/system/netd/server/ |
H A D | LocalNetwork.cpp | 34 int LocalNetwork::addInterface(const std::string& interface) { argument 35 if (hasInterface(interface)) { 38 if (int ret = RouteController::addInterfaceToLocalNetwork(mNetId, interface.c_str())) { 39 ALOGE("failed to add interface %s to local netId %u", interface.c_str(), mNetId); 42 mInterfaces.insert(interface); 46 int LocalNetwork::removeInterface(const std::string& interface) { argument 47 if (!hasInterface(interface)) { 50 if (int ret = RouteController::removeInterfaceFromLocalNetwork(mNetId, interface.c_str())) { 51 ALOGE("failed to remove interface [all...] |
H A D | PhysicalNetwork.cpp | 26 WARN_UNUSED_RESULT int addToDefault(unsigned netId, const std::string& interface, argument 28 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) { 29 ALOGE("failed to add interface %s to default netId %u", interface.c_str(), netId); 32 if (int ret = delegate->addFallthrough(interface, permission)) { 38 WARN_UNUSED_RESULT int removeFromDefault(unsigned netId, const std::string& interface, argument 41 if (int ret = RouteController::removeInterfaceFromDefaultNetwork(interface.c_str(), 43 ALOGE("failed to remove interface %s from default netId %u", interface.c_str(), netId); 46 if (int ret = delegate->removeFallthrough(interface, permissio 124 addInterface(const std::string& interface) argument 142 removeInterface(const std::string& interface) argument [all...] |
H A D | ClatdController.h | 29 int startClatd(char *interface); 30 int stopClatd(char* interface); 31 bool isClatdStarted(char* interface); 36 pid_t getClatdPid(char* interface);
|
H A D | InterfaceController.h | 24 int setEnableIPv6(const char *interface, const int on); 25 int setIPv6PrivacyExtensions(const char *interface, const int on); 26 int setIPv6NdOffload(char* interface, const int on); 27 int setMtu(const char *interface, const char *mtu);
|
H A D | ClatdController.cpp | 44 // Returns the PID of the clatd running on interface |interface|, or 0 if clatd is not running on 45 // |interface|. 46 pid_t ClatdController::getClatdPid(char* interface) { argument 47 auto it = mClatdPids.find(interface); 51 int ClatdController::startClatd(char* interface) { argument 52 pid_t pid = getClatdPid(interface); 55 ALOGE("clatd pid=%d already started on %s", pid, interface); 60 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets. 61 unsigned netId = mNetCtrl->getNetworkForInterface(interface); 116 stopClatd(char* interface) argument 135 isClatdStarted(char* interface) argument [all...] |
H A D | RouteController.h | 31 INTERFACE, // Compute the table number based on the interface index. 41 static int addInterfaceToLocalNetwork(unsigned netId, const char* interface) WARN_UNUSED_RESULT; 43 const char* interface) WARN_UNUSED_RESULT; 45 static int addInterfaceToPhysicalNetwork(unsigned netId, const char* interface, 47 static int removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface, 50 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure, 52 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure, 55 static int modifyPhysicalNetworkPermission(unsigned netId, const char* interface, 59 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure, 61 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, boo [all...] |
H A D | VirtualNetwork.cpp | 69 for (const std::string& interface : mInterfaces) { 70 if (int ret = RouteController::addUsersToVirtualNetwork(mNetId, interface.c_str(), mSecure, 72 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId); 84 for (const std::string& interface : mInterfaces) { 85 if (int ret = RouteController::removeUsersFromVirtualNetwork(mNetId, interface.c_str(), 87 ALOGE("failed to remove users on interface %s of netId %u", interface.c_str(), mNetId); 99 int VirtualNetwork::addInterface(const std::string& interface) { argument 100 if (hasInterface(interface)) { 112 removeInterface(const std::string& interface) argument [all...] |
H A D | DummyNetwork.h | 30 int addInterface(const std::string& interface) override WARN_UNUSED_RESULT; 31 int removeInterface(const std::string& interface) override WARN_UNUSED_RESULT;
|
H A D | LocalNetwork.h | 29 int addInterface(const std::string& interface) override WARN_UNUSED_RESULT; 30 int removeInterface(const std::string& interface) override WARN_UNUSED_RESULT;
|
H A D | InterfaceController.cpp | 101 // When sending traffic via a given interface use only addresses configured 102 // on that interface as possible source addresses. 109 int InterfaceController::setEnableIPv6(const char *interface, const int on) { argument 110 if (!isIfaceName(interface)) { 116 // addresses and routes and disables IPv6 on the interface. 118 return writeValueToPath(ipv6_proc_path, interface, "disable_ipv6", disable_ipv6); 121 int InterfaceController::setIPv6PrivacyExtensions(const char *interface, const int on) { argument 122 if (!isIfaceName(interface)) { 128 return writeValueToPath(ipv6_proc_path, interface, "use_tempaddr", on ? "2" : "0"); 134 int InterfaceController::setIPv6NdOffload(char* interface, cons argument 169 setMtu(const char *interface, const char *mtu) argument [all...] |
H A D | Network.h | 36 // clearInterfaces(), before deleting it. This is because interface removal may fail. If we 43 bool hasInterface(const std::string& interface) const; 47 virtual int addInterface(const std::string& interface) WARN_UNUSED_RESULT = 0; 48 virtual int removeInterface(const std::string& interface) WARN_UNUSED_RESULT = 0;
|
/system/bt/hci/src/ |
H A D | buffer_allocator.c | 29 static const allocator_t interface = { variable 35 return &interface;
|
/system/connectivity/shill/dhcp/ |
H A D | dhcp_proxy_interface.h | 24 // These are the methods that a DHCP proxy must support. The interface is 30 virtual void Rebind(const std::string& interface) = 0; 31 virtual void Release(const std::string& interface) = 0;
|
H A D | mock_dhcp_proxy.h | 34 MOCK_METHOD1(Rebind, void(const std::string& interface)); 35 MOCK_METHOD1(Release, void(const std::string& interface));
|
/system/core/libnetutils/ |
H A D | dhcptool.c | 32 char* interface = argv[1]; local 34 err(errno, "dhcptool %s: ifc_init failed", interface); 39 int rc = do_dhcp(interface); 41 err(errno, "dhcptool %s: do_dhcp failed", interface);
|
/system/connectivity/apmanager/ |
H A D | firewall_manager.cc | 46 void FirewallManager::RequestDHCPPortAccess(const std::string& interface) { argument 48 if (dhcp_access_interfaces_.find(interface) != 50 LOG(ERROR) << "DHCP access already requested for interface: " << interface; 53 firewall_proxy_->RequestUdpPortAccess(interface, kDhcpServerPort); 54 dhcp_access_interfaces_.insert(interface); 57 void FirewallManager::ReleaseDHCPPortAccess(const std::string& interface) { argument 59 if (dhcp_access_interfaces_.find(interface) == 61 LOG(ERROR) << "DHCP access has not been requested for interface: " 62 << interface; [all...] |
H A D | firewall_proxy_interface.h | 28 virtual bool RequestUdpPortAccess(const std::string& interface, 30 virtual bool ReleaseUdpPortAccess(const std::string& interface,
|
/system/connectivity/shill/dbus/ |
H A D | chromeos_dhcpcd_proxy.cc | 42 void ChromeosDHCPCDProxy::Rebind(const string& interface) { argument 45 if (!dhcpcd_proxy_->Rebind(interface, &error)) { 46 LogDBusError(error, __func__, interface); 50 void ChromeosDHCPCDProxy::Release(const string& interface) { argument 53 if (!dhcpcd_proxy_->Release(interface, &error)) { 54 LogDBusError(error, __func__, interface); 60 const string& interface) { 65 LOG(FATAL) << "DBus error: " << method << " " << interface << ": " 58 LogDBusError(const brillo::ErrorPtr& error, const string& method, const string& interface) argument
|
H A D | chromeos_dhcpcd_proxy.h | 37 void Rebind(const std::string& interface) override; 38 void Release(const std::string& interface) override; 43 const std::string& interface);
|
/system/connectivity/shill/test-scripts/ |
H A D | monitor-flimflam | 8 def property_changed(name, value, path, interface): 9 iface = interface[interface.rfind(".") + 1:] 25 interface_keyword="interface")
|
/system/tools/aidl/ |
H A D | generate_cpp_unittest.cpp | 45 interface IComplexTypeInterface { 708 "package foo; interface IFooType {}"); 713 unique_ptr<AidlInterface> interface = Parse(); local 714 ASSERT_NE(interface, nullptr); 715 unique_ptr<Document> doc = internals::BuildClientHeader(types_, *interface); 720 unique_ptr<AidlInterface> interface = Parse(); local 721 ASSERT_NE(interface, nullptr); 722 unique_ptr<Document> doc = internals::BuildClientSource(types_, *interface); 727 unique_ptr<AidlInterface> interface = Parse(); local 728 ASSERT_NE(interface, nullpt 734 unique_ptr<AidlInterface> interface = Parse(); local 741 unique_ptr<AidlInterface> interface = Parse(); local 748 unique_ptr<AidlInterface> interface = Parse(); local 786 const unique_ptr<AidlInterface> interface = Parse(); local 793 const unique_ptr<AidlInterface> interface = Parse(); local 810 const unique_ptr<AidlInterface> interface = Parse(); local [all...] |
/system/connectivity/apmanager/dbus/ |
H A D | firewalld_dbus_proxy.cc | 51 bool FirewalldDBusProxy::RequestUdpPortAccess(const string& interface, argument 60 if (!proxy_->PunchUdpHole(port, interface, &success, &error)) { 67 << " on interface " << interface << " is denied"; local 71 << " on interface " << interface; local 75 bool FirewalldDBusProxy::ReleaseUdpPortAccess(const string& interface, argument 84 if (!proxy_->PlugUdpHole(port, interface, &success, &error)) { 91 << " on interface " << interface << " i local 95 << " on interface " << interface; local [all...] |
/system/core/adb/ |
H A D | usb_osx.cpp | 47 IOUSBInterfaceInterface190** interface; member in struct:usb_handle 55 usb_handle() : bulkIn(0), bulkOut(0), interface(nullptr), 101 // Create the matching dictionary to find the Android device's adb interface. 140 //* Create an intermediate interface plugin 147 LOG(ERROR) << "Unable to create an interface plug-in (" << std::hex << kr << ")"; 151 //* This gets us the interface object 155 //* We only needed the plugin to get the interface, so discard it 158 LOG(ERROR) << "Couldn't query the interface (" << std::hex << result << ")"; 167 LOG(DEBUG) << "Ignoring interface with incorrect class/subclass/protocol - " << if_class 174 //* device; after getting a plugin, and querying the interface, o 299 ClearPipeStallBothEnds(IOUSBInterfaceInterface190** interface, UInt8 bulkEp) argument 311 CheckInterface(IOUSBInterfaceInterface190 **interface, UInt16 vendor, UInt16 product) argument [all...] |
/system/core/fastboot/ |
H A D | usb_osx.cpp | 64 IOUSBInterfaceInterface190 **interface; member in struct:usb_handle 91 IOUSBInterfaceInterface190 **interface = NULL; local 116 ERR("Couldn't create a device interface iterator: (%08x)\n", kr); 137 // Now create the interface interface for the interface 141 (LPVOID*) &interface); 146 if (result || !interface) { 147 ERR("Couldn't create interface interface [all...] |
/system/firewalld/ |
H A D | iptables.cc | 129 const std::string& interface) { 130 return ApplyVpnSetup(usernames, interface, true /* add */); 134 const std::string& interface) { 135 return ApplyVpnSetup(usernames, interface, false /* delete */); 139 const std::string& interface, 147 if (!IsValidInterfaceName(interface)) { 148 LOG(ERROR) << "Invalid interface name '" << interface << "'"; 152 Hole hole = std::make_pair(port, interface); 154 // We have already punched a hole for |port| on |interface| 128 RequestVpnSetup(const std::vector<std::string>& usernames, const std::string& interface) argument 133 RemoveVpnSetup(const std::vector<std::string>& usernames, const std::string& interface) argument 138 PunchHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument 161 << " on interface '" << interface << "'"; local 174 PlugHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument 194 << " on interface '" << interface << "'"; local 227 AddAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 253 DeleteAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 263 ApplyVpnSetup(const std::vector<std::string>& usernames, const std::string& interface, bool add) argument 301 ApplyMasquerade(const std::string& interface, bool add) argument 327 AddAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 351 DeleteAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 375 ApplyMasqueradeWithExecutable(const std::string& interface, const std::string& executable_path, bool add) argument [all...] |