2 * Copyright (c) 2002-2003 Luigi Rizzo
3 * Copyright (c) 1996 Alex Nash, Paul Traina, Poul-Henning Kamp
4 * Copyright (c) 1994 Ugen J.S.Antsilevich
6 * Idea and grammar partially left from:
7 * Copyright (c) 1993 Daniel Boulet
9 * Redistribution and use in source forms, with and without modification,
10 * are permitted provided that this entire comment appears intact.
12 * Redistribution in binary form may occur without any restrictions.
13 * Obviously, it would be nice if you gave credit where credit is due
14 * but requiring it would be too onerous.
16 * This software is provided ``AS IS'' without any warranties of any kind.
18 * NEW command line interface for IP firewall facility
24 * Options that can be set on the command line.
25 * When reading commands from a file, a subset of the options can also
26 * be applied globally by specifying them before the file name.
27 * After that, each line can contain its own option that changes
29 * XXX The context is not restored after each line.
33 /* boolean options: */
34 int do_value_as_ip; /* show table value as IP */
35 int do_resolv; /* try to resolve all ip to names */
36 int do_time; /* Show time stamps */
37 int do_quiet; /* Be quiet in add and flush */
38 int do_pipe; /* this cmd refers to a pipe/queue/sched */
39 int do_nat; /* this cmd refers to a nat config */
40 int do_dynamic; /* display dynamic rules */
41 int do_expired; /* display expired dynamic rules */
42 int do_compact; /* show rules in compact mode */
43 int do_force; /* do not ask for confirmation */
44 int show_sets; /* display the set each rule belongs to */
45 int test_only; /* only check syntax */
46 int comment_only; /* only print action and comment */
47 int verbose; /* be verbose on some commands */
49 /* The options below can have multiple values. */
51 int do_sort; /* field to sort results (0 = no) */
52 /* valid fields are 1 and above */
54 int use_set; /* work with specified set number */
55 /* 0 means all sets, otherwise apply to set use_set - 1 */
59 extern struct cmdline_opts co;
62 * _s_x is a structure that stores a string <-> token pairs, used in
63 * various places in the parser. Entries are stored in arrays,
64 * with an entry with s=NULL as terminator.
65 * The search routines are match_token() and match_value().
66 * Often, an element with x=0 contains an error string.
120 TOK_DIVERTEDLOOPBACK,
170 /* dummynet tokens */
209 * the following macro returns an error message if we run out of
212 #define NEED(_p, msg) {if (!_p) errx(EX_USAGE, msg);}
213 #define NEED1(msg) {if (!(*av)) errx(EX_USAGE, msg);}
215 int pr_u64(uint64_t *pd, int width);
217 /* memory allocation support */
218 void *safe_calloc(size_t number, size_t size);
219 void *safe_realloc(void *ptr, size_t size);
221 /* string comparison functions used for historical compatibility */
222 int _substrcmp(const char *str1, const char* str2);
223 int _substrcmp2(const char *str1, const char* str2, const char* str3);
225 /* utility functions */
226 int match_token(struct _s_x *table, char *string);
227 char const *match_value(struct _s_x *p, int value);
229 int do_cmd(int optname, void *optval, uintptr_t optlen);
231 uint32_t ipfw_get_tables_max(void);
234 void n2mask(struct in6_addr *mask, int n);
235 int contigmask(uint8_t *p, int len);
238 * Forward declarations to avoid include way too many headers.
239 * C does not allow duplicated typedefs, so we use the base struct
240 * that the typedef points to.
241 * Should the typedefs use a different type, the compiler will
242 * still detect the change when compiling the body of the
243 * functions involved, so we do not lose error checking.
246 struct _ipfw_insn_altq;
247 struct _ipfw_insn_u32;
248 struct _ipfw_insn_ip6;
249 struct _ipfw_insn_icmp6;
252 * The reserved set numer. This is a constant in ip_fw.h
253 * but we store it in a variable so other files do not depend
254 * in that header just for one constant.
256 extern int resvd_set_number;
258 /* first-level command handlers */
259 void ipfw_add(char *av[]);
260 void ipfw_show_nat(int ac, char **av);
261 void ipfw_config_pipe(int ac, char **av);
262 void ipfw_config_nat(int ac, char **av);
263 void ipfw_sets_handler(char *av[]);
264 void ipfw_table_handler(int ac, char *av[]);
265 void ipfw_sysctl_handler(char *av[], int which);
266 void ipfw_delete(char *av[]);
267 void ipfw_flush(int force);
268 void ipfw_zero(int ac, char *av[], int optname);
269 void ipfw_list(int ac, char *av[], int show_counters);
272 void altq_set_enabled(int enabled);
273 u_int32_t altq_name_to_qid(const char *name);
275 void print_altq_cmd(struct _ipfw_insn_altq *altqptr);
278 void dummynet_list(int ac, char *av[], int show_counters);
279 void dummynet_flush(void);
280 int ipfw_delete_pipe(int pipe_or_queue, int n);
283 void print_unreach6_code(uint16_t code);
284 void print_ip6(struct _ipfw_insn_ip6 *cmd, char const *s);
285 void print_flow6id(struct _ipfw_insn_u32 *cmd);
286 void print_icmp6types(struct _ipfw_insn_u32 *cmd);
287 void print_ext6hdr(struct _ipfw_insn *cmd );
289 struct _ipfw_insn *add_srcip6(struct _ipfw_insn *cmd, char *av, int cblen);
290 struct _ipfw_insn *add_dstip6(struct _ipfw_insn *cmd, char *av, int cblen);
292 void fill_flow6(struct _ipfw_insn_u32 *cmd, char *av, int cblen);
293 void fill_unreach6_code(u_short *codep, char *str);
294 void fill_icmp6types(struct _ipfw_insn_icmp6 *cmd, char *av, int cblen);
295 int fill_ext6hdr(struct _ipfw_insn *cmd, char *av);