/freebsd/sbin/pfctl/ |
H A D | pf_ruleset.c | 138 ruleset->rules[i].active.ptr = &ruleset->rules[i].queues[0]; in pf_init_ruleset() 139 ruleset->rules[i].inactive.ptr = &ruleset->rules[i].queues[1]; in pf_init_ruleset() 272 if (ruleset == &pf_main_ruleset || ruleset->anchor == NULL || in pf_remove_if_empty_ruleset() 274 ruleset->anchor->refcnt > 0 || ruleset->tables > 0 || in pf_remove_if_empty_ruleset() 289 ruleset = &parent->ruleset; in pf_remove_if_empty_ruleset() 300 if (ruleset == &pf_eth_main_anchor.ruleset || in pf_remove_if_empty_eth_ruleset() 301 ruleset->anchor == NULL || ruleset->anchor->refcnt > 0) in pf_remove_if_empty_eth_ruleset() 308 ruleset = &parent->ruleset; in pf_remove_if_empty_eth_ruleset() 316 memset(ruleset, 0, sizeof(*ruleset)); in pf_init_eth_ruleset() 481 if (ruleset == NULL || ruleset->anchor == NULL) { in pfctl_anchor_setup() [all …]
|
H A D | pfctl.c | 1713 rs = &pf->anchor->ruleset; in pfctl_append_rule() 1722 pf_init_ruleset(&r->anchor->ruleset); in pfctl_append_rule() 1723 r->anchor->ruleset.anchor = r->anchor; in pfctl_append_rule() 1756 rs = &pf->eanchor->ruleset; in pfctl_append_eth_rule() 1765 pf_init_eth_ruleset(&r->anchor->ruleset); in pfctl_append_eth_rule() 1766 r->anchor->ruleset.anchor = r->anchor; in pfctl_append_eth_rule() 1878 &r->anchor->ruleset, depth + 1))) in pfctl_load_eth_ruleset() 2106 pf_init_ruleset(&pf_main_anchor.ruleset); in pfctl_rules() 2140 rs = &pf.anchor->ruleset; in pfctl_rules() 2170 ethrs = &pf.eanchor->ruleset; in pfctl_rules() [all …]
|
H A D | parse.y | 582 ruleset : /* empty */ 583 | ruleset include '\n' 584 | ruleset '\n' 585 | ruleset option '\n' 586 | ruleset etherrule '\n' 589 | ruleset natrule '\n' 591 | ruleset pfrule '\n' 593 | ruleset loadrule '\n' 594 | ruleset altqif '\n' 596 | ruleset varset '\n' [all …]
|
/freebsd/sys/netpfil/pf/ |
H A D | pf_ruleset.c | 157 ruleset->rules[i].active.ptr = &ruleset->rules[i].queues[0]; in pf_init_kruleset() 158 ruleset->rules[i].inactive.ptr = &ruleset->rules[i].queues[1]; in pf_init_kruleset() 206 return (ruleset); in pf_find_or_create_kruleset() 292 if (ruleset == &pf_main_ruleset || ruleset->anchor == NULL || in pf_remove_if_empty_kruleset() 294 ruleset->anchor->refcnt > 0 || ruleset->tables > 0 || in pf_remove_if_empty_kruleset() 309 ruleset = &parent->ruleset; in pf_remove_if_empty_kruleset() 360 if (ruleset == NULL || ruleset->anchor == NULL) { in pf_kanchor_setup() 541 return (ruleset); in pf_find_or_create_keth_ruleset() 667 if (ruleset == NULL || ruleset->anchor == NULL) { in pf_keth_anchor_setup() 698 if (ruleset == V_pf_keth || ruleset->anchor == NULL || in pf_remove_if_empty_keth_ruleset() [all …]
|
H A D | pf_ioctl.c | 437 struct pf_kruleset *ruleset; in pf_get_kpool() local 442 if (ruleset == NULL) in pf_get_kpool() 2036 struct pf_kruleset *ruleset; in pf_ioctl_getrules() local 2042 if (ruleset == NULL) { in pf_ioctl_getrules() 2068 struct pf_kruleset *ruleset; in pf_ioctl_addrule() local 2105 if (ruleset == NULL) in pf_ioctl_addrule() 2798 if (ruleset == NULL) in pfioctl() 3047 if (ruleset->anchor) in pfioctl() 3214 if (ruleset == NULL) { in pfioctl() 3354 if (ruleset == NULL) in pfioctl() [all …]
|
H A D | if_pflog.c | 220 struct pf_kruleset *ruleset, struct pf_pdesc *pd, int lookupsafe) in pflog_packet() argument 244 if (ruleset != NULL && ruleset->anchor != NULL) in pflog_packet() 245 strlcpy(hdr.ruleset, ruleset->anchor->name, in pflog_packet() 246 sizeof(hdr.ruleset)); in pflog_packet()
|
H A D | pf_if.c | 508 struct pf_kruleset *ruleset = NULL; in pfi_dynaddr_setup() local 547 if ((ruleset = pf_find_or_create_kruleset(PF_RESERVED_ANCHOR)) == NULL) { in pfi_dynaddr_setup() 552 if ((dyn->pfid_kt = pfr_attach_table(ruleset, tblname)) == NULL) { in pfi_dynaddr_setup() 572 if (ruleset != NULL) in pfi_dynaddr_setup() 573 pf_remove_if_empty_kruleset(ruleset); in pfi_dynaddr_setup()
|
H A D | pf.c | 4190 ruleset = V_pf_keth; in pf_test_eth_rule() 4519 ruleset, pd, 1); in pf_test_rule() 4752 *rsm = ruleset; in pf_test_rule() 4768 ruleset = *rsm; in pf_test_rule() 5200 *rsm = ruleset; in pf_test_fragment() 5216 ruleset = *rsm; in pf_test_fragment() 8231 &a, &ruleset, inp); in pf_test() 8283 &a, &ruleset, inp); in pf_test() 8305 &a, &ruleset, inp); in pf_test() 8698 &ruleset); in pf_test6() [all …]
|
/freebsd/contrib/byacc/ |
H A D | closure.c | 7 unsigned *ruleset; variable 121 rsend = ruleset + rulesetsize; in closure() 122 for (rsp = ruleset; rsp < rsend; rsp++) in closure() 133 rsp = ruleset; in closure() 142 for (rsp = ruleset; rsp < rsend; ++rsp) in closure() 176 FREE(ruleset); in finalize_closure()
|
/freebsd/sbin/pfilctl/ |
H A D | pfilctl.c | 183 char *ruleset; in hook() local 215 if ((ruleset = strchr(argv[0], ':')) == NULL) in hook() 217 *ruleset = '\0'; in hook() 218 ruleset++; in hook() 222 strlcpy(req.pio_ruleset, ruleset, sizeof(req.pio_ruleset)); in hook()
|
/freebsd/contrib/sendmail/src/ |
H A D | readcf.c | 150 int ruleset = -1; local 243 if (ruleset < 0) 523 if (ruleset < 0) 2179 for (ruleset = 0; ruleset < 10; ruleset++) in printrules() 5151 int ruleset; local 5164 if (ruleset >= MAXRWSETS / 2 || ruleset < 0) 5168 ruleset = -1; 5205 ruleset = -1; 5210 if (ruleset >= MAXRWSETS / 2 || ruleset < 0) 5228 ruleset = -1; [all …]
|
/freebsd/lib/libpfctl/ |
H A D | libpfctl.h | 141 struct pfctl_eth_ruleset ruleset; member 288 struct pfctl_ruleset ruleset; member 416 uint32_t ruleset, const char *path); 418 const char *anchor, uint32_t ruleset, struct pfctl_rule *rule, 421 const char *anchor, uint32_t ruleset, struct pfctl_rule *rule, 424 const char *anchor, uint32_t ruleset, struct pfctl_rule *rule,
|
/freebsd/sbin/devfs/ |
H A D | devfs.rules | 7 # denotes the beginning of a ruleset. In the brackets should 8 # be a name for the rule and its ruleset number. Any other lines 18 # Very basic and secure ruleset: Hide everything.
|
/freebsd/contrib/blocklist/etc/ |
H A D | npf.conf | 9 ruleset "blacklistd"
|
/freebsd/contrib/blocklist/ |
H A D | README | 90 ruleset "blacklistd-ext" 91 ruleset "blacklistd" 97 ruleset "blacklistd-int"
|
/freebsd/sys/net/ |
H A D | if_pflog.h | 46 char ruleset[PFLOG_RULESET_NAME_SIZE]; member
|
/freebsd/usr.sbin/jail/ |
H A D | command.c | 294 const char *jidstr, *conslog, *fmt, *path, *ruleset, *term, *username; in run_command() local 530 ruleset = string_param(j->intparams[KP_DEVFS_RULESET]); in run_command() 531 if (!ruleset) in run_command() 532 ruleset = "4"; /* devfsrules_jail */ in run_command() 533 argv[3] = acs = alloca(11 + strlen(ruleset)); in run_command() 534 sprintf(acs, "-oruleset=%s", ruleset); in run_command()
|
/freebsd/libexec/rc/ |
H A D | rc.subr | 2025 debug "found ruleset: $rulename=$rulenum" 2079 # devfs_set_ruleset ruleset [dir] 2080 # Sets the default ruleset of dir to ruleset. The ruleset argument 2092 warn "$_me: you must specify a ruleset number" 2096 if ! /sbin/devfs $devdir ruleset $rs; then 2103 # devfs_apply_ruleset ruleset [dir] 2104 # Apply ruleset number $ruleset to the devfs mountpoint $dir. 2105 # The ruleset argument must be a ruleset name as specified 2107 # if it could not apply the ruleset. 2117 warn "$_me: you must specify a ruleset" [all …]
|
/freebsd/share/examples/ipfilter/rules/ |
H A D | example.5 | 2 # test ruleset
|
/freebsd/contrib/tcpdump/ |
H A D | pflog.h | 124 char ruleset[PFLOG_RULESET_NAME_SIZE]; member
|
H A D | print-pflog.c | 118 nd_printjnp(ndo, (const u_char*)hdr->ruleset, PFLOG_RULESET_NAME_SIZE); in pflog_print()
|
/freebsd/sys/netpfil/ipfw/ |
H A D | ip_fw_pfil.c | 122 void *ruleset __unused, struct inpcb *inp) in ipfw_check_packet() 333 void *ruleset __unused, struct inpcb *inp) in ipfw_check_frame_mbuf() 413 void *ruleset __unused, struct mbuf **m) in ipfw_check_frame_mem()
|
/freebsd/contrib/libpcap/ |
H A D | pflog.h | 129 char ruleset[PFLOG_RULESET_NAME_SIZE]; member
|
/freebsd/contrib/sendmail/cf/hack/ |
H A D | xconnect.m4 | 21 # x_connect ruleset for looking up XConnect: tag in access DB to enable
|
/freebsd/share/examples/ipfilter/ |
H A D | ipf-howto.txt | 183 interrupt the flow, IPF will go through the entire ruleset, 220 It's a good time to point out that even if the ruleset had 245 Here's a modified copy of the original ruleset using the 488 what you already know of IPF. The new ruleset would be: 623 This brings our total ruleset to look something like this: 642 ruleset. When you're actually creating your ruleset, you 978 state. The keyword for the ruleset is keep state. 981 the ruleset gets checked; packets go out, then the ruleset 1071 ways. Consider the following ruleset: 2820 our last ruleset: [all …]
|