/base/security/dlp_permission_service/services/dlp_permission/sa/test/unittest/src/ |
H A D | permission_policy_test.cpp | 51 void InitNormalPolicy(std::shared_ptr<PermissionPolicy>& policy) in InitNormalPolicy() argument 53 policy->ownerAccount_ = "testAccount"; in InitNormalPolicy() 54 policy->ownerAccountId_ = "testAccountId"; in InitNormalPolicy() 55 policy->ownerAccountType_ = CLOUD_ACCOUNT; in InitNormalPolicy() 56 policy->aeskey_ = new (std::nothrow) uint8_t[16]; in InitNormalPolicy() 57 policy->aeskeyLen_ = AES_KEY_LEN; in InitNormalPolicy() 58 policy->iv_ = new (std::nothrow) uint8_t[16]; in InitNormalPolicy() 59 policy->ivLen_ = IV_LEN; in InitNormalPolicy() 63 policy->authUsers_.emplace_back(user); in InitNormalPolicy() 84 std::shared_ptr<PermissionPolicy> policy in HWTEST_F() local 99 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 116 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 140 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 163 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 187 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 211 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 265 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 290 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local 314 std::shared_ptr<PermissionPolicy> policy = std::make_shared<PermissionPolicy>(); HWTEST_F() local [all...] |
H A D | dlp_permission_serializer_test.cpp | 65 PermissionPolicy policy; in HWTEST_F() local 66 policy.authUsers_ = authUsers; in HWTEST_F() 70 int32_t ret = serialize.SerializeDlpPermission(policy, permInfoJson); in HWTEST_F() 85 PermissionPolicy policy; in HWTEST_F() local 86 policy.SetAeskey(reinterpret_cast<uint8_t*>(aeskey), AESKEY_LEN); in HWTEST_F() 90 int32_t ret = serialize.SerializeDlpPermission(policy, permInfoJson); in HWTEST_F() 151 PermissionPolicy policy; in HWTEST_F() local 155 int32_t ret = serialize.DeserializeDlpPermission(permJson, policy); in HWTEST_F() 170 PermissionPolicy policy; in HWTEST_F() local 174 int32_t ret = serialize.DeserializeDlpPermission(permJson, policy); in HWTEST_F() 189 PermissionPolicy policy; HWTEST_F() local 213 PermissionPolicy policy; HWTEST_F() local 274 PermissionPolicy policy; HWTEST_F() local [all...] |
/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/utils/ |
H A D | password_policy_serializer_test.cpp | 53 PasswordPolicy policy; in HWTEST_F() local 54 bool ret = serializer->Deserialize(jsonString, policy); in HWTEST_F() 56 ASSERT_TRUE(policy.complexityReg.empty()); in HWTEST_F() 57 ASSERT_TRUE(policy.validityPeriod == 0); in HWTEST_F() 58 ASSERT_TRUE(policy.additionalDescription.empty()); in HWTEST_F() 70 PasswordPolicy policy; in HWTEST_F() local 71 bool ret = serializer->Deserialize(jsonString, policy); in HWTEST_F() 73 ASSERT_TRUE(policy.complexityReg.empty()); in HWTEST_F() 74 ASSERT_TRUE(policy.validityPeriod == 0); in HWTEST_F() 75 ASSERT_TRUE(policy in HWTEST_F() 87 PasswordPolicy policy; HWTEST_F() local 104 PasswordPolicy policy; HWTEST_F() local 136 PasswordPolicy policy; HWTEST_F() local 156 PasswordPolicy policy; HWTEST_F() local 170 PasswordPolicy policy; HWTEST_F() local 184 PasswordPolicy policy; HWTEST_F() local [all...] |
/base/customization/enterprise_device_management/services/edm_plugin/src/ |
H A D | fingerprint_auth_plugin.cpp | 41 FingerprintPolicy policy; in OnHandlePolicy() local 42 serializer_->Deserialize(policyData.policyData, policy); in OnHandlePolicy() 47 ret = HandleFingerprintAuthPolicy(disallow, policy); in OnHandlePolicy() 50 ret = HandleFingerprintForAccountPolicy(disallow, accountId, policy); in OnHandlePolicy() 57 ret = SetGlobalConfigParam(policy); in OnHandlePolicy() 63 serializer_->Serialize(policy, afterHandle); in OnHandlePolicy() 71 ErrCode FingerprintAuthPlugin::HandleFingerprintAuthPolicy(bool disallow, FingerprintPolicy &policy) in HandleFingerprintAuthPolicy() argument 74 policy.globalDisallow = true; in HandleFingerprintAuthPolicy() 75 policy.accountIds.clear(); in HandleFingerprintAuthPolicy() 78 if (policy in HandleFingerprintAuthPolicy() 85 HandleFingerprintForAccountPolicy(bool disallow, int32_t accountId, FingerprintPolicy &policy) HandleFingerprintForAccountPolicy() argument 102 SetGlobalConfigParam(FingerprintPolicy policy) SetGlobalConfigParam() argument 119 FingerprintPolicy policy; OnGetPolicy() local [all...] |
H A D | password_policy_plugin.cpp | 37 ErrCode PasswordPolicyPlugin::OnSetPolicy(PasswordPolicy &policy) in OnSetPolicy() argument 42 param.value.pinExpiredPeriod = policy.validityPeriod; in OnSetPolicy() 54 PasswordPolicy policy; in OnGetPolicy() local 55 if (!pluginInstance_->serializer_->Deserialize(policyData, policy)) { in OnGetPolicy() 60 reply.WriteString(policy.complexityReg); in OnGetPolicy() 61 reply.WriteInt64(policy.validityPeriod); in OnGetPolicy() 62 reply.WriteString(policy.additionalDescription); in OnGetPolicy()
|
/base/customization/enterprise_device_management/test/unittest/services/edm_plugin/src/ |
H A D | fingerprint_auth_plugin_test.cpp | 100 FingerprintPolicy policy; in HWTEST_F() local 101 policy.accountIds.insert(100); in HWTEST_F() 102 ErrCode ret = plugin.HandleFingerprintAuthPolicy(true, policy); in HWTEST_F() 104 ASSERT_TRUE(policy.accountIds.empty()); in HWTEST_F() 105 ASSERT_TRUE(policy.globalDisallow); in HWTEST_F() 107 policy.accountIds.insert(100); in HWTEST_F() 108 policy.globalDisallow = false; in HWTEST_F() 109 ret = plugin.HandleFingerprintAuthPolicy(false, policy); in HWTEST_F() 112 policy.accountIds.clear(); in HWTEST_F() 113 ret = plugin.HandleFingerprintAuthPolicy(false, policy); in HWTEST_F() 127 FingerprintPolicy policy; HWTEST_F() local [all...] |
/base/powermgr/thermal_manager/test/unittest/src/ |
H A D | thermal_policy_test.cpp | 68 ThermalPolicy policy; in HWTEST_F() local 69 EXPECT_TRUE(policy.GetClusterLevelMap().empty()); in HWTEST_F() 82 ThermalPolicy policy; in HWTEST_F() local 83 EXPECT_TRUE(policy.Init()); in HWTEST_F() 85 policy.clusterPolicyMap_[""] = vecConfig; in HWTEST_F() 86 policy.clusterPolicyMap_["test"] = vecConfig; in HWTEST_F() 89 policy.clusterPolicyMap_["test1"] = vecConfig; in HWTEST_F() 90 policy.PolicyDecision(); in HWTEST_F() 95 policy.PolicyDecision(); in HWTEST_F() 111 ThermalPolicy policy; in HWTEST_F() local 136 ThermalPolicy policy; HWTEST_F() local 170 ThermalPolicy policy; HWTEST_F() local [all...] |
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/src/ |
H A D | sandbox_manager_kit.cpp | 44 int32_t SandboxManagerKit::PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicy() argument 47 size_t policySize = policy.size(); in PersistPolicy() 53 return SandboxManagerClient::GetInstance().PersistPolicy(policy, result); in PersistPolicy() 56 int32_t SandboxManagerKit::UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicy() argument 59 size_t policySize = policy.size(); in UnPersistPolicy() 65 return SandboxManagerClient::GetInstance().UnPersistPolicy(policy, result); in UnPersistPolicy() 69 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicy() 72 size_t policySize = policy.size(); in PersistPolicy() 79 return SandboxManagerClient::GetInstance().PersistPolicyByTokenId(tokenId, policy, result); in PersistPolicy() 83 uint32_t tokenId, const std::vector<PolicyInfo> &policy, st in UnPersistPolicy() 68 PersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) PersistPolicy() argument 82 UnPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicy() argument 96 SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, std::vector<uint32_t> &result) SetPolicy() argument 115 UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicy() argument 129 SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) SetPolicyAsync() argument 147 UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicyAsync() argument 156 CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPolicy() argument 172 StartAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) StartAccessingPolicy() argument 184 StopAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) StopAccessingPolicy() argument 196 CheckPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument [all...] |
H A D | sandbox_manager_client.cpp | 69 int32_t SandboxManagerClient::PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicy() argument 72 [&](sptr<ISandboxManager> &proxy) { return proxy->PersistPolicy(policy, result); }; in PersistPolicy() 76 int32_t SandboxManagerClient::UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicy() argument 79 [&](sptr<ISandboxManager> &proxy) { return proxy->UnPersistPolicy(policy, result); }; in UnPersistPolicy() 84 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicyByTokenId() 87 [&](sptr<ISandboxManager> &proxy) { return proxy->PersistPolicyByTokenId(tokenId, policy, result); }; in PersistPolicyByTokenId() 92 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicyByTokenId() 95 [&](sptr<ISandboxManager> &proxy) { return proxy->UnPersistPolicyByTokenId(tokenId, policy, result); }; in UnPersistPolicyByTokenId() 99 int32_t SandboxManagerClient::SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, in SetPolicy() argument 103 [&](sptr<ISandboxManager> &proxy) { return proxy->SetPolicy(tokenId, policy, policyFla in SetPolicy() 83 PersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) PersistPolicyByTokenId() argument 91 UnPersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicyByTokenId() argument 107 UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicy() argument 114 SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) SetPolicyAsync() argument 122 UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicyAsync() argument 129 CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPolicy() argument 137 StartAccessingPolicy( const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) StartAccessingPolicy() argument 145 StopAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) StopAccessingPolicy() argument 152 CheckPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument [all...] |
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/include/ |
H A D | sandbox_manager_kit.h | 31 * @brief Clear the persistence policy 38 * @param policy vector of PolicyInfo, see policy_info.h 39 * @param result insert result of each policy, result is SandboxRetType in policy_info.h 42 static int32_t PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 45 * @param policy vector of PolicyInfo, see policy_info.h 46 * @param result insert result of each policy, result is SandboxRetType in policy_info.h 49 static int32_t UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 53 * @param policy vector of PolicyInfo, see policy_info.h 54 * @param result insert result of each policy, result is SandboxRetType in policy_info.h 58 uint32_t tokenId, const std::vector<PolicyInfo> &policy, st [all...] |
H A D | sandbox_manager_proxy.h | 35 int32_t PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 36 int32_t UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 37 int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, 39 int32_t UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) override; 40 int32_t SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) override; 41 int32_t UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) override; 42 int32_t CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) override; 43 int32_t StartAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 44 int32_t StopAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 46 uint32_t tokenId, const std::vector<PolicyInfo> &policy, st [all...] |
H A D | sandbox_manager_client.h | 43 int32_t PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 44 int32_t UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 45 int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, 47 int32_t UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy); 48 int32_t SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag); 49 int32_t UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy); 50 int32_t CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result); 51 int32_t StartAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 52 int32_t StopAccessingPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 53 int32_t CheckPersistPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, st [all...] |
/base/accesscontrol/sandbox_manager/interfaces/innerkits/sandbox_manager/test/unittest/src/ |
H A D | sandbox_manager_kit_coverage_test.cpp | 67 std::vector<PolicyInfo> policy; in HWTEST_F() local 70 policy.emplace_back(info); in HWTEST_F() 74 EXPECT_EQ(INVALID_PARAMTER, SandboxManagerKit::PersistPolicy(policy, result)); in HWTEST_F() 91 std::vector<PolicyInfo> policy; in HWTEST_F() local 94 policy.emplace_back(info); in HWTEST_F() 98 EXPECT_EQ(PERMISSION_DENIED, SandboxManagerKit::PersistPolicy(policy, result)); in HWTEST_F() 110 std::vector<PolicyInfo> policy; in HWTEST_F() local 113 policy.emplace_back(info); in HWTEST_F() 117 EXPECT_EQ(INVALID_PARAMTER, SandboxManagerKit::UnPersistPolicy(policy, result)); in HWTEST_F() 132 std::vector<PolicyInfo> policy; in HWTEST_F() local 151 std::vector<PolicyInfo> policy; HWTEST_F() local 170 std::vector<PolicyInfo> policy; HWTEST_F() local 189 std::vector<PolicyInfo> policy; HWTEST_F() local 211 std::vector<PolicyInfo> policy; HWTEST_F() local 230 std::vector<PolicyInfo> policy; HWTEST_F() local 251 std::vector<PolicyInfo> policy; HWTEST_F() local 299 std::vector<PolicyInfo> policy; HWTEST_F() local [all...] |
H A D | sandbox_manager_kit_test.cpp | 156 std::vector<PolicyInfo> policy; in HWTEST_F() local 163 policy.emplace_back(infoParent); in HWTEST_F() 164 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::SetPolicy(g_mockToken, policy, policyFlag, policyResult)); in HWTEST_F() 169 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::CheckPolicy(g_mockToken, policy, result)); in HWTEST_F() 173 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::PersistPolicy(policy, policyResult)); in HWTEST_F() 178 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::CheckPersistPolicy(g_mockToken, policy, checkResult1)); in HWTEST_F() 182 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::UnPersistPolicy(policy, unPersistResult)); in HWTEST_F() 185 ASSERT_EQ(SANDBOX_MANAGER_OK, SandboxManagerKit::CheckPersistPolicy(g_mockToken, policy, checkResult2)); in HWTEST_F() 205 std::vector<PolicyInfo> policy; in HWTEST_F() local 206 policy in HWTEST_F() 243 std::vector<PolicyInfo> policy; HWTEST_F() local 368 std::vector<PolicyInfo> policy; HWTEST_F() local 510 std::vector<PolicyInfo> policy; HWTEST_F() local 557 std::vector<PolicyInfo> policy; HWTEST_F() local 604 std::vector<PolicyInfo> policy; HWTEST_F() local 652 std::vector<PolicyInfo> policy; HWTEST_F() local 701 std::vector<PolicyInfo> policy; HWTEST_F() local 758 std::vector<PolicyInfo> policy; HWTEST_F() local 779 std::vector<PolicyInfo> policy; HWTEST_F() local 1128 std::vector<PolicyInfo> policy; HWTEST_F() local 1214 std::vector<PolicyInfo> policy; HWTEST_F() local 1241 std::vector<PolicyInfo> policy; HWTEST_F() local 1324 std::vector<PolicyInfo> policy; HWTEST_F() local 1356 std::vector<PolicyInfo> policy; HWTEST_F() local 1382 std::vector<PolicyInfo> policy; HWTEST_F() local 1428 std::vector<PolicyInfo> policy; HWTEST_F() local 1458 std::vector<PolicyInfo> policy; HWTEST_F() local 1489 std::vector<PolicyInfo> policy; HWTEST_F() local 1541 std::vector<PolicyInfo> policy; HWTEST_F() local 1603 std::vector<PolicyInfo> policy; HWTEST_F() local 1676 std::vector<PolicyInfo> policy; HWTEST_F() local [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/src/service/ |
H A D | sandbox_manager_service.cpp | 143 int32_t SandboxManagerService::PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicy() argument 146 size_t policySize = policy.size(); in PersistPolicy() 148 SANDBOXMANAGER_LOG_ERROR(LABEL, "Policy vector size error, size = %{public}zu.", policy.size()); in PersistPolicy() 156 return PolicyInfoManager::GetInstance().AddPolicy(callingTokenId, policy, result, flag); in PersistPolicy() 160 const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in UnPersistPolicy() 163 size_t policySize = policy.size(); in UnPersistPolicy() 165 SANDBOXMANAGER_LOG_ERROR(LABEL, "Policy vector size error, size = %{public}zu.", policy.size()); in UnPersistPolicy() 169 return PolicyInfoManager::GetInstance().RemovePolicy(callingTokenId, policy, result); in UnPersistPolicy() 173 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) in PersistPolicyByTokenId() 175 size_t policySize = policy in PersistPolicyByTokenId() 159 UnPersistPolicy( const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicy() argument 172 PersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) PersistPolicyByTokenId() argument 190 UnPersistPolicyByTokenId( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) UnPersistPolicyByTokenId() argument 204 SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, std::vector<uint32_t> &result) SetPolicy() argument 224 UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicy() argument 239 SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) SetPolicyAsync() argument 246 UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) UnSetPolicyAsync() argument 251 CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPolicy() argument 267 StartAccessingPolicy( const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) StartAccessingPolicy() argument 280 StopAccessingPolicy( const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) StopAccessingPolicy() argument 293 CheckPersistPolicy( uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) CheckPersistPolicy() argument [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/include/service/ |
H A D | policy_info_manager.h | 37 * @brief Clear the persistence policy 38 * @param policy vector of string, file path 45 * @param policy vector of PolicyInfo, see policy_info.h 46 * @param result insert result of each policy 49 int32_t AddPolicy(const uint32_t tokenId, const std::vector<PolicyInfo> &policy, 54 * @param policy vector of PolicyInfo, see policy_info.h 55 * @param result match result of each policy 58 int32_t MatchPolicy(const uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result); 60 * @brief The mode of the same path policy performs or operations 67 * @brief Match one policy o [all...] |
H A D | sandbox_manager_service.h | 45 int32_t PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 46 int32_t UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 48 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 50 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) override; 51 int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, 53 int32_t UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) override; 54 int32_t SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) override; 55 int32_t UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) override; 56 int32_t CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) override; 57 int32_t StartAccessingPolicy(const std::vector<PolicyInfo> &policy, st [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/test/unittest/ |
H A D | policy_info_manager_test.cpp | 116 std::vector<PolicyInfo> policy; in HWTEST_F() local 117 policy.emplace_back(info); in HWTEST_F() 121 policy[0] = info; in HWTEST_F() 123 EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().SetPolicy(selfTokenId_, policy, 1, setResult)); in HWTEST_F() 128 EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().AddPolicy(selfTokenId_, policy, result11)); in HWTEST_F() 132 // add duplicate policy in HWTEST_F() 135 policy[0] = info; in HWTEST_F() 137 EXPECT_EQ(SANDBOX_MANAGER_OK, PolicyInfoManager::GetInstance().AddPolicy(selfTokenId_, policy, result12)); in HWTEST_F() 141 // add duplicate policy with diff mode in HWTEST_F() 144 policy[ in HWTEST_F() 168 std::vector<PolicyInfo> policy; HWTEST_F() local 219 std::vector<PolicyInfo> policy; HWTEST_F() local [all...] |
H A D | sandbox_manager_service_test.cpp | 121 std::vector<PolicyInfo> policy; in HWTEST_F() local 123 EXPECT_EQ(INVALID_PARAMTER, sandboxManagerService_->PersistPolicy(policy, result0)); in HWTEST_F() 127 policy.resize(POLICY_VECTOR_SIZE_LIMIT + 1); in HWTEST_F() 129 EXPECT_EQ(INVALID_PARAMTER, sandboxManagerService_->PersistPolicy(policy, result1)); in HWTEST_F() 142 std::vector<PolicyInfo> policy; in HWTEST_F() local 145 EXPECT_EQ(INVALID_PARAMTER, sandboxManagerService_->SetPolicy(selfTokenId_, policy, policyFlag, result0)); in HWTEST_F() 149 policy.resize(POLICY_VECTOR_SIZE_LIMIT + 1); in HWTEST_F() 152 EXPECT_EQ(INVALID_PARAMTER, sandboxManagerService_->SetPolicy(selfTokenId_, policy, policyFlag, result)); in HWTEST_F() 156 policy.resize(1); in HWTEST_F() 157 EXPECT_EQ(SANDBOX_MANAGER_OK, sandboxManagerService_->SetPolicy(selfTokenId_, policy, policyFla in HWTEST_F() 171 std::vector<PolicyInfo> policy; HWTEST_F() local 193 std::vector<PolicyInfo> policy; HWTEST_F() local 214 std::vector<PolicyInfo> policy; HWTEST_F() local 239 std::vector<PolicyInfo> policy; HWTEST_F() local 260 std::vector<PolicyInfo> policy; HWTEST_F() local 275 std::vector<PolicyInfo> policy; HWTEST_F() local 307 std::vector<PolicyInfo> policy; HWTEST_F() local 500 std::vector<PolicyInfo> policy; HWTEST_F() local 527 std::vector<PolicyInfo> policy; HWTEST_F() local 556 std::vector<PolicyInfo> policy; HWTEST_F() local 595 std::vector<PolicyInfo> policy; HWTEST_F() local 634 std::vector<PolicyInfo> policy; HWTEST_F() local 660 std::vector<PolicyInfo> policy; HWTEST_F() local 685 std::vector<PolicyInfo> policy; HWTEST_F() local 716 std::vector<PolicyInfo> policy; HWTEST_F() local 743 std::vector<PolicyInfo> policy; HWTEST_F() local [all...] |
/base/accesscontrol/sandbox_manager/frameworks/sandbox_manager/include/ |
H A D | i_sandbox_manager.h | 35 virtual int32_t PersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 36 virtual int32_t UnPersistPolicy(const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 38 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 40 uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<uint32_t> &result) = 0; 41 virtual int32_t SetPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, 43 virtual int32_t UnSetPolicy(uint32_t tokenId, const PolicyInfo &policy) = 0; 44 virtual int32_t SetPolicyAsync(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag) = 0; 45 virtual int32_t UnSetPolicyAsync(uint32_t tokenId, const PolicyInfo &policy) = 0; 46 virtual int32_t CheckPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result) = 0; 47 virtual int32_t StartAccessingPolicy(const std::vector<PolicyInfo> &policy, st [all...] |
/base/security/dlp_permission_service/frameworks/dlp_permission/src/ |
H A D | dlp_policy_parcel.cpp | 127 static bool ReadKey(PermissionPolicy& policy, Parcel& in) in ReadKey() argument 143 policy.SetAeskey(key, len); in ReadKey() 158 policy.SetIv(iv, len); in ReadKey() 172 policy.SetHmacKey(hmacKey, len); in ReadKey() 176 static bool ReadAesParam(PermissionPolicy& policy, Parcel& in) in ReadAesParam() argument 178 if (!ReadKey(policy, in)) { in ReadAesParam() 182 if (!(in.ReadUint64(policy.expireTime_))) { in ReadAesParam() 186 if (!(in.ReadUint32(policy.needOnline_))) { in ReadAesParam() 190 if (!(in.ReadUint32(policy.dlpVersion_))) { in ReadAesParam() 194 if (!(in.ReadBool(policy in ReadAesParam() 201 ReadAccountInfo(PermissionPolicy& policy, Parcel& in) ReadAccountInfo() argument [all...] |
/base/security/permission_lite/services/ipc_auth/src/ |
H A D | ipc_auth_impl.c | 70 static void SetPolicy(const IpcPolicy *policy, PolicyTrans *policyTrans)
in SetPolicy() argument 72 switch (policy->type) {
in SetPolicy() 75 policyTrans->uidMax = policy->uidMax;
in SetPolicy() 76 policyTrans->uidMin = policy->uidMin;
in SetPolicy() 81 policyTrans->fixedUid[m] = policy->fixedUid[m];
in SetPolicy() 88 int ret = GetUidByBundleName(policy->bundleName, &uid);
in SetPolicy() 139 IpcPolicy policy = featurePolicy->policies[k];
in SetPolicies() local 140 if (IsPolicyValid(policy.type)) {
in SetPolicies() 141 SetPolicy(&policy, *policies + index);
in SetPolicies() 206 static int CheckPolicy(const IpcPolicy *policy, unsigne argument 241 IpcPolicy policy = featurePolicy->policies[k]; CheckFeaturePolicies() local [all...] |
/base/customization/enterprise_device_management/services/edm_plugin/src/utils/ |
H A D | password_policy_serializer.cpp | 27 bool PasswordSerializer::Deserialize(const std::string &jsonString, PasswordPolicy &policy) in Deserialize() argument 44 policy.complexityReg = cJSON_GetStringValue(complexityReg); in Deserialize() 45 policy.validityPeriod = cJSON_GetNumberValue(validityPeriod); in Deserialize() 46 policy.additionalDescription = cJSON_GetStringValue(additionalDescription); in Deserialize() 52 bool PasswordSerializer::Serialize(const PasswordPolicy &policy, std::string &jsonString) in Serialize() argument 56 cJSON_AddStringToObject(root, COMPLEXITY_REG.c_str(), policy.complexityReg.c_str()); in Serialize() 57 cJSON_AddNumberToObject(root, VALIDITY_PERIOD.c_str(), policy.validityPeriod); in Serialize() 58 cJSON_AddStringToObject(root, ADDITIONAL_DESCRIPTION.c_str(), policy.additionalDescription.c_str()); in Serialize()
|
/base/security/dlp_permission_service/services/dlp_permission/sa/sa_common/ |
H A D | dlp_permission_serializer.cpp | 53 const std::string POLICY_INDEX = "policy"; 246 static int32_t SerializeDomainInfo(const PermissionPolicy& policy, unordered_json& permInfoJson) in SerializeDomainInfo() argument 248 if (policy.ownerAccountType_ != DOMAIN_ACCOUNT) { in SerializeDomainInfo() 281 static void SerializeEveryoneInfo(const PermissionPolicy& policy, unordered_json& permInfoJson) in SerializeEveryoneInfo() argument 283 if (policy.supportEveryone_) { in SerializeEveryoneInfo() 288 switch (policy.everyonePerm_) { in SerializeEveryoneInfo() 318 int32_t DlpPermissionSerializer::SerializeDlpPermission(const PermissionPolicy& policy, unordered_json& permInfoJson) in SerializeDlpPermission() argument 320 uint32_t keyHexLen = policy.GetAeskeyLen() * BYTE_TO_HEX_OPER_LENGTH + 1; in SerializeDlpPermission() 322 int32_t res = ByteToHexString(policy.GetAeskey(), policy in SerializeDlpPermission() 396 DeserializeEveryoneInfo(const unordered_json& policyJson, PermissionPolicy& policy) DeserializeEveryoneInfo() argument 434 InitPermissionPolicy(PermissionPolicy& policy, const std::vector<AuthUserInfo>& userList, unordered_json policyJson) InitPermissionPolicy() argument 468 DeserializeFileEncJson(PermissionPolicy& policy, unordered_json& plainPolicyJson) DeserializeFileEncJson() argument 516 DeserializeDlpPermission(const unordered_json& permJson, PermissionPolicy& policy) DeserializeDlpPermission() argument [all...] |
/base/accesscontrol/sandbox_manager/services/sandbox_manager/main/cpp/include/mac/ |
H A D | mac_adapter.h | 32 int32_t SetSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, uint64_t policyFlag, 34 int32_t UnSetSandboxPolicy(uint32_t tokenId, const PolicyInfo &policy); 35 int32_t UnSetSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result); 36 int32_t QuerySandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result); 37 int32_t CheckSandboxPolicy(uint32_t tokenId, const std::vector<PolicyInfo> &policy, std::vector<bool> &result);
|