]> git.proxmox.com Git - mirror_iproute2.git/blob - ip/xfrm_monitor.c
Remove trailing whitespace
[mirror_iproute2.git] / ip / xfrm_monitor.c
1 /* $USAGI: $ */
2
3 /*
4 * Copyright (C)2005 USAGI/WIDE Project
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA
19 */
20 /*
21 * based on ipmonitor.c
22 */
23 /*
24 * Authors:
25 * Masahide NAKAMURA @USAGI
26 */
27
28 #include <stdio.h>
29 #include <stdlib.h>
30 #include <string.h>
31 #include <linux/xfrm.h>
32 #include "utils.h"
33 #include "xfrm.h"
34 #include "ip_common.h"
35
36 static void usage(void) __attribute__((noreturn));
37
38 static void usage(void)
39 {
40 fprintf(stderr, "Usage: ip xfrm monitor [ all | LISTofOBJECTS ]\n");
41 exit(-1);
42 }
43
44 static int xfrm_acquire_print(const struct sockaddr_nl *who,
45 struct nlmsghdr *n, void *arg)
46 {
47 FILE *fp = (FILE*)arg;
48 struct xfrm_user_acquire *xacq = NLMSG_DATA(n);
49 int len = n->nlmsg_len;
50 struct rtattr * tb[XFRMA_MAX+1];
51 __u16 family;
52
53 if (n->nlmsg_type != XFRM_MSG_ACQUIRE) {
54 fprintf(stderr, "Not an acquire: %08x %08x %08x\n",
55 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
56 return 0;
57 }
58
59 len -= NLMSG_LENGTH(sizeof(*xacq));
60 if (len < 0) {
61 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
62 return -1;
63 }
64
65 parse_rtattr(tb, XFRMA_MAX, XFRMACQ_RTA(xacq), len);
66
67 family = xacq->sel.family;
68 if (family == AF_UNSPEC)
69 family = xacq->policy.sel.family;
70 if (family == AF_UNSPEC)
71 family = preferred_family;
72
73 fprintf(fp, "acquire ");
74
75 fprintf(fp, "proto %s ", strxf_xfrmproto(xacq->id.proto));
76 if (show_stats > 0 || xacq->id.spi) {
77 __u32 spi = ntohl(xacq->id.spi);
78 fprintf(fp, "spi 0x%08x", spi);
79 if (show_stats > 0)
80 fprintf(fp, "(%u)", spi);
81 fprintf(fp, " ");
82 }
83 fprintf(fp, "%s", _SL_);
84
85 xfrm_selector_print(&xacq->sel, family, fp, " sel ");
86
87 xfrm_policy_info_print(&xacq->policy, tb, fp, " ", " policy ");
88
89 if (show_stats > 0)
90 fprintf(fp, " seq 0x%08u ", xacq->seq);
91 if (show_stats > 0) {
92 fprintf(fp, "%s-mask %s ",
93 strxf_algotype(XFRMA_ALG_CRYPT),
94 strxf_mask32(xacq->ealgos));
95 fprintf(fp, "%s-mask %s ",
96 strxf_algotype(XFRMA_ALG_AUTH),
97 strxf_mask32(xacq->aalgos));
98 fprintf(fp, "%s-mask %s",
99 strxf_algotype(XFRMA_ALG_COMP),
100 strxf_mask32(xacq->calgos));
101 }
102 fprintf(fp, "%s", _SL_);
103
104 if (oneline)
105 fprintf(fp, "\n");
106 fflush(fp);
107
108 return 0;
109 }
110
111 static int xfrm_report_print(const struct sockaddr_nl *who,
112 struct nlmsghdr *n, void *arg)
113 {
114 FILE *fp = (FILE*)arg;
115 struct xfrm_user_report *xrep = NLMSG_DATA(n);
116 int len = n->nlmsg_len;
117 struct rtattr * tb[XFRMA_MAX+1];
118 __u16 family;
119
120 if (n->nlmsg_type != XFRM_MSG_REPORT) {
121 fprintf(stderr, "Not a report: %08x %08x %08x\n",
122 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
123 return 0;
124 }
125
126 len -= NLMSG_LENGTH(sizeof(*xrep));
127 if (len < 0) {
128 fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
129 return -1;
130 }
131
132 family = xrep->sel.family;
133 if (family == AF_UNSPEC)
134 family = preferred_family;
135
136 fprintf(fp, "report ");
137
138 fprintf(fp, "proto %s ", strxf_xfrmproto(xrep->proto));
139 fprintf(fp, "%s", _SL_);
140
141 xfrm_selector_print(&xrep->sel, family, fp, " sel ");
142
143 parse_rtattr(tb, XFRMA_MAX, XFRMREP_RTA(xrep), len);
144
145 xfrm_xfrma_print(tb, family, fp, " ");
146
147 if (oneline)
148 fprintf(fp, "\n");
149
150 return 0;
151 }
152
153 static int xfrm_accept_msg(const struct sockaddr_nl *who,
154 struct nlmsghdr *n, void *arg)
155 {
156 FILE *fp = (FILE*)arg;
157
158 if (timestamp)
159 print_timestamp(fp);
160
161 if (n->nlmsg_type == XFRM_MSG_NEWSA ||
162 n->nlmsg_type == XFRM_MSG_DELSA ||
163 n->nlmsg_type == XFRM_MSG_UPDSA ||
164 n->nlmsg_type == XFRM_MSG_EXPIRE) {
165 xfrm_state_print(who, n, arg);
166 return 0;
167 }
168 if (n->nlmsg_type == XFRM_MSG_NEWPOLICY ||
169 n->nlmsg_type == XFRM_MSG_DELPOLICY ||
170 n->nlmsg_type == XFRM_MSG_UPDPOLICY ||
171 n->nlmsg_type == XFRM_MSG_POLEXPIRE) {
172 xfrm_policy_print(who, n, arg);
173 return 0;
174 }
175
176 if (n->nlmsg_type == XFRM_MSG_ACQUIRE) {
177 xfrm_acquire_print(who, n, arg);
178 return 0;
179 }
180 if (n->nlmsg_type == XFRM_MSG_FLUSHSA) {
181 /* XXX: Todo: show proto in xfrm_usersa_flush */
182 fprintf(fp, "Flushed state\n");
183 return 0;
184 }
185 if (n->nlmsg_type == XFRM_MSG_FLUSHPOLICY) {
186 fprintf(fp, "Flushed policy\n");
187 return 0;
188 }
189 if (n->nlmsg_type == XFRM_MSG_REPORT) {
190 xfrm_report_print(who, n, arg);
191 return 0;
192 }
193 if (n->nlmsg_type != NLMSG_ERROR && n->nlmsg_type != NLMSG_NOOP &&
194 n->nlmsg_type != NLMSG_DONE) {
195 fprintf(fp, "Unknown message: %08d 0x%08x 0x%08x\n",
196 n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
197 }
198 return 0;
199 }
200
201 extern struct rtnl_handle rth;
202
203 int do_xfrm_monitor(int argc, char **argv)
204 {
205 char *file = NULL;
206 unsigned groups = ~((unsigned)0); /* XXX */
207 int lacquire=0;
208 int lexpire=0;
209 int lpolicy=0;
210 int lsa=0;
211 int lreport=0;
212
213 rtnl_close(&rth);
214
215 while (argc > 0) {
216 if (matches(*argv, "file") == 0) {
217 NEXT_ARG();
218 file = *argv;
219 } else if (matches(*argv, "acquire") == 0) {
220 lacquire=1;
221 groups = 0;
222 } else if (matches(*argv, "expire") == 0) {
223 lexpire=1;
224 groups = 0;
225 } else if (matches(*argv, "SA") == 0) {
226 lsa=1;
227 groups = 0;
228 } else if (matches(*argv, "policy") == 0) {
229 lpolicy=1;
230 groups = 0;
231 } else if (matches(*argv, "report") == 0) {
232 lreport=1;
233 groups = 0;
234 } else if (matches(*argv, "help") == 0) {
235 usage();
236 } else {
237 fprintf(stderr, "Argument \"%s\" is unknown, try \"ip xfrm monitor help\".\n", *argv);
238 exit(-1);
239 }
240 argc--; argv++;
241 }
242
243 if (lacquire)
244 groups |= XFRMGRP_ACQUIRE;
245 if (lexpire)
246 groups |= XFRMGRP_EXPIRE;
247 if (lsa)
248 groups |= XFRMGRP_SA;
249 if (lpolicy)
250 groups |= XFRMGRP_POLICY;
251 if (lreport)
252 groups |= XFRMGRP_REPORT;
253
254 if (file) {
255 FILE *fp;
256 fp = fopen(file, "r");
257 if (fp == NULL) {
258 perror("Cannot fopen");
259 exit(-1);
260 }
261 return rtnl_from_file(fp, xfrm_accept_msg, (void*)stdout);
262 }
263
264 //ll_init_map(&rth);
265
266 if (rtnl_open_byproto(&rth, groups, NETLINK_XFRM) < 0)
267 exit(1);
268
269 if (rtnl_listen(&rth, xfrm_accept_msg, (void*)stdout) < 0)
270 exit(2);
271
272 return 0;
273 }