/base/security/access_token/interfaces/innerkits/token_setproc/src/ |
H A D | perm_setproc.cpp | 49 uint32_t tokenID, const std::vector<uint32_t>& opCodeList, const std::vector<bool>& statusList) in AddPermissionToKernel() 51 if (opCodeList.size() != statusList.size()) { in AddPermissionToKernel() 65 if (statusList[i]) { // granted in AddPermissionToKernel() 48 AddPermissionToKernel( uint32_t tokenID, const std::vector<uint32_t>& opCodeList, const std::vector<bool>& statusList) AddPermissionToKernel() argument
|
/base/security/access_token/interfaces/innerkits/token_setproc/include/ |
H A D | perm_setproc.h | 24 uint32_t tokenID, const std::vector<uint32_t>& opCodeList, const std::vector<bool>& statusList);
|
/base/security/access_token/services/accesstokenmanager/main/cpp/include/token/ |
H A D | native_token_info_base.h | 39 std::vector<bool> statusList; member
|
/base/location/frameworks/native/geofence_sdk/source/ |
H A D | geofence_request.cpp | 93 void GeofenceRequest::SetGeofenceTransitionEventList(std::vector<GeofenceTransitionEvent> statusList)
in SetGeofenceTransitionEventList() argument 96 for (auto it = statusList.begin(); it != statusList.end(); ++it) {
in SetGeofenceTransitionEventList()
|
/base/security/access_token/interfaces/innerkits/token_setproc/test/unittest/src/ |
H A D | tokensetproc_kit_test.cpp | 72 std::vector<bool> statusList = {0, 0}; in HWTEST_F() local 73 ASSERT_EQ(ACCESS_TOKEN_PARAM_INVALID, AddPermissionToKernel(g_tokeId, opcodeList, statusList)); in HWTEST_F() 88 std::vector<bool> statusList; in HWTEST_F() local 89 ASSERT_EQ(ACCESS_TOKEN_OK, AddPermissionToKernel(g_tokeId, opcodeList, statusList)); in HWTEST_F() 226 std::vector<bool> statusList; in HWTEST_F() local 228 EXPECT_EQ(ACCESS_TOKEN_OK, AddPermissionToKernel(g_tokeId, opCodeList, statusList)); in HWTEST_F()
|
/base/location/interfaces/inner_api/include/ |
H A D | geofence_request.h | 61 void SetGeofenceTransitionEventList(std::vector<GeofenceTransitionEvent> statusList);
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | permission_manager.cpp | 883 std::vector<bool> statusList; in AddPermToKernel() local 884 policy->GetPermissionStateList(opCodeList, statusList); in AddPermToKernel() 885 int32_t ret = AddPermissionToKernel(tokenID, opCodeList, statusList); in AddPermToKernel() 909 std::vector<bool> statusList; in AddPermToKernel() local 911 policy->GetPermissionStateList(opCodeList, statusList); in AddPermToKernel() 916 statusList[i] = statusList[i] && isUserActive; in AddPermToKernel() 918 int32_t ret = AddPermissionToKernel(tokenID, opCodeList, statusList); in AddPermToKernel()
|
H A D | permission_policy_set.cpp | 540 void PermissionPolicySet::GetPermissionStateList(std::vector<uint32_t>& opCodeList, std::vector<bool>& statusList) in GetPermissionStateList() argument 547 statusList.emplace_back(state.grantStatus[0] == PERMISSION_GRANTED); in GetPermissionStateList()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/include/permission/ |
H A D | permission_policy_set.h | 69 void GetPermissionStateList(std::vector<uint32_t>& opCodeList, std::vector<bool>& statusList);
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/token/ |
H A D | accesstoken_info_manager.cpp | 313 policySet->GetPermissionStateList(nativeTokenInfoMap_[id].opCodeList, nativeTokenInfoMap_[id].statusList); in AddNativeTokenInfo() 682 nativeTokenInfoMap_[id].statusList.clear(); in TryUpdateExistNativeToken() 686 policySet->GetPermissionStateList(nativeTokenInfoMap_[id].opCodeList, nativeTokenInfoMap_[id].statusList); in TryUpdateExistNativeToken() 1749 return cache.statusList[i] ? PERMISSION_GRANTED : PERMISSION_DENIED; in VerifyNativeAccessToken()
|
/base/update/updateservice/frameworks/js/napi/update/common/src/ |
H A D | client_helper.cpp | 543 static const std::list<UpgradeStatus> statusList = { in GetOptionsFromArg() local 558 PARAM_CHECK(IsValidEnum(statusList, status), return ClientStatus::CLIENT_INVALID_TYPE, in GetOptionsFromArg()
|