Searched refs:interface (Results 1 - 25 of 130) sorted by relevance

123456

/system/netd/server/
H A DLocalNetwork.cpp34 int LocalNetwork::addInterface(const std::string& interface) { argument
35 if (hasInterface(interface)) {
38 if (int ret = RouteController::addInterfaceToLocalNetwork(mNetId, interface.c_str())) {
39 ALOGE("failed to add interface %s to local netId %u", interface.c_str(), mNetId);
42 mInterfaces.insert(interface);
46 int LocalNetwork::removeInterface(const std::string& interface) { argument
47 if (!hasInterface(interface)) {
50 if (int ret = RouteController::removeInterfaceFromLocalNetwork(mNetId, interface.c_str())) {
51 ALOGE("failed to remove interface
[all...]
H A DPhysicalNetwork.cpp26 WARN_UNUSED_RESULT int addToDefault(unsigned netId, const std::string& interface, argument
28 if (int ret = RouteController::addInterfaceToDefaultNetwork(interface.c_str(), permission)) {
29 ALOGE("failed to add interface %s to default netId %u", interface.c_str(), netId);
32 if (int ret = delegate->addFallthrough(interface, permission)) {
38 WARN_UNUSED_RESULT int removeFromDefault(unsigned netId, const std::string& interface, argument
41 if (int ret = RouteController::removeInterfaceFromDefaultNetwork(interface.c_str(),
43 ALOGE("failed to remove interface %s from default netId %u", interface.c_str(), netId);
46 if (int ret = delegate->removeFallthrough(interface, permissio
124 addInterface(const std::string& interface) argument
142 removeInterface(const std::string& interface) argument
[all...]
H A DClatdController.h29 int startClatd(char *interface);
30 int stopClatd(char* interface);
31 bool isClatdStarted(char* interface);
36 pid_t getClatdPid(char* interface);
H A DInterfaceController.h24 int setEnableIPv6(const char *interface, const int on);
25 int setIPv6PrivacyExtensions(const char *interface, const int on);
26 int setIPv6NdOffload(char* interface, const int on);
27 int setMtu(const char *interface, const char *mtu);
H A DClatdController.cpp44 // Returns the PID of the clatd running on interface |interface|, or 0 if clatd is not running on
45 // |interface|.
46 pid_t ClatdController::getClatdPid(char* interface) { argument
47 auto it = mClatdPids.find(interface);
51 int ClatdController::startClatd(char* interface) { argument
52 pid_t pid = getClatdPid(interface);
55 ALOGE("clatd pid=%d already started on %s", pid, interface);
60 // Pass in the interface, a netid to use for DNS lookups, and a fwmark for outgoing packets.
61 unsigned netId = mNetCtrl->getNetworkForInterface(interface);
116 stopClatd(char* interface) argument
135 isClatdStarted(char* interface) argument
[all...]
H A DRouteController.h31 INTERFACE, // Compute the table number based on the interface index.
41 static int addInterfaceToLocalNetwork(unsigned netId, const char* interface) WARN_UNUSED_RESULT;
43 const char* interface) WARN_UNUSED_RESULT;
45 static int addInterfaceToPhysicalNetwork(unsigned netId, const char* interface,
47 static int removeInterfaceFromPhysicalNetwork(unsigned netId, const char* interface,
50 static int addInterfaceToVirtualNetwork(unsigned netId, const char* interface, bool secure,
52 static int removeInterfaceFromVirtualNetwork(unsigned netId, const char* interface, bool secure,
55 static int modifyPhysicalNetworkPermission(unsigned netId, const char* interface,
59 static int addUsersToVirtualNetwork(unsigned netId, const char* interface, bool secure,
61 static int removeUsersFromVirtualNetwork(unsigned netId, const char* interface, boo
[all...]
H A DVirtualNetwork.cpp69 for (const std::string& interface : mInterfaces) {
70 if (int ret = RouteController::addUsersToVirtualNetwork(mNetId, interface.c_str(), mSecure,
72 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId);
84 for (const std::string& interface : mInterfaces) {
85 if (int ret = RouteController::removeUsersFromVirtualNetwork(mNetId, interface.c_str(),
87 ALOGE("failed to remove users on interface %s of netId %u", interface.c_str(), mNetId);
99 int VirtualNetwork::addInterface(const std::string& interface) { argument
100 if (hasInterface(interface)) {
112 removeInterface(const std::string& interface) argument
[all...]
H A DDummyNetwork.h30 int addInterface(const std::string& interface) override WARN_UNUSED_RESULT;
31 int removeInterface(const std::string& interface) override WARN_UNUSED_RESULT;
H A DLocalNetwork.h29 int addInterface(const std::string& interface) override WARN_UNUSED_RESULT;
30 int removeInterface(const std::string& interface) override WARN_UNUSED_RESULT;
H A DInterfaceController.cpp101 // When sending traffic via a given interface use only addresses configured
102 // on that interface as possible source addresses.
109 int InterfaceController::setEnableIPv6(const char *interface, const int on) { argument
110 if (!isIfaceName(interface)) {
116 // addresses and routes and disables IPv6 on the interface.
118 return writeValueToPath(ipv6_proc_path, interface, "disable_ipv6", disable_ipv6);
121 int InterfaceController::setIPv6PrivacyExtensions(const char *interface, const int on) { argument
122 if (!isIfaceName(interface)) {
128 return writeValueToPath(ipv6_proc_path, interface, "use_tempaddr", on ? "2" : "0");
134 int InterfaceController::setIPv6NdOffload(char* interface, cons argument
169 setMtu(const char *interface, const char *mtu) argument
[all...]
H A DNetwork.h36 // clearInterfaces(), before deleting it. This is because interface removal may fail. If we
43 bool hasInterface(const std::string& interface) const;
47 virtual int addInterface(const std::string& interface) WARN_UNUSED_RESULT = 0;
48 virtual int removeInterface(const std::string& interface) WARN_UNUSED_RESULT = 0;
/system/bt/hci/src/
H A Dbuffer_allocator.c29 static const allocator_t interface = { variable
35 return &interface;
/system/connectivity/shill/dhcp/
H A Ddhcp_proxy_interface.h24 // These are the methods that a DHCP proxy must support. The interface is
30 virtual void Rebind(const std::string& interface) = 0;
31 virtual void Release(const std::string& interface) = 0;
H A Dmock_dhcp_proxy.h34 MOCK_METHOD1(Rebind, void(const std::string& interface));
35 MOCK_METHOD1(Release, void(const std::string& interface));
/system/core/libnetutils/
H A Ddhcptool.c32 char* interface = argv[1]; local
34 err(errno, "dhcptool %s: ifc_init failed", interface);
39 int rc = do_dhcp(interface);
41 err(errno, "dhcptool %s: do_dhcp failed", interface);
/system/connectivity/apmanager/
H A Dfirewall_manager.cc46 void FirewallManager::RequestDHCPPortAccess(const std::string& interface) { argument
48 if (dhcp_access_interfaces_.find(interface) !=
50 LOG(ERROR) << "DHCP access already requested for interface: " << interface;
53 firewall_proxy_->RequestUdpPortAccess(interface, kDhcpServerPort);
54 dhcp_access_interfaces_.insert(interface);
57 void FirewallManager::ReleaseDHCPPortAccess(const std::string& interface) { argument
59 if (dhcp_access_interfaces_.find(interface) ==
61 LOG(ERROR) << "DHCP access has not been requested for interface: "
62 << interface;
[all...]
H A Dfirewall_proxy_interface.h28 virtual bool RequestUdpPortAccess(const std::string& interface,
30 virtual bool ReleaseUdpPortAccess(const std::string& interface,
/system/connectivity/shill/dbus/
H A Dchromeos_dhcpcd_proxy.cc42 void ChromeosDHCPCDProxy::Rebind(const string& interface) { argument
45 if (!dhcpcd_proxy_->Rebind(interface, &error)) {
46 LogDBusError(error, __func__, interface);
50 void ChromeosDHCPCDProxy::Release(const string& interface) { argument
53 if (!dhcpcd_proxy_->Release(interface, &error)) {
54 LogDBusError(error, __func__, interface);
60 const string& interface) {
65 LOG(FATAL) << "DBus error: " << method << " " << interface << ": "
58 LogDBusError(const brillo::ErrorPtr& error, const string& method, const string& interface) argument
H A Dchromeos_dhcpcd_proxy.h37 void Rebind(const std::string& interface) override;
38 void Release(const std::string& interface) override;
43 const std::string& interface);
/system/connectivity/shill/test-scripts/
H A Dmonitor-flimflam8 def property_changed(name, value, path, interface):
9 iface = interface[interface.rfind(".") + 1:]
25 interface_keyword="interface")
/system/tools/aidl/
H A Dgenerate_cpp_unittest.cpp45 interface IComplexTypeInterface {
708 "package foo; interface IFooType {}");
713 unique_ptr<AidlInterface> interface = Parse(); local
714 ASSERT_NE(interface, nullptr);
715 unique_ptr<Document> doc = internals::BuildClientHeader(types_, *interface);
720 unique_ptr<AidlInterface> interface = Parse(); local
721 ASSERT_NE(interface, nullptr);
722 unique_ptr<Document> doc = internals::BuildClientSource(types_, *interface);
727 unique_ptr<AidlInterface> interface = Parse(); local
728 ASSERT_NE(interface, nullpt
734 unique_ptr<AidlInterface> interface = Parse(); local
741 unique_ptr<AidlInterface> interface = Parse(); local
748 unique_ptr<AidlInterface> interface = Parse(); local
786 const unique_ptr<AidlInterface> interface = Parse(); local
793 const unique_ptr<AidlInterface> interface = Parse(); local
810 const unique_ptr<AidlInterface> interface = Parse(); local
[all...]
/system/connectivity/apmanager/dbus/
H A Dfirewalld_dbus_proxy.cc51 bool FirewalldDBusProxy::RequestUdpPortAccess(const string& interface, argument
60 if (!proxy_->PunchUdpHole(port, interface, &success, &error)) {
67 << " on interface " << interface << " is denied"; local
71 << " on interface " << interface; local
75 bool FirewalldDBusProxy::ReleaseUdpPortAccess(const string& interface, argument
84 if (!proxy_->PlugUdpHole(port, interface, &success, &error)) {
91 << " on interface " << interface << " i local
95 << " on interface " << interface; local
[all...]
/system/core/adb/
H A Dusb_osx.cpp47 IOUSBInterfaceInterface190** interface; member in struct:usb_handle
55 usb_handle() : bulkIn(0), bulkOut(0), interface(nullptr),
101 // Create the matching dictionary to find the Android device's adb interface.
140 //* Create an intermediate interface plugin
147 LOG(ERROR) << "Unable to create an interface plug-in (" << std::hex << kr << ")";
151 //* This gets us the interface object
155 //* We only needed the plugin to get the interface, so discard it
158 LOG(ERROR) << "Couldn't query the interface (" << std::hex << result << ")";
167 LOG(DEBUG) << "Ignoring interface with incorrect class/subclass/protocol - " << if_class
174 //* device; after getting a plugin, and querying the interface, o
299 ClearPipeStallBothEnds(IOUSBInterfaceInterface190** interface, UInt8 bulkEp) argument
311 CheckInterface(IOUSBInterfaceInterface190 **interface, UInt16 vendor, UInt16 product) argument
[all...]
/system/core/fastboot/
H A Dusb_osx.cpp64 IOUSBInterfaceInterface190 **interface; member in struct:usb_handle
91 IOUSBInterfaceInterface190 **interface = NULL; local
116 ERR("Couldn't create a device interface iterator: (%08x)\n", kr);
137 // Now create the interface interface for the interface
141 (LPVOID*) &interface);
146 if (result || !interface) {
147 ERR("Couldn't create interface interface
[all...]
/system/firewalld/
H A Diptables.cc129 const std::string& interface) {
130 return ApplyVpnSetup(usernames, interface, true /* add */);
134 const std::string& interface) {
135 return ApplyVpnSetup(usernames, interface, false /* delete */);
139 const std::string& interface,
147 if (!IsValidInterfaceName(interface)) {
148 LOG(ERROR) << "Invalid interface name '" << interface << "'";
152 Hole hole = std::make_pair(port, interface);
154 // We have already punched a hole for |port| on |interface|
128 RequestVpnSetup(const std::vector<std::string>& usernames, const std::string& interface) argument
133 RemoveVpnSetup(const std::vector<std::string>& usernames, const std::string& interface) argument
138 PunchHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument
161 << " on interface '" << interface << "'"; local
174 PlugHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument
194 << " on interface '" << interface << "'"; local
227 AddAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument
253 DeleteAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument
263 ApplyVpnSetup(const std::vector<std::string>& usernames, const std::string& interface, bool add) argument
301 ApplyMasquerade(const std::string& interface, bool add) argument
327 AddAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument
351 DeleteAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument
375 ApplyMasqueradeWithExecutable(const std::string& interface, const std::string& executable_path, bool add) argument
[all...]

Completed in 1581 milliseconds

123456