/system/libfmq/tests/ |
D | fmq_test.py | 52 servers = [] variable 54 def add_clients_and_servers(clients: list[str], servers: list[str], base: str): 59 …servers += [base + "/android.hardware.tests.msgq@1.0-service-test/android.hardware.tests.msgq@1.0-… 60 …servers += [base + "/android.hardware.tests.msgq@1.0-rust-service-test/android.hardware.tests.msgq… 63 add_clients_and_servers(clients, servers, "/data/nativetest") 66 add_clients_and_servers(clients, servers, "/data/nativetest64") 69 assert len(servers) > 0 81 for server in servers:
|
/system/tools/hidl/test/hidl_test/ |
D | hidl_test.py | 56 servers = [] variable 60 servers += ["/data/nativetest/hidl_test_servers/hidl_test_servers32"] 64 servers += ["/data/nativetest64/hidl_test_servers/hidl_test_servers64"] 67 assert len(servers) > 0 75 for server in servers:
|
/system/netd/tests/benchmarks/ |
D | dns_benchmark.cpp | 66 std::vector<std::string> servers; in SetUp() local 68 dns.SetupDNSServers(MAXNS, mappings, &mDns, &servers); in SetUp() 70 .setDnsServers(servers) in SetUp()
|
/system/netd/server/ |
D | NetlinkHandler.cpp | 172 const char *servers = evt->findParam("SERVERS"); in onEvent() local 173 if (lifetime && servers) { in onEvent() 175 android::base::Split(servers, ",")); in onEvent() 267 const std::vector<std::string>& servers) { in notifyInterfaceDnsServers() argument 268 NOTIFY_AND_LOG(BINDER_RETRY, onInterfaceDnsServerInfo, ifName, lifetime, servers); in notifyInterfaceDnsServers()
|
D | TetherController.cpp | 372 int TetherController::setDnsForwarders(unsigned netId, char **servers, int numServers) { in setDnsForwarders() argument 383 ALOGD("setDnsForwarders(0x%x %d = '%s')", fwmark.intValue, i, servers[i]); in setDnsForwarders() 386 int ret = getaddrinfo(servers[i], nullptr, &hints, &res); in setDnsForwarders() 389 ALOGE("Failed to parse DNS server '%s'", servers[i]); in setDnsForwarders() 395 if (daemonCmd.size() + 1 + strlen(servers[i]) >= MAX_CMD_SIZE) { in setDnsForwarders() 401 daemonCmd += servers[i]; in setDnsForwarders() 402 mDnsForwarders.push_back(servers[i]); in setDnsForwarders() 417 int TetherController::setDnsForwarders(unsigned netId, const std::vector<std::string>& servers) { in setDnsForwarders() argument 418 auto dnsServers = toCstrVec(servers); in setDnsForwarders()
|
D | TetherController.h | 90 int setDnsForwarders(unsigned netId, char **servers, int numServers); 91 int setDnsForwarders(unsigned netId, const std::vector<std::string>& servers);
|
D | NetlinkHandler.h | 55 const std::vector<std::string>& servers);
|
/system/tools/aidl/tests/ |
D | aidl_integration_test.py | 328 servers = [] variable 332 servers += [NdkServer(host, bitness)] 336 servers += [CppServer(host, bitness)] 339 servers += [JavaServer(host, bitness)] 342 servers += [RustServer(host, bitness)] 343 servers += [RustAsyncServer(host, bitness)] 346 for server in servers:
|
/system/netd/tests/ |
D | TestUnsolService.cpp | 98 const std::vector<std::string>& servers) { in onInterfaceDnsServerInfo() argument 100 lifetime, base::Join(servers, ", ").c_str())); in onInterfaceDnsServerInfo()
|
D | TestUnsolService.h | 61 const std::vector<std::string>& servers) override;
|
/system/sepolicy/microdroid/system/private/ |
D | microdroid_payload.te | 27 # Allow microdroid_payload to host binder servers via vsock. Listening
|
/system/sepolicy/prebuilts/api/30.0/private/ |
D | app_neverallows.te | 223 # 1. Protected HwBinder servers do not perform client authentication because HIDL 229 # 2. HAL servers (a subset of HwBinder services) contain code with higher
|
/system/chre/chpp/ |
D | Android.bp | 196 // Note: the value shouldn't be too low to avoid timeouts on slow test servers.
|
/system/sepolicy/microdroid/system/public/ |
D | attributes | 136 # All HAL servers
|
/system/sepolicy/prebuilts/api/33.0/private/ |
D | app_neverallows.te | 218 # 1. Protected HwBinder servers do not perform client authentication because 225 # 2. HAL servers contain code with higher incidence rate of security issues
|
/system/sepolicy/prebuilts/api/32.0/private/ |
D | app_neverallows.te | 207 # 1. Protected HwBinder servers do not perform client authentication because 214 # 2. HAL servers contain code with higher incidence rate of security issues
|
/system/sepolicy/prebuilts/api/31.0/private/ |
D | app_neverallows.te | 207 # 1. Protected HwBinder servers do not perform client authentication because 214 # 2. HAL servers contain code with higher incidence rate of security issues
|
/system/libhidl/transport/manager/1.2/ |
D | IServiceManager.hal | 93 * has multiple servers, and only some succeed in unregistration, then the unregistered services
|
/system/sepolicy/prebuilts/api/29.0/private/ |
D | app_neverallows.te | 211 # 1. HwBinder servers do not perform client authentication because HIDL 217 # 2. HAL servers (a subset of HwBinder services) contain code with higher
|
/system/sepolicy/prebuilts/api/202404/private/ |
D | app_neverallows.te | 221 # 1. Protected HwBinder servers do not perform client authentication because 228 # 2. HAL servers contain code with higher incidence rate of security issues
|
/system/sepolicy/prebuilts/api/34.0/private/ |
D | app_neverallows.te | 221 # 1. Protected HwBinder servers do not perform client authentication because 228 # 2. HAL servers contain code with higher incidence rate of security issues
|
/system/sepolicy/private/ |
D | app_neverallows.te | 237 # 1. Protected HwBinder servers do not perform client authentication because 244 # 2. HAL servers contain code with higher incidence rate of security issues
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | attributes | 231 # All HAL servers
|
/system/sepolicy/prebuilts/api/31.0/public/ |
D | attributes | 301 # All HAL servers
|
/system/sepolicy/prebuilts/api/32.0/public/ |
D | attributes | 301 # All HAL servers
|