1
0
mirror of https://github.com/openbsd/src.git synced 2025-01-10 06:47:55 -08:00
openbsd-src/usr.sbin/bgpd/bgpd.h

816 lines
18 KiB
C
Raw Normal View History

/* $OpenBSD: bgpd.h,v 1.221 2007/12/23 18:26:13 henning Exp $ */
/*
2004-01-05 19:43:50 -08:00
* Copyright (c) 2003, 2004 Henning Brauer <henning@openbsd.org>
*
* Permission to use, copy, modify, and distribute this software for any
* purpose with or without fee is hereby granted, provided that the above
* copyright notice and this permission notice appear in all copies.
*
* THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
* WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
* MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
* ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
* WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
* ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
* OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
*/
#ifndef __BGPD_H__
#define __BGPD_H__
#include <sys/types.h>
#include <sys/socket.h>
#include <sys/queue.h>
#include <net/route.h>
#include <netinet/in.h>
#include <arpa/inet.h>
#include <net/if.h>
2004-04-25 18:59:26 -07:00
#include <net/pfkeyv2.h>
#include <poll.h>
#include <stdarg.h>
#define BGP_VERSION 4
#define BGP_PORT 179
#define CONFFILE "/etc/bgpd.conf"
#define BGPD_USER "_bgpd"
#define PEER_DESCR_LEN 32
#define PFTABLE_LEN 16
#define TCP_MD5_KEY_LEN 80
2004-04-25 18:59:26 -07:00
#define IPSEC_ENC_KEY_LEN 32
#define IPSEC_AUTH_KEY_LEN 20
#define MAX_PKTSIZE 4096
#define MIN_HOLDTIME 3
#define READ_BUF_SIZE 65535
#define RT_BUF_SIZE 16384
#define MAX_RTSOCK_BUF 128 * 1024
#define BGPD_OPT_VERBOSE 0x0001
#define BGPD_OPT_VERBOSE2 0x0002
#define BGPD_OPT_NOACTION 0x0004
#define BGPD_OPT_FORCE_DEMOTE 0x0008
#define BGPD_FLAG_NO_FIB_UPDATE 0x0001
#define BGPD_FLAG_NO_EVALUATE 0x0002
#define BGPD_FLAG_REFLECTOR 0x0004
#define BGPD_FLAG_REDIST_STATIC 0x0008
#define BGPD_FLAG_REDIST_CONNECTED 0x0010
#define BGPD_FLAG_REDIST6_STATIC 0x0020
#define BGPD_FLAG_REDIST6_CONNECTED 0x0040
#define BGPD_FLAG_NEXTHOP_BGP 0x0080
#define BGPD_FLAG_NEXTHOP_DEFAULT 0x1000
#define BGPD_FLAG_DECISION_MASK 0x0f00
#define BGPD_FLAG_DECISION_ROUTEAGE 0x0100
#define BGPD_FLAG_DECISION_TRANS_AS 0x0200
#define BGPD_FLAG_DECISION_MED_ALWAYS 0x0400
#define BGPD_LOG_UPDATES 0x0001
#define SOCKET_NAME "/var/run/bgpd.sock"
#define F_BGPD_INSERTED 0x0001
#define F_KERNEL 0x0002
#define F_CONNECTED 0x0004
#define F_NEXTHOP 0x0008
#define F_DOWN 0x0010
#define F_STATIC 0x0020
#define F_DYNAMIC 0x0040
#define F_REJECT 0x0080
#define F_BLACKHOLE 0x0100
#define F_LONGER 0x0200
#define F_CTL_DETAIL 0x1000 /* only used by bgpctl */
#define F_CTL_ADJ_IN 0x2000
#define F_CTL_ADJ_OUT 0x4000
/*
* Limit the number of control messages generated by the RDE and queued in
* session enigine. The RDE limit defines how many imsg are generated in
* on poll round. The if the SE limit is hit the RDE control socket will no
* longer be polled.
*/
#define RDE_RUNNER_ROUNDS 100
#define SESSION_CTL_QUEUE_MAX 10000
enum {
PROC_MAIN,
PROC_SE,
PROC_RDE
} bgpd_process;
enum reconf_action {
RECONF_NONE,
RECONF_KEEP,
RECONF_REINIT,
RECONF_DELETE
};
struct buf {
TAILQ_ENTRY(buf) entry;
u_char *buf;
size_t size;
size_t wpos;
size_t rpos;
int fd;
};
struct msgbuf {
TAILQ_HEAD(, buf) bufs;
u_int32_t queued;
2004-04-29 12:56:04 -07:00
int fd;
};
struct bgpd_addr {
sa_family_t af;
union {
struct in_addr v4;
struct in6_addr v6;
u_int8_t addr8[16];
u_int16_t addr16[8];
u_int32_t addr32[4];
} ba; /* 128-bit address */
u_int32_t scope_id; /* iface scope id for v6 */
#define v4 ba.v4
#define v6 ba.v6
#define addr8 ba.addr8
#define addr16 ba.addr16
#define addr32 ba.addr32
};
#define DEFAULT_LISTENER 0x01
#define LISTENER_LISTENING 0x02
struct listen_addr {
TAILQ_ENTRY(listen_addr) entry;
struct sockaddr_storage sa;
int fd;
enum reconf_action reconf;
u_int8_t flags;
};
TAILQ_HEAD(listen_addrs, listen_addr);
TAILQ_HEAD(filter_set_head, filter_set);
struct bgpd_config {
struct filter_set_head connectset;
struct filter_set_head connectset6;
struct filter_set_head staticset;
struct filter_set_head staticset6;
struct listen_addrs *listen_addrs;
char *csock;
char *rcsock;
int opts;
int flags;
int log;
u_int rtableid;
u_int32_t bgpid;
u_int32_t clusterid;
u_int32_t as;
u_int16_t short_as;
u_int16_t holdtime;
u_int16_t min_holdtime;
};
struct buf_read {
u_char buf[READ_BUF_SIZE];
u_char *rptr;
size_t wpos;
};
enum announce_type {
ANNOUNCE_UNDEF,
ANNOUNCE_SELF,
ANNOUNCE_NONE,
ANNOUNCE_DEFAULT_ROUTE,
ANNOUNCE_ALL
};
enum enforce_as {
ENFORCE_AS_UNDEF,
ENFORCE_AS_OFF,
ENFORCE_AS_ON
};
2004-04-27 15:06:54 -07:00
enum auth_method {
AUTH_NONE,
AUTH_MD5SIG,
AUTH_IPSEC_MANUAL_ESP,
AUTH_IPSEC_MANUAL_AH,
2004-04-27 21:34:46 -07:00
AUTH_IPSEC_IKE_ESP,
AUTH_IPSEC_IKE_AH
2004-04-27 15:06:54 -07:00
};
2004-04-27 18:08:38 -07:00
struct peer_auth {
char md5key[TCP_MD5_KEY_LEN];
char auth_key_in[IPSEC_AUTH_KEY_LEN];
char auth_key_out[IPSEC_AUTH_KEY_LEN];
char enc_key_in[IPSEC_ENC_KEY_LEN];
char enc_key_out[IPSEC_ENC_KEY_LEN];
2004-04-27 15:06:54 -07:00
u_int32_t spi_in;
u_int32_t spi_out;
enum auth_method method;
u_int8_t md5key_len;
2004-04-27 15:06:54 -07:00
u_int8_t auth_alg_in;
u_int8_t auth_alg_out;
u_int8_t auth_keylen_in;
u_int8_t auth_keylen_out;
u_int8_t enc_alg_in;
u_int8_t enc_alg_out;
u_int8_t enc_keylen_in;
u_int8_t enc_keylen_out;
2004-04-25 18:59:26 -07:00
};
struct capabilities {
u_int8_t mp_v4; /* multiprotocol extensions, RFC 4760 */
u_int8_t mp_v6;
u_int8_t refresh; /* route refresh, RFC 2918 */
u_int8_t restart; /* graceful restart, RFC 4724 */
u_int8_t as4byte; /* draft-ietf-idr-as4bytes-13 */
};
struct peer_config {
struct bgpd_addr remote_addr;
struct bgpd_addr local_addr;
struct peer_auth auth;
struct capabilities capabilities;
char group[PEER_DESCR_LEN];
char descr[PEER_DESCR_LEN];
char if_depend[IFNAMSIZ];
char demote_group[IFNAMSIZ];
u_int32_t id;
u_int32_t groupid;
u_int32_t remote_as;
u_int32_t max_prefix;
enum announce_type announce_type;
enum enforce_as enforce_as;
enum reconf_action reconf_action;
u_int16_t max_prefix_restart;
u_int16_t holdtime;
u_int16_t min_holdtime;
u_int8_t template;
u_int8_t remote_masklen;
u_int8_t cloned;
u_int8_t ebgp; /* 1 = ebgp, 0 = ibgp */
u_int8_t distance; /* 1 = direct, >1 = multihop */
u_int8_t passive;
u_int8_t down;
u_int8_t announce_capa;
u_int8_t reflector_client;
u_int8_t softreconfig_in;
u_int8_t softreconfig_out;
u_int8_t ttlsec; /* TTL security hack */
};
struct network_config {
struct bgpd_addr prefix;
struct filter_set_head attrset;
u_int8_t prefixlen;
};
TAILQ_HEAD(network_head, network);
struct network {
struct network_config net;
TAILQ_ENTRY(network) entry;
};
/* ipc messages */
#define IMSG_HEADER_SIZE sizeof(struct imsg_hdr)
#define MAX_IMSGSIZE 8192
struct imsg_fd {
TAILQ_ENTRY(imsg_fd) entry;
2004-04-29 12:56:04 -07:00
int fd;
};
struct imsgbuf {
2004-07-04 19:13:43 -07:00
TAILQ_HEAD(fds, imsg_fd) fds;
struct buf_read r;
struct msgbuf w;
int fd;
pid_t pid;
};
enum imsg_type {
IMSG_NONE,
IMSG_RECONF_CONF,
IMSG_RECONF_PEER,
IMSG_RECONF_FILTER,
IMSG_RECONF_LISTENER,
IMSG_RECONF_DONE,
IMSG_UPDATE,
IMSG_UPDATE_ERR,
IMSG_SESSION_ADD,
IMSG_SESSION_UP,
IMSG_SESSION_DOWN,
IMSG_MRT_OPEN,
IMSG_MRT_REOPEN,
IMSG_MRT_CLOSE,
IMSG_KROUTE_CHANGE,
IMSG_KROUTE_DELETE,
IMSG_KROUTE6_CHANGE,
IMSG_KROUTE6_DELETE,
IMSG_NEXTHOP_ADD,
IMSG_NEXTHOP_REMOVE,
IMSG_NEXTHOP_UPDATE,
IMSG_PFTABLE_ADD,
IMSG_PFTABLE_REMOVE,
IMSG_PFTABLE_COMMIT,
IMSG_NETWORK_ADD,
IMSG_NETWORK_REMOVE,
IMSG_NETWORK_FLUSH,
IMSG_NETWORK_DONE,
IMSG_FILTER_SET,
IMSG_CTL_END,
IMSG_CTL_RELOAD,
IMSG_CTL_FIB_COUPLE,
IMSG_CTL_FIB_DECOUPLE,
IMSG_CTL_NEIGHBOR_UP,
IMSG_CTL_NEIGHBOR_DOWN,
IMSG_CTL_NEIGHBOR_CLEAR,
IMSG_CTL_NEIGHBOR_RREFRESH,
IMSG_CTL_KROUTE,
IMSG_CTL_KROUTE6,
IMSG_CTL_KROUTE_ADDR,
IMSG_CTL_RESULT,
IMSG_CTL_SHOW_NEIGHBOR,
IMSG_CTL_SHOW_NEXTHOP,
IMSG_CTL_SHOW_INTERFACE,
IMSG_CTL_SHOW_RIB,
IMSG_CTL_SHOW_RIB_AS,
IMSG_CTL_SHOW_RIB_PREFIX,
IMSG_CTL_SHOW_RIB_ATTR,
IMSG_CTL_SHOW_RIB_COMMUNITY,
IMSG_CTL_SHOW_NETWORK,
IMSG_CTL_SHOW_NETWORK6,
IMSG_CTL_SHOW_RIB_MEM,
IMSG_CTL_SHOW_TERSE,
IMSG_CTL_SHOW_TIMER,
IMSG_REFRESH,
IMSG_IFINFO,
IMSG_DEMOTE
};
struct imsg_hdr {
u_int32_t peerid;
pid_t pid;
enum imsg_type type;
u_int16_t len;
};
struct imsg {
struct imsg_hdr hdr;
2003-12-20 12:25:20 -08:00
void *data;
};
struct demote_msg {
char demote_group[IFNAMSIZ];
int level;
};
enum ctl_results {
CTL_RES_OK,
CTL_RES_NOSUCHPEER,
CTL_RES_DENIED,
CTL_RES_NOCAP,
CTL_RES_PARSE_ERROR,
CTL_RES_NOMEM
};
/* needed for session.h parse prototype */
LIST_HEAD(mrt_head, mrt);
/* error codes and subcodes needed in SE and RDE */
enum err_codes {
ERR_HEADER = 1,
ERR_OPEN,
ERR_UPDATE,
ERR_HOLDTIMEREXPIRED,
ERR_FSM,
ERR_CEASE
};
enum suberr_update {
ERR_UPD_UNSPECIFIC,
ERR_UPD_ATTRLIST,
ERR_UPD_UNKNWN_WK_ATTR,
ERR_UPD_MISSNG_WK_ATTR,
ERR_UPD_ATTRFLAGS,
ERR_UPD_ATTRLEN,
ERR_UPD_ORIGIN,
ERR_UPD_LOOP,
ERR_UPD_NEXTHOP,
ERR_UPD_OPTATTR,
ERR_UPD_NETWORK,
ERR_UPD_ASPATH
};
enum suberr_cease {
ERR_CEASE_MAX_PREFIX = 1,
ERR_CEASE_ADMIN_DOWN,
ERR_CEASE_PEER_UNCONF,
ERR_CEASE_ADMIN_RESET,
ERR_CEASE_CONN_REJECT,
ERR_CEASE_OTHER_CHANGE,
ERR_CEASE_COLLISION,
ERR_CEASE_RSRC_EXHAUST
};
struct kroute {
struct in_addr prefix;
struct in_addr nexthop;
u_int16_t flags;
u_int16_t labelid;
u_short ifindex;
u_int8_t prefixlen;
};
struct kroute6 {
struct in6_addr prefix;
struct in6_addr nexthop;
u_int16_t flags;
u_int16_t labelid;
u_short ifindex;
u_int8_t prefixlen;
};
struct kroute_nexthop {
union {
struct kroute kr4;
struct kroute6 kr6;
} kr;
struct bgpd_addr nexthop;
struct bgpd_addr gateway;
u_int8_t valid;
u_int8_t connected;
};
struct kif {
char ifname[IFNAMSIZ];
2007-09-11 10:07:59 -07:00
u_int64_t baudrate;
int flags;
u_short ifindex;
u_int8_t media_type;
u_int8_t link_state;
u_int8_t nh_reachable; /* for nexthop verification */
};
struct session_up {
struct bgpd_addr local_addr;
struct bgpd_addr remote_addr;
struct capabilities capa_announced;
struct capabilities capa_received;
u_int32_t remote_bgpid;
u_int16_t short_as;
};
struct pftable_msg {
struct bgpd_addr addr;
char pftable[PFTABLE_LEN];
u_int8_t len;
};
struct ctl_show_nexthop {
struct bgpd_addr addr;
u_int8_t valid;
struct kif kif;
};
struct ctl_neighbor {
struct bgpd_addr addr;
char descr[PEER_DESCR_LEN];
int show_timers;
};
struct kroute_label {
struct kroute kr;
char label[RTLABEL_LEN];
};
struct kroute6_label {
struct kroute6 kr;
char label[RTLABEL_LEN];
};
#define F_RIB_ELIGIBLE 0x01
#define F_RIB_ACTIVE 0x02
#define F_RIB_INTERNAL 0x04
#define F_RIB_ANNOUNCE 0x08
struct ctl_show_rib {
struct bgpd_addr true_nexthop;
struct bgpd_addr exit_nexthop;
struct bgpd_addr prefix;
struct bgpd_addr remote_addr;
char descr[PEER_DESCR_LEN];
time_t lastchange;
u_int32_t remote_id;
u_int32_t local_pref;
u_int32_t med;
u_int32_t prefix_cnt;
u_int32_t active_cnt;
u_int32_t adjrib_cnt;
u_int16_t aspath_len;
u_int16_t flags;
u_int8_t prefixlen;
u_int8_t origin;
/* plus a aspath_len bytes long aspath */
};
struct ctl_show_rib_prefix {
struct bgpd_addr prefix;
time_t lastchange;
u_int16_t flags;
u_int8_t prefixlen;
};
enum as_spec {
AS_NONE,
AS_ALL,
AS_SOURCE,
AS_TRANSIT,
AS_PEER,
AS_EMPTY
};
struct filter_as {
enum as_spec type;
u_int32_t as;
};
struct filter_community {
int as;
int type;
};
struct ctl_show_rib_request {
struct ctl_neighbor neighbor;
struct bgpd_addr prefix;
struct filter_as as;
struct filter_community community;
u_int32_t peerid;
pid_t pid;
u_int16_t flags;
enum imsg_type type;
sa_family_t af;
u_int8_t prefixlen;
};
enum filter_actions {
ACTION_NONE,
ACTION_ALLOW,
ACTION_DENY
};
enum directions {
DIR_IN = 1,
DIR_OUT
};
enum from_spec {
FROM_ALL,
FROM_ADDRESS,
FROM_DESCR,
FROM_GROUP
};
enum comp_ops {
OP_NONE,
OP_RANGE,
OP_XRANGE,
OP_EQ,
OP_NE,
OP_LE,
OP_LT,
OP_GE,
OP_GT
};
struct filter_peers {
u_int32_t peerid;
u_int32_t groupid;
};
/* special community type */
#define COMMUNITY_ERROR -1
#define COMMUNITY_ANY -2
#define COMMUNITY_NEIGHBOR_AS -3
#define COMMUNITY_UNSET -4
#define COMMUNITY_WELLKNOWN 0xffff
#define COMMUNITY_NO_EXPORT 0xff01
#define COMMUNITY_NO_ADVERTISE 0xff02
#define COMMUNITY_NO_EXPSUBCONFED 0xff03
#define COMMUNITY_NO_PEER 0xff04 /* RFC 3765 */
struct filter_prefix {
struct bgpd_addr addr;
u_int8_t len;
};
struct filter_prefixlen {
enum comp_ops op;
sa_family_t af;
u_int8_t len_min;
u_int8_t len_max;
};
struct filter_match {
struct filter_prefix prefix;
struct filter_prefixlen prefixlen;
struct filter_as as;
struct filter_community community;
};
TAILQ_HEAD(filter_head, filter_rule);
struct filter_rule {
TAILQ_ENTRY(filter_rule) entry;
struct filter_peers peer;
struct filter_match match;
struct filter_set_head set;
enum filter_actions action;
enum directions dir;
u_int8_t quick;
};
enum action_types {
ACTION_SET_LOCALPREF,
ACTION_SET_RELATIVE_LOCALPREF,
ACTION_SET_MED,
ACTION_SET_RELATIVE_MED,
ACTION_SET_WEIGHT,
ACTION_SET_RELATIVE_WEIGHT,
ACTION_SET_PREPEND_SELF,
ACTION_SET_PREPEND_PEER,
ACTION_SET_NEXTHOP,
ACTION_SET_NEXTHOP_REJECT,
ACTION_SET_NEXTHOP_BLACKHOLE,
ACTION_SET_NEXTHOP_NOMODIFY,
ACTION_SET_NEXTHOP_SELF,
ACTION_SET_COMMUNITY,
ACTION_DEL_COMMUNITY,
ACTION_PFTABLE,
ACTION_PFTABLE_ID,
ACTION_RTLABEL,
ACTION_RTLABEL_ID
};
struct filter_set {
TAILQ_ENTRY(filter_set) entry;
union {
u_int8_t prepend;
u_int16_t id;
u_int32_t metric;
int32_t relative;
struct bgpd_addr nexthop;
struct filter_community community;
char pftable[PFTABLE_LEN];
char rtlabel[RTLABEL_LEN];
} action;
enum action_types type;
};
struct rrefresh {
u_int16_t afi;
u_int8_t safi;
};
struct rde_memstats {
int64_t path_cnt;
int64_t prefix_cnt;
int64_t pt4_cnt;
int64_t pt6_cnt;
int64_t nexthop_cnt;
int64_t aspath_cnt;
int64_t aspath_size;
int64_t aspath_refs;
int64_t attr_cnt;
int64_t attr_refs;
int64_t attr_data;
int64_t attr_dcnt;
};
/* Address Family Numbers as per RFC 1700 */
#define AFI_IPv4 1
#define AFI_IPv6 2
#define AFI_ALL 0xffff
/* Subsequent Address Family Identifier as per RFC 4760 */
#define SAFI_NONE 0x00
#define SAFI_UNICAST 0x01
#define SAFI_MULTICAST 0x02
#define SAFI_ALL 0xff
/* 4-byte magic AS number */
#define AS_TRANS 23456
/* prototypes */
/* bgpd.c */
void send_nexthop_update(struct kroute_nexthop *);
void send_imsg_session(int, pid_t, void *, u_int16_t);
int bgpd_redistribute(int, struct kroute *, struct kroute6 *);
int bgpd_filternexthop(struct kroute *, struct kroute6 *);
/* buffer.c */
struct buf *buf_open(size_t);
struct buf *buf_grow(struct buf *, size_t);
int buf_add(struct buf *, const void *, size_t);
void *buf_reserve(struct buf *, size_t);
int buf_close(struct msgbuf *, struct buf *);
int buf_write(int, struct buf *);
void buf_free(struct buf *);
void msgbuf_init(struct msgbuf *);
void msgbuf_clear(struct msgbuf *);
int msgbuf_write(struct msgbuf *);
/* log.c */
void log_init(int);
void vlog(int, const char *, va_list);
void log_peer_warn(const struct peer_config *, const char *, ...);
void log_peer_warnx(const struct peer_config *, const char *, ...);
void log_warn(const char *, ...);
2004-01-22 11:13:56 -08:00
void log_warnx(const char *, ...);
void log_info(const char *, ...);
void log_debug(const char *, ...);
void fatal(const char *) __dead;
void fatalx(const char *) __dead;
/* parse.y */
int cmdline_symset(char *);
/* config.c */
int host(const char *, struct bgpd_addr *, u_int8_t *);
/* imsg.c */
void imsg_init(struct imsgbuf *, int);
int imsg_read(struct imsgbuf *);
int imsg_get(struct imsgbuf *, struct imsg *);
int imsg_compose(struct imsgbuf *, enum imsg_type, u_int32_t, pid_t, int,
const void *, u_int16_t);
struct buf *imsg_create(struct imsgbuf *, enum imsg_type, u_int32_t, pid_t,
u_int16_t);
int imsg_add(struct buf *, const void *, u_int16_t);
int imsg_close(struct imsgbuf *, struct buf *);
void imsg_free(struct imsg *);
int imsg_get_fd(struct imsgbuf *);
/* kroute.c */
int kr_init(int, u_int);
int kr_change(struct kroute_label *);
int kr_delete(struct kroute_label *);
int kr6_change(struct kroute6_label *);
int kr6_delete(struct kroute6_label *);
void kr_shutdown(void);
void kr_fib_couple(void);
void kr_fib_decouple(void);
int kr_dispatch_msg(void);
int kr_nexthop_add(struct bgpd_addr *);
void kr_nexthop_delete(struct bgpd_addr *);
void kr_show_route(struct imsg *);
void kr_ifinfo(char *);
int kr_reload(void);
in_addr_t prefixlen2mask(u_int8_t);
struct in6_addr *prefixlen2mask6(u_int8_t prefixlen);
void inet6applymask(struct in6_addr *, const struct in6_addr *,
int);
/* control.c */
void control_cleanup(const char *);
int control_imsg_relay(struct imsg *);
/* pftable.c */
int pftable_exists(const char *);
int pftable_add(const char *);
int pftable_clear_all(void);
int pftable_addr_add(struct pftable_msg *);
int pftable_addr_remove(struct pftable_msg *);
int pftable_commit(void);
2005-06-25 12:24:37 -07:00
/* name2id.c */
u_int16_t rtlabel_name2id(const char *);
2005-06-25 12:24:37 -07:00
const char *rtlabel_id2name(u_int16_t);
void rtlabel_unref(u_int16_t);
void rtlabel_ref(u_int16_t);
u_int16_t pftable_name2id(const char *);
const char *pftable_id2name(u_int16_t);
void pftable_unref(u_int16_t);
void pftable_ref(u_int16_t);
/* rde_filter.c */
void filterset_free(struct filter_set_head *);
int filterset_cmp(struct filter_set *, struct filter_set *);
const char *filterset_name(enum action_types);
2005-06-25 12:24:37 -07:00
/* util.c */
const char *log_addr(const struct bgpd_addr *);
const char *log_in6addr(const struct in6_addr *);
const char *log_sockaddr(struct sockaddr *);
const char *log_as(u_int32_t);
int aspath_snprint(char *, size_t, void *, u_int16_t);
int aspath_asprint(char **, void *, u_int16_t);
size_t aspath_strlen(void *, u_int16_t);
2005-06-25 12:24:37 -07:00
#endif /* __BGPD_H__ */