OpenGrok
Home
Sort by relevance
Sort by last modified time
Full Search
Definition
Symbol
File Path
History
|
|
Help
Searched
full:firewall
(Results
1 - 25
of
217
) sorted by null
1
2
3
4
5
6
7
8
9
/external/ltp/tools/pounder21/test_scripts/
ipmitool
53
runtest
firewall
info lun 0 netfn 0
54
runtest
firewall
info lun 0 netfn 1
55
runtest
firewall
info lun 0 netfn 4
56
runtest
firewall
info lun 0 netfn 0 command 0
57
runtest
firewall
info lun 0 netfn 0 command 1
58
runtest
firewall
info lun 0 netfn 0 command 2
59
runtest
firewall
info lun 0 netfn 1 command 0
60
runtest
firewall
info lun 0 netfn 1 command 1
61
runtest
firewall
info lun 0 netfn 1 command 2
62
runtest
firewall
info lun 0 netfn 4 command
[
all
...]
/external/autotest/client/site_tests/network_FirewallHolePunch/
control
7
PURPOSE = "Verifies the Chrome applications can punch a hole in the
firewall
"
10
firewall
or if the socket is not closed when no longer in use.
18
This test verifies holes can be punched in the ChromeOS
firewall
.
/external/autotest/server/site_tests/network_FirewallHolePunchServer/
control
7
PURPOSE = "Verify Chrome apps can open holes in the
firewall
"
9
Test will pass if Chrome apps can open holes in the
firewall
, that those
18
This test checks network
firewall
manipulations. See CRITERIA for more
/external/autotest/client/site_tests/platform_Firewall/
control
7
Integration test for the
firewall
service.
8
Tests whether
firewall
rules can be added using D-Bus.
/external/autotest/client/site_tests/security_Firewall/
control
6
DOC = "Enforces
firewall
settings."
/system/netd/server/
FirewallController.h
30
// WHITELIST means the
firewall
denies all by default, uids must be explicitly ALLOWed
31
// BLACKLIST means the
firewall
allows all by default, uids must be explicitly DENYed
41
* Simple
firewall
that drops all packets except those matching explicitly
/external/autotest/server/site_tests/buffet_WebServerSanity/
control
14
payload. This verifies the web server operation as well as the
firewall
to
/frameworks/base/services/core/java/com/android/server/updates/
IntentFirewallInstallReceiver.java
19
import com.android.server.
firewall
.IntentFirewall;
/external/mdnsresponder/mDNSWindows/SystemService/
Firewall.cpp
25
#include "
Firewall
.h"
49
// Use COM to get a reference to the
firewall
settings manager. This
55
// Use the reference to get the local
firewall
policy
64
// on the
firewall
service. Re-trying the method will succeed within
406
// Connect to the
firewall
418
// Disconnect from the
firewall
459
// Connect to the
firewall
469
// Disconnect from the
firewall
/external/autotest/client/tests/isic/
help
12
firewall
rules or find bugs in the IP stack.
24
firewall
, or singe the fur off your cat
/external/iptables/extensions/
libxt_SET.man
12
map packet properties (
firewall
mark, tc priority, hardware queue)
31
map
firewall
mark to packet by lookup of value in the set
libxt_TCPMSS.man
12
firewall
/router, but machines behind it can never exchange large
21
Workaround: activate this option and add a rule to your
firewall
/external/iptables/iptables/
ip6tables-standalone.c
13
* iptables -- IP
firewall
administration for kernels with
14
*
firewall
table (aimed for the 2.3 kernels)
iptables-standalone.c
13
* iptables -- IP
firewall
administration for kernels with
14
*
firewall
table (aimed for the 2.3 kernels)
xtables-arp-standalone.c
13
* arptables -- IP
firewall
administration for kernels with
14
*
firewall
table (aimed for the 2.3 kernels)
xtables-eb-standalone.c
13
* arptables -- IP
firewall
administration for kernels with
14
*
firewall
table (aimed for the 2.3 kernels)
xtables-standalone.c
13
* iptables -- IP
firewall
administration for kernels with
14
*
firewall
table (aimed for the 2.3 kernels)
/external/webrtc/webrtc/base/
httprequest.h
40
void set_firewall(FirewallManager *
firewall
) {
41
firewall_ =
firewall
;
/external/iproute2/include/uapi/linux/netfilter_ipv4/
ip_tables.h
9
* Format of an IP
firewall
descriptor
101
/* This structure defines each of the
firewall
rules. Consists of 3
126
* New IP
firewall
options for [gs]etsockopt at the RAW IP level.
227
* Main
firewall
chains definitions and global var's definitions.
/external/iproute2/man/man8/
tc-fw.8
1
.TH "
Firewall
mark classifier in tc" 8 "21 Oct 2015" "iproute2" "Linux"
tc-skbedit.8
52
Change the packet's
firewall
mark value.
/external/iptables/include/linux/netfilter_arp/
arp_tables.h
2
* Format of an ARP
firewall
descriptor
89
/* This structure defines each of the
firewall
rules. Consists of 3
112
* New IP
firewall
options for [gs]etsockopt at the RAW IP level.
202
* Main
firewall
chains definitions and global var's definitions.
/external/iptables/include/linux/netfilter_ipv4/
ip_tables.h
8
* Format of an IP
firewall
descriptor
99
/* This structure defines each of the
firewall
rules. Consists of 3
124
* New IP
firewall
options for [gs]etsockopt at the RAW IP level.
225
* Main
firewall
chains definitions and global var's definitions.
/external/iptables/include/linux/netfilter_ipv6/
ip6_tables.h
8
* Format of an IP6
firewall
descriptor
103
/* This structure defines each of the
firewall
rules. Consists of 3
161
* New IP
firewall
options for [gs]etsockopt at the RAW IP level.
265
* Main
firewall
chains definitions and global var's definitions.
/external/kernel-headers/original/uapi/linux/netfilter_arp/
arp_tables.h
3
* Format of an ARP
firewall
descriptor
93
/* This structure defines each of the
firewall
rules. Consists of 3
116
* New IP
firewall
options for [gs]etsockopt at the RAW IP level.
206
* Main
firewall
chains definitions and global var's definitions.
Completed in 895 milliseconds
1
2
3
4
5
6
7
8
9