Home
last modified time | relevance | path

Searched refs:WHITELIST (Results 1 – 5 of 5) sorted by relevance

/system/netd/server/
DFirewallController.cpp114 if (ftype == WHITELIST) { in setFirewallType()
132 mFirewallType = WHITELIST; in resetFirewall()
218 return WHITELIST; in getFirewallType()
222 return WHITELIST; in getFirewallType()
234 if (firewallType == WHITELIST) { in setUidRule()
278 return replaceUidChain(chain, type == WHITELIST, NO_UIDS); in createChain()
DFirewallControllerTest.cpp95 createChain("fw_whitelist", WHITELIST); in TEST_F()
266 EXPECT_EQ(0, mFw.setFirewallType(WHITELIST)); in TEST_F()
293 EXPECT_EQ(0, mFw.setFirewallType(WHITELIST)); in TEST_F()
301 EXPECT_EQ(0, mFw.setFirewallType(WHITELIST)); in TEST_F()
DFirewallController.h39 enum FirewallType { WHITELIST = INetd::FIREWALL_WHITELIST, BLACKLIST = INetd::FIREWALL_BLACKLIST }; enumerator
DTrafficControllerTest.cpp175 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, WHITELIST)); in checkUidOwnerRuleForChain()
180 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, WHITELIST)); in checkUidOwnerRuleForChain()
614 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, WHITELIST))); in TEST_F()
619 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, DENY, WHITELIST))); in TEST_F()
638 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, WHITELIST)); in TEST_F()
639 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, WHITELIST)); in TEST_F()
DTrafficController.cpp555 if ((rule == ALLOW && type == WHITELIST) || (rule == DENY && type == BLACKLIST)) { in updateOwnerMapEntry()
557 } else if ((rule == ALLOW && type == BLACKLIST) || (rule == DENY && type == WHITELIST)) { in updateOwnerMapEntry()
737 type = WHITELIST; in replaceUidOwnerMap()