xref: /freebsd/sbin/ipf/ipnat/ipnat.c (revision ec0ea6efa1ad229d75c394c1a9b9cac33af2b1d3)
1 /*	$FreeBSD$	*/
2 
3 /*
4  * Copyright (C) 2012 by Darren Reed.
5  *
6  * See the IPFILTER.LICENCE file for details on licencing.
7  *
8  * Added redirect stuff and a variety of bug fixes. (mcn@EnGarde.com)
9  */
10 #include <stdio.h>
11 #include <string.h>
12 #include <fcntl.h>
13 #include <errno.h>
14 #include <sys/types.h>
15 #if !defined(__SVR4)
16 #include <strings.h>
17 #else
18 #include <sys/byteorder.h>
19 #endif
20 #include <sys/time.h>
21 #include <sys/param.h>
22 #include <stdlib.h>
23 #include <unistd.h>
24 #include <stddef.h>
25 #include <sys/file.h>
26 #define _KERNEL
27 #include <sys/uio.h>
28 #undef _KERNEL
29 #include <sys/socket.h>
30 #include <sys/ioctl.h>
31 #if defined(sun) && defined(__SVR4)
32 # include <sys/ioccom.h>
33 # include <sys/sysmacros.h>
34 #endif
35 #include <netinet/in.h>
36 #include <netinet/in_systm.h>
37 #include <netinet/ip.h>
38 #include <netinet/tcp.h>
39 #include <net/if.h>
40 #include <netdb.h>
41 #include <arpa/nameser.h>
42 #include <arpa/inet.h>
43 #include <resolv.h>
44 #include <ctype.h>
45 # include <nlist.h>
46 #include "ipf.h"
47 #include "netinet/ipl.h"
48 #include "kmem.h"
49 
50 
51 # define	STRERROR(x)	strerror(x)
52 
53 #if !defined(lint)
54 static const char sccsid[] ="@(#)ipnat.c	1.9 6/5/96 (C) 1993 Darren Reed";
55 static const char rcsid[] = "@(#)$Id$";
56 #endif
57 
58 
59 #if	SOLARIS
60 #define	bzero(a,b)	memset(a,0,b)
61 #endif
62 int	use_inet6 = 0;
63 
64 extern	char	*optarg;
65 
66 void	dostats(int, natstat_t *, int, int, int *);
67 void	dotable(natstat_t *, int, int, int, char *);
68 void	flushtable(int, int, int *);
69 void	usage(char *);
70 int	main(int, char*[]);
71 void	showhostmap(natstat_t *nsp);
72 void	natstat_dead(natstat_t *, char *);
73 void	dostats_live(int, natstat_t *, int, int *);
74 void	showhostmap_dead(natstat_t *);
75 void	showhostmap_live(int, natstat_t *);
76 void	dostats_dead(natstat_t *, int, int *);
77 int	nat_matcharray(nat_t *, int *);
78 
79 int		opts;
80 int		nohdrfields = 0;
81 wordtab_t	*nat_fields = NULL;
82 
83 void usage(name)
84 	char *name;
85 {
86 	fprintf(stderr, "Usage: %s [-CFhlnrRsv] [-f filename]\n", name);
87 	exit(1);
88 }
89 
90 
91 int main(argc, argv)
92 	int argc;
93 	char *argv[];
94 {
95 	int fd, c, mode, *natfilter;
96 	char *file, *core, *kernel;
97 	natstat_t ns, *nsp;
98 	ipfobj_t obj;
99 
100 	fd = -1;
101 	opts = 0;
102 	nsp = &ns;
103 	file = NULL;
104 	core = NULL;
105 	kernel = NULL;
106 	mode = O_RDWR;
107 	natfilter = NULL;
108 
109 	assigndefined(getenv("IPNAT_PREDEFINED"));
110 
111 	while ((c = getopt(argc, argv, "CdFf:hlm:M:N:nO:prRsv")) != -1)
112 		switch (c)
113 		{
114 		case 'C' :
115 			opts |= OPT_CLEAR;
116 			break;
117 		case 'd' :
118 			opts |= OPT_DEBUG;
119 			break;
120 		case 'f' :
121 			file = optarg;
122 			break;
123 		case 'F' :
124 			opts |= OPT_FLUSH;
125 			break;
126 		case 'h' :
127 			opts |=OPT_HITS;
128 			break;
129 		case 'l' :
130 			opts |= OPT_LIST;
131 			mode = O_RDONLY;
132 			break;
133 		case 'm' :
134 			natfilter = parseipfexpr(optarg, NULL);
135 			break;
136 		case 'M' :
137 			core = optarg;
138 			break;
139 		case 'N' :
140 			kernel = optarg;
141 			break;
142 		case 'n' :
143 			opts |= OPT_DONOTHING|OPT_DONTOPEN;
144 			mode = O_RDONLY;
145 			break;
146 		case 'O' :
147 			nat_fields = parsefields(natfields, optarg);
148 			break;
149 		case 'p' :
150 			opts |= OPT_PURGE;
151 			break;
152 		case 'R' :
153 			opts |= OPT_NORESOLVE;
154 			break;
155 		case 'r' :
156 			opts |= OPT_REMOVE;
157 			break;
158 		case 's' :
159 			opts |= OPT_STAT;
160 			mode = O_RDONLY;
161 			break;
162 		case 'v' :
163 			opts |= OPT_VERBOSE;
164 			break;
165 		default :
166 			usage(argv[0]);
167 		}
168 
169 	if (((opts & OPT_PURGE) != 0) && ((opts & OPT_REMOVE) == 0)) {
170 		(void) fprintf(stderr, "%s: -p must be used with -r\n",
171 			       argv[0]);
172 		exit(1);
173 	}
174 
175 	initparse();
176 
177 	if ((kernel != NULL) || (core != NULL)) {
178 		(void) setgid(getgid());
179 		(void) setuid(getuid());
180 	}
181 
182 	if (!(opts & OPT_DONOTHING)) {
183 		if (((fd = open(IPNAT_NAME, mode)) == -1) &&
184 		    ((fd = open(IPNAT_NAME, O_RDONLY)) == -1)) {
185 			(void) fprintf(stderr, "%s: open: %s\n", IPNAT_NAME,
186 				STRERROR(errno));
187 			exit(1);
188 		}
189 	}
190 
191 	bzero((char *)&ns, sizeof(ns));
192 
193 	if ((opts & OPT_DONOTHING) == 0) {
194 		if (checkrev(IPL_NAME) == -1) {
195 			fprintf(stderr, "User/kernel version check failed\n");
196 			exit(1);
197 		}
198 	}
199 
200 	if (!(opts & OPT_DONOTHING) && (kernel == NULL) && (core == NULL)) {
201 		bzero((char *)&obj, sizeof(obj));
202 		obj.ipfo_rev = IPFILTER_VERSION;
203 		obj.ipfo_type = IPFOBJ_NATSTAT;
204 		obj.ipfo_size = sizeof(*nsp);
205 		obj.ipfo_ptr = (void *)nsp;
206 		if (ioctl(fd, SIOCGNATS, &obj) == -1) {
207 			ipferror(fd, "ioctl(SIOCGNATS)");
208 			exit(1);
209 		}
210 		(void) setgid(getgid());
211 		(void) setuid(getuid());
212 	} else if ((kernel != NULL) || (core != NULL)) {
213 		if (openkmem(kernel, core) == -1)
214 			exit(1);
215 
216 		natstat_dead(nsp, kernel);
217 		if (opts & (OPT_LIST|OPT_STAT))
218 			dostats(fd, nsp, opts, 0, natfilter);
219 		exit(0);
220 	}
221 
222 	if (opts & (OPT_FLUSH|OPT_CLEAR))
223 		flushtable(fd, opts, natfilter);
224 	if (file) {
225 		return ipnat_parsefile(fd, ipnat_addrule, ioctl, file);
226 	}
227 	if (opts & (OPT_LIST|OPT_STAT))
228 		dostats(fd, nsp, opts, 1, natfilter);
229 	return 0;
230 }
231 
232 
233 /*
234  * Read NAT statistic information in using a symbol table and memory file
235  * rather than doing ioctl's.
236  */
237 void natstat_dead(nsp, kernel)
238 	natstat_t *nsp;
239 	char *kernel;
240 {
241 	struct nlist nat_nlist[10] = {
242 		{ "nat_table" },		/* 0 */
243 		{ "nat_list" },
244 		{ "maptable" },
245 		{ "ipf_nattable_sz" },
246 		{ "ipf_natrules_sz" },
247 		{ "ipf_rdrrules_sz" },		/* 5 */
248 		{ "ipf_hostmap_sz" },
249 		{ "nat_instances" },
250 		{ NULL }
251 	};
252 	void *tables[2];
253 
254 	if (nlist(kernel, nat_nlist) == -1) {
255 		fprintf(stderr, "nlist error\n");
256 		return;
257 	}
258 
259 	/*
260 	 * Normally the ioctl copies all of these values into the structure
261 	 * for us, before returning it to userland, so here we must copy each
262 	 * one in individually.
263 	 */
264 	kmemcpy((char *)&tables, nat_nlist[0].n_value, sizeof(tables));
265 	nsp->ns_side[0].ns_table = tables[0];
266 	nsp->ns_side[1].ns_table = tables[1];
267 
268 	kmemcpy((char *)&nsp->ns_list, nat_nlist[1].n_value,
269 		sizeof(nsp->ns_list));
270 	kmemcpy((char *)&nsp->ns_maptable, nat_nlist[2].n_value,
271 		sizeof(nsp->ns_maptable));
272 	kmemcpy((char *)&nsp->ns_nattab_sz, nat_nlist[3].n_value,
273 		sizeof(nsp->ns_nattab_sz));
274 	kmemcpy((char *)&nsp->ns_rultab_sz, nat_nlist[4].n_value,
275 		sizeof(nsp->ns_rultab_sz));
276 	kmemcpy((char *)&nsp->ns_rdrtab_sz, nat_nlist[5].n_value,
277 		sizeof(nsp->ns_rdrtab_sz));
278 	kmemcpy((char *)&nsp->ns_hostmap_sz, nat_nlist[6].n_value,
279 		sizeof(nsp->ns_hostmap_sz));
280 	kmemcpy((char *)&nsp->ns_instances, nat_nlist[7].n_value,
281 		sizeof(nsp->ns_instances));
282 }
283 
284 
285 /*
286  * Issue an ioctl to flush either the NAT rules table or the active mapping
287  * table or both.
288  */
289 void flushtable(fd, opts, match)
290 	int fd, opts, *match;
291 {
292 	int n = 0;
293 
294 	if (opts & OPT_FLUSH) {
295 		n = 0;
296 		if (!(opts & OPT_DONOTHING)) {
297 			if (match != NULL) {
298 				ipfobj_t obj;
299 
300 				obj.ipfo_rev = IPFILTER_VERSION;
301 				obj.ipfo_size = match[0] * sizeof(int);
302 				obj.ipfo_type = IPFOBJ_IPFEXPR;
303 				obj.ipfo_ptr = match;
304 				if (ioctl(fd, SIOCMATCHFLUSH, &obj) == -1) {
305 					ipferror(fd, "ioctl(SIOCMATCHFLUSH)");
306 					n = -1;
307 				} else {
308 					n = obj.ipfo_retval;
309 				}
310 			} else if (ioctl(fd, SIOCIPFFL, &n) == -1) {
311 				ipferror(fd, "ioctl(SIOCIPFFL)");
312 				n = -1;
313 			}
314 		}
315 		if (n >= 0)
316 			printf("%d entries flushed from NAT table\n", n);
317 	}
318 
319 	if (opts & OPT_CLEAR) {
320 		n = 1;
321 		if (!(opts & OPT_DONOTHING) && ioctl(fd, SIOCIPFFL, &n) == -1)
322 			ipferror(fd, "ioctl(SIOCCNATL)");
323 		else
324 			printf("%d entries flushed from NAT list\n", n);
325 	}
326 }
327 
328 
329 /*
330  * Display NAT statistics.
331  */
332 void dostats_dead(nsp, opts, filter)
333 	natstat_t *nsp;
334 	int opts, *filter;
335 {
336 	nat_t *np, nat;
337 	ipnat_t	ipn;
338 	int i;
339 
340 	if (nat_fields == NULL) {
341 		printf("List of active MAP/Redirect filters:\n");
342 		while (nsp->ns_list) {
343 			if (kmemcpy((char *)&ipn, (long)nsp->ns_list,
344 				    sizeof(ipn))) {
345 				perror("kmemcpy");
346 				break;
347 			}
348 			if (opts & OPT_HITS)
349 				printf("%lu ", ipn.in_hits);
350 			printnat(&ipn, opts & (OPT_DEBUG|OPT_VERBOSE));
351 			nsp->ns_list = ipn.in_next;
352 		}
353 	}
354 
355 	if (nat_fields == NULL) {
356 		printf("\nList of active sessions:\n");
357 
358 	} else if (nohdrfields == 0) {
359 		for (i = 0; nat_fields[i].w_value != 0; i++) {
360 			printfieldhdr(natfields, nat_fields + i);
361 			if (nat_fields[i + 1].w_value != 0)
362 				printf("\t");
363 		}
364 		printf("\n");
365 	}
366 
367 	for (np = nsp->ns_instances; np; np = nat.nat_next) {
368 		if (kmemcpy((char *)&nat, (long)np, sizeof(nat)))
369 			break;
370 		if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0))
371 			continue;
372 		if (nat_fields != NULL) {
373 			for (i = 0; nat_fields[i].w_value != 0; i++) {
374 				printnatfield(&nat, nat_fields[i].w_value);
375 				if (nat_fields[i + 1].w_value != 0)
376 					printf("\t");
377 			}
378 			printf("\n");
379 		} else {
380 			printactivenat(&nat, opts, nsp->ns_ticks);
381 			if (nat.nat_aps) {
382 				int proto;
383 
384 				if (nat.nat_dir & NAT_OUTBOUND)
385 					proto = nat.nat_pr[1];
386 				else
387 					proto = nat.nat_pr[0];
388 				printaps(nat.nat_aps, opts, proto);
389 			}
390 		}
391 	}
392 
393 	if (opts & OPT_VERBOSE)
394 		showhostmap_dead(nsp);
395 }
396 
397 
398 void dotable(nsp, fd, alive, which, side)
399 	natstat_t *nsp;
400 	int fd, alive, which;
401 	char *side;
402 {
403 	int sz, i, used, maxlen, minlen, totallen;
404 	ipftable_t table;
405 	u_int *buckets;
406 	ipfobj_t obj;
407 
408 	sz = sizeof(*buckets) * nsp->ns_nattab_sz;
409 	buckets = (u_int *)malloc(sz);
410 	if (buckets == NULL) {
411 		fprintf(stderr,
412 			"cannot allocate memory (%d) for buckets\n", sz);
413 		return;
414 	}
415 
416 	obj.ipfo_rev = IPFILTER_VERSION;
417 	obj.ipfo_type = IPFOBJ_GTABLE;
418 	obj.ipfo_size = sizeof(table);
419 	obj.ipfo_ptr = &table;
420 
421 	if (which == 0) {
422 		table.ita_type = IPFTABLE_BUCKETS_NATIN;
423 	} else if (which == 1) {
424 		table.ita_type = IPFTABLE_BUCKETS_NATOUT;
425 	}
426 	table.ita_table = buckets;
427 
428 	if (alive) {
429 		if (ioctl(fd, SIOCGTABL, &obj) != 0) {
430 			ipferror(fd, "SIOCFTABL");
431 			free(buckets);
432 			return;
433 		}
434 	} else {
435 		if (kmemcpy((char *)buckets, (u_long)nsp->ns_nattab_sz, sz)) {
436 			free(buckets);
437 			return;
438 		}
439 	}
440 
441 	minlen = nsp->ns_side[which].ns_inuse;
442 	totallen = 0;
443 	maxlen = 0;
444 	used = 0;
445 
446 	for (i = 0; i < nsp->ns_nattab_sz; i++) {
447 		if (buckets[i] > maxlen)
448 			maxlen = buckets[i];
449 		if (buckets[i] < minlen)
450 			minlen = buckets[i];
451 		if (buckets[i] != 0)
452 			used++;
453 		totallen += buckets[i];
454 	}
455 
456 	printf("%d%%\thash efficiency %s\n",
457 	       totallen ? used * 100 / totallen : 0, side);
458 	printf("%2.2f%%\tbucket usage %s\n",
459 	       ((float)used / nsp->ns_nattab_sz) * 100.0, side);
460 	printf("%d\tminimal length %s\n", minlen, side);
461 	printf("%d\tmaximal length %s\n", maxlen, side);
462 	printf("%.3f\taverage length %s\n",
463 	       used ? ((float)totallen / used) : 0.0, side);
464 
465 	free(buckets);
466 }
467 
468 
469 void dostats(fd, nsp, opts, alive, filter)
470 	natstat_t *nsp;
471 	int fd, opts, alive, *filter;
472 {
473 	/*
474 	 * Show statistics ?
475 	 */
476 	if (opts & OPT_STAT) {
477 		printnatside("in", &nsp->ns_side[0]);
478 		dotable(nsp, fd, alive, 0, "in");
479 
480 		printnatside("out", &nsp->ns_side[1]);
481 		dotable(nsp, fd, alive, 1, "out");
482 
483 		printf("%lu\tlog successes\n", nsp->ns_side[0].ns_log);
484 		printf("%lu\tlog failures\n", nsp->ns_side[1].ns_log);
485 		printf("%lu\tadded in\n%lu\tadded out\n",
486 			nsp->ns_side[0].ns_added,
487 			nsp->ns_side[1].ns_added);
488 		printf("%u\tactive\n", nsp->ns_active);
489 		printf("%lu\ttransparent adds\n", nsp->ns_addtrpnt);
490 		printf("%lu\tdivert build\n", nsp->ns_divert_build);
491 		printf("%lu\texpired\n", nsp->ns_expire);
492 		printf("%lu\tflush all\n", nsp->ns_flush_all);
493 		printf("%lu\tflush closing\n", nsp->ns_flush_closing);
494 		printf("%lu\tflush queue\n", nsp->ns_flush_queue);
495 		printf("%lu\tflush state\n", nsp->ns_flush_state);
496 		printf("%lu\tflush timeout\n", nsp->ns_flush_timeout);
497 		printf("%lu\thostmap new\n", nsp->ns_hm_new);
498 		printf("%lu\thostmap fails\n", nsp->ns_hm_newfail);
499 		printf("%lu\thostmap add\n", nsp->ns_hm_addref);
500 		printf("%lu\thostmap NULL rule\n", nsp->ns_hm_nullnp);
501 		printf("%lu\tlog ok\n", nsp->ns_log_ok);
502 		printf("%lu\tlog fail\n", nsp->ns_log_fail);
503 		printf("%u\torphan count\n", nsp->ns_orphans);
504 		printf("%u\trule count\n", nsp->ns_rules);
505 		printf("%u\tmap rules\n", nsp->ns_rules_map);
506 		printf("%u\trdr rules\n", nsp->ns_rules_rdr);
507 		printf("%u\twilds\n", nsp->ns_wilds);
508 		if (opts & OPT_VERBOSE)
509 			printf("list %p\n", nsp->ns_list);
510 	}
511 
512 	if (opts & OPT_LIST) {
513 		if (alive)
514 			dostats_live(fd, nsp, opts, filter);
515 		else
516 			dostats_dead(nsp, opts, filter);
517 	}
518 }
519 
520 
521 /*
522  * Display NAT statistics.
523  */
524 void dostats_live(fd, nsp, opts, filter)
525 	natstat_t *nsp;
526 	int fd, opts, *filter;
527 {
528 	ipfgeniter_t iter;
529 	char buffer[2000];
530 	ipfobj_t obj;
531 	ipnat_t	*ipn;
532 	nat_t nat;
533 	int i;
534 
535 	bzero((char *)&obj, sizeof(obj));
536 	obj.ipfo_rev = IPFILTER_VERSION;
537 	obj.ipfo_type = IPFOBJ_GENITER;
538 	obj.ipfo_size = sizeof(iter);
539 	obj.ipfo_ptr = &iter;
540 
541 	iter.igi_type = IPFGENITER_IPNAT;
542 	iter.igi_nitems = 1;
543 	iter.igi_data = buffer;
544 	ipn = (ipnat_t *)buffer;
545 
546 	/*
547 	 * Show list of NAT rules and NAT sessions ?
548 	 */
549 	if (nat_fields == NULL) {
550 		printf("List of active MAP/Redirect filters:\n");
551 		while (nsp->ns_list) {
552 			if (ioctl(fd, SIOCGENITER, &obj) == -1)
553 				break;
554 			if (opts & OPT_HITS)
555 				printf("%lu ", ipn->in_hits);
556 			printnat(ipn, opts & (OPT_DEBUG|OPT_VERBOSE));
557 			nsp->ns_list = ipn->in_next;
558 		}
559 	}
560 
561 	if (nat_fields == NULL) {
562 		printf("\nList of active sessions:\n");
563 
564 	} else if (nohdrfields == 0) {
565 		for (i = 0; nat_fields[i].w_value != 0; i++) {
566 			printfieldhdr(natfields, nat_fields + i);
567 			if (nat_fields[i + 1].w_value != 0)
568 				printf("\t");
569 		}
570 		printf("\n");
571 	}
572 
573 	i = IPFGENITER_IPNAT;
574 	(void) ioctl(fd,SIOCIPFDELTOK, &i);
575 
576 
577 	iter.igi_type = IPFGENITER_NAT;
578 	iter.igi_nitems = 1;
579 	iter.igi_data = &nat;
580 
581 	while (nsp->ns_instances != NULL) {
582 		if (ioctl(fd, SIOCGENITER, &obj) == -1)
583 			break;
584 		if ((filter != NULL) && (nat_matcharray(&nat, filter) == 0))
585 			continue;
586 		if (nat_fields != NULL) {
587 			for (i = 0; nat_fields[i].w_value != 0; i++) {
588 				printnatfield(&nat, nat_fields[i].w_value);
589 				if (nat_fields[i + 1].w_value != 0)
590 					printf("\t");
591 			}
592 			printf("\n");
593 		} else {
594 			printactivenat(&nat, opts, nsp->ns_ticks);
595 			if (nat.nat_aps) {
596 				int proto;
597 
598 				if (nat.nat_dir & NAT_OUTBOUND)
599 					proto = nat.nat_pr[1];
600 				else
601 					proto = nat.nat_pr[0];
602 				printaps(nat.nat_aps, opts, proto);
603 			}
604 		}
605 		nsp->ns_instances = nat.nat_next;
606 	}
607 
608 	if (opts & OPT_VERBOSE)
609 		showhostmap_live(fd, nsp);
610 
611 	i = IPFGENITER_NAT;
612 	(void) ioctl(fd,SIOCIPFDELTOK, &i);
613 }
614 
615 
616 /*
617  * Display the active host mapping table.
618  */
619 void showhostmap_dead(nsp)
620 	natstat_t *nsp;
621 {
622 	hostmap_t hm, *hmp, **maptable;
623 	u_int hv;
624 
625 	printf("\nList of active host mappings:\n");
626 
627 	maptable = (hostmap_t **)malloc(sizeof(hostmap_t *) *
628 					nsp->ns_hostmap_sz);
629 	if (kmemcpy((char *)maptable, (u_long)nsp->ns_maptable,
630 		    sizeof(hostmap_t *) * nsp->ns_hostmap_sz)) {
631 		perror("kmemcpy (maptable)");
632 		return;
633 	}
634 
635 	for (hv = 0; hv < nsp->ns_hostmap_sz; hv++) {
636 		hmp = maptable[hv];
637 
638 		while (hmp) {
639 			if (kmemcpy((char *)&hm, (u_long)hmp, sizeof(hm))) {
640 				perror("kmemcpy (hostmap)");
641 				return;
642 			}
643 
644 			printhostmap(&hm, hv);
645 			hmp = hm.hm_next;
646 		}
647 	}
648 	free(maptable);
649 }
650 
651 
652 /*
653  * Display the active host mapping table.
654  */
655 void showhostmap_live(fd, nsp)
656 	int fd;
657 	natstat_t *nsp;
658 {
659 	ipfgeniter_t iter;
660 	hostmap_t hm;
661 	ipfobj_t obj;
662 	int i;
663 
664 	bzero((char *)&obj, sizeof(obj));
665 	obj.ipfo_rev = IPFILTER_VERSION;
666 	obj.ipfo_type = IPFOBJ_GENITER;
667 	obj.ipfo_size = sizeof(iter);
668 	obj.ipfo_ptr = &iter;
669 
670 	iter.igi_type = IPFGENITER_HOSTMAP;
671 	iter.igi_nitems = 1;
672 	iter.igi_data = &hm;
673 
674 	printf("\nList of active host mappings:\n");
675 
676 	while (nsp->ns_maplist != NULL) {
677 		if (ioctl(fd, SIOCGENITER, &obj) == -1)
678 			break;
679 		printhostmap(&hm, hm.hm_hv);
680 		nsp->ns_maplist = hm.hm_next;
681 	}
682 
683 	i = IPFGENITER_HOSTMAP;
684 	(void) ioctl(fd,SIOCIPFDELTOK, &i);
685 }
686 
687 
688 int nat_matcharray(nat, array)
689 	nat_t *nat;
690 	int *array;
691 {
692 	int i, n, *x, rv, p;
693 	ipfexp_t *e;
694 
695 	rv = 0;
696 	n = array[0];
697 	x = array + 1;
698 
699 	for (; n > 0; x += 3 + x[3], rv = 0) {
700 		e = (ipfexp_t *)x;
701 		if (e->ipfe_cmd == IPF_EXP_END)
702 			break;
703 		n -= e->ipfe_size;
704 
705 		p = e->ipfe_cmd >> 16;
706 		if ((p != 0) && (p != nat->nat_pr[1]))
707 			break;
708 
709 		switch (e->ipfe_cmd)
710 		{
711 		case IPF_EXP_IP_PR :
712 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
713 				rv |= (nat->nat_pr[1] == e->ipfe_arg0[i]);
714 			}
715 			break;
716 
717 		case IPF_EXP_IP_SRCADDR :
718 			if (nat->nat_v[0] != 4)
719 				break;
720 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
721 				rv |= ((nat->nat_osrcaddr &
722 					e->ipfe_arg0[i * 2 + 1]) ==
723 				       e->ipfe_arg0[i * 2]) ||
724 				      ((nat->nat_nsrcaddr &
725 					e->ipfe_arg0[i * 2 + 1]) ==
726 				       e->ipfe_arg0[i * 2]);
727 			}
728 			break;
729 
730 		case IPF_EXP_IP_DSTADDR :
731 			if (nat->nat_v[0] != 4)
732 				break;
733 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
734 				rv |= ((nat->nat_odstaddr &
735 					e->ipfe_arg0[i * 2 + 1]) ==
736 				       e->ipfe_arg0[i * 2]) ||
737 				      ((nat->nat_ndstaddr &
738 					e->ipfe_arg0[i * 2 + 1]) ==
739 				       e->ipfe_arg0[i * 2]);
740 			}
741 			break;
742 
743 		case IPF_EXP_IP_ADDR :
744 			if (nat->nat_v[0] != 4)
745 				break;
746 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
747 				rv |= ((nat->nat_osrcaddr &
748 					e->ipfe_arg0[i * 2 + 1]) ==
749 				       e->ipfe_arg0[i * 2]) ||
750 				      ((nat->nat_nsrcaddr &
751 					e->ipfe_arg0[i * 2 + 1]) ==
752 				       e->ipfe_arg0[i * 2]) ||
753 				     ((nat->nat_odstaddr &
754 					e->ipfe_arg0[i * 2 + 1]) ==
755 				       e->ipfe_arg0[i * 2]) ||
756 				     ((nat->nat_ndstaddr &
757 					e->ipfe_arg0[i * 2 + 1]) ==
758 				       e->ipfe_arg0[i * 2]);
759 			}
760 			break;
761 
762 #ifdef USE_INET6
763 		case IPF_EXP_IP6_SRCADDR :
764 			if (nat->nat_v[0] != 6)
765 				break;
766 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
767 				rv |= IP6_MASKEQ(&nat->nat_osrc6,
768 						 &e->ipfe_arg0[i * 8 + 4],
769 						 &e->ipfe_arg0[i * 8]) ||
770 				      IP6_MASKEQ(&nat->nat_nsrc6,
771 						 &e->ipfe_arg0[i * 8 + 4],
772 						 &e->ipfe_arg0[i * 8]);
773 			}
774 			break;
775 
776 		case IPF_EXP_IP6_DSTADDR :
777 			if (nat->nat_v[0] != 6)
778 				break;
779 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
780 				rv |= IP6_MASKEQ(&nat->nat_odst6,
781 						 &e->ipfe_arg0[i * 8 + 4],
782 						 &e->ipfe_arg0[i * 8]) ||
783 				      IP6_MASKEQ(&nat->nat_ndst6,
784 						 &e->ipfe_arg0[i * 8 + 4],
785 						 &e->ipfe_arg0[i * 8]);
786 			}
787 			break;
788 
789 		case IPF_EXP_IP6_ADDR :
790 			if (nat->nat_v[0] != 6)
791 				break;
792 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
793 				rv |= IP6_MASKEQ(&nat->nat_osrc6,
794 						 &e->ipfe_arg0[i * 8 + 4],
795 						 &e->ipfe_arg0[i * 8]) ||
796 				      IP6_MASKEQ(&nat->nat_nsrc6,
797 						 &e->ipfe_arg0[i * 8 + 4],
798 						 &e->ipfe_arg0[i * 8]) ||
799 				      IP6_MASKEQ(&nat->nat_odst6,
800 						 &e->ipfe_arg0[i * 8 + 4],
801 						 &e->ipfe_arg0[i * 8]) ||
802 				      IP6_MASKEQ(&nat->nat_ndst6,
803 						 &e->ipfe_arg0[i * 8 + 4],
804 						 &e->ipfe_arg0[i * 8]);
805 			}
806 			break;
807 #endif
808 
809 		case IPF_EXP_UDP_PORT :
810 		case IPF_EXP_TCP_PORT :
811 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
812 				rv |= (nat->nat_osport == e->ipfe_arg0[i]) ||
813 				      (nat->nat_nsport == e->ipfe_arg0[i]) ||
814 				      (nat->nat_odport == e->ipfe_arg0[i]) ||
815 				      (nat->nat_ndport == e->ipfe_arg0[i]);
816 			}
817 			break;
818 
819 		case IPF_EXP_UDP_SPORT :
820 		case IPF_EXP_TCP_SPORT :
821 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
822 				rv |= (nat->nat_osport == e->ipfe_arg0[i]) ||
823 				      (nat->nat_nsport == e->ipfe_arg0[i]);
824 			}
825 			break;
826 
827 		case IPF_EXP_UDP_DPORT :
828 		case IPF_EXP_TCP_DPORT :
829 			for (i = 0; !rv && i < e->ipfe_narg; i++) {
830 				rv |= (nat->nat_odport == e->ipfe_arg0[i]) ||
831 				      (nat->nat_ndport == e->ipfe_arg0[i]);
832 			}
833 			break;
834 		}
835 		rv ^= e->ipfe_not;
836 
837 		if (rv == 0)
838 			break;
839 	}
840 
841 	return rv;
842 }
843