summaryrefslogtreecommitdiffstats
path: root/qa/test_filter.c
blob: 35fdbec0ff63591c27fd53dbbe9590fabedceb63 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
/*
 * Test for the filter API
 */

#include <stdio.h>
#include <errno.h>

#include <libnetfilter_conntrack/libnetfilter_conntrack.h>

static int event_cb(enum nf_conntrack_msg_type type,
		    struct nf_conntrack *ct,
		    void *data)
{
	static int n = 0;
	char buf[1024];

	nfct_snprintf(buf, sizeof(buf), ct, type, NFCT_O_PLAIN, NFCT_OF_TIME);
	printf("%s\n", buf);

	if (++n == 10)
		return NFCT_CB_STOP;

	return NFCT_CB_CONTINUE;
}

int main()
{
	int i, ret;
	struct nfct_handle *h;
	struct nfct_filter *filter;

	h = nfct_open(CONNTRACK, NF_NETLINK_CONNTRACK_NEW |
				 NF_NETLINK_CONNTRACK_UPDATE);
	if (!h) {
		perror("nfct_open");
		return 0;
	}

	filter = nfct_filter_create();
	if (!filter) {
		perror("nfct_create_filter");
		return 0;
	}

	if (nfct_filter_attach(nfct_fd(h), filter) == -1) {
		perror("nfct_filter_attach");
		return 0;
	}

	/* protocol 255 is skipped since we support up to 255 protocols max */
	for (i=0; i<IPPROTO_MAX; i++)
		nfct_filter_add_attr_u32(filter,NFCT_FILTER_L4PROTO,i);

	/* up to 127 IP addresses, above that adding is noop */
	for (i=0; i<128; i++) {
		/* BSF always wants data in host-byte order */
		struct nfct_filter_ipv4 fltr_ipv4 = {
			.addr = ntohl(inet_addr("127.0.0.1")) + i,
			.mask = 0xffffffff,
		};
		nfct_filter_add_attr(filter, NFCT_FILTER_SRC_IPV4, &fltr_ipv4);
	};

	if (nfct_filter_attach(nfct_fd(h), filter) == -1) {
		perror("nfct_filter_attach");
		return 0;
	}

	nfct_filter_destroy(filter);

	nfct_callback_register(h, NFCT_T_ALL, event_cb, NULL);

	ret = nfct_catch(h);
	printf("test ret=%d (%s)\n", ret, strerror(errno));
}