summaryrefslogtreecommitdiffstats
path: root/sbin/pfctl/pfctl_optimize.c (follow)
Commit message (Expand)AuthorAgeFilesLines
* rename PF_OPT_TABLE_PREFIX to PF_OPTIMIZER_TABLE_PFX and move it to pfvar.hhenning2020-07-211-4/+4
* sbin/pfctl: replace TAILQ concatenation loop with TAILQ_CONCATbket2020-01-281-15/+4
* Do the actual pfr_strerror() to pf_strerror() renamekn2020-01-151-3/+3
* Unify error message for nonexisting anchorskn2020-01-151-3/+3
* Avoid optimizing empty rulesetskn2019-12-121-2/+5
* When system calls indicate an error they return -1, not some arbitraryderaadt2019-06-281-3/+3
* Remove pfctl_*_pool() remnantskn2019-03-071-6/+1
* Unbreak build under OPT_DEBUGkn2019-01-031-4/+2
* Remove unused af argument from unmask()kn2018-09-061-6/+6
* - patching use-after-free and innocent memory leak in pfctl_optimzie.csashan2017-11-251-30/+38
* - pfctl rule optimizer: anchor name vs. anchor path mix upsashan2017-11-251-2/+2
* A couple of "a->blah == a->blah" -> "a->blah == b->blah".krw2016-08-031-3/+3
* Include <netinet/in.h> before <net/pfvar.h>. In a future change whenderaadt2015-01-211-4/+3
* Replace all queue *_END macro calls except CIRCLEQ_END with NULL.doug2014-09-131-2/+2
* Whole bunch of (unsigned char) casts carefully added for ctype calls.deraadt2013-11-221-2/+2
* rtableid must be BREAK instead of MERGE, otherwise the optimizer mighthenning2012-10-191-2/+2
* unbreak rule optimizer; ok henning, looksmikeb2011-12-191-1/+2
* print ports as numbers by default; -P prints names insteadhenning2011-11-231-2/+2
* Add support for weighted round-robin in load balancing pools and tables.mcbride2011-07-271-1/+2
* Fold pf_test_fragment() into pf_test_rule(), reduce code and fixesmcbride2011-07-071-2/+2
* bring in least-states load balancing algorithmzinke2011-07-031-2/+2
* Userland bits to allow PF to filter on the rdomain a packet belongs to.claudio2011-04-061-1/+14
* remove -A, -O, -R and -T loadhenning2010-03-231-6/+1
* First pass at removing the 'pf_pool' mechanism for translation and routingmcbride2010-01-121-43/+8
* plug some memory leaks; found by parfait, ok henningderaadt2009-12-101-1/+2
* since "nat/rdr pass" are history natpass can gohenning2009-11-231-3/+2
* cleanup after the NAT changes. we used to have multiple rulesets (scrub,henning2009-11-221-13/+7
* Add a dedicated pf pool for route options as suggested by henning,jsg2009-10-281-1/+13
* the diff theo calls me insanae for:henning2009-09-011-12/+24
* allow setting TOS with scrub; ok mcbride, claudiomarkus2008-05-071-1/+2
* Add a counter to record how many states have been created by a rule.mpf2008-05-061-2/+3
* Create the automatic tables at the base of the anchor stack rather thanmcbride2008-01-261-3/+4
* Get rid of warning when compiling with OPT_DEBUG.mcbride2008-01-251-2/+2
* typos; ok jmc@martynas2007-11-271-3/+3
* Allow pfctl ruleset optimizer to be controlled from the ruleset.mcbride2006-10-311-3/+3
* Load all rules into memory before loading into the kernel, and add supportmcbride2006-10-281-32/+56
* teach the optimizer about logif, with & ok frantzenhenning2006-10-251-1/+2
* implement a Unicast Reverse Path Forwarding (uRPF) check for pf(4)djm2006-03-141-1/+3
* make the packet and byte counters on rules and src nodes per direction,henning2005-06-131-3/+5
* switch the max_src_{states,conn,conn_rate} from superblock breaks to superblockfrantzen2005-05-261-3/+4
* make the remaining pf_rule fields named superblock BREAKs instead just lettingfrantzen2005-05-251-1/+13
* make the optimizer safe in the presence of interface groups. they must act asfrantzen2005-05-251-2/+42
* don't merge a rule's source address into a table if we're already trying tofrantzen2005-01-031-1/+3
* &&/|| inversion would try to merge IP addresses with non-addresses into afrantzen2004-12-141-2/+2
* add two warn() calls to make sure a warning message gets printed if one offrantzen2004-12-141-3/+7
* spacingderaadt2004-08-081-9/+8
* 'pfctl -o' ruleset optimizer that doesnt change the meaning of the final rulesetfrantzen2004-07-161-0/+1558