/src/games/sail/ |
dr_main.c | 59 int nat[NNATION]; local in function:dr_main 79 nat[n] = 0; 91 sp->file->stern = nat[sp->nationality]++;
|
pl_main.c | 58 int nat[NNATION]; local in function:pl_main_init 69 nat[n] = 0; 76 sp->file->stern = nat[sp->nationality]++;
|
dr_1.c | 55 int nat; local in function:unfoul 61 nat = capship(sp)->nationality; 63 if (nat != capship(to)->nationality &&
|
/src/sys/external/bsd/ipf/netinet/ |
ip_frag.c | 198 RWLOCK_INIT(&softf->ipfr_natfrag, "ipf NAT fragment rwlock"); 539 /* nat(I) - pointer to NAT structure */ 541 /* Create a new NAT fragment cache entry based on the current packet and */ 542 /* the NAT structure for this "session". */ 546 nat_t *nat) 561 fra->ipfr_data = nat; 562 nat->nat_data = fra; 787 /* Returns: nat_t* - pointer to 'parent' NAT structure if frag table */ 791 /* Functional interface for NAT lookups of the NAT fragment cache * 798 nat_t *nat; local in function:ipf_frag_natknown 1002 nat_t *nat; local in function:ipf_frag_clear 1041 nat_t *nat; local in function:ipf_frag_expire [all...] |
ip_sync.c | 153 void ipf_sync_natorder(int, struct nat *); 236 RWLOCK_INIT(&softs->ipf_syncnat, "add things to nat sync table"); 337 /* nat(IO) - pointer to data to be converted. */ 339 /* Do byte swapping on values in the NAT data structure that need to be */ 425 /* structures in the state/NAT tables. */ 571 /* for pending state/NAT updates. If no data is available, the caller is */ 883 /* Deletes an object from the synclist nat table and free's its memory. */ 903 /* Updates the NAT table according to information passed in the sync */ 906 /* create a new NAT entry or update one. Deletion is left to the NAT */ 914 nat_t *n, *nat; local in function:ipf_sync_nat 1148 nat_t *nat; local in function:ipf_sync_update [all...] |
ip_nat6.c | 150 /* Parameters: in(I) - NAT rule that requires address fields to be init'd */ 152 /* For each of the source/destination address fields in a NAT rule, call */ 206 /* Parameters: n(I) - pointer to NAT rule to add */ 209 /* loaded NAT rules. Updates the bitmask indicating which netmasks are in */ 253 /* Parameters: n(I) - pointer to NAT rule to add */ 255 /* Adds a NAT map rule to the hash table of rules and the list of loaded */ 256 /* NAT rules. Updates the bitmask indicating which netmasks are in use by */ 294 /* Parameters: n(I) - pointer to NAT rule to delete */ 296 /* Removes a NAT rdr rule from the hash table of NAT rdr rules. * 944 nat_t *nat, *natl; local in function:ipf_nat6_add 1374 nat_t *nat; local in function:ipf_nat6_icmperrorlookup 1566 nat_t *nat; local in function:ipf_nat6_icmperror 1878 nat_t *nat; local in function:ipf_nat6_inlookup 2191 nat_t *nat; local in function:ipf_nat6_outlookup 2420 nat_t *nat; local in function:ipf_nat6_lookupredir 2574 nat_t *nat; local in function:ipf_nat6_checkout 2973 nat_t *nat; local in function:ipf_nat6_checkin [all...] |
ip_nat.c | 142 /* nat */ 194 /* How the NAT is organised and works. */ 196 /* Inside (interface y) NAT Outside (interface x) */ 210 /* In the NAT table, internal source is recorded as "in" and externally */ 272 /* The only global NAT structure that needs to be initialised is the filter */ 303 /* Returns: void * - NULL = failure, else pointer to NAT context */ 306 /* Allocate the initial soft context structure for NAT and populate it with */ 382 /* Initialise all of the NAT locks, tables and other structures. */ 477 "nat ipftq udp tab"); 481 "nat ipftq udpack tab") 985 ipnat_t *nat, *nt, *n; local in function:ipf_nat_ioctl 1686 nat_t *nat, *n; local in function:ipf_nat_getsz 1779 nat_t *n, *nat; local in function:ipf_nat_getent 1914 nat_t *n, *nat; local in function:ipf_nat_putent 2440 nat_t *nat; local in function:ipf_nat_flushtable 2532 nat_t *nat; local in function:ipf_nat_delrule 3065 nat_t *nat, *natl; local in function:ipf_nat_add 3574 nat_t *nat; local in function:ipf_nat_icmperrorlookup 3728 nat_t *nat; local in function:ipf_nat_icmperror 4029 nat_t *nat; local in function:ipf_nat_inlookup 4358 nat_t *nat; local in function:ipf_nat_outlookup 4586 nat_t *nat; local in function:ipf_nat_lookupredir 4789 nat_t *nat; local in function:ipf_nat_checkout 5282 nat_t *nat; local in function:ipf_nat_checkin 5862 nat_t *nat; local in function:ipf_nat_sync 6225 nat_t *nat; local in function:ipf_nat_deref 6522 nat_t *nat, *nextnat = NULL, zeronat; local in function:ipf_nat_getnext 6666 nat_t *nat, **natp; local in function:ipf_nat_extraflush 7591 nat_t *nat, *natnext; local in function:ipf_nat_matchflush 7907 nat_t **newtab[2], *nat, **natp; local in function:ipf_nat_rehash 8231 nat_t *nat; local in function:ipf_nat_uncreate [all...] |
ip_fil_compat.c | 562 struct ipnat *in_next; /* NAT rule list next */ 699 struct nat *nat_next; 700 struct nat **nat_pnext; 701 struct nat *nat_hnext[2]; 702 struct nat **nat_phnext[2]; 705 struct nat **nat_me; 741 struct nat *nat_next; 742 struct nat **nat_pnext; 743 struct nat *nat_hnext[2]; 744 struct nat **nat_phnext[2] 4563 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_25 4622 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_14 4680 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_3 [all...] |
ip_nat.h | 37 #undef LARGE_NAT /* define this if you're setting up a system to NAT 42 * a setup with 1000-2000 networks to NAT. 95 * This structure is used in the active NAT table and represents an 96 * active NAT session. 99 * The first place gives them a position in a linked list of NAT sessions 104 * that a nat_t structure is generally referenced from is the NAT hash table. 113 typedef struct nat { struct 115 struct nat *nat_next; 116 struct nat **nat_pnext; 117 struct nat *nat_hnext[2] [all...] |
/src/usr.sbin/npf/npfctl/ |
npf_cmd.c | 148 "invalid NAT ruleset name (note: the name must be " 409 bool nat; member in struct:__anon353fbb410108 429 * applicability of NAT. 438 if (fil->nat && !nat_conn) { 509 f.nat = true; 529 "nat-addr:port");
|
npf_build.c | 688 * npfctl_build_maprset: create and insert a NAT ruleset. 701 yyerror("NAT ruleset names must be prefixed with `" 705 yyerror("NAT ruleset is missing a name (only prefix found)"); 902 * npfctl_build_nat: create a single NAT policy of a specified 912 nl_nat_t *nat; local in function:npfctl_build_nat 927 nat = npf_nat_create(type, flags, ifname); 934 npf_nat_setaddr(nat, family, &am->fam_addr, am->fam_mask); 940 npf_nat_settable(nat, tid); 946 npf_nat_setport(nat, port); 947 npfctl_build_code(nat, family, popts, fopts) [all...] |
/src/sys/net/npf/ |
npf_conn.c | 55 * The key may be formed using translated values in a case of NAT. 58 * to accommodate the dynamic NAT. Connections for the former purpose 62 * ruleset. The other purpose is to associate a dynamic NAT mechanism 63 * with a connection. Such connections are created by the NAT policies 64 * and they have a relationship with NAT translation structure via 71 * NAT policy. Both keys of the established connection are inserted 404 * on other interfaces will also bypass dynamic NAT. 535 /* Release any NAT structures. */ 554 * npf_conn_setnat: associate NAT entry with the connection, update and 624 /* Associate the NAT entry and release the lock. * 860 const nvlist_t *nat, *conkey; local in function:npf_conn_import [all...] |
npf_ctl.c | 440 npf_mk_singlenat(npf_t *npf, const nvlist_t *nat, nvlist_t *resp, 448 * NAT rules are standard rules, plus the translation policy. 451 error = npf_mk_singlerule(npf, nat, resp, NULL, &rl); 458 /* If this rule is named, then it is a group with NAT policies. */ 459 if (dnvlist_get_string(nat, "name", NULL)) { 464 if (nvlist_exists_number(nat, "nat-table-id")) { 465 unsigned tid = nvlist_get_number(nat, "nat-table-id"); 474 /* Allocate a new NAT policy and assign it to the rule. * 512 const nvlist_t *nat = nat_rules[i]; local in function:npf_mk_natlist [all...] |
/src/sys/external/mit/xen-include-public/dist/xen/include/public/arch-x86/hvm/ |
save.h | 281 struct hvm_hw_cpu nat; member in union:_hvm_hw_fix_cpu::hvm_hw_cpu_union 291 ucpu->nat.error_code = ucpu->cmp.error_code; 292 ucpu->nat.pending_event = ucpu->cmp.pending_event; 293 ucpu->nat.tsc = ucpu->cmp.tsc; 294 ucpu->nat.msr_tsc_aux = 0; 297 ucpu->nat.flags = XEN_X86_FPU_INITIALISED;
|
/src/lib/libnpf/ |
npf.c | 572 if (natset && !dnvlist_get_bool(rule_nvl, "nat-rule", false)) { 577 nvlist_add_bool(rule_nvl, "nat-ruleset", natset); 597 nvlist_add_bool(rule_nvl, "nat-ruleset", natset); 614 nvlist_add_bool(rule_nvl, "nat-ruleset", natset); 631 nvlist_add_bool(rule_nvl, "nat-ruleset", natset); 893 nvlist_add_bool(req, "nat-ruleset", natset); 1000 * NAT INTERFACE. 1013 /* Create a rule for NAT policy. Next, will add NAT data. */ 1023 nvlist_add_bool(rule_dict, "nat-rule", true) 1388 const nvlist_t *nat; local in function:_npf_conn_lookup [all...] |