Home
last modified time | relevance | path

Searched refs:isAllowed (Results 1 - 23 of 23) sorted by relevance

/base/account/os_account/services/accountmgr/src/osaccount/
H A Dos_account_plugin_manager.cpp117 ErrCode OsAccountPluginManager::PluginVerifyActivationLockFunc(bool& isAllowed) in PluginVerifyActivationLockFunc() argument
138 isAllowed = future.get(); in PluginVerifyActivationLockFunc()
151 bool isAllowed = false; in IsCreationAllowed()
153 ErrCode res = PluginVerifyActivationLockFunc(isAllowed); in IsCreationAllowed()
159 return isAllowed; in IsCreationAllowed()
/base/security/access_token/test/fuzztest/services/privacy/sethapwithfgreminderstub_fuzzer/
H A Dsethapwithfgreminderstub_fuzzer.cpp72 bool isAllowed = fuzzData.GenerateRandomBool(); in SetHapWithFGReminderStubFuzzTest() local
79 if (!datas.WriteBool(isAllowed)) { in SetHapWithFGReminderStubFuzzTest()
/base/account/os_account/services/accountmgr/include/osaccount/
H A Dos_account_plugin_manager.h36 ErrCode PluginVerifyActivationLockFunc(bool& isAllowed);
/base/account/os_account/services/accountmgr/test/mock/os_account/
H A Dos_account_plugin_manager.h36 ErrCode PluginVerifyActivationLockFunc(bool& isAllowed);
H A Dos_account_plugin_manager.cpp69 ErrCode OsAccountPluginManager::PluginVerifyActivationLockFunc(bool& isAllowed) in PluginVerifyActivationLockFunc() argument
/base/customization/enterprise_device_management/services/edm_plugin/src/
H A Dallowed_usb_devices_plugin.cpp79 bool isAllowed = (std::find_if(mergeData.begin(), mergeData.end(), [item](UsbDeviceId trustItem) { in OnSetPolicy() local
82 if (srvClient.ManageDevice(item.GetVendorId(), item.GetProductId(), !isAllowed) != ERR_OK) { in OnSetPolicy()
84 item.GetVendorId(), item.GetProductId(), isAllowed); in OnSetPolicy()
/base/security/access_token/frameworks/privacy/include/
H A Di_privacy_manager.h61 virtual int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) = 0;
/base/security/access_token/interfaces/inner_api/privacy/include/
H A Dprivacy_kit.h197 * @param isAllowed allow or disallow
200 static int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed);
/base/security/access_token/frameworks/inner_api/privacy/src/
H A Dprivacy_manager_client.h68 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed);
H A Dprivacy_manager_proxy.h56 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) override;
H A Dprivacy_manager_proxy.cpp498 int32_t PrivacyManagerProxy::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument
512 if (!data.WriteBool(isAllowed)) { in SetHapWithFGReminder()
513 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to WriteBool(%{public}d)", isAllowed); in SetHapWithFGReminder()
H A Dprivacy_kit.cpp234 int32_t PrivacyKit::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument
239 return PrivacyManagerClient::GetInstance().SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminder()
H A Dprivacy_manager_client.cpp373 int32_t PrivacyManagerClient::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument
380 return proxy->SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminder()
/base/security/access_token/services/privacymanager/include/service/
H A Dprivacy_manager_service.h67 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) override;
/base/security/access_token/services/privacymanager/src/service/
H A Dprivacy_manager_stub.cpp469 bool isAllowed; in SetHapWithFGReminderInner() local
470 if (!data.ReadBool(isAllowed)) { in SetHapWithFGReminderInner()
471 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to read isAllowed."); in SetHapWithFGReminderInner()
476 int32_t result = this->SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminderInner()
H A Dprivacy_manager_service.cpp293 int32_t PrivacyManagerService::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument
295 ACCESSTOKEN_LOG_INFO(LABEL, "id: %{public}d, isAllowed: %{public}d", tokenId, isAllowed); in SetHapWithFGReminder()
296 return PermissionRecordManager::GetInstance().SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminder()
/base/security/access_token/services/privacymanager/include/record/
H A Dpermission_record_manager.h95 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed);
/base/notification/common_event_service/services/src/
H A Dinner_common_event_manager.cpp230 bool isAllowed = IsPublishAllowed(action, uid); in PublishCommonEvent() local
231 if (!isAllowed) { in PublishCommonEvent()
/base/security/access_token/services/privacymanager/src/record/
H A Dpermission_record_manager.cpp1310 int32_t PermissionRecordManager::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument
1318 if (iter == foreTokenIdList_.end() && isAllowed) { in SetHapWithFGReminder()
1323 if (iter != foreTokenIdList_.end() && !isAllowed) { in SetHapWithFGReminder()
/base/account/os_account/services/accountmgr/test/unittest/os_account/
H A Dos_account_inner_account_mgr_mock.cpp740 bool isAllowed = false; in HWTEST_F() local
741 EXPECT_EQ(ERR_OK, innerMgrService_->IsAllowedCreateAdmin(isAllowed)); in HWTEST_F()
742 EXPECT_TRUE(isAllowed); in HWTEST_F()
/base/notification/distributed_notification_service/services/ans/src/
H A Dreminder_data_manager.cpp1507 bool isAllowed = false; in IsAllowedNotify() local
1508 ErrCode errCode = advancedNotificationService_->IsSpecialBundleAllowedNotify(option, isAllowed); in IsAllowedNotify()
1513 return isAllowed; in IsAllowedNotify()
/base/powermgr/power_manager/services/native/src/
H A Dpower_state_machine.cpp214 bool isAllowed = (!allowMapByReason_.count(reason) || in CanTransitTo() local
216 return isAllowed; in CanTransitTo()
/base/security/access_token/services/privacymanager/test/unittest/
H A Dprivacy_manager_service_test.cpp333 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument

Completed in 28 milliseconds