Home
last modified time | relevance | path

Searched refs:intValue (Results 1 – 21 of 21) sorted by relevance

/system/netd/include/
DFwmark.h25 uint32_t intValue; member
33 constexpr Fwmark() : intValue(0) {} in Fwmark()
38 return m.intValue; in getUidBillingMask()
/system/netd/server/
DRouteController.cpp485 RouteController::LOCAL_MANGLE_INPUT, interface, fwmark.intValue, mask); in modifyIncomingPacketMark()
528 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnUidRangeRule()
529 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyVpnUidRangeRule()
550 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnSystemPermissionRule()
551 mask.intValue); in modifyVpnSystemPermissionRule()
577 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyExplicitNetworkRule()
605 fwmark.intValue, mask.intValue, IIF_LOOPBACK, interface, uidStart, uidEnd); in modifyOutputInterfaceRules()
627 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, INVALID_UID, in modifyImplicitNetworkRule()
652 return modifyIpRule(action, RULE_PRIORITY_VPN_FALLTHROUGH, table, fwmark.intValue, in modifyVpnFallthroughRule()
653 mask.intValue); in modifyVpnFallthroughRule()
[all …]
DFwmarkServer.cpp165 socklen_t fwmarkLen = sizeof(fwmark.intValue); in processClient()
166 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient()
329 if (setsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, in processClient()
330 sizeof(fwmark.intValue)) == -1) { in processClient()
DSockDiag.cpp236 mark.intValue = *reinterpret_cast<uint32_t*>(RTA_DATA(attr)); in readDiagMsgWithTcpInfo()
481 netIdMark.intValue, netIdMask.intValue }, in destroySocketsLackingPermission()
487 controlMark.intValue, controlMark.intValue }, in destroySocketsLackingPermission()
DTcpSocketMonitor.cpp90 mark.intValue, in tcpInfoPrint()
209 if (sockinfo == nullptr || tcpinfo == nullptr || tcpinfoLen == 0 || mark.intValue == 0) { in poll()
DNetdHwService.cpp76 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret)); in createOemNetwork()
DNetworkController.cpp219 return fwmark.intValue; in getNetworkForDnsLocked()
250 return fwmark.intValue; in getNetworkForDnsLocked()
325 nc.app_mark = fwmark.intValue; in getNetworkContext()
DSockDiagTest.cpp361 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue)); in modifySocketForTest()
DTetherController.cpp260 snprintf(markStr, sizeof(markStr), "0x%x", fwmark.intValue); in startTethering()
407 std::string daemonCmd = StringPrintf("update_dns%s0x%x", SEPARATOR, fwmark.intValue); in setDnsForwarders()
411 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]); in setDnsForwarders()
DClatdController.cpp426 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue); in init()
DXfrmControllerTest.cpp439 fwmark.intValue = outputmark.outputMark; in testIpSecAddSecurityAssociation()
DXfrmController.cpp1323 output_mark->outputMark = fwmark.intValue; in fillNlAttrXfrmOutputMark()
DNetdNativeService.cpp1252 markMask->mark = fwmark.intValue; in getFwmarkForNetwork()
/system/core/libutils/
DPropertyMap.cpp65 int32_t intValue; in tryGetProperty() local
66 if (!tryGetProperty(key, intValue)) { in tryGetProperty()
70 outValue = intValue; in tryGetProperty()
/system/tools/aidl/tests/android/aidl/loggable/
DILoggableInterface.aidl7 int intValue, inout int[] intArray, in LogThis() argument
/system/tools/aidl/tests/android/aidl/tests/
DParcelableForToString.aidl24 int intValue;
/system/extras/verity/
DBootSignature.java108 if (formatVersion.getValue().intValue() != FORMAT_VERSION) { in BootSignature()
181 if (length.getValue().intValue() != image.length) { in verify()
/system/netd/client/
DNetdClient.cpp464 socklen_t fwmarkLen = sizeof(fwmark.intValue); in getNetworkForSocket()
465 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket()
/system/tools/hidl/test/hidl_test/
Dhidl_test_client.cpp1088 {.intValue = 7}, {.intValue = 0}, {.intValue = 1}, {.intValue = 8}, in TEST_F()
1093 EXPECT_EQ(u[0].intValue, res[0].value.intValue); in TEST_F()
1095 EXPECT_EQ(static_cast<bool>(u[1].intValue), res[1].value.boolValue); in TEST_F()
1097 EXPECT_EQ(static_cast<bool>(u[2].intValue), res[2].value.boolValue); in TEST_F()
1099 EXPECT_EQ(u[3].intValue, res[3].value.intValue); in TEST_F()
/system/netd/tests/
Dbinder_test.cpp3340 socklen_t fwmarkLen = sizeof(fwmark->intValue); in sendIPv6PacketFromUid()
3341 EXPECT_NE(-1, getsockopt(testSocket, SOL_SOCKET, SO_MARK, &(fwmark->intValue), &fwmarkLen)); in sendIPv6PacketFromUid()
3390 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
3392 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
3400 EXPECT_EQ(bypassable ? vpnNetId : fallthroughNetId, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
3404 EXPECT_EQ(bypassable ? vpnNetId : fallthroughNetId, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
3412 EXPECT_EQ(vpnNetId | 0xF0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
3417 EXPECT_EQ(vpnNetId | 0xF0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
3468 socklen_t fwmarkLen = sizeof(fwmark.intValue); in createIpv6SocketAndCheckMark()
3469 EXPECT_EQ(0, getsockopt(sockFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen)); in createIpv6SocketAndCheckMark()
[all …]
/system/tools/aidl/tests/java_app/src/android/aidl/tests/
DTestServiceClient.java650 p.intValue = 10; in testToString()