/system/netd/include/ |
D | Fwmark.h | 25 uint32_t intValue; member 33 constexpr Fwmark() : intValue(0) {} in Fwmark() 38 return m.intValue; in getUidBillingMask()
|
/system/netd/server/ |
D | RouteController.cpp | 485 RouteController::LOCAL_MANGLE_INPUT, interface, fwmark.intValue, mask); in modifyIncomingPacketMark() 528 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnUidRangeRule() 529 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyVpnUidRangeRule() 550 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnSystemPermissionRule() 551 mask.intValue); in modifyVpnSystemPermissionRule() 577 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyExplicitNetworkRule() 605 fwmark.intValue, mask.intValue, IIF_LOOPBACK, interface, uidStart, uidEnd); in modifyOutputInterfaceRules() 627 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, INVALID_UID, in modifyImplicitNetworkRule() 652 return modifyIpRule(action, RULE_PRIORITY_VPN_FALLTHROUGH, table, fwmark.intValue, in modifyVpnFallthroughRule() 653 mask.intValue); in modifyVpnFallthroughRule() [all …]
|
D | FwmarkServer.cpp | 165 socklen_t fwmarkLen = sizeof(fwmark.intValue); in processClient() 166 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient() 329 if (setsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, in processClient() 330 sizeof(fwmark.intValue)) == -1) { in processClient()
|
D | SockDiag.cpp | 236 mark.intValue = *reinterpret_cast<uint32_t*>(RTA_DATA(attr)); in readDiagMsgWithTcpInfo() 481 netIdMark.intValue, netIdMask.intValue }, in destroySocketsLackingPermission() 487 controlMark.intValue, controlMark.intValue }, in destroySocketsLackingPermission()
|
D | TcpSocketMonitor.cpp | 90 mark.intValue, in tcpInfoPrint() 209 if (sockinfo == nullptr || tcpinfo == nullptr || tcpinfoLen == 0 || mark.intValue == 0) { in poll()
|
D | NetdHwService.cpp | 76 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret)); in createOemNetwork()
|
D | NetworkController.cpp | 219 return fwmark.intValue; in getNetworkForDnsLocked() 250 return fwmark.intValue; in getNetworkForDnsLocked() 325 nc.app_mark = fwmark.intValue; in getNetworkContext()
|
D | SockDiagTest.cpp | 361 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue)); in modifySocketForTest()
|
D | TetherController.cpp | 260 snprintf(markStr, sizeof(markStr), "0x%x", fwmark.intValue); in startTethering() 407 std::string daemonCmd = StringPrintf("update_dns%s0x%x", SEPARATOR, fwmark.intValue); in setDnsForwarders() 411 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]); in setDnsForwarders()
|
D | ClatdController.cpp | 426 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue); in init()
|
D | XfrmControllerTest.cpp | 439 fwmark.intValue = outputmark.outputMark; in testIpSecAddSecurityAssociation()
|
D | XfrmController.cpp | 1323 output_mark->outputMark = fwmark.intValue; in fillNlAttrXfrmOutputMark()
|
D | NetdNativeService.cpp | 1252 markMask->mark = fwmark.intValue; in getFwmarkForNetwork()
|
/system/core/libutils/ |
D | PropertyMap.cpp | 65 int32_t intValue; in tryGetProperty() local 66 if (!tryGetProperty(key, intValue)) { in tryGetProperty() 70 outValue = intValue; in tryGetProperty()
|
/system/tools/aidl/tests/android/aidl/loggable/ |
D | ILoggableInterface.aidl | 7 int intValue, inout int[] intArray, in LogThis() argument
|
/system/tools/aidl/tests/android/aidl/tests/ |
D | ParcelableForToString.aidl | 24 int intValue;
|
/system/extras/verity/ |
D | BootSignature.java | 108 if (formatVersion.getValue().intValue() != FORMAT_VERSION) { in BootSignature() 181 if (length.getValue().intValue() != image.length) { in verify()
|
/system/netd/client/ |
D | NetdClient.cpp | 464 socklen_t fwmarkLen = sizeof(fwmark.intValue); in getNetworkForSocket() 465 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket()
|
/system/tools/hidl/test/hidl_test/ |
D | hidl_test_client.cpp | 1088 {.intValue = 7}, {.intValue = 0}, {.intValue = 1}, {.intValue = 8}, in TEST_F() 1093 EXPECT_EQ(u[0].intValue, res[0].value.intValue); in TEST_F() 1095 EXPECT_EQ(static_cast<bool>(u[1].intValue), res[1].value.boolValue); in TEST_F() 1097 EXPECT_EQ(static_cast<bool>(u[2].intValue), res[2].value.boolValue); in TEST_F() 1099 EXPECT_EQ(u[3].intValue, res[3].value.intValue); in TEST_F()
|
/system/netd/tests/ |
D | binder_test.cpp | 3340 socklen_t fwmarkLen = sizeof(fwmark->intValue); in sendIPv6PacketFromUid() 3341 EXPECT_NE(-1, getsockopt(testSocket, SOL_SOCKET, SO_MARK, &(fwmark->intValue), &fwmarkLen)); in sendIPv6PacketFromUid() 3390 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3392 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3400 EXPECT_EQ(bypassable ? vpnNetId : fallthroughNetId, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3404 EXPECT_EQ(bypassable ? vpnNetId : fallthroughNetId, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3412 EXPECT_EQ(vpnNetId | 0xF0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3417 EXPECT_EQ(vpnNetId | 0xF0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3468 socklen_t fwmarkLen = sizeof(fwmark.intValue); in createIpv6SocketAndCheckMark() 3469 EXPECT_EQ(0, getsockopt(sockFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen)); in createIpv6SocketAndCheckMark() [all …]
|
/system/tools/aidl/tests/java_app/src/android/aidl/tests/ |
D | TestServiceClient.java | 650 p.intValue = 10; in testToString()
|