source: rtems/cpukit/libnetworking/netinet/ip_var.h @ 19ef9f72

4.104.114.84.95
Last change on this file since 19ef9f72 was 19ef9f72, checked in by Ralf Corsepius <ralf.corsepius@…>, on 03/26/07 at 06:01:00

2007-03-26 Ralf Corsépius <ralf.corsepius@…>

  • libnetworking/netinet/ip_var.h: Eliminate P().
  • Property mode set to 100644
File size: 7.7 KB
Line 
1/*
2 * Copyright (c) 1982, 1986, 1993
3 *      The Regents of the University of California.  All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 *    notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 *    notice, this list of conditions and the following disclaimer in the
12 *    documentation and/or other materials provided with the distribution.
13 * 4. Neither the name of the University nor the names of its contributors
14 *    may be used to endorse or promote products derived from this software
15 *    without specific prior written permission.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 *
29 *      @(#)ip_var.h    8.2 (Berkeley) 1/9/95
30 * $FreeBSD: src/sys/netinet/ip_var.h,v 1.94 2005/01/07 01:45:44 imp Exp $
31 */
32 
33/*
34 *      $Id$
35 */
36
37#ifndef _NETINET_IP_VAR_H_
38#define _NETINET_IP_VAR_H_
39
40/*
41 * Overlay for ip header used by other protocols (tcp, udp).
42 */
43struct ipovly {
44        caddr_t ih_next;
45        caddr_t ih_prev;                /* for protocol sequence q's */
46        u_char  ih_x1;                  /* (unused) */
47        u_char  ih_pr;                  /* protocol */
48        u_short ih_len;                 /* protocol length */
49        struct  in_addr ih_src;         /* source internet address */
50        struct  in_addr ih_dst;         /* destination internet address */
51};
52
53/*
54 * Ip reassembly queue structure.  Each fragment
55 * being reassembled is attached to one of these structures.
56 * They are timed out after ipq_ttl drops to 0, and may also
57 * be reclaimed if memory becomes tight.
58 */
59struct ipq {
60        struct  ipq *next,*prev;        /* to other reass headers */
61        u_char  ipq_ttl;                /* time for reass q to live */
62        u_char  ipq_p;                  /* protocol of this fragment */
63        u_short ipq_id;                 /* sequence id for reassembly */
64        struct  ipasfrag *ipq_next,*ipq_prev;
65                                        /* to ip headers of fragments */
66        struct  in_addr ipq_src,ipq_dst;
67#ifdef IPDIVERT
68        u_short ipq_divert;             /* divert protocol port */
69#endif
70};
71
72/*
73 * Ip header, when holding a fragment.
74 *
75 * Note: ipf_next must be at same offset as ipq_next above
76 */
77struct  ipasfrag {
78#if BYTE_ORDER == LITTLE_ENDIAN
79        u_char  ip_hl:4,
80                ip_v:4;
81#endif
82#if BYTE_ORDER == BIG_ENDIAN
83        u_char  ip_v:4,
84                ip_hl:4;
85#endif
86        u_char  ipf_mff;                /* XXX overlays ip_tos: use low bit
87                                         * to avoid destroying tos;
88                                         * copied from (ip_off&IP_MF) */
89        u_short ip_len;
90        u_short ip_id;
91        u_short ip_off;
92        u_char  ip_ttl;
93        u_char  ip_p;
94        u_short ip_sum;
95        struct  ipasfrag *ipf_next;     /* next fragment */
96        struct  ipasfrag *ipf_prev;     /* previous fragment */
97};
98
99/*
100 * Structure stored in mbuf in inpcb.ip_options
101 * and passed to ip_output when ip options are in use.
102 * The actual length of the options (including ipopt_dst)
103 * is in m_len.
104 */
105#define MAX_IPOPTLEN    40
106
107struct ipoption {
108        struct  in_addr ipopt_dst;      /* first-hop dst if source routed */
109        char    ipopt_list[MAX_IPOPTLEN];       /* options proper */
110};
111
112/*
113 * Structure attached to inpcb.ip_moptions and
114 * passed to ip_output when IP multicast options are in use.
115 */
116struct ip_moptions {
117        struct  ifnet *imo_multicast_ifp; /* ifp for outgoing multicasts */
118        u_char  imo_multicast_ttl;      /* TTL for outgoing multicasts */
119        u_char  imo_multicast_loop;     /* 1 => hear sends if a member */
120        u_short imo_num_memberships;    /* no. memberships this socket */
121        struct  in_multi *imo_membership[IP_MAX_MEMBERSHIPS];
122        u_long  imo_multicast_vif;      /* vif num outgoing multicasts */
123};
124
125struct  ipstat {
126        u_long  ips_total;              /* total packets received */
127        u_long  ips_badsum;             /* checksum bad */
128        u_long  ips_tooshort;           /* packet too short */
129        u_long  ips_toosmall;           /* not enough data */
130        u_long  ips_badhlen;            /* ip header length < data size */
131        u_long  ips_badlen;             /* ip length < ip header length */
132        u_long  ips_fragments;          /* fragments received */
133        u_long  ips_fragdropped;        /* frags dropped (dups, out of space) */
134        u_long  ips_fragtimeout;        /* fragments timed out */
135        u_long  ips_forward;            /* packets forwarded */
136        u_long  ips_cantforward;        /* packets rcvd for unreachable dest */
137        u_long  ips_redirectsent;       /* packets forwarded on same net */
138        u_long  ips_noproto;            /* unknown or unsupported protocol */
139        u_long  ips_delivered;          /* datagrams delivered to upper level*/
140        u_long  ips_localout;           /* total ip packets generated here */
141        u_long  ips_odropped;           /* lost packets due to nobufs, etc. */
142        u_long  ips_reassembled;        /* total packets reassembled ok */
143        u_long  ips_fragmented;         /* datagrams successfully fragmented */
144        u_long  ips_ofragments;         /* output fragments created */
145        u_long  ips_cantfrag;           /* don't fragment flag was set, etc. */
146        u_long  ips_badoptions;         /* error in option processing */
147        u_long  ips_noroute;            /* packets discarded due to no route */
148        u_long  ips_badvers;            /* ip version != 4 */
149        u_long  ips_rawout;             /* total raw ip packets generated */
150        u_long  ips_toolong;            /* ip length > max ip packet size */
151};
152
153#ifdef _KERNEL
154/* flags passed to ip_output as last parameter */
155#define IP_FORWARDING           0x1             /* most of ip header exists */
156#define IP_RAWOUTPUT            0x2             /* raw ip header exists */
157#define IP_SENDONES             0x4             /* send all-ones broadcast */
158#define IP_ROUTETOIF            SO_DONTROUTE    /* bypass routing tables */
159#define IP_ALLOWBROADCAST       SO_BROADCAST    /* can send broadcast packets */
160
161struct ip;
162struct inpcb;
163struct route;
164struct sockopt;
165struct mbuf;
166
167extern struct   ipstat  ipstat;
168extern u_short  ip_id;                          /* ip packet ctr, for ids */
169extern int      ip_defttl;                      /* default IP ttl */
170extern u_char   ip_protox[];
171extern struct socket *ip_rsvpd; /* reservation protocol daemon */
172extern struct socket *ip_mrouter; /* multicast routing daemon */
173extern int      (*legal_vif_num)(int);
174extern u_long   (*ip_mcast_src)(int);
175extern int rsvp_on;
176
177int      ip_ctloutput(int, struct socket *, int, int, struct mbuf **);
178void     ip_drain(void);
179void     ip_freemoptions(struct ip_moptions *);
180void     ip_init(void);
181extern int       (*ip_mforward)(struct ip *, struct ifnet *, struct mbuf *,
182                          struct ip_moptions *);
183int      ip_output(struct mbuf *,
184            struct mbuf *, struct route *, int, struct ip_moptions *);
185void     ip_savecontrol(struct inpcb *, struct mbuf **, struct ip *,
186                struct mbuf *);
187void     ip_slowtimo(void);
188struct mbuf *
189         ip_srcroute(void);
190void     ip_stripoptions(struct mbuf *, struct mbuf *);
191int      rip_ctloutput(int, struct socket *, int, int, struct mbuf **);
192void     rip_init(void);
193void     rip_input(struct mbuf *, int);
194int      rip_output(struct mbuf *, struct socket *, u_long);
195int      rip_usrreq(struct socket *,
196            int, struct mbuf *, struct mbuf *, struct mbuf *);
197void    ipip_input(struct mbuf *, int);
198void    rsvp_input(struct mbuf *, int);
199int     ip_rsvp_init(struct socket *);
200int     ip_rsvp_done(void);
201int     ip_rsvp_vif_init(struct socket *, struct mbuf *);
202int     ip_rsvp_vif_done(struct socket *, struct mbuf *);
203void    ip_rsvp_force_done(struct socket *);
204
205#ifdef IPDIVERT
206void    div_init(void);
207void    div_input(struct mbuf *, int);
208int     div_usrreq(struct socket *,
209                int, struct mbuf *, struct mbuf *, struct mbuf *);
210extern u_short ip_divert_port;
211extern u_short ip_divert_ignore;
212#endif /* IPDIVERT */
213
214#endif /* _KERNEL */
215
216#endif /* !_NETINET_IP_VAR_H_ */
Note: See TracBrowser for help on using the repository browser.