Home
last modified time | relevance | path

Searched refs:uids (Results 1 – 15 of 15) sorted by relevance

/system/netd/server/
DFirewallControllerTest.cpp163 std::vector<int32_t> uids = { 10023, 10059, 10124, 10111, 110122, 210153, 210024 }; in TEST_F() local
164 EXPECT_EQ(expected, makeUidRules(V6, "FW_whitechain", true, uids)); in TEST_F()
178 std::vector<int32_t> uids = { 10023, 10059, 10124 }; in TEST_F() local
179 EXPECT_EQ(expected, makeUidRules(V4 ,"FW_blackchain", false, uids)); in TEST_F()
DFirewallController.cpp294 std::vector<int32_t> uids; in createChain() local
295 return replaceUidChain(childChain, type == WHITELIST, uids); in createChain()
299 bool isWhitelist, const std::vector<int32_t>& uids) { in makeUidRules() argument
326 for (auto uid : uids) { in makeUidRules()
342 const char *name, bool isWhitelist, const std::vector<int32_t>& uids) { in replaceUidChain() argument
343 std::string commands4 = makeUidRules(V4, name, isWhitelist, uids); in replaceUidChain()
344 std::string commands6 = makeUidRules(V6, name, isWhitelist, uids); in replaceUidChain()
DNetdNativeService.h39 const std::vector<int32_t>& uids, bool *ret) override;
41 binder::Status networkRejectNonSecureVpn(bool enable, const std::vector<UidRange>& uids)
43 binder::Status socketDestroy(const std::vector<UidRange>& uids,
DNetworkController.h72 void setPermissionForUsers(Permission permission, const std::vector<uid_t>& uids);
91 void allowProtect(const std::vector<uid_t>& uids);
92 void denyProtect(const std::vector<uid_t>& uids);
DNetdNativeService.cpp127 bool isWhitelist, const std::vector<int32_t>& uids, bool *ret) { in firewallReplaceUidChain() argument
131 int err = gCtls->firewallCtrl.replaceUidChain(name.string(), isWhitelist, uids); in firewallReplaceUidChain()
169 binder::Status NetdNativeService::socketDestroy(const std::vector<UidRange>& uids, in socketDestroy() argument
180 UidRanges uidRanges(uids); in socketDestroy()
DNetworkController.cpp430 const std::vector<uid_t>& uids) { in setPermissionForUsers() argument
432 for (uid_t uid : uids) { in setPermissionForUsers()
514 void NetworkController::allowProtect(const std::vector<uid_t>& uids) { in allowProtect() argument
516 mProtectableUsers.insert(uids.begin(), uids.end()); in allowProtect()
519 void NetworkController::denyProtect(const std::vector<uid_t>& uids) { in denyProtect() argument
521 for (uid_t uid : uids) { in denyProtect()
DFirewallController.h87 const std::vector<int32_t>& uids);
DCommandListener.cpp1771 std::vector<uid_t> uids; in runCommand() local
1773 uids.push_back(strtoul(argv[i], NULL, 0)); in runCommand()
1776 gCtls->netCtrl.allowProtect(uids); in runCommand()
1778 gCtls->netCtrl.denyProtect(uids); in runCommand()
/system/netd/tests/
Dbinder_test.cpp168 std::vector<int32_t> uids(kNumUids); in TEST_F() local
170 uids[i] = randomUid(); in TEST_F()
176 mNetd->firewallReplaceUidChain(String16(chainName.c_str()), true, uids, &ret); in TEST_F()
179 EXPECT_EQ((int) uids.size() + 6, iptablesRuleLineLength(IPTABLES_PATH, chainName.c_str())); in TEST_F()
180 EXPECT_EQ((int) uids.size() + 12, iptablesRuleLineLength(IP6TABLES_PATH, chainName.c_str())); in TEST_F()
191 mNetd->firewallReplaceUidChain(String16(chainName.c_str()), false, uids, &ret); in TEST_F()
194 EXPECT_EQ((int) uids.size() + 4, iptablesRuleLineLength(IPTABLES_PATH, chainName.c_str())); in TEST_F()
195 EXPECT_EQ((int) uids.size() + 4, iptablesRuleLineLength(IP6TABLES_PATH, chainName.c_str())); in TEST_F()
/system/netd/server/binder/android/net/
DINetd.aidl41 boolean firewallReplaceUidChain(String chainName, boolean isWhitelist, in int[] uids); in firewallReplaceUidChain() argument
/system/nativepower/daemon/
Dpower_manager.h82 const int* uids,
Dpower_manager_stub.cc106 const int* uids, in updateWakeLockUids() argument
Dpower_manager.cc90 const int* uids, in updateWakeLockUids() argument
/system/nativepower/include/nativepower/
Dpower_manager_stub.h86 const int* uids,
/system/sepolicy/
Dseapp_contexts76 # neverallow non-isolated uids into isolated_app domain