Hackfut Security File Manager
Current Path:
/usr/include/linux/netfilter
usr
/
include
/
linux
/
netfilter
/
📁
..
📁
ipset
📄
nf_conntrack_common.h
(2.26 KB)
📄
nf_conntrack_ftp.h
(375 B)
📄
nf_conntrack_sctp.h
(623 B)
📄
nf_conntrack_tcp.h
(1.17 KB)
📄
nf_conntrack_tuple_common.h
(295 B)
📄
nfnetlink.h
(1.52 KB)
📄
nfnetlink_compat.h
(2.33 KB)
📄
nfnetlink_conntrack.h
(3.44 KB)
📄
nfnetlink_log.h
(2.46 KB)
📄
nfnetlink_queue.h
(2.2 KB)
📄
x_tables.h
(3.58 KB)
📄
xt_AUDIT.h
(655 B)
📄
xt_CHECKSUM.h
(500 B)
📄
xt_CLASSIFY.h
(154 B)
📄
xt_CONNMARK.h
(737 B)
📄
xt_CONNSECMARK.h
(238 B)
📄
xt_DSCP.h
(634 B)
📄
xt_LED.h
(407 B)
📄
xt_MARK.h
(366 B)
📄
xt_NFLOG.h
(326 B)
📄
xt_NFQUEUE.h
(478 B)
📄
xt_RATEEST.h
(305 B)
📄
xt_SECMARK.h
(591 B)
📄
xt_TCPMSS.h
(172 B)
📄
xt_TCPOPTSTRIP.h
(322 B)
📄
xt_TPROXY.h
(473 B)
📄
xt_cluster.h
(305 B)
📄
xt_comment.h
(176 B)
📄
xt_connbytes.h
(511 B)
📄
xt_connlimit.h
(361 B)
📄
xt_connmark.h
(613 B)
📄
xt_conntrack.h
(2.43 KB)
📄
xt_dccp.h
(420 B)
📄
xt_dscp.h
(638 B)
📄
xt_esp.h
(355 B)
📄
xt_hashlimit.h
(1.7 KB)
📄
xt_helper.h
(125 B)
📄
xt_iprange.h
(489 B)
📄
xt_length.h
(158 B)
📄
xt_limit.h
(610 B)
📄
xt_mac.h
(135 B)
📄
xt_mark.h
(222 B)
📄
xt_multiport.h
(658 B)
📄
xt_osf.h
(3.27 KB)
📄
xt_owner.h
(306 B)
📄
xt_physdev.h
(467 B)
📄
xt_pkttype.h
(125 B)
📄
xt_policy.h
(914 B)
📄
xt_quota.h
(320 B)
📄
xt_rateest.h
(774 B)
📄
xt_realm.h
(157 B)
📄
xt_recent.h
(524 B)
📄
xt_sctp.h
(2.22 KB)
📄
xt_set.h
(1.07 KB)
📄
xt_state.h
(268 B)
📄
xt_statistic.h
(653 B)
📄
xt_string.h
(601 B)
📄
xt_tcpmss.h
(190 B)
📄
xt_tcpudp.h
(1.16 KB)
📄
xt_time.h
(503 B)
📄
xt_u32.h
(695 B)
Editing: xt_conntrack.h
/* Header file for kernel module to match connection tracking information. * GPL (C) 2001 Marc Boucher (marc@mbsi.ca). */ #ifndef _XT_CONNTRACK_H #define _XT_CONNTRACK_H #include <linux/types.h> #include <linux/netfilter/nf_conntrack_tuple_common.h> #define XT_CONNTRACK_STATE_BIT(ctinfo) (1 << ((ctinfo)%IP_CT_IS_REPLY+1)) #define XT_CONNTRACK_STATE_INVALID (1 << 0) #define XT_CONNTRACK_STATE_SNAT (1 << (IP_CT_NUMBER + 1)) #define XT_CONNTRACK_STATE_DNAT (1 << (IP_CT_NUMBER + 2)) #define XT_CONNTRACK_STATE_UNTRACKED (1 << (IP_CT_NUMBER + 3)) /* flags, invflags: */ enum { XT_CONNTRACK_STATE = 1 << 0, XT_CONNTRACK_PROTO = 1 << 1, XT_CONNTRACK_ORIGSRC = 1 << 2, XT_CONNTRACK_ORIGDST = 1 << 3, XT_CONNTRACK_REPLSRC = 1 << 4, XT_CONNTRACK_REPLDST = 1 << 5, XT_CONNTRACK_STATUS = 1 << 6, XT_CONNTRACK_EXPIRES = 1 << 7, XT_CONNTRACK_ORIGSRC_PORT = 1 << 8, XT_CONNTRACK_ORIGDST_PORT = 1 << 9, XT_CONNTRACK_REPLSRC_PORT = 1 << 10, XT_CONNTRACK_REPLDST_PORT = 1 << 11, XT_CONNTRACK_DIRECTION = 1 << 12, }; /* This is exposed to userspace, so remains frozen in time. */ struct ip_conntrack_old_tuple { struct { __be32 ip; union { __u16 all; } u; } src; struct { __be32 ip; union { __u16 all; } u; /* The protocol. */ __u16 protonum; } dst; }; struct xt_conntrack_info { unsigned int statemask, statusmask; struct ip_conntrack_old_tuple tuple[IP_CT_DIR_MAX]; struct in_addr sipmsk[IP_CT_DIR_MAX], dipmsk[IP_CT_DIR_MAX]; unsigned long expires_min, expires_max; /* Flags word */ __u8 flags; /* Inverse flags */ __u8 invflags; }; struct xt_conntrack_mtinfo1 { union nf_inet_addr origsrc_addr, origsrc_mask; union nf_inet_addr origdst_addr, origdst_mask; union nf_inet_addr replsrc_addr, replsrc_mask; union nf_inet_addr repldst_addr, repldst_mask; __u32 expires_min, expires_max; __u16 l4proto; __be16 origsrc_port, origdst_port; __be16 replsrc_port, repldst_port; __u16 match_flags, invert_flags; __u8 state_mask, status_mask; }; struct xt_conntrack_mtinfo2 { union nf_inet_addr origsrc_addr, origsrc_mask; union nf_inet_addr origdst_addr, origdst_mask; union nf_inet_addr replsrc_addr, replsrc_mask; union nf_inet_addr repldst_addr, repldst_mask; __u32 expires_min, expires_max; __u16 l4proto; __be16 origsrc_port, origdst_port; __be16 replsrc_port, repldst_port; __u16 match_flags, invert_flags; __u16 state_mask, status_mask; }; #endif /*_XT_CONNTRACK_H*/
Upload File
Create Folder