HomeSort by relevance Sort by last modified time
    Searched full:firewall (Results 1 - 25 of 217) sorted by null

1 2 3 4 5 6 7 8 9

  /external/ltp/tools/pounder21/test_scripts/
ipmitool 53 runtest firewall info lun 0 netfn 0
54 runtest firewall info lun 0 netfn 1
55 runtest firewall info lun 0 netfn 4
56 runtest firewall info lun 0 netfn 0 command 0
57 runtest firewall info lun 0 netfn 0 command 1
58 runtest firewall info lun 0 netfn 0 command 2
59 runtest firewall info lun 0 netfn 1 command 0
60 runtest firewall info lun 0 netfn 1 command 1
61 runtest firewall info lun 0 netfn 1 command 2
62 runtest firewall info lun 0 netfn 4 command
    [all...]
  /external/autotest/client/site_tests/network_FirewallHolePunch/
control 7 PURPOSE = "Verifies the Chrome applications can punch a hole in the firewall"
10 firewall or if the socket is not closed when no longer in use.
18 This test verifies holes can be punched in the ChromeOS firewall.
  /external/autotest/server/site_tests/network_FirewallHolePunchServer/
control 7 PURPOSE = "Verify Chrome apps can open holes in the firewall"
9 Test will pass if Chrome apps can open holes in the firewall, that those
18 This test checks network firewall manipulations. See CRITERIA for more
  /external/autotest/client/site_tests/platform_Firewall/
control 7 Integration test for the firewall service.
8 Tests whether firewall rules can be added using D-Bus.
  /external/autotest/client/site_tests/security_Firewall/
control 6 DOC = "Enforces firewall settings."
  /system/netd/server/
FirewallController.h 30 // WHITELIST means the firewall denies all by default, uids must be explicitly ALLOWed
31 // BLACKLIST means the firewall allows all by default, uids must be explicitly DENYed
41 * Simple firewall that drops all packets except those matching explicitly
  /external/autotest/server/site_tests/buffet_WebServerSanity/
control 14 payload. This verifies the web server operation as well as the firewall to
  /frameworks/base/services/core/java/com/android/server/updates/
IntentFirewallInstallReceiver.java 19 import com.android.server.firewall.IntentFirewall;
  /external/mdnsresponder/mDNSWindows/SystemService/
Firewall.cpp 25 #include "Firewall.h"
49 // Use COM to get a reference to the firewall settings manager. This
55 // Use the reference to get the local firewall policy
64 // on the firewall service. Re-trying the method will succeed within
406 // Connect to the firewall
418 // Disconnect from the firewall
459 // Connect to the firewall
469 // Disconnect from the firewall
  /external/autotest/client/tests/isic/
help 12 firewall rules or find bugs in the IP stack.
24 firewall, or singe the fur off your cat
  /external/iptables/extensions/
libxt_SET.man 12 map packet properties (firewall mark, tc priority, hardware queue)
31 map firewall mark to packet by lookup of value in the set
libxt_TCPMSS.man 12 firewall/router, but machines behind it can never exchange large
21 Workaround: activate this option and add a rule to your firewall
  /external/iptables/iptables/
ip6tables-standalone.c 13 * iptables -- IP firewall administration for kernels with
14 * firewall table (aimed for the 2.3 kernels)
iptables-standalone.c 13 * iptables -- IP firewall administration for kernels with
14 * firewall table (aimed for the 2.3 kernels)
xtables-arp-standalone.c 13 * arptables -- IP firewall administration for kernels with
14 * firewall table (aimed for the 2.3 kernels)
xtables-eb-standalone.c 13 * arptables -- IP firewall administration for kernels with
14 * firewall table (aimed for the 2.3 kernels)
xtables-standalone.c 13 * iptables -- IP firewall administration for kernels with
14 * firewall table (aimed for the 2.3 kernels)
  /external/webrtc/webrtc/base/
httprequest.h 40 void set_firewall(FirewallManager * firewall) {
41 firewall_ = firewall;
  /external/iproute2/include/uapi/linux/netfilter_ipv4/
ip_tables.h 9 * Format of an IP firewall descriptor
101 /* This structure defines each of the firewall rules. Consists of 3
126 * New IP firewall options for [gs]etsockopt at the RAW IP level.
227 * Main firewall chains definitions and global var's definitions.
  /external/iproute2/man/man8/
tc-fw.8 1 .TH "Firewall mark classifier in tc" 8 "21 Oct 2015" "iproute2" "Linux"
tc-skbedit.8 52 Change the packet's firewall mark value.
  /external/iptables/include/linux/netfilter_arp/
arp_tables.h 2 * Format of an ARP firewall descriptor
89 /* This structure defines each of the firewall rules. Consists of 3
112 * New IP firewall options for [gs]etsockopt at the RAW IP level.
202 * Main firewall chains definitions and global var's definitions.
  /external/iptables/include/linux/netfilter_ipv4/
ip_tables.h 8 * Format of an IP firewall descriptor
99 /* This structure defines each of the firewall rules. Consists of 3
124 * New IP firewall options for [gs]etsockopt at the RAW IP level.
225 * Main firewall chains definitions and global var's definitions.
  /external/iptables/include/linux/netfilter_ipv6/
ip6_tables.h 8 * Format of an IP6 firewall descriptor
103 /* This structure defines each of the firewall rules. Consists of 3
161 * New IP firewall options for [gs]etsockopt at the RAW IP level.
265 * Main firewall chains definitions and global var's definitions.
  /external/kernel-headers/original/uapi/linux/netfilter_arp/
arp_tables.h 3 * Format of an ARP firewall descriptor
93 /* This structure defines each of the firewall rules. Consists of 3
116 * New IP firewall options for [gs]etsockopt at the RAW IP level.
206 * Main firewall chains definitions and global var's definitions.

Completed in 895 milliseconds

1 2 3 4 5 6 7 8 9