Home
last modified time | relevance | path

Searched refs:network (Results 1 – 25 of 159) sorted by relevance

1234567

/system/netd/server/
DNetworkController.cpp161 Network* network = getNetworkLocked(netId); in setDefaultNetwork() local
162 if (!network) { in setDefaultNetwork()
166 if (network->getType() != Network::PHYSICAL) { in setDefaultNetwork()
170 if (int ret = static_cast<PhysicalNetwork*>(network)->addAsDefault()) { in setDefaultNetwork()
176 Network* network = getNetworkLocked(mDefaultNetId); in setDefaultNetwork() local
177 if (!network || network->getType() != Network::PHYSICAL) { in setDefaultNetwork()
181 if (int ret = static_cast<PhysicalNetwork*>(network)->removeAsDefault()) { in setDefaultNetwork()
216 Network *network = getNetworkLocked(*netId); in getNetworkForDnsLocked() local
217 if (network && network->getType() == Network::VIRTUAL && in getNetworkForDnsLocked()
350 Network* network = getNetworkLocked(netId); in isVirtualNetworkLocked() local
[all …]
/system/connectivity/wificond/scanning/
Dpno_settings.cpp39 for (const auto& network : pno_networks_) { in writeToParcel() local
43 RETURN_IF_FAILED(network.writeToParcel(parcel)); in writeToParcel()
55 PnoNetwork network; in readFromParcel() local
66 RETURN_IF_FAILED(network.readFromParcel(parcel)); in readFromParcel()
67 pno_networks_.push_back(network); in readFromParcel()
Dsingle_scan_settings.cpp52 for (const auto& network : hidden_networks_) { in writeToParcel() local
56 RETURN_IF_FAILED(network.writeToParcel(parcel)); in writeToParcel()
95 HiddenNetwork network; in readFromParcel() local
106 RETURN_IF_FAILED(network.readFromParcel(parcel)); in readFromParcel()
107 hidden_networks_.push_back(network); in readFromParcel()
Dscanner_impl.cpp177 for (auto& network : scan_settings.hidden_networks_) { in scan() local
179 skipped_scan_ssids.emplace_back(network.ssid_); in scan()
182 ssids.push_back(network.ssid_); in scan()
253 for (auto& network : pno_settings.pno_networks_) { in ParsePnoSettings() local
255 if (network.is_hidden_) { in ParsePnoSettings()
259 skipped_scan_ssids.emplace_back(network.ssid_); in ParsePnoSettings()
262 scan_ssids->push_back(network.ssid_); in ParsePnoSettings()
266 skipped_match_ssids.emplace_back(network.ssid_); in ParsePnoSettings()
269 match_ssids->push_back(network.ssid_); in ParsePnoSettings()
273 for (const auto& frequency : network.frequencies_) { in ParsePnoSettings()
[all …]
/system/connectivity/wificond/tests/
Dscan_settings_unittest.cpp97 HiddenNetwork network; in TEST_F() local
98 network.ssid_ = in TEST_F()
102 scan_settings.hidden_networks_ = {network}; in TEST_F()
123 HiddenNetwork network; in TEST_F() local
124 network.ssid_ = in TEST_F()
128 scan_settings.hidden_networks_ = {network}; in TEST_F()
154 PnoNetwork network, network1; in TEST_F() local
155 network.ssid_ = in TEST_F()
157 network.is_hidden_ = true; in TEST_F()
166 pno_settings.pno_networks_ = {network, network1}; in TEST_F()
Dscanner_unittest.cpp608 PnoNetwork network; in TEST_F() local
609 network.is_hidden_ = false; in TEST_F()
610 network.frequencies_.push_back(2412); in TEST_F()
611 pno_settings.pno_networks_.push_back(network); in TEST_F()
642 PnoNetwork network; in TEST_F() local
644 network.is_hidden_ = false; in TEST_F()
645 network.frequencies_.push_back(2412); in TEST_F()
646 network.frequencies_.push_back(2437); in TEST_F()
650 pno_settings.pno_networks_.push_back(network); in TEST_F()
684 PnoNetwork network; in TEST_F() local
[all …]
/system/hardware/interfaces/net/netd/1.0/
DINetd.hal37 * Creates a physical network to be used for interfaces managed by the OEM
39 * @return networkHandle a handle to the OEM network. Zero implies
41 * @return packetMark The packet mark that vendor network stack configuration code must use when
42 * routing packets to this network. No applications may use this mark. They must
43 * instead pass the networkHandle to the android_set*network LL-NDK APIs.
51 * Destroys the specified network previously created using createOemNetwork()
/system/hardware/interfaces/net/netd/1.1/
DINetd.hal27 * Add route to a specified OEM network
30 * @param networkHandle Handle to the OEM network previously returned from
50 * Remove route from a specified OEM network.
53 * @param networkHandle Handle to the OEM network previously returned from
73 * Add interface to a specified OEM network
75 * @param networkHandle Handle to the OEM network previously returned from
77 * @param ifname Interface name to add to the OEM network.
85 * Remove interface from a specified OEM network.
87 * @param networkHandle Handle to the OEM network previously returned from
89 * @param ifname Interface name to remove from the OEM network.
[all …]
/system/sepolicy/prebuilts/api/28.0/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
2 # network capabilities
12 # Unless a HAL's job is to communicate over the network, or control network
13 # hardware, it should not be using network sockets.
16 # those modules using network. Using this exemption for non-automotive builds
Dhal_audio.te31 # Should never need network access.
32 # Disallow network sockets.
/system/sepolicy/prebuilts/api/29.0/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
2 # network capabilities
12 # Unless a HAL's job is to communicate over the network, or control network
13 # hardware, it should not be using network sockets.
16 # those modules using network. Using this exemption for non-automotive builds
Dnet.te7 ### Domain with network access
10 # Use network sockets.
Dhal_audio.te30 # Should never need network access.
31 # Disallow network sockets.
/system/sepolicy/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
2 # network capabilities
12 # Unless a HAL's job is to communicate over the network, or control network
13 # hardware, it should not be using network sockets.
16 # those modules using network. Using this exemption for non-automotive builds
Dnet.te7 ### Domain with network access
10 # Use network sockets.
Dhal_audio.te30 # Should never need network access.
31 # Disallow network sockets.
/system/sepolicy/prebuilts/api/26.0/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
2 # network capabilities
11 # Unless a HAL's job is to communicate over the network, or control network
12 # hardware, it should not be using network sockets.
Dhal_audio.te33 # Should never need network access.
34 # Disallow network sockets.
/system/sepolicy/prebuilts/api/27.0/public/
Dhal_neverallows.te1 # only HALs responsible for network hardware should have privileged
2 # network capabilities
11 # Unless a HAL's job is to communicate over the network, or control network
12 # hardware, it should not be using network sockets.
Dhal_audio.te33 # Should never need network access.
34 # Disallow network sockets.
/system/netd/resolv/
Dstats.proto162 // Indicates this network uses a Cellular transport.
164 // Indicates this network uses a Wi-Fi transport.
166 // Indicates this network uses a Bluetooth transport.
168 // Indicates this network uses an Ethernet transport.
170 // Indicates this network uses a VPN transport.
172 // Indicates this network uses a Wi-Fi Aware transport.
174 // Indicates this network uses a LoWPAN transport.
223 * in DnsQueryEvents to enable computing error rates and network latency and timeouts
224 * broken up by query type, transport, network interface, etc.
/system/sepolicy/prebuilts/api/27.0/private/
Dnet.te2 ### Domain with network access
5 # Use network sockets.
/system/sepolicy/prebuilts/api/26.0/private/
Dnet.te2 ### Domain with network access
5 # Use network sockets.
/system/sepolicy/prebuilts/api/28.0/private/
Dnet.te2 ### Domain with network access
5 # Use network sockets.
/system/update_engine/
Dnetwork_selector.h25 namespace network {

1234567