/aosp_15_r20/external/grpc-grpc/test/cpp/naming/ |
H A D | resolver_test_record_groups.yaml | 1 resolver_tests_common_zone_name: resolver-tests-version-4.grpctestingexp. 4 - expected_addrs: 5 - {address: '5.5.5.5:443', is_balancer: false} 13 record_to_resolve: no-srv-ipv4-single-target 15 no-srv-ipv4-single-target: 16 - {TTL: '2100', data: 5.5.5.5, type: A} 17 - expected_addrs: 18 - {address: '1.2.3.4:1234', is_balancer: true} 26 record_to_resolve: srv-ipv4-single-target 28 _grpclb._tcp.srv-ipv4-single-target: [all …]
|
H A D | resolver_component_tests_runner.py | 8 # http://www.apache.org/licenses/LICENSE-2.0 10 # Unless required by applicable law or agreed to in writing, software 16 # This file is auto-generated 27 argp = argparse.ArgumentParser(description='Run c-ares resolver tests') 28 argp.add_argument('--test_bin_path', default=None, type=str, 29 help='Path to gtest test binary to invoke.') 30 argp.add_argument('--dns_server_bin_path', default=None, type=str, 31 help='Path to local DNS server python script.') 32 argp.add_argument('--records_config_path', default=None, type=str, 33 help=('Path to DNS records yaml file that ' [all …]
|
/aosp_15_r20/external/rust/android-crates-io/crates/grpcio-sys/grpc/third_party/cares/cares/ |
D | CHANGES.0 | 1 Changelog for the c-ares project 8 o avoid using system's inet_net_pton affected by the WLB-2008080064 advisory 9 o replacement ares_inet_net_pton affected by the WLB-2008080064 advisory 11 o added install target to Makefile.msvc 12 o only fall back to AF_INET searches when looking for AF_UNSPEC addresses 15 o IPv6-on-windows: find DNS servers correctly 16 o man pages: docs for the c-ares utility programs 27 o local-bind: Support binding to local interface/IPs, see 33 o add missing break that caused get_ares_servers to fail 36 o Replaced uint32_t with unsigned int to fix broken builds [all …]
|
/aosp_15_r20/external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/config/cluster/v3/ |
H A D | cluster.proto | 3 package envoy.config.cluster.v3; 5 import "envoy/config/cluster/v3/circuit_breaker.proto"; 6 import "envoy/config/cluster/v3/filter.proto"; 7 import "envoy/config/cluster/v3/outlier_detection.proto"; 8 import "envoy/config/core/v3/address.proto"; 9 import "envoy/config/core/v3/base.proto"; 10 import "envoy/config/core/v3/config_source.proto"; 11 import "envoy/config/core/v3/extension.proto"; 12 import "envoy/config/core/v3/health_check.proto"; 13 import "envoy/config/core/v3/protocol.proto"; [all …]
|
/aosp_15_r20/external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/api/v2/ |
H A D | cluster.proto | 30 option go_package = "github.com/envoyproxy/go-control-plane/envoy/api/v2;apiv2"; 31 option (udpa.annotations.file_migrate).move_to_package = "envoy.config.cluster.v3"; 34 // [#protodoc-title: Cluster configuration] 37 // [#next-free-field: 48] 39 // Refer to :ref:`service discovery type <arch_overview_service_discovery_types>` 42 // Refer to the :ref:`static discovery type<arch_overview_service_discovery_types_static>` 46 // Refer to the :ref:`strict DNS discovery 51 // Refer to the :ref:`logical DNS discovery 56 // Refer to the :ref:`service discovery type<arch_overview_service_discovery_types_eds>` 60 // Refer to the :ref:`original destination discovery [all …]
|
/aosp_15_r20/external/dnsmasq/ |
H A D | CHANGELOG.archive | 1 release 0.4 - initial public release 3 release 0.5 - added caching, removed compiler warning on linux PPC 5 release 0.6 - TCP handling: close socket and return to connect state if we 9 Added a patch from Cris Bailiff <c.bailiff@e-secure.com.au> 10 to set SO_REUSEADDR on the tcp socket which stops problems when 25 Patch to clear cache on SIGHUP 28 Fix bad bug resulting from not initialising value-result 29 address-length parameter to recvfrom() and accept() - it 32 release 0.95 Major rewrite: remove calls to gethostbyname() and talk 33 directly to the upstream server(s) instead. [all …]
|
/aosp_15_r20/packages/modules/DnsResolver/tests/ |
D | resolv_integration_test.cpp | 8 * http://www.apache.org/licenses/LICENSE-2.0 10 * Unless required by applicable law or agreed to in writing, software 20 #include <android-base/logging.h> 21 #include <android-base/parseint.h> 22 #include <android-base/result.h> 23 #include <android-base/unique_fd.h> 29 #include <gmock/gmock-matchers.h> 79 // This mainline module test still needs to be able to run on pre-S devices, 80 // and thus may run across pre-4.9 non-eBPF capable devices like the Pixel 2. 95 // Semi-public Bionic hook used by the NDK (frameworks/base/native/android/net.c) [all …]
|
/aosp_15_r20/external/autotest/client/common_lib/ |
H A D | utils.py | 3 # Use of this source code is governed by a BSD-style license that can be 9 There's no really good way to do this, as this isn't a class we can do 13 # pylint: disable=missing-docstring 69 # pylint: disable=wildcard-import 74 """This is a decorator which can be used to mark functions as deprecated. 77 warnings.warn("Call to deprecated function %s." % func.__name__, 110 '_-+=>|') 114 """Custom handler to log at the WARNING error level. Ignores |file|.""" 146 This constructor creates a new BgJob, and uses Popen to start a new 150 After starting a new BgJob, use output_prepare to connect the process's [all …]
|
/aosp_15_r20/external/grpc-grpc-java/xds/third_party/envoy/src/main/proto/envoy/config/route/v3/ |
H A D | route_components.proto | 3 package envoy.config.route.v3; 5 import "envoy/config/core/v3/base.proto"; 6 import "envoy/config/core/v3/extension.proto"; 7 import "envoy/config/core/v3/proxy_protocol.proto"; 29 option java_package = "io.envoyproxy.envoy.config.route.v3"; 32 option go_package = "github.com/envoyproxy/go-control-plane/envoy/config/route/v3;routev3"; 35 // [#protodoc-title: HTTP route components] 40 // a logical name as well as a set of domains that get routed to it based on the incoming request's 41 // host header. This allows a single listener to service multiple top level domain path trees. Once 42 // a virtual host is selected based on the domain, the routes are processed in order to see which [all …]
|
/aosp_15_r20/external/mbedtls/ |
H A D | ChangeLog | 3 = Mbed TLS 3.5.2 branch released 2024-01-26 7 could be sufficient for an attacker to recover the plaintext. A local 8 attacker or a remote attacker who is close to the victim on the network 9 might have precise enough timing measurements to exploit this. It requires 10 the attacker to send a large number of messages for decryption. For 13 * Fix a failure to validate input when writing x509 extensions lengths which 14 could result in an integer overflow, causing a zero-length buffer to be 15 allocated to hold the extension. The extension would then be copied into 16 the buffer, causing a heap buffer overflow. 18 = Mbed TLS 3.5.1 branch released 2023-11-06 [all …]
|
/aosp_15_r20/frameworks/base/telephony/java/android/telephony/ |
H A D | CarrierConfigManager.java | 8 * http://www.apache.org/licenses/LICENSE-2.0 10 * Unless required by applicable law or agreed to in writing, software 67 * Provides access to telephony configuration values that are carrier-specific. 75 * Extra included in {@link #ACTION_CARRIER_CONFIG_CHANGED} to indicate the slot index that the 82 * the device is unlocked. Direct-Boot-aware applications may use the first broadcast as an 83 * early signal that the carrier config has been loaded, but other applications will only 86 * This extra is included in {@link #ACTION_CARRIER_CONFIG_CHANGED} to indicate whether this is 93 * Optional extra included in {@link #ACTION_CARRIER_CONFIG_CHANGED} to indicate the 136 * Indicates CARRIER_NR_AVAILABILITY_NSA determine that the carrier enable the non-standalone 157 * This intent is broadcast by the system when carrier config changes. An int is specified in [all …]
|
/aosp_15_r20/external/openthread/third_party/mbedtls/repo/ |
H A D | ChangeLog | 3 = Mbed TLS 3.6.0 branch released 2024-03-28 12 The undocumented ability to import other formats (PKCS#8, SubjectPublicKey, 21 * Rename the MBEDTLS_SHA256_USE_A64_CRYPTO_xxx config options to 31 * In the PSA API, the experimental way to encode the public exponent of 34 * Temporary function mbedtls_pk_wrap_as_opaque() is removed. To mimic the 36 mbedtls_pk_import_into_psa() can be used to import a PK key into PSA, 37 while mbedtls_pk_setup_opaque() can be used to wrap a PSA key into a opaque 41 * Added an example program showing how to hash with the PSA API. 42 * Support Armv8-A Crypto Extension acceleration for SHA-256 43 when compiling for Thumb (T32) or 32-bit Arm (A32). [all …]
|
/aosp_15_r20/external/cronet/net/log/ |
H A D | net_log_event_type_list.h | 2 // Use of this source code is governed by a BSD-style license that can be 5 // NOTE: No header guards are used, since this file is intended to be expanded 9 // no-include-guard-because-multiply-included 16 // For best practices on how to add new NetLog events see: 17 // https://chromium.googlesource.com/chromium/src/+/HEAD/net/docs/net-log.md 19 // -------------------------------------------------------------------------- 20 // General pseudo-events 21 // -------------------------------------------------------------------------- 39 // ------------------------------------------------------------------------ 41 // ------------------------------------------------------------------------ [all …]
|
/aosp_15_r20/external/strace/ |
H A D | ChangeLog | 1 2018-10-30 Dmitry V. Levin <[email protected]> 10 2018-10-25 Dmitry V. Levin <[email protected]> 14 2018-10-25 Elvira Khabirova <[email protected]> 28 Co-Authored-by: Dmitry V. Levin <[email protected]> 30 2018-10-25 Dmitry V. Levin <[email protected]> 33 Linux commit v4.19-rc2-5-g2ecefa0a15fd0ef88b9cd5d15ceb813008136431 40 2018-10-24 Dmitry V. Levin <[email protected]> 44 introduced by Linux commit v4.19-rc7~24^2~1. 45 (ARM_FIRST_SHUFFLED_SYSCALL, SYS_socket_subcall): Raise from 400 to 500, 46 to make room for new syscalls. [all …]
|
/aosp_15_r20/hardware/qcom/wlan/wcn6740/qcwcn/wifi_hal/ |
D | qca-vendor_copy.h | 3 * Copyright (c) 2014-2017, Qualcomm Atheros, Inc. 4 * Copyright (c) 2018-2020, The Linux Foundation. All rights reserved. 11 * modification, are permitted (subject to the limitations in the 23 * contributors may be used to endorse or promote products derived 26 * NO EXPRESS OR IMPLIED LICENSES TO ANY PARTY'S PATENT RIGHTS ARE 29 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF 33 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE 47 * can be assigned through normal review process for changes to the upstream 58 * enum qca_radiotap_vendor_ids - QCA radiotap vendor namespace IDs 65 * enum qca_nl80211_vendor_subcmds - QCA nl80211 vendor command identifiers [all …]
|
/aosp_15_r20/external/wpa_supplicant_8/src/common/ |
H A D | qca-vendor.h | 3 * Copyright (c) 2014-2017, Qualcomm Atheros, Inc. 4 * Copyright (c) 2018-2020, The Linux Foundation 5 * Copyright (c) 2021-2023, Qualcomm Innovation Center, Inc. 17 * can be assigned through normal review process for changes to the upstream 28 * enum qca_radiotap_vendor_ids - QCA radiotap vendor namespace IDs 37 * QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION to configure the number of 41 * Global NSS configuration - Applies to all bands (2.4 GHz and 5/6 GHz) 42 * The following attributes are used to dynamically configure the number of 43 * spatial streams to be used for transmitting or receiving the data in the 47 * NSS value is notified to the peer using operating mode notification/spatial [all …]
|
/aosp_15_r20/external/wpa_supplicant_8/wpa_supplicant/wpa_client_include/libwpa_client/ |
H A D | qca-vendor.h | 3 * Copyright (c) 2014-2017, Qualcomm Atheros, Inc. 4 * Copyright (c) 2018-2020, The Linux Foundation 5 * Copyright (c) 2021-2023, Qualcomm Innovation Center, Inc. 17 * can be assigned through normal review process for changes to the upstream 28 * enum qca_radiotap_vendor_ids - QCA radiotap vendor namespace IDs 37 * QCA_NL80211_VENDOR_SUBCMD_SET_WIFI_CONFIGURATION to configure the number of 41 * Global NSS configuration - Applies to all bands (2.4 GHz and 5/6 GHz) 42 * The following attributes are used to dynamically configure the number of 43 * spatial streams to be used for transmitting or receiving the data in the 47 * NSS value is notified to the peer using operating mode notification/spatial [all …]
|
/aosp_15_r20/external/mdnsresponder/mDNSWindows/ |
H A D | mDNSWin32.c | 1 /* -*- Mode: C; tab-width: 4 -*- 3 * Copyright (c) 2002-2004 Apple Computer, Inc. All rights reserved. 9 * http://www.apache.org/licenses/LICENSE-2.0 11 * Unless required by applicable law or agreed to in writing, software 17 To Do: 19 - Get unicode name of machine for nice name instead of just the host name. 20 …- Use the IPv6 Internet Connection Firewall API to allow IPv6 mDNS without manually changing the f… 21 - Get DNS server address(es) from Windows and provide them to the uDNS layer. 22 - Implement TCP support for truncated packets (only stubs now). 264 #pragma mark - [all …]
|
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/product_sepolicy.conf/android_common/shiba/ |
D | product_sepolicy.conf | 40 # file-related classes 52 # network-related classes 65 # sysv-ipc-related classes 104 # kernel services that need to override task security, e.g. cachefiles 125 # Capability checks when on a non-init user namespace 130 # These two were previously mapped to rawip_socket. 133 # These were previously mapped to socket. 201 # Permissions for VMs to access SMC services 298 # socket-specific 335 # Care should be taken to ensure that these are consistent with [all …]
|
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/system_ext_sepolicy.conf/android_common/shiba/ |
D | system_ext_sepolicy.conf | 40 # file-related classes 52 # network-related classes 65 # sysv-ipc-related classes 104 # kernel services that need to override task security, e.g. cachefiles 125 # Capability checks when on a non-init user namespace 130 # These two were previously mapped to rawip_socket. 133 # These were previously mapped to socket. 201 # Permissions for VMs to access SMC services 298 # socket-specific 335 # Care should be taken to ensure that these are consistent with [all …]
|
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/plat_sepolicy.conf/android_common/ |
D | plat_sepolicy.conf | 40 # file-related classes 52 # network-related classes 65 # sysv-ipc-related classes 104 # kernel services that need to override task security, e.g. cachefiles 125 # Capability checks when on a non-init user namespace 130 # These two were previously mapped to rawip_socket. 133 # These were previously mapped to socket. 201 # Permissions for VMs to access SMC services 298 # socket-specific 335 # Care should be taken to ensure that these are consistent with [all …]
|
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/userdebug_plat_sepolicy.conf/android_common/ |
D | userdebug_plat_sepolicy.conf | 40 # file-related classes 52 # network-related classes 65 # sysv-ipc-related classes 104 # kernel services that need to override task security, e.g. cachefiles 125 # Capability checks when on a non-init user namespace 130 # These two were previously mapped to rawip_socket. 133 # These were previously mapped to socket. 201 # Permissions for VMs to access SMC services 298 # socket-specific 335 # Care should be taken to ensure that these are consistent with [all …]
|
/aosp_15_r20/frameworks/proto_logging/stats/ |
H A D | atoms.proto | 8 * http://www.apache.org/licenses/LICENSE-2.0 10 * Unless required by applicable law or agreed to in writing, software 124 * The stats-log-api-gen tool runs as part of the Android build and 126 * and methods that Android uses to log. 261 // as at other transitions - coming out of doze, device plugged in, etc. 633 // 360-363 are reserved. 1330 // StatsdStats tracks platform atoms with ids up to 900. 1578 // 10208 is reserved due to removing the old atom. 1598 // 10228 is reserved due to removing the old atom 1604 // Field numbers 100,000 - 199,999 are reserved for non-AOSP (e.g. OEMs) to use. [all …]
|
/aosp_15_r20/system/sepolicy/prebuilts/api/202404/ |
H A D | 202404_general_sepolicy.conf | 16 # file-related classes 28 # network-related classes 41 # sysv-ipc-related classes 80 # kernel services that need to override task security, e.g. cachefiles 101 # Capability checks when on a non-init user namespace 106 # These two were previously mapped to rawip_socket. 109 # These were previously mapped to socket. 269 # socket-specific 306 # Care should be taken to ensure that these are consistent with 361 # Define the access vector interpretation for file-related objects. [all …]
|
/aosp_15_r20/out/soong/.intermediates/system/sepolicy/sepolicy_neverallows.sepolicy_analyze.conf/android_common/ |
D | sepolicy_neverallows.sepolicy_analyze.conf | 40 # file-related classes 52 # network-related classes 65 # sysv-ipc-related classes 104 # kernel services that need to override task security, e.g. cachefiles 125 # Capability checks when on a non-init user namespace 130 # These two were previously mapped to rawip_socket. 133 # These were previously mapped to socket. 201 # Permissions for VMs to access SMC services 298 # socket-specific 335 # Care should be taken to ensure that these are consistent with [all …]
|