/system/core/libcutils/ |
D | sockets_test.cpp | 34 static void TestConnectedSockets(cutils_socket_t server, cutils_socket_t client, in TestConnectedSockets() argument 36 ASSERT_NE(INVALID_SOCKET, server); in TestConnectedSockets() 46 EXPECT_EQ(3, recvfrom(server, buffer, sizeof(buffer), 0, in TestConnectedSockets() 49 EXPECT_EQ(3, recv(server, buffer, sizeof(buffer), 0)); in TestConnectedSockets() 55 ASSERT_EQ(3, sendto(server, "bar", 3, 0, in TestConnectedSockets() 58 ASSERT_EQ(3, send(server, "bar", 3, 0)); in TestConnectedSockets() 69 EXPECT_EQ(11, recv(server, buffer, sizeof(buffer), 0)); in TestConnectedSockets() 72 EXPECT_EQ(0, socket_close(server)); in TestConnectedSockets() 78 cutils_socket_t server; in TEST() local 85 server = socket_inaddr_any_server(port, type); in TEST() [all …]
|
/system/core/adb/pairing_auth/tests/ |
D | pairing_auth_test.cpp | 77 auto server = makeServer(pswd); in TEST_F() local 80 ASSERT_NE(nullptr, server); in TEST_F() 90 size_t msg_size = pairing_auth_msg_size(server.get()); in TEST_F() 93 pairing_auth_get_spake2_msg(server.get(), buf.data()); in TEST_F() 109 auto server = makeServer(pswd); in TEST_F() 110 pairing_auth_init_cipher(server.get(), nullptr, 0); in TEST_F() 115 auto server = makeServer(pswd); in TEST_F() 116 pairing_auth_encrypt(server.get(), data.data(), data.size(), outbuf, &outsize); in TEST_F() 121 auto server = makeServer(pswd); in TEST_F() 122 pairing_auth_decrypt(server.get(), data.data(), data.size(), outbuf, &outsize); in TEST_F() [all …]
|
/system/core/fastboot/ |
D | socket_test.cpp | 35 bool MakeConnectedSockets(Socket::Protocol protocol, std::unique_ptr<Socket>* server, in MakeConnectedSockets() argument 38 *server = Socket::NewServer(protocol, 0); in MakeConnectedSockets() 39 if (*server == nullptr) { in MakeConnectedSockets() 44 *client = Socket::NewClient(protocol, hostname, (*server)->GetLocalPort(), nullptr); in MakeConnectedSockets() 52 *server = (*server)->Accept(); in MakeConnectedSockets() 53 if (*server == nullptr) { in MakeConnectedSockets() 78 std::unique_ptr<Socket> server, client; in TEST() local 81 ASSERT_TRUE(MakeConnectedSockets(protocol, &server, &client)); in TEST() 84 EXPECT_TRUE(ReceiveString(server.get(), "foo")); in TEST() 86 EXPECT_TRUE(SendString(server.get(), "bar baz")); in TEST() [all …]
|
/system/update_engine/common/ |
D | http_fetcher_unittest.cc | 214 virtual void IgnoreServerAborting(HttpServer* server) const {} in IgnoreServerAborting() 285 void IgnoreServerAborting(HttpServer* server) const override { in IgnoreServerAborting() 358 void IgnoreServerAborting(HttpServer* server) const override {} in IgnoreServerAborting() 483 unique_ptr<HttpServer> server(this->test_.CreateServer()); in TYPED_TEST() local 484 ASSERT_TRUE(server->started_); in TYPED_TEST() 489 this->test_.SmallUrl(server->GetPort()))); in TYPED_TEST() 499 unique_ptr<HttpServer> server(this->test_.CreateServer()); in TYPED_TEST() local 500 ASSERT_TRUE(server->started_); in TYPED_TEST() 505 StartTransfer, fetcher.get(), this->test_.BigUrl(server->GetPort()))); in TYPED_TEST() 523 unique_ptr<HttpServer> server(this->test_.CreateServer()); in TYPED_TEST() local [all …]
|
/system/tools/aidl/tests/ |
D | test_data_example_interface.cpp | 1205 …ce.traceBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::isEnabled::server"); 1219 …ace.traceBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::getState::server"); 1233 …e.traceBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::getAddress::server"); 1247 …aceBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::getParcelables::server"); 1261 ….traceBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::setScanMode::server"); 1279 …aceBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::registerBinder::server"); 1294 …egin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::getRecursiveBinder::server"); 1308 …eBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::takesAnInterface::server"); 1324 …eBegin(android.os.Trace.TRACE_TAG_AIDL, "AIDL::java::IExampleInterface::takesAParcelable::server");
|
D | aidl_integration_test.py | 148 def make_test(client, server): argument 152 server.cleanup() 153 server.run() 157 server.cleanup() 179 for server in servers: 180 test_name = 'test_%s_to_%s' % (client.name, server.name) 181 test = make_test(client, server)
|
/system/tools/hidl/test/java_test/ |
D | hidl_test_java | 10 echo "Testing $SIZE bit native client/server" 12 # Test native server with Java client 17 && echo "Java client => native server PASSED" \ 18 || (echo "Java client => native server FAILED" && false) || e=1 22 # Test Java server with native client 26 && echo "native client => Java server PASSED" \ 27 || (echo "native client => Java server FAILED" && false) || e=1
|
/system/sepolicy/prebuilts/api/29.0/public/ |
D | flags_health_check.te | 17 # system property device_config_boot_count_prop is used for deciding when to perform server 19 # wrong timing, trigger server configurable flag related disaster recovery, which will override 20 # server configured values of all flags with default values. 23 # system property device_config_reset_performed_prop is used for indicating whether server 25 # cause bad server configurable flags synced back to device. 28 # server_configurable_flags_data_file is used for storing whether server configurable flags which 30 # cause bad server configurable flags synced back to device.
|
D | hal_codec2.te | 9 # Allow server access to composer sync fences 12 # Allow both server and client access to ion 15 # Allow server access to camera HAL's fences
|
/system/sepolicy/prebuilts/api/30.0/public/ |
D | flags_health_check.te | 21 # system property device_config_boot_count_prop is used for deciding when to perform server 23 # wrong timing, trigger server configurable flag related disaster recovery, which will override 24 # server configured values of all flags with default values. 27 # system property device_config_reset_performed_prop is used for indicating whether server 29 # cause bad server configurable flags synced back to device. 32 # server_configurable_flags_data_file is used for storing whether server configurable flags which 34 # cause bad server configurable flags synced back to device.
|
D | hal_light.te | 1 # HwBinder IPC from client to server, and callbacks 7 # client finds and uses server via service_manager 11 # server adds itself via service_manager
|
D | hal_codec2.te | 12 # Allow server access to composer sync fences 15 # Allow both server and client access to ion 18 # Allow server access to camera HAL's fences
|
/system/bt/btif/src/ |
D | btif_gatt_server.cc | 132 HAL_CBACK(bt_gatt_callbacks, server->register_server_cb, in btapp_gatts_handle_cback() 145 HAL_CBACK(bt_gatt_callbacks, server->connection_cb, p_data->conn.conn_id, in btapp_gatts_handle_cback() 151 HAL_CBACK(bt_gatt_callbacks, server->connection_cb, p_data->conn.conn_id, in btapp_gatts_handle_cback() 157 HAL_CBACK(bt_gatt_callbacks, server->service_stopped_cb, in btapp_gatts_handle_cback() 163 HAL_CBACK(bt_gatt_callbacks, server->service_deleted_cb, in btapp_gatts_handle_cback() 169 HAL_CBACK(bt_gatt_callbacks, server->request_read_characteristic_cb, in btapp_gatts_handle_cback() 179 HAL_CBACK(bt_gatt_callbacks, server->request_read_descriptor_cb, in btapp_gatts_handle_cback() 191 HAL_CBACK(bt_gatt_callbacks, server->request_write_characteristic_cb, in btapp_gatts_handle_cback() 201 HAL_CBACK(bt_gatt_callbacks, server->request_write_descriptor_cb, in btapp_gatts_handle_cback() 209 HAL_CBACK(bt_gatt_callbacks, server->request_exec_write_cb, in btapp_gatts_handle_cback() [all …]
|
/system/connectivity/wificond/scanning/ |
D | scanner_impl.h | 45 std::vector<com::android::server::wifi::wificond::NativeScanResult>* 50 std::vector<com::android::server::wifi::wificond::NativeScanResult>* 53 const ::com::android::server::wifi::wificond::SingleScanSettings& 57 const ::com::android::server::wifi::wificond::PnoSettings& pno_settings, 80 const ::com::android::server::wifi::wificond::PnoSettings& pno_settings); 83 const ::com::android::server::wifi::wificond::PnoSettings& pno_settings, 88 const ::com::android::server::wifi::wificond::PnoSettings& pno_settings) const; 94 ::com::android::server::wifi::wificond::PnoSettings pno_settings_;
|
/system/netd/tests/benchmarks/ |
D | Android.bp | 17 "netd_aidl_interface-cpp", // system/netd/server/UidRanges.h 22 include_dirs: ["system/netd/server/binder"], 27 "system/netd/server", 28 "system/netd/server/binder",
|
D | connect_benchmark.cpp | 120 sockaddr_in server = { .sin_family = AF_INET, .sin_port = htons(port) }; in ipv4_loopback() local 121 if (connect(sock, (sockaddr*) &server, sizeof(server))) { in ipv4_loopback() 177 sockaddr_in6 server = { .sin6_family = AF_INET6, .sin6_port = htons(port) }; in ipv6_loopback() local 178 if (connect(sock, (sockaddr*) &server, sizeof(server))) { in ipv6_loopback()
|
/system/core/adb/ |
D | OVERVIEW.TXT | 16 1. The ADB server 26 The ADB server is really one giant multiplexing loop whose purpose is 34 or emulated system. Its purpose is to connect to the ADB server 38 The ADB server considers that a device is ONLINE when it has successfully 40 meaning that the ADB server detected a new device/emulator, but could not 49 or a script. It first tries to locate the ADB server on the host machine, 52 Then, the client sends its service requests to the ADB server. 54 Currently, a single 'adb' binary is used for both the server and client. 55 this makes distribution and starting the server easier. 70 it on the device. The ADB server is used to multiplex streams [all …]
|
D | transport_benchmark.cpp | 62 auto server = MakeConnection<ConnectionType>(unique_fd(fds[1])); in BM_Connection_Unidirectional() local 67 … server->SetReadCallback([&received_bytes](Connection*, std::unique_ptr<apacket> packet) -> bool { in BM_Connection_Unidirectional() 74 server->SetErrorCallback( in BM_Connection_Unidirectional() 78 server->Start(); in BM_Connection_Unidirectional() 99 server->Stop(); in BM_Connection_Unidirectional() 117 auto server = MakeConnection<ConnectionType>(unique_fd(fds[1])); in BM_Connection_Echo() local 133 server->SetReadCallback([](Connection* connection, std::unique_ptr<apacket> packet) -> bool { in BM_Connection_Echo() 148 server->SetErrorCallback( in BM_Connection_Echo() 152 server->Start(); in BM_Connection_Echo() 173 server->Stop(); in BM_Connection_Echo()
|
D | SOCKET-ACTIVATION.txt | 17 ExecStart=/path/to/adb server nodaemon -L acceptfd:3 31 After installing the adb service, the adb server will be started 33 control port), even after adb kill-server kills the server. 37 "server" and "nodaemon" command line arguments and that the listen
|
/system/sepolicy/private/ |
D | flags_health_check.te | 18 # system property device_config_boot_count_prop is used for deciding when to perform server 20 # wrong timing, trigger server configurable flag related disaster recovery, which will override 21 # server configured values of all flags with default values. 24 # system property device_config_reset_performed_prop is used for indicating whether server 26 # cause bad server configurable flags synced back to device.
|
/system/core/adb/client/pairing/tests/ |
D | pairing_connection_test.cpp | 139 auto server = PairingServer::create({}, {}, {}, {}, -1); in TEST_F() local 140 EXPECT_EQ(nullptr, server); in TEST_F() 142 server = PairingServer::create({}, server_info_, {0x01}, {0x01}, -1); in TEST_F() 143 EXPECT_EQ(nullptr, server); in TEST_F() 145 server = PairingServer::create({0x01}, {}, {0x01}, {0x01}, -1); in TEST_F() 146 EXPECT_EQ(nullptr, server); in TEST_F() 148 server = PairingServer::create({0x01}, server_info_, {}, {0x01}, -1); in TEST_F() 149 EXPECT_EQ(nullptr, server); in TEST_F() 151 server = PairingServer::create({0x01}, server_info_, {0x01}, {}, -1); in TEST_F() 152 EXPECT_EQ(nullptr, server); in TEST_F() [all …]
|
/system/connectivity/wificond/aidl/android/net/wifi/ |
D | IWifiScannerImpl.aidl | 21 import com.android.server.wifi.wificond.NativeScanResult; 22 import com.android.server.wifi.wificond.PnoSettings; 23 import com.android.server.wifi.wificond.SingleScanSettings;
|
/system/sepolicy/public/ |
D | hal_light.te | 1 # HwBinder IPC from client to server, and callbacks 7 # server adds itself via service_manager 11 # client finds and uses server via service_manager
|
D | hal_codec2.te | 12 # Allow server access to composer sync fences 15 # Allow both server and client access to ion 18 # Allow server access to camera HAL's fences
|
/system/libhidl/transport/manager/1.2/ |
D | IServiceManager.hal | 25 * Adds a callback that must be called when the specified server has no clients. 32 * @param server non-null service waiting to have no clients (previously registered) 37 * - the server or cb parameters are null 38 * - this is called by a process other than the server process 42 interface server, 49 * If server is null, then this must remove the cb from all matching services. 51 * @param server service registered with registerClientCallback 54 * true if the server(s) have been removed 55 * false if cb is null or if the client callback or server could not be found 57 unregisterClientCallback(interface server, IClientCallback cb) generates (bool success); [all …]
|