2 * iphlpapi dll implementation
4 * Copyright (C) 2003,2006 Juan Lang
6 * This library is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU Lesser General Public
8 * License as published by the Free Software Foundation; either
9 * version 2.1 of the License, or (at your option) any later version.
11 * This library is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 * Lesser General Public License for more details.
16 * You should have received a copy of the GNU Lesser General Public
17 * License along with this library; if not, write to the Free Software
18 * Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301, USA
25 #include <sys/types.h>
26 #ifdef HAVE_NETINET_IN_H
27 # include <netinet/in.h>
29 #ifdef HAVE_ARPA_INET_H
30 # include <arpa/inet.h>
32 #ifdef HAVE_ARPA_NAMESER_H
33 # include <arpa/nameser.h>
39 #define NONAMELESSUNION
40 #define NONAMELESSSTRUCT
54 #include "wine/debug.h"
56 WINE_DEFAULT_DEBUG_CHANNEL(iphlpapi
);
59 #define IF_NAMESIZE 16
63 #define INADDR_NONE ~0UL
66 /* call res_init() just once because of a bug in Mac OS X 10.4 */
67 /* Call once per thread on systems that have per-thread _res. */
68 static void initialise_resolver(void)
70 if ((_res
.options
& RES_INIT
) == 0)
74 BOOL WINAPI
DllMain (HINSTANCE hinstDLL
, DWORD fdwReason
, LPVOID lpvReserved
)
77 case DLL_PROCESS_ATTACH
:
78 DisableThreadLibraryCalls( hinstDLL
);
81 case DLL_PROCESS_DETACH
:
87 /******************************************************************
88 * AddIPAddress (IPHLPAPI.@)
90 * Add an IP address to an adapter.
93 * Address [In] IP address to add to the adapter
94 * IpMask [In] subnet mask for the IP address
95 * IfIndex [In] adapter index to add the address
96 * NTEContext [Out] Net Table Entry (NTE) context for the IP address
97 * NTEInstance [Out] NTE instance for the IP address
101 * Failure: error code from winerror.h
104 * Stub. Currently returns ERROR_NOT_SUPPORTED.
106 DWORD WINAPI
AddIPAddress(IPAddr Address
, IPMask IpMask
, DWORD IfIndex
, PULONG NTEContext
, PULONG NTEInstance
)
109 return ERROR_NOT_SUPPORTED
;
113 /******************************************************************
114 * AllocateAndGetIfTableFromStack (IPHLPAPI.@)
116 * Get table of local interfaces.
117 * Like GetIfTable(), but allocate the returned table from heap.
120 * ppIfTable [Out] pointer into which the MIB_IFTABLE is
121 * allocated and returned.
122 * bOrder [In] whether to sort the table
123 * heap [In] heap from which the table is allocated
124 * flags [In] flags to HeapAlloc
127 * ERROR_INVALID_PARAMETER if ppIfTable is NULL, whatever
128 * GetIfTable() returns otherwise.
130 DWORD WINAPI
AllocateAndGetIfTableFromStack(PMIB_IFTABLE
*ppIfTable
,
131 BOOL bOrder
, HANDLE heap
, DWORD flags
)
135 TRACE("ppIfTable %p, bOrder %d, heap %p, flags 0x%08x\n", ppIfTable
,
136 bOrder
, heap
, flags
);
138 ret
= ERROR_INVALID_PARAMETER
;
142 ret
= GetIfTable(*ppIfTable
, &dwSize
, bOrder
);
143 if (ret
== ERROR_INSUFFICIENT_BUFFER
) {
144 *ppIfTable
= HeapAlloc(heap
, flags
, dwSize
);
145 ret
= GetIfTable(*ppIfTable
, &dwSize
, bOrder
);
148 TRACE("returning %d\n", ret
);
153 static int IpAddrTableSorter(const void *a
, const void *b
)
158 ret
= ((const MIB_IPADDRROW
*)a
)->dwAddr
- ((const MIB_IPADDRROW
*)b
)->dwAddr
;
165 /******************************************************************
166 * AllocateAndGetIpAddrTableFromStack (IPHLPAPI.@)
168 * Get interface-to-IP address mapping table.
169 * Like GetIpAddrTable(), but allocate the returned table from heap.
172 * ppIpAddrTable [Out] pointer into which the MIB_IPADDRTABLE is
173 * allocated and returned.
174 * bOrder [In] whether to sort the table
175 * heap [In] heap from which the table is allocated
176 * flags [In] flags to HeapAlloc
179 * ERROR_INVALID_PARAMETER if ppIpAddrTable is NULL, other error codes on
180 * failure, NO_ERROR on success.
182 DWORD WINAPI
AllocateAndGetIpAddrTableFromStack(PMIB_IPADDRTABLE
*ppIpAddrTable
,
183 BOOL bOrder
, HANDLE heap
, DWORD flags
)
187 TRACE("ppIpAddrTable %p, bOrder %d, heap %p, flags 0x%08x\n",
188 ppIpAddrTable
, bOrder
, heap
, flags
);
189 ret
= getIPAddrTable(ppIpAddrTable
, heap
, flags
);
191 qsort((*ppIpAddrTable
)->table
, (*ppIpAddrTable
)->dwNumEntries
,
192 sizeof(MIB_IPADDRROW
), IpAddrTableSorter
);
193 TRACE("returning %d\n", ret
);
198 /******************************************************************
199 * CancelIPChangeNotify (IPHLPAPI.@)
201 * Cancel a previous notification created by NotifyAddrChange or
205 * overlapped [In] overlapped structure that notifies the caller
212 * Stub, returns FALSE.
214 BOOL WINAPI
CancelIPChangeNotify(LPOVERLAPPED overlapped
)
216 FIXME("(overlapped %p): stub\n", overlapped
);
222 /******************************************************************
223 * CreateIpForwardEntry (IPHLPAPI.@)
225 * Create a route in the local computer's IP table.
228 * pRoute [In] new route information
232 * Failure: error code from winerror.h
235 * Stub, always returns NO_ERROR.
237 DWORD WINAPI
CreateIpForwardEntry(PMIB_IPFORWARDROW pRoute
)
239 FIXME("(pRoute %p): stub\n", pRoute
);
240 /* could use SIOCADDRT, not sure I want to */
245 /******************************************************************
246 * CreateIpNetEntry (IPHLPAPI.@)
248 * Create entry in the ARP table.
251 * pArpEntry [In] new ARP entry
255 * Failure: error code from winerror.h
258 * Stub, always returns NO_ERROR.
260 DWORD WINAPI
CreateIpNetEntry(PMIB_IPNETROW pArpEntry
)
262 FIXME("(pArpEntry %p)\n", pArpEntry
);
263 /* could use SIOCSARP on systems that support it, not sure I want to */
268 /******************************************************************
269 * CreateProxyArpEntry (IPHLPAPI.@)
271 * Create a Proxy ARP (PARP) entry for an IP address.
274 * dwAddress [In] IP address for which this computer acts as a proxy.
275 * dwMask [In] subnet mask for dwAddress
276 * dwIfIndex [In] interface index
280 * Failure: error code from winerror.h
283 * Stub, returns ERROR_NOT_SUPPORTED.
285 DWORD WINAPI
CreateProxyArpEntry(DWORD dwAddress
, DWORD dwMask
, DWORD dwIfIndex
)
287 FIXME("(dwAddress 0x%08x, dwMask 0x%08x, dwIfIndex 0x%08x): stub\n",
288 dwAddress
, dwMask
, dwIfIndex
);
289 return ERROR_NOT_SUPPORTED
;
293 /******************************************************************
294 * DeleteIPAddress (IPHLPAPI.@)
296 * Delete an IP address added with AddIPAddress().
299 * NTEContext [In] NTE context from AddIPAddress();
303 * Failure: error code from winerror.h
306 * Stub, returns ERROR_NOT_SUPPORTED.
308 DWORD WINAPI
DeleteIPAddress(ULONG NTEContext
)
310 FIXME("(NTEContext %d): stub\n", NTEContext
);
311 return ERROR_NOT_SUPPORTED
;
315 /******************************************************************
316 * DeleteIpForwardEntry (IPHLPAPI.@)
321 * pRoute [In] route to delete
325 * Failure: error code from winerror.h
328 * Stub, returns NO_ERROR.
330 DWORD WINAPI
DeleteIpForwardEntry(PMIB_IPFORWARDROW pRoute
)
332 FIXME("(pRoute %p): stub\n", pRoute
);
333 /* could use SIOCDELRT, not sure I want to */
338 /******************************************************************
339 * DeleteIpNetEntry (IPHLPAPI.@)
341 * Delete an ARP entry.
344 * pArpEntry [In] ARP entry to delete
348 * Failure: error code from winerror.h
351 * Stub, returns NO_ERROR.
353 DWORD WINAPI
DeleteIpNetEntry(PMIB_IPNETROW pArpEntry
)
355 FIXME("(pArpEntry %p): stub\n", pArpEntry
);
356 /* could use SIOCDARP on systems that support it, not sure I want to */
361 /******************************************************************
362 * DeleteProxyArpEntry (IPHLPAPI.@)
364 * Delete a Proxy ARP entry.
367 * dwAddress [In] IP address for which this computer acts as a proxy.
368 * dwMask [In] subnet mask for dwAddress
369 * dwIfIndex [In] interface index
373 * Failure: error code from winerror.h
376 * Stub, returns ERROR_NOT_SUPPORTED.
378 DWORD WINAPI
DeleteProxyArpEntry(DWORD dwAddress
, DWORD dwMask
, DWORD dwIfIndex
)
380 FIXME("(dwAddress 0x%08x, dwMask 0x%08x, dwIfIndex 0x%08x): stub\n",
381 dwAddress
, dwMask
, dwIfIndex
);
382 return ERROR_NOT_SUPPORTED
;
386 /******************************************************************
387 * EnableRouter (IPHLPAPI.@)
389 * Turn on ip forwarding.
393 * pOverlapped [In/Out] hEvent member should contain a valid handle.
396 * Success: ERROR_IO_PENDING
397 * Failure: error code from winerror.h
400 * Stub, returns ERROR_NOT_SUPPORTED.
402 DWORD WINAPI
EnableRouter(HANDLE
* pHandle
, OVERLAPPED
* pOverlapped
)
404 FIXME("(pHandle %p, pOverlapped %p): stub\n", pHandle
, pOverlapped
);
405 /* could echo "1" > /proc/net/sys/net/ipv4/ip_forward, not sure I want to
406 could map EACCESS to ERROR_ACCESS_DENIED, I suppose
408 return ERROR_NOT_SUPPORTED
;
412 /******************************************************************
413 * FlushIpNetTable (IPHLPAPI.@)
415 * Delete all ARP entries of an interface
418 * dwIfIndex [In] interface index
422 * Failure: error code from winerror.h
425 * Stub, returns ERROR_NOT_SUPPORTED.
427 DWORD WINAPI
FlushIpNetTable(DWORD dwIfIndex
)
429 FIXME("(dwIfIndex 0x%08x): stub\n", dwIfIndex
);
430 /* this flushes the arp cache of the given index */
431 return ERROR_NOT_SUPPORTED
;
435 /******************************************************************
436 * GetAdapterIndex (IPHLPAPI.@)
438 * Get interface index from its name.
441 * AdapterName [In] unicode string with the adapter name
442 * IfIndex [Out] returns found interface index
446 * Failure: error code from winerror.h
448 DWORD WINAPI
GetAdapterIndex(LPWSTR AdapterName
, PULONG IfIndex
)
450 char adapterName
[MAX_ADAPTER_NAME
];
454 TRACE("(AdapterName %p, IfIndex %p)\n", AdapterName
, IfIndex
);
455 /* The adapter name is guaranteed not to have any unicode characters, so
456 * this translation is never lossy */
457 for (i
= 0; i
< sizeof(adapterName
) - 1 && AdapterName
[i
]; i
++)
458 adapterName
[i
] = (char)AdapterName
[i
];
459 adapterName
[i
] = '\0';
460 ret
= getInterfaceIndexByName(adapterName
, IfIndex
);
461 TRACE("returning %d\n", ret
);
466 /******************************************************************
467 * GetAdaptersInfo (IPHLPAPI.@)
469 * Get information about adapters.
472 * pAdapterInfo [Out] buffer for adapter infos
473 * pOutBufLen [In] length of output buffer
477 * Failure: error code from winerror.h
479 DWORD WINAPI
GetAdaptersInfo(PIP_ADAPTER_INFO pAdapterInfo
, PULONG pOutBufLen
)
483 TRACE("pAdapterInfo %p, pOutBufLen %p\n", pAdapterInfo
, pOutBufLen
);
485 ret
= ERROR_INVALID_PARAMETER
;
487 DWORD numNonLoopbackInterfaces
= getNumNonLoopbackInterfaces();
489 if (numNonLoopbackInterfaces
> 0) {
490 DWORD numIPAddresses
= getNumIPAddresses();
493 /* This may slightly overestimate the amount of space needed, because
494 * the IP addresses include the loopback address, but it's easier
495 * to make sure there's more than enough space than to make sure there's
496 * precisely enough space.
498 size
= sizeof(IP_ADAPTER_INFO
) * numNonLoopbackInterfaces
;
499 size
+= numIPAddresses
* sizeof(IP_ADDR_STRING
);
500 if (!pAdapterInfo
|| *pOutBufLen
< size
) {
502 ret
= ERROR_BUFFER_OVERFLOW
;
505 InterfaceIndexTable
*table
= NULL
;
506 PMIB_IPADDRTABLE ipAddrTable
= NULL
;
507 PMIB_IPFORWARDTABLE routeTable
= NULL
;
509 ret
= getIPAddrTable(&ipAddrTable
, GetProcessHeap(), 0);
511 ret
= AllocateAndGetIpForwardTableFromStack(&routeTable
, FALSE
, GetProcessHeap(), 0);
513 table
= getNonLoopbackInterfaceIndexTable();
515 size
= sizeof(IP_ADAPTER_INFO
) * table
->numIndexes
;
516 size
+= ipAddrTable
->dwNumEntries
* sizeof(IP_ADDR_STRING
);
517 if (*pOutBufLen
< size
) {
519 ret
= ERROR_INSUFFICIENT_BUFFER
;
524 BOOL winsEnabled
= FALSE
;
525 IP_ADDRESS_STRING primaryWINS
, secondaryWINS
;
526 PIP_ADDR_STRING nextIPAddr
= (PIP_ADDR_STRING
)((LPBYTE
)pAdapterInfo
527 + numNonLoopbackInterfaces
* sizeof(IP_ADAPTER_INFO
));
529 memset(pAdapterInfo
, 0, size
);
530 /* @@ Wine registry key: HKCU\Software\Wine\Network */
531 if (RegOpenKeyA(HKEY_CURRENT_USER
, "Software\\Wine\\Network",
532 &hKey
) == ERROR_SUCCESS
) {
533 DWORD size
= sizeof(primaryWINS
.String
);
536 RegQueryValueExA(hKey
, "WinsServer", NULL
, NULL
,
537 (LPBYTE
)primaryWINS
.String
, &size
);
538 addr
= inet_addr(primaryWINS
.String
);
539 if (addr
!= INADDR_NONE
&& addr
!= INADDR_ANY
)
541 size
= sizeof(secondaryWINS
.String
);
542 RegQueryValueExA(hKey
, "BackupWinsServer", NULL
, NULL
,
543 (LPBYTE
)secondaryWINS
.String
, &size
);
544 addr
= inet_addr(secondaryWINS
.String
);
545 if (addr
!= INADDR_NONE
&& addr
!= INADDR_ANY
)
549 for (ndx
= 0; ndx
< table
->numIndexes
; ndx
++) {
550 PIP_ADAPTER_INFO ptr
= &pAdapterInfo
[ndx
];
552 PIP_ADDR_STRING currentIPAddr
= &ptr
->IpAddressList
;
553 BOOL firstIPAddr
= TRUE
;
555 /* on Win98 this is left empty, but whatever */
556 getInterfaceNameByIndex(table
->indexes
[ndx
], ptr
->AdapterName
);
557 getInterfaceNameByIndex(table
->indexes
[ndx
], ptr
->Description
);
558 ptr
->AddressLength
= sizeof(ptr
->Address
);
559 getInterfacePhysicalByIndex(table
->indexes
[ndx
],
560 &ptr
->AddressLength
, ptr
->Address
, &ptr
->Type
);
561 ptr
->Index
= table
->indexes
[ndx
];
562 for (i
= 0; i
< ipAddrTable
->dwNumEntries
; i
++) {
563 if (ipAddrTable
->table
[i
].dwIndex
== ptr
->Index
) {
565 toIPAddressString(ipAddrTable
->table
[i
].dwAddr
,
566 ptr
->IpAddressList
.IpAddress
.String
);
567 toIPAddressString(ipAddrTable
->table
[i
].dwMask
,
568 ptr
->IpAddressList
.IpMask
.String
);
572 currentIPAddr
->Next
= nextIPAddr
;
573 currentIPAddr
= nextIPAddr
;
574 toIPAddressString(ipAddrTable
->table
[i
].dwAddr
,
575 currentIPAddr
->IpAddress
.String
);
576 toIPAddressString(ipAddrTable
->table
[i
].dwMask
,
577 currentIPAddr
->IpMask
.String
);
582 /* Find first router through this interface, which we'll assume
583 * is the default gateway for this adapter */
584 for (i
= 0; i
< routeTable
->dwNumEntries
; i
++)
585 if (routeTable
->table
[i
].dwForwardIfIndex
== ptr
->Index
586 && routeTable
->table
[i
].u1
.ForwardType
==
587 MIB_IPROUTE_TYPE_INDIRECT
)
588 toIPAddressString(routeTable
->table
[i
].dwForwardNextHop
,
589 ptr
->GatewayList
.IpAddress
.String
);
591 ptr
->HaveWins
= TRUE
;
592 memcpy(ptr
->PrimaryWinsServer
.IpAddress
.String
,
593 primaryWINS
.String
, sizeof(primaryWINS
.String
));
594 memcpy(ptr
->SecondaryWinsServer
.IpAddress
.String
,
595 secondaryWINS
.String
, sizeof(secondaryWINS
.String
));
597 if (ndx
< table
->numIndexes
- 1)
598 ptr
->Next
= &pAdapterInfo
[ndx
+ 1];
604 HeapFree(GetProcessHeap(), 0, table
);
607 ret
= ERROR_OUTOFMEMORY
;
608 HeapFree(GetProcessHeap(), 0, routeTable
);
609 HeapFree(GetProcessHeap(), 0, ipAddrTable
);
615 TRACE("returning %d\n", ret
);
619 static DWORD
typeFromMibType(DWORD mib_type
)
623 case MIB_IF_TYPE_ETHERNET
: return IF_TYPE_ETHERNET_CSMACD
;
624 case MIB_IF_TYPE_TOKENRING
: return IF_TYPE_ISO88025_TOKENRING
;
625 case MIB_IF_TYPE_PPP
: return IF_TYPE_PPP
;
626 case MIB_IF_TYPE_LOOPBACK
: return IF_TYPE_SOFTWARE_LOOPBACK
;
627 default: return IF_TYPE_OTHER
;
631 static NET_IF_CONNECTION_TYPE
connectionTypeFromMibType(DWORD mib_type
)
635 case MIB_IF_TYPE_PPP
: return NET_IF_CONNECTION_DEMAND
;
636 case MIB_IF_TYPE_SLIP
: return NET_IF_CONNECTION_DEMAND
;
637 default: return NET_IF_CONNECTION_DEDICATED
;
641 static ULONG
v4addressesFromIndex(IF_INDEX index
, DWORD
**addrs
, ULONG
*num_addrs
)
647 if ((ret
= getIPAddrTable(&at
, GetProcessHeap(), 0))) return ret
;
648 for (i
= 0; i
< at
->dwNumEntries
; i
++)
650 if (at
->table
[i
].dwIndex
== index
) (*num_addrs
)++;
652 if (!(*addrs
= HeapAlloc(GetProcessHeap(), 0, *num_addrs
* sizeof(DWORD
))))
654 HeapFree(GetProcessHeap(), 0, at
);
655 return ERROR_OUTOFMEMORY
;
657 for (i
= 0, j
= 0; i
< at
->dwNumEntries
; i
++)
659 if (at
->table
[i
].dwIndex
== index
) (*addrs
)[j
++] = at
->table
[i
].dwAddr
;
661 HeapFree(GetProcessHeap(), 0, at
);
662 return ERROR_SUCCESS
;
665 static char *debugstr_ipv4(const in_addr_t
*in_addr
, char *buf
)
670 for (addrp
= (const BYTE
*)in_addr
;
671 addrp
- (const BYTE
*)in_addr
< sizeof(*in_addr
);
674 if (addrp
== (const BYTE
*)in_addr
+ sizeof(*in_addr
) - 1)
675 sprintf(p
, "%d", *addrp
);
677 p
+= sprintf(p
, "%d.", *addrp
);
682 static char *debugstr_ipv6(const struct WS_sockaddr_in6
*sin
, char *buf
)
684 const IN6_ADDR
*addr
= &sin
->sin6_addr
;
687 BOOL in_zero
= FALSE
;
689 for (i
= 0; i
< 7; i
++)
691 if (!addr
->u
.Word
[i
])
703 p
+= sprintf(p
, "%x:", ntohs(addr
->u
.Word
[i
]));
707 sprintf(p
, "%x", ntohs(addr
->u
.Word
[7]));
711 static ULONG
count_v4_gateways(DWORD index
, PMIB_IPFORWARDTABLE routeTable
)
713 DWORD i
, num_gateways
= 0;
715 for (i
= 0; i
< routeTable
->dwNumEntries
; i
++)
717 if (routeTable
->table
[i
].dwForwardIfIndex
== index
&&
718 routeTable
->table
[i
].u1
.ForwardType
== MIB_IPROUTE_TYPE_INDIRECT
)
724 static PMIB_IPFORWARDROW
findIPv4Gateway(DWORD index
,
725 PMIB_IPFORWARDTABLE routeTable
)
728 PMIB_IPFORWARDROW row
= NULL
;
730 for (i
= 0; !row
&& i
< routeTable
->dwNumEntries
; i
++)
732 if (routeTable
->table
[i
].dwForwardIfIndex
== index
&&
733 routeTable
->table
[i
].u1
.ForwardType
== MIB_IPROUTE_TYPE_INDIRECT
)
734 row
= &routeTable
->table
[i
];
739 static ULONG
adapterAddressesFromIndex(ULONG family
, ULONG flags
, IF_INDEX index
,
740 IP_ADAPTER_ADDRESSES
*aa
, ULONG
*size
)
742 ULONG ret
= ERROR_SUCCESS
, i
, num_v4addrs
= 0, num_v4_gateways
= 0, num_v6addrs
= 0, total_size
;
743 DWORD
*v4addrs
= NULL
;
744 SOCKET_ADDRESS
*v6addrs
= NULL
;
745 PMIB_IPFORWARDTABLE routeTable
= NULL
;
747 if (family
== WS_AF_INET
)
749 if (!(flags
& GAA_FLAG_SKIP_UNICAST
))
750 ret
= v4addressesFromIndex(index
, &v4addrs
, &num_v4addrs
);
751 if (!ret
&& flags
& GAA_FLAG_INCLUDE_ALL_GATEWAYS
)
753 ret
= AllocateAndGetIpForwardTableFromStack(&routeTable
, FALSE
,
754 GetProcessHeap(), 0);
756 num_v4_gateways
= count_v4_gateways(index
, routeTable
);
759 else if (family
== WS_AF_INET6
)
761 if (!(flags
& GAA_FLAG_SKIP_UNICAST
))
762 ret
= v6addressesFromIndex(index
, &v6addrs
, &num_v6addrs
);
764 else if (family
== WS_AF_UNSPEC
)
766 if (!(flags
& GAA_FLAG_SKIP_UNICAST
))
767 ret
= v4addressesFromIndex(index
, &v4addrs
, &num_v4addrs
);
768 if (!ret
&& flags
& GAA_FLAG_INCLUDE_ALL_GATEWAYS
)
770 ret
= AllocateAndGetIpForwardTableFromStack(&routeTable
, FALSE
,
771 GetProcessHeap(), 0);
773 num_v4_gateways
= count_v4_gateways(index
, routeTable
);
775 if (!ret
&& !(flags
& GAA_FLAG_SKIP_UNICAST
))
776 ret
= v6addressesFromIndex(index
, &v6addrs
, &num_v6addrs
);
780 FIXME("address family %u unsupported\n", family
);
785 HeapFree(GetProcessHeap(), 0, routeTable
);
789 total_size
= sizeof(IP_ADAPTER_ADDRESSES
);
790 total_size
+= IF_NAMESIZE
;
791 total_size
+= IF_NAMESIZE
* sizeof(WCHAR
);
792 if (!(flags
& GAA_FLAG_SKIP_FRIENDLY_NAME
))
793 total_size
+= IF_NAMESIZE
* sizeof(WCHAR
);
794 total_size
+= sizeof(IP_ADAPTER_UNICAST_ADDRESS
) * num_v4addrs
;
795 total_size
+= sizeof(struct sockaddr_in
) * num_v4addrs
;
796 total_size
+= (sizeof(IP_ADAPTER_GATEWAY_ADDRESS
) + sizeof(SOCKADDR_IN
)) * num_v4_gateways
;
797 total_size
+= sizeof(IP_ADAPTER_UNICAST_ADDRESS
) * num_v6addrs
;
798 total_size
+= sizeof(SOCKET_ADDRESS
) * num_v6addrs
;
799 for (i
= 0; i
< num_v6addrs
; i
++)
800 total_size
+= v6addrs
[i
].iSockaddrLength
;
802 if (aa
&& *size
>= total_size
)
804 char name
[IF_NAMESIZE
], *ptr
= (char *)aa
+ sizeof(IP_ADAPTER_ADDRESSES
), *src
;
807 INTERNAL_IF_OPER_STATUS status
;
809 memset(aa
, 0, sizeof(IP_ADAPTER_ADDRESSES
));
810 aa
->u
.s
.Length
= sizeof(IP_ADAPTER_ADDRESSES
);
811 aa
->u
.s
.IfIndex
= index
;
813 getInterfaceNameByIndex(index
, name
);
814 memcpy(ptr
, name
, IF_NAMESIZE
);
815 aa
->AdapterName
= ptr
;
817 if (!(flags
& GAA_FLAG_SKIP_FRIENDLY_NAME
))
819 aa
->FriendlyName
= (WCHAR
*)ptr
;
820 for (src
= name
, dst
= (WCHAR
*)ptr
; *src
; src
++, dst
++)
825 aa
->Description
= (WCHAR
*)ptr
;
826 for (src
= name
, dst
= (WCHAR
*)ptr
; *src
; src
++, dst
++)
831 TRACE("%s: %d IPv4 addresses, %d IPv6 addresses:\n", name
, num_v4addrs
,
835 PMIB_IPFORWARDROW adapterRow
;
837 if ((adapterRow
= findIPv4Gateway(index
, routeTable
)))
839 PIP_ADAPTER_GATEWAY_ADDRESS gw
;
842 gw
= (PIP_ADAPTER_GATEWAY_ADDRESS
)ptr
;
843 aa
->FirstGatewayAddress
= gw
;
845 gw
->u
.s
.Length
= sizeof(IP_ADAPTER_GATEWAY_ADDRESS
);
846 ptr
+= sizeof(IP_ADAPTER_GATEWAY_ADDRESS
);
847 sin
= (PSOCKADDR_IN
)ptr
;
848 sin
->sin_family
= AF_INET
;
850 memcpy(&sin
->sin_addr
, &adapterRow
->dwForwardNextHop
,
852 gw
->Address
.lpSockaddr
= (LPSOCKADDR
)sin
;
853 gw
->Address
.iSockaddrLength
= sizeof(SOCKADDR_IN
);
855 ptr
+= sizeof(SOCKADDR_IN
);
860 IP_ADAPTER_UNICAST_ADDRESS
*ua
;
861 struct sockaddr_in
*sa
;
862 aa
->Flags
|= IP_ADAPTER_IPV4_ENABLED
;
863 ua
= aa
->FirstUnicastAddress
= (IP_ADAPTER_UNICAST_ADDRESS
*)ptr
;
864 for (i
= 0; i
< num_v4addrs
; i
++)
868 memset(ua
, 0, sizeof(IP_ADAPTER_UNICAST_ADDRESS
));
869 ua
->u
.s
.Length
= sizeof(IP_ADAPTER_UNICAST_ADDRESS
);
870 ua
->Address
.iSockaddrLength
= sizeof(struct sockaddr_in
);
871 ua
->Address
.lpSockaddr
= (SOCKADDR
*)((char *)ua
+ ua
->u
.s
.Length
);
873 sa
= (struct sockaddr_in
*)ua
->Address
.lpSockaddr
;
874 sa
->sin_family
= AF_INET
;
875 sa
->sin_addr
.s_addr
= v4addrs
[i
];
877 TRACE("IPv4 %d/%d: %s\n", i
+ 1, num_v4addrs
,
878 debugstr_ipv4(&sa
->sin_addr
.s_addr
, addr_buf
));
880 ptr
+= ua
->u
.s
.Length
+ ua
->Address
.iSockaddrLength
;
881 if (i
< num_v4addrs
- 1)
883 ua
->Next
= (IP_ADAPTER_UNICAST_ADDRESS
*)ptr
;
890 IP_ADAPTER_UNICAST_ADDRESS
*ua
;
891 struct WS_sockaddr_in6
*sa
;
893 aa
->Flags
|= IP_ADAPTER_IPV6_ENABLED
;
894 if (aa
->FirstUnicastAddress
)
896 for (ua
= aa
->FirstUnicastAddress
; ua
->Next
; ua
= ua
->Next
)
898 ua
->Next
= (IP_ADAPTER_UNICAST_ADDRESS
*)ptr
;
899 ua
= (IP_ADAPTER_UNICAST_ADDRESS
*)ptr
;
902 ua
= aa
->FirstUnicastAddress
= (IP_ADAPTER_UNICAST_ADDRESS
*)ptr
;
903 for (i
= 0; i
< num_v6addrs
; i
++)
907 memset(ua
, 0, sizeof(IP_ADAPTER_UNICAST_ADDRESS
));
908 ua
->u
.s
.Length
= sizeof(IP_ADAPTER_UNICAST_ADDRESS
);
909 ua
->Address
.iSockaddrLength
= v6addrs
[i
].iSockaddrLength
;
910 ua
->Address
.lpSockaddr
= (SOCKADDR
*)((char *)ua
+ ua
->u
.s
.Length
);
912 sa
= (struct WS_sockaddr_in6
*)ua
->Address
.lpSockaddr
;
913 memcpy(sa
, v6addrs
[i
].lpSockaddr
, sizeof(*sa
));
914 TRACE("IPv6 %d/%d: %s\n", i
+ 1, num_v6addrs
,
915 debugstr_ipv6(sa
, addr_buf
));
917 ptr
+= ua
->u
.s
.Length
+ ua
->Address
.iSockaddrLength
;
918 if (i
< num_v6addrs
- 1)
920 ua
->Next
= (IP_ADAPTER_UNICAST_ADDRESS
*)ptr
;
926 buflen
= MAX_INTERFACE_PHYSADDR
;
927 getInterfacePhysicalByIndex(index
, &buflen
, aa
->PhysicalAddress
, &type
);
928 aa
->PhysicalAddressLength
= buflen
;
929 aa
->IfType
= typeFromMibType(type
);
930 aa
->ConnectionType
= connectionTypeFromMibType(type
);
932 getInterfaceMtuByName(name
, &aa
->Mtu
);
934 getInterfaceStatusByName(name
, &status
);
935 if (status
== MIB_IF_OPER_STATUS_OPERATIONAL
) aa
->OperStatus
= IfOperStatusUp
;
936 else if (status
== MIB_IF_OPER_STATUS_NON_OPERATIONAL
) aa
->OperStatus
= IfOperStatusDown
;
937 else aa
->OperStatus
= IfOperStatusUnknown
;
940 HeapFree(GetProcessHeap(), 0, routeTable
);
941 HeapFree(GetProcessHeap(), 0, v6addrs
);
942 HeapFree(GetProcessHeap(), 0, v4addrs
);
943 return ERROR_SUCCESS
;
946 static ULONG
get_dns_server_addresses(PIP_ADAPTER_DNS_SERVER_ADDRESS address
, ULONG
*len
)
950 initialise_resolver();
951 /* FIXME: no support for IPv6 DNS server addresses. Doing so requires
952 * sizeof SOCKADDR_STORAGE instead, and using _res._u._ext.nsaddrs when
955 size
= _res
.nscount
* (sizeof(IP_ADAPTER_DNS_SERVER_ADDRESS
) + sizeof(SOCKADDR
));
956 if (!address
|| *len
< size
)
959 return ERROR_BUFFER_OVERFLOW
;
962 if (_res
.nscount
> 0)
964 PIP_ADAPTER_DNS_SERVER_ADDRESS addr
;
967 for (i
= 0, addr
= address
; i
< _res
.nscount
&& addr
;
968 i
++, addr
= addr
->Next
)
972 addr
->Address
.iSockaddrLength
= sizeof(SOCKADDR
);
973 addr
->Address
.lpSockaddr
=
974 (LPSOCKADDR
)((PBYTE
)addr
+ sizeof(IP_ADAPTER_DNS_SERVER_ADDRESS
));
975 sin
= (SOCKADDR_IN
*)addr
->Address
.lpSockaddr
;
976 sin
->sin_family
= WS_AF_INET
;
977 sin
->sin_port
= _res
.nsaddr_list
[i
].sin_port
;
978 memcpy(&sin
->sin_addr
, &_res
.nsaddr_list
[i
].sin_addr
, sizeof(sin
->sin_addr
));
979 if (i
== _res
.nscount
- 1)
983 (PIP_ADAPTER_DNS_SERVER_ADDRESS
)((PBYTE
)addr
+
984 sizeof(IP_ADAPTER_DNS_SERVER_ADDRESS
) + sizeof(SOCKADDR
));
987 return ERROR_SUCCESS
;
990 static BOOL
is_ip_address_string(const char *str
)
995 ret
= inet_aton(str
, &in
);
999 static ULONG
get_dns_suffix(WCHAR
*suffix
, ULONG
*len
)
1002 char *found_suffix
= NULL
;
1004 initialise_resolver();
1005 /* Always return a NULL-terminated string, even if it's empty. */
1006 size
= sizeof(WCHAR
);
1007 for (i
= 0, found_suffix
= NULL
;
1008 !found_suffix
&& i
< MAXDNSRCH
+ 1 && _res
.dnsrch
[i
]; i
++)
1010 /* This uses a heuristic to select a DNS suffix:
1011 * the first, non-IP address string is selected.
1013 if (!is_ip_address_string(_res
.dnsrch
[i
]))
1014 found_suffix
= _res
.dnsrch
[i
];
1017 size
+= strlen(found_suffix
) * sizeof(WCHAR
);
1018 if (!suffix
|| *len
< size
)
1021 return ERROR_BUFFER_OVERFLOW
;
1028 for (p
= found_suffix
; *p
; p
++)
1032 return ERROR_SUCCESS
;
1035 ULONG WINAPI DECLSPEC_HOTPATCH
GetAdaptersAddresses(ULONG family
, ULONG flags
, PVOID reserved
,
1036 PIP_ADAPTER_ADDRESSES aa
, PULONG buflen
)
1038 InterfaceIndexTable
*table
;
1039 ULONG i
, size
, dns_server_size
, dns_suffix_size
, total_size
, ret
= ERROR_NO_DATA
;
1041 TRACE("(%d, %08x, %p, %p, %p)\n", family
, flags
, reserved
, aa
, buflen
);
1043 if (!buflen
) return ERROR_INVALID_PARAMETER
;
1045 table
= getInterfaceIndexTable();
1046 if (!table
|| !table
->numIndexes
)
1048 HeapFree(GetProcessHeap(), 0, table
);
1049 return ERROR_NO_DATA
;
1052 for (i
= 0; i
< table
->numIndexes
; i
++)
1055 if ((ret
= adapterAddressesFromIndex(family
, flags
, table
->indexes
[i
], NULL
, &size
)))
1057 HeapFree(GetProcessHeap(), 0, table
);
1062 if (!(flags
& GAA_FLAG_SKIP_DNS_SERVER
))
1064 /* Since DNS servers aren't really per adapter, get enough space for a
1065 * single copy of them.
1067 get_dns_server_addresses(NULL
, &dns_server_size
);
1068 total_size
+= dns_server_size
;
1070 /* Since DNS suffix also isn't really per adapter, get enough space for a
1071 * single copy of it.
1073 get_dns_suffix(NULL
, &dns_suffix_size
);
1074 total_size
+= dns_suffix_size
;
1075 if (aa
&& *buflen
>= total_size
)
1077 ULONG bytes_left
= size
= total_size
;
1078 PIP_ADAPTER_ADDRESSES first_aa
= aa
;
1079 PIP_ADAPTER_DNS_SERVER_ADDRESS firstDns
;
1082 for (i
= 0; i
< table
->numIndexes
; i
++)
1084 if ((ret
= adapterAddressesFromIndex(family
, flags
, table
->indexes
[i
], aa
, &size
)))
1086 HeapFree(GetProcessHeap(), 0, table
);
1089 if (i
< table
->numIndexes
- 1)
1091 aa
->Next
= (IP_ADAPTER_ADDRESSES
*)((char *)aa
+ size
);
1093 size
= bytes_left
-= size
;
1096 if (!(flags
& GAA_FLAG_SKIP_DNS_SERVER
))
1098 firstDns
= (PIP_ADAPTER_DNS_SERVER_ADDRESS
)((BYTE
*)first_aa
+ total_size
- dns_server_size
- dns_suffix_size
);
1099 get_dns_server_addresses(firstDns
, &dns_server_size
);
1100 for (aa
= first_aa
; aa
; aa
= aa
->Next
)
1102 if (aa
->IfType
!= IF_TYPE_SOFTWARE_LOOPBACK
&& aa
->OperStatus
== IfOperStatusUp
)
1103 aa
->FirstDnsServerAddress
= firstDns
;
1107 dnsSuffix
= (WCHAR
*)((BYTE
*)aa
+ total_size
- dns_suffix_size
);
1108 get_dns_suffix(dnsSuffix
, &dns_suffix_size
);
1109 for (; aa
; aa
= aa
->Next
)
1111 if (aa
->IfType
!= IF_TYPE_SOFTWARE_LOOPBACK
&& aa
->OperStatus
== IfOperStatusUp
)
1112 aa
->DnsSuffix
= dnsSuffix
;
1114 aa
->DnsSuffix
= (WCHAR
*)((BYTE
*)dnsSuffix
+ dns_suffix_size
- 2);
1116 ret
= ERROR_SUCCESS
;
1119 ret
= ERROR_BUFFER_OVERFLOW
;
1120 *buflen
= total_size
;
1122 TRACE("num adapters %u\n", table
->numIndexes
);
1123 HeapFree(GetProcessHeap(), 0, table
);
1127 /******************************************************************
1128 * GetBestInterface (IPHLPAPI.@)
1130 * Get the interface, with the best route for the given IP address.
1133 * dwDestAddr [In] IP address to search the interface for
1134 * pdwBestIfIndex [Out] found best interface
1138 * Failure: error code from winerror.h
1140 DWORD WINAPI
GetBestInterface(IPAddr dwDestAddr
, PDWORD pdwBestIfIndex
)
1142 struct WS_sockaddr_in sa_in
;
1143 memset(&sa_in
, 0, sizeof(sa_in
));
1144 sa_in
.sin_family
= AF_INET
;
1145 sa_in
.sin_addr
.S_un
.S_addr
= dwDestAddr
;
1146 return GetBestInterfaceEx((struct WS_sockaddr
*)&sa_in
, pdwBestIfIndex
);
1149 /******************************************************************
1150 * GetBestInterfaceEx (IPHLPAPI.@)
1152 * Get the interface, with the best route for the given IP address.
1155 * dwDestAddr [In] IP address to search the interface for
1156 * pdwBestIfIndex [Out] found best interface
1160 * Failure: error code from winerror.h
1162 DWORD WINAPI
GetBestInterfaceEx(struct WS_sockaddr
*pDestAddr
, PDWORD pdwBestIfIndex
)
1166 TRACE("pDestAddr %p, pdwBestIfIndex %p\n", pDestAddr
, pdwBestIfIndex
);
1167 if (!pDestAddr
|| !pdwBestIfIndex
)
1168 ret
= ERROR_INVALID_PARAMETER
;
1170 MIB_IPFORWARDROW ipRow
;
1172 if (pDestAddr
->sa_family
== AF_INET
) {
1173 ret
= GetBestRoute(((struct WS_sockaddr_in
*)pDestAddr
)->sin_addr
.S_un
.S_addr
, 0, &ipRow
);
1174 if (ret
== ERROR_SUCCESS
)
1175 *pdwBestIfIndex
= ipRow
.dwForwardIfIndex
;
1177 FIXME("address family %d not supported\n", pDestAddr
->sa_family
);
1178 ret
= ERROR_NOT_SUPPORTED
;
1181 TRACE("returning %d\n", ret
);
1186 /******************************************************************
1187 * GetBestRoute (IPHLPAPI.@)
1189 * Get the best route for the given IP address.
1192 * dwDestAddr [In] IP address to search the best route for
1193 * dwSourceAddr [In] optional source IP address
1194 * pBestRoute [Out] found best route
1198 * Failure: error code from winerror.h
1200 DWORD WINAPI
GetBestRoute(DWORD dwDestAddr
, DWORD dwSourceAddr
, PMIB_IPFORWARDROW pBestRoute
)
1202 PMIB_IPFORWARDTABLE table
;
1205 TRACE("dwDestAddr 0x%08x, dwSourceAddr 0x%08x, pBestRoute %p\n", dwDestAddr
,
1206 dwSourceAddr
, pBestRoute
);
1208 return ERROR_INVALID_PARAMETER
;
1210 ret
= AllocateAndGetIpForwardTableFromStack(&table
, FALSE
, GetProcessHeap(), 0);
1212 DWORD ndx
, matchedBits
, matchedNdx
= table
->dwNumEntries
;
1214 for (ndx
= 0, matchedBits
= 0; ndx
< table
->dwNumEntries
; ndx
++) {
1215 if (table
->table
[ndx
].u1
.ForwardType
!= MIB_IPROUTE_TYPE_INVALID
&&
1216 (dwDestAddr
& table
->table
[ndx
].dwForwardMask
) ==
1217 (table
->table
[ndx
].dwForwardDest
& table
->table
[ndx
].dwForwardMask
)) {
1218 DWORD numShifts
, mask
;
1220 for (numShifts
= 0, mask
= table
->table
[ndx
].dwForwardMask
;
1221 mask
&& mask
& 1; mask
>>= 1, numShifts
++)
1223 if (numShifts
> matchedBits
) {
1224 matchedBits
= numShifts
;
1227 else if (!matchedBits
) {
1232 if (matchedNdx
< table
->dwNumEntries
) {
1233 memcpy(pBestRoute
, &table
->table
[matchedNdx
], sizeof(MIB_IPFORWARDROW
));
1234 ret
= ERROR_SUCCESS
;
1237 /* No route matches, which can happen if there's no default route. */
1238 ret
= ERROR_HOST_UNREACHABLE
;
1240 HeapFree(GetProcessHeap(), 0, table
);
1242 TRACE("returning %d\n", ret
);
1247 /******************************************************************
1248 * GetFriendlyIfIndex (IPHLPAPI.@)
1250 * Get a "friendly" version of IfIndex, which is one that doesn't
1251 * have the top byte set. Doesn't validate whether IfIndex is a valid
1255 * IfIndex [In] interface index to get the friendly one for
1258 * A friendly version of IfIndex.
1260 DWORD WINAPI
GetFriendlyIfIndex(DWORD IfIndex
)
1262 /* windows doesn't validate these, either, just makes sure the top byte is
1263 cleared. I assume my ifenum module never gives an index with the top
1265 TRACE("returning %d\n", IfIndex
);
1270 /******************************************************************
1271 * GetIfEntry (IPHLPAPI.@)
1273 * Get information about an interface.
1276 * pIfRow [In/Out] In: dwIndex of MIB_IFROW selects the interface.
1277 * Out: interface information
1281 * Failure: error code from winerror.h
1283 DWORD WINAPI
GetIfEntry(PMIB_IFROW pIfRow
)
1286 char nameBuf
[MAX_ADAPTER_NAME
];
1289 TRACE("pIfRow %p\n", pIfRow
);
1291 return ERROR_INVALID_PARAMETER
;
1293 name
= getInterfaceNameByIndex(pIfRow
->dwIndex
, nameBuf
);
1295 ret
= getInterfaceEntryByName(name
, pIfRow
);
1296 if (ret
== NO_ERROR
)
1297 ret
= getInterfaceStatsByName(name
, pIfRow
);
1300 ret
= ERROR_INVALID_DATA
;
1301 TRACE("returning %d\n", ret
);
1306 static int IfTableSorter(const void *a
, const void *b
)
1311 ret
= ((const MIB_IFROW
*)a
)->dwIndex
- ((const MIB_IFROW
*)b
)->dwIndex
;
1318 /******************************************************************
1319 * GetIfTable (IPHLPAPI.@)
1321 * Get a table of local interfaces.
1324 * pIfTable [Out] buffer for local interfaces table
1325 * pdwSize [In/Out] length of output buffer
1326 * bOrder [In] whether to sort the table
1330 * Failure: error code from winerror.h
1333 * If pdwSize is less than required, the function will return
1334 * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte
1336 * If bOrder is true, the returned table will be sorted by interface index.
1338 DWORD WINAPI
GetIfTable(PMIB_IFTABLE pIfTable
, PULONG pdwSize
, BOOL bOrder
)
1342 TRACE("pIfTable %p, pdwSize %p, bOrder %d\n", pdwSize
, pdwSize
,
1345 ret
= ERROR_INVALID_PARAMETER
;
1347 DWORD numInterfaces
= getNumInterfaces();
1348 ULONG size
= sizeof(MIB_IFTABLE
);
1350 if (numInterfaces
> 1)
1351 size
+= (numInterfaces
- 1) * sizeof(MIB_IFROW
);
1352 if (!pIfTable
|| *pdwSize
< size
) {
1354 ret
= ERROR_INSUFFICIENT_BUFFER
;
1357 InterfaceIndexTable
*table
= getInterfaceIndexTable();
1360 size
= sizeof(MIB_IFTABLE
);
1361 if (table
->numIndexes
> 1)
1362 size
+= (table
->numIndexes
- 1) * sizeof(MIB_IFROW
);
1363 if (*pdwSize
< size
) {
1365 ret
= ERROR_INSUFFICIENT_BUFFER
;
1371 pIfTable
->dwNumEntries
= 0;
1372 for (ndx
= 0; ndx
< table
->numIndexes
; ndx
++) {
1373 pIfTable
->table
[ndx
].dwIndex
= table
->indexes
[ndx
];
1374 GetIfEntry(&pIfTable
->table
[ndx
]);
1375 pIfTable
->dwNumEntries
++;
1378 qsort(pIfTable
->table
, pIfTable
->dwNumEntries
, sizeof(MIB_IFROW
),
1382 HeapFree(GetProcessHeap(), 0, table
);
1385 ret
= ERROR_OUTOFMEMORY
;
1388 TRACE("returning %d\n", ret
);
1393 /******************************************************************
1394 * GetInterfaceInfo (IPHLPAPI.@)
1396 * Get a list of network interface adapters.
1399 * pIfTable [Out] buffer for interface adapters
1400 * dwOutBufLen [Out] if buffer is too small, returns required size
1404 * Failure: error code from winerror.h
1407 * MSDN states this should return non-loopback interfaces only.
1409 DWORD WINAPI
GetInterfaceInfo(PIP_INTERFACE_INFO pIfTable
, PULONG dwOutBufLen
)
1413 TRACE("pIfTable %p, dwOutBufLen %p\n", pIfTable
, dwOutBufLen
);
1415 ret
= ERROR_INVALID_PARAMETER
;
1417 DWORD numInterfaces
= getNumInterfaces();
1418 ULONG size
= sizeof(IP_INTERFACE_INFO
);
1420 if (numInterfaces
> 1)
1421 size
+= (numInterfaces
- 1) * sizeof(IP_ADAPTER_INDEX_MAP
);
1422 if (!pIfTable
|| *dwOutBufLen
< size
) {
1423 *dwOutBufLen
= size
;
1424 ret
= ERROR_INSUFFICIENT_BUFFER
;
1427 InterfaceIndexTable
*table
= getInterfaceIndexTable();
1430 size
= sizeof(IP_INTERFACE_INFO
);
1431 if (table
->numIndexes
> 1)
1432 size
+= (table
->numIndexes
- 1) * sizeof(IP_ADAPTER_INDEX_MAP
);
1433 if (*dwOutBufLen
< size
) {
1434 *dwOutBufLen
= size
;
1435 ret
= ERROR_INSUFFICIENT_BUFFER
;
1439 char nameBuf
[MAX_ADAPTER_NAME
];
1441 *dwOutBufLen
= size
;
1442 pIfTable
->NumAdapters
= 0;
1443 for (ndx
= 0; ndx
< table
->numIndexes
; ndx
++) {
1444 const char *walker
, *name
;
1447 pIfTable
->Adapter
[ndx
].Index
= table
->indexes
[ndx
];
1448 name
= getInterfaceNameByIndex(table
->indexes
[ndx
], nameBuf
);
1449 for (walker
= name
, assigner
= pIfTable
->Adapter
[ndx
].Name
;
1450 walker
&& *walker
&&
1451 assigner
- pIfTable
->Adapter
[ndx
].Name
< MAX_ADAPTER_NAME
- 1;
1452 walker
++, assigner
++)
1453 *assigner
= *walker
;
1455 pIfTable
->NumAdapters
++;
1459 HeapFree(GetProcessHeap(), 0, table
);
1462 ret
= ERROR_OUTOFMEMORY
;
1465 TRACE("returning %d\n", ret
);
1470 /******************************************************************
1471 * GetIpAddrTable (IPHLPAPI.@)
1473 * Get interface-to-IP address mapping table.
1476 * pIpAddrTable [Out] buffer for mapping table
1477 * pdwSize [In/Out] length of output buffer
1478 * bOrder [In] whether to sort the table
1482 * Failure: error code from winerror.h
1485 * If pdwSize is less than required, the function will return
1486 * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte
1488 * If bOrder is true, the returned table will be sorted by the next hop and
1489 * an assortment of arbitrary parameters.
1491 DWORD WINAPI
GetIpAddrTable(PMIB_IPADDRTABLE pIpAddrTable
, PULONG pdwSize
, BOOL bOrder
)
1495 TRACE("pIpAddrTable %p, pdwSize %p, bOrder %d\n", pIpAddrTable
, pdwSize
,
1498 ret
= ERROR_INVALID_PARAMETER
;
1500 PMIB_IPADDRTABLE table
;
1502 ret
= getIPAddrTable(&table
, GetProcessHeap(), 0);
1503 if (ret
== NO_ERROR
)
1505 ULONG size
= sizeof(MIB_IPADDRTABLE
);
1507 if (table
->dwNumEntries
> 1)
1508 size
+= (table
->dwNumEntries
- 1) * sizeof(MIB_IPADDRROW
);
1509 if (!pIpAddrTable
|| *pdwSize
< size
) {
1511 ret
= ERROR_INSUFFICIENT_BUFFER
;
1515 memcpy(pIpAddrTable
, table
, size
);
1517 qsort(pIpAddrTable
->table
, pIpAddrTable
->dwNumEntries
,
1518 sizeof(MIB_IPADDRROW
), IpAddrTableSorter
);
1521 HeapFree(GetProcessHeap(), 0, table
);
1524 TRACE("returning %d\n", ret
);
1529 /******************************************************************
1530 * GetIpForwardTable (IPHLPAPI.@)
1532 * Get the route table.
1535 * pIpForwardTable [Out] buffer for route table
1536 * pdwSize [In/Out] length of output buffer
1537 * bOrder [In] whether to sort the table
1541 * Failure: error code from winerror.h
1544 * If pdwSize is less than required, the function will return
1545 * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte
1547 * If bOrder is true, the returned table will be sorted by the next hop and
1548 * an assortment of arbitrary parameters.
1550 DWORD WINAPI
GetIpForwardTable(PMIB_IPFORWARDTABLE pIpForwardTable
, PULONG pdwSize
, BOOL bOrder
)
1553 PMIB_IPFORWARDTABLE table
;
1555 TRACE("pIpForwardTable %p, pdwSize %p, bOrder %d\n", pIpForwardTable
, pdwSize
, bOrder
);
1557 if (!pdwSize
) return ERROR_INVALID_PARAMETER
;
1559 ret
= AllocateAndGetIpForwardTableFromStack(&table
, bOrder
, GetProcessHeap(), 0);
1561 DWORD size
= FIELD_OFFSET( MIB_IPFORWARDTABLE
, table
[table
->dwNumEntries
] );
1562 if (!pIpForwardTable
|| *pdwSize
< size
) {
1564 ret
= ERROR_INSUFFICIENT_BUFFER
;
1568 memcpy(pIpForwardTable
, table
, size
);
1570 HeapFree(GetProcessHeap(), 0, table
);
1572 TRACE("returning %d\n", ret
);
1577 /******************************************************************
1578 * GetIpNetTable (IPHLPAPI.@)
1580 * Get the IP-to-physical address mapping table.
1583 * pIpNetTable [Out] buffer for mapping table
1584 * pdwSize [In/Out] length of output buffer
1585 * bOrder [In] whether to sort the table
1589 * Failure: error code from winerror.h
1592 * If pdwSize is less than required, the function will return
1593 * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the required byte
1595 * If bOrder is true, the returned table will be sorted by IP address.
1597 DWORD WINAPI
GetIpNetTable(PMIB_IPNETTABLE pIpNetTable
, PULONG pdwSize
, BOOL bOrder
)
1600 PMIB_IPNETTABLE table
;
1602 TRACE("pIpNetTable %p, pdwSize %p, bOrder %d\n", pIpNetTable
, pdwSize
, bOrder
);
1604 if (!pdwSize
) return ERROR_INVALID_PARAMETER
;
1606 ret
= AllocateAndGetIpNetTableFromStack( &table
, bOrder
, GetProcessHeap(), 0 );
1608 DWORD size
= FIELD_OFFSET( MIB_IPNETTABLE
, table
[table
->dwNumEntries
] );
1609 if (!pIpNetTable
|| *pdwSize
< size
) {
1611 ret
= ERROR_INSUFFICIENT_BUFFER
;
1615 memcpy(pIpNetTable
, table
, size
);
1617 HeapFree(GetProcessHeap(), 0, table
);
1619 TRACE("returning %d\n", ret
);
1623 /* Gets the DNS server list into the list beginning at list. Assumes that
1624 * a single server address may be placed at list if *len is at least
1625 * sizeof(IP_ADDR_STRING) long. Otherwise, list->Next is set to firstDynamic,
1626 * and assumes that all remaining DNS servers are contiguously located
1627 * beginning at firstDynamic. On input, *len is assumed to be the total number
1628 * of bytes available for all DNS servers, and is ignored if list is NULL.
1629 * On return, *len is set to the total number of bytes required for all DNS
1631 * Returns ERROR_BUFFER_OVERFLOW if *len is insufficient,
1632 * ERROR_SUCCESS otherwise.
1634 static DWORD
get_dns_server_list(PIP_ADDR_STRING list
,
1635 PIP_ADDR_STRING firstDynamic
, DWORD
*len
)
1639 initialise_resolver();
1640 size
= _res
.nscount
* sizeof(IP_ADDR_STRING
);
1641 if (!list
|| *len
< size
) {
1643 return ERROR_BUFFER_OVERFLOW
;
1646 if (_res
.nscount
> 0) {
1647 PIP_ADDR_STRING ptr
;
1650 for (i
= 0, ptr
= list
; i
< _res
.nscount
&& ptr
; i
++, ptr
= ptr
->Next
) {
1651 toIPAddressString(_res
.nsaddr_list
[i
].sin_addr
.s_addr
,
1652 ptr
->IpAddress
.String
);
1653 if (i
== _res
.nscount
- 1)
1656 ptr
->Next
= firstDynamic
;
1658 ptr
->Next
= (PIP_ADDR_STRING
)((PBYTE
)ptr
+ sizeof(IP_ADDR_STRING
));
1661 return ERROR_SUCCESS
;
1664 /******************************************************************
1665 * GetNetworkParams (IPHLPAPI.@)
1667 * Get the network parameters for the local computer.
1670 * pFixedInfo [Out] buffer for network parameters
1671 * pOutBufLen [In/Out] length of output buffer
1675 * Failure: error code from winerror.h
1678 * If pOutBufLen is less than required, the function will return
1679 * ERROR_INSUFFICIENT_BUFFER, and pOutBufLen will be set to the required byte
1682 DWORD WINAPI
GetNetworkParams(PFIXED_INFO pFixedInfo
, PULONG pOutBufLen
)
1684 DWORD ret
, size
, serverListSize
;
1688 TRACE("pFixedInfo %p, pOutBufLen %p\n", pFixedInfo
, pOutBufLen
);
1690 return ERROR_INVALID_PARAMETER
;
1692 get_dns_server_list(NULL
, NULL
, &serverListSize
);
1693 size
= sizeof(FIXED_INFO
) + serverListSize
- sizeof(IP_ADDR_STRING
);
1694 if (!pFixedInfo
|| *pOutBufLen
< size
) {
1696 return ERROR_BUFFER_OVERFLOW
;
1699 memset(pFixedInfo
, 0, size
);
1700 size
= sizeof(pFixedInfo
->HostName
);
1701 GetComputerNameExA(ComputerNameDnsHostname
, pFixedInfo
->HostName
, &size
);
1702 size
= sizeof(pFixedInfo
->DomainName
);
1703 GetComputerNameExA(ComputerNameDnsDomain
, pFixedInfo
->DomainName
, &size
);
1704 get_dns_server_list(&pFixedInfo
->DnsServerList
,
1705 (PIP_ADDR_STRING
)((BYTE
*)pFixedInfo
+ sizeof(FIXED_INFO
)),
1707 /* Assume the first DNS server in the list is the "current" DNS server: */
1708 pFixedInfo
->CurrentDnsServer
= &pFixedInfo
->DnsServerList
;
1709 pFixedInfo
->NodeType
= HYBRID_NODETYPE
;
1710 regReturn
= RegOpenKeyExA(HKEY_LOCAL_MACHINE
,
1711 "SYSTEM\\CurrentControlSet\\Services\\VxD\\MSTCP", 0, KEY_READ
, &hKey
);
1712 if (regReturn
!= ERROR_SUCCESS
)
1713 regReturn
= RegOpenKeyExA(HKEY_LOCAL_MACHINE
,
1714 "SYSTEM\\CurrentControlSet\\Services\\NetBT\\Parameters", 0, KEY_READ
,
1716 if (regReturn
== ERROR_SUCCESS
)
1718 DWORD size
= sizeof(pFixedInfo
->ScopeId
);
1720 RegQueryValueExA(hKey
, "ScopeID", NULL
, NULL
, (LPBYTE
)pFixedInfo
->ScopeId
, &size
);
1724 /* FIXME: can check whether routing's enabled in /proc/sys/net/ipv4/ip_forward
1725 I suppose could also check for a listener on port 53 to set EnableDns */
1727 TRACE("returning %d\n", ret
);
1732 /******************************************************************
1733 * GetNumberOfInterfaces (IPHLPAPI.@)
1735 * Get the number of interfaces.
1738 * pdwNumIf [Out] number of interfaces
1741 * NO_ERROR on success, ERROR_INVALID_PARAMETER if pdwNumIf is NULL.
1743 DWORD WINAPI
GetNumberOfInterfaces(PDWORD pdwNumIf
)
1747 TRACE("pdwNumIf %p\n", pdwNumIf
);
1749 ret
= ERROR_INVALID_PARAMETER
;
1751 *pdwNumIf
= getNumInterfaces();
1754 TRACE("returning %d\n", ret
);
1759 /******************************************************************
1760 * GetPerAdapterInfo (IPHLPAPI.@)
1762 * Get information about an adapter corresponding to an interface.
1765 * IfIndex [In] interface info
1766 * pPerAdapterInfo [Out] buffer for per adapter info
1767 * pOutBufLen [In/Out] length of output buffer
1771 * Failure: error code from winerror.h
1773 DWORD WINAPI
GetPerAdapterInfo(ULONG IfIndex
, PIP_PER_ADAPTER_INFO pPerAdapterInfo
, PULONG pOutBufLen
)
1775 ULONG bytesNeeded
= sizeof(IP_PER_ADAPTER_INFO
), serverListSize
= 0;
1776 DWORD ret
= NO_ERROR
;
1778 TRACE("(IfIndex %d, pPerAdapterInfo %p, pOutBufLen %p)\n", IfIndex
, pPerAdapterInfo
, pOutBufLen
);
1780 if (!pOutBufLen
) return ERROR_INVALID_PARAMETER
;
1782 if (!isIfIndexLoopback(IfIndex
)) {
1783 get_dns_server_list(NULL
, NULL
, &serverListSize
);
1784 if (serverListSize
> sizeof(IP_ADDR_STRING
))
1785 bytesNeeded
+= serverListSize
- sizeof(IP_ADDR_STRING
);
1787 if (!pPerAdapterInfo
|| *pOutBufLen
< bytesNeeded
)
1789 *pOutBufLen
= bytesNeeded
;
1790 return ERROR_BUFFER_OVERFLOW
;
1793 memset(pPerAdapterInfo
, 0, bytesNeeded
);
1794 if (!isIfIndexLoopback(IfIndex
)) {
1795 ret
= get_dns_server_list(&pPerAdapterInfo
->DnsServerList
,
1796 (PIP_ADDR_STRING
)((PBYTE
)pPerAdapterInfo
+ sizeof(IP_PER_ADAPTER_INFO
)),
1798 /* Assume the first DNS server in the list is the "current" DNS server: */
1799 pPerAdapterInfo
->CurrentDnsServer
= &pPerAdapterInfo
->DnsServerList
;
1805 /******************************************************************
1806 * GetRTTAndHopCount (IPHLPAPI.@)
1808 * Get round-trip time (RTT) and hop count.
1812 * DestIpAddress [In] destination address to get the info for
1813 * HopCount [Out] retrieved hop count
1814 * MaxHops [In] maximum hops to search for the destination
1815 * RTT [Out] RTT in milliseconds
1822 * Stub, returns FALSE.
1824 BOOL WINAPI
GetRTTAndHopCount(IPAddr DestIpAddress
, PULONG HopCount
, ULONG MaxHops
, PULONG RTT
)
1826 FIXME("(DestIpAddress 0x%08x, HopCount %p, MaxHops %d, RTT %p): stub\n",
1827 DestIpAddress
, HopCount
, MaxHops
, RTT
);
1832 /******************************************************************
1833 * GetTcpTable (IPHLPAPI.@)
1835 * Get the table of active TCP connections.
1838 * pTcpTable [Out] buffer for TCP connections table
1839 * pdwSize [In/Out] length of output buffer
1840 * bOrder [In] whether to order the table
1844 * Failure: error code from winerror.h
1847 * If pdwSize is less than required, the function will return
1848 * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to
1849 * the required byte size.
1850 * If bOrder is true, the returned table will be sorted, first by
1851 * local address and port number, then by remote address and port
1854 DWORD WINAPI
GetTcpTable(PMIB_TCPTABLE pTcpTable
, PDWORD pdwSize
, BOOL bOrder
)
1857 PMIB_TCPTABLE table
;
1859 TRACE("pTcpTable %p, pdwSize %p, bOrder %d\n", pTcpTable
, pdwSize
, bOrder
);
1861 if (!pdwSize
) return ERROR_INVALID_PARAMETER
;
1863 ret
= AllocateAndGetTcpTableFromStack(&table
, bOrder
, GetProcessHeap(), 0);
1865 DWORD size
= FIELD_OFFSET( MIB_TCPTABLE
, table
[table
->dwNumEntries
] );
1866 if (!pTcpTable
|| *pdwSize
< size
) {
1868 ret
= ERROR_INSUFFICIENT_BUFFER
;
1872 memcpy(pTcpTable
, table
, size
);
1874 HeapFree(GetProcessHeap(), 0, table
);
1876 TRACE("returning %d\n", ret
);
1880 /******************************************************************
1881 * GetExtendedTcpTable (IPHLPAPI.@)
1883 DWORD WINAPI
GetExtendedTcpTable(PVOID pTcpTable
, PDWORD pdwSize
, BOOL bOrder
,
1884 ULONG ulAf
, TCP_TABLE_CLASS TableClass
, ULONG Reserved
)
1886 TRACE("pTcpTable %p, pdwSize %p, bOrder %d, ulAf %u, TableClass %u, Reserved %u\n",
1887 pTcpTable
, pdwSize
, bOrder
, ulAf
, TableClass
, Reserved
);
1889 if (ulAf
== AF_INET6
|| TableClass
!= TCP_TABLE_BASIC_ALL
)
1891 FIXME("ulAf = %u, TableClass = %u not supportted\n", ulAf
, TableClass
);
1892 return ERROR_NOT_SUPPORTED
;
1894 return GetTcpTable(pTcpTable
, pdwSize
, bOrder
);
1897 /******************************************************************
1898 * GetUdpTable (IPHLPAPI.@)
1900 * Get a table of active UDP connections.
1903 * pUdpTable [Out] buffer for UDP connections table
1904 * pdwSize [In/Out] length of output buffer
1905 * bOrder [In] whether to order the table
1909 * Failure: error code from winerror.h
1912 * If pdwSize is less than required, the function will return
1913 * ERROR_INSUFFICIENT_BUFFER, and *pdwSize will be set to the
1914 * required byte size.
1915 * If bOrder is true, the returned table will be sorted, first by
1916 * local address, then by local port number.
1918 DWORD WINAPI
GetUdpTable(PMIB_UDPTABLE pUdpTable
, PDWORD pdwSize
, BOOL bOrder
)
1921 PMIB_UDPTABLE table
;
1923 TRACE("pUdpTable %p, pdwSize %p, bOrder %d\n", pUdpTable
, pdwSize
, bOrder
);
1925 if (!pdwSize
) return ERROR_INVALID_PARAMETER
;
1927 ret
= AllocateAndGetUdpTableFromStack( &table
, bOrder
, GetProcessHeap(), 0 );
1929 DWORD size
= FIELD_OFFSET( MIB_UDPTABLE
, table
[table
->dwNumEntries
] );
1930 if (!pUdpTable
|| *pdwSize
< size
) {
1932 ret
= ERROR_INSUFFICIENT_BUFFER
;
1936 memcpy(pUdpTable
, table
, size
);
1938 HeapFree(GetProcessHeap(), 0, table
);
1940 TRACE("returning %d\n", ret
);
1945 /******************************************************************
1946 * GetUniDirectionalAdapterInfo (IPHLPAPI.@)
1948 * This is a Win98-only function to get information on "unidirectional"
1949 * adapters. Since this is pretty nonsensical in other contexts, it
1950 * never returns anything.
1953 * pIPIfInfo [Out] buffer for adapter infos
1954 * dwOutBufLen [Out] length of the output buffer
1958 * Failure: error code from winerror.h
1961 * Stub, returns ERROR_NOT_SUPPORTED.
1963 DWORD WINAPI
GetUniDirectionalAdapterInfo(PIP_UNIDIRECTIONAL_ADAPTER_ADDRESS pIPIfInfo
, PULONG dwOutBufLen
)
1965 TRACE("pIPIfInfo %p, dwOutBufLen %p\n", pIPIfInfo
, dwOutBufLen
);
1966 /* a unidirectional adapter?? not bloody likely! */
1967 return ERROR_NOT_SUPPORTED
;
1971 /******************************************************************
1972 * IpReleaseAddress (IPHLPAPI.@)
1974 * Release an IP obtained through DHCP,
1977 * AdapterInfo [In] adapter to release IP address
1981 * Failure: error code from winerror.h
1984 * Since GetAdaptersInfo never returns adapters that have DHCP enabled,
1985 * this function does nothing.
1988 * Stub, returns ERROR_NOT_SUPPORTED.
1990 DWORD WINAPI
IpReleaseAddress(PIP_ADAPTER_INDEX_MAP AdapterInfo
)
1992 TRACE("AdapterInfo %p\n", AdapterInfo
);
1993 /* not a stub, never going to support this (and I never mark an adapter as
1994 DHCP enabled, see GetAdaptersInfo, so this should never get called) */
1995 return ERROR_NOT_SUPPORTED
;
1999 /******************************************************************
2000 * IpRenewAddress (IPHLPAPI.@)
2002 * Renew an IP obtained through DHCP.
2005 * AdapterInfo [In] adapter to renew IP address
2009 * Failure: error code from winerror.h
2012 * Since GetAdaptersInfo never returns adapters that have DHCP enabled,
2013 * this function does nothing.
2016 * Stub, returns ERROR_NOT_SUPPORTED.
2018 DWORD WINAPI
IpRenewAddress(PIP_ADAPTER_INDEX_MAP AdapterInfo
)
2020 TRACE("AdapterInfo %p\n", AdapterInfo
);
2021 /* not a stub, never going to support this (and I never mark an adapter as
2022 DHCP enabled, see GetAdaptersInfo, so this should never get called) */
2023 return ERROR_NOT_SUPPORTED
;
2027 /******************************************************************
2028 * NotifyAddrChange (IPHLPAPI.@)
2030 * Notify caller whenever the ip-interface map is changed.
2033 * Handle [Out] handle usable in asynchronous notification
2034 * overlapped [In] overlapped structure that notifies the caller
2038 * Failure: error code from winerror.h
2041 * Stub, returns ERROR_NOT_SUPPORTED.
2043 DWORD WINAPI
NotifyAddrChange(PHANDLE Handle
, LPOVERLAPPED overlapped
)
2045 FIXME("(Handle %p, overlapped %p): stub\n", Handle
, overlapped
);
2046 if (Handle
) *Handle
= INVALID_HANDLE_VALUE
;
2047 if (overlapped
) ((IO_STATUS_BLOCK
*) overlapped
)->u
.Status
= STATUS_PENDING
;
2048 return ERROR_IO_PENDING
;
2052 /******************************************************************
2053 * NotifyRouteChange (IPHLPAPI.@)
2055 * Notify caller whenever the ip routing table is changed.
2058 * Handle [Out] handle usable in asynchronous notification
2059 * overlapped [In] overlapped structure that notifies the caller
2063 * Failure: error code from winerror.h
2066 * Stub, returns ERROR_NOT_SUPPORTED.
2068 DWORD WINAPI
NotifyRouteChange(PHANDLE Handle
, LPOVERLAPPED overlapped
)
2070 FIXME("(Handle %p, overlapped %p): stub\n", Handle
, overlapped
);
2071 return ERROR_NOT_SUPPORTED
;
2075 /******************************************************************
2076 * SendARP (IPHLPAPI.@)
2078 * Send an ARP request.
2081 * DestIP [In] attempt to obtain this IP
2082 * SrcIP [In] optional sender IP address
2083 * pMacAddr [Out] buffer for the mac address
2084 * PhyAddrLen [In/Out] length of the output buffer
2088 * Failure: error code from winerror.h
2091 * Stub, returns ERROR_NOT_SUPPORTED.
2093 DWORD WINAPI
SendARP(IPAddr DestIP
, IPAddr SrcIP
, PULONG pMacAddr
, PULONG PhyAddrLen
)
2095 FIXME("(DestIP 0x%08x, SrcIP 0x%08x, pMacAddr %p, PhyAddrLen %p): stub\n",
2096 DestIP
, SrcIP
, pMacAddr
, PhyAddrLen
);
2097 return ERROR_NOT_SUPPORTED
;
2101 /******************************************************************
2102 * SetIfEntry (IPHLPAPI.@)
2104 * Set the administrative status of an interface.
2107 * pIfRow [In] dwAdminStatus member specifies the new status.
2111 * Failure: error code from winerror.h
2114 * Stub, returns ERROR_NOT_SUPPORTED.
2116 DWORD WINAPI
SetIfEntry(PMIB_IFROW pIfRow
)
2118 FIXME("(pIfRow %p): stub\n", pIfRow
);
2119 /* this is supposed to set an interface administratively up or down.
2120 Could do SIOCSIFFLAGS and set/clear IFF_UP, but, not sure I want to, and
2121 this sort of down is indistinguishable from other sorts of down (e.g. no
2123 return ERROR_NOT_SUPPORTED
;
2127 /******************************************************************
2128 * SetIpForwardEntry (IPHLPAPI.@)
2130 * Modify an existing route.
2133 * pRoute [In] route with the new information
2137 * Failure: error code from winerror.h
2140 * Stub, returns NO_ERROR.
2142 DWORD WINAPI
SetIpForwardEntry(PMIB_IPFORWARDROW pRoute
)
2144 FIXME("(pRoute %p): stub\n", pRoute
);
2145 /* this is to add a route entry, how's it distinguishable from
2146 CreateIpForwardEntry?
2147 could use SIOCADDRT, not sure I want to */
2152 /******************************************************************
2153 * SetIpNetEntry (IPHLPAPI.@)
2155 * Modify an existing ARP entry.
2158 * pArpEntry [In] ARP entry with the new information
2162 * Failure: error code from winerror.h
2165 * Stub, returns NO_ERROR.
2167 DWORD WINAPI
SetIpNetEntry(PMIB_IPNETROW pArpEntry
)
2169 FIXME("(pArpEntry %p): stub\n", pArpEntry
);
2170 /* same as CreateIpNetEntry here, could use SIOCSARP, not sure I want to */
2175 /******************************************************************
2176 * SetIpStatistics (IPHLPAPI.@)
2178 * Toggle IP forwarding and det the default TTL value.
2181 * pIpStats [In] IP statistics with the new information
2185 * Failure: error code from winerror.h
2188 * Stub, returns NO_ERROR.
2190 DWORD WINAPI
SetIpStatistics(PMIB_IPSTATS pIpStats
)
2192 FIXME("(pIpStats %p): stub\n", pIpStats
);
2197 /******************************************************************
2198 * SetIpTTL (IPHLPAPI.@)
2200 * Set the default TTL value.
2203 * nTTL [In] new TTL value
2207 * Failure: error code from winerror.h
2210 * Stub, returns NO_ERROR.
2212 DWORD WINAPI
SetIpTTL(UINT nTTL
)
2214 FIXME("(nTTL %d): stub\n", nTTL
);
2215 /* could echo nTTL > /proc/net/sys/net/ipv4/ip_default_ttl, not sure I
2216 want to. Could map EACCESS to ERROR_ACCESS_DENIED, I suppose */
2221 /******************************************************************
2222 * SetTcpEntry (IPHLPAPI.@)
2224 * Set the state of a TCP connection.
2227 * pTcpRow [In] specifies connection with new state
2231 * Failure: error code from winerror.h
2234 * Stub, returns NO_ERROR.
2236 DWORD WINAPI
SetTcpEntry(PMIB_TCPROW pTcpRow
)
2238 FIXME("(pTcpRow %p): stub\n", pTcpRow
);
2243 /******************************************************************
2244 * UnenableRouter (IPHLPAPI.@)
2246 * Decrement the IP-forwarding reference count. Turn off IP-forwarding
2247 * if it reaches zero.
2250 * pOverlapped [In/Out] should be the same as in EnableRouter()
2251 * lpdwEnableCount [Out] optional, receives reference count
2255 * Failure: error code from winerror.h
2258 * Stub, returns ERROR_NOT_SUPPORTED.
2260 DWORD WINAPI
UnenableRouter(OVERLAPPED
* pOverlapped
, LPDWORD lpdwEnableCount
)
2262 FIXME("(pOverlapped %p, lpdwEnableCount %p): stub\n", pOverlapped
,
2264 /* could echo "0" > /proc/net/sys/net/ipv4/ip_forward, not sure I want to
2265 could map EACCESS to ERROR_ACCESS_DENIED, I suppose
2267 return ERROR_NOT_SUPPORTED
;
2270 /******************************************************************
2271 * PfCreateInterface (IPHLPAPI.@)
2273 DWORD WINAPI
PfCreateInterface(DWORD dwName
, PFFORWARD_ACTION inAction
, PFFORWARD_ACTION outAction
,
2274 BOOL bUseLog
, BOOL bMustBeUnique
, INTERFACE_HANDLE
*ppInterface
)
2276 FIXME("(%d %d %d %x %x %p) stub\n", dwName
, inAction
, outAction
, bUseLog
, bMustBeUnique
, ppInterface
);
2277 return ERROR_CALL_NOT_IMPLEMENTED
;
2280 /******************************************************************
2281 * GetTcpTable2 (IPHLPAPI.@)
2283 ULONG WINAPI
GetTcpTable2(PMIB_TCPTABLE2 table
, PULONG size
, BOOL order
)
2285 FIXME("pTcpTable2 %p, pdwSize %p, bOrder %d: stub\n", table
, size
, order
);
2286 return ERROR_NOT_SUPPORTED
;
2289 /******************************************************************
2290 * GetTcp6Table (IPHLPAPI.@)
2292 ULONG WINAPI
GetTcp6Table(PMIB_TCP6TABLE table
, PULONG size
, BOOL order
)
2294 FIXME("pTcp6Table %p, size %p, order %d: stub\n", table
, size
, order
);
2295 return ERROR_NOT_SUPPORTED
;
2298 /******************************************************************
2299 * GetTcp6Table2 (IPHLPAPI.@)
2301 ULONG WINAPI
GetTcp6Table2(PMIB_TCP6TABLE2 table
, PULONG size
, BOOL order
)
2303 FIXME("pTcp6Table2 %p, size %p, order %d: stub\n", table
, size
, order
);
2304 return ERROR_NOT_SUPPORTED
;