HomeSort by: relevance | last modified time | path
    Searched refs:ipset (Results 1 - 9 of 9) sorted by relevancy

  /src/external/bsd/unbound/dist/doc/
README.ipset.md 1 ## Created a module to support the ipset that could add the domain's ip to a list easily.
6 At the final step, I need to install a dns service which would work with ipset well to launch the system.
7 I did some research for this. Unfortunately, Unbound, My favorite dns service doesn't support ipset yet. So, I decided to implement it by my self and contribute the patch. It's good for me and the community.
12 local-zone: "facebook.com" ipset
13 local-zone: "twitter.com" ipset
14 local-zone: "instagram.com" ipset
17 ipset:
31 local-zone: "facebook.com" ipset
32 local-zone: "twitter.com" ipset
33 local-zone: "instagram.com" ipset
    [all...]
  /src/external/bsd/unbound/dist/testdata/ipset.tdir/
ipset.conf 4 module-config: "ipset iterator"
14 local-zone: "example.net." ipset
24 ipset:
  /src/share/examples/npf/
soho_gw-npf.conf 17 table <naughty> type ipset
  /src/external/bsd/unbound/dist/respip/
respip.h 189 * @param ipset: the respip set for the global view.
198 int* rpz_passthru, struct views* views, struct respip_set* ipset);
respip.c 808 int ATTR_UNUSED(tag), const struct respip_set* ATTR_UNUSED(ipset),
879 struct views* views, struct respip_set* ipset)
925 log_assert(ipset);
953 if(!raddr && (raddr = respip_addr_lookup(rep, ipset,
959 ipset->tagname, ipset->num_tags);
1019 ipset->tagname, ipset->num_tags, &redirect_rrset,
1051 redirect_rrset, tag, ipset, search_only, region,
  /src/usr.sbin/npf/npfctl/
npf_scan.l 129 ipset return IPSET;
  /src/external/bsd/ipf/dist/tools/
ippool.c 152 int err = 0, c, ipset, role, type = IPLT_POOL, ttl = 0; local
158 ipset = 0;
172 ipset = 1;
181 if (ipset == 1) {
194 if (ipset == 1) {
224 if (argv[optind] != NULL && ipset == 0) {
226 ipset = 1;
232 if (ipset == 0) {
  /src/external/bsd/unbound/dist/ipset/
ipset.c 3 * This file implements the ipset module. It can handle packets by putting
5 * ipset (local-zone statements) into a firewall rule IPSet. For firewall
9 #include "ipset/ipset.h"
30 #include <linux/netfilter/ipset/ip_set.h>
72 log_err("ipset: could not open netfilter.");
78 log_err("ipset: could not bind netfilter.");
206 verbose(VERB_QUERY, "ipset: add %s to %s for %s", ip, setname, dname);
210 log_err("ipset: could not add %s into %s", dname, setname)
    [all...]
  /src/external/bsd/unbound/dist/
configure 1647 --enable-ipset enable ipset module
26553 # check for ipset if requested
26554 # Check whether --enable-ipset was given.
26565 IPSET_SRC="ipset/ipset.c"
26567 IPSET_OBJ="ipset.lo"

Completed in 52 milliseconds