xj | b04a402 | 2021-11-25 15:01:52 +0800 | [diff] [blame] | 1 | #include <stdlib.h> |
| 2 | #include <stdio.h> |
| 3 | #include <string.h> |
| 4 | #include <sys/ioctl.h> |
| 5 | #include <fcntl.h> |
| 6 | #include <getopt.h> |
| 7 | |
| 8 | #include "acl_ioctl.h" |
| 9 | #include "acl_api.h" |
| 10 | |
| 11 | void show_usage(void) |
| 12 | { |
| 13 | printf("Add SDMAC Entry for Any Protocol\n"); |
| 14 | printf("acl -A -n [SDMAC] -U[UP] -u [Allow/Deny/FP]\n"); |
| 15 | printf("Ex: acl -A -n 00:11:22:33:44:55 -u Deny \n\n"); |
| 16 | printf("Ex: acl -A -n 00:11:22:33:44:55 -U 3 -u FP \n\n"); |
| 17 | |
| 18 | printf("Add SMAC to DIP Entry for Any Protocol\n"); |
| 19 | printf("acl -a -n [SMAC] -q [DipS] -r [DipE] -U[UP] -u [Allow/Deny/FP]\n"); |
| 20 | printf("Ex: acl -a -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -u Deny \n\n"); |
| 21 | printf("Ex: acl -a -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -U 3 -u FP \n\n"); |
| 22 | |
| 23 | printf("Add SMAC to DIP Entry for Tcp Protocol\n"); |
| 24 | printf("acl -b -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n"); |
| 25 | printf("Ex: acl -b -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024 -u Deny\n\n"); |
| 26 | |
| 27 | printf("SMAC to DIP Entry for Udp Protocol\n"); |
| 28 | printf("acl -c -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n"); |
| 29 | printf("Ex: acl -c -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024 -u Deny\n\n"); |
| 30 | |
| 31 | printf("Del SDMAC Entry for Any Protocol\n"); |
| 32 | printf("acl -D -n [SMAC]\n"); |
| 33 | printf("Ex: acl -D -n 00:11:22:33:44:55 \n\n"); |
| 34 | |
| 35 | printf("Del SMAC to DIP Entry for Any Protocol\n"); |
| 36 | printf("acl -d -n [SMAC] -q [DipS] -r [DipE]\n"); |
| 37 | printf("Ex: acl -d -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5\n\n"); |
| 38 | |
| 39 | printf("Del SMAC to DIP Entry for Tcp Protocol\n"); |
| 40 | printf("acl -e -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); |
| 41 | printf("Ex: acl -e -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024\n\n"); |
| 42 | |
| 43 | printf("Del SMAC to DIP Entry for Udp Protocol\n"); |
| 44 | printf("acl -f -n [SMAC] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); |
| 45 | printf("Ex: acl -f -n 00:11:22:33:44:55 -q 10.10.10.3 -r 10.10.10.5 -s 1 -t 1024\n\n"); |
| 46 | |
| 47 | printf("Add SIP to DIP Entry for Any Protocol\n"); |
| 48 | printf("acl -H -o [SipS] -p [SipE] -q [DipS] -r [DipE] -U[UP] -u [Allow/Deny/FP]\n"); |
| 49 | printf("Ex: acl -H -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -u Deny\n\n"); |
| 50 | |
| 51 | |
| 52 | printf("Add SIP to DIP Entry for Tcp Protocol\n"); |
| 53 | printf("acl -h -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE] -U[UP] -u [Allow/Deny/FP]\n"); |
| 54 | printf("Ex: acl -h -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -u Deny\n\n"); |
| 55 | |
| 56 | |
| 57 | printf("Add SIP to DIP Entry for Udp Protocol\n"); |
| 58 | printf("acl -i -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]-U[UP] -u [Allow/Deny/FP]\n"); |
| 59 | printf("Ex: acl -i -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -u Deny\n\n"); |
| 60 | |
| 61 | printf("Del SIP to DIP Entry for Any Protocol\n"); |
| 62 | printf("acl -j -o [SipS] -p [SipE] -q [DipS] -r [DipE]\n"); |
| 63 | printf("Ex: acl -j -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3\n\n"); |
| 64 | |
| 65 | |
| 66 | printf("Del SIP to DIP Entry for Tcp Protocol\n"); |
| 67 | printf("acl -k -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); |
| 68 | printf("Ex: acl -k -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024\n\n"); |
| 69 | |
| 70 | |
| 71 | printf("Del SIP to DIP Entry for Udp Protocol\n"); |
| 72 | printf("acl -l -o [SipS] -p [SipE] -q [DipS] -r [DipE] -s [DpS] -t [DpE]\n"); |
| 73 | printf("Ex: acl -l -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024\n\n"); |
| 74 | printf("Del All Entries\n"); |
| 75 | printf("acl -m\n\n"); |
| 76 | |
| 77 | printf("Add S/DMAC ETYPE VID PROTOCOL SIP DIP SP DP Entry\n"); |
| 78 | printf("acl -E -n[SMAC] -N[DMAC] -P[ESW Port] -Z[Ethertype] -S[Protocol] -o[SipS] -p[SipE] -q[DipS] -r[DipE] -s[DpS] -t[DpE] -v[SpS] -x[SpE] -y[TosS] -z[TosE] -F[TCP/UDP/ANY] -V[VID] -u[Allow/Deny/FP]\n"); |
| 79 | printf("Ex: acl -E -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -F UDP -u Deny\n\n"); |
| 80 | |
| 81 | |
| 82 | printf("Del S/DMAC ETYPE VID PROTOCOL SIP DIP SP DP Entry\n"); |
| 83 | printf("acl -G -n[SMAC] -N[DMAC] -P[ESW Port] -Z[Ethertype] -S[Protocol] -o[SipS] -p[SipE] -q[DipS] -r[DipE] -s[DpS] -t[DpE] -v[SpS] -x[SpE] -y[TosS] -z[TosE] -F[TCP/UDP/ANY] -V[VID] \n"); |
| 84 | printf("Ex: acl -G -o 10.10.10.3 -p 10.10.10.5 -q 10.10.20.3 -r 10.10.20.3 -s 1 -t 1024 -F UDP\n\n"); |
| 85 | |
| 86 | printf("Show All ACL Entry\n"); |
| 87 | printf("Ex: acl -g\n\n"); |
| 88 | |
| 89 | } |
| 90 | |
| 91 | int main(int argc, char *argv[]) |
| 92 | { |
| 93 | int opt; |
| 94 | char options[] = "AabcDdEefGgHhijklm?F:n:N:o:P:p:q:r:s:S:t:u:U:v:x:y:V:z:Z:"; |
| 95 | int fd; |
| 96 | struct acl_args args; |
| 97 | struct acl_list_args *args2; |
| 98 | int method=-1; |
| 99 | int result; |
| 100 | int i; |
| 101 | |
| 102 | memset(&args, 0, sizeof(struct acl_args)); |
| 103 | args.pn = 7; /* Default do not care*/ |
| 104 | /* Max 511 acl entries */ |
| 105 | args2=malloc(sizeof(struct acl_list_args) + sizeof(struct acl_args)*511); |
| 106 | if (NULL == args2) |
| 107 | { |
| 108 | printf(" Allocate memory for acl_list_args and acl_args failed.\n"); |
| 109 | return 0; |
| 110 | } |
| 111 | fd = open("/dev/"ACL_DEVNAME, O_RDONLY); |
| 112 | |
| 113 | if (fd < 0) |
| 114 | { |
| 115 | printf("Open %s pseudo device failed\n","/dev/"ACL_DEVNAME); |
| 116 | free(args2); |
| 117 | return 0; |
| 118 | } |
| 119 | |
| 120 | if(argc < 2) { |
| 121 | show_usage(); |
| 122 | free(args2); |
| 123 | close(fd); |
| 124 | return 0; |
| 125 | } |
| 126 | |
| 127 | while ((opt = getopt (argc, argv, options)) != -1) { |
| 128 | switch (opt) { |
| 129 | case 'A': |
| 130 | method=ACL_ADD_SDMAC_ANY; |
| 131 | break; |
| 132 | case 'a': |
| 133 | method=ACL_ADD_SMAC_DIP_ANY; |
| 134 | break; |
| 135 | case 'b': |
| 136 | method=ACL_ADD_SMAC_DIP_TCP; |
| 137 | break; |
| 138 | case 'c': |
| 139 | method=ACL_ADD_SMAC_DIP_UDP; |
| 140 | break; |
| 141 | case 'D': |
| 142 | method=ACL_DEL_SDMAC_ANY; |
| 143 | break; |
| 144 | case 'd': |
| 145 | method=ACL_DEL_SMAC_DIP_ANY; |
| 146 | break; |
| 147 | case 'e': |
| 148 | method=ACL_DEL_SMAC_DIP_TCP; |
| 149 | break; |
| 150 | case 'E': |
| 151 | method=ACL_ADD_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT; |
| 152 | break; |
| 153 | case 'F': |
| 154 | if(strcasecmp(optarg,"TCP")==0){ |
| 155 | args.L4=ACL_PROTO_TCP; |
| 156 | }else if(strcasecmp(optarg,"UDP")==0){ |
| 157 | args.L4=ACL_PROTO_UDP; |
| 158 | }else if(strcasecmp(optarg,"ANY")==0){ |
| 159 | args.L4=ACL_PROTO_ANY; |
| 160 | }else{ |
| 161 | printf("Error: -t TCP or UDP or ANY\n"); |
| 162 | free(args2); |
| 163 | close(fd); |
| 164 | return 0; |
| 165 | } |
| 166 | |
| 167 | break; |
| 168 | case 'G': |
| 169 | method=ACL_DEL_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT; |
| 170 | break; |
| 171 | case 'f': |
| 172 | method=ACL_DEL_SMAC_DIP_UDP; |
| 173 | break; |
| 174 | case 'H': |
| 175 | method=ACL_ADD_SIP_DIP_ANY; |
| 176 | break; |
| 177 | case 'g': |
| 178 | method = ACL_GET_ALL_ENTRIES; |
| 179 | break; |
| 180 | case 'h': |
| 181 | method=ACL_ADD_SIP_DIP_TCP; |
| 182 | break; |
| 183 | case 'i': |
| 184 | method=ACL_ADD_SIP_DIP_UDP; |
| 185 | break; |
| 186 | case 'j': |
| 187 | method=ACL_DEL_SIP_DIP_ANY; |
| 188 | break; |
| 189 | case 'k': |
| 190 | method=ACL_DEL_SIP_DIP_TCP; |
| 191 | break; |
| 192 | case 'l': |
| 193 | method=ACL_DEL_SIP_DIP_UDP; |
| 194 | break; |
| 195 | case 'm': |
| 196 | method=ACL_CLEAN_TBL; |
| 197 | break; |
| 198 | case 'n': /* source mac address */ |
| 199 | str_to_mac(args.mac, optarg); |
| 200 | break; |
| 201 | case 'N': /* destination mac address */ |
| 202 | str_to_mac(args.dmac, optarg); |
| 203 | break; |
| 204 | case 'o': /* start of sip */ |
| 205 | str_to_ip(&args.sip_s, optarg); |
| 206 | break; |
| 207 | case 'p': /* end of sip */ |
| 208 | str_to_ip(&args.sip_e, optarg); |
| 209 | break; |
| 210 | case 'P': /* Port Number */ |
| 211 | args.pn=strtoll(optarg, NULL, 10); |
| 212 | break; |
| 213 | case 'q': /* start of dip */ |
| 214 | str_to_ip(&args.dip_s, optarg); |
| 215 | break; |
| 216 | case 'r': /* end of dip */ |
| 217 | str_to_ip(&args.dip_e, optarg); |
| 218 | break; |
| 219 | case 's': /* start of dp */ |
| 220 | args.dp_s=strtoll(optarg, NULL, 10); |
| 221 | break; |
| 222 | case 't': /* end of dp */ |
| 223 | args.dp_e=strtoll(optarg, NULL, 10); |
| 224 | break; |
| 225 | case 'S': /* Protocol */ |
| 226 | args.protocol=strtoll(optarg, NULL, 10); |
| 227 | break; |
| 228 | |
| 229 | case 'v': /* start of sp */ |
| 230 | args.sp_s=strtoll(optarg, NULL, 10); |
| 231 | break; |
| 232 | case 'x': /* end of sp */ |
| 233 | args.sp_e=strtoll(optarg, NULL, 10); |
| 234 | break; |
| 235 | case 'y': /* start of tos */ |
| 236 | args.tos_s=strtoll(optarg, NULL, 10); |
| 237 | break; |
| 238 | case 'z': /* end of tos */ |
| 239 | args.tos_e=strtoll(optarg, NULL, 10); |
| 240 | break; |
| 241 | case 'Z': /* ethertype */ |
| 242 | args.ethertype=strtoll(optarg, NULL, 16); |
| 243 | break; |
| 244 | case 'V': /* VID */ |
| 245 | args.vid=strtoll(optarg, NULL, 10); |
| 246 | break; |
| 247 | case 'u': /* Deny/Allow */ |
| 248 | if(strcasecmp(optarg,"Deny")==0){ |
| 249 | args.method=ACL_DENY_RULE; |
| 250 | }else if(strcasecmp(optarg,"Allow")==0){ |
| 251 | args.method=ACL_ALLOW_RULE; |
| 252 | }else if(strcasecmp(optarg,"FP")==0){ |
| 253 | args.method=ACL_PRIORITY_RULE; |
| 254 | }else{ |
| 255 | printf("Error: -t Deny or Allow\n"); |
| 256 | free(args2); |
| 257 | close(fd); |
| 258 | return 0; |
| 259 | } |
| 260 | break; |
| 261 | case 'U': /* User Priority */ |
| 262 | args.up=strtoll(optarg, NULL, 10); |
| 263 | break; |
| 264 | case '?': |
| 265 | default: |
| 266 | show_usage(); |
| 267 | free(args2); |
| 268 | close(fd); |
| 269 | return 0; |
| 270 | } |
| 271 | } |
| 272 | switch(method) { |
| 273 | case ACL_ADD_SDMAC_ANY: |
| 274 | case ACL_ADD_ETYPE_ANY: |
| 275 | case ACL_ADD_SMAC_DIP_ANY: |
| 276 | case ACL_ADD_SMAC_DIP_TCP: |
| 277 | case ACL_ADD_SMAC_DIP_UDP: |
| 278 | case ACL_DEL_SDMAC_ANY: |
| 279 | case ACL_DEL_ETYPE_ANY: |
| 280 | case ACL_DEL_SMAC_DIP_ANY: |
| 281 | case ACL_DEL_SMAC_DIP_TCP: |
| 282 | case ACL_DEL_SMAC_DIP_UDP: |
| 283 | case ACL_ADD_SIP_DIP_ANY: |
| 284 | case ACL_ADD_SIP_DIP_TCP: |
| 285 | case ACL_ADD_SIP_DIP_UDP: |
| 286 | case ACL_ADD_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT: |
| 287 | case ACL_DEL_SIP_DIP_ANY: |
| 288 | case ACL_DEL_SIP_DIP_TCP: |
| 289 | case ACL_DEL_SIP_DIP_UDP: |
| 290 | case ACL_DEL_SMAC_DMAC_ETYPE_VID_SIP_DIP_TOS_PORT: |
| 291 | case ACL_CLEAN_TBL: |
| 292 | SetAclEntry(&args, method); |
| 293 | result = args.result; |
| 294 | break; |
| 295 | case ACL_GET_ALL_ENTRIES: |
| 296 | AclGetAllEntries(args2); |
| 297 | result = args2->result; |
| 298 | |
| 299 | printf("Total Entry Count = %d\n",args2->num_of_entries); |
| 300 | for(i=0;i<args2->num_of_entries;i++){ |
| 301 | printf("#%d :SMAC=%02X:%02X:%02X:%02X:%02X:%02X => DMAC=%02X:%02X:%02X:%02X:%02X:%02X PROTOCOL=0x%2x\n", \ |
| 302 | i, args2->entries[i].mac[0], args2->entries[i].mac[1], args2->entries[i].mac[2], \ |
| 303 | args2->entries[i].mac[3], args2->entries[i].mac[4], args2->entries[i].mac[5], \ |
| 304 | args2->entries[i].dmac[0], args2->entries[i].dmac[1],args2->entries[i].dmac[2], \ |
| 305 | args2->entries[i].dmac[3], args2->entries[i].dmac[4],args2->entries[i].dmac[5], \ |
| 306 | args2->entries[i].protocol); |
| 307 | |
| 308 | printf(" :SIP %u.%u.%u.%u->%u.%u.%u.%u=>DIP %u.%u.%u.%u->%u.%u.%u.%u SP %d->%d=>DP %d->%d TOS:0x%2x->0x%2x VID:%d ETYPE=0x%4x TCP_UDP=0/TCP=1/UDP=2:%d PN:%d\n\r", \ |
| 309 | NIPQUAD(args2->entries[i].sip_s), \ |
| 310 | NIPQUAD(args2->entries[i].sip_e), \ |
| 311 | NIPQUAD(args2->entries[i].dip_s), \ |
| 312 | NIPQUAD(args2->entries[i].dip_e), \ |
| 313 | args2->entries[i].sp_s, \ |
| 314 | args2->entries[i].sp_e, \ |
| 315 | args2->entries[i].dp_s, \ |
| 316 | args2->entries[i].dp_e, \ |
| 317 | args2->entries[i].tos_s, \ |
| 318 | args2->entries[i].tos_e, \ |
| 319 | args2->entries[i].vid, \ |
| 320 | args2->entries[i].ethertype, \ |
| 321 | args2->entries[i].L4, \ |
| 322 | args2->entries[i].pn); |
| 323 | } |
| 324 | break; |
| 325 | default: |
| 326 | result = ACL_FAIL; |
| 327 | } |
| 328 | |
| 329 | |
| 330 | if(result == ACL_SUCCESS) { |
| 331 | printf("done\n"); |
| 332 | }else if (result == ACL_TBL_FULL) { |
| 333 | printf("table full\n"); |
| 334 | } else { |
| 335 | printf("fail\n"); |
| 336 | } |
| 337 | |
| 338 | free(args2); |
| 339 | close(fd); |
| 340 | return 0; |
| 341 | } |