/system/netd/server/ |
D | StrictController.cpp | 154 const std::string commands = Join(commandList, '\n'); in disableStrict() local 155 return execIptablesRestore(V4V6, commands); in disableStrict() 167 std::vector<std::string> commands; in setUidCleartextPenalty() local 170 commands = { in setUidCleartextPenalty() 181 commands.push_back("*filter"); in setUidCleartextPenalty() 182 commands.push_back(StringPrintf(":%s -", perUidChain.c_str())); in setUidCleartextPenalty() 183 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty() 185 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty() 189 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG)); in setUidCleartextPenalty() 191 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), in setUidCleartextPenalty() [all …]
|
D | FirewallController.cpp | 267 std::string commands; in makeCriticalCommands() local 270 StringAppendF(&commands, "-A %s -p icmpv6 --icmpv6-type %s -j RETURN\n", in makeCriticalCommands() 274 return commands; in makeCriticalCommands() 279 std::string commands; in makeUidRules() local 280 StringAppendF(&commands, "*filter\n:%s -\n", name); in makeUidRules() 285 StringAppendF(&commands, "-A %s -m owner --uid-owner %d -j RETURN\n", name, uid); in makeUidRules() 289 StringAppendF(&commands, in makeUidRules() 294 StringAppendF(&commands, in makeUidRules() 298 StringAppendF(&commands, "-A %s -p esp -j RETURN\n", name); in makeUidRules() 302 StringAppendF(&commands, "-A %s -i lo -j RETURN\n", name); in makeUidRules() [all …]
|
D | IptablesBaseTest.h | 31 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands); 32 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, 35 const std::string& commands, std::string *output);
|
D | IptablesBaseTest.cpp | 75 const std::string& commands, in fakeExecIptablesRestoreWithOutput() argument 77 sRestoreCmds.push_back({ target, commands }); in fakeExecIptablesRestoreWithOutput() 87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { in fakeExecIptablesRestore() argument 88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr); in fakeExecIptablesRestore()
|
D | NetdConstants.cpp | 45 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, in execIptablesRestoreWithOutput() argument 47 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output); in execIptablesRestoreWithOutput() 50 int execIptablesRestore(IptablesTarget target, const std::string& commands) { in execIptablesRestore() argument 51 return execIptablesRestoreWithOutput(target, commands, nullptr); in execIptablesRestore()
|
D | IptablesRestoreController.h | 33 virtual int execute(const IptablesTarget target, const std::string& commands, 45 int execute(const IptablesTarget target, const std::string& commands,
|
D | NetdConstants.h | 43 int execIptablesRestore(IptablesTarget target, const std::string& commands); 44 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
|
D | TetherControllerTest.cpp | 176 ExpectedIptablesCommands commands; in allNewNatCommands() local 181 appendAll(commands, setupFirstIPv4Commands); in allNewNatCommands() 184 appendAll(commands, setupFirstIPv6Commands); in allNewNatCommands() 186 appendAll(commands, startFirstNatCommands); in allNewNatCommands() 188 return commands; in allNewNatCommands()
|
D | BandwidthController.cpp | 281 std::string commands = Join(IPT_FLUSH_COMMANDS, '\n'); in flushCleanTables() local 282 iptablesRestoreFunction(V4V6, commands, nullptr); in flushCleanTables() 309 std::string commands = Join(getBasicAccountingCommands(), '\n'); in enableBandwidthControl() local 310 return iptablesRestoreFunction(V4V6, commands, nullptr); in enableBandwidthControl() 790 std::vector<std::string> commands = { in setCostlyAlert() local 795 res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr); in setCostlyAlert() 819 std::vector<std::string> commands = { in removeCostlyAlert() local 824 if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) { in removeCostlyAlert()
|
D | StrictController.h | 48 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
|
/system/core/init/ |
D | init_test.cpp | 40 const std::vector<ActionManagerCommand>& commands, ServiceList* service_list) { in TestInit() argument 52 for (const auto& command : commands) { in TestInit() 62 const std::vector<ActionManagerCommand>& commands, ServiceList* service_list) { in TestInitText() argument 66 TestInit(tf.path, test_function_map, commands, service_list); in TestInitText() 81 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local 84 TestInitText(init_script, test_function_map, commands, &service_list); in TEST() 110 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local 113 TestInitText(init_script, test_function_map, commands, &service_list); in TEST() 191 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local 195 TestInit(start.path, test_function_map, commands, &service_list); in TEST()
|
/system/core/adb/ |
D | console.cpp | 116 std::string commands = adb_construct_auth_command(); in adb_send_emulator_command() local 119 commands.append(argv[i]); in adb_send_emulator_command() 120 commands.push_back(i == argc - 1 ? '\n' : ' '); in adb_send_emulator_command() 123 commands.append("quit\n"); in adb_send_emulator_command() 125 if (!WriteFdExactly(fd, commands)) { in adb_send_emulator_command()
|
D | shell_service_test.cpp | 206 const char* commands[] = {"TEST_STR=abc123", in TEST_F() local 211 for (std::string command : commands) { in TEST_F() 223 for (const char* command : commands) { in TEST_F()
|
/system/tpm/trunks/generator/ |
D | generator_test.py | 235 commands = parser.Parse() 236 self.assertIsNotNone(commands) 243 commands = parser.Parse() 244 self.assertEqual(len(commands), 1) 245 self.assertEqual(commands[0].name, 'TPM2_Test') 246 self.assertEqual(commands[0].command_code, 'TPM_CC_Test') 248 self.assertEqual(len(commands[0].request_args), 1) 249 self.assertEqual(commands[0].request_args[0]['type'], 'UINT16') 250 self.assertEqual(commands[0].request_args[0]['name'], 'input') 251 self.assertIsNotNone(commands[0].response_args) [all …]
|
D | generator.py | 1872 commands = [] 1876 return commands 1883 commands.append(cmd) 1884 return commands 1952 def GenerateHandleCountFunctions(commands, out_file): argument 1960 for command in commands: 1966 for command in commands: 1973 def GenerateHeader(types, constants, structs, defines, typemap, commands): argument 2032 for command in commands: 2040 def GenerateImplementation(types, structs, typemap, commands): argument [all …]
|
/system/bt/tools/hci/ |
D | main.c | 37 static const command_t commands[] = { variable 204 for (size_t i = 0; i < ARRAY_SIZE(commands); ++i) in find_command() 205 if (!strcmp(commands[i].name, name)) return &commands[i]; in find_command() 212 for (size_t i = 0; i < ARRAY_SIZE(commands); ++i) in usage() 213 printf(" %s\n", commands[i].name); in usage()
|
/system/tools/hidl/test/java_test/ |
D | hidl_test_java | 16 app_process $base/bin com.android.commands.hidl_test_java.HidlTestJava -c \ 23 app_process $base/bin com.android.commands.hidl_test_java.HidlTestJava -s &
|
/system/sepolicy/prebuilts/api/28.0/public/ |
D | hal_drm.te | 40 # only allow unprivileged socket ioctl commands 52 # do not allow privileged socket ioctl commands
|
D | cameraserver.te | 53 # Allow shell commands from ADB for CTS testing/dumping 60 # Allow shell commands from ADB for CTS testing/dumping
|
D | mediadrmserver.te | 30 # do not allow privileged socket ioctl commands
|
/system/sepolicy/public/ |
D | hal_drm.te | 40 # only allow unprivileged socket ioctl commands 52 # do not allow privileged socket ioctl commands
|
D | cameraserver.te | 53 # Allow shell commands from ADB for CTS testing/dumping 60 # Allow shell commands from ADB for CTS testing/dumping
|
/system/tpm/trunks/ |
D | README | 46 Extracts structured information about commands from spec/raw_commands_fixed.txt. 51 Generates C++ serialization and parsing code for TPM commands. Inputs must be
|
/system/sepolicy/prebuilts/api/27.0/public/ |
D | hal_drm.te | 47 # only allow unprivileged socket ioctl commands 59 # do not allow privileged socket ioctl commands
|
/system/sepolicy/prebuilts/api/26.0/public/ |
D | hal_drm.te | 47 # only allow unprivileged socket ioctl commands 59 # do not allow privileged socket ioctl commands
|