Home
last modified time | relevance | path

Searched refs:permissionName (Results 1 - 25 of 269) sorted by relevance

1234567891011

/base/telephony/core_service/utils/common/src/
H A Dtelephony_permission.cpp66 * @param permissionName permission name.
69 bool TelephonyPermission::CheckPermission(const std::string &permissionName) in CheckPermission() argument
71 if (permissionName.empty()) { in CheckPermission()
78 int result = AccessTokenKit::VerifyAccessToken(callerToken, permissionName); in CheckPermission()
80 if (permissionName == Permission::ANSWER_CALL || permissionName == Permission::READ_CALL_LOG in CheckPermission()
81 || permissionName == Permission::READ_CONTACTS || permissionName == Permission::WRITE_CONTACTS in CheckPermission()
82 || permissionName == Permission::SEND_MESSAGES) { in CheckPermission()
87 int32_t ret = PrivacyKit::AddPermissionUsedRecord(callerToken, permissionName, successCoun in CheckPermission()
[all...]
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/
H A Dpermission_policy_set.cpp100 return permStateNew.permissionName == permStateOld.permissionName; in Update()
140 if (state.permissionName == iter->permissionName) { in MergePermissionStateFull()
144 ACCESSTOKEN_LOG_DEBUG(LABEL, "Update permission: %{public}s.", state.permissionName.c_str()); in MergePermissionStateFull()
148 ACCESSTOKEN_LOG_DEBUG(LABEL, "Add permission: %{public}s.", state.permissionName.c_str()); in MergePermissionStateFull()
155 ACCESSTOKEN_LOG_DEBUG(LABEL, "PermissionName: %{public}s", permissionState.permissionName.c_str()); in StorePermissionState()
204 PermUsedTypeEnum PermissionPolicySet::GetPermissionUsedType(const std::string& permissionName) in GetPermissionUsedType() argument
208 [permissionName](const PermissionStateFull& permState) { in GetPermissionUsedType()
209 return permissionName in GetPermissionUsedType()
244 VerifyPermissionStatus(const std::string& permissionName) VerifyPermissionStatus() argument
279 IsPermissionGrantedWithSecComp(const std::string& permissionName) IsPermissionGrantedWithSecComp() argument
316 QueryPermissionFlag(const std::string& permissionName, int& flag) QueryPermissionFlag() argument
340 UpdatePermStateList(const std::string& permissionName, bool isGranted, uint32_t flag) UpdatePermStateList() argument
365 SecCompGrantedPermListUpdated(const std::string& permissionName, bool isAdded) SecCompGrantedPermListUpdated() argument
392 SetPermissionFlag(const std::string& permissionName, uint32_t flag, bool needToAdd) SetPermissionFlag() argument
409 UpdateSecCompGrantedPermList(const std::string& permissionName, bool isToGrant) UpdateSecCompGrantedPermList() argument
441 UpdatePermissionStatus(const std::string& permissionName, bool isGranted, uint32_t flag) UpdatePermissionStatus() argument
673 IsPermissionReqValid(int32_t tokenApl, const std::string& permissionName, const std::vector<std::string>& nativeAcls) IsPermissionReqValid() argument
[all...]
H A Dpermission_manager.cpp131 if (!PermissionDefinitionCache::GetInstance().HasDefinition(perm.permissionName)) { in AddDefPermissions()
135 ACCESSTOKEN_LOG_INFO(LABEL, "Permission %{public}s has define", perm.permissionName.c_str()); in AddDefPermissions()
146 int PermissionManager::VerifyHapAccessToken(AccessTokenID tokenID, const std::string& permissionName) in VerifyHapAccessToken() argument
160 return permPolicySet->VerifyPermissionStatus(permissionName); in VerifyHapAccessToken()
164 AccessTokenID tokenID, const std::string& permissionName) in GetPermissionUsedType()
173 int ret = GetDefPermission(permissionName, permissionDefResult); in GetPermissionUsedType()
175 ACCESSTOKEN_LOG_ERROR(LABEL, "Query permission info of %{public}s failed.", permissionName.c_str()); in GetPermissionUsedType()
186 return permPolicySet->GetPermissionUsedType(permissionName); in GetPermissionUsedType()
189 int PermissionManager::GetDefPermission(const std::string& permissionName, PermissionDef& permissionDefResult) in GetDefPermission() argument
191 if (!PermissionValidator::IsPermissionNameValid(permissionName)) { in GetDefPermission()
163 GetPermissionUsedType( AccessTokenID tokenID, const std::string& permissionName) GetPermissionUsedType() argument
323 GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, uint32_t& flag) GetPermissionFlag() argument
350 FindPermRequestToggleStatusFromDb(int32_t userID, const std::string& permissionName) FindPermRequestToggleStatusFromDb() argument
367 AddPermRequestToggleStatusToDb( int32_t userID, const std::string& permissionName, int32_t status) AddPermRequestToggleStatusToDb() argument
383 SetPermissionRequestToggleStatus(const std::string& permissionName, uint32_t status, int32_t userID) SetPermissionRequestToggleStatus() argument
423 GetPermissionRequestToggleStatus(const std::string& permissionName, uint32_t& status, int32_t userID) GetPermissionRequestToggleStatus() argument
454 ParamUpdate(const std::string& permissionName, uint32_t flag, bool filtered) ParamUpdate() argument
469 NotifyWhenPermissionStateUpdated(AccessTokenID tokenID, const std::string& permissionName, bool isGranted, uint32_t flag, const std::shared_ptr<HapTokenInfoInner>& infoPtr) NotifyWhenPermissionStateUpdated() argument
552 UpdatePermission(AccessTokenID tokenID, const std::string& permissionName, bool isGranted, uint32_t flag, bool needKill) UpdatePermission() argument
576 CheckAndUpdatePermission(AccessTokenID tokenID, const std::string& permissionName, bool isGranted, uint32_t flag) CheckAndUpdatePermission() argument
603 GrantPermission(AccessTokenID tokenID, const std::string& permissionName, uint32_t flag) GrantPermission() argument
611 RevokePermission(AccessTokenID tokenID, const std::string& permissionName, uint32_t flag) RevokePermission() argument
619 GrantPermissionForSpecifiedTime( AccessTokenID tokenID, const std::string& permissionName, uint32_t onceTime) GrantPermissionForSpecifiedTime() argument
716 IsPermissionVaild(const std::string& permissionName) IsPermissionVaild() argument
932 SetPermToKernel(AccessTokenID tokenID, const std::string& permissionName, bool isGranted) SetPermToKernel() argument
980 IsUserGrantPermPreAuthorized(const std::vector<PreAuthorizationInfo> &list, const std::string &permissionName, bool &userCancelable) IsUserGrantPermPreAuthorized() argument
[all...]
H A Ddlp_permission_set_manager.cpp55 auto it = dlpPermissionModeMap_.find(iter->permissionName); in ProcessDlpPermInfos()
59 iter->permissionName.c_str(), iter->dlpMode); in ProcessDlpPermInfos()
62 dlpPermissionModeMap_[iter->permissionName] = iter->dlpMode; in ProcessDlpPermInfos()
66 int32_t DlpPermissionSetManager::GetPermDlpMode(const std::string& permissionName) in GetPermDlpMode() argument
68 auto it = dlpPermissionModeMap_.find(permissionName); in GetPermDlpMode()
71 permissionName.c_str()); in GetPermDlpMode()
74 return dlpPermissionModeMap_[permissionName]; in GetPermDlpMode()
85 int32_t permissionDlpMode = GetPermDlpMode(iter->permissionName); in UpdatePermStateWithDlpInfo()
94 const std::string& permissionName) in IsPermissionAvailableToDlpHap()
96 int32_t permissionDlpMode = GetPermDlpMode(permissionName); in IsPermissionAvailableToDlpHap()
93 IsPermissionAvailableToDlpHap(int32_t hapDlpType, const std::string& permissionName) IsPermissionAvailableToDlpHap() argument
[all...]
H A Dpermission_definition_cache.cpp56 auto it = permissionDefinitionMap_.find(info.permissionName); in Insert()
59 info.permissionName.c_str()); in Insert()
62 permissionDefinitionMap_[info.permissionName].permDef = info; in Insert()
63 permissionDefinitionMap_[info.permissionName].tokenId = tokenId; in Insert()
73 permissionDefinitionMap_[info.permissionName].permDef = info; in Update()
74 permissionDefinitionMap_[info.permissionName].tokenId = tokenId; in Update()
91 int PermissionDefinitionCache::FindByPermissionName(const std::string& permissionName, PermissionDef& info) in FindByPermissionName() argument
94 auto it = permissionDefinitionMap_.find(permissionName); in FindByPermissionName()
97 permissionName.c_str()); in FindByPermissionName()
104 bool PermissionDefinitionCache::IsSystemGrantedPermission(const std::string& permissionName) in IsSystemGrantedPermission() argument
110 IsUserGrantedPermission(const std::string& permissionName) IsUserGrantedPermission() argument
116 IsGrantedModeEqualInner(const std::string& permissionName, int grantMode) const IsGrantedModeEqualInner() argument
125 HasDefinition(const std::string& permissionName) HasDefinition() argument
135 HasHapPermissionDefinitionForHap(const std::string& permissionName) HasHapPermissionDefinitionForHap() argument
[all...]
/base/telephony/core_service/test/unittest/core_service_gtest/
H A Dnetwork_search_manager_test.h41 .permissionName = "ohos.permission.LOCATION",
55 .permissionName = "ohos.permission.LOCATION",
60 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
74 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
79 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
93 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
98 .permissionName = "ohos.permission.GET_NETWORK_INFO",
112 .permissionName = "ohos.permission.GET_NETWORK_INFO",
117 .permissionName = "ohos.permission.READ_CONTACTS",
131 .permissionName
[all...]
H A Dsecurity_token.cpp38 .permissionName = "ohos.permission.LOCATION",
52 .permissionName = "ohos.permission.LOCATION",
57 .permissionName = "ohos.permission.CELL_LOCATION",
71 .permissionName = "ohos.permission.CELL_LOCATION",
76 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
90 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
95 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
109 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
114 .permissionName = "ohos.permission.GET_NETWORK_INFO",
128 .permissionName
[all...]
H A Dcore_service_test.h37 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
51 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
56 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
70 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
75 .permissionName = "ohos.permission.GET_NETWORK_INFO",
89 .permissionName = "ohos.permission.GET_NETWORK_INFO",
94 .permissionName = "ohos.permission.WRITE_CONTACTS",
108 .permissionName = "ohos.permission.WRITE_CONTACTS",
113 .permissionName = "ohos.permission.READ_CONTACTS",
127 .permissionName
[all...]
/base/telephony/sms_mms/test/gtest/
H A Dsms_mms_gtest.h36 .permissionName = "ohos.permission.RECEIVE_SMS",
46 .permissionName = "ohos.permission.RECEIVE_SMS",
53 .permissionName = "ohos.permission.SEND_MESSAGES",
63 .permissionName = "ohos.permission.SEND_MESSAGES",
70 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
80 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
87 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
97 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
104 .permissionName = "ohos.permission.READ_MESSAGES",
114 .permissionName
[all...]
/base/telephony/state_registry/test/unittest/state_test/
H A Dstate_registry_branch_test.h36 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
50 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
55 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
69 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
74 .permissionName = "ohos.permission.GET_NETWORK_INFO",
88 .permissionName = "ohos.permission.GET_NETWORK_INFO",
93 .permissionName = "ohos.permission.WRITE_CONTACTS",
107 .permissionName = "ohos.permission.WRITE_CONTACTS",
112 .permissionName = "ohos.permission.READ_CONTACTS",
126 .permissionName
[all...]
/base/security/permission_lite/services/pms/include/
H A Dpms.h31 int IsPermissionValid(const char *permissionName);
33 int IsPermissionRestricted(const char *permissionName);
41 int CheckPermissionStat(int uid, const char *permissionName);
51 int UpdatePermissionFlags(const char *identifier, const char *permissionName, const int flags);
53 int GrantRuntimePermission(int uid, const char *permissionName);
55 int RevokeRuntimePermission(int uid, const char *permissionName);
H A Dpms_inner.h31 int (*CheckPermission)(int uid, const char *permissionName);
35 int (*GrantRuntimePermission)(int uid, const char *permissionName);
36 int (*RevokeRuntimePermission)(int uid, const char *permissionName);
37 int (*UpdatePermissionFlags)(const char *identifier, const char *permissionName, int flags);
/base/telephony/call_manager/test/unittest/call_manager_zero_gtest/include/
H A Dcall_manager_connect.h66 .permissionName = "ohos.permission.PLACE_CALL",
80 .permissionName = "ohos.permission.PLACE_CALL",
85 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
99 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
104 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
118 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
123 .permissionName = "ohos.permission.ANSWER_CALL",
137 .permissionName = "ohos.permission.ANSWER_CALL",
142 .permissionName = "ohos.permission.READ_CALL_LOG",
156 .permissionName
[all...]
/base/security/permission_lite/interfaces/kits/
H A Dpms_interface.h57 * @param permissionName Indicates the pointer to the permission name.
63 int CheckPermission(int uid, const char *permissionName);
69 * @param permissionName Indicates the pointer to the permission name.
75 int CheckSelfPermission(const char *permissionName);
126 * @param permissionName Indicates the pointer to the permission name.
135 int UpdatePermissionFlags(const char *identifier, const char *permissionName, const int flags);
144 * @param permissionName Indicates the pointer to the permission name.
152 int GrantRuntimePermission(int uid, const char *permissionName);
161 * @param permissionName Indicates the pointer to the permission name.
169 int RevokeRuntimePermission(int uid, const char *permissionName);
[all...]
/base/security/access_token/interfaces/innerkits/accesstoken/src/
H A Daccesstoken_kit.cpp44 AccessTokenID tokenID, const std::string& permissionName) in GetPermissionUsedType()
46 ACCESSTOKEN_LOG_DEBUG(LABEL, "TokenID=%{public}d, permissionName=%{public}s.", in GetPermissionUsedType()
47 tokenID, permissionName.c_str()); in GetPermissionUsedType()
48 if ((tokenID == INVALID_TOKENID) || (!DataValidator::IsPermissionNameValid(permissionName))) { in GetPermissionUsedType()
52 return AccessTokenManagerClient::GetInstance().GetPermissionUsedType(tokenID, permissionName); in GetPermissionUsedType()
56 AccessTokenID tokenID, const std::string& permissionName, uint32_t onceTime) in GrantPermissionForSpecifiedTime()
58 ACCESSTOKEN_LOG_INFO(LABEL, "TokenID=%{public}d, permissionName=%{public}s, onceTime=%{public}d.", in GrantPermissionForSpecifiedTime()
59 tokenID, permissionName.c_str(), onceTime); in GrantPermissionForSpecifiedTime()
64 if (!DataValidator::IsPermissionNameValid(permissionName)) { in GrantPermissionForSpecifiedTime()
65 ACCESSTOKEN_LOG_ERROR(LABEL, "Invalid permissionName"); in GrantPermissionForSpecifiedTime()
43 GetPermissionUsedType( AccessTokenID tokenID, const std::string& permissionName) GetPermissionUsedType() argument
55 GrantPermissionForSpecifiedTime( AccessTokenID tokenID, const std::string& permissionName, uint32_t onceTime) GrantPermissionForSpecifiedTime() argument
248 VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName, bool crossIpc) VerifyAccessToken() argument
269 VerifyAccessToken( AccessTokenID callerTokenID, AccessTokenID firstTokenID, const std::string& permissionName, bool crossIpc) VerifyAccessToken() argument
284 VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName) VerifyAccessToken() argument
300 VerifyAccessToken( AccessTokenID callerTokenID, AccessTokenID firstTokenID, const std::string& permissionName) VerifyAccessToken() argument
315 GetDefPermission(const std::string& permissionName, PermissionDef& permissionDefResult) GetDefPermission() argument
353 GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, uint32_t& flag) GetPermissionFlag() argument
368 GrantPermission(AccessTokenID tokenID, const std::string& permissionName, uint32_t flag) GrantPermission() argument
387 RevokePermission(AccessTokenID tokenID, const std::string& permissionName, uint32_t flag) RevokePermission() argument
416 SetPermissionRequestToggleStatus(const std::string& permissionName, uint32_t status, int32_t userID = 0) SetPermissionRequestToggleStatus() argument
436 GetPermissionRequestToggleStatus(const std::string& permissionName, uint32_t& status, int32_t userID = 0) GetPermissionRequestToggleStatus() argument
[all...]
/base/security/security_component_manager/services/security_component_service/sa/test/mock/src/
H A Daccesstoken_kit.cpp27 int AccessTokenKit::RevokePermission(AccessTokenID tokenID, const std::string& permissionName, int flag) in RevokePermission() argument
35 permMap_[tokenID].erase(permissionName); in RevokePermission()
42 int AccessTokenKit::GrantPermission(AccessTokenID tokenID, const std::string& permissionName, int flag) in GrantPermission() argument
47 iter->second.insert(permissionName); in GrantPermission()
51 permSet.insert(permissionName); in GrantPermission()
56 int AccessTokenKit::VerifyAccessToken(AccessTokenID tokenID, const std::string& permissionName) in VerifyAccessToken() argument
60 if (iter == permMap_.end() || permMap_[tokenID].count(permissionName) < 1) { in VerifyAccessToken()
/base/telephony/telephony_data/common/src/
H A Dpermission_util.cpp28 * @param permissionName permission name.
31 bool PermissionUtil::CheckPermission(const std::string &permissionName) in CheckPermission() argument
33 if (permissionName.empty()) { in CheckPermission()
39 int result = AccessTokenKit::VerifyAccessToken(callerToken, permissionName); in CheckPermission()
42 permissionName.c_str(), callerToken); in CheckPermission()
/base/security/access_token/services/accesstokenmanager/main/cpp/include/permission/
H A Dpermission_manager.h63 int VerifyHapAccessToken(AccessTokenID tokenID, const std::string& permissionName);
64 PermUsedTypeEnum GetPermissionUsedType(AccessTokenID tokenID, const std::string& permissionName);
65 int GetDefPermission(const std::string& permissionName, PermissionDef& permissionDefResult);
69 int GetPermissionFlag(AccessTokenID tokenID, const std::string& permissionName, uint32_t& flag);
70 int32_t SetPermissionRequestToggleStatus(const std::string& permissionName, uint32_t status, int32_t userID);
71 int32_t GetPermissionRequestToggleStatus(const std::string& permissionName, uint32_t& status, int32_t userID);
72 int32_t CheckAndUpdatePermission(AccessTokenID tokenID, const std::string& permissionName,
74 int32_t UpdatePermission(AccessTokenID tokenID, const std::string& permissionName,
76 int32_t GrantPermission(AccessTokenID tokenID, const std::string& permissionName, uint32_t flag);
77 int32_t RevokePermission(AccessTokenID tokenID, const std::string& permissionName, uint32_
[all...]
H A Dpermission_definition_cache.h43 int FindByPermissionName(const std::string& permissionName, PermissionDef& info);
45 bool IsSystemGrantedPermission(const std::string& permissionName);
47 bool IsUserGrantedPermission(const std::string& permissionName);
49 bool HasDefinition(const std::string& permissionName);
61 bool HasHapPermissionDefinitionForHap(const std::string& permissionName);
68 bool IsGrantedModeEqualInner(const std::string& permissionName, int grantMode) const;
/base/sensors/sensor/utils/common/src/
H A Dpermission_util.cpp46 std::string permissionName = sensorPermissions_[sensorTypeId]; in CheckSensorPermission() local
47 int32_t ret = AccessTokenKit::VerifyAccessToken(callerToken, permissionName); in CheckSensorPermission()
48 if ((permissionName == ACTIVITY_MOTION_PERMISSION) in CheckSensorPermission()
49 || (permissionName == READ_HEALTH_DATA_PERMISSION)) { in CheckSensorPermission()
50 AddPermissionRecord(callerToken, permissionName, (ret == PERMISSION_GRANTED)); in CheckSensorPermission()
55 void PermissionUtil::AddPermissionRecord(AccessTokenID tokenID, const std::string &permissionName, bool status) in AddPermissionRecord() argument
59 int32_t ret = PrivacyKit::AddPermissionUsedRecord(tokenID, permissionName, successCount, failCount); in AddPermissionRecord()
61 SEN_HILOGE("AddPermissionUsedRecord fail, permissionName:%{public}s, successCount:%{public}d, failCount:%{public}d", in AddPermissionRecord()
62 permissionName.c_str(), successCount, failCount); in AddPermissionRecord()
/base/telephony/core_service/services/network_search/test/
H A Dtest.h38 .permissionName = "ohos.permission.LOCATION",
52 .permissionName = "ohos.permission.LOCATION",
57 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
71 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
76 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
90 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
95 .permissionName = "ohos.permission.GET_NETWORK_INFO",
109 .permissionName = "ohos.permission.GET_NETWORK_INFO",
/base/telephony/sms_mms/test/unittest/
H A Daccess_mms_token.h36 .permissionName = "ohos.permission.RECEIVE_SMS",
46 .permissionName = "ohos.permission.RECEIVE_SMS",
53 .permissionName = "ohos.permission.SEND_MESSAGES",
63 .permissionName = "ohos.permission.SEND_MESSAGES",
70 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
80 .permissionName = "ohos.permission.SET_TELEPHONY_STATE",
88 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
98 .permissionName = "ohos.permission.GET_TELEPHONY_STATE",
/base/security/access_token/frameworks/inner_api/privacy/src/
H A Dprivacy_kit.cpp41 return std::to_string(record.tokenId) + "_" + record.permissionName + "_" + std::to_string(record.type); in GetRecordUniqueStr()
70 int32_t PrivacyKit::AddPermissionUsedRecord(AccessTokenID tokenID, const std::string& permissionName, in AddPermissionUsedRecord() argument
75 info.permissionName = permissionName; in AddPermissionUsedRecord()
84 (!DataValidator::IsPermissionNameValid(info.permissionName)) || in AddPermissionUsedRecord()
99 int32_t PrivacyKit::StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName, int32_t pid) in StartUsingPermission() argument
101 if (!DataValidator::IsTokenIDValid(tokenID) || !DataValidator::IsPermissionNameValid(permissionName)) { in StartUsingPermission()
107 return PrivacyManagerClient::GetInstance().StartUsingPermission(tokenID, pid, permissionName); in StartUsingPermission()
110 int32_t PrivacyKit::StartUsingPermission(AccessTokenID tokenID, const std::string& permissionName, in StartUsingPermission() argument
113 if (!DataValidator::IsTokenIDValid(tokenID) || !DataValidator::IsPermissionNameValid(permissionName)) { in StartUsingPermission()
122 StopUsingPermission(AccessTokenID tokenID, const std::string& permissionName, int32_t pid) StopUsingPermission() argument
181 IsAllowedUsingPermission(AccessTokenID tokenID, const std::string& permissionName) IsAllowedUsingPermission() argument
213 GetPermissionUsedTypeInfos(const AccessTokenID tokenId, const std::string& permissionName, std::vector<PermissionUsedTypeInfo>& results) GetPermissionUsedTypeInfos() argument
[all...]
/base/security/access_token/services/accesstokenmanager/test/unittest/
H A Dpermission_grant_event_test.cpp54 std::string permissionName = "testpremission"; in HWTEST_F() local
58 eventHandler.AddEvent(tokenID, permissionName, time); in HWTEST_F()
76 std::string permissionName = "testpremission"; in HWTEST_F() local
80 eventHandler.AddEvent(tokenID, permissionName, time); in HWTEST_F()
98 std::string permissionName = "testpremission"; in HWTEST_F() local
102 eventHandler.AddEvent(tokenID, permissionName, time); in HWTEST_F()
/base/sensors/medical_sensor/utils/src/
H A Dpermission_util.cpp45 std::string permissionName = sensorPermissions_[sensorTypeId]; in CheckSensorPermission() local
46 int32_t ret = AccessTokenKit::VerifyAccessToken(callerToken, permissionName); in CheckSensorPermission()
47 AddPermissionRecord(callerToken, permissionName, (ret == PERMISSION_GRANTED)); in CheckSensorPermission()
51 void PermissionUtil::AddPermissionRecord(AccessTokenID tokenID, const std::string& permissionName, bool status) in AddPermissionRecord() argument
55 int32_t ret = PrivacyKit::AddPermissionUsedRecord(tokenID, permissionName, successCount, failCount); in AddPermissionRecord()
58 "AddPermissionUsedRecord fail,permissionName:%{public}s,successCount:%{public}d,failCount:%{public}d", in AddPermissionRecord()
59 permissionName.c_str(), successCount, failCount); in AddPermissionRecord()

Completed in 9 milliseconds

1234567891011