exit(-1);
}
+struct typeent {
+ const char *t_name;
+ int t_type;
+};
+
+static const struct typeent algo_types[]= {
+ { "enc", XFRMA_ALG_CRYPT }, { "auth", XFRMA_ALG_AUTH },
+ { "comp", XFRMA_ALG_COMP }, { NULL, -1 }
+};
+
+int xfrm_algotype_getbyname(char *name)
+{
+ int i;
+
+ for (i = 0; ; i++) {
+ const struct typeent *t = &algo_types[i];
+ if (!t->t_name || t->t_type == -1)
+ break;
+
+ if (strcmp(t->t_name, name) == 0)
+ return t->t_type;
+ }
+
+ return -1;
+}
+
+const char *strxf_algotype(int type)
+{
+ int i;
+
+ for (i = 0; ; i++) {
+ const struct typeent *t = &algo_types[i];
+ if (!t->t_name || t->t_type == -1)
+ break;
+
+ if (t->t_type == type)
+ return t->t_name;
+ }
+
+ return NULL;
+}
+
const char *strxf_flags(__u8 flags)
{
static char str[16];
strcpy(str, "unique");
break;
default:
- sprintf(str, "unknown-share(%d)", share);
+ sprintf(str, "%d", share);
break;
}
{
char abuf[256];
__u32 spi;
- struct protoent *pp;
- char pbuf[32];
- char *p;
if (prefix)
fprintf(fp, prefix);
fprintf(fp, "src %s ", rt_addr_n2a(family, sizeof(*saddr),
saddr, abuf, sizeof(abuf)));
memset(abuf, '\0', sizeof(abuf));
- fprintf(fp, "dst %s\n", rt_addr_n2a(family, sizeof(id->daddr),
- &id->daddr, abuf, sizeof(abuf)));
+ fprintf(fp, "dst %s", rt_addr_n2a(family, sizeof(id->daddr),
+ &id->daddr, abuf, sizeof(abuf)));
+ fprintf(fp, "%s", _SL_);
if (prefix)
fprintf(fp, prefix);
fprintf(fp, "\t");
- pp = getprotobynumber(id->proto);
- if (pp)
- p = pp->p_name;
- else {
- sprintf(pbuf, "%d", id->proto);
- p = pbuf;
- }
- fprintf(fp, "proto %s ", p);
+ fprintf(fp, "proto %s ", strxf_proto(id->proto));
spi = ntohl(id->spi);
- fprintf(fp, "spi %u", spi);
+ fprintf(fp, "spi 0x%08x", spi);
if (show_stats > 0)
- fprintf(fp, "(0x%08x)", spi);
+ fprintf(fp, "(%u)", spi);
fprintf(fp, " ");
fprintf(fp, "reqid %u", reqid);
fprintf(fp, "(0x%08x)", reqid);
fprintf(fp, " ");
- fprintf(fp, "mode %s\n", (mode ? "tunnel" : "transport"));
+ fprintf(fp, "mode ");
+ switch (mode) {
+ case 0:
+ fprintf(fp, "transport");
+ break;
+ case 1:
+ fprintf(fp, "tunnel");
+ break;
+ default:
+ fprintf(fp, "%u", mode);
+ break;
+ }
+ fprintf(fp, "%s", _SL_);
}
static const char *strxf_limit(__u64 limit)
{
if (prefix)
fprintf(fp, prefix);
- fprintf(fp, "stats:\n");
+ fprintf(fp, "stats:");
+ fprintf(fp, "%s", _SL_);
if (prefix)
fprintf(fp, prefix);
fprintf(fp, "replay-window %d ", s->replay_window);
fprintf(fp, "replay %d ", s->replay);
fprintf(fp, "failed %d", s->integrity_failed);
- fprintf(fp, "\n");
+ fprintf(fp, "%s", _SL_);
}
static const char *strxf_time(__u64 time)
{
static char str[32];
- struct tm *tp;
- time_t t;
- if (time == 0) {
- strcpy(str, "(undefined)");
- } else {
- /* XXX: treat time in the same manner of xfrm_{user,state}.c */
+ if (time == 0)
+ strcpy(str, "-");
+ else {
+ time_t t;
+ struct tm *tp;
+
+ /* XXX: treat time in the same manner of kernel's
+ * net/xfrm/xfrm_{user,state}.c
+ */
t = (long)time;
tp = localtime(&t);
- sprintf(str, "%04d/%02d/%02d %02d:%02d:%02d",
- tp->tm_year + 1900, tp->tm_mon + 1, tp->tm_mday,
- tp->tm_hour, tp->tm_min, tp->tm_sec);
+ strftime(str, sizeof(str), "%F %T", tp);
}
return str;
if (cfg) {
if (prefix)
fprintf(fp, prefix);
- fprintf(fp, "lifetime config:\n");
+ fprintf(fp, "lifetime config:");
+ fprintf(fp, "%s", _SL_);
if (prefix)
fprintf(fp, prefix);
fprintf(fp, strxf_limit(cfg->soft_byte_limit));
fprintf(fp, "(bytes), hard ");
fprintf(fp, strxf_limit(cfg->hard_byte_limit));
- fprintf(fp, "(bytes)\n");
+ fprintf(fp, "(bytes)");
+ fprintf(fp, "%s", _SL_);
if (prefix)
fprintf(fp, prefix);
fprintf(fp, strxf_limit(cfg->soft_packet_limit));
fprintf(fp, "(packets), hard ");
fprintf(fp, strxf_limit(cfg->hard_packet_limit));
- fprintf(fp, "(packets)\n");
+ fprintf(fp, "(packets)");
+ fprintf(fp, "%s", _SL_);
if (prefix)
fprintf(fp, prefix);
fprintf(fp, "%llu", cfg->soft_add_expires_seconds);
fprintf(fp, "(sec), hard ");
fprintf(fp, "%llu", cfg->hard_add_expires_seconds);
- fprintf(fp, "(sec)\n");
+ fprintf(fp, "(sec)");
+ fprintf(fp, "%s", _SL_);
if (prefix)
fprintf(fp, prefix);
fprintf(fp, "%llu", cfg->soft_use_expires_seconds);
fprintf(fp, "(sec), hard ");
fprintf(fp, "%llu", cfg->hard_use_expires_seconds);
- fprintf(fp, "(sec)\n");
+ fprintf(fp, "(sec)");
+ fprintf(fp, "%s", _SL_);
}
if (cur) {
if (prefix)
fprintf(fp, prefix);
- fprintf(fp, "lifetime current:\n");
+ fprintf(fp, "lifetime current:");
+ fprintf(fp, "%s", _SL_);
if (prefix)
fprintf(fp, prefix);
fprintf(fp, " ");
fprintf(fp, "%llu(bytes), ", cur->bytes);
- fprintf(fp, "%llu(packets)\n", cur->packets);
+ fprintf(fp, "%llu(packets)", cur->packets);
+ fprintf(fp, "%s", _SL_);
+
if (prefix)
fprintf(fp, prefix);
fprintf(fp, " ");
fprintf(fp, "add %s ", strxf_time(cur->add_time));
fprintf(fp, "use %s", strxf_time(cur->use_time));
- fprintf(fp, "\n");
+ fprintf(fp, "%s", _SL_);
}
}
sel->prefixlen_s);
memset(abuf, '\0', sizeof(abuf));
- fprintf(fp, "dst %s/%d", rt_addr_n2a(f, sizeof(sel->daddr),
+ fprintf(fp, "dst %s/%d ", rt_addr_n2a(f, sizeof(sel->daddr),
&sel->daddr, abuf, sizeof(abuf)),
sel->prefixlen_d);
- fprintf(fp, "\n");
-
- if (prefix)
- fprintf(fp, prefix);
- fprintf(fp, "\t");
-
- fprintf(fp, "upspec proto %u ", sel->proto);
- fprintf(fp, "sport %u dport %u ", sel->sport, sel->dport);
+ if (sel->proto)
+ fprintf(fp, "proto %s ", strxf_proto(sel->proto));
+ if (sel->sport)
+ fprintf(fp, "sport %u ", ntohs(sel->sport));
+ if (sel->dport)
+ fprintf(fp, "dport %u ", ntohs(sel->dport));
if (sel->ifindex > 0) {
char buf[IF_NAMESIZE];
if (show_stats > 0)
fprintf(fp, "uid %u", sel->user);
- fprintf(fp, "\n");
+
+ fprintf(fp, "%s", _SL_);
}
-static void xfrm_algo_print(struct xfrm_algo *algo, FILE *fp,
+static void xfrm_algo_print(struct xfrm_algo *algo, int type, FILE *fp,
const char *prefix)
{
int len;
if (prefix)
fprintf(fp, prefix);
- fprintf(fp, "%s", algo->alg_name);
+ fprintf(fp, "%s ", strxf_algotype(type));
+ fprintf(fp, "%s ", algo->alg_name);
+ fprintf(fp, "0x");
len = algo->alg_key_len / 8;
- for (i = 0; i < len; i ++) {
- if (i % 4 == 0)
- fprintf(fp, " ");
- fprintf(fp, "%x", algo->alg_key[i]);
- }
+ for (i = 0; i < len; i ++)
+ fprintf(fp, "%.2x", (unsigned char)algo->alg_key[i]);
- fprintf(fp, "\n");
+ if (show_stats > 0)
+ fprintf(fp, " (%d bits)", algo->alg_key_len);
+
+ fprintf(fp, "%s", _SL_);
}
static const char *strxf_mask(__u32 mask)
xfrm_id_info_print(&tmpl->saddr, &tmpl->id, tmpl->mode,
tmpl->reqid, family, fp, prefix);
- fprintf(fp, prefix);
+ if (prefix)
+ fprintf(fp, prefix);
fprintf(fp, "\t");
- fprintf(fp, "level ");
switch (tmpl->optional) {
case 0:
- fprintf(fp, "required");
+ if (show_stats > 0)
+ fprintf(fp, "level required ");
break;
case 1:
- fprintf(fp, "use");
+ fprintf(fp, "level use ");
break;
default:
- fprintf(fp, "%d", tmpl->optional);
+ fprintf(fp, "level %d ", tmpl->optional);
break;
}
- fprintf(fp, " ");
if (show_stats > 0) {
fprintf(fp, "share %s ", strxf_share(tmpl->share));
fprintf(fp, "algo-mask:");
- fprintf(fp, "E=%s, ", strxf_mask(tmpl->ealgos));
- fprintf(fp, "A=%s, ", strxf_mask(tmpl->aalgos));
- fprintf(fp, "C=%s", strxf_mask(tmpl->calgos));
+ fprintf(fp, "%s=%s, ",
+ strxf_algotype(XFRMA_ALG_CRYPT),
+ strxf_mask(tmpl->ealgos));
+ fprintf(fp, "%s=%s, ",
+ strxf_algotype(XFRMA_ALG_AUTH),
+ strxf_mask(tmpl->aalgos));
+ fprintf(fp, "%s=%s",
+ strxf_algotype(XFRMA_ALG_COMP),
+ strxf_mask(tmpl->calgos));
}
- fprintf(fp, "\n");
+ fprintf(fp, "%s", _SL_);
}
}
switch (type) {
case XFRMA_ALG_CRYPT:
- if (prefix)
- fprintf(fp, prefix);
- xfrm_algo_print((struct xfrm_algo *)data, fp, "algo E ");
- break;
case XFRMA_ALG_AUTH:
- if (prefix)
- fprintf(fp, prefix);
- xfrm_algo_print((struct xfrm_algo *)data, fp, "algo A ");
- break;
case XFRMA_ALG_COMP:
- if (prefix)
- fprintf(fp, prefix);
- xfrm_algo_print((struct xfrm_algo *)data, fp, "algo C ");
+ xfrm_algo_print((struct xfrm_algo *)data, type, fp,
+ prefix);
break;
case XFRMA_ENCAP:
if (prefix)
fprintf(fp, prefix);
/* XXX */
- fprintf(fp, "encap: (not implemented yet!)\n");
+ fprintf(fp, "encap (not implemented yet!)");
+ fprintf(fp, "%s", _SL_);
break;
case XFRMA_TMPL:
{
default:
if (prefix)
fprintf(fp, prefix);
- fprintf(fp, "unknown rta_type: %u\n", type);
+ fprintf(fp, "%u (unknown rta_type)", type);
+ fprintf(fp, "%s", _SL_);
break;
}
}
}
int xfrm_id_parse(xfrm_address_t *saddr, struct xfrm_id *id, __u16 *family,
- int *argcp, char ***argvp)
+ int loose, int *argcp, char ***argvp)
{
int argc = *argcp;
char **argv = *argvp;
proto = pp->p_proto;
else {
if (get_u8(&proto, *argv, 0))
- invarg("\"PROTO\" is invalid", *argv);
+ invarg("\"XFRM_PROTO\" is invalid", *argv);
}
switch (proto) {
id->proto = proto;
break;
default:
- invarg("\"PROTO\" is unsuppored proto", *argv);
+ invarg("\"XFRM_PROTO\" is unsuppored proto", *argv);
}
filter.id_proto_mask = XFRM_FILTER_MASK_FULL;
if (src.family && dst.family && (src.family != dst.family))
invarg("the same address family is required between \"SADDR\" and \"DADDR\"", *argv);
- if (proto == 0)
- missarg("PROTO");
+ if (loose == 0 && proto == 0)
+ missarg("PROTO");
if (argc == *argcp)
missarg("ID");
{
int argc = *argcp;
char **argv = *argvp;
- __u8 upspec;
while (1) {
if (strcmp(*argv, "proto") == 0) {
+ __u8 upspec;
+
NEXT_ARG();
if (strcmp(*argv, "any") == 0)
upspec = pp->p_proto;
else {
if (get_u8(&upspec, *argv, 0))
- invarg("\"UPSPEC\" is invalid", *argv);
+ invarg("\"PROTO\" is invalid", *argv);
}
}
sel->proto = upspec;
char **argv = *argvp;
inet_prefix dst;
inet_prefix src;
+ char *upspecp = NULL;
memset(&dst, 0, sizeof(dst));
memset(&src, 0, sizeof(src));
filter.sel_dst_mask = dst.bitlen;
- } else if (strcmp(*argv, "upspec") == 0) {
- NEXT_ARG();
-
- xfrm_selector_upspec_parse(sel, &argc, &argv);
-
} else if (strcmp(*argv, "dev") == 0) {
int ifindex;
filter.sel_dev_mask = XFRM_FILTER_MASK_FULL;
} else {
- PREV_ARG(); /* back track */
- break;
+ if (upspecp) {
+ PREV_ARG(); /* back track */
+ break;
+ } else {
+ upspecp = *argv;
+ xfrm_selector_upspec_parse(sel, &argc, &argv);
+ }
}
if (!NEXT_ARG_OK())
int do_xfrm_state(int argc, char **argv);
int do_xfrm_policy(int argc, char **argv);
+int xfrm_algotype_getbyname(char *name);
+const char *strxf_algotype(int type);
const char *strxf_flags(__u8 flags);
const char *strxf_share(__u8 share);
const char *strxf_proto(__u8 proto);
void xfrm_xfrma_print(struct rtattr *tb[], int ntb, __u16 family,
FILE *fp, const char *prefix);
int xfrm_id_parse(xfrm_address_t *saddr, struct xfrm_id *id, __u16 *family,
- int *argcp, char ***argvp);
+ int loose, int *argcp, char ***argvp);
int xfrm_mode_parse(__u8 *mode, int *argcp, char ***argvp);
int xfrm_reqid_parse(__u32 *reqid, int *argcp, char ***argvp);
int xfrm_selector_parse(struct xfrm_selector *sel, int *argcp, char ***argvp);
static void usage(void)
{
- fprintf(stderr, "Usage: ip xfrm policy { add | update } dir DIR sel SELECTOR [ index INDEX ] \n");
+ fprintf(stderr, "Usage: ip xfrm policy { add | update } dir DIR SELECTOR [ index INDEX ] \n");
fprintf(stderr, " [ action ACTION ] [ priority PRIORITY ] [ LIMIT-LIST ] [ TMPL-LIST ]\n");
- fprintf(stderr, "Usage: ip xfrm policy { delete | get } dir DIR [ sel SELECTOR | index INDEX ]\n");
- fprintf(stderr, "Usage: ip xfrm policy { flush | list } [ dir DIR ] [ sel SELECTOR ]\n");
+ fprintf(stderr, "Usage: ip xfrm policy { delete | get } dir DIR [ SELECTOR | index INDEX ]\n");
+ fprintf(stderr, "Usage: ip xfrm policy { flush | list } [ dir DIR ] [ SELECTOR ]\n");
fprintf(stderr, " [ index INDEX ] [ action ACTION ] [ priority PRIORITY ]\n");
fprintf(stderr, "DIR := [ in | out | fwd ]\n");
- fprintf(stderr, "SELECTOR := src ADDR[/PLEN] dst ADDR[/PLEN] [ upspec UPSPEC ] [ dev DEV ]\n");
+ fprintf(stderr, "SELECTOR := src ADDR[/PLEN] dst ADDR[/PLEN] [ UPSPEC ] [ dev DEV ]\n");
fprintf(stderr, "UPSPEC := proto PROTO [ sport PORT ] [ dport PORT ]\n");
else if (strcmp(*argv, "use") == 0)
tmpl->optional = 1;
else
- invarg("\"level\" value is invalid\n", *argv);
+ invarg("\"LEVEL\" is invalid\n", *argv);
} else {
if (idp) {
}
idp = *argv;
xfrm_id_parse(&tmpl->saddr, &tmpl->id, &tmpl->family,
- &argc, &argv);
+ 0, &argc, &argv);
if (preferred_family == AF_UNSPEC)
preferred_family = tmpl->family;
}
char buf[RTA_BUF_SIZE];
} req;
char *dirp = NULL;
+ char *selp = NULL;
char tmpls_buf[XFRM_TMPLS_BUF_SIZE];
int tmpls_len = 0;
filter.dir_mask = XFRM_FILTER_MASK_FULL;
- } else if (strcmp(*argv, "sel") == 0) {
- NEXT_ARG();
- xfrm_selector_parse(&req.xpinfo.sel, &argc, &argv);
- if (preferred_family == AF_UNSPEC)
- preferred_family = req.xpinfo.sel.family;
-
} else if (strcmp(*argv, "index") == 0) {
NEXT_ARG();
if (get_u32(&req.xpinfo.index, *argv, 0))
xfrm_tmpl_parse(tmpl, &argc, &argv);
tmpls_len += sizeof(*tmpl);
- } else
- invarg("unknown", *argv);
+ } else {
+ if (selp)
+ duparg("unknown", *argv);
+ selp = *argv;
+
+ xfrm_selector_parse(&req.xpinfo.sel, &argc, &argv);
+ if (preferred_family == AF_UNSPEC)
+ preferred_family = req.xpinfo.sel.family;
+ }
argc--; argv++;
}
if (n->nlmsg_type == XFRM_MSG_DELPOLICY)
fprintf(fp, "Deleted ");
- fprintf(fp, "sel ");
xfrm_selector_print(&xpinfo->sel, preferred_family, fp, NULL);
fprintf(fp, "\t");
}
fprintf(fp, " ");
- fprintf(fp, "action ");
switch (xpinfo->action) {
case XFRM_POLICY_ALLOW:
- fprintf(fp, "allow");
+ if (show_stats > 0)
+ fprintf(fp, "action allow ");
break;
case XFRM_POLICY_BLOCK:
- fprintf(fp, "block");
+ fprintf(fp, "action block ");
break;
default:
- fprintf(fp, "%d", xpinfo->action);
+ fprintf(fp, "action %d ", xpinfo->action);
break;
}
- fprintf(fp, " ");
- fprintf(fp, "index %u ", xpinfo->index);
+ if (show_stats)
+ fprintf(fp, "index %u ", xpinfo->index);
fprintf(fp, "priority %u ", xpinfo->priority);
if (show_stats > 0) {
fprintf(fp, "share %s ", strxf_share(xpinfo->share));
fprintf(fp, "flags 0x%s", strxf_flags(xpinfo->flags));
}
- fprintf(fp, "\n");
+ fprintf(fp, "%s", _SL_);
if (show_stats > 0)
xfrm_lifetime_print(&xpinfo->lft, &xpinfo->curlft, fp, "\t");
xfrm_xfrma_print(tb, ntb, xpinfo->sel.family, fp, "\t");
+ if (oneline)
+ fprintf(fp, "\n");
+
return 0;
}
NEXT_ARG();
xfrm_policy_dir_parse(&req.xpid.dir, &argc, &argv);
- } else if (strcmp(*argv, "sel") == 0) {
- if (selp)
- duparg("sel", *argv);
- selp = *argv;
-
- NEXT_ARG();
- xfrm_selector_parse(&req.xpid.sel, &argc, &argv);
- if (preferred_family == AF_UNSPEC)
- preferred_family = req.xpid.sel.family;
-
} else if (strcmp(*argv, "index") == 0) {
if (indexp)
duparg("index", *argv);
if (get_u32(&req.xpid.index, *argv, 0))
invarg("\"INDEX\" is invalid", *argv);
- } else
- invarg("unknown", *argv);
+ } else {
+ if (selp)
+ invarg("unknown", *argv);
+ selp = *argv;
+
+ xfrm_selector_parse(&req.xpid.sel, &argc, &argv);
+ if (preferred_family == AF_UNSPEC)
+ preferred_family = req.xpid.sel.family;
+
+ }
argc--; argv++;
}
static int xfrm_policy_list_or_flush(int argc, char **argv, int flush)
{
+ char *selp = NULL;
struct rtnl_handle rth;
if (argc > 0)
filter.dir_mask = XFRM_FILTER_MASK_FULL;
- } else if (strcmp(*argv, "sel") == 0) {
- NEXT_ARG();
- xfrm_selector_parse(&filter.xpinfo.sel, &argc, &argv);
- if (preferred_family == AF_UNSPEC)
- preferred_family = filter.xpinfo.sel.family;
-
} else if (strcmp(*argv, "index") == 0) {
NEXT_ARG();
if (get_u32(&filter.xpinfo.index, *argv, 0))
else if (strcmp(*argv, "block") == 0)
filter.xpinfo.action = XFRM_POLICY_BLOCK;
else
- invarg("\"action\" value is invalid\n", *argv);
+ invarg("\"ACTION\" is invalid\n", *argv);
filter.action_mask = XFRM_FILTER_MASK_FULL;
filter.priority_mask = XFRM_FILTER_MASK_FULL;
- } else
- invarg("unknown", *argv);
+ } else {
+ if (selp)
+ invarg("unknown", *argv);
+ selp = *argv;
+
+ xfrm_selector_parse(&filter.xpinfo.sel, &argc, &argv);
+ if (preferred_family == AF_UNSPEC)
+ preferred_family = filter.xpinfo.sel.family;
+
+ }
argc--; argv++;
}
fprintf(stderr, "XFRM_PROTO := [ ");
fprintf(stderr, "%s | ", strxf_proto(IPPROTO_ESP));
fprintf(stderr, "%s | ", strxf_proto(IPPROTO_AH));
- fprintf(stderr, "%s", strxf_proto(IPPROTO_COMP));
- fprintf(stderr, " ]\n");
+ fprintf(stderr, "%s ", strxf_proto(IPPROTO_COMP));
+ fprintf(stderr, "]\n");
//fprintf(stderr, "SPI - security parameter index(default=0)\n");
fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] [ flag FLAG ]\n");
fprintf(stderr, "FLAG := [ noecn ]\n");
- fprintf(stderr, "ALGO-LIST := [ ALGO-LIST ] | [ algo ALGO ]\n");
+ fprintf(stderr, "ALGO-LIST := [ ALGO-LIST ] | [ ALGO ]\n");
fprintf(stderr, "ALGO := ALGO_TYPE ALGO_NAME ALGO_KEY\n");
- fprintf(stderr, "ALGO_TYPE := [ E | A | C ]\n");
+ fprintf(stderr, "ALGO_TYPE := [ ");
+ fprintf(stderr, "%s | ", strxf_algotype(XFRMA_ALG_CRYPT));
+ fprintf(stderr, "%s | ", strxf_algotype(XFRMA_ALG_AUTH));
+ fprintf(stderr, "%s ", strxf_algotype(XFRMA_ALG_COMP));
+ fprintf(stderr, "]\n");
+
//fprintf(stderr, "ALGO_NAME - algorithm name\n");
//fprintf(stderr, "ALGO_KEY - algorithm key\n");
char *name, char *key, int max)
{
int len;
+ int slen = strlen(key);
#if 1
/* XXX: verifying both name and key is required! */
strncpy(alg->alg_name, name, sizeof(alg->alg_name));
- if (strncmp(key, "0x", 2) == 0) {
+ if (slen > 2 && strncmp(key, "0x", 2) == 0) {
/*
* XXX: fix me!!
*/
- __u64 val = 0;
- char *p = (char *)&val;
+ union {
+ __u64 x;
+ unsigned char p[8];
+ } val;
+
+ memset(&val, 0, sizeof(val));
- if (get_u64(&val, key, 16))
+ if (get_u64(&val.x, key, 16))
invarg("\"ALGOKEY\" is invalid", key);
- len = (strlen(key) - 2) / 2;
+ len = (slen - 2) / 2;
if (len > sizeof(val))
invarg("\"ALGOKEY\" is invalid: too large", key);
if (len > 0) {
- int index = sizeof(val) - len;
+ int i;
+
if (len > max)
invarg("\"ALGOKEY\" makes buffer overflow\n", key);
-
- memcpy(alg->alg_key, &p[index], len);
+ for (i = sizeof(val.p) - 1; i >= 0; i--) {
+ int j = sizeof(val.p) - 1 - i;
+ alg->alg_key[j] = val.p[i];
+ }
}
} else {
- len = strlen(key);
+ len = slen;
if (len > 0) {
if (len > max)
invarg("\"ALGOKEY\" makes buffer overflow\n", key);
req.xsinfo.lft.hard_packet_limit = XFRM_INF;
while (argc > 0) {
- if (strcmp(*argv, "algo") == 0) {
- struct {
- struct xfrm_algo alg;
- char buf[XFRM_ALGO_KEY_BUF_SIZE];
- } alg;
- int len;
- enum xfrm_attr_type_t type;
- char *name;
- char *key;
-
- NEXT_ARG();
-
- if (strcmp(*argv, "E") == 0) {
- if (ealgop)
- duparg("ALGOTYPE", *argv);
- ealgop = *argv;
- type = XFRMA_ALG_CRYPT;
- } else if (strcmp(*argv, "A") == 0) {
- if (aalgop)
- duparg("ALGOTYPE", *argv);
- aalgop = *argv;
- type = XFRMA_ALG_AUTH;
-
- } else if (strcmp(*argv, "C") == 0) {
- if (calgop)
- duparg("ALGOTYPE", *argv);
- calgop = *argv;
- type = XFRMA_ALG_COMP;
- } else
- invarg("\"ALGOTYPE\" is invalid\n", *argv);
-
- if (!NEXT_ARG_OK())
- missarg("ALGONAME");
- NEXT_ARG();
- name = *argv;
-
- if (!NEXT_ARG_OK())
- missarg("ALGOKEY");
- NEXT_ARG();
- key = *argv;
-
- memset(&alg, 0, sizeof(alg));
-
- xfrm_algo_parse((void *)&alg, type, name, key, sizeof(alg.buf));
- len = sizeof(struct xfrm_algo) + alg.alg.alg_key_len;
-
- addattr_l(&req.n, sizeof(req.buf), type,
- (void *)&alg, len);
-
- } else if (strcmp(*argv, "mode") == 0) {
+ if (strcmp(*argv, "mode") == 0) {
NEXT_ARG();
xfrm_mode_parse(&req.xsinfo.mode, &argc, &argv);
} else if (strcmp(*argv, "reqid") == 0) {
} else if (strcmp(*argv, "sel") == 0) {
NEXT_ARG();
xfrm_selector_parse(&req.xsinfo.sel, &argc, &argv);
-
} else if (strcmp(*argv, "limit") == 0) {
NEXT_ARG();
xfrm_lifetime_cfg_parse(&req.xsinfo.lft, &argc, &argv);
} else {
- if (idp)
- invarg("unknown", *argv);
- idp = *argv;
-
- /* ID */
- xfrm_id_parse(&req.xsinfo.saddr, &req.xsinfo.id,
- &req.xsinfo.family, &argc, &argv);
- if (preferred_family == AF_UNSPEC)
- preferred_family = req.xsinfo.family;
+ /* try to assume ALGO */
+ int type = xfrm_algotype_getbyname(*argv);
+ switch (type) {
+ case XFRMA_ALG_CRYPT:
+ case XFRMA_ALG_AUTH:
+ case XFRMA_ALG_COMP:
+ {
+ /* ALGO */
+ struct {
+ struct xfrm_algo alg;
+ char buf[XFRM_ALGO_KEY_BUF_SIZE];
+ } alg;
+ int len;
+ char *name;
+ char *key;
+
+ switch (type) {
+ case XFRMA_ALG_CRYPT:
+ if (ealgop)
+ duparg("ALGOTYPE", *argv);
+ ealgop = *argv;
+ break;
+ case XFRMA_ALG_AUTH:
+ if (aalgop)
+ duparg("ALGOTYPE", *argv);
+ aalgop = *argv;
+ break;
+ case XFRMA_ALG_COMP:
+ if (calgop)
+ duparg("ALGOTYPE", *argv);
+ calgop = *argv;
+ break;
+ default:
+ /* not reached */
+ invarg("\"ALGOTYPE\" is invalid\n", *argv);
+ }
+
+ if (!NEXT_ARG_OK())
+ missarg("ALGONAME");
+ NEXT_ARG();
+ name = *argv;
+
+ if (!NEXT_ARG_OK())
+ missarg("ALGOKEY");
+ NEXT_ARG();
+ key = *argv;
+
+ memset(&alg, 0, sizeof(alg));
+
+ xfrm_algo_parse((void *)&alg, type, name, key,
+ sizeof(alg.buf));
+ len = sizeof(struct xfrm_algo) + alg.alg.alg_key_len;
+
+ addattr_l(&req.n, sizeof(req.buf), type,
+ (void *)&alg, len);
+ break;
+ }
+ default:
+ /* try to assume ID */
+ if (idp)
+ invarg("unknown", *argv);
+ idp = *argv;
+
+ /* ID */
+ xfrm_id_parse(&req.xsinfo.saddr, &req.xsinfo.id,
+ &req.xsinfo.family, 0, &argc, &argv);
+ if (preferred_family == AF_UNSPEC)
+ preferred_family = req.xsinfo.family;
+ }
}
argc--; argv++;
}
if (req.xsinfo.id.proto != IPPROTO_ESP &&
req.xsinfo.id.proto != IPPROTO_AH &&
req.xsinfo.id.proto != IPPROTO_COMP) {
- fprintf(stderr, "\"ALGO\" is invalid with proto=%d\n", req.xsinfo.id.proto);
+ fprintf(stderr, "\"ALGO\" is invalid with proto=%s\n", strxf_proto(req.xsinfo.id.proto));
exit(1);
}
} else {
if (req.xsinfo.id.proto == IPPROTO_ESP ||
req.xsinfo.id.proto == IPPROTO_AH ||
req.xsinfo.id.proto == IPPROTO_COMP) {
- fprintf(stderr, "\"ALGO\" is required with proto=%d\n", req.xsinfo.id.proto);
+ fprintf(stderr, "\"ALGO\" is required with proto=%s\n", strxf_proto(req.xsinfo.id.proto));
exit (1);
}
}
return 1;
}
+static int xfrm_selector_iszero(struct xfrm_selector *s)
+{
+ struct xfrm_selector s0;
+
+ memset(&s0, 0, sizeof(s0));
+
+ return (memcmp(&s0, s, sizeof(s0)) == 0);
+}
+
int xfrm_state_print(struct sockaddr_nl *who, struct nlmsghdr *n, void *arg)
{
FILE *fp = (FILE*)arg;
xsinfo->reqid, xsinfo->family, fp, NULL);
fprintf(fp, "\t");
- if (show_stats > 0) {
+ fprintf(fp, "replay-window %d ", xsinfo->replay_window);
+ if (show_stats > 0)
fprintf(fp, "seq 0x%08u ", xsinfo->seq);
- fprintf(fp, "replay-window %d ", xsinfo->replay_window);
- }
- fprintf(fp, "flag 0x%s", strxf_flags(xsinfo->flags));
- if (show_stats > 0) {
- if (xsinfo->flags) {
- fprintf(fp, "(");
- if (xsinfo->flags & XFRM_STATE_NOECN)
- fprintf(fp, "noecn");
- fprintf(fp, ")");
+ if (xsinfo->flags) {
+ fprintf(fp, "flag 0x%s", strxf_flags(xsinfo->flags));
+ if (show_stats > 0) {
+ if (xsinfo->flags) {
+ fprintf(fp, "(");
+ if (xsinfo->flags & XFRM_STATE_NOECN)
+ fprintf(fp, "noecn");
+ fprintf(fp, ")");
+ }
}
}
- fprintf(fp, "\n");
+ fprintf(fp, "%s", _SL_);
xfrm_xfrma_print(tb, ntb, xsinfo->family, fp, "\t");
- if (show_stats > 0) {
- fprintf(fp, "\tsel\n");
- xfrm_selector_print(&xsinfo->sel, xsinfo->family, fp, "\t ");
- }
+ if (!xfrm_selector_iszero(&xsinfo->sel))
+ xfrm_selector_print(&xsinfo->sel, xsinfo->family, fp, "\tsel ");
if (show_stats > 0) {
xfrm_lifetime_print(&xsinfo->lft, &xsinfo->curlft, fp, "\t");
xfrm_stats_print(&xsinfo->stats, fp, "\t");
}
+ if (oneline)
+ fprintf(fp, "\n");
+
return 0;
}
/* ID */
memset(&id, 0, sizeof(id));
- xfrm_id_parse(&ignore_saddr, &id, &req.xsid.family,
+ xfrm_id_parse(&ignore_saddr, &id, &req.xsid.family, 0,
&argc, &argv);
memcpy(&req.xsid.daddr, &id.daddr, sizeof(req.xsid.daddr));
idp = *argv;
/* ID */
- xfrm_id_parse(&filter.xsinfo.saddr,
- &filter.xsinfo.id,
- &filter.xsinfo.family, &argc, &argv);
+ xfrm_id_parse(&filter.xsinfo.saddr, &filter.xsinfo.id,
+ &filter.xsinfo.family, 1, &argc, &argv);
if (preferred_family == AF_UNSPEC)
preferred_family = filter.xsinfo.family;
}