/system/bt/osi/src/socket_utils/ |
H A D | README | 23 "osi_" prefix is added to all functions. The developers who want to pull sockets
|
/system/connectivity/shill/cellular/ |
H A D | cellular_bearer.cc | 45 const char kPropertyPrefix[] = "prefix"; 132 uint32_t prefix; local 134 prefix = IPAddress::GetMaxPrefixLength(address_family); 136 prefix = properties.GetUint(kPropertyPrefix); 138 (*ipconfig_properties)->subnet_prefix = prefix;
|
H A D | cellular_unittest.cc | 1066 string prefix = string(kTypeCellular) + "_" + local 1069 std::replace_if(prefix.begin(), prefix.end(), &IllegalChar, '_'); 1093 EXPECT_EQ(prefix + kUuidHomeProvider, 1107 EXPECT_EQ(prefix + device_->service()->friendly_name(), 1119 EXPECT_EQ(prefix + kUuidServingOperator, 1130 EXPECT_EQ(prefix + kSimIdentifier,
|
/system/connectivity/shill/ |
H A D | connection.cc | 446 local().prefix()); 532 << " is unreachable from local address/prefix " 533 << local.ToString() << "/" << local.prefix();
|
H A D | connection_unittest.cc | 247 MATCHER_P2(IsIPAddress, address, prefix, "") { 249 match_address.set_prefix(prefix); 268 arg.dst.prefix() == 385 RequestRouteToHost(IsIPAddress(address1, address1.prefix()), -1, 527 // Assign a prefix that makes the gateway unreachable. 818 RequestRouteToHost(IsIPAddress(trusted_ip, trusted_ip.prefix()), 824 RequestRouteToHost(IsIPAddress(trusted_ip, trusted_ip.prefix()), 847 EXPECT_EQ(kPrefix, local.prefix()); 851 // Should succeed because with the given prefix, this gateway is reachable. 859 EXPECT_EQ(kPrefix, local.prefix()); [all...] |
H A D | crypto_provider.cc | 51 const string prefix = crypto->GetID() + ":"; local 52 return prefix + ciphertext; 61 const string prefix = crypto->GetID() + ":"; local 62 if (base::StartsWith(ciphertext, prefix, base::CompareCase::SENSITIVE)) { 64 to_decrypt.erase(0, prefix.size());
|
H A D | device.cc | 569 properties.subnet_prefix = address.prefix();
|
H A D | device_info_unittest.cc | 257 RTNLMessage::AddressStatus(address.prefix(), flags, scope)); 1476 // A device with a "veth" prefix should be ignored.
|
H A D | ppp_device.cc | 106 size_t prefix = IPAddress::GetMaxPrefixLength(properties.address_family); local 108 base::SizeTToString(prefix));
|
H A D | routing_table.cc | 433 __func__, entry.dst.ToString().c_str(), entry.dst.prefix(), 434 entry.src.ToString().c_str(), entry.src.prefix(), 447 entry.dst.prefix(), 448 entry.src.prefix(), 527 status.dst_prefix = address.prefix();
|
H A D | routing_table_unittest.cc | 259 entry.dst.prefix(), 260 entry.src.prefix(),
|
/system/connectivity/shill/dhcp/ |
H A D | dhcpv4_config.cc | 288 // "destination/prefix gateway" values. As such, we iterate twice 296 LOG(ERROR) << "In " << __func__ << ": Expected an IP address/prefix " 311 if (destination.prefix() == 0 && properties->gateway.empty()) { 321 destination.family(), destination.prefix()));
|
/system/connectivity/shill/mobile_operator_db/ |
H A D | serviceproviders_converter.py | 208 fd, fname = tempfile.mkstemp(prefix='converter_')
|
/system/connectivity/shill/net/ |
H A D | ip_address.cc | 61 unsigned int prefix) 64 prefix_(prefix) {} 164 IPAddress IPAddress::GetAddressMaskFromPrefix(Family family, size_t prefix) { argument 168 size_t bits = prefix; 179 // if the prefix is the maximum, the loop above will end before we assign 224 size_t prefix; local 225 if (!base::StringToSizeT(address_parts[1], &prefix) || 226 prefix > GetMaxPrefixLength(family_)) { 227 LOG(ERROR) << "Cannot parse address prefix " << address_parts[1]; 230 set_prefix(prefix); 59 IPAddress(Family family, const ByteString& address, unsigned int prefix) argument [all...] |
H A D | ip_address.h | 50 IPAddress(Family family, const ByteString& address, unsigned int prefix); 69 // Returns the maximum prefix length for address family |family|, i.e., 73 // Provides a guideline for the minimum sensible prefix for this IP 76 // smallest prefix that makes sense for this class of address to have. 80 // making guesses as to the mimimal plausible prefix that might be 81 // viable for an address when the supplied prefix is obviously incorrect. 84 // Returns the prefix length given an address |family| and a |mask|. For 88 // Returns an IPAddress of type |family| that has all the high-order |prefix| 90 static IPAddress GetAddressMaskFromPrefix(Family family, size_t prefix); 99 unsigned int prefix() cons function in class:shill::IPAddress 100 set_prefix(unsigned int prefix) argument [all...] |
H A D | ip_address_unittest.cc | 182 EXPECT_EQ(0, address.prefix()); 184 EXPECT_EQ(32, address.prefix()); 188 EXPECT_EQ(10, address.prefix()); 209 PrefixMapping() : family(IPAddress::kFamilyUnknown), prefix(0) {} 214 prefix(prefix_in), 217 size_t prefix; member in struct:shill::PrefixMapping 226 GetParam().prefix); 339 prefix(prefix_in), 344 size_t prefix; member in struct:shill::NetworkPartMapping 358 address.set_prefix(GetParam().prefix); [all...] |
H A D | rtnl_handler.cc | 368 local.prefix(),
|
/system/connectivity/shill/vpn/ |
H A D | openvpn_driver.cc | 452 size_t prefix = IPAddress::GetMaxPrefixLength(properties->address_family); local 454 base::SizeTToString(prefix)); 535 const string& prefix, const string& key, RouteOptions* routes) { 537 if (!base::StartsWith(key, prefix, base::CompareCase::INSENSITIVE_ASCII) || 538 !base::StringToInt(key.substr(prefix.size()), &order)) { 534 GetRouteOptionEntry( const string& prefix, const string& key, RouteOptions* routes) argument
|
H A D | openvpn_driver.h | 190 static IPConfig::Route* GetRouteOptionEntry(const std::string& prefix,
|
H A D | third_party_vpn_driver.cc | 73 return fingerprint.substr(0, address.prefix()); 354 if (address.IsDefault() && !address.prefix()) { 380 ip_address.family(), ip_address.prefix()).IntoString(&route.netmask);
|
/system/connectivity/shill/wifi/ |
H A D | wake_on_wifi_unittest.cc | 1086 ByteString CreatePattern(const unsigned char* prefix, size_t prefix_len, argument 1088 ByteString result(prefix, prefix_len);
|
/system/core/adb/ |
H A D | adb_client.cpp | 316 const char* prefix = "host"; local 318 prefix = "host-usb"; 320 prefix = "host-local"; 322 return android::base::StringPrintf("%s:%s", prefix, command);
|
H A D | socket_test.cpp | 306 // Check <prefix>:<serial>:<command> format. 308 for (const std::string& prefix : {"usb:", "product:", "model:", "device:"}) { 309 VerifySkipHostSerial(prefix, nullptr); 310 VerifySkipHostSerial(prefix + "foo", nullptr); 312 VerifySkipHostSerial(prefix + "foo:bar", ":bar"); 313 VerifySkipHostSerial(prefix + "foo:bar:baz", ":bar:baz"); 314 VerifySkipHostSerial(prefix + "foo:123:bar", ":123:bar");
|
H A D | sockets.cpp | 607 // * <prefix>:<serial>:<command> 608 // Where <port> must be a base-10 number and <prefix> may be any of {usb,product,model,device}. 615 for (const std::string& prefix : prefixes) { 616 if (!strncmp(service, prefix.c_str(), prefix.length())) { 617 return strchr(service + prefix.length(), ':');
|
H A D | sysdeps_win32_test.cpp | 169 // Vary a prefix of bytes in front of the sequence that we're actually interested in parsing. 170 for (const auto& prefix : all_sequences) { 171 // Parse (prefix + one byte of the sequence at a time) 173 std::vector<char> buffer(prefix); 182 TestParseCompleteUTF8(buffer.data(), buffer.size(), prefix.size(), 191 // Parse (prefix (aka sequence) + invalid trailing bytes) to verify that the invalid 194 std::vector<char> buffer(prefix);
|