1 #ifndef _IP_CONNTRACK_TUPLE_H
2 #define _IP_CONNTRACK_TUPLE_H
4 /* A `tuple' is a structure containing the information to uniquely
5 identify a connection. ie. if two packets have the same tuple, they
6 are in the same connection; if not, they are not.
8 We divide the structure along "manipulatable" and
9 "non-manipulatable" lines, for the benefit of the NAT code.
12 /* The protocol-specific manipulable parts of the tuple: always in
14 union ip_conntrack_manip_proto
16 /* Add other protocols here. */
32 u_int16_t key
; /* key is 32bit, pptp only uses 16 */
36 /* The manipulable part of the tuple. */
37 struct ip_conntrack_manip
40 union ip_conntrack_manip_proto u
;
43 /* This contains the information to distinguish a connection. */
44 struct ip_conntrack_tuple
46 struct ip_conntrack_manip src
;
48 /* These are the parts of the tuple which are fixed. */
52 /* Add other protocols here. */
68 u_int16_t key
; /* key is 32bit,
69 * pptp only uses 16 */
76 /* The direction (for tuplehash) */
81 /* This is optimized opposed to a memset of the whole structure. Everything we
82 * really care about is the source/destination unions */
83 #define IP_CT_TUPLE_U_BLANK(tuple) \
85 (tuple)->src.u.all = 0; \
86 (tuple)->dst.u.all = 0; \
98 #define DUMP_TUPLE(tp) \
99 DEBUGP("tuple %p: %u %u.%u.%u.%u:%hu -> %u.%u.%u.%u:%hu\n", \
100 (tp), (tp)->dst.protonum, \
101 NIPQUAD((tp)->src.ip), ntohs((tp)->src.u.all), \
102 NIPQUAD((tp)->dst.ip), ntohs((tp)->dst.u.all))
104 #define CTINFO2DIR(ctinfo) ((ctinfo) >= IP_CT_IS_REPLY ? IP_CT_DIR_REPLY : IP_CT_DIR_ORIGINAL)
106 /* If we're the first tuple, it's the original dir. */
107 #define DIRECTION(h) ((enum ip_conntrack_dir)(h)->tuple.dst.dir)
109 /* Connections have two entries in the hash table: one for each way */
110 struct ip_conntrack_tuple_hash
112 struct list_head list
;
114 struct ip_conntrack_tuple tuple
;
117 #endif /* __KERNEL__ */
119 static inline int ip_ct_tuple_src_equal(const struct ip_conntrack_tuple
*t1
,
120 const struct ip_conntrack_tuple
*t2
)
122 return t1
->src
.ip
== t2
->src
.ip
123 && t1
->src
.u
.all
== t2
->src
.u
.all
;
126 static inline int ip_ct_tuple_dst_equal(const struct ip_conntrack_tuple
*t1
,
127 const struct ip_conntrack_tuple
*t2
)
129 return t1
->dst
.ip
== t2
->dst
.ip
130 && t1
->dst
.u
.all
== t2
->dst
.u
.all
131 && t1
->dst
.protonum
== t2
->dst
.protonum
;
134 static inline int ip_ct_tuple_equal(const struct ip_conntrack_tuple
*t1
,
135 const struct ip_conntrack_tuple
*t2
)
137 return ip_ct_tuple_src_equal(t1
, t2
) && ip_ct_tuple_dst_equal(t1
, t2
);
140 static inline int ip_ct_tuple_mask_cmp(const struct ip_conntrack_tuple
*t
,
141 const struct ip_conntrack_tuple
*tuple
,
142 const struct ip_conntrack_tuple
*mask
)
144 return !(((t
->src
.ip
^ tuple
->src
.ip
) & mask
->src
.ip
)
145 || ((t
->dst
.ip
^ tuple
->dst
.ip
) & mask
->dst
.ip
)
146 || ((t
->src
.u
.all
^ tuple
->src
.u
.all
) & mask
->src
.u
.all
)
147 || ((t
->dst
.u
.all
^ tuple
->dst
.u
.all
) & mask
->dst
.u
.all
)
148 || ((t
->dst
.protonum
^ tuple
->dst
.protonum
)
149 & mask
->dst
.protonum
));
152 #endif /* _IP_CONNTRACK_TUPLE_H */