/aosp12/frameworks/base/services/core/java/com/android/server/pm/ |
H A D | IntentFilterVerificationKey.java | 26 public String domains; field in IntentFilterVerificationKey 30 public IntentFilterVerificationKey(String[] domains, String packageName, String className) { in IntentFilterVerificationKey() argument 32 for (String host : domains) { in IntentFilterVerificationKey() 35 this.domains = sb.toString(); in IntentFilterVerificationKey() 47 if (domains != null ? !domains.equals(that.domains) : that.domains != null) return false; in equals() 58 int result = domains != null ? domains.hashCode() : 0; in hashCode()
|
/aosp12/packages/modules/Connectivity/framework/src/android/net/ |
H A D | StaticIpConfiguration.java | 70 public String domains; field in StaticIpConfiguration 83 domains = source.domains; in StaticIpConfiguration() 91 domains = null; in clear() 120 return domains; in getDomains() 184 config.domains = mDomains; in build() 238 lp.setDomains(domains); in toLinkProperties() 259 if (domains != null) str.append(domains); in toString() 268 result = 47 * result + (domains == null ? 0 : domains.hashCode()); in hashCode() 285 Objects.equals(domains, other.domains); in equals() 315 dest.writeString(domains); in writeToParcel() [all …]
|
/aosp12/frameworks/base/services/tests/PackageManagerServiceTests/unit/src/com/android/server/pm/test/verify/domain/ |
H A D | DomainVerificationJavaUtil.java | 41 @Nullable UUID domainSetId, @Nullable Set<String> domains, int state) in setStatusForceNullable() argument 43 return service.setDomainVerificationStatus(domainSetId, domains, state); in setStatusForceNullable() 47 @Nullable UUID domainSetId, @Nullable Set<String> domains, boolean enabled, in setUserSelectionForceNullable() argument 50 return service.setDomainVerificationUserSelection(domainSetId, domains, enabled, userId); in setUserSelectionForceNullable() 54 @Nullable UUID domainSetId, @Nullable Set<String> domains, int state) in setStatusForceNullable() argument 56 return manager.setDomainVerificationStatus(domainSetId, domains, state); in setStatusForceNullable() 60 @Nullable UUID domainSetId, @Nullable Set<String> domains, boolean enabled) in setUserSelectionForceNullable() argument 62 return manager.setDomainVerificationUserSelection(domainSetId, domains, enabled); in setUserSelectionForceNullable()
|
H A D | DomainVerificationServiceUtil.kt | 23 fun DomainVerificationService.setStatus(domainSetId: UUID, domains: Set<String>, state: Int) = 24 setDomainVerificationStatus(domainSetId, domains.toMutableSet(), state) 28 domains: Set<String>, 31 ) = setDomainVerificationUserSelection(domainSetId, domains.toMutableSet(), enabled, userId)
|
/aosp12/packages/apps/Car/Settings/tests/unit/src/com/android/car/settings/applications/managedomainurls/ |
H A D | DomainUrlsUtilsTest.java | 86 ArraySet<String> domains = new ArraySet<>(); in getDomainsSummary_domainStatusSet_oneDomain_showSingleDomain() local 87 domains.add("test.domain.com"); in getDomainsSummary_domainStatusSet_oneDomain_showSingleDomain() 90 domains)).isEqualTo( in getDomainsSummary_domainStatusSet_oneDomain_showSingleDomain() 91 mContext.getString(R.string.domain_urls_summary_one, domains.valueAt(0))); in getDomainsSummary_domainStatusSet_oneDomain_showSingleDomain() 99 ArraySet<String> domains = new ArraySet<>(); in getDomainsSummary_domainStatusSet_multipleDomain_showMultipleDomains() local 100 domains.add("test.domain.com"); in getDomainsSummary_domainStatusSet_multipleDomain_showMultipleDomains() 101 domains.add("test.domain2.com"); in getDomainsSummary_domainStatusSet_multipleDomain_showMultipleDomains() 104 domains)).isEqualTo( in getDomainsSummary_domainStatusSet_multipleDomain_showMultipleDomains() 105 mContext.getString(R.string.domain_urls_summary_some, domains.valueAt(0))); in getDomainsSummary_domainStatusSet_multipleDomain_showMultipleDomains() 111 ArraySet<String> domains = new ArraySet<>(); in getHandledDomains_includeIntentFilterVerificationInfoDomains() local [all …]
|
/aosp12/frameworks/base/services/core/java/com/android/server/pm/verify/domain/ |
H A D | DomainVerificationShell.java | 196 if (domains.isEmpty()) { in runSetAppLinks() 201 if (domains.size() == 1 && domains.contains("all")) { in runSetAppLinks() 202 domains = null; in runSetAppLinks() 207 domains); in runSetAppLinks() 263 if (domains.isEmpty()) { in runSetAppLinksUserState() 268 if (domains.size() == 1 && domains.contains("all")) { in runSetAppLinksUserState() 269 domains = null; in runSetAppLinksUserState() 274 domains); in runSetAppLinksUserState() 456 ArrayList<String> domains = getRemainingArgs(commandHandler); in runGetAppLinkOwners() local 457 if (domains.isEmpty() && TextUtils.isEmpty(packageName)) { in runGetAppLinkOwners() [all …]
|
/aosp12/system/sepolicy/prebuilts/api/29.0/public/ |
H A D | attributes | 86 # These properties are not accessible from device-specific domains 121 # All domains that can override MLS restrictions. 129 # All domains used for apps. 135 # All domains used for apps with network access. 138 # All domains used for apps with bluetooth access. 141 # All domains used for binder service domains. 144 # update_engine related domains that need to apply an update and run 149 # All core domains (as opposed to vendor/device-specific domains) 167 # All vendor domains which violate the requirement of not executing 174 # between between vendor and core domains. [all …]
|
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition 10 # to vendor toolbox except for the allowlisted domains.
|
/aosp12/system/sepolicy/prebuilts/api/28.0/public/ |
H A D | attributes | 75 # These properties are not accessible from device-specific domains 110 # All domains that can override MLS restrictions. 118 # All domains used for apps. 124 # All domains used for apps with network access. 127 # All domains used for apps with bluetooth access. 130 # All domains used for binder service domains. 133 # update_engine related domains that need to apply an update and run 138 # All core domains (as opposed to vendor/device-specific domains) 156 # All vendor domains which violate the requirement of not executing 163 # between between vendor and core domains. [all …]
|
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition 10 # to vendor toolbox except for the allowlisted domains.
|
/aosp12/packages/modules/DnsResolver/tests/dns_responder/ |
H A D | dns_responder_client_ndk.cpp | 37 void DnsResponderClient::SetupMappings(unsigned numHosts, const std::vector<std::string>& domains, in SetupMappings() argument 39 mappings->resize(numHosts * domains.size()); in SetupMappings() 42 for (const auto& domain : domains) { in SetupMappings() 56 const std::vector<std::string>& domains, const std::string& tlsHostname, in makeResolverParamsParcel() argument 76 paramsParcel.domains = domains; in makeResolverParamsParcel() 93 std::vector<std::string>* domains, in GetResolverInfo() argument 101 auto rv = dnsResolverService->getResolverInfo(netId, servers, domains, tlsServers, ¶ms32, in GetResolverInfo() 124 const std::vector<std::string>& domains, in SetResolversForNetwork() argument 127 makeResolverParamsParcel(TEST_NETID, params, servers, domains, "", {}, ""); in SetResolversForNetwork() 133 const std::vector<std::string>& domains, in SetResolversWithTls() argument [all …]
|
/aosp12/system/sepolicy/prebuilts/api/30.0/public/ |
H A D | attributes | 86 # These properties are not accessible from device-specific domains 165 # All domains that can override MLS restrictions. 173 # All domains used for apps. 179 # All domains used for apps with network access. 182 # All domains used for apps with bluetooth access. 185 # All domains used for binder service domains. 188 # update_engine related domains that need to apply an update and run 193 # All core domains (as opposed to vendor/device-specific domains) 211 # All vendor domains which violate the requirement of not executing 218 # between between vendor and core domains. [all …]
|
/aosp12/packages/modules/Wifi/service/java/com/android/server/wifi/hotspot2/anqp/ |
H A D | DomainNameElement.java | 44 public DomainNameElement(List<String> domains) { in DomainNameElement() argument 46 mDomains = domains; in DomainNameElement() 57 List<String> domains = new ArrayList<>(); in parse() local 60 domains.add(ByteBufferReader.readStringWithByteLength( in parse() 63 return new DomainNameElement(domains); in parse()
|
/aosp12/system/sepolicy/prebuilts/api/31.0/public/ |
H A D | attributes | 100 # These properties are not accessible from device-specific domains 193 # All domains that can override MLS restrictions. 201 # All domains used for apps. 207 # All domains used for apps with network access. 210 # All domains used for apps with bluetooth access. 213 # All domains used for binder service domains. 216 # update_engine related domains that need to apply an update and run 221 # All core domains (as opposed to vendor/device-specific domains) 237 # All vendor domains which violate the requirement of not executing 244 # between between vendor and core domains. [all …]
|
/aosp12/system/sepolicy/prebuilts/api/32.0/public/ |
H A D | attributes | 100 # These properties are not accessible from device-specific domains 193 # All domains that can override MLS restrictions. 201 # All domains used for apps. 207 # All domains used for apps with network access. 210 # All domains used for apps with bluetooth access. 213 # All domains used for binder service domains. 216 # update_engine related domains that need to apply an update and run 221 # All core domains (as opposed to vendor/device-specific domains) 237 # All vendor domains which violate the requirement of not executing 244 # between between vendor and core domains. [all …]
|
/aosp12/system/sepolicy/public/ |
H A D | attributes | 100 # These properties are not accessible from device-specific domains 193 # All domains that can override MLS restrictions. 201 # All domains used for apps. 207 # All domains used for apps with network access. 210 # All domains used for apps with bluetooth access. 213 # All domains used for binder service domains. 216 # update_engine related domains that need to apply an update and run 221 # All core domains (as opposed to vendor/device-specific domains) 237 # All vendor domains which violate the requirement of not executing 244 # between between vendor and core domains. [all …]
|
/aosp12/frameworks/base/core/java/android/content/pm/verify/domain/ |
H A D | DomainVerificationManager.java | 221 public int setDomainVerificationStatus(@NonNull UUID domainSetId, @NonNull Set<String> domains, in setDomainVerificationStatus() argument 223 validateInput(domainSetId, domains); in setDomainVerificationStatus() 227 new DomainSet(domains), state); in setDomainVerificationStatus() 304 @NonNull Set<String> domains, boolean enabled) throws NameNotFoundException { in setDomainVerificationUserSelection() argument 305 validateInput(domainSetId, domains); in setDomainVerificationUserSelection() 309 domainSetId.toString(), new DomainSet(domains), enabled, mContext.getUserId()); in setDomainVerificationUserSelection() 395 private void validateInput(@Nullable UUID domainSetId, @Nullable Set<String> domains) { in validateInput() argument 398 } else if (CollectionUtils.isEmpty(domains)) { in validateInput()
|
/aosp12/packages/apps/Car/Settings/src/com/android/car/settings/applications/managedomainurls/ |
H A D | DomainUrlsUtils.java | 37 ArraySet<String> domains) { in getDomainsSummary() argument 47 if (domains.isEmpty()) { in getDomainsSummary() 49 } else if (domains.size() == 1) { in getDomainsSummary() 50 return context.getString(R.string.domain_urls_summary_one, domains.valueAt(0)); in getDomainsSummary() 52 return context.getString(R.string.domain_urls_summary_some, domains.valueAt(0)); in getDomainsSummary()
|
/aosp12/system/sepolicy/prebuilts/api/26.0/public/ |
H A D | attributes | 99 # All domains that can override MLS restrictions. 107 # All domains used for apps. 113 # All domains used for apps with network access. 116 # All domains used for apps with bluetooth access. 119 # All domains used for binder service domains. 122 # update_engine related domains that need to apply an update and run 127 # All core domains (as opposed to vendor/device-specific domains) 133 # All vendor domains which violate the requirement of not using Binder 137 # All vendor domains which violate the requirement of not using sockets for 142 # All vendor domains which violate the requirement of not executing [all …]
|
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition 10 # to vendor toolbox except for the allowlisted domains.
|
/aosp12/frameworks/base/core/java/android/net/ |
H A D | DhcpResults.java | 54 public String domains; field in DhcpResults 87 .setDomains(domains) in toStaticIpConfiguration() 96 domains = source.getDomains(); in DhcpResults() 137 domains = null; in clear() 284 return domains; in getDomains() 287 public void setDomains(String domains) { in setDomains() argument 288 this.domains = domains; in setDomains()
|
/aosp12/system/sepolicy/prebuilts/api/27.0/public/ |
H A D | attributes | 100 # All domains that can override MLS restrictions. 108 # All domains used for apps. 114 # All domains used for apps with network access. 117 # All domains used for apps with bluetooth access. 120 # All domains used for binder service domains. 123 # update_engine related domains that need to apply an update and run 128 # All core domains (as opposed to vendor/device-specific domains) 134 # All vendor domains which violate the requirement of not using Binder 145 # All vendor domains which violate the requirement of not executing 161 # halserver domains that are accessible to untrusted applications. These [all …]
|
H A D | vendor_toolbox.te | 6 # Do not allow domains to transition to vendor toolbox 9 # Do not allow non-vendor domains to transition 10 # to vendor toolbox except for the allowlisted domains.
|
/aosp12/packages/modules/DnsResolver/ |
H A D | ResolverController.cpp | 77 int getDnsInfo(unsigned netId, std::vector<std::string>* servers, std::vector<std::string>* domains, in getDnsInfo() argument 99 domains->clear(); in getDnsInfo() 148 domains->push_back(res_domains[i]); in getDnsInfo() 228 resolverParams.domains, res_params, in setResolverConfiguration() 233 std::vector<std::string>* domains, in getResolverInfo() argument 241 int ret = getDnsInfo(netId, servers, domains, &res_params, &res_stats, in getResolverInfo() 289 std::vector<std::string> domains; in dump() local 294 int rv = getDnsInfo(netId, &servers, &domains, ¶ms, &stats, in dump() 327 if (domains.empty()) { in dump() 330 std::string domains_str = android::base::Join(domains, ", "); in dump()
|
/aosp12/packages/modules/DnsResolver/tests/ |
H A D | resolv_cache_unit_test.cpp | 59 std::vector<std::string> domains; member 219 char domains[MAXDNSRCH][MAXDNSRCHPATH]; in expectCacheStats() local 235 EXPECT_EQ(std::string(domains[i]), expected.setup.domains[i]) << msg; in expectCacheStats() 625 .domains = {"domain1.com", "domain2.com"}, in TEST_F() 649 .domains = {"domain1.com"}, in TEST_F() 672 .domains = {}, in TEST_F() 704 .domains = domains, in TEST_F() 713 .domains = std::vector(domains.begin(), domains.begin() + MAXDNSRCH), in TEST_F() 725 .domains = {"domain1.com", "domain2.com"}, in TEST_F() 744 .domains = {"domain1.com", "domain2.com"}, in TEST_F() [all …]
|