2 * Copyright (c) 2002-2003 Luigi Rizzo
3 * Copyright (c) 1996 Alex Nash, Paul Traina, Poul-Henning Kamp
4 * Copyright (c) 1994 Ugen J.S.Antsilevich
6 * Idea and grammar partially left from:
7 * Copyright (c) 1993 Daniel Boulet
9 * Redistribution and use in source forms, with and without modification,
10 * are permitted provided that this entire comment appears intact.
12 * Redistribution in binary form may occur without any restrictions.
13 * Obviously, it would be nice if you gave credit where credit is due
14 * but requiring it would be too onerous.
16 * This software is provided ``AS IS'' without any warranties of any kind.
18 * NEW command line interface for IP firewall facility
20 * $FreeBSD: user/luigi/ipfw3-head/sbin/ipfw/ipfw2.h 203280 2010-01-31 12:21:20Z luigi $
24 * Options that can be set on the command line.
25 * When reading commands from a file, a subset of the options can also
26 * be applied globally by specifying them before the file name.
27 * After that, each line can contain its own option that changes
29 * XXX The context is not restored after each line.
33 /* boolean options: */
34 int do_value_as_ip; /* show table value as IP */
35 int do_resolv; /* try to resolve all ip to names */
36 int do_time; /* Show time stamps */
37 int do_quiet; /* Be quiet in add and flush */
38 int do_pipe; /* this cmd refers to a pipe/queue/sched */
39 int do_nat; /* this cmd refers to a nat config */
40 int do_dynamic; /* display dynamic rules */
41 int do_expired; /* display expired dynamic rules */
42 int do_compact; /* show rules in compact mode */
43 int do_force; /* do not ask for confirmation */
44 int show_sets; /* display the set each rule belongs to */
45 int test_only; /* only check syntax */
46 int comment_only; /* only print action and comment */
47 int verbose; /* be verbose on some commands */
49 /* The options below can have multiple values. */
51 int do_sort; /* field to sort results (0 = no) */
52 /* valid fields are 1 and above */
54 int use_set; /* work with specified set number */
55 /* 0 means all sets, otherwise apply to set use_set - 1 */
59 extern struct cmdline_opts co;
62 * _s_x is a structure that stores a string <-> token pairs, used in
63 * various places in the parser. Entries are stored in arrays,
64 * with an entry with s=NULL as terminator.
65 * The search routines are match_token() and match_value().
66 * Often, an element with x=0 contains an error string.
118 TOK_DIVERTEDLOOPBACK,
168 /* dummynet tokens */
204 * the following macro returns an error message if we run out of
207 #define NEED(_p, msg) {if (!_p) errx(EX_USAGE, msg);}
208 #define NEED1(msg) {if (!(*av)) errx(EX_USAGE, msg);}
210 unsigned long long align_uint64(const uint64_t *pll);
212 /* memory allocation support */
213 void *safe_calloc(size_t number, size_t size);
214 void *safe_realloc(void *ptr, size_t size);
216 /* string comparison functions used for historical compatibility */
217 int _substrcmp(const char *str1, const char* str2);
218 int _substrcmp2(const char *str1, const char* str2, const char* str3);
220 /* utility functions */
221 int match_token(struct _s_x *table, char *string);
222 char const *match_value(struct _s_x *p, int value);
224 int do_cmd(int optname, void *optval, uintptr_t optlen);
227 void n2mask(struct in6_addr *mask, int n);
228 int contigmask(uint8_t *p, int len);
231 * Forward declarations to avoid include way too many headers.
232 * C does not allow duplicated typedefs, so we use the base struct
233 * that the typedef points to.
234 * Should the typedefs use a different type, the compiler will
235 * still detect the change when compiling the body of the
236 * functions involved, so we do not lose error checking.
239 struct _ipfw_insn_altq;
240 struct _ipfw_insn_u32;
241 struct _ipfw_insn_ip6;
242 struct _ipfw_insn_icmp6;
245 * The reserved set numer. This is a constant in ip_fw.h
246 * but we store it in a variable so other files do not depend
247 * in that header just for one constant.
249 extern int resvd_set_number;
251 /* first-level command handlers */
252 void ipfw_add(char *av[]);
253 void ipfw_show_nat(int ac, char **av);
254 void ipfw_config_pipe(int ac, char **av);
255 void ipfw_config_nat(int ac, char **av);
256 void ipfw_sets_handler(char *av[]);
257 void ipfw_table_handler(int ac, char *av[]);
258 void ipfw_sysctl_handler(char *av[], int which);
259 void ipfw_delete(char *av[]);
260 void ipfw_flush(int force);
261 void ipfw_zero(int ac, char *av[], int optname);
262 void ipfw_list(int ac, char *av[], int show_counters);
265 void altq_set_enabled(int enabled);
266 u_int32_t altq_name_to_qid(const char *name);
268 void print_altq_cmd(struct _ipfw_insn_altq *altqptr);
271 void dummynet_list(int ac, char *av[], int show_counters);
272 void dummynet_flush(void);
273 int ipfw_delete_pipe(int pipe_or_queue, int n);
276 void print_unreach6_code(uint16_t code);
277 void print_ip6(struct _ipfw_insn_ip6 *cmd, char const *s);
278 void print_flow6id(struct _ipfw_insn_u32 *cmd);
279 void print_icmp6types(struct _ipfw_insn_u32 *cmd);
280 void print_ext6hdr(struct _ipfw_insn *cmd );
282 struct _ipfw_insn *add_srcip6(struct _ipfw_insn *cmd, char *av);
283 struct _ipfw_insn *add_dstip6(struct _ipfw_insn *cmd, char *av);
285 void fill_flow6(struct _ipfw_insn_u32 *cmd, char *av );
286 void fill_unreach6_code(u_short *codep, char *str);
287 void fill_icmp6types(struct _ipfw_insn_icmp6 *cmd, char *av);
288 int fill_ext6hdr(struct _ipfw_insn *cmd, char *av);