Home
last modified time | relevance | path

Searched refs:accept (Results 1 – 25 of 50) sorted by relevance

12

/system/extras/perf2cfg/
Dpylintrc14 accept-no-param-doc=no
15 accept-no-raise-doc=no
16 accept-no-return-doc=no
17 accept-no-yields-doc=no
/system/core/libcutils/
Dsockets_test.cpp113 cutils_socket_t handler = accept(server, nullptr, nullptr); in TEST()
135 cutils_socket_t handler = accept(server, nullptr, nullptr); in TEST()
/system/linkerconfig/testdata/
DREADME.md3 Simply running `./rundiff.sh` works. When the changes are found, you can accept the changes by runn…
/system/netd/tests/
Dsock_diag_test.cpp89 int accepted4 = accept(listensocket, (sockaddr *) &client46, &clientlen); in TEST_F()
90 int accepted6 = accept(listensocket, (sockaddr *) &client6, &clientlen); in TEST_F()
205 serversockets[i] = accept(listensocket, (sockaddr *) &client, &clientlen); in TEST_F()
/system/sepolicy/private/
Dprng_seeder.te15 allow prng_seeder prng_seeder:unix_stream_socket { read write getattr accept };
Dvirtualizationmanager.te62 # Let virtualizationmanager to accept vsock connection from the guest VMs
63 allow virtualizationmanager self:vsock_socket { create_socket_perms_no_ioctl listen accept };
64 neverallow { domain -virtualizationmanager } virtualizationmanager:vsock_socket { accept bind creat…
Dvirtualizationservice.te87 # Let virtualizationservice to accept vsock connection from the guest VMs to singleton services
89 allow virtualizationservice self:vsock_socket { create_socket_perms_no_ioctl listen accept };
90 neverallow { domain -virtualizationservice } virtualizationservice:vsock_socket { accept bind creat…
Daconfigd.te25 allow aconfigd aconfigd_socket:unix_stream_socket { accept listen getattr read write };
Dcompos_fd_server.te22 allow compos_fd_server self:vsock_socket { create_socket_perms_no_ioctl listen accept };
Dcrosvm.te59 # accept: listener socket accepting new connection
61 allow crosvm virtualizationmanager:unix_stream_socket { accept read write getattr getopt };
122 allow crosvm self:tcp_socket { bind create read setopt write accept listen };
Dsnapuserd.te33 allow snapuserd snapuserd_socket:unix_stream_socket { accept listen getattr read write };
/system/sepolicy/microdroid/system/private/
Dprng_seeder.te15 allow prng_seeder prng_seeder:unix_stream_socket { read write getattr accept };
Dadbd.te29 allow adbd self:vsock_socket { create_socket_perms_no_ioctl listen accept };
Dmicrodroid_payload.te33 create listen accept read getattr write setattr lock append bind
/system/server_configurable_flags/aconfigd/tests/
DAconfigdClientSocketTest.java52 mServerLocalSocket = mLocalServer.accept(); in setUp()
/system/nfc/tools/casimir/src/
Dmain.rs314 result = nci_listener.accept() => { in run()
322 result = rf_listener.accept() => { in run()
Dmain-grpc.rs434 result = nci_listener.accept() => { in run()
447 result = rf_listener.accept() => { in run()
/system/extras/tests/tcp_nuke_addr/
Dtcp_nuke_addr_test.cpp105 int acceptedsock = accept(listensock, NULL, 0); in connectLoop()
/system/security/prng_seeder/src/
Dmain.rs96 match listener.accept().await { in listen_loop()
/system/nvram/hal/
Dfake_nvram.cpp162 int client_socket = accept(control_socket_fd, NULL, 0); in ProcessMessages()
/system/sepolicy/microdroid/system/public/
Dglobal_macros50 define(`rw_stream_socket_perms', `{ rw_socket_perms listen accept }')
/system/sepolicy/public/
Dglobal_macros50 define(`rw_stream_socket_perms', `{ rw_socket_perms listen accept }')
/system/chre/host/common/
Dsocket_server.cc122 int clientSocket = accept(mSockFd, NULL, NULL); in acceptClientConnection()
/system/core/fastboot/
Dsocket.cpp245 cutils_socket_t handler = accept(sock_, nullptr, nullptr); in Accept()
/system/core/init/
Ddevices.cpp359 const char* accept = in SanitizePartitionName() local
368 while ((pos = string->find_first_not_of(accept, pos)) != std::string::npos) { in SanitizePartitionName()

12