/system/netd/server/ |
D | NetworkController.cpp | 161 Network* network = getNetworkLocked(netId); in setDefaultNetwork() local 162 if (!network) { in setDefaultNetwork() 166 if (network->getType() != Network::PHYSICAL) { in setDefaultNetwork() 170 if (int ret = static_cast<PhysicalNetwork*>(network)->addAsDefault()) { in setDefaultNetwork() 176 Network* network = getNetworkLocked(mDefaultNetId); in setDefaultNetwork() local 177 if (!network || network->getType() != Network::PHYSICAL) { in setDefaultNetwork() 181 if (int ret = static_cast<PhysicalNetwork*>(network)->removeAsDefault()) { in setDefaultNetwork() 216 Network *network = getNetworkLocked(*netId); in getNetworkForDnsLocked() local 217 if (network && network->getType() == Network::VIRTUAL && in getNetworkForDnsLocked() 350 Network* network = getNetworkLocked(netId); in isVirtualNetworkLocked() local [all …]
|
/system/connectivity/wificond/scanning/ |
D | pno_settings.cpp | 39 for (const auto& network : pno_networks_) { in writeToParcel() local 43 RETURN_IF_FAILED(network.writeToParcel(parcel)); in writeToParcel() 55 PnoNetwork network; in readFromParcel() local 66 RETURN_IF_FAILED(network.readFromParcel(parcel)); in readFromParcel() 67 pno_networks_.push_back(network); in readFromParcel()
|
D | single_scan_settings.cpp | 52 for (const auto& network : hidden_networks_) { in writeToParcel() local 56 RETURN_IF_FAILED(network.writeToParcel(parcel)); in writeToParcel() 95 HiddenNetwork network; in readFromParcel() local 106 RETURN_IF_FAILED(network.readFromParcel(parcel)); in readFromParcel() 107 hidden_networks_.push_back(network); in readFromParcel()
|
D | scanner_impl.cpp | 177 for (auto& network : scan_settings.hidden_networks_) { in scan() local 179 skipped_scan_ssids.emplace_back(network.ssid_); in scan() 182 ssids.push_back(network.ssid_); in scan() 253 for (auto& network : pno_settings.pno_networks_) { in ParsePnoSettings() local 255 if (network.is_hidden_) { in ParsePnoSettings() 259 skipped_scan_ssids.emplace_back(network.ssid_); in ParsePnoSettings() 262 scan_ssids->push_back(network.ssid_); in ParsePnoSettings() 266 skipped_match_ssids.emplace_back(network.ssid_); in ParsePnoSettings() 269 match_ssids->push_back(network.ssid_); in ParsePnoSettings() 273 for (const auto& frequency : network.frequencies_) { in ParsePnoSettings() [all …]
|
/system/connectivity/wificond/tests/ |
D | scan_settings_unittest.cpp | 97 HiddenNetwork network; in TEST_F() local 98 network.ssid_ = in TEST_F() 102 scan_settings.hidden_networks_ = {network}; in TEST_F() 123 HiddenNetwork network; in TEST_F() local 124 network.ssid_ = in TEST_F() 128 scan_settings.hidden_networks_ = {network}; in TEST_F() 154 PnoNetwork network, network1; in TEST_F() local 155 network.ssid_ = in TEST_F() 157 network.is_hidden_ = true; in TEST_F() 166 pno_settings.pno_networks_ = {network, network1}; in TEST_F()
|
D | scanner_unittest.cpp | 608 PnoNetwork network; in TEST_F() local 609 network.is_hidden_ = false; in TEST_F() 610 network.frequencies_.push_back(2412); in TEST_F() 611 pno_settings.pno_networks_.push_back(network); in TEST_F() 642 PnoNetwork network; in TEST_F() local 644 network.is_hidden_ = false; in TEST_F() 645 network.frequencies_.push_back(2412); in TEST_F() 646 network.frequencies_.push_back(2437); in TEST_F() 650 pno_settings.pno_networks_.push_back(network); in TEST_F() 684 PnoNetwork network; in TEST_F() local [all …]
|
/system/hardware/interfaces/net/netd/1.0/ |
D | INetd.hal | 37 * Creates a physical network to be used for interfaces managed by the OEM 39 * @return networkHandle a handle to the OEM network. Zero implies 41 * @return packetMark The packet mark that vendor network stack configuration code must use when 42 * routing packets to this network. No applications may use this mark. They must 43 * instead pass the networkHandle to the android_set*network LL-NDK APIs. 51 * Destroys the specified network previously created using createOemNetwork()
|
/system/hardware/interfaces/net/netd/1.1/ |
D | INetd.hal | 27 * Add route to a specified OEM network 30 * @param networkHandle Handle to the OEM network previously returned from 50 * Remove route from a specified OEM network. 53 * @param networkHandle Handle to the OEM network previously returned from 73 * Add interface to a specified OEM network 75 * @param networkHandle Handle to the OEM network previously returned from 77 * @param ifname Interface name to add to the OEM network. 85 * Remove interface from a specified OEM network. 87 * @param networkHandle Handle to the OEM network previously returned from 89 * @param ifname Interface name to remove from the OEM network. [all …]
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | hal_neverallows.te | 1 # only HALs responsible for network hardware should have privileged 2 # network capabilities 12 # Unless a HAL's job is to communicate over the network, or control network 13 # hardware, it should not be using network sockets. 16 # those modules using network. Using this exemption for non-automotive builds
|
D | hal_audio.te | 31 # Should never need network access. 32 # Disallow network sockets.
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | hal_neverallows.te | 1 # only HALs responsible for network hardware should have privileged 2 # network capabilities 12 # Unless a HAL's job is to communicate over the network, or control network 13 # hardware, it should not be using network sockets. 16 # those modules using network. Using this exemption for non-automotive builds
|
D | net.te | 7 ### Domain with network access 10 # Use network sockets.
|
D | hal_audio.te | 30 # Should never need network access. 31 # Disallow network sockets.
|
/system/sepolicy/public/ |
D | hal_neverallows.te | 1 # only HALs responsible for network hardware should have privileged 2 # network capabilities 12 # Unless a HAL's job is to communicate over the network, or control network 13 # hardware, it should not be using network sockets. 16 # those modules using network. Using this exemption for non-automotive builds
|
D | net.te | 7 ### Domain with network access 10 # Use network sockets.
|
D | hal_audio.te | 30 # Should never need network access. 31 # Disallow network sockets.
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | hal_neverallows.te | 1 # only HALs responsible for network hardware should have privileged 2 # network capabilities 11 # Unless a HAL's job is to communicate over the network, or control network 12 # hardware, it should not be using network sockets.
|
D | hal_audio.te | 33 # Should never need network access. 34 # Disallow network sockets.
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | hal_neverallows.te | 1 # only HALs responsible for network hardware should have privileged 2 # network capabilities 11 # Unless a HAL's job is to communicate over the network, or control network 12 # hardware, it should not be using network sockets.
|
D | hal_audio.te | 33 # Should never need network access. 34 # Disallow network sockets.
|
/system/netd/resolv/ |
D | stats.proto | 162 // Indicates this network uses a Cellular transport. 164 // Indicates this network uses a Wi-Fi transport. 166 // Indicates this network uses a Bluetooth transport. 168 // Indicates this network uses an Ethernet transport. 170 // Indicates this network uses a VPN transport. 172 // Indicates this network uses a Wi-Fi Aware transport. 174 // Indicates this network uses a LoWPAN transport. 223 * in DnsQueryEvents to enable computing error rates and network latency and timeouts 224 * broken up by query type, transport, network interface, etc.
|
/system/sepolicy/prebuilts/api/27.0/private/ |
D | net.te | 2 ### Domain with network access 5 # Use network sockets.
|
/system/sepolicy/prebuilts/api/26.0/private/ |
D | net.te | 2 ### Domain with network access 5 # Use network sockets.
|
/system/sepolicy/prebuilts/api/28.0/private/ |
D | net.te | 2 ### Domain with network access 5 # Use network sockets.
|
/system/update_engine/ |
D | network_selector.h | 25 namespace network {
|