Home
last modified time | relevance | path

Searched refs:V4V6 (Results 1 – 18 of 18) sorted by relevance

/system/netd/server/
DIptablesRestoreControllerTest.cpp154 int ret = con.execute(V4V6, Join(createCommands, "\n"), nullptr); in createTestChain()
167 con.execute(V4V6, Join(deleteCommands, "\n"), nullptr); in deleteTestChain()
202 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F()
210 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F()
235 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", &output)); in TEST_F()
249 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, "#Test\n", nullptr)); in TEST_F()
283 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F()
287 EXPECT_EQ(-1, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F()
288 EXPECT_EQ(-1, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F()
291 EXPECT_EQ(0, con.execute(IptablesTarget::V4V6, commandString, &output)); in TEST_F()
[all …]
DControllersTest.cpp73 {V4V6, in TEST_F()
82 {V4V6, in TEST_F()
95 {V4V6, in TEST_F()
108 {V4V6, in TEST_F()
115 {V4V6, in TEST_F()
DFirewallControllerTest.cpp116 { V4V6, "*filter\n-D fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } in TEST_F()
122 { V4V6, "*filter\n-A fw_standby -m owner --uid-owner 12345 -j DROP\nCOMMIT\n" } in TEST_F()
130 { V4V6, "*filter\n-I fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } in TEST_F()
136 { V4V6, "*filter\n-D fw_dozable -m owner --uid-owner 54321 -j RETURN\nCOMMIT\n" } in TEST_F()
144 { V4V6, "*filter\n" in TEST_F()
153 { V4V6, "*filter\n" in TEST_F()
DControllers.cpp117 if (target == V4V6) { in findExistingChildChains()
226 createChildChains(V4V6, "filter", "INPUT", FILTER_INPUT, true); in initChildChains()
227 createChildChains(V4V6, "filter", "FORWARD", FILTER_FORWARD, true); in initChildChains()
228 createChildChains(V4V6, "raw", "PREROUTING", RAW_PREROUTING, true); in initChildChains()
229 createChildChains(V4V6, "mangle", "FORWARD", MANGLE_FORWARD, true); in initChildChains()
230 createChildChains(V4V6, "mangle", "INPUT", MANGLE_INPUT, true); in initChildChains()
DBandwidthController.cpp277 iptablesRestoreFunction(V4V6, commands, nullptr); in flushCleanTables()
296 return iptablesRestoreFunction(V4V6, commands, nullptr); in enableBandwidthControl()
386 res |= iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr); in setInterfaceSharedQuota()
436 if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) { in removeInterfaceSharedQuota()
498 if (iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr) != 0) { in setInterfaceQuota()
554 const int res = iptablesRestoreFunction(V4V6, Join(cmds, "\n"), nullptr); in removeInterfaceQuota()
600 return iptablesRestoreFunction(V4V6, alertQuotaCmd, nullptr); in runIptablesAlertCmd()
715 res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr); in setCostlyAlert()
745 if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) { in removeCostlyAlert()
795 iptablesRestoreFunction(V4V6, Join(clearCommands, '\n'), nullptr); in parseAndFlushCostlyTables()
DFirewallController.cpp120 res = execIptablesRestore(V4V6, command.c_str()); in setFirewallType()
141 return (execIptablesRestore(V4V6, command.c_str()) == 0) ? 0 : -EREMOTEIO; in resetFirewall()
174 return execIptablesRestore(V4V6, command); in enableChildChains()
213 return (execIptablesRestore(V4V6, command) == 0) ? 0 : -EREMOTEIO; in setInterfaceRule()
279 return (execIptablesRestore(V4V6, command) == 0) ? 0 : -EREMOTEIO; in setUidRule()
DStrictController.cpp155 return (execIptablesRestore(V4V6, commands) == 0) ? 0 : -EREMOTEIO; in resetChains()
197 return (execIptablesRestore(V4V6, Join(commands, "\n")) == 0) ? 0 : -EREMOTEIO; in setUidCleartextPenalty()
DIdletimerController.cpp160 return (execIptablesRestore(V4V6, Join(cmds, '\n')) == 0) ? 0 : -EREMOTEIO; in modifyInterfaceIdletimer()
DNetdConstants.h30 enum IptablesTarget { V4, V6, V4V6 }; enumerator
DStrictControllerTest.cpp104 { V4V6, commandsCommon }, in TEST_F()
DBandwidthControllerTest.cpp96 expected.push_back({ V4V6, expectedClean }); in expectSetupCommands()
98 expected.push_back({ V4V6, expectedFlush }); in expectSetupCommands()
100 expected.push_back({ V4V6, expectedAccounting }); in expectSetupCommands()
DIptablesRestoreController.cpp359 if (target == V4 || target == V4V6) { in execute()
362 if (target == V6 || target == V4V6) { in execute()
DIptablesBaseTest.cpp102 expected.push_back({ V4V6, cmd }); in expectIptablesRestoreCommands()
DTetherControllerTest.cpp100 {V4V6,
107 {V4V6,
DWakeupControllerTest.cpp293 EXPECT_CALL(mIptables, execute(V4V6, kExpected, _)).WillOnce(Return(0)); in TEST_F()
306 EXPECT_CALL(mIptables, execute(V4V6, kExpected, _)).WillOnce(Return(0)); in TEST_F()
DWakeupController.cpp218 auto rv = mIptables->execute(V4V6, cmd, &out); in execIptables()
DTetherController.cpp522 res = iptablesRestoreFunction(V4V6, defaultCommands, nullptr); in setupIptablesHooks()
621 return iptablesRestoreFunction(V4V6, cmds, nullptr); in setTetherGlobalAlertRule()
DRouteController.cpp471 if (RouteController::iptablesRestoreCommandFunction(V4V6, "mangle", cmd, nullptr) != 0) { in modifyIncomingPacketMark()