|
Lines 340-346
Link Here
|
| 340 |
if (args.rule) { /* dummynet already filtered us */ |
340 |
if (args.rule) { /* dummynet already filtered us */ |
| 341 |
ip = mtod(m, struct ip *); |
341 |
ip = mtod(m, struct ip *); |
| 342 |
hlen = IP_VHL_HL(ip->ip_vhl) << 2; |
342 |
hlen = IP_VHL_HL(ip->ip_vhl) << 2; |
| 343 |
goto iphack ; |
343 |
goto ipfw; /* skip ipfilter now (already passed it)! */ |
| 344 |
} |
344 |
} |
| 345 |
|
345 |
|
| 346 |
ipstat.ips_total++; |
346 |
ipstat.ips_total++; |
|
Lines 451-457
Link Here
|
| 451 |
* - Encapsulate: put it in another IP and send out. <unimp.> |
451 |
* - Encapsulate: put it in another IP and send out. <unimp.> |
| 452 |
*/ |
452 |
*/ |
| 453 |
|
453 |
|
| 454 |
iphack: |
|
|
| 455 |
/* |
454 |
/* |
| 456 |
* Check if we want to allow this packet to be processed. |
455 |
* Check if we want to allow this packet to be processed. |
| 457 |
* Consider it to be bad if not. |
456 |
* Consider it to be bad if not. |
|
Lines 463-468
Link Here
|
| 463 |
return; |
462 |
return; |
| 464 |
ip = mtod(m = m1, struct ip *); |
463 |
ip = mtod(m = m1, struct ip *); |
| 465 |
} |
464 |
} |
|
|
465 |
ipfw: |
| 466 |
if (fw_enable && IPFW_LOADED) { |
466 |
if (fw_enable && IPFW_LOADED) { |
| 467 |
/* |
467 |
/* |
| 468 |
* If we've been forwarded from the output side, then |
468 |
* If we've been forwarded from the output side, then |