/system/netd/include/ |
D | Fwmark.h | 25 uint32_t intValue; member 33 constexpr Fwmark() : intValue(0) {} in Fwmark() 38 return m.intValue; in getUidBillingMask()
|
/system/netd/server/ |
D | RouteController.cpp | 456 RouteController::LOCAL_MANGLE_INPUT, interface, fwmark.intValue, mask); in modifyIncomingPacketMark() 499 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnUidRangeRule() 500 mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyVpnUidRangeRule() 521 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, in modifyVpnSystemPermissionRule() 522 mask.intValue); in modifyVpnSystemPermissionRule() 548 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, uidStart, uidEnd); in modifyExplicitNetworkRule() 576 fwmark.intValue, mask.intValue, IIF_LOOPBACK, interface, uidStart, uidEnd); in modifyOutputInterfaceRules() 598 fwmark.intValue, mask.intValue, IIF_LOOPBACK, OIF_NONE, INVALID_UID, in modifyImplicitNetworkRule() 623 return modifyIpRule(action, RULE_PRIORITY_VPN_FALLTHROUGH, table, fwmark.intValue, in modifyVpnFallthroughRule() 624 mask.intValue); in modifyVpnFallthroughRule() [all …]
|
D | FwmarkServer.cpp | 154 socklen_t fwmarkLen = sizeof(fwmark.intValue); in processClient() 155 if (getsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in processClient() 312 if (setsockopt(*socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, in processClient() 313 sizeof(fwmark.intValue)) == -1) { in processClient()
|
D | SockDiag.cpp | 235 mark.intValue = *reinterpret_cast<uint32_t*>(RTA_DATA(attr)); in readDiagMsgWithTcpInfo() 479 netIdMark.intValue, netIdMask.intValue }, in destroySocketsLackingPermission() 485 controlMark.intValue, controlMark.intValue }, in destroySocketsLackingPermission()
|
D | TcpSocketMonitor.cpp | 89 mark.intValue, in tcpInfoPrint() 208 if (sockinfo == nullptr || tcpinfo == nullptr || tcpinfoLen == 0 || mark.intValue == 0) { in poll()
|
D | NetdHwService.cpp | 76 _hidl_cb(netIdToNetHandle(netId), fwmark.intValue, toHalStatus(ret)); in createOemNetwork()
|
D | TetherController.cpp | 231 snprintf(markStr, sizeof(markStr), "0x%x", fwmark.intValue); in startTethering() 357 std::string daemonCmd = StringPrintf("update_dns%s0x%x", SEPARATOR, fwmark.intValue); in setDnsForwarders() 361 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]); in setDnsForwarders()
|
D | NetworkController.cpp | 204 return fwmark.intValue; in getNetworkForDnsLocked() 236 return fwmark.intValue; in getNetworkForDnsLocked() 316 nc.app_mark = fwmark.intValue; in getNetworkContext()
|
D | SockDiagTest.cpp | 360 return setsockopt(s, SOL_SOCKET, SO_MARK, &fwmark.intValue, sizeof(fwmark.intValue)); in modifySocketForTest()
|
D | ClatdController.cpp | 370 snprintf(fwmarkString, sizeof(fwmarkString), "0x%x", fwmark.intValue); in init()
|
D | XfrmControllerTest.cpp | 440 fwmark.intValue = outputmark.outputMark; in testIpSecAddSecurityAssociation()
|
D | XfrmController.cpp | 1325 output_mark->outputMark = fwmark.intValue; in fillNlAttrXfrmOutputMark()
|
/system/core/libutils/ |
D | PropertyMap.cpp | 65 int32_t intValue; in tryGetProperty() local 66 if (!tryGetProperty(key, intValue)) { in tryGetProperty() 70 outValue = intValue; in tryGetProperty()
|
/system/tools/aidl/tests/android/aidl/loggable/ |
D | ILoggableInterfaceNdk.aidl | 7 int intValue, inout int[] intArray, in LogThis() argument
|
D | ILoggableInterface.aidl | 7 int intValue, inout int[] intArray, in LogThis() argument
|
/system/extras/verity/ |
D | BootSignature.java | 108 if (formatVersion.getValue().intValue() != FORMAT_VERSION) { in BootSignature() 181 if (length.getValue().intValue() != image.length) { in verify()
|
/system/netd/client/ |
D | NetdClient.cpp | 354 socklen_t fwmarkLen = sizeof(fwmark.intValue); in getNetworkForSocket() 355 if (getsockopt(socketFd, SOL_SOCKET, SO_MARK, &fwmark.intValue, &fwmarkLen) == -1) { in getNetworkForSocket()
|
/system/tools/hidl/test/hidl_test/ |
D | hidl_test_client.cpp | 1101 {.intValue = 7}, {.intValue = 0}, {.intValue = 1}, {.intValue = 8}, in TEST_F() 1106 EXPECT_EQ(u[0].intValue, res[0].value.intValue); in TEST_F() 1108 EXPECT_EQ(static_cast<bool>(u[1].intValue), res[1].value.boolValue); in TEST_F() 1110 EXPECT_EQ(static_cast<bool>(u[2].intValue), res[2].value.boolValue); in TEST_F() 1112 EXPECT_EQ(u[3].intValue, res[3].value.intValue); in TEST_F()
|
/system/netd/resolv/ |
D | ResolverController.cpp | 216 const int err = gPrivateDnsConfiguration.set(resolverParams.netId, fwmark.intValue, tlsServers, in setResolverConfiguration()
|
/system/netd/tests/ |
D | binder_test.cpp | 3174 socklen_t fwmarkLen = sizeof(fwmark->intValue); in sendIPv6PacketFromUid() 3175 EXPECT_NE(-1, getsockopt(testSocket, SOL_SOCKET, SO_MARK, &(fwmark->intValue), &fwmarkLen)); in sendIPv6PacketFromUid() 3224 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3226 EXPECT_EQ(fallthroughNetId | 0xC0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3234 EXPECT_EQ(bypassable ? vpnNetId : fallthroughNetId, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3238 EXPECT_EQ(bypassable ? vpnNetId : fallthroughNetId, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3246 EXPECT_EQ(vpnNetId | 0xF0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks() 3251 EXPECT_EQ(vpnNetId | 0xF0000, static_cast<int>(fwmark.intValue)); in expectVpnFallthroughWorks()
|