windows-nt/Source/XPSP1/NT/net/tcpip/tpipv6/6to4svc/6to4svc.c
2020-09-26 16:20:57 +08:00

3224 lines
95 KiB
C
Raw Permalink Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/*++
Copyright (c) 2001 Microsoft Corporation
Abstract:
Functions implementing the 6to4 service, to provide IPv6 connectivity
over an IPv4 network.
--*/
#include "precomp.h"
#pragma hdrstop
extern DWORD
APIENTRY
RasQuerySharedPrivateLan(
OUT GUID* LanGuid );
STATE g_stService = DISABLED;
ULONG g_ulEventCount = 0;
//
// Worst metric for which we can add a route
//
#define UNREACHABLE 0x7fffffff
// #define INFINITE_LIFETIME 0xffffffff
#define V4_COMPAT_IFINDEX 2
#define SIX_TO_FOUR_IFINDEX 3
const IN6_ADDR SixToFourPrefix = { 0x20, 0x02, 0,0,0,0,0,0,0,0,0,0,0,0,0,0 };
#define SIXTOFOUR_METRIC 1000
// Metric of subnet/sitelocal route on a router
#define SUBNET_ROUTE_METRIC 1
#define SITELOCAL_ROUTE_METRIC 1
// Information on a 6to4 subnet that we've generated as a router
typedef struct _SUBNET_CONTEXT {
IN_ADDR V4Addr;
int Publish;
u_int ValidLifetime;
u_int PreferredLifetime;
} SUBNET_CONTEXT, *PSUBNET_CONTEXT;
//
// Variables for settings
//
#define DEFAULT_ENABLE_RESOLUTION AUTOMATIC
#define DEFAULT_ENABLE_ROUTING AUTOMATIC
#define DEFAULT_RESOLUTION_INTERVAL (24 * HOURS)
#define DEFAULT_ISATAP_RESOLUTION_INTERVAL (24 * HOURS)
#define DEFAULT_ENABLE_SITELOCALS ENABLED
#define DEFAULT_ENABLE_ISATAP_RESOLUTION ENABLED
#define DEFAULT_ENABLE_6OVER4 DISABLED
#define DEFAULT_ENABLE_V4COMPAT DISABLED
#define DEFAULT_RELAY_NAME L"6to4.ipv6.microsoft.com."
#define DEFAULT_UNDO_ON_STOP ENABLED
#define KEY_ENABLE_RESOLUTION L"EnableResolution"
#define KEY_ENABLE_ROUTING L"EnableRouting"
#define KEY_ENABLE_SITELOCALS L"EnableSiteLocals"
#define KEY_ENABLE_6OVER4 L"Enable6over4"
#define KEY_ENABLE_V4COMPAT L"EnableV4Compat"
#define KEY_RESOLUTION_INTERVAL L"ResolutionInterval"
#define KEY_UNDO_ON_STOP L"UndoOnStop"
#define KEY_RELAY_NAME L"RelayName"
#define KEY_ENABLE_ISATAP_RESOLUTION L"EnableIsatapResolution"
#define KEY_ISATAP_RESOLUTION_INTERVAL L"IsatapResolutionInterval"
#define KEY_ISATAP_ROUTER_NAME L"IsatapRouterName"
#define KEY_GLOBAL L"System\\CurrentControlSet\\Services\\6to4\\Config"
#define KEY_INTERFACES L"System\\CurrentControlSet\\Services\\6to4\\Interfaces"
#define DEFAULT_ISATAP_ROUTER_NAME L"isatap"
typedef enum {
IPV4_SCOPE_NODE,
IPV4_SCOPE_LINK,
IPV4_SCOPE_SM_SITE,
IPV4_SCOPE_MD_SITE,
IPV4_SCOPE_LG_SITE,
IPV4_SCOPE_GLOBAL,
NUM_IPV4_SCOPES
} IPV4_SCOPE;
//
// Global config settings
//
typedef struct {
STATE stEnableRouting;
STATE stEnableResolution;
STATE stEnableSiteLocals;
STATE stEnable6over4;
STATE stEnableV4Compat;
STATE stEnableIsatapResolution;
ULONG ulResolutionInterval; // in minutes
ULONG ulIsatapResolutionInterval; // in minutes
WCHAR pwszRelayName[NI_MAXHOST];
WCHAR pwszIsatapRouterName[NI_MAXHOST];
STATE stUndoOnStop;
} GLOBAL_SETTINGS;
GLOBAL_SETTINGS g_GlobalSettings;
typedef struct {
STATE stRoutingState;
STATE stResolutionState;
STATE stIsatapResolutionState;
} GLOBAL_STATE;
GLOBAL_STATE g_GlobalState = { DISABLED, DISABLED, DISABLED };
typedef struct _ADDR_INFO {
LPSOCKADDR lpSockaddr;
INT iSockaddrLength;
ULONG ul6over4IfIndex;
} ADDR_INFO, *PADDR_INFO;
#define ADDR_FLAG_DISABLED 0x01
typedef struct _ADDR_LIST {
INT iAddressCount;
ADDR_INFO Address[1];
} ADDR_LIST, *PADDR_LIST;
const ADDR_LIST EmptyAddressList = {0};
// List of public IPv4 addresses used when updating the routing state
ADDR_LIST *g_pPublicAddressList = NULL;
//
// Variables for interfaces (addresses and routing)
//
typedef struct _IF_SETTINGS {
WCHAR pwszAdapterName[MAX_ADAPTER_NAME];
STATE stEnableRouting; // be a router on this private iface?
} IF_SETTINGS, *PIF_SETTINGS;
typedef struct _IF_SETTINGS_LIST {
ULONG ulNumInterfaces;
IF_SETTINGS arrIf[0];
} IF_SETTINGS_LIST, *PIF_SETTINGS_LIST;
PIF_SETTINGS_LIST g_pInterfaceSettingsList = NULL;
typedef struct _IF_INFO {
WCHAR pwszAdapterName[MAX_ADAPTER_NAME];
ULONG ulIPv6IfIndex;
STATE stRoutingState; // be a router on this private iface?
ULONG ulNumGlobals;
ADDR_LIST *pAddressList;
} IF_INFO, *PIF_INFO;
typedef struct _IF_LIST {
ULONG ulNumInterfaces;
ULONG ulNumScopedAddrs[NUM_IPV4_SCOPES];
IF_INFO arrIf[0];
} IF_LIST, *PIF_LIST;
PIF_LIST g_pInterfaceList = NULL;
HANDLE g_hAddressChangeEvent = NULL;
OVERLAPPED g_hAddressChangeOverlapped;
HANDLE g_hAddressChangeWaitHandle = NULL;
STATE g_st6to4State = DISABLED;
SOCKET g_sIPv4Socket = INVALID_SOCKET;
///////////////////////////////////////////////////////////////////////////
// Variables for relays
//
typedef struct _RELAY_INFO {
SOCKADDR_IN sinAddress; // IPv4 address
SOCKADDR_IN6 sin6Address; // IPv6 address
ULONG ulMetric;
} RELAY_INFO, *PRELAY_INFO;
typedef struct _RELAY_LIST {
ULONG ulNumRelays;
RELAY_INFO arrRelay[0];
} RELAY_LIST, *PRELAY_LIST;
PRELAY_LIST g_pRelayList = NULL;
HANDLE g_hTimerQueue = INVALID_HANDLE_VALUE;
HANDLE g_h6to4ResolutionTimer = INVALID_HANDLE_VALUE;
HANDLE g_h6to4TimerCancelledEvent = NULL;
HANDLE g_h6to4TimerCancelledWait = NULL;
HANDLE g_hIsatapResolutionTimer = INVALID_HANDLE_VALUE;
HANDLE g_hIsatapTimerCancelledEvent = NULL;
HANDLE g_hIsatapTimerCancelledWait = NULL;
IN_ADDR g_ipIsatapRouter = { INADDR_ANY };
IN_ADDR g_ipIsatapToken = { INADDR_ANY };
DWORD
UpdateGlobalResolutionState(
IN GLOBAL_SETTINGS *pOldSettings,
IN GLOBAL_STATE *pOldState);
VOID
WINAPI
SetIsatapRouterAddress();
//////////////////////////////////////////////////////////////////////////////
// GetAddrStr - helper routine to get a string literal for an address
LPTSTR
GetAddrStr(
IN LPSOCKADDR pSockaddr,
IN ULONG ulSockaddrLen)
{
static TCHAR tBuffer[INET6_ADDRSTRLEN];
INT iRet;
ULONG ulLen;
ulLen = sizeof(tBuffer);
iRet = WSAAddressToString(pSockaddr, ulSockaddrLen, NULL, tBuffer, &ulLen);
if (iRet) {
swprintf(tBuffer, L"<err %d>", WSAGetLastError());
}
return tBuffer;
}
BOOL
ConvertOemToUnicode(
IN LPSTR OemString,
OUT LPWSTR UnicodeString,
IN int UnicodeLen)
{
return (MultiByteToWideChar(CP_OEMCP, 0, OemString, (int)(strlen(OemString)+1),
UnicodeString, UnicodeLen) != 0);
}
BOOL
ConvertUnicodeToOem(
IN LPWSTR UnicodeString,
OUT LPSTR OemString,
IN int OemLen)
{
return (WideCharToMultiByte(CP_OEMCP, 0, UnicodeString,
(int)(wcslen(UnicodeString)+1), OemString, OemLen, NULL, NULL) != 0);
}
DWORD
GetAddrInfoW(
IN PWCHAR pwszName,
IN PWCHAR pwszServ,
IN struct addrinfo *hints,
IN struct addrinfo **ai)
{
char name[NI_MAXHOST * 2], *pName = NULL;
char serv[NI_MAXHOST * 2], *pServ = NULL;
if (pwszName) {
if (!ConvertUnicodeToOem(pwszName, name, sizeof(name))) {
return GetLastError();
}
pName = name;
}
if (pwszServ) {
if (!ConvertUnicodeToOem(pwszServ, serv, sizeof(serv))) {
return GetLastError();
}
pServ = serv;
}
return getaddrinfo(pName, pServ, hints, ai);
}
/////////////////////////////////////////////////////////////////////////
// Subroutines for manipulating the list of (usually) public addresses
// being used for both 6to4 addresses and subnet prefixes.
/////////////////////////////////////////////////////////////////////////
DWORD
MakeEmptyAddressList(
OUT PADDR_LIST *ppList)
{
*ppList = MALLOC(FIELD_OFFSET(ADDR_LIST, Address[0]));
if (!*ppList) {
return GetLastError();
}
(*ppList)->iAddressCount = 0;
return NO_ERROR;
}
VOID
FreeAddressList(
IN PADDR_LIST *ppAddressList)
{
ADDR_LIST *pList = *ppAddressList;
int i;
if (pList == NULL) {
return;
}
// Free all addresses
for (i=0; i<pList->iAddressCount; i++) {
FREE(pList->Address[i].lpSockaddr);
}
// Free the list
FREE(pList);
*ppAddressList = NULL;
}
DWORD
AddAddressToList(
IN LPSOCKADDR_IN pAddress,
IN ADDR_LIST **ppAddressList,
IN ULONG ul6over4IfIndex)
{
ADDR_LIST *pOldList = *ppAddressList;
ADDR_LIST *pNewList;
int n = pOldList->iAddressCount;
// Copy existing addresses
pNewList = MALLOC( FIELD_OFFSET(ADDR_LIST, Address[n+1]) );
if (!pNewList) {
return GetLastError();
}
CopyMemory(pNewList, pOldList,
FIELD_OFFSET(ADDR_LIST, Address[n]));
pNewList->iAddressCount = n+1;
// Add new address
pNewList->Address[n].lpSockaddr = MALLOC(sizeof(SOCKADDR_IN));
if (!pNewList->Address[n].lpSockaddr) {
FREE(pNewList);
return ERROR_NOT_ENOUGH_MEMORY;
}
CopyMemory(pNewList->Address[n].lpSockaddr, pAddress, sizeof(SOCKADDR_IN));
pNewList->Address[n].iSockaddrLength = sizeof(SOCKADDR_IN);
pNewList->Address[n].ul6over4IfIndex = ul6over4IfIndex;
// Free the old list without freeing the sockaddrs
FREE(pOldList);
*ppAddressList = pNewList;
return NO_ERROR;
}
DWORD
FindAddressInList(
IN LPSOCKADDR_IN pAddress,
IN ADDR_LIST *pAddressList,
OUT ULONG *pulIndex)
{
int i;
// Find address in list
for (i=0; i<pAddressList->iAddressCount; i++) {
if (!memcmp(pAddress, pAddressList->Address[i].lpSockaddr,
sizeof(SOCKADDR_IN))) {
*pulIndex = i;
return NO_ERROR;
}
}
Trace1(ERR, _T("ERROR: FindAddressInList didn't find %d.%d.%d.%d"),
PRINT_IPADDR(pAddress->sin_addr.s_addr));
return ERROR_NOT_FOUND;
}
DWORD
RemoveAddressFromList(
IN ULONG ulIndex,
IN ADDR_LIST *pAddressList)
{
// Free old address
FREE(pAddressList->Address[ulIndex].lpSockaddr);
// Move the last entry into its place
pAddressList->iAddressCount--;
pAddressList->Address[ulIndex] =
pAddressList->Address[pAddressList->iAddressCount];
return NO_ERROR;
}
////////////////////////////////////////////////////////////////
// GlobalInfo-related subroutines
////////////////////////////////////////////////////////////////
int
ConfigureRouteTableUpdate(
IN const IN6_ADDR *Prefix,
IN u_int PrefixLen,
IN u_int Interface,
IN const IN6_ADDR *Neighbor,
IN int Publish,
IN int Immortal,
IN u_int ValidLifetime,
IN u_int PreferredLifetime,
IN u_int SitePrefixLen,
IN u_int Metric)
{
IPV6_INFO_ROUTE_TABLE Route;
SOCKADDR_IN6 saddr;
DWORD dwErr;
ZeroMemory(&saddr, sizeof(saddr));
saddr.sin6_family = AF_INET6;
saddr.sin6_addr = *Prefix;
Trace7(FSM, _T("Updating route %s/%d iface %d metric %d lifetime %d/%d publish %d"),
GetAddrStr((LPSOCKADDR)&saddr, sizeof(saddr)),
PrefixLen,
Interface,
Metric,
PreferredLifetime,
ValidLifetime,
Publish);
memset(&Route, 0, sizeof Route);
Route.This.Prefix = *Prefix;
Route.This.PrefixLength = PrefixLen;
Route.This.Neighbor.IF.Index = Interface;
Route.This.Neighbor.Address = *Neighbor;
Route.ValidLifetime = ValidLifetime;
Route.PreferredLifetime = PreferredLifetime;
Route.Publish = Publish;
Route.Immortal = Immortal;
Route.SitePrefixLength = SitePrefixLen;
Route.Preference = Metric;
Route.Type = RTE_TYPE_MANUAL;
dwErr = UpdateRouteTable(&Route)? NO_ERROR : GetLastError();
if (dwErr isnot NO_ERROR) {
Trace1(ERR, _T("UpdateRouteTable got error %d"), dwErr);
}
return dwErr;
}
DWORD
InitializeGlobalInfo()
{
DWORD dwErr;
g_GlobalSettings.stEnableRouting = DEFAULT_ENABLE_ROUTING;
g_GlobalSettings.stEnableResolution = DEFAULT_ENABLE_RESOLUTION;
g_GlobalSettings.stEnableIsatapResolution = DEFAULT_ENABLE_ISATAP_RESOLUTION;
g_GlobalSettings.ulResolutionInterval = DEFAULT_RESOLUTION_INTERVAL;
g_GlobalSettings.ulIsatapResolutionInterval = DEFAULT_ISATAP_RESOLUTION_INTERVAL;
g_GlobalSettings.stEnableSiteLocals = DEFAULT_ENABLE_SITELOCALS;
g_GlobalSettings.stEnable6over4 = DEFAULT_ENABLE_6OVER4;
g_GlobalSettings.stEnableV4Compat = DEFAULT_ENABLE_V4COMPAT;
g_GlobalSettings.stUndoOnStop = DEFAULT_UNDO_ON_STOP;
wcscpy(g_GlobalSettings.pwszRelayName, DEFAULT_RELAY_NAME);
wcscpy(g_GlobalSettings.pwszIsatapRouterName, DEFAULT_ISATAP_ROUTER_NAME);
g_GlobalState.stResolutionState = DISABLED;
g_GlobalState.stIsatapResolutionState = DISABLED;
g_ipIsatapRouter.s_addr = INADDR_ANY;
g_ipIsatapToken.s_addr = INADDR_ANY;
g_sIPv4Socket = socket(AF_INET, SOCK_DGRAM, 0);
if (g_sIPv4Socket == INVALID_SOCKET) {
Trace0(ERR, _T("socket failed\n"));
return WSAGetLastError();
}
dwErr = MakeEmptyAddressList(&g_pPublicAddressList);
return dwErr;
}
// Called by: Stop6to4
VOID
UninitializeGlobalInfo()
{
closesocket(g_sIPv4Socket);
g_sIPv4Socket = INVALID_SOCKET;
FreeAddressList(&g_pPublicAddressList);
}
////////////////////////////////////////////////////////////////
// IPv4 and IPv6 Address-related subroutines
////////////////////////////////////////////////////////////////
typedef struct {
IPV4_SCOPE Scope;
DWORD Address;
DWORD Mask;
ULONG MaskLen;
} IPV4_SCOPE_PREFIX;
IPV4_SCOPE_PREFIX
Ipv4ScopePrefix[] = {
{ IPV4_SCOPE_NODE, 0x0100007f, 0xffffffff, 32 }, // 127.0.0.1/32
{ IPV4_SCOPE_LINK, 0x0000fea9, 0x0000ffff, 16 }, // 169.254/16
{ IPV4_SCOPE_SM_SITE, 0x0000a8c0, 0x0000ffff, 16 }, // 192.168/16
{ IPV4_SCOPE_MD_SITE, 0x000010ac, 0x0000f0ff, 12 }, // 172.16/12
{ IPV4_SCOPE_LG_SITE, 0x0000000a, 0x000000ff, 8 }, // 10/8
{ IPV4_SCOPE_GLOBAL, 0x00000000, 0x00000000, 0 }, // 0/0
};
IPV4_SCOPE
GetIPv4Scope(
IN DWORD Addr)
{
int i;
for (i=0; ; i++) {
if ((Addr & Ipv4ScopePrefix[i].Mask) == Ipv4ScopePrefix[i].Address) {
return Ipv4ScopePrefix[i].Scope;
}
}
}
DWORD
MakeAddressList(
IN PIP_ADDR_STRING pIpAddrList,
OUT ADDR_LIST **ppAddressList,
OUT PULONG pulGlobals,
IN OUT PULONG pulCumulNumScopedAddrs)
{
ULONG ulGlobals = 0, ulAddresses = 0;
INT iLength;
DWORD dwErr = NO_ERROR;
ADDR_LIST *pList = NULL;
PIP_ADDR_STRING pIpAddr;
SOCKADDR_IN *pSin;
IPV4_SCOPE scope;
// Count addresses
for (pIpAddr=pIpAddrList; pIpAddr; pIpAddr=pIpAddr->Next) {
ulAddresses++;
}
*ppAddressList = NULL;
*pulGlobals = 0;
pList = MALLOC( FIELD_OFFSET(ADDR_LIST, Address[ulAddresses] ));
if (pList == NULL) {
return GetLastError();
}
ulAddresses = 0;
for (pIpAddr=pIpAddrList; pIpAddr; pIpAddr=pIpAddr->Next) {
Trace1(FSM, _T("Adding address %hs"), pIpAddr->IpAddress.String);
iLength = sizeof(SOCKADDR_IN);
pSin = MALLOC( iLength );
if (pSin == NULL) {
continue;
}
dwErr = WSAStringToAddressA(pIpAddr->IpAddress.String,
AF_INET,
NULL,
(LPSOCKADDR)pSin,
&iLength);
if (dwErr == SOCKET_ERROR) {
FREE(pSin);
pSin = NULL;
continue;
}
//
// Don't allow 0.0.0.0 as an address. On an interface with no
// addresses, the IPv4 stack will report 1 address of 0.0.0.0.
//
if (pSin->sin_addr.s_addr == INADDR_ANY) {
FREE(pSin);
pSin = NULL;
continue;
}
if ((pSin->sin_addr.s_addr & 0x000000FF) == 0) {
//
// An address in 0/8 isn't a real IP address, it's a fake one that
// the IPv4 stack sticks on a receive-only adapter.
//
FREE(pSin);
pSin = NULL;
continue;
}
scope = GetIPv4Scope(pSin->sin_addr.s_addr);
pulCumulNumScopedAddrs[scope]++;
if (scope == IPV4_SCOPE_GLOBAL) {
ulGlobals++;
}
pList->Address[ulAddresses].iSockaddrLength = iLength;
pList->Address[ulAddresses].lpSockaddr = (LPSOCKADDR)pSin;
ulAddresses++;
}
pList->iAddressCount = ulAddresses;
*ppAddressList = pList;
*pulGlobals = ulGlobals;
return dwErr;
}
//
// Create a 6to4 unicast address for this machine.
//
VOID
Make6to4Address(
OUT LPSOCKADDR_IN6 pIPv6Address,
IN LPSOCKADDR_IN pIPv4Address)
{
IN_ADDR *pIPv4 = &pIPv4Address->sin_addr;
memset(pIPv6Address, 0, sizeof (SOCKADDR_IN6));
pIPv6Address->sin6_family = AF_INET6;
pIPv6Address->sin6_addr.s6_addr[0] = 0x20;
pIPv6Address->sin6_addr.s6_addr[1] = 0x02;
memcpy(&pIPv6Address->sin6_addr.s6_addr[2], pIPv4, sizeof(IN_ADDR));
memcpy(&pIPv6Address->sin6_addr.s6_addr[12], pIPv4, sizeof(IN_ADDR));
}
VOID
Make6to4AddressForCTI(
OUT LPSOCKADDR_IN6 pIPv6Address,
IN LPSOCKADDR_IN pIPv4Address,
IN ULONG ulIfIndex)
{
IN_ADDR *pIPv4 = &pIPv4Address->sin_addr;
ULONG NetOrderIfIndex;
memset(pIPv6Address, 0, sizeof (SOCKADDR_IN6));
pIPv6Address->sin6_family = AF_INET6;
pIPv6Address->sin6_addr.s6_addr[0] = 0x20;
pIPv6Address->sin6_addr.s6_addr[1] = 0x02;
memcpy(&pIPv6Address->sin6_addr.s6_addr[2], pIPv4, sizeof(IN_ADDR));
NetOrderIfIndex = htonl(ulIfIndex);
CopyMemory(&pIPv6Address->sin6_addr.s6_bytes[8],
&NetOrderIfIndex,
sizeof(NetOrderIfIndex));
memcpy(&pIPv6Address->sin6_addr.s6_addr[12], pIPv4, sizeof(IN_ADDR));
}
//
// Create a 6to4 anycast address from a local IPv4 address.
//
VOID
Make6to4AnycastAddress(
OUT LPSOCKADDR_IN6 pIPv6Address,
IN LPSOCKADDR_IN pIPv4Address)
{
IN_ADDR *pIPv4 = &pIPv4Address->sin_addr;
memset(pIPv6Address, 0, sizeof(SOCKADDR_IN6));
pIPv6Address->sin6_family = AF_INET6;
pIPv6Address->sin6_addr.s6_addr[0] = 0x20;
pIPv6Address->sin6_addr.s6_addr[1] = 0x02;
memcpy(&pIPv6Address->sin6_addr.s6_addr[2], pIPv4, sizeof(IN_ADDR));
}
//
// Create a v4-compatible address from an IPv4 address.
//
VOID
MakeV4CompatibleAddress(
OUT LPSOCKADDR_IN6 pIPv6Address,
IN LPSOCKADDR_IN pIPv4Address)
{
IN_ADDR *pIPv4 = &pIPv4Address->sin_addr;
memset(pIPv6Address, 0, sizeof(SOCKADDR_IN6));
pIPv6Address->sin6_family = AF_INET6;
memcpy(&pIPv6Address->sin6_addr.s6_addr[12], pIPv4, sizeof(IN_ADDR));
}
//
// Create an ISATAP link-scoped address from an IPv4 address.
//
MakeIsatapAddress(
OUT LPSOCKADDR_IN6 pIPv6Address,
IN LPSOCKADDR_IN pIPv4Address)
{
IN_ADDR *pIPv4 = &pIPv4Address->sin_addr;
memset(pIPv6Address, 0, sizeof(SOCKADDR_IN6));
pIPv6Address->sin6_family = AF_INET6;
pIPv6Address->sin6_addr.s6_addr[0] = 0xfe;
pIPv6Address->sin6_addr.s6_addr[1] = 0x80;
pIPv6Address->sin6_addr.s6_addr[10] = 0x5e;
pIPv6Address->sin6_addr.s6_addr[11] = 0xfe;
memcpy(&pIPv6Address->sin6_addr.s6_addr[12], pIPv4, sizeof(IN_ADDR));
}
DWORD
ConfigureAddressUpdate(
IN u_int Interface,
IN SOCKADDR_IN6 *Sockaddr,
IN u_int Lifetime,
IN int Type,
IN u_int PrefixConf,
IN u_int SuffixConf)
{
IPV6_UPDATE_ADDRESS Address;
DWORD dwErr = NO_ERROR;
IN6_ADDR *Addr = &Sockaddr->sin6_addr;
Trace6(FSM,
_T("ConfigureAddressUpdate: if %u addr %s life %u type %d conf %u/%u"),
Interface,
GetAddrStr((LPSOCKADDR)Sockaddr, sizeof(SOCKADDR_IN6)),
Lifetime,
Type,
PrefixConf,
SuffixConf);
memset(&Address, 0, sizeof Address);
Address.This.IF.Index = Interface;
Address.This.Address = *Addr;
Address.ValidLifetime = Address.PreferredLifetime = Lifetime;
Address.Type = Type;
Address.PrefixConf = PrefixConf;
Address.InterfaceIdConf = SuffixConf;
if (!UpdateAddress(&Address)) {
dwErr = GetLastError();
Trace1(ERR, _T("ERROR: UpdateAddress got error %d"), dwErr);
}
return dwErr;
}
void
Configure6to4Subnets(
IN ULONG ulIfIndex,
IN PSUBNET_CONTEXT pSubnet);
void
Unconfigure6to4Subnets(
IN ULONG ulIfIndex,
IN PSUBNET_CONTEXT pSubnet);
// Called by: OnChangeInterfaceInfo
DWORD
Add6to4Address(
IN LPSOCKADDR_IN pIPv4Address, // public address
IN PIF_LIST pInterfaceList, // interface list
IN STATE stOldRoutingState) // routing state
{
SOCKADDR_IN6 OurAddress;
DWORD dwErr;
ULONG i, ul6over4IfIndex;
PIF_INFO pIf;
SUBNET_CONTEXT Subnet;
Trace2(ENTER, _T("Add6to4Address %d.%d.%d.%d, isrouter=%d"),
PRINT_IPADDR(pIPv4Address->sin_addr.s_addr),
stOldRoutingState);
// Add 6over4 interface (if enabled)
if (g_GlobalSettings.stEnable6over4 == ENABLED) {
ul6over4IfIndex = Create6over4Interface(pIPv4Address->sin_addr);
} else {
ul6over4IfIndex = 0;
}
Trace1(ERR, _T("6over4 ifindex=%d"), ul6over4IfIndex);
// Put the IPv4 address on our "public" list
dwErr = AddAddressToList(pIPv4Address, &g_pPublicAddressList,
ul6over4IfIndex);
if (dwErr != NO_ERROR) {
return dwErr;
}
if (GetIPv4Scope(pIPv4Address->sin_addr.s_addr) == IPV4_SCOPE_GLOBAL) {
// Add a 6to4 address
Make6to4Address(&OurAddress, pIPv4Address);
dwErr = ConfigureAddressUpdate(SIX_TO_FOUR_IFINDEX, &OurAddress, INFINITE_LIFETIME,
ADE_UNICAST, PREFIX_CONF_WELLKNOWN,
IID_CONF_LL_ADDRESS);
if (dwErr != NO_ERROR) {
return dwErr;
}
// Add v4-compatible address (if enabled)
if (g_GlobalSettings.stEnableV4Compat == ENABLED) {
MakeV4CompatibleAddress(&OurAddress, pIPv4Address);
dwErr = ConfigureAddressUpdate(V4_COMPAT_IFINDEX, &OurAddress, INFINITE_LIFETIME,
ADE_UNICAST, PREFIX_CONF_WELLKNOWN,
IID_CONF_LL_ADDRESS);
if (dwErr != NO_ERROR) {
return dwErr;
}
}
}
// Add an ISATAP address
MakeIsatapAddress(&OurAddress, pIPv4Address);
dwErr = ConfigureAddressUpdate(V4_COMPAT_IFINDEX, &OurAddress, INFINITE_LIFETIME,
ADE_UNICAST, PREFIX_CONF_WELLKNOWN,
IID_CONF_LL_ADDRESS);
if (dwErr != NO_ERROR) {
return dwErr;
}
// A new address has been added. The ISATAP router was previously either
// unresolved or unreachable. Perhaps that has now changed...
if ((g_GlobalState.stIsatapResolutionState == ENABLED) &&
(g_ipIsatapToken.s_addr == INADDR_ANY)) {
ASSERT(g_ipIsatapRouter.s_addr == INADDR_ANY);
Sleep(1000); // Wait a second to ensure DNS is alerted.
SetIsatapRouterAddress();
}
#if TEREDO
TeredoAddressChangeNotification(FALSE, pIPv4Address->sin_addr);
#endif // TEREDO
if (stOldRoutingState == ENABLED) {
SOCKADDR_IN6 AnycastAddress;
Make6to4AnycastAddress(&AnycastAddress, pIPv4Address);
dwErr = ConfigureAddressUpdate(SIX_TO_FOUR_IFINDEX, &AnycastAddress,
INFINITE_LIFETIME, ADE_ANYCAST,
PREFIX_CONF_WELLKNOWN,
IID_CONF_WELLKNOWN);
if (dwErr != NO_ERROR) {
return dwErr;
}
// Add subnets to all routing interfaces
for (i=0; i<pInterfaceList->ulNumInterfaces; i++) {
pIf = &pInterfaceList->arrIf[i];
if (pIf->stRoutingState != ENABLED) {
continue;
}
Subnet.V4Addr = pIPv4Address->sin_addr;
Subnet.Publish = TRUE;
Subnet.ValidLifetime = 2 * HOURS;
Subnet.PreferredLifetime = 30 * MINUTES;
Configure6to4Subnets(pIf->ulIPv6IfIndex, &Subnet);
}
}
TraceLeave("Add6to4Address");
return NO_ERROR;
}
// Delete the 6to4 address from the global state, and prepare to
// delete it from the stack.
//
// Called by: UninitializeInterfaces
VOID
PreDelete6to4Address(
IN LPSOCKADDR_IN pIPv4Address,
IN PIF_LIST pInterfaceList,
IN STATE stOldRoutingState)
{
ULONG i;
SUBNET_CONTEXT Subnet;
PIF_INFO pIf;
Trace2(ENTER, _T("PreDelete6to4Address %d.%d.%d.%d, wasrouter=%d"),
PRINT_IPADDR(pIPv4Address->sin_addr.s_addr),
stOldRoutingState);
if (stOldRoutingState != ENABLED) {
return;
}
//
// Disable the subnet routes on each private interface.
// This will generate RAs that have a zero lifetime
// for the subnet prefixes.
//
Subnet.V4Addr = pIPv4Address->sin_addr;
Subnet.Publish = TRUE;
Subnet.ValidLifetime = Subnet.PreferredLifetime = 0;
for (i=0; i<pInterfaceList->ulNumInterfaces; i++) {
pIf = &pInterfaceList->arrIf[i];
if (pIf->stRoutingState != ENABLED) {
continue;
}
Unconfigure6to4Subnets(pIf->ulIPv6IfIndex, &Subnet);
}
TraceLeave("PreDelete6to4Address");
}
// Delete 6to4 address information from the stack.
//
// Called by: OnChangeInterfaceInfo, UninitializeInterfaces
VOID
Delete6to4Address(
IN LPSOCKADDR_IN pIPv4Address,
IN PIF_LIST pInterfaceList,
IN STATE stOldRoutingState)
{
SOCKADDR_IN6 OurAddress;
ULONG i;
PIF_INFO pIf;
SUBNET_CONTEXT Subnet;
DWORD dwErr;
Trace2(ENTER, _T("Delete6to4Address %d.%d.%d.%d wasrouter=%d"),
PRINT_IPADDR(pIPv4Address->sin_addr.s_addr),
stOldRoutingState);
Subnet.V4Addr = pIPv4Address->sin_addr;
Subnet.Publish = FALSE;
Subnet.ValidLifetime = Subnet.PreferredLifetime = 0;
if (GetIPv4Scope(pIPv4Address->sin_addr.s_addr) == IPV4_SCOPE_GLOBAL) {
// Delete the 6to4 address from the stack
Make6to4Address(&OurAddress, pIPv4Address);
ConfigureAddressUpdate(SIX_TO_FOUR_IFINDEX, &OurAddress, 0, ADE_UNICAST,
PREFIX_CONF_WELLKNOWN, IID_CONF_LL_ADDRESS);
// Delete the v4-compatible address from the stack (if enabled)
if (g_GlobalSettings.stEnableV4Compat == ENABLED) {
MakeV4CompatibleAddress(&OurAddress, pIPv4Address);
ConfigureAddressUpdate(V4_COMPAT_IFINDEX, &OurAddress, 0, ADE_UNICAST,
PREFIX_CONF_WELLKNOWN, IID_CONF_LL_ADDRESS);
}
}
// Delete the ISATAP address from the stack
MakeIsatapAddress(&OurAddress, pIPv4Address);
ConfigureAddressUpdate(V4_COMPAT_IFINDEX, &OurAddress, 0, ADE_UNICAST,
PREFIX_CONF_WELLKNOWN, IID_CONF_LL_ADDRESS);
// Re-resolve the ISATAP router address if the preferred source address
// (ISATAP token) has been deleted.
if ((g_GlobalState.stIsatapResolutionState == ENABLED) &&
(g_ipIsatapToken.s_addr == pIPv4Address->sin_addr.s_addr)) {
ASSERT(g_ipIsatapRouter.s_addr != INADDR_ANY);
Sleep(1000); // Wait a second to ensure DNS is alerted.
SetIsatapRouterAddress();
}
#if TEREDO
TeredoAddressChangeNotification(TRUE, pIPv4Address->sin_addr);
#endif // TEREDO
if (stOldRoutingState == ENABLED) {
SOCKADDR_IN6 AnycastAddress;
Make6to4AnycastAddress(&AnycastAddress, pIPv4Address);
ConfigureAddressUpdate(SIX_TO_FOUR_IFINDEX, &AnycastAddress, 0,
ADE_ANYCAST, PREFIX_CONF_WELLKNOWN,
IID_CONF_WELLKNOWN);
// Remove subnets from all routing interfaces
for (i=0; i<pInterfaceList->ulNumInterfaces; i++) {
pIf = &pInterfaceList->arrIf[i];
if (pIf->stRoutingState != ENABLED) {
continue;
}
Unconfigure6to4Subnets(pIf->ulIPv6IfIndex, &Subnet);
}
}
//
// We're now completely done with the IPv4 address, so
// remove it from the public address list.
//
dwErr = FindAddressInList(pIPv4Address, g_pPublicAddressList, &i);
if (dwErr == NO_ERROR) {
// Delete 6over4 interface (if enabled)
if (g_GlobalSettings.stEnable6over4 == ENABLED) {
DeleteInterface(g_pPublicAddressList->Address[i].ul6over4IfIndex);
}
RemoveAddressFromList(i, g_pPublicAddressList);
}
TraceLeave("Delete6to4Address");
}
////////////////////////////////////////////////////////////////
// Relay-related subroutines
////////////////////////////////////////////////////////////////
//
// Given a relay, make sure a default route to it exists with the right metric
//
VOID
AddOrUpdate6to4Relay(
IN PRELAY_INFO pRelay)
{
Trace1(ENTER, _T("AddOrUpdate6to4Relay %d.%d.%d.%d"),
PRINT_IPADDR(pRelay->sinAddress.sin_addr.s_addr));
//
// Create the default route.
//
ConfigureRouteTableUpdate(&in6addr_any, 0,
SIX_TO_FOUR_IFINDEX,
&pRelay->sin6Address.sin6_addr,
TRUE, // Publish.
TRUE, // Immortal.
2 * HOURS, // Valid lifetime.
30 * MINUTES, // Preferred lifetime.
0,
pRelay->ulMetric);
}
VOID
FreeRelayList(
IN PRELAY_LIST *ppList)
{
if (*ppList) {
FREE(*ppList);
*ppList = NULL;
}
}
DWORD
InitializeRelays()
{
g_pRelayList = NULL;
g_hTimerQueue = CreateTimerQueue();
if (g_hTimerQueue == INVALID_HANDLE_VALUE) {
return GetLastError();
}
return NO_ERROR;
}
VOID
IncEventCount(
IN PCHAR pszWhere)
{
ULONG ulCount = InterlockedIncrement(&g_ulEventCount);
Trace2(FSM, _T("++%u event count (%hs)"), ulCount, pszWhere);
}
VOID
DecEventCount(
IN PCHAR pszWhere)
{
ULONG ulCount = InterlockedDecrement(&g_ulEventCount);
Trace2(FSM, _T("--%u event count (%hs)"), ulCount, pszWhere);
if ((ulCount == 0) && (g_stService == DISABLED)) {
Set6to4ServiceStatus(SERVICE_STOPPED, NO_ERROR);
}
}
// This routine is invoked when a resolution timer has been cancelled
// and all outstanding timer routines have completed. It is responsible
// for releasing the event count for the periodic timer.
//
VOID CALLBACK
OnResolutionTimerCancelled(
IN PVOID lpParameter,
IN BOOLEAN TimerOrWaitFired)
{
TraceEnter("OnResolutionTimerCancelled");
DecEventCount("RT:CancelResolutionTimer");
TraceLeave("OnResolutionTimerCancelled");
}
DWORD
InitEvents()
{
ASSERT(g_h6to4TimerCancelledEvent == NULL);
g_h6to4TimerCancelledEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
if (g_h6to4TimerCancelledEvent == NULL)
return GetLastError();
//
// Schedule OnResolutionTimerCancelled() to be called whenever
// g_h6to4TimerCancelledEvent is signalled.
//
if (! RegisterWaitForSingleObject(&g_h6to4TimerCancelledWait,
g_h6to4TimerCancelledEvent,
OnResolutionTimerCancelled,
NULL,
INFINITE,
WT_EXECUTEDEFAULT)) {
return GetLastError();
}
ASSERT(g_hIsatapTimerCancelledEvent == NULL);
g_hIsatapTimerCancelledEvent = CreateEvent(NULL, FALSE, FALSE, NULL);
if (g_hIsatapTimerCancelledEvent == NULL)
return GetLastError();
//
// Schedule OnResolutionTimerCancelled() to be called whenever
// g_hIsatapTimerCancelledEvent is signalled.
//
if (! RegisterWaitForSingleObject(&g_hIsatapTimerCancelledWait,
g_hIsatapTimerCancelledEvent,
OnResolutionTimerCancelled,
NULL,
INFINITE,
WT_EXECUTEDEFAULT)) {
return GetLastError();
}
return NO_ERROR;
}
VOID
Cleanup6to4()
{
if (g_h6to4TimerCancelledWait != NULL) {
UnregisterWait(g_h6to4TimerCancelledWait);
g_h6to4TimerCancelledWait = NULL;
}
if (g_h6to4TimerCancelledEvent != NULL) {
CloseHandle(g_h6to4TimerCancelledEvent);
g_h6to4TimerCancelledEvent = NULL;
}
if (g_hIsatapTimerCancelledWait != NULL) {
UnregisterWait(g_hIsatapTimerCancelledWait);
g_hIsatapTimerCancelledWait = NULL;
}
if (g_hIsatapTimerCancelledEvent != NULL) {
CloseHandle(g_hIsatapTimerCancelledEvent);
g_hIsatapTimerCancelledEvent = NULL;
}
}
VOID
CancelResolutionTimer(
IN OUT HANDLE *phResolutionTimer,
IN HANDLE hEvent)
{
Trace0(FSM, _T("Cancelling RT"));
// Stop the resolution timer
if (*phResolutionTimer != INVALID_HANDLE_VALUE) {
// Must be done non-blocking since we're holding the lock
// the resolution timeout needs. Ask for notification
// when the cancel completes so we can release the event count.
DeleteTimerQueueTimer(g_hTimerQueue, *phResolutionTimer, hEvent);
*phResolutionTimer = INVALID_HANDLE_VALUE;
}
}
//
// Delete all stack state related to a given relay
//
void
Delete6to4Relay(
IN PRELAY_INFO pRelay)
{
Trace1(ENTER, _T("Delete6to4Relay %d.%d.%d.%d"),
PRINT_IPADDR(pRelay->sinAddress.sin_addr.s_addr));
ConfigureRouteTableUpdate(&in6addr_any, 0,
SIX_TO_FOUR_IFINDEX,
&pRelay->sin6Address.sin6_addr,
FALSE, // Publish.
FALSE, // Immortal.
0, // Valid lifetime.
0, // Preferred lifetime.
0,
pRelay->ulMetric);
}
VOID
UninitializeRelays()
{
ULONG i;
TraceEnter("UninitializeRelays");
CancelResolutionTimer(&g_hIsatapResolutionTimer,
g_hIsatapTimerCancelledEvent);
CancelResolutionTimer(&g_h6to4ResolutionTimer,
g_h6to4TimerCancelledEvent);
// Delete the timer queue
if (g_hTimerQueue != INVALID_HANDLE_VALUE) {
DeleteTimerQueue(g_hTimerQueue);
g_hTimerQueue = INVALID_HANDLE_VALUE;
}
if (g_GlobalSettings.stUndoOnStop == ENABLED) {
// Delete existing relay tunnels
for (i=0; g_pRelayList && (i<g_pRelayList->ulNumRelays); i++) {
Delete6to4Relay(&g_pRelayList->arrRelay[i]);
}
}
// Free the "old list"
FreeRelayList(&g_pRelayList);
TraceLeave("UninitializeRelays");
}
//
// Start or update the resolution timer to expire in <ulMinutes> minutes
//
DWORD
RestartResolutionTimer(
IN ULONG ulDelayMinutes,
IN ULONG ulPeriodMinutes,
IN HANDLE *phResolutionTimer,
IN WAITORTIMERCALLBACK OnTimeout)
{
ULONG DelayTime = ulDelayMinutes * MINUTES * 1000; // convert mins to ms
ULONG PeriodTime = ulPeriodMinutes * MINUTES * 1000; // convert mins to ms
BOOL bRet;
DWORD dwErr;
if (*phResolutionTimer != INVALID_HANDLE_VALUE) {
bRet = ChangeTimerQueueTimer(g_hTimerQueue, *phResolutionTimer,
DelayTime, PeriodTime);
} else {
bRet = CreateTimerQueueTimer(phResolutionTimer,
g_hTimerQueue,
OnTimeout,
NULL,
DelayTime,
PeriodTime,
0);
if (bRet) {
IncEventCount("RT:RestartResolutionTimer");
}
}
dwErr = (bRet)? NO_ERROR : GetLastError();
Trace3(TIMER,
_T("RestartResolutionTimer: DueTime %d minutes, Period %d minutes, ReturnCode %d"),
ulDelayMinutes, ulPeriodMinutes, dwErr);
return dwErr;
}
//
// Convert an addrinfo list into a relay list with appropriate metrics
//
DWORD
MakeRelayList(
IN struct addrinfo *addrs)
{
struct addrinfo *ai;
ULONG ulNumRelays = 0;
ULONG ulLatency;
for (ai=addrs; ai; ai=ai->ai_next) {
ulNumRelays++;
}
g_pRelayList = MALLOC( FIELD_OFFSET(RELAY_LIST, arrRelay[ulNumRelays]));
if (g_pRelayList == NULL) {
return GetLastError();
}
g_pRelayList->ulNumRelays = ulNumRelays;
ulNumRelays = 0;
for (ai=addrs; ai; ai=ai->ai_next) {
CopyMemory(&g_pRelayList->arrRelay[ulNumRelays].sinAddress, ai->ai_addr,
ai->ai_addrlen);
//
// Check connectivity using a possible 6to4 address for the relay
// router. However, we'll actually set TTL=1 and accept a
// hop count exceeded message, so we don't have to guess right.
//
Make6to4Address(&g_pRelayList->arrRelay[ulNumRelays].sin6Address,
&g_pRelayList->arrRelay[ulNumRelays].sinAddress);
// ping it to compute a metric
ulLatency = ConfirmIPv6Reachability(&g_pRelayList->arrRelay[ulNumRelays].sin6Address, 1000/*ms*/);
if (ulLatency != 0) {
g_pRelayList->arrRelay[ulNumRelays].ulMetric = 1000 + ulLatency;
} else {
g_pRelayList->arrRelay[ulNumRelays].ulMetric = UNREACHABLE;
}
ulNumRelays++;
}
return NO_ERROR;
}
//
// When the name-resolution timer expires, it's time to re-resolve the
// relay name to a list of relays.
//
DWORD
WINAPI
OnResolutionTimeout(
IN PVOID lpData,
IN BOOLEAN Reason)
{
DWORD dwErr = NO_ERROR;
struct addrinfo hints, *addrs;
PRELAY_LIST pOldRelayList;
ULONG i, j;
ENTER_API();
TraceEnter("OnResolutionTimeout");
if (g_stService == DISABLED) {
TraceLeave("OnResolutionTimeout (disabled)");
LEAVE_API();
return NO_ERROR;
}
pOldRelayList = g_pRelayList;
g_pRelayList = NULL;
// If any 6to4 addresses are configured,
// Resolve the relay name to a set of IPv4 addresses
// Else
// Make the new set empty
if (g_GlobalState.stResolutionState == ENABLED) {
// Resolve the relay name to a set of IPv4 addresses
ZeroMemory(&hints, sizeof(hints));
hints.ai_family = PF_INET;
dwErr = GetAddrInfoW(g_GlobalSettings.pwszRelayName, NULL, &hints, &addrs);
if (dwErr == NO_ERROR) {
dwErr = MakeRelayList(addrs);
freeaddrinfo(addrs);
addrs = NULL;
} else {
Trace2(ERR, _T("GetAddrInfoW(%s) returned error %d"),
g_GlobalSettings.pwszRelayName, dwErr);
}
}
// Compare the new set to the old set
// For each address in the new set, ping it to compute a metric
// For each new address, add a route
// For each old address not in the new list, delete the route
// For each address in both, update the route if the metric has changed
//
for (i=0; g_pRelayList && (i<g_pRelayList->ulNumRelays); i++) {
for (j=0; pOldRelayList && (j<pOldRelayList->ulNumRelays); j++) {
if (g_pRelayList->arrRelay[i].sinAddress.sin_addr.s_addr
== pOldRelayList->arrRelay[j].sinAddress.sin_addr.s_addr) {
break;
}
}
if (pOldRelayList && (j<pOldRelayList->ulNumRelays)) {
// update the route if the metric has changed
if (g_pRelayList->arrRelay[i].ulMetric
!= pOldRelayList->arrRelay[j].ulMetric) {
AddOrUpdate6to4Relay(&g_pRelayList->arrRelay[i]);
}
g_pRelayList->arrRelay[i].sin6Address = pOldRelayList->arrRelay[j].sin6Address;
} else {
// add a relay
AddOrUpdate6to4Relay(&g_pRelayList->arrRelay[i]);
}
}
for (j=0; pOldRelayList && (j<pOldRelayList->ulNumRelays); j++) {
for (i=0; g_pRelayList && (i<g_pRelayList->ulNumRelays); i++) {
if (g_pRelayList->arrRelay[i].sinAddress.sin_addr.s_addr ==
pOldRelayList->arrRelay[j].sinAddress.sin_addr.s_addr) {
break;
}
}
if (!g_pRelayList || (i == g_pRelayList->ulNumRelays)) {
// delete a relay
Delete6to4Relay(&pOldRelayList->arrRelay[j]);
}
}
FreeRelayList(&pOldRelayList);
TraceLeave("OnResolutionTimeout");
LEAVE_API();
return dwErr;
}
BOOL
WINAPI
GetPreferredSource(
IN IN_ADDR ipDestination,
OUT PIN_ADDR pipSource)
{
SOCKADDR_IN sinDestination, sinSource;
DWORD BytesReturned;
if (ipDestination.s_addr == htonl(INADDR_LOOPBACK)) {
// This is what we would get back from the routing interface query!
*pipSource = ipDestination;
return TRUE;
}
memset(&sinDestination, 0, sizeof(SOCKADDR_IN));
sinDestination.sin_family = AF_INET;
sinDestination.sin_addr = ipDestination;
if (WSAIoctl(g_sIPv4Socket, SIO_ROUTING_INTERFACE_QUERY,
&sinDestination, sizeof(SOCKADDR_IN),
&sinSource, sizeof(SOCKADDR_IN),
&BytesReturned, NULL, NULL) == SOCKET_ERROR) {
Trace1(ERR, _T("ioctl error %d"), WSAGetLastError());
return FALSE;
}
*pipSource = sinSource.sin_addr;
return TRUE;
}
VOID
WINAPI
SetIsatapRouterAddress()
{
DWORD dwErr = NO_ERROR;
struct addrinfo hints, *addrs;
IN_ADDR ipNewRouter, ipNewToken;
// Default to INADDR_ANY.
ipNewRouter.s_addr = INADDR_ANY;
ipNewToken.s_addr = INADDR_ANY;
// Reset the ISATAP router address if the service is shutting down
// or if the ISATAP resolution has been disabled.
if ((g_stService == ENABLED) &&
(g_GlobalState.stIsatapResolutionState == ENABLED)) {
// Resolve the isatap name to an IPv4 address (IsatapRouter).
ZeroMemory(&hints, sizeof(hints));
hints.ai_family = PF_INET;
dwErr = GetAddrInfoW(g_GlobalSettings.pwszIsatapRouterName, NULL,
&hints, &addrs);
if (dwErr == NO_ERROR) {
ipNewRouter = ((LPSOCKADDR_IN)addrs->ai_addr)->sin_addr;
freeaddrinfo(addrs);
addrs = NULL;
// Determine the preferred source address (IsatapToken).
if (!GetPreferredSource(ipNewRouter, &ipNewToken)) {
// What use is the IsatapRouter that cannot be reached?
ipNewRouter.s_addr = INADDR_ANY;
}
} else {
Trace2(ERR, _T("GetAddrInfoW(%s) returned error %d"),
g_GlobalSettings.pwszIsatapRouterName, dwErr);
}
}
// Compare the new addresses to the old addresses
// and if they are different, update the stack
if ((ipNewRouter.s_addr != g_ipIsatapRouter.s_addr) ||
(ipNewToken.s_addr != g_ipIsatapToken.s_addr)) {
g_ipIsatapRouter = ipNewRouter;
g_ipIsatapToken = ipNewToken;
UpdateRouterLinkAddress(V4_COMPAT_IFINDEX, ipNewToken, ipNewRouter);
}
}
DWORD
WINAPI
OnIsatapResolutionTimeout(
IN PVOID lpData,
IN BOOLEAN Reason)
{
ENTER_API();
TraceEnter("OnIsatapResolutionTimeout");
if (g_stService == DISABLED) {
TraceLeave("OnIsatapResolutionTimeout (disabled)");
LEAVE_API();
return NO_ERROR;
}
SetIsatapRouterAddress();
TraceLeave("OnIsatapResolutionTimeout");
LEAVE_API();
return NO_ERROR;
}
////////////////////////////////////////////////////////////////
// Routing-related subroutines
////////////////////////////////////////////////////////////////
PIF_SETTINGS
FindInterfaceSettings(
IN WCHAR *pwszAdapterName,
IN IF_SETTINGS_LIST *pList);
//
// Decide whether routing will be enabled at all
//
STATE
GetGlobalRoutingState(
IN IF_LIST *pIfList)
{
DWORD dwErr;
GUID guid;
// If routing is explicitly enabled or disabled, use that
if (g_GlobalSettings.stEnableRouting != AUTOMATIC) {
return g_GlobalSettings.stEnableRouting;
}
// Disable routing if there is no private interface used by ICS
dwErr = RasQuerySharedPrivateLan(&guid);
if (dwErr != NO_ERROR) {
return DISABLED;
}
// Disable routing if there are no global IPv4 addresses
if (!pIfList || !pIfList->ulNumScopedAddrs[IPV4_SCOPE_GLOBAL]) {
return DISABLED;
}
return ENABLED;
}
//
// Decide whether a given interface is one we should treat as
// a private link to be a router on.
//
// Called by: UpdateInterfaceRoutingState, MakeInterfaceList
STATE
GetInterfaceRoutingState(
IN PIF_INFO pIf) // potential private interface
{
PIF_SETTINGS pIfSettings;
STATE stEnableRouting = AUTOMATIC;
DWORD dwErr;
GUID guid;
UNICODE_STRING usGuid;
WCHAR buffer[MAX_INTERFACE_NAME_LEN];
if (g_GlobalSettings.stEnableRouting == DISABLED) {
stEnableRouting = g_GlobalSettings.stEnableRouting;
} else {
pIfSettings = FindInterfaceSettings(pIf->pwszAdapterName,
g_pInterfaceSettingsList);
if (pIfSettings) {
stEnableRouting = pIfSettings->stEnableRouting;
}
}
if (stEnableRouting != AUTOMATIC) {
return stEnableRouting;
}
//
// Enable routing if this is the private interface used by ICS
//
dwErr = RasQuerySharedPrivateLan(&guid);
if (dwErr != NO_ERROR) {
// no private interface
return DISABLED;
}
usGuid.Buffer = buffer;
usGuid.MaximumLength = MAX_INTERFACE_NAME_LEN;
dwErr = RtlStringFromGUID(&guid, &usGuid);
if (dwErr != NO_ERROR) {
// no private interface
return DISABLED;
}
Trace1(ERR, _T("ICS private interface: %ls"), usGuid.Buffer);
//
// Compare guid to pIf->pwszAdapterName
//
// This must be done using a case-insensitive comparison since
// GetAdaptersInfo() returns GUID strings with upper-case letters
// while RtlGetStringFromGUID uses lower-case letters.
//
if (!_wcsicmp(pIf->pwszAdapterName, usGuid.Buffer)) {
return ENABLED;
}
return DISABLED;
}
// Called by: Configure6to4Subnets, Unconfigure6to4Subnets
VOID
Create6to4Prefixes(
OUT IN6_ADDR *pSubnetPrefix,
OUT IN6_ADDR *pSiteLocalPrefix,
IN IN_ADDR *ipOurAddr, // public address
IN ULONG ulIfIndex) // private interface
{
//
// Create a subnet prefix for the interface,
// using the interface index as the subnet number.
//
memset(pSubnetPrefix, 0, sizeof(IN6_ADDR));
pSubnetPrefix->s6_addr[0] = 0x20;
pSubnetPrefix->s6_addr[1] = 0x02;
memcpy(&pSubnetPrefix->s6_addr[2], ipOurAddr, sizeof(IN_ADDR));
pSubnetPrefix->s6_addr[6] = HIBYTE(ulIfIndex);
pSubnetPrefix->s6_addr[7] = LOBYTE(ulIfIndex);
//
// Create a site-local prefix for the interface,
// using the interface index as the subnet number.
//
memset(pSiteLocalPrefix, 0, sizeof(IN6_ADDR));
pSiteLocalPrefix->s6_addr[0] = 0xfe;
pSiteLocalPrefix->s6_addr[1] = 0xc0;
pSiteLocalPrefix->s6_addr[6] = HIBYTE(ulIfIndex);
pSiteLocalPrefix->s6_addr[7] = LOBYTE(ulIfIndex);
}
// Called by: EnableInterfaceRouting, Add6to4Address
void
Configure6to4Subnets(
IN ULONG ulIfIndex, // private interface
IN PSUBNET_CONTEXT pSubnet) // subnet info, incl. public address
{
IN6_ADDR SubnetPrefix;
IN6_ADDR SiteLocalPrefix;
Create6to4Prefixes(&SubnetPrefix, &SiteLocalPrefix, &pSubnet->V4Addr,
ulIfIndex);
//
// Configure the subnet route.
//
ConfigureRouteTableUpdate(&SubnetPrefix, 64,
ulIfIndex, &in6addr_any,
pSubnet->Publish,
pSubnet->Publish,
pSubnet->ValidLifetime,
pSubnet->PreferredLifetime,
((g_GlobalSettings.stEnableSiteLocals == ENABLED) ? 48 : 0),
SUBNET_ROUTE_METRIC);
if (g_GlobalSettings.stEnableSiteLocals == ENABLED) {
ConfigureRouteTableUpdate(&SiteLocalPrefix, 64,
ulIfIndex, &in6addr_any,
pSubnet->Publish,
pSubnet->Publish,
pSubnet->ValidLifetime,
pSubnet->PreferredLifetime,
0,
SITELOCAL_ROUTE_METRIC);
}
}
// Called by: DisableInterfaceRouting, Delete6to4Address
void
Unconfigure6to4Subnets(
IN ULONG ulIfIndex, // private interface
IN PSUBNET_CONTEXT pSubnet) // subnet info, inc. public address
{
IN6_ADDR SubnetPrefix;
IN6_ADDR SiteLocalPrefix;
Create6to4Prefixes(&SubnetPrefix, &SiteLocalPrefix, &pSubnet->V4Addr,
ulIfIndex);
//
// Give the 6to4 route a zero lifetime, making it invalid.
// If we are a router, continue to publish the 6to4 route
// until we have disabled routing. This will allow
// the last Router Advertisements to go out with the prefix.
//
ConfigureRouteTableUpdate(&SubnetPrefix, 64,
ulIfIndex, &in6addr_any,
pSubnet->Publish, // Publish.
pSubnet->Publish, // Immortal.
pSubnet->ValidLifetime,
pSubnet->PreferredLifetime,
0, 0);
if (g_GlobalSettings.stEnableSiteLocals == ENABLED) {
ConfigureRouteTableUpdate(&SiteLocalPrefix, 64,
ulIfIndex, &in6addr_any,
pSubnet->Publish, // Publish.
pSubnet->Publish, // Immortal.
pSubnet->ValidLifetime,
pSubnet->PreferredLifetime,
0, 0);
}
}
#define PUBLIC_ZONE_ID 1
#define PRIVATE_ZONE_ID 2
// Called by: EnableRouting, DisableRouting, EnableInterfaceRouting,
// DisableInterfaceRouting
DWORD
ConfigureInterfaceUpdate(
IN u_int Interface,
IN int Advertises,
IN int Forwards)
{
IPV6_INFO_INTERFACE Update;
DWORD Result;
IPV6_INIT_INFO_INTERFACE(&Update);
Update.This.Index = Interface;
Update.Advertises = Advertises;
Update.Forwards = Forwards;
if (Advertises == TRUE) {
Update.ZoneIndices[ADE_SITE_LOCAL] = PRIVATE_ZONE_ID;
Update.ZoneIndices[ADE_ADMIN_LOCAL] = PRIVATE_ZONE_ID;
Update.ZoneIndices[ADE_SUBNET_LOCAL] = PRIVATE_ZONE_ID;
} else if (Advertises == FALSE) {
Update.ZoneIndices[ADE_SITE_LOCAL] = PUBLIC_ZONE_ID;
Update.ZoneIndices[ADE_ADMIN_LOCAL] = PUBLIC_ZONE_ID;
Update.ZoneIndices[ADE_SUBNET_LOCAL] = PUBLIC_ZONE_ID;
}
Result = UpdateInterface(&Update);
Trace4(ERR, _T("UpdateInterface if=%d adv=%d fwd=%d result=%d"),
Interface, Advertises, Forwards, Result);
return Result;
}
// Called by: UpdateGlobalRoutingState
VOID
EnableRouting()
{
SOCKADDR_IN6 AnycastAddress;
int i;
LPSOCKADDR_IN pOurAddr;
TraceEnter("EnableRouting");
//
// Enable forwarding on the tunnel pseudo-interfaces.
//
ConfigureInterfaceUpdate(SIX_TO_FOUR_IFINDEX, -1, TRUE);
ConfigureInterfaceUpdate(V4_COMPAT_IFINDEX, -1, TRUE);
//
// Add anycast addresses for all 6to4 addresses
//
for (i=0; i<g_pPublicAddressList->iAddressCount; i++) {
pOurAddr = (LPSOCKADDR_IN)g_pPublicAddressList->Address[i].lpSockaddr;
Make6to4AnycastAddress(&AnycastAddress, pOurAddr);
ConfigureAddressUpdate(SIX_TO_FOUR_IFINDEX, &AnycastAddress, INFINITE_LIFETIME,
ADE_ANYCAST, PREFIX_CONF_WELLKNOWN,
IID_CONF_WELLKNOWN);
}
g_GlobalState.stRoutingState = ENABLED;
TraceLeave("EnableRouting");
}
// Called by: UpdateGlobalRoutingState
VOID
DisableRouting()
{
SOCKADDR_IN6 AnycastAddress;
int i;
LPSOCKADDR_IN pOurAddr;
DWORD dwErr;
TraceEnter("DisableRouting");
//
// Disable forwarding on the tunnel pseudo-interfaces.
//
ConfigureInterfaceUpdate(SIX_TO_FOUR_IFINDEX, -1, FALSE);
ConfigureInterfaceUpdate(V4_COMPAT_IFINDEX, -1, FALSE);
//
// Remove anycast addresses for all 6to4 addresses
//
for (i=0; i<g_pPublicAddressList->iAddressCount; i++) {
pOurAddr = (LPSOCKADDR_IN)g_pPublicAddressList->Address[i].lpSockaddr;
Make6to4AnycastAddress(&AnycastAddress, pOurAddr);
dwErr = ConfigureAddressUpdate(SIX_TO_FOUR_IFINDEX, &AnycastAddress, 0,
ADE_ANYCAST, PREFIX_CONF_WELLKNOWN,
IID_CONF_WELLKNOWN);
}
g_GlobalState.stRoutingState = DISABLED;
TraceLeave("DisableRouting");
}
// Called by: UpdateInterfaceRoutingState
VOID
EnableInterfaceRouting(
IN PIF_INFO pIf, // private interface
IN PADDR_LIST pPublicAddressList) // public address list
{
int i;
LPSOCKADDR_IN pOurAddr;
SUBNET_CONTEXT Subnet;
Trace2(ERR, _T("Enabling routing on interface %d: %ls"),
pIf->ulIPv6IfIndex, pIf->pwszAdapterName);
ConfigureInterfaceUpdate(pIf->ulIPv6IfIndex, TRUE, TRUE);
// For each public address
for (i=0; i<pPublicAddressList->iAddressCount; i++) {
pOurAddr = (LPSOCKADDR_IN)pPublicAddressList->Address[i].lpSockaddr;
Subnet.V4Addr = pOurAddr->sin_addr;
Subnet.Publish = TRUE;
Subnet.ValidLifetime = 2 * DAYS;
Subnet.PreferredLifetime = 30 * MINUTES;
Configure6to4Subnets(pIf->ulIPv6IfIndex, &Subnet);
}
pIf->stRoutingState = ENABLED;
}
// Called by: PreUpdateInterfaceRoutingState, UninitializeInterfaces
BOOL
PreDisableInterfaceRouting(
IN PIF_INFO pIf, // private interface
IN PADDR_LIST pPublicAddressList)
{
int i;
LPSOCKADDR_IN pOurAddr;
SUBNET_CONTEXT Subnet;
Trace1(ERR, _T("Pre-Disabling routing on interface %d"),
pIf->ulIPv6IfIndex);
//
// For each public address, publish RA saying we're going away
//
for (i=0; i<pPublicAddressList->iAddressCount; i++) {
pOurAddr = (LPSOCKADDR_IN)pPublicAddressList->Address[i].lpSockaddr;
Subnet.V4Addr = pOurAddr->sin_addr;
Subnet.Publish = TRUE;
Subnet.ValidLifetime = Subnet.PreferredLifetime = 0;
Unconfigure6to4Subnets(pIf->ulIPv6IfIndex, &Subnet);
}
return (pPublicAddressList->iAddressCount > 0);
}
// Called by: UpdateInterfaceRoutingState, UninitializeInterfaces
VOID
DisableInterfaceRouting(
IN PIF_INFO pIf, // private interface
IN PADDR_LIST pPublicAddressList)
{
int i;
LPSOCKADDR_IN pOurAddr;
SUBNET_CONTEXT Subnet;
Trace1(ERR, _T("Disabling routing on interface %d"), pIf->ulIPv6IfIndex);
ConfigureInterfaceUpdate(pIf->ulIPv6IfIndex, FALSE, FALSE);
//
// For each public address, unconfigure 6to4 subnets
//
for (i=0; i<pPublicAddressList->iAddressCount; i++) {
pOurAddr = (LPSOCKADDR_IN)pPublicAddressList->Address[i].lpSockaddr;
Subnet.V4Addr = pOurAddr->sin_addr;
Subnet.Publish = FALSE;
Subnet.ValidLifetime = Subnet.PreferredLifetime = 0;
Unconfigure6to4Subnets(pIf->ulIPv6IfIndex, &Subnet);
}
pIf->stRoutingState = DISABLED;
}
BOOL // TRUE if need to sleep
PreUpdateInterfaceRoutingState(
IN PIF_INFO pIf, // private interface
IN PADDR_LIST pPublicAddressList)
{
STATE stIfRoutingState = GetInterfaceRoutingState(pIf);
if (pIf->stRoutingState == stIfRoutingState) {
return FALSE;
}
if (!(stIfRoutingState == ENABLED)) {
return PreDisableInterfaceRouting(pIf, pPublicAddressList);
}
return FALSE;
}
//
// Update the current state of an interface (i.e. whether or not it's a
// private interface on which we're serving as a router) according to
// configuration and whether IPv4 global addresses exist on the interface.
//
// Called by: UpdateGlobalRoutingState, OnConfigChange
VOID
UpdateInterfaceRoutingState(
IN PIF_INFO pIf, // private interface
IN PADDR_LIST pPublicAddressList)
{
STATE stIfRoutingState = GetInterfaceRoutingState(pIf);
if (pIf->stRoutingState == stIfRoutingState) {
return;
}
if (stIfRoutingState == ENABLED) {
EnableInterfaceRouting(pIf, pPublicAddressList);
} else {
DisableInterfaceRouting(pIf, pPublicAddressList);
}
}
BOOL
PreUpdateGlobalRoutingState()
{
ULONG i;
PIF_LIST pList = g_pInterfaceList;
BOOL bWait = FALSE;
if (pList == NULL) {
return FALSE;
}
for (i=0; i<pList->ulNumInterfaces; i++) {
bWait |= PreUpdateInterfaceRoutingState(&pList->arrIf[i],
g_pPublicAddressList);
}
return bWait;
}
// Called by: OnConfigChange, OnChangeInterfaceInfo
VOID
UpdateGlobalRoutingState()
{
ULONG i;
PIF_LIST pList = g_pInterfaceList;
STATE stNewRoutingState;
stNewRoutingState = GetGlobalRoutingState(pList);
if (g_GlobalState.stRoutingState != stNewRoutingState) {
if (stNewRoutingState == ENABLED) {
EnableRouting();
} else {
DisableRouting();
}
}
if (pList == NULL) {
return;
}
for (i=0; i<pList->ulNumInterfaces; i++) {
UpdateInterfaceRoutingState(&pList->arrIf[i], g_pPublicAddressList);
}
}
////////////////////////////////////////////////////////////////
// Interface-related subroutines
////////////////////////////////////////////////////////////////
PIF_SETTINGS
FindInterfaceSettings(
IN WCHAR *pwszAdapterName,
IN IF_SETTINGS_LIST *pList)
{
ULONG i;
PIF_SETTINGS pIf;
if (pList == NULL) {
return NULL;
}
for (i=0; i<pList->ulNumInterfaces; i++) {
pIf = &pList->arrIf[i];
if (wcscmp(pIf->pwszAdapterName, pwszAdapterName)) {
return pIf;
}
}
return NULL;
}
PIF_INFO
FindInterfaceInfo(
IN WCHAR *pwszAdapterName,
IN IF_LIST *pList)
{
ULONG i;
PIF_INFO pIf;
if (pList == NULL) {
return NULL;
}
for (i=0; i<pList->ulNumInterfaces; i++) {
pIf = &pList->arrIf[i];
if (!wcscmp(pIf->pwszAdapterName, pwszAdapterName)) {
return pIf;
}
}
return NULL;
}
DWORD NTAPI
OnChangeInterfaceInfo(
IN PVOID Context,
IN BOOLEAN TimedOut
);
VOID
StopAddressChangeNotification()
{
if (g_hAddressChangeWaitHandle) {
//
// Block until we're sure that the address change callback isn't
// still running.
//
LEAVE_API();
UnregisterWaitEx(g_hAddressChangeWaitHandle, INVALID_HANDLE_VALUE);
ENTER_API();
//
// Release the event we counted for RegisterWaitForSingleObject
//
DecEventCount("AC:StopIpv4AddressChangeNotification");
g_hAddressChangeWaitHandle = NULL;
}
if (g_hAddressChangeEvent) {
CloseHandle(g_hAddressChangeEvent);
g_hAddressChangeEvent = NULL;
}
}
VOID
StartAddressChangeNotification()
{
ULONG Error;
BOOL bOk;
HANDLE TcpipHandle;
TraceEnter("StartAddressChangeNotification");
//
// Create an event on which to receive notifications
// and register a callback routine to be invoked if the event is signalled.
// Then request notification of address changes on the event.
//
if (!g_hAddressChangeEvent) {
g_hAddressChangeEvent = CreateEvent(NULL,
FALSE,
FALSE,
NULL);
if (g_hAddressChangeEvent == NULL) {
goto Error;
}
//
// Count the following register as an event.
//
IncEventCount("AC:StartIpv4AddressChangeNotification");
bOk = RegisterWaitForSingleObject(&g_hAddressChangeWaitHandle,
g_hAddressChangeEvent,
OnChangeInterfaceInfo,
NULL,
INFINITE,
0);
if (!bOk) {
DecEventCount("AC:StartIpv4AddressChangeNotification");
goto Error;
}
}
ZeroMemory(&g_hAddressChangeOverlapped, sizeof(OVERLAPPED));
g_hAddressChangeOverlapped.hEvent = g_hAddressChangeEvent;
Error = NotifyAddrChange(&TcpipHandle, &g_hAddressChangeOverlapped);
if (Error != ERROR_IO_PENDING) {
goto Error;
}
return;
Error:
//
// A failure has occurred, so cleanup and quit.
// We proceed in this case without notification of address changes.
//
StopAddressChangeNotification();
TraceLeave("StartAddressChangeNotification");
}
//
// Convert an "adapter" list to an "interface" list and store the result in
// the global g_pInterfaceList.
//
DWORD
MakeInterfaceList(
IN PIP_ADAPTER_INFO pAdapterInfo)
{
DWORD dwErr = NO_ERROR;
ULONG ulNumInterfaces = 0, ulSize;
PIP_ADAPTER_INFO pAdapter;
PIF_INFO pIf;
IPV6_INFO_INTERFACE *pIfStackInfo;
// count adapters
for (pAdapter=pAdapterInfo; pAdapter; pAdapter=pAdapter->Next) {
ulNumInterfaces++;
}
// allocate enough space
ulSize = FIELD_OFFSET(IF_LIST, arrIf[ulNumInterfaces]);
g_pInterfaceList = MALLOC(ulSize);
if (g_pInterfaceList == NULL) {
return GetLastError();
}
// fill in list
g_pInterfaceList->ulNumInterfaces = ulNumInterfaces;
ZeroMemory(g_pInterfaceList->ulNumScopedAddrs,
sizeof(ULONG) * NUM_IPV4_SCOPES);
ulNumInterfaces = 0;
for (pAdapter=pAdapterInfo; pAdapter; pAdapter=pAdapter->Next) {
pIf = &g_pInterfaceList->arrIf[ulNumInterfaces];
ConvertOemToUnicode(pAdapter->AdapterName, pIf->pwszAdapterName,
MAX_ADAPTER_NAME);
Trace1(FSM, _T("Adding interface %ls"), pIf->pwszAdapterName);
dwErr = MakeAddressList(&pAdapter->IpAddressList,
&pIf->pAddressList, &pIf->ulNumGlobals,
g_pInterfaceList->ulNumScopedAddrs);
pIfStackInfo = GetInterfaceStackInfo(pIf->pwszAdapterName);
if (pIfStackInfo) {
pIf->ulIPv6IfIndex = pIfStackInfo->This.Index;
} else {
pIf->ulIPv6IfIndex = 0;
}
FREE(pIfStackInfo);
pIf->stRoutingState = DISABLED;
ulNumInterfaces++;
}
return dwErr;
}
VOID
FreeInterfaceList(
IN OUT PIF_LIST *ppList)
{
ULONG i;
if (*ppList == NULL) {
return;
}
for (i=0; i<(*ppList)->ulNumInterfaces; i++) {
FreeAddressList( &(*ppList)->arrIf[i].pAddressList );
}
FREE(*ppList);
*ppList = NULL;
}
DWORD
InitializeInterfaces()
{
g_pInterfaceList = NULL;
return NO_ERROR;
}
VOID
ProcessInterfaceStateChange(
IN ADDR_LIST CONST *pAddressList,
IN ADDR_LIST *pOldAddressList,
IN PIF_LIST pOldInterfaceList,
IN GLOBAL_STATE *pOldState,
IN OUT BOOL *pbNeedDelete)
{
INT j,k;
LPSOCKADDR_IN pAddr;
// For each new global address not in old list,
// add a 6to4 address
for (j=0; j<pAddressList->iAddressCount; j++) {
pAddr = (LPSOCKADDR_IN)pAddressList->Address[j].lpSockaddr;
Trace1(FSM, _T("Checking for new address %d.%d.%d.%d"),
PRINT_IPADDR(pAddr->sin_addr.s_addr));
// See if address is in old list
for (k=0; k<pOldAddressList->iAddressCount; k++) {
if (pAddr->sin_addr.s_addr == ((LPSOCKADDR_IN)pOldAddressList->Address[k].lpSockaddr)->sin_addr.s_addr) {
break;
}
}
// If so, continue
if (k<pOldAddressList->iAddressCount) {
continue;
}
// Add a 6to4 address, and use it for routing if enabled
Add6to4Address(pAddr, g_pInterfaceList,
g_GlobalState.stRoutingState);
}
// For each old global address not in the new list,
// delete a 6to4 address
for (k=0; k<pOldAddressList->iAddressCount; k++) {
pAddr = (LPSOCKADDR_IN)pOldAddressList->Address[k].lpSockaddr;
Trace1(FSM, _T("Checking for old address %d.%d.%d.%d"),
PRINT_IPADDR(pAddr->sin_addr.s_addr));
// See if address is in new list
for (j=0; j<pAddressList->iAddressCount; j++) {
if (((LPSOCKADDR_IN)pAddressList->Address[j].lpSockaddr)->sin_addr.s_addr
== pAddr->sin_addr.s_addr) {
break;
}
}
// If so, continue
if (j<pAddressList->iAddressCount) {
continue;
}
// Prepare to delete the 6to4 address
PreDelete6to4Address(pAddr, pOldInterfaceList,
pOldState->stRoutingState);
*pbNeedDelete = TRUE;
}
}
VOID
FinishInterfaceStateChange(
IN ADDR_LIST CONST *pAddressList,
IN ADDR_LIST *pOldAddressList,
IN PIF_LIST pOldInterfaceList,
IN GLOBAL_STATE *pOldState)
{
INT j,k;
LPSOCKADDR_IN pAddr;
// For each old global address not in the new list,
// delete a 6to4 address
for (k=0; k<pOldAddressList->iAddressCount; k++) {
pAddr = (LPSOCKADDR_IN)pOldAddressList->Address[k].lpSockaddr;
Trace1(FSM, _T("Checking for old address %d.%d.%d.%d"),
PRINT_IPADDR(pAddr->sin_addr.s_addr));
// See if address is in new list
for (j=0; j<pAddressList->iAddressCount; j++) {
if (((LPSOCKADDR_IN)pAddressList->Address[j].lpSockaddr)->sin_addr.s_addr
== pAddr->sin_addr.s_addr) {
break;
}
}
// If so, continue
if (j<pAddressList->iAddressCount) {
continue;
}
// Prepare to delete the 6to4 address
Delete6to4Address(pAddr, pOldInterfaceList,
pOldState->stRoutingState);
}
}
// This routine is invoked when a change to the set of local IPv4 addressed
// is signalled. It is responsible for updating the bindings of the
// private and public interfaces, and re-requesting change notification.
//
DWORD NTAPI
OnChangeInterfaceInfo(
IN PVOID Context,
IN BOOLEAN TimedOut)
{
PIF_INFO pIf, pOldIf;
ULONG i, ulSize = 0;
PIP_ADAPTER_INFO pAdapterInfo = NULL;
PIF_LIST pOldInterfaceList;
DWORD dwErr = NO_ERROR;
STATE stOld6to4State, stNew6to4State;
ADDR_LIST *pAddressList, *pOldAddressList;
GLOBAL_SETTINGS OldSettings;
GLOBAL_STATE OldState;
BOOL bNeedDelete = FALSE, bWait = FALSE;
ENTER_API();
TraceEnter("OnChangeInterfaceInfo");
if (g_stService == DISABLED) {
Trace0(FSM, L"Service disabled");
goto Done;
}
OldSettings = g_GlobalSettings; // struct copy
OldState = g_GlobalState; // struct copy
//
// Get the new set of IPv4 addresses on interfaces
//
for (;;) {
dwErr = GetAdaptersInfo(pAdapterInfo, &ulSize);
if (dwErr == ERROR_SUCCESS) {
break;
}
if (dwErr == ERROR_NO_DATA) {
dwErr = ERROR_SUCCESS;
break;
}
if (pAdapterInfo) {
FREE(pAdapterInfo);
pAdapterInfo = NULL;
}
if (dwErr != ERROR_BUFFER_OVERFLOW) {
dwErr = GetLastError();
goto Retry;
}
pAdapterInfo = MALLOC(ulSize);
if (pAdapterInfo == NULL) {
dwErr = GetLastError();
goto Retry;
}
}
pOldInterfaceList = g_pInterfaceList;
g_pInterfaceList = NULL;
MakeInterfaceList(pAdapterInfo);
if (pAdapterInfo) {
FREE(pAdapterInfo);
pAdapterInfo = NULL;
}
//
// First update global address list
//
// For each interface in the new list...
for (i=0; i<g_pInterfaceList->ulNumInterfaces; i++) {
pIf = &g_pInterfaceList->arrIf[i];
pAddressList = pIf->pAddressList;
pOldIf = FindInterfaceInfo(pIf->pwszAdapterName,
pOldInterfaceList);
pOldAddressList = (pOldIf)? pOldIf->pAddressList : &EmptyAddressList;
if (pOldIf) {
pIf->stRoutingState = pOldIf->stRoutingState;
}
ProcessInterfaceStateChange(pAddressList, pOldAddressList,
pOldInterfaceList, &OldState, &bNeedDelete);
}
// For each old interface not in the new list,
// delete information.
for (i=0; pOldInterfaceList && (i<pOldInterfaceList->ulNumInterfaces); i++){
pOldIf = &pOldInterfaceList->arrIf[i];
pOldAddressList = pOldIf->pAddressList;
pIf = FindInterfaceInfo(pOldIf->pwszAdapterName, g_pInterfaceList);
if (pIf) {
continue;
}
ProcessInterfaceStateChange(&EmptyAddressList, pOldAddressList,
pOldInterfaceList, &OldState, &bNeedDelete);
}
Trace2(FSM, _T("num globals=%d num publics=%d"),
g_pInterfaceList->ulNumScopedAddrs[IPV4_SCOPE_GLOBAL],
g_pPublicAddressList->iAddressCount);
//
// Create a route for the 6to4 prefix.
// This route causes packets sent to 6to4 addresses
// to be encapsulated and sent to the extracted v4 address.
//
stNew6to4State = (g_pInterfaceList->ulNumScopedAddrs[IPV4_SCOPE_GLOBAL] > 0)? ENABLED : DISABLED;
stOld6to4State = g_st6to4State;
if (stOld6to4State != stNew6to4State) {
if (stNew6to4State == DISABLED) {
//
// Give the 6to4 route a zero lifetime, making it invalid.
// If we are a router, continue to publish the 6to4 route
// until we have disabled routing. This will allow
// the last Router Advertisements to go out with the prefix.
//
ConfigureRouteTableUpdate(&SixToFourPrefix, 16,
SIX_TO_FOUR_IFINDEX, &in6addr_any,
(OldState.stRoutingState == ENABLED),
(OldState.stRoutingState == ENABLED),
0, 0, 0, 0);
//
// Do the same for the v4-compatible address route (if enabled).
//
if (OldSettings.stEnableV4Compat == ENABLED) {
ConfigureRouteTableUpdate(&in6addr_any, 96,
V4_COMPAT_IFINDEX, &in6addr_any,
(OldState.stRoutingState == ENABLED),
(OldState.stRoutingState == ENABLED),
0, 0, 0, 0);
}
} else {
//
// Configure the 6to4 route.
//
ConfigureRouteTableUpdate(&SixToFourPrefix, 16,
SIX_TO_FOUR_IFINDEX, &in6addr_any,
TRUE, // Publish.
TRUE, // Immortal.
2 * HOURS, // Valid lifetime.
30 * MINUTES, // Preferred lifetime.
0,
SIXTOFOUR_METRIC);
//
// Configure the v4-compatible address route (if enabled).
//
if (g_GlobalSettings.stEnableV4Compat == ENABLED) {
ConfigureRouteTableUpdate(&in6addr_any, 96,
V4_COMPAT_IFINDEX, &in6addr_any,
TRUE, // Publish.
TRUE, // Immortal.
2 * HOURS, // Valid lifetime.
30 * MINUTES, // Preferred lifetime.
0,
SIXTOFOUR_METRIC);
}
}
g_st6to4State = stNew6to4State;
dwErr = UpdateGlobalResolutionState(&OldSettings, &OldState);
}
bWait |= PreUpdateGlobalRoutingState();
//
// If needed, wait a bit to ensure that Router Advertisements
// carrying the zero lifetime prefixes get sent.
//
if (bWait || (bNeedDelete && (OldState.stRoutingState == ENABLED))) {
Sleep(2000);
}
UpdateGlobalRoutingState();
//
// Now finish removing the 6to4 addresses.
//
if (bNeedDelete) {
for (i=0; i<g_pInterfaceList->ulNumInterfaces; i++) {
pIf = &g_pInterfaceList->arrIf[i];
pAddressList = pIf->pAddressList;
pOldIf = FindInterfaceInfo(pIf->pwszAdapterName,
pOldInterfaceList);
pOldAddressList = (pOldIf)? pOldIf->pAddressList : &EmptyAddressList;
FinishInterfaceStateChange(pAddressList, pOldAddressList,
pOldInterfaceList, &OldState);
}
for (i=0; pOldInterfaceList && (i<pOldInterfaceList->ulNumInterfaces); i++){
pOldIf = &pOldInterfaceList->arrIf[i];
pOldAddressList = pOldIf->pAddressList;
pIf = FindInterfaceInfo(pOldIf->pwszAdapterName, g_pInterfaceList);
if (pIf) {
continue;
}
FinishInterfaceStateChange(&EmptyAddressList, pOldAddressList,
pOldInterfaceList, &OldState);
}
}
if ((stOld6to4State != stNew6to4State) && (stNew6to4State == DISABLED)) {
//
// Finish removing the 6to4 route.
//
ConfigureRouteTableUpdate(&SixToFourPrefix, 16,
SIX_TO_FOUR_IFINDEX, &in6addr_any,
FALSE, // Publish.
FALSE, // Immortal.
0, 0, 0, 0);
//
// Finish removing the v4-compatible address route (if enabled).
//
if (OldSettings.stEnableV4Compat == ENABLED) {
ConfigureRouteTableUpdate(&in6addr_any, 96,
V4_COMPAT_IFINDEX, &in6addr_any,
FALSE, // Publish.
FALSE, // Immortal.
0, 0, 0, 0);
}
}
FreeInterfaceList(&pOldInterfaceList);
Retry:
// Listen for the next address change
StartAddressChangeNotification();
Done:
TraceLeave("OnChangeInterfaceInfo");
LEAVE_API();
return dwErr;
}
// Note that this function can take over 2 seconds to complete if we're a
// router. (This is by design).
//
// Called by: Stop6to4
VOID
UninitializeInterfaces()
{
PIF_INFO pIf;
ULONG i;
int k;
ADDR_LIST *pAddressList;
LPSOCKADDR_IN pAddr;
TraceEnter("UninitializeInterfaces");
// Cancel the address change notification
StopIpv6AddressChangeNotification();
StopAddressChangeNotification();
// Since this is the first function called when stopping,
// the "old" global state/settings is in g_GlobalState/Settings.
if (g_GlobalSettings.stUndoOnStop == ENABLED) {
if (g_GlobalState.stRoutingState == ENABLED) {
//
// First announce we're going away
//
//
// Give the 6to4 route a zero lifetime, making it invalid.
// If we are a router, continue to publish the 6to4 route
// until we have disabled routing. This will allow
// the last Router Advertisements to go out with the prefix.
//
ConfigureRouteTableUpdate(&SixToFourPrefix, 16,
SIX_TO_FOUR_IFINDEX, &in6addr_any,
TRUE, // Publish
TRUE, // Immortal
0, 0, 0, 0);
//
// Do the same for the v4-compatible address route (if enabled).
//
if (g_GlobalSettings.stEnableV4Compat == ENABLED) {
ConfigureRouteTableUpdate(&in6addr_any, 96,
V4_COMPAT_IFINDEX, &in6addr_any,
TRUE, // Publish
TRUE, // Immortal
0, 0, 0, 0);
}
//
// Now do the same for subnets we're advertising
//
for (i=0; i<g_pInterfaceList->ulNumInterfaces; i++) {
pIf = &g_pInterfaceList->arrIf[i];
pAddressList = pIf->pAddressList;
// For each old global address not in the new list,
// delete a 6to4 address (see below)
Trace1(FSM, _T("Checking %d old addresses"),
pAddressList->iAddressCount);
for (k=0; k<pAddressList->iAddressCount; k++) {
pAddr = (LPSOCKADDR_IN)pAddressList->Address[k].lpSockaddr;
Trace1(FSM, _T("Checking for old address %d.%d.%d.%d"),
PRINT_IPADDR(pAddr->sin_addr.s_addr));
PreDelete6to4Address(pAddr, g_pInterfaceList,
g_GlobalState.stRoutingState);
}
if (pIf->stRoutingState == ENABLED) {
PreDisableInterfaceRouting(pIf, g_pPublicAddressList);
}
}
//
// Wait a bit to ensure that Router Advertisements
// carrying the zero lifetime prefixes get sent.
//
Sleep(2000);
}
//
// Delete the 6to4 and v4-compatible (if enabled) routes.
//
ConfigureRouteTableUpdate(&SixToFourPrefix, 16,
SIX_TO_FOUR_IFINDEX, &in6addr_any,
FALSE, // Publish.
FALSE, // Immortal.
0, 0, 0, 0);
if (g_GlobalSettings.stEnableV4Compat == ENABLED) {
ConfigureRouteTableUpdate(&in6addr_any, 96,
V4_COMPAT_IFINDEX, &in6addr_any,
FALSE, // Publish.
FALSE, // Immortal.
0, 0, 0, 0);
}
g_st6to4State = DISABLED;
//
// Delete 6to4 addresses
//
for (i=0; g_pInterfaceList && i<g_pInterfaceList->ulNumInterfaces; i++) {
pIf = &g_pInterfaceList->arrIf[i];
pAddressList = pIf->pAddressList;
// For each old global address not in the new list,
// delete a 6to4 address (see below)
Trace1(FSM, _T("Checking %d old addresses"),
pAddressList->iAddressCount);
for (k=0; k<pAddressList->iAddressCount; k++) {
pAddr = (LPSOCKADDR_IN)pAddressList->Address[k].lpSockaddr;
Trace1(FSM, _T("Checking for old address %d.%d.%d.%d"),
PRINT_IPADDR(pAddr->sin_addr.s_addr));
Delete6to4Address(pAddr, g_pInterfaceList,
g_GlobalState.stRoutingState);
}
// update the IPv6 routing state
if (pIf->stRoutingState == ENABLED) {
DisableInterfaceRouting(pIf, g_pPublicAddressList);
}
}
}
// Free the "old list"
FreeInterfaceList(&g_pInterfaceList);
TraceLeave("UninitializeInterfaces");
}
////////////////////////////////////////////////////////////////
// Event-processing functions
////////////////////////////////////////////////////////////////
// Get an integer value from the registry
ULONG
GetInteger(
IN HKEY hKey,
IN LPCTSTR lpName,
IN ULONG ulDefault)
{
DWORD dwErr, dwType;
ULONG ulSize, ulValue;
ulSize = sizeof(ulValue);
dwErr = RegQueryValueEx(hKey, lpName, NULL, &dwType, (PBYTE)&ulValue,
&ulSize);
if (dwErr != ERROR_SUCCESS) {
return ulDefault;
}
if (dwType != REG_DWORD) {
return ulDefault;
}
if (ulValue == DEFAULT) {
return ulDefault;
}
return ulValue;
}
// Get a string value from the registry
VOID
GetString(
IN HKEY hKey,
IN LPCTSTR lpName,
IN PWCHAR pBuff,
IN ULONG ulLength,
IN PWCHAR pDefault)
{
DWORD dwErr, dwType;
ULONG ulSize;
ulSize = ulLength;
dwErr = RegQueryValueEx(hKey, lpName, NULL, &dwType, (PBYTE)pBuff,
&ulSize);
if (dwErr != ERROR_SUCCESS) {
wcsncpy(pBuff, pDefault, ulLength);
return;
}
if (dwType != REG_SZ) {
wcsncpy(pBuff, pDefault, ulLength);
return;
}
if (pBuff[0] == L'\0') {
wcsncpy(pBuff, pDefault, ulLength);
return;
}
}
// called when # of 6to4 addresses becomes 0 or non-zero
// and when stEnableResolution setting changes
//
// Called by: OnConfigChange, OnChangeInterfaceInfo
DWORD
UpdateGlobalResolutionState(
IN GLOBAL_SETTINGS *pOldSettings,
IN GLOBAL_STATE *pOldState)
{
DWORD dwErr = NO_ERROR;
DWORD i;
// Decide whether relay name resolution should be enabled or not
if (g_GlobalSettings.stEnableResolution != AUTOMATIC) {
g_GlobalState.stResolutionState = g_GlobalSettings.stEnableResolution;
} else {
// Enable if we have any 6to4 addresses
g_GlobalState.stResolutionState = g_st6to4State;
}
if (g_GlobalState.stResolutionState == ENABLED) {
//
// Restart the resolution timer, even if it's already running
// and the name and interval haven't changed. We also get
// called when we first get an IP address, such as when we
// dial up to the Internet, and we want to immediately retry
// resolution at this point.
//
dwErr = RestartResolutionTimer(
0,
g_GlobalSettings.ulResolutionInterval,
&g_h6to4ResolutionTimer,
(WAITORTIMERCALLBACK) OnResolutionTimeout);
} else {
if (g_h6to4ResolutionTimer != INVALID_HANDLE_VALUE) {
//
// stop it
//
CancelResolutionTimer(&g_h6to4ResolutionTimer,
g_h6to4TimerCancelledEvent);
}
// Delete all existing relays
if (g_pRelayList) {
for (i=0; i<g_pRelayList->ulNumRelays; i++) {
Delete6to4Relay(&g_pRelayList->arrRelay[i]);
}
FreeRelayList(&g_pRelayList);
}
}
return dwErr;
}
// called when stEnableIsatapResolution setting changes
//
// Called by: OnConfigChange.
DWORD
UpdateGlobalIsatapResolutionState(
IN GLOBAL_SETTINGS *pOldSettings,
IN GLOBAL_STATE *pOldState)
{
DWORD dwErr = NO_ERROR;
g_GlobalState.stIsatapResolutionState =
g_GlobalSettings.stEnableIsatapResolution;
if (g_GlobalState.stIsatapResolutionState == ENABLED) {
dwErr = RestartResolutionTimer(
0,
g_GlobalSettings.ulIsatapResolutionInterval,
&g_hIsatapResolutionTimer,
(WAITORTIMERCALLBACK) OnIsatapResolutionTimeout);
} else {
if (g_hIsatapResolutionTimer != INVALID_HANDLE_VALUE) {
CancelResolutionTimer(&g_hIsatapResolutionTimer,
g_hIsatapTimerCancelledEvent);
}
// This resets the existing ISATAP router address.
SetIsatapRouterAddress();
}
return dwErr;
}
VOID
Update6over4State()
{
int i;
if (g_GlobalSettings.stEnable6over4 == ENABLED) {
// Create 6over4 interfaces
for (i=0; i<g_pPublicAddressList->iAddressCount; i++) {
if (g_pPublicAddressList->Address[i].ul6over4IfIndex) {
continue;
}
Trace1(ERR, _T("Creating interface for %d.%d.%d.%d"),
PRINT_IPADDR(((LPSOCKADDR_IN)g_pPublicAddressList->Address[i].lpSockaddr)->sin_addr.s_addr));
g_pPublicAddressList->Address[i].ul6over4IfIndex = Create6over4Interface(((LPSOCKADDR_IN)g_pPublicAddressList->Address[i].lpSockaddr)->sin_addr);
}
} else {
// Delete all 6over4 interfaces
for (i=0; i<g_pPublicAddressList->iAddressCount; i++) {
if (!g_pPublicAddressList->Address[i].ul6over4IfIndex) {
continue;
}
Trace1(ERR, _T("Deleting interface for %d.%d.%d.%d"),
PRINT_IPADDR(((LPSOCKADDR_IN)g_pPublicAddressList->Address[i].lpSockaddr)->sin_addr.s_addr));
DeleteInterface(g_pPublicAddressList->Address[i].ul6over4IfIndex);
g_pPublicAddressList->Address[i].ul6over4IfIndex = 0;
}
}
}
// Process a change to the state of whether v4-compatible addresses
// are enabled.
VOID
UpdateV4CompatState()
{
int i;
LPSOCKADDR_IN pIPv4Address;
SOCKADDR_IN6 OurAddress;
u_int AddressLifetime;
// Create or delete the route, and figure out the address lifetime.
if (g_GlobalSettings.stEnableV4Compat == ENABLED) {
ConfigureRouteTableUpdate(&in6addr_any, 96,
V4_COMPAT_IFINDEX, &in6addr_any,
TRUE, // Publish.
TRUE, // Immortal.
2 * HOURS, // Valid lifetime.
30 * MINUTES, // Preferred lifetime.
0,
SIXTOFOUR_METRIC);
AddressLifetime = INFINITE_LIFETIME;
} else {
ConfigureRouteTableUpdate(&in6addr_any, 96,
V4_COMPAT_IFINDEX, &in6addr_any,
FALSE, // Publish.
FALSE, // Immortal.
0, 0, 0, 0);
AddressLifetime = 0;
}
// Now go and update the lifetime of v4-compatible addresses,
// which will cause them to be added or deleted.
for (i=0; i<g_pPublicAddressList->iAddressCount; i++) {
pIPv4Address = (LPSOCKADDR_IN)g_pPublicAddressList->
Address[i].lpSockaddr;
if (GetIPv4Scope(pIPv4Address->sin_addr.s_addr) != IPV4_SCOPE_GLOBAL) {
continue;
}
MakeV4CompatibleAddress(&OurAddress, pIPv4Address);
ConfigureAddressUpdate(V4_COMPAT_IFINDEX, &OurAddress,
AddressLifetime, ADE_UNICAST,
PREFIX_CONF_WELLKNOWN, IID_CONF_LL_ADDRESS);
}
}
// Process a change to something in the registry
DWORD
OnConfigChange()
{
HKEY hGlobal, hInterfaces, hIf;
GLOBAL_SETTINGS OldSettings;
GLOBAL_STATE OldState;
DWORD dwErr, dwSize;
DWORD i;
WCHAR pwszAdapterName[MAX_ADAPTER_NAME];
BOOL bWait;
IF_SETTINGS *pIfSettings;
IF_INFO *pIfInfo;
ENTER_API();
TraceEnter("OnConfigChange");
if (g_stService == DISABLED) {
TraceLeave("OnConfigChange (disabled)");
LEAVE_API();
return NO_ERROR;
}
OldSettings = g_GlobalSettings; // struct copy
OldState = g_GlobalState; // struct copy
// Read global settings from the registry
dwErr = RegOpenKeyEx(HKEY_LOCAL_MACHINE, KEY_GLOBAL, 0, KEY_QUERY_VALUE,
&hGlobal);
g_GlobalSettings.stEnableRouting = GetInteger(hGlobal,
KEY_ENABLE_ROUTING,
DEFAULT_ENABLE_ROUTING);
g_GlobalSettings.stEnableResolution = GetInteger(hGlobal,
KEY_ENABLE_RESOLUTION,
DEFAULT_ENABLE_RESOLUTION);
g_GlobalSettings.stEnableIsatapResolution = GetInteger(hGlobal,
KEY_ENABLE_ISATAP_RESOLUTION,
DEFAULT_ENABLE_ISATAP_RESOLUTION);
g_GlobalSettings.stEnableSiteLocals = GetInteger(hGlobal,
KEY_ENABLE_SITELOCALS,
DEFAULT_ENABLE_SITELOCALS);
g_GlobalSettings.stEnable6over4 = GetInteger(hGlobal,
KEY_ENABLE_6OVER4,
DEFAULT_ENABLE_6OVER4);
g_GlobalSettings.stEnableV4Compat = GetInteger(hGlobal,
KEY_ENABLE_V4COMPAT,
DEFAULT_ENABLE_V4COMPAT);
g_GlobalSettings.ulResolutionInterval= GetInteger(hGlobal,
KEY_RESOLUTION_INTERVAL,
DEFAULT_RESOLUTION_INTERVAL);
g_GlobalSettings.ulIsatapResolutionInterval= GetInteger(hGlobal,
KEY_ISATAP_RESOLUTION_INTERVAL,
DEFAULT_ISATAP_RESOLUTION_INTERVAL);
g_GlobalSettings.stUndoOnStop = GetInteger(hGlobal,
KEY_UNDO_ON_STOP,
DEFAULT_UNDO_ON_STOP);
GetString(hGlobal, KEY_RELAY_NAME, g_GlobalSettings.pwszRelayName,
NI_MAXHOST, DEFAULT_RELAY_NAME);
GetString(hGlobal, KEY_ISATAP_ROUTER_NAME,
g_GlobalSettings.pwszIsatapRouterName,
NI_MAXHOST, DEFAULT_ISATAP_ROUTER_NAME);
RegCloseKey(hGlobal);
// If the global routing config has changed globally,
// update IPv6 routing on all known interfaces
bWait = PreUpdateGlobalRoutingState();
dwErr = UpdateGlobalResolutionState(&OldSettings, &OldState);
(void) UpdateGlobalIsatapResolutionState(&OldSettings, &OldState);
// Read interface settings from the registry
dwErr = RegOpenKeyEx(HKEY_LOCAL_MACHINE, KEY_INTERFACES, 0, KEY_QUERY_VALUE,
&hInterfaces);
// For each interface in the registry
for (i=0; ; i++) {
dwSize = sizeof(pwszAdapterName) / sizeof(WCHAR);
dwErr = RegEnumKeyEx(hInterfaces, i, pwszAdapterName, &dwSize,
NULL, NULL, NULL, NULL);
if (dwErr isnot NO_ERROR) {
break;
}
// Find settings
pIfSettings = FindInterfaceSettings(pwszAdapterName,
g_pInterfaceSettingsList);
if (pIfSettings) {
// Read interface settings
dwErr = RegOpenKeyEx(hInterfaces, pwszAdapterName, 0,
KEY_QUERY_VALUE, &hIf);
pIfSettings->stEnableRouting = GetInteger(hIf,
KEY_ENABLE_ROUTING,
DEFAULT_ENABLE_ROUTING);
RegCloseKey(hIf);
}
// If interface exists,
// update IPv6 routing on that interface
pIfInfo = FindInterfaceInfo(pwszAdapterName, g_pInterfaceList);
if (pIfInfo) {
PreUpdateInterfaceRoutingState(pIfInfo, g_pPublicAddressList);
}
}
RegCloseKey(hInterfaces);
if (bWait) {
Sleep(2000);
}
UpdateGlobalRoutingState();
if (g_GlobalSettings.stEnable6over4 != OldSettings.stEnable6over4) {
Update6over4State();
}
if (g_GlobalSettings.stEnableV4Compat != OldSettings.stEnableV4Compat) {
UpdateV4CompatState();
}
if (!QueueUpdateGlobalPortState(NULL)) {
Trace0(SOCKET, L"QueueUpdateGlobalPortState failed");
}
#if TEREDO
TeredoConfigurationChangeNotification();
#endif // TEREDO
TraceLeave("OnConfigChange");
LEAVE_API();
return NO_ERROR;
}
////////////////////////////////////////////////////////////////
// Startup/Shutdown-related functions
////////////////////////////////////////////////////////////////
// Called by: OnStartup
DWORD
Start6to4()
{
DWORD dwErr;
WSADATA wsaData;
IncEventCount("Start6to4");
g_stService = ENABLED;
//
// Initialize Winsock.
//
if (WSAStartup(MAKEWORD(2, 0), &wsaData)) {
Trace0(ERR, _T("WSAStartup failed\n"));
return GetLastError();
}
if (!InitIPv6Library()) {
dwErr = GetLastError();
Trace1(ERR, _T("InitIPv6Library failed with error %d"), dwErr);
return dwErr;
}
dwErr = InitEvents();
if (dwErr) {
return dwErr;
}
// Initialize the "old set" of config settings to the defaults
dwErr = InitializeGlobalInfo();
if (dwErr) {
return dwErr;
}
// Initialize the "old set" of interfaces (IPv4 addresses) to be empty
dwErr = InitializeInterfaces();
if (dwErr) {
return dwErr;
}
// Initialize the "old set" of relays to be empty
dwErr = InitializeRelays();
if (dwErr) {
return dwErr;
}
// Initialize the TCP proxy port list
InitializePorts();
#if TEREDO
// Initialize Teredo
dwErr = TeredoInitializeGlobals();
if (dwErr) {
return dwErr;
}
#endif // TEREDO
// Process a config change event
dwErr = OnConfigChange();
if (dwErr) {
return dwErr;
}
// Process an IPv4 address change event.
// This will also schedule a resolution timer expiration if needed.
dwErr = OnChangeInterfaceInfo(NULL, FALSE);
if (dwErr) {
return dwErr;
}
// Request IPv6 address change notifications.
dwErr = StartIpv6AddressChangeNotification();
if (dwErr) {
return dwErr;
}
return NO_ERROR;
}
/////////////////////////////////////////////////////////////////////////////
// Stop the 6to4 service. Since this is called with the global lock,
// we're guaranteed this won't be called while another 6to4 operation
// is in progress. However, another thread may be blocked waiting for
// the lock, so we set the state to stopped and check it in all other
// places after getting the lock.
//
// Called by: OnStop
VOID
Stop6to4()
{
g_stService = DISABLED;
// We do these in the opposite order from Start6to4
#if TEREDO
// Uninitialize Teredo
TeredoUninitializeGlobals();
#endif // TEREDO
// Stop proxying
UninitializePorts();
// Stop the resolution timer and free resources
UninitializeRelays();
// Cancel the IPv4 address change request and free resources
// Also, stop being a router if we are one.
UninitializeInterfaces();
// Free settings resources
UninitializeGlobalInfo();
UninitIPv6Library();
DecEventCount("Stop6to4");
return;
}