/base/account/os_account/services/accountmgr/src/osaccount/ |
H A D | os_account_plugin_manager.cpp | 117 ErrCode OsAccountPluginManager::PluginVerifyActivationLockFunc(bool& isAllowed) in PluginVerifyActivationLockFunc() argument 138 isAllowed = future.get(); in PluginVerifyActivationLockFunc() 151 bool isAllowed = false; in IsCreationAllowed() 153 ErrCode res = PluginVerifyActivationLockFunc(isAllowed); in IsCreationAllowed() 159 return isAllowed; in IsCreationAllowed()
|
/base/security/access_token/test/fuzztest/services/privacy/sethapwithfgreminderstub_fuzzer/ |
H A D | sethapwithfgreminderstub_fuzzer.cpp | 72 bool isAllowed = fuzzData.GenerateRandomBool(); in SetHapWithFGReminderStubFuzzTest() local 79 if (!datas.WriteBool(isAllowed)) { in SetHapWithFGReminderStubFuzzTest()
|
/base/account/os_account/services/accountmgr/include/osaccount/ |
H A D | os_account_plugin_manager.h | 36 ErrCode PluginVerifyActivationLockFunc(bool& isAllowed);
|
/base/account/os_account/services/accountmgr/test/mock/os_account/ |
H A D | os_account_plugin_manager.h | 36 ErrCode PluginVerifyActivationLockFunc(bool& isAllowed);
|
H A D | os_account_plugin_manager.cpp | 69 ErrCode OsAccountPluginManager::PluginVerifyActivationLockFunc(bool& isAllowed) in PluginVerifyActivationLockFunc() argument
|
/base/customization/enterprise_device_management/services/edm_plugin/src/ |
H A D | allowed_usb_devices_plugin.cpp | 79 bool isAllowed = (std::find_if(mergeData.begin(), mergeData.end(), [item](UsbDeviceId trustItem) { in OnSetPolicy() local 82 if (srvClient.ManageDevice(item.GetVendorId(), item.GetProductId(), !isAllowed) != ERR_OK) { in OnSetPolicy() 84 item.GetVendorId(), item.GetProductId(), isAllowed); in OnSetPolicy()
|
/base/security/access_token/frameworks/privacy/include/ |
H A D | i_privacy_manager.h | 61 virtual int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) = 0;
|
/base/security/access_token/interfaces/inner_api/privacy/include/ |
H A D | privacy_kit.h | 197 * @param isAllowed allow or disallow 200 static int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed);
|
/base/security/access_token/frameworks/inner_api/privacy/src/ |
H A D | privacy_manager_client.h | 68 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed);
|
H A D | privacy_manager_proxy.h | 56 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) override;
|
H A D | privacy_manager_proxy.cpp | 498 int32_t PrivacyManagerProxy::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument 512 if (!data.WriteBool(isAllowed)) { in SetHapWithFGReminder() 513 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to WriteBool(%{public}d)", isAllowed); in SetHapWithFGReminder()
|
H A D | privacy_kit.cpp | 234 int32_t PrivacyKit::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument 239 return PrivacyManagerClient::GetInstance().SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminder()
|
H A D | privacy_manager_client.cpp | 373 int32_t PrivacyManagerClient::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument 380 return proxy->SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminder()
|
/base/security/access_token/services/privacymanager/include/service/ |
H A D | privacy_manager_service.h | 67 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) override;
|
/base/security/access_token/services/privacymanager/src/service/ |
H A D | privacy_manager_stub.cpp | 469 bool isAllowed; in SetHapWithFGReminderInner() local 470 if (!data.ReadBool(isAllowed)) { in SetHapWithFGReminderInner() 471 ACCESSTOKEN_LOG_ERROR(LABEL, "Failed to read isAllowed."); in SetHapWithFGReminderInner() 476 int32_t result = this->SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminderInner()
|
H A D | privacy_manager_service.cpp | 293 int32_t PrivacyManagerService::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument 295 ACCESSTOKEN_LOG_INFO(LABEL, "id: %{public}d, isAllowed: %{public}d", tokenId, isAllowed); in SetHapWithFGReminder() 296 return PermissionRecordManager::GetInstance().SetHapWithFGReminder(tokenId, isAllowed); in SetHapWithFGReminder()
|
/base/security/access_token/services/privacymanager/include/record/ |
H A D | permission_record_manager.h | 95 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed);
|
/base/notification/common_event_service/services/src/ |
H A D | inner_common_event_manager.cpp | 230 bool isAllowed = IsPublishAllowed(action, uid); in PublishCommonEvent() local 231 if (!isAllowed) { in PublishCommonEvent()
|
/base/security/access_token/services/privacymanager/src/record/ |
H A D | permission_record_manager.cpp | 1310 int32_t PermissionRecordManager::SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument 1318 if (iter == foreTokenIdList_.end() && isAllowed) { in SetHapWithFGReminder() 1323 if (iter != foreTokenIdList_.end() && !isAllowed) { in SetHapWithFGReminder()
|
/base/account/os_account/services/accountmgr/test/unittest/os_account/ |
H A D | os_account_inner_account_mgr_mock.cpp | 740 bool isAllowed = false; in HWTEST_F() local 741 EXPECT_EQ(ERR_OK, innerMgrService_->IsAllowedCreateAdmin(isAllowed)); in HWTEST_F() 742 EXPECT_TRUE(isAllowed); in HWTEST_F()
|
/base/notification/distributed_notification_service/services/ans/src/ |
H A D | reminder_data_manager.cpp | 1507 bool isAllowed = false; in IsAllowedNotify() local 1508 ErrCode errCode = advancedNotificationService_->IsSpecialBundleAllowedNotify(option, isAllowed); in IsAllowedNotify() 1513 return isAllowed; in IsAllowedNotify()
|
/base/powermgr/power_manager/services/native/src/ |
H A D | power_state_machine.cpp | 214 bool isAllowed = (!allowMapByReason_.count(reason) || in CanTransitTo() local 216 return isAllowed; in CanTransitTo()
|
/base/security/access_token/services/privacymanager/test/unittest/ |
H A D | privacy_manager_service_test.cpp | 333 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) in SetHapWithFGReminder() argument
|