Searched refs:add (Results 1 - 25 of 77) sorted by last modified time

1234

/system/vold/bench/
H A Dbenchgen.py182 active.add(handle)
185 defined.add(handle)
/system/tpm/trunks/generator/
H A Dgenerator.py340 defined_types.add(self.new_type)
360 serialized_types.add(self.new_type)
712 defined_types.add(self.name)
734 serialized_types.add(self.name)
774 serialized_types.add(self.name)
1764 always_parameter.add(command_handle_parameters[self.command_code])
/system/sepolicy/
H A DAndroid.mk71 # Create a file containing newline only to add between context config files
H A Daccess_vectors579 add
H A Dpriv_app.te120 neverallow priv_app service_manager_type:service_manager add;
H A Duntrusted_app.te14 ### a system app into a specific domain, add a signer entry for it to
130 neverallow untrusted_app service_manager_type:service_manager add;
/system/netd/server/
H A DCommandListener.cpp529 // ipfwd add wlan0 dummy0
532 if (!strcmp(argv[1], "add")) {
620 if (!strcmp(argv[2], "add")) {
1205 if (!strcmp(argv[1], "add")) {
1212 cli->sendMsg(ResponseCode::OperationFailed, "Failed to add interface", false);
1544 // network route [legacy <uid>] add <netId> <interface> <destination> [nexthop]
1562 bool add = false; local
1563 if (!strcmp(argv[nextArg], "add")) {
1564 add = true;
1580 if (add) {
[all...]
H A DNatController.cpp164 // add this if we are the first added nat
239 int NatController::setTetherCountingRules(bool add, const char *intIface, const char *extIface) { argument
241 /* We only ever add tethering quota rules so that they stick. */
242 if (!add) {
295 int NatController::setForwardRules(bool add, const char *intIface, const char *extIface) { argument
299 add ? "-A" : "-D",
314 if (runCmd(ARRAY_SIZE(cmd1), cmd1) && add) {
321 add ? "-A" : "-D",
338 add ? "-A" : "-D",
353 add
[all...]
H A DNatController.h50 int setTetherCountingRules(bool add, const char *intIface, const char *extIface);
H A DNetdNativeService.cpp144 binder::Status NetdNativeService::networkRejectNonSecureVpn(bool add, argument
156 if (add) {
H A DNetworkController.cpp71 Permission permission, bool add) WARN_UNUSED_RESULT;
80 bool add) WARN_UNUSED_RESULT;
94 Permission permission, bool add) {
95 if (add) {
99 ALOGE("failed to add fallthrough to %s for VPN netId %u", physicalInterface.c_str(),
126 Permission permission, bool add) {
129 if (int ret = modifyFallthrough(entry.first, physicalInterface, permission, add)) {
471 ALOGE("cannot add users to non-virtual network with netId %u", netId);
615 const char* nexthop, bool add, bool legacy, uid_t uid) {
643 return add
92 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument
125 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument
614 modifyRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool add, bool legacy, uid_t uid) argument
647 modifyFallthroughLocked(unsigned vpnNetId, bool add) argument
[all...]
H A DNetworkController.h104 const char* nexthop, bool add, bool legacy, uid_t uid) WARN_UNUSED_RESULT;
105 int modifyFallthroughLocked(unsigned vpnNetId, bool add) WARN_UNUSED_RESULT;
H A DRouteController.cpp78 // it upstream, we'll remove this and rely on the kernel header values. For now, add a static assert
455 Permission permission, bool add) {
466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j",
479 WARN_UNUSED_RESULT int modifyVpnOutputToLocalRule(const char* vpnInterface, bool add) { argument
480 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, RULE_PRIORITY_VPN_OUTPUT_TO_LOCAL,
491 bool secure, bool add) {
509 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue,
519 bool add) {
531 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue,
544 uid_t uidEnd, bool add) {
454 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument
490 modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, bool secure, bool add) argument
518 modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, bool add) argument
542 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
565 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument
593 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument
743 modifyLocalNetwork(unsigned netId, const char* interface, bool add) argument
751 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument
772 modifyRejectNonSecureNetworkRule(const UidRanges& uidRanges, bool add) argument
790 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument
[all...]
H A DUidRanges.cpp87 void UidRanges::add(const UidRanges& other) { function in class:UidRanges
H A DUidRanges.h42 void add(const UidRanges& other);
H A DVirtualNetwork.cpp46 int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, argument
59 add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret));
72 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId);
76 mUidRanges.add(uidRanges);
105 ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId);
H A DVirtualNetwork.h50 int maybeCloseSockets(bool add, const UidRanges& uidRanges,
/system/netd/server/binder/android/net/
H A DINetd.aidl72 * @param add {@code true} if the specified UID ranges should be denied access to any network
82 void networkRejectNonSecureVpn(boolean add, in UidRange[] uidRanges);
163 * @param addrString the IP address to add/remove as a string literal
190 // TODO: add corresponding getProcSysNet().
/system/security/keystore/
H A Dkeystore.cpp119 char encoded[encode_key_length(keyName) + 1]; // add 1 for null char
130 char encoded[encode_key_length(keyName) + 1]; // add 1 for null char
141 char encoded[encode_key_length(keyName) + 1]; // add 1 for null char
419 mGrants.add(grant);
563 mMasterKeys.add(userState);
/system/media/camera/docs/
H A DCameraDeviceInfo.mako28 charsKeyNames.add(CameraCharacteristics.${jkey_identifier(entry.name)}.getName());
H A DCaptureResultTest.mako28 resultKeys.add(CaptureResult.${jkey_identifier(entry.name)});
H A Dmetadata_helpers.py28 bs4.builder.HTMLTreeBuilder.empty_element_tags.add("wbr")
303 # pad with spaces to make string len == size. add new line if too big
745 Returns a function to add extra details for an entry into a string for inclusion into
845 # For each public tag "android.x.y.z" referenced, add a
917 # For each public tag "android.x.y.z" referenced, add a
1074 # Linefeeds are ambiguous - was the intent to add a space,
1091 # Linefeeds are ambiguous - was the intent to add a space,
1105 tag_set.add(node)
1175 target_set.add(target)
/system/firewalld/
H A Diptables.cc85 bool add) {
88 if (!iptables_cmd.Run(argument, add)) {
93 if (add)
130 return ApplyVpnSetup(usernames, interface, true /* add */);
231 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIpTablesPath << "'";
240 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIp6TablesPath
246 LOG(WARNING) << "Could not add ACCEPT rule using '" << kIp6TablesPath
265 bool add) {
269 if (!ApplyRuleForUserTraffic(add)) {
270 if (add) {
83 RunForAllArguments(const IpTablesCallback& iptables_cmd, const std::vector<std::string>& arguments, bool add) argument
263 ApplyVpnSetup(const std::vector<std::string>& usernames, const std::string& interface, bool add) argument
301 ApplyMasquerade(const std::string& interface, bool add) argument
311 ApplyMarkForUserTraffic(const std::string& username, bool add) argument
320 ApplyRuleForUserTraffic(bool add) argument
375 ApplyMasqueradeWithExecutable(const std::string& interface, const std::string& executable_path, bool add) argument
400 ApplyMarkForUserTrafficWithExecutable( const std::string& username, const std::string& executable_path, bool add) argument
428 ApplyRuleForUserTrafficWithVersion(const std::string& ip_version, bool add) argument
[all...]
H A Diptables.h91 bool add);
93 virtual bool ApplyMasquerade(const std::string& interface, bool add);
96 bool add);
98 virtual bool ApplyMarkForUserTraffic(const std::string& username, bool add);
101 bool add);
103 virtual bool ApplyRuleForUserTraffic(bool add);
105 bool add);
H A Diptables_unittest.cc193 const bool add = true; local
196 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add))
199 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[0], add))
201 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[1], add))
204 EXPECT_CALL(mock_iptables, ApplyRuleForUserTraffic(add))
208 mock_iptables.ApplyVpnSetup(usernames, interface, add));
215 const bool add = true; local
218 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add))
223 ApplyMarkForUserTraffic(usernames[0], add))
227 ApplyMarkForUserTraffic(usernames[1], add))
259 const bool add = true; local
288 const bool add = true; local
306 const bool add = true; local
330 const bool add = true; local
[all...]

Completed in 294 milliseconds

1234