Searched refs:saddr (Results 1 – 14 of 14) sorted by relevance
/system/netd/include/ |
D | FwmarkCommand.h | 36 FwmarkConnectInfo(const int connectErrno, const unsigned latency, const sockaddr* saddr) { in FwmarkConnectInfo() 39 if (saddr->sa_family == AF_INET) { in FwmarkConnectInfo() 40 addr.sin = *((struct sockaddr_in*) saddr); in FwmarkConnectInfo() 41 } else if (saddr->sa_family == AF_INET6) { in FwmarkConnectInfo() 42 addr.sin6 = *((struct sockaddr_in6*) saddr); in FwmarkConnectInfo()
|
/system/core/libnetutils/ |
D | packet.c | 87 uint32_t saddr, uint32_t daddr, uint32_t sport, uint32_t dport) in send_packet() argument 106 ip.saddr = saddr; in send_packet() 116 udpsum = checksum(&ip.saddr, sizeof(ip.saddr), 0); in send_packet() 165 uint32_t saddr, daddr; in receive_packet() local 232 saddr = packet.ip.saddr; in receive_packet() 236 packet.ip.saddr = saddr; in receive_packet()
|
D | packet.h | 24 uint32_t saddr, uint32_t daddr, uint32_t sport, uint32_t dport);
|
D | checksum.c | 119 current = ip_checksum_add(current, &(ip->saddr), sizeof(uint32_t)); in ipv4_pseudo_header_checksum()
|
/system/netd/bpf_progs/ |
D | clatd.c | 79 ip6->saddr.in6_u.u6_addr32[0], in nat64() 80 ip6->saddr.in6_u.u6_addr32[1], in nat64() 81 ip6->saddr.in6_u.u6_addr32[2], in nat64() 106 .saddr = ip6->saddr.in6_u.u6_addr32[3], // u32 in nat64() 253 .local4.s_addr = ip4->saddr, in sched_cls_egress_clat_rawip() 273 .saddr = v->local6, // struct in6_addr in sched_cls_egress_clat_rawip()
|
D | offload.c | 61 __be32 src32 = ip6->saddr.s6_addr32[0]; in do_forward()
|
/system/netd/tests/ |
D | sock_diag_test.cpp | 128 struct in6_addr *saddr = (struct in6_addr *) msg->id.idiag_src; in TEST_F() local 130 IN6_IS_ADDR_LOOPBACK(saddr) || in TEST_F() 131 (IN6_IS_ADDR_V4MAPPED(saddr) && saddr->s6_addr32[3] == htonl(INADDR_LOOPBACK))); in TEST_F()
|
D | binder_test.cpp | 3665 .saddr = {{{0x20, 0x01, 0x0d, 0xb8, 0x00, 0x01, 0x00, 0x00, 0x00, 0x00, in TEST_F()
|
/system/netd/server/ |
D | TcpSocketMonitor.cpp | 80 char saddr[INET6_ADDRSTRLEN] = {}; in tcpInfoPrint() local 82 inet_ntop(sockinfo->idiag_family, &(sockinfo->id.idiag_src), saddr, sizeof(saddr)); in tcpInfoPrint() 91 saddr, in tcpInfoPrint()
|
D | SockDiagTest.cpp | 130 struct in6_addr *saddr = (struct in6_addr *) msg->id.idiag_src; in TEST_F() local 132 IN6_IS_ADDR_LOOPBACK(saddr) || in TEST_F() 133 (IN6_IS_ADDR_V4MAPPED(saddr) && saddr->s6_addr32[3] == htonl(INADDR_LOOPBACK))); in TEST_F()
|
D | WakeupController.cpp | 87 inet_ntop(AF_INET, &header.saddr, addr, sizeof(addr)); in extractIpHeader()
|
D | XfrmController.cpp | 713 struct sockaddr_storage saddr = ret.value(); in ipSecApplyTransportModeTransform() local 728 if (saddr.ss_family == AF_INET && spInfo.addrFamily != AF_INET) { in ipSecApplyTransportModeTransform() 731 saddr.ss_family, spInfo.addrFamily); in ipSecApplyTransportModeTransform() 746 switch (saddr.ss_family) { in ipSecApplyTransportModeTransform() 1054 usersa->saddr = record.srcAddr; in fillUserSaInfo() 1270 tmpl->saddr = record.srcAddr; in fillUserTemplate()
|
D | XfrmControllerTest.cpp | 292 expectAddressEquals(family, localAddr, userspi.info.saddr); in TEST_P() 385 expectAddressEquals(family, localAddr, usersa.saddr); in testIpSecAddSecurityAssociation() 536 expectAddressEquals(xfrmFamily, localAddr, policy.tmpl.saddr); in TEST_P()
|
D | WakeupControllerTest.cpp | 201 inet_pton(AF_INET, kSrcIpAddr, &msg.ipHeader.saddr); in TEST_F()
|