• Home
  • History
  • Annotate
  • Raw
  • Download
  • only in /freebsd-13-stable/sys/netpfil/ipfw/

Lines Matching refs:rule

101 	 * On return, it points to the matching rule.
102 * On entry, rule.slot > 0 means the info is valid and
103 * contains the starting rule for an ipfw search.
105 * Otherwise, we locate the first rule >= rulenum:rule_id
107 struct ipfw_rule_ref rule; /* match/restart info */
114 * stored in rule's opcode to avoid copying into hopstore.
207 int ipfw_dyn_install_state(struct ip_fw_chain *chain, struct ip_fw *rule,
215 int ipfw_is_dyn_rule(struct ip_fw *rule);
256 * Here we have the structure representing an ipfw rule.
262 * Given a rule pointer r:
266 * once a rule matched).
272 uint16_t rulenum; /* rule number */
273 uint8_t set; /* rule set (0..31) */
275 counter_u64_t cntr; /* Pointer to rule counters */
277 uint32_t id; /* rule id */
291 struct ip_fw **map; /* array of rule ptrs to ease lookup */
474 uint16_t off; /* tlv offset from rule end in 4-byte words */
480 uint16_t flags; /* rule-specific check flags */
483 uint8_t version; /* rule version */
486 struct ip_fw *krule; /* resulting rule pointer */
487 caddr_t urule; /* original rule pointer */
493 * FreeBSD 8 export rule format
497 struct ip_fw *next_rule; /* ptr to next [skipto] rule */
502 uint16_t rulenum; /* rule number */
503 uint8_t set; /* rule set (0..31) */
505 uint32_t id; /* rule id */
521 /* Kernel rule length */
526 * get user size version _V_ from kernel rule
528 * get user size rule length
654 int ipfw_add_protected_rule(struct ip_fw_chain *chain, struct ip_fw *rule,
657 struct ip_fw *rule);
662 void ipfw_free_rule(struct ip_fw *rule);
663 int ipfw_match_range(struct ip_fw *rule, ipfw_range_tlv *rt);
764 int ipfw_reset_eaction(struct ip_fw_chain *ch, struct ip_fw *rule,