HomeSort by relevance Sort by last modified time
    Searched refs:iptables (Results 1 - 20 of 20) sorted by null

  /external/iptables/iptables/
Android.mk 4 # iptables
21 xtables-multi.c iptables-xml.c xshared.c \
22 iptables-save.c iptables-restore.c \
23 iptables-standalone.c iptables.c
26 LOCAL_MODULE:=iptables
52 xtables-multi.c iptables-xml.c xshared.c \
iptables-apply 3 # iptables-apply -- a safer way to update iptables remotely
18 $PROGNAME $VERSION -- a safer way to update iptables remotely
43 The script will try to apply a new ruleset (as output by iptables-save/read
44 by iptables-restore) to iptables, then prompt the user whether the changes
96 SAVE=iptables-save
97 RESTORE=iptables-restore
98 DEFAULT_FILE=/etc/network/iptables
130 echo "E: iptables support lacking from the kernel." >&
    [all...]
iptables-standalone.c 13 * iptables -- IP firewall administration for kernels with
16 * See the accompanying manual page iptables(8) for information
39 #include <iptables.h>
40 #include "iptables-multi.h"
51 iptables_globals.program_name = "iptables";
72 fprintf(stderr, "iptables: %s. "
76 fprintf(stderr, "iptables: %s.\n",
iptables.c 1 /* Code to take an iptables-style command line and do it. */
39 #include <iptables.h>
234 " --ipv6 -6 Error (line is ignored by iptables-restore)\n"
281 "Perhaps iptables or your kernel needs to be upgraded.\n");
1051 /* print counters for iptables-save */
1082 /* print counters for iptables -R */
1132 counters = -1; /* iptables -c format */
    [all...]
  /external/wpa_supplicant_8/wpa_supplicant/examples/
p2p-action-udhcp.sh 54 iptables -P FORWARD DROP
55 iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
56 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
57 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
66 iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
67 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
68 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
p2p-action.sh 81 iptables -P FORWARD DROP
82 iptables -t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
83 iptables -A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
84 iptables -A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
93 iptables -t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
94 iptables -D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
95 iptables -D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
  /development/scripts/
reverse_tether.sh 157 sudo iptables -F
158 sudo iptables -t nat -F
159 sudo iptables -t nat -A POSTROUTING -o $LAN_DEV -j MASQUERADE
160 sudo iptables -P FORWARD ACCEPT
165 sudo iptables -A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
166 sudo iptables -A FORWARD -m state --state NEW -i $HOST_DEV -j ACCEPT
167 sudo iptables -P FORWARD DROP
172 sudo iptables -F
173 sudo iptables -t nat -F
  /external/iptables/include/
ip6tables.h 7 #include <iptables/internal.h>
iptables.h 7 #include <iptables/internal.h>
  /external/iptables/libxtables/
Android.mk 10 $(LOCAL_PATH)/../iptables/ \
  /external/dnsmasq/contrib/port-forward/
dnsmasq-portforward 20 IPTABLES=/sbin/iptables
55 ${IPTABLES} -t nat -D PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
57 ${IPTABLES} -t nat -A PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
  /build/target/product/
core_minimal.mk 51 iptables \
core_tiny.mk 55 iptables \
  /external/iproute2/
configure 33 #check if we have xtables from iptables >= 1.4.5.
145 echo "using iptables"
154 for file in $dir/{xtables,iptables}/lib*t_*so ; do
199 echo -n "iptables modules directory: "
  /external/chromium_org/media/tools/constrained_network_server/
traffic_control.py 52 _Exec(['sudo', '-n', 'iptables', '-help'],
53 msg=('Cannot run \'iptables\' command. Traffic Control must be run '
126 """Deletes the root qdisc and all iptables rules.
298 command = ['sudo', 'iptables', '-t', 'nat', '-A', 'PREROUTING', '-i',
301 _Exec(command, msg='Error adding iptables rule for port %d.' % port)
304 command = ['sudo', 'iptables', '-t', 'nat', '-A', 'OUTPUT', '-p', 'tcp',
306 _Exec(command, msg='Error adding iptables rule for port %d.' % port)
317 command = ['sudo', 'iptables', '-t', 'nat', '-D', 'PREROUTING', '-i',
320 _Exec(command, msg='Error deleting iptables rule for port %d.' % port)
322 command = ['sudo', 'iptables', '-t', 'nat', '-D', 'OUTPUT', '-p', 'tcp'
    [all...]
  /external/iptables/extensions/
libip6t_DNAT.c 13 #include <iptables.h>
libip6t_SNAT.c 13 #include <iptables.h>
libipt_DNAT.c 6 #include <iptables.h> /* get_kernel_version */
libipt_SNAT.c 6 #include <iptables.h>
  /external/iproute2/tc/
m_ipt.c 2 * m_ipt.c iptables based targets
3 * utilities mostly ripped from iptables <duh, its the linux way>
18 #include <iptables.h>
100 "Perhaps iptables or your kernel needs to be upgraded.\n");
104 /* stolen from iptables 1.2.11
202 perror("iptables: calloc failed");

Completed in 5748 milliseconds