1762 "WARNING: SA info extension length (%u) is bad."),
1763 SADB_64TO8(assoc->sadb_sa_len));
1764 }
1765
1766 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1767 "%sSADB_ASSOC spi=0x%x, replay window size=%u, state="),
1768 prefix, ntohl(assoc->sadb_sa_spi), assoc->sadb_sa_replay);
1769 switch (assoc->sadb_sa_state) {
1770 case SADB_SASTATE_LARVAL:
1771 (void) fprintf(file, dgettext(TEXT_DOMAIN, "LARVAL"));
1772 break;
1773 case SADB_SASTATE_MATURE:
1774 (void) fprintf(file, dgettext(TEXT_DOMAIN, "MATURE"));
1775 break;
1776 case SADB_SASTATE_DYING:
1777 (void) fprintf(file, dgettext(TEXT_DOMAIN, "DYING"));
1778 break;
1779 case SADB_SASTATE_DEAD:
1780 (void) fprintf(file, dgettext(TEXT_DOMAIN, "DEAD"));
1781 break;
1782 case SADB_X_SASTATE_ACTIVE_ELSEWHERE:
1783 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1784 "ACTIVE_ELSEWHERE"));
1785 break;
1786 case SADB_X_SASTATE_IDLE:
1787 (void) fprintf(file, dgettext(TEXT_DOMAIN, "IDLE"));
1788 break;
1789 default:
1790 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1791 "<unknown %u>"), assoc->sadb_sa_state);
1792 }
1793
1794 if (assoc->sadb_sa_auth != SADB_AALG_NONE) {
1795 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1796 "\n%sAuthentication algorithm = "),
1797 prefix);
1798 (void) dump_aalg(assoc->sadb_sa_auth, file);
1799 }
1800
1801 if (assoc->sadb_sa_encrypt != SADB_EALG_NONE) {
1802 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1803 "\n%sEncryption algorithm = "), prefix);
1804 (void) dump_ealg(assoc->sadb_sa_encrypt, file);
1805 }
1806
1807 (void) fprintf(file, dgettext(TEXT_DOMAIN, "\n%sflags=0x%x < "), prefix,
1808 assoc->sadb_sa_flags);
|
1762 "WARNING: SA info extension length (%u) is bad."),
1763 SADB_64TO8(assoc->sadb_sa_len));
1764 }
1765
1766 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1767 "%sSADB_ASSOC spi=0x%x, replay window size=%u, state="),
1768 prefix, ntohl(assoc->sadb_sa_spi), assoc->sadb_sa_replay);
1769 switch (assoc->sadb_sa_state) {
1770 case SADB_SASTATE_LARVAL:
1771 (void) fprintf(file, dgettext(TEXT_DOMAIN, "LARVAL"));
1772 break;
1773 case SADB_SASTATE_MATURE:
1774 (void) fprintf(file, dgettext(TEXT_DOMAIN, "MATURE"));
1775 break;
1776 case SADB_SASTATE_DYING:
1777 (void) fprintf(file, dgettext(TEXT_DOMAIN, "DYING"));
1778 break;
1779 case SADB_SASTATE_DEAD:
1780 (void) fprintf(file, dgettext(TEXT_DOMAIN, "DEAD"));
1781 break;
1782 #if 0 /* DEPRECATED */
1783 case SADB_X_SASTATE_ACTIVE_ELSEWHERE:
1784 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1785 "ACTIVE_ELSEWHERE"));
1786 break;
1787 case SADB_X_SASTATE_IDLE:
1788 (void) fprintf(file, dgettext(TEXT_DOMAIN, "IDLE"));
1789 break;
1790 #endif
1791 default:
1792 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1793 "<unknown %u>"), assoc->sadb_sa_state);
1794 }
1795
1796 if (assoc->sadb_sa_auth != SADB_AALG_NONE) {
1797 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1798 "\n%sAuthentication algorithm = "),
1799 prefix);
1800 (void) dump_aalg(assoc->sadb_sa_auth, file);
1801 }
1802
1803 if (assoc->sadb_sa_encrypt != SADB_EALG_NONE) {
1804 (void) fprintf(file, dgettext(TEXT_DOMAIN,
1805 "\n%sEncryption algorithm = "), prefix);
1806 (void) dump_ealg(assoc->sadb_sa_encrypt, file);
1807 }
1808
1809 (void) fprintf(file, dgettext(TEXT_DOMAIN, "\n%sflags=0x%x < "), prefix,
1810 assoc->sadb_sa_flags);
|