Home
last modified time | relevance | path

Searched refs:commands (Results 1 – 25 of 95) sorted by relevance

1234

/system/netd/server/
DStrictController.cpp154 const std::string commands = Join(commandList, '\n'); in disableStrict() local
155 return execIptablesRestore(V4V6, commands); in disableStrict()
167 std::vector<std::string> commands; in setUidCleartextPenalty() local
170 commands = { in setUidCleartextPenalty()
181 commands.push_back("*filter"); in setUidCleartextPenalty()
182 commands.push_back(StringPrintf(":%s -", perUidChain.c_str())); in setUidCleartextPenalty()
183 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
185 commands.push_back(StringPrintf("-I %s -m owner --uid-owner %d -j %s", in setUidCleartextPenalty()
189 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), LOCAL_PENALTY_LOG)); in setUidCleartextPenalty()
191 commands.push_back(StringPrintf("-A %s -j %s", perUidChain.c_str(), in setUidCleartextPenalty()
[all …]
DFirewallController.cpp267 std::string commands; in makeCriticalCommands() local
270 StringAppendF(&commands, "-A %s -p icmpv6 --icmpv6-type %s -j RETURN\n", in makeCriticalCommands()
274 return commands; in makeCriticalCommands()
279 std::string commands; in makeUidRules() local
280 StringAppendF(&commands, "*filter\n:%s -\n", name); in makeUidRules()
285 StringAppendF(&commands, "-A %s -m owner --uid-owner %d -j RETURN\n", name, uid); in makeUidRules()
289 StringAppendF(&commands, in makeUidRules()
294 StringAppendF(&commands, in makeUidRules()
298 StringAppendF(&commands, "-A %s -p esp -j RETURN\n", name); in makeUidRules()
302 StringAppendF(&commands, "-A %s -i lo -j RETURN\n", name); in makeUidRules()
[all …]
DIptablesBaseTest.h31 static int fakeExecIptablesRestore(IptablesTarget target, const std::string& commands);
32 static int fakeExecIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
35 const std::string& commands, std::string *output);
DIptablesBaseTest.cpp75 const std::string& commands, in fakeExecIptablesRestoreWithOutput() argument
77 sRestoreCmds.push_back({ target, commands }); in fakeExecIptablesRestoreWithOutput()
87 int IptablesBaseTest::fakeExecIptablesRestore(IptablesTarget target, const std::string& commands) { in fakeExecIptablesRestore() argument
88 return fakeExecIptablesRestoreWithOutput(target, commands, nullptr); in fakeExecIptablesRestore()
DNetdConstants.cpp45 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands, in execIptablesRestoreWithOutput() argument
47 return android::net::gCtls->iptablesRestoreCtrl.execute(target, commands, output); in execIptablesRestoreWithOutput()
50 int execIptablesRestore(IptablesTarget target, const std::string& commands) { in execIptablesRestore() argument
51 return execIptablesRestoreWithOutput(target, commands, nullptr); in execIptablesRestore()
DIptablesRestoreController.h33 virtual int execute(const IptablesTarget target, const std::string& commands,
45 int execute(const IptablesTarget target, const std::string& commands,
DNetdConstants.h43 int execIptablesRestore(IptablesTarget target, const std::string& commands);
44 int execIptablesRestoreWithOutput(IptablesTarget target, const std::string& commands,
DTetherControllerTest.cpp176 ExpectedIptablesCommands commands; in allNewNatCommands() local
181 appendAll(commands, setupFirstIPv4Commands); in allNewNatCommands()
184 appendAll(commands, setupFirstIPv6Commands); in allNewNatCommands()
186 appendAll(commands, startFirstNatCommands); in allNewNatCommands()
188 return commands; in allNewNatCommands()
DBandwidthController.cpp281 std::string commands = Join(IPT_FLUSH_COMMANDS, '\n'); in flushCleanTables() local
282 iptablesRestoreFunction(V4V6, commands, nullptr); in flushCleanTables()
309 std::string commands = Join(getBasicAccountingCommands(), '\n'); in enableBandwidthControl() local
310 return iptablesRestoreFunction(V4V6, commands, nullptr); in enableBandwidthControl()
790 std::vector<std::string> commands = { in setCostlyAlert() local
795 res = iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr); in setCostlyAlert()
819 std::vector<std::string> commands = { in removeCostlyAlert() local
824 if (iptablesRestoreFunction(V4V6, Join(commands, ""), nullptr) != 0) { in removeCostlyAlert()
DStrictController.h48 static int (*execIptablesRestore)(IptablesTarget target, const std::string& commands);
/system/core/init/
Dinit_test.cpp40 const std::vector<ActionManagerCommand>& commands, ServiceList* service_list) { in TestInit() argument
52 for (const auto& command : commands) { in TestInit()
62 const std::vector<ActionManagerCommand>& commands, ServiceList* service_list) { in TestInitText() argument
66 TestInit(tf.path, test_function_map, commands, service_list); in TestInitText()
81 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
84 TestInitText(init_script, test_function_map, commands, &service_list); in TEST()
110 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
113 TestInitText(init_script, test_function_map, commands, &service_list); in TEST()
191 std::vector<ActionManagerCommand> commands{trigger_boot}; in TEST() local
195 TestInit(start.path, test_function_map, commands, &service_list); in TEST()
/system/core/adb/
Dconsole.cpp116 std::string commands = adb_construct_auth_command(); in adb_send_emulator_command() local
119 commands.append(argv[i]); in adb_send_emulator_command()
120 commands.push_back(i == argc - 1 ? '\n' : ' '); in adb_send_emulator_command()
123 commands.append("quit\n"); in adb_send_emulator_command()
125 if (!WriteFdExactly(fd, commands)) { in adb_send_emulator_command()
Dshell_service_test.cpp206 const char* commands[] = {"TEST_STR=abc123", in TEST_F() local
211 for (std::string command : commands) { in TEST_F()
223 for (const char* command : commands) { in TEST_F()
/system/tpm/trunks/generator/
Dgenerator_test.py235 commands = parser.Parse()
236 self.assertIsNotNone(commands)
243 commands = parser.Parse()
244 self.assertEqual(len(commands), 1)
245 self.assertEqual(commands[0].name, 'TPM2_Test')
246 self.assertEqual(commands[0].command_code, 'TPM_CC_Test')
248 self.assertEqual(len(commands[0].request_args), 1)
249 self.assertEqual(commands[0].request_args[0]['type'], 'UINT16')
250 self.assertEqual(commands[0].request_args[0]['name'], 'input')
251 self.assertIsNotNone(commands[0].response_args)
[all …]
Dgenerator.py1872 commands = []
1876 return commands
1883 commands.append(cmd)
1884 return commands
1952 def GenerateHandleCountFunctions(commands, out_file): argument
1960 for command in commands:
1966 for command in commands:
1973 def GenerateHeader(types, constants, structs, defines, typemap, commands): argument
2032 for command in commands:
2040 def GenerateImplementation(types, structs, typemap, commands): argument
[all …]
/system/bt/tools/hci/
Dmain.c37 static const command_t commands[] = { variable
204 for (size_t i = 0; i < ARRAY_SIZE(commands); ++i) in find_command()
205 if (!strcmp(commands[i].name, name)) return &commands[i]; in find_command()
212 for (size_t i = 0; i < ARRAY_SIZE(commands); ++i) in usage()
213 printf(" %s\n", commands[i].name); in usage()
/system/tools/hidl/test/java_test/
Dhidl_test_java16 app_process $base/bin com.android.commands.hidl_test_java.HidlTestJava -c \
23 app_process $base/bin com.android.commands.hidl_test_java.HidlTestJava -s &
/system/sepolicy/prebuilts/api/28.0/public/
Dhal_drm.te40 # only allow unprivileged socket ioctl commands
52 # do not allow privileged socket ioctl commands
Dcameraserver.te53 # Allow shell commands from ADB for CTS testing/dumping
60 # Allow shell commands from ADB for CTS testing/dumping
Dmediadrmserver.te30 # do not allow privileged socket ioctl commands
/system/sepolicy/public/
Dhal_drm.te40 # only allow unprivileged socket ioctl commands
52 # do not allow privileged socket ioctl commands
Dcameraserver.te53 # Allow shell commands from ADB for CTS testing/dumping
60 # Allow shell commands from ADB for CTS testing/dumping
/system/tpm/trunks/
DREADME46 Extracts structured information about commands from spec/raw_commands_fixed.txt.
51 Generates C++ serialization and parsing code for TPM commands. Inputs must be
/system/sepolicy/prebuilts/api/27.0/public/
Dhal_drm.te47 # only allow unprivileged socket ioctl commands
59 # do not allow privileged socket ioctl commands
/system/sepolicy/prebuilts/api/26.0/public/
Dhal_drm.te47 # only allow unprivileged socket ioctl commands
59 # do not allow privileged socket ioctl commands

1234