/system/core/libutils/tests/ |
H A D | Vector_test.cpp | 46 vector.add(1); 47 vector.add(2); 48 vector.add(3); 57 // add an element to the first vector 58 vector.add(4); 64 // add an element to the copy 65 other.add(5); 86 vector.add(1); 87 vector.add(2); 88 vector.add( [all...] |
/system/firewalld/ |
H A D | iptables_unittest.cc | 193 const bool add = true; local 196 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add)) 199 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[0], add)) 201 EXPECT_CALL(mock_iptables, ApplyMarkForUserTraffic(usernames[1], add)) 204 EXPECT_CALL(mock_iptables, ApplyRuleForUserTraffic(add)) 208 mock_iptables.ApplyVpnSetup(usernames, interface, add)); 215 const bool add = true; local 218 EXPECT_CALL(mock_iptables, ApplyMasquerade(interface, add)) 223 ApplyMarkForUserTraffic(usernames[0], add)) 227 ApplyMarkForUserTraffic(usernames[1], add)) 259 const bool add = true; local 288 const bool add = true; local 306 const bool add = true; local 330 const bool add = true; local [all...] |
H A D | iptables.cc | 85 bool add) { 88 if (!iptables_cmd.Run(argument, add)) { 93 if (add) 130 return ApplyVpnSetup(usernames, interface, true /* add */); 231 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIpTablesPath << "'"; 240 LOG(ERROR) << "Could not add ACCEPT rule using '" << kIp6TablesPath 246 LOG(WARNING) << "Could not add ACCEPT rule using '" << kIp6TablesPath 265 bool add) { 269 if (!ApplyRuleForUserTraffic(add)) { 270 if (add) { 83 RunForAllArguments(const IpTablesCallback& iptables_cmd, const std::vector<std::string>& arguments, bool add) argument 263 ApplyVpnSetup(const std::vector<std::string>& usernames, const std::string& interface, bool add) argument 301 ApplyMasquerade(const std::string& interface, bool add) argument 311 ApplyMarkForUserTraffic(const std::string& username, bool add) argument 320 ApplyRuleForUserTraffic(bool add) argument 375 ApplyMasqueradeWithExecutable(const std::string& interface, const std::string& executable_path, bool add) argument 400 ApplyMarkForUserTrafficWithExecutable( const std::string& username, const std::string& executable_path, bool add) argument 428 ApplyRuleForUserTrafficWithVersion(const std::string& ip_version, bool add) argument [all...] |
H A D | iptables.h | 91 bool add); 93 virtual bool ApplyMasquerade(const std::string& interface, bool add); 96 bool add); 98 virtual bool ApplyMarkForUserTraffic(const std::string& username, bool add); 101 bool add); 103 virtual bool ApplyRuleForUserTraffic(bool add); 105 bool add);
|
/system/netd/server/ |
H A D | NatController.cpp | 164 // add this if we are the first added nat 239 int NatController::setTetherCountingRules(bool add, const char *intIface, const char *extIface) { argument 241 /* We only ever add tethering quota rules so that they stick. */ 242 if (!add) { 295 int NatController::setForwardRules(bool add, const char *intIface, const char *extIface) { argument 299 add ? "-A" : "-D", 314 if (runCmd(ARRAY_SIZE(cmd1), cmd1) && add) { 321 add ? "-A" : "-D", 338 add ? "-A" : "-D", 353 add [all...] |
H A D | NatController.h | 50 int setTetherCountingRules(bool add, const char *intIface, const char *extIface);
|
H A D | UidRanges.h | 42 void add(const UidRanges& other);
|
H A D | RouteController.cpp | 78 // it upstream, we'll remove this and rely on the kernel header values. For now, add a static assert 455 Permission permission, bool add) { 466 if (execIptables(V4V6, "-t", "mangle", add ? "-A" : "-D", "INPUT", "-i", interface, "-j", 479 WARN_UNUSED_RESULT int modifyVpnOutputToLocalRule(const char* vpnInterface, bool add) { argument 480 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, RULE_PRIORITY_VPN_OUTPUT_TO_LOCAL, 491 bool secure, bool add) { 509 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, 519 bool add) { 531 return modifyIpRule(add ? RTM_NEWRULE : RTM_DELRULE, priority, table, fwmark.intValue, 544 uid_t uidEnd, bool add) { 454 modifyIncomingPacketMark(unsigned netId, const char* interface, Permission permission, bool add) argument 490 modifyVpnUidRangeRule(uint32_t table, uid_t uidStart, uid_t uidEnd, bool secure, bool add) argument 518 modifyVpnSystemPermissionRule(unsigned netId, uint32_t table, bool secure, bool add) argument 542 modifyExplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 565 modifyOutputInterfaceRules(const char* interface, uint32_t table, Permission permission, uid_t uidStart, uid_t uidEnd, bool add) argument 593 modifyImplicitNetworkRule(unsigned netId, uint32_t table, Permission permission, bool add) argument 743 modifyLocalNetwork(unsigned netId, const char* interface, bool add) argument 751 modifyPhysicalNetwork(unsigned netId, const char* interface, Permission permission, bool add) argument 772 modifyRejectNonSecureNetworkRule(const UidRanges& uidRanges, bool add) argument 790 modifyVirtualNetwork(unsigned netId, const char* interface, const UidRanges& uidRanges, bool secure, bool add, bool modifyNonUidBasedRules) argument [all...] |
H A D | VirtualNetwork.cpp | 46 int VirtualNetwork::maybeCloseSockets(bool add, const UidRanges& uidRanges, argument 59 add ? "adding" : "removing", uidRanges.toString().c_str(), mNetId, strerror(-ret)); 72 ALOGE("failed to add users on interface %s of netId %u", interface.c_str(), mNetId); 76 mUidRanges.add(uidRanges); 105 ALOGE("failed to add interface %s to VPN netId %u", interface.c_str(), mNetId);
|
H A D | VirtualNetwork.h | 50 int maybeCloseSockets(bool add, const UidRanges& uidRanges,
|
H A D | NetworkController.h | 104 const char* nexthop, bool add, bool legacy, uid_t uid) WARN_UNUSED_RESULT; 105 int modifyFallthroughLocked(unsigned vpnNetId, bool add) WARN_UNUSED_RESULT;
|
/system/connectivity/shill/test-scripts/ |
H A D | backchannel | 63 ip addr add "$oldip" dev "$test_if" 79 ip route add "$ip" via "$gw" dev "$test_if"
|
H A D | veth | 27 ip link add name "$iface" type veth peer name "$peer_iface" 31 route add -host 255.255.255.255 dev "$peer_iface"
|
/system/extras/perfprofd/quipper/build/ |
H A D | build_config.h | 52 #error Please add support for your platform in build/build_config.h 85 #error Please add support for your compiler in build/build_config.h 128 #error Please add support for your architecture in build/build_config.h 147 #error Please add support for your compiler in build/build_config.h
|
/system/core/libpixelflinger/arch-arm64/ |
H A D | t32cb16blend.S | 60 add w7, w7, w7, lsr #7 // sA + (sA >> 7) 73 add w16, w6, w16, lsr #8 84 add w6, w16, w6, lsr #8 95 add w16, w6, w16, lsr #8 109 add w16, w6, w16, lsr #8 121 add w6, w16, w6, lsr #(5+8) 132 add w16, w6, w16, lsr #8 179 add x0, x0, #4 196 add x0, x0, #4
|
/system/core/libpixelflinger/ |
H A D | t32cb16blend.S | 49 add r7, r7, r7, lsr #7 // sA + (sA >> 7) 61 add lr, r6, lr, lsr #8 71 add r6, lr, r6, lsr #(5+8) 81 add lr, r6, lr, lsr #8 94 add lr, r6, lr, lsr #8 105 add r6, lr, r6, lsr #(5+8) 115 add lr, r6, lr, lsr #8 167 add r0, r0, #4 187 add r0, r0, #4
|
H A D | rotate90CW_4x4_16v6.S | 37 add r14, r3, r3 38 add r12, r2, r2
|
/system/extras/verity/ |
H A D | KeystoreSigner.java | 75 v.add(algorithmIdentifier); 76 v.add(keyMaterial); 102 keyBag.add(k); 111 v.add(formatVersion); 112 v.add(new DERSequence(keyBag)); 118 v.add(formatVersion); 119 v.add(new DERSequence(keyBag)); 120 v.add(signature); 136 keyBag.add((ASN1Encodable) e.nextElement());
|
H A D | BootSignature.java | 122 attrs.add(target); 123 attrs.add(length); 181 v.add(formatVersion); 182 v.add(certificate); 183 v.add(algorithmIdentifier); 184 v.add(getAuthenticatedAttributes()); 185 v.add(signature);
|
/system/core/libcutils/arch-arm64/ |
H A D | android_memset.S | 88 add dst, dst, tmp1 100 add dst, dst, count 130 add dst, dst, tmp2 145 add dst, dst, #16 160 add dst, dst, tmp2 197 add dst, dst, #64 200 add dst, dst, tmp2 205 add dst, dst, zva_len_x
|
/system/core/logd/ |
H A D | LogStatistics.h | 88 inline iterator add(TKey key, LogBufferElement *element) { function in class:LogHashtable 93 it->second.add(element); 98 inline iterator add(TKey key) { function in class:LogHashtable 103 it->second.add(key); 173 inline void add(LogBufferElement *element) { size += element->getMsgLen(); } function in struct:EntryBase 211 inline void add(LogBufferElement *element) { function in struct:EntryBaseDropped 213 EntryBase::add(element); 239 inline void add(LogBufferElement *element) { function in struct:UidEntry 243 EntryBase::add(element); 284 inline void add(pid_ function in struct:PidEntry 294 inline void add(LogBufferElement *element) { function in struct:PidEntry 345 inline void add(pid_t incomingTid) { function in struct:TidEntry 355 inline void add(LogBufferElement *element) { function in struct:TidEntry 390 inline void add(LogBufferElement *element) { function in struct:TagEntry [all...] |
/system/core/libcutils/arch-x86/ |
H A D | android_memset32.S | 101 add $(TABLE - .), %ebx; \ 104 add (%ebx,%ecx,4), %ebx; \ 214 add $1, %edx 218 add $1, %edx 222 add $1, %edx 239 add $16, %edx 241 add %eax, %ecx 249 add %ecx, %edx 261 add $_GLOBAL_OFFSET_TABLE_, %ebx 279 add [all...] |
/system/core/include/utils/ |
H A D | VectorImpl.h | 75 /*! add/insert/replace items */ 81 ssize_t add(); 82 ssize_t add(const void* item); 146 //! add an item in the right place (or replaces it if there is one) 147 ssize_t add(const void* item); 164 ssize_t add();
|
/system/media/camera/docs/ |
H A D | CameraDeviceInfo.mako | 28 charsKeyNames.add(CameraCharacteristics.${jkey_identifier(entry.name)}.getName());
|
H A D | CaptureResultTest.mako | 28 resultKeys.add(CaptureResult.${jkey_identifier(entry.name)});
|