/freebsd-11-stable/contrib/blacklist/etc/ |
H A D | npf.conf | 9 ruleset "blacklistd"
|
/freebsd-11-stable/sys/netpfil/pf/ |
H A D | pf_ruleset.c | 97 #define pf_main_ruleset pf_main_anchor.ruleset 146 pf_init_ruleset(struct pf_ruleset *ruleset) argument 150 memset(ruleset, 0, sizeof(struct pf_ruleset)); 152 TAILQ_INIT(&ruleset->rules[i].queues[0]); 153 TAILQ_INIT(&ruleset->rules[i].queues[1]); 154 ruleset->rules[i].active.ptr = &ruleset->rules[i].queues[0]; 155 ruleset->rules[i].inactive.ptr = &ruleset->rules[i].queues[1]; 186 return (&anchor->ruleset); 193 struct pf_ruleset *ruleset; local 282 pf_remove_if_empty_ruleset(struct pf_ruleset *ruleset) argument 314 struct pf_ruleset *ruleset; local [all...] |
H A D | if_pflog.c | 204 struct pf_ruleset *ruleset, struct pf_pdesc *pd, int lookupsafe) 228 if (ruleset != NULL && ruleset->anchor != NULL) 229 strlcpy(hdr.ruleset, ruleset->anchor->name, 230 sizeof(hdr.ruleset)); 202 pflog_packet(struct pfi_kif *kif, struct mbuf *m, sa_family_t af, u_int8_t dir, u_int8_t reason, struct pf_rule *rm, struct pf_rule *am, struct pf_ruleset *ruleset, struct pf_pdesc *pd, int lookupsafe) argument
|
H A D | pf_ioctl.c | 299 struct pf_ruleset *ruleset; local 303 ruleset = pf_find_ruleset(anchor); 304 if (ruleset == NULL) 311 ruleset->rules[rs_num].active.ticket) 314 rule = TAILQ_LAST(ruleset->rules[rs_num].active.ptr, 317 rule = TAILQ_FIRST(ruleset->rules[rs_num].active.ptr); 320 ruleset->rules[rs_num].inactive.ticket) 323 rule = TAILQ_LAST(ruleset->rules[rs_num].inactive.ptr, 326 rule = TAILQ_FIRST(ruleset->rules[rs_num].inactive.ptr); 680 /* Start new altq ruleset */ 958 pf_addr_setup(struct pf_ruleset *ruleset, struct pf_addr_wrap *addr, sa_family_t af) argument 1145 struct pf_ruleset *ruleset; local 1312 struct pf_ruleset *ruleset; local 1343 struct pf_ruleset *ruleset; local 1404 struct pf_ruleset *ruleset; local 1991 struct pf_ruleset *ruleset = &pf_main_ruleset; local 2326 struct pf_ruleset *ruleset; local 2458 struct pf_ruleset *ruleset; local 2485 struct pf_ruleset *ruleset; local [all...] |
H A D | pf_if.c | 385 struct pf_ruleset *ruleset = NULL; local 423 if ((ruleset = pf_find_or_create_ruleset(PF_RESERVED_ANCHOR)) == NULL) { 428 if ((dyn->pfid_kt = pfr_attach_table(ruleset, tblname)) == NULL) { 446 if (ruleset != NULL) 447 pf_remove_if_empty_ruleset(ruleset);
|
H A D | pf.c | 2874 *rs = &f->child->ruleset; 2877 *rs = &(*r)->anchor->ruleset; 2917 *rs = &f->child->ruleset; 3233 struct pf_ruleset *ruleset = NULL; local 3508 *rsm = ruleset; 3514 &ruleset, PF_RULESET_FILTER, &r, &a, 3518 &ruleset, PF_RULESET_FILTER, &r, &a, &match)) 3523 ruleset = *rsm; 3531 ruleset, pd, 1); 3854 struct pf_ruleset *ruleset local 5941 struct pf_ruleset *ruleset = NULL; local 6330 struct pf_ruleset *ruleset = NULL; local [all...] |
H A D | pf_lb.c | 131 struct pf_ruleset *ruleset = NULL; local 194 &ruleset, rs_num, &r, NULL, NULL); 197 pf_step_out_of_anchor(anchor_stack, &asd, &ruleset,
|
/freebsd-11-stable/sys/net/ |
H A D | if_pflog.h | 40 char ruleset[PFLOG_RULESET_NAME_SIZE]; member in struct:pfloghdr
|
H A D | pfvar.h | 935 struct pf_ruleset ruleset; member in struct:pf_anchor 1731 #define pf_main_ruleset V_pf_main_anchor.ruleset 1734 /* these ruleset functions can be linked into userland programs (pfctl) */
|
/freebsd-11-stable/contrib/byacc/ |
H A D | closure.c | 7 unsigned *ruleset; variable 127 rsend = ruleset + rulesetsize; 128 for (rsp = ruleset; rsp < rsend; rsp++) 138 rsp = ruleset; 147 for (rsp = ruleset; rsp < rsend; ++rsp) 180 FREE(ruleset);
|
H A D | lr0.c | 139 ruleset = NEW2(WORDSIZE(nrules), unsigned);
|
/freebsd-11-stable/contrib/sendmail/src/ |
H A D | readcf.c | 144 int ruleset = -1; local 232 if (ruleset < 0) 234 syserr("missing valid ruleset for \"%s\"", bp); 249 RewriteRules[ruleset] = rwp = 510 ruleset = strtorwset(exbuf, NULL, ST_ENTER); 511 if (ruleset < 0) 514 rwp = RewriteRules[ruleset]; 1454 case 'S': /* sender rewriting ruleset */ 1455 case 'R': /* recipient rewriting ruleset */ 2012 register int ruleset; local 4848 int ruleset; local [all...] |
H A D | parseaddr.c | 190 /* call ruleset which should return a queue group name */ 999 ** ruleset -- the ruleset to use for rewriting. 1020 rewrite(pvp, ruleset, reclevel, e, maxatom) 1022 int ruleset; 1029 register char *rulename; /* ruleset name */ 1048 if (ruleset < 0 || ruleset >= MAXRWSETS) 1050 syserr("554 5.3.5 rewrite: illegal ruleset number %d", ruleset); [all...] |
/freebsd-11-stable/contrib/tcpdump/ |
H A D | print-pflog.c | 98 ND_PRINT((ndo, "rule %u.%s.%u/", rulenr, hdr->ruleset, subrulenr));
|
/freebsd-11-stable/usr.sbin/jail/ |
H A D | command.c | 281 const char *jidstr, *conslog, *path, *ruleset, *term, *username; local 516 ruleset = string_param(j->intparams[KP_DEVFS_RULESET]); 517 if (!ruleset) 518 ruleset = "4"; /* devfsrules_jail */ 519 argv[3] = acs = alloca(11 + strlen(ruleset)); 520 sprintf(acs, "-oruleset=%s", ruleset);
|
/freebsd-11-stable/sbin/pfctl/ |
H A D | parse.y | 524 ruleset : /* empty */ label 525 | ruleset include '\n' 526 | ruleset '\n' 527 | ruleset option '\n' 528 | ruleset scrubrule '\n' 529 | ruleset natrule '\n' 530 | ruleset binatrule '\n' 531 | ruleset pfrule '\n' 532 | ruleset anchorrule '\n' 533 | ruleset loadrul [all...] |
H A D | pfctl_parser.h | 91 const char *ruleset; member in struct:pfctl
|
H A D | pfctl.c | 1298 rs = &pf->anchor->ruleset; 1307 pf_init_ruleset(&r->anchor->ruleset); 1308 r->anchor->ruleset.anchor = r->anchor; 1404 &r->anchor->ruleset, rs_num, depth + 1))) 1514 pf_init_ruleset(&pf_main_anchor.ruleset); 1515 pf_main_anchor.ruleset.anchor = &pf_main_anchor; 1542 rs = &pf.anchor->ruleset; 1564 * the main ruleset before parsing, because tables are still 1573 pf.astack[0]->ruleset.tticket = 1620 if (trans == NULL) { /* main ruleset */ [all...] |
H A D | pfctl_optimize.c | 125 * 'tag "bar"' since that would change the meaning of the ruleset. 272 DEBUG("optimizing ruleset"); 380 * active ruleset statistics 741 * and place them in the ruleset adjacent to each 811 * currently running ruleset 878 * Load the current ruleset from the kernel and try to associate them with 879 * the ruleset we're optimizing. 934 * Now we try to associate the active ruleset's superblocks with 1325 pf->astack[0]->name, tbl->pt_buf, pf->astack[0]->ruleset.tticket)) { 1334 * Partition the flat ruleset int [all...] |
/freebsd-11-stable/sys/netpfil/ipfw/nat64/ |
H A D | nat64clat.c | 81 plog->ruleset[0] = '\0';
|
H A D | nat64stl.c | 80 plog->ruleset[0] = '\0';
|
H A D | nat64lsn.c | 225 plog->ruleset[0] = '\0';
|
/freebsd-11-stable/contrib/libpcap/ |
H A D | scanner.l | 364 rset|ruleset return PF_RSET;
|
H A D | gencode.c | 8376 /* PF firewall log ruleset name */ 8378 gen_pf_ruleset(compiler_state_t *cstate, char *ruleset) argument 8390 bpf_error(cstate, "ruleset supported only on PF linktype"); 8394 if (strlen(ruleset) >= sizeof(((struct pfloghdr *)0)->ruleset)) { 8395 bpf_error(cstate, "ruleset names can only be %ld characters", 8396 (long)(sizeof(((struct pfloghdr *)0)->ruleset) - 1)); 8400 b0 = gen_bcmp(cstate, OR_LINKHDR, offsetof(struct pfloghdr, ruleset), 8401 (u_int)strlen(ruleset), (const u_char *)ruleset); [all...] |