Home
last modified time | relevance | path

Searched refs:ALLOWLIST (Results 1 – 5 of 5) sorted by relevance

/system/netd/server/
DFirewallController.cpp113 if (ftype == ALLOWLIST) { in setFirewallType()
131 mFirewallType = ALLOWLIST; in resetFirewall()
217 return ALLOWLIST; in getFirewallType()
221 return ALLOWLIST; in getFirewallType()
233 if (firewallType == ALLOWLIST) { in setUidRule()
277 return replaceUidChain(chain, type == ALLOWLIST, NO_UIDS); in createChain()
DFirewallControllerTest.cpp93 createChain("fw_allowlist", ALLOWLIST); in TEST_F()
263 EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); in TEST_F()
290 EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); in TEST_F()
298 EXPECT_EQ(0, mFw.setFirewallType(ALLOWLIST)); in TEST_F()
DFirewallController.h39 enum FirewallType { ALLOWLIST = INetd::FIREWALL_WHITELIST, DENYLIST = INetd::FIREWALL_BLACKLIST }; enumerator
DTrafficControllerTest.cpp174 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, ALLOW, ALLOWLIST)); in checkUidOwnerRuleForChain()
179 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, ALLOWLIST)); in checkUidOwnerRuleForChain()
613 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, ALLOW, ALLOWLIST))); in TEST_F()
618 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, DENY, ALLOWLIST))); in TEST_F()
637 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(NONE, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F()
638 ASSERT_EQ(-EINVAL, mTc.changeUidOwnerRule(INVALID_CHAIN, TEST_UID, ALLOW, ALLOWLIST)); in TEST_F()
DTrafficController.cpp524 if ((rule == ALLOW && type == ALLOWLIST) || (rule == DENY && type == DENYLIST)) { in updateOwnerMapEntry()
526 } else if ((rule == ALLOW && type == DENYLIST) || (rule == DENY && type == ALLOWLIST)) { in updateOwnerMapEntry()