Searched refs:DENY (Results 1 – 5 of 5) sorted by relevance
/system/netd/server/ |
D | FirewallControllerTest.cpp | 127 mFw.setUidRule(STANDBY, 12345, DENY); in TEST_F() 141 mFw.setUidRule(DOZABLE, 54321, DENY); in TEST_F() 152 mFw.setUidRule(NONE, 54321, DENY); in TEST_F() 287 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); in TEST_F() 290 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); in TEST_F()
|
D | FirewallController.h | 34 enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY }; enumerator
|
D | FirewallController.cpp | 199 } else if (rule == DENY && mIfaceRules.find(iface) != mIfaceRules.end()) { in setInterfaceRule() 241 op = (rule == DENY)? "-A" : "-D"; in setUidRule()
|
D | TrafficControllerTest.cpp | 169 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, BLACKLIST)); in checkUidOwnerRuleForChain() 180 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, WHITELIST)); in checkUidOwnerRuleForChain() 609 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, DENY, BLACKLIST))); in TEST_F() 619 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, DENY, WHITELIST))); in TEST_F()
|
D | TrafficController.cpp | 555 if ((rule == ALLOW && type == WHITELIST) || (rule == DENY && type == BLACKLIST)) { in updateOwnerMapEntry() 557 } else if ((rule == ALLOW && type == BLACKLIST) || (rule == DENY && type == WHITELIST)) { in updateOwnerMapEntry() 741 rule = DENY; in replaceUidOwnerMap()
|