/* * iphlpapi dll implementation * * Copyright (C) 2003,2006 Juan Lang * * This library is free software; you can redistribute it and/or * modify it under the terms of the GNU Lesser General Public * License as published by the Free Software Foundation; either * version 2.1 of the License, or (at your option) any later version. * * This library is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * Lesser General Public License for more details. * * You should have received a copy of the GNU Lesser General Public * License along with this library; if not, write to the Free Software * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA */ #include "config.h" #include #include #include #include #ifdef HAVE_NETINET_IN_H # include #endif #ifdef HAVE_ARPA_INET_H # include #endif #ifdef HAVE_ARPA_NAMESER_H # include #endif #ifdef HAVE_RESOLV_H # include #endif #define NONAMELESSUNION #define NONAMELESSSTRUCT #include "windef.h" #include "winbase.h" #include "winreg.h" #define USE_WS_PREFIX #include "winsock2.h" #include "winternl.h" #include "ws2ipdef.h" #include "iphlpapi.h" #include "ifenum.h" #include "ipstats.h" #include "ipifcons.h" #include "fltdefs.h" #include "wine/debug.h" WINE_DEFAULT_DEBUG_CHANNEL(iphlpapi); #ifndef IF_NAMESIZE #define IF_NAMESIZE 16 #endif #ifndef INADDR_NONE #define INADDR_NONE ~0UL #endif /****************************************************************** * AddIPAddress (IPHLPAPI.@) * * Add an IP address to an adapter. * * PARAMS * Address [In] IP address to add to the adapter * IpMask [In] subnet mask for the IP address * IfIndex [In] adapter index to add the address * NTEContext [Out] Net Table Entry (NTE) context for the IP address * NTEInstance [Out] NTE instance for the IP address * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub. Currently returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI AddIPAddress(IPAddr Address, IPMask IpMask, DWORD IfIndex, PULONG NTEContext, PULONG NTEInstance) { FIXME(":stub\n"); return ERROR_NOT_SUPPORTED; } /****************************************************************** * AllocateAndGetIfTableFromStack (IPHLPAPI.@) * * Get table of local interfaces. * Like GetIfTable(), but allocate the returned table from heap. * * PARAMS * ppIfTable [Out] pointer into which the MIB_IFTABLE is * allocated and returned. * bOrder [In] whether to sort the table * heap [In] heap from which the table is allocated * flags [In] flags to HeapAlloc * * RETURNS * ERROR_INVALID_PARAMETER if ppIfTable is NULL, whatever * GetIfTable() returns otherwise. */ DWORD WINAPI AllocateAndGetIfTableFromStack(PMIB_IFTABLE *ppIfTable, BOOL bOrder, HANDLE heap, DWORD flags) { DWORD ret; TRACE("ppIfTable %p, bOrder %d, heap %p, flags 0x%08x\n", ppIfTable, bOrder, heap, flags); if (!ppIfTable) ret = ERROR_INVALID_PARAMETER; else { DWORD dwSize = 0; ret = GetIfTable(*ppIfTable, &dwSize, bOrder); if (ret == ERROR_INSUFFICIENT_BUFFER) { *ppIfTable = HeapAlloc(heap, flags, dwSize); ret = GetIfTable(*ppIfTable, &dwSize, bOrder); } } TRACE("returning %d\n", ret); return ret; } static int IpAddrTableSorter(const void *a, const void *b) { int ret; if (a && b) ret = ((const MIB_IPADDRROW*)a)->dwAddr - ((const MIB_IPADDRROW*)b)->dwAddr; else ret = 0; return ret; } /****************************************************************** * AllocateAndGetIpAddrTableFromStack (IPHLPAPI.@) * * Get interface-to-IP address mapping table. * Like GetIpAddrTable(), but allocate the returned table from heap. * * PARAMS * ppIpAddrTable [Out] pointer into which the MIB_IPADDRTABLE is * allocated and returned. * bOrder [In] whether to sort the table * heap [In] heap from which the table is allocated * flags [In] flags to HeapAlloc * * RETURNS * ERROR_INVALID_PARAMETER if ppIpAddrTable is NULL, other error codes on * failure, NO_ERROR on success. */ DWORD WINAPI AllocateAndGetIpAddrTableFromStack(PMIB_IPADDRTABLE *ppIpAddrTable, BOOL bOrder, HANDLE heap, DWORD flags) { DWORD ret; TRACE("ppIpAddrTable %p, bOrder %d, heap %p, flags 0x%08x\n", ppIpAddrTable, bOrder, heap, flags); ret = getIPAddrTable(ppIpAddrTable, heap, flags); if (!ret && bOrder) qsort((*ppIpAddrTable)->table, (*ppIpAddrTable)->dwNumEntries, sizeof(MIB_IPADDRROW), IpAddrTableSorter); TRACE("returning %d\n", ret); return ret; } /****************************************************************** * CancelIPChangeNotify (IPHLPAPI.@) * * Cancel a previous notification created by NotifyAddrChange or * NotifyRouteChange. * * PARAMS * overlapped [In] overlapped structure that notifies the caller * * RETURNS * Success: TRUE * Failure: FALSE * * FIXME * Stub, returns FALSE. */ BOOL WINAPI CancelIPChangeNotify(LPOVERLAPPED overlapped) { FIXME("(overlapped %p): stub\n", overlapped); return FALSE; } /****************************************************************** * CancelMibChangeNotify2 (IPHLPAPI.@) */ DWORD WINAPI CancelMibChangeNotify2(HANDLE handle) { FIXME("(handle %p): stub\n", handle); return NO_ERROR; } /****************************************************************** * CreateIpForwardEntry (IPHLPAPI.@) * * Create a route in the local computer's IP table. * * PARAMS * pRoute [In] new route information * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, always returns NO_ERROR. */ DWORD WINAPI CreateIpForwardEntry(PMIB_IPFORWARDROW pRoute) { FIXME("(pRoute %p): stub\n", pRoute); /* could use SIOCADDRT, not sure I want to */ return 0; } /****************************************************************** * CreateIpNetEntry (IPHLPAPI.@) * * Create entry in the ARP table. * * PARAMS * pArpEntry [In] new ARP entry * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, always returns NO_ERROR. */ DWORD WINAPI CreateIpNetEntry(PMIB_IPNETROW pArpEntry) { FIXME("(pArpEntry %p)\n", pArpEntry); /* could use SIOCSARP on systems that support it, not sure I want to */ return 0; } /****************************************************************** * CreateProxyArpEntry (IPHLPAPI.@) * * Create a Proxy ARP (PARP) entry for an IP address. * * PARAMS * dwAddress [In] IP address for which this computer acts as a proxy. * dwMask [In] subnet mask for dwAddress * dwIfIndex [In] interface index * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI CreateProxyArpEntry(DWORD dwAddress, DWORD dwMask, DWORD dwIfIndex) { FIXME("(dwAddress 0x%08x, dwMask 0x%08x, dwIfIndex 0x%08x): stub\n", dwAddress, dwMask, dwIfIndex); return ERROR_NOT_SUPPORTED; } /****************************************************************** * CreateSortedAddressPairs (IPHLPAPI.@) */ DWORD WINAPI CreateSortedAddressPairs(const PSOCKADDR_IN6 source, DWORD sourcecount, const PSOCKADDR_IN6 destination, DWORD destinationcount, DWORD sortoptions, PSOCKADDR_IN6_PAIR *sortedaddr, DWORD *sortedcount) { FIXME("(source %p, sourcecount %d, destination %p, destcount %d, sortoptions %x," " sortedaddr %p, sortedcount %p): stub\n", source, sourcecount, destination, destinationcount, sortoptions, sortedaddr, sortedcount); if (source || sourcecount || !destination || !sortedaddr || !sortedcount || destinationcount > 500) return ERROR_INVALID_PARAMETER; /* Returning not supported tells the client we don't have IPv6 support * so applications can fallback to IPv4. */ return ERROR_NOT_SUPPORTED; } /****************************************************************** * DeleteIPAddress (IPHLPAPI.@) * * Delete an IP address added with AddIPAddress(). * * PARAMS * NTEContext [In] NTE context from AddIPAddress(); * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI DeleteIPAddress(ULONG NTEContext) { FIXME("(NTEContext %d): stub\n", NTEContext); return ERROR_NOT_SUPPORTED; } /****************************************************************** * DeleteIpForwardEntry (IPHLPAPI.@) * * Delete a route. * * PARAMS * pRoute [In] route to delete * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns NO_ERROR. */ DWORD WINAPI DeleteIpForwardEntry(PMIB_IPFORWARDROW pRoute) { FIXME("(pRoute %p): stub\n", pRoute); /* could use SIOCDELRT, not sure I want to */ return 0; } /****************************************************************** * DeleteIpNetEntry (IPHLPAPI.@) * * Delete an ARP entry. * * PARAMS * pArpEntry [In] ARP entry to delete * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns NO_ERROR. */ DWORD WINAPI DeleteIpNetEntry(PMIB_IPNETROW pArpEntry) { FIXME("(pArpEntry %p): stub\n", pArpEntry); /* could use SIOCDARP on systems that support it, not sure I want to */ return 0; } /****************************************************************** * DeleteProxyArpEntry (IPHLPAPI.@) * * Delete a Proxy ARP entry. * * PARAMS * dwAddress [In] IP address for which this computer acts as a proxy. * dwMask [In] subnet mask for dwAddress * dwIfIndex [In] interface index * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI DeleteProxyArpEntry(DWORD dwAddress, DWORD dwMask, DWORD dwIfIndex) { FIXME("(dwAddress 0x%08x, dwMask 0x%08x, dwIfIndex 0x%08x): stub\n", dwAddress, dwMask, dwIfIndex); return ERROR_NOT_SUPPORTED; } /****************************************************************** * EnableRouter (IPHLPAPI.@) * * Turn on ip forwarding. * * PARAMS * pHandle [In/Out] * pOverlapped [In/Out] hEvent member should contain a valid handle. * * RETURNS * Success: ERROR_IO_PENDING * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI EnableRouter(HANDLE * pHandle, OVERLAPPED * pOverlapped) { FIXME("(pHandle %p, pOverlapped %p): stub\n", pHandle, pOverlapped); /* could echo "1" > /proc/net/sys/net/ipv4/ip_forward, not sure I want to could map EACCESS to ERROR_ACCESS_DENIED, I suppose */ return ERROR_NOT_SUPPORTED; } /****************************************************************** * FlushIpNetTable (IPHLPAPI.@) * * Delete all ARP entries of an interface * * PARAMS * dwIfIndex [In] interface index * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI FlushIpNetTable(DWORD dwIfIndex) { FIXME("(dwIfIndex 0x%08x): stub\n", dwIfIndex); /* this flushes the arp cache of the given index */ return ERROR_NOT_SUPPORTED; } /****************************************************************** * FreeMibTable (IPHLPAPI.@) * * Free buffer allocated by network functions * * PARAMS * ptr [In] pointer to the buffer to free * */ void WINAPI FreeMibTable(void *ptr) { TRACE("(%p)\n", ptr); HeapFree(GetProcessHeap(), 0, ptr); } /****************************************************************** * GetAdapterIndex (IPHLPAPI.@) * * Get interface index from its name. * * PARAMS * AdapterName [In] unicode string with the adapter name * IfIndex [Out] returns found interface index * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h */ DWORD WINAPI GetAdapterIndex(LPWSTR AdapterName, PULONG IfIndex) { char adapterName[MAX_ADAPTER_NAME]; unsigned int i; DWORD ret; TRACE("(AdapterName %p, IfIndex %p)\n", AdapterName, IfIndex); /* The adapter name is guaranteed not to have any unicode characters, so * this translation is never lossy */ for (i = 0; i < sizeof(adapterName) - 1 && AdapterName[i]; i++) adapterName[i] = (char)AdapterName[i]; adapterName[i] = '\0'; ret = getInterfaceIndexByName(adapterName, IfIndex); TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetAdaptersInfo (IPHLPAPI.@) * * Get information about adapters. * * PARAMS * pAdapterInfo [Out] buffer for adapter infos * pOutBufLen [In] length of output buffer * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h */ DWORD WINAPI GetAdaptersInfo(PIP_ADAPTER_INFO pAdapterInfo, PULONG pOutBufLen) { DWORD ret; TRACE("pAdapterInfo %p, pOutBufLen %p\n", pAdapterInfo, pOutBufLen); if (!pOutBufLen) ret = ERROR_INVALID_PARAMETER; else { DWORD numNonLoopbackInterfaces = get_interface_indices( TRUE, NULL ); if (numNonLoopbackInterfaces > 0) { DWORD numIPAddresses = getNumIPAddresses(); ULONG size; /* This may slightly overestimate the amount of space needed, because * the IP addresses include the loopback address, but it's easier * to make sure there's more than enough space than to make sure there's * precisely enough space. */ size = sizeof(IP_ADAPTER_INFO) * numNonLoopbackInterfaces; size += numIPAddresses * sizeof(IP_ADDR_STRING); if (!pAdapterInfo || *pOutBufLen < size) { *pOutBufLen = size; ret = ERROR_BUFFER_OVERFLOW; } else { InterfaceIndexTable *table = NULL; PMIB_IPADDRTABLE ipAddrTable = NULL; PMIB_IPFORWARDTABLE routeTable = NULL; ret = getIPAddrTable(&ipAddrTable, GetProcessHeap(), 0); if (!ret) ret = AllocateAndGetIpForwardTableFromStack(&routeTable, FALSE, GetProcessHeap(), 0); if (!ret) get_interface_indices( TRUE, &table ); if (table) { size = sizeof(IP_ADAPTER_INFO) * table->numIndexes; size += ipAddrTable->dwNumEntries * sizeof(IP_ADDR_STRING); if (*pOutBufLen < size) { *pOutBufLen = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { DWORD ndx; HKEY hKey; BOOL winsEnabled = FALSE; IP_ADDRESS_STRING primaryWINS, secondaryWINS; PIP_ADDR_STRING nextIPAddr = (PIP_ADDR_STRING)((LPBYTE)pAdapterInfo + numNonLoopbackInterfaces * sizeof(IP_ADAPTER_INFO)); memset(pAdapterInfo, 0, size); /* @@ Wine registry key: HKCU\Software\Wine\Network */ if (RegOpenKeyA(HKEY_CURRENT_USER, "Software\\Wine\\Network", &hKey) == ERROR_SUCCESS) { DWORD size = sizeof(primaryWINS.String); unsigned long addr; RegQueryValueExA(hKey, "WinsServer", NULL, NULL, (LPBYTE)primaryWINS.String, &size); addr = inet_addr(primaryWINS.String); if (addr != INADDR_NONE && addr != INADDR_ANY) winsEnabled = TRUE; size = sizeof(secondaryWINS.String); RegQueryValueExA(hKey, "BackupWinsServer", NULL, NULL, (LPBYTE)secondaryWINS.String, &size); addr = inet_addr(secondaryWINS.String); if (addr != INADDR_NONE && addr != INADDR_ANY) winsEnabled = TRUE; RegCloseKey(hKey); } for (ndx = 0; ndx < table->numIndexes; ndx++) { PIP_ADAPTER_INFO ptr = &pAdapterInfo[ndx]; DWORD i; PIP_ADDR_STRING currentIPAddr = &ptr->IpAddressList; BOOL firstIPAddr = TRUE; /* on Win98 this is left empty, but whatever */ getInterfaceNameByIndex(table->indexes[ndx], ptr->AdapterName); getInterfaceNameByIndex(table->indexes[ndx], ptr->Description); ptr->AddressLength = sizeof(ptr->Address); getInterfacePhysicalByIndex(table->indexes[ndx], &ptr->AddressLength, ptr->Address, &ptr->Type); ptr->Index = table->indexes[ndx]; for (i = 0; i < ipAddrTable->dwNumEntries; i++) { if (ipAddrTable->table[i].dwIndex == ptr->Index) { if (firstIPAddr) { toIPAddressString(ipAddrTable->table[i].dwAddr, ptr->IpAddressList.IpAddress.String); toIPAddressString(ipAddrTable->table[i].dwMask, ptr->IpAddressList.IpMask.String); firstIPAddr = FALSE; } else { currentIPAddr->Next = nextIPAddr; currentIPAddr = nextIPAddr; toIPAddressString(ipAddrTable->table[i].dwAddr, currentIPAddr->IpAddress.String); toIPAddressString(ipAddrTable->table[i].dwMask, currentIPAddr->IpMask.String); nextIPAddr++; } } } /* If no IP was found it probably means that the interface is not * configured. In this case we have to return a zeroed IP and mask. */ if (firstIPAddr) { strcpy(ptr->IpAddressList.IpAddress.String, "0.0.0.0"); strcpy(ptr->IpAddressList.IpMask.String, "0.0.0.0"); } /* Find first router through this interface, which we'll assume * is the default gateway for this adapter */ for (i = 0; i < routeTable->dwNumEntries; i++) if (routeTable->table[i].dwForwardIfIndex == ptr->Index && routeTable->table[i].u1.ForwardType == MIB_IPROUTE_TYPE_INDIRECT) { toIPAddressString(routeTable->table[i].dwForwardNextHop, ptr->GatewayList.IpAddress.String); toIPAddressString(routeTable->table[i].dwForwardMask, ptr->GatewayList.IpMask.String); } if (winsEnabled) { ptr->HaveWins = TRUE; memcpy(ptr->PrimaryWinsServer.IpAddress.String, primaryWINS.String, sizeof(primaryWINS.String)); memcpy(ptr->SecondaryWinsServer.IpAddress.String, secondaryWINS.String, sizeof(secondaryWINS.String)); } if (ndx < table->numIndexes - 1) ptr->Next = &pAdapterInfo[ndx + 1]; else ptr->Next = NULL; ptr->DhcpEnabled = TRUE; } ret = NO_ERROR; } HeapFree(GetProcessHeap(), 0, table); } else ret = ERROR_OUTOFMEMORY; HeapFree(GetProcessHeap(), 0, routeTable); HeapFree(GetProcessHeap(), 0, ipAddrTable); } } else ret = ERROR_NO_DATA; } TRACE("returning %d\n", ret); return ret; } static DWORD typeFromMibType(DWORD mib_type) { switch (mib_type) { case MIB_IF_TYPE_ETHERNET: return IF_TYPE_ETHERNET_CSMACD; case MIB_IF_TYPE_TOKENRING: return IF_TYPE_ISO88025_TOKENRING; case MIB_IF_TYPE_PPP: return IF_TYPE_PPP; case MIB_IF_TYPE_LOOPBACK: return IF_TYPE_SOFTWARE_LOOPBACK; default: return IF_TYPE_OTHER; } } static NET_IF_CONNECTION_TYPE connectionTypeFromMibType(DWORD mib_type) { switch (mib_type) { case MIB_IF_TYPE_PPP: return NET_IF_CONNECTION_DEMAND; case MIB_IF_TYPE_SLIP: return NET_IF_CONNECTION_DEMAND; default: return NET_IF_CONNECTION_DEDICATED; } } static ULONG v4addressesFromIndex(IF_INDEX index, DWORD **addrs, ULONG *num_addrs, DWORD **masks) { ULONG ret, i, j; MIB_IPADDRTABLE *at; *num_addrs = 0; if ((ret = getIPAddrTable(&at, GetProcessHeap(), 0))) return ret; for (i = 0; i < at->dwNumEntries; i++) { if (at->table[i].dwIndex == index) (*num_addrs)++; } if (!(*addrs = HeapAlloc(GetProcessHeap(), 0, *num_addrs * sizeof(DWORD)))) { HeapFree(GetProcessHeap(), 0, at); return ERROR_OUTOFMEMORY; } if (!(*masks = HeapAlloc(GetProcessHeap(), 0, *num_addrs * sizeof(DWORD)))) { HeapFree(GetProcessHeap(), 0, *addrs); HeapFree(GetProcessHeap(), 0, at); return ERROR_OUTOFMEMORY; } for (i = 0, j = 0; i < at->dwNumEntries; i++) { if (at->table[i].dwIndex == index) { (*addrs)[j] = at->table[i].dwAddr; (*masks)[j] = at->table[i].dwMask; j++; } } HeapFree(GetProcessHeap(), 0, at); return ERROR_SUCCESS; } static char *debugstr_ipv4(const in_addr_t *in_addr, char *buf) { const BYTE *addrp; char *p = buf; for (addrp = (const BYTE *)in_addr; addrp - (const BYTE *)in_addr < sizeof(*in_addr); addrp++) { if (addrp == (const BYTE *)in_addr + sizeof(*in_addr) - 1) sprintf(p, "%d", *addrp); else p += sprintf(p, "%d.", *addrp); } return buf; } static char *debugstr_ipv6(const struct WS_sockaddr_in6 *sin, char *buf) { const IN6_ADDR *addr = &sin->sin6_addr; char *p = buf; int i; BOOL in_zero = FALSE; for (i = 0; i < 7; i++) { if (!addr->u.Word[i]) { if (i == 0) *p++ = ':'; if (!in_zero) { *p++ = ':'; in_zero = TRUE; } } else { p += sprintf(p, "%x:", ntohs(addr->u.Word[i])); in_zero = FALSE; } } sprintf(p, "%x", ntohs(addr->u.Word[7])); return buf; } static ULONG count_v4_gateways(DWORD index, PMIB_IPFORWARDTABLE routeTable) { DWORD i, num_gateways = 0; for (i = 0; i < routeTable->dwNumEntries; i++) { if (routeTable->table[i].dwForwardIfIndex == index && routeTable->table[i].u1.ForwardType == MIB_IPROUTE_TYPE_INDIRECT) num_gateways++; } return num_gateways; } static PMIB_IPFORWARDROW findIPv4Gateway(DWORD index, PMIB_IPFORWARDTABLE routeTable) { DWORD i; PMIB_IPFORWARDROW row = NULL; for (i = 0; !row && i < routeTable->dwNumEntries; i++) { if (routeTable->table[i].dwForwardIfIndex == index && routeTable->table[i].u1.ForwardType == MIB_IPROUTE_TYPE_INDIRECT) row = &routeTable->table[i]; } return row; } static void fill_unicast_addr_data(IP_ADAPTER_ADDRESSES *aa, IP_ADAPTER_UNICAST_ADDRESS *ua) { /* Actually this information should be read somewhere from the system * but it doesn't matter much for the bugs found so far. * This information is required for DirectPlay8 games. */ if (aa->IfType != IF_TYPE_SOFTWARE_LOOPBACK) { ua->PrefixOrigin = IpPrefixOriginDhcp; ua->SuffixOrigin = IpSuffixOriginDhcp; } else { ua->PrefixOrigin = IpPrefixOriginManual; ua->SuffixOrigin = IpSuffixOriginManual; } /* The address is not duplicated in the network */ ua->DadState = IpDadStatePreferred; /* Some address life time values, required even for non-dhcp addresses */ ua->ValidLifetime = 60000; ua->PreferredLifetime = 60000; ua->LeaseLifetime = 60000; } static ULONG adapterAddressesFromIndex(ULONG family, ULONG flags, IF_INDEX index, IP_ADAPTER_ADDRESSES *aa, ULONG *size) { ULONG ret = ERROR_SUCCESS, i, j, num_v4addrs = 0, num_v4_gateways = 0, num_v6addrs = 0, total_size; DWORD *v4addrs = NULL, *v4masks = NULL; SOCKET_ADDRESS *v6addrs = NULL, *v6masks = NULL; PMIB_IPFORWARDTABLE routeTable = NULL; if (family == WS_AF_INET) { ret = v4addressesFromIndex(index, &v4addrs, &num_v4addrs, &v4masks); if (!ret && flags & GAA_FLAG_INCLUDE_ALL_GATEWAYS) { ret = AllocateAndGetIpForwardTableFromStack(&routeTable, FALSE, GetProcessHeap(), 0); if (!ret) num_v4_gateways = count_v4_gateways(index, routeTable); } } else if (family == WS_AF_INET6) { ret = v6addressesFromIndex(index, &v6addrs, &num_v6addrs, &v6masks); } else if (family == WS_AF_UNSPEC) { ret = v4addressesFromIndex(index, &v4addrs, &num_v4addrs, &v4masks); if (!ret && flags & GAA_FLAG_INCLUDE_ALL_GATEWAYS) { ret = AllocateAndGetIpForwardTableFromStack(&routeTable, FALSE, GetProcessHeap(), 0); if (!ret) num_v4_gateways = count_v4_gateways(index, routeTable); } if (!ret) ret = v6addressesFromIndex(index, &v6addrs, &num_v6addrs, &v6masks); } else { FIXME("address family %u unsupported\n", family); ret = ERROR_NO_DATA; } if (ret) { HeapFree(GetProcessHeap(), 0, v4addrs); HeapFree(GetProcessHeap(), 0, v4masks); HeapFree(GetProcessHeap(), 0, v6addrs); HeapFree(GetProcessHeap(), 0, v6masks); HeapFree(GetProcessHeap(), 0, routeTable); return ret; } total_size = sizeof(IP_ADAPTER_ADDRESSES); total_size += IF_NAMESIZE; total_size += IF_NAMESIZE * sizeof(WCHAR); if (!(flags & GAA_FLAG_SKIP_FRIENDLY_NAME)) total_size += IF_NAMESIZE * sizeof(WCHAR); if (flags & GAA_FLAG_INCLUDE_PREFIX) { total_size += sizeof(IP_ADAPTER_PREFIX) * num_v4addrs; total_size += sizeof(IP_ADAPTER_PREFIX) * num_v6addrs; total_size += sizeof(struct sockaddr_in) * num_v4addrs; for (i = 0; i < num_v6addrs; i++) total_size += v6masks[i].iSockaddrLength; } total_size += sizeof(IP_ADAPTER_UNICAST_ADDRESS) * num_v4addrs; total_size += sizeof(struct sockaddr_in) * num_v4addrs; total_size += (sizeof(IP_ADAPTER_GATEWAY_ADDRESS) + sizeof(SOCKADDR_IN)) * num_v4_gateways; total_size += sizeof(IP_ADAPTER_UNICAST_ADDRESS) * num_v6addrs; total_size += sizeof(SOCKET_ADDRESS) * num_v6addrs; for (i = 0; i < num_v6addrs; i++) total_size += v6addrs[i].iSockaddrLength; if (aa && *size >= total_size) { char name[IF_NAMESIZE], *ptr = (char *)aa + sizeof(IP_ADAPTER_ADDRESSES), *src; WCHAR *dst; DWORD buflen, type; INTERNAL_IF_OPER_STATUS status; memset(aa, 0, sizeof(IP_ADAPTER_ADDRESSES)); aa->u.s.Length = sizeof(IP_ADAPTER_ADDRESSES); aa->u.s.IfIndex = index; getInterfaceNameByIndex(index, name); memcpy(ptr, name, IF_NAMESIZE); aa->AdapterName = ptr; ptr += IF_NAMESIZE; if (!(flags & GAA_FLAG_SKIP_FRIENDLY_NAME)) { aa->FriendlyName = (WCHAR *)ptr; for (src = name, dst = (WCHAR *)ptr; *src; src++, dst++) *dst = *src; *dst++ = 0; ptr = (char *)dst; } aa->Description = (WCHAR *)ptr; for (src = name, dst = (WCHAR *)ptr; *src; src++, dst++) *dst = *src; *dst++ = 0; ptr = (char *)dst; TRACE("%s: %d IPv4 addresses, %d IPv6 addresses:\n", name, num_v4addrs, num_v6addrs); buflen = MAX_INTERFACE_PHYSADDR; getInterfacePhysicalByIndex(index, &buflen, aa->PhysicalAddress, &type); aa->PhysicalAddressLength = buflen; aa->IfType = typeFromMibType(type); aa->ConnectionType = connectionTypeFromMibType(type); if (num_v4_gateways) { PMIB_IPFORWARDROW adapterRow; if ((adapterRow = findIPv4Gateway(index, routeTable))) { PIP_ADAPTER_GATEWAY_ADDRESS gw; PSOCKADDR_IN sin; gw = (PIP_ADAPTER_GATEWAY_ADDRESS)ptr; aa->FirstGatewayAddress = gw; gw->u.s.Length = sizeof(IP_ADAPTER_GATEWAY_ADDRESS); ptr += sizeof(IP_ADAPTER_GATEWAY_ADDRESS); sin = (PSOCKADDR_IN)ptr; sin->sin_family = AF_INET; sin->sin_port = 0; memcpy(&sin->sin_addr, &adapterRow->dwForwardNextHop, sizeof(DWORD)); gw->Address.lpSockaddr = (LPSOCKADDR)sin; gw->Address.iSockaddrLength = sizeof(SOCKADDR_IN); gw->Next = NULL; ptr += sizeof(SOCKADDR_IN); } } if (num_v4addrs && !(flags & GAA_FLAG_SKIP_UNICAST)) { IP_ADAPTER_UNICAST_ADDRESS *ua; struct WS_sockaddr_in *sa; aa->Flags |= IP_ADAPTER_IPV4_ENABLED; ua = aa->FirstUnicastAddress = (IP_ADAPTER_UNICAST_ADDRESS *)ptr; for (i = 0; i < num_v4addrs; i++) { char addr_buf[16]; memset(ua, 0, sizeof(IP_ADAPTER_UNICAST_ADDRESS)); ua->u.s.Length = sizeof(IP_ADAPTER_UNICAST_ADDRESS); ua->Address.iSockaddrLength = sizeof(struct sockaddr_in); ua->Address.lpSockaddr = (SOCKADDR *)((char *)ua + ua->u.s.Length); sa = (struct WS_sockaddr_in *)ua->Address.lpSockaddr; sa->sin_family = WS_AF_INET; sa->sin_addr.S_un.S_addr = v4addrs[i]; sa->sin_port = 0; TRACE("IPv4 %d/%d: %s\n", i + 1, num_v4addrs, debugstr_ipv4(&sa->sin_addr.S_un.S_addr, addr_buf)); fill_unicast_addr_data(aa, ua); ptr += ua->u.s.Length + ua->Address.iSockaddrLength; if (i < num_v4addrs - 1) { ua->Next = (IP_ADAPTER_UNICAST_ADDRESS *)ptr; ua = ua->Next; } } } if (num_v6addrs && !(flags & GAA_FLAG_SKIP_UNICAST)) { IP_ADAPTER_UNICAST_ADDRESS *ua; struct WS_sockaddr_in6 *sa; aa->Flags |= IP_ADAPTER_IPV6_ENABLED; if (aa->FirstUnicastAddress) { for (ua = aa->FirstUnicastAddress; ua->Next; ua = ua->Next) ; ua->Next = (IP_ADAPTER_UNICAST_ADDRESS *)ptr; ua = (IP_ADAPTER_UNICAST_ADDRESS *)ptr; } else ua = aa->FirstUnicastAddress = (IP_ADAPTER_UNICAST_ADDRESS *)ptr; for (i = 0; i < num_v6addrs; i++) { char addr_buf[46]; memset(ua, 0, sizeof(IP_ADAPTER_UNICAST_ADDRESS)); ua->u.s.Length = sizeof(IP_ADAPTER_UNICAST_ADDRESS); ua->Address.iSockaddrLength = v6addrs[i].iSockaddrLength; ua->Address.lpSockaddr = (SOCKADDR *)((char *)ua + ua->u.s.Length); sa = (struct WS_sockaddr_in6 *)ua->Address.lpSockaddr; memcpy(sa, v6addrs[i].lpSockaddr, sizeof(*sa)); TRACE("IPv6 %d/%d: %s\n", i + 1, num_v6addrs, debugstr_ipv6(sa, addr_buf)); fill_unicast_addr_data(aa, ua); ptr += ua->u.s.Length + ua->Address.iSockaddrLength; if (i < num_v6addrs - 1) { ua->Next = (IP_ADAPTER_UNICAST_ADDRESS *)ptr; ua = ua->Next; } } } if (num_v4addrs && (flags & GAA_FLAG_INCLUDE_PREFIX)) { IP_ADAPTER_PREFIX *prefix; prefix = aa->FirstPrefix = (IP_ADAPTER_PREFIX *)ptr; for (i = 0; i < num_v4addrs; i++) { char addr_buf[16]; struct WS_sockaddr_in *sa; prefix->u.s.Length = sizeof(*prefix); prefix->u.s.Flags = 0; prefix->Next = NULL; prefix->Address.iSockaddrLength = sizeof(struct sockaddr_in); prefix->Address.lpSockaddr = (SOCKADDR *)((char *)prefix + prefix->u.s.Length); sa = (struct WS_sockaddr_in *)prefix->Address.lpSockaddr; sa->sin_family = WS_AF_INET; sa->sin_addr.S_un.S_addr = v4addrs[i] & v4masks[i]; sa->sin_port = 0; prefix->PrefixLength = 0; for (j = 0; j < sizeof(*v4masks) * 8; j++) { if (v4masks[i] & 1 << j) prefix->PrefixLength++; else break; } TRACE("IPv4 network: %s/%u\n", debugstr_ipv4((const in_addr_t *)&sa->sin_addr.S_un.S_addr, addr_buf), prefix->PrefixLength); ptr += prefix->u.s.Length + prefix->Address.iSockaddrLength; if (i < num_v4addrs - 1) { prefix->Next = (IP_ADAPTER_PREFIX *)ptr; prefix = prefix->Next; } } } if (num_v6addrs && (flags & GAA_FLAG_INCLUDE_PREFIX)) { IP_ADAPTER_PREFIX *prefix; if (aa->FirstPrefix) { for (prefix = aa->FirstPrefix; prefix->Next; prefix = prefix->Next) ; prefix->Next = (IP_ADAPTER_PREFIX *)ptr; prefix = (IP_ADAPTER_PREFIX *)ptr; } else prefix = aa->FirstPrefix = (IP_ADAPTER_PREFIX *)ptr; for (i = 0; i < num_v6addrs; i++) { char addr_buf[46]; struct WS_sockaddr_in6 *sa; const IN6_ADDR *addr, *mask; BOOL done = FALSE; ULONG k; prefix->u.s.Length = sizeof(*prefix); prefix->u.s.Flags = 0; prefix->Next = NULL; prefix->Address.iSockaddrLength = sizeof(struct sockaddr_in6); prefix->Address.lpSockaddr = (SOCKADDR *)((char *)prefix + prefix->u.s.Length); sa = (struct WS_sockaddr_in6 *)prefix->Address.lpSockaddr; sa->sin6_family = WS_AF_INET6; sa->sin6_port = 0; sa->sin6_flowinfo = 0; addr = &((struct WS_sockaddr_in6 *)v6addrs[i].lpSockaddr)->sin6_addr; mask = &((struct WS_sockaddr_in6 *)v6masks[i].lpSockaddr)->sin6_addr; for (j = 0; j < 8; j++) sa->sin6_addr.u.Word[j] = addr->u.Word[j] & mask->u.Word[j]; sa->sin6_scope_id = 0; prefix->PrefixLength = 0; for (k = 0; k < 8 && !done; k++) { for (j = 0; j < sizeof(WORD) * 8 && !done; j++) { if (mask->u.Word[k] & 1 << j) prefix->PrefixLength++; else done = TRUE; } } TRACE("IPv6 network: %s/%u\n", debugstr_ipv6(sa, addr_buf), prefix->PrefixLength); ptr += prefix->u.s.Length + prefix->Address.iSockaddrLength; if (i < num_v6addrs - 1) { prefix->Next = (IP_ADAPTER_PREFIX *)ptr; prefix = prefix->Next; } } } getInterfaceMtuByName(name, &aa->Mtu); getInterfaceStatusByName(name, &status); if (status == MIB_IF_OPER_STATUS_OPERATIONAL) aa->OperStatus = IfOperStatusUp; else if (status == MIB_IF_OPER_STATUS_NON_OPERATIONAL) aa->OperStatus = IfOperStatusDown; else aa->OperStatus = IfOperStatusUnknown; } *size = total_size; HeapFree(GetProcessHeap(), 0, routeTable); HeapFree(GetProcessHeap(), 0, v6addrs); HeapFree(GetProcessHeap(), 0, v6masks); HeapFree(GetProcessHeap(), 0, v4addrs); HeapFree(GetProcessHeap(), 0, v4masks); return ERROR_SUCCESS; } static void sockaddr_in_to_WS_storage( SOCKADDR_STORAGE *dst, const struct sockaddr_in *src ) { SOCKADDR_IN *s = (SOCKADDR_IN *)dst; s->sin_family = WS_AF_INET; s->sin_port = src->sin_port; memcpy( &s->sin_addr, &src->sin_addr, sizeof(IN_ADDR) ); memset( (char *)s + FIELD_OFFSET( SOCKADDR_IN, sin_zero ), 0, sizeof(SOCKADDR_STORAGE) - FIELD_OFFSET( SOCKADDR_IN, sin_zero) ); } static void sockaddr_in6_to_WS_storage( SOCKADDR_STORAGE *dst, const struct sockaddr_in6 *src ) { SOCKADDR_IN6 *s = (SOCKADDR_IN6 *)dst; s->sin6_family = WS_AF_INET6; s->sin6_port = src->sin6_port; s->sin6_flowinfo = src->sin6_flowinfo; memcpy( &s->sin6_addr, &src->sin6_addr, sizeof(IN6_ADDR) ); s->sin6_scope_id = src->sin6_scope_id; memset( (char *)s + sizeof(SOCKADDR_IN6), 0, sizeof(SOCKADDR_STORAGE) - sizeof(SOCKADDR_IN6) ); } #ifdef HAVE_STRUCT___RES_STATE /* call res_init() just once because of a bug in Mac OS X 10.4 */ /* Call once per thread on systems that have per-thread _res. */ static CRITICAL_SECTION res_init_cs; static CRITICAL_SECTION_DEBUG res_init_cs_debug = { 0, 0, &res_init_cs, { &res_init_cs_debug.ProcessLocksList, &res_init_cs_debug.ProcessLocksList }, 0, 0, { (DWORD_PTR)(__FILE__ ": res_init_cs") } }; static CRITICAL_SECTION res_init_cs = { &res_init_cs_debug, -1, 0, 0, 0, 0 }; static void initialise_resolver(void) { EnterCriticalSection(&res_init_cs); if ((_res.options & RES_INIT) == 0) res_init(); LeaveCriticalSection(&res_init_cs); } static int get_dns_servers( SOCKADDR_STORAGE *servers, int num, BOOL ip4_only ) { int i, ip6_count = 0; SOCKADDR_STORAGE *addr; initialise_resolver(); #ifdef HAVE_STRUCT___RES_STATE__U__EXT_NSCOUNT6 ip6_count = _res._u._ext.nscount6; #endif if (!servers || !num) { num = _res.nscount; if (ip4_only) num -= ip6_count; return num; } for (i = 0, addr = servers; addr < (servers + num) && i < _res.nscount; i++) { #ifdef HAVE_STRUCT___RES_STATE__U__EXT_NSCOUNT6 if (_res._u._ext.nsaddrs[i]) { if (ip4_only) continue; sockaddr_in6_to_WS_storage( addr, _res._u._ext.nsaddrs[i] ); } else #endif { sockaddr_in_to_WS_storage( addr, _res.nsaddr_list + i ); } addr++; } return addr - servers; } #elif defined(HAVE___RES_GET_STATE) && defined(HAVE___RES_GETSERVERS) static int get_dns_servers( SOCKADDR_STORAGE *servers, int num, BOOL ip4_only ) { extern struct res_state *__res_get_state( void ); extern int __res_getservers( struct res_state *, struct sockaddr_storage *, int ); struct res_state *state = __res_get_state(); int i, found = 0, total = __res_getservers( state, NULL, 0 ); SOCKADDR_STORAGE *addr = servers; struct sockaddr_storage *buf; if ((!servers || !num) && !ip4_only) return total; buf = HeapAlloc( GetProcessHeap(), 0, total * sizeof(struct sockaddr_storage) ); total = __res_getservers( state, buf, total ); for (i = 0; i < total; i++) { if (buf[i].ss_family == AF_INET6 && ip4_only) continue; if (buf[i].ss_family != AF_INET && buf[i].ss_family != AF_INET6) continue; found++; if (!servers || !num) continue; if (buf[i].ss_family == AF_INET6) { sockaddr_in6_to_WS_storage( addr, (struct sockaddr_in6 *)(buf + i) ); } else { sockaddr_in_to_WS_storage( addr, (struct sockaddr_in *)(buf + i) ); } if (++addr >= servers + num) break; } HeapFree( GetProcessHeap(), 0, buf ); return found; } #else static int get_dns_servers( SOCKADDR_STORAGE *servers, int num, BOOL ip4_only ) { FIXME("Unimplemented on this system\n"); return 0; } #endif static ULONG get_dns_server_addresses(PIP_ADAPTER_DNS_SERVER_ADDRESS address, ULONG *len) { int num = get_dns_servers( NULL, 0, FALSE ); DWORD size; size = num * (sizeof(IP_ADAPTER_DNS_SERVER_ADDRESS) + sizeof(SOCKADDR_STORAGE)); if (!address || *len < size) { *len = size; return ERROR_BUFFER_OVERFLOW; } *len = size; if (num > 0) { PIP_ADAPTER_DNS_SERVER_ADDRESS addr = address; SOCKADDR_STORAGE *sock_addrs = (SOCKADDR_STORAGE *)(address + num); int i; get_dns_servers( sock_addrs, num, FALSE ); for (i = 0; i < num; i++, addr = addr->Next) { addr->u.s.Length = sizeof(*addr); if (sock_addrs[i].ss_family == WS_AF_INET6) addr->Address.iSockaddrLength = sizeof(SOCKADDR_IN6); else addr->Address.iSockaddrLength = sizeof(SOCKADDR_IN); addr->Address.lpSockaddr = (SOCKADDR *)(sock_addrs + i); if (i == num - 1) addr->Next = NULL; else addr->Next = addr + 1; } } return ERROR_SUCCESS; } #ifdef HAVE_STRUCT___RES_STATE static BOOL is_ip_address_string(const char *str) { struct in_addr in; int ret; ret = inet_aton(str, &in); return ret != 0; } #endif static ULONG get_dns_suffix(WCHAR *suffix, ULONG *len) { ULONG size; const char *found_suffix = ""; /* Always return a NULL-terminated string, even if it's empty. */ #ifdef HAVE_STRUCT___RES_STATE { ULONG i; initialise_resolver(); for (i = 0; !*found_suffix && i < MAXDNSRCH + 1 && _res.dnsrch[i]; i++) { /* This uses a heuristic to select a DNS suffix: * the first, non-IP address string is selected. */ if (!is_ip_address_string(_res.dnsrch[i])) found_suffix = _res.dnsrch[i]; } } #endif size = MultiByteToWideChar( CP_UNIXCP, 0, found_suffix, -1, NULL, 0 ) * sizeof(WCHAR); if (!suffix || *len < size) { *len = size; return ERROR_BUFFER_OVERFLOW; } *len = MultiByteToWideChar( CP_UNIXCP, 0, found_suffix, -1, suffix, *len / sizeof(WCHAR) ) * sizeof(WCHAR); return ERROR_SUCCESS; } ULONG WINAPI DECLSPEC_HOTPATCH GetAdaptersAddresses(ULONG family, ULONG flags, PVOID reserved, PIP_ADAPTER_ADDRESSES aa, PULONG buflen) { InterfaceIndexTable *table; ULONG i, size, dns_server_size = 0, dns_suffix_size, total_size, ret = ERROR_NO_DATA; TRACE("(%d, %08x, %p, %p, %p)\n", family, flags, reserved, aa, buflen); if (!buflen) return ERROR_INVALID_PARAMETER; get_interface_indices( FALSE, &table ); if (!table || !table->numIndexes) { HeapFree(GetProcessHeap(), 0, table); return ERROR_NO_DATA; } total_size = 0; for (i = 0; i < table->numIndexes; i++) { size = 0; if ((ret = adapterAddressesFromIndex(family, flags, table->indexes[i], NULL, &size))) { HeapFree(GetProcessHeap(), 0, table); return ret; } total_size += size; } if (!(flags & GAA_FLAG_SKIP_DNS_SERVER)) { /* Since DNS servers aren't really per adapter, get enough space for a * single copy of them. */ get_dns_server_addresses(NULL, &dns_server_size); total_size += dns_server_size; } /* Since DNS suffix also isn't really per adapter, get enough space for a * single copy of it. */ get_dns_suffix(NULL, &dns_suffix_size); total_size += dns_suffix_size; if (aa && *buflen >= total_size) { ULONG bytes_left = size = total_size; PIP_ADAPTER_ADDRESSES first_aa = aa; PIP_ADAPTER_DNS_SERVER_ADDRESS firstDns; WCHAR *dnsSuffix; for (i = 0; i < table->numIndexes; i++) { if ((ret = adapterAddressesFromIndex(family, flags, table->indexes[i], aa, &size))) { HeapFree(GetProcessHeap(), 0, table); return ret; } if (i < table->numIndexes - 1) { aa->Next = (IP_ADAPTER_ADDRESSES *)((char *)aa + size); aa = aa->Next; size = bytes_left -= size; } } if (dns_server_size) { firstDns = (PIP_ADAPTER_DNS_SERVER_ADDRESS)((BYTE *)first_aa + total_size - dns_server_size - dns_suffix_size); get_dns_server_addresses(firstDns, &dns_server_size); for (aa = first_aa; aa; aa = aa->Next) { if (aa->IfType != IF_TYPE_SOFTWARE_LOOPBACK && aa->OperStatus == IfOperStatusUp) aa->FirstDnsServerAddress = firstDns; } } aa = first_aa; dnsSuffix = (WCHAR *)((BYTE *)aa + total_size - dns_suffix_size); get_dns_suffix(dnsSuffix, &dns_suffix_size); for (; aa; aa = aa->Next) { if (aa->IfType != IF_TYPE_SOFTWARE_LOOPBACK && aa->OperStatus == IfOperStatusUp) aa->DnsSuffix = dnsSuffix; else aa->DnsSuffix = dnsSuffix + dns_suffix_size / sizeof(WCHAR) - 1; } ret = ERROR_SUCCESS; } else { ret = ERROR_BUFFER_OVERFLOW; *buflen = total_size; } TRACE("num adapters %u\n", table->numIndexes); HeapFree(GetProcessHeap(), 0, table); return ret; } /****************************************************************** * GetBestInterface (IPHLPAPI.@) * * Get the interface, with the best route for the given IP address. * * PARAMS * dwDestAddr [In] IP address to search the interface for * pdwBestIfIndex [Out] found best interface * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h */ DWORD WINAPI GetBestInterface(IPAddr dwDestAddr, PDWORD pdwBestIfIndex) { struct WS_sockaddr_in sa_in; memset(&sa_in, 0, sizeof(sa_in)); sa_in.sin_family = AF_INET; sa_in.sin_addr.S_un.S_addr = dwDestAddr; return GetBestInterfaceEx((struct WS_sockaddr *)&sa_in, pdwBestIfIndex); } /****************************************************************** * GetBestInterfaceEx (IPHLPAPI.@) * * Get the interface, with the best route for the given IP address. * * PARAMS * dwDestAddr [In] IP address to search the interface for * pdwBestIfIndex [Out] found best interface * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h */ DWORD WINAPI GetBestInterfaceEx(struct WS_sockaddr *pDestAddr, PDWORD pdwBestIfIndex) { DWORD ret; TRACE("pDestAddr %p, pdwBestIfIndex %p\n", pDestAddr, pdwBestIfIndex); if (!pDestAddr || !pdwBestIfIndex) ret = ERROR_INVALID_PARAMETER; else { MIB_IPFORWARDROW ipRow; if (pDestAddr->sa_family == AF_INET) { ret = GetBestRoute(((struct WS_sockaddr_in *)pDestAddr)->sin_addr.S_un.S_addr, 0, &ipRow); if (ret == ERROR_SUCCESS) *pdwBestIfIndex = ipRow.dwForwardIfIndex; } else { FIXME("address family %d not supported\n", pDestAddr->sa_family); ret = ERROR_NOT_SUPPORTED; } } TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetBestRoute (IPHLPAPI.@) * * Get the best route for the given IP address. * * PARAMS * dwDestAddr [In] IP address to search the best route for * dwSourceAddr [In] optional source IP address * pBestRoute [Out] found best route * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h */ DWORD WINAPI GetBestRoute(DWORD dwDestAddr, DWORD dwSourceAddr, PMIB_IPFORWARDROW pBestRoute) { PMIB_IPFORWARDTABLE table; DWORD ret; TRACE("dwDestAddr 0x%08x, dwSourceAddr 0x%08x, pBestRoute %p\n", dwDestAddr, dwSourceAddr, pBestRoute); if (!pBestRoute) return ERROR_INVALID_PARAMETER; ret = AllocateAndGetIpForwardTableFromStack(&table, FALSE, GetProcessHeap(), 0); if (!ret) { DWORD ndx, matchedBits, matchedNdx = table->dwNumEntries; for (ndx = 0, matchedBits = 0; ndx < table->dwNumEntries; ndx++) { if (table->table[ndx].u1.ForwardType != MIB_IPROUTE_TYPE_INVALID && (dwDestAddr & table->table[ndx].dwForwardMask) == (table->table[ndx].dwForwardDest & table->table[ndx].dwForwardMask)) { DWORD numShifts, mask; for (numShifts = 0, mask = table->table[ndx].dwForwardMask; mask && mask & 1; mask >>= 1, numShifts++) ; if (numShifts > matchedBits) { matchedBits = numShifts; matchedNdx = ndx; } else if (!matchedBits) { matchedNdx = ndx; } } } if (matchedNdx < table->dwNumEntries) { memcpy(pBestRoute, &table->table[matchedNdx], sizeof(MIB_IPFORWARDROW)); ret = ERROR_SUCCESS; } else { /* No route matches, which can happen if there's no default route. */ ret = ERROR_HOST_UNREACHABLE; } HeapFree(GetProcessHeap(), 0, table); } TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetFriendlyIfIndex (IPHLPAPI.@) * * Get a "friendly" version of IfIndex, which is one that doesn't * have the top byte set. Doesn't validate whether IfIndex is a valid * adapter index. * * PARAMS * IfIndex [In] interface index to get the friendly one for * * RETURNS * A friendly version of IfIndex. */ DWORD WINAPI GetFriendlyIfIndex(DWORD IfIndex) { /* windows doesn't validate these, either, just makes sure the top byte is cleared. I assume my ifenum module never gives an index with the top byte set. */ TRACE("returning %d\n", IfIndex); return IfIndex; } /****************************************************************** * GetIfEntry (IPHLPAPI.@) * * Get information about an interface. * * PARAMS * pIfRow [In/Out] In: dwIndex of MIB_IFROW selects the interface. * Out: interface information * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h */ DWORD WINAPI GetIfEntry(PMIB_IFROW pIfRow) { DWORD ret; char nameBuf[MAX_ADAPTER_NAME]; char *name; TRACE("pIfRow %p\n", pIfRow); if (!pIfRow) return ERROR_INVALID_PARAMETER; name = getInterfaceNameByIndex(pIfRow->dwIndex, nameBuf); if (name) { ret = getInterfaceEntryByName(name, pIfRow); if (ret == NO_ERROR) ret = getInterfaceStatsByName(name, pIfRow); } else ret = ERROR_INVALID_DATA; TRACE("returning %d\n", ret); return ret; } static int IfTableSorter(const void *a, const void *b) { int ret; if (a && b) ret = ((const MIB_IFROW*)a)->dwIndex - ((const MIB_IFROW*)b)->dwIndex; else ret = 0; return ret; } /****************************************************************** * GetIfTable (IPHLPAPI.@) * * Get a table of local interfaces. * * PARAMS * pIfTable [Out] buffer for local interfaces table * pdwSize [In/Out] length of output buffer * bOrder [In] whether to sort the table * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * If pdwSize is less than required, the function will return * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte * size. * If bOrder is true, the returned table will be sorted by interface index. */ DWORD WINAPI GetIfTable(PMIB_IFTABLE pIfTable, PULONG pdwSize, BOOL bOrder) { DWORD ret; TRACE("pIfTable %p, pdwSize %p, bOrder %d\n", pdwSize, pdwSize, (DWORD)bOrder); if (!pdwSize) ret = ERROR_INVALID_PARAMETER; else { DWORD numInterfaces = get_interface_indices( FALSE, NULL ); ULONG size = sizeof(MIB_IFTABLE); if (numInterfaces > 1) size += (numInterfaces - 1) * sizeof(MIB_IFROW); if (!pIfTable || *pdwSize < size) { *pdwSize = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { InterfaceIndexTable *table; get_interface_indices( FALSE, &table ); if (table) { size = sizeof(MIB_IFTABLE); if (table->numIndexes > 1) size += (table->numIndexes - 1) * sizeof(MIB_IFROW); if (*pdwSize < size) { *pdwSize = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { DWORD ndx; *pdwSize = size; pIfTable->dwNumEntries = 0; for (ndx = 0; ndx < table->numIndexes; ndx++) { pIfTable->table[ndx].dwIndex = table->indexes[ndx]; GetIfEntry(&pIfTable->table[ndx]); pIfTable->dwNumEntries++; } if (bOrder) qsort(pIfTable->table, pIfTable->dwNumEntries, sizeof(MIB_IFROW), IfTableSorter); ret = NO_ERROR; } HeapFree(GetProcessHeap(), 0, table); } else ret = ERROR_OUTOFMEMORY; } } TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetInterfaceInfo (IPHLPAPI.@) * * Get a list of network interface adapters. * * PARAMS * pIfTable [Out] buffer for interface adapters * dwOutBufLen [Out] if buffer is too small, returns required size * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * BUGS * MSDN states this should return non-loopback interfaces only. */ DWORD WINAPI GetInterfaceInfo(PIP_INTERFACE_INFO pIfTable, PULONG dwOutBufLen) { DWORD ret; TRACE("pIfTable %p, dwOutBufLen %p\n", pIfTable, dwOutBufLen); if (!dwOutBufLen) ret = ERROR_INVALID_PARAMETER; else { DWORD numInterfaces = get_interface_indices( FALSE, NULL ); ULONG size = sizeof(IP_INTERFACE_INFO); if (numInterfaces > 1) size += (numInterfaces - 1) * sizeof(IP_ADAPTER_INDEX_MAP); if (!pIfTable || *dwOutBufLen < size) { *dwOutBufLen = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { InterfaceIndexTable *table; get_interface_indices( FALSE, &table ); if (table) { size = sizeof(IP_INTERFACE_INFO); if (table->numIndexes > 1) size += (table->numIndexes - 1) * sizeof(IP_ADAPTER_INDEX_MAP); if (*dwOutBufLen < size) { *dwOutBufLen = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { DWORD ndx; char nameBuf[MAX_ADAPTER_NAME]; *dwOutBufLen = size; pIfTable->NumAdapters = 0; for (ndx = 0; ndx < table->numIndexes; ndx++) { const char *walker, *name; WCHAR *assigner; pIfTable->Adapter[ndx].Index = table->indexes[ndx]; name = getInterfaceNameByIndex(table->indexes[ndx], nameBuf); for (walker = name, assigner = pIfTable->Adapter[ndx].Name; walker && *walker && assigner - pIfTable->Adapter[ndx].Name < MAX_ADAPTER_NAME - 1; walker++, assigner++) *assigner = *walker; *assigner = 0; pIfTable->NumAdapters++; } ret = NO_ERROR; } HeapFree(GetProcessHeap(), 0, table); } else ret = ERROR_OUTOFMEMORY; } } TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetIpAddrTable (IPHLPAPI.@) * * Get interface-to-IP address mapping table. * * PARAMS * pIpAddrTable [Out] buffer for mapping table * pdwSize [In/Out] length of output buffer * bOrder [In] whether to sort the table * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * If pdwSize is less than required, the function will return * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte * size. * If bOrder is true, the returned table will be sorted by the next hop and * an assortment of arbitrary parameters. */ DWORD WINAPI GetIpAddrTable(PMIB_IPADDRTABLE pIpAddrTable, PULONG pdwSize, BOOL bOrder) { DWORD ret; TRACE("pIpAddrTable %p, pdwSize %p, bOrder %d\n", pIpAddrTable, pdwSize, (DWORD)bOrder); if (!pdwSize) ret = ERROR_INVALID_PARAMETER; else { PMIB_IPADDRTABLE table; ret = getIPAddrTable(&table, GetProcessHeap(), 0); if (ret == NO_ERROR) { ULONG size = FIELD_OFFSET(MIB_IPADDRTABLE, table[table->dwNumEntries]); if (!pIpAddrTable || *pdwSize < size) { *pdwSize = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { *pdwSize = size; memcpy(pIpAddrTable, table, size); if (bOrder) qsort(pIpAddrTable->table, pIpAddrTable->dwNumEntries, sizeof(MIB_IPADDRROW), IpAddrTableSorter); ret = NO_ERROR; } HeapFree(GetProcessHeap(), 0, table); } } TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetIpForwardTable (IPHLPAPI.@) * * Get the route table. * * PARAMS * pIpForwardTable [Out] buffer for route table * pdwSize [In/Out] length of output buffer * bOrder [In] whether to sort the table * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * If pdwSize is less than required, the function will return * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte * size. * If bOrder is true, the returned table will be sorted by the next hop and * an assortment of arbitrary parameters. */ DWORD WINAPI GetIpForwardTable(PMIB_IPFORWARDTABLE pIpForwardTable, PULONG pdwSize, BOOL bOrder) { DWORD ret; PMIB_IPFORWARDTABLE table; TRACE("pIpForwardTable %p, pdwSize %p, bOrder %d\n", pIpForwardTable, pdwSize, bOrder); if (!pdwSize) return ERROR_INVALID_PARAMETER; ret = AllocateAndGetIpForwardTableFromStack(&table, bOrder, GetProcessHeap(), 0); if (!ret) { DWORD size = FIELD_OFFSET( MIB_IPFORWARDTABLE, table[table->dwNumEntries] ); if (!pIpForwardTable || *pdwSize < size) { *pdwSize = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { *pdwSize = size; memcpy(pIpForwardTable, table, size); } HeapFree(GetProcessHeap(), 0, table); } TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetIpNetTable (IPHLPAPI.@) * * Get the IP-to-physical address mapping table. * * PARAMS * pIpNetTable [Out] buffer for mapping table * pdwSize [In/Out] length of output buffer * bOrder [In] whether to sort the table * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * If pdwSize is less than required, the function will return * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte * size. * If bOrder is true, the returned table will be sorted by IP address. */ DWORD WINAPI GetIpNetTable(PMIB_IPNETTABLE pIpNetTable, PULONG pdwSize, BOOL bOrder) { DWORD ret; PMIB_IPNETTABLE table; TRACE("pIpNetTable %p, pdwSize %p, bOrder %d\n", pIpNetTable, pdwSize, bOrder); if (!pdwSize) return ERROR_INVALID_PARAMETER; ret = AllocateAndGetIpNetTableFromStack( &table, bOrder, GetProcessHeap(), 0 ); if (!ret) { DWORD size = FIELD_OFFSET( MIB_IPNETTABLE, table[table->dwNumEntries] ); if (!pIpNetTable || *pdwSize < size) { *pdwSize = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { *pdwSize = size; memcpy(pIpNetTable, table, size); } HeapFree(GetProcessHeap(), 0, table); } TRACE("returning %d\n", ret); return ret; } /* Gets the DNS server list into the list beginning at list. Assumes that * a single server address may be placed at list if *len is at least * sizeof(IP_ADDR_STRING) long. Otherwise, list->Next is set to firstDynamic, * and assumes that all remaining DNS servers are contiguously located * beginning at firstDynamic. On input, *len is assumed to be the total number * of bytes available for all DNS servers, and is ignored if list is NULL. * On return, *len is set to the total number of bytes required for all DNS * servers. * Returns ERROR_BUFFER_OVERFLOW if *len is insufficient, * ERROR_SUCCESS otherwise. */ static DWORD get_dns_server_list(PIP_ADDR_STRING list, PIP_ADDR_STRING firstDynamic, DWORD *len) { DWORD size; int num = get_dns_servers( NULL, 0, TRUE ); size = num * sizeof(IP_ADDR_STRING); if (!list || *len < size) { *len = size; return ERROR_BUFFER_OVERFLOW; } *len = size; if (num > 0) { PIP_ADDR_STRING ptr; int i; SOCKADDR_STORAGE *addr = HeapAlloc( GetProcessHeap(), 0, num * sizeof(SOCKADDR_STORAGE) ); get_dns_servers( addr, num, TRUE ); for (i = 0, ptr = list; i < num; i++, ptr = ptr->Next) { toIPAddressString(((struct sockaddr_in *)(addr + i))->sin_addr.s_addr, ptr->IpAddress.String); if (i == num - 1) ptr->Next = NULL; else if (i == 0) ptr->Next = firstDynamic; else ptr->Next = (PIP_ADDR_STRING)((PBYTE)ptr + sizeof(IP_ADDR_STRING)); } HeapFree( GetProcessHeap(), 0, addr ); } return ERROR_SUCCESS; } /****************************************************************** * GetNetworkParams (IPHLPAPI.@) * * Get the network parameters for the local computer. * * PARAMS * pFixedInfo [Out] buffer for network parameters * pOutBufLen [In/Out] length of output buffer * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * If pOutBufLen is less than required, the function will return * ERROR_INSUFFICIENT_BUFFER, and pOutBufLen will be set to the required byte * size. */ DWORD WINAPI GetNetworkParams(PFIXED_INFO pFixedInfo, PULONG pOutBufLen) { DWORD ret, size, serverListSize; LONG regReturn; HKEY hKey; TRACE("pFixedInfo %p, pOutBufLen %p\n", pFixedInfo, pOutBufLen); if (!pOutBufLen) return ERROR_INVALID_PARAMETER; get_dns_server_list(NULL, NULL, &serverListSize); size = sizeof(FIXED_INFO) + serverListSize - sizeof(IP_ADDR_STRING); if (!pFixedInfo || *pOutBufLen < size) { *pOutBufLen = size; return ERROR_BUFFER_OVERFLOW; } memset(pFixedInfo, 0, size); size = sizeof(pFixedInfo->HostName); GetComputerNameExA(ComputerNameDnsHostname, pFixedInfo->HostName, &size); size = sizeof(pFixedInfo->DomainName); GetComputerNameExA(ComputerNameDnsDomain, pFixedInfo->DomainName, &size); get_dns_server_list(&pFixedInfo->DnsServerList, (PIP_ADDR_STRING)((BYTE *)pFixedInfo + sizeof(FIXED_INFO)), &serverListSize); /* Assume the first DNS server in the list is the "current" DNS server: */ pFixedInfo->CurrentDnsServer = &pFixedInfo->DnsServerList; pFixedInfo->NodeType = HYBRID_NODETYPE; regReturn = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "SYSTEM\\CurrentControlSet\\Services\\VxD\\MSTCP", 0, KEY_READ, &hKey); if (regReturn != ERROR_SUCCESS) regReturn = RegOpenKeyExA(HKEY_LOCAL_MACHINE, "SYSTEM\\CurrentControlSet\\Services\\NetBT\\Parameters", 0, KEY_READ, &hKey); if (regReturn == ERROR_SUCCESS) { DWORD size = sizeof(pFixedInfo->ScopeId); RegQueryValueExA(hKey, "ScopeID", NULL, NULL, (LPBYTE)pFixedInfo->ScopeId, &size); RegCloseKey(hKey); } /* FIXME: can check whether routing's enabled in /proc/sys/net/ipv4/ip_forward I suppose could also check for a listener on port 53 to set EnableDns */ ret = NO_ERROR; TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetNumberOfInterfaces (IPHLPAPI.@) * * Get the number of interfaces. * * PARAMS * pdwNumIf [Out] number of interfaces * * RETURNS * NO_ERROR on success, ERROR_INVALID_PARAMETER if pdwNumIf is NULL. */ DWORD WINAPI GetNumberOfInterfaces(PDWORD pdwNumIf) { DWORD ret; TRACE("pdwNumIf %p\n", pdwNumIf); if (!pdwNumIf) ret = ERROR_INVALID_PARAMETER; else { *pdwNumIf = get_interface_indices( FALSE, NULL ); ret = NO_ERROR; } TRACE("returning %d\n", ret); return ret; } /****************************************************************** * GetPerAdapterInfo (IPHLPAPI.@) * * Get information about an adapter corresponding to an interface. * * PARAMS * IfIndex [In] interface info * pPerAdapterInfo [Out] buffer for per adapter info * pOutBufLen [In/Out] length of output buffer * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h */ DWORD WINAPI GetPerAdapterInfo(ULONG IfIndex, PIP_PER_ADAPTER_INFO pPerAdapterInfo, PULONG pOutBufLen) { ULONG bytesNeeded = sizeof(IP_PER_ADAPTER_INFO), serverListSize = 0; DWORD ret = NO_ERROR; TRACE("(IfIndex %d, pPerAdapterInfo %p, pOutBufLen %p)\n", IfIndex, pPerAdapterInfo, pOutBufLen); if (!pOutBufLen) return ERROR_INVALID_PARAMETER; if (!isIfIndexLoopback(IfIndex)) { get_dns_server_list(NULL, NULL, &serverListSize); if (serverListSize > sizeof(IP_ADDR_STRING)) bytesNeeded += serverListSize - sizeof(IP_ADDR_STRING); } if (!pPerAdapterInfo || *pOutBufLen < bytesNeeded) { *pOutBufLen = bytesNeeded; return ERROR_BUFFER_OVERFLOW; } memset(pPerAdapterInfo, 0, bytesNeeded); if (!isIfIndexLoopback(IfIndex)) { ret = get_dns_server_list(&pPerAdapterInfo->DnsServerList, (PIP_ADDR_STRING)((PBYTE)pPerAdapterInfo + sizeof(IP_PER_ADAPTER_INFO)), &serverListSize); /* Assume the first DNS server in the list is the "current" DNS server: */ pPerAdapterInfo->CurrentDnsServer = &pPerAdapterInfo->DnsServerList; } return ret; } /****************************************************************** * GetRTTAndHopCount (IPHLPAPI.@) * * Get round-trip time (RTT) and hop count. * * PARAMS * * DestIpAddress [In] destination address to get the info for * HopCount [Out] retrieved hop count * MaxHops [In] maximum hops to search for the destination * RTT [Out] RTT in milliseconds * * RETURNS * Success: TRUE * Failure: FALSE * * FIXME * Stub, returns FALSE. */ BOOL WINAPI GetRTTAndHopCount(IPAddr DestIpAddress, PULONG HopCount, ULONG MaxHops, PULONG RTT) { FIXME("(DestIpAddress 0x%08x, HopCount %p, MaxHops %d, RTT %p): stub\n", DestIpAddress, HopCount, MaxHops, RTT); return FALSE; } /****************************************************************** * GetTcpTable (IPHLPAPI.@) * * Get the table of active TCP connections. * * PARAMS * pTcpTable [Out] buffer for TCP connections table * pdwSize [In/Out] length of output buffer * bOrder [In] whether to order the table * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * If pdwSize is less than required, the function will return * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to * the required byte size. * If bOrder is true, the returned table will be sorted, first by * local address and port number, then by remote address and port * number. */ DWORD WINAPI GetTcpTable(PMIB_TCPTABLE pTcpTable, PDWORD pdwSize, BOOL bOrder) { TRACE("pTcpTable %p, pdwSize %p, bOrder %d\n", pTcpTable, pdwSize, bOrder); return GetExtendedTcpTable(pTcpTable, pdwSize, bOrder, AF_INET, TCP_TABLE_BASIC_ALL, 0); } /****************************************************************** * GetExtendedTcpTable (IPHLPAPI.@) */ DWORD WINAPI GetExtendedTcpTable(PVOID pTcpTable, PDWORD pdwSize, BOOL bOrder, ULONG ulAf, TCP_TABLE_CLASS TableClass, ULONG Reserved) { DWORD ret, size; void *table; TRACE("pTcpTable %p, pdwSize %p, bOrder %d, ulAf %u, TableClass %u, Reserved %u\n", pTcpTable, pdwSize, bOrder, ulAf, TableClass, Reserved); if (!pdwSize) return ERROR_INVALID_PARAMETER; if (ulAf != AF_INET) { FIXME("ulAf = %u not supported\n", ulAf); return ERROR_NOT_SUPPORTED; } if (TableClass >= TCP_TABLE_OWNER_MODULE_LISTENER) FIXME("module classes not fully supported\n"); if ((ret = build_tcp_table(TableClass, &table, bOrder, GetProcessHeap(), 0, &size))) return ret; if (!pTcpTable || *pdwSize < size) { *pdwSize = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { *pdwSize = size; memcpy(pTcpTable, table, size); } HeapFree(GetProcessHeap(), 0, table); return ret; } /****************************************************************** * GetUdpTable (IPHLPAPI.@) * * Get a table of active UDP connections. * * PARAMS * pUdpTable [Out] buffer for UDP connections table * pdwSize [In/Out] length of output buffer * bOrder [In] whether to order the table * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * If pdwSize is less than required, the function will return * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the * required byte size. * If bOrder is true, the returned table will be sorted, first by * local address, then by local port number. */ DWORD WINAPI GetUdpTable(PMIB_UDPTABLE pUdpTable, PDWORD pdwSize, BOOL bOrder) { return GetExtendedUdpTable(pUdpTable, pdwSize, bOrder, AF_INET, UDP_TABLE_BASIC, 0); } /****************************************************************** * GetExtendedUdpTable (IPHLPAPI.@) */ DWORD WINAPI GetExtendedUdpTable(PVOID pUdpTable, PDWORD pdwSize, BOOL bOrder, ULONG ulAf, UDP_TABLE_CLASS TableClass, ULONG Reserved) { DWORD ret, size; void *table; TRACE("pUdpTable %p, pdwSize %p, bOrder %d, ulAf %u, TableClass %u, Reserved %u\n", pUdpTable, pdwSize, bOrder, ulAf, TableClass, Reserved); if (!pdwSize) return ERROR_INVALID_PARAMETER; if (ulAf != AF_INET) { FIXME("ulAf = %u not supported\n", ulAf); return ERROR_NOT_SUPPORTED; } if (TableClass == UDP_TABLE_OWNER_MODULE) FIXME("UDP_TABLE_OWNER_MODULE not fully supported\n"); if ((ret = build_udp_table(TableClass, &table, bOrder, GetProcessHeap(), 0, &size))) return ret; if (!pUdpTable || *pdwSize < size) { *pdwSize = size; ret = ERROR_INSUFFICIENT_BUFFER; } else { *pdwSize = size; memcpy(pUdpTable, table, size); } HeapFree(GetProcessHeap(), 0, table); return ret; } /****************************************************************** * GetUniDirectionalAdapterInfo (IPHLPAPI.@) * * This is a Win98-only function to get information on "unidirectional" * adapters. Since this is pretty nonsensical in other contexts, it * never returns anything. * * PARAMS * pIPIfInfo [Out] buffer for adapter infos * dwOutBufLen [Out] length of the output buffer * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI GetUniDirectionalAdapterInfo(PIP_UNIDIRECTIONAL_ADAPTER_ADDRESS pIPIfInfo, PULONG dwOutBufLen) { TRACE("pIPIfInfo %p, dwOutBufLen %p\n", pIPIfInfo, dwOutBufLen); /* a unidirectional adapter?? not bloody likely! */ return ERROR_NOT_SUPPORTED; } /****************************************************************** * IpReleaseAddress (IPHLPAPI.@) * * Release an IP obtained through DHCP, * * PARAMS * AdapterInfo [In] adapter to release IP address * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * Since GetAdaptersInfo never returns adapters that have DHCP enabled, * this function does nothing. * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI IpReleaseAddress(PIP_ADAPTER_INDEX_MAP AdapterInfo) { FIXME("Stub AdapterInfo %p\n", AdapterInfo); return ERROR_NOT_SUPPORTED; } /****************************************************************** * IpRenewAddress (IPHLPAPI.@) * * Renew an IP obtained through DHCP. * * PARAMS * AdapterInfo [In] adapter to renew IP address * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * NOTES * Since GetAdaptersInfo never returns adapters that have DHCP enabled, * this function does nothing. * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI IpRenewAddress(PIP_ADAPTER_INDEX_MAP AdapterInfo) { FIXME("Stub AdapterInfo %p\n", AdapterInfo); return ERROR_NOT_SUPPORTED; } /****************************************************************** * NotifyAddrChange (IPHLPAPI.@) * * Notify caller whenever the ip-interface map is changed. * * PARAMS * Handle [Out] handle usable in asynchronous notification * overlapped [In] overlapped structure that notifies the caller * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI NotifyAddrChange(PHANDLE Handle, LPOVERLAPPED overlapped) { FIXME("(Handle %p, overlapped %p): stub\n", Handle, overlapped); if (Handle) *Handle = INVALID_HANDLE_VALUE; if (overlapped) ((IO_STATUS_BLOCK *) overlapped)->u.Status = STATUS_PENDING; return ERROR_IO_PENDING; } /****************************************************************** * NotifyIpInterfaceChange (IPHLPAPI.@) */ DWORD WINAPI NotifyIpInterfaceChange(ULONG family, PVOID callback, PVOID context, BOOLEAN init_notify, PHANDLE handle) { FIXME("(family %d, callback %p, context %p, init_notify %d, handle %p): stub\n", family, callback, context, init_notify, handle); if (handle) *handle = NULL; return ERROR_NOT_SUPPORTED; } /****************************************************************** * NotifyRouteChange (IPHLPAPI.@) * * Notify caller whenever the ip routing table is changed. * * PARAMS * Handle [Out] handle usable in asynchronous notification * overlapped [In] overlapped structure that notifies the caller * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI NotifyRouteChange(PHANDLE Handle, LPOVERLAPPED overlapped) { FIXME("(Handle %p, overlapped %p): stub\n", Handle, overlapped); return ERROR_NOT_SUPPORTED; } /****************************************************************** * SendARP (IPHLPAPI.@) * * Send an ARP request. * * PARAMS * DestIP [In] attempt to obtain this IP * SrcIP [In] optional sender IP address * pMacAddr [Out] buffer for the mac address * PhyAddrLen [In/Out] length of the output buffer * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI SendARP(IPAddr DestIP, IPAddr SrcIP, PULONG pMacAddr, PULONG PhyAddrLen) { FIXME("(DestIP 0x%08x, SrcIP 0x%08x, pMacAddr %p, PhyAddrLen %p): stub\n", DestIP, SrcIP, pMacAddr, PhyAddrLen); return ERROR_NOT_SUPPORTED; } /****************************************************************** * SetIfEntry (IPHLPAPI.@) * * Set the administrative status of an interface. * * PARAMS * pIfRow [In] dwAdminStatus member specifies the new status. * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI SetIfEntry(PMIB_IFROW pIfRow) { FIXME("(pIfRow %p): stub\n", pIfRow); /* this is supposed to set an interface administratively up or down. Could do SIOCSIFFLAGS and set/clear IFF_UP, but, not sure I want to, and this sort of down is indistinguishable from other sorts of down (e.g. no link). */ return ERROR_NOT_SUPPORTED; } /****************************************************************** * SetIpForwardEntry (IPHLPAPI.@) * * Modify an existing route. * * PARAMS * pRoute [In] route with the new information * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns NO_ERROR. */ DWORD WINAPI SetIpForwardEntry(PMIB_IPFORWARDROW pRoute) { FIXME("(pRoute %p): stub\n", pRoute); /* this is to add a route entry, how's it distinguishable from CreateIpForwardEntry? could use SIOCADDRT, not sure I want to */ return 0; } /****************************************************************** * SetIpNetEntry (IPHLPAPI.@) * * Modify an existing ARP entry. * * PARAMS * pArpEntry [In] ARP entry with the new information * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns NO_ERROR. */ DWORD WINAPI SetIpNetEntry(PMIB_IPNETROW pArpEntry) { FIXME("(pArpEntry %p): stub\n", pArpEntry); /* same as CreateIpNetEntry here, could use SIOCSARP, not sure I want to */ return 0; } /****************************************************************** * SetIpStatistics (IPHLPAPI.@) * * Toggle IP forwarding and det the default TTL value. * * PARAMS * pIpStats [In] IP statistics with the new information * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns NO_ERROR. */ DWORD WINAPI SetIpStatistics(PMIB_IPSTATS pIpStats) { FIXME("(pIpStats %p): stub\n", pIpStats); return 0; } /****************************************************************** * SetIpTTL (IPHLPAPI.@) * * Set the default TTL value. * * PARAMS * nTTL [In] new TTL value * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns NO_ERROR. */ DWORD WINAPI SetIpTTL(UINT nTTL) { FIXME("(nTTL %d): stub\n", nTTL); /* could echo nTTL > /proc/net/sys/net/ipv4/ip_default_ttl, not sure I want to. Could map EACCESS to ERROR_ACCESS_DENIED, I suppose */ return 0; } /****************************************************************** * SetTcpEntry (IPHLPAPI.@) * * Set the state of a TCP connection. * * PARAMS * pTcpRow [In] specifies connection with new state * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns NO_ERROR. */ DWORD WINAPI SetTcpEntry(PMIB_TCPROW pTcpRow) { FIXME("(pTcpRow %p): stub\n", pTcpRow); return 0; } /****************************************************************** * UnenableRouter (IPHLPAPI.@) * * Decrement the IP-forwarding reference count. Turn off IP-forwarding * if it reaches zero. * * PARAMS * pOverlapped [In/Out] should be the same as in EnableRouter() * lpdwEnableCount [Out] optional, receives reference count * * RETURNS * Success: NO_ERROR * Failure: error code from winerror.h * * FIXME * Stub, returns ERROR_NOT_SUPPORTED. */ DWORD WINAPI UnenableRouter(OVERLAPPED * pOverlapped, LPDWORD lpdwEnableCount) { FIXME("(pOverlapped %p, lpdwEnableCount %p): stub\n", pOverlapped, lpdwEnableCount); /* could echo "0" > /proc/net/sys/net/ipv4/ip_forward, not sure I want to could map EACCESS to ERROR_ACCESS_DENIED, I suppose */ return ERROR_NOT_SUPPORTED; } /****************************************************************** * PfCreateInterface (IPHLPAPI.@) */ DWORD WINAPI PfCreateInterface(DWORD dwName, PFFORWARD_ACTION inAction, PFFORWARD_ACTION outAction, BOOL bUseLog, BOOL bMustBeUnique, INTERFACE_HANDLE *ppInterface) { FIXME("(%d %d %d %x %x %p) stub\n", dwName, inAction, outAction, bUseLog, bMustBeUnique, ppInterface); return ERROR_CALL_NOT_IMPLEMENTED; } /****************************************************************** * PfUnBindInterface (IPHLPAPI.@) */ DWORD WINAPI PfUnBindInterface(INTERFACE_HANDLE interface) { FIXME("(%p) stub\n", interface); return ERROR_CALL_NOT_IMPLEMENTED; } /****************************************************************** * PfDeleteInterface(IPHLPAPI.@) */ DWORD WINAPI PfDeleteInterface(INTERFACE_HANDLE interface) { FIXME("(%p) stub\n", interface); return ERROR_CALL_NOT_IMPLEMENTED; } /****************************************************************** * PfBindInterfaceToIPAddress(IPHLPAPI.@) */ DWORD WINAPI PfBindInterfaceToIPAddress(INTERFACE_HANDLE interface, PFADDRESSTYPE type, PBYTE ip) { FIXME("(%p %d %p) stub\n", interface, type, ip); return ERROR_CALL_NOT_IMPLEMENTED; } /****************************************************************** * GetTcpTable2 (IPHLPAPI.@) */ ULONG WINAPI GetTcpTable2(PMIB_TCPTABLE2 table, PULONG size, BOOL order) { FIXME("pTcpTable2 %p, pdwSize %p, bOrder %d: stub\n", table, size, order); return ERROR_NOT_SUPPORTED; } /****************************************************************** * GetTcp6Table (IPHLPAPI.@) */ ULONG WINAPI GetTcp6Table(PMIB_TCP6TABLE table, PULONG size, BOOL order) { FIXME("pTcp6Table %p, size %p, order %d: stub\n", table, size, order); return ERROR_NOT_SUPPORTED; } /****************************************************************** * GetTcp6Table2 (IPHLPAPI.@) */ ULONG WINAPI GetTcp6Table2(PMIB_TCP6TABLE2 table, PULONG size, BOOL order) { FIXME("pTcp6Table2 %p, size %p, order %d: stub\n", table, size, order); return ERROR_NOT_SUPPORTED; } /****************************************************************** * ConvertInterfaceLuidToGuid (IPHLPAPI.@) */ DWORD WINAPI ConvertInterfaceLuidToGuid(const NET_LUID *luid, GUID *guid) { FIXME("(%p %p) stub\n", luid, guid); return ERROR_CALL_NOT_IMPLEMENTED; }