⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 eroute.c

📁 This a good VPN source
💻 C
📖 第 1 页 / 共 2 页
字号:
			break;		default:			fprintf(stderr, "%s: --transport-proto with either UDP or TCP must be specified if --src-port or --dst-port is used\n", program_name);			exit(1);		}        }	if (src_port_opt) {	     struct servent * ent = getservbyname(src_port_opt, 0);	     if (ent != 0) {		  src_port = ent->s_port;	     } else {		  src_port = strtoul(src_port_opt, &endptr, 0);		  if ((*endptr != '\0')		      || (src_port == 0 && endptr == src_port_opt)) {		       fprintf(stderr, "%s: Invalid character in --src-port parameter: %s\n",			       program_name, src_port_opt);		       exit (1);		  }		  if (src_port > 65535) {		       fprintf(stderr, "%s: --src-port parameter: %s must be in the range 0 to 65535 inclusive\n",			       program_name, src_port_opt);		  }		  src_port = htons(src_port);	     }	}	if (dst_port_opt) {	     struct servent * ent = getservbyname(dst_port_opt, 0);	     if (ent != 0) {		  dst_port = ent->s_port;	     } else {		  dst_port = strtoul(dst_port_opt, &endptr, 0);		  if ((*endptr != '\0')		      || (dst_port == 0 && endptr == dst_port_opt)) {		       fprintf(stderr, "%s: Invalid character in --dst-port parameter: %s\n",			       program_name, dst_port_opt);		       exit (1);		  }		  if (dst_port > 65535) {		       fprintf(stderr, "%s: --dst-port parameter: %s must be in the range 0 to 65535 inclusive\n",			       program_name, dst_port_opt);		  }		  dst_port = htons(dst_port);	     }	}	switch(action_type) {	case EMT_SETEROUTE:	case EMT_REPLACEROUTE:	case EMT_INEROUTE:		if(!(said_af_opt && edst_opt && spi_opt && proto_opt) && !(said_opt)) {			fprintf(stderr, "%s: add and addin options must have SA specified.\n",				program_name);			exit(1);		}	case EMT_DELEROUTE:		if(!src_opt) {			fprintf(stderr, "%s: Error -- %s option '--src' is required.\n",				program_name, (action_type == EMT_SETEROUTE) ? "add" : "del");			exit(1);		}		if(!dst_opt) {			fprintf(stderr, "%s: Error -- %s option '--dst' is required.\n",				program_name, (action_type == EMT_SETEROUTE) ? "add" : "del");			exit(1);		}	case EMT_CLREROUTE:		break;	default:		fprintf(stderr, "%s: exactly one of '--add', '--addin', '--replace', '--del' or '--clear' options must be specified.\n"			"Try %s --help' for usage information.\n",			program_name, program_name);		exit(1);	}	if((pfkey_sock = socket(PF_KEY, SOCK_RAW, PF_KEY_V2) ) < 0) {		fprintf(stderr, "%s: Trouble opening PF_KEY family socket with error: ",			program_name);		switch(errno) {		case ENOENT:			fprintf(stderr, "device does not exist.  See FreeS/WAN installation procedure.\n");			break;		case EACCES:			fprintf(stderr, "access denied.  ");			if(getuid() == 0) {				fprintf(stderr, "Check permissions.  Should be 600.\n");			} else {				fprintf(stderr, "You must be root to open this file.\n");			}			break;		case EUNATCH:			fprintf(stderr, "KLIPS not loaded.\n");			break;		case ENODEV:			fprintf(stderr, "KLIPS not loaded or enabled.\n");			break;		case EBUSY:			fprintf(stderr, "KLIPS is busy.  Most likely a serious internal error occured in a previous command.  Please report as much detail as possible to development team.\n");			break;		case EINVAL:			fprintf(stderr, "Invalid argument, KLIPS not loaded or check kernel log messages for specifics.\n");			break;		case ENOBUFS:		case ENOMEM:		case ENFILE:			fprintf(stderr, "No kernel memory to allocate socket.\n");			break;		case EMFILE:			fprintf(stderr, "Process file table overflow.\n");			break;		case ESOCKTNOSUPPORT:			fprintf(stderr, "Socket type not supported.\n");			break;		case EPROTONOSUPPORT:			fprintf(stderr, "Protocol version not supported.\n");			break;		case EAFNOSUPPORT:			fprintf(stderr, "KLIPS not loaded or enabled.\n");			break;		default:			fprintf(stderr, "Unknown file open error %d.  Please report as much detail as possible to development team.\n", errno);		}		exit(1);	}	if(debug) {		fprintf(stdout, "%s: DEBUG: PFKEYv2 socket successfully openned=%d.\n", program_name, pfkey_sock);	}	/* Build an SADB_X_ADDFLOW or SADB_X_DELFLOW message to send down. */	/* It needs <base, SA, address(SD), flow(SD), mask(SD)> minimum. */	pfkey_extensions_init(extensions);	if((error = pfkey_msg_hdr_build(&extensions[0],					(action_type == EMT_SETEROUTE					 || action_type == EMT_REPLACEROUTE					 || action_type == EMT_INEROUTE)					? SADB_X_ADDFLOW : SADB_X_DELFLOW,					proto2satype(said.proto),					0,					++pfkey_seq,					getpid()))) {		fprintf(stderr, "%s: Trouble building message header, error=%d.\n",			program_name, error);		pfkey_extensions_free(extensions);		exit(1);	}	if(debug) {		fprintf(stdout, "%s: DEBUG: pfkey_msg_hdr_build successfull.\n", program_name);	}	switch(action_type) {	case EMT_SETEROUTE:	case EMT_REPLACEROUTE:	case EMT_INEROUTE:	case EMT_CLREROUTE:		if((error = pfkey_sa_build(&extensions[SADB_EXT_SA],					   SADB_EXT_SA,					   said.spi, /* in network order */					   0,					   0,					   0,					   0,					   (action_type == EMT_CLREROUTE) ? SADB_X_SAFLAGS_CLEARFLOW : 0))) {			fprintf(stderr, "%s: Trouble building sa extension, error=%d.\n",				program_name, error);			pfkey_extensions_free(extensions);			exit(1);		}		if(debug) {			fprintf(stdout, "%s: DEBUG: pfkey_sa_build successful.\n", program_name);		}	default:		break;	}	switch(action_type) {	case EMT_SETEROUTE:	case EMT_REPLACEROUTE:	case EMT_INEROUTE:		anyaddr(said_af, &pfkey_address_s_ska);		if((error = pfkey_address_build(&extensions[SADB_EXT_ADDRESS_SRC],						SADB_EXT_ADDRESS_SRC,						0,						0,						sockaddrof(&pfkey_address_s_ska)))) {			addrtot(&pfkey_address_s_ska, 0, ipaddr_txt, sizeof(ipaddr_txt));			fprintf(stderr, "%s: Trouble building address_s extension (%s), error=%d.\n",				program_name, ipaddr_txt, error);			pfkey_extensions_free(extensions);			exit(1);		}		if(debug) {			fprintf(stdout, "%s: DEBUG: pfkey_address_build successful for src.\n", program_name);		}		if((error = pfkey_address_build(&extensions[SADB_EXT_ADDRESS_DST],						SADB_EXT_ADDRESS_DST,						0,						0,						sockaddrof(&said.dst)))) {			addrtot(&said.dst, 0, ipaddr_txt, sizeof(ipaddr_txt));			fprintf(stderr, "%s: Trouble building address_d extension (%s), error=%d.\n",				program_name, ipaddr_txt, error);			pfkey_extensions_free(extensions);			exit(1);		}		if(debug) {			fprintf(stdout, "%s: DEBUG: pfkey_address_build successful for dst.\n", program_name);		}	default:		break;	}		switch(action_type) {	case EMT_SETEROUTE:	case EMT_REPLACEROUTE:	case EMT_INEROUTE:	case EMT_DELEROUTE:		networkof(&s_subnet, &pfkey_address_sflow_ska); /* src flow */		add_port(eroute_af, &pfkey_address_sflow_ska, src_port);		if((error = pfkey_address_build(&extensions[SADB_X_EXT_ADDRESS_SRC_FLOW],						SADB_X_EXT_ADDRESS_SRC_FLOW,						0,						0,						sockaddrof(&pfkey_address_sflow_ska)))) {			addrtot(&pfkey_address_sflow_ska, 0, ipaddr_txt, sizeof(ipaddr_txt));			fprintf(stderr, "%s: Trouble building address_sflow extension (%s), error=%d.\n",				program_name, ipaddr_txt, error);			pfkey_extensions_free(extensions);			exit(1);		}		if(debug) {			fprintf(stdout, "%s: DEBUG: pfkey_address_build successful for src flow.\n", program_name);		}			networkof(&d_subnet, &pfkey_address_dflow_ska); /* dst flow */		add_port(eroute_af, &pfkey_address_dflow_ska, dst_port);		if((error = pfkey_address_build(&extensions[SADB_X_EXT_ADDRESS_DST_FLOW],						SADB_X_EXT_ADDRESS_DST_FLOW,						0,						0,						sockaddrof(&pfkey_address_dflow_ska)))) {			addrtot(&pfkey_address_dflow_ska, 0, ipaddr_txt, sizeof(ipaddr_txt));			fprintf(stderr, "%s: Trouble building address_dflow extension (%s), error=%d.\n",				program_name, ipaddr_txt, error);			pfkey_extensions_free(extensions);			exit(1);		}		if(debug) {			fprintf(stdout, "%s: DEBUG: pfkey_address_build successful for dst flow.\n", program_name);		}				maskof(&s_subnet, &pfkey_address_smask_ska); /* src mask */		add_port(eroute_af, &pfkey_address_smask_ska, src_port ? ~0:0);		if((error = pfkey_address_build(&extensions[SADB_X_EXT_ADDRESS_SRC_MASK],						SADB_X_EXT_ADDRESS_SRC_MASK,						0,						0,						sockaddrof(&pfkey_address_smask_ska)))) {			addrtot(&pfkey_address_smask_ska, 0, ipaddr_txt, sizeof(ipaddr_txt));			fprintf(stderr, "%s: Trouble building address_smask extension (%s), error=%d.\n",				program_name, ipaddr_txt, error);			pfkey_extensions_free(extensions);			exit(1);		}		if(debug) {			fprintf(stdout, "%s: DEBUG: pfkey_address_build successful for src mask.\n", program_name);		}				maskof(&d_subnet, &pfkey_address_dmask_ska); /* dst mask */		add_port(eroute_af, &pfkey_address_dmask_ska, dst_port ? ~0:0);		if((error = pfkey_address_build(&extensions[SADB_X_EXT_ADDRESS_DST_MASK],						SADB_X_EXT_ADDRESS_DST_MASK,						0,						0,						sockaddrof(&pfkey_address_dmask_ska)))) {			addrtot(&pfkey_address_dmask_ska, 0, ipaddr_txt, sizeof(ipaddr_txt));			fprintf(stderr, "%s: Trouble building address_dmask extension (%s), error=%d.\n",				program_name, ipaddr_txt, error);			pfkey_extensions_free(extensions);			exit(1);		}		if(debug) {			fprintf(stdout, "%s: DEBUG: pfkey_address_build successful for dst mask.\n", program_name);		}	}		if (transport_proto != 0) {		if ((error = pfkey_x_protocol_build(&extensions[SADB_X_EXT_PROTOCOL],						    transport_proto))) {			fprintf(stderr, "%s: Trouble building transport"				" protocol extension, error=%d.\n",				program_name, error);			exit(1);		}	}	if((error = pfkey_msg_build(&pfkey_msg, extensions, EXT_BITS_IN))) {		fprintf(stderr, "%s: Trouble building pfkey message, error=%d.\n",			program_name, error);		pfkey_extensions_free(extensions);		pfkey_msg_free(&pfkey_msg);		exit(1);	}	if(debug) {		fprintf(stdout, "%s: DEBUG: pfkey_msg_build successful.\n", program_name);	}	if((error = write(pfkey_sock,			  pfkey_msg,			  pfkey_msg->sadb_msg_len * IPSEC_PFKEYv2_ALIGN)) !=	   (ssize_t)(pfkey_msg->sadb_msg_len * IPSEC_PFKEYv2_ALIGN)) {		fprintf(stderr, "%s: pfkey write failed, returning %d with errno=%d.\n",			program_name, error, errno);		pfkey_extensions_free(extensions);		pfkey_msg_free(&pfkey_msg);		switch(errno) {		case EINVAL:			fprintf(stderr, "Invalid argument, check kernel log messages for specifics.\n");			break;		case ENXIO:			if((action_type == EMT_SETEROUTE) ||			   (action_type == EMT_REPLACEROUTE)) {				fprintf(stderr, "Invalid mask.\n");				break;			}			if(action_type == EMT_DELEROUTE) {				fprintf(stderr, "Mask not found.\n");				break;			}		case EFAULT:			if((action_type == EMT_SETEROUTE) ||			   (action_type == EMT_REPLACEROUTE)) {				fprintf(stderr, "Invalid address.\n");				break;			}			if(action_type == EMT_DELEROUTE) {				fprintf(stderr, "Address not found.\n");				break;			}		case EACCES:			fprintf(stderr, "access denied.  ");			if(getuid() == 0) {				fprintf(stderr, "Check permissions.  Should be 600.\n");			} else {				fprintf(stderr, "You must be root to open this file.\n");			}			break;		case EUNATCH:			fprintf(stderr, "KLIPS not loaded.\n");			break;		case EBUSY:			fprintf(stderr, "KLIPS is busy.  Most likely a serious internal error occured in a previous command.  Please report as much detail as possible to development team.\n");			break;		case ENODEV:			fprintf(stderr, "KLIPS not loaded or enabled.\n");			fprintf(stderr, "No device?!?\n");			break;		case ENOBUFS:			fprintf(stderr, "No kernel memory to allocate SA.\n");			break;		case ESOCKTNOSUPPORT:			fprintf(stderr, "Algorithm support not available in the kernel.  Please compile in support.\n");			break;		case EEXIST:			fprintf(stderr, "eroute already in use.  Delete old one first.\n");			break;		case ENOENT:			if((action_type == EMT_INEROUTE)) {				fprintf(stderr, "non-existant IPIP SA.\n");				break;			}			fprintf(stderr, "eroute doesn't exist.  Can't delete.\n");			break;		case ENOSPC:			fprintf(stderr, "no room in kernel SAref table.  Cannot process request.\n");			break;		case ESPIPE:			fprintf(stderr, "kernel SAref table internal error.  Cannot process request.\n");			break;		default:			fprintf(stderr, "Unknown socket write error %d.  Please report as much detail as possible to development team.\n", errno);		}/*		fprintf(stderr, "%s: socket write returned errno %d\n",		program_name, errno);*/		exit(1);	}	if(debug) {		fprintf(stdout, "%s: DEBUG: pfkey write successful.\n", program_name);	}	if(pfkey_msg) {		pfkey_extensions_free(extensions);		pfkey_msg_free(&pfkey_msg);	}	(void) close(pfkey_sock);  /* close the socket */	if(debug) {		fprintf(stdout, "%s: DEBUG: write ok\n", program_name);	}	exit(0);}/* * $Log: eroute.c,v $ * Revision 1.61  2004/12/10 12:38:29  paul * Renamed the stack names consistently to KLIPS and NETKEY * * Revision 1.60  2004/04/06 02:58:43  mcr * 	freeswan->openswan changes. * * Revision 1.59  2004/02/09 23:07:35  paul * better error for native 2.6 pfk_key for 'ipsec eroute' * * Revision 1.58  2003/12/05 16:44:12  mcr * 	patches to avoid ipsec_netlink.h, which has been obsolete for * 	some time now. * * Revision 1.57  2003/10/31 02:32:27  mcr * 	pulled up port-selector patches * * Revision 1.56.2.1  2003/09/21 14:00:26  mcr * 	pre-liminary X.509 patch - does not yet pass tests. * * Revision 1.56  2003/09/10 00:01:25  mcr * 	fixes for gcc 3.3 from Matthias Bethke <Matthias.Bethke@gmx.net> * * Revision 1.55  2003/01/30 02:33:07  rgb * * Added ENOSPC for no room in SAref table and ESPIPE for SAref internal error. * * Revision 1.54  2002/10/04 03:52:46  dhr * * gcc3 now enforces C restriction on placement of labels * * Revision 1.53  2002/09/20 05:02:15  rgb * Cleaned up pfkey_lib_debug usage. * * Revision 1.52  2002/07/23 02:58:58  rgb * Fixed "opening" speeling mistake. * * Revision 1.51  2002/04/24 07:55:32  mcr * 	#include patches and Makefiles for post-reorg compilation. * * Revision 1.50  2002/04/24 07:35:38  mcr * Moved from ./klips/utils/eroute.c,v * * Revision 1.49  2002/03/08 21:44:04  rgb * Update for all GNU-compliant --version strings. * * Revision 1.48  2002/02/15 19:54:11  rgb * Purged dead code. * * Revision 1.47  2001/11/09 01:42:36  rgb * Re-formatted usage text for clarity. * * Revision 1.46  2001/10/02 17:03:45  rgb * Check error return for all "tto*" calls and report errors.  This, in * conjuction with the fix to "tto*" will detect AF not set. * * Revision 1.45  2001/09/07 22:12:27  rgb * Added EAFNOSUPPORT error return explanation for KLIPS not loaded. * * Revision 1.44  2001/07/06 19:49:33  rgb * Renamed EMT_RPLACEROUTE to EMT_REPLACEROUTE for clarity and logical text * searching. * Added EMT_INEROUTE for supporting incoming policy checks. * Added inbound policy checking code for IPIP SAs. * * Revision 1.43  2001/06/15 05:02:05  rgb * Fixed error return messages and codes. * * Revision 1.42  2001/06/14 19:35:14  rgb * Update copyright date. * * Revision 1.41  2001/05/21 02:02:54  rgb * Eliminate 1-letter options. * * Revision 1.40  2001/05/16 04:39:57  rgb * Fix --label option to add to command name rather than replace it. * Fix 'print table' option to ignore --label and --debug options. * * Revision 1.39  2001/02/26 19:59:03  rgb * Added a number of missing ntohl() conversions for debug output. * Implement magic SAs %drop, %reject, %trap, %hold, %pass as part * of the new SPD and to support opportunistic. * Enforced spi > 0x100 requirement, now that pass uses a magic SA. * * * */

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -