diff options
author | Jan Engelhardt <jengelh@medozas.de> | 2011-11-25 15:36:56 +0100 |
---|---|---|
committer | Jan Engelhardt <jengelh@medozas.de> | 2011-11-30 21:47:12 +0100 |
commit | 3964023f8640b60456373825b326b91badd7a058 (patch) | |
tree | e5cd733341a2cdf3584c2867d16bad82ecce5979 /extensions/libipt_DNAT.c | |
parent | 3c461ceeed5f55599930051f6feaec014b08f730 (diff) |
libipt_SAME: set PROTO_RANDOM on all ranges
Resolve the (justified) WTF remark to a clearer version of when/why
PROTO_RANDOM needs to be set.
Especially when --random is used before --to in SAME, it would have
not been appleid.
Diffstat (limited to 'extensions/libipt_DNAT.c')
-rw-r--r-- | extensions/libipt_DNAT.c | 17 |
1 files changed, 10 insertions, 7 deletions
diff --git a/extensions/libipt_DNAT.c b/extensions/libipt_DNAT.c index 3b55c69c..466c9def 100644 --- a/extensions/libipt_DNAT.c +++ b/extensions/libipt_DNAT.c @@ -174,21 +174,23 @@ static void DNAT_parse(struct xt_option_call *cb) "DNAT: Multiple --to-destination not supported"); } *cb->target = parse_to(cb->arg, portok, info); - /* WTF do we need this for?? */ - if (cb->xflags & F_RANDOM) - info->mr.range[0].flags |= IP_NAT_RANGE_PROTO_RANDOM; cb->xflags |= F_X_TO_DEST; break; - case O_RANDOM: - if (cb->xflags & F_TO_DEST) - info->mr.range[0].flags |= IP_NAT_RANGE_PROTO_RANDOM; - break; case O_PERSISTENT: info->mr.range[0].flags |= IP_NAT_RANGE_PERSISTENT; break; } } +static void DNAT_fcheck(struct xt_fcheck_call *cb) +{ + static const unsigned int f = F_TO_DEST | F_RANDOM; + struct nf_nat_multi_range *mr = cb->data; + + if ((cb->xflags & f) == f) + mr->range[0].flags |= IP_NAT_RANGE_PROTO_RANDOM; +} + static void print_range(const struct nf_nat_range *r) { if (r->flags & IP_NAT_RANGE_MAP_IPS) { @@ -248,6 +250,7 @@ static struct xtables_target dnat_tg_reg = { .userspacesize = XT_ALIGN(sizeof(struct nf_nat_multi_range)), .help = DNAT_help, .x6_parse = DNAT_parse, + .x6_fcheck = DNAT_fcheck, .print = DNAT_print, .save = DNAT_save, .x6_options = DNAT_opts, |