/system/vold/bench/ |
H A D | benchgen.py | 182 active.add(handle) 185 defined.add(handle)
|
/system/tpm/trunks/generator/ |
H A D | generator.py | 340 defined_types.add(self.new_type) 360 serialized_types.add(self.new_type) 712 defined_types.add(self.name) 734 serialized_types.add(self.name) 774 serialized_types.add(self.name) 1764 always_parameter.add(command_handle_parameters[self.command_code])
|
/system/sepolicy/ |
H A D | Android.mk | 71 # Create a file containing newline only to add between context config files
|
H A D | access_vectors | 579 add
|
H A D | priv_app.te | 120 neverallow priv_app service_manager_type:service_manager add;
|
H A D | untrusted_app.te | 14 ### a system app into a specific domain, add a signer entry for it to 130 neverallow untrusted_app service_manager_type:service_manager add;
|
/system/netd/server/ |
H A D | CommandListener.cpp | 529 // ipfwd add wlan0 dummy0 532 if (!strcmp(argv[1], "add")) { 620 if (!strcmp(argv[2], "add")) { 1205 if (!strcmp(argv[1], "add")) { 1212 cli->sendMsg(ResponseCode::OperationFailed, "Failed to add interface", false); 1544 // network route [legacy <uid>] add <netId> <interface> <destination> [nexthop] 1562 bool add = false; local 1563 if (!strcmp(argv[nextArg], "add")) { 1564 add = true; 1580 if (add) { [all...] |
H A D | NatController.cpp | 164 // add this if we are the first added nat 239 int NatController::setTetherCountingRules(bool add, const char *intIface, const char *extIface) { argument 241 /* We only ever add tethering quota rules so that they stick. */ 242 if (!add) { 295 int NatController::setForwardRules(bool add, const char *intIface, const char *extIface) { argument 299 add ? "-A" : "-D", 314 if (runCmd(ARRAY_SIZE(cmd1), cmd1) && add) { 321 add ? "-A" : "-D", 338 add ? "-A" : "-D", 353 add [all...] |
H A D | NatController.h | 50 int setTetherCountingRules(bool add, const char *intIface, const char *extIface);
|
H A D | NetdNativeService.cpp | 144 binder::Status NetdNativeService::networkRejectNonSecureVpn(bool add, argument 156 if (add) {
|
H A D | NetworkController.cpp | 71 Permission permission, bool add) WARN_UNUSED_RESULT; 80 bool add) WARN_UNUSED_RESULT; 94 Permission permission, bool add) { 95 if (add) { 99 ALOGE("failed to add fallthrough to %s for VPN netId %u", physicalInterface.c_str(), 126 Permission permission, bool add) { 129 if (int ret = modifyFallthrough(entry.first, physicalInterface, permission, add)) { 471 ALOGE("cannot add users to non-virtual network with netId %u", netId); 615 const char* nexthop, bool add, bool legacy, uid_t uid) { 643 return add 92 modifyFallthrough(unsigned vpnNetId, const std::string& physicalInterface, Permission permission, bool add) argument 125 modifyFallthrough(const std::string& physicalInterface, Permission permission, bool add) argument 614 modifyRoute(unsigned netId, const char* interface, const char* destination, const char* nexthop, bool add, bool legacy, uid_t uid) argument 647 modifyFallthroughLocked(unsigned vpnNetId, bool add) argument [all...] |
H A D | NetworkController.h | 104 const char* nexthop, bool add, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 105 int modifyFallthroughLocked(unsigned vpnNetId, bool add) WARN_UNUSED_RESULT;
|
H A D | RouteController.cpp | 78 // it upstream, we'll remove this and rely on the kernel header values. For now, add a static assert 455 Permission permission, bool add) { 466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j", 479 WARN_UNUSED_RESULT int modifyVpnOutputToLocalRule(const char* vpnInterface, bool add) { argument 480 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, RULE_PRIORITY_VPN_OUTPUT_TO_LOCAL, 491 bool secure, bool add) { 509 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, 519 bool add) { 531 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, 544 uid_t uidEnd, bool add) { 454 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument 490 modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, bool secure, bool add) argument 518 modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, bool add) argument 542 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 565 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 593 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument 743 modifyLocalNetwork(unsigned netId, const char* interface, bool add) argument 751 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 772 modifyRejectNonSecureNetworkRule(const UidRanges& uidRanges, bool add) argument 790 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument [all...] |
H A D | UidRanges.cpp | 87 void UidRanges::add(const UidRanges& other) { function in class:UidRanges
|
H A D | UidRanges.h | 42 void add(const UidRanges& other);
|
H A D | VirtualNetwork.cpp | 46 int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, argument 59 add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret)); 72 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId); 76 mUidRanges.add(uidRanges); 105 ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId);
|
H A D | VirtualNetwork.h | 50 int maybeCloseSockets(bool add, const UidRanges& uidRanges,
|
/system/netd/server/binder/android/net/ |
H A D | INetd.aidl | 72 * @param add {@code true} if the specified UID ranges should be denied access to any network 82 void networkRejectNonSecureVpn(boolean add, in UidRange[] uidRanges); 163 * @param addrString the IP address to add/remove as a string literal 190 // TODO: add corresponding getProcSysNet().
|
/system/security/keystore/ |
H A D | keystore.cpp | 119 char encoded[encode_key_length(keyName) + 1]; // add 1 for null char 130 char encoded[encode_key_length(keyName) + 1]; // add 1 for null char 141 char encoded[encode_key_length(keyName) + 1]; // add 1 for null char 419 mGrants.add(grant); 563 mMasterKeys.add(userState);
|
/system/media/camera/docs/ |
H A D | CameraDeviceInfo.mako | 28 charsKeyNames.add(CameraCharacteristics.${jkey_identifier(entry.name)}.getName());
|
H A D | CaptureResultTest.mako | 28 resultKeys.add(CaptureResult.${jkey_identifier(entry.name)});
|
H A D | metadata_helpers.py | 28 bs4.builder.HTMLTreeBuilder.empty_element_tags.add("wbr") 303 # pad with spaces to make string len == size. add new line if too big 745 Returns a function to add extra details for an entry into a string for inclusion into 845 # For each public tag "android.x.y.z" referenced, add a 917 # For each public tag "android.x.y.z" referenced, add a 1074 # Linefeeds are ambiguous - was the intent to add a space, 1091 # Linefeeds are ambiguous - was the intent to add a space, 1105 tag_set.add(node) 1175 target_set.add(target)
|
/system/firewalld/ |
H A D | iptables.cc | 85 bool add) { 88 if (!iptables_cmd.Run(argument, add)) { 93 if (add) 130 return ApplyVpnSetup(usernames, interface, true /* add */); 231 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIpTablesPath << "'"; 240 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIp6TablesPath 246 LOG(WARNING) << "Could not add ACCEPT rule using '" << kIp6TablesPath 265 bool add) { 269 if (!ApplyRuleForUserTraffic(add)) { 270 if (add) { 83 RunForAllArguments(const IpTablesCallback& iptables_cmd, const std::vector<std::string>& arguments, bool add) argument 263 ApplyVpnSetup(const std::vector<std::string>& usernames, const std::string& interface, bool add) argument 301 ApplyMasquerade(const std::string& interface, bool add) argument 311 ApplyMarkForUserTraffic(const std::string& username, bool add) argument 320 ApplyRuleForUserTraffic(bool add) argument 375 ApplyMasqueradeWithExecutable(const std::string& interface, const std::string& executable_path, bool add) argument 400 ApplyMarkForUserTrafficWithExecutable( const std::string& username, const std::string& executable_path, bool add) argument 428 ApplyRuleForUserTrafficWithVersion(const std::string& ip_version, bool add) argument [all...] |
H A D | iptables.h | 91 bool add); 93 virtual bool ApplyMasquerade(const std::string& interface, bool add); 96 bool add); 98 virtual bool ApplyMarkForUserTraffic(const std::string& username, bool add); 101 bool add); 103 virtual bool ApplyRuleForUserTraffic(bool add); 105 bool add);
|
H A D | iptables_unittest.cc | 193 const bool add = true; local 196 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add)) 199 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[0], add)) 201 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[1], add)) 204 EXPECT_CALL(mock_iptables, ApplyRuleForUserTraffic(add)) 208 mock_iptables.ApplyVpnSetup(usernames, interface, add)); 215 const bool add = true; local 218 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add)) 223 ApplyMarkForUserTraffic(usernames[0], add)) 227 ApplyMarkForUserTraffic(usernames[1], add)) 259 const bool add = true; local 288 const bool add = true; local 306 const bool add = true; local 330 const bool add = true; local [all...] |