/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/bridge/netfilter/ |
H A D | ebtable_broute.c | 29 .valid_hooks = 1 << NF_BR_BROUTING, 37 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 39 if (valid_hooks & ~(1 << NF_BR_BROUTING)) 48 .valid_hooks = 1 << NF_BR_BROUTING,
|
H A D | ebtable_filter.c | 36 .valid_hooks = FILTER_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 48 if (valid_hooks & ~FILTER_VALID_HOOKS) 57 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ebtable_nat.c | 36 .valid_hooks = NAT_VALID_HOOKS, 46 static int check(const struct ebt_table_info *info, unsigned int valid_hooks) argument 48 if (valid_hooks & ~NAT_VALID_HOOKS) 57 .valid_hooks = NAT_VALID_HOOKS,
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/netfilter/ |
H A D | xt_repldata.h | 9 unsigned int hook_mask = info->valid_hooks; \ 21 tbl->repl.valid_hooks = hook_mask; \
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/libiptc/ |
H A D | libip4tc.c | 328 assert(h->info.valid_hooks 346 assert((h->info.valid_hooks 350 (h->info.valid_hooks 368 if (h->info.valid_hooks & (1 << NF_IP_LOCAL_IN)) { 379 assert((h->info.valid_hooks 382 (h->info.valid_hooks 394 if (h->info.valid_hooks & (1 << NF_IP_LOCAL_IN)) { 400 if (h->info.valid_hooks & (1 << NF_IP_FORWARD)) { 410 if (h->info.valid_hooks & (1 << NF_IP_POST_ROUTING)) { 417 assert(h->info.valid_hooks [all...] |
H A D | libip6tc.c | 273 assert(h->info.valid_hooks 291 assert((h->info.valid_hooks 295 (h->info.valid_hooks 313 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 324 assert((h->info.valid_hooks 327 (h->info.valid_hooks 339 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 345 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) { 355 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) { 362 assert(h->info.valid_hooks [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 147 unsigned int valid_hooks; member in struct:ipt_getinfo 169 unsigned int valid_hooks; member in struct:ipt_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 147 unsigned int valid_hooks; member in struct:ipt_getinfo 169 unsigned int valid_hooks; member in struct:ipt_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/libiptc/ |
H A D | libip6tc.c | 273 assert(h->info.valid_hooks 291 assert((h->info.valid_hooks 295 (h->info.valid_hooks 313 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 324 assert((h->info.valid_hooks 327 (h->info.valid_hooks 339 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 345 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) { 355 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) { 362 assert(h->info.valid_hooks [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.x/libiptc/ |
H A D | libip6tc.c | 276 assert(h->info.valid_hooks 294 assert((h->info.valid_hooks 298 (h->info.valid_hooks 316 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 327 assert((h->info.valid_hooks 330 (h->info.valid_hooks 342 if (h->info.valid_hooks & (1 << NF_IP6_LOCAL_IN)) { 348 if (h->info.valid_hooks & (1 << NF_IP6_FORWARD)) { 358 if (h->info.valid_hooks & (1 << NF_IP6_POST_ROUTING)) { 365 assert(h->info.valid_hooks [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_bridge/ |
H A D | ebtables.h | 44 unsigned int valid_hooks; member in struct:ebt_replace 60 unsigned int valid_hooks; member in struct:ebt_replace_kernel 277 unsigned int valid_hooks; member in struct:ebt_table 282 unsigned int valid_hooks);
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iproute2/include/linux/netfilter_ipv4/ |
H A D | ip_tables.h | 213 unsigned int valid_hooks; member in struct:ipt_getinfo 236 unsigned int valid_hooks; member in struct:ipt_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/iptables-1.4.12.1/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 204 unsigned int valid_hooks; member in struct:ip6t_getinfo 226 unsigned int valid_hooks; member in struct:ip6t_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/include/linux/netfilter_arp/ |
H A D | arp_tables.h | 141 unsigned int valid_hooks; member in struct:arpt_getinfo 163 unsigned int valid_hooks; member in struct:arpt_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/src/router/iptables-1.4.12/src/include/linux/netfilter_ipv6/ |
H A D | ip6_tables.h | 204 unsigned int valid_hooks; member in struct:ip6t_getinfo 226 unsigned int valid_hooks; member in struct:ip6t_replace
|
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv4/netfilter/ |
H A D | arptable_filter.c | 22 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | iptable_filter.c | 29 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | iptable_raw.c | 15 .valid_hooks = RAW_VALID_HOOKS,
|
H A D | iptable_security.c | 33 .valid_hooks = SECURITY_VALID_HOOKS,
|
H A D | arp_tables.c | 361 unsigned int valid_hooks, void *entry0) 373 if (!(valid_hooks & (1 << hook))) 558 unsigned int valid_hooks) 577 if (!(valid_hooks & (1 << h))) 640 repl->valid_hooks); 661 if (!(repl->valid_hooks & (1 << i))) 675 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) { 929 info.valid_hooks = t->valid_hooks; 995 unsigned int valid_hooks, 360 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 552 check_entry_size_and_hooks(struct arpt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 994 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1320 translate_compat_table(const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument 1477 u32 valid_hooks; member in struct:compat_arpt_replace [all...] |
H A D | ip_tables.c | 334 IP_NF_ASSERT(table->valid_hooks & (1 << hook)); 459 unsigned int valid_hooks, void *entry0) 469 if (!(valid_hooks & (1 << hook))) 742 unsigned int valid_hooks) 761 if (!(valid_hooks & (1 << h))) 830 repl->valid_hooks); 848 if (!(repl->valid_hooks & (1 << i))) 862 if (!mark_source_chains(newinfo, repl->valid_hooks, entry0)) 1138 info.valid_hooks = t->valid_hooks; 458 mark_source_chains(const struct xt_table_info *newinfo, unsigned int valid_hooks, void *entry0) argument 736 check_entry_size_and_hooks(struct ipt_entry *e, struct xt_table_info *newinfo, const unsigned char *base, const unsigned char *limit, const unsigned int *hook_entries, const unsigned int *underflows, unsigned int valid_hooks) argument 1204 __do_replace(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info *newinfo, unsigned int num_counters, void __user *counters_ptr) argument 1415 u32 valid_hooks; member in struct:compat_ipt_replace 1662 translate_compat_table(struct net *net, const char *name, unsigned int valid_hooks, struct xt_table_info **pinfo, void **pentry0, unsigned int total_size, unsigned int number, unsigned int *hook_entries, unsigned int *underflows) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/components/opensource/linux/linux-2.6.36/net/ipv6/netfilter/ |
H A D | ip6table_filter.c | 27 .valid_hooks = FILTER_VALID_HOOKS,
|
H A D | ip6table_raw.c | 14 .valid_hooks = RAW_VALID_HOOKS,
|
H A D | ip6table_security.c | 32 .valid_hooks = SECURITY_VALID_HOOKS,
|
H A D | ip6table_mangle.c | 27 .valid_hooks = MANGLE_VALID_HOOKS,
|