/freebsd/sys/netpfil/pf/ |
H A D | pf_ruleset.c | 371 char *anchor_call, size_t anchor_call_len) in pf_kanchor_copyout() argument 373 anchor_call[0] = 0; in pf_kanchor_copyout() 378 strlcpy(anchor_call, "/", anchor_call_len); in pf_kanchor_copyout() 379 strlcat(anchor_call, r->anchor->path, in pf_kanchor_copyout() 393 strlcat(anchor_call, "../", in pf_kanchor_copyout() 402 strlcat(anchor_call, r->anchor->path + (a[0] ? in pf_kanchor_copyout() 407 strlcat(anchor_call, anchor_call[0] ? "/*" : "*", in pf_kanchor_copyout() 419 char anchor_call[MAXPATHLEN] = { 0 }; in pf_kanchor_nvcopyout() local 422 ret = pf_kanchor_copyout(rs, r, anchor_call, sizeof(anchor_call)); in pf_kanchor_nvcopyout() 425 nvlist_add_string(nvl, "anchor_call", anchor_call); in pf_kanchor_nvcopyout() [all …]
|
H A D | pf_nl.c | 743 char *anchor_call; member 751 { .type = PF_ART_ANCHOR_CALL, .off = _OUT(anchor_call), .cb = nlattr_get_string }, 775 attrs.anchor, attrs.anchor_call, nlp_get_cred(npt->nlp)->cr_uid, in pf_handle_addrule() 857 char anchor_call[MAXPATHLEN]; in pf_handle_getrule() local 992 error = pf_kanchor_copyout(ruleset, rule, anchor_call, sizeof(anchor_call)); in pf_handle_getrule() 995 nlattr_add_string(nw, PF_RT_ANCHOR_CALL, anchor_call); in pf_handle_getrule()
|
H A D | pf_ioctl.c | 2067 uint32_t pool_ticket, const char *anchor, const char *anchor_call, in pf_ioctl_addrule() argument 2190 if (pf_kanchor_setup(rule, ruleset, anchor_call)) in pf_ioctl_addrule() 3078 const char *anchor = "", *anchor_call = ""; in pfioctl() local 3100 anchor_call = nvlist_get_string(nvl, "anchor_call"); in pfioctl() 3176 if (pf_keth_anchor_setup(rule, ruleset, anchor_call)) { in pfioctl() 3376 const char *anchor = "", *anchor_call = ""; in pfioctl() local 3413 anchor_call = nvlist_get_string(nvl, "anchor_call"); in pfioctl() 3420 anchor_call, td->td_ucred->cr_ruid, in pfioctl() 3449 pr->anchor, pr->anchor_call, td->td_ucred->cr_ruid, in pfioctl() 3723 if (pf_kanchor_setup(newrule, ruleset, pcr->anchor_call)) in pfioctl()
|
/freebsd/sbin/pfctl/ |
H A D | pfctl.c | 1099 char anchor_call[MAXPATHLEN]; in pfctl_show_eth_rules() local 1174 opts & PF_OPT_CLRRULECTRS, anchor_call)) != 0) { in pfctl_show_eth_rules() 1178 if (anchor_call[0] && in pfctl_show_eth_rules() 1179 ((((p = strrchr(anchor_call, '_')) != NULL) && in pfctl_show_eth_rules() 1180 (p == anchor_call || in pfctl_show_eth_rules() 1183 int aclen = strlen(anchor_call); in pfctl_show_eth_rules() 1184 if (anchor_call[aclen - 1] == '*') in pfctl_show_eth_rules() 1185 anchor_call[aclen - 2] = '\0'; in pfctl_show_eth_rules() 1187 p = &anchor_call[0]; in pfctl_show_eth_rules() 1192 print_eth_rule(&rule, anchor_call, in pfctl_show_eth_rules() [all …]
|
H A D | pfctl_parser.c | 758 print_eth_rule(struct pfctl_eth_rule *r, const char *anchor_call, in print_eth_rule() argument 770 if (anchor_call[0]) { in print_eth_rule() 771 if (anchor_call[0] == '_') { in print_eth_rule() 774 printf("anchor \"%s\"", anchor_call); in print_eth_rule() 831 print_rule(struct pfctl_rule *r, const char *anchor_call, int verbose, int numeric) in print_rule() argument 848 else if (anchor_call[0]) { in print_rule() 849 p = strrchr(anchor_call, '/'); in print_rule() 850 if (p ? p[1] == '_' : anchor_call[0] == '_') in print_rule() 854 anchor_call); in print_rule() 978 !anchor_call[0] && r->keep_state) in print_rule() [all …]
|
H A D | pfctl_optimize.c | 880 char anchor_call[MAXPATHLEN] = ""; in load_feedback_profile() local 907 &rule, anchor_call)) { in load_feedback_profile() 912 rs = pf_find_or_create_ruleset(anchor_call); in load_feedback_profile()
|
H A D | parse.y | 5310 rule_consistent(struct pfctl_rule *r, int anchor_call) in rule_consistent() argument 5320 problems = filter_consistent(r, anchor_call); in rule_consistent() 5339 filter_consistent(struct pfctl_rule *r, int anchor_call) in filter_consistent() argument 5977 const char *bridge_to, const char *anchor_call) in expand_eth_rule() argument 6031 pfctl_append_eth_rule(pf, r, anchor_call); in expand_eth_rule() 6049 struct node_icmp *icmp_types, const char *anchor_call) in expand_rule() argument 6205 if (rule_consistent(r, anchor_call[0]) < 0 || error) in expand_rule() 6209 pfctl_append_rule(pf, r, anchor_call); in expand_rule()
|
/freebsd/lib/libpfctl/ |
H A D | libpfctl.h | 436 char *anchor_call); 438 const char *anchor, const char *anchor_call, uint32_t ticket); 446 char *anchor_call); 449 char *anchor_call); 452 char *anchor_call, bool clear); 455 char *anchor_call, bool clear); 457 const char *anchor, const char *anchor_call, uint32_t ticket, 460 const char *anchor, const char *anchor_call, uint32_t ticket,
|
H A D | libpfctl.c | 981 char *anchor_call) in pfctl_get_eth_rule() argument 998 if (anchor_call) in pfctl_get_eth_rule() 999 strlcpy(anchor_call, nvlist_get_string(nvl, "anchor_call"), in pfctl_get_eth_rule() 1009 const char *anchor_call, uint32_t ticket) in pfctl_add_eth_rule() argument 1021 nvlist_add_string(nvl, "anchor_call", anchor_call); in pfctl_add_eth_rule() 1296 const char *anchor_call, uint32_t ticket, uint32_t pool_ticket) in pfctl_add_rule() argument 1305 ret = pfctl_add_rule_h(h, r, anchor, anchor_call, ticket, pool_ticket); in pfctl_add_rule() 1314 const char *anchor, const char *anchor_call, uint32_t ticket, in pfctl_add_rule_h() argument 1333 snl_add_msg_attr_string(&nw, PF_ART_ANCHOR_CALL, anchor_call); in pfctl_add_rule_h() 1418 uint32_t ruleset, struct pfctl_rule *rule, char *anchor_call) in pfctl_get_rule_h() argument [all …]
|
/freebsd/usr.sbin/bsnmpd/modules/snmp_pf/ |
H A D | pf_snmp.c | 1516 char anchor_call[MAXPATHLEN] = ""; in pfl_scan_ruleset() local 1528 PF_PASS, &rule, anchor_call)) { in pfl_scan_ruleset()
|
/freebsd/sys/net/ |
H A D | pfvar.h | 1784 char anchor_call[MAXPATHLEN]; member
|