HomeSort by: relevance | last modified time | path
    Searched refs:nat (Results 1 - 25 of 40) sorted by relevancy

1 2

  /src/tests/ipf/regress/
Makefile 136 ni1.nat \
138 ni10.nat \
140 ni11.nat \
142 ni12.nat \
144 ni13.nat \
146 ni14.nat \
148 ni15.nat \
150 ni16.nat \
152 ni17.nat \
154 ni18.nat \
    [all...]
  /src/sys/external/bsd/ipf/netinet/
ip_nat.c 142 /* nat */
194 /* How the NAT is organised and works. */
196 /* Inside (interface y) NAT Outside (interface x) */
210 /* In the NAT table, internal source is recorded as "in" and externally */
272 /* The only global NAT structure that needs to be initialised is the filter */
303 /* Returns: void * - NULL = failure, else pointer to NAT context */
306 /* Allocate the initial soft context structure for NAT and populate it with */
382 /* Initialise all of the NAT locks, tables and other structures. */
477 "nat ipftq udp tab");
481 "nat ipftq udpack tab")
985 ipnat_t *nat, *nt, *n; local in function:ipf_nat_ioctl
1686 nat_t *nat, *n; local in function:ipf_nat_getsz
1779 nat_t *n, *nat; local in function:ipf_nat_getent
1914 nat_t *n, *nat; local in function:ipf_nat_putent
2440 nat_t *nat; local in function:ipf_nat_flushtable
2532 nat_t *nat; local in function:ipf_nat_delrule
3065 nat_t *nat, *natl; local in function:ipf_nat_add
3574 nat_t *nat; local in function:ipf_nat_icmperrorlookup
3728 nat_t *nat; local in function:ipf_nat_icmperror
4029 nat_t *nat; local in function:ipf_nat_inlookup
4358 nat_t *nat; local in function:ipf_nat_outlookup
4586 nat_t *nat; local in function:ipf_nat_lookupredir
4789 nat_t *nat; local in function:ipf_nat_checkout
5282 nat_t *nat; local in function:ipf_nat_checkin
5862 nat_t *nat; local in function:ipf_nat_sync
6225 nat_t *nat; local in function:ipf_nat_deref
6522 nat_t *nat, *nextnat = NULL, zeronat; local in function:ipf_nat_getnext
6666 nat_t *nat, **natp; local in function:ipf_nat_extraflush
7591 nat_t *nat, *natnext; local in function:ipf_nat_matchflush
7907 nat_t **newtab[2], *nat, **natp; local in function:ipf_nat_rehash
8231 nat_t *nat; local in function:ipf_nat_uncreate
    [all...]
ip_nat6.c 150 /* Parameters: in(I) - NAT rule that requires address fields to be init'd */
152 /* For each of the source/destination address fields in a NAT rule, call */
206 /* Parameters: n(I) - pointer to NAT rule to add */
209 /* loaded NAT rules. Updates the bitmask indicating which netmasks are in */
253 /* Parameters: n(I) - pointer to NAT rule to add */
255 /* Adds a NAT map rule to the hash table of rules and the list of loaded */
256 /* NAT rules. Updates the bitmask indicating which netmasks are in use by */
294 /* Parameters: n(I) - pointer to NAT rule to delete */
296 /* Removes a NAT rdr rule from the hash table of NAT rdr rules. *
944 nat_t *nat, *natl; local in function:ipf_nat6_add
1374 nat_t *nat; local in function:ipf_nat6_icmperrorlookup
1566 nat_t *nat; local in function:ipf_nat6_icmperror
1878 nat_t *nat; local in function:ipf_nat6_inlookup
2191 nat_t *nat; local in function:ipf_nat6_outlookup
2420 nat_t *nat; local in function:ipf_nat6_lookupredir
2574 nat_t *nat; local in function:ipf_nat6_checkout
2973 nat_t *nat; local in function:ipf_nat6_checkin
    [all...]
ip_tftp_pxy.c 132 ipf_p_tftp_out(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
137 if (nat->nat_dir == NAT_OUTBOUND)
138 return ipf_p_tftp_client(softt, fin, aps, nat);
139 return ipf_p_tftp_server(softt, fin, aps, nat);
144 ipf_p_tftp_in(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
149 if (nat->nat_dir == NAT_INBOUND)
150 return ipf_p_tftp_client(softt, fin, aps, nat);
151 return ipf_p_tftp_server(softt, fin, aps, nat);
156 ipf_p_tftp_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
166 np = nat->nat_ptr
    [all...]
ip_rcmd_pxy.c 10 * Simple RCMD transparent proxy for in-kernel use. For use with the NAT
70 ipf_p_rcmd_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
86 ipn = ipf_proxy_rule_rev(nat);
133 ipf_p_rcmd_portmsg(fr_info_t *fin, ap_session_t *aps, nat_t *nat)
199 * Initialise the packet info structure so we can search the NAT
207 fi.fin_src6 = nat->nat_ndst6;
208 fi.fin_dst6 = nat->nat_nsrc6;
210 if (nat->nat_v[0] == 6) {
212 if (nat->nat_dir == NAT_OUTBOUND) {
214 nat->nat_pr[1]
    [all...]
ip_netbios_pxy.c 5 * For use with the NAT code.
75 ipf_p_netbios_out(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
84 nat = nat; /* LINT */
ip_pptp_pxy.c 6 * Simple PPTP transparent proxy for in-kernel use. For use with the NAT
116 ipf_p_pptp_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
128 np = nat->nat_ptr;
131 if (ipf_nat_outlookup(fin, 0, IPPROTO_GRE, nat->nat_osrcip,
157 * Create NAT rule against which the tunnel/transport mapping is
158 * created. This is required because the current NAT rule does not
167 ipn->in_snip = ntohl(nat->nat_nsrcaddr);
169 ipn->in_dnip = ntohl(nat->nat_ndstaddr);
170 ipn->in_ndstaddr = nat->nat_ndstaddr;
172 ipn->in_osrcaddr = nat->nat_osrcaddr
    [all...]
ip_ftp_pxy.c 8 * Simple FTP transparent proxy for in-kernel use. For use with the NAT
227 ipf_p_ftp_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
236 nat = nat; /* LINT */
282 ipf_p_ftp_port(ipf_ftp_softc_t *softf, fr_info_t *fin, ip_t *ip, nat_t *nat,
303 DT3(ftp_PORT_error_dlen, nat_t *, nat, ftpside_t *, f,
319 DT2(ftp_PORT_error_atoi_1, nat_t *, nat, ftpside_t *, f);
326 DT2(ftp_PORT_error_atoi_2, nat_t *, nat, ftpside_t *, f);
338 if (((nat->nat_dir == NAT_OUTBOUND) &&
339 (a1 != ntohl(nat->nat_osrcaddr))) |
    [all...]
ip_proxy.c 674 /* nat(I) - pointer to current NAT session */
676 /* This function extends the NAT matching to ensure that a packet that has */
677 /* arrived matches the proxy information attached to the NAT rule. Notably, */
762 /* nat(I) - pointer to current NAT session */
765 /* matching. Whilst other parts of the NAT code are rather lenient when it */
770 ipf_proxy_match(fr_info_t *fin, nat_t *nat)
778 ipn = nat->nat_ptr;
781 (u_long)fin, (u_long)nat, (u_long)nat->nat_aps
    [all...]
ip_irc_pxy.c 229 ipf_p_irc_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
240 nat = nat; /* LINT */
251 ipf_p_irc_send(fr_info_t *fin, nat_t *nat)
291 irc = nat->nat_aps->aps_data;
299 if (irc->irc_ipnum != ntohl(nat->nat_osrcaddr))
375 * Add skeleton NAT entry for connection which will come back the
394 nat2 = ipf_nat_outlookup(fin, IPN_TCP, nat->nat_pr[1], nat->nat_nsrcip,
413 ip->ip_src = nat->nat_nsrcip
    [all...]
ip_ipsec_pxy.c 8 * Simple ISAKMP transparent proxy for in-kernel use. For use with the NAT
132 ipf_p_ipsec_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
162 if (ipf_nat_outlookup(fin, 0, IPPROTO_ESP, nat->nat_nsrcip,
166 np = nat->nat_ptr;
185 * Create NAT rule against which the tunnel/transport mapping is
186 * created. This is required because the current NAT rule does not
197 ipn->in_snip = ntohl(nat->nat_nsrcaddr);
199 ipn->in_osrcip = nat->nat_osrcip;
201 ipn->in_nsrcip = nat->nat_nsrcip;
203 ipn->in_odstip = nat->nat_odstip
    [all...]
ip_rpcb_pxy.c 21 * When triggered by appropriate IP NAT rules, this proxy works by
23 * modified, NAT and state table entries created, etc., as necessary.
36 * o There is a potential collision between cloning, wildcard NAT and
146 /* nat(I) - pointer to NAT session structure */
151 ipf_p_rpcb_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
155 nat = nat; /* LINT */
199 /* nat(I) - pointer to NAT session structure *
    [all...]
ip_raudio_pxy.c 56 ipf_p_raudio_new(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
60 nat = nat; /* LINT */
79 ipf_p_raudio_out(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
89 nat = nat; /* LINT */
183 ipf_p_raudio_in(void *arg, fr_info_t *fin, ap_session_t *aps, nat_t *nat)
277 ip->ip_src = nat->nat_ndstip;
278 ip->ip_dst = nat->nat_odstip;
302 nat2 = ipf_nat_add(&fi, nat->nat_ptr, NULL
    [all...]
ip_proxy.h 33 struct nat;
61 void *aps_nat; /* pointer back to nat struct */
116 struct nat *);
119 struct nat *);
121 struct nat *);
122 int (* apr_match)(fr_info_t *, ap_session_t *, struct nat *);
445 extern int ipf_proxy_check(fr_info_t *, struct nat *);
454 extern int ipf_proxy_match(fr_info_t *, struct nat *);
455 extern int ipf_proxy_new(fr_info_t *, struct nat *);
ip_sync.h 20 u_char sm_table; /* NAT, STATE, etc */
65 struct nat *slu_ipn;
96 struct nat sleu_ipn;
ip_fil_compat.c 562 struct ipnat *in_next; /* NAT rule list next */
699 struct nat *nat_next;
700 struct nat **nat_pnext;
701 struct nat *nat_hnext[2];
702 struct nat **nat_phnext[2];
705 struct nat **nat_me;
741 struct nat *nat_next;
742 struct nat **nat_pnext;
743 struct nat *nat_hnext[2];
744 struct nat **nat_phnext[2]
4563 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_25
4622 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_14
4680 nat_t *nat = (nat_t *)current; local in function:nat_current_to_4_1_3
    [all...]
ip_frag.c 198 RWLOCK_INIT(&softf->ipfr_natfrag, "ipf NAT fragment rwlock");
539 /* nat(I) - pointer to NAT structure */
541 /* Create a new NAT fragment cache entry based on the current packet and */
542 /* the NAT structure for this "session". */
546 nat_t *nat)
561 fra->ipfr_data = nat;
562 nat->nat_data = fra;
787 /* Returns: nat_t* - pointer to 'parent' NAT structure if frag table */
791 /* Functional interface for NAT lookups of the NAT fragment cache *
798 nat_t *nat; local in function:ipf_frag_natknown
1002 nat_t *nat; local in function:ipf_frag_clear
1041 nat_t *nat; local in function:ipf_frag_expire
    [all...]
  /src/tests/ipf/
t_pools.sh 46 if [ -f $(atf_get_srcdir)/regress/$1.nat ] ; then
47 cp $(atf_get_srcdir)/regress/$1.nat nat
53 if [ -f nat ] ; then
54 atf_check -o save:out ipftest -RD -b -P pool -N nat -i in
t_nat_ipf_exec.sh 36 cp $(atf_get_srcdir)/regress/$1.nat nat
60 done; } <nat
64 $format -b -r ipf -N nat -i in
  /src/games/sail/
pl_main.c 58 int nat[NNATION]; local in function:pl_main_init
69 nat[n] = 0;
76 sp->file->stern = nat[sp->nationality]++;
dr_main.c 59 int nat[NNATION]; local in function:dr_main
79 nat[n] = 0;
91 sp->file->stern = nat[sp->nationality]++;
  /src/sys/net/npf/
npf_nat.c 32 * NPF network address port translation (NAPT) and other forms of NAT.
37 * There are a few mechanisms: NAT policy, port map and translation.
38 * The NAT module has a separate ruleset where rules always have an
39 * associated NAT policy.
46 * addresses are rewritten. The bi-directional NAT is a combined
50 * NAT policies and port maps
52 * The NAT (translation) policy is applied when packet matches the
53 * rule. Apart from the filter criteria, the NAT policy always has
55 * then NAT mechanism relies on port map mechanism.
59 * NAT relies on the connection tracking module. Each translate
    [all...]
  /src/dist/pf/libexec/tftp-proxy/
filter.c 83 u_int16_t d_port, struct sockaddr *nat, u_int16_t nat_range_low,
86 if (!src || !dst || !d_port || !nat || !nat_range_low || !proto ||
87 (src->sa_family != nat->sa_family)) {
95 if (nat->sa_family == AF_INET) {
97 &satosin(nat)->sin_addr.s_addr, 4);
101 &satosin6(nat)->sin6_addr.s6_addr, 16);
310 * nat inet[6] proto tcp from $src to $dst port $d_port -> $nat
  /src/sys/external/mit/xen-include-public/dist/xen/include/public/arch-x86/hvm/
save.h 281 struct hvm_hw_cpu nat; member in union:_hvm_hw_fix_cpu::hvm_hw_cpu_union
291 ucpu->nat.error_code = ucpu->cmp.error_code;
292 ucpu->nat.pending_event = ucpu->cmp.pending_event;
293 ucpu->nat.tsc = ucpu->cmp.tsc;
294 ucpu->nat.msr_tsc_aux = 0;
297 ucpu->nat.flags = XEN_X86_FPU_INITIALISED;
  /src/dist/pf/usr.sbin/ftp-proxy/
filter.c 106 u_int16_t d_port, struct sockaddr *nat, u_int16_t nat_range_low,
110 if (!src || !dst || !d_port || !nat || !nat_range_low ||
111 (src->sa_family != nat->sa_family)) {
119 if (nat->sa_family == AF_INET) {
121 &satosin(nat)->sin_addr.s_addr, 4);
125 &satosin6(nat)->sin6_addr.s6_addr, 16);
333 * nat inet[6] proto tcp from $src to $dst port $d_port -> $nat

Completed in 44 milliseconds

1 2