Searched refs:add (Results 1 - 25 of 77) sorted by relevance

1234

/system/core/libutils/tests/
H A DVector_test.cpp46 vector.add(1);
47 vector.add(2);
48 vector.add(3);
57 // add an element to the first vector
58 vector.add(4);
64 // add an element to the copy
65 other.add(5);
86 vector.add(1);
87 vector.add(2);
88 vector.add(
[all...]
/system/firewalld/
H A Diptables_unittest.cc193 const bool add = true; local
196 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add))
199 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[0], add))
201 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[1], add))
204 EXPECT_CALL(mock_iptables, ApplyRuleForUserTraffic(add))
208 mock_iptables.ApplyVpnSetup(usernames, interface, add));
215 const bool add = true; local
218 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add))
223 ApplyMarkForUserTraffic(usernames[0], add))
227 ApplyMarkForUserTraffic(usernames[1], add))
259 const bool add = true; local
288 const bool add = true; local
306 const bool add = true; local
330 const bool add = true; local
[all...]
H A Diptables.cc85 bool add) {
88 if (!iptables_cmd.Run(argument, add)) {
93 if (add)
130 return ApplyVpnSetup(usernames, interface, true /* add */);
231 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIpTablesPath << "'";
240 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIp6TablesPath
246 LOG(WARNING) << "Could not add ACCEPT rule using '" << kIp6TablesPath
265 bool add) {
269 if (!ApplyRuleForUserTraffic(add)) {
270 if (add) {
83 RunForAllArguments(const IpTablesCallback& iptables_cmd, const std::vector<std::string>& arguments, bool add) argument
263 ApplyVpnSetup(const std::vector<std::string>& usernames, const std::string& interface, bool add) argument
301 ApplyMasquerade(const std::string& interface, bool add) argument
311 ApplyMarkForUserTraffic(const std::string& username, bool add) argument
320 ApplyRuleForUserTraffic(bool add) argument
375 ApplyMasqueradeWithExecutable(const std::string& interface, const std::string& executable_path, bool add) argument
400 ApplyMarkForUserTrafficWithExecutable( const std::string& username, const std::string& executable_path, bool add) argument
428 ApplyRuleForUserTrafficWithVersion(const std::string& ip_version, bool add) argument
[all...]
H A Diptables.h91 bool add);
93 virtual bool ApplyMasquerade(const std::string& interface, bool add);
96 bool add);
98 virtual bool ApplyMarkForUserTraffic(const std::string& username, bool add);
101 bool add);
103 virtual bool ApplyRuleForUserTraffic(bool add);
105 bool add);
/system/netd/server/
H A DNatController.cpp164 // add this if we are the first added nat
239 int NatController::setTetherCountingRules(bool add, const char *intIface, const char *extIface) { argument
241 /* We only ever add tethering quota rules so that they stick. */
242 if (!add) {
295 int NatController::setForwardRules(bool add, const char *intIface, const char *extIface) { argument
299 add ? "-A" : "-D",
314 if (runCmd(ARRAY_SIZE(cmd1), cmd1) && add) {
321 add ? "-A" : "-D",
338 add ? "-A" : "-D",
353 add
[all...]
H A DNatController.h50 int setTetherCountingRules(bool add, const char *intIface, const char *extIface);
H A DUidRanges.h42 void add(const UidRanges& other);
H A DRouteController.cpp78 // it upstream, we'll remove this and rely on the kernel header values. For now, add a static assert
455 Permission permission, bool add) {
466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j",
479 WARN_UNUSED_RESULT int modifyVpnOutputToLocalRule(const char* vpnInterface, bool add) { argument
480 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, RULE_PRIORITY_VPN_OUTPUT_TO_LOCAL,
491 bool secure, bool add) {
509 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue,
519 bool add) {
531 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue,
544 uid_t uidEnd, bool add) {
454 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument
490 modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, bool secure, bool add) argument
518 modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, bool add) argument
542 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
565 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
593 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument
743 modifyLocalNetwork(unsigned netId, const char* interface, bool add) argument
751 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument
772 modifyRejectNonSecureNetworkRule(const UidRanges& uidRanges, bool add) argument
790 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument
[all...]
H A DVirtualNetwork.cpp46 int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, argument
59 add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret));
72 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId);
76 mUidRanges.add(uidRanges);
105 ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId);
H A DVirtualNetwork.h50 int maybeCloseSockets(bool add, const UidRanges& uidRanges,
H A DNetworkController.h104 const char* nexthop, bool add, bool legacy, uid_t uid) WARN_UNUSED_RESULT;
105 int modifyFallthroughLocked(unsigned vpnNetId, bool add) WARN_UNUSED_RESULT;
/system/connectivity/shill/test-scripts/
H A Dbackchannel63 ip addr add "$oldip" dev "$test_if"
79 ip route add "$ip" via "$gw" dev "$test_if"
H A Dveth27 ip link add name "$iface" type veth peer name "$peer_iface"
31 route add -host 255.255.255.255 dev "$peer_iface"
/system/extras/perfprofd/quipper/build/
H A Dbuild_config.h52 #error Please add support for your platform in build/build_config.h
85 #error Please add support for your compiler in build/build_config.h
128 #error Please add support for your architecture in build/build_config.h
147 #error Please add support for your compiler in build/build_config.h
/system/core/libpixelflinger/arch-arm64/
H A Dt32cb16blend.S60 add w7, w7, w7, lsr #7 // sA + (sA >> 7)
73 add w16, w6, w16, lsr #8
84 add w6, w16, w6, lsr #8
95 add w16, w6, w16, lsr #8
109 add w16, w6, w16, lsr #8
121 add w6, w16, w6, lsr #(5+8)
132 add w16, w6, w16, lsr #8
179 add x0, x0, #4
196 add x0, x0, #4
/system/core/libpixelflinger/
H A Dt32cb16blend.S49 add r7, r7, r7, lsr #7 // sA + (sA >> 7)
61 add lr, r6, lr, lsr #8
71 add r6, lr, r6, lsr #(5+8)
81 add lr, r6, lr, lsr #8
94 add lr, r6, lr, lsr #8
105 add r6, lr, r6, lsr #(5+8)
115 add lr, r6, lr, lsr #8
167 add r0, r0, #4
187 add r0, r0, #4
H A Drotate90CW_4x4_16v6.S37 add r14, r3, r3
38 add r12, r2, r2
/system/extras/verity/
H A DKeystoreSigner.java75 v.add(algorithmIdentifier);
76 v.add(keyMaterial);
102 keyBag.add(k);
111 v.add(formatVersion);
112 v.add(new DERSequence(keyBag));
118 v.add(formatVersion);
119 v.add(new DERSequence(keyBag));
120 v.add(signature);
136 keyBag.add((ASN1Encodable) e.nextElement());
H A DBootSignature.java122 attrs.add(target);
123 attrs.add(length);
181 v.add(formatVersion);
182 v.add(certificate);
183 v.add(algorithmIdentifier);
184 v.add(getAuthenticatedAttributes());
185 v.add(signature);
/system/core/libcutils/arch-arm64/
H A Dandroid_memset.S88 add dst, dst, tmp1
100 add dst, dst, count
130 add dst, dst, tmp2
145 add dst, dst, #16
160 add dst, dst, tmp2
197 add dst, dst, #64
200 add dst, dst, tmp2
205 add dst, dst, zva_len_x
/system/core/logd/
H A DLogStatistics.h88 inline iterator add(TKey key, LogBufferElement *element) { function in class:LogHashtable
93 it->second.add(element);
98 inline iterator add(TKey key) { function in class:LogHashtable
103 it->second.add(key);
173 inline void add(LogBufferElement *element) { size += element->getMsgLen(); } function in struct:EntryBase
211 inline void add(LogBufferElement *element) { function in struct:EntryBaseDropped
213 EntryBase::add(element);
239 inline void add(LogBufferElement *element) { function in struct:UidEntry
243 EntryBase::add(element);
284 inline void add(pid_ function in struct:PidEntry
294 inline void add(LogBufferElement *element) { function in struct:PidEntry
345 inline void add(pid_t incomingTid) { function in struct:TidEntry
355 inline void add(LogBufferElement *element) { function in struct:TidEntry
390 inline void add(LogBufferElement *element) { function in struct:TagEntry
[all...]
/system/core/libcutils/arch-x86/
H A Dandroid_memset32.S101 add $(TABLE - .), %ebx; \
104 add (%ebx,%ecx,4), %ebx; \
214 add $1, %edx
218 add $1, %edx
222 add $1, %edx
239 add $16, %edx
241 add %eax, %ecx
249 add %ecx, %edx
261 add $_GLOBAL_OFFSET_TABLE_, %ebx
279 add
[all...]
/system/core/include/utils/
H A DVectorImpl.h75 /*! add/insert/replace items */
81 ssize_t add();
82 ssize_t add(const void* item);
146 //! add an item in the right place (or replaces it if there is one)
147 ssize_t add(const void* item);
164 ssize_t add();
/system/media/camera/docs/
H A DCameraDeviceInfo.mako28 charsKeyNames.add(CameraCharacteristics.${jkey_identifier(entry.name)}.getName());
H A DCaptureResultTest.mako28 resultKeys.add(CaptureResult.${jkey_identifier(entry.name)});

Completed in 435 milliseconds

1234