windows-nt/Source/XPSP1/NT/net/rras/ip/nathlp/alg/algmsg.cpp
2020-09-26 16:20:57 +08:00

618 lines
16 KiB
C++
Raw Blame History

This file contains invisible Unicode characters

This file contains invisible Unicode characters that are indistinguishable to humans but may be processed differently by a computer. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

/*++
Copyright (c) 2000 Microsoft Corporation
Module Name:
algmsg.c
Abstract:
This module contains code for the ALG transparent proxy's
message-processing.
Author:
Qiang Wang (qiangw) 10-Apr-2000
Revision History:
--*/
#include "precomp.h"
#pragma hdrstop
#include <ipnatapi.h>
#define MAKE_ADDRESS(a,b,c,d) \
((a) | ((b) << 8) | ((c) << 16) | ((d) << 24))
#define MAKE_PORT(a,b) ((a) | ((b) << 8))
#define TOUPPER(c) ((c) > 'z' ? (c) : ((c) < 'a' ? (c) : (c) ^ 0x20))
//
// Constant string for the 'PASV' command reply
//
static CONST CHAR PasvReply[] = "227 ";
//
// Constant string for the 'PORT' command (must be upper-case)
//
static CONST CHAR PortCommand[] = "PORT ";
static CONST CHAR Eol[] = "\x0d\x0a\x00\x51\x69\x61\x6e\x67\x20\x57\x61\x6e\x67";
//
// FORWARD DECLARATIONS
//
BOOLEAN
AlgpExtractOctet(
CHAR **Buffer,
CHAR *BufferEnd,
UCHAR *Octet
);
VOID
AlgpWriteOctet(
CHAR **Buffer,
UCHAR Octet
);
VOID
AlgProcessMessage(
PALG_INTERFACE Interfacep,
PALG_ENDPOINT Endpointp,
PNH_BUFFER Bufferp
)
/*++
Routine Description:
This routine is called to process a full message read from an ALG
client or server on a control channel.
Arguments:
Interfacep - the interface on which the control-channel was accepted
Endpointp - the active endpoint corresponding to the control channel
Bufferp - contains the message read, along with other context information
Return Value:
none.
Notes:
Invoked with the interface's lock held by the caller, and with two
references made to the interface on our behalf. It is this routine's
responsibility to release both the references and the buffer.
--*/
{
BOOLEAN Success;
BOOLEAN Continuation;
SOCKET Socket;
ULONG Error;
ULONG i;
LONG NewLength;
ULONG PublicAddress;
USHORT PublicPort;
ULONG PrivateAddress;
USHORT PrivatePort;
UCHAR Numbers[6];
CHAR *HostPortStartp;
CHAR *CommandBufferp = reinterpret_cast<CHAR*>(Bufferp->Buffer);
CHAR *EndOfBufferp =
reinterpret_cast<CHAR*>(Bufferp->Buffer + Bufferp->TransferOffset);
CONST CHAR *Commandp =
Endpointp->Type == AlgClientEndpointType ?
(PCHAR)PasvReply : (PCHAR)PortCommand;
PROFILE("AlgProcessMessage");
if ((Bufferp->UserFlags & ALG_BUFFER_FLAG_FROM_ACTUAL_CLIENT) != 0) {
Socket = Endpointp->ClientSocket;
} else {
ASSERT((Bufferp->UserFlags & ALG_BUFFER_FLAG_FROM_ACTUAL_HOST) != 0);
Socket = Endpointp->HostSocket;
}
#if DBG
NhTrace(
TRACE_FLAG_ALG,
"AlgProcessMessage: received (0x%08x) (%d) \"%s\"",
Bufferp->UserFlags, Bufferp->TransferOffset, CommandBufferp
);
#endif
if ((Bufferp->UserFlags & ALG_BUFFER_FLAG_FROM_ACTUAL_CLIENT) != 0 &&
(Bufferp->UserFlags & ALG_BUFFER_FLAG_CONTINUATION) == 0) {
while (*Commandp != '\0' && *Commandp == TOUPPER(*CommandBufferp)) {
Commandp++;
CommandBufferp++;
}
if (*Commandp == '\0') {
//
// We found a match.
//
if (Endpointp->Type == AlgClientEndpointType) {
//
// Skip non-numerical characters.
//
while (CommandBufferp < EndOfBufferp &&
(*CommandBufferp < '0' || *CommandBufferp > '9')) {
CommandBufferp++;
}
} else {
//
// Skip white space.
//
while (*CommandBufferp == ' ') {
CommandBufferp++;
}
}
HostPortStartp = CommandBufferp;
//
// Extract host and port numbers.
//
Success =
AlgpExtractOctet(
&CommandBufferp,
EndOfBufferp,
&Numbers[0]
);
i = 1;
while (i < 6 && Success && *CommandBufferp == ',') {
CommandBufferp++;
Success =
AlgpExtractOctet(
&CommandBufferp,
EndOfBufferp,
&Numbers[i]
);
i++;
}
if (i == 6 && Success) {
//
// We extract all of them successfully.
//
PrivateAddress =
MAKE_ADDRESS(
Numbers[0],
Numbers[1],
Numbers[2],
Numbers[3]
);
PrivatePort = MAKE_PORT(Numbers[4], Numbers[5]);
PublicAddress = Endpointp->BoundaryAddress;
if (PublicAddress == IP_NAT_ADDRESS_UNSPECIFIED) {
PublicAddress =
NhQueryAddressSocket(Endpointp->ClientSocket);
}
//
// Cancel the previous one first.
//
if (Endpointp->ReservedPort != 0) {
PTIMER_CONTEXT TimerContextp;
NatCancelRedirect(
AlgTranslatorHandle,
NAT_PROTOCOL_TCP,
Endpointp->DestinationAddress,
Endpointp->DestinationPort,
Endpointp->SourceAddress,
Endpointp->SourcePort,
Endpointp->NewDestinationAddress,
Endpointp->NewDestinationPort,
Endpointp->NewSourceAddress,
Endpointp->NewSourcePort
);
TimerContextp = reinterpret_cast<PTIMER_CONTEXT>(
NH_ALLOCATE(sizeof(TIMER_CONTEXT))
);
if (TimerContextp != NULL) {
TimerContextp->TimerQueueHandle = AlgTimerQueueHandle;
TimerContextp->ReservedPort = Endpointp->ReservedPort;
CreateTimerQueueTimer(
&(TimerContextp->TimerHandle),
AlgTimerQueueHandle,
AlgDelayedPortRelease,
(PVOID)TimerContextp,
ALG_PORT_RELEASE_DELAY,
0,
WT_EXECUTEDEFAULT
);
} else {
NhTrace(
TRACE_FLAG_ALG,
"AlgProcessMessage:"
" memory allocation failed for timer context"
);
NhErrorLog(
IP_ALG_LOG_ALLOCATION_FAILED,
0,
"%d",
sizeof(TIMER_CONTEXT)
);
}
Endpointp->ReservedPort = 0;
}
//
// Reserve a port for the new data session.
//
Error =
NatAcquirePortReservation(
AlgPortReservationHandle,
1,
&PublicPort
);
if (Error) {
NhTrace(
TRACE_FLAG_ALG,
"AlgProcessMessage: error %d acquiring port",
Error
);
AlgDeleteActiveEndpoint(Endpointp);
ALG_DEREFERENCE_INTERFACE(Interfacep);
return;
}
Endpointp->ReservedPort = PublicPort;
//
// Create a redirect for the new data session.
//
if (Endpointp->Type == AlgClientEndpointType) {
Endpointp->DestinationAddress = PublicAddress;
Endpointp->SourceAddress = 0;
Endpointp->NewDestinationAddress = PrivateAddress;
Endpointp->NewSourceAddress = 0;
Endpointp->DestinationPort = PublicPort;
Endpointp->SourcePort = 0;
Endpointp->NewDestinationPort = PrivatePort;
Endpointp->NewSourcePort = 0;
Error =
NatCreatePartialRedirect(
AlgTranslatorHandle,
NatRedirectFlagLoopback,
NAT_PROTOCOL_TCP,
PublicAddress,
PublicPort,
PrivateAddress,
PrivatePort,
NULL,
NULL,
NULL
);
} else {
Endpointp->DestinationAddress = PublicAddress;
Endpointp->SourceAddress = Endpointp->ActualHostAddress;
Endpointp->NewDestinationAddress = PrivateAddress;
Endpointp->NewSourceAddress = Endpointp->ActualHostAddress;
Endpointp->DestinationPort = PublicPort;
Endpointp->SourcePort = ALG_PORT_DATA;
Endpointp->NewDestinationPort = PrivatePort;
Endpointp->NewSourcePort = ALG_PORT_DATA;
Error =
NatCreateRedirect(
AlgTranslatorHandle,
NatRedirectFlagLoopback,
NAT_PROTOCOL_TCP,
PublicAddress,
PublicPort,
Endpointp->ActualHostAddress,
ALG_PORT_DATA,
PrivateAddress,
PrivatePort,
Endpointp->ActualHostAddress,
ALG_PORT_DATA,
NULL,
NULL,
NULL
);
}
if (Error) {
NhTrace(
TRACE_FLAG_ALG,
"AlgProcessMessage: error %d creating redirect",
Error
);
AlgDeleteActiveEndpoint(Endpointp);
ALG_DEREFERENCE_INTERFACE(Interfacep);
return;
}
//
// Modify the ALG command.
//
Numbers[0] = (UCHAR)(PublicAddress & 0xff);
Numbers[1] = (UCHAR)((PublicAddress >> 8) & 0xff);
Numbers[2] = (UCHAR)((PublicAddress >> 16) & 0xff);
Numbers[3] = (UCHAR)((PublicAddress >> 24) & 0xff);
Numbers[4] = (UCHAR)(PublicPort & 0xff);
Numbers[5] = (UCHAR)((PublicPort >> 8) & 0xff);
NewLength = 17;
for (i = 0; i < 6; i++) {
if (Numbers[i] > 99) {
NewLength++;
} else if (Numbers[i] <= 9) {
NewLength--;
}
}
Bufferp->TransferOffset +=
NewLength - (ULONG)(CommandBufferp - HostPortStartp);
ASSERT(Bufferp->TransferOffset <= NH_BUFFER_SIZE);
MoveMemory(
HostPortStartp + NewLength,
CommandBufferp,
EndOfBufferp - CommandBufferp
);
AlgpWriteOctet(&HostPortStartp, Numbers[0]);
i = 1;
do {
*HostPortStartp = ',';
HostPortStartp++;
AlgpWriteOctet(&HostPortStartp, Numbers[i]);
i++;
} while (i < 6);
}
}
}
//
// Forward the message.
//
Continuation =
AlgIsFullMessage(
reinterpret_cast<CHAR*>(
&(Bufferp->Buffer[Bufferp->TransferOffset - 2])
),
2
) == NULL;
if (Continuation) {
Bufferp->UserFlags |= ALG_BUFFER_FLAG_CONTINUATION;
NhTrace(
TRACE_FLAG_ALG,
"AlgProcessMessage: message to be continued (%d)",
Bufferp->TransferOffset
);
} else {
Bufferp->UserFlags &= ~(ULONG)ALG_BUFFER_FLAG_CONTINUATION;
}
#if DBG
NhTrace(
TRACE_FLAG_ALG,
"AlgProcessMessage: written (%d) \"%s\"",
Bufferp->TransferOffset,
Bufferp->Buffer
);
#endif
Error =
AlgWriteActiveEndpoint(
Interfacep,
Endpointp,
Socket,
Bufferp,
Bufferp->TransferOffset,
Bufferp->UserFlags
);
if (Error) {
NhTrace(
TRACE_FLAG_ALG,
"AlgProcessMessage: deleting endpoint %d, "
"AlgWriteActiveEndpoint=%d",
Endpointp->EndpointId, Error
);
AlgDeleteActiveEndpoint(Endpointp);
}
}
CHAR *
AlgIsFullMessage(
CHAR *Bufferp,
ULONG Length
)
/*++
Routine Description:
This routine is called to determine whether the passed-in buffer includes
a full ALG command.
Arguments:
Bufferp - contains the message read, along with other context information
Return Value:
CHAR * - points to the start of the next ALG command, or NULL if no
complete ALG command is detected.
--*/
{
ULONG Count = Length;
CONST CHAR *CommandBufferp = Bufferp;
CONST CHAR *CommandDelimiter = Eol;
PROFILE("AlgIsFullMessage");
ASSERT(
Eol[0] != '\0' &&
(Eol[1] == '\0' || Eol[2] == '\0') &&
Eol[0] != Eol[1]
);
while (Count > 0 && *CommandDelimiter != '\0') {
if (*CommandBufferp == *CommandDelimiter) {
CommandDelimiter++;
CommandBufferp++;
Count--;
} else {
if (CommandDelimiter == Eol) {
CommandBufferp++;
Count--;
} else {
CommandDelimiter = Eol;
}
}
}
return *CommandDelimiter == '\0' ? (CHAR *)CommandBufferp : NULL;
}
VOID CALLBACK
AlgDelayedPortRelease(
PVOID Parameter,
BOOLEAN TimerOrWaitFired
)
/*++
Routine Description:
This routine is called to release a reserved port.
Arguments:
Parameter - callback context
TimerOrWaitFired - wait timed out
Return Value:
None.
--*/
{
PTIMER_CONTEXT TimerContextp = (PTIMER_CONTEXT)Parameter;
PROFILE("AlgDelayedPortRelease");
NatReleasePortReservation(
AlgPortReservationHandle,
TimerContextp->ReservedPort,
1
);
DeleteTimerQueueTimer(
TimerContextp->TimerQueueHandle,
TimerContextp->TimerHandle,
NULL
);
NH_FREE(TimerContextp);
}
BOOLEAN
AlgpExtractOctet(
CHAR **Buffer,
CHAR *BufferEnd,
UCHAR *Octet
)
/*++
Routine Description:
This routine is called to extrcat an octet from a string.
Arguments:
Buffer - points to a pointer to a string where conversion starts; on
return it points to the pointer to the string where conversion ends
BufferEnd - points to the end of the string
Octet - points to a caller-suplied storage to store converted octet
Return Value:
BOOLEAN - TRUE if successfuly converted, FALSE otherwise.
--*/
{
BOOLEAN Success;
ULONG i = 0;
ULONG Value = 0;
while (i < 3 && **Buffer >= '0' && **Buffer <= '9') {
Value *= 10;
Value += **Buffer - '0';
(*Buffer)++;
i++;
}
Success = i > 0 && Value < 0x100;
if (Success) {
*Octet = (UCHAR)Value;
}
return Success;
}
VOID
AlgpWriteOctet(
CHAR **Buffer,
UCHAR Octet
)
/*++
Routine Description:
This routine is called to convert an octet to a string.
Arguments:
Buffer - points to a pointer to a string where conversion starts; on
return it points to the pointer to the string where conversion ends
Octet - octet to convert
Return Value:
None.
--*/
{
UCHAR Value = Octet;
if (Octet > 99) {
**Buffer = '0' + Value / 100;
Value %= 100;
(*Buffer)++;
}
if (Octet > 9) {
**Buffer = '0' + Value / 10;
Value %= 10;
(*Buffer)++;
}
ASSERT(Value <= 9);
**Buffer = '0' + Value;
(*Buffer)++;
}