/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | short_grant_manager.cpp | 35 "ohos.permission.SHORT_TERM_WRITE_IMAGEVIDEO" 73 ACCESSTOKEN_LOG_INFO(LABEL, "Revoke permission task name:%{public}s", taskName.c_str()); in CancelTaskOfPermissionRevoking() 82 int ShortGrantManager::RefreshPermission(AccessTokenID tokenID, const std::string& permission, uint32_t onceTime) in RefreshPermission() argument 88 std::string taskName = TASK_NAME_SHORT_GRANT_PERMISSION + std::to_string(tokenID) + permission; in RefreshPermission() 92 shortGrantData_.begin(), shortGrantData_.end(), [tokenID, permission](const PermTimerData& data) { in RefreshPermission() 93 return data.tokenID == tokenID && data.permissionName == permission; in RefreshPermission() 97 auto iterator = std::find(g_shortGrantPermission.begin(), g_shortGrantPermission.end(), permission); in RefreshPermission() 99 ACCESSTOKEN_LOG_ERROR(LABEL, "Permission is not available to short grant: %{public}s!", permission.c_str()); in RefreshPermission() 104 data.permissionName = permission; in RefreshPermission() 107 int32_t ret = PermissionManager::GetInstance().GrantPermission(tokenID, permission, PERMISSION_USER_FIXE in RefreshPermission() 135 ClearShortPermissionData(AccessTokenID tokenID, const std::string& permission) ClearShortPermissionData() argument 179 ScheduleRevokeTask(AccessTokenID tokenID, const std::string& permission, const std::string& taskName, uint32_t cancelTimes) ScheduleRevokeTask() argument [all...] |
/base/customization/enterprise_device_management/services/edm/src/ |
H A D | permission_manager.cpp | 28 ErrCode PermissionManager::AddPermission(const std::string &permission, IPlugin::PermissionType permissionType) in AddPermission() argument 30 if (permission.empty()) { in AddPermission() 36 EDMLOGE("AddPermission::unknow permission type"); in AddPermission() 39 auto entry = permissions_.find(permission); in AddPermission() 41 AdminPermission adminPermission(permission, static_cast<AdminType>(permissionType)); in AddPermission() 42 permissions_.insert(std::make_pair(permission, adminPermission)); in AddPermission() 43 EDMLOGI("AddPermission::insert permission : %{public}s permissionType : %{public}d", in AddPermission() 44 permission.c_str(), static_cast<int32_t>(permissionType)); in AddPermission() 46 EDMLOGE("AddPermission::conflict permission type"); in AddPermission() 49 EDMLOGI("AddPermission::same permission ha in AddPermission() [all...] |
H A D | admin.cpp | 34 bool Admin::CheckPermission(const std::string &permission) in CheckPermission() argument 38 [&permission](const std::string &item) { return item == permission; }); in CheckPermission()
|
/base/security/access_token/frameworks/common/src/ |
H A D | permission_map.cpp | 30 /* first: permission name, second: true-user_grant/false-system_grant */ 31 {"ohos.permission.ANSWER_CALL", true}, 32 {"ohos.permission.READ_CALENDAR", true}, 33 {"ohos.permission.READ_CALL_LOG", true}, 34 {"ohos.permission.READ_CELL_MESSAGES", true}, 35 {"ohos.permission.READ_CONTACTS", true}, 36 {"ohos.permission.READ_MESSAGES", true}, 37 {"ohos.permission.RECEIVE_MMS", true}, 38 {"ohos.permission.RECEIVE_SMS", true}, 39 {"ohos.permission 549 TransferPermissionToOpcode(const std::string& permission, uint32_t& opCode) TransferPermissionToOpcode() argument 562 TransferOpcodeToPermission(uint32_t opCode, std::string& permission) TransferOpcodeToPermission() argument [all...] |
/base/security/access_token/interfaces/kits/capi/accesstoken/src/ |
H A D | ability_access_control.cpp | 25 bool OH_AT_CheckSelfPermission(const char *permission) in OH_AT_CheckSelfPermission() argument 27 if (permission == nullptr) { in OH_AT_CheckSelfPermission() 32 std::string permissionName(permission); in OH_AT_CheckSelfPermission()
|
/base/notification/distributed_notification_service/services/ans/src/ |
H A D | access_token_helper.cpp | 30 const std::string NOTIFICATION_ANS_CHECK_SA_PERMISSION = "notification.ces.check.sa.permission"; 36 const AccessTokenID &tokenCaller, const std::string &permission) in VerifyCallerPermission() 38 int result = AccessTokenKit::VerifyAccessToken(tokenCaller, permission); in VerifyCallerPermission() 80 bool AccessTokenHelper::CheckPermission(const std::string &permission) in CheckPermission() argument 86 bool result = VerifyCallerPermission(tokenCaller, permission); in CheckPermission() 89 permission.c_str(), callingUid, callingPid); in CheckPermission() 35 VerifyCallerPermission( const AccessTokenID &tokenCaller, const std::string &permission) VerifyCallerPermission() argument
|
/base/security/permission_lite/services/pms/src/ |
H A D | perm_operate.c | 23 int PermissionIsGranted(const TList *list, int uid, const char *permission)
in PermissionIsGranted() argument 32 if (strcmp(cur->permList[i].name, permission) == 0) {
in PermissionIsGranted() 41 int ModifyPermission(TNode *node, const char *permission, const enum IsGranted granted)
in ModifyPermission() argument 43 if (node == NULL || permission == NULL) {
in ModifyPermission() 48 if (strcmp(node->permList[i].name, permission) == 0) {
in ModifyPermission()
|
/base/useriam/user_auth_framework/services/core/inc/ |
H A D | ipc_common.h | 55 static bool CheckPermission(IPCObjectStub &stub, Permission permission); 83 static bool CheckNativeCallingProcessWhiteList(IPCObjectStub &stub, Permission permission); 84 static bool CheckDirectCallerAndFirstCallerIfSet(IPCObjectStub &stub, const std::string &permission); 85 static bool CheckDirectCaller(IPCObjectStub &stub, const std::string &permission); 87 static std::vector<std::pair<int32_t, std::string>> GetWhiteLists(Permission permission);
|
/base/customization/enterprise_device_management/test/unittest/services/edm/src/ |
H A D | permission_manager_test.cpp | 53 std::string("ohos.permission.EDM_TEST_PERMISSION"), IPlugin::PermissionType::NORMAL_DEVICE_ADMIN), in HWTEST_F() 65 std::string("ohos.permission.EDM_TEST_PERMISSION"), IPlugin::PermissionType::NORMAL_DEVICE_ADMIN); in HWTEST_F() 66 std::vector<std::string> permission = { in HWTEST_F() local 67 "ohos.permission.EDM_TEST_PERMISSION", "ohos.permission.EMD_TEST_PERMISSION_FAIL" }; in HWTEST_F() 69 PermissionManager::GetInstance()->GetReqPermission(permission, reqPermission); in HWTEST_F() 81 std::string("ohos.permission.EDM_TEST_ENT_PERMISSION"), IPlugin::PermissionType::SUPER_DEVICE_ADMIN); in HWTEST_F() 82 std::vector<std::string> permission = { in HWTEST_F() local 83 "ohos.permission.EDM_TEST_ENT_PERMISSION", "ohos.permission in HWTEST_F() [all...] |
/base/security/asset/services/core_service/src/operations/common/ |
H A D | permission_check.rs | 16 //! This module is used to check permission. 26 fn CheckPermission(permission: *const c_char) -> bool; in CheckPermission() 36 let permission = CString::new("ohos.permission.INTERACT_ACROSS_LOCAL_ACCOUNTS").unwrap(); 37 if unsafe { !CheckPermission(permission.as_ptr()) } {
|
/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/accesstoken_mock_test/ |
H A D | accesstoken_kit_test.cpp | 222 std::string permission = "ohos.permission.CAMERA"; in HWTEST_F() local 223 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(tokenId, permission)); in HWTEST_F() 224 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(tokenId, permission, true)); in HWTEST_F() 237 std::string permission = "ohos.permission.CAMERA"; in HWTEST_F() local 238 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(callerTokenID, firstTokenID, permission)); in HWTEST_F() 239 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(callerTokenID, firstTokenID, permission, true)); in HWTEST_F() 250 std::string permission = "ohos.permission in HWTEST_F() local 290 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local 304 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local 319 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local 366 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local 380 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local 578 std::string permission = "permission"; HWTEST_F() local [all...] |
/base/notification/common_event_service/services/src/ |
H A D | access_token_helper.cpp | 35 const std::string &permission) in VerifyAccessToken() 37 return (AccessTokenKit::VerifyAccessToken(callerToken, permission) == in VerifyAccessToken() 49 Permission permission = DelayedSingleton<CommonEventPermissionManager>::GetInstance()->GetEventPermission(event); in RecordSensitivePermissionUsage() local 50 if (!permission.isSensitive || permission.names.empty()) { in RecordSensitivePermissionUsage() 53 for (const auto &permissionName : permission.names) { in RecordSensitivePermissionUsage() 34 VerifyAccessToken(const AccessTokenID &callerToken, const std::string &permission) VerifyAccessToken() argument
|
/base/security/access_token/services/accesstokenmanager/test/unittest/ |
H A D | permission_definition_parser_test.cpp | 53 static const std::string SYSTEM_PERMISSION_A = "ohos.permission.PermDefParserTestA"; 54 static const std::string USER_PERMISSION_B = "ohos.permission.PermDefParserTestB"; 82 * @tc.desc: Parse permission definition information. 92 R"({"name":"ohos.permission.PermDefParserTestA","grantMode":"system_grant","availableLevel":"system_basic",)"\ in HWTEST_F() 95 R"({"name":"ohos.permission.PermDefParserTestB","grantMode":"user_grant","availableLevel":"system_basic",)"\ in HWTEST_F() 140 R"({"name":"ohos.permission.xxxxxxxxxxxxxxxxxxxxxxxxxx",)"\ in HWTEST_F() 159 R"({"name":"ohos.permission.PermDefParserTestA","grantMode":"system_grant","availableLevel":"system_basic",)"\ in HWTEST_F() 166 R"({"name":"ohos.permission.PermDefParserTestB","grantMode":"user_grant","availableLevel":"system_basic",)"\ in HWTEST_F() 192 R"({"name":"ohos.permission.PermDefParserTestA","availableLevel":"system_basic",)"\ in HWTEST_F() 200 R"({"name":"ohos.permission in HWTEST_F() [all...] |
/base/notification/distributed_notification_service/services/ans/test/unittest/access_token_helper_test/ |
H A D | access_token_helper_test.cpp | 70 string permission; in HWTEST_F() local 71 EXPECT_TRUE(stub_->VerifyCallerPermission(tokenID, permission)); in HWTEST_F() 142 std::string permission = "<permission>"; in HWTEST_F() local 144 ASSERT_EQ(stub_->CheckPermission(permission), true); in HWTEST_F()
|
/base/security/asset/test/unittest/module_test/src/ |
H A D | access_token_wrapper_test.cpp | 61 const char *permission = "ohos.permission.STORE_PERSISTENT_DATA" in HWTEST_F() local 62 ASSERT_EQ(false, CheckPermission(permission)); in HWTEST_F()
|
/base/security/permission_lite/services/pms/include/ |
H A D | perm_operate.h | 21 int PermissionIsGranted(const TList *list, int uid, const char *permission);
23 int ModifyPermission(TNode *node, const char *permission, const enum IsGranted granted);
|
/base/customization/enterprise_device_management/common/native/src/ |
H A D | edm_permission.cpp | 48 bool EdmPermission::operator == (const EdmPermission &permission) const in operator ==() 50 return (permissionName_ == permission.getPermissionName() && adminType_ == permission.getAdminType()); in operator ==()
|
/base/security/permission_lite/services/js_api/src/ |
H A D | perm_module.cpp | 33 char *permission = JSI::GetStringProperty(args[0], "permission");
in CheckSelfPerm() local 35 int ret = CheckSelfPermission(permission);
in CheckSelfPerm() 39 HILOG_ERROR(HILOG_MODULE_ACE, "Check permission failed.");
in CheckSelfPerm() 47 JSI::ReleaseString(permission);
in CheckSelfPerm()
|
/base/location/frameworks/location_common/common/source/ |
H A D | permission_manager.cpp | 34 bool PermissionManager::CheckPermission(const std::string &permission, uint32_t callerToken, uint32_t tokenFirstCaller) in CheckPermission() argument 40 LBSLOGD(LOCATOR, "tokenid = %{public}d has no permission.permission name=%{public}s", in CheckPermission() 41 callerToken, permission.c_str()); in CheckPermission() 44 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, permission); in CheckPermission() 47 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, tokenFirstCaller, permission); in CheckPermission() 52 LBSLOGD(LOCATOR, "tokenid = %{public}d has no permission.permission name=%{public}s", in CheckPermission() 53 callerToken, permission.c_str()); in CheckPermission()
|
/base/security/device_auth/frameworks/deviceauth_lite/source/struct/ |
H A D | add_auth_info_data.c | 61 int32_t permission = get_json_bool(obj, FIELD_PERMISSION); in parse_add_auth_info_data() local 62 if (permission == -1) { in parse_add_auth_info_data() 66 add_auth_data->permission = permission; in parse_add_auth_info_data() 107 add_auth_data->permission ? "true" : "false") < 0) { in make_add_auth_info_data()
|
/base/startup/appspawn/modules/sandbox/ |
H A D | appspawn_permission.c | 55 APPSPAWN_LOGV("Add permission name %{public}s ", name); in AddSandboxPermissionNode() 64 APPSPAWN_CHECK(node != NULL, return APPSPAWN_SYSTEM_ERROR, "Failed to create permission node"); in AddSandboxPermissionNode() 70 APPSPAWN_CHECK(node != NULL, return APPSPAWN_SYSTEM_ERROR, "Failed to create permission node"); in AddSandboxPermissionNode() 120 const SandboxPermissionNode *GetPermissionNodeInQueue(SandboxQueue *queue, const char *permission) in GetPermissionNodeInQueue() argument 122 if (queue == NULL || permission == NULL) { in GetPermissionNodeInQueue() 125 ListNode *node = OH_ListFind(&queue->front, (void *)permission, PermissionNodeCompareName); in GetPermissionNodeInQueue() 144 int32_t GetPermissionIndexInQueue(SandboxQueue *queue, const char *permission) in GetPermissionIndexInQueue() argument 146 APPSPAWN_CHECK_ONLY_EXPER(queue != NULL && permission != NULL, return INVALID_PERMISSION_INDEX); in GetPermissionIndexInQueue() 147 const SandboxPermissionNode *permissionNode = GetPermissionNodeInQueue(queue, permission); in GetPermissionIndexInQueue()
|
H A D | appspawn_permission.h | 42 int32_t GetPermissionIndexInQueue(SandboxQueue *queue, const char *permission); 43 const SandboxPermissionNode *GetPermissionNodeInQueue(SandboxQueue *queue, const char *permission);
|
/base/notification/distributed_notification_service/services/ans/include/ |
H A D | access_token_helper.h | 28 * @brief Verifies that the caller has the specified permission. 31 * @param permission The permission to be verified. 32 * @return Returns true if the caller has the specified permission, false otherwise. 35 const Security::AccessToken::AccessTokenID &tokenCaller, const std::string &permission); 40 static bool CheckPermission(const std::string &permission);
|
/base/security/asset/services/os_dependency/src/ |
H A D | access_token_wrapper.cpp | 47 bool CheckPermission(const char *permission) in CheckPermission() argument 50 int result = AccessTokenKit::VerifyAccessToken(tokenId, permission); in CheckPermission() 52 LOGI("[INFO]Check permission success!"); in CheckPermission() 55 LOGE("[FATAL]Check permission failed, ret=%{public}d", result); in CheckPermission()
|
/base/useriam/user_auth_framework/services/core/src/ |
H A D | ipc_common.cpp | 38 const std::string MANAGE_USER_IDM_PERMISSION = "ohos.permission.MANAGE_USER_IDM"; 39 const std::string USE_USER_IDM_PERMISSION = "ohos.permission.USE_USER_IDM"; 40 const std::string ACCESS_USER_AUTH_INTERNAL_PERMISSION = "ohos.permission.ACCESS_USER_AUTH_INTERNAL"; 41 const std::string ACCESS_BIOMETRIC_PERMISSION = "ohos.permission.ACCESS_BIOMETRIC"; 42 const std::string ACCESS_AUTH_RESPOOL = "ohos.permission.ACCESS_AUTH_RESPOOL"; 43 const std::string ENFORCE_USER_IDM = "ohos.permission.ENFORCE_USER_IDM"; 44 const std::string SUPPORT_USER_AUTH = "ohos.permission.SUPPORT_USER_AUTH"; 179 bool IpcCommon::CheckPermission(IPCObjectStub &stub, Permission permission) in CheckPermission() argument 181 switch (permission) { in CheckPermission() 184 CheckNativeCallingProcessWhiteList(stub, permission); in CheckPermission() 226 GetWhiteLists(Permission permission) GetWhiteLists() argument 246 CheckNativeCallingProcessWhiteList(IPCObjectStub &stub, Permission permission) CheckNativeCallingProcessWhiteList() argument 274 CheckDirectCallerAndFirstCallerIfSet(IPCObjectStub &stub, const std::string &permission) CheckDirectCallerAndFirstCallerIfSet() argument 287 CheckDirectCaller(IPCObjectStub &stub, const std::string &permission) CheckDirectCaller() argument [all...] |