Searched refs:ALLOWLIST (Results 1 – 5 of 5) sorted by relevance
/system/netd/server/ |
D | FirewallController.cpp | 113 if (ftype == ALLOWLIST) { in setFirewallType() 131 mFirewallType = ALLOWLIST; in resetFirewall() 217 return ALLOWLIST; in getFirewallType() 221 return ALLOWLIST; in getFirewallType() 233 if (firewallType == ALLOWLIST) { in setUidRule() 277 return replaceUidChain(chain, type == ALLOWLIST, NO_UIDS); in createChain()
|
D | FirewallControllerTest.cpp | 93 createChain("fw_allowlist", ALLOWLIST); in TEST_F() 263 EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); in TEST_F() 290 EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); in TEST_F() 298 EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); in TEST_F()
|
D | FirewallController.h | 39 enum FirewallType { ALLOWLIST = INetd::FIREWALL_WHITELIST, DENYLIST = INetd::FIREWALL_BLACKLIST }; enumerator
|
D | TrafficControllerTest.cpp | 174 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, ALLOWLIST)); in checkUidOwnerRuleForChain() 179 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, ALLOWLIST)); in checkUidOwnerRuleForChain() 613 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, ALLOWLIST))); in TEST_F() 618 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, DENY, ALLOWLIST))); in TEST_F() 637 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F() 638 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F()
|
D | TrafficController.cpp | 524 if ((rule == ALLOW && type == ALLOWLIST) || (rule == DENY && type == DENYLIST)) { in updateOwnerMapEntry() 526 } else if ((rule == ALLOW && type == DENYLIST) || (rule == DENY && type == ALLOWLIST)) { in updateOwnerMapEntry()
|