mirror of
https://github.com/Qortal/Brooklyn.git
synced 2025-01-30 23:02:18 +00:00
2a709f28fa
* 0day explit mitigation * Memory corruption prevention * Privilege escalation prevention * Buffer over flow prevention * File System corruption defense * Thread escape prevention This may very well be the most intensive inclusion to BrooklynR. This will not be part of an x86 suite nor it will be released as tool kit. The security core toolkit will remain part of kernel base.
20 lines
743 B
C
20 lines
743 B
C
#ifndef __GRSOCK_H
|
|
#define __GRSOCK_H
|
|
|
|
extern void gr_attach_curr_ip(const struct sock *sk);
|
|
extern int gr_handle_sock_all(const int family, const int type,
|
|
const int protocol);
|
|
extern int gr_handle_sock_server(const struct sockaddr *sck);
|
|
extern int gr_handle_sock_server_other(const struct sock *sck);
|
|
extern int gr_handle_sock_client(const struct sockaddr *sck);
|
|
extern int gr_search_connect(struct socket * sock,
|
|
struct sockaddr_in * addr);
|
|
extern int gr_search_bind(struct socket * sock,
|
|
struct sockaddr_in * addr);
|
|
extern int gr_search_listen(struct socket * sock);
|
|
extern int gr_search_accept(struct socket * sock);
|
|
extern int gr_search_socket(const int domain, const int type,
|
|
const int protocol);
|
|
|
|
#endif
|