summaryrefslogtreecommitdiff
Commit message (Expand)AuthorAgeFilesLines
...
* utils.h: Avoid name clashes for setbit/delbit/hasbitFlorian Fainelli2016-09-187-34/+34
* zones: allow untracked traffic as wellJo-Philipp Wich2016-08-081-2/+4
* defaults: disable drop_invalid by defaultJo-Philipp Wich2016-08-081-1/+0
* zones: restrict default ACCEPT rules to NEW ctstateJo-Philipp Wich2016-08-081-0/+8
* cmake: Find uci.hFlorian Fainelli2016-07-241-0/+3
* treewide: replace jow@openwrt.org with jo@mein.ioJo-Philipp Wich2016-06-0728-28/+28
* load running state after lock is acquiredAlin Năstac2016-05-021-2/+11
* set mark for locally generated traffic in OUTPUT chainDaniel Golle2016-04-281-1/+1
* defaults.c: remove toplevel_rule structAlexandru Ardelean2016-04-271-7/+0
* defaults: emit ctstate INVALID drop rules by defaultJo-Philipp Wich2016-01-291-0/+1
* iptables: fix inversion flagsLen White2016-01-291-10/+10
* Remove commented codeJo-Philipp Wich2016-01-241-37/+0
* Use xt_id match to track own rulesJo-Philipp Wich2016-01-248-62/+287
* redirects: only emit REDIRECT rules if dest_ip is unsetJo-Philipp Wich2015-05-261-33/+1
* Rework match initializationJo-Philipp Wich2015-05-263-62/+9
* Link libext dynamicallyJo-Philipp Wich2015-05-261-16/+3
* iptables: initialize multiport matchJo-Philipp Wich2015-05-221-0/+1
* ubus: allow proto handlers to override device in announced rulesJo-Philipp Wich2015-05-211-3/+5
* ubus: print rule name when reporting errorsJo-Philipp Wich2015-04-184-12/+23
* ubus: store rule origin as commentJo-Philipp Wich2015-04-181-4/+31
* firewall3: fix null pointer access when no target is presentHans Dedecker2015-02-261-11/+17
* redirects: fix possible null pointer accessJo-Philipp Wich2015-01-131-12/+12
* firewall3: fix left shift on 64 bit systems in fw3_bitlen2netmaskUlrich Weber2015-01-081-1/+1
* redirects: respect src_dip option for reflection rulesJo-Philipp Wich2015-01-083-14/+28
* options: allow '*' as value for protocols and familiesJo-Philipp Wich2014-09-191-2/+2
* utils: rework fw3_bitlen2netmask() IPv6 mask calculationJo-Philipp Wich2014-09-181-7/+7
* redirect: emit -j REDIRECT rules for local port forwardsJo-Philipp Wich2014-09-181-4/+23
* utils: fix invalid memory access in fw3_bitlen2netmask()Jo-Philipp Wich2014-09-171-2/+6
* utils: ifa_addr may be NULL, skip such entriesJo-Philipp Wich2014-08-111-2/+2
* Selectively flush conntrackJo-Philipp Wich2014-08-115-12/+142
* zones: make forward policy destination boundJo-Philipp Wich2014-07-211-3/+3
* options: fix logic flaw when parsing ipaddr/mask notationJo-Philipp Wich2014-07-191-8/+14
* Use netmasks instead of prefix lengths internallyJo-Philipp Wich2014-07-198-103/+149
* ubus: handle attribute access after NULL check in parse_subnets()Jo-Philipp Wich2014-07-101-5/+8
* ubus: fix fw3_ubus_address()Jo-Philipp Wich2014-07-101-6/+5
* ubus: fix fw3_ubus_device() to only return a pointer if a device was foundJo-Philipp Wich2014-07-101-10/+14
* options: fix fw3_parse_network() when destination pointer is not a listJo-Philipp Wich2014-07-031-2/+14
* ubus: add support for fetching firewall rules from procdFelix Fietkau2014-07-021-0/+39
* ubus: use blobmsg_parse to validate device attributes and decouple the found ...Felix Fietkau2014-06-301-18/+26
* make fw3_ubus_address take a list_head * argument instead of allocating & ret...Felix Fietkau2014-06-305-90/+68
* use calloc instead of malloc+memsetFelix Fietkau2014-06-308-35/+11
* ubus: use blobmsg_parse to validate data from network.interface:dumpFelix Fietkau2014-06-301-4/+5
* Add fw3 zone call to list devices in a zoneSteven Barth2014-06-261-0/+34
* Add support for netifd-generated rulesSteven Barth2014-04-149-44/+261
* Add support for device and direction parametersSteven Barth2014-04-146-0/+39
* snat: add support for connlimiting port-range SNATSteven Barth2014-04-143-0/+14
* Fix building with newer toolchainsSteven Barth2014-04-142-3/+3
* snat: ICMP can be port-natted as wellSteven Barth2014-04-141-1/+1
* nat: allow ACCEPT-target to explicitely disable NATSteven Barth2014-04-141-5/+10
* Reapply SNAT/MASQUERADE rules on firewall reloadsJo-Philipp Wich2014-04-111-0/+1