Raise WARNS to 6 and fix resulting warnings.
[dragonfly.git] / contrib / ipfilter / samples / userauth.c
blob5b50a94afd2e8f3107868ac8ec1ba03c006c6553
1 #include <sys/types.h>
2 #include <sys/socket.h>
3 #include <fcntl.h>
4 #include <sys/ioctl.h>
5 #include <stdio.h>
6 #include <stdlib.h>
7 #include <netinet/in.h>
8 #include <net/if.h>
9 #include "ip_compat.h"
10 #include "ip_fil.h"
11 #include "ip_auth.h"
13 extern int errno;
15 main()
17 struct frauth fra;
18 struct frauth *frap = &fra;
19 fr_info_t *fin = &fra.fra_info;
20 fr_ip_t *fi = &fin->fin_fi;
21 char yn[16];
22 int fd;
24 fd = open(IPL_AUTH, O_RDWR);
25 while (ioctl(fd, SIOCAUTHW, &frap) == 0) {
26 if (fra.fra_info.fin_out)
27 fra.fra_pass = FR_OUTQUE;
28 else
29 fra.fra_pass = FR_INQUE;
31 printf("%s ", inet_ntoa(fi->fi_src));
32 if (fi->fi_fl & FI_TCPUDP)
33 printf("port %d ", fin->fin_data[0]);
34 printf("-> %s ", inet_ntoa(fi->fi_dst));
35 if (fi->fi_fl & FI_TCPUDP)
36 printf("port %d ", fin->fin_data[1]);
37 printf("\n");
38 printf("Allow packet through ? [y/n]");
39 fflush(stdout);
40 if (!fgets(yn, sizeof(yn), stdin))
41 break;
42 fflush(stdin);
43 if (yn[0] == 'n' || yn[0] == 'N')
44 fra.fra_pass |= FR_BLOCK;
45 else if (yn[0] == 'y' || yn[0] == 'Y') {
46 fra.fra_pass |= FR_PASS;
47 if (fra.fra_info.fin_fi.fi_fl & FI_TCPUDP)
48 fra.fra_pass |= FR_KEEPSTATE;
49 } else
50 fra.fra_pass |= FR_NOMATCH;
51 printf("answer = %c (%x), id %d idx %d\n", yn[0],
52 fra.fra_pass, fra.fra_info.fin_id, fra.fra_index);
53 if (ioctl(fd, SIOCAUTHR, &frap) != 0)
54 perror("SIOCAUTHR");
56 fprintf(stderr, "errno=%d \n", errno);
57 perror("frauth-SIOCAUTHW");