Home
last modified time | relevance | path

Searched refs:saddr (Results 1 – 14 of 14) sorted by relevance

/system/netd/include/
DFwmarkCommand.h36 FwmarkConnectInfo(const int connectErrno, const unsigned latency, const sockaddr* saddr) { in FwmarkConnectInfo()
39 if (saddr->sa_family == AF_INET) { in FwmarkConnectInfo()
40 addr.sin = *((struct sockaddr_in*) saddr); in FwmarkConnectInfo()
41 } else if (saddr->sa_family == AF_INET6) { in FwmarkConnectInfo()
42 addr.sin6 = *((struct sockaddr_in6*) saddr); in FwmarkConnectInfo()
/system/core/libnetutils/
Dpacket.c87 uint32_t saddr, uint32_t daddr, uint32_t sport, uint32_t dport) in send_packet() argument
106 ip.saddr = saddr; in send_packet()
116 udpsum = checksum(&ip.saddr, sizeof(ip.saddr), 0); in send_packet()
165 uint32_t saddr, daddr; in receive_packet() local
232 saddr = packet.ip.saddr; in receive_packet()
236 packet.ip.saddr = saddr; in receive_packet()
Dpacket.h24 uint32_t saddr, uint32_t daddr, uint32_t sport, uint32_t dport);
Dchecksum.c119 current = ip_checksum_add(current, &(ip->saddr), sizeof(uint32_t)); in ipv4_pseudo_header_checksum()
/system/netd/bpf_progs/
Dclatd.c79 ip6->saddr.in6_u.u6_addr32[0], in nat64()
80 ip6->saddr.in6_u.u6_addr32[1], in nat64()
81 ip6->saddr.in6_u.u6_addr32[2], in nat64()
106 .saddr = ip6->saddr.in6_u.u6_addr32[3], // u32 in nat64()
253 .local4.s_addr = ip4->saddr, in sched_cls_egress_clat_rawip()
273 .saddr = v->local6, // struct in6_addr in sched_cls_egress_clat_rawip()
Doffload.c61 __be32 src32 = ip6->saddr.s6_addr32[0]; in do_forward()
/system/netd/tests/
Dsock_diag_test.cpp128 struct in6_addr *saddr = (struct in6_addr *) msg->id.idiag_src; in TEST_F() local
130 IN6_IS_ADDR_LOOPBACK(saddr) || in TEST_F()
131 (IN6_IS_ADDR_V4MAPPED(saddr) && saddr->s6_addr32[3] == htonl(INADDR_LOOPBACK))); in TEST_F()
Dbinder_test.cpp3665 .saddr = {{{0x20, 0x01, 0x0d, 0xb8, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, in TEST_F()
/system/netd/server/
DTcpSocketMonitor.cpp80 char saddr[INET6_ADDRSTRLEN] = {}; in tcpInfoPrint() local
82 inet_ntop(sockinfo->idiag_family, &(sockinfo->id.idiag_src), saddr, sizeof(saddr)); in tcpInfoPrint()
91 saddr, in tcpInfoPrint()
DSockDiagTest.cpp130 struct in6_addr *saddr = (struct in6_addr *) msg->id.idiag_src; in TEST_F() local
132 IN6_IS_ADDR_LOOPBACK(saddr) || in TEST_F()
133 (IN6_IS_ADDR_V4MAPPED(saddr) && saddr->s6_addr32[3] == htonl(INADDR_LOOPBACK))); in TEST_F()
DWakeupController.cpp87 inet_ntop(AF_INET, &header.saddr, addr, sizeof(addr)); in extractIpHeader()
DXfrmController.cpp713 struct sockaddr_storage saddr = ret.value(); in ipSecApplyTransportModeTransform() local
728 if (saddr.ss_family == AF_INET && spInfo.addrFamily != AF_INET) { in ipSecApplyTransportModeTransform()
731 saddr.ss_family, spInfo.addrFamily); in ipSecApplyTransportModeTransform()
746 switch (saddr.ss_family) { in ipSecApplyTransportModeTransform()
1054 usersa->saddr = record.srcAddr; in fillUserSaInfo()
1270 tmpl->saddr = record.srcAddr; in fillUserTemplate()
DXfrmControllerTest.cpp292 expectAddressEquals(family, localAddr, userspi.info.saddr); in TEST_P()
385 expectAddressEquals(family, localAddr, usersa.saddr); in testIpSecAddSecurityAssociation()
536 expectAddressEquals(xfrmFamily, localAddr, policy.tmpl.saddr); in TEST_P()
DWakeupControllerTest.cpp201 inet_pton(AF_INET, kSrcIpAddr, &msg.ipHeader.saddr); in TEST_F()