/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/src/ |
H A D | sandbox_manager_kit.cpp | 47 size_t policySize = policy.size(); in PersistPolicy() local 48 if (policySize == 0 || policySize > POLICY_VECTOR_SIZE_LIMIT) { in PersistPolicy() 49 SANDBOXMANAGER_LOG_ERROR(LABEL, "PolicySize = %{public}u", static_cast<uint32_t>(policySize)); in PersistPolicy() 59 size_t policySize = policy.size(); in UnPersistPolicy() local 60 if (policySize == 0 || policySize > POLICY_VECTOR_SIZE_LIMIT) { in UnPersistPolicy() 61 SANDBOXMANAGER_LOG_ERROR(LABEL, "PolicySize = %{public}u", static_cast<uint32_t>(policySize)); in UnPersistPolicy() 72 size_t policySize = policy.size(); in PersistPolicy() local 73 if ((policySize in PersistPolicy() 86 size_t policySize = policy.size(); UnPersistPolicy() local 99 size_t policySize = policy.size(); SetPolicy() local 131 size_t policySize = policy.size(); SetPolicyAsync() local 159 size_t policySize = policy.size(); CheckPolicy() local 175 size_t policySize = policy.size(); StartAccessingPolicy() local 187 size_t policySize = policy.size(); StopAccessingPolicy() local 200 size_t policySize = policy.size(); CheckPersistPolicy() local [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/src/service/ |
H A D | sandbox_manager_service.cpp | 146 size_t policySize = policy.size(); in PersistPolicy() local 147 if (policySize == 0 || policySize > POLICY_VECTOR_SIZE_LIMIT) { in PersistPolicy() 163 size_t policySize = policy.size(); in UnPersistPolicy() local 164 if (policySize == 0 || policySize > POLICY_VECTOR_SIZE_LIMIT) { in UnPersistPolicy() 175 size_t policySize = policy.size(); in PersistPolicyByTokenId() local 176 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in PersistPolicyByTokenId() 193 size_t policySize in UnPersistPolicyByTokenId() local 207 size_t policySize = policy.size(); SetPolicy() local 254 size_t policySize = policy.size(); CheckPolicy() local 271 size_t policySize = policy.size(); StartAccessingPolicy() local 284 size_t policySize = policy.size(); StopAccessingPolicy() local 296 size_t policySize = policy.size(); CheckPersistPolicy() local [all...] |
H A D | policy_info_manager.cpp | 148 size_t policySize = policy.size(); in AddPolicy() local 149 result.resize(policySize); in AddPolicy() 162 PolicyOperateInfo info(policySize, 0, policySize - invalidNum, invalidNum); in AddPolicy() 184 PolicyOperateInfo info(policySize, addPolicyIndex.size(), failNum, invalidNum); in AddPolicy() 192 size_t policySize = policies.size(); in FilterValidPolicyInBatch() local 193 for (size_t i = 0; i < policySize; ++i) { in FilterValidPolicyInBatch() 201 return policySize - passIndexes.size(); in FilterValidPolicyInBatch() 310 size_t policySize = policy.size(); in MatchPolicy() local 311 if (result.size() != policySize) { in MatchPolicy() 332 size_t policySize = policy.size(); RemovePolicy() local 381 size_t policySize = policy.size(); SetPolicy() local 560 size_t policySize = policy.size(); StartAccessingPolicy() local 615 size_t policySize = policy.size(); StopAccessingPolicy() local [all...] |
/base/security/permission_lite/services/ipc_auth/src/ |
H A D | ipc_auth_impl.c | 149 static int SetPresetPolicies(const PolicySetting presetPolicy[], int policySize, RegParams params,
in SetPresetPolicies() argument 152 for (int i = 0; i < policySize; i++) {
in SetPresetPolicies() 250 static int CheckSvcPolicies(const PolicySetting policySetting[], int policySize, const AuthParams *params)
in CheckSvcPolicies() argument 252 for (int i = 0; i < policySize; i++) {
in CheckSvcPolicies()
|
/base/security/dlp_permission_service/services/dlp_permission/sa/sa_main/ |
H A D | dlp_credential.cpp | 633 uint32_t policySize) in ParseStringVectorToUint8TypedArray() 636 if (memcpy_s(policy, policySize, &count, sizeof(uint32_t)) != EOK) { in ParseStringVectorToUint8TypedArray() 652 if (memcpy_s(policy + offset, policySize - offset, &length, sizeof(uint32_t)) != EOK) { in ParseStringVectorToUint8TypedArray() 657 if (memcpy_s(policy + offset, policySize - offset, appId, strlen(appId)) != EOK) { in ParseStringVectorToUint8TypedArray() 721 uint32_t policySize = (size(appIdList) + 1) * MAX_APPID_LENGTH; in SetMDMPolicy() local 722 uint8_t *policy = new (std::nothrow)uint8_t[policySize]; in SetMDMPolicy() 734 int32_t policyLen = ParseStringVectorToUint8TypedArray(presetAppIdList, policy, policySize); in SetMDMPolicy() 632 ParseStringVectorToUint8TypedArray(const std::vector<std::string>& appIdList, uint8_t *policy, uint32_t policySize) ParseStringVectorToUint8TypedArray() argument
|
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/test/unittest/src/ |
H A D | sandbox_manager_kit_test.cpp | 782 uint64_t policySize = 2; // 2 is policy size in HWTEST_F() local 800 ASSERT_EQ(policySize, policyResult.size()); in HWTEST_F() 806 ASSERT_EQ(policySize, result.size()); in HWTEST_F() 811 ASSERT_EQ(policySize, policyResult.size()); in HWTEST_F()
|