/system/netd/server/ |
D | ControllersTest.cpp | 124 {V4, in TEST_F() 131 {V4, in TEST_F() 138 {V4, in TEST_F() 142 {V4, in TEST_F() 168 {V4, in TEST_F() 172 {V4, in TEST_F()
|
D | TetherControllerTest.cpp | 59 {V4, 77 {V4, 92 {V4, 116 { V4, v4Cmd }, in firstIPv4UpstreamCommands() 185 { V4, Join(v4Cmds, '\n') }, in startNatCommands() 243 { V4, Join(v4Cmds, '\n') }, in stopNatCommands()
|
D | Controllers.cpp | 230 createChildChains(V4, "nat", "PREROUTING", NAT_PREROUTING, true); in initChildChains() 231 createChildChains(V4, "nat", "POSTROUTING", NAT_POSTROUTING, true); in initChildChains() 233 createChildChains(V4, "filter", "OUTPUT", FILTER_OUTPUT, false); in initChildChains() 235 createChildChains(V4, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false); in initChildChains()
|
D | oem_iptables_hook.cpp | 52 return (execIptablesRestore(V4, cmd4) == 0 && execIptablesRestore(V6, cmd6) == 0); in oemCleanupHooks()
|
D | FirewallControllerTest.cpp | 91 {V4, Join(expectedRestore4, '\n')}, in TEST_F() 109 {V4, Join(expectedRestore, '\n')}, in TEST_F() 208 EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids)); in TEST_F()
|
D | TetherController.cpp | 494 res = iptablesRestoreFunction(V4, mssRewriteCommand, nullptr); in setupIptablesHooks() 528 int res = iptablesRestoreFunction(V4, v4Cmd, nullptr); in setDefaults() 566 if (iptablesRestoreFunction(V4, Join(v4Cmds, '\n'), nullptr) || setupIPv6CountersChain() || in enableNat() 743 if (iptablesRestoreFunction(V4, Join(v4, '\n'), nullptr) == -1 || in setForwardRules() 892 for (const IptablesTarget target : {V4, V6}) { in getTetherStats() 901 target == V4 ? "IPv4": "IPv6", in getTetherStats()
|
D | StrictControllerTest.cpp | 105 { V4, commands4 }, in TEST_F()
|
D | NetdConstants.h | 34 enum IptablesTarget { V4, V6, V4V6 }; enumerator
|
D | BandwidthControllerTest.cpp | 159 ExpectedIptablesCommands expected = {{ V4, expectedList }}; in expectSetupCommands() 295 {V4, expected4}, in TEST_F() 307 {V4, expected}, in TEST_F()
|
D | FirewallController.cpp | 353 std::string commands4 = makeUidRules(V4, name.c_str(), isWhitelist, uids); in replaceUidChain() 355 return execIptablesRestore(V4, commands4.c_str()) | execIptablesRestore(V6, commands6.c_str()); in replaceUidChain()
|
D | StrictController.cpp | 132 res |= execIptablesRestore(V4, Join(v4, '\n')); in setupIptablesHooks()
|
D | BandwidthController.cpp | 330 int ret = iptablesRestoreFunction(V4, makeDataSaverCommand(V4, enable), nullptr); in enableDataSaver() 805 if (int ret = iptablesRestoreFunction(V4, fullCmd, &ruleList)) { in flushExistingCostlyTables()
|
D | IptablesRestoreController.cpp | 360 if (target == V4 || target == V4V6) { in execute()
|
D | IptablesRestoreControllerTest.cpp | 168 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F()
|