/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/bridge/netfilter/ |
H A D | ebtable_broute.c | 29 .valid_hooks = 1 << NF_BR_BROUTING, 37 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 39 if (valid_hooks & ~(1 << NF_BR_BROUTING)) 48 .valid_hooks = 1 << NF_BR_BROUTING,
|
H A D | ebtable_filter.c | 36 .valid_hooks = FILTER_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 48 if (valid_hooks & ~FILTER_VALID_HOOKS) 57 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ebtable_nat.c | 36 .valid_hooks = NAT_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 48 if (valid_hooks & ~NAT_VALID_HOOKS) 57 .valid_hooks = NAT_VALID_HOOKS,
|
H A D | ebtables.c | 399 unsigned int valid_hooks = repl->valid_hooks; local 417 if ((valid_hooks & (1 << i)) == 0) 453 (valid_hooks & (1 << i))) { 999 if (t->check && (ret = t->check(newinfo, tmp.valid_hooks))) 1191 if ((repl->valid_hooks & (1 << i)) == 0) 1203 if (table->check && table->check(newinfo, table->valid_hooks)) { 1478 tmp.valid_hooks = t->valid_hooks; 1482 tmp.valid_hooks [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ipv6/netfilter/ |
H A D | ip6table_raw.c | 21 .valid_hooks = RAW_VALID_HOOKS, 42 .valid_hooks = RAW_VALID_HOOKS,
|
H A D | ip6table_filter.c | 30 .valid_hooks = FILTER_VALID_HOOKS, 54 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ip6table_mangle.c | 34 .valid_hooks = MANGLE_VALID_HOOKS, 64 .valid_hooks = MANGLE_VALID_HOOKS,
|
H A D | ip6_tables.c | 265 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 387 unsigned int valid_hooks, void *entry0) 399 if (!(valid_hooks & (1 << hook))) 674 unsigned int valid_hooks, 715 if (!(valid_hooks & (1 << i))) 729 if (!mark_source_chains(newinfo, valid_hooks, entry0)) 954 ret = translate_table(tmp.name, tmp.valid_hooks, 970 if (tmp.valid_hooks != t->valid_hooks) { 972 tmp.valid_hooks, 386 mark_source_chains(struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 673 translate_table(const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, void *entry0, unsigned int size, unsigned int number, const unsigned int *hook_entries, const unsigned int *underflows) argument [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/net/ipv4/netfilter/ |
H A D | arptable_filter.c | 26 .valid_hooks = FILTER_VALID_HOOKS, 50 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | iptable_raw.c | 20 .valid_hooks = RAW_VALID_HOOKS, 41 .valid_hooks = RAW_VALID_HOOKS,
|
H A D | iptable_filter.c | 32 .valid_hooks = FILTER_VALID_HOOKS, 56 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | arp_tables.c | 336 unsigned int valid_hooks, void *entry0) 348 if (!(valid_hooks & (1 << hook))) 569 unsigned int valid_hooks, 612 if (!(valid_hooks & (1 << i))) 626 if (!mark_source_chains(newinfo, valid_hooks, entry0)) { 835 ret = translate_table(tmp.name, tmp.valid_hooks, 851 if (tmp.valid_hooks != t->valid_hooks) { 853 tmp.valid_hooks, t->valid_hooks); 335 mark_source_chains(struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 568 translate_table(const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, void *entry0, unsigned int size, unsigned int number, const unsigned int *hook_entries, const unsigned int *underflows) argument [all...] |
H A D | iptable_mangle.c | 39 .valid_hooks = MANGLE_VALID_HOOKS, 69 .valid_hooks = MANGLE_VALID_HOOKS,
|
H A D | ip_tables.c | 241 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 369 unsigned int valid_hooks, void *entry0) 380 if (!(valid_hooks & (1 << hook))) 688 unsigned int valid_hooks, 729 if (!(valid_hooks & (1 << i))) 743 if (!mark_source_chains(newinfo, valid_hooks, entry0)) 1081 info.valid_hooks = t->valid_hooks; 1150 __do_replace(const char *name, unsigned int valid_hooks, argument 1175 if (valid_hooks ! 368 mark_source_chains(struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 687 translate_table(const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, void *entry0, unsigned int size, unsigned int number, const unsigned int *hook_entries, const unsigned int *underflows) argument 1375 u32 valid_hooks; member in struct:compat_ipt_replace 1624 translate_compat_table(const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument [all...] |
H A D | nf_nat_rule.c | 39 .valid_hooks = NAT_VALID_HOOKS, 63 .valid_hooks = NAT_VALID_HOOKS,
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/iptables-1.4.12.1/libiptc/ |
H A D | libip4tc.c | 328 assert(h->info.valid_hooks 346 assert((h->info.valid_hooks 350 (h->info.valid_hooks 368 if (h->info.valid_hooks & (1 << NF_IP_LOCAL_IN)) { 379 assert((h->info.valid_hooks 382 (h->info.valid_hooks 394 if (h->info.valid_hooks & (1 << NF_IP_LOCAL_IN)) { 400 if (h->info.valid_hooks & (1 << NF_IP_FORWARD)) { 410 if (h->info.valid_hooks & (1 << NF_IP_POST_ROUTING)) { 417 assert(h->info.valid_hooks [all...] |
H A D | libip6tc.c | 273 assert(h->info.valid_hooks 291 assert((h->info.valid_hooks 295 (h->info.valid_hooks 313 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 324 assert((h->info.valid_hooks 327 (h->info.valid_hooks 339 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 345 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) { 355 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) { 362 assert(h->info.valid_hooks [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/iptables-1.4.12.1/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 147 unsigned int valid_hooks; member in struct:ipt_getinfo 169 unsigned int valid_hooks; member in struct:ipt_replace
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/router/iptables-1.x/libiptc/ |
H A D | libip6tc.c | 276 assert(h->info.valid_hooks 294 assert((h->info.valid_hooks 298 (h->info.valid_hooks 316 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 327 assert((h->info.valid_hooks 330 (h->info.valid_hooks 342 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 348 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) { 358 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) { 365 assert(h->info.valid_hooks [all...] |
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/linux/netfilter_bridge/ |
H A D | ebtables.h | 43 unsigned int valid_hooks; member in struct:ebt_replace 60 unsigned int valid_hooks; member in struct:ebt_replace_kernel 276 unsigned int valid_hooks; member in struct:ebt_table 281 unsigned int valid_hooks);
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/linux/netfilter_arp/ |
H A D | arp_tables.h | 144 unsigned int valid_hooks; member in struct:arpt_getinfo 167 unsigned int valid_hooks; member in struct:arpt_replace
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/iproute2/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 213 unsigned int valid_hooks; member in struct:ipt_getinfo 236 unsigned int valid_hooks; member in struct:ipt_replace
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/ap/gpl/iptables-1.4.12.1/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 204 unsigned int valid_hooks; member in struct:ip6t_getinfo 226 unsigned int valid_hooks; member in struct:ip6t_replace
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 156 unsigned int valid_hooks; member in struct:ipt_getinfo 179 unsigned int valid_hooks; member in struct:ipt_replace
|
/netgear-WNDR4500-V1.0.1.40_1.0.68/src/linux/linux-2.6/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 210 unsigned int valid_hooks; member in struct:ip6t_getinfo 233 unsigned int valid_hooks; member in struct:ip6t_replace
|