);
|
|
|
|
// Pass the data
|
|
b = NewBlock(pp->Data, pp->DataSize, 0);
|
|
|
|
EtherIPProcRecvPackets(s->EtherIP, b);
|
|
|
|
Free(b);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
if (no_free == false)
|
|
{
|
|
FreeL2TPPacket(pp);
|
|
}
|
|
}
|
|
|
|
// Manage the EtherIP server that is associated with the L2TP session
|
|
void L2TPSessionManageEtherIPServer(L2TP_SERVER *l2tp, L2TP_SESSION *s)
|
|
{
|
|
IKE_SERVER *ike;
|
|
IKE_CLIENT *c;
|
|
// Validate arguments
|
|
if (l2tp == NULL || s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (l2tp->IkeClient == NULL || l2tp->IkeServer == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
ike = l2tp->IkeServer;
|
|
c = l2tp->IkeClient;
|
|
|
|
if (s->EtherIP == NULL)
|
|
{
|
|
char crypt_name[MAX_SIZE];
|
|
UINT crypt_block_size = IKE_MAX_BLOCK_SIZE;
|
|
|
|
Zero(crypt_name, sizeof(crypt_name));
|
|
|
|
if (c->CurrentIpSecSaRecv != NULL)
|
|
{
|
|
Format(crypt_name, sizeof(crypt_name),
|
|
"IPsec - %s (%u bits)",
|
|
c->CurrentIpSecSaRecv->TransformSetting.Crypto->Name,
|
|
c->CurrentIpSecSaRecv->TransformSetting.CryptoKeySize * 8);
|
|
|
|
crypt_block_size = c->CurrentIpSecSaRecv->TransformSetting.Crypto->BlockSize;
|
|
}
|
|
|
|
s->EtherIP = NewEtherIPServer(ike->Cedar, ike->IPsec, ike,
|
|
&c->ClientIP, c->ClientPort,
|
|
&c->ServerIP, c->ServerPort, crypt_name,
|
|
c->IsL2TPOnIPsecTunnelMode, crypt_block_size, c->ClientId,
|
|
++ike->CurrentEtherId);
|
|
|
|
StrCpy(s->EtherIP->VendorName, sizeof(s->EtherIP->VendorName), s->Tunnel->VendorName);
|
|
|
|
s->EtherIP->L2TPv3 = true;
|
|
|
|
Debug("IKE_CLIENT 0x%X: EtherIP Server Started.\n", c);
|
|
|
|
IPsecLog(ike, c, NULL, NULL, NULL, "LI_ETHERIP_SERVER_STARTED", ike->CurrentEtherId);
|
|
}
|
|
else
|
|
{
|
|
StrCpy(s->EtherIP->ClientId, sizeof(s->EtherIP->ClientId), c->ClientId);
|
|
}
|
|
|
|
if (s->EtherIP->Interrupts == NULL)
|
|
{
|
|
s->EtherIP->Interrupts = l2tp->Interrupts;
|
|
}
|
|
|
|
if (s->EtherIP->SockEvent == NULL)
|
|
{
|
|
SetEtherIPServerSockEvent(s->EtherIP, l2tp->SockEvent);
|
|
}
|
|
|
|
s->EtherIP->Now = l2tp->Now;
|
|
}
|
|
|
|
// Calculate the appropriate MSS of the L2TP
|
|
UINT CalcL2TPMss(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, L2TP_SESSION *s)
|
|
{
|
|
UINT ret;
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || s == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
ret = MTU_FOR_PPPOE;
|
|
|
|
if (l2tp->IkeServer != NULL)
|
|
{
|
|
// On IPsec
|
|
if (l2tp->IsIPsecIPv6)
|
|
{
|
|
ret -= 40;
|
|
}
|
|
else
|
|
{
|
|
ret -= 20;
|
|
}
|
|
|
|
// UDP
|
|
ret -= 8;
|
|
|
|
// ESP
|
|
ret -= 20 + l2tp->CryptBlockSize * 2;
|
|
}
|
|
else
|
|
{
|
|
// Raw L2TP
|
|
if (IsIP6(&t->ClientIp))
|
|
{
|
|
ret -= 40;
|
|
}
|
|
else
|
|
{
|
|
ret -= 20;
|
|
}
|
|
}
|
|
|
|
// L2TP UDP
|
|
ret -= 8;
|
|
|
|
// L2TP
|
|
ret -= 8;
|
|
|
|
// PPP
|
|
ret -= 4;
|
|
|
|
// Target communication
|
|
ret -= 20;
|
|
|
|
// TCP header
|
|
ret -= 20;
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Start the L2TP thread
|
|
void StartL2TPThread(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, L2TP_SESSION *s)
|
|
{
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (s->HasThread == false)
|
|
{
|
|
char tmp[MAX_SIZE];
|
|
|
|
Debug("Thread Created for Session %u/%u on Tunnel %u/%u\n",
|
|
s->SessionId1, s->SessionId2, t->TunnelId1, t->TunnelId2);
|
|
|
|
s->HasThread = true;
|
|
|
|
NewTubePair(&s->TubeSend, &s->TubeRecv, 0);
|
|
SetTubeSockEvent(s->TubeSend, l2tp->SockEvent);
|
|
|
|
if (IsEmptyStr(t->VendorName) == false)
|
|
{
|
|
Format(tmp, sizeof(tmp), L2TP_IPC_CLIENT_NAME_TAG, t->VendorName);
|
|
}
|
|
else
|
|
{
|
|
StrCpy(tmp, sizeof(tmp), L2TP_IPC_CLIENT_NAME_NO_TAG);
|
|
}
|
|
|
|
// Create a PPP thread
|
|
s->Thread = NewPPPSession(l2tp->Cedar, &t->ClientIp, t->ClientPort, &t->ServerIp, t->ServerPort,
|
|
s->TubeSend, s->TubeRecv, L2TP_IPC_POSTFIX, tmp, t->HostName, l2tp->CryptName,
|
|
CalcL2TPMss(l2tp, t, s));
|
|
}
|
|
}
|
|
|
|
// Stop the L2TP thread
|
|
void StopL2TPThread(L2TP_SERVER *l2tp, L2TP_TUNNEL *t, L2TP_SESSION *s)
|
|
{
|
|
THREAD *thread;
|
|
// Validate arguments
|
|
if (l2tp == NULL || t == NULL || s == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (s->IsV3)
|
|
{
|
|
// Process the L2TPv3
|
|
if (s->EtherIP != NULL)
|
|
{
|
|
// Release the EtherIP server
|
|
ReleaseEtherIPServer(s->EtherIP);
|
|
s->EtherIP = NULL;
|
|
}
|
|
return;
|
|
}
|
|
|
|
if (s->HasThread == false)
|
|
{
|
|
return;
|
|
}
|
|
thread = s->Thread;
|
|
s->Thread = NULL;
|
|
s->HasThread = false;
|
|
|
|
// Disconnect the tube
|
|
TubeDisconnect(s->TubeRecv);
|
|
TubeDisconnect(s->TubeSend);
|
|
|
|
// Release the tube
|
|
ReleaseTube(s->TubeRecv);
|
|
ReleaseTube(s->TubeSend);
|
|
|
|
s->TubeRecv = NULL;
|
|
s->TubeSend = NULL;
|
|
|
|
// Pass the thread to termination list
|
|
if (l2tp->IkeServer == NULL)
|
|
{
|
|
AddThreadToThreadList(l2tp->ThreadList, thread);
|
|
}
|
|
else
|
|
{
|
|
AddThreadToThreadList(l2tp->IkeServer->ThreadList, thread);
|
|
}
|
|
|
|
Debug("Thread Stopped for Session %u/%u on Tunnel %u/%u\n",
|
|
s->SessionId1, s->SessionId2, t->TunnelId1, t->TunnelId2);
|
|
|
|
// Release the thread
|
|
ReleaseThread(thread);
|
|
}
|
|
|
|
// Interrupt processing of L2TP server
|
|
void L2TPProcessInterrupts(L2TP_SERVER *l2tp)
|
|
{
|
|
UINT i, j;
|
|
LIST *delete_tunnel_list = NULL;
|
|
// Validate arguments
|
|
if (l2tp == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (l2tp->Halt)
|
|
{
|
|
if (l2tp->Halting == false)
|
|
{
|
|
l2tp->Halting = true;
|
|
|
|
// Disconnect all tunnels
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
DisconnectL2TPTunnel(t);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Flush
|
|
FlushTubeFlushList(l2tp->FlushList);
|
|
|
|
// Enumerate all tunnels
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
LIST *delete_session_list = NULL;
|
|
|
|
if ((l2tp->Now >= (t->LastRecvTick + (UINT64)L2TP_TUNNEL_TIMEOUT)) && t->Timedout == false)
|
|
{
|
|
// Disconnect the tunnel forcibly if data can not be received for a certain period of time
|
|
t->Timedout = true;
|
|
|
|
Debug("L2TP Tunnel %u/%u Timed out.\n", t->TunnelId1, t->TunnelId2);
|
|
DisconnectL2TPTunnel(t);
|
|
}
|
|
|
|
if (t->Established && (l2tp->Now >= (t->LastHelloSent + (UINT64)L2TP_HELLO_INTERVAL)))
|
|
{
|
|
if (LIST_NUM(t->SendQueue) <= L2TP_HELLO_SUPRESS_MAX_THRETHORD_NUM_SEND_QUEUE)
|
|
{
|
|
L2TP_PACKET *pp = NewL2TPControlPacket(L2TP_MESSAGE_TYPE_HELLO, t->IsV3);
|
|
|
|
// Send a Hello message
|
|
t->LastHelloSent = l2tp->Now;
|
|
//Debug("L2TP Sending Hello %u/%u: tick=%I64u\n", t->TunnelId1, t->TunnelId2, l2tp->Now);
|
|
|
|
SendL2TPControlPacket(l2tp, t, 0, pp);
|
|
|
|
FreeL2TPPacket(pp);
|
|
|
|
L2TPAddInterrupt(l2tp, t->LastHelloSent + (UINT64)L2TP_HELLO_INTERVAL);
|
|
}
|
|
}
|
|
|
|
// Enumerate all sessions
|
|
for (j = 0;j < LIST_NUM(t->SessionList);j++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(t->SessionList, j);
|
|
|
|
if (s->HasThread)
|
|
{
|
|
// Send packet data
|
|
while (true)
|
|
{
|
|
TUBEDATA *d = TubeRecvAsync(s->TubeSend);
|
|
|
|
if (d == NULL)
|
|
{
|
|
break;
|
|
}
|
|
|
|
SendL2TPDataPacket(l2tp, t, s, d->Data, d->DataSize);
|
|
|
|
FreeTubeData(d);
|
|
}
|
|
|
|
if (IsTubeConnected(s->TubeSend) == false)
|
|
{
|
|
// Disconnect the this session because the PPP thread ends
|
|
DisconnectL2TPSession(t, s);
|
|
}
|
|
}
|
|
|
|
if (s->IsV3)
|
|
{
|
|
if (s->EtherIP != NULL)
|
|
{
|
|
UINT k;
|
|
|
|
L2TPSessionManageEtherIPServer(l2tp, s);
|
|
|
|
// Notify an interrupt to the EtherIP module
|
|
EtherIPProcInterrupts(s->EtherIP);
|
|
|
|
// Send an EtherIP packet data
|
|
for (k = 0;k < LIST_NUM(s->EtherIP->SendPacketList);k++)
|
|
{
|
|
BLOCK *b = LIST_DATA(s->EtherIP->SendPacketList, k);
|
|
|
|
SendL2TPDataPacket(l2tp, t, s, b->Buf, b->Size);
|
|
|
|
FreeBlock(b);
|
|
}
|
|
|
|
DeleteAll(s->EtherIP->SendPacketList);
|
|
}
|
|
}
|
|
|
|
if (s->WantToDisconnect && s->Disconnecting == false)
|
|
{
|
|
// Disconnect the session
|
|
UCHAR error_data[4];
|
|
USHORT us;
|
|
UINT ui;
|
|
UINT ppp_error_1 = 0, ppp_error_2 = 0;
|
|
|
|
// Send the session disconnection response
|
|
L2TP_PACKET *pp = NewL2TPControlPacket(L2TP_MESSAGE_TYPE_CDN, s->IsV3);
|
|
|
|
if (s->TubeRecv != NULL)
|
|
{
|
|
ppp_error_1 = s->TubeRecv->IntParam1;
|
|
ppp_error_2 = s->TubeRecv->IntParam2;
|
|
}
|
|
|
|
// Assigned Session ID
|
|
if (s->IsV3 == false)
|
|
{
|
|
us = Endian16(s->SessionId2);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_ASSIGNED_SESSION, true, 0,
|
|
&us, sizeof(USHORT)));
|
|
}
|
|
else
|
|
{
|
|
ui = Endian16(s->SessionId2);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_V3_SESSION_ID_LOCAL, true, 0,
|
|
&ui, sizeof(UINT)));
|
|
|
|
if (t->IsCiscoV3)
|
|
{
|
|
Add(pp->AvpList, NewAVP(L2TPV3_CISCO_AVP_SESSION_ID_LOCAL, true, L2TP_AVP_VENDOR_ID_CISCO,
|
|
&ui, sizeof(UINT)));
|
|
}
|
|
}
|
|
|
|
// Result-Error Code
|
|
Zero(error_data, sizeof(error_data));
|
|
error_data[1] = 0x03;
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_RESULT_CODE, true, 0,
|
|
error_data, sizeof(error_data)));
|
|
|
|
if (ppp_error_1 != 0)
|
|
{
|
|
// PPP Disconnect Cause Code AVP
|
|
BUF *b = NewBuf();
|
|
UCHAR uc;
|
|
USHORT us;
|
|
|
|
// Disconnect Code
|
|
us = Endian16(ppp_error_1);
|
|
WriteBuf(b, &us, sizeof(USHORT));
|
|
|
|
// Control Protocol Number
|
|
us = Endian16(0xc021);
|
|
WriteBuf(b, &us, sizeof(USHORT));
|
|
|
|
// Direction
|
|
uc = (UCHAR)ppp_error_2;
|
|
WriteBuf(b, &uc, sizeof(UCHAR));
|
|
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_PPP_DISCONNECT_CAUSE, false, 0,
|
|
b->Buf, b->Size));
|
|
|
|
FreeBuf(b);
|
|
}
|
|
|
|
SendL2TPControlPacket(l2tp, t, s->SessionId1, pp);
|
|
|
|
FreeL2TPPacket(pp);
|
|
|
|
// Disconnect the session
|
|
Debug("L2TP Session %u/%u on Tunnel %u/%u Disconnected.\n", s->SessionId1, s->SessionId2,
|
|
t->TunnelId1, t->TunnelId2);
|
|
s->Disconnecting = true;
|
|
s->Established = false;
|
|
s->DisconnectTimeout = l2tp->Now + (UINT64)L2TP_TUNNEL_DISCONNECT_TIMEOUT;
|
|
|
|
// Stop the thread
|
|
StopL2TPThread(l2tp, t, s);
|
|
|
|
L2TPAddInterrupt(l2tp, s->DisconnectTimeout);
|
|
}
|
|
|
|
if (s->Disconnecting && ((l2tp->Now >= s->DisconnectTimeout) || LIST_NUM(t->SendQueue) == 0))
|
|
{
|
|
// Delete the session if synchronization between the client
|
|
// and the server is complete or a time-out occurs
|
|
if (delete_session_list == NULL)
|
|
{
|
|
delete_session_list = NewListFast(NULL);
|
|
}
|
|
|
|
Add(delete_session_list, s);
|
|
}
|
|
}
|
|
|
|
if (delete_session_list != NULL)
|
|
{
|
|
// Session deletion process
|
|
for (j = 0;j < LIST_NUM(delete_session_list);j++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(delete_session_list, j);
|
|
|
|
Debug("L2TP Session %u/%u on Tunnel %u/%u Cleaned up.\n", s->SessionId1, s->SessionId2,
|
|
t->TunnelId1, t->TunnelId2);
|
|
|
|
FreeL2TPSession(s);
|
|
Delete(t->SessionList, s);
|
|
}
|
|
|
|
ReleaseList(delete_session_list);
|
|
}
|
|
|
|
if (t->WantToDisconnect && t->Disconnecting == false)
|
|
{
|
|
// Disconnect the tunnel
|
|
USHORT error_data[4];
|
|
USHORT us;
|
|
UINT ui;
|
|
// Reply the tunnel disconnection response
|
|
L2TP_PACKET *pp = NewL2TPControlPacket(L2TP_MESSAGE_TYPE_STOPCCN, t->IsV3);
|
|
|
|
// Assigned Tunnel ID
|
|
if (t->IsV3 == false)
|
|
{
|
|
us = Endian16(t->TunnelId2);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_ASSIGNED_TUNNEL, true, 0,
|
|
&us, sizeof(USHORT)));
|
|
}
|
|
else
|
|
{
|
|
ui = Endian32(t->TunnelId2);
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_V3_TUNNEL_ID, true, 0,
|
|
&ui, sizeof(UINT)));
|
|
|
|
if (t->IsCiscoV3)
|
|
{
|
|
Add(pp->AvpList, NewAVP(L2TPV3_CISCO_AVP_TUNNEL_ID, true, L2TP_AVP_VENDOR_ID_CISCO,
|
|
&ui, sizeof(UINT)));
|
|
}
|
|
}
|
|
|
|
// Result-Error Code
|
|
Zero(error_data, sizeof(error_data));
|
|
error_data[1] = 0x06;
|
|
Add(pp->AvpList, NewAVP(L2TP_AVP_TYPE_RESULT_CODE, true, 0,
|
|
error_data, sizeof(error_data)));
|
|
|
|
SendL2TPControlPacket(l2tp, t, 0, pp);
|
|
|
|
FreeL2TPPacket(pp);
|
|
|
|
Debug("L2TP Tunnel %u/%u is Disconnected.\n", t->TunnelId1, t->TunnelId2);
|
|
t->Disconnecting = true;
|
|
t->Established = false;
|
|
t->DisconnectTimeout = l2tp->Now + (UINT64)L2TP_TUNNEL_DISCONNECT_TIMEOUT;
|
|
L2TPAddInterrupt(l2tp, t->DisconnectTimeout);
|
|
}
|
|
|
|
if (t->Disconnecting && (((LIST_NUM(t->SendQueue) == 0) && LIST_NUM(t->SessionList) == 0) || (l2tp->Now >= t->DisconnectTimeout)))
|
|
{
|
|
// Delete the tunnel if there is no session in the tunnel when synchronization
|
|
// between the client and the server has been completed or a time-out occurs
|
|
if (delete_tunnel_list == NULL)
|
|
{
|
|
delete_tunnel_list = NewListFast(NULL);
|
|
}
|
|
|
|
Add(delete_tunnel_list, t);
|
|
}
|
|
}
|
|
|
|
if (delete_tunnel_list != NULL)
|
|
{
|
|
for (i = 0;i < LIST_NUM(delete_tunnel_list);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(delete_tunnel_list, i);
|
|
|
|
Debug("L2TP Tunnel %u/%u Cleaned up.\n", t->TunnelId1, t->TunnelId2);
|
|
|
|
FreeL2TPTunnel(t);
|
|
Delete(l2tp->TunnelList, t);
|
|
}
|
|
|
|
ReleaseList(delete_tunnel_list);
|
|
}
|
|
|
|
// Re-transmit packets
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
UINT j;
|
|
|
|
if (LIST_NUM(t->SendQueue) >= 1)
|
|
{
|
|
// Packet to be transmitted exists one or more
|
|
for (j = 0;j < LIST_NUM(t->SendQueue);j++)
|
|
{
|
|
L2TP_QUEUE *q = LIST_DATA(t->SendQueue, j);
|
|
|
|
if (l2tp->Now >= q->NextSendTick)
|
|
{
|
|
q->NextSendTick = l2tp->Now + (UINT64)L2TP_PACKET_RESEND_INTERVAL;
|
|
|
|
L2TPAddInterrupt(l2tp, q->NextSendTick);
|
|
|
|
SendL2TPControlPacketMain(l2tp, t, q);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
// There is no packet to be transmitted, but the state of the tunnel is changed
|
|
if (t->StateChanged)
|
|
{
|
|
// Send a ZLB
|
|
L2TP_QUEUE *q = ZeroMalloc(sizeof(L2TP_QUEUE));
|
|
L2TP_PACKET *pp = NewL2TPControlPacket(0, t->IsV3);
|
|
|
|
pp->TunnelId = t->TunnelId1;
|
|
pp->Ns = t->NextNs;
|
|
q->Buf = BuildL2TPPacketData(pp, t);
|
|
|
|
SendL2TPControlPacketMain(l2tp, t, q);
|
|
|
|
FreeL2TPQueue(q);
|
|
FreeL2TPPacket(pp);
|
|
}
|
|
}
|
|
|
|
t->StateChanged = false;
|
|
}
|
|
|
|
if (l2tp->Halting)
|
|
{
|
|
if (LIST_NUM(l2tp->TunnelList) == 0)
|
|
{
|
|
// Stop all the L2TP tunnel completed
|
|
if (l2tp->HaltCompleted == false)
|
|
{
|
|
l2tp->HaltCompleted = true;
|
|
|
|
Set(l2tp->HaltCompletedEvent);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Maintenance the thread list
|
|
if (l2tp->IkeServer == NULL)
|
|
{
|
|
MainteThreadList(l2tp->ThreadList);
|
|
//Debug("l2tp->ThreadList: %u\n", LIST_NUM(l2tp->ThreadList));
|
|
}
|
|
}
|
|
|
|
// Create a new L2TP server
|
|
L2TP_SERVER *NewL2TPServer(CEDAR *cedar)
|
|
{
|
|
return NewL2TPServerEx(cedar, NULL, false, 0);
|
|
}
|
|
L2TP_SERVER *NewL2TPServerEx(CEDAR *cedar, IKE_SERVER *ike, bool is_ipv6, UINT crypt_block_size)
|
|
{
|
|
L2TP_SERVER *l2tp;
|
|
// Validate arguments
|
|
if (cedar == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
l2tp = ZeroMalloc(sizeof(L2TP_SERVER));
|
|
|
|
l2tp->FlushList = NewTubeFlushList();
|
|
|
|
l2tp->Cedar = cedar;
|
|
AddRef(l2tp->Cedar->ref);
|
|
|
|
l2tp->SendPacketList = NewList(NULL);
|
|
l2tp->TunnelList = NewList(NULL);
|
|
|
|
l2tp->HaltCompletedEvent = NewEvent();
|
|
|
|
l2tp->ThreadList = NewThreadList();
|
|
|
|
l2tp->IkeServer = ike;
|
|
|
|
l2tp->IsIPsecIPv6 = is_ipv6;
|
|
l2tp->CryptBlockSize = crypt_block_size;
|
|
|
|
return l2tp;
|
|
}
|
|
|
|
// Stop the L2TP server
|
|
void StopL2TPServer(L2TP_SERVER *l2tp, bool no_wait)
|
|
{
|
|
// Validate arguments
|
|
if (l2tp == NULL)
|
|
{
|
|
return;
|
|
}
|
|
if (l2tp->Halt)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Begin to shut down
|
|
l2tp->Halt = true;
|
|
Debug("Shutting down L2TP Server...\n");
|
|
|
|
// Hit the event
|
|
SetSockEvent(l2tp->SockEvent);
|
|
|
|
if (no_wait == false)
|
|
{
|
|
// Wait until complete stopping all tunnels
|
|
Wait(l2tp->HaltCompletedEvent, INFINITE);
|
|
}
|
|
else
|
|
{
|
|
UINT i, j;
|
|
// Kill the thread of all sessions
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
for (j = 0;j < LIST_NUM(t->SessionList);j++)
|
|
{
|
|
L2TP_SESSION *s = LIST_DATA(t->SessionList, j);
|
|
|
|
StopL2TPThread(l2tp, t, s);
|
|
}
|
|
}
|
|
}
|
|
|
|
// Thread stop
|
|
Debug("Stopping all L2TP PPP Threads...\n");
|
|
StopThreadList(l2tp->ThreadList);
|
|
Debug("L2TP Server Shutdown Completed.\n");
|
|
}
|
|
|
|
// Release the L2TP server
|
|
void FreeL2TPServer(L2TP_SERVER *l2tp)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (l2tp == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
FreeThreadList(l2tp->ThreadList);
|
|
|
|
for (i = 0;i < LIST_NUM(l2tp->SendPacketList);i++)
|
|
{
|
|
UDPPACKET *p = LIST_DATA(l2tp->SendPacketList, i);
|
|
|
|
FreeUdpPacket(p);
|
|
}
|
|
|
|
ReleaseList(l2tp->SendPacketList);
|
|
|
|
for (i = 0;i < LIST_NUM(l2tp->TunnelList);i++)
|
|
{
|
|
L2TP_TUNNEL *t = LIST_DATA(l2tp->TunnelList, i);
|
|
|
|
FreeL2TPTunnel(t);
|
|
}
|
|
|
|
ReleaseList(l2tp->TunnelList);
|
|
|
|
ReleaseSockEvent(l2tp->SockEvent);
|
|
|
|
ReleaseEvent(l2tp->HaltCompletedEvent);
|
|
|
|
ReleaseCedar(l2tp->Cedar);
|
|
|
|
FreeTubeFlushList(l2tp->FlushList);
|
|
|
|
Free(l2tp);
|
|
}
|
|
|
|
// Set a SockEvent to the L2TP server
|
|
void SetL2TPServerSockEvent(L2TP_SERVER *l2tp, SOCK_EVENT *e)
|
|
{
|
|
// Validate arguments
|
|
if (l2tp == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (e != NULL)
|
|
{
|
|
AddRef(e->ref);
|
|
}
|
|
|
|
if (l2tp->SockEvent != NULL)
|
|
{
|
|
ReleaseSockEvent(l2tp->SockEvent);
|
|
l2tp->SockEvent = NULL;
|
|
}
|
|
|
|
l2tp->SockEvent = e;
|
|
}
|
|
|