key_debug.c

来自「eCos操作系统源码」· C语言 代码 · 共 763 行 · 第 1/2 页

C
763
字号
//==========================================================================////      src/sys/netkey/key_debug.c////==========================================================================//####BSDCOPYRIGHTBEGIN####//// -------------------------------------------//// Portions of this software may have been derived from OpenBSD, // FreeBSD or other sources, and are covered by the appropriate// copyright disclaimers included herein.//// Portions created by Red Hat are// Copyright (C) 2002 Red Hat, Inc. All Rights Reserved.//// -------------------------------------------////####BSDCOPYRIGHTEND####//==========================================================================/*	$KAME: key_debug.c,v 1.29 2001/08/16 14:25:41 itojun Exp $	*//* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#include <sys/types.h>#include <sys/param.h>#ifdef _KERNEL#include <sys/mbuf.h>#include <sys/queue.h>#endif#include <sys/socket.h>#include <net/route.h>#include <netkey/key_var.h>#include <netkey/key_debug.h>#include <netinet/in.h>#include <netinet6/ipsec.h>#ifndef _KERNEL#include <ctype.h>#include <stdio.h>#include <stdlib.h>#endif /* !_KERNEL */static void kdebug_sadb_prop __P((struct sadb_ext *));static void kdebug_sadb_identity __P((struct sadb_ext *));static void kdebug_sadb_supported __P((struct sadb_ext *));static void kdebug_sadb_lifetime __P((struct sadb_ext *));static void kdebug_sadb_sa __P((struct sadb_ext *));static void kdebug_sadb_address __P((struct sadb_ext *));static void kdebug_sadb_key __P((struct sadb_ext *));static void kdebug_sadb_x_sa2 __P((struct sadb_ext *));#ifdef _KERNELstatic void kdebug_secreplay __P((struct secreplay *));#endif#ifndef _KERNEL#define panic(param)	{ printf(param); exit(1); }#endif/* NOTE: host byte order *//* %%%: about struct sadb_msg */voidkdebug_sadb(base)	struct sadb_msg *base;{	struct sadb_ext *ext;	int tlen, extlen;	/* sanity check */	if (base == NULL)		panic("kdebug_sadb: NULL pointer was passed.\n");	printf("sadb_msg{ version=%u type=%u errno=%u satype=%u\n",	    base->sadb_msg_version, base->sadb_msg_type,	    base->sadb_msg_errno, base->sadb_msg_satype);	printf("  len=%u reserved=%u seq=%u pid=%u\n",	    base->sadb_msg_len, base->sadb_msg_reserved,	    base->sadb_msg_seq, base->sadb_msg_pid);	tlen = PFKEY_UNUNIT64(base->sadb_msg_len) - sizeof(struct sadb_msg);	ext = (struct sadb_ext *)((caddr_t)base + sizeof(struct sadb_msg));	while (tlen > 0) {		printf("sadb_ext{ len=%u type=%u }\n",		    ext->sadb_ext_len, ext->sadb_ext_type);		if (ext->sadb_ext_len == 0) {			printf("kdebug_sadb: invalid ext_len=0 was passed.\n");			return;		}		if (ext->sadb_ext_len > tlen) {			printf("kdebug_sadb: ext_len exceeds end of buffer.\n");			return;		}		switch (ext->sadb_ext_type) {		case SADB_EXT_SA:			kdebug_sadb_sa(ext);			break;		case SADB_EXT_LIFETIME_CURRENT:		case SADB_EXT_LIFETIME_HARD:		case SADB_EXT_LIFETIME_SOFT:			kdebug_sadb_lifetime(ext);			break;		case SADB_EXT_ADDRESS_SRC:		case SADB_EXT_ADDRESS_DST:		case SADB_EXT_ADDRESS_PROXY:			kdebug_sadb_address(ext);			break;		case SADB_EXT_KEY_AUTH:		case SADB_EXT_KEY_ENCRYPT:			kdebug_sadb_key(ext);			break;		case SADB_EXT_IDENTITY_SRC:		case SADB_EXT_IDENTITY_DST:			kdebug_sadb_identity(ext);			break;		case SADB_EXT_SENSITIVITY:			break;		case SADB_EXT_PROPOSAL:			kdebug_sadb_prop(ext);			break;		case SADB_EXT_SUPPORTED_AUTH:		case SADB_EXT_SUPPORTED_ENCRYPT:			kdebug_sadb_supported(ext);			break;		case SADB_EXT_SPIRANGE:		case SADB_X_EXT_KMPRIVATE:			break;		case SADB_X_EXT_POLICY:			kdebug_sadb_x_policy(ext);			break;		case SADB_X_EXT_SA2:			kdebug_sadb_x_sa2(ext);			break;		default:			printf("kdebug_sadb: invalid ext_type %u was passed.\n",			    ext->sadb_ext_type);			return;		}		extlen = PFKEY_UNUNIT64(ext->sadb_ext_len);		tlen -= extlen;		ext = (struct sadb_ext *)((caddr_t)ext + extlen);	}	return;}static voidkdebug_sadb_prop(ext)	struct sadb_ext *ext;{	struct sadb_prop *prop = (struct sadb_prop *)ext;	struct sadb_comb *comb;	int len;	/* sanity check */	if (ext == NULL)		panic("kdebug_sadb_prop: NULL pointer was passed.\n");	len = (PFKEY_UNUNIT64(prop->sadb_prop_len) - sizeof(*prop))		/ sizeof(*comb);	comb = (struct sadb_comb *)(prop + 1);	printf("sadb_prop{ replay=%u\n", prop->sadb_prop_replay);	while (len--) {		printf("sadb_comb{ auth=%u encrypt=%u "			"flags=0x%04x reserved=0x%08x\n",			comb->sadb_comb_auth, comb->sadb_comb_encrypt,			comb->sadb_comb_flags, comb->sadb_comb_reserved);		printf("  auth_minbits=%u auth_maxbits=%u "			"encrypt_minbits=%u encrypt_maxbits=%u\n",			comb->sadb_comb_auth_minbits,			comb->sadb_comb_auth_maxbits,			comb->sadb_comb_encrypt_minbits,			comb->sadb_comb_encrypt_maxbits);		printf("  soft_alloc=%u hard_alloc=%u "			"soft_bytes=%lu hard_bytes=%lu\n",			comb->sadb_comb_soft_allocations,			comb->sadb_comb_hard_allocations,			(unsigned long)comb->sadb_comb_soft_bytes,			(unsigned long)comb->sadb_comb_hard_bytes);		printf("  soft_alloc=%lu hard_alloc=%lu "			"soft_bytes=%lu hard_bytes=%lu }\n",			(unsigned long)comb->sadb_comb_soft_addtime,			(unsigned long)comb->sadb_comb_hard_addtime,			(unsigned long)comb->sadb_comb_soft_usetime,			(unsigned long)comb->sadb_comb_hard_usetime);		comb++;	}	printf("}\n");	return;}static voidkdebug_sadb_identity(ext)	struct sadb_ext *ext;{	struct sadb_ident *id = (struct sadb_ident *)ext;	int len;	/* sanity check */	if (ext == NULL)		panic("kdebug_sadb_identity: NULL pointer was passed.\n");	len = PFKEY_UNUNIT64(id->sadb_ident_len) - sizeof(*id);	printf("sadb_ident_%s{",	    id->sadb_ident_exttype == SADB_EXT_IDENTITY_SRC ? "src" : "dst");	switch (id->sadb_ident_type) {	default:		printf(" type=%d id=%lu",			id->sadb_ident_type, (u_long)id->sadb_ident_id);		if (len) {#ifdef _KERNEL			ipsec_hexdump((caddr_t)(id + 1), len); /*XXX cast ?*/#else			char *p, *ep;			printf("\n  str=\"");			p = (char *)(id + 1);			ep = p + len;			for (/*nothing*/; *p && p < ep; p++) {				if (isprint(*p))					printf("%c", *p & 0xff);				else					printf("\\%03o", *p & 0xff);			}#endif			printf("\"");		}		break;	}	printf(" }\n");	return;}static voidkdebug_sadb_supported(ext)	struct sadb_ext *ext;{	struct sadb_supported *sup = (struct sadb_supported *)ext;	struct sadb_alg *alg;	int len;	/* sanity check */	if (ext == NULL)		panic("kdebug_sadb_supported: NULL pointer was passed.\n");	len = (PFKEY_UNUNIT64(sup->sadb_supported_len) - sizeof(*sup))		/ sizeof(*alg);	alg = (struct sadb_alg *)(sup + 1);	printf("sadb_sup{\n");	while (len--) {		printf("  { id=%d ivlen=%d min=%d max=%d }\n",			alg->sadb_alg_id, alg->sadb_alg_ivlen,			alg->sadb_alg_minbits, alg->sadb_alg_maxbits);		alg++;	}	printf("}\n");	return;}static voidkdebug_sadb_lifetime(ext)	struct sadb_ext *ext;{	struct sadb_lifetime *lft = (struct sadb_lifetime *)ext;	/* sanity check */	if (ext == NULL)		printf("kdebug_sadb_lifetime: NULL pointer was passed.\n");	printf("sadb_lifetime{ alloc=%u, bytes=%u\n",		lft->sadb_lifetime_allocations,		(u_int32_t)lft->sadb_lifetime_bytes);	printf("  addtime=%u, usetime=%u }\n",		(u_int32_t)lft->sadb_lifetime_addtime,		(u_int32_t)lft->sadb_lifetime_usetime);	return;}static voidkdebug_sadb_sa(ext)	struct sadb_ext *ext;{	struct sadb_sa *sa = (struct sadb_sa *)ext;	/* sanity check */	if (ext == NULL)		panic("kdebug_sadb_sa: NULL pointer was passed.\n");	printf("sadb_sa{ spi=%u replay=%u state=%u\n",	    (u_int32_t)ntohl(sa->sadb_sa_spi), sa->sadb_sa_replay,	    sa->sadb_sa_state);	printf("  auth=%u encrypt=%u flags=0x%08x }\n",	    sa->sadb_sa_auth, sa->sadb_sa_encrypt, sa->sadb_sa_flags);	return;}static voidkdebug_sadb_address(ext)	struct sadb_ext *ext;{	struct sadb_address *addr = (struct sadb_address *)ext;	/* sanity check */	if (ext == NULL)		panic("kdebug_sadb_address: NULL pointer was passed.\n");	printf("sadb_address{ proto=%u prefixlen=%u reserved=0x%02x%02x }\n",	    addr->sadb_address_proto, addr->sadb_address_prefixlen,	    ((u_char *)&addr->sadb_address_reserved)[0],	    ((u_char *)&addr->sadb_address_reserved)[1]);	kdebug_sockaddr((struct sockaddr *)((caddr_t)ext + sizeof(*addr)));	return;}static voidkdebug_sadb_key(ext)	struct sadb_ext *ext;{	struct sadb_key *key = (struct sadb_key *)ext;	/* sanity check */	if (ext == NULL)		panic("kdebug_sadb_key: NULL pointer was passed.\n");	printf("sadb_key{ bits=%u reserved=%u\n",	    key->sadb_key_bits, key->sadb_key_reserved);	printf("  key=");	/* sanity check 2 */	if ((key->sadb_key_bits >> 3) >		(PFKEY_UNUNIT64(key->sadb_key_len) - sizeof(struct sadb_key))) {		printf("kdebug_sadb_key: key length mismatch, bit:%d len:%ld.\n",			key->sadb_key_bits >> 3,			(long)PFKEY_UNUNIT64(key->sadb_key_len) - sizeof(struct sadb_key));	}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?