/foundation/ability/ability_runtime/frameworks/js/napi/js_dialog_session/ |
H A D | js_dialog_session.cpp | 103 bool isAllow = false; in OnSendDialogResult() local 104 if (!ConvertFromJsValue(env, info.argv[ARGC_TWO], isAllow)) { in OnSendDialogResult() 105 TAG_LOGE(AAFwkTag::DIALOG, "Failed unwrap isAllow"); in OnSendDialogResult() 106 ThrowInvalidParamError(env, "Parameter error: isAllow must be a Boolean."); in OnSendDialogResult() 110 [dialogSessionId, want, isAllow](napi_env env, NapiAsyncTask &task, int32_t status) { in OnSendDialogResult() 112 auto errorcode = AbilityManagerClient::GetInstance()->SendDialogResult(want, dialogSessionId, isAllow); in OnSendDialogResult()
|
/foundation/bundlemanager/ecological_rule_manager/interfaces/innerkits/include/ |
H A D | ecological_rule_mgr_service_param.h | 30 bool isAllow = true; member 45 bool isAllow = true; member
|
/foundation/bundlemanager/bundle_framework/services/bundlemgr/src/free_install/ |
H A D | bms_ecological_rule_mgr_service_param.cpp | 37 if (!in.ReadBool(rule->isAllow)) { in Unmarshalling() 38 LOG_E(BMS_TAG_DEFAULT, "read isAllow failed"); in Unmarshalling() 56 if (!parcel.WriteBool(isAllow)) { in Marshalling() 57 LOG_E(BMS_TAG_DEFAULT, "write isAllow failed"); in Marshalling()
|
H A D | bms_ecological_rule_mgr_service_client.cpp | 112 LOG_D(BMS_TAG_DEFAULT, "isAllow = %{public}d, replaceWant = %{public}s", rule.isAllow, in QueryFreeInstallExperience()
|
H A D | bundle_connect_ability_mgr.cpp | 300 } else if (rule.isAllow) { in SilentInstall()
|
/foundation/resourceschedule/device_standby/utils/test/fuzztest/configmanager_fuzzer/ |
H A D | configmanager_fuzzer.cpp | 138 bool isAllow = GetData<bool>(); in DoSomethingInterestingWithMyAPI() local 151 condition, debugMode, isAllow); in DoSomethingInterestingWithMyAPI() 153 condition, debugMode, isAllow); in DoSomethingInterestingWithMyAPI()
|
/foundation/bundlemanager/ecological_rule_manager/interfaces/innerkits/src/ |
H A D | ecological_rule_mgr_service_client.cpp | 107 rule.isAllow = true; in QueryFreeInstallExperience() 141 rule.isAllow = true; in QueryStartExperience()
|
H A D | ecological_rule_mgr_service_param.cpp | 66 if (!in.ReadBool(rule->isAllow)) { in Unmarshalling() 76 bool res = parcel.WriteBool(isAllow) && parcel.WriteParcelable(replaceWant); in Marshalling()
|
/foundation/bundlemanager/bundle_framework/services/bundlemgr/include/free_install/ |
H A D | bms_ecological_rule_mgr_service_param.h | 30 bool isAllow = true; member
|
/foundation/resourceschedule/device_standby/utils/policy/include/ |
H A D | standby_config_manager.h | 95 uint32_t condition, bool isAllow, bool isApp); 97 uint32_t condition, bool isAllow, bool isApp); 116 uint32_t condition, bool isAllow, bool isApp, const std::function<void(bool, std::set<T>&,
|
/foundation/bundlemanager/ecological_rule_manager/services/manager/src/ |
H A D | ecologic_rule_mgr_service_stub.cpp | 155 bmsRule.isAllow = rule.isAllow; in TransBmsExperienceRule()
|
/foundation/communication/netmanager_base/frameworks/js/napi/netpolicy/src/ |
H A D | net_policy_callback_observer.cpp | 143 bool isAllow = *isAllowPtr; in CreateNetBackgroundPolicyChangeParam() local 144 napi_value jsValue = NapiUtils::GetBoolean(env, isAllow); in CreateNetBackgroundPolicyChangeParam()
|
/foundation/resourceschedule/device_standby/plugins/strategy/include/ |
H A D | base_network_strategy.h | 108 virtual void SetNetAllowApps(bool isAllow);
|
/foundation/communication/netmanager_base/services/netpolicymanager/include/ |
H A D | firewall_rule.h | 112 * @param isAllow allow the firewall rule or not 114 virtual void SetUidFirewallRule(uint32_t uid, bool isAllow);
|
/foundation/resourceschedule/device_standby/utils/policy/src/ |
H A D | standby_config_manager.cpp | 450 uint32_t condition, bool isAllow, bool isApp, const std::function<void(bool, std::set<T>&, in GetEligibleAllowConfig() 461 if (config.isAllow_ != isAllow) { in GetEligibleAllowConfig() 482 uint32_t condition, bool isAllow, bool isApp) in GetEligibleAllowTimeConfig() 494 return GetEligibleAllowConfig<TimeLtdProcess>(paramName, condition, isAllow, isApp, func); in GetEligibleAllowTimeConfig() 498 uint32_t condition, bool isAllow, bool isApp) in GetEligiblePersistAllowConfig() 508 return GetEligibleAllowConfig<std::string>(paramName, condition, isAllow, isApp, func); in GetEligiblePersistAllowConfig() 449 GetEligibleAllowConfig(const std::string& paramName, uint32_t condition, bool isAllow, bool isApp, const std::function<void(bool, std::set<T>&, const DefaultResourceConfig&)>& func) GetEligibleAllowConfig() argument 481 GetEligibleAllowTimeConfig(const std::string& paramName, uint32_t condition, bool isAllow, bool isApp) GetEligibleAllowTimeConfig() argument 497 GetEligiblePersistAllowConfig(const std::string& paramName, uint32_t condition, bool isAllow, bool isApp) GetEligiblePersistAllowConfig() argument
|
/foundation/resourceschedule/device_standby/plugins/strategy/src/ |
H A D | base_network_strategy.cpp | 324 void BaseNetworkStrategy::SetNetAllowApps(bool isAllow) in SetNetAllowApps() argument 336 STANDBYSERVICE_LOGD("uid: %{public}d, name: %{public}s, isAllow: %{public}d", in SetNetAllowApps() 337 key, value.name_.c_str(), isAllow); in SetNetAllowApps() 341 SetFirewallAllowedList(uids, isAllow); in SetNetAllowApps()
|
/foundation/resourceschedule/device_standby/services/core/include/ |
H A D | standby_service_impl.h | 149 void GetPersistAllowList(uint32_t allowTypeIndex, std::vector<AllowInfo>& allowInfoList, bool isAllow, bool isApp);
|
/foundation/ability/ability_runtime/test/mock/frameworks_kits_appkit_native_test/ability_delegator/ |
H A D | mock_ability_delegator_stub.h | 100 MOCK_METHOD1(SetShowOnLockScreen, int(bool isAllow)); 280 MOCK_METHOD1(SetShowOnLockScreen, int(bool isAllow));
|
/foundation/bundlemanager/bundle_framework/services/test/mock/include/ |
H A D | mock_ability_mgr_host.h | 256 virtual int SetShowOnLockScreen(bool isAllow) override
|
/foundation/resourceschedule/device_standby/services/core/src/ |
H A D | standby_service_impl.cpp | 822 bool isAllow, bool isApp) in GetPersistAllowList() 828 AllowTypeName[allowTypeIndex], condition, isAllow, true); in GetPersistAllowList() 831 AllowTypeName[allowTypeIndex], condition, isAllow, false); in GetPersistAllowList() 821 GetPersistAllowList(uint32_t allowTypeIndex, std::vector<AllowInfo>& allowInfoList, bool isAllow, bool isApp) GetPersistAllowList() argument
|
/foundation/ability/ability_runtime/services/abilitymgr/include/ |
H A D | ability_manager_proxy.h | 853 virtual int SendDialogResult(const Want &want, const std::string &dialogSessionId, bool isAllow) override;
|
/foundation/ability/ability_runtime/interfaces/inner_api/ability_manager/include/ |
H A D | ability_manager_interface.h | 1091 virtual int SendDialogResult(const Want &want, const std::string &dialogSessionId, bool isAllow) in SendDialogResult() argument
|
H A D | ability_manager_client.h | 1093 ErrCode SendDialogResult(const Want &want, const std::string &dialogSessionId, bool isAllow);
|
/foundation/ability/ability_runtime/test/unittest/ability_manager_client_branch_test/ |
H A D | ability_manager_client_branch_test.cpp | 2061 bool isAllow = true; in HWTEST_F() local 2062 auto result = client_->SendDialogResult(want, dialogSessionId, isAllow); in HWTEST_F()
|
/foundation/ability/ability_runtime/services/abilitymgr/src/ |
H A D | ability_manager_client.cpp | 1410 ErrCode AbilityManagerClient::SendDialogResult(const Want &want, const std::string &dialogSessionId, const bool isAllow) in SendDialogResult() argument 1414 return abms->SendDialogResult(want, dialogSessionId, isAllow); in SendDialogResult()
|