WindowsEthernetTap.cpp 33 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959
  1. /*
  2. * ZeroTier One - Network Virtualization Everywhere
  3. * Copyright (C) 2011-2015 ZeroTier, Inc.
  4. *
  5. * This program is free software: you can redistribute it and/or modify
  6. * it under the terms of the GNU General Public License as published by
  7. * the Free Software Foundation, either version 3 of the License, or
  8. * (at your option) any later version.
  9. *
  10. * This program is distributed in the hope that it will be useful,
  11. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  12. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  13. * GNU General Public License for more details.
  14. *
  15. * You should have received a copy of the GNU General Public License
  16. * along with this program. If not, see <http://www.gnu.org/licenses/>.
  17. *
  18. * --
  19. *
  20. * ZeroTier may be used and distributed under the terms of the GPLv3, which
  21. * are available at: http://www.gnu.org/licenses/gpl-3.0.html
  22. *
  23. * If you would like to embed ZeroTier into a commercial application or
  24. * redistribute it in a modified binary form, please contact ZeroTier Networks
  25. * LLC. Start here: http://www.zerotier.com/
  26. */
  27. #include <stdio.h>
  28. #include <stdlib.h>
  29. #include <stdint.h>
  30. #include <string.h>
  31. #include <WinSock2.h>
  32. #include <Windows.h>
  33. #include <tchar.h>
  34. #include <winreg.h>
  35. #include <wchar.h>
  36. #include <ws2ipdef.h>
  37. #include <WS2tcpip.h>
  38. #include <IPHlpApi.h>
  39. #include <nldef.h>
  40. #include <netioapi.h>
  41. #include <atlbase.h>
  42. #include <netlistmgr.h>
  43. #include <nldef.h>
  44. #include <iostream>
  45. #include <set>
  46. #include "../node/Constants.hpp"
  47. #include "../node/Utils.hpp"
  48. #include "../node/Mutex.hpp"
  49. #include "WindowsEthernetTap.hpp"
  50. #include "OSUtils.hpp"
  51. #include "..\windows\TapDriver6\tap-windows.h"
  52. // ff:ff:ff:ff:ff:ff with no ADI
  53. //static const ZeroTier::MulticastGroup _blindWildcardMulticastGroup(ZeroTier::MAC(0xff),0);
  54. #define ZT_WINDOWS_CREATE_FAKE_DEFAULT_ROUTE
  55. namespace ZeroTier {
  56. namespace {
  57. class WindowsEthernetTapEnv
  58. {
  59. public:
  60. WindowsEthernetTapEnv()
  61. {
  62. #ifdef _WIN64
  63. is64Bit = TRUE;
  64. devcon = "\\devcon_x64.exe";
  65. tapDriverNdis5 = "\\tap-windows\\x64\\zttap200.inf";
  66. tapDriverNdis6 = "\\tap-windows\\x64\\zttap300.inf";
  67. #else
  68. is64Bit = FALSE;
  69. IsWow64Process(GetCurrentProcess(),&is64Bit);
  70. devcon = ((is64Bit == TRUE) ? "\\devcon_x64.exe" : "\\devcon_x86.exe");
  71. tapDriverNdis5 = ((is64Bit == TRUE) ? "\\tap-windows\\x64\\zttap200.inf" : "\\tap-windows\\x86\\zttap200.inf");
  72. tapDriverNdis6 = ((is64Bit == TRUE) ? "\\tap-windows\\x64\\zttap300.inf" : "\\tap-windows\\x86\\zttap300.inf");
  73. #endif
  74. }
  75. BOOL is64Bit;
  76. const char *devcon;
  77. const char *tapDriverNdis5;
  78. const char *tapDriverNdis6;
  79. };
  80. static const WindowsEthernetTapEnv WINENV;
  81. // Only create or delete devices one at a time
  82. static Mutex _systemTapInitLock;
  83. } // anonymous namespace
  84. WindowsEthernetTap::WindowsEthernetTap(
  85. const char *hp,
  86. const MAC &mac,
  87. unsigned int mtu,
  88. unsigned int metric,
  89. uint64_t nwid,
  90. const char *friendlyName,
  91. void (*handler)(void *,uint64_t,const MAC &,const MAC &,unsigned int,unsigned int,const void *,unsigned int),
  92. void *arg) :
  93. _handler(handler),
  94. _arg(arg),
  95. _mac(mac),
  96. _nwid(nwid),
  97. _tap(INVALID_HANDLE_VALUE),
  98. _injectSemaphore(INVALID_HANDLE_VALUE),
  99. _pathToHelpers(hp),
  100. _run(true),
  101. _initialized(false),
  102. _enabled(true)
  103. {
  104. char subkeyName[4096];
  105. char subkeyClass[4096];
  106. char data[4096];
  107. char tag[24];
  108. if (mtu > 2800)
  109. throw std::runtime_error("MTU too large for Windows tap");
  110. Mutex::Lock _l(_systemTapInitLock);
  111. // Use NDIS5 if it's installed, since we don't want to switch out the driver on
  112. // pre-existing installs (yet). We won't ship NDIS5 anymore so new installs will
  113. // use NDIS6.
  114. std::string tapDriverPath(_pathToHelpers + WINENV.tapDriverNdis5);
  115. const char *tapDriverName = "zttap200";
  116. if (::PathFileExistsA(tapDriverPath.c_str()) == FALSE) {
  117. tapDriverPath = _pathToHelpers + WINENV.tapDriverNdis6;
  118. tapDriverName = "zttap300";
  119. if (::PathFileExistsA(tapDriverPath.c_str()) == FALSE) {
  120. throw std::runtime_error("no tap driver available: cannot find zttap300.inf (NDIS6) or zttap200.inf (NDIS5) under home path");
  121. }
  122. }
  123. HKEY nwAdapters;
  124. if (RegOpenKeyExA(HKEY_LOCAL_MACHINE,"SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}",0,KEY_READ|KEY_WRITE,&nwAdapters) != ERROR_SUCCESS)
  125. throw std::runtime_error("unable to open registry key for network adapter enumeration");
  126. std::set<std::string> existingDeviceInstances;
  127. std::string mySubkeyName;
  128. // We "tag" registry entries with the network ID to identify persistent devices
  129. Utils::snprintf(tag,sizeof(tag),"%.16llx",(unsigned long long)nwid);
  130. // Look for the tap instance that corresponds with this network
  131. for(DWORD subkeyIndex=0;;++subkeyIndex) {
  132. DWORD type;
  133. DWORD dataLen;
  134. DWORD subkeyNameLen = sizeof(subkeyName);
  135. DWORD subkeyClassLen = sizeof(subkeyClass);
  136. FILETIME lastWriteTime;
  137. if (RegEnumKeyExA(nwAdapters,subkeyIndex,subkeyName,&subkeyNameLen,(DWORD *)0,subkeyClass,&subkeyClassLen,&lastWriteTime) == ERROR_SUCCESS) {
  138. type = 0;
  139. dataLen = sizeof(data);
  140. if (RegGetValueA(nwAdapters,subkeyName,"ComponentId",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS) {
  141. data[dataLen] = '\0';
  142. if (!strnicmp(data,"zttap",5)) {
  143. std::string instanceId;
  144. type = 0;
  145. dataLen = sizeof(data);
  146. if (RegGetValueA(nwAdapters,subkeyName,"NetCfgInstanceId",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS) {
  147. instanceId.assign(data,dataLen);
  148. existingDeviceInstances.insert(instanceId);
  149. }
  150. std::string instanceIdPath;
  151. type = 0;
  152. dataLen = sizeof(data);
  153. if (RegGetValueA(nwAdapters,subkeyName,"DeviceInstanceID",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS)
  154. instanceIdPath.assign(data,dataLen);
  155. if ((_netCfgInstanceId.length() == 0)&&(instanceId.length() != 0)&&(instanceIdPath.length() != 0)) {
  156. type = 0;
  157. dataLen = sizeof(data);
  158. if (RegGetValueA(nwAdapters,subkeyName,"_ZeroTierTapIdentifier",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS) {
  159. data[dataLen] = '\0';
  160. if (!strcmp(data,tag)) {
  161. _netCfgInstanceId = instanceId;
  162. _deviceInstanceId = instanceIdPath;
  163. mySubkeyName = subkeyName;
  164. break; // found it!
  165. }
  166. }
  167. }
  168. }
  169. }
  170. } else break; // no more subkeys or error occurred enumerating them
  171. }
  172. // If there is no device, try to create one
  173. bool creatingNewDevice = (_netCfgInstanceId.length() == 0);
  174. if (creatingNewDevice) {
  175. // Log devcon output to a file
  176. HANDLE devconLog = CreateFileA((_pathToHelpers + "\\devcon.log").c_str(),GENERIC_WRITE,FILE_SHARE_READ|FILE_SHARE_WRITE,NULL,OPEN_ALWAYS,FILE_ATTRIBUTE_NORMAL,NULL);
  177. if (devconLog != INVALID_HANDLE_VALUE)
  178. SetFilePointer(devconLog,0,0,FILE_END);
  179. // Execute devcon to create a new tap device
  180. STARTUPINFOA startupInfo;
  181. startupInfo.cb = sizeof(startupInfo);
  182. if (devconLog != INVALID_HANDLE_VALUE) {
  183. SetFilePointer(devconLog,0,0,FILE_END);
  184. startupInfo.hStdOutput = devconLog;
  185. startupInfo.hStdError = devconLog;
  186. }
  187. PROCESS_INFORMATION processInfo;
  188. memset(&startupInfo,0,sizeof(STARTUPINFOA));
  189. memset(&processInfo,0,sizeof(PROCESS_INFORMATION));
  190. if (!CreateProcessA(NULL,(LPSTR)(std::string("\"") + _pathToHelpers + WINENV.devcon + "\" install \"" + tapDriverPath + "\" " + tapDriverName).c_str(),NULL,NULL,FALSE,0,NULL,NULL,&startupInfo,&processInfo)) {
  191. RegCloseKey(nwAdapters);
  192. if (devconLog != INVALID_HANDLE_VALUE)
  193. CloseHandle(devconLog);
  194. throw std::runtime_error(std::string("unable to find or execute devcon at ") + WINENV.devcon);
  195. }
  196. WaitForSingleObject(processInfo.hProcess,INFINITE);
  197. CloseHandle(processInfo.hProcess);
  198. CloseHandle(processInfo.hThread);
  199. if (devconLog != INVALID_HANDLE_VALUE)
  200. CloseHandle(devconLog);
  201. // Scan for the new instance by simply looking for taps that weren't originally there...
  202. for(DWORD subkeyIndex=0;;++subkeyIndex) {
  203. DWORD type;
  204. DWORD dataLen;
  205. DWORD subkeyNameLen = sizeof(subkeyName);
  206. DWORD subkeyClassLen = sizeof(subkeyClass);
  207. FILETIME lastWriteTime;
  208. if (RegEnumKeyExA(nwAdapters,subkeyIndex,subkeyName,&subkeyNameLen,(DWORD *)0,subkeyClass,&subkeyClassLen,&lastWriteTime) == ERROR_SUCCESS) {
  209. type = 0;
  210. dataLen = sizeof(data);
  211. if (RegGetValueA(nwAdapters,subkeyName,"ComponentId",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS) {
  212. data[dataLen] = '\0';
  213. if (!strnicmp(data,"zttap",5)) {
  214. type = 0;
  215. dataLen = sizeof(data);
  216. if (RegGetValueA(nwAdapters,subkeyName,"NetCfgInstanceId",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS) {
  217. if (existingDeviceInstances.count(std::string(data,dataLen)) == 0) {
  218. RegSetKeyValueA(nwAdapters,subkeyName,"_ZeroTierTapIdentifier",REG_SZ,tag,(DWORD)(strlen(tag)+1));
  219. _netCfgInstanceId.assign(data,dataLen);
  220. type = 0;
  221. dataLen = sizeof(data);
  222. if (RegGetValueA(nwAdapters,subkeyName,"DeviceInstanceID",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS)
  223. _deviceInstanceId.assign(data,dataLen);
  224. mySubkeyName = subkeyName;
  225. // Disable DHCP by default on newly created devices
  226. HKEY tcpIpInterfaces;
  227. if (RegOpenKeyExA(HKEY_LOCAL_MACHINE,"SYSTEM\\CurrentControlSet\\services\\Tcpip\\Parameters\\Interfaces",0,KEY_READ|KEY_WRITE,&tcpIpInterfaces) == ERROR_SUCCESS) {
  228. DWORD enable = 0;
  229. RegSetKeyValueA(tcpIpInterfaces,_netCfgInstanceId.c_str(),"EnableDHCP",REG_DWORD,&enable,sizeof(enable));
  230. RegCloseKey(tcpIpInterfaces);
  231. }
  232. break; // found it!
  233. }
  234. }
  235. }
  236. }
  237. } else break; // no more keys or error occurred
  238. }
  239. }
  240. if (_netCfgInstanceId.length() > 0) {
  241. char tmps[64];
  242. unsigned int tmpsl = Utils::snprintf(tmps,sizeof(tmps),"%.2X-%.2X-%.2X-%.2X-%.2X-%.2X",(unsigned int)mac[0],(unsigned int)mac[1],(unsigned int)mac[2],(unsigned int)mac[3],(unsigned int)mac[4],(unsigned int)mac[5]) + 1;
  243. RegSetKeyValueA(nwAdapters,mySubkeyName.c_str(),"NetworkAddress",REG_SZ,tmps,tmpsl);
  244. RegSetKeyValueA(nwAdapters,mySubkeyName.c_str(),"MAC",REG_SZ,tmps,tmpsl);
  245. DWORD tmp = mtu;
  246. RegSetKeyValueA(nwAdapters,mySubkeyName.c_str(),"MTU",REG_DWORD,(LPCVOID)&tmp,sizeof(tmp));
  247. tmp = 0;
  248. RegSetKeyValueA(nwAdapters,mySubkeyName.c_str(),"*NdisDeviceType",REG_DWORD,(LPCVOID)&tmp,sizeof(tmp));
  249. tmp = IF_TYPE_ETHERNET_CSMACD;
  250. RegSetKeyValueA(nwAdapters,mySubkeyName.c_str(),"*IfType",REG_DWORD,(LPCVOID)&tmp,sizeof(tmp));
  251. if (creatingNewDevice) {
  252. tmp = 0;
  253. RegSetKeyValueA(nwAdapters,mySubkeyName.c_str(),"EnableDHCP",REG_DWORD,(LPCVOID)&tmp,sizeof(tmp));
  254. }
  255. RegCloseKey(nwAdapters);
  256. } else {
  257. RegCloseKey(nwAdapters);
  258. throw std::runtime_error("unable to find or create tap adapter");
  259. }
  260. {
  261. char nobraces[128];
  262. const char *nbtmp1 = _netCfgInstanceId.c_str();
  263. char *nbtmp2 = nobraces;
  264. while (*nbtmp1) {
  265. if ((*nbtmp1 != '{')&&(*nbtmp1 != '}'))
  266. *nbtmp2++ = *nbtmp1;
  267. ++nbtmp1;
  268. }
  269. *nbtmp2 = (char)0;
  270. if (UuidFromStringA((RPC_CSTR)nobraces,&_deviceGuid) != RPC_S_OK)
  271. throw std::runtime_error("unable to convert instance ID GUID to native GUID (invalid NetCfgInstanceId in registry?)");
  272. }
  273. // Look up interface LUID... why are there (at least) four fucking ways to refer to a network device in Windows?
  274. if (ConvertInterfaceGuidToLuid(&_deviceGuid,&_deviceLuid) != NO_ERROR)
  275. throw std::runtime_error("unable to convert device interface GUID to LUID");
  276. // Certain functions can now work (e.g. ips())
  277. _initialized = true;
  278. if (friendlyName)
  279. setFriendlyName(friendlyName);
  280. // Start background thread that actually performs I/O
  281. _injectSemaphore = CreateSemaphore(NULL,0,1,NULL);
  282. _thread = Thread::start(this);
  283. }
  284. WindowsEthernetTap::~WindowsEthernetTap()
  285. {
  286. _run = false;
  287. ReleaseSemaphore(_injectSemaphore,1,NULL);
  288. Thread::join(_thread);
  289. CloseHandle(_injectSemaphore);
  290. _disableTapDevice();
  291. }
  292. void WindowsEthernetTap::setEnabled(bool en)
  293. {
  294. _enabled = en;
  295. }
  296. bool WindowsEthernetTap::enabled() const
  297. {
  298. return _enabled;
  299. }
  300. bool WindowsEthernetTap::addIp(const InetAddress &ip)
  301. {
  302. if (!_initialized)
  303. return false;
  304. if (!ip.netmaskBits()) // sanity check... netmask of 0.0.0.0 is WUT?
  305. return false;
  306. std::vector<InetAddress> haveIps(ips());
  307. try {
  308. // Add IP to interface at the netlink level if not already assigned.
  309. if (!std::binary_search(haveIps.begin(),haveIps.end(),ip)) {
  310. MIB_UNICASTIPADDRESS_ROW ipr;
  311. InitializeUnicastIpAddressEntry(&ipr);
  312. if (ip.isV4()) {
  313. ipr.Address.Ipv4.sin_family = AF_INET;
  314. ipr.Address.Ipv4.sin_addr.S_un.S_addr = *((const uint32_t *)ip.rawIpData());
  315. ipr.OnLinkPrefixLength = ip.port();
  316. if (ipr.OnLinkPrefixLength >= 32)
  317. return false;
  318. } else if (ip.isV6()) {
  319. ipr.Address.Ipv6.sin6_family = AF_INET6;
  320. memcpy(ipr.Address.Ipv6.sin6_addr.u.Byte,ip.rawIpData(),16);
  321. ipr.OnLinkPrefixLength = ip.port();
  322. if (ipr.OnLinkPrefixLength >= 128)
  323. return false;
  324. } else return false;
  325. ipr.PrefixOrigin = IpPrefixOriginManual;
  326. ipr.SuffixOrigin = IpSuffixOriginManual;
  327. ipr.ValidLifetime = 0xffffffff;
  328. ipr.PreferredLifetime = 0xffffffff;
  329. ipr.InterfaceLuid = _deviceLuid;
  330. ipr.InterfaceIndex = _getDeviceIndex();
  331. if (CreateUnicastIpAddressEntry(&ipr) != NO_ERROR)
  332. return false;
  333. }
  334. std::vector<std::string> regIps(_getRegistryIPv4Value("IPAddress"));
  335. if (std::find(regIps.begin(),regIps.end(),ip.toIpString()) == regIps.end()) {
  336. std::vector<std::string> regSubnetMasks(_getRegistryIPv4Value("SubnetMask"));
  337. regIps.push_back(ip.toIpString());
  338. regSubnetMasks.push_back(ip.netmask().toIpString());
  339. _setRegistryIPv4Value("IPAddress",regIps);
  340. _setRegistryIPv4Value("SubnetMask",regSubnetMasks);
  341. }
  342. } catch ( ... ) {
  343. return false;
  344. }
  345. return true;
  346. }
  347. bool WindowsEthernetTap::removeIp(const InetAddress &ip)
  348. {
  349. if (!_initialized)
  350. return false;
  351. try {
  352. MIB_UNICASTIPADDRESS_TABLE *ipt = (MIB_UNICASTIPADDRESS_TABLE *)0;
  353. if (GetUnicastIpAddressTable(AF_UNSPEC,&ipt) == NO_ERROR) {
  354. for(DWORD i=0;i<ipt->NumEntries;++i) {
  355. if (ipt->Table[i].InterfaceLuid.Value == _deviceLuid.Value) {
  356. InetAddress addr;
  357. switch(ipt->Table[i].Address.si_family) {
  358. case AF_INET:
  359. addr.set(&(ipt->Table[i].Address.Ipv4.sin_addr.S_un.S_addr),4,ipt->Table[i].OnLinkPrefixLength);
  360. break;
  361. case AF_INET6:
  362. addr.set(ipt->Table[i].Address.Ipv6.sin6_addr.u.Byte,16,ipt->Table[i].OnLinkPrefixLength);
  363. if (addr.ipScope() == InetAddress::IP_SCOPE_LINK_LOCAL)
  364. continue; // can't remove link-local IPv6 addresses
  365. break;
  366. }
  367. if (addr == ip) {
  368. DeleteUnicastIpAddressEntry(&(ipt->Table[i]));
  369. FreeMibTable(ipt);
  370. std::vector<std::string> regIps(_getRegistryIPv4Value("IPAddress"));
  371. std::vector<std::string> regSubnetMasks(_getRegistryIPv4Value("SubnetMask"));
  372. std::string ipstr(ip.toIpString());
  373. for(std::vector<std::string>::iterator rip(regIps.begin()),rm(regSubnetMasks.begin());((rip!=regIps.end())&&(rm!=regSubnetMasks.end()));++rip,++rm) {
  374. if (*rip == ipstr) {
  375. regIps.erase(rip);
  376. regSubnetMasks.erase(rm);
  377. _setRegistryIPv4Value("IPAddress",regIps);
  378. _setRegistryIPv4Value("SubnetMask",regSubnetMasks);
  379. break;
  380. }
  381. }
  382. return true;
  383. }
  384. }
  385. }
  386. FreeMibTable((PVOID)ipt);
  387. }
  388. } catch ( ... ) {}
  389. return false;
  390. }
  391. std::vector<InetAddress> WindowsEthernetTap::ips() const
  392. {
  393. static const InetAddress linkLocalLoopback("fe80::1",64); // what is this and why does Windows assign it?
  394. std::vector<InetAddress> addrs;
  395. if (!_initialized)
  396. return addrs;
  397. try {
  398. MIB_UNICASTIPADDRESS_TABLE *ipt = (MIB_UNICASTIPADDRESS_TABLE *)0;
  399. if (GetUnicastIpAddressTable(AF_UNSPEC,&ipt) == NO_ERROR) {
  400. for(DWORD i=0;i<ipt->NumEntries;++i) {
  401. if (ipt->Table[i].InterfaceLuid.Value == _deviceLuid.Value) {
  402. switch(ipt->Table[i].Address.si_family) {
  403. case AF_INET: {
  404. InetAddress ip(&(ipt->Table[i].Address.Ipv4.sin_addr.S_un.S_addr),4,ipt->Table[i].OnLinkPrefixLength);
  405. if (ip != InetAddress::LO4)
  406. addrs.push_back(ip);
  407. } break;
  408. case AF_INET6: {
  409. InetAddress ip(ipt->Table[i].Address.Ipv6.sin6_addr.u.Byte,16,ipt->Table[i].OnLinkPrefixLength);
  410. if ((ip != linkLocalLoopback)&&(ip != InetAddress::LO6))
  411. addrs.push_back(ip);
  412. } break;
  413. }
  414. }
  415. }
  416. FreeMibTable(ipt);
  417. }
  418. } catch ( ... ) {} // sanity check, shouldn't happen unless out of memory
  419. std::sort(addrs.begin(),addrs.end());
  420. std::unique(addrs.begin(),addrs.end());
  421. return addrs;
  422. }
  423. void WindowsEthernetTap::put(const MAC &from,const MAC &to,unsigned int etherType,const void *data,unsigned int len)
  424. {
  425. if ((!_initialized)||(!_enabled)||(_tap == INVALID_HANDLE_VALUE)||(len > (ZT_IF_MTU)))
  426. return;
  427. Mutex::Lock _l(_injectPending_m);
  428. _injectPending.push( std::pair<Array<char,ZT_IF_MTU + 32>,unsigned int>(Array<char,ZT_IF_MTU + 32>(),len + 14) );
  429. char *d = _injectPending.back().first.data;
  430. to.copyTo(d,6);
  431. from.copyTo(d + 6,6);
  432. d[12] = (char)((etherType >> 8) & 0xff);
  433. d[13] = (char)(etherType & 0xff);
  434. memcpy(d + 14,data,len);
  435. ReleaseSemaphore(_injectSemaphore,1,NULL);
  436. }
  437. std::string WindowsEthernetTap::deviceName() const
  438. {
  439. char tmp[1024];
  440. if (ConvertInterfaceLuidToNameA(&_deviceLuid,tmp,sizeof(tmp)) != NO_ERROR)
  441. return std::string("[ConvertInterfaceLuidToName() failed]");
  442. return std::string(tmp);
  443. }
  444. void WindowsEthernetTap::setFriendlyName(const char *dn)
  445. {
  446. if (!_initialized)
  447. return;
  448. HKEY ifp;
  449. if (RegOpenKeyExA(HKEY_LOCAL_MACHINE,(std::string("SYSTEM\\CurrentControlSet\\Control\\Network\\{4D36E972-E325-11CE-BFC1-08002BE10318}\\") + _netCfgInstanceId).c_str(),0,KEY_READ|KEY_WRITE,&ifp) == ERROR_SUCCESS) {
  450. RegSetKeyValueA(ifp,"Connection","Name",REG_SZ,(LPCVOID)dn,(DWORD)(strlen(dn)+1));
  451. RegCloseKey(ifp);
  452. }
  453. }
  454. void WindowsEthernetTap::scanMulticastGroups(std::vector<MulticastGroup> &added,std::vector<MulticastGroup> &removed)
  455. {
  456. if (!_initialized)
  457. return;
  458. HANDLE t = _tap;
  459. if (t == INVALID_HANDLE_VALUE)
  460. return;
  461. std::vector<MulticastGroup> newGroups;
  462. // The ZT1 tap driver supports an IOCTL to get multicast memberships at the L2
  463. // level... something Windows does not seem to expose ordinarily. This lets
  464. // pretty much anything work... IPv4, IPv6, IPX, oldskool Netbios, who knows...
  465. unsigned char mcastbuf[TAP_WIN_IOCTL_GET_MULTICAST_MEMBERSHIPS_OUTPUT_BUF_SIZE];
  466. DWORD bytesReturned = 0;
  467. if (DeviceIoControl(t,TAP_WIN_IOCTL_GET_MULTICAST_MEMBERSHIPS,(LPVOID)0,0,(LPVOID)mcastbuf,sizeof(mcastbuf),&bytesReturned,NULL)) {
  468. MAC mac;
  469. DWORD i = 0;
  470. while ((i + 6) <= bytesReturned) {
  471. mac.setTo(mcastbuf + i,6);
  472. i += 6;
  473. if ((mac.isMulticast())&&(!mac.isBroadcast())) {
  474. // exclude the nulls that may be returned or any other junk Windows puts in there
  475. newGroups.push_back(MulticastGroup(mac,0));
  476. }
  477. }
  478. }
  479. std::vector<InetAddress> allIps(ips());
  480. for(std::vector<InetAddress>::iterator ip(allIps.begin());ip!=allIps.end();++ip)
  481. newGroups.push_back(MulticastGroup::deriveMulticastGroupForAddressResolution(*ip));
  482. std::sort(newGroups.begin(),newGroups.end());
  483. std::unique(newGroups.begin(),newGroups.end());
  484. for(std::vector<MulticastGroup>::iterator m(newGroups.begin());m!=newGroups.end();++m) {
  485. if (!std::binary_search(_multicastGroups.begin(),_multicastGroups.end(),*m))
  486. added.push_back(*m);
  487. }
  488. for(std::vector<MulticastGroup>::iterator m(_multicastGroups.begin());m!=_multicastGroups.end();++m) {
  489. if (!std::binary_search(newGroups.begin(),newGroups.end(),*m))
  490. removed.push_back(*m);
  491. }
  492. _multicastGroups.swap(newGroups);
  493. }
  494. void WindowsEthernetTap::threadMain()
  495. throw()
  496. {
  497. char tapReadBuf[ZT_IF_MTU + 32];
  498. char tapPath[128];
  499. HANDLE wait4[3];
  500. OVERLAPPED tapOvlRead,tapOvlWrite;
  501. Utils::snprintf(tapPath,sizeof(tapPath),"\\\\.\\Global\\%s.tap",_netCfgInstanceId.c_str());
  502. try {
  503. while (_run) {
  504. _enableTapDevice();
  505. Sleep(500);
  506. _tap = CreateFileA(tapPath,GENERIC_READ|GENERIC_WRITE,0,NULL,OPEN_EXISTING,FILE_ATTRIBUTE_SYSTEM|FILE_FLAG_OVERLAPPED,NULL);
  507. if (_tap == INVALID_HANDLE_VALUE) {
  508. _disableTapDevice();
  509. _enableTapDevice();
  510. Sleep(1000);
  511. continue;
  512. }
  513. {
  514. uint32_t tmpi = 1;
  515. DWORD bytesReturned = 0;
  516. DeviceIoControl(_tap,TAP_WIN_IOCTL_SET_MEDIA_STATUS,&tmpi,sizeof(tmpi),&tmpi,sizeof(tmpi),&bytesReturned,NULL);
  517. }
  518. #ifdef ZT_WINDOWS_CREATE_FAKE_DEFAULT_ROUTE
  519. {
  520. /* This inserts a fake default route and a fake ARP entry, forcing
  521. * Windows to detect this as a "real" network and apply proper
  522. * firewall rules.
  523. *
  524. * This hack is completely stupid, but Windows made me do it
  525. * by being broken and insane.
  526. *
  527. * Background: Windows tries to detect its network location by
  528. * matching it to the ARP address of the default route. Networks
  529. * without default routes are "unidentified networks" and cannot
  530. * have their firewall classification changed by the user (easily).
  531. *
  532. * Yes, you read that right.
  533. *
  534. * The common workaround is to set *NdisDeviceType to 1, which
  535. * totally disables all Windows firewall functionality. This is
  536. * the answer you'll find on most forums for things like OpenVPN.
  537. *
  538. * Yes, you read that right.
  539. *
  540. * The default route workaround is also known, but for this to
  541. * work there must be a known default IP that resolves to a known
  542. * ARP address. This works for an OpenVPN tunnel, but not here
  543. * because this isn't a tunnel. It's a mesh. There is no "other
  544. * end," or any other known always on IP.
  545. *
  546. * So let's make a fake one and shove it in there along with its
  547. * fake static ARP entry. Also makes it instant-on and static.
  548. *
  549. * We'll have to see what DHCP does with this. In the future we
  550. * probably will not want to do this on DHCP-enabled networks, so
  551. * when we enable DHCP we will go in and yank this wacko hacko from
  552. * the routing table before doing so.
  553. *
  554. * Like Jesse Pinkman would say: "YEEEEAAH BITCH!" */
  555. const uint32_t fakeIp = htonl(0x19fffffe); // 25.255.255.254 -- unrouted IPv4 block
  556. for(int i=0;i<8;++i) {
  557. MIB_IPNET_ROW2 ipnr;
  558. memset(&ipnr,0,sizeof(ipnr));
  559. ipnr.Address.si_family = AF_INET;
  560. ipnr.Address.Ipv4.sin_addr.s_addr = fakeIp;
  561. ipnr.InterfaceLuid.Value = _deviceLuid.Value;
  562. ipnr.PhysicalAddress[0] = _mac[0] ^ 0x10; // just make something up that's consistent and not part of this net
  563. ipnr.PhysicalAddress[1] = 0x00;
  564. ipnr.PhysicalAddress[2] = (UCHAR)((_deviceGuid.Data1 >> 24) & 0xff);
  565. ipnr.PhysicalAddress[3] = (UCHAR)((_deviceGuid.Data1 >> 16) & 0xff);
  566. ipnr.PhysicalAddress[4] = (UCHAR)((_deviceGuid.Data1 >> 8) & 0xff);
  567. ipnr.PhysicalAddress[5] = (UCHAR)(_deviceGuid.Data1 & 0xff);
  568. ipnr.PhysicalAddressLength = 6;
  569. ipnr.State = NlnsPermanent;
  570. ipnr.IsRouter = 1;
  571. ipnr.IsUnreachable = 0;
  572. ipnr.ReachabilityTime.LastReachable = 0x0fffffff;
  573. ipnr.ReachabilityTime.LastUnreachable = 1;
  574. DWORD result = CreateIpNetEntry2(&ipnr);
  575. if (result != NO_ERROR)
  576. Sleep(500);
  577. else break;
  578. }
  579. for(int i=0;i<8;++i) {
  580. MIB_IPFORWARD_ROW2 nr;
  581. memset(&nr,0,sizeof(nr));
  582. InitializeIpForwardEntry(&nr);
  583. nr.InterfaceLuid.Value = _deviceLuid.Value;
  584. nr.DestinationPrefix.Prefix.si_family = AF_INET; // rest is left as 0.0.0.0/0
  585. nr.NextHop.si_family = AF_INET;
  586. nr.NextHop.Ipv4.sin_addr.s_addr = fakeIp;
  587. nr.Metric = 9999; // do not use as real default route
  588. nr.Protocol = MIB_IPPROTO_NETMGMT;
  589. DWORD result = CreateIpForwardEntry2(&nr);
  590. if (result != NO_ERROR)
  591. Sleep(500);
  592. else break;
  593. }
  594. }
  595. #endif
  596. memset(&tapOvlRead,0,sizeof(tapOvlRead));
  597. tapOvlRead.hEvent = CreateEvent(NULL,TRUE,FALSE,NULL);
  598. memset(&tapOvlWrite,0,sizeof(tapOvlWrite));
  599. tapOvlWrite.hEvent = CreateEvent(NULL,TRUE,FALSE,NULL);
  600. wait4[0] = _injectSemaphore;
  601. wait4[1] = tapOvlRead.hEvent;
  602. wait4[2] = tapOvlWrite.hEvent; // only included if writeInProgress is true
  603. ReadFile(_tap,tapReadBuf,sizeof(tapReadBuf),NULL,&tapOvlRead);
  604. bool writeInProgress = false;
  605. ULONGLONG timeOfLastBorkCheck = GetTickCount64();
  606. while (_run) {
  607. DWORD waitResult = WaitForMultipleObjectsEx(writeInProgress ? 3 : 2,wait4,FALSE,2500,TRUE);
  608. if (!_run) break; // will also break outer while(_run)
  609. // Check for issues with adapter and close/reopen if any are detected. This
  610. // check fixes a while boatload of Windows adapter 'coma' issues after
  611. // sleep/wake and when adapters are added/removed. Basically if the tap
  612. // device is borked, whack it.
  613. {
  614. ULONGLONG tc = GetTickCount64();
  615. if ((tc - timeOfLastBorkCheck) >= 2500) {
  616. timeOfLastBorkCheck = tc;
  617. char aabuf[16384];
  618. ULONG aalen = sizeof(aabuf);
  619. if (GetAdaptersAddresses(AF_UNSPEC,GAA_FLAG_SKIP_UNICAST|GAA_FLAG_SKIP_ANYCAST|GAA_FLAG_SKIP_MULTICAST|GAA_FLAG_SKIP_DNS_SERVER|GAA_FLAG_SKIP_FRIENDLY_NAME,(void *)0,reinterpret_cast<PIP_ADAPTER_ADDRESSES>(aabuf),&aalen) == NO_ERROR) {
  620. bool isBorked = false;
  621. PIP_ADAPTER_ADDRESSES aa = reinterpret_cast<PIP_ADAPTER_ADDRESSES>(aabuf);
  622. while (aa) {
  623. if (_deviceLuid.Value == aa->Luid.Value) {
  624. isBorked = (aa->OperStatus != IfOperStatusUp);
  625. break;
  626. }
  627. aa = aa->Next;
  628. }
  629. if (isBorked) {
  630. // Close and reopen tap device if there's an issue (outer loop)
  631. break;
  632. }
  633. }
  634. }
  635. }
  636. if ((waitResult == WAIT_TIMEOUT)||(waitResult == WAIT_FAILED))
  637. continue;
  638. if (HasOverlappedIoCompleted(&tapOvlRead)) {
  639. DWORD bytesRead = 0;
  640. if (GetOverlappedResult(_tap,&tapOvlRead,&bytesRead,FALSE)) {
  641. if ((bytesRead > 14)&&(_enabled)) {
  642. MAC to(tapReadBuf,6);
  643. MAC from(tapReadBuf + 6,6);
  644. unsigned int etherType = ((((unsigned int)tapReadBuf[12]) & 0xff) << 8) | (((unsigned int)tapReadBuf[13]) & 0xff);
  645. try {
  646. // TODO: decode vlans
  647. _handler(_arg,_nwid,from,to,etherType,0,tapReadBuf + 14,bytesRead - 14);
  648. } catch ( ... ) {} // handlers should not throw
  649. }
  650. }
  651. ReadFile(_tap,tapReadBuf,ZT_IF_MTU + 32,NULL,&tapOvlRead);
  652. }
  653. if (writeInProgress) {
  654. if (HasOverlappedIoCompleted(&tapOvlWrite)) {
  655. writeInProgress = false;
  656. _injectPending_m.lock();
  657. _injectPending.pop();
  658. } else continue; // still writing, so skip code below and wait
  659. } else _injectPending_m.lock();
  660. if (!_injectPending.empty()) {
  661. WriteFile(_tap,_injectPending.front().first.data,_injectPending.front().second,NULL,&tapOvlWrite);
  662. writeInProgress = true;
  663. }
  664. _injectPending_m.unlock();
  665. }
  666. CancelIo(_tap);
  667. CloseHandle(tapOvlRead.hEvent);
  668. CloseHandle(tapOvlWrite.hEvent);
  669. CloseHandle(_tap);
  670. _tap = INVALID_HANDLE_VALUE;
  671. // We will restart and re-open the tap unless _run == false
  672. }
  673. } catch ( ... ) {} // catch unexpected exceptions -- this should not happen but would prevent program crash or other weird issues since threads should not throw
  674. }
  675. void WindowsEthernetTap::destroyAllPersistentTapDevices(const char *pathToHelpers)
  676. {
  677. char subkeyName[4096];
  678. char subkeyClass[4096];
  679. char data[4096];
  680. std::set<std::string> instanceIdPathsToRemove;
  681. {
  682. HKEY nwAdapters;
  683. if (RegOpenKeyExA(HKEY_LOCAL_MACHINE,"SYSTEM\\CurrentControlSet\\Control\\Class\\{4D36E972-E325-11CE-BFC1-08002BE10318}",0,KEY_READ|KEY_WRITE,&nwAdapters) != ERROR_SUCCESS)
  684. return;
  685. for(DWORD subkeyIndex=0;;++subkeyIndex) {
  686. DWORD type;
  687. DWORD dataLen;
  688. DWORD subkeyNameLen = sizeof(subkeyName);
  689. DWORD subkeyClassLen = sizeof(subkeyClass);
  690. FILETIME lastWriteTime;
  691. if (RegEnumKeyExA(nwAdapters,subkeyIndex,subkeyName,&subkeyNameLen,(DWORD *)0,subkeyClass,&subkeyClassLen,&lastWriteTime) == ERROR_SUCCESS) {
  692. type = 0;
  693. dataLen = sizeof(data);
  694. if (RegGetValueA(nwAdapters,subkeyName,"ComponentId",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS) {
  695. data[dataLen] = '\0';
  696. if (!strnicmp(data,"zttap",5)) {
  697. std::string instanceIdPath;
  698. type = 0;
  699. dataLen = sizeof(data);
  700. if (RegGetValueA(nwAdapters,subkeyName,"DeviceInstanceID",RRF_RT_ANY,&type,(PVOID)data,&dataLen) == ERROR_SUCCESS)
  701. instanceIdPath.assign(data,dataLen);
  702. if (instanceIdPath.length() != 0)
  703. instanceIdPathsToRemove.insert(instanceIdPath);
  704. }
  705. }
  706. } else break; // end of list or failure
  707. }
  708. RegCloseKey(nwAdapters);
  709. }
  710. for(std::set<std::string>::iterator iidp(instanceIdPathsToRemove.begin());iidp!=instanceIdPathsToRemove.end();++iidp)
  711. deletePersistentTapDevice(pathToHelpers,iidp->c_str());
  712. }
  713. void WindowsEthernetTap::deletePersistentTapDevice(const char *pathToHelpers,const char *instanceId)
  714. {
  715. HANDLE devconLog = CreateFileA((std::string(pathToHelpers) + "\\devcon.log").c_str(),GENERIC_WRITE,FILE_SHARE_READ|FILE_SHARE_WRITE,NULL,OPEN_ALWAYS,FILE_ATTRIBUTE_NORMAL,NULL);
  716. STARTUPINFOA startupInfo;
  717. startupInfo.cb = sizeof(startupInfo);
  718. if (devconLog != INVALID_HANDLE_VALUE) {
  719. SetFilePointer(devconLog,0,0,FILE_END);
  720. startupInfo.hStdOutput = devconLog;
  721. startupInfo.hStdError = devconLog;
  722. }
  723. PROCESS_INFORMATION processInfo;
  724. memset(&startupInfo,0,sizeof(STARTUPINFOA));
  725. memset(&processInfo,0,sizeof(PROCESS_INFORMATION));
  726. if (CreateProcessA(NULL,(LPSTR)(std::string("\"") + pathToHelpers + WINENV.devcon + "\" remove @" + instanceId).c_str(),NULL,NULL,FALSE,0,NULL,NULL,&startupInfo,&processInfo)) {
  727. WaitForSingleObject(processInfo.hProcess,INFINITE);
  728. CloseHandle(processInfo.hProcess);
  729. CloseHandle(processInfo.hThread);
  730. }
  731. if (devconLog != INVALID_HANDLE_VALUE)
  732. CloseHandle(devconLog);
  733. }
  734. bool WindowsEthernetTap::_disableTapDevice()
  735. {
  736. HANDLE devconLog = CreateFileA((_pathToHelpers + "\\devcon.log").c_str(),GENERIC_WRITE,FILE_SHARE_READ|FILE_SHARE_WRITE,NULL,OPEN_ALWAYS,FILE_ATTRIBUTE_NORMAL,NULL);
  737. if (devconLog != INVALID_HANDLE_VALUE)
  738. SetFilePointer(devconLog,0,0,FILE_END);
  739. STARTUPINFOA startupInfo;
  740. startupInfo.cb = sizeof(startupInfo);
  741. if (devconLog != INVALID_HANDLE_VALUE) {
  742. startupInfo.hStdOutput = devconLog;
  743. startupInfo.hStdError = devconLog;
  744. }
  745. PROCESS_INFORMATION processInfo;
  746. memset(&startupInfo,0,sizeof(STARTUPINFOA));
  747. memset(&processInfo,0,sizeof(PROCESS_INFORMATION));
  748. if (!CreateProcessA(NULL,(LPSTR)(std::string("\"") + _pathToHelpers + WINENV.devcon + "\" disable @" + _deviceInstanceId).c_str(),NULL,NULL,FALSE,0,NULL,NULL,&startupInfo,&processInfo)) {
  749. if (devconLog != INVALID_HANDLE_VALUE)
  750. CloseHandle(devconLog);
  751. return false;
  752. }
  753. WaitForSingleObject(processInfo.hProcess,INFINITE);
  754. CloseHandle(processInfo.hProcess);
  755. CloseHandle(processInfo.hThread);
  756. if (devconLog != INVALID_HANDLE_VALUE)
  757. CloseHandle(devconLog);
  758. return true;
  759. }
  760. bool WindowsEthernetTap::_enableTapDevice()
  761. {
  762. HANDLE devconLog = CreateFileA((_pathToHelpers + "\\devcon.log").c_str(),GENERIC_WRITE,FILE_SHARE_READ|FILE_SHARE_WRITE,NULL,OPEN_ALWAYS,FILE_ATTRIBUTE_NORMAL,NULL);
  763. if (devconLog != INVALID_HANDLE_VALUE)
  764. SetFilePointer(devconLog,0,0,FILE_END);
  765. STARTUPINFOA startupInfo;
  766. startupInfo.cb = sizeof(startupInfo);
  767. if (devconLog != INVALID_HANDLE_VALUE) {
  768. startupInfo.hStdOutput = devconLog;
  769. startupInfo.hStdError = devconLog;
  770. }
  771. PROCESS_INFORMATION processInfo;
  772. memset(&startupInfo,0,sizeof(STARTUPINFOA));
  773. memset(&processInfo,0,sizeof(PROCESS_INFORMATION));
  774. if (!CreateProcessA(NULL,(LPSTR)(std::string("\"") + _pathToHelpers + WINENV.devcon + "\" enable @" + _deviceInstanceId).c_str(),NULL,NULL,FALSE,0,NULL,NULL,&startupInfo,&processInfo)) {
  775. if (devconLog != INVALID_HANDLE_VALUE)
  776. CloseHandle(devconLog);
  777. return false;
  778. }
  779. WaitForSingleObject(processInfo.hProcess,INFINITE);
  780. CloseHandle(processInfo.hProcess);
  781. CloseHandle(processInfo.hThread);
  782. if (devconLog != INVALID_HANDLE_VALUE)
  783. CloseHandle(devconLog);
  784. return true;
  785. }
  786. NET_IFINDEX WindowsEthernetTap::_getDeviceIndex()
  787. {
  788. MIB_IF_TABLE2 *ift = (MIB_IF_TABLE2 *)0;
  789. if (GetIfTable2Ex(MibIfTableRaw,&ift) != NO_ERROR)
  790. throw std::runtime_error("GetIfTable2Ex() failed");
  791. for(ULONG i=0;i<ift->NumEntries;++i) {
  792. if (ift->Table[i].InterfaceLuid.Value == _deviceLuid.Value) {
  793. NET_IFINDEX idx = ift->Table[i].InterfaceIndex;
  794. FreeMibTable(ift);
  795. return idx;
  796. }
  797. }
  798. FreeMibTable(&ift);
  799. throw std::runtime_error("interface not found");
  800. }
  801. std::vector<std::string> WindowsEthernetTap::_getRegistryIPv4Value(const char *regKey)
  802. {
  803. std::vector<std::string> value;
  804. HKEY tcpIpInterfaces;
  805. if (RegOpenKeyExA(HKEY_LOCAL_MACHINE,"SYSTEM\\CurrentControlSet\\services\\Tcpip\\Parameters\\Interfaces",0,KEY_READ|KEY_WRITE,&tcpIpInterfaces) == ERROR_SUCCESS) {
  806. char buf[16384];
  807. DWORD len = sizeof(buf);
  808. DWORD kt = REG_MULTI_SZ;
  809. if (RegGetValueA(tcpIpInterfaces,_netCfgInstanceId.c_str(),regKey,0,&kt,&buf,&len) == ERROR_SUCCESS) {
  810. switch(kt) {
  811. case REG_SZ:
  812. if (len > 0)
  813. value.push_back(std::string(buf));
  814. break;
  815. case REG_MULTI_SZ: {
  816. for(DWORD k=0,s=0;k<len;++k) {
  817. if (!buf[k]) {
  818. if (s < k) {
  819. value.push_back(std::string(buf + s));
  820. s = k + 1;
  821. } else break;
  822. }
  823. }
  824. } break;
  825. }
  826. }
  827. RegCloseKey(tcpIpInterfaces);
  828. }
  829. return value;
  830. }
  831. void WindowsEthernetTap::_setRegistryIPv4Value(const char *regKey,const std::vector<std::string> &value)
  832. {
  833. std::string regMulti;
  834. for(std::vector<std::string>::const_iterator s(value.begin());s!=value.end();++s) {
  835. regMulti.append(*s);
  836. regMulti.push_back((char)0);
  837. }
  838. HKEY tcpIpInterfaces;
  839. if (RegOpenKeyExA(HKEY_LOCAL_MACHINE,"SYSTEM\\CurrentControlSet\\services\\Tcpip\\Parameters\\Interfaces",0,KEY_READ|KEY_WRITE,&tcpIpInterfaces) == ERROR_SUCCESS) {
  840. if (regMulti.length() > 0) {
  841. regMulti.push_back((char)0);
  842. RegSetKeyValueA(tcpIpInterfaces,_netCfgInstanceId.c_str(),regKey,REG_MULTI_SZ,regMulti.data(),(DWORD)regMulti.length());
  843. } else {
  844. RegDeleteKeyValueA(tcpIpInterfaces,_netCfgInstanceId.c_str(),regKey);
  845. }
  846. RegCloseKey(tcpIpInterfaces);
  847. }
  848. }
  849. } // namespace ZeroTier