| /freebsd/sbin/ipf/ipsend/ |
| H A D | Makefile | 41 ipf: target 44 -if [ ! -d ipf ] ; then ln -s .. ipf; fi 143 ipsend: ipf $(OBJS) $(UNIXOBJS) 152 ipft_ef.o: ipf/ipft_ef.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h 153 $(CC) $(CFLAGS) $(LINUXK) -c ipf/ipft_ef.c -o $@ 155 ipft_hx.o: ipf/ipft_hx.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h 156 $(CC) $(CFLAGS) $(LINUXK) -c ipf/ipft_hx.c -o $@ 158 ipft_pc.o: ipf/ipft_pc.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h 159 $(CC) $(CFLAGS) $(LINUXK) -c ipf/ipft_pc.c -o $@ 161 ipft_sn.o: ipf/ipft_sn.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h [all …]
|
| /freebsd/contrib/netbsd-tests/ipf/ |
| H A D | t_filter_parse.sh | 38 ipf) 39 atf_check -o file:exp -e ignore ipf -Rnvf reg 86 test_case i1 itest text ipf 87 test_case i2 itest text ipf 88 test_case i3 itest text ipf 89 test_case i4 itest text ipf 90 test_case i5 itest text ipf 91 test_case i6 itest text ipf 92 test_case i7 itest text ipf 93 test_case i8 itest text ipf [all …]
|
| H A D | t_bpf.sh | 38 ipf) 39 atf_check -o file:exp -e ignore ipf -Rnvf reg 61 broken_test_case bpf1 itest text ipf
|
| H A D | t_pools.sh | 49 cp $(atf_get_srcdir)/regress/$1.ipf ipf 56 atf_check -o save:out ipftest -RD -b -P pool -r ipf -i in 59 atf_check -o save:out ipftest -RD -b -r ipf -i in
|
| /freebsd/libexec/rc/rc.d/ |
| H A D | ipfs | 27 if ! ${ipfilter_program:-/sbin/ipf} -V | grep -q 'Running: yes' >/dev/null 2>&1; then 35 if [ -r /var/db/ipf/ipstate.ipf -a -r /var/db/ipf/ipnat.ipf ]; then 37 rm -f /var/db/ipf/ipstate.ipf /var/db/ipf/ipnat.ipf 43 if [ ! -d /var/db/ipf ]; then 44 mkdir /var/db/ipf 45 chmod 700 /var/db/ipf 46 chown root:wheel /var/db/ipf
|
| H A D | ipfilter | 36 if ! ${ipfilter_program:-/sbin/ipf} -V | grep -q 'Running: yes'; then 37 ${ipfilter_program:-/sbin/ipf} -E 40 ${ipfilter_program:-/sbin/ipf} -T "${ipfilter_optionlist}" 42 ${ipfilter_program:-/sbin/ipf} -Fa 44 ${ipfilter_program:-/sbin/ipf} \ 51 if ${ipfilter_program:-/sbin/ipf} -V | grep -q 'Running: yes'; then 55 ${ipfilter_program:-/sbin/ipf} -D 63 ${ipfilter_program:-/sbin/ipf} -I -Fa 65 ${ipfilter_program:-/sbin/ipf} -I \ 71 ${ipfilter_program:-/sbin/ipf} -s [all …]
|
| /freebsd/sbin/ipf/ipf/ |
| H A D | Makefile | 1 PACKAGE= ipf 2 PROG= ipf 3 SRCS= ${GENHDRS} ipf.c ipfcomp.c ipf_y.c ipf_l.c bpf_filter.c 4 MAN= ipfilter.4 ipfilter.5 ipf.8 ipf.4 ipf.5 ipl.4 5 MLINKS= ipf.5 ipf.conf.5 ipf.5 ipf6.conf.5
|
| H A D | ipfcomp.c | 8 #include "ipf.h" 203 static u_long ipf%s_rule_data_%s_%u[] = {\n", in addrule() 440 fripf_t *ipf; in emitGroup() local 539 ipf = fr->fr_ipf; in emitGroup() 580 if (ipf != NULL && ipf->fri_mip.fi_v != 0) in emitGroup() 584 if (ipf != NULL && ipf->fri_mip.fi_flx != 0) in emitGroup() 588 if (ipf != NULL && ipf in emitGroup() [all...] |
| /freebsd/contrib/netbsd-tests/ipf/regress/ |
| H A D | ip1 | 3 table role = ipf type = tree number = 1 5 table role = ipf type = tree number = 100 14 table role = ipf type = hash number = 2 16 table role = ipf type = hash number = 200 25 table role = ipf type = hash number = 240 seed = 101 34 table role = ipf type = hash number = 2000 size = 1001 43 table role = ipf type = hash number = 100 size = 1001 seed = 101 52 group-map in role = ipf number = 300 group = 303 61 group-map out role = ipf number = 400 group = 303 70 group-map in role = ipf number = 500
|
| H A D | ip3 | 1 pool ipf/dstlist (name fred; policy round-robin;) 3 pool ipf/dstlist (name jack; policy weighted connection;) 5 pool ipf/dstlist (name jill; policy random;)
|
| H A D | p3.pool | 1 group-map in role = ipf number = 1010 3 group-map out role = ipf number = 2010 group = 2020
|
| /freebsd/sbin/ipf/ipftest/ |
| H A D | Makefile | 1 PACKAGE= ipf 27 CLEANFILES+= ipf.tab.c ipf.tab.h 81 ipf.tab.c ipf.tab.h: ipf_y.y 82 ${YACC} -b ipf -d ${.ALLSRC} 84 ipf_y.c: ipf.tab.c 86 ipf.tab.c > ${.TARGET} 88 ipf_y.h: ipf.tab.h 90 ipf.tab.h > ${.TARGET}
|
| /freebsd/contrib/netbsd-tests/ipf/expected/ |
| H A D | ip1 | 1 table role=ipf type=tree number=1 3 table role=ipf type=tree number=100 11 table role=ipf type=hash number=2 size=1 13 table role=ipf type=hash number=200 size=5 21 table role=ipf type=hash number=240 size=5 seed=101 29 table role=ipf type=hash number=2000 size=1001 37 table role=ipf type=hash number=100 size=1001 seed=101 45 group-map in role=ipf number=300 size=5 53 group-map out role=ipf number=400 size=5 61 group-map in role=ipf number=500 size=5
|
| H A D | ip3 | 1 pool ipf/dstlist (name fred; policy round-robin;) 3 pool ipf/dstlist (name jack; policy weighting connection;) 5 pool ipf/dstlist (name jill; policy random;)
|
| H A D | l1 | 2 missed 1 ipf log entries: 0 1 20 missed 1 ipf log entries: 0 1 27 missed 1 ipf log entries: 0 1 35 missed 1 ipf log entries: 0 1 38 missed 1 ipf log entries: 0 1
|
| H A D | l1.b | 1 missed 1 ipf log entries: 0 1 16 missed 1 ipf log entries: 0 1 25 missed 1 ipf log entries: 0 1 32 missed 1 ipf log entries: 0 1 35 missed 1 ipf log entries: 0 1
|
| /freebsd/sbin/ipf/ipmon/ |
| H A D | ipmon.c | 1027 ipflog_t *ipf; in print_ipflog() local 1053 ipf = (ipflog_t *)((char *)buf + sizeof(*ipl)); in print_ipflog() 1054 ip = (ip_t *)((char *)ipf + sizeof(*ipf)); in print_ipflog() 1055 f = ipf->fl_family; in print_ipflog() 1077 char ifname[sizeof(ipf->fl_ifname) + 1]; in print_ipflog() 1079 strncpy(ifname, ipf->fl_ifname, sizeof(ipf->fl_ifname)); in print_ipflog() 1080 ifname[sizeof(ipf->fl_ifname)] = '\0'; in print_ipflog() 1085 sprintf(t, "%d", ipf->fl_unit); in print_ipflog() 1090 if ((ipf->fl_group[0] == (char)~0) && (ipf->fl_group[1] == '\0')) in print_ipflog() 1092 else if (ipf->fl_group[0] == '\0') in print_ipflog() [all …]
|
| H A D | ipmon_y.y | 435 ipflog_t *ipf; in check_action() local 444 ipf = (ipflog_t *)(ipl +1); in check_action() 445 ip = (ip_t *)(ipf + 1); in check_action() 459 if ((ipf->fl_flags & FR_INQUE) == 0) { in check_action() 464 if ((ipf->fl_flags & FR_OUTQUE) == 0) { in check_action() 525 if (strncmp(a->ac_group, ipf->fl_group, in check_action() 533 if (strcmp(a->ac_iface, ipf->fl_ifname)) { in check_action() 547 if ((ipf->fl_flags & FF_LOGNOMATCH) != 0) { in check_action() 552 } else if (FR_ISPASS(ipf->fl_flags)) { in check_action() 557 } else if (FR_ISBLOCK(ipf->fl_flags)) { in check_action() [all …]
|
| /freebsd/share/examples/ipfilter/ |
| H A D | Makefile | 1 PACKAGE=ipf 14 ipf.conf.permissive ipf.conf.restrictive \ 15 ipf.conf.sample ipnat.conf.sample 18 FILES+= ipf-howto.txt
|
| H A D | README | 4 For information on building ipf based firewalls, read the ipf-howto.txt. 8 http://www.obfuscation.org/ipf/ 10 Additional help may be found at the ipf home page:
|
| /freebsd/sbin/ipf/ |
| H A D | Makefile.inc | 8 CFLAGS+= -I${SRCTOP}/sbin/ipf/common 18 LIBADD+= ipf 23 .PATH: ${SRCTOP}/sbin/ipf/libipf \ 24 ${SRCTOP}/sbin/ipf/common
|
| /freebsd/contrib/sendmail/libsm/ |
| H A D | t-inet6_ntop.c | 44 char *ip, *ipf, ipv6str[INET6_ADDRSTRLEN]; in test() local 49 ipf = sm_inet6_ntop(&addr.sin6_addr, ipv6str, sizeof(ipv6str)); in test() 50 SM_TEST(ipf != NULL); in test() 51 SM_TEST(strcmp(ipf, ip) == 0); in test()
|
| /freebsd/tests/sys/netpfil/common/ |
| H A D | utils.subr | 62 elif [ ${fw} == "ipf" ]; then 63 jexec ${jname} ipf -E 64 jexec ${jname} ipf -Fa -f $cwd/ipf.rule 97 elif [ ${firewall} == "ipf" ]; then 99 atf_skip "This test requires ipf" 103 atf_skip "This test requires ipf" 141 if [ "$1" = "pf" -o "$1" = "ipfw" -o "$1" = "ipf" -o "$1" = "ipfnat" ]; then
|
| /freebsd/libexec/blocklistd-helper/ |
| H A D | blacklistd-helper | 148 /sbin/ipf -A -f - >/dev/null 2>&1 && echo OK 201 /sbin/ipf -A -r -f - >/dev/null 2>&1 && echo OK 239 /sbin/ipf -I -F a 256 /sbin/ipf -I -f - >/dev/null 2>&1 261 /sbin/ipf -s && echo OK
|
| /freebsd/contrib/blocklist/libexec/ |
| H A D | blocklistd-helper | 127 /sbin/ipf -A -f - >/dev/null 2>&1 && echo OK 180 /sbin/ipf -A -r -f - >/dev/null 2>&1 && echo OK 218 /sbin/ipf -I -F a 235 /sbin/ipf -I -f - >/dev/null 2>&1 240 /sbin/ipf -s && echo OK
|