Searched refs:DENY (Results 1 – 5 of 5) sorted by relevance
/system/netd/server/ |
D | FirewallControllerTest.cpp | 124 mFw.setUidRule(STANDBY, 12345, DENY); in TEST_F() 138 mFw.setUidRule(DOZABLE, 54321, DENY); in TEST_F() 149 mFw.setUidRule(NONE, 54321, DENY); in TEST_F() 284 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); in TEST_F() 287 EXPECT_EQ(0, mFw.setInterfaceRule("rmnet_data0", DENY)); in TEST_F()
|
D | FirewallController.h | 34 enum FirewallRule { ALLOW = INetd::FIREWALL_RULE_ALLOW, DENY = INetd::FIREWALL_RULE_DENY }; enumerator
|
D | FirewallController.cpp | 198 } else if (rule == DENY && mIfaceRules.find(iface) != mIfaceRules.end()) { in setInterfaceRule() 240 op = (rule == DENY)? "-A" : "-D"; in setUidRule()
|
D | TrafficControllerTest.cpp | 168 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, DENYLIST)); in checkUidOwnerRuleForChain() 179 EXPECT_EQ(0, mTc.changeUidOwnerRule(chain, uid, DENY, ALLOWLIST)); in checkUidOwnerRuleForChain() 608 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(STANDBY_MATCH, uid, DENY, DENYLIST))); in TEST_F() 618 ASSERT_TRUE(isOk(mTc.updateOwnerMapEntry(DOZABLE_MATCH, uid, DENY, ALLOWLIST))); in TEST_F()
|
D | TrafficController.cpp | 524 if ((rule == ALLOW && type == ALLOWLIST) || (rule == DENY && type == DENYLIST)) { in updateOwnerMapEntry() 526 } else if ((rule == ALLOW && type == DENYLIST) || (rule == DENY && type == ALLOWLIST)) { in updateOwnerMapEntry()
|