Lines Matching refs:OIF_NONE
97 const char* const OIF_NONE = nullptr; variable
298 { &fraOifName, oif != OIF_NONE ? sizeof(fraOifName) : 0 }, in modifyIpRule()
329 return modifyIpRule(action, priority, table, fwmark, mask, IIF_NONE, OIF_NONE, INVALID_UID, in modifyIpRule()
368 interface = OIF_NONE; in modifyIpRoute()
372 interface = OIF_NONE; in modifyIpRoute()
376 if (interface != OIF_NONE) { in modifyIpRoute()
412 { &RTATTR_OIF, interface != OIF_NONE ? sizeof(RTATTR_OIF) : 0 }, in modifyIpRoute()
413 { &ifindex, interface != OIF_NONE ? sizeof(ifindex) : 0 }, in modifyIpRoute()
471 ROUTE_TABLE_LOCAL_NETWORK, MARK_UNSET, MARK_UNSET, vpnInterface, OIF_NONE, in modifyVpnOutputToLocalRule()
500 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyVpnUidRangeRule()
548 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyExplicitNetworkRule()
598 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, INVALID_UID, in modifyImplicitNetworkRule()
710 MARK_UNSET, MARK_UNSET, IIF_NONE, OIF_NONE, INVALID_UID, INVALID_UID); in addUnreachableRule()
776 IIF_LOOPBACK, OIF_NONE, range.start, range.stop)) { in modifyRejectNonSecureNetworkRule()
840 mask.intValue, IIF_LOOPBACK, OIF_NONE, INVALID_UID, INVALID_UID); in modifyDefaultNetwork()
852 inputInterface, OIF_NONE, INVALID_UID, INVALID_UID); in modifyTetheredNetwork()
896 inputInterface, OIF_NONE, INVALID_UID, INVALID_UID); in clearTetheringRules()