/* * OpenVPN-GUI -- A Windows GUI for OpenVPN. * * Copyright (C) 2013 Heiko Hund * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or * (at your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the * GNU General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program (see the file COPYING included with this * distribution); if not, write to the Free Software Foundation, Inc., * 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA */ #ifdef HAVE_CONFIG_H #include #endif #include #include #include #include #include #include #include #include "localization.h" #include "options.h" #include "manage.h" #include "main.h" #include "misc.h" #include "main.h" #include "openvpn_config.h" #include "openvpn-gui-res.h" #include "tray.h" /* * Helper function to do base64 conversion through CryptoAPI * Returns TRUE on success, FALSE on error. Caller must free *output. */ BOOL Base64Encode(const char *input, int input_len, char **output) { DWORD output_len; DWORD flags = CRYPT_STRING_BASE64|CRYPT_STRING_NOCRLF; if (input_len == 0) { /* set output to empty string -- matches the behavior in openvpn */ *output = calloc (1, sizeof(char)); return TRUE; } if (!CryptBinaryToStringA((const BYTE *) input, (DWORD) input_len, flags, NULL, &output_len) || output_len == 0) { #ifdef DEBUG PrintDebug (L"Error in CryptBinaryToStringA: input = '%.*hs'", input_len, input); #endif *output = NULL; return FALSE; } *output = (char *)malloc(output_len); if (*output == NULL) return FALSE; if (!CryptBinaryToStringA((const BYTE *) input, (DWORD) input_len, flags, *output, &output_len)) { #ifdef DEBUG PrintDebug (L"Error in CryptBinaryToStringA: input = '%.*hs'", input_len, input); #endif free(*output); *output = NULL; return FALSE; } return TRUE; } /* * Decode a nul-terminated base64 encoded input and save the result in * an allocated buffer *output. The caller must free *output after use. * The decoded output is nul-terminated so that the caller may treat * it as a string when appropriate. * * Return the length of the decoded result (excluding nul) or -1 on * error. */ int Base64Decode(const char *input, char **output) { DWORD len; PrintDebug (L"decoding %hs", input); if (!CryptStringToBinaryA(input, 0, CRYPT_STRING_BASE64_ANY, NULL, &len, NULL, NULL) || len == 0) { *output = NULL; return -1; } *output = malloc(len + 1); if (*output == NULL) return -1; if (!CryptStringToBinaryA(input, 0, CRYPT_STRING_BASE64, (BYTE *) *output, &len, NULL, NULL)) { free(*output); *output = NULL; return -1; } /* NUL terminate output */ (*output)[len] = '\0'; PrintDebug (L"Decoded output %hs", *output); return len; } BOOL GetDlgItemTextUtf8(HWND hDlg, int id, LPSTR *str, int *len) { int ucs2_len, utf8_len; BOOL retval = FALSE; LPTSTR ucs2_str = NULL; LPSTR utf8_str = NULL; *str = ""; *len = 0; ucs2_len = GetWindowTextLength(GetDlgItem(hDlg, id)) + 1; if (ucs2_len == 1) goto out; ucs2_str = malloc(ucs2_len * sizeof(*ucs2_str)); if (ucs2_str == NULL) goto out; if (GetDlgItemText(hDlg, id, ucs2_str, ucs2_len) == 0) goto out; utf8_len = WideCharToMultiByte(CP_UTF8, 0, ucs2_str, -1, NULL, 0, NULL, NULL); utf8_str = malloc(utf8_len); if (utf8_str == NULL) goto out; WideCharToMultiByte(CP_UTF8, 0, ucs2_str, -1, utf8_str, utf8_len, NULL, NULL); *str = utf8_str; *len = utf8_len - 1; retval = TRUE; out: free(ucs2_str); return retval; } /** * Escape backslash, space and double-quote in a string * @param input Pointer to the string to escape * @returns A newly allocated string containing the result or NULL * on error. Caller must free it after use. */ char * escape_string(const char *input) { char *out = strdup(input); const char *esc = "\"\\ "; if (!out) { MsgToEventLog(EVENTLOG_ERROR_TYPE, L"Error in escape_string: out of memory"); return NULL; } int len = strlen(out); for (int pos = 0; pos < len; ++pos) { if (strchr(esc, out[pos])) { char *buf = realloc(out, ++len + 1); if (buf == NULL) { free(out); MsgToEventLog(EVENTLOG_ERROR_TYPE, L"Error in escape_string: out of memory"); return NULL; } out = buf; memmove(out + pos + 1, out + pos, len - pos + 1); out[pos] = '\\'; pos += 1; } } PrintDebug(L"escape_string: in: '%hs' out: '%hs' len = %d", input, out, len); return out; } /* * Generate a management command from user input and send it */ BOOL ManagementCommandFromInput(connection_t *c, LPCSTR fmt, HWND hDlg, int id) { BOOL retval = FALSE; LPSTR input, cmd; int input_len, cmd_len; GetDlgItemTextUtf8(hDlg, id, &input, &input_len); /* Escape input if needed */ char *input_e = escape_string(input); if (!input_e) { goto out; } free(input); input = input_e; input_len = strlen(input); cmd_len = input_len + strlen(fmt); cmd = malloc(cmd_len); if (cmd) { snprintf(cmd, cmd_len, fmt, input); retval = ManagementCommand(c, cmd, NULL, regular); free(cmd); } out: /* Clear buffers with potentially secret content */ if (input_len) { memset(input, 'x', input_len); SetDlgItemTextA(hDlg, id, input); free(input); } return retval; } /* * Generate a management command from double user inputs and send it */ BOOL ManagementCommandFromTwoInputsBase64(connection_t *c, LPCSTR fmt, HWND hDlg,int id, int id2) { BOOL retval = FALSE; LPSTR input, input2, input_b64, input2_b64, cmd; int input_len, input2_len, cmd_len; input_b64 = NULL; input2_b64 = NULL; GetDlgItemTextUtf8(hDlg, id, &input, &input_len); GetDlgItemTextUtf8(hDlg, id2, &input2, &input2_len); if (!Base64Encode(input, input_len, &input_b64)) goto out; if (!Base64Encode(input2, input2_len, &input2_b64)) goto out; cmd_len = strlen(input_b64) + strlen(input2_b64) + strlen(fmt); cmd = malloc(cmd_len); if (cmd) { snprintf(cmd, cmd_len, fmt, input_b64, input2_b64); retval = ManagementCommand(c, cmd, NULL, regular); free(cmd); } out: /* Clear buffers with potentially secret content */ if (input_b64) memset(input_b64, 0, strlen(input_b64)); if (input2_b64) memset(input2_b64, 0, strlen(input2_b64)); free(input_b64); free(input2_b64); if (input_len) { memset(input, 'x', input_len); SetDlgItemTextA(hDlg, id, input); free(input); } if (input2_len) { memset(input2, 'x', input2_len); SetDlgItemTextA(hDlg, id2, input2); free(input2); } return retval; } /* * Generate a management command from base64-encoded user inputs and send it */ BOOL ManagementCommandFromInputBase64(connection_t* c, LPCSTR fmt, HWND hDlg, int id) { BOOL retval = FALSE; LPSTR input, input_b64, cmd; int input_len, cmd_len; input_b64 = NULL; GetDlgItemTextUtf8(hDlg, id, &input, &input_len); if (!Base64Encode(input, input_len, &input_b64)) goto out; cmd_len = strlen(input_b64) + strlen(fmt); cmd = malloc(cmd_len); if (cmd) { snprintf(cmd, cmd_len, fmt, input_b64); retval = ManagementCommand(c, cmd, NULL, regular); free(cmd); } out: /* Clear buffers with potentially secret content */ if (input_b64) memset(input_b64, 0, strlen(input_b64)); free(input_b64); if (input_len) { memset(input, 'x', input_len); SetDlgItemTextA(hDlg, id, input); free(input); } return retval; } /* * Ensures the given directory exists, by checking for and * creating missing parts of the path. * If the path does not exist and cannot be created return FALSE. */ BOOL EnsureDirExists(LPTSTR dir) { DWORD attr = GetFileAttributes(dir); if (attr == INVALID_FILE_ATTRIBUTES) { DWORD error = GetLastError(); if (error == ERROR_PATH_NOT_FOUND) { LPTSTR pos = _tcsrchr(dir, '\\'); if (pos == NULL) return FALSE; *pos = '\0'; BOOL ret = EnsureDirExists(dir); *pos = '\\'; if (ret == FALSE) return FALSE; } else if (error != ERROR_FILE_NOT_FOUND) return FALSE; /* No error if directory already exists */ return (CreateDirectory(dir, NULL) == TRUE || GetLastError() == ERROR_ALREADY_EXISTS); } return (attr & FILE_ATTRIBUTE_DIRECTORY ? TRUE : FALSE); } /* * Various string helper functions */ BOOL streq(LPCSTR str1, LPCSTR str2) { return (strcmp(str1, str2) == 0); } BOOL strbegins(const char *str, const char *begin) { return (strncmp(str, begin, strlen(begin)) == 0); } BOOL wcsbegins(LPCWSTR str, LPCWSTR begin) { return (wcsncmp(str, begin, wcslen(begin)) == 0); } /* * Force setting window as foreground window by simulating an ALT keypress */ BOOL ForceForegroundWindow(HWND hWnd) { BOOL ret = FALSE; keybd_event(VK_MENU, 0, 0, 0); ret = SetForegroundWindow(hWnd); keybd_event(VK_MENU, 0, KEYEVENTF_KEYUP, 0); return ret; } /* * Set scale factor of windows in pixels. Scale = 100% for dpi = 96 */ void DpiSetScale(options_t* options, UINT dpix) { /* scale factor in percentage compared to the reference dpi of 96 */ if (dpix != 0) options->dpi_scale = MulDiv(dpix, 100, 96); else options->dpi_scale = 100; PrintDebug(L"DPI scale set to %u", options->dpi_scale); } /* * Check user has admin rights * Taken from https://msdn.microsoft.com/en-us/library/windows/desktop/aa376389(v=vs.85).aspx * Returns true if the calling process token has the local Administrators group enabled * in its SID. Assumes the caller is not impersonating and has access to open its own * process token. */ BOOL IsUserAdmin(VOID) { BOOL b; SID_IDENTIFIER_AUTHORITY NtAuthority = {SECURITY_NT_AUTHORITY}; PSID AdministratorsGroup; b = AllocateAndInitializeSid (&NtAuthority, 2, SECURITY_BUILTIN_DOMAIN_RID, DOMAIN_ALIAS_RID_ADMINS, 0, 0, 0, 0, 0, 0, &AdministratorsGroup); if(b) { if (!CheckTokenMembership(NULL, AdministratorsGroup, &b)) b = FALSE; FreeSid(AdministratorsGroup); } return(b); } HANDLE InitSemaphore (WCHAR *name) { HANDLE semaphore = NULL; semaphore = CreateSemaphore (NULL, 1, 1, name); if (!semaphore) { MessageBoxW (NULL, L"Error creating semaphore", TEXT(PACKAGE_NAME), MB_OK); #ifdef DEBUG PrintDebug (L"InitSemaphore: CreateSemaphore failed [error = %lu]", GetLastError()); #endif } return semaphore; } void CloseSemaphore(HANDLE sem) { if (sem) { ReleaseSemaphore(sem, 1, NULL); } CloseHandle(sem); } /* Check access rights on an existing file */ BOOL CheckFileAccess (const TCHAR *path, int access) { HANDLE h; bool ret = FALSE; h = CreateFile (path, access, FILE_SHARE_READ, NULL, OPEN_EXISTING, FILE_ATTRIBUTE_NORMAL, NULL); if ( h != INVALID_HANDLE_VALUE ) { ret = TRUE; CloseHandle (h); } return ret; } /** * Convert a NUL terminated narrow string to wide string using * specified codepage. The caller must free * the returned pointer. Return NULL on error. */ WCHAR * WidenEx(UINT codepage, const char *str) { WCHAR *wstr = NULL; if (!str) return wstr; int nch = MultiByteToWideChar(codepage, 0, str, -1, NULL, 0); if (nch > 0) wstr = malloc(sizeof(WCHAR) * nch); if (wstr) nch = MultiByteToWideChar(codepage, 0, str, -1, wstr, nch); if (nch == 0 && wstr) { free (wstr); wstr = NULL; } return wstr; } /* * Same as WidenEx with codepage = UTF8 */ WCHAR * Widen(const char *utf8) { return WidenEx(CP_UTF8, utf8); } /* Return false if input contains any characters in exclude */ BOOL validate_input(const WCHAR *input, const WCHAR *exclude) { if (!exclude) exclude = L"\n"; return (wcspbrk(input, exclude) == NULL); } /* Concatenate two wide strings with a separator -- if either string is empty separator not added */ void wcs_concat2(WCHAR *dest, int len, const WCHAR *src1, const WCHAR *src2, const WCHAR *sep) { int n = 0; if (!dest || len == 0) return; if (src1 && src2 && src1[0] && src2[0]) n = swprintf(dest, len, L"%ls%ls%ls", src1, sep, src2); else if (src1 && src1[0]) n = swprintf(dest, len, L"%ls", src1); else if (src2 && src2[0]) n = swprintf(dest, len, L"%ls", src2); if (n < 0 || n >= len) /*swprintf failed */ n = 0; dest[n] = L'\0'; } void CloseHandleEx(LPHANDLE handle) { if (handle && *handle && *handle != INVALID_HANDLE_VALUE) { CloseHandle(*handle); *handle = INVALID_HANDLE_VALUE; } } /* * Decode url encoded characters in buffer src and * return the result in a newly allocated buffer. The * caller should free the returned pointer. Returns * NULL on memory allocation error. */ char * url_decode(const char *src) { const char *s = src; char *out = malloc(strlen(src) + 1); /* output is guaranteed to be not longer than src */ char *o; if (!out) return NULL; for (o = out; *s; o++) { unsigned int c = *s++; if (c == '%' && isxdigit(s[0]) && isxdigit(s[1])) { sscanf(s, "%2x", &c); s += 2; } /* We passthough all other chars including % not followed by 2 hex digits */ *o = (char)c; } *o = '\0'; return out; } DWORD md_init(md_ctx *ctx, ALG_ID hash_type) { DWORD status = 0; if (!CryptAcquireContext(&ctx->prov, NULL, NULL, PROV_RSA_FULL, CRYPT_VERIFYCONTEXT)) goto err; if (!CryptCreateHash(ctx->prov, hash_type, 0, 0, &ctx->hash)) { CryptReleaseContext(ctx->prov, 0); goto err; } return status; err: status = GetLastError(); MsgToEventLog(EVENTLOG_ERROR_TYPE, L"Error in md_ctx_init: status = %lu", status); return status; } DWORD md_update(md_ctx *ctx, const BYTE *data, size_t size) { DWORD status = 0; if (!CryptHashData(ctx->hash, data, (DWORD)size, 0)) { status = GetLastError(); MsgToEventLog(EVENTLOG_ERROR_TYPE, L"Error in md_update: status = %lu", status); } return status; } DWORD md_final(md_ctx *ctx, BYTE *md) { DWORD status = 0; DWORD digest_len = HASHLEN; if (!CryptGetHashParam(ctx->hash, HP_HASHVAL, md, &digest_len, 0)) { status = GetLastError(); MsgToEventLog(EVENTLOG_ERROR_TYPE, L"Error in md_final: status = %lu", status); } CryptDestroyHash(ctx->hash); CryptReleaseContext(ctx->prov, 0); return status; } /* Open specified http/https URL using ShellExecute. */ BOOL open_url(const wchar_t *url) { if (!url || !wcsbegins(url, L"http")) { return false; } HINSTANCE ret = ShellExecuteW(NULL, L"open", url, NULL, NULL, SW_SHOWNORMAL); if (ret <= (HINSTANCE) 32) { MsgToEventLog(EVENTLOG_ERROR_TYPE, L"launch_url: ShellExecute <%ls> returned error: %d", url, ret); return false; } return true; } extern options_t o; void ImportConfigFile(const TCHAR* source, bool prompt_user) { TCHAR fileName[MAX_PATH] = _T(""); TCHAR ext[MAX_PATH] = _T(""); _wsplitpath(source, NULL, NULL, fileName, ext); /* check if the source points to the config_dir */ if (wcsnicmp(source, o.global_config_dir, wcslen(o.global_config_dir)) == 0 || wcsnicmp(source, o.config_dir, wcslen(o.config_dir)) == 0) { ShowLocalizedMsg(IDS_ERR_IMPORT_SOURCE, source); return; } /* Ensure the source exists and is readable */ if (!CheckFileAccess(source, GENERIC_READ)) { ShowLocalizedMsg(IDS_ERR_IMPORT_ACCESS, source); return; } WCHAR destination[MAX_PATH+1]; bool no_overwrite = TRUE; /* profile name must be unique: check whether a config by same name exists */ connection_t *c = GetConnByName(fileName); if (c && wcsnicmp(c->config_dir, o.config_dir, wcslen(o.config_dir)) == 0) { /* Ask the user whether to replace the profile or not. */ if (ShowLocalizedMsgEx(MB_YESNO, NULL, _T(PACKAGE_NAME), IDS_NFO_IMPORT_OVERWRITE, fileName) == IDNO) { return; } no_overwrite = FALSE; swprintf(destination, MAX_PATH, L"%ls\\%ls", c->config_dir, c->config_file); } else { if (prompt_user && ShowLocalizedMsgEx(MB_YESNO, NULL, TEXT(PACKAGE_NAME), IDS_NFO_IMPORT_SOURCE, fileName) == IDNO) { return; } WCHAR dest_dir[MAX_PATH+1]; swprintf(dest_dir, MAX_PATH, L"%ls\\%ls", o.config_dir, fileName); dest_dir[MAX_PATH] = L'\0'; if (!EnsureDirExists(dest_dir)) { ShowLocalizedMsg(IDS_ERR_IMPORT_FAILED, dest_dir); return; } swprintf(destination, MAX_PATH, L"%ls\\%ls.%ls", dest_dir, fileName, o.ext_string); } destination[MAX_PATH] = L'\0'; if (!CopyFile(source, destination, no_overwrite)) { MsgToEventLog(EVENTLOG_ERROR_TYPE, L"Copy file <%ls> to <%ls> failed (error = %lu)", source, destination, GetLastError()); ShowLocalizedMsg(IDS_ERR_IMPORT_FAILED, destination); return; } ShowTrayBalloon(LoadLocalizedString(IDS_NFO_IMPORT_SUCCESS), fileName); /* destroy popup menus, based on existing num_configs, rescan file list and recreate menus */ RecreatePopupMenus(); } void set_openssl_env_vars() { struct { WCHAR *name; WCHAR *value; } ossl_env[] = { {L"OPENSSL_CONF", L"ssl\\openssl.cnf"}, {L"OPENSSL_ENGINES", L"ssl\\engines"}, {L"OPENSSL_MODULES", L"ssl\\modules"} }; for (size_t i = 0; i < _countof(ossl_env); i++) { size_t size = 0; _wgetenv_s(&size, NULL, 0, ossl_env[i].name); if (size == 0) { WCHAR val[MAX_PATH] = {0}; _sntprintf_0(val, L"%ls%ls", o.install_path, ossl_env[i].value); _wputenv_s(ossl_env[i].name, val); } } } /* * Find a free port to bind and return it in addr.sin_port */ BOOL find_free_tcp_port(SOCKADDR_IN *addr) { BOOL ret = false; SOCKADDR_IN addr_bound; WSADATA wsaData; int len = sizeof(*addr); if (WSAStartup(MAKEWORD(2, 2), &wsaData) != 0) { return ret; } u_short old_port = addr->sin_port; SOCKET sk = socket(AF_INET, SOCK_STREAM, IPPROTO_TCP); if (sk == INVALID_SOCKET) { MsgToEventLog(EVENTLOG_ERROR_TYPE, L"%hs: socket open failed", __func__); goto out; } while (bind(sk, (SOCKADDR *) addr, len)) { if (addr->sin_port == 0) { MsgToEventLog(EVENTLOG_ERROR_TYPE, L"%hs: bind to dynamic port failed", __func__); goto out; } addr->sin_port = 0; } if (getsockname(sk, (SOCKADDR *) &addr_bound, &len)) { MsgToEventLog(EVENTLOG_ERROR_TYPE, L"%hs: getsockname failed", __func__); goto out; } ret = true; out: if (sk != INVALID_SOCKET) { closesocket(sk); } addr->sin_port = ret ? addr_bound.sin_port : old_port; WSACleanup(); return ret; }