/base/security/security_component_manager/services/security_component_service/sa/sa_main/ |
H A D | sec_comp_perm_manager.cpp | 43 bool SecCompPermManager::DelaySaveRevokePermission(AccessToken::AccessTokenID tokenId, const std::string& taskName) in DelaySaveRevokePermission() argument 50 std::function<void()> delayed = ([tokenId]() { in DelaySaveRevokePermission() 52 SecCompPermManager::GetInstance().RevokeTempSavePermissionCount(tokenId); in DelaySaveRevokePermission() 72 int32_t SecCompPermManager::GrantTempSavePermission(AccessToken::AccessTokenID tokenId) in GrantTempSavePermission() argument 75 std::string taskName = std::to_string(tokenId) + std::to_string(current); in GrantTempSavePermission() 76 if (!DelaySaveRevokePermission(tokenId, taskName)) { in GrantTempSavePermission() 80 saveTaskDequeMap_[tokenId].push_back(taskName); in GrantTempSavePermission() 81 applySaveCountMap_[tokenId]++; in GrantTempSavePermission() 82 SC_LOG_DEBUG(LABEL, "tokenId: %{public}d current permission apply counts is: %{public}d.", in GrantTempSavePermission() 83 tokenId, applySaveCountMap in GrantTempSavePermission() 87 RevokeTempSavePermissionCount(AccessToken::AccessTokenID tokenId) RevokeTempSavePermissionCount() argument 113 RevokeTempSavePermission(AccessToken::AccessTokenID tokenId) RevokeTempSavePermission() argument 128 VerifySavePermission(AccessToken::AccessTokenID tokenId) VerifySavePermission() argument 139 VerifyPermission(AccessToken::AccessTokenID tokenId, SecCompType type) VerifyPermission() argument 162 AddAppGrantPermissionRecord(AccessToken::AccessTokenID tokenId, const std::string& permissionName) AddAppGrantPermissionRecord() argument 175 RemoveAppGrantPermissionRecord(AccessToken::AccessTokenID tokenId, const std::string& permissionName) RemoveAppGrantPermissionRecord() argument 186 GrantAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName) GrantAppPermission() argument 199 RevokeAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName) RevokeAppPermission() argument 212 RevokeAppPermissions(AccessToken::AccessTokenID tokenId) RevokeAppPermissions() argument 218 RevokeAppPermisionsDelayed(AccessToken::AccessTokenID tokenId) RevokeAppPermisionsDelayed() argument 236 RevokeAppPermisionsImmediately(AccessToken::AccessTokenID tokenId) RevokeAppPermisionsImmediately() argument 254 CancelAppRevokingPermisions(AccessToken::AccessTokenID tokenId) CancelAppRevokingPermisions() argument 272 IsDlpSandboxCalling(AccessToken::AccessTokenID tokenId) IsDlpSandboxCalling() argument 278 GrantTempPermission(AccessToken::AccessTokenID tokenId, const std::shared_ptr<SecCompBase>& componentInfo) GrantTempPermission() argument [all...] |
H A D | sec_comp_perm_manager.h | 35 int32_t GrantTempPermission(AccessToken::AccessTokenID tokenId, 37 int32_t GrantTempSavePermission(AccessToken::AccessTokenID tokenId); 38 void RevokeTempSavePermission(AccessToken::AccessTokenID tokenId); 39 bool VerifySavePermission(AccessToken::AccessTokenID tokenId); 40 bool VerifyPermission(AccessToken::AccessTokenID tokenId, SecCompType type); 42 int32_t GrantAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName); 43 int32_t RevokeAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName); 44 void RevokeAppPermissions(AccessToken::AccessTokenID tokenId); 49 void RevokeAppPermisionsDelayed(AccessToken::AccessTokenID tokenId); 50 void CancelAppRevokingPermisions(AccessToken::AccessTokenID tokenId); [all...] |
/base/useriam/pin_auth/services/modules/inputters/src/ |
H A D | pin_auth_manager.cpp | 27 bool PinAuthManager::RegisterInputer(uint32_t tokenId, const sptr<InputerGetData> &inputer) in RegisterInputer() argument 30 IAM_LOGI("start, tokenId = %{public}s", GET_MASKED_STRING(tokenId).c_str()); in RegisterInputer() 31 if (pinAuthInputerMap_.find(tokenId) != pinAuthInputerMap_.end()) { in RegisterInputer() 39 pinAuthInputerMap_.emplace(tokenId, inputer); in RegisterInputer() 40 sptr<IRemoteObject::DeathRecipient> dr(new (std::nothrow) ResPinauthInputerDeathRecipient(tokenId)); in RegisterInputer() 44 pinAuthDeathMap_.emplace(tokenId, dr); in RegisterInputer() 53 void PinAuthManager::UnRegisterInputer(uint32_t tokenId) in UnRegisterInputer() argument 56 IAM_LOGI("start, tokenId = %{public}s", GET_MASKED_STRING(tokenId) in UnRegisterInputer() 73 GetInputerLock(uint32_t tokenId) GetInputerLock() argument 87 ResPinauthInputerDeathRecipient(uint32_t tokenId) ResPinauthInputerDeathRecipient() argument [all...] |
/base/usb/usb_manager/test/native/service_unittest/src/ |
H A D | usb_common_test.cpp | 78 uint64_t tokenId = GetAccessTokenId(infoInstance);
in SetTestCaseNative() local 79 int ret = SetSelfTokenID(tokenId);
in SetTestCaseNative() 159 AccessTokenID tokenId = 0;
in AllocHapTest() local 162 tokenId = tokenIdEx.tokenIdExStruct.tokenID;
in AllocHapTest() 163 if (tokenId != 0) {
in AllocHapTest() 164 USB_HILOGI(MODULE_USB_SERVICE, "AllocHapToken success, tokenId: %{public}d", tokenId);
in AllocHapTest() 166 USB_HILOGE(MODULE_USB_SERVICE, "AllocHapToken fail,tokenId: %{public}d", tokenId);
in AllocHapTest() 168 return tokenId;
in AllocHapTest() 172 AccessTokenID tokenId = 0; AllocHapTestWithUserIdDiff() local 185 AccessTokenID tokenId = 0; AllocHapTestWithIndexDiff() local 197 SetSelfToken(AccessTokenID tokenId) SetSelfToken() argument 213 DeleteAllocHapToken(AccessTokenID tokenId) DeleteAllocHapToken() argument [all...] |
/base/location/frameworks/location_common/common/source/ |
H A D | permission_manager.cpp | 29 bool PermissionManager::CheckLocationPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckLocationPermission() argument 31 return CheckPermission(ACCESS_LOCATION, tokenId, firstTokenId); in CheckLocationPermission() 58 bool PermissionManager::CheckRssProcessName(uint32_t tokenId) in CheckRssProcessName() argument 61 Security::AccessToken::AccessTokenKit::GetNativeTokenInfo(tokenId, callingTokenInfo); in CheckRssProcessName() 69 bool PermissionManager::CheckBackgroundPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckBackgroundPermission() argument 71 return CheckPermission(ACCESS_BACKGROUND_LOCATION, tokenId, firstTokenId); in CheckBackgroundPermission() 74 bool PermissionManager::CheckMockLocationPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckMockLocationPermission() argument 76 return CheckPermission(ACCESS_MOCK_LOCATION, tokenId, firstTokenId); in CheckMockLocationPermission() 79 bool PermissionManager::CheckApproximatelyPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckApproximatelyPermission() argument 81 return CheckPermission(ACCESS_APPROXIMATELY_LOCATION, tokenId, firstTokenI in CheckApproximatelyPermission() 84 CheckSecureSettings(uint32_t tokenId, uint32_t firstTokenId) CheckSecureSettings() argument 99 GetPermissionLevel(uint32_t tokenId, uint32_t firstTokenId) GetPermissionLevel() argument 131 CheckIsSystemSa(uint32_t tokenId) CheckIsSystemSa() argument [all...] |
/base/useriam/pin_auth/test/unittest/src/ |
H A D | services_pin_auth_manager_test.cpp | 51 uint32_t tokenId = 1; in HWTEST_F() local 53 EXPECT_NO_THROW(PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer)); in HWTEST_F() 58 uint32_t tokenId = 1; in HWTEST_F() local 60 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in HWTEST_F() 61 EXPECT_NE(PinAuthManager::GetInstance().GetInputerLock(tokenId), nullptr); in HWTEST_F() 62 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in HWTEST_F() 67 uint32_t tokenId = 1; in HWTEST_F() local 69 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in HWTEST_F() 70 EXPECT_NO_THROW(PinAuthManager::GetInstance().pinAuthDeathMap_[tokenId]->OnRemoteDied(nullptr)); in HWTEST_F() 75 uint32_t tokenId in HWTEST_F() local [all...] |
/base/security/access_token/interfaces/innerkits/nativetoken/test/unittest/src/ |
H A D | nativetoken_kit_test.cpp | 157 uint64_t tokenId; in Start() local 179 tokenId = GetAccessTokenId(&infoInstance); in Start() 183 return tokenId; in Start() 199 uint64_t tokenId; in HWTEST_F() local 214 tokenId = GetAccessTokenId(&infoInstance); in HWTEST_F() 215 ASSERT_EQ(tokenId, 0); in HWTEST_F() 217 tokenId = GetAccessTokenId(&infoInstance); in HWTEST_F() 218 ASSERT_EQ(tokenId, 0); in HWTEST_F() 223 tokenId = GetAccessTokenId(&infoInstance); in HWTEST_F() 224 ASSERT_EQ(tokenId, in HWTEST_F() 256 uint64_t tokenId; HWTEST_F() local 320 uint64_t tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local 377 uint64_t tokenId; HWTEST_F() local 388 tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local 392 tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local 449 uint64_t tokenId; HWTEST_F() local 500 uint64_t tokenId; HWTEST_F() local 544 uint64_t tokenId; HWTEST_F() local 610 uint64_t tokenId = Start(processName[i]); HWTEST_F() local 674 uint64_t tokenId; HWTEST_F() local 719 uint64_t tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local 768 uint64_t tokenId; HWTEST_F() local 816 uint64_t tokenId; HWTEST_F() local [all...] |
/base/inputmethod/imf/services/identity_checker/src/ |
H A D | identity_checker_impl.cpp | 58 bool IdentityCheckerImpl::IsBundleNameValid(uint32_t tokenId, const std::string &validBundleName) in IsBundleNameValid() argument 60 std::string bundleName = GetBundleNameByToken(tokenId); in IsBundleNameValid() 73 bool IdentityCheckerImpl::HasPermission(uint32_t tokenId, const std::string &permission) in HasPermission() argument 75 if (AccessTokenKit::VerifyAccessToken(tokenId, permission) != PERMISSION_GRANTED) { in HasPermission() 83 bool IdentityCheckerImpl::IsBroker(AccessTokenID tokenId) in IsBroker() argument 85 if (!IsNativeSa(tokenId)) { in IsBroker() 89 AccessTokenKit::GetNativeTokenInfo(tokenId, nativeTokenInfoRes); in IsBroker() 93 bool IdentityCheckerImpl::IsNativeSa(AccessTokenID tokenId) in IsNativeSa() argument 95 return AccessTokenKit::GetTokenTypeFlag(tokenId) == TypeATokenTypeEnum::TOKEN_NATIVE; in IsNativeSa() 102 IMSA_HILOGD("tokenId in IsFocusedUIExtension() 106 GetBundleNameByToken(uint32_t tokenId) GetBundleNameByToken() argument [all...] |
/base/useriam/pin_auth/test/fuzztest/services/modules/inputters/pinauthmanager_fuzzer/ |
H A D | pin_auth_manager_fuzzer.cpp | 47 uint32_t tokenId = parcel.ReadUint32(); in FuzzRegisterInputer() local 52 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in FuzzRegisterInputer() 53 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in FuzzRegisterInputer() 55 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in FuzzRegisterInputer() 62 uint32_t tokenId = parcel.ReadUint32(); in FuzzUnRegisterInputer() local 67 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in FuzzUnRegisterInputer() 68 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in FuzzUnRegisterInputer() 70 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in FuzzUnRegisterInputer() 77 uint32_t tokenId = parcel.ReadUint32(); in FuzzGetInputerLock() local 79 PinAuthManager::GetInstance().RegisterInputer(tokenId, inpute in FuzzGetInputerLock() [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/include/service/ |
H A D | policy_info_manager.h | 44 * @param tokenId token id of the object 49 int32_t AddPolicy(const uint32_t tokenId, const std::vector<PolicyInfo> &policy, 52 * @brief Match policys of a certain tokenId 53 * @param tokenId token id of the object 58 int32_t MatchPolicy(const uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 67 * @brief Match one policy of a certain tokenId 68 * @param tokenId token id of the object 74 int32_t MatchSinglePolicy(const uint32_t tokenId, const PolicyInfo &policy, uint32_t &result); 76 * @brief remove policys of a certain tokenId 77 * @param tokenId toke [all...] |
H A D | sandbox_manager_service.h | 48 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 50 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 51 int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, 53 int32_t UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) override; 54 int32_t SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) override; 55 int32_t UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) override; 56 int32_t CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) override; 60 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) override; 61 int32_t StartAccessingByTokenId(uint32_t tokenId) override; 62 int32_t UnSetAllPolicyByToken(uint32_t tokenId) overrid [all...] |
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/src/ |
H A D | sandbox_manager_kit.cpp | 69 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicy() 73 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in PersistPolicy() 74 SANDBOXMANAGER_LOG_ERROR(LABEL, "PolicySize = %{public}u, tokenId = %{public}d.", in PersistPolicy() 75 static_cast<uint32_t>(policySize), tokenId); in PersistPolicy() 79 return SandboxManagerClient::GetInstance().PersistPolicyByTokenId(tokenId, policy, result); in PersistPolicy() 83 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicy() 87 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in UnPersistPolicy() 88 SANDBOXMANAGER_LOG_ERROR(LABEL, "PolicySize = %{public}u, tokenId = %{public}d.", in UnPersistPolicy() 89 static_cast<uint32_t>(policySize), tokenId); in UnPersistPolicy() 93 return SandboxManagerClient::GetInstance().UnPersistPolicyByTokenId(tokenId, polic in UnPersistPolicy() 68 PersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) PersistPolicy() argument 82 UnPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicy() argument 96 SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, std::vector<uint32_t> &result) SetPolicy() argument 115 UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicy() argument 129 SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) SetPolicyAsync() argument 147 UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicyAsync() argument 156 CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPolicy() argument 196 CheckPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument 209 StartAccessingByTokenId(uint32_t tokenId) StartAccessingByTokenId() argument 219 UnSetAllPolicyByToken(uint32_t tokenId) UnSetAllPolicyByToken() argument [all...] |
/base/location/interfaces/inner_api/include/ |
H A D | permission_manager.h | 39 static bool CheckLocationPermission(uint32_t tokenId, uint32_t firstTokenId); 40 static bool CheckApproximatelyPermission(uint32_t tokenId, uint32_t firstTokenId); 41 static bool CheckBackgroundPermission(uint32_t tokenId, uint32_t firstTokenId); 42 static bool CheckMockLocationPermission(uint32_t tokenId, uint32_t firstTokenId); 43 static bool CheckPermission(const std::string &permission, uint32_t tokenId, uint32_t firstTokenId); 44 static bool CheckSecureSettings(uint32_t tokenId, uint32_t firstTokenId); 46 static bool CheckRssProcessName(uint32_t tokenId); 48 static int GetPermissionLevel(uint32_t tokenId, uint32_t firstTokenId); 49 static bool CheckIsSystemSa(uint32_t tokenId);
|
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/include/ |
H A D | sandbox_manager_kit.h | 37 * @brief Persist policys with caller's tokenId 44 * @brief Unpersist policys with caller's tokenId 51 * @brief Persist policys with a given tokenId 52 * @param tokenId a given tokenId 58 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 60 * @brief Unpersist policys with a given tokenId 61 * @param tokenId a given tokenId 67 uint32_t tokenId, cons [all...] |
/base/useriam/pin_auth/services/sa/src/ |
H A D | pin_auth_service.cpp | 79 uint32_t tokenId = this->GetFirstTokenID(); in GetTokenId() local 80 if (tokenId == 0) { in GetTokenId() 81 tokenId = this->GetCallingTokenID(); in GetTokenId() 83 return tokenId; in GetTokenId() 109 uint32_t tokenId = GetTokenId(); in CheckPermission() 110 return AccessTokenKit::VerifyAccessToken(tokenId, permission) == RET_SUCCESS; in CheckPermission() 124 uint32_t tokenId = GetTokenId(); in RegisterInputer() local 125 return PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in RegisterInputer() 135 uint32_t tokenId = GetTokenId(); in UnRegisterInputer() local 136 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in UnRegisterInputer() [all...] |
/base/security/access_token/interfaces/innerkits/accesstoken/src/ |
H A D | tokenid_kit.cpp | 32 bool TokenIdKit::IsSystemAppByFullTokenID(uint64_t tokenId) in IsSystemAppByFullTokenID() argument 34 ACCESSTOKEN_LOG_DEBUG(LABEL, "Called, tokenId=%{public}" PRId64, tokenId); in IsSystemAppByFullTokenID() 35 return (tokenId & SYSTEM_APP_MASK) == SYSTEM_APP_MASK; in IsSystemAppByFullTokenID() 38 uint64_t TokenIdKit::GetRenderTokenID(uint64_t tokenId) in GetRenderTokenID() argument 40 AccessTokenID id = tokenId & TOKEN_ID_LOWMASK; in GetRenderTokenID() 43 return tokenId; in GetRenderTokenID()
|
/base/security/access_token/services/privacymanager/src/record/ |
H A D | permission_record_manager.cpp | 160 if ((record1.tokenId != record2.tokenId) || in RecordMergeCheck() 241 record.tokenId, record.opCode, record.status, record.accessCount, record.rejectCount, record.lockScreenStatus, in MergeOrInsertRecord() 254 conditionValue.Put(PrivacyFiledConst::FIELD_TOKEN_ID, static_cast<int32_t>(record.tokenId)); in UpdatePermissionUsedRecord() 308 if (AccessTokenKit::GetTokenTypeFlag(info.tokenId) != TOKEN_HAP) { in GetPermissionRecord() 309 ACCESSTOKEN_LOG_ERROR(LABEL, "Not hap(%{public}d).", info.tokenId); in GetPermissionRecord() 320 record.status = GetAppStatus(info.tokenId); in GetPermissionRecord() 323 record.tokenId = info.tokenId; in GetPermissionRecord() 345 bool PermissionRecordManager::AddOrUpdateUsedTypeIfNeeded(const AccessTokenID tokenId, cons argument 427 RemovePermissionUsedRecords(AccessTokenID tokenId, const std::string& deviceID) RemovePermissionUsedRecords() argument 511 uint32_t tokenId = static_cast<uint32_t>(queryValue.GetInt(PrivacyFiledConst::FIELD_TOKEN_ID)); InsteadMergedRecIfNessary() local 595 int32_t tokenId = value.GetInt(PrivacyFiledConst::FIELD_TOKEN_ID); FillBundleUsedRecord() local 602 AddDebugLog(const AccessTokenID tokenId, const BundleUsedRecord& bundleRecord, const int32_t queryCount, int32_t& totalSuccCount, int32_t& totalFailCount) AddDebugLog() argument 652 int32_t tokenId = recordValue.GetInt(PrivacyFiledConst::FIELD_TOKEN_ID); GetRecordsFromLocalDB() local 684 CreateBundleUsedRecord(const AccessTokenID tokenId, BundleUsedRecord& bundleRecord) CreateBundleUsedRecord() argument 762 AddRecordToStartList( uint32_t tokenId, int32_t pid, const std::string& permissionName, int32_t status) AddRecordToStartList() argument 806 ExecuteAndUpdateRecord(uint32_t tokenId, int32_t pid, ActiveChangeType status) ExecuteAndUpdateRecord() argument 846 NotifyAppStateChange(AccessTokenID tokenId, int32_t pid, ActiveChangeType status) NotifyAppStateChange() argument 871 RemoveRecordFromStartList( AccessTokenID tokenId, int32_t pid, const std::string& permissionName) RemoveRecordFromStartList() argument 918 RemoveRecordFromStartListByPid(const AccessTokenID tokenId, int32_t pid) RemoveRecordFromStartListByPid() argument 952 RemoveRecordFromStartListByToken(const AccessTokenID tokenId) RemoveRecordFromStartListByToken() argument 1006 CallbackExecute( AccessTokenID tokenId, const std::string& permissionName, int32_t status) CallbackExecute() argument 1099 ExecuteCameraCallbackAsync(AccessTokenID tokenId, int32_t pid) ExecuteCameraCallbackAsync() argument 1120 StartUsingPermission( AccessTokenID tokenId, int32_t pid, const std::string& permissionName) StartUsingPermission() argument 1149 StartUsingPermission( AccessTokenID tokenId, int32_t pid, const std::string& permissionName, const sptr<IRemoteObject>& callback) StartUsingPermission() argument 1188 StopUsingPermission( AccessTokenID tokenId, int32_t pid, const std::string& permissionName) StopUsingPermission() argument 1234 IsAllowedUsingCamera(AccessTokenID tokenId) IsAllowedUsingCamera() argument 1248 IsAllowedUsingMicrophone(AccessTokenID tokenId) IsAllowedUsingMicrophone() argument 1264 IsAllowedUsingPermission(AccessTokenID tokenId, const std::string& permissionName) IsAllowedUsingPermission() argument 1310 SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) SetHapWithFGReminder() argument 1455 GetPermissionUsedTypeInfos(AccessTokenID tokenId, const std::string& permissionName, std::vector<PermissionUsedTypeInfo>& results) GetPermissionUsedTypeInfos() argument 1493 GetDeviceId(AccessTokenID tokenId) GetDeviceId() argument 1505 GetAppStatus(AccessTokenID tokenId) GetAppStatus() argument 1559 UpdateCameraFloatWindowStatus(AccessTokenID tokenId, bool isShowing) UpdateCameraFloatWindowStatus() argument 1564 UpdatePipWindowStatus(AccessTokenID tokenId, bool isShowing) UpdatePipWindowStatus() argument 1760 IsCameraWindowShow(AccessTokenID tokenId) IsCameraWindowShow() argument 1775 NotifyCameraWindowChange(bool isPip, AccessTokenID tokenId, bool isShowing) NotifyCameraWindowChange() argument 1857 GetUniqueId(uint32_t tokenId, int32_t pid) const GetUniqueId() argument [all...] |
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | permission_definition_cache.cpp | 53 bool PermissionDefinitionCache::Insert(const PermissionDef& info, AccessTokenID tokenId) in Insert() argument 63 permissionDefinitionMap_[info.permissionName].tokenId = tokenId; in Insert() 64 if (!hasHapPermissionDefinition_ && (tokenId != EXTENSION_PERMISSION_ID)) { in Insert() 70 bool PermissionDefinitionCache::Update(const PermissionDef& info, AccessTokenID tokenId) in Update() argument 74 permissionDefinitionMap_[info.permissionName].tokenId = tokenId; in Update() 78 void PermissionDefinitionCache::DeleteByToken(AccessTokenID tokenId) in DeleteByToken() argument 83 if (tokenId == it->second.tokenId) { in DeleteByToken() 179 GetDefPermissionsByTokenId(std::vector<PermissionDef>& permList, AccessTokenID tokenId) GetDefPermissionsByTokenId() argument 196 AccessTokenID tokenId = (AccessTokenID)defValue.GetInt(TokenFiledConst::FIELD_TOKEN_ID); RestorePermDefInfo() local [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/src/service/ |
H A D | sandbox_manager_stub.cpp | 45 static bool CheckPermission(const uint32_t tokenId, const std::string &permission); 161 uint32_t tokenId; in PersistPolicyByTokenIdInner() local 162 if (!data.ReadUint32(tokenId)) { in PersistPolicyByTokenIdInner() 163 SANDBOXMANAGER_LOG_ERROR(LABEL, "read tokenId parcel fail"); in PersistPolicyByTokenIdInner() 173 int32_t ret = this->PersistPolicyByTokenId(tokenId, policyInfoVectorParcel->policyVector, result); in PersistPolicyByTokenIdInner() 195 uint32_t tokenId; in UnPersistPolicyByTokenIdInner() local 196 if (!data.ReadUint32(tokenId)) { in UnPersistPolicyByTokenIdInner() 197 SANDBOXMANAGER_LOG_ERROR(LABEL, "reply tokenId parcel fail"); in UnPersistPolicyByTokenIdInner() 208 int32_t ret = this->UnPersistPolicyByTokenId(tokenId, policyInfoVectorParcel->policyVector, result); in UnPersistPolicyByTokenIdInner() 224 static int32_t ReadSetPolicyParcel(MessageParcel &data, uint32_t &tokenId, in ReadSetPolicyParcel() argument 253 uint32_t tokenId; SetPolicyInner() local 279 uint32_t tokenId; SetPolicyAsyncInner() local 290 ReadUnSetPolicyParcel(MessageParcel &data, uint32_t &tokenId, sptr<PolicyInfoParcel> &policyInfoParcel) ReadUnSetPolicyParcel() argument 314 uint32_t tokenId; UnSetPolicyInner() local 331 uint32_t tokenId; UnSetPolicyAsyncInner() local 343 uint32_t tokenId; CheckPolicyInner() local 433 uint32_t tokenId; CheckPersistPolicyInner() local 468 uint32_t tokenId; StartAccessingByTokenIdInner() local 484 uint32_t tokenId; UnSetAllPolicyByTokenInner() local 537 CheckPermission(const uint32_t tokenId, const std::string &permission) CheckPermission() argument [all...] |
H A D | sandbox_manager_service.cpp | 173 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicyByTokenId() 176 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in PersistPolicyByTokenId() 179 policy.size(), tokenId); in PersistPolicyByTokenId() 187 return PolicyInfoManager::GetInstance().AddPolicy(tokenId, policy, result, flag); in PersistPolicyByTokenId() 191 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicyByTokenId() 194 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in UnPersistPolicyByTokenId() 197 policy.size(), tokenId); in UnPersistPolicyByTokenId() 201 return PolicyInfoManager::GetInstance().RemovePolicy(tokenId, policy, result); in UnPersistPolicyByTokenId() 204 int32_t SandboxManagerService::SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, in SetPolicy() argument 212 if (tokenId in SetPolicy() 172 PersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) PersistPolicyByTokenId() argument 190 UnPersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicyByTokenId() argument 224 UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicy() argument 239 SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) SetPolicyAsync() argument 246 UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicyAsync() argument 251 CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPolicy() argument 293 CheckPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument 316 StartAccessingByTokenId(uint32_t tokenId) StartAccessingByTokenId() argument 325 UnSetAllPolicyByToken(uint32_t tokenId) UnSetAllPolicyByToken() argument 414 uint32_t tokenId = std::stoul(strTokenID, &idx); StartByEventAction() local [all...] |
/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/accesstoken_mock_test/ |
H A D | accesstoken_kit_test.cpp | 110 AccessTokenID tokenId = 123; in HWTEST_F() local 111 AccessTokenID localTokenId = AccessTokenKit::AllocLocalTokenID(remoteDevice, tokenId); in HWTEST_F() 141 AccessTokenID tokenId = 123; in HWTEST_F() local 142 ASSERT_EQ(AccessTokenError::ERR_SERVICE_ABNORMAL, AccessTokenKit::DeleteToken(tokenId)); in HWTEST_F() 153 AccessTokenID tokenId = 123; in HWTEST_F() local 154 ASSERT_EQ(TOKEN_INVALID, AccessTokenKit::GetTokenType(tokenId)); in HWTEST_F() 168 AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(userID, bundleName, instIndex); in HWTEST_F() local 169 ASSERT_EQ(INVALID_TOKENID, tokenId); in HWTEST_F() 195 AccessTokenID tokenId = 123; in HWTEST_F() local 197 ASSERT_EQ(AccessTokenError::ERR_SERVICE_ABNORMAL, AccessTokenKit::GetHapTokenInfo(tokenId, tokenInf in HWTEST_F() 208 AccessTokenID tokenId = 805920561; //805920561 is a native tokenId. HWTEST_F() local 221 AccessTokenID tokenId = 123; HWTEST_F() local 263 AccessTokenID tokenId = 123; HWTEST_F() local 276 AccessTokenID tokenId = 123; HWTEST_F() local 289 AccessTokenID tokenId = 123; HWTEST_F() local 346 AccessTokenID tokenId = 123; HWTEST_F() local 365 AccessTokenID tokenId = 123; HWTEST_F() local 379 AccessTokenID tokenId = 123; HWTEST_F() local 393 AccessTokenID tokenId = 123; HWTEST_F() local 459 AccessTokenID tokenId = 123; HWTEST_F() local 486 AccessTokenID tokenId = 123; HWTEST_F() local 499 AccessTokenID tokenId = 123; HWTEST_F() local 577 AccessTokenID tokenId = 123; HWTEST_F() local [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/include/mac/ |
H A D | mac_adapter.h | 32 int32_t SetSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, 34 int32_t UnSetSandboxPolicy(uint32_t tokenId, const PolicyInfo &policy); 35 int32_t UnSetSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result); 36 int32_t QuerySandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result); 37 int32_t CheckSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result); 38 int32_t DestroySandboxPolicy(uint32_t tokenId);
|
/base/security/access_token/interfaces/innerkits/analysis_model/test/unittest/ |
H A D | code_signature_analysis_kit_test.cpp | 55 uint32_t tokenId; member 59 {"test0", 12345}, // 12345 random tokenId. 60 {"test1", 123456}, // 123456 random tokenId. 61 {"test2", 1234567} // 1234567 random tokenId. 195 static void ReportErrorEventMock(DataChangeTypeCode optType, const char* bundleName, uint32_t tokenId) in ReportErrorEventMock() argument 202 g_reportInfo.tokenId = tokenId; in ReportErrorEventMock() 229 ReportErrorEventMock(EVENT_REPORTED, g_bundleInfo[0].name, g_bundleInfo[0].tokenId); in HWTEST_F() 236 ReportErrorEventMock(EVENT_REPORTED, g_bundleInfo[0].name, g_bundleInfo[0].tokenId); in HWTEST_F() 250 EXPECT_EQ(g_bundleInfo[0].tokenId, resul in HWTEST_F() [all...] |
/base/security/access_token/services/privacymanager/include/record/ |
H A D | permission_record_manager.h | 74 void RemovePermissionUsedRecords(AccessTokenID tokenId, const std::string& deviceID); 78 int32_t StartUsingPermission(AccessTokenID tokenId, int32_t pid, const std::string& permissionName); 79 int32_t StartUsingPermission(AccessTokenID tokenId, int32_t pid, const std::string& permissionName, 81 int32_t StopUsingPermission(AccessTokenID tokenId, int32_t pid, const std::string& permissionName); 86 void CallbackExecute(AccessTokenID tokenId, const std::string& permissionName, int32_t status); 88 bool IsAllowedUsingPermission(AccessTokenID tokenId, const std::string& permissionName); 89 int32_t GetPermissionUsedTypeInfos(const AccessTokenID tokenId, const std::string& permissionName, 95 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed); 97 void NotifyAppStateChange(AccessTokenID tokenId, int32_t pid, ActiveChangeType status); 103 void NotifyCameraWindowChange(bool isPip, AccessTokenID tokenId, boo [all...] |
/base/inputmethod/imf/services/identity_checker/include/ |
H A D | identity_checker_impl.h | 27 bool IsBundleNameValid(uint32_t tokenId, const std::string &validBundleName) override; 28 bool HasPermission(uint32_t tokenId, const std::string &permission) override; 29 bool IsBroker(Security::AccessToken::AccessTokenID tokenId) override; 30 bool IsNativeSa(Security::AccessToken::AccessTokenID tokenId) override; 31 std::string GetBundleNameByToken(uint32_t tokenId) override;
|