1/* $USAGI: $ */
2
3/*
4 * Copyright (C)2004 USAGI/WIDE Project
5 *
6 * This program is free software; you can redistribute it and/or modify
7 * it under the terms of the GNU General Public License as published by
8 * the Free Software Foundation; either version 2 of the License, or
9 * (at your option) any later version.
10 *
11 * This program is distributed in the hope that it will be useful,
12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
14 * GNU General Public License for more details.
15 *
16 * You should have received a copy of the GNU General Public License
17 * along with this program; if not, write to the Free Software
18 * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
19 */
20/*
21 * based on iproute.c
22 */
23/*
24 * Authors:
25 *	Masahide NAKAMURA @USAGI
26 */
27
28#include <stdio.h>
29#include <stdlib.h>
30#include <string.h>
31#include <netdb.h>
32#include <linux/xfrm.h>
33#include "utils.h"
34#include "xfrm.h"
35#include "ip_common.h"
36
37//#define NLMSG_DELETEALL_BUF_SIZE (4096-512)
38#define NLMSG_DELETEALL_BUF_SIZE 8192
39
40/*
41 * Receiving buffer defines:
42 * nlmsg
43 *   data = struct xfrm_usersa_info
44 *   rtattr
45 *   rtattr
46 *   ... (max count of rtattr is XFRM_MAX+1
47 *
48 *  each rtattr data = struct xfrm_algo(dynamic size) or xfrm_address_t
49 */
50#define NLMSG_BUF_SIZE 4096
51#define RTA_BUF_SIZE 2048
52#define XFRM_ALGO_KEY_BUF_SIZE 512
53
54static void usage(void) __attribute__((noreturn));
55
56static void usage(void)
57{
58	fprintf(stderr, "Usage: ip xfrm state { add | update } ID [ ALGO-LIST ] [ mode MODE ]\n");
59	fprintf(stderr, "        [ reqid REQID ] [ seq SEQ ] [ replay-window SIZE ] [ flag FLAG-LIST ]\n");
60	fprintf(stderr, "        [ encap ENCAP ] [ sel SELECTOR ] [ LIMIT-LIST ]\n");
61	fprintf(stderr, "Usage: ip xfrm state allocspi ID [ mode MODE ] [ reqid REQID ] [ seq SEQ ]\n");
62	fprintf(stderr, "        [ min SPI max SPI ]\n");
63	fprintf(stderr, "Usage: ip xfrm state { delete | get } ID\n");
64	fprintf(stderr, "Usage: ip xfrm state { deleteall | list } [ ID ] [ mode MODE ] [ reqid REQID ]\n");
65	fprintf(stderr, "        [ flag FLAG_LIST ]\n");
66	fprintf(stderr, "Usage: ip xfrm state flush [ proto XFRM_PROTO ]\n");
67
68	fprintf(stderr, "ID := [ src ADDR ] [ dst ADDR ] [ proto XFRM_PROTO ] [ spi SPI ]\n");
69	//fprintf(stderr, "XFRM_PROTO := [ esp | ah | comp ]\n");
70	fprintf(stderr, "XFRM_PROTO := [ ");
71	fprintf(stderr, "%s | ", strxf_xfrmproto(IPPROTO_ESP));
72	fprintf(stderr, "%s | ", strxf_xfrmproto(IPPROTO_AH));
73	fprintf(stderr, "%s ", strxf_xfrmproto(IPPROTO_COMP));
74	fprintf(stderr, "]\n");
75
76	//fprintf(stderr, "SPI - security parameter index(default=0)\n");
77
78 	fprintf(stderr, "MODE := [ transport | tunnel ](default=transport)\n");
79 	//fprintf(stderr, "REQID - number(default=0)\n");
80
81	fprintf(stderr, "FLAG-LIST := [ FLAG-LIST ] FLAG\n");
82	fprintf(stderr, "FLAG := [ noecn | decap-dscp ]\n");
83
84        fprintf(stderr, "ENCAP := ENCAP-TYPE SPORT DPORT OADDR\n");
85        fprintf(stderr, "ENCAP-TYPE := espinudp | espinudp-nonike\n");
86
87	fprintf(stderr, "ALGO-LIST := [ ALGO-LIST ] | [ ALGO ]\n");
88	fprintf(stderr, "ALGO := ALGO_TYPE ALGO_NAME ALGO_KEY\n");
89	fprintf(stderr, "ALGO_TYPE := [ ");
90	fprintf(stderr, "%s | ", strxf_algotype(XFRMA_ALG_CRYPT));
91	fprintf(stderr, "%s | ", strxf_algotype(XFRMA_ALG_AUTH));
92	fprintf(stderr, "%s ", strxf_algotype(XFRMA_ALG_COMP));
93	fprintf(stderr, "]\n");
94
95	//fprintf(stderr, "ALGO_NAME - algorithm name\n");
96	//fprintf(stderr, "ALGO_KEY - algorithm key\n");
97
98	fprintf(stderr, "SELECTOR := src ADDR[/PLEN] dst ADDR[/PLEN] [ UPSPEC ] [ dev DEV ]\n");
99
100	fprintf(stderr, "UPSPEC := proto PROTO [ [ sport PORT ] [ dport PORT ] |\n");
101	fprintf(stderr, "                        [ type NUMBER ] [ code NUMBER ] ]\n");
102
103
104	//fprintf(stderr, "DEV - device name(default=none)\n");
105	fprintf(stderr, "LIMIT-LIST := [ LIMIT-LIST ] | [ limit LIMIT ]\n");
106	fprintf(stderr, "LIMIT := [ [time-soft|time-hard|time-use-soft|time-use-hard] SECONDS ] |\n");
107	fprintf(stderr, "         [ [byte-soft|byte-hard] SIZE ] | [ [packet-soft|packet-hard] COUNT ]\n");
108	exit(-1);
109}
110
111static int xfrm_algo_parse(struct xfrm_algo *alg, enum xfrm_attr_type_t type,
112			   char *name, char *key, int max)
113{
114	int len;
115	int slen = strlen(key);
116
117#if 0
118	/* XXX: verifying both name and key is required! */
119	fprintf(stderr, "warning: ALGONAME/ALGOKEY will send to kernel promiscuously!(verifying them isn't implemented yet)\n");
120#endif
121
122	strncpy(alg->alg_name, name, sizeof(alg->alg_name));
123
124	if (slen > 2 && strncmp(key, "0x", 2) == 0) {
125		/* split two chars "0x" from the top */
126		char *p = key + 2;
127		int plen = slen - 2;
128		int i;
129		int j;
130
131		/* Converting hexadecimal numbered string into real key;
132		 * Convert each two chars into one char(value). If number
133		 * of the length is odd, add zero on the top for rounding.
134		 */
135
136		/* calculate length of the converted values(real key) */
137		len = (plen + 1) / 2;
138		if (len > max)
139			invarg("\"ALGOKEY\" makes buffer overflow\n", key);
140
141		for (i = - (plen % 2), j = 0; j < len; i += 2, j++) {
142			char vbuf[3];
143			__u8 val;
144
145			vbuf[0] = i >= 0 ? p[i] : '0';
146			vbuf[1] = p[i + 1];
147			vbuf[2] = '\0';
148
149			if (get_u8(&val, vbuf, 16))
150				invarg("\"ALGOKEY\" is invalid", key);
151
152			alg->alg_key[j] = val;
153		}
154	} else {
155		len = slen;
156		if (len > 0) {
157			if (len > max)
158				invarg("\"ALGOKEY\" makes buffer overflow\n", key);
159
160			strncpy(alg->alg_key, key, len);
161		}
162	}
163
164	alg->alg_key_len = len * 8;
165
166	return 0;
167}
168
169static int xfrm_seq_parse(__u32 *seq, int *argcp, char ***argvp)
170{
171	int argc = *argcp;
172	char **argv = *argvp;
173
174	if (get_u32(seq, *argv, 0))
175		invarg("\"SEQ\" is invalid", *argv);
176
177	*seq = htonl(*seq);
178
179	*argcp = argc;
180	*argvp = argv;
181
182	return 0;
183}
184
185static int xfrm_state_flag_parse(__u8 *flags, int *argcp, char ***argvp)
186{
187	int argc = *argcp;
188	char **argv = *argvp;
189	int len = strlen(*argv);
190
191	if (len > 2 && strncmp(*argv, "0x", 2) == 0) {
192		__u8 val = 0;
193
194		if (get_u8(&val, *argv, 16))
195			invarg("\"FLAG\" is invalid", *argv);
196		*flags = val;
197	} else {
198		while (1) {
199			if (strcmp(*argv, "noecn") == 0)
200				*flags |= XFRM_STATE_NOECN;
201			else if (strcmp(*argv, "decap-dscp") == 0)
202				*flags |= XFRM_STATE_DECAP_DSCP;
203			else {
204				PREV_ARG(); /* back track */
205				break;
206			}
207
208			if (!NEXT_ARG_OK())
209				break;
210			NEXT_ARG();
211		}
212	}
213
214	filter.state_flags_mask = XFRM_FILTER_MASK_FULL;
215
216	*argcp = argc;
217	*argvp = argv;
218
219	return 0;
220}
221
222static int xfrm_state_modify(int cmd, unsigned flags, int argc, char **argv)
223{
224	struct rtnl_handle rth;
225	struct {
226		struct nlmsghdr 	n;
227		struct xfrm_usersa_info xsinfo;
228		char   			buf[RTA_BUF_SIZE];
229	} req;
230	char *idp = NULL;
231	char *ealgop = NULL;
232	char *aalgop = NULL;
233	char *calgop = NULL;
234
235	memset(&req, 0, sizeof(req));
236
237	req.n.nlmsg_len = NLMSG_LENGTH(sizeof(req.xsinfo));
238	req.n.nlmsg_flags = NLM_F_REQUEST|flags;
239	req.n.nlmsg_type = cmd;
240	req.xsinfo.family = preferred_family;
241
242	req.xsinfo.lft.soft_byte_limit = XFRM_INF;
243	req.xsinfo.lft.hard_byte_limit = XFRM_INF;
244	req.xsinfo.lft.soft_packet_limit = XFRM_INF;
245	req.xsinfo.lft.hard_packet_limit = XFRM_INF;
246
247	while (argc > 0) {
248		if (strcmp(*argv, "mode") == 0) {
249			NEXT_ARG();
250			xfrm_mode_parse(&req.xsinfo.mode, &argc, &argv);
251		} else if (strcmp(*argv, "reqid") == 0) {
252			NEXT_ARG();
253			xfrm_reqid_parse(&req.xsinfo.reqid, &argc, &argv);
254		} else if (strcmp(*argv, "seq") == 0) {
255			NEXT_ARG();
256			xfrm_seq_parse(&req.xsinfo.seq, &argc, &argv);
257		} else if (strcmp(*argv, "replay-window") == 0) {
258			NEXT_ARG();
259			if (get_u8(&req.xsinfo.replay_window, *argv, 0))
260				invarg("\"replay-window\" value is invalid", *argv);
261		} else if (strcmp(*argv, "flag") == 0) {
262			NEXT_ARG();
263			xfrm_state_flag_parse(&req.xsinfo.flags, &argc, &argv);
264		} else if (strcmp(*argv, "sel") == 0) {
265			NEXT_ARG();
266			xfrm_selector_parse(&req.xsinfo.sel, &argc, &argv);
267		} else if (strcmp(*argv, "limit") == 0) {
268			NEXT_ARG();
269			xfrm_lifetime_cfg_parse(&req.xsinfo.lft, &argc, &argv);
270		} else if (strcmp(*argv, "encap") == 0) {
271			struct xfrm_encap_tmpl encap;
272			inet_prefix oa;
273		        NEXT_ARG();
274			xfrm_encap_type_parse(&encap.encap_type, &argc, &argv);
275			NEXT_ARG();
276			if (get_u16(&encap.encap_sport, *argv, 0))
277				invarg("\"encap\" sport value is invalid", *argv);
278			encap.encap_sport = htons(encap.encap_sport);
279			NEXT_ARG();
280			if (get_u16(&encap.encap_dport, *argv, 0))
281				invarg("\"encap\" dport value is invalid", *argv);
282			encap.encap_dport = htons(encap.encap_dport);
283			NEXT_ARG();
284			get_addr(&oa, *argv, AF_UNSPEC);
285			memcpy(&encap.encap_oa, &oa.data, sizeof(encap.encap_oa));
286			addattr_l(&req.n, sizeof(req.buf), XFRMA_ENCAP,
287				  (void *)&encap, sizeof(encap));
288		} else {
289			/* try to assume ALGO */
290			int type = xfrm_algotype_getbyname(*argv);
291			switch (type) {
292			case XFRMA_ALG_CRYPT:
293			case XFRMA_ALG_AUTH:
294			case XFRMA_ALG_COMP:
295			{
296				/* ALGO */
297				struct {
298					struct xfrm_algo alg;
299					char buf[XFRM_ALGO_KEY_BUF_SIZE];
300				} alg;
301				int len;
302				char *name;
303				char *key;
304
305				switch (type) {
306				case XFRMA_ALG_CRYPT:
307					if (ealgop)
308						duparg("ALGOTYPE", *argv);
309					ealgop = *argv;
310					break;
311				case XFRMA_ALG_AUTH:
312					if (aalgop)
313						duparg("ALGOTYPE", *argv);
314					aalgop = *argv;
315					break;
316				case XFRMA_ALG_COMP:
317					if (calgop)
318						duparg("ALGOTYPE", *argv);
319					calgop = *argv;
320					break;
321				default:
322					/* not reached */
323					invarg("\"ALGOTYPE\" is invalid\n", *argv);
324				}
325
326				if (!NEXT_ARG_OK())
327					missarg("ALGONAME");
328				NEXT_ARG();
329				name = *argv;
330
331				if (!NEXT_ARG_OK())
332					missarg("ALGOKEY");
333				NEXT_ARG();
334				key = *argv;
335
336				memset(&alg, 0, sizeof(alg));
337
338				xfrm_algo_parse((void *)&alg, type, name, key,
339						sizeof(alg.buf));
340				len = sizeof(struct xfrm_algo) + alg.alg.alg_key_len;
341
342				addattr_l(&req.n, sizeof(req.buf), type,
343					  (void *)&alg, len);
344				break;
345			}
346			default:
347				/* try to assume ID */
348				if (idp)
349					invarg("unknown", *argv);
350				idp = *argv;
351
352				/* ID */
353				xfrm_id_parse(&req.xsinfo.saddr, &req.xsinfo.id,
354					      &req.xsinfo.family, 0, &argc, &argv);
355				if (preferred_family == AF_UNSPEC)
356					preferred_family = req.xsinfo.family;
357			}
358		}
359		argc--; argv++;
360	}
361
362	if (!idp) {
363		fprintf(stderr, "Not enough information: \"ID\" is required\n");
364		exit(1);
365	}
366
367	if (ealgop || aalgop || calgop) {
368		if (req.xsinfo.id.proto != IPPROTO_ESP &&
369		    req.xsinfo.id.proto != IPPROTO_AH &&
370		    req.xsinfo.id.proto != IPPROTO_COMP) {
371			fprintf(stderr, "\"ALGO\" is invalid with proto=%s\n", strxf_xfrmproto(req.xsinfo.id.proto));
372			exit(1);
373		}
374	} else {
375		if (req.xsinfo.id.proto == IPPROTO_ESP ||
376		    req.xsinfo.id.proto == IPPROTO_AH ||
377		    req.xsinfo.id.proto == IPPROTO_COMP) {
378			fprintf(stderr, "\"ALGO\" is required with proto=%s\n", strxf_xfrmproto(req.xsinfo.id.proto));
379			exit (1);
380		}
381	}
382
383	if (rtnl_open_byproto(&rth, 0, NETLINK_XFRM) < 0)
384		exit(1);
385
386	if (req.xsinfo.family == AF_UNSPEC)
387		req.xsinfo.family = AF_INET;
388
389	if (rtnl_talk(&rth, &req.n, 0, 0, NULL, NULL, NULL) < 0)
390		exit(2);
391
392	rtnl_close(&rth);
393
394	return 0;
395}
396
397static int xfrm_state_allocspi(int argc, char **argv)
398{
399	struct rtnl_handle rth;
400	struct {
401		struct nlmsghdr 	n;
402		struct xfrm_userspi_info xspi;
403		char   			buf[RTA_BUF_SIZE];
404	} req;
405	char *idp = NULL;
406	char *minp = NULL;
407	char *maxp = NULL;
408	char res_buf[NLMSG_BUF_SIZE];
409	struct nlmsghdr *res_n = (struct nlmsghdr *)res_buf;
410
411	memset(res_buf, 0, sizeof(res_buf));
412
413	memset(&req, 0, sizeof(req));
414
415	req.n.nlmsg_len = NLMSG_LENGTH(sizeof(req.xspi));
416	req.n.nlmsg_flags = NLM_F_REQUEST;
417	req.n.nlmsg_type = XFRM_MSG_ALLOCSPI;
418	req.xspi.info.family = preferred_family;
419
420#if 0
421	req.xsinfo.lft.soft_byte_limit = XFRM_INF;
422	req.xsinfo.lft.hard_byte_limit = XFRM_INF;
423	req.xsinfo.lft.soft_packet_limit = XFRM_INF;
424	req.xsinfo.lft.hard_packet_limit = XFRM_INF;
425#endif
426
427	while (argc > 0) {
428		if (strcmp(*argv, "mode") == 0) {
429			NEXT_ARG();
430			xfrm_mode_parse(&req.xspi.info.mode, &argc, &argv);
431		} else if (strcmp(*argv, "reqid") == 0) {
432			NEXT_ARG();
433			xfrm_reqid_parse(&req.xspi.info.reqid, &argc, &argv);
434		} else if (strcmp(*argv, "seq") == 0) {
435			NEXT_ARG();
436			xfrm_seq_parse(&req.xspi.info.seq, &argc, &argv);
437		} else if (strcmp(*argv, "min") == 0) {
438			if (minp)
439				duparg("min", *argv);
440			minp = *argv;
441
442			NEXT_ARG();
443
444			if (get_u32(&req.xspi.min, *argv, 0))
445				invarg("\"min\" value is invalid", *argv);
446		} else if (strcmp(*argv, "max") == 0) {
447			if (maxp)
448				duparg("max", *argv);
449			maxp = *argv;
450
451			NEXT_ARG();
452
453			if (get_u32(&req.xspi.max, *argv, 0))
454				invarg("\"max\" value is invalid", *argv);
455		} else {
456			/* try to assume ID */
457			if (idp)
458				invarg("unknown", *argv);
459			idp = *argv;
460
461			/* ID */
462			xfrm_id_parse(&req.xspi.info.saddr, &req.xspi.info.id,
463				      &req.xspi.info.family, 0, &argc, &argv);
464			if (req.xspi.info.id.spi) {
465				fprintf(stderr, "\"SPI\" must be zero\n");
466				exit(1);
467			}
468			if (preferred_family == AF_UNSPEC)
469				preferred_family = req.xspi.info.family;
470		}
471		argc--; argv++;
472	}
473
474	if (!idp) {
475		fprintf(stderr, "Not enough information: \"ID\" is required\n");
476		exit(1);
477	}
478
479	if (minp) {
480		if (!maxp) {
481			fprintf(stderr, "\"max\" is missing\n");
482			exit(1);
483		}
484		if (req.xspi.min > req.xspi.max) {
485			fprintf(stderr, "\"min\" valie is larger than \"max\" one\n");
486			exit(1);
487		}
488	} else {
489		if (maxp) {
490			fprintf(stderr, "\"min\" is missing\n");
491			exit(1);
492		}
493
494		/* XXX: Default value defined in PF_KEY;
495		 * See kernel's net/key/af_key.c(pfkey_getspi).
496		 */
497		req.xspi.min = 0x100;
498		req.xspi.max = 0x0fffffff;
499
500		/* XXX: IPCOMP spi is 16-bits;
501		 * See kernel's net/xfrm/xfrm_user(verify_userspi_info).
502		 */
503		if (req.xspi.info.id.proto == IPPROTO_COMP)
504			req.xspi.max = 0xffff;
505	}
506
507	if (rtnl_open_byproto(&rth, 0, NETLINK_XFRM) < 0)
508		exit(1);
509
510	if (req.xspi.info.family == AF_UNSPEC)
511		req.xspi.info.family = AF_INET;
512
513
514	if (rtnl_talk(&rth, &req.n, 0, 0, res_n, NULL, NULL) < 0)
515		exit(2);
516
517	if (xfrm_state_print(NULL, res_n, (void*)stdout) < 0) {
518		fprintf(stderr, "An error :-)\n");
519		exit(1);
520	}
521
522	rtnl_close(&rth);
523
524	return 0;
525}
526
527static int xfrm_state_filter_match(struct xfrm_usersa_info *xsinfo)
528{
529	if (!filter.use)
530		return 1;
531
532	if (filter.id_src_mask)
533		if (xfrm_addr_match(&xsinfo->saddr, &filter.xsinfo.saddr,
534				    filter.id_src_mask))
535			return 0;
536	if (filter.id_dst_mask)
537		if (xfrm_addr_match(&xsinfo->id.daddr, &filter.xsinfo.id.daddr,
538				    filter.id_dst_mask))
539			return 0;
540	if ((xsinfo->id.proto^filter.xsinfo.id.proto)&filter.id_proto_mask)
541		return 0;
542	if ((xsinfo->id.spi^filter.xsinfo.id.spi)&filter.id_spi_mask)
543		return 0;
544	if ((xsinfo->mode^filter.xsinfo.mode)&filter.mode_mask)
545		return 0;
546	if ((xsinfo->reqid^filter.xsinfo.reqid)&filter.reqid_mask)
547		return 0;
548	if (filter.state_flags_mask)
549		if ((xsinfo->flags & filter.xsinfo.flags) == 0)
550			return 0;
551
552	return 1;
553}
554
555int xfrm_state_print(const struct sockaddr_nl *who, struct nlmsghdr *n,
556		     void *arg)
557{
558	FILE *fp = (FILE*)arg;
559	struct xfrm_usersa_info *xsinfo;
560	struct xfrm_user_expire *xexp;
561	int len = n->nlmsg_len;
562	struct rtattr * tb[XFRMA_MAX+1];
563	struct rtattr * rta;
564
565	if (n->nlmsg_type != XFRM_MSG_NEWSA &&
566	    n->nlmsg_type != XFRM_MSG_DELSA &&
567	    n->nlmsg_type != XFRM_MSG_EXPIRE) {
568		fprintf(stderr, "Not a state: %08x %08x %08x\n",
569			n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
570		return 0;
571	}
572
573	if (n->nlmsg_type == XFRM_MSG_EXPIRE) {
574		xexp = NLMSG_DATA(n);
575		xsinfo = &xexp->state;
576
577		len -= NLMSG_LENGTH(sizeof(*xexp));
578	} else {
579		xexp = NULL;
580		xsinfo = NLMSG_DATA(n);
581
582		len -= NLMSG_LENGTH(sizeof(*xsinfo));
583	}
584
585	if (len < 0) {
586		fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
587		return -1;
588	}
589
590	if (!xfrm_state_filter_match(xsinfo))
591		return 0;
592
593	if (n->nlmsg_type == XFRM_MSG_EXPIRE)
594		rta = XFRMEXP_RTA(xexp);
595	else
596		rta = XFRMS_RTA(xsinfo);
597
598	parse_rtattr(tb, XFRMA_MAX, rta, len);
599
600	if (n->nlmsg_type == XFRM_MSG_DELSA)
601		fprintf(fp, "Deleted ");
602	else if (n->nlmsg_type == XFRM_MSG_EXPIRE)
603		fprintf(fp, "Expired ");
604
605	xfrm_state_info_print(xsinfo, tb, fp, NULL, NULL);
606
607	if (n->nlmsg_type == XFRM_MSG_EXPIRE) {
608		fprintf(fp, "\t");
609		fprintf(fp, "hard %u", xexp->hard);
610		fprintf(fp, "%s", _SL_);
611	}
612
613	if (oneline)
614		fprintf(fp, "\n");
615
616	return 0;
617}
618
619static int xfrm_state_get_or_delete(int argc, char **argv, int delete)
620{
621	struct rtnl_handle rth;
622	struct {
623		struct nlmsghdr 	n;
624		struct xfrm_usersa_id	xsid;
625	} req;
626	struct xfrm_id id;
627	char *idp = NULL;
628
629	memset(&req, 0, sizeof(req));
630
631	req.n.nlmsg_len = NLMSG_LENGTH(sizeof(req.xsid));
632	req.n.nlmsg_flags = NLM_F_REQUEST;
633	req.n.nlmsg_type = delete ? XFRM_MSG_DELSA : XFRM_MSG_GETSA;
634	req.xsid.family = preferred_family;
635
636	while (argc > 0) {
637		/*
638		 * XXX: Source address is not used and ignore it to follow
639		 * XXX: a manner of setkey e.g. in the case of deleting/getting
640		 * XXX: message of IPsec SA.
641		 */
642		xfrm_address_t ignore_saddr;
643
644		if (idp)
645			invarg("unknown", *argv);
646		idp = *argv;
647
648		/* ID */
649		memset(&id, 0, sizeof(id));
650		xfrm_id_parse(&ignore_saddr, &id, &req.xsid.family, 0,
651			      &argc, &argv);
652
653		memcpy(&req.xsid.daddr, &id.daddr, sizeof(req.xsid.daddr));
654		req.xsid.spi = id.spi;
655		req.xsid.proto = id.proto;
656
657		argc--; argv++;
658	}
659
660	if (rtnl_open_byproto(&rth, 0, NETLINK_XFRM) < 0)
661		exit(1);
662
663	if (req.xsid.family == AF_UNSPEC)
664		req.xsid.family = AF_INET;
665
666	if (delete) {
667		if (rtnl_talk(&rth, &req.n, 0, 0, NULL, NULL, NULL) < 0)
668			exit(2);
669	} else {
670		char buf[NLMSG_BUF_SIZE];
671		struct nlmsghdr *res_n = (struct nlmsghdr *)buf;
672
673		memset(buf, 0, sizeof(buf));
674
675		if (rtnl_talk(&rth, &req.n, 0, 0, res_n, NULL, NULL) < 0)
676			exit(2);
677
678		if (xfrm_state_print(NULL, res_n, (void*)stdout) < 0) {
679			fprintf(stderr, "An error :-)\n");
680			exit(1);
681		}
682	}
683
684	rtnl_close(&rth);
685
686	return 0;
687}
688
689/*
690 * With an existing state of nlmsg, make new nlmsg for deleting the state
691 * and store it to buffer.
692 */
693static int xfrm_state_keep(const struct sockaddr_nl *who,
694			   struct nlmsghdr *n,
695			   void *arg)
696{
697	struct xfrm_buffer *xb = (struct xfrm_buffer *)arg;
698	struct rtnl_handle *rth = xb->rth;
699	struct xfrm_usersa_info *xsinfo = NLMSG_DATA(n);
700	int len = n->nlmsg_len;
701	struct nlmsghdr *new_n;
702	struct xfrm_usersa_id *xsid;
703
704	if (n->nlmsg_type != XFRM_MSG_NEWSA) {
705		fprintf(stderr, "Not a state: %08x %08x %08x\n",
706			n->nlmsg_len, n->nlmsg_type, n->nlmsg_flags);
707		return 0;
708	}
709
710	len -= NLMSG_LENGTH(sizeof(*xsinfo));
711	if (len < 0) {
712		fprintf(stderr, "BUG: wrong nlmsg len %d\n", len);
713		return -1;
714	}
715
716	if (!xfrm_state_filter_match(xsinfo))
717		return 0;
718
719	if (xb->offset > xb->size) {
720		fprintf(stderr, "State buffer overflow\n");
721		return -1;
722	}
723
724	new_n = (struct nlmsghdr *)(xb->buf + xb->offset);
725	new_n->nlmsg_len = NLMSG_LENGTH(sizeof(*xsid));
726	new_n->nlmsg_flags = NLM_F_REQUEST;
727	new_n->nlmsg_type = XFRM_MSG_DELSA;
728	new_n->nlmsg_seq = ++rth->seq;
729
730	xsid = NLMSG_DATA(new_n);
731	xsid->family = xsinfo->family;
732	memcpy(&xsid->daddr, &xsinfo->id.daddr, sizeof(xsid->daddr));
733	xsid->spi = xsinfo->id.spi;
734	xsid->proto = xsinfo->id.proto;
735
736	xb->offset += new_n->nlmsg_len;
737	xb->nlmsg_count ++;
738
739	return 0;
740}
741
742static int xfrm_state_list_or_deleteall(int argc, char **argv, int deleteall)
743{
744	char *idp = NULL;
745	struct rtnl_handle rth;
746
747	if(argc > 0)
748		filter.use = 1;
749	filter.xsinfo.family = preferred_family;
750
751	while (argc > 0) {
752		if (strcmp(*argv, "mode") == 0) {
753			NEXT_ARG();
754			xfrm_mode_parse(&filter.xsinfo.mode, &argc, &argv);
755
756			filter.mode_mask = XFRM_FILTER_MASK_FULL;
757
758		} else if (strcmp(*argv, "reqid") == 0) {
759			NEXT_ARG();
760			xfrm_reqid_parse(&filter.xsinfo.reqid, &argc, &argv);
761
762			filter.reqid_mask = XFRM_FILTER_MASK_FULL;
763
764		} else if (strcmp(*argv, "flag") == 0) {
765			NEXT_ARG();
766			xfrm_state_flag_parse(&filter.xsinfo.flags, &argc, &argv);
767
768			filter.state_flags_mask = XFRM_FILTER_MASK_FULL;
769
770		} else {
771			if (idp)
772				invarg("unknown", *argv);
773			idp = *argv;
774
775			/* ID */
776			xfrm_id_parse(&filter.xsinfo.saddr, &filter.xsinfo.id,
777				      &filter.xsinfo.family, 1, &argc, &argv);
778			if (preferred_family == AF_UNSPEC)
779				preferred_family = filter.xsinfo.family;
780		}
781		argc--; argv++;
782	}
783
784	if (rtnl_open_byproto(&rth, 0, NETLINK_XFRM) < 0)
785		exit(1);
786
787	if (deleteall) {
788		struct xfrm_buffer xb;
789		char buf[NLMSG_DELETEALL_BUF_SIZE];
790		int i;
791
792		xb.buf = buf;
793		xb.size = sizeof(buf);
794		xb.rth = &rth;
795
796		for (i = 0; ; i++) {
797			xb.offset = 0;
798			xb.nlmsg_count = 0;
799
800			if (show_stats > 1)
801				fprintf(stderr, "Delete-all round = %d\n", i);
802
803			if (rtnl_wilddump_request(&rth, preferred_family, XFRM_MSG_GETSA) < 0) {
804				perror("Cannot send dump request");
805				exit(1);
806			}
807
808			if (rtnl_dump_filter(&rth, xfrm_state_keep, &xb, NULL, NULL) < 0) {
809				fprintf(stderr, "Delete-all terminated\n");
810				exit(1);
811			}
812			if (xb.nlmsg_count == 0) {
813				if (show_stats > 1)
814					fprintf(stderr, "Delete-all completed\n");
815				break;
816			}
817
818			if (rtnl_send(&rth, xb.buf, xb.offset) < 0) {
819				perror("Failed to send delete-all request\n");
820				exit(1);
821			}
822			if (show_stats > 1)
823				fprintf(stderr, "Delete-all nlmsg count = %d\n", xb.nlmsg_count);
824
825			xb.offset = 0;
826			xb.nlmsg_count = 0;
827		}
828
829	} else {
830		if (rtnl_wilddump_request(&rth, preferred_family, XFRM_MSG_GETSA) < 0) {
831			perror("Cannot send dump request");
832			exit(1);
833		}
834
835		if (rtnl_dump_filter(&rth, xfrm_state_print, stdout, NULL, NULL) < 0) {
836			fprintf(stderr, "Dump terminated\n");
837			exit(1);
838		}
839	}
840
841	rtnl_close(&rth);
842
843	exit(0);
844}
845
846static int xfrm_state_flush(int argc, char **argv)
847{
848	struct rtnl_handle rth;
849	struct {
850		struct nlmsghdr			n;
851		struct xfrm_usersa_flush	xsf;
852	} req;
853	char *protop = NULL;
854
855	memset(&req, 0, sizeof(req));
856
857	req.n.nlmsg_len = NLMSG_LENGTH(sizeof(req.xsf));
858	req.n.nlmsg_flags = NLM_F_REQUEST;
859	req.n.nlmsg_type = XFRM_MSG_FLUSHSA;
860	req.xsf.proto = IPSEC_PROTO_ANY;
861
862	while (argc > 0) {
863		if (strcmp(*argv, "proto") == 0) {
864			int ret;
865
866			if (protop)
867				duparg("proto", *argv);
868			protop = *argv;
869
870			NEXT_ARG();
871
872			ret = xfrm_xfrmproto_getbyname(*argv);
873			if (ret < 0)
874				invarg("\"XFRM_PROTO\" is invalid", *argv);
875
876			req.xsf.proto = (__u8)ret;
877		} else
878			invarg("unknown", *argv);
879
880		argc--; argv++;
881	}
882
883	if (rtnl_open_byproto(&rth, 0, NETLINK_XFRM) < 0)
884		exit(1);
885
886	if (show_stats > 1)
887		fprintf(stderr, "Flush state proto=%s\n",
888			(req.xsf.proto == IPSEC_PROTO_ANY) ? "any" :
889			strxf_xfrmproto(req.xsf.proto));
890
891	if (rtnl_talk(&rth, &req.n, 0, 0, NULL, NULL, NULL) < 0)
892		exit(2);
893
894	rtnl_close(&rth);
895
896	return 0;
897}
898
899int do_xfrm_state(int argc, char **argv)
900{
901	if (argc < 1)
902		return xfrm_state_list_or_deleteall(0, NULL, 0);
903
904	if (matches(*argv, "add") == 0)
905		return xfrm_state_modify(XFRM_MSG_NEWSA, 0,
906					 argc-1, argv+1);
907	if (matches(*argv, "update") == 0)
908		return xfrm_state_modify(XFRM_MSG_UPDSA, 0,
909					 argc-1, argv+1);
910	if (matches(*argv, "allocspi") == 0)
911		return xfrm_state_allocspi(argc-1, argv+1);
912	if (matches(*argv, "delete") == 0)
913		return xfrm_state_get_or_delete(argc-1, argv+1, 1);
914	if (matches(*argv, "deleteall") == 0 || matches(*argv, "delall") == 0)
915		return xfrm_state_list_or_deleteall(argc-1, argv+1, 1);
916	if (matches(*argv, "list") == 0 || matches(*argv, "show") == 0
917	    || matches(*argv, "lst") == 0)
918		return xfrm_state_list_or_deleteall(argc-1, argv+1, 0);
919	if (matches(*argv, "get") == 0)
920		return xfrm_state_get_or_delete(argc-1, argv+1, 0);
921	if (matches(*argv, "flush") == 0)
922		return xfrm_state_flush(argc-1, argv+1);
923	if (matches(*argv, "help") == 0)
924		usage();
925	fprintf(stderr, "Command \"%s\" is unknown, try \"ip xfrm state help\".\n", *argv);
926	exit(-1);
927}
928