2 * Copyright (C) 1993-2002 by Darren Reed.
4 * See the IPFILTER.LICENCE file for details on licencing.
6 * @(#)ip_fil.h 1.35 6/5/96
7 * $Id: ip_fil.h,v 2.29.2.33 2002/06/04 14:46:28 darrenr Exp $
8 * $FreeBSD: src/sys/contrib/ipfilter/netinet/ip_fil.h,v 1.18.2.5 2003/03/01 03:55:54 darrenr Exp $
9 * $DragonFly: src/sys/contrib/ipfilter/netinet/ip_fil.h,v 1.2 2003/06/17 04:28:20 dillon Exp $
16 * Pathnames for various IP Filter control devices. Used by LKM
17 * and userland, so defined here.
19 #define IPNAT_NAME "/dev/ipnat"
20 #define IPSTATE_NAME "/dev/ipstate"
21 #define IPAUTH_NAME "/dev/ipauth"
24 # define SOLARIS (defined(sun) && (defined(__svr4__) || defined(__SVR4)))
27 #if defined(KERNEL) && !defined(_KERNEL)
40 # define offsetof(t,m) (int)((&((t *)0L)->m))
43 #if defined(__STDC__) || defined(__GNUC__)
44 # define SIOCADAFR _IOW('r', 60, struct frentry *)
45 # define SIOCRMAFR _IOW('r', 61, struct frentry *)
46 # define SIOCSETFF _IOW('r', 62, u_int)
47 # define SIOCGETFF _IOR('r', 63, u_int)
48 # define SIOCGETFS _IOWR('r', 64, struct friostat *)
49 # define SIOCIPFFL _IOWR('r', 65, int)
50 # define SIOCIPFFB _IOR('r', 66, int)
51 # define SIOCADIFR _IOW('r', 67, struct frentry *)
52 # define SIOCRMIFR _IOW('r', 68, struct frentry *)
53 # define SIOCSWAPA _IOR('r', 69, u_int)
54 # define SIOCINAFR _IOW('r', 70, struct frentry *)
55 # define SIOCINIFR _IOW('r', 71, struct frentry *)
56 # define SIOCFRENB _IOW('r', 72, u_int)
57 # define SIOCFRSYN _IOW('r', 73, u_int)
58 # define SIOCFRZST _IOWR('r', 74, struct friostat *)
59 # define SIOCZRLST _IOWR('r', 75, struct frentry *)
60 # define SIOCAUTHW _IOWR('r', 76, struct frauth *)
61 # define SIOCAUTHR _IOWR('r', 77, struct frauth *)
62 # define SIOCATHST _IOWR('r', 78, struct fr_authstat *)
63 # define SIOCSTLCK _IOWR('r', 79, u_int)
64 # define SIOCSTPUT _IOWR('r', 80, struct ipstate_save *)
65 # define SIOCSTGET _IOWR('r', 81, struct ipstate_save *)
66 # define SIOCSTGSZ _IOWR('r', 82, struct natget)
67 # define SIOCGFRST _IOWR('r', 83, struct ipfrstat *)
68 # define SIOCIPFL6 _IOWR('r', 84, int)
70 # define SIOCADAFR _IOW(r, 60, struct frentry *)
71 # define SIOCRMAFR _IOW(r, 61, struct frentry *)
72 # define SIOCSETFF _IOW(r, 62, u_int)
73 # define SIOCGETFF _IOR(r, 63, u_int)
74 # define SIOCGETFS _IOWR(r, 64, struct friostat *)
75 # define SIOCIPFFL _IOWR(r, 65, int)
76 # define SIOCIPFFB _IOR(r, 66, int)
77 # define SIOCADIFR _IOW(r, 67, struct frentry *)
78 # define SIOCRMIFR _IOW(r, 68, struct frentry *)
79 # define SIOCSWAPA _IOR(r, 69, u_int)
80 # define SIOCINAFR _IOW(r, 70, struct frentry *)
81 # define SIOCINIFR _IOW(r, 71, struct frentry *)
82 # define SIOCFRENB _IOW(r, 72, u_int)
83 # define SIOCFRSYN _IOW(r, 73, u_int)
84 # define SIOCFRZST _IOWR(r, 74, struct friostat *)
85 # define SIOCZRLST _IOWR(r, 75, struct frentry *)
86 # define SIOCAUTHW _IOWR(r, 76, struct frauth *)
87 # define SIOCAUTHR _IOWR(r, 77, struct frauth *)
88 # define SIOCATHST _IOWR(r, 78, struct fr_authstat *)
89 # define SIOCSTLCK _IOWR(r, 79, u_int)
90 # define SIOCSTPUT _IOWR(r, 80, struct ipstate_save *)
91 # define SIOCSTGET _IOWR(r, 81, struct ipstate_save *)
92 # define SIOCSTGSZ _IOWR(r, 82, struct natget)
93 # define SIOCGFRST _IOWR(r, 83, struct ipfrstat *)
94 # define SIOCIPFL6 _IOWR(r, 84, int)
96 #define SIOCADDFR SIOCADAFR
97 #define SIOCDELFR SIOCRMAFR
98 #define SIOCINSFR SIOCINAFR
101 typedef struct fr_ip {
102 u_32_t fi_v:4; /* IP version */
103 u_32_t fi_fl:4; /* packet flags */
104 u_32_t fi_tos:8; /* IP packet TOS */
105 u_32_t fi_ttl:8; /* IP packet TTL */
106 u_32_t fi_p:8; /* IP packet protocol */
107 union i6addr fi_src; /* source address from packet */
108 union i6addr fi_dst; /* destination address from packet */
109 u_32_t fi_optmsk; /* bitmask composed from IP options */
110 u_short fi_secmsk; /* bitmask composed from IP security options */
111 u_short fi_auth; /* authentication code from IP sec. options */
114 #define FI_OPTIONS (FF_OPTIONS >> 24)
115 #define FI_TCPUDP (FF_TCPUDP >> 24) /* TCP/UCP implied comparison*/
116 #define FI_FRAG (FF_FRAG >> 24)
117 #define FI_SHORT (FF_SHORT >> 24)
118 #define FI_CMP (FI_OPTIONS|FI_TCPUDP|FI_SHORT)
120 #define fi_saddr fi_src.in4.s_addr
121 #define fi_daddr fi_dst.in4.s_addr
125 * These are both used by the state and NAT code to indicate that one port or
126 * the other should be treated as a wildcard.
128 #define FI_W_SPORT 0x00000100
129 #define FI_W_DPORT 0x00000200
130 #define FI_WILDP (FI_W_SPORT|FI_W_DPORT)
131 #define FI_W_SADDR 0x00000400
132 #define FI_W_DADDR 0x00000800
133 #define FI_WILDA (FI_W_SADDR|FI_W_DADDR)
134 #define FI_NEWFR 0x00001000 /* Create a filter rule */
135 #define FI_IGNOREPKT 0x00002000 /* Do not treat as a real packet */
136 #define FI_NORULE 0x00004000 /* Not direct a result of a rule */
138 typedef struct fr_info {
139 void *fin_ifp; /* interface packet is `on' */
140 struct fr_ip fin_fi; /* IP Packet summary */
141 u_short fin_data[2]; /* TCP/UDP ports, ICMP code/type */
142 u_int fin_out; /* in or out ? 1 == out, 0 == in */
143 u_short fin_hlen; /* length of IP header in bytes */
144 u_char fin_rev; /* state only: 1 = reverse */
145 u_char fin_tcpf; /* TCP header flags (SYN, ACK, etc) */
146 u_int fin_icode; /* ICMP error to return */
147 u_32_t fin_rule; /* rule # last matched */
148 u_32_t fin_group; /* group number, -1 for none */
149 struct frentry *fin_fr; /* last matching rule */
150 char *fin_dp; /* start of data past IP header */
153 u_short fin_dlen; /* length of data portion of packet */
154 u_short fin_id; /* IP packet id field */
156 void *fin_mp; /* pointer to pointer to mbuf */
158 void *fin_qfm; /* pointer to mblk where pkt starts */
163 #define fin_v fin_fi.fi_v
164 #define fin_p fin_fi.fi_p
165 #define fin_saddr fin_fi.fi_saddr
166 #define fin_src fin_fi.fi_src.in4
167 #define fin_daddr fin_fi.fi_daddr
168 #define fin_dst fin_fi.fi_dst.in4
169 #define fin_fl fin_fi.fi_fl
172 * Size for compares on fr_info structures
174 #define FI_CSIZE offsetof(fr_info_t, fin_icode)
175 #define FI_LCSIZE offsetof(fr_info_t, fin_dp)
180 #define FM_BADSTATE 0x00000001
183 * Size for copying cache fr_info structure
185 #define FI_COPYSIZE offsetof(fr_info_t, fin_dp)
187 typedef struct frdest {
190 char fd_ifname[LIFNAMSIZ];
192 mb_t *fd_mp; /* cache resolver for to/dup-to */
196 #define fd_ip fd_ip6.in4
199 typedef struct frpcmp {
200 int frp_cmp; /* data for port comparisons */
201 u_short frp_port; /* top port for <> and >< */
202 u_short frp_top; /* top port for <> and >< */
205 typedef struct frtuc {
206 u_char ftu_tcpfm; /* tcp flags mask */
207 u_char ftu_tcpf; /* tcp flags */
212 #define ftu_scmp ftu_src.frp_cmp
213 #define ftu_dcmp ftu_dst.frp_cmp
214 #define ftu_sport ftu_src.frp_port
215 #define ftu_dport ftu_dst.frp_port
216 #define ftu_stop ftu_src.frp_top
217 #define ftu_dtop ftu_dst.frp_top
219 typedef struct frentry {
220 struct frentry *fr_next;
221 struct frentry *fr_grp;
222 int fr_ref; /* reference count - for grouping */
225 * These are only incremented when a packet matches this rule and
226 * it is the last match
231 * Fields after this may not change whilst in the kernel.
234 struct fr_ip fr_mip; /* mask structure */
237 u_short fr_icmpm; /* data for ICMP packets (mask) */
240 u_int fr_age[2]; /* aging for state */
242 u_32_t fr_group; /* group to which this rule belongs */
243 u_32_t fr_grhead; /* group # which this rule starts */
244 u_32_t fr_flags; /* per-rule flags && options (see below) */
245 u_int fr_skip; /* # of rules to skip */
246 u_int fr_loglevel; /* syslog log facility + priority */
247 int (*fr_func) __P((int, ip_t *, fr_info_t *)); /* call this function */
248 int fr_sap; /* For solaris only */
249 u_char fr_icode; /* return ICMP code */
250 char fr_ifnames[4][LIFNAMSIZ];
251 struct frdest fr_tif; /* "to" interface */
252 struct frdest fr_dif; /* duplicate packet interfaces */
253 u_int fr_cksum; /* checksum on filter rules for performance */
256 #define fr_v fr_ip.fi_v
257 #define fr_proto fr_ip.fi_p
258 #define fr_ttl fr_ip.fi_ttl
259 #define fr_tos fr_ip.fi_tos
260 #define fr_tcpfm fr_tuc.ftu_tcpfm
261 #define fr_tcpf fr_tuc.ftu_tcpf
262 #define fr_scmp fr_tuc.ftu_scmp
263 #define fr_dcmp fr_tuc.ftu_dcmp
264 #define fr_dport fr_tuc.ftu_dport
265 #define fr_sport fr_tuc.ftu_sport
266 #define fr_stop fr_tuc.ftu_stop
267 #define fr_dtop fr_tuc.ftu_dtop
268 #define fr_dst fr_ip.fi_dst.in4
269 #define fr_src fr_ip.fi_src.in4
270 #define fr_dmsk fr_mip.fi_dst.in4
271 #define fr_smsk fr_mip.fi_src.in4
272 #define fr_ifname fr_ifnames[0]
273 #define fr_oifname fr_ifnames[2]
274 #define fr_ifa fr_ifas[0]
275 #define fr_oifa fr_ifas[2]
277 #define FR_CMPSIZ (sizeof(struct frentry) - offsetof(frentry_t, fr_ip))
282 #define FR_BLOCK 0x00001 /* do not allow packet to pass */
283 #define FR_PASS 0x00002 /* allow packet to pass */
284 #define FR_OUTQUE 0x00004 /* outgoing packets */
285 #define FR_INQUE 0x00008 /* ingoing packets */
286 #define FR_LOG 0x00010 /* Log */
287 #define FR_LOGB 0x00011 /* Log-fail */
288 #define FR_LOGP 0x00012 /* Log-pass */
289 #define FR_NOTSRCIP 0x00020 /* not the src IP# */
290 #define FR_NOTDSTIP 0x00040 /* not the dst IP# */
291 #define FR_RETRST 0x00080 /* Return TCP RST packet - reset connection */
292 #define FR_RETICMP 0x00100 /* Return ICMP unreachable packet */
293 #define FR_FAKEICMP 0x00180 /* Return ICMP unreachable with fake source */
294 #define FR_NOMATCH 0x00200 /* no match occured */
295 #define FR_ACCOUNT 0x00400 /* count packet bytes */
296 #define FR_KEEPFRAG 0x00800 /* keep fragment information */
297 #define FR_KEEPSTATE 0x01000 /* keep `connection' state information */
298 #define FR_INACTIVE 0x02000
299 #define FR_QUICK 0x04000 /* match & stop processing list */
300 #define FR_FASTROUTE 0x08000 /* bypass normal routing */
301 #define FR_CALLNOW 0x10000 /* call another function (fr_func) if matches */
302 #define FR_DUP 0x20000 /* duplicate packet */
303 #define FR_LOGORBLOCK 0x40000 /* block the packet if it can't be logged */
304 #define FR_LOGBODY 0x80000 /* Log the body */
305 #define FR_LOGFIRST 0x100000 /* Log the first byte if state held */
306 #define FR_AUTH 0x200000 /* use authentication */
307 #define FR_PREAUTH 0x400000 /* require preauthentication */
308 #define FR_DONTCACHE 0x800000 /* don't cache the result */
310 #define FR_LOGMASK (FR_LOG|FR_LOGP|FR_LOGB)
311 #define FR_RETMASK (FR_RETICMP|FR_RETRST|FR_FAKEICMP)
314 * These correspond to #define's for FI_* and are stored in fr_flags
316 #define FF_OPTIONS 0x01000000
317 #define FF_TCPUDP 0x02000000
318 #define FF_FRAG 0x04000000
319 #define FF_SHORT 0x08000000
321 * recognized flags for SIOCGETFF and SIOCSETFF, and get put in fr_flags
323 #define FF_LOGPASS 0x10000000
324 #define FF_LOGBLOCK 0x20000000
325 #define FF_LOGNOMATCH 0x40000000
326 #define FF_LOGGING (FF_LOGPASS|FF_LOGBLOCK|FF_LOGNOMATCH)
327 #define FF_BLOCKNONIP 0x80000000 /* Solaris2 Only */
333 #define FR_GREATERT 4
335 #define FR_GREATERTE 6
336 #define FR_OUTRANGE 7
339 typedef struct filterstats {
340 u_long fr_pass; /* packets allowed */
341 u_long fr_block; /* packets denied */
342 u_long fr_nom; /* packets which don't match any rule */
343 u_long fr_short; /* packets which are short */
344 u_long fr_ppkl; /* packets allowed and logged */
345 u_long fr_bpkl; /* packets denied and logged */
346 u_long fr_npkl; /* packets unmatched and logged */
347 u_long fr_pkl; /* packets logged */
348 u_long fr_skip; /* packets to be logged but buffer full */
349 u_long fr_ret; /* packets for which a return is sent */
350 u_long fr_acct; /* packets for which counting was performed */
351 u_long fr_bnfr; /* bad attempts to allocate fragment state */
352 u_long fr_nfr; /* new fragment state kept */
353 u_long fr_cfr; /* add new fragment state but complete pkt */
354 u_long fr_bads; /* bad attempts to allocate packet state */
355 u_long fr_ads; /* new packet state kept */
356 u_long fr_chit; /* cached hit */
357 u_long fr_tcpbad; /* TCP checksum check failures */
358 u_long fr_pull[2]; /* good and bad pullup attempts */
359 u_long fr_badsrc; /* source received doesn't match route */
360 u_long fr_badttl; /* TTL in packet doesn't reach minimum */
362 u_long fr_notdata; /* PROTO/PCPROTO that have no data */
363 u_long fr_nodata; /* mblks that have no data */
364 u_long fr_bad; /* bad IP packets to the filter */
365 u_long fr_notip; /* packets passed through no on ip queue */
366 u_long fr_drop; /* packets dropped - no info for them! */
367 u_long fr_copy; /* messages copied due to db_ref > 1 */
369 u_long fr_ipv6[2]; /* IPv6 packets in/out */
375 typedef struct friostat {
376 struct filterstats f_st[2];
377 struct frentry *f_fin[2];
378 struct frentry *f_fout[2];
379 struct frentry *f_acctin[2];
380 struct frentry *f_acctout[2];
381 struct frentry *f_fin6[2];
382 struct frentry *f_fout6[2];
383 struct frentry *f_acctin6[2];
384 struct frentry *f_acctout6[2];
385 struct frentry *f_auth;
386 struct frgroup *f_groups[3][2];
388 int f_defpass; /* default pass - from fr_pass */
389 char f_active; /* 1 or 0 - active rule set */
390 char f_running; /* 1 if running, else 0 */
391 char f_logging; /* 1 if enabled, else 0 */
392 char f_version[32]; /* version string */
396 typedef struct optlist {
403 * Group list structure.
405 typedef struct frgroup {
407 struct frgroup *fg_next;
408 struct frentry *fg_head;
409 struct frentry **fg_start;
414 * Log structure. Each packet header logged is prepended by one of these.
415 * Following this in the log records read from the device will be an ipflog
416 * structure which is then followed by any packet data.
418 typedef struct iplog {
421 struct timeval ipl_tv;
423 struct iplog *ipl_next;
426 #define ipl_sec ipl_tv.tv_sec
427 #define ipl_usec ipl_tv.tv_usec
429 #define IPL_MAGIC 0x49504c4d /* 'IPLM' */
430 #define IPLOG_SIZE sizeof(iplog_t)
432 typedef struct ipflog {
433 #if (defined(NetBSD) && (NetBSD <= 1991011) && (NetBSD >= 199603)) || \
434 (defined(OpenBSD) && (OpenBSD >= 199603))
435 char fl_ifname[LIFNAMSIZ];
438 char fl_ifname[LIFNAMSIZ];
440 u_char fl_plen; /* extra data after hlen */
441 u_char fl_hlen; /* length of IP headers saved */
442 u_short fl_loglevel; /* syslog log level */
451 #ifndef ICMP_UNREACH_FILTER
452 # define ICMP_UNREACH_FILTER 13
456 # define IPF_LOGGING 0
458 #ifndef IPF_DEFAULT_PASS
459 # define IPF_DEFAULT_PASS FR_PASS
462 #define IPMINLEN(i, h) ((i)->ip_len >= ((i)->ip_hl * 4 + sizeof(struct h)))
463 #define IPLLOGSIZE 8192
465 #define IPF_OPTCOPY 0x07ff00 /* bit mask of copied options */
468 * Device filenames for reading log information. Use ipf on Solaris2 because
469 * ipl is already a name used by something else.
473 # define IPL_NAME "/dev/ipf"
475 # define IPL_NAME "/dev/ipl"
478 #define IPL_NAT IPNAT_NAME
479 #define IPL_STATE IPSTATE_NAME
480 #define IPL_AUTH IPAUTH_NAME
482 #define IPL_LOGIPF 0 /* Minor device #'s for accessing logs */
484 #define IPL_LOGSTATE 2
485 #define IPL_LOGAUTH 3
488 #if !defined(CDEV_MAJOR) && defined (__FreeBSD_version) && \
489 (__FreeBSD_version >= 220000)
490 # define CDEV_MAJOR 79
494 * Post NetBSD 1.2 has the PFIL interface for packet filters. This turns
495 * on those hooks. We don't need any special mods in non-IP Filter code
498 #if (defined(NetBSD) && (NetBSD > 199609) && (NetBSD <= 1991011)) || \
499 (defined(NetBSD1_2) && NetBSD1_2 > 1)
500 # if (NetBSD >= 199905)
511 extern char *get_ifname __P((struct ifnet *));
512 extern int fr_check __P((ip_t *, int, void *, int, mb_t **));
513 extern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
514 extern int send_reset __P((ip_t *, fr_info_t *));
515 extern int send_icmp_err __P((ip_t *, int, fr_info_t *, int));
516 extern int ipf_log __P((void));
517 extern struct ifnet *get_unit __P((char *, int));
518 extern int mbuflen __P((mb_t *));
519 # if defined(__NetBSD__) || defined(__OpenBSD__) || \
520 (_BSDI_VERSION >= 199701) || (__FreeBSD_version >= 300000)
521 extern int iplioctl __P((dev_t, u_long, caddr_t, int));
523 extern int iplioctl __P((dev_t, int, caddr_t, int));
525 extern int iplopen __P((dev_t, int));
526 extern int iplclose __P((dev_t, int));
527 #else /* #ifndef _KERNEL */
528 # if defined(__NetBSD__) && defined(PFIL_HOOKS)
529 extern void ipfilterattach __P((int));
531 extern int iplattach __P((void));
532 extern int ipl_enable __P((void));
533 extern int ipl_disable __P((void));
534 extern int send_icmp_err __P((ip_t *, int, fr_info_t *, int));
535 extern int send_reset __P((ip_t *, fr_info_t *));
537 extern int fr_check __P((ip_t *, int, void *, int, qif_t *, mb_t **));
538 extern int (*fr_checkp) __P((ip_t *, int, void *,
539 int, qif_t *, mb_t **));
541 extern int iplioctl __P((dev_t, int, intptr_t, int, cred_t *, int *));
543 extern int iplioctl __P((dev_t, int, int *, int, cred_t *, int *));
545 extern int iplopen __P((dev_t *, int, int, cred_t *));
546 extern int iplclose __P((dev_t, int, int, cred_t *));
547 extern int ipfsync __P((void));
548 extern int ipfr_fastroute __P((ip_t *, mblk_t *, mblk_t **,
549 fr_info_t *, frdest_t *));
550 extern void copyin_mblk __P((mblk_t *, size_t, size_t, char *));
551 extern void copyout_mblk __P((mblk_t *, size_t, size_t, char *));
552 extern int fr_qin __P((queue_t *, mblk_t *));
553 extern int fr_qout __P((queue_t *, mblk_t *));
554 extern int iplread __P((dev_t, struct uio *, cred_t *));
556 extern int fr_check __P((ip_t *, int, void *, int, mb_t **));
557 extern int (*fr_checkp) __P((ip_t *, int, void *, int, mb_t **));
558 extern int ipfr_fastroute __P((mb_t *, mb_t **, fr_info_t *, frdest_t *));
559 extern size_t mbufchainlen __P((mb_t *));
561 # include <sys/cred.h>
562 extern int iplioctl __P((dev_t, int, caddr_t, int, cred_t *, int *));
563 extern int iplopen __P((dev_t *, int, int, cred_t *));
564 extern int iplclose __P((dev_t, int, int, cred_t *));
565 extern int iplread __P((dev_t, struct uio *, cred_t *));
566 extern int ipfsync __P((void));
567 extern int ipfilter_sgi_attach __P((void));
568 extern void ipfilter_sgi_detach __P((void));
569 extern void ipfilter_sgi_intfsync __P((void));
572 extern int iplidentify __P((char *));
574 # if (_BSDI_VERSION >= 199510) || (__FreeBSD_version >= 220000) || \
575 (NetBSD >= 199511) || defined(__OpenBSD__)
576 # if defined(__NetBSD__) || (_BSDI_VERSION >= 199701) || \
577 defined(__OpenBSD__) || (__FreeBSD_version >= 300000)
578 extern int iplioctl __P((dev_t, u_long, caddr_t, int, struct proc *));
580 extern int iplioctl __P((dev_t, int, caddr_t, int, struct proc *));
582 extern int iplopen __P((dev_t, int, int, struct proc *));
583 extern int iplclose __P((dev_t, int, int, struct proc *));
586 extern int iplopen __P((dev_t, int));
587 extern int iplclose __P((dev_t, int));
588 extern int iplioctl __P((dev_t, int, caddr_t, int));
590 extern int iplioctl(struct inode *, struct file *, u_int, u_long);
591 extern int iplopen __P((struct inode *, struct file *));
592 extern void iplclose __P((struct inode *, struct file *));
594 # endif /* (_BSDI_VERSION >= 199510) */
596 extern int iplread __P((dev_t, struct uio *, int));
599 extern int iplread __P((dev_t, struct uio *));
601 extern int iplread(struct inode *, struct file *, char *, int);
603 # endif /* BSD >= 199306 */
605 # endif /* SOLARIS */
606 #endif /* #ifndef _KERNEL */
608 extern char *memstr __P((char *, char *, int, int));
609 extern void fixskip __P((frentry_t **, frentry_t *, int));
610 extern int countbits __P((u_32_t));
611 extern int ipldetach __P((void));
612 extern u_short ipf_cksum __P((u_short *, int));
613 extern int ircopyptr __P((void *, void *, size_t));
614 extern int iwcopyptr __P((void *, void *, size_t));
616 extern void ipflog_init __P((void));
617 extern int ipflog_clear __P((minor_t));
618 extern int ipflog __P((u_int, ip_t *, fr_info_t *, mb_t *));
619 extern int ipllog __P((int, fr_info_t *, void **, size_t *, int *, int));
620 extern int ipflog_read __P((minor_t, struct uio *));
622 extern int frflush __P((minor_t, int, int));
623 extern void frsync __P((void));
624 extern frgroup_t *fr_addgroup __P((u_32_t, frentry_t *, minor_t, int));
625 extern void fr_delgroup __P((u_32_t, u_32_t, minor_t, int));
626 extern frgroup_t *fr_findgroup __P((u_32_t, u_32_t, minor_t, int,
629 extern int fr_copytolog __P((int, char *, int));
630 extern void fr_forgetifp __P((void *));
631 extern void fr_getstat __P((struct friostat *));
632 extern int fr_ifpaddr __P((int, void *, struct in_addr *));
633 extern int fr_lock __P((caddr_t, int *));
634 extern void fr_makefrip __P((int, ip_t *, fr_info_t *));
635 extern u_short fr_tcpsum __P((mb_t *, ip_t *, tcphdr_t *));
636 extern int fr_scanlist __P((u_32_t, ip_t *, fr_info_t *, void *));
637 extern int fr_tcpudpchk __P((frtuc_t *, fr_info_t *));
638 extern int fr_verifysrc __P((struct in_addr, void *));
640 extern int ipl_unreach;
641 extern int fr_running;
642 extern u_long ipl_frouteok[2];
645 extern int fr_active;
646 extern int fr_chksrc;
647 extern int fr_minttl;
648 extern int fr_minttllog;
649 extern fr_info_t frcache[2];
650 extern char ipfilter_version[];
651 extern iplog_t **iplh[IPL_LOGMAX+1], *iplt[IPL_LOGMAX+1];
652 extern size_t iplused[IPL_LOGMAX + 1];
653 extern struct frentry *ipfilter[2][2], *ipacct[2][2];
655 extern struct frentry *ipfilter6[2][2], *ipacct6[2][2];
656 extern int icmptoicmp6types[ICMP_MAXTYPE+1];
657 extern int icmptoicmp6unreach[ICMP_MAX_UNREACH];
659 extern struct frgroup *ipfgroups[3][2];
660 extern struct filterstats frstats[];
662 #endif /* __IP_FIL_H__ */