HomeSort by: relevance | last modified time | path
    Searched defs:nat (Results 1 - 15 of 15) sorted by relevancy

  /src/games/sail/
dr_main.c 59 int nat[NNATION]; local in function:dr_main
79 nat[n] = 0;
91 sp->file->stern = nat[sp->nationality]++;
pl_main.c 58 int nat[NNATION]; local in function:pl_main_init
69 nat[n] = 0;
76 sp->file->stern = nat[sp->nationality]++;
dr_1.c 55 int nat; local in function:unfoul
61 nat = capship(sp)->nationality;
63 if (nat != capship(to)->nationality &&
  /src/sys/external/bsd/ipf/netinet/
ip_frag.c 198 RWLOCK_INIT(&softf->ipfr_natfrag, "ipf NAT fragment rwlock");
539 /* nat(I) - pointer to NAT structure */
541 /* Create a new NAT fragment cache entry based on the current packet and */
542 /* the NAT structure for this "session". */
546 nat_t *nat)
561 fra->ipfr_data = nat;
562 nat->nat_data = fra;
787 /* Returns: nat_t* - pointer to 'parent' NAT structure if frag table */
791 /* Functional interface for NAT lookups of the NAT fragment cache *
798 nat_t *nat; local in function:ipf_frag_natknown
1002 nat_t *nat; local in function:ipf_frag_clear
1041 nat_t *nat; local in function:ipf_frag_expire
    [all...]
ip_sync.c 153 void ipf_sync_natorder(int, struct nat *);
236 RWLOCK_INIT(&softs->ipf_syncnat, "add things to nat sync table");
337 /* nat(IO) - pointer to data to be converted. */
339 /* Do byte swapping on values in the NAT data structure that need to be */
425 /* structures in the state/NAT tables. */
571 /* for pending state/NAT updates. If no data is available, the caller is */
883 /* Deletes an object from the synclist nat table and free's its memory. */
903 /* Updates the NAT table according to information passed in the sync */
906 /* create a new NAT entry or update one. Deletion is left to the NAT */
914 nat_t *n, *nat; local in function:ipf_sync_nat
1148 nat_t *nat; local in function:ipf_sync_update
    [all...]
ip_nat6.c 150 /* Parameters: in(I) - NAT rule that requires address fields to be init'd */
152 /* For each of the source/destination address fields in a NAT rule, call */
206 /* Parameters: n(I) - pointer to NAT rule to add */
209 /* loaded NAT rules. Updates the bitmask indicating which netmasks are in */
253 /* Parameters: n(I) - pointer to NAT rule to add */
255 /* Adds a NAT map rule to the hash table of rules and the list of loaded */
256 /* NAT rules. Updates the bitmask indicating which netmasks are in use by */
294 /* Parameters: n(I) - pointer to NAT rule to delete */
296 /* Removes a NAT rdr rule from the hash table of NAT rdr rules. *
944 nat_t *nat, *natl; local in function:ipf_nat6_add
1374 nat_t *nat; local in function:ipf_nat6_icmperrorlookup
1566 nat_t *nat; local in function:ipf_nat6_icmperror
1878 nat_t *nat; local in function:ipf_nat6_inlookup
2191 nat_t *nat; local in function:ipf_nat6_outlookup
2420 nat_t *nat; local in function:ipf_nat6_lookupredir
2574 nat_t *nat; local in function:ipf_nat6_checkout
2973 nat_t *nat; local in function:ipf_nat6_checkin
    [all...]
ip_nat.c 142 /* nat */
194 /* How the NAT is organised and works. */
196 /* Inside (interface y) NAT Outside (interface x) */
210 /* In the NAT table, internal source is recorded as "in" and externally */
272 /* The only global NAT structure that needs to be initialised is the filter */
303 /* Returns: void * - NULL = failure, else pointer to NAT context */
306 /* Allocate the initial soft context structure for NAT and populate it with */
382 /* Initialise all of the NAT locks, tables and other structures. */
477 "nat ipftq udp tab");
481 "nat ipftq udpack tab")
985 ipnat_t *nat, *nt, *n; local in function:ipf_nat_ioctl
1686 nat_t *nat, *n; local in function:ipf_nat_getsz
1779 nat_t *n, *nat; local in function:ipf_nat_getent
1914 nat_t *n, *nat; local in function:ipf_nat_putent
2440 nat_t *nat; local in function:ipf_nat_flushtable
2532 nat_t *nat; local in function:ipf_nat_delrule
3065 nat_t *nat, *natl; local in function:ipf_nat_add
3574 nat_t *nat; local in function:ipf_nat_icmperrorlookup
3728 nat_t *nat; local in function:ipf_nat_icmperror
4029 nat_t *nat; local in function:ipf_nat_inlookup
4358 nat_t *nat; local in function:ipf_nat_outlookup
4586 nat_t *nat; local in function:ipf_nat_lookupredir
4789 nat_t *nat; local in function:ipf_nat_checkout
5282 nat_t *nat; local in function:ipf_nat_checkin
5862 nat_t *nat; local in function:ipf_nat_sync
6225 nat_t *nat; local in function:ipf_nat_deref
6522 nat_t *nat, *nextnat = NULL, zeronat; local in function:ipf_nat_getnext
6666 nat_t *nat, **natp; local in function:ipf_nat_extraflush
7591 nat_t *nat, *natnext; local in function:ipf_nat_matchflush
7907 nat_t **newtab[2], *nat, **natp; local in function:ipf_nat_rehash
8231 nat_t *nat; local in function:ipf_nat_uncreate
    [all...]
ip_fil_compat.c 562 struct ipnat *in_next; /* NAT rule list next */
699 struct nat *nat_next;
700 struct nat **nat_pnext;
701 struct nat *nat_hnext[2];
702 struct nat **nat_phnext[2];
705 struct nat **nat_me;
741 struct nat *nat_next;
742 struct nat **nat_pnext;
743 struct nat *nat_hnext[2];
744 struct nat **nat_phnext[2]
4563 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_25
4622 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_14
4680 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_3
    [all...]
ip_nat.h 37 #undef LARGE_NAT /* define this if you're setting up a system to NAT
42 * a setup with 1000-2000 networks to NAT.
95 * This structure is used in the active NAT table and represents an
96 * active NAT session.
99 * The first place gives them a position in a linked list of NAT sessions
104 * that a nat_t structure is generally referenced from is the NAT hash table.
113 typedef struct nat { struct
115 struct nat *nat_next;
116 struct nat **nat_pnext;
117 struct nat *nat_hnext[2]
    [all...]
  /src/usr.sbin/npf/npfctl/
npf_cmd.c 148 "invalid NAT ruleset name (note: the name must be "
409 bool nat; member in struct:__anon353fbb410108
429 * applicability of NAT.
438 if (fil->nat && !nat_conn) {
509 f.nat = true;
529 "nat-addr:port");
npf_build.c 688 * npfctl_build_maprset: create and insert a NAT ruleset.
701 yyerror("NAT ruleset names must be prefixed with `"
705 yyerror("NAT ruleset is missing a name (only prefix found)");
902 * npfctl_build_nat: create a single NAT policy of a specified
912 nl_nat_t *nat; local in function:npfctl_build_nat
927 nat = npf_nat_create(type, flags, ifname);
934 npf_nat_setaddr(nat, family, &am->fam_addr, am->fam_mask);
940 npf_nat_settable(nat, tid);
946 npf_nat_setport(nat, port);
947 npfctl_build_code(nat, family, popts, fopts)
    [all...]
  /src/sys/net/npf/
npf_conn.c 55 * The key may be formed using translated values in a case of NAT.
58 * to accommodate the dynamic NAT. Connections for the former purpose
62 * ruleset. The other purpose is to associate a dynamic NAT mechanism
63 * with a connection. Such connections are created by the NAT policies
64 * and they have a relationship with NAT translation structure via
71 * NAT policy. Both keys of the established connection are inserted
404 * on other interfaces will also bypass dynamic NAT.
535 /* Release any NAT structures. */
554 * npf_conn_setnat: associate NAT entry with the connection, update and
624 /* Associate the NAT entry and release the lock. *
860 const nvlist_t *nat, *conkey; local in function:npf_conn_import
    [all...]
npf_ctl.c 440 npf_mk_singlenat(npf_t *npf, const nvlist_t *nat, nvlist_t *resp,
448 * NAT rules are standard rules, plus the translation policy.
451 error = npf_mk_singlerule(npf, nat, resp, NULL, &rl);
458 /* If this rule is named, then it is a group with NAT policies. */
459 if (dnvlist_get_string(nat, "name", NULL)) {
464 if (nvlist_exists_number(nat, "nat-table-id")) {
465 unsigned tid = nvlist_get_number(nat, "nat-table-id");
474 /* Allocate a new NAT policy and assign it to the rule. *
512 const nvlist_t *nat = nat_rules[i]; local in function:npf_mk_natlist
    [all...]
  /src/sys/external/mit/xen-include-public/dist/xen/include/public/arch-x86/hvm/
save.h 281 struct hvm_hw_cpu nat; member in union:_hvm_hw_fix_cpu::hvm_hw_cpu_union
291 ucpu->nat.error_code = ucpu->cmp.error_code;
292 ucpu->nat.pending_event = ucpu->cmp.pending_event;
293 ucpu->nat.tsc = ucpu->cmp.tsc;
294 ucpu->nat.msr_tsc_aux = 0;
297 ucpu->nat.flags = XEN_X86_FPU_INITIALISED;
  /src/lib/libnpf/
npf.c 572 if (natset && !dnvlist_get_bool(rule_nvl, "nat-rule", false)) {
577 nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
597 nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
614 nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
631 nvlist_add_bool(rule_nvl, "nat-ruleset", natset);
893 nvlist_add_bool(req, "nat-ruleset", natset);
1000 * NAT INTERFACE.
1013 /* Create a rule for NAT policy. Next, will add NAT data. */
1023 nvlist_add_bool(rule_dict, "nat-rule", true)
1388 const nvlist_t *nat; local in function:_npf_conn_lookup
    [all...]

Completed in 23 milliseconds