Welcome to mirror list, hosted at ThFree Co, Russian Federation.

github.com/SoftEtherVPN/SoftEtherVPN_Stable.git - Unnamed repository; edit this file 'description' to name the repository.
summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
Diffstat (limited to 'src/Cedar/VLanUnix.c')
-rw-r--r--src/Cedar/VLanUnix.c791
1 files changed, 791 insertions, 0 deletions
diff --git a/src/Cedar/VLanUnix.c b/src/Cedar/VLanUnix.c
new file mode 100644
index 00000000..c3e77d0c
--- /dev/null
+++ b/src/Cedar/VLanUnix.c
@@ -0,0 +1,791 @@
+// SoftEther VPN Source Code
+// Cedar Communication Module
+//
+// SoftEther VPN Server, Client and Bridge are free software under GPLv2.
+//
+// Copyright (c) 2012-2014 Daiyuu Nobori.
+// Copyright (c) 2012-2014 SoftEther VPN Project, University of Tsukuba, Japan.
+// Copyright (c) 2012-2014 SoftEther Corporation.
+//
+// All Rights Reserved.
+//
+// http://www.softether.org/
+//
+// Author: Daiyuu Nobori
+// Comments: Tetsuo Sugiyama, Ph.D.
+//
+//
+// This program is free software; you can redistribute it and/or
+// modify it under the terms of the GNU General Public License
+// version 2 as published by the Free Software Foundation.
+//
+// This program is distributed in the hope that it will be useful,
+// but WITHOUT ANY WARRANTY; without even the implied warranty of
+// MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
+// GNU General Public License for more details.
+//
+// You should have received a copy of the GNU General Public License version 2
+// along with this program; if not, write to the Free Software
+// Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
+//
+// THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
+// EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
+// MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT.
+// IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY
+// CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT,
+// TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE
+// SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
+//
+// THE LICENSE AGREEMENT IS ATTACHED ON THE SOURCE-CODE PACKAGE
+// AS "LICENSE.TXT" FILE. READ THE TEXT FILE IN ADVANCE TO USE THE SOFTWARE.
+//
+//
+// THIS SOFTWARE IS DEVELOPED IN JAPAN, AND DISTRIBUTED FROM JAPAN,
+// UNDER JAPANESE LAWS. YOU MUST AGREE IN ADVANCE TO USE, COPY, MODIFY,
+// MERGE, PUBLISH, DISTRIBUTE, SUBLICENSE, AND/OR SELL COPIES OF THIS
+// SOFTWARE, THAT ANY JURIDICAL DISPUTES WHICH ARE CONCERNED TO THIS
+// SOFTWARE OR ITS CONTENTS, AGAINST US (SOFTETHER PROJECT, SOFTETHER
+// CORPORATION, DAIYUU NOBORI OR OTHER SUPPLIERS), OR ANY JURIDICAL
+// DISPUTES AGAINST US WHICH ARE CAUSED BY ANY KIND OF USING, COPYING,
+// MODIFYING, MERGING, PUBLISHING, DISTRIBUTING, SUBLICENSING, AND/OR
+// SELLING COPIES OF THIS SOFTWARE SHALL BE REGARDED AS BE CONSTRUED AND
+// CONTROLLED BY JAPANESE LAWS, AND YOU MUST FURTHER CONSENT TO
+// EXCLUSIVE JURISDICTION AND VENUE IN THE COURTS SITTING IN TOKYO,
+// JAPAN. YOU MUST WAIVE ALL DEFENSES OF LACK OF PERSONAL JURISDICTION
+// AND FORUM NON CONVENIENS. PROCESS MAY BE SERVED ON EITHER PARTY IN
+// THE MANNER AUTHORIZED BY APPLICABLE LAW OR COURT RULE.
+//
+// USE ONLY IN JAPAN. DO NOT USE IT IN OTHER COUNTRIES. IMPORTING THIS
+// SOFTWARE INTO OTHER COUNTRIES IS AT YOUR OWN RISK. SOME COUNTRIES
+// PROHIBIT ENCRYPTED COMMUNICATIONS. USING THIS SOFTWARE IN OTHER
+// COUNTRIES MIGHT BE RESTRICTED.
+//
+//
+// DEAR SECURITY EXPERTS
+// ---------------------
+//
+// If you find a bug or a security vulnerability please kindly inform us
+// about the problem immediately so that we can fix the security problem
+// to protect a lot of users around the world as soon as possible.
+//
+// Our e-mail address for security reports is:
+// softether-vpn-security [at] softether.org
+//
+// Please note that the above e-mail address is not a technical support
+// inquiry address. If you need technical assistance, please visit
+// http://www.softether.org/ and ask your question on the users forum.
+//
+// Thank you for your cooperation.
+
+
+// VLanUnix.c
+// Virtual device driver library for UNIX
+
+#include <GlobalConst.h>
+
+#ifdef VLAN_C
+
+#include <stdio.h>
+#include <stdlib.h>
+#include <string.h>
+#include <wchar.h>
+#include <stdarg.h>
+#include <time.h>
+#include <errno.h>
+#include <Mayaqua/Mayaqua.h>
+#include <Cedar/Cedar.h>
+
+#ifdef OS_UNIX
+
+static LIST *unix_vlan = NULL;
+
+#ifndef NO_VLAN
+
+// Get the PACKET_ADAPTER
+PACKET_ADAPTER *VLanGetPacketAdapter()
+{
+ PACKET_ADAPTER *pa;
+
+ pa = NewPacketAdapter(VLanPaInit, VLanPaGetCancel,
+ VLanPaGetNextPacket, VLanPaPutPacket, VLanPaFree);
+ if (pa == NULL)
+ {
+ return NULL;
+ }
+
+ return pa;
+}
+
+// PA initialization
+bool VLanPaInit(SESSION *s)
+{
+ VLAN *v;
+ // Validate arguments
+ if (s == NULL)
+ {
+ return false;
+ }
+
+ // Connect to the driver
+ v = NewVLan(s->ClientOption->DeviceName, NULL);
+ if (v == NULL)
+ {
+ // Failure
+ return false;
+ }
+
+ s->PacketAdapter->Param = v;
+
+ return true;
+}
+
+// Get the cancel object
+CANCEL *VLanPaGetCancel(SESSION *s)
+{
+ VLAN *v;
+ // Validate arguments
+ if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
+ {
+ return NULL;
+ }
+
+ return VLanGetCancel(v);
+}
+
+// Release the packet adapter
+void VLanPaFree(SESSION *s)
+{
+ VLAN *v;
+ // Validate arguments
+ if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
+ {
+ return;
+ }
+
+ // End the virtual LAN card
+ FreeVLan(v);
+
+ s->PacketAdapter->Param = NULL;
+}
+
+// Write a packet
+bool VLanPaPutPacket(SESSION *s, void *data, UINT size)
+{
+ VLAN *v;
+ // Validate arguments
+ if ((s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
+ {
+ return false;
+ }
+
+ return VLanPutPacket(v, data, size);
+}
+
+// Get the next packet
+UINT VLanPaGetNextPacket(SESSION *s, void **data)
+{
+ VLAN *v;
+ UINT size;
+ // Validate arguments
+ if (data == NULL || (s == NULL) || ((v = s->PacketAdapter->Param) == NULL))
+ {
+ return INFINITE;
+ }
+
+ if (VLanGetNextPacket(v, data, &size) == false)
+ {
+ return INFINITE;
+ }
+
+ return size;
+}
+
+// Write a packet to the virtual LAN card
+bool VLanPutPacket(VLAN *v, void *buf, UINT size)
+{
+ UINT ret;
+ // Validate arguments
+ if (v == NULL)
+ {
+ return false;
+ }
+ if (v->Halt)
+ {
+ return false;
+ }
+ if (size > MAX_PACKET_SIZE)
+ {
+ return false;
+ }
+ if (buf == NULL || size == 0)
+ {
+ if (buf != NULL)
+ {
+ Free(buf);
+ }
+ return true;
+ }
+
+ ret = write(v->fd, buf, size);
+
+ if (ret >= 1)
+ {
+ Free(buf);
+ return true;
+ }
+
+ if (errno == EAGAIN || ret == 0)
+ {
+ Free(buf);
+ return true;
+ }
+
+ return false;
+}
+
+// Get the next packet from the virtual LAN card
+bool VLanGetNextPacket(VLAN *v, void **buf, UINT *size)
+{
+ UCHAR tmp[TAP_READ_BUF_SIZE];
+ int ret;
+ // Validate arguments
+ if (v == NULL || buf == NULL || size == 0)
+ {
+ return false;
+ }
+ if (v->Halt)
+ {
+ return false;
+ }
+
+ // Read
+ ret = read(v->fd, tmp, sizeof(tmp));
+
+ if (ret == 0 ||
+ (ret == -1 && errno == EAGAIN))
+ {
+ // No packet
+ *buf = NULL;
+ *size = 0;
+ return true;
+ }
+ else if (ret == -1 || ret > TAP_READ_BUF_SIZE)
+ {
+ // Error
+ return false;
+ }
+ else
+ {
+ // Reading packet success
+ *buf = Malloc(ret);
+ Copy(*buf, tmp, ret);
+ *size = ret;
+ return true;
+ }
+}
+
+// Get the cancel object
+CANCEL *VLanGetCancel(VLAN *v)
+{
+ CANCEL *c;
+ int fd;
+ int yes = 0;
+ // Validate arguments
+ if (v == NULL)
+ {
+ return NULL;
+ }
+
+ c = NewCancel();
+ UnixDeletePipe(c->pipe_read, c->pipe_write);
+ c->pipe_read = c->pipe_write = -1;
+
+ fd = v->fd;
+
+#ifndef UNIX_MACOS
+ UnixSetSocketNonBlockingMode(fd, true);
+#else // UNIX_MACOS
+ UnixSetSocketNonBlockingMode(fd, false);
+#endif // UNIX_MACOS
+
+ c->SpecialFlag = true;
+ c->pipe_read = fd;
+
+ return c;
+}
+
+// Close the Virtual LAN card
+void FreeVLan(VLAN *v)
+{
+ // Validate arguments
+ if (v == NULL)
+ {
+ return;
+ }
+
+ Free(v->InstanceName);
+
+ Free(v);
+}
+
+// Create a tap
+VLAN *NewTap(char *name, char *mac_address)
+{
+ int fd;
+ VLAN *v;
+ // Validate arguments
+ if (name == NULL || mac_address == NULL)
+ {
+ return NULL;
+ }
+
+ fd = UnixCreateTapDeviceEx(name, "tap", mac_address);
+ if (fd == -1)
+ {
+ return NULL;
+ }
+
+ v = ZeroMalloc(sizeof(VLAN));
+ v->Halt = false;
+ v->InstanceName = CopyStr(name);
+ v->fd = fd;
+
+ return v;
+}
+
+// Close the tap
+void FreeTap(VLAN *v)
+{
+ // Validate arguments
+ if (v == NULL)
+ {
+ return;
+ }
+
+ close(v->fd);
+ FreeVLan(v);
+}
+
+// Get the Virtual LAN card list
+VLAN *NewVLan(char *instance_name, VLAN_PARAM *param)
+{
+ int fd;
+ VLAN *v;
+ // Validate arguments
+ if (instance_name == NULL)
+ {
+ return NULL;
+ }
+
+ // Open the tap
+ fd = UnixVLanGet(instance_name);
+ if (fd == -1)
+ {
+ return NULL;
+ }
+
+ v = ZeroMalloc(sizeof(VLAN));
+ v->Halt = false;
+ v->InstanceName = CopyStr(instance_name);
+ v->fd = fd;
+
+ return v;
+}
+
+// Create a tap device
+int UnixCreateTapDeviceEx(char *name, char *prefix, UCHAR *mac_address)
+{
+ int fd;
+ struct ifreq ifr;
+ char eth_name[MAX_SIZE];
+ char instance_name_lower[MAX_SIZE];
+ struct sockaddr sa;
+ char *tap_name = TAP_FILENAME_1;
+ int s;
+ // Validate arguments
+ if (name == NULL)
+ {
+ return -1;
+ }
+
+ // Generate the device name
+ StrCpy(instance_name_lower, sizeof(instance_name_lower), name);
+ Trim(instance_name_lower);
+ StrLower(instance_name_lower);
+ Format(eth_name, sizeof(eth_name), "%s_%s", prefix, instance_name_lower);
+
+ eth_name[15] = 0;
+
+ // Open the tun / tap
+#ifndef UNIX_MACOS
+ if (GetOsInfo()->OsType == OSTYPE_LINUX)
+ {
+ // Linux
+ if (IsFile(TAP_FILENAME_1) == false)
+ {
+ char tmp[MAX_SIZE];
+
+ Format(tmp, sizeof(tmp), "%s c 10 200", TAP_FILENAME_1);
+ Run("mknod", tmp, true, true);
+
+ Format(tmp, sizeof(tmp), "600 %s", TAP_FILENAME_1);
+ Run("chmod", tmp, true, true);
+ }
+ }
+ // Other than MacOS X
+ fd = open(TAP_FILENAME_1, O_RDWR);
+ if (fd == -1)
+ {
+ // Failure
+ fd = open(TAP_FILENAME_2, O_RDWR);
+ if (fd == -1)
+ {
+ return -1;
+ }
+ tap_name = TAP_FILENAME_2;
+ }
+#else // UNIX_MACOS
+ // MacOS X
+ fd = open(TAP_MACOS_FILENAME, O_RDWR);
+ if (fd == -1)
+ {
+ return -1;
+ }
+ tap_name = TAP_MACOS_FILENAME;
+#endif // UNIX_MACOS
+
+#ifdef UNIX_LINUX
+ // Create a tap for Linux
+
+ // Set the device name
+ Zero(&ifr, sizeof(ifr));
+
+ ifr.ifr_flags = IFF_TAP | IFF_NO_PI;
+ StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), eth_name);
+
+ if (ioctl(fd, TUNSETIFF, &ifr) == -1)
+ {
+ // Failure
+ close(fd);
+ return -1;
+ }
+
+ // MAC address setting
+ s = socket(AF_INET, SOCK_DGRAM, 0);
+ if (s != -1)
+ {
+ if (mac_address != NULL)
+ {
+ Zero(&ifr, sizeof(ifr));
+ StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), eth_name);
+ ifr.ifr_hwaddr.sa_family = ARPHRD_ETHER;
+ Copy(&ifr.ifr_hwaddr.sa_data, mac_address, 6);
+ ioctl(s, SIOCSIFHWADDR, &ifr);
+ }
+
+ Zero(&ifr, sizeof(ifr));
+ StrCpy(ifr.ifr_name, sizeof(ifr.ifr_name), eth_name);
+ ioctl(s, SIOCGIFFLAGS, &ifr);
+
+ ifr.ifr_flags |= IFF_UP;
+ ioctl(s, SIOCSIFFLAGS, &ifr);
+
+ close(s);
+ }
+
+#else // UNIX_LINUX
+#ifdef UNIX_SOLARIS
+ // Create a tap for Solaris
+ {
+ int ip_fd;
+ int tun_fd;
+ int ppa;
+
+ tun_fd = open(tap_name, O_RDWR);
+ if (tun_fd == -1)
+ {
+ // Failure
+ close(fd);
+ return -1;
+ }
+
+ ip_fd = open("/dev/ip", O_RDWR);
+ if (ip_fd == -1)
+ {
+ // Failure
+ close(tun_fd);
+ close(fd);
+ return -1;
+ }
+
+ ppa = -1;
+ ppa = ioctl(tun_fd, TUNNEWPPA, ppa);
+ if (ppa == -1)
+ {
+ // Failure
+ close(tun_fd);
+ close(fd);
+ close(ip_fd);
+ return -1;
+ }
+
+ if (ioctl(fd, I_PUSH, "ip") < 0)
+ {
+ // Failure
+ close(tun_fd);
+ close(fd);
+ close(ip_fd);
+ return -1;
+ }
+
+ if (ioctl(fd, IF_UNITSEL, (char *)&ppa) < 0)
+ {
+ // Failure
+ close(tun_fd);
+ close(fd);
+ close(ip_fd);
+ return -1;
+ }
+
+ if (ioctl(ip_fd, I_LINK, fd) < 0)
+ {
+ // Failure
+ close(tun_fd);
+ close(fd);
+ close(ip_fd);
+ return -1;
+ }
+
+ close(tun_fd);
+ close(ip_fd);
+ }
+
+#endif // UNIX_SOLARIS
+#endif // UNIX_LINUX
+
+ return fd;
+}
+int UnixCreateTapDevice(char *name, UCHAR *mac_address)
+{
+ return UnixCreateTapDeviceEx(name, "vpn", mac_address);
+}
+
+// Close the tap device
+void UnixCloseTapDevice(int fd)
+{
+ // Validate arguments
+ if (fd == -1)
+ {
+ return;
+ }
+
+ close(fd);
+}
+
+#else // NO_VLAN
+
+void UnixCloseTapDevice(int fd)
+{
+}
+
+int UnixCreateTapDeviceEx(char *name, char *prefix, UCHAR *mac_address)
+{
+ return -1;
+}
+int UnixCreateTapDevice(char *name, UCHAR *mac_address)
+{
+ return -1;
+}
+
+#endif // NO_VLAN
+
+// Comparison of the VLAN list entries
+int UnixCompareVLan(void *p1, void *p2)
+{
+ UNIX_VLAN_LIST *v1, *v2;
+ if (p1 == NULL || p2 == NULL)
+ {
+ return 0;
+ }
+ v1 = *(UNIX_VLAN_LIST **)p1;
+ v2 = *(UNIX_VLAN_LIST **)p2;
+ if (v1 == NULL || v2 == NULL)
+ {
+ return 0;
+ }
+
+ return StrCmpi(v1->Name, v2->Name);
+}
+
+// Initialize the VLAN list
+void UnixVLanInit()
+{
+ unix_vlan = NewList(UnixCompareVLan);
+}
+
+// Create a VLAN
+bool UnixVLanCreateEx(char *name, char *prefix, UCHAR *mac_address)
+{
+ // Validate arguments
+ char tmp[MAX_SIZE];
+ if (name == NULL)
+ {
+ return false;
+ }
+
+ StrCpy(tmp, sizeof(tmp), name);
+ Trim(tmp);
+ name = tmp;
+
+ LockList(unix_vlan);
+ {
+ UNIX_VLAN_LIST *t, tt;
+ int fd;
+
+ // Check whether a device with the same name exists
+ Zero(&tt, sizeof(tt));
+ StrCpy(tt.Name, sizeof(tt.Name), name);
+
+ t = Search(unix_vlan, &tt);
+ if (t != NULL)
+ {
+ // Already exist
+ UnlockList(unix_vlan);
+ return false;
+ }
+
+ // Create a tap device
+ fd = UnixCreateTapDeviceEx(name, prefix, mac_address);
+ if (fd == -1)
+ {
+ // Failure to create
+ UnlockList(unix_vlan);
+ return false;
+ }
+
+ t = ZeroMalloc(sizeof(UNIX_VLAN_LIST));
+ t->fd = fd;
+ StrCpy(t->Name, sizeof(t->Name), name);
+
+ Insert(unix_vlan, t);
+ }
+ UnlockList(unix_vlan);
+
+ return true;
+}
+bool UnixVLanCreate(char *name, UCHAR *mac_address)
+{
+ return UnixVLanCreateEx(name, "vpn", mac_address);
+}
+
+// Enumerate VLANs
+TOKEN_LIST *UnixVLanEnum()
+{
+ TOKEN_LIST *ret;
+ UINT i;
+ if (unix_vlan == NULL)
+ {
+ return NullToken();
+ }
+
+ ret = ZeroMalloc(sizeof(TOKEN_LIST));
+
+ LockList(unix_vlan);
+ {
+ ret->NumTokens = LIST_NUM(unix_vlan);
+ ret->Token = ZeroMalloc(sizeof(char *) * ret->NumTokens);
+
+ for (i = 0;i < ret->NumTokens;i++)
+ {
+ UNIX_VLAN_LIST *t = LIST_DATA(unix_vlan, i);
+
+ ret->Token[i] = CopyStr(t->Name);
+ }
+ }
+ UnlockList(unix_vlan);
+
+ return ret;
+}
+
+// Delete the VLAN
+void UnixVLanDelete(char *name)
+{
+ // Validate arguments
+ if (name == NULL || unix_vlan == NULL)
+ {
+ return;
+ }
+
+ LockList(unix_vlan);
+ {
+ UINT i;
+ UNIX_VLAN_LIST *t, tt;
+
+ Zero(&tt, sizeof(tt));
+ StrCpy(tt.Name, sizeof(tt.Name), name);
+
+ t = Search(unix_vlan, &tt);
+ if (t != NULL)
+ {
+ UnixCloseTapDevice(t->fd);
+ Delete(unix_vlan, t);
+ Free(t);
+ }
+ }
+ UnlockList(unix_vlan);
+}
+
+// Get the VLAN
+int UnixVLanGet(char *name)
+{
+ int fd = -1;
+ // Validate arguments
+ if (name == NULL || unix_vlan == NULL)
+ {
+ return -1;
+ }
+
+ LockList(unix_vlan);
+ {
+ UINT i;
+ UNIX_VLAN_LIST *t, tt;
+
+ Zero(&tt, sizeof(tt));
+ StrCpy(tt.Name, sizeof(tt.Name), name);
+
+ t = Search(unix_vlan, &tt);
+ if (t != NULL)
+ {
+ fd = t->fd;
+ }
+ }
+ UnlockList(unix_vlan);
+
+ return fd;
+}
+
+// Release the VLAN list
+void UnixVLanFree()
+{
+ UINT i;
+
+ for (i = 0;i < LIST_NUM(unix_vlan);i++)
+ {
+ UNIX_VLAN_LIST *t = LIST_DATA(unix_vlan, i);
+
+ UnixCloseTapDevice(t->fd);
+ Free(t);
+ }
+
+ ReleaseList(unix_vlan);
+ unix_vlan = NULL;
+}
+
+#endif // OS_UNIX
+
+#endif // VLAN_C
+
+
+// Developed by SoftEther VPN Project at University of Tsukuba in Japan.
+// Department of Computer Science has dozens of overly-enthusiastic geeks.
+// Join us: http://www.tsukuba.ac.jp/english/admission/