OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
refs:iptables
(Results
1 - 25
of
37
) sorted by null
1
2
/external/iptables/iptables/
Android.mk
12
# The
iptables
lock file
23
#
iptables
42
xtables-multi.c
iptables
-xml.c xshared.c \
43
iptables
-save.c
iptables
-restore.c \
44
iptables
-standalone.c
iptables
.c
47
LOCAL_MODULE:=
iptables
56
ln -sf
iptables
$(TARGET_OUT)/bin/
iptables
-save;
[
all
...]
iptables-apply
3
#
iptables
-apply -- a safer way to update
iptables
remotely
18
$PROGNAME $VERSION -- a safer way to update
iptables
remotely
43
The script will try to apply a new ruleset (as output by
iptables
-save/read
44
by
iptables
-restore) to
iptables
, then prompt the user whether the changes
96
SAVE=
iptables
-save
97
RESTORE=
iptables
-restore
98
DEFAULT_FILE=/etc/network/
iptables
130
echo "E:
iptables
support lacking from the kernel." >&
[
all
...]
iptables-standalone.c
13
*
iptables
-- IP firewall administration for kernels with
16
* See the accompanying manual page
iptables
(8) for information
39
#include <
iptables
.h>
40
#include "
iptables
-multi.h"
51
iptables_globals.program_name = "
iptables
";
72
fprintf(stderr, "
iptables
: %s. "
76
fprintf(stderr, "
iptables
: %s.\n",
xtables-eb-standalone.c
39
#include <
iptables
.h>
xtables-standalone.c
13
*
iptables
-- IP firewall administration for kernels with
16
* See the accompanying manual page
iptables
(8) for information
38
#include <
iptables
.h>
81
fprintf(stderr, "
iptables
: %s. "
85
fprintf(stderr, "
iptables
: %s.\n",
98
return xtables_main(NFPROTO_IPV4, "
iptables
", argc, argv);
xtables-translate.c
14
#include <
iptables
.h>
29
#include <
iptables
.h>
500
return xtables_xlate_main(NFPROTO_IPV4, "
iptables
-translate",
513
"
iptables
-translate-restore",
/external/wpa_supplicant_8/wpa_supplicant/examples/
p2p-action-udhcp.sh
54
iptables
-P FORWARD DROP
55
iptables
-t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
56
iptables
-A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
57
iptables
-A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
66
iptables
-t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
67
iptables
-D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
68
iptables
-D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
p2p-action.sh
81
iptables
-P FORWARD DROP
82
iptables
-t nat -A POSTROUTING -o $UPLINK -j MASQUERADE
83
iptables
-A FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
84
iptables
-A FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
93
iptables
-t nat -D POSTROUTING -o $UPLINK -j MASQUERADE
94
iptables
-D FORWARD -i $UPLINK -o $GIFNAME -m state --state RELATED,ESTABLISHED -j ACCEPT
95
iptables
-D FORWARD -i $GIFNAME -o $UPLINK -j ACCEPT
/external/iptables/
iptables-test.py
18
IPTABLES
= "
iptables
"
20
#
IPTABLES
= "xtables -4"
23
IPTABLES_SAVE = "
iptables
-save"
29
LOGFILE="/tmp/
iptables
-test.log"
50
def delete_rule(
iptables
, rule, filename, lineno):
52
Removes an
iptables
rule
54
cmd =
iptables
+ " -D " + rule
57
reason = "cannot delete: " +
iptables
+ " -I " + rule
64
def run_test(
iptables
, rule, rule_save, res, filename, lineno)
[
all
...]
/external/ltp/testcases/network/iptables/
iptables_tests.sh
24
export TCID="
iptables
"
37
iptables
-L > tst_iptables.out 2>&1
39
tst_brkm TBROK "no
iptables
support in kenrel."
44
iptables
-F -t filter > tst_iptables.out 2>&1
45
iptables
-F -t nat > tst_iptables.out 2>&1
46
iptables
-F -t mangle > tst_iptables.out 2>&1
53
iptables
-F -t filter > tst_iptables.out 2>&1
54
iptables
-F -t nat > tst_iptables.out 2>&1
55
iptables
-F -t mangle > tst_iptables.out 2>&1
70
local cmd="
iptables
-L -t filter
[
all
...]
/system/netd/server/
WakeupController.h
34
//
iptables
chain where wakeup packets are matched
37
WakeupController(ReportFn report, IptablesRestoreInterface*
iptables
)
38
: mReport(report), mIptables(
iptables
) {}
45
// Install
iptables
rules to match packets arriving on |ifName|
52
// Remove
iptables
rules previously installed by addInterface().
/development/scripts/
reverse_tether.sh
157
sudo
iptables
-F
158
sudo
iptables
-t nat -F
159
sudo
iptables
-t nat -A POSTROUTING -o $LAN_DEV -j MASQUERADE
160
sudo
iptables
-P FORWARD ACCEPT
165
sudo
iptables
-A FORWARD -m state --state RELATED,ESTABLISHED -j ACCEPT
166
sudo
iptables
-A FORWARD -m state --state NEW -i $HOST_DEV -j ACCEPT
167
sudo
iptables
-P FORWARD DROP
172
sudo
iptables
-F
173
sudo
iptables
-t nat -F
/external/iproute2/include/
ip6tables.h
7
#include <
iptables
/internal.h>
iptables.h
7
#include <
iptables
/internal.h>
/external/iptables/include/
ip6tables.h
7
#include <
iptables
/internal.h>
iptables.h
7
#include <
iptables
/internal.h>
/external/iptables/libxtables/
Android.mk
9
$(LOCAL_PATH)/../
iptables
/ \
30
$(LOCAL_PATH)/../
iptables
/ \
/external/dnsmasq/contrib/port-forward/
dnsmasq-portforward
20
IPTABLES
=/sbin/
iptables
55
${
IPTABLES
} -t nat -D PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
57
${
IPTABLES
} -t nat -A PREROUTING -p $protocol --destination-port $src -j DNAT --to-destination ${3}:$dst
/external/walt/docs/
ChromeOS.md
39
- `
iptables
-A INPUT -p tcp --dport 50007 -j ACCEPT`
42
The script will respond with `Listening on port 50007`. It can be stopped by pressing Ctrl-C. At this point you should be able to use the WALT Android app as if it's running on a regular Android device. If you reset or reconnect the WALT device, you'll need to re-run the script (no need to re-run the
iptables
command).
Development.md
43
1. `
iptables
-A INPUT -p tcp --dport 50007 -j ACCEPT`
/build/make/target/product/
core_tiny.mk
59
iptables
\
core_minimal.mk
60
iptables
\
/system/netd/netutils_wrappers/
Android.mk
30
ln -sf netutils-wrapper-1.0 $(TARGET_OUT)/bin/
iptables
-wrapper-1.0; \
/kernel/tests/net/test/
net_test.py
326
iptables
= {4: "
iptables
", 6: "ip6tables"}[version]
327
iptables_path = "/sbin/" +
iptables
329
iptables_path = "/system/bin" +
iptables
/external/iproute2/
configure
62
#check if we have xtables from
iptables
>= 1.4.5.
174
echo "using
iptables
"
189
for file in $dir/{xtables,
iptables
}/lib*t_*so ; do
338
echo -n "
iptables
modules directory: "
Completed in 2326 milliseconds
1
2