/titanic_44/usr/src/cmd/ipf/examples/ |
H A D | example.sr | 2 # log all inbound packet on le0 which has IP options present 6 # block any inbound packets on le0 which are fragmented and "too short" to 13 # log all inbound TCP packets with the SYN flag (only) set 14 # (NOTE: if it were an inbound TCP packet with the SYN flag set and it 20 # block and log any inbound ICMP unreachables 24 # block and log any inbound UDP packets on le0 which are going to port 2049 44 # block any inbound UDP packets destined for these subnets. 50 # block any inbound TCP packets with only the SYN flag set that are 57 # block any inbound ICMP packets destined for these subnets.
|
H A D | example.8 | 8 # block all inbound UDP packets and send back an ICMP error.
|
H A D | example.3 | 2 # block all inbound packets.
|
H A D | nat-setup | 64 access list for inbound packets and translates addresses _AFTER_ it has
|
/titanic_44/usr/src/uts/common/fs/nfs/ |
H A D | nfs_cmd.c | 260 charset->inbound = kiconv_open("UTF-8", name); in nfscmd_insert_charmap() 325 int inbound, size_t size) in nfscmd_convname() argument 337 (charset->inbound == NULL && inbound) || in nfscmd_convname() 338 (charset->outbound == NULL && !inbound)) in nfscmd_convname() 346 if (inbound) in nfscmd_convname() 347 ret = kiconv(charset->inbound, &name, &nsize, in nfscmd_convname()
|
H A D | nfs_export.c | 2528 if (cache->inbound != (kiconv_t)-1) in exportfree() 2529 (void) kiconv_close(cache->inbound); in exportfree()
|
/titanic_44/usr/src/uts/common/inet/ip/ |
H A D | ipsecah.c | 805 primary = sq.inbound; in ah_add_sa_finish() 813 secondary = sq.inbound; in ah_add_sa_finish() 836 primary = sq.inbound; in ah_add_sa_finish() 853 secondary = sq.inbound; in ah_add_sa_finish() 913 mutex_enter(&sq.inbound->isaf_lock); in ah_add_sa_finish() 914 larval = ipsec_getassocbyspi(sq.inbound, sq.assoc->sadb_sa_spi, in ah_add_sa_finish() 916 mutex_exit(&sq.inbound->isaf_lock); in ah_add_sa_finish() 1548 ah_set_usetime(ipsa_t *assoc, boolean_t inbound) in ah_set_usetime() argument 1582 if (inbound) { in ah_set_usetime() 1631 if (inbound) { in ah_set_usetime() [all …]
|
H A D | ipsecesp.c | 648 esp_age_bytes(ipsa_t *assoc, uint64_t bytes, boolean_t inbound) in esp_age_bytes() argument 679 if (inbound) { in esp_age_bytes() 727 if (inbound) { in esp_age_bytes() 1044 esp_set_usetime(ipsa_t *assoc, boolean_t inbound) in esp_set_usetime() argument 1074 if (inbound) { in esp_set_usetime() 1123 if (inbound) { in esp_set_usetime() 1365 isaf_t *outbound, *inbound; in esp_getspi() local 1403 inbound = INBOUND_BUCKET(&espstack->esp_sadb.s_v6, in esp_getspi() 1409 inbound = INBOUND_BUCKET(&espstack->esp_sadb.s_v4, in esp_getspi() 1414 mutex_enter(&inbound->isaf_lock); in esp_getspi() [all …]
|
H A D | spd.c | 243 ip_drop_packet_chain(mblk_t *mp, boolean_t inbound, ill_t *ill, in ip_drop_packet_chain() argument 253 ip_drop_packet(mp, inbound, ill, counter, who_called); in ip_drop_packet_chain() 6274 boolean_t inbound = (iramp != NULL); in ipsec_fragcache_add() local 6277 cmn_err(CE_WARN, "Fragcache: %s\n", inbound ? "INBOUND" : "OUTBOUND"); in ipsec_fragcache_add() 6286 ip_drop_packet(mp, inbound, NULL, in ipsec_fragcache_add() 6289 if (inbound) in ipsec_fragcache_add() 6315 ip_drop_packet(mp, inbound, NULL, in ipsec_fragcache_add() 6318 if (inbound) in ipsec_fragcache_add() 6334 ip_drop_packet(mp, inbound, NULL, in ipsec_fragcache_add() 6337 if (inbound) in ipsec_fragcache_add() [all …]
|
H A D | ipdrop.c | 252 ip_drop_packet(mblk_t *mp, boolean_t inbound, ill_t *ill, in ip_drop_packet() argument 293 if (inbound) in ip_drop_packet()
|
H A D | sadb.c | 718 boolean_t inbound) in sadb_destroyer() argument 732 if (inbound && cl_inet_deletespi && in sadb_destroyer() 2349 sq->inbound = &sq->sp->sdb_if[sq->inhash]; in sadb_form_query() 2352 sq->inbound = NULL; in sadb_form_query() 2678 mutex_enter(&sq->inbound->isaf_lock); in get_ipsa_pair() 2681 ipsapp->ipsap_sa_ptr = ipsec_getassocbyspi(sq->inbound, in get_ipsa_pair() 2684 ipsapp->ipsap_bucket = sq->inbound; in get_ipsa_pair() 2692 ipsapp->ipsap_pbucket = sq->inbound; in get_ipsa_pair() 2701 ipsapp->ipsap_pbucket = sq->inbound; in get_ipsa_pair() 2703 ipsapp->ipsap_sa_ptr = ipsec_getassocbyspi(sq->inbound, in get_ipsa_pair() [all …]
|
/titanic_44/usr/src/cmd/svc/profile/ |
H A D | README | 43 In general, _any_ service that allows inbound net access should be
|
/titanic_44/usr/src/uts/common/nfs/ |
H A D | export.h | 390 kiconv_t inbound; member
|
/titanic_44/usr/src/cmd/cmd-inet/etc/ike/ |
H A D | config.sample | 91 # have are index-only rules, what do I do about inbound IKE requests?
|
/titanic_44/usr/src/uts/common/inet/ |
H A D | sadb.h | 699 isaf_t *inbound, *outbound; member
|
/titanic_44/usr/src/cmd/mdb/common/modules/pmcs/ |
H A D | pmcs.c | 1606 iomb_is_dev_hdl_specific(uint32_t word0, boolean_t inbound) in iomb_is_dev_hdl_specific() argument 1610 if (inbound) { in iomb_is_dev_hdl_specific()
|
/titanic_44/usr/src/cmd/spell/ |
H A D | extra | 2382 inbound
|