Home
last modified time | relevance | path

Searched refs:permission (Results 1 - 25 of 199) sorted by relevance

12345678

/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/
H A Dshort_grant_manager.cpp35 "ohos.permission.SHORT_TERM_WRITE_IMAGEVIDEO"
73 ACCESSTOKEN_LOG_INFO(LABEL, "Revoke permission task name:%{public}s", taskName.c_str()); in CancelTaskOfPermissionRevoking()
82 int ShortGrantManager::RefreshPermission(AccessTokenID tokenID, const std::string& permission, uint32_t onceTime) in RefreshPermission() argument
88 std::string taskName = TASK_NAME_SHORT_GRANT_PERMISSION + std::to_string(tokenID) + permission; in RefreshPermission()
92 shortGrantData_.begin(), shortGrantData_.end(), [tokenID, permission](const PermTimerData& data) { in RefreshPermission()
93 return data.tokenID == tokenID && data.permissionName == permission; in RefreshPermission()
97 auto iterator = std::find(g_shortGrantPermission.begin(), g_shortGrantPermission.end(), permission); in RefreshPermission()
99 ACCESSTOKEN_LOG_ERROR(LABEL, "Permission is not available to short grant: %{public}s!", permission.c_str()); in RefreshPermission()
104 data.permissionName = permission; in RefreshPermission()
107 int32_t ret = PermissionManager::GetInstance().GrantPermission(tokenID, permission, PERMISSION_USER_FIXE in RefreshPermission()
135 ClearShortPermissionData(AccessTokenID tokenID, const std::string& permission) ClearShortPermissionData() argument
179 ScheduleRevokeTask(AccessTokenID tokenID, const std::string& permission, const std::string& taskName, uint32_t cancelTimes) ScheduleRevokeTask() argument
[all...]
/base/customization/enterprise_device_management/services/edm/src/
H A Dpermission_manager.cpp28 ErrCode PermissionManager::AddPermission(const std::string &permission, IPlugin::PermissionType permissionType) in AddPermission() argument
30 if (permission.empty()) { in AddPermission()
36 EDMLOGE("AddPermission::unknow permission type"); in AddPermission()
39 auto entry = permissions_.find(permission); in AddPermission()
41 AdminPermission adminPermission(permission, static_cast<AdminType>(permissionType)); in AddPermission()
42 permissions_.insert(std::make_pair(permission, adminPermission)); in AddPermission()
43 EDMLOGI("AddPermission::insert permission : %{public}s permissionType : %{public}d", in AddPermission()
44 permission.c_str(), static_cast<int32_t>(permissionType)); in AddPermission()
46 EDMLOGE("AddPermission::conflict permission type"); in AddPermission()
49 EDMLOGI("AddPermission::same permission ha in AddPermission()
[all...]
H A Dadmin.cpp34 bool Admin::CheckPermission(const std::string &permission) in CheckPermission() argument
38 [&permission](const std::string &item) { return item == permission; }); in CheckPermission()
/base/security/access_token/frameworks/common/src/
H A Dpermission_map.cpp30 /* first: permission name, second: true-user_grant/false-system_grant */
31 {"ohos.permission.ANSWER_CALL", true},
32 {"ohos.permission.READ_CALENDAR", true},
33 {"ohos.permission.READ_CALL_LOG", true},
34 {"ohos.permission.READ_CELL_MESSAGES", true},
35 {"ohos.permission.READ_CONTACTS", true},
36 {"ohos.permission.READ_MESSAGES", true},
37 {"ohos.permission.RECEIVE_MMS", true},
38 {"ohos.permission.RECEIVE_SMS", true},
39 {"ohos.permission
549 TransferPermissionToOpcode(const std::string& permission, uint32_t& opCode) TransferPermissionToOpcode() argument
562 TransferOpcodeToPermission(uint32_t opCode, std::string& permission) TransferOpcodeToPermission() argument
[all...]
/base/security/access_token/interfaces/kits/capi/accesstoken/src/
H A Dability_access_control.cpp25 bool OH_AT_CheckSelfPermission(const char *permission) in OH_AT_CheckSelfPermission() argument
27 if (permission == nullptr) { in OH_AT_CheckSelfPermission()
32 std::string permissionName(permission); in OH_AT_CheckSelfPermission()
/base/notification/distributed_notification_service/services/ans/src/
H A Daccess_token_helper.cpp30 const std::string NOTIFICATION_ANS_CHECK_SA_PERMISSION = "notification.ces.check.sa.permission";
36 const AccessTokenID &tokenCaller, const std::string &permission) in VerifyCallerPermission()
38 int result = AccessTokenKit::VerifyAccessToken(tokenCaller, permission); in VerifyCallerPermission()
80 bool AccessTokenHelper::CheckPermission(const std::string &permission) in CheckPermission() argument
86 bool result = VerifyCallerPermission(tokenCaller, permission); in CheckPermission()
89 permission.c_str(), callingUid, callingPid); in CheckPermission()
35 VerifyCallerPermission( const AccessTokenID &tokenCaller, const std::string &permission) VerifyCallerPermission() argument
/base/security/permission_lite/services/pms/src/
H A Dperm_operate.c23 int PermissionIsGranted(const TList *list, int uid, const char *permission) in PermissionIsGranted() argument
32 if (strcmp(cur->permList[i].name, permission) == 0) { in PermissionIsGranted()
41 int ModifyPermission(TNode *node, const char *permission, const enum IsGranted granted) in ModifyPermission() argument
43 if (node == NULL || permission == NULL) { in ModifyPermission()
48 if (strcmp(node->permList[i].name, permission) == 0) { in ModifyPermission()
/base/useriam/user_auth_framework/services/core/inc/
H A Dipc_common.h55 static bool CheckPermission(IPCObjectStub &stub, Permission permission);
83 static bool CheckNativeCallingProcessWhiteList(IPCObjectStub &stub, Permission permission);
84 static bool CheckDirectCallerAndFirstCallerIfSet(IPCObjectStub &stub, const std::string &permission);
85 static bool CheckDirectCaller(IPCObjectStub &stub, const std::string &permission);
87 static std::vector<std::pair<int32_t, std::string>> GetWhiteLists(Permission permission);
/base/customization/enterprise_device_management/test/unittest/services/edm/src/
H A Dpermission_manager_test.cpp53 std::string("ohos.permission.EDM_TEST_PERMISSION"), IPlugin::PermissionType::NORMAL_DEVICE_ADMIN), in HWTEST_F()
65 std::string("ohos.permission.EDM_TEST_PERMISSION"), IPlugin::PermissionType::NORMAL_DEVICE_ADMIN); in HWTEST_F()
66 std::vector<std::string> permission = { in HWTEST_F() local
67 "ohos.permission.EDM_TEST_PERMISSION", "ohos.permission.EMD_TEST_PERMISSION_FAIL" }; in HWTEST_F()
69 PermissionManager::GetInstance()->GetReqPermission(permission, reqPermission); in HWTEST_F()
81 std::string("ohos.permission.EDM_TEST_ENT_PERMISSION"), IPlugin::PermissionType::SUPER_DEVICE_ADMIN); in HWTEST_F()
82 std::vector<std::string> permission = { in HWTEST_F() local
83 "ohos.permission.EDM_TEST_ENT_PERMISSION", "ohos.permission in HWTEST_F()
[all...]
/base/security/asset/services/core_service/src/operations/common/
H A Dpermission_check.rs16 //! This module is used to check permission.
26 fn CheckPermission(permission: *const c_char) -> bool; in CheckPermission()
36 let permission = CString::new("ohos.permission.INTERACT_ACROSS_LOCAL_ACCOUNTS").unwrap();
37 if unsafe { !CheckPermission(permission.as_ptr()) } {
/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/accesstoken_mock_test/
H A Daccesstoken_kit_test.cpp222 std::string permission = "ohos.permission.CAMERA"; in HWTEST_F() local
223 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(tokenId, permission)); in HWTEST_F()
224 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(tokenId, permission, true)); in HWTEST_F()
237 std::string permission = "ohos.permission.CAMERA"; in HWTEST_F() local
238 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(callerTokenID, firstTokenID, permission)); in HWTEST_F()
239 ASSERT_EQ(PERMISSION_DENIED, AccessTokenKit::VerifyAccessToken(callerTokenID, firstTokenID, permission, true)); in HWTEST_F()
250 std::string permission = "ohos.permission in HWTEST_F() local
290 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local
304 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local
319 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local
366 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local
380 std::string permission = "ohos.permission.CAMERA"; HWTEST_F() local
578 std::string permission = "permission"; HWTEST_F() local
[all...]
/base/notification/common_event_service/services/src/
H A Daccess_token_helper.cpp35 const std::string &permission) in VerifyAccessToken()
37 return (AccessTokenKit::VerifyAccessToken(callerToken, permission) == in VerifyAccessToken()
49 Permission permission = DelayedSingleton<CommonEventPermissionManager>::GetInstance()->GetEventPermission(event); in RecordSensitivePermissionUsage() local
50 if (!permission.isSensitive || permission.names.empty()) { in RecordSensitivePermissionUsage()
53 for (const auto &permissionName : permission.names) { in RecordSensitivePermissionUsage()
34 VerifyAccessToken(const AccessTokenID &callerToken, const std::string &permission) VerifyAccessToken() argument
/base/security/access_token/services/accesstokenmanager/test/unittest/
H A Dpermission_definition_parser_test.cpp53 static const std::string SYSTEM_PERMISSION_A = "ohos.permission.PermDefParserTestA";
54 static const std::string USER_PERMISSION_B = "ohos.permission.PermDefParserTestB";
82 * @tc.desc: Parse permission definition information.
92 R"({"name":"ohos.permission.PermDefParserTestA","grantMode":"system_grant","availableLevel":"system_basic",)"\ in HWTEST_F()
95 R"({"name":"ohos.permission.PermDefParserTestB","grantMode":"user_grant","availableLevel":"system_basic",)"\ in HWTEST_F()
140 R"({"name":"ohos.permission.xxxxxxxxxxxxxxxxxxxxxxxxxx",)"\ in HWTEST_F()
159 R"({"name":"ohos.permission.PermDefParserTestA","grantMode":"system_grant","availableLevel":"system_basic",)"\ in HWTEST_F()
166 R"({"name":"ohos.permission.PermDefParserTestB","grantMode":"user_grant","availableLevel":"system_basic",)"\ in HWTEST_F()
192 R"({"name":"ohos.permission.PermDefParserTestA","availableLevel":"system_basic",)"\ in HWTEST_F()
200 R"({"name":"ohos.permission in HWTEST_F()
[all...]
/base/notification/distributed_notification_service/services/ans/test/unittest/access_token_helper_test/
H A Daccess_token_helper_test.cpp70 string permission; in HWTEST_F() local
71 EXPECT_TRUE(stub_->VerifyCallerPermission(tokenID, permission)); in HWTEST_F()
142 std::string permission = "<permission>"; in HWTEST_F() local
144 ASSERT_EQ(stub_->CheckPermission(permission), true); in HWTEST_F()
/base/security/asset/test/unittest/module_test/src/
H A Daccess_token_wrapper_test.cpp61 const char *permission = "ohos.permission.STORE_PERSISTENT_DATA" in HWTEST_F() local
62 ASSERT_EQ(false, CheckPermission(permission)); in HWTEST_F()
/base/security/permission_lite/services/pms/include/
H A Dperm_operate.h21 int PermissionIsGranted(const TList *list, int uid, const char *permission);
23 int ModifyPermission(TNode *node, const char *permission, const enum IsGranted granted);
/base/customization/enterprise_device_management/common/native/src/
H A Dedm_permission.cpp48 bool EdmPermission::operator == (const EdmPermission &permission) const in operator ==()
50 return (permissionName_ == permission.getPermissionName() && adminType_ == permission.getAdminType()); in operator ==()
/base/security/permission_lite/services/js_api/src/
H A Dperm_module.cpp33 char *permission = JSI::GetStringProperty(args[0], "permission"); in CheckSelfPerm() local
35 int ret = CheckSelfPermission(permission); in CheckSelfPerm()
39 HILOG_ERROR(HILOG_MODULE_ACE, "Check permission failed."); in CheckSelfPerm()
47 JSI::ReleaseString(permission); in CheckSelfPerm()
/base/location/frameworks/location_common/common/source/
H A Dpermission_manager.cpp34 bool PermissionManager::CheckPermission(const std::string &permission, uint32_t callerToken, uint32_t tokenFirstCaller) in CheckPermission() argument
40 LBSLOGD(LOCATOR, "tokenid = %{public}d has no permission.permission name=%{public}s", in CheckPermission()
41 callerToken, permission.c_str()); in CheckPermission()
44 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, permission); in CheckPermission()
47 result = Security::AccessToken::AccessTokenKit::VerifyAccessToken(callerToken, tokenFirstCaller, permission); in CheckPermission()
52 LBSLOGD(LOCATOR, "tokenid = %{public}d has no permission.permission name=%{public}s", in CheckPermission()
53 callerToken, permission.c_str()); in CheckPermission()
/base/security/device_auth/frameworks/deviceauth_lite/source/struct/
H A Dadd_auth_info_data.c61 int32_t permission = get_json_bool(obj, FIELD_PERMISSION); in parse_add_auth_info_data() local
62 if (permission == -1) { in parse_add_auth_info_data()
66 add_auth_data->permission = permission; in parse_add_auth_info_data()
107 add_auth_data->permission ? "true" : "false") < 0) { in make_add_auth_info_data()
/base/startup/appspawn/modules/sandbox/
H A Dappspawn_permission.c55 APPSPAWN_LOGV("Add permission name %{public}s ", name); in AddSandboxPermissionNode()
64 APPSPAWN_CHECK(node != NULL, return APPSPAWN_SYSTEM_ERROR, "Failed to create permission node"); in AddSandboxPermissionNode()
70 APPSPAWN_CHECK(node != NULL, return APPSPAWN_SYSTEM_ERROR, "Failed to create permission node"); in AddSandboxPermissionNode()
120 const SandboxPermissionNode *GetPermissionNodeInQueue(SandboxQueue *queue, const char *permission) in GetPermissionNodeInQueue() argument
122 if (queue == NULL || permission == NULL) { in GetPermissionNodeInQueue()
125 ListNode *node = OH_ListFind(&queue->front, (void *)permission, PermissionNodeCompareName); in GetPermissionNodeInQueue()
144 int32_t GetPermissionIndexInQueue(SandboxQueue *queue, const char *permission) in GetPermissionIndexInQueue() argument
146 APPSPAWN_CHECK_ONLY_EXPER(queue != NULL && permission != NULL, return INVALID_PERMISSION_INDEX); in GetPermissionIndexInQueue()
147 const SandboxPermissionNode *permissionNode = GetPermissionNodeInQueue(queue, permission); in GetPermissionIndexInQueue()
H A Dappspawn_permission.h42 int32_t GetPermissionIndexInQueue(SandboxQueue *queue, const char *permission);
43 const SandboxPermissionNode *GetPermissionNodeInQueue(SandboxQueue *queue, const char *permission);
/base/notification/distributed_notification_service/services/ans/include/
H A Daccess_token_helper.h28 * @brief Verifies that the caller has the specified permission.
31 * @param permission The permission to be verified.
32 * @return Returns true if the caller has the specified permission, false otherwise.
35 const Security::AccessToken::AccessTokenID &tokenCaller, const std::string &permission);
40 static bool CheckPermission(const std::string &permission);
/base/security/asset/services/os_dependency/src/
H A Daccess_token_wrapper.cpp47 bool CheckPermission(const char *permission) in CheckPermission() argument
50 int result = AccessTokenKit::VerifyAccessToken(tokenId, permission); in CheckPermission()
52 LOGI("[INFO]Check permission success!"); in CheckPermission()
55 LOGE("[FATAL]Check permission failed, ret=%{public}d", result); in CheckPermission()
/base/useriam/user_auth_framework/services/core/src/
H A Dipc_common.cpp38 const std::string MANAGE_USER_IDM_PERMISSION = "ohos.permission.MANAGE_USER_IDM";
39 const std::string USE_USER_IDM_PERMISSION = "ohos.permission.USE_USER_IDM";
40 const std::string ACCESS_USER_AUTH_INTERNAL_PERMISSION = "ohos.permission.ACCESS_USER_AUTH_INTERNAL";
41 const std::string ACCESS_BIOMETRIC_PERMISSION = "ohos.permission.ACCESS_BIOMETRIC";
42 const std::string ACCESS_AUTH_RESPOOL = "ohos.permission.ACCESS_AUTH_RESPOOL";
43 const std::string ENFORCE_USER_IDM = "ohos.permission.ENFORCE_USER_IDM";
44 const std::string SUPPORT_USER_AUTH = "ohos.permission.SUPPORT_USER_AUTH";
179 bool IpcCommon::CheckPermission(IPCObjectStub &stub, Permission permission) in CheckPermission() argument
181 switch (permission) { in CheckPermission()
184 CheckNativeCallingProcessWhiteList(stub, permission); in CheckPermission()
226 GetWhiteLists(Permission permission) GetWhiteLists() argument
246 CheckNativeCallingProcessWhiteList(IPCObjectStub &stub, Permission permission) CheckNativeCallingProcessWhiteList() argument
274 CheckDirectCallerAndFirstCallerIfSet(IPCObjectStub &stub, const std::string &permission) CheckDirectCallerAndFirstCallerIfSet() argument
287 CheckDirectCaller(IPCObjectStub &stub, const std::string &permission) CheckDirectCaller() argument
[all...]

Completed in 9 milliseconds

12345678