/freebsd-11-stable/sbin/natd/samples/ |
H A D | natd.test | 10 ipfw add divert 32000 ip from any to any via $1
|
/freebsd-11-stable/contrib/sendmail/rmail/ |
H A D | Makefile.m4 | 23 divert(bldTARGETS_SECTION) 35 divert
|
/freebsd-11-stable/contrib/sendmail/libsm/ |
H A D | Makefile.m4 | 44 divert(bldTARGETS_SECTION) 45 divert(0)
|
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | Makefile.m4 | 42 divert(bldTARGETS_SECTION) 62 divert(0) 68 divert(bldTARGETS_SECTION) 96 divert(0)
|
/freebsd-11-stable/sys/netpfil/ipfw/ |
H A D | ip_fw_table_value.c | 114 _MCPY(divert, IPFW_VTYPE_DIVERT); 617 v->divert = value; 653 v.divert = iv->divert; 679 iv.divert = v->divert;
|
H A D | ip_fw_log.c | 195 TARG(cmd->arg1, divert)); 199 TARG(cmd->arg1, divert));
|
H A D | ip_fw_private.h | 132 * (divert, dummynet, netgraph, ...) 334 uint16_t divert; /* O_DIVERT/O_TEE */ member in struct:table_value
|
H A D | ip_fw2.c | 1289 * upon return, non-zero port number for divert or tee. 1301 * IP_FW_DIVERT divert packet, port in m_tag 1920 * contains the divert port (in host format) 2771 args->rule.info = TARG(cmd->arg1, divert); 3266 "initialized, divert %s, nat %s, "
|
/freebsd-11-stable/tools/tools/tinybsd/conf/firewall/etc/ |
H A D | rc.firewall | 114 # starting at the rule number following the divert rule. 116 # For ``simple'' firewall type the divert rule should be put to a 124 ${fwcmd} add 50 divert natd all from any to any via ${natd_interface} 239 ${fwcmd} add divert natd all from any to any via ${natd_interface}
|
/freebsd-11-stable/tools/tools/tinybsd/conf/wireless/etc/ |
H A D | rc.firewall | 114 # starting at the rule number following the divert rule. 116 # For ``simple'' firewall type the divert rule should be put to a 124 ${fwcmd} add 50 divert natd all from any to any via ${natd_interface} 239 ${fwcmd} add divert natd all from any to any via ${natd_interface}
|
/freebsd-11-stable/sbin/pfctl/ |
H A D | parse.y | 253 } divert; 2402 r.divert.port = $9.divert.port; 2404 if ((r.divert.port = $9.divert.port)) { 2406 if ($9.divert.addr) { 2408 "for outgoing divert"); 2411 bzero(&r.divert.addr, 2412 sizeof(r.divert.addr)); 2414 if (!$9.divert [all...] |
H A D | pfctl_parser.c | 1025 if (r->divert.port) { 1027 printf(" divert-to %u", ntohs(r->divert.port)); 1029 if (PF_AZERO(&r->divert.addr, r->af)) { 1030 printf(" divert-reply"); 1035 printf(" divert-to "); 1036 if (inet_ntop(r->af, &r->divert.addr, buf, 1041 printf(" port %u", ntohs(r->divert.port));
|
/freebsd-11-stable/sys/netinet/ |
H A D | ip_divert.c | 88 * see the divert(4) manpage for features. 90 * MTAG_IPFW_RULE tag carrying the 'divert port' number (as set by 93 * on the corresponding divert socket, while the rule number is passed 96 * Packets written to the divert socket carry in sin_addr a 125 * Initialize divert connection block queue. 156 * XXX We don't use the hash list for divert IP, but it's easier to 170 VNET_SYSUNINIT(divert, SI_SUB_PROTO_DOMAININIT, SI_ORDER_ANY, 188 * Divert a packet by passing it up to the divert socket at port 'port'. 214 /* Delayed checksums are currently not compatible with divert. */ 260 * different sockaddr type for divert, [all...] |
H A D | ip_fw.h | 768 #define IPFW_VTYPE_DIVERT 0x00000040 /* divert/tee */ 871 uint16_t divert; /* O_DIVERT/O_TEE */ member in struct:_ipfw_table_value
|
/freebsd-11-stable/etc/ |
H A D | rc.firewall | 156 # starting at the rule number following the divert rule. 158 # For ``simple'' firewall type the divert rule should be put to a 166 ${fwcmd} add 50 divert natd ip4 from any to any via ${natd_interface} 330 ${fwcmd} add divert natd ip4 from any to any via ${natd_interface}
|
/freebsd-11-stable/contrib/groff/src/preproc/tbl/ |
H A D | table.cpp | 156 virtual int divert(int ncols, const string *mw, int *sep); 298 int divert(int ncols, const string *mw, int *sep); 327 int divert(int ncols, const string *mw, int *sep); 340 int table_entry::divert(int, const string *, int *) function in class:table_entry 654 int block_entry::divert(int ncols, const string *mw, int *sep) function in class:block_entry 717 // do nothing; the action happens in divert 775 int alphabetic_block_entry::divert(int ncols, const string *mw, int *sep) function in class:alphabetic_block_entry 2122 if (q->divert(ncolumns, minimum_width,
|
/freebsd-11-stable/sbin/ipfw/ |
H A D | tables.c | 102 { "divert", IPFW_VTYPE_DIVERT }, 1502 v->divert = val; 1573 v->divert = strtol(n, &e, 10); 1575 etype = "divert"; 1820 l = snprintf(buf, sz, "%d,", v->divert); 2006 uint16_t divert; /* O_DIVERT/O_TEE */ member in struct:_table_value
|
/freebsd-11-stable/contrib/groff/src/roff/troff/ |
H A D | div.cpp | 148 void divert() function 1160 init_request("di", divert);
|
/freebsd-11-stable/contrib/ipfilter/tools/ |
H A D | ipnat_y.y | 172 | divert ';' 387 divert: IPNY_DIVERT oninout rwrproto mapfrom tlate divdst newopts label 464 yyerror("divert must have /32 dest"); 472 yyerror("divert must have /32 dest"); 1247 { "divert", IPNY_DIVERT },
|
/freebsd-11-stable/share/man/man4/ |
H A D | Makefile | 137 divert.4 \
|
/freebsd-11-stable/sys/net/ |
H A D | pfvar.h | 592 } divert; member in struct:pf_rule
|
/freebsd-11-stable/sys/netpfil/pf/ |
H A D | pf.c | 6191 if (action == PF_PASS && r->divert.port && ip_divert_ptr != NULL && 6198 ntohs(r->divert.port); 6229 ("pf: failed to allocate divert tag\n")); 6629 if (r->divert.port) 6630 printf("pf: divert(9) is not supported for IPv6\n");
|