/base/customization/enterprise_device_management/services/edm_plugin/src/network/rule/ |
H A D | rule_utils.cpp | 46 std::string RuleUtils::EnumToString(Protocol protocol) in EnumToString() 49 case Protocol::INVALID: in EnumToString() 51 case Protocol::ALL: in EnumToString() 53 case Protocol::TCP: in EnumToString() 55 case Protocol::UDP: in EnumToString() 57 case Protocol::ICMP: in EnumToString() 62 Protocol RuleUtils::StringProtocl(std::string protocol) in StringProtocl() 65 return Protocol::ALL; in StringProtocl() 67 return Protocol::TCP; in StringProtocl() 69 return Protocol in StringProtocl() [all...] |
H A D | firewall_chain_rule.cpp | 133 Protocol protocl = RuleUtils::StringProtocl(prot_); in ToFilterRule()
|
/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/network/ |
H A D | iptables_manager_test.cpp | 82 {Direction::INPUT, Action::DENY, Protocol::UDP, "192.168.2.100", "192.168.2.200", "80", "90", ""}, in HWTEST_F() 83 {Direction::INPUT, Action::ALLOW, Protocol::TCP, "192.168.2.100", "", "", "", ""}, in HWTEST_F() 84 {Direction::OUTPUT, Action::DENY, Protocol::ICMP, "", "", "", "", ""}, in HWTEST_F() 85 {Direction::OUTPUT, Action::ALLOW, Protocol::INVALID, "192.168.1.1", "", "", "", ""}, in HWTEST_F() 86 {Direction::OUTPUT, Action::ALLOW, Protocol::INVALID, "192.168.1.1/20", "", "", "", ""}, in HWTEST_F() 87 {Direction::OUTPUT, Action::ALLOW, Protocol::INVALID, "", "192.168.1.1", "", "", ""}, in HWTEST_F() 88 {Direction::OUTPUT, Action::DENY, Protocol::INVALID, "", "192.168.1.1/20", "", "", ""}, in HWTEST_F() 89 {Direction::INPUT, Action::ALLOW, Protocol::INVALID, "", "", "80", "", ""}, in HWTEST_F() 90 {Direction::INPUT, Action::DENY, Protocol::INVALID, "", "", "80:90", "", ""}, in HWTEST_F() 91 {Direction::INPUT, Action::ALLOW, Protocol in HWTEST_F() [all...] |
/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/network/rule/ |
H A D | firewall_chain_rule_test.cpp | 42 FirewallRule firewallRule{Direction::INPUT, Action::DENY, Protocol::UDP, "192.168.2.100", "192.168.2.200", "80", in HWTEST_F() 48 firewallRule = {Direction::INPUT, Action::ALLOW, Protocol::UDP, "192.168.1.1", "192.168.2.2", "9090", "9091", in HWTEST_F() 56 firewallRule = {Direction::INPUT, Action::ALLOW, Protocol::UDP, "192.168.4.1", "192.168.5.1-192.168.5.254", in HWTEST_F() 65 firewallRule = {Direction::INPUT, Action::ALLOW, Protocol::UDP, "192.168.6.1-192.168.6.254", in HWTEST_F() 76 firewallRule = {Direction::INPUT, Action::ALLOW, Protocol::INVALID, "", "", "", "", ""}; in HWTEST_F() 79 firewallRule = {Direction::OUTPUT, Action::ALLOW, Protocol::INVALID, "", "", "", "", ""}; in HWTEST_F() 90 FirewallRule firewallRule{Direction::INPUT, Action::DENY, Protocol::UDP, "192.168.2.100", "192.168.2.200", "80", in HWTEST_F() 97 firewallRule = {Direction::INPUT, Action::ALLOW, Protocol::ALL, "192.168.2.100", "192.168.2.200", "", "", "9999"}; in HWTEST_F() 103 firewallRule = {Direction::INPUT, Action::ALLOW, Protocol::TCP, "192.168.2.1/22", "192.168.2.200", "99,100", in HWTEST_F()
|
/base/customization/enterprise_device_management/common/native/include/plugin_utils/ |
H A D | iptables_utils.h | 32 enum class Protocol { INVALID = -1, ALL, TCP, UDP, ICMP }; class 42 Protocol protocol; 50 protocol = Protocol::INVALID; in AddFilter() 60 protocol = Protocol::INVALID; in RemoveFilter() 75 static void ProcessFirewallProtocol(int32_t type, Protocol &protocol);
|
H A D | firewall_rule.h | 37 using FirewallRule = std::tuple<Direction, Action, Protocol, std::string /*srcAddr*/, std::string /*destAddr*/,
|
/base/customization/enterprise_device_management/services/edm_plugin/include/network/rule/ |
H A D | rule_utils.h | 51 static std::string EnumToString(Protocol protocol); 52 static Protocol StringProtocl(std::string protocol);
|
/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/ |
H A D | iptables_rule_plugin_test.cpp | 150 addFilter.protocol = IPTABLES::Protocol::ICMP; in HWTEST_F() 166 ASSERT_TRUE(addFilter2.protocol == IPTABLES::Protocol::ICMP); in HWTEST_F() 193 filter.protocol = IPTABLES::Protocol::TCP; in HWTEST_F() 205 ASSERT_TRUE(filter2.protocol == IPTABLES::Protocol::TCP); in HWTEST_F() 283 filter.protocol = IPTABLES::Protocol::TCP; in HWTEST_F() 356 IPTABLES::Protocol protocol = IPTABLES::Protocol::TCP; in HWTEST_F() 357 plugin->ProcessFirewallProtocol(static_cast<int32_t>(IPTABLES::Protocol::ALL), protocol); in HWTEST_F() 358 ASSERT_TRUE(protocol == IPTABLES::Protocol::ALL); in HWTEST_F() 359 plugin->ProcessFirewallProtocol(static_cast<int32_t>(IPTABLES::Protocol in HWTEST_F() [all...] |
H A D | firewall_rule_plugin_test.cpp | 112 IPTABLES::FirewallRule rule{IPTABLES::Direction::INPUT, IPTABLES::Action::DENY, IPTABLES::Protocol::UDP, in HWTEST_F() 129 IPTABLES::FirewallRule rule{IPTABLES::Direction::INPUT, IPTABLES::Action::DENY, IPTABLES::Protocol::UDP, in HWTEST_F() 146 IPTABLES::FirewallRule rule{IPTABLES::Direction::INPUT, IPTABLES::Action::DENY, IPTABLES::Protocol::UDP, in HWTEST_F() 163 IPTABLES::FirewallRule rule{IPTABLES::Direction::INPUT, IPTABLES::Action::DENY, IPTABLES::Protocol::UDP, in HWTEST_F() 178 IPTABLES::FirewallRule rule{IPTABLES::Direction::INVALID, IPTABLES::Action::INVALID, IPTABLES::Protocol::UDP, in HWTEST_F()
|
/base/customization/enterprise_device_management/common/native/src/plugin_utils/ |
H A D | iptables_utils.cpp | 102 void IptablesUtils::ProcessFirewallProtocol(int32_t type, Protocol &protocol) in ProcessFirewallProtocol() 104 if (type >= static_cast<int32_t>(Protocol::ALL) && type <= static_cast<int32_t>(Protocol::ICMP)) { in ProcessFirewallProtocol() 105 protocol = Protocol(type); in ProcessFirewallProtocol()
|
H A D | firewall_rule.cpp | 42 IPTABLES::Protocol protocol = IPTABLES::Protocol::INVALID; in Unmarshalling()
|
/base/customization/enterprise_device_management/test/fuzztest/firewallruleplugin_fuzzer/ |
H A D | firewall_rule_plugin_fuzzer.cpp | 70 IPTABLES::Protocol protocolEnum = in LLVMFuzzerTestOneInput() 71 static_cast<IPTABLES::Protocol>(CommonFuzzer::GetU32Data(data) % MAX_PROTOCOL_LENGTH); in LLVMFuzzerTestOneInput()
|
/base/customization/enterprise_device_management/services/edm_plugin/src/ |
H A D | iptables_rule_plugin.cpp | 158 removeFilter.protocol == IPTABLES::Protocol::INVALID) { in ExecRemoveFilterIptablesCommand() 218 void IptablesRulePlugin::ConvertProtocolCommand(const IPTABLES::Protocol &protocol, std::string &command) in ConvertProtocolCommand() 221 case IPTABLES::Protocol::TCP: in ConvertProtocolCommand() 224 case IPTABLES::Protocol::UDP: in ConvertProtocolCommand() 227 case IPTABLES::Protocol::ICMP: in ConvertProtocolCommand() 230 case IPTABLES::Protocol::ALL: in ConvertProtocolCommand()
|
/base/customization/enterprise_device_management/services/edm_plugin/src/network/ |
H A D | iptables_manager.cpp | 61 if (std::get<FIREWALL_PROT_IND>(rule) == Protocol::ALL && in AddFirewallRule() 102 if (std::get<FIREWALL_PROT_IND>(rule) == Protocol::ALL && in RemoveFirewallRule() 116 if (std::get<FIREWALL_PROT_IND>(rule) != IPTABLES::Protocol::INVALID || in RemoveFirewallRule() 356 FirewallRule firewallRule1{Direction::OUTPUT, Action::DENY, Protocol::UDP, "", "", "", "", ""}; in SetDefaultFirewallDenyChain() 357 FirewallRule firewallRule2{Direction::OUTPUT, Action::DENY, Protocol::TCP, "", "", "", "", ""}; in SetDefaultFirewallDenyChain()
|
/base/customization/enterprise_device_management/services/edm_plugin/include/ |
H A D | iptables_rule_plugin.h | 54 void ConvertProtocolCommand(const IPTABLES::Protocol &protocol, std::string &Command);
|
/base/customization/enterprise_device_management/test/fuzztest/iptablesruleplugin_fuzzer/ |
H A D | iptables_rule_plugin_fuzzer.cpp | 71 addFilter.protocol = static_cast<IPTABLES::Protocol>(CommonFuzzer::GetU32Data(data) % MAX_PROTOCOL_LENGTH); in LLVMFuzzerTestOneInput()
|
/base/customization/enterprise_device_management/test/unittest/interface/inner_api/proxy/ |
H A D | network_manager_proxy_test.cpp | 382 IPTABLES::FirewallRule rule{IPTABLES::Direction::INVALID, IPTABLES::Action::INVALID, IPTABLES::Protocol::INVALID,
in HWTEST_F() 398 IPTABLES::FirewallRule rule{IPTABLES::Direction::INVALID, IPTABLES::Action::INVALID, IPTABLES::Protocol::INVALID,
in HWTEST_F() 416 IPTABLES::FirewallRule rule{IPTABLES::Direction::INVALID, IPTABLES::Action::INVALID, IPTABLES::Protocol::INVALID,
in HWTEST_F() 432 IPTABLES::FirewallRule rule{IPTABLES::Direction::INVALID, IPTABLES::Action::INVALID, IPTABLES::Protocol::INVALID,
in HWTEST_F()
|
/base/customization/enterprise_device_management/interfaces/kits/network_manager/src/ |
H A D | network_manager_addon.cpp | 46 NAPI_CALL_RETURN_VOID(env, napi_create_int32(env, static_cast<int32_t>(IPTABLES::Protocol::ALL), &nAll));
in CreateFirewallProtocolObject() 49 NAPI_CALL_RETURN_VOID(env, napi_create_int32(env, static_cast<int32_t>(IPTABLES::Protocol::TCP), &nTCP));
in CreateFirewallProtocolObject() 52 NAPI_CALL_RETURN_VOID(env, napi_create_int32(env, static_cast<int32_t>(IPTABLES::Protocol::UDP), &nUDP));
in CreateFirewallProtocolObject() 55 NAPI_CALL_RETURN_VOID(env, napi_create_int32(env, static_cast<int32_t>(IPTABLES::Protocol::ICMP), &nICMP));
in CreateFirewallProtocolObject() 105 DECLARE_NAPI_PROPERTY("Protocol", nFirewallProtocol),
in Init() 589 IPTABLES::Protocol::INVALID, "", "", "", "", ""};
in AddFirewallRule() 618 IPTABLES::Protocol::INVALID, "", "", "", "", ""};
in RemoveFirewallRule() 676 IPTABLES::Protocol protocolEnum = IPTABLES::Protocol::INVALID;
in JsObjToFirewallRule()
|
/base/customization/enterprise_device_management/test/unittest/interface/inner_api/proxy/mock/src/ |
H A D | enterprise_device_mgr_stub_mock.cpp | 139 IPTABLES::FirewallRule rule{IPTABLES::Direction::INVALID, IPTABLES::Action::INVALID, IPTABLES::Protocol::INVALID,
in InvokeSendRequestGetDomainFilterRules()
|