/external/iptables/iptables/tests/shell/testcases/ipt-restore/ |
D | 0003-restore-ordering_0 | 17 -A FORWARD -m comment --comment "rule 4" -j ACCEPT 18 -I FORWARD 1 -m comment --comment "rule 1" -j ACCEPT 19 -I FORWARD 2 -m comment --comment "rule 2" -j ACCEPT 20 -I FORWARD 3 -m comment --comment "rule 3" -j ACCEPT 35 -A FORWARD -m comment --comment "rule 5" -j ACCEPT 36 -I FORWARD 1 -m comment --comment "rule 0.5" -j ACCEPT 37 -I FORWARD 3 -m comment --comment "rule 1.5" -j ACCEPT 38 -I FORWARD 5 -m comment --comment "rule 2.5" -j ACCEPT 39 -I FORWARD 7 -m comment --comment "rule 3.5" -j ACCEPT 40 -I FORWARD 9 -m comment --comment "rule 4.5" -j ACCEPT [all …]
|
/external/icu/icu4c/source/data/translit/ |
D | root.txt | 24 direction {"FORWARD"} 34 direction {"FORWARD"} 53 direction {"FORWARD"} 75 direction {"FORWARD"} 100 direction {"FORWARD"} 113 direction {"FORWARD"} 126 direction {"FORWARD"} 139 direction {"FORWARD"} 152 direction {"FORWARD"} 165 direction {"FORWARD"} [all …]
|
/external/iptables/extensions/ |
D | libebt_ip6.txlate | 1 ebtables-translate -A FORWARD -p ip6 --ip6-src ! dead::beef/64 -j ACCEPT 2 nft add rule bridge filter FORWARD ip6 saddr != dead::/64 counter accept 4 ebtables-translate -A FORWARD -p ip6 ! --ip6-dst dead:beef::/64 -j ACCEPT 5 nft add rule bridge filter FORWARD ip6 daddr != dead:beef::/64 counter accept 7 ebtables-translate -I FORWARD -p ip6 --ip6-dst f00:ba:: 8 nft insert rule bridge filter FORWARD ip6 daddr f00:ba:: counter 13 ebtables-translate -A FORWARD -p ip6 --ip6-proto tcp --ip6-dport 22 14 nft add rule bridge filter FORWARD ether type ip6 tcp dport 22 counter 16 ebtables-translate -A FORWARD -p ip6 --ip6-proto udp --ip6-sport 1024:65535 17 nft add rule bridge filter FORWARD ether type ip6 udp sport 1024-65535 counter [all …]
|
D | libebt_ip.txlate | 1 ebtables-translate -A FORWARD -p ip --ip-src ! 192.168.0.0/24 -j ACCEPT 2 nft add rule bridge filter FORWARD ip saddr != 192.168.0.0/24 counter accept 4 ebtables-translate -I FORWARD -p ip --ip-dst 10.0.0.1 5 nft insert rule bridge filter FORWARD ip daddr 10.0.0.1 counter 10 ebtables-translate -A FORWARD -p ip --ip-proto tcp --ip-dport 22 11 nft add rule bridge filter FORWARD tcp dport 22 counter 13 ebtables-translate -A FORWARD -p ip --ip-proto udp --ip-sport 1024:65535 14 nft add rule bridge filter FORWARD udp sport 1024-65535 counter 16 ebtables-translate -A FORWARD -p ip --ip-proto 253 17 nft add rule bridge filter FORWARD ip protocol 253 counter [all …]
|
D | libxt_devgroup.txlate | 1 iptables-translate -A FORWARD -m devgroup --src-group 0x2 -j ACCEPT 2 nft add rule ip filter FORWARD iifgroup 0x2 counter accept 4 iptables-translate -A FORWARD -m devgroup --dst-group 0xc/0xc -j ACCEPT 5 nft add rule ip filter FORWARD oifgroup and 0xc == 0xc counter accept 10 iptables-translate -A FORWARD -m devgroup ! --dst-group 0xc/0xc -j ACCEPT 11 nft add rule ip filter FORWARD oifgroup and 0xc != 0xc counter accept 13 iptables-translate -A FORWARD -m devgroup ! --src-group 0x2 -j ACCEPT 14 nft add rule ip filter FORWARD iifgroup != 0x2 counter accept 16 iptables-translate -A FORWARD -m devgroup ! --src-group 0x2 --dst-group 0xc/0xc -j ACCEPT 17 nft add rule ip filter FORWARD iifgroup != 0x2 oifgroup and 0xc != 0xc counter accept
|
D | libip6t_REJECT.txlate | 1 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT 2 nft add rule ip6 filter FORWARD tcp dport 22 counter reject 4 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with icmp6-reject-route 5 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with icmpv6 type reject-route 7 ip6tables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with tcp-reset 8 nft add rule ip6 filter FORWARD tcp dport 22 counter reject with tcp reset
|
D | libipt_REJECT.txlate | 1 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT 2 nft add rule ip filter FORWARD tcp dport 22 counter reject 4 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with icmp-net-unreachable 5 nft add rule ip filter FORWARD tcp dport 22 counter reject with icmp type net-unreachable 7 iptables-translate -A FORWARD -p TCP --dport 22 -j REJECT --reject-with tcp-reset 8 nft add rule ip filter FORWARD tcp dport 22 counter reject with tcp reset
|
D | libxt_physdev.t | 1 :INPUT,FORWARD 4 :OUTPUT,FORWARD 5 # xt_physdev: using --physdev-out in the OUTPUT, FORWARD and POSTROUTING chains for non-bridged tra… 6 # ERROR: should fail: iptables -A FORWARD -m physdev --physdev-out lo 10 :FORWARD
|
D | libxt_helper.txlate | 1 iptables-translate -A FORWARD -m helper --helper sip 2 nft add rule ip filter FORWARD ct helper \"sip\" counter 4 iptables-translate -A FORWARD -m helper ! --helper ftp 5 nft add rule ip filter FORWARD ct helper != \"ftp\" counter
|
D | libipt_LOG.txlate | 1 iptables-translate -A FORWARD -p tcp -j LOG --log-level error 2 nft add rule ip filter FORWARD ip protocol tcp counter log level err 4 iptables-translate -A FORWARD -p tcp -j LOG --log-prefix "Random prefix" 5 nft add rule ip filter FORWARD ip protocol tcp counter log prefix \"Random prefix\"
|
/external/iptables/iptables/tests/shell/testcases/ipt-save/dumps/ |
D | ipt-save-filter.txt | 4 :FORWARD DROP [0:0] 18 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p udp -m udp --dport 4166 -j ACCEPT 19 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4180 -j ACCEPT 20 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 4162 -j ACCEPT 21 -A FORWARD -d 192.168.100.77/32 -i ppp0 -p tcp -m tcp --dport 20376 -j ACCEPT 22 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 10209 -j ACCEPT 23 -A FORWARD -d 192.168.100.2/32 -i ppp0 -p tcp -m tcp --dport 881 -j ACCEPT 24 -A FORWARD ! -s 192.168.0.0/24 -i eth2 -p icmp -j DROP 25 -A FORWARD ! -s 192.168.0.0/24 -i eth2 -p udp -j DROP 26 -A FORWARD ! -s 192.168.0.0/24 -i eth2 -p tcp -j DROP [all …]
|
D | fedora27-iptables | 6 :FORWARD ACCEPT [0:0] 24 [0:0] -A FORWARD -j FORWARD_direct 62 :FORWARD ACCEPT [0:0] 96 [0:0] -A FORWARD -d 192.168.122.0/24 -o virbr0 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 97 [0:0] -A FORWARD -s 192.168.122.0/24 -i virbr0 -j ACCEPT 98 [0:0] -A FORWARD -i virbr0 -o virbr0 -j ACCEPT 99 [0:0] -A FORWARD -o virbr0 -j REJECT --reject-with icmp-port-unreachable 100 [0:0] -A FORWARD -i virbr0 -j REJECT --reject-with icmp-port-unreachable 101 [0:0] -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 102 [0:0] -A FORWARD -i lo -j ACCEPT [all …]
|
D | fedora27-ip6tables | 5 :FORWARD ACCEPT [0:0] 23 -A FORWARD -j FORWARD_direct 60 :FORWARD ACCEPT [0:0] 90 -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 91 -A FORWARD -i lo -j ACCEPT 92 -A FORWARD -j FORWARD_direct 93 -A FORWARD -j FORWARD_IN_ZONES_SOURCE 94 -A FORWARD -j FORWARD_IN_ZONES 95 -A FORWARD -j FORWARD_OUT_ZONES_SOURCE 96 -A FORWARD -j FORWARD_OUT_ZONES [all …]
|
D | wireless.txt | 14 :FORWARD DROP [0:0] 44 -A FORWARD -i bond0.10 -j ACCEPT 45 -A FORWARD -m conntrack --ctstate INVALID -j L_DROP 46 -A FORWARD -p tcp -m tcp --tcp-flags FIN,SYN,RST SYN -j TCPMSS --clamp-mss-to-pmtu 47 -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j L_ACCEPT 48 -A FORWARD -d 10.31.63.80/30 -o bond0.10 -j L_ACCEPT 49 -A FORWARD -o bond0.11 -j CUST_I16_IN 50 -A FORWARD -i bond0.11 -j CUST_I16_OUT 51 -A FORWARD -o bond0.12 -j CUST_I15_IN 52 -A FORWARD -i bond0.12 -j CUST_I15_OUT [all …]
|
/external/iptables/iptables/tests/shell/testcases/iptables/ |
D | 0005-rule-replace_0 | 12 $XT_MULTI iptables -A FORWARD -m comment --comment "rule 1" -j ACCEPT 13 $XT_MULTI iptables -A FORWARD -m comment --comment "rule 2" -j ACCEPT 14 $XT_MULTI iptables -A FORWARD -m comment --comment "rule 3" -j ACCEPT 16 $XT_MULTI iptables -R FORWARD 2 -m comment --comment "replaced 2" -j ACCEPT 24 $XT_MULTI iptables -R FORWARD 1 -m comment --comment "replaced 1" -j ACCEPT 32 $XT_MULTI iptables -R FORWARD 3 -m comment --comment "replaced 3" -j ACCEPT
|
D | 0002-verbose-output_0 | 13 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI iptables -v -A FORWARD $RULE1) 14 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI iptables -v -I FORWARD 2 $RULE2) 16 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI iptables -v -C FORWARD $RULE1) 17 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI iptables -v -C FORWARD $RULE2) 34 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI iptables -v -D FORWARD $RULE1) 35 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI iptables -v -D FORWARD $RULE2)
|
D | 0003-list-rules_0 | 6 $XT_MULTI iptables -A FORWARD -i eth23 -o eth42 -j ACCEPT 7 $XT_MULTI iptables -A FORWARD -i eth42 -o eth23 -g foo 32 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI iptables -S FORWARD) 38 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI iptables -v -S FORWARD) 61 $XT_MULTI iptables -S FORWARD 234 || {
|
D | 0005-delete-rules_0 | 5 $XT_MULTI iptables -A FORWARD -i eth23 -o eth42 -j DROP 6 $XT_MULTI iptables -D FORWARD -i eth23 -o eth42 -j REJECT 12 $XT_MULTI iptables -A FORWARD -i eth23 -o eth42 -j MARK --set-mark 23 13 $XT_MULTI iptables -D FORWARD -i eth23 -o eth42 -j MARK --set-mark 42
|
/external/iptables/iptables/tests/shell/testcases/ip6tables/ |
D | 0002-verbose-output_0 | 13 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI ip6tables -v -A FORWARD $RULE1) 14 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI ip6tables -v -I FORWARD 2 $RULE2) 16 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI ip6tables -v -C FORWARD $RULE1) 17 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI ip6tables -v -C FORWARD $RULE2) 32 diff -u -Z <(echo -e "$VOUT1") <($XT_MULTI ip6tables -v -D FORWARD $RULE1) 33 diff -u -Z <(echo -e "$VOUT2") <($XT_MULTI ip6tables -v -D FORWARD $RULE2)
|
D | 0003-list-rules_0 | 6 $XT_MULTI ip6tables -A FORWARD -i eth23 -o eth42 -j ACCEPT 7 $XT_MULTI ip6tables -A FORWARD -i eth42 -o eth23 -g foo 32 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI ip6tables -S FORWARD) 38 diff -u -Z <(echo -e "$EXPECT") <($XT_MULTI ip6tables -v -S FORWARD) 61 $XT_MULTI ip6tables -S FORWARD 234 || {
|
/external/iptables/iptables/tests/shell/testcases/firewalld-restore/ |
D | 0001-firewalld_0 | 52 -I FORWARD 1 -j FORWARD_direct 86 -I FORWARD 1 -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 87 -I FORWARD 2 -i lo -j ACCEPT 88 -I FORWARD 3 -j FORWARD_direct 89 -I FORWARD 4 -j FORWARD_IN_ZONES_SOURCE 90 -I FORWARD 5 -j FORWARD_IN_ZONES 91 -I FORWARD 6 -j FORWARD_OUT_ZONES_SOURCE 92 -I FORWARD 7 -j FORWARD_OUT_ZONES 93 -I FORWARD 8 -m conntrack --ctstate INVALID -j DROP 94 -I FORWARD 9 -j REJECT --reject-with icmp-host-prohibited [all …]
|
/external/iptables/iptables/tests/shell/testcases/firewalld-restore/dumps/ |
D | ipt-save-completed.txt | 42 :FORWARD ACCEPT [0:0] 60 -A FORWARD -j FORWARD_direct 92 :FORWARD ACCEPT [0:0] 122 -A FORWARD -m conntrack --ctstate RELATED,ESTABLISHED -j ACCEPT 123 -A FORWARD -i lo -j ACCEPT 124 -A FORWARD -j FORWARD_direct 125 -A FORWARD -j FORWARD_IN_ZONES_SOURCE 126 -A FORWARD -j FORWARD_IN_ZONES 127 -A FORWARD -j FORWARD_OUT_ZONES_SOURCE 128 -A FORWARD -j FORWARD_OUT_ZONES [all …]
|
/external/icu/android_icu4j/src/main/tests/android/icu/dev/test/translit/ |
D | TransliteratorTest.java | 155 Transliterator foo = Transliterator.createFromRules(id, rules, Transliterator.FORWARD); in checkRegistry() 226 Transliterator.FORWARD); in TestSimpleRules() 286 Transliterator fwd = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestRuleBasedInverse() 303 +"a>A;", Transliterator.FORWARD); in TestKeyboard() 327 +"a>A;", Transliterator.FORWARD); in TestKeyboard2() 371 Transliterator t = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestKeyboard3() 459 …or tempTrans = Transliterator.createFromRules("temp", "x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering() 464 …Trans = Transliterator.createFromRules("temp", "::[a]; x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering() 532 … Transliterator t = Transliterator.createFromRules("<ID>", DATA[i], Transliterator.FORWARD); in TestPatternQuoting() 539 …iterator gl = Transliterator.createFromRules("foo5", "$\u2DC0 = qy; a>b;", Transliterator.FORWARD); in TestVariableNames() [all …]
|
/external/icu/icu4j/main/tests/translit/src/com/ibm/icu/dev/test/translit/ |
D | TransliteratorTest.java | 152 Transliterator foo = Transliterator.createFromRules(id, rules, Transliterator.FORWARD); in checkRegistry() 223 Transliterator.FORWARD); in TestSimpleRules() 283 Transliterator fwd = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestRuleBasedInverse() 300 +"a>A;", Transliterator.FORWARD); in TestKeyboard() 324 +"a>A;", Transliterator.FORWARD); in TestKeyboard2() 368 Transliterator t = Transliterator.createFromRules("<ID>", RULES, Transliterator.FORWARD); in TestKeyboard3() 456 …or tempTrans = Transliterator.createFromRules("temp", "x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering() 461 …Trans = Transliterator.createFromRules("temp", "::[a]; x > y; x{a} > b; ", Transliterator.FORWARD); in TestFiltering() 529 … Transliterator t = Transliterator.createFromRules("<ID>", DATA[i], Transliterator.FORWARD); in TestPatternQuoting() 536 …iterator gl = Transliterator.createFromRules("foo5", "$\u2DC0 = qy; a>b;", Transliterator.FORWARD); in TestVariableNames() [all …]
|
/external/iptables/etc/ |
D | xtables.conf | 10 chain FORWARD hook NF_INET_FORWARD prio -150 17 chain FORWARD hook NF_INET_FORWARD prio 0 30 chain FORWARD hook NF_INET_FORWARD prio 50 44 chain FORWARD hook NF_INET_FORWARD prio -150 51 chain FORWARD hook NF_INET_FORWARD prio 0 64 chain FORWARD hook NF_INET_FORWARD prio 50
|