Home
last modified time | relevance | path

Searched refs:services (Results 1 – 25 of 268) sorted by relevance

1234567891011

/system/bt/bta/gatt/
Ddatabase_builder.cc33 if (database.services.empty() || in AddService()
34 database.services.back().end_handle < handle) { in AddService()
35 database.services.emplace_back(Service{ in AddService()
42 auto& vec = database.services; in AddService()
64 Service* service = FindService(database.services, handle); in AddIncludedService()
72 if (!FindService(database.services, start_handle)) { in AddIncludedService()
86 Service* service = FindService(database.services, handle); in AddCharacteristic()
107 Service* service = FindService(database.services, handle); in AddDescriptor()
151 Service* service = FindService(database.services, pending_service.first); in NextDescriptorRangeToExplore()
183 bool DatabaseBuilder::InProgress() const { return !database.services.empty(); } in InProgress()
Ddatabase.cc43 Service* FindService(std::list<Service>& services, uint16_t handle) { in FindService() argument
44 for (Service& service : services) { in FindService()
55 for (const Service& service : services) { in ToString()
85 if (services.empty()) return std::vector<StoredAttribute>(); in Serialize()
87 for (const Service& service : services) { in Serialize()
95 for (const Service& service : services) { in Serialize()
130 result.services.emplace_back(Service{ in Deserialize()
138 auto current_service_it = result.services.begin(); in Deserialize()
144 while (current_service_it != result.services.end() && in Deserialize()
149 if (current_service_it == result.services.end() || in Deserialize()
[all …]
Ddatabase.h101 bool IsEmpty() const { return services.empty(); } in IsEmpty()
105 void Clear() { std::list<Service>().swap(services); } in Clear()
108 const std::list<Service>& Services() const { return services; } in Services()
120 std::list<Service> services;
125 Service* FindService(std::list<Service>& services, uint16_t handle);
/system/core/toolbox/
Dstart.cpp39 std::vector<std::string> services = { in ControlDefaultServices() local
49 services.emplace_back("zygote_secondary"); in ControlDefaultServices()
53 for (const auto& service : services) { in ControlDefaultServices()
57 for (auto it = services.crbegin(); it != services.crend(); ++it) { in ControlDefaultServices()
/system/bt/bta/ag/
Dbta_ag_rfc.cc245 void bta_ag_start_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_start_servers() argument
246 services >>= BTA_HSP_SERVICE_ID; in bta_ag_start_servers()
247 for (int i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_start_servers()
249 if (services & 1) { in bta_ag_start_servers()
255 << "invalid callback index, services=" << loghex(services) in bta_ag_start_servers()
260 << "callback index out of bound, services=" << loghex(services) in bta_ag_start_servers()
271 << ", p_scb=" << p_scb << ", services=" << loghex(services) in bta_ag_start_servers()
275 __func__, p_scb, services, management_callback_index); in bta_ag_start_servers()
290 void bta_ag_close_servers(tBTA_AG_SCB* p_scb, tBTA_SERVICE_MASK services) { in bta_ag_close_servers() argument
291 services >>= BTA_HSP_SERVICE_ID; in bta_ag_close_servers()
[all …]
Dbta_ag_sdp.cc216 tBTA_SERVICE_MASK services; in bta_ag_create_records() local
218 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_create_records()
219 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; i++, services >>= 1) { in bta_ag_create_records()
221 if (services & 1) { in bta_ag_create_records()
247 tBTA_SERVICE_MASK services; in bta_ag_del_records() local
263 services = p_scb->reg_services >> BTA_HSP_SERVICE_ID; in bta_ag_del_records()
264 for (i = 0; i < BTA_AG_NUM_IDX && services != 0; in bta_ag_del_records()
265 i++, services >>= 1, others >>= 1) { in bta_ag_del_records()
268 if (((services & 1) == 1) && ((others & 1) == 0)) { in bta_ag_del_records()
/system/core/adb/client/
Dtransport_mdns.cpp258 ServiceRegistry* services = nullptr; in AddToServiceRegistry() local
261 services = sAdbTransportServices; in AddToServiceRegistry()
264 services = sAdbSecurePairingServices; in AddToServiceRegistry()
267 services = sAdbSecureConnectServices; in AddToServiceRegistry()
274 services->push_back(std::unique_ptr<ResolvedService>(this)); in AddToServiceRegistry()
320 static void forEachService(const ServiceRegistry& services, std::string_view hostname,
323 static bool connectByServiceName(const ServiceRegistry& services,
364 void ResolvedService::forEachService(const ServiceRegistry& services, in forEachService() argument
369 for (const auto& service : services) { in forEachService()
384 bool ResolvedService::connectByServiceName(const ServiceRegistry& services, in connectByServiceName() argument
[all …]
/system/update_engine/init/
Dupdate-engine.conf23 start on starting system-services
24 stop on stopping system-services
/system/sepolicy/prebuilts/api/26.0/public/
Dattributes70 # services which should be available to all but isolated apps
73 # services which should be available to all ephemeral apps
76 # services which export only system_api
79 # All types used for services managed by servicemanager.
84 # All types used for services managed by hwservicemanager
87 # All HwBinder services guaranteed to be passthrough. These services always run
92 # All HwBinder services guaranteed to be offered only by core domain components
95 # All types used for services managed by vndservicemanager
156 # PDX services
283 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/private/
Datrace.te7 # boottrace services uses /data/misc/boottrace/categories
27 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/30.0/private/
Datrace.te7 # boottrace services uses /data/misc/boottrace/categories
27 # Allow discovery of binder services.
44 # Allow notifying the processes hosting specific binder services that
62 # Remove logspam from notification attempts to non-allowlisted services.
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/public/
Dattributes127 # services which should be available to all but isolated apps
130 # services which should be available to all ephemeral apps
133 # services which export only system_api
136 # services which served by vendor and also using the copy of libbinder on
137 # system (for instance via libbinder_ndk). services using a different copy
142 # All types used for services managed by servicemanager.
147 # All types used for services managed by hwservicemanager
150 # All HwBinder services guaranteed to be passthrough. These services always run
155 # All HwBinder services guaranteed to be offered only by core domain components
158 # All HwBinder services that untrusted apps can't directly access
[all …]
/system/sepolicy/prebuilts/api/30.0/public/
Dattributes127 # services which should be available to all but isolated apps
130 # services which should be available to all ephemeral apps
133 # services which export only system_api
136 # services which served by vendor and also using the copy of libbinder on
137 # system (for instance via libbinder_ndk). services using a different copy
142 # All types used for services managed by servicemanager.
147 # All types used for services managed by hwservicemanager
150 # All HwBinder services guaranteed to be passthrough. These services always run
155 # All HwBinder services guaranteed to be offered only by core domain components
158 # All HwBinder services that untrusted apps can't directly access
[all …]
/system/bt/bta/dm/
Dbta_dm_api.cc127 void BTA_DmSearch(tBTA_DM_INQ* p_dm_inq, tBTA_SERVICE_MASK services, in BTA_DmSearch() argument
134 p_msg->services = services; in BTA_DmSearch()
169 void BTA_DmDiscover(const RawAddress& bd_addr, tBTA_SERVICE_MASK services, in BTA_DmDiscover() argument
176 p_msg->services = services; in BTA_DmDiscover()
201 p_msg->services = BTA_USER_SERVICE_MASK; // Not exposed at API level in BTA_DmDiscoverUUID()
574 p_msg->services = p_services->srvc_mask; in bta_dm_discover_send_msg()
/system/sepolicy/prebuilts/api/28.0/public/
Dattributes81 # services which should be available to all but isolated apps
84 # services which should be available to all ephemeral apps
87 # services which export only system_api
90 # All types used for services managed by servicemanager.
95 # All types used for services managed by hwservicemanager
98 # All HwBinder services guaranteed to be passthrough. These services always run
103 # All HwBinder services guaranteed to be offered only by core domain components
106 # All types used for services managed by vndservicemanager
201 # PDX services
303 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/prebuilts/api/29.0/public/
Dattributes92 # services which should be available to all but isolated apps
95 # services which should be available to all ephemeral apps
98 # services which export only system_api
101 # All types used for services managed by servicemanager.
106 # All types used for services managed by hwservicemanager
109 # All HwBinder services guaranteed to be passthrough. These services always run
114 # All HwBinder services guaranteed to be offered only by core domain components
117 # All types used for services managed by vndservicemanager
217 # PDX services
300 # HwBinder services offered across the core-vendor boundary
/system/sepolicy/prebuilts/api/27.0/private/
Dapp_neverallows.te24 # Do not allow untrusted apps to register services.
26 # services.
124 # other than find actions for services listed below
127 # Do not permit access from apps which host arbitrary code to HwBinder services,
132 # HwBinder services either operate at a level below that of apps (e.g., HALs)
136 # 2. HAL servers (a subset of HwBinder services) contain code with higher
141 # Safe services include:
142 # - same process services: because they by definition run in the process
164 # Make sure that the following services are never accessible by untrusted_apps
203 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/26.0/private/
Dapp_neverallows.te19 # Do not allow untrusted apps to register services.
21 # services.
119 # other than find actions for services listed below
122 # Do not permit access from apps which host arbitrary code to HwBinder services,
127 # HwBinder services either operate at a level below that of apps (e.g., HALs)
131 # 2. HAL servers (a subset of HwBinder services) contain code with higher
136 # Safe services include:
137 # - same process services: because they by definition run in the process
158 # Make sure that the following services are never accessible by untrusted_apps
193 # HwBinder services offered by core components (as opposed to vendor components)
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/libhwbinder/vts/performance/
DBenchmark_throughput.cpp312 int services = -1; in main() local
338 services = atoi(argv[i + 1]); in main()
344 if (services == -1) { in main()
345 services = workers; in main()
350 for (int i = 0; i < services; i++) { in main()
362 worker_pipes.push_back(make_worker(i, iterations, services, get_stub)); in main()
396 for (int i = 0; i < services; i++) { in main()
/system/sepolicy/prebuilts/api/29.0/private/
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks
/system/sepolicy/prebuilts/api/28.0/private/
Dbinderservicedomain.te3 # Allow dumpstate and incidentd to collect information from binder services
17 # allow all services to run permission checks

1234567891011