blob: d59bbb0d09cd4ac0d2bb3afd88a3869a9e7cff2d [file] [log] [blame]
/*
Copyright (c) 2013, 2019, The Linux Foundation. All rights reserved.
Redistribution and use in source and binary forms, with or without
modification, are permitted provided that the following conditions are
met:
* Redistributions of source code must retain the above copyright
notice, this list of conditions and the following disclaimer.
* Redistributions in binary form must reproduce the above
copyright notice, this list of conditions and the following
disclaimer in the documentation and/or other materials provided
with the distribution.
* Neither the name of The Linux Foundation nor the names of its
contributors may be used to endorse or promote products derived
from this software without specific prior written permission.
THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESS OR IMPLIED
WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NON-INFRINGEMENT
ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN
IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
/*!
@file
IPACM_Xml.cpp
@brief
This file implements the XML specific parsing functionality.
@Author
Skylar Chang/Shihuan Liu
*/
#include <sys/socket.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include "IPACM_Xml.h"
#include "IPACM_Log.h"
#include "IPACM_Netlink.h"
static char* IPACM_read_content_element
(
xmlNode* element
);
static int32_t IPACM_util_icmp_string
(
const char* xml_str,
const char* str
);
static int ipacm_cfg_xml_parse_tree
(
xmlNode* xml_node,
IPACM_conf_t *config
);
static int IPACM_firewall_xml_parse_tree
(
xmlNode* xml_node,
IPACM_firewall_conf_t *config
);
/*Reads content (stored as child) of the element */
static char* IPACM_read_content_element
(
xmlNode* element
)
{
xmlNode* child_ptr;
uint32_t str_len;
for (child_ptr = element->children;
child_ptr != NULL;
child_ptr = child_ptr->next)
{
if (child_ptr->type == XML_TEXT_NODE)
{
str_len = strlen((char*)child_ptr->content);
if(str_len < MAX_XML_STR_LEN)
return (char*)child_ptr->content;
else
{
IPACMERR("Invalid string size\n");
break;
}
}
}
return NULL;
}
/* insensitive comparison of a libxml's string (xml_str) and a regular string (str)*/
static int32_t IPACM_util_icmp_string
(
const char* xml_str,
const char* str
)
{
int32_t ret = -1;
if (NULL != xml_str && NULL != str)
{
uint32_t len1 = strlen(str);
uint32_t len2 = strlen(xml_str);
/* If the lengths match, do the string comparison */
if (len1 == len2)
{
ret = strncasecmp(xml_str, str, len1);
}
}
return ret;
}
/* This function read IPACM XML and populate the IPA CM Cfg */
int ipacm_read_cfg_xml(char *xml_file, IPACM_conf_t *config)
{
xmlDocPtr doc = NULL;
xmlNode* root = NULL;
int ret_val = IPACM_SUCCESS;
/* Invoke the XML parser and obtain the parse tree */
doc = xmlReadFile(xml_file, "UTF-8", XML_PARSE_NOBLANKS);
if (doc == NULL) {
IPACMDBG_H("IPACM_xml_parse: libxml returned parse error!\n");
return IPACM_FAILURE;
}
/*Get the root of the tree*/
root = xmlDocGetRootElement(doc);
memset(config, 0, sizeof(IPACM_conf_t));
/* parse the xml tree returned by libxml */
ret_val = ipacm_cfg_xml_parse_tree(root, config);
if (ret_val != IPACM_SUCCESS)
{
IPACMDBG_H("IPACM_xml_parse: ipacm_cfg_xml_parse_tree returned parse error!\n");
}
/* Free up the libxml's parse tree */
xmlFreeDoc(doc);
return ret_val;
}
/* This function traverses the xml tree*/
static int ipacm_cfg_xml_parse_tree
(
xmlNode* xml_node,
IPACM_conf_t *config
)
{
int32_t ret_val = IPACM_SUCCESS;
int str_size;
char* content;
char content_buf[MAX_XML_STR_LEN];
if (NULL == xml_node)
return ret_val;
while ( xml_node != NULL &&
ret_val == IPACM_SUCCESS)
{
switch (xml_node->type)
{
case XML_ELEMENT_NODE:
{
if (IPACM_util_icmp_string((char*)xml_node->name, system_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, ODU_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, IPACMCFG_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, IPACMIFACECFG_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, IFACE_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, IPACMPRIVATESUBNETCFG_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, SUBNET_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, IPACMALG_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, ALG_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, IPACMNat_TAG) == 0 ||
IPACM_util_icmp_string((char*)xml_node->name, IP_PassthroughFlag_TAG) == 0)
{
if (0 == IPACM_util_icmp_string((char*)xml_node->name, IFACE_TAG))
{
/* increase iface entry number */
config->iface_config.num_iface_entries++;
}
if (0 == IPACM_util_icmp_string((char*)xml_node->name, SUBNET_TAG))
{
/* increase iface entry number */
config->private_subnet_config.num_subnet_entries++;
}
if (0 == IPACM_util_icmp_string((char*)xml_node->name, ALG_TAG))
{
/* increase iface entry number */
config->alg_config.num_alg_entries++;
}
/* go to child */
ret_val = ipacm_cfg_xml_parse_tree(xml_node->children, config);
}
else if (IPACM_util_icmp_string((char*)xml_node->name, IP_PassthroughMode_TAG) == 0)
{
IPACMDBG_H("inside IP Passthrough\n");
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (atoi(content_buf))
{
config->ip_passthrough_mode = true;
IPACMDBG_H("Passthrough enable %d buf(%d)\n", config->ip_passthrough_mode, atoi(content_buf));
}
else
{
config->ip_passthrough_mode = false;
IPACMDBG_H("Passthrough enable %d buf(%d)\n", config->ip_passthrough_mode, atoi(content_buf));
}
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, ODUMODE_TAG) == 0)
{
IPACMDBG_H("inside ODU-XML\n");
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (0 == strncasecmp(content_buf, ODU_ROUTER_TAG, str_size))
{
config->router_mode_enable = true;
IPACMDBG_H("router-mode enable %d\n", config->router_mode_enable);
}
else if (0 == strncasecmp(content_buf, ODU_BRIDGE_TAG, str_size))
{
config->router_mode_enable = false;
IPACMDBG_H("router-mode enable %d\n", config->router_mode_enable);
}
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, ODUEMBMS_OFFLOAD_TAG) == 0)
{
IPACMDBG_H("inside ODU-XML\n");
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (atoi(content_buf))
{
config->odu_embms_enable = true;
IPACMDBG_H("router-mode enable %d buf(%d)\n", config->odu_embms_enable, atoi(content_buf));
}
else
{
config->odu_embms_enable = false;
IPACMDBG_H("router-mode enable %d buf(%d)\n", config->odu_embms_enable, atoi(content_buf));
}
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, NAME_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
strlcpy(content_buf, content, MAX_XML_STR_LEN);
strlcpy(config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].iface_name, content_buf, IPA_IFACE_NAME_LEN);
IPACMDBG_H("Name %s\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].iface_name);
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, CATEGORY_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (0 == strncasecmp(content_buf, WANIF_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = WAN_IF;
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
}
else if (0 == strncasecmp(content_buf, LANIF_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = LAN_IF;
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
}
else if (0 == strncasecmp(content_buf, WLANIF_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = WLAN_IF;
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
}
else if (0 == strncasecmp(content_buf, VIRTUALIF_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = VIRTUAL_IF;
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
}
else if (0 == strncasecmp(content_buf, UNKNOWNIF_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = UNKNOWN_IF;
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
}
else if (0 == strncasecmp(content_buf, ETHIF_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = ETH_IF;
IPACMDBG_H("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
}
else if (0 == strncasecmp(content_buf, ODUIF_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat = ODU_IF;
IPACMDBG("Category %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_cat);
}
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, MODE_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (0 == strncasecmp(content_buf, IFACE_ROUTER_MODE_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode = ROUTER;
IPACMDBG_H("Iface mode %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode);
}
else if (0 == strncasecmp(content_buf, IFACE_BRIDGE_MODE_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode = BRIDGE;
IPACMDBG_H("Iface mode %d\n", config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].if_mode);
}
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, WLAN_MODE_TAG) == 0)
{
IPACMDBG_H("Inside WLAN-XML\n");
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (0 == strncasecmp(content_buf, WLAN_FULL_MODE_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode = FULL;
IPACMDBG_H("Wlan-mode full(%d)\n",
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode);
}
else if (0 == strncasecmp(content_buf, WLAN_INTERNET_MODE_TAG, str_size))
{
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode = INTERNET;
config->num_wlan_guest_ap++;
IPACMDBG_H("Wlan-mode internet(%d)\n",
config->iface_config.iface_entries[config->iface_config.num_iface_entries - 1].wlan_mode);
}
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, SUBNETADDRESS_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
content_buf[MAX_XML_STR_LEN-1] = '\0';
config->private_subnet_config.private_subnet_entries[config->private_subnet_config.num_subnet_entries - 1].subnet_addr
= ntohl(inet_addr(content_buf));
IPACMDBG_H("subnet_addr: %s \n", content_buf);
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, SUBNETMASK_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
content_buf[MAX_XML_STR_LEN-1] = '\0';
config->private_subnet_config.private_subnet_entries[config->private_subnet_config.num_subnet_entries - 1].subnet_mask
= ntohl(inet_addr(content_buf));
IPACMDBG_H("subnet_mask: %s \n", content_buf);
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, Protocol_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
content_buf[MAX_XML_STR_LEN-1] = '\0';
if (0 == strncasecmp(content_buf, TCP_PROTOCOL_TAG, str_size))
{
config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol = IPPROTO_TCP;
IPACMDBG_H("Protocol %s: %d\n",
content_buf, config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol);
}
else if (0 == strncasecmp(content_buf, UDP_PROTOCOL_TAG, str_size))
{
config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol = IPPROTO_UDP;
IPACMDBG_H("Protocol %s: %d\n",
content_buf, config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].protocol);
}
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, Port_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].port
= atoi(content_buf);
IPACMDBG_H("port %d\n", config->alg_config.alg_entries[config->alg_config.num_alg_entries - 1].port);
}
}
else if (IPACM_util_icmp_string((char*)xml_node->name, NAT_MaxEntries_TAG) == 0)
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->nat_max_entries = atoi(content_buf);
IPACMDBG_H("Nat Table Max Entries %d\n", config->nat_max_entries);
}
}
}
break;
default:
break;
}
/* go to sibling */
xml_node = xml_node->next;
} /* end while */
return ret_val;
}
/* This function read QCMAP CM Firewall XML and populate the QCMAP CM Cfg */
int IPACM_read_firewall_xml(char *xml_file, IPACM_firewall_conf_t *config)
{
xmlDocPtr doc = NULL;
xmlNode* root = NULL;
int ret_val;
IPACM_ASSERT(xml_file != NULL);
IPACM_ASSERT(config != NULL);
/* invoke the XML parser and obtain the parse tree */
doc = xmlReadFile(xml_file, "UTF-8", XML_PARSE_NOBLANKS);
if (doc == NULL) {
IPACMDBG_H("IPACM_xml_parse: libxml returned parse error\n");
return IPACM_FAILURE;
}
/*get the root of the tree*/
root = xmlDocGetRootElement(doc);
/* parse the xml tree returned by libxml*/
ret_val = IPACM_firewall_xml_parse_tree(root, config);
if (ret_val != IPACM_SUCCESS)
{
IPACMDBG_H("IPACM_xml_parse: ipacm_firewall_xml_parse_tree returned parse error!\n");
}
/* free the tree */
xmlFreeDoc(doc);
return ret_val;
}
/* This function traverses the firewall xml tree */
static int IPACM_firewall_xml_parse_tree
(
xmlNode* xml_node,
IPACM_firewall_conf_t *config
)
{
int mask_value_v6, mask_index;
int32_t ret_val = IPACM_SUCCESS;
char *content;
int str_size;
char content_buf[MAX_XML_STR_LEN];
struct in6_addr ip6_addr;
IPACM_ASSERT(config != NULL);
if (NULL == xml_node)
return ret_val;
while ( xml_node != NULL &&
ret_val == IPACM_SUCCESS)
{
switch (xml_node->type)
{
case XML_ELEMENT_NODE:
{
if (0 == IPACM_util_icmp_string((char*)xml_node->name, system_TAG) ||
0 == IPACM_util_icmp_string((char*)xml_node->name, MobileAPFirewallCfg_TAG) ||
0 == IPACM_util_icmp_string((char*)xml_node->name, Firewall_TAG) ||
0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallEnabled_TAG) ||
0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallPktsAllowed_TAG))
{
if (0 == IPACM_util_icmp_string((char*)xml_node->name, Firewall_TAG))
{
/* increase firewall entry num */
config->num_extd_firewall_entries++;
}
if (0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallPktsAllowed_TAG))
{
/* setup action of matched rules */
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (atoi(content_buf)==1)
{
config->rule_action_accept = true;
}
else
{
config->rule_action_accept = false;
}
IPACMDBG_H(" Allow traffic which matches rules ?:%d\n",config->rule_action_accept);
}
}
if (0 == IPACM_util_icmp_string((char*)xml_node->name, FirewallEnabled_TAG))
{
/* setup if firewall enable or not */
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (atoi(content_buf)==1)
{
config->firewall_enable = true;
}
else
{
config->firewall_enable = false;
}
IPACMDBG_H(" Firewall Enable?:%d\n", config->firewall_enable);
}
}
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPFamily_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].ip_vsn
= (firewall_ip_version_enum)atoi(content_buf);
IPACMDBG_H("\n IP family type is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].ip_vsn);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4SourceAddress_TAG))
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_ADDR;
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4SourceIPAddress_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
content_buf[MAX_XML_STR_LEN-1] = '\0';
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.src_addr
= ntohl(inet_addr(content_buf));
IPACMDBG_H("IPv4 source address is: %s \n", content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4SourceSubnetMask_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
content_buf[MAX_XML_STR_LEN-1] = '\0';
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.src_addr_mask
= ntohl(inet_addr(content_buf));
IPACMDBG_H("IPv4 source subnet mask is: %s \n", content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4DestinationAddress_TAG))
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_ADDR;
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4DestinationIPAddress_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
content_buf[MAX_XML_STR_LEN-1] = '\0';
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.dst_addr
= ntohl(inet_addr(content_buf));
IPACMDBG_H("IPv4 destination address is: %s \n", content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4DestinationSubnetMask_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
content_buf[MAX_XML_STR_LEN-1] = '\0';
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.dst_addr_mask
= ntohl(inet_addr(content_buf));
IPACMDBG_H("IPv4 destination subnet mask is: %s \n", content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4TypeOfService_TAG))
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_TOS;
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TOSValue_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.tos
= atoi(content_buf);
// Here we do not know if it is TOS with mask or not, so we put at both places
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.tos_value
= atoi(content_buf);
IPACMDBG_H("\n IPV4 TOS val is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.tos);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TOSMask_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
uint8_t mask;
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
mask = atoi(content_buf);
IPACMDBG_H("\n IPv4 TOS mask is %u \n", mask);
if (mask != 0xFF) {
// TOS attribute cannot be used
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.tos = 0;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.tos_mask = mask;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |=
IPA_FLT_TOS_MASKED;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask &=
~IPA_FLT_TOS;
} else {
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.tos_value = 0;
}
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV4NextHeaderProtocol_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_PROTOCOL;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.protocol = atoi(content_buf);
IPACMDBG_H("\n IPv4 next header prot is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v4.protocol);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6SourceAddress_TAG))
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |=
IPA_FLT_SRC_ADDR;
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6SourceIPAddress_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
inet_pton(AF_INET6, content_buf, &ip6_addr);
memcpy(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr,
ip6_addr.s6_addr, IPACM_IPV6_ADDR_LEN * sizeof(uint8_t));
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[0]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[0]);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[1]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[1]);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[2]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[2]);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[3]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[3]);
IPACMDBG_H("\n ipv6 source addr is %d \n ",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr[0]);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6SourcePrefix_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
mask_value_v6 = atoi(content_buf);
for (mask_index = 0; mask_index < 4; mask_index++)
{
if (mask_value_v6 >= 32)
{
mask_v6(32, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr_mask[mask_index]));
mask_value_v6 -= 32;
}
else
{
mask_v6(mask_value_v6, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.src_addr_mask[mask_index]));
mask_value_v6 = 0;
}
}
IPACMDBG_H("\n ipv6 source prefix is %d \n", atoi(content_buf));
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6DestinationAddress_TAG))
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |=
IPA_FLT_DST_ADDR;
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6DestinationIPAddress_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
inet_pton(AF_INET6, content_buf, &ip6_addr);
memcpy(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr,
ip6_addr.s6_addr, IPACM_IPV6_ADDR_LEN * sizeof(uint8_t));
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[0]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[0]);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[1]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[1]);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[2]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[2]);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[3]=ntohl(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[3]);
IPACMDBG_H("\n ipv6 dest addr is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr[0]);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6DestinationPrefix_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
mask_value_v6 = atoi(content_buf);
for (mask_index = 0; mask_index < 4; mask_index++)
{
if (mask_value_v6 >= 32)
{
mask_v6(32, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr_mask[mask_index]));
mask_value_v6 -= 32;
}
else
{
mask_v6(mask_value_v6, &(config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.dst_addr_mask[mask_index]));
mask_value_v6 = 0;
}
}
IPACMDBG_H("\n ipv6 dest prefix is %d \n", atoi(content_buf));
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6TrafficClass_TAG))
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_TC;
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TrfClsValue_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.tc
= atoi(content_buf);
IPACMDBG_H("\n ipv6 trf class val is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.tc);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TrfClsMask_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.tc
&= atoi(content_buf);
IPACMDBG_H("\n ipv6 trf class mask is %d \n", atoi(content_buf));
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, IPV6NextHeaderProtocol_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_NEXT_HDR;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.next_hdr
= atoi(content_buf);
IPACMDBG_H("\n ipv6 next header protocol is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.u.v6.next_hdr);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPSource_TAG))
{
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPSourcePort_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port
= atoi(content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPSourceRange_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if (atoi(content_buf) != 0)
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT_RANGE;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port + atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port = 0;
IPACMDBG_H("\n tcp source port from %d to %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo,
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi);
}
else
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT;
IPACMDBG_H("\n tcp source port= %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port);
}
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPDestination_TAG))
{
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPDestinationPort_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port
= atoi(content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCPDestinationRange_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if(atoi(content_buf)!=0)
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT_RANGE;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port + atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port = 0;
IPACMDBG_H("\n tcp dest port from %d to %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo,
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi);
}
else
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT;
IPACMDBG_H("\n tcp dest port= %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port);
}
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPSource_TAG))
{
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPSourcePort_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port
= atoi(content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPSourceRange_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if(atoi(content_buf)!=0)
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT_RANGE;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port + atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port = 0;
IPACMDBG_H("\n udp source port from %d to %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo,
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi);
}
else
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT;
IPACMDBG_H("\n udp source port= %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port);
}
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPDestination_TAG))
{
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPDestinationPort_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port
= atoi(content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, UDPDestinationRange_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if(atoi(content_buf)!=0)
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT_RANGE;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port + atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port = 0;
IPACMDBG_H("\n UDP dest port from %d to %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo,
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi);
}
else
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT;
IPACMDBG_H("\n UDP dest port= %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port);
}
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, ICMPType_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.type = atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_TYPE;
IPACMDBG_H("\n icmp type is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.type);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, ICMPCode_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.code = atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_CODE;
IPACMDBG_H("\n icmp code is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.code);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, ESPSPI_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.spi = atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SPI;
IPACMDBG_H("\n esp spi is %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.spi);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPSource_TAG))
{
/* go to child */
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPSourcePort_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content,str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port
= atoi(content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPSourceRange_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if(atoi(content_buf)!=0)
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT_RANGE;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port + atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port = 0;
IPACMDBG_H("\n tcp_udp source port from %d to %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_lo,
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port_hi);
}
else
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_SRC_PORT;
IPACMDBG_H("\n tcp_udp source port= %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.src_port);
}
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPDestination_TAG))
{
ret_val = IPACM_firewall_xml_parse_tree(xml_node->children, config);
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPDestinationPort_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port
= atoi(content_buf);
}
}
else if (0 == IPACM_util_icmp_string((char*)xml_node->name, TCP_UDPDestinationRange_TAG))
{
content = IPACM_read_content_element(xml_node);
if (content)
{
str_size = strlen(content);
memset(content_buf, 0, sizeof(content_buf));
memcpy(content_buf, (void *)content, str_size);
if(atoi(content_buf)!=0)
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT_RANGE;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port;
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi
= config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port + atoi(content_buf);
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port = 0;
IPACMDBG_H("\n tcp_udp dest port from %d to %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_lo,
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port_hi);
}
else
{
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.attrib_mask |= IPA_FLT_DST_PORT;
IPACMDBG_H("\n tcp_udp dest port= %d \n",
config->extd_firewall_entries[config->num_extd_firewall_entries - 1].attrib.dst_port);
}
}
}
}
break;
default:
break;
}
/* go to sibling */
xml_node = xml_node->next;
} /* end while */
return ret_val;
}