2 * Copyright (c) 2002-2003 Luigi Rizzo
3 * Copyright (c) 1996 Alex Nash, Paul Traina, Poul-Henning Kamp
4 * Copyright (c) 1994 Ugen J.S.Antsilevich
6 * Idea and grammar partially left from:
7 * Copyright (c) 1993 Daniel Boulet
9 * Redistribution and use in source forms, with and without modification,
10 * are permitted provided that this entire comment appears intact.
12 * Redistribution in binary form may occur without any restrictions.
13 * Obviously, it would be nice if you gave credit where credit is due
14 * but requiring it would be too onerous.
16 * This software is provided ``AS IS'' without any warranties of any kind.
18 * NEW command line interface for IP firewall facility
24 * Options that can be set on the command line.
25 * When reading commands from a file, a subset of the options can also
26 * be applied globally by specifying them before the file name.
27 * After that, each line can contain its own option that changes
29 * XXX The context is not restored after each line.
33 /* boolean options: */
34 int do_value_as_ip; /* show table value as IP */
35 int do_resolv; /* try to resolve all ip to names */
36 int do_time; /* Show time stamps */
37 int do_quiet; /* Be quiet in add and flush */
38 int do_pipe; /* this cmd refers to a pipe/queue/sched */
39 int do_nat; /* this cmd refers to a nat config */
40 int do_dynamic; /* display dynamic rules */
41 int do_expired; /* display expired dynamic rules */
42 int do_compact; /* show rules in compact mode */
43 int do_force; /* do not ask for confirmation */
44 int show_sets; /* display the set each rule belongs to */
45 int test_only; /* only check syntax */
46 int comment_only; /* only print action and comment */
47 int verbose; /* be verbose on some commands */
49 /* The options below can have multiple values. */
51 int do_sort; /* field to sort results (0 = no) */
52 /* valid fields are 1 and above */
54 int use_set; /* work with specified set number */
55 /* 0 means all sets, otherwise apply to set use_set - 1 */
59 extern struct cmdline_opts co;
62 * _s_x is a structure that stores a string <-> token pairs, used in
63 * various places in the parser. Entries are stored in arrays,
64 * with an entry with s=NULL as terminator.
65 * The search routines are match_token() and match_value().
66 * Often, an element with x=0 contains an error string.
120 TOK_DIVERTEDLOOPBACK,
196 /* dummynet tokens */
235 * the following macro returns an error message if we run out of
238 #define NEED(_p, msg) {if (!_p) errx(EX_USAGE, msg);}
239 #define NEED1(msg) {if (!(*av)) errx(EX_USAGE, msg);}
241 int pr_u64(uint64_t *pd, int width);
243 /* memory allocation support */
244 void *safe_calloc(size_t number, size_t size);
245 void *safe_realloc(void *ptr, size_t size);
247 /* string comparison functions used for historical compatibility */
248 int _substrcmp(const char *str1, const char* str2);
249 int _substrcmp2(const char *str1, const char* str2, const char* str3);
251 /* utility functions */
252 int match_token(struct _s_x *table, char *string);
253 char const *match_value(struct _s_x *p, int value);
255 int do_cmd(int optname, void *optval, uintptr_t optlen);
257 uint32_t ipfw_get_tables_max(void);
260 void n2mask(struct in6_addr *mask, int n);
261 int contigmask(uint8_t *p, int len);
264 * Forward declarations to avoid include way too many headers.
265 * C does not allow duplicated typedefs, so we use the base struct
266 * that the typedef points to.
267 * Should the typedefs use a different type, the compiler will
268 * still detect the change when compiling the body of the
269 * functions involved, so we do not lose error checking.
272 struct _ipfw_insn_altq;
273 struct _ipfw_insn_u32;
274 struct _ipfw_insn_ip6;
275 struct _ipfw_insn_icmp6;
278 * The reserved set numer. This is a constant in ip_fw.h
279 * but we store it in a variable so other files do not depend
280 * in that header just for one constant.
282 extern int resvd_set_number;
284 /* first-level command handlers */
285 void ipfw_add(char *av[]);
286 void ipfw_show_nat(int ac, char **av);
287 void ipfw_config_pipe(int ac, char **av);
288 void ipfw_config_nat(int ac, char **av);
289 void ipfw_sets_handler(char *av[]);
290 void ipfw_table_handler(int ac, char *av[]);
291 void ipfw_sysctl_handler(char *av[], int which);
292 void ipfw_delete(char *av[]);
293 void ipfw_flush(int force);
294 void ipfw_zero(int ac, char *av[], int optname);
295 void ipfw_list(int ac, char *av[], int show_counters);
299 void altq_set_enabled(int enabled);
300 u_int32_t altq_name_to_qid(const char *name);
301 void print_altq_cmd(struct _ipfw_insn_altq *altqptr);
307 void dummynet_list(int ac, char *av[], int show_counters);
308 void dummynet_flush(void);
309 int ipfw_delete_pipe(int pipe_or_queue, int n);
312 void print_unreach6_code(uint16_t code);
313 void print_ip6(struct _ipfw_insn_ip6 *cmd, char const *s);
314 void print_flow6id(struct _ipfw_insn_u32 *cmd);
315 void print_icmp6types(struct _ipfw_insn_u32 *cmd);
316 void print_ext6hdr(struct _ipfw_insn *cmd );
318 struct _ipfw_insn *add_srcip6(struct _ipfw_insn *cmd, char *av, int cblen);
319 struct _ipfw_insn *add_dstip6(struct _ipfw_insn *cmd, char *av, int cblen);
321 void fill_flow6(struct _ipfw_insn_u32 *cmd, char *av, int cblen);
322 void fill_unreach6_code(u_short *codep, char *str);
323 void fill_icmp6types(struct _ipfw_insn_icmp6 *cmd, char *av, int cblen);
324 int fill_ext6hdr(struct _ipfw_insn *cmd, char *av);