* QC Tag: LA.UM.6.2.r1-06100-sdm660.0 Change-Id: I8209c81b5c05f618450248e88226d216935a8bcd Signed-off-by: Isaac Chen <isaacchen@isaacchen.cn>
1173 lines
47 KiB
C++
1173 lines
47 KiB
C++
/*
|
|
Copyright (c) 2013, The Linux Foundation. All rights reserved.
|
|
|
|
Redistribution and use in source and binary forms, with or without
|
|
modification, are permitted provided that the following conditions are
|
|
met:
|
|
* Redistributions of source code must retain the above copyright
|
|
notice, this list of conditions and the following disclaimer.
|
|
* Redistributions in binary form must reproduce the above
|
|
copyright notice, this list of conditions and the following
|
|
disclaimer in the documentation and/or other materials provided
|
|
with the distribution.
|
|
* Neither the name of The Linux Foundation nor the names of its
|
|
contributors may be used to endorse or promote products derived
|
|
from this software without specific prior written permission.
|
|
|
|
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
|
|
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
|
|
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
|
|
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
|
|
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
|
|
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
|
|
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
|
|
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
*/
|
|
/*!
|
|
@file
|
|
IPACM_Xml.cpp
|
|
|
|
@brief
|
|
This file implements the XML specific parsing functionality.
|
|
|
|
@Author
|
|
Skylar Chang/Shihuan Liu
|
|
*/
|
|
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <arpa/inet.h>
|
|
|
|
#include "IPACM_Xml.h"
|
|
#include "IPACM_Log.h"
|
|
#include "IPACM_Netlink.h"
|
|
|
|
static char* IPACM_read_content_element
|
|
(
|
|
xmlNode* element
|
|
);
|
|
|
|
static int32_t IPACM_util_icmp_string
|
|
(
|
|
const char* xml_str,
|
|
const char* str
|
|
);
|
|
|
|
static int ipacm_cfg_xml_parse_tree
|
|
(
|
|
xmlNode* xml_node,
|
|
IPACM_conf_t *config
|
|
);
|
|
|
|
static int IPACM_firewall_xml_parse_tree
|
|
(
|
|
xmlNode* xml_node,
|
|
IPACM_firewall_conf_t *config
|
|
);
|
|
|
|
/*Reads content (stored as child) of the element */
|
|
static char* IPACM_read_content_element
|
|
(
|
|
xmlNode* element
|
|
)
|
|
{
|
|
xmlNode* child_ptr;
|
|
|
|
for (child_ptr = element->children;
|
|
child_ptr != NULL;
|
|
child_ptr = child_ptr->next)
|
|
{
|
|
if (child_ptr->type == XML_TEXT_NODE)
|
|
{
|
|
return (char*)child_ptr->content;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* insensitive comparison of a libxml's string (xml_str) and a regular string (str)*/
|
|
static int32_t IPACM_util_icmp_string
|
|
(
|
|
const char* xml_str,
|
|
const char* str
|
|
)
|
|
{
|
|
int32_t ret = -1;
|
|
|
|
if (NULL != xml_str && NULL != str)
|
|
{
|
|
uint32_t len1 = strlen(str);
|
|
uint32_t len2 = strlen(xml_str);
|
|
/* If the lengths match, do the string comparison */
|
|
if (len1 == len2)
|
|
{
|
|
ret = strncasecmp(xml_str, str, len1);
|
|
}
|
|
}
|
|
|
|
return ret;
|
|
}
|
|
|
|
/* This function read IPACM XML and populate the IPA CM Cfg */
|
|
int ipacm_read_cfg_xml(char *xml_file, IPACM_conf_t *config)
|
|
{
|
|
xmlDocPtr doc = NULL;
|
|
xmlNode* root = NULL;
|
|
int ret_val = IPACM_SUCCESS;
|
|
|
|
/* Invoke the XML parser and obtain the parse tree */
|
|
doc = xmlReadFile(xml_file, "UTF-8", XML_PARSE_NOBLANKS);
|
|
if (doc == NULL) {
|
|
IPACMDBG_H("IPACM_xml_parse: libxml returned parse error!\n");
|
|
return IPACM_FAILURE;
|
|
}
|
|
|
|
/*Get the root of the tree*/
|
|
root = xmlDocGetRootElement(doc);
|
|
|
|
memset(config, 0, sizeof(IPACM_conf_t));
|
|
|
|
/* parse the xml tree returned by libxml */
|
|
ret_val = ipacm_cfg_xml_parse_tree(root, config);
|
|
|
|
if (ret_val != IPACM_SUCCESS)
|
|
{
|
|
IPACMDBG_H("IPACM_xml_parse: ipacm_cfg_xml_parse_tree returned parse error!\n");
|
|
}
|
|
|
|
/* Free up the libxml's parse tree */
|
|
xmlFreeDoc(doc);
|
|
|
|
return ret_val;
|
|
}
|
|
|
|
/* This function traverses the xml tree*/
|
|
static int ipacm_cfg_xml_parse_tree
|
|
(
|
|
xmlNode* xml_node,
|
|
IPACM_conf_t *config
|
|
)
|
|
{
|
|
int32_t ret_val = IPACM_SUCCESS;
|
|
int str_size;
|
|
char* content;
|
|
char content_buf[MAX_XML_STR_LEN];
|
|
|
|
if (NULL == xml_node)
|
|
return ret_val;
|
|
while ( xml_node != NULL &&
|
|
ret_val == IPACM_SUCCESS)
|
|
{
|
|
switch (xml_node->type)
|
|
{
|
|
case XML_ELEMENT_NODE:
|
|
{
|
|
if (IPACM_util_icmp_string((char*)xml_node->name, system_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, ODU_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, IPACMCFG_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, IPACMIFACECFG_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, IFACE_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, IPACMPRIVATESUBNETCFG_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, SUBNET_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, IPACMALG_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, ALG_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, IPACMNat_TAG) == 0 ||
|
|
IPACM_util_icmp_string((char*)xml_node->name, IP_PassthroughFlag_TAG) == 0)
|
|
{
|
|
if (0 == IPACM_util_icmp_string((char*)xml_node->name, IFACE_TAG))
|
|
{
|
|
/* increase iface entry number */
|
|
config->iface_config.num_iface_entries++;
|
|
}
|
|
|
|
if (0 == IPACM_util_icmp_string((char*)xml_node->name, SUBNET_TAG))
|
|
{
|
|
/* increase iface entry number */
|
|
config->private_subnet_config.num_subnet_entries++;
|
|
}
|
|
|
|
if (0 == IPACM_util_icmp_string((char*)xml_node->name, ALG_TAG))
|
|
{
|
|
/* increase iface entry number */
|
|
config->alg_config.num_alg_entries++;
|
|
}
|
|
/* go to child */
|
|
ret_val = ipacm_cfg_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, IP_PassthroughMode_TAG) == 0)
|
|
{
|
|
IPACMDBG_H("inside IP Passthrough\n");
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (atoi(content_buf))
|
|
{
|
|
config->ip_passthrough_mode = true;
|
|
IPACMDBG_H("Passthrough enable %d buf(%d)\n", config->ip_passthrough_mode, atoi(content_buf));
|
|
}
|
|
else
|
|
{
|
|
config->ip_passthrough_mode = false;
|
|
IPACMDBG_H("Passthrough enable %d buf(%d)\n", config->ip_passthrough_mode, atoi(content_buf));
|
|
}
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, ODUMODE_TAG) == 0)
|
|
{
|
|
IPACMDBG_H("inside ODU-XML\n");
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (0 == strncasecmp(content_buf, ODU_ROUTER_TAG, str_size))
|
|
{
|
|
config->router_mode_enable = true;
|
|
IPACMDBG_H("router-mode enable %d\n", config->router_mode_enable);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, ODU_BRIDGE_TAG, str_size))
|
|
{
|
|
config->router_mode_enable = false;
|
|
IPACMDBG_H("router-mode enable %d\n", config->router_mode_enable);
|
|
}
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, ODUEMBMS_OFFLOAD_TAG) == 0)
|
|
{
|
|
IPACMDBG_H("inside ODU-XML\n");
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (atoi(content_buf))
|
|
{
|
|
config->odu_embms_enable = true;
|
|
IPACMDBG_H("router-mode enable %d buf(%d)\n", config->odu_embms_enable, atoi(content_buf));
|
|
}
|
|
else
|
|
{
|
|
config->odu_embms_enable = false;
|
|
IPACMDBG_H("router-mode enable %d buf(%d)\n", config->odu_embms_enable, atoi(content_buf));
|
|
}
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, NAME_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
strlcpy(content_buf, content, MAX_XML_STR_LEN);
|
|
strlcpy(config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].iface_name, content_buf, IPA_IFACE_NAME_LEN);
|
|
IPACMDBG_H("Name %s\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].iface_name);
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, CATEGORY_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (0 == strncasecmp(content_buf, WANIF_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = WAN_IF;
|
|
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, LANIF_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = LAN_IF;
|
|
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, WLANIF_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = WLAN_IF;
|
|
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, VIRTUALIF_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = VIRTUAL_IF;
|
|
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, UNKNOWNIF_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = UNKNOWN_IF;
|
|
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, ETHIF_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = ETH_IF;
|
|
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, ODUIF_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = ODU_IF;
|
|
IPACMDBG("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
|
|
}
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, MODE_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (0 == strncasecmp(content_buf, IFACE_ROUTER_MODE_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode = ROUTER;
|
|
IPACMDBG_H("Iface mode %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, IFACE_BRIDGE_MODE_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode = BRIDGE;
|
|
IPACMDBG_H("Iface mode %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode);
|
|
}
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, WLAN_MODE_TAG) == 0)
|
|
{
|
|
IPACMDBG_H("Inside WLAN-XML\n");
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
|
|
if (0 == strncasecmp(content_buf, WLAN_FULL_MODE_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode = FULL;
|
|
IPACMDBG_H("Wlan-mode full(%d)\n",
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, WLAN_INTERNET_MODE_TAG, str_size))
|
|
{
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode = INTERNET;
|
|
config->num_wlan_guest_ap++;
|
|
IPACMDBG_H("Wlan-mode internet(%d)\n",
|
|
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode);
|
|
}
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, SUBNETADDRESS_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
content_buf[MAX_XML_STR_LEN-1] = '\0';
|
|
config->private_subnet_config.private_subnet_entries[config->private_subnet_config.num_subnet_entries - 1].subnet_addr
|
|
= ntohl(inet_addr(content_buf));
|
|
IPACMDBG_H("subnet_addr: %s \n", content_buf);
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, SUBNETMASK_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
content_buf[MAX_XML_STR_LEN-1] = '\0';
|
|
config->private_subnet_config.private_subnet_entries[config->private_subnet_config.num_subnet_entries - 1].subnet_mask
|
|
= ntohl(inet_addr(content_buf));
|
|
IPACMDBG_H("subnet_mask: %s \n", content_buf);
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, Protocol_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
content_buf[MAX_XML_STR_LEN-1] = '\0';
|
|
|
|
if (0 == strncasecmp(content_buf, TCP_PROTOCOL_TAG, str_size))
|
|
{
|
|
config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol = IPPROTO_TCP;
|
|
IPACMDBG_H("Protocol %s: %d\n",
|
|
content_buf, config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol);
|
|
}
|
|
else if (0 == strncasecmp(content_buf, UDP_PROTOCOL_TAG, str_size))
|
|
{
|
|
config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol = IPPROTO_UDP;
|
|
IPACMDBG_H("Protocol %s: %d\n",
|
|
content_buf, config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol);
|
|
}
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, Port_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].port
|
|
= atoi(content_buf);
|
|
IPACMDBG_H("port %d\n", config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].port);
|
|
}
|
|
}
|
|
else if (IPACM_util_icmp_string((char*)xml_node->name, NAT_MaxEntries_TAG) == 0)
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->nat_max_entries = atoi(content_buf);
|
|
IPACMDBG_H("Nat Table Max Entries %d\n", config->nat_max_entries);
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
/* go to sibling */
|
|
xml_node = xml_node->next;
|
|
} /* end while */
|
|
return ret_val;
|
|
}
|
|
|
|
/* This function read QCMAP CM Firewall XML and populate the QCMAP CM Cfg */
|
|
int IPACM_read_firewall_xml(char *xml_file, IPACM_firewall_conf_t *config)
|
|
{
|
|
xmlDocPtr doc = NULL;
|
|
xmlNode* root = NULL;
|
|
int ret_val;
|
|
|
|
IPACM_ASSERT(xml_file != NULL);
|
|
IPACM_ASSERT(config != NULL);
|
|
|
|
/* invoke the XML parser and obtain the parse tree */
|
|
doc = xmlReadFile(xml_file, "UTF-8", XML_PARSE_NOBLANKS);
|
|
if (doc == NULL) {
|
|
IPACMDBG_H("IPACM_xml_parse: libxml returned parse error\n");
|
|
return IPACM_FAILURE;
|
|
}
|
|
/*get the root of the tree*/
|
|
root = xmlDocGetRootElement(doc);
|
|
|
|
/* parse the xml tree returned by libxml*/
|
|
ret_val = IPACM_firewall_xml_parse_tree(root, config);
|
|
|
|
if (ret_val != IPACM_SUCCESS)
|
|
{
|
|
IPACMDBG_H("IPACM_xml_parse: ipacm_firewall_xml_parse_tree returned parse error!\n");
|
|
}
|
|
|
|
/* free the tree */
|
|
xmlFreeDoc(doc);
|
|
|
|
return ret_val;
|
|
}
|
|
|
|
|
|
/* This function traverses the firewall xml tree */
|
|
static int IPACM_firewall_xml_parse_tree
|
|
(
|
|
xmlNode* xml_node,
|
|
IPACM_firewall_conf_t *config
|
|
)
|
|
{
|
|
int mask_value_v6, mask_index;
|
|
int32_t ret_val = IPACM_SUCCESS;
|
|
char *content;
|
|
int str_size;
|
|
char content_buf[MAX_XML_STR_LEN];
|
|
struct in6_addr ip6_addr;
|
|
|
|
IPACM_ASSERT(config != NULL);
|
|
|
|
if (NULL == xml_node)
|
|
return ret_val;
|
|
|
|
while ( xml_node != NULL &&
|
|
ret_val == IPACM_SUCCESS)
|
|
{
|
|
switch (xml_node->type)
|
|
{
|
|
|
|
case XML_ELEMENT_NODE:
|
|
{
|
|
if (0 == IPACM_util_icmp_string((char*)xml_node->name, system_TAG) ||
|
|
0 == IPACM_util_icmp_string((char*)xml_node->name, MobileAPFirewallCfg_TAG) ||
|
|
0 == IPACM_util_icmp_string((char*)xml_node->name, Firewall_TAG) ||
|
|
0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallEnabled_TAG) ||
|
|
0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallPktsAllowed_TAG))
|
|
{
|
|
if (0 == IPACM_util_icmp_string((char*)xml_node->name, Firewall_TAG))
|
|
{
|
|
/* increase firewall entry num */
|
|
config->num_extd_firewall_entries++;
|
|
}
|
|
|
|
if (0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallPktsAllowed_TAG))
|
|
{
|
|
/* setup action of matched rules */
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (atoi(content_buf)==1)
|
|
{
|
|
config->rule_action_accept = true;
|
|
}
|
|
else
|
|
{
|
|
config->rule_action_accept = false;
|
|
}
|
|
IPACMDBG_H(" Allow traffic which matches rules ?:%d\n",config->rule_action_accept);
|
|
}
|
|
}
|
|
|
|
if (0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallEnabled_TAG))
|
|
{
|
|
/* setup if firewall enable or not */
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (atoi(content_buf)==1)
|
|
{
|
|
config->firewall_enable = true;
|
|
}
|
|
else
|
|
{
|
|
config->firewall_enable = false;
|
|
}
|
|
IPACMDBG_H(" Firewall Enable?:%d\n", config->firewall_enable);
|
|
}
|
|
}
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPFamily_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].ip_vsn
|
|
= (firewall_ip_version_enum)atoi(content_buf);
|
|
IPACMDBG_H("\n IP family type is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].ip_vsn);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4SourceAddress_TAG))
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_ADDR;
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4SourceIPAddress_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
content_buf[MAX_XML_STR_LEN-1] = '\0';
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.src_addr
|
|
= ntohl(inet_addr(content_buf));
|
|
IPACMDBG_H("IPv4 source address is: %s \n", content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4SourceSubnetMask_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
content_buf[MAX_XML_STR_LEN-1] = '\0';
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.src_addr_mask
|
|
= ntohl(inet_addr(content_buf));
|
|
IPACMDBG_H("IPv4 source subnet mask is: %s \n", content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4DestinationAddress_TAG))
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_ADDR;
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4DestinationIPAddress_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
content_buf[MAX_XML_STR_LEN-1] = '\0';
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.dst_addr
|
|
= ntohl(inet_addr(content_buf));
|
|
IPACMDBG_H("IPv4 destination address is: %s \n", content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4DestinationSubnetMask_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
content_buf[MAX_XML_STR_LEN-1] = '\0';
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.dst_addr_mask
|
|
= ntohl(inet_addr(content_buf));
|
|
IPACMDBG_H("IPv4 destination subnet mask is: %s \n", content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4TypeOfService_TAG))
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_TOS;
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TOSValue_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.tos
|
|
= atoi(content_buf);
|
|
IPACMDBG_H("\n IPV4 TOS val is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.tos);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TOSMask_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.tos
|
|
&= atoi(content_buf);
|
|
IPACMDBG_H("\n IPv4 TOS mask is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.tos);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4NextHeaderProtocol_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_PROTOCOL;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.protocol = atoi(content_buf);
|
|
IPACMDBG_H("\n IPv4 next header prot is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.protocol);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6SourceAddress_TAG))
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |=
|
|
IPA_FLT_SRC_ADDR;
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6SourceIPAddress_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
inet_pton(AF_INET6, content_buf, &ip6_addr);
|
|
memcpy(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr,
|
|
ip6_addr.s6_addr, IPACM_IPV6_ADDR_LEN * sizeof(uint8_t));
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[0]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[0]);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[1]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[1]);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[2]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[2]);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[3]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[3]);
|
|
|
|
IPACMDBG_H("\n ipv6 source addr is %d \n ",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[0]);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6SourcePrefix_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
mask_value_v6 = atoi(content_buf);
|
|
for (mask_index = 0; mask_index < 4; mask_index++)
|
|
{
|
|
if (mask_value_v6 >= 32)
|
|
{
|
|
mask_v6(32, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr_mask[mask_index]));
|
|
mask_value_v6 -= 32;
|
|
}
|
|
else
|
|
{
|
|
mask_v6(mask_value_v6, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr_mask[mask_index]));
|
|
mask_value_v6 = 0;
|
|
}
|
|
}
|
|
IPACMDBG_H("\n ipv6 source prefix is %d \n", atoi(content_buf));
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6DestinationAddress_TAG))
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |=
|
|
IPA_FLT_DST_ADDR;
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6DestinationIPAddress_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
inet_pton(AF_INET6, content_buf, &ip6_addr);
|
|
memcpy(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr,
|
|
ip6_addr.s6_addr, IPACM_IPV6_ADDR_LEN * sizeof(uint8_t));
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[0]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[0]);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[1]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[1]);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[2]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[2]);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[3]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[3]);
|
|
IPACMDBG_H("\n ipv6 dest addr is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[0]);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6DestinationPrefix_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
mask_value_v6 = atoi(content_buf);
|
|
for (mask_index = 0; mask_index < 4; mask_index++)
|
|
{
|
|
if (mask_value_v6 >= 32)
|
|
{
|
|
mask_v6(32, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr_mask[mask_index]));
|
|
mask_value_v6 -= 32;
|
|
}
|
|
else
|
|
{
|
|
mask_v6(mask_value_v6, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr_mask[mask_index]));
|
|
mask_value_v6 = 0;
|
|
}
|
|
}
|
|
IPACMDBG_H("\n ipv6 dest prefix is %d \n", atoi(content_buf));
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6TrafficClass_TAG))
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_TC;
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TrfClsValue_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.tc
|
|
= atoi(content_buf);
|
|
IPACMDBG_H("\n ipv6 trf class val is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.tc);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TrfClsMask_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.tc
|
|
&= atoi(content_buf);
|
|
IPACMDBG_H("\n ipv6 trf class mask is %d \n", atoi(content_buf));
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6NextHeaderProtocol_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_NEXT_HDR;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.next_hdr
|
|
= atoi(content_buf);
|
|
IPACMDBG_H("\n ipv6 next header protocol is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.next_hdr);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPSource_TAG))
|
|
{
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPSourcePort_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port
|
|
= atoi(content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPSourceRange_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if (atoi(content_buf) != 0)
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT_RANGE;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port + atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port = 0;
|
|
IPACMDBG_H("\n tcp source port from %d to %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo,
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi);
|
|
}
|
|
else
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT;
|
|
IPACMDBG_H("\n tcp source port= %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port);
|
|
}
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPDestination_TAG))
|
|
{
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPDestinationPort_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port
|
|
= atoi(content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPDestinationRange_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if(atoi(content_buf)!=0)
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT_RANGE;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port + atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port = 0;
|
|
IPACMDBG_H("\n tcp dest port from %d to %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo,
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi);
|
|
}
|
|
else
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT;
|
|
IPACMDBG_H("\n tcp dest port= %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port);
|
|
}
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPSource_TAG))
|
|
{
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPSourcePort_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port
|
|
= atoi(content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPSourceRange_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if(atoi(content_buf)!=0)
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT_RANGE;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port + atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port = 0;
|
|
IPACMDBG_H("\n udp source port from %d to %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo,
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi);
|
|
}
|
|
else
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT;
|
|
IPACMDBG_H("\n udp source port= %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port);
|
|
}
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPDestination_TAG))
|
|
{
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPDestinationPort_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port
|
|
= atoi(content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPDestinationRange_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if(atoi(content_buf)!=0)
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT_RANGE;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port + atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port = 0;
|
|
IPACMDBG_H("\n UDP dest port from %d to %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo,
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi);
|
|
}
|
|
else
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT;
|
|
IPACMDBG_H("\n UDP dest port= %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port);
|
|
}
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, ICMPType_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.type = atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_TYPE;
|
|
IPACMDBG_H("\n icmp type is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.type);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, ICMPCode_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.code = atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_CODE;
|
|
IPACMDBG_H("\n icmp code is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.code);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, ESPSPI_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.spi = atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SPI;
|
|
IPACMDBG_H("\n esp spi is %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.spi);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPSource_TAG))
|
|
{
|
|
/* go to child */
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPSourcePort_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content,str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port
|
|
= atoi(content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPSourceRange_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if(atoi(content_buf)!=0)
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT_RANGE;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port + atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port = 0;
|
|
IPACMDBG_H("\n tcp_udp source port from %d to %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo,
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi);
|
|
}
|
|
else
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT;
|
|
IPACMDBG_H("\n tcp_udp source port= %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port);
|
|
|
|
}
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPDestination_TAG))
|
|
{
|
|
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPDestinationPort_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port
|
|
= atoi(content_buf);
|
|
}
|
|
}
|
|
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPDestinationRange_TAG))
|
|
{
|
|
content = IPACM_read_content_element(xml_node);
|
|
if (content)
|
|
{
|
|
str_size = strlen(content);
|
|
memset(content_buf, 0, sizeof(content_buf));
|
|
memcpy(content_buf, (void *)content, str_size);
|
|
if(atoi(content_buf)!=0)
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT_RANGE;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port;
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi
|
|
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port + atoi(content_buf);
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port = 0;
|
|
IPACMDBG_H("\n tcp_udp dest port from %d to %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo,
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi);
|
|
}
|
|
else
|
|
{
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT;
|
|
IPACMDBG_H("\n tcp_udp dest port= %d \n",
|
|
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
break;
|
|
|
|
default:
|
|
break;
|
|
}
|
|
/* go to sibling */
|
|
xml_node = xml_node->next;
|
|
} /* end while */
|
|
return ret_val;
|
|
}
|