summaryrefslogtreecommitdiffstats
path: root/examples/nft-set-add.c
diff options
context:
space:
mode:
authorPablo Neira Ayuso <pablo@netfilter.org>2013-02-02 11:38:46 +0100
committerPablo Neira Ayuso <pablo@netfilter.org>2013-02-03 20:31:53 +0100
commitd07d9c1911739037be2db1d54a59aadf5c2d4adc (patch)
tree2db0c8dd1ec24c7f2efdd6e73f20a72e6381e042 /examples/nft-set-add.c
parent3ed3c75a9a7a25ba9e8773e8830ab5b3914ef51b (diff)
set: complete support
Including examples. Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
Diffstat (limited to 'examples/nft-set-add.c')
-rw-r--r--examples/nft-set-add.c109
1 files changed, 109 insertions, 0 deletions
diff --git a/examples/nft-set-add.c b/examples/nft-set-add.c
new file mode 100644
index 0000000..afc37c5
--- /dev/null
+++ b/examples/nft-set-add.c
@@ -0,0 +1,109 @@
+/*
+ * (C) 2013 by Pablo Neira Ayuso <pablo@netfilter.org>
+ *
+ * This program is free software; you can redistribute it and/or modify it
+ * under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ *
+ * This software has been sponsored by Sophos Astaro <http://www.sophos.com>
+ */
+
+#include <stdlib.h>
+#include <time.h>
+#include <string.h>
+#include <netinet/in.h>
+
+#include <linux/netfilter/nf_tables.h>
+
+#include <libmnl/libmnl.h>
+#include <libnftables/table.h>
+#include <libnftables/set.h>
+
+int main(int argc, char *argv[])
+{
+ struct mnl_socket *nl;
+ char buf[MNL_SOCKET_BUFFER_SIZE];
+ struct nlmsghdr *nlh;
+ uint32_t portid, seq, family;
+ struct nft_set *t = NULL;
+ int ret;
+
+ if (argc != 4) {
+ fprintf(stderr, "%s <family> <table> <set>\n", argv[0]);
+ exit(EXIT_FAILURE);
+ }
+
+ t = nft_set_alloc();
+ if (t == NULL) {
+ perror("OOM");
+ exit(EXIT_FAILURE);
+ }
+
+ seq = time(NULL);
+ if (strcmp(argv[1], "ip") == 0)
+ family = AF_INET;
+ else if (strcmp(argv[1], "ip6") == 0)
+ family = AF_INET6;
+ else if (strcmp(argv[1], "bridge") == 0)
+ family = AF_BRIDGE;
+ else {
+ fprintf(stderr, "Unknown family: ip, ip6, bridge\n");
+ exit(EXIT_FAILURE);
+ }
+
+ nft_set_attr_set(t, NFT_SET_ATTR_TABLE, argv[2]);
+ nft_set_attr_set(t, NFT_SET_ATTR_NAME, argv[3]);
+ /* destroy set when the rule is destroyed, elements canno change */
+ nft_set_attr_set_u32(t, NFT_SET_ATTR_FLAGS, NFT_SET_ANONYMOUS |
+ NFT_SET_CONSTANT);
+ /* This key is only used by user-space to interpret key type */
+ nft_set_attr_set_u32(t, NFT_SET_ATTR_KEY_TYPE, 0);
+ /* key is 4 bytes long */
+ nft_set_attr_set_u32(t, NFT_SET_ATTR_KEY_LEN, 4);
+ /*
+ * data type and data length only useful for mapping (1:1):
+ * matching -> action.
+ *
+ * This data is only used by user-space to interpret data type.
+ */
+ // nft_set_attr_set_u32(t, NFT_SET_ATTR_DATA_TYPE, NFT_DATA_VERDICT);
+ // nft_set_attr_set_u32(t, NFT_SET_ATTR_DATA_LEN, 4);
+
+ nlh = nft_set_nlmsg_build_hdr(buf, NFT_MSG_NEWSET, family,
+ NLM_F_CREATE|NLM_F_EXCL|NLM_F_ACK, seq);
+ nft_set_nlmsg_build_payload(nlh, t);
+ nft_set_free(t);
+
+ nl = mnl_socket_open(NETLINK_NETFILTER);
+ if (nl == NULL) {
+ perror("mnl_socket_open");
+ exit(EXIT_FAILURE);
+ }
+
+ if (mnl_socket_bind(nl, 0, MNL_SOCKET_AUTOPID) < 0) {
+ perror("mnl_socket_bind");
+ exit(EXIT_FAILURE);
+ }
+ portid = mnl_socket_get_portid(nl);
+
+ if (mnl_socket_sendto(nl, nlh, nlh->nlmsg_len) < 0) {
+ perror("mnl_socket_send");
+ exit(EXIT_FAILURE);
+ }
+
+ ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+ while (ret > 0) {
+ ret = mnl_cb_run(buf, ret, seq, portid, NULL, NULL);
+ if (ret <= 0)
+ break;
+ ret = mnl_socket_recvfrom(nl, buf, sizeof(buf));
+ }
+ if (ret == -1) {
+ perror("error");
+ exit(EXIT_FAILURE);
+ }
+ mnl_socket_close(nl);
+
+ return EXIT_SUCCESS;
+}