/src/tests/ipf/regress/ |
Makefile | 136 ni1.nat \ 138 ni10.nat \ 140 ni11.nat \ 142 ni12.nat \ 144 ni13.nat \ 146 ni14.nat \ 148 ni15.nat \ 150 ni16.nat \ 152 ni17.nat \ 154 ni18.nat \ [all...] |
/src/sys/external/bsd/ipf/netinet/ |
ip_nat.c | 142 /* nat */ 194 /* How the NAT is organised and works. */ 196 /* Inside (interface y) NAT Outside (interface x) */ 210 /* In the NAT table, internal source is recorded as "in" and externally */ 272 /* The only global NAT structure that needs to be initialised is the filter */ 303 /* Returns: void * - NULL = failure, else pointer to NAT context */ 306 /* Allocate the initial soft context structure for NAT and populate it with */ 382 /* Initialise all of the NAT locks, tables and other structures. */ 477 "nat ipftq udp tab"); 481 "nat ipftq udpack tab") 985 ipnat_t *nat, *nt, *n; local in function:ipf_nat_ioctl 1686 nat_t *nat, *n; local in function:ipf_nat_getsz 1779 nat_t *n, *nat; local in function:ipf_nat_getent 1914 nat_t *n, *nat; local in function:ipf_nat_putent 2440 nat_t *nat; local in function:ipf_nat_flushtable 2532 nat_t *nat; local in function:ipf_nat_delrule 3065 nat_t *nat, *natl; local in function:ipf_nat_add 3574 nat_t *nat; local in function:ipf_nat_icmperrorlookup 3728 nat_t *nat; local in function:ipf_nat_icmperror 4029 nat_t *nat; local in function:ipf_nat_inlookup 4358 nat_t *nat; local in function:ipf_nat_outlookup 4586 nat_t *nat; local in function:ipf_nat_lookupredir 4789 nat_t *nat; local in function:ipf_nat_checkout 5282 nat_t *nat; local in function:ipf_nat_checkin 5862 nat_t *nat; local in function:ipf_nat_sync 6225 nat_t *nat; local in function:ipf_nat_deref 6522 nat_t *nat, *nextnat = NULL, zeronat; local in function:ipf_nat_getnext 6666 nat_t *nat, **natp; local in function:ipf_nat_extraflush 7591 nat_t *nat, *natnext; local in function:ipf_nat_matchflush 7907 nat_t **newtab[2], *nat, **natp; local in function:ipf_nat_rehash 8231 nat_t *nat; local in function:ipf_nat_uncreate [all...] |
ip_nat6.c | 150 /* Parameters: in(I) - NAT rule that requires address fields to be init'd */ 152 /* For each of the source/destination address fields in a NAT rule, call */ 206 /* Parameters: n(I) - pointer to NAT rule to add */ 209 /* loaded NAT rules. Updates the bitmask indicating which netmasks are in */ 253 /* Parameters: n(I) - pointer to NAT rule to add */ 255 /* Adds a NAT map rule to the hash table of rules and the list of loaded */ 256 /* NAT rules. Updates the bitmask indicating which netmasks are in use by */ 294 /* Parameters: n(I) - pointer to NAT rule to delete */ 296 /* Removes a NAT rdr rule from the hash table of NAT rdr rules. * 944 nat_t *nat, *natl; local in function:ipf_nat6_add 1374 nat_t *nat; local in function:ipf_nat6_icmperrorlookup 1566 nat_t *nat; local in function:ipf_nat6_icmperror 1878 nat_t *nat; local in function:ipf_nat6_inlookup 2191 nat_t *nat; local in function:ipf_nat6_outlookup 2420 nat_t *nat; local in function:ipf_nat6_lookupredir 2574 nat_t *nat; local in function:ipf_nat6_checkout 2973 nat_t *nat; local in function:ipf_nat6_checkin [all...] |
ip_tftp_pxy.c | 132 ipf_p_tftp_out(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 137 if (nat->nat_dir == NAT_OUTBOUND) 138 return ipf_p_tftp_client(softt, fin, aps, nat); 139 return ipf_p_tftp_server(softt, fin, aps, nat); 144 ipf_p_tftp_in(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 149 if (nat->nat_dir == NAT_INBOUND) 150 return ipf_p_tftp_client(softt, fin, aps, nat); 151 return ipf_p_tftp_server(softt, fin, aps, nat); 156 ipf_p_tftp_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 166 np = nat->nat_ptr [all...] |
ip_rcmd_pxy.c | 10 * Simple RCMD transparent proxy for in-kernel use. For use with the NAT 70 ipf_p_rcmd_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 86 ipn = ipf_proxy_rule_rev(nat); 133 ipf_p_rcmd_portmsg(fr_info_t *fin, ap_session_t *aps, nat_t *nat) 199 * Initialise the packet info structure so we can search the NAT 207 fi.fin_src6 = nat->nat_ndst6; 208 fi.fin_dst6 = nat->nat_nsrc6; 210 if (nat->nat_v[0] == 6) { 212 if (nat->nat_dir == NAT_OUTBOUND) { 214 nat->nat_pr[1] [all...] |
ip_netbios_pxy.c | 5 * For use with the NAT code. 75 ipf_p_netbios_out(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 84 nat = nat; /* LINT */
|
ip_pptp_pxy.c | 6 * Simple PPTP transparent proxy for in-kernel use. For use with the NAT 116 ipf_p_pptp_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 128 np = nat->nat_ptr; 131 if (ipf_nat_outlookup(fin, 0, IPPROTO_GRE, nat->nat_osrcip, 157 * Create NAT rule against which the tunnel/transport mapping is 158 * created. This is required because the current NAT rule does not 167 ipn->in_snip = ntohl(nat->nat_nsrcaddr); 169 ipn->in_dnip = ntohl(nat->nat_ndstaddr); 170 ipn->in_ndstaddr = nat->nat_ndstaddr; 172 ipn->in_osrcaddr = nat->nat_osrcaddr [all...] |
ip_ftp_pxy.c | 8 * Simple FTP transparent proxy for in-kernel use. For use with the NAT 227 ipf_p_ftp_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 236 nat = nat; /* LINT */ 282 ipf_p_ftp_port(ipf_ftp_softc_t *softf, fr_info_t *fin, ip_t *ip, nat_t *nat, 303 DT3(ftp_PORT_error_dlen, nat_t *, nat, ftpside_t *, f, 319 DT2(ftp_PORT_error_atoi_1, nat_t *, nat, ftpside_t *, f); 326 DT2(ftp_PORT_error_atoi_2, nat_t *, nat, ftpside_t *, f); 338 if (((nat->nat_dir == NAT_OUTBOUND) && 339 (a1 != ntohl(nat->nat_osrcaddr))) | [all...] |
ip_proxy.c | 674 /* nat(I) - pointer to current NAT session */ 676 /* This function extends the NAT matching to ensure that a packet that has */ 677 /* arrived matches the proxy information attached to the NAT rule. Notably, */ 762 /* nat(I) - pointer to current NAT session */ 765 /* matching. Whilst other parts of the NAT code are rather lenient when it */ 770 ipf_proxy_match(fr_info_t *fin, nat_t *nat) 778 ipn = nat->nat_ptr; 781 (u_long)fin, (u_long)nat, (u_long)nat->nat_aps [all...] |
ip_irc_pxy.c | 229 ipf_p_irc_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 240 nat = nat; /* LINT */ 251 ipf_p_irc_send(fr_info_t *fin, nat_t *nat) 291 irc = nat->nat_aps->aps_data; 299 if (irc->irc_ipnum != ntohl(nat->nat_osrcaddr)) 375 * Add skeleton NAT entry for connection which will come back the 394 nat2 = ipf_nat_outlookup(fin, IPN_TCP, nat->nat_pr[1], nat->nat_nsrcip, 413 ip->ip_src = nat->nat_nsrcip [all...] |
ip_ipsec_pxy.c | 8 * Simple ISAKMP transparent proxy for in-kernel use. For use with the NAT 132 ipf_p_ipsec_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 162 if (ipf_nat_outlookup(fin, 0, IPPROTO_ESP, nat->nat_nsrcip, 166 np = nat->nat_ptr; 185 * Create NAT rule against which the tunnel/transport mapping is 186 * created. This is required because the current NAT rule does not 197 ipn->in_snip = ntohl(nat->nat_nsrcaddr); 199 ipn->in_osrcip = nat->nat_osrcip; 201 ipn->in_nsrcip = nat->nat_nsrcip; 203 ipn->in_odstip = nat->nat_odstip [all...] |
ip_rpcb_pxy.c | 21 * When triggered by appropriate IP NAT rules, this proxy works by 23 * modified, NAT and state table entries created, etc., as necessary. 36 * o There is a potential collision between cloning, wildcard NAT and 146 /* nat(I) - pointer to NAT session structure */ 151 ipf_p_rpcb_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 155 nat = nat; /* LINT */ 199 /* nat(I) - pointer to NAT session structure * [all...] |
ip_raudio_pxy.c | 56 ipf_p_raudio_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 60 nat = nat; /* LINT */ 79 ipf_p_raudio_out(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 89 nat = nat; /* LINT */ 183 ipf_p_raudio_in(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat) 277 ip->ip_src = nat->nat_ndstip; 278 ip->ip_dst = nat->nat_odstip; 302 nat2 = ipf_nat_add(&fi, nat->nat_ptr, NULL [all...] |
ip_proxy.h | 33 struct nat; 61 void *aps_nat; /* pointer back to nat struct */ 116 struct nat *); 119 struct nat *); 121 struct nat *); 122 int (* apr_match)(fr_info_t *, ap_session_t *, struct nat *); 445 extern int ipf_proxy_check(fr_info_t *, struct nat *); 454 extern int ipf_proxy_match(fr_info_t *, struct nat *); 455 extern int ipf_proxy_new(fr_info_t *, struct nat *);
|
ip_sync.h | 20 u_char sm_table; /* NAT, STATE, etc */ 65 struct nat *slu_ipn; 96 struct nat sleu_ipn;
|
ip_fil_compat.c | 562 struct ipnat *in_next; /* NAT rule list next */ 699 struct nat *nat_next; 700 struct nat **nat_pnext; 701 struct nat *nat_hnext[2]; 702 struct nat **nat_phnext[2]; 705 struct nat **nat_me; 741 struct nat *nat_next; 742 struct nat **nat_pnext; 743 struct nat *nat_hnext[2]; 744 struct nat **nat_phnext[2] 4563 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_25 4622 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_14 4680 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_3 [all...] |
ip_frag.c | 198 RWLOCK_INIT(&softf->ipfr_natfrag, "ipf NAT fragment rwlock"); 539 /* nat(I) - pointer to NAT structure */ 541 /* Create a new NAT fragment cache entry based on the current packet and */ 542 /* the NAT structure for this "session". */ 546 nat_t *nat) 561 fra->ipfr_data = nat; 562 nat->nat_data = fra; 787 /* Returns: nat_t* - pointer to 'parent' NAT structure if frag table */ 791 /* Functional interface for NAT lookups of the NAT fragment cache * 798 nat_t *nat; local in function:ipf_frag_natknown 1002 nat_t *nat; local in function:ipf_frag_clear 1041 nat_t *nat; local in function:ipf_frag_expire [all...] |
/src/tests/ipf/ |
t_pools.sh | 46 if [ -f $(atf_get_srcdir)/regress/$1.nat ] ; then 47 cp $(atf_get_srcdir)/regress/$1.nat nat 53 if [ -f nat ] ; then 54 atf_check -o save:out ipftest -RD -b -P pool -N nat -i in
|
t_nat_ipf_exec.sh | 36 cp $(atf_get_srcdir)/regress/$1.nat nat 60 done; } <nat 64 $format -b -r ipf -N nat -i in
|
/src/games/sail/ |
pl_main.c | 58 int nat[NNATION]; local in function:pl_main_init 69 nat[n] = 0; 76 sp->file->stern = nat[sp->nationality]++;
|
dr_main.c | 59 int nat[NNATION]; local in function:dr_main 79 nat[n] = 0; 91 sp->file->stern = nat[sp->nationality]++;
|
/src/sys/net/npf/ |
npf_nat.c | 32 * NPF network address port translation (NAPT) and other forms of NAT. 37 * There are a few mechanisms: NAT policy, port map and translation. 38 * The NAT module has a separate ruleset where rules always have an 39 * associated NAT policy. 46 * addresses are rewritten. The bi-directional NAT is a combined 50 * NAT policies and port maps 52 * The NAT (translation) policy is applied when packet matches the 53 * rule. Apart from the filter criteria, the NAT policy always has 55 * then NAT mechanism relies on port map mechanism. 59 * NAT relies on the connection tracking module. Each translate [all...] |
/src/dist/pf/libexec/tftp-proxy/ |
filter.c | 83 u_int16_t d_port, struct sockaddr *nat, u_int16_t nat_range_low, 86 if (!src || !dst || !d_port || !nat || !nat_range_low || !proto || 87 (src->sa_family != nat->sa_family)) { 95 if (nat->sa_family == AF_INET) { 97 &satosin(nat)->sin_addr.s_addr, 4); 101 &satosin6(nat)->sin6_addr.s6_addr, 16); 310 * nat inet[6] proto tcp from $src to $dst port $d_port -> $nat
|
/src/sys/external/mit/xen-include-public/dist/xen/include/public/arch-x86/hvm/ |
save.h | 281 struct hvm_hw_cpu nat; member in union:_hvm_hw_fix_cpu::hvm_hw_cpu_union 291 ucpu->nat.error_code = ucpu->cmp.error_code; 292 ucpu->nat.pending_event = ucpu->cmp.pending_event; 293 ucpu->nat.tsc = ucpu->cmp.tsc; 294 ucpu->nat.msr_tsc_aux = 0; 297 ucpu->nat.flags = XEN_X86_FPU_INITIALISED;
|
/src/dist/pf/usr.sbin/ftp-proxy/ |
filter.c | 106 u_int16_t d_port, struct sockaddr *nat, u_int16_t nat_range_low, 110 if (!src || !dst || !d_port || !nat || !nat_range_low || 111 (src->sa_family != nat->sa_family)) { 119 if (nat->sa_family == AF_INET) { 121 &satosin(nat)->sin_addr.s_addr, 4); 125 &satosin6(nat)->sin6_addr.s6_addr, 16); 333 * nat inet[6] proto tcp from $src to $dst port $d_port -> $nat
|