/external/iptables/extensions/ |
libip6t_SNAT.t | 3 -j SNAT --to-source dead::beef;=;OK 4 -j SNAT --to-source dead::beef-dead::fee7;=;OK 5 -p tcp -j SNAT --to-source [dead::beef]:1025-65535;=;OK 6 -p tcp -j SNAT --to-source [dead::beef-dead::fee7]:1025-65535;=;OK 7 -p tcp -j SNAT --to-source [dead::beef-dead::fee7]:1025-65536;;FAIL 8 -j SNAT;;FAIL
|
libipt_SNAT.t | 3 -j SNAT --to-source 1.1.1.1;=;OK 4 -j SNAT --to-source 1.1.1.1-1.1.1.10;=;OK 5 -p tcp -j SNAT --to-source 1.1.1.1:1025-65535;=;OK 6 -p tcp -j SNAT --to-source 1.1.1.1-1.1.1.10:1025-65535;=;OK 7 -p tcp -j SNAT --to-source 1.1.1.1-1.1.1.10:1025-65536;;FAIL 8 -j SNAT;;FAIL
|
libxt_MASQUERADE.man | 6 connections: if you have a static IP address, you should use the SNAT 17 .B SNAT
|
libxt_conntrack.t | 7 -m conntrack --ctstate SNAT,DNAT;=;OK
|
libip6t_SNAT.c | 4 * Based on Rusty Russell's IPv4 SNAT target. Development of IPv6 NAT 33 "SNAT target options:\n" 173 "SNAT: Multiple --to-source not supported"); 279 xt_xlate_add(xl, "snat to "); 301 .name = "SNAT",
|
libipt_SNAT.c | 34 "SNAT target options:\n" 177 "SNAT: Multiple --to-source not supported"); 285 xt_xlate_add(xl, "snat to "); 308 .name = "SNAT",
|
libxt_SNAT.man | 45 .B SNAT
|
libxt_conntrack.c | 75 "[!] --ctstate {INVALID|ESTABLISHED|NEW|RELATED|UNTRACKED|SNAT|DNAT}[,...]\n" 201 else if (strncasecmp(state, "SNAT", len) == 0) 242 else if (strncasecmp(state, "SNAT", z) == 0) [all...] |
/prebuilts/gcc/linux-x86/host/x86_64-linux-glibc2.15-4.8/sysroot/usr/include/linux/netfilter_bridge/ |
ebt_nat.h | 10 #define EBT_SNAT_TARGET "snat"
|
/external/kernel-headers/original/uapi/linux/netfilter_bridge/ |
ebt_nat.h | 13 #define EBT_SNAT_TARGET "snat"
|
/external/libnetfilter_conntrack/src/conntrack/ |
objopt.c | 57 ct->snat.min_ip.v4 = ct->repl.dst.v4; 58 ct->snat.max_ip.v4 = ct->snat.min_ip.v4; 63 memcpy(&ct->snat.min_ip.v6, &ct->repl.dst.v6, 65 memcpy(&ct->snat.max_ip.v6, &ct->snat.min_ip.v6, 100 ct->snat.l4min.all = ct->repl.l4dst.tcp.port; 101 ct->snat.l4max.all = ct->snat.l4min.all;
|
copy.c | 290 dest->snat.min_ip.v4 = orig->snat.min_ip.v4; 302 memcpy(&dest->snat.min_ip.v6, &orig->snat.min_ip.v6, 316 dest->snat.l4min.all = orig->snat.l4min.all;
|
setter.c | 240 ct->snat.min_ip.v4 = ct->snat.max_ip.v4 = *((uint32_t *) value); 252 memcpy(&ct->snat.min_ip.v6, value, sizeof(struct in6_addr)); 253 memcpy(&ct->snat.max_ip.v6, value, sizeof(struct in6_addr)); 266 ct->snat.l4min.all = ct->snat.l4max.all = *((uint16_t *) value);
|
build.c | 303 __build_nat(req, size, &ct->snat, l3protonum); 304 __build_protonat(req, size, ct, &ct->snat); 315 __build_nat(req, size, &ct->snat, AF_INET); 326 __build_nat(req, size, &ct->snat, AF_INET6); 337 __build_protonat(req, size, ct, &ct->snat);
|
build_mnl.c | 291 nfct_build_nat(nlh, &ct->snat, l3protonum); 292 nfct_build_protonat(nlh, ct, &ct->snat); 303 nfct_build_nat(nlh, &ct->snat, AF_INET); 314 nfct_build_nat(nlh, &ct->snat, AF_INET6); 325 nfct_build_protonat(nlh, ct, &ct->snat);
|
getter.c | 209 return &ct->snat.min_ip.v4; 219 return &ct->snat.min_ip.v6; 229 return &ct->snat.l4min.all;
|
/bionic/libc/kernel/uapi/linux/netfilter_bridge/ |
ebt_nat.h | 27 #define EBT_SNAT_TARGET "snat"
|
/external/iproute2/man/man8/ |
tc-nat.8 | 40 Translate source addresses, i.e. perform SNAT.
|
/external/iptables/iptables/ |
iptables-xml.1.in | 47 target like SNAT and another chain.
|
iptables-xml.c | 355 // (or I guess -j SNAT in nat table, but we don't check for that yet
|
/external/libnetfilter_conntrack/include/internal/ |
object.h | 178 struct __nfct_nat snat; member in struct:nf_conntrack
|
/external/libnl/lib/netfilter/ |
ct_obj.c | 250 PRINT_FLAG("SNAT"); 512 __ADD(IPS_SRC_NAT, snat)
|
/external/iproute2/ip/ |
iproute.c | 502 PRTFL(SNAT, "src-nat"); [all...] |
/external/iptables/libiptc/ |
libiptc.c | 93 IPTCC_R_MODULE, /* extension module (SNAT, ...) */ [all...] |