Home
last modified time | relevance | path

Searched refs:isAllow (Results 1 - 25 of 27) sorted by relevance

12

/foundation/ability/ability_runtime/frameworks/js/napi/js_dialog_session/
H A Djs_dialog_session.cpp103 bool isAllow = false; in OnSendDialogResult() local
104 if (!ConvertFromJsValue(env, info.argv[ARGC_TWO], isAllow)) { in OnSendDialogResult()
105 TAG_LOGE(AAFwkTag::DIALOG, "Failed unwrap isAllow"); in OnSendDialogResult()
106 ThrowInvalidParamError(env, "Parameter error: isAllow must be a Boolean."); in OnSendDialogResult()
110 [dialogSessionId, want, isAllow](napi_env env, NapiAsyncTask &task, int32_t status) { in OnSendDialogResult()
112 auto errorcode = AbilityManagerClient::GetInstance()->SendDialogResult(want, dialogSessionId, isAllow); in OnSendDialogResult()
/foundation/bundlemanager/ecological_rule_manager/interfaces/innerkits/include/
H A Decological_rule_mgr_service_param.h30 bool isAllow = true; member
45 bool isAllow = true; member
/foundation/bundlemanager/bundle_framework/services/bundlemgr/src/free_install/
H A Dbms_ecological_rule_mgr_service_param.cpp37 if (!in.ReadBool(rule->isAllow)) { in Unmarshalling()
38 LOG_E(BMS_TAG_DEFAULT, "read isAllow failed"); in Unmarshalling()
56 if (!parcel.WriteBool(isAllow)) { in Marshalling()
57 LOG_E(BMS_TAG_DEFAULT, "write isAllow failed"); in Marshalling()
H A Dbms_ecological_rule_mgr_service_client.cpp112 LOG_D(BMS_TAG_DEFAULT, "isAllow = %{public}d, replaceWant = %{public}s", rule.isAllow, in QueryFreeInstallExperience()
H A Dbundle_connect_ability_mgr.cpp300 } else if (rule.isAllow) { in SilentInstall()
/foundation/resourceschedule/device_standby/utils/test/fuzztest/configmanager_fuzzer/
H A Dconfigmanager_fuzzer.cpp138 bool isAllow = GetData<bool>(); in DoSomethingInterestingWithMyAPI() local
151 condition, debugMode, isAllow); in DoSomethingInterestingWithMyAPI()
153 condition, debugMode, isAllow); in DoSomethingInterestingWithMyAPI()
/foundation/bundlemanager/ecological_rule_manager/interfaces/innerkits/src/
H A Decological_rule_mgr_service_client.cpp107 rule.isAllow = true; in QueryFreeInstallExperience()
141 rule.isAllow = true; in QueryStartExperience()
H A Decological_rule_mgr_service_param.cpp66 if (!in.ReadBool(rule->isAllow)) { in Unmarshalling()
76 bool res = parcel.WriteBool(isAllow) && parcel.WriteParcelable(replaceWant); in Marshalling()
/foundation/bundlemanager/bundle_framework/services/bundlemgr/include/free_install/
H A Dbms_ecological_rule_mgr_service_param.h30 bool isAllow = true; member
/foundation/resourceschedule/device_standby/utils/policy/include/
H A Dstandby_config_manager.h95 uint32_t condition, bool isAllow, bool isApp);
97 uint32_t condition, bool isAllow, bool isApp);
116 uint32_t condition, bool isAllow, bool isApp, const std::function<void(bool, std::set<T>&,
/foundation/bundlemanager/ecological_rule_manager/services/manager/src/
H A Decologic_rule_mgr_service_stub.cpp155 bmsRule.isAllow = rule.isAllow; in TransBmsExperienceRule()
/foundation/communication/netmanager_base/frameworks/js/napi/netpolicy/src/
H A Dnet_policy_callback_observer.cpp143 bool isAllow = *isAllowPtr; in CreateNetBackgroundPolicyChangeParam() local
144 napi_value jsValue = NapiUtils::GetBoolean(env, isAllow); in CreateNetBackgroundPolicyChangeParam()
/foundation/resourceschedule/device_standby/plugins/strategy/include/
H A Dbase_network_strategy.h108 virtual void SetNetAllowApps(bool isAllow);
/foundation/communication/netmanager_base/services/netpolicymanager/include/
H A Dfirewall_rule.h112 * @param isAllow allow the firewall rule or not
114 virtual void SetUidFirewallRule(uint32_t uid, bool isAllow);
/foundation/resourceschedule/device_standby/utils/policy/src/
H A Dstandby_config_manager.cpp450 uint32_t condition, bool isAllow, bool isApp, const std::function<void(bool, std::set<T>&, in GetEligibleAllowConfig()
461 if (config.isAllow_ != isAllow) { in GetEligibleAllowConfig()
482 uint32_t condition, bool isAllow, bool isApp) in GetEligibleAllowTimeConfig()
494 return GetEligibleAllowConfig<TimeLtdProcess>(paramName, condition, isAllow, isApp, func); in GetEligibleAllowTimeConfig()
498 uint32_t condition, bool isAllow, bool isApp) in GetEligiblePersistAllowConfig()
508 return GetEligibleAllowConfig<std::string>(paramName, condition, isAllow, isApp, func); in GetEligiblePersistAllowConfig()
449 GetEligibleAllowConfig(const std::string& paramName, uint32_t condition, bool isAllow, bool isApp, const std::function<void(bool, std::set<T>&, const DefaultResourceConfig&)>& func) GetEligibleAllowConfig() argument
481 GetEligibleAllowTimeConfig(const std::string& paramName, uint32_t condition, bool isAllow, bool isApp) GetEligibleAllowTimeConfig() argument
497 GetEligiblePersistAllowConfig(const std::string& paramName, uint32_t condition, bool isAllow, bool isApp) GetEligiblePersistAllowConfig() argument
/foundation/resourceschedule/device_standby/plugins/strategy/src/
H A Dbase_network_strategy.cpp324 void BaseNetworkStrategy::SetNetAllowApps(bool isAllow) in SetNetAllowApps() argument
336 STANDBYSERVICE_LOGD("uid: %{public}d, name: %{public}s, isAllow: %{public}d", in SetNetAllowApps()
337 key, value.name_.c_str(), isAllow); in SetNetAllowApps()
341 SetFirewallAllowedList(uids, isAllow); in SetNetAllowApps()
/foundation/resourceschedule/device_standby/services/core/include/
H A Dstandby_service_impl.h149 void GetPersistAllowList(uint32_t allowTypeIndex, std::vector<AllowInfo>& allowInfoList, bool isAllow, bool isApp);
/foundation/ability/ability_runtime/test/mock/frameworks_kits_appkit_native_test/ability_delegator/
H A Dmock_ability_delegator_stub.h100 MOCK_METHOD1(SetShowOnLockScreen, int(bool isAllow));
280 MOCK_METHOD1(SetShowOnLockScreen, int(bool isAllow));
/foundation/bundlemanager/bundle_framework/services/test/mock/include/
H A Dmock_ability_mgr_host.h256 virtual int SetShowOnLockScreen(bool isAllow) override
/foundation/resourceschedule/device_standby/services/core/src/
H A Dstandby_service_impl.cpp822 bool isAllow, bool isApp) in GetPersistAllowList()
828 AllowTypeName[allowTypeIndex], condition, isAllow, true); in GetPersistAllowList()
831 AllowTypeName[allowTypeIndex], condition, isAllow, false); in GetPersistAllowList()
821 GetPersistAllowList(uint32_t allowTypeIndex, std::vector<AllowInfo>& allowInfoList, bool isAllow, bool isApp) GetPersistAllowList() argument
/foundation/ability/ability_runtime/services/abilitymgr/include/
H A Dability_manager_proxy.h853 virtual int SendDialogResult(const Want &want, const std::string &dialogSessionId, bool isAllow) override;
/foundation/ability/ability_runtime/interfaces/inner_api/ability_manager/include/
H A Dability_manager_interface.h1091 virtual int SendDialogResult(const Want &want, const std::string &dialogSessionId, bool isAllow) in SendDialogResult() argument
H A Dability_manager_client.h1093 ErrCode SendDialogResult(const Want &want, const std::string &dialogSessionId, bool isAllow);
/foundation/ability/ability_runtime/test/unittest/ability_manager_client_branch_test/
H A Dability_manager_client_branch_test.cpp2061 bool isAllow = true; in HWTEST_F() local
2062 auto result = client_->SendDialogResult(want, dialogSessionId, isAllow); in HWTEST_F()
/foundation/ability/ability_runtime/services/abilitymgr/src/
H A Dability_manager_client.cpp1410 ErrCode AbilityManagerClient::SendDialogResult(const Want &want, const std::string &dialogSessionId, const bool isAllow) in SendDialogResult() argument
1414 return abms->SendDialogResult(want, dialogSessionId, isAllow); in SendDialogResult()

Completed in 28 milliseconds

12