Home
last modified time | relevance | path

Searched full:path (Results 3101 - 3125 of 34098) sorted by relevance

1...<<121122123124125126127128129130>>...1364

/base/request/request/services/src/task/
H A Dfiles.rs77 open_file_readonly(uid, &bundle_and_account, &fs.path), in open_task_files()
107 open_file_readwrite(uid, &bundle_and_account, &fs.path), in open_task_files()
131 for (idx, path) in config.body_file_paths.iter().enumerate() { in open_body_files()
133 open_file_readwrite(uid, &bundle_and_account, path), in open_body_files()
143 fn open_file_readwrite(uid: u64, bundle: &str, path: &str) -> io::Result<File> { in open_file_readwrite()
148 .open(convert_path(uid, bundle, path)), in open_file_readwrite()
153 fn open_file_readonly(uid: u64, bundle_and_account: &str, path: &str) -> io::Result<File> { in open_file_readonly()
157 .open(convert_path(uid, bundle_and_account, path)), in open_file_readonly()
174 pub(crate) fn convert_path(uid: u64, bundle_and_account: &str, path: &str) -> String {
177 let real_path = path
[all...]
/base/security/asset/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/base/security/certificate_framework/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/base/security/certificate_manager/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/base/security/code_signature/
H A DOAT.xml24 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
25 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
27 "compatibility" is used to check license compatibility in the specified path;
28 "license" is used to check source license header in the specified path;
29 "copyright" is used to check source copyright header in the specified path;
30 "import" is used to check source dependency in the specified path, such as import ... ,include ...
31 "filetype" is used to check file type in the specified path, supported file types: archive, binary
32 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
34 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
38 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/base/security/device_auth/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/base/security/huks/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/base/security/security_guard/oem_property/hos/
H A Dsecurity_guard_model.cfg4 "path": "/system/lib64/libsg_system_risk_detection.z.so",
126 "path": "/system/lib64/libsg_system_risk_detection.z.so",
188 "path": "/system/lib64/libsg_system_risk_detection.z.so",
220 "path": "/system/lib64/libaudit_model.z.so",
248 "path": "/system/lib64/libsg_threat_detection.z.so",
263 "path": "/system/lib64/libsg_oem_mode_detection.z.so",
275 "path": "/system/lib64/libsg_app_risk_detection.z.so",
291 "path": "/system/lib64/libsg_app_risk_detection.z.so",
307 "path": "/system/lib64/libsg_time_event_related_analysis.z.so",
319 "path"
[all...]
/base/security/selinux_adapter/sepolicy/ohos_policy/tee/tee_client/system/
H A Dtlogcat.te18 #avc: denied { ioctl } for pid=677 comm="tlogcat" path="/data/log/tee/teeOS_log-0" dev="sdd80" ino=125 ioctlcmd=0x5413 scontext=u:r:tlogcat:s0 tcontext=u:object_r:data_log:s0 tclass=file permissive=1
23 #avc: denied { open } for pid=654 comm="tlogcat" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="tmpfs" ino=74 scontext=u:r:tlogcat:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1
24 #avc: denied { map } for pid=654 comm="tlogcat" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="tmpfs" ino=74 scontext=u:r:tlogcat:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1
31 #avc: denied { open } for pid=677 comm="tlogcat" path="/dev/__parameters__/u:object_r:hilog_param:s0" dev="tmpfs" ino=63 scontext=u:r:tlogcat:s0 tcontext=u:object_r:hilog_param:s0 tclass=file permissive=1
32 #avc: denied { map } for pid=677 comm="tlogcat" path="/dev/__parameters__/u:object_r:hilog_param:s0" dev="tmpfs" ino=63 scontext=u:r:tlogcat:s0 tcontext=u:object_r:hilog_param:s0 tclass=file permissive=1
35 #avc: denied { open } for pid=677 comm="tlogcat" path="/proc/sys/vm/overcommit_memory" dev="proc" ino=3092 scontext=u:r:tlogcat:s0 tcontext=u:object_r:proc_file:s0 tclass=file permissive=1
37 #avc: denied { entrypoint } for pid=677 comm="init" path="/system/bin/tlogcat" dev="sdd76" ino=428 scontext=u:r:tlogcat:s0 tcontext=u:object_r:system_bin_file:s0 tclass=file permissive=1
38 #avc: denied { map } for pid=677 comm="tlogcat" path="/system/bin/tlogcat" dev="sdd76" ino=428 scontext=u:r:tlogcat:s0 tcontext=u:object_r:system_bin_file:s0 tclass=file permissive=1
39 #avc: denied { read } for pid=677 comm="tlogcat" path="/system/bin/tlogcat" dev="sdd76" ino=428 scontext=u:r:tlogcat:s0 tcontext=u:object_r:system_bin_file:s0 tclass=file permissive=1
40 #avc: denied { execute } for pid=677 comm="tlogcat" path
[all...]
/base/security/selinux_adapter/sepolicy/ohos_policy/update/updater/system/
H A Dfaultloggerd.te19 #avc: denied { entrypoint } for pid=238 comm="init" path="/bin/faultloggerd" dev="rootfs" ino=17767 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
20 #avc: denied { map } for pid=238 comm="faultloggerd" path="/bin/faultloggerd" dev="rootfs" ino=17767 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
21 #avc: denied { read } for pid=238 comm="faultloggerd" path="/bin/faultloggerd" dev="rootfs" ino=17767 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
22 #avc: denied { execute } for pid=233 comm="faultloggerd" path="/bin/faultloggerd" dev="rootfs" ino=17095 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
23 #avc: denied { open } for pid=233 comm="faultloggerd" path="/etc/ld-musl-namespace-arm.ini" dev="rootfs" ino=16765 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
24 #avc: denied { getattr } for pid=233 comm="faultloggerd" path="/etc/ld-musl-namespace-arm.ini" dev="rootfs" ino=16765 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=file permissive=1
27 #avc: denied { read write } for pid=238 comm="faultloggerd" path="/dev/console" dev="rootfs" ino=17411 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:rootfs:s0 tclass=chr_file permissive=1
32 #avc: denied { read write } for pid=238 comm="faultloggerd" path="socket:[18134]" dev="sockfs" ino=18134 scontext=u:r:faultloggerd:s0 tcontext=u:r:ueventd:s0 tclass=netlink_kobject_uevent_socket permissive=1
36 #avc: denied { open } for pid=233 comm="faultloggerd" path="/dev/__parameters__/u:object_r:musl_param:s0" dev="tmpfs" ino=40 scontext=u:r:faultloggerd:s0 tcontext=u:object_r:musl_param:s0 tclass=file permissive=1
37 #avc: denied { map } for pid=229 comm="faultloggerd" path
[all...]
/base/security/selinux_adapter/sepolicy/ohos_policy/startup/appspawn/system/
H A Dpid_ns_init.te16 # avc_audit_slow:260] avc: denied { open } for pid=1, comm="/system/bin/pid_ns_init" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="" ino=223 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1
17 # avc_audit_slow:260] avc: denied { read } for pid=1, comm="/system/bin/pid_ns_init" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="" ino=223 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1
22 # avc: denied { getattr } for pid=268 comm="plat_shared" path="/proc/708/comm" dev="proc" ino=33421 scontext=u:r:hiview:s0 tcontext=u:r:pid_ns_init:s0 tclass=file permissive=1
23 # avc: denied { open } for pid=268 comm="plat_shared" path="/proc/708/comm" dev="proc" ino=33421 scontext=u:r:hiview:s0 tcontext=u:r:pid_ns_init:s0 tclass=file permissive=1
27 # avc: denied { map } for pid=768 comm="pid_ns_init" path="/dev/__parameters__/u:object_r:debug_param:s0" dev="tmpfs" ino=73 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:debug_param:s0 tclass=file permissive=1
29 # avc: denied { map } for pid=768 comm="pid_ns_init" path="/system/bin/pid_ns_init" dev="mmcblk0p7" ino=335 scontext=u:r:pid_ns_init:s0 tcontext=u:object_r:pid_ns_init_exec:s0 tclass=file permissive=1
33 # avc: denied { getattr } for pid=1654 comm="ls" path="/proc/708/ns" dev="proc" ino=33493 scontext=u:r:su:s0 tcontext=u:r:pid_ns_init:s0 tclass=dir permissive=1
34 # avc: denied { open } for pid=1654 comm="ls" path="/proc/708/ns" dev="proc" ino=33493 scontext=u:r:su:s0 tcontext=u:r:pid_ns_init:s0 tclass=dir permissive=1
40 # avc: denied { getattr } for pid=1654 comm="ls" path="/proc/708/ns/net" dev="proc" ino=33494 scontext=u:r:su:s0 tcontext=u:r:pid_ns_init:s0 tclass=lnk_file permissive=1
43 # avc: denied { open } for pid=1761 comm="ps" path
[all...]
/base/telephony/ril_adapter/services/hril_hdf/src/
H A Dhril_hdf.c29 #define RIL_VENDOR_LIB_PATH "const.sys.radio.vendorlib.path"
47 static int32_t GetVendorLibPath(char *path) in GetVendorLibPath() argument
50 code = GetParameter(RIL_VENDOR_LIB_PATH, "", path, PARAMETER_SIZE); in GetVendorLibPath()
57 if (strcpy_s(path, PARAMETER_SIZE, "libril_msgtransfer.z.so") == EOK) { in GetVendorLibPath()
58 TELEPHONY_LOGI("virtualModemSwitch on set path libril_msgtransfer.z.so"); in GetVendorLibPath()
65 TELEPHONY_LOGE("Failed to get vendor library path through system properties. err:%{public}d", code); in GetVendorLibPath()
114 const char *path = udev_list_entry_get_name(devListEntry); in GetUsbDeviceInfo() local
115 if (path == NULL) { in GetUsbDeviceInfo()
118 dev = udev_device_new_from_syspath(udev, path); in GetUsbDeviceInfo()
160 TELEPHONY_LOGE("dynamic library path i in LoadVendor()
[all...]
/base/update/sys_installer/frameworks/ipc_server/src/
H A Dmodule_update_service.cpp65 LOG(ERROR) << "Invalid package path " << pkgPath; in InstallModulePackage()
106 int32_t ModuleUpdateService::StartUpdateHmpPackage(const std::string &path, in StartUpdateHmpPackage() argument
112 ModuleUpdateMain::GetInstance().SaveInstallerResult(path, ret, std::to_string(ret), timer); in StartUpdateHmpPackage()
118 LOG(INFO) << "StartUpdateHmpPackage " << path; in StartUpdateHmpPackage()
126 if (VerifyModulePackageSign(path) != 0) { in StartUpdateHmpPackage()
127 LOG(ERROR) << "Verify sign failed " << path; in StartUpdateHmpPackage()
132 ret = InstallModulePackage(path); in StartUpdateHmpPackage()
156 tmpUpdateInfo.path = signalResult[0]; in GetHmpUpdateResult()
161 if (iter.path.find(tmpUpdateInfo.path) ! in GetHmpUpdateResult()
[all...]
/base/update/updater/test/unittest/utils/
H A Dutils_unittest.cpp81 string path = "/data/updater/log"; in HWTEST_F() local
84 EXPECT_NE(Utils::GetFilesFromDirectory(path, files, true), -1); in HWTEST_F()
89 string path = ""; in HWTEST_F() local
90 EXPECT_EQ(Utils::RemoveDir(path), false); in HWTEST_F()
91 path = TEST_PATH_FROM + "../utils/nonExistDir"; in HWTEST_F()
92 EXPECT_EQ(Utils::RemoveDir(path), false); in HWTEST_F()
93 path = "/data/updater/rmDir"; in HWTEST_F()
94 int ret = mkdir(path.c_str(), S_IRWXU | S_IRGRP | S_IXGRP | S_IROTH | S_IXOTH); in HWTEST_F()
97 string filePath = path + "/tmpFile"; in HWTEST_F()
101 EXPECT_EQ(Utils::RemoveDir(path), tru in HWTEST_F()
[all...]
/foundation/ability/ability_lite/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/foundation/arkui/ace_engine/frameworks/core/components_ng/pattern/text_drag/
H A Dtext_drag_overlay_modifier.cpp45 void TextDragOverlayModifier::PaintShadow(const RSPath& path, const Shadow& shadow, RSCanvas& canvas) in PaintShadow() argument
51 rsPath.AddPath(path); in PaintShadow()
66 void TextDragOverlayModifier::PaintBackground(const RSPath& path, RSCanvas& canvas, in PaintBackground() argument
70 PaintShadow(path, shadow, canvas); in PaintBackground()
78 canvas.DrawPath(path); in PaintBackground()
84 canvas.ClipPath(path, RSClipOp::INTERSECT, true); in PaintBackground()
104 std::shared_ptr<RSPath> path; in onDraw() local
106 path = pattern->GetBackgroundPath(); in onDraw()
108 path = pattern->GenerateBackgroundPath(backgroundOffset_->Get(), 1 - selectedBackgroundOpacity_->Get()); in onDraw()
110 PaintBackground(*path, canva in onDraw()
[all...]
/foundation/bundlemanager/bundle_framework/services/bundlemgr/include/
H A Dpre_install_bundle_info.h75 * @brief Get bundle path.
76 * @return Return bundle path
83 * @brief Add bundle path.
84 * @param bundlePath bundle path.
95 * @brief Delete bundle path.
96 * @param bundlePath bundle path.
106 * @brief clear bundle path.
107 * @param bundlePath bundle path.
114 * @brief Has bundle path.
115 * @param bundlePath bundle path
[all...]
/foundation/arkui/ace_engine_lite/frameworks/src/core/context/
H A Djs_app_context.h57 * @param: fullPath js file full path
69 * @brief set the ability path, bundle name and token info for current ability
71 * @param: ability's path, bundle name and token info
75 * @brief return ability path
82 * @brief set the js path and uuid info for current ability
84 * @param: js's path
88 * @brief return js path
96 * @brief set the js path and uuid info for current ability
191 * @param: fullPath js file full path
208 // record current running ability's uuid && ability path, wil
[all...]
/foundation/multimedia/media_library/frameworks/innerkitsimpl/medialibrary_data_extension/include/
H A Dmedialibrary_object_utils.h43 std::string &path, int32_t &mediaType);
45 EXPORT static int32_t CreateDirWithPath(const std::string &path);
56 static void ScanFileAsync(const std::string &path, const std::string &id, MediaLibraryApi api);
57 static void ScanFileSyncWithoutAlbumUpdate(const std::string &path, const std::string &id, MediaLibraryApi api);
58 EXPORT static int32_t GetIdByPathFromDb(const std::string &path);
73 EXPORT static bool IsFileExistInDb(const std::string &path);
85 const string &path = "");
91 EXPORT static int32_t ModifyInfoByPathInDb(MediaLibraryCommand &cmd, const std::string &path);
92 EXPORT static int32_t DeleteInfoByPathInDb(MediaLibraryCommand &cmd, const std::string &path);
97 EXPORT static int32_t DeleteInvalidRowInDb(const std::string &path);
[all...]
/foundation/resourceschedule/qos_manager/
H A DOAT.xml26 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
27 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
29 "compatibility" is used to check license compatibility in the specified path;
30 "license" is used to check source license header in the specified path;
31 "copyright" is used to check source copyright header in the specified path;
32 "import" is used to check source dependency in the specified path, such as import ... ,include ...
33 "filetype" is used to check file type in the specified path, supported file types: archive, binary
34 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
36 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
40 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/foundation/distributeddatamgr/data_share/
H A DOAT.xml23 2. policyitem: The fields type, name, path, desc is required, and the fields rule, group, filefilter is optional,the default value is:
24 <policyitem type="" name="" path="" desc="" rule="may" group="defaultGroup" filefilter="defaultPolicyFilter"/>
26 "compatibility" is used to check license compatibility in the specified path;
27 "license" is used to check source license header in the specified path;
28 "copyright" is used to check source copyright header in the specified path;
29 "import" is used to check source dependency in the specified path, such as import ... ,include ...
30 "filetype" is used to check file type in the specified path, supported file types: archive, binary
31 "filename" is used to check whether the specified file exists in the specified path(projectroot means the root dir of the project), supported file names: LICENSE, README, README.OpenSource
33 5. policyitem path: This field is used for define the source file scope to apply this policyitem, the "!" prefix means exclude the files. For example, "!.*/lib/.*" means files in lib dir will be exclude while process this policyitem.
37 8. filefilter: Filter rules, the type filename is used to filter file name, the type filepath is used to filter file path
[all...]
/foundation/distributeddatamgr/relational_store/interfaces/ndk/src/
H A Drelational_asset.cpp44 int OH_Data_Asset_SetPath(Data_Asset *asset, const char *path) in OH_Data_Asset_SetPath() argument
46 if (asset == nullptr || path == nullptr) { in OH_Data_Asset_SetPath()
50 asset->asset_.path = path; in OH_Data_Asset_SetPath()
135 int OH_Data_Asset_GetPath(Data_Asset *asset, char *path, size_t *length) in OH_Data_Asset_GetPath() argument
138 LOG_ERROR("Asset get path error: asset is NULL ? %{public}d.", (asset == nullptr)); in OH_Data_Asset_GetPath()
141 size_t pathLength = asset->asset_.path.size(); in OH_Data_Asset_GetPath()
143 LOG_ERROR("Asset get path error: length is too small ? %{public}d.", (pathLength >= *length)); in OH_Data_Asset_GetPath()
146 errno_t result = strcpy_s(path, *length, asset->asset_.path in OH_Data_Asset_GetPath()
[all...]
/foundation/filemanagement/app_file_service/utils/src/b_tarball/
H A Db_tarball_factory.cpp44 * An absolute path is required.
53 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "The root must be an existing canonicalized path"); in UntarFort()
62 * An absolute path is required.
63 * @param includes Path to be packed in the root directory.
64 * The relative path is required. If this parameter is not specified, all packages are packed by default.
65 * @param excludes The part that does not need to be packed in the path to be packed
66 * Requires a relative path. Can be used to exclude some subdirectories
76 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "The root must be an existing canonicalized path"); in TarFilter()
131 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "Tarball path differed after canonicalizing"); in GetTarballDirAndName()
136 throw BError(BError::Codes::UTILS_INVAL_TARBALL_ARG, "Tarball path did in GetTarballDirAndName()
[all...]
/foundation/filemanagement/file_api/interfaces/kits/js/src/mod_fileio/properties/
H A Dread_text.cpp77 auto [resGetFirstArg, path, unused] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Sync()
79 UniError(EINVAL).ThrowErr(env, "Invalid path"); in Sync()
91 sfd.SetFD(open(path.get(), O_RDONLY)); in Sync()
127 static UniError AsyncExec(const std::string &path, std::shared_ptr<AsyncReadTextArg> arg, int64_t position, in AsyncExec() argument
136 sfd.SetFD(open(path.c_str(), O_RDONLY)); in AsyncExec()
176 auto [resGetFirstArg, path, unused] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Async()
178 UniError(EINVAL).ThrowErr(env, "Invalid path"); in Async()
194 [path = string(path.get()), arg, position = position, hasLen = hasLen, len = len](napi_env env) -> UniError { in Async()
195 return AsyncExec(path, ar in Async()
[all...]
/foundation/filemanagement/file_api/interfaces/kits/js/src/mod_fs/properties/
H A Dread_lines.cpp46 static int GetFileSize(const string &path, int64_t &offset) in GetFileSize() argument
55 int ret = uv_fs_stat(nullptr, stat_req.get(), path.c_str(), nullptr); in GetFileSize()
57 HILOGE("Failed to get file stat by path"); in GetFileSize()
122 auto [succPath, path, ignore] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Async()
124 HILOGE("Invalid path from JS first argument"); in Async()
144 auto cbExec = [arg, pathStr = string(path.get())]() -> NError { in Async()
174 auto [succPath, path, ignore] = NVal(env, funcArg[NARG_POS::FIRST]).ToUTF8StringPath(); in Sync()
176 HILOGE("Invalid path from JS first argument"); in Sync()
190 auto iterator = ::ReaderIterator(path.get()); in Sync()
198 int ret = GetFileSize(path in Sync()
[all...]

Completed in 17 milliseconds

1...<<121122123124125126127128129130>>...1364