/system/netd/server/ |
D | ControllersTest.cpp | 124 {V4, in TEST_F() 131 {V4, in TEST_F() 138 {V4, in TEST_F() 142 {V4, in TEST_F() 168 {V4, in TEST_F() 172 {V4, in TEST_F()
|
D | Controllers.cpp | 231 createChildChains(V4, "nat", "PREROUTING", NAT_PREROUTING, true); in initChildChains() 232 createChildChains(V4, "nat", "POSTROUTING", NAT_POSTROUTING, true); in initChildChains() 234 createChildChains(V4, "filter", "OUTPUT", FILTER_OUTPUT, false); in initChildChains() 236 createChildChains(V4, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false); in initChildChains()
|
D | oem_iptables_hook.cpp | 51 return (execIptablesRestore(V4, cmd4) == 0 && execIptablesRestore(V6, cmd6) == 0); in oemCleanupHooks()
|
D | TetherControllerTest.cpp | 109 {V4, 127 {V4, 142 {V4, 166 { V4, v4Cmd }, in firstIPv4UpstreamCommands() 235 { V4, Join(v4Cmds, '\n') }, in startNatCommands() 293 { V4, Join(v4Cmds, '\n') }, in stopNatCommands()
|
D | FirewallControllerTest.cpp | 89 {V4, Join(expectedRestore4, '\n')}, in TEST_F() 106 {V4, Join(expectedRestore, '\n')}, in TEST_F() 205 EXPECT_EQ(expected, makeUidRules(V4, "FW_denychain", false, uids)); in TEST_F()
|
D | NetdConstants.h | 30 enum IptablesTarget { V4, V6, V4V6 }; enumerator
|
D | StrictControllerTest.cpp | 105 { V4, commands4 }, in TEST_F()
|
D | BandwidthControllerTest.cpp | 161 ExpectedIptablesCommands expected = {{ V4, expectedList }}; in expectSetupCommands() 297 {V4, expected4}, in TEST_F() 308 {V4, expected}, in TEST_F()
|
D | FirewallController.cpp | 352 std::string commands4 = makeUidRules(V4, name.c_str(), isAllowlist, uids); in replaceUidChain() 354 return execIptablesRestore(V4, commands4.c_str()) | execIptablesRestore(V6, commands6.c_str()); in replaceUidChain()
|
D | StrictController.cpp | 132 res |= execIptablesRestore(V4, Join(v4, '\n')); in setupIptablesHooks()
|
D | TetherController.cpp | 544 res = iptablesRestoreFunction(V4, mssRewriteCommand, nullptr); in setupIptablesHooks() 578 int res = iptablesRestoreFunction(V4, v4Cmd, nullptr); in setDefaults() 617 if (iptablesRestoreFunction(V4, Join(v4Cmds, '\n'), nullptr) || setupIPv6CountersChain() || in enableNat() 795 if (iptablesRestoreFunction(V4, Join(v4, '\n'), nullptr) == -1 || in setForwardRules() 1014 for (const IptablesTarget target : {V4, V6}) { in getTetherStats() 1023 target == V4 ? "IPv4": "IPv6", in getTetherStats()
|
D | BandwidthController.cpp | 350 int ret = iptablesRestoreFunction(V4, makeDataSaverCommand(V4, enable), nullptr); in enableDataSaver() 822 if (int ret = iptablesRestoreFunction(V4, fullCmd, &ruleList)) { in flushExistingCostlyTables()
|
D | IptablesRestoreController.cpp | 359 if (target == V4 || target == V4V6) { in execute()
|
D | IptablesRestoreControllerTest.cpp | 168 EXPECT_EQ(0, con.execute(IptablesTarget::V4, "#Test\n", nullptr)); in TEST_F()
|