/system/core/adb/ |
H A D | console.cpp | 116 std::string commands = adb_construct_auth_command(); local 119 commands.append(argv[i]); 120 commands.push_back(i == argc - 1 ? '\n' : ' '); 123 commands.append("quit\n"); 125 if (!WriteFdExactly(fd, commands)) {
|
H A D | shell_service_test.cpp | 226 const char* commands[] = {"TEST_STR=abc123", local 231 for (std::string command : commands) { 243 for (const char* command : commands) {
|
/system/netd/server/ |
H A D | StrictController.h | 49 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
|
H A D | FirewallController.cpp | 300 std::string commands; local 301 StringAppendF(&commands, "*filter\n:%s -\n", name); 304 StringAppendF(&commands, "-A %s -i lo -o lo -j RETURN\n", name); 308 StringAppendF(&commands, "-A %s -p tcp --tcp-flags RST RST -j RETURN\n", name); 314 StringAppendF(&commands, "-A %s -p icmpv6 --icmpv6-type %s -j RETURN\n", 320 StringAppendF(&commands, 327 StringAppendF(&commands, "-A %s -m owner --uid-owner %d -j %s\n", name, uid, action); 333 StringAppendF(&commands, "-A %s -j DROP\n", name); 336 StringAppendF(&commands, "COMMIT\n\x04"); // EOT. 338 return commands; [all...] |
H A D | IptablesBaseTest.h | 32 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);
|
H A D | NetdConstants.cpp | 122 static int execIptablesRestoreCommand(const char *cmd, const std::string& commands) { argument 131 .opt_input.input = reinterpret_cast<const uint8_t*>(commands.c_str()), 132 .opt_input.input_len = commands.size(), 148 int execIptablesRestore(IptablesTarget target, const std::string& commands) { argument 151 res |= execIptablesRestoreCommand(IPTABLES_RESTORE_PATH, commands); 154 res |= execIptablesRestoreCommand(IP6TABLES_RESTORE_PATH, commands);
|
H A D | FirewallController.h | 90 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
|
H A D | IptablesBaseTest.cpp | 85 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { argument 86 sRestoreCmds.push_back({ target, commands }); 94 ADD_FAILURE() << "Expected too many iptables commands, want command "
|
H A D | StrictController.cpp | 154 const std::string commands = android::base::Join(commandList, '\n'); local 155 return execIptablesRestore(V4V6, commands);
|
H A D | NetdConstants.h | 47 int execIptablesRestore(IptablesTarget target, const std::string& commands); 105 * coexist with the commands in CommandListener.cpp. These are presumed not thread-safe because 107 * FrameworkListener that passes in commands one at a time.
|
H A D | BandwidthController.cpp | 272 std::string commands = android::base::Join(IPT_FLUSH_COMMANDS, '\n'); local 273 iptablesRestoreFunction(V4V6, commands); 299 std::string commands = android::base::Join(IPT_BASIC_ACCOUNTING_COMMANDS, '\n'); local 300 return iptablesRestoreFunction(V4V6, commands); 314 int BandwidthController::runCommands(int numCommands, const char *commands[], argument 321 ALOGV("runCommands(): %d commands", numCommands); 323 res = runIpxtablesCmd(commands[cmdNum], IptJumpNoAdd, failureLogging);
|
H A D | BandwidthController.h | 154 int runCommands(int numCommands, const char *commands[], RunCmdErrHandling cmdErrHandling);
|
/system/tpm/trunks/generator/ |
H A D | generator_test.py | 235 commands = parser.Parse() 236 self.assertIsNotNone(commands) 243 commands = parser.Parse() 244 self.assertEqual(len(commands), 1) 245 self.assertEqual(commands[0].name, 'TPM2_Test') 246 self.assertEqual(commands[0].command_code, 'TPM_CC_Test') 248 self.assertEqual(len(commands[0].request_args), 1) 249 self.assertEqual(commands[0].request_args[0]['type'], 'UINT16') 250 self.assertEqual(commands[0].request_args[0]['name'], 'input') 251 self.assertIsNotNone(commands[ [all...] |
H A D | generator.py | 19 """A code generator for TPM 2.0 structures and commands. 22 extract_structures.sh script and a commands file as emitted by the 47 Sample input for commands looks like this: 1751 # These commands have handles that are serialized into the parameter 1864 """Parses everything in a commands file. 1869 commands = [] 1873 return commands 1880 commands.append(cmd) 1881 return commands 1949 def GenerateHandleCountFunctions(commands, out_fil [all...] |
/system/extras/verity/ |
H A D | build_verity_metadata.py | 7 import commands namespace 15 status, output = commands.getstatusoutput(cmd)
|
/system/bt/tools/hci/ |
H A D | main.c | 36 static const command_t commands[] = { variable 203 for (size_t i = 0; i < ARRAY_SIZE(commands); ++i) 204 if (!strcmp(commands[i].name, name)) 205 return &commands[i]; 212 for (size_t i = 0; i < ARRAY_SIZE(commands); ++i) 213 printf(" %s\n", commands[i].name);
|
/system/bt/service/client/ |
H A D | main.cpp | 839 << "Type \"help\" to see possible commands.\n" 844 // Add commands from the command line, if they exist. 857 vector<string> commands = base::SplitString(command, ";", local 860 for (string command : commands) { 865 commands.clear();
|