/base/security/access_token/frameworks/accesstoken/src/ |
H A D | native_token_info_parcel.cpp | 29 RETURN_IF_FALSE(out.WriteInt32(this->nativeTokenInfoParams.apl)); in Marshalling() 41 int32_t apl; in Unmarshalling() local 42 RELEASE_IF_FALSE(in.ReadInt32(apl), nativeTokenInfoParcel); in Unmarshalling() 43 nativeTokenInfoParcel->nativeTokenInfoParams.apl = ATokenAplEnum(apl); in Unmarshalling()
|
H A D | hap_token_info_parcel.cpp | 24 RETURN_IF_FALSE(out.WriteInt32(this->hapTokenInfoParams.apl)); in Marshalling() 45 int apl; in Unmarshalling() local 47 RELEASE_IF_FALSE(in.ReadInt32(apl), hapTokenInfoParcel); in Unmarshalling() 48 hapTokenInfoParcel->hapTokenInfoParams.apl = ATokenAplEnum(apl); in Unmarshalling()
|
H A D | hap_policy_parcel.cpp | 30 RETURN_IF_FALSE(out.WriteInt32(this->hapPolicyParameter.apl)); in Marshalling() 79 int32_t apl; in Unmarshalling() local 80 RELEASE_IF_FALSE(in.ReadInt32(apl), hapPolicyParcel); in Unmarshalling() 81 hapPolicyParcel->hapPolicyParameter.apl = ATokenAplEnum(apl); in Unmarshalling()
|
/base/security/selinux_adapter/framework/policycoreutils/src/ |
H A D | hap_restorecon.cpp | 53 static const std::string APL_PREFIX = "apl="; 63 static const int CONTEXTS_LENGTH_MIN = 20; // sizeof("apl=x domain= type=") 110 contextBuff.apl = tmp.substr(tmp.find(APL_PREFIX) + APL_PREFIX.size()); in DecodeString() 155 static bool CheckApl(const std::string &apl) in CheckApl() argument 157 if (apl == "system_core" || apl == "system_basic" || apl == "normal") { in CheckApl() 169 keyPara = hapInfo->apl + "." + DEBUGGABLE + "." + INPUT_ISOLATE; in GetHapContextKey() 171 keyPara = hapInfo->apl + "." + INPUT_ISOLATE; in GetHapContextKey() 174 keyPara = hapInfo->apl in GetHapContextKey() 424 HapLabelLookup(const std::string &apl, const std::string &packageName, char **secontextPtr, unsigned int hapFlags) HapLabelLookup() argument 537 HapContextsLookup(bool isDomain, const std::string &apl, const std::string &packageName, context_t con, unsigned int hapFlags) HapContextsLookup() argument [all...] |
/base/security/selinux_adapter/interfaces/policycoreutils/include/ |
H A D | hap_restorecon.h | 34 std::string apl = ""; member 44 std::string apl; member 51 std::string apl; member 70 int HapLabelLookup(const std::string &apl, const std::string &packageName, 73 int HapContextsLookup(bool isDomain, const std::string &apl, const std::string &packageName,
|
/base/security/selinux_adapter/framework/tools/hap_restorecon/ |
H A D | test.cpp | 37 std::string apl = ""; member 55 printf(" -a (--apl) apl info. [eg: -a normal]\n"); in PrintUsage() 77 input.apl = optarg; in SetOptions() 118 {"help", no_argument, nullptr, 'h'}, {"apl", required_argument, nullptr, 'a'}, in main() 137 .apl = testCmd.apl, in main() 146 .apl = testCmd.apl, in main()
|
/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/src/ |
H A D | app_installation_optimized_test.cpp | 125 .apl = APL_NORMAL, 139 .apl = APL_NORMAL, 209 .apl = APL_SYSTEM_BASIC, in HWTEST_F() 238 .apl = APL_NORMAL, in HWTEST_F() 268 .apl = APL_NORMAL, in HWTEST_F() 302 .apl = APL_NORMAL, in HWTEST_F() 332 .apl = APL_SYSTEM_BASIC, in HWTEST_F() 352 .apl = APL_SYSTEM_BASIC, in HWTEST_F() 371 .apl = APL_SYSTEM_BASIC, in HWTEST_F() 390 .apl in HWTEST_F() [all...] |
/base/security/access_token/services/accesstokenmanager/test/unittest/ |
H A D | native_token_receptor_test.cpp | 280 .apl = APL_NORMAL, in HWTEST_F() 295 ASSERT_EQ(findInfo.apl, info.apl); in HWTEST_F() 312 GTEST_LOG_(INFO) << "apl " << nativeTokenValue.GetInt(TokenFiledConst::FIELD_APL); in HWTEST_F() 360 ASSERT_EQ(findInfo.apl, info.apl); in CompareGoalTokenInfo() 375 info1.apl = APL_NORMAL; in HWTEST_F() 383 info2.apl = APL_SYSTEM_BASIC; in HWTEST_F() 463 .apl = APL_NORMAL, in HWTEST_F() 472 .apl in HWTEST_F() [all...] |
/base/security/access_token/services/accesstokenmanager/main/cpp/src/token/ |
H A D | native_token_info_inner.cpp | 37 tokenInfoBasic_.apl = APL_NORMAL; in NativeTokenInfoInner() 93 "tokenID: %{public}u apl is error, value %{public}d", in RestoreNativeTokenInfo() 97 "ERROR_REASON", "native token apl error"); in RestoreNativeTokenInfo() 100 tokenInfoBasic_.apl = static_cast<ATokenAplEnum>(aplNum); in RestoreNativeTokenInfo() 125 value.Put(TokenFiledConst::FIELD_APL, tokenInfoBasic_.apl); in TransferNativeInfo() 147 return tokenInfoBasic_.apl; in GetApl() 202 info.append(R"( "apl": )" + std::to_string(tokenInfoBasic_.apl) + ",\n"); in ToString() 204 permPolicySet_->PermStateToString(tokenInfoBasic_.apl, tokenInfoBasic_.nativeAcls, info); in ToString()
|
H A D | hap_token_info_inner.cpp | 44 tokenInfoBasic_.apl = APL_NORMAL; in HapTokenInfoInner() 63 tokenInfoBasic_.apl = policy.apl; in HapTokenInfoInner() 90 const std::vector<PermissionStateFull>& permStateList, ATokenAplEnum apl) in Update() 94 tokenInfoBasic_.apl = apl; in Update() 125 outGenericValues.Put(TokenFiledConst::FIELD_APL, tokenInfoBasic_.apl); in TranslationIntoGenericValues() 163 tokenInfoBasic_.apl = static_cast<ATokenAplEnum>(aplNum); in RestoreHapTokenBasicInfo() 165 ACCESSTOKEN_LOG_ERROR(LABEL, "TokenID: 0x%{public}x apl is error, value %{public}d", in RestoreHapTokenBasicInfo() 168 HiviewDFX::HiSysEvent::EventType::FAULT, "CODE", LOAD_DATABASE_ERROR, "ERROR_REASON", "apl erro in RestoreHapTokenBasicInfo() 89 Update(const UpdateHapInfoParams& info, const std::vector<PermissionStateFull>& permStateList, ATokenAplEnum apl) Update() argument [all...] |
/base/security/access_token/services/accesstokenmanager/main/cpp/include/token/ |
H A D | native_token_info_base.h | 26 ATokenAplEnum apl; member 36 ATokenAplEnum apl; member
|
/base/startup/appspawn/modules/sandbox/ |
H A D | sandbox_adapter.cpp | 46 hapFileInfo.apl = msgDomainInfo->apl; in MakeAtomicServiceDir() 54 APPSPAWN_CHECK(ret == 0, return, "set dir %{public}s selinuxLabel failed, apl %{public}s, ret %{public}d", in MakeAtomicServiceDir() 55 path, hapFileInfo.apl.c_str(), ret); in MakeAtomicServiceDir()
|
/base/security/selinux_adapter/test/unittest/hap_restorecon/ |
H A D | unit_test.cpp | 75 .apl = SYSTEM_CORE_APL, 83 .apl = SYSTEM_CORE_APL, 91 .apl = "", 99 .apl = SYSTEM_CORE_APL, 107 .apl = INVALID_APL, 115 .apl = SYSTEM_CORE_APL, 123 .apl = SYSTEM_CORE_APL, 131 .apl = SYSTEM_CORE_APL, 139 .apl = SYSTEM_CORE_APL, 147 .apl [all...] |
/base/security/access_token/interfaces/innerkits/nativetoken/src/ |
H A D | nativetoken_json_oper.c | 73 int32_t apl = cJSON_GetNumberValue(aplJson); in GetAplFromJson() local 74 if (apl <= 0 || apl > SYSTEM_CORE) { in GetAplFromJson() 75 NativeTokenKmsg(NATIVETOKEN_KERROR, "[%s]:apl = %d in file is invalid.", __func__, apl); in GetAplFromJson() 78 tokenNode->apl = aplJson->valueint; in GetAplFromJson() 151 item = cJSON_CreateNumber(curr->apl); in SetNativeTokenJsonObject() 248 cJSON *itemApl = cJSON_CreateNumber(tokenNode->apl); in UpdateItemcontent()
|
H A D | nativetoken.c | 321 return SYSTEM_CORE; // system_core means apl level is 3 in GetAplLevel() 324 return SYSTEM_BASIC; // system_basic means apl level is 2 in GetAplLevel() 445 int32_t apl = GetAplLevel(tokenInfo->aplStr); in CheckProcessInfo() local 446 if (apl == 0) { in CheckProcessInfo() 449 *aplRet = apl; in CheckProcessInfo() 484 tokenNode->apl = aplIn; in AddNewTokenToListAndFile() 522 if (tokenNode->apl != aplIn) { in CompareTokenInfo() 578 tokenNode->apl = GetAplLevel(tokenInfo->aplStr); in UpdateTokenInfoInList() 638 int32_t apl; in GetAccessTokenId() local 644 uint32_t ret = CheckProcessInfo(tokenInfo, &apl); in GetAccessTokenId() [all...] |
/base/security/access_token/frameworks/common/src/ |
H A D | data_validator.cpp | 76 bool DataValidator::IsAplNumValid(const int apl) in IsAplNumValid() argument 78 return (apl == APL_NORMAL || apl == APL_SYSTEM_BASIC || apl == APL_SYSTEM_CORE); in IsAplNumValid()
|
/base/startup/init/services/init/standard/ |
H A D | init_service.c | 151 const char *apl = "system_basic";
in GetAccessToken() local 152 if (service->apl != NULL) {
in GetAccessToken() 153 apl = service->apl;
in GetAccessToken() 163 apl,
in GetAccessToken()
|
/base/security/access_token/services/tokensyncmanager/src/command/ |
H A D | base_remote_command.cpp | 114 {"apl", tokenInfo.baseInfo.apl},
in ToNativeTokenInfoJson() 166 {"apl", tokenInfo.baseInfo.apl},
in ToHapTokenInfosJson() 188 if (hapTokenJson.find("apl") != hapTokenJson.end() && hapTokenJson.at("apl").is_number()) {
in FromHapTokenBasicInfoJson() 189 int apl = hapTokenJson.at("apl").get<int>();
in FromHapTokenBasicInfoJson() local 190 if (DataValidator::IsAplNumValid(apl)) {
in FromHapTokenBasicInfoJson() 191 hapTokenBasicInfo.apl in FromHapTokenBasicInfoJson() 259 int apl = nativeTokenJson.at("apl").get<int>(); FromNativeTokenInfoJson() local [all...] |
/base/security/device_auth/services/frameworks/src/permission_adapter/ |
H A D | permission_adapter.cpp | 98 if ((findInfo.apl != APL_SYSTEM_CORE) && (findInfo.apl != APL_SYSTEM_BASIC)) {
in CheckPermission() 99 LOGE("Check permission(APL3=SYSTEM_CORE or APL2=SYSTEM_BASIC) failed! APL: %d", findInfo.apl);
in CheckPermission()
|
/base/security/access_token/interfaces/innerkits/accesstoken/include/ |
H A D | native_token_info.h | 57 * apl level, for details about the valid values, 60 ATokenAplEnum apl; member in OHOS::Security::AccessToken::final
|
H A D | hap_token_info.h | 95 * apl level, for details about the valid values, 98 ATokenAplEnum apl; member in OHOS::Security::AccessToken::final 155 * apl level, for details about the valid values, 158 ATokenAplEnum apl; member in OHOS::Security::AccessToken::final
|
/base/security/appverify/interfaces/innerkits/appverify/test/unittest/src/ |
H A D | provision_verify_test.cpp | 53 "apl": "normal", 75 })"; // apl not exist 93 "apl": "normal", 113 "apl": "normal", 138 "apl": "normal", 161 "apl": "normal", 185 "apl": "normal", 426 "apl": "normal", 475 "apl": "normal", 527 "apl" [all...] |
/base/security/code_signature/test/unittest/ |
H A D | rust_key_enable_test.rs | 126 "apl": "normal", in test_parse_enterprise_profile() 165 "apl": "normal", in test_parse_enterprise_normal_profile() 204 "apl": "normal", in test_parse_enterprise_mdm_profile() 243 "apl": "normal", in test_parse_debug_profile() 288 "apl": "normal", in test_parse_iternaltesting_profile() 332 "apl": "normal", in test_parse_invalid_profile() 367 "apl": "normal", in test_parse_invalid_profile() 403 "apl": "normal", in test_parse_invalid_profile()
|
/base/security/access_token/interfaces/innerkits/nativetoken/test/unittest/mock/ |
H A D | nativetoken_oper_test.cpp | 132 tokenNode.apl = 1; in HWTEST_F() 164 tokenNode.apl = 1; in HWTEST_F() 210 tokenNode.apl = 1; in HWTEST_F() 261 tokenNode.apl = 1; in HWTEST_F() 320 tokenNode.apl = 1; in HWTEST_F()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | permission_definition_parser.cpp | 65 static bool GetPermissionApl(const std::string &apl, AccessToken::ATokenAplEnum& aplNum) in GetPermissionApl() argument 67 if (apl == AVAILABLE_LEVEL_SYSTEM_CORE) { in GetPermissionApl() 71 if (apl == AVAILABLE_LEVEL_SYSTEM_BASIC) { in GetPermissionApl() 75 if (apl == AVAILABLE_LEVEL_NORMAL) { in GetPermissionApl() 79 ACCESSTOKEN_LOG_ERROR(LABEL, "Apl: %{public}s is invalid.", apl.c_str()); in GetPermissionApl()
|