Searched refs:DENY (Results 1 – 6 of 6) sorted by relevance
/system/netd/server/ |
D | FirewallControllerTest.cpp | 121 mFw.setUidRule(STANDBY, 12345, DENY); in TEST_F() 135 mFw.setUidRule(DOZABLE, 54321, DENY); in TEST_F() 146 mFw.setUidRule(NONE, 54321, DENY); in TEST_F() 281 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); in TEST_F() 284 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); in TEST_F()
|
D | FirewallController.h | 28 enum FirewallRule { DENY, ALLOW }; enumerator
|
D | FirewallController.cpp | 182 } else if (rule == DENY && mIfaceRules.find(iface) != mIfaceRules.end()) { in setInterfaceRule() 224 op = (rule == DENY)? "-A" : "-D"; in setUidRule()
|
D | TrafficControllerTest.cpp | 167 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, BLACKLIST)); in checkUidOwnerRuleForChain() 178 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, WHITELIST)); in checkUidOwnerRuleForChain() 438 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, DENY, BLACKLIST))); in TEST_F() 449 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(mFakeDozableUidMap, uid, DENY, WHITELIST))); in TEST_F()
|
D | TrafficController.cpp | 438 if ((rule == ALLOW && type == WHITELIST) || (rule == DENY && type == BLACKLIST)) { in updateOwnerMapEntry() 441 } else if ((rule == ALLOW && type == BLACKLIST) || (rule == DENY && type == WHITELIST)) { in updateOwnerMapEntry() 514 rule = DENY; in replaceUidOwnerMap()
|
D | CommandListener.cpp | 1041 return DENY; in parseRule()
|