Searched refs:prefix (Results 1 - 25 of 89) sorted by path

1234

/system/bt/osi/src/socket_utils/
H A DREADME23 "osi_" prefix is added to all functions. The developers who want to pull sockets
/system/connectivity/shill/cellular/
H A Dcellular_bearer.cc45 const char kPropertyPrefix[] = "prefix";
132 uint32_t prefix; local
134 prefix = IPAddress::GetMaxPrefixLength(address_family);
136 prefix = properties.GetUint(kPropertyPrefix);
138 (*ipconfig_properties)->subnet_prefix = prefix;
H A Dcellular_unittest.cc1066 string prefix = string(kTypeCellular) + "_" + local
1069 std::replace_if(prefix.begin(), prefix.end(), &IllegalChar, '_');
1093 EXPECT_EQ(prefix + kUuidHomeProvider,
1107 EXPECT_EQ(prefix + device_->service()->friendly_name(),
1119 EXPECT_EQ(prefix + kUuidServingOperator,
1130 EXPECT_EQ(prefix + kSimIdentifier,
/system/connectivity/shill/
H A Dconnection.cc446 local().prefix());
532 << " is unreachable from local address/prefix "
533 << local.ToString() << "/" << local.prefix();
H A Dconnection_unittest.cc247 MATCHER_P2(IsIPAddress, address, prefix, "") {
249 match_address.set_prefix(prefix);
268 arg.dst.prefix() ==
385 RequestRouteToHost(IsIPAddress(address1, address1.prefix()), -1,
527 // Assign a prefix that makes the gateway unreachable.
818 RequestRouteToHost(IsIPAddress(trusted_ip, trusted_ip.prefix()),
824 RequestRouteToHost(IsIPAddress(trusted_ip, trusted_ip.prefix()),
847 EXPECT_EQ(kPrefix, local.prefix());
851 // Should succeed because with the given prefix, this gateway is reachable.
859 EXPECT_EQ(kPrefix, local.prefix());
[all...]
H A Dcrypto_provider.cc51 const string prefix = crypto->GetID() + ":"; local
52 return prefix + ciphertext;
61 const string prefix = crypto->GetID() + ":"; local
62 if (base::StartsWith(ciphertext, prefix, base::CompareCase::SENSITIVE)) {
64 to_decrypt.erase(0, prefix.size());
H A Ddevice.cc569 properties.subnet_prefix = address.prefix();
H A Ddevice_info_unittest.cc257 RTNLMessage::AddressStatus(address.prefix(), flags, scope));
1476 // A device with a "veth" prefix should be ignored.
H A Dppp_device.cc106 size_t prefix = IPAddress::GetMaxPrefixLength(properties.address_family); local
108 base::SizeTToString(prefix));
H A Drouting_table.cc433 __func__, entry.dst.ToString().c_str(), entry.dst.prefix(),
434 entry.src.ToString().c_str(), entry.src.prefix(),
447 entry.dst.prefix(),
448 entry.src.prefix(),
527 status.dst_prefix = address.prefix();
H A Drouting_table_unittest.cc259 entry.dst.prefix(),
260 entry.src.prefix(),
/system/connectivity/shill/dhcp/
H A Ddhcpv4_config.cc288 // "destination/prefix gateway" values. As such, we iterate twice
296 LOG(ERROR) << "In " << __func__ << ": Expected an IP address/prefix "
311 if (destination.prefix() == 0 && properties->gateway.empty()) {
321 destination.family(), destination.prefix()));
/system/connectivity/shill/mobile_operator_db/
H A Dserviceproviders_converter.py208 fd, fname = tempfile.mkstemp(prefix='converter_')
/system/connectivity/shill/net/
H A Dip_address.cc61 unsigned int prefix)
64 prefix_(prefix) {}
164 IPAddress IPAddress::GetAddressMaskFromPrefix(Family family, size_t prefix) { argument
168 size_t bits = prefix;
179 // if the prefix is the maximum, the loop above will end before we assign
224 size_t prefix; local
225 if (!base::StringToSizeT(address_parts[1], &prefix) ||
226 prefix > GetMaxPrefixLength(family_)) {
227 LOG(ERROR) << "Cannot parse address prefix " << address_parts[1];
230 set_prefix(prefix);
59 IPAddress(Family family, const ByteString& address, unsigned int prefix) argument
[all...]
H A Dip_address.h50 IPAddress(Family family, const ByteString& address, unsigned int prefix);
69 // Returns the maximum prefix length for address family |family|, i.e.,
73 // Provides a guideline for the minimum sensible prefix for this IP
76 // smallest prefix that makes sense for this class of address to have.
80 // making guesses as to the mimimal plausible prefix that might be
81 // viable for an address when the supplied prefix is obviously incorrect.
84 // Returns the prefix length given an address |family| and a |mask|. For
88 // Returns an IPAddress of type |family| that has all the high-order |prefix|
90 static IPAddress GetAddressMaskFromPrefix(Family family, size_t prefix);
99 unsigned int prefix() cons function in class:shill::IPAddress
100 set_prefix(unsigned int prefix) argument
[all...]
H A Dip_address_unittest.cc182 EXPECT_EQ(0, address.prefix());
184 EXPECT_EQ(32, address.prefix());
188 EXPECT_EQ(10, address.prefix());
209 PrefixMapping() : family(IPAddress::kFamilyUnknown), prefix(0) {}
214 prefix(prefix_in),
217 size_t prefix; member in struct:shill::PrefixMapping
226 GetParam().prefix);
339 prefix(prefix_in),
344 size_t prefix; member in struct:shill::NetworkPartMapping
358 address.set_prefix(GetParam().prefix);
[all...]
H A Drtnl_handler.cc368 local.prefix(),
/system/connectivity/shill/vpn/
H A Dopenvpn_driver.cc452 size_t prefix = IPAddress::GetMaxPrefixLength(properties->address_family); local
454 base::SizeTToString(prefix));
535 const string& prefix, const string& key, RouteOptions* routes) {
537 if (!base::StartsWith(key, prefix, base::CompareCase::INSENSITIVE_ASCII) ||
538 !base::StringToInt(key.substr(prefix.size()), &order)) {
534 GetRouteOptionEntry( const string& prefix, const string& key, RouteOptions* routes) argument
H A Dopenvpn_driver.h190 static IPConfig::Route* GetRouteOptionEntry(const std::string& prefix,
H A Dthird_party_vpn_driver.cc73 return fingerprint.substr(0, address.prefix());
354 if (address.IsDefault() && !address.prefix()) {
380 ip_address.family(), ip_address.prefix()).IntoString(&route.netmask);
/system/connectivity/shill/wifi/
H A Dwake_on_wifi_unittest.cc1086 ByteString CreatePattern(const unsigned char* prefix, size_t prefix_len, argument
1088 ByteString result(prefix, prefix_len);
/system/core/adb/
H A Dadb_client.cpp316 const char* prefix = "host"; local
318 prefix = "host-usb";
320 prefix = "host-local";
322 return android::base::StringPrintf("%s:%s", prefix, command);
H A Dsocket_test.cpp306 // Check <prefix>:<serial>:<command> format.
308 for (const std::string& prefix : {"usb:", "product:", "model:", "device:"}) {
309 VerifySkipHostSerial(prefix, nullptr);
310 VerifySkipHostSerial(prefix + "foo", nullptr);
312 VerifySkipHostSerial(prefix + "foo:bar", ":bar");
313 VerifySkipHostSerial(prefix + "foo:bar:baz", ":bar:baz");
314 VerifySkipHostSerial(prefix + "foo:123:bar", ":123:bar");
H A Dsockets.cpp607 // * <prefix>:<serial>:<command>
608 // Where <port> must be a base-10 number and <prefix> may be any of {usb,product,model,device}.
615 for (const std::string& prefix : prefixes) {
616 if (!strncmp(service, prefix.c_str(), prefix.length())) {
617 return strchr(service + prefix.length(), ':');
H A Dsysdeps_win32_test.cpp169 // Vary a prefix of bytes in front of the sequence that we're actually interested in parsing.
170 for (const auto& prefix : all_sequences) {
171 // Parse (prefix + one byte of the sequence at a time)
173 std::vector<char> buffer(prefix);
182 TestParseCompleteUTF8(buffer.data(), buffer.size(), prefix.size(),
191 // Parse (prefix (aka sequence) + invalid trailing bytes) to verify that the invalid
194 std::vector<char> buffer(prefix);

Completed in 272 milliseconds

1234