Home
last modified time | relevance | path

Searched refs:ALLOW (Results 1 – 6 of 6) sorted by relevance

/system/netd/server/
DFirewallControllerTest.cpp121 mFw.setUidRule(STANDBY, 12345, ALLOW); in TEST_F()
135 mFw.setUidRule(DOZABLE, 54321, ALLOW); in TEST_F()
161 mFw.setUidRule(NONE, 54321, ALLOW); in TEST_F()
275 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F()
278 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F()
DFirewallController.h34 enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY }; enumerator
DTrafficControllerTest.cpp175 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, WHITELIST)); in checkUidOwnerRuleForChain()
186 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST)); in checkUidOwnerRuleForChain()
192 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST)); in checkUidOwnerRuleForChain()
614 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, WHITELIST))); in TEST_F()
624 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, BLACKLIST))); in TEST_F()
628 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, BLACKLIST))); in TEST_F()
638 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, WHITELIST)); in TEST_F()
639 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, WHITELIST)); in TEST_F()
DFirewallController.cpp196 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { in setInterfaceRule()
237 op = (rule == ALLOW)? "-I" : "-D"; in setUidRule()
DTrafficController.cpp555 if ((rule == ALLOW && type == WHITELIST) || (rule == DENY && type == BLACKLIST)) { in updateOwnerMapEntry()
557 } else if ((rule == ALLOW && type == BLACKLIST) || (rule == DENY && type == WHITELIST)) { in updateOwnerMapEntry()
738 rule = ALLOW; in replaceUidOwnerMap()
/system/sepolicy/tools/sepolicy-analyze/
DREADME34 DUPLICATE ALLOW RULES (dups)