Lines Matching refs:sTun2
191 ASSERT_EQ(0, sTun2.init()); in SetUpTestCase()
195 ASSERT_LE(sTun2.name().size(), static_cast<size_t>(IFNAMSIZ)); in SetUpTestCase()
203 sTun2.destroy(); in TearDownTestCase()
236 static TunInterface sTun2; member in NetdBinderTest
242 TunInterface NetdBinderTest::sTun2; member in NetdBinderTest
803 status = mNetd->interfaceAddAddress(sTun2.name(), kLinkLocalAddress, 64); in TEST_F()
818 sin6_2.sin6_scope_id = if_nametoindex(sTun2.name().c_str()); in TEST_F()
842 status = mNetd->interfaceDelAddress(sTun2.name(), kLinkLocalAddress, 64); in TEST_F()
1584 EXPECT_TRUE(mNetd->networkAddInterface(TEST_NETID2, sTun2.name()).isOk()); in TEST_F()
1586 binder::Status status = mNetd->ipfwdAddInterfaceForward(sTun.name(), sTun2.name()); in TEST_F()
1588 expectIpfwdRuleExists(sTun.name().c_str(), sTun2.name().c_str()); in TEST_F()
1590 status = mNetd->ipfwdRemoveInterfaceForward(sTun.name(), sTun2.name()); in TEST_F()
1592 expectIpfwdRuleNotExists(sTun.name().c_str(), sTun2.name().c_str()); in TEST_F()
2942 binder::Status status = mNetd->tetherAddForward(sTun.name(), sTun2.name()); in TEST_F()
2944 expectNatEnable(sTun.name(), sTun2.name()); in TEST_F()
2946 status = mNetd->tetherRemoveForward(sTun.name(), sTun2.name()); in TEST_F()
3088 {"ndc ipfwd add " + sTun.name() + " " + sTun2.name(), in TEST_F()
3090 {"ndc ipfwd remove " + sTun.name() + " " + sTun2.name(), in TEST_F()
3219 sTun2.destroy(); in createVpnNetworkWithUid()
3220 sTun2.init(); in createVpnNetworkWithUid()
3236 EXPECT_TRUE(mNetd->networkAddInterface(vpnNetId, sTun2.name()).isOk()); in createVpnNetworkWithUid()
3241 EXPECT_TRUE(mNetd->networkAddRoute(TEST_NETID2, sTun2.name(), "2001:db8::/32", "").isOk()); in createVpnNetworkWithUid()
3270 createPhysicalNetwork(otherNetId, sTun2.name()); in createDefaultAndOtherPhysicalNetwork()
3271 EXPECT_TRUE(mNetd->networkAddRoute(otherNetId, sTun2.name(), "::/0", "").isOk()); in createDefaultAndOtherPhysicalNetwork()
3488 expectVpnFallthroughWorks(mNetd.get(), false /* bypassable */, TEST_UID1, sTun, sTun2); in TEST_F()
3495 expectVpnFallthroughWorks(mNetd.get(), true /* bypassable */, TEST_UID1, sTun, sTun2); in TEST_F()
3535 EXPECT_TRUE(mNetd->networkAddInterface(TEST_NETID2, sTun2.name()).isOk()); in TEST_F()
4185 int appDefaultFd = sTun2.getFdForTesting(); in TEST_F()
4223 int appDefaultFd = sTun2.getFdForTesting(); in TEST_F()
4264 int appDefaultFd = sTun2.getFdForTesting(); in TEST_F()
4303 createPhysicalNetwork(APP_DEFAULT_NETID, sTun2.name(), INetd::PERMISSION_SYSTEM); in TEST_F()
4337 int appDefaultFd = sTun2.getFdForTesting(); in TEST_P()
4402 expectedFd = sTun2.getFdForTesting(); in TEST_P()
4460 int appDefaultFd = sTun2.getFdForTesting(); in TEST_P()
4545 createPhysicalNetwork(TEST_NETID2, sTun2.name()); in TEST_F()
4546 EXPECT_TRUE(mNetd->networkAddRoute(TEST_NETID2, sTun2.name(), "::/0", "").isOk()); in TEST_F()
4557 verifyAppUidRules({true}, uidRangeConfig2, sTun2.name()); in TEST_F()
4568 verifyAppUidRules({true}, uidRangeConfig2, sTun2.name()); in TEST_F()
4572 verifyAppUidRules({false}, uidRangeConfig2, sTun2.name()); in TEST_F()
4576 verifyAppUidRules({false}, uidRangeConfig2, sTun2.name()); in TEST_F()
4594 EXPECT_TRUE(mNetd->networkAddInterface(VPN_NETID2, sTun2.name()).isOk()); in TEST_P()
4606 verifyVpnUidRules({true}, uidRangeConfig2, sTun2.name(), isSecureVPN); in TEST_P()
4611 verifyVpnUidRules({true}, uidRangeConfig2, sTun2.name(), isSecureVPN); in TEST_P()
4614 verifyVpnUidRules({false}, uidRangeConfig2, sTun2.name(), isSecureVPN); in TEST_P()
4688 int appDefault_1_Fd = sTun2.getFdForTesting(); in TEST_F()