/foundation/systemabilitymgr/samgr/interfaces/innerkits/rust/src/ |
H A D | lib.rs | 14 #![allow(missing_docs)] 15 #![allow(clippy::missing_safety_doc)] 20 #[allow(unused)]
|
/foundation/communication/netmanager_base/frameworks/native/netconnclient/src/ |
H A D | socket_permission.cpp | 19 int32_t SetInternetPermission(uint32_t uid, uint8_t allow) in SetInternetPermission() argument 21 return OHOS::NetManagerStandard::NetConnClient::GetInstance().SetInternetPermission(uid, allow); in SetInternetPermission()
|
/foundation/communication/ipc/interfaces/innerkits/rust/src/ |
H A D | lib.rs | 15 #![allow(clippy::missing_safety_doc)] 16 #![allow(missing_docs, unused)]
|
H A D | hilog.rs | 39 #[allow(unused)]
|
/foundation/systemabilitymgr/safwk/interfaces/innerkits/safwk/rust/src/ |
H A D | hilog.rs | 16 #[allow(unused)] 40 #[allow(unused)]
|
H A D | lib.rs | 14 #![allow(missing_docs)]
|
H A D | wrapper.rs | 14 #![allow(unreachable_pub)] 144 #[allow(non_snake_case)]
|
H A D | ability.rs | 26 #[allow(unused)]
|
/foundation/systemabilitymgr/safwk/interfaces/innerkits/safwk/rust/examples/listen_rust_sa/src/ |
H A D | lib.rs | 16 #![allow(missing_docs)] 17 #![allow(unused)]
|
/foundation/arkui/ace_engine/frameworks/core/animation/ |
H A D | shared_transition_effect.cpp | 182 bool allow = false; in Allow() local 185 allow = dest->IsEnablePushEnter() && src->IsEnablePushExit(); in Allow() 188 allow = dest->IsEnablePopEnter() && src->IsEnablePopExit(); in Allow() 190 return allow; in Allow() 368 bool allow = false; in Allow() local 371 allow = current->IsEnablePushEnter(); in Allow() 374 allow = current->IsEnablePopEnter(); in Allow() 376 return allow; in Allow()
|
/foundation/communication/netmanager_base/interfaces/innerkits/netconnclient/include/ |
H A D | socket_permission.h | 21 int32_t SetInternetPermission(uint32_t uid, uint8_t allow);
|
/foundation/arkui/ace_engine/frameworks/core/components/form/ |
H A D | form_component.h | 45 void SetAllowUpdate(bool allow) in SetAllowUpdate() argument 47 info_.allowUpdate = allow; in SetAllowUpdate()
|
/foundation/communication/netmanager_base/services/netpolicymanager/src/core/ |
H A D | net_policy_rule.cpp | 27 // Init uid、policy and background allow status from file,and save uid、policy into uidPolicyRules_. in Init() 287 int32_t NetPolicyRule::SetBackgroundPolicy(bool allow) in SetBackgroundPolicy() argument 289 if (backgroundAllow_ != allow) { in SetBackgroundPolicy() 290 GetCbInst()->NotifyNetBackgroundPolicyChangeAsync(allow); in SetBackgroundPolicy() 291 backgroundAllow_ = allow; in SetBackgroundPolicy() 293 GetFileInst()->WriteBackgroundPolicy(allow); in SetBackgroundPolicy() 295 GetNetsysInst()->BandwidthEnableDataSaver(!allow); in SetBackgroundPolicy() 299 NETMGR_LOG_I("Same background policy,don't need to repeat set. now background policy is:[%{public}d]", allow); in SetBackgroundPolicy()
|
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/rust/ylong_cloud_extension/src/service_impl/ |
H A D | asset_loader.rs | 27 #[allow(unused)]
|
/foundation/communication/netmanager_base/test/netmanagernative/unittest/netsys_manager_test/ |
H A D | conn_manager_test.cpp | 76 uint8_t allow = 0; in HWTEST_F() local 78 int32_t ret = instance_->SetInternetPermission(uid, allow, isBroker); in HWTEST_F() 90 uint8_t allow = 0; in HWTEST_F() local 92 int32_t ret = instance_->SetInternetPermission(uid, allow, isBroker); in HWTEST_F() 493 uint8_t allow = 1; in HWTEST_F() local 495 int32_t ret = instance_->SetInternetPermission(uid, allow, isBroker); in HWTEST_F() 499 ret = instance_->SetInternetPermission(uid, allow, isBroker); in HWTEST_F() 503 ret = instance_->SetInternetPermission(uid, allow, isBroker); in HWTEST_F()
|
/foundation/systemabilitymgr/safwk/interfaces/innerkits/safwk/rust/examples/audio_rust_sa/src/ |
H A D | lib.rs | 16 #![allow(missing_docs)] 17 #![allow(unused)]
|
/foundation/communication/ipc/interfaces/innerkits/rust/tests/ |
H A D | skeleton.rs | 14 #![allow(missing_docs, unused)] 110 #[allow(clippy::inherent_to_string)]
|
/foundation/graphic/graphic_2d/rosen/modules/render_service_base/rust/src/ |
H A D | lib.rs | 19 #![allow(dead_code)]
|
/foundation/systemabilitymgr/samgr/interfaces/innerkits/rust/examples/ |
H A D | basic.rs | 14 #![allow(missing_docs, unused)]
|
/foundation/communication/ipc/interfaces/innerkits/rust/examples/ |
H A D | basic.rs | 14 #![allow(missing_docs, unused)]
|
/foundation/distributedhardware/distributed_hardware_fwk/av_transport/av_trans_handler/histreamer_ability_querier/src/ |
H A D | histreamer_ability_querier_core.rs | 26 #[allow(clippy::not_unsafe_ptr_arg_deref)]
|
/foundation/systemabilitymgr/samgr/interfaces/innerkits/rust/tests/ |
H A D | entry.rs | 14 #![allow(unused)]
|
/foundation/ability/ability_runtime/services/appmgr/src/ |
H A D | app_preloader.cpp | 44 auto allow = ResourceSchedule::ResSchedClient::GetInstance().IsAllowedAppPreload(bundleName, mode); in PreCheck() local 45 if (!allow) { in PreCheck() 46 TAG_LOGI(AAFwkTag::APPMGR, "BundleName: %{public}s not allow preload", bundleName.c_str()); in PreCheck()
|
/foundation/communication/bluetooth_service/test/unittest/pbap/ |
H A D | pbap_server_test.cpp | 205 bool allow = true; in HWTEST_F() local 207 profile_->GrantPermission(device, allow, save); in HWTEST_F()
|
/foundation/communication/bluetooth_service/test/unittest/map/ |
H A D | map_mse_test.cpp | 231 bool allow = true; in HWTEST_F() local 233 profile_->GrantPermission(device, allow, save); in HWTEST_F()
|