/base/powermgr/power_manager/utils/permission/src/ |
H A D | permission.cpp | 82 bool Permission::IsPermissionGranted(const std::string& perm) in IsPermissionGranted() argument 88 POWER_HILOGD(COMP_UTILS, "checking permission, perm=%{public}s type=%{public}d, pid=%{public}d, uid=%{public}d", in IsPermissionGranted() 89 perm.c_str(), static_cast<int32_t>(type), pid, uid); in IsPermissionGranted() 93 result = AccessTokenKit::VerifyAccessToken(tokenId, perm); in IsPermissionGranted() 106 POWER_HILOGW(COMP_UTILS, "permission denied, perm=%{public}s type=%{public}d, pid=%{public}d, uid=%{public}d", in IsPermissionGranted() 107 perm.c_str(), static_cast<int32_t>(type), pid, uid); in IsPermissionGranted() 113 bool Permission::IsNativePermissionGranted(const std::string& perm) in IsNativePermissionGranted() argument 119 POWER_HILOGD(COMP_UTILS, "checking permission, perm=%{public}s type=%{public}d, pid=%{public}d, uid=%{public}d", in IsNativePermissionGranted() 120 perm.c_str(), static_cast<int32_t>(type), pid, uid); in IsNativePermissionGranted() 128 result = AccessTokenKit::VerifyAccessToken(tokenId, perm); in IsNativePermissionGranted() [all...] |
/base/security/access_token/frameworks/privacy/src/ |
H A D | permission_used_request_parcel.cpp | 30 for (const auto& perm : this->request.permissionList) { in Marshalling() 31 RETURN_IF_FALSE(out.WriteString(perm)); in Marshalling() 55 std::string perm; in Unmarshalling() local 56 RELEASE_IF_FALSE(in.ReadString(perm), requestParcel); in Unmarshalling() 57 requestParcel->request.permissionList.emplace_back(perm); in Unmarshalling()
|
/base/hiviewdfx/hidumper/utils/native/src/ |
H A D | permission.cpp | 19 bool Permission::CheckSelfPermission(const string& perm __attribute__((__unused__))) in CheckSelfPermission() 24 bool Permission::CheckCallingPermission(const string& perm __attribute__((__unused__))) in CheckCallingPermission()
|
/base/security/access_token/services/accesstokenmanager/main/cpp/src/permission/ |
H A D | permission_policy_set.cpp | 319 for (const auto& perm : permStateList_) { in QueryPermissionFlag() 320 if (perm.permissionName == permissionName) { in QueryPermissionFlag() 321 if (perm.isGeneral) { in QueryPermissionFlag() 322 flag = perm.grantFlags[0]; in QueryPermissionFlag() 395 for (auto& perm : permStateList_) { in SetPermissionFlag() 396 if (perm.permissionName == permissionName) { in SetPermissionFlag() 397 if (perm.isGeneral) { in SetPermissionFlag() 398 uint32_t oldFlag = perm.grantFlags[0]; in SetPermissionFlag() 401 perm.grantFlags[0] = newFlag; in SetPermissionFlag() 420 // Permission has been granted, there is no need to add perm stat in UpdateSecCompGrantedPermList() [all...] |
H A D | permission_manager.cpp | 125 for (const auto& perm : permFilterList) { in AddDefPermissions() 127 PermissionDefinitionCache::GetInstance().Update(perm, tokenId); in AddDefPermissions() 131 if (!PermissionDefinitionCache::GetInstance().HasDefinition(perm.permissionName)) { in AddDefPermissions() 132 PermissionDefinitionCache::GetInstance().Insert(perm, tokenId); in AddDefPermissions() 134 PermissionDefinitionCache::GetInstance().Update(perm, tokenId); in AddDefPermissions() 135 ACCESSTOKEN_LOG_INFO(LABEL, "Permission %{public}s has define", perm.permissionName.c_str()); in AddDefPermissions() 226 for (const auto& perm : tmpList) { in GetReqPermissions() 228 GetDefPermission(perm.permissionName, permDef); in GetReqPermissions() 230 reqPermList.emplace_back(perm); in GetReqPermissions() 243 auto iter = std::find_if(permsList.begin(), permsList.end(), [permission](const PermissionStateFull& perm) { in IsPermissionRequestedInHap() [all...] |
/base/hiviewdfx/hidumper/utils/native/include/ |
H A D | permission.h | 22 static bool CheckSelfPermission(const std::string& perm); 23 static bool CheckCallingPermission(const std::string& perm);
|
/base/powermgr/power_manager/utils/permission/include/ |
H A D | permission.h | 27 static bool IsPermissionGranted(const std::string& perm); 28 static bool IsNativePermissionGranted(const std::string& perm);
|
/base/security/access_token/tools/accesstoken/src/ |
H A D | to_string.cpp | 53 for (const auto& perm : permissionRecords) { in PermissionUsedRecordToString() 56 infos.append(R"( "permissionName": ")" + perm.permissionName + R"(")" + ",\n"); in PermissionUsedRecordToString() 57 infos.append(R"( "accessCount": ")" + std::to_string(perm.accessCount) + R"(")" + ",\n"); in PermissionUsedRecordToString() 58 infos.append(R"( "rejectCount": )" + std::to_string(perm.rejectCount) + ",\n"); in PermissionUsedRecordToString() 59 infos.append(R"( "lastAccessTime": )" + std::to_string(perm.lastAccessTime) + ",\n"); in PermissionUsedRecordToString() 60 infos.append(R"( "lastRejectTime": )" + std::to_string(perm.lastRejectTime) + ",\n"); in PermissionUsedRecordToString() 61 infos.append(R"( "lastAccessDuration": )" + std::to_string(perm.lastAccessDuration) + ",\n"); in PermissionUsedRecordToString() 62 ToString::DetailUsedRecordToString(true, perm.accessRecords, infos); in PermissionUsedRecordToString() 63 ToString::DetailUsedRecordToString(false, perm.rejectRecords, infos); in PermissionUsedRecordToString()
|
/base/request/request/services/src/cxx/ |
H A D | request_utils.cpp | 76 auto perm = std::string(permission); in CheckPermission() local 82 int result = AccessTokenKit::VerifyAccessToken(tokenId, perm); in CheckPermission() 84 REQUEST_HILOGE("check permission %{public}s failed ret %{public}d", perm.c_str(), result); in CheckPermission()
|
/base/security/access_token/test/fuzztest/services/accesstoken/getselfpermissionsstatestub_fuzzer/ |
H A D | getselfpermissionsstatestub_fuzzer.cpp | 37 PermissionListState perm = { in GetSelfPermissionsStateStubFuzzTest() local 42 permParcel.permsState = perm; in GetSelfPermissionsStateStubFuzzTest()
|
/base/security/selinux_adapter/scripts/selinux_check/ |
H A D | check_perm_group.py | 56 perm = elem_list[4:] 60 allow_map[(scontext, scontext)][tclass] += perm 64 allow_map[(scontext, tcon)][tclass] += perm 67 allow_map[(scontext, tcontext)][tclass] += perm 73 allow_map[(scon, scon)][tclass] += perm 77 allow_map[(scon, tcon)][tclass] += perm 80 allow_map[(scon, tcontext)][tclass] += perm 158 check_perms = perm_group.get('perm').split(' ')
|
H A D | check_baseline.py | 58 perm = elem_list[4:] 62 allow_map[scontext][(scontext, tclass)] += perm 66 allow_map[scontext][(tcon, tclass)] += perm 69 allow_map[scontext][(tcontext, tclass)] += perm 75 allow_map[scon][(scon, tclass)] += perm 79 allow_map[scon][(tcon, tclass)] += perm 82 allow_map[scon][(tcontext, tclass)] += perm
|
/base/hiviewdfx/hidumper/frameworks/native/src/executor/memory/ |
H A D | memory_util.cpp | 160 memInfo.perm = ""; in InitMemSmapsInfo() 219 uint64_t MemoryUtil::PermToInt(const string& perm) in PermToInt() argument 222 for (size_t i = 0; i < perm.size(); i++) { in PermToInt() 223 if (perm[i] != '-' && perm[i] != 's') { in PermToInt()
|
/base/security/access_token/interfaces/innerkits/token_setproc/src/ |
H A D | perm_setproc.cpp | 30 uint32_t perm[MAX_PERM_SIZE] = { 0 }; member 66 data.perm[idx] |= static_cast<uint32_t>(0x01) << bitIdx; in AddPermissionToKernel() 68 data.perm[idx] &= ~(static_cast<uint32_t>(0x01) << bitIdx); in AddPermissionToKernel()
|
/base/startup/init/services/init/ |
H A D | init_service_file.c | 42 INIT_LOGV("File path =%s . file flags =%d, file perm =%u ", path, file->flags, file->perm); in CreateFile() 47 int fd = open(path, file->flags | O_CREAT, file->perm); in CreateFile() 50 INIT_CHECK_ONLY_ELOG(chmod(path, file->perm) >= 0, "Failed chmod err=%d", errno); in CreateFile()
|
/base/security/access_token/interfaces/innerkits/accesstoken/src/ |
H A D | accesstoken_manager_client.cpp | 121 PermissionDef perm = permParcel.permissionDef; in GetDefPermissions() local 122 permList.emplace_back(perm); in GetDefPermissions() 138 PermissionStateFull perm = permParcel.permStatFull; in GetReqPermissions() local 139 reqPermList.emplace_back(perm); in GetReqPermissions() 172 for (const auto& perm : permList) { in GetSelfPermissionsState() 174 permParcel.permsState = perm; in GetSelfPermissionsState() 181 PermissionListState perm = parcelList[i].permsState; in GetSelfPermissionsState() local 182 permList[i].state = perm.state; in GetSelfPermissionsState() 206 for (const auto& perm : permList) { in GetPermissionsStatus() 208 permParcel.permsState = perm; in GetPermissionsStatus() 216 PermissionListState perm = parcelList[i].permsState; GetPermissionsStatus() local [all...] |
/base/security/access_token/test/fuzztest/innerkits/accesstoken/getpermissionsstatus_fuzzer/ |
H A D | getpermissionsstatus_fuzzer.cpp | 104 PermissionListState perm = { in GetPermissionsStatusFuzzTest() local 108 permsList.emplace_back(perm); in GetPermissionsStatusFuzzTest()
|
/base/security/access_token/interfaces/innerkits/token_callback/src/ |
H A D | token_callback_stub.cpp | 58 std::string perm = to_utf8(u16Perm); in OnRemoteRequest() local 59 permList.emplace_back(perm); in OnRemoteRequest()
|
/base/startup/init/services/init/include/ |
H A D | init_service_file.h | 39 mode_t perm; // Setting permissions member
|
/base/security/access_token/services/privacymanager/src/record/ |
H A D | permission_record_manager.cpp | 314 ACCESSTOKEN_LOG_ERROR(LABEL, "Invalid perm(%{public}s)", info.permissionName.c_str()); in GetPermissionRecord() 768 ACCESSTOKEN_LOG_ERROR(LABEL, "Invalid perm(%{public}s)", permissionName.c_str()); in AddRecordToStartList() 812 std::string perm; in ExecuteAndUpdateRecord() local 813 Constant::TransferOpcodeToPermission(it->opCode, perm); in ExecuteAndUpdateRecord() 814 if ((GetMuteStatus(perm, EDM)) || (!GetGlobalSwitchStatus(perm))) { in ExecuteAndUpdateRecord() 824 if ((perm == CAMERA_PERMISSION_NAME) && (status == PERM_ACTIVE_IN_BACKGROUND) && in ExecuteAndUpdateRecord() 827 camPermList.emplace_back(perm); in ExecuteAndUpdateRecord() 833 ACCESSTOKEN_LOG_DEBUG(LABEL, "TokenId %{public}d get permission %{public}s.", tokenId, perm.c_str()); in ExecuteAndUpdateRecord() 880 ACCESSTOKEN_LOG_DEBUG(LABEL, "Id %{public}u, pid %{public}d, perm in RemoveRecordFromStartList() 933 std::string perm; RemoveRecordFromStartListByPid() local 965 std::string perm; RemoveRecordFromStartListByToken() local 984 std::string perm; RemoveRecordFromStartListByOp() local [all...] |
/base/security/access_token/test/fuzztest/services/accesstoken/getpermissionsstatusstub_fuzzer/ |
H A D | getpermissionsstatusstub_fuzzer.cpp | 107 PermissionListState perm = { in GetPermissionsStatusStubFuzzTest() local 112 permParcel.permsState = perm; in GetPermissionsStatusStubFuzzTest()
|
/base/useriam/user_auth_framework/test/fuzztest/dummy/ |
H A D | mock_ipc_common.cpp | 121 void IpcCommon::AddPermission(Permission perm) in AddPermission() argument 123 permSet_.insert(perm); in AddPermission()
|
/base/useriam/user_auth_framework/test/unittest/services/mocks/ |
H A D | mock_ipc_common.cpp | 121 void IpcCommon::AddPermission(Permission perm) in AddPermission() argument 123 permSet_.insert(perm); in AddPermission()
|
/base/security/dlp_permission_service/frameworks/dlp_permission/src/ |
H A D | dlp_policy_parcel.cpp | 57 DLP_LOG_ERROR(LABEL, "Write perm fail"); in Marshalling() 267 uint8_t perm = 0; in ReadParcel() local 268 if (!(in.ReadUint8(perm))) { in ReadParcel() 272 policyParcel->policyParams_.perm_ = static_cast<DLPFileAccess>(perm); in ReadParcel()
|
/base/security/dlp_permission_service/frameworks/common/src/ |
H A D | permission_policy.cpp | 58 static bool CheckPerm(uint32_t perm) in CheckPerm() argument 60 if (perm <= NO_PERMISSION || perm > FULL_CONTROL) { in CheckPerm() 61 DLP_LOG_ERROR(LABEL, "Auth Perm invalid, perm=%{public}u", perm); in CheckPerm()
|