/system/core/adb/ |
H A D | shell_service_test.cpp | 48 SubprocessProtocol protocol); 64 const char* command, SubprocessType type, SubprocessProtocol protocol) { 72 subprocess_fd_ = StartSubprocess(command, nullptr, type, protocol); 111 // Reads shell protocol data from |fd| until it closes or errors. Fills 113 // read from the protocol or -1 if an exit code packet was not received. 119 ShellProtocol* protocol = new ShellProtocol(fd); local 120 while (protocol->Read()) { 121 switch (protocol->id()) { 123 stdout->append(protocol->data(), protocol 63 StartTestSubprocess( const char* command, SubprocessType type, SubprocessProtocol protocol) argument 230 ShellProtocol* protocol = new ShellProtocol(subprocess_fd_); local 256 ShellProtocol* protocol = new ShellProtocol(subprocess_fd_); local [all...] |
H A D | shell_service_protocol_test.cpp | 63 for (ShellProtocol* protocol : {read_protocol_, write_protocol_}) { 64 if (protocol) { 65 delete protocol; 90 bool PacketEquals(const ShellProtocol* protocol, ShellProtocol::Id id, argument 92 return (protocol->id() == id && 93 protocol->data_length() == data_length && 94 !memcmp(data, protocol->data(), data_length));
|
H A D | socket_test.cpp | 289 for (const std::string& protocol : {"", "tcp:", "udp:"}) { 290 VerifySkipHostSerial(protocol, nullptr); 291 VerifySkipHostSerial(protocol + "foo", nullptr); 293 VerifySkipHostSerial(protocol + "foo:bar", ":bar"); 294 VerifySkipHostSerial(protocol + "foo:bar:baz", ":bar:baz"); 296 VerifySkipHostSerial(protocol + "foo:123:bar", ":bar"); 297 VerifySkipHostSerial(protocol + "foo:123:456", ":456"); 298 VerifySkipHostSerial(protocol + "foo:123:bar:baz", ":bar:baz"); 301 VerifySkipHostSerial(protocol + "foo:123", ":123"); 302 VerifySkipHostSerial(protocol [all...] |
/system/connectivity/shill/ |
H A D | arp_packet.cc | 83 const uint16_t protocol = ntohs(header.ar_pro); local 85 if (protocol == ETHERTYPE_IP) { 87 } else if (protocol == ETHERTYPE_IPV6) { 90 NOTIMPLEMENTED() << "Packet has unknown protocol " 91 << protocol; 101 LOG(ERROR) << "Packet has unexpected protocol address length " 143 uint16_t protocol; local 146 protocol = ETHERTYPE_IP; 148 protocol = ETHERTYPE_IPV6; 165 header.ar_pro = htons(protocol); [all...] |
H A D | connection_info.h | 29 ConnectionInfo(int protocol, 45 int protocol() const { return protocol_; } function in class:shill::ConnectionInfo 46 void set_protocol(int protocol) { protocol_ = protocol; } argument
|
H A D | http_url.cc | 45 Protocol protocol = kProtocolUnknown; local 53 protocol = kProtocolHTTP; 58 protocol = kProtocolHTTPS; 79 protocol_ = protocol;
|
H A D | http_url_unittest.cc | 39 protocol(in_protocol), 45 HTTPURL::Protocol protocol; member in struct:shill::StringAndResult 62 EXPECT_EQ(GetParam().protocol, url_.protocol());
|
H A D | connection_info_reader_unittest.cc | 84 EXPECT_EQ(info1.protocol(), info2.protocol()); 178 int protocol = 0; local 180 EXPECT_FALSE(reader_.ParseProtocol("", &protocol)); 181 EXPECT_FALSE(reader_.ParseProtocol("a", &protocol)); 182 EXPECT_FALSE(reader_.ParseProtocol("-1", &protocol)); 184 &protocol)); 187 EXPECT_TRUE(reader_.ParseProtocol(StringPrintf("%d", i), &protocol)); 188 EXPECT_EQ(i, protocol);
|
H A D | http_url.h | 47 Protocol protocol() const { return protocol_; } function in class:shill::HTTPURL
|
H A D | connection_info_reader.cc | 94 int protocol = 0; local 95 if (!ParseProtocol(tokens[++index], &protocol)) { 98 info->set_protocol(protocol); 106 if (protocol == IPPROTO_TCP) 159 bool ConnectionInfoReader::ParseProtocol(const string& input, int* protocol) { argument 160 if (!base::StringToInt(input, protocol) || 161 *protocol < 0 || *protocol >= IPPROTO_MAX) {
|
H A D | connection_info.cc | 37 ConnectionInfo::ConnectionInfo(int protocol, argument 48 : protocol_(protocol),
|
H A D | connection_info_unittest.cc | 42 EXPECT_EQ(info1.protocol(), info2.protocol());
|
/system/firewalld/ |
H A D | iptables.cc | 141 ProtocolEnum protocol) { 159 std::string sprotocol = protocol == kProtocolTcp ? "TCP" : "UDP"; 162 if (!AddAcceptRules(protocol, port, interface)) { 177 ProtocolEnum protocol) { 192 std::string sprotocol = protocol == kProtocolTcp ? "TCP" : "UDP"; 195 if (!DeleteAcceptRules(protocol, port, interface)) { 227 bool IpTables::AddAcceptRules(ProtocolEnum protocol, argument 230 if (!AddAcceptRule(kIpTablesPath, protocol, port, interface)) { 235 if (AddAcceptRule(kIp6TablesPath, protocol, port, interface)) { 242 DeleteAcceptRule(kIpTablesPath, protocol, por 138 PunchHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument 174 PlugHole(uint16_t port, const std::string& interface, std::set<Hole>* holes, ProtocolEnum protocol) argument 253 DeleteAcceptRules(ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 327 AddAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument 351 DeleteAcceptRule(const std::string& executable_path, ProtocolEnum protocol, uint16_t port, const std::string& interface) argument [all...] |
H A D | iptables.h | 67 ProtocolEnum protocol); 71 ProtocolEnum protocol); 73 bool AddAcceptRules(ProtocolEnum protocol, 76 bool DeleteAcceptRules(ProtocolEnum protocol, 81 ProtocolEnum protocol, 85 ProtocolEnum protocol,
|
/system/bt/bta/pan/ |
H A D | bta_pan_ci.c | 124 void bta_pan_ci_rx_write(UINT16 handle, BD_ADDR dst, BD_ADDR src, UINT16 protocol, argument 134 ((tBTA_PAN_DATA_PARAMS *)p_buf)->protocol = protocol; 161 void bta_pan_ci_rx_writebuf(UINT16 handle, BD_ADDR dst, BD_ADDR src, UINT16 protocol, argument 168 ((tBTA_PAN_DATA_PARAMS *)p_buf)->protocol = protocol; 202 *p_protocol = ((tBTA_PAN_DATA_PARAMS *)p_buf)->protocol; 234 ** Description This function is called to set protocol filters 264 void bta_pan_ci_rx_writebuf(UINT16 handle, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, BOOLEAN ext) argument 269 UNUSED(protocol); [all...] |
/system/bt/bta/include/ |
H A D | bta_pan_co.h | 139 extern void bta_pan_co_tx_write(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, UINT8 *p_data, 155 extern void bta_pan_co_tx_writebuf(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, 180 ** Description protocol filter indication from peer device
|
H A D | bta_pan_ci.h | 98 extern void bta_pan_ci_rx_writebuf(UINT16 handle, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, BOOLEAN ext); 120 ** Description This function is called to set protocol filters
|
/system/bt/btif/include/ |
H A D | btif_pan_internal.h | 69 UINT16 protocol; member in struct:__anon625 104 int btpan_tap_send(int tap_fd, const BD_ADDR src, const BD_ADDR dst, UINT16 protocol,
|
/system/core/fastboot/ |
H A D | socket.h | 31 // interface that enforces the fastboot protocol. 58 static std::unique_ptr<Socket> NewClient(Protocol protocol, const std::string& hostname, 65 static std::unique_ptr<Socket> NewServer(Protocol protocol, int port);
|
H A D | socket_test.cpp | 35 bool MakeConnectedSockets(Socket::Protocol protocol, std::unique_ptr<Socket>* server, argument 38 *server = Socket::NewServer(protocol, 0); 44 *client = Socket::NewClient(protocol, hostname, (*server)->GetLocalPort(), nullptr); 51 if (protocol == Socket::Protocol::kTcp) { 80 for (Socket::Protocol protocol : {Socket::Protocol::kUdp, Socket::Protocol::kTcp}) { 81 ASSERT_TRUE(MakeConnectedSockets(protocol, &server, &client)); 95 for (Socket::Protocol protocol : {Socket::Protocol::kUdp, Socket::Protocol::kTcp}) { 96 ASSERT_TRUE(MakeConnectedSockets(protocol, &server, &client)); 116 for (Socket::Protocol protocol : {Socket::Protocol::kUdp, Socket::Protocol::kTcp}) { 117 ASSERT_TRUE(MakeConnectedSockets(protocol, [all...] |
/system/bt/btif/co/ |
H A D | bta_pan_co.c | 164 UINT16 protocol; local 186 if ((p_buf = bta_pan_ci_readbuf(handle, src, dst, &protocol, 202 btpan_tap_send(btpan_cb.tap_fd, src, dst, protocol, 244 UINT16 protocol, UINT8 *p_data, 251 UNUSED(protocol); 274 BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, 281 UNUSED(protocol); 320 ** Description protocol filter indication from peer device 243 bta_pan_co_tx_write(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, UINT8 *p_data, UINT16 len, BOOLEAN ext, BOOLEAN forward) argument 273 bta_pan_co_tx_writebuf(UINT16 handle, UINT8 app_id, BD_ADDR src, BD_ADDR dst, UINT16 protocol, BT_HDR *p_buf, BOOLEAN ext, BOOLEAN forward) argument
|
/system/bt/stack/include/ |
H A D | bnep_api.h | 118 UINT16 protocol, 135 UINT16 protocol, 153 ** Number of protocol filters present 194 tBNEP_FILTER_IND_CB *p_filter_ind_cb; /* To indicate that peer set protocol filters */ 324 ** protocol - protocol type of the packet 339 UINT16 protocol, 352 ** protocol - protocol type of the packet 369 UINT16 protocol, [all...] |
H A D | pan_api.h | 123 UINT16 protocol, 143 UINT16 protocol, 162 ** Number of protocol filters present 207 tPAN_FILTER_IND_CB *pan_pfilt_ind_cb; /* protocol filter indication callback */ 339 ** protocol - protocol of the ethernet packet like IP or ARP 352 UINT16 protocol, 370 ** protocol - protocol of the ethernet packet like IP or ARP 382 UINT16 protocol, [all...] |
/system/extras/tests/net_test/ |
H A D | net_test.py | 114 def Socket(family, sock_type, protocol): 115 s = socket(family, sock_type, protocol) 344 def ReadProcNetSocket(self, protocol): 346 filename = "/proc/net/%s" % protocol 350 if protocol in ["icmp6", "raw6", "udp6"]: 355 if protocol.endswith("6"): 360 if protocol.startswith("tcp"): 363 elif re.match("icmp|udp|raw", protocol):
|
H A D | sock_diag.py | 72 "InetDiagReqV2", "=BBBxIS", "family protocol ext states id", 228 def DumpAllInetSockets(self, protocol, bytecode, sock_id=None, ext=0, 241 diag_req = InetDiagReqV2((family, protocol, ext, states, sock_id)) 280 protocol = s.getsockopt(net_test.SOL_SOCKET, net_test.SO_PROTOCOL) 299 return InetDiagReqV2((family, protocol, 0, 0xffffffff, sock_id)) 317 def DiagReqFromDiagMsg(d, protocol): 319 return InetDiagReqV2((d.family, protocol, 0, 1 << d.state, d.id)) 327 protocol = s.getsockopt(SOL_SOCKET, net_test.SO_PROTOCOL) 328 req = self.DiagReqFromDiagMsg(diag_msg, protocol)
|