/base/customization/enterprise_device_management/test/unittest/services/edm/src/ |
H A D | policy_manager_test.cpp | 67 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_BOOL_POLICY_NAME, "false", "true"); in HWTEST_F() 69 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_BOOL_POLICY_NAME, "true", "true"); in HWTEST_F() 81 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_BOOL_POLICY_NAME, "", ""); in HWTEST_F() 83 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_BOOL_POLICY_NAME, "", ""); in HWTEST_F() 95 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_STRING_POLICY_NAME, TEST_ADMIN_POLICY_VALUE, in HWTEST_F() 107 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_STRING_POLICY_NAME, "", TEST_MERAGE_POLICY_VALUE_ONE); in HWTEST_F() 118 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_STRING_POLICY_NAME, "", ""); in HWTEST_F() 120 res = policyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_STRING_POLICY_NAME, "", ""); in HWTEST_F() 126 * @tc.desc: Test PolicyManager SetPolicy func. 134 res = policyMgr_->SetPolicy(TEST_ADMIN_NAM in HWTEST_F() [all...] |
H A D | user_policy_manager_test.cpp | 58 * @tc.desc: Test UserPolicyManager SetPolicy func. 66 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_BOOL_POLICY_NAME, "false", "true"); in HWTEST_F() 77 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_BOOL_POLICY_NAME, "true", "true"); in HWTEST_F() 86 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_BOOL_POLICY_NAME, "", ""); in HWTEST_F() 88 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_BOOL_POLICY_NAME, "", ""); in HWTEST_F() 102 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_STRING_POLICY_NAME, TEST_ADMIN_POLICY_VALUE, in HWTEST_F() 114 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_STRING_POLICY_NAME, "", TEST_MERAGE_POLICY_VALUE_ONE); in HWTEST_F() 125 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME, TEST_STRING_POLICY_NAME, "", ""); in HWTEST_F() 127 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAME1, TEST_STRING_POLICY_NAME, "", ""); in HWTEST_F() 139 res = userPolicyMgr_->SetPolicy(TEST_ADMIN_NAM in HWTEST_F() [all...] |
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/setpolicy_fuzzer/ |
H A D | setpolicy_fuzzer.cpp | 29 bool SetPolicy(const uint8_t *data, size_t size) in SetPolicy() function 44 SandboxManagerKit::SetPolicy(tokenId, policyVec, policyFlag, result); in SetPolicy() 50 return AllocTokenWithFuzz(data, size, SetPolicy); in SetPolicyFuzzTest()
|
/base/customization/enterprise_device_management/test/unittest/interface/inner_api/proxy/ |
H A D | browser_proxy_test.cpp | 80 * @tc.desc: Test SetPolicy success func. 89 ErrCode ret = browserProxy_->SetPolicy(admin, TEST_APP_ID, TEST_POLICY_NAME, TEST_POLICY_VALUE); in HWTEST_F() 95 * @tc.desc: Test SetPolicy without enable edm service func. 102 ErrCode ret = browserProxy_->SetPolicy(admin, TEST_APP_ID, TEST_POLICY_NAME, TEST_POLICY_VALUE); in HWTEST_F() 108 * @tc.desc: Test SetPolicy with empty appId. 115 ErrCode ret = browserProxy_->SetPolicy(admin, "", TEST_POLICY_NAME, TEST_POLICY_VALUE); in HWTEST_F()
|
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/test/unittest/src/ |
H A D | sandbox_manager_kit_test.cpp | 164 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policy, policyFlag, policyResult)); in HWTEST_F() 209 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(tokenId, policy, policyFlag, policyResult)); in HWTEST_F() 284 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policyParent, policyFlag, persistResult)); in HWTEST_F() 330 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policySub, policyFlag, persistResult)); in HWTEST_F() 342 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policyParent, policyFlag, persistResult)); in HWTEST_F() 382 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policy, policyFlag, persistResult)); in HWTEST_F() 433 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policyParent, policyFlag, persistResult)); in HWTEST_F() 476 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policySub, policyFlag, persistResult)); in HWTEST_F() 524 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policyParent, policyFlag, persistResult)); in HWTEST_F() 571 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToke in HWTEST_F() [all...] |
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/persistpolicy_fuzzer/ |
H A D | persistpolicy_fuzzer.cpp | 40 SandboxManagerKit::SetPolicy(GetSelfTokenID(), policyVec, 1, result); in PersistPolicy()
|
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/persistpolicytoken_fuzzer/ |
H A D | persistpolicytoken_fuzzer.cpp | 41 SandboxManagerKit::SetPolicy(tokenId, policyVec, 1, result); in PersistPolicyToken()
|
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/unpersistpolicy_fuzzer/ |
H A D | unpersistpolicy_fuzzer.cpp | 41 SandboxManagerKit::SetPolicy(GetSelfTokenID(), policyVec, 1, result); in UnpersistPolicy()
|
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/unsetpolicy_fuzzer/ |
H A D | unsetpolilcy_fuzzer.cpp | 43 SandboxManagerKit::SetPolicy(GetSelfTokenID(), policyVec, 0, result); in UnSetPolicy()
|
/base/customization/enterprise_device_management/interfaces/inner_api/browser/include/ |
H A D | browser_proxy.h | 28 int32_t SetPolicy(const AppExecFwk::ElementName &admin, const std::string &appId, const std::string &policyName,
|
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/startaccessingpolicy_fuzzer/ |
H A D | startaccessingpolicy_fuzzer.cpp | 40 SandboxManagerKit::SetPolicy(GetSelfTokenID(), policyVec, 1, result); in StartAccessingPolicy()
|
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/unsetpolicyasync_fuzzer/ |
H A D | unsetpolicyasync_fuzzer.cpp | 43 SandboxManagerKit::SetPolicy(GetSelfTokenID(), policyVec, 0, result); in UnSetPolicyAsync()
|
/base/customization/enterprise_device_management/services/edm/src/ |
H A D | policy_manager.cpp | 57 ErrCode PolicyManager::SetPolicy(const std::string &adminName, const std::string &policyName, in SetPolicy() function in OHOS::EDM::PolicyManager 62 return userPolicyMgr->SetPolicy(adminName, policyName, adminPolicyValue, mergedPolicyValue); in SetPolicy()
|
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/unpersistpolicytoken_fuzzer/ |
H A D | unpersistpolicytoken_fuzzer.cpp | 40 SandboxManagerKit::SetPolicy(tokenId, policyVec, 1, result); in UnPersistPolicyToken()
|
/base/accesscontrol/sandbox_manager/test/fuzztest/innerkits/sandbox_manager/stopaccessingpolicy_fuzzer/ |
H A D | stopaccessingpolicy_fuzzer.cpp | 40 SandboxManagerKit::SetPolicy(GetSelfTokenID(), policyVec, 1, result); in StopAccessingPolicy()
|
/base/customization/enterprise_device_management/interfaces/kits/browser/include/ |
H A D | browser_addon.h | 41 static napi_value SetPolicy(napi_env env, napi_callback_info info);
|
/base/customization/enterprise_device_management/interfaces/kits/browser/src/ |
H A D | browser_addon.cpp | 29 DECLARE_NAPI_FUNCTION("setPolicySync", SetPolicy), in Init() 70 asyncCallbackInfo->ret = BrowserProxy::GetBrowserProxy()->SetPolicy(asyncCallbackInfo->elementName, in NativeSetPolicies() 111 napi_value BrowserAddon::SetPolicy(napi_env env, napi_callback_info info) in SetPolicy() function in BrowserAddon 129 int32_t retCode = BrowserProxy::GetBrowserProxy()->SetPolicy(asyncCallbackInfo->elementName, in SetPolicy()
|
/base/customization/enterprise_device_management/services/edm/include/ |
H A D | policy_manager.h | 44 ErrCode SetPolicy(const std::string &adminName, const std::string &policyName, const std::string &adminPolicyValue,
|
H A D | user_policy_manager.h | 75 ErrCode SetPolicy(const std::string &adminName, const std::string &policyName, const std::string &adminPolicyValue,
|
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/include/ |
H A D | sandbox_manager_kit.h | 75 static int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag,
|
H A D | sandbox_manager_proxy.h | 37 int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag,
|
/base/customization/enterprise_device_management/services/edm_plugin/include/ |
H A D | set_browser_policies_plugin.h | 51 ErrCode SetPolicy(const std::string policyData, std::string appid, std::string policyName,
|
/base/customization/enterprise_device_management/test/unittest/services/edm/include/ |
H A D | enterprise_device_mgr_ability_test.h | 39 void SetPolicy(const std::string& adminName, const std::string& policyName);
|
/base/security/permission_lite/services/ipc_auth/src/ |
H A D | ipc_auth_impl.c | 70 static void SetPolicy(const IpcPolicy *policy, PolicyTrans *policyTrans)
in SetPolicy() function 141 SetPolicy(&policy, *policies + index);
in SetPolicies()
|
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/include/service/ |
H A D | policy_info_manager.h | 91 int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag,
|