Home
last modified time | relevance | path

Searched refs:ipf (Results 1 – 25 of 85) sorted by relevance

1234

/freebsd/sbin/ipf/ipsend/
H A DMakefile41 ipf: target
44 -if [ ! -d ipf ] ; then ln -s .. ipf; fi
143 ipsend: ipf $(OBJS) $(UNIXOBJS)
152 ipft_ef.o: ipf/ipft_ef.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h
153 $(CC) $(CFLAGS) $(LINUXK) -c ipf/ipft_ef.c -o $@
155 ipft_hx.o: ipf/ipft_hx.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h
156 $(CC) $(CFLAGS) $(LINUXK) -c ipf/ipft_hx.c -o $@
158 ipft_pc.o: ipf/ipft_pc.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h
159 $(CC) $(CFLAGS) $(LINUXK) -c ipf/ipft_pc.c -o $@
161 ipft_sn.o: ipf/ipft_sn.c ipf/ipt.h ipf/ipf.h ipf/ip_compat.h
[all …]
/freebsd/contrib/netbsd-tests/ipf/
H A Dt_filter_parse.sh38 ipf)
39 atf_check -o file:exp -e ignore ipf -Rnvf reg
86 test_case i1 itest text ipf
87 test_case i2 itest text ipf
88 test_case i3 itest text ipf
89 test_case i4 itest text ipf
90 test_case i5 itest text ipf
91 test_case i6 itest text ipf
92 test_case i7 itest text ipf
93 test_case i8 itest text ipf
[all …]
H A Dt_bpf.sh38 ipf)
39 atf_check -o file:exp -e ignore ipf -Rnvf reg
61 broken_test_case bpf1 itest text ipf
H A Dt_pools.sh49 cp $(atf_get_srcdir)/regress/$1.ipf ipf
56 atf_check -o save:out ipftest -RD -b -P pool -r ipf -i in
59 atf_check -o save:out ipftest -RD -b -r ipf -i in
/freebsd/libexec/rc/rc.d/
H A Dipfs27 if ! ${ipfilter_program:-/sbin/ipf} -V | grep -q 'Running: yes' >/dev/null 2>&1; then
35 if [ -r /var/db/ipf/ipstate.ipf -a -r /var/db/ipf/ipnat.ipf ]; then
37 rm -f /var/db/ipf/ipstate.ipf /var/db/ipf/ipnat.ipf
43 if [ ! -d /var/db/ipf ]; then
44 mkdir /var/db/ipf
45 chmod 700 /var/db/ipf
46 chown root:wheel /var/db/ipf
H A Dipfilter36 if ! ${ipfilter_program:-/sbin/ipf} -V | grep -q 'Running: yes'; then
37 ${ipfilter_program:-/sbin/ipf} -E
40 ${ipfilter_program:-/sbin/ipf} -T "${ipfilter_optionlist}"
42 ${ipfilter_program:-/sbin/ipf} -Fa
44 ${ipfilter_program:-/sbin/ipf} \
51 if ${ipfilter_program:-/sbin/ipf} -V | grep -q 'Running: yes'; then
55 ${ipfilter_program:-/sbin/ipf} -D
63 ${ipfilter_program:-/sbin/ipf} -I -Fa
65 ${ipfilter_program:-/sbin/ipf} -I \
71 ${ipfilter_program:-/sbin/ipf} -s
[all …]
/freebsd/sbin/ipf/ipf/
H A DMakefile1 PACKAGE= ipf
2 PROG= ipf
3 SRCS= ${GENHDRS} ipf.c ipfcomp.c ipf_y.c ipf_l.c bpf_filter.c
4 MAN= ipfilter.4 ipfilter.5 ipf.8 ipf.4 ipf.5 ipl.4
5 MLINKS= ipf.5 ipf.conf.5 ipf.5 ipf6.conf.5
H A Dipfcomp.c8 #include "ipf.h"
203 static u_long ipf%s_rule_data_%s_%u[] = {\n", in addrule()
440 fripf_t *ipf; in emitGroup() local
539 ipf = fr->fr_ipf; in emitGroup()
580 if (ipf != NULL && ipf->fri_mip.fi_v != 0) in emitGroup()
584 if (ipf != NULL && ipf->fri_mip.fi_flx != 0) in emitGroup()
588 if (ipf != NULL && ipf in emitGroup()
[all...]
/freebsd/contrib/netbsd-tests/ipf/regress/
H A Dip13 table role = ipf type = tree number = 1
5 table role = ipf type = tree number = 100
14 table role = ipf type = hash number = 2
16 table role = ipf type = hash number = 200
25 table role = ipf type = hash number = 240 seed = 101
34 table role = ipf type = hash number = 2000 size = 1001
43 table role = ipf type = hash number = 100 size = 1001 seed = 101
52 group-map in role = ipf number = 300 group = 303
61 group-map out role = ipf number = 400 group = 303
70 group-map in role = ipf number = 500
H A Dip31 pool ipf/dstlist (name fred; policy round-robin;)
3 pool ipf/dstlist (name jack; policy weighted connection;)
5 pool ipf/dstlist (name jill; policy random;)
H A Dp3.pool1 group-map in role = ipf number = 1010
3 group-map out role = ipf number = 2010 group = 2020
/freebsd/sbin/ipf/ipftest/
H A DMakefile1 PACKAGE= ipf
27 CLEANFILES+= ipf.tab.c ipf.tab.h
81 ipf.tab.c ipf.tab.h: ipf_y.y
82 ${YACC} -b ipf -d ${.ALLSRC}
84 ipf_y.c: ipf.tab.c
86 ipf.tab.c > ${.TARGET}
88 ipf_y.h: ipf.tab.h
90 ipf.tab.h > ${.TARGET}
/freebsd/contrib/netbsd-tests/ipf/expected/
H A Dip11 table role=ipf type=tree number=1
3 table role=ipf type=tree number=100
11 table role=ipf type=hash number=2 size=1
13 table role=ipf type=hash number=200 size=5
21 table role=ipf type=hash number=240 size=5 seed=101
29 table role=ipf type=hash number=2000 size=1001
37 table role=ipf type=hash number=100 size=1001 seed=101
45 group-map in role=ipf number=300 size=5
53 group-map out role=ipf number=400 size=5
61 group-map in role=ipf number=500 size=5
H A Dip31 pool ipf/dstlist (name fred; policy round-robin;)
3 pool ipf/dstlist (name jack; policy weighting connection;)
5 pool ipf/dstlist (name jill; policy random;)
H A Dl12 missed 1 ipf log entries: 0 1
20 missed 1 ipf log entries: 0 1
27 missed 1 ipf log entries: 0 1
35 missed 1 ipf log entries: 0 1
38 missed 1 ipf log entries: 0 1
H A Dl1.b1 missed 1 ipf log entries: 0 1
16 missed 1 ipf log entries: 0 1
25 missed 1 ipf log entries: 0 1
32 missed 1 ipf log entries: 0 1
35 missed 1 ipf log entries: 0 1
/freebsd/sbin/ipf/ipmon/
H A Dipmon.c1027 ipflog_t *ipf; in print_ipflog() local
1053 ipf = (ipflog_t *)((char *)buf + sizeof(*ipl)); in print_ipflog()
1054 ip = (ip_t *)((char *)ipf + sizeof(*ipf)); in print_ipflog()
1055 f = ipf->fl_family; in print_ipflog()
1077 char ifname[sizeof(ipf->fl_ifname) + 1]; in print_ipflog()
1079 strncpy(ifname, ipf->fl_ifname, sizeof(ipf->fl_ifname)); in print_ipflog()
1080 ifname[sizeof(ipf->fl_ifname)] = '\0'; in print_ipflog()
1085 sprintf(t, "%d", ipf->fl_unit); in print_ipflog()
1090 if ((ipf->fl_group[0] == (char)~0) && (ipf->fl_group[1] == '\0')) in print_ipflog()
1092 else if (ipf->fl_group[0] == '\0') in print_ipflog()
[all …]
H A Dipmon_y.y435 ipflog_t *ipf; in check_action() local
444 ipf = (ipflog_t *)(ipl +1); in check_action()
445 ip = (ip_t *)(ipf + 1); in check_action()
459 if ((ipf->fl_flags & FR_INQUE) == 0) { in check_action()
464 if ((ipf->fl_flags & FR_OUTQUE) == 0) { in check_action()
525 if (strncmp(a->ac_group, ipf->fl_group, in check_action()
533 if (strcmp(a->ac_iface, ipf->fl_ifname)) { in check_action()
547 if ((ipf->fl_flags & FF_LOGNOMATCH) != 0) { in check_action()
552 } else if (FR_ISPASS(ipf->fl_flags)) { in check_action()
557 } else if (FR_ISBLOCK(ipf->fl_flags)) { in check_action()
[all …]
/freebsd/share/examples/ipfilter/
H A DMakefile1 PACKAGE=ipf
14 ipf.conf.permissive ipf.conf.restrictive \
15 ipf.conf.sample ipnat.conf.sample
18 FILES+= ipf-howto.txt
H A DREADME4 For information on building ipf based firewalls, read the ipf-howto.txt.
8 http://www.obfuscation.org/ipf/
10 Additional help may be found at the ipf home page:
/freebsd/sbin/ipf/
H A DMakefile.inc8 CFLAGS+= -I${SRCTOP}/sbin/ipf/common
18 LIBADD+= ipf
23 .PATH: ${SRCTOP}/sbin/ipf/libipf \
24 ${SRCTOP}/sbin/ipf/common
/freebsd/contrib/sendmail/libsm/
H A Dt-inet6_ntop.c44 char *ip, *ipf, ipv6str[INET6_ADDRSTRLEN]; in test() local
49 ipf = sm_inet6_ntop(&addr.sin6_addr, ipv6str, sizeof(ipv6str)); in test()
50 SM_TEST(ipf != NULL); in test()
51 SM_TEST(strcmp(ipf, ip) == 0); in test()
/freebsd/tests/sys/netpfil/common/
H A Dutils.subr62 elif [ ${fw} == "ipf" ]; then
63 jexec ${jname} ipf -E
64 jexec ${jname} ipf -Fa -f $cwd/ipf.rule
97 elif [ ${firewall} == "ipf" ]; then
99 atf_skip "This test requires ipf"
103 atf_skip "This test requires ipf"
141 if [ "$1" = "pf" -o "$1" = "ipfw" -o "$1" = "ipf" -o "$1" = "ipfnat" ]; then
/freebsd/libexec/blocklistd-helper/
H A Dblacklistd-helper148 /sbin/ipf -A -f - >/dev/null 2>&1 && echo OK
201 /sbin/ipf -A -r -f - >/dev/null 2>&1 && echo OK
239 /sbin/ipf -I -F a
256 /sbin/ipf -I -f - >/dev/null 2>&1
261 /sbin/ipf -s && echo OK
/freebsd/contrib/blocklist/libexec/
H A Dblocklistd-helper127 /sbin/ipf -A -f - >/dev/null 2>&1 && echo OK
180 /sbin/ipf -A -r -f - >/dev/null 2>&1 && echo OK
218 /sbin/ipf -I -F a
235 /sbin/ipf -I -f - >/dev/null 2>&1
240 /sbin/ipf -s && echo OK

1234