/ohos5.0/foundation/communication/netmanager_base/test/netpolicymanager/unittest/net_policy_manager_test/ |
H A D | ut_firewall_rule.cpp | 71 EXPECT_NE(rule.netsys_, nullptr); 75 rule.EnableFirewall(true); 87 rule.ClearAllowedList(); 100 rule.SetAllowedList(uids); 109 rule.RemoveFromAllowedList(uid); 124 rule.ClearDeniedList(); 130 rule.ClearDeniedList(); 136 rule.ClearDeniedList(); 137 rule.SetDeniedList(uids); 146 rule.RemoveFromDeniedList(uid); [all …]
|
/ohos5.0/foundation/communication/netmanager_ext/services/netfirewallmanager/src/ |
H A D | netfirewall_default_rule_parser.cpp | 30 rule->ruleName = cJSON_GetStringValue(ruleName); in ConvertFirewallRuleToConfig() 55 rule->isEnabled = cJSON_IsTrue(isEnabled); in ConvertFirewallRuleToConfig() 60 rule->appUid = cJSON_GetNumberValue(appUid); in ConvertFirewallRuleToConfig() 63 ParseListObject(rule, mem); in ConvertFirewallRuleToConfig() 69 ParseDnsObject(rule->dns, mem, NET_FIREWALL_DNS); in ConvertFirewallRuleToConfig() 72 rule->userId = cJSON_GetNumberValue(userId); in ConvertFirewallRuleToConfig() 159 if (rule.type == SINGLE_IP) { in ConvertIpParamToConfig() 163 if (rule.family == FAMILY_IPV4) { in ConvertIpParamToConfig() 180 if (rule.family == FAMILY_IPV4) { in ConvertIpParamToConfig() 190 if (rule.family == FAMILY_IPV4) { in ConvertIpParamToConfig() [all …]
|
H A D | netfirewall_rule_manager.cpp | 50 if (rule == nullptr) { in AddNetFirewallRule() 94 for (const auto &rule : rules) { in AddDefaultNetFirewallRule() local 107 if (rule == nullptr) { in UpdateNetFirewallRule() 127 if (oldRule.isEnabled && (rule->ruleType != oldRule.ruleType || !rule->isEnabled)) { in UpdateNetFirewallRule() 130 if (rule->isEnabled) { in UpdateNetFirewallRule() 200 for (const auto &rule : rules) { in DeleteNetFirewallRuleByAppId() local 201 if (!rule.isEnabled) { in DeleteNetFirewallRuleByAppId() 268 sptr<NetFirewallRule> &rule) in GetNetFirewallRule() argument 270 if (rule == nullptr) { in GetNetFirewallRule() 298 rule->dns = outRule.dns; in GetNetFirewallRule() [all …]
|
H A D | netfirewall_stub.cpp | 120 if (rule == nullptr) { in OnAddNetFirewallRule() 125 if (rule->localIps.size() > MAX_RULE_IP_COUNT || rule->remoteIps.size() > MAX_RULE_IP_COUNT) { in OnAddNetFirewallRule() 130 …if (rule->localPorts.size() > MAX_RULE_PORT_COUNT || rule->remotePorts.size() > MAX_RULE_PORT_COUN… in OnAddNetFirewallRule() 135 if (rule->domains.size() > MAX_RULE_DOMAIN_COUNT) { in OnAddNetFirewallRule() 141 int32_t ret = AddNetFirewallRule(rule, result); in OnAddNetFirewallRule() 154 if (rule == nullptr) { in OnUpdateNetFirewallRule() 159 if (rule->localIps.size() > MAX_RULE_IP_COUNT || rule->remoteIps.size() > MAX_RULE_IP_COUNT) { in OnUpdateNetFirewallRule() 164 …if (rule->localPorts.size() > MAX_RULE_PORT_COUNT || rule->remotePorts.size() > MAX_RULE_PORT_COUN… in OnUpdateNetFirewallRule() 169 if (rule->domains.size() > MAX_RULE_DOMAIN_COUNT) { in OnUpdateNetFirewallRule() 174 int32_t ret = UpdateNetFirewallRule(rule); in OnUpdateNetFirewallRule() [all …]
|
/ohos5.0/foundation/communication/netmanager_ext/test/netfirewallmanager/unittest/netfirewallmanager_test/ |
H A D | netfirewall_rule_manager_test.cpp | 32 if (!rule) { in GetNetFirewallRuleSptr() 33 return rule; in GetNetFirewallRuleSptr() 35 rule->ruleId = 1; in GetNetFirewallRuleSptr() 36 rule->userId = USER_ID; in GetNetFirewallRuleSptr() 41 rule->ruleType = type; in GetNetFirewallRuleSptr() 42 rule->isEnabled = true; in GetNetFirewallRuleSptr() 43 rule->appUid = appUid; in GetNetFirewallRuleSptr() 69 rule->dns = dns; in GetNetFirewallRuleSptr() 76 return rule; in GetNetFirewallRuleSptr() 95 rule->userId++; [all …]
|
H A D | netfirewall_client_test.cpp | 137 if (!rule) { in GetNetFirewallRuleSptr() 138 return rule; in GetNetFirewallRuleSptr() 140 rule->ruleId = 1; in GetNetFirewallRuleSptr() 147 rule->isEnabled = true; in GetNetFirewallRuleSptr() 172 return rule; in GetNetFirewallRuleSptr() 179 if (!rule) { in GetNetFirewallIpV4RuleSptr() 180 return rule; in GetNetFirewallIpV4RuleSptr() 182 rule->ruleId = 1; in GetNetFirewallIpV4RuleSptr() 189 rule->isEnabled = true; in GetNetFirewallIpV4RuleSptr() 199 return rule; in GetNetFirewallIpV4RuleSptr() [all …]
|
H A D | netfirewall_service_test.cpp | 88 if (!rule) { in GetNetFirewallRuleSptr() 89 return rule; in GetNetFirewallRuleSptr() 91 rule->ruleId = 1; in GetNetFirewallRuleSptr() 92 rule->userId = USER_ID1; in GetNetFirewallRuleSptr() 97 rule->isEnabled = true; in GetNetFirewallRuleSptr() 129 return rule; in GetNetFirewallRuleSptr() 135 if (!rule) { in GetNetFirewallRuleSptrTypeDns() 136 return rule; in GetNetFirewallRuleSptrTypeDns() 139 rule->ruleId = ruleId; in GetNetFirewallRuleSptrTypeDns() 178 return rule; in GetNetFirewallRuleSptrTypeDns() [all …]
|
H A D | netfirewall_service_proxy_test.cpp | 57 if (!rule) { in GetNetFirewallRuleSptr() 58 return rule; in GetNetFirewallRuleSptr() 60 rule->ruleId = 1; in GetNetFirewallRuleSptr() 61 rule->userId = USER_ID; in GetNetFirewallRuleSptr() 62 rule->ruleName = "rule test"; in GetNetFirewallRuleSptr() 66 rule->isEnabled = false; in GetNetFirewallRuleSptr() 67 rule->appUid = APP_ID; in GetNetFirewallRuleSptr() 74 rule->localIps.push_back(localParam); in GetNetFirewallRuleSptr() 96 rule->domains.push_back(domain); in GetNetFirewallRuleSptr() 100 return rule; in GetNetFirewallRuleSptr() [all …]
|
H A D | netfirewall_default_rule_parser_test.cpp | 52 EXPECT_EQ(rule->ruleDescription, desc); 93 NetFirewallDnsParam rule; variable 95 EXPECT_EQ(rule.primaryDns, "192.168.1.1"); 105 NetFirewallIpParam rule; variable 107 EXPECT_EQ(rule.type, SINGLE_IP); 117 NetFirewallIpParam rule; variable 119 EXPECT_EQ(rule.type, SINGLE_IP); 130 NetFirewallIpParam rule; variable 132 EXPECT_EQ(rule.family, FAMILY_IPV4); 143 NetFirewallIpParam rule; variable [all …]
|
H A D | netfirewall_service_stub_test.cpp | 81 if (!rule) { in GetNetFirewallRuleSptr() 82 return rule; in GetNetFirewallRuleSptr() 84 rule->ruleId = 1; in GetNetFirewallRuleSptr() 85 rule->userId = USER_ID; in GetNetFirewallRuleSptr() 90 rule->ruleType = type; in GetNetFirewallRuleSptr() 91 rule->isEnabled = true; in GetNetFirewallRuleSptr() 92 rule->appUid = 0; in GetNetFirewallRuleSptr() 115 return rule; in GetNetFirewallRuleSptr() 371 rule->Marshalling(data); 381 rule->Marshalling(data); [all …]
|
/ohos5.0/base/global/i18n_lite/frameworks/i18n/src/ |
H A D | plural_format_impl.cpp | 210 ((rule[index] == FRACTION_NUMBER) || (rule[index] == FRACTION_NUMBER_WITH_ZERO))) { in ParseDecimalFormula() 287 if ((index < ruleSize) && (rule[index] == MOD)) { in ParseFormula() 311 int num = ParseNumber(rule, ruleSize, index); in CompareResult() 315 while ((index < ruleSize) && ((rule[index] == COMMA) || (rule[index] == TO))) { in CompareResult() 316 if (rule[index] == TO) { in CompareResult() 330 num = ParseNumber(rule, ruleSize, index); in CompareResult() 347 int num = ParseNumber(rule, ruleSize, index); in CompareNotEqualResult() 351 while ((index < ruleSize) && ((rule[index] == COMMA) || (rule[index] == TO))) { in CompareNotEqualResult() 352 if (rule[index] == TO) { in CompareNotEqualResult() 380 …while ((index < ruleSize) && (rule[index] != ' ') && (rule[index] != TO) && (rule[index] != COMMA)… in ParseNumber() [all …]
|
/ohos5.0/base/hiviewdfx/hichecker/frameworks/native/ |
H A D | hichecker.cpp | 49 void HiChecker::AddRule(uint64_t rule) in AddRule() argument 52 if (!CheckRule(rule)) { in AddRule() 65 if (!CheckRule(rule)) { in RemoveRule() 81 bool HiChecker::Contains(uint64_t rule) in Contains() argument 84 if (!CheckRule(rule)) { in Contains() 87 return rule == (rule & (threadLocalRules_ | processRules_)); in Contains() 124 if ((threadLocalRules_ & rule) == 0 && (processRules_ & rule) == 0) { in NotifyCaution() 128 switch (rule) { in NotifyCaution() 221 if (rule <= 0 || Rule::ALL_RULES != (Rule::ALL_RULES | rule)) { in CheckRule() 249 if (!(rule & ALLOWED_RULE)) { in InitHicheckerParam() [all …]
|
/ohos5.0/base/hiviewdfx/hichecker/interfaces/js/kits/napi/src/ |
H A D | napi_hichecker.cpp | 40 if (rule != GET_RULE_PARAM_FAIL) { in AddRule() 41 HiChecker::AddRule(rule); in AddRule() 49 if (rule != GET_RULE_PARAM_FAIL) { in RemoveRule() 50 HiChecker::RemoveRule(rule); in RemoveRule() 58 return ToUInt64Value(env, rule); in GetRule() 72 if (rule != GET_RULE_PARAM_FAIL) { in AddCheckRule() 73 HiChecker::AddRule(rule); in AddCheckRule() 83 if (rule != GET_RULE_PARAM_FAIL) { in RemoveCheckRule() 84 HiChecker::RemoveRule(rule); in RemoveCheckRule() 95 if (rule == GET_RULE_PARAM_FAIL) { in ContainsCheckRule() [all …]
|
/ohos5.0/base/hiviewdfx/hiview/adapter/plugins/eventservice/service/idl/src/ |
H A D | sys_event_service_ohos.cpp | 55 if (rule.empty()) { in IsMatchedWithRegex() 73 return rule.empty() || match.compare(rule) == 0; in MatchContent() 75 return rule.empty() || match.find(rule) == 0; in MatchContent() 86 return rule == INVALID_EVENT_TYPE || rule == match; in MatchEventType() 93 return MatchContent(rule.ruleType, rule.domain, domain) in IsMatchedRule() 94 && MatchContent(rule.ruleType, rule.eventName, eventName) in IsMatchedRule() 97 return MatchContent(rule.ruleType, rule.tag, tag) in IsMatchedRule() 108 rule.ruleType, rule.domain.empty() ? "empty" : rule.domain.c_str(), in MatchRules() 109 rule.eventName.empty() ? "empty" : rule.eventName.c_str(), in MatchRules() 110 rule.tag.empty() ? "empty" : rule.tag.c_str(), eventType); in MatchRules() [all …]
|
H A D | running_status_log_util.cpp | 32 for (auto& rule : rules) { in LogTooManyQueryRules() local 34 info.append(rule.domain).append(RULE_ITEM_CONCAT); in LogTooManyQueryRules() 35 if (!rule.eventList.empty()) { in LogTooManyQueryRules() 37 for (auto& eventName : rule.eventList) { in LogTooManyQueryRules() 43 info.append(std::to_string(rule.ruleType)); in LogTooManyQueryRules() 56 for (auto& rule : rules) { in LogTooManyWatchRules() local 58 info.append(rule.domain).append(RULE_ITEM_CONCAT); in LogTooManyWatchRules() 59 info.append(rule.eventName).append(RULE_ITEM_CONCAT); in LogTooManyWatchRules() 60 if (!rule.tag.empty()) { in LogTooManyWatchRules() 61 info.append(rule.tag).append(RULE_ITEM_CONCAT); in LogTooManyWatchRules() [all …]
|
/ohos5.0/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/network/executer/ |
H A D | executer_utils_test.cpp | 62 ErrCode ret = executerUtils->Execute(rule, result); 65 rule = "-t filter -I OUTPUT -j edm_unit_test_output"; 66 ret = executerUtils->Execute(rule, result); 69 rule = "-t filter -F edm_unit_test_output"; 70 ret = executerUtils->Execute(rule, result); 74 ret = executerUtils->Execute(rule, result); 85 rule = "-t filter -D OUTPUT -j edm_unit_test_output"; 86 ret = executerUtils->Execute(rule, result); 89 rule = "-t filter -X edm_unit_test_output"; 90 ret = executerUtils->Execute(rule, result); [all …]
|
/ohos5.0/foundation/communication/netmanager_ext/frameworks/js/napi/netfirewall/src/context/ |
H A D | net_firewall_rule_parse.cpp | 123 rule->ruleDirection = in ParseRuleParams() 125 rule->ruleAction = in ParseRuleParams() 130 if (rule->ruleType == NetFirewallRuleType::RULE_IP) { in ParseRuleParams() 136 } else if (rule->ruleType == NetFirewallRuleType::RULE_DOMAIN) { in ParseRuleParams() 207 if (rule.ruleType == NetFirewallRuleType::RULE_IP) { in SetRuleParams() 208 SetIpList(env, object, NET_FIREWALL_LOCAL_IP, rule.localIps); in SetRuleParams() 209 SetIpList(env, object, NET_FIREWALL_REMOTE_IP, rule.remoteIps); in SetRuleParams() 211 SetPortList(env, object, NET_FIREWALL_LOCAL_PORT, rule.localPorts); in SetRuleParams() 212 SetPortList(env, object, NET_FIREWALL_REMOTE_PORT, rule.remotePorts); in SetRuleParams() 213 } else if (rule.ruleType == NetFirewallRuleType::RULE_DOMAIN) { in SetRuleParams() [all …]
|
/ohos5.0/base/customization/enterprise_device_management/services/edm_plugin/src/network/ |
H A D | iptables_manager.cpp | 54 auto rule = firewall.GetRule(); in AddFirewallRule() local 62 … !std::get<FIREWALL_SRCPORT_IND>(rule).empty() && !std::get<FIREWALL_DESTPORT_IND>(rule).empty()) { in AddFirewallRule() 95 auto rule = firewall.GetRule(); in RemoveFirewallRule() local 103 …(!std::get<FIREWALL_SRCPORT_IND>(rule).empty() || !std::get<FIREWALL_DESTPORT_IND>(rule).empty()))… in RemoveFirewallRule() 117 … !std::get<FIREWALL_SRCADDR_IND>(rule).empty() || !std::get<FIREWALL_DESTADDR_IND>(rule).empty() || in RemoveFirewallRule() 118 … !std::get<FIREWALL_SRCPORT_IND>(rule).empty() || !std::get<FIREWALL_DESTPORT_IND>(rule).empty() || in RemoveFirewallRule() 160 for (const auto& rule : inputRuleList) { in GetFirewallRules() local 186 auto rule = DomainFilter.GetRule(); in AddDomainFilterRule() local 223 auto rule = DomainFilter.GetRule(); in RemoveDomainFilterRules() local 284 for (const auto& rule : ruleList) { in GetDomainFilterRules() local [all …]
|
/ohos5.0/docs/en/application-dev/reference/apis-performance-analysis-kit/ |
H A D | js-apis-hichecker.md | 32 addCheckRule(rule: bigint): void 56 // Add a rule. 92 // Remove a rule. 134 // Add a rule. 147 addRule(rule: bigint): void 166 // Add a rule. 176 removeRule(rule: bigint): void 195 // Remove a rule. 220 // Add a rule. 229 contains(rule: bigint): boolean [all …]
|
/ohos5.0/base/hiviewdfx/hiview/utility/smart_parser/feature_analysis/ |
H A D | feature_analysis.cpp | 139 string cmdSrc = rule.source; in IsSourceMatch() 189 if (rule.param.empty()) { in ParseElementForParam() 194 for (auto iter = rule.param.begin(); iter != rule.param.end();) { in ParseElementForParam() 240 ReplaceVariable(rule, symbol, value); in CheckVariableParam() 247 if ((rule.source.find(leftTag) != string::npos && rule.source.find(rightTag) != string::npos) || in CheckVariable() 248 (rule.depend.find(leftTag) != string::npos && rule.depend.find(rightTag) != string::npos)) { in CheckVariable() 251 for (auto subParam : rule.param) { in CheckVariable() 262 ReplaceVariable(rule.source, symbol, value, rule.source); in ReplaceVariable() 263 ReplaceVariable(rule.depend, symbol, value, rule.depend); in ReplaceVariable() 264 for (auto subParam : rule.param) { in ReplaceVariable() [all …]
|
/ohos5.0/docs/zh-cn/device-dev/subsystems/ |
H A D | subsys-security-selinux-check.md | 229 … expect rule: (allow sh vendor_file (dir ())); actual rule: (allow sh vendor_file (dir (search))) 232 2. Change the policy to satisfy expect rule 235 … expect rule: (allow sh vendor_file (dir ())); actual rule: (allow sh vendor_file (dir (search))) 238 2. Change the policy to satisfy expect rule 265 … expect rule: (allow sh rootfs (dir (search))); actual rule: (allow sh rootfs (dir ())) 268 2. Change the policy to satisfy expect rule 271 … expect rule: (allow sh rootfs (dir (search))); actual rule: (allow sh rootfs (dir ())) 274 2. Change the policy to satisfy expect rule 298 check ioctl rule in user mode failed. 351 check permissive rule in user mode failed. [all …]
|
/ohos5.0/foundation/ability/form_fwk/test/mock/include/ |
H A D | mock_ecological_rule_manager.h | 40 const ErmsParams::CallerInfo &callerInfo, ErmsParams::ExperienceRule &rule) in QueryFreeInstallExperience() argument 52 const ErmsParams::CallerInfo &callerInfo, ErmsParams::ExperienceRule &rule) in QueryStartExperience() argument 57 virtual int32_t QueryPublishFormExperience(const Want &want, ErmsParams::ExperienceRule &rule) in QueryPublishFormExperience() argument 63 ErmsParams::ExperienceRule &rule) in IsSupportPublishForm() argument 80 const ErmsParams::CallerInfo &callerInfo, ErmsParams::ExperienceRule &rule) in QueryFreeInstallExperience() argument 92 const ErmsParams::CallerInfo &callerInfo, ErmsParams::ExperienceRule &rule) in QueryStartExperience() argument 97 virtual int32_t QueryPublishFormExperience(const Want &want, ErmsParams::ExperienceRule &rule) in QueryPublishFormExperience() argument 103 ErmsParams::ExperienceRule &rule) in IsSupportPublishForm() argument 120 const ErmsParams::CallerInfo &callerInfo, ErmsParams::ExperienceRule &rule)); 124 ErmsParams::ExperienceRule &rule)); [all …]
|
/ohos5.0/foundation/communication/netmanager_base/services/netmanagernative/bpf/src/ |
H A D | bpf_netfirewall.cpp | 286 … if (rule->protocol == NetworkProtocol::ICMP || rule->protocol == NetworkProtocol::ICMPV6) { in SetFirewallIpRules() 346 RuleCode rule; in WriteSrcIpv4BpfMap() local 366 RuleCode rule; in WriteSrcIpv6BpfMap() local 385 RuleCode rule; in WriteDstIpv4BpfMap() local 405 RuleCode rule; in WriteDstIpv6BpfMap() local 426 RuleCode rule; in WriteSrcPortBpfMap() local 444 RuleCode rule; in WriteDstPortBpfMap() local 462 RuleCode rule; in WriteProtoBpfMap() local 480 RuleCode rule; in WriteAppUidBpfMap() local 498 RuleCode rule; in WriteUidBpfMap() local [all …]
|
/ohos5.0/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/network/rule/ |
H A D | chain_rule_test.cpp | 35 explicit ChainRuleMock(const std::string& rule) : ChainRule(rule) {} in ChainRuleMock() argument 52 std::string rule = variable 56 std::shared_ptr<ChainRule> chainRule = std::make_shared<ChainRuleMock>(rule); 60 rule = 63 chainRule = std::make_shared<ChainRuleMock>(rule); 76 std::string rule; variable 77 std::shared_ptr<ChainRule> chainRule = std::make_shared<ChainRuleMock>(rule); 107 std::string rule; variable 108 std::shared_ptr<ChainRule> chainRule = std::make_shared<ChainRuleMock>(rule);
|
/ohos5.0/base/hiviewdfx/hisysevent/test/moduletest/common/ |
H A D | hisysevent_manager_c_test.cpp | 64 rule.eventListSize = 1; in InitQueryRule() 65 rule.condition = nullptr; in InitQueryRule() 72 rule.eventListSize = 1; in InitQueryRuleWithCondition() 148 HiSysEventQueryRule rule; in QueryTestWithCondition() local 374 InitQueryRule(rule); 683 rule.eventListSize = 0; 712 rule.eventListSize = 1; 839 InitQueryRule(rule); 878 InitQueryRule(rule); 882 rules[i] = rule; [all …]
|