Searched refs:ALLOW (Results 1 – 6 of 6) sorted by relevance
/system/netd/server/ |
D | FirewallControllerTest.cpp | 121 mFw.setUidRule(STANDBY, 12345, ALLOW); in TEST_F() 135 mFw.setUidRule(DOZABLE, 54321, ALLOW); in TEST_F() 161 mFw.setUidRule(NONE, 54321, ALLOW); in TEST_F() 275 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F() 278 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", ALLOW)); in TEST_F()
|
D | FirewallController.h | 34 enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY }; enumerator
|
D | TrafficControllerTest.cpp | 175 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, WHITELIST)); in checkUidOwnerRuleForChain() 186 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST)); in checkUidOwnerRuleForChain() 192 EXPECT_EQ(-ENOENT, mTc.changeUidOwnerRule(chain, uid, ALLOW, BLACKLIST)); in checkUidOwnerRuleForChain() 614 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, WHITELIST))); in TEST_F() 624 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, BLACKLIST))); in TEST_F() 628 ASSERT_FALSE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, ALLOW, BLACKLIST))); in TEST_F() 638 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, WHITELIST)); in TEST_F() 639 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, WHITELIST)); in TEST_F()
|
D | FirewallController.cpp | 196 if (rule == ALLOW && mIfaceRules.find(iface) == mIfaceRules.end()) { in setInterfaceRule() 237 op = (rule == ALLOW)? "-I" : "-D"; in setUidRule()
|
D | TrafficController.cpp | 555 if ((rule == ALLOW && type == WHITELIST) || (rule == DENY && type == BLACKLIST)) { in updateOwnerMapEntry() 557 } else if ((rule == ALLOW && type == BLACKLIST) || (rule == DENY && type == WHITELIST)) { in updateOwnerMapEntry() 738 rule = ALLOW; in replaceUidOwnerMap()
|
/system/sepolicy/tools/sepolicy-analyze/ |
D | README | 34 DUPLICATE ALLOW RULES (dups)
|