Searched refs:protocol (Results 1 - 25 of 63) sorted by relevance

123

/system/core/adb/
H A Dshell_service_test.cpp48 SubprocessProtocol protocol);
64 const char* command, SubprocessType type, SubprocessProtocol protocol) {
72 subprocess_fd_ = StartSubprocess(command, nullptr, type, protocol);
111 // Reads shell protocol data from |fd| until it closes or errors. Fills
113 // read from the protocol or -1 if an exit code packet was not received.
119 ShellProtocol* protocol = new ShellProtocol(fd); local
120 while (protocol->Read()) {
121 switch (protocol->id()) {
123 stdout->append(protocol->data(), protocol
63 StartTestSubprocess( const char* command, SubprocessType type, SubprocessProtocol protocol) argument
230 ShellProtocol* protocol = new ShellProtocol(subprocess_fd_); local
256 ShellProtocol* protocol = new ShellProtocol(subprocess_fd_); local
[all...]
H A Dshell_service_protocol_test.cpp63 for (ShellProtocol* protocol : {read_protocol_, write_protocol_}) {
64 if (protocol) {
65 delete protocol;
90 bool PacketEquals(const ShellProtocol* protocol, ShellProtocol::Id id, argument
92 return (protocol->id() == id &&
93 protocol->data_length() == data_length &&
94 !memcmp(data, protocol->data(), data_length));
H A Dsocket_test.cpp289 for (const std::string& protocol : {"", "tcp:", "udp:"}) {
290 VerifySkipHostSerial(protocol, nullptr);
291 VerifySkipHostSerial(protocol + "foo", nullptr);
293 VerifySkipHostSerial(protocol + "foo:bar", ":bar");
294 VerifySkipHostSerial(protocol + "foo:bar:baz", ":bar:baz");
296 VerifySkipHostSerial(protocol + "foo:123:bar", ":bar");
297 VerifySkipHostSerial(protocol + "foo:123:456", ":456");
298 VerifySkipHostSerial(protocol + "foo:123:bar:baz", ":bar:baz");
301 VerifySkipHostSerial(protocol + "foo:123", ":123");
302 VerifySkipHostSerial(protocol
[all...]
/system/connectivity/shill/
H A Darp_packet.cc83 const uint16_t protocol = ntohs(header.ar_pro); local
85 if (protocol == ETHERTYPE_IP) {
87 } else if (protocol == ETHERTYPE_IPV6) {
90 NOTIMPLEMENTED() << "Packet has unknown protocol "
91 << protocol;
101 LOG(ERROR) << "Packet has unexpected protocol address length "
143 uint16_t protocol; local
146 protocol = ETHERTYPE_IP;
148 protocol = ETHERTYPE_IPV6;
165 header.ar_pro = htons(protocol);
[all...]
H A Dconnection_info.h29 ConnectionInfo(int protocol,
45 int protocol() const { return protocol_; } function in class:shill::ConnectionInfo
46 void set_protocol(int protocol) { protocol_ = protocol; } argument
H A Dhttp_url.cc45 Protocol protocol = kProtocolUnknown; local
53 protocol = kProtocolHTTP;
58 protocol = kProtocolHTTPS;
79 protocol_ = protocol;
H A Dhttp_url_unittest.cc39 protocol(in_protocol),
45 HTTPURL::Protocol protocol; member in struct:shill::StringAndResult
62 EXPECT_EQ(GetParam().protocol, url_.protocol());
H A Dconnection_info_reader_unittest.cc84 EXPECT_EQ(info1.protocol(), info2.protocol());
178 int protocol = 0; local
180 EXPECT_FALSE(reader_.ParseProtocol("", &protocol));
181 EXPECT_FALSE(reader_.ParseProtocol("a", &protocol));
182 EXPECT_FALSE(reader_.ParseProtocol("-1", &protocol));
184 &protocol));
187 EXPECT_TRUE(reader_.ParseProtocol(StringPrintf("%d", i), &protocol));
188 EXPECT_EQ(i, protocol);
H A Dhttp_url.h47 Protocol protocol() const { return protocol_; } function in class:shill::HTTPURL
H A Dconnection_info_reader.cc94 int protocol = 0; local
95 if (!ParseProtocol(tokens[++index], &protocol)) {
98 info->set_protocol(protocol);
106 if (protocol == IPPROTO_TCP)
159 bool ConnectionInfoReader::ParseProtocol(const string& input, int* protocol) { argument
160 if (!base::StringToInt(input, protocol) ||
161 *protocol < 0 || *protocol >= IPPROTO_MAX) {
H A Dconnection_info.cc37 ConnectionInfo::ConnectionInfo(int protocol, argument
48 : protocol_(protocol),
H A Dconnection_info_unittest.cc42 EXPECT_EQ(info1.protocol(), info2.protocol());
/system/firewalld/
H A Diptables.cc141 ProtocolEnum protocol) {
159 std::string sprotocol = protocol == kProtocolTcp ? "TCP" : "UDP";
162 if (!AddAcceptRules(protocol, port, interface)) {
177 ProtocolEnum protocol) {
192 std::string sprotocol = protocol == kProtocolTcp ? "TCP" : "UDP";
195 if (!DeleteAcceptRules(protocol, port, interface)) {
227 bool IpTables::AddAcceptRules(ProtocolEnum protocol, argument
230 if (!AddAcceptRule(kIpTablesPath, protocol, port, interface)) {
235 if (AddAcceptRule(kIp6TablesPath, protocol, port, interface)) {
242 DeleteAcceptRule(kIpTablesPath, protocol, por
138 PunchHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument
174 PlugHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument
253 DeleteAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument
327 AddAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument
351 DeleteAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument
[all...]
H A Diptables.h67 ProtocolEnum protocol);
71 ProtocolEnum protocol);
73 bool AddAcceptRules(ProtocolEnum protocol,
76 bool DeleteAcceptRules(ProtocolEnum protocol,
81 ProtocolEnum protocol,
85 ProtocolEnum protocol,
/system/bt/bta/pan/
H A Dbta_pan_ci.c124 void bta_pan_ci_rx_write(UINT16 handle, BD_ADDR dst, BD_ADDR src, UINT16 protocol, argument
134 ((tBTA_PAN_DATA_PARAMS *)p_buf)->protocol = protocol;
161 void bta_pan_ci_rx_writebuf(UINT16 handle, BD_ADDR dst, BD_ADDR src, UINT16 protocol, argument
168 ((tBTA_PAN_DATA_PARAMS *)p_buf)->protocol = protocol;
202 *p_protocol = ((tBTA_PAN_DATA_PARAMS *)p_buf)->protocol;
234 ** Description This function is called to set protocol filters
264 void bta_pan_ci_rx_writebuf(UINT16 handle, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, BOOLEAN ext) argument
269 UNUSED(protocol);
[all...]
/system/bt/bta/include/
H A Dbta_pan_co.h139 extern void bta_pan_co_tx_write(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, UINT8 *p_data,
155 extern void bta_pan_co_tx_writebuf(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf,
180 ** Description protocol filter indication from peer device
H A Dbta_pan_ci.h98 extern void bta_pan_ci_rx_writebuf(UINT16 handle, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, BOOLEAN ext);
120 ** Description This function is called to set protocol filters
/system/bt/btif/include/
H A Dbtif_pan_internal.h69 UINT16 protocol; member in struct:__anon625
104 int btpan_tap_send(int tap_fd, const BD_ADDR src, const BD_ADDR dst, UINT16 protocol,
/system/core/fastboot/
H A Dsocket.h31 // interface that enforces the fastboot protocol.
58 static std::unique_ptr<Socket> NewClient(Protocol protocol, const std::string& hostname,
65 static std::unique_ptr<Socket> NewServer(Protocol protocol, int port);
H A Dsocket_test.cpp35 bool MakeConnectedSockets(Socket::Protocol protocol, std::unique_ptr<Socket>* server, argument
38 *server = Socket::NewServer(protocol, 0);
44 *client = Socket::NewClient(protocol, hostname, (*server)->GetLocalPort(), nullptr);
51 if (protocol == Socket::Protocol::kTcp) {
80 for (Socket::Protocol protocol : {Socket::Protocol::kUdp, Socket::Protocol::kTcp}) {
81 ASSERT_TRUE(MakeConnectedSockets(protocol, &server, &client));
95 for (Socket::Protocol protocol : {Socket::Protocol::kUdp, Socket::Protocol::kTcp}) {
96 ASSERT_TRUE(MakeConnectedSockets(protocol, &server, &client));
116 for (Socket::Protocol protocol : {Socket::Protocol::kUdp, Socket::Protocol::kTcp}) {
117 ASSERT_TRUE(MakeConnectedSockets(protocol,
[all...]
/system/bt/btif/co/
H A Dbta_pan_co.c164 UINT16 protocol; local
186 if ((p_buf = bta_pan_ci_readbuf(handle, src, dst, &protocol,
202 btpan_tap_send(btpan_cb.tap_fd, src, dst, protocol,
244 UINT16 protocol, UINT8 *p_data,
251 UNUSED(protocol);
274 BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf,
281 UNUSED(protocol);
320 ** Description protocol filter indication from peer device
243 bta_pan_co_tx_write(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, UINT8 *p_data, UINT16 len, BOOLEAN ext, BOOLEAN forward) argument
273 bta_pan_co_tx_writebuf(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, BOOLEAN ext, BOOLEAN forward) argument
/system/bt/stack/include/
H A Dbnep_api.h118 UINT16 protocol,
135 UINT16 protocol,
153 ** Number of protocol filters present
194 tBNEP_FILTER_IND_CB *p_filter_ind_cb; /* To indicate that peer set protocol filters */
324 ** protocol - protocol type of the packet
339 UINT16 protocol,
352 ** protocol - protocol type of the packet
369 UINT16 protocol,
[all...]
H A Dpan_api.h123 UINT16 protocol,
143 UINT16 protocol,
162 ** Number of protocol filters present
207 tPAN_FILTER_IND_CB *pan_pfilt_ind_cb; /* protocol filter indication callback */
339 ** protocol - protocol of the ethernet packet like IP or ARP
352 UINT16 protocol,
370 ** protocol - protocol of the ethernet packet like IP or ARP
382 UINT16 protocol,
[all...]
/system/extras/tests/net_test/
H A Dnet_test.py114 def Socket(family, sock_type, protocol):
115 s = socket(family, sock_type, protocol)
344 def ReadProcNetSocket(self, protocol):
346 filename = "/proc/net/%s" % protocol
350 if protocol in ["icmp6", "raw6", "udp6"]:
355 if protocol.endswith("6"):
360 if protocol.startswith("tcp"):
363 elif re.match("icmp|udp|raw", protocol):
H A Dsock_diag.py72 "InetDiagReqV2", "=BBBxIS", "family protocol ext states id",
228 def DumpAllInetSockets(self, protocol, bytecode, sock_id=None, ext=0,
241 diag_req = InetDiagReqV2((family, protocol, ext, states, sock_id))
280 protocol = s.getsockopt(net_test.SOL_SOCKET, net_test.SO_PROTOCOL)
299 return InetDiagReqV2((family, protocol, 0, 0xffffffff, sock_id))
317 def DiagReqFromDiagMsg(d, protocol):
319 return InetDiagReqV2((d.family, protocol, 0, 1 << d.state, d.id))
327 protocol = s.getsockopt(SOL_SOCKET, net_test.SO_PROTOCOL)
328 req = self.DiagReqFromDiagMsg(diag_msg, protocol)

Completed in 419 milliseconds

123