| xj | b04a402 | 2021-11-25 15:01:52 +0800 | [diff] [blame] | 1 | #include <stdlib.h>              | 
 | 2 | #include <stdio.h>              | 
 | 3 | #include <string.h>            | 
 | 4 | #include <sys/ioctl.h> | 
 | 5 | #include <fcntl.h> | 
 | 6 | #include <getopt.h> | 
 | 7 |  | 
 | 8 | #include "acl_ioctl.h" | 
 | 9 | #include "acl_api.h" | 
 | 10 |  | 
 | 11 | void show_usage(void) | 
 | 12 | { | 
 | 13 |     printf("Add SDMAC  Entry for Any Protocol\n"); | 
 | 14 |     printf("acl -A -n [SDMAC] -U[UP] -u [Allow/Deny/FP]\n"); | 
 | 15 |     printf("Ex: acl -A -n 00:11:22:33:44:55  -u Deny \n\n"); | 
 | 16 |     printf("Ex: acl -A -n 00:11:22:33:44:55  -U 3 -u FP \n\n"); | 
 | 17 |  | 
 | 18 |     printf("Add SMAC to DIP Entry for Any Protocol\n"); | 
 | 19 |     printf("acl -a -n [SMAC] -q [DipS] -r [DipE] -U[UP] -u [Allow/Deny/FP]\n"); | 
 | 20 |     printf("Ex: acl -a -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -u Deny \n\n"); | 
 | 21 |     printf("Ex: acl -a -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -U 3 -u FP \n\n"); | 
 | 22 |  | 
 | 23 |     printf("Add SMAC to DIP Entry for Tcp Protocol\n"); | 
 | 24 |     printf("acl -b  -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n"); | 
 | 25 |     printf("Ex: acl -b -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024 -u Deny\n\n"); | 
 | 26 |     | 
 | 27 |     printf("SMAC to DIP Entry for Udp Protocol\n"); | 
 | 28 |     printf("acl -c  -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n"); | 
 | 29 |     printf("Ex: acl -c -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024 -u Deny\n\n"); | 
 | 30 |    | 
 | 31 |     printf("Del SDMAC  Entry for Any Protocol\n"); | 
 | 32 |     printf("acl -D -n [SMAC]\n"); | 
 | 33 |     printf("Ex: acl -D -n 00:11:22:33:44:55 \n\n"); | 
 | 34 |  | 
 | 35 |     printf("Del SMAC to DIP Entry for Any Protocol\n"); | 
 | 36 |     printf("acl -d -n [SMAC] -q [DipS] -r [DipE]\n"); | 
 | 37 |     printf("Ex: acl -d -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5\n\n"); | 
 | 38 |     | 
 | 39 |     printf("Del SMAC to DIP Entry for Tcp Protocol\n"); | 
 | 40 |     printf("acl -e  -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); | 
 | 41 |     printf("Ex: acl -e -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024\n\n"); | 
 | 42 |     | 
 | 43 |     printf("Del SMAC to DIP Entry for Udp Protocol\n"); | 
 | 44 |     printf("acl -f  -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); | 
 | 45 |     printf("Ex: acl -f -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024\n\n"); | 
 | 46 |  | 
 | 47 |     printf("Add SIP to DIP Entry for Any Protocol\n"); | 
 | 48 |     printf("acl -H  -o [SipS] -p [SipE] -q [DipS] -r [DipE] -U[UP] -u [Allow/Deny/FP]\n"); | 
 | 49 |     printf("Ex: acl -H -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -u Deny\n\n"); | 
 | 50 |     | 
 | 51 |  | 
 | 52 |     printf("Add SIP to DIP Entry for Tcp Protocol\n"); | 
 | 53 |     printf("acl -h  -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n"); | 
 | 54 |     printf("Ex: acl -h -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -u Deny\n\n"); | 
 | 55 |     | 
 | 56 |  | 
 | 57 |     printf("Add SIP to DIP Entry for Udp Protocol\n"); | 
 | 58 |     printf("acl -i  -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]-U[UP] -u [Allow/Deny/FP]\n"); | 
 | 59 |     printf("Ex: acl -i -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -u Deny\n\n"); | 
 | 60 |      | 
 | 61 |     printf("Del SIP to DIP Entry for Any Protocol\n"); | 
 | 62 |     printf("acl -j  -o [SipS] -p [SipE] -q [DipS] -r [DipE]\n"); | 
 | 63 |     printf("Ex: acl -j -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3\n\n"); | 
 | 64 |     | 
 | 65 |  | 
 | 66 |     printf("Del SIP to DIP Entry for Tcp Protocol\n"); | 
 | 67 |     printf("acl -k  -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); | 
 | 68 |     printf("Ex: acl -k -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024\n\n"); | 
 | 69 |     | 
 | 70 |  | 
 | 71 |     printf("Del SIP to DIP Entry for Udp Protocol\n"); | 
 | 72 |     printf("acl -l  -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); | 
 | 73 |     printf("Ex: acl -l -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024\n\n"); | 
 | 74 |     printf("Del All Entries\n"); | 
 | 75 |     printf("acl -m\n\n"); | 
 | 76 |  | 
 | 77 |     printf("Add S/DMAC ETYPE VID PROTOCOL SIP DIP SP DP Entry\n"); | 
 | 78 |     printf("acl -E -n[SMAC] -N[DMAC] -P[ESW Port] -Z[Ethertype] -S[Protocol] -o[SipS] -p[SipE] -q[DipS] -r[DipE] -s[DpS] -t[DpE] -v[SpS] -x[SpE] -y[TosS] -z[TosE] -F[TCP/UDP/ANY] -V[VID] -u[Allow/Deny/FP]\n"); | 
 | 79 |     printf("Ex: acl -E  -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -F UDP -u Deny\n\n"); | 
 | 80 |     | 
 | 81 |  | 
 | 82 |     printf("Del S/DMAC ETYPE  VID PROTOCOL SIP DIP SP DP Entry\n"); | 
 | 83 |     printf("acl -G -n[SMAC] -N[DMAC] -P[ESW Port] -Z[Ethertype] -S[Protocol] -o[SipS] -p[SipE] -q[DipS] -r[DipE] -s[DpS] -t[DpE] -v[SpS] -x[SpE] -y[TosS] -z[TosE] -F[TCP/UDP/ANY] -V[VID] \n"); | 
 | 84 |     printf("Ex: acl -G  -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -F UDP\n\n"); | 
 | 85 |  | 
 | 86 |     printf("Show All ACL Entry\n"); | 
 | 87 |     printf("Ex: acl -g\n\n"); | 
 | 88 |  | 
 | 89 | } | 
 | 90 |  | 
 | 91 | int main(int argc, char *argv[]) | 
 | 92 | { | 
 | 93 |     int opt; | 
 | 94 |     char options[] = "AabcDdEefGgHhijklm?F:n:N:o:P:p:q:r:s:S:t:u:U:v:x:y:V:z:Z:"; | 
 | 95 |     int fd; | 
 | 96 |     struct acl_args args; | 
 | 97 |     struct acl_list_args *args2; | 
 | 98 |     int method=-1; | 
 | 99 |     int result; | 
 | 100 |     int i; | 
 | 101 |  | 
 | 102 |     memset(&args, 0, sizeof(struct acl_args)); | 
 | 103 |     args.pn = 7; /* Default do not care*/ | 
 | 104 |     /* Max 511 acl entries */ | 
 | 105 |     args2=malloc(sizeof(struct acl_list_args) + sizeof(struct acl_args)*511); | 
 | 106 |     if (NULL == args2) | 
 | 107 |     { | 
 | 108 | 	    printf(" Allocate memory for acl_list_args and acl_args failed.\n"); | 
 | 109 | 	    return 0; | 
 | 110 |     } | 
 | 111 |     fd = open("/dev/"ACL_DEVNAME, O_RDONLY); | 
 | 112 |  | 
 | 113 |     if (fd < 0) | 
 | 114 |     { | 
 | 115 | 	printf("Open %s pseudo device failed\n","/dev/"ACL_DEVNAME); | 
 | 116 |         free(args2); | 
 | 117 | 	return 0; | 
 | 118 |     } | 
 | 119 |  | 
 | 120 |     if(argc < 2) { | 
 | 121 | 	show_usage(); | 
 | 122 |         free(args2); | 
 | 123 |         close(fd); | 
 | 124 | 	return 0; | 
 | 125 |     } | 
 | 126 |  | 
 | 127 |     while ((opt = getopt (argc, argv, options)) != -1) { | 
 | 128 | 	switch (opt) { | 
 | 129 | 	case 'A':  | 
 | 130 | 		method=ACL_ADD_SDMAC_ANY; | 
 | 131 | 		break; | 
 | 132 | 	case 'a':  | 
 | 133 | 		method=ACL_ADD_SMAC_DIP_ANY; | 
 | 134 | 		break; | 
 | 135 | 	case 'b': | 
 | 136 | 		method=ACL_ADD_SMAC_DIP_TCP; | 
 | 137 | 		break; | 
 | 138 | 	case 'c': | 
 | 139 | 		method=ACL_ADD_SMAC_DIP_UDP; | 
 | 140 | 		break; | 
 | 141 | 	case 'D':  | 
 | 142 | 		method=ACL_DEL_SDMAC_ANY; | 
 | 143 | 		break; | 
 | 144 | 	case 'd':  | 
 | 145 | 		method=ACL_DEL_SMAC_DIP_ANY; | 
 | 146 | 		break; | 
 | 147 | 	case 'e': | 
 | 148 | 		method=ACL_DEL_SMAC_DIP_TCP; | 
 | 149 | 		break; | 
 | 150 | 	case 'E': | 
 | 151 | 		method=ACL_ADD_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT; | 
 | 152 | 		break; | 
 | 153 | 	case 'F': | 
 | 154 |                 if(strcasecmp(optarg,"TCP")==0){ | 
 | 155 |                             args.L4=ACL_PROTO_TCP; | 
 | 156 | 	                }else if(strcasecmp(optarg,"UDP")==0){ | 
 | 157 | 	                        args.L4=ACL_PROTO_UDP; | 
 | 158 | 	                    }else if(strcasecmp(optarg,"ANY")==0){ | 
 | 159 | 	                        args.L4=ACL_PROTO_ANY; | 
 | 160 | 	                }else{ | 
 | 161 |                             printf("Error: -t TCP or UDP or ANY\n"); | 
 | 162 | 			    free(args2); | 
 | 163 | 			    close(fd); | 
 | 164 | 			    return 0; | 
 | 165 |                 } | 
 | 166 |  | 
 | 167 | 		break; | 
 | 168 | 	case 'G': | 
 | 169 | 		method=ACL_DEL_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT; | 
 | 170 | 		break; | 
 | 171 | 	case 'f': | 
 | 172 | 		method=ACL_DEL_SMAC_DIP_UDP; | 
 | 173 | 		break; | 
 | 174 | 	case 'H': | 
 | 175 | 		method=ACL_ADD_SIP_DIP_ANY; | 
 | 176 | 		break; | 
 | 177 |         case 'g': | 
 | 178 |                 method = ACL_GET_ALL_ENTRIES; | 
 | 179 | 		break; | 
 | 180 | 	case 'h': | 
 | 181 | 		method=ACL_ADD_SIP_DIP_TCP; | 
 | 182 | 		break; | 
 | 183 | 	case 'i': | 
 | 184 | 		method=ACL_ADD_SIP_DIP_UDP; | 
 | 185 | 		break; | 
 | 186 | 	case 'j': | 
 | 187 | 		method=ACL_DEL_SIP_DIP_ANY; | 
 | 188 | 		break; | 
 | 189 | 	case 'k': | 
 | 190 | 		method=ACL_DEL_SIP_DIP_TCP; | 
 | 191 | 		break; | 
 | 192 | 	case 'l': | 
 | 193 | 		method=ACL_DEL_SIP_DIP_UDP; | 
 | 194 | 		break; | 
 | 195 | 	case 'm': | 
 | 196 | 		method=ACL_CLEAN_TBL; | 
 | 197 | 		break; | 
 | 198 | 	case 'n': /* source mac address */ | 
 | 199 | 		str_to_mac(args.mac, optarg); | 
 | 200 | 		break; | 
 | 201 | 	case 'N': /* destination mac address */ | 
 | 202 | 		str_to_mac(args.dmac, optarg); | 
 | 203 | 		break; | 
 | 204 | 	case 'o': /* start of sip */ | 
 | 205 | 		str_to_ip(&args.sip_s, optarg); | 
 | 206 | 		break; | 
 | 207 | 	case 'p': /* end of sip */ | 
 | 208 | 		str_to_ip(&args.sip_e, optarg); | 
 | 209 | 		break; | 
 | 210 | 	case 'P': /* Port Number */ | 
 | 211 | 		args.pn=strtoll(optarg, NULL, 10); | 
 | 212 | 		break; | 
 | 213 | 	case 'q': /* start of dip */ | 
 | 214 | 		str_to_ip(&args.dip_s, optarg); | 
 | 215 | 		break; | 
 | 216 | 	case 'r': /* end of dip */ | 
 | 217 | 		str_to_ip(&args.dip_e, optarg); | 
 | 218 | 		break; | 
 | 219 | 	case 's': /* start of dp */ | 
 | 220 | 		args.dp_s=strtoll(optarg, NULL, 10); | 
 | 221 | 		break; | 
 | 222 | 	case 't': /* end of dp */ | 
 | 223 | 		args.dp_e=strtoll(optarg, NULL, 10); | 
 | 224 | 		break; | 
 | 225 | 	case 'S': /* Protocol */ | 
 | 226 | 		args.protocol=strtoll(optarg, NULL, 10); | 
 | 227 | 		break; | 
 | 228 |  | 
 | 229 | 	case 'v': /* start of sp */ | 
 | 230 | 		args.sp_s=strtoll(optarg, NULL, 10); | 
 | 231 | 		break; | 
 | 232 | 	case 'x': /* end of sp */ | 
 | 233 | 		args.sp_e=strtoll(optarg, NULL, 10); | 
 | 234 | 		break; | 
 | 235 | 	case 'y': /* start of tos */ | 
 | 236 | 		args.tos_s=strtoll(optarg, NULL, 10); | 
 | 237 | 		break; | 
 | 238 | 	case 'z': /* end of tos */ | 
 | 239 | 		args.tos_e=strtoll(optarg, NULL, 10); | 
 | 240 | 		break; | 
 | 241 | 	case 'Z': /* ethertype */ | 
 | 242 | 		args.ethertype=strtoll(optarg, NULL, 16); | 
 | 243 | 		break; | 
 | 244 | 	case 'V': /* VID */ | 
 | 245 | 		args.vid=strtoll(optarg, NULL, 10); | 
 | 246 | 		break; | 
 | 247 | 	case 'u': /* Deny/Allow */ | 
 | 248 | 		if(strcasecmp(optarg,"Deny")==0){ | 
 | 249 | 			args.method=ACL_DENY_RULE; | 
 | 250 | 		}else if(strcasecmp(optarg,"Allow")==0){ | 
 | 251 | 			args.method=ACL_ALLOW_RULE; | 
 | 252 | 		}else if(strcasecmp(optarg,"FP")==0){ | 
 | 253 | 			args.method=ACL_PRIORITY_RULE; | 
 | 254 | 		}else{ | 
 | 255 | 			printf("Error: -t Deny or Allow\n"); | 
 | 256 | 			free(args2); | 
 | 257 | 			close(fd); | 
 | 258 | 			return 0; | 
 | 259 | 		} | 
 | 260 | 		break; | 
 | 261 | 	case 'U': /* User Priority */ | 
 | 262 | 		args.up=strtoll(optarg, NULL, 10); | 
 | 263 | 		break; | 
 | 264 | 	case '?': | 
 | 265 | 	default: | 
 | 266 | 	    show_usage(); | 
 | 267 | 	    free(args2); | 
 | 268 | 	    close(fd); | 
 | 269 |             return 0; | 
 | 270 | 	} | 
 | 271 |     }  | 
 | 272 |     switch(method) { | 
 | 273 |     case ACL_ADD_SDMAC_ANY: | 
 | 274 |     case ACL_ADD_ETYPE_ANY:	 | 
 | 275 |     case ACL_ADD_SMAC_DIP_ANY: | 
 | 276 |     case ACL_ADD_SMAC_DIP_TCP: | 
 | 277 |     case ACL_ADD_SMAC_DIP_UDP: | 
 | 278 |     case ACL_DEL_SDMAC_ANY: | 
 | 279 |     case ACL_DEL_ETYPE_ANY: | 
 | 280 |     case ACL_DEL_SMAC_DIP_ANY: | 
 | 281 |     case ACL_DEL_SMAC_DIP_TCP: | 
 | 282 |     case ACL_DEL_SMAC_DIP_UDP: | 
 | 283 |     case ACL_ADD_SIP_DIP_ANY: | 
 | 284 |     case ACL_ADD_SIP_DIP_TCP: | 
 | 285 |     case ACL_ADD_SIP_DIP_UDP: | 
 | 286 |     case ACL_ADD_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT:	 | 
 | 287 |     case ACL_DEL_SIP_DIP_ANY: | 
 | 288 |     case ACL_DEL_SIP_DIP_TCP: | 
 | 289 |     case ACL_DEL_SIP_DIP_UDP: | 
 | 290 |     case ACL_DEL_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT: | 
 | 291 |     case ACL_CLEAN_TBL: | 
 | 292 | 	      SetAclEntry(&args, method); | 
 | 293 | 	      result = args.result; | 
 | 294 | 	      break; | 
 | 295 |     case ACL_GET_ALL_ENTRIES: | 
 | 296 | 	      AclGetAllEntries(args2); | 
 | 297 | 	      result = args2->result; | 
 | 298 |  | 
 | 299 | 	      printf("Total Entry Count = %d\n",args2->num_of_entries); | 
 | 300 | 	      for(i=0;i<args2->num_of_entries;i++){ | 
 | 301 | 		  printf("#%d :SMAC=%02X:%02X:%02X:%02X:%02X:%02X => DMAC=%02X:%02X:%02X:%02X:%02X:%02X PROTOCOL=0x%2x\n", \ | 
 | 302 | 			  i, args2->entries[i].mac[0], args2->entries[i].mac[1], args2->entries[i].mac[2], \ | 
 | 303 | 			  args2->entries[i].mac[3], args2->entries[i].mac[4], args2->entries[i].mac[5], \ | 
 | 304 | 			  args2->entries[i].dmac[0], args2->entries[i].dmac[1],args2->entries[i].dmac[2], \ | 
 | 305 | 			  args2->entries[i].dmac[3], args2->entries[i].dmac[4],args2->entries[i].dmac[5], \ | 
 | 306 | 			  args2->entries[i].protocol); | 
 | 307 |  | 
 | 308 | 		  printf("   :SIP %u.%u.%u.%u->%u.%u.%u.%u=>DIP %u.%u.%u.%u->%u.%u.%u.%u  SP %d->%d=>DP %d->%d TOS:0x%2x->0x%2x VID:%d ETYPE=0x%4x TCP_UDP=0/TCP=1/UDP=2:%d PN:%d\n\r", \ | 
 | 309 | 			  NIPQUAD(args2->entries[i].sip_s), \ | 
 | 310 | 			  NIPQUAD(args2->entries[i].sip_e), \ | 
 | 311 | 			  NIPQUAD(args2->entries[i].dip_s), \ | 
 | 312 | 			  NIPQUAD(args2->entries[i].dip_e), \ | 
 | 313 | 			  args2->entries[i].sp_s, \ | 
 | 314 | 			  args2->entries[i].sp_e, \ | 
 | 315 | 			  args2->entries[i].dp_s, \ | 
 | 316 | 			  args2->entries[i].dp_e, \ | 
 | 317 | 			  args2->entries[i].tos_s, \ | 
 | 318 | 		    args2->entries[i].tos_e, \ | 
 | 319 | 		    args2->entries[i].vid, \ | 
 | 320 | 		    args2->entries[i].ethertype, \ | 
 | 321 | 		    args2->entries[i].L4, \ | 
 | 322 | 		    args2->entries[i].pn); | 
 | 323 | 	      } | 
 | 324 | 	      break; | 
 | 325 |     default: | 
 | 326 | 	      result = ACL_FAIL; | 
 | 327 |     } | 
 | 328 |  | 
 | 329 |  | 
 | 330 |     if(result == ACL_SUCCESS) { | 
 | 331 | 	printf("done\n"); | 
 | 332 |     }else if (result ==  ACL_TBL_FULL) { | 
 | 333 | 	printf("table full\n"); | 
 | 334 |     } else { | 
 | 335 | 	printf("fail\n"); | 
 | 336 |     } | 
 | 337 |      | 
 | 338 |     free(args2); | 
 | 339 |     close(fd); | 
 | 340 |     return 0; | 
 | 341 | } |