Home
last modified time | relevance | path

Searched refs:services (Results 1 – 25 of 217) sorted by relevance

123456789

/system/bt/bta/gatt/
Ddatabase_builder.cc33 if (database.services.empty() || in AddService()
34 database.services.back().end_handle < handle) { in AddService()
35 database.services.emplace_back(Service{.handle = handle, in AddService()
40 auto& vec = database.services; in AddService()
60 Service* service = FindService(database.services, handle); in AddIncludedService()
68 if (!FindService(database.services, start_handle)) { in AddIncludedService()
82 Service* service = FindService(database.services, handle); in AddCharacteristic()
102 Service* service = FindService(database.services, handle); in AddDescriptor()
146 Service* service = FindService(database.services, pending_service.first); in NextDescriptorRangeToExplore()
178 bool DatabaseBuilder::InProgress() const { return !database.services.empty(); } in InProgress()
Ddatabase.cc43 Service* FindService(std::list<Service>& services, uint16_t handle) { in FindService() argument
44 for (Service& service : services) { in FindService()
55 for (const Service& service : services) { in ToString()
85 if (services.empty()) return std::vector<StoredAttribute>(); in Serialize()
87 for (const Service& service : services) { in Serialize()
95 for (const Service& service : services) { in Serialize()
130 result.services.emplace_back( in Deserialize()
137 auto current_service_it = result.services.begin(); in Deserialize()
143 while (current_service_it != result.services.end() && in Deserialize()
148 if (current_service_it == result.services.end() || in Deserialize()
[all …]
Ddatabase.h101 bool IsEmpty() const { return services.empty(); } in IsEmpty()
105 void Clear() { std::list<Service>().swap(services); } in Clear()
108 const std::list<Service>& Services() const { return services; } in Services()
120 std::list<Service> services;
125 Service* FindService(std::list<Service>& services, uint16_t handle);
Dbta_gattc_cache.cc123 const std::list<Service>& services, uint16_t handle) { in bta_gattc_find_matching_service() argument
124 for (const Service& service : services) { in bta_gattc_find_matching_service()
440 const std::list<Service>* services = bta_gattc_get_services_srcb(p_srcb); in bta_gattc_get_service_for_handle_srcb() local
441 if (services == NULL) return NULL; in bta_gattc_get_service_for_handle_srcb()
442 return bta_gattc_find_matching_service(*services, handle); in bta_gattc_get_service_for_handle_srcb()
447 const std::list<Service>* services = bta_gattc_get_services(conn_id); in bta_gattc_get_service_for_handle() local
448 if (services == NULL) return NULL; in bta_gattc_get_service_for_handle()
450 return bta_gattc_find_matching_service(*services, handle); in bta_gattc_get_service_for_handle()
558 static size_t bta_gattc_get_db_size(const std::list<Service>& services, in bta_gattc_get_db_size() argument
561 if (services.empty()) return 0; in bta_gattc_get_db_size()
[all …]
/system/bt/bta/ag/
Dbta_ag_rfc.cc245 void bta_ag_start_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_start_servers() argument
246 services >>= BTA_HSP_SERVICE_ID; in bta_ag_start_servers()
247 for (int i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_start_servers()
249 if (services & 1) { in bta_ag_start_servers()
255 << "invalid callback index, services=" << loghex(services) in bta_ag_start_servers()
260 << "callback index out of bound, services=" << loghex(services) in bta_ag_start_servers()
271 << ", p_scb=" << p_scb << ", services=" << loghex(services) in bta_ag_start_servers()
275 __func__, p_scb, services, management_callback_index); in bta_ag_start_servers()
290 void bta_ag_close_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_close_servers() argument
291 services >>= BTA_HSP_SERVICE_ID; in bta_ag_close_servers()
[all …]
Dbta_ag_sdp.cc216 tBTA_SERVICE_MASK services; in bta_ag_create_records() local
218 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_create_records()
219 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_create_records()
221 if (services & 1) { in bta_ag_create_records()
247 tBTA_SERVICE_MASK services; in bta_ag_del_records() local
263 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_del_records()
264 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; in bta_ag_del_records()
265 i++, services >>= 1, others >>= 1) { in bta_ag_del_records()
268 if (((services & 1) == 1) && ((others & 1) == 0)) { in bta_ag_del_records()
/system/update_engine/init/
Dupdate-engine.conf23 start on starting system-services
24 stop on stopping system-services
/system/sepolicy/prebuilts/api/26.0/public/
Dattributes70 # services which should be available to all but isolated apps
73 # services which should be available to all ephemeral apps
76 # services which export only system_api
79 # All types used for services managed by servicemanager.
84 # All types used for services managed by hwservicemanager
87 # All HwBinder services guaranteed to be passthrough. These services always run
92 # All HwBinder services guaranteed to be offered only by core domain components
95 # All types used for services managed by vndservicemanager
156 # PDX services
283 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/prebuilts/api/29.0/private/
Datrace.te7 # boottrace services uses /data/misc/boottrace/categories
27 # Allow discovery of binder services.
43 # Allow notifying the processes hosting specific binder services that
60 # Remove logspam from notification attempts to non-whitelisted services.
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/private/
Datrace.te7 # boottrace services uses /data/misc/boottrace/categories
27 # Allow discovery of binder services.
43 # Allow notifying the processes hosting specific binder services that
60 # Remove logspam from notification attempts to non-whitelisted services.
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/29.0/public/
Dattributes92 # services which should be available to all but isolated apps
95 # services which should be available to all ephemeral apps
98 # services which export only system_api
101 # All types used for services managed by servicemanager.
106 # All types used for services managed by hwservicemanager
109 # All HwBinder services guaranteed to be passthrough. These services always run
114 # All HwBinder services guaranteed to be offered only by core domain components
117 # All types used for services managed by vndservicemanager
217 # PDX services
300 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/public/
Dattributes92 # services which should be available to all but isolated apps
95 # services which should be available to all ephemeral apps
98 # services which export only system_api
101 # All types used for services managed by servicemanager.
106 # All types used for services managed by hwservicemanager
109 # All HwBinder services guaranteed to be passthrough. These services always run
114 # All HwBinder services guaranteed to be offered only by core domain components
117 # All types used for services managed by vndservicemanager
217 # PDX services
300 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/prebuilts/api/28.0/public/
Dattributes81 # services which should be available to all but isolated apps
84 # services which should be available to all ephemeral apps
87 # services which export only system_api
90 # All types used for services managed by servicemanager.
95 # All types used for services managed by hwservicemanager
98 # All HwBinder services guaranteed to be passthrough. These services always run
103 # All HwBinder services guaranteed to be offered only by core domain components
106 # All types used for services managed by vndservicemanager
201 # PDX services
303 # HwBinder services offered across the core-vendor boundary
Daudioserver.te1 # audioserver - audio services daemon
/system/bt/bta/dm/
Dbta_dm_api.cc127 void BTA_DmSearch(tBTA_DM_INQ* p_dm_inq, tBTA_SERVICE_MASK services, in BTA_DmSearch() argument
134 p_msg->services = services; in BTA_DmSearch()
169 void BTA_DmDiscover(const RawAddress& bd_addr, tBTA_SERVICE_MASK services, in BTA_DmDiscover() argument
176 p_msg->services = services; in BTA_DmDiscover()
201 p_msg->services = BTA_USER_SERVICE_MASK; // Not exposed at API level in BTA_DmDiscoverUUID()
597 p_msg->services = p_services->srvc_mask; in bta_dm_discover_send_msg()
688 p_msg->services = p_services->srvc_mask; in BTA_DmSearchExt()
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te19 # Do not allow untrusted apps to register services.
21 # services.
119 # other than find actions for services listed below
122 # Do not permit access from apps which host arbitrary code to HwBinder services,
127 # HwBinder services either operate at a level below that of apps (e.g., HALs)
131 # 2. HAL servers (a subset of HwBinder services) contain code with higher
136 # Safe services include:
137 # - same process services: because they by definition run in the process
158 # Make sure that the following services are never accessible by untrusted_apps
193 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/27.0/private/
Dapp_neverallows.te24 # Do not allow untrusted apps to register services.
26 # services.
124 # other than find actions for services listed below
127 # Do not permit access from apps which host arbitrary code to HwBinder services,
132 # HwBinder services either operate at a level below that of apps (e.g., HALs)
136 # 2. HAL servers (a subset of HwBinder services) contain code with higher
141 # Safe services include:
142 # - same process services: because they by definition run in the process
164 # Make sure that the following services are never accessible by untrusted_apps
203 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/libhwbinder/vts/performance/
DBenchmark_throughput.cpp311 int services = -1; in main() local
337 services = atoi(argv[i + 1]); in main()
343 if (services == -1) { in main()
344 services = workers; in main()
349 for (int i = 0; i < services; i++) { in main()
361 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main()
395 for (int i = 0; i < services; i++) { in main()
/system/core/adb/
DOVERVIEW.TXT12 DDMS). These commands are called 'services' in ADB.
28 services and devices.
36 few services for clients that run on the host.
60 There are essentially two kinds of services that a client can talk to.
63 These services run within the ADB Server and thus do not need to
66 states. They are a few other services though.
69 These services either run within the adbd daemon, or are started by
115 The file SERVICES.TXT lists all services currently implemented by ADB.
/system/sepolicy/prebuilts/api/28.0/private/
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
Dapp_neverallows.te25 # Do not allow untrusted apps to register services.
27 # services.
147 # other than find actions for services listed below
150 # Do not permit access from apps which host arbitrary code to HwBinder services,
155 # HwBinder services either operate at a level below that of apps (e.g., HALs)
159 # 2. HAL servers (a subset of HwBinder services) contain code with higher
164 # Safe services include:
165 # - same process services: because they by definition run in the process
190 # Make sure that the following services are never accessible by untrusted_apps
231 # HwBinder services offered by core components (as opposed to vendor components)

123456789