⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 ixethacccodeletswbridgefirewall.c

📁 intel IXP400系列cpu(2.3版)的库文件
💻 C
字号:
/** * @file IxEthAccCodeletSwBridgeFirewall.c * * @date 22 April 2004 * * @brief This file contains the implementation of the Ethernet Access  * Codelet that implements a simple bridge between two Ethernet ports  * with a Firewall set at the NPE level. *  * @par * IXP400 SW Release version 2.3 *  * -- Copyright Notice -- *  * @par * Copyright (c) 2001-2005, Intel Corporation. * All rights reserved. *  * @par * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the Intel Corporation nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. *  *  * @par * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS ``AS IS'' * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. *  *  * @par * -- End of Copyright Notice --*//* * Put the system defined include files required. */#include "IxOsal.h"/* * Put the user defined include files required. */#include "IxEthAcc.h"#include "IxEthDB.h"#include "IxEthAccCodelet.h"#include "IxEthAccCodelet_p.h"/* * Number of MAC Addresses to add to the Firewall Database */#define IX_ETHACC_CODELET_FIREWALL_ADDRESS_COUNT (17)/* * Base Firewall MAC address to add to the Firewall Database. A total of * IX_ETHACC_CODELET_FIREWALL_ADDRESS_COUNT addresses incrementing from * this one will be added to the database */PRIVATE IxEthDBMacAddr ixEthAccCodeletFirewallMacAddress = {{0,0,11,22,33,0}};PRIVATE IxEthDBMacAddr ixEthAccCodeletFirewallMacMask = {{0xff,0xff,0xff,0xff,0xff,0xff}};/* * Function definition: ixEthAccCodeletSwBridgeFirewallStart() * * Configure the Firewall and start the bridge datapath */IX_STATUS ixEthAccCodeletSwBridgeFirewallStart(IxEthAccPortId firstPortId, 					       IxEthAccPortId secondPortId){    UINT32 firstPortCbTag = firstPortId | (secondPortId << 16);    UINT32 secondPortCbTag = secondPortId | (firstPortId << 16);    UINT32 addressCount;    UINT32 i;    IxEthDBMacAddr macAddr;    IxEthDBFeature featureSet1 = 0;    IxEthDBFeature featureSet2 = 0;    if (firstPortId == secondPortId)    {	printf("SwBridgeFirewall: Cannot configure a Bridge Firewall Operation between port %u and port %u (ports must be different)\n",	       firstPortId,                secondPortId);	return (IX_FAIL);    }   /* Configure the 2 ports, register the tx & rx callbacks */    if ( ixEthAccCodeletPortConfigure(firstPortId, 				      ixEthAccCodeletBridgeRxCB, 				      (IxEthAccPortMultiBufferRxCallback) NULL,				      ixEthAccCodeletBridgeTxCB,				      firstPortCbTag) != IX_SUCCESS)    {	printf("SwBridgeFirewall: Failed to configure Port %u\n",	       firstPortId);	return (IX_FAIL);    }    if ( ixEthAccCodeletPortConfigure(secondPortId, 				      ixEthAccCodeletBridgeRxCB, 				      NULL,				      ixEthAccCodeletBridgeTxCB,				      secondPortCbTag) != IX_SUCCESS)    {	printf("SwBridgeFirewall: Failed to configure Port %u\n",	       secondPortId);	return (IX_FAIL);    }    /* Enable the Firewall Feature in EthDB for each port but first      * check that the Firmware downloaded to the NPE can support it     */    ixEthDBFeatureCapabilityGet((IxEthDBPortId)firstPortId, &featureSet1);        if ((featureSet1 & IX_ETH_DB_FIREWALL) == 0)    {	printf("SwBridgeFirewall: Port %u NPE image not firewall capable\n",	       firstPortId);	return (IX_FAIL);    }    if ( ixEthDBFeatureEnable((IxEthDBPortId)firstPortId, 			      IX_ETH_DB_FIREWALL,			      TRUE) != IX_ETH_DB_SUCCESS )    {	printf("SwBridgeFirewall: Failed to enable the firewall on port %u\n",	       firstPortId);	return (IX_FAIL);    }    /* Repeat for the second port */    ixEthDBFeatureCapabilityGet((IxEthDBPortId)secondPortId, &featureSet2);        if ((featureSet2 & IX_ETH_DB_FIREWALL) == 0)    {	printf("SwBridgeFirewall: Port %u NPE image not firewall capable\n",	       secondPortId);	return (IX_FAIL);    }    if ( ixEthDBFeatureEnable((IxEthDBPortId)secondPortId, 			      IX_ETH_DB_FIREWALL,			      TRUE) != IX_ETH_DB_SUCCESS)    {	printf("SwBridgeFirewall: Failed to enable the firewall on port %u\n", 	       secondPortId);	return (IX_FAIL);    }    /* Enable the Port in EthDB in order to configure and download the     * Firewall Database      */     if ((ixEthDBPortEnable(firstPortId)) != IX_ETH_DB_SUCCESS)    {        printf("SwBridgeFirewall: Cannot enable port %u\n", firstPortId);        return (IX_FAIL);    }    if ((ixEthDBPortEnable(secondPortId)) != IX_ETH_DB_SUCCESS)    {        printf("SwBridgeFirewall: Cannot enable port %u\n", secondPortId);        return (IX_FAIL);    }        /* generate a list of incremented MAC addresses to add to the      * firewall database     */    /* Non mask-based firewall */     for (addressCount = 0; 	 addressCount < IX_ETHACC_CODELET_FIREWALL_ADDRESS_COUNT;	 addressCount++)      {        /* Add firewall entry for first port */	if ((featureSet1 & IX_ETH_DB_ADDRESS_MASKING) == 0)	  {	    memcpy( macAddr.macAddress,		    ixEthAccCodeletFirewallMacAddress.macAddress,		    IX_IEEE803_MAC_ADDRESS_SIZE);	    macAddr.macAddress[IX_IEEE803_MAC_ADDRESS_SIZE-1] = (UINT8)addressCount;		    if (ixEthDBFirewallEntryAdd(firstPortId, &macAddr)		!= IX_ETH_DB_SUCCESS)	      {		printf("SwBridgeFirewall: Failed to add an Entry for Port %u\n", 		       firstPortId);		return (IX_FAIL);	      }	  }	else	  {	    ixEthAccCodeletFirewallMacAddress.macAddress[IX_IEEE803_MAC_ADDRESS_SIZE-1]	      = (UINT8)addressCount;	    for (i = 0; i < IX_IEEE803_MAC_ADDRESS_SIZE; i++)	      {		macAddr.macAddress[i] = ixEthAccCodeletFirewallMacAddress.macAddress[i] & 		  ixEthAccCodeletFirewallMacMask.macAddress[i];	      }            	    	    if (ixEthDBFirewallMaskedEntryAdd(firstPortId, &macAddr, &ixEthAccCodeletFirewallMacMask)		!= IX_ETH_DB_SUCCESS)	      {		printf("SwBridgeFirewall: Failed to add an masked Entry for Port %u\n", 		       firstPortId);		return (IX_FAIL);	      }	  }        /* Add firewall entry for second port */	if ((featureSet2 & IX_ETH_DB_ADDRESS_MASKING) == 0)	  {	    memcpy( macAddr.macAddress,		    ixEthAccCodeletFirewallMacAddress.macAddress,		    IX_IEEE803_MAC_ADDRESS_SIZE);	    macAddr.macAddress[IX_IEEE803_MAC_ADDRESS_SIZE-1] = (UINT8)addressCount;		    if (ixEthDBFirewallEntryAdd(secondPortId, &macAddr)		!= IX_ETH_DB_SUCCESS)	      {		printf("SwBridgeFirewall: Failed to add an Entry for Port %u\n", 		       secondPortId);		return (IX_FAIL);	      }	  }	else	  {	    ixEthAccCodeletFirewallMacAddress.macAddress[IX_IEEE803_MAC_ADDRESS_SIZE-1]	      = (UINT8)addressCount;	    for (i = 0; i < IX_IEEE803_MAC_ADDRESS_SIZE; i++)	      {		macAddr.macAddress[i] = ixEthAccCodeletFirewallMacAddress.macAddress[i] & 		  ixEthAccCodeletFirewallMacMask.macAddress[i];	      }            	    	    if (ixEthDBFirewallMaskedEntryAdd(secondPortId, &macAddr, &ixEthAccCodeletFirewallMacMask)		!= IX_ETH_DB_SUCCESS)	      {		printf("SwBridgeFirewall: Failed to add an masked Entry for Port %u\n", 		       firstPortId);		return (IX_FAIL);	      }	  }	if ((featureSet1 & IX_ETH_DB_ADDRESS_MASKING) == 0)	  {            printf("Mac Address = "); 	    	    for (i = 0; i < IX_IEEE803_MAC_ADDRESS_SIZE; i++)	      {		printf("%2.2x:", (UINT32)macAddr.macAddress[i]);	      }	    	    printf(" added to the white list\n");	  }	else	  {            printf("Mac Address = ");	    for (i = 0; i < IX_IEEE803_MAC_ADDRESS_SIZE; i++)	      {		printf("%2.2x:", (UINT32)macAddr.macAddress[i]);	      }            printf("  Mac Mask = ");	    for (i = 0; i < IX_IEEE803_MAC_ADDRESS_SIZE; i++)	      {		printf("%2.2x:", (UINT32)ixEthAccCodeletFirewallMacMask.macAddress[i]);	      }	    	    printf(" added to the white list\n");	  } 	      }        printf("Download the firewall table to the NPEs ...\n");    if (ixEthDBFirewallTableDownload(firstPortId)	!= IX_ETH_DB_SUCCESS)    {	printf("SwBridgeFirewall: Failed to download the Firewall DB for port %u\n",	       firstPortId);	return (IX_FAIL);    }    if (ixEthDBFirewallTableDownload(secondPortId)	!= IX_ETH_DB_SUCCESS)    {	printf("SwBridgeFirewall: Failed to download the Firewall DB for port %u\n", 	       secondPortId);	return (IX_FAIL);    }    /* Setup the firewall mode */        if (ixEthDBFirewallModeSet(firstPortId, 			       IX_ETH_DB_FIREWALL_WHITE_LIST)	!= IX_ETH_DB_SUCCESS)    {	printf("SwBridgeFirewall: Failed to set the Firewall mode for port %u\n", firstPortId);	return (IX_FAIL);    }    if (ixEthDBFirewallModeSet(secondPortId, 			       IX_ETH_DB_FIREWALL_WHITE_LIST)	!= IX_ETH_DB_SUCCESS)    {	printf("SwBridgeFirewall: Failed to set the Firewall mode for port %u\n", secondPortId);	return (IX_FAIL);    }    /* Allow traffic to pass by enabling both ports, that is if the incoming     * destination MAC address is in the Firewall database      */    if ( ixEthAccPortEnable(firstPortId) != IX_SUCCESS)    {	printf("SwBridgeFirewall: Failed to enable Port %u\n", firstPortId);	return (IX_FAIL);    }    if ( ixEthAccPortEnable(secondPortId) != IX_SUCCESS)    {	printf("SwBridgeFirewall: Failed to enable Port %u\n", secondPortId);	return (IX_FAIL);    }    return (IX_SUCCESS);}/* * Function definition: ixEthAccCodeletSwBridgeFirewallStop() * * Unconfigure Firewall and Stop bridge datapath */IX_STATUS ixEthAccCodeletSwBridgeFirewallStop(IxEthAccPortId firstPortId, 					      IxEthAccPortId secondPortId){    /* Stop the data bridge */    if (ixEthAccCodeletSwBridgeStop(firstPortId, secondPortId) 	!= IX_SUCCESS)    {	printf("SwBridgeFirewall: Failed to unconfigure the bridge ports\n");	return (IX_FAIL);    }    /* Enable the EthDB ports to clear the firewall configuration */    if ((ixEthDBPortEnable(firstPortId)) != IX_ETH_DB_SUCCESS)    {        printf("SwBridgeFirewall: Cannot enable port %u\n", firstPortId);        return (IX_FAIL);    }    if ((ixEthDBPortEnable(secondPortId)) != IX_ETH_DB_SUCCESS)    {        printf("SwBridgeFirewall: Cannot enable port %u\n", secondPortId);        return (IX_FAIL);    }        printf("Clear the firewall databases on both NPEs\n");       if (ixEthDBDatabaseClear(firstPortId, 			     IX_ETH_DB_FIREWALL_RECORD)	!= IX_ETH_DB_SUCCESS)    {	printf("SwBridgeFirewall: Fail to clear the Firewall database for port %u\n", 	       firstPortId);	return (IX_FAIL);    }    if (ixEthDBDatabaseClear(secondPortId, 			     IX_ETH_DB_FIREWALL_RECORD)	!= IX_ETH_DB_SUCCESS)    {	printf("SwBridgeFirewall: Fail to clear the Firewall database for port %u\n", 	       secondPortId);	return (IX_FAIL);    }    /* Disable the Firewall Feature to return to the initial processing     * capabilities     */    if ( ixEthDBFeatureEnable((IxEthDBPortId) firstPortId, 			      IX_ETH_DB_FIREWALL, 			      FALSE) != IX_ETH_DB_SUCCESS )    {	printf("SwBridgeFirewall: Failed to disable the Firewall Feature for port %u\n", 	       firstPortId);	return (IX_FAIL);    }    if ( ixEthDBFeatureEnable((IxEthDBPortId) secondPortId, 			      IX_ETH_DB_FIREWALL, 			      FALSE) != IX_ETH_DB_SUCCESS )    {	printf("SwBridgeFirewall: Failed to disable the Firewall Feature for port %u\n",	       secondPortId);	return (IX_FAIL);    }    /* disable the ethDB port */    if ((ixEthDBPortDisable(firstPortId)) != IX_ETH_DB_SUCCESS)    {        printf("SwBridgeFirewall: Cannot disable port %u\n", firstPortId);        return (IX_FAIL);    }    if ((ixEthDBPortDisable(secondPortId)) != IX_ETH_DB_SUCCESS)    {        printf("SwBridgeFirewall: Cannot disable port %u\n", secondPortId);        return (IX_FAIL);    }        return (IX_SUCCESS);}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -