You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
24372 lines
653 KiB
24372 lines
653 KiB
/***************************************************************************
|
|
*
|
|
* Copyright (C) 2001-2002 Microsoft Corporation. All Rights Reserved.
|
|
*
|
|
* File: dpnhupnpintfobj.cpp
|
|
*
|
|
* Content: DPNHUPNP main interface object class.
|
|
*
|
|
* History:
|
|
* Date By Reason
|
|
* ======== ======== =========
|
|
* 04/16/01 VanceO Split DPNATHLP into DPNHUPNP and DPNHPAST.
|
|
*
|
|
***************************************************************************/
|
|
|
|
|
|
|
|
#include "dpnhupnpi.h"
|
|
|
|
|
|
|
|
|
|
|
|
//=============================================================================
|
|
// Definitions
|
|
//=============================================================================
|
|
#define ACTIVE_MAPPING_VERSION 2 // version identifier for active mapping registry data
|
|
|
|
#define MAX_LONG_LOCK_WAITING_THREADS 0xFFFF // that's a lot of simultaneous threads!
|
|
|
|
#define UPNP_SEARCH_MESSAGE_INTERVAL 499 // how often discovery multicast messages should be sent, in case of packet loss (note Win9x errata for values 500-1000ms)
|
|
|
|
#define UPNP_DGRAM_RECV_BUFFER_SIZE 1500
|
|
#define UPNP_STREAM_RECV_BUFFER_INITIAL_SIZE (4 * 1024) // 4 K, must be less than MAX_RECEIVE_BUFFER_SIZE
|
|
|
|
#define MAX_UPNP_HEADER_LENGTH UPNP_STREAM_RECV_BUFFER_INITIAL_SIZE
|
|
|
|
#define LEASE_RENEW_TIME 120000 // renew if less than 2 minutes remaining
|
|
|
|
#define FAKE_PORT_LEASE_TIME 300000 // 5 minutes
|
|
|
|
#define IOCOMPLETE_WAIT_INTERVAL 100 // 100 ms between attempts
|
|
#define MAX_NUM_IOCOMPLETE_WAITS 10 // wait at most 1 second
|
|
|
|
#define MAX_NUM_HOMENETUNMAP_ATTEMPTS 3 // 3 tries
|
|
#define HOMENETUNMAP_SLEEP_FACTOR 10 // 10 ms, 20 ms, 30 ms
|
|
|
|
|
|
#define MAX_UPNP_MAPPING_DESCRIPTION_SIZE 256 // 255 characters + NULL termination
|
|
|
|
#define MAX_INSTANCENAMEDOBJECT_SIZE 64
|
|
#define INSTANCENAMEDOBJECT_FORMATSTRING _T("DPNHUPnP Instance %u")
|
|
|
|
#define GUID_STRING_LENGTH 42 // maximum length of "{xxx...}" guid string, without NULL termination
|
|
|
|
|
|
#define PORTMAPPINGPROTOCOL_TCP 6
|
|
#define PORTMAPPINGPROTOCOL_UDP 17
|
|
|
|
#define MAX_RESERVED_PORT 1024
|
|
|
|
#define MAX_NUM_INSTANCE_EVENT_ATTEMPTS 5
|
|
#define MAX_NUM_RANDOM_PORT_TRIES 5
|
|
#define MAX_NUM_TIMEWAITCONNECT_RETRIES 20 // allow a decent number since these are detected quickly and without net traffic
|
|
|
|
#ifdef DBG
|
|
#define MAX_TRANSACTION_LOG_SIZE (5 * 1024 * 1024) // 5 MB
|
|
#endif // DBG
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//=============================================================================
|
|
// WinSock 1 version of IP options
|
|
//=============================================================================
|
|
#define IP_MULTICAST_IF_WINSOCK1 2
|
|
#define IP_MULTICAST_TTL_WINSOCK1 3
|
|
#define IP_TTL_WINSOCK1 7
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
|
|
|
|
//=============================================================================
|
|
// Macros
|
|
//=============================================================================
|
|
//#ifdef _X86
|
|
#define IS_CLASSD_IPV4_ADDRESS(dwAddr) (( (*((BYTE*) &(dwAddr))) & 0xF0) == 0xE0) // 1110 high bits or 224.0.0.0 - 239.255.255.255 multicast address, in network byte order
|
|
#define NTOHS(x) ( (((x) >> 8) & 0x00FF) | (((x) << 8) & 0xFF00) )
|
|
#define HTONS(x) NTOHS(x)
|
|
//#endif _X86
|
|
|
|
|
|
|
|
|
|
//=============================================================================
|
|
// HTTP/SSDP/SOAP/UPnP header strings (from upnpmsgs.h)
|
|
//=============================================================================
|
|
const char * c_szResponseHeaders[] =
|
|
{
|
|
//
|
|
// Headers used in discovery response
|
|
//
|
|
"CACHE-CONTROL",
|
|
"DATE",
|
|
"EXT",
|
|
"LOCATION",
|
|
"SERVER",
|
|
"ST",
|
|
"USN",
|
|
|
|
//
|
|
// Additional headers used in description response
|
|
//
|
|
"CONTENT-LANGUAGE",
|
|
"CONTENT-LENGTH",
|
|
"CONTENT-TYPE",
|
|
"TRANSFER-ENCODING",
|
|
|
|
//
|
|
// Other known headers
|
|
//
|
|
"HOST",
|
|
"NT",
|
|
"NTS",
|
|
"MAN",
|
|
"MX",
|
|
"AL",
|
|
"CALLBACK",
|
|
"TIMEOUT",
|
|
"SCOPE",
|
|
"SID",
|
|
"SEQ",
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//=============================================================================
|
|
// Pre-built UPnP message strings (from upnpmsgs.h)
|
|
//=============================================================================
|
|
|
|
const char c_szUPnPMsg_Discover_Service_WANIPConnection[] = "M-SEARCH * " HTTP_VERSION EOL
|
|
"HOST: " UPNP_DISCOVERY_MULTICAST_ADDRESS ":" UPNP_PORT_A EOL
|
|
"MAN: \"ssdp:discover\"" EOL
|
|
"MX: 2" EOL
|
|
"ST: " URI_SERVICE_WANIPCONNECTION_A EOL
|
|
EOL;
|
|
|
|
const char c_szUPnPMsg_Discover_Service_WANPPPConnection[] = "M-SEARCH * " HTTP_VERSION EOL
|
|
"HOST: " UPNP_DISCOVERY_MULTICAST_ADDRESS ":" UPNP_PORT_A EOL
|
|
"MAN: \"ssdp:discover\"" EOL
|
|
"MX: 2" EOL
|
|
"ST: " URI_SERVICE_WANPPPCONNECTION_A EOL
|
|
EOL;
|
|
|
|
|
|
//
|
|
// The disclaimer:
|
|
//
|
|
// A UPnP device may implement both the WANIPConnection and WANPPPConnection
|
|
// services. We do not have any fancy logic to pick one, we just use the first
|
|
// device that responds to our discovery requests, and use the first matching
|
|
// service we encounter in the device description XML.
|
|
//
|
|
// Additionally, future UPnP devices may wish to present multiple device or
|
|
// service instances with the intention that one client gets control of the
|
|
// entire instance (additional clients would need to use a different instance).
|
|
// It's not clear to me what a UPnP device (or client, for that matter) would
|
|
// really gain by having such a setup. I imagine a new error code would have
|
|
// to be returned whenever a client tried to control an instance that another
|
|
// client already owned (don't ask me how it would know that, by picking the
|
|
// first user or selectively responding to discovery requests, I guess).
|
|
// Regardless, we do not currently support that. As noted above, we pick the
|
|
// first instance and run with it.
|
|
//
|
|
|
|
|
|
//
|
|
// Topmost <?xml> tag is considered optional for all XML and is ignored.
|
|
//
|
|
|
|
|
|
//
|
|
// This solution assumes InternetGatewayDevice (not WANDevice or
|
|
// WANConnectionDevice) will be the topmost item in the response. This is based
|
|
// on the following UPnP spec excerpt:
|
|
//
|
|
// "Note that a single physical device may include multiple logical devices.
|
|
// Multiple logical devices can be modeled as a single root device with
|
|
// embedded devices (and services) or as multiple root devices (perhaps with
|
|
// no embedded devices). In the former case, there is one UPnP device
|
|
// description for the root device, and that device description contains a
|
|
// description for all embedded devices. In the latter case, there are
|
|
// multiple UPnP device descriptions, one for each root device."
|
|
//
|
|
const char * c_szElementStack_service[] =
|
|
{
|
|
"root",
|
|
"device", // InternetGatewayDevice
|
|
"deviceList",
|
|
"device", // WANDevice
|
|
"deviceList",
|
|
"device", // WANConnectionDevice
|
|
"serviceList",
|
|
"service"
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
const char * c_szElementStack_QueryStateVariableResponse[] =
|
|
{
|
|
"Envelope",
|
|
"Body",
|
|
CONTROL_QUERYSTATEVARIABLE_A CONTROL_RESPONSESUFFIX_A
|
|
};
|
|
*/
|
|
const char * c_szElementStack_GetExternalIPAddressResponse[] =
|
|
{
|
|
"Envelope",
|
|
"Body",
|
|
ACTION_GETEXTERNALIPADDRESS_A CONTROL_RESPONSESUFFIX_A
|
|
};
|
|
|
|
const char * c_szElementStack_AddPortMappingResponse[] =
|
|
{
|
|
"Envelope",
|
|
"Body",
|
|
ACTION_ADDPORTMAPPING_A CONTROL_RESPONSESUFFIX_A
|
|
};
|
|
|
|
const char * c_szElementStack_GetSpecificPortMappingEntryResponse[] =
|
|
{
|
|
"Envelope",
|
|
"Body",
|
|
ACTION_GETSPECIFICPORTMAPPINGENTRY_A CONTROL_RESPONSESUFFIX_A
|
|
};
|
|
|
|
const char * c_szElementStack_DeletePortMappingResponse[] =
|
|
{
|
|
"Envelope",
|
|
"Body",
|
|
ACTION_DELETEPORTMAPPING_A CONTROL_RESPONSESUFFIX_A
|
|
};
|
|
|
|
|
|
const char * c_szElementStack_ControlResponseFailure[] =
|
|
{
|
|
"Envelope",
|
|
"Body",
|
|
"Fault",
|
|
"detail",
|
|
"UPnPError"
|
|
};
|
|
|
|
|
|
|
|
|
|
#ifdef WINNT
|
|
//=============================================================================
|
|
// Related UPnP services
|
|
//=============================================================================
|
|
TCHAR * c_tszUPnPServices[] =
|
|
{
|
|
_T("SSDPSRV"), // SSDP Discovery Service
|
|
_T("UPNPHOST"), // Universal Plug and Play Device Host - we key off this even though it's for device hosts instead of control points
|
|
};
|
|
#endif // WINNT
|
|
|
|
|
|
|
|
|
|
|
|
//=============================================================================
|
|
// Local structures
|
|
//=============================================================================
|
|
typedef struct _CONTROLRESPONSEPARSECONTEXT
|
|
{
|
|
CONTROLRESPONSETYPE ControlResponseType; // type of control response expected
|
|
CUPnPDevice * pUPnPDevice; // pointer to UPnP device being used
|
|
DWORD dwHTTPResponseCode; // HTTP response code for this message
|
|
PUPNP_CONTROLRESPONSE_INFO pControlResponseInfo; // place to info returned in control response
|
|
} CONTROLRESPONSEPARSECONTEXT, * PCONTROLRESPONSEPARSECONTEXT;
|
|
|
|
typedef struct _DPNHACTIVEFIREWALLMAPPING
|
|
{
|
|
DWORD dwVersion; // version identifier for this mapping
|
|
DWORD dwInstanceKey; // key identifying DPNHUPNP instance that created this mapping
|
|
DWORD dwFlags; // flags describing port being registered
|
|
DWORD dwAddressV4; // address being mapped
|
|
WORD wPort; // port being mapped
|
|
} DPNHACTIVEFIREWALLMAPPING, * PDPNHACTIVEFIREWALLMAPPING;
|
|
|
|
typedef struct _DPNHACTIVENATMAPPING
|
|
{
|
|
DWORD dwVersion; // version identifier for this mapping
|
|
DWORD dwInstanceKey; // key identifying DPNHUPNP instance that created this mapping
|
|
DWORD dwUPnPDeviceID; // identifier for particular UPnP device corresponding to this mapping (meaningful only to owning instance)
|
|
DWORD dwFlags; // flags describing port being registered
|
|
DWORD dwInternalAddressV4; // internal client address being mapped
|
|
WORD wInternalPort; // internal client port being mapped
|
|
DWORD dwExternalAddressV4; // external public address that was mapped
|
|
WORD wExternalPort; // external public port that was mapped
|
|
} DPNHACTIVENATMAPPING, * PDPNHACTIVENATMAPPING;
|
|
|
|
|
|
|
|
|
|
|
|
|
|
//=============================================================================
|
|
// Local functions
|
|
//=============================================================================
|
|
VOID strtrim(CHAR ** pszStr);
|
|
|
|
#ifdef WINCE
|
|
void GetExeName(WCHAR * wszPath);
|
|
#endif // WINCE
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CNATHelpUPnP"
|
|
//=============================================================================
|
|
// CNATHelpUPnP constructor
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Initializes the new CNATHelpUPnP object.
|
|
//
|
|
// Arguments:
|
|
// BOOL fNotCreatedWithCOM - TRUE if this object is being instantiated
|
|
// without COM, FALSE if it is through COM.
|
|
//
|
|
// Returns: None (the object).
|
|
//=============================================================================
|
|
CNATHelpUPnP::CNATHelpUPnP(const BOOL fNotCreatedWithCOM)
|
|
{
|
|
this->m_blList.Initialize();
|
|
|
|
|
|
this->m_Sig[0] = 'N';
|
|
this->m_Sig[1] = 'A';
|
|
this->m_Sig[2] = 'T';
|
|
this->m_Sig[3] = 'H';
|
|
|
|
this->m_lRefCount = 1; // someone must have a pointer to this object
|
|
|
|
if (fNotCreatedWithCOM)
|
|
{
|
|
this->m_dwFlags = NATHELPUPNPOBJ_NOTCREATEDWITHCOM;
|
|
}
|
|
else
|
|
{
|
|
this->m_dwFlags = 0;
|
|
}
|
|
|
|
this->m_hLongLockSemaphore = NULL;
|
|
this->m_lNumLongLockWaitingThreads = 0;
|
|
this->m_dwLockThreadID = 0;
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
this->m_hAlertEvent = NULL;
|
|
this->m_hAlertIOCompletionPort = NULL;
|
|
this->m_dwAlertCompletionKey = 0;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
this->m_blDevices.Initialize();
|
|
this->m_blRegisteredPorts.Initialize();
|
|
this->m_blUnownedPorts.Initialize();
|
|
|
|
this->m_dwLastUpdateServerStatusTime = 0;
|
|
this->m_dwNextPollInterval = 0;
|
|
this->m_dwNumLeases = 0;
|
|
this->m_dwEarliestLeaseExpirationTime = 0;
|
|
|
|
this->m_blUPnPDevices.Initialize();
|
|
this->m_dwInstanceKey = 0;
|
|
this->m_dwCurrentUPnPDeviceID = 0;
|
|
this->m_hMappingStillActiveNamedObject = NULL;
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
this->m_hIpHlpApiDLL = NULL;
|
|
this->m_pfnGetAdaptersInfo = NULL;
|
|
this->m_pfnGetIpForwardTable = NULL;
|
|
this->m_pfnGetBestRoute = NULL;
|
|
|
|
this->m_hRasApi32DLL = NULL;
|
|
this->m_pfnRasGetEntryHrasconnW = NULL;
|
|
this->m_pfnRasGetProjectionInfo = NULL;
|
|
|
|
this->m_sIoctls = INVALID_SOCKET;
|
|
this->m_polAddressListChange = NULL;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
this->m_hWinSockDLL = NULL;
|
|
this->m_pfnWSAStartup = NULL;
|
|
this->m_pfnWSACleanup = NULL;
|
|
this->m_pfnWSAGetLastError = NULL;
|
|
this->m_pfnsocket = NULL;
|
|
this->m_pfnclosesocket = NULL;
|
|
this->m_pfnbind = NULL;
|
|
this->m_pfnsetsockopt = NULL;
|
|
this->m_pfngetsockname = NULL;
|
|
this->m_pfnselect = NULL;
|
|
this->m_pfn__WSAFDIsSet = NULL;
|
|
this->m_pfnrecvfrom = NULL;
|
|
this->m_pfnsendto = NULL;
|
|
this->m_pfngethostname = NULL;
|
|
this->m_pfngethostbyname = NULL;
|
|
this->m_pfninet_addr = NULL;
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
this->m_pfnWSASocketA = NULL;
|
|
this->m_pfnWSAIoctl = NULL;
|
|
this->m_pfnWSAGetOverlappedResult = NULL;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
this->m_pfnioctlsocket = NULL;
|
|
this->m_pfnconnect = NULL;
|
|
this->m_pfnshutdown = NULL;
|
|
this->m_pfnsend = NULL;
|
|
this->m_pfnrecv = NULL;
|
|
#ifdef DBG
|
|
this->m_pfngetsockopt = NULL;
|
|
|
|
this->m_dwNumDeviceAdds = 0;
|
|
this->m_dwNumDeviceRemoves = 0;
|
|
this->m_dwNumServerFailures = 0;
|
|
#endif // DBG
|
|
} // CNATHelpUPnP::CNATHelpUPnP
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::~CNATHelpUPnP"
|
|
//=============================================================================
|
|
// CNATHelpUPnP destructor
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Frees the CNATHelpUPnP object.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
CNATHelpUPnP::~CNATHelpUPnP(void)
|
|
{
|
|
DPFX(DPFPREP, 8, "(0x%p) NumDeviceAdds = %u, NumDeviceRemoves = %u, NumServerFailures = %u",
|
|
this, this->m_dwNumDeviceAdds, this->m_dwNumDeviceRemoves,
|
|
this->m_dwNumServerFailures);
|
|
|
|
|
|
DNASSERT(this->m_blList.IsEmpty());
|
|
|
|
|
|
DNASSERT(this->m_lRefCount == 0);
|
|
DNASSERT((this->m_dwFlags & ~NATHELPUPNPOBJ_NOTCREATEDWITHCOM) == 0);
|
|
|
|
DNASSERT(this->m_hLongLockSemaphore == NULL);
|
|
DNASSERT(this->m_lNumLongLockWaitingThreads == 0);
|
|
DNASSERT(this->m_dwLockThreadID == 0);
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
DNASSERT(this->m_hAlertEvent == NULL);
|
|
DNASSERT(this->m_hAlertIOCompletionPort == NULL);
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
DNASSERT(this->m_blDevices.IsEmpty());
|
|
DNASSERT(this->m_blRegisteredPorts.IsEmpty());
|
|
DNASSERT(this->m_blUnownedPorts.IsEmpty());
|
|
|
|
DNASSERT(this->m_dwNumLeases == 0);
|
|
|
|
DNASSERT(this->m_blUPnPDevices.IsEmpty());
|
|
DNASSERT(this->m_hMappingStillActiveNamedObject == NULL);
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
DNASSERT(this->m_hIpHlpApiDLL == NULL);
|
|
DNASSERT(this->m_hRasApi32DLL == NULL);
|
|
DNASSERT(this->m_hWinSockDLL == NULL);
|
|
|
|
DNASSERT(this->m_sIoctls == INVALID_SOCKET);
|
|
DNASSERT(this->m_polAddressListChange == NULL);
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
//
|
|
// For grins, change the signature before deleting the object.
|
|
//
|
|
this->m_Sig[3] = 'h';
|
|
} // CNATHelpUPnP::~CNATHelpUPnP
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::QueryInterface"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::QueryInterface
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Retrieves a new reference for an interfaces supported by this
|
|
// CNATHelpUPnP object.
|
|
//
|
|
// Arguments:
|
|
// REFIID riid - Reference to interface ID GUID.
|
|
// LPVOID * ppvObj - Place to store pointer to object.
|
|
//
|
|
// Returns: HRESULT
|
|
// S_OK - Returning a valid interface pointer.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPOINTER - The destination pointer is invalid.
|
|
// E_NOINTERFACE - Invalid interface was specified.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::QueryInterface(REFIID riid, LPVOID * ppvObj)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
|
|
|
|
DPFX(DPFPREP, 3, "(0x%p) Parameters: (REFIID, 0x%p)", this, ppvObj);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid NATHelper object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if ((! IsEqualIID(riid, IID_IUnknown)) &&
|
|
(! IsEqualIID(riid, IID_IDirectPlayNATHelp)))
|
|
{
|
|
DPFX(DPFPREP, 0, "Unsupported interface!");
|
|
hr = E_NOINTERFACE;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((ppvObj == NULL) ||
|
|
(IsBadWritePtr(ppvObj, sizeof(void*))))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid interface pointer specified!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Add a reference, and return the interface pointer (which is actually
|
|
// just the object pointer, they line up because CNATHelpUPnP inherits from
|
|
// the interface declaration).
|
|
//
|
|
this->AddRef();
|
|
(*ppvObj) = this;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 3, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::QueryInterface
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::AddRef"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::AddRef
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Adds a reference to this CNATHelpUPnP object.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: New refcount.
|
|
//=============================================================================
|
|
STDMETHODIMP_(ULONG) CNATHelpUPnP::AddRef(void)
|
|
{
|
|
LONG lRefCount;
|
|
|
|
|
|
DNASSERT(this->IsValidObject());
|
|
|
|
|
|
//
|
|
// There must be at least 1 reference to this object, since someone is
|
|
// calling AddRef.
|
|
//
|
|
DNASSERT(this->m_lRefCount > 0);
|
|
|
|
lRefCount = InterlockedIncrement(&this->m_lRefCount);
|
|
|
|
DPFX(DPFPREP, 3, "[0x%p] RefCount [0x%lx]", this, lRefCount);
|
|
|
|
return lRefCount;
|
|
} // CNATHelpUPnP::AddRef
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::Release"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::Release
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Removes a reference to this CNATHelpUPnP object. When the
|
|
// refcount reaches 0, this object is destroyed.
|
|
// You must NULL out your pointer to this object after calling
|
|
// this function.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: New refcount.
|
|
//=============================================================================
|
|
STDMETHODIMP_(ULONG) CNATHelpUPnP::Release(void)
|
|
{
|
|
LONG lRefCount;
|
|
|
|
|
|
DNASSERT(this->IsValidObject());
|
|
|
|
//
|
|
// There must be at least 1 reference to this object, since someone is
|
|
// calling Release.
|
|
//
|
|
DNASSERT(this->m_lRefCount > 0);
|
|
|
|
lRefCount = InterlockedDecrement(&this->m_lRefCount);
|
|
|
|
//
|
|
// Was that the last reference? If so, we're going to destroy this object.
|
|
//
|
|
if (lRefCount == 0)
|
|
{
|
|
DPFX(DPFPREP, 3, "[0x%p] RefCount hit 0, destroying object.", this);
|
|
|
|
//
|
|
// First pull it off the global list.
|
|
//
|
|
DNEnterCriticalSection(&g_csGlobalsLock);
|
|
|
|
this->m_blList.RemoveFromList();
|
|
|
|
DNASSERT(g_lOutstandingInterfaceCount > 0);
|
|
g_lOutstandingInterfaceCount--; // update count so DLL can unload now works correctly
|
|
|
|
DNLeaveCriticalSection(&g_csGlobalsLock);
|
|
|
|
|
|
//
|
|
// Make sure it's closed.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED)
|
|
{
|
|
//
|
|
// Assert so that the user can fix his/her broken code!
|
|
//
|
|
DNASSERT(! "DirectPlayNATHelpUPNP object being released without calling Close first!");
|
|
|
|
//
|
|
// Then go ahead and do the right thing. Ignore error, we can't do
|
|
// much about it.
|
|
//
|
|
this->Close(0);
|
|
}
|
|
|
|
|
|
//
|
|
// Then uninitialize the object.
|
|
//
|
|
this->UninitializeObject();
|
|
|
|
//
|
|
// Finally delete this (!) object.
|
|
//
|
|
delete this;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, "[0x%p] RefCount [0x%lx]", this, lRefCount);
|
|
}
|
|
|
|
return lRefCount;
|
|
} // CNATHelpUPnP::Release
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::Initialize"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::Initialize
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Prepares the object for use. No attempt is made to contact
|
|
// any Internet gateway servers at this time. The user should
|
|
// call GetCaps with the DPNHGETCAPS_UPDATESERVERSTATUS flag to
|
|
// search for a server.
|
|
//
|
|
// Initialize must be called before using any other function,
|
|
// and must be balanced with a call to Close. Initialize can only
|
|
// be called once unless Close returns it to the uninitialized
|
|
// state.
|
|
//
|
|
// One of DPNHINITIALIZE_DISABLEREMOTENATSUPPORT or
|
|
// DPNHINITIALIZE_DISABLELOCALFIREWALLSUPPORT may be specified,
|
|
// but not both.
|
|
//
|
|
// Arguments:
|
|
// DWORD dwFlags - Flags to use when initializing.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Initialization was successful.
|
|
// DPNHERR_ALREADYINITIALIZED - Initialize has already been called.
|
|
// DPNHERR_GENERIC - An error occurred while initializing.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to initialize.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::Initialize(const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fHaveLock = FALSE;
|
|
BOOL fSetFlags = FALSE;
|
|
#ifndef WINCE
|
|
OSVERSIONINFO osvi;
|
|
#endif // ! WINCE
|
|
BOOL fWinSockStarted = FALSE;
|
|
WSADATA wsadata;
|
|
int iError;
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
SOCKADDR_IN saddrinTemp;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
TCHAR tszObjectName[MAX_INSTANCENAMEDOBJECT_SIZE];
|
|
PSECURITY_ATTRIBUTES pSecurityAttributes;
|
|
DWORD dwTry;
|
|
#ifdef WINNT
|
|
SID_IDENTIFIER_AUTHORITY SidIdentifierAuthorityWorld = SECURITY_WORLD_SID_AUTHORITY;
|
|
PSID pSid = NULL;
|
|
DWORD dwAclLength;
|
|
ACL * pAcl = NULL;
|
|
BYTE abSecurityDescriptorBuffer[SECURITY_DESCRIPTOR_MIN_LENGTH];
|
|
SECURITY_ATTRIBUTES SecurityAttributes;
|
|
#endif // WINNT
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%lx)", this, dwFlags);
|
|
|
|
|
|
#ifndef WINCE
|
|
//
|
|
// Print info about the current build.
|
|
//
|
|
#ifdef WINNT
|
|
DPFX(DPFPREP, 7, "Build type = NT, platform = %s",
|
|
((DNGetOSType() == VER_PLATFORM_WIN32_NT) ? _T("NT") : _T("9x")));
|
|
#else // ! WINNT
|
|
DPFX(DPFPREP, 7, "Build type = 9x, platform = %s, filedate = %s",
|
|
((DNGetOSType() == VER_PLATFORM_WIN32_NT) ? _T("NT") : _T("9x")));
|
|
#endif // ! WINNT
|
|
#endif // ! WINCE
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
|
|
//
|
|
// Skip the failure cleanup code, we haven't set anything up.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if (dwFlags & ~(DPNHINITIALIZE_DISABLEGATEWAYSUPPORT | DPNHINITIALIZE_DISABLELOCALFIREWALLSUPPORT))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
|
|
//
|
|
// Skip the failure cleanup code, we haven't set anything up.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Both flags cannot be specified at the same time. If the caller doesn't
|
|
// want any NAT functionality, why use this object all?
|
|
//
|
|
if ((dwFlags & (DPNHINITIALIZE_DISABLEGATEWAYSUPPORT | DPNHINITIALIZE_DISABLELOCALFIREWALLSUPPORT)) == (DPNHINITIALIZE_DISABLEGATEWAYSUPPORT | DPNHINITIALIZE_DISABLELOCALFIREWALLSUPPORT))
|
|
{
|
|
DPFX(DPFPREP, 0, "Either DISABLEGATEWAYSUPPORT flag or DISABLELOCALFIREWALLSUPPORT flag can be used, but not both!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
|
|
//
|
|
// Skip the failure cleanup code, we haven't set anything up.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
|
|
//
|
|
// Skip the failure cleanup code, we haven't set anything up.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if ((this->m_dwFlags & ~NATHELPUPNPOBJ_NOTCREATEDWITHCOM) != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Object already initialized!");
|
|
hr = DPNHERR_ALREADYINITIALIZED;
|
|
|
|
//
|
|
// Skip the failure cleanup code, we haven't set anything up.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Read in the manual override settings from the registry
|
|
//
|
|
ReadRegistrySettings();
|
|
|
|
|
|
//
|
|
// We're not completely initialized yet, but set the flag(s) now.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_INITIALIZED;
|
|
fSetFlags = TRUE;
|
|
|
|
|
|
//
|
|
// Store the user's settings.
|
|
//
|
|
|
|
if (dwFlags & DPNHINITIALIZE_DISABLEGATEWAYSUPPORT)
|
|
{
|
|
DPFX(DPFPREP, 1, "User requested that Internet gateways not be supported.");
|
|
}
|
|
else
|
|
{
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_USEUPNP;
|
|
}
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
if (dwFlags & DPNHINITIALIZE_DISABLELOCALFIREWALLSUPPORT)
|
|
{
|
|
DPFX(DPFPREP, 1, "User requested that local firewalls not be supported.");
|
|
}
|
|
else
|
|
{
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_USEHNETFWAPI;
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
switch (g_dwUPnPMode)
|
|
{
|
|
case OVERRIDEMODE_FORCEON:
|
|
{
|
|
//
|
|
// Force UPnP on.
|
|
//
|
|
DPFX(DPFPREP, 1, "Forcing UPnP support on.");
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_USEUPNP;
|
|
break;
|
|
}
|
|
|
|
case OVERRIDEMODE_FORCEOFF:
|
|
{
|
|
//
|
|
// Force UPnP off.
|
|
//
|
|
DPFX(DPFPREP, 1, "Forcing UPnP support off.");
|
|
this->m_dwFlags &= ~NATHELPUPNPOBJ_USEUPNP;
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// Leave UPnP settings as they were set by the application.
|
|
//
|
|
#ifdef WINNT
|
|
//
|
|
// But if UPnP related service(s) are disabled, we'll take that as
|
|
// our cue to not use UPnP NAT traversal even though we don't
|
|
// actually use those services. We assume the user wanted to
|
|
// squelch all SSDP/UPnP activity. It can still be forced back on
|
|
// with a reg key, though, as indicated by the other switch cases.
|
|
//
|
|
if (this->IsUPnPServiceDisabled())
|
|
{
|
|
DPFX(DPFPREP, 1, "Not using UPnP because a related service was disabled.");
|
|
this->m_dwFlags &= ~NATHELPUPNPOBJ_USEUPNP;
|
|
}
|
|
#endif // WINNT
|
|
break;
|
|
}
|
|
}
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
switch (g_dwHNetFWAPIMode)
|
|
{
|
|
case OVERRIDEMODE_FORCEON:
|
|
{
|
|
//
|
|
// Force HNet firewall API on.
|
|
//
|
|
DPFX(DPFPREP, 1, "Forcing HNet firewall API support on.");
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_USEHNETFWAPI;
|
|
break;
|
|
}
|
|
|
|
case OVERRIDEMODE_FORCEOFF:
|
|
{
|
|
//
|
|
// Force HNet firewall API off.
|
|
//
|
|
DPFX(DPFPREP, 1, "Forcing HNet firewall API support off.");
|
|
this->m_dwFlags &= ~NATHELPUPNPOBJ_USEHNETFWAPI;
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// Leave HNet firewall API settings alone.
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
#ifndef WINCE
|
|
//
|
|
// Determine whether we're on a Win2K or higher NT OS, and if so, use the
|
|
// "Global\\" prefix for named kernel objects so we can have Terminal
|
|
// Server and Fast User Switching support.
|
|
//
|
|
ZeroMemory(&osvi, sizeof(osvi));
|
|
osvi.dwOSVersionInfoSize = sizeof(osvi);
|
|
if (GetVersionEx(&osvi))
|
|
{
|
|
if ((osvi.dwPlatformId == VER_PLATFORM_WIN32_NT) &&
|
|
(osvi.dwMajorVersion >= 5))
|
|
{
|
|
DPFX(DPFPREP, 8, "Running Win2K or higher NT OS, using \"Global\\\" prefix.");
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX;
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "Not on NT, or its pre-Win2K, not using \"Global\\\" prefix.");
|
|
}
|
|
#endif // DBG
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't get OS version information (err = %u)! Not using \"Global\\\" prefix.",
|
|
dwError);
|
|
}
|
|
#endif // DBG
|
|
#endif // ! WINCE
|
|
|
|
|
|
#ifdef DPNBUILD_NOWINSOCK2
|
|
#if defined(WINCE) && !defined(WINCE_ON_DESKTOP)
|
|
this->m_hWinSockDLL = LoadLibrary( _T("winsock.dll") );
|
|
#else // ! WINCE
|
|
this->m_hWinSockDLL = LoadLibrary( _T("wsock32.dll") );
|
|
#endif // ! WINCE
|
|
if (this->m_hWinSockDLL == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't load WinSock 1 DLL (err = 0x%lx)!.",
|
|
dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
#else // ! DPNBUILD_NOWINSOCK2
|
|
//
|
|
// Try loading the IP helper DLL.
|
|
//
|
|
this->m_hIpHlpApiDLL = LoadLibrary( _T("iphlpapi.dll") );
|
|
if (this->m_hIpHlpApiDLL == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 1, "Unable to load \"iphlpapi.dll\" (error = 0x%lx).",
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
//
|
|
// That's not fatal, we can still function.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Load the functions we'll use.
|
|
//
|
|
|
|
this->m_pfnGetAdaptersInfo = (PFN_GETADAPTERSINFO) GetProcAddress(this->m_hIpHlpApiDLL,
|
|
_TWINCE("GetAdaptersInfo"));
|
|
if (this->m_pfnGetAdaptersInfo == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Unable to get \"GetAdaptersInfo\" function (error = 0x%lx)!",
|
|
dwError);
|
|
#endif // DBG
|
|
goto Exit;
|
|
}
|
|
|
|
this->m_pfnGetIpForwardTable = (PFN_GETIPFORWARDTABLE) GetProcAddress(this->m_hIpHlpApiDLL,
|
|
_TWINCE("GetIpForwardTable"));
|
|
if (this->m_pfnGetIpForwardTable == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Unable to get \"GetIpForwardTable\" function (error = 0x%lx)!",
|
|
dwError);
|
|
#endif // DBG
|
|
goto Exit;
|
|
}
|
|
|
|
this->m_pfnGetBestRoute = (PFN_GETBESTROUTE) GetProcAddress(this->m_hIpHlpApiDLL,
|
|
_TWINCE("GetBestRoute"));
|
|
if (this->m_pfnGetBestRoute == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Unable to get \"GetBestRoute\" function (error = 0x%lx)!",
|
|
dwError);
|
|
#endif // DBG
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Try loading the RAS API DLL.
|
|
//
|
|
this->m_hRasApi32DLL = LoadLibrary( _T("rasapi32.dll") );
|
|
if (this->m_hRasApi32DLL == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 1, "Unable to load \"rasapi32.dll\" (error = 0x%lx).",
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
//
|
|
// That's not fatal, we can still function.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Load the functions we'll use.
|
|
//
|
|
|
|
this->m_pfnRasGetEntryHrasconnW = (PFN_RASGETENTRYHRASCONNW) GetProcAddress(this->m_hRasApi32DLL,
|
|
_TWINCE("RasGetEntryHrasconnW"));
|
|
if (this->m_pfnRasGetEntryHrasconnW == NULL)
|
|
{
|
|
//
|
|
// This function does not exist on non-NT platforms. That's fine,
|
|
// just dump the DLL handle so we don't try to use it.
|
|
//
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 1, "Unable to get \"RasGetEntryHrasconnW\" function (error = 0x%lx), forgetting RAS DLL.",
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
FreeLibrary(this->m_hRasApi32DLL);
|
|
this->m_hRasApi32DLL = NULL;
|
|
}
|
|
else
|
|
{
|
|
this->m_pfnRasGetProjectionInfo = (PFN_RASGETPROJECTIONINFO) GetProcAddress(this->m_hRasApi32DLL,
|
|
#ifdef UNICODE
|
|
_TWINCE("RasGetProjectionInfoW"));
|
|
#else // ! UNICODE
|
|
_TWINCE("RasGetProjectionInfoA"));
|
|
#endif // ! UNICODE
|
|
if (this->m_pfnRasGetProjectionInfo == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Unable to get \"RasGetProjectionInfoA/W\" function (error = 0x%lx)!",
|
|
dwError);
|
|
#endif // DBG
|
|
goto Exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Load WinSock because we may be using our private UPnP implementation, or
|
|
// we just need to get the devices.
|
|
//
|
|
this->m_hWinSockDLL = LoadLibrary( _T("ws2_32.dll") );
|
|
if (this->m_hWinSockDLL == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 1, "Couldn't load \"ws2_32.dll\" (err = 0x%lx), resorting to WinSock 1 functionality.",
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
this->m_hWinSockDLL = LoadLibrary( _T("wsock32.dll") );
|
|
if (this->m_hWinSockDLL == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't load \"wsock32.dll\" either (err = 0x%lx)!.",
|
|
dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Remember that we had to resort to WinSock 1.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_WINSOCK1;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Loaded \"ws2_32.dll\", using WinSock 2 functionality.");
|
|
}
|
|
#endif // DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
//
|
|
// Load pointers to all the functions we use in WinSock.
|
|
//
|
|
hr = this->LoadWinSockFunctionPointers();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't load WinSock function pointers!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Fire up WinSock. Request 2.2 if we can. For the most part we only use
|
|
// version 1.1 capabilities and interfaces anyway. The only exceptions are
|
|
// using the event or I/O completion port handles for notification.
|
|
//
|
|
ZeroMemory(&wsadata, sizeof(wsadata));
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1)
|
|
{
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
iError = this->m_pfnWSAStartup(MAKEWORD(1, 1), &wsadata);
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
}
|
|
else
|
|
{
|
|
iError = this->m_pfnWSAStartup(MAKEWORD(2, 2), &wsadata);
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
if (iError != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't startup WinSock (error = %i)!", iError);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
fWinSockStarted = TRUE;
|
|
|
|
DPFX(DPFPREP, 4, "Initialized WinSock version %u.%u.",
|
|
LOBYTE(wsadata.wVersion), HIBYTE(wsadata.wVersion));
|
|
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// Try creating a UDP socket for use with WSAIoctl. Do this even if we're
|
|
// WinSock 1 and can't use WSAIoctl socket. This allows us to make sure
|
|
// TCP/IP is installed and working.
|
|
//
|
|
|
|
this->m_sIoctls = this->m_pfnsocket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
if (this->m_sIoctls == INVALID_SOCKET)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't create Ioctl socket, error = %u!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Try binding the socket. This is a continuation of the validation.
|
|
//
|
|
ZeroMemory(&saddrinTemp, sizeof(saddrinTemp));
|
|
saddrinTemp.sin_family = AF_INET;
|
|
//saddrinTemp.sin_addr.S_un.S_addr = INADDR_ANY;
|
|
//saddrinTemp.sin_port = 0;
|
|
|
|
if (this->m_pfnbind(this->m_sIoctls,
|
|
(SOCKADDR *) (&saddrinTemp),
|
|
sizeof(saddrinTemp)) != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't bind the Ioctl socket to arbitrary port on any interface, error = %u!",
|
|
dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
//
|
|
// Build appropriate access control structures. On NT, we want to allow
|
|
// read access to everyone. On other platforms, security is ignored.
|
|
//
|
|
#ifdef WINNT
|
|
if (! AllocateAndInitializeSid(&SidIdentifierAuthorityWorld,
|
|
1,
|
|
SECURITY_WORLD_RID,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
0,
|
|
&pSid))
|
|
{
|
|
#ifdef DEBUG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't allocate and initialize SID, error = %u!",
|
|
dwError);
|
|
#endif // DEBUG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
dwAclLength = sizeof(ACL)
|
|
+ sizeof(ACCESS_ALLOWED_ACE)
|
|
- sizeof(DWORD) // subtract out sizeof(ACCESS_ALLOWED_ACE.SidStart)
|
|
+ GetLengthSid(pSid);
|
|
|
|
pAcl = (ACL*) DNMalloc(dwAclLength);
|
|
if (pAcl == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
if (! InitializeAcl(pAcl, dwAclLength, ACL_REVISION))
|
|
{
|
|
#ifdef DEBUG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't initialize ACL, error = %u!",
|
|
dwError);
|
|
#endif // DEBUG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (! AddAccessAllowedAce(pAcl, ACL_REVISION, SYNCHRONIZE, pSid))
|
|
{
|
|
#ifdef DEBUG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't add access allowed ACE, error = %u!",
|
|
dwError);
|
|
#endif // DEBUG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (! InitializeSecurityDescriptor((PSECURITY_DESCRIPTOR) abSecurityDescriptorBuffer,
|
|
SECURITY_DESCRIPTOR_REVISION))
|
|
{
|
|
#ifdef DEBUG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't initialize security descriptor, error = %u!",
|
|
dwError);
|
|
#endif // DEBUG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (! SetSecurityDescriptorDacl((PSECURITY_DESCRIPTOR) abSecurityDescriptorBuffer,
|
|
TRUE,
|
|
pAcl,
|
|
FALSE))
|
|
{
|
|
#ifdef DEBUG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't set security descriptor DACL, error = %u!",
|
|
dwError);
|
|
#endif // DEBUG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
SecurityAttributes.nLength = sizeof(SecurityAttributes);
|
|
SecurityAttributes.lpSecurityDescriptor = abSecurityDescriptorBuffer;
|
|
SecurityAttributes.bInheritHandle = FALSE;
|
|
|
|
pSecurityAttributes = &SecurityAttributes;
|
|
#else // ! WINNT
|
|
pSecurityAttributes = NULL;
|
|
#endif // ! WINNT
|
|
|
|
|
|
//
|
|
// Use a random number for the instance key and event. We use this to let
|
|
// other instances know that we're alive to avoid the crash-cleanup code.
|
|
// Try to create the named event a couple times before giving up.
|
|
//
|
|
dwTry = 0;
|
|
do
|
|
{
|
|
this->m_dwInstanceKey = GetGlobalRand();
|
|
DPFX(DPFPREP, 2, "Using crash cleanup key %u.", this->m_dwInstanceKey);
|
|
|
|
#ifndef WINCE
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX)
|
|
{
|
|
wsprintf(tszObjectName, _T("Global\\") INSTANCENAMEDOBJECT_FORMATSTRING, this->m_dwInstanceKey);
|
|
this->m_hMappingStillActiveNamedObject = DNCreateEvent(pSecurityAttributes, FALSE, FALSE, tszObjectName);
|
|
}
|
|
else
|
|
#endif // ! WINCE
|
|
{
|
|
wsprintf(tszObjectName, INSTANCENAMEDOBJECT_FORMATSTRING, this->m_dwInstanceKey);
|
|
this->m_hMappingStillActiveNamedObject = DNCreateEvent(pSecurityAttributes, FALSE, FALSE, tszObjectName);
|
|
}
|
|
|
|
if (this->m_hMappingStillActiveNamedObject == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't create mapping-still-active named object, error = %u!", dwError);
|
|
#endif // DBG
|
|
|
|
dwTry++;
|
|
if (dwTry >= MAX_NUM_INSTANCE_EVENT_ATTEMPTS)
|
|
{
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
}
|
|
}
|
|
while (this->m_hMappingStillActiveNamedObject == NULL);
|
|
|
|
#ifdef WINNT
|
|
DNFree(pAcl);
|
|
pAcl = NULL;
|
|
|
|
FreeSid(pSid);
|
|
pSid = NULL;
|
|
#endif // WINNT
|
|
|
|
|
|
//
|
|
// Build the list of IP capable devices.
|
|
//
|
|
hr = this->CheckForNewDevices(NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't build device list!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// We could technically try to contact UPnP devices right now, but we don't
|
|
// because it's a slow blocking operation, and users have to call GetCaps
|
|
// at least once anyway.
|
|
//
|
|
|
|
|
|
Exit:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (this->m_hMappingStillActiveNamedObject != NULL)
|
|
{
|
|
DNCloseHandle(this->m_hMappingStillActiveNamedObject);
|
|
this->m_hMappingStillActiveNamedObject = NULL;
|
|
}
|
|
|
|
#ifdef WINNT
|
|
if (pAcl != NULL)
|
|
{
|
|
DNFree(pAcl);
|
|
pAcl = NULL;
|
|
}
|
|
|
|
if (pSid != NULL)
|
|
{
|
|
FreeSid(pSid);
|
|
pSid = NULL;
|
|
}
|
|
#endif // WINNT
|
|
|
|
this->RemoveAllItems();
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
if (this->m_sIoctls != INVALID_SOCKET)
|
|
{
|
|
this->m_pfnclosesocket(this->m_sIoctls); // ignore error
|
|
this->m_sIoctls = INVALID_SOCKET;
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
if (fWinSockStarted)
|
|
{
|
|
this->m_pfnWSACleanup(); // ignore error
|
|
}
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
if (this->m_hWinSockDLL != NULL)
|
|
{
|
|
this->m_pfnWSAStartup = NULL;
|
|
this->m_pfnWSACleanup = NULL;
|
|
this->m_pfnWSAGetLastError = NULL;
|
|
this->m_pfnsocket = NULL;
|
|
this->m_pfnclosesocket = NULL;
|
|
this->m_pfnbind = NULL;
|
|
this->m_pfnsetsockopt = NULL;
|
|
this->m_pfngetsockname = NULL;
|
|
this->m_pfnselect = NULL;
|
|
this->m_pfn__WSAFDIsSet = NULL;
|
|
this->m_pfnrecvfrom = NULL;
|
|
this->m_pfnsendto = NULL;
|
|
this->m_pfngethostname = NULL;
|
|
this->m_pfngethostbyname = NULL;
|
|
this->m_pfninet_addr = NULL;
|
|
this->m_pfnWSASocketA = NULL;
|
|
this->m_pfnWSAIoctl = NULL;
|
|
this->m_pfnWSAGetOverlappedResult = NULL;
|
|
this->m_pfnioctlsocket = NULL;
|
|
this->m_pfnconnect = NULL;
|
|
this->m_pfnshutdown = NULL;
|
|
this->m_pfnsend = NULL;
|
|
this->m_pfnrecv = NULL;
|
|
#ifdef DBG
|
|
this->m_pfngetsockopt = NULL;
|
|
#endif // DBG
|
|
|
|
|
|
this->m_dwFlags &= ~NATHELPUPNPOBJ_WINSOCK1;
|
|
|
|
FreeLibrary(this->m_hWinSockDLL);
|
|
this->m_hWinSockDLL = NULL;
|
|
}
|
|
|
|
if (this->m_hRasApi32DLL != NULL)
|
|
{
|
|
this->m_pfnRasGetEntryHrasconnW = NULL;
|
|
this->m_pfnRasGetProjectionInfo = NULL;
|
|
|
|
FreeLibrary(this->m_hRasApi32DLL);
|
|
this->m_hRasApi32DLL = NULL;
|
|
}
|
|
|
|
if (this->m_hIpHlpApiDLL != NULL)
|
|
{
|
|
this->m_pfnGetAdaptersInfo = NULL;
|
|
this->m_pfnGetIpForwardTable = NULL;
|
|
this->m_pfnGetBestRoute = NULL;
|
|
|
|
FreeLibrary(this->m_hIpHlpApiDLL);
|
|
this->m_hIpHlpApiDLL = NULL;
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
if (fSetFlags)
|
|
{
|
|
this->m_dwFlags &= ~(NATHELPUPNPOBJ_INITIALIZED |
|
|
NATHELPUPNPOBJ_USEUPNP |
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
NATHELPUPNPOBJ_USEHNETFWAPI |
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
#ifdef WINCE
|
|
NATHELPUPNPOBJ_DEVICECHANGED);
|
|
#else // ! WINCE
|
|
NATHELPUPNPOBJ_DEVICECHANGED |
|
|
NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX);
|
|
#endif // ! WINCE
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::Initialize
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::Close"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::Close
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Shuts down and de-registers this application with any
|
|
// Internet gateway servers. All port assignments are implicitly
|
|
// freed as a result of this operation.
|
|
//
|
|
// This must balance a successful call to Initialize.
|
|
//
|
|
// Arguments:
|
|
// DWORD dwFlags - Unused, must be zero.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Closing the helper API was successful.
|
|
// DPNHERR_GENERIC - An error occurred while closing.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to close.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::Close(const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fHaveLock = FALSE;
|
|
int iError;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%lx)", this, dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if (dwFlags != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED) )
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// We need to actively deregister any devices which are registered with
|
|
// Internet gateways.
|
|
//
|
|
this->RemoveAllItems();
|
|
|
|
|
|
//
|
|
// Close the named object since this process is going away.
|
|
//
|
|
if (this->m_hMappingStillActiveNamedObject != NULL)
|
|
{
|
|
DNCloseHandle(this->m_hMappingStillActiveNamedObject);
|
|
this->m_hMappingStillActiveNamedObject = NULL;
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// Close the Ioctl socket.
|
|
//
|
|
DNASSERT(this->m_sIoctls != INVALID_SOCKET);
|
|
this->m_pfnclosesocket(this->m_sIoctls); // ignore error
|
|
this->m_sIoctls = INVALID_SOCKET;
|
|
|
|
|
|
|
|
//
|
|
// If we submitted overlapped I/O, see if it got cancelled.
|
|
//
|
|
if (this->m_polAddressListChange != NULL)
|
|
{
|
|
OSVERSIONINFO osvi;
|
|
OSVERSIONINFOEX osvix;
|
|
BOOL fCanWait;
|
|
DWORD dwAttempt;
|
|
|
|
|
|
ZeroMemory(&osvi, sizeof(osvi));
|
|
osvi.dwOSVersionInfoSize = sizeof(osvi);
|
|
|
|
if (GetVersionEx(&osvi))
|
|
{
|
|
//
|
|
// Any platform but Win2K Gold, Win2K + SP1, or Win2K + SP2 can
|
|
// just go ahead and wait for the I/O to complete.
|
|
//
|
|
if ((osvi.dwPlatformId != VER_PLATFORM_WIN32_NT) ||
|
|
(osvi.dwMajorVersion > 5) ||
|
|
(osvi.dwMinorVersion > 0))
|
|
{
|
|
DPFX(DPFPREP, 3, "Windows %s version %u.%u detected, waiting for address list change Ioctl to complete.",
|
|
((osvi.dwPlatformId != VER_PLATFORM_WIN32_NT) ? _T("9x") : _T("NT")),
|
|
osvi.dwMajorVersion, osvi.dwMinorVersion);
|
|
|
|
fCanWait = TRUE;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Win2K versions < SP3 have a bug where the I/O is not always
|
|
// cancelled by closing the socket. We can't wait for the
|
|
// completion, sometimes it doesn't happen.
|
|
//
|
|
|
|
fCanWait = FALSE;
|
|
|
|
ZeroMemory(&osvix, sizeof(osvix));
|
|
osvix.dwOSVersionInfoSize = sizeof(osvix);
|
|
|
|
if (GetVersionEx((LPOSVERSIONINFO) (&osvix)))
|
|
{
|
|
//
|
|
// If SP3 or later is applied, we know it's fixed.
|
|
//
|
|
if (osvix.wServicePackMajor >= 3)
|
|
{
|
|
DPFX(DPFPREP, 3, "Windows 2000 Service Pack %u detected, waiting for address list change Ioctl to complete.",
|
|
osvix.wServicePackMajor);
|
|
fCanWait = TRUE;
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
if (osvix.wServicePackMajor == 0)
|
|
{
|
|
DPFX(DPFPREP, 2, "Windows 2000 Gold detected, not waiting for address list change Ioctl to complete.");
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 2, "Windows 2000 Service Pack %u detected, not waiting for address list change Ioctl to complete.",
|
|
osvix.wServicePackMajor);
|
|
}
|
|
}
|
|
#endif // DBG
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't get extended OS version information (err = %u)! Assuming not Win2K < SP3.",
|
|
dwError);
|
|
}
|
|
#endif // DBG
|
|
}
|
|
|
|
|
|
//
|
|
// Wait, if we can. Otherwise, leak the memory.
|
|
//
|
|
if (fCanWait)
|
|
{
|
|
//
|
|
// Keep looping until I/O completes. We will give up after a
|
|
// while to prevent hangs.
|
|
//
|
|
dwAttempt = 0;
|
|
while (! HasOverlappedIoCompleted(this->m_polAddressListChange))
|
|
{
|
|
DPFX(DPFPREP, 2, "Waiting %u ms for address list change Ioctl to complete.",
|
|
IOCOMPLETE_WAIT_INTERVAL);
|
|
|
|
//
|
|
// Give the OS some time to complete it.
|
|
//
|
|
Sleep(IOCOMPLETE_WAIT_INTERVAL);
|
|
|
|
dwAttempt++;
|
|
|
|
if (dwAttempt >= MAX_NUM_IOCOMPLETE_WAITS)
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Just leak the memory. See above notes and debug print
|
|
// statements
|
|
//
|
|
}
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't get OS version information (err = %u)! Assuming not Win2K < SP3.",
|
|
dwError);
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// We've either freed the memory or committed to leaking the object.
|
|
//
|
|
if (HasOverlappedIoCompleted(this->m_polAddressListChange))
|
|
{
|
|
//
|
|
// We didn't allocate it through DNMalloc, use the matching free
|
|
// function.
|
|
//
|
|
HeapFree(GetProcessHeap(), 0, this->m_polAddressListChange);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Overlapped address list change Ioctl has not completed yet, leaking %u byte overlapped structure at 0x%p.",
|
|
sizeof(WSAOVERLAPPED), this->m_polAddressListChange);
|
|
}
|
|
|
|
this->m_polAddressListChange = NULL;
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
|
|
//
|
|
// Cleanup WinSock.
|
|
//
|
|
iError = this->m_pfnWSACleanup();
|
|
if (iError != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't cleanup WinSock (error = %u)!", dwError);
|
|
#endif // DBG
|
|
|
|
//
|
|
// Continue anyway, so we can finish cleaning up the object.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// Unload the library.
|
|
//
|
|
|
|
this->m_pfnWSAStartup = NULL;
|
|
this->m_pfnWSACleanup = NULL;
|
|
this->m_pfnWSAGetLastError = NULL;
|
|
this->m_pfnsocket = NULL;
|
|
this->m_pfnclosesocket = NULL;
|
|
this->m_pfnbind = NULL;
|
|
this->m_pfnsetsockopt = NULL;
|
|
this->m_pfngetsockname = NULL;
|
|
this->m_pfnselect = NULL;
|
|
this->m_pfn__WSAFDIsSet = NULL;
|
|
this->m_pfnrecvfrom = NULL;
|
|
this->m_pfnsendto = NULL;
|
|
this->m_pfngethostname = NULL;
|
|
this->m_pfngethostbyname = NULL;
|
|
this->m_pfninet_addr = NULL;
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
this->m_pfnWSASocketA = NULL;
|
|
this->m_pfnWSAIoctl = NULL;
|
|
this->m_pfnWSAGetOverlappedResult = NULL;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
this->m_pfnioctlsocket = NULL;
|
|
this->m_pfnconnect = NULL;
|
|
this->m_pfnshutdown = NULL;
|
|
this->m_pfnsend = NULL;
|
|
this->m_pfnrecv = NULL;
|
|
#ifdef DBG
|
|
this->m_pfngetsockopt = NULL;
|
|
#endif // DBG
|
|
|
|
|
|
FreeLibrary(this->m_hWinSockDLL);
|
|
this->m_hWinSockDLL = NULL;
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// If we loaded RASAPI32.DLL, unload it.
|
|
//
|
|
if (this->m_hRasApi32DLL != NULL)
|
|
{
|
|
this->m_pfnRasGetEntryHrasconnW = NULL;
|
|
this->m_pfnRasGetProjectionInfo = NULL;
|
|
|
|
FreeLibrary(this->m_hRasApi32DLL);
|
|
this->m_hRasApi32DLL = NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// If we loaded IPHLPAPI.DLL, unload it.
|
|
//
|
|
if (this->m_hIpHlpApiDLL != NULL)
|
|
{
|
|
this->m_pfnGetAdaptersInfo = NULL;
|
|
this->m_pfnGetIpForwardTable = NULL;
|
|
this->m_pfnGetBestRoute = NULL;
|
|
|
|
FreeLibrary(this->m_hIpHlpApiDLL);
|
|
this->m_hIpHlpApiDLL = NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// If there was an alert event, we're done with it.
|
|
//
|
|
if (this->m_hAlertEvent != NULL)
|
|
{
|
|
CloseHandle(this->m_hAlertEvent);
|
|
this->m_hAlertEvent = NULL;
|
|
}
|
|
|
|
//
|
|
// If there was an alert I/O completion port, we're done with it.
|
|
//
|
|
if (this->m_hAlertIOCompletionPort != NULL)
|
|
{
|
|
CloseHandle(this->m_hAlertIOCompletionPort);
|
|
this->m_hAlertIOCompletionPort = NULL;
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
//
|
|
// Turn off flags which should reset it back to 0 or just the
|
|
// NOTCREATEDWITHCOM flag.
|
|
//
|
|
this->m_dwFlags &= ~(NATHELPUPNPOBJ_INITIALIZED |
|
|
NATHELPUPNPOBJ_USEUPNP |
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
NATHELPUPNPOBJ_USEHNETFWAPI |
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
NATHELPUPNPOBJ_WINSOCK1 |
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
NATHELPUPNPOBJ_DEVICECHANGED |
|
|
NATHELPUPNPOBJ_ADDRESSESCHANGED |
|
|
#ifdef WINCE
|
|
NATHELPUPNPOBJ_PORTREGISTERED);
|
|
#else // ! WINCE
|
|
NATHELPUPNPOBJ_PORTREGISTERED |
|
|
NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX);
|
|
#endif // ! WINCE
|
|
DNASSERT((this->m_dwFlags & ~NATHELPUPNPOBJ_NOTCREATEDWITHCOM) == 0);
|
|
|
|
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::Close
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetCaps"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetCaps
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Retrieves the capabilities of the Internet gateway server(s)
|
|
// and information on leased ports. This function should be
|
|
// called periodically with the DPNHGETCAPS_UPDATESERVERSTATUS
|
|
// flag to automatically extend port leases that are about to
|
|
// expire (that are in last 2 minutes of their lease).
|
|
//
|
|
// The DPNHGETCAPS_UPDATESERVERSTATUS flag also causes
|
|
// detection of changes in the servers' status since the last
|
|
// similar call to GetCaps. If a new server becomes available, an
|
|
// existing one became unavailable, or a server's public address
|
|
// changed in a way that affects an existing registered port
|
|
// mapping, then DPNHSUCCESS_ADDRESSESCHANGED is returned instead
|
|
// of DPNH_OK. The user should then update its port binding
|
|
// information via GetRegisteredAddresses.
|
|
//
|
|
// When DPNHGETCAPS_UPDATESERVERSTATUS is specified, this
|
|
// function may block for a short period of time while attempts
|
|
// are made to communicate with the server(s).
|
|
//
|
|
// GetCaps must be called with the
|
|
// DPNHGETCAPS_UPDATESERVERSTATUS flag at least once prior to
|
|
// using the GetRegisteredAddresses or QueryAddress methods.
|
|
//
|
|
// Arguments:
|
|
// DPNHCAPS * pdpnhcaps - Pointer to structure to be filled with the NAT
|
|
// helper's current capabilities. The dwSize
|
|
// field of the structure must be filled in before
|
|
// calling GetCaps.
|
|
// DWORD dwFlags - Flags to use when retrieving capabilities
|
|
// (DPNHGETCAPS_xxx).
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Determining capabilities was successful.
|
|
// Address status has not changed.
|
|
// DPNHSUCCESS_ADDRESSESCHANGED - One or more of the registered port
|
|
// mappings' addresses changed, retrieve
|
|
// updated mappings with
|
|
// GetRegisteredAddress.
|
|
// DPNHERR_GENERIC - An error occurred while determining
|
|
// capabilities.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_INVALIDPOINTER - An invalid pointer was specified.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to get
|
|
// capabilities.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the
|
|
// same thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::GetCaps(DPNHCAPS * const pdpnhcaps,
|
|
const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fHaveLock = FALSE;
|
|
DWORD dwCurrentTime;
|
|
DWORD dwLeaseTimeRemaining;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
CDevice * pDevice;
|
|
CUPnPDevice * pUPnPDevice = NULL;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, 0x%lx)",
|
|
this, pdpnhcaps, dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if ((pdpnhcaps == NULL) ||
|
|
(IsBadWritePtr(pdpnhcaps, sizeof(DPNHCAPS))))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid caps structure pointer specified!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (pdpnhcaps->dwSize != sizeof(DPNHCAPS))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid caps structure specified, dwSize must be %u!",
|
|
sizeof(DPNHCAPS));
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags & ~DPNHGETCAPS_UPDATESERVERSTATUS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED) )
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Fill in the base caps structure.
|
|
//
|
|
|
|
pdpnhcaps->dwFlags = 0;
|
|
|
|
pdpnhcaps->dwNumRegisteredPorts = 0;
|
|
|
|
pdpnhcaps->dwMinLeaseTimeRemaining = -1;
|
|
|
|
//
|
|
// pdpnhcaps->dwRecommendedGetCapsInterval is initialized below
|
|
//
|
|
|
|
|
|
if (dwFlags & DPNHGETCAPS_UPDATESERVERSTATUS)
|
|
{
|
|
//
|
|
// Remove any cached mappings that have expired.
|
|
//
|
|
this->ExpireOldCachedMappings();
|
|
|
|
|
|
//
|
|
// Extend leases, if necessary.
|
|
//
|
|
hr = this->ExtendAllExpiringLeases();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Extending all expiring leases failed!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Check for any new devices.
|
|
//
|
|
hr = this->CheckForNewDevices(NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Checking for new devices failed!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Check for possible changes in any server's status. The
|
|
// ADDRESSESCHANGED flag will be set on this object if there were
|
|
// changes that affected existing port mappings.
|
|
//
|
|
hr = this->UpdateServerStatus();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Updating servers' status failed!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Okay, so if things are different, alert the caller.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_ADDRESSESCHANGED)
|
|
{
|
|
hr = DPNHSUCCESS_ADDRESSESCHANGED;
|
|
this->m_dwFlags &= ~NATHELPUPNPOBJ_ADDRESSESCHANGED;
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// This flag should have been turned off by now if it ever got turned
|
|
// on.
|
|
//
|
|
DNASSERT(! (this->m_dwFlags & NATHELPUPNPOBJ_DEVICECHANGED));
|
|
|
|
|
|
//
|
|
// Print the current device and mapping status for debugging purposes.
|
|
//
|
|
this->DebugPrintCurrentStatus();
|
|
#endif // DBG
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not extending expiring leases or updating server status.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// Loop through all the devices, getting their gateway capabilities.
|
|
//
|
|
pBilink = this->m_blDevices.GetNext();
|
|
while (pBilink != (&this->m_blDevices))
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilink);
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
if (pDevice->IsHNetFirewalled())
|
|
{
|
|
//
|
|
// The firewall does not actively notify you of it going down.
|
|
//
|
|
pdpnhcaps->dwFlags |= DPNHCAPSFLAG_LOCALFIREWALLPRESENT | DPNHCAPSFLAG_PUBLICADDRESSAVAILABLE | DPNHCAPSFLAG_NOTALLSUPPORTACTIVENOTIFY;
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
pdpnhcaps->dwFlags |= DPNHCAPSFLAG_GATEWAYPRESENT;
|
|
|
|
if (pUPnPDevice->IsLocal())
|
|
{
|
|
pdpnhcaps->dwFlags |= DPNHCAPSFLAG_GATEWAYISLOCAL;
|
|
}
|
|
|
|
if (pUPnPDevice->GetExternalIPAddressV4() != 0)
|
|
{
|
|
pdpnhcaps->dwFlags |= DPNHCAPSFLAG_PUBLICADDRESSAVAILABLE;
|
|
}
|
|
|
|
//
|
|
// The custom UPnP stack currently does not support active
|
|
// notification...
|
|
//
|
|
pdpnhcaps->dwFlags |= DPNHCAPSFLAG_NOTALLSUPPORTACTIVENOTIFY;
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// Loop through all registered ports, counting them.
|
|
// We have the appropriate lock.
|
|
//
|
|
pBilink = this->m_blRegisteredPorts.GetNext();
|
|
dwCurrentTime = GETTIMESTAMP();
|
|
|
|
while (pBilink != (&this->m_blRegisteredPorts))
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_GLOBAL_BILINK(pBilink);
|
|
|
|
//
|
|
// Count these registered addresses toward the total.
|
|
//
|
|
pdpnhcaps->dwNumRegisteredPorts += pRegisteredPort->GetNumAddresses();
|
|
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
if (pDevice != NULL)
|
|
{
|
|
DNASSERT(! (pRegisteredPort->m_blDeviceList.IsListMember(&this->m_blUnownedPorts)));
|
|
|
|
//
|
|
// If they're registered with any UPnP devices using a non-
|
|
// permanent lease, calculate the minimum lease time remaining.
|
|
//
|
|
|
|
if ((pRegisteredPort->HasUPnPPublicAddresses()) &&
|
|
(! pRegisteredPort->HasPermanentUPnPLease()))
|
|
{
|
|
dwLeaseTimeRemaining = pRegisteredPort->GetUPnPLeaseExpiration() - dwCurrentTime;
|
|
if (dwLeaseTimeRemaining < pdpnhcaps->dwMinLeaseTimeRemaining)
|
|
{
|
|
//
|
|
// Temporarily store how much time remains.
|
|
//
|
|
pdpnhcaps->dwMinLeaseTimeRemaining = dwLeaseTimeRemaining;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(pRegisteredPort->m_blDeviceList.IsListMember(&this->m_blUnownedPorts));
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// There are different default recommended GetCaps intervals depending on
|
|
// whether there's a server present, and whether it supports active address
|
|
// change notification (that we can alert on) or not.
|
|
//
|
|
// If there are any leases which need to be renewed before that default
|
|
// time, the recommendation will be shortened appropriately.
|
|
//
|
|
|
|
//
|
|
// If GetCaps hasn't been called with UPDATESERVERSTATUS yet, recommend an
|
|
// immediate check.
|
|
//
|
|
if (this->m_dwLastUpdateServerStatusTime == 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Server status has not been updated yet, recommending immediate GetCaps.");
|
|
|
|
//
|
|
// Drop the lock, we're done here.
|
|
//
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// In an ideal world, we could get notified of changes and we would never
|
|
// have to poll. Unfortunately that isn't the case. We need to recommend
|
|
// a relatively short poll interval.
|
|
//
|
|
// Start by figuring out how long it's been since the last server update.
|
|
// This calculation really should not go negative. If it does, it means
|
|
// the caller hasn't updated the server status in ages anyway, so we should
|
|
// recommend immediate GetCaps.
|
|
//
|
|
// Otherwise if the 'port registered' flag is still set at this point, then
|
|
// the user must have called GetCaps previously, then RegisterPorts, then
|
|
// made this second GetCaps call before g_dwMinUpdateServerStatusInterval
|
|
// elapsed. Recommend that the user call us again as soon as the minimum
|
|
// update interval does elapse.
|
|
//
|
|
// In all other cases, generate a recommendation based on the current
|
|
// backed off poll interval.
|
|
//
|
|
dwCurrentTime = dwCurrentTime - this->m_dwLastUpdateServerStatusTime;
|
|
|
|
if ((int) dwCurrentTime < 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Server status was last updated a really long time ago (%u ms), recommending immediate GetCaps.",
|
|
dwCurrentTime);
|
|
pdpnhcaps->dwRecommendedGetCapsInterval = 0;
|
|
}
|
|
else if (this->m_dwFlags & NATHELPUPNPOBJ_PORTREGISTERED)
|
|
{
|
|
DPFX(DPFPREP, 1, "Didn't handle new port registration because server was last updated %u ms ago, (poll interval staying at %u ms).",
|
|
dwCurrentTime, this->m_dwNextPollInterval);
|
|
|
|
pdpnhcaps->dwRecommendedGetCapsInterval = g_dwMinUpdateServerStatusInterval - dwCurrentTime;
|
|
if ((int) pdpnhcaps->dwRecommendedGetCapsInterval < 0)
|
|
{
|
|
pdpnhcaps->dwRecommendedGetCapsInterval = 0;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Server was last updated %u ms ago, current poll interval is %u ms.",
|
|
dwCurrentTime, this->m_dwNextPollInterval);
|
|
|
|
//
|
|
// Calculate a new recommended interval based on the current value, and
|
|
// backoff that interval if necessary.
|
|
//
|
|
pdpnhcaps->dwRecommendedGetCapsInterval = this->m_dwNextPollInterval - dwCurrentTime;
|
|
this->m_dwNextPollInterval += GetGlobalRand() % g_dwPollIntervalBackoff;
|
|
if (this->m_dwNextPollInterval > g_dwMaxPollInterval)
|
|
{
|
|
this->m_dwNextPollInterval = g_dwMaxPollInterval;
|
|
DPFX(DPFPREP, 3, "Capping next poll interval at %u ms.",
|
|
this->m_dwNextPollInterval);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "Next poll interval will be %u ms.",
|
|
this->m_dwNextPollInterval);
|
|
}
|
|
|
|
|
|
//
|
|
// If that time went negative, then it implies that the interval has
|
|
// already elapsed. Recommend immediate GetCaps.
|
|
//
|
|
if (((int) pdpnhcaps->dwRecommendedGetCapsInterval) < 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Recommended interval already elapsed (%i ms), suggesting immediate GetCaps.",
|
|
((int) pdpnhcaps->dwRecommendedGetCapsInterval));
|
|
pdpnhcaps->dwRecommendedGetCapsInterval = 0;
|
|
}
|
|
}
|
|
|
|
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
|
|
|
|
//
|
|
// If there is a non-INFINITE lease time remaining, see if that affects the
|
|
// GetCaps interval.
|
|
//
|
|
if (pdpnhcaps->dwMinLeaseTimeRemaining != -1)
|
|
{
|
|
//
|
|
// If there are leases that need to be refreshed before the default
|
|
// recommendation, then use those instead.
|
|
//
|
|
if (pdpnhcaps->dwMinLeaseTimeRemaining < LEASE_RENEW_TIME)
|
|
{
|
|
DPFX(DPFPREP, 1, "Lease needs renewing right away (min %u < %u ms), recommending immediate GetCaps.",
|
|
pdpnhcaps->dwMinLeaseTimeRemaining, LEASE_RENEW_TIME);
|
|
|
|
pdpnhcaps->dwRecommendedGetCapsInterval = 0;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Either pick the time when the lease should be renewed or leave
|
|
// it as the recommended time, whichever is shorter.
|
|
//
|
|
if ((pdpnhcaps->dwMinLeaseTimeRemaining - LEASE_RENEW_TIME) < pdpnhcaps->dwRecommendedGetCapsInterval)
|
|
{
|
|
pdpnhcaps->dwRecommendedGetCapsInterval = pdpnhcaps->dwMinLeaseTimeRemaining - LEASE_RENEW_TIME;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "GetCaps flags = 0x%lx, num registered ports = %u, min lease time remaining = %i, recommended interval = %i.",
|
|
pdpnhcaps->dwFlags,
|
|
pdpnhcaps->dwNumRegisteredPorts,
|
|
((int) pdpnhcaps->dwMinLeaseTimeRemaining),
|
|
((int) pdpnhcaps->dwRecommendedGetCapsInterval));
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::GetCaps
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::RegisterPorts"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::RegisterPorts
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Asks for public realm port(s) that are aliases for the local
|
|
// port(s) on this private realm node. If a server is available,
|
|
// all traffic directed to the gateway on the public side at the
|
|
// allocated public ports-- which the gateway provides and
|
|
// specifies in the response-- will be directed to the specified
|
|
// local ports. If the DPNHREGISTERPORTS_FIXEDPORTS flag is not
|
|
// specified, the ports assigned on the public interface are
|
|
// arbitrary (i.e. may not be the same as those in awLocalPort).
|
|
// The address and ports actually allocated can be retrieved by
|
|
// calling GetRegisteredAddresses.
|
|
//
|
|
// The address component for every SOCKADDR structure in the
|
|
// array must be the same. A separate RegisterPorts call is
|
|
// required to register multiple ports that are not using the same
|
|
// interface. The address can be INADDR_ANY, in which case the
|
|
// "best" server will be used. If multiple servers are available
|
|
// via different adapters, an adapter with an Internet gateway is
|
|
// selected. If no adapters have Internet gateways, the first
|
|
// adapter with a local firewall is selected. If neither are
|
|
// available, then the first one where either a gateway or a
|
|
// firewall becomes available will be automatically selected.
|
|
// Once one of the adapters has been assigned, it cannot be
|
|
// changed. Since the server chosen by this method may not be
|
|
// optimal for a particular application, it is recommended that
|
|
// individual addresses be registered instead of INADDR_ANY.
|
|
//
|
|
// If the address in aLocalAddresses is not one of those
|
|
// available to the local machine, the registration will still
|
|
// succeed. If an adapter with that address becomes available,
|
|
// the port mapping will automatically be applied, and it will
|
|
// gain a public mapping with any server available to that
|
|
// adapter. If the address was originally available but the
|
|
// network adapter is subsequently removed from the system, any
|
|
// public address mapping is lost. It will be automatically
|
|
// regained if the local address becomes available again. It is
|
|
// recommended that the caller detect local address changes
|
|
// independently and de-register/re-register mappings per adapter
|
|
// as appropriate for maximum control.
|
|
//
|
|
// If the DPNHREGISTERPORTS_SHAREDPORTS flag is used, the
|
|
// server will allow other NAT clients to register it as well.
|
|
// Any UDP traffic received on the public interface will be
|
|
// forwarded to all clients registered. This requires the
|
|
// DPNHREGISTERPORTS_FIXEDPORTS flag and cannot be used with
|
|
// DPNHREGISTERPORTS_TCP.
|
|
//
|
|
// The user should specify a requested lease time that the
|
|
// server will attempt to honor. The actual time remaining can be
|
|
// can be retrieved by calling GetRegisteredAddresses.
|
|
//
|
|
// Note that if a server is not available, this function will
|
|
// still succeed. GetRegisteredAddresses will return
|
|
// DPNHERR_NOMAPPING for the handle returned in phRegisteredPorts
|
|
// in that case. If the server arrives later during the session,
|
|
// calling GetCaps periodically can detect this and automatically
|
|
// map previously registered ports. Use GetRegisteredAddresses to
|
|
// retrieve the newly mapped address when that occurs.
|
|
//
|
|
// Only 16 ports may be registered at a time, but RegisterPorts
|
|
// may be called as many times as desired.
|
|
//
|
|
// The same array of addresses may be registered more than
|
|
// once. Each DPNHHANDLE returned must be released with
|
|
// DeregisterPorts or Close. If an individual address was
|
|
// previously registered but in a different array or a different
|
|
// order in the array, then the DPNHERR_PORTALREADYREGISTERED
|
|
// error code is returned.
|
|
//
|
|
// Arguments:
|
|
// SOCKADDR * aLocalAddresses - Array of local address and port tuples
|
|
// for which remote ports are requested.
|
|
// DWORD dwAddressesSize - Size of entire local addresses array.
|
|
// DWORD dwNumAddresses - Number of SOCKADDR structures in local
|
|
// addresses array.
|
|
// DWORD dwLeaseTime - Requested time, in milliseconds, to lease
|
|
// the ports. As long as GetCaps is
|
|
// called before this time has expired,
|
|
// the lease will automatically be
|
|
// renewed.
|
|
// DPNHHANDLE * phRegisteredPorts - Place to store an identifier for this
|
|
// binding which can later be used to
|
|
// query or release the binding.
|
|
// DWORD dwFlags - Flags to use when registering the port
|
|
// (DPNHREGISTERPORTS_xxx).
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The ports were successfully registered
|
|
// (although no public address may be
|
|
// available yet).
|
|
// DPNHERR_GENERIC - An error occurred that prevented
|
|
// registration of the requested ports.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_INVALIDPOINTER - An invalid pointer was specified.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to register
|
|
// the ports.
|
|
// DPNHERR_PORTALREADYREGISTERED - At least one of the ports has already
|
|
// been registered in a different address
|
|
// array or order.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the
|
|
// same thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::RegisterPorts(const SOCKADDR * const aLocalAddresses,
|
|
const DWORD dwAddressesSize,
|
|
const DWORD dwNumAddresses,
|
|
const DWORD dwLeaseTime,
|
|
DPNHHANDLE * const phRegisteredPorts,
|
|
const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
ULONG ulFirstAddress;
|
|
DWORD dwTemp;
|
|
DWORD dwMatch;
|
|
BOOL fHaveLock = FALSE;
|
|
CRegisteredPort * pRegisteredPort = NULL;
|
|
CDevice * pDevice = NULL;
|
|
CBilink * pBilink;
|
|
SOCKADDR_IN * pasaddrinTemp;
|
|
CUPnPDevice * pUPnPDevice = NULL;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, %u, %u, %u, 0x%p, 0x%lx)",
|
|
this, aLocalAddresses, dwAddressesSize, dwNumAddresses, dwLeaseTime,
|
|
phRegisteredPorts, dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if (aLocalAddresses == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Local addresses array cannot be NULL!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwNumAddresses == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Number of addresses cannot be 0!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwAddressesSize != (dwNumAddresses * sizeof(SOCKADDR)))
|
|
{
|
|
DPFX(DPFPREP, 0, "Addresses array size invalid!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (IsBadReadPtr(aLocalAddresses, dwAddressesSize))
|
|
{
|
|
DPFX(DPFPREP, 0, "Local addresses array buffer is invalid!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwNumAddresses > DPNH_MAX_SIMULTANEOUS_PORTS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Only %u ports may be registered at a time!", DPNH_MAX_SIMULTANEOUS_PORTS);
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (((SOCKADDR_IN*) aLocalAddresses)->sin_family != AF_INET)
|
|
{
|
|
DPFX(DPFPREP, 0, "First address in array is not AF_INET, only IPv4 addresses are supported!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (((SOCKADDR_IN*) aLocalAddresses)->sin_addr.S_un.S_addr == INADDR_BROADCAST)
|
|
{
|
|
DPFX(DPFPREP, 0, "First address cannot be broadcast address!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (((SOCKADDR_IN*) aLocalAddresses)->sin_port == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "First port in array is 0, a valid port must be specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
ulFirstAddress = ((SOCKADDR_IN*) aLocalAddresses)->sin_addr.S_un.S_addr;
|
|
|
|
for(dwTemp = 1; dwTemp < dwNumAddresses; dwTemp++)
|
|
{
|
|
//
|
|
// Make sure this address family type is supported.
|
|
//
|
|
if (((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_family != AF_INET)
|
|
{
|
|
DPFX(DPFPREP, 0, "Address at array index %u is not AF_INET, all items in the array must be the same IPv4 address!",
|
|
dwTemp);
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// If this address doesn't match the first, then the caller broke the
|
|
// rules.
|
|
//
|
|
if (((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_addr.S_un.S_addr != ulFirstAddress)
|
|
{
|
|
//
|
|
// Don't use inet_ntoa because we may not be initialized yet.
|
|
//
|
|
DPFX(DPFPREP, 0, "Address %u.%u.%u.%u at array index %u differs from the first, all addresses in the array must match!",
|
|
((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_addr.S_un.S_un_b.s_b1,
|
|
((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_addr.S_un.S_un_b.s_b2,
|
|
((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_addr.S_un.S_un_b.s_b3,
|
|
((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_addr.S_un.S_un_b.s_b4,
|
|
dwTemp);
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Make sure this port isn't 0 either.
|
|
//
|
|
if (((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_port == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Port at array index %u is 0, valid ports must be specified!", dwTemp);
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
if (dwLeaseTime == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid lease time specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((phRegisteredPorts == NULL) ||
|
|
(IsBadWritePtr(phRegisteredPorts, sizeof(DPNHHANDLE))))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid port mapping handle pointer specified!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags & ~(DPNHREGISTERPORTS_TCP | DPNHREGISTERPORTS_FIXEDPORTS | DPNHREGISTERPORTS_SHAREDPORTS))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags & DPNHREGISTERPORTS_SHAREDPORTS)
|
|
{
|
|
//
|
|
// SHAREDPORTS cannot be used with TCP and requires a FIXEDPORTS.
|
|
//
|
|
if ((dwFlags & DPNHREGISTERPORTS_TCP) || (! (dwFlags & DPNHREGISTERPORTS_FIXEDPORTS)))
|
|
{
|
|
DPFX(DPFPREP, 0, "SHAREDPORTS flag requires FIXEDPORTS flag and cannot be used with TCP flag!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED) )
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Loop through all existing registered port mappings and look for this
|
|
// array of ports.
|
|
//
|
|
pBilink = this->m_blRegisteredPorts.GetNext();
|
|
while (pBilink != &this->m_blRegisteredPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_GLOBAL_BILINK(pBilink);
|
|
|
|
//
|
|
// Don't bother looking at addresses of the wrong type or at arrays of
|
|
// the wrong size.
|
|
//
|
|
if (((pRegisteredPort->IsTCP() && (dwFlags & DPNHREGISTERPORTS_TCP)) ||
|
|
((! pRegisteredPort->IsTCP()) && (! (dwFlags & DPNHREGISTERPORTS_TCP)))) &&
|
|
(pRegisteredPort->GetNumAddresses() == dwNumAddresses))
|
|
{
|
|
pasaddrinTemp = pRegisteredPort->GetPrivateAddressesArray();
|
|
for(dwTemp = 0; dwTemp < dwNumAddresses; dwTemp++)
|
|
{
|
|
//
|
|
// If the addresses don't match, stop looping.
|
|
//
|
|
if ((pasaddrinTemp[dwTemp].sin_port != ((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_port) ||
|
|
(pasaddrinTemp[dwTemp].sin_addr.S_un.S_addr != ((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_addr.S_un.S_addr))
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// If all the addresses matched, then this item was already
|
|
// registered.
|
|
//
|
|
if (dwTemp >= dwNumAddresses)
|
|
{
|
|
DPFX(DPFPREP, 1, "Array of %u addresses was already registered, returning existing mapping 0x%p.",
|
|
dwNumAddresses, pRegisteredPort);
|
|
goto ReturnUserHandle;
|
|
}
|
|
|
|
DPFX(DPFPREP, 7, "Existing mapping 0x%p does not match all %u addresses.",
|
|
pRegisteredPort, dwNumAddresses);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Existing mapping isn't same type or doesn't have same number of
|
|
// items in array.
|
|
//
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, none of the existing mappings match. Loop through each
|
|
// of the ports and make sure they aren't already registered inside some
|
|
// other mapping.
|
|
//
|
|
for(dwTemp = 0; dwTemp < dwNumAddresses; dwTemp++)
|
|
{
|
|
pBilink = this->m_blRegisteredPorts.GetNext();
|
|
while (pBilink != &this->m_blRegisteredPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_GLOBAL_BILINK(pBilink);
|
|
|
|
pasaddrinTemp = pRegisteredPort->GetPrivateAddressesArray();
|
|
for(dwMatch = 0; dwMatch < pRegisteredPort->GetNumAddresses(); dwMatch++)
|
|
{
|
|
//
|
|
// If the addresses match, then we can't map these ports.
|
|
//
|
|
if ((pasaddrinTemp[dwMatch].sin_port == ((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_port) &&
|
|
(pasaddrinTemp[dwMatch].sin_addr.S_un.S_addr == ((SOCKADDR_IN*) (&aLocalAddresses[dwTemp]))->sin_addr.S_un.S_addr))
|
|
{
|
|
DPFX(DPFPREP, 0, "Existing mapping 0x%p already registered the address %u.%u.%u.%u:%u!",
|
|
pRegisteredPort,
|
|
pasaddrinTemp[dwMatch].sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinTemp[dwMatch].sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinTemp[dwMatch].sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinTemp[dwMatch].sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pasaddrinTemp[dwMatch].sin_port));
|
|
|
|
//
|
|
// Clear the pointer so we don't delete the object.
|
|
//
|
|
pRegisteredPort = NULL;
|
|
|
|
hr = DPNHERR_PORTALREADYREGISTERED;
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here the ports are all unique. Create a new mapping object
|
|
// we'll use to refer to the binding.
|
|
//
|
|
pRegisteredPort = new CRegisteredPort(dwLeaseTime, dwFlags);
|
|
if (pRegisteredPort == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
hr = pRegisteredPort->SetPrivateAddresses((SOCKADDR_IN*) aLocalAddresses, dwNumAddresses);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't store private addresses array!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Find the device that matches the given addresses.
|
|
//
|
|
// The first entry of aLocalAddresses is representative of all entries since
|
|
// they should all share the same address.
|
|
//
|
|
// Since there won't be an existing registered port for this address, don't
|
|
// bother looking through them for a matching address.
|
|
//
|
|
pDevice = this->FindMatchingDevice((SOCKADDR_IN*) (&aLocalAddresses[0]),
|
|
FALSE);
|
|
if (pDevice == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "No device for given address (%u.%u.%u.%u), storing 0x%p in unowned list.",
|
|
((SOCKADDR_IN*) aLocalAddresses)->sin_addr.S_un.S_un_b.s_b1,
|
|
((SOCKADDR_IN*) aLocalAddresses)->sin_addr.S_un.S_un_b.s_b2,
|
|
((SOCKADDR_IN*) aLocalAddresses)->sin_addr.S_un.S_un_b.s_b3,
|
|
((SOCKADDR_IN*) aLocalAddresses)->sin_addr.S_un.S_un_b.s_b4,
|
|
pRegisteredPort);
|
|
|
|
pRegisteredPort->m_blDeviceList.InsertBefore(&this->m_blUnownedPorts);
|
|
}
|
|
else
|
|
{
|
|
pRegisteredPort->MakeDeviceOwner(pDevice);
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Start by mapping with the local firewall, if there is one.
|
|
//
|
|
if (pDevice->IsHNetFirewalled())
|
|
{
|
|
hr = this->CheckForLocalHNetFirewallAndMapPorts(pDevice,
|
|
pRegisteredPort);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't check for local HNet firewall and map ports (err = 0x%lx)! Continuing.",
|
|
hr);
|
|
DNASSERT(! pDevice->IsHNetFirewalled());
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// No local HomeNet firewall (last time we checked).
|
|
//
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
//
|
|
// Map the ports on the UPnP device, if there is one.
|
|
//
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
//
|
|
// GetUPnPDevice did not add a reference to pUPnPDevice for us.
|
|
//
|
|
pUPnPDevice->AddRef();
|
|
|
|
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
//
|
|
// Actually map the ports.
|
|
//
|
|
hr = this->MapPortsOnUPnPDevice(pUPnPDevice, pRegisteredPort);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't map ports on UPnP device 0x%p (0x%lx)! Ignoring.",
|
|
pUPnPDevice, hr);
|
|
|
|
//
|
|
// It may have been cleared already, but doing it twice
|
|
// shouldn't be harmful.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pRegisteredPort->GetOwningDevice());
|
|
|
|
hr = DPNH_OK;
|
|
}
|
|
|
|
pUPnPDevice->DecRef();
|
|
pUPnPDevice = NULL;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// No UPnP device.
|
|
//
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Save the mapping in the global list (we have the lock).
|
|
//
|
|
pRegisteredPort->m_blGlobalList.InsertBefore(&this->m_blRegisteredPorts);
|
|
|
|
|
|
ReturnUserHandle:
|
|
|
|
//
|
|
// Remember that a port has been registered.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_PORTREGISTERED;
|
|
|
|
//
|
|
// We're about to give the port to the user.
|
|
//
|
|
pRegisteredPort->AddUserRef();
|
|
|
|
//
|
|
// We're going to give the user a direct pointer to the object (disguised
|
|
// as an opaque DPNHHANDLE, of course).
|
|
//
|
|
(*phRegisteredPorts) = (DPNHHANDLE) pRegisteredPort;
|
|
|
|
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Returning registered port 0x%p (first private address = %u.%u.%u.%u:%u).",
|
|
pRegisteredPort,
|
|
((SOCKADDR_IN*) aLocalAddresses)[0].sin_addr.S_un.S_un_b.s_b1,
|
|
((SOCKADDR_IN*) aLocalAddresses)[0].sin_addr.S_un.S_un_b.s_b2,
|
|
((SOCKADDR_IN*) aLocalAddresses)[0].sin_addr.S_un.S_un_b.s_b3,
|
|
((SOCKADDR_IN*) aLocalAddresses)[0].sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(((SOCKADDR_IN*) aLocalAddresses)[0].sin_port));
|
|
|
|
|
|
hr = DPNH_OK;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
pUPnPDevice->DecRef();
|
|
}
|
|
|
|
if (pRegisteredPort != NULL)
|
|
{
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
HRESULT temphr;
|
|
|
|
|
|
//
|
|
// Unmap the port.
|
|
//
|
|
// Don't bother alerting user about address change. It would have
|
|
// already been taken care of if this was due to a fatal error, and
|
|
// there would be no perceived changed if not.
|
|
//
|
|
temphr = this->UnmapPortOnLocalHNetFirewall(pRegisteredPort, TRUE, FALSE);
|
|
if (temphr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed unmapping registered port 0x%p on local HomeNet firewall (err = 0x%lx)! Ignoring.",
|
|
pRegisteredPort, temphr);
|
|
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
}
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
if (pDevice != NULL)
|
|
{
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
}
|
|
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
delete pRegisteredPort;
|
|
}
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::RegisterPorts
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetRegisteredAddresses"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetRegisteredAddresses
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Returns the current public address mappings for a given
|
|
// registered port group. If there are no servers currently
|
|
// available, then DPNHERR_SERVERNOTAVAILABLE is returned. If the
|
|
// servers' public interfaces are not currently valid, then
|
|
// DPNHERR_NOMAPPING is returned, but appropriate values will
|
|
// still be placed in pdwAddressTypeFlags and
|
|
// pdwLeaseTimeRemaining.
|
|
//
|
|
// If the mapping was registered with the
|
|
// DPNHREGISTERPORTS_FIXEDPORTS flag, but at least one port is
|
|
// already in use on the gateway, then DPNHERR_PORTUNAVAILABLE is
|
|
// returned and appropriate flags will still be placed in
|
|
// pdwAddressTypeFlags.
|
|
//
|
|
// If the local machine has a cooperative firewall installed,
|
|
// the requested port is opened locally on the firewall before
|
|
// being mapped on the Internet gateway. Normally this function
|
|
// returns the public address on the Internet gateway address when
|
|
// both are present. Since some firewalls remap the port number
|
|
// when opening non-fixed ports, the
|
|
// DPNHGETREGISTEREDADDRESSES_LOCALFIREWALLREMAPONLY allows the
|
|
// caller to retrieve the locally remapped address, even if there
|
|
// is a mapping on an Internet gateway.
|
|
//
|
|
// Some gateway devices do not natively support ports that are
|
|
// not fixed, and may generate the DPNHERR_PORTUNAVAILABLE return
|
|
// code even when the DPNHREGISTERPORTS_FIXEDPORTS flag was not
|
|
// specified. The caller should de-register the port mapping
|
|
// handle, rebind the application to different ports, and call
|
|
// RegisterPorts again.
|
|
//
|
|
// If the buffer indicated by paPublicAddresses is too small,
|
|
// then the size required is returned in pdwPublicAddressesSize
|
|
// and DPNHERR_BUFFERTOOSMALL is returned. Otherwise the number of
|
|
// bytes written is returned in pdwPublicAddressesSize.
|
|
//
|
|
// Even though the addresses are returned as individual
|
|
// SOCKADDRs, all ports registered at the same time will share the
|
|
// same public address. Only the port components will vary.
|
|
//
|
|
// All buffers are optional and may be NULL, but if
|
|
// paPublicAddresses is specified, it must be accompanied by an
|
|
// appropriate size in pdwPublicAddressesSize.
|
|
//
|
|
// If GetCaps has not been previously called with the
|
|
// DPNHGETCAPS_UPDATESERVERSTATUS flag at least once, then the
|
|
// error code DPNHERR_UPDATESERVERSTATUS is returned.
|
|
//
|
|
// Arguments:
|
|
// DPNHHANDLE hRegisteredPorts - Handle for a specific binding returned by
|
|
// RegisterPorts.
|
|
// SOCKADDR * paPublicAddresses - Buffer to return assigned public realm
|
|
// address, or NULL if not desired.
|
|
// DWORD * pdwPublicAddressesSize - Pointer to size of paPublicAddresses
|
|
// buffer, or place to store size
|
|
// required/written. Cannot be NULL if
|
|
// paPublicAddresses is not NULL.
|
|
// DWORD * pdwAddressTypeFlags - Place to store flags describing the
|
|
// address types returned, or NULL if not
|
|
// desired.
|
|
// DWORD * pdwLeaseTimeRemaining - Place to store approximate number of
|
|
// milliseconds remaining in the port
|
|
// lease, or NULL if not desired. Call
|
|
// GetCaps to automatically extend leases
|
|
// about to expire.
|
|
// DWORD dwFlags - Unused, must be zero.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Information on the port mapping was found and
|
|
// the addresses were stored in
|
|
// paPublicAddresses.
|
|
// DPNHERR_BUFFERTOOSMALL - There was not enough room in the buffer to
|
|
// store the addresses.
|
|
// DPNHERR_GENERIC - An error occurred while retrieving the
|
|
// requested port mapping.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_INVALIDPOINTER - An invalid pointer was specified.
|
|
// DPNHERR_NOMAPPING - The server(s) do not have valid public
|
|
// interfaces.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to get the
|
|
// addresses.
|
|
// DPNHERR_PORTUNAVAILABLE - At least one of the ports is not available on
|
|
// the server.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
// DPNHERR_SERVERNOTAVAILABLE - No servers are currently present.
|
|
// DPNHERR_UPDATESERVERSTATUS - GetCaps has not been called with the
|
|
// DPNHGETCAPS_UPDATESERVERSTATUS flag yet.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::GetRegisteredAddresses(const DPNHHANDLE hRegisteredPorts,
|
|
SOCKADDR * const paPublicAddresses,
|
|
DWORD * const pdwPublicAddressesSize,
|
|
DWORD * const pdwAddressTypeFlags,
|
|
DWORD * const pdwLeaseTimeRemaining,
|
|
const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
CRegisteredPort * pRegisteredPort;
|
|
BOOL fHaveLock = FALSE;
|
|
BOOL fRegisteredWithServer = FALSE;
|
|
BOOL fFoundValidMapping = FALSE;
|
|
BOOL fPortIsUnavailable = FALSE;
|
|
DWORD dwSizeRequired;
|
|
DWORD dwAddressTypeFlags;
|
|
DWORD dwCurrentTime;
|
|
//DWORD dwTempLeaseTimeRemaining;
|
|
DWORD dwLeaseTimeRemaining = -1;
|
|
CDevice * pDevice;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, 0x%p, 0x%p, 0x%lx)",
|
|
this, hRegisteredPorts, paPublicAddresses, pdwPublicAddressesSize,
|
|
pdwAddressTypeFlags, pdwLeaseTimeRemaining, dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
pRegisteredPort = (CRegisteredPort*) hRegisteredPorts;
|
|
if (! pRegisteredPort->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid registered port mapping handle specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (paPublicAddresses != NULL)
|
|
{
|
|
if ((pdwPublicAddressesSize == NULL) ||
|
|
(IsBadWritePtr(pdwPublicAddressesSize, sizeof(DWORD))))
|
|
{
|
|
DPFX(DPFPREP, 0, "When specifying a public addresses buffer, a valid size must be given!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (IsBadWritePtr(paPublicAddresses, (*pdwPublicAddressesSize)))
|
|
{
|
|
DPFX(DPFPREP, 0, "The public addresses buffer is invalid!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if ((pdwPublicAddressesSize != NULL) &&
|
|
(IsBadWritePtr(pdwPublicAddressesSize, sizeof(DWORD))))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid pointer for size of public addresses buffer!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
if ((pdwAddressTypeFlags != NULL) &&
|
|
(IsBadWritePtr(pdwAddressTypeFlags, sizeof(DWORD))))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid pointer for address type flags!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((pdwLeaseTimeRemaining != NULL) &&
|
|
(IsBadWritePtr(pdwLeaseTimeRemaining, sizeof(DWORD))))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid pointer for lease time remaining!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags & ~DPNHGETREGISTEREDADDRESSES_LOCALFIREWALLREMAPONLY)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Start the flags off with the information regarding TCP vs. UDP.
|
|
//
|
|
if (pRegisteredPort->IsTCP())
|
|
{
|
|
dwAddressTypeFlags = DPNHADDRESSTYPE_TCP;
|
|
}
|
|
else
|
|
{
|
|
dwAddressTypeFlags = 0;
|
|
}
|
|
|
|
|
|
//
|
|
// Add in other flags we know already.
|
|
//
|
|
|
|
if (pRegisteredPort->IsFixedPort())
|
|
{
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_FIXEDPORTS;
|
|
}
|
|
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_SHAREDPORTS;
|
|
}
|
|
|
|
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED) )
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
if (this->m_dwLastUpdateServerStatusTime == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "GetCaps has not been called with UPDATESERVERSTATUS flag yet!");
|
|
hr = DPNHERR_UPDATESERVERSTATUS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Get a shortcut pointer to the device (may not exist).
|
|
//
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
|
|
|
|
//
|
|
// Get the current time for both the remote and local lease
|
|
// calculations.
|
|
//
|
|
dwCurrentTime = GETTIMESTAMP();
|
|
|
|
|
|
if (! (dwFlags & DPNHGETREGISTEREDADDRESSES_LOCALFIREWALLREMAPONLY))
|
|
{
|
|
CUPnPDevice * pUPnPDevice;
|
|
|
|
|
|
//
|
|
// First check for a mapping on the UPnP device.
|
|
//
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
|
|
fRegisteredWithServer = TRUE;
|
|
|
|
//
|
|
// Make sure the UPnP device currently has a valid external
|
|
// address. If so, hand the mapping out.
|
|
//
|
|
if (pUPnPDevice->GetExternalIPAddressV4() != 0)
|
|
{
|
|
if (pdwPublicAddressesSize != NULL)
|
|
{
|
|
dwSizeRequired = pRegisteredPort->GetAddressesSize();
|
|
|
|
if ((paPublicAddresses == NULL) ||
|
|
(dwSizeRequired > (*pdwPublicAddressesSize)))
|
|
{
|
|
//
|
|
// Not enough room in buffer, return the size required
|
|
// and the BUFFERTOOSMALL error code.
|
|
//
|
|
(*pdwPublicAddressesSize) = dwSizeRequired;
|
|
hr = DPNHERR_BUFFERTOOSMALL;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Buffer was large enough, return the size written.
|
|
//
|
|
(*pdwPublicAddressesSize) = dwSizeRequired;
|
|
pRegisteredPort->CopyUPnPPublicAddresses((SOCKADDR_IN*) paPublicAddresses);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using address buffer.
|
|
//
|
|
}
|
|
|
|
fFoundValidMapping = TRUE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "The UPnP Internet Gateway Device does not currently have a valid public address.");
|
|
}
|
|
|
|
//
|
|
// Add in the flag indicating that there's a UPnP device.
|
|
//
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_GATEWAY;
|
|
|
|
//
|
|
// See if the UPnP device is local.
|
|
//
|
|
if (pUPnPDevice->IsLocal())
|
|
{
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_GATEWAYISLOCAL;
|
|
}
|
|
|
|
//
|
|
// Get the relative UPnP lease time remaining, if it's not
|
|
// permanent.
|
|
//
|
|
if (! pRegisteredPort->HasPermanentUPnPLease())
|
|
{
|
|
dwLeaseTimeRemaining = pRegisteredPort->GetUPnPLeaseExpiration() - dwCurrentTime;
|
|
|
|
if (((int) dwLeaseTimeRemaining) < 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port mapping's UPnP lease has already expired, returning 0 for lease time remaining.");
|
|
dwLeaseTimeRemaining = 0;
|
|
}
|
|
}
|
|
}
|
|
else if (pRegisteredPort->IsUPnPPortUnavailable())
|
|
{
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
|
|
fRegisteredWithServer = TRUE;
|
|
fPortIsUnavailable = TRUE;
|
|
|
|
DPFX(DPFPREP, 8, "The UPnP device indicates the port(s) are unavailable.");
|
|
|
|
//
|
|
// Add in the flag indicating that there's a UPnP device.
|
|
//
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_GATEWAY;
|
|
|
|
//
|
|
// See if the UPnP device is local.
|
|
//
|
|
if (pUPnPDevice->IsLocal())
|
|
{
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_GATEWAYISLOCAL;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// We're not allowed to return the UPnP mapping.
|
|
//
|
|
DPFX(DPFPREP, 8, "Ignoring any Internet gateway mappings, LOCALFIREWALLREMAPONLY was specified.");
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Finally, check for a mapping on a local firewall.
|
|
//
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
DNASSERT(pDevice != NULL);
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
|
|
fRegisteredWithServer = TRUE;
|
|
|
|
|
|
//
|
|
// If we didn't already get a remote mapping, return this local one.
|
|
//
|
|
if (! fFoundValidMapping)
|
|
{
|
|
if (pdwPublicAddressesSize != NULL)
|
|
{
|
|
dwSizeRequired = pRegisteredPort->GetAddressesSize();
|
|
|
|
if ((paPublicAddresses == NULL) ||
|
|
(dwSizeRequired > (*pdwPublicAddressesSize)))
|
|
{
|
|
//
|
|
// Not enough room in buffer, return the size required
|
|
// and the BUFFERTOOSMALL error code.
|
|
//
|
|
(*pdwPublicAddressesSize) = dwSizeRequired;
|
|
hr = DPNHERR_BUFFERTOOSMALL;
|
|
}
|
|
else
|
|
{
|
|
SOCKADDR_IN * pasaddrinPrivate;
|
|
DWORD dwTemp;
|
|
|
|
|
|
//
|
|
// Buffer was large enough, return the size written.
|
|
//
|
|
(*pdwPublicAddressesSize) = dwSizeRequired;
|
|
|
|
//
|
|
// Note that the addresses mapped on the firewall are the
|
|
// same as the private addresses.
|
|
//
|
|
pasaddrinPrivate = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
DNASSERT(pasaddrinPrivate != NULL);
|
|
|
|
memcpy(paPublicAddresses, pasaddrinPrivate, dwSizeRequired);
|
|
|
|
|
|
//
|
|
// However, we don't want to ever return 0.0.0.0, so make
|
|
// sure they get the device address.
|
|
//
|
|
if (pasaddrinPrivate[0].sin_addr.S_un.S_addr == INADDR_ANY)
|
|
{
|
|
for(dwTemp = 0; dwTemp < pRegisteredPort->GetNumAddresses(); dwTemp++)
|
|
{
|
|
((SOCKADDR_IN*) paPublicAddresses)[dwTemp].sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
}
|
|
|
|
DPFX(DPFPREP, 7, "Returning device address %u.%u.%u.%u instead of INADDR_ANY for firewalled port mapping 0x%p.",
|
|
((SOCKADDR_IN*) paPublicAddresses)[0].sin_addr.S_un.S_un_b.s_b1,
|
|
((SOCKADDR_IN*) paPublicAddresses)[0].sin_addr.S_un.S_un_b.s_b2,
|
|
((SOCKADDR_IN*) paPublicAddresses)[0].sin_addr.S_un.S_un_b.s_b3,
|
|
((SOCKADDR_IN*) paPublicAddresses)[0].sin_addr.S_un.S_un_b.s_b4,
|
|
pRegisteredPort);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using address buffer.
|
|
//
|
|
}
|
|
|
|
fFoundValidMapping = TRUE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 6, "Ignoring local HomeNet firewall mapping due to UPnP mapping.");
|
|
}
|
|
|
|
|
|
//
|
|
// Add in the flag indicating the local firewall.
|
|
//
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_LOCALFIREWALL;
|
|
|
|
|
|
//
|
|
// The firewall API does not allow for lease times.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
if (pRegisteredPort->IsHNetFirewallPortUnavailable())
|
|
{
|
|
DNASSERT(pDevice != NULL);
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
|
|
fRegisteredWithServer = TRUE;
|
|
fPortIsUnavailable = TRUE;
|
|
|
|
DPFX(DPFPREP, 8, "The local HomeNet firewall indicates the port(s) are unavailable.");
|
|
|
|
|
|
//
|
|
// Add in the flag indicating the local firewall.
|
|
//
|
|
dwAddressTypeFlags |= DPNHADDRESSTYPE_LOCALFIREWALL;
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
//
|
|
// No local firewall or it's an unowned port.
|
|
//
|
|
if (pDevice != NULL)
|
|
{
|
|
DNASSERT(! pDevice->IsHNetFirewalled());
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(pRegisteredPort->m_blDeviceList.IsListMember(&this->m_blUnownedPorts));
|
|
}
|
|
}
|
|
#endif // DBG
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
|
|
|
|
if (fRegisteredWithServer)
|
|
{
|
|
DNASSERT(dwAddressTypeFlags & (DPNHADDRESSTYPE_LOCALFIREWALL | DPNHADDRESSTYPE_GATEWAY));
|
|
|
|
|
|
if (! fFoundValidMapping)
|
|
{
|
|
if (fPortIsUnavailable)
|
|
{
|
|
//
|
|
// The servers indicated that the ports were already in use.
|
|
// Return PORTUNAVAILABLE.
|
|
//
|
|
DPFX(DPFPREP, 1, "The Internet gateway(s) could not map the port, returning PORTUNAVAILABLE.");
|
|
hr = DPNHERR_PORTUNAVAILABLE;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// The servers didn't have public addresses. Return NOMAPPING.
|
|
//
|
|
DPFX(DPFPREP, 1, "The Internet gateway(s) did not offer valid public addresses, returning NOMAPPING.");
|
|
hr = DPNHERR_NOMAPPING;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// One of the servers had a public address.
|
|
//
|
|
DNASSERT((hr == DPNH_OK) || (hr == DPNHERR_BUFFERTOOSMALL));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// The ports aren't registered, because there aren't any gateways.
|
|
// Return SERVERNOTAVAILABLE.
|
|
//
|
|
DPFX(DPFPREP, 1, "No Internet gateways, returning SERVERNOTAVAILABLE.");
|
|
hr = DPNHERR_SERVERNOTAVAILABLE;
|
|
}
|
|
|
|
|
|
//
|
|
// If the caller wants information on the type of these addresses, return
|
|
// the flags we detected.
|
|
//
|
|
if (pdwAddressTypeFlags != NULL)
|
|
{
|
|
(*pdwAddressTypeFlags) = dwAddressTypeFlags;
|
|
}
|
|
|
|
|
|
//
|
|
// Return the minimum lease time remaining that we already calculated, if
|
|
// the caller wants it.
|
|
//
|
|
if (pdwLeaseTimeRemaining != NULL)
|
|
{
|
|
(*pdwLeaseTimeRemaining) = dwLeaseTimeRemaining;
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// If the port is unavailable or there aren't any servers, we better not
|
|
// have a lease time.
|
|
//
|
|
if ((hr == DPNHERR_PORTUNAVAILABLE) ||
|
|
(hr == DPNHERR_SERVERNOTAVAILABLE))
|
|
{
|
|
DNASSERT(dwLeaseTimeRemaining == -1);
|
|
}
|
|
|
|
|
|
//
|
|
// If there aren't any servers, we better not have server flags.
|
|
//
|
|
if (hr == DPNHERR_SERVERNOTAVAILABLE)
|
|
{
|
|
DNASSERT(! (dwAddressTypeFlags & (DPNHADDRESSTYPE_LOCALFIREWALL | DPNHADDRESSTYPE_GATEWAY)));
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Registered port 0x%p addr type flags = 0x%lx, lease time remaining = %i.",
|
|
pRegisteredPort, dwAddressTypeFlags, (int) dwLeaseTimeRemaining);
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::GetRegisteredAddresses
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::DeregisterPorts"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::DeregisterPorts
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Removes the lease record for the port group and informs the
|
|
// Internet gateway server that the binding is no longer needed.
|
|
// The port mapping handle must not be used after de-registering
|
|
// it.
|
|
//
|
|
// Arguments:
|
|
// DPNHHANDLE hRegisteredPorts - Handle for a specific binding returned by
|
|
// RegisterPorts.
|
|
// DWORD dwFlags - Unused, must be zero.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The binding was successfully released.
|
|
// DPNHERR_GENERIC - An error occurred that prevented the
|
|
// de-registration of the ports.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to de-register.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::DeregisterPorts(const DPNHHANDLE hRegisteredPorts,
|
|
const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
CRegisteredPort * pRegisteredPort;
|
|
BOOL fHaveLock = FALSE;
|
|
LONG lResult;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, 0x%lx)",
|
|
this, hRegisteredPorts, dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
pRegisteredPort = (CRegisteredPort*) hRegisteredPorts;
|
|
if (! pRegisteredPort->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid registered port mapping handle specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED) )
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If this isn't the last user reference on the registered port, don't
|
|
// unmap it yet.
|
|
//
|
|
lResult = pRegisteredPort->DecUserRef();
|
|
if (lResult != 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Still %i references left on registered port 0x%p, not unmapping.",
|
|
lResult, pRegisteredPort);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// First unmap from UPnP device, if necessary.
|
|
//
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
hr = this->UnmapUPnPPort(pRegisteredPort,
|
|
pRegisteredPort->GetNumAddresses(), // free all ports
|
|
TRUE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't delete port mapping with UPnP device (0x%lx)! Ignoring.", hr);
|
|
|
|
//
|
|
// We'll treat this as non-fatal, but we have to dump the device.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pRegisteredPort->GetOwningDevice());
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Then unmap from the local firewall, if necessary.
|
|
//
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
//
|
|
// Unmap the port.
|
|
//
|
|
// Don't bother alerting user about address change, this is normal
|
|
// operation.
|
|
//
|
|
hr = this->UnmapPortOnLocalHNetFirewall(pRegisteredPort, TRUE, FALSE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed unmapping registered port 0x%p on local HomeNet firewall (err = 0x%lx)! Ignoring.",
|
|
pRegisteredPort, hr);
|
|
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
//
|
|
// Pull the item out of the lists.
|
|
// We have the appropriate lock.
|
|
//
|
|
|
|
DNASSERT(pRegisteredPort->m_blGlobalList.IsListMember(&this->m_blRegisteredPorts));
|
|
pRegisteredPort->m_blGlobalList.RemoveFromList();
|
|
|
|
if (pRegisteredPort->GetOwningDevice() != NULL)
|
|
{
|
|
DNASSERT(pRegisteredPort->m_blDeviceList.IsListMember(&((pRegisteredPort->GetOwningDevice())->m_blOwnedRegPorts)));
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(pRegisteredPort->m_blDeviceList.IsListMember(&this->m_blUnownedPorts));
|
|
pRegisteredPort->m_blDeviceList.RemoveFromList();
|
|
}
|
|
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
delete pRegisteredPort;
|
|
|
|
|
|
Exit:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::DeregisterPorts
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::QueryAddress"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::QueryAddress
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Some Internet gateways do not loopback if an attempt is made
|
|
// to connect to an address behind (on the same private side of)
|
|
// the public interface. QueryAddress is used to determine a
|
|
// possible private alias for a given public address.
|
|
//
|
|
// In most cases, this function is called prior to connecting
|
|
// to a new address. pSourceAddress should contain the address of
|
|
// the socket that will perform the connect. Similar to
|
|
// RegisterPorts, the address may be INADDR_ANY, in which case the
|
|
// "best" server will be used. Since the server chosen may not be
|
|
// optimal for a particular application, it is recommended that a
|
|
// specific network interface be used instead of INADDR_ANY, when
|
|
// possible.
|
|
//
|
|
// If no mapping for that address has been made by the gateway,
|
|
// the error code DPNHERR_NOMAPPING is returned. When the
|
|
// DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED flag is used, an
|
|
// extra effort is made to determine whether the address is behind
|
|
// the same Internet gateway without being mapped on the gateway.
|
|
// If that is the case, DPNHERR_NOMAPPINGBUTPRIVATE is returned.
|
|
// DPNHERR_NOMAPPING is still returned for addresses that are
|
|
// neither mapped nor private.
|
|
//
|
|
// pQueryAddress may not be INADDR_ANY or INADDR_BROADCAST.
|
|
// The port component may be zero if and only if the
|
|
// DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED flag is used. If
|
|
// the port is zero, a specific mapping cannot be verified, and
|
|
// only the DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED aspect of
|
|
// the address is tested.
|
|
//
|
|
// The resulting address (or lack thereof) can be cached for
|
|
// quick future retrieval using the DPNHQUERYADDRESS_CACHEFOUND
|
|
// and DPNHQUERYADDRESS_CACHENOTFOUND flags. The cached mappings
|
|
// will expire in 1 minute, or whenever the server's address
|
|
// changes.
|
|
//
|
|
// If the given source address is not currently connected to an
|
|
// Internet gateway, then the error DPNHERR_SERVERNOTAVAILABLE is
|
|
// returned.
|
|
//
|
|
// If GetCaps has not been previously called with the
|
|
// DPNHGETCAPS_UPDATESERVERSTATUS flag at least once, then the
|
|
// error code DPNHERR_UPDATESERVERSTATUS is returned.
|
|
//
|
|
// Arguments:
|
|
// SOCKADDR * pSourceAddress - Address for network interface that is using
|
|
// the address in question.
|
|
// SOCKADDR * pQueryAddress - Address to look up.
|
|
// SOCKADDR * pResponseAddress - Place to store public address, if one exists.
|
|
// int iAddressesSize - Size of the SOCKADDR structure used for the
|
|
// pSourceAddress, pQueryAddress and
|
|
// pResponseAddress buffers.
|
|
// DWORD dwFlags - Flags to use when querying
|
|
// (DPNHQUERYADDRESS_xxx).
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The address was found and its mapping was
|
|
// stored in pResponseAddress.
|
|
// DPNHERR_GENERIC - An error occurred that prevented mapping the
|
|
// requested address.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_INVALIDPOINTER - An invalid pointer was specified.
|
|
// DPNHERR_NOMAPPING - The server indicated that no mapping for the
|
|
// requested address was found.
|
|
// DPNHERR_NOMAPPINGBUTPRIVATE - The server indicated that no mapping was
|
|
// found, but it is a private address.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to query.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
// DPNHERR_SERVERNOTAVAILABLE - There are no servers to query.
|
|
// DPNHERR_UPDATESERVERSTATUS - GetCaps has not been called with the
|
|
// DPNHGETCAPS_UPDATESERVERSTATUS flag yet.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::QueryAddress(const SOCKADDR * const pSourceAddress,
|
|
const SOCKADDR * const pQueryAddress,
|
|
SOCKADDR * const pResponseAddress,
|
|
const int iAddressesSize,
|
|
const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fHaveLock = FALSE;
|
|
CDevice * pDevice;
|
|
SOCKADDR_IN * psaddrinNextServerQueryAddress = NULL;
|
|
CUPnPDevice * pUPnPDevice = NULL;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, %i, 0x%lx)",
|
|
this, pSourceAddress, pQueryAddress, pResponseAddress, iAddressesSize,
|
|
dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if (pSourceAddress == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid source address specified!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (pQueryAddress == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid query address specified!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (pResponseAddress == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid response address specified!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (iAddressesSize < sizeof(SOCKADDR_IN))
|
|
{
|
|
DPFX(DPFPREP, 0, "The address buffers must be at least %i bytes!",
|
|
sizeof(SOCKADDR_IN));
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (IsBadReadPtr(pSourceAddress, sizeof(SOCKADDR_IN)))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid source address buffer used!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (IsBadReadPtr(pQueryAddress, sizeof(SOCKADDR_IN)))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid query address buffer used!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if (IsBadWritePtr(pResponseAddress, sizeof(SOCKADDR_IN)))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid response address buffer used!");
|
|
hr = DPNHERR_INVALIDPOINTER;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((((SOCKADDR_IN*) pSourceAddress)->sin_family != AF_INET) ||
|
|
(((SOCKADDR_IN*) pQueryAddress)->sin_family != AF_INET))
|
|
{
|
|
DPFX(DPFPREP, 0, "Source or query address is not AF_INET, only IPv4 addresses are supported!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (((SOCKADDR_IN*) pSourceAddress)->sin_addr.S_un.S_addr == INADDR_BROADCAST)
|
|
{
|
|
DPFX(DPFPREP, 0, "Source address cannot be broadcast address!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_addr == INADDR_ANY) ||
|
|
(((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_addr == INADDR_BROADCAST))
|
|
{
|
|
//
|
|
// Don't use inet_ntoa because we may not be initialized yet.
|
|
//
|
|
DPFX(DPFPREP, 0, "Query address (%u.%u.%u.%u) is invalid, cannot be zero or broadcast!",
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b1,
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b2,
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b3,
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b4);
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags & ~(DPNHQUERYADDRESS_TCP | DPNHQUERYADDRESS_CACHEFOUND | DPNHQUERYADDRESS_CACHENOTFOUND | DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED))
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((((SOCKADDR_IN*) pQueryAddress)->sin_port == 0) &&
|
|
(! (dwFlags & DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED)))
|
|
{
|
|
DPFX(DPFPREP, 0, "Query address port cannot be zero unless CHECKFORPRIVATEBUTUNMAPPED is specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED) )
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
if (this->m_dwLastUpdateServerStatusTime == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "GetCaps has not been called with UPDATESERVERSTATUS flag yet!");
|
|
hr = DPNHERR_UPDATESERVERSTATUS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
pDevice = this->FindMatchingDevice((SOCKADDR_IN*) pSourceAddress, TRUE);
|
|
if (pDevice == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't determine owning device for source %u.%u.%u.%u, returning SERVERNOTAVAILABLE for query %u.%u.%u.%u:%u.",
|
|
((SOCKADDR_IN*) pSourceAddress)->sin_addr.S_un.S_un_b.s_b1,
|
|
((SOCKADDR_IN*) pSourceAddress)->sin_addr.S_un.S_un_b.s_b2,
|
|
((SOCKADDR_IN*) pSourceAddress)->sin_addr.S_un.S_un_b.s_b3,
|
|
((SOCKADDR_IN*) pSourceAddress)->sin_addr.S_un.S_un_b.s_b4,
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b1,
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b2,
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b3,
|
|
((SOCKADDR_IN*) pQueryAddress)->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(((SOCKADDR_IN*) pQueryAddress)->sin_port));
|
|
hr = DPNHERR_SERVERNOTAVAILABLE;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Assume no servers are available. This will get overridden as
|
|
// appropriate.
|
|
//
|
|
hr = DPNHERR_SERVERNOTAVAILABLE;
|
|
|
|
|
|
//
|
|
// Start by querying the address passed in.
|
|
//
|
|
psaddrinNextServerQueryAddress = (SOCKADDR_IN*) pQueryAddress;
|
|
|
|
|
|
//
|
|
// If the port is zero, then we can't actually lookup a mapping. Just do
|
|
// the address locality check.
|
|
//
|
|
if (psaddrinNextServerQueryAddress->sin_port == 0)
|
|
{
|
|
//
|
|
// We should have caught this in parameter validation above, but I'm
|
|
// being paranoid.
|
|
//
|
|
DNASSERT(dwFlags & DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED);
|
|
|
|
|
|
//
|
|
// We don't cache these results, since there's no server (and thus, no
|
|
// network traffic) associated with it. No need to look anything up.
|
|
//
|
|
|
|
|
|
//
|
|
// If there aren't any Internet gateways, then no need to check.
|
|
//
|
|
#ifdef DPNBUILD_NOHNETFWAPI
|
|
if (pDevice->GetUPnPDevice() == NULL)
|
|
#else // ! DPNBUILD_NOHNETFWAPI
|
|
if ((pDevice->GetUPnPDevice() == NULL) &&
|
|
(! pDevice->IsHNetFirewalled()))
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
{
|
|
DPFX(DPFPREP, 5, "No port queried and there aren't any gateways, returning SERVERNOTAVAILABLE.");
|
|
hr = DPNHERR_SERVERNOTAVAILABLE;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// There is an Internet gateway of some kind, our locality check
|
|
// would be meaningful.
|
|
//
|
|
if (this->IsAddressLocal(pDevice, psaddrinNextServerQueryAddress))
|
|
{
|
|
DPFX(DPFPREP, 5, "No port queried, but address appears to be local, returning NOMAPPINGBUTPRIVATE.");
|
|
hr = DPNHERR_NOMAPPINGBUTPRIVATE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 5, "No port queried and address does not appear to be local, returning NOMAPPING.");
|
|
hr = DPNHERR_NOMAPPING;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// We've done all we can do.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Query the UPnP gateway, if there is one.
|
|
//
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
//
|
|
// GetUPnPDevice did not add a reference to pUPnPDevice for us.
|
|
//
|
|
pUPnPDevice->AddRef();
|
|
|
|
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
|
|
//
|
|
// Actually query the device.
|
|
//
|
|
hr = this->InternalUPnPQueryAddress(pUPnPDevice,
|
|
psaddrinNextServerQueryAddress,
|
|
(SOCKADDR_IN*) pResponseAddress,
|
|
dwFlags);
|
|
switch (hr)
|
|
{
|
|
case DPNH_OK:
|
|
{
|
|
//
|
|
// There was a mapping.
|
|
//
|
|
//psaddrinNextServerQueryAddress = (SOCKADDR_IN*) pResponseAddress;
|
|
break;
|
|
}
|
|
|
|
case DPNHERR_NOMAPPING:
|
|
{
|
|
//
|
|
// There's no mapping.
|
|
//
|
|
break;
|
|
}
|
|
|
|
case DPNHERR_NOMAPPINGBUTPRIVATE:
|
|
{
|
|
//
|
|
// There's no mapping although the address is private.
|
|
//
|
|
break;
|
|
}
|
|
|
|
case DPNHERR_SERVERNOTRESPONDING:
|
|
{
|
|
//
|
|
// The device stopped responding, so we should get rid of it.
|
|
//
|
|
|
|
DPFX(DPFPREP, 1, "UPnP device stopped responding while querying port mapping, removing it.");
|
|
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
|
|
|
|
//
|
|
// We also set the return code back to SERVERNOTAVAILABLE.
|
|
//
|
|
hr = DPNHERR_SERVERNOTAVAILABLE;
|
|
|
|
//
|
|
// Continue through to querying the HomeNet firewall.
|
|
//
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DPFX(DPFPREP, 0, "Querying UPnP device for port mapping failed!");
|
|
goto Failure;
|
|
break;
|
|
}
|
|
}
|
|
|
|
pUPnPDevice->DecRef();
|
|
pUPnPDevice = NULL;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// No UPnP device.
|
|
//
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// If there's a HomeNet firewall and we didn't already get a UPnP result,
|
|
// take the easy way out and return NOMAPPING instead of going through the
|
|
// trouble of looking up the mapping and returning success only if it maps
|
|
// to a local address.
|
|
//
|
|
// Note: we may want to look it up, but right now I'm not seeing any
|
|
// benefit to implementing that code.
|
|
//
|
|
if ((pDevice->IsHNetFirewalled()) && (hr == DPNHERR_SERVERNOTAVAILABLE))
|
|
{
|
|
DPFX(DPFPREP, 7, "Device is HomeNet firewalled, and no UPnP result obtained, returning NOMAPPING.");
|
|
hr = DPNHERR_NOMAPPING;
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
//
|
|
// If we got here with hr still set to SERVERNOTAVAILABLE, that means
|
|
// there weren't any servers. The error code is appropriate, leave it
|
|
// alone.
|
|
//
|
|
#ifdef DBG
|
|
if (hr == DPNHERR_SERVERNOTAVAILABLE)
|
|
{
|
|
DPFX(DPFPREP, 1, "No Internet gateways, unable to query port mapping.");
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
pUPnPDevice->DecRef();
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::QueryAddress
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::SetAlertEvent"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::SetAlertEvent
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: This function allows the user to specify an event that will
|
|
// be set when some maintenance needs to be performed. The user
|
|
// should call GetCaps using the DPNHGETCAPS_UPDATESERVERSTATUS
|
|
// flag when the event is signalled.
|
|
//
|
|
// This function is not available on Windows 95 without WinSock
|
|
// 2, may only be called once, and cannot be used after
|
|
// SetAlertIOCompletionPort is called.
|
|
//
|
|
// Note that the event is used in addition to the regular
|
|
// polling of GetCaps, it simply allows the polling to be less
|
|
// frequent.
|
|
//
|
|
// Arguments:
|
|
// HANDLE hEvent - Handle to event to signal when GetCaps is to be called.
|
|
// DWORD dwFlags - Unused, must be zero.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The event was successfully registered.
|
|
// DPNHERR_GENERIC - An error occurred that prevented registering the
|
|
// event.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::SetAlertEvent(const HANDLE hEvent,
|
|
const DWORD dwFlags)
|
|
{
|
|
#ifdef DPNBUILD_NOWINSOCK2
|
|
DPFX(DPFPREP, 0, "Cannot set alert event (0x%p)!", hEvent);
|
|
return E_NOTIMPL;
|
|
#else // ! DPNBUILD_NOWINSOCK2
|
|
HRESULT hr;
|
|
BOOL fHaveLock = FALSE;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, 0x%lx)", this, hEvent, dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if (hEvent == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid event handle specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED))
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1)
|
|
{
|
|
DPFX(DPFPREP, 0, "Cannot use alert mechanism on WinSock 1!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((this->m_hAlertEvent != NULL) || (this->m_hAlertIOCompletionPort != NULL))
|
|
{
|
|
DPFX(DPFPREP, 0, "An alert event or I/O completion port has already been set!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Now save the event handle.
|
|
//
|
|
if (! DuplicateHandle(GetCurrentProcess(),
|
|
hEvent,
|
|
GetCurrentProcess(),
|
|
&this->m_hAlertEvent,
|
|
0,
|
|
FALSE,
|
|
DUPLICATE_SAME_ACCESS))
|
|
{
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
|
|
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't duplicate event (error = %u)!", dwError);
|
|
#endif // DBG
|
|
|
|
DNASSERT(this->m_hAlertEvent == NULL);
|
|
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Create overlapped structure. Don't allocate it through DNMalloc,
|
|
// because we may have to leak it on purpose. We don't want those memory
|
|
// allocation asserts firing in that case.
|
|
//
|
|
this->m_polAddressListChange = (WSAOVERLAPPED*) HeapAlloc(GetProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
sizeof(WSAOVERLAPPED));
|
|
if (this->m_polAddressListChange == NULL)
|
|
{
|
|
//
|
|
// Close the alert handle we set.
|
|
//
|
|
CloseHandle(this->m_hAlertEvent);
|
|
this->m_hAlertEvent = NULL;
|
|
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Save the event in the address list change overlapped structure.
|
|
//
|
|
this->m_polAddressListChange->hEvent = this->m_hAlertEvent;
|
|
|
|
|
|
//
|
|
// Start getting notified of local address changes.
|
|
//
|
|
hr = this->RequestLocalAddressListChangeNotification();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't request local address list change notification!");
|
|
|
|
//
|
|
// Free the memory we allocated.
|
|
//
|
|
HeapFree(GetProcessHeap(), 0, this->m_polAddressListChange);
|
|
this->m_polAddressListChange = NULL;
|
|
|
|
//
|
|
// Close the alert handle we set.
|
|
//
|
|
CloseHandle(this->m_hAlertEvent);
|
|
this->m_hAlertEvent = NULL;
|
|
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
} // CNATHelpUPnP::SetAlertEvent
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::SetAlertIOCompletionPort"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::SetAlertIOCompletionPort
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: This function allows the user to specify an I/O completion
|
|
// port that will receive notification when some maintenance needs
|
|
// to be performed. The user should call GetCaps using the
|
|
// DPNHGETCAPS_UPDATESERVERSTATUS flag when the packet with the
|
|
// given completion key is dequeued.
|
|
//
|
|
// This function is only available on Windows NT, may only be
|
|
// called once, and cannot be used after SetAlertEvent is called.
|
|
//
|
|
// Note that the completion port is used in addition to the
|
|
// regular polling of GetCaps, it simply allows the polling to be
|
|
// less frequent.
|
|
//
|
|
// Arguments:
|
|
// HANDLE hIOCompletionPort - Handle to I/O completion port which will
|
|
// be used to signal when GetCaps is to be
|
|
// called.
|
|
// DWORD dwCompletionKey - Key to use when indicating I/O
|
|
// completion.
|
|
// DWORD dwNumConcurrentThreads - Number of concurrent threads allowed to
|
|
// process, or zero for default.
|
|
// DWORD dwFlags - Unused, must be zero.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The I/O completion port was successfully
|
|
// registered.
|
|
// DPNHERR_GENERIC - An error occurred that prevented registering the
|
|
// I/O completion port.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::SetAlertIOCompletionPort(const HANDLE hIOCompletionPort,
|
|
const DWORD dwCompletionKey,
|
|
const DWORD dwNumConcurrentThreads,
|
|
const DWORD dwFlags)
|
|
{
|
|
#ifdef DPNBUILD_NOWINSOCK2
|
|
DPFX(DPFPREP, 0, "Cannot set alert I/O completion port (0x%p, %u, %u)!",
|
|
hIOCompletionPort, dwCompletionKey, dwNumConcurrentThreads);
|
|
return E_NOTIMPL;
|
|
#else // ! DPNBUILD_NOWINSOCK2
|
|
HRESULT hr;
|
|
BOOL fHaveLock = FALSE;
|
|
HANDLE hIOCompletionPortResult;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, 0x%lx, %u, 0x%lx)",
|
|
this, hIOCompletionPort, dwCompletionKey, dwNumConcurrentThreads, dwFlags);
|
|
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
if (hIOCompletionPort == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid I/O completion port handle specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED))
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1)
|
|
{
|
|
DPFX(DPFPREP, 0, "Cannot use alert mechanism on WinSock 1!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if ((this->m_hAlertEvent != NULL) || (this->m_hAlertIOCompletionPort != NULL))
|
|
{
|
|
DPFX(DPFPREP, 0, "An alert event or I/O completion port has already been set!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Now save the I/O completion port handle.
|
|
//
|
|
if (! DuplicateHandle(GetCurrentProcess(),
|
|
hIOCompletionPort,
|
|
GetCurrentProcess(),
|
|
&this->m_hAlertIOCompletionPort,
|
|
0,
|
|
FALSE,
|
|
DUPLICATE_SAME_ACCESS))
|
|
{
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
|
|
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't duplicate I/O completion port (error = %u)!", dwError);
|
|
#endif // DBG
|
|
|
|
DNASSERT(this->m_hAlertIOCompletionPort == NULL);
|
|
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
this->m_dwAlertCompletionKey = dwCompletionKey;
|
|
|
|
|
|
//
|
|
// Associate our Ioctl socket with this IO completion port.
|
|
//
|
|
DNASSERT(this->m_sIoctls != INVALID_SOCKET);
|
|
hIOCompletionPortResult = CreateIoCompletionPort((HANDLE) this->m_sIoctls,
|
|
this->m_hAlertIOCompletionPort,
|
|
dwCompletionKey,
|
|
dwNumConcurrentThreads);
|
|
if (hIOCompletionPortResult == NULL)
|
|
{
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
|
|
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't associate I/O completion port with Ioctl socket (error = %u)!", dwError);
|
|
#endif // DBG
|
|
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We should have just gotten the same I/O completion port back.
|
|
//
|
|
DNASSERT(hIOCompletionPortResult == this->m_hAlertIOCompletionPort);
|
|
|
|
|
|
//
|
|
// Create overlapped structure. Don't allocate it through DNMalloc,
|
|
// because we may have to leak it on purpose. We don't want those memory
|
|
// allocation asserts firing in that case.
|
|
//
|
|
this->m_polAddressListChange = (WSAOVERLAPPED*) HeapAlloc(GetProcessHeap(),
|
|
HEAP_ZERO_MEMORY,
|
|
sizeof(WSAOVERLAPPED));
|
|
if (this->m_polAddressListChange == NULL)
|
|
{
|
|
//
|
|
// Close the alert IOCP we set.
|
|
//
|
|
CloseHandle(this->m_hAlertIOCompletionPort);
|
|
this->m_hAlertIOCompletionPort = NULL;
|
|
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Start getting notified of local address changes.
|
|
//
|
|
hr = this->RequestLocalAddressListChangeNotification();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't request local address list change notification!");
|
|
|
|
//
|
|
// Free the memory we allocated.
|
|
//
|
|
HeapFree(GetProcessHeap(), 0, this->m_polAddressListChange);
|
|
this->m_polAddressListChange = NULL;
|
|
|
|
//
|
|
// Close the alert IOCP we set.
|
|
//
|
|
CloseHandle(this->m_hAlertIOCompletionPort);
|
|
this->m_hAlertIOCompletionPort = NULL;
|
|
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
} // CNATHelpUPnP::SetAlertIOCompletionPort
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ExtendRegisteredPortsLease"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ExtendRegisteredPortsLease
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Manually extends the lease of the given registered port
|
|
// mapping by the requested time. The periodic calling of GetCaps
|
|
// can take care of this for the user, this function is only
|
|
// necessary to change the lease extension time or for finer
|
|
// control of individual mappings.
|
|
//
|
|
// The user should specify a requested lease extension time
|
|
// that the server will attempt to honor. It will be added to any
|
|
// time remaining in the existing lease, and the new total can be
|
|
// retrieved by calling GetRegisteredAddresses.
|
|
//
|
|
// Arguments:
|
|
// DPNHHANDLE hRegisteredPorts - Handle for a specific binding returned by
|
|
// RegisterPorts.
|
|
// DWORD dwLeaseTime - Requested time, in milliseconds, to
|
|
// extend the lease. If 0, the previous
|
|
// requested lease time is used.
|
|
// DWORD dwFlags - Unused, must be zero.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The lease was successfully extended.
|
|
// DPNHERR_GENERIC - An error occurred that prevented the extending
|
|
// the lease.
|
|
// DPNHERR_INVALIDFLAGS - Invalid flags were specified.
|
|
// DPNHERR_INVALIDOBJECT - The interface object is invalid.
|
|
// DPNHERR_INVALIDPARAM - An invalid parameter was specified.
|
|
// DPNHERR_NOTINITIALIZED - Initialize has not been called.
|
|
// DPNHERR_OUTOFMEMORY - There is not enough memory to extend the lease.
|
|
// DPNHERR_REENTRANT - The interface has been re-entered on the same
|
|
// thread.
|
|
//=============================================================================
|
|
STDMETHODIMP CNATHelpUPnP::ExtendRegisteredPortsLease(const DPNHHANDLE hRegisteredPorts,
|
|
const DWORD dwLeaseTime,
|
|
const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
CRegisteredPort * pRegisteredPort;
|
|
CDevice * pDevice;
|
|
BOOL fHaveLock = FALSE;
|
|
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Parameters: (0x%p, %u, 0x%lx)",
|
|
this, hRegisteredPorts, dwLeaseTime, dwFlags);
|
|
|
|
|
|
//
|
|
// Validate the object.
|
|
//
|
|
if (! this->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid DirectPlay NAT Help object!");
|
|
hr = DPNHERR_INVALIDOBJECT;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Validate the parameters.
|
|
//
|
|
|
|
pRegisteredPort = (CRegisteredPort*) hRegisteredPorts;
|
|
if (! pRegisteredPort->IsValidObject())
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid registered port mapping handle specified!");
|
|
hr = DPNHERR_INVALIDPARAM;
|
|
goto Failure;
|
|
}
|
|
|
|
if (dwFlags != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Invalid flags specified!");
|
|
hr = DPNHERR_INVALIDFLAGS;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Attempt to take the lock, but be prepared for the re-entrancy error.
|
|
//
|
|
hr = this->TakeLock();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not lock object!");
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveLock = TRUE;
|
|
|
|
|
|
//
|
|
// Make sure object is in right state.
|
|
//
|
|
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED) )
|
|
{
|
|
DPFX(DPFPREP, 0, "Object not initialized!");
|
|
hr = DPNHERR_NOTINITIALIZED;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If they wanted to change the lease time, update it.
|
|
//
|
|
if (dwLeaseTime != 0)
|
|
{
|
|
pRegisteredPort->UpdateRequestedLeaseTime(dwLeaseTime);
|
|
}
|
|
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
|
|
|
|
//
|
|
// If the port is registered with the UPnP device, extend that lease.
|
|
//
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
|
|
hr = this->ExtendUPnPLease(pRegisteredPort);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't extend port mapping lease on UPnP device (0x%lx)! Ignoring.", hr);
|
|
|
|
//
|
|
// We'll treat this as non-fatal, but we have to dump the
|
|
// server. This may have already been done, but doing it
|
|
// twice shouldn't be harmful.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 2, "Port mapping not registered with UPnP gateway device.");
|
|
}
|
|
|
|
|
|
//
|
|
// Firewall mappings never have lease times to extend.
|
|
//
|
|
|
|
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 2, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (fHaveLock)
|
|
{
|
|
this->DropLock();
|
|
fHaveLock = FALSE;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::ExtendRegisteredPortsLease
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::InitializeObject"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::InitializeObject
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Sets up the object for use like the constructor, but may
|
|
// fail with OUTOFMEMORY. Should only be called by class factory
|
|
// creation routine.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: HRESULT
|
|
// S_OK - Initialization was successful.
|
|
// E_OUTOFMEMORY - There is not enough memory to initialize.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::InitializeObject(void)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fInittedCriticalSection = FALSE;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Enter", this);
|
|
|
|
DNASSERT(this->IsValidObject());
|
|
|
|
|
|
//
|
|
// Create the lock.
|
|
//
|
|
|
|
if (! DNInitializeCriticalSection(&this->m_csLock))
|
|
{
|
|
hr = E_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
fInittedCriticalSection = TRUE;
|
|
|
|
|
|
//
|
|
// Don't allow critical section reentry.
|
|
//
|
|
DebugSetCriticalSectionRecursionCount(&this->m_csLock, 0);
|
|
|
|
|
|
this->m_hLongLockSemaphore = DNCreateSemaphore(NULL,
|
|
0,
|
|
MAX_LONG_LOCK_WAITING_THREADS,
|
|
NULL);
|
|
if (this->m_hLongLockSemaphore == NULL)
|
|
{
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
hr = S_OK;
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (fInittedCriticalSection)
|
|
{
|
|
DNDeleteCriticalSection(&this->m_csLock);
|
|
fInittedCriticalSection = FALSE;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::InitializeObject
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::UninitializeObject"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::UninitializeObject
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Cleans up the object like the destructor, mostly to balance
|
|
// InitializeObject.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::UninitializeObject(void)
|
|
{
|
|
DPFX(DPFPREP, 5, "(0x%p) Enter", this);
|
|
|
|
|
|
DNASSERT(this->IsValidObject());
|
|
|
|
|
|
DNCloseHandle(this->m_hLongLockSemaphore);
|
|
this->m_hLongLockSemaphore = NULL;
|
|
|
|
DNDeleteCriticalSection(&this->m_csLock);
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Leave", this);
|
|
} // CNATHelpUPnP::UninitializeObject
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::TakeLock"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::TakeLock
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Takes the main object lock. If some other thread is already
|
|
// holding the long lock, we wait for that first.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: DPNH_OK if lock was taken successfully, DPNHERR_REENTRANT if lock
|
|
// was re-entered.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::TakeLock(void)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
#ifdef DBG
|
|
DWORD dwStartTime;
|
|
|
|
|
|
dwStartTime = GETTIMESTAMP();
|
|
#endif // DBG
|
|
|
|
|
|
DNEnterCriticalSection(&this->m_csLock);
|
|
|
|
|
|
//
|
|
// If this same thread is already holding the lock, then bail.
|
|
//
|
|
if (this->m_dwLockThreadID == GetCurrentThreadId())
|
|
{
|
|
DPFX(DPFPREP, 0, "Thread re-entering!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If someone is holding the long lock, we need to wait for that. Of
|
|
// course another thread could come in and take the long lock after the
|
|
// first one drops it and before we can take the main one. This algorithm
|
|
// does not attempt to be fair in this case. Theoretically we could wait
|
|
// forever if this continued to occur. That shouldn't happen in the real
|
|
// world.
|
|
// This whole mess of code is a huge... uh... workaround for stress hits
|
|
// involving critical section timeouts.
|
|
//
|
|
while (this->m_dwFlags & NATHELPUPNPOBJ_LONGLOCK)
|
|
{
|
|
DNASSERT(this->m_lNumLongLockWaitingThreads >= 0);
|
|
this->m_lNumLongLockWaitingThreads++;
|
|
|
|
//
|
|
// We need to keep looping until we do get the lock.
|
|
//
|
|
DNLeaveCriticalSection(&this->m_csLock);
|
|
|
|
|
|
DPFX(DPFPREP, 3, "Waiting for long lock to be released.");
|
|
|
|
DNWaitForSingleObject(this->m_hLongLockSemaphore, INFINITE);
|
|
|
|
|
|
DNEnterCriticalSection(&this->m_csLock);
|
|
|
|
|
|
//
|
|
// If this same thread is already holding the lock, then bail.
|
|
//
|
|
if (this->m_dwLockThreadID == GetCurrentThreadId())
|
|
{
|
|
DPFX(DPFPREP, 0, "Thread re-entering after waiting for long lock!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
DPFX(DPFPREP, 8, "Took main object lock, elapsed time = %u ms.",
|
|
(GETTIMESTAMP() - dwStartTime));
|
|
#endif // DBG
|
|
|
|
//
|
|
// Save this thread's ID so we know who's holding the lock.
|
|
//
|
|
this->m_dwLockThreadID = GetCurrentThreadId();
|
|
|
|
|
|
Exit:
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
//
|
|
// We're reentering. Drop the lock and return the failure.
|
|
//
|
|
DNLeaveCriticalSection(&this->m_csLock);
|
|
|
|
hr = DPNHERR_REENTRANT;
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::TakeLock
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::DropLock"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::DropLock
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Drops the main object lock.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::DropLock(void)
|
|
{
|
|
DNASSERT(! (this->m_dwFlags & NATHELPUPNPOBJ_LONGLOCK));
|
|
DNASSERT(this->m_lNumLongLockWaitingThreads == 0);
|
|
DNASSERT(this->m_dwLockThreadID == GetCurrentThreadId());
|
|
|
|
this->m_dwLockThreadID = 0;
|
|
DNLeaveCriticalSection(&this->m_csLock);
|
|
|
|
DPFX(DPFPREP, 8, "Dropped main object lock.");
|
|
} // CNATHelpUPnP::DropLock
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::SwitchToLongLock"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::SwitchToLongLock
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Switches from holding the main object lock to holding the
|
|
// long lock.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::SwitchToLongLock(void)
|
|
{
|
|
AssertCriticalSectionIsTakenByThisThread(&this->m_csLock, TRUE);
|
|
DNASSERT(! (this->m_dwFlags & NATHELPUPNPOBJ_LONGLOCK));
|
|
DNASSERT(this->m_lNumLongLockWaitingThreads == 0);
|
|
|
|
|
|
DPFX(DPFPREP, 8, "Switching to long lock.");
|
|
|
|
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_LONGLOCK;
|
|
|
|
DNLeaveCriticalSection(&this->m_csLock);
|
|
} // CNATHelpUPnP::SwitchToLongLock
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::SwitchFromLongLock"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::SwitchFromLongLock
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Switches from holding the long lock back to holding the main
|
|
// object lock.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::SwitchFromLongLock(void)
|
|
{
|
|
DNEnterCriticalSection(&this->m_csLock);
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_LONGLOCK);
|
|
this->m_dwFlags &= ~NATHELPUPNPOBJ_LONGLOCK;
|
|
|
|
|
|
DPFX(DPFPREP, 8, "Switching from long lock, alerting %i threads.",
|
|
this->m_lNumLongLockWaitingThreads);
|
|
|
|
|
|
//
|
|
// This is non-optimal in that we release the semaphore but the waiting
|
|
// threads still won't actually be able to do anything since we now hold
|
|
// the main lock.
|
|
//
|
|
DNASSERT(this->m_lNumLongLockWaitingThreads >= 0);
|
|
DNReleaseSemaphore(this->m_hLongLockSemaphore,
|
|
this->m_lNumLongLockWaitingThreads,
|
|
NULL);
|
|
|
|
this->m_lNumLongLockWaitingThreads = 0;
|
|
} // CNATHelpUPnP::SwitchFromLongLock
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::LoadWinSockFunctionPointers"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::LoadWinSockFunctionPointers
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Loads pointers to all the functions that we use in WinSock.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Loading was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::LoadWinSockFunctionPointers(void)
|
|
{
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
#ifdef DBG
|
|
|
|
#define PRINTERRORIFDEBUG(name) \
|
|
{\
|
|
dwError = GetLastError();\
|
|
DPFX(DPFPREP, 0, "Couldn't get \"%hs\" function! 0x%lx", name, dwError);\
|
|
}
|
|
|
|
#else // ! DBG
|
|
|
|
#define PRINTERRORIFDEBUG(name)
|
|
|
|
#endif // ! DBG
|
|
|
|
|
|
#define LOADWINSOCKFUNCTION(var, proctype, name) \
|
|
{\
|
|
var = (##proctype) GetProcAddress(this->m_hWinSockDLL, _TWINCE(name));\
|
|
if (var == NULL)\
|
|
{\
|
|
PRINTERRORIFDEBUG(name);\
|
|
hr = DPNHERR_GENERIC;\
|
|
goto Failure;\
|
|
}\
|
|
}
|
|
|
|
// - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
|
|
|
|
HRESULT hr = DPNH_OK;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
LOADWINSOCKFUNCTION(this->m_pfnWSAStartup, LPFN_WSASTARTUP, "WSAStartup");
|
|
LOADWINSOCKFUNCTION(this->m_pfnWSACleanup, LPFN_WSACLEANUP, "WSACleanup");
|
|
#ifdef WINCE
|
|
this->m_pfnWSAGetLastError = (LPFN_WSAGETLASTERROR) GetLastError;
|
|
#else // ! WINCE
|
|
LOADWINSOCKFUNCTION(this->m_pfnWSAGetLastError, LPFN_WSAGETLASTERROR, "WSAGetLastError");
|
|
#endif // ! WINCE
|
|
LOADWINSOCKFUNCTION(this->m_pfnsocket, LPFN_SOCKET, "socket");
|
|
LOADWINSOCKFUNCTION(this->m_pfnclosesocket, LPFN_CLOSESOCKET, "closesocket");
|
|
LOADWINSOCKFUNCTION(this->m_pfnbind, LPFN_BIND, "bind");
|
|
LOADWINSOCKFUNCTION(this->m_pfnsetsockopt, LPFN_SETSOCKOPT, "setsockopt");
|
|
LOADWINSOCKFUNCTION(this->m_pfngetsockname, LPFN_GETSOCKNAME, "getsockname");
|
|
LOADWINSOCKFUNCTION(this->m_pfnselect, LPFN_SELECT, "select");
|
|
LOADWINSOCKFUNCTION(this->m_pfn__WSAFDIsSet, LPFN___WSAFDISSET, "__WSAFDIsSet");
|
|
LOADWINSOCKFUNCTION(this->m_pfnrecvfrom, LPFN_RECVFROM, "recvfrom");
|
|
LOADWINSOCKFUNCTION(this->m_pfnsendto, LPFN_SENDTO, "sendto");
|
|
LOADWINSOCKFUNCTION(this->m_pfngethostname, LPFN_GETHOSTNAME, "gethostname");
|
|
LOADWINSOCKFUNCTION(this->m_pfngethostbyname, LPFN_GETHOSTBYNAME, "gethostbyname");
|
|
LOADWINSOCKFUNCTION(this->m_pfninet_addr, LPFN_INET_ADDR, "inet_addr");
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1))
|
|
{
|
|
LOADWINSOCKFUNCTION(this->m_pfnWSASocketA, LPFN_WSASOCKETA, "WSASocketA");
|
|
LOADWINSOCKFUNCTION(this->m_pfnWSAIoctl, LPFN_WSAIOCTL, "WSAIoctl");
|
|
LOADWINSOCKFUNCTION(this->m_pfnWSAGetOverlappedResult, LPFN_WSAGETOVERLAPPEDRESULT, "WSAGetOverlappedResult");
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
LOADWINSOCKFUNCTION(this->m_pfnioctlsocket, LPFN_IOCTLSOCKET, "ioctlsocket");
|
|
LOADWINSOCKFUNCTION(this->m_pfnconnect, LPFN_CONNECT, "connect");
|
|
LOADWINSOCKFUNCTION(this->m_pfnshutdown, LPFN_SHUTDOWN, "shutdown");
|
|
LOADWINSOCKFUNCTION(this->m_pfnsend, LPFN_SEND, "send");
|
|
LOADWINSOCKFUNCTION(this->m_pfnrecv, LPFN_RECV, "recv");
|
|
|
|
#ifdef DBG
|
|
LOADWINSOCKFUNCTION(this->m_pfngetsockopt, LPFN_GETSOCKOPT, "getsockopt");
|
|
#endif // DBG
|
|
|
|
|
|
Exit:
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
hr = DPNHERR_GENERIC;
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::LoadWinSockFunctionPointers
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CheckForNewDevices"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CheckForNewDevices
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Detects new IP capable devices that have been added and
|
|
// removes old ones no longer available.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// BOOL * pfFoundNewDevices Pointer to boolean to set to TRUE if new
|
|
// devices were added, or NULL if don't care.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The check was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CheckForNewDevices(BOOL * const pfFoundNewDevices)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
#if ((defined(DBG)) || (! defined(DPNBUILD_NOWINSOCK2)))
|
|
DWORD dwError;
|
|
#endif // DBG or ! DPNBUILD_NOWINSOCK2
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
int iReturn;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
char szName[1000];
|
|
PHOSTENT phostent;
|
|
IN_ADDR ** ppinaddr;
|
|
DWORD dwAddressesSize = 0;
|
|
DWORD dwNumAddresses = 0;
|
|
IN_ADDR * painaddrAddresses = NULL;
|
|
CBilink * pBilinkDevice;
|
|
CDevice * pDevice = NULL; // NULL it for PREfix, even though fDeviceCreated guards it
|
|
BOOL fDeviceCreated = FALSE;
|
|
BOOL fFound;
|
|
CBilink * pBilinkRegPort;
|
|
CRegisteredPort * pRegisteredPort;
|
|
SOCKET sTemp = INVALID_SOCKET;
|
|
SOCKADDR_IN saddrinTemp;
|
|
DWORD dwTemp;
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
SOCKET_ADDRESS * paSocketAddresses;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters (0x%p)", this, pfFoundNewDevices);
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// Handle any address list change Ioctl completions that may have gotten us
|
|
// here.
|
|
//
|
|
if ((this->m_hAlertEvent != NULL) ||
|
|
(this->m_hAlertIOCompletionPort != NULL))
|
|
{
|
|
DNASSERT(this->m_sIoctls != INVALID_SOCKET);
|
|
DNASSERT(this->m_polAddressListChange != NULL);
|
|
|
|
if (this->m_pfnWSAGetOverlappedResult(this->m_sIoctls, //
|
|
this->m_polAddressListChange, //
|
|
&dwTemp, // ignore bytes transferred
|
|
FALSE, // don't wait
|
|
&dwTemp)) // ignore flags
|
|
{
|
|
DPFX(DPFPREP, 1, "Received address list change notification.");
|
|
|
|
|
|
//
|
|
// Overlapped result completed. Reissue it.
|
|
//
|
|
hr = this->RequestLocalAddressListChangeNotification();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't request local address list change notification!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Figure out what error it was.
|
|
//
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
switch (dwError)
|
|
{
|
|
case WSA_IO_INCOMPLETE:
|
|
{
|
|
//
|
|
// It hasn't completed yet.
|
|
//
|
|
break;
|
|
}
|
|
|
|
case ERROR_OPERATION_ABORTED:
|
|
{
|
|
//
|
|
// The thread that we originally submitted the Ioctl on
|
|
// went away and so the OS kindly cancelled the operation
|
|
// on us. How nice. Well, let's try resubmitting it.
|
|
//
|
|
|
|
DPFX(DPFPREP, 1, "Thread that submitted previous address list change notification went away, rerequesting.");
|
|
|
|
hr = this->RequestLocalAddressListChangeNotification();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't request local address list change notification!");
|
|
goto Failure;
|
|
}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get overlapped result, error = %u! Ignoring.", dwError);
|
|
break;
|
|
}
|
|
} // end switch (on error)
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// If we're on WinSock 2, let's try getting the address list with
|
|
// an Ioctl.
|
|
//
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1))
|
|
{
|
|
DNASSERT(this->m_sIoctls != INVALID_SOCKET);
|
|
DNASSERT(this->m_pfnWSAIoctl != NULL);
|
|
|
|
//
|
|
// Keep trying to get the address list until we have a large enough
|
|
// buffer. We use the IN_ADDR array pointer simply because it's
|
|
// already there. We know that IN_ADDRs are smaller than
|
|
// SOCKET_ADDRESSes, so we can reuse the same buffer.
|
|
//
|
|
do
|
|
{
|
|
iReturn = this->m_pfnWSAIoctl(this->m_sIoctls, // use the special Ioctl socket
|
|
SIO_ADDRESS_LIST_QUERY, //
|
|
NULL, // no input data
|
|
0, // no input data
|
|
painaddrAddresses, // output buffer
|
|
dwAddressesSize, // output buffer size
|
|
&dwTemp, // bytes needed
|
|
NULL, // no overlapped structure
|
|
NULL); // no completion routine
|
|
|
|
if (iReturn != 0)
|
|
{
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
|
|
//
|
|
// Free the previous buffer, no matter what error it was.
|
|
//
|
|
if (painaddrAddresses != NULL)
|
|
{
|
|
DNFree(painaddrAddresses);
|
|
painaddrAddresses = NULL;
|
|
}
|
|
|
|
if (dwError != WSAEFAULT)
|
|
{
|
|
DPFX(DPFPREP, 1, "Retrieving address list failed (err = %u), trying WinSock 1 method.", dwError);
|
|
|
|
//
|
|
// We'll try the old-fashioned WinSock 1 way.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Be absolutely sure WinSock isn't causing us trouble.
|
|
//
|
|
if (dwTemp < sizeof(SOCKET_ADDRESS_LIST))
|
|
{
|
|
DPFX(DPFPREP, 0, "Received an invalid buffer size (%u < %u)!",
|
|
dwTemp, sizeof(SOCKET_ADDRESS_LIST));
|
|
|
|
//
|
|
// We'll try the old-fashioned WinSock 1 way.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// The buffer wasn't large enough. Try again.
|
|
//
|
|
painaddrAddresses = (IN_ADDR*) DNMalloc(dwTemp);
|
|
if (painaddrAddresses == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
dwAddressesSize = dwTemp;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Success! We're going to being sneaky and reuse the buffer.
|
|
// We know that the SOCKET_ADDRESS_LIST returned will be larger
|
|
// than an array of IN_ADDRs, so we can save a malloc.
|
|
//
|
|
// But first, be absolutely sure WinSock isn't causing us
|
|
// trouble.
|
|
//
|
|
|
|
if (painaddrAddresses == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "WinSock returned success with a NULL buffer!");
|
|
|
|
//
|
|
// We'll try the old-fashioned WinSock 1 way.
|
|
//
|
|
break;
|
|
}
|
|
|
|
dwNumAddresses = ((SOCKET_ADDRESS_LIST*) painaddrAddresses)->iAddressCount;
|
|
dwAddressesSize = 0;
|
|
|
|
|
|
//
|
|
// Make sure there are addresses.
|
|
//
|
|
if (dwNumAddresses > 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "WinSock 2 Ioctl returned %u addresses:", dwNumAddresses);
|
|
|
|
paSocketAddresses = ((SOCKET_ADDRESS_LIST*) painaddrAddresses)->Address;
|
|
for(dwTemp = 0; dwTemp < dwNumAddresses; dwTemp++)
|
|
{
|
|
DNASSERT(paSocketAddresses[dwTemp].iSockaddrLength == sizeof(SOCKADDR_IN));
|
|
DNASSERT(paSocketAddresses[dwTemp].lpSockaddr != NULL);
|
|
DNASSERT(paSocketAddresses[dwTemp].lpSockaddr->sa_family == AF_INET);
|
|
|
|
//
|
|
// Ignore 0.0.0.0 addresses.
|
|
//
|
|
if (((SOCKADDR_IN*) (paSocketAddresses[dwTemp].lpSockaddr))->sin_addr.S_un.S_addr != INADDR_NONE)
|
|
{
|
|
//
|
|
// Move the IN_ADDR component of this address
|
|
// toward the front of the buffer, into it's
|
|
// correct place in the array.
|
|
//
|
|
painaddrAddresses[dwTemp].S_un.S_addr = ((SOCKADDR_IN*) (paSocketAddresses[dwTemp].lpSockaddr))->sin_addr.S_un.S_addr;
|
|
|
|
DPFX(DPFPREP, 7, "\t%u- %u.%u.%u.%u",
|
|
dwTemp,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b1,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b2,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b3,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b4);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "\t%u- Ignoring 0.0.0.0 address.", dwTemp);
|
|
dwAddressesSize++;
|
|
|
|
//
|
|
// The code should handle this fine, but why is
|
|
// WinSock doing this to us?
|
|
//
|
|
DNASSERT(FALSE);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Subtract out any invalid addresses that we skipped.
|
|
//
|
|
dwNumAddresses -= dwAddressesSize;
|
|
if (dwNumAddresses == 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "WinSock 2 reported only invalid addresses, hoping WinSock 1 method picks up the loopback address.");
|
|
|
|
DNFree(painaddrAddresses);
|
|
painaddrAddresses = NULL;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "WinSock 2 Ioctl did not report any valid addresses, hoping WinSock 1 method picks up the loopback address.");
|
|
|
|
DNFree(painaddrAddresses);
|
|
painaddrAddresses = NULL;
|
|
}
|
|
|
|
//
|
|
// Get out of the loop.
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
while (TRUE);
|
|
}
|
|
|
|
|
|
//
|
|
// Get the list of all available addresses from the WinSock 1 API if we
|
|
// don't already have them.
|
|
//
|
|
if (painaddrAddresses == NULL)
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
{
|
|
if (this->m_pfngethostname(szName, 1000) != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't get host name, error = %u!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
phostent = this->m_pfngethostbyname(szName);
|
|
if (phostent == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't retrieve addresses, error = %u!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// WinSock says that you need to copy this data before you make any
|
|
// other API calls. So first we count the number of entries we need to
|
|
// copy.
|
|
//
|
|
ppinaddr = (IN_ADDR**) phostent->h_addr_list;
|
|
while ((*ppinaddr) != NULL)
|
|
{
|
|
//
|
|
// Ignore 0.0.0.0 addresses.
|
|
//
|
|
if ((*ppinaddr)->S_un.S_addr != INADDR_NONE)
|
|
{
|
|
dwNumAddresses++;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Ignoring 0.0.0.0 address.");
|
|
|
|
//
|
|
// The code should handle this fine, but why is WinSock doing
|
|
// this to us?
|
|
//
|
|
DNASSERT(FALSE);
|
|
}
|
|
|
|
ppinaddr++;
|
|
}
|
|
|
|
|
|
//
|
|
// If there aren't any addresses, we must fail. WinSock 1 ought to
|
|
// report the loopback address at least.
|
|
//
|
|
if (dwNumAddresses == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "WinSock 1 did not report any valid addresses!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "WinSock 1 method returned %u valid addresses:", dwNumAddresses);
|
|
|
|
painaddrAddresses = (IN_ADDR*) DNMalloc(dwNumAddresses * sizeof(IN_ADDR));
|
|
if (painaddrAddresses == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Now copy all the addresses.
|
|
//
|
|
ppinaddr = (IN_ADDR**) phostent->h_addr_list;
|
|
|
|
dwTemp = 0;
|
|
while ((*ppinaddr) != NULL)
|
|
{
|
|
//
|
|
// Ignore 0.0.0.0 addresses again.
|
|
//
|
|
if ((*ppinaddr)->S_un.S_addr != INADDR_NONE)
|
|
{
|
|
painaddrAddresses[dwTemp].S_un.S_addr = (*ppinaddr)->S_un.S_addr;
|
|
|
|
DPFX(DPFPREP, 7, "\t%u- %u.%u.%u.%u",
|
|
dwTemp,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b1,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b2,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b3,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b4);
|
|
|
|
dwTemp++;
|
|
}
|
|
|
|
ppinaddr++;
|
|
}
|
|
|
|
DNASSERT(dwTemp == dwNumAddresses);
|
|
}
|
|
/*
|
|
else
|
|
{
|
|
//
|
|
// Already have addresses array.
|
|
//
|
|
}
|
|
*/
|
|
|
|
|
|
//
|
|
// Make sure that all of the devices we currently know about are still
|
|
// around.
|
|
//
|
|
pBilinkDevice = this->m_blDevices.GetNext();
|
|
while (pBilinkDevice != &this->m_blDevices)
|
|
{
|
|
DNASSERT(! pBilinkDevice->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilinkDevice);
|
|
pBilinkDevice = pBilinkDevice->GetNext();
|
|
|
|
fFound = FALSE;
|
|
for(dwTemp = 0; dwTemp < dwNumAddresses; dwTemp++)
|
|
{
|
|
if (painaddrAddresses[dwTemp].S_un.S_addr == pDevice->GetLocalAddressV4())
|
|
{
|
|
fFound = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (fFound)
|
|
{
|
|
//
|
|
// It may be time for this device to use a different port...
|
|
//
|
|
dwTemp = pDevice->GetFirstUPnPDiscoveryTime();
|
|
if ((dwTemp != 0) && ((GETTIMESTAMP() - dwTemp) > g_dwReusePortTime))
|
|
{
|
|
ZeroMemory(&saddrinTemp, sizeof(saddrinTemp));
|
|
saddrinTemp.sin_family = AF_INET;
|
|
saddrinTemp.sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
|
|
sTemp = this->CreateSocket(&saddrinTemp, SOCK_DGRAM, IPPROTO_UDP);
|
|
if (sTemp != INVALID_SOCKET)
|
|
{
|
|
//
|
|
// Sanity check that we didn't lose the device address.
|
|
//
|
|
DNASSERT(saddrinTemp.sin_addr.S_un.S_addr == pDevice->GetLocalAddressV4());
|
|
|
|
DPFX(DPFPREP, 4, "Device 0x%p UPnP discovery socket 0x%p (%u.%u.%u.%u:%u) created to replace port %u.",
|
|
pDevice,
|
|
sTemp,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinTemp.sin_port),
|
|
NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// If we used the HomeNet firewall API to open a hole for UPnP
|
|
// discovery multicasts, close it.
|
|
//
|
|
if (pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall())
|
|
{
|
|
hr = this->CloseDevicesUPnPDiscoveryPort(pDevice, NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't close device 0x%p's previous UPnP discovery socket's port on firewall (err = 0x%lx)! Ignoring.",
|
|
pDevice, hr);
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
pDevice->NoteNotUPnPDiscoverySocketMappedOnHNetFirewall();
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
pDevice->SetUPnPDiscoverySocketPort(saddrinTemp.sin_port);
|
|
pDevice->SetFirstUPnPDiscoveryTime(0);
|
|
|
|
//
|
|
// Close the existing socket.
|
|
//
|
|
this->m_pfnclosesocket(pDevice->GetUPnPDiscoverySocket());
|
|
|
|
//
|
|
// Transfer ownership of the new socket to the device.
|
|
//
|
|
pDevice->SetUPnPDiscoverySocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
|
|
DPFX(DPFPREP, 8, "Device 0x%p got re-assigned UPnP socket 0x%p.",
|
|
pDevice, pDevice->GetUPnPDiscoverySocket());
|
|
|
|
//
|
|
// We'll let the normal "check for firewall" code detect
|
|
// the fact that the discovery socket is not mapped on the
|
|
// firewall and try to do so there (if it even needs to be
|
|
// mapped). See UpdateServerStatus.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't create a replacement UPnP discovery socket for device 0x%p! Using existing port %u.",
|
|
pDevice, NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Didn't find this device in the returned list, forget about
|
|
// it.
|
|
//
|
|
#ifdef DBG
|
|
{
|
|
IN_ADDR inaddrTemp;
|
|
|
|
|
|
inaddrTemp.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
DPFX(DPFPREP, 1, "Device 0x%p no longer exists, removing (address was %u.%u.%u.%u).",
|
|
pDevice,
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
}
|
|
|
|
this->m_dwNumDeviceRemoves++;
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Override the minimum UpdateServerStatus interval so that we can
|
|
// get information on any local public address changes due to the
|
|
// possible loss of a server on this interface.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_DEVICECHANGED;
|
|
|
|
//
|
|
// Since there was a change in the network, go back to polling
|
|
// relatively quickly.
|
|
//
|
|
this->ResetNextPollInterval();
|
|
|
|
|
|
//
|
|
// Forcefully mark the UPnP gateway device as disconnected.
|
|
//
|
|
if (pDevice->GetUPnPDevice() != NULL)
|
|
{
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
}
|
|
|
|
|
|
//
|
|
// Mark all ports that were registered to this device as unowned
|
|
// by putting them into the wildcard list. First unmap them from
|
|
// the firewall.
|
|
//
|
|
pBilinkRegPort = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilinkRegPort != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilinkRegPort->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilinkRegPort);
|
|
pBilinkRegPort = pBilinkRegPort->GetNext();
|
|
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p's device went away, marking as unowned.",
|
|
pRegisteredPort);
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Even though the device is gone, we can still remove the
|
|
// firewall mapping.
|
|
//
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
//
|
|
// Unmap the port.
|
|
//
|
|
// Alert the user since this is unexpected.
|
|
//
|
|
hr = this->UnmapPortOnLocalHNetFirewall(pRegisteredPort,
|
|
TRUE,
|
|
TRUE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't unmap registered port 0x%p from device 0x%p's firewall (err = 0x%lx)! Ignoring.",
|
|
pRegisteredPort, pDevice, hr);
|
|
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
|
|
//
|
|
// Continue anyway.
|
|
//
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
|
|
pRegisteredPort->NoteNotHNetFirewallPortUnavailable();
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
DNASSERT(! pRegisteredPort->HasUPnPPublicAddresses());
|
|
DNASSERT(! pRegisteredPort->IsUPnPPortUnavailable());
|
|
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
pRegisteredPort->m_blDeviceList.RemoveFromList();
|
|
pRegisteredPort->m_blDeviceList.InsertBefore(&this->m_blUnownedPorts);
|
|
|
|
//
|
|
// The user doesn't directly need to be informed. If the ports
|
|
// previously had public addresses, the ADDRESSESCHANGED flag
|
|
// would have already been set by ClearDevicesUPnPDevice. If
|
|
// they didn't have ports with public addresses, then the user
|
|
// won't see any difference and thus ADDRESSESCHANGED wouldn't
|
|
// need to be set.
|
|
//
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// If we used the HomeNet firewall API to open a hole for UPnP
|
|
// discovery multicasts, close it.
|
|
//
|
|
if (pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall())
|
|
{
|
|
hr = this->CloseDevicesUPnPDiscoveryPort(pDevice, NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't close device 0x%p's UPnP discovery socket's port on firewall (err = 0x%lx)! Ignoring.",
|
|
pDevice, hr);
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
pDevice->NoteNotUPnPDiscoverySocketMappedOnHNetFirewall();
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
pDevice->m_blList.RemoveFromList();
|
|
|
|
|
|
//
|
|
// Close the socket, if we had one.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP)
|
|
{
|
|
this->m_pfnclosesocket(pDevice->GetUPnPDiscoverySocket());
|
|
pDevice->SetUPnPDiscoverySocket(INVALID_SOCKET);
|
|
}
|
|
|
|
delete pDevice;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Search for all returned devices in our existing list, and add new
|
|
// entries for each one that we didn't already know about.
|
|
//
|
|
for(dwTemp = 0; dwTemp < dwNumAddresses; dwTemp++)
|
|
{
|
|
fFound = FALSE;
|
|
|
|
pBilinkDevice = this->m_blDevices.GetNext();
|
|
while (pBilinkDevice != &this->m_blDevices)
|
|
{
|
|
DNASSERT(! pBilinkDevice->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilinkDevice);
|
|
pBilinkDevice = pBilinkDevice->GetNext();
|
|
|
|
if (pDevice->GetLocalAddressV4() == painaddrAddresses[dwTemp].S_un.S_addr)
|
|
{
|
|
fFound = TRUE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (! fFound)
|
|
{
|
|
//
|
|
// We didn't know about this device. Create a new object.
|
|
//
|
|
pDevice = new CDevice(painaddrAddresses[dwTemp].S_un.S_addr);
|
|
if (pDevice == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
fDeviceCreated = TRUE;
|
|
|
|
|
|
#ifdef DBG
|
|
DPFX(DPFPREP, 1, "Found new device %u.%u.%u.%u, (object = 0x%p).",
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b1,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b2,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b3,
|
|
painaddrAddresses[dwTemp].S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
|
|
this->m_dwNumDeviceAdds++;
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Override the minimum UpdateServerStatus interval so that we can
|
|
// get information on this new device.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_DEVICECHANGED;
|
|
|
|
//
|
|
// Since there was a change in the network, go back to polling
|
|
// relatively quickly.
|
|
//
|
|
this->ResetNextPollInterval();
|
|
|
|
|
|
//
|
|
// Create the UPnP discovery socket, if we're allowed.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP)
|
|
{
|
|
ZeroMemory(&saddrinTemp, sizeof(saddrinTemp));
|
|
saddrinTemp.sin_family = AF_INET;
|
|
saddrinTemp.sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
|
|
sTemp = this->CreateSocket(&saddrinTemp, SOCK_DGRAM, IPPROTO_UDP);
|
|
if (sTemp == INVALID_SOCKET)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't create a UPnP discovery socket! Ignoring address (and destroying device 0x%p).",
|
|
pDevice);
|
|
|
|
//
|
|
// Get rid of the device.
|
|
//
|
|
delete pDevice;
|
|
pDevice = NULL;
|
|
|
|
|
|
//
|
|
// Forget about device in case of failure later.
|
|
//
|
|
fDeviceCreated = FALSE;
|
|
|
|
|
|
//
|
|
// Move to next address.
|
|
//
|
|
continue;
|
|
}
|
|
|
|
//
|
|
// Sanity check that we didn't lose the device address.
|
|
//
|
|
DNASSERT(saddrinTemp.sin_addr.S_un.S_addr == pDevice->GetLocalAddressV4());
|
|
|
|
DPFX(DPFPREP, 4, "Device 0x%p UPnP discovery socket 0x%p (%u.%u.%u.%u:%u) created.",
|
|
pDevice,
|
|
sTemp,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinTemp.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinTemp.sin_port));
|
|
|
|
pDevice->SetUPnPDiscoverySocketPort(saddrinTemp.sin_port);
|
|
|
|
//
|
|
// Transfer ownership of the socket to the device.
|
|
//
|
|
pDevice->SetUPnPDiscoverySocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
|
|
DPFX(DPFPREP, 8, "Device 0x%p got assigned UPnP socket 0x%p.",
|
|
pDevice, pDevice->GetUPnPDiscoverySocket());
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEHNETFWAPI)
|
|
{
|
|
//
|
|
// Check if the local firewall is enabled.
|
|
//
|
|
hr = this->CheckForLocalHNetFirewallAndMapPorts(pDevice, NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't check for local HNet firewall and map ports (err = 0x%lx)! Continuing.",
|
|
hr);
|
|
DNASSERT(! pDevice->IsHNetFirewalled());
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using firewall traversal.
|
|
//
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
//
|
|
// Add the device to our known list.
|
|
//
|
|
pDevice->m_blList.InsertBefore(&this->m_blDevices);
|
|
|
|
|
|
//
|
|
// Inform the caller if they care.
|
|
//
|
|
if (pfFoundNewDevices != NULL)
|
|
{
|
|
(*pfFoundNewDevices) = TRUE;
|
|
}
|
|
|
|
|
|
//
|
|
// Forget about device in case of failure later.
|
|
//
|
|
fDeviceCreated = FALSE;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// If we got some very weird failures and ended up here without any
|
|
// devices, complain to management (or the caller of this function, that's
|
|
// probably more convenient).
|
|
//
|
|
if (this->m_blDevices.IsEmpty())
|
|
{
|
|
DPFX(DPFPREP, 0, "No usable devices, cannot proceed!", 0);
|
|
DNASSERTX(! "No usable devices!", 2);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
if (painaddrAddresses != NULL)
|
|
{
|
|
DNFree(painaddrAddresses);
|
|
painaddrAddresses = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (sTemp != INVALID_SOCKET)
|
|
{
|
|
this->m_pfnclosesocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
}
|
|
|
|
if (fDeviceCreated)
|
|
{
|
|
delete pDevice;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CheckForNewDevices
|
|
|
|
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CheckForLocalHNetFirewallAndMapPorts"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CheckForLocalHNetFirewallAndMapPorts
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Looks for a local HomeNet API aware firewall, and ensures
|
|
// there are mappings for each of the device's registered ports,
|
|
// if a firewall is found.
|
|
//
|
|
// If any registered port (except pDontAlertRegisteredPort if
|
|
// not NULL) gets mapped, then it will trigger an address update
|
|
// alert the next time the user calls GetCaps.
|
|
//
|
|
// The main object lock is assumed to be held. It will be
|
|
// converted into the long lock for the duration of this function.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device to check.
|
|
// CRegisteredPort * pDontAlertRegisteredPort - Pointer to registered port
|
|
// that should not trigger an
|
|
// address update alert, or
|
|
// NULL.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Search completed successfully. There may or may not
|
|
// be a firewall.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CheckForLocalHNetFirewallAndMapPorts(CDevice * const pDevice,
|
|
CRegisteredPort * const pDontAlertRegisteredPort)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
BOOL fSwitchedToLongLock = FALSE;
|
|
BOOL fUninitializeCOM = FALSE;
|
|
IHNetCfgMgr * pHNetCfgMgr = NULL;
|
|
IHNetConnection * pHNetConnection = NULL;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p)",
|
|
this, pDevice, pDontAlertRegisteredPort);
|
|
|
|
|
|
//
|
|
// If this is the loopback address, don't bother trying to map anything.
|
|
//
|
|
if (pDevice->GetLocalAddressV4() == NETWORKBYTEORDER_INADDR_LOOPBACK)
|
|
{
|
|
DPFX(DPFPREP, 7, "No firewall behavior necessary with loopback device 0x%p.",
|
|
pDevice);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// If we don't have IPHLPAPI or RASAPI32, we can't do anything (and
|
|
// shouldn't need to).
|
|
//
|
|
if ((this->m_hIpHlpApiDLL == NULL) || (this->m_hRasApi32DLL == NULL))
|
|
{
|
|
DPFX(DPFPREP, 7, "Didn't load IPHLPAPI and/or RASAPI32, not getting HNet interfaces for device 0x%p.",
|
|
pDevice);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Using the HomeNet API (particularly the out-of-proc COM calls) during
|
|
// stress is really, really, painfully slow. Since we have one global lock
|
|
// the controls everything, other threads may be sitting for an equally
|
|
// long time... so long, in fact, that the critical section timeout fires
|
|
// and we get a false stress hit. So we have a sneaky workaround to
|
|
// prevent that from happening while still maintaining ownership of the
|
|
// object.
|
|
//
|
|
this->SwitchToLongLock();
|
|
fSwitchedToLongLock = TRUE;
|
|
|
|
|
|
//
|
|
// Try to initialize COM if we weren't instantiated through COM. It may
|
|
// have already been initialized in a different mode, which is okay. As
|
|
// long as it has been initialized somehow, we're fine.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_NOTCREATEDWITHCOM)
|
|
{
|
|
hr = CoInitializeEx(NULL, (COINIT_MULTITHREADED | COINIT_DISABLE_OLE1DDE));
|
|
switch (hr)
|
|
{
|
|
case S_OK:
|
|
{
|
|
//
|
|
// Success, that's good. Cleanup when we're done.
|
|
//
|
|
DPFX(DPFPREP, 8, "Successfully initialized COM.");
|
|
fUninitializeCOM = TRUE;
|
|
break;
|
|
}
|
|
|
|
case S_FALSE:
|
|
{
|
|
//
|
|
// Someone else already initialized COM, but that's okay.
|
|
// Cleanup when we're done.
|
|
//
|
|
DPFX(DPFPREP, 8, "Initialized COM (again).");
|
|
fUninitializeCOM = TRUE;
|
|
break;
|
|
}
|
|
|
|
case RPC_E_CHANGED_MODE:
|
|
{
|
|
//
|
|
// Someone else already initialized COM in a different mode.
|
|
// It should be okay, but we don't have to balance the CoInit
|
|
// call with a CoUninit.
|
|
//
|
|
DPFX(DPFPREP, 8, "Didn't initialize COM, already initialized in a different mode.");
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// Hmm, something else is going on. We can't handle that.
|
|
//
|
|
DPFX(DPFPREP, 0, "Initializing COM failed (err = 0x%lx)!", hr);
|
|
goto Failure;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "Object was instantiated through COM, no need to initialize COM.");
|
|
}
|
|
|
|
|
|
//
|
|
// Try creating the main HNet manager object.
|
|
//
|
|
hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL, CLSCTX_INPROC_SERVER,
|
|
IID_IHNetCfgMgr, (PVOID*) (&pHNetCfgMgr));
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't create IHNetCfgMgr interface for device 0x%p (err = 0x%lx), assuming firewall control interface unavailable.",
|
|
pDevice, hr);
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// We created the IHNetCfgMgr object as in-proc, so there's no proxy that
|
|
// requires security settings.
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetCfgMgr);
|
|
|
|
|
|
|
|
//
|
|
// Get the HNetConnection object for this device.
|
|
//
|
|
hr = this->GetIHNetConnectionForDeviceIfFirewalled(pDevice,
|
|
pHNetCfgMgr,
|
|
&pHNetConnection);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't get IHNetConnection interface for device 0x%p (err = 0x%lx), assuming firewall not enabled.",
|
|
pDevice, hr);
|
|
|
|
|
|
//
|
|
// If the device was previously firewalled, we need to clear our info.
|
|
//
|
|
if (pDevice->IsHNetFirewalled())
|
|
{
|
|
DPFX(DPFPREP, 2, "Firewall is no longer enabled for device 0x%p.",
|
|
pDevice);
|
|
|
|
//
|
|
// Since there was a change in the network, go back to polling
|
|
// relatively quickly.
|
|
//
|
|
this->ResetNextPollInterval();
|
|
|
|
|
|
DNASSERT(pDevice->HasCheckedForFirewallAvailability());
|
|
|
|
|
|
pBilink = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilink != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilink);
|
|
|
|
//
|
|
// Unmap items mapped on the firewall.
|
|
//
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
DPFX(DPFPREP, 1, "Unmapping registered port 0x%p from device 0x%p's disappearing firewall.",
|
|
pRegisteredPort, pDevice);
|
|
|
|
|
|
hr = this->UnmapPortOnLocalHNetFirewallInternal(pRegisteredPort,
|
|
TRUE,
|
|
pHNetCfgMgr);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't unmap registered port 0x%p from device 0x%p's firewall (err = 0x%lx)! Ignoring.",
|
|
pRegisteredPort, pDevice, hr);
|
|
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
|
|
//
|
|
// Continue anyway.
|
|
//
|
|
hr = DPNH_OK;
|
|
}
|
|
|
|
|
|
//
|
|
// Alert the user.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_ADDRESSESCHANGED;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p was not mapped on device 0x%p's disappearing firewall, assuming being called within RegisterPorts.",
|
|
pRegisteredPort, pDevice);
|
|
}
|
|
|
|
|
|
//
|
|
// Go to next port.
|
|
//
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// If we used the HomeNet firewall API to open a hole for UPnP
|
|
// discovery multicasts, unmap that, too.
|
|
//
|
|
if (pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall())
|
|
{
|
|
DPFX(DPFPREP, 0, "Device 0x%p's UPnP discovery socket's forcefully unmapped from disappearing firewall.",
|
|
pDevice);
|
|
|
|
hr = this->CloseDevicesUPnPDiscoveryPort(pDevice, pHNetCfgMgr);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't close device 0x%p's UPnP discovery socket's port on firewall (err = 0x%lx)! Ignoring.",
|
|
pDevice, hr);
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
pDevice->NoteNotUPnPDiscoverySocketMappedOnHNetFirewall();
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Turn off the flag now that all registered ports have been
|
|
// removed.
|
|
//
|
|
pDevice->NoteNotHNetFirewalled();
|
|
}
|
|
else
|
|
{
|
|
if (! pDevice->HasCheckedForFirewallAvailability())
|
|
{
|
|
//
|
|
// The firewall is not enabled.
|
|
//
|
|
|
|
DPFX(DPFPREP, 2, "Firewall is not enabled for device 0x%p.",
|
|
pDevice);
|
|
|
|
pDevice->NoteCheckedForFirewallAvailability();
|
|
|
|
|
|
//
|
|
// Since it is possible to remove mappings even without the
|
|
// firewall enabled, we can be courteous and unmap any stale
|
|
// entries left by previous app crashes when the firewall was
|
|
// still enabled.
|
|
//
|
|
|
|
//
|
|
// Pretend that it currently had been firewalled.
|
|
//
|
|
pDevice->NoteHNetFirewalled();
|
|
|
|
|
|
//
|
|
// Cleanup the mappings.
|
|
//
|
|
hr = this->CleanupInactiveFirewallMappings(pDevice, pHNetCfgMgr);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed cleaning up inactive firewall mappings with device 0x%p (firewall not initially enabled)!",
|
|
pDevice);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Turn off the flag we temporarily enabled while clearing
|
|
// the mappings.
|
|
//
|
|
pDevice->NoteNotHNetFirewalled();
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// The firewall is still not enabled.
|
|
//
|
|
DPFX(DPFPREP, 2, "Firewall is still not enabled for device 0x%p.",
|
|
pDevice);
|
|
}
|
|
}
|
|
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// If firewalling is enabled now, and wasn't before, we need to map all the
|
|
// existing ports. If it had been, we're fine.
|
|
//
|
|
if (! pDevice->IsHNetFirewalled())
|
|
{
|
|
DPFX(DPFPREP, 2, "Firewall is now enabled for device 0x%p.",
|
|
pDevice);
|
|
|
|
pDevice->NoteCheckedForFirewallAvailability();
|
|
pDevice->NoteHNetFirewalled();
|
|
|
|
//
|
|
// Since there was a change in the network, go back to polling
|
|
// relatively quickly.
|
|
//
|
|
this->ResetNextPollInterval();
|
|
|
|
|
|
//
|
|
// If we're allowed, we need to try opening a hole so that we can
|
|
// receive responses from device discovery multicasts. We'll
|
|
// ignore failures, since this is only to support the funky case of
|
|
// enabling firewall behind a NAT.
|
|
//
|
|
if ((g_fMapUPnPDiscoverySocket) &&
|
|
(pDevice->GetLocalAddressV4() != NETWORKBYTEORDER_INADDR_LOOPBACK) &&
|
|
(this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP))
|
|
{
|
|
hr = this->OpenDevicesUPnPDiscoveryPort(pDevice,
|
|
pHNetCfgMgr,
|
|
pHNetConnection);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't open device 0x%p's UPnP discovery socket's port on firewall (err = 0x%lx)! Ignoring, NAT may be undetectable.",
|
|
pDevice, hr);
|
|
hr = DPNH_OK;
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, "Not opening device 0x%p's UPnP discovery port (domap = %i, loopback = %i, upnp = %i).",
|
|
pDevice,
|
|
g_fMapUPnPDiscoverySocket,
|
|
((pDevice->GetLocalAddressV4() != NETWORKBYTEORDER_INADDR_LOOPBACK) ? FALSE : TRUE),
|
|
((this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP) ? TRUE : FALSE));
|
|
}
|
|
|
|
|
|
//
|
|
// Try to remove any mappings that were not freed earlier because
|
|
// we crashed.
|
|
//
|
|
hr = this->CleanupInactiveFirewallMappings(pDevice, pHNetCfgMgr);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed cleaning up inactive firewall mappings with device 0x%p's new firewall!",
|
|
pDevice);
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 2, "Firewall is still enabled for device 0x%p.",
|
|
pDevice);
|
|
|
|
DNASSERT(pDevice->HasCheckedForFirewallAvailability());
|
|
|
|
//
|
|
// Try to map the discovery socket if it hasn't been (and we're allowed
|
|
// & supposed to).
|
|
//
|
|
if ((g_fMapUPnPDiscoverySocket) &&
|
|
(! pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall()) &&
|
|
(pDevice->GetLocalAddressV4() != NETWORKBYTEORDER_INADDR_LOOPBACK) &&
|
|
(this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP))
|
|
{
|
|
hr = this->OpenDevicesUPnPDiscoveryPort(pDevice,
|
|
pHNetCfgMgr,
|
|
pHNetConnection);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't open device 0x%p's UPnP discovery socket's port on firewall (err = 0x%lx)! Ignoring, NAT may be undetectable.",
|
|
pDevice, hr);
|
|
hr = DPNH_OK;
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, "Not opening device 0x%p's UPnP discovery port (domap = %i, already = %i, loopback = %i, upnp = %i).",
|
|
pDevice,
|
|
g_fMapUPnPDiscoverySocket,
|
|
pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall(),
|
|
((pDevice->GetLocalAddressV4() != NETWORKBYTEORDER_INADDR_LOOPBACK) ? FALSE : TRUE),
|
|
((this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP) ? TRUE : FALSE));
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Map all the ports that haven't been yet.
|
|
//
|
|
hr = this->MapUnmappedPortsOnLocalHNetFirewall(pDevice,
|
|
pHNetCfgMgr,
|
|
pHNetConnection,
|
|
pDontAlertRegisteredPort);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't map ports on device 0x%p's new firewall (err = 0x%lx)!",
|
|
pDevice, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
|
|
|
|
Exit:
|
|
|
|
if (pHNetConnection != NULL)
|
|
{
|
|
pHNetConnection->Release();
|
|
pHNetConnection = NULL;
|
|
}
|
|
|
|
if (pHNetCfgMgr != NULL)
|
|
{
|
|
pHNetCfgMgr->Release();
|
|
pHNetCfgMgr = NULL;
|
|
}
|
|
|
|
if (fUninitializeCOM)
|
|
{
|
|
DPFX(DPFPREP, 8, "Uninitializing COM.");
|
|
CoUninitialize();
|
|
fUninitializeCOM = FALSE;
|
|
}
|
|
|
|
if (fSwitchedToLongLock)
|
|
{
|
|
this->SwitchFromLongLock();
|
|
fSwitchedToLongLock = FALSE;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
//
|
|
// Ensure that the device is not considered to be firewalled.
|
|
//
|
|
pDevice->NoteNotUPnPDiscoverySocketMappedOnHNetFirewall();
|
|
pDevice->NoteNotHNetFirewalled();
|
|
|
|
|
|
//
|
|
// Make sure no registered ports are marked as firewalled either.
|
|
//
|
|
pBilink = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilink != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilink);
|
|
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p forcefully marked as not mapped on HomeNet firewall.",
|
|
pRegisteredPort);
|
|
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CheckForLocalHNetFirewallAndMapPorts
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetIHNetConnectionForDeviceIfFirewalled"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetIHNetConnectionForDeviceIfFirewalled
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Returns an IHNetConnection interface for the given device.
|
|
//
|
|
// COM is assumed to have been initialized.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device whose
|
|
// IHNetConnection interface
|
|
// should be retrieved.
|
|
// IHNetCfgMgr * pHNetCfgMgr - IHNetCfgMgr interface to use.
|
|
// IHNetConnection ** ppHNetConnection - Place to store IHetConnection
|
|
// interface retrieved.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Interface retrieved successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::GetIHNetConnectionForDeviceIfFirewalled(CDevice * const pDevice,
|
|
IHNetCfgMgr * const pHNetCfgMgr,
|
|
IHNetConnection ** const ppHNetConnection)
|
|
{
|
|
HRESULT hr;
|
|
DWORD dwError;
|
|
IHNetFirewallSettings * pHNetFirewallSettings = NULL;
|
|
IEnumHNetFirewalledConnections * pEnumHNetFirewalledConnections = NULL;
|
|
IHNetFirewalledConnection * pHNetFirewalledConnection = NULL;
|
|
ULONG ulNumFound;
|
|
IHNetConnection * pHNetConnection = NULL;
|
|
HNET_CONN_PROPERTIES * pHNetConnProperties;
|
|
BOOL fLanConnection;
|
|
IN_ADDR inaddrTemp;
|
|
TCHAR tszDeviceIPAddress[16]; // "nnn.nnn.nnn.nnn" + NULL termination
|
|
BOOL fHaveDeviceGUID = FALSE;
|
|
TCHAR tszGuidDevice[GUID_STRING_LENGTH + 1]; // include NULL termination
|
|
TCHAR tszGuidHNetConnection[GUID_STRING_LENGTH + 1]; // include NULL termination
|
|
GUID * pguidHNetConnection = NULL;
|
|
WCHAR * pwszPhonebookPath = NULL;
|
|
WCHAR * pwszName = NULL;
|
|
HRASCONN hrasconn;
|
|
RASPPPIP raspppip;
|
|
DWORD dwSize;
|
|
|
|
|
|
DPFX(DPFPREP, 6, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p)",
|
|
this, pDevice, pHNetCfgMgr, ppHNetConnection);
|
|
|
|
|
|
//
|
|
// Convert the IP address right away. We use it frequently so there's no
|
|
// sense in continually regenerating it.
|
|
//
|
|
inaddrTemp.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
wsprintf(tszDeviceIPAddress, _T("%u.%u.%u.%u"),
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
|
|
|
|
//
|
|
// Here is what we're going to do in this function:
|
|
//
|
|
// IHNetCfgMgr::QueryInterface for IHNetFirewallSettings
|
|
// IHNetFirewallSettings::EnumFirewalledConnections
|
|
// IHNetFirewalledConnection::QueryInterface for IHNetConnection
|
|
// get the IHNetConnection's HNET_CONN_PROPERTIES
|
|
// if HNET_CONN_PROPERTIES.fLanConnection
|
|
// IHNetConnection::GetGuid()
|
|
// if GUID matches IPHLPAPI GUID
|
|
// We've got the one we want, we're done
|
|
// else
|
|
// Keep looping
|
|
// else
|
|
// IHNetConnection::GetRasPhonebookPath and IHNetConnection::GetName to pass into RasGetEntryHrasconnW as pszPhonebook and pszEntry, respectively
|
|
// if got HRASCONN
|
|
// RasGetProjectionInfo
|
|
// if IP matches the IP we're looking for
|
|
// We've got the one we want, we're done
|
|
// else
|
|
// Keep looping
|
|
// else
|
|
// RAS entry is not dialed, keep looping
|
|
// if didn't find object
|
|
// it's not firewalled
|
|
//
|
|
|
|
|
|
//
|
|
// Get the firewall settings object.
|
|
//
|
|
hr = pHNetCfgMgr->QueryInterface(IID_IHNetFirewallSettings,
|
|
(PVOID*) (&pHNetFirewallSettings));
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't query for IHNetFirewallSettings interface (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetFirewallSettings);
|
|
|
|
|
|
//
|
|
// Get the firewalled connections enumeration via IHNetFirewallSettings.
|
|
//
|
|
hr = pHNetFirewallSettings->EnumFirewalledConnections(&pEnumHNetFirewalledConnections);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't query for IHNetFirewallSettings interface (err = 0x%lx)!",
|
|
hr);
|
|
|
|
//
|
|
// Make sure we don't try to release a bogus pointer in case it got
|
|
// set.
|
|
//
|
|
pEnumHNetFirewalledConnections = NULL;
|
|
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pEnumHNetFirewalledConnections);
|
|
|
|
|
|
//
|
|
// Don't need the IHNetFirewallSettings interface anymore.
|
|
//
|
|
pHNetFirewallSettings->Release();
|
|
pHNetFirewallSettings = NULL;
|
|
|
|
|
|
//
|
|
// Keep looping until we find the item or run out of items.
|
|
//
|
|
do
|
|
{
|
|
hr = pEnumHNetFirewalledConnections->Next(1,
|
|
&pHNetFirewalledConnection,
|
|
&ulNumFound);
|
|
if (FAILED(hr))
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get next connection (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If there aren't any more items, bail.
|
|
//
|
|
if (ulNumFound == 0)
|
|
{
|
|
//
|
|
// pEnumHNetFirewalledConnections->Next might have returned
|
|
// S_FALSE.
|
|
//
|
|
hr = DPNH_OK;
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetFirewalledConnection);
|
|
|
|
|
|
//
|
|
// Get the IHNetConnection interface.
|
|
//
|
|
hr = pHNetFirewalledConnection->QueryInterface(IID_IHNetConnection,
|
|
(PVOID*) (&pHNetConnection));
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't query for IHNetConnection interface (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetConnection);
|
|
|
|
|
|
//
|
|
// We don't need the firewalled connection object anymore.
|
|
//
|
|
pHNetFirewalledConnection->Release();
|
|
pHNetFirewalledConnection = NULL;
|
|
|
|
|
|
//
|
|
// Get the internal properties for this adapter.
|
|
//
|
|
hr = pHNetConnection->GetProperties(&pHNetConnProperties);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get home net connection properties (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Be somewhat picky about whether adapters returned by
|
|
// IEnumHNetFirewalledConnections actually be firewalled.
|
|
//
|
|
DNASSERTX(pHNetConnProperties->fFirewalled, 2);
|
|
|
|
|
|
fLanConnection = pHNetConnProperties->fLanConnection;
|
|
|
|
|
|
//
|
|
// Free the properties buffer.
|
|
//
|
|
CoTaskMemFree(pHNetConnProperties);
|
|
//pHNetConnProperties = NULL;
|
|
|
|
|
|
//
|
|
// Now if it's a LAN connection, see if the GUID matches the one
|
|
// returned by IPHLPAPI.
|
|
// If it's a RAS connection, see if this phonebook entry is dialed and
|
|
// has the right IP address.
|
|
//
|
|
if (fLanConnection)
|
|
{
|
|
//
|
|
// LAN case. If we haven't already retrieved the device's GUID, do
|
|
// so now.
|
|
//
|
|
if (! fHaveDeviceGUID)
|
|
{
|
|
hr = this->GetIPAddressGuidString(tszDeviceIPAddress, tszGuidDevice);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get device 0x%p's GUID (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
fHaveDeviceGUID = TRUE;
|
|
}
|
|
|
|
|
|
//
|
|
// Get the HNetConnection object's GUID.
|
|
//
|
|
hr = pHNetConnection->GetGuid(&pguidHNetConnection);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get HNetConnection 0x%p's GUID (err = 0x%lx)!",
|
|
pHNetConnection, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Convert the GUID into a string.
|
|
//
|
|
wsprintf(tszGuidHNetConnection,
|
|
_T("{%-08.8X-%-04.4X-%-04.4X-%02.2X%02.2X-%02.2X%02.2X%02.2X%02.2X%02.2X%02.2X}"),
|
|
pguidHNetConnection->Data1,
|
|
pguidHNetConnection->Data2,
|
|
pguidHNetConnection->Data3,
|
|
pguidHNetConnection->Data4[0],
|
|
pguidHNetConnection->Data4[1],
|
|
pguidHNetConnection->Data4[2],
|
|
pguidHNetConnection->Data4[3],
|
|
pguidHNetConnection->Data4[4],
|
|
pguidHNetConnection->Data4[5],
|
|
pguidHNetConnection->Data4[6],
|
|
pguidHNetConnection->Data4[7]);
|
|
|
|
|
|
CoTaskMemFree(pguidHNetConnection);
|
|
pguidHNetConnection = NULL;
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Attempt to get the HNetConnection object's name for debugging
|
|
// purposes.
|
|
//
|
|
hr = pHNetConnection->GetName(&pwszName);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get HNetConnection 0x%p name (err = 0x%lx)!",
|
|
pHNetConnection, hr);
|
|
goto Failure;
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// See if we found the object we need.
|
|
//
|
|
if (_tcsicmp(tszGuidHNetConnection, tszGuidDevice) == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Matched IHNetConnection object 0x%p \"%ls\" to device 0x%p (LAN GUID %s).",
|
|
pHNetConnection, pwszName, pDevice, tszGuidHNetConnection);
|
|
|
|
//
|
|
// Transfer reference to caller.
|
|
//
|
|
(*ppHNetConnection) = pHNetConnection;
|
|
pHNetConnection = NULL;
|
|
|
|
#ifdef DBG
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
#endif // DBG
|
|
|
|
//
|
|
// We're done here.
|
|
//
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Non-matching IHNetConnection 0x%p \"%ls\"",
|
|
pHNetConnection, pwszName);
|
|
DPFX(DPFPREP, 7, "\t(LAN GUID %s <> %s).",
|
|
tszGuidHNetConnection, tszGuidDevice);
|
|
|
|
#ifdef DBG
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
#endif // DBG
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// RAS case.
|
|
//
|
|
DNASSERT(this->m_hRasApi32DLL != NULL);
|
|
|
|
|
|
//
|
|
// Get the HNetConnection object's phonebook path.
|
|
//
|
|
hr = pHNetConnection->GetRasPhonebookPath(&pwszPhonebookPath);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get HNetConnection's RAS phonebook path (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Get the HNetConnection object's name.
|
|
//
|
|
hr = pHNetConnection->GetName(&pwszName);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get HNetConnection's name (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Look for an active RAS connection from that phonebook with that
|
|
// name.
|
|
//
|
|
dwError = this->m_pfnRasGetEntryHrasconnW(pwszPhonebookPath, pwszName, &hrasconn);
|
|
if (dwError != 0)
|
|
{
|
|
//
|
|
// It's probably ERROR_NO_CONNECTION (668).
|
|
//
|
|
DPFX(DPFPREP, 1, "Couldn't get entry's active RAS connection (err = %u), assuming not dialed",
|
|
dwError);
|
|
DPFX(DPFPREP, 1, "\tname \"%ls\", phonebook \"%ls\".",
|
|
pwszName, pwszPhonebookPath);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Get the IP address.
|
|
//
|
|
|
|
ZeroMemory(&raspppip, sizeof(raspppip));
|
|
raspppip.dwSize = sizeof(raspppip);
|
|
dwSize = sizeof(raspppip);
|
|
|
|
dwError = this->m_pfnRasGetProjectionInfo(hrasconn, RASP_PppIp, &raspppip, &dwSize);
|
|
if (dwError != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get RAS connection's IP information (err = %u)!",
|
|
dwError);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// See if we found the object we need.
|
|
//
|
|
if (_tcsicmp(raspppip.szIpAddress, tszDeviceIPAddress) == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Matched IHNetConnection object 0x%p to device 0x%p (RAS IP %s)",
|
|
pHNetConnection, pDevice, raspppip.szIpAddress);
|
|
DPFX(DPFPREP, 7, "\tname \"%ls\", phonebook \"%ls\".",
|
|
pwszName, pwszPhonebookPath);
|
|
|
|
//
|
|
// Transfer reference to caller.
|
|
//
|
|
(*ppHNetConnection) = pHNetConnection;
|
|
pHNetConnection = NULL;
|
|
|
|
//
|
|
// We're done here.
|
|
//
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Non-matching IHNetConnection 0x%p (RAS IP %s != %s)",
|
|
pHNetConnection, raspppip.szIpAddress, tszDeviceIPAddress);
|
|
DPFX(DPFPREP, 7, "\tname \"%ls\", phonebook \"%ls\").",
|
|
pwszName, pwszPhonebookPath);
|
|
}
|
|
|
|
|
|
CoTaskMemFree(pwszPhonebookPath);
|
|
pwszPhonebookPath = NULL;
|
|
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, we pHNetConnection is not the one we're looking for.
|
|
//
|
|
pHNetConnection->Release();
|
|
pHNetConnection = NULL;
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// If we're here, then we didn't find a matching firewall connection.
|
|
//
|
|
DPFX(DPFPREP, 3, "Didn't find device 0x%p in list of firewalled connections.",
|
|
pDevice);
|
|
hr = DPNHERR_GENERIC;
|
|
|
|
|
|
Exit:
|
|
|
|
if (pEnumHNetFirewalledConnections != NULL)
|
|
{
|
|
pEnumHNetFirewalledConnections->Release();
|
|
pEnumHNetFirewalledConnections = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 6, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pwszName != NULL)
|
|
{
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
}
|
|
|
|
if (pwszPhonebookPath == NULL)
|
|
{
|
|
CoTaskMemFree(pwszPhonebookPath);
|
|
pwszPhonebookPath = NULL;
|
|
}
|
|
|
|
if (pHNetConnection != NULL)
|
|
{
|
|
pHNetConnection->Release();
|
|
pHNetConnection = NULL;
|
|
}
|
|
|
|
if (pHNetFirewalledConnection != NULL)
|
|
{
|
|
pHNetFirewalledConnection->Release();
|
|
pHNetFirewalledConnection = NULL;
|
|
}
|
|
|
|
if (pHNetFirewallSettings != NULL)
|
|
{
|
|
pHNetFirewallSettings->Release();
|
|
pHNetFirewallSettings = NULL;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::GetIHNetConnectionForDeviceIfFirewalled
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetIPAddressGuidString"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetIPAddressGuidString
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Retrieves the IPHLPAPI assigned GUID (in string format) for
|
|
// the given IP address string. ptszGuidString must be able to
|
|
// hold GUID_STRING_LENGTH + 1 characters.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// TCHAR * tszDeviceIPAddress - IP address string to lookup.
|
|
// TCHAR * ptszGuidString - Place to store device's GUID string.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Interface retrieved successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::GetIPAddressGuidString(const TCHAR * const tszDeviceIPAddress,
|
|
TCHAR * const ptszGuidString)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
DWORD dwError;
|
|
PIP_ADAPTER_INFO pAdaptersBuffer = NULL;
|
|
ULONG ulSize;
|
|
PIP_ADAPTER_INFO pAdapterInfo;
|
|
PIP_ADDR_STRING pIPAddrString;
|
|
char * pszAdapterGuid = NULL;
|
|
#ifdef UNICODE
|
|
char szDeviceIPAddress[16]; // "nnn.nnn.nnn.nnn" + NULL termination
|
|
#endif // UNICODE
|
|
#ifdef DBG
|
|
char szIPList[256];
|
|
char * pszCurrentIP;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 6, "(0x%p) Parameters: (\"%s\", 0x%p)",
|
|
this, tszDeviceIPAddress, ptszGuidString);
|
|
|
|
|
|
DNASSERT(this->m_hIpHlpApiDLL != NULL);
|
|
|
|
|
|
//
|
|
// Keep trying to get the list of adapters until we get ERROR_SUCCESS or a
|
|
// legitimate error (other than ERROR_BUFFER_OVERFLOW or
|
|
// ERROR_INSUFFICIENT_BUFFER).
|
|
//
|
|
ulSize = 0;
|
|
do
|
|
{
|
|
dwError = this->m_pfnGetAdaptersInfo(pAdaptersBuffer, &ulSize);
|
|
if (dwError == ERROR_SUCCESS)
|
|
{
|
|
//
|
|
// We succeeded, we should be set. But make sure there are
|
|
// adapters for us to use.
|
|
//
|
|
if (ulSize < sizeof(IP_ADAPTER_INFO))
|
|
{
|
|
DPFX(DPFPREP, 0, "Getting adapters info succeeded but didn't return any valid adapters (%u < %u)!",
|
|
ulSize, sizeof(IP_ADAPTER_INFO));
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
if ((dwError != ERROR_BUFFER_OVERFLOW) &&
|
|
(dwError != ERROR_INSUFFICIENT_BUFFER))
|
|
{
|
|
DPFX(DPFPREP, 0, "Unable to get adapters info (error = 0x%lx)!",
|
|
dwError);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We need more adapter space. Make sure there are adapters for us to
|
|
// use.
|
|
//
|
|
if (ulSize < sizeof(IP_ADAPTER_INFO))
|
|
{
|
|
DPFX(DPFPREP, 0, "Getting adapters info didn't return any valid adapters (%u < %u)!",
|
|
ulSize, sizeof(IP_ADAPTER_INFO));
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// If we previously had a buffer, free it.
|
|
//
|
|
if (pAdaptersBuffer != NULL)
|
|
{
|
|
DNFree(pAdaptersBuffer);
|
|
}
|
|
|
|
//
|
|
// Allocate the buffer.
|
|
//
|
|
pAdaptersBuffer = (PIP_ADAPTER_INFO) DNMalloc(ulSize);
|
|
if (pAdaptersBuffer == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Unable to allocate memory for adapters info!");
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi(szDeviceIPAddress,
|
|
tszDeviceIPAddress,
|
|
16);
|
|
szDeviceIPAddress[15] = 0; // ensure it's NULL terminated
|
|
#endif // UNICODE
|
|
|
|
|
|
//
|
|
// Now find the device in the adapter list returned. Loop through all
|
|
// adapters.
|
|
//
|
|
pAdapterInfo = pAdaptersBuffer;
|
|
while (pAdapterInfo != NULL)
|
|
{
|
|
#ifdef DBG
|
|
//
|
|
// Initialize IP address list string.
|
|
//
|
|
szIPList[0] = '\0';
|
|
pszCurrentIP = szIPList;
|
|
#endif // DBG
|
|
|
|
//
|
|
// Loop through all addresses for this adapter looking for the one for
|
|
// the device we have bound.
|
|
//
|
|
pIPAddrString = &pAdapterInfo->IpAddressList;
|
|
while (pIPAddrString != NULL)
|
|
{
|
|
#ifdef DBG
|
|
int iStrLen;
|
|
|
|
|
|
//
|
|
// Copy the IP address string (if there's enough room), then tack
|
|
// on a space and NULL terminator.
|
|
//
|
|
iStrLen = strlen(pIPAddrString->IpAddress.String);
|
|
if ((pszCurrentIP + iStrLen + 2) < (szIPList + sizeof(szIPList)))
|
|
{
|
|
memcpy(pszCurrentIP, pIPAddrString->IpAddress.String, iStrLen);
|
|
pszCurrentIP += iStrLen;
|
|
(*pszCurrentIP) = ' ';
|
|
pszCurrentIP++;
|
|
(*pszCurrentIP) = '\0';
|
|
pszCurrentIP++;
|
|
}
|
|
#endif // DBG
|
|
|
|
#ifdef UNICODE
|
|
if (strcmp(pIPAddrString->IpAddress.String, szDeviceIPAddress) == 0)
|
|
#else // ! UNICODE
|
|
if (strcmp(pIPAddrString->IpAddress.String, tszDeviceIPAddress) == 0)
|
|
#endif // ! UNICODE
|
|
{
|
|
DPFX(DPFPREP, 8, "Found %s under adapter index %u (\"%hs\").",
|
|
tszDeviceIPAddress, pAdapterInfo->Index, pAdapterInfo->Description);
|
|
|
|
DNASSERT(pszAdapterGuid == NULL);
|
|
pszAdapterGuid = pAdapterInfo->AdapterName;
|
|
|
|
|
|
//
|
|
// Drop out of the loop in retail, keep going in debug.
|
|
//
|
|
#ifndef DBG
|
|
break;
|
|
#endif // ! DBG
|
|
}
|
|
|
|
pIPAddrString = pIPAddrString->Next;
|
|
}
|
|
|
|
|
|
//
|
|
// Drop out of the loop in retail, print this entry and keep going in
|
|
// debug.
|
|
//
|
|
#ifdef DBG
|
|
DPFX(DPFPREP, 7, "Adapter index %u IPs = %hs, %hs, \"%hs\".",
|
|
pAdapterInfo->Index,
|
|
szIPList,
|
|
pAdapterInfo->AdapterName,
|
|
pAdapterInfo->Description);
|
|
#else // ! DBG
|
|
if (pszAdapterGuid != NULL)
|
|
{
|
|
break;
|
|
}
|
|
#endif // ! DBG
|
|
|
|
pAdapterInfo = pAdapterInfo->Next;
|
|
}
|
|
|
|
|
|
//
|
|
// pszAdapterGuid will be NULL if we never found the device.
|
|
//
|
|
if (pszAdapterGuid == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Did not find adapter with matching address for address %s!",
|
|
tszDeviceIPAddress);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Copy the adapter GUID string to the buffer supplied.
|
|
//
|
|
#ifdef UNICODE
|
|
STR_jkAnsiToWide(ptszGuidString,
|
|
pszAdapterGuid,
|
|
(GUID_STRING_LENGTH + 1));
|
|
#else // ! UNICODE
|
|
strncpy(ptszGuidString, pszAdapterGuid, (GUID_STRING_LENGTH + 1));
|
|
#endif // ! UNICODE
|
|
ptszGuidString[GUID_STRING_LENGTH] = 0; // ensure it's NULL terminated
|
|
|
|
|
|
Exit:
|
|
|
|
if (pAdaptersBuffer != NULL)
|
|
{
|
|
DNFree(pAdaptersBuffer);
|
|
pAdaptersBuffer = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 6, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::GetIPAddressGuidString
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::OpenDevicesUPnPDiscoveryPort"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::OpenDevicesUPnPDiscoveryPort
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Maps the UPnP discovery socket's port if a firewall is
|
|
// found.
|
|
//
|
|
// COM is assumed to have been initialized.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device whose port should
|
|
// be opened.
|
|
// IHNetCfgMgr * pHNetCfgMgr - Pointer to IHNetCfgMgr interface to
|
|
// use.
|
|
// IHNetConnection * pHNetConnection - Pointer to IHNetConnection interface
|
|
// for the given device.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Mapping completed successfully. There may or may not
|
|
// be a firewall.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::OpenDevicesUPnPDiscoveryPort(CDevice * const pDevice,
|
|
IHNetCfgMgr * const pHNetCfgMgr,
|
|
IHNetConnection * const pHNetConnection)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CRegisteredPort * pRegisteredPort = NULL;
|
|
SOCKADDR_IN saddrinTemp;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p)",
|
|
this, pDevice, pHNetCfgMgr, pHNetConnection);
|
|
|
|
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
|
|
|
|
//
|
|
// Create a fake UDP registered port to map.
|
|
//
|
|
pRegisteredPort = new CRegisteredPort(0, 0);
|
|
if (pRegisteredPort == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
pRegisteredPort->MakeDeviceOwner(pDevice);
|
|
|
|
|
|
ZeroMemory(&saddrinTemp, sizeof(saddrinTemp));
|
|
saddrinTemp.sin_family = AF_INET;
|
|
saddrinTemp.sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
saddrinTemp.sin_port = pDevice->GetUPnPDiscoverySocketPort();
|
|
DNASSERT(saddrinTemp.sin_port != 0);
|
|
|
|
hr = pRegisteredPort->SetPrivateAddresses(&saddrinTemp, 1);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't set registered port 0x%p's private addresses (err = 0x%lx)!",
|
|
pRegisteredPort, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Map the port.
|
|
//
|
|
hr = this->MapPortOnLocalHNetFirewall(pRegisteredPort,
|
|
pHNetCfgMgr,
|
|
pHNetConnection,
|
|
FALSE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't map UPnP discovery socket port (temp regport = 0x%p) on device 0x%p's initial firewall (err = 0x%lx)!",
|
|
pRegisteredPort, pDevice, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If the port was unavailable, we have to give up on supporting the
|
|
// scenario (firewall enabled behind a NAT). Otherwise, remember the fact
|
|
// that we mapped the port, and then delete the registered port object. We
|
|
// will unmap it when we shut down the device.
|
|
//
|
|
if (! pRegisteredPort->IsHNetFirewallPortUnavailable())
|
|
{
|
|
DPFX(DPFPREP, 3, "Mapped UPnP discovery socket for device 0x%p on firewall (removing temp regport 0x%p).",
|
|
pDevice, pRegisteredPort);
|
|
|
|
|
|
pDevice->NoteUPnPDiscoverySocketMappedOnHNetFirewall();
|
|
|
|
//
|
|
// Clear this to prevent an assert.
|
|
//
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Could not map UPnP discovery socket on firewall for device 0x%p, unable to support an upstream NAT.",
|
|
pDevice);
|
|
}
|
|
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
|
|
//
|
|
// Delete the item.
|
|
//
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pRegisteredPort != NULL)
|
|
{
|
|
//
|
|
// Clear any settings that might cause an assert.
|
|
//
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
|
|
//
|
|
// Delete the item.
|
|
//
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::OpenDevicesUPnPDiscoveryPort
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CloseDevicesUPnPDiscoveryPort"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CloseDevicesUPnPDiscoveryPort
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Unmaps the UPnP discovery socket's port from the firewall.
|
|
// pHNetCfgMgr can be NULL if it has not previously been obtained.
|
|
//
|
|
// COM is assumed to have been initialized if pHNetCfgMgr is
|
|
// not NULL.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device whose port should be
|
|
// close.
|
|
// IHNetCfgMgr * pHNetCfgMgr - Pointer to IHNetCfgMgr interface to use, or
|
|
// NULL if not previously obtained.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Unmapping completed successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CloseDevicesUPnPDiscoveryPort(CDevice * const pDevice,
|
|
IHNetCfgMgr * const pHNetCfgMgr)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CRegisteredPort * pRegisteredPort = NULL;
|
|
SOCKADDR_IN saddrinTemp;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p)",
|
|
this, pDevice, pHNetCfgMgr);
|
|
|
|
|
|
//
|
|
// Create a fake UDP registered port to unmap.
|
|
//
|
|
pRegisteredPort = new CRegisteredPort(0, 0);
|
|
if (pRegisteredPort == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
pRegisteredPort->MakeDeviceOwner(pDevice);
|
|
pRegisteredPort->NoteMappedOnHNetFirewall();
|
|
|
|
|
|
ZeroMemory(&saddrinTemp, sizeof(saddrinTemp));
|
|
saddrinTemp.sin_family = AF_INET;
|
|
saddrinTemp.sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
saddrinTemp.sin_port = pDevice->GetUPnPDiscoverySocketPort();
|
|
DNASSERT(saddrinTemp.sin_port != 0);
|
|
|
|
hr = pRegisteredPort->SetPrivateAddresses(&saddrinTemp, 1);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't set registered port 0x%p's private addresses (err = 0x%lx)!",
|
|
pRegisteredPort, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Unmap the port using the internal method if possible.
|
|
//
|
|
if (pHNetCfgMgr != NULL)
|
|
{
|
|
hr = this->UnmapPortOnLocalHNetFirewallInternal(pRegisteredPort, TRUE, pHNetCfgMgr);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Don't alert the user since he/she doesn't know about this port.
|
|
//
|
|
hr = this->UnmapPortOnLocalHNetFirewall(pRegisteredPort, TRUE, FALSE);
|
|
}
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't unmap UPnP discovery socket port (temp regport = 0x%p) on device 0x%p's firewall (err = 0x%lx)!",
|
|
pRegisteredPort, pDevice, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Destroy the registered port object (note that the port mapping still
|
|
// exists). We will unmap when we shut down the device.
|
|
//
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
|
|
//
|
|
// Delete the item.
|
|
//
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
|
|
|
|
pDevice->NoteNotUPnPDiscoverySocketMappedOnHNetFirewall();
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pRegisteredPort != NULL)
|
|
{
|
|
//
|
|
// Clear any settings that might cause an assert.
|
|
//
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
|
|
//
|
|
// Delete the item.
|
|
//
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CloseDevicesUPnPDiscoveryPort
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::MapUnmappedPortsOnLocalHNetFirewall"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::MapUnmappedPortsOnLocalHNetFirewall
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Maps any ports associated with the given device that have
|
|
// not been mapped with the local firewall yet.
|
|
//
|
|
// COM is assumed to have been initialized.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Device with (new) firewall.
|
|
// IHNetCfgMgr * pHNetCfgMgr - Pointer to IHNetCfgMgr
|
|
// interface to use.
|
|
// IHNetConnection * pHNetConnection - Pointer to IHNetConnection
|
|
// interface for the given
|
|
// device.
|
|
// CRegisteredPort * pDontAlertRegisteredPort - Pointer to registered port
|
|
// that should not trigger an
|
|
// address update alert, or
|
|
// NULL.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Mapping completed successfully. Note that the ports
|
|
// may be marked as unavailable.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::MapUnmappedPortsOnLocalHNetFirewall(CDevice * const pDevice,
|
|
IHNetCfgMgr * const pHNetCfgMgr,
|
|
IHNetConnection * const pHNetConnection,
|
|
CRegisteredPort * const pDontAlertRegisteredPort)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, 0x%p)",
|
|
this, pDevice, pHNetCfgMgr, pHNetConnection, pDontAlertRegisteredPort);
|
|
|
|
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
|
|
|
|
//
|
|
// Loop through all the registered ports associated with the device.
|
|
//
|
|
pBilink = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilink != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilink);
|
|
pBilink = pBilink->GetNext();
|
|
|
|
|
|
//
|
|
// If this port has already been mapped, we can skip it.
|
|
//
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
DPFX(DPFPREP, 7, "Registered port 0x%p has already been mapped on the firewall for device 0x%p.",
|
|
pRegisteredPort, pDevice);
|
|
continue;
|
|
}
|
|
|
|
|
|
//
|
|
// If this port has already been determined to be unavailable, we can
|
|
// skip it.
|
|
//
|
|
if (pRegisteredPort->IsHNetFirewallPortUnavailable())
|
|
{
|
|
DPFX(DPFPREP, 7, "Registered port 0x%p has already been determined to be unavailable on the firewall for device 0x%p.",
|
|
pRegisteredPort, pDevice);
|
|
continue;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 3, "Mapping registered port 0x%p on firewall for device 0x%p.",
|
|
pRegisteredPort, pDevice);
|
|
|
|
|
|
hr = this->MapPortOnLocalHNetFirewall(pRegisteredPort,
|
|
pHNetCfgMgr,
|
|
pHNetConnection,
|
|
((pRegisteredPort == pDontAlertRegisteredPort) ? FALSE : TRUE));
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 7, "Failed mapping registered port 0x%p on firewall for device 0x%p.",
|
|
pRegisteredPort, pDevice);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Go to next registered port.
|
|
//
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::MapUnmappedPortsOnLocalHNetFirewall
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::MapPortOnLocalHNetFirewall"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::MapPortOnLocalHNetFirewall
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Maps the given port with the corresponding firewall.
|
|
//
|
|
// COM is assumed to have been initialized.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CRegisteredPort * pRegisteredPort - Port to map.
|
|
// IHNetCfgMgr * pHNetCfgMgr - Pointer to IHNetCfgMgr interface to
|
|
// use.
|
|
// IHNetConnection * pHNetConnection - Pointer to IHNetConnection interface
|
|
// for the given device.
|
|
// BOOL fNoteAddressChange - Whether to alert the user of the
|
|
// address change or not.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Mapping completed successfully. Note that the ports
|
|
// may be marked as unavailable.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::MapPortOnLocalHNetFirewall(CRegisteredPort * const pRegisteredPort,
|
|
IHNetCfgMgr * const pHNetCfgMgr,
|
|
IHNetConnection * const pHNetConnection,
|
|
const BOOL fNoteAddressChange)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CDevice * pDevice;
|
|
SOCKADDR_IN * pasaddrinPrivate;
|
|
UCHAR ucProtocolToMatch;
|
|
ULONG ulNumFound;
|
|
BOOLEAN fTemp;
|
|
IHNetProtocolSettings * pHNetProtocolSettings = NULL;
|
|
IEnumHNetPortMappingProtocols * pEnumHNetPortMappingProtocols = NULL;
|
|
IHNetPortMappingProtocol ** papHNetPortMappingProtocol = NULL;
|
|
DWORD dwTemp;
|
|
BOOL fCreatedCurrentPortMappingProtocol = FALSE;
|
|
IHNetPortMappingBinding * pHNetPortMappingBinding = NULL;
|
|
DWORD dwTargetAddressV4;
|
|
WORD wPort;
|
|
UCHAR ucProtocol;
|
|
DWORD dwDescriptionLength;
|
|
TCHAR tszPort[32];
|
|
CRegistry RegObject;
|
|
WCHAR wszDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
DPNHACTIVEFIREWALLMAPPING dpnhafm;
|
|
BOOLEAN fBuiltIn = FALSE;
|
|
WCHAR * pwszPortMappingProtocolName = NULL;
|
|
#ifdef UNICODE
|
|
TCHAR * ptszDescription = wszDescription;
|
|
#else // ! UNICODE
|
|
char szDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
TCHAR * ptszDescription = szDescription;
|
|
#endif // ! UNICODE
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, %i)",
|
|
this, pRegisteredPort, pHNetCfgMgr, pHNetConnection, fNoteAddressChange);
|
|
|
|
|
|
DNASSERT(! pRegisteredPort->IsMappedOnHNetFirewall());
|
|
DNASSERT(! pRegisteredPort->IsHNetFirewallPortUnavailable());
|
|
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
|
|
//
|
|
// Get a protocol settings interface.
|
|
//
|
|
hr = pHNetCfgMgr->QueryInterface(IID_IHNetProtocolSettings,
|
|
(PVOID*) (&pHNetProtocolSettings));
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get IHNetProtocolSettings interface from IHNetCfgMgr 0x%p (err = 0x%lx)!",
|
|
pHNetCfgMgr, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetProtocolSettings);
|
|
|
|
|
|
//
|
|
// Get ready to enumerate the existing mappings.
|
|
//
|
|
|
|
hr = pHNetProtocolSettings->EnumPortMappingProtocols(&pEnumHNetPortMappingProtocols);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't enumerate port mapping protocols (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pEnumHNetPortMappingProtocols);
|
|
|
|
|
|
//
|
|
// Allocate an array to keep track of previous ports in case of failure.
|
|
//
|
|
papHNetPortMappingProtocol = (IHNetPortMappingProtocol**) DNMalloc(DPNH_MAX_SIMULTANEOUS_PORTS * sizeof(IHNetPortMappingProtocol*));
|
|
if (papHNetPortMappingProtocol == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
|
|
pasaddrinPrivate = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
if (pRegisteredPort->IsTCP())
|
|
{
|
|
ucProtocolToMatch = PORTMAPPINGPROTOCOL_TCP;
|
|
}
|
|
else
|
|
{
|
|
ucProtocolToMatch = PORTMAPPINGPROTOCOL_UDP;
|
|
}
|
|
|
|
|
|
//
|
|
// Map each individual address associated with the port.
|
|
//
|
|
for(dwTemp = 0; dwTemp < pRegisteredPort->GetNumAddresses(); dwTemp++)
|
|
{
|
|
DNASSERT(pasaddrinPrivate[dwTemp].sin_port != 0);
|
|
|
|
|
|
//
|
|
// Loop until we find a duplicate item or run out of items.
|
|
//
|
|
do
|
|
{
|
|
hr = pEnumHNetPortMappingProtocols->Next(1,
|
|
&papHNetPortMappingProtocol[dwTemp],
|
|
&ulNumFound);
|
|
if (FAILED(hr))
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get next port mapping protocol (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If there aren't any more items, bail.
|
|
//
|
|
if (ulNumFound == 0)
|
|
{
|
|
//
|
|
// pEnumHNetPortMappingProtocols->Next might have returned
|
|
// S_FALSE.
|
|
//
|
|
hr = DPNH_OK;
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(papHNetPortMappingProtocol[dwTemp]);
|
|
|
|
|
|
//
|
|
// Get the port.
|
|
//
|
|
hr = papHNetPortMappingProtocol[dwTemp]->GetPort(&wPort);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol 0x%p's port (err = 0x%lx)!",
|
|
papHNetPortMappingProtocol[dwTemp], hr);
|
|
|
|
DNASSERTX((! "Got unexpected error executing IHNetPortMappingProtocol::GetPort!"), 2);
|
|
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Get the protocol.
|
|
//
|
|
hr = papHNetPortMappingProtocol[dwTemp]->GetIPProtocol(&ucProtocol);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol 0x%p's IP protocol (err = 0x%lx)!",
|
|
papHNetPortMappingProtocol[dwTemp], hr);
|
|
|
|
DNASSERTX((! "Got unexpected error executing IHNetPortMappingProtocol::GetIPProtocol!"), 2);
|
|
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
hr = papHNetPortMappingProtocol[dwTemp]->GetName(&pwszPortMappingProtocolName);
|
|
if (hr == S_OK)
|
|
{
|
|
DPFX(DPFPREP, 7, "Found %s port mapping protocol 0x%p (\"%ls\") for port %u.",
|
|
(((wPort == pasaddrinPrivate[dwTemp].sin_port) && (ucProtocol == ucProtocolToMatch)) ? _T("matching") : _T("non-matching")),
|
|
papHNetPortMappingProtocol[dwTemp],
|
|
pwszPortMappingProtocolName,
|
|
NTOHS(wPort));
|
|
|
|
CoTaskMemFree(pwszPortMappingProtocolName);
|
|
pwszPortMappingProtocolName = NULL;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Found %s port mapping protocol 0x%p for port %u, (unable to retrieve name, err = %0lx).",
|
|
(((wPort == pasaddrinPrivate[dwTemp].sin_port) && (ucProtocol == ucProtocolToMatch)) ? _T("matching") : _T("non-matching")),
|
|
NTOHS(wPort),
|
|
papHNetPortMappingProtocol[dwTemp],
|
|
hr);
|
|
}
|
|
#endif // DBG
|
|
|
|
//
|
|
// See if we found the object we need.
|
|
//
|
|
if ((wPort == pasaddrinPrivate[dwTemp].sin_port) &&
|
|
(ucProtocol == ucProtocolToMatch))
|
|
{
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Get ready for the next object.
|
|
//
|
|
papHNetPortMappingProtocol[dwTemp]->Release();
|
|
papHNetPortMappingProtocol[dwTemp] = NULL;
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// Generate a description for this mapping. The format is:
|
|
//
|
|
// [executable_name] nnnnn {"TCP" | "UDP"}
|
|
//
|
|
// unless it's shared, in which case it's
|
|
//
|
|
// [executable_name] (255.255.255.255:nnnnn) nnnnn {"TCP" | "UDP"}
|
|
//
|
|
// That way nothing needs to be localized.
|
|
//
|
|
|
|
wsprintf(tszPort, _T("%u"),
|
|
NTOHS(pasaddrinPrivate[dwTemp].sin_port));
|
|
|
|
dwDescriptionLength = GetModuleFileName(NULL,
|
|
ptszDescription,
|
|
(MAX_UPNP_MAPPING_DESCRIPTION_SIZE - 1));
|
|
if (dwDescriptionLength != 0)
|
|
{
|
|
//
|
|
// Be paranoid and make sure the description string is valid.
|
|
//
|
|
ptszDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE - 1] = 0;
|
|
|
|
//
|
|
// Get just the executable name from the path.
|
|
//
|
|
#ifdef WINCE
|
|
GetExeName(ptszDescription);
|
|
#else // ! WINCE
|
|
#ifdef UNICODE
|
|
_wsplitpath(ptszDescription, NULL, NULL, ptszDescription, NULL);
|
|
#else // ! UNICODE
|
|
_splitpath(ptszDescription, NULL, NULL, ptszDescription, NULL);
|
|
#endif // ! UNICODE
|
|
#endif // ! WINCE
|
|
|
|
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
dwDescriptionLength = _tcslen(ptszDescription) // executable name
|
|
+ strlen(" (255.255.255.255:") // " (255.255.255.255:"
|
|
+ _tcslen(tszPort) // port
|
|
+ strlen(") ") // ") "
|
|
+ _tcslen(tszPort) // port
|
|
+ 4; // " TCP" | " UDP"
|
|
}
|
|
else
|
|
{
|
|
dwDescriptionLength = _tcslen(ptszDescription) // executable name
|
|
+ 1 // " "
|
|
+_tcslen(tszPort) // port
|
|
+ 4; // " TCP" | " UDP"
|
|
}
|
|
|
|
//
|
|
// Make sure the long string will fit. If not, use the
|
|
// abbreviated version.
|
|
//
|
|
if (dwDescriptionLength > MAX_UPNP_MAPPING_DESCRIPTION_SIZE)
|
|
{
|
|
dwDescriptionLength = 0;
|
|
}
|
|
}
|
|
|
|
if (dwDescriptionLength == 0)
|
|
{
|
|
//
|
|
// Use the abbreviated version we know will fit.
|
|
//
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
wsprintf(ptszDescription,
|
|
_T("(255.255.255.255:%s) %s %s"),
|
|
tszPort,
|
|
tszPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
else
|
|
{
|
|
wsprintf(ptszDescription,
|
|
_T("%s %s"),
|
|
tszPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// There's enough room, tack on the rest of the description.
|
|
//
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
wsprintf((ptszDescription + _tcslen(ptszDescription)),
|
|
_T(" (255.255.255.255:%s) %s %s"),
|
|
tszPort,
|
|
tszPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
else
|
|
{
|
|
wsprintf((ptszDescription + _tcslen(ptszDescription)),
|
|
_T(" %s %s"),
|
|
tszPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
}
|
|
|
|
#ifndef UNICODE
|
|
dwDescriptionLength = MAX_UPNP_MAPPING_DESCRIPTION_SIZE;
|
|
hr = STR_AnsiToWide(szDescription, -1, wszDescription, &dwDescriptionLength);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't convert NAT mapping description to Unicode (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
#endif // ! UNICODE
|
|
|
|
|
|
|
|
//
|
|
// If there wasn't a port mapping already, create it. Otherwise make
|
|
// sure it's not already in use by some other client.
|
|
//
|
|
if (papHNetPortMappingProtocol[dwTemp] == NULL)
|
|
{
|
|
DPFX(DPFPREP, 7, "Creating new port mapping protocol \"%ls\".",
|
|
wszDescription);
|
|
|
|
|
|
//
|
|
// Create a new port mapping protocol.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ pHNetProtocolSettings(0x%p)->CreatePortMappingProtocol(\"%ls\", %u, 0x%lx, 0x%p)", pHNetProtocolSettings, wszDescription, ucProtocolToMatch, pasaddrinPrivate[dwTemp].sin_port, &papHNetPortMappingProtocol[dwTemp]);
|
|
hr = pHNetProtocolSettings->CreatePortMappingProtocol(wszDescription,
|
|
ucProtocolToMatch,
|
|
pasaddrinPrivate[dwTemp].sin_port,
|
|
&papHNetPortMappingProtocol[dwTemp]);
|
|
DPFX(DPFPREP, 9, "-- pHNetProtocolSettings(0x%p)->CreatePortMappingProtocol = 0x%lx", pHNetProtocolSettings, hr);
|
|
if (hr != S_OK)
|
|
{
|
|
//
|
|
// This might be WBEM_E_ACCESSDENIED (0x80041003), which means
|
|
// the current user doesn't have permissions to open holes in
|
|
// the firewall.
|
|
//
|
|
|
|
DPFX(DPFPREP, 0, "Couldn't create new port mapping protocol (err = 0x%lx)!",
|
|
hr);
|
|
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(papHNetPortMappingProtocol[dwTemp]);
|
|
|
|
|
|
fCreatedCurrentPortMappingProtocol = TRUE;
|
|
|
|
|
|
|
|
//
|
|
// Retrieve its binding.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ pHNetConnection(0x%p)->GetBindingForPortMappingProtocol(0x%p, 0x%p)", pHNetConnection, papHNetPortMappingProtocol[dwTemp], &pHNetPortMappingBinding);
|
|
hr = pHNetConnection->GetBindingForPortMappingProtocol(papHNetPortMappingProtocol[dwTemp],
|
|
&pHNetPortMappingBinding);
|
|
DPFX(DPFPREP, 9, "-- pHNetConnection(0x%p)->GetBindingForPortMappingProtocol = 0x%lx", pHNetConnection, hr);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get binding for port mapping protocol 0x%p (err = 0x%lx)!",
|
|
papHNetPortMappingProtocol[dwTemp], hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetPortMappingBinding);
|
|
|
|
|
|
//
|
|
// Make sure it refers to the local device (or the broadcast
|
|
// address, if shared). Although shared ports are a strange
|
|
// concept on a firewall, Microsoft's firewall implementation
|
|
// shares mappings with the NAT, so we'd rather be safe than sorry.
|
|
// Mapping it to the broadcast address makes it behave the same if
|
|
// the firewalled adapter also happens to be shared.
|
|
//
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
DPFX(DPFPREP, 9, "++ pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress((broadcast) 0x%lx)", pHNetPortMappingBinding, INADDR_BROADCAST);
|
|
hr = pHNetPortMappingBinding->SetTargetComputerAddress(INADDR_BROADCAST);
|
|
DPFX(DPFPREP, 9, "-- pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress = 0x%lx", pHNetPortMappingBinding, hr);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 9, "++ pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress(0x%lx)", pHNetPortMappingBinding, pDevice->GetLocalAddressV4());
|
|
hr = pHNetPortMappingBinding->SetTargetComputerAddress(pDevice->GetLocalAddressV4());
|
|
DPFX(DPFPREP, 9, "-- pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress = 0x%lx", pHNetPortMappingBinding, hr);
|
|
}
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't set binding 0x%p's target computer address (err = 0x%lx)!",
|
|
pHNetPortMappingBinding, hr);
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Retrieve the existing binding.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ pHNetConnection(0x%p)->GetBindingForPortMappingProtocol(0x%p, 0x%p)", pHNetConnection, papHNetPortMappingProtocol[dwTemp], &pHNetPortMappingBinding);
|
|
hr = pHNetConnection->GetBindingForPortMappingProtocol(papHNetPortMappingProtocol[dwTemp],
|
|
&pHNetPortMappingBinding);
|
|
DPFX(DPFPREP, 9, "-- pHNetConnection(0x%p)->GetBindingForPortMappingProtocol = 0x%lx", pHNetConnection, hr);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get binding for port mapping protocol 0x%p (err = 0x%lx)!",
|
|
papHNetPortMappingProtocol[dwTemp], hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetPortMappingBinding);
|
|
|
|
|
|
//
|
|
// Find out where this mapping goes.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ pHNetPortMappingBinding(0x%p)->GetTargetComputerAddress(0x%p)", pHNetPortMappingBinding, &dwTargetAddressV4);
|
|
hr = pHNetPortMappingBinding->GetTargetComputerAddress(&dwTargetAddressV4);
|
|
DPFX(DPFPREP, 9, "-- pHNetPortMappingBinding(0x%p)->GetTargetComputerAddress = 0x%lx", pHNetPortMappingBinding, hr);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get binding 0x%p's target computer address (err = 0x%lx)!",
|
|
pHNetPortMappingBinding, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If it's not for the local device, we may have to leave it alone.
|
|
//
|
|
if ((dwTargetAddressV4 != pDevice->GetLocalAddressV4()) &&
|
|
((! pRegisteredPort->IsSharedPort()) ||
|
|
(dwTargetAddressV4 != INADDR_BROADCAST)))
|
|
{
|
|
//
|
|
// Find out if it's turned on.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ pHNetPortMappingBinding(0x%p)->GetEnabled(0x%p)", pHNetPortMappingBinding, &fTemp);
|
|
hr = pHNetPortMappingBinding->GetEnabled(&fTemp);
|
|
DPFX(DPFPREP, 9, "-- pHNetPortMappingBinding(0x%p)->GetEnabled = 0x%lx", pHNetPortMappingBinding, hr);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get binding 0x%p's target computer address (err = 0x%lx)!",
|
|
pHNetPortMappingBinding, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If it's currently active, it's better to be safe than sorry.
|
|
// Don't attempt to replace it.
|
|
//
|
|
if (fTemp)
|
|
{
|
|
DPFX(DPFPREP, 1, "Existing active binding points to different target %u.%u.%u.%u, can't reuse for device 0x%p.",
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
|
|
//
|
|
// Mark this port as unavailable.
|
|
//
|
|
pRegisteredPort->NoteHNetFirewallPortUnavailable();
|
|
|
|
|
|
//
|
|
// Cleanup this port mapping.
|
|
//
|
|
|
|
pHNetPortMappingBinding->Release();
|
|
pHNetPortMappingBinding = NULL;
|
|
|
|
papHNetPortMappingProtocol[dwTemp]->Release();
|
|
papHNetPortMappingProtocol[dwTemp] = NULL;
|
|
|
|
|
|
//
|
|
// Reset for next port.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ pEnumHNetPortMappingProtocols(0x%p)->Reset()", pEnumHNetPortMappingProtocols);
|
|
hr = pEnumHNetPortMappingProtocols->Reset();
|
|
DPFX(DPFPREP, 9, "-- pEnumHNetPortMappingProtocols(0x%p)->Reset = 0x%lx", pEnumHNetPortMappingProtocols, hr);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't reset port mapping protocol enumeration 0x%p (err = 0x%lx)!",
|
|
pEnumHNetPortMappingProtocols, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Get out of the loop.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// It's inactive.
|
|
//
|
|
DPFX(DPFPREP, 7, "Modifying inactive port mapping protocol (target was %u.%u.%u.%u) for device 0x%p (new name = \"%ls\").",
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&dwTargetAddressV4))->S_un.S_un_b.s_b4,
|
|
pDevice,
|
|
wszDescription);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// It matches the local device, or we're mapping a shared port
|
|
// and the mapping pointed to the broadcast address.
|
|
// Assume it's okay to replace.
|
|
//
|
|
DPFX(DPFPREP, 7, "Modifying existing port mapping protocol (device = 0x%p, new name = \"%ls\" unless built-in).",
|
|
pDevice,
|
|
wszDescription);
|
|
}
|
|
|
|
|
|
//
|
|
// Otherwise, it's safe to change it.
|
|
//
|
|
|
|
|
|
//
|
|
// Make sure it refers to the local device (or the broadcast
|
|
// address, if shared). Although shared ports are a strange
|
|
// concept on a firewall, Microsoft's firewall implementation
|
|
// shares mappings with the NAT, so we'd rather be safe than sorry.
|
|
// Mapping it to the broadcast address makes it behave the same if
|
|
// the firewalled adapter also happens to be shared.
|
|
//
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
DPFX(DPFPREP, 9, "++ pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress((broadcast) 0x%lx)", pHNetPortMappingBinding, INADDR_BROADCAST);
|
|
hr = pHNetPortMappingBinding->SetTargetComputerAddress(INADDR_BROADCAST);
|
|
DPFX(DPFPREP, 9, "-- pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress = 0x%lx", pHNetPortMappingBinding, hr);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 9, "++ pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress(0x%lx)", pHNetPortMappingBinding, pDevice->GetLocalAddressV4());
|
|
hr = pHNetPortMappingBinding->SetTargetComputerAddress(pDevice->GetLocalAddressV4());
|
|
DPFX(DPFPREP, 9, "-- pHNetPortMappingBinding(0x%p)->SetTargetComputerAddress = 0x%lx", pHNetPortMappingBinding, hr);
|
|
}
|
|
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't set binding 0x%p's target computer address (err = 0x%lx)!",
|
|
pHNetPortMappingBinding, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// See if this protocol is built-in.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ papHNetPortMappingProtocol[%u](0x%p)->GetBuiltIn(0x%p)", dwTemp, papHNetPortMappingProtocol[dwTemp], &fBuiltIn);
|
|
hr = papHNetPortMappingProtocol[dwTemp]->GetBuiltIn(&fBuiltIn);
|
|
DPFX(DPFPREP, 9, "-- papHNetPortMappingProtocol[%u](0x%p)->GetBuiltIn = 0x%lx", dwTemp, papHNetPortMappingProtocol[dwTemp], hr);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get protocol 0x%p's built-in status (err = 0x%lx)!",
|
|
papHNetPortMappingProtocol[dwTemp], hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If it's not built-in, we can change the name.
|
|
//
|
|
if (! fBuiltIn)
|
|
{
|
|
//
|
|
// Update the description.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ papHNetPortMappingProtocol[%u](0x%p)->SetName(\"%ls\")", dwTemp, papHNetPortMappingProtocol[dwTemp], wszDescription);
|
|
hr = papHNetPortMappingProtocol[dwTemp]->SetName(wszDescription);
|
|
DPFX(DPFPREP, 9, "-- papHNetPortMappingProtocol[%u](0x%p)->SetName = 0x%lx", dwTemp, papHNetPortMappingProtocol[dwTemp], hr);
|
|
if (hr != S_OK)
|
|
{
|
|
//
|
|
// This might be WBEM_E_ACCESSDENIED (0x80041003), which
|
|
// means the current user doesn't truly have permissions to
|
|
// open holes in the firewall (even though the
|
|
// SetTargetComputerAddress call above succeeded).
|
|
//
|
|
|
|
DPFX(DPFPREP, 0, "Couldn't rename existing port mapping protocol 0x%p (err = 0x%lx)!",
|
|
papHNetPortMappingProtocol[dwTemp], hr);
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pRegisteredPort->NoteHNetFirewallMappingBuiltIn();
|
|
|
|
|
|
DPFX(DPFPREP, 9, "++ papHNetPortMappingProtocol[%u](0x%p)->GetName(0x%p)", dwTemp, papHNetPortMappingProtocol[dwTemp], &pwszPortMappingProtocolName);
|
|
hr = papHNetPortMappingProtocol[dwTemp]->GetName(&pwszPortMappingProtocolName);
|
|
DPFX(DPFPREP, 9, "-- papHNetPortMappingProtocol[%u](0x%p)->GetName = 0x%lx", dwTemp, papHNetPortMappingProtocol[dwTemp], hr);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get built-in port mapping protocol 0x%p's name (err = 0x%lx)!",
|
|
papHNetPortMappingProtocol[dwTemp], hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 1, "Re-using built in port mapping protocol \"%ls\" (can't rename to \"%ls\").",
|
|
pwszPortMappingProtocolName, wszDescription);
|
|
}
|
|
} // end else (found port mapping protocol)
|
|
|
|
|
|
//
|
|
// Enable the binding.
|
|
//
|
|
DPFX(DPFPREP, 9, "++ pHNetPortMappingBinding(0x%p)->SetEnabled(TRUE)", pHNetPortMappingBinding);
|
|
hr = pHNetPortMappingBinding->SetEnabled(TRUE);
|
|
DPFX(DPFPREP, 9, "-- pHNetPortMappingBinding(0x%p)->SetEnabled = 0x%lx", pHNetPortMappingBinding, hr);
|
|
if (hr != S_OK)
|
|
{
|
|
//
|
|
// This might be WBEM_E_ACCESSDENIED (0x80041003), which means the
|
|
// current user doesn't truly have permissions to open holes in the
|
|
// firewall (even though the SetTargetComputerAddress call above
|
|
// succeeded).
|
|
//
|
|
|
|
DPFX(DPFPREP, 0, "Couldn't enable binding 0x%p (err = 0x%lx)!",
|
|
pHNetPortMappingBinding, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Remember this firewall mapping, in case we crash before cleaning it
|
|
// up in this session. That we can clean it up next time we launch.
|
|
// Don't do this if the port is shared, since we can't tell when it's
|
|
// no longer in use.
|
|
//
|
|
if (! pRegisteredPort->IsSharedPort())
|
|
{
|
|
if (fBuiltIn)
|
|
{
|
|
DPFX(DPFPREP, 7, "Remembering built-in firewall mapping \"%ls\" (a.k.a. \"%ls\") in case of crash.",
|
|
pwszPortMappingProtocolName, wszDescription);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Remembering regular firewall mapping \"%ls\" in case of crash.",
|
|
wszDescription);
|
|
}
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVEFIREWALLMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't open active firewall mapping key, unable to save in case of crash!");
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(this->m_dwInstanceKey != 0);
|
|
|
|
|
|
ZeroMemory(&dpnhafm, sizeof(dpnhafm));
|
|
dpnhafm.dwVersion = ACTIVE_MAPPING_VERSION;
|
|
dpnhafm.dwInstanceKey = this->m_dwInstanceKey;
|
|
dpnhafm.dwFlags = pRegisteredPort->GetFlags();
|
|
dpnhafm.dwAddressV4 = pDevice->GetLocalAddressV4();
|
|
dpnhafm.wPort = pasaddrinPrivate[dwTemp].sin_port;
|
|
|
|
|
|
//
|
|
// If it's built-in, use its existing name since it couldn't be
|
|
// renamed. This allows the unmapping code to find it in the
|
|
// registry again. See UnmapPortOnLocalHNetFirewallInternal.
|
|
//
|
|
RegObject.WriteBlob(((fBuiltIn) ? pwszPortMappingProtocolName : wszDescription),
|
|
(LPBYTE) (&dpnhafm),
|
|
sizeof(dpnhafm));
|
|
|
|
RegObject.Close();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Not remembering shared port firewall mapping \"%ls\".",
|
|
wszDescription);
|
|
}
|
|
|
|
|
|
//
|
|
// Cleanup from this port mapping, and get ready for the next one.
|
|
//
|
|
|
|
if (fBuiltIn)
|
|
{
|
|
CoTaskMemFree(pwszPortMappingProtocolName);
|
|
pwszPortMappingProtocolName = NULL;
|
|
}
|
|
|
|
pHNetPortMappingBinding->Release();
|
|
pHNetPortMappingBinding = NULL;
|
|
|
|
|
|
fCreatedCurrentPortMappingProtocol = FALSE;
|
|
|
|
|
|
hr = pEnumHNetPortMappingProtocols->Reset();
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't reset port mapping protocol enumeration 0x%p (err = 0x%lx)!",
|
|
pEnumHNetPortMappingProtocols, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Alert the user to the change the next time GetCaps is called, if
|
|
// requested.
|
|
//
|
|
if (fNoteAddressChange)
|
|
{
|
|
DPFX(DPFPREP, 8, "Noting that addresses changed (for registered port 0x%p).",
|
|
pRegisteredPort);
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_ADDRESSESCHANGED;
|
|
}
|
|
|
|
|
|
//
|
|
// Go on to the next port.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// dwTemp == pRegisteredPort->GetNumAddresses() if everything succeeded, or
|
|
// or the index of the item that was unavailable if not.
|
|
//
|
|
|
|
//
|
|
// Free all the port mapping protocol objects. If we successfully bound
|
|
// all of them, that's all we need to do. If the port was unavailable, we
|
|
// have to unmap any ports that were successful up to the one that failed.
|
|
//
|
|
while (dwTemp > 0)
|
|
{
|
|
dwTemp--;
|
|
|
|
//
|
|
// If we failed to map all ports, delete this previous mapping.
|
|
//
|
|
if (pRegisteredPort->IsHNetFirewallPortUnavailable())
|
|
{
|
|
papHNetPortMappingProtocol[dwTemp]->Delete(); // ignore error
|
|
}
|
|
|
|
//
|
|
// Free the object.
|
|
//
|
|
papHNetPortMappingProtocol[dwTemp]->Release();
|
|
papHNetPortMappingProtocol[dwTemp] = NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// If we succeeded, mark the registered port as mapped.
|
|
//
|
|
if (! pRegisteredPort->IsHNetFirewallPortUnavailable())
|
|
{
|
|
pRegisteredPort->NoteMappedOnHNetFirewall();
|
|
}
|
|
|
|
|
|
|
|
DNFree(papHNetPortMappingProtocol);
|
|
papHNetPortMappingProtocol = NULL;
|
|
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
|
|
|
|
Exit:
|
|
|
|
if (pEnumHNetPortMappingProtocols != NULL)
|
|
{
|
|
pEnumHNetPortMappingProtocols->Release();
|
|
pEnumHNetPortMappingProtocols = NULL;
|
|
}
|
|
|
|
if (pHNetProtocolSettings != NULL)
|
|
{
|
|
pHNetProtocolSettings->Release();
|
|
pHNetProtocolSettings = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pwszPortMappingProtocolName != NULL)
|
|
{
|
|
CoTaskMemFree(pwszPortMappingProtocolName);
|
|
pwszPortMappingProtocolName = NULL;
|
|
}
|
|
|
|
//
|
|
// If we have an array, then we need to clean it up. dwTemp will still
|
|
// hold the index of the item we were working on.
|
|
//
|
|
if (papHNetPortMappingProtocol != NULL)
|
|
{
|
|
//
|
|
// Delete the one we were working on, if we created it.
|
|
//
|
|
if (papHNetPortMappingProtocol[dwTemp] != NULL)
|
|
{
|
|
if (fCreatedCurrentPortMappingProtocol)
|
|
{
|
|
papHNetPortMappingProtocol[dwTemp]->Delete(); // ignore error
|
|
}
|
|
|
|
papHNetPortMappingProtocol[dwTemp]->Release();
|
|
papHNetPortMappingProtocol[dwTemp] = NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// Delete all the mappings we successfully made up to the last one.
|
|
//
|
|
while (dwTemp > 0)
|
|
{
|
|
dwTemp--;
|
|
|
|
|
|
DNASSERT(papHNetPortMappingProtocol[dwTemp] != NULL);
|
|
|
|
papHNetPortMappingProtocol[dwTemp]->Delete(); // ignore error
|
|
|
|
papHNetPortMappingProtocol[dwTemp]->Release();
|
|
papHNetPortMappingProtocol[dwTemp] = NULL;
|
|
}
|
|
|
|
DNFree(papHNetPortMappingProtocol);
|
|
papHNetPortMappingProtocol = NULL;
|
|
}
|
|
|
|
if (pHNetPortMappingBinding != NULL)
|
|
{
|
|
pHNetPortMappingBinding->Release();
|
|
pHNetPortMappingBinding = NULL;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::MapPortOnLocalHNetFirewall
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::UnmapPortOnLocalHNetFirewall"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::UnmapPortOnLocalHNetFirewall
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Removes the mappings for the given ports from the local
|
|
// firewall.
|
|
//
|
|
// The main object lock is assumed to be held. It will be
|
|
// converted into the long lock for the duration of this function.
|
|
//
|
|
// Arguments:
|
|
// CRegisteredPort * pRegisteredPort - Pointer to port to be opened on the
|
|
// firewall.
|
|
// BOOL fNeedToDeleteRegValue - Whether the corresponding crash
|
|
// recovery registry value needs to
|
|
// be deleted as well.
|
|
// BOOL fNoteAddressChange - Whether to alert the user of the
|
|
// address change or not.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Unmapping completed successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::UnmapPortOnLocalHNetFirewall(CRegisteredPort * const pRegisteredPort,
|
|
const BOOL fNeedToDeleteRegValue,
|
|
const BOOL fNoteAddressChange)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
BOOL fSwitchedToLongLock = FALSE;
|
|
BOOL fUninitializeCOM = FALSE;
|
|
IHNetCfgMgr * pHNetCfgMgr = NULL;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %i, %i)",
|
|
this, pRegisteredPort, fNeedToDeleteRegValue, fNoteAddressChange);
|
|
|
|
|
|
DNASSERT(pRegisteredPort->IsMappedOnHNetFirewall());
|
|
|
|
|
|
|
|
//
|
|
// If the port is shared, leave it mapped since we can't tell when the
|
|
// last person using it is done with it.
|
|
//
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
DPFX(DPFPREP, 2, "Leaving shared registered port 0x%p mapped.",
|
|
pRegisteredPort);
|
|
|
|
//
|
|
// Pretend like we unmapped it, though.
|
|
//
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Using the HomeNet API (particularly the out-of-proc COM calls) during
|
|
// stress is really, really, painfully slow. Since we have one global lock
|
|
// the controls everything, other threads may be sitting for an equally
|
|
// long time... so long, in fact, that the critical section timeout fires
|
|
// and we get a false stress hit. So we have a sneaky workaround to
|
|
// prevent that from happening while still maintaining ownership of the
|
|
// object.
|
|
//
|
|
this->SwitchToLongLock();
|
|
fSwitchedToLongLock = TRUE;
|
|
|
|
|
|
//
|
|
// Try to initialize COM if we weren't instantiated through COM. It may
|
|
// have already been initialized in a different mode, which is okay. As
|
|
// long as it has been initialized somehow, we're fine.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_NOTCREATEDWITHCOM)
|
|
{
|
|
hr = CoInitializeEx(NULL, (COINIT_MULTITHREADED | COINIT_DISABLE_OLE1DDE));
|
|
switch (hr)
|
|
{
|
|
case S_OK:
|
|
{
|
|
//
|
|
// Success, that's good. Cleanup when we're done.
|
|
//
|
|
DPFX(DPFPREP, 8, "Successfully initialized COM.");
|
|
fUninitializeCOM = TRUE;
|
|
break;
|
|
}
|
|
|
|
case S_FALSE:
|
|
{
|
|
//
|
|
// Someone else already initialized COM, but that's okay.
|
|
// Cleanup when we're done.
|
|
//
|
|
DPFX(DPFPREP, 8, "Initialized COM (again).");
|
|
fUninitializeCOM = TRUE;
|
|
break;
|
|
}
|
|
|
|
case RPC_E_CHANGED_MODE:
|
|
{
|
|
//
|
|
// Someone else already initialized COM in a different mode.
|
|
// It should be okay, but we don't have to balance the CoInit
|
|
// call with a CoUninit.
|
|
//
|
|
DPFX(DPFPREP, 8, "Didn't initialize COM, already initialized in a different mode.");
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// Hmm, something else is going on. We can't handle that.
|
|
//
|
|
DPFX(DPFPREP, 0, "Initializing COM failed (err = 0x%lx)!", hr);
|
|
goto Failure;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "Object was instantiated through COM, no need to initialize COM.");
|
|
}
|
|
|
|
|
|
//
|
|
// Create the main HNet manager object.
|
|
//
|
|
hr = CoCreateInstance(CLSID_HNetCfgMgr, NULL, CLSCTX_INPROC_SERVER,
|
|
IID_IHNetCfgMgr, (PVOID*) (&pHNetCfgMgr));
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't create IHNetCfgMgr interface (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// We created the IHNetCfgMgr object as in-proc, so there's no proxy that
|
|
// requires security settings.
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetCfgMgr);
|
|
|
|
|
|
//
|
|
// Actually unmap the port(s).
|
|
//
|
|
hr = this->UnmapPortOnLocalHNetFirewallInternal(pRegisteredPort,
|
|
fNeedToDeleteRegValue,
|
|
pHNetCfgMgr);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't unmap ports from local HNet firewall (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Alert the user to the change the next time GetCaps is called, if requested.
|
|
//
|
|
if (fNoteAddressChange)
|
|
{
|
|
DPFX(DPFPREP, 8, "Noting that addresses changed (for registered port 0x%p).",
|
|
pRegisteredPort);
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_ADDRESSESCHANGED;
|
|
}
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
if (pHNetCfgMgr != NULL)
|
|
{
|
|
pHNetCfgMgr->Release();
|
|
pHNetCfgMgr = NULL;
|
|
}
|
|
|
|
if (fUninitializeCOM)
|
|
{
|
|
DPFX(DPFPREP, 8, "Uninitializing COM.");
|
|
CoUninitialize();
|
|
fUninitializeCOM = FALSE;
|
|
}
|
|
|
|
if (fSwitchedToLongLock)
|
|
{
|
|
this->SwitchFromLongLock();
|
|
fSwitchedToLongLock = FALSE;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::UnmapPortOnLocalHNetFirewall
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::UnmapPortOnLocalHNetFirewallInternal"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::UnmapPortOnLocalHNetFirewallInternal
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Removes the mappings for the given ports from the local
|
|
// firewall.
|
|
//
|
|
// COM is assumed to have been initialized.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CRegisteredPort * pRegisteredPort - Pointer to port to be opened on the
|
|
// firewall.
|
|
// BOOL fNeedToDeleteRegValue - Whether the corresponding crash
|
|
// recovery registry value needs to
|
|
// be deleted as well.
|
|
// IHNetCfgMgr * pHNetCfgMgr - Pointer to IHNetCfgMgr interface to
|
|
// use.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Unmapping completed successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::UnmapPortOnLocalHNetFirewallInternal(CRegisteredPort * const pRegisteredPort,
|
|
const BOOL fNeedToDeleteRegValue,
|
|
IHNetCfgMgr * const pHNetCfgMgr)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CDevice * pDevice;
|
|
DWORD dwAttempts = 0;
|
|
IHNetProtocolSettings * pHNetProtocolSettings = NULL;
|
|
IEnumHNetPortMappingProtocols * pEnumHNetPortMappingProtocols = NULL;
|
|
SOCKADDR_IN * pasaddrinPrivate;
|
|
UCHAR ucProtocolToMatch;
|
|
IHNetPortMappingProtocol * pHNetPortMappingProtocol = NULL;
|
|
DWORD dwStartingPort = 0;
|
|
DWORD dwTemp;
|
|
ULONG ulNumFound;
|
|
WORD wPort;
|
|
UCHAR ucProtocol;
|
|
WCHAR * pwszName = NULL;
|
|
BOOLEAN fBuiltIn;
|
|
CRegistry RegObject;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %i, 0x%p)",
|
|
this, pRegisteredPort, fNeedToDeleteRegValue, pHNetCfgMgr);
|
|
|
|
|
|
DNASSERT(pRegisteredPort->IsMappedOnHNetFirewall());
|
|
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
|
|
DNASSERT(this->m_hIpHlpApiDLL != NULL);
|
|
|
|
|
|
|
|
Restart:
|
|
|
|
|
|
//
|
|
// Get a protocol settings interface.
|
|
//
|
|
hr = pHNetCfgMgr->QueryInterface(IID_IHNetProtocolSettings,
|
|
(PVOID*) (&pHNetProtocolSettings));
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get IHNetProtocolSettings interface from IHNetCfgMgr 0x%p (err = 0x%lx)!",
|
|
pHNetCfgMgr, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetProtocolSettings);
|
|
|
|
|
|
//
|
|
// Get ready to enumerate the existing mappings.
|
|
//
|
|
|
|
hr = pHNetProtocolSettings->EnumPortMappingProtocols(&pEnumHNetPortMappingProtocols);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't enumerate port mapping protocols (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pEnumHNetPortMappingProtocols);
|
|
|
|
|
|
pasaddrinPrivate = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
if (pRegisteredPort->IsTCP())
|
|
{
|
|
ucProtocolToMatch = PORTMAPPINGPROTOCOL_TCP;
|
|
}
|
|
else
|
|
{
|
|
ucProtocolToMatch = PORTMAPPINGPROTOCOL_UDP;
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Loop through all the ports (that we haven't successfully unmapped yet).
|
|
//
|
|
for(dwTemp = dwStartingPort; dwTemp < pRegisteredPort->GetNumAddresses(); dwTemp++)
|
|
{
|
|
//
|
|
// Loop until we find a duplicate item or run out of items.
|
|
//
|
|
do
|
|
{
|
|
hr = pEnumHNetPortMappingProtocols->Next(1,
|
|
&pHNetPortMappingProtocol,
|
|
&ulNumFound);
|
|
if (FAILED(hr))
|
|
{
|
|
dwAttempts++;
|
|
if (dwAttempts < MAX_NUM_HOMENETUNMAP_ATTEMPTS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get next port mapping protocol (err = 0x%lx)! Trying again after %u ms.",
|
|
hr, (dwAttempts * HOMENETUNMAP_SLEEP_FACTOR));
|
|
|
|
//
|
|
// Dump the object pointers we currently have.
|
|
//
|
|
|
|
pEnumHNetPortMappingProtocols->Release();
|
|
pEnumHNetPortMappingProtocols = NULL;
|
|
|
|
pHNetProtocolSettings->Release();
|
|
pHNetProtocolSettings = NULL;
|
|
|
|
|
|
//
|
|
// Sleep, then go back to the top and try again.
|
|
//
|
|
Sleep(dwAttempts * HOMENETUNMAP_SLEEP_FACTOR);
|
|
goto Restart;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 0, "Couldn't get next port mapping protocol (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If there aren't any more items, bail.
|
|
//
|
|
if (ulNumFound == 0)
|
|
{
|
|
//
|
|
// Be sure that IEnumHNetPortMappingProtocols::Next returned
|
|
// the right thing, for PREfix's sake.
|
|
//
|
|
if (pHNetPortMappingProtocol != NULL)
|
|
{
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
}
|
|
|
|
|
|
//
|
|
// pEnumHNetPortMappingProtocols->Next might have returned
|
|
// S_FALSE.
|
|
//
|
|
hr = DPNH_OK;
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetPortMappingProtocol);
|
|
|
|
|
|
//
|
|
// Get the port.
|
|
//
|
|
hr = pHNetPortMappingProtocol->GetPort(&wPort);
|
|
if (hr != S_OK)
|
|
{
|
|
DNASSERTX((! "Got unexpected error executing IHNetPortMappingProtocol::GetPort!"), 2);
|
|
|
|
|
|
//
|
|
// Dump the unusable mapping object.
|
|
//
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
|
|
|
|
dwAttempts++;
|
|
if (dwAttempts < MAX_NUM_HOMENETUNMAP_ATTEMPTS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol port (err = 0x%lx)! Trying again after %u ms.",
|
|
hr, (dwAttempts * HOMENETUNMAP_SLEEP_FACTOR));
|
|
|
|
//
|
|
// Dump the object pointers we currently have.
|
|
//
|
|
|
|
pEnumHNetPortMappingProtocols->Release();
|
|
pEnumHNetPortMappingProtocols = NULL;
|
|
|
|
pHNetProtocolSettings->Release();
|
|
pHNetProtocolSettings = NULL;
|
|
|
|
|
|
//
|
|
// Sleep, then go back to the top and try again.
|
|
//
|
|
Sleep(dwAttempts * HOMENETUNMAP_SLEEP_FACTOR);
|
|
goto Restart;
|
|
}
|
|
|
|
|
|
//
|
|
// Break out of the search loop, but continue.
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol port (err = 0x%lx)!",
|
|
hr);
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Get the protocol.
|
|
//
|
|
hr = pHNetPortMappingProtocol->GetIPProtocol(&ucProtocol);
|
|
if (hr != S_OK)
|
|
{
|
|
DNASSERTX((! "Got unexpected error executing IHNetPortMappingProtocol::GetIPProtocol!"), 2);
|
|
|
|
|
|
//
|
|
// Dump the unusable mapping object.
|
|
//
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
|
|
|
|
dwAttempts++;
|
|
if (dwAttempts < MAX_NUM_HOMENETUNMAP_ATTEMPTS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol's IP protocol (err = 0x%lx)! Trying again after %u ms.",
|
|
hr, (dwAttempts * HOMENETUNMAP_SLEEP_FACTOR));
|
|
|
|
//
|
|
// Dump the object pointers we currently have.
|
|
//
|
|
|
|
pEnumHNetPortMappingProtocols->Release();
|
|
pEnumHNetPortMappingProtocols = NULL;
|
|
|
|
pHNetProtocolSettings->Release();
|
|
pHNetProtocolSettings = NULL;
|
|
|
|
|
|
//
|
|
// Sleep, then go back to the top and try again.
|
|
//
|
|
Sleep(dwAttempts * HOMENETUNMAP_SLEEP_FACTOR);
|
|
goto Restart;
|
|
}
|
|
|
|
|
|
//
|
|
// Break out of the search loop, but continue.
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol's IP protocol (err = 0x%lx)!",
|
|
hr);
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// See if we found the object we need. Note that we don't verify
|
|
// the target address for simplicity (neither does UPnP).
|
|
//
|
|
if ((wPort == pasaddrinPrivate[dwTemp].sin_port) &&
|
|
(ucProtocol == ucProtocolToMatch))
|
|
{
|
|
//
|
|
// Retrieve the mapping name.
|
|
//
|
|
hr = pHNetPortMappingProtocol->GetName(&pwszName);
|
|
if (hr != S_OK)
|
|
{
|
|
DNASSERTX((! "Got unexpected error executing IHNetPortMappingProtocol::GetName!"), 2);
|
|
|
|
|
|
//
|
|
// Dump the unusable mapping object.
|
|
//
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
|
|
|
|
dwAttempts++;
|
|
if (dwAttempts < MAX_NUM_HOMENETUNMAP_ATTEMPTS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol's name (err = 0x%lx)! Trying again after %u ms.",
|
|
hr, (dwAttempts * HOMENETUNMAP_SLEEP_FACTOR));
|
|
|
|
//
|
|
// Dump the object pointers we currently have.
|
|
//
|
|
|
|
pEnumHNetPortMappingProtocols->Release();
|
|
pEnumHNetPortMappingProtocols = NULL;
|
|
|
|
pHNetProtocolSettings->Release();
|
|
pHNetProtocolSettings = NULL;
|
|
|
|
|
|
//
|
|
// Sleep, then go back to the top and try again.
|
|
//
|
|
Sleep(dwAttempts * HOMENETUNMAP_SLEEP_FACTOR);
|
|
goto Restart;
|
|
}
|
|
|
|
|
|
//
|
|
// Break out of the search loop, but continue.
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol's name (err = 0x%lx)!",
|
|
hr);
|
|
break;
|
|
}
|
|
|
|
DPFX(DPFPREP, 8, "Found port mapping protocol 0x%p (\"%ls\").",
|
|
pHNetPortMappingProtocol, pwszName);
|
|
|
|
//
|
|
// See if this protocol is built-in.
|
|
//
|
|
hr = pHNetPortMappingProtocol->GetBuiltIn(&fBuiltIn);
|
|
if (hr != S_OK)
|
|
{
|
|
DNASSERTX((! "Got unexpected error executing IHNetPortMappingProtocol::GetBuiltIn!"), 2);
|
|
|
|
|
|
//
|
|
// Dump the unusable mapping object and its name.
|
|
//
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
|
|
|
|
dwAttempts++;
|
|
if (dwAttempts < MAX_NUM_HOMENETUNMAP_ATTEMPTS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol's built-in status (err = 0x%lx)! Trying again after %u ms.",
|
|
hr, (dwAttempts * HOMENETUNMAP_SLEEP_FACTOR));
|
|
|
|
//
|
|
// Dump the object pointers we currently have.
|
|
//
|
|
|
|
pEnumHNetPortMappingProtocols->Release();
|
|
pEnumHNetPortMappingProtocols = NULL;
|
|
|
|
pHNetProtocolSettings->Release();
|
|
pHNetProtocolSettings = NULL;
|
|
|
|
|
|
//
|
|
// Sleep, then go back to the top and try again.
|
|
//
|
|
Sleep(dwAttempts * HOMENETUNMAP_SLEEP_FACTOR);
|
|
goto Restart;
|
|
}
|
|
|
|
|
|
//
|
|
// Break out of the search loop, but continue.
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol's built-in status (err = 0x%lx)!",
|
|
hr);
|
|
break;
|
|
}
|
|
|
|
|
|
break;
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
//
|
|
// Try to retrieve the mapping name for informational purposes.
|
|
//
|
|
hr = pHNetPortMappingProtocol->GetName(&pwszName);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get port mapping protocol 0x%p's name (err = 0x%lx)!",
|
|
pHNetPortMappingProtocol, hr);
|
|
|
|
|
|
DNASSERTX((! "Got unexpected error executing IHNetPortMappingProtocol::GetName!"), 2);
|
|
|
|
//
|
|
// Ignore error...
|
|
//
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Skipping non-matching port mapping protocol 0x%p (\"%ls\").",
|
|
pHNetPortMappingProtocol, pwszName);
|
|
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
}
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Get ready for the next object.
|
|
//
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// Remove the mapping (if we found it).
|
|
//
|
|
if (pHNetPortMappingProtocol != NULL)
|
|
{
|
|
//
|
|
// If the mapping is built-in we can't delete it. Disabling it is
|
|
// the best we can do.
|
|
//
|
|
if (fBuiltIn)
|
|
{
|
|
DPFX(DPFPREP, 7, "Disabling built-in port mapping protocol \"%ls\".", pwszName);
|
|
|
|
DNASSERT(pRegisteredPort->IsHNetFirewallMappingBuiltIn());
|
|
|
|
hr = this->DisableAllBindingsForHNetPortMappingProtocol(pHNetPortMappingProtocol,
|
|
pHNetCfgMgr);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't disable all bindings for built-in port mapping protocol \"%ls\" (err = 0x%lx)!",
|
|
pwszName, hr);
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Deleting port mapping protocol \"%ls\".", pwszName);
|
|
|
|
DNASSERT(! pRegisteredPort->IsHNetFirewallMappingBuiltIn());
|
|
|
|
|
|
hr = pHNetPortMappingProtocol->Delete();
|
|
if (hr != S_OK)
|
|
{
|
|
//
|
|
// This might be WBEM_E_ACCESSDENIED (0x80041003), which
|
|
// means the current user doesn't have permissions to
|
|
// modify firewall mappings.
|
|
//
|
|
|
|
DPFX(DPFPREP, 0, "Couldn't delete port mapping protocol (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
if (fNeedToDeleteRegValue)
|
|
{
|
|
//
|
|
// Delete the crash cleanup registry entry. The mapping
|
|
// description/name will match the registry key name even in
|
|
// the case of built-in mappings with names we didn't generate.
|
|
// See MapPortOnLocalHNetFirewall.
|
|
//
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVEFIREWALLMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't open active firewall mapping key, unable to remove crash cleanup reference!");
|
|
}
|
|
else
|
|
{
|
|
BOOL fResult;
|
|
|
|
|
|
//
|
|
// Ignore error.
|
|
//
|
|
fResult = RegObject.DeleteValue(pwszName);
|
|
if (! fResult)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't delete firewall mapping value \"%ls\"! Continuing.",
|
|
pwszName);
|
|
}
|
|
|
|
RegObject.Close();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 6, "No need to delete firewall crash cleanup registry key \"%ls\".", pwszName);
|
|
}
|
|
|
|
|
|
//
|
|
// Cleanup pointers we accumulated.
|
|
//
|
|
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// We didn't find the mapping.
|
|
//
|
|
DPFX(DPFPREP, 0, "Didn't find port mapping protocol for port %u %s! Continuing.",
|
|
NTOHS(pasaddrinPrivate[dwTemp].sin_port),
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Cleanup from this port mapping, and get ready for the next one.
|
|
//
|
|
|
|
hr = pEnumHNetPortMappingProtocols->Reset();
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't reset port mapping protocol enumeration 0x%p (err = 0x%lx)!",
|
|
pEnumHNetPortMappingProtocols, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Go on to the next port, and update the starting counter in case we
|
|
// encounter a failure next time.
|
|
//
|
|
dwStartingPort++;
|
|
}
|
|
|
|
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
|
|
|
|
Exit:
|
|
|
|
if (pHNetPortMappingProtocol != NULL)
|
|
{
|
|
pHNetPortMappingProtocol->Release();
|
|
pHNetPortMappingProtocol = NULL;
|
|
}
|
|
|
|
if (pEnumHNetPortMappingProtocols != NULL)
|
|
{
|
|
pEnumHNetPortMappingProtocols->Release();
|
|
pEnumHNetPortMappingProtocols = NULL;
|
|
}
|
|
|
|
if (pHNetProtocolSettings != NULL)
|
|
{
|
|
pHNetProtocolSettings->Release();
|
|
pHNetProtocolSettings = NULL;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pwszName != NULL)
|
|
{
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::UnmapPortOnLocalHNetFirewallInternal
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::DisableAllBindingsForHNetPortMappingProtocol"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::DisableAllBindingsForHNetPortMappingProtocol
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Disables all HNetPortMappingBindings on all HNetConnection
|
|
// interfaces for the given port mapping protocol object.
|
|
//
|
|
// COM is assumed to have been initialized.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// IHNetPortMappingProtocol * pHNetPortMappingProtocol - Pointer to port
|
|
// mapping
|
|
// protocol to
|
|
// disable on all
|
|
// connections.
|
|
// IHNetCfgMgr * pHNetCfgMgr - Pointer to
|
|
// IHNetCfgMgr
|
|
// interface to
|
|
// use.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Disabling was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::DisableAllBindingsForHNetPortMappingProtocol(IHNetPortMappingProtocol * const pHNetPortMappingProtocol,
|
|
IHNetCfgMgr * const pHNetCfgMgr)
|
|
{
|
|
HRESULT hr;
|
|
INetConnectionManager * pNetConnectionManager = NULL;
|
|
IEnumNetConnection * pEnumNetConnections = NULL;
|
|
ULONG ulNumFound;
|
|
INetConnection * pNetConnection = NULL;
|
|
IHNetConnection * pHNetConnection = NULL;
|
|
IHNetPortMappingBinding * pHNetPortMappingBinding = NULL;
|
|
#ifdef DBG
|
|
WCHAR * pwszName = NULL;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p)",
|
|
this, pHNetPortMappingProtocol, pHNetCfgMgr);
|
|
|
|
|
|
//
|
|
// Try creating the base connection object.
|
|
//
|
|
hr = CoCreateInstance(CLSID_ConnectionManager,
|
|
NULL,
|
|
CLSCTX_SERVER,
|
|
IID_INetConnectionManager,
|
|
(PVOID*) (&pNetConnectionManager));
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't create INetConnectionManager interface (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
SETDEFAULTPROXYBLANKET(pNetConnectionManager);
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Successfully created net connection manager object 0x%p.",
|
|
pNetConnectionManager);
|
|
|
|
|
|
//
|
|
// Get the net connection enumeration object.
|
|
//
|
|
hr = pNetConnectionManager->EnumConnections(NCME_DEFAULT, &pEnumNetConnections);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't enum connections (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
SETDEFAULTPROXYBLANKET(pEnumNetConnections);
|
|
|
|
|
|
//
|
|
// We don't need the base object anymore.
|
|
//
|
|
pNetConnectionManager->Release();
|
|
pNetConnectionManager = NULL;
|
|
|
|
|
|
//
|
|
// Keep looping until we find the item or run out of items.
|
|
//
|
|
do
|
|
{
|
|
hr = pEnumNetConnections->Next(1, &pNetConnection, &ulNumFound);
|
|
if (FAILED(hr))
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get next connection (err = 0x%lx)!",
|
|
hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If there aren't any more items, bail.
|
|
//
|
|
if (ulNumFound == 0)
|
|
{
|
|
//
|
|
// pEnumNetConnections->Next might have returned S_FALSE.
|
|
//
|
|
hr = DPNH_OK;
|
|
break;
|
|
}
|
|
|
|
|
|
SETDEFAULTPROXYBLANKET(pNetConnection);
|
|
|
|
|
|
//
|
|
// Get the HNetConnection object for this NetConnection.
|
|
//
|
|
hr = pHNetCfgMgr->GetIHNetConnectionForINetConnection(pNetConnection,
|
|
&pHNetConnection);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get IHNetConnection interface for INetConnection 0x%p (err = 0x%lx)!",
|
|
pNetConnection, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetConnection);
|
|
|
|
|
|
//
|
|
// Don't need the INetConnection interface anymore.
|
|
//
|
|
pNetConnection->Release();
|
|
pNetConnection = NULL;
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Retrieve the connection name, for debug printing purposes.
|
|
//
|
|
hr = pHNetConnection->GetName(&pwszName);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get name of HNetConnection 0x%p (err = 0x%lx)!",
|
|
pHNetConnection, hr);
|
|
goto Failure;
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Retrieve the existing binding.
|
|
//
|
|
hr = pHNetConnection->GetBindingForPortMappingProtocol(pHNetPortMappingProtocol,
|
|
&pHNetPortMappingBinding);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't get binding for port mapping protocol 0x%p (err = 0x%lx)!",
|
|
pHNetPortMappingProtocol, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The HNetxxx objects appear to not be proxied...
|
|
//
|
|
//SETDEFAULTPROXYBLANKET(pHNetPortMappingBinding);
|
|
|
|
|
|
//
|
|
// Don't need the HomeNet Connection object anymore.
|
|
//
|
|
pHNetConnection->Release();
|
|
pHNetConnection = NULL;
|
|
|
|
|
|
DPFX(DPFPREP, 6, "Disabling binding 0x%p on connection \"%ls\".",
|
|
pHNetPortMappingBinding, pwszName);
|
|
|
|
|
|
//
|
|
// Disable it.
|
|
//
|
|
hr = pHNetPortMappingBinding->SetEnabled(FALSE);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't disable port mapping binding 0x%p (err = 0x%lx)!",
|
|
pHNetPortMappingBinding, hr);
|
|
goto Failure;
|
|
}
|
|
|
|
pHNetPortMappingBinding->Release();
|
|
pHNetPortMappingBinding = NULL;
|
|
|
|
|
|
//
|
|
// Go to the next mapping.
|
|
//
|
|
#ifdef DBG
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
#endif // DBG
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// If we're here, we made it through unscathed.
|
|
//
|
|
hr = DPNH_OK;
|
|
|
|
|
|
Exit:
|
|
|
|
if (pEnumNetConnections != NULL)
|
|
{
|
|
pEnumNetConnections->Release();
|
|
pEnumNetConnections = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pHNetPortMappingBinding != NULL)
|
|
{
|
|
pHNetPortMappingBinding->Release();
|
|
pHNetPortMappingBinding = NULL;
|
|
}
|
|
|
|
#ifdef DBG
|
|
if (pwszName != NULL)
|
|
{
|
|
CoTaskMemFree(pwszName);
|
|
pwszName = NULL;
|
|
}
|
|
#endif // DBG
|
|
|
|
if (pHNetConnection != NULL)
|
|
{
|
|
pHNetConnection->Release();
|
|
pHNetConnection = NULL;
|
|
}
|
|
|
|
if (pNetConnection != NULL)
|
|
{
|
|
pNetConnection->Release();
|
|
pNetConnection = NULL;
|
|
}
|
|
|
|
if (pNetConnectionManager != NULL)
|
|
{
|
|
pNetConnectionManager->Release();
|
|
pNetConnectionManager = NULL;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::DisableAllBindingsForHNetPortMappingProtocol
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CleanupInactiveFirewallMappings"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CleanupInactiveFirewallMappings
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Looks for any mappings previously made by other DPNATHLP
|
|
// instances that are no longer active (because of a crash), and
|
|
// unmaps them.
|
|
//
|
|
// COM is assumed to have been initialized.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device to use.
|
|
// IHNetCfgMgr * pHNetCfgMgr - Pointer to IHNetCfgMgr interface to
|
|
// use.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The cleanup was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CleanupInactiveFirewallMappings(CDevice * const pDevice,
|
|
IHNetCfgMgr * const pHNetCfgMgr)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CRegistry RegObject;
|
|
BOOL fOpenedRegistry = FALSE;
|
|
DWORD dwIndex;
|
|
WCHAR wszValueName[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
DWORD dwValueNameSize;
|
|
DPNHACTIVEFIREWALLMAPPING dpnhafm;
|
|
DWORD dwValueSize;
|
|
TCHAR tszObjectName[MAX_INSTANCENAMEDOBJECT_SIZE];
|
|
DNHANDLE hNamedObject = NULL;
|
|
CRegisteredPort * pRegisteredPort = NULL;
|
|
BOOL fSetPrivateAddresses = FALSE;
|
|
SOCKADDR_IN saddrinPrivate;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p)",
|
|
this, pDevice, pHNetCfgMgr);
|
|
|
|
|
|
DNASSERT(pDevice != NULL);
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVEFIREWALLMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't open active firewall mapping key, not performing crash cleanup.");
|
|
DNASSERT(hr == DPNH_OK);
|
|
goto Exit;
|
|
}
|
|
|
|
fOpenedRegistry = TRUE;
|
|
|
|
|
|
//
|
|
// Walk the list of active mappings.
|
|
//
|
|
dwIndex = 0;
|
|
do
|
|
{
|
|
dwValueNameSize = MAX_UPNP_MAPPING_DESCRIPTION_SIZE;
|
|
if (! RegObject.EnumValues(wszValueName, &dwValueNameSize, dwIndex))
|
|
{
|
|
//
|
|
// There was an error or there aren't any more keys. We're done.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Try reading that mapping's data.
|
|
//
|
|
dwValueSize = sizeof(dpnhafm);
|
|
if (! RegObject.ReadBlob(wszValueName, (LPBYTE) (&dpnhafm), &dwValueSize))
|
|
{
|
|
//
|
|
// We don't have a lock protecting the registry, so some other
|
|
// instance could have deleted the key between when we enumerated
|
|
// it and now. We'll stop trying (and hopefully that other
|
|
// instance will cover the rest of the items).
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't read \"%ls\" mapping value! Done with cleanup.",
|
|
wszValueName);
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Validate the data read.
|
|
//
|
|
if ((dwValueSize != sizeof(dpnhafm)) ||
|
|
(dpnhafm.dwVersion != ACTIVE_MAPPING_VERSION))
|
|
{
|
|
DPFX(DPFPREP, 0, "The \"%ls\" mapping value is invalid! Done with cleanup.",
|
|
wszValueName);
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
continue;
|
|
}
|
|
|
|
|
|
//
|
|
// See if that DPNHUPNP instance is still around.
|
|
//
|
|
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX)
|
|
{
|
|
wsprintf(tszObjectName, _T("Global\\") INSTANCENAMEDOBJECT_FORMATSTRING, dpnhafm.dwInstanceKey);
|
|
}
|
|
else
|
|
{
|
|
wsprintf(tszObjectName, INSTANCENAMEDOBJECT_FORMATSTRING, dpnhafm.dwInstanceKey);
|
|
}
|
|
|
|
hNamedObject = DNOpenEvent(SYNCHRONIZE, FALSE, tszObjectName);
|
|
if (hNamedObject != NULL)
|
|
{
|
|
//
|
|
// This is still an active mapping.
|
|
//
|
|
|
|
DPFX(DPFPREP, 4, "Firewall mapping \"%ls\" belongs to instance %u, which is still active.",
|
|
wszValueName, dpnhafm.dwInstanceKey);
|
|
|
|
DNCloseHandle(hNamedObject);
|
|
hNamedObject = NULL;
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
continue;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 4, "Firewall mapping \"%ls\" belongs to instance %u, which no longer exists.",
|
|
wszValueName, dpnhafm.dwInstanceKey);
|
|
|
|
//
|
|
// Delete the value now that we have the information we need.
|
|
//
|
|
if (! RegObject.DeleteValue(wszValueName))
|
|
{
|
|
//
|
|
// See ReadBlob comments. Stop trying to cleanup.
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't delete \"%ls\"! Done with cleanup.",
|
|
wszValueName);
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Create a fake registered port that we will deregister. Ignore the
|
|
// NAT state flags.
|
|
//
|
|
pRegisteredPort = new CRegisteredPort(0, (dpnhafm.dwFlags & REGPORTOBJMASK_HNETFWAPI));
|
|
if (pRegisteredPort == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Assert that the other information/state flags are correct.
|
|
//
|
|
DNASSERT(! pRegisteredPort->IsHNetFirewallPortUnavailable());
|
|
DNASSERT(! pRegisteredPort->IsRemovingUPnPLease());
|
|
|
|
|
|
//
|
|
// Temporarily associate the registered port with the device.
|
|
//
|
|
pRegisteredPort->MakeDeviceOwner(pDevice);
|
|
|
|
|
|
|
|
ZeroMemory(&saddrinPrivate, sizeof(saddrinPrivate));
|
|
saddrinPrivate.sin_family = AF_INET;
|
|
saddrinPrivate.sin_addr.S_un.S_addr = dpnhafm.dwAddressV4;
|
|
saddrinPrivate.sin_port = dpnhafm.wPort;
|
|
|
|
|
|
//
|
|
// Store the private address.
|
|
//
|
|
hr = pRegisteredPort->SetPrivateAddresses(&saddrinPrivate, 1);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed creating UPnP address array!");
|
|
goto Failure;
|
|
}
|
|
|
|
fSetPrivateAddresses = TRUE;
|
|
|
|
|
|
//
|
|
// Pretend it has been mapped on the local firewall. Note that this
|
|
// flag shouldn't have been set at the time it was stored in registry
|
|
// but we masked it out if it had been.
|
|
//
|
|
pRegisteredPort->NoteMappedOnHNetFirewall();
|
|
|
|
|
|
//
|
|
// Actually free the port.
|
|
//
|
|
hr = this->UnmapPortOnLocalHNetFirewallInternal(pRegisteredPort,
|
|
FALSE,
|
|
pHNetCfgMgr);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed deleting temporary HNet firewall port (err = 0x%lx)! Ignoring.",
|
|
hr);
|
|
|
|
//
|
|
// Jump to the failure cleanup case, but don't actually return a
|
|
// failure.
|
|
//
|
|
hr = DPNH_OK;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
fSetPrivateAddresses = FALSE;
|
|
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
|
|
|
|
//
|
|
// Move to the next mapping. Don't increment index since we just
|
|
// deleted the previous entry and everything shifts down one.
|
|
//
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pRegisteredPort != NULL)
|
|
{
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
|
|
if (fSetPrivateAddresses)
|
|
{
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
fSetPrivateAddresses = FALSE;
|
|
}
|
|
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
}
|
|
|
|
if (fOpenedRegistry)
|
|
{
|
|
RegObject.Close();
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CleanupInactiveFirewallMappings
|
|
|
|
|
|
|
|
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::RemoveAllItems"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::RemoveAllItems
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Removes all devices (de-registering with Internet gateways
|
|
// if necessary). This removes all registered port mapping
|
|
// objects and UPnP device objects, as well.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::RemoveAllItems(void)
|
|
{
|
|
HRESULT hr;
|
|
CBilink * pBilinkDevice;
|
|
CDevice * pDevice;
|
|
CBilink * pBilinkRegisteredPort;
|
|
CRegisteredPort * pRegisteredPort;
|
|
CUPnPDevice * pUPnPDevice;
|
|
|
|
|
|
DPFX(DPFPREP, 7, "(0x%p) Enter", this);
|
|
|
|
|
|
pBilinkDevice = this->m_blDevices.GetNext();
|
|
while (pBilinkDevice != &this->m_blDevices)
|
|
{
|
|
DNASSERT(! pBilinkDevice->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilinkDevice);
|
|
pBilinkDevice = pBilinkDevice->GetNext();
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Destroying device 0x%p.",
|
|
pDevice);
|
|
|
|
|
|
pDevice->m_blList.RemoveFromList();
|
|
|
|
|
|
//
|
|
// All of the device's registered ports are implicitly freed.
|
|
//
|
|
|
|
pBilinkRegisteredPort = pDevice->m_blOwnedRegPorts.GetNext();
|
|
|
|
while (pBilinkRegisteredPort != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilinkRegisteredPort->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilinkRegisteredPort);
|
|
pBilinkRegisteredPort = pBilinkRegisteredPort->GetNext();
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Destroying registered port 0x%p (under device 0x%p).",
|
|
pRegisteredPort, pDevice);
|
|
|
|
|
|
//
|
|
// Unmap on UPnP server if necessary.
|
|
//
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
hr = this->UnmapUPnPPort(pRegisteredPort,
|
|
pRegisteredPort->GetNumAddresses(), // free all ports
|
|
TRUE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't delete UPnP registered port 0x%p mapping (err = 0x%lx)! Ignoring.",
|
|
pRegisteredPort, hr);
|
|
|
|
//
|
|
// Continue anyway, so we can finish cleaning up the object.
|
|
//
|
|
}
|
|
|
|
DNASSERT(! pRegisteredPort->HasUPnPPublicAddresses());
|
|
|
|
pRegisteredPort->NoteNotPermanentUPnPLease();
|
|
pRegisteredPort->NoteNotUPnPPortUnavailable();
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Then unmap from the local firewall, if necessary.
|
|
//
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
//
|
|
// Unmap the port.
|
|
//
|
|
// Alert the user since this is unexpected.
|
|
//
|
|
hr = this->UnmapPortOnLocalHNetFirewall(pRegisteredPort,
|
|
TRUE,
|
|
TRUE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed unmapping registered port 0x%p on local HomeNet firewall (err = 0x%lx)! Ignoring.",
|
|
pRegisteredPort, hr);
|
|
|
|
pRegisteredPort->NoteNotMappedOnHNetFirewall();
|
|
pRegisteredPort->NoteNotHNetFirewallMappingBuiltIn();
|
|
|
|
//
|
|
// Continue anyway, so we can finish cleaning up the object.
|
|
//
|
|
}
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
DNASSERT(pRegisteredPort->m_blGlobalList.IsListMember(&this->m_blRegisteredPorts));
|
|
pRegisteredPort->m_blGlobalList.RemoveFromList();
|
|
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
|
|
|
|
//
|
|
// The user implicitly released this port.
|
|
//
|
|
pRegisteredPort->ClearAllUserRefs();
|
|
|
|
delete pRegisteredPort;
|
|
}
|
|
|
|
|
|
//
|
|
// The device's UPnP gateway is implicitly removed.
|
|
//
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
if ((pUPnPDevice->IsConnecting()) || (pUPnPDevice->IsConnected()))
|
|
{
|
|
if (this->m_pfnshutdown(pUPnPDevice->GetControlSocket(), 0) != 0)
|
|
{
|
|
#ifdef DBG
|
|
int iError;
|
|
|
|
|
|
iError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Failed shutting down UPnP device 0x%p's control socket (err = %u)! Ignoring.",
|
|
pUPnPDevice, iError);
|
|
#endif // DBG
|
|
}
|
|
}
|
|
|
|
pUPnPDevice->ClearDeviceOwner();
|
|
DNASSERT(pUPnPDevice->m_blList.IsListMember(&this->m_blUPnPDevices));
|
|
pUPnPDevice->m_blList.RemoveFromList();
|
|
//
|
|
// Transfer list reference to our pointer, since GetUPnPDevice did
|
|
// not give us one.
|
|
//
|
|
|
|
this->m_pfnclosesocket(pUPnPDevice->GetControlSocket());
|
|
pUPnPDevice->SetControlSocket(INVALID_SOCKET);
|
|
|
|
pUPnPDevice->ClearLocationURL();
|
|
pUPnPDevice->ClearUSN();
|
|
pUPnPDevice->ClearServiceControlURL();
|
|
pUPnPDevice->DestroyReceiveBuffer();
|
|
pUPnPDevice->RemoveAllCachedMappings();
|
|
|
|
pUPnPDevice->DecRef();
|
|
pUPnPDevice = NULL;
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// If we used the HomeNet firewall API to open a hole for UPnP
|
|
// discovery multicasts, close it.
|
|
//
|
|
if (pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall())
|
|
{
|
|
hr = this->CloseDevicesUPnPDiscoveryPort(pDevice, NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't close device 0x%p's UPnP discovery socket's port on firewall (err = 0x%lx)! Ignoring.",
|
|
pDevice, hr);
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
pDevice->NoteNotUPnPDiscoverySocketMappedOnHNetFirewall();
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
//
|
|
// Close the socket.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP)
|
|
{
|
|
this->m_pfnclosesocket(pDevice->GetUPnPDiscoverySocket());
|
|
pDevice->SetUPnPDiscoverySocket(INVALID_SOCKET);
|
|
}
|
|
|
|
|
|
//
|
|
// Now we can dump the device object.
|
|
//
|
|
delete pDevice;
|
|
}
|
|
|
|
|
|
//
|
|
// Removing all the devices normally removes all the registered ports, but
|
|
// there may still be more wildcard ports that were never associated with
|
|
// any device.
|
|
//
|
|
|
|
pBilinkRegisteredPort = this->m_blUnownedPorts.GetNext();
|
|
while (pBilinkRegisteredPort != &this->m_blUnownedPorts)
|
|
{
|
|
DNASSERT(! pBilinkRegisteredPort->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilinkRegisteredPort);
|
|
pBilinkRegisteredPort = pBilinkRegisteredPort->GetNext();
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Destroying unowned registered port 0x%p.",
|
|
pRegisteredPort);
|
|
|
|
|
|
pRegisteredPort->m_blDeviceList.RemoveFromList();
|
|
DNASSERT(pRegisteredPort->m_blGlobalList.IsListMember(&this->m_blRegisteredPorts));
|
|
pRegisteredPort->m_blGlobalList.RemoveFromList();
|
|
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
DNASSERT(! pRegisteredPort->IsMappedOnHNetFirewall());
|
|
DNASSERT(! pRegisteredPort->IsHNetFirewallPortUnavailable());
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
DNASSERT(! pRegisteredPort->HasUPnPPublicAddresses());
|
|
DNASSERT(! pRegisteredPort->IsUPnPPortUnavailable());
|
|
|
|
//
|
|
// The user implicitly released this port.
|
|
//
|
|
pRegisteredPort->ClearAllUserRefs();
|
|
|
|
delete pRegisteredPort;
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
DNASSERT(this->m_blRegisteredPorts.IsEmpty());
|
|
DNASSERT(this->m_blUPnPDevices.IsEmpty());
|
|
|
|
|
|
//
|
|
// Print all items still in the registry.
|
|
//
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
this->DebugPrintActiveFirewallMappings();
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
this->DebugPrintActiveNATMappings();
|
|
#endif // DBG
|
|
|
|
|
|
|
|
|
|
DPFX(DPFPREP, 7, "(0x%p) Leave", this);
|
|
} // CNATHelpUPnP::RemoveAllItems
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::FindMatchingDevice"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::FindMatchingDevice
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Searches the list of devices for the object matching the
|
|
// given address, or NULL if one could not be found. If the
|
|
// address is INADDR_ANY, then the first device with a remote NAT
|
|
// is selected. If none exist, then the first device with a local
|
|
// firewall is selected.
|
|
//
|
|
// If fUseAllInfoSources is TRUE, the list of registered ports
|
|
// associated with devices is searched first for an exact match to
|
|
// the address passed in. If that fails, then devices are
|
|
// searched as above. In addition, if the address is INADDR_ANY,
|
|
/// the first device with a local NAT can be selected.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// SOCKADDR_IN * psaddrinMatch - Pointer to address to look up.
|
|
// BOOL fUseAllInfoSources - Whether all possible sources of
|
|
// information should be considered.
|
|
//
|
|
// Returns: CDevice
|
|
// NULL if no match, valid object otherwise.
|
|
//=============================================================================
|
|
CDevice * CNATHelpUPnP::FindMatchingDevice(const SOCKADDR_IN * const psaddrinMatch,
|
|
const BOOL fUseAllInfoSources)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fUpdatedDeviceList = FALSE;
|
|
CDevice * pDeviceUPnPGateway = NULL;
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
CDevice * pDeviceLocalHNetFirewall = NULL;
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
SOCKADDR_IN * pasaddrinTemp;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
CDevice * pDevice;
|
|
DWORD dwTemp;
|
|
|
|
|
|
do
|
|
{
|
|
//
|
|
// First, make sure there are devices to choose from.
|
|
//
|
|
if (this->m_blDevices.IsEmpty())
|
|
{
|
|
DPFX(DPFPREP, 0, "No devices, can't match address %u.%u.%u.%u!",
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b4);
|
|
pDevice = NULL;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// It's possible that the address we're trying to match is an already
|
|
// registered port. Look through all owned port mappings for this
|
|
// address, if we're allowed.
|
|
//
|
|
if (fUseAllInfoSources)
|
|
{
|
|
pBilink = this->m_blRegisteredPorts.GetNext();
|
|
while (pBilink != &this->m_blRegisteredPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_GLOBAL_BILINK(pBilink);
|
|
|
|
//
|
|
// Only check this registered port if it has an owning device.
|
|
//
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
if (pDevice != NULL)
|
|
{
|
|
//
|
|
// Check each port in the array.
|
|
//
|
|
pasaddrinTemp = pRegisteredPort->GetPrivateAddressesArray();
|
|
for(dwTemp = 0; dwTemp < pRegisteredPort->GetNumAddresses(); dwTemp++)
|
|
{
|
|
//
|
|
// If the address matches, we have a winner.
|
|
//
|
|
if ((pasaddrinTemp[dwTemp].sin_addr.S_un.S_addr == psaddrinMatch->sin_addr.S_un.S_addr) &&
|
|
(pasaddrinTemp[dwTemp].sin_port == psaddrinMatch->sin_port))
|
|
{
|
|
DPFX(DPFPREP, 7, "Registered port 0x%p index %u matches address %u.%u.%u.%u:%u, returning owning device 0x%p.",
|
|
pRegisteredPort,
|
|
dwTemp,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinMatch->sin_port),
|
|
pDevice);
|
|
goto Exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Darn, the address is not already registered. Well, match it up with
|
|
// a device as best as possible.
|
|
//
|
|
|
|
pBilink = this->m_blDevices.GetNext();
|
|
|
|
do
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilink);
|
|
|
|
if ((pDevice->GetLocalAddressV4() == psaddrinMatch->sin_addr.S_un.S_addr))
|
|
{
|
|
DPFX(DPFPREP, 7, "Device 0x%p matches address %u.%u.%u.%u.",
|
|
pDevice,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b4);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Remember this device if it has the first remote UPnP gateway
|
|
// device we've seen.
|
|
//
|
|
if ((pDevice->GetUPnPDevice() != NULL) &&
|
|
((! pDevice->GetUPnPDevice()->IsLocal()) || (fUseAllInfoSources)) &&
|
|
(pDeviceUPnPGateway == NULL))
|
|
{
|
|
pDeviceUPnPGateway = pDevice;
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Remember this device if it has the first HomeNet firewall we've
|
|
// seen.
|
|
//
|
|
if ((pDevice->IsHNetFirewalled()) &&
|
|
(pDeviceLocalHNetFirewall == NULL))
|
|
{
|
|
pDeviceLocalHNetFirewall = pDevice;
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Device 0x%p does not match address %u.%u.%u.%u.",
|
|
pDevice,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b4);
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
while (pBilink != &this->m_blDevices);
|
|
|
|
|
|
//
|
|
// If we got here, there's no matching device. It might be because the
|
|
// caller detected an address change faster than we did. Try updating
|
|
// our device list and searching again (if we haven't already).
|
|
//
|
|
|
|
if (fUpdatedDeviceList)
|
|
{
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Don't bother updating the list to match INADDR_ANY, we know that
|
|
// will never match anything.
|
|
//
|
|
if (psaddrinMatch->sin_addr.S_un.S_addr == INADDR_ANY)
|
|
{
|
|
DPFX(DPFPREP, 7, "Couldn't find matching device for INADDR_ANY, as expected.");
|
|
break;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Couldn't find matching device for %u.%u.%u.%u, updating device list and searching again.",
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b4);
|
|
|
|
|
|
hr = this->CheckForNewDevices(&fUpdatedDeviceList);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't check for new devices (0x%lx), continuing.",
|
|
hr);
|
|
//
|
|
// Hmm, we have to treat it as non-fatal. Don't search again,
|
|
// though.
|
|
//
|
|
break;
|
|
}
|
|
|
|
//
|
|
// If we didn't actually get any new devices, don't bother searching
|
|
// again.
|
|
//
|
|
if (! fUpdatedDeviceList)
|
|
{
|
|
break;
|
|
}
|
|
|
|
//
|
|
// fUpdatedDeviceList is set to TRUE so we'll only loop one more time.
|
|
//
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// If we got here, there's still no matching device. If it's the wildcard
|
|
// value, that's to be expected, but we need to pick a device in the
|
|
// following order:
|
|
// 1. device has an Internet gateway
|
|
// 2. device has a firewall
|
|
// If none of those exists or it's not the wildcard value, we have to give
|
|
// up.
|
|
//
|
|
if (psaddrinMatch->sin_addr.S_un.S_addr == INADDR_ANY)
|
|
{
|
|
if (pDeviceUPnPGateway != NULL)
|
|
{
|
|
pDevice = pDeviceUPnPGateway;
|
|
|
|
DPFX(DPFPREP, 1, "Picking device 0x%p with UPnP gateway device to match INADDR_ANY.",
|
|
pDevice);
|
|
}
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
else if (pDeviceLocalHNetFirewall != NULL)
|
|
{
|
|
pDevice = pDeviceLocalHNetFirewall;
|
|
|
|
DPFX(DPFPREP, 1, "Picking device 0x%p with local HomeNet firewall to match INADDR_ANY.",
|
|
pDevice);
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
else
|
|
{
|
|
pDevice = NULL;
|
|
|
|
DPFX(DPFPREP, 1, "No suitable device to match INADDR_ANY.");
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pDevice = NULL;
|
|
|
|
DPFX(DPFPREP, 7, "No devices match address %u.%u.%u.%u.",
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinMatch->sin_addr.S_un.S_un_b.s_b4);
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
return pDevice;
|
|
} // CNATHelpUPnP::FindMatchingDevice
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ExtendAllExpiringLeases"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ExtendAllExpiringLeases
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Renews any port leases that are close to expiring (within 2
|
|
// minutes of expiration time).
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Lease extension was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::ExtendAllExpiringLeases(void)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
CDevice * pDevice;
|
|
DWORD dwLeaseTimeRemaining;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Enter");
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
|
|
|
|
//
|
|
// Walk the list of all registered ports and check for leases that need to
|
|
// be extended.
|
|
// The lock is already held.
|
|
//
|
|
|
|
pBilink = this->m_blRegisteredPorts.GetNext();
|
|
|
|
while (pBilink != (&this->m_blRegisteredPorts))
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_GLOBAL_BILINK(pBilink);
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
|
|
|
|
//
|
|
// If the port is registered with the UPnP device, extend that lease,
|
|
// if necessary.
|
|
//
|
|
if ((pRegisteredPort->HasUPnPPublicAddresses()) &&
|
|
(! pRegisteredPort->HasPermanentUPnPLease()))
|
|
{
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
|
|
dwLeaseTimeRemaining = pRegisteredPort->GetUPnPLeaseExpiration() - GETTIMESTAMP();
|
|
|
|
if (dwLeaseTimeRemaining < LEASE_RENEW_TIME)
|
|
{
|
|
hr = this->ExtendUPnPLease(pRegisteredPort);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't extend port mapping lease on remote UPnP device (0x%lx)! Ignoring.", hr);
|
|
|
|
//
|
|
// We'll treat this as non-fatal, but we have to dump the
|
|
// server. This may have already been done, but doing it
|
|
// twice shouldn't be harmful.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// The local firewall never uses leases, no need to extend.
|
|
//
|
|
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
} // CNATHelpUPnP::ExtendAllExpiringLeases
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::UpdateServerStatus"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::UpdateServerStatus
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Checks to see if any Internet gateways have stopped
|
|
// responding or are now available.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The update was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::UpdateServerStatus(void)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
DWORD dwMinUpdateServerStatusInterval;
|
|
DWORD dwCurrentTime;
|
|
CBilink * pBilink;
|
|
CDevice * pDevice;
|
|
CUPnPDevice * pUPnPDevice = NULL;
|
|
CDevice * pDeviceRemoteUPnPGateway = NULL;
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
CDevice * pDeviceLocalHNetFirewall = NULL;
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
BOOL fSendRemoteGatewayDiscovery;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Enter");
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
|
|
|
|
//
|
|
// Cache the current value of the global. This should be atomic so no need
|
|
// to take the globals lock.
|
|
//
|
|
dwMinUpdateServerStatusInterval = g_dwMinUpdateServerStatusInterval;
|
|
|
|
|
|
//
|
|
// Capture the current time.
|
|
//
|
|
dwCurrentTime = GETTIMESTAMP();
|
|
|
|
|
|
//
|
|
// If this isn't the first time to update server status, but it hasn't been
|
|
// very long since we last checked, don't. This will prevent unnecessary
|
|
// network traffic if GetCaps is called frequently (in response to many
|
|
// alert events, for example).
|
|
//
|
|
// However, if we just found a new device, update the status anyway.
|
|
//
|
|
if (this->m_dwLastUpdateServerStatusTime != 0)
|
|
{
|
|
if ((dwCurrentTime - this->m_dwLastUpdateServerStatusTime) < dwMinUpdateServerStatusInterval)
|
|
{
|
|
if (! (this->m_dwFlags & NATHELPUPNPOBJ_DEVICECHANGED))
|
|
{
|
|
DPFX(DPFPREP, 5, "Server status was just updated at %u, not updating again (time = %u, min interval = %u).",
|
|
this->m_dwLastUpdateServerStatusTime,
|
|
dwCurrentTime,
|
|
dwMinUpdateServerStatusInterval);
|
|
|
|
//
|
|
// hr == DPNH_OK
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Server status was just updated at %u (time = %u, min interval = %u), but there was a device change that may affect things.",
|
|
this->m_dwLastUpdateServerStatusTime,
|
|
dwCurrentTime,
|
|
dwMinUpdateServerStatusInterval);
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// If we're allowed to keep polling for remote gateways after startup,
|
|
// do so. Otherwise, only do it if a device has changed or a port has
|
|
// been registered since our last check.
|
|
//
|
|
if ((g_fKeepPollingForRemoteGateway) ||
|
|
(this->m_dwFlags & NATHELPUPNPOBJ_DEVICECHANGED) ||
|
|
(this->m_dwFlags & NATHELPUPNPOBJ_PORTREGISTERED))
|
|
{
|
|
fSendRemoteGatewayDiscovery = TRUE;
|
|
}
|
|
else
|
|
{
|
|
fSendRemoteGatewayDiscovery = FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// We always poll for new remote gateways during startup.
|
|
//
|
|
fSendRemoteGatewayDiscovery = TRUE;
|
|
}
|
|
|
|
|
|
//
|
|
// Prevent the timer from landing exactly on 0.
|
|
//
|
|
if (dwCurrentTime == 0)
|
|
{
|
|
dwCurrentTime = 1;
|
|
}
|
|
this->m_dwLastUpdateServerStatusTime = dwCurrentTime;
|
|
|
|
|
|
//
|
|
// Turn off the 'device changed' and 'port registered' flags, if they were
|
|
// on.
|
|
//
|
|
this->m_dwFlags &= ~(NATHELPUPNPOBJ_DEVICECHANGED | NATHELPUPNPOBJ_PORTREGISTERED);
|
|
|
|
|
|
//
|
|
// Locate any new UPnP devices.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP)
|
|
{
|
|
//
|
|
// We're not listening on the UPnP multicast address and can't hear
|
|
// unsolicited new device announcements. In order to detect new
|
|
// devices, we need to resend the discovery request periodically so
|
|
// that responses get sent directly to our listening socket.
|
|
//
|
|
hr = this->CheckForUPnPAnnouncements(g_dwUPnPAnnounceResponseWaitTime,
|
|
fSendRemoteGatewayDiscovery);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't check for UPnP announcements!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using UPnP.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// Loop through all the devices.
|
|
//
|
|
pBilink = this->m_blDevices.GetNext();
|
|
while (pBilink != &this->m_blDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilink);
|
|
|
|
|
|
//
|
|
// This might be a new device, so register any ports with this address
|
|
// that were previously unowned (because this device's address was
|
|
// unknown at the time).
|
|
//
|
|
hr = this->RegisterPreviouslyUnownedPortsWithDevice(pDevice, FALSE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't register previously unowned ports with device 0x%p!.",
|
|
pDevice);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEHNETFWAPI)
|
|
{
|
|
//
|
|
// See if the local firewall state has changed.
|
|
//
|
|
hr = this->CheckForLocalHNetFirewallAndMapPorts(pDevice, NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't check for local HNet firewall and map ports (err = 0x%lx)! Ignoring.",
|
|
hr);
|
|
DNASSERT(! pDevice->IsHNetFirewalled());
|
|
hr = DPNH_OK;
|
|
}
|
|
|
|
|
|
//
|
|
// If there's a local firewall, remember the device if it's the
|
|
// first one we've found.
|
|
//
|
|
if ((pDevice->IsHNetFirewalled()) &&
|
|
(pDeviceLocalHNetFirewall == NULL))
|
|
{
|
|
pDeviceLocalHNetFirewall = pDevice;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using firewall traversal.
|
|
//
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEUPNP)
|
|
{
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
//
|
|
// GetUPnPDevice did not add a reference to pUPnPDevice for us.
|
|
//
|
|
pUPnPDevice->AddRef();
|
|
|
|
|
|
//
|
|
// Update the public addresses for the UPnP device, if any.
|
|
//
|
|
hr = this->UpdateUPnPExternalAddress(pUPnPDevice, TRUE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed updating UPnP device external address!");
|
|
|
|
//
|
|
// It may have been cleared already, but doing it twice
|
|
// shouldn't be harmful.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
|
|
hr = DPNH_OK;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Save this UPnP device, if it's the first one we've
|
|
// found and it's not local.
|
|
//
|
|
if ((pDeviceRemoteUPnPGateway == NULL) &&
|
|
(! pUPnPDevice->IsLocal()))
|
|
{
|
|
pDeviceRemoteUPnPGateway = pDevice;
|
|
}
|
|
}
|
|
|
|
pUPnPDevice->DecRef();
|
|
pUPnPDevice = NULL;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// No UPnP device.
|
|
//
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using UPnP.
|
|
//
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// Some new servers may have come online. If so, we can now map wildcard
|
|
// ports that were registered previously. Figure out which device that is.
|
|
//
|
|
if (pDeviceRemoteUPnPGateway != NULL)
|
|
{
|
|
pDevice = pDeviceRemoteUPnPGateway;
|
|
}
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
else if (pDeviceLocalHNetFirewall != NULL)
|
|
{
|
|
pDevice = pDeviceLocalHNetFirewall;
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
else
|
|
{
|
|
pDevice = NULL;
|
|
}
|
|
|
|
if (pDevice != NULL)
|
|
{
|
|
//
|
|
// Register any wildcard ports that are unowned with this best device.
|
|
//
|
|
hr = this->RegisterPreviouslyUnownedPortsWithDevice(pDevice, TRUE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't register unowned wildcard ports with device 0x%p!.",
|
|
pDevice);
|
|
goto Failure;
|
|
}
|
|
}
|
|
#ifdef DBG
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "No devices have a UPnP gateway device or a local HomeNet firewall.");
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Spent %u ms updating server status, starting at %u.",
|
|
(GETTIMESTAMP() - dwCurrentTime), dwCurrentTime);
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::UpdateServerStatus
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::RegisterPreviouslyUnownedPortsWithDevice"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::RegisterPreviouslyUnownedPortsWithDevice
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Associates unknown ports with the given device, and
|
|
// registers them with the device's UPnP device or firewall.
|
|
//
|
|
// If fWildcardToo is FALSE, only previously unowned ports that
|
|
// match the device's address are associated. If TRUE, unowned
|
|
// INADDR_ANY ports are associated as well.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device to take ownership of ports.
|
|
// BOOL fAll - Whether all ports should be associated.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The extension was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::RegisterPreviouslyUnownedPortsWithDevice(CDevice * const pDevice,
|
|
const BOOL fWildcardToo)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
SOCKADDR_IN * pasaddrinPrivate;
|
|
CUPnPDevice * pUPnPDevice;
|
|
#ifdef DBG
|
|
BOOL fAssignedPort = FALSE;
|
|
IN_ADDR inaddrTemp;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %i)",
|
|
this, pDevice, fWildcardToo);
|
|
|
|
|
|
//
|
|
// Loop through all unowned ports, assign them to the device if
|
|
// appropriate, then register them.
|
|
//
|
|
pBilink = this->m_blUnownedPorts.GetNext();
|
|
while (pBilink != &this->m_blUnownedPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilink);
|
|
pBilink = pBilink->GetNext();
|
|
|
|
//
|
|
// The registered port must match the device's address in order to
|
|
// associate them. If wildcards are allowed, then INADDR_ANY
|
|
// registrations can be associated, too.
|
|
//
|
|
//
|
|
// All addresses should be same (if there are more than one), so just
|
|
// compare the first one in the array.
|
|
//
|
|
pasaddrinPrivate = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
if (pasaddrinPrivate[0].sin_addr.S_un.S_addr != pDevice->GetLocalAddressV4())
|
|
{
|
|
if (pasaddrinPrivate[0].sin_addr.S_un.S_addr != INADDR_ANY)
|
|
{
|
|
DPFX(DPFPREP, 7, "Unowned registered port 0x%p private address %u.%u.%u.%u doesn't match device 0x%p's, skipping.",
|
|
pRegisteredPort,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
continue;
|
|
}
|
|
|
|
#ifdef DBG
|
|
inaddrTemp.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
#endif // DBG
|
|
|
|
if (! fWildcardToo)
|
|
{
|
|
#ifdef DBG
|
|
DPFX(DPFPREP, 7, "Unowned registered port 0x%p (INADDR_ANY) not allowed to be associated with device 0x%p (address %u.%u.%u.%u), skipping.",
|
|
pRegisteredPort,
|
|
pDevice,
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
#endif // DBG
|
|
|
|
continue;
|
|
}
|
|
|
|
#ifdef DBG
|
|
DPFX(DPFPREP, 7, "Unowned registered port 0x%p (INADDR_ANY) becoming associated with device 0x%p (address %u.%u.%u.%u).",
|
|
pRegisteredPort,
|
|
pDevice,
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
#endif // DBG
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Unowned registered port 0x%p private address %u.%u.%u.%u matches device 0x%p's, associating.",
|
|
pRegisteredPort,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinPrivate[0].sin_addr.S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
|
|
//
|
|
// The way it's currently implemented, all non-wildcard ports
|
|
// should be registered before we even try to register the wildcard
|
|
// ones.
|
|
//
|
|
DNASSERT(! fWildcardToo);
|
|
}
|
|
|
|
|
|
//
|
|
// If we made it here, we can associate the port with the device.
|
|
//
|
|
|
|
|
|
pRegisteredPort->m_blDeviceList.RemoveFromList();
|
|
pRegisteredPort->MakeDeviceOwner(pDevice);
|
|
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Start by automatically mapping with the local firewall, if there is
|
|
// one and we're allowed.
|
|
//
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEHNETFWAPI)
|
|
{
|
|
hr = this->CheckForLocalHNetFirewallAndMapPorts(pDevice, NULL);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't check for local HNet firewall and map ports (err = 0x%lx)! Ignoring.",
|
|
hr);
|
|
DNASSERT(! pDevice->IsHNetFirewalled());
|
|
hr = DPNH_OK;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using firewall traversal.
|
|
//
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
//
|
|
// Attempt to automatically map it with the (new) UPnP gateway device,
|
|
// if present.
|
|
//
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
//
|
|
// GetUPnPDevice did not add a reference to pUPnPDevice for us.
|
|
//
|
|
pUPnPDevice->AddRef();
|
|
|
|
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
|
|
hr = this->MapPortsOnUPnPDevice(pUPnPDevice, pRegisteredPort);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't map existing ports on UPnP device 0x%p!",
|
|
pUPnPDevice);
|
|
|
|
//
|
|
// It may have been cleared already, but doing it twice
|
|
// shouldn't be harmful.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
|
|
hr = DPNH_OK;
|
|
}
|
|
|
|
pUPnPDevice->DecRef();
|
|
pUPnPDevice = NULL;
|
|
}
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
if (! fAssignedPort)
|
|
{
|
|
DPFX(DPFPREP, 1, "No unowned ports were bound to device object 0x%p.",
|
|
pDevice);
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
} // CNATHelpUPnP::RegisterPreviouslyUnownedPortsWithDevice
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::SendUPnPSearchMessagesForDevice"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::SendUPnPSearchMessagesForDevice
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Sends one UPnP search message via the given device locally
|
|
// and if fRemoteAllowed is TRUE, to the multicast or gateway
|
|
// address.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device to use.
|
|
// BOOL fRemoteAllowed - Whether we can search remotely or not.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The messages were sent successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::SendUPnPSearchMessagesForDevice(CDevice * const pDevice,
|
|
const BOOL fRemoteAllowed)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
SOCKADDR_IN saddrinRemote;
|
|
SOCKADDR_IN saddrinLocal;
|
|
BOOL fTryRemote;
|
|
int iWANIPConnectionMsgSize;
|
|
int iWANPPPConnectionMsgSize;
|
|
int iReturn;
|
|
SOCKET sTemp = INVALID_SOCKET;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %i)", this, pDevice, fRemoteAllowed);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
DNASSERT(pDevice->GetUPnPDiscoverySocket() != INVALID_SOCKET);
|
|
|
|
|
|
ZeroMemory(&saddrinRemote, sizeof(saddrinRemote));
|
|
saddrinRemote.sin_family = AF_INET;
|
|
//saddrinRemote.sin_addr.S_un.S_addr = ?
|
|
saddrinRemote.sin_port = HTONS(UPNP_PORT);
|
|
|
|
|
|
//
|
|
// If we're allowed to try remotely, use the gateway's address, or the
|
|
// multicast address, as appropriate.
|
|
//
|
|
if ((fRemoteAllowed) && (! pDevice->GotRemoteUPnPDiscoveryConnReset()))
|
|
{
|
|
if (g_fUseMulticastUPnPDiscovery)
|
|
{
|
|
saddrinRemote.sin_addr.S_un.S_addr = this->m_pfninet_addr(UPNP_DISCOVERY_MULTICAST_ADDRESS);
|
|
fTryRemote = TRUE;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Try to get the device's gateway's address. This might return FALSE
|
|
// if the device does not have a gateway. In that case, we will ignore
|
|
// the device. Otherwise the address should be filled in with the
|
|
// gateway or broadcast address.
|
|
//
|
|
fTryRemote = this->GetAddressToReachGateway(pDevice,
|
|
&saddrinRemote.sin_addr);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
fTryRemote = FALSE;
|
|
}
|
|
|
|
ZeroMemory(&saddrinLocal, sizeof(saddrinLocal));
|
|
saddrinLocal.sin_family = AF_INET;
|
|
saddrinLocal.sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
saddrinLocal.sin_port = HTONS(UPNP_PORT);
|
|
|
|
|
|
//
|
|
// Note that these message strings contain:
|
|
//
|
|
// HOST: multicast_addr:port
|
|
//
|
|
// even though we send the messages to addresses other than the multicast
|
|
// address. It shouldn't matter.
|
|
//
|
|
iWANIPConnectionMsgSize = strlen(c_szUPnPMsg_Discover_Service_WANIPConnection);
|
|
iWANPPPConnectionMsgSize = strlen(c_szUPnPMsg_Discover_Service_WANPPPConnection);
|
|
|
|
|
|
#ifdef DBG
|
|
this->PrintUPnPTransactionToFile(c_szUPnPMsg_Discover_Service_WANIPConnection,
|
|
iWANIPConnectionMsgSize,
|
|
"Outbound WANIPConnection discovery messages",
|
|
pDevice);
|
|
|
|
|
|
this->PrintUPnPTransactionToFile(c_szUPnPMsg_Discover_Service_WANPPPConnection,
|
|
iWANPPPConnectionMsgSize,
|
|
"Outbound WANPPPConnection discovery messages",
|
|
pDevice);
|
|
#endif // DBG
|
|
|
|
|
|
DNASSERT(pDevice->GetUPnPDiscoverySocket() != INVALID_SOCKET);
|
|
|
|
|
|
//
|
|
// First, fire off messages to the remote gateway, if possible.
|
|
//
|
|
if (fTryRemote)
|
|
{
|
|
DPFX(DPFPREP, 7, "Sending UPnP discovery messages (WANIPConnection and WANPPPConnection) to gateway/multicast %u.%u.%u.%u:%u via device 0x%p.",
|
|
saddrinRemote.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinRemote.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinRemote.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinRemote.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinRemote.sin_port),
|
|
pDevice);
|
|
|
|
|
|
//
|
|
// Remember that we're trying remotely.
|
|
//
|
|
pDevice->NotePerformingRemoteUPnPDiscovery();
|
|
|
|
//
|
|
// Remember the current time, if this is the first thing we've sent
|
|
// from this port.
|
|
//
|
|
if (pDevice->GetFirstUPnPDiscoveryTime() == 0)
|
|
{
|
|
pDevice->SetFirstUPnPDiscoveryTime(GETTIMESTAMP());
|
|
}
|
|
|
|
|
|
//
|
|
// Multicast/send to gateway a WANIPConnection discovery message.
|
|
//
|
|
iReturn = this->m_pfnsendto(pDevice->GetUPnPDiscoverySocket(),
|
|
c_szUPnPMsg_Discover_Service_WANIPConnection,
|
|
iWANIPConnectionMsgSize,
|
|
0,
|
|
(SOCKADDR*) (&saddrinRemote),
|
|
sizeof(saddrinRemote));
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending WANIPConnection discovery to UPnP gateway/multicast address on device 0x%p! Ignoring.",
|
|
dwError, pDevice);
|
|
#endif // DBG
|
|
|
|
//
|
|
// It's possible that we caught WinSock at a bad time,
|
|
// particularly with WSAEADDRNOTAVAIL (10049), which seems to
|
|
// occur if the address is going away (and we haven't detected
|
|
// it in CheckForNewDevices yet).
|
|
//
|
|
// Ignore the error, we can survive.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
if (iReturn != iWANIPConnectionMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't multicast send entire WANIPConnection discovery datagram on device 0x%p (%i != %i)?!",
|
|
pDevice, iReturn, iWANIPConnectionMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
|
|
//
|
|
// Multicast/send to gateway a WANPPPConnection discovery message.
|
|
//
|
|
iReturn = this->m_pfnsendto(pDevice->GetUPnPDiscoverySocket(),
|
|
c_szUPnPMsg_Discover_Service_WANPPPConnection,
|
|
iWANPPPConnectionMsgSize,
|
|
0,
|
|
(SOCKADDR*) (&saddrinRemote),
|
|
sizeof(saddrinRemote));
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending WANPPPConnection discovery to UPnP multicast/gateway address on device 0x%p! Ignoring.",
|
|
dwError, pDevice);
|
|
#endif // DBG
|
|
|
|
//
|
|
// It's possible that we caught WinSock at a bad time,
|
|
// particularly with WSAEADDRNOTAVAIL (10049), which seems to
|
|
// occur if the address is going away (and we haven't detected
|
|
// it in CheckForNewDevices yet).
|
|
//
|
|
// Ignore the error, we can survive.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
if (iReturn != iWANPPPConnectionMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't multicast send entire WANPPPConnection discovery datagram on device 0x%p (%i != %i)?!",
|
|
pDevice, iReturn, iWANPPPConnectionMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 2, "Device 0x%p should not attempt to reach a remote gateway.",
|
|
pDevice);
|
|
|
|
|
|
//
|
|
// Remember that we're not trying remotely.
|
|
//
|
|
pDevice->NoteNotPerformingRemoteUPnPDiscovery();
|
|
}
|
|
|
|
|
|
//
|
|
// If we didn't already get a CONNRESET from a previous attempt, try to
|
|
// bind a socket locally to the UPnP discovery port. If it's not in use,
|
|
// then we know nobody will be listening so there's no point in trying the
|
|
// local address. If it is in use, then this computer might be a UPnP
|
|
// gateway itself.
|
|
//
|
|
if (! pDevice->GotLocalUPnPDiscoveryConnReset())
|
|
{
|
|
sTemp = this->m_pfnsocket(AF_INET, SOCK_DGRAM, IPPROTO_UDP);
|
|
if (sTemp == INVALID_SOCKET)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't create temporary datagram socket, error = %u!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (this->m_pfnbind(sTemp,
|
|
(SOCKADDR *) (&saddrinLocal),
|
|
sizeof(saddrinLocal)) != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 2, "Couldn't bind socket to UPnP discovery port (%u.%u.%u.%u:%u), assuming local device (error = %u).",
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinLocal.sin_port),
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Remember that we're trying locally.
|
|
//
|
|
pDevice->NotePerformingLocalUPnPDiscovery();
|
|
|
|
//
|
|
// Remember the current time, if this is the first thing we've sent
|
|
// from this port.
|
|
//
|
|
if (pDevice->GetFirstUPnPDiscoveryTime() == 0)
|
|
{
|
|
pDevice->SetFirstUPnPDiscoveryTime(GETTIMESTAMP());
|
|
}
|
|
|
|
|
|
//
|
|
// Do WANIPConnection first.
|
|
//
|
|
|
|
DPFX(DPFPREP, 7, "Sending UPnP discovery messages (WANIPConnection and WANPPPConnection) locally to device 0x%p (address %u.%u.%u.%u:%u).",
|
|
pDevice,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinLocal.sin_port));
|
|
|
|
|
|
|
|
iReturn = this->m_pfnsendto(pDevice->GetUPnPDiscoverySocket(),
|
|
c_szUPnPMsg_Discover_Service_WANIPConnection,
|
|
iWANIPConnectionMsgSize,
|
|
0,
|
|
(SOCKADDR*) (&saddrinLocal),
|
|
sizeof(saddrinLocal));
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending WANIPConnection discovery to local address on device 0x%p! Ignoring.",
|
|
dwError, pDevice);
|
|
#endif // DBG
|
|
|
|
//
|
|
// It's possible that we caught WinSock at a bad time,
|
|
// particularly with WSAEADDRNOTAVAIL (10049), which seems to
|
|
// occur if the address is going away (and we haven't detected
|
|
// it in CheckForNewDevices yet).
|
|
//
|
|
// Ignore the error, we can survive.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
if (iReturn != iWANIPConnectionMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't send entire WANIPConnection discovery datagram locally on device 0x%p (%i != %i)?!",
|
|
pDevice, iReturn, iWANIPConnectionMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Now send WANPPPConnection discovery message locally.
|
|
//
|
|
iReturn = this->m_pfnsendto(pDevice->GetUPnPDiscoverySocket(),
|
|
c_szUPnPMsg_Discover_Service_WANPPPConnection,
|
|
iWANPPPConnectionMsgSize,
|
|
0,
|
|
(SOCKADDR*) (&saddrinLocal),
|
|
sizeof(saddrinLocal));
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending WANPPPConnection discovery to local address on device 0x%p! Ignoring.",
|
|
dwError, pDevice);
|
|
#endif // DBG
|
|
|
|
//
|
|
// It's possible that we caught WinSock at a bad time,
|
|
// particularly with WSAEADDRNOTAVAIL (10049), which seems to
|
|
// occur if the address is going away (and we haven't detected
|
|
// it in CheckForNewDevices yet).
|
|
//
|
|
// Ignore the error, we can survive.
|
|
//
|
|
}
|
|
else
|
|
{
|
|
if (iReturn != iWANPPPConnectionMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't send entire WANPPPConnection discovery datagram locally on device 0x%p (%i != %i)?!",
|
|
pDevice, iReturn, iWANPPPConnectionMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 2, "Successfully bound socket to UPnP discovery port (%u.%u.%u.%u:%u), assuming no local UPnP device.",
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinLocal.sin_port));
|
|
|
|
//
|
|
// Remember that we're not trying locally.
|
|
//
|
|
pDevice->NoteNotPerformingLocalUPnPDiscovery();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// We got a CONNRESET last time.
|
|
//
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
if (sTemp != INVALID_SOCKET)
|
|
{
|
|
this->m_pfnclosesocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::SendUPnPSearchMessagesForDevice
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::SendUPnPDescriptionRequest"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::SendUPnPDescriptionRequest
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Requests a description from the given UPnP device.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device to use.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The message was sent successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::SendUPnPDescriptionRequest(CUPnPDevice * const pUPnPDevice)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
SOCKADDR_IN * psaddrinHost;
|
|
TCHAR tszHost[22]; // "xxx.xxx.xxx.xxx:xxxxx" + NULL termination
|
|
char * pszMessage = NULL;
|
|
int iMsgSize;
|
|
int iReturn;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p)", this, pUPnPDevice);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
DNASSERT(pUPnPDevice->IsConnected());
|
|
DNASSERT(pUPnPDevice->GetLocationURL() != NULL);
|
|
|
|
|
|
psaddrinHost = pUPnPDevice->GetHostAddress();
|
|
|
|
wsprintf(tszHost, _T("%u.%u.%u.%u:%u"),
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinHost->sin_port));
|
|
|
|
iMsgSize = strlen("GET ") + strlen(pUPnPDevice->GetLocationURL()) + strlen(" " HTTP_VERSION EOL)
|
|
+ strlen("HOST: ") + _tcslen(tszHost) + strlen(EOL)
|
|
+ strlen("ACCEPT-LANGUAGE: en" EOL)
|
|
+ strlen(EOL);
|
|
|
|
|
|
pszMessage = (char*) DNMalloc(iMsgSize + 1); // include room for NULL termination that isn't actually sent
|
|
if (pszMessage == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
strcpy(pszMessage, "GET ");
|
|
strcat(pszMessage, pUPnPDevice->GetLocationURL());
|
|
strcat(pszMessage, " " HTTP_VERSION EOL);
|
|
strcat(pszMessage, "HOST: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszHost,
|
|
(_tcslen(tszHost) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszHost);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "ACCEPT-LANGUAGE: en" EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
#ifdef DBG
|
|
this->PrintUPnPTransactionToFile(pszMessage,
|
|
iMsgSize,
|
|
"Outbound description request",
|
|
pUPnPDevice->GetOwningDevice());
|
|
#endif // DBG
|
|
|
|
iReturn = this->m_pfnsend(pUPnPDevice->GetControlSocket(),
|
|
pszMessage,
|
|
iMsgSize,
|
|
0);
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending to UPnP device!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (iReturn != iMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't send entire message (%i != %i)?!", iReturn, iMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::SendUPnPDescriptionRequest
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::UpdateUPnPExternalAddress"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::UpdateUPnPExternalAddress
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Retreives the current external address for the given UPnP
|
|
// Internet Gateway Device.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device that should be
|
|
// updated.
|
|
// BOOL fUpdateRegisteredPorts - TRUE if existing registered ports should be
|
|
// updated to reflect the new address if it
|
|
// changed, FALSE if not.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The update was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
// DPNHERR_SERVERNOTRESPONDING - The server did not respond to the
|
|
// message.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::UpdateUPnPExternalAddress(CUPnPDevice * const pUPnPDevice,
|
|
const BOOL fUpdateRegisteredPorts)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fStartedWaitingForControlResponse = FALSE;
|
|
CDevice * pDevice;
|
|
SOCKADDR_IN * psaddrinTemp;
|
|
int iContentLength;
|
|
TCHAR tszContentLength[32];
|
|
TCHAR tszHost[22]; // "xxx.xxx.xxx.xxx:xxxxx" + NULL termination
|
|
char * pszMessage = NULL;
|
|
int iMsgSize;
|
|
int iPrevMsgSize = 0;
|
|
int iReturn;
|
|
UPNP_CONTROLRESPONSE_INFO RespInfo;
|
|
DWORD dwStartTime;
|
|
DWORD dwTimeout;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %i)",
|
|
this, pUPnPDevice, fUpdateRegisteredPorts);
|
|
|
|
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & (NATHELPUPNPOBJ_INITIALIZED | NATHELPUPNPOBJ_USEUPNP));
|
|
|
|
DNASSERT(pUPnPDevice->GetServiceControlURL() != NULL);
|
|
|
|
//
|
|
// If the control socket got disconnected after the last message, then
|
|
// reconnect.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
hr = this->ReconnectUPnPControlSocket(pUPnPDevice);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't reconnect UPnP control socket!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
|
|
|
|
psaddrinTemp = pUPnPDevice->GetHostAddress();
|
|
wsprintf(tszHost, _T("%u.%u.%u.%u:%u"),
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinTemp->sin_port));
|
|
|
|
|
|
/*
|
|
iContentLength = strlen("<s:Envelope" EOL)
|
|
+ strlen(" xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL)
|
|
+ strlen(" s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL)
|
|
+ strlen(" <s:Body>" EOL)
|
|
+ strlen(" <u:" CONTROL_QUERYSTATEVARIABLE_A " xmlns:u=\"" URI_CONTROL_A "\">" EOL)
|
|
+ strlen(" <u:" ARG_CONTROL_VARNAME_A ">" VAR_EXTERNALIPADDRESS_A "</u:" ARG_CONTROL_VARNAME_A ">" EOL)
|
|
+ strlen(" </u:" CONTROL_QUERYSTATEVARIABLE_A ">" EOL)
|
|
+ strlen(" </s:Body>" EOL)
|
|
+ strlen("</s:Envelope>" EOL)
|
|
+ strlen(EOL);
|
|
|
|
wsprintf(tszContentLength, _T("%i"), iContentLength);
|
|
|
|
iMsgSize = strlen("POST ") + strlen(pUPnPDevice->GetServiceControlURL()) + strlen(" " HTTP_VERSION EOL)
|
|
+ strlen("HOST: ") + _tcslen(tszHost) + strlen(EOL)
|
|
+ strlen("CONTENT-LENGTH: ") + strlen(szContentLength) + strlen(EOL)
|
|
+ strlen("CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL)
|
|
+ strlen("SOAPACTION: " URI_CONTROL_A "#" CONTROL_QUERYSTATEVARIABLE_A "" EOL)
|
|
+ strlen(EOL)
|
|
+ iContentLength;
|
|
*/
|
|
iContentLength = strlen("<s:Envelope" EOL)
|
|
+ strlen(" xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL)
|
|
+ strlen(" s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL)
|
|
+ strlen(" <s:Body>" EOL)
|
|
+ strlen(" <u:" ACTION_GETEXTERNALIPADDRESS_A " xmlns:u=\"") + pUPnPDevice->GetStaticServiceURILength() + strlen("\">" EOL)
|
|
+ strlen(" </u:" ACTION_GETEXTERNALIPADDRESS_A ">" EOL)
|
|
+ strlen(" </s:Body>" EOL)
|
|
+ strlen("</s:Envelope>" EOL)
|
|
+ strlen(EOL);
|
|
|
|
wsprintf(tszContentLength, _T("%i"), iContentLength);
|
|
|
|
iMsgSize = strlen("POST ") + strlen(pUPnPDevice->GetServiceControlURL()) + strlen(" " HTTP_VERSION EOL)
|
|
+ strlen("HOST: ") + _tcslen(tszHost) + strlen(EOL)
|
|
+ strlen("CONTENT-LENGTH: ") + _tcslen(tszContentLength) + strlen(EOL)
|
|
+ strlen("CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL)
|
|
+ strlen("SOAPACTION: ") + pUPnPDevice->GetStaticServiceURILength() + strlen("#" ACTION_GETEXTERNALIPADDRESS_A EOL)
|
|
+ strlen(EOL)
|
|
+ iContentLength;
|
|
|
|
|
|
//
|
|
// Allocate (or reallocate) the message buffer.
|
|
//
|
|
if (iMsgSize > iPrevMsgSize)
|
|
{
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
pszMessage = (char*) DNMalloc(iMsgSize + 1); // include room for NULL termination that isn't actually sent
|
|
if (pszMessage == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
iPrevMsgSize = iMsgSize;
|
|
}
|
|
|
|
/*
|
|
strcpy(pszMessage, "POST ");
|
|
strcat(pszMessage, pUPnPDevice->GetServiceControlURL());
|
|
strcat(pszMessage, " " HTTP_VERSION EOL);
|
|
strcat(pszMessage, "HOST: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszHost,
|
|
(_tcslen(tszHost) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszHost);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-LENGTH: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszContentLength,
|
|
(_tcslen(tszContentLength) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszContentLength);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL);
|
|
strcat(pszMessage, "SOAPACTION: " URI_CONTROL_A "#" CONTROL_QUERYSTATEVARIABLE_A "" EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
strcat(pszMessage, "<s:Envelope" EOL);
|
|
strcat(pszMessage, " xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL);
|
|
strcat(pszMessage, " s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL);
|
|
strcat(pszMessage, " <s:Body>" EOL);
|
|
strcat(pszMessage, " <u:" CONTROL_QUERYSTATEVARIABLE_A " xmlns:u=\"" URI_CONTROL_A "\">" EOL);
|
|
strcat(pszMessage, " <u:" ARG_CONTROL_VARNAME_A ">" VAR_EXTERNALIPADDRESS_A "</u:" ARG_CONTROL_VARNAME_A ">" EOL);
|
|
strcat(pszMessage, " </u:" CONTROL_QUERYSTATEVARIABLE_A ">" EOL);
|
|
strcat(pszMessage, " </s:Body>" EOL);
|
|
strcat(pszMessage, "</s:Envelope>" EOL);
|
|
strcat(pszMessage, EOL);
|
|
*/
|
|
strcpy(pszMessage, "POST ");
|
|
strcat(pszMessage, pUPnPDevice->GetServiceControlURL());
|
|
strcat(pszMessage, " " HTTP_VERSION EOL);
|
|
strcat(pszMessage, "HOST: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszHost,
|
|
(_tcslen(tszHost) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszHost);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-LENGTH: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszContentLength,
|
|
(_tcslen(tszContentLength) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszContentLength);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL);
|
|
strcat(pszMessage, "SOAPACTION: ");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "#" ACTION_GETEXTERNALIPADDRESS_A EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
strcat(pszMessage, "<s:Envelope" EOL);
|
|
strcat(pszMessage, " xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL);
|
|
strcat(pszMessage, " s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL);
|
|
strcat(pszMessage, " <s:Body>" EOL);
|
|
strcat(pszMessage, " <u:" ACTION_GETEXTERNALIPADDRESS_A " xmlns:u=\"");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "\">" EOL);
|
|
strcat(pszMessage, " </u:" ACTION_GETEXTERNALIPADDRESS_A ">" EOL);
|
|
strcat(pszMessage, " </s:Body>" EOL);
|
|
strcat(pszMessage, "</s:Envelope>" EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
#ifdef DBG
|
|
this->PrintUPnPTransactionToFile(pszMessage,
|
|
iMsgSize,
|
|
//"Outbound query external IP address",
|
|
"Outbound get external IP address",
|
|
pDevice);
|
|
#endif // DBG
|
|
|
|
iReturn = this->m_pfnsend(pUPnPDevice->GetControlSocket(),
|
|
pszMessage,
|
|
iMsgSize,
|
|
0);
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending control request to UPnP device!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (iReturn != iMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't send entire message (%i != %i)?!", iReturn, iMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We have the lock so no one could have tried to receive data from the
|
|
// control socket yet. Mark the device as waiting for a response.
|
|
//
|
|
ZeroMemory(&RespInfo, sizeof(RespInfo));
|
|
//pUPnPDevice->StartWaitingForControlResponse(CONTROLRESPONSETYPE_QUERYSTATEVARIABLE_EXTERNALIPADDRESS,
|
|
pUPnPDevice->StartWaitingForControlResponse(CONTROLRESPONSETYPE_GETEXTERNALIPADDRESS,
|
|
&RespInfo);
|
|
fStartedWaitingForControlResponse = TRUE;
|
|
|
|
|
|
//
|
|
// Actually wait for the response.
|
|
//
|
|
dwStartTime = GETTIMESTAMP();
|
|
dwTimeout = g_dwUPnPResponseTimeout;
|
|
do
|
|
{
|
|
hr = this->CheckForReceivedUPnPMsgsOnDevice(pUPnPDevice, dwTimeout);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed receiving UPnP messages!");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We either timed out or got some data. Check if we got a
|
|
// response of some type.
|
|
//
|
|
if (! pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure our device is still connected.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 0, "UPnP device 0x%p disconnected while retrieving external IP address!",
|
|
pUPnPDevice);
|
|
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Calculate how long we have left to wait. If the calculation
|
|
// goes negative, it means we're done.
|
|
//
|
|
dwTimeout = g_dwUPnPResponseTimeout - (GETTIMESTAMP() - dwStartTime);
|
|
}
|
|
while (((int) dwTimeout > 0));
|
|
|
|
|
|
//
|
|
// If we never got the response, stop waiting for it.
|
|
//
|
|
if (pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
DPFX(DPFPREP, 0, "Server didn't respond in time!");
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, then we've gotten a valid response from the server.
|
|
//
|
|
if (RespInfo.hrErrorCode != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 1, "Server returned failure response 0x%lx when retrieving external IP address.",
|
|
RespInfo.hrErrorCode);
|
|
|
|
hr = RespInfo.hrErrorCode;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 1, "Server returned external IP address \"%u.%u.%u.%u\".",
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b4);
|
|
|
|
|
|
//
|
|
// Convert the loopback address to the device address.
|
|
//
|
|
if (RespInfo.dwExternalIPAddressV4 == NETWORKBYTEORDER_INADDR_LOOPBACK)
|
|
{
|
|
RespInfo.dwExternalIPAddressV4 = pDevice->GetLocalAddressV4();
|
|
|
|
DPFX(DPFPREP, 0, "Converted private loopback address to device address (%u.%u.%u.%u)!",
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&RespInfo.dwExternalIPAddressV4))->S_un.S_un_b.s_b4);
|
|
|
|
DNASSERTX(! "Got loopback address as external IP address!", 2);
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// If this is a local UPnP gateway, print out the device corresponding to
|
|
// the public address.
|
|
//
|
|
if (pUPnPDevice->IsLocal())
|
|
{
|
|
if (RespInfo.dwExternalIPAddressV4 != 0)
|
|
{
|
|
CDevice * pPublicDevice;
|
|
|
|
|
|
//
|
|
// Loop through every device.
|
|
//
|
|
pBilink = this->m_blDevices.GetNext();
|
|
while (pBilink != &this->m_blDevices)
|
|
{
|
|
pPublicDevice = DEVICE_FROM_BILINK(pBilink);
|
|
|
|
if (pPublicDevice->GetLocalAddressV4() == RespInfo.dwExternalIPAddressV4)
|
|
{
|
|
DPFX(DPFPREP, 7, "Local UPnP gateway 0x%p for device 0x%p's public address is device 0x%p.",
|
|
pUPnPDevice, pDevice, pPublicDevice);
|
|
break;
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
//
|
|
// If we made it through the entire list without matching the device,
|
|
// that's odd. It's possible we're slow in detecting new devices, so
|
|
// don't get bent out of shape.
|
|
//
|
|
if (pBilink == &this->m_blDevices)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't match up local UPnP gateway 0x%p (device 0x%p)'s public address to a device!",
|
|
pUPnPDevice, pDevice);
|
|
DNASSERTX(! "Couldn't match up local UPnP gateway public address to a device!", 2);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 4, "Local UPnP gateway 0x%p (device 0x%p) does not have a valid public address.",
|
|
pUPnPDevice, pDevice);
|
|
}
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// If the public address has changed, update all the existing mappings.
|
|
//
|
|
if (RespInfo.dwExternalIPAddressV4 != pUPnPDevice->GetExternalIPAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP Internet Gateway Device (0x%p) external address changed.",
|
|
pUPnPDevice);
|
|
|
|
//
|
|
// Since there was a change in the network, go back to polling
|
|
// relatively quickly.
|
|
//
|
|
this->ResetNextPollInterval();
|
|
|
|
|
|
//
|
|
// Loop through all the existing registered ports and update their
|
|
// public addresses, if allowed.
|
|
//
|
|
if (fUpdateRegisteredPorts)
|
|
{
|
|
pBilink = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilink != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilink);
|
|
|
|
if (! pRegisteredPort->IsUPnPPortUnavailable())
|
|
{
|
|
DPFX(DPFPREP, 7, "Updating registered port 0x%p's public address.",
|
|
pRegisteredPort);
|
|
|
|
pRegisteredPort->UpdateUPnPPublicV4Addresses(RespInfo.dwExternalIPAddressV4);
|
|
|
|
//
|
|
// The user should call GetCaps to detect the address change.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_ADDRESSESCHANGED;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Not updating registered port 0x%p's public address because the port is unavailable.",
|
|
pRegisteredPort);
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Store the new public address.
|
|
//
|
|
pUPnPDevice->SetExternalIPAddressV4(RespInfo.dwExternalIPAddressV4);
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
//
|
|
// If we started waiting for a response, clear that.
|
|
//
|
|
if (fStartedWaitingForControlResponse)
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::UpdateUPnPExternalAddress
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::MapPortsOnUPnPDevice"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::MapPortsOnUPnPDevice
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Maps the given ports on the given UPnP device.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device to use.
|
|
// CRegisteredPort * pRegisteredPort - Pointer to ports to register.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The message was sent successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
// DPNHERR_SERVERNOTRESPONDING - A response didn't arrive in time.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::MapPortsOnUPnPDevice(CUPnPDevice * const pUPnPDevice,
|
|
CRegisteredPort * const pRegisteredPort)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
HRESULT temphr;
|
|
BOOL fStartedWaitingForControlResponse = FALSE;
|
|
CDevice * pDevice;
|
|
DWORD dwLeaseExpiration;
|
|
IN_ADDR inaddrTemp;
|
|
SOCKADDR_IN * psaddrinTemp;
|
|
WORD wOriginalExternalPortHostOrder = 0;
|
|
WORD wExternalPortHostOrder;
|
|
TCHAR tszInternalPort[32];
|
|
TCHAR tszExternalPort[32];
|
|
TCHAR tszInternalClient[16]; // "xxx.xxx.xxx.xxx" + NULL termination
|
|
TCHAR tszLeaseDuration[32];
|
|
TCHAR tszDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
int iContentLength;
|
|
TCHAR tszContentLength[32];
|
|
TCHAR tszHost[22]; // "xxx.xxx.xxx.xxx:xxxxx" + NULL termination
|
|
char * pszMessage = NULL;
|
|
int iMsgSize;
|
|
int iPrevMsgSize = 0;
|
|
int iReturn;
|
|
DWORD dwTemp = 0;
|
|
UPNP_CONTROLRESPONSE_INFO RespInfo;
|
|
DWORD dwStartTime;
|
|
DWORD dwTimeout;
|
|
BOOL fFirstLease;
|
|
DWORD dwDescriptionLength;
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
BOOL fResult;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p)", this, pUPnPDevice);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
|
|
DNASSERT(pDevice != NULL);
|
|
DNASSERT(pUPnPDevice->GetOwningDevice() == pDevice);
|
|
|
|
|
|
//
|
|
// Set up variables we'll need.
|
|
//
|
|
DNASSERT(pUPnPDevice->GetServiceControlURL() != NULL);
|
|
|
|
|
|
//
|
|
// If the port is shared, register the broadcast address instead of the
|
|
// local device address.
|
|
//
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
_tcscpy(tszInternalClient, _T("255.255.255.255"));
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Note that the device address is not necessarily the same as the
|
|
// address the user originally registered, particularly the 0.0.0.0
|
|
// wildcard address will get remapped.
|
|
//
|
|
inaddrTemp.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
wsprintf(tszInternalClient, _T("%u.%u.%u.%u"),
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
}
|
|
|
|
|
|
//
|
|
// The current Microsoft UPnP Internet Gateway Device implementation--
|
|
// and most others-- do not support lease durations that are not set
|
|
// for INFINITE time, so we will almost certainly fail. Because of
|
|
// that, and since there's no server to test against anyway, we will
|
|
// not even attempt to use non-INFINITE leases. However, you can use
|
|
// the registry key to take a shot at it if you like living on the
|
|
// edge.
|
|
// Note that there's no way to detect whether a given UPnP
|
|
// implementation will allow non-INFINITE lease durations ahead of time,
|
|
// so we have to try it first, and fall back to the infinite lease
|
|
// behavior if it doesn't work. Ugh.
|
|
//
|
|
if ((! pUPnPDevice->DoesNotSupportLeaseDurations()) && (g_fUseLeaseDurations))
|
|
{
|
|
wsprintf(tszLeaseDuration, _T("%u"),
|
|
(pRegisteredPort->GetRequestedLeaseTime() / 1000));
|
|
}
|
|
else
|
|
{
|
|
_tcscpy(tszLeaseDuration, _T("0"));
|
|
pRegisteredPort->NotePermanentUPnPLease();
|
|
}
|
|
|
|
psaddrinTemp = pUPnPDevice->GetHostAddress();
|
|
wsprintf(tszHost, _T("%u.%u.%u.%u:%u"),
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinTemp->sin_port));
|
|
|
|
|
|
//
|
|
// Create the array to hold the resulting public addresses.
|
|
//
|
|
hr = pRegisteredPort->CreateUPnPPublicAddressesArray();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't create UPnP public addresses array!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Note whether this was the first lease or not.
|
|
//
|
|
fFirstLease = (this->m_dwNumLeases == 0) ? TRUE : FALSE;
|
|
this->m_dwNumLeases++;
|
|
|
|
DPFX(DPFPREP, 7, "UPnP lease for 0x%p added, total num leases = %u.",
|
|
pRegisteredPort, this->m_dwNumLeases);
|
|
|
|
|
|
//
|
|
// Assuming all goes well, the first port lease will expire approximately
|
|
// GetRequestedLeaseTime() ms from now.
|
|
// See above note about whether this lease will actually be used, though.
|
|
//
|
|
dwLeaseExpiration = GETTIMESTAMP() + pRegisteredPort->GetRequestedLeaseTime();
|
|
|
|
|
|
|
|
//
|
|
// Get a pointer to the addresses we're mapping. We don't have to worry
|
|
// about whether it's mapped on a local firewall since the HomeNet API will
|
|
// always map it to the same port.
|
|
//
|
|
psaddrinTemp = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
|
|
//
|
|
// Loop through each port and map it.
|
|
//
|
|
for(dwTemp = 0; dwTemp < pRegisteredPort->GetNumAddresses(); dwTemp++)
|
|
{
|
|
//
|
|
// Determine the public port number to register.
|
|
//
|
|
if (! pRegisteredPort->IsFixedPort())
|
|
{
|
|
//
|
|
// UPnP does not support wildcard ports (where the gateway
|
|
// device picks an unused public port number for us). We must
|
|
// select a port ahead of time to try mapping on the server.
|
|
//
|
|
// Worse, UPnP does not require the device support selecting a
|
|
// public port that is different from the client's private port
|
|
// (a.k.a. asymmetric, x to y, or floating port mappings).
|
|
// This means that even non fixed ports will act that way. To
|
|
// top it all off, there's no way to detect whether a given
|
|
// UPnP implementation will allow the ports to differ ahead of
|
|
// time, so we have to try it first, and fall back to the fixed
|
|
// port behavior if it doesn't work. Ugh.
|
|
//
|
|
|
|
if (pUPnPDevice->DoesNotSupportAsymmetricMappings())
|
|
{
|
|
//
|
|
// We are forced to use the client's private port.
|
|
//
|
|
wExternalPortHostOrder = NTOHS(psaddrinTemp[dwTemp].sin_port);
|
|
}
|
|
else
|
|
{
|
|
if (wOriginalExternalPortHostOrder == 0)
|
|
{
|
|
DNASSERT(dwTemp == 0);
|
|
|
|
//
|
|
// Ideally we would pick a random port that isn't in
|
|
// the reserved range (i.e. is greater than 1024).
|
|
// However, truly random ports cause problems with the
|
|
// Windows XP ICS implementation in a fairly obscure
|
|
// manner:
|
|
//
|
|
// 1. DPlay application starts hosting behind ICS on
|
|
// port 2302.
|
|
// 2. Port 2302 gets mapped to random port x.
|
|
// 3. External DPlay client is told to connect to x.
|
|
// 4. ICS detects inbound traffic to x, sees mapping
|
|
// for internal_ip:2302, and creates a virtual
|
|
// connection.
|
|
// 5. Internal client removes 2302<->x mapping and
|
|
// closes socket.
|
|
// 6. Internal DPlay application begins hosting on
|
|
// port 2302 again.
|
|
// 7. Port 2302 gets mapped to random port y.
|
|
// 8. External DPlay client is told to connect to y.
|
|
// 9. ICS detects inbound traffic to y, sees mapping
|
|
// for internal_ip:2302, but can't create virtual
|
|
// connection because the 2302<->x connection
|
|
// still exists.
|
|
//
|
|
// Windows XP ICS keeps the virtual connections around
|
|
// and cleans them up every 60 seconds. If the
|
|
// reconnect occurs within (up to) 2 minutes, the
|
|
// packets might get dropped due to the mapping
|
|
// collision.
|
|
//
|
|
// This causes all sorts of heartache with automated
|
|
// NAT tests that bring up and tear down connections
|
|
// between the same two machines across the NAT over
|
|
// and over.
|
|
//
|
|
// So, to avoid that, we need to make mappings
|
|
// deterministic, such that if the same internal client
|
|
// tries to map the same internal port, it should ask
|
|
// for the same external port every time. That way, if
|
|
// there happens to be a virtual connection hanging
|
|
// around from a previous attempt, we'll reuse it
|
|
// instead of clashing and getting the packet dropped.
|
|
//
|
|
// Our actual algorithm:
|
|
// 1. start with the internal client IP.
|
|
// 2. combine in the internal port being mapped.
|
|
// 3. add 1025 if necessary to get it out of the
|
|
// reserved range.
|
|
//
|
|
|
|
inaddrTemp.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
|
|
wOriginalExternalPortHostOrder = inaddrTemp.S_un.S_un_w.s_w1;
|
|
wOriginalExternalPortHostOrder ^= inaddrTemp.S_un.S_un_w.s_w2;
|
|
wOriginalExternalPortHostOrder ^= psaddrinTemp[dwTemp].sin_port;
|
|
|
|
if (wOriginalExternalPortHostOrder <= MAX_RESERVED_PORT)
|
|
{
|
|
wOriginalExternalPortHostOrder += MAX_RESERVED_PORT + 1;
|
|
}
|
|
|
|
|
|
//
|
|
// This is the starting point, we'll increment by one
|
|
// as we go.
|
|
//
|
|
wExternalPortHostOrder = wOriginalExternalPortHostOrder;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Go to the next sequential port. If we've wrapped
|
|
// around to 0, move to the first non reserved range
|
|
// port.
|
|
//
|
|
wExternalPortHostOrder++;
|
|
if (wExternalPortHostOrder == 0)
|
|
{
|
|
wExternalPortHostOrder = MAX_RESERVED_PORT + 1;
|
|
}
|
|
|
|
|
|
//
|
|
// If we wrapped all the way back around to the first
|
|
// port we tried, we have to fail.
|
|
//
|
|
if (wExternalPortHostOrder == wOriginalExternalPortHostOrder)
|
|
{
|
|
DPFX(DPFPREP, 0, "All ports were exhausted (before index %u), marking port as unavailable.",
|
|
dwTemp);
|
|
|
|
|
|
//
|
|
// Delete all mappings successfully made up until
|
|
// now.
|
|
//
|
|
DNASSERT(dwTemp > 0);
|
|
|
|
hr = this->UnmapUPnPPort(pRegisteredPort, dwTemp, TRUE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed deleting %u previously mapped ports after getting failure response 0x%lx!",
|
|
dwTemp, RespInfo.hrErrorCode);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The port is unavailable.
|
|
//
|
|
pRegisteredPort->NoteUPnPPortUnavailable();
|
|
|
|
|
|
//
|
|
// We're done here. Ideally we would goto Exit, but
|
|
// we want to execute the public address array
|
|
// cleanup code. hr will == DPNH_OK.
|
|
//
|
|
goto Failure;
|
|
}
|
|
} // end if (haven't selected first port yet)
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Use the fixed port.
|
|
//
|
|
wExternalPortHostOrder = NTOHS(psaddrinTemp[dwTemp].sin_port);
|
|
}
|
|
|
|
wsprintf(tszInternalPort, _T("%u"),
|
|
NTOHS(psaddrinTemp[dwTemp].sin_port));
|
|
|
|
|
|
Retry:
|
|
|
|
//
|
|
// Because the UPnP spec allows a device to overwrite existing
|
|
// mappings if they are for the same client, we have to make sure
|
|
// that no local DPNHUPNP instances, including this one, have an
|
|
// active mapping for that public port.
|
|
// Rather than having the retry code in multiple places, I'll use
|
|
// the somewhat ugly 'goto' to jump straight to the existing port
|
|
// unavailable handling.
|
|
//
|
|
if (this->IsNATPublicPortInUseLocally(wExternalPortHostOrder))
|
|
{
|
|
DPFX(DPFPREP, 1, "Port %u is already in use locally.");
|
|
RespInfo.hrErrorCode = DPNHERR_PORTUNAVAILABLE;
|
|
goto PortUnavailable;
|
|
}
|
|
|
|
|
|
//
|
|
// If the control socket got disconnected after the last message,
|
|
// then reconnect.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
hr = this->ReconnectUPnPControlSocket(pUPnPDevice);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't reconnect UPnP control socket!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
|
|
wsprintf(tszExternalPort, _T("%u"), wExternalPortHostOrder);
|
|
|
|
|
|
|
|
//
|
|
// Generate a description for this mapping. The format is:
|
|
//
|
|
// [executable_name] (nnn.nnn.nnn.nnn:nnnnn) nnnnn {"TCP" | "UDP"}
|
|
//
|
|
// That way nothing needs to be localized.
|
|
//
|
|
|
|
dwDescriptionLength = GetModuleFileName(NULL,
|
|
tszDescription,
|
|
(MAX_UPNP_MAPPING_DESCRIPTION_SIZE - 1));
|
|
if (dwDescriptionLength != 0)
|
|
{
|
|
//
|
|
// Be paranoid and make sure the description string is valid.
|
|
//
|
|
tszDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE - 1] = 0;
|
|
|
|
//
|
|
// Get just the executable name from the path.
|
|
//
|
|
#ifdef WINCE
|
|
GetExeName(tszDescription);
|
|
#else // ! WINCE
|
|
#ifdef UNICODE
|
|
_wsplitpath(tszDescription, NULL, NULL, tszDescription, NULL);
|
|
#else // ! UNICODE
|
|
_splitpath(tszDescription, NULL, NULL, tszDescription, NULL);
|
|
#endif // ! UNICODE
|
|
#endif // ! WINCE
|
|
|
|
|
|
dwDescriptionLength = _tcslen(tszDescription) // executable name
|
|
+ 2 // " ("
|
|
+ _tcslen(tszInternalClient) // private IP address
|
|
+ 1 // ":"
|
|
+ _tcslen(tszInternalPort) // private port
|
|
+ 2 // ") "
|
|
+ _tcslen(tszExternalPort) // public port
|
|
+ 4; // " TCP" | " UDP"
|
|
|
|
//
|
|
// Make sure the long string will fit. If not, use the
|
|
// abbreviated version.
|
|
//
|
|
if (dwDescriptionLength > MAX_UPNP_MAPPING_DESCRIPTION_SIZE)
|
|
{
|
|
dwDescriptionLength = 0;
|
|
}
|
|
}
|
|
|
|
if (dwDescriptionLength == 0)
|
|
{
|
|
//
|
|
// Use the abbreviated version we know will fit.
|
|
//
|
|
wsprintf(tszDescription,
|
|
_T("(%s:%s) %s %s"),
|
|
tszInternalClient,
|
|
tszInternalPort,
|
|
tszExternalPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// There's enough room, tack on the rest of the description.
|
|
//
|
|
wsprintf((tszDescription + _tcslen(tszDescription)),
|
|
_T(" (%s:%s) %s %s"),
|
|
tszInternalClient,
|
|
tszInternalPort,
|
|
tszExternalPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 6, "Requesting mapping \"%s\".", tszDescription);
|
|
|
|
|
|
iContentLength = strlen("<s:Envelope" EOL)
|
|
+ strlen(" xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL)
|
|
+ strlen(" s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL)
|
|
+ strlen(" <s:Body>" EOL)
|
|
+ strlen(" <u:" ACTION_ADDPORTMAPPING_A " xmlns:u=\"") + pUPnPDevice->GetStaticServiceURILength() + strlen("\">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWREMOTEHOST_A ">" UPNP_WILDCARD "</" ARG_ADDPORTMAPPING_NEWREMOTEHOST_A ">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWEXTERNALPORT_A ">") + _tcslen(tszExternalPort) + strlen("</" ARG_ADDPORTMAPPING_NEWEXTERNALPORT_A ">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWPROTOCOL_A ">") + 3 + strlen("</" ARG_ADDPORTMAPPING_NEWPROTOCOL_A ">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWINTERNALPORT_A ">") + _tcslen(tszInternalPort) + strlen("</" ARG_ADDPORTMAPPING_NEWINTERNALPORT_A ">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWINTERNALCLIENT_A ">") + _tcslen(tszInternalClient) + strlen("</" ARG_ADDPORTMAPPING_NEWINTERNALCLIENT_A ">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWENABLED_A ">" UPNP_BOOLEAN_TRUE "</" ARG_ADDPORTMAPPING_NEWENABLED_A ">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWPORTMAPPINGDESCRIPTION_A ">") + _tcslen(tszDescription) + strlen("</" ARG_ADDPORTMAPPING_NEWPORTMAPPINGDESCRIPTION_A ">" EOL)
|
|
+ strlen(" <" ARG_ADDPORTMAPPING_NEWLEASEDURATION_A ">") + _tcslen(tszLeaseDuration) + strlen("</" ARG_ADDPORTMAPPING_NEWLEASEDURATION_A ">" EOL)
|
|
+ strlen(" </u:" ACTION_ADDPORTMAPPING_A ">" EOL)
|
|
+ strlen(" </s:Body>" EOL)
|
|
+ strlen("</s:Envelope>" EOL)
|
|
+ strlen(EOL);
|
|
|
|
wsprintf(tszContentLength, _T("%i"), iContentLength);
|
|
|
|
iMsgSize = strlen("POST ") + strlen(pUPnPDevice->GetServiceControlURL()) + strlen(" " HTTP_VERSION EOL)
|
|
+ strlen("HOST: ") + _tcslen(tszHost) + strlen(EOL)
|
|
+ strlen("CONTENT-LENGTH: ") + _tcslen(tszContentLength) + strlen(EOL)
|
|
+ strlen("CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL)
|
|
+ strlen("SOAPACTION: ") + pUPnPDevice->GetStaticServiceURILength() + strlen("#" ACTION_ADDPORTMAPPING_A EOL)
|
|
+ strlen(EOL)
|
|
+ iContentLength;
|
|
|
|
|
|
//
|
|
// Allocate (or reallocate) the message buffer.
|
|
//
|
|
if (iMsgSize > iPrevMsgSize)
|
|
{
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
pszMessage = (char*) DNMalloc(iMsgSize + 1); // include room for NULL termination that isn't actually sent
|
|
if (pszMessage == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
iPrevMsgSize = iMsgSize;
|
|
}
|
|
|
|
strcpy(pszMessage, "POST ");
|
|
strcat(pszMessage, pUPnPDevice->GetServiceControlURL());
|
|
strcat(pszMessage, " " HTTP_VERSION EOL);
|
|
strcat(pszMessage, "HOST: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszHost,
|
|
(_tcslen(tszHost) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszHost);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-LENGTH: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszContentLength,
|
|
(_tcslen(tszContentLength) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszContentLength);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL);
|
|
strcat(pszMessage, "SOAPACTION: ");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "#" ACTION_ADDPORTMAPPING_A EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
strcat(pszMessage, "<s:Envelope" EOL);
|
|
strcat(pszMessage, " xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL);
|
|
strcat(pszMessage, " s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL);
|
|
strcat(pszMessage, " <s:Body>" EOL);
|
|
strcat(pszMessage, " <u:" ACTION_ADDPORTMAPPING_A " xmlns:u=\"");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "\">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWREMOTEHOST_A ">" UPNP_WILDCARD "</" ARG_ADDPORTMAPPING_NEWREMOTEHOST_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWEXTERNALPORT_A ">");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszExternalPort,
|
|
(_tcslen(tszExternalPort) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszExternalPort);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, "</" ARG_ADDPORTMAPPING_NEWEXTERNALPORT_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWPROTOCOL_A ">");
|
|
strcat(pszMessage, ((pRegisteredPort->IsTCP()) ? "TCP" : "UDP"));
|
|
strcat(pszMessage, "</" ARG_ADDPORTMAPPING_NEWPROTOCOL_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWINTERNALPORT_A ">");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszInternalPort,
|
|
(_tcslen(tszInternalPort) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszInternalPort);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, "</" ARG_ADDPORTMAPPING_NEWINTERNALPORT_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWINTERNALCLIENT_A ">");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszInternalClient,
|
|
(_tcslen(tszInternalClient) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszInternalClient);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, "</" ARG_ADDPORTMAPPING_NEWINTERNALCLIENT_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWENABLED_A ">" UPNP_BOOLEAN_TRUE "</" ARG_ADDPORTMAPPING_NEWENABLED_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWPORTMAPPINGDESCRIPTION_A ">");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszDescription,
|
|
(_tcslen(tszDescription) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszDescription);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, "</" ARG_ADDPORTMAPPING_NEWPORTMAPPINGDESCRIPTION_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_ADDPORTMAPPING_NEWLEASEDURATION_A ">");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszLeaseDuration,
|
|
(_tcslen(tszLeaseDuration) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszLeaseDuration);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, "</" ARG_ADDPORTMAPPING_NEWLEASEDURATION_A ">" EOL);
|
|
|
|
strcat(pszMessage, " </u:" ACTION_ADDPORTMAPPING_A ">" EOL);
|
|
strcat(pszMessage, " </s:Body>" EOL);
|
|
strcat(pszMessage, "</s:Envelope>" EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
#ifdef DBG
|
|
this->PrintUPnPTransactionToFile(pszMessage,
|
|
iMsgSize,
|
|
"Outbound add port mapping request",
|
|
pDevice);
|
|
#endif // DBG
|
|
|
|
iReturn = this->m_pfnsend(pUPnPDevice->GetControlSocket(),
|
|
pszMessage,
|
|
iMsgSize,
|
|
0);
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending control request to UPnP device!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (iReturn != iMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't send entire message (%i != %i)?!", iReturn, iMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// We have the lock so no one could have tried to receive data from
|
|
// the control socket yet. Mark the device as waiting for a
|
|
// response.
|
|
//
|
|
ZeroMemory(&RespInfo, sizeof(RespInfo));
|
|
pUPnPDevice->StartWaitingForControlResponse(CONTROLRESPONSETYPE_ADDPORTMAPPING,
|
|
&RespInfo);
|
|
fStartedWaitingForControlResponse = TRUE;
|
|
|
|
|
|
//
|
|
// Actually wait for the response.
|
|
//
|
|
dwStartTime = GETTIMESTAMP();
|
|
dwTimeout = g_dwUPnPResponseTimeout;
|
|
do
|
|
{
|
|
hr = this->CheckForReceivedUPnPMsgsOnDevice(pUPnPDevice, dwTimeout);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed receiving UPnP messages!");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We either timed out or got some data. Check if we got the
|
|
// response we need.
|
|
//
|
|
if (! pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
if (RespInfo.hrErrorCode != DPNH_OK)
|
|
{
|
|
//
|
|
// Make sure it's not the "I can't handle asymmetric
|
|
// mappings" error. If it is, note the fact that this
|
|
// device is going to force us to have worse behavior
|
|
// and try again.
|
|
//
|
|
if (RespInfo.hrErrorCode == (HRESULT) UPNPERR_IGD_SAMEPORTVALUESREQUIRED)
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP device 0x%p does not support asymmetric mappings.",
|
|
pUPnPDevice);
|
|
|
|
//
|
|
// Make sure we're not getting this error from a bad
|
|
// device. Otherwise we might get caught in a loop.
|
|
//
|
|
if ((! pUPnPDevice->DoesNotSupportAsymmetricMappings()) &&
|
|
(! pRegisteredPort->IsFixedPort()) &&
|
|
(dwTemp == 0))
|
|
{
|
|
//
|
|
// Remember that this device is unfriendly.
|
|
//
|
|
pUPnPDevice->NoteDoesNotSupportAsymmetricMappings();
|
|
|
|
//
|
|
// Use the same port externally next time.
|
|
//
|
|
DNASSERT(wExternalPortHostOrder != NTOHS(psaddrinTemp[dwTemp].sin_port));
|
|
wExternalPortHostOrder = NTOHS(psaddrinTemp[dwTemp].sin_port);
|
|
|
|
//
|
|
// Try again.
|
|
//
|
|
goto Retry;
|
|
}
|
|
|
|
DPFX(DPFPREP, 1, "DoesNotSupportAsymmetricMappings = %i, fixed port = %i, port index = %u",
|
|
pUPnPDevice->DoesNotSupportAsymmetricMappings(),
|
|
pRegisteredPort->IsFixedPort(),
|
|
dwTemp);
|
|
DNASSERTX(! "Getting UPNPERR_IGD_SAMEPORTVALUESREQUIRED from bad device!", 2);
|
|
|
|
//
|
|
// Continue through to failure case...
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure it's not the "I can't handle lease times"
|
|
// error. If it is, note the fact that this device is
|
|
// going to force us to have worse behavior and try
|
|
// again.
|
|
//
|
|
if (RespInfo.hrErrorCode == (HRESULT) UPNPERR_IGD_ONLYPERMANENTLEASESSUPPORTED)
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP device 0x%p does not support non-INFINITE lease durations.",
|
|
pUPnPDevice);
|
|
|
|
//
|
|
// Make sure we're not getting this error from a bad
|
|
// device. Otherwise we might get caught in a loop.
|
|
//
|
|
if ((! pUPnPDevice->DoesNotSupportLeaseDurations()) &&
|
|
(dwTemp == 0))
|
|
{
|
|
//
|
|
// Remember that this device is unfriendly.
|
|
//
|
|
pUPnPDevice->NoteDoesNotSupportLeaseDurations();
|
|
|
|
//
|
|
// Use an INFINITE lease next time around.
|
|
//
|
|
DNASSERT(_tcscmp(tszLeaseDuration, _T("0")) != 0);
|
|
_tcscpy(tszLeaseDuration, _T("0"));
|
|
pRegisteredPort->NotePermanentUPnPLease();
|
|
|
|
//
|
|
// Try again.
|
|
//
|
|
goto Retry;
|
|
}
|
|
|
|
DPFX(DPFPREP, 1, "DoesNotSupportLeaseDurations = %i, port index = %u",
|
|
pUPnPDevice->DoesNotSupportLeaseDurations(), dwTemp);
|
|
DNASSERTX(! "Getting UPNPERR_IGD_ONLYPERMANENTLEASESSUPPORTED from bad device!", 2);
|
|
|
|
//
|
|
// Continue through to failure case...
|
|
//
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
if (RespInfo.hrErrorCode == DPNHERR_PORTUNAVAILABLE)
|
|
{
|
|
DPFX(DPFPREP, 2, "Port %u (for address index %u) is reportedly unavailable.",
|
|
wExternalPortHostOrder, dwTemp);
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
PortUnavailable:
|
|
|
|
//
|
|
// If it's the port-unavailable error but we're able to
|
|
// try a different port, go for it.
|
|
//
|
|
if ((RespInfo.hrErrorCode == DPNHERR_PORTUNAVAILABLE) &&
|
|
(! pRegisteredPort->IsFixedPort()) &&
|
|
(! pUPnPDevice->DoesNotSupportAsymmetricMappings()))
|
|
{
|
|
//
|
|
// Go to the next sequential port. If we've wrapped
|
|
// around to 0, move to the first non reserved range
|
|
// port.
|
|
//
|
|
wExternalPortHostOrder++;
|
|
if (wExternalPortHostOrder == 0)
|
|
{
|
|
wExternalPortHostOrder = MAX_RESERVED_PORT + 1;
|
|
}
|
|
|
|
|
|
//
|
|
// If we haven't wrapped all the way back around to
|
|
// the first port we tried, try again.
|
|
//
|
|
if (wExternalPortHostOrder != wOriginalExternalPortHostOrder)
|
|
{
|
|
DPFX(DPFPREP, 2, "Retrying next port (%u) for index %u.",
|
|
wExternalPortHostOrder, dwTemp);
|
|
goto Retry;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 0, "All ports were exhausted (after index %u), marking port as unavailable.",
|
|
dwTemp);
|
|
}
|
|
|
|
|
|
//
|
|
// If it's not the port-unavailable error, it's
|
|
// serious. Bail.
|
|
//
|
|
if (RespInfo.hrErrorCode != DPNHERR_PORTUNAVAILABLE)
|
|
{
|
|
DPFX(DPFPREP, 1, "Port index %u got failure response 0x%lx.",
|
|
dwTemp, RespInfo.hrErrorCode);
|
|
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The port is unavailable.
|
|
//
|
|
pRegisteredPort->NoteUPnPPortUnavailable();
|
|
|
|
|
|
//
|
|
// We're done here. Ideally we would goto Exit, but we
|
|
// want to execute the public address array cleanup
|
|
// code. hr should == DPNH_OK.
|
|
//
|
|
DNASSERT(hr == DPNH_OK);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If we got here, we successfully registered this port.
|
|
//
|
|
|
|
|
|
//
|
|
// UPnP Internet Gateway Device mapping protocol doesn't
|
|
// hand you the external IP address in the success response
|
|
// message. We had to have known it through other means
|
|
// (querying the ExternalIPAddress variable).
|
|
//
|
|
|
|
DPFX(DPFPREP, 2, "Port index %u got success response.", dwTemp);
|
|
|
|
pRegisteredPort->SetUPnPPublicV4Address(dwTemp,
|
|
pUPnPDevice->GetExternalIPAddressV4(),
|
|
HTONS(wExternalPortHostOrder));
|
|
|
|
|
|
//
|
|
// If the lease is permanent and it's not for a shared
|
|
// port, we need to remember it, in case we crash before
|
|
// cleaning it up in this session. That we can clean it up
|
|
// next time we launch.
|
|
//
|
|
if ((pRegisteredPort->HasPermanentUPnPLease()) &&
|
|
(! pRegisteredPort->IsSharedPort()))
|
|
{
|
|
CRegistry RegObject;
|
|
DPNHACTIVENATMAPPING dpnhanm;
|
|
#ifndef UNICODE
|
|
WCHAR wszDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
#endif // ! UNICODE
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Remembering NAT lease \"%s\" in case of crash.",
|
|
tszDescription);
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVENATMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't open active NAT mapping key, unable to save in case of crash!");
|
|
}
|
|
else
|
|
{
|
|
#ifndef UNICODE
|
|
dwDescriptionLength = strlen(tszDescription) + 1;
|
|
hr = STR_jkAnsiToWide(wszDescription, tszDescription, dwDescriptionLength);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't convert NAT mapping description to Unicode (err = 0x%lx), unable to save in case of crash!",
|
|
hr);
|
|
|
|
//
|
|
// Ignore error and continue.
|
|
//
|
|
hr = S_OK;
|
|
}
|
|
else
|
|
#endif // ! UNICODE
|
|
{
|
|
DNASSERT(this->m_dwInstanceKey != 0);
|
|
|
|
|
|
ZeroMemory(&dpnhanm, sizeof(dpnhanm));
|
|
dpnhanm.dwVersion = ACTIVE_MAPPING_VERSION;
|
|
dpnhanm.dwInstanceKey = this->m_dwInstanceKey;
|
|
dpnhanm.dwUPnPDeviceID = pUPnPDevice->GetID();
|
|
dpnhanm.dwFlags = pRegisteredPort->GetFlags();
|
|
dpnhanm.dwInternalAddressV4 = pDevice->GetLocalAddressV4();
|
|
dpnhanm.wInternalPort = psaddrinTemp[dwTemp].sin_port;
|
|
dpnhanm.dwExternalAddressV4 = pUPnPDevice->GetExternalIPAddressV4();
|
|
dpnhanm.wExternalPort = HTONS(wExternalPortHostOrder);
|
|
|
|
|
|
#ifdef UNICODE
|
|
RegObject.WriteBlob(tszDescription,
|
|
#else // ! UNICODE
|
|
RegObject.WriteBlob(wszDescription,
|
|
#endif // ! UNICODE
|
|
(LPBYTE) (&dpnhanm),
|
|
sizeof(dpnhanm));
|
|
}
|
|
|
|
RegObject.Close();
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Break out of the wait loop.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure our device is still connected.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 0, "UPnP device 0x%p disconnected while adding port index %u!",
|
|
pUPnPDevice, dwTemp);
|
|
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Calculate how long we have left to wait. If the calculation
|
|
// goes negative, it means we're done.
|
|
//
|
|
dwTimeout = g_dwUPnPResponseTimeout - (GETTIMESTAMP() - dwStartTime);
|
|
}
|
|
while (((int) dwTimeout > 0));
|
|
|
|
|
|
//
|
|
// If we never got the response, stop waiting for it.
|
|
//
|
|
if (pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
DPFX(DPFPREP, 0, "Port index %u didn't get response in time!", dwTemp);
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Continue on to the next port.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, all ports were successfully registered.
|
|
//
|
|
|
|
if (pRegisteredPort->HasPermanentUPnPLease())
|
|
{
|
|
DPFX(DPFPREP, 3, "All %u ports successfully registered with UPnP device (no expiration).",
|
|
dwTemp);
|
|
}
|
|
else
|
|
{
|
|
pRegisteredPort->SetUPnPLeaseExpiration(dwLeaseExpiration);
|
|
|
|
DPFX(DPFPREP, 3, "All %u ports successfully registered with UPnP device, expiration = %u.",
|
|
dwTemp, dwLeaseExpiration);
|
|
|
|
|
|
//
|
|
// Remember this expiration time if it's the one that's going to expire
|
|
// soonest.
|
|
//
|
|
if ((fFirstLease) ||
|
|
((int) (dwLeaseExpiration - this->m_dwEarliestLeaseExpirationTime) < 0))
|
|
{
|
|
if (fFirstLease)
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p's UPnP lease is the first lease (expires at %u).",
|
|
pRegisteredPort, dwLeaseExpiration);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p's UPnP lease expires at %u which is earlier than the next earliest lease expiration (%u).",
|
|
pRegisteredPort,
|
|
dwLeaseExpiration,
|
|
this->m_dwEarliestLeaseExpirationTime);
|
|
}
|
|
|
|
this->m_dwEarliestLeaseExpirationTime = dwLeaseExpiration;
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// Ping the event if there is one so that the user's GetCaps
|
|
// interval doesn't miss this new, shorter lease.
|
|
//
|
|
if (this->m_hAlertEvent != NULL)
|
|
{
|
|
fResult = SetEvent(this->m_hAlertEvent);
|
|
#ifdef DBG
|
|
if (! fResult)
|
|
{
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't set alert event 0x%p! err = %u",
|
|
this->m_hAlertEvent, dwError);
|
|
|
|
//
|
|
// Ignore failure...
|
|
//
|
|
}
|
|
#endif // DBG
|
|
}
|
|
|
|
|
|
//
|
|
// Ping the I/O completion port if there is one so that the user's
|
|
// GetCaps interval doesn't miss this new, shorter lease.
|
|
//
|
|
if (this->m_hAlertIOCompletionPort != NULL)
|
|
{
|
|
fResult = PostQueuedCompletionStatus(this->m_hAlertIOCompletionPort,
|
|
0,
|
|
this->m_dwAlertCompletionKey,
|
|
NULL);
|
|
#ifdef DBG
|
|
if (! fResult)
|
|
{
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't queue key %u on alert IO completion port 0x%p! err = %u",
|
|
this->m_dwAlertCompletionKey,
|
|
this->m_hAlertIOCompletionPort,
|
|
dwError);
|
|
|
|
//
|
|
// Ignore failure...
|
|
//
|
|
}
|
|
#endif // DBG
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not first or shortest lease.
|
|
//
|
|
}
|
|
} // end if (not permanent UPnP lease)
|
|
|
|
|
|
Exit:
|
|
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
//
|
|
// If we allocated the array, clean it up.
|
|
//
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
//
|
|
// If we started waiting for a response, clear that.
|
|
//
|
|
if (fStartedWaitingForControlResponse)
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
}
|
|
|
|
|
|
//
|
|
// Delete all mappings successfully made up until now.
|
|
//
|
|
if (dwTemp > 0)
|
|
{
|
|
temphr = this->UnmapUPnPPort(pRegisteredPort, dwTemp, TRUE);
|
|
if (temphr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed deleting %u previously mapped ports! Err = 0x%lx",
|
|
dwTemp, temphr);
|
|
|
|
if (hr == DPNH_OK)
|
|
{
|
|
hr = temphr;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Remove the addresses array we created.
|
|
//
|
|
pRegisteredPort->DestroyUPnPPublicAddressesArray();
|
|
|
|
|
|
//
|
|
// Remove the lease counter.
|
|
//
|
|
DNASSERT(this->m_dwNumLeases > 0);
|
|
this->m_dwNumLeases--;
|
|
|
|
DPFX(DPFPREP, 7, "UPnP lease for 0x%p removed, total num leases = %u.",
|
|
pRegisteredPort, this->m_dwNumLeases);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Turn off the permanent lease flag we may have turned on at the top of
|
|
// this function.
|
|
//
|
|
pRegisteredPort->NoteNotPermanentUPnPLease();
|
|
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::MapPortsOnUPnPDevice
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::InternalUPnPQueryAddress"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::InternalUPnPQueryAddress
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Queries a port mapping with a UPnP device.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device that
|
|
// should be queried.
|
|
// SOCKADDR_IN * psaddrinQueryAddress - Address to look up.
|
|
// SOCKADDR_IN * psaddrinResponseAddress - Place to store public address, if
|
|
// one exists.
|
|
// DWORD dwFlags - Flags to use when querying.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The query was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
// DPNHERR_NOMAPPING - The server did not have a mapping for the
|
|
// given address.
|
|
// DPNHERR_NOMAPPINGBUTPRIVATE - The server indicated that no mapping was
|
|
// found, but it is a private address.
|
|
// DPNHERR_SERVERNOTRESPONDING - The server did not respond to the
|
|
// message.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::InternalUPnPQueryAddress(CUPnPDevice * const pUPnPDevice,
|
|
const SOCKADDR_IN * const psaddrinQueryAddress,
|
|
SOCKADDR_IN * const psaddrinResponseAddress,
|
|
const DWORD dwFlags)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fStartedWaitingForControlResponse = FALSE;
|
|
BOOL fNoPortMapping = FALSE;
|
|
CDevice * pDevice;
|
|
CBilink * pblCachedMaps;
|
|
DWORD dwCurrentTime;
|
|
CBilink * pBilink;
|
|
CCacheMap * pCacheMap;
|
|
SOCKADDR_IN * psaddrinTemp;
|
|
TCHAR tszExternalPort[32];
|
|
int iContentLength;
|
|
TCHAR tszContentLength[32];
|
|
TCHAR tszHost[22]; // "xxx.xxx.xxx.xxx:xxxxx" + NULL termination
|
|
char * pszMessage = NULL;
|
|
int iMsgSize;
|
|
int iPrevMsgSize = 0;
|
|
int iReturn;
|
|
UPNP_CONTROLRESPONSE_INFO RespInfo;
|
|
DWORD dwStartTime;
|
|
DWORD dwTimeout;
|
|
DWORD dwCacheMapFlags;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, 0x%lx)",
|
|
this, pUPnPDevice, psaddrinQueryAddress, psaddrinResponseAddress, dwFlags);
|
|
|
|
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
DNASSERT(psaddrinQueryAddress != NULL);
|
|
DNASSERT(psaddrinResponseAddress != NULL);
|
|
|
|
DNASSERT(this->m_dwFlags & (NATHELPUPNPOBJ_INITIALIZED | NATHELPUPNPOBJ_USEUPNP));
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Querying for address %u.%u.%u.%u:%u %hs.",
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinQueryAddress->sin_port),
|
|
((dwFlags & DPNHQUERYADDRESS_TCP) ? "TCP" : "UDP"));
|
|
|
|
|
|
//
|
|
// First, check if we've looked this address up recently and already have
|
|
// the result cached.
|
|
// The lock is already held.
|
|
//
|
|
pblCachedMaps = pUPnPDevice->GetCachedMaps();
|
|
dwCurrentTime = GETTIMESTAMP();
|
|
|
|
pBilink = pblCachedMaps->GetNext();
|
|
while (pBilink != pblCachedMaps)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pCacheMap = CACHEMAP_FROM_BILINK(pBilink);
|
|
pBilink = pBilink->GetNext();
|
|
|
|
|
|
//
|
|
// Make sure this cached mapping hasn't expired.
|
|
//
|
|
if ((int) (pCacheMap->GetExpirationTime() - dwCurrentTime) < 0)
|
|
{
|
|
DPFX(DPFPREP, 5, "Cached mapping 0x%p has expired.", pCacheMap);
|
|
|
|
pCacheMap->m_blList.RemoveFromList();
|
|
delete pCacheMap;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// If this mapping is for the right address and type of address,
|
|
// then we've already got our answer.
|
|
//
|
|
if (pCacheMap->DoesMatchQuery(psaddrinQueryAddress, dwFlags))
|
|
{
|
|
if (pCacheMap->IsNotFound())
|
|
{
|
|
if ((dwFlags & DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED) &&
|
|
(pCacheMap->IsPrivateButUnmapped()))
|
|
{
|
|
DPFX(DPFPREP, 5, "Address was already determined to not have a mapping but still be private.");
|
|
hr = DPNHERR_NOMAPPINGBUTPRIVATE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 5, "Address was already determined to not have a mapping.");
|
|
hr = DPNHERR_NOMAPPING;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pCacheMap->GetResponseAddressV4(psaddrinResponseAddress);
|
|
|
|
DPFX(DPFPREP, 5, "Address was already determined to have a mapping.");
|
|
hr = DPNH_OK;
|
|
}
|
|
|
|
goto Exit;
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// If the address we're querying isn't the NAT's public address, it can't
|
|
// possibly be mapped. So only perform the actual query if it's
|
|
// appropriate.
|
|
//
|
|
if (psaddrinQueryAddress->sin_addr.S_un.S_addr == pUPnPDevice->GetExternalIPAddressV4())
|
|
{
|
|
//
|
|
// If we're here, we haven't already cached the answer. Query the UPnP
|
|
// device.
|
|
//
|
|
|
|
DNASSERT(pUPnPDevice->GetServiceControlURL() != NULL);
|
|
|
|
//
|
|
// If the control socket got disconnected after the last message,
|
|
// then reconnect.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
hr = this->ReconnectUPnPControlSocket(pUPnPDevice);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't reconnect UPnP control socket!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
|
|
wsprintf(tszExternalPort, _T("%u"),
|
|
NTOHS(psaddrinQueryAddress->sin_port));
|
|
|
|
psaddrinTemp = pUPnPDevice->GetHostAddress();
|
|
wsprintf(tszHost, _T("%u.%u.%u.%u:%u"),
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinTemp->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinTemp->sin_port));
|
|
|
|
|
|
|
|
iContentLength = strlen("<s:Envelope" EOL)
|
|
+ strlen(" xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL)
|
|
+ strlen(" s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL)
|
|
+ strlen(" <s:Body>" EOL)
|
|
+ strlen(" <u:" ACTION_GETSPECIFICPORTMAPPINGENTRY_A " xmlns:u=\"") + pUPnPDevice->GetStaticServiceURILength() + strlen("\">" EOL)
|
|
+ strlen(" <" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWREMOTEHOST_A ">" UPNP_WILDCARD "</" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWREMOTEHOST_A ">" EOL)
|
|
+ strlen(" <" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWEXTERNALPORT_A ">") + _tcslen(tszExternalPort) + strlen("</" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWEXTERNALPORT_A ">" EOL)
|
|
+ strlen(" <" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWPROTOCOL_A ">") + 3 + strlen("</" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWPROTOCOL_A ">" EOL)
|
|
+ strlen(" </u:" ACTION_GETSPECIFICPORTMAPPINGENTRY_A ">" EOL)
|
|
+ strlen(" </s:Body>" EOL)
|
|
+ strlen("</s:Envelope>" EOL)
|
|
+ strlen(EOL);
|
|
|
|
wsprintf(tszContentLength, _T("%i"), iContentLength);
|
|
|
|
iMsgSize = strlen("POST ") + strlen(pUPnPDevice->GetServiceControlURL()) + strlen(" " HTTP_VERSION EOL)
|
|
+ strlen("HOST: ") + _tcslen(tszHost) + strlen(EOL)
|
|
+ strlen("CONTENT-LENGTH: ") + _tcslen(tszContentLength) + strlen(EOL)
|
|
+ strlen("CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL)
|
|
+ strlen("SOAPACTION: ") + pUPnPDevice->GetStaticServiceURILength() + strlen("#" ACTION_GETSPECIFICPORTMAPPINGENTRY_A EOL)
|
|
+ strlen(EOL)
|
|
+ iContentLength;
|
|
|
|
|
|
//
|
|
// Allocate (or reallocate) the message buffer.
|
|
//
|
|
if (iMsgSize > iPrevMsgSize)
|
|
{
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
pszMessage = (char*) DNMalloc(iMsgSize + 1); // include room for NULL termination that isn't actually sent
|
|
if (pszMessage == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
iPrevMsgSize = iMsgSize;
|
|
}
|
|
|
|
strcpy(pszMessage, "POST ");
|
|
strcat(pszMessage, pUPnPDevice->GetServiceControlURL());
|
|
strcat(pszMessage, " " HTTP_VERSION EOL);
|
|
strcat(pszMessage, "HOST: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszHost,
|
|
(_tcslen(tszHost) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszHost);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-LENGTH: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszContentLength,
|
|
(_tcslen(tszContentLength) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszContentLength);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL);
|
|
strcat(pszMessage, "SOAPACTION: ");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "#" ACTION_GETSPECIFICPORTMAPPINGENTRY_A EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
strcat(pszMessage, "<s:Envelope" EOL);
|
|
strcat(pszMessage, " xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL);
|
|
strcat(pszMessage, " s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL);
|
|
strcat(pszMessage, " <s:Body>" EOL);
|
|
strcat(pszMessage, " <u:" ACTION_GETSPECIFICPORTMAPPINGENTRY_A " xmlns:u=\"");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "\">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWREMOTEHOST_A ">" UPNP_WILDCARD "</" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWREMOTEHOST_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWEXTERNALPORT_A ">");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszExternalPort,
|
|
(_tcslen(tszExternalPort) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszExternalPort);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, "</" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWEXTERNALPORT_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWPROTOCOL_A ">");
|
|
strcat(pszMessage, ((dwFlags & DPNHQUERYADDRESS_TCP) ? "TCP" : "UDP"));
|
|
strcat(pszMessage, "</" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWPROTOCOL_A ">" EOL);
|
|
|
|
strcat(pszMessage, " </u:" ACTION_GETSPECIFICPORTMAPPINGENTRY_A ">" EOL);
|
|
strcat(pszMessage, " </s:Body>" EOL);
|
|
strcat(pszMessage, "</s:Envelope>" EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
#ifdef DBG
|
|
this->PrintUPnPTransactionToFile(pszMessage,
|
|
iMsgSize,
|
|
"Outbound get port mapping request",
|
|
pDevice);
|
|
#endif // DBG
|
|
|
|
iReturn = this->m_pfnsend(pUPnPDevice->GetControlSocket(),
|
|
pszMessage,
|
|
iMsgSize,
|
|
0);
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending control request to UPnP device!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (iReturn != iMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't send entire message (%i != %i)?!", iReturn, iMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We have the lock so no one could have tried to receive data from
|
|
// the control socket yet. Mark the device as waiting for a response.
|
|
//
|
|
ZeroMemory(&RespInfo, sizeof(RespInfo));
|
|
pUPnPDevice->StartWaitingForControlResponse(CONTROLRESPONSETYPE_GETSPECIFICPORTMAPPINGENTRY,
|
|
&RespInfo);
|
|
fStartedWaitingForControlResponse = TRUE;
|
|
|
|
|
|
//
|
|
// Actually wait for the response.
|
|
//
|
|
dwStartTime = GETTIMESTAMP();
|
|
dwTimeout = g_dwUPnPResponseTimeout;
|
|
do
|
|
{
|
|
hr = this->CheckForReceivedUPnPMsgsOnDevice(pUPnPDevice, dwTimeout);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed receiving UPnP messages!");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We either timed out or got some data. Check if we got a
|
|
// response of some type.
|
|
//
|
|
if (! pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure our device is still connected.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 0, "UPnP device 0x%p disconnected while querying port!",
|
|
pUPnPDevice);
|
|
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Calculate how long we have left to wait. If the calculation
|
|
// goes negative, it means we're done.
|
|
//
|
|
dwTimeout = g_dwUPnPResponseTimeout - (GETTIMESTAMP() - dwStartTime);
|
|
}
|
|
while (((int) dwTimeout > 0));
|
|
|
|
|
|
//
|
|
// If we never got the response, stop waiting for it.
|
|
//
|
|
if (pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
DPFX(DPFPREP, 0, "Server didn't respond in time!");
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, then we've gotten a valid response from the server.
|
|
//
|
|
|
|
if (RespInfo.hrErrorCode != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 1, "Server returned failure response 0x%lx, assuming no port mapping.",
|
|
RespInfo.hrErrorCode);
|
|
fNoPortMapping = TRUE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Address %u.%u.%u.%u doesn't match NAT's external IP address, not querying.",
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinQueryAddress->sin_addr.S_un.S_un_b.s_b4);
|
|
|
|
fNoPortMapping = TRUE;
|
|
}
|
|
|
|
|
|
dwCacheMapFlags = QUERYFLAGSMASK(dwFlags);
|
|
|
|
|
|
//
|
|
// Determine address locality (if requested) and cache the no-mapping
|
|
// result.
|
|
//
|
|
if (fNoPortMapping)
|
|
{
|
|
//
|
|
// Try determining if the address is local, if allowed.
|
|
//
|
|
if (dwFlags & DPNHQUERYADDRESS_CHECKFORPRIVATEBUTUNMAPPED)
|
|
{
|
|
if (this->IsAddressLocal(pDevice, psaddrinQueryAddress))
|
|
{
|
|
DPFX(DPFPREP, 5, "Address appears to be local, returning NOMAPPINGBUTPRIVATE.");
|
|
|
|
dwCacheMapFlags |= CACHEMAPOBJ_PRIVATEBUTUNMAPPED;
|
|
|
|
hr = DPNHERR_NOMAPPINGBUTPRIVATE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 5, "Address does not appear to be local, returning NOMAPPING.");
|
|
|
|
hr = DPNHERR_NOMAPPING;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
hr = DPNHERR_NOMAPPING;
|
|
}
|
|
|
|
|
|
//
|
|
// Cache the fact that we could not determine a mapping for that
|
|
// address, if allowed.
|
|
//
|
|
if (dwFlags & DPNHQUERYADDRESS_CACHENOTFOUND)
|
|
{
|
|
pCacheMap = new CCacheMap(psaddrinQueryAddress,
|
|
(GETTIMESTAMP() + g_dwCacheLifeNotFound),
|
|
(dwCacheMapFlags | CACHEMAPOBJ_NOTFOUND));
|
|
if (pCacheMap == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
pCacheMap->m_blList.InsertBefore(pblCachedMaps);
|
|
}
|
|
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 1, "Server returned a private mapping (%u.%u.%u.%u:%u).",
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b4,
|
|
NTOHS(RespInfo.wInternalPort));
|
|
|
|
|
|
//
|
|
// Convert the loopback address to the device address.
|
|
//
|
|
if (RespInfo.dwInternalClientV4 == NETWORKBYTEORDER_INADDR_LOOPBACK)
|
|
{
|
|
RespInfo.dwInternalClientV4 = pDevice->GetLocalAddressV4();
|
|
|
|
DPFX(DPFPREP, 1, "Converted private loopback address to device address (%u.%u.%u.%u).",
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b4);
|
|
}
|
|
|
|
//
|
|
// If the UPnP device doesn't support asymmetric mappings and thus didn't
|
|
// return a port, or it did return one but it's the bogus port 0, assume
|
|
// the internal port is the same port as the external one.
|
|
//
|
|
if (RespInfo.wInternalPort == 0)
|
|
{
|
|
RespInfo.wInternalPort = psaddrinQueryAddress->sin_port;
|
|
|
|
DPFX(DPFPREP, 2, "Converted invalid internal port to the query address public port (%u).",
|
|
NTOHS(psaddrinQueryAddress->sin_port));
|
|
}
|
|
|
|
|
|
//
|
|
// Ensure that we're not getting something bogus.
|
|
//
|
|
SOCKADDR_IN saddrinTemp;
|
|
saddrinTemp.sin_addr.S_un.S_addr = RespInfo.dwInternalClientV4;
|
|
if ((RespInfo.dwInternalClientV4 == 0) ||
|
|
(! this->IsAddressLocal(pDevice, &saddrinTemp)))
|
|
{
|
|
//
|
|
// If the returned address is the same as the NAT's public address,
|
|
// it's probably Windows ICS returning an ICF mapping. We still treat
|
|
// it as an invalid mapping, but we will cache the results since there
|
|
// are legimitate cases where we can see this.
|
|
//
|
|
if (RespInfo.dwInternalClientV4 == pUPnPDevice->GetExternalIPAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP device returned its public address as the private address (%u.%u.%u.%u:%u). Probably ICS + ICF, but treating as no mapping.",
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b4,
|
|
NTOHS(RespInfo.wInternalPort));
|
|
DNASSERTX(! "UPnP device returned public address as the private address!", 3);
|
|
|
|
//
|
|
// Cache the fact that we did not get a valid mapping for that
|
|
// address, if allowed.
|
|
//
|
|
if (dwFlags & DPNHQUERYADDRESS_CACHENOTFOUND)
|
|
{
|
|
pCacheMap = new CCacheMap(psaddrinQueryAddress,
|
|
(GETTIMESTAMP() + g_dwCacheLifeNotFound),
|
|
(dwCacheMapFlags | CACHEMAPOBJ_NOTFOUND));
|
|
if (pCacheMap == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
pCacheMap->m_blList.InsertBefore(pblCachedMaps);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 0, "UPnP device returned an invalid private address (%u.%u.%u.%u:%u)! Assuming no mapping.",
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&RespInfo.dwInternalClientV4))->S_un.S_un_b.s_b4,
|
|
NTOHS(RespInfo.wInternalPort));
|
|
DNASSERTX(! "Why is UPnP device returning invalid private address?", 2);
|
|
}
|
|
|
|
hr = DPNHERR_NOMAPPING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Return the address mapping to our caller.
|
|
//
|
|
ZeroMemory(psaddrinResponseAddress, sizeof(SOCKADDR_IN));
|
|
psaddrinResponseAddress->sin_family = AF_INET;
|
|
psaddrinResponseAddress->sin_addr.s_addr = RespInfo.dwInternalClientV4;
|
|
psaddrinResponseAddress->sin_port = RespInfo.wInternalPort;
|
|
|
|
|
|
//
|
|
// Cache the fact that we found a mapping for that address, if allowed.
|
|
//
|
|
if (dwFlags & DPNHQUERYADDRESS_CACHEFOUND)
|
|
{
|
|
pCacheMap = new CCacheMap(psaddrinQueryAddress,
|
|
(GETTIMESTAMP() + g_dwCacheLifeFound),
|
|
dwCacheMapFlags);
|
|
if (pCacheMap == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
pCacheMap->SetResponseAddressV4(psaddrinResponseAddress->sin_addr.S_un.S_addr,
|
|
psaddrinResponseAddress->sin_port);
|
|
|
|
pCacheMap->m_blList.InsertBefore(pblCachedMaps);
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
//
|
|
// If we started waiting for a response, clear that.
|
|
//
|
|
if (fStartedWaitingForControlResponse)
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::InternalUPnPQueryAddress
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ExtendUPnPLease"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ExtendUPnPLease
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Asks the UPnP server to extend a port mapping lease.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference if it's using the
|
|
// pointer.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CRegisteredPort * pRegisteredPort - Pointer to port object mapping to
|
|
// extend.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The extension was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
// DPNHERR_SERVERNOTRESPONDING - The server did not respond to the
|
|
// message.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::ExtendUPnPLease(CRegisteredPort * const pRegisteredPort)
|
|
{
|
|
HRESULT hr;
|
|
CDevice * pDevice;
|
|
CUPnPDevice * pUPnPDevice;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p)", this, pRegisteredPort);
|
|
|
|
|
|
DNASSERT(pRegisteredPort != NULL);
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
#ifdef DBG
|
|
if (pRegisteredPort->HasPermanentUPnPLease())
|
|
{
|
|
DPFX(DPFPREP, 1, "Extending already permanent UPnP lease for registered port 0x%p.",
|
|
pRegisteredPort);
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// UPnP devices don't have port extension per se, you just reregister the
|
|
// mapping.
|
|
//
|
|
hr = this->MapPortsOnUPnPDevice(pUPnPDevice, pRegisteredPort);
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
} // CNATHelpUPnP::ExtendUPnPLease
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::UnmapUPnPPort"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::UnmapUPnPPort
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Asks the UPnP server to release a port mapping.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference if it's using the
|
|
// device.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CRegisteredPort * pRegisteredPort - Pointer to port object mapping to
|
|
// release.
|
|
// DWORD dwMaxValidPort - Highest address index in array to
|
|
// try freeing. This may be one more
|
|
// than the actual number to indicate
|
|
// all should be freed.
|
|
// BOOL fNeedToDeleteRegValue - Whether the corresponding crash
|
|
// recovery registry value needs to
|
|
// be deleted as well.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The extension was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
// DPNHERR_SERVERNOTRESPONDING - The server did not respond to the
|
|
// message.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::UnmapUPnPPort(CRegisteredPort * const pRegisteredPort,
|
|
const DWORD dwMaxValidPort,
|
|
const BOOL fNeedToDeleteRegValue)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
BOOL fStartedWaitingForControlResponse = FALSE;
|
|
CDevice * pDevice;
|
|
CUPnPDevice * pUPnPDevice;
|
|
SOCKADDR_IN * psaddrinPublic;
|
|
SOCKADDR_IN * psaddrinPrivate;
|
|
TCHAR tszExternalPort[32];
|
|
int iContentLength;
|
|
TCHAR tszContentLength[32];
|
|
TCHAR tszHost[22]; // "xxx.xxx.xxx.xxx:xxxxx" + NULL termination
|
|
char * pszMessage = NULL;
|
|
int iMsgSize;
|
|
int iPrevMsgSize = 0;
|
|
int iReturn;
|
|
DWORD dwTemp;
|
|
UPNP_CONTROLRESPONSE_INFO RespInfo;
|
|
DWORD dwStartTime;
|
|
DWORD dwTimeout;
|
|
SOCKADDR_IN * psaddrinHostAddress;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %i, %i)",
|
|
this, pRegisteredPort, ((int) dwMaxValidPort), fNeedToDeleteRegValue);
|
|
|
|
|
|
DNASSERT(pRegisteredPort != NULL);
|
|
DNASSERT(dwMaxValidPort != 0);
|
|
DNASSERT(dwMaxValidPort <= pRegisteredPort->GetNumAddresses());
|
|
|
|
pDevice = pRegisteredPort->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
//
|
|
// GetUPnPDevice did not add a reference to pUPnPDevice for us.
|
|
//
|
|
pUPnPDevice->AddRef();
|
|
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
|
|
|
|
|
|
//
|
|
// Prevent trying to remove the lease twice.
|
|
//
|
|
pRegisteredPort->NoteRemovingUPnPLease();
|
|
|
|
|
|
if (dwMaxValidPort == pRegisteredPort->GetNumAddresses())
|
|
{
|
|
DPFX(DPFPREP, 7, "Unmapping all %u addresses for registered port 0x%p on UPnP device 0x%p.",
|
|
dwMaxValidPort, pRegisteredPort, pUPnPDevice);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Error cleanup code, only unmapping first %u addresses (of %u possible) for registered port 0x%p on UPnP device 0x%p.",
|
|
dwMaxValidPort, pRegisteredPort->GetNumAddresses(),
|
|
pRegisteredPort, pUPnPDevice);
|
|
}
|
|
|
|
|
|
//
|
|
// Set up variables we'll need.
|
|
//
|
|
DNASSERT(pUPnPDevice->GetServiceControlURL() != NULL);
|
|
|
|
psaddrinHostAddress = pUPnPDevice->GetHostAddress();
|
|
wsprintf(tszHost, _T("%u.%u.%u.%u:%u"),
|
|
psaddrinHostAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinHostAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinHostAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinHostAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinHostAddress->sin_port));
|
|
|
|
|
|
//
|
|
// Get the array of ports we're releasing.
|
|
//
|
|
psaddrinPublic = pRegisteredPort->GetUPnPPublicAddressesArray();
|
|
psaddrinPrivate = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
|
|
//
|
|
// Loop through each port that we're unmapping.
|
|
//
|
|
for(dwTemp = 0; dwTemp < dwMaxValidPort; dwTemp++)
|
|
{
|
|
//
|
|
// The UPnP Internet Gateway Device spec does not require reference
|
|
// counting for mapped ports. If you register something that had
|
|
// already been registered, it will succeed silently.
|
|
//
|
|
// This means that we will never be able to tell which NAT client was
|
|
// the last person to use a given shared port. You could try detecting
|
|
// any other users at the app level (above DPNATHLP), but there is
|
|
// always a race condition. You could also have a concept of shared-
|
|
// port owner, but then you'd have to implement owner migration a la
|
|
// DPlay host migration. That is sooo not worth it.
|
|
//
|
|
// The other option is to just never unmap shared ports. You can
|
|
// probably imagine the implications of this solution, but it's what we
|
|
// have to do.
|
|
//
|
|
|
|
if (pRegisteredPort->IsSharedPort())
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p address index %u (private address %u.%u.%u.%u:%u) is shared, not unmapping.",
|
|
pRegisteredPort, dwTemp,
|
|
psaddrinPublic[dwTemp].sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinPublic[dwTemp].sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinPublic[dwTemp].sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinPublic[dwTemp].sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinPublic[dwTemp].sin_port));
|
|
continue;
|
|
}
|
|
|
|
|
|
//
|
|
// If the control socket got disconnected after the last message,
|
|
// then reconnect.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
hr = this->ReconnectUPnPControlSocket(pUPnPDevice);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't reconnect UPnP control socket!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
|
|
wsprintf(tszExternalPort, _T("%u"),
|
|
NTOHS(psaddrinPublic[dwTemp].sin_port));
|
|
|
|
|
|
iContentLength = strlen("<s:Envelope" EOL)
|
|
+ strlen(" xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL)
|
|
+ strlen(" s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL)
|
|
+ strlen(" <s:Body>" EOL)
|
|
+ strlen(" <u:" ACTION_DELETEPORTMAPPING_A " xmlns:u=\"") + pUPnPDevice->GetStaticServiceURILength() + strlen("\">" EOL)
|
|
+ strlen(" <" ARG_DELETEPORTMAPPING_NEWREMOTEHOST_A ">" UPNP_WILDCARD "</" ARG_DELETEPORTMAPPING_NEWREMOTEHOST_A ">" EOL)
|
|
+ strlen(" <" ARG_DELETEPORTMAPPING_NEWEXTERNALPORT_A ">") + _tcslen(tszExternalPort) + strlen("</" ARG_DELETEPORTMAPPING_NEWEXTERNALPORT_A ">" EOL)
|
|
+ strlen(" <" ARG_DELETEPORTMAPPING_NEWPROTOCOL_A ">") + 3 + strlen("</" ARG_DELETEPORTMAPPING_NEWPROTOCOL_A ">" EOL)
|
|
+ strlen(" </u:" ACTION_DELETEPORTMAPPING_A ">" EOL)
|
|
+ strlen(" </s:Body>" EOL)
|
|
+ strlen("</s:Envelope>" EOL)
|
|
+ strlen(EOL);
|
|
|
|
wsprintf(tszContentLength, _T("%i"), iContentLength);
|
|
|
|
iMsgSize = strlen("POST ") + strlen(pUPnPDevice->GetServiceControlURL()) + strlen(" " HTTP_VERSION EOL)
|
|
+ strlen("HOST: ") + _tcslen(tszHost) + strlen(EOL)
|
|
+ strlen("CONTENT-LENGTH: ") + _tcslen(tszContentLength) + strlen(EOL)
|
|
+ strlen("CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL)
|
|
+ strlen("SOAPACTION: ") + pUPnPDevice->GetStaticServiceURILength() + strlen("#" ACTION_DELETEPORTMAPPING_A EOL)
|
|
+ strlen(EOL)
|
|
+ iContentLength;
|
|
|
|
|
|
//
|
|
// Allocate (or reallocate) the message buffer.
|
|
//
|
|
if (iMsgSize > iPrevMsgSize)
|
|
{
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
pszMessage = (char*) DNMalloc(iMsgSize + 1); // include room for NULL termination that isn't actually sent
|
|
if (pszMessage == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
iPrevMsgSize = iMsgSize;
|
|
}
|
|
|
|
strcpy(pszMessage, "POST ");
|
|
strcat(pszMessage, pUPnPDevice->GetServiceControlURL());
|
|
strcat(pszMessage, " " HTTP_VERSION EOL);
|
|
strcat(pszMessage, "HOST: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszHost,
|
|
(_tcslen(tszHost) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszHost);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-LENGTH: ");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszContentLength,
|
|
(_tcslen(tszContentLength) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszContentLength);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, EOL);
|
|
strcat(pszMessage, "CONTENT-TYPE: text/xml; charset=\"utf-8\"" EOL);
|
|
strcat(pszMessage, "SOAPACTION: ");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "#" ACTION_DELETEPORTMAPPING_A EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
strcat(pszMessage, "<s:Envelope" EOL);
|
|
strcat(pszMessage, " xmlns:s=\"" URL_SOAPENVELOPE_A "\"" EOL);
|
|
strcat(pszMessage, " s:encodingStyle=\"" URL_SOAPENCODING_A "\">" EOL);
|
|
strcat(pszMessage, " <s:Body>" EOL);
|
|
strcat(pszMessage, " <u:" ACTION_DELETEPORTMAPPING_A " xmlns:u=\"");
|
|
strcat(pszMessage, pUPnPDevice->GetStaticServiceURI());
|
|
strcat(pszMessage, "\">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_DELETEPORTMAPPING_NEWREMOTEHOST_A ">" UPNP_WILDCARD "</" ARG_DELETEPORTMAPPING_NEWREMOTEHOST_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_DELETEPORTMAPPING_NEWEXTERNALPORT_A ">");
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi((pszMessage + strlen(pszMessage)),
|
|
tszExternalPort,
|
|
(_tcslen(tszExternalPort) + 1));
|
|
#else // ! UNICODE
|
|
strcat(pszMessage, tszExternalPort);
|
|
#endif // ! UNICODE
|
|
strcat(pszMessage, "</" ARG_DELETEPORTMAPPING_NEWEXTERNALPORT_A ">" EOL);
|
|
|
|
strcat(pszMessage, " <" ARG_DELETEPORTMAPPING_NEWPROTOCOL_A ">");
|
|
strcat(pszMessage, ((pRegisteredPort->IsTCP()) ? "TCP" : "UDP"));
|
|
strcat(pszMessage, "</" ARG_DELETEPORTMAPPING_NEWPROTOCOL_A ">" EOL);
|
|
|
|
strcat(pszMessage, " </u:" ACTION_DELETEPORTMAPPING_A ">" EOL);
|
|
strcat(pszMessage, " </s:Body>" EOL);
|
|
strcat(pszMessage, "</s:Envelope>" EOL);
|
|
strcat(pszMessage, EOL);
|
|
|
|
|
|
#ifdef DBG
|
|
this->PrintUPnPTransactionToFile(pszMessage,
|
|
iMsgSize,
|
|
"Outbound delete port mapping request",
|
|
pDevice);
|
|
#endif // DBG
|
|
|
|
iReturn = this->m_pfnsend(pUPnPDevice->GetControlSocket(),
|
|
pszMessage,
|
|
iMsgSize,
|
|
0);
|
|
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u when sending control request to UPnP device!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
if (iReturn != iMsgSize)
|
|
{
|
|
DPFX(DPFPREP, 0, "Didn't send entire message (%i != %i)?!", iReturn, iMsgSize);
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// We have the lock so no one could have tried to receive data from
|
|
// the control socket yet. Mark the device as waiting for a
|
|
// response.
|
|
//
|
|
ZeroMemory(&RespInfo, sizeof(RespInfo));
|
|
pUPnPDevice->StartWaitingForControlResponse(CONTROLRESPONSETYPE_DELETEPORTMAPPING,
|
|
&RespInfo);
|
|
fStartedWaitingForControlResponse = TRUE;
|
|
|
|
|
|
//
|
|
// Actually wait for the response.
|
|
//
|
|
dwStartTime = GETTIMESTAMP();
|
|
dwTimeout = g_dwUPnPResponseTimeout;
|
|
do
|
|
{
|
|
hr = this->CheckForReceivedUPnPMsgsOnDevice(pUPnPDevice, dwTimeout);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed receiving UPnP messages!");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We either timed out or got some data. Check if we got a
|
|
// response of some type.
|
|
//
|
|
if (! pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure our device is still connected.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 0, "UPnP device 0x%p disconnected while deleting port index %u!",
|
|
pUPnPDevice, dwTemp);
|
|
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Calculate how long we have left to wait. If the calculation
|
|
// goes negative, it means we're done.
|
|
//
|
|
dwTimeout = g_dwUPnPResponseTimeout - (GETTIMESTAMP() - dwStartTime);
|
|
}
|
|
while (((int) dwTimeout > 0));
|
|
|
|
|
|
//
|
|
// If we never got the response, stop waiting for it.
|
|
//
|
|
if (pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
DPFX(DPFPREP, 0, "Server didn't respond in time for port index %u!",
|
|
dwTemp);
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, then we've gotten a valid response (success or
|
|
// failure) from the server. If it's a failure, print out a note
|
|
// but continue.
|
|
//
|
|
#ifdef DBG
|
|
switch (RespInfo.hrErrorCode)
|
|
{
|
|
case DPNH_OK:
|
|
{
|
|
//
|
|
// Succeeded.
|
|
//
|
|
break;
|
|
}
|
|
|
|
case DPNHERR_NOMAPPING:
|
|
{
|
|
//
|
|
// UPnP device didn't know what we were talking about.
|
|
//
|
|
DPFX(DPFPREP, 1, "Server didn't recognize mapping for port index %u, continuing.",
|
|
dwTemp);
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// Something else happened.
|
|
//
|
|
DPFX(DPFPREP, 0, "Server returned failure response 0x%lx for port index %u! Ignoring.",
|
|
RespInfo.hrErrorCode, dwTemp);
|
|
break;
|
|
}
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// If the lease is permanent, we need to remove the reference from
|
|
// the registry.
|
|
//
|
|
if (pRegisteredPort->HasPermanentUPnPLease())
|
|
{
|
|
IN_ADDR inaddrTemp;
|
|
TCHAR tszInternalClient[16]; // "xxx.xxx.xxx.xxx" + NULL termination
|
|
TCHAR tszInternalPort[32];
|
|
DWORD dwDescriptionLength;
|
|
CRegistry RegObject;
|
|
WCHAR wszDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
#ifdef UNICODE
|
|
TCHAR * ptszDescription = wszDescription;
|
|
#else // ! UNICODE
|
|
char szDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
TCHAR * ptszDescription = szDescription;
|
|
#endif // ! UNICODE
|
|
|
|
|
|
//
|
|
// Note that the device address is not necessarily the same as
|
|
// the address the user originally registered, particularly the
|
|
// 0.0.0.0 wildcard address will get remapped.
|
|
//
|
|
inaddrTemp.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
wsprintf(tszInternalClient, _T("%u.%u.%u.%u"),
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
|
|
wsprintf(tszInternalPort, _T("%u"),
|
|
NTOHS(psaddrinPrivate[dwTemp].sin_port));
|
|
|
|
|
|
//
|
|
// Generate a description for this mapping. The format is:
|
|
//
|
|
// [executable_name] (nnn.nnn.nnn.nnn:nnnnn) nnnnn {"TCP" | "UDP"}
|
|
//
|
|
// That way nothing needs to be localized.
|
|
//
|
|
|
|
dwDescriptionLength = GetModuleFileName(NULL,
|
|
ptszDescription,
|
|
(MAX_UPNP_MAPPING_DESCRIPTION_SIZE - 1));
|
|
if (dwDescriptionLength != 0)
|
|
{
|
|
//
|
|
// Be paranoid and make sure the description string is valid.
|
|
//
|
|
ptszDescription[MAX_UPNP_MAPPING_DESCRIPTION_SIZE - 1] = 0;
|
|
|
|
//
|
|
// Get just the executable name from the path.
|
|
//
|
|
#ifdef WINCE
|
|
GetExeName(ptszDescription);
|
|
#else // ! WINCE
|
|
#ifdef UNICODE
|
|
_wsplitpath(ptszDescription, NULL, NULL, ptszDescription, NULL);
|
|
#else // ! UNICODE
|
|
_splitpath(ptszDescription, NULL, NULL, ptszDescription, NULL);
|
|
#endif // ! UNICODE
|
|
#endif // ! WINCE
|
|
|
|
|
|
dwDescriptionLength = _tcslen(ptszDescription) // executable name
|
|
+ 2 // " ("
|
|
+ _tcslen(tszInternalClient) // private IP address
|
|
+ 1 // ":"
|
|
+ _tcslen(tszInternalPort) // private port
|
|
+ 2 // ") "
|
|
+ _tcslen(tszExternalPort) // public port
|
|
+ 4; // " TCP" | " UDP"
|
|
|
|
//
|
|
// Make sure the long string will fit. If not, use the
|
|
// abbreviated version.
|
|
//
|
|
if (dwDescriptionLength > MAX_UPNP_MAPPING_DESCRIPTION_SIZE)
|
|
{
|
|
dwDescriptionLength = 0;
|
|
}
|
|
}
|
|
|
|
if (dwDescriptionLength == 0)
|
|
{
|
|
//
|
|
// Use the abbreviated version we know will fit.
|
|
//
|
|
wsprintf(ptszDescription,
|
|
_T("(%s:%s) %s %s"),
|
|
tszInternalClient,
|
|
tszInternalPort,
|
|
tszExternalPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// There's enough room, tack on the rest of the
|
|
// description.
|
|
//
|
|
wsprintf((ptszDescription + _tcslen(ptszDescription)),
|
|
_T(" (%s:%s) %s %s"),
|
|
tszInternalClient,
|
|
tszInternalPort,
|
|
tszExternalPort,
|
|
((pRegisteredPort->IsTCP()) ? _T("TCP") : _T("UDP")));
|
|
}
|
|
|
|
|
|
|
|
if (fNeedToDeleteRegValue)
|
|
{
|
|
DPFX(DPFPREP, 7, "Removing NAT lease \"%s\" crash cleanup registry entry.",
|
|
ptszDescription);
|
|
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVENATMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't open active NAT mapping key, unable to remove crash cleanup reference!");
|
|
}
|
|
else
|
|
{
|
|
#ifndef UNICODE
|
|
dwDescriptionLength = strlen(szDescription) + 1;
|
|
hr = STR_jkAnsiToWide(wszDescription, szDescription, dwDescriptionLength);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't convert NAT mapping description to Unicode (err = 0x%lx), unable to remove crash cleanup reference!",
|
|
hr);
|
|
|
|
//
|
|
// Ignore error and continue.
|
|
//
|
|
hr = S_OK;
|
|
}
|
|
else
|
|
#endif // ! UNICODE
|
|
{
|
|
BOOL fResult;
|
|
|
|
|
|
//
|
|
// Ignore error.
|
|
//
|
|
fResult = RegObject.DeleteValue(wszDescription);
|
|
if (! fResult)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't delete NAT mapping value \"%s\"! Continuing.",
|
|
ptszDescription);
|
|
}
|
|
}
|
|
|
|
RegObject.Close();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 6, "No need to remove NAT lease \"%s\" crash cleanup registry entry.",
|
|
ptszDescription);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Registered port doesn't have a permanent UPnP lease.
|
|
//
|
|
}
|
|
|
|
//
|
|
// Move on to next port.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, everything was successful.
|
|
//
|
|
|
|
DPFX(DPFPREP, 8, "Registered port 0x%p mapping successfully deleted from UPnP device (0x%p).",
|
|
pRegisteredPort, pUPnPDevice);
|
|
|
|
|
|
Exit:
|
|
|
|
if (pszMessage != NULL)
|
|
{
|
|
DNFree(pszMessage);
|
|
pszMessage = NULL;
|
|
}
|
|
|
|
//
|
|
// No matter whether we succeeded or failed, remove the UPnP public addresses
|
|
// array and decrement the total lease count.
|
|
//
|
|
pRegisteredPort->DestroyUPnPPublicAddressesArray();
|
|
|
|
DNASSERT(this->m_dwNumLeases > 0);
|
|
this->m_dwNumLeases--;
|
|
|
|
DPFX(DPFPREP, 7, "UPnP lease for 0x%p removed, total num leases = %u.",
|
|
pRegisteredPort, this->m_dwNumLeases);
|
|
|
|
|
|
pRegisteredPort->NoteNotPermanentUPnPLease();
|
|
|
|
pRegisteredPort->NoteNotRemovingUPnPLease();
|
|
|
|
|
|
|
|
pUPnPDevice->DecRef();
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
//
|
|
// If we started waiting for a response, clear that.
|
|
//
|
|
if (fStartedWaitingForControlResponse)
|
|
{
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::UnmapUPnPPort
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CleanupInactiveNATMappings"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CleanupInactiveNATMappings
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Looks for any mappings previously made by other DPNHUPNP
|
|
// instances that are no longer active (because of a crash), and
|
|
// unmaps them.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference if it's using the
|
|
// device.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device to use.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The extension was successful.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
// DPNHERR_SERVERNOTRESPONDING - The server did not respond to the
|
|
// message.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CleanupInactiveNATMappings(CUPnPDevice * const pUPnPDevice)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CDevice * pDevice;
|
|
CRegistry RegObject;
|
|
BOOL fOpenedRegistry = FALSE;
|
|
DWORD dwIndex;
|
|
WCHAR wszValueName[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
DWORD dwValueNameSize;
|
|
DPNHACTIVENATMAPPING dpnhanm;
|
|
DWORD dwValueSize;
|
|
CBilink * pBilink;
|
|
CUPnPDevice * pUPnPDeviceTemp = NULL; // NULLed out because PREfast has been hassling me for a while, even though the code is safe
|
|
TCHAR tszObjectName[MAX_INSTANCENAMEDOBJECT_SIZE];
|
|
DNHANDLE hNamedObject = NULL;
|
|
CRegisteredPort * pRegisteredPort = NULL;
|
|
BOOL fSetPrivateAddresses = FALSE;
|
|
SOCKADDR_IN saddrinPrivate;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p)", this, pUPnPDevice);
|
|
|
|
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVENATMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't open active NAT mapping key, not performing crash cleanup.");
|
|
DNASSERT(hr == DPNH_OK);
|
|
goto Exit;
|
|
}
|
|
|
|
fOpenedRegistry = TRUE;
|
|
|
|
|
|
//
|
|
// Walk the list of active mappings.
|
|
//
|
|
dwIndex = 0;
|
|
do
|
|
{
|
|
dwValueNameSize = MAX_UPNP_MAPPING_DESCRIPTION_SIZE;
|
|
if (! RegObject.EnumValues(wszValueName, &dwValueNameSize, dwIndex))
|
|
{
|
|
//
|
|
// There was an error or there aren't any more keys. We're done.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Try reading that mapping's data.
|
|
//
|
|
dwValueSize = sizeof(dpnhanm);
|
|
if (! RegObject.ReadBlob(wszValueName, (LPBYTE) (&dpnhanm), &dwValueSize))
|
|
{
|
|
//
|
|
// We don't have a lock protecting the registry, so some other
|
|
// instance could have deleted the key between when we enumerated
|
|
// it and now. We'll stop trying (and hopefully that other
|
|
// instance will cover the rest of the items).
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't read \"%ls\" mapping value! Done with cleanup.",
|
|
wszValueName);
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Validate the data read.
|
|
//
|
|
if ((dwValueSize != sizeof(dpnhanm)) ||
|
|
(dpnhanm.dwVersion != ACTIVE_MAPPING_VERSION))
|
|
{
|
|
DPFX(DPFPREP, 0, "The \"%ls\" mapping value is invalid! Done with cleanup.",
|
|
wszValueName);
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
continue;
|
|
}
|
|
|
|
|
|
//
|
|
// See if it's owned by the local NATHelp instance.
|
|
//
|
|
if (dpnhanm.dwInstanceKey == this->m_dwInstanceKey)
|
|
{
|
|
//
|
|
// We own(ed) it. See if it was associated with a UPnP device
|
|
// that's now gone.
|
|
//
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDeviceTemp = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
|
|
if (pUPnPDeviceTemp->GetID() == dpnhanm.dwUPnPDeviceID)
|
|
{
|
|
//
|
|
// This mapping truly is active, leave it alone.
|
|
//
|
|
break;
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
//
|
|
// If we found the mapping, go on to the next one.
|
|
//
|
|
if (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
//
|
|
// Note that despite what PREfast v1.0.1195 says,
|
|
// pUPnPDeviceTemp will always be valid if we get here.
|
|
// However, I gave in and NULLed out the pointer up top.
|
|
//
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" belongs to current instance (%u)'s UPnP device 0x%p.",
|
|
wszValueName, dpnhanm.dwInstanceKey, pUPnPDeviceTemp);
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
continue;
|
|
}
|
|
|
|
|
|
//
|
|
// Otherwise, we gave up on this mapping earlier.
|
|
//
|
|
|
|
DNASSERT((this->m_dwNumDeviceRemoves > 0) || (this->m_dwNumServerFailures > 0));
|
|
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" was owned by current instance (%u)'s UPnP device ID %u that no longer exists.",
|
|
wszValueName, dpnhanm.dwInstanceKey, dpnhanm.dwUPnPDeviceID);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// See if that DPNHUPNP instance is still around.
|
|
//
|
|
|
|
#ifndef WINCE
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX)
|
|
{
|
|
wsprintf(tszObjectName, _T( "Global\\" ) INSTANCENAMEDOBJECT_FORMATSTRING, dpnhanm.dwInstanceKey);
|
|
}
|
|
else
|
|
#endif // ! WINCE
|
|
{
|
|
wsprintf(tszObjectName, INSTANCENAMEDOBJECT_FORMATSTRING, dpnhanm.dwInstanceKey);
|
|
}
|
|
|
|
hNamedObject = DNOpenEvent(SYNCHRONIZE, FALSE, tszObjectName);
|
|
if (hNamedObject != NULL)
|
|
{
|
|
//
|
|
// This is still an active mapping.
|
|
//
|
|
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" belongs to instance %u, which is still active.",
|
|
wszValueName, dpnhanm.dwInstanceKey);
|
|
|
|
DNCloseHandle(hNamedObject);
|
|
hNamedObject = NULL;
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
continue;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" belongs to instance %u, which no longer exists.",
|
|
wszValueName, dpnhanm.dwInstanceKey);
|
|
}
|
|
|
|
|
|
//
|
|
// Delete the value now that we have the information we need.
|
|
//
|
|
if (! RegObject.DeleteValue(wszValueName))
|
|
{
|
|
//
|
|
// See ReadBlob comments. Stop trying to cleanup.
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't delete \"%ls\"! Done with cleanup.",
|
|
wszValueName);
|
|
|
|
DNASSERT(hr == DPNH_OK);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Create a fake registered port that we will deregister. Ignore the
|
|
// firewall state flags.
|
|
//
|
|
pRegisteredPort = new CRegisteredPort(0, (dpnhanm.dwFlags & REGPORTOBJMASK_UPNP));
|
|
if (pRegisteredPort == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Assert that the other UPnP information/state flags are not set.
|
|
//
|
|
DNASSERT(! pRegisteredPort->IsUPnPPortUnavailable());
|
|
DNASSERT(! pRegisteredPort->IsRemovingUPnPLease());
|
|
|
|
|
|
//
|
|
// Temporarily associate the registered port with the device.
|
|
//
|
|
pRegisteredPort->MakeDeviceOwner(pDevice);
|
|
|
|
|
|
|
|
ZeroMemory(&saddrinPrivate, sizeof(saddrinPrivate));
|
|
saddrinPrivate.sin_family = AF_INET;
|
|
saddrinPrivate.sin_addr.S_un.S_addr = dpnhanm.dwInternalAddressV4;
|
|
saddrinPrivate.sin_port = dpnhanm.wInternalPort;
|
|
|
|
|
|
//
|
|
// Store the private address.
|
|
//
|
|
hr = pRegisteredPort->SetPrivateAddresses(&saddrinPrivate, 1);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed creating UPnP address array!");
|
|
goto Failure;
|
|
}
|
|
|
|
fSetPrivateAddresses = TRUE;
|
|
|
|
|
|
//
|
|
// Create the public address array.
|
|
//
|
|
hr = pRegisteredPort->CreateUPnPPublicAddressesArray();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed creating UPnP address array!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Fake increase the number of leases we have. It will just get
|
|
// decremented in UnmapUPnPPort.
|
|
//
|
|
DPFX(DPFPREP, 7, "Creating temporary UPnP lease 0x%p, total num leases = %u.",
|
|
pRegisteredPort, this->m_dwNumLeases);
|
|
this->m_dwNumLeases++;
|
|
|
|
|
|
//
|
|
// Store the public port.
|
|
//
|
|
pRegisteredPort->SetUPnPPublicV4Address(0,
|
|
dpnhanm.dwExternalAddressV4,
|
|
dpnhanm.wExternalPort);
|
|
|
|
|
|
//
|
|
// Actually free the port.
|
|
//
|
|
hr = this->UnmapUPnPPort(pRegisteredPort, 1, FALSE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed deleting temporary UPnP port!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
fSetPrivateAddresses = FALSE;
|
|
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
|
|
|
|
//
|
|
// Move to the next mapping. Don't increment index since we just
|
|
// deleted the previous entry and everything shifts down one.
|
|
//
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pRegisteredPort != NULL)
|
|
{
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
pRegisteredPort->DestroyUPnPPublicAddressesArray();
|
|
|
|
//
|
|
// Remove the lease counter.
|
|
//
|
|
DNASSERT(this->m_dwNumLeases > 0);
|
|
this->m_dwNumLeases--;
|
|
|
|
DPFX(DPFPREP, 7, "UPnP lease for 0x%p removed, total num leases = %u.",
|
|
pRegisteredPort, this->m_dwNumLeases);
|
|
}
|
|
|
|
if (fSetPrivateAddresses)
|
|
{
|
|
pRegisteredPort->ClearPrivateAddresses();
|
|
fSetPrivateAddresses = FALSE;
|
|
}
|
|
|
|
pRegisteredPort->ClearDeviceOwner();
|
|
|
|
delete pRegisteredPort;
|
|
pRegisteredPort = NULL;
|
|
}
|
|
|
|
if (fOpenedRegistry)
|
|
{
|
|
RegObject.Close();
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CleanupInactiveNATMappings
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::IsNATPublicPortInUseLocally"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::IsNATPublicPortInUseLocally
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Looks for any mappings previously made by DPNHUPNP instances
|
|
// that are still active that use the given public port.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// WORD wPortHostOrder - Port to check, in host byte order.
|
|
//
|
|
// Returns: BOOL
|
|
//=============================================================================
|
|
BOOL CNATHelpUPnP::IsNATPublicPortInUseLocally(const WORD wPortHostOrder)
|
|
{
|
|
BOOL fResult = FALSE;
|
|
WORD wExternalPort;
|
|
CRegistry RegObject;
|
|
BOOL fOpenedRegistry = FALSE;
|
|
DWORD dwIndex;
|
|
WCHAR wszValueName[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
DWORD dwValueNameSize;
|
|
DPNHACTIVENATMAPPING dpnhanm;
|
|
CBilink * pBilink;
|
|
CUPnPDevice * pUPnPDevice = NULL; // NULLed out because PREfast has been hassling me for a while, even though the code is safe
|
|
DWORD dwValueSize;
|
|
TCHAR tszObjectName[MAX_INSTANCENAMEDOBJECT_SIZE];
|
|
DNHANDLE hNamedObject = NULL;
|
|
|
|
|
|
DPFX(DPFPREP, 6, "(0x%p) Parameters: (%u)", this, wPortHostOrder);
|
|
|
|
|
|
wExternalPort = HTONS(wPortHostOrder);
|
|
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVENATMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't open active NAT mapping key, assuming port not in use.");
|
|
goto Exit;
|
|
}
|
|
|
|
fOpenedRegistry = TRUE;
|
|
|
|
|
|
//
|
|
// Walk the list of active mappings.
|
|
//
|
|
dwIndex = 0;
|
|
do
|
|
{
|
|
dwValueNameSize = MAX_UPNP_MAPPING_DESCRIPTION_SIZE;
|
|
if (! RegObject.EnumValues(wszValueName, &dwValueNameSize, dwIndex))
|
|
{
|
|
//
|
|
// There was an error or there aren't any more keys. We're done.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Try reading that mapping's data.
|
|
//
|
|
dwValueSize = sizeof(dpnhanm);
|
|
if (! RegObject.ReadBlob(wszValueName, (LPBYTE) (&dpnhanm), &dwValueSize))
|
|
{
|
|
//
|
|
// We don't have a lock protecting the registry, so some other
|
|
// instance could have deleted the key between when we enumerated
|
|
// it and now. We'll stop trying (and hopefully that other
|
|
// instance will cover the rest of the items).
|
|
//
|
|
DPFX(DPFPREP, 0, "Couldn't read \"%ls\" mapping value, assuming port not in use.",
|
|
wszValueName);
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Validate the data read.
|
|
//
|
|
if ((dwValueSize != sizeof(dpnhanm)) ||
|
|
(dpnhanm.dwVersion != ACTIVE_MAPPING_VERSION))
|
|
{
|
|
DPFX(DPFPREP, 0, "The \"%ls\" mapping value is invalid, assuming port not in use.",
|
|
wszValueName);
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
continue;
|
|
}
|
|
|
|
|
|
//
|
|
// Is this the right port?
|
|
//
|
|
if (dpnhanm.wExternalPort == wExternalPort)
|
|
{
|
|
//
|
|
// See if it's owned by the local NATHelp instance.
|
|
//
|
|
if (dpnhanm.dwInstanceKey == this->m_dwInstanceKey)
|
|
{
|
|
//
|
|
// We own(ed) it. See if it was associated with a UPnP device
|
|
// that's now gone.
|
|
//
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
|
|
if (pUPnPDevice->GetID() == dpnhanm.dwUPnPDeviceID)
|
|
{
|
|
//
|
|
// This mapping truly still active.
|
|
//
|
|
fResult = TRUE;
|
|
break;
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
if (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
//
|
|
// Note that despite what PREfast v1.0.1195 says,
|
|
// pUPnPDevice will always be valid if we get here.
|
|
// However, I gave in and NULLed out the pointer up top.
|
|
//
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" belongs to current instance (%u)'s UPnP device 0x%p.",
|
|
wszValueName, dpnhanm.dwInstanceKey, pUPnPDevice);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" was owned by current instance (%u)'s UPnP device ID %u that no longer exists.",
|
|
wszValueName, dpnhanm.dwInstanceKey, dpnhanm.dwUPnPDeviceID);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// See if that DPNHUPNP instance is still around.
|
|
//
|
|
|
|
#ifndef WINCE
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX)
|
|
{
|
|
wsprintf(tszObjectName, _T( "Global\\" ) INSTANCENAMEDOBJECT_FORMATSTRING, dpnhanm.dwInstanceKey);
|
|
}
|
|
else
|
|
#endif // ! WINCE
|
|
{
|
|
wsprintf(tszObjectName, INSTANCENAMEDOBJECT_FORMATSTRING, dpnhanm.dwInstanceKey);
|
|
}
|
|
|
|
hNamedObject = DNOpenEvent(SYNCHRONIZE, FALSE, tszObjectName);
|
|
if (hNamedObject != NULL)
|
|
{
|
|
//
|
|
// This is still an active instance. Since we can't walk
|
|
// his list of UPnP devices, we have to assume the port is
|
|
// still in use.
|
|
//
|
|
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" belongs to instance %u, which is still active. Assuming port in use.",
|
|
wszValueName, dpnhanm.dwInstanceKey);
|
|
|
|
DNCloseHandle(hNamedObject);
|
|
hNamedObject = NULL;
|
|
|
|
fResult = TRUE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 4, "NAT mapping \"%ls\" belongs to instance %u, which no longer exists.",
|
|
wszValueName, dpnhanm.dwInstanceKey);
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// We found the mapping. We have our result now.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, this is not the external port we're looking for.
|
|
//
|
|
DPFX(DPFPREP, 8, "NAT mapping \"%ls\" does not use external port %u.",
|
|
wszValueName, wPortHostOrder);
|
|
|
|
|
|
//
|
|
// Move to the next mapping.
|
|
//
|
|
dwIndex++;
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// If we're here, we didn't find the mapping.
|
|
//
|
|
DPFX(DPFPREP, 4, "Didn't find any local NAT mappings that use external port %u.",
|
|
wPortHostOrder);
|
|
|
|
|
|
Exit:
|
|
|
|
if (fOpenedRegistry)
|
|
{
|
|
RegObject.Close();
|
|
}
|
|
|
|
DPFX(DPFPREP, 6, "(0x%p) Returning: [%i]", this, fResult);
|
|
|
|
return fResult;
|
|
} // CNATHelpUPnP::IsNATPublicPortInUseLocally
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CheckForUPnPAnnouncements"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CheckForUPnPAnnouncements
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Receives any UPnP announcement messages sent to this control
|
|
// point. The entire timeout period will elapse, unless all
|
|
// devices get responses earlier.
|
|
//
|
|
// This will only send discovery requests for local devices
|
|
// unless fSendRemoteGatewayDiscovery is TRUE. However, we may
|
|
// still detect new ones if we got a straggling response from the
|
|
// last time we were allowed to send remotely.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// DWORD dwTimeout - How long to wait for messages to
|
|
// arrive.
|
|
// BOOL fSendRemoteGatewayDiscovery - Whether we can search remotely or
|
|
// not.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Messages were received successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CheckForUPnPAnnouncements(const DWORD dwTimeout,
|
|
const BOOL fSendRemoteGatewayDiscovery)
|
|
{
|
|
HRESULT hr;
|
|
DWORD dwNumberOfTimes = 0;
|
|
DWORD dwCurrentTime;
|
|
DWORD dwEndTime;
|
|
DWORD dwNextSearchMessageTime;
|
|
FD_SET fdsRead;
|
|
DWORD dwNumDevicesSearchingForUPnPDevices;
|
|
timeval tv;
|
|
CBilink * pBilink;
|
|
CDevice * pDevice;
|
|
int iReturn;
|
|
int iRecvAddressSize;
|
|
char acBuffer[UPNP_DGRAM_RECV_BUFFER_SIZE];
|
|
SOCKADDR_IN saddrinRecvAddress;
|
|
DWORD dwError;
|
|
BOOL fInitiatedConnect = FALSE;
|
|
#ifdef DBG
|
|
BOOL fGotData = FALSE;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters:(%u, %i)",
|
|
this, dwTimeout, fSendRemoteGatewayDiscovery);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
|
|
|
|
dwCurrentTime = GETTIMESTAMP();
|
|
dwEndTime = dwCurrentTime + dwTimeout;
|
|
dwNextSearchMessageTime = dwCurrentTime;
|
|
|
|
//
|
|
// Keep looping until the timeout elapses.
|
|
//
|
|
do
|
|
{
|
|
FD_ZERO(&fdsRead);
|
|
dwNumDevicesSearchingForUPnPDevices = 0;
|
|
|
|
|
|
//
|
|
// Build an FD_SET for all the sockets and send out search messages for
|
|
// all devices.
|
|
//
|
|
DNASSERT(! this->m_blDevices.IsEmpty());
|
|
pBilink = this->m_blDevices.GetNext();
|
|
while (pBilink != &this->m_blDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilink);
|
|
|
|
|
|
//
|
|
// We add it to the set whether we search or not, since if we're
|
|
// not searching, we're going to be clearing straggling messages.
|
|
//
|
|
DNASSERT(pDevice->GetUPnPDiscoverySocket() != INVALID_SOCKET);
|
|
FD_SET(pDevice->GetUPnPDiscoverySocket(), &fdsRead);
|
|
|
|
|
|
//
|
|
// Don't send search messages if we already have a UPnP device or
|
|
// this is the loopback adapter.
|
|
//
|
|
if ((pDevice->GetUPnPDevice() == NULL) &&
|
|
(pDevice->GetLocalAddressV4() != NETWORKBYTEORDER_INADDR_LOOPBACK))
|
|
{
|
|
//
|
|
// If this is the first time through the loop, clear the
|
|
// CONNRESET warning flags.
|
|
//
|
|
if (dwNumberOfTimes == 0)
|
|
{
|
|
pDevice->NoteNotGotRemoteUPnPDiscoveryConnReset();
|
|
pDevice->NoteNotGotLocalUPnPDiscoveryConnReset();
|
|
}
|
|
|
|
|
|
//
|
|
// Send out search messages if it's time.
|
|
//
|
|
if ((int) (dwNextSearchMessageTime - dwCurrentTime) <= 0)
|
|
{
|
|
hr = this->SendUPnPSearchMessagesForDevice(pDevice,
|
|
fSendRemoteGatewayDiscovery);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't send UPnP search messages via every device!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not time to send search messages.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// For subsequent times through the loop, make sure we didn't
|
|
// get a CONNRESET earlier telling us not to try again.
|
|
// The "attempt?" flags got set in
|
|
// SendUPnPSearchMessagesForDevice, and the CONNRESET flags
|
|
// were cleared the first time we entered here.
|
|
//
|
|
if ((pDevice->IsOKToPerformRemoteUPnPDiscovery()) ||
|
|
(pDevice->IsOKToPerformLocalUPnPDiscovery()))
|
|
{
|
|
//
|
|
// Remember that we're trying to detect an Internet Gateway
|
|
// for this device. See caveat immediately following, and
|
|
// below for this variable's usage.
|
|
//
|
|
dwNumDevicesSearchingForUPnPDevices++;
|
|
|
|
|
|
//
|
|
// Minor optimization:
|
|
//
|
|
// If we're only supposed to be trying locally, and we're
|
|
// the public address for a local gateway, assume that we
|
|
// actually shouldn't be trying locally. This is because
|
|
// Windows XP ICS keeps port 1900 open even on the public
|
|
// adapter, so we think we need to look for a local one
|
|
// even though we won't find one. So once the remote
|
|
// lookup comes back with a CONNRESET, we no longer need to
|
|
// bother trying.
|
|
//
|
|
// So first check if we're only trying locally.
|
|
//
|
|
if ((pDevice->IsOKToPerformLocalUPnPDiscovery()) &&
|
|
(! pDevice->IsOKToPerformRemoteUPnPDiscovery()))
|
|
{
|
|
CBilink * pBilinkPrivateDevice;
|
|
CDevice * pPrivateDevice;
|
|
CUPnPDevice * pUPnPDevice;
|
|
|
|
|
|
//
|
|
// Then loop through every device.
|
|
//
|
|
pBilinkPrivateDevice = this->m_blDevices.GetNext();
|
|
while (pBilinkPrivateDevice != &this->m_blDevices)
|
|
{
|
|
pPrivateDevice = DEVICE_FROM_BILINK(pBilinkPrivateDevice);
|
|
pUPnPDevice = pPrivateDevice->GetUPnPDevice();
|
|
|
|
|
|
//
|
|
// If it's not the device we're querying and it has
|
|
// a ready UPnP device, dig deeper.
|
|
//
|
|
if ((pPrivateDevice != pDevice) &&
|
|
(pUPnPDevice != NULL) &&
|
|
(pUPnPDevice->IsReady()))
|
|
{
|
|
//
|
|
// If its a local UPnP device and its public
|
|
// address is this device's address, we found a
|
|
// match.
|
|
//
|
|
if ((pUPnPDevice->IsLocal()) &&
|
|
(pUPnPDevice->GetExternalIPAddressV4() == pDevice->GetLocalAddressV4()))
|
|
{
|
|
DPFX(DPFPREP, 4, "Device 0x%p is the public address for device 0x%p's local UPnP device 0x%p, not including in search.",
|
|
pDevice, pPrivateDevice, pUPnPDevice);
|
|
|
|
//
|
|
// Remove the count we added above.
|
|
//
|
|
dwNumDevicesSearchingForUPnPDevices--;
|
|
|
|
//
|
|
// Stop searching.
|
|
//
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Otherwise keep going.
|
|
//
|
|
DPFX(DPFPREP, 8, "Skipping device 0x%p, UPnP device 0x%p not local (%i, control addr = %u.%u.%u.%u) or its public address doesn't match device 0x%p's address.",
|
|
pPrivateDevice,
|
|
pUPnPDevice,
|
|
(! pUPnPDevice->IsLocal()),
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b1,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b2,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b3,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "Skipping device 0x%p, it's the one we're looking for (matched 0x%p), it doesn't have a UPnP device (0x%p is NULL), and/or its UPnP device is not ready.",
|
|
pPrivateDevice, pDevice, pUPnPDevice);
|
|
}
|
|
|
|
|
|
//
|
|
// Go on to next device.
|
|
//
|
|
pBilinkPrivateDevice = pBilinkPrivateDevice->GetNext();
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Either not searching locally, or searching both
|
|
// locally and remotely.
|
|
//
|
|
DPFX(DPFPREP, 8, "Device 0x%p local search OK = %i, remote search OK = %i.",
|
|
pDevice,
|
|
pDevice->IsOKToPerformLocalUPnPDiscovery(),
|
|
pDevice->IsOKToPerformRemoteUPnPDiscovery());
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, "Device 0x%p should not perform UPnP discovery.",
|
|
pDevice);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "Device 0x%p already has UPnP device (0x%p) or is loopback address.",
|
|
pDevice, pDevice->GetUPnPDevice());
|
|
}
|
|
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// Wait for any data, unless all devices already have an Internet
|
|
// Gateway, in which case we only want to clear the receive queue for
|
|
// the sockets.
|
|
//
|
|
if (dwNumDevicesSearchingForUPnPDevices == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "No devices need to search for UPnP devices, clearing straggling messages from sockets.");
|
|
|
|
tv.tv_usec = 0;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Calculate the next time to send if we just sent search messages.
|
|
//
|
|
if ((int) (dwNextSearchMessageTime - dwCurrentTime) <= 0)
|
|
{
|
|
dwNextSearchMessageTime += UPNP_SEARCH_MESSAGE_INTERVAL;
|
|
|
|
//
|
|
// If we took way longer than expected in a previous loop
|
|
// (because of stress or Win9x errata), the next search time
|
|
// may have already passed. Just search right now if that's
|
|
// the case.
|
|
//
|
|
if ((int) (dwNextSearchMessageTime - dwCurrentTime) <= 0)
|
|
{
|
|
dwNextSearchMessageTime = dwCurrentTime;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// See how long we should wait for responses. Choose the total end
|
|
// time or the next search message time, whichever is shorter.
|
|
//
|
|
if ((int) (dwEndTime - dwNextSearchMessageTime) < 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Waiting %u ms for incoming responses.",
|
|
(dwEndTime - dwCurrentTime));
|
|
|
|
tv.tv_usec = (dwEndTime - dwCurrentTime) * 1000;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Waiting %u ms for incoming responses, and then might send search messages again.",
|
|
(dwNextSearchMessageTime - dwCurrentTime));
|
|
|
|
tv.tv_usec = (dwNextSearchMessageTime - dwCurrentTime) * 1000;
|
|
}
|
|
}
|
|
|
|
tv.tv_sec = 0;
|
|
|
|
|
|
iReturn = this->m_pfnselect(0, &fdsRead, NULL, NULL, &tv);
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u trying to select on UPnP discovery sockets!", dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// See if any sockets were selected.
|
|
//
|
|
if (iReturn > 0)
|
|
{
|
|
//
|
|
// Loop through all devices, looking for those that have data.
|
|
//
|
|
pBilink = this->m_blDevices.GetNext();
|
|
while (pBilink != &this->m_blDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilink);
|
|
|
|
|
|
//
|
|
// If this device's socket is set there's data to read.
|
|
//
|
|
//if (FD_ISSET(pDevice->GetUPnPDiscoverySocket(), &fdsRead))
|
|
if (this->m_pfn__WSAFDIsSet(pDevice->GetUPnPDiscoverySocket(), &fdsRead))
|
|
{
|
|
#ifdef DBG
|
|
fGotData = TRUE;
|
|
#endif // DBG
|
|
|
|
|
|
iRecvAddressSize = sizeof(saddrinRecvAddress);
|
|
|
|
iReturn = this->m_pfnrecvfrom(pDevice->GetUPnPDiscoverySocket(),
|
|
acBuffer,
|
|
(sizeof(acBuffer) - 1), // -1 to allow string termination
|
|
0,
|
|
(SOCKADDR*) (&saddrinRecvAddress),
|
|
&iRecvAddressSize);
|
|
|
|
if ((iReturn == 0) || (iReturn == SOCKET_ERROR))
|
|
{
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
|
|
|
|
//
|
|
// WSAENOBUFS means WinSock is out of memory.
|
|
//
|
|
if (dwError == WSAENOBUFS)
|
|
{
|
|
DPFX(DPFPREP, 0, "WinSock returned WSAENOBUFS while receiving discovery response!");
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// All other errors besides WSAECONNRESET are
|
|
// unexpected and mean we should bail.
|
|
//
|
|
if (dwError != WSAECONNRESET)
|
|
{
|
|
DPFX(DPFPREP, 0, "Got sockets error %u trying to receive on device 0x%p!",
|
|
dwError, pDevice);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, it must be WSAECONNRESET. Correlate
|
|
// it with the outbound message that generated it so we
|
|
// don't bother waiting for a response from that
|
|
// location.
|
|
// Validate that it's for the port to which the message
|
|
// should have been sent.
|
|
//
|
|
if (saddrinRecvAddress.sin_port == HTONS(UPNP_PORT))
|
|
{
|
|
if (saddrinRecvAddress.sin_addr.S_un.S_addr == pDevice->GetLocalAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 1, "Got CONNRESET for local discovery attempt on device 0x%p (%u.%u.%u.%u:%u).",
|
|
pDevice,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinRecvAddress.sin_port));
|
|
|
|
//
|
|
// Note the local error.
|
|
//
|
|
pDevice->NoteGotLocalUPnPDiscoveryConnReset();
|
|
}
|
|
else
|
|
{
|
|
if (! g_fUseMulticastUPnPDiscovery)
|
|
{
|
|
IN_ADDR inaddrGateway;
|
|
|
|
|
|
if ((! this->GetAddressToReachGateway(pDevice, &inaddrGateway)) ||
|
|
(inaddrGateway.S_un.S_addr == INADDR_BROADCAST) ||
|
|
(saddrinRecvAddress.sin_addr.S_un.S_addr == inaddrGateway.S_un.S_addr))
|
|
{
|
|
DPFX(DPFPREP, 2, "Got CONNRESET for remote discovery attempt on device 0x%p (%u.%u.%u.%u:%u).",
|
|
pDevice,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinRecvAddress.sin_port));
|
|
|
|
//
|
|
// Note the remote error.
|
|
//
|
|
pDevice->NoteGotRemoteUPnPDiscoveryConnReset();
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Ignoring CONNRESET on device 0x%p, sender %u.%u.%u.%u is not gateway %u.%u.%u.%u.",
|
|
pDevice,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b4,
|
|
inaddrGateway.S_un.S_un_b.s_b1,
|
|
inaddrGateway.S_un.S_un_b.s_b2,
|
|
inaddrGateway.S_un.S_un_b.s_b3,
|
|
inaddrGateway.S_un.S_un_b.s_b4);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Ignoring CONNRESET on device 0x%p from sender %u.%u.%u.%u, we are using multicast discovery.",
|
|
pDevice,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b4);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Ignoring CONNRESET on device 0x%p for invalid port (%u.%u.%u.%u:%u).",
|
|
pDevice,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinRecvAddress.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinRecvAddress.sin_port));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(iRecvAddressSize == sizeof(saddrinRecvAddress));
|
|
DNASSERT(iReturn < sizeof(acBuffer));
|
|
|
|
|
|
hr = this->HandleUPnPDiscoveryResponseMsg(pDevice,
|
|
&saddrinRecvAddress,
|
|
acBuffer,
|
|
iReturn,
|
|
&fInitiatedConnect);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't handle UPnP discovery response message (err = 0x%lx), ignoring.",
|
|
hr);
|
|
}
|
|
}
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure we actually found a socket with data.
|
|
//
|
|
DNASSERT(fGotData);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// We timed out. If we were just clearing receive buffers for the
|
|
// socket(s), we're done.
|
|
//
|
|
if (dwNumDevicesSearchingForUPnPDevices == 0)
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Increase the counter.
|
|
//
|
|
dwNumberOfTimes++;
|
|
|
|
|
|
//
|
|
// Get current time for figuring out how much longer to wait.
|
|
//
|
|
dwCurrentTime = GETTIMESTAMP();
|
|
}
|
|
while ((int) (dwEndTime - dwCurrentTime) > 0);
|
|
|
|
|
|
hr = DPNH_OK;
|
|
|
|
|
|
//
|
|
// If we initiated connections to any UPnP devices, wait for them to
|
|
// complete.
|
|
//
|
|
if (fInitiatedConnect)
|
|
{
|
|
hr = this->WaitForUPnPConnectCompletions();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't wait for UPnP connect completions!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CheckForUPnPAnnouncements
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::WaitForUPnPConnectCompletions"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::WaitForUPnPConnectCompletions
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Waits for completions for pending TCP connects to UPnP
|
|
// Internet gateway devices.
|
|
//
|
|
// UPnP devices may get removed from list if a failure occurs.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Connects were handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::WaitForUPnPConnectCompletions(void)
|
|
{
|
|
HRESULT hr;
|
|
int iNumSockets;
|
|
FD_SET fdsWrite;
|
|
FD_SET fdsExcept;
|
|
CBilink * pBilink;
|
|
CUPnPDevice * pUPnPDevice;
|
|
timeval tv;
|
|
int iReturn;
|
|
BOOL fRequestedDescription = FALSE;
|
|
DWORD dwStartTime;
|
|
DWORD dwTimeout;
|
|
CDevice * pDevice;
|
|
#ifdef DBG
|
|
BOOL fFoundCompletion;
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Enter", this);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
|
|
|
|
//
|
|
// Loop until all sockets are connected or there's a timeout.
|
|
//
|
|
do
|
|
{
|
|
//
|
|
// Check for any connect completions. Start by building two FD_SETs
|
|
// for all the sockets with pending connects.
|
|
//
|
|
|
|
FD_ZERO(&fdsWrite);
|
|
FD_ZERO(&fdsExcept);
|
|
iNumSockets = 0;
|
|
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
|
|
if (pUPnPDevice->IsConnecting())
|
|
{
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
FD_SET(pUPnPDevice->GetControlSocket(), &fdsWrite);
|
|
FD_SET(pUPnPDevice->GetControlSocket(), &fdsExcept);
|
|
iNumSockets++;
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// If there weren't any sockets that had pending connections, then
|
|
// we're done here.
|
|
//
|
|
if (iNumSockets <= 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "No more UPnP device control sockets with pending connections.");
|
|
break;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "There are %i UPnP device control sockets with pending connections.",
|
|
iNumSockets);
|
|
|
|
|
|
//
|
|
// Wait for connect completions. We don't wait for the full TCP/IP
|
|
// timeout (which is why we made it non-blocking).
|
|
//
|
|
|
|
tv.tv_usec = 0;
|
|
tv.tv_sec = g_dwUPnPConnectTimeout;
|
|
|
|
iReturn = this->m_pfnselect(0, NULL, &fdsWrite, &fdsExcept, &tv);
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u trying to select on UPnP device sockets!",
|
|
dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If no sockets were selected, that means the connections timed out.
|
|
// Remove all the devices that were waiting.
|
|
//
|
|
if (iReturn == 0)
|
|
{
|
|
DPFX(DPFPREP, 3, "Select for %u seconds timed out.", g_dwUPnPConnectTimeout);
|
|
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
pBilink = pBilink->GetNext();
|
|
|
|
if (pUPnPDevice->IsConnecting())
|
|
{
|
|
DPFX(DPFPREP, 7, "UPnP device 0x%p is still connecting, removing.",
|
|
pUPnPDevice);
|
|
|
|
|
|
//
|
|
// Dump this unusable UPnP device and continue.
|
|
//
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pUPnPDevice->GetOwningDevice() != NULL);
|
|
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
this->m_pfnclosesocket(pUPnPDevice->GetControlSocket());
|
|
pUPnPDevice->SetControlSocket(INVALID_SOCKET);
|
|
|
|
|
|
//
|
|
// This may cause our pUPnPDevice pointer to become
|
|
// invalid.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
|
|
|
|
#ifdef DBG
|
|
iNumSockets--;
|
|
#endif // DBG
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "UPnP device 0x%p is not trying to connect or has safely connected.",
|
|
pUPnPDevice);
|
|
}
|
|
}
|
|
|
|
//
|
|
// We should have destroyed the same number of devices that were
|
|
// waiting.
|
|
//
|
|
DNASSERT(iNumSockets == 0);
|
|
|
|
//
|
|
// Continue on to handling any sockets succeeded previously.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, some sockets were signalled.
|
|
//
|
|
|
|
#ifdef DBG
|
|
DPFX(DPFPREP, 7, "There are %i sockets with connect activity.", iReturn);
|
|
fFoundCompletion = FALSE;
|
|
#endif // DBG
|
|
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
pBilink = pBilink->GetNext();
|
|
|
|
if (pUPnPDevice->IsConnecting())
|
|
{
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
|
|
//
|
|
// If this UPnP device's socket is in the write set it
|
|
// connected successfully.
|
|
//
|
|
//if (FD_ISSET(pUPnPDevice->GetControlSocket(), &fdsWrite))
|
|
if (this->m_pfn__WSAFDIsSet(pUPnPDevice->GetControlSocket(), &fdsWrite))
|
|
{
|
|
pUPnPDevice->NoteConnected();
|
|
|
|
#ifdef DBG
|
|
fFoundCompletion = TRUE;
|
|
#endif // DBG
|
|
|
|
if (! pUPnPDevice->IsReady())
|
|
{
|
|
DPFX(DPFPREP, 2, "UPnP device object 0x%p now connected to Internet gateway device.",
|
|
pUPnPDevice);
|
|
|
|
hr = this->SendUPnPDescriptionRequest(pUPnPDevice);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't send UPnP description request to device object 0x%p! Disconnecting.",
|
|
pUPnPDevice);
|
|
|
|
|
|
//
|
|
// Dump this unusable UPnP device and continue.
|
|
//
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pUPnPDevice->GetOwningDevice() != NULL);
|
|
|
|
//
|
|
// This may cause our pUPnPDevice pointer to become
|
|
// invalid.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
}
|
|
else
|
|
{
|
|
fRequestedDescription = TRUE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 2, "UPnP device object 0x%p successfully reconnected to Internet gateway device.",
|
|
pUPnPDevice);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// If this UPnP device's socket is in the except set it
|
|
// failed to connect.
|
|
//
|
|
//if (FD_ISSET(pUPnPDevice->GetControlSocket(), &fdsExcept))
|
|
if (this->m_pfn__WSAFDIsSet(pUPnPDevice->GetControlSocket(), &fdsExcept))
|
|
{
|
|
#ifdef DBG
|
|
int iError;
|
|
int iErrorSize;
|
|
|
|
|
|
fFoundCompletion = TRUE;
|
|
|
|
//
|
|
// Print out the reason why it couldn't connect.
|
|
// Ignore the direct return code from getsockopt.
|
|
//
|
|
iError = 0;
|
|
iErrorSize = sizeof(iError);
|
|
this->m_pfngetsockopt(pUPnPDevice->GetControlSocket(),
|
|
SOL_SOCKET,
|
|
SO_ERROR,
|
|
(char*) (&iError),
|
|
&iErrorSize);
|
|
DPFX(DPFPREP, 1, "Connecting to UPnP device object 0x%p failed with error %i, removing from list.",
|
|
pUPnPDevice, iError);
|
|
#endif // DBG
|
|
|
|
//
|
|
// This UPnP device is useless if it doesn't respond.
|
|
// Throw it out.
|
|
//
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pUPnPDevice->GetOwningDevice() != NULL);
|
|
|
|
this->m_pfnclosesocket(pUPnPDevice->GetControlSocket());
|
|
pUPnPDevice->SetControlSocket(INVALID_SOCKET);
|
|
|
|
//
|
|
// This may cause our pUPnPDevice pointer to become
|
|
// invalid.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Socket is still connecting.
|
|
//
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// This socket is already connected.
|
|
//
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure we actually found a socket with a connect completion this
|
|
// time through.
|
|
//
|
|
DNASSERT(fFoundCompletion);
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// If we're here, all UPnP devices are connected or have since been
|
|
// destroyed.
|
|
//
|
|
if (fRequestedDescription)
|
|
{
|
|
//
|
|
// Wait for the description responses to come back.
|
|
//
|
|
dwStartTime = GETTIMESTAMP();
|
|
dwTimeout = g_dwUPnPResponseTimeout;
|
|
do
|
|
{
|
|
hr = this->CheckForReceivedUPnPMsgsOnAllDevices(dwTimeout);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed receiving UPnP messages!");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We either timed out or got some data. Check if we got the
|
|
// response(s) we need. Reuse the fRequestedDescription
|
|
// boolean.
|
|
//
|
|
|
|
fRequestedDescription = FALSE;
|
|
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
|
|
if (! pUPnPDevice->IsReady())
|
|
{
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 7, "UPnP device 0x%p is not ready yet.",
|
|
pUPnPDevice);
|
|
fRequestedDescription = TRUE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 4, "UPnP device 0x%p got disconnected before receiving description response.",
|
|
pUPnPDevice);
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
if (! fRequestedDescription)
|
|
{
|
|
DPFX(DPFPREP, 6, "All UPnP devices are ready or disconnected now.");
|
|
|
|
//
|
|
// Break out of the wait loop.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Calculate how long we have left to wait. If the calculation
|
|
// goes negative, it means we're done.
|
|
//
|
|
dwTimeout = g_dwUPnPResponseTimeout - (GETTIMESTAMP() - dwStartTime);
|
|
}
|
|
while (((int) dwTimeout > 0));
|
|
|
|
|
|
//
|
|
// Any devices that still aren't ready yet were either disconnected or
|
|
// are taking too long and should be removed.
|
|
//
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
pBilink = pBilink->GetNext();
|
|
|
|
if (! pUPnPDevice->IsReady())
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP device 0x%p got disconnected or took too long to get ready, removing.",
|
|
pUPnPDevice);
|
|
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pUPnPDevice->GetOwningDevice() != NULL);
|
|
|
|
//
|
|
// This may cause our pUPnPDevice pointer to become
|
|
// invalid.
|
|
//
|
|
this->ClearDevicesUPnPDevice(pDevice);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Did not request any descriptions.");
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, everything is successful and we're done.
|
|
//
|
|
hr = DPNH_OK;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::WaitForUPnPConnectCompletions
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CheckForReceivedUPnPMsgsOnAllDevices"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CheckForReceivedUPnPMsgsOnAllDevices
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Handles any incoming data on the TCP sockets connect to UPnP
|
|
// Internet gateway devices.
|
|
//
|
|
// UPnP devices with failures may get removed from the list.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// DWORD dwTimeout - How long to wait for messages to arrive, or 0 to just
|
|
// poll.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Messages were handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CheckForReceivedUPnPMsgsOnAllDevices(const DWORD dwTimeout)
|
|
{
|
|
HRESULT hr;
|
|
int iNumSockets;
|
|
FD_SET fdsRead;
|
|
CBilink * pBilink;
|
|
CUPnPDevice * pUPnPDevice;
|
|
timeval tv;
|
|
int iReturn;
|
|
#ifdef DBG
|
|
BOOL fFoundData = FALSE;
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (%u)", this, dwTimeout);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
|
|
|
|
Rewait:
|
|
|
|
iNumSockets = 0;
|
|
|
|
|
|
//
|
|
// Check for any data. Start by building an FD_SET for all the sockets
|
|
// with completed connections.
|
|
//
|
|
|
|
FD_ZERO(&fdsRead);
|
|
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
FD_SET(pUPnPDevice->GetControlSocket(), &fdsRead);
|
|
iNumSockets++;
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// If there weren't any sockets that were connected, then we're done here.
|
|
//
|
|
if (iNumSockets <= 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "No connected UPnP device control sockets.");
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "There are %i connected UPnP device control sockets.",
|
|
iNumSockets);
|
|
|
|
|
|
//
|
|
// Wait for received data.
|
|
//
|
|
|
|
tv.tv_usec = dwTimeout * 1000;
|
|
tv.tv_sec = 0;
|
|
|
|
iReturn = this->m_pfnselect(0, &fdsRead, NULL, NULL, &tv);
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u trying to select on UPnP device sockets!",
|
|
dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If no sockets were selected, we're done.
|
|
//
|
|
if (iReturn == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Timed out waiting for data on %i sockets.",
|
|
iNumSockets);
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, some sockets were signalled.
|
|
//
|
|
|
|
pBilink = this->m_blUPnPDevices.GetNext();
|
|
while (pBilink != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilink);
|
|
pBilink = pBilink->GetNext();
|
|
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
|
|
//
|
|
// If this UPnP device's socket is in the read set it has data.
|
|
//
|
|
//if (FD_ISSET(pUPnPDevice->GetControlSocket(), &fdsRead))
|
|
if (this->m_pfn__WSAFDIsSet(pUPnPDevice->GetControlSocket(), &fdsRead))
|
|
{
|
|
#ifdef DBG
|
|
fFoundData = TRUE;
|
|
#endif // DBG
|
|
|
|
//
|
|
// Grab a reference, since ReceiveUPnPDataStream may clear the
|
|
// device.
|
|
//
|
|
pUPnPDevice->AddRef();
|
|
|
|
|
|
hr = this->ReceiveUPnPDataStream(pUPnPDevice);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't receive UPnP stream from device object 0x%p (err = 0x%lx)! Disconnecting.",
|
|
pUPnPDevice, hr);
|
|
|
|
//
|
|
// Dump this unusable UPnP device and continue.
|
|
//
|
|
if (pUPnPDevice->GetOwningDevice() != NULL)
|
|
{
|
|
this->ClearDevicesUPnPDevice(pUPnPDevice->GetOwningDevice());
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP device 0x%p's has already been removed from owning device.",
|
|
pUPnPDevice);
|
|
}
|
|
|
|
hr = DPNH_OK;
|
|
}
|
|
|
|
//
|
|
// Remove the reference we added.
|
|
//
|
|
pUPnPDevice->DecRef();
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Socket does not have any data.
|
|
//
|
|
DPFX(DPFPREP, 8, "Skipping UPnP device 0x%p because it does not have any data.",
|
|
pUPnPDevice);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// This socket is not connected yet/anymore.
|
|
//
|
|
DPFX(DPFPREP, 7, "Skipping unconnected UPnP device 0x%p.", pUPnPDevice);
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure we actually found a socket with data.
|
|
//
|
|
DNASSERT(fFoundData);
|
|
|
|
|
|
//
|
|
// We found data, so see if there's more. Connection should be closed
|
|
// after responses.
|
|
//
|
|
DPFX(DPFPREP, 7, "Waiting for more data on the sockets.");
|
|
goto Rewait;
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CheckForReceivedUPnPMsgsOnAllDevices
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CheckForReceivedUPnPMsgsOnDevice"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CheckForReceivedUPnPMsgsOnDevice
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Handles any incoming data on the TCP socket for the given
|
|
// UPnP device.
|
|
//
|
|
// If the UPnP device encounters a failure, it may get removed
|
|
// from the list.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device to receive data.
|
|
// DWORD dwTimeout - How long to wait for messages to arrive, or 0
|
|
// to just poll.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Messages were handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::CheckForReceivedUPnPMsgsOnDevice(CUPnPDevice * const pUPnPDevice,
|
|
const DWORD dwTimeout)
|
|
{
|
|
HRESULT hr;
|
|
FD_SET fdsRead;
|
|
timeval tv;
|
|
int iReturn;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %u)", this, pUPnPDevice, dwTimeout);
|
|
|
|
|
|
DNASSERT(this->m_dwFlags & NATHELPUPNPOBJ_INITIALIZED);
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
DNASSERT(pUPnPDevice->IsConnected());
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
|
|
do
|
|
{
|
|
//
|
|
// Create an FD_SET for the socket in question.
|
|
//
|
|
|
|
FD_ZERO(&fdsRead);
|
|
FD_SET(pUPnPDevice->GetControlSocket(), &fdsRead);
|
|
|
|
|
|
//
|
|
// Wait for received data.
|
|
//
|
|
|
|
tv.tv_usec = dwTimeout * 1000;
|
|
tv.tv_sec = 0;
|
|
|
|
iReturn = this->m_pfnselect(0, &fdsRead, NULL, NULL, &tv);
|
|
if (iReturn == SOCKET_ERROR)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Got sockets error %u trying to select on UPnP device sockets!",
|
|
dwError);
|
|
#endif // DBG
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If no sockets were selected, we're done.
|
|
//
|
|
if (iReturn == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Timed out waiting for data on UPnP device 0x%p's socket.",
|
|
pUPnPDevice);
|
|
break;
|
|
}
|
|
|
|
|
|
DNASSERT(iReturn == 1);
|
|
//DNASSERT(FD_ISSET(pUPnPDevice->GetControlSocket(), &fdsRead));
|
|
DNASSERT(this->m_pfn__WSAFDIsSet(pUPnPDevice->GetControlSocket(), &fdsRead));
|
|
|
|
|
|
hr = this->ReceiveUPnPDataStream(pUPnPDevice);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't receive UPnP stream from device object 0x%p! Disconnecting.",
|
|
pUPnPDevice);
|
|
|
|
//
|
|
// Dump this unusable UPnP device and continue.
|
|
//
|
|
if (pUPnPDevice->GetOwningDevice() != NULL)
|
|
{
|
|
this->ClearDevicesUPnPDevice(pUPnPDevice->GetOwningDevice());
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP device 0x%p's has already been removed from owning device.",
|
|
pUPnPDevice);
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
//
|
|
// If the UPnP device is no longer connected, we're done.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 7, "UPnP device 0x%p no longer connected.", pUPnPDevice);
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// We found data, so see if there's more. Connection should be closed
|
|
// after responses.
|
|
//
|
|
DPFX(DPFPREP, 7, "Waiting for more data on the UPnP device 0x%p's socket.", pUPnPDevice);
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// If we're here, we're no worse for wear.
|
|
//
|
|
hr = DPNH_OK;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CheckForReceivedUPnPMsgsOnDevice
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::HandleUPnPDiscoveryResponseMsg"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::HandleUPnPDiscoveryResponseMsg
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Handles a UPnP discovery response message sent to this
|
|
// control point.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device which received message.
|
|
// SOCKADDR_IN * psaddrinSource - Pointer to address that sent the response
|
|
// message.
|
|
// char * pcMsg - Pointer to buffer containing the UPnP
|
|
// message. It will be modified.
|
|
// int iMsgSize - Size of message buffer in bytes. There
|
|
// must be an extra byte after the end of
|
|
// the message.
|
|
// BOOL * pfInitiatedConnect - Pointer to boolean to set to TRUE if a
|
|
// new UPnP device was found and a
|
|
// connection to it was begun.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Message was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::HandleUPnPDiscoveryResponseMsg(CDevice * const pDevice,
|
|
const SOCKADDR_IN * const psaddrinSource,
|
|
char * const pcMsg,
|
|
const int iMsgSize,
|
|
BOOL * const pfInitiatedConnect)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
char * pszToken;
|
|
UPNP_HEADER_INFO HeaderInfo;
|
|
SOCKADDR_IN saddrinHost;
|
|
char * pszRelativePath;
|
|
SOCKET sTemp = INVALID_SOCKET;
|
|
SOCKADDR_IN saddrinLocal;
|
|
CUPnPDevice * pUPnPDevice = NULL;
|
|
DWORD dwNumConnectRetries = 0;
|
|
DWORD dwError;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, %i, 0x%p)",
|
|
this, pDevice, psaddrinSource, pcMsg, iMsgSize, pfInitiatedConnect);
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Log the message.
|
|
//
|
|
this->PrintUPnPTransactionToFile(pcMsg,
|
|
iMsgSize,
|
|
"Inbound UPnP datagram headers",
|
|
pDevice);
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Any errors we get while analyzing the message will cause us to jump to
|
|
// the Exit label with hr == DPNH_OK. Once we start trying to connect to
|
|
// the UPnP device, that will change. See below.
|
|
//
|
|
|
|
|
|
//
|
|
// First of all, if this device already has a UPnP device, then we'll just
|
|
// ignore this response. Either it's a duplicate of an earlier response,
|
|
// a cache-refresh, or it's from a different device. Duplicates we should
|
|
// ignore. Cache-refresh is essentially a duplicate. We can't handle any
|
|
// information changes, so ignore those too. And finally, we don't handle
|
|
// multiple Internet gateway UPnP devices, so ignore those, too.
|
|
//
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
DPFX(DPFPREP, 6, "Already have UPnP device (0x%p) ignoring message.",
|
|
pUPnPDevice);
|
|
|
|
//
|
|
// GetUPnPDevice did not add a reference to pUPnPDevice.
|
|
//
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Make sure the sender of this response is valid. It should be either
|
|
// the local device address, or the address of the gateway. If we
|
|
// broadcasted or multicasted, we'll need to be more lenient. We'll just
|
|
// ensure that the response came from someone local (it doesn't make sense
|
|
// that in order to make mappings for our private network we would need to
|
|
// contact something outside).
|
|
//
|
|
if (psaddrinSource->sin_addr.S_un.S_addr != pDevice->GetLocalAddressV4())
|
|
{
|
|
if (g_fUseMulticastUPnPDiscovery)
|
|
{
|
|
if (! this->IsAddressLocal(pDevice, psaddrinSource))
|
|
{
|
|
DPFX(DPFPREP, 1, "Multicast search responding device (%u.%u.%u.%u:%u) is not local, ignoring message.",
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinSource->sin_port));
|
|
goto Exit;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Retrieve the gateway's address (using saddrinHost as a temporary
|
|
// variable. If that fails or returns the broadcast address, just
|
|
// make sure the address is local. Otherwise, expect an exact
|
|
// match.
|
|
//
|
|
if ((! this->GetAddressToReachGateway(pDevice, &saddrinHost.sin_addr)) ||
|
|
(saddrinHost.sin_addr.S_un.S_addr == INADDR_BROADCAST))
|
|
{
|
|
if (! this->IsAddressLocal(pDevice, psaddrinSource))
|
|
{
|
|
DPFX(DPFPREP, 1, "No gateway/broadcast search responding device (%u.%u.%u.%u:%u) is not local, ignoring message.",
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinSource->sin_port));
|
|
goto Exit;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if (psaddrinSource->sin_addr.S_un.S_addr != saddrinHost.sin_addr.S_un.S_addr)
|
|
{
|
|
DPFX(DPFPREP, 1, "Unicast search responding device (%u.%u.%u.%u:%u) is not gateway (%u.%u.%u.%u), ignoring message.",
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinSource->sin_port),
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b4);
|
|
goto Exit;
|
|
}
|
|
}
|
|
} // end else (not multicasting search)
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Response was from the local device.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// Ensure the buffer is NULL terminated to prevent buffer overruns when
|
|
// using the string routines.
|
|
//
|
|
pcMsg[iMsgSize] = '\0';
|
|
|
|
|
|
|
|
//
|
|
// Find the version string.
|
|
//
|
|
pszToken = strtok(pcMsg, " \t\n");
|
|
if (pszToken == NULL)
|
|
{
|
|
DPFX(DPFPREP, 9, "Could not locate first white-space separator.");
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Check the version string, case insensitive.
|
|
//
|
|
if ((_stricmp(pszToken, HTTP_VERSION) != 0) &&
|
|
(_stricmp(pszToken, HTTP_VERSION_ALT) != 0))
|
|
{
|
|
DPFX(DPFPREP, 1, "The version specified in the response message is not \"" HTTP_VERSION "\" or \"" HTTP_VERSION_ALT "\" (it's \"%hs\").",
|
|
pszToken);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Find the response code string.
|
|
//
|
|
pszToken = strtok(NULL, " ");
|
|
if (pszToken == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Could not find the response code space.");
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Make sure it's the success result, case insensitive.
|
|
//
|
|
if (_stricmp(pszToken, "200") != 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "The response code specified is not \"200\" (it's \"%hs\").",
|
|
pszToken);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Find the response code message.
|
|
//
|
|
pszToken = strtok(NULL, " \t\r");
|
|
if (pszToken == NULL)
|
|
{
|
|
DPFX(DPFPREP, 9, "Could not locate response code message white-space separator.");
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Make sure it's the right string, case insensitive.
|
|
//
|
|
if (_stricmp(pszToken, "OK") != 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "The response code message specified is not \"OK\" (it's \"%hs\").",
|
|
pszToken);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Parse the header information.
|
|
//
|
|
ZeroMemory(&HeaderInfo, sizeof(HeaderInfo));
|
|
this->ParseUPnPHeaders((pszToken + strlen(pszToken) + 1),
|
|
&HeaderInfo);
|
|
|
|
|
|
//
|
|
// Skip responses which don't include the required headers.
|
|
//
|
|
if ((HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CACHECONTROL] == NULL) ||
|
|
(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_EXT] == NULL) ||
|
|
(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_LOCATION] == NULL) ||
|
|
(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_SERVER] == NULL) ||
|
|
(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_ST] == NULL) ||
|
|
(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_USN] == NULL))
|
|
{
|
|
DPFX(DPFPREP, 1, "One of the expected headers was not specified, ignoring message.");
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure the service type is correct.
|
|
//
|
|
if ((_stricmp(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_ST], URI_SERVICE_WANIPCONNECTION_A) != 0) &&
|
|
(_stricmp(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_ST], URI_SERVICE_WANPPPCONNECTION_A) != 0))
|
|
{
|
|
DPFX(DPFPREP, 1, "Service type \"%hs\" is not desired \"" URI_SERVICE_WANIPCONNECTION_A "\" or \"" URI_SERVICE_WANPPPCONNECTION_A "\", ignoring message.",
|
|
HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_ST]);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Parse the location header into an address and port.
|
|
//
|
|
hr = this->GetAddressFromURL(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_LOCATION],
|
|
&saddrinHost,
|
|
&pszRelativePath);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't get address from URL (err = 0x%lx), ignoring message.",
|
|
hr);
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Don't accept responses that refer to addresses other than the one that
|
|
// sent this response.
|
|
//
|
|
if (psaddrinSource->sin_addr.S_un.S_addr != saddrinHost.sin_addr.S_un.S_addr)
|
|
{
|
|
DPFX(DPFPREP, 1, "Host IP address designated (%u.%u.%u.%u:%u) is not the same as source of response (%u.%u.%u.%u:%u), ignoring message.",
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinHost.sin_port),
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinSource->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinSource->sin_port));
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Don't accept responses that refer to ports in the reserved range (less
|
|
// than or equal to 1024), other than the standard HTTP port.
|
|
//
|
|
if ((NTOHS(saddrinHost.sin_port) <= MAX_RESERVED_PORT) &&
|
|
(saddrinHost.sin_port != HTONS(HTTP_PORT)))
|
|
{
|
|
DPFX(DPFPREP, 1, "Host address designated invalid port %u, ignoring message.",
|
|
NTOHS(saddrinHost.sin_port));
|
|
hr = DPNH_OK;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Any errors we get from here on out will cause us to jump to the Failure
|
|
// label, instead of going straight to Exit.
|
|
//
|
|
|
|
//
|
|
// Create a socket to connect to that address.
|
|
//
|
|
|
|
ZeroMemory(&saddrinLocal, sizeof(saddrinLocal));
|
|
saddrinLocal.sin_family = AF_INET;
|
|
saddrinLocal.sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
|
|
CreateSocket:
|
|
|
|
sTemp = this->CreateSocket(&saddrinLocal, SOCK_STREAM, 0);
|
|
if (sTemp == INVALID_SOCKET)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't create stream socket!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Initiate the connection to the UPnP device. It is expected that connect
|
|
// will return WSAEWOULDBLOCK.
|
|
//
|
|
if (this->m_pfnconnect(sTemp,
|
|
(SOCKADDR*) (&saddrinHost),
|
|
sizeof(saddrinHost)) != 0)
|
|
{
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
|
|
//
|
|
// If we hit a particular local/remote pair that is in TCP's TIME_WAIT
|
|
// state, then we need to pick a different port.
|
|
//
|
|
if (dwError == WSAEADDRINUSE)
|
|
{
|
|
dwNumConnectRetries++;
|
|
if (dwNumConnectRetries > MAX_NUM_TIMEWAITCONNECT_RETRIES)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not connect to %u.%u.%u.%u:%u after %u attempts!",
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinHost.sin_port),
|
|
dwNumConnectRetries);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
DPFX(DPFPREP, 1, "Could not connect to %u.%u.%u.%u:%u using local address %u.%u.%u.%u:%u, picking different local port.",
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinHost.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinHost.sin_port),
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinLocal.sin_port));
|
|
|
|
this->m_pfnclosesocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
|
|
goto CreateSocket;
|
|
}
|
|
|
|
if (dwError != WSAEWOULDBLOCK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't connect socket, error = %u!", dwError);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// connect() on non-blocking sockets is explicitly documented as
|
|
// always returning WSAEWOULDBLOCK, but CE seems to do it anyway.
|
|
//
|
|
DPFX(DPFPREP, 8, "Socket connected right away.");
|
|
}
|
|
|
|
|
|
//
|
|
// Create a new object to represent the UPnP device to which we're trying
|
|
// to connect.
|
|
//
|
|
pUPnPDevice = new CUPnPDevice(this->m_dwCurrentUPnPDeviceID++);
|
|
if (pUPnPDevice == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
hr = pUPnPDevice->SetLocationURL(pszRelativePath);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't set UPnP device's location URL!");
|
|
goto Failure;
|
|
}
|
|
|
|
pUPnPDevice->SetHostAddress(&saddrinHost);
|
|
|
|
hr = pUPnPDevice->SetUSN(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_USN]);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't set UPnP device's USN!");
|
|
goto Failure;
|
|
}
|
|
|
|
hr = pUPnPDevice->CreateReceiveBuffer(UPNP_STREAM_RECV_BUFFER_INITIAL_SIZE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't create UPnP device's receive buffer!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Created new UPnP device object 0x%p ID %u.",
|
|
pUPnPDevice, pUPnPDevice->GetID());
|
|
|
|
|
|
//
|
|
// It's connecting...
|
|
//
|
|
pUPnPDevice->NoteConnecting();
|
|
|
|
|
|
//
|
|
// See if we need to avoid trying asymmetric port mappings.
|
|
//
|
|
if (g_fNoAsymmetricMappings)
|
|
{
|
|
DPFX(DPFPREP, 1, "Preventing asymmetric port mappings on new UPnP device 0x%p.",
|
|
pUPnPDevice);
|
|
pUPnPDevice->NoteDoesNotSupportAsymmetricMappings();
|
|
}
|
|
|
|
|
|
//
|
|
// Transfer ownership of the socket to the object.
|
|
//
|
|
pUPnPDevice->SetControlSocket(sTemp);
|
|
|
|
|
|
//
|
|
// Associate it with the device.
|
|
//
|
|
pUPnPDevice->MakeDeviceOwner(pDevice);
|
|
|
|
//
|
|
// Add it to the global list, and transfer ownership of the reference.
|
|
//
|
|
pUPnPDevice->m_blList.InsertBefore(&this->m_blUPnPDevices);
|
|
pUPnPDevice = NULL;
|
|
|
|
|
|
//
|
|
// Inform the caller that there's a new connection pending.
|
|
//
|
|
(*pfInitiatedConnect) = TRUE;
|
|
|
|
|
|
//
|
|
// Clear the device's discovery flags, now that we have a device, we're not
|
|
// going to be searching anymore.
|
|
//
|
|
pDevice->NoteNotPerformingRemoteUPnPDiscovery();
|
|
pDevice->NoteNotPerformingLocalUPnPDiscovery();
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
//pUPnPDevice->DestroyReceiveBuffer();
|
|
pUPnPDevice->ClearUSN();
|
|
pUPnPDevice->ClearLocationURL();
|
|
|
|
pUPnPDevice->DecRef();
|
|
}
|
|
|
|
if (sTemp != INVALID_SOCKET)
|
|
{
|
|
this->m_pfnclosesocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::HandleUPnPDiscoveryResponseMsg
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ReconnectUPnPControlSocket"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ReconnectUPnPControlSocket
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Re-establishes a UPnP device TCP/IP connection.
|
|
//
|
|
// UPnP devices may get removed from list if a failure occurs.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device to reconnect.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Message was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::ReconnectUPnPControlSocket(CUPnPDevice * const pUPnPDevice)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
SOCKET sTemp = INVALID_SOCKET;
|
|
CDevice * pDevice;
|
|
SOCKADDR_IN saddrinLocal;
|
|
DWORD dwNumConnectRetries = 0;
|
|
DWORD dwError;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p)", this, pUPnPDevice);
|
|
|
|
|
|
DNASSERT(pUPnPDevice->GetControlSocket() == INVALID_SOCKET);
|
|
|
|
|
|
//
|
|
// Create a socket to connect to that address.
|
|
//
|
|
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
ZeroMemory(&saddrinLocal, sizeof(saddrinLocal));
|
|
saddrinLocal.sin_family = AF_INET;
|
|
saddrinLocal.sin_addr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
|
|
CreateSocket:
|
|
|
|
sTemp = this->CreateSocket(&saddrinLocal, SOCK_STREAM, 0);
|
|
if (sTemp == INVALID_SOCKET)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't create stream socket!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Initiate the connection to the UPnP device. It is expected that connect
|
|
// will return WSAEWOULDBLOCK.
|
|
//
|
|
if (this->m_pfnconnect(sTemp,
|
|
(SOCKADDR*) (pUPnPDevice->GetControlAddress()),
|
|
sizeof(SOCKADDR_IN)) != 0)
|
|
{
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
|
|
//
|
|
// If we hit a particular local/remote pair that is in TCP's TIME_WAIT
|
|
// state, then we need to pick a different port.
|
|
//
|
|
if (dwError == WSAEADDRINUSE)
|
|
{
|
|
dwNumConnectRetries++;
|
|
if (dwNumConnectRetries > MAX_NUM_TIMEWAITCONNECT_RETRIES)
|
|
{
|
|
DPFX(DPFPREP, 0, "Could not connect to %u.%u.%u.%u:%u after %u attempts!",
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b1,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b2,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b3,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pUPnPDevice->GetControlAddress()->sin_port),
|
|
dwNumConnectRetries);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
DPFX(DPFPREP, 1, "Could not connect to %u.%u.%u.%u:%u using local address %u.%u.%u.%u:%u, picking different local port.",
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b1,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b2,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b3,
|
|
pUPnPDevice->GetControlAddress()->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pUPnPDevice->GetControlAddress()->sin_port),
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinLocal.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinLocal.sin_port));
|
|
|
|
this->m_pfnclosesocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
|
|
goto CreateSocket;
|
|
}
|
|
|
|
if (dwError != WSAEWOULDBLOCK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't connect socket, error = %u!", dwError);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// connect() on non-blocking sockets is explicitly documented as
|
|
// always returning WSAEWOULDBLOCK, but CE seems to do it anyway.
|
|
//
|
|
DPFX(DPFPREP, 8, "Socket connected right away.");
|
|
}
|
|
|
|
|
|
//
|
|
// It's reconnecting...
|
|
//
|
|
pUPnPDevice->NoteConnecting();
|
|
|
|
|
|
//
|
|
// Transfer ownership of the socket to the object.
|
|
//
|
|
pUPnPDevice->SetControlSocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
|
|
|
|
//
|
|
// Wait for the connect to complete.
|
|
//
|
|
hr = this->WaitForUPnPConnectCompletions();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't wait for UPnP connect completions!");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Make sure the connect completed successfully.
|
|
//
|
|
if (! pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 0, "UPnP device 0x%p failed reconnecting!", pUPnPDevice);
|
|
|
|
//
|
|
// Note that the device is cleaned up and is not in any lists anymore.
|
|
//
|
|
hr = DPNHERR_SERVERNOTRESPONDING;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
if (sTemp != INVALID_SOCKET)
|
|
{
|
|
this->m_pfnclosesocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::ReconnectUPnPControlSocket
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ReceiveUPnPDataStream"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ReceiveUPnPDataStream
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Receives incoming data from a UPnP TCP connection.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device with data to receive.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Data was received successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::ReceiveUPnPDataStream(CUPnPDevice * const pUPnPDevice)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
char * pszDeChunkedBuffer = NULL;
|
|
int iReturn;
|
|
DWORD dwError;
|
|
char * pszCurrent;
|
|
char * pszEndOfBuffer;
|
|
UPNP_HEADER_INFO HeaderInfo;
|
|
DWORD dwContentLength;
|
|
char * pszToken;
|
|
DWORD dwHTTPResponseCode;
|
|
int iHeaderLength;
|
|
DWORD dwBufferRemaining;
|
|
char * pszChunkData;
|
|
DWORD dwChunkSize;
|
|
char * pszDestination;
|
|
#ifdef DBG
|
|
char * pszPrintIfFailed = NULL;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p)", this, pUPnPDevice);
|
|
|
|
|
|
do
|
|
{
|
|
//
|
|
// Make sure there's room in the buffer to actually get the data.
|
|
//
|
|
if (pUPnPDevice->GetRemainingReceiveBufferSize() == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Increasing receive buffer size prior to receiving.");
|
|
|
|
hr = pUPnPDevice->IncreaseReceiveBufferSize();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't increase receive buffer size prior to receiving!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Actually get the data that was indicated.
|
|
//
|
|
|
|
iReturn = this->m_pfnrecv(pUPnPDevice->GetControlSocket(),
|
|
pUPnPDevice->GetCurrentReceiveBufferPtr(),
|
|
pUPnPDevice->GetRemainingReceiveBufferSize(),
|
|
0);
|
|
switch (iReturn)
|
|
{
|
|
case 0:
|
|
{
|
|
//
|
|
// Since the connection has been broken, shutdown the socket.
|
|
//
|
|
this->m_pfnshutdown(pUPnPDevice->GetControlSocket(), 0); // ignore error
|
|
this->m_pfnclosesocket(pUPnPDevice->GetControlSocket());
|
|
pUPnPDevice->SetControlSocket(INVALID_SOCKET);
|
|
|
|
|
|
//
|
|
// Mark the socket as not connected.
|
|
//
|
|
pUPnPDevice->NoteNotConnected();
|
|
|
|
|
|
//
|
|
// There may have been HTTP success/error information sent
|
|
// before the connection was closed.
|
|
//
|
|
if (pUPnPDevice->GetUsedReceiveBufferSize() == 0)
|
|
{
|
|
DPFX(DPFPREP, 3, "UPnP device 0x%p shut down connection (no more data).",
|
|
pUPnPDevice);
|
|
|
|
//
|
|
// Hopefully we got what we needed, but we're done now.
|
|
//
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 3, "UPnP device 0x%p gracefully closed connection after sending data.",
|
|
pUPnPDevice);
|
|
|
|
|
|
//
|
|
// Continue through and parse what data we have.
|
|
//
|
|
break;
|
|
}
|
|
|
|
case SOCKET_ERROR:
|
|
{
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
switch (dwError)
|
|
{
|
|
case WSAEMSGSIZE:
|
|
{
|
|
//
|
|
// There's not enough room in the buffer. Double the
|
|
// buffer and try again.
|
|
//
|
|
|
|
DPFX(DPFPREP, 7, "Increasing receive buffer size after WSAEMSGSIZE error.");
|
|
|
|
hr = pUPnPDevice->IncreaseReceiveBufferSize();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't increase receive buffer size!");
|
|
goto Failure;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
case WSAECONNABORTED:
|
|
case WSAECONNRESET:
|
|
{
|
|
DPFX(DPFPREP, 1, "UPnP device shutdown connection (err = %u).", dwError);
|
|
|
|
//
|
|
// Our caller should remove this device.
|
|
//
|
|
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
break;
|
|
}
|
|
|
|
case WSAENOBUFS:
|
|
{
|
|
DPFX(DPFPREP, 0, "WinSock returned WSAENOBUFS while receiving!");
|
|
|
|
//
|
|
// Our caller should remove this device.
|
|
//
|
|
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DPFX(DPFPREP, 0, "Got unknown sockets error %u while receiving data!", dwError);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
break;
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DPFX(DPFPREP, 2, "Received %i bytes of data from UPnP device 0%p.",
|
|
iReturn, pUPnPDevice);
|
|
|
|
pUPnPDevice->UpdateUsedReceiveBufferSize(iReturn);
|
|
|
|
//
|
|
// We'll also break out of the do-while loop below.
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
while (iReturn == SOCKET_ERROR);
|
|
|
|
|
|
//
|
|
// If we're here, we've gotten the data that has currently arrived.
|
|
//
|
|
|
|
//
|
|
// If we have all the headers, specifically the content length header, we
|
|
// can tell whether we have the whole message or not. If not, we can't do
|
|
// anything until the rest of the data comes in.
|
|
//
|
|
if (pUPnPDevice->IsWaitingForContent())
|
|
{
|
|
dwContentLength = pUPnPDevice->GetExpectedContentSize();
|
|
|
|
if (dwContentLength == -1)
|
|
{
|
|
//
|
|
// We have all the headers, but a faulty server implementation did
|
|
// not send a content-length header. We're going to wait until the
|
|
// socket is closed by the other side, and then consider all of the
|
|
// data received at that time to be the content. NOTE: It is
|
|
// expected that there will be a higher level timeout preventing us
|
|
// from waiting forever.
|
|
//
|
|
// So if the device is still connected, keep waiting.
|
|
//
|
|
// If we're using chunked transfer we won't get a content-length
|
|
// header or a total size legitimately. We will know the sizes of
|
|
// individual chunks, but that doesn't help us much. We basically
|
|
// need to scan for the "last chunk" indicator (or socket
|
|
// shutdown).
|
|
//
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
//
|
|
// If we're using chunked transfer, see if we have enough
|
|
// information already to determine if we're done.
|
|
//
|
|
if (pUPnPDevice->IsUsingChunkedTransferEncoding())
|
|
{
|
|
//
|
|
// Walk all of the chunks we have so far to see if we have
|
|
// the last one (the zero terminator).
|
|
//
|
|
pszCurrent = pUPnPDevice->GetReceiveBufferStart();
|
|
dwBufferRemaining = pUPnPDevice->GetUsedReceiveBufferSize();
|
|
do
|
|
{
|
|
if (! this->GetNextChunk(pszCurrent,
|
|
dwBufferRemaining,
|
|
&pszChunkData,
|
|
&dwChunkSize,
|
|
&pszCurrent,
|
|
&dwBufferRemaining))
|
|
{
|
|
DPFX(DPFPREP, 1, "Body contains invalid chunk (at offset %u)! Disconnecting.",
|
|
(DWORD_PTR) (pszCurrent - pUPnPDevice->GetReceiveBufferStart()));
|
|
goto Failure;
|
|
}
|
|
|
|
if (pszChunkData == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Did not receive end of chunked data (%u bytes received so far), continuing to waiting for data.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
goto Exit;
|
|
}
|
|
}
|
|
while (dwChunkSize != 0);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Waiting for connection to be shutdown (%u bytes received).",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 1, "Socket closed with %u bytes received, parsing.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
}
|
|
else
|
|
{
|
|
if (dwContentLength > pUPnPDevice->GetUsedReceiveBufferSize())
|
|
{
|
|
//
|
|
// We still haven't received all the data yet. Keep waiting
|
|
// (unless the socket is closed).
|
|
//
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 1, "Still waiting for all content (%u bytes of %u total received).",
|
|
pUPnPDevice->GetUsedReceiveBufferSize(), dwContentLength);
|
|
goto Exit;
|
|
}
|
|
|
|
DPFX(DPFPREP, 1, "Socket closed before all content received (%u bytes of %u total), parsing anyway.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize(), dwContentLength);
|
|
|
|
//
|
|
// Try parsing it anyway.
|
|
//
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Retrieve the HTTP response code stored earlier.
|
|
//
|
|
dwHTTPResponseCode = pUPnPDevice->GetHTTPResponseCode();
|
|
|
|
|
|
//
|
|
// All of the content that's going to arrive, has.
|
|
//
|
|
pUPnPDevice->NoteNotWaitingForContent();
|
|
|
|
|
|
//
|
|
// Make sure the buffer is NULL terminated. But first ensure the
|
|
// buffer can hold a new NULL termination character.
|
|
//
|
|
if (pUPnPDevice->GetRemainingReceiveBufferSize() == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Increasing receive buffer size to hold NULL termination (for content).");
|
|
|
|
hr = pUPnPDevice->IncreaseReceiveBufferSize();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't increase receive buffer size to accommodate NULL termination (for content)!");
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Move to the end of the buffer and NULL terminate it for string ops.
|
|
//
|
|
pszEndOfBuffer = pUPnPDevice->GetReceiveBufferStart()
|
|
+ pUPnPDevice->GetUsedReceiveBufferSize();
|
|
(*pszEndOfBuffer) = '\0';
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Print from the start of the buffer if we fail.
|
|
//
|
|
pszPrintIfFailed = pUPnPDevice->GetReceiveBufferStart();
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// We now have all the data in a string buffer. Continue...
|
|
//
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// We haven't already received the headers. The data we just got
|
|
// should be those headers.
|
|
//
|
|
pszCurrent = pUPnPDevice->GetReceiveBufferStart();
|
|
|
|
//
|
|
// Quick check to make sure the buffer starts with something reasonable
|
|
// in hopes of catching completely bogus responses earlier. Note that
|
|
// the buffer is not necessarily NULL terminated or completely
|
|
// available yet.
|
|
//
|
|
if ((pUPnPDevice->GetUsedReceiveBufferSize() >= strlen(HTTP_PREFIX)) &&
|
|
(_strnicmp(pszCurrent, HTTP_PREFIX, strlen(HTTP_PREFIX)) != 0))
|
|
{
|
|
DPFX(DPFPREP, 1, "Headers do not begin with \"" HTTP_PREFIX "\"! Disconnecting.");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// We don't want to walk off the end of the buffer, so only search up
|
|
// to the last possible location for the sequence, which is the end of
|
|
// the buffer minus the double EOL sequence.
|
|
//
|
|
pszEndOfBuffer = pszCurrent
|
|
+ pUPnPDevice->GetUsedReceiveBufferSize()
|
|
- strlen(EOL EOL);
|
|
while (pszCurrent < pszEndOfBuffer)
|
|
{
|
|
if (_strnicmp(pszCurrent, EOL EOL, strlen(EOL EOL)) == 0)
|
|
{
|
|
//
|
|
// Found end of headers.
|
|
//
|
|
|
|
//
|
|
// Possible loss of data on 64-bit is okay, we're just saving
|
|
// this for logging purposes.
|
|
//
|
|
iHeaderLength = (int) ((INT_PTR) (pszCurrent - pUPnPDevice->GetReceiveBufferStart()));
|
|
break;
|
|
}
|
|
|
|
pszCurrent++;
|
|
}
|
|
|
|
//
|
|
// If we didn't find the end of the headers, we're done (for now).
|
|
//
|
|
if (pszCurrent >= pszEndOfBuffer)
|
|
{
|
|
//
|
|
// We still haven't received all the data yet. Keep waiting
|
|
// (unless the socket is closed).
|
|
//
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
//
|
|
// Make sure the length is still within reason.
|
|
//
|
|
if (pUPnPDevice->GetUsedReceiveBufferSize() > MAX_UPNP_HEADER_LENGTH)
|
|
{
|
|
DPFX(DPFPREP, 1, "Headers are too large (%u > %u)! Disconnecting.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize(), MAX_UPNP_HEADER_LENGTH);
|
|
goto Failure;
|
|
}
|
|
|
|
DPFX(DPFPREP, 1, "Have not detected end of headers yet (%u bytes received).",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
goto Exit;
|
|
}
|
|
|
|
DPFX(DPFPREP, 1, "Socket closed before end of headers detected (%u bytes received), parsing anyway.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
|
|
|
|
//
|
|
// Consider the whole buffer the headers length.
|
|
//
|
|
iHeaderLength = pUPnPDevice->GetUsedReceiveBufferSize();
|
|
|
|
|
|
//
|
|
// Try parsing it anyway.
|
|
//
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Log the headers.
|
|
//
|
|
this->PrintUPnPTransactionToFile(pUPnPDevice->GetReceiveBufferStart(),
|
|
iHeaderLength,
|
|
"Inbound UPnP stream headers",
|
|
pUPnPDevice->GetOwningDevice());
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Make sure the buffer is NULL terminated. But first ensure the
|
|
// buffer can hold a new NULL termination character.
|
|
//
|
|
if (pUPnPDevice->GetRemainingReceiveBufferSize() == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Increasing receive buffer size to hold NULL termination (for headers).");
|
|
|
|
hr = pUPnPDevice->IncreaseReceiveBufferSize();
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't increase receive buffer size to accommodate NULL termination (for headers)!");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Find the end of the new buffer, and make sure it's NULL
|
|
// terminated for string ops.
|
|
//
|
|
pszEndOfBuffer = pUPnPDevice->GetReceiveBufferStart()
|
|
+ pUPnPDevice->GetUsedReceiveBufferSize();
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Move to the end of the buffer and NULL terminate it for string
|
|
// ops.
|
|
//
|
|
pszEndOfBuffer += strlen(EOL EOL);
|
|
}
|
|
|
|
(*pszEndOfBuffer) = '\0';
|
|
|
|
|
|
|
|
//
|
|
// Make sure the buffer is a valid response. Find the version string.
|
|
//
|
|
pszToken = strtok(pUPnPDevice->GetReceiveBufferStart(), " \t\n");
|
|
if (pszToken == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Could not locate first white-space separator! Disconnecting.");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Check the version string, case insensitive.
|
|
//
|
|
if ((_stricmp(pszToken, HTTP_VERSION) != 0) &&
|
|
(_stricmp(pszToken, HTTP_VERSION_ALT) != 0))
|
|
{
|
|
DPFX(DPFPREP, 1, "The version specified in the response message is not \"" HTTP_VERSION "\" or \"" HTTP_VERSION_ALT "\" (it's \"%hs\")! Disconnecting.",
|
|
pszToken);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Find the response code number string.
|
|
//
|
|
pszToken = strtok(NULL, " ");
|
|
if (pszToken == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Could not find the response code number space! Disconnecting.");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Retrieve the success/failure code value.
|
|
//
|
|
dwHTTPResponseCode = atoi(pszToken);
|
|
|
|
|
|
//
|
|
// Find the response code message.
|
|
//
|
|
pszToken = strtok(NULL, "\t\r");
|
|
if (pszToken == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Could not locate response code message white-space separator! Disconnecting.");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 1, "Received HTTP response %u \"%hs\".",
|
|
dwHTTPResponseCode, pszToken);
|
|
|
|
|
|
|
|
//
|
|
// Try parsing the headers (after the response status line).
|
|
//
|
|
ZeroMemory(&HeaderInfo, sizeof(HeaderInfo));
|
|
this->ParseUPnPHeaders((pszToken + strlen(pszToken) + 1),
|
|
&HeaderInfo);
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Print from the start of the message body if we fail.
|
|
//
|
|
pszPrintIfFailed = HeaderInfo.pszMsgBody;
|
|
#endif // DBG
|
|
|
|
|
|
if ((HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_TRANSFERENCODING] != NULL) &&
|
|
(_strnicmp(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_TRANSFERENCODING], "chunked", strlen("chunked")) == 0))
|
|
{
|
|
pUPnPDevice->NoteUsingChunkedTransferEncoding();
|
|
}
|
|
|
|
|
|
//
|
|
// We're pretty lenient about missing headers...
|
|
//
|
|
if (HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTLENGTH] == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Content-length header was not specified in response (chunked = %i).",
|
|
pUPnPDevice->IsUsingChunkedTransferEncoding());
|
|
|
|
//
|
|
// May be because we're using chunked transfer encoding, or it
|
|
// could be a bad device. Either way, we'll continue...
|
|
//
|
|
dwContentLength = -1;
|
|
}
|
|
else
|
|
{
|
|
dwContentLength = atoi(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTLENGTH]);
|
|
#ifdef DBG
|
|
if (dwContentLength == 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Content length (\"%hs\") is zero.",
|
|
HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTLENGTH]);
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
if (HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTTYPE] == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Expected content-type header was not specified in response, continuing.");
|
|
}
|
|
else
|
|
{
|
|
if (_strnicmp(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTTYPE], "text/xml", strlen("text/xml")) != 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Content type does not start with \"text/xml\" (it's \"%hs\")! Disconnecting.",
|
|
HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTTYPE]);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Note whether the content type is qualified with
|
|
// "charset=utf-8" or not.
|
|
//
|
|
if (_stricmp(HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTTYPE], "text/xml; charset=\"utf-8\"") != 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Content type is xml, but it's not \"text/xml; charset=\"utf-8\"\" (it's \"%hs\"), continuing.",
|
|
HeaderInfo.apszHeaderStrings[RESPONSEHEADERINDEX_CONTENTTYPE]);
|
|
|
|
//
|
|
// The check was just for information purposes, continue.
|
|
//
|
|
}
|
|
#endif // DBG
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Content length may be valid, or the special value -1 at this
|
|
// point.
|
|
//
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Moving past 0x%p bytes of header.",
|
|
HeaderInfo.pszMsgBody - pUPnPDevice->GetReceiveBufferStart());
|
|
|
|
|
|
//
|
|
// Forget about all the headers, we only care about data now.
|
|
//
|
|
pUPnPDevice->UpdateReceiveBufferStart(HeaderInfo.pszMsgBody);
|
|
|
|
|
|
//
|
|
// The buffer has been destroyed up to the end of the headers (meaning
|
|
// that calling ParseUPnPHeaders won't work on the same buffer again),
|
|
// so if we don't have all the content yet, we need to save the
|
|
// response code, remember the fact that we're not done yet, and
|
|
// continue waiting for the rest of the data.
|
|
// Of course, if there wasn't a content-length header, we have to wait
|
|
// for the socket to shutdown before we can parse.
|
|
//
|
|
// Also, if we're using chunked transfer we won't get a content-length
|
|
// header or a total size legitimately. We will know the sizes of
|
|
// individual chunks, but that doesn't help us much. We basically need
|
|
// to scan for the "last chunk" indicator (or socket shutdown).
|
|
//
|
|
if (dwContentLength == -1)
|
|
{
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
//
|
|
// If we're using chunked transfer, see if we have enough
|
|
// information already to determine if we're done.
|
|
//
|
|
if (pUPnPDevice->IsUsingChunkedTransferEncoding())
|
|
{
|
|
//
|
|
// Walk all of the chunks we have so far to see if we have
|
|
// the last one (the zero terminator).
|
|
//
|
|
pszCurrent = pUPnPDevice->GetReceiveBufferStart();
|
|
dwBufferRemaining = pUPnPDevice->GetUsedReceiveBufferSize();
|
|
do
|
|
{
|
|
if (! this->GetNextChunk(pszCurrent,
|
|
dwBufferRemaining,
|
|
&pszChunkData,
|
|
&dwChunkSize,
|
|
&pszCurrent,
|
|
&dwBufferRemaining))
|
|
{
|
|
DPFX(DPFPREP, 1, "Body contains invalid chunk (at offset %u)! Disconnecting.",
|
|
(DWORD_PTR) (pszCurrent - pUPnPDevice->GetReceiveBufferStart()));
|
|
goto Failure;
|
|
}
|
|
|
|
if (pszChunkData == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Did not receive end of chunked data (%u bytes received so far), continuing to waiting for data.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
|
|
pUPnPDevice->NoteWaitingForContent(dwContentLength, dwHTTPResponseCode);
|
|
|
|
goto Exit;
|
|
}
|
|
}
|
|
while (dwChunkSize != 0);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Unknown content length (%u bytes received so far), waiting for connection to close before parsing.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
|
|
pUPnPDevice->NoteWaitingForContent(dwContentLength, dwHTTPResponseCode);
|
|
|
|
goto Exit;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
if ((pUPnPDevice->IsConnected()) &&
|
|
(dwContentLength > pUPnPDevice->GetUsedReceiveBufferSize()))
|
|
{
|
|
DPFX(DPFPREP, 1, "Not all content has been received (%u bytes of %u total), waiting for remainder of message.",
|
|
pUPnPDevice->GetUsedReceiveBufferSize(), dwContentLength);
|
|
|
|
pUPnPDevice->NoteWaitingForContent(dwContentLength, dwHTTPResponseCode);
|
|
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// We have all the data already (and it's in string form).
|
|
// Continue...
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// If we got here, it means we have all the data that we're expecting.
|
|
// Shutdown the socket if it hasn't been already.
|
|
//
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 7, "Forcing UPnP device 0x%p socket disconnection.",
|
|
pUPnPDevice);
|
|
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
this->m_pfnshutdown(pUPnPDevice->GetControlSocket(), 0); // ignore error
|
|
this->m_pfnclosesocket(pUPnPDevice->GetControlSocket());
|
|
pUPnPDevice->SetControlSocket(INVALID_SOCKET);
|
|
|
|
pUPnPDevice->NoteNotConnected();
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(pUPnPDevice->GetControlSocket() == INVALID_SOCKET);
|
|
}
|
|
|
|
|
|
//
|
|
// If the sender used chunked-transfer encoding, copy each of the chunks
|
|
// into a contiguous "dechunked" buffer.
|
|
//
|
|
if (pUPnPDevice->IsUsingChunkedTransferEncoding())
|
|
{
|
|
//
|
|
// Prepare a dechunked buffer.
|
|
//
|
|
pszDeChunkedBuffer = (char*) DNMalloc(pUPnPDevice->GetUsedReceiveBufferSize());
|
|
if (pszDeChunkedBuffer == NULL)
|
|
{
|
|
hr = DPNHERR_OUTOFMEMORY;
|
|
goto Failure;
|
|
}
|
|
|
|
pszDestination = pszDeChunkedBuffer;
|
|
|
|
|
|
//
|
|
// Walk all of the chunks.
|
|
//
|
|
pszCurrent = pUPnPDevice->GetReceiveBufferStart();
|
|
dwBufferRemaining = pUPnPDevice->GetUsedReceiveBufferSize();
|
|
do
|
|
{
|
|
if (! this->GetNextChunk(pszCurrent,
|
|
dwBufferRemaining,
|
|
&pszChunkData,
|
|
&dwChunkSize,
|
|
&pszCurrent,
|
|
&dwBufferRemaining))
|
|
{
|
|
DPFX(DPFPREP, 1, "Body contains invalid chunk (at offset %u)!",
|
|
(DWORD_PTR) (pszCurrent - pUPnPDevice->GetReceiveBufferStart()));
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// If this chunk is unfinished, bail.
|
|
//
|
|
if (pszChunkData == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Did not receive complete chunked data!",
|
|
pUPnPDevice->GetUsedReceiveBufferSize());
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// If this is the last chunk, terminate the string here and stop.
|
|
//
|
|
if (dwChunkSize == 0)
|
|
{
|
|
(*pszDestination) = '\0';
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Otherwise copy the chunk data to the dechunked buffer.
|
|
//
|
|
memcpy(pszDestination, pszChunkData, dwChunkSize);
|
|
pszDestination += dwChunkSize;
|
|
}
|
|
while (TRUE);
|
|
|
|
//
|
|
// Turn off the flag since it's no longer relevant.
|
|
//
|
|
pUPnPDevice->NoteNotUsingChunkedTransferEncoding();
|
|
|
|
//
|
|
// Parse the dechunked version of the message.
|
|
//
|
|
pszCurrent = pszDeChunkedBuffer;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Get a pointer to the start of the message body.
|
|
//
|
|
pszCurrent = pUPnPDevice->GetReceiveBufferStart();
|
|
}
|
|
|
|
|
|
//
|
|
// Clear the buffer for the next message. Note that this does not
|
|
// invalidate the pszMessageBody pointer we just retrieved because
|
|
// ClearReceiveBuffer just resets the pointers back to the beginning (it
|
|
// does not zero out the buffer). We need to reset the buffer because the
|
|
// handler we're about to call may try to receive data as well. The buffer
|
|
// must be "empty" (reset) at that time. Of course, if the handler does do
|
|
// that, then it had better have saved off copies of any strings it needs
|
|
// because they will get overwritten once receiving starts.
|
|
//
|
|
// Content length of -1 means we never detected a valid CONTENT-LENGTH
|
|
// header, so we will assume the rest of the data that has been received up
|
|
// to now is (all of) the content.
|
|
//
|
|
|
|
#ifdef DBG
|
|
if ((dwContentLength != -1) &&
|
|
(dwContentLength < pUPnPDevice->GetUsedReceiveBufferSize()))
|
|
{
|
|
//
|
|
// The string was terminated before this data, so the handler will
|
|
// never even see it.
|
|
//
|
|
DPFX(DPFPREP, 1, "Ignoring %u bytes of extra data after response from UPnP device 0x%p.",
|
|
(pUPnPDevice->GetUsedReceiveBufferSize() - dwContentLength),
|
|
pUPnPDevice);
|
|
}
|
|
|
|
//
|
|
// HandleUPnPControlResponseBody or HandleUPnPDescriptionResponseBody might
|
|
// print out the body or overwrite the data, so we can't print it out if
|
|
// they fail.
|
|
//
|
|
pszPrintIfFailed = NULL;
|
|
#endif // DBG
|
|
|
|
pUPnPDevice->ClearReceiveBuffer();
|
|
|
|
|
|
|
|
if (pUPnPDevice->IsWaitingForControlResponse())
|
|
{
|
|
//
|
|
// It looks like it's a control response, because someone is waiting
|
|
// for one.
|
|
//
|
|
hr = this->HandleUPnPControlResponseBody(pUPnPDevice,
|
|
dwHTTPResponseCode,
|
|
pszCurrent);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't handle control response!", hr);
|
|
goto Failure;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not waiting for a control response, assume it's a description
|
|
// response.
|
|
//
|
|
hr = this->HandleUPnPDescriptionResponseBody(pUPnPDevice,
|
|
dwHTTPResponseCode,
|
|
pszCurrent);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
//
|
|
// UPnP device may have been removed from list.
|
|
//
|
|
|
|
DPFX(DPFPREP, 0, "Couldn't handle description response!", hr);
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
if (pszDeChunkedBuffer != NULL)
|
|
{
|
|
DNFree(pszDeChunkedBuffer);
|
|
pszDeChunkedBuffer = NULL;
|
|
}
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
//
|
|
// Something went wrong, break the connection if it exists.
|
|
//
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
this->m_pfnshutdown(pUPnPDevice->GetControlSocket(), 0); // ignore error
|
|
this->m_pfnclosesocket(pUPnPDevice->GetControlSocket());
|
|
pUPnPDevice->SetControlSocket(INVALID_SOCKET);
|
|
|
|
|
|
//
|
|
// Mark the socket as not connected.
|
|
//
|
|
pUPnPDevice->NoteNotConnected();
|
|
}
|
|
|
|
|
|
#ifdef DBG
|
|
if (pszPrintIfFailed != NULL)
|
|
{
|
|
this->PrintUPnPTransactionToFile(pszPrintIfFailed,
|
|
strlen(pszPrintIfFailed),
|
|
"Inbound ignored data",
|
|
pUPnPDevice->GetOwningDevice());
|
|
}
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Forget all data received.
|
|
//
|
|
pUPnPDevice->ClearReceiveBuffer();
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::ReceiveUPnPDataStream
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ParseUPnPHeaders"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ParseUPnPHeaders
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Parses UPnP header information out of a message buffer.
|
|
//
|
|
// Arguments:
|
|
// char * pszMsg - Pointer to string containing the UPnP
|
|
// message. It will be modified.
|
|
// UPNP_HEADER_INFO * pHeaderInfo - Structure used to return parsing results.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::ParseUPnPHeaders(char * const pszMsg,
|
|
UPNP_HEADER_INFO * pHeaderInfo)
|
|
{
|
|
char * pszCurrent;
|
|
char * pszLineStart;
|
|
char * pszHeaderDelimiter;
|
|
int i;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p)",
|
|
this, pszMsg, pHeaderInfo);
|
|
|
|
|
|
//
|
|
// Loop until we reach the last SSDP header (indicated by a blank line).
|
|
//
|
|
pszCurrent = pszMsg;
|
|
pszLineStart = pszMsg;
|
|
do
|
|
{
|
|
//
|
|
// Find the end of the current line (CR LF).
|
|
//
|
|
while ((*pszCurrent) != '\n')
|
|
{
|
|
if ((*pszCurrent) == '\0')
|
|
{
|
|
//
|
|
// We hit the end of the buffer. Bail.
|
|
//
|
|
DPFX(DPFPREP, 1, "Hit end of buffer, parsing terminated.");
|
|
return;
|
|
}
|
|
|
|
pszCurrent++;
|
|
}
|
|
|
|
|
|
//
|
|
// Assuming this is the last header line, update the message body
|
|
// pointer to be after this line.
|
|
//
|
|
pHeaderInfo->pszMsgBody = pszCurrent + 1;
|
|
|
|
|
|
//
|
|
// If it's a valid line, then a CR will precede the LF we just found.
|
|
// If so, truncate the string there. If not, we'll just continue. The
|
|
// wacky newline in the middle of nowhere will probably just be
|
|
// ignored.
|
|
//
|
|
if ((pszCurrent > (pszMsg + 1)) &&
|
|
(*(pszCurrent - 1)) == '\r')
|
|
{
|
|
//
|
|
// Truncate the string at the effective end of the line (i.e.
|
|
// replace the CR with NULL terminator).
|
|
//
|
|
*(pszCurrent - 1) = '\0';
|
|
|
|
|
|
//
|
|
// If this is the empty line denoting the end of the headers, we're
|
|
// done here.
|
|
//
|
|
if (strlen(pszLineStart) == 0)
|
|
{
|
|
//
|
|
// Stop looping.
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Truncate the string here.
|
|
//
|
|
(*pszCurrent) = '\0';
|
|
|
|
DPFX(DPFPREP, 9, "Line has a newline in it (offset 0x%p) that isn't preceded by a carriage return.",
|
|
(pszCurrent - pszMsg));
|
|
}
|
|
|
|
|
|
//
|
|
// Whitespace means continuation of previous line, so if this line
|
|
// starts that way, erase the termination for the previous line (unless
|
|
// this is the first line).
|
|
//
|
|
if (((*pszLineStart) == ' ') || ((*pszLineStart) == '\t'))
|
|
{
|
|
if (pszLineStart >= (pszMsg + 2))
|
|
{
|
|
//
|
|
// The previous line should have ended with {CR, LF}, which
|
|
// gets modified to {NULL termination, LF}.
|
|
//
|
|
if ((*(pszLineStart - 2) != '\0') ||
|
|
(*(pszLineStart - 1) != '\n'))
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring line \"%hs\" because previous character sequence was not {NULL terminator, LF}.",
|
|
pszLineStart);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Appending line \"%hs\" to previous line.",
|
|
pszLineStart);
|
|
|
|
//
|
|
// Replace the NULL terminator/LF pair with spaces so
|
|
// future parsing sees the previous line and this one as
|
|
// one string.
|
|
//
|
|
*(pszLineStart - 2) = ' ';
|
|
*(pszLineStart - 1) = ' ';
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring initial line \"%hs\" that starts with whitespace.",
|
|
pszLineStart);
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Find the colon separating the header.
|
|
//
|
|
pszHeaderDelimiter = strchr(pszLineStart, ':');
|
|
if (pszHeaderDelimiter != NULL)
|
|
{
|
|
//
|
|
// Truncate the string at the end of the header.
|
|
//
|
|
(*pszHeaderDelimiter) = '\0';
|
|
|
|
|
|
//
|
|
// Remove the white space surrounding the header name.
|
|
//
|
|
strtrim(&pszLineStart);
|
|
|
|
|
|
//
|
|
// Parse the header type.
|
|
//
|
|
for(i = 0; i < NUM_RESPONSE_HEADERS; i++)
|
|
{
|
|
if (_stricmp(c_szResponseHeaders[i], pszLineStart) == 0)
|
|
{
|
|
//
|
|
// Found the header. Save it if it's not a duplicate.
|
|
//
|
|
if (pHeaderInfo->apszHeaderStrings[i] == NULL)
|
|
{
|
|
char * pszTrimmedValue;
|
|
|
|
|
|
//
|
|
// Skip leading and trailing whitespace in the value.
|
|
//
|
|
pszTrimmedValue = pszHeaderDelimiter + 1;
|
|
strtrim(&pszTrimmedValue);
|
|
|
|
pHeaderInfo->apszHeaderStrings[i] = pszTrimmedValue;
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Recognized header %i:\"%hs\", data = \"%hs\".",
|
|
i, pszLineStart, pHeaderInfo->apszHeaderStrings[i]);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate header %i:\"%hs\", data = \"%hs\".",
|
|
i, pszLineStart, (pszHeaderDelimiter + 1));
|
|
}
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
#ifdef DBG
|
|
//
|
|
// Print unrecognized headers.
|
|
//
|
|
if (i >= NUM_RESPONSE_HEADERS)
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring unrecognized header \"%hs\", data = \"%hs\".",
|
|
pszLineStart, (pszHeaderDelimiter + 1));
|
|
}
|
|
#endif // DBG
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring line \"%hs\", no header delimiter.",
|
|
pszLineStart);
|
|
}
|
|
|
|
|
|
//
|
|
// Go to the next UPnP header (if any).
|
|
//
|
|
pszCurrent++;
|
|
pszLineStart = pszCurrent;
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// At this point pHeaderInfo->apszHeaderStrings should contain pointers to
|
|
// the data for all the headers that were found, and
|
|
// pHeaderInfo->pszMsgBody should point to the end of the headers.
|
|
//
|
|
} // CNATHelpUPnP::ParseUPnPHeaders
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetAddressFromURL"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetAddressFromURL
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Parses a UPnP URL into a SOCKADDR_IN structure. Only "http://"
|
|
// URLs are parsed. The string passed in may be temporarily
|
|
// modified.
|
|
//
|
|
// Arguments:
|
|
// char * pszLocation - Pointer to buffer containing the Location
|
|
// header. It will be modified.
|
|
// SOCKADDR_IN * psaddrinLocation - Place to store address contained in
|
|
// header string.
|
|
// char ** ppszRelativePath - Place to store pointer to rest of path
|
|
// (stuff after hostname and optional
|
|
// port).
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - String was parsed successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::GetAddressFromURL(char * const pszLocation,
|
|
SOCKADDR_IN * psaddrinLocation,
|
|
char ** ppszRelativePath)
|
|
{
|
|
HRESULT hr;
|
|
BOOL fModifiedDelimiterChar = FALSE;
|
|
char * pszStart;
|
|
char * pszDelimiter;
|
|
char cTempChar;
|
|
PHOSTENT phostent;
|
|
|
|
|
|
//
|
|
// Initialize the address. Default to the standard HTTP port.
|
|
//
|
|
ZeroMemory(psaddrinLocation, sizeof(SOCKADDR_IN));
|
|
psaddrinLocation->sin_family = AF_INET;
|
|
psaddrinLocation->sin_port = HTONS(HTTP_PORT);
|
|
|
|
|
|
//
|
|
// Clear the relative path pointer.
|
|
//
|
|
(*ppszRelativePath) = NULL;
|
|
|
|
|
|
//
|
|
// Skip past "http://". If it's not "http://", then fail.
|
|
//
|
|
if (_strnicmp(pszLocation, "http://", strlen("http://")) != 0)
|
|
{
|
|
DPFX(DPFPREP, 1, "Location URL (\"%hs\") does not start with \"http://\".",
|
|
pszLocation);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Exit;
|
|
}
|
|
|
|
pszStart = pszLocation + strlen("http://");
|
|
|
|
//
|
|
// See if there's a port specified or any extraneous junk after an IP
|
|
// address or hostname to figure out the string to use. Search from the
|
|
// start of the string until we hit the end of the string or a reserved URL
|
|
// character.
|
|
//
|
|
|
|
pszDelimiter = pszStart + 1;
|
|
|
|
while (((*pszDelimiter) != '\0') &&
|
|
((*pszDelimiter) != '/') &&
|
|
((*pszDelimiter) != '?') &&
|
|
((*pszDelimiter) != '=') &&
|
|
((*pszDelimiter) != '#'))
|
|
{
|
|
if ((*pszDelimiter) == ':')
|
|
{
|
|
char * pszPortEnd;
|
|
|
|
|
|
//
|
|
// We found the start of a port, search for the end. It must
|
|
// contain only numeric characters.
|
|
//
|
|
pszPortEnd = pszDelimiter + 1;
|
|
while (((*pszPortEnd) >= '0') && ((*pszPortEnd) <= '9'))
|
|
{
|
|
pszPortEnd++;
|
|
}
|
|
|
|
|
|
//
|
|
// Temporarily truncate the string.
|
|
//
|
|
cTempChar = (*pszPortEnd);
|
|
(*pszPortEnd) = '\0';
|
|
|
|
|
|
DPFX(DPFPREP, 7, "Found port \"%hs\".", (pszDelimiter + 1));
|
|
|
|
psaddrinLocation->sin_port = HTONS((u_short) atoi(pszDelimiter + 1));
|
|
|
|
|
|
//
|
|
// Restore the character.
|
|
//
|
|
(*pszPortEnd) = cTempChar;
|
|
|
|
|
|
//
|
|
// Save the relative path
|
|
//
|
|
(*ppszRelativePath) = pszPortEnd;
|
|
|
|
break;
|
|
}
|
|
|
|
pszDelimiter++;
|
|
}
|
|
|
|
|
|
//
|
|
// Remember the character that stopped the search, and then temporarily
|
|
// truncate the string.
|
|
//
|
|
cTempChar = (*pszDelimiter);
|
|
(*pszDelimiter) = '\0';
|
|
fModifiedDelimiterChar = TRUE;
|
|
|
|
|
|
//
|
|
// Save the relative path if we haven't already (because of a port).
|
|
//
|
|
if ((*ppszRelativePath) == NULL)
|
|
{
|
|
(*ppszRelativePath) = pszDelimiter;
|
|
}
|
|
|
|
DPFX(DPFPREP, 7, "Relative path = \"%hs\".", (*ppszRelativePath));
|
|
|
|
|
|
|
|
//
|
|
// Convert the hostname.
|
|
//
|
|
psaddrinLocation->sin_addr.S_un.S_addr = this->m_pfninet_addr(pszStart);
|
|
|
|
//
|
|
// If it's bogus, give up.
|
|
//
|
|
if (psaddrinLocation->sin_addr.S_un.S_addr == INADDR_ANY)
|
|
{
|
|
DPFX(DPFPREP, 0, "Host name \"%hs\" is invalid!",
|
|
pszStart);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Exit;
|
|
}
|
|
|
|
if (psaddrinLocation->sin_addr.S_un.S_addr == INADDR_NONE)
|
|
{
|
|
//
|
|
// It's not a straight IP address. Lookup the hostname.
|
|
//
|
|
phostent = this->m_pfngethostbyname(pszStart);
|
|
if (phostent == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't lookup host name \"%hs\"!",
|
|
pszStart);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Exit;
|
|
}
|
|
|
|
if (phostent->h_addr_list[0] == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Host name \"%hs\" has no address entries!",
|
|
pszStart);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Pick the first address returned.
|
|
//
|
|
|
|
#ifdef DBG
|
|
{
|
|
IN_ADDR ** ppinaddr;
|
|
DWORD dwNumAddrs;
|
|
|
|
|
|
ppinaddr = (IN_ADDR**) phostent->h_addr_list;
|
|
dwNumAddrs = 0;
|
|
|
|
while ((*ppinaddr) != NULL)
|
|
{
|
|
ppinaddr++;
|
|
dwNumAddrs++;
|
|
}
|
|
|
|
DPFX(DPFPREP, 7, "Picking first (of %u IP addresses) for \"%hs\".",
|
|
dwNumAddrs, pszStart);
|
|
}
|
|
#endif // DBG
|
|
|
|
psaddrinLocation->sin_addr.S_un.S_addr = ((IN_ADDR*) phostent->h_addr_list[0])->S_un.S_addr;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Successfully converted IP address \"%hs\".", pszStart);
|
|
}
|
|
|
|
|
|
hr = DPNH_OK;
|
|
|
|
|
|
Exit:
|
|
|
|
|
|
//
|
|
// If we found a port, restore the string. If not, use the default port.
|
|
//
|
|
if (fModifiedDelimiterChar)
|
|
{
|
|
//
|
|
// Note that PREfast reported this as being used before being
|
|
// initialized for a while. For some reason it didn't notice that I
|
|
// key off of fModifiedDelimiterChar. This appeared to get fixed, but
|
|
// PREfast is still giving me a false hit for a similar reason
|
|
// elsewhere.
|
|
//
|
|
(*pszDelimiter) = cTempChar;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 8, "Returning %u.%u.%u.%u:%u, hr = 0x%lx.",
|
|
psaddrinLocation->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinLocation->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinLocation->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinLocation->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinLocation->sin_port),
|
|
hr);
|
|
|
|
|
|
return hr;
|
|
} // CNATHelpUPnP::GetAddressFromURL
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::HandleUPnPDescriptionResponseBody"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::HandleUPnPDescriptionResponseBody
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Handles a UPnP device description response. The string will
|
|
// be modified.
|
|
//
|
|
// The UPnP device may get removed from list if a failure
|
|
// occurs, the caller needs to have a reference.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device being described.
|
|
// DWORD dwHTTPResponseCode - HTTP header response code.
|
|
// char * pszDescriptionXML - UPnP device description XML string.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Description response was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::HandleUPnPDescriptionResponseBody(CUPnPDevice * const pUPnPDevice,
|
|
const DWORD dwHTTPResponseCode,
|
|
char * const pszDescriptionXML)
|
|
{
|
|
HRESULT hr;
|
|
PARSEXML_SUBELEMENT aSubElements[MAX_NUM_DESCRIPTION_XML_SUBELEMENTS];
|
|
PARSEXML_ELEMENT ParseElement;
|
|
CDevice * pDevice;
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %u, 0x%p)",
|
|
this, pUPnPDevice, dwHTTPResponseCode, pszDescriptionXML);
|
|
|
|
|
|
//
|
|
// Make sure it was the success result.
|
|
//
|
|
if (dwHTTPResponseCode != 200)
|
|
{
|
|
DPFX(DPFPREP, 0, "Got error response %u from UPnP description request!",
|
|
dwHTTPResponseCode);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
ZeroMemory(aSubElements, sizeof(aSubElements));
|
|
|
|
ZeroMemory(&ParseElement, sizeof(ParseElement));
|
|
ParseElement.papszElementStack = (char**) (&c_szElementStack_service);
|
|
ParseElement.dwElementStackDepth = sizeof(c_szElementStack_service) / sizeof(char*);
|
|
ParseElement.paSubElements = (PARSEXML_SUBELEMENT*) (aSubElements);
|
|
ParseElement.dwMaxNumSubElements = MAX_NUM_DESCRIPTION_XML_SUBELEMENTS;
|
|
//ParseElement.dwNumSubElements = 0;
|
|
//ParseElement.fFoundMatchingElement = FALSE;
|
|
|
|
hr = this->ParseXML(pszDescriptionXML,
|
|
&ParseElement,
|
|
PARSECALLBACK_DESCRIPTIONRESPONSE,
|
|
pUPnPDevice);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't parse XML!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If we did not find a WANIPConnection or WANPPPConnection service, then
|
|
// this response was not valid.
|
|
//
|
|
if (pUPnPDevice->GetServiceControlURL() == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't find WANIPConnection or WANPPPConnection service in XML description!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// The UPnP device is now controllable.
|
|
//
|
|
pUPnPDevice->NoteReady();
|
|
|
|
|
|
|
|
//
|
|
// Find out what the device's external IP address is. Note that calling
|
|
// UpdateUPnPExternalAddress will overwrite the buffer containing the
|
|
// pszDescriptionXML string. That's fine, because we've saved all the
|
|
// stuff in there that we need already.
|
|
//
|
|
hr = this->UpdateUPnPExternalAddress(pUPnPDevice, FALSE);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't update new UPnP device 0x%p's external address!",
|
|
pUPnPDevice);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Map existing registered ports with this new UPnP device.
|
|
//
|
|
pDevice = pUPnPDevice->GetOwningDevice();
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
pBilink = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilink != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilink);
|
|
|
|
//
|
|
// Note that calling MapPortsOnUPnPDevice will overwrite the buffer
|
|
// containing the pszDescriptionXML string. That's fine, because
|
|
// we've saved all the stuff in there that we need already.
|
|
//
|
|
hr = this->MapPortsOnUPnPDevice(pUPnPDevice, pRegisteredPort);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't map existing ports on new UPnP device 0x%p!",
|
|
pUPnPDevice);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Let the user know the addresses changed next time GetCaps is
|
|
// called.
|
|
//
|
|
DPFX(DPFPREP, 8, "Noting that addresses changed (for registered port 0x%p).",
|
|
pRegisteredPort);
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_ADDRESSESCHANGED;
|
|
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
|
|
|
|
//
|
|
// Try to remove any mappings that were not freed earlier because we
|
|
// crashed.
|
|
//
|
|
hr = this->CleanupInactiveNATMappings(pUPnPDevice);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Failed cleaning up inactive mappings with new UPnP device 0x%p!",
|
|
pUPnPDevice);
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::HandleUPnPDescriptionResponseBody
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::HandleUPnPControlResponseBody"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::HandleUPnPControlResponseBody
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Handles a UPnP control response. The string will be
|
|
// modified.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CUPnPDevice * pUPnPDevice - Pointer to UPnP device being described.
|
|
// DWORD dwHTTPResponseCode - HTTP header response code.
|
|
// char * pszControlResponseSOAP - UPnP device response SOAP XML string.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Description response was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::HandleUPnPControlResponseBody(CUPnPDevice * const pUPnPDevice,
|
|
const DWORD dwHTTPResponseCode,
|
|
char * const pszControlResponseSOAP)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CONTROLRESPONSEPARSECONTEXT crpc;
|
|
PARSEXML_SUBELEMENT aSubElements[MAX_NUM_UPNPCONTROLOUTARGS];
|
|
PARSEXML_ELEMENT ParseElement;
|
|
|
|
|
|
DNASSERT(pUPnPDevice->IsWaitingForControlResponse());
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %u, 0x%p)",
|
|
this, pUPnPDevice, dwHTTPResponseCode, pszControlResponseSOAP);
|
|
|
|
|
|
|
|
ZeroMemory(&crpc, sizeof(crpc));
|
|
crpc.ControlResponseType = pUPnPDevice->GetControlResponseType();
|
|
crpc.pUPnPDevice = pUPnPDevice;
|
|
crpc.dwHTTPResponseCode = dwHTTPResponseCode;
|
|
crpc.pControlResponseInfo = pUPnPDevice->GetControlResponseInfo();
|
|
|
|
|
|
|
|
ZeroMemory(aSubElements, sizeof(aSubElements));
|
|
|
|
|
|
ZeroMemory(&ParseElement, sizeof(ParseElement));
|
|
|
|
if (dwHTTPResponseCode == 200)
|
|
{
|
|
switch (crpc.ControlResponseType)
|
|
{
|
|
/*
|
|
case CONTROLRESPONSETYPE_QUERYSTATEVARIABLE_EXTERNALIPADDRESS:
|
|
{
|
|
ParseElement.papszElementStack = (char**) (&c_szElementStack_QueryStateVariableResponse);
|
|
ParseElement.dwElementStackDepth = sizeof(c_szElementStack_QueryStateVariableResponse) / sizeof(char*);
|
|
break;
|
|
}
|
|
*/
|
|
case CONTROLRESPONSETYPE_GETEXTERNALIPADDRESS:
|
|
{
|
|
ParseElement.papszElementStack = (char**) (&c_szElementStack_GetExternalIPAddressResponse);
|
|
ParseElement.dwElementStackDepth = sizeof(c_szElementStack_GetExternalIPAddressResponse) / sizeof(char*);
|
|
break;
|
|
}
|
|
|
|
case CONTROLRESPONSETYPE_ADDPORTMAPPING:
|
|
{
|
|
ParseElement.papszElementStack = (char**) (&c_szElementStack_AddPortMappingResponse);
|
|
ParseElement.dwElementStackDepth = sizeof(c_szElementStack_AddPortMappingResponse) / sizeof(char*);
|
|
break;
|
|
}
|
|
|
|
case CONTROLRESPONSETYPE_GETSPECIFICPORTMAPPINGENTRY:
|
|
{
|
|
ParseElement.papszElementStack = (char**) (&c_szElementStack_GetSpecificPortMappingEntryResponse);
|
|
ParseElement.dwElementStackDepth = sizeof(c_szElementStack_GetSpecificPortMappingEntryResponse) / sizeof(char*);
|
|
break;
|
|
}
|
|
|
|
case CONTROLRESPONSETYPE_DELETEPORTMAPPING:
|
|
{
|
|
ParseElement.papszElementStack = (char**) (&c_szElementStack_DeletePortMappingResponse);
|
|
ParseElement.dwElementStackDepth = sizeof(c_szElementStack_DeletePortMappingResponse) / sizeof(char*);
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
ParseElement.papszElementStack = (char**) (&c_szElementStack_ControlResponseFailure);
|
|
ParseElement.dwElementStackDepth = sizeof(c_szElementStack_ControlResponseFailure) / sizeof(char*);
|
|
}
|
|
|
|
ParseElement.paSubElements = (PARSEXML_SUBELEMENT*) (aSubElements);
|
|
ParseElement.dwMaxNumSubElements = MAX_NUM_UPNPCONTROLOUTARGS;
|
|
//ParseElement.dwNumSubElements = 0;
|
|
//ParseElement.fFoundMatchingElement = FALSE;
|
|
|
|
hr = this->ParseXML(pszControlResponseSOAP,
|
|
&ParseElement,
|
|
PARSECALLBACK_CONTROLRESPONSE,
|
|
&crpc);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't parse XML!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// If we didn't a matching item, map it to a generic failure.
|
|
//
|
|
if (! ParseElement.fFoundMatchingElement)
|
|
{
|
|
if (dwHTTPResponseCode == 200)
|
|
{
|
|
DPFX(DPFPREP, 1, "Didn't find XML items in success response, mapping to generic failure.");
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Didn't find failure XML items, using generic failure.");
|
|
}
|
|
|
|
crpc.pControlResponseInfo->hrErrorCode = DPNHERR_GENERIC;
|
|
}
|
|
|
|
|
|
pUPnPDevice->StopWaitingForControlResponse();
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::HandleUPnPControlResponseBody
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ParseXML"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ParseXML
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Parses an XML string for a specific element, and calls a
|
|
// helper function for each instance found.
|
|
//
|
|
// Subelement values cannot themselves contain subelements. If
|
|
// they do, the sub-subelements will be ignored.
|
|
//
|
|
// The string buffer is modified.
|
|
//
|
|
// Arguments:
|
|
// char * pszXML - XML string to parse.
|
|
// PARSEXML_ELEMENT * pParseElement - Pointer to element whose sub element
|
|
// values should be retrieved.
|
|
// PARSECALLBACK ParseCallback - Enum indicating what helper function
|
|
// to use.
|
|
// PVOID pvContext - Pointer to context value to pass to
|
|
// helper function.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Description response was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::ParseXML(char * const pszXML,
|
|
PARSEXML_ELEMENT * const pParseElement,
|
|
const PARSECALLBACK ParseCallback,
|
|
PVOID pvContext)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
PARSEXML_STACKENTRY aElementStack[MAX_XMLELEMENT_DEPTH];
|
|
DWORD dwCurrentElementDepth = 0;
|
|
char * pszElementTagStart = NULL;
|
|
BOOL fInElement = FALSE;
|
|
BOOL fEmptyElement = FALSE;
|
|
char * pszCurrent;
|
|
DWORD dwStackDepth;
|
|
PARSEXML_SUBELEMENT * pSubElement;
|
|
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p)",
|
|
this, pszXML, pParseElement);
|
|
|
|
|
|
//
|
|
// Need room for entire stack + at least one subelement level.
|
|
//
|
|
DNASSERT(pParseElement->dwElementStackDepth < MAX_XMLELEMENT_DEPTH);
|
|
|
|
|
|
#ifdef DBG
|
|
this->PrintUPnPTransactionToFile(pszXML,
|
|
strlen(pszXML),
|
|
"Inbound XML Body",
|
|
NULL);
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// Loop through the XML looking for the given elements.
|
|
//
|
|
pszCurrent = pszXML;
|
|
while ((*pszCurrent) != '\0')
|
|
{
|
|
switch (*pszCurrent)
|
|
{
|
|
case '<':
|
|
{
|
|
//
|
|
// If we're in an element tag already, this is bogus XML or a
|
|
// CDATA section (which we don't handle). Fail.
|
|
//
|
|
if (pszElementTagStart != NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Encountered '<' character in element tag, XML parsing failed.");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Truncate the string here in case this is the start of an
|
|
// element end tag. This delimits a value string.
|
|
//
|
|
(*pszCurrent) = '\0';
|
|
|
|
|
|
pszElementTagStart = pszCurrent + 1;
|
|
if ((*pszElementTagStart) == '\0')
|
|
{
|
|
DPFX(DPFPREP, 0, "Encountered '<' character at end of string, XML parsing failed.");
|
|
goto Failure;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
case '>':
|
|
{
|
|
//
|
|
// If we're not in an element tag, this is bogus XML or a CDATA
|
|
// section (which we don't handle). Fail.
|
|
//
|
|
if (pszElementTagStart == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Encountered '>' character outside of element tag, XML parsing failed.");
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Truncate the string here.
|
|
//
|
|
(*pszCurrent) = '\0';
|
|
|
|
//
|
|
// This could either be a start or an end tag. If the first
|
|
// character of the tag is '/', then it's an end tag.
|
|
//
|
|
// Note that empty element tags begin by being parsed like a
|
|
// start tag, but then jump into the end tag clause.
|
|
//
|
|
if ((*pszElementTagStart) == '/')
|
|
{
|
|
pszElementTagStart++;
|
|
|
|
|
|
//
|
|
// Make sure the element tag stack is valid. The name of
|
|
// this end tag should match the start tag at the top of
|
|
// the stack. XML elements are case sensitive.
|
|
//
|
|
if (dwCurrentElementDepth == 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Encountered extra element end tag \"%hs\", XML parsing failed.",
|
|
pszElementTagStart);
|
|
goto Failure;
|
|
}
|
|
|
|
if (strcmp(pszElementTagStart, aElementStack[dwCurrentElementDepth - 1].pszName) != 0)
|
|
{
|
|
DPFX(DPFPREP, 0, "Encountered non-matching element end tag (\"%hs\" != \"%hs\"), XML parsing failed.",
|
|
pszElementTagStart,
|
|
aElementStack[dwCurrentElementDepth - 1].pszName);
|
|
goto Failure;
|
|
}
|
|
|
|
TagEnd:
|
|
|
|
//
|
|
// If we're here, then we have a complete element. If we
|
|
// were in the element, then it's either:
|
|
// the end of a sub-sub element,
|
|
// the end of a sub element, or
|
|
// the end of the element itself.
|
|
//
|
|
if (fInElement)
|
|
{
|
|
switch (dwCurrentElementDepth - pParseElement->dwElementStackDepth)
|
|
{
|
|
case 0:
|
|
{
|
|
//
|
|
// It's the end of the element. Call the
|
|
// helper function. Reuse fInElement as the
|
|
// fContinueParsing BOOL.
|
|
//
|
|
|
|
switch (ParseCallback)
|
|
{
|
|
case PARSECALLBACK_DESCRIPTIONRESPONSE:
|
|
{
|
|
hr = this->ParseXMLCallback_DescriptionResponse(pParseElement,
|
|
pvContext,
|
|
aElementStack,
|
|
&fInElement);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Description response parse helper function failed!");
|
|
goto Failure;
|
|
}
|
|
break;
|
|
}
|
|
|
|
case PARSECALLBACK_CONTROLRESPONSE:
|
|
{
|
|
hr = this->ParseXMLCallback_ControlResponse(pParseElement,
|
|
pvContext,
|
|
aElementStack,
|
|
&fInElement);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Control response parse helper function failed!");
|
|
goto Failure;
|
|
}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DNASSERT(FALSE);
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (! fInElement)
|
|
{
|
|
DPFX(DPFPREP, 1, "Parse callback function discontinued parsing.");
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Keep parsing, but we're no longer in the
|
|
// element. Reset the sub element counter in
|
|
// case we found entries.
|
|
//
|
|
fInElement = FALSE;
|
|
pParseElement->dwNumSubElements = 0;
|
|
break;
|
|
}
|
|
|
|
case 1:
|
|
{
|
|
//
|
|
// It's the end of a subelement. Complete this
|
|
// instance, if there's room.
|
|
//
|
|
if (pParseElement->dwNumSubElements < pParseElement->dwMaxNumSubElements)
|
|
{
|
|
pSubElement = &pParseElement->paSubElements[pParseElement->dwNumSubElements];
|
|
|
|
|
|
|
|
pSubElement->pszNameFound = pszElementTagStart;
|
|
|
|
|
|
pSubElement->dwNumAttributes = aElementStack[dwCurrentElementDepth - 1].dwNumAttributes;
|
|
if (pSubElement->dwNumAttributes > 0)
|
|
{
|
|
memcpy(pSubElement->apszAttributeNames,
|
|
aElementStack[dwCurrentElementDepth - 1].apszAttributeNames,
|
|
(pSubElement->dwNumAttributes * sizeof(char*)));
|
|
|
|
memcpy(pSubElement->apszAttributeValues,
|
|
aElementStack[dwCurrentElementDepth - 1].apszAttributeValues,
|
|
(pSubElement->dwNumAttributes * sizeof(char*)));
|
|
}
|
|
|
|
|
|
pSubElement->pszValueFound = aElementStack[dwCurrentElementDepth - 1].pszValue;
|
|
|
|
|
|
|
|
pParseElement->dwNumSubElements++;
|
|
|
|
DPFX(DPFPREP, 7, "Completed subelement instance #%u, name = \"%hs\", %u attributes, value = \"%hs\".",
|
|
pParseElement->dwNumSubElements,
|
|
pSubElement->pszNameFound,
|
|
pSubElement->dwNumAttributes,
|
|
pSubElement->pszValueFound);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 0, "Ignoring subelement instance \"%hs\" (%u attributes, value = \"%hs\"), no room in array.",
|
|
pszElementTagStart,
|
|
aElementStack[dwCurrentElementDepth - 1].dwNumAttributes,
|
|
aElementStack[dwCurrentElementDepth - 1].pszValue);
|
|
}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// It's the end of a sub-subelement.
|
|
//
|
|
DPFX(DPFPREP, 1, "Ignoring sub-sub element \"%hs\" (%u attributes, value = \"%hs\").",
|
|
pszElementTagStart,
|
|
aElementStack[dwCurrentElementDepth - 1].dwNumAttributes,
|
|
aElementStack[dwCurrentElementDepth - 1].pszValue);
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// Pop the element off the stack.
|
|
//
|
|
dwCurrentElementDepth--;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// It's not an end tag, but it might be an empty element
|
|
// (i.e. "<tag/>").
|
|
//
|
|
if (*(pszCurrent - 1) == '/')
|
|
{
|
|
//
|
|
// Truncate the string early.
|
|
//
|
|
*(pszCurrent - 1) = '\0';
|
|
|
|
//
|
|
// Remember this state so we can parse it properly.
|
|
//
|
|
fEmptyElement = TRUE;
|
|
|
|
DPFX(DPFPREP, 7, "XML element \"%hs\" is empty (i.e. is both a start and end tag).",
|
|
pszElementTagStart);
|
|
}
|
|
|
|
//
|
|
// Push the element on the tag stack, if there's room.
|
|
//
|
|
if (dwCurrentElementDepth >= MAX_XMLELEMENT_DEPTH)
|
|
{
|
|
DPFX(DPFPREP, 0, "Too many nested element tags (%u), XML parsing failed.",
|
|
dwCurrentElementDepth);
|
|
goto Failure;
|
|
}
|
|
|
|
aElementStack[dwCurrentElementDepth].pszName = pszElementTagStart;
|
|
|
|
//
|
|
// If there are attributes to this element, separate them
|
|
// into a different array. They will not be parsed,
|
|
// though.
|
|
// Attributes are delimited by whitespace.
|
|
//
|
|
while ((*pszElementTagStart) != '\0')
|
|
{
|
|
pszElementTagStart++;
|
|
|
|
//
|
|
// If it's whitespace, that's the end of the element
|
|
// name. Truncate the string and break out of the
|
|
// loops.
|
|
//
|
|
if (((*pszElementTagStart) == ' ') ||
|
|
((*pszElementTagStart) == '\t') ||
|
|
((*pszElementTagStart) == '\r') ||
|
|
((*pszElementTagStart) == '\n'))
|
|
{
|
|
(*pszElementTagStart) = '\0';
|
|
pszElementTagStart++;
|
|
|
|
DPFX(DPFPREP, 8, "Attribute whitespace found at offset 0x%p, string length = %i.",
|
|
(pszElementTagStart - aElementStack[dwCurrentElementDepth].pszName),
|
|
strlen(pszElementTagStart));
|
|
|
|
break;
|
|
}
|
|
}
|
|
|
|
//
|
|
// If there weren't any attributes, pszElementTagStart will
|
|
// just point to an empty (but not NULL) string.
|
|
//
|
|
// So save the start of the value string.
|
|
//
|
|
aElementStack[dwCurrentElementDepth].pszValue = pszElementTagStart + strlen(pszElementTagStart) + 1;
|
|
|
|
|
|
//
|
|
// Then parse out the attributes.
|
|
//
|
|
this->ParseXMLAttributes(pszElementTagStart,
|
|
aElementStack[dwCurrentElementDepth].apszAttributeNames,
|
|
aElementStack[dwCurrentElementDepth].apszAttributeValues,
|
|
MAX_XMLNAMESPACES_PER_ELEMENT,
|
|
&(aElementStack[dwCurrentElementDepth].dwNumAttributes));
|
|
|
|
|
|
//
|
|
// The <?xml> tag is considered optional by this parser,
|
|
// and will be ignored.
|
|
//
|
|
if (_stricmp(aElementStack[dwCurrentElementDepth].pszName, "?xml") != 0)
|
|
{
|
|
//
|
|
// Bump the stack pointer.
|
|
//
|
|
dwCurrentElementDepth++;
|
|
|
|
|
|
//
|
|
// See if this the right element. If the stack depth
|
|
// isn't right, it can't be the desired item.
|
|
// Otherwise, make sure the stack matches.
|
|
//
|
|
if (dwCurrentElementDepth == pParseElement->dwElementStackDepth)
|
|
{
|
|
//
|
|
// Work through the entire element stack, making
|
|
// sure each name matches.
|
|
//
|
|
for(dwStackDepth = 0; dwStackDepth < dwCurrentElementDepth; dwStackDepth++)
|
|
{
|
|
if (! this->MatchesXMLStringWithoutNamespace(aElementStack[dwStackDepth].pszName,
|
|
pParseElement->papszElementStack[dwStackDepth],
|
|
aElementStack,
|
|
NULL,
|
|
(dwStackDepth + 1)))
|
|
{
|
|
//
|
|
// It didn't match. Stop looping.
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
|
|
//
|
|
// If they all matched, we found the value desired.
|
|
//
|
|
if (dwStackDepth == dwCurrentElementDepth)
|
|
{
|
|
fInElement = TRUE;
|
|
|
|
DPFX(DPFPREP, 7, "Found requested element \"%hs\" at depth %u, has %u attributes.",
|
|
aElementStack[dwCurrentElementDepth - 1].pszName,
|
|
dwCurrentElementDepth,
|
|
aElementStack[dwCurrentElementDepth - 1].dwNumAttributes);
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring element \"%hs\" at depth %u that has %u attributes.",
|
|
aElementStack[dwCurrentElementDepth].pszName,
|
|
dwCurrentElementDepth,
|
|
aElementStack[dwCurrentElementDepth].dwNumAttributes);
|
|
|
|
//
|
|
// If this assertion fails and it is an empty element,
|
|
// dwCurrentElementDepth will be off by -1 when we jump
|
|
// to TagEnd.
|
|
//
|
|
DNASSERT(! fInElement);
|
|
}
|
|
|
|
|
|
//
|
|
// If this is an empty element, go immediately to handling
|
|
// the tag closure.
|
|
//
|
|
if (fEmptyElement)
|
|
{
|
|
fEmptyElement = FALSE;
|
|
goto TagEnd;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Search for another element tag.
|
|
//
|
|
pszElementTagStart = NULL;
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// Ordinary character, continue.
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Move to the next character
|
|
//
|
|
pszCurrent++;
|
|
}
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
hr = DPNHERR_GENERIC;
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::ParseXML
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ParseXMLAttributes"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ParseXMLAttributes
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Parses any XML attributes out of the given string. The input
|
|
// string buffer will be modified.
|
|
//
|
|
// Arguments:
|
|
// char * pszString - Pointer to attributes string to parse.
|
|
// This will be modified.
|
|
// char ** apszAttributeNames - Array in which to store attribute name
|
|
// string pointers.
|
|
// char ** apszAttributeValues - Matching array in which to store cor-
|
|
// responding attribute value strings.
|
|
// DWORD dwMaxNumAttributes - Maximum number of entries allowed in
|
|
// previous arrays.
|
|
// DWORD * pdwNumAttributes - Place to store number of attributes that
|
|
// were found.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Description response was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::ParseXMLAttributes(char * const pszString,
|
|
char ** const apszAttributeNames,
|
|
char ** const apszAttributeValues,
|
|
const DWORD dwMaxNumAttributes,
|
|
DWORD * const pdwNumAttributes)
|
|
{
|
|
char * pszStart;
|
|
char * pszCurrent;
|
|
char * pszEndOfString;
|
|
BOOL fInValueString = FALSE;
|
|
BOOL fInQuotes = FALSE;
|
|
BOOL fEmptyString = FALSE;
|
|
|
|
|
|
#ifdef EXTRA_PARSING_SPEW
|
|
DPFX(DPFPREP, 8, "(0x%p) Parameters: (\"%hs\", 0x%p, 0x%p, %u, 0x%p)",
|
|
this, pszString, apszAttributeNames, apszAttributeValues,
|
|
dwMaxNumAttributes, pdwNumAttributes);
|
|
#endif // EXTRA_PARSING_SPEW
|
|
|
|
|
|
//
|
|
// Start at the beginning with no entries.
|
|
//
|
|
(*pdwNumAttributes) = 0;
|
|
pszStart = pszString;
|
|
pszCurrent = pszStart;
|
|
pszEndOfString = pszString + strlen(pszString);
|
|
|
|
|
|
//
|
|
// Skip empty strings.
|
|
//
|
|
if (pszEndOfString == pszStart)
|
|
{
|
|
return;
|
|
}
|
|
|
|
|
|
//
|
|
// Loop through the entire string.
|
|
//
|
|
while (pszCurrent <= pszEndOfString)
|
|
{
|
|
switch (*pszCurrent)
|
|
{
|
|
case '=':
|
|
{
|
|
//
|
|
// If we're not in quotes or a value string, this is the end of
|
|
// the attribute name and the start of a value string.
|
|
//
|
|
if ((! fInQuotes) && (! fInValueString))
|
|
{
|
|
(*pszCurrent) = '\0';
|
|
apszAttributeNames[(*pdwNumAttributes)] = pszStart;
|
|
pszStart = pszCurrent + 1;
|
|
fInValueString = TRUE;
|
|
}
|
|
break;
|
|
}
|
|
|
|
case '\0':
|
|
case ' ':
|
|
case '\t':
|
|
case '\r':
|
|
case '\n':
|
|
{
|
|
//
|
|
// Whitespace or the end of the string. If we're not in
|
|
// quotes, that means it's the end of an attribute. Of course
|
|
// if it's the end of the string, then we force the end of the
|
|
// attribute/value.
|
|
//
|
|
if ((! fInQuotes) || ((*pszCurrent) == '\0'))
|
|
{
|
|
(*pszCurrent) = '\0';
|
|
|
|
if (fInValueString)
|
|
{
|
|
//
|
|
// End of the value string.
|
|
//
|
|
|
|
apszAttributeValues[(*pdwNumAttributes)] = pszStart;
|
|
fInValueString = FALSE;
|
|
|
|
DPFX(DPFPREP, 7, "Found attribute \"%hs\" with value \"%hs\".",
|
|
apszAttributeNames[(*pdwNumAttributes)],
|
|
apszAttributeValues[(*pdwNumAttributes)]);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// This may be another whitespace character immediately
|
|
// following a previous one. If so, ignore it. If
|
|
// not, save the attribute.
|
|
//
|
|
if (pszCurrent == pszStart)
|
|
{
|
|
fEmptyString = TRUE;
|
|
|
|
#ifdef EXTRA_PARSING_SPEW
|
|
DPFX(DPFPREP, 9, "Ignoring extra whitespace at offset 0x%p.",
|
|
(pszCurrent - pszString));
|
|
#endif // EXTRA_PARSING_SPEW
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// End of the attribute. Force an empty value string.
|
|
//
|
|
|
|
apszAttributeNames[(*pdwNumAttributes)] = pszStart;
|
|
apszAttributeValues[(*pdwNumAttributes)] = pszCurrent;
|
|
|
|
DPFX(DPFPREP, 7, "Found attribute \"%hs\" with no value string.",
|
|
apszAttributeNames[(*pdwNumAttributes)]);
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Update the pointer for the start of the next attribute.
|
|
//
|
|
pszStart = pszCurrent + 1;
|
|
|
|
|
|
//
|
|
// Move to next attribute storage location, if this is not
|
|
// an empty string. If that was the last storage slot,
|
|
// we're done here.
|
|
//
|
|
if (fEmptyString)
|
|
{
|
|
fEmptyString = FALSE;
|
|
}
|
|
else
|
|
{
|
|
(*pdwNumAttributes)++;
|
|
if ((*pdwNumAttributes) >= dwMaxNumAttributes)
|
|
{
|
|
DPFX(DPFPREP, 1, "Maximum number of attributes reached, discontinuing attribute parsing.");
|
|
pszCurrent = pszEndOfString;
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
|
|
case '"':
|
|
{
|
|
//
|
|
// Make sure it's not an escaped quote character.
|
|
//
|
|
if ((pszCurrent == pszString) || (*(pszCurrent - 1) != '\\'))
|
|
{
|
|
//
|
|
// Toggle the quote state.
|
|
//
|
|
if (fInQuotes)
|
|
{
|
|
//
|
|
// Force the string to terminate here so we skip the
|
|
// trailing quote character.
|
|
//
|
|
fInQuotes = FALSE;
|
|
(*pszCurrent) = '\0';
|
|
}
|
|
else
|
|
{
|
|
fInQuotes = TRUE;
|
|
|
|
//
|
|
// This should be the start of a (value) string. Skip
|
|
// this quote character.
|
|
//
|
|
if (pszCurrent == pszStart)
|
|
{
|
|
pszStart++;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Found starting quote that wasn't at the beginning of the string! Continuing.");
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// It's an escaped quote character.
|
|
//
|
|
}
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// Ignore the character and move on.
|
|
//
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Move to next character.
|
|
//
|
|
pszCurrent++;
|
|
}
|
|
|
|
|
|
#ifdef EXTRA_PARSING_SPEW
|
|
DPFX(DPFPREP, 8, "(0x%p) Leave (found %u items)", this, (*pdwNumAttributes));
|
|
#endif // EXTRA_PARSING_SPEW
|
|
} // CNATHelpUPnP::ParseXMLNamespaceAttributes
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::MatchesXMLStringWithoutNamespace"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::MatchesXMLStringWithoutNamespace
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Determines whether the szCompareString matches szMatchString
|
|
// when all namespace prefixes in szCompareString are ignored.
|
|
// TRUE is returned if they do match, FALSE if not.
|
|
//
|
|
// Arguments:
|
|
// char * szCompareString - String that may contain namespace
|
|
// prefixes to be ignored.
|
|
// char * szMatchString - Shortened string without any
|
|
// namespace prefixes to be matched.
|
|
// PARSEXML_STACKENTRY * aElementStack - Array of nested elements whose
|
|
// attributes may define XML namespace
|
|
// aliases.
|
|
// PARSEXML_SUBELEMENT * pSubElement - Optional subelement entry with
|
|
// additional attributes to check.
|
|
// DWORD dwElementStackDepth - Number of entries in previous array.
|
|
//
|
|
// Returns: BOOL
|
|
//=============================================================================
|
|
BOOL CNATHelpUPnP::MatchesXMLStringWithoutNamespace(const char * const szCompareString,
|
|
const char * const szMatchString,
|
|
const PARSEXML_STACKENTRY * const aElementStack,
|
|
const PARSEXML_SUBELEMENT * const pSubElement,
|
|
const DWORD dwElementStackDepth)
|
|
{
|
|
BOOL fResult;
|
|
char * pszCompareStringNoNamespace;
|
|
|
|
|
|
//
|
|
// First, do a straight-forward string comparison.
|
|
//
|
|
if (_stricmp(szCompareString, szMatchString) == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "\"%hs\" exactly matches the short string.",
|
|
szCompareString);
|
|
|
|
fResult = TRUE;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Skip past any namespace prefixes.
|
|
//
|
|
pszCompareStringNoNamespace = this->GetStringWithoutNamespacePrefix(szCompareString,
|
|
aElementStack,
|
|
pSubElement,
|
|
dwElementStackDepth);
|
|
DNASSERT((pszCompareStringNoNamespace >= szCompareString) && (pszCompareStringNoNamespace <= (szCompareString + strlen(szCompareString))));
|
|
|
|
|
|
//
|
|
// Now try comparing again, if we found any prefixes.
|
|
//
|
|
if (pszCompareStringNoNamespace > szCompareString)
|
|
{
|
|
if (_stricmp(pszCompareStringNoNamespace, szMatchString) == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "\"%hs\" matches the short string \"%hs\" starting at offset 0x%p.",
|
|
szCompareString, szMatchString,
|
|
(pszCompareStringNoNamespace - szCompareString));
|
|
|
|
fResult = TRUE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "\"%hs\" does not match the short string \"%hs\" (starting at offset 0x%p).",
|
|
szCompareString, szMatchString,
|
|
(pszCompareStringNoNamespace - szCompareString));
|
|
|
|
fResult = FALSE;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 8, "\"%hs\" does not have any namespace prefixes and does not match \"%hs\".",
|
|
szCompareString, szMatchString);
|
|
|
|
fResult = FALSE;
|
|
}
|
|
}
|
|
|
|
return fResult;
|
|
} // CNATHelpUPnP::MatchesXMLStringWithoutNamespace
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetStringWithoutNamespacePrefix"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetStringWithoutNamespacePrefix
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Returns a pointer to the first part of the string after any
|
|
// prefixes found. This will be the start of the string if none
|
|
// are found.
|
|
//
|
|
// Arguments:
|
|
// char * szString - String that may contain namespace
|
|
// prefixes to be skipped.
|
|
// PARSEXML_STACKENTRY * aElementStack - Array of nested elements whose
|
|
// attributes may define XML namespace
|
|
// aliases.
|
|
// PARSEXML_SUBELEMENT * pSubElement - Optional subelement entry with
|
|
// additional attributes to check.
|
|
// DWORD dwElementStackDepth - Number of entries in previous array.
|
|
//
|
|
// Returns: char *
|
|
//=============================================================================
|
|
char * CNATHelpUPnP::GetStringWithoutNamespacePrefix(const char * const szString,
|
|
const PARSEXML_STACKENTRY * const aElementStack,
|
|
const PARSEXML_SUBELEMENT * const pSubElement,
|
|
const DWORD dwElementStackDepth)
|
|
{
|
|
char * pszResult;
|
|
UINT uiXMLNSPrefixLength;
|
|
DWORD dwAttribute;
|
|
UINT uiNamespaceNameLength;
|
|
UINT uiNamespaceValueLength;
|
|
DWORD dwStackDepth;
|
|
|
|
|
|
|
|
//
|
|
// Store the prefix value since we use it frequently in this function.
|
|
//
|
|
uiXMLNSPrefixLength = strlen(XML_NAMESPACEDEFINITIONPREFIX);
|
|
|
|
|
|
//
|
|
// Search the stack for an XML namespace definition that matches. Start at
|
|
// the bottom and work up, since later definitions take precendence over
|
|
// earlier ones.
|
|
//
|
|
// In fact, if this is a subelement, there are attributes associated with
|
|
// this item that need to be checked, too. Do that first.
|
|
//
|
|
if (pSubElement != NULL)
|
|
{
|
|
//
|
|
// Search each attribute
|
|
//
|
|
for(dwAttribute = 0; dwAttribute < pSubElement->dwNumAttributes; dwAttribute++)
|
|
{
|
|
//
|
|
// Work with this attribute if it's a valid XML namespace
|
|
// definition. It needs to start with the prefix, plus have one
|
|
// extra character for the actual name.
|
|
//
|
|
uiNamespaceNameLength = strlen(pSubElement->apszAttributeNames[dwAttribute]);
|
|
if ((uiNamespaceNameLength >= (uiXMLNSPrefixLength + 1)) &&
|
|
(_strnicmp(pSubElement->apszAttributeNames[dwAttribute], XML_NAMESPACEDEFINITIONPREFIX, uiXMLNSPrefixLength) == 0))
|
|
{
|
|
uiNamespaceNameLength -= uiXMLNSPrefixLength;
|
|
|
|
//
|
|
// Only work with the item's value if it's valid.
|
|
//
|
|
uiNamespaceValueLength = strlen(pSubElement->apszAttributeValues[dwAttribute]);
|
|
if (uiNamespaceValueLength > 0)
|
|
{
|
|
//
|
|
// Okay, here's an item. See if the name prefixes the
|
|
// passed in string.
|
|
//
|
|
if (_strnicmp(szString, (pSubElement->apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength), uiNamespaceNameLength) == 0)
|
|
{
|
|
DPFX(DPFPREP, 8, "\"%hs\" begins with prefix \"%hs\" (subelement).",
|
|
szString,
|
|
(pSubElement->apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength));
|
|
|
|
//
|
|
// Cast to lose the const.
|
|
//
|
|
pszResult = ((char*) szString) + uiNamespaceNameLength;
|
|
|
|
//
|
|
// Skip the colon delimiter.
|
|
//
|
|
if ((*pszResult) == ':')
|
|
{
|
|
pszResult++;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "\"%hs\" begins with prefix \"%hs\" but does not have colon separator (subelement)! Continuing.",
|
|
szString,
|
|
(pSubElement->apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength));
|
|
}
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Namespace doesn't match
|
|
//
|
|
#ifdef EXTRA_PARSING_SPEW
|
|
DPFX(DPFPREP, 9, "\"%hs\" does not begin with prefix \"%hs\" (subelement).",
|
|
szString,
|
|
(pSubElement->apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength));
|
|
#endif // EXTRA_PARSING_SPEW
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Namespace value is bogus, ignore it.
|
|
//
|
|
DPFX(DPFPREP, 1, "Ignoring namespace definition \"%hs\" with empty value string (subelement).",
|
|
pSubElement->apszAttributeNames[dwAttribute]);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not an XML namespace definition.
|
|
//
|
|
|
|
#ifdef EXTRA_PARSING_SPEW
|
|
DPFX(DPFPREP, 9, "Attribute \"%hs\" is not a valid namespace definition (subelement).",
|
|
pSubElement->apszAttributeNames[dwAttribute]);
|
|
#endif // EXTRA_PARSING_SPEW
|
|
}
|
|
} // end for (each attribute)
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// No subelement to check.
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// Do the same thing for the all items above this one.
|
|
//
|
|
dwStackDepth = dwElementStackDepth;
|
|
while (dwStackDepth > 0)
|
|
{
|
|
dwStackDepth--;
|
|
|
|
//
|
|
// Search each attribute
|
|
//
|
|
for(dwAttribute = 0; dwAttribute < aElementStack[dwStackDepth].dwNumAttributes; dwAttribute++)
|
|
{
|
|
//
|
|
// Work with this attribute if it's a valid XML namespace
|
|
// definition. It needs to start with the prefix, plus have one
|
|
// extra character for the actual name.
|
|
//
|
|
uiNamespaceNameLength = strlen(aElementStack[dwStackDepth].apszAttributeNames[dwAttribute]);
|
|
if ((uiNamespaceNameLength >= (uiXMLNSPrefixLength + 1)) &&
|
|
(_strnicmp(aElementStack[dwStackDepth].apszAttributeNames[dwAttribute], XML_NAMESPACEDEFINITIONPREFIX, uiXMLNSPrefixLength) == 0))
|
|
{
|
|
uiNamespaceNameLength -= uiXMLNSPrefixLength;
|
|
|
|
//
|
|
// Only work with the item's value if it's valid.
|
|
//
|
|
uiNamespaceValueLength = strlen(aElementStack[dwStackDepth].apszAttributeValues[dwAttribute]);
|
|
if (uiNamespaceValueLength > 0)
|
|
{
|
|
//
|
|
// Okay, here's an item. See if the value prefixes the
|
|
// passed in string.
|
|
//
|
|
if (_strnicmp(szString, (aElementStack[dwStackDepth].apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength), uiNamespaceNameLength) == 0)
|
|
{
|
|
DPFX(DPFPREP, 8, "\"%hs\" begins with prefix \"%hs\" (stack depth %u).",
|
|
szString,
|
|
(aElementStack[dwStackDepth].apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength),
|
|
dwStackDepth);
|
|
|
|
//
|
|
// Cast to lose the const.
|
|
//
|
|
pszResult = ((char*) szString) + uiNamespaceNameLength;
|
|
|
|
//
|
|
// Skip the colon delimiter.
|
|
//
|
|
if ((*pszResult) == ':')
|
|
{
|
|
pszResult++;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "\"%hs\" begins with prefix \"%hs\" but does not have colon separator (stack depth %u)! Continuing.",
|
|
szString,
|
|
(aElementStack[dwStackDepth].apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength),
|
|
dwStackDepth);
|
|
}
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Namespace doesn't match
|
|
//
|
|
#ifdef EXTRA_PARSING_SPEW
|
|
DPFX(DPFPREP, 9, "\"%hs\" does not begin with prefix \"%hs\" (stack depth %u).",
|
|
szString,
|
|
(aElementStack[dwStackDepth].apszAttributeNames[dwAttribute] + uiXMLNSPrefixLength),
|
|
dwStackDepth);
|
|
#endif // EXTRA_PARSING_SPEW
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Namespace value is bogus, ignore it.
|
|
//
|
|
DPFX(DPFPREP, 1, "Ignoring namespace definition \"%hs\" with empty value string (stack depth %u).",
|
|
aElementStack[dwStackDepth].apszAttributeNames[dwAttribute],
|
|
dwStackDepth);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not an XML namespace definition.
|
|
//
|
|
|
|
#ifdef EXTRA_PARSING_SPEW
|
|
DPFX(DPFPREP, 9, "Attribute \"%hs\" is not a valid namespace definition (stack depth %u).",
|
|
aElementStack[dwStackDepth].apszAttributeNames[dwAttribute],
|
|
dwStackDepth);
|
|
#endif // EXTRA_PARSING_SPEW
|
|
}
|
|
} // end for (each attribute)
|
|
}
|
|
|
|
|
|
//
|
|
// If we're here, it didn't match, even with namespace expansion.
|
|
//
|
|
|
|
DPFX(DPFPREP, 8, "\"%hs\" does not contain any namespace prefixes.",
|
|
szString);
|
|
|
|
//
|
|
// Cast to lose the const.
|
|
//
|
|
pszResult = (char*) szString;
|
|
|
|
|
|
Exit:
|
|
|
|
return pszResult;
|
|
} // CNATHelpUPnP::GetStringWithoutNamespacePrefix
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetNextChunk"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetNextChunk
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Attempts to parse the next chunk out of a message buffer.
|
|
// If invalid data is encountered, this function returns FALSE.
|
|
// If not enough data has been received to complete the chunk,
|
|
// TRUE is returned, but NULL is returned in ppszChunkData.
|
|
// Otherwise, a pointer to the start of the chunk data is placed
|
|
// in ppszChunkData, the size of the chunk is placed in
|
|
// pdwChunkSize, ppszBufferRemaining is set to the start of the
|
|
// next potential chunk, and pdwBufferSizeRemaining is set to the
|
|
// amount of the buffer remaining starting at the returned
|
|
// ppszBufferRemaining value.
|
|
//
|
|
// Note that the chunk size may be zero, in which case the
|
|
// pointer in ppszChunkData & ppszBufferRemaining will be non-
|
|
// NULL, but useless.
|
|
//
|
|
// Arguments:
|
|
// char * pszBuffer - Pointer to string containing the message
|
|
// received so far.
|
|
// DWORD dwBufferSize - Size of the message buffer.
|
|
// char ** ppszChunkData - Place to store pointer to chunk data, or
|
|
// NULL if full chunk is not available.
|
|
// DWORD * pdwChunkSize - Place to store size of chunk.
|
|
// char ** ppszBufferRemaining - Place to store pointer to end of chunk
|
|
// if full chunk is available.
|
|
// DWORD * pdwBufferSizeRemaining - Place to store size of buffer remaining
|
|
// after returned chunk.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
BOOL CNATHelpUPnP::GetNextChunk(char * const pszBuffer,
|
|
const DWORD dwBufferSize,
|
|
char ** const ppszChunkData,
|
|
DWORD * const pdwChunkSize,
|
|
char ** const ppszBufferRemaining,
|
|
DWORD * const pdwBufferSizeRemaining)
|
|
{
|
|
BOOL fReturn = TRUE;
|
|
char * pszCurrent;
|
|
char * pszEndOfBuffer;
|
|
BOOL fFoundChunkSizeEnd;
|
|
BOOL fExtensions;
|
|
BOOL fInQuotedString;
|
|
|
|
|
|
DPFX(DPFPREP, 8, "(0x%p) Parameters: (0x%p, %u, 0x%p, 0x%p, 0x%p, 0x%p)",
|
|
this, pszBuffer, dwBufferSize, ppszChunkData, pdwChunkSize,
|
|
ppszBufferRemaining, pdwBufferSizeRemaining);
|
|
|
|
|
|
pszCurrent = pszBuffer;
|
|
pszEndOfBuffer = pszCurrent + dwBufferSize;
|
|
fFoundChunkSizeEnd = FALSE;
|
|
fExtensions = FALSE;
|
|
fInQuotedString = FALSE;
|
|
(*ppszChunkData) = NULL;
|
|
(*pdwChunkSize) = 0;
|
|
|
|
|
|
//
|
|
// The buffer must be large enough to hold 1 hex digit, CR LF chunk size
|
|
// terminator, and CR LF chunk trailer.
|
|
//
|
|
if (dwBufferSize < 5)
|
|
{
|
|
DPFX(DPFPREP, 3, "Buffer is not large enough (%u bytes) to hold one valid chunk.",
|
|
dwBufferSize);
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// Be paranoid to make sure we're not going to having wrap problems.
|
|
//
|
|
if (pszEndOfBuffer < pszCurrent)
|
|
{
|
|
DPFX(DPFPREP, 0, "Buffer pointer 0x%p cannot have size %u!",
|
|
pszBuffer, dwBufferSize);
|
|
goto Failure;
|
|
}
|
|
|
|
while (pszCurrent < pszEndOfBuffer)
|
|
{
|
|
//
|
|
// Make sure we have a valid hex chunk size string and convert it
|
|
// as we go.
|
|
//
|
|
if (((*pszCurrent) >= '0') && ((*pszCurrent) <= '9'))
|
|
{
|
|
(*pdwChunkSize) = ((*pdwChunkSize) * 16) + ((*pszCurrent) - '0');
|
|
}
|
|
else if (((*pszCurrent) >= 'a') && ((*pszCurrent) <= 'f'))
|
|
{
|
|
(*pdwChunkSize) = ((*pdwChunkSize) * 16) + ((*pszCurrent) - 'a' + 10);
|
|
}
|
|
else if (((*pszCurrent) >= 'A') && ((*pszCurrent) <= 'F'))
|
|
{
|
|
(*pdwChunkSize) = ((*pdwChunkSize) * 16) + ((*pszCurrent) - 'A' + 10);
|
|
}
|
|
else if ((*pszCurrent) == '\r')
|
|
{
|
|
//
|
|
// This should be the end of the chunk size string.
|
|
//
|
|
fFoundChunkSizeEnd = TRUE;
|
|
break;
|
|
}
|
|
else if ((*pszCurrent) == ';')
|
|
{
|
|
//
|
|
// This should be the end of the chunk size string, and the
|
|
// beginning of extensions. Loop until we find the true end.
|
|
//
|
|
while ((*pszCurrent) != '\r')
|
|
{
|
|
pszCurrent++;
|
|
if (pszCurrent >= pszEndOfBuffer)
|
|
{
|
|
DPFX(DPFPREP, 5, "Buffer stops in middle of chunk extension.");
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// We do not support quoted extension value strings that
|
|
// theoretically contain CR characters...
|
|
//
|
|
}
|
|
|
|
fFoundChunkSizeEnd = TRUE;
|
|
break;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// There's a bogus character. This can't be a validly encoded
|
|
// message.
|
|
//
|
|
DPFX(DPFPREP, 1, "Chunk size string contains invalid character 0x%x at offset %u!",
|
|
(*pszCurrent), (DWORD_PTR) (pszCurrent - pszBuffer));
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Validate the chunk size we have so far.
|
|
//
|
|
if ((*pdwChunkSize) > MAX_RECEIVE_BUFFER_SIZE)
|
|
{
|
|
DPFX(DPFPREP, 1, "Chunk size %u is too large!",
|
|
(*pdwChunkSize));
|
|
goto Failure;
|
|
}
|
|
|
|
pszCurrent++;
|
|
}
|
|
|
|
//
|
|
// If we're here, see if we found the end of the chunk size string.
|
|
// Make sure we've received enough data, and then validate that the CR
|
|
// stopping character is followed by the LF character.
|
|
//
|
|
if (fFoundChunkSizeEnd)
|
|
{
|
|
pszCurrent++;
|
|
if (pszCurrent < pszEndOfBuffer)
|
|
{
|
|
if ((*pszCurrent) != '\n')
|
|
{
|
|
DPFX(DPFPREP, 1, "Chunk size string did not end with CRLF sequence (offset %u)!",
|
|
(DWORD_PTR) (pszCurrent - pszBuffer));
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Otherwise we got a complete chunk size string.
|
|
//
|
|
pszCurrent++;
|
|
|
|
//
|
|
// If we have received all of the chunk already, make sure we have
|
|
// the trailing CR LF sequence before returning the pointer to the
|
|
// caller.
|
|
if (((*pdwChunkSize) + 2) <= ((DWORD_PTR) (pszEndOfBuffer - pszCurrent)))
|
|
{
|
|
if ((*(pszCurrent + (*pdwChunkSize)) != '\r') ||
|
|
(*(pszCurrent + (*pdwChunkSize) + 1) != '\n'))
|
|
{
|
|
DPFX(DPFPREP, 1, "Chunk data did not end with CRLF sequence (offset %u)!",
|
|
(DWORD_PTR) (pszCurrent - pszBuffer + (*pdwChunkSize)));
|
|
goto Failure;
|
|
}
|
|
|
|
//
|
|
// Return the data pointers to the caller. In the case of the
|
|
// zero size terminating chunk, the ppszChunkData pointer will
|
|
// actually be useless, but the caller should recognize that.
|
|
//
|
|
(*ppszChunkData) = pszCurrent;
|
|
(*ppszBufferRemaining) = pszCurrent + ((*pdwChunkSize) + 2);
|
|
(*pdwBufferSizeRemaining) = (DWORD) ((DWORD_PTR) (pszEndOfBuffer - (*ppszBufferRemaining)));
|
|
}
|
|
}
|
|
}
|
|
|
|
//
|
|
// If we're here, we didn't encounter invalid data.
|
|
//
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 8, "(0x%p) Returning: [%i]", this, fReturn);
|
|
|
|
return fReturn;
|
|
|
|
|
|
Failure:
|
|
|
|
fReturn = FALSE;
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::GetNextChunk
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ParseXMLCallback_DescriptionResponse"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ParseXMLCallback_DescriptionResponse
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Handles a completed parsed element in the description response
|
|
// XML.
|
|
//
|
|
// Arguments:
|
|
// PARSEXML_ELEMENT * pParseElement - Pointer to element which was found.
|
|
// PVOID pvContext - Pointer to parsing context.
|
|
// PARSEXML_STACKENTRY * aElementStack - Array of parent elements containing
|
|
// the completed element.
|
|
// BOOL * pfContinueParsing - Pointer to BOOL that should be set
|
|
// to FALSE if the calling function
|
|
// should stop parsing the XML.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Description response was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::ParseXMLCallback_DescriptionResponse(PARSEXML_ELEMENT * const pParseElement,
|
|
PVOID pvContext,
|
|
PARSEXML_STACKENTRY * const aElementStack,
|
|
BOOL * const pfContinueParsing)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CUPnPDevice * pUPnPDevice;
|
|
char * pszServiceType = NULL;
|
|
char * pszServiceId = NULL;
|
|
char * pszControlURL = NULL;
|
|
DWORD dwSubElement;
|
|
PARSEXML_SUBELEMENT * pSubElement;
|
|
SOCKADDR_IN saddrinControl;
|
|
SOCKADDR_IN * psaddrinHost;
|
|
char * pszRelativePath;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, 0x%p)",
|
|
this, pParseElement, pvContext, aElementStack, pfContinueParsing);
|
|
|
|
|
|
pUPnPDevice = (CUPnPDevice *) pvContext;
|
|
|
|
|
|
DNASSERT(pUPnPDevice != NULL);
|
|
DNASSERT(pParseElement->papszElementStack == (char **) (&c_szElementStack_service));
|
|
|
|
|
|
//
|
|
// Look for the subelements we want.
|
|
//
|
|
for(dwSubElement = 0; dwSubElement < pParseElement->dwNumSubElements; dwSubElement++)
|
|
{
|
|
pSubElement = &pParseElement->paSubElements[dwSubElement];
|
|
|
|
if (_stricmp(pSubElement->pszNameFound, XML_DEVICEDESCRIPTION_SERVICETYPE) == 0)
|
|
{
|
|
if (pszServiceType == NULL)
|
|
{
|
|
pszServiceType = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" XML_DEVICEDESCRIPTION_SERVICETYPE "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (_stricmp(pSubElement->pszNameFound, XML_DEVICEDESCRIPTION_SERVICEID) == 0)
|
|
{
|
|
if (pszServiceId == NULL)
|
|
{
|
|
pszServiceId = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" XML_DEVICEDESCRIPTION_SERVICEID "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (_stricmp(pSubElement->pszNameFound, XML_DEVICEDESCRIPTION_CONTROLURL) == 0)
|
|
{
|
|
if (pszControlURL == NULL)
|
|
{
|
|
pszControlURL = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" XML_DEVICEDESCRIPTION_CONTROLURL "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring subelement \"%hs\" (value = \"%hs\").",
|
|
pSubElement->pszNameFound, pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// If one of those elements was not specified, then this element is not
|
|
// helpful.
|
|
//
|
|
if ((pszServiceType == NULL) || (pszServiceId == NULL) || (pszControlURL == NULL))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't find either \"" XML_DEVICEDESCRIPTION_SERVICETYPE "\", \"" XML_DEVICEDESCRIPTION_SERVICEID "\", or \"" XML_DEVICEDESCRIPTION_CONTROLURL "\" in XML description, ignoring element.");
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// If the service type is not one of the ones we want, ignore the element.
|
|
//
|
|
if (_stricmp(pszServiceType, URI_SERVICE_WANIPCONNECTION_A) == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Found \"" URI_SERVICE_WANIPCONNECTION_A "\".");
|
|
|
|
DNASSERT(! pUPnPDevice->IsWANPPPConnection());
|
|
}
|
|
else if (_stricmp(pszServiceType, URI_SERVICE_WANPPPCONNECTION_A) == 0)
|
|
{
|
|
DPFX(DPFPREP, 7, "Found \"" URI_SERVICE_WANPPPCONNECTION_A "\".");
|
|
|
|
pUPnPDevice->NoteWANPPPConnection();
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Ignoring unknown service type \"%hs\".", pszServiceType);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
pParseElement->fFoundMatchingElement = TRUE;
|
|
(*pfContinueParsing) = FALSE;
|
|
|
|
|
|
|
|
//
|
|
// Validate and store the service control URL.
|
|
//
|
|
|
|
hr = this->GetAddressFromURL(pszControlURL,
|
|
&saddrinControl,
|
|
&pszRelativePath);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
psaddrinHost = pUPnPDevice->GetHostAddress();
|
|
|
|
DPFX(DPFPREP, 1, "No control address in URL, using host address %u.%u.%u.%u:%u and full URL as relative path (\"%hs\").",
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinHost->sin_port),
|
|
pszControlURL);
|
|
|
|
memcpy(&saddrinControl, psaddrinHost, sizeof(SOCKADDR_IN));
|
|
pszRelativePath = pszControlURL;
|
|
}
|
|
else
|
|
{
|
|
#if 0
|
|
//
|
|
// Ensure that the address to use is local. It doesn't make sense that
|
|
// in order to make mappings for our private network we would need to
|
|
// contact something outside.
|
|
//
|
|
if (! this->IsAddressLocal(pUPnPDevice->GetOwningDevice(), &saddrinControl))
|
|
{
|
|
DPFX(DPFPREP, 1, "Control address designated (%u.%u.%u.%u:%u) is not local, ignoring message.",
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinControl.sin_port));
|
|
goto Exit;
|
|
}
|
|
#else
|
|
psaddrinHost = pUPnPDevice->GetHostAddress();
|
|
|
|
//
|
|
// Don't accept responses that refer to addresses other than the one
|
|
// that sent this response.
|
|
//
|
|
if (saddrinControl.sin_addr.S_un.S_addr != psaddrinHost->sin_addr.S_un.S_addr)
|
|
{
|
|
DPFX(DPFPREP, 1, "Control IP address designated (%u.%u.%u.%u:%u) is not the same as host IP address (%u.%u.%u.%u:%u), ignoring message.",
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b1,
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b2,
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b3,
|
|
saddrinControl.sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(saddrinControl.sin_port),
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinHost->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(psaddrinHost->sin_port));
|
|
goto Exit;
|
|
}
|
|
#endif
|
|
|
|
//
|
|
// Don't accept responses that refer to ports in the reserved range
|
|
// (less than or equal to 1024) other than the standard HTTP port.
|
|
//
|
|
if ((NTOHS(saddrinControl.sin_port) <= MAX_RESERVED_PORT) &&
|
|
(saddrinControl.sin_port != HTONS(HTTP_PORT)))
|
|
{
|
|
DPFX(DPFPREP, 1, "Control address designated invalid port %u, ignoring message.",
|
|
NTOHS(saddrinControl.sin_port));
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
pUPnPDevice->SetControlAddress(&saddrinControl);
|
|
|
|
|
|
//
|
|
// Save the service control URL.
|
|
//
|
|
hr = pUPnPDevice->SetServiceControlURL(pszRelativePath);
|
|
if (hr != DPNH_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't store service control URL!");
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
hr = DPNHERR_GENERIC;
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::ParseXMLCallback_DescriptionResponse
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ParseXMLCallback_ControlResponse"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ParseXMLCallback_ControlResponse
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Handles a completed parsed element in a control SOAP response.
|
|
//
|
|
// Arguments:
|
|
// PARSEXML_ELEMENT * pParseElement - Pointer to element which was found.
|
|
// PVOID pvContext - Pointer to parsing context.
|
|
// PARSEXML_STACKENTRY * aElementStack - Array of parent elements containing
|
|
// the completed element.
|
|
// BOOL * pfContinueParsing - Pointer to BOOL that should be set
|
|
// to FALSE if the calling function
|
|
// should stop parsing the XML.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - Description response was handled successfully.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::ParseXMLCallback_ControlResponse(PARSEXML_ELEMENT * const pParseElement,
|
|
PVOID pvContext,
|
|
PARSEXML_STACKENTRY * const aElementStack,
|
|
BOOL * const pfContinueParsing)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
PCONTROLRESPONSEPARSECONTEXT pContext;
|
|
//char * pszReturn = NULL;
|
|
char * pszExternalIPAddress = NULL;
|
|
char * pszInternalPort = NULL;
|
|
char * pszInternalClient = NULL;
|
|
char * pszEnabled = NULL;
|
|
char * pszPortMappingDescription = NULL;
|
|
char * pszLeaseDuration = NULL;
|
|
char * pszErrorCode = NULL;
|
|
char * pszErrorDescription = NULL;
|
|
DWORD dwSubElement;
|
|
PARSEXML_SUBELEMENT * pSubElement;
|
|
int iErrorCode;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, 0x%p, 0x%p, 0x%p)",
|
|
this, pParseElement, pvContext, aElementStack, pfContinueParsing);
|
|
|
|
|
|
pContext = (PCONTROLRESPONSEPARSECONTEXT) pvContext;
|
|
|
|
|
|
DNASSERT(pContext != NULL);
|
|
DNASSERT(pContext->pUPnPDevice != NULL);
|
|
|
|
|
|
//
|
|
// Look for the subelements we want.
|
|
//
|
|
for(dwSubElement = 0; dwSubElement < pParseElement->dwNumSubElements; dwSubElement++)
|
|
{
|
|
pSubElement = &pParseElement->paSubElements[dwSubElement];
|
|
|
|
|
|
/*
|
|
if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_CONTROL_RETURN_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszReturn == NULL)
|
|
{
|
|
pszReturn = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_CONTROL_RETURN_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
*/
|
|
if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_GETEXTERNALIPADDRESS_NEWEXTERNALIPADDRESS_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszExternalIPAddress == NULL)
|
|
{
|
|
pszExternalIPAddress = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_GETEXTERNALIPADDRESS_NEWEXTERNALIPADDRESS_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_GETSPECIFICPORTMAPPINGENTRY_NEWINTERNALPORT_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszInternalPort == NULL)
|
|
{
|
|
pszInternalPort = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWINTERNALPORT_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_GETSPECIFICPORTMAPPINGENTRY_NEWINTERNALCLIENT_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszInternalClient == NULL)
|
|
{
|
|
pszInternalClient = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWINTERNALCLIENT_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_GETSPECIFICPORTMAPPINGENTRY_NEWENABLED_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszEnabled == NULL)
|
|
{
|
|
pszEnabled = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWENABLED_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_GETSPECIFICPORTMAPPINGENTRY_NEWPORTMAPPINGDESCRIPTION_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszPortMappingDescription == NULL)
|
|
{
|
|
pszPortMappingDescription = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWPORTMAPPINGDESCRIPTION_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_GETSPECIFICPORTMAPPINGENTRY_NEWLEASEDURATION_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszLeaseDuration == NULL)
|
|
{
|
|
pszLeaseDuration = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWLEASEDURATION_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_CONTROL_ERROR_ERRORCODE_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszErrorCode == NULL)
|
|
{
|
|
pszErrorCode = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_CONTROL_ERROR_ERRORCODE_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else if (this->MatchesXMLStringWithoutNamespace(pSubElement->pszNameFound,
|
|
ARG_CONTROL_ERROR_ERRORDESCRIPTION_A,
|
|
aElementStack,
|
|
pSubElement,
|
|
pParseElement->dwElementStackDepth))
|
|
{
|
|
if (pszErrorDescription == NULL)
|
|
{
|
|
pszErrorDescription = pSubElement->pszValueFound;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring duplicate \"" ARG_CONTROL_ERROR_ERRORDESCRIPTION_A "\" subelement (value = \"%hs\").",
|
|
pSubElement->pszValueFound);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Ignoring subelement \"%hs\" (value = \"%hs\").",
|
|
pSubElement->pszNameFound, pSubElement->pszValueFound);
|
|
}
|
|
} // end for (each sub element)
|
|
|
|
|
|
if (pContext->dwHTTPResponseCode == 200)
|
|
{
|
|
//
|
|
// The action succeeded.
|
|
//
|
|
|
|
switch (pContext->ControlResponseType)
|
|
{
|
|
/*
|
|
case CONTROLRESPONSETYPE_QUERYSTATEVARIABLE_EXTERNALIPADDRESS:
|
|
{
|
|
if (pszReturn == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't find \"" ARG_CONTROL_RETURN_A "\" in SOAP response, ignoring element.");
|
|
goto Exit;
|
|
}
|
|
|
|
DPFX(DPFPREP, 2, "QueryStateVariable returned \"%hs\".",
|
|
pszReturn);
|
|
|
|
|
|
/ *
|
|
//
|
|
// Key off of the variable we were querying.
|
|
//
|
|
switch (pContext->ControlResponseType)
|
|
{
|
|
case CONTROLRESPONSETYPE_QUERYSTATEVARIABLE_EXTERNALIPADDRESS:
|
|
{
|
|
* /
|
|
pContext->pControlResponseInfo->dwExternalIPAddressV4 = this->m_pfninet_addr(pszReturn);
|
|
if (pContext->pControlResponseInfo->dwExternalIPAddressV4 == INADDR_NONE)
|
|
{
|
|
DPFX(DPFPREP, 1, "External IP address string \"%hs\" is invalid, using INADDR_ANY.");
|
|
pContext->pControlResponseInfo->dwExternalIPAddressV4 = INADDR_ANY;
|
|
}
|
|
/ *
|
|
break;
|
|
}
|
|
}
|
|
* /
|
|
|
|
break;
|
|
}
|
|
*/
|
|
case CONTROLRESPONSETYPE_GETEXTERNALIPADDRESS:
|
|
{
|
|
if (pszExternalIPAddress == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't find \"" ARG_GETEXTERNALIPADDRESS_NEWEXTERNALIPADDRESS_A "\" in SOAP response, ignoring element.");
|
|
goto Exit;
|
|
}
|
|
|
|
DPFX(DPFPREP, 2, "GetExternalIPAddress returned \"%hs\".",
|
|
pszExternalIPAddress);
|
|
|
|
|
|
pContext->pControlResponseInfo->dwExternalIPAddressV4 = this->m_pfninet_addr(pszExternalIPAddress);
|
|
if ((pContext->pControlResponseInfo->dwExternalIPAddressV4 == INADDR_NONE) ||
|
|
(IS_CLASSD_IPV4_ADDRESS(pContext->pControlResponseInfo->dwExternalIPAddressV4)))
|
|
{
|
|
DPFX(DPFPREP, 1, "External IP address string \"%hs\" is invalid, using INADDR_ANY.");
|
|
pContext->pControlResponseInfo->dwExternalIPAddressV4 = INADDR_ANY;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
case CONTROLRESPONSETYPE_ADDPORTMAPPING:
|
|
{
|
|
DPFX(DPFPREP, 2, "AddPortMapping got success response.");
|
|
break;
|
|
}
|
|
|
|
case CONTROLRESPONSETYPE_GETSPECIFICPORTMAPPINGENTRY:
|
|
{
|
|
/*
|
|
if ((pszInternalPort == NULL) ||
|
|
(pszInternalClient == NULL) ||
|
|
(pszEnabled == NULL) ||
|
|
(pszPortMappingDescription == NULL) ||
|
|
(pszLeaseDuration == NULL))
|
|
*/
|
|
if (pszInternalClient == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't find \"" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWINTERNALCLIENT_A "\" in SOAP response, ignoring element.");
|
|
goto Exit;
|
|
}
|
|
|
|
if (pszInternalPort == NULL)
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't find \"" ARG_GETSPECIFICPORTMAPPINGENTRY_NEWINTERNALPORT_A "\" in SOAP response, assuming asymmetric mappings are not supported.");
|
|
pszInternalPort = "0";
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 2, "GetPortMappingPrivateIP returned \"%hs:%hs\".",
|
|
pszInternalClient, pszInternalPort);
|
|
|
|
pContext->pControlResponseInfo->dwInternalClientV4 = this->m_pfninet_addr(pszInternalClient);
|
|
if (pContext->pControlResponseInfo->dwInternalClientV4 == INADDR_ANY)
|
|
{
|
|
DPFX(DPFPREP, 0, "Internal client address is INADDR_ANY!");
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
pContext->pControlResponseInfo->wInternalPort = HTONS((WORD) atoi(pszInternalPort));
|
|
|
|
break;
|
|
}
|
|
|
|
case CONTROLRESPONSETYPE_DELETEPORTMAPPING:
|
|
{
|
|
DPFX(DPFPREP, 2, "DeletePortMapping got success response.");
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DNASSERT(FALSE);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// The action completed successfully.
|
|
//
|
|
pContext->pControlResponseInfo->hrErrorCode = DPNH_OK;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// The action failed.
|
|
//
|
|
|
|
//
|
|
// See if we found an error description that we can print for
|
|
// informational purposes.
|
|
//
|
|
if ((pszErrorCode != NULL) && (pszErrorDescription != NULL))
|
|
{
|
|
iErrorCode = atoi(pszErrorCode);
|
|
|
|
switch (iErrorCode)
|
|
{
|
|
case UPNPERR_IGD_NOSUCHENTRYINARRAY:
|
|
{
|
|
DPFX(DPFPREP, 1, "Control action was rejected with NoSuchEntryInArray error %hs (description = \"%hs\").",
|
|
pszErrorCode, pszErrorDescription);
|
|
|
|
pContext->pControlResponseInfo->hrErrorCode = DPNHERR_NOMAPPING;
|
|
break;
|
|
}
|
|
|
|
case UPNPERR_IGD_CONFLICTINMAPPINGENTRY:
|
|
{
|
|
DPFX(DPFPREP, 1, "Control action was rejected with ConflictInMappingEntry error %hs (description = \"%hs\").",
|
|
pszErrorCode, pszErrorDescription);
|
|
|
|
pContext->pControlResponseInfo->hrErrorCode = DPNHERR_PORTUNAVAILABLE;
|
|
break;
|
|
}
|
|
|
|
case UPNPERR_IGD_SAMEPORTVALUESREQUIRED:
|
|
{
|
|
DPFX(DPFPREP, 1, "Control action was rejected with SamePortValuesRequired error %hs (description = \"%hs\").",
|
|
pszErrorCode, pszErrorDescription);
|
|
|
|
pContext->pControlResponseInfo->hrErrorCode = (HRESULT) UPNPERR_IGD_SAMEPORTVALUESREQUIRED;
|
|
break;
|
|
}
|
|
|
|
case UPNPERR_IGD_ONLYPERMANENTLEASESSUPPORTED:
|
|
{
|
|
DPFX(DPFPREP, 1, "Control action was rejected with OnlyPermanentLeasesSupported error %hs (description = \"%hs\").",
|
|
pszErrorCode, pszErrorDescription);
|
|
|
|
pContext->pControlResponseInfo->hrErrorCode = (HRESULT) UPNPERR_IGD_ONLYPERMANENTLEASESSUPPORTED;
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
DPFX(DPFPREP, 1, "Control action was rejected with unknown error \"%hs\", \"%hs\", assuming generic failure.",
|
|
pszErrorCode, pszErrorDescription);
|
|
|
|
pContext->pControlResponseInfo->hrErrorCode = DPNHERR_GENERIC;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't find either \"" ARG_CONTROL_ERROR_ERRORCODE_A "\", or \"" ARG_CONTROL_ERROR_ERRORDESCRIPTION_A "\" in SOAP response, assuming generic failure.");
|
|
pContext->pControlResponseInfo->hrErrorCode = DPNHERR_GENERIC;
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// If we got here, we got the information we needed.
|
|
//
|
|
pParseElement->fFoundMatchingElement = TRUE;
|
|
(*pfContinueParsing) = FALSE;
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::ParseXMLCallback_ControlResponse
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ClearDevicesUPnPDevice"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ClearDevicesUPnPDevice
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Forcefully simulates de-registration with a UPnP device
|
|
/// without actually going to the network. This clears all bind
|
|
// IDs, public addresses, and cached mappings for a given device's
|
|
// local or remote server, and should only be called after the
|
|
// server appears to have died.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device whose UPnP device should be
|
|
// removed.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::ClearDevicesUPnPDevice(CDevice * const pDevice)
|
|
{
|
|
CUPnPDevice * pUPnPDevice;
|
|
|
|
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
#ifdef DBG
|
|
DPFX(DPFPREP, 1, "Clearing device 0x%p's UPnP device (0x%p).",
|
|
pDevice, pUPnPDevice);
|
|
|
|
pDevice->IncrementUPnPDeviceFailures();
|
|
this->m_dwNumServerFailures++;
|
|
#endif // DBG
|
|
|
|
//
|
|
// Since there was a change in the network, go back to polling
|
|
// relatively quickly.
|
|
//
|
|
this->ResetNextPollInterval();
|
|
|
|
|
|
pUPnPDevice->ClearDeviceOwner();
|
|
DNASSERT(pUPnPDevice->m_blList.IsListMember(&this->m_blUPnPDevices));
|
|
pUPnPDevice->m_blList.RemoveFromList();
|
|
|
|
//
|
|
// Transfer list reference to our pointer, since GetUPnPDevice did not give
|
|
// us one.
|
|
//
|
|
|
|
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
DNASSERT(pUPnPDevice->GetControlSocket() != INVALID_SOCKET);
|
|
|
|
this->m_pfnshutdown(pUPnPDevice->GetControlSocket(), 0); // ignore error
|
|
this->m_pfnclosesocket(pUPnPDevice->GetControlSocket());
|
|
pUPnPDevice->SetControlSocket(INVALID_SOCKET);
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(pUPnPDevice->GetControlSocket() == INVALID_SOCKET);
|
|
}
|
|
|
|
|
|
this->ClearAllUPnPRegisteredPorts(pDevice);
|
|
|
|
pUPnPDevice->ClearLocationURL();
|
|
pUPnPDevice->ClearUSN();
|
|
pUPnPDevice->ClearServiceControlURL();
|
|
pUPnPDevice->DestroyReceiveBuffer();
|
|
pUPnPDevice->RemoveAllCachedMappings();
|
|
|
|
pUPnPDevice->DecRef();
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Can't clear device 0x%p's UPnP device, it doesn't exist.",
|
|
pDevice);
|
|
}
|
|
} // CNATHelpUPnP::ClearDevicesUPnPDevice
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ClearAllUPnPRegisteredPorts"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ClearAllUPnPRegisteredPorts
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Clears all bind IDs and public addresses for a given
|
|
// device's UPnP Internet gateway. This should only be called
|
|
// after the UPnP device dies.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device whose ports should be unbound.
|
|
// BOOL fRemote - TRUE if clearing remote server, FALSE if clearing
|
|
// local server.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::ClearAllUPnPRegisteredPorts(CDevice * const pDevice)
|
|
{
|
|
CBilink * pBilink;
|
|
CRegisteredPort * pRegisteredPort;
|
|
|
|
|
|
DNASSERT(pDevice != NULL);
|
|
|
|
|
|
pBilink = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilink != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilink->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilink);
|
|
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
if (! pRegisteredPort->IsRemovingUPnPLease())
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p losing UPnP public address.",
|
|
pRegisteredPort);
|
|
|
|
//
|
|
// Let the user know the next time GetCaps is called.
|
|
//
|
|
this->m_dwFlags |= NATHELPUPNPOBJ_ADDRESSESCHANGED;
|
|
|
|
|
|
//
|
|
// Note that this means the crash recovery entry will be left
|
|
// in the registry for the next person to come along and clean
|
|
// up. That should be okay, since we should only be doing this
|
|
// if we had a problem talking to the UPnP device (either it
|
|
// went AWOL, or we lost the local network interface). In
|
|
// either case, we can't really clean it up now, so we have to
|
|
// leave it for someone else to do.
|
|
//
|
|
|
|
pRegisteredPort->DestroyUPnPPublicAddressesArray();
|
|
pRegisteredPort->NoteNotPermanentUPnPLease();
|
|
|
|
DNASSERT(this->m_dwNumLeases > 0);
|
|
this->m_dwNumLeases--;
|
|
|
|
DPFX(DPFPREP, 7, "UPnP lease for 0x%p cleared, total num leases = %u.",
|
|
pRegisteredPort, this->m_dwNumLeases);
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 1, "Registered port 0x%p already has had UPnP public address removed, skipping.",
|
|
pRegisteredPort);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Port no longer unavailable (if it had been).
|
|
//
|
|
pRegisteredPort->NoteNotUPnPPortUnavailable();
|
|
}
|
|
|
|
pBilink = pBilink->GetNext();
|
|
}
|
|
} // CNATHelpUPnP::ClearAllUPnPRegisteredPorts
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::RequestLocalAddressListChangeNotification"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::RequestLocalAddressListChangeNotification
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Attempts to request asynchronous notification (via the
|
|
// user's alert event or I/O completion port) when the local
|
|
// address list changes.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: HRESULT
|
|
// DPNH_OK - The notification request was successfully submitted.
|
|
// DPNHERR_GENERIC - An error occurred.
|
|
//=============================================================================
|
|
HRESULT CNATHelpUPnP::RequestLocalAddressListChangeNotification(void)
|
|
{
|
|
HRESULT hr;
|
|
DWORD dwTemp;
|
|
int iReturn;
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Enter", this);
|
|
|
|
|
|
DNASSERT(! (this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1));
|
|
DNASSERT(this->m_sIoctls != INVALID_SOCKET);
|
|
DNASSERT(this->m_pfnWSAIoctl != NULL);
|
|
DNASSERT((this->m_hAlertEvent != NULL) || (this->m_hAlertIOCompletionPort != NULL));
|
|
DNASSERT(this->m_polAddressListChange != NULL);
|
|
|
|
|
|
do
|
|
{
|
|
iReturn = this->m_pfnWSAIoctl(this->m_sIoctls, // use the special Ioctl socket
|
|
SIO_ADDRESS_LIST_CHANGE, //
|
|
NULL, // no input data
|
|
0, // no input data
|
|
NULL, // no output data
|
|
0, // no output data
|
|
&dwTemp, // ignore bytes returned
|
|
this->m_polAddressListChange, // overlapped structure
|
|
NULL); // no completion routine
|
|
|
|
if (iReturn != 0)
|
|
{
|
|
dwTemp = this->m_pfnWSAGetLastError();
|
|
if (dwTemp != WSA_IO_PENDING)
|
|
{
|
|
DPFX(DPFPREP, 0, "Submitting address list change notification request failed (err = %u)!", dwTemp);
|
|
hr = DPNHERR_GENERIC;
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Pending is what we want, we're set.
|
|
//
|
|
hr = DPNH_OK;
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Address list changed right away?
|
|
//
|
|
DPFX(DPFPREP, 1, "Address list changed right away somehow, submitting again.");
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%lx]", this, hr);
|
|
|
|
return hr;
|
|
|
|
|
|
Failure:
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::RequestLocalAddressListChangeNotification
|
|
|
|
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::CreateSocket"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::CreateSocket
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Creates a UPnP discovery socket bound to a new random port
|
|
// on the specified IP interface. Completely random (but non-
|
|
// reserved) port numbers are chosen first, but if those ports are
|
|
// in use, WinSock is allowed to choose. The port actually
|
|
// selected will be returned in psaddrinAddress.
|
|
//
|
|
// Arguments:
|
|
// SOCKADDR_IN * psaddrinAddress - Pointer to base address to use when
|
|
// binding. The port will be modified.
|
|
//
|
|
// Returns: SOCKET
|
|
//=============================================================================
|
|
SOCKET CNATHelpUPnP::CreateSocket(SOCKADDR_IN * const psaddrinAddress,
|
|
int iType,
|
|
int iProtocol)
|
|
{
|
|
SOCKET sTemp;
|
|
DWORD dwTry;
|
|
int iTemp;
|
|
BOOL fTemp;
|
|
ULONG ulEnable;
|
|
#ifdef DBG
|
|
DWORD dwError;
|
|
#endif // DBG
|
|
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Parameters: (0x%p, %i, %i)",
|
|
this, psaddrinAddress, iType, iProtocol);
|
|
|
|
|
|
//
|
|
// Create the socket.
|
|
//
|
|
sTemp = this->m_pfnsocket(AF_INET, iType, iProtocol);
|
|
if (sTemp == INVALID_SOCKET)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't create datagram socket, error = %u!", dwError);
|
|
#endif // DBG
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Try binding the socket to a completely random port a few times.
|
|
//
|
|
for(dwTry = 0; dwTry < MAX_NUM_RANDOM_PORT_TRIES; dwTry++)
|
|
{
|
|
//
|
|
// Pick a completely random port. For the moment, the value is stored
|
|
// in host byte order while we make sure it's not a reserved value.
|
|
//
|
|
do
|
|
{
|
|
psaddrinAddress->sin_port = (WORD) GetGlobalRand();
|
|
}
|
|
while ((psaddrinAddress->sin_port <= MAX_RESERVED_PORT) ||
|
|
(psaddrinAddress->sin_port == 1900) || // SSDP
|
|
(psaddrinAddress->sin_port == 2234) || // PAST
|
|
(psaddrinAddress->sin_port == 6073) || // DPNSVR
|
|
(psaddrinAddress->sin_port == 47624)); // DPLAYSVR
|
|
|
|
//
|
|
// Now try binding to the port (in network byte order).
|
|
//
|
|
psaddrinAddress->sin_port = HTONS(psaddrinAddress->sin_port);
|
|
if (this->m_pfnbind(sTemp, (SOCKADDR*) psaddrinAddress, sizeof(SOCKADDR_IN)) == 0)
|
|
{
|
|
//
|
|
// We successfully bound to the port.
|
|
//
|
|
break;
|
|
}
|
|
|
|
//
|
|
// Assume that the port is in use.
|
|
//
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 2, "Couldn't bind to port %u (err = %u), continuing.",
|
|
NTOHS(psaddrinAddress->sin_port), dwError);
|
|
#endif // DBG
|
|
|
|
psaddrinAddress->sin_port = 0;
|
|
}
|
|
|
|
|
|
//
|
|
// If we ran out of completely random port attempts, just let WinSock
|
|
// choose it.
|
|
//
|
|
if (psaddrinAddress->sin_port == 0)
|
|
{
|
|
if (this->m_pfnbind(sTemp, (SOCKADDR*) psaddrinAddress, sizeof(SOCKADDR_IN)) != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Failed binding to any port (err = %u)!",
|
|
dwError);
|
|
#endif // DBG
|
|
goto Failure;
|
|
}
|
|
|
|
|
|
//
|
|
// Find out what port WinSock chose.
|
|
//
|
|
iTemp = sizeof(SOCKADDR_IN);
|
|
if (this->m_pfngetsockname(sTemp,
|
|
(SOCKADDR *) psaddrinAddress,
|
|
&iTemp) != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't get the socket's address, error = %u!",
|
|
dwError);
|
|
#endif // DBG
|
|
goto Failure;
|
|
}
|
|
DNASSERT(psaddrinAddress->sin_port != 0);
|
|
}
|
|
|
|
|
|
//
|
|
// Set the unicast TTL, if requested. Use the appropriate constant for the
|
|
// version of WinSock we're using.
|
|
//
|
|
if (g_iUnicastTTL != 0)
|
|
{
|
|
iTemp = this->m_pfnsetsockopt(sTemp,
|
|
IPPROTO_IP,
|
|
#ifdef DPNBUILD_NOWINSOCK2
|
|
IP_TTL,
|
|
#else // ! DPNBUILD_NOWINSOCK2
|
|
((this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1) ? IP_TTL_WINSOCK1 : IP_TTL),
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
(char *) (&g_iUnicastTTL),
|
|
sizeof(g_iUnicastTTL));
|
|
if (iTemp != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't set unicast TTL socket option, error = %u! Ignoring.",
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
}
|
|
}
|
|
|
|
|
|
if (iType == SOCK_DGRAM)
|
|
{
|
|
if (g_fUseMulticastUPnPDiscovery)
|
|
{
|
|
//
|
|
// Set the multicast interface. Use the appropriate constant for
|
|
// the version of WinSock we're using.
|
|
//
|
|
iTemp = this->m_pfnsetsockopt(sTemp,
|
|
IPPROTO_IP,
|
|
#ifdef DPNBUILD_NOWINSOCK2
|
|
IP_MULTICAST_IF,
|
|
#else // ! DPNBUILD_NOWINSOCK2
|
|
((this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1) ? IP_MULTICAST_IF_WINSOCK1 : IP_MULTICAST_IF),
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
(char *) (&psaddrinAddress->sin_addr.S_un.S_addr),
|
|
sizeof(psaddrinAddress->sin_addr.S_un.S_addr));
|
|
if (iTemp != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 1, "Couldn't set multicast interface socket option, error = %u, ignoring.",
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
}
|
|
|
|
|
|
//
|
|
// Set the multicast TTL, if requested. Use the appropriate
|
|
// constant for the version of WinSock we're using.
|
|
//
|
|
if (g_iMulticastTTL != 0)
|
|
{
|
|
iTemp = this->m_pfnsetsockopt(sTemp,
|
|
IPPROTO_IP,
|
|
#ifdef DPNBUILD_NOWINSOCK2
|
|
IP_MULTICAST_TTL,
|
|
#else // ! DPNBUILD_NOWINSOCK2
|
|
((this->m_dwFlags & NATHELPUPNPOBJ_WINSOCK1) ? IP_MULTICAST_TTL_WINSOCK1 : IP_MULTICAST_TTL),
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
(char *) (&g_iMulticastTTL),
|
|
sizeof(g_iMulticastTTL));
|
|
if (iTemp != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't set multicast TTL socket option, error = %u! Ignoring.",
|
|
dwError);
|
|
#endif // DBG
|
|
|
|
//
|
|
// Continue...
|
|
//
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Not using multicast. Set the socket up to allow broadcasts in
|
|
// case we can't determine the gateway.
|
|
//
|
|
fTemp = TRUE;
|
|
if (this->m_pfnsetsockopt(sTemp,
|
|
SOL_SOCKET,
|
|
SO_BROADCAST,
|
|
(char *) (&fTemp),
|
|
sizeof(fTemp)) != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't set broadcast socket option, error = %u!", dwError);
|
|
#endif // DBG
|
|
goto Failure;
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Make the socket non-blocking.
|
|
//
|
|
ulEnable = 1;
|
|
if (this->m_pfnioctlsocket(sTemp, FIONBIO, &ulEnable) != 0)
|
|
{
|
|
#ifdef DBG
|
|
dwError = this->m_pfnWSAGetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't make socket non-blocking, error = %u!", dwError);
|
|
#endif // DBG
|
|
goto Failure;
|
|
}
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
DPFX(DPFPREP, 5, "(0x%p) Returning: [0x%x]", this, sTemp);
|
|
|
|
return sTemp;
|
|
|
|
|
|
Failure:
|
|
|
|
if (sTemp != INVALID_SOCKET)
|
|
{
|
|
this->m_pfnclosesocket(sTemp);
|
|
sTemp = INVALID_SOCKET;
|
|
}
|
|
|
|
goto Exit;
|
|
} // CNATHelpUPnP::CreateSocket
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::GetAddressToReachGateway"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::GetAddressToReachGateway
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Retrieves the address of the gateway for the given device,
|
|
// or the broadcast address if unable to be determined.
|
|
//
|
|
// This will return TRUE if the gateway's address was found, or
|
|
// the IPHLPAPI DLL could not be used (Win95). FALSE is returned
|
|
// if IPHLPAPI reported that there was no gateway (ICS private
|
|
// side adapter).
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device whose gateway should be retrieved.
|
|
// IN_ADDR * pinaddr - Place to store gateway or broadcast address.
|
|
//
|
|
// Returns: BOOL
|
|
// TRUE - Gateway address was found or had to use broadcast.
|
|
// FALSE - There is no gateway, do not attempt to use the address.
|
|
//=============================================================================
|
|
BOOL CNATHelpUPnP::GetAddressToReachGateway(CDevice * const pDevice,
|
|
IN_ADDR * const pinaddr)
|
|
{
|
|
#ifdef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// Fill in the default address. This should be atomic, so don't worry
|
|
// about locking the globals.
|
|
//
|
|
pinaddr->S_un.S_addr = g_dwDefaultGatewayV4;
|
|
|
|
return TRUE;
|
|
#else // ! DPNBUILD_NOWINSOCK2
|
|
DWORD dwError;
|
|
BOOL fResult = TRUE;
|
|
ULONG ulSize;
|
|
PIP_ADAPTER_INFO pAdaptersBuffer = NULL;
|
|
PIP_ADAPTER_INFO pAdapterInfo;
|
|
PIP_ADDR_STRING pIPAddrString;
|
|
DWORD dwAdapterIndex;
|
|
PMIB_IPFORWARDTABLE pIPForwardTableBuffer = NULL;
|
|
DWORD dwTemp;
|
|
PMIB_IPFORWARDROW pIPForwardRow;
|
|
|
|
|
|
|
|
//
|
|
// Fill in the default address. This should be atomic, so don't worry
|
|
// about locking the globals.
|
|
//
|
|
pinaddr->S_un.S_addr = g_dwDefaultGatewayV4;
|
|
|
|
#ifdef DBG
|
|
pDevice->ClearGatewayFlags();
|
|
#endif // DBG
|
|
|
|
|
|
//
|
|
// If this is the loopback address, then don't bother looking for a
|
|
// gateway, we won't find one.
|
|
//
|
|
if (pDevice->GetLocalAddressV4() == NETWORKBYTEORDER_INADDR_LOOPBACK)
|
|
{
|
|
DPFX(DPFPREP, 8, "No gateway for loopback address (device = 0x%p).",
|
|
pDevice);
|
|
|
|
//
|
|
// No gateway.
|
|
//
|
|
#ifdef DBG
|
|
pDevice->NoteNoGateway();
|
|
#endif // DBG
|
|
fResult = FALSE;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// If we didn't load the IP helper DLL, we can't do our fancy gateway
|
|
// tricks.
|
|
//
|
|
if (this->m_hIpHlpApiDLL == NULL)
|
|
{
|
|
DPFX(DPFPREP, 4, "Didn't load \"iphlpapi.dll\", returning default address for device 0x%p.",
|
|
pDevice);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Keep trying to get the list of adapters until we get ERROR_SUCCESS or a
|
|
// legitimate error (other than ERROR_BUFFER_OVERFLOW or
|
|
// ERROR_INSUFFICIENT_BUFFER).
|
|
//
|
|
ulSize = 0;
|
|
do
|
|
{
|
|
dwError = this->m_pfnGetAdaptersInfo(pAdaptersBuffer, &ulSize);
|
|
if (dwError == ERROR_SUCCESS)
|
|
{
|
|
//
|
|
// We succeeded, we should be set. But make sure there are
|
|
// adapters for us to use.
|
|
//
|
|
if (ulSize < sizeof(IP_ADAPTER_INFO))
|
|
{
|
|
DPFX(DPFPREP, 0, "Getting adapters info succeeded but didn't return any valid adapters (%u < %u), returning default address for device 0x%p.",
|
|
ulSize, sizeof(IP_ADAPTER_INFO), pDevice);
|
|
goto Exit;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
if ((dwError != ERROR_BUFFER_OVERFLOW) &&
|
|
(dwError != ERROR_INSUFFICIENT_BUFFER))
|
|
{
|
|
DPFX(DPFPREP, 0, "Unable to get adapters info (error = 0x%lx), returning default address for device 0x%p.",
|
|
dwError, pDevice);
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// We need more adapter space. Make sure there are adapters for us to
|
|
// use.
|
|
//
|
|
if (ulSize < sizeof(IP_ADAPTER_INFO))
|
|
{
|
|
DPFX(DPFPREP, 0, "Getting adapters info didn't return any valid adapters (%u < %u), returning default address for device 0x%p.",
|
|
ulSize, sizeof(IP_ADAPTER_INFO), pDevice);
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// If we previously had a buffer, free it.
|
|
//
|
|
if (pAdaptersBuffer != NULL)
|
|
{
|
|
DNFree(pAdaptersBuffer);
|
|
}
|
|
|
|
//
|
|
// Allocate the buffer.
|
|
//
|
|
pAdaptersBuffer = (PIP_ADAPTER_INFO) DNMalloc(ulSize);
|
|
if (pAdaptersBuffer == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Unable to allocate memory for adapters info, returning default address for device 0x%p.",
|
|
pDevice);
|
|
goto Exit;
|
|
}
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// Now find the device in the adapter list returned. Loop through all
|
|
// adapters.
|
|
//
|
|
pAdapterInfo = pAdaptersBuffer;
|
|
while (pAdapterInfo != NULL)
|
|
{
|
|
//
|
|
// Loop through all addresses for this adapter looking for the one for
|
|
// the device we have bound.
|
|
//
|
|
pIPAddrString = &pAdapterInfo->IpAddressList;
|
|
while (pIPAddrString != NULL)
|
|
{
|
|
if (this->m_pfninet_addr(pIPAddrString->IpAddress.String) == pDevice->GetLocalAddressV4())
|
|
{
|
|
pinaddr->S_un.S_addr = this->m_pfninet_addr(pAdapterInfo->GatewayList.IpAddress.String);
|
|
if ((pinaddr->S_un.S_addr == INADDR_ANY) ||
|
|
(pinaddr->S_un.S_addr == INADDR_NONE))
|
|
{
|
|
DPFX(DPFPREP, 8, "Found address for device 0x%p under adapter index %u (\"%hs\") but there is no gateway.",
|
|
pDevice, pAdapterInfo->Index, pAdapterInfo->Description);
|
|
|
|
//
|
|
// Although this isn't reporting a gateway, we may still
|
|
// want to use this adapter. That's because this could be
|
|
// a multihomed machine with multiple NICs on the same
|
|
// network, where this one isn't the "default" adapter.
|
|
// So save the index so we can search for it later.
|
|
//
|
|
dwAdapterIndex = pAdapterInfo->Index;
|
|
|
|
goto CheckRouteTable;
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure the address doesn't match the local device.
|
|
//
|
|
if (pinaddr->S_un.S_addr == pDevice->GetLocalAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 1, "Gateway address for device 0x%p (adapter index %u, \"%hs\") matches device IP address %hs! Forcing no gateway.",
|
|
pDevice, pAdapterInfo->Index, pAdapterInfo->Description,
|
|
pAdapterInfo->GatewayList.IpAddress.String);
|
|
|
|
//
|
|
// Pretend there's no gateway, since the one we received is
|
|
// bogus.
|
|
//
|
|
#ifdef DBG
|
|
pDevice->NoteNoGateway();
|
|
#endif // DBG
|
|
fResult = FALSE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 7, "Found address for device 0x%p under adapter index %u (\"%hs\"), gateway = %hs.",
|
|
pDevice, pAdapterInfo->Index, pAdapterInfo->Description,
|
|
pAdapterInfo->GatewayList.IpAddress.String);
|
|
|
|
#ifdef DBG
|
|
pDevice->NotePrimaryDevice();
|
|
#endif // DBG
|
|
}
|
|
|
|
goto Exit;
|
|
}
|
|
|
|
pIPAddrString = pIPAddrString->Next;
|
|
}
|
|
|
|
if (! fResult)
|
|
{
|
|
break;
|
|
}
|
|
|
|
pAdapterInfo = pAdapterInfo->Next;
|
|
}
|
|
|
|
|
|
//
|
|
// If we got here, then we didn't find the address. fResult will still be
|
|
// TRUE.
|
|
//
|
|
DPFX(DPFPREP, 0, "Did not find adapter with matching address, returning default address for device 0x%p.",
|
|
pDevice);
|
|
goto Exit;
|
|
|
|
|
|
CheckRouteTable:
|
|
|
|
//
|
|
// The adapter info structure said that the device doesn't have a gateway.
|
|
// However for some reason the gateway is only reported for the "default"
|
|
// device when multiple NICs can reach the same network. Check the routing
|
|
// table to determine if there's a gateway for secondary devices.
|
|
//
|
|
|
|
//
|
|
// Keep trying to get the routing table until we get ERROR_SUCCESS or a
|
|
// legitimate error (other than ERROR_BUFFER_OVERFLOW or
|
|
// ERROR_INSUFFICIENT_BUFFER).
|
|
//
|
|
ulSize = 0;
|
|
do
|
|
{
|
|
dwError = this->m_pfnGetIpForwardTable(pIPForwardTableBuffer, &ulSize, TRUE);
|
|
if (dwError == ERROR_SUCCESS)
|
|
{
|
|
//
|
|
// We succeeded, we should be set. But make sure the size is
|
|
// valid.
|
|
//
|
|
if (ulSize < sizeof(MIB_IPFORWARDTABLE))
|
|
{
|
|
DPFX(DPFPREP, 0, "Getting IP forward table succeeded but didn't return a valid buffer (%u < %u), returning \"no gateway\" indication for device 0x%p.",
|
|
ulSize, sizeof(MIB_IPFORWARDTABLE), pDevice);
|
|
fResult = FALSE;
|
|
goto Exit;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
if ((dwError != ERROR_BUFFER_OVERFLOW) &&
|
|
(dwError != ERROR_INSUFFICIENT_BUFFER))
|
|
{
|
|
DPFX(DPFPREP, 0, "Unable to get IP forward table (error = 0x%lx), returning \"no gateway\" indication for device 0x%p.",
|
|
dwError, pDevice);
|
|
fResult = FALSE;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// We need more table space. Make sure there are adapters for us to
|
|
// use.
|
|
//
|
|
if (ulSize < sizeof(MIB_IPFORWARDTABLE))
|
|
{
|
|
DPFX(DPFPREP, 0, "Getting IP forward table didn't return any valid adapters (%u < %u), returning \"no gateway\" indication for device 0x%p.",
|
|
ulSize, sizeof(MIB_IPFORWARDTABLE), pDevice);
|
|
fResult = FALSE;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// If we previously had a buffer, free it.
|
|
//
|
|
if (pIPForwardTableBuffer != NULL)
|
|
{
|
|
DNFree(pIPForwardTableBuffer);
|
|
}
|
|
|
|
//
|
|
// Allocate the buffer.
|
|
//
|
|
pIPForwardTableBuffer = (PMIB_IPFORWARDTABLE) DNMalloc(ulSize);
|
|
if (pIPForwardTableBuffer == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Unable to allocate memory for IP forward table, returning \"no gateway\" indication for device 0x%p.",
|
|
pDevice);
|
|
fResult = FALSE;
|
|
goto Exit;
|
|
}
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// Now find the interface. Note that we don't look it up as a destination
|
|
// address. Instead, we look for it as the interface to use for a 0.0.0.0
|
|
// network destination.
|
|
//
|
|
// We're looking for a route entry:
|
|
//
|
|
// Network Destination Netmask Gateway Interface Metric
|
|
// 0.0.0.0 0.0.0.0 xxx.xxx.xxx.xxx yyy.yyy.yyy.yyy 1
|
|
//
|
|
// We have yyy.yyy.yyy.yyy, we're trying to get xxx.xxx.xxx.xxx
|
|
//
|
|
pIPForwardRow = pIPForwardTableBuffer->table;
|
|
for(dwTemp = 0; dwTemp < pIPForwardTableBuffer->dwNumEntries; dwTemp++)
|
|
{
|
|
//
|
|
// Is this a 0.0.0.0 network destination?
|
|
//
|
|
if (pIPForwardRow->dwForwardDest == INADDR_ANY)
|
|
{
|
|
DNASSERT(pIPForwardRow->dwForwardMask == INADDR_ANY);
|
|
|
|
|
|
//
|
|
// Is this the right interface?
|
|
//
|
|
if (pIPForwardRow->dwForwardIfIndex == dwAdapterIndex)
|
|
{
|
|
if (pIPForwardRow->dwForwardNextHop == INADDR_ANY)
|
|
{
|
|
DPFX(DPFPREP, 8, "Found route table entry, but it didn't have a gateway (device = 0x%p).",
|
|
pDevice);
|
|
|
|
//
|
|
// No gateway.
|
|
//
|
|
#ifdef DBG
|
|
pDevice->NoteNoGateway();
|
|
#endif // DBG
|
|
fResult = FALSE;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Make sure the address doesn't match the local device.
|
|
//
|
|
if (pinaddr->S_un.S_addr == pDevice->GetLocalAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 1, "Route table gateway for device 0x%p matches device's IP address %u.%u.%u.%u! Forcing no gateway.",
|
|
pDevice,
|
|
pinaddr->S_un.S_un_b.s_b1,
|
|
pinaddr->S_un.S_un_b.s_b2,
|
|
pinaddr->S_un.S_un_b.s_b3,
|
|
pinaddr->S_un.S_un_b.s_b4);
|
|
|
|
//
|
|
// Pretend there's no gateway, since the one we
|
|
// received is bogus.
|
|
//
|
|
#ifdef DBG
|
|
pDevice->NoteNoGateway();
|
|
#endif // DBG
|
|
fResult = FALSE;
|
|
}
|
|
else
|
|
{
|
|
pinaddr->S_un.S_addr = pIPForwardRow->dwForwardNextHop;
|
|
|
|
DPFX(DPFPREP, 8, "Found route table entry, gateway = %u.%u.%u.%u (device = 0x%p).",
|
|
pinaddr->S_un.S_un_b.s_b1,
|
|
pinaddr->S_un.S_un_b.s_b2,
|
|
pinaddr->S_un.S_un_b.s_b3,
|
|
pinaddr->S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
|
|
//
|
|
// We found a gateway after all, fResult == TRUE.
|
|
//
|
|
#ifdef DBG
|
|
pDevice->NoteSecondaryDevice();
|
|
#endif // DBG
|
|
}
|
|
}
|
|
|
|
//
|
|
// We're done here.
|
|
//
|
|
goto Exit;
|
|
}
|
|
}
|
|
|
|
//
|
|
// Move to next row.
|
|
//
|
|
pIPForwardRow++;
|
|
}
|
|
|
|
|
|
//
|
|
// If we got here, then we couldn't find an appropriate entry in the
|
|
// routing table.
|
|
//
|
|
DPFX(DPFPREP, 1, "Did not find adapter in routing table, returning \"no gateway\" indication for device 0x%p.",
|
|
pDevice);
|
|
#ifdef DBG
|
|
pDevice->NoteNoGateway();
|
|
#endif // DBG
|
|
fResult = FALSE;
|
|
|
|
|
|
Exit:
|
|
|
|
if (pAdaptersBuffer != NULL)
|
|
{
|
|
DNFree(pAdaptersBuffer);
|
|
pAdaptersBuffer = NULL;
|
|
}
|
|
|
|
if (pIPForwardTableBuffer != NULL)
|
|
{
|
|
DNFree(pIPForwardTableBuffer);
|
|
pIPForwardTableBuffer = NULL;
|
|
}
|
|
|
|
return fResult;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
} // CNATHelpUPnP::GetAddressToReachGateway
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::IsAddressLocal"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::IsAddressLocal
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Returns TRUE if the given address is local to the given
|
|
// device; that is, if the device can send to the address directly
|
|
// without having to go through the gateway.
|
|
//
|
|
// Note that if IPHLPAPI is not available (Win95), this
|
|
// function will make an educated guess using a reasonable subnet
|
|
// mask.
|
|
//
|
|
// Arguments:
|
|
// CDevice * pDevice - Pointer to device to use.
|
|
// SOCKADDR_IN * psaddrinAddress - Address whose locality is in question.
|
|
//
|
|
// Returns: BOOL
|
|
// TRUE - Address is behind the same gateway as the device.
|
|
// FALSE - Address is not behind the same gateway as the device.
|
|
//=============================================================================
|
|
BOOL CNATHelpUPnP::IsAddressLocal(CDevice * const pDevice,
|
|
const SOCKADDR_IN * const psaddrinAddress)
|
|
{
|
|
BOOL fResult;
|
|
DWORD dwSubnetMaskV4;
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
DWORD dwError;
|
|
MIB_IPFORWARDROW IPForwardRow;
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
//
|
|
// If the address to query matches the device's local address exactly, then
|
|
// of course it's local.
|
|
//
|
|
if (psaddrinAddress->sin_addr.S_un.S_addr == pDevice->GetLocalAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 6, "The address %u.%u.%u.%u matches device 0x%p's local address exactly.",
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
fResult = TRUE;
|
|
goto Exit;
|
|
}
|
|
|
|
//
|
|
// If it's a multicast address, then it should not be considered local.
|
|
//
|
|
if (IS_CLASSD_IPV4_ADDRESS(psaddrinAddress->sin_addr.S_un.S_addr))
|
|
{
|
|
DPFX(DPFPREP, 6, "Address %u.%u.%u.%u is multicast, not considered local for device 0x%p.",
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
pDevice);
|
|
fResult = FALSE;
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// If we didn't load the IP helper DLL, we will have to guess.
|
|
//
|
|
if (this->m_hIpHlpApiDLL == NULL)
|
|
{
|
|
goto EducatedGuess;
|
|
}
|
|
|
|
|
|
//
|
|
// Figure out what IPHLPAPI says about how to get there.
|
|
//
|
|
|
|
ZeroMemory(&IPForwardRow, sizeof(IPForwardRow));
|
|
|
|
dwError = this->m_pfnGetBestRoute(psaddrinAddress->sin_addr.S_un.S_addr,
|
|
pDevice->GetLocalAddressV4(),
|
|
&IPForwardRow);
|
|
if (dwError != ERROR_SUCCESS)
|
|
{
|
|
DPFX(DPFPREP, 0, "Unable to get best route to %u.%u.%u.%u via device 0x%p (error = 0x%lx)! Using subnet mask.",
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
pDevice,
|
|
dwError);
|
|
goto EducatedGuess;
|
|
}
|
|
|
|
|
|
//
|
|
// Key off what IPHLPAPI returned.
|
|
//
|
|
switch (IPForwardRow.dwForwardType)
|
|
{
|
|
case 1:
|
|
{
|
|
//
|
|
// Other.
|
|
//
|
|
DPFX(DPFPREP, 6, "The route from device 0x%p to %u.%u.%u.%u is unknown.",
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4);
|
|
fResult = FALSE;
|
|
break;
|
|
}
|
|
|
|
case 2:
|
|
{
|
|
//
|
|
// The route is invalid.
|
|
//
|
|
DPFX(DPFPREP, 6, "The route from device 0x%p to %u.%u.%u.%u is invalid.",
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4);
|
|
fResult = FALSE;
|
|
break;
|
|
}
|
|
|
|
case 3:
|
|
{
|
|
//
|
|
// The next hop is the final destination (local route).
|
|
// Unfortunately, on multi-NIC machines querying an address
|
|
// reachable by another device returns success... not sure why, but
|
|
// if that's the case we need to further qualify this result. We
|
|
// do that by making sure the next hop address is actually the
|
|
// device with which we're querying.
|
|
//
|
|
if (IPForwardRow.dwForwardNextHop == pDevice->GetLocalAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 6, "Device 0x%p can reach %u.%u.%u.%u directly, it's local.",
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4);
|
|
|
|
fResult = TRUE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 6, "Device 0x%p can reach %u.%u.%u.%u but it would be routed via another device (%u.%u.%u.%u).",
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
((IN_ADDR*) (&IPForwardRow.dwForwardNextHop))->S_un.S_un_b.s_b1,
|
|
((IN_ADDR*) (&IPForwardRow.dwForwardNextHop))->S_un.S_un_b.s_b2,
|
|
((IN_ADDR*) (&IPForwardRow.dwForwardNextHop))->S_un.S_un_b.s_b3,
|
|
((IN_ADDR*) (&IPForwardRow.dwForwardNextHop))->S_un.S_un_b.s_b4);
|
|
|
|
fResult = FALSE;
|
|
}
|
|
break;
|
|
}
|
|
|
|
case 4:
|
|
{
|
|
//
|
|
// The next hop is not the final destination (remote route).
|
|
//
|
|
DPFX(DPFPREP, 6, "Device 0x%p cannot reach %u.%u.%u.%u directly.",
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4);
|
|
fResult = FALSE;
|
|
break;
|
|
}
|
|
|
|
default:
|
|
{
|
|
//
|
|
// What?
|
|
//
|
|
DPFX(DPFPREP, 0, "Unexpected forward type %u for device 0x%p and address %u.%u.%u.%u!",
|
|
IPForwardRow.dwForwardType,
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4);
|
|
fResult = FALSE;
|
|
break;
|
|
}
|
|
}
|
|
|
|
goto Exit;
|
|
|
|
|
|
EducatedGuess:
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
//
|
|
// This should be atomic, so don't worry about locking.
|
|
//
|
|
dwSubnetMaskV4 = g_dwSubnetMaskV4;
|
|
|
|
if ((pDevice->GetLocalAddressV4() & dwSubnetMaskV4) == (psaddrinAddress->sin_addr.S_un.S_addr & dwSubnetMaskV4))
|
|
{
|
|
DPFX(DPFPREP, 4, "Didn't load \"iphlpapi.dll\", guessing that device 0x%p can reach %u.%u.%u.%u (using subnet mask 0x%08x).",
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
dwSubnetMaskV4);
|
|
fResult = TRUE;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 4, "Didn't load \"iphlpapi.dll\", guessing that device 0x%p cannot reach %u.%u.%u.%u (using subnet mask 0x%08x).",
|
|
pDevice,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b1,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b2,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b3,
|
|
psaddrinAddress->sin_addr.S_un.S_un_b.s_b4,
|
|
dwSubnetMaskV4);
|
|
fResult = FALSE;
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
return fResult;
|
|
} // CNATHelpUPnP::IsAddressLocal
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::ExpireOldCachedMappings"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::ExpireOldCachedMappings
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Removes any cached mappings for any device which has
|
|
// expired.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::ExpireOldCachedMappings(void)
|
|
{
|
|
DWORD dwCurrentTime;
|
|
CBilink * pBilinkUPnPDevice;
|
|
CBilink * pCachedMaps;
|
|
CBilink * pBilinkCacheMap;
|
|
CCacheMap * pCacheMap;
|
|
CUPnPDevice * pUPnPDevice;
|
|
|
|
|
|
DPFX(DPFPREP, 7, "(0x%p) Enter", this);
|
|
|
|
|
|
dwCurrentTime = GETTIMESTAMP();
|
|
|
|
|
|
//
|
|
// Check the UPnP device cached mappings.
|
|
//
|
|
pBilinkUPnPDevice = this->m_blUPnPDevices.GetNext();
|
|
while (pBilinkUPnPDevice != &this->m_blUPnPDevices)
|
|
{
|
|
DNASSERT(! pBilinkUPnPDevice->IsEmpty());
|
|
pUPnPDevice = UPNPDEVICE_FROM_BILINK(pBilinkUPnPDevice);
|
|
|
|
|
|
//
|
|
// Check the actual cached mappings.
|
|
//
|
|
pCachedMaps = pUPnPDevice->GetCachedMaps();
|
|
pBilinkCacheMap = pCachedMaps->GetNext();
|
|
while (pBilinkCacheMap != pCachedMaps)
|
|
{
|
|
DNASSERT(! pBilinkCacheMap->IsEmpty());
|
|
pCacheMap = CACHEMAP_FROM_BILINK(pBilinkCacheMap);
|
|
pBilinkCacheMap = pBilinkCacheMap->GetNext();
|
|
|
|
if ((int) (pCacheMap->GetExpirationTime() - dwCurrentTime) < 0)
|
|
{
|
|
DPFX(DPFPREP, 5, "UPnP device 0x%p cached mapping 0x%p has expired.",
|
|
pUPnPDevice, pCacheMap);
|
|
|
|
pCacheMap->m_blList.RemoveFromList();
|
|
delete pCacheMap;
|
|
}
|
|
}
|
|
|
|
pBilinkUPnPDevice = pBilinkUPnPDevice->GetNext();
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 7, "(0x%p) Leave", this);
|
|
} // CNATHelpUPnP::ExpireOldCachedMappings
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef WINNT
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::IsUPnPServiceDisabled"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::IsUPnPServiceDisabled
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Returns TRUE if at least one UPnP related service is
|
|
// disabled, FALSE if no UPnP related services are disabled.
|
|
//
|
|
// Arguments:
|
|
// char * szString - Pointer to string to print.
|
|
// int iStringLength - Length of string to print.
|
|
// char * szDescription - Description header for the transaction.
|
|
// CDevice * pDevice - Device handling transaction, or NULL if not
|
|
// known.
|
|
//
|
|
// Returns: BOOL
|
|
// TRUE - A UPnP related service was disabled.
|
|
// FALSE - No UPnP related services were disabled.
|
|
//=============================================================================
|
|
BOOL CNATHelpUPnP::IsUPnPServiceDisabled(void)
|
|
{
|
|
BOOL fResult = FALSE;
|
|
SC_HANDLE schSCManager = NULL;
|
|
DWORD dwTemp;
|
|
SC_HANDLE schService = NULL;
|
|
QUERY_SERVICE_CONFIG * pQueryServiceConfig = NULL;
|
|
DWORD dwQueryServiceConfigSize = 0;
|
|
DWORD dwError;
|
|
|
|
|
|
schSCManager = OpenSCManager(NULL, NULL, SC_MANAGER_CONNECT);
|
|
if (schSCManager == NULL)
|
|
{
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't open SC Manager (err = %u)!", dwError);
|
|
#endif // DBG
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Loop through each relevant service.
|
|
//
|
|
for(dwTemp = 0; dwTemp < (sizeof(c_tszUPnPServices) / sizeof(TCHAR*)); dwTemp++)
|
|
{
|
|
schService = OpenService(schSCManager, c_tszUPnPServices[dwTemp], SERVICE_QUERY_CONFIG);
|
|
if (schService != NULL)
|
|
{
|
|
do
|
|
{
|
|
if (QueryServiceConfig(schService,
|
|
pQueryServiceConfig,
|
|
dwQueryServiceConfigSize,
|
|
&dwQueryServiceConfigSize))
|
|
{
|
|
//
|
|
// Make sure the size written is valid.
|
|
//
|
|
if (dwQueryServiceConfigSize < sizeof(QUERY_SERVICE_CONFIG))
|
|
{
|
|
DPFX(DPFPREP, 0, "Got invalid service config size for \"%s\" (%u < %u)!",
|
|
c_tszUPnPServices[dwTemp], dwQueryServiceConfigSize, sizeof(QUERY_SERVICE_CONFIG));
|
|
goto Exit;
|
|
}
|
|
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Otherwise, we failed. Make sure it's because our buffer was
|
|
// too small.
|
|
//
|
|
dwError = GetLastError();
|
|
if (dwError != ERROR_INSUFFICIENT_BUFFER)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't query \"%s\" service config (err = %u)!",
|
|
c_tszUPnPServices[dwTemp], dwError);
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// Make sure the size needed is valid.
|
|
//
|
|
if (dwQueryServiceConfigSize < sizeof(QUERY_SERVICE_CONFIG))
|
|
{
|
|
DPFX(DPFPREP, 0, "Got invalid service config size for \"%s\" (%u < %u)!",
|
|
c_tszUPnPServices[dwTemp], dwQueryServiceConfigSize, sizeof(QUERY_SERVICE_CONFIG));
|
|
goto Exit;
|
|
}
|
|
|
|
|
|
//
|
|
// (Re)-allocate the buffer.
|
|
//
|
|
|
|
if (pQueryServiceConfig != NULL)
|
|
{
|
|
DNFree(pQueryServiceConfig);
|
|
}
|
|
|
|
pQueryServiceConfig = (QUERY_SERVICE_CONFIG*) DNMalloc(dwQueryServiceConfigSize);
|
|
if (pQueryServiceConfig == NULL)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't allocate memory to query service config.");
|
|
goto Exit;
|
|
}
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// If the service was disabled, we're done here.
|
|
//
|
|
if (pQueryServiceConfig->dwStartType == SERVICE_DISABLED)
|
|
{
|
|
DPFX(DPFPREP, 1, "The \"%s\" service has been disabled.",
|
|
c_tszUPnPServices[dwTemp]);
|
|
fResult = TRUE;
|
|
goto Exit;
|
|
}
|
|
|
|
DPFX(DPFPREP, 7, "The \"%s\" service is not disabled (start type = %u).",
|
|
c_tszUPnPServices[dwTemp], pQueryServiceConfig->dwStartType);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Win2K doesn't have these services, so it will always fail.
|
|
//
|
|
#ifdef DBG
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 1, "Couldn't open \"%s\" service (err = %u), continuing.",
|
|
c_tszUPnPServices[dwTemp], dwError);
|
|
#endif // DBG
|
|
}
|
|
}
|
|
|
|
|
|
Exit:
|
|
|
|
if (pQueryServiceConfig != NULL)
|
|
{
|
|
DNFree(pQueryServiceConfig);
|
|
pQueryServiceConfig = NULL;
|
|
}
|
|
|
|
if (schService != NULL)
|
|
{
|
|
CloseServiceHandle(schService);
|
|
schService = NULL;
|
|
}
|
|
|
|
if (schSCManager != NULL)
|
|
{
|
|
CloseServiceHandle(schSCManager);
|
|
schSCManager = NULL;
|
|
}
|
|
|
|
return fResult;
|
|
} // CNATHelpUPnP::IsUPnPServiceDisabled
|
|
|
|
#endif // WINNT
|
|
|
|
|
|
|
|
|
|
|
|
#ifdef DBG
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::PrintUPnPTransactionToFile"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::PrintUPnPTransactionToFile
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Prints a given UPnP transaction to the file if logging is
|
|
// enabled.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments:
|
|
// char * szString - Pointer to string to print.
|
|
// int iStringLength - Length of string to print.
|
|
// char * szDescription - Description header for the transaction.
|
|
// CDevice * pDevice - Device handling transaction, or NULL if not
|
|
// known.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::PrintUPnPTransactionToFile(const char * const szString,
|
|
const int iStringLength,
|
|
const char * const szDescription,
|
|
CDevice * const pDevice)
|
|
{
|
|
DNHANDLE hFile;
|
|
DWORD dwNumBytesWritten;
|
|
TCHAR tszHeaderPrefix[256];
|
|
DWORD dwError;
|
|
#ifdef UNICODE
|
|
char szHeaderPrefix[256];
|
|
#endif // UNICODE
|
|
|
|
|
|
//
|
|
// Lock the globals so nobody touches the string while we use it.
|
|
//
|
|
DNEnterCriticalSection(&g_csGlobalsLock);
|
|
|
|
|
|
//
|
|
// Only print it if UPnP transaction logging is turned on.
|
|
//
|
|
if (wcslen(g_wszUPnPTransactionLog) > 0)
|
|
{
|
|
#ifndef UNICODE
|
|
HRESULT hr;
|
|
char szUPnPTransactionLog[sizeof(g_wszUPnPTransactionLog) / sizeof(WCHAR)];
|
|
DWORD dwLength;
|
|
|
|
|
|
//
|
|
// Convert the Unicode file name/path into ANSI.
|
|
//
|
|
|
|
dwLength = sizeof(szUPnPTransactionLog) / sizeof(char);
|
|
|
|
hr = STR_WideToAnsi(g_wszUPnPTransactionLog,
|
|
-1, // NULL terminated
|
|
szUPnPTransactionLog,
|
|
&dwLength);
|
|
if (hr != S_OK)
|
|
{
|
|
DPFX(DPFPREP, 0, "Couldn't convert UPnP transaction log file string from Unicode to ANSI (err = 0x%lx)!",
|
|
hr);
|
|
hFile = DNINVALID_HANDLE_VALUE;
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Open the file if it exists, or create a new one if it doesn't.
|
|
//
|
|
hFile = DNCreateFile(szUPnPTransactionLog,
|
|
(GENERIC_READ | GENERIC_WRITE),
|
|
FILE_SHARE_READ,
|
|
NULL,
|
|
OPEN_ALWAYS,
|
|
0,
|
|
NULL);
|
|
}
|
|
#else // UNICODE
|
|
//
|
|
// Open the file if it exists, or create a new one if it doesn't.
|
|
//
|
|
hFile = DNCreateFile(g_wszUPnPTransactionLog,
|
|
(GENERIC_READ | GENERIC_WRITE),
|
|
FILE_SHARE_READ,
|
|
NULL,
|
|
OPEN_ALWAYS,
|
|
0,
|
|
NULL);
|
|
#endif // UNICODE
|
|
|
|
if (hFile == DNINVALID_HANDLE_VALUE)
|
|
{
|
|
dwError = GetLastError();
|
|
DPFX(DPFPREP, 0, "Couldn't open UPnP transaction log file, err = %u!",
|
|
dwError);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Move the write pointer to the end of the file unless the file
|
|
// has exceeded the maximum size, in which case just start over.
|
|
// Ignore error.
|
|
//
|
|
if (GetFileSize(HANDLE_FROM_DNHANDLE(hFile), NULL) >= MAX_TRANSACTION_LOG_SIZE)
|
|
{
|
|
DPFX(DPFPREP, 0, "Transaction log maximum size exceeded, overwriting existing contents!");
|
|
SetFilePointer(HANDLE_FROM_DNHANDLE(hFile), 0, NULL, FILE_BEGIN);
|
|
}
|
|
else
|
|
{
|
|
SetFilePointer(HANDLE_FROM_DNHANDLE(hFile), 0, NULL, FILE_END);
|
|
}
|
|
|
|
|
|
//
|
|
// Write the descriptive header. Ignore errors.
|
|
//
|
|
|
|
if (pDevice != NULL)
|
|
{
|
|
IN_ADDR inaddr;
|
|
|
|
|
|
inaddr.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
|
|
wsprintf(tszHeaderPrefix,
|
|
_T("%u\t0x%lx\t0x%lx\t(0x%p, %u.%u.%u.%u) UPnP transaction \""),
|
|
GETTIMESTAMP(),
|
|
GetCurrentProcessId(),
|
|
GetCurrentThreadId(),
|
|
pDevice,
|
|
inaddr.S_un.S_un_b.s_b1,
|
|
inaddr.S_un.S_un_b.s_b2,
|
|
inaddr.S_un.S_un_b.s_b3,
|
|
inaddr.S_un.S_un_b.s_b4);
|
|
}
|
|
else
|
|
{
|
|
wsprintf(tszHeaderPrefix,
|
|
_T("%u\t0x%lx\t0x%lx\t(no device) UPnP transaction \""),
|
|
GETTIMESTAMP(),
|
|
GetCurrentProcessId(),
|
|
GetCurrentThreadId());
|
|
}
|
|
|
|
#ifdef UNICODE
|
|
STR_jkWideToAnsi(szHeaderPrefix,
|
|
tszHeaderPrefix,
|
|
(_tcslen(tszHeaderPrefix) + 1));
|
|
WriteFile(HANDLE_FROM_DNHANDLE(hFile), szHeaderPrefix, strlen(szHeaderPrefix), &dwNumBytesWritten, NULL);
|
|
#else // ! UNICODE
|
|
WriteFile(HANDLE_FROM_DNHANDLE(hFile), tszHeaderPrefix, _tcslen(tszHeaderPrefix), &dwNumBytesWritten, NULL);
|
|
#endif // ! UNICODE
|
|
|
|
WriteFile(HANDLE_FROM_DNHANDLE(hFile), szDescription, strlen(szDescription), &dwNumBytesWritten, NULL);
|
|
|
|
WriteFile(HANDLE_FROM_DNHANDLE(hFile), "\"\r\n", strlen("\"\r\n"), &dwNumBytesWritten, NULL);
|
|
|
|
|
|
//
|
|
// Write the transaction. Ignore error.
|
|
//
|
|
WriteFile(HANDLE_FROM_DNHANDLE(hFile), szString, iStringLength, &dwNumBytesWritten, NULL);
|
|
|
|
|
|
//
|
|
// Add blank space. Ignore error.
|
|
//
|
|
WriteFile(HANDLE_FROM_DNHANDLE(hFile), "\r\n\r\n", strlen("\r\n\r\n"), &dwNumBytesWritten, NULL);
|
|
|
|
|
|
//
|
|
// Truncate the log at this point in case we are overwriting
|
|
// existing contents. Ignore error.
|
|
//
|
|
SetEndOfFile(HANDLE_FROM_DNHANDLE(hFile));
|
|
|
|
//
|
|
// Close the file.
|
|
//
|
|
DNCloseHandle(hFile);
|
|
}
|
|
}
|
|
|
|
|
|
//
|
|
// Drop the globals lock.
|
|
//
|
|
DNLeaveCriticalSection(&g_csGlobalsLock);
|
|
|
|
} // CNATHelpUPnP::PrintUPnPTransactionToFile
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::DebugPrintCurrentStatus"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::DebugPrintCurrentStatus
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Prints all the devices and mappings to the debug log
|
|
// routines.
|
|
//
|
|
// The object lock is assumed to be held.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::DebugPrintCurrentStatus(void)
|
|
{
|
|
CBilink * pBilinkDevice;
|
|
CBilink * pBilinkRegisteredPort;
|
|
CDevice * pDevice;
|
|
CRegisteredPort * pRegisteredPort;
|
|
IN_ADDR inaddrTemp;
|
|
DWORD dwTemp;
|
|
SOCKADDR_IN * pasaddrinTemp;
|
|
SOCKADDR_IN * pasaddrinPrivate;
|
|
CUPnPDevice * pUPnPDevice;
|
|
SOCKADDR_IN * pasaddrinUPnPPublic;
|
|
|
|
|
|
DPFX(DPFPREP, 3, "Object flags = 0x%08x", this->m_dwFlags);
|
|
|
|
pBilinkDevice = this->m_blDevices.GetNext();
|
|
while (pBilinkDevice != &this->m_blDevices)
|
|
{
|
|
DNASSERT(! pBilinkDevice->IsEmpty());
|
|
pDevice = DEVICE_FROM_BILINK(pBilinkDevice);
|
|
|
|
inaddrTemp.S_un.S_addr = pDevice->GetLocalAddressV4();
|
|
|
|
DPFX(DPFPREP, 3, "Device 0x%p (%u.%u.%u.%u):",
|
|
pDevice,
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
|
|
|
|
//
|
|
// Print the search information. We should have detected it by now.
|
|
//
|
|
|
|
if (pDevice->IsPerformingRemoteUPnPDiscovery())
|
|
{
|
|
if (pDevice->GotRemoteUPnPDiscoveryConnReset())
|
|
{
|
|
DPFX(DPFPREP, 3, " Performed remote UPnP discovery (from port %u), but got conn reset.",
|
|
NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, " Performed remote UPnP discovery (from port %u).",
|
|
NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//DPFX(DPFPREP, 3, " Didn't perform remote UPnP discovery (from port %u).",
|
|
// NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
|
|
if (pDevice->IsPerformingLocalUPnPDiscovery())
|
|
{
|
|
if (pDevice->GotLocalUPnPDiscoveryConnReset())
|
|
{
|
|
DPFX(DPFPREP, 3, " Performed local UPnP discovery (from port %u), but got conn reset.",
|
|
NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, " Performed local UPnP discovery (from port %u).",
|
|
NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
}
|
|
else
|
|
{
|
|
//DPFX(DPFPREP, 3, " Didn't perform local UPnP discovery (from port %u).",
|
|
// NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOWINSOCK2
|
|
//
|
|
// Print the gateway information. We may not have detected it yet,
|
|
// that's okay.
|
|
//
|
|
if (pDevice->IsPrimaryDevice())
|
|
{
|
|
DPFX(DPFPREP, 3, " Primary device.");
|
|
}
|
|
else if (pDevice->IsSecondaryDevice())
|
|
{
|
|
DPFX(DPFPREP, 3, " Secondary device.");
|
|
}
|
|
else if (pDevice->HasNoGateway())
|
|
{
|
|
DPFX(DPFPREP, 3, " Has no gateway.");
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, " No gateway information known.");
|
|
}
|
|
#endif // ! DPNBUILD_NOWINSOCK2
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
if (pDevice->IsHNetFirewalled())
|
|
{
|
|
DPFX(DPFPREP, 3, " HNet firewalled.");
|
|
}
|
|
else
|
|
{
|
|
DNASSERT(! pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall());
|
|
}
|
|
|
|
if (pDevice->IsUPnPDiscoverySocketMappedOnHNetFirewall())
|
|
{
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
DPFX(DPFPREP, 3, " UPnP discovery socket (port %u) mapped on HNet firewall.",
|
|
NTOHS(pDevice->GetUPnPDiscoverySocketPort()));
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
pUPnPDevice = pDevice->GetUPnPDevice();
|
|
if (pUPnPDevice != NULL)
|
|
{
|
|
pasaddrinTemp = pUPnPDevice->GetControlAddress();
|
|
|
|
DPFX(DPFPREP, 3, " UPnP device (0x%p, ID = %u, control = %u.%u.%u.%u:%u).",
|
|
pUPnPDevice, pUPnPDevice->GetID(),
|
|
pasaddrinTemp->sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinTemp->sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinTemp->sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinTemp->sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pasaddrinTemp->sin_port));
|
|
|
|
if (pasaddrinTemp->sin_addr.S_un.S_addr == pDevice->GetLocalAddressV4())
|
|
{
|
|
DPFX(DPFPREP, 3, " Is local.");
|
|
}
|
|
|
|
|
|
DNASSERT(pUPnPDevice->IsReady());
|
|
|
|
if (pUPnPDevice->IsConnected())
|
|
{
|
|
DPFX(DPFPREP, 3, " Is connected.");
|
|
}
|
|
|
|
if (pUPnPDevice->DoesNotSupportAsymmetricMappings())
|
|
{
|
|
DPFX(DPFPREP, 3, " Does not support asymmetric mappings.");
|
|
}
|
|
|
|
if (pUPnPDevice->DoesNotSupportLeaseDurations())
|
|
{
|
|
DPFX(DPFPREP, 3, " Does not support lease durations.");
|
|
}
|
|
|
|
inaddrTemp.S_un.S_addr = pUPnPDevice->GetExternalIPAddressV4();
|
|
if (pUPnPDevice->GetExternalIPAddressV4() == 0)
|
|
{
|
|
DPFX(DPFPREP, 3, " Does not have a valid external IP address.");
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, " Has external IP %u.%u.%u.%u.",
|
|
inaddrTemp.S_un.S_un_b.s_b1,
|
|
inaddrTemp.S_un.S_un_b.s_b2,
|
|
inaddrTemp.S_un.S_un_b.s_b3,
|
|
inaddrTemp.S_un.S_un_b.s_b4);
|
|
}
|
|
}
|
|
|
|
|
|
if (pDevice->m_blOwnedRegPorts.IsEmpty())
|
|
{
|
|
DPFX(DPFPREP, 3, " No registered port mappings.");
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, " Registered port mappings:");
|
|
|
|
|
|
pBilinkRegisteredPort = pDevice->m_blOwnedRegPorts.GetNext();
|
|
while (pBilinkRegisteredPort != &pDevice->m_blOwnedRegPorts)
|
|
{
|
|
DNASSERT(! pBilinkRegisteredPort->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilinkRegisteredPort);
|
|
|
|
pasaddrinPrivate = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
if ((pDevice->GetUPnPDevice() != NULL) &&
|
|
(! pRegisteredPort->IsUPnPPortUnavailable()))
|
|
{
|
|
if (pRegisteredPort->HasUPnPPublicAddresses())
|
|
{
|
|
pasaddrinUPnPPublic = pRegisteredPort->GetUPnPPublicAddressesArray();
|
|
}
|
|
else
|
|
{
|
|
pasaddrinUPnPPublic = NULL;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
pasaddrinUPnPPublic = NULL;
|
|
}
|
|
|
|
|
|
DPFX(DPFPREP, 3, " Registered port 0x%p:",
|
|
pRegisteredPort);
|
|
|
|
for(dwTemp = 0; dwTemp < pRegisteredPort->GetNumAddresses(); dwTemp++)
|
|
{
|
|
//
|
|
// Print private address.
|
|
//
|
|
DPFX(DPFPREP, 3, " %u-\tPrivate = %u.%u.%u.%u:%u",
|
|
dwTemp,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pasaddrinPrivate[dwTemp].sin_port));
|
|
|
|
//
|
|
// Print flags.
|
|
//
|
|
DPFX(DPFPREP, 3, " \tFlags = 0x%lx",
|
|
pRegisteredPort->GetFlags());
|
|
|
|
//
|
|
// Print UPnP information.
|
|
//
|
|
if (pasaddrinUPnPPublic != NULL)
|
|
{
|
|
if (pRegisteredPort->HasPermanentUPnPLease())
|
|
{
|
|
DPFX(DPFPREP, 3, " \tUPnP = %u.%u.%u.%u:%u, permanently leased",
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pasaddrinUPnPPublic[dwTemp].sin_port));
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, " \tUPnP = %u.%u.%u.%u:%u, lease expires at %u",
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinUPnPPublic[dwTemp].sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pasaddrinUPnPPublic[dwTemp].sin_port),
|
|
pRegisteredPort->GetUPnPLeaseExpiration());
|
|
}
|
|
}
|
|
else if (pRegisteredPort->IsUPnPPortUnavailable())
|
|
{
|
|
DPFX(DPFPREP, 3, " \tUPnP = port unavailable");
|
|
}
|
|
else if (pDevice->GetUPnPDevice() != NULL)
|
|
{
|
|
DPFX(DPFPREP, 3, " \tUPnP = not registered");
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// No UPnP gateway device.
|
|
//
|
|
}
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
//
|
|
// Print firewall status.
|
|
//
|
|
if (pRegisteredPort->IsMappedOnHNetFirewall())
|
|
{
|
|
DNASSERT(pDevice->IsHNetFirewalled());
|
|
|
|
if (pRegisteredPort->IsHNetFirewallMappingBuiltIn())
|
|
{
|
|
DPFX(DPFPREP, 3, " \tHNet firewall = built-in mapping");
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, " \tHNet firewall = mapped");
|
|
}
|
|
}
|
|
else if (pRegisteredPort->IsHNetFirewallPortUnavailable())
|
|
{
|
|
DNASSERT(! pRegisteredPort->IsMappedOnHNetFirewall());
|
|
|
|
DPFX(DPFPREP, 3, " \tHNet firewall = port unavailable");
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// It is not mapped on the firewall.
|
|
//
|
|
DNASSERT(! pDevice->IsHNetFirewalled());
|
|
DNASSERT(! pRegisteredPort->IsMappedOnHNetFirewall());
|
|
DNASSERT(! pRegisteredPort->IsHNetFirewallMappingBuiltIn());
|
|
}
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
}
|
|
|
|
pBilinkRegisteredPort = pBilinkRegisteredPort->GetNext();
|
|
}
|
|
}
|
|
|
|
|
|
pBilinkDevice = pBilinkDevice->GetNext();
|
|
}
|
|
|
|
|
|
|
|
if (this->m_blUnownedPorts.IsEmpty())
|
|
{
|
|
DPFX(DPFPREP, 3, "No unowned registered port mappings.");
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 3, "Unowned registered port mappings:");
|
|
|
|
|
|
pBilinkRegisteredPort = this->m_blUnownedPorts.GetNext();
|
|
while (pBilinkRegisteredPort != &this->m_blUnownedPorts)
|
|
{
|
|
DNASSERT(! pBilinkRegisteredPort->IsEmpty());
|
|
pRegisteredPort = REGPORT_FROM_DEVICE_BILINK(pBilinkRegisteredPort);
|
|
|
|
pasaddrinPrivate = pRegisteredPort->GetPrivateAddressesArray();
|
|
|
|
DNASSERT(pRegisteredPort->GetOwningDevice() == NULL);
|
|
DNASSERT(! (pRegisteredPort->HasUPnPPublicAddresses()));
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
DNASSERT(! (pRegisteredPort->IsMappedOnHNetFirewall()));
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
DPFX(DPFPREP, 3, " Registered port 0x%p:", pRegisteredPort);
|
|
|
|
for(dwTemp = 0; dwTemp < pRegisteredPort->GetNumAddresses(); dwTemp++)
|
|
{
|
|
//
|
|
// Print private address.
|
|
//
|
|
DPFX(DPFPREP, 3, " %u-\tPrivate = %u.%u.%u.%u:%u",
|
|
dwTemp,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b1,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b2,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b3,
|
|
pasaddrinPrivate[dwTemp].sin_addr.S_un.S_un_b.s_b4,
|
|
NTOHS(pasaddrinPrivate[dwTemp].sin_port));
|
|
|
|
//
|
|
// Print flags.
|
|
//
|
|
DPFX(DPFPREP, 3, " \tFlags = 0x%lx",
|
|
pRegisteredPort->GetFlags());
|
|
}
|
|
|
|
pBilinkRegisteredPort = pBilinkRegisteredPort->GetNext();
|
|
}
|
|
}
|
|
} // CNATHelpUPnP::DebugPrintCurrentStatus
|
|
|
|
|
|
|
|
|
|
|
|
#ifndef DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::DebugPrintActiveFirewallMappings"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::DebugPrintActiveFirewallMappings
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Prints all the active firewall mapping registry entries to
|
|
// the debug log routines.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::DebugPrintActiveFirewallMappings(void)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CRegistry RegObject;
|
|
DWORD dwIndex;
|
|
WCHAR wszValueName[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
DWORD dwValueNameSize;
|
|
DPNHACTIVEFIREWALLMAPPING dpnhafm;
|
|
DWORD dwValueSize;
|
|
TCHAR tszObjectName[MAX_INSTANCENAMEDOBJECT_SIZE];
|
|
DNHANDLE hNamedObject = NULL;
|
|
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVEFIREWALLMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't open active firewall mapping key, not dumping entries (local instance = %u).",
|
|
this->m_dwInstanceKey);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Walk the list of active mappings.
|
|
//
|
|
dwIndex = 0;
|
|
do
|
|
{
|
|
dwValueNameSize = MAX_UPNP_MAPPING_DESCRIPTION_SIZE;
|
|
if (! RegObject.EnumValues(wszValueName, &dwValueNameSize, dwIndex))
|
|
{
|
|
//
|
|
// There was an error or there aren't any more keys. We're done.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Try reading that mapping's data.
|
|
//
|
|
dwValueSize = sizeof(dpnhafm);
|
|
if ((! RegObject.ReadBlob(wszValueName, (LPBYTE) (&dpnhafm), &dwValueSize)) ||
|
|
(dwValueSize != sizeof(dpnhafm)) ||
|
|
(dpnhafm.dwVersion != ACTIVE_MAPPING_VERSION))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't read \"%ls\" mapping value (index %u) or it was invalid! Ignoring.",
|
|
wszValueName, dwIndex);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// See if that DPNHUPNP instance is still around.
|
|
//
|
|
|
|
#ifndef WINCE
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX)
|
|
{
|
|
wsprintf(tszObjectName, _T( "Global\\" ) INSTANCENAMEDOBJECT_FORMATSTRING, dpnhafm.dwInstanceKey);
|
|
}
|
|
else
|
|
#endif // ! WINCE
|
|
{
|
|
wsprintf(tszObjectName, INSTANCENAMEDOBJECT_FORMATSTRING, dpnhafm.dwInstanceKey);
|
|
}
|
|
|
|
hNamedObject = DNOpenEvent(SYNCHRONIZE, FALSE, tszObjectName);
|
|
if (hNamedObject != NULL)
|
|
{
|
|
//
|
|
// This is still an active mapping.
|
|
//
|
|
|
|
DPFX(DPFPREP, 5, "%u: Firewall mapping \"%ls\" belongs to instance %u (local instance = %u), which is still active.",
|
|
dwIndex, wszValueName, dpnhafm.dwInstanceKey,
|
|
this->m_dwInstanceKey);
|
|
|
|
DNCloseHandle(hNamedObject);
|
|
hNamedObject = NULL;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 5, "%u: Firewall mapping \"%ls\" belongs to instance %u (local instance = %u), which no longer exists.",
|
|
dwIndex, wszValueName, dpnhafm.dwInstanceKey,
|
|
this->m_dwInstanceKey);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// Close the registry object.
|
|
//
|
|
RegObject.Close();
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Done reading %u registry entries (local instance = %u).",
|
|
dwIndex, this->m_dwInstanceKey);
|
|
}
|
|
} // CNATHelpUPnP::DebugPrintActiveFirewallMappings
|
|
|
|
#endif // ! DPNBUILD_NOHNETFWAPI
|
|
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "CNATHelpUPnP::DebugPrintActiveNATMappings"
|
|
//=============================================================================
|
|
// CNATHelpUPnP::DebugPrintActiveNATMappings
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Prints all the active NAT mapping registry entries to the
|
|
// debug log routines.
|
|
//
|
|
// Arguments: None.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void CNATHelpUPnP::DebugPrintActiveNATMappings(void)
|
|
{
|
|
HRESULT hr = DPNH_OK;
|
|
CRegistry RegObject;
|
|
DWORD dwIndex;
|
|
WCHAR wszValueName[MAX_UPNP_MAPPING_DESCRIPTION_SIZE];
|
|
DWORD dwValueNameSize;
|
|
DPNHACTIVENATMAPPING dpnhanm;
|
|
DWORD dwValueSize;
|
|
TCHAR tszObjectName[MAX_INSTANCENAMEDOBJECT_SIZE];
|
|
DNHANDLE hNamedObject = NULL;
|
|
|
|
|
|
if (! RegObject.Open(HKEY_LOCAL_MACHINE,
|
|
DIRECTPLAYNATHELP_REGKEY L"\\" REGKEY_COMPONENTSUBKEY L"\\" REGKEY_ACTIVENATMAPPINGS,
|
|
FALSE,
|
|
TRUE,
|
|
TRUE,
|
|
DPN_KEY_ALL_ACCESS))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't open active NAT mapping key, not dumping entries (local instance = %u).",
|
|
this->m_dwInstanceKey);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// Walk the list of active mappings.
|
|
//
|
|
dwIndex = 0;
|
|
do
|
|
{
|
|
dwValueNameSize = MAX_UPNP_MAPPING_DESCRIPTION_SIZE;
|
|
if (! RegObject.EnumValues(wszValueName, &dwValueNameSize, dwIndex))
|
|
{
|
|
//
|
|
// There was an error or there aren't any more keys. We're done.
|
|
//
|
|
break;
|
|
}
|
|
|
|
|
|
//
|
|
// Try reading that mapping's data.
|
|
//
|
|
dwValueSize = sizeof(dpnhanm);
|
|
if ((! RegObject.ReadBlob(wszValueName, (LPBYTE) (&dpnhanm), &dwValueSize)) ||
|
|
(dwValueSize != sizeof(dpnhanm)) ||
|
|
(dpnhanm.dwVersion != ACTIVE_MAPPING_VERSION))
|
|
{
|
|
DPFX(DPFPREP, 1, "Couldn't read \"%ls\" mapping value (index %u) or it was invalid! Ignoring.",
|
|
wszValueName, dwIndex);
|
|
}
|
|
else
|
|
{
|
|
//
|
|
// See if that DPNHUPNP instance is still around.
|
|
//
|
|
|
|
#ifndef WINCE
|
|
if (this->m_dwFlags & NATHELPUPNPOBJ_USEGLOBALNAMESPACEPREFIX)
|
|
{
|
|
wsprintf(tszObjectName, _T( "Global\\" ) INSTANCENAMEDOBJECT_FORMATSTRING, dpnhanm.dwInstanceKey);
|
|
}
|
|
else
|
|
#endif // ! WINCE
|
|
{
|
|
wsprintf(tszObjectName, INSTANCENAMEDOBJECT_FORMATSTRING, dpnhanm.dwInstanceKey);
|
|
}
|
|
|
|
hNamedObject = DNOpenEvent(SYNCHRONIZE, FALSE, tszObjectName);
|
|
if (hNamedObject != NULL)
|
|
{
|
|
//
|
|
// This is still an active mapping.
|
|
//
|
|
|
|
DPFX(DPFPREP, 5, "%u: NAT mapping \"%ls\" belongs to instance %u UPnP device %u (local instance = %u), which is still active.",
|
|
dwIndex, wszValueName, dpnhanm.dwInstanceKey,
|
|
dpnhanm.dwUPnPDeviceID, this->m_dwInstanceKey);
|
|
|
|
DNCloseHandle(hNamedObject);
|
|
hNamedObject = NULL;
|
|
}
|
|
else
|
|
{
|
|
DPFX(DPFPREP, 5, "%u: NAT mapping \"%ls\" belongs to instance %u UPnP device %u (local instance = %u), which no longer exists.",
|
|
dwIndex, wszValueName, dpnhanm.dwInstanceKey,
|
|
dpnhanm.dwUPnPDeviceID, this->m_dwInstanceKey);
|
|
}
|
|
}
|
|
|
|
//
|
|
// Move to next item.
|
|
//
|
|
dwIndex++;
|
|
}
|
|
while (TRUE);
|
|
|
|
|
|
//
|
|
// Close the registry object.
|
|
//
|
|
RegObject.Close();
|
|
|
|
|
|
DPFX(DPFPREP, 5, "Done reading %u registry entries (local instance = %u).",
|
|
dwIndex, this->m_dwInstanceKey);
|
|
}
|
|
} // CNATHelpUPnP::DebugPrintActiveNATMappings
|
|
|
|
#endif // DBG
|
|
|
|
|
|
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "strtrim"
|
|
//=============================================================================
|
|
// strtrim
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Removes surrounding white space from the given string. Taken
|
|
// from \nt\net\upnp\ssdp\common\ssdpparser\parser.cpp (author
|
|
// TingCai).
|
|
//
|
|
// Arguments:
|
|
// CHAR ** pszStr - Pointer to input string, and place to store resulting
|
|
// pointer.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
VOID strtrim(CHAR ** pszStr)
|
|
{
|
|
|
|
CHAR *end;
|
|
CHAR *begin;
|
|
|
|
// Empty string. Nothing to do.
|
|
//
|
|
if (!(**pszStr))
|
|
{
|
|
return;
|
|
}
|
|
|
|
begin = *pszStr;
|
|
end = begin + strlen(*pszStr) - 1;
|
|
|
|
while (*begin == ' ' || *begin == '\t')
|
|
{
|
|
begin++;
|
|
}
|
|
|
|
*pszStr = begin;
|
|
|
|
while (*end == ' ' || *end == '\t')
|
|
{
|
|
end--;
|
|
}
|
|
|
|
*(end+1) = '\0';
|
|
} // strtrim
|
|
|
|
|
|
|
|
|
|
#ifdef WINCE
|
|
|
|
|
|
#undef DPF_MODNAME
|
|
#define DPF_MODNAME "GetExeName"
|
|
//=============================================================================
|
|
// GetExeName
|
|
//-----------------------------------------------------------------------------
|
|
//
|
|
// Description: Updates a path string to hold only the executable name
|
|
// contained in the path.
|
|
//
|
|
// Arguments:
|
|
// WCHAR * wszPath - Input path string, and place to store resulting
|
|
// string.
|
|
//
|
|
// Returns: None.
|
|
//=============================================================================
|
|
void GetExeName(WCHAR * wszPath)
|
|
{
|
|
WCHAR * pCurrent;
|
|
|
|
|
|
pCurrent = wszPath + wcslen(wszPath);
|
|
while (pCurrent > wszPath)
|
|
{
|
|
if ((*pCurrent) == L'\\')
|
|
{
|
|
break;
|
|
}
|
|
|
|
pCurrent--;
|
|
}
|
|
|
|
if (pCurrent != wszPath)
|
|
{
|
|
memcpy(wszPath, (pCurrent + 1), ((wcslen(pCurrent) + 1) * sizeof(WCHAR)));
|
|
}
|
|
} // GetExeName
|
|
|
|
|
|
#endif // WINCE
|
|
|