xref: /freebsd/sbin/ipf/ipnat/ipnat.c (revision 22cf89c938886d14f5796fc49f9f020c23ea8eaf)
1 
2 /*
3  * Copyright (C) 2012 by Darren Reed.
4  *
5  * See the IPFILTER.LICENCE file for details on licencing.
6  *
7  * Added redirect stuff and a variety of bug fixes. (mcn@EnGarde.com)
8  */
9 #include <stdio.h>
10 #include <string.h>
11 #include <fcntl.h>
12 #include <errno.h>
13 #include <sys/types.h>
14 #if !defined(__SVR4)
15 #include <strings.h>
16 #else
17 #include <sys/byteorder.h>
18 #endif
19 #include <sys/time.h>
20 #include <sys/param.h>
21 #include <stdlib.h>
22 #include <unistd.h>
23 #include <stddef.h>
24 #include <sys/file.h>
25 #define _KERNEL
26 #include <sys/uio.h>
27 #undef _KERNEL
28 #include <sys/socket.h>
29 #include <sys/ioctl.h>
30 #if defined(sun) && defined(__SVR4)
31 # include <sys/ioccom.h>
32 # include <sys/sysmacros.h>
33 #endif
34 #include <netinet/in.h>
35 #include <netinet/in_systm.h>
36 #include <netinet/ip.h>
37 #include <netinet/tcp.h>
38 #include <net/if.h>
39 #include <netdb.h>
40 #include <arpa/nameser.h>
41 #include <arpa/inet.h>
42 #include <resolv.h>
43 #include <ctype.h>
44 # include <nlist.h>
45 #include "ipf.h"
46 #include "netinet/ipl.h"
47 #include "kmem.h"
48 
49 
50 # define	STRERROR(x)	strerror(x)
51 
52 #if !defined(lint)
53 static const char sccsid[] ="@(#)ipnat.c	1.9 6/5/96 (C) 1993 Darren Reed";
54 static const char rcsid[] = "@(#)$Id$";
55 #endif
56 
57 
58 #if	SOLARIS
59 #define	bzero(a,b)	memset(a,0,b)
60 #endif
61 int	use_inet6 = 0;
62 
63 extern	char	*optarg;
64 
65 void	dostats(int, natstat_t *, int, int, int *);
66 void	dotable(natstat_t *, int, int, int, char *);
67 void	flushtable(int, int, int *);
68 void	usage(char *);
69 int	main(int, char*[]);
70 void	showhostmap(natstat_t *nsp);
71 void	natstat_dead(natstat_t *, char *);
72 void	dostats_live(int, natstat_t *, int, int *);
73 void	showhostmap_dead(natstat_t *);
74 void	showhostmap_live(int, natstat_t *);
75 void	dostats_dead(natstat_t *, int, int *);
76 int	nat_matcharray(nat_t *, int *);
77 
78 int		opts;
79 int		nohdrfields = 0;
80 wordtab_t	*nat_fields = NULL;
81 
82 void
83 usage(char *name)
84 {
85 	fprintf(stderr, "Usage: %s [-CFhlnrRsv] [-f filename]\n", name);
86 	exit(1);
87 }
88 
89 
90 int
91 main(int argc, char *argv[])
92 {
93 	int fd, c, mode, *natfilter;
94 	char *file, *core, *kernel;
95 	natstat_t ns, *nsp;
96 	ipfobj_t obj;
97 
98 	fd = -1;
99 	opts = 0;
100 	nsp = &ns;
101 	file = NULL;
102 	core = NULL;
103 	kernel = NULL;
104 	mode = O_RDWR;
105 	natfilter = NULL;
106 
107 	assigndefined(getenv("IPNAT_PREDEFINED"));
108 
109 	while ((c = getopt(argc, argv, "CdFf:hlm:M:N:nO:prRsv")) != -1)
110 		switch (c)
111 		{
112 		case 'C' :
113 			opts |= OPT_CLEAR;
114 			break;
115 		case 'd' :
116 			opts |= OPT_DEBUG;
117 			break;
118 		case 'f' :
119 			file = optarg;
120 			break;
121 		case 'F' :
122 			opts |= OPT_FLUSH;
123 			break;
124 		case 'h' :
125 			opts |=OPT_HITS;
126 			break;
127 		case 'l' :
128 			opts |= OPT_LIST;
129 			mode = O_RDONLY;
130 			break;
131 		case 'm' :
132 			natfilter = parseipfexpr(optarg, NULL);
133 			break;
134 		case 'M' :
135 			core = optarg;
136 			break;
137 		case 'N' :
138 			kernel = optarg;
139 			break;
140 		case 'n' :
141 			opts |= OPT_DONOTHING|OPT_DONTOPEN;
142 			mode = O_RDONLY;
143 			break;
144 		case 'O' :
145 			nat_fields = parsefields(natfields, optarg);
146 			break;
147 		case 'p' :
148 			opts |= OPT_PURGE;
149 			break;
150 		case 'R' :
151 			opts |= OPT_NORESOLVE;
152 			break;
153 		case 'r' :
154 			opts |= OPT_REMOVE;
155 			break;
156 		case 's' :
157 			opts |= OPT_STAT;
158 			mode = O_RDONLY;
159 			break;
160 		case 'v' :
161 			opts |= OPT_VERBOSE;
162 			break;
163 		default :
164 			usage(argv[0]);
165 		}
166 
167 	if (((opts & OPT_PURGE) != 0) && ((opts & OPT_REMOVE) == 0)) {
168 		(void) fprintf(stderr, "%s: -p must be used with -r\n",
169 			       argv[0]);
170 		exit(1);
171 	}
172 
173 	initparse();
174 
175 	if ((kernel != NULL) || (core != NULL)) {
176 		(void) setgid(getgid());
177 		(void) setuid(getuid());
178 	}
179 
180 	if (!(opts & OPT_DONOTHING)) {
181 		if (((fd = open(IPNAT_NAME, mode)) == -1) &&
182 		    ((fd = open(IPNAT_NAME, O_RDONLY)) == -1)) {
183 			(void) fprintf(stderr, "%s: open: %s\n", IPNAT_NAME,
184 				STRERROR(errno));
185 			exit(1);
186 		}
187 	}
188 
189 	bzero((char *)&ns, sizeof(ns));
190 
191 	if ((opts & OPT_DONOTHING) == 0) {
192 		if (checkrev(IPL_NAME) == -1) {
193 			fprintf(stderr, "User/kernel version check failed\n");
194 			exit(1);
195 		}
196 	}
197 
198 	if (!(opts & OPT_DONOTHING) && (kernel == NULL) && (core == NULL)) {
199 		bzero((char *)&obj, sizeof(obj));
200 		obj.ipfo_rev = IPFILTER_VERSION;
201 		obj.ipfo_type = IPFOBJ_NATSTAT;
202 		obj.ipfo_size = sizeof(*nsp);
203 		obj.ipfo_ptr = (void *)nsp;
204 		if (ioctl(fd, SIOCGNATS, &obj) == -1) {
205 			ipferror(fd, "ioctl(SIOCGNATS)");
206 			exit(1);
207 		}
208 		(void) setgid(getgid());
209 		(void) setuid(getuid());
210 	} else if ((kernel != NULL) || (core != NULL)) {
211 		if (openkmem(kernel, core) == -1)
212 			exit(1);
213 
214 		natstat_dead(nsp, kernel);
215 		if (opts & (OPT_LIST|OPT_STAT))
216 			dostats(fd, nsp, opts, 0, natfilter);
217 		exit(0);
218 	}
219 
220 	if (opts & (OPT_FLUSH|OPT_CLEAR))
221 		flushtable(fd, opts, natfilter);
222 	if (file) {
223 		return (ipnat_parsefile(fd, ipnat_addrule, ioctl, file));
224 	}
225 	if (opts & (OPT_LIST|OPT_STAT))
226 		dostats(fd, nsp, opts, 1, natfilter);
227 	return (0);
228 }
229 
230 
231 /*
232  * Read NAT statistic information in using a symbol table and memory file
233  * rather than doing ioctl's.
234  */
235 void
236 natstat_dead(natstat_t *nsp, char *kernel)
237 {
238 	struct nlist nat_nlist[10] = {
239 		{ "nat_table" },		/* 0 */
240 		{ "nat_list" },
241 		{ "maptable" },
242 		{ "ipf_nattable_sz" },
243 		{ "ipf_natrules_sz" },
244 		{ "ipf_rdrrules_sz" },		/* 5 */
245 		{ "ipf_hostmap_sz" },
246 		{ "nat_instances" },
247 		{ NULL }
248 	};
249 	void *tables[2];
250 
251 	if (nlist(kernel, nat_nlist) == -1) {
252 		fprintf(stderr, "nlist error\n");
253 		return;
254 	}
255 
256 	/*
257 	 * Normally the ioctl copies all of these values into the structure
258 	 * for us, before returning it to userland, so here we must copy each
259 	 * one in individually.
260 	 */
261 	kmemcpy((char *)&tables, nat_nlist[0].n_value, sizeof(tables));
262 	nsp->ns_side[0].ns_table = tables[0];
263 	nsp->ns_side[1].ns_table = tables[1];
264 
265 	kmemcpy((char *)&nsp->ns_list, nat_nlist[1].n_value,
266 		sizeof(nsp->ns_list));
267 	kmemcpy((char *)&nsp->ns_maptable, nat_nlist[2].n_value,
268 		sizeof(nsp->ns_maptable));
269 	kmemcpy((char *)&nsp->ns_nattab_sz, nat_nlist[3].n_value,
270 		sizeof(nsp->ns_nattab_sz));
271 	kmemcpy((char *)&nsp->ns_rultab_sz, nat_nlist[4].n_value,
272 		sizeof(nsp->ns_rultab_sz));
273 	kmemcpy((char *)&nsp->ns_rdrtab_sz, nat_nlist[5].n_value,
274 		sizeof(nsp->ns_rdrtab_sz));
275 	kmemcpy((char *)&nsp->ns_hostmap_sz, nat_nlist[6].n_value,
276 		sizeof(nsp->ns_hostmap_sz));
277 	kmemcpy((char *)&nsp->ns_instances, nat_nlist[7].n_value,
278 		sizeof(nsp->ns_instances));
279 }
280 
281 
282 /*
283  * Issue an ioctl to flush either the NAT rules table or the active mapping
284  * table or both.
285  */
286 void
287 flushtable(int fd, int opts, int *match)
288 {
289 	int n = 0;
290 
291 	if (opts & OPT_FLUSH) {
292 		n = 0;
293 		if (!(opts & OPT_DONOTHING)) {
294 			if (match != NULL) {
295 				ipfobj_t obj;
296 
297 				obj.ipfo_rev = IPFILTER_VERSION;
298 				obj.ipfo_size = match[0] * sizeof(int);
299 				obj.ipfo_type = IPFOBJ_IPFEXPR;
300 				obj.ipfo_ptr = match;
301 				if (ioctl(fd, SIOCMATCHFLUSH, &obj) == -1) {
302 					ipferror(fd, "ioctl(SIOCMATCHFLUSH)");
303 					n = -1;
304 				} else {
305 					n = obj.ipfo_retval;
306 				}
307 			} else if (ioctl(fd, SIOCIPFFL, &n) == -1) {
308 				ipferror(fd, "ioctl(SIOCIPFFL)");
309 				n = -1;
310 			}
311 		}
312 		if (n >= 0)
313 			printf("%d entries flushed from NAT table\n", n);
314 	}
315 
316 	if (opts & OPT_CLEAR) {
317 		n = 1;
318 		if (!(opts & OPT_DONOTHING) && ioctl(fd, SIOCIPFFL, &n) == -1)
319 			ipferror(fd, "ioctl(SIOCCNATL)");
320 		else
321 			printf("%d entries flushed from NAT list\n", n);
322 	}
323 }
324 
325 
326 /*
327  * Display NAT statistics.
328  */
329 void
330 dostats_dead(natstat_t *nsp, int opts, int *filter)
331 {
332 	nat_t *np, nat;
333 	ipnat_t	ipn;
334 	int i;
335 
336 	if (nat_fields == NULL) {
337 		printf("List of active MAP/Redirect filters:\n");
338 		while (nsp->ns_list) {
339 			if (kmemcpy((char *)&ipn, (long)nsp->ns_list,
340 				    sizeof(ipn))) {
341 				perror("kmemcpy");
342 				break;
343 			}
344 			if (opts & OPT_HITS)
345 				printf("%lu ", ipn.in_hits);
346 			printnat(&ipn, opts & (OPT_DEBUG|OPT_VERBOSE));
347 			nsp->ns_list = ipn.in_next;
348 		}
349 	}
350 
351 	if (nat_fields == NULL) {
352 		printf("\nList of active sessions:\n");
353 
354 	} else if (nohdrfields == 0) {
355 		for (i = 0; nat_fields[i].w_value != 0; i++) {
356 			printfieldhdr(natfields, nat_fields + i);
357 			if (nat_fields[i + 1].w_value != 0)
358 				printf("\t");
359 		}
360 		printf("\n");
361 	}
362 
363 	for (np = nsp->ns_instances; np; np = nat.nat_next) {
364 		if (kmemcpy((char *)&nat, (long)np, sizeof(nat)))
365 			break;
366 		if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0))
367 			continue;
368 		if (nat_fields != NULL) {
369 			for (i = 0; nat_fields[i].w_value != 0; i++) {
370 				printnatfield(&nat, nat_fields[i].w_value);
371 				if (nat_fields[i + 1].w_value != 0)
372 					printf("\t");
373 			}
374 			printf("\n");
375 		} else {
376 			printactivenat(&nat, opts, nsp->ns_ticks);
377 			if (nat.nat_aps) {
378 				int proto;
379 
380 				if (nat.nat_dir & NAT_OUTBOUND)
381 					proto = nat.nat_pr[1];
382 				else
383 					proto = nat.nat_pr[0];
384 				printaps(nat.nat_aps, opts, proto);
385 			}
386 		}
387 	}
388 
389 	if (opts & OPT_VERBOSE)
390 		showhostmap_dead(nsp);
391 }
392 
393 
394 void
395 dotable(natstat_t *nsp, int fd, int alive, int which, char *side)
396 {
397 	int sz, i, used, maxlen, minlen, totallen;
398 	ipftable_t table;
399 	u_int *buckets;
400 	ipfobj_t obj;
401 
402 	sz = sizeof(*buckets) * nsp->ns_nattab_sz;
403 	buckets = (u_int *)malloc(sz);
404 	if (buckets == NULL) {
405 		fprintf(stderr,
406 			"cannot allocate memory (%d) for buckets\n", sz);
407 		return;
408 	}
409 
410 	obj.ipfo_rev = IPFILTER_VERSION;
411 	obj.ipfo_type = IPFOBJ_GTABLE;
412 	obj.ipfo_size = sizeof(table);
413 	obj.ipfo_ptr = &table;
414 
415 	if (which == 0) {
416 		table.ita_type = IPFTABLE_BUCKETS_NATIN;
417 	} else if (which == 1) {
418 		table.ita_type = IPFTABLE_BUCKETS_NATOUT;
419 	}
420 	table.ita_table = buckets;
421 
422 	if (alive) {
423 		if (ioctl(fd, SIOCGTABL, &obj) != 0) {
424 			ipferror(fd, "SIOCFTABL");
425 			free(buckets);
426 			return;
427 		}
428 	} else {
429 		if (kmemcpy((char *)buckets, (u_long)nsp->ns_nattab_sz, sz)) {
430 			free(buckets);
431 			return;
432 		}
433 	}
434 
435 	minlen = nsp->ns_side[which].ns_inuse;
436 	totallen = 0;
437 	maxlen = 0;
438 	used = 0;
439 
440 	for (i = 0; i < nsp->ns_nattab_sz; i++) {
441 		if (buckets[i] > maxlen)
442 			maxlen = buckets[i];
443 		if (buckets[i] < minlen)
444 			minlen = buckets[i];
445 		if (buckets[i] != 0)
446 			used++;
447 		totallen += buckets[i];
448 	}
449 
450 	printf("%d%%\thash efficiency %s\n",
451 	       totallen ? used * 100 / totallen : 0, side);
452 	printf("%2.2f%%\tbucket usage %s\n",
453 	       ((float)used / nsp->ns_nattab_sz) * 100.0, side);
454 	printf("%d\tminimal length %s\n", minlen, side);
455 	printf("%d\tmaximal length %s\n", maxlen, side);
456 	printf("%.3f\taverage length %s\n",
457 	       used ? ((float)totallen / used) : 0.0, side);
458 
459 	free(buckets);
460 }
461 
462 
463 void
464 dostats(int fd, natstat_t *nsp, int opts, int alive, int *filter)
465 {
466 	/*
467 	 * Show statistics ?
468 	 */
469 	if (opts & OPT_STAT) {
470 		printnatside("in", &nsp->ns_side[0]);
471 		dotable(nsp, fd, alive, 0, "in");
472 
473 		printnatside("out", &nsp->ns_side[1]);
474 		dotable(nsp, fd, alive, 1, "out");
475 
476 		printf("%lu\tlog successes\n", nsp->ns_side[0].ns_log);
477 		printf("%lu\tlog failures\n", nsp->ns_side[1].ns_log);
478 		printf("%lu\tadded in\n%lu\tadded out\n",
479 			nsp->ns_side[0].ns_added,
480 			nsp->ns_side[1].ns_added);
481 		printf("%u\tactive\n", nsp->ns_active);
482 		printf("%lu\ttransparent adds\n", nsp->ns_addtrpnt);
483 		printf("%lu\tdivert build\n", nsp->ns_divert_build);
484 		printf("%lu\texpired\n", nsp->ns_expire);
485 		printf("%lu\tflush all\n", nsp->ns_flush_all);
486 		printf("%lu\tflush closing\n", nsp->ns_flush_closing);
487 		printf("%lu\tflush queue\n", nsp->ns_flush_queue);
488 		printf("%lu\tflush state\n", nsp->ns_flush_state);
489 		printf("%lu\tflush timeout\n", nsp->ns_flush_timeout);
490 		printf("%lu\thostmap new\n", nsp->ns_hm_new);
491 		printf("%lu\thostmap fails\n", nsp->ns_hm_newfail);
492 		printf("%lu\thostmap add\n", nsp->ns_hm_addref);
493 		printf("%lu\thostmap NULL rule\n", nsp->ns_hm_nullnp);
494 		printf("%lu\tlog ok\n", nsp->ns_log_ok);
495 		printf("%lu\tlog fail\n", nsp->ns_log_fail);
496 		printf("%u\torphan count\n", nsp->ns_orphans);
497 		printf("%u\trule count\n", nsp->ns_rules);
498 		printf("%u\tmap rules\n", nsp->ns_rules_map);
499 		printf("%u\trdr rules\n", nsp->ns_rules_rdr);
500 		printf("%u\twilds\n", nsp->ns_wilds);
501 		if (opts & OPT_VERBOSE)
502 			printf("list %p\n", nsp->ns_list);
503 	}
504 
505 	if (opts & OPT_LIST) {
506 		if (alive)
507 			dostats_live(fd, nsp, opts, filter);
508 		else
509 			dostats_dead(nsp, opts, filter);
510 	}
511 }
512 
513 
514 /*
515  * Display NAT statistics.
516  */
517 void
518 dostats_live(int fd, natstat_t *nsp, int opts, int *filter)
519 {
520 	ipfgeniter_t iter;
521 	char buffer[2000];
522 	ipfobj_t obj;
523 	ipnat_t	*ipn;
524 	nat_t nat;
525 	int i;
526 
527 	bzero((char *)&obj, sizeof(obj));
528 	obj.ipfo_rev = IPFILTER_VERSION;
529 	obj.ipfo_type = IPFOBJ_GENITER;
530 	obj.ipfo_size = sizeof(iter);
531 	obj.ipfo_ptr = &iter;
532 
533 	iter.igi_type = IPFGENITER_IPNAT;
534 	iter.igi_nitems = 1;
535 	iter.igi_data = buffer;
536 	ipn = (ipnat_t *)buffer;
537 
538 	/*
539 	 * Show list of NAT rules and NAT sessions ?
540 	 */
541 	if (nat_fields == NULL) {
542 		printf("List of active MAP/Redirect filters:\n");
543 		while (nsp->ns_list) {
544 			if (ioctl(fd, SIOCGENITER, &obj) == -1)
545 				break;
546 			if (opts & OPT_HITS)
547 				printf("%lu ", ipn->in_hits);
548 			printnat(ipn, opts & (OPT_DEBUG|OPT_VERBOSE));
549 			nsp->ns_list = ipn->in_next;
550 		}
551 	}
552 
553 	if (nat_fields == NULL) {
554 		printf("\nList of active sessions:\n");
555 
556 	} else if (nohdrfields == 0) {
557 		for (i = 0; nat_fields[i].w_value != 0; i++) {
558 			printfieldhdr(natfields, nat_fields + i);
559 			if (nat_fields[i + 1].w_value != 0)
560 				printf("\t");
561 		}
562 		printf("\n");
563 	}
564 
565 	i = IPFGENITER_IPNAT;
566 	(void) ioctl(fd,SIOCIPFDELTOK, &i);
567 
568 
569 	iter.igi_type = IPFGENITER_NAT;
570 	iter.igi_nitems = 1;
571 	iter.igi_data = &nat;
572 
573 	while (nsp->ns_instances != NULL) {
574 		if (ioctl(fd, SIOCGENITER, &obj) == -1)
575 			break;
576 		if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0))
577 			continue;
578 		if (nat_fields != NULL) {
579 			for (i = 0; nat_fields[i].w_value != 0; i++) {
580 				printnatfield(&nat, nat_fields[i].w_value);
581 				if (nat_fields[i + 1].w_value != 0)
582 					printf("\t");
583 			}
584 			printf("\n");
585 		} else {
586 			printactivenat(&nat, opts, nsp->ns_ticks);
587 			if (nat.nat_aps) {
588 				int proto;
589 
590 				if (nat.nat_dir & NAT_OUTBOUND)
591 					proto = nat.nat_pr[1];
592 				else
593 					proto = nat.nat_pr[0];
594 				printaps(nat.nat_aps, opts, proto);
595 			}
596 		}
597 		nsp->ns_instances = nat.nat_next;
598 	}
599 
600 	if (opts & OPT_VERBOSE)
601 		showhostmap_live(fd, nsp);
602 
603 	i = IPFGENITER_NAT;
604 	(void) ioctl(fd,SIOCIPFDELTOK, &i);
605 }
606 
607 
608 /*
609  * Display the active host mapping table.
610  */
611 void
612 showhostmap_dead(natstat_t *nsp)
613 {
614 	hostmap_t hm, *hmp, **maptable;
615 	u_int hv;
616 
617 	printf("\nList of active host mappings:\n");
618 
619 	maptable = (hostmap_t **)malloc(sizeof(hostmap_t *) *
620 					nsp->ns_hostmap_sz);
621 	if (kmemcpy((char *)maptable, (u_long)nsp->ns_maptable,
622 		    sizeof(hostmap_t *) * nsp->ns_hostmap_sz)) {
623 		perror("kmemcpy (maptable)");
624 		return;
625 	}
626 
627 	for (hv = 0; hv < nsp->ns_hostmap_sz; hv++) {
628 		hmp = maptable[hv];
629 
630 		while (hmp) {
631 			if (kmemcpy((char *)&hm, (u_long)hmp, sizeof(hm))) {
632 				perror("kmemcpy (hostmap)");
633 				return;
634 			}
635 
636 			printhostmap(&hm, hv);
637 			hmp = hm.hm_next;
638 		}
639 	}
640 	free(maptable);
641 }
642 
643 
644 /*
645  * Display the active host mapping table.
646  */
647 void
648 showhostmap_live(int fd, natstat_t *nsp)
649 {
650 	ipfgeniter_t iter;
651 	hostmap_t hm;
652 	ipfobj_t obj;
653 	int i;
654 
655 	bzero((char *)&obj, sizeof(obj));
656 	obj.ipfo_rev = IPFILTER_VERSION;
657 	obj.ipfo_type = IPFOBJ_GENITER;
658 	obj.ipfo_size = sizeof(iter);
659 	obj.ipfo_ptr = &iter;
660 
661 	iter.igi_type = IPFGENITER_HOSTMAP;
662 	iter.igi_nitems = 1;
663 	iter.igi_data = &hm;
664 
665 	printf("\nList of active host mappings:\n");
666 
667 	while (nsp->ns_maplist != NULL) {
668 		if (ioctl(fd, SIOCGENITER, &obj) == -1)
669 			break;
670 		printhostmap(&hm, hm.hm_hv);
671 		nsp->ns_maplist = hm.hm_next;
672 	}
673 
674 	i = IPFGENITER_HOSTMAP;
675 	(void) ioctl(fd,SIOCIPFDELTOK, &i);
676 }
677 
678 
679 int
680 nat_matcharray(nat_t *nat, int *array)
681 {
682 	int i, n, *x, rv, p;
683 	ipfexp_t *e;
684 
685 	rv = 0;
686 	n = array[0];
687 	x = array + 1;
688 
689 	for (; n > 0; x += 3 + x[3], rv = 0) {
690 		e = (ipfexp_t *)x;
691 		if (e->ipfe_cmd == IPF_EXP_END)
692 			break;
693 		n -= e->ipfe_size;
694 
695 		p = e->ipfe_cmd >> 16;
696 		if ((p != 0) && (p != nat->nat_pr[1]))
697 			break;
698 
699 		switch (e->ipfe_cmd)
700 		{
701 		case IPF_EXP_IP_PR :
702 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
703 				rv |= (nat->nat_pr[1] == e->ipfe_arg0[i]);
704 			}
705 			break;
706 
707 		case IPF_EXP_IP_SRCADDR :
708 			if (nat->nat_v[0] != 4)
709 				break;
710 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
711 				rv |= ((nat->nat_osrcaddr &
712 					e->ipfe_arg0[i * 2 + 1]) ==
713 				       e->ipfe_arg0[i * 2]) ||
714 				      ((nat->nat_nsrcaddr &
715 					e->ipfe_arg0[i * 2 + 1]) ==
716 				       e->ipfe_arg0[i * 2]);
717 			}
718 			break;
719 
720 		case IPF_EXP_IP_DSTADDR :
721 			if (nat->nat_v[0] != 4)
722 				break;
723 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
724 				rv |= ((nat->nat_odstaddr &
725 					e->ipfe_arg0[i * 2 + 1]) ==
726 				       e->ipfe_arg0[i * 2]) ||
727 				      ((nat->nat_ndstaddr &
728 					e->ipfe_arg0[i * 2 + 1]) ==
729 				       e->ipfe_arg0[i * 2]);
730 			}
731 			break;
732 
733 		case IPF_EXP_IP_ADDR :
734 			if (nat->nat_v[0] != 4)
735 				break;
736 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
737 				rv |= ((nat->nat_osrcaddr &
738 					e->ipfe_arg0[i * 2 + 1]) ==
739 				       e->ipfe_arg0[i * 2]) ||
740 				      ((nat->nat_nsrcaddr &
741 					e->ipfe_arg0[i * 2 + 1]) ==
742 				       e->ipfe_arg0[i * 2]) ||
743 				     ((nat->nat_odstaddr &
744 					e->ipfe_arg0[i * 2 + 1]) ==
745 				       e->ipfe_arg0[i * 2]) ||
746 				     ((nat->nat_ndstaddr &
747 					e->ipfe_arg0[i * 2 + 1]) ==
748 				       e->ipfe_arg0[i * 2]);
749 			}
750 			break;
751 
752 #ifdef USE_INET6
753 		case IPF_EXP_IP6_SRCADDR :
754 			if (nat->nat_v[0] != 6)
755 				break;
756 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
757 				rv |= IP6_MASKEQ(&nat->nat_osrc6,
758 						 &e->ipfe_arg0[i * 8 + 4],
759 						 &e->ipfe_arg0[i * 8]) ||
760 				      IP6_MASKEQ(&nat->nat_nsrc6,
761 						 &e->ipfe_arg0[i * 8 + 4],
762 						 &e->ipfe_arg0[i * 8]);
763 			}
764 			break;
765 
766 		case IPF_EXP_IP6_DSTADDR :
767 			if (nat->nat_v[0] != 6)
768 				break;
769 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
770 				rv |= IP6_MASKEQ(&nat->nat_odst6,
771 						 &e->ipfe_arg0[i * 8 + 4],
772 						 &e->ipfe_arg0[i * 8]) ||
773 				      IP6_MASKEQ(&nat->nat_ndst6,
774 						 &e->ipfe_arg0[i * 8 + 4],
775 						 &e->ipfe_arg0[i * 8]);
776 			}
777 			break;
778 
779 		case IPF_EXP_IP6_ADDR :
780 			if (nat->nat_v[0] != 6)
781 				break;
782 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
783 				rv |= IP6_MASKEQ(&nat->nat_osrc6,
784 						 &e->ipfe_arg0[i * 8 + 4],
785 						 &e->ipfe_arg0[i * 8]) ||
786 				      IP6_MASKEQ(&nat->nat_nsrc6,
787 						 &e->ipfe_arg0[i * 8 + 4],
788 						 &e->ipfe_arg0[i * 8]) ||
789 				      IP6_MASKEQ(&nat->nat_odst6,
790 						 &e->ipfe_arg0[i * 8 + 4],
791 						 &e->ipfe_arg0[i * 8]) ||
792 				      IP6_MASKEQ(&nat->nat_ndst6,
793 						 &e->ipfe_arg0[i * 8 + 4],
794 						 &e->ipfe_arg0[i * 8]);
795 			}
796 			break;
797 #endif
798 
799 		case IPF_EXP_UDP_PORT :
800 		case IPF_EXP_TCP_PORT :
801 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
802 				rv |= (nat->nat_osport == e->ipfe_arg0[i]) ||
803 				      (nat->nat_nsport == e->ipfe_arg0[i]) ||
804 				      (nat->nat_odport == e->ipfe_arg0[i]) ||
805 				      (nat->nat_ndport == e->ipfe_arg0[i]);
806 			}
807 			break;
808 
809 		case IPF_EXP_UDP_SPORT :
810 		case IPF_EXP_TCP_SPORT :
811 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
812 				rv |= (nat->nat_osport == e->ipfe_arg0[i]) ||
813 				      (nat->nat_nsport == e->ipfe_arg0[i]);
814 			}
815 			break;
816 
817 		case IPF_EXP_UDP_DPORT :
818 		case IPF_EXP_TCP_DPORT :
819 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
820 				rv |= (nat->nat_odport == e->ipfe_arg0[i]) ||
821 				      (nat->nat_ndport == e->ipfe_arg0[i]);
822 			}
823 			break;
824 		}
825 		rv ^= e->ipfe_not;
826 
827 		if (rv == 0)
828 			break;
829 	}
830 
831 	return (rv);
832 }
833