/foundation/ability/ability_base/interfaces/kits/native/uri/src/ |
H A D | uri.cpp | 156 // If "//" follows the scheme separator, we have an authority. in ParseAuthority() 193 string authority = GetAuthority(); in ParseUserInfo() local 194 if (authority.empty()) { in ParseUserInfo() 198 size_t end = authority.find_last_of(USER_HOST_SEPARATOR); in ParseUserInfo() 199 return (end == NOT_FOUND) ? EMPTY : authority.substr(0, end); in ParseUserInfo() 216 string authority = GetAuthority(); in ParseHost() local 217 if (authority.empty()) { in ParseHost() 222 size_t userInfoSeparator = authority.find_last_of(USER_HOST_SEPARATOR); in ParseHost() 224 size_t portSeparator = authority.find_first_of(PORT_SEPARATOR, start); in ParseHost() 225 size_t end = (portSeparator == NOT_FOUND) ? authority in ParseHost() 249 string authority = GetAuthority(); ParsePort() local [all...] |
/foundation/filemanagement/file_api/interfaces/kits/cj/src/ |
H A D | translistener.cpp | 70 info.authority = uri.GetAuthority(); in CopyFileFromSoftBus() 88 if (info.authority != FILE_MANAGER_AUTHORITY && info.authority != MEDIA_AUTHORITY) { in CopyFileFromSoftBus() 97 if (info.authority == FILE_MANAGER_AUTHORITY || info.authority == MEDIA_AUTHORITY) { in CopyFileFromSoftBus() 117 if (info.authority != FILE_MANAGER_AUTHORITY && info.authority != MEDIA_AUTHORITY) { in PrepareCopySession() 144 if (info.authority != FILE_MANAGER_AUTHORITY && info.authority != MEDIA_AUTHORITY) { in PrepareCopySession()
|
/foundation/filemanagement/file_api/interfaces/kits/js/src/mod_fs/properties/copy_listener/ |
H A D | trans_listener.cpp | 67 if (info.authority != FILE_MANAGER_AUTHORITY && info.authority != MEDIA_AUTHORITY) { in HandleCopyFailure() 115 info.authority = uri.GetAuthority(); in CopyFileFromSoftBus() 132 if (info.authority == FILE_MANAGER_AUTHORITY || info.authority == MEDIA_AUTHORITY) { in CopyFileFromSoftBus() 155 if (info.authority != FILE_MANAGER_AUTHORITY && info.authority != MEDIA_AUTHORITY) { in PrepareCopySession() 182 if (info.authority != FILE_MANAGER_AUTHORITY && info.authority != MEDIA_AUTHORITY) { in PrepareCopySession()
|
/foundation/ability/ability_base/interfaces/kits/native/want/include/ |
H A D | skills.h | 172 * @brief Obtains the specified authority. 174 * @param authorityId Id of the specified authority. 179 * @brief Adds an authority to this Skills object. 181 * @param authority Indicates the authority to add. 183 void AddAuthority(const std::string &authority); 186 * @brief Checks whether the specified authority is exist. 188 * @param authority Name of the specified authority. 190 bool HasAuthority(const std::string &authority); [all...] |
/foundation/filemanagement/app_file_service/interfaces/kits/js/file_share/ |
H A D | grant_uri_permission.cpp | 169 string authority = uri.GetAuthority(); in DoGrantUriPermission() local 171 if (authority == MEDIA_AUTHORITY && path.find(".") == string::npos) { in DoGrantUriPermission() 194 string authority = uri.GetAuthority(); in CheckValidPublicUri() local 195 if (authority != MEDIA_AUTHORITY && authority != FILE_MANAGER_AUTHORITY) { in CheckValidPublicUri()
|
/foundation/filemanagement/dfs_service/services/distributedfiledaemon/include/ipc/ |
H A D | hmdfs_info.h | 27 std::string authority; member
|
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/service/data_share/common/ |
H A D | uri_utils.cpp | 79 uriConfig.authority = uriTemp.GetAuthority(); in GetUriConfig() 83 std::string convertUri = DATA_PROXY_SCHEMA + uriConfig.authority + uriConfig.path; in GetUriConfig()
|
H A D | uri_utils.h | 31 std::string authority; member
|
/foundation/ability/ability_base/test/unittest/want/ |
H A D | skills_test.cpp | 425 std::string authority = "Authority.system.test"; in HWTEST_F() local 429 base_->AddAuthority(authority); in HWTEST_F() 433 EXPECT_EQ(true, base_->HasAuthority(authority)); in HWTEST_F() 434 EXPECT_EQ(authority, base_->GetAuthority(0)); in HWTEST_F() 436 base_->RemoveAuthority(authority); in HWTEST_F() 438 EXPECT_EQ(false, base_->HasAuthority(authority)); in HWTEST_F() 639 std::string authority = "authority.system.test"; in HWTEST_F() local 641 EXPECT_EQ(false, base_->HasAuthority(authority)); in HWTEST_F() 644 base_->RemoveAuthority(authority); in HWTEST_F() [all...] |
/foundation/ability/ability_runtime/services/uripermmgr/src/ |
H A D | uri_permission_manager_stub_impl.cpp | 459 auto &&authority = uriInner.GetAuthority(); in GrantBatchUriPermissionFor2In1Privileged() local 460 if (authority != "docs" || uriStr.find(CLOUND_DOCS_URI_MARK) != std::string::npos) { in GrantBatchUriPermissionFor2In1Privileged() 734 auto &&authority = uri_inner.GetAuthority(); in GrantUriPermissionFor2In1Inner() local 735 TAG_LOGD(AAFwkTag::URIPERMMGR, "The authority:%{public}s", authority.c_str()); in GrantUriPermissionFor2In1Inner() 743 if (authority == "docs" && uri.ToString().find(CLOUND_DOCS_URI_MARK) == std::string::npos) { in GrantUriPermissionFor2In1Inner() 823 auto &&authority = uri.GetAuthority(); in CheckUriPermission() local 824 TAG_LOGD(AAFwkTag::URIPERMMGR, "UriAuth:%{public}s", authority.c_str()); in CheckUriPermission() 825 if (authority == "docs" && tokenIdPermission.VerifyFileAccessManagerPermission()) { in CheckUriPermission() 829 if (authority in CheckUriPermission() [all...] |
/foundation/ability/ability_base/interfaces/kits/native/want/src/ |
H A D | skills.cpp | 209 * @brief Obtains the specified authority. 211 * @param authorityId Id of the specified authority. 223 * @brief Adds an authority to this Skills object. 225 * @param authority Indicates the authority to add. 227 void Skills::AddAuthority(const std::string &authority) in AddAuthority() argument 229 auto it = std::find(authorities_.begin(), authorities_.end(), authority); in AddAuthority() 231 authorities_.emplace_back(authority); in AddAuthority() 236 * @brief Checks whether the specified authority is exist. 238 * @param action Name of the specified authority 240 HasAuthority(const std::string &authority) HasAuthority() argument 250 RemoveAuthority(const std::string &authority) RemoveAuthority() argument [all...] |
/foundation/filemanagement/dfs_service/services/distributedfiledaemon/src/ipc/ |
H A D | daemon.cpp | 431 if (info.authority == FILE_MANAGER_AUTHORITY || info.authority == MEDIA_AUTHORITY) { in PrepareSession() 432 LOGI("authority is media or docs"); in PrepareSession() 536 auto authority = uri.GetAuthority(); in CheckCopyRule() local 537 info.authority = authority; in CheckCopyRule() 538 if (authority != FILE_MANAGER_AUTHORITY && authority != MEDIA_AUTHORITY) { in CheckCopyRule()
|
/foundation/ability/dmsfwk/services/dtbschedmgr/src/ |
H A D | distributed_sched_permission.cpp | 442 std::string authority = uri.GetAuthority();
in MarkUriPermission() local 443 HILOGI("uri authority is %{public}s.", authority.c_str());
in MarkUriPermission() 454 if (!bms->GetBundleInfo(authority,
in MarkUriPermission()
|
/foundation/distributeddatamgr/datamgr_service/services/distributeddataservice/service/data_share/ |
H A D | data_provider_config.cpp | 48 providerInfo_.bundleName = uriConfig_.authority; in GetBundleInfo()
|
/foundation/distributeddatamgr/pasteboard/services/core/src/ |
H A D | pasteboard_service.cpp | 1110 auto authority = uri.GetAuthority(); in IsBundleOwnUriPermission() local 1111 if (bundleName.compare(authority) != 0) { in IsBundleOwnUriPermission() 1113 authority.c_str(), bundleName.c_str()); in IsBundleOwnUriPermission()
|