/system/netd/server/ |
D | ControllersTest.cpp | 52 { V6, "*raw\n-S PREROUTING\nCOMMIT\n" }, in TEST_F() 65 std::set<std::string> actual = findExistingChildChains(V6, "raw", "PREROUTING"); in TEST_F() 153 {V6, in TEST_F() 157 {V6, in TEST_F() 181 {V6, in TEST_F() 185 {V6, in TEST_F()
|
D | oem_iptables_hook.cpp | 51 return (execIptablesRestore(V4, cmd4) == 0 && execIptablesRestore(V6, cmd6) == 0); in oemCleanupHooks()
|
D | TetherControllerTest.cpp | 117 {V6, 135 {V6, 176 { V6, v6Cmd }, in firstIPv6UpstreamCommands() 234 { V6, rpfilterCmd }, in startNatCommands() 236 { V6, Join(v6Cmds, '\n') }, in startNatCommands() 292 { V6, rpfilterCmd }, in stopNatCommands()
|
D | FirewallControllerTest.cpp | 90 {V6, Join(expectedRestore6, '\n')}, in TEST_F() 107 {V6, Join(expectedRestore, '\n')}, in TEST_F() 189 EXPECT_EQ(expected, makeUidRules(V6, "FW_allowchain", true, uids)); in TEST_F()
|
D | NetdConstants.h | 30 enum IptablesTarget { V4, V6, V4V6 }; enumerator
|
D | FirewallController.cpp | 284 if (target == V6) { in makeCriticalCommands() 353 std::string commands6 = makeUidRules(V6, name.c_str(), isAllowlist, uids); in replaceUidChain() 354 return execIptablesRestore(V4, commands4.c_str()) | execIptablesRestore(V6, commands6.c_str()); in replaceUidChain()
|
D | ClatdControllerTest.cpp | 193 {V6, in TEST_F() 202 {V6, in TEST_F()
|
D | StrictControllerTest.cpp | 106 { V6, commands6 }, in TEST_F()
|
D | Controllers.cpp | 235 createChildChains(V6, "filter", "OUTPUT", FILTER_OUTPUT, false); in initChildChains() 237 createChildChains(V6, "mangle", "POSTROUTING", MANGLE_POSTROUTING, false); in initChildChains()
|
D | StrictController.cpp | 133 res |= execIptablesRestore(V6, Join(v6, '\n')); in setupIptablesHooks()
|
D | BandwidthControllerTest.cpp | 298 {V6, expected6}, in TEST_F() 309 {V6, expected}, in TEST_F()
|
D | TetherController.cpp | 583 res = iptablesRestoreFunction(V6, v6Cmd, nullptr); in setDefaults() 667 return iptablesRestoreFunction(V6, v6Cmds, nullptr); in setupIPv6CountersChain() 751 if (iptablesRestoreFunction(V6, rpfilterCmd, nullptr) == -1 && add) { in setForwardRules() 796 (add && iptablesRestoreFunction(V6, Join(v6, '\n'), nullptr) == -1)) { in setForwardRules() 1014 for (const IptablesTarget target : {V4, V6}) { in getTetherStats()
|
D | BandwidthController.cpp | 351 ret |= iptablesRestoreFunction(V6, makeDataSaverCommand(V6, enable), nullptr); in enableDataSaver()
|
D | IptablesRestoreController.cpp | 362 if (target == V6 || target == V4V6) { in execute()
|
D | IptablesRestoreControllerTest.cpp | 167 EXPECT_EQ(0, con.execute(IptablesTarget::V6, "#Test\n", nullptr)); in TEST_F()
|
D | ClatdController.cpp | 371 iptablesRestoreFunction(V6, cmd); in setIptablesDropRule()
|
/system/ca-certificates/files/ |
D | bf64f35b.0 | 16 94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB
|
/system/ca-certificates/google/files/ |
D | bf64f35b.0 | 16 94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB
|
/system/ca-certificates/google/ |
D | roots.pem | 806 94DkZfs0Nw4pgHBNrziGLp5/V6+eF67rHMsoIV+2HNjnogQi+dPa2MsCAwEAAaOB
|