aboutsummaryrefslogtreecommitdiff
path: root/pf.h
blob: 754db8afd3f19018a2b8e21316f16f64fabce14f (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
/*
 *  OpenVPN -- An application to securely tunnel IP networks
 *             over a single TCP/UDP port, with support for SSL/TLS-based
 *             session authentication and key exchange,
 *             packet encryption, packet authentication, and
 *             packet compression.
 *
 *  Copyright (C) 2002-2005 OpenVPN Solutions LLC <info@openvpn.net>
 *
 *  This program is free software; you can redistribute it and/or modify
 *  it under the terms of the GNU General Public License version 2
 *  as published by the Free Software Foundation.
 *
 *  This program is distributed in the hope that it will be useful,
 *  but WITHOUT ANY WARRANTY; without even the implied warranty of
 *  MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 *  GNU General Public License for more details.
 *
 *  You should have received a copy of the GNU General Public License
 *  along with this program (see the file COPYING included with this
 *  distribution); if not, write to the Free Software Foundation, Inc.,
 *  59 Temple Place, Suite 330, Boston, MA  02111-1307  USA
 */

/* packet filter functions */

#if defined(ENABLE_PF) && !defined(OPENVPN_PF_H)
#define OPENVPN_PF_H

#include "list.h"
#include "mroute.h"

#define PF_DEBUG 0

struct context;

struct ipv4_subnet {
  bool exclude;
  in_addr_t network;
  in_addr_t netmask;
};

struct pf_subnet {
  struct pf_subnet *next;
  struct ipv4_subnet rule;
};

struct pf_subnet_set {
  bool default_allow;
  struct pf_subnet *list;
};

struct pf_cn {
  bool exclude;
  char *cn;
};

struct pf_cn_elem {
  struct pf_cn_elem *next;
  struct pf_cn rule;
};

struct pf_cn_set {
  bool default_allow;
  struct pf_cn_elem *list;
  struct hash *hash_table;
};

struct pf_set {
  bool kill;
  struct pf_subnet_set sns;
  struct pf_cn_set cns;
};

struct pf_context {
  char *filename;
  time_t file_last_mod;
  unsigned int n_check_reload;
  struct event_timeout reload;
  struct pf_set *pfs;
};

void pf_init_context (struct context *c);

void pf_destroy_context (struct pf_context *pfc);

void pf_check_reload (struct context *c);

bool pf_c2c_test (const struct context *src, const struct context *dest);

bool pf_addr_test (const struct context *src, const struct mroute_addr *dest);

static inline bool
pf_kill_test (const struct pf_set *pfs)
{
  return pfs->kill;
}

#if PF_DEBUG >= 1
void pf_context_print (const struct pf_context *pfc, const char *prefix, const int lev);
#endif

#endif