Home
last modified time | relevance | path

Searched refs:tokenId (Results 1 - 25 of 666) sorted by relevance

12345678910>>...27

/base/security/security_component_manager/services/security_component_service/sa/sa_main/
H A Dsec_comp_perm_manager.cpp43 bool SecCompPermManager::DelaySaveRevokePermission(AccessToken::AccessTokenID tokenId, const std::string& taskName) in DelaySaveRevokePermission() argument
50 std::function<void()> delayed = ([tokenId]() { in DelaySaveRevokePermission()
52 SecCompPermManager::GetInstance().RevokeTempSavePermissionCount(tokenId); in DelaySaveRevokePermission()
72 int32_t SecCompPermManager::GrantTempSavePermission(AccessToken::AccessTokenID tokenId) in GrantTempSavePermission() argument
75 std::string taskName = std::to_string(tokenId) + std::to_string(current); in GrantTempSavePermission()
76 if (!DelaySaveRevokePermission(tokenId, taskName)) { in GrantTempSavePermission()
80 saveTaskDequeMap_[tokenId].push_back(taskName); in GrantTempSavePermission()
81 applySaveCountMap_[tokenId]++; in GrantTempSavePermission()
82 SC_LOG_DEBUG(LABEL, "tokenId: %{public}d current permission apply counts is: %{public}d.", in GrantTempSavePermission()
83 tokenId, applySaveCountMap in GrantTempSavePermission()
87 RevokeTempSavePermissionCount(AccessToken::AccessTokenID tokenId) RevokeTempSavePermissionCount() argument
113 RevokeTempSavePermission(AccessToken::AccessTokenID tokenId) RevokeTempSavePermission() argument
128 VerifySavePermission(AccessToken::AccessTokenID tokenId) VerifySavePermission() argument
139 VerifyPermission(AccessToken::AccessTokenID tokenId, SecCompType type) VerifyPermission() argument
162 AddAppGrantPermissionRecord(AccessToken::AccessTokenID tokenId, const std::string& permissionName) AddAppGrantPermissionRecord() argument
175 RemoveAppGrantPermissionRecord(AccessToken::AccessTokenID tokenId, const std::string& permissionName) RemoveAppGrantPermissionRecord() argument
186 GrantAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName) GrantAppPermission() argument
199 RevokeAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName) RevokeAppPermission() argument
212 RevokeAppPermissions(AccessToken::AccessTokenID tokenId) RevokeAppPermissions() argument
218 RevokeAppPermisionsDelayed(AccessToken::AccessTokenID tokenId) RevokeAppPermisionsDelayed() argument
236 RevokeAppPermisionsImmediately(AccessToken::AccessTokenID tokenId) RevokeAppPermisionsImmediately() argument
254 CancelAppRevokingPermisions(AccessToken::AccessTokenID tokenId) CancelAppRevokingPermisions() argument
272 IsDlpSandboxCalling(AccessToken::AccessTokenID tokenId) IsDlpSandboxCalling() argument
278 GrantTempPermission(AccessToken::AccessTokenID tokenId, const std::shared_ptr<SecCompBase>& componentInfo) GrantTempPermission() argument
[all...]
H A Dsec_comp_perm_manager.h35 int32_t GrantTempPermission(AccessToken::AccessTokenID tokenId,
37 int32_t GrantTempSavePermission(AccessToken::AccessTokenID tokenId);
38 void RevokeTempSavePermission(AccessToken::AccessTokenID tokenId);
39 bool VerifySavePermission(AccessToken::AccessTokenID tokenId);
40 bool VerifyPermission(AccessToken::AccessTokenID tokenId, SecCompType type);
42 int32_t GrantAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName);
43 int32_t RevokeAppPermission(AccessToken::AccessTokenID tokenId, const std::string& permissionName);
44 void RevokeAppPermissions(AccessToken::AccessTokenID tokenId);
49 void RevokeAppPermisionsDelayed(AccessToken::AccessTokenID tokenId);
50 void CancelAppRevokingPermisions(AccessToken::AccessTokenID tokenId);
[all...]
/base/useriam/pin_auth/services/modules/inputters/src/
H A Dpin_auth_manager.cpp27 bool PinAuthManager::RegisterInputer(uint32_t tokenId, const sptr<InputerGetData> &inputer) in RegisterInputer() argument
30 IAM_LOGI("start, tokenId = %{public}s", GET_MASKED_STRING(tokenId).c_str()); in RegisterInputer()
31 if (pinAuthInputerMap_.find(tokenId) != pinAuthInputerMap_.end()) { in RegisterInputer()
39 pinAuthInputerMap_.emplace(tokenId, inputer); in RegisterInputer()
40 sptr<IRemoteObject::DeathRecipient> dr(new (std::nothrow) ResPinauthInputerDeathRecipient(tokenId)); in RegisterInputer()
44 pinAuthDeathMap_.emplace(tokenId, dr); in RegisterInputer()
53 void PinAuthManager::UnRegisterInputer(uint32_t tokenId) in UnRegisterInputer() argument
56 IAM_LOGI("start, tokenId = %{public}s", GET_MASKED_STRING(tokenId) in UnRegisterInputer()
73 GetInputerLock(uint32_t tokenId) GetInputerLock() argument
87 ResPinauthInputerDeathRecipient(uint32_t tokenId) ResPinauthInputerDeathRecipient() argument
[all...]
/base/usb/usb_manager/test/native/service_unittest/src/
H A Dusb_common_test.cpp78 uint64_t tokenId = GetAccessTokenId(infoInstance); in SetTestCaseNative() local
79 int ret = SetSelfTokenID(tokenId); in SetTestCaseNative()
159 AccessTokenID tokenId = 0; in AllocHapTest() local
162 tokenId = tokenIdEx.tokenIdExStruct.tokenID; in AllocHapTest()
163 if (tokenId != 0) { in AllocHapTest()
164 USB_HILOGI(MODULE_USB_SERVICE, "AllocHapToken success, tokenId: %{public}d", tokenId); in AllocHapTest()
166 USB_HILOGE(MODULE_USB_SERVICE, "AllocHapToken fail,tokenId: %{public}d", tokenId); in AllocHapTest()
168 return tokenId; in AllocHapTest()
172 AccessTokenID tokenId = 0; AllocHapTestWithUserIdDiff() local
185 AccessTokenID tokenId = 0; AllocHapTestWithIndexDiff() local
197 SetSelfToken(AccessTokenID tokenId) SetSelfToken() argument
213 DeleteAllocHapToken(AccessTokenID tokenId) DeleteAllocHapToken() argument
[all...]
/base/location/frameworks/location_common/common/source/
H A Dpermission_manager.cpp29 bool PermissionManager::CheckLocationPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckLocationPermission() argument
31 return CheckPermission(ACCESS_LOCATION, tokenId, firstTokenId); in CheckLocationPermission()
58 bool PermissionManager::CheckRssProcessName(uint32_t tokenId) in CheckRssProcessName() argument
61 Security::AccessToken::AccessTokenKit::GetNativeTokenInfo(tokenId, callingTokenInfo); in CheckRssProcessName()
69 bool PermissionManager::CheckBackgroundPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckBackgroundPermission() argument
71 return CheckPermission(ACCESS_BACKGROUND_LOCATION, tokenId, firstTokenId); in CheckBackgroundPermission()
74 bool PermissionManager::CheckMockLocationPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckMockLocationPermission() argument
76 return CheckPermission(ACCESS_MOCK_LOCATION, tokenId, firstTokenId); in CheckMockLocationPermission()
79 bool PermissionManager::CheckApproximatelyPermission(uint32_t tokenId, uint32_t firstTokenId) in CheckApproximatelyPermission() argument
81 return CheckPermission(ACCESS_APPROXIMATELY_LOCATION, tokenId, firstTokenI in CheckApproximatelyPermission()
84 CheckSecureSettings(uint32_t tokenId, uint32_t firstTokenId) CheckSecureSettings() argument
99 GetPermissionLevel(uint32_t tokenId, uint32_t firstTokenId) GetPermissionLevel() argument
131 CheckIsSystemSa(uint32_t tokenId) CheckIsSystemSa() argument
[all...]
/base/useriam/pin_auth/test/unittest/src/
H A Dservices_pin_auth_manager_test.cpp51 uint32_t tokenId = 1; in HWTEST_F() local
53 EXPECT_NO_THROW(PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer)); in HWTEST_F()
58 uint32_t tokenId = 1; in HWTEST_F() local
60 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in HWTEST_F()
61 EXPECT_NE(PinAuthManager::GetInstance().GetInputerLock(tokenId), nullptr); in HWTEST_F()
62 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in HWTEST_F()
67 uint32_t tokenId = 1; in HWTEST_F() local
69 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in HWTEST_F()
70 EXPECT_NO_THROW(PinAuthManager::GetInstance().pinAuthDeathMap_[tokenId]->OnRemoteDied(nullptr)); in HWTEST_F()
75 uint32_t tokenId in HWTEST_F() local
[all...]
/base/security/access_token/interfaces/innerkits/nativetoken/test/unittest/src/
H A Dnativetoken_kit_test.cpp157 uint64_t tokenId; in Start() local
179 tokenId = GetAccessTokenId(&infoInstance); in Start()
183 return tokenId; in Start()
199 uint64_t tokenId; in HWTEST_F() local
214 tokenId = GetAccessTokenId(&infoInstance); in HWTEST_F()
215 ASSERT_EQ(tokenId, 0); in HWTEST_F()
217 tokenId = GetAccessTokenId(&infoInstance); in HWTEST_F()
218 ASSERT_EQ(tokenId, 0); in HWTEST_F()
223 tokenId = GetAccessTokenId(&infoInstance); in HWTEST_F()
224 ASSERT_EQ(tokenId, in HWTEST_F()
256 uint64_t tokenId; HWTEST_F() local
320 uint64_t tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local
377 uint64_t tokenId; HWTEST_F() local
388 tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local
392 tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local
449 uint64_t tokenId; HWTEST_F() local
500 uint64_t tokenId; HWTEST_F() local
544 uint64_t tokenId; HWTEST_F() local
610 uint64_t tokenId = Start(processName[i]); HWTEST_F() local
674 uint64_t tokenId; HWTEST_F() local
719 uint64_t tokenId = GetAccessTokenId(&infoInstance); HWTEST_F() local
768 uint64_t tokenId; HWTEST_F() local
816 uint64_t tokenId; HWTEST_F() local
[all...]
/base/inputmethod/imf/services/identity_checker/src/
H A Didentity_checker_impl.cpp58 bool IdentityCheckerImpl::IsBundleNameValid(uint32_t tokenId, const std::string &validBundleName) in IsBundleNameValid() argument
60 std::string bundleName = GetBundleNameByToken(tokenId); in IsBundleNameValid()
73 bool IdentityCheckerImpl::HasPermission(uint32_t tokenId, const std::string &permission) in HasPermission() argument
75 if (AccessTokenKit::VerifyAccessToken(tokenId, permission) != PERMISSION_GRANTED) { in HasPermission()
83 bool IdentityCheckerImpl::IsBroker(AccessTokenID tokenId) in IsBroker() argument
85 if (!IsNativeSa(tokenId)) { in IsBroker()
89 AccessTokenKit::GetNativeTokenInfo(tokenId, nativeTokenInfoRes); in IsBroker()
93 bool IdentityCheckerImpl::IsNativeSa(AccessTokenID tokenId) in IsNativeSa() argument
95 return AccessTokenKit::GetTokenTypeFlag(tokenId) == TypeATokenTypeEnum::TOKEN_NATIVE; in IsNativeSa()
102 IMSA_HILOGD("tokenId in IsFocusedUIExtension()
106 GetBundleNameByToken(uint32_t tokenId) GetBundleNameByToken() argument
[all...]
/base/useriam/pin_auth/test/fuzztest/services/modules/inputters/pinauthmanager_fuzzer/
H A Dpin_auth_manager_fuzzer.cpp47 uint32_t tokenId = parcel.ReadUint32(); in FuzzRegisterInputer() local
52 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in FuzzRegisterInputer()
53 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in FuzzRegisterInputer()
55 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in FuzzRegisterInputer()
62 uint32_t tokenId = parcel.ReadUint32(); in FuzzUnRegisterInputer() local
67 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in FuzzUnRegisterInputer()
68 PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in FuzzUnRegisterInputer()
70 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in FuzzUnRegisterInputer()
77 uint32_t tokenId = parcel.ReadUint32(); in FuzzGetInputerLock() local
79 PinAuthManager::GetInstance().RegisterInputer(tokenId, inpute in FuzzGetInputerLock()
[all...]
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/include/service/
H A Dpolicy_info_manager.h44 * @param tokenId token id of the object
49 int32_t AddPolicy(const uint32_t tokenId, const std::vector<PolicyInfo> &policy,
52 * @brief Match policys of a certain tokenId
53 * @param tokenId token id of the object
58 int32_t MatchPolicy(const uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result);
67 * @brief Match one policy of a certain tokenId
68 * @param tokenId token id of the object
74 int32_t MatchSinglePolicy(const uint32_t tokenId, const PolicyInfo &policy, uint32_t &result);
76 * @brief remove policys of a certain tokenId
77 * @param tokenId toke
[all...]
H A Dsandbox_manager_service.h48 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override;
50 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override;
51 int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag,
53 int32_t UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) override;
54 int32_t SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) override;
55 int32_t UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) override;
56 int32_t CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) override;
60 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) override;
61 int32_t StartAccessingByTokenId(uint32_t tokenId) override;
62 int32_t UnSetAllPolicyByToken(uint32_t tokenId) overrid
[all...]
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/src/
H A Dsandbox_manager_kit.cpp69 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicy()
73 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in PersistPolicy()
74 SANDBOXMANAGER_LOG_ERROR(LABEL, "PolicySize = %{public}u, tokenId = %{public}d.", in PersistPolicy()
75 static_cast<uint32_t>(policySize), tokenId); in PersistPolicy()
79 return SandboxManagerClient::GetInstance().PersistPolicyByTokenId(tokenId, policy, result); in PersistPolicy()
83 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicy()
87 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in UnPersistPolicy()
88 SANDBOXMANAGER_LOG_ERROR(LABEL, "PolicySize = %{public}u, tokenId = %{public}d.", in UnPersistPolicy()
89 static_cast<uint32_t>(policySize), tokenId); in UnPersistPolicy()
93 return SandboxManagerClient::GetInstance().UnPersistPolicyByTokenId(tokenId, polic in UnPersistPolicy()
68 PersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) PersistPolicy() argument
82 UnPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicy() argument
96 SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, std::vector<uint32_t> &result) SetPolicy() argument
115 UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicy() argument
129 SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) SetPolicyAsync() argument
147 UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicyAsync() argument
156 CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPolicy() argument
196 CheckPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument
209 StartAccessingByTokenId(uint32_t tokenId) StartAccessingByTokenId() argument
219 UnSetAllPolicyByToken(uint32_t tokenId) UnSetAllPolicyByToken() argument
[all...]
/base/location/interfaces/inner_api/include/
H A Dpermission_manager.h39 static bool CheckLocationPermission(uint32_t tokenId, uint32_t firstTokenId);
40 static bool CheckApproximatelyPermission(uint32_t tokenId, uint32_t firstTokenId);
41 static bool CheckBackgroundPermission(uint32_t tokenId, uint32_t firstTokenId);
42 static bool CheckMockLocationPermission(uint32_t tokenId, uint32_t firstTokenId);
43 static bool CheckPermission(const std::string &permission, uint32_t tokenId, uint32_t firstTokenId);
44 static bool CheckSecureSettings(uint32_t tokenId, uint32_t firstTokenId);
46 static bool CheckRssProcessName(uint32_t tokenId);
48 static int GetPermissionLevel(uint32_t tokenId, uint32_t firstTokenId);
49 static bool CheckIsSystemSa(uint32_t tokenId);
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/include/
H A Dsandbox_manager_kit.h37 * @brief Persist policys with caller's tokenId
44 * @brief Unpersist policys with caller's tokenId
51 * @brief Persist policys with a given tokenId
52 * @param tokenId a given tokenId
58 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result);
60 * @brief Unpersist policys with a given tokenId
61 * @param tokenId a given tokenId
67 uint32_t tokenId, cons
[all...]
/base/useriam/pin_auth/services/sa/src/
H A Dpin_auth_service.cpp79 uint32_t tokenId = this->GetFirstTokenID(); in GetTokenId() local
80 if (tokenId == 0) { in GetTokenId()
81 tokenId = this->GetCallingTokenID(); in GetTokenId()
83 return tokenId; in GetTokenId()
109 uint32_t tokenId = GetTokenId(); in CheckPermission()
110 return AccessTokenKit::VerifyAccessToken(tokenId, permission) == RET_SUCCESS; in CheckPermission()
124 uint32_t tokenId = GetTokenId(); in RegisterInputer() local
125 return PinAuthManager::GetInstance().RegisterInputer(tokenId, inputer); in RegisterInputer()
135 uint32_t tokenId = GetTokenId(); in UnRegisterInputer() local
136 PinAuthManager::GetInstance().UnRegisterInputer(tokenId); in UnRegisterInputer()
[all...]
/base/security/access_token/interfaces/innerkits/accesstoken/src/
H A Dtokenid_kit.cpp32 bool TokenIdKit::IsSystemAppByFullTokenID(uint64_t tokenId) in IsSystemAppByFullTokenID() argument
34 ACCESSTOKEN_LOG_DEBUG(LABEL, "Called, tokenId=%{public}" PRId64, tokenId); in IsSystemAppByFullTokenID()
35 return (tokenId & SYSTEM_APP_MASK) == SYSTEM_APP_MASK; in IsSystemAppByFullTokenID()
38 uint64_t TokenIdKit::GetRenderTokenID(uint64_t tokenId) in GetRenderTokenID() argument
40 AccessTokenID id = tokenId & TOKEN_ID_LOWMASK; in GetRenderTokenID()
43 return tokenId; in GetRenderTokenID()
/base/security/access_token/services/privacymanager/src/record/
H A Dpermission_record_manager.cpp160 if ((record1.tokenId != record2.tokenId) || in RecordMergeCheck()
241 record.tokenId, record.opCode, record.status, record.accessCount, record.rejectCount, record.lockScreenStatus, in MergeOrInsertRecord()
254 conditionValue.Put(PrivacyFiledConst::FIELD_TOKEN_ID, static_cast<int32_t>(record.tokenId)); in UpdatePermissionUsedRecord()
308 if (AccessTokenKit::GetTokenTypeFlag(info.tokenId) != TOKEN_HAP) { in GetPermissionRecord()
309 ACCESSTOKEN_LOG_ERROR(LABEL, "Not hap(%{public}d).", info.tokenId); in GetPermissionRecord()
320 record.status = GetAppStatus(info.tokenId); in GetPermissionRecord()
323 record.tokenId = info.tokenId; in GetPermissionRecord()
345 bool PermissionRecordManager::AddOrUpdateUsedTypeIfNeeded(const AccessTokenID tokenId, cons argument
427 RemovePermissionUsedRecords(AccessTokenID tokenId, const std::string& deviceID) RemovePermissionUsedRecords() argument
511 uint32_t tokenId = static_cast<uint32_t>(queryValue.GetInt(PrivacyFiledConst::FIELD_TOKEN_ID)); InsteadMergedRecIfNessary() local
595 int32_t tokenId = value.GetInt(PrivacyFiledConst::FIELD_TOKEN_ID); FillBundleUsedRecord() local
602 AddDebugLog(const AccessTokenID tokenId, const BundleUsedRecord& bundleRecord, const int32_t queryCount, int32_t& totalSuccCount, int32_t& totalFailCount) AddDebugLog() argument
652 int32_t tokenId = recordValue.GetInt(PrivacyFiledConst::FIELD_TOKEN_ID); GetRecordsFromLocalDB() local
684 CreateBundleUsedRecord(const AccessTokenID tokenId, BundleUsedRecord& bundleRecord) CreateBundleUsedRecord() argument
762 AddRecordToStartList( uint32_t tokenId, int32_t pid, const std::string& permissionName, int32_t status) AddRecordToStartList() argument
806 ExecuteAndUpdateRecord(uint32_t tokenId, int32_t pid, ActiveChangeType status) ExecuteAndUpdateRecord() argument
846 NotifyAppStateChange(AccessTokenID tokenId, int32_t pid, ActiveChangeType status) NotifyAppStateChange() argument
871 RemoveRecordFromStartList( AccessTokenID tokenId, int32_t pid, const std::string& permissionName) RemoveRecordFromStartList() argument
918 RemoveRecordFromStartListByPid(const AccessTokenID tokenId, int32_t pid) RemoveRecordFromStartListByPid() argument
952 RemoveRecordFromStartListByToken(const AccessTokenID tokenId) RemoveRecordFromStartListByToken() argument
1006 CallbackExecute( AccessTokenID tokenId, const std::string& permissionName, int32_t status) CallbackExecute() argument
1099 ExecuteCameraCallbackAsync(AccessTokenID tokenId, int32_t pid) ExecuteCameraCallbackAsync() argument
1120 StartUsingPermission( AccessTokenID tokenId, int32_t pid, const std::string& permissionName) StartUsingPermission() argument
1149 StartUsingPermission( AccessTokenID tokenId, int32_t pid, const std::string& permissionName, const sptr<IRemoteObject>& callback) StartUsingPermission() argument
1188 StopUsingPermission( AccessTokenID tokenId, int32_t pid, const std::string& permissionName) StopUsingPermission() argument
1234 IsAllowedUsingCamera(AccessTokenID tokenId) IsAllowedUsingCamera() argument
1248 IsAllowedUsingMicrophone(AccessTokenID tokenId) IsAllowedUsingMicrophone() argument
1264 IsAllowedUsingPermission(AccessTokenID tokenId, const std::string& permissionName) IsAllowedUsingPermission() argument
1310 SetHapWithFGReminder(uint32_t tokenId, bool isAllowed) SetHapWithFGReminder() argument
1455 GetPermissionUsedTypeInfos(AccessTokenID tokenId, const std::string& permissionName, std::vector<PermissionUsedTypeInfo>& results) GetPermissionUsedTypeInfos() argument
1493 GetDeviceId(AccessTokenID tokenId) GetDeviceId() argument
1505 GetAppStatus(AccessTokenID tokenId) GetAppStatus() argument
1559 UpdateCameraFloatWindowStatus(AccessTokenID tokenId, bool isShowing) UpdateCameraFloatWindowStatus() argument
1564 UpdatePipWindowStatus(AccessTokenID tokenId, bool isShowing) UpdatePipWindowStatus() argument
1760 IsCameraWindowShow(AccessTokenID tokenId) IsCameraWindowShow() argument
1775 NotifyCameraWindowChange(bool isPip, AccessTokenID tokenId, bool isShowing) NotifyCameraWindowChange() argument
1857 GetUniqueId(uint32_t tokenId, int32_t pid) const GetUniqueId() argument
[all...]
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/
H A Dpermission_definition_cache.cpp53 bool PermissionDefinitionCache::Insert(const PermissionDef& info, AccessTokenID tokenId) in Insert() argument
63 permissionDefinitionMap_[info.permissionName].tokenId = tokenId; in Insert()
64 if (!hasHapPermissionDefinition_ && (tokenId != EXTENSION_PERMISSION_ID)) { in Insert()
70 bool PermissionDefinitionCache::Update(const PermissionDef& info, AccessTokenID tokenId) in Update() argument
74 permissionDefinitionMap_[info.permissionName].tokenId = tokenId; in Update()
78 void PermissionDefinitionCache::DeleteByToken(AccessTokenID tokenId) in DeleteByToken() argument
83 if (tokenId == it->second.tokenId) { in DeleteByToken()
179 GetDefPermissionsByTokenId(std::vector<PermissionDef>& permList, AccessTokenID tokenId) GetDefPermissionsByTokenId() argument
196 AccessTokenID tokenId = (AccessTokenID)defValue.GetInt(TokenFiledConst::FIELD_TOKEN_ID); RestorePermDefInfo() local
[all...]
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/src/service/
H A Dsandbox_manager_stub.cpp45 static bool CheckPermission(const uint32_t tokenId, const std::string &permission);
161 uint32_t tokenId; in PersistPolicyByTokenIdInner() local
162 if (!data.ReadUint32(tokenId)) { in PersistPolicyByTokenIdInner()
163 SANDBOXMANAGER_LOG_ERROR(LABEL, "read tokenId parcel fail"); in PersistPolicyByTokenIdInner()
173 int32_t ret = this->PersistPolicyByTokenId(tokenId, policyInfoVectorParcel->policyVector, result); in PersistPolicyByTokenIdInner()
195 uint32_t tokenId; in UnPersistPolicyByTokenIdInner() local
196 if (!data.ReadUint32(tokenId)) { in UnPersistPolicyByTokenIdInner()
197 SANDBOXMANAGER_LOG_ERROR(LABEL, "reply tokenId parcel fail"); in UnPersistPolicyByTokenIdInner()
208 int32_t ret = this->UnPersistPolicyByTokenId(tokenId, policyInfoVectorParcel->policyVector, result); in UnPersistPolicyByTokenIdInner()
224 static int32_t ReadSetPolicyParcel(MessageParcel &data, uint32_t &tokenId, in ReadSetPolicyParcel() argument
253 uint32_t tokenId; SetPolicyInner() local
279 uint32_t tokenId; SetPolicyAsyncInner() local
290 ReadUnSetPolicyParcel(MessageParcel &data, uint32_t &tokenId, sptr<PolicyInfoParcel> &policyInfoParcel) ReadUnSetPolicyParcel() argument
314 uint32_t tokenId; UnSetPolicyInner() local
331 uint32_t tokenId; UnSetPolicyAsyncInner() local
343 uint32_t tokenId; CheckPolicyInner() local
433 uint32_t tokenId; CheckPersistPolicyInner() local
468 uint32_t tokenId; StartAccessingByTokenIdInner() local
484 uint32_t tokenId; UnSetAllPolicyByTokenInner() local
537 CheckPermission(const uint32_t tokenId, const std::string &permission) CheckPermission() argument
[all...]
H A Dsandbox_manager_service.cpp173 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicyByTokenId()
176 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in PersistPolicyByTokenId()
179 policy.size(), tokenId); in PersistPolicyByTokenId()
187 return PolicyInfoManager::GetInstance().AddPolicy(tokenId, policy, result, flag); in PersistPolicyByTokenId()
191 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicyByTokenId()
194 if ((policySize == 0) || (policySize > POLICY_VECTOR_SIZE_LIMIT) || (tokenId == 0)) { in UnPersistPolicyByTokenId()
197 policy.size(), tokenId); in UnPersistPolicyByTokenId()
201 return PolicyInfoManager::GetInstance().RemovePolicy(tokenId, policy, result); in UnPersistPolicyByTokenId()
204 int32_t SandboxManagerService::SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, in SetPolicy() argument
212 if (tokenId in SetPolicy()
172 PersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) PersistPolicyByTokenId() argument
190 UnPersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicyByTokenId() argument
224 UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicy() argument
239 SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) SetPolicyAsync() argument
246 UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicyAsync() argument
251 CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPolicy() argument
293 CheckPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument
316 StartAccessingByTokenId(uint32_t tokenId) StartAccessingByTokenId() argument
325 UnSetAllPolicyByToken(uint32_t tokenId) UnSetAllPolicyByToken() argument
414 uint32_t tokenId = std::stoul(strTokenID, &idx); StartByEventAction() local
[all...]
/base/security/access_token/interfaces/innerkits/accesstoken/test/unittest/accesstoken_mock_test/
H A Daccesstoken_kit_test.cpp110 AccessTokenID tokenId = 123; in HWTEST_F() local
111 AccessTokenID localTokenId = AccessTokenKit::AllocLocalTokenID(remoteDevice, tokenId); in HWTEST_F()
141 AccessTokenID tokenId = 123; in HWTEST_F() local
142 ASSERT_EQ(AccessTokenError::ERR_SERVICE_ABNORMAL, AccessTokenKit::DeleteToken(tokenId)); in HWTEST_F()
153 AccessTokenID tokenId = 123; in HWTEST_F() local
154 ASSERT_EQ(TOKEN_INVALID, AccessTokenKit::GetTokenType(tokenId)); in HWTEST_F()
168 AccessTokenID tokenId = AccessTokenKit::GetHapTokenID(userID, bundleName, instIndex); in HWTEST_F() local
169 ASSERT_EQ(INVALID_TOKENID, tokenId); in HWTEST_F()
195 AccessTokenID tokenId = 123; in HWTEST_F() local
197 ASSERT_EQ(AccessTokenError::ERR_SERVICE_ABNORMAL, AccessTokenKit::GetHapTokenInfo(tokenId, tokenInf in HWTEST_F()
208 AccessTokenID tokenId = 805920561; //805920561 is a native tokenId. HWTEST_F() local
221 AccessTokenID tokenId = 123; HWTEST_F() local
263 AccessTokenID tokenId = 123; HWTEST_F() local
276 AccessTokenID tokenId = 123; HWTEST_F() local
289 AccessTokenID tokenId = 123; HWTEST_F() local
346 AccessTokenID tokenId = 123; HWTEST_F() local
365 AccessTokenID tokenId = 123; HWTEST_F() local
379 AccessTokenID tokenId = 123; HWTEST_F() local
393 AccessTokenID tokenId = 123; HWTEST_F() local
459 AccessTokenID tokenId = 123; HWTEST_F() local
486 AccessTokenID tokenId = 123; HWTEST_F() local
499 AccessTokenID tokenId = 123; HWTEST_F() local
577 AccessTokenID tokenId = 123; HWTEST_F() local
[all...]
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/include/mac/
H A Dmac_adapter.h32 int32_t SetSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag,
34 int32_t UnSetSandboxPolicy(uint32_t tokenId, const PolicyInfo &policy);
35 int32_t UnSetSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result);
36 int32_t QuerySandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result);
37 int32_t CheckSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result);
38 int32_t DestroySandboxPolicy(uint32_t tokenId);
/base/security/access_token/interfaces/innerkits/analysis_model/test/unittest/
H A Dcode_signature_analysis_kit_test.cpp55 uint32_t tokenId; member
59 {"test0", 12345}, // 12345 random tokenId.
60 {"test1", 123456}, // 123456 random tokenId.
61 {"test2", 1234567} // 1234567 random tokenId.
195 static void ReportErrorEventMock(DataChangeTypeCode optType, const char* bundleName, uint32_t tokenId) in ReportErrorEventMock() argument
202 g_reportInfo.tokenId = tokenId; in ReportErrorEventMock()
229 ReportErrorEventMock(EVENT_REPORTED, g_bundleInfo[0].name, g_bundleInfo[0].tokenId); in HWTEST_F()
236 ReportErrorEventMock(EVENT_REPORTED, g_bundleInfo[0].name, g_bundleInfo[0].tokenId); in HWTEST_F()
250 EXPECT_EQ(g_bundleInfo[0].tokenId, resul in HWTEST_F()
[all...]
/base/security/access_token/services/privacymanager/include/record/
H A Dpermission_record_manager.h74 void RemovePermissionUsedRecords(AccessTokenID tokenId, const std::string& deviceID);
78 int32_t StartUsingPermission(AccessTokenID tokenId, int32_t pid, const std::string& permissionName);
79 int32_t StartUsingPermission(AccessTokenID tokenId, int32_t pid, const std::string& permissionName,
81 int32_t StopUsingPermission(AccessTokenID tokenId, int32_t pid, const std::string& permissionName);
86 void CallbackExecute(AccessTokenID tokenId, const std::string& permissionName, int32_t status);
88 bool IsAllowedUsingPermission(AccessTokenID tokenId, const std::string& permissionName);
89 int32_t GetPermissionUsedTypeInfos(const AccessTokenID tokenId, const std::string& permissionName,
95 int32_t SetHapWithFGReminder(uint32_t tokenId, bool isAllowed);
97 void NotifyAppStateChange(AccessTokenID tokenId, int32_t pid, ActiveChangeType status);
103 void NotifyCameraWindowChange(bool isPip, AccessTokenID tokenId, boo
[all...]
/base/inputmethod/imf/services/identity_checker/include/
H A Didentity_checker_impl.h27 bool IsBundleNameValid(uint32_t tokenId, const std::string &validBundleName) override;
28 bool HasPermission(uint32_t tokenId, const std::string &permission) override;
29 bool IsBroker(Security::AccessToken::AccessTokenID tokenId) override;
30 bool IsNativeSa(Security::AccessToken::AccessTokenID tokenId) override;
31 std::string GetBundleNameByToken(uint32_t tokenId) override;

Completed in 15 milliseconds

12345678910>>...27