PROJECT(firewall3 C)
ADD_DEFINITIONS(-Os -Wall -Werror --std=gnu99 -g3 -Wmissing-declarations)
+SET(iptc_libs ip4tc)
+
SET(sed_match "^[[:space:]]*__ipt_module(\\(.*\\)).*")
SET(sed_replace "-Wl,--undefined=libxt_\\1_init -Wl,--undefined=libipt_\\1_init -Wl,--undefined=libip6t_\\1_init")
LIST(APPEND ext_libs ext4)
ENDIF()
-IF (EXISTS "${CMAKE_SOURCE_DIR}/libext6.a")
- ADD_LIBRARY(ext6 STATIC IMPORTED)
- SET_PROPERTY(TARGET ext6 PROPERTY IMPORTED_LOCATION "${CMAKE_SOURCE_DIR}/libext6.a")
- LIST(APPEND ext_libs ext6)
+IF (NOT DISABLE_IPV6)
+ IF (EXISTS "${CMAKE_SOURCE_DIR}/libext6.a")
+ ADD_LIBRARY(ext6 STATIC IMPORTED)
+ SET_PROPERTY(TARGET ext6 PROPERTY IMPORTED_LOCATION "${CMAKE_SOURCE_DIR}/libext6.a")
+ LIST(APPEND ext_libs ext6)
+ ENDIF()
+ LIST(APPEND iptc_libs ip6tc)
+ELSE()
+ ADD_DEFINITIONS(-DDISABLE_IPV6)
ENDIF()
ADD_EXECUTABLE(firewall3 main.c options.c defaults.c zones.c forwards.c rules.c redirects.c utils.c ubus.c ipsets.c includes.c iptables.c)
-TARGET_LINK_LIBRARIES(firewall3 uci ubox ubus ip4tc ip6tc xtables m ${ext_libs})
+TARGET_LINK_LIBRARIES(firewall3 uci ubox ubus xtables m ${iptc_libs} ${ext_libs})
SET(CMAKE_INSTALL_PREFIX /usr)
kernel_version = 0x10000 * x + 0x100 * y + z;
}
+#ifdef DISABLE_IPV6
+#undef __ipt_module
+#define __ipt_module(x) libxt_##x##_init, libipt_##x##_init,
+#else
#undef __ipt_module
#define __ipt_module(x) libxt_##x##_init, libipt_##x##_init, libip6t_##x##_init,
+#endif
static void fw3_init_extensions(void)
{
if (family == FW3_FAMILY_V6)
{
+#ifndef DISABLE_IPV6
h->family = FW3_FAMILY_V6;
h->table = table;
h->handle = ip6tc_init(fw3_flag_names[table]);
xtables_set_params(&xtg6);
xtables_set_nfproto(NFPROTO_IPV6);
+#endif
}
else
{
if (fw3_pr_debug)
debug(h, "-P %s %s\n", chain, fw3_flag_names[policy]);
+#ifndef DISABLE_IPV6
if (h->family == FW3_FAMILY_V6)
ip6tc_set_policy(chain, fw3_flag_names[policy], NULL, h->handle);
else
+#endif
iptc_set_policy(chain, fw3_flag_names[policy], NULL, h->handle);
}
debug(h, "-X %s\n", chain);
}
+#ifndef DISABLE_IPV6
if (h->family == FW3_FAMILY_V6)
{
if (ip6tc_flush_entries(chain, h->handle))
ip6tc_delete_chain(chain, h->handle);
}
else
+#endif
{
if (iptc_flush_entries(chain, h->handle))
iptc_delete_chain(chain, h->handle);
{
unsigned int num;
const struct ipt_entry *e;
- const struct ip6t_entry *e6;
const char *chain;
const char *t;
bool found;
+#ifndef DISABLE_IPV6
if (h->family == FW3_FAMILY_V6)
{
for (chain = ip6tc_first_chain(h->handle);
do {
found = false;
+ const struct ip6t_entry *e6;
for (num = 0, e6 = ip6tc_first_rule(chain, h->handle);
e6 != NULL;
num++, e6 = ip6tc_next_rule(e6, h->handle))
}
}
else
+#endif
{
for (chain = iptc_first_chain(h->handle);
chain != NULL;
{
const char *chain;
+#ifndef DISABLE_IPV6
if (h->family == FW3_FAMILY_V6)
{
for (chain = ip6tc_first_chain(h->handle);
}
}
else
+#endif
{
for (chain = iptc_first_chain(h->handle);
chain != NULL;
{
int rv;
+#ifndef DISABLE_IPV6
if (h->family == FW3_FAMILY_V6)
{
rv = ip6tc_commit(h->handle);
fprintf(stderr, "ip6tc_commit(): %s\n", ip6tc_strerror(errno));
}
else
+#endif
{
rv = iptc_commit(h->handle);
if (!rv)
static bool
is_chain(struct fw3_ipt_handle *h, const char *name)
{
+#ifndef DISABLE_IPV6
if (h->family == FW3_FAMILY_V6)
return ip6tc_is_chain(name, h->handle);
else
+#endif
return iptc_is_chain(name, h->handle);
}
pr = proto->protocol;
+#ifndef DISABLE_IPV6
if (r->h->family == FW3_FAMILY_V6)
{
if (pr == 1)
r->e6.ipv6.invflags |= XT_INV_PROTO;
}
else
+#endif
{
r->e.ip.proto = pr;
fw3_ipt_rule_in_out(struct fw3_ipt_rule *r,
struct fw3_device *in, struct fw3_device *out)
{
+#ifndef DISABLE_IPV6
if (r->h->family == FW3_FAMILY_V6)
{
if (in && !in->any)
}
}
else
+#endif
{
if (in && !in->any)
{
mask->s_addr = htonl(~((1 << (32 - prefix)) - 1));
}
+#ifndef DISABLE_IPV6
static void
ip6prefix2mask(int prefix, struct in6_addr *mask)
{
memset(mask, 0, sizeof(*mask));
}
}
+#endif
void
fw3_ipt_rule_src_dest(struct fw3_ipt_rule *r,
struct fw3_address *src, struct fw3_address *dest)
{
- int i;
-
if ((src && src->range) || (dest && dest->range))
{
fw3_ipt_rule_addarg(r, false, "-m", "iprange");
fw3_ipt_rule_addarg(r, src->invert, "--src-range",
fw3_address_to_string(src, false));
}
+#ifndef DISABLE_IPV6
else if (r->h->family == FW3_FAMILY_V6)
{
r->e6.ipv6.src = src->address.v6;
ip6prefix2mask(src->mask, &r->e6.ipv6.smsk);
+ int i;
for (i = 0; i < 4; i++)
r->e6.ipv6.src.s6_addr32[i] &= r->e6.ipv6.smsk.s6_addr32[i];
if (src->invert)
r->e6.ipv6.invflags |= IP6T_INV_SRCIP;
}
+#endif
else
{
r->e.ip.src = src->address.v4;
fw3_ipt_rule_addarg(r, dest->invert, "--dst-range",
fw3_address_to_string(dest, false));
}
+#ifndef DISABLE_IPV6
else if (r->h->family == FW3_FAMILY_V6)
{
r->e6.ipv6.dst = dest->address.v6;
ip6prefix2mask(dest->mask, &r->e6.ipv6.dmsk);
+ int i;
for (i = 0; i < 4; i++)
r->e6.ipv6.dst.s6_addr32[i] &= r->e6.ipv6.dmsk.s6_addr32[i];
if (dest->invert)
r->e6.ipv6.invflags |= IP6T_INV_DSTIP;
}
+#endif
else
{
r->e.ip.dst = dest->address.v4;
if (!icmp)
return;
+#ifndef DISABLE_IPV6
if (r->h->family == FW3_FAMILY_V6)
{
if (icmp->code6_min == 0 && icmp->code6_max == 0xFF)
fw3_ipt_rule_addarg(r, icmp->invert, "--icmpv6-type", buf);
}
else
+#endif
{
if (icmp->code_min == 0 && icmp->code_max == 0xFF)
sprintf(buf, "%u", icmp->type);
free(s);
}
+#ifndef DISABLE_IPV6
static void
rule_print6(struct ip6t_entry *e)
{
xtables_ip6mask_to_cidr(&e->ipv6.dmsk));
}
}
+#endif
static void
rule_print4(struct ipt_entry *e)
debug(r->h, "-A %s", chain);
+#ifndef DISABLE_IPV6
if (r->h->family == FW3_FAMILY_V6)
rule_print6(&r->e6);
else
+#endif
rule_print4(&r->e);
for (rm = r->matches; rm; rm = rm->next)
struct xtables_target *et;
struct xtables_globals *g;
struct ipt_entry *e;
- struct ip6t_entry *e6;
int i, optc;
bool inv = false;
if (fw3_pr_debug)
rule_print(r, buf);
+#ifndef DISABLE_IPV6
if (r->h->family == FW3_FAMILY_V6)
{
+ struct ip6t_entry *e6;
+
s = XT_ALIGN(sizeof(struct ip6t_entry));
for (m = r->matches; m; m = m->next)
free(e6);
}
else
+#endif
{
s = XT_ALIGN(sizeof(struct ipt_entry));