/system/netd/server/ |
D | ControllersTest.cpp | 124 {V4, in TEST_F() 131 {V4, in TEST_F() 138 {V4, in TEST_F() 142 {V4, in TEST_F() 168 {V4, in TEST_F() 172 {V4, in TEST_F()
|
D | TetherControllerTest.cpp | 62 {V4, 80 {V4, 95 {V4, 119 { V4, v4Cmd }, in firstIPv4UpstreamCommands() 188 { V4, Join(v4Cmds, '\n') }, in startNatCommands() 246 { V4, Join(v4Cmds, '\n') }, in stopNatCommands()
|
D | Controllers.cpp | 231 createChildChains(V4, "nat", "PREROUTING", NAT_PREROUTING, true); in initChildChains() 232 createChildChains(V4, "nat", "POSTROUTING", NAT_POSTROUTING, true); in initChildChains() 234 createChildChains(V4, "filter", "OUTPUT", FILTER_OUTPUT, false); in initChildChains() 236 createChildChains(V4, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false); in initChildChains()
|
D | oem_iptables_hook.cpp | 51 return (execIptablesRestore(V4, cmd4) == 0 && execIptablesRestore(V6, cmd6) == 0); in oemCleanupHooks()
|
D | FirewallControllerTest.cpp | 89 {V4, Join(expectedRestore4, '\n')}, in TEST_F() 106 {V4, Join(expectedRestore, '\n')}, in TEST_F() 205 EXPECT_EQ(expected, makeUidRules(V4, "FW_denychain", false, uids)); in TEST_F()
|
D | NetdConstants.h | 30 enum IptablesTarget { V4, V6, V4V6 }; enumerator
|
D | StrictControllerTest.cpp | 105 { V4, commands4 }, in TEST_F()
|
D | TetherController.cpp | 517 res = iptablesRestoreFunction(V4, mssRewriteCommand, nullptr); in setupIptablesHooks() 551 int res = iptablesRestoreFunction(V4, v4Cmd, nullptr); in setDefaults() 589 if (iptablesRestoreFunction(V4, Join(v4Cmds, '\n'), nullptr) || setupIPv6CountersChain() || in enableNat() 766 if (iptablesRestoreFunction(V4, Join(v4, '\n'), nullptr) == -1 || in setForwardRules() 913 for (const IptablesTarget target : {V4, V6}) { in getTetherStats() 922 target == V4 ? "IPv4": "IPv6", in getTetherStats()
|
D | BandwidthControllerTest.cpp | 94 ExpectedIptablesCommands expected = {{ V4, expectedList }}; in expectSetupCommands() 247 {V4, expected4}, in TEST_F() 258 {V4, expected}, in TEST_F()
|
D | FirewallController.cpp | 359 std::string commands4 = makeUidRules(V4, name.c_str(), isAllowlist, uids); in replaceUidChain() 361 return execIptablesRestore(V4, commands4.c_str()) | execIptablesRestore(V6, commands6.c_str()); in replaceUidChain()
|
D | StrictController.cpp | 132 res |= execIptablesRestore(V4, Join(v4, '\n')); in setupIptablesHooks()
|
D | BandwidthController.cpp | 321 int ret = iptablesRestoreFunction(V4, makeDataSaverCommand(V4, enable), nullptr); in enableDataSaver() 759 if (int ret = iptablesRestoreFunction(V4, fullCmd, &ruleList)) { in flushExistingCostlyTables()
|
D | IptablesRestoreController.cpp | 359 if (target == V4 || target == V4V6) { in execute()
|
D | IptablesRestoreControllerTest.cpp | 208 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F()
|
/system/apex/tests/testdata/sharedlibs/build/com.android.apex.test.pony/ |
D | com.android.apex.test.pony.pem | 49 V4/TO384iLZBlj6bDJc4g7YL1KYvZ6ZCCLWoq2TXyBHAOjfThttOoGFj1B4KqdZP
|
/system/bt/gd/rust/facade/src/ |
D | main.rs | 75 let address = SocketAddr::new(IpAddr::V4(Ipv4Addr::new(0, 0, 0, 0)), signal_port); in indicate_started()
|