You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
2599 lines
82 KiB
2599 lines
82 KiB
/*++
|
|
|
|
Copyright (c) 1994 Microsoft Corporation
|
|
|
|
Module Name:
|
|
|
|
mdhccapi.c
|
|
|
|
Abstract:
|
|
|
|
This file contains the client side APIs for the Madcap.
|
|
|
|
Author:
|
|
|
|
Munil Shah (munils) 02-Sept-97
|
|
|
|
Environment:
|
|
|
|
User Mode - Win32
|
|
|
|
Revision History:
|
|
|
|
|
|
--*/
|
|
#include "precomp.h"
|
|
#include "dhcpglobal.h"
|
|
#include <dhcploc.h>
|
|
#include <dhcppro.h>
|
|
#define MADCAP_DATA_ALLOCATE
|
|
#include "mdhcpcli.h"
|
|
#include <rpc.h>
|
|
|
|
//
|
|
// constants
|
|
//
|
|
#define Madcap_ADAPTER_NAME L"Madcap Adapter"
|
|
|
|
#define MadcapMiscPrint( Msg ) DhcpPrint(( DEBUG_MISC, ( Msg ) ))
|
|
|
|
static
|
|
LONG Initialized = 0;
|
|
|
|
WSADATA MadcapGlobalWsaData;
|
|
|
|
DWORD
|
|
MadcapInitGlobalData(
|
|
VOID
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine initializes data required for Multicast APIs to work
|
|
correctly. This has to be called exactly once (and this is ensured
|
|
by calling it in DLL init in dhcp.c )
|
|
|
|
Return Value:
|
|
|
|
This function returns a Win32 status.
|
|
|
|
--*/
|
|
{
|
|
DWORD Error;
|
|
|
|
LOCK_MSCOPE_LIST();
|
|
|
|
do {
|
|
|
|
if( Initialized > 0 ) {
|
|
Initialized ++;
|
|
Error = NO_ERROR;
|
|
break;
|
|
}
|
|
|
|
gMadcapScopeList = NULL;
|
|
gMScopeQueryInProgress = FALSE;
|
|
gMScopeQueryEvent =
|
|
CreateEvent(
|
|
NULL, // no security.
|
|
TRUE, // manual reset.
|
|
FALSE, // initial state is not-signaled.
|
|
NULL ); // no name.
|
|
if( gMScopeQueryEvent == NULL ) {
|
|
Error = GetLastError();
|
|
break;
|
|
}
|
|
|
|
Error = WSAStartup( 0x0101, &MadcapGlobalWsaData );
|
|
if( ERROR_SUCCESS != Error ) {
|
|
CloseHandle(gMScopeQueryEvent);
|
|
gMScopeQueryEvent = NULL;
|
|
|
|
break;
|
|
}
|
|
|
|
Initialized ++;
|
|
Error = NO_ERROR;
|
|
} while ( 0 );
|
|
UNLOCK_MSCOPE_LIST();
|
|
|
|
return Error;
|
|
}
|
|
|
|
VOID
|
|
MadcapCleanupGlobalData(
|
|
VOID
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine cleans up any resources allocated in MadcapInitGlobalData.
|
|
This can be called even if the InitData routine fails..
|
|
|
|
Return Value:
|
|
|
|
Nothing
|
|
--*/
|
|
{
|
|
LOCK_MSCOPE_LIST();
|
|
|
|
do {
|
|
DhcpAssert(Initialized >= 0);
|
|
if( Initialized <= 0 ) break;
|
|
|
|
Initialized --;
|
|
if( 0 != Initialized ) break;
|
|
|
|
gMadcapScopeList = NULL;
|
|
gMScopeQueryInProgress = FALSE;
|
|
if( NULL != gMScopeQueryEvent ) {
|
|
CloseHandle(gMScopeQueryEvent);
|
|
gMScopeQueryEvent = NULL;
|
|
}
|
|
|
|
WSACleanup();
|
|
} while ( 0 );
|
|
|
|
UNLOCK_MSCOPE_LIST();
|
|
}
|
|
|
|
|
|
BOOL
|
|
ShouldRequeryMScopeList()
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine checks if the multicast scope list can be
|
|
queried or not.
|
|
* If there is already a query in progress, then this routine
|
|
waits for that to complete and then returns FALSE.
|
|
* If there is no query in progress, it returns TRUE.
|
|
|
|
Arguments:
|
|
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
LOCK_MSCOPE_LIST();
|
|
if ( gMScopeQueryInProgress ) {
|
|
DWORD result;
|
|
DhcpPrint((DEBUG_API, "MScopeQuery is in progress - waiting\n"));
|
|
// make sure the event is not in signalled state from before.
|
|
ResetEvent( gMScopeQueryEvent );
|
|
UNLOCK_MSCOPE_LIST();
|
|
switch( result = WaitForSingleObject( gMScopeQueryEvent, INFINITE ) ) {
|
|
case WAIT_OBJECT_0:
|
|
// it's signled now, no need to requery the list, just take the result from previous query.
|
|
DhcpPrint((DEBUG_API, "MScopeQuery event signalled\n"));
|
|
return FALSE;
|
|
case WAIT_ABANDONED:
|
|
DhcpPrint((DEBUG_ERRORS, "WaitForSingleObject - thread died before the wait completed\n"));
|
|
return TRUE;
|
|
case WAIT_FAILED:
|
|
DhcpPrint((DEBUG_ERRORS, "WaitForSingleObject failed - %lx\n",GetLastError()));
|
|
DhcpAssert(FALSE);
|
|
|
|
//
|
|
// BUG 519461
|
|
//
|
|
// Add the "return TRUE" to make typo.pl happy
|
|
//
|
|
return TRUE;
|
|
|
|
default:
|
|
DhcpPrint((DEBUG_ERRORS, "WaitForSingleObject returned unknown value - %lx\n", result));
|
|
DhcpAssert(FALSE);
|
|
return TRUE;
|
|
}
|
|
} else {
|
|
gMScopeQueryInProgress = TRUE;
|
|
UNLOCK_MSCOPE_LIST();
|
|
return TRUE;
|
|
}
|
|
}
|
|
|
|
DWORD
|
|
InitializeMadcapSocket(
|
|
SOCKET *Socket,
|
|
DHCP_IP_ADDRESS IpAddress
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function initializes and binds a socket to the specified IP address.
|
|
|
|
Arguments:
|
|
|
|
Socket - Returns a pointer to the initialized socket.
|
|
|
|
IpAddress - The IP address to bind the socket to.
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
DWORD error;
|
|
DWORD closeError;
|
|
DWORD value;
|
|
struct sockaddr_in socketName;
|
|
DWORD i;
|
|
SOCKET sock;
|
|
|
|
//
|
|
// Sockets initialization
|
|
//
|
|
|
|
sock = socket( PF_INET, SOCK_DGRAM, IPPROTO_UDP );
|
|
|
|
if ( sock == INVALID_SOCKET ) {
|
|
error = WSAGetLastError();
|
|
DhcpPrint(( DEBUG_ERRORS, "socket failed, error = %ld\n", error ));
|
|
return( error );
|
|
}
|
|
|
|
//
|
|
// Make the socket share-able
|
|
//
|
|
|
|
value = 1;
|
|
|
|
error = setsockopt( sock, SOL_SOCKET, SO_REUSEADDR, (char FAR *)&value, sizeof(value) );
|
|
if ( error != 0 ) {
|
|
error = WSAGetLastError();
|
|
DhcpPrint((DEBUG_ERRORS, "setsockopt failed, err = %ld\n", error ));
|
|
|
|
closeError = closesocket( sock );
|
|
if ( closeError != 0 ) {
|
|
DhcpPrint((DEBUG_ERRORS, "closesocket failed, err = %d\n", closeError ));
|
|
}
|
|
return( error );
|
|
}
|
|
|
|
|
|
socketName.sin_family = PF_INET;
|
|
socketName.sin_port = 0; // let the winsock pick a port for us.
|
|
socketName.sin_addr.s_addr = IpAddress;
|
|
|
|
for ( i = 0; i < 8 ; i++ ) {
|
|
socketName.sin_zero[i] = 0;
|
|
}
|
|
|
|
//
|
|
// Bind this socket to the DHCP server port
|
|
//
|
|
|
|
error = bind(
|
|
sock,
|
|
(struct sockaddr FAR *)&socketName,
|
|
sizeof( socketName )
|
|
);
|
|
|
|
if ( error != 0 ) {
|
|
error = WSAGetLastError();
|
|
DhcpPrint((DEBUG_ERRORS, "bind failed, err = %ld\n", error ));
|
|
closeError = closesocket( sock );
|
|
if ( closeError != 0 ) {
|
|
DhcpPrint((DEBUG_ERRORS, "closesocket failed, err = %d\n", closeError ));
|
|
}
|
|
return( error );
|
|
}
|
|
|
|
// set the multicast IF to be the one on which we are doing Madcap
|
|
if (INADDR_ANY != IpAddress) {
|
|
value = IpAddress;
|
|
|
|
DhcpPrint((DEBUG_ERRORS, "setsockopt: IP_MULTICAST_IF, if = %lx\n", IpAddress ));
|
|
error = setsockopt( sock, IPPROTO_IP, IP_MULTICAST_IF,
|
|
(char FAR *)&value, sizeof(value) );
|
|
if ( error != 0 ) {
|
|
error = WSAGetLastError();
|
|
DhcpPrint((DEBUG_ERRORS, "setsockopt failed, err = %ld\n", error ));
|
|
|
|
closeError = closesocket( sock );
|
|
if ( closeError != 0 ) {
|
|
DhcpPrint((DEBUG_ERRORS, "closesocket failed, err = %d\n", closeError ));
|
|
}
|
|
return( error );
|
|
}
|
|
}
|
|
|
|
*Socket = sock;
|
|
return( NO_ERROR );
|
|
}
|
|
|
|
DWORD
|
|
ReInitializeMadcapSocket(
|
|
SOCKET *Socket,
|
|
DHCP_IP_ADDRESS IpAddress
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function closes and reinitializes the socket to specified IP address.
|
|
|
|
Arguments:
|
|
|
|
Socket - Returns a pointer to the initialized socket.
|
|
|
|
IpAddress - The IP address to bind the socket to.
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
DWORD Error;
|
|
|
|
if (*Socket != INVALID_SOCKET) {
|
|
Error = closesocket( *Socket );
|
|
if ( Error != 0 ) {
|
|
DhcpPrint((DEBUG_ERRORS, "closesocket failed, err = %d\n", Error ));
|
|
return Error;
|
|
}
|
|
}
|
|
return InitializeMadcapSocket( Socket, IpAddress );
|
|
}
|
|
|
|
DWORD
|
|
OpenMadcapSocket(
|
|
PDHCP_CONTEXT DhcpContext
|
|
)
|
|
{
|
|
|
|
DWORD Error;
|
|
PLOCAL_CONTEXT_INFO localInfo;
|
|
struct sockaddr_in socketName;
|
|
int sockAddrLen;
|
|
|
|
localInfo = DhcpContext->LocalInformation;
|
|
|
|
if ( INVALID_SOCKET == localInfo->Socket ) {
|
|
Error = InitializeMadcapSocket(&localInfo->Socket, DhcpContext->IpAddress);
|
|
|
|
if( Error != ERROR_SUCCESS ) {
|
|
localInfo->Socket = INVALID_SOCKET;
|
|
DhcpPrint(( DEBUG_ERRORS, " Socket Open failed, %ld\n", Error ));
|
|
return Error;
|
|
}
|
|
}
|
|
|
|
|
|
// find out which port we are bound to.
|
|
sockAddrLen = sizeof(struct sockaddr_in);
|
|
Error = getsockname(
|
|
localInfo->Socket ,
|
|
(struct sockaddr FAR *)&socketName,
|
|
&sockAddrLen
|
|
);
|
|
|
|
if ( Error != 0 ) {
|
|
DWORD closeError;
|
|
Error = WSAGetLastError();
|
|
DhcpPrint((DEBUG_ERRORS, "bind failed, err = %ld\n", Error ));
|
|
closeError = closesocket( localInfo->Socket );
|
|
if ( closeError != 0 ) {
|
|
DhcpPrint((DEBUG_ERRORS, "closesocket failed, err = %d\n", closeError ));
|
|
}
|
|
return( Error );
|
|
}
|
|
|
|
|
|
return(Error);
|
|
}
|
|
|
|
DWORD
|
|
CreateMadcapContext(
|
|
IN OUT PDHCP_CONTEXT *ppContext,
|
|
IN LPMCAST_CLIENT_UID pRequestID,
|
|
IN DHCP_IP_ADDRESS IpAddress
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine creates a dummy context for doing Madcap operation
|
|
on it.
|
|
|
|
Arguments:
|
|
|
|
ppContext - pointer to where context pointer is to be stored.
|
|
|
|
pRequestID - The client id to be used in the context.
|
|
|
|
IpAddress - The ipaddress the context is initialized with.
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
DWORD Error;
|
|
PDHCP_CONTEXT DhcpContext = NULL;
|
|
ULONG DhcpContextSize;
|
|
PLOCAL_CONTEXT_INFO LocalInfo = NULL;
|
|
LPVOID Ptr;
|
|
LPDHCP_LEASE_INFO LocalLeaseInfo = NULL;
|
|
time_t LeaseObtained;
|
|
DWORD T1, T2, Lease;
|
|
DWORD AdapterNameLen;
|
|
|
|
|
|
//
|
|
// prepare dhcp context structure.
|
|
//
|
|
|
|
DhcpContextSize =
|
|
ROUND_UP_COUNT(sizeof(DHCP_CONTEXT), ALIGN_WORST) +
|
|
ROUND_UP_COUNT(pRequestID->ClientUIDLength, ALIGN_WORST) +
|
|
ROUND_UP_COUNT(sizeof(LOCAL_CONTEXT_INFO), ALIGN_WORST) +
|
|
ROUND_UP_COUNT(DHCP_RECV_MESSAGE_SIZE, ALIGN_WORST);
|
|
|
|
Ptr = DhcpAllocateMemory( DhcpContextSize );
|
|
if ( Ptr == NULL ) {
|
|
return( ERROR_NOT_ENOUGH_MEMORY );
|
|
}
|
|
|
|
RtlZeroMemory( Ptr, DhcpContextSize );
|
|
|
|
//
|
|
// make sure the pointers are aligned.
|
|
//
|
|
|
|
DhcpContext = Ptr;
|
|
Ptr = ROUND_UP_POINTER( (LPBYTE)Ptr + sizeof(DHCP_CONTEXT), ALIGN_WORST);
|
|
|
|
DhcpContext->ClientIdentifier.pbID = Ptr;
|
|
Ptr = ROUND_UP_POINTER( (LPBYTE)Ptr + pRequestID->ClientUIDLength, ALIGN_WORST);
|
|
|
|
DhcpContext->LocalInformation = Ptr;
|
|
LocalInfo = Ptr;
|
|
Ptr = ROUND_UP_POINTER( (LPBYTE)Ptr + sizeof(LOCAL_CONTEXT_INFO), ALIGN_WORST);
|
|
|
|
DhcpContext->MadcapMessageBuffer = Ptr;
|
|
|
|
|
|
//
|
|
// initialize fields.
|
|
//
|
|
|
|
|
|
DhcpContext->ClientIdentifier.fSpecified = TRUE;
|
|
DhcpContext->ClientIdentifier.bType = HARDWARE_TYPE_NONE;
|
|
DhcpContext->ClientIdentifier.cbID = pRequestID->ClientUIDLength;
|
|
RtlCopyMemory(
|
|
DhcpContext->ClientIdentifier.pbID,
|
|
pRequestID->ClientUID,
|
|
pRequestID->ClientUIDLength
|
|
);
|
|
|
|
DhcpContext->IpAddress = IpAddress;
|
|
DhcpContext->SubnetMask = DhcpDefaultSubnetMask(0);
|
|
DhcpContext->DhcpServerAddress = MADCAP_SERVER_IP_ADDRESS;
|
|
DhcpContext->DesiredIpAddress = 0;
|
|
|
|
|
|
SET_MDHCP_STATE(DhcpContext);
|
|
|
|
InitializeListHead(&DhcpContext->RenewalListEntry);
|
|
InitializeListHead(&DhcpContext->SendOptionsList);
|
|
InitializeListHead(&DhcpContext->RecdOptionsList);
|
|
InitializeListHead(&DhcpContext->FbOptionsList);
|
|
InitializeListHead(&DhcpContext->NicListEntry);
|
|
|
|
DhcpContext->DontPingGatewayFlag = TRUE;
|
|
|
|
//
|
|
// copy local info.
|
|
//
|
|
|
|
//
|
|
// unused portion of the local info.
|
|
//
|
|
|
|
LocalInfo->IpInterfaceContext = 0xFFFFFFFF;
|
|
LocalInfo->IpInterfaceInstance = 0xFFFFFFFF;
|
|
LocalInfo->AdapterName = NULL;
|
|
LocalInfo->NetBTDeviceName= NULL;
|
|
LocalInfo->RegistryKey= NULL;
|
|
LocalInfo->Socket = INVALID_SOCKET;
|
|
LocalInfo->DefaultGatewaysSet = FALSE;
|
|
|
|
//
|
|
// used portion of the local info.
|
|
//
|
|
|
|
LocalInfo->Socket = INVALID_SOCKET;
|
|
|
|
//
|
|
// open socket now. receive any.
|
|
//
|
|
|
|
Error = InitializeMadcapSocket(&LocalInfo->Socket,DhcpContext->IpAddress);
|
|
|
|
if( Error != ERROR_SUCCESS ) {
|
|
DhcpFreeMemory( DhcpContext );
|
|
return Error;
|
|
} else {
|
|
*ppContext = DhcpContext;
|
|
return Error;
|
|
}
|
|
|
|
}
|
|
|
|
DWORD
|
|
SendMadcapMessage(
|
|
PDHCP_CONTEXT DhcpContext,
|
|
DWORD MessageLength,
|
|
PDWORD TransactionId
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function sends a UDP message to the DHCP server specified
|
|
in the DhcpContext.
|
|
|
|
Arguments:
|
|
|
|
DhcpContext - A pointer to a DHCP context block.
|
|
|
|
MessageLength - The length of the message to send.
|
|
|
|
TransactionID - The transaction ID for this message. If 0, the
|
|
function generates a random ID, and returns it.
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
DWORD error;
|
|
int i;
|
|
struct sockaddr_in socketName;
|
|
time_t TimeNow;
|
|
BOOL LockedInterface = FALSE;
|
|
|
|
if ( *TransactionId == 0 ) {
|
|
*TransactionId = (rand() << 16) + rand();
|
|
}
|
|
|
|
DhcpContext->MadcapMessageBuffer->TransactionID = *TransactionId;
|
|
|
|
//
|
|
// Initialize the outgoing address.
|
|
//
|
|
|
|
socketName.sin_family = PF_INET;
|
|
socketName.sin_port = htons( MADCAP_SERVER_PORT);
|
|
|
|
socketName.sin_addr.s_addr = DhcpContext->DhcpServerAddress;
|
|
if ( CLASSD_NET_ADDR( DhcpContext->DhcpServerAddress ) ) {
|
|
int TTL = 16;
|
|
//
|
|
// Set TTL
|
|
// MBUG: we need to read this from the registry.
|
|
//
|
|
if (setsockopt(
|
|
((PLOCAL_CONTEXT_INFO)DhcpContext->LocalInformation)->Socket,
|
|
IPPROTO_IP,
|
|
IP_MULTICAST_TTL,
|
|
(char *)&TTL,
|
|
sizeof((int)TTL)) == SOCKET_ERROR){
|
|
|
|
error = WSAGetLastError();
|
|
DhcpPrint((DEBUG_ERRORS,"could not set MCast TTL %ld\n",error ));
|
|
return error;
|
|
}
|
|
|
|
}
|
|
|
|
for ( i = 0; i < 8 ; i++ ) {
|
|
socketName.sin_zero[i] = 0;
|
|
}
|
|
|
|
error = sendto(
|
|
((PLOCAL_CONTEXT_INFO)
|
|
DhcpContext->LocalInformation)->Socket,
|
|
(PCHAR)DhcpContext->MadcapMessageBuffer,
|
|
MessageLength,
|
|
0,
|
|
(struct sockaddr *)&socketName,
|
|
sizeof( struct sockaddr )
|
|
);
|
|
|
|
if ( error == SOCKET_ERROR ) {
|
|
error = WSAGetLastError();
|
|
DhcpPrint(( DEBUG_ERRORS, "Send failed, error = %ld\n", error ));
|
|
} else {
|
|
IF_DEBUG( PROTOCOL ) {
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Sent message to %s: \n", inet_ntoa( socketName.sin_addr )));
|
|
}
|
|
|
|
MadcapDumpMessage(
|
|
DEBUG_PROTOCOL_DUMP,
|
|
DhcpContext->MadcapMessageBuffer,
|
|
DHCP_MESSAGE_SIZE
|
|
);
|
|
error = NO_ERROR;
|
|
}
|
|
|
|
return( error );
|
|
}
|
|
|
|
WIDE_OPTION UNALIGNED * // ptr to add additional options
|
|
FormatMadcapCommonMessage( // format the packet for an INFORM
|
|
IN PDHCP_CONTEXT DhcpContext, // format for this context
|
|
IN BYTE MessageType
|
|
) {
|
|
|
|
DWORD size;
|
|
DWORD Error;
|
|
WIDE_OPTION UNALIGNED *option;
|
|
LPBYTE OptionEnd;
|
|
PMADCAP_MESSAGE dhcpMessage;
|
|
|
|
dhcpMessage = DhcpContext->MadcapMessageBuffer;
|
|
RtlZeroMemory( dhcpMessage, DHCP_SEND_MESSAGE_SIZE );
|
|
|
|
dhcpMessage->Version = MADCAP_VERSION;
|
|
dhcpMessage->MessageType = MessageType;
|
|
dhcpMessage->AddressFamily = htons(MADCAP_ADDR_FAMILY_V4);
|
|
|
|
option = &dhcpMessage->Option;
|
|
OptionEnd = (LPBYTE)dhcpMessage + DHCP_SEND_MESSAGE_SIZE;
|
|
|
|
|
|
|
|
option = AppendWideOption( // ==> use this client id as option
|
|
option,
|
|
MADCAP_OPTION_LEASE_ID,
|
|
DhcpContext->ClientIdentifier.pbID,
|
|
(WORD)DhcpContext->ClientIdentifier.cbID,
|
|
OptionEnd
|
|
);
|
|
|
|
return( option );
|
|
}
|
|
|
|
|
|
DWORD // status
|
|
SendMadcapInform( // send an inform packet after filling required options
|
|
IN PDHCP_CONTEXT DhcpContext, // sned out for this context
|
|
IN OUT DWORD *pdwXid // use this Xid (if zero fill something and return it)
|
|
) {
|
|
DWORD size;
|
|
WIDE_OPTION UNALIGNED * option;
|
|
LPBYTE OptionEnd;
|
|
WORD OptVal[] = { // for now we just need this one option.
|
|
htons(MADCAP_OPTION_MCAST_SCOPE_LIST) // multicast scope list.
|
|
};
|
|
|
|
option = FormatMadcapCommonMessage(DhcpContext, MADCAP_INFORM_MESSAGE);
|
|
OptionEnd = (LPBYTE)(DhcpContext->MadcapMessageBuffer) + DHCP_SEND_MESSAGE_SIZE;
|
|
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_REQUEST_LIST,
|
|
OptVal,
|
|
sizeof (OptVal),
|
|
OptionEnd
|
|
);
|
|
|
|
option = AppendWideOption( option, MADCAP_OPTION_END, NULL, 0, OptionEnd );
|
|
size = (DWORD)((PBYTE)option - (PBYTE)DhcpContext->MadcapMessageBuffer);
|
|
|
|
return SendMadcapMessage( // finally send the message and return
|
|
DhcpContext,
|
|
size,
|
|
pdwXid
|
|
);
|
|
}
|
|
|
|
DWORD // status
|
|
SendMadcapDiscover( // send an inform packet after filling required options
|
|
IN PDHCP_CONTEXT DhcpContext, // sned out for this context
|
|
IN PIPNG_ADDRESS pScopeID,
|
|
IN PMCAST_LEASE_REQUEST pAddrRequest,
|
|
IN OUT DWORD *pdwXid // use this Xid (if zero fill something and return it)
|
|
) {
|
|
DWORD size;
|
|
WIDE_OPTION UNALIGNED * option;
|
|
LPBYTE OptionEnd;
|
|
|
|
option = FormatMadcapCommonMessage(DhcpContext, MADCAP_DISCOVER_MESSAGE);
|
|
OptionEnd = (LPBYTE)(DhcpContext->MadcapMessageBuffer) + DHCP_SEND_MESSAGE_SIZE;
|
|
|
|
DhcpAssert(pScopeID);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MCAST_SCOPE,
|
|
(LPBYTE)&pScopeID->IpAddrV4,
|
|
sizeof (pScopeID->IpAddrV4),
|
|
OptionEnd
|
|
);
|
|
|
|
if (pAddrRequest->LeaseDuration) {
|
|
DWORD Lease = htonl(pAddrRequest->LeaseDuration);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_LEASE_TIME,
|
|
(LPBYTE)&Lease,
|
|
sizeof (Lease),
|
|
OptionEnd
|
|
);
|
|
}
|
|
|
|
if( pAddrRequest->MinLeaseDuration ) {
|
|
DWORD MinLease = htonl(pAddrRequest->MinLeaseDuration);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MIN_LEASE_TIME,
|
|
(LPBYTE)&MinLease,
|
|
sizeof(MinLease),
|
|
OptionEnd
|
|
);
|
|
}
|
|
|
|
if( pAddrRequest->MaxLeaseStartTime ) {
|
|
DWORD TimeNow = htonl((DWORD)time(NULL));
|
|
DWORD StartTime = htonl(pAddrRequest->MaxLeaseStartTime);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MAX_START_TIME,
|
|
(LPBYTE)&StartTime,
|
|
sizeof (StartTime),
|
|
OptionEnd
|
|
);
|
|
|
|
if( !(pAddrRequest->LeaseStartTime) ) {
|
|
//
|
|
// if lease start time specified, then current time
|
|
// option will be added at a later point
|
|
//
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_TIME,
|
|
(LPBYTE)&TimeNow,
|
|
sizeof (TimeNow),
|
|
OptionEnd
|
|
);
|
|
}
|
|
}
|
|
|
|
if (pAddrRequest->LeaseStartTime) {
|
|
DWORD TimeNow = htonl((DWORD)time(NULL));
|
|
DWORD StartTime = htonl(pAddrRequest->LeaseStartTime);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_START_TIME,
|
|
(LPBYTE)&StartTime,
|
|
sizeof (StartTime),
|
|
OptionEnd
|
|
);
|
|
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_TIME,
|
|
(LPBYTE)&TimeNow,
|
|
sizeof (TimeNow),
|
|
OptionEnd
|
|
);
|
|
|
|
}
|
|
|
|
option = AppendWideOption( option, MADCAP_OPTION_END, NULL, 0, OptionEnd );
|
|
size = (DWORD)((PBYTE)option - (PBYTE)DhcpContext->MadcapMessageBuffer);
|
|
|
|
return SendMadcapMessage( // finally send the message and return
|
|
DhcpContext,
|
|
size,
|
|
pdwXid
|
|
);
|
|
}
|
|
|
|
DWORD // status
|
|
SendMadcapRequest( //
|
|
IN PDHCP_CONTEXT DhcpContext, // sned out for this context
|
|
IN PIPNG_ADDRESS pScopeID,
|
|
IN PMCAST_LEASE_REQUEST pAddrRequest,
|
|
IN DWORD SelectedServer, // is there a prefernce for a server?
|
|
IN OUT DWORD *pdwXid // use this Xid (if zero fill something and return it)
|
|
) {
|
|
DWORD size;
|
|
WIDE_OPTION UNALIGNED * option;
|
|
LPBYTE OptionEnd;
|
|
BYTE ServerId[6];
|
|
WORD AddrFamily = htons(MADCAP_ADDR_FAMILY_V4);
|
|
|
|
|
|
option = FormatMadcapCommonMessage(DhcpContext, MADCAP_REQUEST_MESSAGE);
|
|
OptionEnd = (LPBYTE)(DhcpContext->MadcapMessageBuffer) + DHCP_SEND_MESSAGE_SIZE;
|
|
option = AppendMadcapAddressList(
|
|
option,
|
|
(DWORD UNALIGNED *)pAddrRequest->pAddrBuf,
|
|
pAddrRequest->AddrCount,
|
|
OptionEnd
|
|
);
|
|
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MCAST_SCOPE,
|
|
(LPBYTE)&pScopeID->IpAddrV4,
|
|
sizeof (pScopeID->IpAddrV4),
|
|
OptionEnd
|
|
);
|
|
|
|
if (pAddrRequest->LeaseDuration) {
|
|
DWORD TimeNow = (DWORD)time(NULL);
|
|
DWORD Lease = htonl(pAddrRequest->LeaseDuration);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_LEASE_TIME,
|
|
(LPBYTE)&Lease,
|
|
sizeof (Lease),
|
|
OptionEnd
|
|
);
|
|
}
|
|
|
|
if( pAddrRequest->MinLeaseDuration ) {
|
|
DWORD MinLease = htonl(pAddrRequest->MinLeaseDuration);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MIN_LEASE_TIME,
|
|
(LPBYTE)&MinLease,
|
|
sizeof(MinLease),
|
|
OptionEnd
|
|
);
|
|
}
|
|
|
|
if( pAddrRequest->MaxLeaseStartTime ) {
|
|
DWORD TimeNow = htonl((DWORD)time(NULL));
|
|
DWORD StartTime = htonl(pAddrRequest->MaxLeaseStartTime);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MAX_START_TIME,
|
|
(LPBYTE)&StartTime,
|
|
sizeof (StartTime),
|
|
OptionEnd
|
|
);
|
|
|
|
if( !(pAddrRequest->LeaseStartTime) ) {
|
|
//
|
|
// if lease start time specified, then current time
|
|
// option will be added at a later point
|
|
//
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_TIME,
|
|
(LPBYTE)&TimeNow,
|
|
sizeof (TimeNow),
|
|
OptionEnd
|
|
);
|
|
}
|
|
}
|
|
|
|
if (pAddrRequest->LeaseStartTime) {
|
|
DWORD TimeNow = htonl((DWORD)time(NULL));
|
|
DWORD StartTime = htonl(pAddrRequest->LeaseStartTime);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_START_TIME,
|
|
(LPBYTE)&StartTime,
|
|
sizeof (StartTime),
|
|
OptionEnd
|
|
);
|
|
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_TIME,
|
|
(LPBYTE)&TimeNow,
|
|
sizeof (TimeNow),
|
|
OptionEnd
|
|
);
|
|
|
|
}
|
|
|
|
memcpy(ServerId, &AddrFamily, 2);
|
|
memcpy(ServerId + 2, &SelectedServer, 4);
|
|
|
|
option = AppendWideOption(
|
|
option, // append this option to talk to that server alone
|
|
MADCAP_OPTION_SERVER_ID,
|
|
ServerId,
|
|
sizeof( ServerId ),
|
|
OptionEnd
|
|
);
|
|
|
|
option = AppendWideOption( option, MADCAP_OPTION_END, NULL, 0, OptionEnd );
|
|
size = (DWORD)((PBYTE)option - (PBYTE)DhcpContext->MadcapMessageBuffer);
|
|
|
|
return SendMadcapMessage( // finally send the message and return
|
|
DhcpContext,
|
|
size,
|
|
pdwXid
|
|
);
|
|
}
|
|
|
|
DWORD // status
|
|
SendMadcapRenew( // send an inform packet after filling required options
|
|
IN PDHCP_CONTEXT DhcpContext, // sned out for this context
|
|
IN PMCAST_LEASE_REQUEST pAddrRequest,
|
|
IN OUT DWORD *pdwXid // use this Xid (if zero fill something and return it)
|
|
) {
|
|
DWORD size;
|
|
WIDE_OPTION UNALIGNED * option;
|
|
LPBYTE OptionEnd;
|
|
|
|
option = FormatMadcapCommonMessage(DhcpContext, MADCAP_RENEW_MESSAGE);
|
|
OptionEnd = (LPBYTE)(DhcpContext->MadcapMessageBuffer) + DHCP_SEND_MESSAGE_SIZE;
|
|
|
|
if (pAddrRequest->LeaseDuration) {
|
|
DWORD Lease = htonl(pAddrRequest->LeaseDuration);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_LEASE_TIME,
|
|
(LPBYTE)&Lease,
|
|
sizeof (Lease),
|
|
OptionEnd
|
|
);
|
|
}
|
|
|
|
if( pAddrRequest->MinLeaseDuration ) {
|
|
DWORD MinLease = htonl(pAddrRequest->MinLeaseDuration);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MIN_LEASE_TIME,
|
|
(LPBYTE)&MinLease,
|
|
sizeof(MinLease),
|
|
OptionEnd
|
|
);
|
|
}
|
|
|
|
if( pAddrRequest->MaxLeaseStartTime ) {
|
|
DWORD TimeNow = htonl((DWORD)time(NULL));
|
|
DWORD StartTime = htonl(pAddrRequest->MaxLeaseStartTime);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_MAX_START_TIME,
|
|
(LPBYTE)&StartTime,
|
|
sizeof (StartTime),
|
|
OptionEnd
|
|
);
|
|
|
|
if( !(pAddrRequest->LeaseStartTime) ) {
|
|
//
|
|
// if lease start time specified, then current time
|
|
// option will be added at a later point
|
|
//
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_TIME,
|
|
(LPBYTE)&TimeNow,
|
|
sizeof (TimeNow),
|
|
OptionEnd
|
|
);
|
|
}
|
|
}
|
|
|
|
if (pAddrRequest->LeaseStartTime) {
|
|
DWORD TimeNow = htonl((DWORD)time(NULL));
|
|
DWORD StartTime = htonl(pAddrRequest->LeaseStartTime);
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_START_TIME,
|
|
(LPBYTE)&StartTime,
|
|
sizeof (StartTime),
|
|
OptionEnd
|
|
);
|
|
|
|
option = AppendWideOption(
|
|
option,
|
|
MADCAP_OPTION_TIME,
|
|
(LPBYTE)&TimeNow,
|
|
sizeof (TimeNow),
|
|
OptionEnd
|
|
);
|
|
|
|
}
|
|
|
|
option = AppendWideOption( option, MADCAP_OPTION_END, NULL, 0, OptionEnd );
|
|
size = (DWORD)((PBYTE)option - (PBYTE)DhcpContext->MadcapMessageBuffer);
|
|
|
|
return SendMadcapMessage( // finally send the message and return
|
|
DhcpContext,
|
|
size,
|
|
pdwXid
|
|
);
|
|
}
|
|
|
|
DWORD // status
|
|
SendMadcapRelease( // send an inform packet after filling required options
|
|
IN PDHCP_CONTEXT DhcpContext, // sned out for this context
|
|
IN OUT DWORD *pdwXid // use this Xid (if zero fill something and return it)
|
|
) {
|
|
DWORD size;
|
|
WIDE_OPTION UNALIGNED * option;
|
|
LPBYTE OptionEnd;
|
|
|
|
option = FormatMadcapCommonMessage(DhcpContext, MADCAP_RELEASE_MESSAGE);
|
|
OptionEnd = (LPBYTE)(DhcpContext->MadcapMessageBuffer) + DHCP_SEND_MESSAGE_SIZE;
|
|
option = AppendWideOption( option, MADCAP_OPTION_END, NULL, 0, OptionEnd );
|
|
size = (DWORD)((PBYTE)option - (PBYTE)DhcpContext->MadcapMessageBuffer);
|
|
|
|
return SendMadcapMessage( // finally send the message and return
|
|
DhcpContext,
|
|
size,
|
|
pdwXid
|
|
);
|
|
}
|
|
|
|
|
|
|
|
#define RATIO 1
|
|
DWORD
|
|
GetSpecifiedMadcapMessage(
|
|
PDHCP_CONTEXT DhcpContext,
|
|
PDWORD BufferLength,
|
|
DWORD TransactionId,
|
|
DWORD TimeToWait
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This function waits TimeToWait seconds to receives the specified
|
|
DHCP response.
|
|
|
|
Arguments:
|
|
|
|
DhcpContext - A pointer to a DHCP context block.
|
|
|
|
BufferLength - Returns the size of the input buffer.
|
|
|
|
TransactionID - A filter. Wait for a message with this TID.
|
|
|
|
TimeToWait - Time, in milli seconds, to wait for the message.
|
|
|
|
Return Value:
|
|
|
|
The status of the operation. If the specified message has been
|
|
been returned, the status is ERROR_TIMEOUT.
|
|
|
|
--*/
|
|
{
|
|
struct sockaddr socketName;
|
|
int socketNameSize = sizeof( socketName );
|
|
struct timeval timeout;
|
|
time_t startTime, now;
|
|
DWORD error;
|
|
time_t actualTimeToWait;
|
|
SOCKET clientSocket;
|
|
fd_set readSocketSet;
|
|
PMADCAP_MESSAGE MadcapMessage;
|
|
|
|
startTime = time( NULL );
|
|
actualTimeToWait = TimeToWait;
|
|
|
|
//
|
|
// Setup the file descriptor set for select.
|
|
//
|
|
|
|
clientSocket = ((PLOCAL_CONTEXT_INFO)DhcpContext->LocalInformation)->Socket;
|
|
MadcapMessage = DhcpContext->MadcapMessageBuffer;
|
|
|
|
FD_ZERO( &readSocketSet );
|
|
FD_SET( clientSocket, &readSocketSet );
|
|
|
|
while ( 1 ) {
|
|
|
|
timeout.tv_sec = (long)(actualTimeToWait / RATIO);
|
|
timeout.tv_usec = (long)(actualTimeToWait % RATIO);
|
|
DhcpPrint((DEBUG_TRACE, "Select: waiting for: %ld seconds\n", actualTimeToWait));
|
|
error = select( 0, &readSocketSet, NULL, NULL, &timeout );
|
|
|
|
if ( error == 0 ) {
|
|
|
|
//
|
|
// Timeout before read data is available.
|
|
//
|
|
|
|
DhcpPrint(( DEBUG_ERRORS, "Recv timed out\n", 0 ));
|
|
error = ERROR_TIMEOUT;
|
|
break;
|
|
}
|
|
|
|
error = recvfrom(
|
|
clientSocket,
|
|
(PCHAR)MadcapMessage,
|
|
*BufferLength,
|
|
0,
|
|
&socketName,
|
|
&socketNameSize
|
|
);
|
|
|
|
if ( error == SOCKET_ERROR ) {
|
|
error = WSAGetLastError();
|
|
DhcpPrint(( DEBUG_ERRORS, "Recv failed, error = %ld\n", error ));
|
|
|
|
if( WSAECONNRESET != error ) break;
|
|
|
|
//
|
|
// ignore connreset -- this could be caused by someone sending random ICMP port unreachable.
|
|
//
|
|
} else if (error <= MADCAP_MESSAGE_FIXED_PART_SIZE) {
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Received a too short madcap message, length = %lx\n",
|
|
error ));
|
|
|
|
} else if (MadcapMessage->TransactionID == TransactionId ) {
|
|
|
|
DhcpPrint(( DEBUG_PROTOCOL,
|
|
"Received Message, XID = %lx\n",
|
|
TransactionId));
|
|
// just sanity check the remaining fields
|
|
if ( MADCAP_VERSION == MadcapMessage->Version &&
|
|
MADCAP_ADDR_FAMILY_V4 == ntohs(MadcapMessage->AddressFamily)) {
|
|
|
|
MadcapDumpMessage(
|
|
DEBUG_PROTOCOL_DUMP,
|
|
MadcapMessage,
|
|
DHCP_RECV_MESSAGE_SIZE
|
|
);
|
|
|
|
*BufferLength = error;
|
|
error = NO_ERROR;
|
|
break;
|
|
}
|
|
|
|
} else {
|
|
DhcpPrint(( DEBUG_PROTOCOL,
|
|
"Received a buffer with unknown XID = %lx\n",
|
|
MadcapMessage->TransactionID ));
|
|
}
|
|
|
|
//
|
|
// We received a message, but not the one we're interested in.
|
|
// Reset the timeout to reflect elapsed time, and wait for
|
|
// another message.
|
|
//
|
|
now = time( NULL );
|
|
actualTimeToWait = TimeToWait - RATIO * (now - startTime);
|
|
if ( (LONG)actualTimeToWait < 0 ) {
|
|
error = ERROR_TIMEOUT;
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
return( error );
|
|
}
|
|
|
|
//--------------------------------------------------------------------------------
|
|
// This function decides if multicast offer is to be accepted or not.
|
|
//--------------------------------------------------------------------------------
|
|
BOOL
|
|
AcceptMadcapMsg(
|
|
IN DWORD MessageType, // message type to which this response came
|
|
IN PDHCP_CONTEXT DhcpContext, // The context of the adapter..
|
|
IN PMADCAP_OPTIONS MadcapOptions, // rcvd options.
|
|
IN DHCP_IP_ADDRESS SelectedServer, // the server which we care about.
|
|
OUT DWORD *Error // additional fatal error.
|
|
) {
|
|
|
|
PMADCAP_MESSAGE MadcapMessage;
|
|
|
|
|
|
*Error = ERROR_SUCCESS;
|
|
MadcapMessage = DhcpContext->MadcapMessageBuffer;
|
|
|
|
if ( !MadcapOptions->ServerIdentifier ){
|
|
DhcpPrint((DEBUG_ERRORS, "Received no server identifier, dropping response\n"));
|
|
return FALSE;
|
|
}
|
|
|
|
if ( !MadcapOptions->ClientGuid ){
|
|
DhcpPrint((DEBUG_ERRORS, "Received no client identifier, dropping response\n"));
|
|
return FALSE;
|
|
}
|
|
|
|
if (DhcpContext->ClientIdentifier.cbID != MadcapOptions->ClientGuidLength ||
|
|
0 != memcmp(DhcpContext->ClientIdentifier.pbID,
|
|
MadcapOptions->ClientGuid,
|
|
MadcapOptions->ClientGuidLength) ) {
|
|
return FALSE;
|
|
}
|
|
|
|
if (MadcapOptions->MCastLeaseStartTime && !MadcapOptions->Time) {
|
|
DhcpPrint((DEBUG_ERRORS, "Received start time but no current time\n"));
|
|
return FALSE;
|
|
}
|
|
switch( MessageType ) {
|
|
case MADCAP_INFORM_MESSAGE:
|
|
if (MADCAP_ACK_MESSAGE != MadcapMessage->MessageType) {
|
|
return FALSE;
|
|
}
|
|
break;
|
|
case MADCAP_DISCOVER_MESSAGE:
|
|
if (MADCAP_OFFER_MESSAGE != MadcapMessage->MessageType) {
|
|
return FALSE;
|
|
}
|
|
if (!MadcapOptions->AddrRangeList) {
|
|
return FALSE;
|
|
}
|
|
if (!MadcapOptions->LeaseTime) {
|
|
return FALSE;
|
|
}
|
|
if (!MadcapOptions->McastScope) {
|
|
return FALSE;
|
|
}
|
|
break;
|
|
case MADCAP_RENEW_MESSAGE:
|
|
case MADCAP_REQUEST_MESSAGE:
|
|
if (MADCAP_NACK_MESSAGE == MadcapMessage->MessageType &&
|
|
SelectedServer == *MadcapOptions->ServerIdentifier) {
|
|
DhcpPrint((DEBUG_ERRORS, "Received NACK\n"));
|
|
*Error = ERROR_ACCESS_DENIED;
|
|
return FALSE;
|
|
}
|
|
if (MADCAP_ACK_MESSAGE != MadcapMessage->MessageType) {
|
|
return FALSE;
|
|
}
|
|
if (SelectedServer && SelectedServer != *MadcapOptions->ServerIdentifier) {
|
|
return FALSE;
|
|
}
|
|
if (!MadcapOptions->LeaseTime) {
|
|
return FALSE;
|
|
}
|
|
if (!MadcapOptions->AddrRangeList) {
|
|
return FALSE;
|
|
}
|
|
if (!MadcapOptions->McastScope) {
|
|
return FALSE;
|
|
}
|
|
break;
|
|
case MADCAP_RELEASE_MESSAGE:
|
|
if (MADCAP_ACK_MESSAGE != MadcapMessage->MessageType) {
|
|
return FALSE;
|
|
}
|
|
|
|
break;
|
|
default:
|
|
DhcpAssert( FALSE );
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Received Unknown Message.\n"));
|
|
return FALSE;
|
|
|
|
}
|
|
// Is this really necessary?
|
|
if (MadcapOptions->Error) {
|
|
return FALSE;
|
|
}
|
|
|
|
return TRUE; // accept this message.
|
|
}
|
|
|
|
VOID
|
|
MadcapExtractOptions( // Extract some important options alone or ALL
|
|
IN PDHCP_CONTEXT DhcpContext, // input context
|
|
IN LPBYTE OptStart, // start of the options stuff
|
|
IN DWORD MessageSize, // # of bytes of options
|
|
OUT PMADCAP_OPTIONS MadcapOptions, // this is where the options would be stored
|
|
IN OUT PLIST_ENTRY RecdOptions, // if !LiteOnly this gets filled with all incoming options
|
|
IN DWORD ServerId // if !LiteOnly this specifies the server which gave this
|
|
) {
|
|
WIDE_OPTION UNALIGNED* NextOpt;
|
|
BYTE UNALIGNED* EndOpt;
|
|
WORD Size;
|
|
DWORD OptionType;
|
|
DWORD Error;
|
|
WORD AddrFamily;
|
|
|
|
|
|
EndOpt = OptStart + MessageSize; // all options should be < EndOpt;
|
|
RtlZeroMemory((LPBYTE)MadcapOptions, sizeof(*MadcapOptions));
|
|
|
|
if( 0 == MessageSize ) goto DropPkt; // nothing to do in this case
|
|
|
|
NextOpt = (WIDE_OPTION UNALIGNED*)OptStart;
|
|
while( NextOpt->OptionValue <= EndOpt &&
|
|
MADCAP_OPTION_END != (OptionType = ntohs(NextOpt->OptionType)) ) {
|
|
|
|
Size = ntohs(NextOpt->OptionLength);
|
|
if ((NextOpt->OptionValue + Size) > EndOpt) {
|
|
goto DropPkt;
|
|
}
|
|
|
|
switch( OptionType ) {
|
|
case MADCAP_OPTION_LEASE_TIME:
|
|
if( Size != sizeof(DWORD) ) goto DropPkt;
|
|
MadcapOptions->LeaseTime = (DWORD UNALIGNED *)NextOpt->OptionValue;
|
|
break;
|
|
case MADCAP_OPTION_SERVER_ID:
|
|
if (Size != 6) goto DropPkt;
|
|
AddrFamily = ntohs(*(WORD UNALIGNED *)NextOpt->OptionValue);
|
|
if ( MADCAP_ADDR_FAMILY_V4 != AddrFamily ) goto DropPkt;
|
|
MadcapOptions->ServerIdentifier = (DHCP_IP_ADDRESS UNALIGNED *)(NextOpt->OptionValue+2);
|
|
break;
|
|
case MADCAP_OPTION_LEASE_ID:
|
|
if( 0 == Size ) goto DropPkt;
|
|
MadcapOptions->ClientGuidLength = Size;
|
|
MadcapOptions->ClientGuid = NextOpt->OptionValue;
|
|
break;
|
|
case MADCAP_OPTION_MCAST_SCOPE:
|
|
if( Size != sizeof(DWORD) ) goto DropPkt;
|
|
MadcapOptions->McastScope = (DWORD UNALIGNED *)NextOpt->OptionValue;
|
|
break;
|
|
case MADCAP_OPTION_START_TIME:
|
|
if ( Size != sizeof(DATE_TIME) ) goto DropPkt;
|
|
MadcapOptions->MCastLeaseStartTime = (DWORD UNALIGNED *)NextOpt->OptionValue;
|
|
break;
|
|
case MADCAP_OPTION_ADDR_LIST:
|
|
if( Size % 6 ) goto DropPkt;
|
|
MadcapOptions->AddrRangeList = NextOpt->OptionValue;
|
|
MadcapOptions->AddrRangeListSize = Size;
|
|
break;
|
|
case MADCAP_OPTION_TIME:
|
|
if( Size != sizeof(DWORD) ) goto DropPkt;
|
|
MadcapOptions->Time = (DWORD UNALIGNED *)NextOpt->OptionValue;
|
|
break;
|
|
case MADCAP_OPTION_FEATURE_LIST:
|
|
break;
|
|
case MADCAP_OPTION_RETRY_TIME:
|
|
if( Size != sizeof(DWORD) ) goto DropPkt;
|
|
MadcapOptions->RetryTime = (DWORD UNALIGNED *)NextOpt->OptionValue;
|
|
break;
|
|
case MADCAP_OPTION_ERROR:
|
|
if( Size != sizeof(DWORD) ) goto DropPkt;
|
|
MadcapOptions->Error = (DWORD UNALIGNED *)NextOpt->OptionValue;
|
|
break;
|
|
|
|
|
|
default:
|
|
// unknowm message, nothing to do.. especially dont log this
|
|
break;
|
|
}
|
|
if (RecdOptions) {
|
|
DhcpAssert(ServerId);
|
|
Error = MadcapAddIncomingOption( // Now add this option to the list
|
|
RecdOptions,
|
|
OptionType,
|
|
ServerId,
|
|
NextOpt->OptionValue,
|
|
Size,
|
|
(DWORD)INFINIT_TIME
|
|
);
|
|
if (ERROR_SUCCESS != Error) {
|
|
goto DropPkt;
|
|
}
|
|
}
|
|
NextOpt = (WIDE_OPTION UNALIGNED*)(NextOpt->OptionValue + Size);
|
|
} // while NextOpt < EndOpt
|
|
|
|
return;
|
|
|
|
DropPkt:
|
|
RtlZeroMemory(MadcapOptions, sizeof(MadcapOptions));
|
|
if(RecdOptions) DhcpFreeAllOptions(RecdOptions);// ok undo the options that we just added
|
|
}
|
|
|
|
DWORD
|
|
MadcapDoInform(
|
|
IN PDHCP_CONTEXT DhcpContext
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine does the inform part by sending inform messages and
|
|
collecting responses etc. on given context.
|
|
In case of no-response, no error is returned as a timeout is not
|
|
considered an error.
|
|
|
|
Arguments:
|
|
|
|
DhcpContext -- context to dhcp struct
|
|
fBroadcast -- should the inform be broadcast or unicast?
|
|
|
|
Return Values:
|
|
|
|
Win32 errors
|
|
|
|
--*/
|
|
{
|
|
time_t StartTime;
|
|
time_t TimeNow;
|
|
time_t TimeToWait;
|
|
DWORD Error;
|
|
DWORD Xid;
|
|
DWORD MessageSize;
|
|
DWORD RoundNum;
|
|
DWORD MessageCount;
|
|
DWORD LeaseExpirationTime;
|
|
MADCAP_OPTIONS MadcapOptions;
|
|
BOOL GotAck;
|
|
#define MIN_ACKS_FOR_INFORM MADCAP_QUERY_SCOPE_LIST_RETRIES
|
|
DWORD MadcapServers[MIN_ACKS_FOR_INFORM];
|
|
|
|
DhcpPrint((DEBUG_PROTOCOL, "MadcapDoInform entered\n"));
|
|
|
|
|
|
Xid = 0; // Will be generated by first SendDhcpPacket
|
|
MessageCount = 0; // total # of messages we have got
|
|
|
|
TimeToWait = MADCAP_QUERY_SCOPE_LIST_TIME * 1000;
|
|
TimeToWait += ((rand() * ((DWORD) 1000))/RAND_MAX);
|
|
TimeToWait /= 1000;
|
|
|
|
for( RoundNum = 0; RoundNum <= MADCAP_QUERY_SCOPE_LIST_RETRIES; RoundNum ++ ) {
|
|
|
|
if( RoundNum != MADCAP_QUERY_SCOPE_LIST_RETRIES ) {
|
|
Error = SendMadcapInform(DhcpContext, &Xid);
|
|
if( ERROR_SUCCESS != Error ) {
|
|
DhcpPrint((DEBUG_ERRORS, "SendMadcapInform: %ld\n", Error));
|
|
goto Cleanup;
|
|
} else {
|
|
DhcpPrint((DEBUG_PROTOCOL, "Sent DhcpInform\n"));
|
|
}
|
|
}
|
|
|
|
StartTime = time(NULL);
|
|
while ( TRUE ) { // wiat for the specified wait time
|
|
MessageSize = DHCP_RECV_MESSAGE_SIZE;
|
|
|
|
DhcpPrint((DEBUG_TRACE, "Waiting for ACK[Xid=%x]: %ld seconds\n",Xid, TimeToWait));
|
|
Error = GetSpecifiedMadcapMessage( // try to receive an ACK
|
|
DhcpContext,
|
|
&MessageSize,
|
|
Xid,
|
|
(DWORD)TimeToWait
|
|
);
|
|
if ( Error == ERROR_TIMEOUT ) break;
|
|
if( Error != ERROR_SUCCESS ) {
|
|
DhcpPrint((DEBUG_ERRORS, "GetSpecifiedMadcapMessage: %ld\n", Error));
|
|
goto Cleanup;
|
|
}
|
|
|
|
MadcapExtractOptions( // Need to see if this is an ACK
|
|
DhcpContext,
|
|
(LPBYTE)&DhcpContext->MadcapMessageBuffer->Option,
|
|
MessageSize - MADCAP_MESSAGE_FIXED_PART_SIZE,
|
|
&MadcapOptions, // check for only expected options
|
|
NULL, // unused
|
|
0 // unused
|
|
);
|
|
|
|
GotAck = AcceptMadcapMsg( // check up and see if we find this offer kosher
|
|
MADCAP_INFORM_MESSAGE,
|
|
DhcpContext,
|
|
&MadcapOptions,
|
|
0,
|
|
&Error
|
|
);
|
|
|
|
if (GotAck) {
|
|
ULONG i;
|
|
|
|
for( i = 0; i < MessageCount ; i ++ ) {
|
|
if( MadcapServers[i] == *MadcapOptions.ServerIdentifier ) {
|
|
break;
|
|
}
|
|
}
|
|
|
|
if( i == MessageCount && MessageCount < MIN_ACKS_FOR_INFORM ) {
|
|
MessageCount ++;
|
|
MadcapServers[i] = *MadcapOptions.ServerIdentifier;
|
|
}
|
|
|
|
DhcpPrint((DEBUG_TRACE, "Received %ld ACKS so far\n", MessageCount));
|
|
MadcapExtractOptions( // do FULL options..
|
|
DhcpContext,
|
|
(LPBYTE)&DhcpContext->MadcapMessageBuffer->Option,
|
|
MessageSize - MADCAP_MESSAGE_FIXED_PART_SIZE,
|
|
&MadcapOptions,
|
|
&(DhcpContext->RecdOptionsList),
|
|
*MadcapOptions.ServerIdentifier
|
|
);
|
|
}
|
|
|
|
TimeNow = time(NULL); // Reset the time values to reflect new time
|
|
if( TimeToWait < (TimeNow - StartTime) ) {
|
|
break; // no more time left to wait..
|
|
}
|
|
TimeToWait -= (TimeNow - StartTime); // recalculate time now
|
|
StartTime = TimeNow; // reset start time also
|
|
} // end of while ( TimeToWait > 0)
|
|
|
|
|
|
if( MessageCount >= MIN_ACKS_FOR_INFORM ) goto Cleanup;
|
|
if( RoundNum != 0 && MessageCount != 0 ) goto Cleanup;
|
|
|
|
TimeToWait = MADCAP_QUERY_SCOPE_LIST_TIME ;
|
|
} // for (RoundNum = 0; RoundNum < nInformsToSend ; RoundNum ++ )
|
|
|
|
Cleanup:
|
|
CloseDhcpSocket(DhcpContext);
|
|
if( MessageCount ) Error = ERROR_SUCCESS;
|
|
DhcpPrint((DEBUG_PROTOCOL, "MadcapDoInform: got %d ACKS (returning %ld)\n", MessageCount,Error));
|
|
return Error;
|
|
}
|
|
|
|
DWORD
|
|
CopyMScopeList(
|
|
IN OUT PMCAST_SCOPE_ENTRY pScopeList,
|
|
IN OUT PDWORD pScopeLen,
|
|
OUT PDWORD pScopeCount
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine obtains the multicast scope list from the Madcap
|
|
server. It sends DHCPINFORM to Madcap multicast address and
|
|
collects all the responses.
|
|
|
|
Arguments:
|
|
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
PMCAST_SCOPE_ENTRY pScopeSource;
|
|
DWORD i;
|
|
|
|
LOCK_MSCOPE_LIST();
|
|
if ( *pScopeLen >= gMadcapScopeList->ScopeLen ) {
|
|
RtlCopyMemory( pScopeList, gMadcapScopeList->pScopeBuf, gMadcapScopeList->ScopeLen );
|
|
*pScopeLen = gMadcapScopeList->ScopeLen;
|
|
*pScopeCount = gMadcapScopeList->ScopeCount;
|
|
// remember the start pointer because we need to remap all the buffers into client space.
|
|
pScopeSource = gMadcapScopeList->pScopeBuf;
|
|
|
|
UNLOCK_MSCOPE_LIST();
|
|
// now remap UNICODE_STRING scope desc to client address space.
|
|
for (i=0;i<*pScopeCount;i++) {
|
|
pScopeList[i].ScopeDesc.Buffer = (USHORT *) ((PBYTE)pScopeList +
|
|
((PBYTE)pScopeList[i].ScopeDesc.Buffer - (PBYTE)pScopeSource));
|
|
}
|
|
|
|
return ERROR_SUCCESS;
|
|
} else {
|
|
UNLOCK_MSCOPE_LIST();
|
|
return ERROR_INSUFFICIENT_BUFFER;
|
|
}
|
|
|
|
}
|
|
|
|
|
|
DWORD
|
|
StoreMScopeList(
|
|
IN PDHCP_CONTEXT pContext,
|
|
IN BOOL NewList
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine stores the scope list it retrieved from the inform requests
|
|
into the global scope list..
|
|
|
|
the scope option is of the following form.
|
|
|
|
---------------------------------
|
|
| code (2 byte) | length (2byte)|
|
|
---------------------------------
|
|
| count ( 4 bytes ) |
|
|
---------------------------------
|
|
| Scope list
|
|
---------------------------------
|
|
|
|
where scope list is of the following form
|
|
|
|
--------------------------------------------------------------------------
|
|
| scope ID(4 byte) | Last Addr(4/16) |TTL(1) | Count (1) | Description...|
|
|
--------------------------------------------------------------------------
|
|
|
|
where scope description is of the following form
|
|
|
|
|
|
Language Tag
|
|
--------------------------------------------------------------
|
|
| Flags(1) | Tag Length(1) | Tag...| Name Length(1) | Name...|
|
|
--------------------------------------------------------------
|
|
Arguments:
|
|
|
|
pContext - pointer to the context to be used during inform
|
|
|
|
NewList - TRUE if a new list is to be created o/w prepend the
|
|
current list.
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
PBYTE pOptBuf;
|
|
PBYTE pOptBufEnd;
|
|
PLIST_ENTRY pOptionList;
|
|
PDHCP_OPTION pScopeOption, pFirstOption, pPrevOption;
|
|
DWORD TotalNewScopeDescLen;
|
|
DWORD TotalNewScopeCount;
|
|
DWORD TotalNewScopeListMem;
|
|
PMCAST_SCOPE_LIST pScopeList;
|
|
PMCAST_SCOPE_ENTRY pNextScope;
|
|
LPWSTR pNextUnicodeBuf;
|
|
DWORD TotalCurrScopeListMem;
|
|
DWORD TotalCurrScopeCount;
|
|
DWORD Error;
|
|
DWORD IpAddrLen;
|
|
BOOL WellFormed;
|
|
|
|
// MBUG - make sure we collect options from all the servers when
|
|
// we do dhcpinform.
|
|
|
|
// initialize variables.
|
|
TotalNewScopeCount = TotalCurrScopeCount = 0;
|
|
TotalNewScopeDescLen = 0;
|
|
pScopeList = NULL;
|
|
Error = ERROR_SUCCESS;
|
|
|
|
LOCK_MSCOPE_LIST();
|
|
if (FALSE == NewList) {
|
|
TotalCurrScopeListMem = gMadcapScopeList->ScopeLen;
|
|
TotalCurrScopeCount = gMadcapScopeList->ScopeCount;
|
|
DhcpPrint(( DEBUG_API, "StoreMScopeList: appending to CurrScopeLen %ld, ScopeCount %ld\n",
|
|
gMadcapScopeList->ScopeLen, gMadcapScopeList->ScopeCount ));
|
|
}
|
|
|
|
|
|
|
|
// First calculate the space required for the scope list.
|
|
// pFirstOption is used to track that we traverse the list only once
|
|
pOptionList = &pContext->RecdOptionsList;
|
|
pFirstOption = NULL;
|
|
WellFormed = TRUE;
|
|
while ( ( pScopeOption = DhcpFindOption(
|
|
pOptionList,
|
|
MADCAP_OPTION_MCAST_SCOPE_LIST,
|
|
FALSE,
|
|
NULL,
|
|
0,
|
|
0 //dont care about serverid
|
|
)) &&
|
|
( pScopeOption != pFirstOption ) ) {
|
|
DWORD ScopeCount;
|
|
DWORD i;
|
|
|
|
// point to the next entry in the list.
|
|
pOptionList = &pScopeOption->OptionList;
|
|
|
|
// set the pFirstOption if it is not set already.
|
|
if ( !pFirstOption ) {
|
|
pFirstOption = pScopeOption;
|
|
IpAddrLen = (pScopeOption->OptionVer.Proto == PROTO_MADCAP_V6 ? 16 : 4);
|
|
}
|
|
|
|
// if the last option was not well formatted from the list
|
|
// then remove it from the list.
|
|
if (!WellFormed) {
|
|
DhcpDelOption(pPrevOption);
|
|
|
|
//we may need to reset first option pointer.
|
|
if (pPrevOption == pFirstOption) {
|
|
pFirstOption = pScopeOption;
|
|
}
|
|
} else {
|
|
|
|
WellFormed = FALSE; // set it back to false for this iteration.
|
|
}
|
|
// save the prev option pointer
|
|
pPrevOption = pScopeOption;
|
|
|
|
pOptBuf = pScopeOption->Data;
|
|
pOptBufEnd = pScopeOption->Data + pScopeOption->DataLen;
|
|
|
|
ScopeCount = 0;
|
|
|
|
// Read the scope count
|
|
if ( pOptBuf < pOptBufEnd ) {
|
|
ScopeCount = *pOptBuf;
|
|
pOptBuf ++;
|
|
}
|
|
else continue;
|
|
|
|
for ( i=0;i<ScopeCount;i++ ) {
|
|
DWORD ScopeDescLen;
|
|
DWORD ScopeDescWLen;
|
|
PBYTE pScopeDesc;
|
|
DWORD NameCount, TagLen;
|
|
// skip the scopeid, last addr and ttl
|
|
pOptBuf += (2*IpAddrLen + 1);
|
|
// read name count
|
|
if (pOptBuf < pOptBufEnd) {
|
|
NameCount = *pOptBuf;
|
|
pOptBuf++;
|
|
} else break;
|
|
if (0 == NameCount) {
|
|
break;
|
|
}
|
|
do {
|
|
// Skip flags
|
|
pOptBuf++;
|
|
// read language tag len
|
|
if (pOptBuf < pOptBufEnd) {
|
|
TagLen = *pOptBuf;
|
|
pOptBuf++;
|
|
}else break;
|
|
|
|
// skip the tag
|
|
pOptBuf += TagLen;
|
|
// Read the name length
|
|
if (pOptBuf < pOptBufEnd) {
|
|
ScopeDescLen = *pOptBuf;
|
|
ScopeDescWLen = ConvertUTF8ToUnicode(pOptBuf+1, *pOptBuf, NULL, 0);
|
|
pOptBuf ++;
|
|
} else break;
|
|
|
|
// pick the scope name
|
|
pScopeDesc = pOptBuf;
|
|
pOptBuf += ScopeDescLen;
|
|
}while(--NameCount);
|
|
|
|
// if formatted correctly namecount should drop to 0
|
|
if (0 != NameCount) {
|
|
break;
|
|
}
|
|
// update total desc len count.
|
|
if ( pOptBuf <= pOptBufEnd ) {
|
|
if (pScopeDesc[ScopeDescLen-1]) { // if not NULL terminated.
|
|
ScopeDescWLen++;
|
|
}
|
|
TotalNewScopeDescLen += ScopeDescWLen * sizeof(WCHAR);
|
|
TotalNewScopeCount++;
|
|
// Set the wellformed to true so that this option stays
|
|
WellFormed = TRUE;
|
|
}
|
|
else break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ( !TotalNewScopeCount ) {
|
|
DhcpPrint((DEBUG_ERRORS, "StoreMScopeList - no scopes found in the options, bad format..\n"));
|
|
Error = ERROR_BAD_FORMAT;
|
|
goto Cleanup;
|
|
}
|
|
|
|
DhcpPrint(( DEBUG_API, "TotalNewScopeCount %d, TotalNewScopeDescLen %d\n",TotalNewScopeCount,TotalNewScopeDescLen));
|
|
|
|
// now allocate the memory.
|
|
TotalNewScopeListMem = ROUND_UP_COUNT( sizeof(MCAST_SCOPE_LIST) + // scope list struct
|
|
sizeof(MCAST_SCOPE_ENTRY) * (TotalNewScopeCount -1),
|
|
ALIGN_WORST) + // scope buffers.
|
|
TotalNewScopeDescLen; // scope descriptors,
|
|
|
|
if (FALSE == NewList) {
|
|
TotalNewScopeListMem += TotalCurrScopeListMem;
|
|
TotalNewScopeCount += TotalCurrScopeCount;
|
|
}
|
|
pScopeList = DhcpAllocateMemory( TotalNewScopeListMem );
|
|
if ( !pScopeList ) {
|
|
UNLOCK_MSCOPE_LIST();
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
}
|
|
|
|
RtlZeroMemory( pScopeList, TotalNewScopeListMem );
|
|
|
|
pScopeList->ScopeCount = 0; // we will fill this up as we go.
|
|
pScopeList->ScopeLen = TotalNewScopeListMem - sizeof(MCAST_SCOPE_LIST) + sizeof(MCAST_SCOPE_ENTRY);
|
|
|
|
// set the first scope pointer.
|
|
pNextScope = pScopeList->pScopeBuf;
|
|
|
|
// unicode strings starts after all the fixed sized scope structures.
|
|
pNextUnicodeBuf = (LPWSTR)((PBYTE)pScopeList +
|
|
ROUND_UP_COUNT( sizeof(MCAST_SCOPE_LIST) + // scope list struct
|
|
sizeof(MCAST_SCOPE_ENTRY) * (TotalNewScopeCount -1),
|
|
ALIGN_WORST)); // scope buffers.
|
|
|
|
DhcpPrint(( DEBUG_API, "ScopeList %lx TotalNewScopeListMem %d, ScopeDescBuff %lx\n",
|
|
pScopeList, TotalNewScopeListMem,pNextUnicodeBuf));
|
|
// now repeat the loop and fill up the scopelist.
|
|
pOptionList = &pContext->RecdOptionsList;
|
|
pFirstOption = NULL;
|
|
|
|
while ( ( pScopeOption = DhcpFindOption(
|
|
pOptionList,
|
|
MADCAP_OPTION_MCAST_SCOPE_LIST,
|
|
FALSE,
|
|
NULL,
|
|
0,
|
|
0 //dont care about serverid
|
|
)) &&
|
|
( pScopeOption != pFirstOption ) ) {
|
|
DWORD ScopeCount;
|
|
DWORD i;
|
|
DHCP_IP_ADDRESS ServerIpAddr;
|
|
|
|
// point to the next entry in the list.
|
|
pOptionList = &pScopeOption->OptionList;
|
|
|
|
// set the pFirstOption if it is not set already.
|
|
if ( !pFirstOption ) {
|
|
pFirstOption = pScopeOption;
|
|
}
|
|
|
|
pOptBuf = pScopeOption->Data;
|
|
DhcpPrint(( DEBUG_API, "MScopeOption - Data %lx\n", pOptBuf ));
|
|
pOptBufEnd = pScopeOption->Data + pScopeOption->DataLen;
|
|
|
|
|
|
// store ipaddr
|
|
ServerIpAddr = pScopeOption->ServerId;
|
|
DhcpPrint(( DEBUG_API, "MScopeOption - ServerIpAddr %lx\n", ServerIpAddr ));
|
|
|
|
// read the scope count.
|
|
ScopeCount = *pOptBuf; pOptBuf++;
|
|
DhcpPrint(( DEBUG_API, "MScopeOption - ScopeCount %ld\n", ScopeCount ));
|
|
|
|
for ( i=0;i<ScopeCount;i++ ) {
|
|
BYTE ScopeDescLen;
|
|
PBYTE pScopeDesc;
|
|
IPNG_ADDRESS ScopeID, LastAddr;
|
|
DWORD NameCount, TagLen;
|
|
DWORD TTL;
|
|
|
|
// read the scopeid, last addr.
|
|
RtlZeroMemory (&ScopeID, sizeof (ScopeID));
|
|
RtlCopyMemory (&ScopeID, pOptBuf, IpAddrLen);
|
|
pOptBuf += IpAddrLen;
|
|
|
|
RtlZeroMemory (&LastAddr, sizeof (ScopeID));
|
|
RtlCopyMemory (&LastAddr, pOptBuf, IpAddrLen);
|
|
pOptBuf += IpAddrLen;
|
|
|
|
DhcpPrint(( DEBUG_API, "MScopeOption - ScopeID %lx\n", ntohl(ScopeID.IpAddrV4) ));
|
|
DhcpPrint(( DEBUG_API, "MScopeOption - LastAddr %lx\n", ntohl(LastAddr.IpAddrV4) ));
|
|
|
|
TTL = *pOptBuf++;
|
|
NameCount = *pOptBuf++;
|
|
|
|
while (NameCount--) {
|
|
// MBUG ignore the flags for now
|
|
pOptBuf++;
|
|
TagLen = *pOptBuf++;
|
|
// MBUG ignore lang tag also
|
|
pOptBuf += TagLen;
|
|
ScopeDescLen = *pOptBuf++;
|
|
pScopeDesc = pOptBuf;
|
|
DhcpPrint(( DEBUG_API, "MScopeOption - ScopeDesc %lx ScopeDescLen %ld\n", pScopeDesc, ScopeDescLen ));
|
|
|
|
pOptBuf += ScopeDescLen;
|
|
}
|
|
|
|
if ( ScopeDescLen ) {
|
|
BYTE ScopeDescWLen;
|
|
WORD MaximumLength;
|
|
/* CHAR DescAnsi[256];
|
|
WORD MaximumLength;
|
|
RtlCopyMemory(DescAnsi, pScopeDesc, ScopeDescLen );
|
|
// null terminate it if necessary.
|
|
if ( pScopeDesc[ScopeDescLen - 1] ) {
|
|
DescAnsi[ScopeDescLen] = '\0';
|
|
MaximumLength = (ScopeDescLen + 1) * sizeof(WCHAR);
|
|
} else {
|
|
MaximumLength = (ScopeDescLen) * sizeof(WCHAR);
|
|
}
|
|
pNextUnicodeBuf = DhcpOemToUnicode( DescAnsi, pNextUnicodeBuf ); */
|
|
ScopeDescWLen = (BYTE)ConvertUTF8ToUnicode(pScopeDesc, ScopeDescLen, pNextUnicodeBuf, TotalNewScopeDescLen);
|
|
if ( pNextUnicodeBuf[ScopeDescWLen - 1] ) {
|
|
pNextUnicodeBuf[ScopeDescWLen] = L'\0';
|
|
MaximumLength = (ScopeDescWLen + 1) * sizeof(WCHAR);
|
|
} else {
|
|
MaximumLength = (ScopeDescWLen) * sizeof(WCHAR);
|
|
}
|
|
TotalNewScopeDescLen -= MaximumLength;
|
|
DhcpPrint(( DEBUG_API, "MScopeOption - UnicodeScopeDesc %lx %ws\n",pNextUnicodeBuf, pNextUnicodeBuf));
|
|
RtlInitUnicodeString(&pNextScope->ScopeDesc, pNextUnicodeBuf );
|
|
pNextScope->ScopeDesc.MaximumLength = MaximumLength;
|
|
pNextUnicodeBuf = (LPWSTR)((PBYTE)pNextUnicodeBuf + MaximumLength);
|
|
DhcpAssert((PBYTE)pNextUnicodeBuf <= ((PBYTE)pScopeList + TotalNewScopeListMem));
|
|
} else {
|
|
// set the unicode descriptor string to NULL;
|
|
pNextScope->ScopeDesc.Length = pNextScope->ScopeDesc.MaximumLength = 0;
|
|
pNextScope->ScopeDesc.Buffer = NULL;
|
|
}
|
|
// everything looks good, now fill up the NextScope
|
|
pNextScope->ScopeCtx.ScopeID = ScopeID;
|
|
pNextScope->ScopeCtx.ServerID.IpAddrV4 = ServerIpAddr;
|
|
pNextScope->ScopeCtx.Interface.IpAddrV4 = pContext->IpAddress;
|
|
pNextScope->LastAddr = LastAddr;
|
|
pNextScope->TTL = TTL;
|
|
|
|
pNextScope++;
|
|
pScopeList->ScopeCount++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
DhcpAssert( pScopeList->ScopeCount == (TotalNewScopeCount - TotalCurrScopeCount) );
|
|
|
|
// now append the previous scope list if exist.
|
|
if (FALSE == NewList) {
|
|
DWORD CurrScopeCount;
|
|
PMCAST_SCOPE_ENTRY CurrScopeNextPtr;
|
|
|
|
CurrScopeCount = gMadcapScopeList->ScopeCount;
|
|
CurrScopeNextPtr = gMadcapScopeList->pScopeBuf;
|
|
while(CurrScopeCount--) {
|
|
*pNextScope = *CurrScopeNextPtr;
|
|
// now copy the unicode strings also.
|
|
RtlCopyMemory( pNextUnicodeBuf, CurrScopeNextPtr->ScopeDesc.Buffer, CurrScopeNextPtr->ScopeDesc.MaximumLength);
|
|
pNextScope->ScopeDesc.Buffer = pNextUnicodeBuf ;
|
|
|
|
pNextUnicodeBuf = (LPWSTR)((PBYTE)pNextUnicodeBuf + CurrScopeNextPtr->ScopeDesc.MaximumLength);
|
|
pNextScope++; CurrScopeNextPtr++;
|
|
}
|
|
pScopeList->ScopeCount += gMadcapScopeList->ScopeCount;
|
|
DhcpAssert( pScopeList->ScopeCount == TotalNewScopeCount);
|
|
}
|
|
// Finally copy this buffer to our global pointer.
|
|
// first free the existing list.
|
|
if (gMadcapScopeList) DhcpFreeMemory( gMadcapScopeList );
|
|
gMadcapScopeList = pScopeList;
|
|
|
|
|
|
|
|
Cleanup:
|
|
|
|
UNLOCK_MSCOPE_LIST();
|
|
return Error;
|
|
}
|
|
|
|
DWORD
|
|
ObtainMScopeList(
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine obtains the multicast scope list from the Madcap
|
|
server. It sends DHCPINFORM to Madcap multicast address and
|
|
collects all the responses.
|
|
|
|
Arguments:
|
|
|
|
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
MCAST_CLIENT_UID RequestID;
|
|
BYTE IDBuf[MCAST_CLIENT_ID_LEN];
|
|
PDHCP_CONTEXT pContext;
|
|
DWORD Error;
|
|
PMIB_IPADDRTABLE pIpAddrTable;
|
|
PLOCAL_CONTEXT_INFO localInfo;
|
|
DWORD i;
|
|
BOOL NewList;
|
|
|
|
pContext = NULL;
|
|
Error = ERROR_SUCCESS;
|
|
pIpAddrTable = NULL;
|
|
|
|
if ( !ShouldRequeryMScopeList() ) {
|
|
return ERROR_SUCCESS;
|
|
} else {
|
|
RequestID.ClientUID = IDBuf;
|
|
RequestID.ClientUIDLength = MCAST_CLIENT_ID_LEN;
|
|
|
|
Error = GenMadcapClientUID( RequestID.ClientUID, &RequestID.ClientUIDLength );
|
|
if ( ERROR_SUCCESS != Error)
|
|
goto Exit;
|
|
|
|
Error = CreateMadcapContext(&pContext, &RequestID, INADDR_ANY );
|
|
if ( ERROR_SUCCESS != Error )
|
|
goto Exit;
|
|
APICTXT_ENABLED(pContext); // mark the context as being created by the API
|
|
|
|
localInfo = pContext->LocalInformation;
|
|
|
|
// now get primary ipaddresses on each adapter.
|
|
|
|
Error = GetIpPrimaryAddresses(&pIpAddrTable);
|
|
if ( ERROR_SUCCESS != Error ) {
|
|
goto Exit;
|
|
}
|
|
|
|
DhcpPrint((DEBUG_API, "ObtainMScopeList: ipaddress table has %d addrs\n",
|
|
pIpAddrTable->dwNumEntries));
|
|
|
|
NewList = TRUE;
|
|
Error = ERROR_TIMEOUT;
|
|
for (i = 0; i < pIpAddrTable->dwNumEntries; i++) {
|
|
DWORD LocalError;
|
|
PMIB_IPADDRROW pAddrRow;
|
|
|
|
pAddrRow = &pIpAddrTable->table[i];
|
|
// if primary bit set this is a primary address.
|
|
if (0 == (pAddrRow->wType & MIB_IPADDR_PRIMARY) ||
|
|
0 == pAddrRow->dwAddr ||
|
|
htonl(INADDR_LOOPBACK) == pAddrRow->dwAddr) {
|
|
continue;
|
|
}
|
|
|
|
DhcpPrint((DEBUG_API, "ObtainMScopeList: DoInform on %s interface\n",
|
|
DhcpIpAddressToDottedString(ntohl(pAddrRow->dwAddr)) ));
|
|
|
|
LocalError = ReInitializeMadcapSocket(&localInfo->Socket, pAddrRow->dwAddr);
|
|
if (ERROR_SUCCESS != LocalError) {
|
|
continue;
|
|
}
|
|
pContext->IpAddress = pAddrRow->dwAddr;
|
|
// now do the inform and get scope list.
|
|
LocalError = MadcapDoInform(pContext);
|
|
if ( ERROR_SUCCESS == LocalError ) {
|
|
// now copy the scope list.
|
|
LocalError = StoreMScopeList(pContext, NewList);
|
|
if (ERROR_SUCCESS == LocalError ) {
|
|
NewList = FALSE;
|
|
Error = ERROR_SUCCESS;
|
|
}
|
|
}
|
|
|
|
LOCK_OPTIONS_LIST();
|
|
DhcpDestroyOptionsList(&pContext->SendOptionsList, &DhcpGlobalClassesList);
|
|
DhcpDestroyOptionsList(&pContext->RecdOptionsList, &DhcpGlobalClassesList);
|
|
UNLOCK_OPTIONS_LIST();
|
|
|
|
}
|
|
|
|
Exit:
|
|
// signal the thread could be waiting on this.
|
|
LOCK_MSCOPE_LIST();
|
|
gMScopeQueryInProgress = FALSE;
|
|
UNLOCK_MSCOPE_LIST();
|
|
|
|
SetEvent( gMScopeQueryEvent );
|
|
|
|
if ( pContext ) {
|
|
DhcpDestroyContext( pContext );
|
|
}
|
|
|
|
if (pIpAddrTable) {
|
|
DhcpFreeMemory( pIpAddrTable );
|
|
}
|
|
return Error;
|
|
}
|
|
|
|
|
|
}
|
|
|
|
DWORD
|
|
GenMadcapClientUID(
|
|
OUT PBYTE pRequestID,
|
|
IN OUT PDWORD pRequestIDLen
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine generates a client UID.
|
|
|
|
Arguments:
|
|
|
|
pRequestID - pointer where client UID is to be stored.
|
|
|
|
pRequestIDLen - pointer where the length of request id is stored.
|
|
|
|
Return Value:
|
|
|
|
|
|
--*/
|
|
|
|
{
|
|
PULONG UID;
|
|
RPC_STATUS Status;
|
|
GUID RequestGuid;
|
|
|
|
DhcpAssert( pRequestID && pRequestIDLen );
|
|
|
|
if (*pRequestIDLen < MCAST_CLIENT_ID_LEN) {
|
|
DhcpPrint((DEBUG_ERRORS,"GenMadcapId - IDLen too small, %ld\n", *pRequestIDLen ));
|
|
return ERROR_INVALID_PARAMETER;
|
|
}
|
|
Status = UuidCreate( &RequestGuid );
|
|
if (Status != RPC_S_OK) {
|
|
Status = ERROR_LUIDS_EXHAUSTED;
|
|
}
|
|
*pRequestID++ = 0; // first octet is type and for guid the type is 0
|
|
*((GUID UNALIGNED *)pRequestID) = RequestGuid;
|
|
return Status;
|
|
}
|
|
|
|
|
|
DWORD
|
|
ObtainMadcapAddress(
|
|
IN PDHCP_CONTEXT DhcpContext,
|
|
IN PIPNG_ADDRESS pScopeID,
|
|
IN PMCAST_LEASE_REQUEST pAddrRequest,
|
|
IN OUT PMCAST_LEASE_RESPONSE pAddrResponse
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine attempts to obtains a new lease from a DHCP server.
|
|
|
|
Arguments:
|
|
|
|
DhcpContext - Points to a DHCP context block for the NIC to initialize.
|
|
|
|
MadcapOptions - Returns DHCP options returned by the DHCP server.
|
|
|
|
Return Value:
|
|
|
|
|
|
--*/
|
|
{
|
|
MADCAP_OPTIONS MadcapOptions;
|
|
DATE_TIME HostOrderLeaseTime;
|
|
DWORD Error;
|
|
time_t StartTime;
|
|
time_t InitialStartTime;
|
|
time_t TimeNow;
|
|
time_t TimeToWait;
|
|
DWORD Xid;
|
|
DWORD RoundNum;
|
|
DWORD MessageSize;
|
|
DWORD SelectedServer;
|
|
DWORD SelectedAddress;
|
|
DWORD LeaseExpiryTime;
|
|
BOOL GotOffer;
|
|
PMCAST_LEASE_REQUEST pRenewRequest;
|
|
|
|
Xid = 0; // generate xid on first send. keep it same throughout
|
|
SelectedServer = (DWORD)-1;
|
|
SelectedAddress = (DWORD)-1;
|
|
GotOffer = FALSE;
|
|
InitialStartTime = time(NULL);
|
|
Error = ERROR_SEM_TIMEOUT;
|
|
|
|
// Make private copy of the request so that we don't modify original request.
|
|
pRenewRequest = DhcpAllocateMemory(
|
|
sizeof(*pAddrRequest) +
|
|
sizeof(DWORD)*(pAddrRequest->AddrCount));
|
|
if (NULL == pRenewRequest) {
|
|
return ERROR_NOT_ENOUGH_MEMORY;
|
|
}
|
|
memcpy(pRenewRequest,pAddrRequest,sizeof(*pAddrRequest) );
|
|
pRenewRequest->pAddrBuf = (PBYTE)pRenewRequest + sizeof(*pRenewRequest);
|
|
if (pAddrRequest->pAddrBuf) {
|
|
memcpy(pRenewRequest->pAddrBuf, pAddrRequest->pAddrBuf, sizeof(DWORD)*(pAddrRequest->AddrCount));
|
|
}
|
|
|
|
for (RoundNum = 0; RoundNum < MADCAP_MAX_RETRIES; RoundNum++ ) {
|
|
Error = SendMadcapDiscover( // send a discover packet
|
|
DhcpContext,
|
|
pScopeID,
|
|
pAddrRequest,
|
|
&Xid
|
|
);
|
|
if ( Error != ERROR_SUCCESS ) { // can't really fail here
|
|
DhcpPrint((DEBUG_ERRORS, "Send Dhcp Discover failed, %ld.\n", Error));
|
|
return Error ;
|
|
}
|
|
|
|
DhcpPrint((DEBUG_PROTOCOL, "Sent DhcpDiscover Message.\n"));
|
|
|
|
TimeToWait = DhcpCalculateWaitTime(RoundNum, NULL);
|
|
StartTime = time(NULL);
|
|
|
|
while ( TimeToWait > 0 ) { // wait for specified time
|
|
MessageSize = DHCP_RECV_MESSAGE_SIZE;
|
|
|
|
DhcpPrint((DEBUG_TRACE, "Waiting for Offer: %ld seconds\n", TimeToWait));
|
|
Error = GetSpecifiedMadcapMessage( // try to receive an offer
|
|
DhcpContext,
|
|
&MessageSize,
|
|
Xid,
|
|
(DWORD)TimeToWait
|
|
);
|
|
|
|
if ( Error == ERROR_TIMEOUT ) { // get out and try another discover
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Dhcp offer receive Timeout.\n" ));
|
|
break;
|
|
}
|
|
|
|
if ( ERROR_SUCCESS != Error ) { // unexpected error
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Dhcp Offer receive failed, %ld.\n", Error ));
|
|
return Error ;
|
|
}
|
|
|
|
MadcapExtractOptions( // now extract basic information
|
|
DhcpContext,
|
|
(LPBYTE)&DhcpContext->MadcapMessageBuffer->Option,
|
|
MessageSize - MADCAP_MESSAGE_FIXED_PART_SIZE,
|
|
&MadcapOptions,
|
|
NULL,
|
|
0
|
|
);
|
|
|
|
GotOffer = AcceptMadcapMsg( // check up and see if we find this offer kosher
|
|
MADCAP_DISCOVER_MESSAGE,
|
|
DhcpContext,
|
|
&MadcapOptions,
|
|
0,
|
|
&Error
|
|
);
|
|
DhcpAssert(ERROR_SUCCESS == Error);
|
|
Error = ExpandMadcapAddressList(
|
|
MadcapOptions.AddrRangeList,
|
|
MadcapOptions.AddrRangeListSize,
|
|
(DWORD UNALIGNED *)pRenewRequest->pAddrBuf,
|
|
&pRenewRequest->AddrCount
|
|
);
|
|
if (ERROR_SUCCESS != Error) {
|
|
GotOffer = FALSE;
|
|
}
|
|
|
|
if (GotOffer) {
|
|
break;
|
|
}
|
|
|
|
TimeNow = time( NULL ); // calc the remaining wait time for this round
|
|
TimeToWait -= ((TimeNow - StartTime));
|
|
StartTime = TimeNow;
|
|
|
|
} // while (TimeToWait > 0 )
|
|
|
|
if(GotOffer) { // if we got an offer, everything should be fine
|
|
DhcpAssert(ERROR_SUCCESS == Error);
|
|
break;
|
|
}
|
|
|
|
} // for n tries... send discover.
|
|
|
|
if(!GotOffer ) { // did not get any valid offers
|
|
DhcpPrint((DEBUG_ERRORS, "ObtainMadcapAddress timed out\n"));
|
|
Error = ERROR_TIMEOUT ;
|
|
goto Cleanup;
|
|
}
|
|
|
|
DhcpPrint((DEBUG_PROTOCOL, "Successfully received a DhcpOffer (%s) ",
|
|
inet_ntoa(*(struct in_addr *)pRenewRequest->pAddrBuf) ));
|
|
|
|
DhcpPrint((DEBUG_PROTOCOL, "from %s.\n",
|
|
inet_ntoa(*(struct in_addr*)MadcapOptions.ServerIdentifier) ));
|
|
SelectedServer = *MadcapOptions.ServerIdentifier;
|
|
|
|
Error = RenewMadcapAddress(
|
|
DhcpContext,
|
|
pScopeID,
|
|
pRenewRequest,
|
|
pAddrResponse,
|
|
SelectedServer
|
|
);
|
|
Cleanup:
|
|
if (pRenewRequest) {
|
|
DhcpFreeMemory(pRenewRequest);
|
|
}
|
|
return Error;
|
|
}
|
|
|
|
DWORD
|
|
RenewMadcapAddress(
|
|
IN PDHCP_CONTEXT DhcpContext,
|
|
IN PIPNG_ADDRESS pScopeID,
|
|
IN PMCAST_LEASE_REQUEST pAddrRequest,
|
|
IN OUT PMCAST_LEASE_RESPONSE pAddrResponse,
|
|
IN DHCP_IP_ADDRESS SelectedServer
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine is called for two different purposes.
|
|
1. To request an address for which we got offer.
|
|
2. To renew an address.
|
|
|
|
Arguments:
|
|
|
|
DhcpContext - Points to a DHCP context block for the NIC to initialize.
|
|
|
|
pScopeID - ScopeId from which the address is to be renewed. for renewals
|
|
this is passed as null.
|
|
|
|
pAddrRequest - The lease info structure describing the request.
|
|
|
|
pAddrResponse - The lease info structure which receives the response data.
|
|
|
|
SelectedServer - If we are sending REQUEST message then this describes the server
|
|
from which we accepted the offer originally.
|
|
Return Value:
|
|
|
|
The status of the operation.
|
|
|
|
--*/
|
|
{
|
|
MADCAP_OPTIONS MadcapOptions;
|
|
DWORD Error;
|
|
DWORD Xid;
|
|
DWORD RoundNum;
|
|
size_t TimeToWait;
|
|
DWORD MessageSize;
|
|
DWORD LeaseTime;
|
|
DWORD LeaseExpiryTime;
|
|
time_t InitialStartTime;
|
|
time_t StartTime;
|
|
time_t TimeNow;
|
|
BOOL GotAck;
|
|
DATE_TIME HostOrderLeaseTime;
|
|
BOOL Renew;
|
|
|
|
Xid = 0; // new Xid will be generated first time
|
|
InitialStartTime = time(NULL);
|
|
GotAck = FALSE;
|
|
Error = ERROR_TIMEOUT;
|
|
|
|
Renew = (0 == SelectedServer);
|
|
for ( RoundNum = 0; RoundNum < MADCAP_MAX_RETRIES; RoundNum ++ ) {
|
|
if (Renew) {
|
|
Error = SendMadcapRenew(
|
|
DhcpContext,
|
|
pAddrRequest,
|
|
&Xid
|
|
);
|
|
} else {
|
|
Error = SendMadcapRequest( // send a request
|
|
DhcpContext,
|
|
pScopeID,
|
|
pAddrRequest,
|
|
SelectedServer, //
|
|
&Xid
|
|
);
|
|
}
|
|
|
|
if ( Error != ERROR_SUCCESS ) { // dont expect send to fail
|
|
DhcpPrint(( DEBUG_ERRORS,"Send request failed, %ld.\n", Error));
|
|
return Error ;
|
|
}
|
|
|
|
TimeToWait = DhcpCalculateWaitTime(RoundNum, NULL);
|
|
StartTime = time(NULL);
|
|
while ( TimeToWait > 0 ) { // try to recv message for this full period
|
|
MessageSize = DHCP_RECV_MESSAGE_SIZE;
|
|
Error = GetSpecifiedMadcapMessage( // expect to recv an ACK
|
|
DhcpContext,
|
|
&MessageSize,
|
|
Xid,
|
|
TimeToWait
|
|
);
|
|
|
|
if ( Error == ERROR_TIMEOUT ) { // No response, so resend DHCP REQUEST.
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Dhcp ACK receive Timeout.\n" ));
|
|
break;
|
|
}
|
|
|
|
if ( ERROR_SUCCESS != Error ) { // unexpected error
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Dhcp ACK receive failed, %ld.\n", Error ));
|
|
return Error ;
|
|
}
|
|
|
|
MadcapExtractOptions( // now extract basic information
|
|
DhcpContext,
|
|
(LPBYTE)&DhcpContext->MadcapMessageBuffer->Option,
|
|
MessageSize - MADCAP_MESSAGE_FIXED_PART_SIZE,
|
|
&MadcapOptions,
|
|
NULL,
|
|
0
|
|
);
|
|
|
|
GotAck = AcceptMadcapMsg( // check up and see if we find this offer kosher
|
|
Renew ? MADCAP_RENEW_MESSAGE : MADCAP_REQUEST_MESSAGE,
|
|
DhcpContext,
|
|
&MadcapOptions,
|
|
SelectedServer,
|
|
&Error
|
|
);
|
|
if (ERROR_SUCCESS != Error) {
|
|
return Error;
|
|
}
|
|
// check that the ack came from the same server as the selected server.
|
|
if ( SelectedServer && SelectedServer != *MadcapOptions.ServerIdentifier ) {
|
|
GotAck = FALSE;
|
|
}
|
|
Error = ExpandMadcapAddressList(
|
|
MadcapOptions.AddrRangeList,
|
|
MadcapOptions.AddrRangeListSize,
|
|
(DWORD UNALIGNED *)pAddrResponse->pAddrBuf,
|
|
&pAddrResponse->AddrCount
|
|
);
|
|
if (ERROR_SUCCESS != Error) {
|
|
GotAck = FALSE;
|
|
}
|
|
|
|
if ( GotAck ) {
|
|
break;
|
|
}
|
|
|
|
TimeNow = time( NULL );
|
|
TimeToWait -= (TimeNow - StartTime);
|
|
StartTime = TimeNow;
|
|
|
|
} // while time to wait
|
|
if(TRUE == GotAck) { // if we got an ack, everything must be good
|
|
DhcpAssert(ERROR_SUCCESS == Error); // cannot have any errors
|
|
break;
|
|
}
|
|
DhcpContext->SecondsSinceBoot = (DWORD)(time(NULL) - InitialStartTime);
|
|
} // for RoundNum < MAX_RETRIES
|
|
|
|
if(!GotAck) {
|
|
DhcpPrint((DEBUG_ERRORS, "RenewMadcapAddress timed out\n"));
|
|
return ERROR_TIMEOUT;
|
|
}
|
|
|
|
if (0 == SelectedServer ) SelectedServer = *MadcapOptions.ServerIdentifier;
|
|
if( MadcapOptions.LeaseTime ) LeaseTime = ntohl(*MadcapOptions.LeaseTime);
|
|
else LeaseTime = 0;
|
|
|
|
pAddrResponse->ServerAddress.IpAddrV4 = SelectedServer;
|
|
|
|
time( &TimeNow );
|
|
pAddrResponse->LeaseStartTime = (LONG)TimeNow;
|
|
pAddrResponse->LeaseEndTime = (LONG)(TimeNow+LeaseTime);
|
|
|
|
|
|
DhcpPrint((DEBUG_PROTOCOL, "Accepted ACK (%s) ",
|
|
inet_ntoa(*(struct in_addr *)pAddrResponse->pAddrBuf) ));
|
|
DhcpPrint((DEBUG_PROTOCOL, "from %s.\n",
|
|
inet_ntoa(*(struct in_addr *)&SelectedServer)));
|
|
DhcpPrint((DEBUG_PROTOCOL, "Lease is %ld secs.\n", LeaseTime));
|
|
|
|
return ERROR_SUCCESS;
|
|
}
|
|
|
|
|
|
|
|
DWORD
|
|
ReleaseMadcapAddress(
|
|
PDHCP_CONTEXT DhcpContext
|
|
)
|
|
/*++
|
|
|
|
Routine Description:
|
|
|
|
This routine to releases a lease for an IP address. Since the
|
|
packet we send is not responded to, we assume that the release
|
|
works.
|
|
|
|
Arguments:
|
|
|
|
DhcpContext - Points to a DHCP context block for the NIC to initialize.
|
|
|
|
Return Value:
|
|
|
|
None.
|
|
|
|
--*/
|
|
{
|
|
DWORD Xid;
|
|
MADCAP_OPTIONS MadcapOptions;
|
|
DWORD Error;
|
|
time_t StartTime;
|
|
time_t InitialStartTime;
|
|
time_t TimeNow;
|
|
time_t TimeToWait;
|
|
DWORD RoundNum;
|
|
DWORD MessageSize;
|
|
BOOL GotAck;
|
|
|
|
|
|
Xid = 0; // new Xid will be generated first time
|
|
GotAck = FALSE;
|
|
InitialStartTime = time(NULL);
|
|
Error = ERROR_TIMEOUT;
|
|
|
|
for (RoundNum = 0; RoundNum < MADCAP_MAX_RETRIES; RoundNum++ ) {
|
|
Error = SendMadcapRelease( // send a discover packet
|
|
DhcpContext,
|
|
&Xid
|
|
);
|
|
if ( Error != ERROR_SUCCESS ) { // can't really fail here
|
|
DhcpPrint((DEBUG_ERRORS, "Send Dhcp Release failed, %ld.\n", Error));
|
|
return Error ;
|
|
}
|
|
|
|
DhcpPrint((DEBUG_PROTOCOL, "Sent DhcpRelease Message.\n"));
|
|
|
|
TimeToWait = DhcpCalculateWaitTime(RoundNum, NULL);
|
|
StartTime = time(NULL);
|
|
|
|
while ( TimeToWait > 0 ) { // wait for specified time
|
|
MessageSize = DHCP_RECV_MESSAGE_SIZE;
|
|
|
|
DhcpPrint((DEBUG_TRACE, "Waiting for Ack: %ld seconds\n", TimeToWait));
|
|
Error = GetSpecifiedMadcapMessage( // try to receive an offer
|
|
DhcpContext,
|
|
&MessageSize,
|
|
Xid,
|
|
(DWORD)TimeToWait
|
|
);
|
|
|
|
if ( Error == ERROR_TIMEOUT ) { // get out and try another discover
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Dhcp Ack receive Timeout.\n" ));
|
|
break;
|
|
}
|
|
|
|
if ( ERROR_SUCCESS != Error ) { // unexpected error
|
|
DhcpPrint(( DEBUG_PROTOCOL, "Dhcp Ack receive failed, %ld.\n", Error ));
|
|
return Error ;
|
|
}
|
|
|
|
MadcapExtractOptions( // now extract basic information
|
|
DhcpContext,
|
|
(LPBYTE)&DhcpContext->MadcapMessageBuffer->Option,
|
|
MessageSize - MADCAP_MESSAGE_FIXED_PART_SIZE,
|
|
&MadcapOptions,
|
|
NULL,
|
|
0
|
|
);
|
|
|
|
GotAck = AcceptMadcapMsg( // check up and see if we find this offer kosher
|
|
MADCAP_RELEASE_MESSAGE,
|
|
DhcpContext,
|
|
&MadcapOptions,
|
|
DhcpContext->DhcpServerAddress,
|
|
&Error
|
|
);
|
|
DhcpAssert(ERROR_SUCCESS == Error);
|
|
if (GotAck) {
|
|
break;
|
|
}
|
|
|
|
TimeNow = time( NULL ); // calc the remaining wait time for this round
|
|
TimeToWait -= ((TimeNow - StartTime));
|
|
StartTime = TimeNow;
|
|
|
|
} // while (TimeToWait > 0 )
|
|
|
|
if(GotAck) { // if we got an offer, everything should be fine
|
|
DhcpAssert(ERROR_SUCCESS == Error);
|
|
break;
|
|
}
|
|
|
|
} // for n tries... send discover.
|
|
|
|
if(!GotAck ) { // did not get any valid offers
|
|
DhcpPrint((DEBUG_ERRORS, "MadcapReleaseAddress timed out\n"));
|
|
Error = ERROR_TIMEOUT ;
|
|
} else {
|
|
DhcpPrint((DEBUG_PROTOCOL, "Successfully released the address\n" ));
|
|
Error = ERROR_SUCCESS;
|
|
}
|
|
|
|
return Error;
|
|
}
|
|
|
|
|
|
|