1 /* $FreeBSD$ */ 2 3 /* 4 * Copyright (C) 2012 by Darren Reed. 5 * 6 * See the IPFILTER.LICENCE file for details on licencing. 7 * 8 * Added redirect stuff and a variety of bug fixes. (mcn@EnGarde.com) 9 */ 10 #include <stdio.h> 11 #include <string.h> 12 #include <fcntl.h> 13 #include <errno.h> 14 #include <sys/types.h> 15 #if !defined(__SVR4) 16 #include <strings.h> 17 #else 18 #include <sys/byteorder.h> 19 #endif 20 #include <sys/time.h> 21 #include <sys/param.h> 22 #include <stdlib.h> 23 #include <unistd.h> 24 #include <stddef.h> 25 #include <sys/file.h> 26 #define _KERNEL 27 #include <sys/uio.h> 28 #undef _KERNEL 29 #include <sys/socket.h> 30 #include <sys/ioctl.h> 31 #if defined(sun) && defined(__SVR4) 32 # include <sys/ioccom.h> 33 # include <sys/sysmacros.h> 34 #endif 35 #include <netinet/in.h> 36 #include <netinet/in_systm.h> 37 #include <netinet/ip.h> 38 #include <netinet/tcp.h> 39 #include <net/if.h> 40 #include <netdb.h> 41 #include <arpa/nameser.h> 42 #include <arpa/inet.h> 43 #include <resolv.h> 44 #include <ctype.h> 45 # include <nlist.h> 46 #include "ipf.h" 47 #include "netinet/ipl.h" 48 #include "kmem.h" 49 50 51 # define STRERROR(x) strerror(x) 52 53 #if !defined(lint) 54 static const char sccsid[] ="@(#)ipnat.c 1.9 6/5/96 (C) 1993 Darren Reed"; 55 static const char rcsid[] = "@(#)$Id$"; 56 #endif 57 58 59 #if SOLARIS 60 #define bzero(a,b) memset(a,0,b) 61 #endif 62 int use_inet6 = 0; 63 64 extern char *optarg; 65 66 void dostats(int, natstat_t *, int, int, int *); 67 void dotable(natstat_t *, int, int, int, char *); 68 void flushtable(int, int, int *); 69 void usage(char *); 70 int main(int, char*[]); 71 void showhostmap(natstat_t *nsp); 72 void natstat_dead(natstat_t *, char *); 73 void dostats_live(int, natstat_t *, int, int *); 74 void showhostmap_dead(natstat_t *); 75 void showhostmap_live(int, natstat_t *); 76 void dostats_dead(natstat_t *, int, int *); 77 int nat_matcharray(nat_t *, int *); 78 79 int opts; 80 int nohdrfields = 0; 81 wordtab_t *nat_fields = NULL; 82 83 void usage(name) 84 char *name; 85 { 86 fprintf(stderr, "Usage: %s [-CFhlnrRsv] [-f filename]\n", name); 87 exit(1); 88 } 89 90 91 int main(argc, argv) 92 int argc; 93 char *argv[]; 94 { 95 int fd, c, mode, *natfilter; 96 char *file, *core, *kernel; 97 natstat_t ns, *nsp; 98 ipfobj_t obj; 99 100 fd = -1; 101 opts = 0; 102 nsp = &ns; 103 file = NULL; 104 core = NULL; 105 kernel = NULL; 106 mode = O_RDWR; 107 natfilter = NULL; 108 109 assigndefined(getenv("IPNAT_PREDEFINED")); 110 111 while ((c = getopt(argc, argv, "CdFf:hlm:M:N:nO:prRsv")) != -1) 112 switch (c) 113 { 114 case 'C' : 115 opts |= OPT_CLEAR; 116 break; 117 case 'd' : 118 opts |= OPT_DEBUG; 119 break; 120 case 'f' : 121 file = optarg; 122 break; 123 case 'F' : 124 opts |= OPT_FLUSH; 125 break; 126 case 'h' : 127 opts |=OPT_HITS; 128 break; 129 case 'l' : 130 opts |= OPT_LIST; 131 mode = O_RDONLY; 132 break; 133 case 'm' : 134 natfilter = parseipfexpr(optarg, NULL); 135 break; 136 case 'M' : 137 core = optarg; 138 break; 139 case 'N' : 140 kernel = optarg; 141 break; 142 case 'n' : 143 opts |= OPT_DONOTHING|OPT_DONTOPEN; 144 mode = O_RDONLY; 145 break; 146 case 'O' : 147 nat_fields = parsefields(natfields, optarg); 148 break; 149 case 'p' : 150 opts |= OPT_PURGE; 151 break; 152 case 'R' : 153 opts |= OPT_NORESOLVE; 154 break; 155 case 'r' : 156 opts |= OPT_REMOVE; 157 break; 158 case 's' : 159 opts |= OPT_STAT; 160 mode = O_RDONLY; 161 break; 162 case 'v' : 163 opts |= OPT_VERBOSE; 164 break; 165 default : 166 usage(argv[0]); 167 } 168 169 if (((opts & OPT_PURGE) != 0) && ((opts & OPT_REMOVE) == 0)) { 170 (void) fprintf(stderr, "%s: -p must be used with -r\n", 171 argv[0]); 172 exit(1); 173 } 174 175 initparse(); 176 177 if ((kernel != NULL) || (core != NULL)) { 178 (void) setgid(getgid()); 179 (void) setuid(getuid()); 180 } 181 182 if (!(opts & OPT_DONOTHING)) { 183 if (((fd = open(IPNAT_NAME, mode)) == -1) && 184 ((fd = open(IPNAT_NAME, O_RDONLY)) == -1)) { 185 (void) fprintf(stderr, "%s: open: %s\n", IPNAT_NAME, 186 STRERROR(errno)); 187 exit(1); 188 } 189 } 190 191 bzero((char *)&ns, sizeof(ns)); 192 193 if ((opts & OPT_DONOTHING) == 0) { 194 if (checkrev(IPL_NAME) == -1) { 195 fprintf(stderr, "User/kernel version check failed\n"); 196 exit(1); 197 } 198 } 199 200 if (!(opts & OPT_DONOTHING) && (kernel == NULL) && (core == NULL)) { 201 bzero((char *)&obj, sizeof(obj)); 202 obj.ipfo_rev = IPFILTER_VERSION; 203 obj.ipfo_type = IPFOBJ_NATSTAT; 204 obj.ipfo_size = sizeof(*nsp); 205 obj.ipfo_ptr = (void *)nsp; 206 if (ioctl(fd, SIOCGNATS, &obj) == -1) { 207 ipferror(fd, "ioctl(SIOCGNATS)"); 208 exit(1); 209 } 210 (void) setgid(getgid()); 211 (void) setuid(getuid()); 212 } else if ((kernel != NULL) || (core != NULL)) { 213 if (openkmem(kernel, core) == -1) 214 exit(1); 215 216 natstat_dead(nsp, kernel); 217 if (opts & (OPT_LIST|OPT_STAT)) 218 dostats(fd, nsp, opts, 0, natfilter); 219 exit(0); 220 } 221 222 if (opts & (OPT_FLUSH|OPT_CLEAR)) 223 flushtable(fd, opts, natfilter); 224 if (file) { 225 return ipnat_parsefile(fd, ipnat_addrule, ioctl, file); 226 } 227 if (opts & (OPT_LIST|OPT_STAT)) 228 dostats(fd, nsp, opts, 1, natfilter); 229 return 0; 230 } 231 232 233 /* 234 * Read NAT statistic information in using a symbol table and memory file 235 * rather than doing ioctl's. 236 */ 237 void natstat_dead(nsp, kernel) 238 natstat_t *nsp; 239 char *kernel; 240 { 241 struct nlist nat_nlist[10] = { 242 { "nat_table" }, /* 0 */ 243 { "nat_list" }, 244 { "maptable" }, 245 { "ipf_nattable_sz" }, 246 { "ipf_natrules_sz" }, 247 { "ipf_rdrrules_sz" }, /* 5 */ 248 { "ipf_hostmap_sz" }, 249 { "nat_instances" }, 250 { NULL } 251 }; 252 void *tables[2]; 253 254 if (nlist(kernel, nat_nlist) == -1) { 255 fprintf(stderr, "nlist error\n"); 256 return; 257 } 258 259 /* 260 * Normally the ioctl copies all of these values into the structure 261 * for us, before returning it to userland, so here we must copy each 262 * one in individually. 263 */ 264 kmemcpy((char *)&tables, nat_nlist[0].n_value, sizeof(tables)); 265 nsp->ns_side[0].ns_table = tables[0]; 266 nsp->ns_side[1].ns_table = tables[1]; 267 268 kmemcpy((char *)&nsp->ns_list, nat_nlist[1].n_value, 269 sizeof(nsp->ns_list)); 270 kmemcpy((char *)&nsp->ns_maptable, nat_nlist[2].n_value, 271 sizeof(nsp->ns_maptable)); 272 kmemcpy((char *)&nsp->ns_nattab_sz, nat_nlist[3].n_value, 273 sizeof(nsp->ns_nattab_sz)); 274 kmemcpy((char *)&nsp->ns_rultab_sz, nat_nlist[4].n_value, 275 sizeof(nsp->ns_rultab_sz)); 276 kmemcpy((char *)&nsp->ns_rdrtab_sz, nat_nlist[5].n_value, 277 sizeof(nsp->ns_rdrtab_sz)); 278 kmemcpy((char *)&nsp->ns_hostmap_sz, nat_nlist[6].n_value, 279 sizeof(nsp->ns_hostmap_sz)); 280 kmemcpy((char *)&nsp->ns_instances, nat_nlist[7].n_value, 281 sizeof(nsp->ns_instances)); 282 } 283 284 285 /* 286 * Issue an ioctl to flush either the NAT rules table or the active mapping 287 * table or both. 288 */ 289 void flushtable(fd, opts, match) 290 int fd, opts, *match; 291 { 292 int n = 0; 293 294 if (opts & OPT_FLUSH) { 295 n = 0; 296 if (!(opts & OPT_DONOTHING)) { 297 if (match != NULL) { 298 ipfobj_t obj; 299 300 obj.ipfo_rev = IPFILTER_VERSION; 301 obj.ipfo_size = match[0] * sizeof(int); 302 obj.ipfo_type = IPFOBJ_IPFEXPR; 303 obj.ipfo_ptr = match; 304 if (ioctl(fd, SIOCMATCHFLUSH, &obj) == -1) { 305 ipferror(fd, "ioctl(SIOCMATCHFLUSH)"); 306 n = -1; 307 } else { 308 n = obj.ipfo_retval; 309 } 310 } else if (ioctl(fd, SIOCIPFFL, &n) == -1) { 311 ipferror(fd, "ioctl(SIOCIPFFL)"); 312 n = -1; 313 } 314 } 315 if (n >= 0) 316 printf("%d entries flushed from NAT table\n", n); 317 } 318 319 if (opts & OPT_CLEAR) { 320 n = 1; 321 if (!(opts & OPT_DONOTHING) && ioctl(fd, SIOCIPFFL, &n) == -1) 322 ipferror(fd, "ioctl(SIOCCNATL)"); 323 else 324 printf("%d entries flushed from NAT list\n", n); 325 } 326 } 327 328 329 /* 330 * Display NAT statistics. 331 */ 332 void dostats_dead(nsp, opts, filter) 333 natstat_t *nsp; 334 int opts, *filter; 335 { 336 nat_t *np, nat; 337 ipnat_t ipn; 338 int i; 339 340 if (nat_fields == NULL) { 341 printf("List of active MAP/Redirect filters:\n"); 342 while (nsp->ns_list) { 343 if (kmemcpy((char *)&ipn, (long)nsp->ns_list, 344 sizeof(ipn))) { 345 perror("kmemcpy"); 346 break; 347 } 348 if (opts & OPT_HITS) 349 printf("%lu ", ipn.in_hits); 350 printnat(&ipn, opts & (OPT_DEBUG|OPT_VERBOSE)); 351 nsp->ns_list = ipn.in_next; 352 } 353 } 354 355 if (nat_fields == NULL) { 356 printf("\nList of active sessions:\n"); 357 358 } else if (nohdrfields == 0) { 359 for (i = 0; nat_fields[i].w_value != 0; i++) { 360 printfieldhdr(natfields, nat_fields + i); 361 if (nat_fields[i + 1].w_value != 0) 362 printf("\t"); 363 } 364 printf("\n"); 365 } 366 367 for (np = nsp->ns_instances; np; np = nat.nat_next) { 368 if (kmemcpy((char *)&nat, (long)np, sizeof(nat))) 369 break; 370 if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0)) 371 continue; 372 if (nat_fields != NULL) { 373 for (i = 0; nat_fields[i].w_value != 0; i++) { 374 printnatfield(&nat, nat_fields[i].w_value); 375 if (nat_fields[i + 1].w_value != 0) 376 printf("\t"); 377 } 378 printf("\n"); 379 } else { 380 printactivenat(&nat, opts, nsp->ns_ticks); 381 if (nat.nat_aps) { 382 int proto; 383 384 if (nat.nat_dir & NAT_OUTBOUND) 385 proto = nat.nat_pr[1]; 386 else 387 proto = nat.nat_pr[0]; 388 printaps(nat.nat_aps, opts, proto); 389 } 390 } 391 } 392 393 if (opts & OPT_VERBOSE) 394 showhostmap_dead(nsp); 395 } 396 397 398 void dotable(nsp, fd, alive, which, side) 399 natstat_t *nsp; 400 int fd, alive, which; 401 char *side; 402 { 403 int sz, i, used, maxlen, minlen, totallen; 404 ipftable_t table; 405 u_int *buckets; 406 ipfobj_t obj; 407 408 sz = sizeof(*buckets) * nsp->ns_nattab_sz; 409 buckets = (u_int *)malloc(sz); 410 if (buckets == NULL) { 411 fprintf(stderr, 412 "cannot allocate memory (%d) for buckets\n", sz); 413 return; 414 } 415 416 obj.ipfo_rev = IPFILTER_VERSION; 417 obj.ipfo_type = IPFOBJ_GTABLE; 418 obj.ipfo_size = sizeof(table); 419 obj.ipfo_ptr = &table; 420 421 if (which == 0) { 422 table.ita_type = IPFTABLE_BUCKETS_NATIN; 423 } else if (which == 1) { 424 table.ita_type = IPFTABLE_BUCKETS_NATOUT; 425 } 426 table.ita_table = buckets; 427 428 if (alive) { 429 if (ioctl(fd, SIOCGTABL, &obj) != 0) { 430 ipferror(fd, "SIOCFTABL"); 431 free(buckets); 432 return; 433 } 434 } else { 435 if (kmemcpy((char *)buckets, (u_long)nsp->ns_nattab_sz, sz)) { 436 free(buckets); 437 return; 438 } 439 } 440 441 minlen = nsp->ns_side[which].ns_inuse; 442 totallen = 0; 443 maxlen = 0; 444 used = 0; 445 446 for (i = 0; i < nsp->ns_nattab_sz; i++) { 447 if (buckets[i] > maxlen) 448 maxlen = buckets[i]; 449 if (buckets[i] < minlen) 450 minlen = buckets[i]; 451 if (buckets[i] != 0) 452 used++; 453 totallen += buckets[i]; 454 } 455 456 printf("%d%%\thash efficiency %s\n", 457 totallen ? used * 100 / totallen : 0, side); 458 printf("%2.2f%%\tbucket usage %s\n", 459 ((float)used / nsp->ns_nattab_sz) * 100.0, side); 460 printf("%d\tminimal length %s\n", minlen, side); 461 printf("%d\tmaximal length %s\n", maxlen, side); 462 printf("%.3f\taverage length %s\n", 463 used ? ((float)totallen / used) : 0.0, side); 464 465 free(buckets); 466 } 467 468 469 void dostats(fd, nsp, opts, alive, filter) 470 natstat_t *nsp; 471 int fd, opts, alive, *filter; 472 { 473 /* 474 * Show statistics ? 475 */ 476 if (opts & OPT_STAT) { 477 printnatside("in", &nsp->ns_side[0]); 478 dotable(nsp, fd, alive, 0, "in"); 479 480 printnatside("out", &nsp->ns_side[1]); 481 dotable(nsp, fd, alive, 1, "out"); 482 483 printf("%lu\tlog successes\n", nsp->ns_side[0].ns_log); 484 printf("%lu\tlog failures\n", nsp->ns_side[1].ns_log); 485 printf("%lu\tadded in\n%lu\tadded out\n", 486 nsp->ns_side[0].ns_added, 487 nsp->ns_side[1].ns_added); 488 printf("%u\tactive\n", nsp->ns_active); 489 printf("%lu\ttransparent adds\n", nsp->ns_addtrpnt); 490 printf("%lu\tdivert build\n", nsp->ns_divert_build); 491 printf("%lu\texpired\n", nsp->ns_expire); 492 printf("%lu\tflush all\n", nsp->ns_flush_all); 493 printf("%lu\tflush closing\n", nsp->ns_flush_closing); 494 printf("%lu\tflush queue\n", nsp->ns_flush_queue); 495 printf("%lu\tflush state\n", nsp->ns_flush_state); 496 printf("%lu\tflush timeout\n", nsp->ns_flush_timeout); 497 printf("%lu\thostmap new\n", nsp->ns_hm_new); 498 printf("%lu\thostmap fails\n", nsp->ns_hm_newfail); 499 printf("%lu\thostmap add\n", nsp->ns_hm_addref); 500 printf("%lu\thostmap NULL rule\n", nsp->ns_hm_nullnp); 501 printf("%lu\tlog ok\n", nsp->ns_log_ok); 502 printf("%lu\tlog fail\n", nsp->ns_log_fail); 503 printf("%u\torphan count\n", nsp->ns_orphans); 504 printf("%u\trule count\n", nsp->ns_rules); 505 printf("%u\tmap rules\n", nsp->ns_rules_map); 506 printf("%u\trdr rules\n", nsp->ns_rules_rdr); 507 printf("%u\twilds\n", nsp->ns_wilds); 508 if (opts & OPT_VERBOSE) 509 printf("list %p\n", nsp->ns_list); 510 } 511 512 if (opts & OPT_LIST) { 513 if (alive) 514 dostats_live(fd, nsp, opts, filter); 515 else 516 dostats_dead(nsp, opts, filter); 517 } 518 } 519 520 521 /* 522 * Display NAT statistics. 523 */ 524 void dostats_live(fd, nsp, opts, filter) 525 natstat_t *nsp; 526 int fd, opts, *filter; 527 { 528 ipfgeniter_t iter; 529 char buffer[2000]; 530 ipfobj_t obj; 531 ipnat_t *ipn; 532 nat_t nat; 533 int i; 534 535 bzero((char *)&obj, sizeof(obj)); 536 obj.ipfo_rev = IPFILTER_VERSION; 537 obj.ipfo_type = IPFOBJ_GENITER; 538 obj.ipfo_size = sizeof(iter); 539 obj.ipfo_ptr = &iter; 540 541 iter.igi_type = IPFGENITER_IPNAT; 542 iter.igi_nitems = 1; 543 iter.igi_data = buffer; 544 ipn = (ipnat_t *)buffer; 545 546 /* 547 * Show list of NAT rules and NAT sessions ? 548 */ 549 if (nat_fields == NULL) { 550 printf("List of active MAP/Redirect filters:\n"); 551 while (nsp->ns_list) { 552 if (ioctl(fd, SIOCGENITER, &obj) == -1) 553 break; 554 if (opts & OPT_HITS) 555 printf("%lu ", ipn->in_hits); 556 printnat(ipn, opts & (OPT_DEBUG|OPT_VERBOSE)); 557 nsp->ns_list = ipn->in_next; 558 } 559 } 560 561 if (nat_fields == NULL) { 562 printf("\nList of active sessions:\n"); 563 564 } else if (nohdrfields == 0) { 565 for (i = 0; nat_fields[i].w_value != 0; i++) { 566 printfieldhdr(natfields, nat_fields + i); 567 if (nat_fields[i + 1].w_value != 0) 568 printf("\t"); 569 } 570 printf("\n"); 571 } 572 573 i = IPFGENITER_IPNAT; 574 (void) ioctl(fd,SIOCIPFDELTOK, &i); 575 576 577 iter.igi_type = IPFGENITER_NAT; 578 iter.igi_nitems = 1; 579 iter.igi_data = &nat; 580 581 while (nsp->ns_instances != NULL) { 582 if (ioctl(fd, SIOCGENITER, &obj) == -1) 583 break; 584 if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0)) 585 continue; 586 if (nat_fields != NULL) { 587 for (i = 0; nat_fields[i].w_value != 0; i++) { 588 printnatfield(&nat, nat_fields[i].w_value); 589 if (nat_fields[i + 1].w_value != 0) 590 printf("\t"); 591 } 592 printf("\n"); 593 } else { 594 printactivenat(&nat, opts, nsp->ns_ticks); 595 if (nat.nat_aps) { 596 int proto; 597 598 if (nat.nat_dir & NAT_OUTBOUND) 599 proto = nat.nat_pr[1]; 600 else 601 proto = nat.nat_pr[0]; 602 printaps(nat.nat_aps, opts, proto); 603 } 604 } 605 nsp->ns_instances = nat.nat_next; 606 } 607 608 if (opts & OPT_VERBOSE) 609 showhostmap_live(fd, nsp); 610 611 i = IPFGENITER_NAT; 612 (void) ioctl(fd,SIOCIPFDELTOK, &i); 613 } 614 615 616 /* 617 * Display the active host mapping table. 618 */ 619 void showhostmap_dead(nsp) 620 natstat_t *nsp; 621 { 622 hostmap_t hm, *hmp, **maptable; 623 u_int hv; 624 625 printf("\nList of active host mappings:\n"); 626 627 maptable = (hostmap_t **)malloc(sizeof(hostmap_t *) * 628 nsp->ns_hostmap_sz); 629 if (kmemcpy((char *)maptable, (u_long)nsp->ns_maptable, 630 sizeof(hostmap_t *) * nsp->ns_hostmap_sz)) { 631 perror("kmemcpy (maptable)"); 632 return; 633 } 634 635 for (hv = 0; hv < nsp->ns_hostmap_sz; hv++) { 636 hmp = maptable[hv]; 637 638 while (hmp) { 639 if (kmemcpy((char *)&hm, (u_long)hmp, sizeof(hm))) { 640 perror("kmemcpy (hostmap)"); 641 return; 642 } 643 644 printhostmap(&hm, hv); 645 hmp = hm.hm_next; 646 } 647 } 648 free(maptable); 649 } 650 651 652 /* 653 * Display the active host mapping table. 654 */ 655 void showhostmap_live(fd, nsp) 656 int fd; 657 natstat_t *nsp; 658 { 659 ipfgeniter_t iter; 660 hostmap_t hm; 661 ipfobj_t obj; 662 int i; 663 664 bzero((char *)&obj, sizeof(obj)); 665 obj.ipfo_rev = IPFILTER_VERSION; 666 obj.ipfo_type = IPFOBJ_GENITER; 667 obj.ipfo_size = sizeof(iter); 668 obj.ipfo_ptr = &iter; 669 670 iter.igi_type = IPFGENITER_HOSTMAP; 671 iter.igi_nitems = 1; 672 iter.igi_data = &hm; 673 674 printf("\nList of active host mappings:\n"); 675 676 while (nsp->ns_maplist != NULL) { 677 if (ioctl(fd, SIOCGENITER, &obj) == -1) 678 break; 679 printhostmap(&hm, hm.hm_hv); 680 nsp->ns_maplist = hm.hm_next; 681 } 682 683 i = IPFGENITER_HOSTMAP; 684 (void) ioctl(fd,SIOCIPFDELTOK, &i); 685 } 686 687 688 int nat_matcharray(nat, array) 689 nat_t *nat; 690 int *array; 691 { 692 int i, n, *x, rv, p; 693 ipfexp_t *e; 694 695 rv = 0; 696 n = array[0]; 697 x = array + 1; 698 699 for (; n > 0; x += 3 + x[3], rv = 0) { 700 e = (ipfexp_t *)x; 701 if (e->ipfe_cmd == IPF_EXP_END) 702 break; 703 n -= e->ipfe_size; 704 705 p = e->ipfe_cmd >> 16; 706 if ((p != 0) && (p != nat->nat_pr[1])) 707 break; 708 709 switch (e->ipfe_cmd) 710 { 711 case IPF_EXP_IP_PR : 712 for (i = 0; !rv && i < e->ipfe_narg; i++) { 713 rv |= (nat->nat_pr[1] == e->ipfe_arg0[i]); 714 } 715 break; 716 717 case IPF_EXP_IP_SRCADDR : 718 if (nat->nat_v[0] != 4) 719 break; 720 for (i = 0; !rv && i < e->ipfe_narg; i++) { 721 rv |= ((nat->nat_osrcaddr & 722 e->ipfe_arg0[i * 2 + 1]) == 723 e->ipfe_arg0[i * 2]) || 724 ((nat->nat_nsrcaddr & 725 e->ipfe_arg0[i * 2 + 1]) == 726 e->ipfe_arg0[i * 2]); 727 } 728 break; 729 730 case IPF_EXP_IP_DSTADDR : 731 if (nat->nat_v[0] != 4) 732 break; 733 for (i = 0; !rv && i < e->ipfe_narg; i++) { 734 rv |= ((nat->nat_odstaddr & 735 e->ipfe_arg0[i * 2 + 1]) == 736 e->ipfe_arg0[i * 2]) || 737 ((nat->nat_ndstaddr & 738 e->ipfe_arg0[i * 2 + 1]) == 739 e->ipfe_arg0[i * 2]); 740 } 741 break; 742 743 case IPF_EXP_IP_ADDR : 744 if (nat->nat_v[0] != 4) 745 break; 746 for (i = 0; !rv && i < e->ipfe_narg; i++) { 747 rv |= ((nat->nat_osrcaddr & 748 e->ipfe_arg0[i * 2 + 1]) == 749 e->ipfe_arg0[i * 2]) || 750 ((nat->nat_nsrcaddr & 751 e->ipfe_arg0[i * 2 + 1]) == 752 e->ipfe_arg0[i * 2]) || 753 ((nat->nat_odstaddr & 754 e->ipfe_arg0[i * 2 + 1]) == 755 e->ipfe_arg0[i * 2]) || 756 ((nat->nat_ndstaddr & 757 e->ipfe_arg0[i * 2 + 1]) == 758 e->ipfe_arg0[i * 2]); 759 } 760 break; 761 762 #ifdef USE_INET6 763 case IPF_EXP_IP6_SRCADDR : 764 if (nat->nat_v[0] != 6) 765 break; 766 for (i = 0; !rv && i < e->ipfe_narg; i++) { 767 rv |= IP6_MASKEQ(&nat->nat_osrc6, 768 &e->ipfe_arg0[i * 8 + 4], 769 &e->ipfe_arg0[i * 8]) || 770 IP6_MASKEQ(&nat->nat_nsrc6, 771 &e->ipfe_arg0[i * 8 + 4], 772 &e->ipfe_arg0[i * 8]); 773 } 774 break; 775 776 case IPF_EXP_IP6_DSTADDR : 777 if (nat->nat_v[0] != 6) 778 break; 779 for (i = 0; !rv && i < e->ipfe_narg; i++) { 780 rv |= IP6_MASKEQ(&nat->nat_odst6, 781 &e->ipfe_arg0[i * 8 + 4], 782 &e->ipfe_arg0[i * 8]) || 783 IP6_MASKEQ(&nat->nat_ndst6, 784 &e->ipfe_arg0[i * 8 + 4], 785 &e->ipfe_arg0[i * 8]); 786 } 787 break; 788 789 case IPF_EXP_IP6_ADDR : 790 if (nat->nat_v[0] != 6) 791 break; 792 for (i = 0; !rv && i < e->ipfe_narg; i++) { 793 rv |= IP6_MASKEQ(&nat->nat_osrc6, 794 &e->ipfe_arg0[i * 8 + 4], 795 &e->ipfe_arg0[i * 8]) || 796 IP6_MASKEQ(&nat->nat_nsrc6, 797 &e->ipfe_arg0[i * 8 + 4], 798 &e->ipfe_arg0[i * 8]) || 799 IP6_MASKEQ(&nat->nat_odst6, 800 &e->ipfe_arg0[i * 8 + 4], 801 &e->ipfe_arg0[i * 8]) || 802 IP6_MASKEQ(&nat->nat_ndst6, 803 &e->ipfe_arg0[i * 8 + 4], 804 &e->ipfe_arg0[i * 8]); 805 } 806 break; 807 #endif 808 809 case IPF_EXP_UDP_PORT : 810 case IPF_EXP_TCP_PORT : 811 for (i = 0; !rv && i < e->ipfe_narg; i++) { 812 rv |= (nat->nat_osport == e->ipfe_arg0[i]) || 813 (nat->nat_nsport == e->ipfe_arg0[i]) || 814 (nat->nat_odport == e->ipfe_arg0[i]) || 815 (nat->nat_ndport == e->ipfe_arg0[i]); 816 } 817 break; 818 819 case IPF_EXP_UDP_SPORT : 820 case IPF_EXP_TCP_SPORT : 821 for (i = 0; !rv && i < e->ipfe_narg; i++) { 822 rv |= (nat->nat_osport == e->ipfe_arg0[i]) || 823 (nat->nat_nsport == e->ipfe_arg0[i]); 824 } 825 break; 826 827 case IPF_EXP_UDP_DPORT : 828 case IPF_EXP_TCP_DPORT : 829 for (i = 0; !rv && i < e->ipfe_narg; i++) { 830 rv |= (nat->nat_odport == e->ipfe_arg0[i]) || 831 (nat->nat_ndport == e->ipfe_arg0[i]); 832 } 833 break; 834 } 835 rv ^= e->ipfe_not; 836 837 if (rv == 0) 838 break; 839 } 840 841 return rv; 842 } 843